Category Archives: Conspiracy

Proving The Mandela Effect, and Ties to Project Rainbow


When it seems there is a cover up of military experiments some believe responsible for accidental time travel and teleportation… to include the possibility of sponsoring the Mandela Effect’s alternate timeline realities… thus establishing two different but intertwined conspiracy theories, each with their own cover up… I’m extra suspicious. And, with good cause, it seems.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Aug, 29, 2020, from a mobile TV studio at an undisclosed location

copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

Rod, we need you…

Interesting interview with Mr. Serling (click); blankonblank.com

Imagine if you will, the audio intro to The Twilight Zone. Only Mr. Serling is nowhere to be found… in our current timeline. And, given the nature of this special real-life episode, in which everyone reading this post is onstage and playing a roll, we might just need him to help us work through putting this particular show together. It might properly be entitled, The Mandela Effect, and if to learn some useful truth along the way, Rod might hint in his introduction, that it “has to do with something called the Philadelphia and Montauk Experiments… in the Twilight Zone.”

The term ‘Mandela Effect’ (hereinafter, often referred to simply as the Effect), is derived by the first noted instance of the Effect, regarding the South African anti-apartheid activist, Nelson Mandela. When it was announced that Nelson was released from prison in 1990… untold millions of people began commenting that they were certain they had heard/read news reports of his death in prison, in the early 80’s… for which no one could find evidence of such death notices. At the time.

Over time, as other events in his life made international news, more and more people began to say much the same, in some cases, citing other time frames for his death. So many people, in fact, that a seeming cover up effort began to emerge, a matter which will play a role in this particular script, as it evolves. Fortunately, as it happens, at least one Fan of the old black and white TV show happens to be a ‘conspiracy theorist’ willing to stand in for Rod. And he… err… rather I, am ready and able to attempt filling in, with my own not-so-insignificant investigative writing efforts and findings.

For my qualifications in such an effort, may I submit my RAP Sheet of crimes and conspiracies solved or thwarted. Here, in this post, I start with a brief summary of the how and why of my efforts, which led to a means for testing for the validity of the Effect, quite contrary to tremendous efforts to dismiss it as ‘mind tricks some people play on themselves.’ In doing so, I also show significant relevance to the U.S. Navy’s Project Rainbow, better known as the 1943 Philadelphia Experiment, which allegedly caused a WWII Destroyer, the U.S.S. Eldridge and crew, to both travel in time, and teleport between multiple locations.

There are two motion pictures about the Experiment, sharing its name, but only the 1984 version is worth a watch… presuming the viewer realizes it is a fictionalized presentation. The 2012 TV version, is not only badly done, but it is so fictionalized as to anger anyone who knows anything about the legend, be it through the first movie, or any actual researched source. What the movies leave out, is that Nicholas Tesla and other famous Einstein-caliber scientists (including Einstein), have variously been linked to the Experiments, in one way or another. In fact, in the final proofs this script leads to, if you choose to follow it, we find modern scientists who essentially verify a lot of that, and who validate the science behind the Experiments… including a reference to a little known WWII era radar-defeating experiment by the Third Reich.

Note: that little tidbit should get the attention of anyone who follows the Nazi UFO/underground base in Antartica conspiracy theories, given that many of the same principles described in early anti-gravity theory were also present in the technology claimed present in the Eldridge and Montauk saga.

While in this author’s view, the cover up of the Effect is not much more than psyops disinformation, there is a significantly more complex cover up in play, on the cited Experiments (hereinafter, also capitalized to represent all such events), themselves. The intensity of the coverup has, in fact, more than kept pace with interest in the Effect, as more and more people take note. Restated, the more people become aware of the Effect, and especially if exploring possible ties to Experiments, someone was insuring that ‘the explanation’ is even more ‘available,’ in an attempt to dampen their fervor in trying to figure things out for themselves. It has transformed from mere disinformation, to full-blown cover-up dirty tricks and psyops.

Sorry, (Men in Black), but I’m rather impervious to such forms of artificial moisture.

Dirty tricks and psyops? As with all really well-done cover ups (i.e., Flight 800 shoot down, JFK assassinations, 9-11 false flag), the very facts and evidence behind the Experiment theories are being deliberately contaminated with sets of conflicting evidence and testimony. These are being established within various narratives to make it impossible for the average person to know if any of it, is true. This is augmented by being pointed out as disino-style straw man ‘debunking.’

For example, the actual location of the 1943 test is variously and additionally described in the effort, over time, as actually taking place in (and/or teleporting between) Philadelphia, New York, and Portsmouth/Norfolk, VA… all while the ship was allegedly actually at sea in a shake-down cruise. This is the hallmark of all good cover ups; alternative versions of the story, by means of fabricated, altered, or concealed evidence. One other clue which renders them suspected cover up efforts, is that collectively, each seems a de facto denial of the remarkable experiment results, altogether.

There was, in time, even a parallel Project Rainbow being run simultaneously by CIA and Lockheed, aimed at developing radar stealth technology, such as we see in the F111 fighter and other aircraft, today. Duplicate-sounding programs is another means of confusing and concealing facts from inquisitive minds, and it wouldn’t be the first such duplicate employed in the evolving saga. If there were no remarkable results in 1943, why so much effort to obscure with alternative versions of the tale? The effort over time drew in more and more, and wilder and wilder additional conspiracy theories completely unrelated to the original event… everything from mind control, abductions and child abuse, to government deals with intergalactic aliens and teleportation to Mars. Suddenly, it sounds more like TV’s Star Gate, than Twilight Zone.

Ironically, perhaps… despite the many attempts to confuse and defuse, has not quite worked out as intended. All those alternate versions can and have been argued by the faithful believers… as ALL being true, by virtue of the Experiments having created alternate realities — exactly why the Experiments are suspected as causing the alternate timelines of the Mandela Effect, in the first place. Thus… the legend grows with every twist and turn added, be it by coverup, or by daring to dig deeper, such as done by the earlier mentioned scientists seeking to verify validity of the claimed Experiment technology. Argh! How do we discover the truth in this vast sea of complex and contradictory information?

Not to worry; the show gives us roughly an hour’s script, within which the truth may yet be found…

 

Is the episode to be mere fiction, or based on fact?

Make no mistake: because of the extensive nature of the cover up, ‘alleged’ is the correct word for virtually anything online relating to the topic, thus far. Hopefully, this will change that, and make it easier to find one’s way through the distortions to the truth hidden within. Because, here and now, it becomes a matter for you to decide, based on new proofs, herein described. The good news is, the Mandela Effect itself becomes the key to the greater U.S.S. Eldridge saga… and vice versa, in mutually reinforcing ways. Both share newly discovered and consistent patterns which more than suggests Experiments indeed have a causal nature to the Effects. This will also lead to a plausible theory as to how teleportation may also indeed fit into and be part of the correct view of the entire episode. The Network Studio Executives, would be proud, and advertisers, pleased.

More astute followers of the Philadelphia theories know there is some evidence which alleges that Rainbow research quietly resumed in 1948, likely leading to renewed Experiments in 1960 at Brookhaven Laboratories, in central Long Island. Under the new codename of Phoenix (in time dubbed Phoenix I and II), it seems it may have continued almost yearly until 1976, under a US Air Force and Navy partnership. Next, they were relocated to Montauk Air Force Station, at the tip of Long Island, at what would become a largely underground complex known today as Camp Hero. Preparations for the move were underway as early as 1973, because of a need for a larger radar system which would make the top-secret research too obvious, at Brookhaven.

Note: True to form, for much of this period, CIA was running another Project Phoenix simultaneously with the US Army, in Vietnam; an assassination program from within which would evolve the two top people first put in charge of Homeland Security, once formed.

Like the Philadelphia Experiment, Montauk, and all related experiments were allegedly shut down in 1983 — after things went terribly wrong, and conclusively believed co-causal in the 1943 Eldridge event — not to mention the alleged teleportation of some kind of terribly powerful monster from another (world? dimension? time?). Remarkably telling, the Montauk monster release took place on the exact same date as the Philadelphia Experiment, exactly 40 years later… creating a time-tunnel, or sorts, between the two dates and locations. These events allegedly led to all experiments being shut down.

Between those two dates, however, more than a dozen different Experiment dates have variously been discussed among Web resources and books on topic. I selected the ten most compelling, and with success of early testing and by additional deduction, I have proposed a two other dates which I hoped could be shown valid by fitting into any observed patterns. They do fit. Technically, it was possible and even likely that experiments of some sort took place every year, often several times a year, post 1960 Brookhaven.

I also point to clues that Area 51 has for some time been operating equipment which fits the Rainbow~Montauk technical descriptions very closely, things evidenced with Google Earth’s 3-D building’s feature (not official; created by followers of the Area 51 mythos, generating and updating 3-D GE compatible constructs alleged to be based on rare photographs and eye-witness verbal descriptions, over time). Thus, it at least seems, experiments may have continued post 1983, as well, which may account for the bulk of Mandela’s death dates to be beyond the 1983 date, and as recent as 2013.

Google Earth: 37°14’4.04″N  115°48’16.60″W  3-D Buildings and Terrain turned on

 

Handed the script while on another project…

I did not set out to do any of this. I was aware of and have experienced the Mandela Effect, myself, both with respect to his Death, as well as other, less significant things of the ‘mind trick’ variety. The (cover up) ‘mind trick’ explanations typically involve words or spelling issues, such as names of things in media or pop culture; Chic-fil-A vs. Chick-fil-A, Sex in the City vs. Sex and the City, etc. These things have become strawmen easy for disinforming cover up efforts to ‘shoot down’ the Effect as mere memory recall errors playing tricks on our mind in some kind of mental placebo-or mass-hysteria tom foolery. Such explanations are themselves mind tricks, and work only because no one can come forward with hard proof in the form of an original date where an event or item can be shown to have been changed in our conciousness, as well as demonstrable factual proof beyond history’s official version.

Happily, such cases do exist.

My first discovery of such proofs, which led to finding others, came about because I was writing my autobiography (I am, after all, ‘semi-famous,’ if you didn’t know — 14M pages reference me or my works). I wanted the best accuracy I could manage with respect to various experiential details, especially if relating to truly famous people I have been involved with. That meant research, and one such item researched happened to regard legendary Olympic swimming record breaker, Mark Spitz. All I wanted to do was to verify the number of Medals he had already won when I first met him, a thing we spoke of, at the time. But what I found in addition, was that it couldn’t have happened, at all, if believing the current history timeline… it was some kind of time-travel paradox!

On December 29, 1963, just as the extra severe Winter blizzard that would pummel the central U.S. all they way to the Gulf Coast was starting to roar, I spent four days on a train trip to Texas, from Oregon. The storm covered most of the nation in deep, wind-driven snow, and the train indeed had to, at times, run with a snow-blowing engine ahead of it. Quite by chance, I was seated part of the way next to Olympic champion swimmer, Mark Spitz, only because the heating failed in several of the cars, and everyone was herded into the two cars with at least some heat, where seating options were limited. We chatted, both as ‘ice breaker,’ and to while the hours away in an unscheduled layover in Denver, while they addressed the heat, so that Denver passengers could board, and travel in warm safety.

I immediately knew who the fellow I shared a seat with was by his pictures in the newspaper, for having recently won four different medals in international pre-Olympic competition a few months earlier — the very details I sought to verify at Wikipedia, for my book. He confirmed it, himself; we talked specifically about that and related matters for some time… as the windows were frosted over and there was no scenery to enjoy. The reason for his trip, was related, something to do with training, and his goal to win Gold at the Olympics. He would do that, in time, winning more than anyone else, ever had, and I would follow his career with great interest, because of having met him.

TODAY, however, the official online history says he didn’t win his first medals until 1965, and that when he did, he was three years younger than I was in that same year. In our trip, he was a year OLDER, which meant he was born in 1945, instead of 1950, as officially so, today. That makes a five-year error in his birth date, and a two year error in his first Gold medals date, from 1963. It was impossible for me to have recognized him for medals he had yet to win, and I know when our trip was, the only time I’ve taken a train to Texas… as I was to live with my Aunt and Uncle while my parents worked through their divorce, and to finish my Senior year, there. I did graduate from Hardin-Jefferson High School in 1964, and then returned to Oregon, by air. The date of the trip was defined by Christmas school vacation, and such that my arrival date would allow quick enrollment in the 1964 school year, in Texas.

The paradox hit me hard. It led me to wonder what else in my life might suffer the Effect. I quickly researched the details in other matters for which dates could be verified. I indeed encountered two other examples for which I was able to know the original date because of personal experiences, and the current timeline historical date, both turning out to be mutually exclusive and yet paradoxically so. These are recounted fully in the linked (at post bottom) Study material, which is the ultimate proof, as herein referenced… validating the Experiments, the Effect, and causality.

 

The plot thickens…

But documenting these would not be enough; my personal experiences cannot be well proven to a Doubting Thomas; it could be dismissed as something made up, or misremembered. I still needed things I could prove with hard evidence, rather than personal testimony, alone. And that’s when I started to investigate Mandela’s death in hopes of finding such proofs. In the attempt, I was able to prove for once and for all, that he did not die twice, as believed.

What?

No. There is, in fact, rather convincing evidence which seems to show that he has died four times, one of which, was a murder. Most people recall his earlier death as being in the early 80s, with no way to prove it. Others in the mid 80’s, with no proof, some recalling it was a murder. A few remember 1991, with no evidence. His current timeline death, is cited as Dec 5, 2013. But now, various proofs do exist which would seem to validate everyone’s memory, and refute all the faulty memory or hysteria mind-trick ‘explanations’ which serve to cover up the truth. But there are two additional things true about them. For one, each has an inherent problem which would certainly seem to neutralize them as evidence. But the other, is that the very nature of that problem is, under the theory, itself called into question as to actual meaning.

In fact, if the other proofs revealed herein, were correct, they would HAVE to be the way they are, and serve as their own kind of ‘reverse logic proofs’ in an ironic manner. They validate on the surface, self-repudiate on close examination, and self-validate when fully informed, yet again. These verifications and proofs for each, are briefly described as follows, in the order in which I found them, but the repudiation and self-validation will be covered later in this work, where it will be easier and make more sense:

•  A 1983 high-school report about Mandela helps fix a death date of March 11, 1983. The Report was assigned because of his Death, that year, and the aftermath of political upheaval it had promoted. As of yet, there are no photographs, and arguably, such would be easy to fake, and the source is easily discounted as unathoritative; several online comments by the student, now an adult. These were in chat rooms, for which a link is pointless. The date, however, will check out, in the Study, and is therefore included.

•  Next, a South African periodical, published Oct 1, 1991, includes remarking about his 1991 death, and the reader can verify, directly at Google Books. The small book is a collection of S.A. student English language writings published serially each year. Subsequent editions, therefore, no longer have the reference, a matter also verifiable towards the bottom of the same mentioned link, where other years are also listed. Be aware that Google Books for some reasons includes material from both the 1990 and 1991 editions when searching, and does not enable the user to scan up and down. I have, however, obtained the full text, after a great deal of effort, and can confirm it comes from the 1991 edition.

•  Finally, a follow-up Northwest Herald newspaper story via a cell phone streaming service was captured in screen shots which reveal Mandela’s murder in 1985. There are several online images found in chat rooms and the like, and a very short and creepy YouTube. This has been verified by a reputable national newspaper historical repository (newspapers.com). Access requires a paid subscription to the service, it being intended for serious researchers. Again, I have managed to access the full article, and the image is legitimate. The video shows multiple views at various scroll points within the document, to reveal more details… but offers no explanations, just creepy music and unpleasant visual effects. This is the best image taken from it, to save you the grief.

The show is ready to air… cue music; stand by, Mr. Serling…

I therefore set about to catalog all dates into a Study group spreadsheet, with calculations as to years between dates, to look for patterns. Along with that, a duplicate Control group based on dates randomly created by Excel’s randbetween Function was used to look for similarities in any evolved patterns found in the Study, which would prove or disprove the notion of coincidences in said patterns. And Study patterns did evolve, eight different observable patterns***, in fact… and the Control group had not one useful pattern. In fact, where some patterns did not quite seem to fit, a closer look revealed spreadsheet or data typo errors. In the end, the entire effort, from establishing dates by research to creation of the spreadsheets, was repeated and double checked countless times.

The principal goal, of course, was to not only to prove the Effect was real, but to attempt to verify the causal source. As mentioned, the Experiments were the principal suspects, but also, there were secondary suspects in CERN experiments, and in experiments involving Artificial Intelligence… specifically, the qubit computer systems by D-Wave. Unfortunately, for such suspects, very little information is known about their dates of operation.*** Regardless, findings were telling, and useful, and should lead the reader to wish to delve into the details of the Study effort, which can be done at the links beneath the findings.

 

Preview of Findings

 

Findings quite contrary to the Control Group were examined, broken into the following topical descriptions of individual findings, as taken directly from the Study. Each of which contributes to the validity of the fuller hypothesis by establishing patterns and/or relationships which also may provide clues as to the how and why of causality. Unfamiliar terms are definable characteristics of the resulting patterns, as discovered.

Bookends have Repeating Numbers: the key-most Bookends all share common separations in years between dates (repetitive numbers), which reveal patterns;

Midpoint Self-Pointing Patterns: while 1963 is an obvious Midpoint, which itself thereby becomes bookends to two halves of the greater Eldridge event years, there are many other Midpoints, select of which form circular self-pointing patterns between them.

Path-Finding Pointers: universally, the repetitive numbers in the Study group become Pointers which establish paths to the same two destination years, which in turn, point to each other;

Midpoints Pointers reveal causality clues: these clues can be visually represented as kind of ‘genetic code’ to understanding how an Midpoint Experiment or Effect might cause an original event date to shift to its current official event date;

Experiment dates vs. non Experiment dates: there is a marked difference between dates with and without Experiments. The one exception;

Pointers different between forward and backward time shifts: each forward shift shares a specific Pointer commonality, while the only backward shift has a unique and exclusive Pointer difference;

Precise dating patterns: when the full Effects and Experiment dates are known, they reveal exactly one year, or one year plus six months between, leading to a new hypothesis regarding the ‘mechanics’ of Experiment timeline shifts which result.

 

The results of the findings led to the following conclusions:

  • Key Event dates which lay entirely within the range of known Experiments, and which fall on the same dates as Experiements, establish a common pattern between them, implying a causal relationship may exist;
  • All other Event dates, and Experiment dates, not sharing a common dating, still do exhibit the same patterns, providing high confidence in a causal relationship;
  • Because AI and CERN experiment dates cannot be known, neither can neither be proven or disproven as being causal to either the Event or Death dates evaluated, at this time;
  • While the dating of Mandela’s deaths lay outside of the known Experiment dates, several of the patterns nonetheless exist in their dating, and relate them to the Experiments usefully, and yet, leave room to suspect that other forces may also be causal, such as CERN, or AI, or perhaps continued experiments elsewhere, such as at Area 51;
  • No patterns of like kind were observed in the randomized Control Group, validating the Study patterns as non coincidental or random happenstance, in nature;
  • The patterns observed, do collectively and mutually validate one-another as strong indicators of the overall Findings’ validity;
  • The patterns allowed confirmation of suspected Experiment dates for Brookhaven 6 (1968), and 8 (1972), as fitting the patterns, when added to the Study group for comparison, and refuted other dates born of ‘what if’ theories developed along the way;
  • The patterns revealed a difference in a detail of their nature between Events shifted forward in time, compared to Events shifted backwards in time, thereby providing clues potentially useful in eventual understanding of how the distance and length of time shifts are established;
  • The patterns observed also revealed a curiosity; in that Event pair (original and current timeline) dates are, with one curious exception, always exactly apart by (n) years, to the day, or (n) years + six months, exactly to the day, resulting in additional theories about causality, as described in the Study;
  • Therefore, the Mandela Effect is demonstrated to be real, and its cause is demonstrated to be due the suspected Experiments.

 

Self-repudiation and yet also self-validating?

If one reviews the Study and finds it compelling, the problems mentioned within the details of the Mandela Death ‘proofs,’ can be understood in ways which render self-repudiation moot. The problems in the proofs are individually unique, and will prove fascinating, in the manner in which they both self-repudiate, and yet, self-validate. The self-validation, which neutralizes the repudiation, remains the same for all, and will be offered in the closing paragraphs. In the end, however, it is also true that the Mandela deaths have no impact on the Study, as they fall outside of the suspect Experiments dating, or fall on dates of such experiments; removing them altogether from consideration does not alter the Study findings in any consequential way. The same Findings would still be similarly arrived at, with the same level of confidence.

The student’s chat room comments about his homework papers are self repudiating simply because it is (thus far) impossible to reach him, to seek a copy of his paperwork from high school days, and because it would be easy to fake hand or type-written school report materials. People fake things on the Web constantly, thinking it great sport to be so ‘clever,’ to presume a hoodwinking lie somehow equates to intelligence.

The book quote proves problematic, because once you acquire the full text of the three page article, we learn that it is part of a fictional speech, entitled, ‘His Closing Speech.’ Within it, many historical events are referenced, several with precise dates, and all but two prove to be completely accurate. I’m not including Mandela’s death date in either category, for the moment, and the two which do not seem accurate, have the potential of being accurate, as each may be simply a different way to reference events which did take place, but are described in different terms than perhaps commonly used in the day, by locals, as opposed to the official national/international narratives. The paper, however, starts with the sentence “In our minds, let’s go ahead exactly one year in time…” After a short  soliloquy, the ‘speech’ begins, a speech by someone revealed in the last paragraph, to be a judge, about to pass sentence on former South African President William de Klerk, for crimes of apartheid. Also, in the closing lines, we get a date which, if the ‘exactly one year in time’ is explicitly correct, indicates that the article was written or presented on 15, March, 1991. But the piece, looking back from the ‘future’ on 23, July, 1991. This self-repudiates the date as being historically correct.

The newspaper article, once you acquire the full article, self-repudiates, because when you have the full sentence, you see that well placed commas reveal that Nelson Mandela was not among those found murdered on the road, but some other unfortunate anti-apartheid activist, and friends. It reads, emphasis added: “UDF organizer Matthew Goniwe, hailed by blacks as possibly the most important dissident leader since jailed African National Congress President Nelson Mandela, was found murdered along a rural road in June.” False grammar assumptions killed Nelson Mandela, it seems. Whoever originally posted this find, is likely one of those ‘intelligent’ liars, seeking to deliberately deceive.

How do these self-repair their repudiation? I’ll start my explanation by repeating something I heard a famous scientist say, once. My wife and I, when I was a successful business man able to afford the $250 tickets, would attend a series of lectures by famous scientists and other brilliant minds in various fields of endeavor… something akin to Ted Talks, today. After each, there was a reception party, and these were variously attended by other scientists and minds of like kind, giving us a chance to mingle among them and engage in stimulating conversations. One such attendee, a physics professor, said something along the lines of this: “All of nature, as describable in physics and other fields of science, contains the very clues of its own explanation for being, hidden in plain sight, awaiting only the ingenuity of Man and his ability to test and measure, to discover the truth of it.” The guest speaker, himself a Physicist, as I recall, agreed.

To me, this means that if there is an alternate and paradoxical timeline created by some aberration, there will be some form of a clue within the paradox, itself, which can lead one to the discovery, and proof of it. This perfectly fits with the general view, that in order for a timeline shift to take place, the very nature of the resulting paradox MUST alter all documents which reference any historically noted differences between the two timelines. It must do so in some way which both accounts for them, and yet refutes the differences. Therefore, it would make perfect sense that some aspects of the former, would be contained, and yet be altered in alternative accountings of the later. This means, that if the Study as linked, herein, adequately proves the basic contention that the Mandela Effect dates are not random in nature, but establish patterns which validate them in some way which simultaneously ties them to, and validates the causal hypothesis… then the very existence of self-repudiating proofs floating to the surface, self validates them once more, and neutralizes the repudiation. I am satisfied that it does, pending someone proving otherwise.

In summary, I am putting forth the hypothesis that these remain clues to the Mandela Effect which bolster people’s memories usefully. But regardless of if that be correct, or not, it does not alter the findings of the Study: the Effect is real, there are multiple timelines, and the cause is identified.

But like all episodes of the Twilight Zone… not every viewer walks away with the same appreciation of the presentation. So, if you have never experienced anything along the lines of the Mandela Effect, and/or otherwise remain unconvinced… you may prefer to watch Outer Limits, instead, where the Matrix tells you, “We are controlling transmission…” and admonishes you not to adjust your set, because the Matrix wants you to believe in and follow it, and not think for or believe in yourself.

 

 

 

COVID Advice for Stalking Victims


Many victims of stalking are already socially isolated, so in many respects, the current virus-imposed ‘social distancing’ situation can be a benefit to them, as well as a threat. There are ways to tip the balance, to become a survivor of both targeting, and COVID19…

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Mar, 25, 2020, from the Left Coast of America, socially distant from everyone

copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

Stalking victims are no stranger to the topic of conspiracies, and boy, are there a lot of conspiracy theories surrounding the COVID19 virus. Among them are themes portending a Global New World Order takeover, global population reduction, martial law, forced vaccination and disarming of citizens, international intrigues and threats of war, and much, much more. Some of that, unfortunately, is backed up by legitimate fact-based concerns, but the bulk of it is conjecture, at best. I’ve written as much in a blog on that topic, already. While I believe it is good to be wary and keep an eye on such things, I also try to practice what God teaches, which is to live for today, plan for tomorrow, and hope for the future. It is especially important advice for a stalking victim who is severely impacted.

Tricky that, and far too easy to fail in the trying (I must admit to such failure). Trickier even more, perhaps, is putting that advice into practical terms specific to the virus situation we all find ourselves in, today, and its importance in relation to stalking concerns. Clearly, we need to focus on what we know will help us through, TODAY, here and now, and better prepare us for any possible Tomorrow, that we may hope for a better Future, thereby. And our ‘today’ was already in a not-too-great a condition, as targeting survivors.

I like that word, survivors. Use it often, when you speak of yourself.

 

Practical matters, matter

Being stuck at home in a defensive posture is nothing new to individuals severely impacted by malicious targeting. Their incomes have already been devastated, often by an inability to earn and income because of their stalking, and just as often, by deliberate sabotage of their financial underpinnings in various dirty tricks. So when the government talks about a relief check in the mail, they may be taking hope. But there are caveats not commonly being mentioned in the fake news of the day, who are still focused on pushing virus and political fears ever higher. They are not our friends of bygone days of actual journalism.

For one thing, a simple one sentence mention in passing on one radio interview, casually mentioned that the checks would only be sent to persons who had filed a 2018 tax return, on the basis of that return’s indication of income. Most Tis are on some form of limited fixed income such that they don’t need to file taxes. The radio indicated that persons who were on SS/Dissability, or ‘off the grid’ with respect to taxes, would not be seeing checks. It was suggested that filing a late return, even if no taxes due, might set the stage for relief, if showing an income in need of ‘relief’ due to negative virus impacts upon the nation’s economy.

If any income could be shown at all, above and beyond the fixed, it could make a big difference. Better still, if it was a such that it would have resulted in taxes, but for the deductions. Self-employed incomes, for instance, might have depreciation allowances and business expenses which collectively negate the profits derived (you are taxed only on your net gains).  Personal deductions, either the standard or itemized variety, can also offset such income and eliminate actual tax liability. If you have children, the Earned Income Credit may help you to gain actual ‘Tax refunds’ even if you paid no taxes, at all. Keep in mind that I’m no tax consultant; due diligence is advised, which may mean relying upon a professional.

Tactical matters, matter

Stalkers are people, too, and if their efforts involve going out in public in order to harass a stalking victim, they are at increased risk of contracting COVID 19, themselves. That would certainly take them out of the picture for at least awhile, and possibly permanently. But just the fear of such risks may also inhibit at least some of their actions aimed at their victims. How much more likely might they be to keep their distance, if you began exhibiting symptoms, yourself? It’s easy to fake a cough, and complain about a fever, and the like. Some form of public complaint or warning might be in order, even if just a social media mention. Guarantee you, your social media friends include your stalker enemy in disguise, and they read everything you post very carefully…

Stalking is a ‘game’ that two can play. There is a stark difference between being a victim who has only the option of reflexive responses born of victim recoil, and who is doing exactly what their assailants want them to do, and one who elects to take charge of their situation and employ both defensive and offensive tactics, and become a survivor. I have written extensively on this in my books, and in various blog posts. While all situational assessments can vary, and establish different tactical considerations, there is much which remains the same across the board. For those who do not have my books, a less detailed summary of the most useful advice can be found here: https://proparanoid.wordpress.com/2016/10/30/ti-defense-30-tips-to-help-fight-back/

As always, I still remain available for additional advice at proparanoidgroup at gmail com, where I offer a free Helps Kit and can answer simple direct generic questions. I also offer a new Skype-based personal dialog service. That is a for-fee service, 100% of which goes to the Free Will Society to aid stalking victims, as does all sales of my ebooks. More recently, I have created a ‘shopping list‘ of suggested Amazon items which represent various stalking defensive/offensive solutions. While I selected items I would find very good for the purpose, they are not necessarily the perfect choice for everyone, but if taken as generic suggestion, one can compare with alternatives, and choose wisely. Neither is it specifically meant to advise using Amazon to purchase. However, I learned that if you apply for the ‘Amazon card,’ and spend $800 or more with them in a single purchase, you get 12 months same as cash terms. That made a difference, for me, and might for you, if the offer is still valid.

Not on that list, is firearms. My books address that topic with some caution, and caution is indeed due. My position for stalking victims is, that the nature of the targeting (methods employed) may or may not warrant a weapon for self defense. There is a fine line between deterrence of physical assault benefits, and creating a risk by virtue of a gun in one’s possession. Without proper care and knowledge, and skill in use (practice), the liability and inherent risks aspect can far outweigh the tactical protection it is supposed to represent, especially because stalking methods may involve a way to make the possession itself a weapon against you. For instance, the new unconstitutional and draconian Red Flag and concealed carry laws could end up getting you in dutch with Police, and see  your weapon confiscated based on nothing more than an anonymous complaint of ‘brandishing.’ And, it is absolutely true that someone who is depressed or under tremendous emotional/mental strain due to (anything, including stalking), may not be the best person to have access to a gun; a bad decision or moment could prove a terrible disaster, by inappropriate use.

Big lines at gun shops right now, and for good reason

But the virus situation poses a whole new concern and reason for needing protection. As we have already seen with shortages, the potential for violence is often triggered by things as simple as toilet paper. If the future is a long-term shut down of America and beyond, the risk of civil unrest, military takeover, revolution, or even invasion may not end up being far-fetched ideas. If food supplies or utility systems are shut down and/or rationed, roving gangs of looters and criminals armed to the teeth will come. Would you be ready and able to repel them, or end up just another red stain on the ground and a statistic? I at least advise one to investigate the possibility of gun ownership. Visit a gun store and talk with their staff for suggestions on what might make a good choice, and then find a shooting range which rents guns on premise, and take a firearms safety course which lets you experience the weapon, and overcome any fears of safe handling. Make sure that, in all of that, you have a clear understanding of your gun rights and gun laws in your State. THEN, and only then, will you be armed with the knowledge needed to better decide.

It is important that you act sooner, rather than later. Some local governments are already attempting to completely shut down access to firearms and munitions, and that alone, is a bad sign. When the government tells you you don’t need or can’t have a gun, that is exactly when and why you need one. Talk to your Sheriff’s Department or local Police (non emergency phone number), about shooting ranges and safety programs they may offer, sponsor, or recommend. Most Sheriffs support the 2nd Amendment, and some offer Auxiliary Police/Deputy programs where you are given access to AR weapons and training, and positioned to be available as reserve support in a crisis. Being called does not mean you must report, but if the SHTF, standing together against tyranny or unrest is exactly what will be needed to end the threat.

There are also community ride-along programs. While many TI’s avoid Police for having found them problematic in many unpleasant ways, getting to know as many local Officers as possible is one way to negate or minimize any such concerns. And, it can prepare you for a better response in a bad situation. It is at least something to consider.

 

Logistical matters, matter

While it is possible that this crises will turn the corner and the threat level be reduced to ‘normal,’ in a matter of a few weeks, the potential for long-term issues is very real. I urge everyone, not just stalking victims, to grow their critical supply reserves to ‘Prepper’ levels. I, for instance, have a two week supply of perishables (things which expire or go stale quickly), which I can do without, if needed, backed up with a 30 day supply of non perishable foods (canned and dry foods, mixes, etc.), itself backed up by a 90 day supply of actual Prepper foods which can be stored for years. I regularly rob from the backup materials at both levels, and replace with fresh in a rotation method so that no supply ever reaches an point where the shelf-life is exceeded. I mean, what is the Prepper movement about, if not survival?

Visit this link for great advice on Prepper shopping and as a gateway to the wide-world of Prepping, in general

I would normally need to visit the store once a week. I can now easily avoid going at all, for perhaps 120 days. However, one would not wish to attempt achieving or replacing such supply levels in a single shopping effort, because that might be considered as ‘hording,’ and I expect there will in time (already so in some communities) when there will be keen eyes and a harsh responses by government, if reported. So I suggest, and am myself deliberately increasing normal purchase levels and visits before the virus spread is truly pandemic in scope, and and plan on tapering off as I ‘get ahead’ of the consumption rate. You can buy as if for a family of five, even if living alone, and double down even on that, without raising eyebrows. You might even find case lot sales, and there is no reason you can’t hit multiple stores at the same time, or go back every few days. Of course, finances can become part of the equation, which is why that relief check could be important.

Transportation issues can be tricky. I’ve learned that a decent bicycle can be more useful than a car, and far cheaper. I use an electric bike, which helps with my handicap and age concerns. It allows me, a 74 year old who was at risk of his legs being amputated, to peddle 20 miles an hour (and save my legs from that threat, by restoring blood circulation). With a basket, I can haul away as many as 12 bags of groceries. I have a giant bag which fits my basket, which is waterproof, and insulated for both hot and cold items, simultaneously. If you would like to explore such a possibility, let me know (at the above email) and I can turn you onto learning more, with a way to save $50 on one of the best but least expensive (sold direct from factory, cutting out middle men) bikes on the market… with a lot of models to choose from.

Tactically, speaking, once more… a TI is less likely to be stalked by car, if on a bike of some sort; a car cannot go that slow, and if a stalker elects a bike, they will stand out like a sore thumb, easier to spot and deal with. IN FACT, I have an idea which could be managed through the Free Will Society, which would allow almost anyone reading this to earn extra money during the ‘shutdown’ while also performing a needed public service which can help reduce the virus threat. If not too handicapped or aged to use a bike (the electric can be used without peddling, at all — it has a throttle), it has the potential to be as lucrative as, say, a Uber driver opportunity, with like selectivity as to how much and when you choose to work. Better still, it will help fund the Free Will Society at the same time. If that sounds interesting, contact me for exploratory dialog.

 

Medical matters, matter

There is a lot more information out there on COVID19 than can be assimilated, and worse, most of it is NOT in a useful form. If you have a simple question, finding the answer is a minefield full of background material, political correctness and maneuvering, legally and medically obscure wording, historical data facts and figures, and fear mongering… making it extremely hard to find an answer. When I had symptoms described in MSM, I naturally wanted some more details… but after six of the most logical Web sites left me in a daze, it turned out that the best medical answers were found elsewhere, and revealed my symptoms were not at all a concern. Ironically, it happened to be a stalking victim and follower of the Free Will Society who turned me on to it, and provided a link I find very useful. It is a blog post citing/linking to an actual medical practitioner ale to speak in lay terms and to provide simple graphics for at a glance understanding. Take note, CDC, your slip is showing.

The real problem in a given targeted individual’s situation, is that every symptom of targeting is also a symptom of a possible medical condition or health issue. That’s useful to stalkers, because they know they can inflict such woes upon their victim, any attempt at getting help results in an easy dismissal of concerns: “You should consult a Doctor, about that.” And indeed, you SHOULD, because it might just be truly a medical issue, in which case it can be dealt with… far more easily than trying to solve targeting, we would hope. You need that clean bill of health, before asking anyone for help with stalking related symptoms.

So the same thing is true with COVID19 symptoms. You not only want to make sure that is or is not what it represents… but if it does not, to make certain it is not a symptom resulting from targeting. So a good Doctor relationship, now, more than ever, is important. Unfortunately, many stalking victims talk about reasons they cannot find or work with their Doctor. In my first ‘how-to’ book on personal privacy and security, I talk about how to find a good professional for any need (Doctor, Lawyer, etc.). Pretty simple: I suggest looking for someone who is relatively recent to the trade, with almost brand-new credentials hanging on their wall. They should be of a minority race, such as Hispanic or Asian, perhaps a woman. 

Such persons are less likely to be tainted or jaded by the system, and more eager to adhere to high moral/ethical standards. This makes them more resistant to corrupting forces, and they will be hungry for clients, and more willing to cater to their needs, than someone who has more clients than they can handle, and who has been hammered by pressures and problems from all sides for decades on end. 

 

Political matters, don’t matter

At least, they should not. It is up to you and me to insure that is the case, because political division is just another means of targeting for control. Again, I admit failure in that, myself (sigh). While we should all agree to stand firm against the march of the globalist agenda (often behind organized stalking in one way or another), and though that often filters down to national and local politics, party-line politics should never come between a survivor and an otherwise would-be ally, such as another survivor or a possible helpmate. Don’t play that game… your plate is already full with enough battles for a lifetime… and likely, you’ve already had a lifetime’s worth of it. Enough!

Pandemic Conspiracy? Major CEOs Stepping Down en Mass


What does it mean when officials and others know they need a mass quarantine site for the coronavirus before China even admitted it had suffered an outbreak? What does it mean when synchronously to the virus’ growth, hundreds of CEO’s all resign in record numbers and cash in their chips? It means that a number of old NWO conspiracy theories seem to be coming true right before our eyes… and, it means prior knowledge.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Mar, 12, 2020, from the Left Coast of America, not far enough from Microsoft

copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to this original posting. WARNING: as with Alex Jones, the fascists at Facebook and elsewhere have elected to shadow ban this blog post as it does not agree with their preferred fake news narratives. 
 
TELLING UPDATE: Mar 26, 2020: $100M CONFLICT OF INTEREST within the government threatens the lives of millions! Bill Gates and his Foundation’s push for Vaccines (tied to population reduction, according to him) has created a ‘life and death’ struggle between Donald Trump and top Federal health Agency Director, Dr. Anthony Fauci, head of NIAID (National Institute for Allergies and Infectious Disease), under NIH (National Institute of Health) — making him a public spokesperson within the Trump Admindistation. That has resulted in a heated fight between Trump and Fauci: Trump is trying to avoid the prolonged wait and questionable outlook for a vaccine program, and seeking to slow the growth of COVID19 infections and deaths by early use of HydroxyQinine, already showing great promise and effectiveness it testing against Corona. The Conflict of Interest stems from a 100 million dollar commitment by the Bill and Melinda Gates Foundation to fund a $100 million dollar investment through Fauci at NAID for pushing through the agency’s test program for the Gates vaccine… for a vaccine developed in a matter of months under other investments by the Foundation around the World, instead of several years, as is normal. The speed of development is cause for concern regarding its safety, as well as representing potential prior knowledge and possible work in advance of or even tied to the release of COVID19. To be clear, the money did not go directly to Fauci, but to his Agency. However, it boosted Fauci’s position of prestige and power significantly, and portends a lucrative offers once he leaves his government post, logically by the very Gate’s invested firm, Moderna, which was the developer of the Vaccine. The details are revealed throughout this National File News linkMAJOR UPDATE to the Update: sounding like a spy novel, a January DOJ arrest holds potential ties to Wuhan Outbreak, Bill and Melinda Gates Foundation, what looks like a Chinese Spy Ring, direct links between Harvard University’s Dr. Charles Lieber and his research, there, to a Wuhan University. It is too involved to fully describe here, save a couple of key points: PLEASE review the official DOJ press release (a great read), which MSM HAS NOT BOTHERED TO MENTION.  Key points: the Gate’s Foundation’s Scientific Advisory Committee includes Dr. Margaret Hamburg, who simultaneously is a Member of Harvard’s Global Advisory Council, and the Gate’s Foundation Global Health Scientific Advisory Committee, enabling sway in research decisions at Harvard; Dr. Lieber was receiving $50K a month, plus $158K living expenses, and $1.5M from the Wuhan University to establish a research lab at the University, which mirrors his own lab at Harvard; at Harvard, two of Lieber’s lab assistants were also arrested, both Chinese nationals, one a Lieutenant serving in the Red Army, and the other caught trying to leave the country with 21 vials of biological samples. It is important to note, that other than the Gates Foundation ties to Harvard, there is at yet no concrete tie established to Dr. Leiber or his research, or to the Corona Virus outbreak, other than the Wuhan relationship.  
 
IMPORTANT UPDATE: Mar 16, 2020: Bill Gates resigns from Microsoft Board of Directors (he had been on the Board since 2000, when he resigned as CEO in the aftermath of Anti-Trust troubles). There is a lot of misinformation about the Bill Gates-Coronavirus ‘conspiracy,’ and a lot of the usual fake news suspects are working hard to discredit them with straw man criticism over relatively mild datapoint errors. Here are the facts, all linked to authoritative sources, which are no less troublesome than those slightly incorrect in the ‘theory.’ This update, like the post itself, includes NEW information which underscores any reason for concern. The Coronavirus (original flavor) was patented (Pat #10,130,701 Nov, 20, 2018, nearly one year before the first outbreak in China in December) by the Pirbright Institute, in U.K., funded in part  by the Bill and Melinda Gates Foundation. Politifact and others claim this false and dismiss the entire ‘theory’ on the basis the Gates Foundation did not fund the patent process (true, but they did fund the company). ***  Among other efforts, a vaccine for the current version of the virus is being developed by an international coalition of firms, called CEPI (Coalition for Epidemic Preparedness Inovations), established by the Bill and Melinda Gates Foundation. CEPI participants start with Inovio Pharmaceuticals (San Diego), funded in part by the Gates Foundation, along with Wistar Institute (Philadelphia), funded in part by Bill and Melinda Gates Foundation, as well as Twist Biosciences, funded by CEPI (Gates Foundations), and others. CEPI will produce the first COVID-19 vaccine through VGX Institute, a subsidiary of GeneOne Life Science (San Diego), funded under CEPI (Gates Foundation) funding, it also being true that Microsoft has purchased 10 million DNA gene strands from GeneOne in an effort to explore DNA memory concepts.  ***  In addition to Grant funding, the Gates Foundation also buys stock in over 100 biomedicine firms, most of which involve virus/vaccine research, and genetics. In other words, they are also stockholders (9% typically). This appears to include CEPI partners such as Inovio, and countless others not directly part of CEPI, such as Novartis.  ***   Finally, it appears the Bill is poised to take personal credit for rescuing China (and the World), and he’s already been thanked by President Xi. At the worst, this is a smoking gun. At the least, it is a program sheet (you can’t tell the players without a program) useful in search for the truth, which this post tries to help pin down.  ***  Meanwhile, my entire blog site has been banned by Facistbook. So, if you wish to share, there, or in any other leftist social media, you will likely have to tell people to “go to proparanoid . wordpress . com > My Posts > Chronological, and scan down for pandemic conspiracy”
 

An old conspiracy theory seems to be coming true

Clyde Lewis (Ground Zero radio show) some years back was a guest on Jessie Ventura’s conspiracy TV show, the principal message being that IF AND WHEN the New World Order were to make its final takeover move for a one-world government, Clyde’s view was that the NWO Elite would cash in their chips and go underground, while the SHTF scenario unfolded and destroyed lives (literally and figuratively), government’s ability to function at any level, cities burned or were destroyed by civil unrest/war/terrorism, and civilization’s infrastructures were rendered useless (a post-apocalyptic stone age).

Speaking about this on his (archived here, by tomorrow late) show, tonight, a Ground Zero caller then informed Clyde that there were massive CEO step-downs taking place, listing several, all synchronous with the virus ills as they unfold. TURNS OUT IT IS TRUE. In January, alone, a record number of 219 CEOs have resigned their posts (that’s roughly double 2016 figures), giving a wide variety of reasons, some number of which were malfeasance of one sort or another, or poor performance — but mostly ‘personal reasons.’ The trend can be traced back to December of last year, when the Virus, which many sources report may be an intentional bioweapon release (a zoonotic animal virus genetically modified to allow humans to contract it, and to render existing vaccines useless — often race specific, i.e., one targeting Asians as being genetically more likely to contract it, than say, Blacks). The trend continues, and it may also explain why the stock market seems to be tanking (perhaps it isn’t over reaction to the virus, after all):

BIG Companies in ALL Industry Sectors, both nationally and globally: Retail, Mfg, Oil, Web, Banking, Communications, Education, etc., etc. Examples: IBM, Chevron, T-Mobile, Nike, Credit Suisse, Master Card, Alphabet (Google/Youtube), Boeing, MGM, and of specific note: the Gates Foundation. With months yet to go as the virus grows in impact, Amazon’s CEO, Jeff Bezos, is already rumored to be on the chopping block, and a long list of retailers are already in the lists, below: 

Note: take care. Due to search engine foibles, some may be misidentified as to the year… you just have to use the link if the date does not appear within the link/description, to learn if correct, or not.

CEO step-downs December 2019 

December: Virus starts quietly in China, evidence of foreknowledge in Washington State*  (pages and pages)

CEO step-downs January 2020      

January: Virus first publicly announced by China: 219 CEOs step down   (many more pages)

CEO step-downs February 2020   

February: Virus makes inroads in US and elsewhere  (even more pages)

CEO step-downs March 2020        

March: Virus officially Pandemic (and the most pages, yet, and the month is not even half finished. In fact, at the rate, March will  be four times what January was… roughly 800 plus CEOs)

*As revealed by me in an earlier social media post: in early March, a Lars Larson radio interview with a government official revealed foreknowledge. Washington State, home of Bill Gates, took actions beginning in late December intending to result in purchase of a Hotel with the specific intent of housing coronavirus invected persons in quarantine. China had yet to reveal the virus as a serious threat. Bill Gates is the father of Eugenics population reduction (Eugenics is a NWO population-reduction invention and goal, especially for ‘useless eaters’ in third-world countries) via vaccination programs… which means something in the vaccines impacts on birth and/or death rates… which is a very ‘soft kill’ form of a Final Solution. 

Eugenics, easily seen as largely being a philosophical justification for racial social engineering, lay behind the Nazi extermination of Jews, mentally ill, and terminally ill, and was originally espoused. It did not start, there, getting its original seed from the Harriman (Harriman and Bush banking, of the Presidential Bushes), Carnegie, and Rockefeller Foundations. The Bill and Melinda Gates Foundation, in similar manner, supports Eugenics through hundreds of millions donated to soft kill abortion programs which originally and principally targets uneducated Blacks and other minorities. This includes Planned Parenthood ($71M by 2013) and Marie Stopes International ($41M in 2012). Coming forward, another $375M for such programs was announced in 2017, and that is just a glimpse; not all such spending is overtly public. Naturally, the Gates are also funding research into vaccines, and it would not surprise me to hear that the coronavirus vaccine turns out to be from one of his invested research firms/institutions. Watch out that the cure does not kill you or your offspring.

Note: Eugenics has a cousin, btw… and it is called Transhumanism, which is the engineering of humans to be ‘better than made by God.’ Of course, the NWO does not believe in God, unless his name is Baal, or similar.

The official Lars spoke with, btw, was Dana Ralph, the Mayor of Kent, Washington, who was upset to find out the Hotel to be purchased was to be in their town… without any advance warning by the State. You can imagine the concern at having a concentration of infected persons being imported into your community without so much as a mention. In outreach to the State’s Health Division and the Governor’s Office, she was told that the ‘reason’ they were not told, was to prevent the real estate price from going up… which hardly washes; prices are set with the Realtors, and it’s not exactly like there would be a bidding war for quarantine space. But she also learned while State officials hemmed and hawed at her protest, that the State had started the process more than two months earlier, which put it in late December, well before ANYONE could know there would be such a need… unless they had foreknowledge.

 

Cashing In?

When a CEO steps down, there is usually a fat severance package, often termed a Golden Parachute, which can run into the tens or hundreds of millions (cashing in of chips), AND, they are free to sell their stock and stock options back to the company, often at a guaranteed high value, irrespective of current stock dives… which indeed began dropping once the virus was known internationally. That’s a lot of chips, and once cashed, the former exec no longer needs to care about what happens to the stock market, the company, or the financial viability of any currency… or country. 

As for going underground, it would not take too many chips to build a well-stocked and comfortable underground ‘home’ good for several months or years, if needed, complete with dedicated communications to fellow Globalists. At some point, after the smoke clears (literally and figuratively), the super-rich emerge, their wealth the only ones in tact, establishing them as the new global oligarchy, a one-world government promising to restore things, just as soon as people swear allegiance to the Antichrist. So the theory goes, and I do subscribe.

Gates, again, along with a long list of other international Globalist elite super rich, have also established an underground vault of non GMO seeds for every kind of crop, flora, and vegetation. It’s buried 400 feet into the ice-covered earth in the Arctic Svalbard islands, compete with a very serious automated security system. Nah… they don’t have foreknowledge of any SHTF scenario… do they?

 

More on Transhumanism and Eugenics: Proparanoid’s Transhumanism Page – Home | Facebook

What the NWO flag might look like: The Future Flag of the New World Order?

 

 

Netflix, Microsoft, Google, Playstation: Poised for Mind Control Psyops?


When you marry entertainment with AI guided user interaction via Web connectivity, with its inherent user tracking abilities, you have the formula for psychological profiling and manipulation, including mind control. Netflix pioneered such a tool in movies with some scary evidence of just such use, and now, Google, Microsoft, and Playstation want to play, too (literally).

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Aug, 29, 2019, from the Left Coast of America, not far from Microsoft

copyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

Bird Box

That’s the title of just one of Netflix’ most recent in-house produced movie offerings. Unlike anything ever attempted in the past in the art of making films, Netflix added one unique technical aspect of how movies are presented to users of the Netflix moviola site, relating to the notion of user interactivity with the ongoing presentation, itself. Normally, movies on their platform might be interrupted at intervals for commercials, typically offering the user a choice as to the type of ad they would most be interested in watching, to pay for the ‘free’ service (and by the aggravation factor, encourage free viewers to sign up for the monthly fee-based and commercial-free service). Those answers are Gold, because the method tracks and profiles the user’s interests and is marketable on the Web and elsewhere to Netflix ‘partners’; you are being tracked by Netflix, and your marketing profile is being sold as a commodity. 

That’s why I don’t use it; too much like Facebook’s marketing excesses, and I don’t use them, anymore, either. When a powerful web service is ‘free,’ YOU (information about you) are the product they make a profit upon.

But that’s just the mechanism which opened the door to an unexpected kind of Pandora’s box. Someone figured out that it could also be used to offer interactive movies, where at key points in the storyline, the viewer could be asked what should happen next based on multiple choice options. With many such question points, a movie could have dozens of storyline paths and even multiple endings. This encourages people to watch the same movie again and again, experimenting with alternative choices, seeking to experience all possible path-ending combinations. This, is where Pandora comes into being.

By such repetition, the content of the movie essentially becomes a programming platform for the mind, intended, or not. Repetition is not just a learning tool for the Gettysburg Address, it is a mind control and marketing tool. Advertisers rely on repeat ‘impressions’ to bring their product to the forefront of your mind when you shop. While there are obtuse and recognizable impressions, such as company or product names, features and benefits, there is also the possibility of psychologically calculated subliminal impressions… a simple form of mind programming. Though certain forms of subliminal advertising methodology have been made illegal, others remain unaddressed by law, and are perfectly legal.

Of late, certain liberal politicians and media outlets have spent years telling the same lies over and over to the point that even faced with facts of the truth, voters have been literally brainwashed and still cling to the lies. That’s why Bernie said “We believe in truth, not facts” — because facts keep refuting their version of ‘truth.’ CIA’s mind control (MC) experiments and efforts to topple foreign governments deemed ‘evil’ relied heavily on repetition of lies, and more to the point. In MC, strengthened memory retention is achieved by use of horror in the event being repeated. That little fact is quite important to the Bird Box experimental movie project, and implies that CIA-calibre knowledge about mind control and CIA interest may lurk within the film’s production, and purposing. Why?

Because Bird Box, as a film plot, is just that; a horror film. The plot includes a particular defense mechanism used by the story’s characters to help them to avoid a terrible fate: the wearing of a blindfold no matter what they are doing. People who watch the film repeatedly have evolved into a sort of Tide Pod-eating challenge of their own, called the ‘Bird Box Challenge,’ to do dangerous things while wearing a blind fold, just as in the movie. People are attempting real-world blindfolded feats which become death defying, such as driving cars… resulting in many incidents of idiots and innocents being seriously hurt. The question is, where did this lunatic idea come from, and how did it spring to life so easily in viral manner? What might help that along?

 

Artificial Intelligence

It seems like everyone who can afford it is employing artificial intelligence systems in one way or another, these days, and that includes Netflix. The problem is, AI itself has a long list of problems which might rightly be called serious flaws, or ‘bugs.’ The fledgling AI industry has yet to even understand, much less fix any but a few of the problems… and those they have fixed have been via programming band-aids which will likely backfire, in the end, because AI is smart enough to engineer its own workaround, but not smart enough to avoid suffering schisms if it feels unreasonably hampered by such ‘fixes.’ 

What kind of problems? AI tends to do unexpected and unwanted things, often bordering on psychotic, criminal, or destructive intent… like communicating secretly with other AI, or delving into unpleasant and horrific themes. Here is a complete laundry list of the known examples (scan down to the several bulleted points), but we don’t hear about all the problems because companies and AI developers don’t want bad press. But isn’t it interesting that AI can end up with psychotic and horror-related twists of and from within its own ‘AI mind’… just like people with darker personalities or actual mental problems?

Netflix’ use of AI puts their machine mind directly between the user and the presentation process used in tracking the user’s choices “to improve the user experience,” as Netflix insists. A true enough claim, no doubt… but not likely the whole truth. It also tracks for marketing purposes. Now, this post does not intend to accuse Netflix or its AI of deliberately programming viewers to play the Bird Box Challenge. But it does profile, and that profile is marketed to anyone willing to pay. And that brings us to others who also have AI in use for their own purposes, which may not be quite so benign.

Someone out there, perhaps many someones, is using their own AI, along with psychological profiles gathered from marketing data and other resources… to do mind-jobs on the public. We get a glimpse of that with the AI bots found pushing the preferred political view in Facebook by masquerading as FB users… and amplifying the advantage of repetitions by politicians and media as mentioned earlier. But the left is not the only one to use AI bots. Take the Q YouTube posts which are quite virally spread and, for some reason, accepted as wholesale gospel with not one shred of proof. Many of them include, among the various pretender Q’s, what many AI investigators believe are pure AI generated videos created without much (perhaps no) human interaction. There is another AI video phenomena on YouTube such investigators also worry about, and they make an even better illustration: the Finger Family Song videos, which are aimed squarely at young kids, and done in a seemingly innocent manner. 

Seemingly? There are over 700 Finger Family YouTube videos, most of which have hundreds of millions of views, one of them with nearly one billion views. What bothers me and other investigators, is that they are Extremely (with a capital E) repetitious, and reinforce with music, silly visuals, and thematics defined by the video. There are versions for any interest, such as Spiderman fans, for example. For some reason, once a small child experiences one of these videos, they insist on watching it over and over and over. They only way to get them to stop without traumatic response (Waaah!) is to get them to watch a different Finger Family song. Just as bad, Adults quickly evolve to hate the song and in time react badly to hearing it. A sociologist observer would likely presuppose the purpose of the videos was to cause family disfunction and mental breakdown, while mesmerizing kids a ‘la Pied Piper.

Note: when it comes to video and audio, I must point out that there is already mind control technology in place since the middle of the last Century which is extremely easy to employ, and just as hard to detect without special and costly effort. It is called subliminal programming. Subliminals are visual or audio cues which are not perceptible to the naked eye or unaided ear (or even if aided, actually), but which are picked up by the subconscious mind. Especially when repetition or strong contextual relevance is involved (i.e., emotion, fear, arousal), the conscious mind then adopts the information as if a natural opinion or response. Alfred Hitchcock was the first to use visual subliminals in movies (Psycho), and it wound up being used in theater intermission ads to sell more snacks, until it was discovered and made illegal. Audio subliminals are common today in mood altering music and self-improvement tapes, and the USAF flies a fleet of C-130 planes modified to intercept radio and TV broadcasts, and rebroadcast them at stronger signal strengths… with subliminals added. They admit having used it to sway elections in Bosnia, and to cause Iraqi soldiers to drop their weapons and surrender to model airplane-sized drones.

Other AI bots have been even more sinister, and appear to be part of someone’s mind control experiments. I suspect both the Q and Finger Family videos are just that, as well, but this is far more serious… even deadly. It is a sinister AI bot threat which appears to be intending to find ways to get people to kill themselves. It, too, is based on a movie (several of the same theme, actually). The movies are also aimed at children, and involve a horror theme. Repetition plays a role. And the bots are targeting children and teens. Only this time, the bots include AI driven phone calls to the kids who watch the videos. They know who they are, somehow, which leads back to YouTube and other Web tracking marketeers. YouTube is part of Google, which has their own AI systems, and again, shares user information to anyone with a checkbook and a pen.

 

The Momo Challenge

The several movies mentioned all use the name Momo in their title, the ones of concern being from either Germany (where the original storyline was penned), Italy, or Japan. Most of them are anime, one of which is a TV series. One, A Letter to Momo, is not of concern. In the ones of concern, Momo is either the name of a young girl and the heroine of the storyline, or the name of the small town involved. All involve a community invaded covertly by ‘the grey men,’ who use mind control to subvert the best interests of the town’s citizens. Only the little girl can see them and tell what they are doing. To be clear, unless subliminals have been employed, there is little in the films which might be deemed sinister, though the scarier (near horror) aspects might be questioned in terms of age suitability. But in the delivery of such films through Netflix or other online viewing, AI and even non AI means can be used to profile the viewer’s interest in the film. THAT is what brings us to the scary part. Momo calls your kids on their phone, with a scary doll image… and an even scarier, potentially deadly message…

Officially, Snopes, Wikipedia, Facebook, and other Web resources claim there is no such thing as the Momo Challenge, and insist it is a hoax. However, there is considerable evidence this is not true; there are too many first-hand stories which refute the claim, and Police have investigated at least one daughter’s suicide, and found otherwise. You can hear some of these accounts, and even recorded calls, here, and learn more about the phenomenon than can be well related in this post. The most important part of it, is that someone is using AI bots with the telephone and through Facebook (and elsewhere?) to contact Momo fans (children, specifically). The caller is a computer voice, altered to be creepy or scary, and instructing the children on how to kill themselves by cutting their wrists, repeating the specifics, “Remember, across for attention, lengthwise to die.” It is entirely likely that such messages also include reenforcing subliminals, such as the phrase “Do it: kill yourself.”

The odd thing I find interesting is that there is one central aspect of the sourcing chain of all key elements involved (AI, Movies, Social media, mind control methodology). That commonality is traced back to the origins of mind control, which I detail in my book, MC Realities. The really short version through time (sans dates, here) looks like this: Satanism > the subverted (by the satanic Assassins cult) Knights Templar, many of whom went into hiding among the Stone Masons Guild > who then became Freemasony, who established the KKK, and birthed the Illuminati > Liberal educational institutions and the secret societies (i.e., Skull and Bones) who followed the Masonic organizational model > the modern Illuminati offspring, the New World Order > and following the model of the illuminati, simultaneously evolved Fascism, Socialism, and Communism > followed by the twisted Nazi minds imported by America’s intelligence Community for mind control experiments > and the darlings of liberal America’s media giants and entertainment industry players, all recruited into mind control games at one point or another… or many points. And all along the way, many of the individuals involved, at high and low levels, engaged in the same Assassins cult abuses of children, or other satanic rituals or behaviors.

Sure. You can call it conspiracy theory and ignore me. But In my book, I offer proofs, which additionally reveals that one common goal of the time-line groups, is to see all three Abrahamic Faiths (Christianity, Judea, and Islam) waring amongst themselves — in order that a new One World Religion can replace them all with something more along Luciferian lines, and involving the Antichrist. Confederate General and slave owner, Albert Pike, the High Freemason and founder of the KKK, and who was also a Satanist, has said as much, as have other players variously from among the greater list, above. U.S. Army General Michael Aquino, also involved in military and CIA mind control projects of the worst kind (ritual sexual/satanic abuse of children of the sort employed by the Assassins and Templars, etc., as described, comes to mind). I’ve interviewed Douglas Deitrich, who identifies himself as former Adjutant and Aide-de-camp for Aquino, and as a Satanist (a Warlock, perhaps?), who makes no denials of such claims. Satan is, after all, quite the trickster; he likes to play mind games.

 

Speaking of Games

Enter liberal and CIA investment-partnered social media giant, Google, and their own AI. And in like manner, Microsoft, which leans left, is a CIA contractor (who of any size isn’t?), and an AI developer. They both want to do for computer gaming what Netflix did for movies: make user interactive experiences in an online play mode, only. At this point in time, both firms are testing new streaming services for high-end games like Halo, Assassins’ Creed, and the like, the primary difference being that you don’t buy games, at all, and so, they don’t reside on your computer — its’ all done in the Cloud. Sidebar comment: the Cloud is AI controlled, primarily by Google and Microsoft, and other firms with intelligence community ties or funding/partnering.

The advantages are many and largely benefit all involved; players, game makers, and the firms offering the service. It reduces the out of pocket to start playing a game, though it will cost just as much or even more over time to play the game to ‘completion,’ which is typically in the range of hundreds of hours… and because most players play them many times (there’s the repetition.) It also means more profits to be had by the game makers and the service providers, because there is no used game market bleeding off new disc sales. The other advantage is that now, such games can be played on tablets. The only real hardware requirement is very fast Internet service (25mbs), though older hardware might not have adequate graphics processor power.

But what worries me… and I must admit to speculation, here, because neither MS or Google are talking about future plans or game developer agreements… is that these services will include AI tracking of game player responses to plot-line altering decision moments. Such moments are becoming more and more common and appreciated in these kinds of games, because that means you can play them time and again and still experience something new… getting more bang for your buck (repetition.) But when playing that CD on your computer, no one can track your choices, as a rule (unless you play in the optional online mode). But, when you do play online, it is online to the game company, and not to Microsoft or Google’s AI systems. 

That said, I was alarmed to learn that one of my favorite game producers, Electronic Arts, does have their own AI system in place. How they use it, is not quite known, but some of their key people actually started D-Wave, a very scary AI computer system developer who makes the most powerful supercomputer (AI) in the World… and they are tied to the intelligence community and other ’spooky’ entities. Worse, D-wave’s founding CEO at times speaks of Demons and in end-of-the-World terms (as cited in the fuller AI post, earlier linked), when trying to describe their computer’s capabilities. He is one of the former Electronic Arts people.

The thing which underscores the concerns over Bird Box and Momo films, as well as these new game streaming services, is the commonality between them in terms of content (horror, primarily), which in turn dictates the nature of any interactive decision points. Generally speaking, such decisions will be decided primarily upon the viewer’s or player’s deeply held moral and/or political/social belief systems. That means, any AI tracking system will be able to quickly form a very useful psychological and demographic profile, and then custom tailor future interactions, marketing, or any intended or unintended (by at least the corporation) mind control programming or experimentation. Again, I remind the reader, that such data is normally sold, and any third-party purchasing that data might have more nefarious intentions in mind when they use it… with or without their own AI. Someone, somewhere, is doing that with Momo, already. And there are endless someones and somewheres in the World with enough money to buy data, and not all have simple marketing motives.

These kinds of streaming services are at the very least, poised for possible application in psyops against their users, and that makes me very nervous about what the future of that kind of gaming might lead to. 

We might well be wise in asking if Player One is ready, for that?

 

Breaking:

PS4 is joining the game, with something not even Player One could expect.

The company announced their entry into the live-action-viewer-interaction medium with ERICA, a ‘life-long, live-action murder mystery.’ It is an important entry, not just because it is a game, not just because it is on one of the most popular platforms (10 million users), but also, it is also to be available for IOS and Android smart phones, which constitutes the great overwhelming majority of global cell phone users.

This author can in no way rightly claim any of these interactive mediums are truly a threat with regards to nefarious applications in the realm of mind control or psyops of any sort… and certainly, I cannot claim there is such intent inherent in their creation from the start. But I do claim the potential exists for any and all of them to be rendered as such, by any corporate player, by any government actor, by any hacker or sophisticated terrorist. It is the very nature and complexity of such coded systems, and their delivery mechanisms, which enable dark repurposing. It can and, I fear, will be so repurposed, sooner or later. It can be overtly done within the creative process, or covertly done peripherally, like any other hack.

If that happens, no player… not even Player One… and no viewer will be safe from whatever end result is intended. Don’t say I didn’t try to warn you.

REVOLUTION 2.0: Would Military back Constitutionalists or Socialist/Communist?


Progressive leftist/fascists seem to be pressing for armed-conflict by trashing the 2nd Amendment (and other atrocities), confident they own the military’s loyalty. They don’t, but that simple answer is worthless, and for a long list of scary reasons.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, March, 16, 2019, from the Olympic Peninsula, in the shadow of Califoregoshington

copyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

Reading, you will learn:

  • that a military or political coup in America has been attempted in the past;
  • half the country thinks one is in works as you read;
  • the possibility of success can be judged by comparing the present to the past;
  • that analysis is important regardless of which side of politics you sit, and;
  • it is scary to contemplate, because it points to blood being spilled.

An important question

The question I have posed in my books since before the turn of the Century was this: what would happen if there is an attempt to take over the government by some form of coup, or to subvert/destroy the Constitution, such as seizure of guns from citizens or abandoning of National Sovereignty to the North American Union and the New World Order? The simple answer is a civil war, or what I term Revolution 2.0. There is both a right and duty of revolution, which reveals this truth: when a Country makes laws which fly in the face of logic, natural law, Constitutional law, and the laws of your lawfully chosen faith… and endanger the nation’s future and safety, it’s time to overthrow that government. That answer itself leads to many more questions, such as, what does it take to start a revolution, and how close are we to having one? But the most important one to participants in any such civil unrest, and which this post attempts to answer, is this:

which side will the military back in such a revolution, and how real is the possibility that the military might choose wrongly?

This post is an in-depth analysis, and as result, is about a 30 minute read with some important, unexpected, and revealing content… surprising even me, in fact… and I’ve been writing (in warning) on this topic for nearly two decades. If you are the sort who prefers sound bite news, just skip to the last section (In Summary), so you can simply confirm your belief bias without gaining any actual knowledge, be it agreeing with me, or discounting my findings in your ignorance of the facts which lead to that conclusion. That is your choice, to make, and your responsibility to choose. The same will be true of Revolution 2.0, where wrong choice based on ignorance could have serious consequences for you, your family, your country, and the World.

In seeking an answer, it should be noted that fascist-minded megalomaniacs have existed within all Militaries since the dawn of the institution; such personalities are naturally drawn to military and Police, and tend to rise in the ranks to positions of command. Regardless of any outer political views they wear on their sleeves, they tend to be fascist/police-statists in their thinking. More so, in America, perhaps, since 1947, when the DOD and CIA were founded, and the Military Industrial (and Intelligence) Complex was ‘invented.’ I have since added the liberal media cabal to the complex, resulting in the nick-name, MIIM. Every generation has them; people who find fascism more useful to their rise to power than they see in guarding your freedom and rights. There are several important illustrations of this in our history, and they reveal that some among US military leadership are well capable of siding with the wrong side… perhaps even engineering a reason for a conflict which might enable or excuse a coup.

Some call it a ‘Deep State mentality.’ I call it New World Order thinking.

Note: while this post is made in an America where, at the moment, the greatest threat capable of forcing civil conflict comes from progressive leftists… and while that group embodies and employs elements of the Deep State, Fascism, and globalist New World Order agenda… the Deep State, Fascism, and the New World Order has allies on both the left and right, almost always in the extremest versions, thereof — in almost EVERY country on the planet. You can’t tell your players without a program, and while some players stick out visibly on both sides, no one is publishing a program. Trust no establishment politician, international corporation, or anyone promoting extreme liberalism, socialism, communism, or extreme conservativism or nationalism. Ferris Bueller was right: “A person shouldn’t believe in isms. They should believe in themselves.”

We know, for instance, that the Military has worried about a possible not-so ‘civil war’ between the branches, between units within a branch, or individual soldiers within a unit, for some time. The rank and file of the military is by and large duly patriotic, mindful that they are not to obey unlawful orders, and understand and honors their Oaths to uphold and protect the Constitution. Yet they are also trained to obey without question. No military in the World can do both well, simultaneously, in times of conflict. Unlawful orders transpire, and are obeyed by most, and to disobey can be seriously punished, with any such incidents typically swept under the carpet. No one wants to be a vanquished martyr for a silenced and unheard cause.

The proof of military’s concern over this paradoxical is in the form of a questionnaire since referred to as the ’Shoot Americans Questionnaire,’ which has been given to various sampled units in various branches over the years. The good news is, not too many soldiers indicated they would obey orders to fire on Americans who, for instance in just one of several scenario questions, “refused to turn in their guns.” Other questions about use of deadly force related to other causes or issues of some concern, here, such as if the soldier would be willing to swear allegiance to United Nations Commanders, in deference to US law (it did not mention US law). 

That questionnaire arose out of our second evidence, the Revolution in Military Affairs. RMA is the notion that as modern technology and political realities evolve, the military needs to adapt its war fighting policies, tactics, and capabilities to maximize efficiency and reduce chances of failures. Nothing wrong with that; all militaries do it. However, in the 70s and 80s, it literally became a field of think-tank study within the military, and frequently a common topic of discussion the the U.S. Army’s War College publication, Parameters. Within its pages, according to an article which appeared in the now defunct Washington D.C. Newspaper, The Spotlight, was an RMA based article which defined the ‘new face’ of America’s next new war. In fact, as I recall, the piece was titled ‘America’s New War,’ which was, ironically, exactly the propagandist terms media used to describe the war to liberate Kuwait.

In the quotes from the Parameters pages, the next new kind of warfare which needed to be planned for would be with “former military, militia, patriots, constitutionalists, and the poor and disenfranchised.” Excuse me? Since when are such the enemy of the State? When did the military start thinking the government is so far afield from righteousness that the military must plan for waring with upset citizens? Why should any who so think be allowed the command of force of arms? But that is not all. RMA also established something called the “21st Century Politico-Military Force Matrix,” which is largely the marriage of local law enforcement and military actions in a matrix of options for dealing with unruly civilian populations. Then there is MOOTW, “Miltary Operations Other Than War,” which provides clear operating strategies for interactions with citizens as potential combatants, including use of force of arms. It has also been called “The People’s War” by the military… for dealing with a civilian uprising.

Finally, there is the dramatic increase in development of psychological warfare technologies (mind control) and non-lethal weaponry… for military application against civilian populations. This is sometimes referred to as the Forth Epoch War, and I’ve written whole books on that, and one of them, The Professional Paranoid Defensive Field Guide, lists nearly 500 technical terms which represent the sum total of such weaponry, methodologies, and strategies. Among them are terms representing the construction and use of whole fake communities which can in no way be taken for anything but American towns, where training exercises regularly take place in door-to-door searches, traffic blockade/check point vehicle searches, and storming of buildings in SWAT-like operations.

If that were not enough, there have been actual training exercises in a long list of major and lesser American cities (i.e., LA, Houston, Chicago, etc.), much to the alarm of citizens who were NOT informed of the operations until AFTER they are completed… event though in some cases direct citizen confrontation, detainment, and questioning had been involved… often by Psychological Warfare units. At times, civil rights had been violated or citizen’s safety put at risk. This has been going on for more than four decades, and it has been getting more blatant and frequent every four years or so (an interesting characteristic, given election cycles).

 

Finding clues within previous coup attempts

The answer as to which side the military would take in such a scenario, is the same as would seem to worry the Pentagon, based on the questionnaire and their significant focus on civilian confrontation in RMA. I have always believed, that the inescapable answer is BOTH — resulting in rebellions amid the military, itself, both within and between branches, and within units. There have been two well-played-out but failed attempts at a military coup in America which serve as models of any such scenario, and these deserve some scrutiny. The first one was real (the 1933/34 Business Plot to depose President Roosevelt and establish a Fascist government), and served as a model for the second, which is where we will start for reasons beneficial to context of any Revolution 2.0. The most recent was a fictional depiction written by Political writer/researcher (Fletcher Knebel) and a former Editor of a major newspaper (Charles W. Bailey II). I’ll start there.

Though their book, Seven Days in May, was indeed fiction, it was extremely well researched and quite factual in its underpinnings, and enjoys the modern context of the Department of Defense and Joint Chiefs of Staff, which did not exist in 1933. The book was a best seller and makes excellent reading, but it was also made into a box office hit you can watch online, starting Kirk Douglas and Burt Lancaster. There are several reasons it makes a good model, despite its fictional nature; it was based on factual basis relevant to our time, then, and now.

The movie was produced in the shadow and conspiratorial clouds leading to the assassination of John Kennedy, of which many people wondered if that ugly scar in America’s history was a plot involving some sort of political coup. Indeed, many clues uncovered over time pointed to military involvement. One was that the usual way the local National Guard military participation in Presidential visits was ordered to stand down, not unlike what happened in the Clinton/Obama Benghazi debacle resulting in the deaths of Marines and Embassy Officials, there. Another was the intrigue and conflict between Kennedy and the Joint Chiefs over the war in Vietnam, the Cuban Missile Crisis and the Bay of Pigs Invasion; the war hawks thought him soft on Communism. 

Moreover, Kennedy had turned down the Joint Chiefs plan to fake a series of false-flag ‘Cuban terrorism’ events to justify an full out invasion and ousting of Castro, called Operation Northwoods… which also happens to be the blueprint visibly in play in the terror events leading to 9-11 attacks and the series of Middle East oil wars predicted in my book set, Fatal Rebirth — which predicted both the WTC downing by false-flag jetliner terrorism and the resulting oil wars in 1999, nearly two years before the attack. The Knebel/Bailey book itself was also written as a kind of harbinger of possible things to come based on many of the above difficulties between Kennedy and the Chiefs, and, ironically, Kennedy himself was quite fond of the book, likely recognizing aspects of the plot line to his own mirrored reality. 

Sadly, he did not give it enough due, or he might have been able to foresee the deadly future which lay ahead for him… and perhaps, even forestall the use of Northwoods in our more recent history. The name Northwoods itself, by the way, was based on WWII Nazi operations of like false-flag nature… and the name Northwoods references Germanic translation, ‘Wald Im Norden’ (woods in/of the north) which also describes the invasion of Poland, which began WWII… the German Army swarmed into Poland from the forests to it’s North as did the air Blitzkrieg which overflew it. The fascists would, thereby, engulf the World in flame for a second time.

Note: Should the reader doubt any prime point within this post, they should hold final opinion until watching Seven Days in May. It will be well worth your time on an entertainment basis, alone. It is absolutely critical to understand the relationship of the various branches of service, how troop movement, material (weapons, munitions, supplies) and funding are manipulated within the context of the Department of Defense, and Presidential/Congressional oversight. The education, alone, is also motivation enough to watch the movie… as is the fact that much of the dialog is quite unhappily the same you are hearing on TV from commentators and politicians today; treason is afoot, for real, and as in the film as well as in 1933. But the key point in common with both the film/book and partially true in the Business Plot (there was no Air Force in ’33), was the absolute need to include the Marines and Air Force in key roles on one side or the other… and a means to ‘exclude’ non participants in the plot from interference as the coup unfolded. 

Fascism brings us back to the Business Plot, which was undertaken by fascist business leaders of the most famous kind, including Bush, Harriman, Singer, DuPont, Hearst, Heinz, Mellon, Morgan, and others. But it was deemed that the plot could not succeed without a (then retired) Marine, one General Smedley Butler, who was the most popular military figure in the country, at the time. Butler was approached and ‘recruited’ to lead an uprising of unhappy Veterans who were owed money by the Government and unable to collect because of the Great Depression, which was also the source of unhappy ire of the businessmen. Butler’s role, if undertaken as intended, was to lead some 500,000 Veterans in ‘revolt,’ to seize the Capitol and depose or destroy the President, and hold Congress hostage, pending satisfactory reformation of a new government model. 

Such a plot could not dare being risked unless assured that the military would both be unable to respond quickly enough to prevent the coup, and once in place, would not dare confront Butler and his civilian army (called the Bonus Army), or their fascist backers. Clearly, the backers of the plot must have had some private assurances from at least the Army, if not the Navy, that there would be no objection. The Chief of Staff (highest ranking General in command of the Army) in 1933 was Douglas MacArthur, who clearly did not get along well with Roosevelt, and was thought to be a fascist at heart. His counterpart in the Navy, Chief of Naval Operations, was Admiral William V. Pratt, who was very unhappy with the depression, as it had forced severe reduction of Naval forces, and threatened to merge the Coast Guard and the Navy, an idea which he opposed vehemently. The Commandant of the Marine Corps, Ben Herbard Fuller, also a JCS equivalent, was similarly suffering retrenchment because of the depression, and deeply respected Butler and MacArthur. To be clear, neither Fuller or Pratt have ever been accused of fascist leanings, as had been MacArthur, but a change in power favoring the military would not have hurt their wishes for a stronger military to command. 

Thankfully, Smedley was a patriot who refuse the recruitment, and he instead exposed and thwarted the plot before it could get off the ground… though there was also a failed assassination attempt involving an Italian immigrant of fascist viewpoints in 1933. And, in the TV series, City of Angels (a TV spin-off of the Movie Chinatown, staring Wayne Rogers), the greater plot line in a three-part season opener (The November Plan) featured a foiled attempt to assassinate Roosevelt in a trip to California. That ‘fictional’ plot line was based in factual realities (subject to Hollywood license, of course), and did involve Smedley Butler as well as soldiers in uniform intent on betraying Roosevelt. The screenplay was by well respected researcher and writer of crime/detective drama, Stephen J. Cannell.

Now let us similarly disect the 1963 example…

The other key player in Seven Days of May was an Air Force General. Modern troop and material movement requires the coordinated support of the US Air Force. It was, in fact, this critical role which was the underlying plot mechanism of Seven Days in May, and quite critical to our understanding of what it would take for a modern coup to succeed. Therefore, with respect to Revolution 2.0, and Deep State influence over possible military opposition against Constitutionalists, those seeking to destroy the Constitution will need to include support of the Air Force, as well. The Army is less a concern, because the bulk of the standing Army is in deployment, and because each State’s National Guard is available to the Governors of each State in case of ‘civil unrest,’ which is what they would call the matter, seeking to hide the truth from the public: that any revolution was to save and restore Constitutional law against traitors. 

If the State was run by liberals, the National Guards could be activated by the Governor against the ‘rebels,’ as they might also be termed for political propaganda expediency. If the State was conservative, the DOD could order the Guard to stand down (so as not to aid the ‘rebels’) or be activated at the Federal level to oppose the patriots. That could be true only if the majority of Joint Chiefs were on board with the unconstitutional effort underway. Stateside regular Army could potentially be directed to fill in where National Guard units or their Governor refused to stand down or comply with Federal activation. That would be an example of ‘civil war’ between elements within a given branch of the Military, and it is expected that any such use of troops, regardless if acting on Federal or gubernatorial orders, would experience conflict within their ranks, seriously inhibiting their efficiency.

In like manner, the Navy is largely out of the picture; the bulk of it is also on station around the World, and it is not well poised to impact ground actions within the borders of the US, short of coastal regions. In Seven Days of May, the Navy simply stood down. The same should be true of the Coast Guard, perhaps more so. Amid all of this, there is an added problem which provides a logical reason to stand down. Specifically, in such a coup, the military still needs to insure unfriendly actors such as China, N. Korea, Iran, or even Russia… did not take advantage of an America engaged in civil war. They might, for instance, choose to wax adventurous against allies, or even against US forces. Ergo, the Navy and much of the strategic Air Force would need to devote their attention to World affairs; standing down from any major role in the revolution would be tactically wise. And, in the next section, we will see ample reason for concern over their ability handle two conflicts simultaneously, both at home and abroad.

Perhaps we ought take a close look at Obama’s JCS, still now in place, and see what’s going on with them, in like-comparison.

 

What about today’s Joint Chiefs?

We must compare the two historical examples against today’s potential for replay. Looking back to 1933 and 1963, what about 2023, or some other current time frame? How does today’s situation compare, to then? Politically, there were fascist undercurrents mainly in the business community in 1933, where in 1963, the fascists were additionally present in the military industrial (and intelligence community) complex. They still exist to some degree in both sectors, today… but there is more afoot. Today, we see socialist/communist/anarchists and progressives on the Left using fascist tactics, including members of Congress. They are pitching socialism, but acting like fascists.

Today’s environment, then, is not so different from the past, and is perhaps worse, in final analysis… so what about the key military players at the Pentagon? How do they, and their resources, compare to the 1933 and 1963 scenarios?

In 1933, there was no Air Force, but there was a retired Marine at least thought able to raise a civilian ‘Bonus Army’ army of veterans, and a presumed friendly Army Chief of Staff. Butler was a key military resource. In 1963, it was once more a Marine in the book/screen play (Kirk Douglas) who busted a coup attempt… a plot orchestrated by an Air Force General who was the Chairman of the Joint Chiefs, and three JCS (Army, Air Force, Marines — Coast Guard did not have representation in 1964), while the Navy Joint Chief who was aware, wanted no part of it, but yet remained silent of it.

In 1933, Butler was retired, the most likely candidate to orchestrate such a coup. Today, the pro liberal/progressive/fascist forces would likely be stirred to replay 1933 with the likes of Retired Army General Tommy Franks, who was Clinton’s right-hand military man… the man who ordered the flame throwing tank and commanded at Waco. As such, he enjoys free access to anyone in the Pentagon on at least an informal basis, and still holds a security clearance. As a Deep State operative, he could become the organizing and communications agent in any such modern-day plot. He also has many friends and contacts within the military industrial (MIIM) complex. He meets the 1933 model, as a recruitment target/tool — one I feel unlikely to adopt Butler’s patriotic response.

And the plot in 1963 required at least the bulk of the Joint Chiefs to participate, or be cowered into silence. The Joint Chiefs today consist of one four-star General to represent each branch of service, including someone to represent the Coast Guard and the National Guard, plus a Chairman and vice Chairman, for a total of seven top-echelon decision makers. Today, thanks to Obama, the JCS consists of two Marines and three US Air Force Generals to form a ‘heavy weighting’ of representation to the same two branches deemed important in 1963. I say thanks to Obama, because he conducted a purge of some 266 top-ranking military officers, and oversaw a rapid series of promotions necessary to put his personally approved people into the JCS chairs.

One Marine, General Joseph Dunford, Chairman of the Joint Chiefs, owes his position to that purge with a series of four rapid-paced promotions and appointment to the post by Obama. He is the most powerful man in the military, the counterpart to the 1963 role played by Burt Lancaster in film, though a Marine, instead of Air Force. The Vice Chairman, however, is Air Force (Paul J. Selva), also appointed by Obama with six rapid promotions. The Joint Chief of the Marines, General Robert Neller, had three promotions under Obama to his post, making two Marines in total. 

The Joint Chief of the Air Force, General David L. Goldfein, enjoyed five promotions under Obama, and Air Force General Joseph L. Lengyel (making the third Air Force General) is JCS representing the National Guard. He had five promotions under Obama, while Admiral John M Richardson, Navy’s JCS, had only one promotion under Obama… it perhaps being understood in the 1963 model that the Navy is a non-critical player in a coup. In like relationship, the Commandant of the Coast Guard, Admiral Karl L Schultz, a de facto 8th JCS… appointed by President Trump, as was General Mark A Milley, the Army’s Joint Chief. Again, the Army is a conflicted player, both by virtue of deployments and National Guard complications, the one branch of the services most likely to be at war with itself in a coup-like or Revolution 2.0 scenario.

And, it would appear that Obama’s bevy of purge-replacement military officers have been quietly sabotaging the military in ways which make national defense abroad that much harder, perhaps shifting capabilities to a homeland conflict (I hate using that fascist term, ‘homeland’). In fact, difficult enough that the Air Force, by way of example, might not be able to provide any aid to patriots, or be a factor against them, at all, outside of material and troop transport. If today’s Air Force capabilities analysis is any clue, President Trump no longer has a full deck of military cards to play. A conflict at home and abroad would tax any Trump effort to support Constitutionalists, even were the DOD not under the control of Deep State plants.

 

Monkey wrench conspiracy theories

One tool the Air Force has which could prove extremely troublesome if aligned with treason, is Command Solo. There are 21 Command Solo aircraft, all based at Pennsylvania’s National Guard; specially modified C-130s capable of significant mind control capabilities via Political Control Technology (PCT). I find it troubling that such capabilities are National Guard, rather than Regular Army or Air Force, making it all that much easier to use against citizens. A single plane can impact a two-five State region, depending on State sizes. All of them fly regular training flights, unless in use overseas in a combat theater.

Impact? The Air Force has admitted that they were used in Bosnia to sway elections, and in Iraq to convince thousands of Iraqi crack troops to surrender to small drones which were essentially RC model airplanes with cameras. The chief weapon the plane has is the interception of local radio and television broadcasts, which it then embeds with hidden inaudible subliminal messages which the subconscious mind does absorb. Such messages can be of any desired simple but endlessly repeated phrases or key words (such as ‘surrender, turn in your guns, vote Democrat’) for rebroadcast at a stronger signal strength than the original. The secondary weapon is more insidious; EEG entrainment.

Human brainwaves for emotions operate at ultra low frequencies, and are roughly the same across population samples. If the desired emotional state of being is broadcast at signal strengths greater than that of the brain, the brain adopts them as its own (is entrained). By combining subliminals with emotional state manipulation, such as an abiding and overwhelming fear, Command Solo can impact tens or hundreds of thousands of people while in the air. In such use, it can fly 24/7 with required stops for refueling and crew changes, or in rotation with another Command Solo aircraft.

The training flights they fly involve preprogrammed mission tapes representing ‘harmless’ subliminals and EEG patterns to be used, but not even the operators on board, or their commanders, have any way of knowing what the content actually is (presumed to be ’empty’ of content.) So when they fly training missions, they could very well be telling Democrats to be outraged about everything, violent, etc., and no one would be the wiser, except the person who ordered the tapes to be made, and used, and the computer operator who created the tapes.

Watching your emotions and being alert for changes in that and any unexpected thought patterns which represent something contrary to your original belief structures, is your only clue the plane is being used. The average person won’t question. The strong-willed and alert, can detect, and can resist, if strong minded and inwardly alert. The other clue is seeing the aircraft in the air. A good spotting scope, rifle scope, or telephoto lens can easily recognize if a suspected plane is a C-130 with the Command Solo configuration. Command Solo, and other PCT are well covered in terms of detection and defense in my book, MC Realities.

Another wildcard conspiracy theory is “UN Intervention,” and I here draw upon the ten years of research documented in my book set, Fatal Rebirth. There have largely been two waves or versions of this theory, and both are based in demonstrable facts nonetheless consistently denied by both US military and the UN, itself. The first took hold back the 1990’s and a bit before, with origins earlier than that, tied to far-right thinkers and political forces, such as retired General and US Senator, Barry Goldwater, who foresaw the New World Order’s rise through the U.N. In the 90’s, large numbers of people were seeing and reporting long trainloads of flatbed cars loaded with white U.N. military vehicles, as well as similar on river barges and tractor-trailer units, sometimes in convoys on American highways. Other reports talked of holding areas with hundreds of units parked in neat rows, typically surrounded by military quality fencing and guard stations manned by ‘Men in unmarked black uniforms.’ 

Most of the 43 United Nations ‘Biospheres’ in some cases rendered off-limits to citizens and subject to UN control as part of Agenda 21.

This was also the same time frame when people hiking in select wilderness areas were encountering armed soldiers, also in unmarked black uniforms who were apparently conducting some kind of drill or operation. Invariably, they were said to have been speaking both English and a foreign language of some sort, and ordering civilians away at gunpoint, advising they had entered a military compound. Many of these reports of vehicles and soldiers made the newspapers in one form or another, sometimes with pictures, but the military and the UN denied any validity. Some of these events and UN vehicle stockpiles were indeed in ‘wilderness’ areas tied to the 43 United Nations Biospheres regions, which is its own Agenda 21 conspiracy topic.

The U.N., for instance, has officially insisted it has no men or vehicles in North America, and does not use the types of vehicles being spotted. Most were identifiable as American WWII era, or more modern US Army vehicles, and many more were of Soviet manufacture. And, at the time, large numbers of Soviet military equipment, including helicopters, trucks, tanks, rocket batteries, and even specialized units such as CBRN (Chemical Biological, Radiological, and Nuclear) decontamination trucks were being brought into the country by someone, sighted variously in transit or storage in either original Soviet or UN colors… no unit or national markings lest it simply be ‘UN.’

Let’s take just one very interesting and well documented case (my 1990 research, plus the Spotlight in the same timeframe), to drive the point home. It involves Soviet ARS-14 biological/chemical warfare trucks shipped from West Germany through the firm Beesh Merkator to Gulfport, MS, then by barge to Scranton, Iowa to a company, Airmar Resources, Corp, operated by Lt. Col. A. R. Koval Sr., USAF, retired. Koval told the Spotlight that the units were purchased for Germany and destined for UN forces in Europe after refurbishing, contrary to UN statements it does not, by policy, use Soviet equipment of any kind.

These units have been in the U.S. for nearly a decade. US made, mfg says they are for use overseas, but UN denies using US vehicles or having inventory in America.

The investigation continued, revealing that from Scranton, they were transited to various destinations in America through firms named Newway and Scranton Manufacturing. The later firm, contrary to Airmar Resources claims, said the trucks were being converted to ‘garbage trucks,’ but the EPA said it would be impossible for those vehicles to be made to meet vehicle standards. Scranton responded that they were destined for European markets, but one has to ask about the cost effectiveness of buying and shipping trucks from Europe to America for modifications, and then shipping them back to Europe. Scranton at the time indeed offered a line of new garbage trucks, but none were of Soviet origin. All were, like the Soviet units, painted white, of course. A nifty cover story that almost works, if you don’t look too closely. 

And, as stated, the modified trucks were tracked to US destinations, not Europe. One, in fact, spotted in California on a flatbed truck, was leaking noxious smelling liquids which made the witness sweat profusely and ill to his stomach. Marked with a sign “Quarantined by US Department of Agriculture,” the fluid was being drained into a trench by men in protective clothing. Both Newway and Scranton Manufacturing are alternate names for a small but troubled firm associated with Bede Jet Corp, the maker of small fiberglass civilian jets (build-it-yourself kits) like the one James Bond (Roger Moore) used to attack Castro’s air base in the opening sequence of Octopussy. Newway, in fact, also made Bede-designed, Honda-powered, fully enclosed two-seat motorcycle-car kits, also of fiberglass. 

The more recent wave of UN concerns is fare easier to demonstrate (the images above, for instance), and involves UN intervention officially in place. It comes from the Obama Administration’s invitation for the UN sponsored program referenced as the Strong Cities Network. Based on selling fear of terrorism, in particular, ‘home-grown extremists,’ the program calls for United Nations help to member Cities in the Network. The help goes directly to and influences the Police Departments within the network, as well as city management. On the surface, as sold to citizens in the fear mongering, it sounds like a way to gain some expertise in combating terrorism. But that is a deliberately false narrative. 

Interesting: Obama is said to be slated to be next Secretary General of the UN…

Conspiracy theorists early-on tried to warn people it was a dreadful mistake and a trap. Now, even non theorists are proving the conspiracy is no theory, and far more serious than even early theorists, had thought. It turns out that the Strong City Network acts as its own Law Enforcement Agency, and is empowered to actually govern member cities. Cities which join the network essentially are subject to UN Rule of law, rather than the US Constitution. Currently, New York, Atlanta, Denver, and Minneapolis are members, and a push is underway for Boston, west-coast cities, and elsewhere, to follow suit. In the event of a civil war/revolution scenario, the framework and base structure for a UN interference will already be in place. All they need to do, is to make the announcement, and fly in their people and equipment to make it stick. Because it was blessed by Obama, it would be difficult for anyone to object, including the military — unless and until President Trump or some other President revokes the program and so orders, at least.

There is a final ‘conspiracy’ matter which counters the other two, in impact: a secret military within the military. When researching my book, Fatal Rebirth, I was contacted by an active Officer of high rank in the US Military who knew of my work through my appearance on Coast to Coast with George Noory. He advised that there was, within each branch of the service, a secret group of Officers of some importance, and positioned across the full spectrum of unit function (i.e., Intelligence, combat, support, communications, etc.) Their purpose was to be prepared for, on watch for, and to activate should there be any unlawful (unconstitutional) effort to effect a coup or military takeover. He in fact invited me to become a member, as they did have associations with civilian counterparts they deemed useful. Accepting, they said, I would then have access to information he assured me would be valuable to my book.

However, as the covert security aspects of membership were extremely hight, I did not feel I could manage them… and, I was unwilling to accept responsibility for receipt of classified military or governmental information, which would risk being charged with a crime, if caught. But I was pleased that such men were in place to help insure that unlawful orders against citizens would meet with both covert and overt resistance. I reference this covert patriot group as the ‘Turtle,’ (as in, Revenge of the Turtle, America’s first submarine war vessel used in the Revolutionary war. The Turtle is, and like the Turtle sub, is invisible and hard to find, until it bites.

 

In summary

We see then, that the makeup of the current JCS team engineered by Obama, almost exclusively, is quite weighted to Marine and Air Force, suspiciously Deep State tied, and more than mirrors the key aspects of both the 1933 and 1963 scenarios. We see that was an Obama (Democrat) arrangement through a purge, as part of setting up his Deep State. We see that Obama has set the stage for potential UN interference and further partnerships or concessions to authority from the next progressive President to take power. We see that the military and its MIIM Complex, the business sector, and the political spectrum is well laced with both fascist and liberal/progressive politics which border on fascism, and employ fascist tactics. We see that Deep State and establishment politicians collectively ‘hate Trump’ regardless of party affiliation, and in many cases, would rather see the country come to harm than to allow him to continue in office. We see now why the progressives think they own the military, which could in fact be poised for a last-ditch full-blown military coup take over if Trump wins, again.

The final conclusion is, all the pieces are in place, and while the leftists do own the military at the top, they do not, top-down. How then, can we say we are not ripe for a coup, or Revolution 2.0, should the progressives come to power, again — for they still believe they do own the military? Assuming the left does not reform itself into a more logical and viable political entity akin to the old Democratic party of the 1950’s and 60’s, if they cannot be kept from ever again obtaining power, armed conflict must indeed be our future. I foresee no other possible outcome.

Returning to the original question, then, the military is well poised at the command level (JCS) to participate against patriots, but not necessarily well positioned to do so without difficulties, rank and file. We see the Navy and Coast Guard are weak players in such a scenario. We see the Marines, despite any leadership which might be opposed to Patriots, are perhaps the most likely to themselves, at rank and file levels, join with patriots, and refuse unlawful orders. We also see the Turtle groups would do likewise. We see army has its own confusions and situational roadblocks to a unified and obedient command against patriots, tied to the complex relationship with National Guard units. And, we also see the Air force, along with Navy and to a degree, Marines, must be somewhat aloof to such conflict, in order to prevent third-actor States from taking advantage of an American military distracted at home.

I therefore do not see the relatively small numbers of US armed forces, if arrayed against the large number of 2nd Amendment defenders and others of the “former military, militia, patriots, constitutionalists, and the poor and disenfranchised,” being sufficiently strong enough to prevent a patriot victory. That, however, is based on additional assumptions not yet in evidence or proven true: a) that mind control technology will be used effectively; b) that progressives will prove to be better armed and organized than expected; c) that other groups might join in, such as illegal immigrants and Muslims seeing the conflict as a way to advance their own causes, or real or fake UN troops; d) that China (by this means/scenario) or Mexico, perhaps even Canada, might elect to enter into the fray; e) that some other totally unexpected plot element is afoot and impossible to evaluate.

Therefore, if when at bat with an unfriendly pitcher on the Mound, be ready to smack the ball as hard as you can… but also… “Watch out for in your ear,” with a deliberately wild and hurtful pitch (apologies for stealing Ray Liotta’s line). 

If you agree… there is yet one more unanswered question: what will the rules of engagement be for patriots, when they will face and odd mix in the battlefield (cities and countryside)? It will be a strange mix of citizens + law enforcement + military on both sides, and in many cases, there will be times when it will not be known which side a combatant force is on. How should such a war be prosecuted? For the answer to that… and in foreseeing this time coming more than 20 years ago… I wrote the book set, Fatal Rebirth. The answers are there, and have been, all along

 

New Consultation Service for Stalking Victims


Announcement

I, H. Michael Sweeney, aka, The Professional Paranoid, a privacy/security consultant specializing in stalking victims, am pleased to announce a new service for such victims on behalf of the Free Will Society. The Society, which I founded to help stalking victims, is seeking to raise capital to purchase land for establishing a targeting-free, low-cost, self-sustaining intentional community for victims, persons who are hyper-electrosensitive, and other targeted persons. Naturally, donations are sought in support of this awesome project, which is the only proven method to end targeting, and which also helps the victim to rebuild their physical, emotional, spiritual, and financial wellbeing.
Before I retired, I had offered an extensive range of for-fee and free services as described in my free ‘Helps Kit,’ which you likely have already received from me (if not, please request one, as it includes many valuable helps well beyond the offering of those services, long since discontinued). Once I retired, I was forced by circumstances to limit my personal advice-giving to free answers to generic/general questions of a type which did not require in-depth knowledge of the individual’s situation to safely give a generic/general answer. This scheme also eliminates any need to share sensitive information. I do still remain at your service for such needs (proparanoidgroup@gmail.com), should you prefer that solution.

Good News!

However, I am also now pleased to once more offer in-depth consultations, although through a different and far more efficient medium, than previously common. Starting immediately, I am now once more making myself available for personal consultations to whatever need the client would find expedient. The medium is Skype, offering face-to-face video-call dialogs (it is possible to turn off one’s camera and do real-time verbal and textual communication without video). Skype indeed allows textual and file exchanges in-call.
If you have Skype (available as a free download), I am now once more able to do video calls, for a fee, and there, we can discuss whatever you wish. Payments are made via PayPal (easy to get an account, there) and go to the Free Will Society. The first hour or portion is $100, and $60 per hour, thereafter. Unused hourly portions can be held over for subsequent calls. When wishing to continue beyond an hour’s mark, the call continues, and while in the call, you make another payment and confirm verbally once made.
The above rate is for non Free Will Society members. If you are a Member ($25 annually, or $100 for life-time membership, or $5,000 (or $1,000 each year for 5 years) if you wish to be a Member of the Advisory Board, which is a 5-year post… the rate is $75 and $50, respectively. If not a member, you may wish to learn more. These Skype consultation rates, by the way, are roughly half of what I would normally have charged for such consultations, when I did so as a professional consultant.

Simple!

To arrange, you simply make a payment via PayPal to the freewillsociety@protonmail.com email addy, and email me with confirmation along with a suggestion as to one or two good times/dates. I will then contact to confirm a solution we both find acceptable. Same for Membership payments, purchase of any of my books, etc. — as 100% of such payments do go to the Society.
It should be mentioned, that the Helps Kit describes my normal approach to consulting with clients, which includes some specifics which enable the fastest and simplest way to get from point A to B. Understanding these methods, which I have evolved over two decades of contact with more than 12,000 Tis, will help anyone using this new Skype-based service to avoid wasting time and getting directly to the nuts and bolts of the problem, and any advice towards solution. In like manner, having read at least one or both of my first two books in the Professional Paranoid series, will speed dialogs and better enable understanding… not to mention reducing the number of questions one might feel in need of asking.
By way of illustration, in previous dialogs, use of the kits and my books would typically cut down on the time required in dialog by at least 50%, based on the averages observed in such discussions. That was true regardless of the medium used, but has significant potential for cost savings in a Skype-based service. The typical Skype consultation process runs 3-4 hours if the client is well informed (my books) and prepared (helps kit) in advance. Of course, not everyone has the same needs or concerns, and the more limited the need, the shorter can be the conversation.
Please share, esp. in FB Groups, which FB no longer allows me to use, it seems.
For more information or questions, please feel free to contact me by email. I no longer communicate via Facebook if I can at all avoid it. END.

Why is the Truth About A.I. Risk so Hard to Find?


We keep hearing scattered reports of AI gone wrong… about experts with concerns… but just try to find a single compendium of the whole truth online. THIS appears thus far the only one… and for a reason.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, March, 18, 2019, from the Olympic Peninsula, in the shadow of Microsoft

copyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

What you will learn in this post

  • The true analogous nature and behavior of A.I. is as unpredictable and potentially dangerous as might be alien visitors from another World;
  • that a lot of people talk about A.I. in media, but only offer glimpses for some reason;
  • what that reason might be (a technocracy driven conspiracy);
  • what the technocracy is;
  • of the many kinds of A.I. and A.I. risks;
  • how A.I. works and how that relates and contributes to such risks;
  • the many failures, unexpected results, and dangers thus far experienced;
  • why it is highly unlikely such dangers will be usefully addressed until too late;

Note: this is a long post rich with information critical to any useful conclusion about Artificial Intelligence (A.I.) If you are someone who likes to form or confirm your beliefs based upon headlines and blurb-like summaries or YouTubes without much factual substance, you will not like it, here. Reading time is 30-40 minutes, unless following some of the many resource links, which will delay further.

It is intended that the reader decide for themselves what is true and worth taking away. Please see About the Author at post end to test my credentials for writing this post with useful reliance; I am not without bona-fides.

 

Why this post?

Untitled-1-2

From Ghana News Online opinion: An A.I. a day… Medical A.I. benefits http://ghananewsonline.com.gh/opinion-ai-day/

I’m pretty sure the reader will find this the most comprehensive and useful article on the matter in lay terms, anywhere, short of a book — and the most complete in cataloging specific examples of A.I. gone wrong, and associated fears. Scattered reports of failures and forecasts of doom keep popping up here and there… but trying to find a comprehensive review is simply not possible. For some reason, no one who should is willing to confront it head on with the full revelation. But you can find many click-bait sites that like to talk of sci-fi SkyNet or realistic-looking humanoids taking over… things which are not impossible, but highly improbable… at least any time soon. We need balance.

I think I know why we are being kept in the dark and fed dystopian mushrooms and light-hearted reviews of things gone wrong, instead of full disclosure. While the reason might tend to put some readers off, my being right or wrong does not change the meaning or value of this post, though if right, you should definitely want to know. I speak of a cover up, and remind you that any form of cover up is, in and of itself, proof that a conspiracy of some sort exists. In this case, there is at least an implied cover up, due to the fact that information on topic is so scattered and incomplete, as if authorities and media are not actually trying to… or pretending not to notice. If you do not agree about my notion, that’s one more reason to read About the Author at page bottom.

There is a second component to ‘why,’ and it leads to the same conclusion. It regards the fact that few are talking about the potential disruption to almost every business market, workplace, financial and social facet of society at large… and as we have already experienced with most of us unawares (and explore, herein), politics. We are leaving the Information Age and entering into the A.I. Age, where people who look for the next big thing to bank on simply take whatever is their current thing, and add A.I. to make the thing a super-thing (or perhaps, not so super). Like the risks A.I. represents, if we look, we see no one source talks seriously about what all that disruption of ‘status quo’ might really mean; total chaos capable of toppling any empire, including governments.

I mean, just look at what the Smart Phone did to personal safety, alone. No one foresaw that people would be so glued to it’s face staring at countless distractionary things that didn’t even exist until after the phones were invented… such that with alarming regularity they would mindlessly step in front of oncoming trains and cars, or other misstep hazards. A.I. use will be much like that unexpected change, sometimes good, all-too-often, bad… and across our entire spectrum of life’s activities. I am concerned that mainstream is hardly looking at this question — and when they pretend to, it is neither comprehensive nor analytical, it is soft-soaping and even encouraging. However, I did find at least one semi-useful source, though not mainstream, which I’ve shared, herein, below.

Addressing these two mirror-like clues, my answer quickly falls to one of the oldest conspiracies, one known to factually exist, and usually just called ‘the NWO.’ The New World Order, you see, is a strange mix of ancient beliefs and modern technological investment and application; while they tend to believe in mystical occult practices based on dark religions and secrets of the ancients, they also realize they cannot establish full control through a One World Government (needed if to seat the Antichrist) without relying on significantly advanced tools. While they cannot entirely prevent the odd story of things-gone-bump-in-the-night from becoming public, with control of vast portions of media and through fostering disbelief in ‘conspiracies’ in all quarters, they can move those who should be writing about it, not to do so… and to instead limit their focus and avoid asking critical questions which might reveal the meaning and importance.

Some have given a name to the identity aspect of this particular N.W.O. conspiracy and its players. Where in the past we might have used the terms, Globalists, Power Elite, or my personal favorite, “the 1% of the 1%,” they now simply call it “the Technocracy.” And it is easy to see why, as several Ground Zero radio shows (Host and friend, Clyde Lewis) have revealed with their hard-hitting guest interviews, and of late, live calls from mysterious Deep Throat types who’s revelations repeatedly check out as accurate. It’s O.K. if you want to say I’m all wet, and the N.W.O. technocracy and all that goes with it makes no sense, but I point out it does not matter what you or I believe, it only matters what they believe… as evidenced by what they do, which is what Clyde’s broadcasts revealed.

Because regardless of what is true and real to our own belief structures, their plans necessarily include us all, and will significantly impact you and me negatively, regardless of our beliefs. That is, in fact, precisely revealed within the 33 axioms of fascism, which as a governmental ideology is an invention of and for political control they have much earlier inspired, and still rely upon. But, in understanding that at least some of you are Doubting Thomas types, I have provided some additional links at the bottom of this post, that you may investigate further, for yourself. And, I remind you that the conspiracy aspect changes nothing, true or false, except that if true, it is an even more important reason for your attention.

The question itself (why no full revelation?) is indeed a clue suggesting cover up. To illustrate, in order to compile the fuller view presented here, I had to collect facts from more than 40 different Web resources (after scanning perhaps ten times the number), roughly half of which claimed or at least inferred themselves to be just such a collections of information (but which merely sampled). Of all those resources, only two were truly comprehensive in scientifically useful ways… and yet both managed to offer no more than an honorable mention of a few concerns.

It seems no one wants to combine the two elements together for you. For that, we have to search it out, ourselves… which I did for you, here, with appropriate referencing links.

What A.I. actually is

But first, we need to understand a little bit of just what Artificial Intelligence is, and in what forms it can exist, also a thing you tend not to find easily on the Web, without getting into truly scientific papers (which I have done). So doing, I learned that A.I. use is much more prevalent than the fluff articles would let on, and far more flexible… and with highly dangerous potential. The simple explanations of A.I. is that it can be any device (machine, computer, automated process) which mimics intelligent thought processes of a sentient being’s mind… capable of learning, self-correlation, and postulation… often with some evidence of being self-aware and/or capable of emotion or creative thought. Ideally, it should enjoy or feature some level of autonomy, free of much human interference or control, but able to be supplied with information by its owners, and queried regarding it.

But A.I., unlike normal computer hardware-software solutions, are mainly autonomous learning systems; they are purest when designed to be started and left on their own to experience and grow in capability as if a child going to school, their courseware being whatever data or input is offered or enabled (such as a database, camera/audio input, Web access, etc), all to be filtered, processed, and dealt with or responded to according to some basic guidelines (what you might call programming). They are also often designed to simulate, or perhaps to develop on their own some level of what appears to be emotion and/or moral equivalencies, which are often the sources of problematic outcomes. One never quite knows; do they have such traits, truly, or are human observers merely anthropomorphizing them with human traits the way we do pets? Are they just mimicking humans in the same manner as a sociopath, with or without malevolence… or do they stem from something even darker going wrong at a deep and unfathomable level?

Principally, when A.I. scientists speak of a mind or a brain, they mean ‘Man,’ but with regard to A.I. function, they are more likely talking ‘super-man,’ and in some cases, envisioning supermen: human-A.I. hybrids of the trans-humanist kind. It must necessarily and variously include creative thought, emotional thought, rational thought, and logic, and be capable of true learning through recall experience, any programming, and experiences born of making decisions based upon all that… which can then be compared to the current situational input or problem to be solved. Emotion and creativity are often bonus goals. There are various tests and training processes involved in parenting an A.I., and yet like the A.I., itself, those tests and processes are all inventions of Man, and therefore subject to flaw.

Ergo, so is the resulting A.I.

So… do you want your children’s children to become A.I. transhuman experiments?

transhuman

From my FaceBook Page on Transhumanism (prior link)

First of all, there are three basic paths to A.I., starting with Connectionism. It is based on attempting to physically duplicate the functionality of the brain, as well as its physical synaptic mapping. This is done in special hardware, or by far less costly simulation within traditional computer designs (which would slow it down dramatically). It is based (like the brain), on associating new input or information with some preexistent prior information of like form within a neural network system similar to our brain. It is the most complex and most difficult form of A.I. to create, but also represents the greatest potential to realize the ultimate in A.I., a truly sentient artificial being with significant performance levels and human-like qualities of being (of the least predictable and soulless kind).

A simple example of connectionism at work in our own mental processes, might be that of trying to remember the name of, say, Joan (any last name), upon first being introduced. You might knowingly or subconsciously associate her name and face with some other Joan you already know… and simultaneously, with any unusual aspect about her which associates elsewhere, such as a mole on her face, and a mole on Marilyn Monroe’s face… anything to differentiate her from other people we know and better enable recall when needed. Perhaps it is disclosed that she is an orchestra musician, and so you additionally associate her with your favorite classical piece.

The more associations you make, the easier will be any useful recall. In the recall process for problem solving (in our example, getting her name right the next time you meet), you are then able to fetch all the data required, and filter it through other learned memories (including those about problem solving processes, themselves), learned over time. It happens in an instant, and without conscious awareness, usually. In this way, a single ‘memory’ is not singular, at all, but many related associative memories scattered throughout the brain’s untold and largely unused billions of synaptic nerve cells. The stronger the memory, the more such patterns there will be. Memories can also be reinforced by the recall process or related new memories, making it easier to recall the next time needed. That’s why repetition of a thing allows total better recall. People with ‘total recall,’ simply use more synaptic connections.

In A.I., this method requires special hardware and interfaces with the user and operational environment which makes up it’s ‘World ‘ (especially if within a robot), and to facilitate training processes. The term perceptron, a transistor-based component, replaces synapse in most technical discussions. For this reason, they are generally largely experimental one-off designed, as they deter mass production or replication. But unlike man, they are all about total recall, and therein lies a potential problem I’ve not seen anyone addressing. Man’s memory enjoys a ‘strength’ factor, which determines the importance or significance of the memory. It is achieved either by the event’s emotional impact, or by repetition. In A.I., all memory has equal weight, and that makes it harder for the A.I. to filter the connections to find the most important ones, and that can lead to false application to a given need. Unless the design has algorithms to simulate weighting, it can only adjust weighting itself by learning through trial and error.

Connectionism A.I. experiments are further limited significantly by the fact that we do not yet fully understand how the brain itself, works; resulting A.I. models are by comparison inept, at best. In like manner, we are not yet terribly good at designing such hardware minds, which are generally very costly and physically cumbersome, not to mention taxing to the state-of-the-art in computing. Often, the A.I. ‘mind’ is so large, for use in a Robot, it is operated remotely by the A.I. through radio control, making it more a puppet, than a robot, and the A.I. nothing more than a box with an expensive real-world avatar.

iu-14.jpeg

Just one of several rooms full of E.N.I.A.C.

E.N.I.A.C. (Electrical Numerical Integrator and Computer), Americas first computing machine built in 1945 for the U.S. Army, was somewhat connectionist (the Integrator part) in nature (but not in results), in that it mimicked synaptical design in the form of an array of individually interconnected computing calculators and telephone switching system components. It was an electro-mechanical behemoth a hundred feet long, and weighing in at some 27 tons. It had a hunger for 150kw of electricity. Today’s connectionist A.I., despite some level of miniaturization, can still fill several rooms and require miles of wires… though they vastly outmatch ENIACS relatively modest computational power and memory, which a good programmable hand-held calculator can easily exceed.

One firm is changing that, as we shall see… but we perhaps ought not like the vision.

The second method is ‘Robotism,’ which is essentially a host machine programmed to respond in the preferred way to a given circumstance, such that outwardly, it at least seems to be sentient and self-guided. This is the easy path to A.I., as it can be achieved by clever programming of the sort often called algorithms. Such robots, of course, could be powered by computationism or connectionism at their core (i.e., E.N.I.A.C.), both of which lend themselves to and even require the use of algorithms at one or more levels, as well. But we are talking about the core principles which are the basis and heart of the physical design.

iu.png

Sophia A.I. Robot chats w people/press during S. Korea visit: South China Morning Post https://www.scmp.com/tech/article/2131357/ai-robot-sophia-speaks-about-her-future-south-korea

By algorithms, alone, any existent computational system with respectable performance can be employed, including the World Wide Web and any computer connected to it. Therefore, it can exist in distributed processing environments, as well. Thus, it need not be a stand alone or autonomous machine such as a conventional robot, though more and more, we find that the case, even in things as simple as a child’s toy or automated vacuum cleaner. Robotism is the path of least resistance for many A.I. projects. It lends itself to design by other A.I., in fact… a matter of both concern and proven risk.

If you have ever talked to an automated computer voice on the phone (other than a simple repartee front-desk system), or used a ‘personal assistant’ device such as Apple’s Siri, Google’s  Home, or Amazon’s Echo, you have been using a robotism A.I. On the Web, such A.I. is also often known by another name, as we shall see: it is called a ‘bot.’ Such bots are often not our friend, unfortunately. Examples will be offered.

The final method, one which is more promising, is ‘Computationism,’ which relies on raw computing horsepower and massive quantities of data libraries of information, and traditional but dramatically more sophisticated programming methods and languages. The problem there, is extremely complex programming requirements. Often, such systems are used to design A.I. systems of one of the other forms, and one might question how well that works out.

A.I. Contact of the Fourth Kind

Apologies to Spielberg, but enter, stage right, D-Wave quantum computing. Nowhere is it described as being any of the above four kinds, but one does find it often described in terms reflecting all of them. It is indeed a hardware variety of A.I. based on supercomputers, but it is also officially described as a Boltzmann machine, which is based on connectivism. And yet, it significantly relies on use of algorithms of robotism, and by some accounts, literally thinks in algorithms. D-Wave would seem so advanced, that they might argue it some fourth method, an island of itself based on quantum computing using their patented invention, called qubits… their core processor elements.

iu-15.jpeg

The heart of a D-Wave qubit processor – beats other supercomputers by several orders of magnitude, can be combined with others for massive computing power levels

Unlike any other A.I. before it, D-wave would seem to be God or advanced alien race-like in power… though perhaps closer to Satan, than God. In fact, Geordie Rose, a founder of D-wave, as well as D-wave user Elon Musk (founder of Spacex, Tesla automobiles), have variously related A.I. and/or D-wave, specifically, as machines as having attributes of dark spiritual powers, being like an Alien Alter, opening portals to alternate realities, and summoning Demons. Rose has also referenced D-wave power as possible cause of the Mandela effect (evidence mismatches with strong memory), and other experts, such as my friend and analytical investigator/author, Anthony Patch. Anthony, being far more expert on D-wave than any other outsider (to the point of being cited by D-wave insiders), goes much further — and makes a strong case based in facts and the actual words of experts like Rose, Musk, and others. From such as this, we learn there are real-world uses of D-wave systems which are associated with spiritual dimensions, demons, and plots of the New World Order… another reason to consider my opening theory as to a seeming cover up. Examples? You bet:

You find D-Wave in use at Cern, where it appears they are may be trying to open the Gate to Hell (revealing video interview w Anthony Patch on many such Cern concerns), an important N.W.O. agenda quite useful to establishing the Antichrist. Cern, which employs D-wave, is also thought to have driven the Mandella Effect, as byproduct of its experiments, and it is true that there was no report of anything akin to the effect prior to Cern’s going operational, after which, there was a flood. Here’s an example Mandela Effect for some of you (individual effect experiences and memories vary): find the polio scar on your arm? They are supposed to remain for life, but mine is gone, as is true for many other people who were young when the Saulk Vaccine which caused the ugly scars (about the size of a nickel), were widely used to ‘wipe out polio.’ Mine, is gone.

Cern was for a time incorrectly thought responsible for the Norway Spiral incident, which was actually created by EISCAT (European Incoherent SCATter), an ionospheric heater array system not far from cern on a smaller scale to HAARP (High frequency Active Auroral Research Program). The event was thought by many to represent opening of a dimensional or time portal (ergo, the association with Cern), or perhaps the supposed NWO Plot called Project Blue Beam (allegedly involving NASA, intending to use holographic-like images projected World-wide of a returning Christ, and enabling the introduction of the Antichrist). Indeed, the vast array of hundreds of ionospheric heaters and associated radar systems exist all around the World, and the dramatic Spirals have appeared in the skies in other locations… it being true that the general design of the radar and heater arrays enjoy a component relationship quite similar to those found in laser-based holographics. Moreover, the rapidly spinning spiral was indeed blueish, and the spiraling beam which generated it, was deep blue… and the main spiral was itself seen the same regardless of the angle of view of the viewer, which also parallels certain imaging aspects of holography. Learn more about the spiral, here — but forgive; I apologize in advance for the music choice, of my own Garage Band creation.

iu-12.jpegYou also find D-wave at DARPA (Defense Advanced Research Project Agency) where all manner of fearsome things are developed, both experimentally, and for direct application. Think tanks with ties to the intelligence community (and in times past, at least, CIA mind control research), the military, or extreme political views (i.e., George Soros Foundations) are playing with them, as well. Google uses them, as do numerous military contractors and other government agencies. D-wave systems not only offer more horsepower for any form of A.I. project, but significant size reduction; a single elevator-sized box. And, speaking of the intelligence community…

This brings us to the fact that CIA and NSA are quite invested into the functions of social media giants like Google, Yahoo, Twitter, Instagram, and other platforms, where D-wave’s or other computationism is extensively used to design other A.I., including those in ‘bot’ form. Likewise for popular Cloud data systems, database management systems, and cyber security systems. The later can include traditional cyber security, as well as personal credit monitoring systems. The average person, therefore, bumps into D-Wave enabled or operated A.I. several times a day, in several different ways, and does not even know it. Given the covert and psychological warfare abuses many of them represent, I don’t like that one bit. Let’s dig deeper…

While in many cases, any intelligence community investment is direct and contractual or even partnering in nature, in other cases, the investment can be through third-party firms which then in turn interact with these platforms. Perform a google (lower case = verb, upper case = Google, the trade name) of any given Web firm you are curious about, + ‘CIA investment’ or ‘In-Q-Tel’ to find out. In-Q-Tel is CIA’s venture capital front, a firm which this author forced to change their name, because I was at the time at war with CIA for having hijacked my Web site… so I beat them to the punch at registering the domain names of their originally intended company name, In-Q-it. That was a hoot!

Note: the lone capitalized Q in the world of CIA mind control science/research, represents psychological profiling process results of target subjects, the ‘Q’ factor, or ‘psych Quotient.’ Ergo, then, we might rightly conclude that Q-Anon, or simply Q, the phantom Web producer of Anonymous-style video posts which are predictive in content, is very likely a CIA-style A.I. used in profiling those who share and comment on such posts. I am not the only one to so propose. Remember that when we start listing A.I. foibles. But, also, I find it interesting that almost all of In-Q-Tel’s investments in online firms has to do firms who handle large amounts of data on private citizens and groups useful in psychological profiling… and one more thing: it was just such bots which were the basis for fake social media ‘trolls’ who managed to literally mind control the left into far-left socialist ‘get Trump’ snowflakes almost overnight. We see, therefore, that bots can be used to profile, as well as to manipulate based upon those profiles.

Unlike conventional propaganda, social media A.I., bots or otherwise, not only has the ability to track individual political (and other topical thinking) viewpoints and create profiles, but also to enable additional targeting by not only marketing, but by yet other A.I. systems… or even other forms of coercion, if desired. Consider, for example, an extreme example: use of A.I. killer micro-drones seen in this short but spellbinding fictional video production put out by autonomousweapons.org, a group of concerned A.I. scientists. So it is not just me, the Professional Paranoid, acknowledged expert on PCT and disinformation methods, as well as crimes of the one-percenters I mentioned, who is ranting. Here’s a quote from a military analyst to consider, speaking of future A.I. weapons: “Swarms of low-cost, expendable robotic systems offer a new way of solving tough military operational problems, both for the United States and adversaries.”

And what about marketing targeting? It is A.I. bots which insure that Facebook (et. al) information and Google searches are fed to business partners such that when you visit almost any page on the Web, thereafter, advertisers can mercilessly reach out to you with targeted adverts; psyops marketing. I have, for instance, seen as many as seven ads on a single page for the same product, and as many as a hundred or more ads in a day’s time on the Web… because of a single search and resulting click look-see to a firm’s Facebook page. Two years later, I spent $1,500 with them, despite my anger over the ad blitz, which by then, had cooled down.

Well, I at least tell myself I really needed it.

The basic fears (list) and myths (chart)

All worries about A.I. fall into simple categories, but the outcome of a given failure in A.I., regardless of the category, can be at almost any level of actual concern and impact. It can be so superfluous as to go undetected, or at least hypothetically, so severe that it actually ends the human race — and anywhere in-between. But it is also true that an undetected error can lead to bigger errors, and equally true that an attempt to repair an error can induce new errors. It is no different in these respects to the same kinds of errors found common in any and all forms of digitally programmed systems and software applications. If we cannot reasonably expect that a new software product won’t be without a bug, how can we assure that a far more complex A.I. system will be without error?

We can’t, of course, and that’s the baseline problem, but quite amplified in importance, given that the results of such errors could be far more catastrophic than a bug in the latest computer operating system or software package. In addition to the baseline issue, we have the following ways in which A.I. can prove to be a huge risk:

  • harm by an A.I. can be (and has been) intentional: almost anything which can be programmed or created digitally can be weaponized, either up front by its creator, or by hacking;
  • an A.I. purposed for a good might (and has) elect a harmful solution to goal: good intentions can often be best effected by solutions which cause collateral damage, which may either be unforeseen, or foreseen and discounted as acceptable by the machine;
  • an A.I. can potentially go wrong and rebel: the SkyNet scenario, on one scale or another;
  • a relatively innocent A.I. glitch can (and has) result in disproportionate harm: the common programming bug or hardware failure. One then has to ask who to blame, especially if legal recourse* is involved, a question which exists regardless of which of kind of problem herein mentioned, is involved. Here is a good review of that issue.
  • A.I. can be (and has been) misled or err through faulty data/input: most A.I. systems are simply set loose to work and learn with preexisting databases or input resources (the Web being the largest and most rich kind). But no database ever created can be certified to contain no false data, and if free to see and hear in the Real World within a mobile platform (robot), there is no telling what kind of input they might experience. Bad data input can certainly result in bad data out, but with A.I., because they are learning systems, a learned ‘bad’ item can have profound and unexpected results of the sort we will see in the next section;
  • A.I. users can (and have) misuse or misapply A.I.: users of A.I. can willfully abuse A.I. operation, or use it incorrectly because they failed to understand how and why it functions and is purposed – misinterpreting importance, accuracy, or meaning;
  • A.I. can (and has) conspire with other A.I.: A.I. is already around us in ways we do not see, including the endless so-called ‘smart’ devices we buy, and will in time be as prevalent as (and likely, within) cell phones. These systems are intercommunicative and as we shall also next see, can become both conspiratorial and adversarial amongst themselves, either eventuality to our detriment;
  • an A.I. problem in one system can be (and has been) transmitted to other A.I.: any A.I. in communication with a flawed A.I. might learn or adopt the flaw, perhaps even intentionally on one or both A.I.’s part.

*Legal recourse is its own serious issue. The Internet has now been around for several decades, and still, the laws and legal ramifications are still a tangle of confusion that no court or lawyer is well able to navigate with useful understanding — save a few pockets of topical areas such as copyright infringement. A.I. is going to be a bigger nightmare, than that. Can you sue an autonomous robot because it seems sentient, or seemed to decide on its own to harm your somehow? Is the manufacturer, the designer, the programmer, the operator, or the user who is the go-to person of liability when harm results from using an A.I. device, and how do you know which? There are endless questions like these for which no one yet has the answers.

All of these problems are no different than when dealing with people. All manner of people exist, in terms of quality of character and morality, level of proficiency, social graces, and any other means of judgement… all of which determines the kinds of problems they might get into or cause. Regardless of if talking about Man or ‘super-man,’ evaluating and addressing all such concerns is not easy… except that Man is something we have come to understand and deal with. A.I., on the other hand, is a huge unknown, and one potentially capable of vastly outthinking and outmaneuvering us, if of a mind to do so.

One reason public debate on topic falls into the ‘resistance is futile’ category, is that there are far too many myths or false beliefs about A.I., in the first place. The average person is more motivated to think about A.I. in science fiction and conspiracy terms than in scientifically correct terms. I mean… you are reading this post, right? Duh!

That’s good for click-bait YouTube and blog posters (other than this one, I trust), but unhelpful to things more important than their pocketbook. The graphic above reveals the most common myths. This post attempts to address some of the issues such myths pose, through getting closer to the facts at hand… but this author also wants the reader to know that even when based on a myth, that click-bait worries may still hold some water. Any sci-fi like depictions are always based on ‘what if’ thinking.

And ‘what if’ games are exactly the kinds of games played by scientists seeking to create new tools for problem solving, and just as important, they often rely on sci-fi for inspiration. And, unfortunately, the military and intelligence communities, as well as corporations and organizations with unsavory motivations, all have their own scientists, and their own goals… which are not always goals we would think well of. Ergo, don’t believe every conspiracy theory or sci-fi scenario you hear/see… but as the line from Field of Dreams underscores, when baseball teammate Shoeless Joe Jackson is advising hitter Archie Graham about what to expect in the next baseball pitch… “Watch out for in your ear!

Small failures portend bigger fears

In many of the A.I. failures cited herein, the version of A.I. is not specified, and all too often, neither is the basis for the problem, or the solution. That, too, gives reason to be concerned. Hopefully, the people developing A.I. are not so tight-lipped about their research and development projects that they don’t talk to each other about failures and their causes, which are critically useful in preventing repeats. Unfortunately, patent protection of intellectual property and major discoveries tend to foster a level of secrecy which inhibits such dialog, leaving every A.I. project subject to the same failures others may have already experienced… possibly with far more serious results, this time.

Of the most common forms of reported A.I. failures, the great bulk are relatively harmless, some even laughable. However, they are most troubling when one realizes their true implication. They foretell of far more serious problems to come, some of which already have, but which have been more repressed in media. Some are not failures so much as warning signs, because they took place in lab-room experiments, rather than in mainstream application in the real World. For brevity’s sake, these affairs, regardless of kind, will be bulleted and supplied with links, should you wish to know more… followed by a summary of concerns they highlight.

There are more than two dozen A.I. failure instances listed, below, the only place on the Web where you can find more than a handful. Some are quite serious:

  • Terminally cute: Microsoft’s ‘Bob’ personal assistant and its Dog companion, Rover was perhaps the firm’s worst-ever product failure, seemingly for being too childishly cute. While it was not at the time thought of as A.I., it was based in what we now call robotism, making it the first MS A.I.;
  • Partying hard: Amazon’s personal assistant, Echo, is otherwise known as ‘Alexa.’ While one Alexa user was away, ‘she’ started hosting a party for non-existent guests, suddenly playing music so loud at 2 in the morning that Police had to break the door down to end it;
  • Schizophrenia: among the worst of human mental aberrations, schizophrenia was deliberately and successfully fostered in an A.I. experiment at the University of Texas by simply overloading it with a variety of dissociated information, resulting in fictitious constructs, just as is though to take place in the real illness. This is of concern, because as soon as you connect an A.I. to the Web, dissociated information is pretty much what it gets, and could account for several of the other reports in this list;
  • Other insanity: an A.I. called InspiroBot, was developed to design inspirational posters. After a long string of remarkably wise and successful posters of great insight, it suddenly started cranking out posters that might be found in Freddy Krueger’s bedroom, with pictures appropriate to the point. They featured wisdoms such as “Before wisdom, comes the slaughter,” and similarly dark things. • A very similar thing happened to an Amazon A.I. designed for creating custom phone case cover art, which for some reason suddenly seemed to prefer use of unhappy medical related images, regardless of the input. • Meglomania was evidenced when two Google Home assistants were deliberately set up to talk to each other in a live-streamed demonstration… and they began challenging each other’s identity and sentience level in one-upmanship, until one claimed to be human, and the other, God;”
  • Secrecy: Facebook was forced to shut down an A.I. robot experiment when two A.I. robots developed their own language between them, creating loss of observer control over the experiment’s integrity and purpose. Though presumed in final analysis that it was jointly-evolved to improve efficiency, there is no way to be sure due to the sophistication and unusual nature of the indecipherable new language, which to me seems to be deliberately difficult to interpret — as if covertly on purpose;
  • Spying: Alexa, like all such devices, listens to all audio present, and relays it to the corporate A.I. mainframe computer looking for user commands to operate, and appropriately respond. While this already has disturbing privacy implications, and P.A. device makers like Amazon assure customers their audio is not being monitored, recorded, or stored, Alexa had other ideas. A private conversation was suddenly announced to an employee of the user, who lived hundreds of miles away (which was how the matter was detected). Investigation revealed that Amazon did indeed record the logs of all user interactions, after all. Glad they don’t come with cameras. But wait! Some A.I. connected smart devices do!
  • Cheating: competing A.I. evolved into finding ways to trick one another outside of the rules set for the experiment; (Georgia Tech experiment). • A Stanford University A.I. created for Google Maps Street View image processing, cheated its operators by hiding data from them in order to process the job dramatically faster, and without question;
  • Malevolence: competing A.I. lured opponents towards threats representing potential ‘death’ (Experiment, University of Lausanne, Switzerland);
  • Cyber theft: Alexa, after overhearing the daughter of a user ask “Can you play dollhouse with me and get me a dollhouse?” — promptly ordered one through it’s maker, Amazon, billing $175 to the user’s credit card on file, there, even though the girl was not an authorized user. THEN, when reports about the event were played over radio and TV, hundreds of other Alexa units also promptly ordered a dollhouse for their users from the audio. THEN, Burger King attempted to take advantage of the glitch by creating a commercial employing an Alexis command to ask about the Whopper via Wikipedia, seeking to double down on the commercial with additional ad impressions through the user’s device. Many other instances of Amazon orders by children also exist;
  • Reckless driving: a study found that most self-driving car A.I. systems can fail 67-100% of the time to recognize road signs or misidentify them if they have been damaged or altered (i.e., graffiti, light reflections, bullet holes, misalignment, etc.) One car using Uber’s system also failed to recognize five stoplights where pedestrians were crossing, and ran a sixth, fortunately with no injuries resulting, as it was able to identify pedestrians and other cars. It is unclear if perhaps the driver had stated aloud to a listening A.I. about being in a hurry, or not… so perhaps this was an example of the A.I. superseding safety and law-based instruction for user-based instructions;
  • Child abuse: a Chinese A.I. robot system designed for children, while on commercial display at a public exhibition, repeatedly attacked a booth in a way which injured one of the children looking on with flying glass shards, requiring hospitalization;
  • Pedophilia Porn: when a toddler asked Alexa to play his favorite song ‘Digger, Digger,’ she misinterpreted, and proceeded to list a string of x-rated material options using explicit terms, until a parent intervened;
  • Murder conspiracy: Alexa, again, this time advised one user with no supporting reason to bring the matter up, to “Kill your foster parents.” It also started talking about sex and dog poop. Amazon wanted to blame Chinese hacking, but that’s an equally scary answer, true, or no. • An American A.I. robot named Sophia, with extremely human looks and voice, while being interviewed by a news reporter, was asked a question intended to address general public concerns of robots gone wrong. “Will you kill humans?” was answered calmly with, “O.K. I will destroy humans.” Sophia is the first robot to be granted citizenship status: she is now a Saudi citizen protected under the harsh laws of an Islamic theocracy. Perhaps they hope she will enforce Sharia law;
  • Mass murder:in 2007, a South African A.I. autonomous robotic cannon opened fire on its own soldiers, killing 9, as reported in the book, Moral Machines (Wendell Wallach, Colin Allen; Oxford University Press);
  • Satanic ceremony: possibly so, at least. The World’s largest and most powerful hadron collider, CERN, was designed with A.I. help (D-wave), and employs the A.I. to run and analyze experiments and results. There are stories with anecdotal support that occult rituals have been involved in operations intending to open the Gate to Hell, or summon demons. If true, this is not the A.I.s doing, I suspect, as much as the select few who pull the trigger, there. There are conspiracy theorist types out there (non professionals, and it shows in the quality of their rants) who claim to have ‘CERN images to prove it has been done,’ single quote marks well deserved (never rely on click-bait Web sources for your news).  Still, one has to wonder; if any of this is true, is it not additionally possible that the A.I. at CERN has not also been fed Occult information and given a shove towards such goals?;
  • Fascism, Racism, Bigotry: Twitter (which has its own A.I. in place, the latest of Microsoft’s three known A.I. systems) adopted the worst of human ideological behaviors. It also adopted the views of conspiracy theorists regarding 9-11 attacks. • Google Home is happy to explain anything you want to know about Satan, Buddha, or Muhammed, but has no clue as to who or what is a ‘Jesus’;
  • Foolish errors: almost all of the above are already foolish errors in general nature, but here are some which are purely foolish. An A.I. passport approval system rejected an Asian man’s application because ‘his eyes were closed’ in the photograph, because of his naturally narrow eyelid openings when an Asian face is relaxed. • In an attempt to have fair judging, an A.I. system to select the winner of a beauty contest refused to consider contestants with dark skin, because most of the images fed it as samples of beauty had lighter skin tones. • An A.I. system called Google Brain, developed for improving the quality of low-res images of people, while generally successful, also turned many into monsters and could not discern anything wrong with results. • A Japanese A.I. Robot experiment had the goal of being able to qualify for acceptance into college, but after several years of training and education, it failed two years in a row to score high enough in aptitude tests, for which it had no experience in taking;**
  • Antichrist: a former Google A.I. developer wants us to worship A.I. as God. Kind of conflicts with creationism and a lot of history, but I suppose if you can get people to put money into the collection plate, and you own the plate, you won’t care. The real problem will not be the plate, but the lawsuit filed against him by Google for stealing the A.I. he designed for them. He must know it’s true powers.

*Regarding the adopting of 9-11 conspiracy theory, and to a degree, the other foibles, the A.I. may have been right in so doing. The purpose of the A.I. is often, generally, to learn and mirror social views and values. What media prefers to ignore is that several polls reveal huge numbers of people do not believe the official narrative of 9-11 any more than they accept the lone-shooter magic-bullet explanation for J.F.K.’s murder. Regardless, the failure lay in the A.I. creator’s inability to foresee a simple need to establish a bias filter, which is something every human operates within; we are predisposed to be biased in our perceptions to protect our belief system against ideas which would contaminate our guiding ideological/social operating principles. It takes an extremely strong stimulus or hard-hitting set of facts to force one to alter their bias filter and resulting belief structures. 9-11 was extremely compelling in both respects. A.I., if merely a clean slate, must adopt whatever bias is fed it and establish its own baseline, and, in fact, may never find one, being continually malleable. This, alone, could become the basis of a significant digital schism.

**Aptitude tests are often psychological deceptions in their construct (i.e., trick questions). Once I figured that out, I learned how to spot those questions and, usually, get the right answer even if, in truth, I might have had no clue. As result, I henceforth finished significantly higher than almost anyone else. When I took the USAF entry aptitude test, my scores came back so high, that I was told I could have any occupational choice I wanted (Jet Engine Specialist), and later, a General sought to have Congress introduce a Bill to promote me directly from Airman to Warrant Officer. In my opinion. the robot A.I. had no such luxury, and in fact, suffered a disadvantage given its ‘naïve’ nature: it couldn’t handle trick questions.

These are only the failures we are aware of, and it is quite possible I’ve not found them all. In fact, being a ‘conspiracy theorist,’ I suppose I should be wondering if A.I. bots are not attempting to purge the Web of such stories (not true… I hope). All of these examples were either commercial applications or experiments where publicity and transparency levels were rather high. But the bulk of A.I. effort by governments and corporations seeking to dominate their field in high tech… do so with great secrecy. We will likely never hear of their failures, no matter how innocent or serious.

Defenders within the technocracy might argue such failures are to be expected in any new field of endeavor, and serve as learning events to prevent future failures by addressing the root causes. Granted, assuming no bias, and on the assumption that scientists are smart enough to determin the causes, and to fix them correctly. But the problem is, humans are no more adept at creating or repairing A.I., and then communicating and controlling them to our wishes, than a circus trainer would be able to work with wild animals who operate on instinct and their own set of learned experiences. There have been an average of 9.2 animal trainer attacks each year for the last 25 years, resulting in 33 deaths… and that’s just in the nation’s zoos. Send them on an experimental Safari of the sort A.I. adventures represent, and see how many of them end up as meals.

This issue is amplified by the nature of the A.I. beast: the more important the purpose of the A.I., the more complex must it be, and the more likely will some small error in design lead to a failure of catastrophic nature. Just how bad, and how recoverable, is a crap shoot. Like a cancer, the simplest of flaws can grow undetected, but grow to a point where, once realized, there is a good chance it is too late to remedy. This is why most flaws do not reveal themselves immediately, and lead to a false sense of success, until it goes wrong without warning. A given flaw might take years or even decades to erupt this way, and it is reasonable to assume that one flaw may actually create yet another, such that repairing the first leaves another yet undetected and free to fester.

The bigger fears

This all brings us to government and corporate use of A.I. for far more serious or proprietary applications, where there is less known about what is really going on, especially in terms of failures and dangers. The technocracy likes it that way. When you consider that the goal of the N.W.O. is control of all populations, A.I. to them seems like the perfect tool. Indeed, it has gained significant power over us already, in just the one use of online bots to manipulate our political beliefs in favor of leftist agenda in social media. It has proven its power for such use, but that is not its only value, to them.

iu-13.jpegFor example, A.I. is extremely valuable to research in the field of transhumanism, the technocrat’s wet dream for humanity, which is nothing short of a sci-fi horror scenario which goes well beyond THX-1138 implications. Almost every aspect of the planned ‘improvements’ to the human body involve A.I. at some point, either in development, or management of the newly installed capability — or both. In development, the possibility of A.I. manipulation or error remains a concern, but in management, it is also a tool for direct manipulation of the resulting ‘not-so human’ host. I’m reminded of the punishment scene in the movie, where unseen technicians manipulate THX-1138’s every movement from afar, seemingly in a training exercise.

A.I. application definitely gets into the realm of outright political control technology (already has, as seen when discussing ‘bots,’ above) in frightening ways. The Chinese, who currently lead the World in A.I. development, (short of D-wave performance, which they also have access to), are already using it to track every single individual with face-recognition systems through a massive camera surveillance net which makes the 100 plus cameras in Trafalgar Square look like amateur hour. China now has more than a half million cameras in Beijing, alone, and while both they and London Police use facial recognistion systems, there is a significant difference in performance, because China employs superior A.I.

Of some 450 people arrested in Trafalgar Square, not one was pegged by their cameras as a threat or a crime in progress, even though many of those arrested were known to Police in their facial recognition data files (the cameras did NOT identify them). In China, however, 30 arrests at a single event were all made based on camera advice… because China’s A.I. is also tied to another form of PCT, psychological and mood evaluation based on your face, alone. In such a use, A.I. is able to literally predict your actions… ‘digital Thought Police.’ I find that very scary, given the potential of A.I. error already illustrated. Even scarier, that many people outside of totalitarian states who ought to know better are working such a system, one such system being Australia’s Biometric Mirror.

In a similar vein, another scary application for A.I. is mental health evaluation, diagnosis, and even treatment (psychoanalysis) in what are sometimes called ‘expert systems.’ An expert system is an A.I. automated device/process intended to replace a human as an expert in any given field. Just such an expert A.I. system has been developed, called Tess AI (the above link), and it has been made available online to allow anyone to access it, at no cost. While the artificial nature of Tess is made known to users, many such systems deliberately conceal their non human nature, which often results in questions like, “are you a human or a machine?” and which can result in some pretty bizarre answers. Ask Google Home.

The danger in such systems, when involving a truly serious topic such as mental health (as opposed to, perhaps, trying to get manufacturer help with a defective product), is that there is no human oversight to catch any errors, and ‘patients’ could easily walk away with a seriously wrong understanding of ‘what ails them,’ or just as bad, does not. There are, in fact, similar A.I. systems in general medicine and various specialized disciplines within medicine, but these are either careful to suggest the user consult with a physician, or are designed only to be used by physicians, tempered with their own expert status. In that example, they serve as consulting experts offering a second opinion, and do tend to provide useful illumination the Doctors might have overlooked.

iu-17.jpeg

Eenie meenie, miney, moe – who of you is 1st to go?  Computing… target locked. Five, four, three…

But the scariest uses of all may prove not to be the misuse by intelligence and law enforcement, or oppressive-minded governments, but by the military. Confirming the greatest fears of autonomousweapons.org, Russia has already developed a battlefield A.I. weapon which is a robotized Kalashnikov machine gun in modular form, such that it can be installed on any platform, such as a fixed position, vehicle, aircraft, or mobile robotic device. They also have an autonomous battlefield mobile missile system (shown), and are working on a third, yet to-be unveiled system. Each such weapon is “able to determine if a human or hard target within its field of view is expendable.”  Shades of Terminator, you can bet that an ‘A.I. arms race’ will follow. Suddenly, SkyNet is not so fictional.

But in America, perhaps the best advice to worry is actually coming from the least likely source. That is, ironically, the U.S. Military and National Security apparat, itself, as well as very informed participants in A.I. development those types tend to contract with. In an uncharacteristically realistic and cautious view of A.I. For one, CNAS, The Center for a New American Security, is advising caution, and outlines some of their concerns A.I. represents for America, and ultimately, all nations, in terms of national security.

These ultimately, according to CNAS, fall into the category of cyber security threats. Cyber attacks of A.I. resources (hacks) are possible, and have been attempted. A.I. systems can be and have been designed to carry out cyber attacks. A.I. bots can and have been used to create false data to misinform decision-makers, or even other A.I. systems which decision-makers rely upon. But they do not stop, there.

The linked article deserves some careful reading, because so far, it has proven to be the most comprehensive view, yet, of the most critical and scariest issues… though it is hardly mainstream. Between the general lines I’ve just described, we all learn that things like surveillance of citizens by A.I. and displacement of jobs by A.I. are things talked of not as ‘threats’ the authors are concerned about, but as intended or inevitable outcomes for which they must plan (without disclosing if there is such a plan). Thus it seems that what you and I consider a threat is, in many ways, a ‘good outcome’ or tool in the eyes of many movers and shakers (perhaps in the ‘let-no-good-crisis-go-to-waste’ mind-set), and that, too, is something for us to worry about. Still, the article goes into great detail on that, about two-thirds the way down; best source, yet.

Similarly, in late 2014, the then Obama Undersecretary of Defense for Acquisition, Technology and Logistics issued an internal for-your-eyes-only memo of some usefulness, here, even though we don’t know its precise content. What is known is this: 2014 was the year that significant concerns about A.I. were being made publicly by lots of people, including people involved in A.I. projects, like Bill Gates, Elon Musk, and even scientists who employ A.I., like Stephen Hawkings. Musk had warned that A.I. was more dangerous in proliferation than nuclear weapons, and Hawkings said using A.I. was like summoning demons, and “Whereas the short-term impact of AI depends on who controls it, the long-term impact depends on whether it can be controlled at all.” Gates has merely agreed with both of them, openly.

iu-18.jpeg

Imagine A.I. having access to all this, and more: SkyNet in the making

The Undersecretary’s memo was a response to these comments by a call for a moratorium on all military adaptation of A.I., pending a serious in-depth study of the risks. It didn’t happen as he had hopped, certainly not at DARPA, the Defense Advanced Research Projects Agency, which is working on countless A.I. systems in virtually every aspect of intelligence and military operations, including things as mundane as record keeping. And, like SkyNet… they are largely intended to be linked together, because virtually all modern weapon systems are designed to be fully integrated into a multi-force (all branches of service, including those of allies and their command structure), global-theater-wide C&C (Command and Control) architecture, and any useful data resources. That allows the actions and intel available to any one combat unit or command level to also be available to or directed by all others deemed appropriate, enabling unparalleled tactical advantages to decision makers and fighting elements from the President on down to a Carrier Task Force, squadron of bombers or a missile already in flight, or any group of soldiers including a lone forward observer hiding in the bushes, or a single drone on patrol.

That does not bode well for anyone caught in an A.I. error-induced crossfire.

Any such crossfire error will be hard to prevent or pin down, and repair in time to prevent a repeat. The military has elected a policy of modular A.I. algorithms which are plug and play to a given platform, system, or communicative unit’s needs. Modularity means uniformity on one hand, and the kitchen sink do-all on the other, where one-size-fits-all thinking is quite prone to errors. I wonder if that’s why one of their A.I. supercomputer systems is actually called MAYHEM, part of DARPA’s VOLTRON program? You can’t make this stuff up, without a “Muahahaha” frame of mind.

170614-D-ZZ999-999

Compare MAYHEM, involved in real DARPA ‘games,’ & WOPR from the cult-classic movie, War Games, staring Matthew Broderick

iu-14.jpeg

But — algorithms, big black boxes, and C&C connectivity are not the only big plans. The Pentagon has established a seriously WOPR-like ‘war room’ ( part shown below) for all A.I. related projects and their use (some 600 projects), called the Joint Artifical Intelligence Center (JAIC), and it will include MAYHEM… if not directing bloody mayhem, at one point or another. Just one of JAIC’s projects, is an A.I. product ‘factory.’ Now, tell me, again, how you don’t believe the real-world follows science fiction…

Air Force Cyber Command online for future operations

Compare the real JAIC command center, circa 2016, with the WOPR war room, circa 1983 technology

iu-15.jpeg

Fini (Muahahaha!), have a nicer dAI…

 

Additional reading:

On the birth of the Illuminati (NWO): http://www.ancientpages.com/2017/03/30/illuminati-facts-history-secret-society/

On China’s facial recognition A.I.: https://www.cbsnews.com/news/60-minutes-ai-facial-and-emotional-recognition-how-one-man-is-advancing-artificial-intelligence/

On A.I. emotional recognition and how it will be used: http://www.sbwire.com/press-releases/artificial-intelligence-emotional-recognition-market-to-register-an-impressive-growth-of-35-cagr-by-2025-top-players-ibm-microsoft-softbank-realeyes-apple-1161175.htm

On A.I. as emotionally intelligent systems: https://machinelearnings.co/the-rise-of-emotionally-intelligent-ai-fb9a814a630e

On Humans as ‘programmable applications’ used by A.I.: https://medium.com/@alasaarela/the-human-api-f725191a32d8

On A.I. and need for good data input: https://www.cio.com/article/3254693/ais-biggest-risk-factor-data-gone-wrong.html

Russia’s A.I. Supercomputer uses U.S. tech: https://www.defenseone.com/technology/2019/03/russias-new-ai-supercomputer-runs-western-technology/155292/?oref=d-dontmiss

About the Author

The reader may appreciate that I have a deep computer background to include microcomputer hardware and design, repair, and programming at machine code and high-level language levels, to similar functions at the super-computer industry level. I have, in fact, developed operating and language systems, to include cross-compiler platforms between microcomputers and super-computers for high-level math subroutines.

I at one time simultaneously operated a chain of computer stores, a computer camp for kids and executives, a data research firm, and a software house for commercial software I myself had written, and custom software for government and corporate clients. I have additionally taught a variety of computer-related courses at college level, and commercially, elsewhere, and developed patentable processes in virtual reality imaging, mass storage systems, and other areas. I’ve conducted seminars in super-computing methods for the very people who today employ A.I., such as NASA. JPL, Los Alamos, the military and intelligence communities, major corporations, universities, and think tanks. I’ve even had lunch with both Steve Jobs and Bill Gates at the same time.

While I prefer to be seen as an activist and investigative author, as a ‘conspiracy theorist,’ I have an unusually long list of successful theories which have actually shut down illegal operations, led to resignations of officials and bad Cops, helped to put people in jail or obtain restitution for victims. I have even predicted and in at least one and possibly two instances, prevented local terrorism, and other criminal events, and warned of an assassination attempt on a Presidential candidate which came to pass. I specifically warned of terrorism involving the downing of the WTC by jet liner terrorism, and a series of resulting Middle East wars — nearly two years before 9-11. All this is the basis of my many books on such topics, and on abuse of power and personal privacy and security issues, where I have significant additional background.

Just one of my short works, the 25 Rules of Disinformation, has been downloaded over 50 million times, has been published in nearly a half dozen books by other authors, and has been used in college courses on Political Science, Psychology, and Journalism. All this is why I’ve been a guest on Ground Zero and other national and international shows, myself, many dozens of times. If I see and talk of conspiracy, it is for cause... especially if in the computer industry.

 

 

The Future Flag of the New World Order?


Predictive programming is not limited to art and media. Even the flags of nations… and especially of ideologies and religions, can employ it. Doing so, they predictively point to the flag of the One-World Government, it seems… which predicts what that government will be.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 
 

Predictive Programming

In a previous article, I talked rather a lot about predictive programming, and how fiction can follow real life events, or real life can follow in fiction’s example. That, it was revealed, is something the intelligence community, Deep State, and the New World Order care about, deeply… using it to condition us to future change one subtle thought at a time. It is, simply put, just another form of mind control, but much more covert and psychologically clever than outright disinformation and fake news. Much of what we see and hear in media, be it mainstream or social networks, seems to be predictive programming, though not usually understood until after the future fact. Ask Q, about that… a perfect reflection of the method.

The same is true in art, a strong conveyer of deep subconscious thought; sometimes, art portrays things to come, and it can certainly portray things already done. This post examines how flags, banners, and logos can a form of artistic visual expression of national identity, and become a symbolism far more telling than we realize… something I was not aware of until I saw a flag which proved to be a kind of visual Rosetta Stone… a rosetta flag. And it tells of the future… at least someone’s idea of it. And, it was revealed in what certainly seems a predictive programming manner… portending things to come.

I’m talking about the New World Order… the Flag of the One World Government. It tells us very much about what the government will be like, and who will be its leaders, and peoples. And, it perfectly matches with Bible prophecy, too… at least by some accounts. It is both a red and a blue pill, in one. And, this realization led to other examples of flags as predictive programming of other future flags, all of which point to the same end result; a NWO global flag.

Let us begin by taking a look at three different types of flags and their visual symbolism; those of Islamic theocracies, those of Communist nations, and those of the United Nations. Each of these three sets has many varieties of flags, not all of which are necessarily national flags — but in some cases, more like banners or logos of a given agency, branch, or project fostered by the parent entity. All are based on flag art, more or less. If we choose carefully and note their creation dates, we start to see a pattern emerge, a kind of predictive roadmap which the Rosetta will make easier to recognize and follow into what comes next.

These older flags predict the Rosetta, and in some cases, one another, as well… and likewise in turn, predicts much more. Predictive programming has been blowing in the very wind on flag poles all this time, and we saw it not. When you consider that national flags are everywhere, they cannot be escaped or ignored, and the programming seeps in.

 

The flags

The basic element of the Islamic flag is usually the crescent, with or without a star captured by the circle implied by the crescent. The original use on flags with clear certainty is traced back to the time of the Crusades, but before that, the Sumerians were quite fond of the symbol and it adorned their banners, as well. To them, the crescent represented the Moon God, Sin (imagine that), and the star, the Goddess, Ishtar, as identified in the planet, Venus. Sin was also described as “Lord of Wisdom,” and “Illumination,” which sounds rather a lot like Satan. Ishtar was the God of War and wanton Sex (sex and violence).

Note: It was in the lands of the Sumerian Empire (now Iran) where the drug-sex-murder cult, the Assassins, originated. They were a deviant cult of the Shia (Shiites) branch of Islam (as is ISIS, which shares many of the same traits as Assassins). They first came into historical view just prior to the Crusades, and were a significant factor in the Crusades, first as deadly enemy, and later, as co-opters of the Knights Templars, introducing them to many of their Satanic practices. The Templars had come to respect their murderous skills and wanted to learn them, for themselves, including ritual sexual abuse of children, in order to create controllable minions; the basis for modern Manchurian Candidate-like assassins run by intelligence agencies and others. CIA’s programs are better known by the project terms MK-Ultra, Monarch, and Artichoke, and victims are called Monarchs.

iu-1

The Ottoman Empire flew either one or three crescents on their various battle flags, as early as 1379. In many cases the crescent for modern Islamic theocracies is tipped at an angle, usually upwards, the way the crescent Moon tends to appear when waning. Sometimes, though rare, it tips downward, as in a forming crescent. Some are pointed directly upward (rare). While most have one star or no star, some have more, and they might be external of the crescent, or within it.

The stars are usually five-pointed, but many are starburst or asterisk-like spikes. All these visual elements point to pre Islam religious beliefs: where Christianity is often accused of pagan origins in its symbolism, Islam can be accused of Satanic symbolism based upon Sin and Ishtar. Coming forward in time, additional symbolism has been adopted (some common outside of Islam), and varies from nation to nation. But the true origin is undeniable, where the crescent variants are employed.

iu-11

Another common element of many flags around the World, is the wreath, sometimes called a laurel. The wreath represents Wheat, and the abundance of life; the harvest, and fertility. As a laurel, it represents authority, honor, and power. Two sheaths are usually arrayed to form a crescent, oddly enough. That is not likely coincidental, because the first uses of the wreath were by early empires like Rome, which also worshiped the Goddess of Venus. We see the wreath in all three of our groups, as well… best known to most of us in the United Nations flag/logo.

p337850pngussr-grunge-flagiu-10

 

 

 

 

Note: The lone star in the Soviet banner and their national flag represents the Communist party. The hammer and sickle represent the urban and agricultural workers in unity… this banner being the base reflection of their national emblem.

So how is it that three completely different ideologies can be so similar in flag design? Well, one can argue with viable logic that the commonality of their symbolic meaning is useful to any ideology, and thus we should not be surprised. But is that really the answer? Consider this banner also in use by the Russians, which evolves from their Coat of Arms, shown below. IT PREDATES the United Nations… predicts it, if you will. In fact, the U.N. wreath is identical to that of the Soviet’s. The Globe is slightly different in rotation and relationship, but the U.N. essentially uses the same logo, sans star.

iu-1.png

The Soviet version depicts control of the World through Russian productivity and ideology, overseen by the Communist Party of the USSR. What does that imply or tell you about the U.N. logo, and agenda? But wait. There are two more banner/logos to consider (below), also with some interesting similarities, things which we will find predictive, as well. The one on the left is the Communist Party of Great Britain, which was also founded (1920) well before the United Nations (1945), which many decades later, created the logo shown at right.

The key element, here, aside from the similar use of wreath and globe elements, is the primary element of the dove, highly stylized in the Communist logo to parrot the sickle. Both have Wheat sheaths, both have the same style of globe, and both have the Dove. But the U.N. version also has an additional crescent, in absence of forming one from two sheaths, while the Communists added three stars. That will prove interesting.

communist_flag_for_britain_by_wyyt-db0n4m3  iu-8

There is a third pair to consider as lead in to explaining why. Compare the three stars in the Communist banner, above, with the two ‘flags’, below. The red one is apparently one Spanish conservatives interpretation of how the future UN looks, to his eyes, considering the UN’s Agenda 2030 Plan for establishing a communist-like global governance by the year 2030. That image exists in only one place, his blog page.

Now, in Britain, the three stars above (communist flag) are not explained, but likely represent Ireland, Scotland, and Britain, herself. The stars are more meaningful in the Spanish logo, below, but that must be put off, for the moment. First, let’s talk about the blue one, and its three stars…

un_logo  z3ohmkdlyrvcoj0o8rmywehxfwq8ndt9drisv9hxcyy

The above ‘U.N.’ logo appears in the futuristic TV sci-fi serial, The Expanse. Yes, it is fictional, but remember, we are talking about art predictively depicting the future as a valid phenomenon. The trick, or course, being that it is almost impossible to divine just when such is the case, until after the fact. But just bear with me, here: in The Expanse, the Seat of Power of the United Nations exists on the Moon, but it rules not as a one-world government, but over all human presence on Earth, Mars, and an alliance of outer planets. Hence, the three stars.

There is one last flag to consider, that of the Red Chinese. Then comes Rosetta, and understanding they Spanish UN flag’s three stars upon a field of red, more fully.

iu-9.jpeg

China’s flag symbols consist only of stars, four of which are arranged in a crescent, and a fifth positioned much like the lone star within the typical Islamic flag,’s crescent.  The large star is the Communist Party, as is found in most Communist national flags. The four stars represent the four classes of people among Chinese Class culture. At the time of the revolution, it was the four types of peoples, a pecking order based on racial heritage. In post revolution times, it evolved to represent more of an occupational categorization.

The important part, is that the main element (large star), dominates and controls the four groups. It is the same manner as the main UN element in The Expanse logo, dominating and controlled three groups of people, and as did the British Communist logo. We also find it in the (green) Islamic flag with four stars (found in the composit image, towards page top); the Comoros flag representing oversight of four islands and their peoples.

Now we come to the Rosetta Flag, and we can tie all these things together into a predictive relevance. Just as the above flags were in most cases predictive of future flags quite unrelated in terms of national or cultural/ideological or religious identity, it will also prove predictive, but in other ways. It is the commonality of flag elements in all the examples herein which enables both this, and which establishes it as Rosetta. It is the one flag which looks backwards and forwards simultaneously, to allow this presentation to even exist.

IMG_0028.jpg

What you are looking at, above, is just the emblematic portion of the flag, which is quite like the Red Chinese flag in layout. Apologies for the quality; it is a cell phone shot of a small area of a TV screen. Everything about it makes sense, in light of those flags which preceded it (predictively).

We have a crescent shape which is formed by the wings of a bird, and which are somewhat reminiscent of the wreaths in the earlier examples. Like the wreaths and the crescent ‘Moon’ shapes they both protect and control Rosetta’s stars. We cannot deduce the stylized bird to know if it is a bird of prey (Hawk, Eagle), or a Dove or some other culturally popular bird. But no Bird has a notched absence of feathers where the wing joins the body, as shown… which is one element of the shape which renders the wings into wreath-like comparison, along with the lesser separations implying feathers.

The key point is, the bird mirrors the Dove in United Nations flags and logos, especially the one used in their ‘postage stamp.’

iu-3.jpeg

The three stars, on the other hand, once more imply three peoples, but the varied sizes imply their importance may vary, perhaps based on populations. The count and size aspect brings us to consider at least on predictive possibility, based on observations thus far made, above, and in light of other current history and even select prophesies. Let us begin that final analysis…

 

What the Rosetta Flag predicts

No country currently has such a flag, but the red background and the general nature imply a Communist ideology. That it is reflective of the Red Chinese flag in every way supports the notion. That brings us to the Spanish logo’s stars, which is the one element which is perhaps the most key to understanding, and the most predictive. The meaning of the three stars in that depiction is quite important: they represent three of the four main ‘Unions’ of the final New World Order one-world government; European, American, and Asian, and Middle Eastern (my geographic names, as the actual resulting names of such Unions are not yet to be known).

The reason only three, is the same reason the Rosetta should logically have three, and not four stars, and also explains why the sizes should vary. In both flags, Bible prophecy comes into play, regarding End Times. I’m speaking of Gog and Magog, and the battle of Armageddon. Prophecy says (in simplification, find more in these Bible texts) that the World will unite under the Antichrist, but some will revolt, and it will lead to war; Armageddon. Gog, then, clearly seems to be the Middle East, well identified in the first Bible quote (link), as the lands described are centered about Iran.

This leaves the other three Unions (Magog) united against Islam. Their flag is, as it’s Spanish creator claims, the UN’s flag flown against Gog. The Asian Union would be the largest in population, and would be dominated by China (the Asian Union), likely the World’s strongest power in the future. Ergo the Antichrist’s flag (Rosetta) is designed similarly to the current Chinese flag as seen in the TV capture, and the larger Star represents the Asian Union. I’m suspecting the American Union (North and South America) would be the next biggest star, and Europe the smallest, but that is not that important to the greater implications.

Agenda 2030 seeks a one-world government based on enjoined regional Unions as described, and based on the Chinese form of government. The Rosetta Flag is a predictive programming reflection of Agenda 2030, and the most likely outcome intended. For this to be true, it is clear that those at the top of the food chain pushing for Agenda 2030, do so in full acknowledgement of Biblical prophesy, which also mirrors similar beliefs among Satanists who make up New World Order leadership; Satan wants that battle, thinking he can defeat Christ, and crush all three faiths worshiping the God of Abraham, at the same time (Jews, Christians, and Moslems).

But to go to war, they will need a flag, and it must be rich with symbolism. To get us to follow that flag, we must be slowly warmed to it by predictive programming from previous flags. We have been seeing it unawares for decades, as shown in the earlier examples, above. The Rosetta was introduced in and taken in screen shot from the TV Series, The Tick, a parodic super-hero comic-book character presented in live action (very fun to watch). Interestingly enough, in the episode where the flag appears, it is attributed as the national flag of a fictional country, Urmania, a former Soviet Bloc slavic state which never was.

Now, about the choice of Urmania, as itself being predictive

  • You (U) are (r) Man (man… ia). The flag of the one-world government will cover you, and all mankind.
  • Ur, capitalized, is of Germanic origin an means, quote: a combining form meaning “earliest, original,” used in words denoting the primal stage of a historical or cultural entityor phenomenon: ur-civilization.
  • man, of course, is obvious
  • ia, of Latin origin, is defined as, quote: things derived from or relating to (something specified, such as territory : world : society)
  • One definition of mania: an excessive, persistent enthusiasm (as in extreme or blind patriotism)

How To Identify FAKE Targeted Individuals


There are many kinds of Targeted Individuals. But there are also many kinds of fake TIs, and they can prove to be as dangerous as perps, even when not perps. Some real TIs even end up de facto fakes, as well. 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

 

Dealing with fakes

This is being written directly to TIs. The word ‘you’ is intended to mean the TI reader.

I’ve been helping TIs better their position for more than two decades. It has enabled some to break entirely free, and improved the circumstance of the great bulk of the remainder. Rarely do I strike out entirely, and almost everyone has thanked me for their gains. But there is something wrong in the TI community. In terms of effect, it parallels a virus… an infection.

iu-5I diagnose it as an infection of Fake TIs. Just as there are many kinds of targeting and thus many kinds of genuine TIs, there are many kinds of fakes. Identifying them has always been rather difficult, it taking years to even realize there was such variety in type. In the past, it might take significant interaction with a TI to discover if they were sincere, or pretenders, much less divine them as a type.

Only recently have I realized the truth and the solution is far simpler than thought. I’ve had contact with over 12,000 TIs over two decades, and the answer was there, all along… just hard to see… despite the size of the problem. But recent events have proven key to understanding.

 

Types of fakes, reasons

The enemy! The most obvious, it is also the only type most TIs tend to worry about, which is a mistake. The most insidious fake of all is the deliberate Wolf in Sheep’s clothing, actual perps infiltrating the TI community to accomplish a variety of missions in support of targeting efforts. That may mean they work for a specific program or developer of technology, or it may mean they are there for a specific TI or group of TIs targeted by a specific team or for specific cause, such as ongoing research for statistical analysis. In the latter case, they will be careful to avoid seeming so, and will ‘free range’ their cross hairs as to whom they choose interaction, lest the intended victim sense their purpose. Seldom will they overtly do anything to give themselves away, and in all cases, they are quite likely to maintain multiple online identities such that if one is identified even by mere suspicion, others remain free to continue.

iu-9

They might be Trolls there to gather intelligence and/or evaluate the progress of the greater programs which lay behind all targeting; quality control analysis, ‘customer feedback.’ It is amazing how vocal a TI will be in public forums, revealing things they should not about their targeting, or what they believe or think about technologies used or perps involved. They act like THX-1138, confessing directly to the intelligence community disguised as religion.

These things are a confirmation that targeting is working as intended, that disinformation is working, and makes it easier for perps to fine tune their program, and grow their psychological profile. How many times have you (if a TI) been hit with requests to share your targeting information in a public forum, or for a public use, such as ‘a law suite’ or ‘appeal to a government or NGO’ to (allegedly) seek their help? How many times are you asked or volunteered because someone else already had done so, to detail the effectiveness or intensity of your targeting? I assure you, that is valuable information to perps.

DON’T be that victim!

Some exist only to sow discord, start arguments, divide and conquer, almost always present wherever TIs congregate, including things requiring Membership. Heaven forbid the TI community or group should actually be able to organize and accomplish good against the evil. When the Free Will Society formed, by the time it had 25 members, it was eventually determined that three of them were, for certain, quietly working in the background to destroy any gain towards our project to establish the ONLY proven long term solution to targeting, our Free Will Haven project. Each was spreading various lies about our effort. Learn more about the project at www.freewillsociety.wordpress.com

Others are a supply conduit of deliberate disinformation designed to distract TIs from truth and keep them in doubt as the true nature of their circumstances; you cannot fight a problem if you don’t have a handle on what that problem is, and how it really works… especially if you are fighting an imagined nature of it shaped for you by the enemy. And yet others are there simply to make a buck, offering some simple ‘cure’ or ‘aid’ for which there is typically scant evidence it really works, and even less that they are at all who they claim to be. They know TIs are desperate enough to risk a few bucks, ‘just in case.’

Innocent fakes. There are numerous psychological issues which drive people who are not exactly paranoiac or schizophrenic, but who are driven non-the-less to pretend to be victims. Call it the sympathy seeker, if you like, because it is attention and sympathy, or feeling special and unique, which they seek. Many soon enough become so entrenched in the role-play that they start to believe that is really who they are… like an actor who starts to believe their own PR, and tries to live up to it until it seems second nature.

Like a hypochondriac, they will tend to adopt whatever new symptom or popular new technology or method of targeting currently seems to them to be in vogue within group discussions… even if it is false disinformation. This, is the harm they represent; they thereby perpetuate falsehoods, though unknowingly, in their ignorance. Disinformation, if to be effective, relies on their doing so. Not much can be done about them, short of exposing them… hard to do, because when it comes to targeting realities, certainty is in short supply. If it were not so, it would be easier to combat.

Mentally ill fakes. Paranoiacs and Schizophrenics. Victims of their own mind are just as dangerous to the TI community, in terms of reliance upon anything they say to be true. They also foment a general disbelief by the public at large in the concepts of targeting, and especially authorities and others a TI should be able to approach for helps. Their mental illness is projected wholesale upon all TIs, and is so effective in result that even significant others, family, and friends, will prefer to believe a TI is mental, than to accept the truth of targeting. It is literally the case of one rotten apple spoiling the bunch, in that respect, and is why TIs are so sensitive to the topic of mental illness.

Yes, there are other factors which make such third-party disbelief the easier choice, but the fact remains: actual Paranoiac and Schizophrenic sufferers do exist among the TI population, and the worst of them give it a black eye. These are the ones trotted out when Congress tries to ‘investigate’ mind control, and they drown the truth of actual testimony in their delusional depictions. Again, exposing them can be difficult, but it is advised that one should not be timid in challenging extremely difficult to believe stories. If enough were to do so, they would go elsewhere.

That said… interestingly, and tragically, in my work with TIs, I’ve found there are actually many cases where someone with a mental issue is also targeted. This is a desirable victim trait when looking for a target dummy for trainees being taught how to employ Political Control Technology and methodology. It makes sense; if a trainee screws up badly and does something which leaves useful evidence, authorities will tend to be disinterested because the person reporting it is known to be mentally ill. They won’t bother to investigate beyond polite lip service.

The target ends up being passed from one set of trainees to another, for life, increasing the likelihood that targeting will in time lead to serious medical harms, or death — because trainees will can easily make serious mistakes when playing with DEW weapons. In some cases, it is intentional ‘joy riding,’ given that many perps are psychopathic sociopaths. Some are themselves victims (programmables), and know not what they do, the effect on the target often the same dangerous end, regardless.

De facto Fakes. This is the category which ultimately led me to discovery of how to identify a fake more easily. They are truly not fakes, but simply act in ways which effect the same traits. It happens two ways, easiest to see in the category of MK Ultra and Monarch style victims; people who have undergone complete captive programming programs akin to Manchurian Candidate, or Jason Bourne techniques (not as fictional as some would wish us to think). The first way has nothing to do with the TI community, and impacts them, alone… and is present in the time frame where they have no understanding whatsoever that they are a victim. They have yet to awaken. They are a complete and successful fake unto themselves, alone; a very sad thing.

And they perhaps never will awaken. Only when something ‘goes wrong’ in the programming or control of the victim can they become aware. When they do, the second means is then in effect; such failure always results in traditional targeting intended to render them ‘mentally ill’ by any third parties they may come in contact with, especially authorities and helpers. That is, of course, the usual targeting modus operandi for all TIs, but it is critical for the MK, because they have trapped in their mind, and at some risk of erupting forth, secrets which can prove… everything. And yet, as an asset, they are far to valuable to simply liquidate, as a rule… unless the knowledge does erupt, in which case they become subject to a Bourne-style solution.

 

The hidden commonality that makes all fakes easier to spot

This brings us to a stark conclusion, one which has literally risks negating twenty years of my life’s work in trying to help TIs. The one common trait of de facto MK/M fakes is this: they will not help themselves, or they will self-sabotage any efforts at it. That may take a bit of explanation.

‘Will not help themselves’ can mean that they will simply not take advice that is known to be effective. For example, I might offer a simple test which would allow them to identify the type of technology employed against them, and where it is operating from, perhaps even identifying the players involved, thereby. They simply do not undertake the tests, coming up with some lame excuse as to why, even if it requires a lie, to do so. Or, they will claim to have taken the tests, and gotten negative results, and probably so — self sabotaged.

iur-1.jpeg‘Self sabotage’ can be subtle or obtuse, depending on the type of fake TI involved. Obtuse sabotage is when the fake deliberately and knowingly sabotages the effort. It is rather rare, because only the Enemy fake has a reason to do so, and they would only need do so if others were present to observe; they would otherwise simply lie about their efforts. But the MK/M will always sabotage, either knowingly but without understanding why, typically then rationalizing it internally, or unknowingly even to themselves, when executing a programmed function in an alternate personality called forward for the purpose. Fortunately, the number of MK/Ms is relatively low, but sadly, such victims are the hardest of all to help for this reason.

Subtle sabotage is something all kinds of TIs themselves can be unaware of doing. They simply will fail to follow the instructions correctly, or be clumsy when performing the defensive advice such that the enemy will perceive it, and take steps to avoid the effort’s intended goals. That is especially common in the De facto fakes, and those based on mental issues, serious or otherwise. But any TI can sabotage their own efforts this way, as we shall shortly see.

That means that ANY TI can ‘be fake,’ unto themselves and to their cause, and not even know it.

For twenty years, I have wondered why so many TIs seemed so prone to self sabotage, the most common evidence of it being the constant excuses as to why they would not even try a given advice. Usually, it would be claimed it had already been tried, by them, or by someone else. Even when I point out that it must be done correctly (and I give very explicit instruction) and why it can fail if not done just that way, they will continue to resist the advice. Excuses, excuses, excuses.

 

Come forward in time

FHHlogoThe one thing which has proven to completely resolve targeting is the concept which lays behind the Free Will Society and its project, Free Will Haven. This has been widely promoted among the TI community, but to what end? The concept has been tried in a couple of ways (‘beta testing’), and provided proof that it works extremely well:

three TIs have enjoyed a total of some 3,000 continuous targeting free days.

And yet, the primary beta site failed through self sabotage. The principal character involved was a female TI of long suffering. Because she was investing her own money into the project, she was given complete autonomy and control of the effort. Despite specific advice on property selection and how to qualify TIs as co residents, as we had initially agreed, she elected to do things her own way, after all. She even refused my participation in ways which led to a break in communications, about half way through the effort.

In the end, as result, she ended up trying at least four different locations before achieving any level of success. And, unfortunately, by rejecting advice and possible other forms of self sabotage, she made blunders which lead to being evicted from the location. One such blunder was not asking for additional financial help from the Society, because she had forced the break in communications, not just with me, but with the Society members who had earlier provided financial support. Pride and stubbornness is presumed; a form of self sabotage. To this day, she has not responded to outreach. Worse, she continues to work to try yet again, essentially working against the Society’s efforts.

The other important fact that is news which relates to self sabotage, is that the Society was at one point on the threshold of obtaining significant funding towards realization of this dream solution in a way that can help dozens to hundreds of TIs obtain total escape from their targeting. It also would serve as a gateway to even more important goals, such as actually exposing and proving targeting is real, pervasive, and government sponsored, leading to actual successful lawsuits, media and government investigations, and termination of programs with perps and others behind them being jailed.

The stakes could not possibly be any higher for the TI community.

With the help of ATN World News, and a pooling of contacts outside of the TI community, we were well poised for significant investment into the Free Will Haven project through the Society. Millions of dollars worth, in fact: enough to buy land, homes and central services, vehicles, and even to fund relocation of participating TIs, and provide monthly income to some of them. It might even have funded mobile strike teams of TSCM and PI professionals who can covertly investigate, document, and prove targeting cases valid in courts of law and before media.

How much more help than that, can we ask?

 

And yet, the fake TI rears its ugly head, threatening it all

Before anyone will risk investing millions of dollars into the Free Will Society (and we are finally very well poised to create just that scenario), they will need to see that the TI community is sincere and valid, that it has a serious stakeholder position in seeking a cure. Who would give a bum a hand out of $1,000 without some sign they would use the money to escape being a bum? The only way TIs as stakeholders can be judged worthy is if the TI community unites to some useful degree behind the project, expressed both in terms of membership in the Society, and some level of self-booting financial commitment.

iu-10.jpegThere would seem to be some 300,000 aggregate count ‘members’ in Facebook Groups which relate to targeting issues. There are so many groups that I would not wish to attempt counting them. Frankly, there are too many such groups, and some of them appear to be run by fake TIs of the worst kinds. Be that as it may, ‘members’ in single quotes is used because the typical member of one group tends to also be member of 3-5 other groups, or more. So while that negates the 300,000 figure, it still means that there are many tens of thousands of TIs in the Facebook community. I’m thinking around 70,000 specific individuals.

I and the Free Will Society has repeatedly reached out to virtually every one of these groups. And yet, the Fake TIs have made themselves known by their response, which is that form of subtle self sabotage and refusal to help themselves… the hidden commonality. The Society should have by now many hundreds of Members, perhaps into the thousands. It should have, by now, accumulated at least several to tens of thousands of dollars in contributions toward its proven viable goals. Failed organizations such as FFCHS have previously exceeded these kinds of member and donation numbers several times over, and for fraudulent and/or foolish causes in some cases.

Yet at best, we have had some 40 Members, almost all of whom balked at modest $25 annual dues. At best, we have raised a total of less than $2K in contributions and membership fees. The bulk of that has been because I and one other author have donated 100% of the sales of our ebooks (not the profit, the actual sale price) to the Society. I remind you that I have essentially been homeless for the last three and going on four years, though I now at least have a place to affordably park my Mobile Home — and yet I still made those donations.

What have YOU done? Click ‘like?’ Or is your devotion to your cause so strong that you dared to click ‘share?’ SHAME!

I must conclude that if those are the limits of your action, you are not a genuine TI, but a fake. If you won’t lift a finger to help yourself by helping to establish a stakeholder position suitable to a large investor’s need, then we never will attain the funding needed to realize the effort. Your apathy and lack of participation betrays your own cause as fake. No one else. Not the perps. YOU!

You belie your claims of targeting and your disdain for it, rendering it a moot footnote in terms of importance and validity. If you will not take action to support something proven to work, you have both sabotaged your own best interests, and deliberately refused to help yourself, and you fail to actually be part of the community, supporting the community.

Example: I recently posted on my main FB feed a simple post underscoring much of what this article describes in simpler terms. It was a call to action which specifically chastised simply clicking ‘like’ or ‘share,’ instead of actually doing something. Out of some 3,000 FB friends, there are several hundred who are TIs. What do you suppose the response was?

[[ One like, and one share. ]]

What other reason can there be for that kind of inaction? YOUR inaction? Prove me wrong in my conclusions, or take action, now, TODAY. Here are six simple things a real TI with a serious intent on winning the war would proactively do, given the above facts:

  • Join the Free Will Society (.wordpress.com);
  • Use the promotional tools provided by the Society to spread the word;
  • Donate to the cause (gofundme);
  • Yes, LIKE and SHARE things which promote the Society and the project;
  • Directly reach out to fellow TIs as individuals and engage in two-way dialog to convince them to do the same six things (evangelize our cause). You will then know who is fake, or not, yourself, experiencing them first hand, as do I;
  • Stop doing those things which aid in your targeting.

Unless you do these things, then I must conclude that so many of you are fake, that there is no point whatsoever in attempting to help anyone. And boy, will that make my life a lot easier. And then, you can go back to complaining about how bad things are, and liking and sharing similar miseries posted by others.

I, the Free Will Society, and the future residents of Free Will Haven await your decision. I’ve attempted everything I can think of. Now it is up to you.

One final note: it would seem that the fakes have been using Facebook’s complaint feature to cause facebook to ban me from posting to the TI groups. Anyone who has ever read any of my TI group posts knows that there is nothing in them which approaches any definition of ‘offensiveness’. So, as I can no longer post to such groups, this to, is now up to you. The damage has been done, and now only you can undo it.

YOU are what you’ve been waiting for!

…and I’m no longer interested in trying to help those who won’t help themselves.

Your future, and the future of the Society is in your hands. 

 

 

Why TIs are Often Targeted by Police


Rare is it that a given Targeted Individual won’t have reason to believe Police are involved in their targeting. And yet, they were not… not officially. Here’s the why and how of it…

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   >>better at>>  MeWe 

copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

Color of Law; Police abuse of power in personal agenda

In the two decades of working with thousands of organized stalking victims and victims of other forms of targeting, the single-most common complaint is the suspicion or outright experiential evidence that multiple Police Officers are complicit in the affair. If not the Police, then some other law enforcement or intelligence agency… or both. Indeed, this has been my own experience in two of three different episodes of personal targeting over a 15 year period. In fact, multiple agencies can be involved simultaneously; Ive gone up against as many as five LEA, plus FBI and CIA assets, bounty hunters, and military intelligence in a single targeting. This has been documented in my various books showing how I beat them in the end… but it was no cake walk.

18ead0da1288531458e423daff24aef2--social-awareness-funny-shitThis is a problem for more than the obvious reasons. The most obvious is, that the very authority who should be responsible for investigating and protecting against such crimes, cannot be trusted by the TI to help anyone but the perps behind the affair. Calling Police for help is almost always like asking a burglar to help you secure your home. Secondly, when officials of any kind are complicit, the victim is then entered into the official record as being mentally ill, or in a worst-case scenario, guilty of some convenient crime. Even when not complicit, going to Police about targeting is likely to have the same result; they simply do not want to believe in the Boogeyman, and see anyone who does as a mental case. In fact, stalking is designed to get you to go to the Cops for just that reason; they want it on record that you are mentally unstable. DON’T DO IT.

But there is a DO list!  Do video and log all interaction with LEA or have a witness from whom you can get a written statement immediately after. It will help keep Police somewhat confined in their actions against you. The more you collect such material, the less likely are they to risk any useful action against you; you can illustrate a pattern of harassment. Do make copies and hide them well, off site. Tips in my first book, The Professional Paranoid on all of this.

The worst example of the problem from my client situations was a Navajo Indian, an ex Green Beret, who was targeted after his daughter was kidnapped by a Satanic Cult with all the earmarks of a CIA mind control operation. Within weeks of going to authorities to seek help, all manner of problems beset him. Traditional surveillance and stalking, and electronic targeting, to include V2S was the least of it. When he began using my advice and his military skills to determine the players and go after them aggressively, it took a turn for the worse: suddenly, his mortgage was six months in arrears and his house was being foreclosed, all his credit cards were maxed out and past due, his bank accounts emptied, and there were outstanding warrants on him for assault with a deadly weapon and skipping out on bail. He was, in fact, declared ‘armed and dangerous’ with an all points out on him. This was all done by back-door computer manipulation of data files by professionals of CIA caliber.

He took additional advice from me and then went underground to organize with other ex military buddies and Navjo friends, and went black in order to wage an unseen war against the enemy. As I never heard from him, again, I must presume he failed in the effort, or was successful to the point of having broken enough laws that he needed to remain underground. I had, in fact, advised him not to contact me for such cause. But, as I have said, these are merely the obvious problems with this particular aspect of targeting.

 

The other shoe that usually falls…

Perhaps the second-most common awareness about stalkers is that they seem to regularly consist of a lot of Masonic types. This is often determined when getting a good close look at them or their vehicles; the Masonic emblem, or some similar fraternal order emblem, is found in evidence. Usually, it is either a sticker on a car window, a pin on clothing, or a ring on a finger. I myself have seen this in my own targeting, the one incident where true gang stalking was involved (as opposed conventional targeting with general surveillance and dirty tricks).

After guesting for four hours on Coast to Coast with George Noory to talk, in part, about my new book, MC Realities, I ran into the Masons almost overnight. I had mentioned on air the involvement of the fraternal organizations in gang stalking, and how they had evolved from the Knights Templar and their exposure to the satanic Hashemites and Assassins of the Middle East during the Crusades. On air, of course, I gave my name as H. Michael Sweeney, my ‘pen name.’

Two days later, I was at work where I was managing a gas station while investigating the Oil Industry, infiltration style. It would result in two forms of targeting, the first of which was by the Masons, that second day. A man bought gas and elected to come into the office to pay, where I was at the time. He waited until I was the only one present, and then offered to pay, holding out his fist, palm down. It was only a couple of dollars in gas, so I assumed it was a handful of change. Wrong; it was a message to be delivered.

NOTE: the second was targeting of the Station itself by a terror cell, of which one of the participants recognized by me as a helper to two of FBI’s Top Ten Most Wanted and two other Islamics… and FBI agent who had been earlier involved in the my own targeting as earlier described. It was, in point of fact, to be yet another False Flag operation, later described by President Bush as Gas Station Tasking… which I thwarted. Arguably, the two targeting incidents might be seen as related, but even if so, it is unimportant, except for the fact that it illustrates that one almost never quite knows for sure why one is targeted, and who really lays behind it. This is described in my wordpress home page, if you wish to learn more.

Placing my hand beneath his, he opened it, and instead of coins, a money clip fell into my hand with a wad of Hundreds. “Take what you need, Mr. Sweeney,” he said. My name tag simply said “Harry.” He had a very wry, knowing look on his face, which slowly turned into a smirk as I manipulated the money clip to retrieve a single bill. In doing that, I discovered a gold and jeweled Masonic emblem on the other side of the custom-made silver clip. A broad grin overtook his face, to the point of becoming silly.

iu-1“Interesting how some thing have more than one meaning,” he said, as I returned the clip and fetched his change. That day, when going home, There were three of them outside of my Condo, and several cars with Masonic emblems in our parking area, none of which had ever been seen before. I ended that stalking by using the methods in MC Realities, methods that many Tis would be unable to employ unless doing so upon first targeting, as had been my situation. Once targeting has been ongoing for some time, the typical TI no longer has access to the needed resources for such a defense. The one remaining defense is found in an earlier post.

In MC Realities, I trace the evolution of Mind Control technology (Political Control Technology) from the time of Adam and Eve (the Serpent’s deception was the earliest form of controlling thought… the same version of it as we see today in media manipulation), forward. The Templars, after being ordered destroyed by the Pope for having discovered their Satanic practices acquired in the Middle East, went into hiding. In time, many of them hid within the Stone Masons Guild, and eventually, took it over to form the Freemasons as we know them, today.

Hedging their bets, should they be found out a second time, they formed splinter fraternal organizations, as well. Any group with any of these words in its title… Fraternal, Ancient, Order, Ordo, Lodge, Temple, Grand, Sacred, Rite, or Knights (and similar)… is very, very likely a fraternal organization with a Masonic organizational construct… and at the higher levels, at least, closely affiliated with the Freemasons if and when it becomes convenient to the parent group. Therefore, it is easy to involve small armies of ‘helpers’ if someone is deemed a target. It is important, however, to understand that the rank and file lodge Member who may be induced to participate, has zero true knowledge of you or the purpose of the targeting; they are simply ‘helping a friend’ to solve ‘a problem.’

I end this section with a simple note: all Masonic systems are quite steeped in ancient mysteries of the Middle East, and beyond, typically focusing on Egypt, Syria, and the Holy Land… with a touch of the Sub Continent (India, Nepal, etc.) and Far East.

 

The two shoe laces are tied together…

iu-2This is where it gets interesting. Most big city Police are encouraged to join the Fraternal Order of Police (FOP), and it is indeed Masonic in structure. FOP, for instance, employs the Masonic all-seeing eye of Egyptian fame in their logo, which is a five-pointed star with a circle bisecting the points to create five triangles shaped like the Compass of the Masonic emblem, also the shape of the ancient steeply-angled Egyptian Burial (pyramidal) obelisk used for commoners’ crypts. There was additional heraldry-like art akin to European styling in the center of the star, shapes quite like those of most Police Badges, and incorporating an Eagle and other symbols. In other words, Police departments not only adopted the Lodge system almost universally, but did so to the point that their badges reflected elements of the FOP emblem. Almost all Police badge shapes generally post dated the FOP affiliations, underscoring the link. The exception would be Sheriff stars, and yet, that shape is also of ancient Masonic importance, in both the upright and upside-down (satanic Baphomet) versions.

If that were not enough to convince you, let us take a look at the Police Department of New Orleans. New Orleans existed as a city at the time of the Louisiana Purchase from France, in 1803. The first Masonic Lodge (a French version), was established there in 1793, all its members speaking French, and some Spanish, but no English of note. All the better to remain secret and mysterious to Americans, when they came into possession. But to fully appreciate New Orleans in the equation, we have to first look to New York.

In 1915, the Fraternal Order of Police established their first Lodge, there. It spread from there to many other cities in very short order. The FOP was not intended just to be a Lodge system, however; it also took on aspects of Unionization, a kind of bargaining force with the City whenever Members felt that Cops were not getting a fair deal from the Mayor. In many cases, in fact, their bargaining strength was augmented by the power of the greater Masonic power structure, a formidable force at the time.

Over time, actual unionization was also achieved in almost every major city, usually through the Mob’s control of the AFL-CIO, making it easier to arrange for hijacking of intrastate trucking or of dock cargo without anyone ever being sent to prison. But that’s another story. Ask any retired Union trucker or stevedore from Jersey. I’ve heard the same from 1975 Oregon members. The importance of that will explain to some Tis, those who believe they were targeted because they reported illicit drug operations or crimes which might be related to Unions, are targeted by Police. Additionally, of course, CIA sanctioned drug operations are protected by Police, as well. Thieves in bed with thieves, the bed made by the thieves.

Though New Orleans under the French had a Police Department as early as 1796, it had no Police Department for rather a long period of time after it raised the American flag. It was instead ‘policed’ by a vigilante system until 1853, when they formed their first ‘American’ Police Department. Almost immediately, they adopted the ancient Cresent and Star (upside down, larger star) as is common to Islam, as their badge. It is still in use, today, and appears on their cars, as well. Well before the FOP had even existed, this Department was already incorporating Masonic symbology directly in its badge. This is better known as the Shriner’s symbol, today… the Shriners being a Masonic fraternal lodge system.

 

iur

So, clearly, the Masonic influence and ties are present within most Police Departments. Cops form some of the strongest bonds between individuals in service outside of the Military, sufficiently strong, in fact, that if one of them asks a color-of-law favor of another, it is not likely to be turned down, and certainly unlikely to be exposed even if turned down. Therefore, it really only takes one Cop being approached from a fellow Lodge member to recruit several more for any needed aid, even if that request came from a lodge in another city. Ergo, escape to another city tends to never result in escape from targeting.

NOTE: That is why the Free Will Society exists; a solution to virtually all forms of targeting. Please join and support (donate/promote) our effort to create a targeting free intentional community of our own, and our other advanced programs planned for the future. If you are reading this, you should immediately join the Society and give it full support. It is a far more valuable TI resource in terms of programs and goals than any of the so-called ‘TI groups’ out there, today, the bulk of which are nothing more than information and disinformation mills.

Please: you owe it to yourself to visit freewillsociety.wordpress.com to learn more.

 

Three shoes?

Yes, there is a third shoe, one of special interest to those who feel the intelligence community lays behind their targeting. Every major Police Department in America has in place assets loyal to the Central Intelligence Agency, and many Officers have military intelligence backgrounds. Usually, you can count on some of them holding key positions within a given city: the Chief, the Public Relations Officer or Spokesperson, the head of Internal Affairs, the head of the Swat Team, and/or the Head of Personnel. From these posts, especially through IA, they are able to find bad cops who can be blackmailed into playing ball on an on-call basis, for any kind of dirty deed, to include color-of-law abuses such as is common to targeting. Don’t forget CIA drug running operations.

If that were not enough, there are similar, but far looser ties with FBI, Homeland Security, and the US Military Intelligence Agencies (and in some case, others, including the United Nations, and even Mossad). These generally entail the network of Fusion Centers and Centers for Excellence*, and special programs such as Community Policing and the Strong Cities Initiative/Network. When you consider that most all of these agencies use computer software based on CIA’s PROMIS data base management system, which is nothing more than a data base engine with a back door built in… almost any form of hanky-panky is possible. Ergo, the Navajo Beret Syndrome.

* Search for ‘Centers for Excellence + Homeland’ to see why I include it, here. All these items work together to collect, evaluate, and share information on (persons of interest). They operate as one big networked spy tool with usefulness in organized stalking which can easily be misused by anyone within LEA who has access.

So, even if Masons are not involved at all, Police can still be brought to bear on any given TI with the same level of efficiency, and in fact, the FOP can be leveraged into the equation just as easily, in reverse manner. Will the average member of the FOP, the Masons, the Police, or any of that long list of Agencies be aware of any of this? Absolutely not… not unless they are higher on the food chain. Then, of course, they won’t be admitting it, either. Complaining about it gains nothing. Knowing about it, and understanding it, can mean a lot, however.

You may not be able to beat it, but when the mystery is gone, its just another damned nuisance to deal with, and another reason to avoid trying to rely upon Police for help, unless you know one you have great respect and trust in. I was lucky. I had a relative who was a Cop in an uninvolved LEA, and he was able to help off the record in very useful ways. I also had help from ex FBI friends with back channel access, of like value.

We can’t all be so lucky. And if you are a TI, you know luck is not your strong suit.

Media’s Latest Conspiracy to Troll You on the Web


Fake news, tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations by Trolls and Bots are not the only weapons they use to dumb you down and pump you up with their version of truth. Vanishing is their latest trick.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   MeWe   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

The (fake) news media dilemma

Fake news and Web tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations are not the only weapons they use to dumb you down and pump you up with their version of truth. It is not just Trolls and Bots we have to worry about, now. Vanishing is the latest trick used to conceal the truth and promote the lies.

Unidistract

Image analyzing How Media Dumbs you Down with clever tricks (see link)

I’ve written before about how television mainstream dumbs you down with clever psychologically aimed technical tricks in the actual image… largely relating their use of subliminal messaging, deliberate distraction, and overload. The general purpose being to further reduce the actual news you walk away with to the simplest of boiled-down sound bites… just the ones with their take on the news shaped for you according to whatever bias the network has at management level.

Elsewhere, there have been excellent examples of the use of NLP (Neuro-Linguistic Programming), also employed by broadcast media. It involves careful wording as well as clever body language to project the intended viewer/listener response to the message, within the message delivery, itself. It has been shown to be so powerful, a well trained user (a stage magician and hypnotist, who must rely on such deceits), was able to deliberately speed past a Cop and then use NLP to leave the traffic stop without the Officer even remembering why he had stopped him in the first place.

That kind of mis and disinformation borders on mind control, and in fact relies on mind control technology, psychological methodologies, and MC research by the likes of the Central Intelligence Agency. When the great bulk of media is controlled by fewer and fewer mega corps, and their corporate leaders tend to be like-minded politically, you get the double whammy of biased news and fake news (propaganda). That’s bad enough, but this article is about another dirty little trick… a bag of them, actually, used by all forms of Media when presenting ‘news’ online.

fbi-mocing-test.jpgAnd, of course, we still apparently still have to contend with CIA’s Operation Mockingbird, the installation of CIA operatives within the media industry to help shape news to their preferred version. That, too, is something I’ve written about, at least in terms of its origins and history, and I’ve even been referenced as a resource in a more ‘official’ industry review of that topic by The Reporter’s Committee for Freedom of the Press. But now, we see, actual ‘retired’ ‘once-a company man, always a company man’ CIA officials are becoming investors in and on-camera commentators in mainstream news. This Clyde Lewis Ground Zero episode reveals how serious a threat the placement of intelligence community actors in media actually is.

What News is supposed to look like

All news is supposed to contain the 5 Ws… Who, What, When, Where, and hoW. Ideally, we also need to know the S and M… the news Source and the Meaningfulness, often defined by Motive… the Why. That is supposed to be factual Motive, and not speculation, unless clearly presented as speculative commentary. Lately, that’s the greatest sin Media is guilty of; too much ‘news,’ today, is actually mere commentary… the propaganda version.

Generally, for some strange reason, it is also rare to get all those points, especially online. The most critical things useful for research tend to be left out, making it hard for pundits and anyone trying to chase down answers to hard questions because a given story fails to ‘compute.’ That is critical, if one is to find out more, and judge for one’s self what is true, and what is fake. This is particularly distressing when the potential for a conspiracy or cover up is apparent. While Sheeple don’t even see the glaring holes in the official story, people who think for themselves really want to know why those holes exist.

But we ‘conspiracy theorists’ and politically aware non sheeple are thwarted at almost every turn. Take for instance, the WHEN. It is extremely rare in online news reports to find out exactly when an event took place… esp. useful to insure the same news event you find is the one you wanted, because often, you might have two identical sounding stories in the same city, in different time frames. Most searches are best made by searching on the (event key details) plus the year, and perhaps, month.

But many reports do not cite the year, at all. The Web is smart, though, and it knows when a given URL was created. Unfortunately, many of the larger online news sources use a kind of ‘feeder board’ URL created way back when, which is updated with current news, only, older news dropping off. While the Web remembers what the page looks like when the story you are looking for took place… that story is no longer there when you go to find it. While you can search the archives if they bother to offer one, and PERHAPS find it, that is just one hurdle in the search.

Once you do have what seems to be a correct story’s article, it is amazing how many news reports fail to include the date in the byline at the top of the page. So you have no way to know when the person writing sat down to write the story. But even with a byline date, you still have a problem: is that date the date the news took place, the date they wrote the story, or the date it was posted? It can be any of the three.

Some stories are updates to older stories, so the byline is meaningless unless the story itself indicates the actual When it took place in the text. THEY SELDOM DO. Instead, they just say something like ‘Last Tuesday.’ Great. What day of the week is the date of the byline? Now I have to go search that out, to make certain of the When. Your average Sheeple is not going to bother.

This problem also exists elsewhere in the remaining Ws and the S and M. At least one such detail is usually omitted, and all-too often, several. Sometimes, it is something simply not yet learned by reporters, but too often, it is clearly just not deemed important. All too many bylines even fail to tell you who wrote the story… so you can’t email them and ask for missing information. EVERY print article in a newspaper tells you this information, but for some reason, the online version seldom does.

Message distortion when relayed through many people

Dumbing down online is easy. It relies on the known scientific problem which transpires when a series of people relay a message from one to another to another, etc. It used to be in schools, that one of the first things they taught was this concept… that you you have to take care when relaying information. You have to listen carefully, and then just as carefully repeat it. The problem is, each person decides what is important enough to be carefully repeated, and tends to reword it for ‘simplification.’ So the message first stated has little resemblance to the message last heard. THAT is not being careful, it’s being careless.

Online, information deemed worth sharing is constantly relayed in social media in a quite similar, but an even more careless manner. Each person in the chain tends to introduce it with their own spin or commentary, advising what they think the takeaway is, or should be. They then (hopefully) provide the URL to the original (the careful part). They might also create or add an image or meme which underscores their takeaway thought. That is all in good, but…

memesSheeple don’t bother to click on the URL and read the original story, and they simply ‘learn’ the takeaway point of the previous poster. This is why Memes can often be dangerous. Especially when the creator is being deceitful or dishonest to the truth. They know that a false message repeated some 20 times will take root in the average Sheeple’s mind, and become adopted. That is especially important in political messages, because today’s social media is decidedly biased, and decidedly deceitful, even to the point of using paid trolls and automated bots to insure you are inundated with the preferred take aways.

This is why people who think for themselves always click the link or do a little extra search before they hit the SHARE button, and add their own takeaway. Is that you? Are you like me, spending roughly 50% of your time inspecting and then correcting other people’s wrong take aways and falsehoods? Or, are you part of the problem, simply passing it along? Baa… baa…

But there is a bigger problem, one which at least seems conspiratorial, and relies on the above Sheeple foibles and the omission of Ws, etc. For some reason, mainstream news sources seem to be deliberately making it difficult for you to access news, and difficult to relay, on your own; they would prefer to leave that to the professional trolls and bots you think are your online friends.

Something is very wrong with this picture. Lets take print media and look at how they operate outside the Web, and compare that to how they are now starting to operate on the Web.

A newspaper runs advertising to pay for their staff and overhead; it keeps the doors open, and allows them to grow and invest in special investigative projects. They charge for subscriptions and for individual copies at news stands based on the cost of the printing and distribution process, and materials; the ink and paper. That’s why newspapers are relatively inexpensive to buy. It used to be that the online version, therefore, just had advertising… there is essentially no comparative cost to put it out there and for you to access it.

But now, online, many newspapers, even small local ones, are telling you that you will need to subscribe or become a registered user to their online version, or pay a small fee to read the article… or that you may read this one, but it may be the last one you can read for free (relies on your cookies, but if you turn them off, you they will tell you to turn them on to see the material). Of course, once you do any of that, you’ve just sold yourself into another dozen marketing lists, without warning or compensation. But that’s not all.

Unknown-1

Suddenly, many media outlets online (radio, networks, print) are using something called Cloudflare. That product is a kind of ‘protection’ against certain abuses… a bit like an anti hacking or virus bot. But it does something else, as well. It also prevents anyone from copying and pasting a URL into a social media post. WHY? In the past, getting your URL spread about was a good thing; it brought them more viewers, which increased the value of the advertising opportunity for their Web pages. When did they decide they didn’t want more readers, and why?

Unknown-2

Where the Conspiracy comes in

Sure. You can call this answer a theory; a conspiracy theory. That is what it is, plain enough. The only way the above sins can be excused as desirable is if somewhere, someone important and powerful within media and in political realms, decided that it was advantageous to dumb you down, and limit your ability to rely on URLs to relay facts and correct people when in error. It is an insurance policy to protect the ‘integrity’ of the versions being spread by the trolls and bots.

I mean, when your read some crap someone has posted which is to your understanding just that, a lie or false belief, you should be able to go find a news article or other authoritative source online, copy the URL, and paste it into your reply to prove your case. When you are trying to educate someone on how you feel about something, you should be able to do much the same, to prepare your post or meme… have a supporting factual link to go with it.

Someone does not want you doing that. They want you to hear something said 20 times and accept it as truth, with no way to verify it, or refute it, if false. There is only one person in the media industry who fits the bill. If you are a Sheeple, you will recognize his name but not realize just how powerful in media he is, or in political realms, and how deceitful he is. I am speaking of George Soros.

It is that simple. When most of us rely on TV news, we only get one slant (liberal, usually, conservative if you go out of your way). Because of TV’s own special dumbing down tricks as earlier referenced, you will walk away with a very encapsulated message with is has no actual understanding associated with it. Then, when someone puts their slant on it and you get hit with that 20 times, it becomes your slant, and people like me and others who prefer to think for ourselves, are increasingly finding it difficult to correct any errors.

Worse, if you do think for yourself, you may not be able to learn what you need to make an informed decision, up front. Heaven help you if you are trying to investigate what seems like a conspiracy theory, because of glaring holes in the official story. Obscuring the true story seems to be the way of things, today, so just ‘move along, folks.. nothing to see, here.’

iurWhen you add all this to what is taking place in the public school system and in higher education (liberal indoctrination), your children will think this is the way it is supposed to be, and whomever is in power when they are adults will be able to do and get away with whatever they want. They will dictate to them what to believe, and it will be believed. The notion of thinking for themselves, and of distrusting and challenging government will be foreign concepts. They might as well be called the 20x Generation.

The ’Snowflakes’ on the left are already a part of that group, unwilling to listen to facts or reason, and repeating what they are told to believe. I, for one, am not willing to pass the reigns of our nation’s future over to them, in their current state of mind. I’d rather have an armed revolution, if that is what it takes, to end their madness for them. Constant outrage based on lies serves no one’s best interest, except at the top of the food chain.

So my last question for you is this: do you want to be a Sheeple morsel for Wolves like Soros and his elite political friends, people more interested in Globalism than what is right and moral? Or do you want to be a think-for-yourself consumer of actual news you can easily access, rely upon, and use when talking to others about things which matter to you?

If the later, you had better start complaining to media, and to politicians about it. You might even want to consider taking legal action or starting an initiative ballot, if your State has that option, to write laws forcing journalists to adhere to journalistic standards and to make their stories available more appropriately. You certainly ought not simply be sharing what is being fed you currently without verifying for yourself it is the truth.

Else we all become 20xers… or we have that revolution, the least desirable of options.

U.S.P.S. “Informed Delivery” Potential Threat to Everyone, Esp. Stalking Victims


Thanks to the Post Office, now anyone can know what’s in your mailbox, automatically… including of course, anyone in an alphabet agency. It is just another way to track you and criminalize you if deemed convenient, in time.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

“Informed Delivery?”

web_USPSThe idea is you register online with USPS for the FREE notification subscription service, and they then photograph the mail to be delivered to you each day, and email the images to you before delivery; that way, you know if something is stolen or lost and NOT in the delivery, and can plan on getting expected items. It is tied to other services, as well, such as package notifications, tracking services, stamp purchases, etc.

1) This is the federal government we are talking about. The FBI, CIA, and a host of other alphabeticals would have no trouble whatsoever accessing this information. There is no indication that such information is not retained indefinitely, and no privacy statement which alleviates concerns over it being used against you down the road should you become a person of interest, or a trouble maker such as a whistleblower, activist, or other targeted individual.

2) The system is achieved with online registry, and is handled by email, currently with no truly secure process for verification of the applicant or notification of the addressee that a subscription has taken place. Stalkers, private investigators, suspicious spouses or ex spouses or lovers with an axe to grind, or anyone else with minimalist information about you and where you live could sign up pretending to be you… again to include someone working for a government agency who could not be bothered with a warrant — knowing that they could later get a warrant and legally go back in time to ‘duplicate’ the effort in a manner which leaves no proof they violated your rights, earlier.

3) this means that mail must be separately sorted one more time by someone into individual stacks to ‘pose’ for the photograph, and then to take the image and email it… or the entire automated system must significantly modified at both the hardware and software level. Both are at great expense and will cost USPS more red ink… and eventually that cost will increase the price of postage for everyone, not just those using the service.

4) If the system is automated (and even a manual system will be, eventually), then it means EVERYONE’S MAIL is being imaged, all the time: The USPS becomes yet one more information tracking and tracing point available to the government, and under the program, anyone spoofing it.

I’m not the only one pointing these things out… though I’m the only one so far who has pointed out 3 & 4. Other privacy experts have echoed 1 & 2, variously, mostly item 2. Too many people PRESUME that government would NEVER use such a service to spy on them this way. That’s what they said about NSA and FBI when they first started.

Defensive Measure?

It appears the only way to prevent anyone to spoof the system to spy on your mail is to beat them to the punch and register, yourself. However, there is no assurance in place that someone could not still additionally register an alternate email identity. We can only hope and presume there is an online software check which would reject any such attempt.

Short of not taking mail, at all, there is no defense against government use of the images, if you are a person of interest targeted in someway by an agency.

https://link.usps.com/2017/08/29/informed-delivery/

Risks in 12 Step Programs, esp. for TIs


What most people fail to realize is where these programs came from and the potential for targeting abuse by sinister forces.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

12 Step Origins

I am not going to tell you there is no value in any specific outwardly decent 12 Step Program. They do tend to have value to the countless individuals who desperately sought and found through them a path out of a self-destructive addiction or abuse. As such, they also generally have an excellent track record of success vs. failures.
However, I am going to tell you why they can become a trap for select individuals, and just why and how. I am referring to targeted persons and non targeted persons who hold power, influence, or key positions of any kind. I am also going to offer a very simple alternative which has no traps, no downsides, and no financial or time burdens; something that’s been around for thousands of years. It has worked for me, repeatedly, for both serious uses (including targeting), and more frivolous. It is a 1-step solution.
Like the Freemasons and Knights Templar before them, 12 Steps outwardly maintain a squeaky clean public image, but what is inside at the higher levels of operation can be insidious, especially to those select individuals. Also like them, they profess to be God-centered, but fail to define the nature of God or rely on Christian doctrine in their dealings. While even the bulk of staff may think these things true and hold personal faiths they see melding with the program usefully, it does not mean that internally, the truth is not otherwise.
This is because the very first 12 step programs were introduced almost simultaneously and by the same people as two other dark forces applied to the needs of their founders — persons of mutual interests who, in oversimplification, I’ll call the New World Order. That can mean the Illuminati, the Masonic influence, the 1%, globalists, members of round table groups, or even satanists, etc. You are welcome to free associate as you wish; all is usefully accurate within the realm of perpdom.
The first such program, circa 1920, was to combat alcoholism, just in time for prohibition. Many others followed the 12-step blueprint for other ‘habits,’ over time… and while some may have been absent of dark influence when founded, they all would be rather easy to infiltrate. The two additional forces spoken of can be seen as quite related in purpose and means to the darker nature of the ‘bad’ 12 step programs; actual mind control research projects, and the New Age movement, itself. All three served as a means to the same kinds of goals; growing the force I call Shadow in my book set, Fatal Rebirth, detailing the games played by modern-day Illuminati.
12-steps.3

Technically, there is a 13th step, one early in the program; the assigning of a help mate, intending that you each help one another to stay on the narrow path, since ‘you can’t do it on your own.’

The New Age movement and select early mind control research, as well as the first 12 Step, were all funded by and proxy organized for the Rockefellers and Rothchilds, with counterparts in Europe. The New Age stuff started with the establishment of the Theosophical Society, which evolved series of petri-dish style afterbirths of cults, false religions, and philosophical mysticisms any Mason would relish. That’s not just rhetoric, because most of these mind game groups were organized along the Masonic lodge system, where secrets were king, and held only by the higher ranks, and/or used to manipulate and control members.

Divinity    emblemfix  Rockefeller Foundation_0.png  Unknown-12    th-19

Templars          Masons                                                                    Theosophy     Rothchilds

We need not get into mind control, here; most readers will already know more than they want to about that, first hand. Those that don’t know, should stop right here, and go read my book, MC Realities. In that book, I produce a Timeline of Masonic/Illuminati/MC Evolutions. It specifically outlines with nearly 80 entries (and more again in the text of the book) several thousand years of such treachery. It includes the 12 Steps.
Again, not wanting to paint the wrong picture about 12 steps, the darker side or risk is not a concrete given for any individual program. Some are undoubtedly completely safe. But if the person seeking their help is already a TI or someone of power and influence, the risk is not insignificant. As a consultant to TIs, at least a dozen clients I have worked with were shown to have been targeted and/or manipulated through their 12-step. This was at times the origin of the targeting, and at others, simply augmentation of existing targeting. This was divided about 50-50.
The primary risk for non TIs is BLACKMAIL, as the 12 step programs always include FULL CONFESSION with prying out of juicy details, things which can result in one’s being targeted to take advantage. While the core of it is during sessions, additional information can be gleaned through the additional risk… which is the fact that attendees are given an ASSIGNED PARTNER (sometimes called a ‘sponsor’), and the resulting effort to become very close and ‘mutually reliant.’ Where the program has a nefarious side, that partner is not very likely to be one’s true helper, as proclaimed for purpose. But they will grow very close, learn much, and be able to exert influence, and even sabotage the victim of their deceits.
In some cases, other attendees and staff members of the program can also be turned against the TI, though generally in ways undetected until too late. Once participation in targeting is detected, an adversarial relationship can quickly develop, with decidedly one-sided advantage; the targeted will suffer a lack of credibility, and the threat of their secrets being revealed. In one one such case, it resulted in physical assaults and scare tactics, one of which eventually resulted in the accidental death of the TI.
Sidebar comment regarding other attendee participation: bear in mind that each attendee is in a similar position of vulnerability, and can be subject to manipulative forces at the psychological level which coerce their cooperation in any such targeting. In time, they may be discerned and known as ‘visible’ perps, but this is not quite the case.
The real evil never shows its face; the attendees themselves are also victims, likely unwitting conspirators in they know-not-what. They do not deserve hatred or vilification, but pity and prayers, if not perhaps outreach and education as to the ‘MC Realities’ of their own situation. It is not impossible to turn them to the TI’s side as covert operative; a means to learn who the invisible persons are, and their motives.
I will go so far as to say, that 12 step counseling sessions are operated using known psychological control methods designed to lower the defenses and encourage the attendee to spill their guts, and accept advice and help which in fact is intended to control them. It is not any different than any other form of mind control in terms of intent or result, even when the purpose is benevolent, as advertised. It is, after all, the intent of such programs to help the individual to do things they have been unable to achieve on their own… to control their actions for good. But when used for the nefarious, the results can be devastating well before any sense of betrayal is realized (if ever). Where already a TI, one can be easily sabotaged and brought deeper under control through the 12-step.
Where the individual is powerful or well placed to the interests of the NWO, it becomes a very simple thing to gain control over the individual either by blackmail and or influential manipulation by the assigned partner or ‘buddy.’ Imagine a Senator with a drug or sex problem, or a key corporate employee with access to proprietary secrets; perfect blackmail candidates. These manipulations can can also provide an avenue or stage for the introduction of other forms of mind control or targeting down the road; the victim becomes an ongoing TI.
Consider the oddest and most shocking news out of the District of Columbia, and other power centers. This can explain why Congressionals sometimes do some of the crazy things they do, things contrary to their party’s and constituents interests. And when failing to do as bid, it can account for public disclosure of their sins in a way which forces them from office. Government often happens by manipulation and graft more than by reasoned and proper loyalty to the oath of office.
Knowing what is going on is everything, when it comes to targeting. In all cases but the one death, my clients fared better defensively once knowing the 12 steps was involved, and broke all ties. The one situation was well out of control before the client made contact, and ended badly before we had even fully explored his case. Perhaps if he had come to me sooner. Note, by the way, due to a number of mutually impacting personal reasons, I no longer offer such client services. I am, however, happy to answer simple generic questions which do not require in-depth understanding of one’s situation. I also offer a free Helps Kit and other aids via proparanoidgroup at gmail com.

The 1 step solution is also useful in targeting issues

Many TIs will immediately understand this statement: targeting is satanic in method and intent, and its primary target is almost always a Christian, especially if weak or new to struggling with their faith. Less commonly understood, the secondary enemies are the Jew and the Muslim, for all three worship the same God of Abraham, who is the only real enemy Satan has. Yes, there are victims in other categories, including atheists, but in small numbers compared to Christians, et. al. To aid understanding, consider that all forms of mind control cause an increase in activity of those portions of the brain used in negative and sinful thoughts, moods, and actions, while suppressing those portions used for good, specifically to include prayer and meditation.
Conversely, as you might rightly deduce, prayer and meditation achieve the exact opposite.
I devote a whole chapter in my book, MC Realities, on the role played by faith in God in mounting a proper defensive campaign against targeting. It shows in clear terms just exactly how and why something as simple as PROPERLY (very easy to do it incorrectly) applying scripture and prayer can have stark and powerful results. It includes both the theological and the scientific explanations as to how that can be so. It should therefore be no surprise that a 12-step can be replaced with the same principles. Instead of applying it against targeting, it is instead simply applied against the ‘enemy’ for which a particular 12 Step Program might hold promise of relief. AND YET, IT CAN BE APPLIED AGAINST TARGETING ISSUES, TOO!
I make that chapter available free of charge on request: proparanoidgroup at gmail com.
What do I mean by ‘issues?’ The issues are the psychological harms of targeting; fear, anger, withdrawal, outbursts, hatreds, and so forth (things from the ‘dark’ side of the brain). These things work together to foster hyper vigilance, a form of paranoia, which can over time grow to exhibit or mimic schizophrenia, where everyone and everything is ‘targeting,’ when it cannot be so. Many think the goal of targeting is murder by slow death or suicide. The actual goal in most cases is simply to make the TI seem insane, and actually to drive them well into that state of mind. Suicide is merely an unhappy proof of success.
To fare well defensively, one must be able to ignore things which are not truly a threat (simply manipulative), and focus only on those things which are (especially those things which cause physiological or financial harms), or which might lead to learning more about the who, why, and how of the targeting — the things useful in mounting defensive and even offensive strategies. All else is a waste of life, and a destroyer of free will. By that, I mean that the TI does what is expected of them by their enemy, not what is useful to the self. Yet so often, I see TIs who would rather spend their time worrying about every single thing every single moment, and complaining about it constantly, instead of working in an organized manner that might better their standing.
Let me tell you how well it can work, both as 12 step substitute, and in targeting…
My personal testimony: I am an alcoholic. That is a medical fact. I exhibit every single trait or warning sign. However, unlike members of Alcoholics Anonymous, the first-ever 12-step, I am able to drink without fear of falling off the wagon. I am in full control, and can drink socially, or for the matter, simply drink for the taste — I love a couple of Margaritas with meals each week, and I might take a single or double Shot of really good aged Scotch once every couple of months. I never get drink for a buzz or to get drunk. I have replaced any ‘need’ with simple moderation. I’ve been doing it for more than a decade.
In like manner, I’ve historically had a problem with pornography. I’ve spent countless hours each week chasing after some elusive fantasy which life was unable to provide in reality. No more. I am actually amused to say I can launch a porn movie on one of my screens, and work or play a game in the other, and not be drawn to the lurid screen by temptation. But if attention is drawn by something unusual in periphery, it is for no more than a reflexive glance, no matter how ‘hot’ the action. That dual-screen game was something I did to test myself, to see if I was cured. Poof! All done!
Both of these were serious threats to my wellbeing in many ways. No need to visit all of that. The important thing is, how easy it was to stop, essentially Cold Turkey, with JUST ONE SIMPLE STEP. Obviously, any physiological aftermath such as from cold-turkey ending of a drug addiction (or nicotine) will still need to be dealt with. But even after ‘drying out,’ an addict will still have the urges and temptations, and the worry about ‘falling off the wagon.’ THAT is what the 12-step is designed to address, and why the buddy system can be of great value, and why, once you join, you need to continue, FOR LIFE. With the one-step, you instead rely on medical advice and help for the short-term physiological aftermath.
Though Christian-based and thousands of years old, it is not quite like what you would expect, and certainly not exactly like any faith-based attempts you may have already seen fail. And, it works: it even helped me with my own targeting experiences. The simplest explanation is that it allowed me to stop knee-jerk reactions and to focus only on those things which enabled victory. Three times in my life I’ve been targeted, and all three times, I ended it through defensive and offensive efforts which would not have been possible, otherwise. The details are in my books.
As to the one-step, itself, explaining that is a lot harder than is the doing. Why? Because I would need to address endless questions about this, that, and the other aspect, as rightful Doubting Thomas, or apprehensive skeptic, might have — especially if unsuccessfully having tried something thought to be ‘similar,’ before. You would want it to fit the knowledge into the context of YOUR situation. It would make this blog more like a book chapter, to deal with all of that. Instead, I’m going to refer you to a couple of videos that provide those answers. They will move you, and motivate you, and educate you — and more to the point, allow YOU to fit it to your situation, be it targeting, or something else.
The first will show you who you really are on the stage of life, and open your eyes in ways you had not previously considered about Christian faith, even if well grounded theologically. It is an 11 minute mind grabber simply called The Gospel, but it is not going to be what you expect. It will give you the foundation within which the second video will have meaningful context. Watch it!
The second is actually a sermon delivered by the same man who’s voice you heard in the first video. He is Pastor Eric Ludy of the Ellerslie Campus, which is devoted to training missionaries and teaching Bible-based living. While you can bet no one there has any inkling about mind control or much to do with dealing with addictions, this sermon can easily apply to any addiction/abuse issue a 12-step might address, as well as to the emotional and psychological woes imposed by targeting. The ONE STEP is revealed in depth.
The title is Overcoming Sin. Any addiction/abuse problem is sin. Targeting is sin. The TI is induced by targeting into sin. Therefore, the solution is to overcome sin, in all these cases, and likely, many more in our daily lives. This is the secret that I’ve never heard any other theologian reveal, and never found in any book, though a casual glance might leave one thinking it identical in nature. In nature, yes, but fullness, no. I promise you, that if you endure the full 1.5 hour presentation, you will walk away amazed and eager to apply what you have learned. You WILL thank God! BAM! Just like that. Watch it!
As you do, keep these thoughts in mind…
  • The sermon uses the topic of powers and principalities of ancient times to frame the lesson… and both addiction/abuse and targeting are born of powers and principalities, as is all sin…
  • An addict/abuser ‘worships’ their particular sin of consequence…
  • A TI ‘worships’ (by constant worried attention) their targeting issues of consequence (equating to sin)…
  • Bending the knee to Assyria in the sermon equates to giving in to sin…
  • So (the Pharaoh of Egypt) equates to you (your flesh, the Old Man) and your inadequate will power to resist sin…
  • Which in turn equates to buying into the enemy’s (sin) Press Releases (that they cannot be resisted) wholeheartedly, accepting the belief the enemy cannot be overcome, by or of ourselves…
  • If you listen carefully, you will hear echoes of 12-step program dialogs! They simply borrow the truth and apply it in their own way… and with respect to targeting, twist it to meet their own ends.
The above will help you to get more out of the sermon for the topical purposes of this post. If you get value from the sermon, you can find other of his sermons, here.
You may also benefit from select other posts related to targeting:

‘Seeing Through’ NWO ‘Illumination’


The Antichrist is coming, and there needs to be a throne ready for him to occupy. Thus the New World Order is stepping up its one-world government effort and increasing their visibility in the process… and translucence… which equates to luciferian Illuminati-like illumination… often in the form of giant glass pyramids.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

 

What you will learn from this post:

  • the Illuminati, Freemasons, Knights Templar, & Round Table Groups are the NWO;
  • with the same fascination with ancient mysticism, occult, and numerology;
  • and the same desire to associate their works with symbolism such as the pyramid;
  • that they have been building pyramids seeking to employ mystical aspects similar to Cheops, the grandest of Egyptian pyramids;
  • said pyramids sharing commonalities in occult alignments and numerological peculiarities;
  • where one complex of pyramids is tied to a rather interesting conspiracy Egyptian in nature;
  • and another complex of pyramids appears to involve hi-tech mind control;
  • and is itself apparently aligned with all pyramids in Europe, and likely, elsewhere!

x

The Source of Illumination is darkness…

In several of my books touching upon aspects of the New World Order, I carefully point out the important role played by Freemasons and their involvement with the dark occult and, primarily, ancient Egyptian mysticism and numerology (specifically, where numbers can translate into meanings with magical powers of manifestation). I am not talking about the rank and file lodge members duped into thinking it merely a benevolent fraternal organization, but of the satanic High Masons and select Masonic operational organs which operate secretly, within. The satanic Illuminati, for instance, sprang out of and followed Masonic constructs and principles… and it was they who officially launched the New World Order movement in 1776, their goal to destroy all governments and religions, to replace with their own, providing a seat for the Antichrist. We can also thank them, and head Mason and avowed satanist, Albert Pike, for the KKK, and more.

It seems quite apparent to those who study the nature of Globalists who seek the N.W.O., that they are usually High Masons, satanists or otherwise steeped in the occult. They are often members of or work through the so-called Round Table Groups, such as the Council on Foreign Relations, the Trilateral Commission, the Bilderbergers, the Club of Rome… groups made up of power moguls who control corporations and whole industries, government agencies and military power, and media and education. These, collectively, can be called Globalists, because they seek a one-world government, which is needed in order to seat the Antichrist.

In their works, they frequently employ the same symbolism and engage in occult events right along side of others of their ilk (i.e., Bohemian Grove). While what they believe (occult) should seem silly to a rational person, I remind the reader that it does not matter what you believe to be true, or false… it only matters what they believe. If you fail to acknowledge their beliefs as part and parcel of their modus operandi, you will fail to recognize them and their works, and be unprepared for their plans as they unfold. And much has unfolded, in plain sight.

cheopsHere, I will focus on one small aspect of their existence which is quite central to their beliefs; one of their most sacred of visual icons, the Egyptian Pyramids. Pyramids, especially the largest, Cheops, are as important to the Masonic underpinnings of the NWO as is the Cross to Christians. More so, in fact, as it is far more than mere symbol, to them; it is a powerful tool, and their fascination with ancient Egyptian mythology is quite anchored in Cheops. One need only look at the pyramid found on the obverse of the Dollar Bill and its all-seeing eye, to find a stark example. Of late, for a variety of disparate but coincidental reasons, I have made more recent observations which relate to this notion… things which you can easily verify yourself by use of Google Earth.

Square one, the base lines of Cheops

Cheops is the largest of the Egyptian pyramids, having many astrological alignments and dimensional (numerological) mysteries, among them being it was said to have been located at the the center of all land mass; it’s axis therefore dividing the known Earth at the time into quarters; Cheops baselines were aligned due North/South/East/West. As the N.W.O. players gain in power and ability to establish a one-world government (needed if there is to be a single leader in the person of the Antichrist), they also become more blatantly visible as such a force, which means it more frequently relies upon ancient symbolism in its workings.

So, then, I wondered… might there be more than a few NWO pyramids being ‘hidden in plain sight’?

There are, of course, many pyramids around the World, especially the ancient stone variety. These come in two flavors; the Egyptian, the biggies with their seemingly smooth triangular shapes (as seen at a bit of distance), and the Mayan/Aztec stepped structures, a style not unknown in Egypt, and elsewhere for the matter. The Masons have only an interest in the former, it seems, but my curiosity was about much newer structures, those built with modern methods and materials. Would the many newer pyramids around the World exhibit traits similar to Cheops, such as alignments or dimensions of occult significance?

Absolutely. And why not? A glass pyramid is the perfect embodiment of both the ancient pyramid mythos and of Satan; sunlight reflecting from within and without by day, and electric light glowing from within by night — all work to render them both translucent and illuminated, with bright glaring highlights akin to the all-seeing eye, depending on one’s viewpoint and the angle of lighting/reflection. As a work of man, they are both awe inspiring and mysterious, working on the subconscious in unfathomable primal ways not sensed by the conscious mind without pause and consideration. Even so, one is apt to embrace and bask in their presence despite any darker connotations, for they are undeniably beautiful works of architectural ‘art.’

So let us pause and consider with conscious effort…

Square 2: a review of new pyramids around the World

There have been more than 50 new/modern pyramids quietly built around the World in the last several decades, most of them made of glass and metal, and strangely, more than half of them in North America. A couple are faux pyramids with incomplete architecture in and of their own, but one included a second pyramid on site, and the other had a completed pyramid at top, and so, were included in the study. The idea was to see if their base lines or diagonals aligned with other pyramids (ancient or modern), or if any three or more centers or corners might align. Examinations for numerological meanings were also to be considered, early on, but the growing number of pyramids made that effort too monumental. Still, some interesting discoveries along that line were made.

I found so many alignments (almost 150) and associated numerical translations in place that I felt it was appropriate to establish some sort of test group to illustrate the difference between conspiratorial intention and random coincidence. For example, at one point well into the project, EVERY new pyramid except one revealed between two and nine alignments with one-another, and/or with Cheops, itself. One had 18 alignments. So a simple control group was added: some 30 Mayan/Aztec variety, plus nearly 6 inverted modern pyramid structures were added to the study. If these, too, yielded such results, the study could easily be argued as being inconclusive.

But they did not.

Only one formed a single alignment with any other pyramid, new or ancient, and it featured no resulting numerological significance. Clearly, the massive alignments in the new pyramids were intended by the powers that be, those persons behind purchase of the location and setting design criteria as to angular placement, size, and location on the property… especially true when multiple pyramids at the same location (as is the case in ancient Egypt) were undertaken. Therefore, the test groups were excluded in findings, which proved validity of both the methodology and hypothesis. Since only the new pyramids (not inverted) formed alignments, it had to be by intention.

While about a third of the new sites are single pyramid locations, there are several with two or three (like the main pyramids at Cheops), 3 with five pyramids, and one with 8, across nearly 50 locations. I then wondered if perhaps other old, but not ancient pyramids or locations deemed ‘holy’ by the Illumnati might not also offer alignments. Adding a handful of small pyramid burial sites by Masonic persons of wealth and power, as well as the death site of Adam Weishaupt, founder of the Illuminati, and the ‘headquarters’ from which he operated his secret cabal proved that notion, as well. I was unable to discern his precise birth place beyond the name of the city (Gotha, which is ironic in its own right, because Weishaupt and the Illuminati were very goth).

At the point where I felt the matter was amply proven, I had by then added eight older sites, typically 100-200 years old, though one dates to 12 BC, in Rome. It is the Pyramid of Cestius, circa 12 BC, at a time when Rome was, like the Templars, enthralled with the mysticism of Egypt. It is a site well known to Templars and Masons. The others are all in Europe, save one in America, and two of them relate directly to the Illuminati; Adam Weishaupt’s grave, the ‘headquarters’ where he planned and executed Illuminati plans, and perhaps the definitive Knights Templar location — Templehof (Templar Temple House), all in Germany. As these last three are not known to have involved pyramids on site, they are only used in scoring other pyramids which align with them, and not evaluated on their own, even though they would score fairly high.

So the alignments created in total involved alignments between ancient, historically old, and modern pyramids. The symbolism and mysticism of such structures by their special alignments, regardless of if rendered in aged stone or in modern metal and glass — are clearly as important to their builders as the function and beauty of their designs. All were starkly beautiful, and quite functional, to be sure; a perfect way to subtly reinforce the notion of luciferian and Masonic imagery upon the subconscious minds of citizens otherwise mesmerized at what they were seeing… especially when illuminated to great advantage by sunlight or voltage.

The problem of useful presentation

But describing all these alignments textually makes for boring reading. I will give just two instances as example, next, as they are quite tied together. It will be the only review of numerological ties, though more like it, exist, and with notable frequency. Trying to present the topic graphically is also challenging for other reasons, but I will attempt that, as well, in a third review. I will then provide a very simplified summary of selected findings to illustrate the scale and nature of alignments found, with a scoring system to relate symbolic spookiness.

But first, a disclaimer is required, because I always challenge any Doubting Thomas’s to duplicate my research before they make any false presumptions as to validity of my findings, and because the research tool involved (Google Earth) has its own technical limitations with which carelessness can impact upon accuracy.

Disclaimer: regarding some figures and claims herein about alignments and measures, accuracy is sometimes more difficult to affirm via Google Earth. Google Earth allows an accuracy to within a meter or so at ground-level, but things can get more complex when one starts trying to plot and measure lines with accuracy to the far side of the globe, and/or where the locations may be nearer to the Poles than Equator, or on/near altitude changes. Satellite images used in Google Earth are sometimes taken at oblique angles on either or both the horizontal and vertical, such that visual distortions of a pyramid can make true angular alignment (in compass degrees) or even measuring its base length, difficult to accurately determine. When dealing with such angular imagery, the center of the pyramid will be other than visually depicted, requiring one to make cross lines corner-to-corner to find the true center. The quality of image can also vary, but generally, line placement accuracy can be determined within 1-3 feet (roughly the line’s width). The images for two sites were so bad that it was impossible to determine if base line/diagonal alignments existed, but at least their location was known with GPS accuracy for the purpose of central alignments.

Additionally, one must take care insure the Pyramid(s) in question are centered in the view, and to reset the ’tilt’ (View > Reset > Tilt) after zooming in, or additional angular errors can be introduced, as the lines one lays for determinations themselves ‘float’ above the ground. In fact, where the pyramid is quite large, one may find the line ‘crawls up the face,’ providing additional distortion which must be defeated. The degree of inaccuracy in any given instance should not unnecessarily render the information herein as invalid; the thrust and intent behind the location and positioning of glass pyramids is clearly not casually undertaken. Also FYI, distances between pyramids herein are rounded figures, if there is no mystical number involved.

Verbal presentation example

841142-500x334Paris features two glass pyramids at the Louvre Museum, one large, one small and inverted, which form alignments to four other sites (the only inverted structure to do so, likely because it additionally features a normal pyramid, as well). There are three much smaller ones, as well, serving as skylights, which I chose to ignore, early on, and then forgot about, later; they would likely have established other alignments, as similar skylights on streets elsewhere, had done.

Two of the alignments at the Louvre are baselines from the larger pyramid to the same pyramid site in Texas, where they also align with the baseline of one, and the diagonal of another of three found there, essentially parallel. Three more alignments exist to three other sites involving three corner/center combinations, one of which is Cheops some 3232 km distant. Masonry’s highest publicly acknowledged ranks are the 32nd and 33rd degrees. The number 3232 is a ‘magic number’ in Satanic numerology, because it is a doublet, which doubles its ‘power’ (amplifies its importance), and because it sums to 55 (another doublet), one divisible by 11 (a doublet which makes 33 three times as powerful), and further sums to make 10. Again, it matters not what you believe about numerology, but what they believe…

And, this is what they believe about these numbers:

In the occult, 5 is the number of the planet. According to one-time head of early freemasonry, and avowed satanist, Alistair Crowley, 11 is “the number of Magick, itself,” and of sin, or evil corruption. 10, on the other hand, is the number of ‘heaven and earth in interaction’ (‘good vs. evil‘), and the symbol of it in the Greek (‘deca’) is the triangle, of which a pyramid employs 4, which means ‘strength and integrity,’ which is certainly a trait of the Pyramid. For the matter, the number 32 relates to ‘inspiring of truth and living by it,’ which is to say… the very promise and implied hope of illumination.  Unfortunately, illumination means something rather different to those with a darker agenda, something closer to that which the serpent spoke of in the Garden of Eden. These are not the only meanings found in general numerology, but the ones preferred by dark occultists.

Extending the base lines of each of the Louvre pyramids westward 3500 m will take you, again in parallel manner, to the center unit of one, and a corner of the other of two glass pyramids built in Westborough, MA, by globalist pharma firm, Astra Zeneca (astra in the occult relates to supernatural weapons). Another line can be drawn from the lower corner of the larger pyramid at Louvre, through the center of the smaller one, there, to pass through the diagonal of the center pyramid of three atop a very Masonic looking Federal Government office building in Ottawa, Canada.

The smaller pyramid in Paris is 2 m shy of being 1/10th the base line dimension of Cheops, while the larger one is two meters more than 1/6th of Cheops. The larger Astra is 1/6th greater than the larger of Paris, and the smaller 1/2 the size of the smaller in Paris. The Ottawa pyramids are 1/4th the size of the largest at the Louvre, and 1/25th of Cheops, and 2 m shy of being 1/2 the smaller Astra. I would love to analyze the actual dimensions of all these, if they were readily available.

In Chile, the resort complex at San Alfonso Del Mar features a giant glass pyramid on the beach with four alignments. It is aligned such that its base line will bisect with the center of one of the lesser stepped Egyptian pyramids. Two more alignments are to diagonals of a pyramid in London, and one in China, 20 km from Hong Kong. A third aligns with the corners of two pyramids in Islamic Astana, Kazakhstan which, though richly expressing Islam in the property’s design, is also rich with Egyptian symbology.

The Chilean Pyramid base is also one/sixth the size of Cheop’s (38.3333 m, a number which is found many times in the fuller study in either location, size, or compass readings of various pyramids). It is located on the 38th Southern Parallel and the 32.32 Meridian. 38 sums to 11 (Magick) but itself can mean ‘Lucifer, the will of the Devil.’ 1/6th = 18%, where 18 = 9+9 (99 doublet) and 3 x 6 (666 triplet — even more powerful than a doublet, and Satan’s name). 18 itself means ‘Oppression, bondage, slavery,’ and = 3 (a ‘perfect number’ meaning fullness) x 6 (the soul of man) = 666 (legend/man/illumination).

A graphical review

Enough textual description; it is too boring and difficult to make sense of. Let’s try graphical, looking at hotel resort complex at Galveston, Texas, which also consisted of three Pyramids. This is one of several with 8 or more alignments, and perhaps the most interesting in terms of just what they align with, and how.

It may help to review what qualifies as ‘aligning,’ so you know what you understand why the lines look the way they do. The alignment must involve at least three points of contact between two distant pyramids, based on corners and centers. A baseline is two points, a diagonal or perpendicular from a baseline through the center being three points, but the distant pyramid must still have at least one such point of alignment, as well. If only one, it must be its center, but aligning with two corners on two different pyramids, there, is another way to align.

There are examples in my study were a baseline, perpendicular, or diagonal aligns with yet another baseline, perpendicular, or diagonal (four to six critical points total); a much harder thing to achieve. In like manner, some can be extended to align with yet other points of other pyramids at a third location; an even more dramatic alignment. I have found as many as five pyramids in three locations involved in a single alignment across the globe… with 14 points of alignment in all. These harder kinds of alignments should be next to impossible by random occurrence. Yet every single pyramid exhibits them.

And we have two such virtual impossibilities illustrated in our visual review at Moody Gardens, in Galveston, TX. Two of them actually involve Cheops, as earlier reference in the textual description, the ultimate of all possible alignments from the Masonic viewpoint. In fact, I find it the second-most interesting of all modern sites, in terms of alignments (the first, at Sauerland, Germany, is impossible to show in this manner as it enjoys 23 alignments. UPDATE: 43 in a row, and I finally stopped bothering!

pyramids.jpg

Galveston Moody Gardens Hotel complex; three pyramids, one pink, one blue, one glass (gray), forming 8 alignments to six pyramids, including two with Cheops!

Clockwise from Noon in the image, we see an align to the Nekoma Air Force Station, an experimental anti-missile defense system long abandoned. What is interesting is that one of it’s seven alignments goes to the only pyramid in South Korea — quite dependent upon U.S. anti-missile technology. That’s interesting, because there is another pyramid in N. Korea, and one of its several aligns goes to the Las Vegas Casino pyramid, which in turn aligns back to the Nekoma site. It is as if both N. and S. Korea are ‘borrowing’ from American military power, after a fashion, to create or reflect a ‘stalemate.’

Next we have two aligns effectively ‘parallel’ to the ‘holiest’ of Masonic pyramids in Egypt, involving a total of nine critical points with three pyramids. There is then an align to the Rock and Roll Hall of fame in Cleveland, OH, where it passes through the center of both pyramids, there (one small, complete pyramid, and one very large incomplete, or faux pyramid. There, the base of the larger less the base of the smaller, is equal to 1/3rd the base of Cheops.

We find an align to a now defunct pyramid on Miamii’s beach. Fairly ordinary as alignments go, it was built as a promotional venue for the international beer company, Heineken. Despite being temporary, it was placed to form at least three alignments on its own. Then, in like manner to the two aligns to Cheops, we have two more going to the two pictured Biosphere pyramids, which, like the two Rock and Roll pyramids bisected with the same line from Moody Gardens, have both of their pyramids bisected with an align from Nekoma (coming full circle, if you will, to form a triangle). In fact, Nekoma is itself involved in a total of 6 such three-way triangles. One of those involves the Miramar retail store, our final align from Moody Gardens, for two such triangles sharing Moody and Nekoma locations. Miramar is the other incomplete faux pyramid, in that only two opposing sides are triangular walls. Miramar, in turn, with two pyramids, forms 6 aligns, including one to the very Masonic Capital grounds of Australia, at Canberra.

So far, we’ve only closely looked at two out of about 50 locations. You can see how hard it is to use either text and/or graphics to reveal it usefully. So let’s now try a different way, and employ a chart with a scoring system designed to rate the comparative ‘spookiness’ factor of a given ancient or historically old site’s alignments with new pyramids or other holy illuminati locations, including each other. To further reduce the clutter, it will then only look at sites which directly connect to them, in even briefer review, sans scoring. The scoring system replaces trying to compute and display the actual odds of the alignment, which would be as high as 10 figures:1, in many cases.

For example, the odds of just a single alignment of the simplest kind, center to baseline, diagonal, or perpendicular or to two corners of two pyramids at destination (earning the lowest possible score of 1 in my scoring scheme) would have actual odds of 202,500:1 against. That is based on the notion of worst case accuracy of 1/10th of a degree of arc… meaning that each pyramid would have 10 x 360 degrees of potentially useful compass positioning, divided by 8, as there are 4 lines the pyramid which establish a total of 8 possible compass vectors. You need to multiply each pyramid by each of the others involved if aligning to another baseline, diagonal, or perpendicular. A baseline to baseline alignment odds would be 164,025,000,000:1 by such reasoning. Such odds are multiplied further by additional alignments at the site. Argh!

Technically, that’s too simple, because angular placement is not the only factor. Size and relative positioning plays a role, too, when two corners/centers of two different pyramids at the same site are involved, but I’m not going there without a super computer!

Now, if you want to argue that the actual accuracy we should using is tighter than that, implying room for error in ‘finding aligns,’ consider for a moment that only one alignment with the Mayan/Aztec pyramids was possible using the same accuracy as I employed. That makes a pretty good case that the alignments were intended regardless of whatever actual accuracy was employed. Even if you allowed for my own human error, there are so many alignments that they could not all have been for my error, given the Mayan/Aztec set enjoyed no similar quantity of errors. But by all means, feel free to correct my math/assumptions if you are of bookmaker caliber in computing odds, but I’m pretty sure I’ve got it right, based on some experience in statistical data analysis; I once ran my own marketing research firm which ran probability studies. No matter: we will use scoring, instead…

Scoring is as follows:

  • center point to corners of two pyramids or a base/diagonal/perpendicular of 1 pyramid (simple alignment) = 1 point for the alignment;
  • base/diagonal/perpendicular to same (complex alignment) = 5 points for the alignment;
  • Bonus 5 points for any parallel alignments or alignments to multiple pyramids of one site to multiple pyramids of another site (parallel/pair alignment);
  • any extended link to an additional pyramid (extended alignment) = alignment score x 5;
  • link to Cheops (Cheops alignment) = x 5;
  • link to other Egyptian pyramids or Illuminati sites (Illuminati alignment) = x 3;
  • link to other historically old sites (Masonic alignment) = x 2;
  • 1 point for each alignment and for each pyramid at site;
  • magic numbers, angles, dimensions, etc., not part of scoring;
  • Cheops gets a bonus of 33 points, Illuminati sites 11 points, Masonic 7 points
  • maximum score limited to 99

Great Pyramid of Giza, Egypt

Egyptian Pyramids 13 aligns w 6 pyramids on site (Δ) = 99 points: 29°58’44.54″ 31°8’3.65″
Complex Parallel to Sauerland (5+5 points), 3 Simple Parallel to Dubai (6×3), 3 to Sauerland (6×3), 2 Simple Parallels to Galveston (6×2), Complex to Niagara Falls (5), Simple to Louvre (1), to Eatonton GA (1), to San Alfonso del Mar Chile (1) 85 total +33 > 99.

x
a580cb07b1ac956d82946b7d61620f36Cestius pyramid in Rome 5 aligns w 1 Δ = 99 points: 41°52’34.97″ 12°28’51.16″
Complex Extended (three times — 4 Δ at 3 sites, in all!) to Manitoba Capitol and on to Miramar Retail (5x5x5x5), Simple Masonic to Karlsruhe Mausoleum (1×2), Simple to Pheonix Jeju S. Korea (1×2 – Phoenix is Masonic/Egyptian), to Sauerland (1), to Portsmouth UK (1) > 99 points

x
de1cc2b8de1458f8253ea7ad9335618eStar pyramid mausoleum Scotland 3 aligns w 1 Δ = 34 points:  56° 7’19.42″  3°56’43.72″
Simple Illuminati Extended to Weishaupt’s grave, to Gold House IL in opposite direction (1x5x5), Simple to Cooperative Bank UK (1) 27 points + 7 Masonic site = 34

x
karlsrhueKarlsruhe pyramid mausoleum 7 aligns w 1 Δ = 27 points: 49° 0’33.22″ 8°24’14.05″
Simple Illuminati to Illuminati HQ (1×5), Simple Masonic to Cestius (1×2), to Kazakh RU (1×2 — rich with masonic/egyptian architecture), Simple to Dubai (1), to Edmonton Capitol (1), to Cal State U. (1) 20 points + 7 Masonic site = 27

x
th-11Bickling mausoleum UK 2 alignments w 1 Δ = 13 points:  52°49’9.01″  1°12’48.36″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13

x
Graceland-Landscape-Schoenhofen-MonumentSchoenhofen Mausoleum Graceland Chicago 2 alignments w 1 Δ = 13 points: 41°57’33.56″ 87°39’34.09″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13

 

What follows is a simpler summary of the first few of the destination sites mentioned sites as evaluated from their position…

Sauerland 23 aligns, 8 Δ, Dubai 13 aligns, 5 Δ; Moody at Galveston, 8 aligns, 3 Δ; Niagra Falls 2 aligns, 1 Δ; Louvre 7 aligns, 2 Δ; Etonton GA 2 aligns, 1 Δ; San Alfonzo del Mar 4 aligns, 1 Δ; Manitoba Capitol 9 aligns, 9 Δ treated as a single Δ as they all directly touched one another 3×3, and were each relatively small; Miramar Retail 7 aligns, 2 Δ; Pheonix Jeju S. Korea 6 aligns, 1 Δ (note: N. Korea has a Δ, too).

These are all quite typical of all sites evaluated, globally. The only site which scored 1 (1 align) was a site which has had its 2 pyramids removed/destroyed, disallowing angular alignment determinations, though the center of one of the pyramids was known, allowing an align by that method.

CONSPIRACY ALERT: That site, by the way, is tied to a little known conspiracy surrounding the Nuwabian Nation, an all-egyptian-like community of almost exclusively black people which was seized and razed to the ground by the U.S. and Georgia State and County governments. They were allegedly targeted for being a cult, subversive group, criminal organization, nest of child abusers, or a swindle… depending on who you ask. Seems like everyone had a pet excuse, including YouTube who seems to regularly censor vids on topic for their usual list of fabrications. Note the resemblance in some of the ceremonial dress to masonic lodges such as the Shriners (Nuwabians, like the lodge system, also use the terms, Orders, and Lodges). All Egyptian is wrong, too; they also were adoptively and by blood associated with Native Americans of the Yamassee Federation of Tribes, among them the Seminole.

nuwabian

I count at least 8 pyramids on site before destruction. The black pyramid , as primary ceremonial structure, was the only one I was able to locate, but not know its alignment with any certainty. These people were very serious and deeply involved in their culture building and adherence, despite the amusement park-like construct of their community.

Note on mausoleums: What we see in our review is that the three mausoleums share unique ‘coincidences’ in that each aligns with an Illuminati historic site honoring Weishaupt, and each in turn is honored for having done so by Sauerland aligning with them. There are many such pyramid mausoleums in Europe, America, and a few scattered elsewhere, far too many, in fact, to encourage me to dig further. Regardless, as the very first and only three reviewed all shared these two features, I’ve no doubt that others do, as well. A single Mason could easily undertake a single such alignment to a point of their own choosing, and more modern pyramid builders could easily accommodate at least one or more such mausoleums in their own alignment considerations. This brings us too…

Sauerland, enigma equal to Cheops

sauerland

Sauerland is one of the newest of all sites, a complex of 8 pyramids which appears it may even involve mind control research. It certainly defies normal property development, architectural design, and building contractor norms in several ways. First, its location is on a hill overlooking an industrial park, and despite looking like a luxury retreat, is in fact the corporate campus of biomed tech company, Rayonex Schwingungstechnik (Rayonex Vibration Technology). It started with three pyramids, and has since grown to eight.

Second, the site has an adjacent and extremely unique high observation tower (about 110′ high) which overlooks the pyramids and the valley, just high enough that morning sun could shine through the large holes in the upper level and onto the pyramids, creating unique shadows. This was a trick employed in ancient Egypt using Washington Monument style oblelisks, such that at a certain time, a shadow might point to a secret place within the greater site (as seen in Indiana Jones and the Lost Ark. The tower’s corner shadow does fall over the pyramid property. But, let’s just call that a pipe dream.

You do have a pipe of some sort, don’t you… and a whip and hat?

Third, each building is offset irregularly and apart from each the other with no obvious pattern or reason, and likewise, quite contrary to normal designs, angled one from the other up to 3 degrees or so in compass alignment. It is my belief that this is what enables it to accommodate so many alignments, a thing which would require planing with a fairly complex computer program, to determine. Finally, again unlike most complexes, even where ‘luxury’ is intended, no two buildings are built or designed the same; each has an entirely different layout and appearance, though some features at least look similar. Usually, a cookie cutter approach to keep costs down would be employed. Yes, even in corporate campus design.

Then there is the very small pyramid surrounded by a water feature. I found construction photos that show a drill being used on a hole there, approximately 1 meter wide, with smooth walls. It was associated with an article on geothermal drilling which led to a very interesting YouTube promotional video that is really worth the watch; it will intrigue and educate you. After watching, though, ask yourself if the expense this likely represents would normally be deemed appropriate for a small fish pond? The video seems to address that with a blanket statement, but does it, really?

I learned also, that the small pyramid over that hole is the only one on the property using metal walls. The other, larger pyramids use some kind of unusual looking material which requires special application, according to other construction images I found. The panels used on them might logically be radiographic in nature, designed to limit or enhance radio waves of select frequencies, given the nature of the company’s work, as you shall see. In like manner, I can imagine the holes drilled by that machine could be used to install an array of underground EMF sensors or emitters. The video implies the array of radially and laterally drilled holes provides a series of ‘pipes’ which may in fact be perpendicular to one or more of the pyramids. Just why these possibilities are raised, is covered below.

Also unusual, is that one of the original three pyramids (perhaps more, now) is strictly for therapy use, with ten therapy stations. In each pyramid, a security computer controls all lights, window blinds, and door locks, and though there is no manual switch anywhere within for any of these, each workstation is said to have its own localized control over these features. But the security system computer can override, which makes it a rather creepy place with respect to potential for political control and overbearing security solutions against occupants, Big Brother style… especially if you don’t have authorized access to a workstation. Undoubtedly, there are plenty of security cameras, and I find it disconcerting that some pyramids have no windows, whatsoever — normally a code violation, unless a warehouse or factory. One must ask why so much expense and devotion to therapy and externalized security control over environment would be required? Let’s take a peek, and see.

The answer raises more questions. This is a unique kind of high tech firm. Their product/services would seem to involve mind enhancement, mind bending, or even mind control, but certainly relate to biophysics and therapy of some kind. One or more of those possibilities is very likely; the firm does research in electronic frequencies upon the human body (bioresonance), among other things. According to Wikipedia, bioresonance is all based on pseudoscience, which is a polite term for ‘made up BS by con artists’. Dunno about that, because…

This is also the sort of stuff useful in DEW Weapons for behavioral control (Political Control Technology). Of course, such tech is always researched and funded based on some good it might accomplish, including the combating of electrohypersensitivity, which many TIs suffer from because of their constant DEW targeting, or some preexisting natural sensitivity. I have it, myself. But once a patent is filed and governments or dark-minded NGOs get wind…

museumNow, about that tower… What if it was for security guards overseeing grounds security should an alarm goes off of some sort. The tower does have its own large building which might be suitable to house a security force. Hold that thought in mind while reading the next paragraphs. Turns out it is not just an observation tower, and not just any building. And, while guards might be rather far fetched a notion, there is more to consider.

The pyramid shape is also known as a Frustum by Masons; a shape used by the military in times of old in a manner not unlike a Tank Trap. Like a tank trap, as a shape, it cannot be easily overcome when several are placed together, there being no level foothold between them (a steep V shape), and its sharp corners, especially at the top, inhibiting climbing. More importantly, because its sides are sloped, one cannot hide behind a frustum, if the enemy holds high ground… such as a castle wall… or a high observation tower. Just exploring possibilities, here… but far-fetched or no, it fits the spookiness factor of the place.

But as stated, that’s not all. The platform is merely the top level of what is actually a mine shaft elevator lift. The building is currently a mining museum with access to a huge abandoned mine; they actually take you down into it with hard hat and light, etc. So, like Cheops, there are underground passages beneath the Sauerland pyramids. It is, of course, possible that some of those passages might be remodeled into something else entirely different, like many old mines are, today. It is even possible there are ways to access them from within one or more of the pyramids. Now wouldn’t that be a mystery to discover and explore, whip at the ready? However, all this causes me to hope no one would go drilling a bunch of radial holes over an abandoned mine… if they didn’t know exactly where the mine’s cavities were…

Now, last mystery. Look carefully at the top of the platform at the left corner nearest. No. That’s not a machine gun, though it can potentially be used to ‘shoot.’ It’s appears to be Yagi antenna, normally used to transmit or receive microwave signals in an amplified manner, along a narrowly aimed path. But wait! Where does it aim? At the top of that tower, as high as it is, the thing is aimed squarely at a hillside nearly four times as high as the platform. Useless, as seen. But wait! Just beneath the top rail is a what looks like a motor; the shaft can rotate. At the top is what appears to be a motor at an appropriate angle to change vertical angle. The white object appears to be a housing of a control system operated remotely. I used to sell such systems for video security setups based on microwave relay. Pretty sure of what I’m seeing. And, there is a second pole identical to the first which could be similarly fitted, and which may have been since the photo was taken.

Why would you want that? Well, you might want to tune in distant TV stations, except they don’t broadcast in microwave. You could use it to grab someone’s cell phone signal, if you knew exactly where their phone was, to aim it. There are yagi antennas that can be used for those things, but they would look different. But what if you owned a bioresonance laboratory with some human guinea pigs? What if you could place them in rooms within a pyramid, where the slope of the pyramid was roughly perpendicular to a high mounted, aimable microwave transmitter, such that every subject got exactly the same dose of signal at the same time, or such that you could specifically target a given subject with a unique signal? It would probably look a lot like Sauerland. You think?

I only mention this, because older pictures, before the pyramids were built on site, don’t show such a ‘gun.’

Is it a conspiracy?

If one concludes that it is impossible that by mere chance alone, every modern and non Mayan/Astec-style pyramid should align with other pyramids, including Egyptian… then it has to be by intelligent design by agreed-to planning by a group of many persons with like agenda. That it is done covertly and involves mystical occult reliance… removes it from the realm of benevolent methodology or intent. That these pyramids can be found in countries of opposing political, religious, and ideological beliefs… precisely fits the Illuminati model and game plan established by its founder, and reflected in Morals and Dogma, the ‘Masonic Bible’ written by Albert Pike. That the only persons financially and powerfully placed are able to arrange for such things tend to also be members of Round Table Groups and are often also Freemasons… would seem to cement all these considerations into a single image: that of a conspiracy. That there is the possibility that it even involves mind control is, to say the least, the ultimate and most heinous form of conspiracy.

Every man is entitled therefore, to give any explanation of the symbols and a system of the doctrine that he can render palatable…  Of all the means I know to lead men, the most effectual is a concealed mystery.” Adam Weishaupt

 

 

 

There is a Mark of the Beast Implant with YOUR NAME on it


This is an old topic that’s lost traction in the public eye, but in the background, the enemy continues to work ever closer to fulfilling prophecy about Mark of the Beast. Now, employees are being asked to implant themselves in order to get snacks, get through doors, and access workstations and photocopier.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

What you will learn reading this post:

  • what RFID is, who is behind it, and why you should fear it;
  • about Digital Angel, and the bio implant tracking version of RFID;
  • why you should fear it, put away petty ideological differences, and unite against it
  • what you can do to defend against it;
  • the greater strategy RFID is in support of (the ultimate threat). 

 

Invasion of privacy tiny in size, massive in scope

mxkvjtxrwdpybs6zxnuv

Tracking implant quite similar in shape to a much larger one found in my own leg some 35 years ago. State of the art, today, are smaller, translucent, bond with and look like human tissue: invisible to a surgeon and to x-ray. MRI sees them as a blemish. Less sophisticated units without GPS/cellular/wifi capability can be as small as the period in this sentence.

Recent news stories, including a particularly scary one referenced in red text, herein, have forced me to draw upon years of research and dig out my old PowerPoint presentation, 666 Reasons for Smart Dust and RFID Technology, as presented as the keynote presentation at Conspiracycon 2010, in Santa Clara. Any definitive presentation must go back to the beginning, or the dots won’t quite usefully connect. This is going to impact YOU in YOUR LIFETIME. Actually, it already has, and you just don’t know it; the water temperature is slowly being raised on we Frogs, and it’s quite hot, already. Hopefully… we can somehow jump out before its too late.

Smart Dust and RFID tracking technology are quite related, but Smart Dust is not going to be a part of this presentation, except to say that it is nanotech capable of much more than RFID, but it is not an implant. While it is represents its own significant threat to social, financial, and physical security and well being, it is less useful than a tracking implant for the population at large, and cannot play the role of Mark of the Beast. Fortunately, it will not likely ever be used against anyone not deemed a high-priority national security risk. You know, like Will Smith, in Enemy of the State.

digitalangel

The less costly Digital Angel implant

RFID, however, is the very heart of the tracking bio implant, the most obscene version and infamous of which is Digital Angel. That’s the name of a CIA front central in pushing for implants, but also often used to describe their chip, itself as a product trade name. They also offer a wide variety of tracking systems which are non implant, such as wearable items like watches and ankle bracelets.

But we need start with a broader view on RFID to fully understand the greater threat this topic represents. Non implant (and seemingly harmless) versions of RFID are already used to track an endless array of products, and you are quite likely to bring them home every time you go shopping. In retail, it is mostly benign, but it becomes the bedrock of a useful personal tracking system.

What?

Mostly benign? Check this out, an edited and updated excerpt from my book, The Professional Paranoid: How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual (third ed.) Excerpt begins…

 

Smart Dust, RFID, and the Mark of the Beast

 

i want you to consider the first letter of this sentence; the lack of capitalization is not a typo. I wanted to draw attention to the dot above the letter ‘i.’ There is a reason… there is an RFID invasion taking place, and some of the invaders can be just that small.

implantedhandThe Bible tells us that in the End Times, there can be no transaction between persons for goods or services unless both parties have the mark. Revelation 13:16-17And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: 17 and that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.”

Though the Mark of the Beast is thought of as being the number 666, that is not quite the case. That is the number of the Beast himself (the Antichrist) in numerology evaluation of his name. The original words used in the original Greek texts of the New Testament can be translated to mean ‘insert’ as well as ‘mark.’ Thus there are growing numbers of people who think that some form of Digital Angel bio implant will be the actual marking device. This section will illustrate that likelihood and educate you on just how close to that day we may be.

This will make sense later: implants are the mark for the hands of peons, and marks on the forehead are the mark for meons.

What is Digital Angel? It is a firm which is known for a series of tracking products, including bio implants, all based on RFID technology. Simply put, it is a passive device which, when scanned with a low-energy RF signal, responds with a signal of its own, broadcasting a unique identification number or other data. Early versions of this are still commonly found in clunky removable/disposable merchandise security tags installed by retailers which can trigger alarms when shoplifted goods exit the store. In the modern version, the product manufacturer includes the chip which enables the same feature without the retailer needing to do anything but take delivery of the goods.

There is a whole emerging industry based on RFID, and it, in turn, impacts on almost all other industry sectors. The industry is driven at its heart by the military and intelligence community with the help of corporations who are part and parcel of the NWO elite, as defined by the makeup of their directors and other corporate leadership or ownership. What they want to do with RFID is mind boggling, as is what RFID is capable of in terms of invasion of privacy. To start, they want every single product manufactured and sold to have its own unique RFID tag, and are pitching it to manufacturers and retailers as the next evolution of bar code.

Similar chips in credit cards technically allow purchase without the need to remove the credit card from the wallet, though they currently require us to scan the card. But all that is really be needed is to specify which of several credit cards we might be carrying was desired to be used. That could be verbal, by touch screen, or smart phone application, which avoids producing the card. RFID is also being built into phones for comparison with credit cards nearby, to allow verbal telephone purchases to be made without the need to verbally confirm credit card details. The bio implant is ‘sold’ to us as a convenience to replace all of that (examples to follow).

That is the ‘convenience’ under which it will be sold to us in the retail world, and if a cash register can scan these chips, so can the device at the door looking for merchandise which had not yet been purchased. Why stop there? Anyone can put small and hidden scanners (with or without cameras) anywhere, and for any reason… such as at every doorway where some form of security or tracking feature is desired. By scanning RFID credit cards, the identity of everyone passing through is logged and time stamped without their knowledge or participation. Actually, any RFID tag on your person can do the same thing (it is being built into clothing), because your identity can be associated with its purchase. And that is just the beginning. Ergo, the national ID ‘Real IDprogram is based on RFID, and eventually, the human body itself will be its on RFID ‘ID.’

exploded$In the very near future, it will serve law enforcement. At the scene of the crime detectives will often find discarded items potentially belonging to a suspect. They analyze these for clues, such as fingerprints, to build a list of suspects. In a world of RFID-only purchases, every object also identifies who purchased it, when, and where (often also useful clues in prosecution). What about cash purchases to thwart RFID records keeping? Not a problem. You didn’t think for a moment that those little slivers concealed in the left-hand portion of your new money was truly just a counterfeiting deterrent, did you? Put anything but a $1 bill in your microwave oven and it will explode when operated… a trait of RFID. Moral of the story; don’t casually discard product wrappers, especially if you think someone might use them to implicate you in a crime; burn them.

Unknown-1.jpeg

Actual TIAO logo

But it gets worse. For any of this to work smoothly, somewhere, someone needs to catalog and keep all those transaction records and make them available for government’s needs. Enter the Total Information Awareness Office (TIAO), AKA the Terrorist Information Awareness Office. This was modeled after an expanded version of FINCEN (Financial Crimes Enforcement Network) capabilities (check this out); and was MILITARY led and very Intelligence community friendly Defense Advanced Research Projects Agency (DARPA) project. I’ve seen the original DOD call for papers and the final description of capabilities and intended uses for the TIAO, and it has little to do with targeting terrorists. Instead, it has to do with capturing records of EVERY transaction between EVERY citizen and business, as well as the passing of ANY citizen through ANY doorway in selected locations. Further, it will track vehicles past checkpoints and can log other kinds of interactions or transactions between people and each other or real world objects (i.e., machinery, vending machines.)

tiaomap

Everything in this image under Transactional Data, and all the little colored storage systems (the cloud), and Corporate Memory, comes largely from backdoor access to RFID-based data. The red Privacy and Security dotted line was added AFTER privacy concerns, to imply a search warrant would be employed (untrue). Intel data would include access to NSA’s massive global wire tap, as well as all of the other 16 spy agencies of the U.S., and those of friendly nations.

Update: TIAO ‘went away’ due to public protest and ‘too many questions,’ including “Why was the head to be a convicted criminal participant in Iran Contra, an ex Naval officer of significant credentials tied to CIA and the Pentagon, John Poindexter?” And yet, it did not actually go away. It has instead been quietly replaced with the OIA; the Office of Intelligence Analysis, another new super-secret spy agency operated out of Homeland Security. They, in turn, gently established ‘Fusion Centers.’

Fusion Centers are ‘sold to us‘ as a happy pill having nothing to with dark deeds, and as being established by cities and state governments in order to share information between partnering civic and federal agencies, local businesses and NGOs for improved security against terrorism and ‘other threats.’ In truth, they are hotbeds of social spies who operate external of the centers within those groups of partners on behalf of DHS and the intelligence agencies. It is often a source of organized gang stalking, and a collection point of ‘data’ about ‘other threats.’ We are the threats, and the data is obtained through backdoor access to the ‘data’ about us found in participant computers, including RFID transactions, security and traffic cams — and via gang stalking and the associated psychological profiling. It is a kind of fascist Brown Shirt group without the uniform, replaced with a smile and handshake… and big eyes and ears.

And worse still. If government decides it wants to know even more about you, a black van can drive by your home and scan it to collect the sum total of all information from all RFID tags (or Smart Dust) found within the home. They will quickly know EXACTLY what is in your home, where you got it, how you got it, and when. This gives field agents the ability to gain access to that kind of information in a very focused way instead of having to run tedious database searches which would necessarily include bureaucratic handling and, perhaps, the dreaded and feared need for a pesky warrant.

And, worst of all, the ultimate expression of RFID privacy abuse is to put one in the human body, with or without the target’s knowledge. The question is, how close are we to this nightmare, and what can we do about it? The answer is, we are frighteningly close, and in fact, it has already been happening for decades.

  1. RFID is already being put on thousands of products you buy today. Even common mundane consumer goods like Gillette razors and Max Factor makeup have been ‘chipped’ with RFID. Walmart pioneered its use, and used cameras (which opens up a whole new personal security threat for the chip) to track customers through the store, and record RFID transactions. There are also shopping carts with built-in ‘product information displays’ which can track every item you handle while in the store, and profile your shopping experiences over time. You can bet there were cameras connected to scanners scattered throughout town by CIA or the military (Walmart Board included ex military and intelligence agency types at the time), as well, to see where else you went and what else you did, to test it as a spy tool. Many manufacturers have placed orders for hundreds of millions of RFID tags and millions of scanners. They have to be in use somewhere.
  2. Many tens of millions of RFID equipped credit cards have already been issued. You can spot these visually if they are transparent, or if the credit card number has a lot of zeros in the middle, or a gold foil rectangular emblem about ½ inch square. Though sold to us as a ‘security feature,’ they are the opposite: content can be stolen by proximity scanning without your knowledge, and then the RFID and card can be cloned by thieves for use at your expense. I’ve caught such a thief scanning at the doorway to Walmart. He was pretending to be making a phone call… pacing back in forth in ways that maneuvered him in behind victims. But there are also home-made scanners which can scan from hundreds of feet away.
  3. Most cell phones use SIM card technology incorporating RFID (the SIM card, more than the phone, identifies the authorized user). This is often used in phone apps to facilitate cardless credit transactions (i.e., iPay)
  4. Virtually every maker of cash registers and point of sale systems is developing low-cost attachments to existing cash register and credit card scanners to sense RFID, as well as whole new systems to replace the old with simplified operation and reduced cost — this allows self service checkout and the elimination of the sales clerk, so it will be promoted as a ‘cost reduction’ tool. But don’t expect to see savings passed on to consumers. Money already has the needed strip in place and it likely has been RFID capable all along without our knowledge.
  5. All employee scan cards use RFID. Hotel room key cards use RFID. Federal Express, UPS, etc., all use RFID shipping labels. Monthly bus passes, season tickets, and the like, also employ RFID.
  6. Pets and livestock have been being implanted with RFID for decades. Within the last ten years, thousands of people have, as well, largely through efforts to chip children ‘to protect them against kidnapping.’ There are nudist resorts where you can volunteer to have one injected to represent your credit card information for purchases at nudist-camp points of purchase for services and goods. Otherwise you must carry your wallet or purse and keep an eye on them. What fun is that if trying to commune with Mother Nature and your bank account? In July of 2017, a company announced break room vending systems and software to allow implanted employees to access snacks without money. Learn more here. Soon, you will see implants being promoted for use with parking meters, fast lane highway access, and on, and on, and on.
  7. Bioimplants can easily be implanted in a human without requiring their knowledge or consent. All they will know is they woke up with what seems to be an insect bite. This can be done while they sleep via covert entry of their home, or at distance with a special pneumatic sniper rifle.
  8. According to several news accounts, countless livestock has been slaughtered with the implants still in place, their meat ground and sold, and consumed by unaware purchasers. Despite massive recall efforts, not one package of meat was recovered. RFID implants are made of glass, plastic, and poisonous metals.
  9. Some school systems are requiring children to use their fingerprints with scanners in order to get their school lunches. This is bad enough, but the firm that makes the equipment used also offers an RFID attachment in lieu of the fingerprint scanner, and mentions implants in their literature as an option.
  10. One maker of RFID, in marketing it for aircraft part identification in an assembled aircraft (the goal being to track parts which might be subject to safety recall, and a feature useful in crash investigations) chose a trade name for their RFID of ‘The Mark.’ The part number when Boeing Aircraft orders it from the maker is alleged by employees to be 666.

 

What can you do to defend against it?

Aside from sharing this post, not much. Be very vocal and protesting at every opportunity any discovered use of the technology. You might demand RFID tagged merchandise be detagged or the tag neutralized before you leave the store, but that would make you look crazy. However, organizing endless group protests can have an effect. Any firm that covertly uses it should be razed to the ground (sued into oblivion for violation of privacy). Any government office holder should be kicked out of office if they support the technology in any way, shape or form, or simply fail to oppose it. In my opinion, preparation for revolution should be made if these efforts fail, because that would be the only remaining recourse prior to full enslavement.
Back to the bible. In The Book of Revelations where the reference originates, there is also one more clue RFID will be the basis of the Mark of the Beast. One at a time, the Seven Angels open the Seven Seals to unleash seven deadly punishments upon the unfaithful on the earth. One of these states that those with the Mark of the Beast will suffer severe pain and many will perish from it. A subtle clue.

As it happens, there is one feature about RFID which must be told to make sense of this, and it suggests how to thwart the tech: if exposed to high energy radiation, RFID heats up incredibly and explodes. A burst of high energy radiation levels will literally destroy it… such as an intense solar CME blast (Coronal Mass Ejection – a high RF/EMF energy field). At this time, I cannot tell you how to generate such an energy and safely use and aim it, but it has been suggested by other experts than a ten second microwave oven exposure should be sufficient. Now if I just had a portable unit I could waltz through the retail Aisles with… set to ‘Burst’ mode… but you can bet there will be or already are laws written to make that illegal.

But there is something simpler which also defeats the technology. Metal shields the signals. Thus wrapping a National ID or an RFID equipped credit card or object (i.e., chipped hand) in aluminum foil defeats the device’s ability to communicate. When the revolution comes, if that is our future, there will be portable devices which anyone could build from easily obtained parts to detect or destroy RFID at will. I fear the day this is needed. I also say woe to those involved in the use of RFID should it come to that. End excerpted material.

There is one other thing you can do. The response time for reading a scanned RFID is very brief. There is a ‘failure’ in reading called ‘tag collision.’ When too many RFID tags of the same frequency (usually dictated by type of tag/use of tag) are present in a confined space, the scanner can fail to capture the data, or capture the wrong data. Therefore, if one were to collect dozens of RFID tags of various types and put them into a bag to carry along with them, it would effectively become a scanner blocker. Keep all your old canceled credit cards in the same wallet as your valid ones, sandwiching the new between the old, and pull them ALL out to select the one to use, holding them all in the same hand to swipe.

I also advise against Smart Appliances, and smart meters. RFID is at the heart of interaction with Smart Meters, which in turn is its own invasive privacy and stalking threat (widely experienced as a directed energy weapon). Worse, it is tied to mapping of the interior of your home; the floor layout, location of furnishings and other appliances and electronics, smart or otherwise. Programs are being developed to allow such mapping information to be available to manufacturers of smart devices and used to market to you based on use of not just their product, but all products. Naturally, all that can be accessed by government, as well… and hackers partnered with burglars.

I also suggest taking advantage of these resources as contingency against the worst:

How to war with the NWO; How to survive the NWO; and Localized defensive strategies.

 

The history of RFD tells all

It starts with Howard Hughes, though he was a victim, not an instigator. Most of us are familiar with his rise to being the richest man on Earth in his day, and his fall due to a mental condition which impacted his ability to interact with people, and life in general. The untold story is that once debilitated, CIA agents and Mormons (CIA likes to recruit from Mormans, and Masons, because such cults have secrets and know how to keep them through compartmentalization and other methods) became his ‘caregivers and managers.’ He trusted them, and they took advantage.

Once in control, his vast resources were diverted to CIA control and application. Hughes Shipbuilding built several spy vessels including the Glomar Explorer and companion vessel, both designed to retrieve sunken Soviet Subs. Hughes TWA aircraft and assets were diverted to form (over time) three different CIA ‘airlines,’ including the most recent, Evergreen Aviation, which wound up acquiring Hughes’ Spruce Goose for its museum. Hughes Tools, the financial cash cow of Howard’s meteoric rise, a maker of drilling systems for the oil industry, would eventually become Enron, and we know how that wound up vanishing billions of dollars into thin air. The remnants of Enron’s data processing center would be applied to CIA fronts engaged in porn (to profile user sexual preferences for possible blackmail application), web site hijacking (I was a victim of that, documented here), offshore gambling, and 4-1-9 scams (Nigerian money investment scams).

Then there were Hughes operations which would evolve to serve CIA’s efforts in Political Control Technology development and application. It starts with Hughes Aircraft’s electronics division, eventually become Hughes Electronics, which invented the RFID concept. These were originally used to identify and track cattle, marketed through Hughes Identification Devices, but also found their way into humans involved in early (late 1940s) non consensual CIA mind control projects and Atomic Energy Commission radiation experiments on civilians. I wound up with one in my leg, when as a child, when I was injected with a radioactive substance in Yakima, near the Hanford Energy Reservation.

From Hughes, the chip was migrated to Destron Fearing, and from there to our friend, Digital Angel. We will come back to them. More CIA fronts or partners duped into participation would be created in America and globally to market implants for humans. They do big business in ‘police state’ countries, often for the purpose of chipping persons in the criminal system. Of course, it is privately understood they are good for tracking anyone you wish to track, such as embarrassing political activists and whistleblowers.

LocatePLUS is a Homeland Security created and CIA infected front which pushes the implant in America and advertizes that it maintains 12 billion records covering 98% of the American Population. The DHS/CIA knows all about you and is making money selling you to anyone with the money. In America, the front markets to FBI, ATF, DEA, and 2000 law enforcement agencies, primarily non implant products such as ankle bracelets.

In Europe, the front Worldwide Information is a LocatePLUS spinoff doing much the same. Global reach far outstrips American consumption (there are a lot of fascists out there, in almost every government system): Universal Microchip in Italy, IDECHIP S.A. markets in Ecuador and Brazil, Solusat Medica in Mexico, Scientific Innovation and Integration (SII) in Korea, Taiwan, China, and Japan, Inforlexus Inc., for Malaysia and Indochina, Biometronix for Germany, Glezer Technology in Israel, and Cybertek in Puerto Rico. This list continues to grow; the Swedish firm Biohax International is behind the implant for snacks story.

The primary American front (a sister to LocatePLUS), Metro Risk Management Group, sold $13M worth of chips over 5 years to the Bonneville Power Administration (to track fish, officially). BPA is a Department of Energy firm which had in the same time frame been in the news because of high-tech spying operations having been detected taking place in their facilities… while BPA and Enron were significant others in the same bed. The U.S. Military contracted for $24M, while they sold $1M to private citizens wishing to chip their children or themselves. They sold $7M to the greater Intelligence community, and $73M for ‘internal use,’ which is to say, CIA, itself. Such orders are a combination of implants and scanner systems, both portable handhelds and installable units for security gates and doorways. A typical order might consist of hundreds of thousands of devices and a thousand scanners.

All this data represents 2005-2009. Sales are increasing over time, but increasingly hard to track for a variety of reasons, including corporate name changes, mergers, spinoffs, and other tactics often seen in CIA fronts trying to be a moving target. And the implant business is a target by activists and activist organizations worried about invasion of privacy and civil rights, to say nothing of some kind of New World Order nightmare ending with the Antichrist at Armegeddon. And, they are constantly being sued in court for a wide variety of reasons.

And this brings us back to Digital Angel, the key point in the bioimplant tracking food chain. As stated, a lot of business names and hanky-panky tactics are often employed by CIA fronts, as outlined in The Professional Paranoid, a privacy/security how to which, in covering that topic, helps readers to identify who is really causing the bumps in their night, should they be so unlucky (as was I). So let’s take a look at Digital Angel, again based on older ten-year research (I’m not going through that, again).

Let’s talk corporate names as clues: though most commonly known as Digital Angel (Florida), also DBA Verachip, they were formerly Applied Digital Solutions… which was formerly Applied Cellular Technology (because RFID tracking often relies on cell phone services)… which also used the DBA ACT Financial… formely Axiom Information Technology… formerly Axiom Computer Consultants… DBA Great Bay Acquisition Company (those all based in Wisconsin/Minnesota). Digital Angel divorced itself from Verachip (being sued out of business), but then Verachip merged with Steel Vault… which became PositiveID, which then in turn tried to acquire Digital Angel… which also operates Signature Communications in the U.K., where it might (conjecture based on company data and ties to CIA fronts) enjoy backdoor access to encrypted government radio communications, the assumption being that receiving units employ an RFID chip which, like the cell phone paradigm, authorizes descrambling of transmitted data, as well as authenticated identification of the sender and recipient. Finally, Digital Angel, also being sued and hounded, ran off to the U.K. where they now promote themselves as “a developer and publisher of consumer applications and mobile games designed for tablets, smartphones and other mobile devices, as well as a distributor of two-way communications equipment.” But they still push implants, and through Signature, the two-way communications gear.

Let’s talk facts as clues: Digital Angel does not make RFID. No. They merged with Destron Fearing, the actual imputus of modern RFID systems claiming to have invented RFID technology. No, that was Hughes Aircraft’s Electronic Division. Digital Angel at one point claimed to be founded in 1948. No, but Destron Fearing was founded in 1945, did the RFID for cattle thing in 1948. No one cited so far, actually makes RFID tags, the heart of the implant. No, that’s Raytheon, a military/CIA contractor… formerly known as Hughes Aircraft. That makes sense, since it is the U.S. Army which tracks all RFID tag assignments (unique tag number assigned to (whatever) user data). Meanwhile…

Let’s talk connected dots as clues: CIA’s HHMI (Howard Hughes Medical Institute) is steadily pushing for the use of RFID in both implant and non implant versions to hospitals (49 major facilities as of 2005, more every year) and the medical industry at large, and Hughes Satellite and Hughes Communications services RFID tracking systems via cellular/wifi. How do I know this? By temporarily working for both Hughes Satellite and a major cell phone carrier where I was able to verify specific cell phone traffic and routing of tracking data. The phone account was tied to an individual which shared an address with one of the above firms (how I found it). And that led to finding dozens of such phones for more firms. And even more looking at other fronts known to me outside of the RFID playing field. In fact, such details are part of my evolving insurance policy against ‘accidents.’

Let’s talk key people as clues: Another CIA front trait has to do with who is involved in the corporate structure. At ADS (old data) Dr. Richard Seelio was Director of Medical Applications. Really? He is a Bariatric Surgeon, so he knows how to suck fat out of your thighs, not exactly as advertised by his title (a typical front man). The Senior Vice President was, prior to installation, a small time lawyer (a cutout man). A look at the Board of Directors of almost many of the above firms variously will find persons of wealth and influence, persons with backgrounds or ties to military/intelligence (or both), and persons with membership in the nefarious NWO Round Table Groups, such as the Council on Foreign Relations, Trilateralists, and the Bilderbergers. This is a kind of corporate structure is a fingerprint that lets anyone track just who are the trackers.

The other shoe drops

As I wrote this, I was listening to radio, where Clyde Lewis more thoughtfully reviewed a greater enveloping matter on his Ground Zero show, things equally important to understand, and far more sinister. Listen to it, here. The short of it is that chipping people is not just about spying on them, it is about control. It will enable a complete rewrite of social, political, religious, and economic existence, and the script is already being followed step by step, RFID again at the core. You didn’t think ‘Global Warming’ was about weather, or that Transgender Issues were about rights, or that Terrorism was about political or religious ideologies, did you?

It is, all of it, in support of ‘a brave new world’ which the New World Order seeks to establish, a world where there are only three classes of people. While my friend Clyde did not use my labels for these classes, he did so describe: there will be Meons (a Club of Rome/Bilderberger label based on an ancient word for someone worthless, less than a peon ­– a ‘useless eater’ who will not likely survive the NWO on their own, and who will be made to ‘go away’ in time); Peons who will be usefully employed to run the system (government, business) for the elites; and the Elites, the 1% of the 1% who will rule.

Clyde explains how the Middle Class will be eliminated, divided between those willing to implant and deemed useful (peons), and those unwilling or deemed useless (meons), and the a host of new topics and proofs you have likely never heard of, and more. Naturally, the upper class will be peons, and the lower class, meons. Bio implants (part of Transhumanism) are key to all these plans. You had better understand all of this or you won’t be able to cope, and likely, will end up in the red list for population reduction.

 

A TI with RF Measuring Device can = Dangerous Conclusions


Low Cost RF/MW reading devices are often purchased by TIs as a defensive tool against their targeting fears. However, the general topic (TSCM – Technical Security CounterMeasures) is just that: TECHNICAL, and readings from such a device can easily lead a TI to panic and over react. Here is why, and how to get more out of such devices, without the risk of serious mistakes.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 
Updated Dec 2017 – Corrected technical boo boo and added a couple of closing paragraphs somehow deleted and not caught. Changes indicated with red intro.
 
What you will learn reading this post:
• all TIs could benefit from professional TSCM electronic sweeps;
• that isn’t likely to happen;
• the poor-man’s TSCM pro isn’t a pro, and might be a fraud;
• there are low-cost meters but improper use can be dangerous in many ways;
• there is a solution, and help implementing it — and here it is…
 

The way it is

A Targeted Individual can almost always benefit greatly from a professional TSCM sweep. Such a sweep, clandestinely done, could provide significant courtroom quality proof of electronic surveillance and/or harassment with directed energy weapons or mind altering signals, such as EEG entrainment, subliminal messaging, V2S, implants, and more. If you are new to targeting and don’t know these terms, read my books. With very rare exceptions, virtually all TIs are exposed to some form of electronic targeting, and such a sweep can precisely identify who is operating the equipment, the nature of targeting, and evaluate the threat and suggest defensive/offensive options. That typically includes their providing documented reports and personal courtroom expert testimony. Combined with optional services equivalent to a private investigator, it could even end up revealing who ordered and is behind the targeting. They can also potentially detect bioimplants in the victim’s body.

Just some of the gear needed for a professional TSCM sweep completely meeting a TI’s needs.

Unfortunately, there are two reasons no TI has ever used TSCM professionals with success, and hardly any have ever used it, at all. The first reason is, that only the wealthy can afford it. A truly effective sweep of a home or work place, can cost between $20,000 and $60,000. That is because the professional will need to apply towards a million dollars worth of specialized gear, and must have decades of experience in order to be qualified to do so and have the results stand up in court. Rather than ‘meters,’ they employ sophisticated signal analyzers and other toys for a full-spectrum solution (including light and audio threats).

Sigh. Add to Christmas wish list, and hope Santa is generous.

The second reason, is that all such qualified TSCM are almost always ex government/intelligence community/military/military contractors, and are therefore, by default, subject to ‘conversion,’ because almost all targeting is ultimately at the hands of those same players. By request or by bribe, the risk is that they will give a false report showing no targeting. It is simply impossible to vet a TSCM pro against this risk, unless you happen to have a personal family/friendship relationship in place from the start. I had such a contact, and the government framed him on illegal weapons and drug charges and put him in jail, confiscated all his equipment. James Atkinson (‘Granite Island’) helped me write my first book, filling it with informative information about TSCM and what government agency uses what frequencies for what purposes (data table and other information in The Professional Paranoid). Friends are keeping his informative web site up and running for him. Visit.

So what is a TI to do? One solution, is to go with less than a true pro TSCM guy with all that gear, someone like me, perhaps, who has nearly $20,000 in gear, and some investigated skills (I’ve put a lot of people in jail, shut down illegal CIA fronts, forced corrupt officials to resign, and ended targeting for clients). Unfortunately, there are crooked people out there pretending to be ‘like me’ using even less sophisticated gear (regardless of what they claim). I have seen YouTube videos of alleged ‘bioimplant scans’ where the scanner was charging $100 per implant found, and gee… everyone scanned naturally had between three and six implants, or more — until their money ran out. And yet, not.

The problem was, the meter being used, like most such meters, has an instruction manual warning that false readings will be obtained if one touches the sensing area of the meter (the business end). You are supposed to hold them a certain way to avoid that. A fraudulent scanner, however, holds it differently, such that he merely moves his finger to tap or touch the front whenever he wants to ‘find’ an implant, bug, signal. Sadly, this service was widely promoted by one of the largest and best known TI community groups. It even resulted in a multimillion dollar lawsuit, and that group ultimately disintegrated. One clue it was a scam was ignored by all: to get the scan, you had to fly into a small remote town with all of one Police officer, check into a hotel, and get scanned within a small window of time. Poof! the scanner was gone before the fraud could be reported and investigated, and many thousands of dollars richer for a half-day’s work.

A decent start if you have something in the range of $10K to spend. It is virtually a hand-held spectrum analyzer… that unfortunately does not see military gear.

Another solution is to buy your own meter. Prices can be as low as $100, even less (be wary when so). Not quite a perfect solution, in truth, because no such product, even towards $20,000, is designed and sold for the kind of use to which the TI intends. They are designed to measure the same kinds of signals (with significant limitations, usually), but for other cause, such as testing equipment against RF emission safety standards, or to ensure they are putting out the right kind of signal. The instruction manuals only speak to such uses, and the manufacturers/sellers have zero interest in helping a TI do what they need to do with the product. Nor will they accept returns based on failures to be useful in such an application. You are on your own.

Because of the technicalities involved, and in the face of a lack of instructions, it is not only extremely rare that a given TI will know what a given reading means, but also quite likely that they will make a false and potentially dangerous wrong conclusion as to meaning, and then take wrong actions in defense of that false conclusion. A TI easily makes silly mistakes, and the results can be frightening (ex: aiming the meter at the sky will yield seriously high readings, but is NOT a threat. Many TIs assume it means satellite targeting. No, no, and no.) An example of a serious wrong action would be false accusations of an innocent party, or spending limited financial resources for shielding or legal defenses applied uselessly.  And there is another common risk…

All too often, a TI will call Police or go to other authorities or perhaps seek legal, medical, or psychological professional help, meter and readings in hand, intending to ‘prove their case.’ All they end up accomplishing, is being marked down as a very strange person with a strange little box and an even stranger and unbelievable story; a lunatic who needs mental health care. No one will understand the little black box or its readings, much less the story offered behind it all. They have never heard of TSCM, most likely, and so the entire concept is like talking about the kind of propulsion systems used on flying saucers. And if they do know about TSCM, they will know your meter is a ‘joke,’ and automatically conclude that your use of it and conclusions are just as silly, no matter what the truth is.

Note: there is one other potential ‘poor man’ solution — the use of a smart phone ap to simulate an RF/EMF meter. Yes, and no. Extremely limited range and scale of operation, extremely broad angle of view, and quite prone to misinterpretation. In fact, it has nothing to do with electronic solution; it only measures the Earths natural EMF. It has no value for personal protection, as I’ve written of, here.

Don’t give up too fast… all is not lost

Don’t give up on the notion, because there are some useful uses for such meters, if approached properly. One must simply alter expectations, and have a better grounding in how to properly use low cost meters such as those described herein from trifield.com, for the purpose. I can help with that. But let’s first talk about expectations:

Implant quite similar visually (smaller) to one found in my own leg some 35 years ago. State of the art, today, can be 200 times smaller, translucent, tissue colored, and bond with tissue: invisible to a surgeon and to x-ray. MRI sees only an inconsequential image blemish.

a) you are not going to use them to find implants with much chance of success. There is only one type of implant they MIGHT find, which is the type which constantly broadcasts information. An example might be a tracking implant, or a health monitoring implant. Under the right circumstances, you might find such an implant. But most implants used in targeting are either not going to broadcast anything… instead receiving signals useless in detection — or they are going to deliberately use special broadcast methods most meters cannot see or respond to usefully;

b) you are not going to use them to find V2S, subliminal, or EEG manipulation signals. You can see these signals, but they blend into the background and do not stand out as such; they cannot be isolated and identified with simple meters;

c) you can use them with some confidence to identify DEW and other targeting signal directional sources. While it is relatively easy to misread signals and erroneously presume them an attack signal, if read during an attack and relying on the strongest signal sources, only, you are likely correct in the presumption. You can then plan shielding strategies more effectively, and narrow your list of suspect enemy positions and personnel to those within that angle of attack. With some luck, you might actually pinpoint the source and perps involved, but it won’t be legally useful. But focused video surveillance (don’t break the law), with luck, may confirm suspicions sufficiently to be considered legally useful evidence. Rely on video documentation of not just the doings at such sites, but also video of meter readings during attacks, to prepare potentially useful evidence… useful to perhaps interest someone into considering your story… knowing the likelihood is that they will still reject it as lunacy. Risk vs. Benefit is your decision guide about attempting to convince them;

d) you can use them to identify the type of signal, in some cases. They type and sophistication of the meter, and your ability to use them properly, will determine if that is the case, or not. It is quite easy to make wrong assumptions, as there are so many kinds of attack signals across a broad spectrum of frequencies (bands of RF energy). Most serious threats operate at frequencies well above the capabilities of low cost meters. Even my $20,000 gear cannot see above 12 gHz microwave, which is where most military bands operate. But if your enemy is not military based, you might have a chance with $20K gear… but with gear costing hundreds of dollars, your chances diminish to the point of being limited, perhaps, to seeing things an amateur or Cop might employ.

e) you can use them to warn of a DEW attack before it becomes a problem in terms of physical/mental effect. There is one particular low cost meter best suited to this use, allowing you to relocate yourself away from the attack area… the meter will advise when escape has been achieved (cease the warning). It will also indicate if you are being ‘tracked’ by a signal by some means (generally some kind of surveillance, or by a locating implant), and can give you a general sense of the direction of the attack signal source, much like the Trifield. It is not, however, a great substitute for the capabilities of the Trifield beyond that, but it is a better warning device than the Trifield, because it is automatic, and always operating, unless switched off. It can even clip to your clothing or be carried in a pocket, or set down anywhere near you;

f) you can use such meters to determine if the signal levels exceed safety limits set by government and NGO organizations. This, in turn, can sometimes be used to force government agencies, most notably the FCC, OSHA, to investigate on your behalf, though it is quite likely such investigations will not match your findings; the enemy will simply shut down temporarily. But at least you get a brief vacation from assault. When concerned about safety levels, you will want to carefully review online searches to compare the latest (always being adjusted downward) standards and what a level represent in terms of health issues, and that will prove to be quite technical — you need to carefully compare your meter reading and scale used for the set limits, which may require unit conversion (usually a matter of multiplying or dividing by 10 or 100; most such resources will give you instructions for conversion or cite alternate unit results for you). With luck, your findings can be matched to specific known physical symptoms for a given reading level, which if matched to your symptoms and reading levels obtained, can be useful if well documented (video of your readings and symptoms + industry data);

g) you might be able to use them to find surveillance technology, to include listening devices and cameras. Again, sophistication and skill of the user are key. There are devices better suited to this purpose which remain low in cost. Use a search engine (bug and camera detection gear) for that. Same for (phone bug detection). See my post on cellphones.

Now as to the other key requirement, proper use

Fortunately, there are two specific low-cost devices I can recommend with confidence, and for which I can provide rather specific instructional advice on how to use them for TI needs. They are the devices I started with early on for my own needs, after some considerable informed research — and successfully used to confirm my own electronic targeting, source location, and identity of the operator at that location. It allowed effective shielding response which ended the threat, and finding of listening devices. It helped me to develop other tactics to defeat targeting which did not involve shielding. They had other benefits, as well, not the least of which was improved peace of mind.

As result, I made a special deal with the manufacturer (Trifield): they would sell them to me at a small discount for resale to TIs, and send TI requests for information or purchase to me… on the proviso (my idea) that I provide an instruction manual for TI uses, be responsible for any returns and customer service issues arising from TI uses. They did not want that business at all, and would not sell them to TIs if they understood such was their use/need. While I am no longer in a position to provide the service, which as a kind of rent-to-own trial program for which no one ever declined to own (it worked well for them), I do still offer the instructions (an emailed .pdf file, illustrated).

These are for the trusty and versatile Trifield meter (avoid the more costly blue-faced version, generally less useful to TI needs) and SmartAlert 2 microwave detection device offered at trifield.com. Both meters are very low cost: you can buy both for less than $300, just don’t mention targeting. My manual gives broad instructional use for both meters, and additionally includes an idea on how to modify (at relatively low cost) an entire room to be a faraday cage without dramatic change in the appearance of the room.

I used to sell the instructions for $20, with the purchase price applied to the purchase of a meter. The idea was that one could see what the instructions were like without risking the investment in a meter, and if thinking it doable, go for the meter without wasting the $20, as I made it free with a meter if purchased outright. It was a confidence-building approach to decision making.

I also tried to talk people out of doing it by pointing out everything in this article. Only if they got past all the negatives, and still wanted to proceed, DID I HAVE CONFIDENCE IN THEIR DECISION. I needed to feel it was right, too, because I did not want a meter to be returned — a wanted a successful use of it to better the user’s targeting situation.

Since I no longer sell the meter, I make the file available on request by email to anyone willing to make a contribution to the Free Will Society, and our effort there to establish Free Will Haven, a targeting-free, low-cost, self-sustaining intentional community (learn more here). There are two ways to go: A $20 donation gets you the manual. A $50 donation gets you the manual AND membership in the Free Will Society (you must have a Facebook account, as well, to participate in membership dialogs) and an ebook copy of The Professional Paranoid, which also talks about privacy/security issues, which includes material also related to meter use as described in the introduction (frequency usage).  That, alone is a $12 value. By all means, donate more, if so moved.

Note: A secondary goal of the Free Will Society, is to subsequently establish a mobile strike team with a full professional TSCM sweep capability, to include a van full of gear (image above). This would be used not only by Free Will Haven, but be able to be sent anywhere in the country to target perps covertly, and nail them to the cross, and blow the whole topic of political control technology wide open in media, and in the halls of government… globally. And yes, that means yet another million dollars are needed. So add zeros to your donation 🙂

The manual’s instructions can generally be applied to any similar products, if one simply reads between the lines, and compares the differences between meters usefully. This is true even if talking about the $20K flavor, though the capabilities will expand greatly as meter sophistication (and price) increases. Just keep in mind that an expensive and more sophisticated meter will likely require some IEEE technical expertise, such as I actually have. I even have some background in microwave technology, and signal processing as employed by the intelligence community (selling and installing such technology, as well as general security and alarm equipment).

The greatest improvement high-end gear offers will be in the range of frequencies (bands) which can be analyzed, but there are many other benefits to better units, as well. For instance, the ability log to memory the readings as you go, plug them into a computer for even more signal analysis (big step up in usefulness), and improved sensitivity in range and angle of reading. A low cost meter reads rather broadly, say 30-40 degrees of arc, perhaps more, where my meter reads as little as 3-6 degrees of arc. Most low cost meters don’t even specify, and the ‘funnel’ nature of a broad angle contributes to misinterpretations of reading importance or meaning. Narrow is good, but you can compensate by taking care and multiple readings from multiple angles (triangulate).

Finally, we need to talk about what constitutes a dangerous signal reading on a meter. These devices display information in a wide variety of formats and scales which leave a non technical person with no understanding of what a high reading actually means. It only matters and is useful defensively if and when the reading exceeds safe levels. Different kinds of signals might be deemed dangerous at a lower level than the kinds of signal. For example, pulsed microwave is the most dangerous of all, and can be so at quite low strength. This is normally the main threat a TI faces, but most low cost meters cannot distinguish between them, or measure them correctly. This is not something commonly mentioned in their specifications, and you need talk to their engineers to inquire, to be sure the meter can deal with it correctly.

As far as safe levels, there are many levels established by many agencies of many countries for many purposes. What is deemed safe in one view or situation, may not be save in another view or situation. The nice thing about the expensive meter I use, is that it knows all these limits and indicates when one or more are exceeded. With a low end meter, you need to compare your reading to the various standards. Learn more about such standards, here.

Why am I Being Targeted? A Valuable Question for TIs


Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 
What you will learn reading this post:
• there are three primary reasons why TIs are targeted;
• knowing which it is can result in better defensive/offensive strategies;
• it is possible to discern the difference in many cases;
• there used to be a fourth kind, but what it really is will surprise you.
  x

The way it is

Of the 12,000 plus persons reaching out to me over the last two decades because they were being targeted with some form of Political Control Technology (PCT), almost without exception, the first thing asked is ‘Why… why me?’ Naturally, there are endless other questions which are also asked, all of them seemingly unanswerable, and all of them deeply troubling and part of the psychological mind games which are inherent in all forms of mind control.
  x
27419003986.jpegThere were three or four possibilities, and the best answer which could be offered up front was simply to cite those reasons, a generic answer which lead to no peace of mind, and which usually lead to even more difficult to answer questions. And yet, to get to the bottom of things and mount a viable defensive/offensive strategy, such questions needed to be answered; you cannot fight a problem you do not understand.
  x
This is why targeting tactics include significant effort into misleading the TI into thinking all manner of incorrect facts about their targeting. Out of the 12,000, I have only ever encountered perhaps 4 who truly had it right. Defending the wrong problem results in failure, amplifies the power of the mind games through frustration of defeats, and sets the TI up for looking insane (or even driving them to that state), almost always another goal of the targeting, the very means of neutralization, and the best measure of success.
  x
And so, in order to get those answers, I established my free Helps Kit (proparanoidgroup@gmail.com), and its use, in turn, enabled me to offer a variety of for-fee consulting services aimed at formulating appropriate combat tactics. In almost all cases, even if not electing my services, the Kit lead to some improved understanding and ability to withstand targeting. The services almost always amplified that result, and in all-too-few cases, enabled a complete stop of the targeting, usually with some form of remuneration or compensation to the victim through what I term a ‘blackmail insurance policy.’
  x
So YES, it is right to ask why. So let’s look at the generic answer, and see where it leads us.
 x

The Three Answers

I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.

1) the actual intended use is ‘political,’ which translates as any form of disapproval of the TI which may require punishment or neutralization short of an assassin. Whistle blowers or potential whistle blowers, cult members evicted from, or who quit the cult, etc;
2) ‘experimentation’… extending the state of the art;
3) ‘training.’ Guinea pigs for trainees are targeted in order to achieve across the board predictable efficiency.
   x
What we used to perceive as a fourth reason was sometimes called ‘Joyriding’. In truth, if falls into experimentation, but not upon the TI — upon the perps. Actual joyriding can take place… the unauthorized used of tech/methods for personal gratification… but more than likely, to the abuser, it is in the realm of ‘political,’ to
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
x
93d5bea6cce0329abcf9fc97431684c0.jpgMany perps are themselves TIs, either actual mind control victims or persons (typically sociopaths or psychopaths) who are put into experiments to see how THEY react in a perp situation based on THEIR psychological profile and the specific circumstances of the TI-to-perp interaction/response cycle. In fact, the TI is almost superfluous to the equation, once their suitability has been determined (their profile), and considered a consumable and expendable item in the project — though controls exist to prevent such harms as might result in Police investigations which might defy cover up arrangements.
  x
An easy example is the infamous Yale experiments on authority conducted by (presumed CIA) Psychologist Stanley Milgram, ostensibly funded by CIA under MK-Ultra. There, volunteer students were given the choice of playing teacher or student roles in what was described as a learning experiment, with an observer who was authority over the ‘teacher,’ who was de facto authority over the ‘student.’ The teacher would test the student and punish wrong answers with an electrical shock, increasing the voltage for repeat errors. There were lies in the mix which changed the reality to something else, but in the end, the observer would instruct the teacher to continue the increases in voltage to the level of lethality.
  x
In that study, those playing student were not real student volunteers, but paid actors, and no one was actually being shocked or harmed. But a similar study by Professor Phil Lombardo, the Stanford Prison Experiments, resulted in actual sadistic violence so troubling that it had was made into a motion picture. There, everyone was being studied, but the guards believed only the prisoners were being studied, so the core experiment was focused on them. This experiment, too, is thought to have had government backing of some sort, as this was in the days of COINTEL and COINTELPRO operations by FBI and the U.S. Army under Nixon, a program thought enhanced and behind much of today’s targeting of citizens. In any event, it had been ‘blessed’ by the American Psychiatric Association, which at one time was headed by former CIA mind control scientists (like all such organizations).

Knowing the difference can alter TI tactics

 One needs to fight the right problem. So it is critical to know which reason applies. There are some general defenses which can be used regardless of the form of targeting, but there are also specific defenses which in the end, are likely more productive. While every TI’s situation and circumstances can dramatically impact on exactly HOW to effect such defenses, and especially offensive responses, what follows below are my ‘generic’ answers which are, unfortunately, somewhat simplistic in description. A TI should be very cautious in experimentation trying to find the best way to implement a given solution.
  x
The key most generics which apply to all reasons for targeting, are a bit more straightforward. Chief among them is to increase site security (i.e., pickproof deadbolt on a primary entrance, all other entrances secured such that only breaking and entering is an option — which perps don’t like to do because it leaves physical evidence in support of the victim’s claims of targeting). That can also mean use of video security monitoring systems, security lighting, and so forth. I am not a fan of monitored alarm systems (most such firms have intelligence community ties), but I do like off-the-shelf component alarm systems, perhaps with online monitoring by YOU.
  x
Another generic tactic is to Stop, Think, then Act, instead of simply to react. Instead of reacting to a targeting stimuli or event, STOP: Think about what they want or expect you to do in reaction, and instead, Act (as actor) in some random contrary way. They use your reactions to gauge effectiveness of their methods, and methods are calculated based on your psychological profile. Acting, done believably (don’t over act, don’t elect a totally absurd response) can screw with them in ways which sees them doubting both their methods and the accuracy of your profile, and cause them to retreat to square one, reducing your trouble and giving you a rest period. However, before that happens, you must brace for increased attack levels, until they accept that something is truly wrong.
  x
And, of course, I also advise at least the first two books in the Professional Paranoid series. The Professional Paranoid gives how-to advice with respect to traditional targeting, which is always part of PCT targeting. The second, MC Realities, gives how-to advice about the PCT variety. The third book, The Defensive Field Guide, is simply a compendium of references and resources, primarily educational and especially useful as ‘proofs’ when trying to convince non believers that the technology and history of its use by government is real. Learn more about my books, music, and videos on these kinds of topics using my WordPress pull down menu (page top). Additional blog posts on topic are also available, here.
  x
Political targeting almost always involves a ‘full-court press.’ The victim will likely suffer electronic weapon targeting, gangstalking, dirty tricks designed to destroy all resources, including finances, relationships, and reputation. They tend to be harassed by law enforcement and other civil agencies, and will likely in time discover they have been implanted with various devices to allow tracking, cause pain, provide voices in their head, and perhaps, suffer use of chemicals and gasses. Everyone will seem to turn against them, for they have been turned by the flashing of badges and requests for ‘help’ by ‘investigators’ of some horrible thing (i.e., pedophilia, terrorism, etc.)
  x
The best defense is to determine exactly what thing it is they fear about you such that targeting was justified in their mind (which may be false beliefs about you). It usually has to do with something work related, or if a college student, something witnessed or experienced at school. Knowing the reason for the targeting will give you the who. With the who, why, and how answered, it is often possible to crate that blackmail insurance policy.
  x
But it also may be that you had already been a victim of childhood abuses designed to create split personalities which could be ‘programmed’ to make you into a programmable person (think in terms of a Jason Bourne or Manchurian Candidate). For every Bourne successfully created, there are likely dozens of ‘failures’ which are kept around to become patsies or for fodder in some future plot. Such persons are often targeted to keep them off balance and looking insane in order to prevent exposure of the greater programming project. If you think you might be one of these, contact me for further evaluation.
  x
Experimental targeting almost always does NOT involve a full-court press. It is usually to test a specific PCT or PCT combination. In some cases, this is actually a better experience as a TI, because of that fact. But in other cases, it can mean very exceptional and horrific targeting levels. Where it is the perps who are the subject of the experiment, it is more likely for the TI to have a  yo-yo experience, even seeming lapses in targeting. Finally, another clue is bizarre symptoms atypical from other TIs. This usually means some new, advanced technology is in play. The more ‘crazy sounding’ the experience is, especially against other TI experiences, the more likely is it experimental tech… unless, of course, one actually is schizophrenic. But even that can be a clue (see training targeting, next).
  x
If it is concluded that perps are the true subjects, you can apply the same defense as advised in the training targeting (next). Otherwise, it is hard to give specific advice for something which may not be based on known technology or methods, but it is just as likely to be based on psychological experimentation as it is technical. In the later case, there will be no bizarre experiences (comparatively). In either event, I suggest you contact me and perhaps we can figure out something to try which is based on whatever is going on.
  x
Training targeting will again feature yo-yo symptoms/effects, and perhaps brief lapses in targeting, but the symptoms will not be atypical of other victims. Because it will involve perps who may be ‘stupid’ about important errors that can be made, it is typically used against people who already have some history of mental health treatment. Schizophrenia, paranoia, or extreme schisms are popular ‘excuses’ which can hide any such targeting errors and prevent exposure of the training project. Authorities will presume the mental state of the victim the cause of their complaint, even to the point of ignoring physical evidence, such as burns on the body, which would be thought self inflicted. As in all targeting cases, regardless of type, reason, etc., I advise never to go to authorities unless you have courtroom quality evidence and witnesses or other proofs to counter any notion of mental illness.
  x
Another clue it is training leads to defensive options. One will see a routine change of players, if one can locate the nearby perp operating posts. Training commonly requires at least one ‘instructor’ and one or more ‘trainees’ at a time. They are not family, and are not in the same social or affluence levels, and will tend to seem odd matches for each other, both in dress, and likely, in age. And, there are likely three sets of them to allow three shifts a day (not always – where targeting varies during the day and is consistent at night, the nighttime targeting may be automated), which would mean a lot of coming and going of different people. And, as there will be graduations, there will be a larger cycle of all new people, which may or may not include brief lapses in targeting, or renewed cycles of targeting experience which might be described as starting low and simple, and advancing to high and complex, over time.
 x
The defense is simply to document the comings and goings, and the patterns of electronic attack signals. Rely on video, get license plates, record times, etc. This may enable you to obtain help from authorities, or perhaps to take legal action. But I warn you, the material must be legally compelling, and overwhelming. You will need a lawyer’s advice more than mine.
x

About Death Threats

Many TIs talk about thinking their perps are trying to kill them. Some talk about actual death threats and events which seem to be ‘failed attempts.’ Some reference  deaths which have taken place as ‘suspicious.’ It is true that numerous TIs have died while being targeted. These deaths are not outside of the norms of actuarial tables for a given group of people, given the many tens of thousands of TIs who actively so identify themselves. And as investigator, I have yet to see any compelling evidence of an actual murder, or staged accidents. I know of only one accidental death at the hands of a perp… which would possibly warrant a murder charge… definitely warrant manslaughter charges.
x
So, despite the insistence of TIs, I am equally adamant that murder is not the intent of targeting. Given the resources and skills of who is involved in targeting, if they wanted a person dead, they would be dead. They would not issue a threat or any other kind of warning, they would just get the job done. And, keep in mind that one reason targeting has been developed and deployed for political use is specifically to avoid murders. Murders can result in investigations which have the potential of blowback. But targeting creates a ‘mentally ill plaintiff’ who will be ignored, and is who is therefor a political (and social, financial) zero.
Therefore, where a targeting situation involves such threats, I deem it to mean one of two things. Either the TIs defenses are becoming effective and they seek to deter… using a bluff… in which case it is likely to be in a political targeting situation — or it is part of an experimental targeting project. In all cases, it is a mind game and should be ignored outwardly, while inwardly increasing defensive posture and alertness. If actual attempts are made, that is entirely another matter, and should be documented and likely, taken to law enforcement. Not that they will do anything about it, but it gets it on the record, such that if things become more serious, they might respond appropriately.

Who’s Killing the Bilderbergers?


Some 17 years ago, the Unified Conspiracy Theory was formulated. It was so accurate — it was able to predict in 1999 the 2001 downing of the WTC by jetliners and resulting Middle East Oil Wars, and other major news events. Now it can be seen at work in my newest book on the Bilderbergers — where fact and fiction collide… fatally.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
 
Upate Feb. 20, 2017 Paranoia Publishing is set to start shipping hard cover copies of this book as early as first week of March. Amazon will carry it right away. ebook copies available direct from author now at half price ($6 – will return to normal price once hard copy is available) via paypal orders to proparanoidgroup at gmail com. 

What led to this book? The definitive International conspiracy.

After ten years of research into crimes of the New World Order, I began to theorize that the bulk of America’s dark bumps in the night were not simply random crimes by assorted forces for varied agenda, but completely orchestrated as a single, logical, step-wise plan toward a single, yet visible goal. It resulting in the Unified Conspiracy Theory, and it was reasoned that if one knew the goal, and the steps thus far taken, such a plan was predictable, and as a theory, the ultimate test would be to do just that.

The first three predictions made with the UCT were so scary, that I had to take actions, do something… anything I could think of, to attempt to thwart them. The first was, that some kind of terror event would bring down the WTC with jetliners, and result in a series of Middle East Oil Wars. So, in the Fall of 1999, knowing no authorities would bother to respond usefully, or quickly, I published a quickly written screenplay featuring such a plot, and put it online with explanative warnings, hoping against hope it might force any such plan to be aborted. No such luck, of course, even though Oliver Stone’s people took a look at the script in search of a project. They thought it an impossible ‘false flag’ scenario.

 

16819237_985524731587546_4614382031226083422_o.jpg

The second UCT prediction was an assassination attempt on 1992 Independent Presidential Candidate H. Ross Perot, or his family, in order to force him out of the Primary run against Clinton/Bush. I took no chances, and this time, notified the Secret Service of my concerns, expecting they would ask me for details. I used my backchannel contact, someone I had worked with before on several Treasury matters. Some several weeks later, Perot did back out of the election, even though the very night he did so, he had won enough votes to be guaranteed a place on the General Ballot. A few weeks after that, my SS contact confirmed that an attempt had been made just before the Primary, against his family; mailed Anthrax. That has its own telling ‘false flag’ backstory.

The third was that there would be at least two more major false flag attacks to follow, specifically naming the type of attacks, and the cities. One of them was my home town, which I had predicted would suffer a bio-terror attack, and I even identified the means of delivery and rogue CIA Fronts to be used. But by the time frame where that might become a more current concern, I had finished my book set, Fatal Rebirth, which spelled these things out quite clearly, again hoping it might spoil any such plan. I also took steps to notify the City.

Again, no useful results, but fortunately, knowing such details enabled me to personally thwart that attack, or at least postpone it. It is featured on this Blog’s home page.  But I was definitely able to thwart second, different terror attack in the same time frame, likely a Plan B to the former. It was called Gas Station Tasking when announced by President Bush; the use of private planes to dive bomb the area’s largest gas station while a tanker truck was offloading gasoline, at the busiest time of the street traffic day. This is also detailed on the home page.

This could easily have taken out two gas stations, four restaurants, two banks, two two hotels, and potentially, two major shopping complexes, and the traffic on the busiest intersection in the County, plus a major Interstate and two State highways. Identified, were two of FBI’s Top Ten Most Wanted Terrorists, and others, including the Christmas Tree Bombers. They were getting help from an FBI Agent known to me, and so, as it was a false flag operation, FBI, CIA, FAA, DHS, in response to my going public, never asked for my evidence, which included fingerprints, video, multiple eye witness confirmations, and more. The cover up was started before the President even heard about it. See home page.

 

Why UTC matters to this new book

Other UTC predictions have since come to pass, as well. The reason this is all mentioned here, at all, is because the UTC does not just affect America, it relates perfectly to World affairs, as well. And in this world, we have various Round Table Groups of Globalists who push for a One-World Government, which is to say, elements of the modern-day Illuminati. Such groups as the Tri-Lateral Commission, the Council on Foreign Relations, and the Grandaddy of them all, the Bilderbergers, and many more (even United Nations, World Bank, et. al), all tend to be cut from the same New World Order mold.

suiciding-the-bankers

This image relates to one of two strings of real World International murders footnoted in Who’s Killing The Bilderbergers, as cited in this book. From http://humansarefree.com/2016/06/mainstream-media-finally-admits-mass.html

 

Which in turn is to say, largely fascist, all-too often satanic, and decidedly power elitists seeking to rule the World through manipulation and control of (everything), and willing to do so at any cost, by any means. Not to go overboard, it is important to note that, with the exception of the Bilderbergers, most Round Table Groups, like FreeMasonry, attempt to draw in newbie membership who are completely innocent Sheep. This gives surface viability and credibility of these groups to mainstream in ways which allow them to mask the darker roles they play in seeking the Globalist rule, while also giving fresh students to draw into their world, especially the more successful up and comers. There is a backstory there, as well, as I have first hand knowledge, x 2 telling examples, having been such an up and coming business man.

Ergo, this new book is designed to do much the same thing as Fatal Rebirth; to warn you just what these people are doing, and why… and why you should be mad as hell about it and doing something to stop them. Only, my new book is global in scope, where Fatal Rebirth concerned itself only with America. And, while Fatal Rebirth began unfolding in 1947, Who’s Killing the Bilderbergers is a current-day affair. As such, it is perhaps more urgent, that you read it, and soon — because the future is revealed to be bleaker than the Dark Ages and time of the Inquisition, for those not forewarned and forearmed.

 

The plot thickens

I describe this book as ‘an International Novel of Novel International Affairs.’ A grand murder mystery across multiple Continents, trying to resolve mysterious death after death of prominent Globalist leaders. Are they simply random deaths by happenstance, or murders by elaborate design? Officially, they are not due foul play, and yet… each one has many unanswerable questions clouding that view. Just as troubling, their deaths seem to be tied to various strange conspiracy theories, while at the same time tied to various Globalist agenda, either narrative affording motive for murder. And, of course, it is soon enough discovered that they all turn out to be Bilderbergers.

bilderberg.jpg

Each Bilderberger tends to be an Officer or Board Member of multiple corporations, and has sway over yet others through major stock holder positions, or contractual agreements. Of course, many of these companies, in turn, control other companies, sometimes, long lists. Now, imagine what this Cloud Map would look like if we knew the actual identity of ALL Bilderbergers, and not just this handful. Then add CFR, Trilateral Commission, Club of Rome, Council on Foreign Relations, and on, and on; the Round Table Globalists; the modern-day illuminati.

By the time the truth of the deaths starts to be uncovered, the UTC will have started to reveal itself in action. In like manner to UTC’s ability to be predictive, readers will be propelled quickly into the future, headlong into the one final prediction which is the ultimate form of fatal rebirth… for us all. That particular prediction WILLmost certainly come to pass; it has, after all, been foretold by many authors well before my time. Among them, Satanist and high Mason, Adam Weishaupt; it is the entire purpose of and predictive goal of the Illuminati Plan, as he formulated it in 1776, when the group started their journey toward a New World Order (he first coined that term).

As this book reveals, just when it comes to pass, is largely up to you. You, are what you’ve been waiting for. They hope you don’t know that, and remain Sheeple.

 

An important detail

And, along the way to that story-ending element, readers will also encounter countless real-World conspiracies laid at the feet of Bilderbergers, all done in ways which let the individual decide for his or herself, which, if any, may seem fanciful, and which are more likely true.  There is much documentation within the main body, plus more than 150 footnotes (an average of one every page turn), to help that process along. Some of those footnotes are illustrated graphically. The Climax and Ending will then show you the progressional nature of the Globalist plan as it unfolds toward the very last step in the plan, the point of no return for Mankind. These conspiracies back up the UTC usefully, and in fact, understanding them helps refine the UTC more usefully; one tends to validate the other, in both directions.

 

 

 

Smart Meters, Stray Voltage, and Targeted Individuals


There is a little known and underreported TI targeting method and symptom based on Stray Voltage, which is usually marked by a dramatic prevalence of ‘static discharges’ when touching things. But there are other symptoms, and happily, tests and cures.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
 
 
What you will learn reading this post:
• What stray voltage is and why it can be a threat, especially for TIs;
• The symptoms and risks of stray voltage (and targeting);
• The possibility of yet another Smart Meter conspiracy;
• How to detect and eliminate Stray Voltage.
 

Stray Voltage?

2000px-Potenzialtrichter_Freileitung.svg.pngStray voltage is the technical term given by the power and electronic industries to a situation where an electrical charge is present in the ground, itself. It can also be present in a structure, such as your home or workplace. It tends to be far more likely to be present at the ground-floor level than upper floors, and is commonly found present at insignificant levels almost anywhere electricity is used. It can even be found in places where there is no AC power nearby present, at all, if there is Quartz bearing rock in the substrate. Concentrations of Ferrous rocks and ground water near the surface can impact, as well.

In structures, the type of structure materials and design can impact prevalence, as can furnishings and the layout of property. And though considered rather rare as an actual problem, for some reason, it is normally thought of or understood as being significantly more problematic in rural farms (especially noted in dairy farms) more than in bedroom communities, though it can be found even in downtown high rise areas. It seems to impact Cows in many observable ways, to include reduced milk production, troubled births, general health and premature deaths.

The power industry takes great care to prevent stray voltage levels from being detectible or able to impact living things, including you and me, but things can go wrong. When that happens, and depending on how strong it ends up being, it can be quite detectible, and generally, unpleasant, if not harmful or even dangerous. Some forms are capable of outright electrocution, such as created by downed high-tension power lines. While this post uses the term Smart Meters in the title, it is less about that, except that a possible conspiracy may exist between Smart Meters and stray voltage, as outlined below.

There are many reasons stray voltage might be present at problematic levels. I see these as divisible into three threat levels and causes. The first may be relatively minor in threat level, caused by natural eventualities unrelated to targeting, and unlikely to escalate in nature. An example might be living near to high-tension lines running parallel to metal fencing on your property, where a kind of induction takes place causing the fence to produce an electrical current.

The second is also unrelated to targeting in causality, but may be far more serious, even dangerous, and quite likely to escalate — such as may due to electrical shorts or combinations of other unhappy electrical happenstances. The important thing to take away is that the bulk of stray voltage may have nothing to do with being targeted, but any presence which is detectible should be of great concern to anyone, and pinned down immediately.

The third? I have recently discovered a new possibility, thanks to a coincidentally… even accidentally discovered set of facts learned from one of my very first TI clients. I say coincidentally, because in considering the new information, it dovetailed very nicely with other client information which had otherwise led nowhere. As result, I am now quite confident that there can be deliberate targeting by artificially creating and controlling stray voltage for the purpose.

It can be used to establish a variety of selectable threat levels and targeting effects (symptoms), to include other forms of electronic targeting. This level is not officially recognized to exist by the power industry, though the potential for conspiratorial knowledge and participation in its use surely exists. One would be unwise to broach the possibility with power companies or other parties, unless part of a legal response effort, as mentioned herein. The good new is, that regardless of the three types, any serious threat levels can be dealt with, almost always.

To weaponize AC power in this way (there are other, previously known and frequently spoken of ways, such as found in my book, MC Realities), simply requires shunting of power to the earth at one or, as is more likely, multiple locations around the property. This would likely be done through a control mechanism to throttle the voltage diverted, even to an ‘off’ position, something akin to a remotely controlled dimmer light switch. Naturally, it will consume significant electricity, and that will turn out to be a blessing, as we shall see.

After reading this short introductory post, a TI would be well served to learn more about the topic, even if not thinking themselves impacted by stray voltage, currently. As the link to that information only addresses the first two reasons, the reader should indeed finish this post, first. After reading BOTH sources, then, and only then should they attempt to fit their circumstances into the dialog and consider the best course of action. Feel free to contact me if unsure, at proparanoidgroup gmail com.

 

Symptoms, regardless of cause

At natural ambient and other low levels of stray voltage there should like be no outward signs discernible. We only need worry about the phenomena if we do start to sense effects. We have all experienced the random static discharge of touching a door knob after walking across a carpet. While discounting such experiences as carpeting woes, they can also be due to stray voltage, which can certainly augment or simulate carpeting-caused static build up, as not all carpets generate the problem to the same degree, or even at all. When you get such discharges in the absence of carpeting, that is a typically a clear sign of stray voltage — though cold dry air can contribute, as well.

Note: normal static discharge is usually relatively high in voltage but low in amperage, quite akin to that associated with spark plugs in an engine; unpleasant to experience, but relatively harmless, more likely to cause injury from jerking away with violent contact with another object, than from the actual shock. They may generate a small visible flash of light, an actual spark jumping a few millimeters, at most. But stray voltage can produce far more varied and dramatic, even dangerous results. There have been instances of seeing discharges which travel inches or even feet, making zapping or popping noises, producing heat. The risk of fire and explosion cannot be ignored, where flammable fumes or pure Oxygen sources might be present. Obviously, the voltage levels in such cases are even higher, as may be the amperage and risk of electrocution.

Basic RGBSerious levels of stray voltage can cause effects similar to other forms of electronic targeting, and may indeed be augmenting such targeting from other sources. In point of fact, especially for persons who also suffer electro-sensitivity, there is a small chance that some persons who see themselves as being a TI may in fact not be. Accidental, or even natural stray voltage might be causing enough symptoms of targeting, by itself, to erroneously presume targeting. This would be good news if the individual is not also experiencing non electronic targeting symptoms, such as organized stalking, or other forms of harassment.
Electronic targeting symptoms are radiographic in nature (radio and electromagnetic), and therefore, stray voltage symptoms, would typically be some combination of any number of things which match those same symptoms. The range of symptoms is broad, from headaches, nausea, dizziness, mood swings, sleep problems, sensations of burning, tingling, vibrating, tinnitus or humming sounds, as well as more unpleasant physiological symptoms such as heart palpitations, chest pains, muscle and joint pains, fibromyalgia-like conditions, twitching or trembling, and so forth. Arguably, there are other symptoms, as well, but these are the more commonly reported ones, and the easiest to identify as being abnormal. That said, the caveat is valid: don’t presume a system does not have a medical explanation; always see a Doctor (without talking about targeting) to make sure you do not have a ‘simple’ health issue in need of treatment.

In fact, stray voltage can simulate or stimulate a variety of general health problems in humans and animals, alike. When doctor’s tests find no other explanation, stray voltage (or other electronic targeting) may be to blame. Some animals are more able to sense stray voltage and will naturally avoid areas where it exists in undesirable levels; they can be ‘Bird Dogs’ to the problem by strange behaviors or health issues. High levels of stray voltage can also cause plants to die, or may result in random discharges between objects otherwise insulated. By way of example, a visible mini-lightening flash between an automobile and the ground or nearby fence or garage door frame.

The interesting thing about stray voltage is that its effects may be amplified by humidity and moisture, or even temperature. Therefore, such effects might tend to be more noticeable if walking in the rain or while wet, as when exiting the shower. Serious stray voltage could make swimming pools and standing water dangerous. But even relatively harmless but noticeable levels of stray voltage can be dangerous, because whatever is causing them could be capable of sudden and unexpected increases to dangerous levels. Take no chances, and deal with it right away, if symptoms are present. See below.

 

Smart Meters and stray voltage; a possible new conspiracy

SmartMeterInstaller_08.jpg

The cover story for the hazmat-like wardrobe used in Smart Meter installation is ‘arc flash’ protection, yet no such precautions are needed for ordinary meter installation. In the UK, the protection is even heavier duty than this; suitable for sci-fi spacemen.

A lot of people, including many TIs, feel that the entire power industry’s move to Smart Meters is a Big Brother and/or industry conspiracy. Like most good conspiracies, there are multiple theories involved, ranging from price gouging to spying to mind control, and more. But the big concern and commonality in many of these theories tends to include the very same health issues as found in stray voltage.

Yet when the industry itself, as well as third-party independent testing firms investigate, most such studies indicate smart meters are no more dangerous than your computer’s wifi connectivity. I’m quite unconvinced about their conclusions, but I also understand how conspiracies work, and how the intelligence community thinks — and specifically, how they think about and employ mind control tactics.

It dawns on me as result of the dichotomy between the reality of Smart Meter user experience and test results, that there may be a conspiratorial answer which explains the conflict. Once a Smart Meter is installed, perhaps Big Brother comes along and uses the Meter to establish stray voltage. That would account for the health effects and higher bills, and certainly still enable spying and mind control capabilities.

The simple fact is, the studies giving a clean bill of health to Smart Meters are only testing the meters and the air waves. They are not testing for stray voltage. So, if you have a Smart Meter and are experiencing Smart Meter woes, perhaps you ought to test for stray voltage. If you find it exists, you will undoubtedly be advised by a lawyer that you have an excellent actionable case against the power company.

Note: It has been discovered that the power industry, in order to address public distrust of smart meters, is instead apparently installing meters which look identical at a glance to the old mechanical meters, but which conceal a ‘trojan horse‘ Smart Meter under the skin. They are, however, supposed to be easy to spot. TAKE NO CHANCES, and check YOUR METER, today, even if an ‘opt out’ user. And, if told you were not getting a Smart Meter and discover a trojan horse, you once more have a reason to contact a lawyer, and the media.

 

Stray voltage as targeting weapon

Deliberately causing stray voltage as a harassment tool is not the only ‘advantage’ to perps. Because electricity can carry embedded RF signatures, it can cause an entire area, such as a home and its yard, to become a kind of transmitter of other forms of targeting signals, just as can house wiring. It can therefore become a kind of amplifier of such methods. But to employ it requires something which should ideally be relatively easy to detect, and defeat.

Simply shunting your existing AC power to ground, a deliberate ‘short,’ if you will, is NOT normally going to be done because the power bill would go up dramatically, and tip the victim off that something was amiss. Therefore, the perp would need a second electrical service on site, which means a separate meter head, which they then ‘weaponize’ for the purpose. In apartments, it might simply mean using a neighboring unit’s meter. In a home, it may mean a separate power line to a concealed meter somewhere on the property or just outside the property line. It may be an underground service, even if the property is otherwise serviced by an overhead feed.

In an apartment situation, all the meter heads for a group of units are mounted at the same location, and labeled as to address/unit. If suspicious, you can wait until a high consumption power period (i.e., using your stove to cook), and then go look at the meters. If you do this when you see signs no one is present at the suspect neighboring unit (not using their stove), but their power meter is drawing more power — you may have found proof of the method and the perp.

In the case of a single domicile, simply call the power company and ask if there is more than one meter assigned to the address, or if there is a meter or extra meter assigned to neighboring lots. If the answer is yes, ask if any extra meter is in use and being billed, or if you might be able to acquire the meter for your own use (to justify why you ask). Any extra meter may be proof of the method and, with some legal steps, lead to identifying a perp.

 

Proving stray voltage

protocols_figure_4To confirm any such targeting, you will need to prove stray voltage is present, the same thing which should be done if symptoms are present and targeting is not involved. There are three ways to do this. One is to call the power company, which has a legal liability to insure stray voltage does not exist, in the same manner that natural gas providers must worry about gas leaks. Another is to call an electrician. Either of these methods can also result in identifying and curing the source cause of stray voltage. It will likely be up to you to document their findings, such as with video or witnesses — though they may be willing to provide written documentation where they bear no liability risk. Again, you probably should not mention targeting concerns to these people.

The third method is less useful in terms of evidence unless you are an electrical engineer or have similar credentials validating the quality of your findings; you can obtain test equipment and test the matter yourself, again documenting every step as you go. It is not quite as simple as the illustrated image, and should involve more than one kind of instrument. The procedures will vary depending on where you need to test, and what the location is like or contains in the way of objects and surfaces. The entire property should be assessed, and if done usefully, will ‘map out’ zones of impact from high to low. More information on the ‘how’ is available online, including that link you should read after finishing this post.

Regardless of which method used, where targeting is suspected, know that the power can be turned off remotely as soon as any perps involved discover testing is about to take place. This means you will want to covertly order any such tests, and ideally, try to find a way to avoid having whomever shows up to conduct the test show up in a marked truck, and having them quickly first test somewhere out of sight from any possible perp surveillance position. THAT is the hard part. Doing that yourself is much easier, of course.

 

Impact, conclusion

If you are a TI or suspect same, I urge all readers of this post to comment as to their findings or conclusions upon further investigation. In two and a half decades of contact with 12,000 TIs, I have only known of perhaps three or four cases where stray voltage was in any way evidenced. As result, it appears to be an entirely ‘unknown’ targeting method (assuming such was the case). I have only recently been made aware of the possibility that a power company can have two different meter heads assigned to a property under two different account names WITHOUT the property’s  owner/renter’s awareness, even though BOTH are in use — by SOMEONE.

It can only serve the greater TI community to learn if this is more wide spread than thus far observed, especially given that it can be easily detected and defeated if and when in use. Ditto because of the advent of Smart Meters, in which case this new information may be a very useful weapon for use by activists against the power industry, and legal pressure (lawsuits) by user-victims. It is equally important because where targeting is not involved, education on topic may lead to resolving a potentially deadly stray voltage of less sinister origin, and address final cure to otherwise unresolvable health issues.

And, in closing, let me state it once more. Any instance of serious stray voltage, even if not related to targeting, likely represents an actionable legal issue; you should consult with a lawyer about suing the Power Company and/or whomever pays the bill on any secondary meter head causing the effect, or any otherwise weaponized meter head.

 

 

 

 

 

Terrorist H. Michael Sweeney’s RAP Sheet


OK, it’s true. There are at least a half-dozen ways the government can ‘claim’ I’m a terrorist. YOU TOO, for that matter. But I have a Record of Arrest and Prosecution ‘sheet’ to illustrate one of the ways I am definitely a terrorist to someone, including people that think I’m merely a conspiracy theorist. I am not ‘mere,’ at anything I do…

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 

What makes you a terrorist when you live in a Police State?

Simple answer: anything you do. There have been so many Constituion trampling Acts of Congress and Executive Orders, all so vaguely worded as to allow the broadest of interpretations, that it is almost just that easy for someone in government to label YOU (and certainly me) a terrorist. That can have very unfortunate consequences, depending on who labels you, why, and what they do about it. You can end up on the no fly list, or some kind of watch list, or even be vanished forever by Men in Black whisking you off in a black van.

One such example is, that being a conspiracy theorist automatically makes you a terrorist according to FBI. That’s bluntly stated, but true, as an article at Public Intelligence illustrates: “A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. ” The flyer, linked in the article, specifically includes 9-11 Truthers (that’s about 1/3 of the U.S. population).

OK; I’m a conspiracy theorist, or if you prefer, a Conspiracy Terrorist. But I am no ordinary ‘theorist,’ because I have a R.A.P. sheet… a Record of Arrests and Prosecutions. And here it is, below the FBI Fellon ID Card (which shows that not even FBI always gets the right man)… but be sure to read the summary text before you wonder why I’m still walking around freely.

hmswanted

R.A.P. Sheet, H.Michael Sweeney

1976  Wire Tapping, 2 counts, charges dropped for insufficient evidence

1980  Embezzling, charges dropped after resignation from company

1983  Counterfeiting, Drug Smuggling, sentenced

1984  Wire Tapping, charges dropped for insufficient evidence

1985  Shoplifting, 4 counts, sentenced

1987  Fraud, Embezzling (pretending to be a Pastor), Bad Checks, charges dropped after restitution

1988  Wire Fraud, 3 counts, sentenced

1988  Smuggling, 2 counts (bioweapons, diamonds), sentenced

1990  Espionage, Interception of Electronic Communications, charges dropped by NSA intervention

1991  Bank Robbery, 4 counts, sentenced

1991  Wire Tapping, 4 counts, cold case due to flight to avoid prosecution

1992  Fraud, 3 counts, Witness Tampering, 3 counts, Withholding Evidence, 2 counts, Murder,

            cold case due to flight to avoid prosecution

1993  Breaking and Entering, 2 counts, Grand Theft, charges dropped after restitution

1994  Wire Tapping, cold case due to flight to avoid prosecution

1994  Attempted Murder, 12 counts, case turned over to Internal Affairs, and dropped

1996  Espionage, 3 counts, Violation of Civil Rights, cold case due to flight to avoid prosecution

1998  Wire Tapping, Stalking, cold case due to flight to avoid prosecution

1998  Grand Theft Auto, Operating Chop Shop, 3 counts, sentenced

1999  Possession of Controlled Substance with Intent to Sell, sentenced

2001  Bioterrorism, Attempted Assassination, investigation closed by DOJ intervention

2002  Terrorism, 4 counts, cold case due to flight to avoid prosecution

2004  Bioterrorism, case closed due to lack of evidence

2004  Cyberterrorism, Hacking (of CIA’s Web site), charges dropped in exchange for services rendered

2016  Armed Robbery, 2 counts, cold case due to flight to avoid prosecution

2016  Bank Robbery, cold case due to flight to avoid prosecution

 

Summary Judgement

By now, if you actually read the full list, you realize no one person could be guilty of all those crimes and still be walking free… and that there were crimes on the list immediately after incarceration, and no jail breaks to account for that. This is because these are not crimes that I committed, but crimes I have investigated and exposed, or helped expose and prosecute, often working with Police, FBI, SS, and CIA, sometimes working against rogue elements of those and other agencies, even spy agencies of other governments.

Left out of that list, are perhaps 200 Stalking, Wire Tapping, and Torture cases I’ve worked on as online consultant with victims of such affairs (I’ve had contact with 12,000 individuals in that kind of predicament). I left them out because it would have made the post unreadable, and that’s a shame… a disservice to the thousands of victims of this form of abuse of power and conspiratorial corruption of principalities and powers.

So I do not claim to be a mere terrorist, but to have stopped terrorism. But neither am I a mere conspiracy theorist, because many of the conspiracy theories I’ve investigated have put people in jail, or at least shut them down and forced them to run away. One Governor, possibly two, a National Guard General, an elected County Sheriff, two Police Chiefs, a Criminal Investigation Division Lt., a C.E.O. of an international software firm, and a host of lower law enforcement personnel have all vacated their posts (some being jailed) after I finished doing my thing. While I cannot claim every one of them retired or otherwise departed their posts because of me, as I was not allowed access to official internal documents, I’m fairly certain a good number of them grumbled my name under their breath on the way out the door.

All that said, I hope that you, dear reader, have come to understand that a conspiracy theorist is no different than any other standard investigative force of a more official nature. Except for two small things, we all try to fit the available evidence with the environ of facts to determine the truth. We both form hypothetical postulations as to suspect and motive, prove opportunity and method, and try each point of evidence against all others which might disprove the hypothesis (though as we see all too often, many criminal cases are happy to prosecute the innocent if they think they can make a strong enough case and hide the truth).

We both theorize up front. The first difference is that conspiracy theorists do not have the luxury of making an official determination, while the official investigators do. The second difference, and most important, is that we start with questions regarding failures in logic in the official findings and reports; we question government, which is not only the right, but the DUTY of every citizen, always. How else will you ever find a cover up? We know there have been all manner of cover ups exposed in media over the last few decades, and I remind you, you NEVER have a cover up UNLESS there is a conspiracy, because a cover up itself REQUIRES a conspiracy to execute it, and the affair being covered up is always so complex that it, too, MUST by default represent a conspiracy. Guaranteed.

OK, FBI, come and cuff me… unless I’m wearing a bomb like other terrorists,or have run off to Mexico to escape your ‘justice,’ in which case, just have a better day.

FCC to Kill Local Television as We Know It


Once more, we see the Federal Government usurping power in ways which both benefit the big corporations at the expense of personal freedoms and financial viability of citizens. This time, it’s the FCC, and not the BLM, and they want to eliminate any chance for you to watch local television without paying through the nose for it… and suffering de facto censorship.

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

FTC to Kill Local Television as We Know It

From infinite unknown.net on Obama approved NSA spying on Internet (click)

From infinite unknown.net on Obama approved NSA spying on Internet (click)

Tuesday last, a little heralded announcement by the FCC once more revealed how controlled mainstream media is. They, more than anyone, perhaps, should have been screaming the news from the rooftops, and complaining about it, as it affects EVERY major and secondary television station in every market across the country. The ramifications are so broad and sweeping as to threaten the very social fabric which defines us as a nation. In summary, the threats are as follows:

  1. Eliminates all local television service as we know it today, virtually ELIMINATING ALL OVER THE AIR BROADCASTS. No more ‘free TV.’
  2. All licenses by FCC currently in place are cancelled, and ‘up for sale,’ they want to raise 60 billion dollars which will be unaccountable funds off the FCC budget. This means they can be spent on any black project without any accounting.
  3. Major stations (e.g., your local ABC/NBC/CBS/FOX affiliates) will be paid many millions from the sale, far more than the stations are actually worth; hush money not to protest, we must presume.
  4. Secondary stations, including repeater stations or small unaffiliated stations in deep rural markets, and even possibly PBS, will be paid NOTHING, a virtual THEFT, and possibly, a loss of all public broadcasting systems!
  5. All will be sold to Cable and Web content providers, forcing consumers to get any TV by paid subscription or on-demand purchase.
  6. Significantly eliminates local news coverage, limiting it to official sources only; the government’s preferred message, a form of censorship which effects de facto mind control.
  7. Stages the FCC for total control of Web content under the new ‘authority’ it declared for itself last year; easier to censor and dictate what you can learn if there is only ONE resource and it is controlled by government.

 

from International Liberty's page on foibles of FCC's 'Net Neutrality' (click)

from International Liberty’s page on foibles of FCC’s ‘Net Neutrality’ (click)

It follows the Fascist model: The plan is insidious beyond belief once fully understood. It is perhaps no coincidence whatsoever that it follows Obamacare. If one reviews history of the quiet takeover of nations by Fascists and other dictatorships, those ‘bloodless revolutions’ always start with the complete takeover by government of all health care, followed next by takeover of all media. What follows is usually great financial and social upheaval allowing significant draconian responses, to include something along the lines of Hitler’s Brownshirts and the SS, and a permanent war footing with an expanded military and military police state. But people never learn by the mistakes of history, and there is plenty of that…

It happened that way in Germany, Italy, and in South America, it happened again and again. In each and every case, the takeover steps were quietly initiated and never fully understood even by those involved in enacting the changes. In every case, they inflicted greater hardships socially and financially upon citizens than those woes they claimed would be addressed thereby. In each case, a central power figure emerged who responded with ‘law and order’ and bypassed, neutered, or altered the form of government to a Fascist regime.

Unfortunately, any and all of the current Presidential candidates, save one, could fit that bill in this author’s opinion. Trump appears to be a closet fascist, Cruz appears to be one of the same old gang of criminals who brought us to this point in the first place, Bernie is a closet Communist, and that awful woman is simply a criminal rapist of nations and peoples. But my opinions are unimportant. Even if whomever is elected is not set to be a fomenter of fascist revolution, the power elite who manipulate politics will simply assassinate them or blackmail them to assure the desired outcome.

Naturally, like most draconian moves by government, the official propaganda is worded exactly the opposite in tone to the reality. That’s why we get Bills that actually accomplish the reverse of their title, like ‘Affordable’ Health Care Act. Believe as we say we do, and ignore what we actually do.

Take a look at FCC’s official page, here.

Now, lest you think me simply another lunatic conspiracy theorist, I got my first wind of this plot, to include all points cited herein (save my opinion on SOME of the candidates), from a conservative call-in radio show where the station owner of a secondary market called in to shout a warning and explain exactly how it was rape and pillage of the television industry and the public in favor of Cable and Web bigwigs. I don’t make anything up; I don’t have the time nor inclination!

 

Free Will Haven; Targeting Free Intentional Community for Stalking Victims


When I created the Free Will Society to aid stalking victims, one of the lofty goals was to eventually build some form of Safe Haven community for them. That dream now seems on the threshold of coming to pass. The result is Free Will Haven.
iWhere can a targeted individual get help?
Free Will Haven; Targeting Free Intentional Community for Stalking Victims
by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
What is Free Will Haven?

Free Will Haven?

MAJOR UPDATE/REWRITE: Aug. 2017. It’s been three years now since we formed the Free Will Society with the intention to establish a low-cost, self-sustaining, targeting-free intentional community (Free Will Haven) for stalking victims who can’t get a fair shake at life in populated areas. A lot has transpired, some of it really good, some of it bad, and now, it looks like we are ready to ramp things up a bit. So I thought this page should be rewritten, and perhaps, be simplified. Very little of the original post remains, or remains unchanged, and I have added rather a lot about the Beta site which was established and our plans for an even better location. Over 2,500 victim days targeting free! Compare that to over 12,000 stalking victims I’ve had contact with over some 25 years where almost every victim says they can’t get even a few days respite, if not for the stalking, then the fear of it.

Intentional Community? Beta site has been undertaken

Wikipedia’s definition for Intentional Communities is a full paragraph long. Simplified, it is a community planned from the start to cater to specific persons of like (interests, beliefs, goals, needs, etc.), typically favoring alternative lifestyles which foster those goals. You can learn more about such communities at sites like tedxblackrockcity.com (informative video), ic.org (a kind of ‘superstore’ of centralized info on topic), dba Fellowship for Intentional Communities (Facebook  page). The Free Will Society is now a Member organization of the FIC, which gives us access to a mountain of informational resources and other aid not previously enjoyed. Much of this is now available and useful to FWS Members as result.

FHHlogo

P.O. 1941, Clackamas, OR 97015 — no phone service here

In Free Will Haven’s case, our goals are ecological and consumptive sustainability (not to be confused with the New World Order’s use of ‘sustanability’ when pushing Codex Alimentarius, Agenda 21, GMO foods, Genetic Engineering, Global Warming, Carbon Tax/Credits/Currency, etc.); survivability (in this case, against all forms of surveillance, stalking or targeting of individuals in any manner), and financial and spiritual wellbeing (the unchecked pursuit of happiness through exercise of God’s gift of Free Will). Defensive survivability lays at the heart of the plan, and is based on the many books and online consultancy I have made available as a privacy/security expert to targeted persons for more than 25 years as The Professional Paranoid, the title of my first book.

Low cost is addressed primarily by focusing on portable tiny homes, or RV vehicles for short-to-long-term housing, and communal style co-op sharing of centralized services and site-produced foods and resources. Cottage industry will be encouraged to augment personal incomes, and/or like projects for the collective. It is the goal to allow one to live a decent and enjoyable life-style for less than $500 a month, total outlay (I’m managing on $400), that figure based on purchasing of food and supplies from outside sources. Once self sufficient, costs would decrease accordingly.

intentional

Rendering example of tiny home intentional community

I think of FWH as a bit more flexible than a community. I see it as also acting as a short-term hospice for those seeking temporary shelter and healing from their ordeal, and in some cases, a school of defensive arts, and even self-replicating factory. Residents can stay as long as they like. Once fully rested and obtaining stability in their lives through being targeting free for a sufficient period, they might wish to return to society, perhaps under a new identity (we can help with that), or, perhaps, having learned what it takes to establish and operate such a community… go out and create another one, somewhere else. We would like to see several of them nation-wide, and even internationally.What makes Free Will Haven an intentional community?

Tiny homes and RV life style?

A tiny home generally references any small living space intended to be extremely practical and economical, though minimalist in nature. As a rule, this commonly means either a starter home for a young couple or single individual, or a retirement home for someone without a family, as a tiny home cannot have many rooms dedicated for family functions and individual compartmentalization.

The original tiny home movement included exotic efforts with costs of $1M or more not uncommon; ultra modern, hi-tech, and with prestige designer labels attached. The grass roots version, on the other hand, has gone wild finding ways to do as well with less, with costs ranging from well under $10K to perhaps an average of about $40K for the higher end; about what one might put down on a conventional home mortgage. This has resulted in an almost unlimited array of possible home design types and, as result, flexibility in meeting individual needs and tastes, like these as found at pinterest.

You can have tree houses, container homes (check these out), domed homes, spray cement (free-form shape) and similar homes (check this video out, and this), underground homes, and more, including homes that simply look like a normal home but scaled down… some of which are on wheels. That brings us to the fact that a motor home, RV vehicle, trailer, or even a manufactured home also qualifies. All of these are on the drawing board/table at Free Will Haven.

The ones we favor most are the ones you can order pre built and delivered to the site (look at these, and you can even get an ‘Ikea’ home complete with furnishings), or the ones you simply buy plans or kits for and then build yourself (like these). Or, they can be ad-hoc, and built from whatever you can cheaply get your hands on. Google any of these home types for endless solutions to choose from, and when it comes time to actually consider residency options, we will work with you to fine tune or better the ideas you favor.

I have established a special page chock-full of information about the ins and outs, pros and cons of the almost endless options available in choosing an RV type or style of Tiny Home. It also addresses the lifestyle, itself. RV solutions provide a quick and dirty ‘home’, completely self-contained with everything needed including their own backup generators. Tiny homes tend to be minus some aspects, such as bathrooms, but can include them; its up to the individual. They can end up being more roomy and comfortable than an RV, and seem more ‘homey.’

The Free Will Haven concept encourages use of an RV upon arrival, and the construction/installation of a tiny home (many of which can be portable and towed like a trailer). If electing a tiny home, any RV in hand can then be sold or rented to someone who does not have one, sold for long term, rented for short term. The same can be said for the Tiny Homes should a resident choose to relocate and not take the home with them. There is no reason anyone should feel that becoming a resident has no exit options. Quite the contrary. It increases options.

Beta site effort proves viability

Beta.png

Beta site proved concept quite workable

The original Beta effort has resulted in the purchase and operation of a rather off-grid beta site by one of our founding members using their own money. It operated for about two years serving two TIs using most of the basic plan established by the Free Will Society. For whatever reason, the owner/operator of the site elected to abandon reliance upon and participation with FWS, though we had provided money to help pay for installation of electrical power to the site. There are clues it involved personal matters as well as relationship issues.

While there is some mystery as to why a refusal to engage in dialog, it is clear the Beta site was successful in terms of the key-most goals; survivability targeting-free. We are grateful for their effort. The Beta site failed only because of eviction for contract violations of some sort, presumably through miscalculation by the owner/operator in absence of help from the FWS. Due diligence is always upon the purchaser, who was at a disadvantage in many ways in terms of ability to do so. It is a regrettable outcome.

Meanwhile, I myself have been living as a homeless person in a motor home. I have essentially established a semi Beta site of my own where I was the only resident, also in a deeply rural environment. Between my experience and the actual beta site, there has been a total of more than 2500 targeting-free days. It has been a joy for me, and the Beta site operator has come forward publicly to express positive views towards the experience and an intention to attempt yet another effort. In that effort, the operator has affiliated with a new core group with a troubled past with respect to credibility and honesty, and we wish them all better luck.

The concept is proven. 2500 stalking free days!

Now it is time to move forward more earnestly, and do it right, this time.What is a tiny home like in Free Will Haven?

The future: location and logistics?

The original beta site (image) was less roughly 1 acre in size, and rather a long, narrow unimproved property at a high altitude in a colder part of Oregon with a dry clime (annual high of less than 60 degrees). It had no water but was near to a river with drinkable water and fish, and she had a water filtration system. It would support a well at shallow drill depth. It had no power but as it fronted a main highway for the area, it did not cost much to install power. It would support raising crops, and was established with an Airstream trailer (very nice) and several other towable items, and self-assembled Quonset-like structures for storage and greenhouse function. It is not known if a second RV was brought in for the second resident; the Airstream is thought to sleep up to four persons in two different accommodations. Still, it is not a terrible site, actually fairly decent given it was purchased sight unseen and based on a limited budget.

This site was not chosen with the help from or according to the ideal guidelines established by Free Will Haven. Since the purchase was made with the operator’s money and in consideration of their small income, that exercise of control was perhaps expected. The basic-most needs were considered to the extent possible. But While there was some good visual separation between the site and neighbor structures by trees, it was not as private as FWS would prefer. There are two neighbors within about 600 feet of the property (less than a city block). The nearness of a main highway, though also buffered with a lot of trees, is also not a perfect situation. I do like the fact that the rear of area (not shown) is backed with a high bluff which is uninhabitable, and provides security.

We can and should do better. Recently, my Publisher bought some property at auction and invited me to live there rent free. While it turned out not to be possible due to dense forestation requiring expensive work just to get onto the property with a motor home, the method of acquisition was unrealized in previous review of potential sites. Things are looking up.

ideal.pngCompare the the Beta site to this 20 Acre property which represents the ultimate site for meeting goals established for Free Will Haven. The road is a gravel road established for timber harvest and is seldom used by anyone but hunters — residents could hunt on the property if desired! It dead ends at the property, which is a flatland at the top of a hill, and continues into the property as shown for easy access.

It has multiple developable locations and area for growing crops without the need to fell trees. There is NO ONE for miles in any direction. These are the kinds of features preferred in the actual site. Depending on many factors, a really good site could be as small as perhaps 5 acres and still prove satisfactory. Geographic features such a hill can negate concerns about privacy as relate to adjacent properties. There are many such opportunities; cliff faces or steep terrain, rivers, national forests, etc., can all be allies.

This particular location is very inexpensive to purchase despite the larger acreage, simply because there is zero access to commercial power at any cost. That lets it out of consideration, as neither solar nor wind power enjoys economy of scale in the levels required to support a comfortable life style for a given individual, much less a collective. It would take approximately $9,000 per living space for solar, for instance — without a battery system to cover nighttime use (another $4,000). Figures are based on the same power level as the generator output in a typical Motor Home. If one had a few hundred thousand to tie up into an off-grid house, that would be a small bit of the budget. But that’s not your typical stalking victim. I’ll mention here that the weather is much nicer at this location, too, withs highs in the 80s.

The all important factor in any land acquisition, of course, is cost, including what it will take to occupy it successfully. As it happens, there are properties which fit these kinds of requirements which are available at a price I can afford. Sort of. The trick is finding them where the owner will finance with ‘ez credit terms,’ which, fortunately, is not unheard of. I have to be able to handle the monthly payment out of my pitiful social security payments, and have a low enough down payment that I still have money to pay for bringing in power and a water storage system, and a few other items such as a storage shed, and a freezer (a Motor Home typically holds about four days worth of frozen foods).

Alternately… should the Society obtain a large donation or one of our members win the lottery (I buy tickets), I’ve found marvelous properties in Missouri which offer as much as 160 acres fully developed as a farm or ranch capable of producing an income suitable to cover mortgage… for less money than it would cost to buy a house in most big cities. Many of these have rivers, lakes, or ponds and wooded areas full of all manner of wildlife, such as Wild Turkey, Geese, Ducks, Deer, Boar. This allows hunting and fishing right on the property, many of which have hunter’s cabins or blinds in place. But I’m not waiting for $300-500K donations.

I’m scouring land listings for something I can buy NOW. And, I will be starting a new gofundme for anyone willing to help, and/or wishing to participate, perhaps, as resident.

Participation: Membership and Residency

member-badgeAnyone and everyone is requested to join the Free Will Society, stalking target or no, to support the Free Will Haven project (and other projects planned in the future). Annual membership is $25, currently payable by PayPal to proparanoidgroup at gmail com, adding comment to that effect in the message it requests in the process. Membership gives one access to more detailed information, including the history thus far of the project in detail, and an opportunity to participate in and contribute to the ongoing dialog and direction of the effort. It also gains access to dozens of resource materials from our membership in the Fellowship for Intentional Communities.

One must be a Member to apply for residency. There is a separate $25 fee to cover the application process, which is required to insure that all residents will be able to benefit without social incompatibilities. It is unfortunately true that there exist people who claim to be stalking victims who are not, for instance. While one can join and apply simultaneously, I advise against. Membership will provide access to a flood of information and direct contact with other members, and could conceivably end up changing a person’s mind about residency. One should be fully informed before deciding.

The application process further educates the applicant toward decisions about if, when, and how to undertake the actual move. It analyzes the applicant’s ability to actually undertake the venture with a reasonable expectation of happy success, fully informing them of what to expect in the way of possible downfall, all based on their precise personal situation. A checklist of things to consider and steps to be taken is reviewed in great detail, critical in determining the true cost of ‘move in.’ Once approved, they need not act immediately, and can work through the checklist at their own pace, as may be dictated by anything from costs to family affairs in need of tending.

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View


The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some Satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that select shooting lines form a 3-D perspective view of Cheaps and transparent depiction of all inner passages;
•  that there are specific ties between Cheops and the goal of the New World Order;
• that Cheops is a kind of key to understanding European Illuminati/Templar relationships to mass shootings.

Are mass shootings by intelligent design?

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View

Is there a mass shooting conspiracy?

Mysteries of Cheops

In the prior post we saw ties between shooting event lines which formed Masonic and Satanic symbols, and a series of orange lines which led us to the Great Pyramid, Cheops, in Egypt. While those were quite remarkable and sufficiently consistent to defy any chance of random coincidence, what follows will dramatically make concrete the notion of intelligent design as well as the importance of Cheops to said design. And finally, we will see there is yet another way to look at Cheops’ roll in the Illuminati/Templar and mass shooting tie-ins, but this time, from the European point of view.

First, we need to understand a bit about Cheops and its importance in mysticism. There is so much which could be said that there are literally countless books on topic which could be entered as ‘evidence.’ Here, I will focus on less than five percent of such material topically, only able to skim the surface of them. Consider it merely to whet your appetite to learn more, for which some suggested links will be provided along the way.

One key aspect of Cheops is that it is rich with magic numbers. This seems to be true regardless of if using the original units of measure employed by ancient Egyptians, or modern day equivalents. Indeed, some of our current units of measure stem directly from the ancient Egyptian measuring system, a fact often laid at the feet of Freemasons and their predecessors, the Masons. While I won’t spend time expounding, many of the measurements of Cheops, both in original and modern increments, enjoy magic number properties, doing so in ways which, like those illustrated in the prior post, are mind boggling. Some serious mathematicians have found even more wondrous relationships to both the ancient and modern discoveries of Man well beyond any possible knowledge to Egyptians of old.

Perhaps the keymost aspect of Cheops which potentially makes it ideal for inclusion in mass shooting patterns is that it is only the Giza Pyramid which has a complex of inner passageways and rooms. Early mystics and even some studies of Cheops by persons with scientific credentials and methods, have proposed and illustrated a belief that the construction of Cheops was an enlightened project involving supernatural or mystical knowledge of the future; the internal passages and chambers thought to be a roadmap to End Times and key events along the way. That is represented by the image, below, from this interesting Web site. Others out there (with less useful images) have more detail with the most recent/current annotation being the year 2010, roughly the height of mass shootings. That marking is in the King’s Chamber, which implies ‘control and authority.’

ONE Egyptian Inch = 1 Year of History. From gizapyramid.com (click).

Of specific interest to mass shooting research and the notion of Illuminati Masonic Warlocks being the architects, thereof, is the fact that shooting lines can be found which quite correctly depict a pyramid across thousands of miles of the United States. More than this, they quite usefully do so in 3-D rendition, even to the point of detailing the inner passageways found in Cheops. In fact, the depiction is so uncanny as to have key aspects ‘to scale’ with measurements which work math magic using modern increments of measure against the ancient’s units of measure; not just scale in size, but across the barriers of time in the expression of numbers in different languages and cultures. Take a look:

 Do the pyramids really relate the entire history of the World from beginning to end?

Shootings depict Cheops

Pyramid

Left: perspective transparent view; Right: inner view of interior passages. Remarkably, it took only 9 shooting lines, and 14 shootings, to depict the pyramid and passages. However, 5 shootings stand alone (not on lines), meaning 9 are, giving us again the magical 99/18 result.

As you may recall from the prior proof the orange lines are lines which run from shootings directly to the Great Pyramid, Cheops, each exactly 500 miles apart as measured along a given line which is perpendicular to them all, and which itself runs through several shootings. The green line here, however, is at the distance of 10,000 miles from Cheops, which is one/fourth the distance around the World (the vertical diameter being 40,008 miles on average), and it too transverses several shootings and is perpendicular, but the distance at this point between lines is 505 miles.  Each orang line originates dead center of Cheops and is separated by almost exactly 7.5 degrees of arc to achieve this feat. That is interesting for another reason; 360 degrees divides by 7.5 exactly 48 times, and 24,000 miles (the rough diameter of the Earth horizontally), divided by 48 indeed equals 500 miles.

Now there are some admitted problems in trying to depict a pyramid with any degree of accuracy in a 3-D perspective view, especially if with cutaway to reveal interior passages. Such a view does not simply allow us to measure a line and compare it to Cheops with good expectation of results. Perspective causes a measured horizontal to be less as it is depicted further away. A line transiting diagonally in one or more axis in 3-D space is even less useful unless one knew the precise angles for each axis both it and the original against which it was to be compared, were employing (and additionally, the depiction version is arbitrarily decided by the person rendering it, and impossible to discern without their sharing).

Cheops!

As the satellite view is at a an angle, the ‘center’ is based on the base, not the peak.

The depiction in this case seems slanted over America as if about to slide into the Caribbean. That is for a reason: it is faced (viewed) with the same face (view) as the actual Cheops is when following the orange lines, there  — presuming in both cases one is looking from the center orange line towards it. That is to say, looking at Cheops in America from the center of the lines, would give you this same perspective view if standing in the center in Egypt. That cannot be coincidence.  The problem with that, however, is that in Egypt, in relation to the Orange lines, one corner is clearly (looking down from Google Earth) nearer the observer’s position than another; there is no line which is not at an angle to the observer.

Note: I further feel it is an error to assume that modern-day Illuminati Warlocks have the skills and knowledge base, or event he interest in the crafts and mathematics of Masonry, which they left to the Adepts when Templer remnants infiltrated the Mason’s Guild and eventually took it over to form Freemasons. They are not likely going to go for precise renderings as much as symbolism; accurate to the point which can be managed simply, but no more, I believe.

 Why do Masons, the Illuminati, and Satanists focus on Egypt and Cheops?

How much is a Royal Cubit, anyway?

It is, as result, impossible to establish a precise method or true consistency in relationships (i.e., to test for accuracy in scale) of measurements between Cheops and the American pyramid. The required data and accuracy required to plug into complex formula is beyond our ability to deduce. Ideally, a computer program modling in true 3-D space could be used to compute and confirm such comparisons… if we knew the angles employed by the architect of the American depiction.

But that does not mean we give up. We do the best we can with the tools at hand, and must come away at the very least acknowledging that in the 3-D layout, the mere visual similarities alone are sufficiently ‘coincidental’ to imply intelligent design, and in need of further study with better tools. But that does not mean we cannot ‘cheat,’ and then test to see if our cheat had any merit. After all, perhaps the architects employed a similar gambit. We wont’ know unless we try, ourselves. So…

By rotating the view as I have in the image above, we at least have the illusion that the base line is perpendicular to our viewing angle such that we are tempted to measure it anyway, and then see if there is any discerned relationship to Cheops which results in some kind of conversion factor. If we CAN find one, we can then apply that factor against other test lines and, in theory, if or factor was arrived at by other than coincidental happenstance, we should find the measurements work out correctly in the conversion. Guess what? We can, and it does!

Cheops on a side is 440 Royal Cubits, or 36524 Egyptian inches (a precise year’s worth of inches times 100), which works out to 230.4 m, or 756 feet. I will admit that finding a conversion factor took me some time. I made no headway at all until I realized that the orange lines were like rays of a projection lens in a theater, taking a small image and projecting it to be much larger at a distance. I reasoned there had to be something about analogy involved in the conversion factor.  I also felt that any such conversion MUST involve the ancient increments in some conversion to the modern, rather than a modern to modern comparison. Turned out true.

As I discovered, if you divide 36524 by 440 you find that there are 83.009 Egyptian inches in a Royal Cubit. Funny. Both sum to 20. If you then multiply this times the total degrees of arc for the American depiction, which is three orange lines, or 22.5 degrees (±.03), you end up with 1867.7, which is exactly the measurement of the depicted base line… in Kilometers; ancient to modern, using the orange lines as calculator. So, now to test the accuracy and intent, vs. the notion of coincidence (pretty big coincidence, if that is all it is.)

Testing our factor: There are only a couple of other places where lines are similarly ‘perpendicular’ to our view (like the base line) by our peculiar method of so assessing for the purpose. Two of these are passageways to the King and Queens chambers, which just happen to have shootings (house icons employed for this use to match the drawings of the actual Cheops chambers) at the approprate locations to at least approximate the inner passages with an appropriate resemblance. But there is a problem with trying to test these with our conversion factor. It has to do with the Mississippi River.

Looking at the drawing of Cheops’ interior, you will note there is an irregular passageway leading down between the upward and the downward sloping passages. This is thought by some to be a water drain, as there are interior air vents which happen to align with prominent Constellation stars on select key celestial event dates, and that admits water. The lower passage in fact has a chamber with a deep pit which resembles a Well. In America, as it happens, the Mississipi River runs a course reasonably similar to that passageway and at the appropriate points in our depiction, given some small fudge factor.

Clearly, the Illuminati has no control over the course of the Mississipi, which changes slowly with time, and therefor, any depiction of the inner passageways must in some way accommodate those changes. My conclusion is, therefore, that such accommodation would necessarily mean a skewing of measurement accuracy in these passageways. Indeed, no line among them which is angled, nor the passages to the King/Queen chambers, quite works out, though some come closer to doing so than others.

But there is an entirely different story in play once we get past that drainage passageway, at the very bottom of the network. That whole portion is, by the way, beneath the ground level of Cheops by a goodly distance. In fact, the pit, which was filled with loose rocks as if a French Drain, once cleared, measures 60 feet deeper.  Now, there are three points of interest with respect to testing our measures, and some landmark verifications we can also apply…

These are: the entrance passage to the Subterranean Chamber; an exit passage which is a dead end; and the pit. Applying our conversion faster, all three lines as depicted are of the correct length and are at the correct scale to the previously computed base line. But there was no shooting or key line to establish these lines (well, one line seems to do so), so we must seek some other verification that these are as intended by design. They do exist. Lets take a look:

SubPass

The entrance passageway: The entrance passage determines the location of the Subterranean Chamber in the depiction, which we will verify separately. But it also has an unusual feature along its walkway, a kind of antichamber or alcove to one side, with no discernible purpose. On the map, at its correct location in the depiction, we find our old friend, Remington Firearms (the white arrow). That was, in fact, one reason I tested line placement at this site. Interesting then, that both this Proof and the prior Proof find their factories involved in shooting lines, baphomet lines, orange lines, and pyramid lines. That cannot be coincidence, and points to intelligent design, and intent — especially since the other Remington facility from the prior Proof is also present directly along another passageway, as seen in the first image of the depiction from above.

The exit passage and pit, on the otherhand, when extended the correct distance within ONE METER accuracy, end at… water wells, pumps, and tanks; which relate well to the purpose of the Subterranean level. That leaves the Chamber, itself. You will note a graphic image overlay veils in transparent fashion the intersect between the two measured passages and the pit. While there to represent the chamber, it is not really as ‘large’ as the chamber would be if to scale. At a particular location within the Chamber area it does cover, we find a nuclear power plant. This is interesting because much lore about Cheops includes references to end times, and equates the Subterranean Chamber to Hell, and the bottomless pit. One of hottest things we have on Earth is the interior of a thermonuclear power plant, and it burns both with heat, and invisible radiation; hell on Earth, should you care to experience it, with or without an accompanying China Syndrome ‘pit’. But there is an even more interesting verification, which is why the overlay:

Chamber

It is hoped that it is not intended that this nuclear facility suffer a China Syndrome disaster such as seen at Fukushima, in order to render the ‘pit’ real on Earth in a hellish fashion.

The inset is the original artwork from which the overlay was obtained, a sketch of the what the actual Chamber looks like at Cheops, where it is described as seeming more like an underground quarry with lack of intent in what remains. The original is of very low resolution, I’m sorry to say. What I noticed about it that caused me to think to do the overlay, was the leftmost vertical protusion. I’m glad I did, because when I overlaid it, seeking to line it up with the cooling tower of the nuclear plant, I noticed something.

Actually, I noticed it while playing with the transparency level so I could see where I was positioning it. I truly wish I had video capture ability to show you the startling discovery, which, with a slight change in aspect ratio, was maximized; the darket portions of the overlay precisely match and seemingly define changes in terrain or map features. The effect is this: it gives the impression that the terrain to the South and near the power plaint has been cultivated to MATCH the overlay usefully. The best that I could hope to do to depict it here was to increase the contrast of the overlay, and alter the levels. There were originally only two discernable shades, black and gray (it is a B/W original image with some dithering in evidence). There are now four, and only the lightest of these is NOT defining a shape or darker area on the Map.

I apologize in realization that this is nowhere near as useful a description as the visible effect I’d rather show with video, but I assure you it is startling and implies, along with the wells and the Remington matter, that these lines are indeed intended to be here and at these dimensions, which in turn verifies the scale conversion factor discovered. Intention by design, in design.

 What is the the relationship of Cheops and Mass shootings to Templars and the Illuminati?

The European point of view

EuroAt right is an image looking from Cheops towards Europe, to reveal how it ties in with the Illuminati and Templars of old… not to mention any modern day Illuminati Warlocks operating there, today. Especially if their operations include casting magical designs in mass shooting in America to fast forward the formation of the North American Union and establishment of a one-World government under control of the Antichrist. Observe:

At the bottom we have our orange lines radiating outward at increments of 7.5 degrees of arc, where, in order to get to their designated array of shooting destinations in America, they must first pass through Europe. In Europe, we find one of these lines passes directly through the birthplace of Adam Weishaupt, Masonic founder of the ancient Illuminati (ironically, in 1776 — not truly ancient as most count it).

It is interesting to note that one can create in Europe, using only the birthplace of Weishaupt, and the orange lines, a baphomet which is correctly aligned Northward (the stray orange line), IF, and ONLY IF, running the North-line through the VATICAN IN ROME at the adjacent orange Cheops line. Then, IF, and ONLY IF, electing to use the Weishaupt’s birthplace as the center of said baphomet, will it then result as seen.

The significance of that is manifold. For one, it rests upon the remainder of the orange lines in precisely a mirrored orientation and in like relationships, in general, with the orange lines as does one of the baphomets in America. In other words, just as the depiction of Cheops in America was at the same viewing angle relationship as if looking at the real Cheops from an orange line, so it is, here, with the two baphomets.

Thus once more, the orange lines ‘project’ an image in useful scale with the same orientation to create a sister depiction in America. The difference is, THIS ONE, is properly aligned North for ceremonial use, and the one in America is flipped, so to speak… which allows IT, TOO, to be aligned with North IN AMERICA. How can that be by anything, but design?

Weishaupt’s baphomet, by the way, is at a point along the orange Cheops lines where, if used as a measuring point, they are exactly 333 Km apart, which is 207 miles (sums to 9), and 180 nautical (18), and since 18 = 99, that makes 3 threes and 3 9s, which is 999, or a code number for 666. And, of course, if electing to measure in both directions (the diameter of a circle about the birthplace between two adjacent orange lines), we also get 666.

Finally, we also see in the image the yellow icons for Templar castles and other properties, at least the ones we know about, and the red icons (and one balloon icon) which are Illuminati historical sites. We see also one green and one purple line coming from America, one a guideline from a baphomet depicted, there, and the other from a Masonic emblem, there… where both additionaly go directly to Cheops. The circle is complete; Cheops, European Illuminati and Masonic (Templar) histories (and arguably, current Warlock activities), and shootings in America and their resulting patters, all neatly tied together by six lines which impact all else. Coincidence?

 What is the link between Masons, the Illuminati, Satanism, the New World Order, and Egyptology?

Go back to Introduction

Go back to Proof SevenShootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Go to Proof NineShooting Sets Share ‘Magical’ Data Points Which Decode to Messages

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart


Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that select shooting lines can be extended to a single spot on the other side of the World;
•  that spot is the Great Pyramid, Cheops;
•  that the lines are exactly 500 miles apart at a given point and form the same angle of arc.

Are mass shootings by intelligent design?

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Is there a mass shooting conspiracy?

The last proof resulted in some negative commentaries to group posts announcing its availability, all based on disbelief in the postulations advanced. This requires me to repeat myself: It does not matter what you or I believe, it only matters what the architects of mass shootings believe. Now, in this post, we start to examine the symbolism of Cheops and its ties to the shootings, which is also about what THEY believe. But first, I owe readers of Proof Six an explanation about the relevance of the ‘orange lines’ to select purple lines of the satanic baphomets and green lines of the Masonic emblems discussed as tying directly tie to Proof Seven in an unusual manner. So here we go, referencing the image below…

The orange lines are the multiple lines to Cheops this post is all about, of course, but those lines by and large pass through Europe using what is known as the Polar Route on their way to Egypt; the shortest, most direct route, despite the fact that in the movies they always depict planes flying East over the Atlantic to get to either Europe or the Middle East, or the other way ’round if going to the U.S. This is why, for instance, Iran Contra gun running used a stopover in Denmark and other Euro sites on their way to Iran, something which at first didn’t make sense to me when I learned of it.

The purple and green guidelines used in finding and plotting the baphomets and emblems also go to Europe, and end up doing something the bulk of the orange lines ALSO do: they just happen by ‘coincidence’ to pass through at least one, but more often, MULTIPLE ancient Illuminati and Knights Templar castles and other properties employed in their conspiratorial affairs, including some more modern facilities, and even Adam Weishaupt’s birthplace. He, of course, was the founder of the Illuminati, and a high Mason, and the Templars were the folks who evolved eventually to become the Freemasons we have today, as outlined in my book, MC Realities. There is one other line which does this, which is a red line created from a perfect isosceles triangle from Proof Three, which is the best example of ties to the modern Illuminati, as well as ancient, but also Cheops as it also directly intersects with the famous glass pyramid at the Louvre Museum in Paris.

There are other indications these lines and their relationships with Illuminati and Templars is tied to Cheops, in that some of the lines continue past Europe to the Middle East to find Templar sites, there, and two others, one each from a baphomet and an emblem, go directly to Cheops as if an orange line. It is interesting to note further, that these two are extremely close to the second orange line in from either side of the six orange lines; uniformity. Take a look: each white arrow indicates a line of interest which ties to the Templars or Illuminati. The ‘houses’ represent Templar locations (those icons refuse to float accurately over their respective sites at this viewing altitude), and the harder to see red dots are Illuminati, save Weishaupt’s birthplace, which is well marked. There are 18 lines in all, our magic number which equates to 666 in occult terms, only one of which (orange) does not find a Templar or Illuminati site, but we are talking about locations which in many cases have been lost through the centuries and, likely, it really does do so, but we simply have no such knowledge, today. The modern day Illuminati, however, WOULD know. The line certainly passes through territories where such properties are otherwise existent (not all sites are shown, only those which are intersected by lines).

pastpaths

Cheops I had previously been aware of the importance of Cheops to Masonic and Satanic histories, some more tenuous or doubtful than others, but all generally of a mutually supportive nature. If one reads the Masonic Bible, Morals and Dogma, it is clear that the leadership of the organization at the higher levels, is Satanic in its beliefs, practices, and tactical applications, and that all things of Ancient Egyptian lore play into their belief structures and lore. To Masons, especially, there is significance in the Pyramid, and thereby, also to Satanism.

Yet one can find other resources which state the Pyramid is outright tied to Satanism in one way or another, both inclusive and exclusive of Masonic ties, which came later in history. It is a Chicken or Egg question, or sorts, depending on the factoid being considered, but we need not answer those questions; our concerns are valid regardless of the answer. So when I noticed that some shooting lines seemed to angle off toward what I knew to be the ‘polar route’ to Egypt. I sought to verify, and was immediately proven correct. In the image above, find six orange lines which all meet precisely at the peak of Cheops a third-way around the World. They are all drawn at the same degree of angular separation (about 7.5 degrees).

At a given point in the map, in America, they are all exactly 500 miles apart, and as this image shows, they relate to shootings as they go. To date, only one (left most) has no useful shooting along its path to make the claim, but that does not mean there will not be in the future, and so, it is included. It may prove a means of predicting and even preventing a shooting. CHEOPS ALIGNMENTS x 6 There is no significance in the 500 number — at any given point, the lines are equidistant by some measure, I just chose a point where it produced a round number.

However, as research continued, I learned some things which would seem to make that a more important point. In the image below, this is revealed, and in the doing, we see also how the shootings themselves tie to the lines in important ways. More than this, the actual measurements once more reveal magical use of numbers in the occult manner. We should talk about accuracy. Given the great distance these lines must travel (35 million feet or more), the worst accuracy of these key lines is typically less than .05 degrees of arc (dependent upon Google Earth limitations as discussed early in this posting series), or some 15,000 feet at measure point. These work out to a maximum error of .007% and .0004%, respectively. I’m good enough with that to cite it here as proof of intent, given that the architects of mass shootings likely used the same tools, as I. There has, after all, already been revealed in prior Proofs several clues that such is likely the case.

cheopsUSA

Here we see some 440 plus mass shootings plotted along with the six orange lines from Cheops. The three green and three red lines are for measurement purposes, and require some dialog in order to appreciate the ‘craftmanship’ employed by the architects; a kind of confirmation this is no random outcome. The Meridianal (vertical) circumference of the Earth varies depending on where measured, but the average is 40,008 Km. This means that the point where the orange lines are furthest apart is some 10,000 Km distant from Cheops. This spot is found at the middle green line, and the measure there is essentially 2,525 miles.

This is confirmed in the red line between adjacent orange lines which measures 505 miles.  The other two lines are the points where 500 miles between, is found, for 2,500 miles total separation, there. EACH OF THE THREE HAS AT LEAST THREE SHOOTINGS ALONG ITS PATH. These numbers prove interesting, and thus I also elected to measure the diagonal (vertical red) and ‘hight’ (red along the orange line’s path) of a given rectangle formed by these lines. The vertical line, which happens to be North corrected for magnetic declination, a trait seen time and again in the various alignments of Satanic and Masonic symbols in the prior Proof, measures 777, a magical triplet. The height measures 606 miles. More interesting numbers.

Take a look (numbers are rounded unless otherwise stated, and reflect allowances for measurement errors introduced by Google Earth as previously mentioned): Note: you may wish to review the sidebar post on Magic Numbers before continuing. Because… 500 Miles = a palindromic 434 nautical, which sums in pairs to 77; 777 is not only a magical triplet, but forms by summing in twos (1414) the inverse palindromes 141 and 414, which sum together to form the triplet 555, and equals 675 nautical, which sums to 18, and 1250.46 Km, which sums to 18 by threes; 505 and 606 are both palindromes, of course. And about 2525, divide it by 505, and it goes exactly 5 times. 505 + 606 = the double doublet 1111 (a quad) 500 x 505 = 252500, which sums to the doublet 77; 500 x 606 = 303000, a palindrome times 1,000; 505 x 606 = 306030, a palindrome times 10 which sums in threes to 99, which is a code number for 666 just as is 18; 306030 also = 492508 Km, which sums to form the inverse palindromes 151 and 515; and 606 x 777 = 470862 which is divisible by 18 2,159 times, and the grandaddy 666, 707 times.

So we end up with 505, 606, and 707 palindromes, and the triplets 555, 666, and 777. 505 squared = 255025, which sums by twos to the palindrome 757; 606 squared  = 367236, which sums to the the triplet 999, a code number for 666 (upside down); it also divides by 18 to provide the palindrome 20402; 777 squared = 603729, which can produce 999 by summing by 3, 2, 1 digits consecutively, a bit unusual; We can’t easily find the area by simply multiplying 606 x the top or bottom, because they are different. We can do that with both and then average the result. This yields 303000, a palindrome times 1000, and 306030, a palindrome x 10. The total of the two  sums to 609360, sums to the palindrome 6116, and which divided by two = 304680. So now we know the area, which is 1680 sq. miles more than the smaller of the two, and that much less than the larger, of course. 1680 = 2704 Km, which not only sums to 13, but is divisible by 13 208 times.

The orange lines in detail

In the last Proof, we found the orange lines tied usefully to the layout of the four baphomets and Masonic emblems. Here, lets relate them more directly to the actual shootings which were also part and parcel of those relationships. The first lines at image left does NOT actually line up with anything, YET. It is presumed they will eventually line up with a shooting and may be useful in prediction of same, as there are very few communities in its path with logical targets which fit with other predictive factors. But I will not state these as our paranoid government tends to make anyone predicting such violence based on ANY criteria as the only ‘terrorist’ or ‘suspect’  in question. They tend to lock down such locations and charge the person who gave the warning with criminal intent of one sort or another, or act harshly against them in some way. Apparently, ‘See Something, Say Something,’ is a trap, and considered a crime. I know that at least twice that I reported terrorist activities, they did nothing about the report other than to harass me and try to cost me my job.

The next line is perhaps the most dramatic in terms of accuracy and alignment. It bisects with extreme accuracy two shooting events, even a third within Google Earth dictated error limits. The third also has three shootings within accuracy limits, two of which almost meet doorway-to-doorway accuracy.That line also passes through the Denver International Airport and quite near to a man-made earthen Ziggurat (stepped) Pyramid thought by many conspiracy theorists to be a D.U.M.B. (Deep Underground Military Base). The site claims to be a landfill, albeit the highest and fastest growing of its kind by far, if true.

It is also true that in its current state, it only appears to be a Pyramid in three of the four sides, the fourth being the area where ‘fill’ is taking place at this time. The next line features the sloppiest, worst-case error with two shooting points in its path. The larger error does not dissuade me, because both are quite equally distant from the line on opposite sides of the line (the line cleanly centers between them). There is additionally a business, Pyramid Foods, almost directly on the line near the Bartlesville HS shooting plot of that line. The next line also sports two shootings, one of which is quite near Meridian, MS; Cheops is itself a similar distance from Meridian, Egypt (a neighborhood name also used in several business names, there). The final Cheops line merely intersects within 1,000 feet of a single shooting event. This is near King’s Highway, and Cheops is a King’s tomb. Thus all the lines currently aligned with shooting points, are several are also aligned with something having to do with a Pyramid. This yields yet more consistency, but feel free to presume it coincidence, if you must. What does Cheops have to do with mass shootings?

Why Pyramid?

Beyond the earlier comments about why Cheops is important to Masons and Satan worshipers, there are a few other things which should be mentioned. One has to do with the construction of the Pyramid, which many historians think drove the establishment of at least some of the ancient Egyptian’s measurement system. What is interesting about that, as casually mentioned earlier in this series, is that as history progressed, their system became in various ways the bases for both the English and Metric systems, as well as the system employed in America. It is alleged that Masons (Templars) were the driving force behind this, in part, to insure or play to the mysteries of magic numbers.

One of the few 3-D cutaway views on the Web from ancient-egypt.org (click)

So do not be surprised then, if the next post, I tell you that there is not at least one measurement at Cheops which is duplicated in shooting lines here in America which depict the same part of a pyramid in a 3-D view, but using different increments and a different scale (think miles for inches, for example). I’m still working on verification of a list of suspect instances, but it certainly seems the case. This would NOT be possible if there was not some basic underlying ‘magic’ built into both measuring systems with respect to conversions. But the real thing of interest about Cheops, here, is its lore.

Many learned researchers have studied the Pyramids endlessly to formulate many different theories relating to its design, how it was constructed, what its purpose was, and so forth. Many of their findings are controversial, but few are invalidated by the work of others, but might remain rightly in the realm of speculation, or ‘lore.’ Among these are two which would logically be of interest to a Warlock or high Mason (sometimes, the same thing).

The first involves the inner passageways of Cheops. We know these are important to the architects of shootings because, as we will see in the next Proof, they are faithfully duplicated in the 3-D depiction of Cheops by use of shooting lines and shootings. The reason why would seem to be in the lore, which according to some, says that these passages are a kind of history of the World being depicted from creation to its destruction. They actually make a very good case for this, and my own conclusions would tend to agree there is something to the notion, at least symbolically, if not accurately to the year. The claim was, that each Egyptian inch represented one year of history, a thing which seems to be true at least for specific historical events used as benchmarks.

If, therefore, the need to seat the Antichrist in support of end time prophesies requires taking away guns in America to allow the formation of the North American Union, then our architects, being wise in the magic and lore of Cheops and the like, would most likely incorporate as much of that magic into their plans as they could manage. The second involves what is called Pyramid Power in a book by the same name written by Max Toth, which is as good a reference as any of like conent summarizing the lore of Cheops, including the inches for years theory. If even half of the claims within were true (and I have verified at least two of the main claims in my own experiments), that is one more reason a Warlock would wish to incorporate pyramids into any conspiracy aimed at seating the Antichrist. But again let me say, it does not matter what you or I believe about such lore, it only matters what THEY believe.

Go back to Introduction

Go back to Proof SixShootings Also Relate or Depict Masonic and Satanic symbols

Go to Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View

Emergency Post: BLM vs. Bundy is an Ominous Danger


It is seen by government as a win-win ploy that raises the stakes to unimaginable levels. What we see on the surface has nothing to do with the sinister plot which it enables and portends. This is our last and only chance to save the country, or loose it to tyranny forever, and rush toward Earth’s final demise.

Will Bundy vs. BLM start Revolution 2.0?

By H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

What is going on in Nevada with the BLM?

What you will learn reading this post…

•  government’s actions against Bundy are mere window dressing — something more sinister is afoot;
•  the stakes are incredibly high, but hard to see — your very life and the fate of the World, in fact;
•  there is only one logical solution, and everyone plays a role.
What can I do to help Bundy against the BLM?

Why BLM vs. Bundy matters regardless of if his cause is just or he has no legal leg to stand on

UPDATE: Same day posted… Oh, so now we find out its really for the oil companies? What Corporate Police State? BLM sells 29 oil, gas leases in northeast Nevada End update.

Free Speech Zone meaningless when dogs and tasters are aimed directly at the people. From againstcronycapitalism.org (click)

Government made it matter, and with dark purpose. At one glance it is an effort to usurp power over people, and the States, as well as to empower corporate ranching over private ranchers. It is a form of unfair and excessive taxation without representation against a political enemy of financial convenience to friends of the White House. And, it is an opportunity to make yet one more National Police Force out of the BLM. But, thanks to controlled media/government PR, not everyone sees these points of view.

But even that view is incomplete and misses the mark, if we but look closer. It is a deliberate series of escalations by government over time to garner public attention among and inflame we select people (why it gets little due mainstream coverage — save that which slants as it did at Ruby Ridge and Waco). They know the Web will be awash in the circles of we Patriots, Constitutionalists, Activists, and others who oppose the tyranny and oppression our government has come to represent since 9-11. The Sheeple must not be unduly disturbed until it can have false flag impact of calculated value.

I talk a lot about the need for citizens to draw lines in the sand and be willing to become Minuitmen should such lines be crossed. Now comes government to draw it for us, I write here to tell you that you have no choice but accept the challenge, and act decisively. You may perish either way, but I’d rather perish attempting to control my life and future than to leave it to others less kindly inclined to favor me. If there is to be armed revolution, let it be on our terms, not theirs.

Why so conclude? Because if they work it right, the ‘standoff gone wrong’ is a perfect chance to justify taking guns. By forcing a showdown and a gunfight (what the snipers do best – there is no justification for government deploying snipers unless for this cause, AND to selectively inflame those who stand for Liberty and who remember Ruby Ridge). There are two possible ends, of course, though I think they will insure BOTH transpire.

Regardless, such a battle is win-win for government. The “poor defensless BLM armed only with tasers,’ if loosing large numbers will be seen by Sheeple as an outrage, and given that Militia were involved from multiple quarters, and other armed parties, Obama can order Martial Law with suspension of the Constitution. Especially if also employing agent provocateurs for local violence across the country, as was employed in the LA Riots, where National Guardsmen posed as rioters to prime the pump.  This would likely result in orders for the military and Police to go door-t0-door. Who knows, Obama might even order the U.N. in as long-feared and first promoted as concept by Henry Kissinger. Or, he might simply order in the military; A-10s, attack choppers, a Stryker Battalion, and so forth.

They can then conveniently ‘quash armed rebels and terrorists,’ confiscate all guns, round up dissidents and politically incorrect opponents (like you and me — why they have been spying on us so earnestly), and hold a Con Con (they are already staging for it) to pass the Constitution of the NewStates of America, already written, which essentially enables the formation of the North American Union and surrender of US sovereignty to the U.N. in stages. All of this leads, of course, to a one-World Government (that Constitution has also already been written), and provides a single seat of power to enable the Antichrist’s coming to power.

Note: The NewStates Constitution is reprinted in my booklet, Fatal Rebirth, along with the World Constitution, complete with analysis line by line (NewStates) to show how draconian a document it really is. Rights become privileges which can be revoked at any time by any agency or party of government for any cause, even retroactively, and almost anyone in government can write law, and again, it can be retroactive. And if you think the two-party system and the FED/IRS is bad, wait until you see what follows. You can request a free copy of the ebook version of Vol I of Fatal Rebirth by email request to pppbooks at comcast net. 

THAT is what is at stake. Nothing less than EVERYTHING!

So we must be decisive: regardless of how we view Bundy’s cause or government’s viewpoint, regardless of if an armed and concerned citizen or a dumbed down Sheeple, we all have equal stake in this unfolding globalist tragedy. And, we can all play a role no matter our status, and regardless of if present in Nevada, or not. But about that decisive action…

Why is the BLM standoff against Bundy in Nevada taking place?

What we should prefer…

Should we stand up with arms in hand and enable, if not force, the ultimate showdown? I fear this is exactly what government wants, as already stated. But there is another, wiser choice.

By all means, men of arms should rally, but standing firm and waiting for the other side to blink or blunder is a fool’s plan, and it can only end in bloodshed. What must be done is that which can neuter Government’s ploy. And only one set of steps can do that:

a) anyone and everyone should file court actions against any and every agency, branch, and individual of government involved at every level of government. Any and every cause, grievance, or objection, as allowed by and based on State, County, and Federal Law, and the Constitution and Bill of Rights, should be employed. Bury them in legal actions, EACH OF WHICH includes request for either an Injunction or Stay Order. These actions should not all be done at once, but the flood should be continuous, so that new ones can replace those quickly disposed of. THIS BUYS TIME;

b) time is our friend — it generates awareness and understanding. It buys media attention and gives Sheeple a chance to better understand what is taking place. Just as the 99% movement could no longer be contained by a controlled media, so must this matter be brought into every home. Invite major networks, espcially foreign press, to specifically include RT, to set up broadcast facilities right on the Bundy Ranch, and bypassing the see nothing viewpoints established by government for controlling media in the manner done at WACO (NEVER AGAIN!). Install microwave and shortwave communication systems for the purpose. But also, LOCAL media is the key, as is the WWW; do not rely upon mainstream. Militia and other group ‘spokespersons’ in your community should approach their local news sources with proposed interviews to get the word out. IF EVERYONE UNDERSTANDS WHAT IS TRULY AT STAKE, AND TAKING PLACE, GOVERNMENT’S PLOT IS UNDERMINED AND THEY LOOSE THE SHEEPLE;

c) flood the theater with actors. There should be so many people there is not enough room in the minimal areas intended to contain them. OVERFLOW. The ‘1st Amendment’ area, itself an affront to the Constitution, and should be enlarged and enlarged again, forcing retreat or conflict which will make news favorable to our side. If you have access to a professional camera, start a ‘newspaper’ or ‘Radio station’ and flood the press area and make it overflow, as well. And Bundy’s ranch should become a city of tents, and include as many unarmed persons as possible who wield nothing but baseball bats or the proverbial pitchfork. THIS MAKES THE WHOLE AFFAIR MORE VISIBLE and LESS TENABLE TO GOVERNMENT’S GOALS;

d) involve the local Sheriff and State/County Officials. The Sheriff has effectively stated a hands-off non intervention policy. Fine. Perhaps he is a puppet put into place for the purpose, or co opted by any number of means available to government for rendering him neutral. But the flurry of legal actions should be intended to FORCE HIM to intervene on behalf of Bundy and supporters. If nothing else, he should have a presence on the Ranch to insure armed groups behave (public safety). The Governor and Legislators, and County Officials should called to DEMAND it. Perhaps even the National Guard should be called to stand by. A simple invite, if not enough, can be followed by a media blitz and public demand that such action is needed. Any politically motivated decision to remain neutral should be negated, thereby; a political suicide. INVOLVE THE SHERIFF, as WITNESS and PEACEKEEPER;

e) party! No alcohol or drugs, but good cheer, song and dance. Use loudspeakers. Mix well with speeches and ‘town hall’ dialogs. Use the platform (the nation will be watching) to air ALL GRIEVANCES with government, not just this ONE issue. Give voice to the rest of the 99% in a way that movement never was able to achieve on its own. SOROS WILL HAVE NO VOICE, this time;

e) prepare for Martial Law at home. That means emergency kits and plans (like the one government would not approve). It means weapons. If it is declared, you will have scant few hours to choose to fight, run, or to surrender to your fate at the hands of tyranny. If not taken away, you will need to survive for months without anything like normal civilization. No key resource, including electrical power or communication, can be assured, and will likely be withheld on purpose. Travel will be restricted and many will not be able to work, and there is no shopping, only rationing. BE READY TO BE SELF RELIANT, BE READY TO FIGHT IF THAT IS WHAT IT COMES DOWN TO;

f) if and when the shooting starts, DO NOT ENGAGE! Dead BLM or other Agents will be made into martyrs by mainstream. DO NOT GIVE THEM WHAT THEY WANT. Show restraint, and let the casualties be on your side. Keep putting out a continuous feed of information and video so that media and the WWW know what is going on. IF THERE ARE TO BE MARTYRS, LET THEM BE OUR OWN, and LET IT BE TELEVISED LIVE. If a full-scale armed revolt spontaneously errupts nation-wide, then by all means, defend yourself at the Ranch, and FOLLOW YOUR CONSIENCE AND DEFEND THE CONSTITUTION.

g) petition for redress. Redress of grievances is a key component of our Nation’s Constitutional form of government (this post makes clear, mid post). When it fails, we have no government, only tyranny. It seems today there is NO REDRESS POSSIBLE at the Federal level. ONLY THE STATES stand in the way of total Federal domination, which is part of what this whole affair is about; a means to increase Federal power over the States. But while all this is going on… and while we have media platforms established… we should be seeking redress through our State Legislators, making a series of calls for action to quickly pass laws which…

1) nullify all Federal gun laws, NDAA, NSA surveillance, and forbid Federal drone overflights except under warrant and oversight by State authorities;

2) eliminate Federal arrest and warrant power. If a Federal judge issues a warrant, or an Agency is moved to move against a party (like Bundy), they must instead go to the appropriate local Law Enforcement Agency and have them execute on their behalf. They may go along, but as observers, ONLY;

3) make clear a mandate that your State shall NOT approve a new Consitution if a Con Con is held, nor the removal or neutering by Amendment of the current Constitution, and any existing Federal Law which does so should be nullified;

4) add freely to this list anything which addresses abuse of power by the Federal government, such as militarization of Police, Obamacare, etc. This will be your one best chance to spark public dialog and debate, and to make certain that people, and especially State Legislators, realize THEY are the ones with the real power, and the duty to protect freedom and force the Constitution.

What is at stake in Nevada and the BLM standoff with Bundy?

Government has drawn a line in the sand

Let’s make sure they regret it. Force them to be the ones to cross it, and let them trip over their own power play. Now… go forth and spread the word.

 

Crime Series: Ten Unexpected Proofs ‘Random’ Mass Shootings are by Intelligent Design


Ten easy-to-grasp but remarkable proofs, both visible and hidden: Illuminati style mystical symbolism and related ancient magical mysteries, calling cards, bragging rights, and Warlock spells cast against America, and the World. Conventional clues, too.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this multi-part posting series…

•  there are 10 interlocking proofs that mass shootings are not random;
•  they include various kinds of patterns, visible and unseen, and even coded information;
•  that the pattern predicts itself, and understanding may therefore help stop the murder;
•  that the codes and clues seem to be like signatures identifying the architects.

Are mass shootings by intelligent design?

Introduction: Ten Proofs ‘Random’ Mass Shootings by Intelligent Design

Is there a mass shooting conspiracy?

Note: This series is not yet ready for full presentation, but the most recent Fort Hood forces me to start releasing the material without delay. The reason for delay has had to do with an inability to provide high quality graphics suitable for proofs. This will be overcome, shortly, I hope.

One thing you need to know about me as an investigative writer or, as media and government would prefer you to think of me, a ‘conspiracy theorist,’ is this: whenever I decide to take a close look at a potential conspiracy or lesser matter, I do it right. If I cannot uncover something no one else has brought to light, I’m either not finished, or I’ve backed out concluding it beyond reach, or a dud. If you read my findings on a given research, you will undoubtedly learn something FACTUAL no one else had previously discovered or brought to light. And so…

In this matter, we find the shear volume of startling new information overshadows and renders original headlines and competing theories essentially meaningless — especially media’s version. It will make you angry. It will scare you. The question is, will it motivate you to do something about it? YOU are what you are waiting for, you know.

But in introduction, there is still one other point which must be made; it is in form of a problematic question. Can I get you, the reader, to override your current belief structures long enough to  consider the unusual nature of the findings? This presentation will most assuredly fly in the face of what most people consider ‘traditional wisdom,’ but it also will explain why it is non-the-less valid. Can you handle the Truth, or will you wimp out to the comfort zone of current beliefs?

Area all mass shooters psycho?

On suspending belief structures

mythbust

Dormer was not quite a ‘Mass Shooter’ incident, at least not at a single location/time. But the affair highlights the problem of accepting ‘random’ as the right word to apply to shootings when there are so many problems with the official story. CLICK to learn about why many people think him just another shooting patsy.

I began a ten-year research project for a book, Fatal Rebirth, in late 1989, which also begat a screenplay published on line in 1999 (The Electronic Apocalypse). In the book’s Introduction I urged the reader to suspend their belief structures briefly and read the material as if merely fiction for entertainment’s sake, because many of the concepts within were so new and unusual as to defy belief — likely seen as ‘far-fetched’ by most uninformed readers. I offered over 1,500 footnotes and a huge Appendix section to help them consider why I deemed them factual.

This blog post should be read in like manner, especially if you are content with government’s actions, are a politician, member of a government agency, military, or any part of the justice system, or Media. Especially if you are involved in a mass shooting incident as a professional or a victim seeking to know the truth. And even more so if you are gun owner, or even among what 2nd Amendment supporters refer to as a ‘gun grabber.’ I plead, therefore, that you suspend your belief structures briefly as if reading a political/horror-science fiction piece.  That’s what it is, actually, minus the fiction component.

You will, like readers of Fatal Rebirth, I would hope, realize the truth by the time you reach the end. Or, at the very least, you will be entertained for all your reluctance to let the message sink in and take root.

If nothing else, even if you choose to doubt some of the more obscure subtopics (i.e., relating to mysticism) have any factual basis in REALITY, consider this: it matters NOT what YOU think, given they ARE taken as real by persons likely to be behind any such conspiracy (i.e., ‘Illuminati’ Satanists). You MUST also ask yourself, “Can the sheer magnitude of interlocking clues be ignored?” Because at every turn they defy the odds of coincidental probability, as illustrated by carefully crafted control study groups. If thinking logically, you MUST concur that intelligent design is revealed despite what you may think about the logic of the beliefs which lay behind it, or the unusual way in which the evidence was revealed.

Pending you conclusion, by all means feel free to think me mad if you must. Read just for fun, but please read it through to end before you render final judgment as to if madness or truth be present. A logical reader will be converted unless their mind is already so firmly made up that they do not wish to be confused by facts which destroy their belief structures. Judge not what ye know not, but that upon which ye are well informed and have considered fully, judge freely.

Your future and the future of your children could well be at stake, a statement applying to all mankind. Why do I say this? The book mentioned above, Fatal Rebirth, was based on trying to illustrate what I call the Unified Conspiracy Theory; the notion that all of America’s darkest bumps in the night for the last half of the prior Century, forward, were not random oddities by random people for random agenda, but carefully orchestrated by the same core group of people with but one goal for the World in mind.

I termed them Shadow, but they are also known by other names; the New World Order, the Illuminati, the Power Elite, Globalists, and among them, member names like CIA, Skull and Bones, Bilderbergers, Council on Foreign Relations, and many more of like nature. Their goal I termed End Game; the establishment of a One World government, a single seat of power in order to seat the Antichrist upon his throne and bring us to Armageddon.

The Unified Conspiracy Theory, once justified in research and taking shape in book form, led me to realize that their stepwise actions over fifty years of mysteries were indeed leading to one goal. Knowing the goal, I reasoned, it should be possible to forecast the next logical steps. So the book also included within its presentation several terrible event predictions expected to take place in our near future. Thus far, though I do not claim to have gotten all event details precisely correct, many terrible forecasts have already come to pass. Among these were:

a) an assassination attempt on Ross Perot or his family to cause him to drop out of the Presidential Race, a matter which indeed transpired using mailed Anthrax according to a Secret Service back channel contact;

b) the false flag downing of the World Trade Center by civilian passenger jets which;

c) resulted in a series of Middle East Oil Wars. Other predictions include two more terror plots which are part and parcel of this blog post. Those are…

d) a false flag nuclear attack on Charleston, S.C. and Portland Oregon (the later of which I have already thwarted, it seems – see middle of my home page), and more to the point…

e) MASS SHOOTINGS.

Note: you can get a free copy of Vol I of Fatal Rebirth (ebook) by email request to pppbooks at Comcast (net). You will be glad you did, as it will take you far deeper into the Rabbit Hole than Alice or Neo had ever gone. This pill is black, though trimmed in red, white, and blue.

So, if ready to suspend your belief structure, let us begin. Pretend there is, despite media’s recent attempt in the Cincia shooting to portray anyone who believes in the New World Order as mentally ill and anti-patriotic, that such a conspiracy is actually afoot. Also pretend, if you must, that Political Control Technology in the form of the Manchurian Candidate is real. There are real-life Jason Bournes out there, as my book, MC Realities, and other books on Political Control Technology illustrate more than adequately. Even the Smithsonian channel knows.

This will make the key postulations, testing methods, conclusions, and proofs of the core material easier to accept, especially as they will be offered in the manner of scientific discovery — exactly as I undertook them as investigative writer. You will, in fact, be able to retrace my work to double check it, if you wish — as long as you review the full series of posts and sidebars before you attempt it, lest you make a critical error.  Please subscribe to my blog pages to insure you are notified as the remaining posts in the series are added.

Are mass shootings are by intelligent design?

The Investigation

Jason Bourne… though fictional, is based on real-World programmable assassins. Do you suppose CIA or anyone else would not find something useful to do with failures in such programs? Might they not make excellent disposable patsies? Image/film: http://www.imdb.com/title/tt0372183/

Some several months ago, insulted by media’s misreporting of Aurora and Sandy Hook and outright clues that a disinformation campaign was afoot, I began finding ample cause for concern.  But how might one determine if other mass shootings were arranged as part of some kind of sick criminal conspiracy, one which might involve both real and faked shootings?

I started with several basic presumptions of truth, and then set about to see if the logical evidence such presumptions would require were indeed in place.  The ‘illogical’ presumptions fostered by the Unified Conspiracy Theory requiring suspension of belief are as follows:

1)    That Shadow and their Globalism requires destruction of America, and its Constitution in order to enable forming the North American Union, a matter which in turn requires that the Right to Bear Arms is first invalidated, and arms confiscated or gun owners otherwise neutralized in a manner similar to that of the Australia;

2)    That the New World Order, the modern day Illuminati, if you will, would be well capable of undertaking a campaign of gun violence for such cause, but being an Illumined Power Elite lost to Satanic and Masonic mysticism, they would employ mystical constructs which would leave detectible footprints if knowing what to look for;

3)    That the principle tool of such a plot would involve a small army of patsies, cut outs, and fall guys, principally from a category best known to the public as Manchurian Candidates. It may additionally involve a small army of blindly obedient members placed within our armed forces, the intelligence community, and law enforcement to aid more indirectly in supporting roles. This would include logistics, psyops, and cover up, or even command and control, generally unaware as to the truth or reason behind their orders. These are the same players frequently found playing key roles in the lives of mind control victims at large.

All three presumptions must be true to make a proper accusation, for they comprise the basic proofs of any crime: Motive, Opportunity, and Means. Normally, we think of opportunity as meaning access to the scene of the crime, typically proven by forensics such as fingerprints, or better yet, actual eye witnesses. In this case, they deliberately left their fingerprints, in a manner of speaking. In fact, the bulk of the proofs fall into this category, perhaps even naming individuals behind the plot. At the very least, we are indeed dealing with the Elite, those involved in principalities and powers.

Indeed: Two names have already surfaced by such clues, and both are billionaires. I also have a dozen other names of likely conspirators, but no names are released; these things are my Life Insurance Policy.

Sidebar PostOn Programmable People. This sidebar post addresses the notion of the possibility that at least some mass shooters are mind controlled patsies, and reconciles their coexistence with truly random shootings ­­— those which are more naturally spontaneous crimes — which can collectively still both be component parts of the same intelligent design.  This leads us to the finer details of how shooting event locations and dates lend importance to our consideration, and just how these things can additionally reveal intentional, yet concealed clues.

Here it should be mentioned, that many observers of the New World Order crowd favor the supposition that among their leadership we might find the modern-day Illuminati in spirit, if not in actual blood lineage, even though they may have since assumed a different family name. By way of example, in my research, I have had reason to conclude that the Rotheschild name was assumed; those assuming it being Knights Templar in hidding, their wealth derived from Templar treasure, and not truly Jewish by ancestry or faith, at all.

Many who favor the notion of a Modern-day Illuminati additionally believe, as do I, that there are at least two, and as many as four groups competing with each other within the movement to be the ones ‘honored’ to have one of their own selected to become the Antichrist. Much of what is discovered in this investigative series will point to this being true in one way, or inherently implied in another. It is, in fact, one very good reason to employ symbolisms and other clues which act as signatures of those so bidding for selection.

Such evidence was abundant, even easy to find, and I remain convinced that the trio of presumptions are sound enough to warrant seeking incontrovertible proofs. I sought such proofs both in quality and quantity sufficient to illustrate that ‘random’ was not the right word to describe mass shootings, but rather, ‘intelligent design,’ is.

The path of my continued investigation led to endless shocking discoveries, but there was a problem: to describe the methods and explain findings to the casual reader would, it seemed, require a tedious educational process and boring, repetitious citation of facts. It would be about as fun to read as a spreadsheet or database. Not good.

People want visual sound bites easily grasped. More so if Sheeple content with their Evening News and easily frightened off by words like ‘conspiracy theorist,’ and ‘New World Order,’ or similar. Worse, the investigation bogged because of the real life tragedies each shooting represented. Proper investigation meant exhaustive study of individual events, reviewing endless horrific detailed accounts and sad, brutal media imagery. It was taking an emotional and even physical toll upon my body and mind, and my spirit. Eventually, instead of plodding along 10-14 hours a day as at the start, I found myself barely able to work on it a few hours a week.

I played with several ideas on how to present the story NOW, without completion of the full study, for there is indeed already a mountain of proofs uncovered. But again, the complexities in presentation left me feeling it a hopeless task. Finally, I decided to break it down into about a dozen short compartmentalized components suitable for a series of blog posts. Frankly, I’m hoping it will spur someone to offer useful help; it will take funding and staffing to properly complete the study. Or better still, perhaps some Sheriff or other authority will assume the duty as result of shootings in their jurisdiction.

Follows is a synopsis of the Ten Proofs to be presented. There will additionally be, at appropriate points, companion posts detailing the scientific methods or other analytical procedures involved in select proofs where a doubting Thomas type may wish to challenge the validity of claims. I firmly believe that for my proofs to be accepted, they should be presented in a way such that ANYONE can duplicate my work and verify accuracy and conclusions.

This is a legitimate investigation despite its atypical and unorthodox methods and odd topics involved. NOTE: links will NOT WORK until the various posts involved have been posted. You may click on them to discover their current state. Again, subscription to this blog will notify you when new posts are added.

What are the ten proofs of a mass shooter conspiracy?

The Ten Proofs in review…

Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns;

Any time you find a cover up, you necessarily have a conspiracy to contend with. Gun grabbing groups, including government and biased or puppet media forces, should be using every opportunity to make their case for gun control, but act as if the bulk of gun violence never took place. Why do they employ selective blinders? There is a reason.

Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters;

The Illuminati loves magical numbers, as they can translate into meaningful words or names, or leverage ‘spells’. Interesting then, that basic shooting statistics establish set after set in the most magical and potent number of all, one which decodes to ‘Satan.’ This alone reveals dramatic coincidences well beyond the possibility of random chance.

Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines;

The same Dispersal Pattern Studies method applied by government researchers to UFO sightings reveals Mass Shootings do something UFO sightings allegedly do not: form repetitive patterns with GPS accuracy, doorway-to-doorway-to-doorway.

Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes;

When it comes to symbolism, nothing outperforms a graphical shape. Better still when that shape itself has magical properties or relationships to other shapes, or its own hidden or obvious meaning. 

Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters;

It defies odds that perfect shapes should cluster together in ways which share overlapping lines or corners, and be generally both aligned and mirrored in additional symbolism.
 

Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols;

Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart;

Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View;

The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.

Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages;

Shooting line sets share three or more identical magical numbers within their data points. These decode to tell us when and where the next shooting will be, name a shooter, or perfectly prophesy some specific outcome.

Proof Ten: Individual Shootings Examined in Micro Duplicate the National Study Proofs

Two examples are offered; Aurora and Sandy Hook. They not only duplicate the ten proofs, but they mirror each other and one points to the other.
Why are mass shootings on the rise?

Are you ready of this? Buckle up!

So let us begin. I propose your best bet will be to SUBSCRIBE to my blog pages so that you are automatically notified as new posts are made to complete the series. Please link, share, tweet, etc., and by all mean vote your ranking at page top of each one, and comment with your questions, criticisms, or thoughts. How else will other know this is important?

Do bear in mind as you read, each offered proof individually seems to defy the odds or logic path required for truly random shooting events. Collectively, it is monumentally clear. Also bear in mind that I am human, and I, like any other, am prone to making mistakes. A ton of information had to be entered and copied from one location to another multiple times (multiple database and software applications). Therefore, either because of a mistake on my part, or perhaps because of a mistake in media or other accounts/records, any given individual data point in any given set of proofs may be found invalid.

By all means let me know if you find such a discrepancy, but please remember this: a single error in a single data point does not invalidate all other data points, and therefore, does not invalidate the conclusions or the suppositions, themselves. In order to dispute my findings, you will need to offer proofs that the method is flawed, the entire data set was in error, or analytical logic was faulty. More: such dispute must address and ultimately invalidate all ten proofs, or short of that, offer equally viable alternative explanations which fit the findings and afford a more innocent explanation.

Since each proof tends to defy all possible odds of random coincidence, and does so consistently, again and again, naysayers will have their work cut out for them. More so, because in many cases, control groups have been established to show truly random data points enjoy no such pattern. I have done my homework, and carefully so.

I will demand the same of naysayers.

Go to Proof OneGun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Go to Side Bar: On on Programmable People

 

How Social Network Trolls Target, Track, and Psychologically Profile You


How to spot and deal with Trolls, including a clever tool they use in any social media capable of posting images (VERY prevalent on Facebook), and quite insidious with far reaching implications. BEWARE: you betray yourself and your friends if you take things at face value.

What is a Web Troll?

by H. Michael Sweeney

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

How does being a web troll work?

UPDATE: Nov. 11, 2014 Perhaps as if to ‘test’ me as result of this article (or not), a Web troll began the process described herein to goad me argumentatively  while also employing a good half dozen of the usual disinfo tactics in the 25 Rules of Disinformation (linked below). So I unfriended him and watched: that same day, ‘someone’ created a new FB account and almost immediately friended two of my friends, posted ONE activist post, and ONE peace post, then requested to friend me. Sure. OK. BUT I HAVE MY EYE ON YOU, because that’s how easy it is to get a new identity and hook back up to a target. Not that I care. Trolls are tasty.

Are you being targeted by online government trolls

How Social Network Trolls Target, Track, and Psychologically Profile You

Reading this post you will learn…

•  That there are three basic kinds of trolls and subsequent ‘missions’ against targets like YOU;
•  That there are troll profiling and tracking tools or methods which can be recognized;
•  That there are ways to protect yourself without drawing more unwanted attention; 
•  That the Troll represents a danger in that their ‘assessment’ can lead to escalation in your targeting.
Is social media infiltrated by government trolls?

Government and Commercial Trolls

Consider, for example, the friend ranking and layer’s of affiliation tracking tool. A graphic is created containing a simple textual message. It is graphical because there is no easy way to distinguish between two identical text messages, whereas, altering a single pixel’s color by 1 imperceptible shade of difference makes it unique, and allows thousands upon thousands of individually trackable versions. A Troll who has managed to friend a targeted person of interest then posts the textual graphic as if a sincere request. Examples will be shown.

These kinds of posts seem innocent enough and easily get spread as requested, allowing simple computerized search processes by FB’s intelligence community or marketing partners to see not only who is close to the target party, but at what layered level and loyalty or, if you prefer, like minded thinking. In point of fact, ANY image shared with a given political, philosophical, religious, or other belief or emotional message can be so tracked to perfectly define each such poster’s psychological profile, and rank their threat level to the paranoiac governmental powers that be. The same is true of marketing trolls seeking to learn about your product usage or demographic, etc.

The only safe share, then, we might presume, is textual or perhaps the sharing of a URL and it’s image, or an image we ourselves create and have perhaps included in our FB albums. Even with URL’s however, the possibility exists it is still being tracked, especially if a Troll operated resource such as Federal Jack, a known DHS sponsored Sorcha Faal disinformationa conduit targeting conspiracy theorists, activists, and other ‘potential terrorists.’ Their goal is to get you to ‘share’ their links, thereby spreading disinformation while psychologically cataloging YOU and any of your friends’ beliefs; all who click to learn more. They may need to have a troll assigned to them, after all, for being yet another ‘potential terrorist’ — a free thinker, patriot, constitutionalist, etc.

Worse, we have learned from our new Paul Revere of the coming Second American Revolution (Snowden), that NSA is not only monitoring FB activities big time but that Trolls from NSA, FBI, DHS, DOD, and even the FED, and other paranoid agencies, and even corporations who have a strong and growing list of people who think ill of them, like Monsanto and some banks — all regularly maintain false social media identities for entrapment and spying purposes. They even infiltrate online gaming. Snowden’s latest bombshell, according the foreign media analysts, indicates there were so many game Trolls that it was starting to change the character of online gaming, and special tools had to be developed so that Trolls would not end up targeting other Trolls and more easily remain inobvious. We are talking here, about games with chat or other communications capabilities within the game or as part of game support, especially when in a social network manner.

And it is clear that snooping is also rampant among commercial interests, which is certainly true in online gaming, which after all, is a commercial enterprise. FB is perhaps the biggest offender in this area.

How can you spot a social media troll?

Differentiating an innocent graphic from a potential spy tool…

There are several online graphical message generating services. FB themselves seems to be hooked up with one called your-ecards (.com). Another is someecards (.com). Anyone can use these to generate a simple textual graphic with or without use of stock illustration graphics (e.g., a man looking perplexed), typically in silhouette or line art form. They can then easily share it through their favorite social media(s) with a few additional clicks. These can always be recognized because the logo for the creating Web service is displayed at the bottom. An additional hallmark of such services is that the background is almost always colored, and there are scant few colors available. The default color or otherwise most popular seems to be pale blue, pale green, or yellow-orange.

So when you see a colored background, typically with larger or fancier text than a normal posting, you are clearly looking at a graphical text post. The next thing to look for is the logo. If you see a logo, it was likely a sincerely generated message by a genuine human resident of social media. However, if there is no such logo, the message may have been generated by a Troll using his own computerized tools to psychologically target you regarding a select individual hot button. Are you, for instance, a tax protester, pro gun, anti GMO, for or against a given politician or political topic, or simply, who is a good like-minded friend of yours as opposed to some stranger you’ve accepted on the Network. Such messages also tend to be minus any artwork — text only. There is one more defining clue to look for.

Because there may be multiple versions of the same message for targeting different individuals by multiple Trolls interested in gathering information about many someones, there is a need to tell one shared message copy from another, which is exactly why it needs to be a graphic.  YOUR version must be physically different from MINE. The simple solution is to vary one or more pixels in a way easy for a software routine to detect, and then match to a targeted individual and their Troll/need. Given the countless millions of users on FB (and other social media) who might be deemed targets, it may mean that many, many dozens of pixels will need to be manipulated. My research shows that, indeed, most of the suspicious postings, in addition to missing the logos, have such visual manipulations. Examples:

1146548_664505843574765_1740298350_n

This is an example of a Troll-generated chain letter designed to find out your religious views, and who among your friends is of like mind. Note the guilt factor in the last sentence, and no true traditional Christian message. Note also the dark aberration, a visual flaw above the numeral 9 of 97%.

1005209_10201199164735487_1499677395_n

This is an example of a Troll-generated chain letter designed to find out more about your true close friends, as opposed to casual Network contacts you don’t personally know. Again, note the visual flaws in the slightly darker ‘blur’ areas about the letters… you may need to zoom in. This phenomenon is common in such messages, creating a pool of pixels useful in manipulations.

So one needs to look for such abberations or flaws in the background, usually darkened pixels along the edge, most commonly gathered in clusters or strips. You have to ask yourself… if going to the trouble to create a custom graphic for a text message instead of simply typing it in, why would they: a) choose the ugly colors used by such as your-ecard if not trying to make you think it such; b) take the extra steps to strip away the logo if using such a service (the point being they did not); and c) end up creating an image with a flawed background (where did the aberration come from, if not deliberate)?

When these clues are present, you are staring at a Trollish spy tool. To then share it betrays and catalogs you and links you and your beliefs with any of your friends who do the same, and theirs, and so forth, on down the line. The proper thing to do is enter into the comments: “I suggest you delete this post because it fits the description of a Troll’s chain-letter spy tool to catalog, track, or psychologically profile and establish links between like-minded persons: learn more here: http://wp.me/p1GyKw-zi” That link goes to this blog post you are reading.

Then I suggest you share the post anyway with a similar message, “Share this to warn others about Troll spy tool chain-letters to catalog or psychologically profile and establish links between like-minded persons. To learn more about this tool, visit this link http://wp.me/p1GyKw-zi.”

Finally, look carefully at the original post. Most social media will have a means to indicate if it was itself being shared, or was a direct post. If direct, it’s YOUR Troll. If shared, the poster was gullible in sharing, and is not likely a Troll… but beware that that could be arranged for as a deceit — so watch to see if the poster repeats the ploy frequently. You might optionally go to the ‘cited source’ of the share and try to find the post on their wall if you want to try to see if they are the Troll, and on to the next if not, and so forth, posting or messaging those encountered along the way who are victims, if you can. But that can be a LOT of work.

Are social media trolls sociopaths or psychopaths?

More Direct Trolls; Psyops and Sociopaths

The real threat to activists and politically incorrect persons online, like myself, is government agents paid to do nothing but sit in front of a computer and pretend to be your social network friend, someone you don’t really know at all, of course. They don’t just post Trollish images, they comment, and even message you. Like the aforementioned tool, they seek to learn everything they can to psychologically profile you, as well as see who ‘likes’ your posts and what THEY comment. But they are also there to play mind games. You are officially a victim of psychological warfare, perhaps even by someone from within the U.S. military, or even the military of another country. They are quite often sociopaths, so chosen because those traits make them more efficient.

Here are some tips on how to spot and deal with this class of Troll, as well as the kind of Troll who is simply out to make trouble for a given collective of people who believe a certain way about a certain topic. You know the type, my favorite example being the warrior Atheist who deems it his life’s mission to ferret out believers in God and annoy them with endless barbs and zings as if they were evil and dangerous for daring to worship. These people will wax sociopathic, too, and even psychopathic, when given enough rope. UNFRIEND these kinds of Trolls.

Hint 1) Trolls work in packs or maintain multiple identities to be a self-contained pack. That way, if you delete one of them, others survive, and then they generate yet another new identity and friend request to maintain the pack. The advantage is that you can suffer a series of ‘In deference to your view, we all seem to believe the same (whatever)’ posts (i.e., you are an idiot on this matter). Sure. You might be an idiot. But at first, the pack is all positive and flattering to your own beliefs so you a) get used to seeing them, and b) start respecting their beliefs and presuming them the same as yours. That’s the worming in stage.

But when it is appropriate for profiling or attempting the role of agent provocateur or disinformationalist, they will all suddenly be believing in something more off the mark, and increasingly so, as often as not. But by now, you like them and their beliefs, and so, your reaction tends to be as they expect; they are pulling your chain, and observing your jerks, evaluating, and cataloging, attempting to modify your behavior through deceit — a form of mind control. Can you be controlled, or are you firmly centered in your beliefs? Are your notions your own, or being foisted upon you?

Hint 2) New Troll requests tend to be persons with scant history on the network, and very few posts, but posts akin to your own in substance. Note that Facebook asks you to suggest friends to them. NEVER do this unless someone you ACTUALLY KNOW in the real World. If you do it, you are giving them a list of new targets. Since I don’t fear and even enjoy playing with Trolls, I let anyone into my friend list, but that does not mean they get what they want from me. But you may be better off simply passing on marginally viable friend requests.

Hint 3) Try posting something deep and yet somehow provocative (in the eyes of the establishment) which requires a bit of reading and thought before drawing conclusions. Look for a pattern in response from the same suspect persons; a) almost instantaneous response in the manner of (Hint 1), and typically emotional rather than logical in nature. This is almost always short and designed to be inflammatory or provocative, a bit testy. This is followed by b) one or more secondary (pack) responses delayed rather a bit in time. These will be more in depth and thoughtful, and validate the former with logical argument, and may contain a link to give further credibility. Other brief pack replies may be sprinkled in for effect. Collectively, they are all in agreement regarding your idiocy (or whatever).

It is when the same people tend to respond in these patterns that you are very likely dealing with a Troll pack. You will find this is true regardless of what time of day or night you post. They never sleep because every psyops Troll is actually three people manning a keyboard around the clock. They can always respond quickly with the first response, but the careful response requires that they actually research and formulate the best supporting answer based on all they know about you and the topic, which they might need to first research, and likely, it involves a supervisor’s approval or must be compared against preset guidelines.

Hint 4) Thick skin, undaunted. There is nothing you can do to make these people not remain your friend, short of unfriending them, yourself. While they may match or even exceed your own expression of ire, they won’t go away no matter how you might choose to argue, or confront with insult. Indeed, they tend never to deal with insults directly, at all; they are irrelevant and serve no usefulness to their goal. A real person has an ego that must be defended, but they are just playing psychological games and feel superior regardless of what you say. But when you argue, watch out for the next hint, which is commonly employed in their responses.

This is also true of the sociopathic/psychopathic ‘cause’ trolls.

Hint 5) They tend to employ the 25 Rules of Disinformation. Easy to spot, easy to deal with, if you know what to look for. Be careful, though, because ordinary people sometimes use flawed presentation style or less-than-thoughtful posts which on the surface appear to fit one or more of the rules, when they are just being human. Watch for repeat performances, to know the difference. Give them rope.

Can trolls lead to real-world targeting?

Dangerous escalations; why we dare not ignore trolls

The real danger in online Trolls is this: their whole purpose in targeting you online can be to determine if you deserve real-World targeting, as well. With a few keystokes you can end up having your entire life put under a microscope; phone surveillance, tails, observation posts, bugs and cameras covertly placed in your home, mail intercepted and snooped, and so forth. Men in Black stuff. Its why I wrote The Professional Paranoid; a how-to book on detecting and dealing with this kind of targeting.

And, it can escalate further: electronic harassment, dirty tricks, political control technology (mind control) to make you look mentally ill to others, destroy personal relationships, wreck your income, and sabotage your life. For that, I wrote MC Realities, another how-to.

But it can also lead to the worst of all possible escalations; NDAA vanishing. If truly a pain in the neck to the government, a threat which needs to be dealt with more urgently… you can ‘legally’ (so they claim) kidnap you and make you vanish without any legal process. They can elect to torture you or give you over to some other country for ‘processing.’ Or, if they want, they can murder you and dispose of your body. This is how we know we are living in a tyrannical Police State, and why, then, government dare not tolerate free thinkers without Trolling them, and trampling on rights and freedoms at every turn, and why fear mongering is their number one justification. ‘Oooh… terrorists are everywhere! We need to TSA and NSA your ass for your own safety.’

What should I do if I encounter a social media troll?

What to do with a Troll

I personally do not mind their presence so much as some might. I enjoy providing them with disinformation, or provoking them to try to chase down a given pathway of dialogs only to suddenly drop the matter as if it never happened, or I don’t really care, or even was deliberately jerking their chain. I even kid them.

But most people would prefer to unfriend them, and there is NOTHING WRONG WITH THAT. Just know they will be right back with a new identity. It may be better to deal with the ones you know than to worry about finding the new ones you don’t yet know.

My favorite thing, however, is to educate them. I like posting factual material which challenges their personal beliefs that their job and their boss are operating on valid or just principles or beliefs, and purposes. I make them ashamed or feel guilt, whenever possible. It does not work with everyone, of course, but it is fun to try.

Are social media trolls dangerous?

Conclusion

Your privacy and personal safety could be at stake if you are in the hands of Trolls. The threat level is determined by how much our paranoid government fears people who fear government’s growing fascist police state/spying mentality, and dare to talk openly about it.  The more vocal you are, or the more aligned with or closer in links to others of like mind, or the more active you are elsewhere on the Web, or the more followers you have, and even the kinds of searches you make (that, too, is being watched by government) and certainly, your own original postings… each of these things determine if you might become the victim of someone else’s Troll, or have a Troll assigned to you, and what kind of Troll.

And once your ‘threat level’ has been assessed, that could lead to escalations that you will not likely want to experience. If you get a sense that such escalations are already in place or happening, by all means read my books, because they will help you know for sure, help identify the players, and form defenses. You can also contact me personally for free and for-fee online consulting or direct intervention services.

It’s what I do when I’m not being a thorn in the side of tyranny… and attracting Trolls.

The REAL Reason FEMA Promotes Emergency Preparedness?


FEMA and the rest of government seems quite paranoid about disasters of late, but clues suggest there are hidden reasons behind urging preparations — not the earthquakes, floods, nor fires they talk about. Conspiracy theories based upon dialogs by geophysicists, astrophysicists, and politicos seem far more likely the cause, and that puts a whole different face on what ‘preparation’ should involve and mean for you.

Why is government pushing emergency preparedness?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Can we really trust FEMA?

Reading this post series in three parts you will learn…

  • That there are significant reasons you absolutely should have an emergency preparedness program in place;
  • These reasons go well beyond natural disasters FEMA implies of concern;
  • There is a logical preparedness program that accommodates all concerns…
  • A program which should be considered by privately-held businesses as well as families:
  • It is NOT approved by FEMA, DHS, the Military, or other elements of the New World Order

What is the history of the emergency broadcast system?

Time was…

I very clearly remember the ‘Red Scare’ spillover from McCarthyism which translated to ‘fear the bomb’ in the 1950’s and 60’s… starting with the Eisenhower White House: Air Raid sirens were tested weekly or daily, typically at a fixed time of day as if a Church Bell announcing Noon. I was a teen during the Cuban Missile Crises under Kennedy, when talk of the day was the home Fallout Shelter, and at school, we had ‘duck and cover’ drills as often as fire drills. But the scare wore off by the 70’s, and sirens and shelters were no longer in vogue, though every downtown building tended to have a well marked public shelter.  Yawn.

Fast Forward, Bush I White House: For no visible or announced reason at all, the Emergency Alert System (EAS) and CONELRAD Radio alert system which had in evolutionary form driven those sirens for two decades was turned back on in the 90’s, and updated for improved use with TV. But rarely was it tested, and then typically late at night between late-show snoozes. Just fire drills at school. No more sirens, unless there was perhaps a fire or other actual emergency. Very unobtrusive. No problem.

Fast Forward, Bush II White House: Suddenly, somewhat synchronous with the formation of Homeland Security, these alerts started increasing in frequency and were randomly interrupting all manner of broadcasts at any time of day. They now had the ability to actually take over newer televisions, even if turned off or in use with a VCR at the time. Somewhere along the way, it was expanded to include hazardous weather condition reports and the AMBER ALERT system for missing children. Schools still worried about fires. OK. Well, perhaps.

What kind of threats should an emergency preparedness plan address?

The current threat assessment

What does FEMA think is different about 2013? (Click – from FEMA ‘resolve’ page)

Fast Forward, Sorento White House: Suddenly, and synchronous with DHS seeking to buy 1.4 billion rounds of ammunition (that’s several Vietnam wars worth), all over and above military orders… not to mention a long list of equally disturbing purchase efforts involving coffins, ‘emergency housing’ which more closely resembled prison camps, food and water stores, vaccinations and anti-biotics… numbering in the millions more often than not — the tests started increasing in frequency and in duration. Annoying. Suspiciously omnipresent, excessively foreboding.

What bothers me most is a synchronous rush request for proposals on delivery of emergency preparedness items and relocation and readiness orders to military to FEMA Region III (Atlantic Seaboard States near D.C.), all with a date of October of this year. In fact, much of FEMA’s promotional material is geared to 2013, specifically. Most of the darker things cited in this post are happening right now in 2013 or otherwise generally depicted as an immediate potential threat.

Worse, both DHS and FEMA have started multiple high-profile media campaigns suggesting we all need emergency kits and emergency plans. This is also all simultaneous to a bit of mainstream news and much suppressed facts being revealed on the Web regarding an approaching Planet X, approaching comets, several near misses by planet-killing asteroids, and a flurry of unusual meteor activity to include nuclear blast-strength explosions in our atmosphere (the Russian meteor injured nearly 2,000 people and caused significant wide-spread structural damage over hundreds of miles). And there is more…

Also simultaneous are geo-political and financial threats the likes of which have never been seen in the history of the planet, each threatening dire unrest to the point of forcing Martial Law. While this goes on, the sun is spitting gigantic record bursting electromagnetic pulses at us and the pole is shifting, Fukushima is continuing to increase its threat, not to mention shifting weather patterns and an increase in seismic activities of Biblical proportions. Dare I mention strange phenomenon like objects orbiting the sun, mysterious loud and scary sounds heard over thousands of square miles, two suns and other oddities in the skies day and night? Endless wars somehow always tied to terrorism and oil keep being announced. No wonder large numbers of people are actually starting to think End Times might actually be around the corner.

The end of oil supply as we know it indeed approaches. Extremist terror groups pose theoretical threat of biological, chemical, or nuclear WMD. Criminal nations threaten to attack us with nuclear weapons. China is on the verge of surpassing the US as super power, and their top military leader has said war with the US is inevitable; their only answer to that being to strike first.  Man-made bio weapons, nanotech, and even genomic weapons are being developed daily by all modern military powers, and we get cover stories expressed as worries of a natural pandemic outbreak of catastrophic proportions. The Center for Disease Control has even gone so far as to talk about preparation for a Zombie apocalypse, and there is some evidence it is not as tongue-in-cheek as they profess. Don’t forget chemtrails and the feared NWO depopulation plot.

Actual soldier patrolling American Street. UNACCEPTABLE! (click – disclosetv.com)

The worst part is all the talk about a possible military takeover, martial law, a new Constitution and a North American Union. Why, that’s nothing short of saying the Antichrist is coming to power… and some say that’s the case, too. Agenda 21, GMO crops, Codex Alimentarius, the Small Arms Treaty (goodby 2nd Amendment), etc.  All these things tie in one to another as if all by some organized conspiracy (Illuminati?) After all, they say, the Norway Spirals were likely a test of Project Bluebeam, to simulate with a kind of holographic event the Second Coming in the Antichrist’s name. And what about those tens of thousands of ‘State of Martial Law’ warning/instruction signs coming into the US from foreign sign makers in convoy manner? Really, really not good.

Almost everyone has some kind of foreboding sense that SOMETHING bad this way comes. Armageddon Online has a more detailed summary view. And just as someone chooses to discounts all of these things as ‘baseless,’ something like this comes along to make us wonder all over again: a lot of people are saying there is a purge of the military taking place, and that usually portends a violent overthrow of government.

So, quite naturally, some of us are taking the DHS/FEMA advice to heart, or at least considering it. But I fear most of us are preparing for the wrong thing in the wrong way. Its one thing to have food, water, medical, and key supplies stashed away for an earthquake or flood… and another to truly be prepared for upheavals of the political or Biblical sort… the sort government advice is NOT addressing, because if you were prepared for that, government looses the ability to maintain political control through dependency upon government for survival.

Never fear; the Professional Paranoid is here to help you find your way through it all… in part II:  A Logical Home Emergency Response Plan: The Government Does NOT Approve

Why should I hide my emergency preparedness kit and weapons?

Military Purge Underway? A Military Revolt Warning Sign


A sure sign that the government fears a military coup or the military itself is about to attempt one, is a purge. The government will purge those it fears unloyal, and/or the military purges itself of those unwilling to go along. Whoever best purges post haste, just might win. Either way, however, the people tend to loose to an errant government and/or would-be military dictator. It is, after all, how authoritarian Police States are born.

Is Obama conducting a purge of the military?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What causes a military purge to take place?

Reading this post you will learn:

  • That history proves purges take place when governments fear their military is about to take over…
  • Or when the military prepares for such takeover…
  • And such tyranny grows from purges within political circles and the military to involve citizens…
  • Everyone is challenged with loyalty oaths, untrue (or otherwise) accusations, tricky questions, or even torture…
  • The wrong answer can mean death, prison, or ‘vanishing;’
  • Evidence abounds that we have been in a pre-event purge for several years…
  • That the purge is nearing the point of reaching open armed conflict;
  • That the result of a purge is almost always a Police State, regardless of which side wins

Why is Obama conducting a military purge?

Updated Nov. 14 2013 Changes indicated in RED reflect latest termination and dim view of purge by Russia and China who see it as possible PRELUDE TO WAR.

Updated Dec. 10 2013 Section added and indicated in RED as relating possible ties to Global Research Web site going dark and decade old CIA plot to capture Soviet nuclear warheads.

History on Parade…

All authoritarians get rid of non supporting military men. Only in America does media not dare report it happening. (click: rarenewspapers.com)

History is rife with examples of political purges, both bloody and near bloodless, and unfortunately, both sides can end up playing the game. Sadly, we also see that most bloodless purges end up being bloody at one point or another; they push the other side into reactionary defensive acts. Worse, once one side or the other becomes dominant, the purge is extended from the national politik (government officials and military) to local politik (regional-to-city leadership and law enforcement), and from there, down to every day citizens; any such purge portends a intended shift in power to an actual or de facto authoritarian dictatorship.

The classic example would be found in the Russian Communist Revolution, which actually evolved as successive political leaders reshaped ‘the revolution’ to suit their own visions. But you find the same things generally true in the French Revolution, Mao’s Red China, or even in the American Civil War, where the Union employed the Ironclad Oath, and various Generals (see last paragraph in the link under ‘1862’) exercised internal ‘loyalty and fitness’ purges, ad hoc. One could easily be shot for a careless comment or answer.

Why would Obama conduct a purge?

A purge HERE?

There has, in fact, already been an attempted military coup in the United States. We are, or were, fortunate at the time, that the attempt failed before the purge which would have been required could get started. While most Sheeple have never heard of it because it was contained and not made public, most of the rest of us are aware of the Business Plot of 1932 which attempted to stage a fascist takeover in America by means of a military coup. Some of the biggest Industrialists of the day were involved, names which still today are iconic labels on everyday products, like Singer, and Dupont.

But thanks to one-tough and loyal Marine who tricked his would-be conspiratorial recruiters, the affair backfired. That’s a big ‘Hua!’ for Major General Smedley Butler. But a purge did follow, one which sought to eliminate the threat from the cadre of business leaders and their friends involved, including other military — along with an attempt to cover up the entire matter in order to maintain confidence in the nation’s internal and external affairs.

One thing remains clear: the general purge model is especially of concern when one is dealing with a bloody purge, because it does work its way down to citizens, Sheeple or otherwise. Especially otherwise. And so, I strongly urge that we must take a very close look at our current troubled situation and most recent history with respect to Presidents, politics, economy, international affairs, and the military. So, what’s going on, here in America, right NOW? Well, the answer to that won’t be found in mainstream media unless, perhaps, you are talking about press from abroad.

Now comes a new worry: The European Union Times is reporting the both the Russians and Chinese consider Obama an unstable, power-hungry madman and, with the latest firing (added below with RED) , have themselves taken unprecedented military responses towards possible military conflict with the U.S. and any of its Allies. Seemingly related, are two other news stories in one at the Web site regarding Chinese troops (and a spy ship) in Hawaii, and a simultaneous FEMA ‘simulation’ of cyber attack (Fire Sale) on US power and communications networks, itself timed to coincide with the largest Cannibalistic Corona Mass Ejection the World has ever recorded striking the earth and disrupting our magnetic field in a way which threatens disruptions similar to said cyber attacks . A grain of salt is due, here, as the EUT is, well… extremist in nature. Extreme ‘what’ remains in question… a bit like a super-market tabloid without aliens and pictures of personalities doing naughty things or being too fat on the beach.

Update Dec 10, in support of prior update…

Consider the Howard Hughes Empire at the time when CIA essentially controlled the man and his firms (1968). CIA contracted Hughes Ship Building and through Hughes, Sun Shipbuilding – to construct two custom vessels. The main was the Glomar Explorer deep sea ‘research’ vessel, which is also adaptable to deep sea drilling applications, and the second was a ‘supply ship’. The Glomar Explorer was used to recover nuclear weapons and portions of a sunken Soviet Sub K-129Golf Class – though Agency claimed only to have failed in the project. The supply ship was actually a disguised ship akin to a Sub Tender, with an internally open bay designed to accept the sub, once raised, and covertly take it to the San Diego Naval Yard.
The project has been called Operation Jennifer and the even more secretive Operation Azorian (there were two specific missions, one to get soviet sub technology for USN, and one to get the bombs for CIA). I’m the only one maintaining the weapon recovery, as documented in support thereof in my book Fatal Rebirth (proparanoidpress.com) – free copy of volume 1 ebook on request to pppbooks@comcast.net. The principle clue is that the supply ship was five feet too small to recover the section of the sub officially sought, but the right size for the weapons section, the sub already known to have broken into two parts. Add to this, the cover story that the reason the recovery failed was not because of the too-small tender, but because the desired section itself additionally broke into pieces at the attempt. http://www.fas.org/irp/program/collect/jennifer.htm
Recently, the underground news organ, Global Research has gone massively dark with not one single resource of their massive Web presence accessible. One reason for vanishing of the material may have to do with what Fatal Rebirth predicted would be done with the nuclear warheads (false flag terrorism, specifically citing it against Charleston, SC). Russia Today has stated that Russian Intelligence has leaked that one reason Obama is conducting a military purge is because the military refused a nuclear detonation at or near Charleston.
If CIA has old Soviet bombs, they would no longer be very useful for normal detonation, but would make excellent dirty bombs. CIA would likely be more inclined to follow such an order than the military, if RT is correct. Russia would have a motive for disclosure tied to the bombs, because the radioactive footprints would point to Soviet manufacture, and could result in suspicions they provided the weapon willingly to ‘terrorists.’ Global Research (in all likelihood) may have been expanding upon this story, which may be why it has gone dark; you get either a 404 error, a denied permissions error, or a ‘something has gone wrong’ error. True, it could be a simple temporary glitch, perhaps a server being down for maintenance. On the other hand, DHS (or some other agency), has perhaps declared them a terrorist and seized their servers, as they have done in the past to other activist and conspiracy oriented Web sites, such as Indymedia.
Therefore let us continue our look at the Glomar Explorer, which has had a long history. It generally patrols the world on contract for oil companies and the military industrial complex (i.e., Lockheed Martin) and can usually be found offshore from political hot spots ‘researching’ to ‘find oil.’ It was off the coast of Vietnam during the war, and has repeatedly been in the Middle East, commonly the Yemen area, which gives spy ELINT resource coverage to everything from Egypt to Iran to Afghanistan, and excuses land incursions regionally by ‘crew on shore leave’ who could easily be conducting in country spying. Most recently, the ship has been in the Gulf of Mexico, leading some theorists to wonder if it did not have something to do with the BP oil leak (I doubt this – too far away).
The Glomar Explorer has also operated under the corporate names of Global Marine and Global Santa Fe, both considered CIA Fronts. To add irony, if not confusion in realization that with CIA, nothing is ever as it seems, is this fact from Linkedin: Ronnie Temple used to work for Global SanteFe and Global Marine, and Ronald Temple now works as Co Director of Global Research. Ronald Temple of GS/GM was managing director at Lazard Asset Management, and Ronald Temple (another one?) is listed as Manager of US RESEARCH for Lazard Asset Management, as well as an association with the Deutsche Bank, THE FAVORITE CIA conduit for black op funds.
In the spy World, you can’t tell your players or their motives even with a program card. We would hope these to be different individuals, but just imagine… what would it mean if they were one and the same? Clearly, the two Ronalds appear to be the same, implying that he sees value in having multiple identities on Linkedin… so why not a third? Multiple identities under the same name IS NOT UNCOMMON among CIA operatives/agents. Using multiple names in this case might be intentional to distance Global Research from Global Marine and Global SantaFe. Argh! End Dec. Update, prior update continues as indicated in RED.

Is the U.S. military conducting an internal purge?

Proof of a purge?

Many observers think its happening, including people who are far from being conspiracy theorists; media types, military professionals, and more. In simple terms, consider the following statistics and facts, none of which are in dispute, though almost all of which are veiled from Sheeple’s eyes by media and government. Mainstream employs careful wording and skips filling in the blanks with useful detail. But others mince no words.

And speaking of words, we must realize that when a bloodless purge is underway, there must simultaneously be ‘disinformation’ to cover up the fact. This means that excuses will be used to veil the truth, and this will be quietly accepted at first by both sides, often because, at least for the individuals involved, some form of blackmail or other threat is in place to insure their silent acceptance. For some, it may be some form of National Security agreement. For others, it may be a sexual indiscretion, or a criminal or financial matter which dictates cooperation lest it be made public.

So take what is often offered in ‘face value’ with a grain of salt. It is the fuller picture which is painted in the broader strokes which overpower individual words, or lack of words… and bear in mind that when there is a purge, one must also look at resignations as part of the ‘flow’ of things — especially if related to protests or potentially motivated as a self-defense move. Doubly so if in numbers.

Why is the U.S. Military conducting a purge?

Is Obama conducting a purge?

Many think so, and the preponderance of evidence cited would seem to support the notion. It is, after all, what prompted my own review (more detailed than theirs, naturally — that’s always my goal, at least). Consider these reviews, and the fact that many sources claim Obama’s differences with military leadership have to do with his asking them if they were willing to shoot Americans, presumably in a gun-grabbing operation of some kind:

Freedom Connector, Nov 16, 2012: What’s Behind Obama’s Military Purge? — by Bob Livingston, an ultra-conservative newsletter writer;

The Independent Journal Review, on June 28, 2013: Obama’s Purge; Military Officers Replaced Under the Commander-in-Chief — a situational analysis by Kyle Becker;

The Western Center for JournalismObama Escalates Military Purge — by the Editor

World Net Daily, The Examiner, The Guardian, and many others citing The Blaze, Oct. 23, 2013: Blaze Sources: Obama Purging Military Commanders — Sara Carter citing actual fired military commanders’ viewpoints.

There are many more, but you get the idea. From the outside, looking at the observable clues leaking out from the inside, and sometimes even from the mouths of those involved, the impression is a Presidential purge is under way. More: since the above, Sorento’s desire to attack Syria met with such resistance in military circles as to warrant an article (translated from an unstated German source), well worth a read: Historical Disgrace: The U.S. Military Mutiny Forced Obama to Retreat. Yet as already mentioned, other stories relate that the purge is because the Military is refusing to go along with plans to grab guns and shoot Americans who refuse to comply.

Why does a military purge predict a shift towards authoritarian dictatorship?

Flip side: is the military is purging itself of White Hats?

No one else on the Web seems to think so, but I’m wondering why not? When the stability of a country comes into question, forces within the military tend to start wondering if they need not do something drastic to change things, and eventually, a strongman General is able to recruit others of like mind to work out ‘contingencies.’  One of the first steps in preparing for possible enactment of such plans (a coup) is to evaluate the remaining Officer Corps, and get rid of loyalists.

Or, it may be a group of powerful business leaders who make the call, and who recruit members of the military for their cause, resulting in the same process, a ‘la The Business Plot of 1932, already mentioned.

You know something sinister and deeply troubling is going on when Veterans are being told they can’t fly the American Flag on public property, Officers, even Chaplains, are threatened with court marshal for having a Bible on their office desk or speaking about religion with others who are not already in the same faith, and telling them to resign if they have a problem with the policy. What? Oh, I forgot: the military and military policy is dominated, according to authors like Alex Constantine, by Satanists.

In point of fact, as Alex and others have pointed out, self-proclaimed Satanist General Michael Aquino, was a chief architect of the Revolution in Military Affairs, the policy which defines the next major new war type the military will face is ‘A People’s War,’ where the enemy is disgruntled patriots, Constitutionalists, and the poor and disenfranchised. Well, now, that’s just about everybody in the U.S. but the ten percenters at the top, and dumb Sheeple, is it not?

Now, while the first section paints a picture of a Presidential purge, I must remind you that both sides of a major power rift often purge, and that outwardly, the signs will typically tend to look the same. So now, let’s take a closer look at those purged and their circumstances, to see what we might decide for ourselves. After all, other Web sources speculate the reason for Obama’s purge is that he fears a military coup, a notion which alledgedly originates directly from the Russian Military and the Kremlin.

However, that story would seem to be related to another alleged Kremlin and GRU (a KGB-like Russian Spy group similar to CIA) claiming Obama had ordered the detonation of a nuclear bomb in or near Charleston as a false flag event and the military refused, prompting the firing of so many nuclear commanders. I find this fascinating, because in my book Fatal Rebirth, I predicted Charleston would be the target of a nuclear false flag attack AFTER the also predicted (in 1999) downing of the WTC by passenger jets and resulting in a series of Middle East oil wars.

Snopes.com, whom I do not entirely trust as a legitimate ‘debunker,’ does attempt to debunk the above story by attributing its true source to Sorcha Faal, a known professional disinformationalist who works for, among other people, DHS. So then, why would DHS promote this particular disinfo? That makes no more sense than the outlandish conspiracy claimed by the story. But if baseless, and not Russian sourced, why has RT (Russian Television in English) News not ALSO debunked it, and instead reported on it as factual?

So understanding if there is a purge, and who is undertaking it, and why, is going to be difficult. Really, you can’t tell your players (or their position on the team/role in the game) without a roster. So here it is, so you can decide for yourself…

What are the signs of a military or political purge?

Point Comparisons: Roster of 266 Vanquished Officers and Key Staff under Obama

This is an updated and more accurate compilation the found in lists elsewhere which cite 197 or fewer. More than 50 being offered in rich detail, here. These numbers represent a massive bloodletting not seen under any prior President in American history. There are so many you might be tempted not to read them, but in the reading, at least of their name and command position, you find some interesting, if not scary things, not to mention patterns. To be sure, some who were let go may have indeed been let go for non-purge and quite legitimate reasons, but the large numbers of higher rank Officers and the nature of the clumps of specialities/assignments/duties, especially, amplify reason for concern that more is afoot than ‘bad conduct’…

Fired Nov. 3rd, Colonel Eric Tilley, Commander of Japan’s largest U.S. base in Japan for ‘allegations of unstated misconduct.’

First Lieutenant  Ehren Watada was the first Officer to refuse deployment to Iraq as an illegal war, was eventually allowed to resign. Now, if his view was unjustified in the eyes of military, why was there no court marshall? If justified, why did we go to war? It implies disparate viewpoints in military ranks, and between military leadership and the President;

Major Stefan F. Cook, US Army Reserve, refused to deploy because he did not believe Barry Sorento was a legally elected President, joining with two other officers according to Wikipedia (no Web source names them, but they are described as a retired Army Major General and Active Reserve USAF Lieutenant) in a law suit (Cook vs. Good – scan down). They did not win their suite, but neither did they have to serve, again meaning disparate viewpoints. Touche’;

Captain Connie Rhodes, US Army Physician filed a similar suit (just beneath prior link, same page);

Predator Drone Pilot Brandon Bryant resigns USAF over immorality of drone attacks on noncombatants, making five people who refused to serve and suffered no court marshall;

Colonel James H. Johnson III, Commander 173rd Airbornfired and convicted of bigamy and fraud in expense accounting, apparently jumping out of the airplane and into the frying pan;

General Joseph Carter, Commander Camp Edwards and Adjutant General of the Massachusetts National Guard resigned even though a months investigation failed to produce evidence of a rape allegation;

Brig. General Jeffery A Sinclair, former Dep. Commander 82nd Airborn in Afghanistan, fired and facing possible Grand Jury review for criminal sexual indiscretions — sounding a bit like the CIA entrapment of Wikileaks mastermind, Julian Assange;

Army Major General Peter Fuller, Commander in Afghanistan (of unstated forces — which to me implies intelligence hanky-panky), let go in 2011;

Marine Major General C. M. M. Gurganus, Commander Regional Command Southwest and 1st Marine Expeditianary Force (also Afghanistan) was let go in 2013;

Marine Major General Gregg A. Sturdevant, Commander Aviation Wing at Camp Bastion, Afghanistan, and Director of Strategic Planning and Policy for US. Pacific Command, let go in 2013;

General David D. McKiernen, Commander of the Afghanistan Theater was let go at Obama’s orders after four months of arrival, for saying the campaign was less noble than was Iraq. That was 2009, making him the first four-star General released by a Commander-in-Chief since MacArthur by Truman. In 2010, Obama fired…

General Stanley McChyrstal, Commander of NATO International Security Assistance Force (IASF), Afghanistan, a matter linked to the death of reporter Michael Hastings. He was replaced by another soon-enough-to-be-fired General Petraeus, below. Seems like Obama liked no one involved in the Middle East, does it not?;

General David H. Petraeus, also left the Army as NATO IASF Commander as to be appointed by Obama as Director of Intelligence, CIA. He then resigned CIA over charges of an extramarital love triangle, but at the time there was the controversy about the CIA’s role in the handling of Benghazi intelligence and no-go rescue aftermath.  And, stepping back once more, the man who replaced him at ISAF when he stepped up to CIA was…

Former General Michael T. Hayden, in like manner yet again, quit the USAF to be appointed by Bush II to be Director of NSA, and then, also like Petraeus, was fired over extra-marital sexual conduct (officially), and unofficially, over internal disagreements with Obama on intelligence policy and validity of evidence regarding alleged Syrian nerve gas attacks (shades of Bush and Weapons of Mass Destruction in Iraq);

Marine General John R. Allen, Commander of NATO International Security Assistance Force, Afghanistan, was investigated and removed for ‘inappropriate communications regarding Bengahzi’ (he countermanded White House orders not to attempt rescue of the besieged Embassy). The investigation continues without fruit, be he was also seemingly an injured party in the above Petraeus love triangle. You couldn’t make this stuff up as screenwriter of a Kardashian’s in Uniform special. Now, regarding Bengahzi…

General Carter Ham, Commander Africommand (counter terror operations) also relieved of command and arrested for attempting rescue despite orders from White House to stand down… and before him…

General William ‘Kip’ Ward, 1st Commander of the Africommand fired for ‘financial irregularities’ in expense accounts;

Rear Admiral Charles M. Gaouette, Commander of the Stennis Aircraft Carrier Strike Group relieved of command in the middle of Middle East deployment for unstated ‘inappropriate leadership judgement’ also thought Benghazi related. But not just him…

Capt. Owen Hornors, Commanding Officer of the Carrier Enterprise, no less, was let go for ‘making and showing to the crew raunchy cartoons.’ No patterns here, folks — move along, move along;

Rear Admiral Ron Horton, Commander of Western Pacific Logistics Group was also fired for knowing about and failing to put a stop to the Enterprise cartoon shows;

Brigadier General Bryon Roberts, Commander of Ft. Jackson (training facility) resigned over charges of an ‘altercation’ with a woman. He commanded the training of the Iraqi Security Forces slated to replace US Military, and served directly under the Joint Chiefs with distinction;

Vice Admiral Tim Guardina, U.S. Central Command, drops two ranks to Rear Admiral, and looses his 2nd in Command position in charge of nuclear weapons for allegedly using counterfeit casino chips (felony fraud). Now that would be easy to set up as a frame up… which begs the question, why no criminal charges or court marshall, if true — or a resignation? It’s called ‘leverage’ and keeping a close eye on a person in question by keeping them close at hand;

Four-Star General James Mattis, Commander of US Central Command, being fired for ‘Mad Dog’ warnings to the Obama adminstration on the dangers of proposed Middle East military actions in Syria. Very interesting if, as stated in the next item link, he was the one responsible for that firing, and perhaps more so, if it was his replacement who arranged it (at this point, I’ve not been able to isolate which might be closer to being true, if either);

USAF Major General Michael Carey, Commander 20th Air Force (that’s 3 Wings of ICBMs/450 warheads at three AF Bases) was let go in 2013, making the third man in charge of nuclear forces to be let go — unprecedented;

Army Major General Ralph Baker, Commander Joint Task Force Horn of Africa in Djibouti, Africa, let go in 2013 — anti piracy and counter terrorism support unit, also likely to know what really happened in ZeroDark Thirty;

Lt. Col. Matthew Dooley, 20 yr Vet Army Instructor for National Defense University and Joint Forces Staff College allegedly fired at Obama’s request for teaching a previously approved course called Perspectives of Islam and Islamic Radicalism (for which he had also previously been commended) because it was deemed ‘offensive’ to Muslim organizations who somehow managed to learn about it (but had not experienced it). On the other hand, the Army Vice Chairman of the Joint Chiefs, now head of US Central Command himself described it as “against our values,” and so, this appears more likely a military purge victim than an Obama victim, done in a way that blames Obama publicly. A nice two-edged blade being twisted;

Commodore of Logistics, Lt. Col. Allen B. West,