Category Archives: Conspiracy
Rare is it that a given Targeted Individual won’t have reason to believe Police are involved in their targeting. And yet, they were not… not officially. Here’s the why and how of it…
copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Color of Law; Police abuse of power in personal agenda
In the two decades of working with thousands of organized stalking victims and victims of other forms of targeting, the single-most common complaint is the suspicion or outright experiential evidence that multiple Police Officers are complicit in the affair. If not the Police, then some other law enforcement or intelligence agency… or both. Indeed, this has been my own experience in two of three different episodes of personal targeting over a 15 year period. In fact, multiple agencies can be involved simultaneously; Ive gone up against as many as five LEA, plus FBI and CIA assets, bounty hunters, and military intelligence in a single targeting. This has been documented in my various books showing how I beat them in the end… but it was no cake walk.
This is a problem for more than the obvious reasons. The most obvious is, that the very authority who should be responsible for investigating and protecting against such crimes, cannot be trusted by the TI to help anyone but the perps behind the affair. Calling Police for help is almost always like asking a burglar to help you secure your home. Secondly, when officials of any kind are complicit, the victim is then entered into the official record as being mentally ill, or in a worst-case scenario, guilty of some convenient crime. Even when not complicit, going to Police about targeting is likely to have the same result; they simply do not want to believe in the Boogeyman, and see anyone who does as a mental case. In fact, stalking is designed to get you to go to the Cops for just that reason; they want it on record that you are mentally unstable. DON’T DO IT.
But there is a DO list! Do video and log all interaction with LEA or have a witness from whom you can get a written statement immediately after. It will help keep Police somewhat confined in their actions against you. The more you collect such material, the less likely are they to risk any useful action against you; you can illustrate a pattern of harassment. Do make copies and hide them well, off site. Tips in my first book, The Professional Paranoid on all of this.
The worst example of the problem from my client situations was a Navajo Indian, an ex Green Beret, who was targeted after his daughter was kidnapped by a Satanic Cult with all the earmarks of a CIA mind control operation. Within weeks of going to authorities to seek help, all manner of problems beset him. Traditional surveillance and stalking, and electronic targeting, to include V2S was the least of it. When he began using my advice and his military skills to determine the players and go after them aggressively, it took a turn for the worse: suddenly, his mortgage was six months in arrears and his house was being foreclosed, all his credit cards were maxed out and past due, his bank accounts emptied, and there were outstanding warrants on him for assault with a deadly weapon and skipping out on bail. He was, in fact, declared ‘armed and dangerous’ with an all points out on him. This was all done by back-door computer manipulation of data files by professionals of CIA caliber.
He took additional advice from me and then went underground to organize with other ex military buddies and Navjo friends, and went black in order to wage an unseen war against the enemy. As I never heard from him, again, I must presume he failed in the effort, or was successful to the point of having broken enough laws that he needed to remain underground. I had, in fact, advised him not to contact me for such cause. But, as I have said, these are merely the obvious problems with this particular aspect of targeting.
The other shoe that usually falls…
Perhaps the second-most common awareness about stalkers is that they seem to regularly consist of a lot of Masonic types. This is often determined when getting a good close look at them or their vehicles; the Masonic emblem, or some similar fraternal order emblem, is found in evidence. Usually, it is either a sticker on a car window, a pin on clothing, or a ring on a finger. I myself have seen this in my own targeting, the one incident where true gang stalking was involved (as opposed conventional targeting with general surveillance and dirty tricks).
After guesting for four hours on Coast to Coast with George Noory to talk, in part, about my new book, MC Realities, I ran into the Masons almost overnight. I had mentioned on air the involvement of the fraternal organizations in gang stalking, and how they had evolved from the Knights Templar and their exposure to the satanic Hashemites and Assassins of the Middle East during the Crusades. On air, of course, I gave my name as H. Michael Sweeney, my ‘pen name.’
Two days later, I was at work where I was managing a gas station while investigating the Oil Industry, infiltration style. It would result in two forms of targeting, the first of which was by the Masons, that second day. A man bought gas and elected to come into the office to pay, where I was at the time. He waited until I was the only one present, and then offered to pay, holding out his fist, palm down. It was only a couple of dollars in gas, so I assumed it was a handful of change. Wrong; it was a message to be delivered.
NOTE: the second was targeting of the Station itself by a terror cell, of which one of the participants recognized by me as a helper to two of FBI’s Top Ten Most Wanted and two other Islamics… and FBI agent who had been earlier involved in the my own targeting as earlier described. It was, in point of fact, to be yet another False Flag operation, later described by President Bush as Gas Station Tasking… which I thwarted. Arguably, the two targeting incidents might be seen as related, but even if so, it is unimportant, except for the fact that it illustrates that one almost never quite knows for sure why one is targeted, and who really lays behind it. This is described in my wordpress home page, if you wish to learn more.
Placing my hand beneath his, he opened it, and instead of coins, a money clip fell into my hand with a wad of Hundreds. “Take what you need, Mr. Sweeney,” he said. My name tag simply said “Harry.” He had a very wry, knowing look on his face, which slowly turned into a smirk as I manipulated the money clip to retrieve a single bill. In doing that, I discovered a gold and jeweled Masonic emblem on the other side of the custom-made silver clip. A broad grin overtook his face, to the point of becoming silly.
“Interesting how some thing have more than one meaning,” he said, as I returned the clip and fetched his change. That day, when going home, There were three of them outside of my Condo, and several cars with Masonic emblems in our parking area, none of which had ever been seen before. I ended that stalking by using the methods in MC Realities, methods that many Tis would be unable to employ unless doing so upon first targeting, as had been my situation. Once targeting has been ongoing for some time, the typical TI no longer has access to the needed resources for such a defense. The one remaining defense is found in an earlier post.
In MC Realities, I trace the evolution of Mind Control technology (Political Control Technology) from the time of Adam and Eve (the Serpent’s deception was the earliest form of controlling thought… the same version of it as we see today in media manipulation), forward. The Templars, after being ordered destroyed by the Pope for having discovered their Satanic practices acquired in the Middle East, went into hiding. In time, many of them hid within the Stone Masons Guild, and eventually, took it over to form the Freemasons as we know them, today.
Hedging their bets, should they be found out a second time, they formed splinter fraternal organizations, as well. Any group with any of these words in its title… Fraternal, Ancient, Order, Ordo, Lodge, Temple, Grand, Sacred, Rite, or Knights (and similar)… is very, very likely a fraternal organization with a Masonic organizational construct… and at the higher levels, at least, closely affiliated with the Freemasons if and when it becomes convenient to the parent group. Therefore, it is easy to involve small armies of ‘helpers’ if someone is deemed a target. It is important, however, to understand that the rank and file lodge Member who may be induced to participate, has zero true knowledge of you or the purpose of the targeting; they are simply ‘helping a friend’ to solve ‘a problem.’
I end this section with a simple note: all Masonic systems are quite steeped in ancient mysteries of the Middle East, and beyond, typically focusing on Egypt, Syria, and the Holy Land… with a touch of the Sub Continent (India, Nepal, etc.) and Far East.
The two shoe laces are tied together…
This is where it gets interesting. Most big city Police are encouraged to join the Fraternal Order of Police (FOP), and it is indeed Masonic in structure. FOP, for instance, employs the Masonic all-seeing eye of Egyptian fame in their logo, which is a five-pointed star with a circle bisecting the points to create five triangles shaped like the Compass of the Masonic emblem, also the shape of the ancient steeply-angled Egyptian Burial (pyramidal) obelisk used for commoners’ crypts. There was additional heraldry-like art akin to European styling in the center of the star, shapes quite like those of most Police Badges, and incorporating an Eagle and other symbols. In other words, Police departments not only adopted the Lodge system almost universally, but did so to the point that their badges reflected elements of the FOP emblem. Almost all Police badge shapes generally post dated the FOP affiliations, underscoring the link. The exception would be Sheriff stars, and yet, that shape is also of ancient Masonic importance, in both the upright and upside-down (satanic Baphomet) versions.
If that were not enough to convince you, let us take a look at the Police Department of New Orleans. New Orleans existed as a city at the time of the Louisiana Purchase from France, in 1803. The first Masonic Lodge (a French version), was established there in 1793, all its members speaking French, and some Spanish, but no English of note. All the better to remain secret and mysterious to Americans, when they came into possession. But to fully appreciate New Orleans in the equation, we have to first look to New York.
In 1915, the Fraternal Order of Police established their first Lodge, there. It spread from there to many other cities in very short order. The FOP was not intended just to be a Lodge system, however; it also took on aspects of Unionization, a kind of bargaining force with the City whenever Members felt that Cops were not getting a fair deal from the Mayor. In many cases, in fact, their bargaining strength was augmented by the power of the greater Masonic power structure, a formidable force at the time.
Over time, actual unionization was also achieved in almost every major city, usually through the Mob’s control of the AFL-CIO, making it easier to arrange for hijacking of intrastate trucking or of dock cargo without anyone ever being sent to prison. But that’s another story. Ask any retired Union trucker or stevedore from Jersey. I’ve heard the same from 1975 Oregon members. The importance of that will explain to some Tis, those who believe they were targeted because they reported illicit drug operations or crimes which might be related to Unions, are targeted by Police. Additionally, of course, CIA sanctioned drug operations are protected by Police, as well. Thieves in bed with thieves, the bed made by the thieves.
Though New Orleans under the French had a Police Department as early as 1796, it had no Police Department for rather a long period of time after it raised the American flag. It was instead ‘policed’ by a vigilante system until 1853, when they formed their first ‘American’ Police Department. Almost immediately, they adopted the ancient Cresent and Star (upside down, larger star) as is common to Islam, as their badge. It is still in use, today, and appears on their cars, as well. Well before the FOP had even existed, this Department was already incorporating Masonic symbology directly in its badge. This is better known as the Shriner’s symbol, today… the Shriners being a Masonic fraternal lodge system.
So, clearly, the Masonic influence and ties are present within most Police Departments. Cops form some of the strongest bonds between individuals in service outside of the Military, sufficiently strong, in fact, that if one of them asks a color-of-law favor of another, it is not likely to be turned down, and certainly unlikely to be exposed even if turned down. Therefore, it really only takes one Cop being approached from a fellow Lodge member to recruit several more for any needed aid, even if that request came from a lodge in another city. Ergo, escape to another city tends to never result in escape from targeting.
NOTE: That is why the Free Will Society exists; a solution to virtually all forms of targeting. Please join and support (donate/promote) our effort to create a targeting free intentional community of our own, and our other advanced programs planned for the future. If you are reading this, you should immediately join the Society and give it full support. It is a far more valuable TI resource in terms of programs and goals than any of the so-called ‘TI groups’ out there, today, the bulk of which are nothing more than information and disinformation mills.
Please: you owe it to yourself to visit freewillsociety.wordpress.com to learn more.
Yes, there is a third shoe, one of special interest to those who feel the intelligence community lays behind their targeting. Every major Police Department in America has in place assets loyal to the Central Intelligence Agency, and many Officers have military intelligence backgrounds. Usually, you can count on some of them holding key positions within a given city: the Chief, the Public Relations Officer or Spokesperson, the head of Internal Affairs, the head of the Swat Team, and/or the Head of Personnel. From these posts, especially through IA, they are able to find bad cops who can be blackmailed into playing ball on an on-call basis, for any kind of dirty deed, to include color-of-law abuses such as is common to targeting. Don’t forget CIA drug running operations.
If that were not enough, there are similar, but far looser ties with FBI, Homeland Security, and the US Military Intelligence Agencies (and in some case, others, including the United Nations, and even Mossad). These generally entail the network of Fusion Centers and Centers for Excellence*, and special programs such as Community Policing and the Strong Cities Initiative/Network. When you consider that most all of these agencies use computer software based on CIA’s PROMIS data base management system, which is nothing more than a data base engine with a back door built in… almost any form of hanky-panky is possible. Ergo, the Navajo Beret Syndrome.
* Search for ‘Centers for Excellence + Homeland’ to see why I include it, here. All these items work together to collect, evaluate, and share information on (persons of interest). They operate as one big networked spy tool with usefulness in organized stalking which can easily be misused by anyone within LEA who has access.
So, even if Masons are not involved at all, Police can still be brought to bear on any given TI with the same level of efficiency, and in fact, the FOP can be leveraged into the equation just as easily, in reverse manner. Will the average member of the FOP, the Masons, the Police, or any of that long list of Agencies be aware of any of this? Absolutely not… not unless they are higher on the food chain. Then, of course, they won’t be admitting it, either. Complaining about it gains nothing. Knowing about it, and understanding it, can mean a lot, however.
You may not be able to beat it, but when the mystery is gone, its just another damned nuisance to deal with, and another reason to avoid trying to rely upon Police for help, unless you know one you have great respect and trust in. I was lucky. I had a relative who was a Cop in an uninvolved LEA, and he was able to help off the record in very useful ways. I also had help from ex FBI friends with back channel access, of like value.
We can’t all be so lucky. And if you are a TI, you know luck is not your strong suit.
Fake news, tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations by Trolls and Bots are not the only weapons they use to dumb you down and pump you up with their version of truth. Vanishing is their latest trick.
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
The (fake) news media dilemma
Fake news and Web tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations are not the only weapons they use to dumb you down and pump you up with their version of truth. It is not just Trolls and Bots we have to worry about, now. Vanishing is the latest trick used to conceal the truth and promote the lies.
I’ve written before about how television mainstream dumbs you down with clever psychologically aimed technical tricks in the actual image… largely relating their use of subliminal messaging, deliberate distraction, and overload. The general purpose being to further reduce the actual news you walk away with to the simplest of boiled-down sound bites… just the ones with their take on the news shaped for you according to whatever bias the network has at management level.
Elsewhere, there have been excellent examples of the use of NLP (Neuro-Linguistic Programming), also employed by broadcast media. It involves careful wording as well as clever body language to project the intended viewer/listener response to the message, within the message delivery, itself. It has been shown to be so powerful, a well trained user (a stage magician and hypnotist, who must rely on such deceits), was able to deliberately speed past a Cop and then use NLP to leave the traffic stop without the Officer even remembering why he had stopped him in the first place.
That kind of mis and disinformation borders on mind control, and in fact relies on mind control technology, psychological methodologies, and MC research by the likes of the Central Intelligence Agency. When the great bulk of media is controlled by fewer and fewer mega corps, and their corporate leaders tend to be like-minded politically, you get the double whammy of biased news and fake news (propaganda). That’s bad enough, but this article is about another dirty little trick… a bag of them, actually, used by all forms of Media when presenting ‘news’ online.
And, of course, we still apparently still have to contend with CIA’s Operation Mockingbird, the installation of CIA operatives within the media industry to help shape news to their preferred version. That, too, is something I’ve written about, at least in terms of its origins and history, and I’ve even been referenced as a resource in a more ‘official’ industry review of that topic by The Reporter’s Committee for Freedom of the Press. But now, we see, actual ‘retired’ ‘once-a company man, always a company man’ CIA officials are becoming investors in and on-camera commentators in mainstream news. This Clyde Lewis Ground Zero episode reveals how serious a threat the placement of intelligence community actors in media actually is.
What News is supposed to look like
All news is supposed to contain the 5 Ws… Who, What, When, Where, and hoW. Ideally, we also need to know the S and M… the news Source and the Meaningfulness, often defined by Motive… the Why. That is supposed to be factual Motive, and not speculation, unless clearly presented as speculative commentary. Lately, that’s the greatest sin Media is guilty of; too much ‘news,’ today, is actually mere commentary… the propaganda version.
Generally, for some strange reason, it is also rare to get all those points, especially online. The most critical things useful for research tend to be left out, making it hard for pundits and anyone trying to chase down answers to hard questions because a given story fails to ‘compute.’ That is critical, if one is to find out more, and judge for one’s self what is true, and what is fake. This is particularly distressing when the potential for a conspiracy or cover up is apparent. While Sheeple don’t even see the glaring holes in the official story, people who think for themselves really want to know why those holes exist.
But we ‘conspiracy theorists’ and politically aware non sheeple are thwarted at almost every turn. Take for instance, the WHEN. It is extremely rare in online news reports to find out exactly when an event took place… esp. useful to insure the same news event you find is the one you wanted, because often, you might have two identical sounding stories in the same city, in different time frames. Most searches are best made by searching on the (event key details) plus the year, and perhaps, month.
But many reports do not cite the year, at all. The Web is smart, though, and it knows when a given URL was created. Unfortunately, many of the larger online news sources use a kind of ‘feeder board’ URL created way back when, which is updated with current news, only, older news dropping off. While the Web remembers what the page looks like when the story you are looking for took place… that story is no longer there when you go to find it. While you can search the archives if they bother to offer one, and PERHAPS find it, that is just one hurdle in the search.
Once you do have what seems to be a correct story’s article, it is amazing how many news reports fail to include the date in the byline at the top of the page. So you have no way to know when the person writing sat down to write the story. But even with a byline date, you still have a problem: is that date the date the news took place, the date they wrote the story, or the date it was posted? It can be any of the three.
Some stories are updates to older stories, so the byline is meaningless unless the story itself indicates the actual When it took place in the text. THEY SELDOM DO. Instead, they just say something like ‘Last Tuesday.’ Great. What day of the week is the date of the byline? Now I have to go search that out, to make certain of the When. Your average Sheeple is not going to bother.
This problem also exists elsewhere in the remaining Ws and the S and M. At least one such detail is usually omitted, and all-too often, several. Sometimes, it is something simply not yet learned by reporters, but too often, it is clearly just not deemed important. All too many bylines even fail to tell you who wrote the story… so you can’t email them and ask for missing information. EVERY print article in a newspaper tells you this information, but for some reason, the online version seldom does.
Message distortion when relayed through many people
Dumbing down online is easy. It relies on the known scientific problem which transpires when a series of people relay a message from one to another to another, etc. It used to be in schools, that one of the first things they taught was this concept… that you you have to take care when relaying information. You have to listen carefully, and then just as carefully repeat it. The problem is, each person decides what is important enough to be carefully repeated, and tends to reword it for ‘simplification.’ So the message first stated has little resemblance to the message last heard. THAT is not being careful, it’s being careless.
Online, information deemed worth sharing is constantly relayed in social media in a quite similar, but an even more careless manner. Each person in the chain tends to introduce it with their own spin or commentary, advising what they think the takeaway is, or should be. They then (hopefully) provide the URL to the original (the careful part). They might also create or add an image or meme which underscores their takeaway thought. That is all in good, but…
Sheeple don’t bother to click on the URL and read the original story, and they simply ‘learn’ the takeaway point of the previous poster. This is why Memes can often be dangerous. Especially when the creator is being deceitful or dishonest to the truth. They know that a false message repeated some 20 times will take root in the average Sheeple’s mind, and become adopted. That is especially important in political messages, because today’s social media is decidedly biased, and decidedly deceitful, even to the point of using paid trolls and automated bots to insure you are inundated with the preferred take aways.
This is why people who think for themselves always click the link or do a little extra search before they hit the SHARE button, and add their own takeaway. Is that you? Are you like me, spending roughly 50% of your time inspecting and then correcting other people’s wrong take aways and falsehoods? Or, are you part of the problem, simply passing it along? Baa… baa…
But there is a bigger problem, one which at least seems conspiratorial, and relies on the above Sheeple foibles and the omission of Ws, etc. For some reason, mainstream news sources seem to be deliberately making it difficult for you to access news, and difficult to relay, on your own; they would prefer to leave that to the professional trolls and bots you think are your online friends.
Something is very wrong with this picture. Lets take print media and look at how they operate outside the Web, and compare that to how they are now starting to operate on the Web.
A newspaper runs advertising to pay for their staff and overhead; it keeps the doors open, and allows them to grow and invest in special investigative projects. They charge for subscriptions and for individual copies at news stands based on the cost of the printing and distribution process, and materials; the ink and paper. That’s why newspapers are relatively inexpensive to buy. It used to be that the online version, therefore, just had advertising… there is essentially no comparative cost to put it out there and for you to access it.
But now, online, many newspapers, even small local ones, are telling you that you will need to subscribe or become a registered user to their online version, or pay a small fee to read the article… or that you may read this one, but it may be the last one you can read for free (relies on your cookies, but if you turn them off, you they will tell you to turn them on to see the material). Of course, once you do any of that, you’ve just sold yourself into another dozen marketing lists, without warning or compensation. But that’s not all.
Suddenly, many media outlets online (radio, networks, print) are using something called Cloudflare. That product is a kind of ‘protection’ against certain abuses… a bit like an anti hacking or virus bot. But it does something else, as well. It also prevents anyone from copying and pasting a URL into a social media post. WHY? In the past, getting your URL spread about was a good thing; it brought them more viewers, which increased the value of the advertising opportunity for their Web pages. When did they decide they didn’t want more readers, and why?
Where the Conspiracy comes in
Sure. You can call this answer a theory; a conspiracy theory. That is what it is, plain enough. The only way the above sins can be excused as desirable is if somewhere, someone important and powerful within media and in political realms, decided that it was advantageous to dumb you down, and limit your ability to rely on URLs to relay facts and correct people when in error. It is an insurance policy to protect the ‘integrity’ of the versions being spread by the trolls and bots.
I mean, when your read some crap someone has posted which is to your understanding just that, a lie or false belief, you should be able to go find a news article or other authoritative source online, copy the URL, and paste it into your reply to prove your case. When you are trying to educate someone on how you feel about something, you should be able to do much the same, to prepare your post or meme… have a supporting factual link to go with it.
Someone does not want you doing that. They want you to hear something said 20 times and accept it as truth, with no way to verify it, or refute it, if false. There is only one person in the media industry who fits the bill. If you are a Sheeple, you will recognize his name but not realize just how powerful in media he is, or in political realms, and how deceitful he is. I am speaking of George Soros.
It is that simple. When most of us rely on TV news, we only get one slant (liberal, usually, conservative if you go out of your way). Because of TV’s own special dumbing down tricks as earlier referenced, you will walk away with a very encapsulated message with is has no actual understanding associated with it. Then, when someone puts their slant on it and you get hit with that 20 times, it becomes your slant, and people like me and others who prefer to think for ourselves, are increasingly finding it difficult to correct any errors.
Worse, if you do think for yourself, you may not be able to learn what you need to make an informed decision, up front. Heaven help you if you are trying to investigate what seems like a conspiracy theory, because of glaring holes in the official story. Obscuring the true story seems to be the way of things, today, so just ‘move along, folks.. nothing to see, here.’
When you add all this to what is taking place in the public school system and in higher education (liberal indoctrination), your children will think this is the way it is supposed to be, and whomever is in power when they are adults will be able to do and get away with whatever they want. They will dictate to them what to believe, and it will be believed. The notion of thinking for themselves, and of distrusting and challenging government will be foreign concepts. They might as well be called the 20x Generation.
The ’Snowflakes’ on the left are already a part of that group, unwilling to listen to facts or reason, and repeating what they are told to believe. I, for one, am not willing to pass the reigns of our nation’s future over to them, in their current state of mind. I’d rather have an armed revolution, if that is what it takes, to end their madness for them. Constant outrage based on lies serves no one’s best interest, except at the top of the food chain.
So my last question for you is this: do you want to be a Sheeple morsel for Wolves like Soros and his elite political friends, people more interested in Globalism than what is right and moral? Or do you want to be a think-for-yourself consumer of actual news you can easily access, rely upon, and use when talking to others about things which matter to you?
If the later, you had better start complaining to media, and to politicians about it. You might even want to consider taking legal action or starting an initiative ballot, if your State has that option, to write laws forcing journalists to adhere to journalistic standards and to make their stories available more appropriately. You certainly ought not simply be sharing what is being fed you currently without verifying for yourself it is the truth.
Else we all become 20xers… or we have that revolution, the least desirable of options.
Thanks to the Post Office, now anyone can know what’s in your mailbox, automatically… including of course, anyone in an alphabet agency. It is just another way to track you and criminalize you if deemed convenient, in time.
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
The idea is you register online with USPS for the FREE notification subscription service, and they then photograph the mail to be delivered to you each day, and email the images to you before delivery; that way, you know if something is stolen or lost and NOT in the delivery, and can plan on getting expected items. It is tied to other services, as well, such as package notifications, tracking services, stamp purchases, etc.
1) This is the federal government we are talking about. The FBI, CIA, and a host of other alphabeticals would have no trouble whatsoever accessing this information. There is no indication that such information is not retained indefinitely, and no privacy statement which alleviates concerns over it being used against you down the road should you become a person of interest, or a trouble maker such as a whistleblower, activist, or other targeted individual.
2) The system is achieved with online registry, and is handled by email, currently with no truly secure process for verification of the applicant or notification of the addressee that a subscription has taken place. Stalkers, private investigators, suspicious spouses or ex spouses or lovers with an axe to grind, or anyone else with minimalist information about you and where you live could sign up pretending to be you… again to include someone working for a government agency who could not be bothered with a warrant — knowing that they could later get a warrant and legally go back in time to ‘duplicate’ the effort in a manner which leaves no proof they violated your rights, earlier.
3) this means that mail must be separately sorted one more time by someone into individual stacks to ‘pose’ for the photograph, and then to take the image and email it… or the entire automated system must significantly modified at both the hardware and software level. Both are at great expense and will cost USPS more red ink… and eventually that cost will increase the price of postage for everyone, not just those using the service.
4) If the system is automated (and even a manual system will be, eventually), then it means EVERYONE’S MAIL is being imaged, all the time: The USPS becomes yet one more information tracking and tracing point available to the government, and under the program, anyone spoofing it.
I’m not the only one pointing these things out… though I’m the only one so far who has pointed out 3 & 4. Other privacy experts have echoed 1 & 2, variously, mostly item 2. Too many people PRESUME that government would NEVER use such a service to spy on them this way. That’s what they said about NSA and FBI when they first started.
It appears the only way to prevent anyone to spoof the system to spy on your mail is to beat them to the punch and register, yourself. However, there is no assurance in place that someone could not still additionally register an alternate email identity. We can only hope and presume there is an online software check which would reject any such attempt.
Short of not taking mail, at all, there is no defense against government use of the images, if you are a person of interest targeted in someway by an agency.
12 Step Origins
Templars Masons Theosophy Rothchilds
The 1 step solution is also useful in targeting issues
- The sermon uses the topic of powers and principalities of ancient times to frame the lesson… and both addiction/abuse and targeting are born of powers and principalities, as is all sin…
- An addict/abuser ‘worships’ their particular sin of consequence…
- A TI ‘worships’ (by constant worried attention) their targeting issues of consequence (equating to sin)…
- Bending the knee to Assyria in the sermon equates to giving in to sin…
- So (the Pharaoh of Egypt) equates to you (your flesh, the Old Man) and your inadequate will power to resist sin…
- Which in turn equates to buying into the enemy’s (sin) Press Releases (that they cannot be resisted) wholeheartedly, accepting the belief the enemy cannot be overcome, by or of ourselves…
- If you listen carefully, you will hear echoes of 12-step program dialogs! They simply borrow the truth and apply it in their own way… and with respect to targeting, twist it to meet their own ends.
- TI Defense: 30 Tips to Help Fight Back
- Why am I Being Targeted? A Valuable Question for TIs
- FREE WILL: A TIs Greatest Asset, Oft Hardest to Employ
- How a TI’s Belief Structure Can Fail Them Dangerously
- Smart Meters, Stray Voltage, and Targeted Individuals
- Smart Phone EMF App No Value to TIs
- A TI with RF Measuring Device can = Dangerous Conclusions
- 7 Tips: How to outreach, preach, or beseech if a Targeted Individual
- Free Will Haven; Targeting Free Intentional Community for Stalking Victims
- Why Targeted Individuals should not hook up with other TIs
- Testimony to Mass. State Legislature on Bill Restricting Electronic Weapons
- A Glimpse of MC Realities (from the Preface)
The Antichrist is coming, and there needs to be a throne ready for him to occupy. Thus the New World Order is stepping up its one-world government effort and increasing their visibility in the process… and translucence… which equates to luciferian Illuminati-like illumination… often in the form of giant glass pyramids.
What you will learn from this post:
- the Illuminati, Freemasons, Knights Templar, & Round Table Groups are the NWO;
- with the same fascination with ancient mysticism, occult, and numerology;
- and the same desire to associate their works with symbolism such as the pyramid;
- that they have been building pyramids seeking to employ mystical aspects similar to Cheops, the grandest of Egyptian pyramids;
- said pyramids sharing commonalities in occult alignments and numerological peculiarities;
- where one complex of pyramids is tied to a rather interesting conspiracy Egyptian in nature;
- and another complex of pyramids appears to involve hi-tech mind control;
- and is itself apparently aligned with all pyramids in Europe, and likely, elsewhere!
The Source of Illumination is darkness…
In several of my books touching upon aspects of the New World Order, I carefully point out the important role played by Freemasons and their involvement with the dark occult and, primarily, ancient Egyptian mysticism and numerology (specifically, where numbers can translate into meanings with magical powers of manifestation). I am not talking about the rank and file lodge members duped into thinking it merely a benevolent fraternal organization, but of the satanic High Masons and select Masonic operational organs which operate secretly, within. The satanic Illuminati, for instance, sprang out of and followed Masonic constructs and principles… and it was they who officially launched the New World Order movement in 1776, their goal to destroy all governments and religions, to replace with their own, providing a seat for the Antichrist. We can also thank them, and head Mason and avowed satanist, Albert Pike, for the KKK, and more.
It seems quite apparent to those who study the nature of Globalists who seek the N.W.O., that they are usually High Masons, satanists or otherwise steeped in the occult. They are often members of or work through the so-called Round Table Groups, such as the Council on Foreign Relations, the Trilateral Commission, the Bilderbergers, the Club of Rome… groups made up of power moguls who control corporations and whole industries, government agencies and military power, and media and education. These, collectively, can be called Globalists, because they seek a one-world government, which is needed in order to seat the Antichrist.
In their works, they frequently employ the same symbolism and engage in occult events right along side of others of their ilk (i.e., Bohemian Grove). While what they believe (occult) should seem silly to a rational person, I remind the reader that it does not matter what you believe to be true, or false… it only matters what they believe. If you fail to acknowledge their beliefs as part and parcel of their modus operandi, you will fail to recognize them and their works, and be unprepared for their plans as they unfold. And much has unfolded, in plain sight.
Here, I will focus on one small aspect of their existence which is quite central to their beliefs; one of their most sacred of visual icons, the Egyptian Pyramids. Pyramids, especially the largest, Cheops, are as important to the Masonic underpinnings of the NWO as is the Cross to Christians. More so, in fact, as it is far more than mere symbol, to them; it is a powerful tool, and their fascination with ancient Egyptian mythology is quite anchored in Cheops. One need only look at the pyramid found on the obverse of the Dollar Bill and its all-seeing eye, to find a stark example. Of late, for a variety of disparate but coincidental reasons, I have made more recent observations which relate to this notion… things which you can easily verify yourself by use of Google Earth.
Square one, the base lines of Cheops
Cheops is the largest of the Egyptian pyramids, having many astrological alignments and dimensional (numerological) mysteries, among them being it was said to have been located at the the center of all land mass; it’s axis therefore dividing the known Earth at the time into quarters; Cheops baselines were aligned due North/South/East/West. As the N.W.O. players gain in power and ability to establish a one-world government (needed if there is to be a single leader in the person of the Antichrist), they also become more blatantly visible as such a force, which means it more frequently relies upon ancient symbolism in its workings.
So, then, I wondered… might there be more than a few NWO pyramids being ‘hidden in plain sight’?
There are, of course, many pyramids around the World, especially the ancient stone variety. These come in two flavors; the Egyptian, the biggies with their seemingly smooth triangular shapes (as seen at a bit of distance), and the Mayan/Aztec stepped structures, a style not unknown in Egypt, and elsewhere for the matter. The Masons have only an interest in the former, it seems, but my curiosity was about much newer structures, those built with modern methods and materials. Would the many newer pyramids around the World exhibit traits similar to Cheops, such as alignments or dimensions of occult significance?
Absolutely. And why not? A glass pyramid is the perfect embodiment of both the ancient pyramid mythos and of Satan; sunlight reflecting from within and without by day, and electric light glowing from within by night — all work to render them both translucent and illuminated, with bright glaring highlights akin to the all-seeing eye, depending on one’s viewpoint and the angle of lighting/reflection. As a work of man, they are both awe inspiring and mysterious, working on the subconscious in unfathomable primal ways not sensed by the conscious mind without pause and consideration. Even so, one is apt to embrace and bask in their presence despite any darker connotations, for they are undeniably beautiful works of architectural ‘art.’
So let us pause and consider with conscious effort…
Square 2: a review of new pyramids around the World
There have been more than 50 new/modern pyramids quietly built around the World in the last several decades, most of them made of glass and metal, and strangely, more than half of them in North America. A couple are faux pyramids with incomplete architecture in and of their own, but one included a second pyramid on site, and the other had a completed pyramid at top, and so, were included in the study. The idea was to see if their base lines or diagonals aligned with other pyramids (ancient or modern), or if any three or more centers or corners might align. Examinations for numerological meanings were also to be considered, early on, but the growing number of pyramids made that effort too monumental. Still, some interesting discoveries along that line were made.
I found so many alignments (almost 150) and associated numerical translations in place that I felt it was appropriate to establish some sort of test group to illustrate the difference between conspiratorial intention and random coincidence. For example, at one point well into the project, EVERY new pyramid except one revealed between two and nine alignments with one-another, and/or with Cheops, itself. One had 18 alignments. So a simple control group was added: some 30 Mayan/Aztec variety, plus nearly 6 inverted modern pyramid structures were added to the study. If these, too, yielded such results, the study could easily be argued as being inconclusive.
But they did not.
Only one formed a single alignment with any other pyramid, new or ancient, and it featured no resulting numerological significance. Clearly, the massive alignments in the new pyramids were intended by the powers that be, those persons behind purchase of the location and setting design criteria as to angular placement, size, and location on the property… especially true when multiple pyramids at the same location (as is the case in ancient Egypt) were undertaken. Therefore, the test groups were excluded in findings, which proved validity of both the methodology and hypothesis. Since only the new pyramids (not inverted) formed alignments, it had to be by intention.
While about a third of the new sites are single pyramid locations, there are several with two or three (like the main pyramids at Cheops), 3 with five pyramids, and one with 8, across nearly 50 locations. I then wondered if perhaps other old, but not ancient pyramids or locations deemed ‘holy’ by the Illumnati might not also offer alignments. Adding a handful of small pyramid burial sites by Masonic persons of wealth and power, as well as the death site of Adam Weishaupt, founder of the Illuminati, and the ‘headquarters’ from which he operated his secret cabal proved that notion, as well. I was unable to discern his precise birth place beyond the name of the city (Gotha, which is ironic in its own right, because Weishaupt and the Illuminati were very goth).
At the point where I felt the matter was amply proven, I had by then added eight older sites, typically 100-200 years old, though one dates to 12 BC, in Rome. It is the Pyramid of Cestius, circa 12 BC, at a time when Rome was, like the Templars, enthralled with the mysticism of Egypt. It is a site well known to Templars and Masons. The others are all in Europe, save one in America, and two of them relate directly to the Illuminati; Adam Weishaupt’s grave, the ‘headquarters’ where he planned and executed Illuminati plans, and perhaps the definitive Knights Templar location — Templehof (Templar Temple House), all in Germany. As these last three are not known to have involved pyramids on site, they are only used in scoring other pyramids which align with them, and not evaluated on their own, even though they would score fairly high.
So the alignments created in total involved alignments between ancient, historically old, and modern pyramids. The symbolism and mysticism of such structures by their special alignments, regardless of if rendered in aged stone or in modern metal and glass — are clearly as important to their builders as the function and beauty of their designs. All were starkly beautiful, and quite functional, to be sure; a perfect way to subtly reinforce the notion of luciferian and Masonic imagery upon the subconscious minds of citizens otherwise mesmerized at what they were seeing… especially when illuminated to great advantage by sunlight or voltage.
The problem of useful presentation
But describing all these alignments textually makes for boring reading. I will give just two instances as example, next, as they are quite tied together. It will be the only review of numerological ties, though more like it, exist, and with notable frequency. Trying to present the topic graphically is also challenging for other reasons, but I will attempt that, as well, in a third review. I will then provide a very simplified summary of selected findings to illustrate the scale and nature of alignments found, with a scoring system to relate symbolic spookiness.
But first, a disclaimer is required, because I always challenge any Doubting Thomas’s to duplicate my research before they make any false presumptions as to validity of my findings, and because the research tool involved (Google Earth) has its own technical limitations with which carelessness can impact upon accuracy.
Disclaimer: regarding some figures and claims herein about alignments and measures, accuracy is sometimes more difficult to affirm via Google Earth. Google Earth allows an accuracy to within a meter or so at ground-level, but things can get more complex when one starts trying to plot and measure lines with accuracy to the far side of the globe, and/or where the locations may be nearer to the Poles than Equator, or on/near altitude changes. Satellite images used in Google Earth are sometimes taken at oblique angles on either or both the horizontal and vertical, such that visual distortions of a pyramid can make true angular alignment (in compass degrees) or even measuring its base length, difficult to accurately determine. When dealing with such angular imagery, the center of the pyramid will be other than visually depicted, requiring one to make cross lines corner-to-corner to find the true center. The quality of image can also vary, but generally, line placement accuracy can be determined within 1-3 feet (roughly the line’s width). The images for two sites were so bad that it was impossible to determine if base line/diagonal alignments existed, but at least their location was known with GPS accuracy for the purpose of central alignments.
Additionally, one must take care insure the Pyramid(s) in question are centered in the view, and to reset the ’tilt’ (View > Reset > Tilt) after zooming in, or additional angular errors can be introduced, as the lines one lays for determinations themselves ‘float’ above the ground. In fact, where the pyramid is quite large, one may find the line ‘crawls up the face,’ providing additional distortion which must be defeated. The degree of inaccuracy in any given instance should not unnecessarily render the information herein as invalid; the thrust and intent behind the location and positioning of glass pyramids is clearly not casually undertaken. Also FYI, distances between pyramids herein are rounded figures, if there is no mystical number involved.
Verbal presentation example
Paris features two glass pyramids at the Louvre Museum, one large, one small and inverted, which form alignments to four other sites (the only inverted structure to do so, likely because it additionally features a normal pyramid, as well). There are three much smaller ones, as well, serving as skylights, which I chose to ignore, early on, and then forgot about, later; they would likely have established other alignments, as similar skylights on streets elsewhere, had done.
Two of the alignments at the Louvre are baselines from the larger pyramid to the same pyramid site in Texas, where they also align with the baseline of one, and the diagonal of another of three found there, essentially parallel. Three more alignments exist to three other sites involving three corner/center combinations, one of which is Cheops some 3232 km distant. Masonry’s highest publicly acknowledged ranks are the 32nd and 33rd degrees. The number 3232 is a ‘magic number’ in Satanic numerology, because it is a doublet, which doubles its ‘power’ (amplifies its importance), and because it sums to 55 (another doublet), one divisible by 11 (a doublet which makes 33 three times as powerful), and further sums to make 10. Again, it matters not what you believe about numerology, but what they believe…
And, this is what they believe about these numbers:
In the occult, 5 is the number of the planet. According to one-time head of early freemasonry, and avowed satanist, Alistair Crowley, 11 is “the number of Magick, itself,” and of sin, or evil corruption. 10, on the other hand, is the number of ‘heaven and earth in interaction’ (‘good vs. evil‘), and the symbol of it in the Greek (‘deca’) is the triangle, of which a pyramid employs 4, which means ‘strength and integrity,’ which is certainly a trait of the Pyramid. For the matter, the number 32 relates to ‘inspiring of truth and living by it,’ which is to say… the very promise and implied hope of illumination. Unfortunately, illumination means something rather different to those with a darker agenda, something closer to that which the serpent spoke of in the Garden of Eden. These are not the only meanings found in general numerology, but the ones preferred by dark occultists.
Extending the base lines of each of the Louvre pyramids westward 3500 m will take you, again in parallel manner, to the center unit of one, and a corner of the other of two glass pyramids built in Westborough, MA, by globalist pharma firm, Astra Zeneca (astra in the occult relates to supernatural weapons). Another line can be drawn from the lower corner of the larger pyramid at Louvre, through the center of the smaller one, there, to pass through the diagonal of the center pyramid of three atop a very Masonic looking Federal Government office building in Ottawa, Canada.
The smaller pyramid in Paris is 2 m shy of being 1/10th the base line dimension of Cheops, while the larger one is two meters more than 1/6th of Cheops. The larger Astra is 1/6th greater than the larger of Paris, and the smaller 1/2 the size of the smaller in Paris. The Ottawa pyramids are 1/4th the size of the largest at the Louvre, and 1/25th of Cheops, and 2 m shy of being 1/2 the smaller Astra. I would love to analyze the actual dimensions of all these, if they were readily available.
In Chile, the resort complex at San Alfonso Del Mar features a giant glass pyramid on the beach with four alignments. It is aligned such that its base line will bisect with the center of one of the lesser stepped Egyptian pyramids. Two more alignments are to diagonals of a pyramid in London, and one in China, 20 km from Hong Kong. A third aligns with the corners of two pyramids in Islamic Astana, Kazakhstan which, though richly expressing Islam in the property’s design, is also rich with Egyptian symbology.
The Chilean Pyramid base is also one/sixth the size of Cheop’s (38.3333 m, a number which is found many times in the fuller study in either location, size, or compass readings of various pyramids). It is located on the 38th Southern Parallel and the 32.32 Meridian. 38 sums to 11 (Magick) but itself can mean ‘Lucifer, the will of the Devil.’ 1/6th = 18%, where 18 = 9+9 (99 doublet) and 3 x 6 (666 triplet — even more powerful than a doublet, and Satan’s name). 18 itself means ‘Oppression, bondage, slavery,’ and = 3 (a ‘perfect number’ meaning fullness) x 6 (the soul of man) = 666 (legend/man/illumination).
A graphical review
Enough textual description; it is too boring and difficult to make sense of. Let’s try graphical, looking at hotel resort complex at Galveston, Texas, which also consisted of three Pyramids. This is one of several with 8 or more alignments, and perhaps the most interesting in terms of just what they align with, and how.
It may help to review what qualifies as ‘aligning,’ so you know what you understand why the lines look the way they do. The alignment must involve at least three points of contact between two distant pyramids, based on corners and centers. A baseline is two points, a diagonal or perpendicular from a baseline through the center being three points, but the distant pyramid must still have at least one such point of alignment, as well. If only one, it must be its center, but aligning with two corners on two different pyramids, there, is another way to align.
There are examples in my study were a baseline, perpendicular, or diagonal aligns with yet another baseline, perpendicular, or diagonal (four to six critical points total); a much harder thing to achieve. In like manner, some can be extended to align with yet other points of other pyramids at a third location; an even more dramatic alignment. I have found as many as five pyramids in three locations involved in a single alignment across the globe… with 14 points of alignment in all. These harder kinds of alignments should be next to impossible by random occurrence. Yet every single pyramid exhibits them.
And we have two such virtual impossibilities illustrated in our visual review at Moody Gardens, in Galveston, TX. Two of them actually involve Cheops, as earlier reference in the textual description, the ultimate of all possible alignments from the Masonic viewpoint. In fact, I find it the second-most interesting of all modern sites, in terms of alignments (the first, at Sauerland, Germany, is impossible to show in this manner as it enjoys 23 alignments. UPDATE: 43 in a row, and I finally stopped bothering!
Clockwise from Noon in the image, we see an align to the Nekoma Air Force Station, an experimental anti-missile defense system long abandoned. What is interesting is that one of it’s seven alignments goes to the only pyramid in South Korea — quite dependent upon U.S. anti-missile technology. That’s interesting, because there is another pyramid in N. Korea, and one of its several aligns goes to the Las Vegas Casino pyramid, which in turn aligns back to the Nekoma site. It is as if both N. and S. Korea are ‘borrowing’ from American military power, after a fashion, to create or reflect a ‘stalemate.’
Next we have two aligns effectively ‘parallel’ to the ‘holiest’ of Masonic pyramids in Egypt, involving a total of nine critical points with three pyramids. There is then an align to the Rock and Roll Hall of fame in Cleveland, OH, where it passes through the center of both pyramids, there (one small, complete pyramid, and one very large incomplete, or faux pyramid. There, the base of the larger less the base of the smaller, is equal to 1/3rd the base of Cheops.
We find an align to a now defunct pyramid on Miamii’s beach. Fairly ordinary as alignments go, it was built as a promotional venue for the international beer company, Heineken. Despite being temporary, it was placed to form at least three alignments on its own. Then, in like manner to the two aligns to Cheops, we have two more going to the two pictured Biosphere pyramids, which, like the two Rock and Roll pyramids bisected with the same line from Moody Gardens, have both of their pyramids bisected with an align from Nekoma (coming full circle, if you will, to form a triangle). In fact, Nekoma is itself involved in a total of 6 such three-way triangles. One of those involves the Miramar retail store, our final align from Moody Gardens, for two such triangles sharing Moody and Nekoma locations. Miramar is the other incomplete faux pyramid, in that only two opposing sides are triangular walls. Miramar, in turn, with two pyramids, forms 6 aligns, including one to the very Masonic Capital grounds of Australia, at Canberra.
So far, we’ve only closely looked at two out of about 50 locations. You can see how hard it is to use either text and/or graphics to reveal it usefully. So let’s now try a different way, and employ a chart with a scoring system designed to rate the comparative ‘spookiness’ factor of a given ancient or historically old site’s alignments with new pyramids or other holy illuminati locations, including each other. To further reduce the clutter, it will then only look at sites which directly connect to them, in even briefer review, sans scoring. The scoring system replaces trying to compute and display the actual odds of the alignment, which would be as high as 10 figures:1, in many cases.
For example, the odds of just a single alignment of the simplest kind, center to baseline, diagonal, or perpendicular or to two corners of two pyramids at destination (earning the lowest possible score of 1 in my scoring scheme) would have actual odds of 202,500:1 against. That is based on the notion of worst case accuracy of 1/10th of a degree of arc… meaning that each pyramid would have 10 x 360 degrees of potentially useful compass positioning, divided by 8, as there are 4 lines the pyramid which establish a total of 8 possible compass vectors. You need to multiply each pyramid by each of the others involved if aligning to another baseline, diagonal, or perpendicular. A baseline to baseline alignment odds would be 164,025,000,000:1 by such reasoning. Such odds are multiplied further by additional alignments at the site. Argh!
Technically, that’s too simple, because angular placement is not the only factor. Size and relative positioning plays a role, too, when two corners/centers of two different pyramids at the same site are involved, but I’m not going there without a super computer!
Now, if you want to argue that the actual accuracy we should using is tighter than that, implying room for error in ‘finding aligns,’ consider for a moment that only one alignment with the Mayan/Aztec pyramids was possible using the same accuracy as I employed. That makes a pretty good case that the alignments were intended regardless of whatever actual accuracy was employed. Even if you allowed for my own human error, there are so many alignments that they could not all have been for my error, given the Mayan/Aztec set enjoyed no similar quantity of errors. But by all means, feel free to correct my math/assumptions if you are of bookmaker caliber in computing odds, but I’m pretty sure I’ve got it right, based on some experience in statistical data analysis; I once ran my own marketing research firm which ran probability studies. No matter: we will use scoring, instead…
Scoring is as follows:
- center point to corners of two pyramids or a base/diagonal/perpendicular of 1 pyramid (simple alignment) = 1 point for the alignment;
- base/diagonal/perpendicular to same (complex alignment) = 5 points for the alignment;
- Bonus 5 points for any parallel alignments or alignments to multiple pyramids of one site to multiple pyramids of another site (parallel/pair alignment);
- any extended link to an additional pyramid (extended alignment) = alignment score x 5;
- link to Cheops (Cheops alignment) = x 5;
- link to other Egyptian pyramids or Illuminati sites (Illuminati alignment) = x 3;
- link to other historically old sites (Masonic alignment) = x 2;
- 1 point for each alignment and for each pyramid at site;
- magic numbers, angles, dimensions, etc., not part of scoring;
- Cheops gets a bonus of 33 points, Illuminati sites 11 points, Masonic 7 points
- maximum score limited to 99
Egyptian Pyramids 13 aligns w 6 pyramids on site (Δ) = 99 points: 29°58’44.54″ 31°8’3.65″
Complex Parallel to Sauerland (5+5 points), 3 Simple Parallel to Dubai (6×3), 3 to Sauerland (6×3), 2 Simple Parallels to Galveston (6×2), Complex to Niagara Falls (5), Simple to Louvre (1), to Eatonton GA (1), to San Alfonso del Mar Chile (1) 85 total +33 > 99.
Cestius pyramid in Rome 5 aligns w 1 Δ = 99 points: 41°52’34.97″ 12°28’51.16″
Complex Extended (three times — 4 Δ at 3 sites, in all!) to Manitoba Capitol and on to Miramar Retail (5x5x5x5), Simple Masonic to Karlsruhe Mausoleum (1×2), Simple to Pheonix Jeju S. Korea (1×2 – Phoenix is Masonic/Egyptian), to Sauerland (1), to Portsmouth UK (1) > 99 points
Star pyramid mausoleum Scotland 3 aligns w 1 Δ = 34 points: 56° 7’19.42″ 3°56’43.72″
Simple Illuminati Extended to Weishaupt’s grave, to Gold House IL in opposite direction (1x5x5), Simple to Cooperative Bank UK (1) 27 points + 7 Masonic site = 34
Karlsruhe pyramid mausoleum 7 aligns w 1 Δ = 27 points: 49° 0’33.22″ 8°24’14.05″
Simple Illuminati to Illuminati HQ (1×5), Simple Masonic to Cestius (1×2), to Kazakh RU (1×2 — rich with masonic/egyptian architecture), Simple to Dubai (1), to Edmonton Capitol (1), to Cal State U. (1) 20 points + 7 Masonic site = 27
Bickling mausoleum UK 2 alignments w 1 Δ = 13 points: 52°49’9.01″ 1°12’48.36″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13
Schoenhofen Mausoleum Graceland Chicago 2 alignments w 1 Δ = 13 points: 41°57’33.56″ 87°39’34.09″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13
What follows is a simpler summary of the first few of the destination sites mentioned sites as evaluated from their position…
Sauerland 23 aligns, 8 Δ, Dubai 13 aligns, 5 Δ; Moody at Galveston, 8 aligns, 3 Δ; Niagra Falls 2 aligns, 1 Δ; Louvre 7 aligns, 2 Δ; Etonton GA 2 aligns, 1 Δ; San Alfonzo del Mar 4 aligns, 1 Δ; Manitoba Capitol 9 aligns, 9 Δ treated as a single Δ as they all directly touched one another 3×3, and were each relatively small; Miramar Retail 7 aligns, 2 Δ; Pheonix Jeju S. Korea 6 aligns, 1 Δ (note: N. Korea has a Δ, too).
These are all quite typical of all sites evaluated, globally. The only site which scored 1 (1 align) was a site which has had its 2 pyramids removed/destroyed, disallowing angular alignment determinations, though the center of one of the pyramids was known, allowing an align by that method.
CONSPIRACY ALERT: That site, by the way, is tied to a little known conspiracy surrounding the Nuwabian Nation, an all-egyptian-like community of almost exclusively black people which was seized and razed to the ground by the U.S. and Georgia State and County governments. They were allegedly targeted for being a cult, subversive group, criminal organization, nest of child abusers, or a swindle… depending on who you ask. Seems like everyone had a pet excuse, including YouTube who seems to regularly censor vids on topic for their usual list of fabrications. Note the resemblance in some of the ceremonial dress to masonic lodges such as the Shriners (Nuwabians, like the lodge system, also use the terms, Orders, and Lodges). All Egyptian is wrong, too; they also were adoptively and by blood associated with Native Americans of the Yamassee Federation of Tribes, among them the Seminole.
Note on mausoleums: What we see in our review is that the three mausoleums share unique ‘coincidences’ in that each aligns with an Illuminati historic site honoring Weishaupt, and each in turn is honored for having done so by Sauerland aligning with them. There are many such pyramid mausoleums in Europe, America, and a few scattered elsewhere, far too many, in fact, to encourage me to dig further. Regardless, as the very first and only three reviewed all shared these two features, I’ve no doubt that others do, as well. A single Mason could easily undertake a single such alignment to a point of their own choosing, and more modern pyramid builders could easily accommodate at least one or more such mausoleums in their own alignment considerations. This brings us too…
Sauerland, enigma equal to Cheops
Sauerland is one of the newest of all sites, a complex of 8 pyramids which appears it may even involve mind control research. It certainly defies normal property development, architectural design, and building contractor norms in several ways. First, its location is on a hill overlooking an industrial park, and despite looking like a luxury retreat, is in fact the corporate campus of biomed tech company, Rayonex Schwingungstechnik (Rayonex Vibration Technology). It started with three pyramids, and has since grown to eight.
Second, the site has an adjacent and extremely unique high observation tower (about 110′ high) which overlooks the pyramids and the valley, just high enough that morning sun could shine through the large holes in the upper level and onto the pyramids, creating unique shadows. This was a trick employed in ancient Egypt using Washington Monument style oblelisks, such that at a certain time, a shadow might point to a secret place within the greater site (as seen in Indiana Jones and the Lost Ark. The tower’s corner shadow does fall over the pyramid property. But, let’s just call that a pipe dream.
You do have a pipe of some sort, don’t you… and a whip and hat?
Third, each building is offset irregularly and apart from each the other with no obvious pattern or reason, and likewise, quite contrary to normal designs, angled one from the other up to 3 degrees or so in compass alignment. It is my belief that this is what enables it to accommodate so many alignments, a thing which would require planing with a fairly complex computer program, to determine. Finally, again unlike most complexes, even where ‘luxury’ is intended, no two buildings are built or designed the same; each has an entirely different layout and appearance, though some features at least look similar. Usually, a cookie cutter approach to keep costs down would be employed. Yes, even in corporate campus design.
Then there is the very small pyramid surrounded by a water feature. I found construction photos that show a drill being used on a hole there, approximately 1 meter wide, with smooth walls. It was associated with an article on geothermal drilling which led to a very interesting YouTube promotional video that is really worth the watch; it will intrigue and educate you. After watching, though, ask yourself if the expense this likely represents would normally be deemed appropriate for a small fish pond? The video seems to address that with a blanket statement, but does it, really?
I learned also, that the small pyramid over that hole is the only one on the property using metal walls. The other, larger pyramids use some kind of unusual looking material which requires special application, according to other construction images I found. The panels used on them might logically be radiographic in nature, designed to limit or enhance radio waves of select frequencies, given the nature of the company’s work, as you shall see. In like manner, I can imagine the holes drilled by that machine could be used to install an array of underground EMF sensors or emitters. The video implies the array of radially and laterally drilled holes provides a series of ‘pipes’ which may in fact be perpendicular to one or more of the pyramids. Just why these possibilities are raised, is covered below.
Also unusual, is that one of the original three pyramids (perhaps more, now) is strictly for therapy use, with ten therapy stations. In each pyramid, a security computer controls all lights, window blinds, and door locks, and though there is no manual switch anywhere within for any of these, each workstation is said to have its own localized control over these features. But the security system computer can override, which makes it a rather creepy place with respect to potential for political control and overbearing security solutions against occupants, Big Brother style… especially if you don’t have authorized access to a workstation. Undoubtedly, there are plenty of security cameras, and I find it disconcerting that some pyramids have no windows, whatsoever — normally a code violation, unless a warehouse or factory. One must ask why so much expense and devotion to therapy and externalized security control over environment would be required? Let’s take a peek, and see.
The answer raises more questions. This is a unique kind of high tech firm. Their product/services would seem to involve mind enhancement, mind bending, or even mind control, but certainly relate to biophysics and therapy of some kind. One or more of those possibilities is very likely; the firm does research in electronic frequencies upon the human body (bioresonance), among other things. According to Wikipedia, bioresonance is all based on pseudoscience, which is a polite term for ‘made up BS by con artists’. Dunno about that, because…
This is also the sort of stuff useful in DEW Weapons for behavioral control (Political Control Technology). Of course, such tech is always researched and funded based on some good it might accomplish, including the combating of electrohypersensitivity, which many TIs suffer from because of their constant DEW targeting, or some preexisting natural sensitivity. I have it, myself. But once a patent is filed and governments or dark-minded NGOs get wind…
Now, about that tower… What if it was for security guards overseeing grounds security should an alarm goes off of some sort. The tower does have its own large building which might be suitable to house a security force. Hold that thought in mind while reading the next paragraphs. Turns out it is not just an observation tower, and not just any building. And, while guards might be rather far fetched a notion, there is more to consider.
The pyramid shape is also known as a Frustum by Masons; a shape used by the military in times of old in a manner not unlike a Tank Trap. Like a tank trap, as a shape, it cannot be easily overcome when several are placed together, there being no level foothold between them (a steep V shape), and its sharp corners, especially at the top, inhibiting climbing. More importantly, because its sides are sloped, one cannot hide behind a frustum, if the enemy holds high ground… such as a castle wall… or a high observation tower. Just exploring possibilities, here… but far-fetched or no, it fits the spookiness factor of the place.
But as stated, that’s not all. The platform is merely the top level of what is actually a mine shaft elevator lift. The building is currently a mining museum with access to a huge abandoned mine; they actually take you down into it with hard hat and light, etc. So, like Cheops, there are underground passages beneath the Sauerland pyramids. It is, of course, possible that some of those passages might be remodeled into something else entirely different, like many old mines are, today. It is even possible there are ways to access them from within one or more of the pyramids. Now wouldn’t that be a mystery to discover and explore, whip at the ready? However, all this causes me to hope no one would go drilling a bunch of radial holes over an abandoned mine… if they didn’t know exactly where the mine’s cavities were…
Now, last mystery. Look carefully at the top of the platform at the left corner nearest. No. That’s not a machine gun, though it can potentially be used to ‘shoot.’ It’s appears to be Yagi antenna, normally used to transmit or receive microwave signals in an amplified manner, along a narrowly aimed path. But wait! Where does it aim? At the top of that tower, as high as it is, the thing is aimed squarely at a hillside nearly four times as high as the platform. Useless, as seen. But wait! Just beneath the top rail is a what looks like a motor; the shaft can rotate. At the top is what appears to be a motor at an appropriate angle to change vertical angle. The white object appears to be a housing of a control system operated remotely. I used to sell such systems for video security setups based on microwave relay. Pretty sure of what I’m seeing. And, there is a second pole identical to the first which could be similarly fitted, and which may have been since the photo was taken.
Why would you want that? Well, you might want to tune in distant TV stations, except they don’t broadcast in microwave. You could use it to grab someone’s cell phone signal, if you knew exactly where their phone was, to aim it. There are yagi antennas that can be used for those things, but they would look different. But what if you owned a bioresonance laboratory with some human guinea pigs? What if you could place them in rooms within a pyramid, where the slope of the pyramid was roughly perpendicular to a high mounted, aimable microwave transmitter, such that every subject got exactly the same dose of signal at the same time, or such that you could specifically target a given subject with a unique signal? It would probably look a lot like Sauerland. You think?
I only mention this, because older pictures, before the pyramids were built on site, don’t show such a ‘gun.’
Is it a conspiracy?
If one concludes that it is impossible that by mere chance alone, every modern and non Mayan/Astec-style pyramid should align with other pyramids, including Egyptian… then it has to be by intelligent design by agreed-to planning by a group of many persons with like agenda. That it is done covertly and involves mystical occult reliance… removes it from the realm of benevolent methodology or intent. That these pyramids can be found in countries of opposing political, religious, and ideological beliefs… precisely fits the Illuminati model and game plan established by its founder, and reflected in Morals and Dogma, the ‘Masonic Bible’ written by Albert Pike. That the only persons financially and powerfully placed are able to arrange for such things tend to also be members of Round Table Groups and are often also Freemasons… would seem to cement all these considerations into a single image: that of a conspiracy. That there is the possibility that it even involves mind control is, to say the least, the ultimate and most heinous form of conspiracy.
“Every man is entitled therefore, to give any explanation of the symbols and a system of the doctrine that he can render palatable… Of all the means I know to lead men, the most effectual is a concealed mystery.”
This is an old topic that’s lost traction in the public eye, but in the background, the enemy continues to work ever closer to fulfilling prophecy about Mark of the Beast. Now, employees are being asked to implant themselves in order to get snacks, get through doors, and access workstations and photocopier.
What you will learn reading this post:
- what RFID is, who is behind it, and why you should fear it;
- about Digital Angel, and the bio implant tracking version of RFID;
- why you should fear it, put away petty ideological differences, and unite against it
- what you can do to defend against it;
- the greater strategy RFID is in support of (the ultimate threat).
Invasion of privacy tiny in size, massive in scope
Recent news stories, including a particularly scary one referenced in red text, herein, have forced me to draw upon years of research and dig out my old PowerPoint presentation, 666 Reasons for Smart Dust and RFID Technology, as presented as the keynote presentation at Conspiracycon 2010, in Santa Clara. Any definitive presentation must go back to the beginning, or the dots won’t quite usefully connect. This is going to impact YOU in YOUR LIFETIME. Actually, it already has, and you just don’t know it; the water temperature is slowly being raised on we Frogs, and it’s quite hot, already. Hopefully… we can somehow jump out before its too late.
Smart Dust and RFID tracking technology are quite related, but Smart Dust is not going to be a part of this presentation, except to say that it is nanotech capable of much more than RFID, but it is not an implant. While it is represents its own significant threat to social, financial, and physical security and well being, it is less useful than a tracking implant for the population at large, and cannot play the role of Mark of the Beast. Fortunately, it will not likely ever be used against anyone not deemed a high-priority national security risk. You know, like Will Smith, in Enemy of the State.
RFID, however, is the very heart of the tracking bio implant, the most obscene version and infamous of which is Digital Angel. That’s the name of a CIA front central in pushing for implants, but also often used to describe their chip, itself as a product trade name. They also offer a wide variety of tracking systems which are non implant, such as wearable items like watches and ankle bracelets.
But we need start with a broader view on RFID to fully understand the greater threat this topic represents. Non implant (and seemingly harmless) versions of RFID are already used to track an endless array of products, and you are quite likely to bring them home every time you go shopping. In retail, it is mostly benign, but it becomes the bedrock of a useful personal tracking system.
Mostly benign? Check this out, an edited and updated excerpt from my book, The Professional Paranoid: How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual (third ed.) Excerpt begins…
Smart Dust, RFID, and the Mark of the Beast
i want you to consider the first letter of this sentence; the lack of capitalization is not a typo. I wanted to draw attention to the dot above the letter ‘i.’ There is a reason… there is an RFID invasion taking place, and some of the invaders can be just that small.
The Bible tells us that in the End Times, there can be no transaction between persons for goods or services unless both parties have the mark. Revelation 13:16-17 “And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: 17 and that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.”
Though the Mark of the Beast is thought of as being the number 666, that is not quite the case. That is the number of the Beast himself (the Antichrist) in numerology evaluation of his name. The original words used in the original Greek texts of the New Testament can be translated to mean ‘insert’ as well as ‘mark.’ Thus there are growing numbers of people who think that some form of Digital Angel bio implant will be the actual marking device. This section will illustrate that likelihood and educate you on just how close to that day we may be.
This will make sense later: implants are the mark for the hands of peons, and marks on the forehead are the mark for meons.
What is Digital Angel? It is a firm which is known for a series of tracking products, including bio implants, all based on RFID technology. Simply put, it is a passive device which, when scanned with a low-energy RF signal, responds with a signal of its own, broadcasting a unique identification number or other data. Early versions of this are still commonly found in clunky removable/disposable merchandise security tags installed by retailers which can trigger alarms when shoplifted goods exit the store. In the modern version, the product manufacturer includes the chip which enables the same feature without the retailer needing to do anything but take delivery of the goods.
There is a whole emerging industry based on RFID, and it, in turn, impacts on almost all other industry sectors. The industry is driven at its heart by the military and intelligence community with the help of corporations who are part and parcel of the NWO elite, as defined by the makeup of their directors and other corporate leadership or ownership. What they want to do with RFID is mind boggling, as is what RFID is capable of in terms of invasion of privacy. To start, they want every single product manufactured and sold to have its own unique RFID tag, and are pitching it to manufacturers and retailers as the next evolution of bar code.
Similar chips in credit cards technically allow purchase without the need to remove the credit card from the wallet, though they currently require us to scan the card. But all that is really be needed is to specify which of several credit cards we might be carrying was desired to be used. That could be verbal, by touch screen, or smart phone application, which avoids producing the card. RFID is also being built into phones for comparison with credit cards nearby, to allow verbal telephone purchases to be made without the need to verbally confirm credit card details. The bio implant is ‘sold’ to us as a convenience to replace all of that (examples to follow).
That is the ‘convenience’ under which it will be sold to us in the retail world, and if a cash register can scan these chips, so can the device at the door looking for merchandise which had not yet been purchased. Why stop there? Anyone can put small and hidden scanners (with or without cameras) anywhere, and for any reason… such as at every doorway where some form of security or tracking feature is desired. By scanning RFID credit cards, the identity of everyone passing through is logged and time stamped without their knowledge or participation. Actually, any RFID tag on your person can do the same thing (it is being built into clothing), because your identity can be associated with its purchase. And that is just the beginning. Ergo, the national ID ‘Real ID‘ program is based on RFID, and eventually, the human body itself will be its on RFID ‘ID.’
In the very near future, it will serve law enforcement. At the scene of the crime detectives will often find discarded items potentially belonging to a suspect. They analyze these for clues, such as fingerprints, to build a list of suspects. In a world of RFID-only purchases, every object also identifies who purchased it, when, and where (often also useful clues in prosecution). What about cash purchases to thwart RFID records keeping? Not a problem. You didn’t think for a moment that those little slivers concealed in the left-hand portion of your new money was truly just a counterfeiting deterrent, did you? Put anything but a $1 bill in your microwave oven and it will explode when operated… a trait of RFID. Moral of the story; don’t casually discard product wrappers, especially if you think someone might use them to implicate you in a crime; burn them.
But it gets worse. For any of this to work smoothly, somewhere, someone needs to catalog and keep all those transaction records and make them available for government’s needs. Enter the Total Information Awareness Office (TIAO), AKA the Terrorist Information Awareness Office. This was modeled after an expanded version of FINCEN (Financial Crimes Enforcement Network) capabilities (check this out); and was MILITARY led and very Intelligence community friendly Defense Advanced Research Projects Agency (DARPA) project. I’ve seen the original DOD call for papers and the final description of capabilities and intended uses for the TIAO, and it has little to do with targeting terrorists. Instead, it has to do with capturing records of EVERY transaction between EVERY citizen and business, as well as the passing of ANY citizen through ANY doorway in selected locations. Further, it will track vehicles past checkpoints and can log other kinds of interactions or transactions between people and each other or real world objects (i.e., machinery, vending machines.)
Update: TIAO ‘went away’ due to public protest and ‘too many questions,’ including “Why was the head to be a convicted criminal participant in Iran Contra, an ex Naval officer of significant credentials tied to CIA and the Pentagon, John Poindexter?” And yet, it did not actually go away. It has instead been quietly replaced with the OIA; the Office of Intelligence Analysis, another new super-secret spy agency operated out of Homeland Security. They, in turn, gently established ‘Fusion Centers.’
Fusion Centers are ‘sold to us‘ as a happy pill having nothing to with dark deeds, and as being established by cities and state governments in order to share information between partnering civic and federal agencies, local businesses and NGOs for improved security against terrorism and ‘other threats.’ In truth, they are hotbeds of social spies who operate external of the centers within those groups of partners on behalf of DHS and the intelligence agencies. It is often a source of organized gang stalking, and a collection point of ‘data’ about ‘other threats.’ We are the threats, and the data is obtained through backdoor access to the ‘data’ about us found in participant computers, including RFID transactions, security and traffic cams — and via gang stalking and the associated psychological profiling. It is a kind of fascist Brown Shirt group without the uniform, replaced with a smile and handshake… and big eyes and ears.
And worse still. If government decides it wants to know even more about you, a black van can drive by your home and scan it to collect the sum total of all information from all RFID tags (or Smart Dust) found within the home. They will quickly know EXACTLY what is in your home, where you got it, how you got it, and when. This gives field agents the ability to gain access to that kind of information in a very focused way instead of having to run tedious database searches which would necessarily include bureaucratic handling and, perhaps, the dreaded and feared need for a pesky warrant.
And, worst of all, the ultimate expression of RFID privacy abuse is to put one in the human body, with or without the target’s knowledge. The question is, how close are we to this nightmare, and what can we do about it? The answer is, we are frighteningly close, and in fact, it has already been happening for decades.
- RFID is already being put on thousands of products you buy today. Even common mundane consumer goods like Gillette razors and Max Factor makeup have been ‘chipped’ with RFID. Walmart pioneered its use, and used cameras (which opens up a whole new personal security threat for the chip) to track customers through the store, and record RFID transactions. There are also shopping carts with built-in ‘product information displays’ which can track every item you handle while in the store, and profile your shopping experiences over time. You can bet there were cameras connected to scanners scattered throughout town by CIA or the military (Walmart Board included ex military and intelligence agency types at the time), as well, to see where else you went and what else you did, to test it as a spy tool. Many manufacturers have placed orders for hundreds of millions of RFID tags and millions of scanners. They have to be in use somewhere.
- Many tens of millions of RFID equipped credit cards have already been issued. You can spot these visually if they are transparent, or if the credit card number has a lot of zeros in the middle, or a gold foil rectangular emblem about ½ inch square. Though sold to us as a ‘security feature,’ they are the opposite: content can be stolen by proximity scanning without your knowledge, and then the RFID and card can be cloned by thieves for use at your expense. I’ve caught such a thief scanning at the doorway to Walmart. He was pretending to be making a phone call… pacing back in forth in ways that maneuvered him in behind victims. But there are also home-made scanners which can scan from hundreds of feet away.
- Most cell phones use SIM card technology incorporating RFID (the SIM card, more than the phone, identifies the authorized user). This is often used in phone apps to facilitate cardless credit transactions (i.e., iPay)
- Virtually every maker of cash registers and point of sale systems is developing low-cost attachments to existing cash register and credit card scanners to sense RFID, as well as whole new systems to replace the old with simplified operation and reduced cost — this allows self service checkout and the elimination of the sales clerk, so it will be promoted as a ‘cost reduction’ tool. But don’t expect to see savings passed on to consumers. Money already has the needed strip in place and it likely has been RFID capable all along without our knowledge.
- All employee scan cards use RFID. Hotel room key cards use RFID. Federal Express, UPS, etc., all use RFID shipping labels. Monthly bus passes, season tickets, and the like, also employ RFID.
- Pets and livestock have been being implanted with RFID for decades. Within the last ten years, thousands of people have, as well, largely through efforts to chip children ‘to protect them against kidnapping.’ There are nudist resorts where you can volunteer to have one injected to represent your credit card information for purchases at nudist-camp points of purchase for services and goods. Otherwise you must carry your wallet or purse and keep an eye on them. What fun is that if trying to commune with Mother Nature and your bank account? In July of 2017, a company announced break room vending systems and software to allow implanted employees to access snacks without money. Learn more here. Soon, you will see implants being promoted for use with parking meters, fast lane highway access, and on, and on, and on.
- Bioimplants can easily be implanted in a human without requiring their knowledge or consent. All they will know is they woke up with what seems to be an insect bite. This can be done while they sleep via covert entry of their home, or at distance with a special pneumatic sniper rifle.
- According to several news accounts, countless livestock has been slaughtered with the implants still in place, their meat ground and sold, and consumed by unaware purchasers. Despite massive recall efforts, not one package of meat was recovered. RFID implants are made of glass, plastic, and poisonous metals.
- Some school systems are requiring children to use their fingerprints with scanners in order to get their school lunches. This is bad enough, but the firm that makes the equipment used also offers an RFID attachment in lieu of the fingerprint scanner, and mentions implants in their literature as an option.
- One maker of RFID, in marketing it for aircraft part identification in an assembled aircraft (the goal being to track parts which might be subject to safety recall, and a feature useful in crash investigations) chose a trade name for their RFID of ‘The Mark.’ The part number when Boeing Aircraft orders it from the maker is alleged by employees to be 666.
What can you do to defend against it?
Aside from sharing this post, not much. Be very vocal and protesting at every opportunity any discovered use of the technology. You might demand RFID tagged merchandise be detagged or the tag neutralized before you leave the store, but that would make you look crazy. However, organizing endless group protests can have an effect. Any firm that covertly uses it should be razed to the ground (sued into oblivion for violation of privacy). Any government office holder should be kicked out of office if they support the technology in any way, shape or form, or simply fail to oppose it. In my opinion, preparation for revolution should be made if these efforts fail, because that would be the only remaining recourse prior to full enslavement.
Back to the bible. In The Book of Revelations where the reference originates, there is also one more clue RFID will be the basis of the Mark of the Beast. One at a time, the Seven Angels open the Seven Seals to unleash seven deadly punishments upon the unfaithful on the earth. One of these states that those with the Mark of the Beast will suffer severe pain and many will perish from it. A subtle clue.
As it happens, there is one feature about RFID which must be told to make sense of this, and it suggests how to thwart the tech: if exposed to high energy radiation, RFID heats up incredibly and explodes. A burst of high energy radiation levels will literally destroy it… such as an intense solar CME blast (Coronal Mass Ejection – a high RF/EMF energy field). At this time, I cannot tell you how to generate such an energy and safely use and aim it, but it has been suggested by other experts than a ten second microwave oven exposure should be sufficient. Now if I just had a portable unit I could waltz through the retail Aisles with… set to ‘Burst’ mode… but you can bet there will be or already are laws written to make that illegal.
But there is something simpler which also defeats the technology. Metal shields the signals. Thus wrapping a National ID or an RFID equipped credit card or object (i.e., chipped hand) in aluminum foil defeats the device’s ability to communicate. When the revolution comes, if that is our future, there will be portable devices which anyone could build from easily obtained parts to detect or destroy RFID at will. I fear the day this is needed. I also say woe to those involved in the use of RFID should it come to that. End excerpted material.
There is one other thing you can do. The response time for reading a scanned RFID is very brief. There is a ‘failure’ in reading called ‘tag collision.’ When too many RFID tags of the same frequency (usually dictated by type of tag/use of tag) are present in a confined space, the scanner can fail to capture the data, or capture the wrong data. Therefore, if one were to collect dozens of RFID tags of various types and put them into a bag to carry along with them, it would effectively become a scanner blocker. Keep all your old canceled credit cards in the same wallet as your valid ones, sandwiching the new between the old, and pull them ALL out to select the one to use, holding them all in the same hand to swipe.
I also advise against Smart Appliances, and smart meters. RFID is at the heart of interaction with Smart Meters, which in turn is its own invasive privacy and stalking threat (widely experienced as a directed energy weapon). Worse, it is tied to mapping of the interior of your home; the floor layout, location of furnishings and other appliances and electronics, smart or otherwise. Programs are being developed to allow such mapping information to be available to manufacturers of smart devices and used to market to you based on use of not just their product, but all products. Naturally, all that can be accessed by government, as well… and hackers partnered with burglars.
I also suggest taking advantage of these resources as contingency against the worst:
The history of RFD tells all
It starts with Howard Hughes, though he was a victim, not an instigator. Most of us are familiar with his rise to being the richest man on Earth in his day, and his fall due to a mental condition which impacted his ability to interact with people, and life in general. The untold story is that once debilitated, CIA agents and Mormons (CIA likes to recruit from Mormans, and Masons, because such cults have secrets and know how to keep them through compartmentalization and other methods) became his ‘caregivers and managers.’ He trusted them, and they took advantage.
Once in control, his vast resources were diverted to CIA control and application. Hughes Shipbuilding built several spy vessels including the Glomar Explorer and companion vessel, both designed to retrieve sunken Soviet Subs. Hughes TWA aircraft and assets were diverted to form (over time) three different CIA ‘airlines,’ including the most recent, Evergreen Aviation, which wound up acquiring Hughes’ Spruce Goose for its museum. Hughes Tools, the financial cash cow of Howard’s meteoric rise, a maker of drilling systems for the oil industry, would eventually become Enron, and we know how that wound up vanishing billions of dollars into thin air. The remnants of Enron’s data processing center would be applied to CIA fronts engaged in porn (to profile user sexual preferences for possible blackmail application), web site hijacking (I was a victim of that, documented here), offshore gambling, and 4-1-9 scams (Nigerian money investment scams).
Then there were Hughes operations which would evolve to serve CIA’s efforts in Political Control Technology development and application. It starts with Hughes Aircraft’s electronics division, eventually become Hughes Electronics, which invented the RFID concept. These were originally used to identify and track cattle, marketed through Hughes Identification Devices, but also found their way into humans involved in early (late 1940s) non consensual CIA mind control projects and Atomic Energy Commission radiation experiments on civilians. I wound up with one in my leg, when as a child, when I was injected with a radioactive substance in Yakima, near the Hanford Energy Reservation.
From Hughes, the chip was migrated to Destron Fearing, and from there to our friend, Digital Angel. We will come back to them. More CIA fronts or partners duped into participation would be created in America and globally to market implants for humans. They do big business in ‘police state’ countries, often for the purpose of chipping persons in the criminal system. Of course, it is privately understood they are good for tracking anyone you wish to track, such as embarrassing political activists and whistleblowers.
LocatePLUS is a Homeland Security created and CIA infected front which pushes the implant in America and advertizes that it maintains 12 billion records covering 98% of the American Population. The DHS/CIA knows all about you and is making money selling you to anyone with the money. In America, the front markets to FBI, ATF, DEA, and 2000 law enforcement agencies, primarily non implant products such as ankle bracelets.
In Europe, the front Worldwide Information is a LocatePLUS spinoff doing much the same. Global reach far outstrips American consumption (there are a lot of fascists out there, in almost every government system): Universal Microchip in Italy, IDECHIP S.A. markets in Ecuador and Brazil, Solusat Medica in Mexico, Scientific Innovation and Integration (SII) in Korea, Taiwan, China, and Japan, Inforlexus Inc., for Malaysia and Indochina, Biometronix for Germany, Glezer Technology in Israel, and Cybertek in Puerto Rico. This list continues to grow; the Swedish firm Biohax International is behind the implant for snacks story.
The primary American front (a sister to LocatePLUS), Metro Risk Management Group, sold $13M worth of chips over 5 years to the Bonneville Power Administration (to track fish, officially). BPA is a Department of Energy firm which had in the same time frame been in the news because of high-tech spying operations having been detected taking place in their facilities… while BPA and Enron were significant others in the same bed. The U.S. Military contracted for $24M, while they sold $1M to private citizens wishing to chip their children or themselves. They sold $7M to the greater Intelligence community, and $73M for ‘internal use,’ which is to say, CIA, itself. Such orders are a combination of implants and scanner systems, both portable handhelds and installable units for security gates and doorways. A typical order might consist of hundreds of thousands of devices and a thousand scanners.
All this data represents 2005-2009. Sales are increasing over time, but increasingly hard to track for a variety of reasons, including corporate name changes, mergers, spinoffs, and other tactics often seen in CIA fronts trying to be a moving target. And the implant business is a target by activists and activist organizations worried about invasion of privacy and civil rights, to say nothing of some kind of New World Order nightmare ending with the Antichrist at Armegeddon. And, they are constantly being sued in court for a wide variety of reasons.
And this brings us back to Digital Angel, the key point in the bioimplant tracking food chain. As stated, a lot of business names and hanky-panky tactics are often employed by CIA fronts, as outlined in The Professional Paranoid, a privacy/security how to which, in covering that topic, helps readers to identify who is really causing the bumps in their night, should they be so unlucky (as was I). So let’s take a look at Digital Angel, again based on older ten-year research (I’m not going through that, again).
Let’s talk corporate names as clues: though most commonly known as Digital Angel (Florida), also DBA Verachip, they were formerly Applied Digital Solutions… which was formerly Applied Cellular Technology (because RFID tracking often relies on cell phone services)… which also used the DBA ACT Financial… formely Axiom Information Technology… formerly Axiom Computer Consultants… DBA Great Bay Acquisition Company (those all based in Wisconsin/Minnesota). Digital Angel divorced itself from Verachip (being sued out of business), but then Verachip merged with Steel Vault… which became PositiveID, which then in turn tried to acquire Digital Angel… which also operates Signature Communications in the U.K., where it might (conjecture based on company data and ties to CIA fronts) enjoy backdoor access to encrypted government radio communications, the assumption being that receiving units employ an RFID chip which, like the cell phone paradigm, authorizes descrambling of transmitted data, as well as authenticated identification of the sender and recipient. Finally, Digital Angel, also being sued and hounded, ran off to the U.K. where they now promote themselves as “a developer and publisher of consumer applications and mobile games designed for tablets, smartphones and other mobile devices, as well as a distributor of two-way communications equipment.” But they still push implants, and through Signature, the two-way communications gear.
Let’s talk facts as clues: Digital Angel does not make RFID. No. They merged with Destron Fearing, the actual imputus of modern RFID systems claiming to have invented RFID technology. No, that was Hughes Aircraft’s Electronic Division. Digital Angel at one point claimed to be founded in 1948. No, but Destron Fearing was founded in 1945, did the RFID for cattle thing in 1948. No one cited so far, actually makes RFID tags, the heart of the implant. No, that’s Raytheon, a military/CIA contractor… formerly known as Hughes Aircraft. That makes sense, since it is the U.S. Army which tracks all RFID tag assignments (unique tag number assigned to (whatever) user data). Meanwhile…
Let’s talk connected dots as clues: CIA’s HHMI (Howard Hughes Medical Institute) is steadily pushing for the use of RFID in both implant and non implant versions to hospitals (49 major facilities as of 2005, more every year) and the medical industry at large, and Hughes Satellite and Hughes Communications services RFID tracking systems via cellular/wifi. How do I know this? By temporarily working for both Hughes Satellite and a major cell phone carrier where I was able to verify specific cell phone traffic and routing of tracking data. The phone account was tied to an individual which shared an address with one of the above firms (how I found it). And that led to finding dozens of such phones for more firms. And even more looking at other fronts known to me outside of the RFID playing field. In fact, such details are part of my evolving insurance policy against ‘accidents.’
Let’s talk key people as clues: Another CIA front trait has to do with who is involved in the corporate structure. At ADS (old data) Dr. Richard Seelio was Director of Medical Applications. Really? He is a Bariatric Surgeon, so he knows how to suck fat out of your thighs, not exactly as advertised by his title (a typical front man). The Senior Vice President was, prior to installation, a small time lawyer (a cutout man). A look at the Board of Directors of almost many of the above firms variously will find persons of wealth and influence, persons with backgrounds or ties to military/intelligence (or both), and persons with membership in the nefarious NWO Round Table Groups, such as the Council on Foreign Relations, Trilateralists, and the Bilderbergers. This is a kind of corporate structure is a fingerprint that lets anyone track just who are the trackers.
The other shoe drops
As I wrote this, I was listening to radio, where Clyde Lewis more thoughtfully reviewed a greater enveloping matter on his Ground Zero show, things equally important to understand, and far more sinister. Listen to it, here. The short of it is that chipping people is not just about spying on them, it is about control. It will enable a complete rewrite of social, political, religious, and economic existence, and the script is already being followed step by step, RFID again at the core. You didn’t think ‘Global Warming’ was about weather, or that Transgender Issues were about rights, or that Terrorism was about political or religious ideologies, did you?
It is, all of it, in support of ‘a brave new world’ which the New World Order seeks to establish, a world where there are only three classes of people. While my friend Clyde did not use my labels for these classes, he did so describe: there will be Meons (a Club of Rome/Bilderberger label based on an ancient word for someone worthless, less than a peon – a ‘useless eater’ who will not likely survive the NWO on their own, and who will be made to ‘go away’ in time); Peons who will be usefully employed to run the system (government, business) for the elites; and the Elites, the 1% of the 1% who will rule.
Clyde explains how the Middle Class will be eliminated, divided between those willing to implant and deemed useful (peons), and those unwilling or deemed useless (meons), and the a host of new topics and proofs you have likely never heard of, and more. Naturally, the upper class will be peons, and the lower class, meons. Bio implants (part of Transhumanism) are key to all these plans. You had better understand all of this or you won’t be able to cope, and likely, will end up in the red list for population reduction.
Low Cost RF/MW reading devices are often purchased by TIs as a defensive tool against their targeting fears. However, the general topic (TSCM – Technical Security CounterMeasures) is just that: TECHNICAL, and readings from such a device can easily lead a TI to panic and over react. Here is why, and how to get more out of such devices, without the risk of serious mistakes.Updated Dec 2017 – Corrected technical boo boo and added a couple of closing paragraphs somehow deleted and not caught. Changes indicated with red intro. What you will learn reading this post: • all TIs could benefit from professional TSCM electronic sweeps; • that isn’t likely to happen; • the poor-man’s TSCM pro isn’t a pro, and might be a fraud; • there are low-cost meters but improper use can be dangerous in many ways; • there is a solution, and help implementing it — and here it is…
The way it is
A Targeted Individual can almost always benefit greatly from a professional TSCM sweep. Such a sweep, clandestinely done, could provide significant courtroom quality proof of electronic surveillance and/or harassment with directed energy weapons or mind altering signals, such as EEG entrainment, subliminal messaging, V2S, implants, and more. If you are new to targeting and don’t know these terms, read my books. With very rare exceptions, virtually all TIs are exposed to some form of electronic targeting, and such a sweep can precisely identify who is operating the equipment, the nature of targeting, and evaluate the threat and suggest defensive/offensive options. That typically includes their providing documented reports and personal courtroom expert testimony. Combined with optional services equivalent to a private investigator, it could even end up revealing who ordered and is behind the targeting. They can also potentially detect bioimplants in the victim’s body.
Unfortunately, there are two reasons no TI has ever used TSCM professionals with success, and hardly any have ever used it, at all. The first reason is, that only the wealthy can afford it. A truly effective sweep of a home or work place, can cost between $20,000 and $60,000. That is because the professional will need to apply towards a million dollars worth of specialized gear, and must have decades of experience in order to be qualified to do so and have the results stand up in court. Rather than ‘meters,’ they employ sophisticated signal analyzers and other toys for a full-spectrum solution (including light and audio threats).
Sigh. Add to Christmas wish list, and hope Santa is generous.
The second reason, is that all such qualified TSCM are almost always ex government/intelligence community/military/military contractors, and are therefore, by default, subject to ‘conversion,’ because almost all targeting is ultimately at the hands of those same players. By request or by bribe, the risk is that they will give a false report showing no targeting. It is simply impossible to vet a TSCM pro against this risk, unless you happen to have a personal family/friendship relationship in place from the start. I had such a contact, and the government framed him on illegal weapons and drug charges and put him in jail, confiscated all his equipment. James Atkinson (‘Granite Island’) helped me write my first book, filling it with informative information about TSCM and what government agency uses what frequencies for what purposes (data table and other information in The Professional Paranoid). Friends are keeping his informative web site up and running for him. Visit.
So what is a TI to do? One solution, is to go with less than a true pro TSCM guy with all that gear, someone like me, perhaps, who has nearly $20,000 in gear, and some investigated skills (I’ve put a lot of people in jail, shut down illegal CIA fronts, forced corrupt officials to resign, and ended targeting for clients). Unfortunately, there are crooked people out there pretending to be ‘like me’ using even less sophisticated gear (regardless of what they claim). I have seen YouTube videos of alleged ‘bioimplant scans’ where the scanner was charging $100 per implant found, and gee… everyone scanned naturally had between three and six implants, or more — until their money ran out. And yet, not.
The problem was, the meter being used, like most such meters, has an instruction manual warning that false readings will be obtained if one touches the sensing area of the meter (the business end). You are supposed to hold them a certain way to avoid that. A fraudulent scanner, however, holds it differently, such that he merely moves his finger to tap or touch the front whenever he wants to ‘find’ an implant, bug, signal. Sadly, this service was widely promoted by one of the largest and best known TI community groups. It even resulted in a multimillion dollar lawsuit, and that group ultimately disintegrated. One clue it was a scam was ignored by all: to get the scan, you had to fly into a small remote town with all of one Police officer, check into a hotel, and get scanned within a small window of time. Poof! the scanner was gone before the fraud could be reported and investigated, and many thousands of dollars richer for a half-day’s work.
Another solution is to buy your own meter. Prices can be as low as $100, even less (be wary when so). Not quite a perfect solution, in truth, because no such product, even towards $20,000, is designed and sold for the kind of use to which the TI intends. They are designed to measure the same kinds of signals (with significant limitations, usually), but for other cause, such as testing equipment against RF emission safety standards, or to ensure they are putting out the right kind of signal. The instruction manuals only speak to such uses, and the manufacturers/sellers have zero interest in helping a TI do what they need to do with the product. Nor will they accept returns based on failures to be useful in such an application. You are on your own.
Because of the technicalities involved, and in the face of a lack of instructions, it is not only extremely rare that a given TI will know what a given reading means, but also quite likely that they will make a false and potentially dangerous wrong conclusion as to meaning, and then take wrong actions in defense of that false conclusion. A TI easily makes silly mistakes, and the results can be frightening (ex: aiming the meter at the sky will yield seriously high readings, but is NOT a threat. Many TIs assume it means satellite targeting. No, no, and no.) An example of a serious wrong action would be false accusations of an innocent party, or spending limited financial resources for shielding or legal defenses applied uselessly. And there is another common risk…
All too often, a TI will call Police or go to other authorities or perhaps seek legal, medical, or psychological professional help, meter and readings in hand, intending to ‘prove their case.’ All they end up accomplishing, is being marked down as a very strange person with a strange little box and an even stranger and unbelievable story; a lunatic who needs mental health care. No one will understand the little black box or its readings, much less the story offered behind it all. They have never heard of TSCM, most likely, and so the entire concept is like talking about the kind of propulsion systems used on flying saucers. And if they do know about TSCM, they will know your meter is a ‘joke,’ and automatically conclude that your use of it and conclusions are just as silly, no matter what the truth is.
Note: there is one other potential ‘poor man’ solution — the use of a smart phone ap to simulate an RF/EMF meter. Yes, and no. Extremely limited range and scale of operation, extremely broad angle of view, and quite prone to misinterpretation. In fact, it has nothing to do with electronic solution; it only measures the Earths natural EMF. It has no value for personal protection, as I’ve written of, here.
Don’t give up too fast… all is not lost
Don’t give up on the notion, because there are some useful uses for such meters, if approached properly. One must simply alter expectations, and have a better grounding in how to properly use low cost meters such as those described herein from trifield.com, for the purpose. I can help with that. But let’s first talk about expectations:
a) you are not going to use them to find implants with much chance of success. There is only one type of implant they MIGHT find, which is the type which constantly broadcasts information. An example might be a tracking implant, or a health monitoring implant. Under the right circumstances, you might find such an implant. But most implants used in targeting are either not going to broadcast anything… instead receiving signals useless in detection — or they are going to deliberately use special broadcast methods most meters cannot see or respond to usefully;
b) you are not going to use them to find V2S, subliminal, or EEG manipulation signals. You can see these signals, but they blend into the background and do not stand out as such; they cannot be isolated and identified with simple meters;
c) you can use them with some confidence to identify DEW and other targeting signal directional sources. While it is relatively easy to misread signals and erroneously presume them an attack signal, if read during an attack and relying on the strongest signal sources, only, you are likely correct in the presumption. You can then plan shielding strategies more effectively, and narrow your list of suspect enemy positions and personnel to those within that angle of attack. With some luck, you might actually pinpoint the source and perps involved, but it won’t be legally useful. But focused video surveillance (don’t break the law), with luck, may confirm suspicions sufficiently to be considered legally useful evidence. Rely on video documentation of not just the doings at such sites, but also video of meter readings during attacks, to prepare potentially useful evidence… useful to perhaps interest someone into considering your story… knowing the likelihood is that they will still reject it as lunacy. Risk vs. Benefit is your decision guide about attempting to convince them;
d) you can use them to identify the type of signal, in some cases. They type and sophistication of the meter, and your ability to use them properly, will determine if that is the case, or not. It is quite easy to make wrong assumptions, as there are so many kinds of attack signals across a broad spectrum of frequencies (bands of RF energy). Most serious threats operate at frequencies well above the capabilities of low cost meters. Even my $20,000 gear cannot see above 12 gHz microwave, which is where most military bands operate. But if your enemy is not military based, you might have a chance with $20K gear… but with gear costing hundreds of dollars, your chances diminish to the point of being limited, perhaps, to seeing things an amateur or Cop might employ.
e) you can use them to warn of a DEW attack before it becomes a problem in terms of physical/mental effect. There is one particular low cost meter best suited to this use, allowing you to relocate yourself away from the attack area… the meter will advise when escape has been achieved (cease the warning). It will also indicate if you are being ‘tracked’ by a signal by some means (generally some kind of surveillance, or by a locating implant), and can give you a general sense of the direction of the attack signal source, much like the Trifield. It is not, however, a great substitute for the capabilities of the Trifield beyond that, but it is a better warning device than the Trifield, because it is automatic, and always operating, unless switched off. It can even clip to your clothing or be carried in a pocket, or set down anywhere near you;
f) you can use such meters to determine if the signal levels exceed safety limits set by government and NGO organizations. This, in turn, can sometimes be used to force government agencies, most notably the FCC, OSHA, to investigate on your behalf, though it is quite likely such investigations will not match your findings; the enemy will simply shut down temporarily. But at least you get a brief vacation from assault. When concerned about safety levels, you will want to carefully review online searches to compare the latest (always being adjusted downward) standards and what a level represent in terms of health issues, and that will prove to be quite technical — you need to carefully compare your meter reading and scale used for the set limits, which may require unit conversion (usually a matter of multiplying or dividing by 10 or 100; most such resources will give you instructions for conversion or cite alternate unit results for you). With luck, your findings can be matched to specific known physical symptoms for a given reading level, which if matched to your symptoms and reading levels obtained, can be useful if well documented (video of your readings and symptoms + industry data);
g) you might be able to use them to find surveillance technology, to include listening devices and cameras. Again, sophistication and skill of the user are key. There are devices better suited to this purpose which remain low in cost. Use a search engine (bug and camera detection gear) for that. Same for (phone bug detection). See my post on cellphones.
Now as to the other key requirement, proper use…
Fortunately, there are two specific low-cost devices I can recommend with confidence, and for which I can provide rather specific instructional advice on how to use them for TI needs. They are the devices I started with early on for my own needs, after some considerable informed research — and successfully used to confirm my own electronic targeting, source location, and identity of the operator at that location. It allowed effective shielding response which ended the threat, and finding of listening devices. It helped me to develop other tactics to defeat targeting which did not involve shielding. They had other benefits, as well, not the least of which was improved peace of mind.
As result, I made a special deal with the manufacturer (Trifield): they would sell them to me at a small discount for resale to TIs, and send TI requests for information or purchase to me… on the proviso (my idea) that I provide an instruction manual for TI uses, be responsible for any returns and customer service issues arising from TI uses. They did not want that business at all, and would not sell them to TIs if they understood such was their use/need. While I am no longer in a position to provide the service, which as a kind of rent-to-own trial program for which no one ever declined to own (it worked well for them), I do still offer the instructions (an emailed .pdf file, illustrated).
These are for the trusty and versatile Trifield meter (avoid the more costly blue-faced version, generally less useful to TI needs) and SmartAlert 2 microwave detection device offered at trifield.com. Both meters are very low cost: you can buy both for less than $300, just don’t mention targeting. My manual gives broad instructional use for both meters, and additionally includes an idea on how to modify (at relatively low cost) an entire room to be a faraday cage without dramatic change in the appearance of the room.
I used to sell the instructions for $20, with the purchase price applied to the purchase of a meter. The idea was that one could see what the instructions were like without risking the investment in a meter, and if thinking it doable, go for the meter without wasting the $20, as I made it free with a meter if purchased outright. It was a confidence-building approach to decision making.
I also tried to talk people out of doing it by pointing out everything in this article. Only if they got past all the negatives, and still wanted to proceed, DID I HAVE CONFIDENCE IN THEIR DECISION. I needed to feel it was right, too, because I did not want a meter to be returned — a wanted a successful use of it to better the user’s targeting situation.
Since I no longer sell the meter, I make the file available on request by email to anyone willing to make a contribution to the Free Will Society, and our effort there to establish Free Will Haven, a targeting-free, low-cost, self-sustaining intentional community (learn more here). There are two ways to go: A $20 donation gets you the manual. A $50 donation gets you the manual AND membership in the Free Will Society (you must have a Facebook account, as well, to participate in membership dialogs) and an ebook copy of The Professional Paranoid, which also talks about privacy/security issues, which includes material also related to meter use as described in the introduction (frequency usage). That, alone is a $12 value. By all means, donate more, if so moved.
Note: A secondary goal of the Free Will Society, is to subsequently establish a mobile strike team with a full professional TSCM sweep capability, to include a van full of gear (image above). This would be used not only by Free Will Haven, but be able to be sent anywhere in the country to target perps covertly, and nail them to the cross, and blow the whole topic of political control technology wide open in media, and in the halls of government… globally. And yes, that means yet another million dollars are needed. So add zeros to your donation 🙂
The manual’s instructions can generally be applied to any similar products, if one simply reads between the lines, and compares the differences between meters usefully. This is true even if talking about the $20K flavor, though the capabilities will expand greatly as meter sophistication (and price) increases. Just keep in mind that an expensive and more sophisticated meter will likely require some IEEE technical expertise, such as I actually have. I even have some background in microwave technology, and signal processing as employed by the intelligence community (selling and installing such technology, as well as general security and alarm equipment).
The greatest improvement high-end gear offers will be in the range of frequencies (bands) which can be analyzed, but there are many other benefits to better units, as well. For instance, the ability log to memory the readings as you go, plug them into a computer for even more signal analysis (big step up in usefulness), and improved sensitivity in range and angle of reading. A low cost meter reads rather broadly, say 30-40 degrees of arc, perhaps more, where my meter reads as little as 3-6 degrees of arc. Most low cost meters don’t even specify, and the ‘funnel’ nature of a broad angle contributes to misinterpretations of reading importance or meaning. Narrow is good, but you can compensate by taking care and multiple readings from multiple angles (triangulate).
Finally, we need to talk about what constitutes a dangerous signal reading on a meter. These devices display information in a wide variety of formats and scales which leave a non technical person with no understanding of what a high reading actually means. It only matters and is useful defensively if and when the reading exceeds safe levels. Different kinds of signals might be deemed dangerous at a lower level than the kinds of signal. For example, pulsed microwave is the most dangerous of all, and can be so at quite low strength. This is normally the main threat a TI faces, but most low cost meters cannot distinguish between them, or measure them correctly. This is not something commonly mentioned in their specifications, and you need talk to their engineers to inquire, to be sure the meter can deal with it correctly.
As far as safe levels, there are many levels established by many agencies of many countries for many purposes. What is deemed safe in one view or situation, may not be save in another view or situation. The nice thing about the expensive meter I use, is that it knows all these limits and indicates when one or more are exceeded. With a low end meter, you need to compare your reading to the various standards. Learn more about such standards, here.
Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.
The way it is
The Three Answers
I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
Knowing the difference can alter TI tactics
About Death Threats
Some 17 years ago, the Unified Conspiracy Theory was formulated. It was so accurate — it was able to predict in 1999 the 2001 downing of the WTC by jetliners and resulting Middle East Oil Wars, and other major news events. Now it can be seen at work in my newest book on the Bilderbergers — where fact and fiction collide… fatally.
Upate Feb. 20, 2017 Paranoia Publishing is set to start shipping hard cover copies of this book as early as first week of March. Amazon will carry it right away. ebook copies available direct from author now at half price ($6 – will return to normal price once hard copy is available) via paypal orders to proparanoidgroup at gmail com.
What led to this book? The definitive International conspiracy.
After ten years of research into crimes of the New World Order, I began to theorize that the bulk of America’s dark bumps in the night were not simply random crimes by assorted forces for varied agenda, but completely orchestrated as a single, logical, step-wise plan toward a single, yet visible goal. It resulting in the Unified Conspiracy Theory, and it was reasoned that if one knew the goal, and the steps thus far taken, such a plan was predictable, and as a theory, the ultimate test would be to do just that.
The first three predictions made with the UCT were so scary, that I had to take actions, do something… anything I could think of, to attempt to thwart them. The first was, that some kind of terror event would bring down the WTC with jetliners, and result in a series of Middle East Oil Wars. So, in the Fall of 1999, knowing no authorities would bother to respond usefully, or quickly, I published a quickly written screenplay featuring such a plot, and put it online with explanative warnings, hoping against hope it might force any such plan to be aborted. No such luck, of course, even though Oliver Stone’s people took a look at the script in search of a project. They thought it an impossible ‘false flag’ scenario.
The second UCT prediction was an assassination attempt on 1992 Independent Presidential Candidate H. Ross Perot, or his family, in order to force him out of the Primary run against Clinton/Bush. I took no chances, and this time, notified the Secret Service of my concerns, expecting they would ask me for details. I used my backchannel contact, someone I had worked with before on several Treasury matters. Some several weeks later, Perot did back out of the election, even though the very night he did so, he had won enough votes to be guaranteed a place on the General Ballot. A few weeks after that, my SS contact confirmed that an attempt had been made just before the Primary, against his family; mailed Anthrax. That has its own telling ‘false flag’ backstory.
The third was that there would be at least two more major false flag attacks to follow, specifically naming the type of attacks, and the cities. One of them was my home town, which I had predicted would suffer a bio-terror attack, and I even identified the means of delivery and rogue CIA Fronts to be used. But by the time frame where that might become a more current concern, I had finished my book set, Fatal Rebirth, which spelled these things out quite clearly, again hoping it might spoil any such plan. I also took steps to notify the City.
Again, no useful results, but fortunately, knowing such details enabled me to personally thwart that attack, or at least postpone it. It is featured on this Blog’s home page. But I was definitely able to thwart second, different terror attack in the same time frame, likely a Plan B to the former. It was called Gas Station Tasking when announced by President Bush; the use of private planes to dive bomb the area’s largest gas station while a tanker truck was offloading gasoline, at the busiest time of the street traffic day. This is also detailed on the home page.
This could easily have taken out two gas stations, four restaurants, two banks, two two hotels, and potentially, two major shopping complexes, and the traffic on the busiest intersection in the County, plus a major Interstate and two State highways. Identified, were two of FBI’s Top Ten Most Wanted Terrorists, and others, including the Christmas Tree Bombers. They were getting help from an FBI Agent known to me, and so, as it was a false flag operation, FBI, CIA, FAA, DHS, in response to my going public, never asked for my evidence, which included fingerprints, video, multiple eye witness confirmations, and more. The cover up was started before the President even heard about it. See home page.
Why UTC matters to this new book
Other UTC predictions have since come to pass, as well. The reason this is all mentioned here, at all, is because the UTC does not just affect America, it relates perfectly to World affairs, as well. And in this world, we have various Round Table Groups of Globalists who push for a One-World Government, which is to say, elements of the modern-day Illuminati. Such groups as the Tri-Lateral Commission, the Council on Foreign Relations, and the Grandaddy of them all, the Bilderbergers, and many more (even United Nations, World Bank, et. al), all tend to be cut from the same New World Order mold.
Which in turn is to say, largely fascist, all-too often satanic, and decidedly power elitists seeking to rule the World through manipulation and control of (everything), and willing to do so at any cost, by any means. Not to go overboard, it is important to note that, with the exception of the Bilderbergers, most Round Table Groups, like FreeMasonry, attempt to draw in newbie membership who are completely innocent Sheep. This gives surface viability and credibility of these groups to mainstream in ways which allow them to mask the darker roles they play in seeking the Globalist rule, while also giving fresh students to draw into their world, especially the more successful up and comers. There is a backstory there, as well, as I have first hand knowledge, x 2 telling examples, having been such an up and coming business man.
Ergo, this new book is designed to do much the same thing as Fatal Rebirth; to warn you just what these people are doing, and why… and why you should be mad as hell about it and doing something to stop them. Only, my new book is global in scope, where Fatal Rebirth concerned itself only with America. And, while Fatal Rebirth began unfolding in 1947, Who’s Killing the Bilderbergers is a current-day affair. As such, it is perhaps more urgent, that you read it, and soon — because the future is revealed to be bleaker than the Dark Ages and time of the Inquisition, for those not forewarned and forearmed.
The plot thickens
I describe this book as ‘an International Novel of Novel International Affairs.’ A grand murder mystery across multiple Continents, trying to resolve mysterious death after death of prominent Globalist leaders. Are they simply random deaths by happenstance, or murders by elaborate design? Officially, they are not due foul play, and yet… each one has many unanswerable questions clouding that view. Just as troubling, their deaths seem to be tied to various strange conspiracy theories, while at the same time tied to various Globalist agenda, either narrative affording motive for murder. And, of course, it is soon enough discovered that they all turn out to be Bilderbergers.
By the time the truth of the deaths starts to be uncovered, the UTC will have started to reveal itself in action. In like manner to UTC’s ability to be predictive, readers will be propelled quickly into the future, headlong into the one final prediction which is the ultimate form of fatal rebirth… for us all. That particular prediction WILLmost certainly come to pass; it has, after all, been foretold by many authors well before my time. Among them, Satanist and high Mason, Adam Weishaupt; it is the entire purpose of and predictive goal of the Illuminati Plan, as he formulated it in 1776, when the group started their journey toward a New World Order (he first coined that term).
As this book reveals, just when it comes to pass, is largely up to you. You, are what you’ve been waiting for. They hope you don’t know that, and remain Sheeple.
An important detail
And, along the way to that story-ending element, readers will also encounter countless real-World conspiracies laid at the feet of Bilderbergers, all done in ways which let the individual decide for his or herself, which, if any, may seem fanciful, and which are more likely true. There is much documentation within the main body, plus more than 150 footnotes (an average of one every page turn), to help that process along. Some of those footnotes are illustrated graphically. The Climax and Ending will then show you the progressional nature of the Globalist plan as it unfolds toward the very last step in the plan, the point of no return for Mankind. These conspiracies back up the UTC usefully, and in fact, understanding them helps refine the UTC more usefully; one tends to validate the other, in both directions.
There is a little known and underreported TI targeting method and symptom based on Stray Voltage, which is usually marked by a dramatic prevalence of ‘static discharges’ when touching things. But there are other symptoms, and happily, tests and cures.
Stray voltage is the technical term given by the power and electronic industries to a situation where an electrical charge is present in the ground, itself. It can also be present in a structure, such as your home or workplace. It tends to be far more likely to be present at the ground-floor level than upper floors, and is commonly found present at insignificant levels almost anywhere electricity is used. It can even be found in places where there is no AC power nearby present, at all, if there is Quartz bearing rock in the substrate. Concentrations of Ferrous rocks and ground water near the surface can impact, as well.
In structures, the type of structure materials and design can impact prevalence, as can furnishings and the layout of property. And though considered rather rare as an actual problem, for some reason, it is normally thought of or understood as being significantly more problematic in rural farms (especially noted in dairy farms) more than in bedroom communities, though it can be found even in downtown high rise areas. It seems to impact Cows in many observable ways, to include reduced milk production, troubled births, general health and premature deaths.
The power industry takes great care to prevent stray voltage levels from being detectible or able to impact living things, including you and me, but things can go wrong. When that happens, and depending on how strong it ends up being, it can be quite detectible, and generally, unpleasant, if not harmful or even dangerous. Some forms are capable of outright electrocution, such as created by downed high-tension power lines. While this post uses the term Smart Meters in the title, it is less about that, except that a possible conspiracy may exist between Smart Meters and stray voltage, as outlined below.
There are many reasons stray voltage might be present at problematic levels. I see these as divisible into three threat levels and causes. The first may be relatively minor in threat level, caused by natural eventualities unrelated to targeting, and unlikely to escalate in nature. An example might be living near to high-tension lines running parallel to metal fencing on your property, where a kind of induction takes place causing the fence to produce an electrical current.
The second is also unrelated to targeting in causality, but may be far more serious, even dangerous, and quite likely to escalate — such as may due to electrical shorts or combinations of other unhappy electrical happenstances. The important thing to take away is that the bulk of stray voltage may have nothing to do with being targeted, but any presence which is detectible should be of great concern to anyone, and pinned down immediately.
The third? I have recently discovered a new possibility, thanks to a coincidentally… even accidentally discovered set of facts learned from one of my very first TI clients. I say coincidentally, because in considering the new information, it dovetailed very nicely with other client information which had otherwise led nowhere. As result, I am now quite confident that there can be deliberate targeting by artificially creating and controlling stray voltage for the purpose.
It can be used to establish a variety of selectable threat levels and targeting effects (symptoms), to include other forms of electronic targeting. This level is not officially recognized to exist by the power industry, though the potential for conspiratorial knowledge and participation in its use surely exists. One would be unwise to broach the possibility with power companies or other parties, unless part of a legal response effort, as mentioned herein. The good new is, that regardless of the three types, any serious threat levels can be dealt with, almost always.
To weaponize AC power in this way (there are other, previously known and frequently spoken of ways, such as found in my book, MC Realities), simply requires shunting of power to the earth at one or, as is more likely, multiple locations around the property. This would likely be done through a control mechanism to throttle the voltage diverted, even to an ‘off’ position, something akin to a remotely controlled dimmer light switch. Naturally, it will consume significant electricity, and that will turn out to be a blessing, as we shall see.
After reading this short introductory post, a TI would be well served to learn more about the topic, even if not thinking themselves impacted by stray voltage, currently. As the link to that information only addresses the first two reasons, the reader should indeed finish this post, first. After reading BOTH sources, then, and only then should they attempt to fit their circumstances into the dialog and consider the best course of action. Feel free to contact me if unsure, at proparanoidgroup gmail com.
Symptoms, regardless of cause
At natural ambient and other low levels of stray voltage there should like be no outward signs discernible. We only need worry about the phenomena if we do start to sense effects. We have all experienced the random static discharge of touching a door knob after walking across a carpet. While discounting such experiences as carpeting woes, they can also be due to stray voltage, which can certainly augment or simulate carpeting-caused static build up, as not all carpets generate the problem to the same degree, or even at all. When you get such discharges in the absence of carpeting, that is a typically a clear sign of stray voltage — though cold dry air can contribute, as well.
Note: normal static discharge is usually relatively high in voltage but low in amperage, quite akin to that associated with spark plugs in an engine; unpleasant to experience, but relatively harmless, more likely to cause injury from jerking away with violent contact with another object, than from the actual shock. They may generate a small visible flash of light, an actual spark jumping a few millimeters, at most. But stray voltage can produce far more varied and dramatic, even dangerous results. There have been instances of seeing discharges which travel inches or even feet, making zapping or popping noises, producing heat. The risk of fire and explosion cannot be ignored, where flammable fumes or pure Oxygen sources might be present. Obviously, the voltage levels in such cases are even higher, as may be the amperage and risk of electrocution.
Serious levels of stray voltage can cause effects similar to other forms of electronic targeting, and may indeed be augmenting such targeting from other sources. In point of fact, especially for persons who also suffer electro-sensitivity, there is a small chance that some persons who see themselves as being a TI may in fact not be. Accidental, or even natural stray voltage might be causing enough symptoms of targeting, by itself, to erroneously presume targeting. This would be good news if the individual is not also experiencing non electronic targeting symptoms, such as organized stalking, or other forms of harassment.
Electronic targeting symptoms are radiographic in nature (radio and electromagnetic), and therefore, stray voltage symptoms, would typically be some combination of any number of things which match those same symptoms. The range of symptoms is broad, from headaches, nausea, dizziness, mood swings, sleep problems, sensations of burning, tingling, vibrating, tinnitus or humming sounds, as well as more unpleasant physiological symptoms such as heart palpitations, chest pains, muscle and joint pains, fibromyalgia-like conditions, twitching or trembling, and so forth. Arguably, there are other symptoms, as well, but these are the more commonly reported ones, and the easiest to identify as being abnormal. That said, the caveat is valid: don’t presume a system does not have a medical explanation; always see a Doctor (without talking about targeting) to make sure you do not have a ‘simple’ health issue in need of treatment.
In fact, stray voltage can simulate or stimulate a variety of general health problems in humans and animals, alike. When doctor’s tests find no other explanation, stray voltage (or other electronic targeting) may be to blame. Some animals are more able to sense stray voltage and will naturally avoid areas where it exists in undesirable levels; they can be ‘Bird Dogs’ to the problem by strange behaviors or health issues. High levels of stray voltage can also cause plants to die, or may result in random discharges between objects otherwise insulated. By way of example, a visible mini-lightening flash between an automobile and the ground or nearby fence or garage door frame.
The interesting thing about stray voltage is that its effects may be amplified by humidity and moisture, or even temperature. Therefore, such effects might tend to be more noticeable if walking in the rain or while wet, as when exiting the shower. Serious stray voltage could make swimming pools and standing water dangerous. But even relatively harmless but noticeable levels of stray voltage can be dangerous, because whatever is causing them could be capable of sudden and unexpected increases to dangerous levels. Take no chances, and deal with it right away, if symptoms are present. See below.
Smart Meters and stray voltage; a possible new conspiracy
A lot of people, including many TIs, feel that the entire power industry’s move to Smart Meters is a Big Brother and/or industry conspiracy. Like most good conspiracies, there are multiple theories involved, ranging from price gouging to spying to mind control, and more. But the big concern and commonality in many of these theories tends to include the very same health issues as found in stray voltage.
Yet when the industry itself, as well as third-party independent testing firms investigate, most such studies indicate smart meters are no more dangerous than your computer’s wifi connectivity. I’m quite unconvinced about their conclusions, but I also understand how conspiracies work, and how the intelligence community thinks — and specifically, how they think about and employ mind control tactics.
It dawns on me as result of the dichotomy between the reality of Smart Meter user experience and test results, that there may be a conspiratorial answer which explains the conflict. Once a Smart Meter is installed, perhaps Big Brother comes along and uses the Meter to establish stray voltage. That would account for the health effects and higher bills, and certainly still enable spying and mind control capabilities.
The simple fact is, the studies giving a clean bill of health to Smart Meters are only testing the meters and the air waves. They are not testing for stray voltage. So, if you have a Smart Meter and are experiencing Smart Meter woes, perhaps you ought to test for stray voltage. If you find it exists, you will undoubtedly be advised by a lawyer that you have an excellent actionable case against the power company.
Note: It has been discovered that the power industry, in order to address public distrust of smart meters, is instead apparently installing meters which look identical at a glance to the old mechanical meters, but which conceal a ‘trojan horse‘ Smart Meter under the skin. They are, however, supposed to be easy to spot. TAKE NO CHANCES, and check YOUR METER, today, even if an ‘opt out’ user. And, if told you were not getting a Smart Meter and discover a trojan horse, you once more have a reason to contact a lawyer, and the media.
Stray voltage as targeting weapon
Deliberately causing stray voltage as a harassment tool is not the only ‘advantage’ to perps. Because electricity can carry embedded RF signatures, it can cause an entire area, such as a home and its yard, to become a kind of transmitter of other forms of targeting signals, just as can house wiring. It can therefore become a kind of amplifier of such methods. But to employ it requires something which should ideally be relatively easy to detect, and defeat.
Simply shunting your existing AC power to ground, a deliberate ‘short,’ if you will, is NOT normally going to be done because the power bill would go up dramatically, and tip the victim off that something was amiss. Therefore, the perp would need a second electrical service on site, which means a separate meter head, which they then ‘weaponize’ for the purpose. In apartments, it might simply mean using a neighboring unit’s meter. In a home, it may mean a separate power line to a concealed meter somewhere on the property or just outside the property line. It may be an underground service, even if the property is otherwise serviced by an overhead feed.
In an apartment situation, all the meter heads for a group of units are mounted at the same location, and labeled as to address/unit. If suspicious, you can wait until a high consumption power period (i.e., using your stove to cook), and then go look at the meters. If you do this when you see signs no one is present at the suspect neighboring unit (not using their stove), but their power meter is drawing more power — you may have found proof of the method and the perp.
In the case of a single domicile, simply call the power company and ask if there is more than one meter assigned to the address, or if there is a meter or extra meter assigned to neighboring lots. If the answer is yes, ask if any extra meter is in use and being billed, or if you might be able to acquire the meter for your own use (to justify why you ask). Any extra meter may be proof of the method and, with some legal steps, lead to identifying a perp.
Proving stray voltage
To confirm any such targeting, you will need to prove stray voltage is present, the same thing which should be done if symptoms are present and targeting is not involved. There are three ways to do this. One is to call the power company, which has a legal liability to insure stray voltage does not exist, in the same manner that natural gas providers must worry about gas leaks. Another is to call an electrician. Either of these methods can also result in identifying and curing the source cause of stray voltage. It will likely be up to you to document their findings, such as with video or witnesses — though they may be willing to provide written documentation where they bear no liability risk. Again, you probably should not mention targeting concerns to these people.
The third method is less useful in terms of evidence unless you are an electrical engineer or have similar credentials validating the quality of your findings; you can obtain test equipment and test the matter yourself, again documenting every step as you go. It is not quite as simple as the illustrated image, and should involve more than one kind of instrument. The procedures will vary depending on where you need to test, and what the location is like or contains in the way of objects and surfaces. The entire property should be assessed, and if done usefully, will ‘map out’ zones of impact from high to low. More information on the ‘how’ is available online, including that link you should read after finishing this post.
Regardless of which method used, where targeting is suspected, know that the power can be turned off remotely as soon as any perps involved discover testing is about to take place. This means you will want to covertly order any such tests, and ideally, try to find a way to avoid having whomever shows up to conduct the test show up in a marked truck, and having them quickly first test somewhere out of sight from any possible perp surveillance position. THAT is the hard part. Doing that yourself is much easier, of course.
If you are a TI or suspect same, I urge all readers of this post to comment as to their findings or conclusions upon further investigation. In two and a half decades of contact with 12,000 TIs, I have only known of perhaps three or four cases where stray voltage was in any way evidenced. As result, it appears to be an entirely ‘unknown’ targeting method (assuming such was the case). I have only recently been made aware of the possibility that a power company can have two different meter heads assigned to a property under two different account names WITHOUT the property’s owner/renter’s awareness, even though BOTH are in use — by SOMEONE.
It can only serve the greater TI community to learn if this is more wide spread than thus far observed, especially given that it can be easily detected and defeated if and when in use. Ditto because of the advent of Smart Meters, in which case this new information may be a very useful weapon for use by activists against the power industry, and legal pressure (lawsuits) by user-victims. It is equally important because where targeting is not involved, education on topic may lead to resolving a potentially deadly stray voltage of less sinister origin, and address final cure to otherwise unresolvable health issues.
And, in closing, let me state it once more. Any instance of serious stray voltage, even if not related to targeting, likely represents an actionable legal issue; you should consult with a lawyer about suing the Power Company and/or whomever pays the bill on any secondary meter head causing the effect, or any otherwise weaponized meter head.
OK, it’s true. There are at least a half-dozen ways the government can ‘claim’ I’m a terrorist. YOU TOO, for that matter. But I have a Record of Arrest and Prosecution ‘sheet’ to illustrate one of the ways I am definitely a terrorist to someone, including people that think I’m merely a conspiracy theorist. I am not ‘mere,’ at anything I do…
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
What makes you a terrorist when you live in a Police State?
Simple answer: anything you do. There have been so many Constituion trampling Acts of Congress and Executive Orders, all so vaguely worded as to allow the broadest of interpretations, that it is almost just that easy for someone in government to label YOU (and certainly me) a terrorist. That can have very unfortunate consequences, depending on who labels you, why, and what they do about it. You can end up on the no fly list, or some kind of watch list, or even be vanished forever by Men in Black whisking you off in a black van.
One such example is, that being a conspiracy theorist automatically makes you a terrorist according to FBI. That’s bluntly stated, but true, as an article at Public Intelligence illustrates: “A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. ” The flyer, linked in the article, specifically includes 9-11 Truthers (that’s about 1/3 of the U.S. population).
OK; I’m a conspiracy theorist, or if you prefer, a Conspiracy Terrorist. But I am no ordinary ‘theorist,’ because I have a R.A.P. sheet… a Record of Arrests and Prosecutions. And here it is, below the FBI Fellon ID Card (which shows that not even FBI always gets the right man)… but be sure to read the summary text before you wonder why I’m still walking around freely.
R.A.P. Sheet, H.Michael Sweeney
1976 Wire Tapping, 2 counts, charges dropped for insufficient evidence
1980 Embezzling, charges dropped after resignation from company
1983 Counterfeiting, Drug Smuggling, sentenced
1984 Wire Tapping, charges dropped for insufficient evidence
1985 Shoplifting, 4 counts, sentenced
1987 Fraud, Embezzling (pretending to be a Pastor), Bad Checks, charges dropped after restitution
1988 Wire Fraud, 3 counts, sentenced
1988 Smuggling, 2 counts (bioweapons, diamonds), sentenced
1990 Espionage, Interception of Electronic Communications, charges dropped by NSA intervention
1991 Bank Robbery, 4 counts, sentenced
1991 Wire Tapping, 4 counts, cold case due to flight to avoid prosecution
1992 Fraud, 3 counts, Witness Tampering, 3 counts, Withholding Evidence, 2 counts, Murder,
cold case due to flight to avoid prosecution
1993 Breaking and Entering, 2 counts, Grand Theft, charges dropped after restitution
1994 Wire Tapping, cold case due to flight to avoid prosecution
1994 Attempted Murder, 12 counts, case turned over to Internal Affairs, and dropped
1996 Espionage, 3 counts, Violation of Civil Rights, cold case due to flight to avoid prosecution
1998 Wire Tapping, Stalking, cold case due to flight to avoid prosecution
1998 Grand Theft Auto, Operating Chop Shop, 3 counts, sentenced
1999 Possession of Controlled Substance with Intent to Sell, sentenced
2001 Bioterrorism, Attempted Assassination, investigation closed by DOJ intervention
2002 Terrorism, 4 counts, cold case due to flight to avoid prosecution
2004 Bioterrorism, case closed due to lack of evidence
2004 Cyberterrorism, Hacking (of CIA’s Web site), charges dropped in exchange for services rendered
2016 Armed Robbery, 2 counts, cold case due to flight to avoid prosecution
2016 Bank Robbery, cold case due to flight to avoid prosecution
By now, if you actually read the full list, you realize no one person could be guilty of all those crimes and still be walking free… and that there were crimes on the list immediately after incarceration, and no jail breaks to account for that. This is because these are not crimes that I committed, but crimes I have investigated and exposed, or helped expose and prosecute, often working with Police, FBI, SS, and CIA, sometimes working against rogue elements of those and other agencies, even spy agencies of other governments.
Left out of that list, are perhaps 200 Stalking, Wire Tapping, and Torture cases I’ve worked on as online consultant with victims of such affairs (I’ve had contact with 12,000 individuals in that kind of predicament). I left them out because it would have made the post unreadable, and that’s a shame… a disservice to the thousands of victims of this form of abuse of power and conspiratorial corruption of principalities and powers.
So I do not claim to be a mere terrorist, but to have stopped terrorism. But neither am I a mere conspiracy theorist, because many of the conspiracy theories I’ve investigated have put people in jail, or at least shut them down and forced them to run away. One Governor, possibly two, a National Guard General, an elected County Sheriff, two Police Chiefs, a Criminal Investigation Division Lt., a C.E.O. of an international software firm, and a host of lower law enforcement personnel have all vacated their posts (some being jailed) after I finished doing my thing. While I cannot claim every one of them retired or otherwise departed their posts because of me, as I was not allowed access to official internal documents, I’m fairly certain a good number of them grumbled my name under their breath on the way out the door.
All that said, I hope that you, dear reader, have come to understand that a conspiracy theorist is no different than any other standard investigative force of a more official nature. Except for two small things, we all try to fit the available evidence with the environ of facts to determine the truth. We both form hypothetical postulations as to suspect and motive, prove opportunity and method, and try each point of evidence against all others which might disprove the hypothesis (though as we see all too often, many criminal cases are happy to prosecute the innocent if they think they can make a strong enough case and hide the truth).
We both theorize up front. The first difference is that conspiracy theorists do not have the luxury of making an official determination, while the official investigators do. The second difference, and most important, is that we start with questions regarding failures in logic in the official findings and reports; we question government, which is not only the right, but the DUTY of every citizen, always. How else will you ever find a cover up? We know there have been all manner of cover ups exposed in media over the last few decades, and I remind you, you NEVER have a cover up UNLESS there is a conspiracy, because a cover up itself REQUIRES a conspiracy to execute it, and the affair being covered up is always so complex that it, too, MUST by default represent a conspiracy. Guaranteed.
OK, FBI, come and cuff me… unless I’m wearing a bomb like other terrorists,or have run off to Mexico to escape your ‘justice,’ in which case, just have a better day.
Once more, we see the Federal Government usurping power in ways which both benefit the big corporations at the expense of personal freedoms and financial viability of citizens. This time, it’s the FCC, and not the BLM, and they want to eliminate any chance for you to watch local television without paying through the nose for it… and suffering de facto censorship.
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
FTC to Kill Local Television as We Know It
Tuesday last, a little heralded announcement by the FCC once more revealed how controlled mainstream media is. They, more than anyone, perhaps, should have been screaming the news from the rooftops, and complaining about it, as it affects EVERY major and secondary television station in every market across the country. The ramifications are so broad and sweeping as to threaten the very social fabric which defines us as a nation. In summary, the threats are as follows:
- Eliminates all local television service as we know it today, virtually ELIMINATING ALL OVER THE AIR BROADCASTS. No more ‘free TV.’
- All licenses by FCC currently in place are cancelled, and ‘up for sale,’ they want to raise 60 billion dollars which will be unaccountable funds off the FCC budget. This means they can be spent on any black project without any accounting.
- Major stations (e.g., your local ABC/NBC/CBS/FOX affiliates) will be paid many millions from the sale, far more than the stations are actually worth; hush money not to protest, we must presume.
- Secondary stations, including repeater stations or small unaffiliated stations in deep rural markets, and even possibly PBS, will be paid NOTHING, a virtual THEFT, and possibly, a loss of all public broadcasting systems!
- All will be sold to Cable and Web content providers, forcing consumers to get any TV by paid subscription or on-demand purchase.
- Significantly eliminates local news coverage, limiting it to official sources only; the government’s preferred message, a form of censorship which effects de facto mind control.
- Stages the FCC for total control of Web content under the new ‘authority’ it declared for itself last year; easier to censor and dictate what you can learn if there is only ONE resource and it is controlled by government.
It follows the Fascist model: The plan is insidious beyond belief once fully understood. It is perhaps no coincidence whatsoever that it follows Obamacare. If one reviews history of the quiet takeover of nations by Fascists and other dictatorships, those ‘bloodless revolutions’ always start with the complete takeover by government of all health care, followed next by takeover of all media. What follows is usually great financial and social upheaval allowing significant draconian responses, to include something along the lines of Hitler’s Brownshirts and the SS, and a permanent war footing with an expanded military and military police state. But people never learn by the mistakes of history, and there is plenty of that…
It happened that way in Germany, Italy, and in South America, it happened again and again. In each and every case, the takeover steps were quietly initiated and never fully understood even by those involved in enacting the changes. In every case, they inflicted greater hardships socially and financially upon citizens than those woes they claimed would be addressed thereby. In each case, a central power figure emerged who responded with ‘law and order’ and bypassed, neutered, or altered the form of government to a Fascist regime.
Unfortunately, any and all of the current Presidential candidates, save one, could fit that bill in this author’s opinion. Trump appears to be a closet fascist, Cruz appears to be one of the same old gang of criminals who brought us to this point in the first place, Bernie is a closet Communist, and that awful woman is simply a criminal rapist of nations and peoples. But my opinions are unimportant. Even if whomever is elected is not set to be a fomenter of fascist revolution, the power elite who manipulate politics will simply assassinate them or blackmail them to assure the desired outcome.
Naturally, like most draconian moves by government, the official propaganda is worded exactly the opposite in tone to the reality. That’s why we get Bills that actually accomplish the reverse of their title, like ‘Affordable’ Health Care Act. Believe as we say we do, and ignore what we actually do.
Take a look at FCC’s official page, here.
Now, lest you think me simply another lunatic conspiracy theorist, I got my first wind of this plot, to include all points cited herein (save my opinion on SOME of the candidates), from a conservative call-in radio show where the station owner of a secondary market called in to shout a warning and explain exactly how it was rape and pillage of the television industry and the public in favor of Cable and Web bigwigs. I don’t make anything up; I don’t have the time nor inclination!
- Big Brother FCC Plans Internet Tax/Controls What Happens in Homes (universal free press)
- FCC No Longer Just Big Brother, Now Big Parent (huff post)
- FCC Sparks Fears of Big Brother in News Room (fox nation)
When I created the Free Will Society to aid stalking victims, one of the lofty goals was to eventually build some form of Safe Haven community for them. That dream now seems on the threshold of coming to pass. The result is Free Will Haven. iWhere can a targeted individual get help? Free Will Haven; Targeting Free Intentional Community for Stalking Victims by H. Michael Sweeney proparanoid.wordpress.com proparanoidpress.com proparanoid.net copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting. What is Free Will Haven?
Free Will Haven?
MAJOR UPDATE/REWRITE: Aug. 2017. It’s been three years now since we formed the Free Will Society with the intention to establish a low-cost, self-sustaining, targeting-free intentional community (Free Will Haven) for stalking victims who can’t get a fair shake at life in populated areas. A lot has transpired, some of it really good, some of it bad, and now, it looks like we are ready to ramp things up a bit. So I thought this page should be rewritten, and perhaps, be simplified. Very little of the original post remains, or remains unchanged, and I have added rather a lot about the Beta site which was established and our plans for an even better location. Over 2,500 victim days targeting free! Compare that to over 12,000 stalking victims I’ve had contact with over some 25 years where almost every victim says they can’t get even a few days respite, if not for the stalking, then the fear of it.
Intentional Community? Beta site has been undertaken
Wikipedia’s definition for Intentional Communities is a full paragraph long. Simplified, it is a community planned from the start to cater to specific persons of like (interests, beliefs, goals, needs, etc.), typically favoring alternative lifestyles which foster those goals. You can learn more about such communities at sites like tedxblackrockcity.com (informative video), ic.org (a kind of ‘superstore’ of centralized info on topic), dba Fellowship for Intentional Communities (Facebook page). The Free Will Society is now a Member organization of the FIC, which gives us access to a mountain of informational resources and other aid not previously enjoyed. Much of this is now available and useful to FWS Members as result.
In Free Will Haven’s case, our goals are ecological and consumptive sustainability (not to be confused with the New World Order’s use of ‘sustanability’ when pushing Codex Alimentarius, Agenda 21, GMO foods, Genetic Engineering, Global Warming, Carbon Tax/Credits/Currency, etc.); survivability (in this case, against all forms of surveillance, stalking or targeting of individuals in any manner), and financial and spiritual wellbeing (the unchecked pursuit of happiness through exercise of God’s gift of Free Will). Defensive survivability lays at the heart of the plan, and is based on the many books and online consultancy I have made available as a privacy/security expert to targeted persons for more than 25 years as The Professional Paranoid, the title of my first book.
Low cost is addressed primarily by focusing on portable tiny homes, or RV vehicles for short-to-long-term housing, and communal style co-op sharing of centralized services and site-produced foods and resources. Cottage industry will be encouraged to augment personal incomes, and/or like projects for the collective. It is the goal to allow one to live a decent and enjoyable life-style for less than $500 a month, total outlay (I’m managing on $400), that figure based on purchasing of food and supplies from outside sources. Once self sufficient, costs would decrease accordingly.
I think of FWH as a bit more flexible than a community. I see it as also acting as a short-term hospice for those seeking temporary shelter and healing from their ordeal, and in some cases, a school of defensive arts, and even self-replicating factory. Residents can stay as long as they like. Once fully rested and obtaining stability in their lives through being targeting free for a sufficient period, they might wish to return to society, perhaps under a new identity (we can help with that), or, perhaps, having learned what it takes to establish and operate such a community… go out and create another one, somewhere else. We would like to see several of them nation-wide, and even internationally.What makes Free Will Haven an intentional community?
Tiny homes and RV life style?
A tiny home generally references any small living space intended to be extremely practical and economical, though minimalist in nature. As a rule, this commonly means either a starter home for a young couple or single individual, or a retirement home for someone without a family, as a tiny home cannot have many rooms dedicated for family functions and individual compartmentalization.
The original tiny home movement included exotic efforts with costs of $1M or more not uncommon; ultra modern, hi-tech, and with prestige designer labels attached. The grass roots version, on the other hand, has gone wild finding ways to do as well with less, with costs ranging from well under $10K to perhaps an average of about $40K for the higher end; about what one might put down on a conventional home mortgage. This has resulted in an almost unlimited array of possible home design types and, as result, flexibility in meeting individual needs and tastes, like these as found at pinterest.
You can have tree houses, container homes (check these out), domed homes, spray cement (free-form shape) and similar homes (check this video out, and this), underground homes, and more, including homes that simply look like a normal home but scaled down… some of which are on wheels. That brings us to the fact that a motor home, RV vehicle, trailer, or even a manufactured home also qualifies. All of these are on the drawing board/table at Free Will Haven.
The ones we favor most are the ones you can order pre built and delivered to the site (look at these, and you can even get an ‘Ikea’ home complete with furnishings), or the ones you simply buy plans or kits for and then build yourself (like these). Or, they can be ad-hoc, and built from whatever you can cheaply get your hands on. Google any of these home types for endless solutions to choose from, and when it comes time to actually consider residency options, we will work with you to fine tune or better the ideas you favor.
I have established a special page chock-full of information about the ins and outs, pros and cons of the almost endless options available in choosing an RV type or style of Tiny Home. It also addresses the lifestyle, itself. RV solutions provide a quick and dirty ‘home’, completely self-contained with everything needed including their own backup generators. Tiny homes tend to be minus some aspects, such as bathrooms, but can include them; its up to the individual. They can end up being more roomy and comfortable than an RV, and seem more ‘homey.’
The Free Will Haven concept encourages use of an RV upon arrival, and the construction/installation of a tiny home (many of which can be portable and towed like a trailer). If electing a tiny home, any RV in hand can then be sold or rented to someone who does not have one, sold for long term, rented for short term. The same can be said for the Tiny Homes should a resident choose to relocate and not take the home with them. There is no reason anyone should feel that becoming a resident has no exit options. Quite the contrary. It increases options.
Beta site effort proves viability
The original Beta effort has resulted in the purchase and operation of a rather off-grid beta site by one of our founding members using their own money. It operated for about two years serving two TIs using most of the basic plan established by the Free Will Society. For whatever reason, the owner/operator of the site elected to abandon reliance upon and participation with FWS, though we had provided money to help pay for installation of electrical power to the site. There are clues it involved personal matters as well as relationship issues.
While there is some mystery as to why a refusal to engage in dialog, it is clear the Beta site was successful in terms of the key-most goals; survivability targeting-free. We are grateful for their effort. The Beta site failed only because of eviction for contract violations of some sort, presumably through miscalculation by the owner/operator in absence of help from the FWS. Due diligence is always upon the purchaser, who was at a disadvantage in many ways in terms of ability to do so. It is a regrettable outcome.
Meanwhile, I myself have been living as a homeless person in a motor home. I have essentially established a semi Beta site of my own where I was the only resident, also in a deeply rural environment. Between my experience and the actual beta site, there has been a total of more than 2500 targeting-free days. It has been a joy for me, and the Beta site operator has come forward publicly to express positive views towards the experience and an intention to attempt yet another effort. In that effort, the operator has affiliated with a new core group with a troubled past with respect to credibility and honesty, and we wish them all better luck.
The concept is proven. 2500 stalking free days!
Now it is time to move forward more earnestly, and do it right, this time.What is a tiny home like in Free Will Haven?
The future: location and logistics?
The original beta site (image) was less roughly 1 acre in size, and rather a long, narrow unimproved property at a high altitude in a colder part of Oregon with a dry clime (annual high of less than 60 degrees). It had no water but was near to a river with drinkable water and fish, and she had a water filtration system. It would support a well at shallow drill depth. It had no power but as it fronted a main highway for the area, it did not cost much to install power. It would support raising crops, and was established with an Airstream trailer (very nice) and several other towable items, and self-assembled Quonset-like structures for storage and greenhouse function. It is not known if a second RV was brought in for the second resident; the Airstream is thought to sleep up to four persons in two different accommodations. Still, it is not a terrible site, actually fairly decent given it was purchased sight unseen and based on a limited budget.
This site was not chosen with the help from or according to the ideal guidelines established by Free Will Haven. Since the purchase was made with the operator’s money and in consideration of their small income, that exercise of control was perhaps expected. The basic-most needs were considered to the extent possible. But While there was some good visual separation between the site and neighbor structures by trees, it was not as private as FWS would prefer. There are two neighbors within about 600 feet of the property (less than a city block). The nearness of a main highway, though also buffered with a lot of trees, is also not a perfect situation. I do like the fact that the rear of area (not shown) is backed with a high bluff which is uninhabitable, and provides security.
We can and should do better. Recently, my Publisher bought some property at auction and invited me to live there rent free. While it turned out not to be possible due to dense forestation requiring expensive work just to get onto the property with a motor home, the method of acquisition was unrealized in previous review of potential sites. Things are looking up.
Compare the the Beta site to this 20 Acre property which represents the ultimate site for meeting goals established for Free Will Haven. The road is a gravel road established for timber harvest and is seldom used by anyone but hunters — residents could hunt on the property if desired! It dead ends at the property, which is a flatland at the top of a hill, and continues into the property as shown for easy access.
It has multiple developable locations and area for growing crops without the need to fell trees. There is NO ONE for miles in any direction. These are the kinds of features preferred in the actual site. Depending on many factors, a really good site could be as small as perhaps 5 acres and still prove satisfactory. Geographic features such a hill can negate concerns about privacy as relate to adjacent properties. There are many such opportunities; cliff faces or steep terrain, rivers, national forests, etc., can all be allies.
This particular location is very inexpensive to purchase despite the larger acreage, simply because there is zero access to commercial power at any cost. That lets it out of consideration, as neither solar nor wind power enjoys economy of scale in the levels required to support a comfortable life style for a given individual, much less a collective. It would take approximately $9,000 per living space for solar, for instance — without a battery system to cover nighttime use (another $4,000). Figures are based on the same power level as the generator output in a typical Motor Home. If one had a few hundred thousand to tie up into an off-grid house, that would be a small bit of the budget. But that’s not your typical stalking victim. I’ll mention here that the weather is much nicer at this location, too, withs highs in the 80s.
The all important factor in any land acquisition, of course, is cost, including what it will take to occupy it successfully. As it happens, there are properties which fit these kinds of requirements which are available at a price I can afford. Sort of. The trick is finding them where the owner will finance with ‘ez credit terms,’ which, fortunately, is not unheard of. I have to be able to handle the monthly payment out of my pitiful social security payments, and have a low enough down payment that I still have money to pay for bringing in power and a water storage system, and a few other items such as a storage shed, and a freezer (a Motor Home typically holds about four days worth of frozen foods).
Alternately… should the Society obtain a large donation or one of our members win the lottery (I buy tickets), I’ve found marvelous properties in Missouri which offer as much as 160 acres fully developed as a farm or ranch capable of producing an income suitable to cover mortgage… for less money than it would cost to buy a house in most big cities. Many of these have rivers, lakes, or ponds and wooded areas full of all manner of wildlife, such as Wild Turkey, Geese, Ducks, Deer, Boar. This allows hunting and fishing right on the property, many of which have hunter’s cabins or blinds in place. But I’m not waiting for $300-500K donations.
I’m scouring land listings for something I can buy NOW. And, I will be starting a new gofundme for anyone willing to help, and/or wishing to participate, perhaps, as resident.
Participation: Membership and Residency
Anyone and everyone is requested to join the Free Will Society, stalking target or no, to support the Free Will Haven project (and other projects planned in the future). Annual membership is $25, currently payable by PayPal to proparanoidgroup at gmail com, adding comment to that effect in the message it requests in the process. Membership gives one access to more detailed information, including the history thus far of the project in detail, and an opportunity to participate in and contribute to the ongoing dialog and direction of the effort. It also gains access to dozens of resource materials from our membership in the Fellowship for Intentional Communities.
One must be a Member to apply for residency. There is a separate $25 fee to cover the application process, which is required to insure that all residents will be able to benefit without social incompatibilities. It is unfortunately true that there exist people who claim to be stalking victims who are not, for instance. While one can join and apply simultaneously, I advise against. Membership will provide access to a flood of information and direct contact with other members, and could conceivably end up changing a person’s mind about residency. One should be fully informed before deciding.
The application process further educates the applicant toward decisions about if, when, and how to undertake the actual move. It analyzes the applicant’s ability to actually undertake the venture with a reasonable expectation of happy success, fully informing them of what to expect in the way of possible downfall, all based on their precise personal situation. A checklist of things to consider and steps to be taken is reviewed in great detail, critical in determining the true cost of ‘move in.’ Once approved, they need not act immediately, and can work through the checklist at their own pace, as may be dictated by anything from costs to family affairs in need of tending.
The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some Satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.
Are there any patterns in mass shootings?
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
Is there any proof mass shootings are not random?
What you will learn reading this post of the posting series…• that select shooting lines form a 3-D perspective view of Cheaps and transparent depiction of all inner passages; • that there are specific ties between Cheops and the goal of the New World Order; • that Cheops is a kind of key to understanding European Illuminati/Templar relationships to mass shootings.
Are mass shootings by intelligent design?
Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View
Is there a mass shooting conspiracy?
Mysteries of Cheops
In the prior post we saw ties between shooting event lines which formed Masonic and Satanic symbols, and a series of orange lines which led us to the Great Pyramid, Cheops, in Egypt. While those were quite remarkable and sufficiently consistent to defy any chance of random coincidence, what follows will dramatically make concrete the notion of intelligent design as well as the importance of Cheops to said design. And finally, we will see there is yet another way to look at Cheops’ roll in the Illuminati/Templar and mass shooting tie-ins, but this time, from the European point of view.
First, we need to understand a bit about Cheops and its importance in mysticism. There is so much which could be said that there are literally countless books on topic which could be entered as ‘evidence.’ Here, I will focus on less than five percent of such material topically, only able to skim the surface of them. Consider it merely to whet your appetite to learn more, for which some suggested links will be provided along the way.
One key aspect of Cheops is that it is rich with magic numbers. This seems to be true regardless of if using the original units of measure employed by ancient Egyptians, or modern day equivalents. Indeed, some of our current units of measure stem directly from the ancient Egyptian measuring system, a fact often laid at the feet of Freemasons and their predecessors, the Masons. While I won’t spend time expounding, many of the measurements of Cheops, both in original and modern increments, enjoy magic number properties, doing so in ways which, like those illustrated in the prior post, are mind boggling. Some serious mathematicians have found even more wondrous relationships to both the ancient and modern discoveries of Man well beyond any possible knowledge to Egyptians of old.
Perhaps the keymost aspect of Cheops which potentially makes it ideal for inclusion in mass shooting patterns is that it is only the Giza Pyramid which has a complex of inner passageways and rooms. Early mystics and even some studies of Cheops by persons with scientific credentials and methods, have proposed and illustrated a belief that the construction of Cheops was an enlightened project involving supernatural or mystical knowledge of the future; the internal passages and chambers thought to be a roadmap to End Times and key events along the way. That is represented by the image, below, from this interesting Web site. Others out there (with less useful images) have more detail with the most recent/current annotation being the year 2010, roughly the height of mass shootings. That marking is in the King’s Chamber, which implies ‘control and authority.’
Of specific interest to mass shooting research and the notion of Illuminati Masonic Warlocks being the architects, thereof, is the fact that shooting lines can be found which quite correctly depict a pyramid across thousands of miles of the United States. More than this, they quite usefully do so in 3-D rendition, even to the point of detailing the inner passageways found in Cheops. In fact, the depiction is so uncanny as to have key aspects ‘to scale’ with measurements which work math magic using modern increments of measure against the ancient’s units of measure; not just scale in size, but across the barriers of time in the expression of numbers in different languages and cultures. Take a look:
Do the pyramids really relate the entire history of the World from beginning to end?
Shootings depict Cheops
As you may recall from the prior proof the orange lines are lines which run from shootings directly to the Great Pyramid, Cheops, each exactly 500 miles apart as measured along a given line which is perpendicular to them all, and which itself runs through several shootings. The green line here, however, is at the distance of 10,000 miles from Cheops, which is one/fourth the distance around the World (the vertical diameter being 40,008 miles on average), and it too transverses several shootings and is perpendicular, but the distance at this point between lines is 505 miles. Each orang line originates dead center of Cheops and is separated by almost exactly 7.5 degrees of arc to achieve this feat. That is interesting for another reason; 360 degrees divides by 7.5 exactly 48 times, and 24,000 miles (the rough diameter of the Earth horizontally), divided by 48 indeed equals 500 miles.
Now there are some admitted problems in trying to depict a pyramid with any degree of accuracy in a 3-D perspective view, especially if with cutaway to reveal interior passages. Such a view does not simply allow us to measure a line and compare it to Cheops with good expectation of results. Perspective causes a measured horizontal to be less as it is depicted further away. A line transiting diagonally in one or more axis in 3-D space is even less useful unless one knew the precise angles for each axis both it and the original against which it was to be compared, were employing (and additionally, the depiction version is arbitrarily decided by the person rendering it, and impossible to discern without their sharing).
The depiction in this case seems slanted over America as if about to slide into the Caribbean. That is for a reason: it is faced (viewed) with the same face (view) as the actual Cheops is when following the orange lines, there — presuming in both cases one is looking from the center orange line towards it. That is to say, looking at Cheops in America from the center of the lines, would give you this same perspective view if standing in the center in Egypt. That cannot be coincidence. The problem with that, however, is that in Egypt, in relation to the Orange lines, one corner is clearly (looking down from Google Earth) nearer the observer’s position than another; there is no line which is not at an angle to the observer.
Note: I further feel it is an error to assume that modern-day Illuminati Warlocks have the skills and knowledge base, or event he interest in the crafts and mathematics of Masonry, which they left to the Adepts when Templer remnants infiltrated the Mason’s Guild and eventually took it over to form Freemasons. They are not likely going to go for precise renderings as much as symbolism; accurate to the point which can be managed simply, but no more, I believe.
Why do Masons, the Illuminati, and Satanists focus on Egypt and Cheops?
How much is a Royal Cubit, anyway?
It is, as result, impossible to establish a precise method or true consistency in relationships (i.e., to test for accuracy in scale) of measurements between Cheops and the American pyramid. The required data and accuracy required to plug into complex formula is beyond our ability to deduce. Ideally, a computer program modling in true 3-D space could be used to compute and confirm such comparisons… if we knew the angles employed by the architect of the American depiction.
But that does not mean we give up. We do the best we can with the tools at hand, and must come away at the very least acknowledging that in the 3-D layout, the mere visual similarities alone are sufficiently ‘coincidental’ to imply intelligent design, and in need of further study with better tools. But that does not mean we cannot ‘cheat,’ and then test to see if our cheat had any merit. After all, perhaps the architects employed a similar gambit. We wont’ know unless we try, ourselves. So…
By rotating the view as I have in the image above, we at least have the illusion that the base line is perpendicular to our viewing angle such that we are tempted to measure it anyway, and then see if there is any discerned relationship to Cheops which results in some kind of conversion factor. If we CAN find one, we can then apply that factor against other test lines and, in theory, if or factor was arrived at by other than coincidental happenstance, we should find the measurements work out correctly in the conversion. Guess what? We can, and it does!
Cheops on a side is 440 Royal Cubits, or 36524 Egyptian inches (a precise year’s worth of inches times 100), which works out to 230.4 m, or 756 feet. I will admit that finding a conversion factor took me some time. I made no headway at all until I realized that the orange lines were like rays of a projection lens in a theater, taking a small image and projecting it to be much larger at a distance. I reasoned there had to be something about analogy involved in the conversion factor. I also felt that any such conversion MUST involve the ancient increments in some conversion to the modern, rather than a modern to modern comparison. Turned out true.
As I discovered, if you divide 36524 by 440 you find that there are 83.009 Egyptian inches in a Royal Cubit. Funny. Both sum to 20. If you then multiply this times the total degrees of arc for the American depiction, which is three orange lines, or 22.5 degrees (±.03), you end up with 1867.7, which is exactly the measurement of the depicted base line… in Kilometers; ancient to modern, using the orange lines as calculator. So, now to test the accuracy and intent, vs. the notion of coincidence (pretty big coincidence, if that is all it is.)
Testing our factor: There are only a couple of other places where lines are similarly ‘perpendicular’ to our view (like the base line) by our peculiar method of so assessing for the purpose. Two of these are passageways to the King and Queens chambers, which just happen to have shootings (house icons employed for this use to match the drawings of the actual Cheops chambers) at the approprate locations to at least approximate the inner passages with an appropriate resemblance. But there is a problem with trying to test these with our conversion factor. It has to do with the Mississippi River.
Looking at the drawing of Cheops’ interior, you will note there is an irregular passageway leading down between the upward and the downward sloping passages. This is thought by some to be a water drain, as there are interior air vents which happen to align with prominent Constellation stars on select key celestial event dates, and that admits water. The lower passage in fact has a chamber with a deep pit which resembles a Well. In America, as it happens, the Mississipi River runs a course reasonably similar to that passageway and at the appropriate points in our depiction, given some small fudge factor.
Clearly, the Illuminati has no control over the course of the Mississipi, which changes slowly with time, and therefor, any depiction of the inner passageways must in some way accommodate those changes. My conclusion is, therefore, that such accommodation would necessarily mean a skewing of measurement accuracy in these passageways. Indeed, no line among them which is angled, nor the passages to the King/Queen chambers, quite works out, though some come closer to doing so than others.
But there is an entirely different story in play once we get past that drainage passageway, at the very bottom of the network. That whole portion is, by the way, beneath the ground level of Cheops by a goodly distance. In fact, the pit, which was filled with loose rocks as if a French Drain, once cleared, measures 60 feet deeper. Now, there are three points of interest with respect to testing our measures, and some landmark verifications we can also apply…
These are: the entrance passage to the Subterranean Chamber; an exit passage which is a dead end; and the pit. Applying our conversion faster, all three lines as depicted are of the correct length and are at the correct scale to the previously computed base line. But there was no shooting or key line to establish these lines (well, one line seems to do so), so we must seek some other verification that these are as intended by design. They do exist. Lets take a look:
The entrance passageway: The entrance passage determines the location of the Subterranean Chamber in the depiction, which we will verify separately. But it also has an unusual feature along its walkway, a kind of antichamber or alcove to one side, with no discernible purpose. On the map, at its correct location in the depiction, we find our old friend, Remington Firearms (the white arrow). That was, in fact, one reason I tested line placement at this site. Interesting then, that both this Proof and the prior Proof find their factories involved in shooting lines, baphomet lines, orange lines, and pyramid lines. That cannot be coincidence, and points to intelligent design, and intent — especially since the other Remington facility from the prior Proof is also present directly along another passageway, as seen in the first image of the depiction from above.
The exit passage and pit, on the otherhand, when extended the correct distance within ONE METER accuracy, end at… water wells, pumps, and tanks; which relate well to the purpose of the Subterranean level. That leaves the Chamber, itself. You will note a graphic image overlay veils in transparent fashion the intersect between the two measured passages and the pit. While there to represent the chamber, it is not really as ‘large’ as the chamber would be if to scale. At a particular location within the Chamber area it does cover, we find a nuclear power plant. This is interesting because much lore about Cheops includes references to end times, and equates the Subterranean Chamber to Hell, and the bottomless pit. One of hottest things we have on Earth is the interior of a thermonuclear power plant, and it burns both with heat, and invisible radiation; hell on Earth, should you care to experience it, with or without an accompanying China Syndrome ‘pit’. But there is an even more interesting verification, which is why the overlay:
The inset is the original artwork from which the overlay was obtained, a sketch of the what the actual Chamber looks like at Cheops, where it is described as seeming more like an underground quarry with lack of intent in what remains. The original is of very low resolution, I’m sorry to say. What I noticed about it that caused me to think to do the overlay, was the leftmost vertical protusion. I’m glad I did, because when I overlaid it, seeking to line it up with the cooling tower of the nuclear plant, I noticed something.
Actually, I noticed it while playing with the transparency level so I could see where I was positioning it. I truly wish I had video capture ability to show you the startling discovery, which, with a slight change in aspect ratio, was maximized; the darket portions of the overlay precisely match and seemingly define changes in terrain or map features. The effect is this: it gives the impression that the terrain to the South and near the power plaint has been cultivated to MATCH the overlay usefully. The best that I could hope to do to depict it here was to increase the contrast of the overlay, and alter the levels. There were originally only two discernable shades, black and gray (it is a B/W original image with some dithering in evidence). There are now four, and only the lightest of these is NOT defining a shape or darker area on the Map.
I apologize in realization that this is nowhere near as useful a description as the visible effect I’d rather show with video, but I assure you it is startling and implies, along with the wells and the Remington matter, that these lines are indeed intended to be here and at these dimensions, which in turn verifies the scale conversion factor discovered. Intention by design, in design.
What is the the relationship of Cheops and Mass shootings to Templars and the Illuminati?
The European point of view
At right is an image looking from Cheops towards Europe, to reveal how it ties in with the Illuminati and Templars of old… not to mention any modern day Illuminati Warlocks operating there, today. Especially if their operations include casting magical designs in mass shooting in America to fast forward the formation of the North American Union and establishment of a one-World government under control of the Antichrist. Observe:
At the bottom we have our orange lines radiating outward at increments of 7.5 degrees of arc, where, in order to get to their designated array of shooting destinations in America, they must first pass through Europe. In Europe, we find one of these lines passes directly through the birthplace of Adam Weishaupt, Masonic founder of the ancient Illuminati (ironically, in 1776 — not truly ancient as most count it).
It is interesting to note that one can create in Europe, using only the birthplace of Weishaupt, and the orange lines, a baphomet which is correctly aligned Northward (the stray orange line), IF, and ONLY IF, running the North-line through the VATICAN IN ROME at the adjacent orange Cheops line. Then, IF, and ONLY IF, electing to use the Weishaupt’s birthplace as the center of said baphomet, will it then result as seen.
The significance of that is manifold. For one, it rests upon the remainder of the orange lines in precisely a mirrored orientation and in like relationships, in general, with the orange lines as does one of the baphomets in America. In other words, just as the depiction of Cheops in America was at the same viewing angle relationship as if looking at the real Cheops from an orange line, so it is, here, with the two baphomets.
Thus once more, the orange lines ‘project’ an image in useful scale with the same orientation to create a sister depiction in America. The difference is, THIS ONE, is properly aligned North for ceremonial use, and the one in America is flipped, so to speak… which allows IT, TOO, to be aligned with North IN AMERICA. How can that be by anything, but design?
Weishaupt’s baphomet, by the way, is at a point along the orange Cheops lines where, if used as a measuring point, they are exactly 333 Km apart, which is 207 miles (sums to 9), and 180 nautical (18), and since 18 = 99, that makes 3 threes and 3 9s, which is 999, or a code number for 666. And, of course, if electing to measure in both directions (the diameter of a circle about the birthplace between two adjacent orange lines), we also get 666.
Finally, we also see in the image the yellow icons for Templar castles and other properties, at least the ones we know about, and the red icons (and one balloon icon) which are Illuminati historical sites. We see also one green and one purple line coming from America, one a guideline from a baphomet depicted, there, and the other from a Masonic emblem, there… where both additionaly go directly to Cheops. The circle is complete; Cheops, European Illuminati and Masonic (Templar) histories (and arguably, current Warlock activities), and shootings in America and their resulting patters, all neatly tied together by six lines which impact all else. Coincidence?
What is the link between Masons, the Illuminati, Satanism, the New World Order, and Egyptology?
Go back to Introduction
Go back to Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart
Go to Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages
Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.
Are there any patterns in mass shootings?
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
Is there any proof mass shootings are not random?
What you will learn reading this post of the posting series…• that select shooting lines can be extended to a single spot on the other side of the World; • that spot is the Great Pyramid, Cheops; • that the lines are exactly 500 miles apart at a given point and form the same angle of arc.
Are mass shootings by intelligent design?
Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart
Is there a mass shooting conspiracy?
The last proof resulted in some negative commentaries to group posts announcing its availability, all based on disbelief in the postulations advanced. This requires me to repeat myself: It does not matter what you or I believe, it only matters what the architects of mass shootings believe. Now, in this post, we start to examine the symbolism of Cheops and its ties to the shootings, which is also about what THEY believe. But first, I owe readers of Proof Six an explanation about the relevance of the ‘orange lines’ to select purple lines of the satanic baphomets and green lines of the Masonic emblems discussed as tying directly tie to Proof Seven in an unusual manner. So here we go, referencing the image below…
The orange lines are the multiple lines to Cheops this post is all about, of course, but those lines by and large pass through Europe using what is known as the Polar Route on their way to Egypt; the shortest, most direct route, despite the fact that in the movies they always depict planes flying East over the Atlantic to get to either Europe or the Middle East, or the other way ’round if going to the U.S. This is why, for instance, Iran Contra gun running used a stopover in Denmark and other Euro sites on their way to Iran, something which at first didn’t make sense to me when I learned of it.
The purple and green guidelines used in finding and plotting the baphomets and emblems also go to Europe, and end up doing something the bulk of the orange lines ALSO do: they just happen by ‘coincidence’ to pass through at least one, but more often, MULTIPLE ancient Illuminati and Knights Templar castles and other properties employed in their conspiratorial affairs, including some more modern facilities, and even Adam Weishaupt’s birthplace. He, of course, was the founder of the Illuminati, and a high Mason, and the Templars were the folks who evolved eventually to become the Freemasons we have today, as outlined in my book, MC Realities. There is one other line which does this, which is a red line created from a perfect isosceles triangle from Proof Three, which is the best example of ties to the modern Illuminati, as well as ancient, but also Cheops as it also directly intersects with the famous glass pyramid at the Louvre Museum in Paris.
There are other indications these lines and their relationships with Illuminati and Templars is tied to Cheops, in that some of the lines continue past Europe to the Middle East to find Templar sites, there, and two others, one each from a baphomet and an emblem, go directly to Cheops as if an orange line. It is interesting to note further, that these two are extremely close to the second orange line in from either side of the six orange lines; uniformity. Take a look: each white arrow indicates a line of interest which ties to the Templars or Illuminati. The ‘houses’ represent Templar locations (those icons refuse to float accurately over their respective sites at this viewing altitude), and the harder to see red dots are Illuminati, save Weishaupt’s birthplace, which is well marked. There are 18 lines in all, our magic number which equates to 666 in occult terms, only one of which (orange) does not find a Templar or Illuminati site, but we are talking about locations which in many cases have been lost through the centuries and, likely, it really does do so, but we simply have no such knowledge, today. The modern day Illuminati, however, WOULD know. The line certainly passes through territories where such properties are otherwise existent (not all sites are shown, only those which are intersected by lines).
Cheops I had previously been aware of the importance of Cheops to Masonic and Satanic histories, some more tenuous or doubtful than others, but all generally of a mutually supportive nature. If one reads the Masonic Bible, Morals and Dogma, it is clear that the leadership of the organization at the higher levels, is Satanic in its beliefs, practices, and tactical applications, and that all things of Ancient Egyptian lore play into their belief structures and lore. To Masons, especially, there is significance in the Pyramid, and thereby, also to Satanism.
Yet one can find other resources which state the Pyramid is outright tied to Satanism in one way or another, both inclusive and exclusive of Masonic ties, which came later in history. It is a Chicken or Egg question, or sorts, depending on the factoid being considered, but we need not answer those questions; our concerns are valid regardless of the answer. So when I noticed that some shooting lines seemed to angle off toward what I knew to be the ‘polar route’ to Egypt. I sought to verify, and was immediately proven correct. In the image above, find six orange lines which all meet precisely at the peak of Cheops a third-way around the World. They are all drawn at the same degree of angular separation (about 7.5 degrees).
At a given point in the map, in America, they are all exactly 500 miles apart, and as this image shows, they relate to shootings as they go. To date, only one (left most) has no useful shooting along its path to make the claim, but that does not mean there will not be in the future, and so, it is included. It may prove a means of predicting and even preventing a shooting. CHEOPS ALIGNMENTS x 6 There is no significance in the 500 number — at any given point, the lines are equidistant by some measure, I just chose a point where it produced a round number.
However, as research continued, I learned some things which would seem to make that a more important point. In the image below, this is revealed, and in the doing, we see also how the shootings themselves tie to the lines in important ways. More than this, the actual measurements once more reveal magical use of numbers in the occult manner. We should talk about accuracy. Given the great distance these lines must travel (35 million feet or more), the worst accuracy of these key lines is typically less than .05 degrees of arc (dependent upon Google Earth limitations as discussed early in this posting series), or some 15,000 feet at measure point. These work out to a maximum error of .007% and .0004%, respectively. I’m good enough with that to cite it here as proof of intent, given that the architects of mass shootings likely used the same tools, as I. There has, after all, already been revealed in prior Proofs several clues that such is likely the case.
Here we see some 440 plus mass shootings plotted along with the six orange lines from Cheops. The three green and three red lines are for measurement purposes, and require some dialog in order to appreciate the ‘craftmanship’ employed by the architects; a kind of confirmation this is no random outcome. The Meridianal (vertical) circumference of the Earth varies depending on where measured, but the average is 40,008 Km. This means that the point where the orange lines are furthest apart is some 10,000 Km distant from Cheops. This spot is found at the middle green line, and the measure there is essentially 2,525 miles.
This is confirmed in the red line between adjacent orange lines which measures 505 miles. The other two lines are the points where 500 miles between, is found, for 2,500 miles total separation, there. EACH OF THE THREE HAS AT LEAST THREE SHOOTINGS ALONG ITS PATH. These numbers prove interesting, and thus I also elected to measure the diagonal (vertical red) and ‘hight’ (red along the orange line’s path) of a given rectangle formed by these lines. The vertical line, which happens to be North corrected for magnetic declination, a trait seen time and again in the various alignments of Satanic and Masonic symbols in the prior Proof, measures 777, a magical triplet. The height measures 606 miles. More interesting numbers.
Take a look (numbers are rounded unless otherwise stated, and reflect allowances for measurement errors introduced by Google Earth as previously mentioned): Note: you may wish to review the sidebar post on Magic Numbers before continuing. Because… 500 Miles = a palindromic 434 nautical, which sums in pairs to 77; 777 is not only a magical triplet, but forms by summing in twos (1414) the inverse palindromes 141 and 414, which sum together to form the triplet 555, and equals 675 nautical, which sums to 18, and 1250.46 Km, which sums to 18 by threes; 505 and 606 are both palindromes, of course. And about 2525, divide it by 505, and it goes exactly 5 times. 505 + 606 = the double doublet 1111 (a quad) 500 x 505 = 252500, which sums to the doublet 77; 500 x 606 = 303000, a palindrome times 1,000; 505 x 606 = 306030, a palindrome times 10 which sums in threes to 99, which is a code number for 666 just as is 18; 306030 also = 492508 Km, which sums to form the inverse palindromes 151 and 515; and 606 x 777 = 470862 which is divisible by 18 2,159 times, and the grandaddy 666, 707 times.
So we end up with 505, 606, and 707 palindromes, and the triplets 555, 666, and 777. 505 squared = 255025, which sums by twos to the palindrome 757; 606 squared = 367236, which sums to the the triplet 999, a code number for 666 (upside down); it also divides by 18 to provide the palindrome 20402; 777 squared = 603729, which can produce 999 by summing by 3, 2, 1 digits consecutively, a bit unusual; We can’t easily find the area by simply multiplying 606 x the top or bottom, because they are different. We can do that with both and then average the result. This yields 303000, a palindrome times 1000, and 306030, a palindrome x 10. The total of the two sums to 609360, sums to the palindrome 6116, and which divided by two = 304680. So now we know the area, which is 1680 sq. miles more than the smaller of the two, and that much less than the larger, of course. 1680 = 2704 Km, which not only sums to 13, but is divisible by 13 208 times.
The orange lines in detail
In the last Proof, we found the orange lines tied usefully to the layout of the four baphomets and Masonic emblems. Here, lets relate them more directly to the actual shootings which were also part and parcel of those relationships. The first lines at image left does NOT actually line up with anything, YET. It is presumed they will eventually line up with a shooting and may be useful in prediction of same, as there are very few communities in its path with logical targets which fit with other predictive factors. But I will not state these as our paranoid government tends to make anyone predicting such violence based on ANY criteria as the only ‘terrorist’ or ‘suspect’ in question. They tend to lock down such locations and charge the person who gave the warning with criminal intent of one sort or another, or act harshly against them in some way. Apparently, ‘See Something, Say Something,’ is a trap, and considered a crime. I know that at least twice that I reported terrorist activities, they did nothing about the report other than to harass me and try to cost me my job.
The next line is perhaps the most dramatic in terms of accuracy and alignment. It bisects with extreme accuracy two shooting events, even a third within Google Earth dictated error limits. The third also has three shootings within accuracy limits, two of which almost meet doorway-to-doorway accuracy.That line also passes through the Denver International Airport and quite near to a man-made earthen Ziggurat (stepped) Pyramid thought by many conspiracy theorists to be a D.U.M.B. (Deep Underground Military Base). The site claims to be a landfill, albeit the highest and fastest growing of its kind by far, if true.
It is also true that in its current state, it only appears to be a Pyramid in three of the four sides, the fourth being the area where ‘fill’ is taking place at this time. The next line features the sloppiest, worst-case error with two shooting points in its path. The larger error does not dissuade me, because both are quite equally distant from the line on opposite sides of the line (the line cleanly centers between them). There is additionally a business, Pyramid Foods, almost directly on the line near the Bartlesville HS shooting plot of that line. The next line also sports two shootings, one of which is quite near Meridian, MS; Cheops is itself a similar distance from Meridian, Egypt (a neighborhood name also used in several business names, there). The final Cheops line merely intersects within 1,000 feet of a single shooting event. This is near King’s Highway, and Cheops is a King’s tomb. Thus all the lines currently aligned with shooting points, are several are also aligned with something having to do with a Pyramid. This yields yet more consistency, but feel free to presume it coincidence, if you must. What does Cheops have to do with mass shootings?
Beyond the earlier comments about why Cheops is important to Masons and Satan worshipers, there are a few other things which should be mentioned. One has to do with the construction of the Pyramid, which many historians think drove the establishment of at least some of the ancient Egyptian’s measurement system. What is interesting about that, as casually mentioned earlier in this series, is that as history progressed, their system became in various ways the bases for both the English and Metric systems, as well as the system employed in America. It is alleged that Masons (Templars) were the driving force behind this, in part, to insure or play to the mysteries of magic numbers.
So do not be surprised then, if the next post, I tell you that there is not at least one measurement at Cheops which is duplicated in shooting lines here in America which depict the same part of a pyramid in a 3-D view, but using different increments and a different scale (think miles for inches, for example). I’m still working on verification of a list of suspect instances, but it certainly seems the case. This would NOT be possible if there was not some basic underlying ‘magic’ built into both measuring systems with respect to conversions. But the real thing of interest about Cheops, here, is its lore.
Many learned researchers have studied the Pyramids endlessly to formulate many different theories relating to its design, how it was constructed, what its purpose was, and so forth. Many of their findings are controversial, but few are invalidated by the work of others, but might remain rightly in the realm of speculation, or ‘lore.’ Among these are two which would logically be of interest to a Warlock or high Mason (sometimes, the same thing).
The first involves the inner passageways of Cheops. We know these are important to the architects of shootings because, as we will see in the next Proof, they are faithfully duplicated in the 3-D depiction of Cheops by use of shooting lines and shootings. The reason why would seem to be in the lore, which according to some, says that these passages are a kind of history of the World being depicted from creation to its destruction. They actually make a very good case for this, and my own conclusions would tend to agree there is something to the notion, at least symbolically, if not accurately to the year. The claim was, that each Egyptian inch represented one year of history, a thing which seems to be true at least for specific historical events used as benchmarks.
If, therefore, the need to seat the Antichrist in support of end time prophesies requires taking away guns in America to allow the formation of the North American Union, then our architects, being wise in the magic and lore of Cheops and the like, would most likely incorporate as much of that magic into their plans as they could manage. The second involves what is called Pyramid Power in a book by the same name written by Max Toth, which is as good a reference as any of like conent summarizing the lore of Cheops, including the inches for years theory. If even half of the claims within were true (and I have verified at least two of the main claims in my own experiments), that is one more reason a Warlock would wish to incorporate pyramids into any conspiracy aimed at seating the Antichrist. But again let me say, it does not matter what you or I believe about such lore, it only matters what THEY believe.
Go back to Introduction
Go back to Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols
Go to Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View
It is seen by government as a win-win ploy that raises the stakes to unimaginable levels. What we see on the surface has nothing to do with the sinister plot which it enables and portends. This is our last and only chance to save the country, or loose it to tyranny forever, and rush toward Earth’s final demise.
Will Bundy vs. BLM start Revolution 2.0?
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
What is going on in Nevada with the BLM?
What you will learn reading this post…• government’s actions against Bundy are mere window dressing — something more sinister is afoot; • the stakes are incredibly high, but hard to see — your very life and the fate of the World, in fact; • there is only one logical solution, and everyone plays a role. What can I do to help Bundy against the BLM?
Why BLM vs. Bundy matters regardless of if his cause is just or he has no legal leg to stand on
UPDATE: Same day posted… Oh, so now we find out its really for the oil companies? What Corporate Police State? BLM sells 29 oil, gas leases in northeast Nevada End update.
Government made it matter, and with dark purpose. At one glance it is an effort to usurp power over people, and the States, as well as to empower corporate ranching over private ranchers. It is a form of unfair and excessive taxation without representation against a political enemy of financial convenience to friends of the White House. And, it is an opportunity to make yet one more National Police Force out of the BLM. But, thanks to controlled media/government PR, not everyone sees these points of view.
But even that view is incomplete and misses the mark, if we but look closer. It is a deliberate series of escalations by government over time to garner public attention among and inflame we select people (why it gets little due mainstream coverage — save that which slants as it did at Ruby Ridge and Waco). They know the Web will be awash in the circles of we Patriots, Constitutionalists, Activists, and others who oppose the tyranny and oppression our government has come to represent since 9-11. The Sheeple must not be unduly disturbed until it can have false flag impact of calculated value.
I talk a lot about the need for citizens to draw lines in the sand and be willing to become Minuitmen should such lines be crossed. Now comes government to draw it for us, I write here to tell you that you have no choice but accept the challenge, and act decisively. You may perish either way, but I’d rather perish attempting to control my life and future than to leave it to others less kindly inclined to favor me. If there is to be armed revolution, let it be on our terms, not theirs.
Why so conclude? Because if they work it right, the ‘standoff gone wrong’ is a perfect chance to justify taking guns. By forcing a showdown and a gunfight (what the snipers do best – there is no justification for government deploying snipers unless for this cause, AND to selectively inflame those who stand for Liberty and who remember Ruby Ridge). There are two possible ends, of course, though I think they will insure BOTH transpire.
Regardless, such a battle is win-win for government. The “poor defensless BLM armed only with tasers,’ if loosing large numbers will be seen by Sheeple as an outrage, and given that Militia were involved from multiple quarters, and other armed parties, Obama can order Martial Law with suspension of the Constitution. Especially if also employing agent provocateurs for local violence across the country, as was employed in the LA Riots, where National Guardsmen posed as rioters to prime the pump. This would likely result in orders for the military and Police to go door-t0-door. Who knows, Obama might even order the U.N. in as long-feared and first promoted as concept by Henry Kissinger. Or, he might simply order in the military; A-10s, attack choppers, a Stryker Battalion, and so forth.
They can then conveniently ‘quash armed rebels and terrorists,’ confiscate all guns, round up dissidents and politically incorrect opponents (like you and me — why they have been spying on us so earnestly), and hold a Con Con (they are already staging for it) to pass the Constitution of the NewStates of America, already written, which essentially enables the formation of the North American Union and surrender of US sovereignty to the U.N. in stages. All of this leads, of course, to a one-World Government (that Constitution has also already been written), and provides a single seat of power to enable the Antichrist’s coming to power.Note: The NewStates Constitution is reprinted in my booklet, Fatal Rebirth, along with the World Constitution, complete with analysis line by line (NewStates) to show how draconian a document it really is. Rights become privileges which can be revoked at any time by any agency or party of government for any cause, even retroactively, and almost anyone in government can write law, and again, it can be retroactive. And if you think the two-party system and the FED/IRS is bad, wait until you see what follows. You can request a free copy of the ebook version of Vol I of Fatal Rebirth by email request to pppbooks at comcast net.
THAT is what is at stake. Nothing less than EVERYTHING!
So we must be decisive: regardless of how we view Bundy’s cause or government’s viewpoint, regardless of if an armed and concerned citizen or a dumbed down Sheeple, we all have equal stake in this unfolding globalist tragedy. And, we can all play a role no matter our status, and regardless of if present in Nevada, or not. But about that decisive action…
Why is the BLM standoff against Bundy in Nevada taking place?
What we should prefer…
Should we stand up with arms in hand and enable, if not force, the ultimate showdown? I fear this is exactly what government wants, as already stated. But there is another, wiser choice.
By all means, men of arms should rally, but standing firm and waiting for the other side to blink or blunder is a fool’s plan, and it can only end in bloodshed. What must be done is that which can neuter Government’s ploy. And only one set of steps can do that:
a) anyone and everyone should file court actions against any and every agency, branch, and individual of government involved at every level of government. Any and every cause, grievance, or objection, as allowed by and based on State, County, and Federal Law, and the Constitution and Bill of Rights, should be employed. Bury them in legal actions, EACH OF WHICH includes request for either an Injunction or Stay Order. These actions should not all be done at once, but the flood should be continuous, so that new ones can replace those quickly disposed of. THIS BUYS TIME;
b) time is our friend — it generates awareness and understanding. It buys media attention and gives Sheeple a chance to better understand what is taking place. Just as the 99% movement could no longer be contained by a controlled media, so must this matter be brought into every home. Invite major networks, espcially foreign press, to specifically include RT, to set up broadcast facilities right on the Bundy Ranch, and bypassing the see nothing viewpoints established by government for controlling media in the manner done at WACO (NEVER AGAIN!). Install microwave and shortwave communication systems for the purpose. But also, LOCAL media is the key, as is the WWW; do not rely upon mainstream. Militia and other group ‘spokespersons’ in your community should approach their local news sources with proposed interviews to get the word out. IF EVERYONE UNDERSTANDS WHAT IS TRULY AT STAKE, AND TAKING PLACE, GOVERNMENT’S PLOT IS UNDERMINED AND THEY LOOSE THE SHEEPLE;
c) flood the theater with actors. There should be so many people there is not enough room in the minimal areas intended to contain them. OVERFLOW. The ‘1st Amendment’ area, itself an affront to the Constitution, and should be enlarged and enlarged again, forcing retreat or conflict which will make news favorable to our side. If you have access to a professional camera, start a ‘newspaper’ or ‘Radio station’ and flood the press area and make it overflow, as well. And Bundy’s ranch should become a city of tents, and include as many unarmed persons as possible who wield nothing but baseball bats or the proverbial pitchfork. THIS MAKES THE WHOLE AFFAIR MORE VISIBLE and LESS TENABLE TO GOVERNMENT’S GOALS;
d) involve the local Sheriff and State/County Officials. The Sheriff has effectively stated a hands-off non intervention policy. Fine. Perhaps he is a puppet put into place for the purpose, or co opted by any number of means available to government for rendering him neutral. But the flurry of legal actions should be intended to FORCE HIM to intervene on behalf of Bundy and supporters. If nothing else, he should have a presence on the Ranch to insure armed groups behave (public safety). The Governor and Legislators, and County Officials should called to DEMAND it. Perhaps even the National Guard should be called to stand by. A simple invite, if not enough, can be followed by a media blitz and public demand that such action is needed. Any politically motivated decision to remain neutral should be negated, thereby; a political suicide. INVOLVE THE SHERIFF, as WITNESS and PEACEKEEPER;
e) party! No alcohol or drugs, but good cheer, song and dance. Use loudspeakers. Mix well with speeches and ‘town hall’ dialogs. Use the platform (the nation will be watching) to air ALL GRIEVANCES with government, not just this ONE issue. Give voice to the rest of the 99% in a way that movement never was able to achieve on its own. SOROS WILL HAVE NO VOICE, this time;
e) prepare for Martial Law at home. That means emergency kits and plans (like the one government would not approve). It means weapons. If it is declared, you will have scant few hours to choose to fight, run, or to surrender to your fate at the hands of tyranny. If not taken away, you will need to survive for months without anything like normal civilization. No key resource, including electrical power or communication, can be assured, and will likely be withheld on purpose. Travel will be restricted and many will not be able to work, and there is no shopping, only rationing. BE READY TO BE SELF RELIANT, BE READY TO FIGHT IF THAT IS WHAT IT COMES DOWN TO;
f) if and when the shooting starts, DO NOT ENGAGE! Dead BLM or other Agents will be made into martyrs by mainstream. DO NOT GIVE THEM WHAT THEY WANT. Show restraint, and let the casualties be on your side. Keep putting out a continuous feed of information and video so that media and the WWW know what is going on. IF THERE ARE TO BE MARTYRS, LET THEM BE OUR OWN, and LET IT BE TELEVISED LIVE. If a full-scale armed revolt spontaneously errupts nation-wide, then by all means, defend yourself at the Ranch, and FOLLOW YOUR CONSIENCE AND DEFEND THE CONSTITUTION.
g) petition for redress. Redress of grievances is a key component of our Nation’s Constitutional form of government (this post makes clear, mid post). When it fails, we have no government, only tyranny. It seems today there is NO REDRESS POSSIBLE at the Federal level. ONLY THE STATES stand in the way of total Federal domination, which is part of what this whole affair is about; a means to increase Federal power over the States. But while all this is going on… and while we have media platforms established… we should be seeking redress through our State Legislators, making a series of calls for action to quickly pass laws which…
1) nullify all Federal gun laws, NDAA, NSA surveillance, and forbid Federal drone overflights except under warrant and oversight by State authorities;
2) eliminate Federal arrest and warrant power. If a Federal judge issues a warrant, or an Agency is moved to move against a party (like Bundy), they must instead go to the appropriate local Law Enforcement Agency and have them execute on their behalf. They may go along, but as observers, ONLY;
3) make clear a mandate that your State shall NOT approve a new Consitution if a Con Con is held, nor the removal or neutering by Amendment of the current Constitution, and any existing Federal Law which does so should be nullified;
4) add freely to this list anything which addresses abuse of power by the Federal government, such as militarization of Police, Obamacare, etc. This will be your one best chance to spark public dialog and debate, and to make certain that people, and especially State Legislators, realize THEY are the ones with the real power, and the duty to protect freedom and force the Constitution.
What is at stake in Nevada and the BLM standoff with Bundy?
Government has drawn a line in the sand
Let’s make sure they regret it. Force them to be the ones to cross it, and let them trip over their own power play. Now… go forth and spread the word.
Ten easy-to-grasp but remarkable proofs, both visible and hidden: Illuminati style mystical symbolism and related ancient magical mysteries, calling cards, bragging rights, and Warlock spells cast against America, and the World. Conventional clues, too.
Are there any patterns in mass shootings?
Is there any proof mass shootings are not random?
What you will learn reading this multi-part posting series…• there are 10 interlocking proofs that mass shootings are not random; • they include various kinds of patterns, visible and unseen, and even coded information; • that the pattern predicts itself, and understanding may therefore help stop the murder; • that the codes and clues seem to be like signatures identifying the architects.
Are mass shootings by intelligent design?
Introduction: Ten Proofs ‘Random’ Mass Shootings by Intelligent Design
Is there a mass shooting conspiracy?
Note: This series is not yet ready for full presentation, but the most recent Fort Hood forces me to start releasing the material without delay. The reason for delay has had to do with an inability to provide high quality graphics suitable for proofs. This will be overcome, shortly, I hope.
One thing you need to know about me as an investigative writer or, as media and government would prefer you to think of me, a ‘conspiracy theorist,’ is this: whenever I decide to take a close look at a potential conspiracy or lesser matter, I do it right. If I cannot uncover something no one else has brought to light, I’m either not finished, or I’ve backed out concluding it beyond reach, or a dud. If you read my findings on a given research, you will undoubtedly learn something FACTUAL no one else had previously discovered or brought to light. And so…
In this matter, we find the shear volume of startling new information overshadows and renders original headlines and competing theories essentially meaningless — especially media’s version. It will make you angry. It will scare you. The question is, will it motivate you to do something about it? YOU are what you are waiting for, you know.
But in introduction, there is still one other point which must be made; it is in form of a problematic question. Can I get you, the reader, to override your current belief structures long enough to consider the unusual nature of the findings? This presentation will most assuredly fly in the face of what most people consider ‘traditional wisdom,’ but it also will explain why it is non-the-less valid. Can you handle the Truth, or will you wimp out to the comfort zone of current beliefs?
Area all mass shooters psycho?
On suspending belief structures
I began a ten-year research project for a book, Fatal Rebirth, in late 1989, which also begat a screenplay published on line in 1999 (The Electronic Apocalypse). In the book’s Introduction I urged the reader to suspend their belief structures briefly and read the material as if merely fiction for entertainment’s sake, because many of the concepts within were so new and unusual as to defy belief — likely seen as ‘far-fetched’ by most uninformed readers. I offered over 1,500 footnotes and a huge Appendix section to help them consider why I deemed them factual.
This blog post should be read in like manner, especially if you are content with government’s actions, are a politician, member of a government agency, military, or any part of the justice system, or Media. Especially if you are involved in a mass shooting incident as a professional or a victim seeking to know the truth. And even more so if you are gun owner, or even among what 2nd Amendment supporters refer to as a ‘gun grabber.’ I plead, therefore, that you suspend your belief structures briefly as if reading a political/horror-science fiction piece. That’s what it is, actually, minus the fiction component.
You will, like readers of Fatal Rebirth, I would hope, realize the truth by the time you reach the end. Or, at the very least, you will be entertained for all your reluctance to let the message sink in and take root.
If nothing else, even if you choose to doubt some of the more obscure subtopics (i.e., relating to mysticism) have any factual basis in REALITY, consider this: it matters NOT what YOU think, given they ARE taken as real by persons likely to be behind any such conspiracy (i.e., ‘Illuminati’ Satanists). You MUST also ask yourself, “Can the sheer magnitude of interlocking clues be ignored?” Because at every turn they defy the odds of coincidental probability, as illustrated by carefully crafted control study groups. If thinking logically, you MUST concur that intelligent design is revealed despite what you may think about the logic of the beliefs which lay behind it, or the unusual way in which the evidence was revealed.
Pending you conclusion, by all means feel free to think me mad if you must. Read just for fun, but please read it through to end before you render final judgment as to if madness or truth be present. A logical reader will be converted unless their mind is already so firmly made up that they do not wish to be confused by facts which destroy their belief structures. Judge not what ye know not, but that upon which ye are well informed and have considered fully, judge freely.
Your future and the future of your children could well be at stake, a statement applying to all mankind. Why do I say this? The book mentioned above, Fatal Rebirth, was based on trying to illustrate what I call the Unified Conspiracy Theory; the notion that all of America’s darkest bumps in the night for the last half of the prior Century, forward, were not random oddities by random people for random agenda, but carefully orchestrated by the same core group of people with but one goal for the World in mind.
I termed them Shadow, but they are also known by other names; the New World Order, the Illuminati, the Power Elite, Globalists, and among them, member names like CIA, Skull and Bones, Bilderbergers, Council on Foreign Relations, and many more of like nature. Their goal I termed End Game; the establishment of a One World government, a single seat of power in order to seat the Antichrist upon his throne and bring us to Armageddon.
The Unified Conspiracy Theory, once justified in research and taking shape in book form, led me to realize that their stepwise actions over fifty years of mysteries were indeed leading to one goal. Knowing the goal, I reasoned, it should be possible to forecast the next logical steps. So the book also included within its presentation several terrible event predictions expected to take place in our near future. Thus far, though I do not claim to have gotten all event details precisely correct, many terrible forecasts have already come to pass. Among these were:
a) an assassination attempt on Ross Perot or his family to cause him to drop out of the Presidential Race, a matter which indeed transpired using mailed Anthrax according to a Secret Service back channel contact;
b) the false flag downing of the World Trade Center by civilian passenger jets which;
c) resulted in a series of Middle East Oil Wars. Other predictions include two more terror plots which are part and parcel of this blog post. Those are…
e) MASS SHOOTINGS.
Note: you can get a free copy of Vol I of Fatal Rebirth (ebook) by email request to pppbooks at Comcast (net). You will be glad you did, as it will take you far deeper into the Rabbit Hole than Alice or Neo had ever gone. This pill is black, though trimmed in red, white, and blue.
So, if ready to suspend your belief structure, let us begin. Pretend there is, despite media’s recent attempt in the Cincia shooting to portray anyone who believes in the New World Order as mentally ill and anti-patriotic, that such a conspiracy is actually afoot. Also pretend, if you must, that Political Control Technology in the form of the Manchurian Candidate is real. There are real-life Jason Bournes out there, as my book, MC Realities, and other books on Political Control Technology illustrate more than adequately. Even the Smithsonian channel knows.
This will make the key postulations, testing methods, conclusions, and proofs of the core material easier to accept, especially as they will be offered in the manner of scientific discovery — exactly as I undertook them as investigative writer. You will, in fact, be able to retrace my work to double check it, if you wish — as long as you review the full series of posts and sidebars before you attempt it, lest you make a critical error. Please subscribe to my blog pages to insure you are notified as the remaining posts in the series are added.
Are mass shootings are by intelligent design?
Some several months ago, insulted by media’s misreporting of Aurora and Sandy Hook and outright clues that a disinformation campaign was afoot, I began finding ample cause for concern. But how might one determine if other mass shootings were arranged as part of some kind of sick criminal conspiracy, one which might involve both real and faked shootings?
I started with several basic presumptions of truth, and then set about to see if the logical evidence such presumptions would require were indeed in place. The ‘illogical’ presumptions fostered by the Unified Conspiracy Theory requiring suspension of belief are as follows:
1) That Shadow and their Globalism requires destruction of America, and its Constitution in order to enable forming the North American Union, a matter which in turn requires that the Right to Bear Arms is first invalidated, and arms confiscated or gun owners otherwise neutralized in a manner similar to that of the Australia;
2) That the New World Order, the modern day Illuminati, if you will, would be well capable of undertaking a campaign of gun violence for such cause, but being an Illumined Power Elite lost to Satanic and Masonic mysticism, they would employ mystical constructs which would leave detectible footprints if knowing what to look for;
3) That the principle tool of such a plot would involve a small army of patsies, cut outs, and fall guys, principally from a category best known to the public as Manchurian Candidates. It may additionally involve a small army of blindly obedient members placed within our armed forces, the intelligence community, and law enforcement to aid more indirectly in supporting roles. This would include logistics, psyops, and cover up, or even command and control, generally unaware as to the truth or reason behind their orders. These are the same players frequently found playing key roles in the lives of mind control victims at large.
All three presumptions must be true to make a proper accusation, for they comprise the basic proofs of any crime: Motive, Opportunity, and Means. Normally, we think of opportunity as meaning access to the scene of the crime, typically proven by forensics such as fingerprints, or better yet, actual eye witnesses. In this case, they deliberately left their fingerprints, in a manner of speaking. In fact, the bulk of the proofs fall into this category, perhaps even naming individuals behind the plot. At the very least, we are indeed dealing with the Elite, those involved in principalities and powers.
Indeed: Two names have already surfaced by such clues, and both are billionaires. I also have a dozen other names of likely conspirators, but no names are released; these things are my Life Insurance Policy.
Sidebar Post: On Programmable People. This sidebar post addresses the notion of the possibility that at least some mass shooters are mind controlled patsies, and reconciles their coexistence with truly random shootings — those which are more naturally spontaneous crimes — which can collectively still both be component parts of the same intelligent design. This leads us to the finer details of how shooting event locations and dates lend importance to our consideration, and just how these things can additionally reveal intentional, yet concealed clues.
Here it should be mentioned, that many observers of the New World Order crowd favor the supposition that among their leadership we might find the modern-day Illuminati in spirit, if not in actual blood lineage, even though they may have since assumed a different family name. By way of example, in my research, I have had reason to conclude that the Rotheschild name was assumed; those assuming it being Knights Templar in hidding, their wealth derived from Templar treasure, and not truly Jewish by ancestry or faith, at all.
Many who favor the notion of a Modern-day Illuminati additionally believe, as do I, that there are at least two, and as many as four groups competing with each other within the movement to be the ones ‘honored’ to have one of their own selected to become the Antichrist. Much of what is discovered in this investigative series will point to this being true in one way, or inherently implied in another. It is, in fact, one very good reason to employ symbolisms and other clues which act as signatures of those so bidding for selection.
Such evidence was abundant, even easy to find, and I remain convinced that the trio of presumptions are sound enough to warrant seeking incontrovertible proofs. I sought such proofs both in quality and quantity sufficient to illustrate that ‘random’ was not the right word to describe mass shootings, but rather, ‘intelligent design,’ is.
The path of my continued investigation led to endless shocking discoveries, but there was a problem: to describe the methods and explain findings to the casual reader would, it seemed, require a tedious educational process and boring, repetitious citation of facts. It would be about as fun to read as a spreadsheet or database. Not good.
People want visual sound bites easily grasped. More so if Sheeple content with their Evening News and easily frightened off by words like ‘conspiracy theorist,’ and ‘New World Order,’ or similar. Worse, the investigation bogged because of the real life tragedies each shooting represented. Proper investigation meant exhaustive study of individual events, reviewing endless horrific detailed accounts and sad, brutal media imagery. It was taking an emotional and even physical toll upon my body and mind, and my spirit. Eventually, instead of plodding along 10-14 hours a day as at the start, I found myself barely able to work on it a few hours a week.
I played with several ideas on how to present the story NOW, without completion of the full study, for there is indeed already a mountain of proofs uncovered. But again, the complexities in presentation left me feeling it a hopeless task. Finally, I decided to break it down into about a dozen short compartmentalized components suitable for a series of blog posts. Frankly, I’m hoping it will spur someone to offer useful help; it will take funding and staffing to properly complete the study. Or better still, perhaps some Sheriff or other authority will assume the duty as result of shootings in their jurisdiction.
Follows is a synopsis of the Ten Proofs to be presented. There will additionally be, at appropriate points, companion posts detailing the scientific methods or other analytical procedures involved in select proofs where a doubting Thomas type may wish to challenge the validity of claims. I firmly believe that for my proofs to be accepted, they should be presented in a way such that ANYONE can duplicate my work and verify accuracy and conclusions.
This is a legitimate investigation despite its atypical and unorthodox methods and odd topics involved. NOTE: links will NOT WORK until the various posts involved have been posted. You may click on them to discover their current state. Again, subscription to this blog will notify you when new posts are added.
What are the ten proofs of a mass shooter conspiracy?
The Ten Proofs in review…
Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns;Any time you find a cover up, you necessarily have a conspiracy to contend with. Gun grabbing groups, including government and biased or puppet media forces, should be using every opportunity to make their case for gun control, but act as if the bulk of gun violence never took place. Why do they employ selective blinders? There is a reason.
Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters;The Illuminati loves magical numbers, as they can translate into meaningful words or names, or leverage ‘spells’. Interesting then, that basic shooting statistics establish set after set in the most magical and potent number of all, one which decodes to ‘Satan.’ This alone reveals dramatic coincidences well beyond the possibility of random chance.
Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines;The same Dispersal Pattern Studies method applied by government researchers to UFO sightings reveals Mass Shootings do something UFO sightings allegedly do not: form repetitive patterns with GPS accuracy, doorway-to-doorway-to-doorway.
Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes;When it comes to symbolism, nothing outperforms a graphical shape. Better still when that shape itself has magical properties or relationships to other shapes, or its own hidden or obvious meaning.
Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters;It defies odds that perfect shapes should cluster together in ways which share overlapping lines or corners, and be generally both aligned and mirrored in additional symbolism.
Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols;Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.
Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart;Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.
Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View;The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.
Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages;Shooting line sets share three or more identical magical numbers within their data points. These decode to tell us when and where the next shooting will be, name a shooter, or perfectly prophesy some specific outcome.
Proof Ten: Individual Shootings Examined in Micro Duplicate the National Study ProofsTwo examples are offered; Aurora and Sandy Hook. They not only duplicate the ten proofs, but they mirror each other and one points to the other. Why are mass shootings on the rise?
Are you ready of this? Buckle up!
So let us begin. I propose your best bet will be to SUBSCRIBE to my blog pages so that you are automatically notified as new posts are made to complete the series. Please link, share, tweet, etc., and by all mean vote your ranking at page top of each one, and comment with your questions, criticisms, or thoughts. How else will other know this is important?
Do bear in mind as you read, each offered proof individually seems to defy the odds or logic path required for truly random shooting events. Collectively, it is monumentally clear. Also bear in mind that I am human, and I, like any other, am prone to making mistakes. A ton of information had to be entered and copied from one location to another multiple times (multiple database and software applications). Therefore, either because of a mistake on my part, or perhaps because of a mistake in media or other accounts/records, any given individual data point in any given set of proofs may be found invalid.
By all means let me know if you find such a discrepancy, but please remember this: a single error in a single data point does not invalidate all other data points, and therefore, does not invalidate the conclusions or the suppositions, themselves. In order to dispute my findings, you will need to offer proofs that the method is flawed, the entire data set was in error, or analytical logic was faulty. More: such dispute must address and ultimately invalidate all ten proofs, or short of that, offer equally viable alternative explanations which fit the findings and afford a more innocent explanation.
Since each proof tends to defy all possible odds of random coincidence, and does so consistently, again and again, naysayers will have their work cut out for them. More so, because in many cases, control groups have been established to show truly random data points enjoy no such pattern. I have done my homework, and carefully so.
I will demand the same of naysayers.
Go to Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns
Go to Side Bar: On on Programmable People
How to spot and deal with Trolls, including a clever tool they use in any social media capable of posting images (VERY prevalent on Facebook), and quite insidious with far reaching implications. BEWARE: you betray yourself and your friends if you take things at face value.
What is a Web Troll?
by H. Michael Sweeney
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
How does being a web troll work?
UPDATE: Nov. 11, 2014 Perhaps as if to ‘test’ me as result of this article (or not), a Web troll began the process described herein to goad me argumentatively while also employing a good half dozen of the usual disinfo tactics in the 25 Rules of Disinformation (linked below). So I unfriended him and watched: that same day, ‘someone’ created a new FB account and almost immediately friended two of my friends, posted ONE activist post, and ONE peace post, then requested to friend me. Sure. OK. BUT I HAVE MY EYE ON YOU, because that’s how easy it is to get a new identity and hook back up to a target. Not that I care. Trolls are tasty.
Are you being targeted by online government trolls
How Social Network Trolls Target, Track, and Psychologically Profile You
Reading this post you will learn…• That there are three basic kinds of trolls and subsequent ‘missions’ against targets like YOU; • That there are troll profiling and tracking tools or methods which can be recognized; • That there are ways to protect yourself without drawing more unwanted attention; • That the Troll represents a danger in that their ‘assessment’ can lead to escalation in your targeting. Is social media infiltrated by government trolls?
Government and Commercial Trolls
Consider, for example, the friend ranking and layer’s of affiliation tracking tool. A graphic is created containing a simple textual message. It is graphical because there is no easy way to distinguish between two identical text messages, whereas, altering a single pixel’s color by 1 imperceptible shade of difference makes it unique, and allows thousands upon thousands of individually trackable versions. A Troll who has managed to friend a targeted person of interest then posts the textual graphic as if a sincere request. Examples will be shown.
These kinds of posts seem innocent enough and easily get spread as requested, allowing simple computerized search processes by FB’s intelligence community or marketing partners to see not only who is close to the target party, but at what layered level and loyalty or, if you prefer, like minded thinking. In point of fact, ANY image shared with a given political, philosophical, religious, or other belief or emotional message can be so tracked to perfectly define each such poster’s psychological profile, and rank their threat level to the paranoiac governmental powers that be. The same is true of marketing trolls seeking to learn about your product usage or demographic, etc.
The only safe share, then, we might presume, is textual or perhaps the sharing of a URL and it’s image, or an image we ourselves create and have perhaps included in our FB albums. Even with URL’s however, the possibility exists it is still being tracked, especially if a Troll operated resource such as Federal Jack, a known DHS sponsored Sorcha Faal disinformationa conduit targeting conspiracy theorists, activists, and other ‘potential terrorists.’ Their goal is to get you to ‘share’ their links, thereby spreading disinformation while psychologically cataloging YOU and any of your friends’ beliefs; all who click to learn more. They may need to have a troll assigned to them, after all, for being yet another ‘potential terrorist’ — a free thinker, patriot, constitutionalist, etc.
Worse, we have learned from our new Paul Revere of the coming Second American Revolution (Snowden), that NSA is not only monitoring FB activities big time but that Trolls from NSA, FBI, DHS, DOD, and even the FED, and other paranoid agencies, and even corporations who have a strong and growing list of people who think ill of them, like Monsanto and some banks — all regularly maintain false social media identities for entrapment and spying purposes. They even infiltrate online gaming. Snowden’s latest bombshell, according the foreign media analysts, indicates there were so many game Trolls that it was starting to change the character of online gaming, and special tools had to be developed so that Trolls would not end up targeting other Trolls and more easily remain inobvious. We are talking here, about games with chat or other communications capabilities within the game or as part of game support, especially when in a social network manner.
And it is clear that snooping is also rampant among commercial interests, which is certainly true in online gaming, which after all, is a commercial enterprise. FB is perhaps the biggest offender in this area.
How can you spot a social media troll?
Differentiating an innocent graphic from a potential spy tool…
There are several online graphical message generating services. FB themselves seems to be hooked up with one called your-ecards (.com). Another is someecards (.com). Anyone can use these to generate a simple textual graphic with or without use of stock illustration graphics (e.g., a man looking perplexed), typically in silhouette or line art form. They can then easily share it through their favorite social media(s) with a few additional clicks. These can always be recognized because the logo for the creating Web service is displayed at the bottom. An additional hallmark of such services is that the background is almost always colored, and there are scant few colors available. The default color or otherwise most popular seems to be pale blue, pale green, or yellow-orange.
So when you see a colored background, typically with larger or fancier text than a normal posting, you are clearly looking at a graphical text post. The next thing to look for is the logo. If you see a logo, it was likely a sincerely generated message by a genuine human resident of social media. However, if there is no such logo, the message may have been generated by a Troll using his own computerized tools to psychologically target you regarding a select individual hot button. Are you, for instance, a tax protester, pro gun, anti GMO, for or against a given politician or political topic, or simply, who is a good like-minded friend of yours as opposed to some stranger you’ve accepted on the Network. Such messages also tend to be minus any artwork — text only. There is one more defining clue to look for.
Because there may be multiple versions of the same message for targeting different individuals by multiple Trolls interested in gathering information about many someones, there is a need to tell one shared message copy from another, which is exactly why it needs to be a graphic. YOUR version must be physically different from MINE. The simple solution is to vary one or more pixels in a way easy for a software routine to detect, and then match to a targeted individual and their Troll/need. Given the countless millions of users on FB (and other social media) who might be deemed targets, it may mean that many, many dozens of pixels will need to be manipulated. My research shows that, indeed, most of the suspicious postings, in addition to missing the logos, have such visual manipulations. Examples:
So one needs to look for such abberations or flaws in the background, usually darkened pixels along the edge, most commonly gathered in clusters or strips. You have to ask yourself… if going to the trouble to create a custom graphic for a text message instead of simply typing it in, why would they: a) choose the ugly colors used by such as your-ecard if not trying to make you think it such; b) take the extra steps to strip away the logo if using such a service (the point being they did not); and c) end up creating an image with a flawed background (where did the aberration come from, if not deliberate)?
When these clues are present, you are staring at a Trollish spy tool. To then share it betrays and catalogs you and links you and your beliefs with any of your friends who do the same, and theirs, and so forth, on down the line. The proper thing to do is enter into the comments: “I suggest you delete this post because it fits the description of a Troll’s chain-letter spy tool to catalog, track, or psychologically profile and establish links between like-minded persons: learn more here: http://wp.me/p1GyKw-zi” That link goes to this blog post you are reading.
Then I suggest you share the post anyway with a similar message, “Share this to warn others about Troll spy tool chain-letters to catalog or psychologically profile and establish links between like-minded persons. To learn more about this tool, visit this link http://wp.me/p1GyKw-zi.”
Finally, look carefully at the original post. Most social media will have a means to indicate if it was itself being shared, or was a direct post. If direct, it’s YOUR Troll. If shared, the poster was gullible in sharing, and is not likely a Troll… but beware that that could be arranged for as a deceit — so watch to see if the poster repeats the ploy frequently. You might optionally go to the ‘cited source’ of the share and try to find the post on their wall if you want to try to see if they are the Troll, and on to the next if not, and so forth, posting or messaging those encountered along the way who are victims, if you can. But that can be a LOT of work.
Are social media trolls sociopaths or psychopaths?
More Direct Trolls; Psyops and Sociopaths
The real threat to activists and politically incorrect persons online, like myself, is government agents paid to do nothing but sit in front of a computer and pretend to be your social network friend, someone you don’t really know at all, of course. They don’t just post Trollish images, they comment, and even message you. Like the aforementioned tool, they seek to learn everything they can to psychologically profile you, as well as see who ‘likes’ your posts and what THEY comment. But they are also there to play mind games. You are officially a victim of psychological warfare, perhaps even by someone from within the U.S. military, or even the military of another country. They are quite often sociopaths, so chosen because those traits make them more efficient.
Here are some tips on how to spot and deal with this class of Troll, as well as the kind of Troll who is simply out to make trouble for a given collective of people who believe a certain way about a certain topic. You know the type, my favorite example being the warrior Atheist who deems it his life’s mission to ferret out believers in God and annoy them with endless barbs and zings as if they were evil and dangerous for daring to worship. These people will wax sociopathic, too, and even psychopathic, when given enough rope. UNFRIEND these kinds of Trolls.
Hint 1) Trolls work in packs or maintain multiple identities to be a self-contained pack. That way, if you delete one of them, others survive, and then they generate yet another new identity and friend request to maintain the pack. The advantage is that you can suffer a series of ‘In deference to your view, we all seem to believe the same (whatever)’ posts (i.e., you are an idiot on this matter). Sure. You might be an idiot. But at first, the pack is all positive and flattering to your own beliefs so you a) get used to seeing them, and b) start respecting their beliefs and presuming them the same as yours. That’s the worming in stage.
But when it is appropriate for profiling or attempting the role of agent provocateur or disinformationalist, they will all suddenly be believing in something more off the mark, and increasingly so, as often as not. But by now, you like them and their beliefs, and so, your reaction tends to be as they expect; they are pulling your chain, and observing your jerks, evaluating, and cataloging, attempting to modify your behavior through deceit — a form of mind control. Can you be controlled, or are you firmly centered in your beliefs? Are your notions your own, or being foisted upon you?
Hint 2) New Troll requests tend to be persons with scant history on the network, and very few posts, but posts akin to your own in substance. Note that Facebook asks you to suggest friends to them. NEVER do this unless someone you ACTUALLY KNOW in the real World. If you do it, you are giving them a list of new targets. Since I don’t fear and even enjoy playing with Trolls, I let anyone into my friend list, but that does not mean they get what they want from me. But you may be better off simply passing on marginally viable friend requests.
Hint 3) Try posting something deep and yet somehow provocative (in the eyes of the establishment) which requires a bit of reading and thought before drawing conclusions. Look for a pattern in response from the same suspect persons; a) almost instantaneous response in the manner of (Hint 1), and typically emotional rather than logical in nature. This is almost always short and designed to be inflammatory or provocative, a bit testy. This is followed by b) one or more secondary (pack) responses delayed rather a bit in time. These will be more in depth and thoughtful, and validate the former with logical argument, and may contain a link to give further credibility. Other brief pack replies may be sprinkled in for effect. Collectively, they are all in agreement regarding your idiocy (or whatever).
It is when the same people tend to respond in these patterns that you are very likely dealing with a Troll pack. You will find this is true regardless of what time of day or night you post. They never sleep because every psyops Troll is actually three people manning a keyboard around the clock. They can always respond quickly with the first response, but the careful response requires that they actually research and formulate the best supporting answer based on all they know about you and the topic, which they might need to first research, and likely, it involves a supervisor’s approval or must be compared against preset guidelines.
Hint 4) Thick skin, undaunted. There is nothing you can do to make these people not remain your friend, short of unfriending them, yourself. While they may match or even exceed your own expression of ire, they won’t go away no matter how you might choose to argue, or confront with insult. Indeed, they tend never to deal with insults directly, at all; they are irrelevant and serve no usefulness to their goal. A real person has an ego that must be defended, but they are just playing psychological games and feel superior regardless of what you say. But when you argue, watch out for the next hint, which is commonly employed in their responses.
This is also true of the sociopathic/psychopathic ‘cause’ trolls.
Hint 5) They tend to employ the 25 Rules of Disinformation. Easy to spot, easy to deal with, if you know what to look for. Be careful, though, because ordinary people sometimes use flawed presentation style or less-than-thoughtful posts which on the surface appear to fit one or more of the rules, when they are just being human. Watch for repeat performances, to know the difference. Give them rope.
Can trolls lead to real-world targeting?
Dangerous escalations; why we dare not ignore trolls
The real danger in online Trolls is this: their whole purpose in targeting you online can be to determine if you deserve real-World targeting, as well. With a few keystokes you can end up having your entire life put under a microscope; phone surveillance, tails, observation posts, bugs and cameras covertly placed in your home, mail intercepted and snooped, and so forth. Men in Black stuff. Its why I wrote The Professional Paranoid; a how-to book on detecting and dealing with this kind of targeting.
And, it can escalate further: electronic harassment, dirty tricks, political control technology (mind control) to make you look mentally ill to others, destroy personal relationships, wreck your income, and sabotage your life. For that, I wrote MC Realities, another how-to.
But it can also lead to the worst of all possible escalations; NDAA vanishing. If truly a pain in the neck to the government, a threat which needs to be dealt with more urgently… you can ‘legally’ (so they claim) kidnap you and make you vanish without any legal process. They can elect to torture you or give you over to some other country for ‘processing.’ Or, if they want, they can murder you and dispose of your body. This is how we know we are living in a tyrannical Police State, and why, then, government dare not tolerate free thinkers without Trolling them, and trampling on rights and freedoms at every turn, and why fear mongering is their number one justification. ‘Oooh… terrorists are everywhere! We need to TSA and NSA your ass for your own safety.’
What should I do if I encounter a social media troll?
What to do with a Troll
I personally do not mind their presence so much as some might. I enjoy providing them with disinformation, or provoking them to try to chase down a given pathway of dialogs only to suddenly drop the matter as if it never happened, or I don’t really care, or even was deliberately jerking their chain. I even kid them.
But most people would prefer to unfriend them, and there is NOTHING WRONG WITH THAT. Just know they will be right back with a new identity. It may be better to deal with the ones you know than to worry about finding the new ones you don’t yet know.
My favorite thing, however, is to educate them. I like posting factual material which challenges their personal beliefs that their job and their boss are operating on valid or just principles or beliefs, and purposes. I make them ashamed or feel guilt, whenever possible. It does not work with everyone, of course, but it is fun to try.
Are social media trolls dangerous?
Your privacy and personal safety could be at stake if you are in the hands of Trolls. The threat level is determined by how much our paranoid government fears people who fear government’s growing fascist police state/spying mentality, and dare to talk openly about it. The more vocal you are, or the more aligned with or closer in links to others of like mind, or the more active you are elsewhere on the Web, or the more followers you have, and even the kinds of searches you make (that, too, is being watched by government) and certainly, your own original postings… each of these things determine if you might become the victim of someone else’s Troll, or have a Troll assigned to you, and what kind of Troll.
And once your ‘threat level’ has been assessed, that could lead to escalations that you will not likely want to experience. If you get a sense that such escalations are already in place or happening, by all means read my books, because they will help you know for sure, help identify the players, and form defenses. You can also contact me personally for free and for-fee online consulting or direct intervention services.
It’s what I do when I’m not being a thorn in the side of tyranny… and attracting Trolls.
FEMA and the rest of government seems quite paranoid about disasters of late, but clues suggest there are hidden reasons behind urging preparations — not the earthquakes, floods, nor fires they talk about. Conspiracy theories based upon dialogs by geophysicists, astrophysicists, and politicos seem far more likely the cause, and that puts a whole different face on what ‘preparation’ should involve and mean for you.
Why is government pushing emergency preparedness?
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
Can we really trust FEMA?
Reading this post series in three parts you will learn…
- That there are significant reasons you absolutely should have an emergency preparedness program in place;
- These reasons go well beyond natural disasters FEMA implies of concern;
- There is a logical preparedness program that accommodates all concerns…
- A program which should be considered by privately-held businesses as well as families:
- It is NOT approved by FEMA, DHS, the Military, or other elements of the New World Order
What is the history of the emergency broadcast system?
I very clearly remember the ‘Red Scare’ spillover from McCarthyism which translated to ‘fear the bomb’ in the 1950’s and 60’s… starting with the Eisenhower White House: Air Raid sirens were tested weekly or daily, typically at a fixed time of day as if a Church Bell announcing Noon. I was a teen during the Cuban Missile Crises under Kennedy, when talk of the day was the home Fallout Shelter, and at school, we had ‘duck and cover’ drills as often as fire drills. But the scare wore off by the 70’s, and sirens and shelters were no longer in vogue, though every downtown building tended to have a well marked public shelter. Yawn.
Fast Forward, Bush I White House: For no visible or announced reason at all, the Emergency Alert System (EAS) and CONELRAD Radio alert system which had in evolutionary form driven those sirens for two decades was turned back on in the 90’s, and updated for improved use with TV. But rarely was it tested, and then typically late at night between late-show snoozes. Just fire drills at school. No more sirens, unless there was perhaps a fire or other actual emergency. Very unobtrusive. No problem.
Fast Forward, Bush II White House: Suddenly, somewhat synchronous with the formation of Homeland Security, these alerts started increasing in frequency and were randomly interrupting all manner of broadcasts at any time of day. They now had the ability to actually take over newer televisions, even if turned off or in use with a VCR at the time. Somewhere along the way, it was expanded to include hazardous weather condition reports and the AMBER ALERT system for missing children. Schools still worried about fires. OK. Well, perhaps.
What kind of threats should an emergency preparedness plan address?
The current threat assessment
Fast Forward, Sorento White House: Suddenly, and synchronous with DHS seeking to buy 1.4 billion rounds of ammunition (that’s several Vietnam wars worth), all over and above military orders… not to mention a long list of equally disturbing purchase efforts involving coffins, ‘emergency housing’ which more closely resembled prison camps, food and water stores, vaccinations and anti-biotics… numbering in the millions more often than not — the tests started increasing in frequency and in duration. Annoying. Suspiciously omnipresent, excessively foreboding.
What bothers me most is a synchronous rush request for proposals on delivery of emergency preparedness items and relocation and readiness orders to military to FEMA Region III (Atlantic Seaboard States near D.C.), all with a date of October of this year. In fact, much of FEMA’s promotional material is geared to 2013, specifically. Most of the darker things cited in this post are happening right now in 2013 or otherwise generally depicted as an immediate potential threat.
Worse, both DHS and FEMA have started multiple high-profile media campaigns suggesting we all need emergency kits and emergency plans. This is also all simultaneous to a bit of mainstream news and much suppressed facts being revealed on the Web regarding an approaching Planet X, approaching comets, several near misses by planet-killing asteroids, and a flurry of unusual meteor activity to include nuclear blast-strength explosions in our atmosphere (the Russian meteor injured nearly 2,000 people and caused significant wide-spread structural damage over hundreds of miles). And there is more…
Also simultaneous are geo-political and financial threats the likes of which have never been seen in the history of the planet, each threatening dire unrest to the point of forcing Martial Law. While this goes on, the sun is spitting gigantic record bursting electromagnetic pulses at us and the pole is shifting, Fukushima is continuing to increase its threat, not to mention shifting weather patterns and an increase in seismic activities of Biblical proportions. Dare I mention strange phenomenon like objects orbiting the sun, mysterious loud and scary sounds heard over thousands of square miles, two suns and other oddities in the skies day and night? Endless wars somehow always tied to terrorism and oil keep being announced. No wonder large numbers of people are actually starting to think End Times might actually be around the corner.
The end of oil supply as we know it indeed approaches. Extremist terror groups pose theoretical threat of biological, chemical, or nuclear WMD. Criminal nations threaten to attack us with nuclear weapons. China is on the verge of surpassing the US as super power, and their top military leader has said war with the US is inevitable; their only answer to that being to strike first. Man-made bio weapons, nanotech, and even genomic weapons are being developed daily by all modern military powers, and we get cover stories expressed as worries of a natural pandemic outbreak of catastrophic proportions. The Center for Disease Control has even gone so far as to talk about preparation for a Zombie apocalypse, and there is some evidence it is not as tongue-in-cheek as they profess. Don’t forget chemtrails and the feared NWO depopulation plot.
The worst part is all the talk about a possible military takeover, martial law, a new Constitution and a North American Union. Why, that’s nothing short of saying the Antichrist is coming to power… and some say that’s the case, too. Agenda 21, GMO crops, Codex Alimentarius, the Small Arms Treaty (goodby 2nd Amendment), etc. All these things tie in one to another as if all by some organized conspiracy (Illuminati?) After all, they say, the Norway Spirals were likely a test of Project Bluebeam, to simulate with a kind of holographic event the Second Coming in the Antichrist’s name. And what about those tens of thousands of ‘State of Martial Law’ warning/instruction signs coming into the US from foreign sign makers in convoy manner? Really, really not good.
Almost everyone has some kind of foreboding sense that SOMETHING bad this way comes. Armageddon Online has a more detailed summary view. And just as someone chooses to discounts all of these things as ‘baseless,’ something like this comes along to make us wonder all over again: a lot of people are saying there is a purge of the military taking place, and that usually portends a violent overthrow of government.
So, quite naturally, some of us are taking the DHS/FEMA advice to heart, or at least considering it. But I fear most of us are preparing for the wrong thing in the wrong way. Its one thing to have food, water, medical, and key supplies stashed away for an earthquake or flood… and another to truly be prepared for upheavals of the political or Biblical sort… the sort government advice is NOT addressing, because if you were prepared for that, government looses the ability to maintain political control through dependency upon government for survival.
Never fear; the Professional Paranoid is here to help you find your way through it all… in part II: A Logical Home Emergency Response Plan: The Government Does NOT Approve
Why should I hide my emergency preparedness kit and weapons?
- FEMA Preparing Military Police For Gun Confiscations and Martial Law (eutimes.net)
- What’s This FEMA Video Trying to Tell Us? (politicaloutcast.com)
- Dave Hodges ~ The Use Of Food As A Weapon Against American Citizens (shiftfrequency.com)
- FEMA REGION III – OCTOBER 1st – OFFICIAL FEMA DISPATCH! (prayingforoneday.wordpress.com)
- Is the FEMA Region III Alert a Red Herring? (activistpost.com)
- “Martial Law is Now in Effect” Signs: Why Would These Signs Be Printed? (solidarityintruth.wordpress.com)
A sure sign that the government fears a military coup or the military itself is about to attempt one, is a purge. The government will purge those it fears unloyal, and/or the military purges itself of those unwilling to go along. Whoever best purges post haste, just might win. Either way, however, the people tend to loose to an errant government and/or would-be military dictator. It is, after all, how authoritarian Police States are born.
Is Obama conducting a purge of the military?
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What causes a military purge to take place?
Reading this post you will learn:
- That history proves purges take place when governments fear their military is about to take over…
- Or when the military prepares for such takeover…
- And such tyranny grows from purges within political circles and the military to involve citizens…
- Everyone is challenged with loyalty oaths, untrue (or otherwise) accusations, tricky questions, or even torture…
- The wrong answer can mean death, prison, or ‘vanishing;’
- Evidence abounds that we have been in a pre-event purge for several years…
- That the purge is nearing the point of reaching open armed conflict;
- That the result of a purge is almost always a Police State, regardless of which side wins
Why is Obama conducting a military purge?
Updated Nov. 14 2013 Changes indicated in RED reflect latest termination and dim view of purge by Russia and China who see it as possible PRELUDE TO WAR.
Updated Dec. 10 2013 Section added and indicated in RED as relating possible ties to Global Research Web site going dark and decade old CIA plot to capture Soviet nuclear warheads.
History on Parade…
History is rife with examples of political purges, both bloody and near bloodless, and unfortunately, both sides can end up playing the game. Sadly, we also see that most bloodless purges end up being bloody at one point or another; they push the other side into reactionary defensive acts. Worse, once one side or the other becomes dominant, the purge is extended from the national politik (government officials and military) to local politik (regional-to-city leadership and law enforcement), and from there, down to every day citizens; any such purge portends a intended shift in power to an actual or de facto authoritarian dictatorship.
The classic example would be found in the Russian Communist Revolution, which actually evolved as successive political leaders reshaped ‘the revolution’ to suit their own visions. But you find the same things generally true in the French Revolution, Mao’s Red China, or even in the American Civil War, where the Union employed the Ironclad Oath, and various Generals (see last paragraph in the link under ‘1862’) exercised internal ‘loyalty and fitness’ purges, ad hoc. One could easily be shot for a careless comment or answer.
Why would Obama conduct a purge?
A purge HERE?
There has, in fact, already been an attempted military coup in the United States. We are, or were, fortunate at the time, that the attempt failed before the purge which would have been required could get started. While most Sheeple have never heard of it because it was contained and not made public, most of the rest of us are aware of the Business Plot of 1932 which attempted to stage a fascist takeover in America by means of a military coup. Some of the biggest Industrialists of the day were involved, names which still today are iconic labels on everyday products, like Singer, and Dupont.
But thanks to one-tough and loyal Marine who tricked his would-be conspiratorial recruiters, the affair backfired. That’s a big ‘Hua!’ for Major General Smedley Butler. But a purge did follow, one which sought to eliminate the threat from the cadre of business leaders and their friends involved, including other military — along with an attempt to cover up the entire matter in order to maintain confidence in the nation’s internal and external affairs.
One thing remains clear: the general purge model is especially of concern when one is dealing with a bloody purge, because it does work its way down to citizens, Sheeple or otherwise. Especially otherwise. And so, I strongly urge that we must take a very close look at our current troubled situation and most recent history with respect to Presidents, politics, economy, international affairs, and the military. So, what’s going on, here in America, right NOW? Well, the answer to that won’t be found in mainstream media unless, perhaps, you are talking about press from abroad.
Now comes a new worry: The European Union Times is reporting the both the Russians and Chinese consider Obama an unstable, power-hungry madman and, with the latest firing (added below with RED) , have themselves taken unprecedented military responses towards possible military conflict with the U.S. and any of its Allies. Seemingly related, are two other news stories in one at the Web site regarding Chinese troops (and a spy ship) in Hawaii, and a simultaneous FEMA ‘simulation’ of cyber attack (Fire Sale) on US power and communications networks, itself timed to coincide with the largest Cannibalistic Corona Mass Ejection the World has ever recorded striking the earth and disrupting our magnetic field in a way which threatens disruptions similar to said cyber attacks . A grain of salt is due, here, as the EUT is, well… extremist in nature. Extreme ‘what’ remains in question… a bit like a super-market tabloid without aliens and pictures of personalities doing naughty things or being too fat on the beach.
Update Dec 10, in support of prior update…
Is the U.S. military conducting an internal purge?
Proof of a purge?
Many observers think its happening, including people who are far from being conspiracy theorists; media types, military professionals, and more. In simple terms, consider the following statistics and facts, none of which are in dispute, though almost all of which are veiled from Sheeple’s eyes by media and government. Mainstream employs careful wording and skips filling in the blanks with useful detail. But others mince no words.
And speaking of words, we must realize that when a bloodless purge is underway, there must simultaneously be ‘disinformation’ to cover up the fact. This means that excuses will be used to veil the truth, and this will be quietly accepted at first by both sides, often because, at least for the individuals involved, some form of blackmail or other threat is in place to insure their silent acceptance. For some, it may be some form of National Security agreement. For others, it may be a sexual indiscretion, or a criminal or financial matter which dictates cooperation lest it be made public.
So take what is often offered in ‘face value’ with a grain of salt. It is the fuller picture which is painted in the broader strokes which overpower individual words, or lack of words… and bear in mind that when there is a purge, one must also look at resignations as part of the ‘flow’ of things — especially if related to protests or potentially motivated as a self-defense move. Doubly so if in numbers.
Why is the U.S. Military conducting a purge?
Is Obama conducting a purge?
Many think so, and the preponderance of evidence cited would seem to support the notion. It is, after all, what prompted my own review (more detailed than theirs, naturally — that’s always my goal, at least). Consider these reviews, and the fact that many sources claim Obama’s differences with military leadership have to do with his asking them if they were willing to shoot Americans, presumably in a gun-grabbing operation of some kind:
Freedom Connector, Nov 16, 2012: What’s Behind Obama’s Military Purge? — by Bob Livingston, an ultra-conservative newsletter writer;
The Independent Journal Review, on June 28, 2013: Obama’s Purge; Military Officers Replaced Under the Commander-in-Chief — a situational analysis by Kyle Becker;
The Western Center for Journalism: Obama Escalates Military Purge — by the Editor
World Net Daily, The Examiner, The Guardian, and many others citing The Blaze, Oct. 23, 2013: Blaze Sources: Obama Purging Military Commanders — Sara Carter citing actual fired military commanders’ viewpoints.
There are many more, but you get the idea. From the outside, looking at the observable clues leaking out from the inside, and sometimes even from the mouths of those involved, the impression is a Presidential purge is under way. More: since the above, Sorento’s desire to attack Syria met with such resistance in military circles as to warrant an article (translated from an unstated German source), well worth a read: Historical Disgrace: The U.S. Military Mutiny Forced Obama to Retreat. Yet as already mentioned, other stories relate that the purge is because the Military is refusing to go along with plans to grab guns and shoot Americans who refuse to comply.
Why does a military purge predict a shift towards authoritarian dictatorship?
Flip side: is the military is purging itself of White Hats?
No one else on the Web seems to think so, but I’m wondering why not? When the stability of a country comes into question, forces within the military tend to start wondering if they need not do something drastic to change things, and eventually, a strongman General is able to recruit others of like mind to work out ‘contingencies.’ One of the first steps in preparing for possible enactment of such plans (a coup) is to evaluate the remaining Officer Corps, and get rid of loyalists.
Or, it may be a group of powerful business leaders who make the call, and who recruit members of the military for their cause, resulting in the same process, a ‘la The Business Plot of 1932, already mentioned.
You know something sinister and deeply troubling is going on when Veterans are being told they can’t fly the American Flag on public property, Officers, even Chaplains, are threatened with court marshal for having a Bible on their office desk or speaking about religion with others who are not already in the same faith, and telling them to resign if they have a problem with the policy. What? Oh, I forgot: the military and military policy is dominated, according to authors like Alex Constantine, by Satanists.
In point of fact, as Alex and others have pointed out, self-proclaimed Satanist General Michael Aquino, was a chief architect of the Revolution in Military Affairs, the policy which defines the next major new war type the military will face is ‘A People’s War,’ where the enemy is disgruntled patriots, Constitutionalists, and the poor and disenfranchised. Well, now, that’s just about everybody in the U.S. but the ten percenters at the top, and dumb Sheeple, is it not?
Now, while the first section paints a picture of a Presidential purge, I must remind you that both sides of a major power rift often purge, and that outwardly, the signs will typically tend to look the same. So now, let’s take a closer look at those purged and their circumstances, to see what we might decide for ourselves. After all, other Web sources speculate the reason for Obama’s purge is that he fears a military coup, a notion which alledgedly originates directly from the Russian Military and the Kremlin.
However, that story would seem to be related to another alleged Kremlin and GRU (a KGB-like Russian Spy group similar to CIA) claiming Obama had ordered the detonation of a nuclear bomb in or near Charleston as a false flag event and the military refused, prompting the firing of so many nuclear commanders. I find this fascinating, because in my book Fatal Rebirth, I predicted Charleston would be the target of a nuclear false flag attack AFTER the also predicted (in 1999) downing of the WTC by passenger jets and resulting in a series of Middle East oil wars.
Snopes.com, whom I do not entirely trust as a legitimate ‘debunker,’ does attempt to debunk the above story by attributing its true source to Sorcha Faal, a known professional disinformationalist who works for, among other people, DHS. So then, why would DHS promote this particular disinfo? That makes no more sense than the outlandish conspiracy claimed by the story. But if baseless, and not Russian sourced, why has RT (Russian Television in English) News not ALSO debunked it, and instead reported on it as factual?
So understanding if there is a purge, and who is undertaking it, and why, is going to be difficult. Really, you can’t tell your players (or their position on the team/role in the game) without a roster. So here it is, so you can decide for yourself…
What are the signs of a military or political purge?
Point Comparisons: Roster of 266 Vanquished Officers and Key Staff under Obama
This is an updated and more accurate compilation the found in lists elsewhere which cite 197 or fewer. More than 50 being offered in rich detail, here. These numbers represent a massive bloodletting not seen under any prior President in American history. There are so many you might be tempted not to read them, but in the reading, at least of their name and command position, you find some interesting, if not scary things, not to mention patterns. To be sure, some who were let go may have indeed been let go for non-purge and quite legitimate reasons, but the large numbers of higher rank Officers and the nature of the clumps of specialities/assignments/duties, especially, amplify reason for concern that more is afoot than ‘bad conduct’…
Fired Nov. 3rd, Colonel Eric Tilley, Commander of Japan’s largest U.S. base in Japan for ‘allegations of unstated misconduct.’
First Lieutenant Ehren Watada was the first Officer to refuse deployment to Iraq as an illegal war, was eventually allowed to resign. Now, if his view was unjustified in the eyes of military, why was there no court marshall? If justified, why did we go to war? It implies disparate viewpoints in military ranks, and between military leadership and the President;
Major Stefan F. Cook, US Army Reserve, refused to deploy because he did not believe Barry Sorento was a legally elected President, joining with two other officers according to Wikipedia (no Web source names them, but they are described as a retired Army Major General and Active Reserve USAF Lieutenant) in a law suit (Cook vs. Good – scan down). They did not win their suite, but neither did they have to serve, again meaning disparate viewpoints. Touche’;
Captain Connie Rhodes, US Army Physician filed a similar suit (just beneath prior link, same page);
Predator Drone Pilot Brandon Bryant resigns USAF over immorality of drone attacks on noncombatants, making five people who refused to serve and suffered no court marshall;
Colonel James H. Johnson III, Commander 173rd Airborn, fired and convicted of bigamy and fraud in expense accounting, apparently jumping out of the airplane and into the frying pan;
General Joseph Carter, Commander Camp Edwards and Adjutant General of the Massachusetts National Guard resigned even though a months investigation failed to produce evidence of a rape allegation;
Brig. General Jeffery A Sinclair, former Dep. Commander 82nd Airborn in Afghanistan, fired and facing possible Grand Jury review for criminal sexual indiscretions — sounding a bit like the CIA entrapment of Wikileaks mastermind, Julian Assange;
Army Major General Peter Fuller, Commander in Afghanistan (of unstated forces — which to me implies intelligence hanky-panky), let go in 2011;
Marine Major General C. M. M. Gurganus, Commander Regional Command Southwest and 1st Marine Expeditianary Force (also Afghanistan) was let go in 2013;
Marine Major General Gregg A. Sturdevant, Commander Aviation Wing at Camp Bastion, Afghanistan, and Director of Strategic Planning and Policy for US. Pacific Command, let go in 2013;
General David D. McKiernen, Commander of the Afghanistan Theater was let go at Obama’s orders after four months of arrival, for saying the campaign was less noble than was Iraq. That was 2009, making him the first four-star General released by a Commander-in-Chief since MacArthur by Truman. In 2010, Obama fired…
General Stanley McChyrstal, Commander of NATO International Security Assistance Force (IASF), Afghanistan, a matter linked to the death of reporter Michael Hastings. He was replaced by another soon-enough-to-be-fired General Petraeus, below. Seems like Obama liked no one involved in the Middle East, does it not?;
General David H. Petraeus, also left the Army as NATO IASF Commander as to be appointed by Obama as Director of Intelligence, CIA. He then resigned CIA over charges of an extramarital love triangle, but at the time there was the controversy about the CIA’s role in the handling of Benghazi intelligence and no-go rescue aftermath. And, stepping back once more, the man who replaced him at ISAF when he stepped up to CIA was…
Former General Michael T. Hayden, in like manner yet again, quit the USAF to be appointed by Bush II to be Director of NSA, and then, also like Petraeus, was fired over extra-marital sexual conduct (officially), and unofficially, over internal disagreements with Obama on intelligence policy and validity of evidence regarding alleged Syrian nerve gas attacks (shades of Bush and Weapons of Mass Destruction in Iraq);
Marine General John R. Allen, Commander of NATO International Security Assistance Force, Afghanistan, was investigated and removed for ‘inappropriate communications regarding Bengahzi’ (he countermanded White House orders not to attempt rescue of the besieged Embassy). The investigation continues without fruit, be he was also seemingly an injured party in the above Petraeus love triangle. You couldn’t make this stuff up as screenwriter of a Kardashian’s in Uniform special. Now, regarding Bengahzi…
General Carter Ham, Commander Africommand (counter terror operations) also relieved of command and arrested for attempting rescue despite orders from White House to stand down… and before him…
General William ‘Kip’ Ward, 1st Commander of the Africommand fired for ‘financial irregularities’ in expense accounts;
Rear Admiral Charles M. Gaouette, Commander of the Stennis Aircraft Carrier Strike Group relieved of command in the middle of Middle East deployment for unstated ‘inappropriate leadership judgement’ also thought Benghazi related. But not just him…
Capt. Owen Hornors, Commanding Officer of the Carrier Enterprise, no less, was let go for ‘making and showing to the crew raunchy cartoons.’ No patterns here, folks — move along, move along;
Rear Admiral Ron Horton, Commander of Western Pacific Logistics Group was also fired for knowing about and failing to put a stop to the Enterprise cartoon shows;
Brigadier General Bryon Roberts, Commander of Ft. Jackson (training facility) resigned over charges of an ‘altercation’ with a woman. He commanded the training of the Iraqi Security Forces slated to replace US Military, and served directly under the Joint Chiefs with distinction;
Vice Admiral Tim Guardina, U.S. Central Command, drops two ranks to Rear Admiral, and looses his 2nd in Command position in charge of nuclear weapons for allegedly using counterfeit casino chips (felony fraud). Now that would be easy to set up as a frame up… which begs the question, why no criminal charges or court marshall, if true — or a resignation? It’s called ‘leverage’ and keeping a close eye on a person in question by keeping them close at hand;
Four-Star General James Mattis, Commander of US Central Command, being fired for ‘Mad Dog’ warnings to the Obama adminstration on the dangers of proposed Middle East military actions in Syria. Very interesting if, as stated in the next item link, he was the one responsible for that firing, and perhaps more so, if it was his replacement who arranged it (at this point, I’ve not been able to isolate which might be closer to being true, if either);
USAF Major General Michael Carey, Commander 20th Air Force (that’s 3 Wings of ICBMs/450 warheads at three AF Bases) was let go in 2013, making the third man in charge of nuclear forces to be let go — unprecedented;
Army Major General Ralph Baker, Commander Joint Task Force Horn of Africa in Djibouti, Africa, let go in 2013 — anti piracy and counter terrorism support unit, also likely to know what really happened in ZeroDark Thirty;
Lt. Col. Matthew Dooley, 20 yr Vet Army Instructor for National Defense University and Joint Forces Staff College allegedly fired at Obama’s request for teaching a previously approved course called Perspectives of Islam and Islamic Radicalism (for which he had also previously been commended) because it was deemed ‘offensive’ to Muslim organizations who somehow managed to learn about it (but had not experienced it). On the other hand, the Army Vice Chairman of the Joint Chiefs, now head of US Central Command himself described it as “against our values,” and so, this appears more likely a military purge victim than an Obama victim, done in a way that blames Obama publicly. A nice two-edged blade being twisted;
Commodore of Logistics, Lt. Col. Allen B. West, Battalion Commander, 4th Infantry, 20 year vet forced to retire pensionless for coercing terror attack information from a prisoner in Afghanistan by discharging his weapon to get his attention. Now that’s odd, because Logistics has nothing to do with prisoners. However, Logistics is THE MOST KEY tactical element of ANY military action;
Marine Colonel Daren Margolin, Commander of Quantico’s Security Batallion — FBI’s and USMC training facilities also used in joint LEA/Military trainings even when disallowed by Posse Comitatus;
Marine Colonel James Christmas, Commander 22nd Marine Expiditionary Unit and Special-Purpose Marine Air-Ground Task Force Crisis Response Unit, let go in 2013;
In 2012, Six USAF Training Officers from Lackland AFB base were fired after being charged with rape and adultery;
In 2011, 25 Command Naval Officers below the rank of Admiral were let go (not already mentioned), including captains of nuclear missile warships and submarines;
Recall the TV show Last Resort, where an American sub commander staves off an unjust false-flag nuclear first-strike against Pakistan as part of a military-coup deception… by threatening D.C. with attack, instead?;
Also vanished in 2011, 12 senior enlisted Navel personnel in charge of key programs, facilities, and projects;
In 2012, an additional 28 Command Naval Officers below the rank of Admiral were let go, again including several captains of nuclear missile warships and submarines.
Also vanished in 2012; 15 senior enlisted Navel personnel in charge of key programs, facilities, and projects;
Meanwhile, still in 2012, 157 Career USAF Officers below the rank of General were forced to quit. Moreover, and potentially related, the USAF has resorted to offering nearly a quarter-million dollar bonus to fighter pilots to keep them from resigning after meeting their minimum obligation. Yet the 157 were ‘let go due to budget constraints’ according to the official story?
All the while this has been going on, and Obama’s proposed actions in Syria have not been sitting well with anyone but Sheeple on the citizen side, it turns out the military was not too crazy about the idea, either. Not just General Mattis and other officers already mentioned, but rank and file enlisted: a spontaneously created ‘photo-bomb’ campaign flooded the White House with individual refusals to serve in any military action ‘helping Al Qaeda’ fight the Syrian Christian government… appropriately went viral on facebook.
Does Obama fear a military coup?
Another kind of Roster: 92,600 Enlisted are being disbanded
Bloomberg is reporting, with the official line being budget cuts, that nearly 100,000 soldiers, sailors, and Marines are being let go starting the first of this month (several weeks ago, Oct.). The troubling element is that the bulk of these (67,000) are US Army. If gun grabbing operations took place, the brunt of such action would involve the Army. That fact, and the fact that the military has been using a Shoot Americans Questionnaire which would help them purge themselves of those unwilling to do so — if their actual plan, makes me wonder who is being forced out, and why?
And here’s another reason to wonder: If the Sorcha Faal story was done for DHS, and keeping in mind that DHS ordered enough ammo to kill everyone in North America several times over, the ONLY possible motive I can deduce for fostering Faalishness is to fuel a counter conspiracy to the real conspiracy. That is, if they were planning to shoot Americans over gun grabbing efforts, then why not create a counter story saying the Military was revolting because the President was going to grab guns and order them to shoot Americans to do it? It would be another two-edged sword blaming Obama. Watch the left hand so you don’t see what the right hand is doing.
I’m just saying. I really have no way of knowing any more than do you. But I do know how disinformation works, and that is definitely one way it is used. It’s how it got its name.
What does a purge of the U.S. Military mean?
The broad view: being caught in the middle
The stage has already been set for our consideration, and depending on who is doing the looking, lots of people are starting to see that a purge is taking place, almost all eyes focusing on the US Military and/or the Obama administration. Point of view dictates how they analyze the whys and wherefores, but they all agree that purge is the word.
Bloodless, thus far to be sure… but to remind… a bloodless purge tends to force the other side’s hand and can easily escalate to a bloody one, if not also outright armed conflagration. At some point, someone elects to do something to end the gutting of their power base, and that something is not usually gentle in nature.
That DHS has been buying up weapons, munitions, coffins, medicines, and other key items in quantities suitable for a twenty-five year war… and that FEMA has launched a massive ‘disaster’ preparedness advertising campaign, simply adds fuel to whatever may be the real cause of the mysterious smoke under consideration.
If you find this all a bit troubling, you may wish to do some more reading. One place I can suggest you start, is my own book set, Fatal Rebirth, which written in 1999, predicted the entire pickle we now see ourselves in, from the bringing down of the WTC by passenger jets to financial debacles to the purge, and much more.
A free ebook copy of Vol I can be obtained by email request to pppbooks at Comcast dot net. Given the violence purges tend to evoke, you may also wish to read my post (series) on emergency/disaster plans and resource kits to cover ANY threat, natural or man made. Who else but the Professional Paranoid would dare bribe you with a free book just to read a blog post? Email me!
Who is purging the military and why?
- Obama’s Military Purge (canadafreepress.com)
- U.S. Military Could Depose Obama, So He’s Destroying It (calvinistview.com)
- Obama Firing of Military Reminiscent of Stalin’s Purge (vaticproject.blogspot.com)
When the CDC starts talking about zombie attacks, DHS buys more ammunition than God and calls out all Federal Agencies to prepare for (something) at 100% strength with two weeks notice… while a Zombie blockbuster movie scares our pants off… there might just be something to worry about.
When do Zombies act on behalf of National Security?
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
Federal zombies may be in our future
OK, this might be tongue in cheek. MIGHT BE.
But it is completely factual (scary movie music rises). I just saw a couple of video blogs (streaming Web radio) where one of my kindred spirits (translation: conspiracy theorist, or on a good day, as we prefer it, investigative reporter) was interviewing someone claiming to be in the know: DHS, FBI, FEMA, and just about every other agency, military as well, have been ordered to bring all manpower, reserves, and resources, to 100% capacity by July 3, and to stand by for further instructions.
I’m not comforted by the fact that ALL the search engines can NO LONGER FIND THIS WARNING no matter what I type in (it would have helped if some of the words were not in use in gazillions of other vids, too). Thing is, two days ago, it was EASY to find using the same words. Who has the power to do that? No matter. I’m on the job. A few ones changed to zeros in government’s Internet won’t stop me.Note: This kind of censorship and information manipulation is one reason I formed nnn.osp.org to create a 100% citizen-owned-and-operated wireless Internet alternative where there is no ISP (no monthly bill), no government or corporate censorship, spying, or control: YOU are the Web!
In trying to solve that problem, I encountered something which revealed even more useful information than I was searching for. The CDC is apparently involved, too. We are talking about a terror drill involving a ‘fake’ outbreak of (something awful). Wince. Gee. What could that be? Well, I got to thinking. Recall the CDC warning about what to do if a zombie attack broke out?
Well, they claimed that was tongue in cheek, too. But I’m starting to wonder. Have you seen World War Z? Nothing seems far fetched after that! I mean… first CDC puts out the defense guide… then DHS buys enough ammunition to kill all the extras in WWZ (and every citizen in North America, with order quantities in Satanic numbers, no less)… not to mention enough coffins to take care of the half-eaten bodies… and now DHS, FEMA, FBI, the National Guard, (and CDC) are manning up for something very big.
And even if not Zombies… let us not forget that some guy named Kokesh (not related to David Koresh) is planning a ‘Million-man’ armed march on Washington, D. C. on July 4th. I mean… Damn! I don’t know what it means, but what I’ve more recently learned does not make me feel any better about, it all…
Why is terror drill set to coincide with Scout Jamboree?
Terror Drill Set for Scouting Jamboree
The orders for these agencies are to be at 100% by July 3rd, and then to stand by. Turns out, unless a cover story for a general Martial Law (you don’t suppose Kokesh is going to end up in a shootout with Feds, do you?) move to seize power by the New World Order, that there is to be a terror drill in Yellowstone during the Scout National Jamboree (July 15-24). But wait one minute; is it not true that at almost EVERY major terror event blamed on some turban wrapped, kidney machine toting, Koran spouting man with a beard… that there was simultaneously a terror drill of the same exact sort taking place at the same time?
Is that not the HALLMARK of a false flag operation? You create an exercise or drill on the same date in the same community for the same kinds of details (e.g., type of attack, type of target), and then, if the people really responsible (no turban, kidney machine, or Holy book) happen to get caught before they can pull it off, you say ‘It’s OK, they are with us, and everything is coolness.’ Where have we seen that used before?
A few places. The Sarin gas attacks in Japan. Sept. 11. The London Subway bombing. Bombing in Madrid. The Norway mass shooting. Even Aurora and Sandy Hook. Retired Army Intelligence Officer, Captain Eric May has said, “The easiest way to carry out a false flag attack is by setting up a military exercise that simulates the very attack you want to carry out.”
Are Zombies real after all?
Zombies on parade
Again, ‘tongue in cheek’ can only go so far to making one comfortable about the facts. Also while searching for the missing radio show links, I instead found some disturbing video — tons of it, in fact, which claim to evidence real Zombie attacks, including one faked ‘secret FBI briefing.’ But only one of these bothers me enough to deserve sharing, as it is a montage of real news stories that are quite shocking and, collectively, imply there are real people out there who are certainly acting like Zombies, and who are apparently quite hard to kill, too.
But that’s not the only disturbing thing about the video.
The second is found at the end of the long-winded (classified) reading of a (classified) Bill on the Senate Floor that (classified) seems to regard some kind of (classified) serious catastrophe, and what government is going to do about (classified.) At the very end, as if a causal afterthought of NO IMPORTANCE, the reader quotes, “and draft a NEW BILL OF RIGHTS.”
E X C U S E ME?
A new Bill of Rights? What’s wrong with the one we have such that once this (classified) happens, it is no longer useful? To me, the ONLY scenario where that makes sense is if the country has become an official Police State under perpetual Martial Law, the result of a military (classified.) Well, let me tell you if I see even a hint of that taking place, I’m going to (classified) and (classified) and all of (classified) had better double their (classified). Even if they claim it was the Onion Congress.
Well, that’s all I can think of to say about something that is so far fetched and based on ‘less than mainstream’ resources. So I’ll simply leave you with the original video which started the whole thing off. I did find it. But I warn you, it is not the sort of thing I would normally care very much about paying attention to now days, given the veritable flood of such ‘sky is falling’ reports on YouTube.
However, I also remind you, in my book set Fatal Rebirth, and resulting screen play published on the Internet in 1999, that the sky was going to fall in New York City, raining passenger jets upon the World Trade Center, and resulting in Middle East Wars. Some of us Chicken Little’s base our warnings on a bit more than conjecture. You can get a free ebook copy of Volume One, and see what else I’ve correctly predicted, and what things I’ve warned of which have yet to transpire.
It also behooves me to add, here, that as a specialist in privacy/security who helps targeted individuals and deals regularly with Political Control Technology… that I should mention that some estimates are that the government has created up to two million ‘sleeper’ agents using Manchurian Candidate mind control methodology. If true, we are talking about programmable people who can, with a simple text message or other signal, be launched off on almost any kind of mission with no recourse or understanding. Blindly obedient.
Such people can be made to believe any unreal circumstance, or believe themselves to be anything or anyone, and are often capable of exhibiting super-human traits (such as seeming to be bullet resistant). I’d hate to think about what would happen if a flood of such persons were unleashed thinking themselves Zombies. They soon enough would be, for all practical purposes. I’d not want to be in their warpath. World War Z, indeed.
- False Flag Biological Attack Expected This Summer? (pakalertpress.com)
- National Scout Jamboree 2013 False Flag Insider Warning (thetruthseeker.co.uk)
- NEVADA GOVERNOR CANDIDATE Warns BOY SCOUT JAMBOREE MAY BE NEXT FALSE FLAG (secretsofthefed.com)
- May 21st Is Judgment Day So Begins the Zombie Apocalypse (wholesalecostumeclub.com)
- The Government’s Knowledge of the Zombie Apocalypse (costumediscounters.com)
- False Flag Insider Warning – National Scout Jamboree 2013 (oneworldchronicle.com)
- Mass Casualty Terror Drill Planned for July 2013 During Boy Scout Jamboree (2012thebigpicture.wordpress.com)
Though a controlled media is suppressing the story, 40 tons of GMO crops were torched, prompting an FBI investigation. We The People do NOT WANT GMO, and if the Monsanto Congress does not watch their step, arson will become outright violence, and from there, even lead to revolution.
Why were sugar beets set on fire in Oregon?
by H. Michael Sweeney
Who is Oregonians for Food and Shelter?
Update June 22, 2013: Additional research reveals some interesting things about the who and why behind the $10K reward offered for the beet burners… at document end.
Are Monsanto and Syngenta GMO criminals?
What you will learn reading this post…
- People are taking the law into their own hands to kill GMO production[
- There is an apparent media blackout, even on the Web;
- The government is ramping up for what may end up being another WACO/Ruby Ridge standoff;
- We may be looking at the Boston Tea Party of 2012 just before the next American Revolution.
Who is the earth liberation front?
Rebirth of the early Earth Liberation Front?
I Can’t Believe I’m the FIRST and ONLY one to report this on the Web.
NOT ONE MEDIA OUTLET outside of local circles has dared to mention it, perhaps because government fears that if the public learns that other people are getting fighting mad (literally), they might join in, and become an actual revolution. It was only reported locally live on KXL Radio and echoed by the Oregonian, where the ONLY Web mention exists, hard to find because the headline wording is carefully avoids the most likely keywords for a search — took me rather a while to find it. Here’s the scoop — PASS IT ON!
40 Tons of GMO Sugar Beets were set ablaze in Eastern Oregon, yesterday. FORTY TONS — the entire acreage of two full fields of crops IN THE GROUND were set ablaze over a THREE NIGHT PERIOD OF TIME. That means ARSON. And I have to say I am cheering! The only way could feel better about it is if I had dared to do it myself — which to be clear, I would not: I don’t look good in prison orange, and would be too worried about possible loss of life if things went terribly wrong.
Evidence is that 6,500 plants were destroyed BY HAND, ONE PLANT AT A TIME. That, in turn, implies A LOT OF PEOPLE were involved: would you want to stick around once a fire was going and wait to be discovered? No, someone (many someones) probably wanted to move as quickly as possible. WE ARE TALKING ABOUT A MOVEMENT, a kind of ORGANIZED REVOLT — and this is exactly the kind of retribution I’ve warned was coming; when lawmakers and corporations refuse to honor the Constitution and instead engage in ‘legalized’ criminal acts such as enabled by the ‘Monsanto Protection Act.’
This is all shades of… well, the BOSTON TEA PARTY. Instead of throwing tea into the harbor to protest taxes, someone was throwing flames onto crops in the ground to protest New World Order shenanigans. We are a long ways from Boston, but more recently we have the Earth Liberation Front, a group which also had its roots in Oregon (I love my State and our people; we have core beliefs and fight for them). The ELF, in 2000, burned the offices of a GMO research project at the University of Michigan, a project funded by the Federal government and Monsanto at the time.
The ELF, or ‘Elves’ as they are sometimes called, is an ad-hoc group with its actual origins in the U.K. But forest mismanagement caused splinter cells to be established in Oregon, and subsequently, Michigan and elsewhere as new corporate wrongdoings became evident. Like the IRA, they have an official, public side, one not associated with criminal adventure, and instead focused on educating the public on the issues, such as the Gulf oil spill. They are a kind of militant Green Peace, perhaps.
But ELF cells normally come forward immediately to claim responsibility, because to them, its all about publicity to educate the public. Since there has been no statement, I’m deducing it is simply Oregon Farmers who have said, ‘Enough!’ Another clue that may be the case is that this comes on the heels (two weeks) of Japan’s rejection of the entire Oregon Wheat crop for the year (a tremendous financial blow because over 80% of Oregon Wheat is exported) because ONE report said ONE field was contaminated with at least ONE GMO plant.
The rightful fear is, because of pollination processes, once you introduce a GMO crop of a given variety ANYWHERE, the wind and insects will spread its genetic contamination to non GMO fields, and thereby ruin the ENTIRE INDUSTRY for a region. In fact, Oregon farmers have tendered a multi-billion dollar class action law suite against Monsanto, joining a long list of states doing so. Monsanto has experimented with GMO crops before they were approved in 16 states. They were supposedly all destroyed, but state after state is finding out the hard way, that Pandora’s box has been deliberately left open.
But while other governments in Europe and elsewhere are passing laws to ban GMO crops, and burning entire crops themselves, in America, our government is passing laws protecting Monsanto from legal repercussions, and therefore, it seems, farmers are forced to burn the crops, themselves. This means that where in other countries, citizens are being protected from corporate crimes, in America, citizens are forced to become ‘terrorists’ to survive. That’s how blatantly corrupt our corporate police state has become, I’m afraid.
Can GMO spark an armed revolution?
First Blow For the Revolution?
In this case, both fields belonged to the same Corporate Agricultural giant known for embracing GMO, though trying to do so quietly, another reason perhaps big media has kept the story from reaching the Internet. We are talking about Syngenta. Nowhere on their US Web site will you find mention of GMO, but that is exactly what the company is about. They have even lied publicly in writing on this issue with a public declaration. Yet their very corporate name shouts GMO.
But the FBI, and local media knows better (and now, you)… because apparently someone from the Syngenta operated farms mentioned the fact as a possible motive for the arson. This is a serious matter in many respects. It throws down the gauntlet and says, WE ARE MAD AS HELL AND ARE NOT GOING TO LET YOU GET AWAY WITH THIS BULLSHIT ANYMORE! But it also raises the stakes and put lives and property at risk, and if it goes wrong, could end up sparking an armed revolution.
Imagine the likely scenario: the FBI identifies a particular non GMO farmer as being participant and puts together a 100 man assault team to surround their homestead, land they’ve been farming for generations. What do you suppose would happen if they stood their ground? You would have another WACO standoff, another Ruby Ridge. Do you suppose that the other several dozen participants in the crop burning would stand by and let them pick them all off like that, one by one? I doubt it.
They would muster every rifle their families could carry, and call in farmers from adjacent counties, and likely be joined by some number of citizens from the local communities, and surround the FBI and other local authorities. They might even be joined by local Sheriffs, if not out of sympathetic understanding and general GMO angst, then in hopes of defusing the situation. I’m telling you, this can easily get out of hand.
And in a way, I’m hoping it does. Because I think WE NEED A DEFINITIVE EVENT to send a CLEAR MESSAGE and draw a line in the sand: NOT ONE INCH MORE — BACK OFF! It would rally the informed to action, stir the Sheeple to understanding, and FORCE THEM to take a side, lest they end up in a possible cross fire if shooting breaks out everywhere GMO crops and corporate properties exist, and their executives live.
Even though it could easily spark a full-scale revolution, I’m still for it. That threat is not lightweight, either — it is incredibly easy to start and carry out a successful revolution. I’d be tickled pink to live in America, once more, a country based on a social contract called the Constitution and Bill of Rights, where government was BY THE PEOPLE, FOR THE PEOPLE, of the people, and not a fascist police state in the making BY CORPORATIONS, FOR THE NEW WORLD ORDER.
GMO? Burn, baby, burn…
Mongressanto? You may just be next.
Who are Oregonians for Food and Shelter?
Update: The Who and Why of the $10,000 Reward
‘Oregonians’ for ‘Food and Shelter’ sounds like a charity that provides food and shelter, but that’s not right. Their Web site describes themselves in terms which, after thoughtful consideration, would leave you believing them a non profit NGO, a special interest group (SIG) of professionals seeking to educate their peers in the latest timber and agriculture technologies. Closer to the truth, is that they are a Political Action PAC, putting out their own Voter’s Guide, and involving themselves in political matters impacting timber and farming.
Their members are a who’s who of AG and Timber, but with a specific bent toward biotech… specific biotech. Their Boards and Chairs are well peppered with people from Monsanto, Syngenta, and other firms with a vested interest in GMO, and firms they do business with. In fact, there are even two firms represented who have had consensual dealings with Central Intelligence Agency fronts. One of these was harmless and related to fire-fighting, but the other (Portland General Electric) was tied to much darker matters, though I’m sure they were not quite aware of such details. But then, those same folks also went to bed with ENRON (also a CIA operation), didn’t they?
The OFS founder is one Terry L. Witt, who cites himself as a professional Manager of Non Profit Groups, as though you should go see him if you have one in need of management. Really? The Web site was founded in 1999. Within a few months, Terry was writing in support of Monsanto’s patent infringement suit against a farmer over GMO crop migration (contamination) such as faced by Oregon Wheat growers. It would not be the first time he would play hatchet man for GMO, additionally using op-ed in the Oregonian to disinform on behalf of (again) Monsanto.
Indeed, if you look at the one and only truly informational page at the Web site (despite the fact they list three topics to choose from – the other two have no links provided), the topic is… you guessed it; pro GMO. So what is the real agenda, again? But perhaps we should overlook this narrow view, because they do point out their Web site is still under construction. What?
Established in 1999, and still under construction? Could it be because the Web designer is (whois information) Troy, Terry’s son, operating out of their $700,000 home in Tigard? Hmmm. Troy has his own business (he is a photographer and ‘lead designer’ at a ‘design studio’), and his Web site is even more under construction: it consists ONLY of a logo (ergo, my use of quotes). There is not even a statement on being under construction since created in 2005. “Focused Marketing, Messaging, and Design,” the logo claims.
This could be the trait of (choose one):a) someone not very good at what they do; b) a CIA front; c) a corporate front for money laundering (e.g., payments from Monsanto); d) a front or over billing a client (e.g., Monsanto); e) a clever ploy to distract conspiracy theorists and waste blog reader’s time; f) all of the above.
I’m sorry, but I come away with the distance impression OFS is nothing but a surrogate for GMO interests, and thinly veneered, at that.
That’s the WHO and the WHY of the $10K reward.
Frankly, given these facts, I’d rather someone offer a $100K reward if they would all simply go away.
- Monsanto Video Revolt: Global anti-GMO online rally launches – RT News (2012indyinfo.com)
- Monsanto Killing U.S. Agriculture (personalliberty.com)
- Monsanto Declares Defeat In European Market (fastcoexist.com)
- Belizean Activists: Illegal Planting of GMOs an Act of Biopiracy (foodfreedomgroup.com)
For nearly a decade I’ve been trying to get media and the public to examine some simple proofs of a conspiracy we call Flight 800 Friendly Fire; the downing of a jumbo jet killing 230 souls with a Navy missile fired in a war game exercise gone wrong. They only wanted to call me ‘just another conspiracy theorist.’
NOT ANY MORE.
Was flight 800 shot down by a navy missile?
by H. Michael Sweeney
NTSB admits Flight 800 shot down
Seven years is a long time in Sheeple years (1 year in Sheeple years = 40 years of apathetic stupidity) and most Sheeple don’t even remember what Flight 800 was about, and some readers here may be younger and simply have no clue, or wish a refresher. In simple terms, Flight 800 was Trans World Airlines 747 jet bound out of New York late evening on July 17, 1996. Twelve minutes later, the plane and all 230 on board were lost in a fiery crash into the sea just off of Long Island. No one knew why, but rumors quickly sprang up that it was shot down by a Navy missile. Even military witnesses said so.
Even faster, the Wag-the-Dog disinformation engine of the U.S. Navy, Department of Defense, CIA, FBI, and the rest of the Federal Government launched one of the biggest criminal conspiracies of all time to cover up the truth. From the very beginning, I quickly involved myself as investigative writer because I quickly spotted traits of disinformation at play, and because I was compelled by a very credible claim that friendly fire was to blame by a revered source.
Non other than Pierre Salinger, former Press Secretary for Presidents John Kennedy and Lyndon Johnson, and former ABC Newsman, said that he was calling a press conference to reveal information from a CIA informant confirming the fact. But he had been set up for a fall with one of the oldest tricks in the disinformation handbook (as result, I wrote the 25 Rules of Disinformation to expose such tricks — my most famous and most read work with over 25,000,000 downloads); he was to become a strawman sacrifice to quash the rumor and associate it with ‘an untrustworthy Internet.’ Hence, the Salinger Syndrome. It destroyed him, but he is a hero for it.
I won’t explain the details of that, here (there is plenty of detail at my Flight 800 pages), nor much else about Flight 800 or the three-year running battle with Federal agents I and other civilian investigators had to endure to simply seek the truth and justice. I will only say that they used every dirty trick to shut us up they could muster, including sending out whole teams of FBI agents to intimidate us in person, Naval Intelligence people to pump us to see what we knew (pretending to be ordinary citizens), and I even got death threats from a foreign agent. Surveillance? You bet, including multiple vehicle tails, various aircraft, high-speed chases, and literally having to walk around Federal and local operatives to get from one side of a public venue to another. They wanted us to know they were dogging us.
But the one OTHER thing they did universally was to discount us by calling us ‘conspiracy theorists,’ and then ignoring anything we had to say. When the NTSB report finally came out, I personally had a field day combing over it and pointing out the obvious lies. They had falsified evidence, concealed evidence, and manufactured evidence to prove it was an electrical short which exploded a fuel tank. But that was also clearly impossible as even their own report showed. For each such point I’ve just mentioned, I was easily able to offer three different proofs. See my Three Simple Proofs (look for the small image of the gold NTSB CD a ways down the page).
But I was merely a ‘conspiracy theorist,’ and so, they still ignored me. Not one local news director would air my material, and the Oregonian flat refused my editorials. Of course, every major Network at the time was owned (controlling interest) by a major military contractor making Navy missile parts. Never mind that the proof was easy to illustrate. I was a conspiracy theorist, and THAT, was that. “Don’t confuse us with the facts, our minds are made up for us.”
Fast Forward a little.
The report finished, only one thing remained. The head of FBI, who personally monitored material I posted to my Web site (I cannot tell you how I know this without someone at FBI getting into a lot of trouble), and the head of the NTSB investigation, all resigned their posts at the end of the affair (publishing of the report), literally walking out on a scheduled meeting with a waiting collective of fellow civilian investigators, family members, and other ‘conspiracy theorists’ who were refusing to buy magic fuel tank explosion as ‘fact.’ They could not bear to look them in the face and lie to them in person, it seems.
With their resignations, NO ONE had ANYONE they could officially speak with, no one who would listen to, much less answer questions or challenges regarding the lies and blatant evidence of same. This was true in the halls of government, and in the newsrooms. We were all once more easily dismissed; conspiracy theorists are political and social zeroes in government and media circles. That’s why government loves to label dissenters. Pick a label, any label… in a political storm.
Fast Forward a LOT.
TODAY! On the radio today I heard that several NTSB Investigators have come forward and publicly admitted that the official report was doctored, stating flatly it was impossible that the fuel tank was responsible, and that there was indeed (as I had not only been saying, but showing) evidence of missile fire; it was a massive cover up.
What this means to YOU.
It means that conspiracy theorists (the good ones, like me – if you will permit me to so claim) are merely investigators forced to wear a label. It also means that many conspiracies are REAL, and self evident by the conflicting information in the official stories, and the cover up efforts and disinformation which follow. A cover up is itself proof of a conspiracy. You cannot have a cover up unless there is something to cover up, and its existence proves not only the crime is real, but it cannot even be undertaken except by a conspiracy of multiple parties to effect cover up; two interlocking conspiracies in one.
The lesson is: QUESTION GOVERNMENT, they lie. QUESTION THE OFFICIAL LINE, it has holes. QUESTION MEDIA, they are bought.
I urge you to read about Flight 800 at my Web site. There, you will learn things no other investigator has revealed. I was the only one to discover and illustrate the actual fraud in the NTSB Report. I was the first one to identify the ship most likely to have fired the missile (and subsequently visited by a foreign Agent making a death threat on behalf of their country — which should tell you something about the accuracy of my claims).
It will show you how easy it is to pull the wool over a Sheep’s eyes, and make us all into Sheep. It will show you how easy it is to fake it, and to make the public believe an unreal thing. It will reveal how easy it is to have a controlled media. It should leave you with a much greater respect for Truthers, and for conspiracy theorists, in general.
But why should I care, you might well ask? After all, I’m no longer a conspiracy theorist now that my theory has been proven FACT, and the conspiracy proven REAL, right?
WRONG. As long as Mr. Sorento and his crew run government, or others of like mind succeed him, there will be fresh lies to expose, new crimes to investigate. In fact, I’m working on a backlog, because that man and his cronies, like all Globalist Presidents, has more dark plots and evil deeds to dare than one conspiracy theorist, alone, can keep up with. Pray for me!
Care to help me out in other ways? All it takes is to pay attention, ask questions when facts conflict, and challenge government and media when they don’t get it right. And challenge the guy standing next to you when they don’t get it, because Sheeple are a terrible thing to leave running around loose in a Wolve’s playpen. If you ask me, that’s just plain good citizenship.
Or is that yet simply one more way of saying ‘terrorist’ in D.C.? Move along, Citizen, nothing to see here. Move along.
- Former investigators ‘break silence’ about NTSB cover-up of TWA Flight 800 crash (nydailynews.com)
- TWA Flight 800 Crash Not as Reported: Documentary (newser.com)
- Conspiracy Confirmed! TWA Flight 800 Whistleblowers Speak Out – NTSB Told Them To Lie (fromthetrenchesworldreport.com)
- Six NTSB Investigators Claim the Official TWA Flight 800 Crash Story Is a Lie (ajmacdonaldjr.wordpress.com)
What you believe determines how you react under and are able to defend against targeting. That’s a key reason that targets are psychologically profiled before targeting even begins; the enemy needs to know what chains best to jerk. Turns out, there’s a simple way to jerk back.
Free will: a Tis greatest asset, oft hardest to employby H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What can you do if you are a targeted individual?
What you will learn reading this in-depth post…
- That belief structures define us, establish our psychology, and our responses to stimuli;
- There are many ways targeting both takes advantage of and yet alters beliefs to weaken the will to resist;
- Will power equates to Free Will, the greatest gift of God to Man short of salvation through Christ and life, itself;
- The pitfalls of targeting psychology as it relates to Free Will, and;
- How to use Free Will to thwart targeting and run psyops on the perps.
Where do you get help if you are a targeted individual?
Challenge][ As author, lecturer, and consultant on personal privacy and security, and abuse of power, I invite the reader, especially if a Targeted Individual (TI), to make a comparison. Compare the nature and content of this post with the typical posts or emailed materials by other persons offering insight into targeting methods or technology, and/or defensive tactics. Then decide which closer resembles the reality of your experience, and which plays instead to the very fears and results ascribed herein to be unexpected weapons. You become what you believe: let’s take an in-depth and lengthy examination, and see…
Is the information offered insightful and helpful, or more likely to lead the victim deeper into the proverbial Rabbit Hole of dread. There is a difference between education and helpful advice through understanding (what a consultant or educator tries to provide), and the rhetoric and trivial dialogs of technospeak or psychobabble offered with questionable veracity, something closer to beliefs and opinions, or even mis- or disintormation than well-sourced facts — regardless of if offered with good intent, or ill.
Topic][ We are talking about TI’s, Targeted Individuals, of course; persons harassed endlessly by organized groups using Political Control Technology (PCT), which can mean any number of things from gang stalking to electronic weapons, and much, much more. PCT is military and intelligence community developed technology, so if one is targeted, the perpetrators (‘Perps’) are almost always from those quarters, or from parties with whom they interact, undertaken for political or criminal purposes.
We should be grateful, in a way, for PCT. Prior to advances in PCT made since WW II, when a person became a roadblock or threat to a political agenda or criminal plot, they were simply done away with; murdered, typically a ‘wet job’ assassination or, if time allowed, dealt ‘an accident,’ or what we call ‘heart attacked.’ PCT, however, allows a whole new way of dealing with ‘inconvenient’ person who are not quite an immediate threat, thus avoiding the pitfalls of murder investigations and unwanted publicity they entail, and dangerous questions they raise.
When the target is a person of wealth and power, or public influence, it is less likely to be used. PCT works best on those unable to afford exotic defenses which would render it near useless, if not completely pointless. Those in the public eye may be too well observed already to risk deployment of useful PCT methods without risking detection by third parties. PCT only works when no one believes it is being used except the target. So unless they can first financially destroy or socially discredit such persons, they may elect instead a good old fashioned murder. Ask Vince Foster, Ron Brown, or even Marilyn Monroe or Princess Di. People with high credulity working for them can’t answer hurtful questions once they are dead.
Perps often fear victims][ It is fear that such questions might be answered by the target which drives any consideration for either assassination or PCT. When someone is thus targeted, it can be said they actually fear the target, fear them enough to justify ‘self defense’ and pre-emptive action. Thus the TI may actually hold an ace up their sleeve and simply not know it.
Part of my job as consultant is to seek to see if that is the case, identify it, and wield it as offensive weapon. For such victims, PCT was elected as a preferred method not just because it seems safer, but because of the way it works; the goal of PCT is to render the target into a social, financial, and political zero. No one pays attention to a zero, it is nothing of value to them.
This targeting achieves by making the victim seem crazy; no one wants to believe in the Boogeyman, so when they start talking about being targeted, they are presumed paranoiac and/or schizophrenic, and discounted. Once they achieve this status, of course, neither will anyone believe any information they may offer which caused them to be feared in the first place, even if they have evidence which might otherwise raise eyebrows. But that does not mean the information has no power over perps, if realized and properly used.
Other reasons for targeting][ This is not the only reason for targeting, however. One cannot deploy technology without training users on the methods and devices involved, and that requires live, unwitting subjects. In like manner, one cannot develop devices and improve method without experimenting on human Guinea Pigs. This is all fact, and even found in the Congressional Record (Church and Rockefeller Commission Reports), but for some reason, we still can’t quite believe in the Boogeyman enough to consider the possibility that someone is telling the truth when they complain of targeting. Finally, one can also be targeted for joy riding (psychopathic pleasures) or vendetta — both forms essentially an abuse of power through access to the technology for personal reasons.
The reason one is targeted often defines the entire game, including best defense strategy. But that is beyond the scope of this post, and indeed, inappropriate — because every situation, though perhaps similar in generic description to another, will have sufficient variables in play such that strategies should be tailored to the individual circumstance. Environmental, social, and personal matters all come into play, and more.
Why won’t people believe it when someone says they are being targeted?
It gets tricky
Self as a weapon][ The first step in targeting is surveillance from afar and the development of a psychological profile, which is the definitive ‘self.’ The goal is to calculate the victim’s likelihood of being responsive to an array of attack options. It also seeks to uncover some key ‘theme’ for the attack psychology. For some it will be guilt, trying to make the person feel they are targeted because they are bad. Others might come to think the theme is to suicide, or to undertake a specific course of action. It can be almost anything, or it may be completely generic harassment without a theme, because we all different psychological makeups.
Now, while more than one assault method is available, only one will likely be brought to bear at a time, and fostered until it achieves a certain level of success. I call this a calibration phase. Additional targeting methods are brought on line in a sequence designed such that the success in the former better aids the progress of the next, which in turn ideally augments or reinforces the former. While that is not always the case, doing so is a high-value procedural goal; it is important to achieve as prompt a negative impact on the psyche and behavioral responses as possible, so that responses to attack will be seen as being due mental aberrations — rather than the actions of a Boogeyman.
Disbelief as a weapon][ Such disbelief as to true cause by onlookers is, thereby, almost guaranteed. Paranoiac responses (e.g., looking over one’s shoulder to see if being followed) are natural when one is targeted, but do not mean the target is actually paranoid. But they immediately seem paranoid to others, even as the process begins. Yet in time, they wax toward true paranoia, as fear and assault from general targeting starts them to questioning more and more events around them in fears they might be connected to targeting.
Soon enough, even innocent things are indeed so judged. It is this same mechanism which renders professional spies less than useful, in time, because they start to over react to their daily dread of discovery. Intelligence agents are, by retirement age, generally speaking, quite paranoid. But there is more such as this, to come. This is not mental illness as some count paranoia to be, but rote conditioning; paranoia by reflexive repetition.
Imagination as a weapon][ Part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They seek to create a belief that the problems they face are beyond their ability to resist, and other than they really are. Clearly, any onset of paranoiac beliefs will play to this, and create opportunities to put the ploy into full play. Once achieved, when they fight back defensively, they fight the wrong problem with the wrong solution, further cementing the notion that resistance is futile when the effort fails.
This ploy is also used another way; to make them think the wrong people, or at least additional people, are involved, but who are not. Targets are goaded into lashing out, if not verbally, more dangerously, that they might get into trouble, and have key support relationships sabotaged, even face arrest or other legal entanglements — or ideally, be forced into mental evaluation and perhaps even institutionalized ‘for their own protection.’
Mistrust as a weapon][ On the flip side of this tactic, they often approach persons close to the victim and attempt to subvert them with lies hoping to induce actual participation. They may present credentials or badges of trust, and talk of child pornography or other criminal behaviors, even terrorism, and sow seeds of mistrust and ‘patriotism.’ Once a victim begins to experience such mistrust, they in turn, feeling betrayed, begin to mistrust others close to them. The net result is that they can never be sure who the players and helpers really are, again fostering whole new paranoiac fears.
Fear as a weapon][ The above fears are very effective. Yet some PCT is so fearsome, such as bioimplants, that even suspecting it is in use, heightens paranoia. There are many tricks which can cause victims to assume implants in place, or some other dread, when not true. However, this is more commonly the case with long-term victims who have already been well along the paranoiac response path, and have had their beliefs altered well away from the true nature of their enemy. The longer one is targeted, the closer to this state they tend to become.
At such a point, paranoia can naturally grow to the edge of schizophrenia in appearance, perhaps better described as the form of hypochondria in terms of ‘sensing’ symptoms (such as where the implants are thought to be placed, or whatever the dread may be). Fear and imagination, when combined in an unending onslaught, can manufacture new false realities of any construct.
Once that transpires, or where implants really are in use, it is almost impossible to work one’s way out. Doctors will refuse to inspect for implants, and X-rays won’t reveal them because they are set for tissue examination, and not dense matter. The latest generation of low-cost implants are indeed fearsome: they are far too easy to place without the user’s knowledge (thought to be an insect bite) while they sleep, are extremely small in many cases, and are designed to bond with and look like bits of flesh if uncovered with scalpal. It takes a good magnifier to see signs of man-made tech.
Who is responsible for political control technology?
Consequences of false beliefs:
To be a helper first of all and foremost requires no preconceptions of what is true or imagined by the target. For the very reasons described herein (false beliefs), alone. But also because even if truly schizophrenic, that does not mean the person is not ALSO targeted. In point of fact, the class of victim who is a test or training subject is often chosen exactly because they are already schizophrenic; there is no possible way for anyone to believe that they are targeted no matter how badly a trainee or test goes haywire. And paranoia, being natural, is actually closer to a proof of targeting than a reason for disbelief.
This is exactly why it is so hard to get good helps from the very people who should help (e.g., Cops, Lawyers, Doctors, Politicians), and why I do not prejudge based on ‘wild’ or implausible claims or implied clues that something is wrong with their facts. If, in the end, if the person is schizophrenic, I’ll eventually come to understand that, and deal with it. If they are ONLY schizophrenic, I’ll by then be in a better position to guide them to the proper psychiatric helps.
But also, if schizophrenic and actually targeted, the illness will not deter detection of that truth, nor prevent me from addressing it — though it makes it more difficult. And I will still try to help the victim obtain the helps for the chemical imbalance causing their aberration, as well. And that is all it is. It is not being crazy, and if it did not have such a scary sounding name, people would realize it is not that big of a deal to so suffer.
This approach is also critical because it means I can ignore (mostly) any obvious or even inobvious false beliefs held by the victim. They are inconsequential to the true nature of targeting unless I myself also rely on the false facts, but I do not, or at least try not to so rely. Ignorance in this case is bliss. However, at some point, any errors in belief structures must be repaired or, perhaps, tested. It may, for instance, be me who has false perception. A good test can teach whomever is wrong the true nature of things, provided their minds are not sealed to logic (that can be the case).
The logical path][ Were I able to go into a TI’s home and install pickproof locks and facilitate true site security, render their computer and phones secure and defeat surveillance devices, make various targeting method tests, set up defenses in response, and do the appropriate investigations and analyze victim history — I can make ALWAYS make progress. It may not be total victory, but if not, the resulting shift will see the targeting closer to an annoyance than a trauma.
I’m talking about all the things I advise my client Tis to do, of course, since I cannot do it for them at distance (while I do offer direct intervention, it is generally too costly for a TI to afford, as it usually involves securing other professional specialists or services, as well). This is what I do: play 20 questions, give assignments, some of which are tests to undertake, and figure it out as we go. Repeat as needed.
Rationalization as weapon][ But victims tend not to follow my advice even after agreeing, or fail to undertake steps correctly, or misconstrue the results, or even reject the advice or conclusions out of hand — all generally because their current belief structures (as to the nature of the beast) will not allow them to yield fully to my advice or to the possibility of another reality. Their minds are closed to logic, and they rationalize an excuse for the subconscious decision.
Strangely, this is often even true when the instruction is a test which would make that very determination. My best successes have only been possible when the victim was relatively new and had as of yet had no such strong false belief structures to struggle with. Long term victims tend to have a ‘been there, done that’ not-going-there again approach even though they haven’t, yet, really (at least not in the manner as prescribed).
And understand, I’m not saying I’m always right, by any means. I’m frequently wrong; since I am not there, I must rely on the information I’m given, but it comes from people who are not consistently capable of giving me the correct information— because it is all filtered through their belief structure born of targeting falsehoods. Even if I were on site, I myself might be misled by clues or symptoms, or miss something key, or simply make wrong conclusions. So imagine how much harder it is for the Victim, alone in a stressful environment.
Desperation as weapon][ It leads to desperation, and in that state, victims do things they ought not. They almost habitually (mix and match) ‘hook up’ with other Tis, seek sexual encounters with strangers; move into places indefensible, write to authorities in an inappropriate manner, spend serious money on foolish or fraudulent defenses, and more. They rationalize wrong choices via hope instead of choosing carefully with logic, and by that same rationalization, discount failures and thus end up repeating the same error, again.
Speaking to my introduction paragraph, they tend to believe at the drop of a hat most any technical or tactical explanation or offer for help (especially if a new or unusual method, and for too many, even if seeming nonsense) — especially if it in any way reinforces a false belief already held. And they tend to reveal too much information when in dialogs, further aiding perps in psychological profile and targeting fine tuning. These things they do in hopes it will somehow at last lead to something that does help.
The path unwanted][ All this further exaggerates their false beliefs, and then typically in the end they call those same people (with home they hooked up or from whom they obtained information or helps) Perps when things don’t work out as expected. Regardless, seldom will they toss out the newly acquired fears or beliefs about tech. There is such a desire to ‘understand’ the problem, that they consume and eagerly share information constantly, even if there are logical signposts that it is incorrect. Eyes are raised if anyone dares point out such flaws, and their honest appraisal becomes circumspect. Of course, sometimes, the objections are indeed false, perhaps from a perp.
Division as weapon][ Thus in the end, the victim community ends up bickering and fighting and being suspicious of one the other. Even though it is sometimes absolutely true one is a Perp (or just as bad in net result, a true schizophrenic believing themselves a victim), way too many thought to be, are not. For those wrongly accused, help is subsequently even harder to come by, as they tend to isolate themselves defensively. Victims end up torturing victims unwittingly in a mass self-reinforcement of victimization.
This is why I no longer participate in group dialogs, polls, petitions, etc.
And why was false advice given in the first place? When not because the giver was a perp, it is most likely a false belief structure which allowed the giver to sincerely think it would help, perhaps because they used it in their own targeting. But they failed to realize the perps took steps to make it seem like it helped. This takes us back to the opening statement: part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They giveth and taketh away after it has led to more division in the TI community.
How sinister the weapons are][ But even when the advice or information is good, if filtered through false belief structures, it will not be useful to the victim as a rule, and for the reasons cited already. It matters not who is giving the advice; me or a TI, or some third party. False belief structures still get in the way, and perhaps, for some individuals, pride contributes; they do not wish to admit they’ve been wrong all along.
I can sometimes make decent progress with a long-term victim suffering false beliefs, but seldom as much progress as desired. Regardless, and this is almost always true for all clients, when even a small level of progress is made, the victim gains strength and the will to continue fighting. They become a Survivor, and are no long victim, and that alone is worthwhile. If I can get that far, there is hope that more progress can be made, and in time, it usually is, but every new gain tends to be hard earned… but with luck, at some point, there is an opportunity to suddenly break away altogether.
But you often dare not tell a victim they have false beliefs (as I attempt, here) or a key to truly understanding their problems, even once a survivor, because it will probably be rejected along with other advice. They have to somehow come to realize it on their own, and start from zero; that’s when good advice and helps can actually work. Even then, they must also have the will power remaining to force themselves to stop the bad practices which deter helps and neuter advice, as well as the bad habits born of desperation.
What is political control technology?
But then there is FREE WILL
Free Will, the Survivor’s weapon][ Exercise of Free Will, the gift of God which no other can take away unless freely given in submission, is the greatest weapon a TI has: only if they CHOOSE to allow an attack method to have emotional impact, will it be so. Street theater, V2S (voice to skull), and even pain generating tech becomes little more than a bad joke when one is able to simply decide it has NOTHING TO DO with their ATTITUDE and emotion, or their psychology and philosophical approach to daily life.
A Cancer victim in constant pain who CHOOSES to continue to live and enjoy life… such a person in such a state is a wondrous thing to behold, because we see they can be truly happy in life, accepting their fate and enjoying life even MORE than someone uninflected because of it. So why cannot a TI do the same? Only because they CHOOSE to suffer the very psychological effects the targeting pushes them reflexively into. But unlike cancer, there is a cure for that.
Never REACT][ Instead STOP, THINK, and consciously ACT; stop yourself from reacting, think what your reflexive instincts were telling you to do — and consider if that was not what was expected of you. With that in mind, then ACT contrary to it in some manner, doing so as if an actor in a play. In the beginning you will have to act like an actor, because it will not seem ‘normal,’ but in time, you will find that things get easier, and eventually, reflexive, such that targeting no longer has any control, not even to force you to stop, think and act. THAT will be true freedom; the day you no longer automatically respond as predicted by your profile — because you have created a whole new profile, one which is targeting resistant, and one they cannot understand or deal with.
To me, the real beauty of this method is that it is mind control in reverse; the perps become confused, and are rendered victims of your psychological warfare upon them. The accuracy of their psychological profile is diluted and eventually becomes useless and meaningless. The lack of progress and success causes underlings to get in trouble with superiors on up the line. People get ‘fired’ and replaced.
They even start replacing equipment, thinking it defective. And from that fact comes a warning: expect attacks to intensify, either as punative response, or in experimentation to see what’s wrong. But they will not want them to get so intense that they damage tissue or leave other physical evidence, so if you start getting microwave burns, for instance, go to a Doctor and get it documented, and photograph them for evidence, and as always, update your log of targeting events with great detail. They will back off if this starts to happen, almost always. If they do not, let me know. I have thoughts on that, too.
- Gang Stalking – We targets are alone. (neverending1.wordpress.com)
When peaceful change does not correct a tyrannical government, what remains is armed revolution — or — docile subjugation. History shows revolutions are slow to come, but when they do, swift to take hold. Yet, there is an important difference between being able to say ‘this government is tyrannical…’ as opposed to ‘This government is Godless…’
Does God ever approve of deposing tyrannical governments?by H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
Does God approve of revolution?
Reading this post you will learn:
- Citizens of any nation may believe there is reason for armed revolt
- That the Antichrist cannot come to power until there is a massive Global revolt
- That God commands we not revolt against authority
- But that there may be some forms of government where revolt is not revolt, but just punishment in the eyes of God
Who is really in charge? Who SHOULD be in charge?
In a prior post we sought by means of two polls, to determine who the real authority and source of power is in America, currently, compared to who is the RIGHTFUL source of authority. If you have not read that post, this post will likely be more valuable to you if you first at least review the Poll, and hopefully, employ it. Now, while the answers are specific to the United States, the question posed in THIS blog post, remain valid for any country under any form of government, even if Islamic.
The reason it applies globally, and as many of my posts point out, we are in a life and death battle with the New World Order, then we are up against powers and principalities who seek to seat the Antichrist. Even if not so, if we feel our government tyrannical and evil, we may be predisposed to considering armed revolt if we see no peaceful choices working.
But also as pointed out, if we resist properly, we can delay the unpleasant and totally fatal End Times that go along with that scenario. That means a Righteous (right-use-ness) fight to assert our right to God’s gift of free will as opposed to an evil (vile-use) motivation.
Scripture clearly tells us that we are to submit to authorities, even if they are oppressive, the example given being Caesar; the Roman Empire, eventually headed by an ungodly man who thought he was a God, and which literally enslaved most of the known World at the time. There are several verses which we should consider to see if there is perhaps any exception or justification for rebellion:
Hebrews 13:17 and Romans 13:1-7 are the primary establishing commands we seek to question, saying, “Obey them that have the rule over you, and submit yourselves: for they watch for your souls, as they that must give account, that they may do it with joy, and not with grief: for that [is] unprofitable for you.” “Let every soul be subject unto the higher powers. For there is no power but of God: the powers that be are ordained of God.”
1 Peter 2:13-14 echoes, “Submit yourselves to every ordinance of man for the Lord’s sake: whether it be to the king, as supreme; Or unto governors, as unto them that are sent by him for the punishment of evildoers, and for the praise of them that do well.”
Thus if we are faithful to God, it seems we must presume even tyrants were given authority over men with God’s blessing for some reason known only to him, and that their authority serves Him in such hidden cause. Yet it also sounds like it is based on the assumption that there is at least some degree of responsibility to protect and care for the nation, to specifically include spiritual care for their souls. And it is true, that even Caesar allowed the captive Jews to worship their own God. How odd was that, when such as he would soon claim to be a God?
So two questions come to mind which may alter the equation, and deserve further consideration.
One: What if the authorities actively seek to destroy God by advancing the Antichrist?
That is, after all, the primary premise which is in play up front and which drives the new World Order movement at its inner-most core. It is one thing to revolt because of tyranny and loss of freedoms, which is certainly a motivation in any revolt. But it is another to do so because the authorities seek to destroy men, destroy their spirituality and lead them to sin, and destroy God. What does scripture say about that?
An answer may exist in the complex story of Nabal and Abigail. Overly simplified, perhaps, for the sake of focus to topic and the limited space of a blog, Nabal was a powerful man of self-assumed authority at a local level who, when some of David’s people came under his power, was harsh with them, and took actions which were a threat to even David’s life by denial of food, offering instead great insult. Nabal worshiped Belial, a name for Satan.
David responds by gathering 400 men in arms to confront and deal with Nabal in reprisal. But one of David’s men warned Abigail, Nabal’s wife, explaining the problem. 1 Samual 25:17 is his conclusion and of interest to answering our question. “Now therefore know and consider what thou wilt do; for evil is determined against our master, and against all his household: for he [is such] a son of Belial, that [a man] cannot speak to him.”
Is that not how powerless we feel in the face of the NWO and their ceaseless crimes against us, plots all against God? Do they listen to our reasonable pleas?
But rather than justifying David’s intended battle, which we might deem rebellion, Abigail intercedes with great wisdom on behalf of and in acting authority of Nabal’s houshold. She brought food to David, and pleaded that there be no battle. David agreed, and Abigail returned to Nabal saying nothing. In the days that followed, Nabal died, God’s judgement upon him.
The story would seem to have no true relevance if that were the end of examination, for there is no Abigail likely to intercede on our behalf within the construct of the NWO (if one exists, please email me, and let’s fix this!). But there is one more passage which does apply. David, as God’s servant in the passage, thanks Abigail for stopping him from attacking Nabal, an act he himself describes as, in afterthought, evil (unrighteous). In part…
1 Samual 25:39 “And when David heard that Nabal was dead, he said, Blessed be the Lord, that hath pleaded the cause of my reproach from the hand of Nabal, and hath kept his servant from evil: for the Lord hath returned the wickedness of Nabal upon his own head.” In other words, had David attacked, it would have been wrong. He indeed should have left the matter to God, who in the end did take care of it.
On this, then, we see the Bible remains adamant that we not ‘fall away,’ the term for rebellion, even when authority is clearly Satanic and seeks to harm us. And yet, I still wonder… there is the one other question…
Two: What if WE are the authority, and it is our servants that we need take to task by force of arms?
This is one reason why the poll was offered in the prior post. One may find there is a distinct difference between a government based on divine right as addressed by the above Bible admonishments to submission, and government based on a social contract; the Constitution and Bill of Rights. If, in the polls, We the People or the Constitution/Bill of Rights were seen as the ultimate authority, and especially if the poll also showed that the darkness of the New World Order was the true current power, then divine right would no longer seem a valid component.We would not be rebelling against authority, for we are that authority.
We would instead be rebuking those assigned the task of executing authority on our behalf, our public servants. Restated, if We the People deemed to grant the power of governmental authority to those in Congress, the White House, the military, and so forth… by means of a document we (our Forefathers, anyway) penned and signed as their charter of such powers, then they serve us at our pleasure, and should they err and refuse correction, we ought be justified in using force to end the matter, per Thomas Jefferson’s beliefs and intent; the whole reason for the 2nd Amendment right to bear arms of like capability as the military.
Biblically, that would be a Master-servant relationship, and we would still be in compliance with God’s Word to punish our errant servants. A master does not fall away from a servant in rebuking, punishing, or even killing him for just cause, nor does he do an evil thing in the eyes of God. Indeed, it is the servant that falls away in violating the will of the master, and punishment of any kind may be in order according to circumstance.
Luke 12:47 “And that servant, which knew his lord’s will, and prepared not himself, neither did according to his will, shall be beaten with many stripes.”
And one more thing…
If the poll would seem to insufficiently justify the above reasoning, or you otherwise find it unacceptable, the Bible does specify one, and only one other just reason to fall away and not obey authority. That singular reason is when authority commands something which is contrary to God’s commands. You are to obey God, and not man, in such a case.
Acts 5:27-29 (and similar in Acts 4:19) makes clear: “And when they had brought them, they set them before the council: and the high priest asked them, Saying, Did not we straitly command you that ye should not teach in this name? and, behold, ye have filled Jerusalem with your doctrine, and intend to bring this man’s blood upon us. Then Peter and the other apostles answered and said, We ought to obey God rather than men.”
Therefore, we must seek and define just cause for rebellion; such deeds or laws or deciets which prevent or thwart obedience to God. How can we judge if this be the case, or no? Start with what God has commanded, and compare. Look to the Ten Commandments, and we only find two which may qualify.
One: Thou shalt have no other Gods before me. Unless and until we are commanded to worship some other God, this is no justification. If the one-World religion is forced upon us, we might justly revolt, but that is something not expected until after the falling away and the one-World government is established. It is yet for a future time.
Six: Thou shalt not kill. Now we start to wonder if this is not a basis. Wars fostered by deceit to steal resources and confound the God of Abraham by putting Satanic sects in power (Hashemites – see prior post) would seem to be commanding our soldiers to kill for unjust cause. Depopulation efforts such as Chemtrails, Agenda 21 and Codex Alimentarius, and GMO crops is asking us to submit to being killed, and if we do not submit, to aid in the killing of our own children.
Indeed, the laws have already been written to enable and essentially require that we unknowingly allow the State to guide our unwed teens to kill their children by abortion. The 1.4 billion rounds of munitions ordered by DHS likewise seems destined to be used against us. Must we submit ourselves and our families unto death?
Suppose they do at last come for the guns? To do so is the final step in their revolt against our authority. Once they have the guns, they become the Master, and we become the servents; slaves, really. From that moment forward we are forced to serve Satan’s desires of any and all manner without recourse, and no longer have any means to resist. The Antichrist can come to power, and it is End Game.
Does God intend we should serve Satan without a fight, or is that a sin. There are more than a dozen verses on this but the one with the strongest and simplest clarity perhaps is Matthew 4:10 “Then saith Jesus unto him, Get thee hence, Satan: for it is written, thou shalt worship the Lord thy God, and him only shalt thou serve.”
Only Him shalt thou serve.
And how do we do that? Do we grab our guns and start shooting? It is, after all, relatively easy to start a revolution. I hope not, unless perhaps it is in defense of the guns, that final signpost, that final straw… or perhaps if some cold, hard proof of genocide or like atrocity toward depopulation. But then, we each draw our own lines in the sand, and choose how to resist. I’m thinking there needs to be a way to fight back which does not require violence, one which can be applied more safely, and immediately… by anyone… today. This moment.
It’s available to us all, and has been all along.
It’s called the 1st Amendment; free speech, and when combined with an even more powerful tool, God’s gift of Free Will, it is all powerful. Become activist and use these weapons, or the entire Constitution and Bill of Right have no meaning for you, and perhaps the Word of God as well, for you may end up being doomed and unable to obey it when it is found to be, for you, too late. You can always just opt out of the system… and drop off their control Matrix (take the Red Pill).
The Mark of the Beast, or death may be your only choice, then — or armed revolt. But if you ever end up deciding the time is ripe for such revolt, I pray you do so in agreement with God’s view of your actions as being righteous (right-use-ness). That is one reason for having two polls to compare one to the other: if we be the rightful authority, than it is not revolt, at all, but due punishment, and not just our right, but our obligation in the eyes of the God.
- Devotions: I Samuel 25 (spiritualgym.wordpress.com)
I really don’t think we can answer that so easily. Is it Mr. Sorento and his Executive Orders? Congress and their unconstitutional laws they don’t even read? Bankers and the FED? The Military and Arms Industry? The Individual States? The United Nations and their Treaties? The Council on Foreign Relations? The Illuminati, the New World Order? Or… is it We, the People and the Constitution?Update: May 14, 2013 Preliminary results indicate 75% of us think the rightful power in America should be We the People and the Constitution/BIll of Rights — but only 6% of us think that we actually achieve that ideal. More than 70% think the real power currently in force have nothing to do with government, at all. IS THAT RIGHT? I hope not, and thankfully, the sampling is fairly small (only 21 votes). WE NEED MORE VOTES to truly get a handle. TELL YOUR FRIENDS TO TAKE THE POLL! by H.Michael Sweeney Copyright © 2013, all right reserved. Because this involves a Poll, it makes sense not to allow normal reblog. Permission hereby granted to reproduce this blog in full with respect to commentary, including this paragraph, but WITHOUT the pole, itself, using instead links to this blog at the appropriate point. All other links and text must remain in tact. A Poll: Who Is the Real Authority and Power in America?
What you will learn reading this post and answering a Poll…
- That there are many possible answers to the question;
- That each is supported by useful argument;
- That each is arguably false by countering logic;
- That God has given us signposts that we might choose wisely;
Who is our true Master in America?
I’ll start by saying I’ve been the fool, as I think have we all. Nothing anymore is black and white, it seems, though most of us operate as if it were. That’s how we make mistakes. The visible things on the surface of matters which guide our opinions and actions are more and more subverted with falsehoods and concealments, and manipulation, and yet like the Ostrich, we prefer to believe what is apparent without question. Look where it has led us:
Never before in history has there been so much talk about the end of the World… about global revolution, wars, and rumors of wars… about religious beliefs and disbeliefs, and bitter differences between them. Or about the New World Order, which can only serve to seat the Antichrist and lead to Armageddon… about powers and principalities, plots and conspiracies.
Count me guilty of all such talk. It’s on my mind almost every day, if not the forefront, then nagging at me in the background. There are simply too many news events where things simply do not add up to equal the facts offered in the telling. Things are rapidly becoming Biblic in scope, things forecast in that very book. The signs are everywhere, even as also forecast. I cannot help but consider, and write. I think we all need to consider, lest we blunder into oblivion. Of course, that may just be me being paranoid, again.
Is it mere paranoia as some say, even hope? Or is it a growing shared consciousness coming to the surface? Or is it simply proper attention to signposts and the very Word of God?
When have we had so many signs in the heavens? So many serious earthquakes and mega disasters? Dieoffs of large numbers of people and animals? So many people in unrest simultaneously? So many wars and rumors of wars? So many sightings of strange creatures, UFOs, odd visions and even noises of no tangeble explanations? So many rare events in and from the stars? When has the Earth been so polluted and ecologically threatened? NEVER. All these things have been forecast.
Ought we not heed them? Moreover, when has there been such a fascination in our entertainment with the occult, witchcraft and satanic things, zombies, monsters, and other dark things including end-of-the World scenarios? Are we being conditioned to accept the Antichrist’s rise to power, that we may yield to the Mark of the Beast more easily?
When in history have there been such vast schemes forced on the masses by a handful of powerful people with questionable agenda? I speak of Agenda 21, the sustainability movement which would deny you the right to own property, have a car, choose where you live, and work, and if you can have children. I speak of Codex Alimentarius which makes natural herbals and vitamins illegal, and forces you to rely on big pharma drugs, and to be subject to inoculations. I speak of the plan to establish a one-world religion which melds everything from Shamen to Buda to Christ and Mohamed and even Satan. I speak of HARRP and mapping the brain so that mind control weapons can regulate thought and mood on demand, and of chemtrails, GMO, and Seed Vaults and race specific pathogens (gene-guided bioweapons) which enable depopulation. There is more such as this which could be added.
The answer as to who is the true authority in charge is a serious question not easily answered, but one which is critical to trying to answer and deal with the rest. In the end, there is probably no useful concensus given multiple ways it can be thought of, born of differing perspectives, and that is why a Poll is being offered. But it is critical that we know, because we are at a crossroads in history which will determine the fate of the World, though most of us are asleep to the matter.
If we are truly at such crossroads, the Bible warns that before the Antichrist can come to power, there must be a ‘falling away,’ a revolt. 2 Thessalonians 2:3 “Let no man deceive you by any means: for that day shall not come, except there come a falling away first, and that man of sin be revealed, the son of perdition;” In the text of King James, ‘falling away’ means ‘rebellion,’ and the day spoken of is the End Days, the ‘son of perdition’ the Antichrist; the rise to power of Satan.
It does not say who wins, and indeed, it may not matter, because the Antichrist could rise from either side of such a battle. But as I’ve said in my prior posts, I believe that if sufficient numbers of people are found to be righteous (right-use-ness) as opposed to evil (vile-use) in application of Free Will, God will let the World continue. I believe Armageddon comes by the dictates of our own actions, that there is no set time for it as Men consider time. And if that is the case, I’d rather have more time than less.
How about you?
Who is the real authority and power in America?
Who truly rules us, right here in America?
Is it Mr. Sorento? The presidency, regardless of who sits. But I refuse to use the other name this man claims, for he is indeed a man of questionable legal authority to hold the Office of the President. If he is legal ruler, why did the military allow troops to decline assignment to combat if stating they did not believe him their lawful Commander in Chief? There is a significant chance he will be proven a fraud in court by some accounts. If a fraud, his Executive Orders and Bills signed into law are null and void. But the real question is, is any President the true power?
Is it Congress? All they do is propose and submit laws to the President. They don’t actually tell us what to do in any direct way. Worse, they don’t even read the laws they vote upon, and never seem to question that massive bills thousands of pages long are ready for their consideration within days of most ‘needs,’ things otherwise unexpected. The Patriot Act was written well before 9-11, for instance. The body is widely viewed as corrupt and acting against the best interests of the country and those who elected them.
Is it the Military? They are supposed to answer to the President, and civilian authority. Yet they have threatened Martial Law, suspension of the Constitution, and a military form of government. They now presume the right under NDAA to murder, vanish, and torture any American without due process. They raid our cities in mock drills. Their documents indicate they intend to shoot Americans demonstrators who protest (they already did so at Kent State), if confronted. Others define a new form of warfare most likely to be faced in the future as ‘Peoples War,’ where the enemy is a group of ‘Ex military, Constitutionalists, patriots, religious extremists, the poor and disenfranchised.’
They have approved a plan (the blueprint of terrorism we now face) called Operation Northwoods, which we find duplicated almost to the letter in terrorism: it was to blow up American ships in harbor (the USS Cole), blow up American buildings (US Embassy Bombings, WTC Bombing), assassinate Americans on our streets (DC Sniper), shoot down remote-control airliners thought full of Americans (9-11 attack), and blame it on (in the plot, Cuba, but it can be used as a tool against any group or nation with the right operatives) in order to justify a war. All of this is detailed in Fatal Rebirth, right down to the circuit boards employed. Want a free ebook copy of Volume One?
Is it the Supreme Court and Court System? They are only called into play as a kind of last resort, and only indirectly tell us what to do on select things which come before them. And yet, they are supposed to be the final, ultimate authority in the scheme of checks and balances which define the construct of our government.
Is it the States, and States’ Rights? The Federal Government is limited in what it can do to force compliance at State level. International treaties cannot be signed and entered into without ratification by the States. It is by agreed upon Union of the States which formed and empowered what we call the Federal Government, for the purpose of doing their bidding for the collective good.
Only by coercing State compliance voluntarily with Federal funding programs are most Federal mandates found sufficiently ‘convenient’ at the State level. But if it is the State, then the question of the Military comes back to haunt us, because there is hardly a standing Army as such; the bulk of the Military outside of the DOD is in the form of National Guards (Army and Air Force units), which are State militia. The Navy, Marines, and Coastguard are the exceptions.
Is it the County Sheriffs and local law enforcement? If there were large-scale civil unrest, and/or a move by the Federal government to enforce gun controls deemed unconstitutional, who is the true local authority over you, when so many Sheriffs have unified themselves to tell Sorento they would not enforce such laws and would even arrest Federal agents if they attempted to do so. So important is this issue, that we now learn that in response, Sorento is asking to form a whole new Federal law enforcement agency (itself thought unconstitutional – a National Police) to arrest Sheriffs who take such a stance. Who will side with whom, against whom, when push comes to shove?
Deputize me, and Barry will find out. And know this: it will take only One Governor to order his National Guard into D.C., and one Constitutionally loyal General to arrest and detain anyone guilty of treason as result of such forced confrontations.
Is it FEMA and/or DHS? A state of Emergency was declared because of Sept. 11 attacks. It has not been lifted. The FEMA Charter under law gives them absolute authority over almost everything in such declared emergencies, including the Military. If you read the list of what they control and can do, you would say Hitler would have envied their absolute power. Yet we see no visible signs this is being exercised… unless you are observant. Their vehicles can be seen driving our streets, and Police-like uniforms are being worn here, and there, with FEMA patches. They are too quiet, methinks…
Much the same can be said of DHS, which was created by the Anser Institute, a shadowy military-intelligence think tank. It was formed exactly two years prior to Sept. 11 attacks, almost simultaneous to the Project for a New Amrican Century’s war plans for a series of domino wars in the Middle East to gain control of natural resources, and give power to puppet governments run by what they called in their PowerPoints, Hashemites. The Hashemites are an ancient Satanic sect predating Allah that involved opiates in their religious ceremonies, and are brethren to the Assassins, of like construct. Their historical trails will lead you to the Knights Templars, to Rosecrucians, witches and warlocks, to Masons/Freemaonry, and to the Illuminati. DHS has ordered 1.4 billion rounds of ammunition and is doing all manner of things dark and sinister which cause many people to think them planning a war with American citizens.
Is it a Secret Shadow Government? Unseen string pullers. I call it Shadow in my book set Fatal Rebirth. Some call it Illuminati, perhaps in the form of the so-called Round Table Groups (evolved from Knights Templar meetings), like the Bilderbergers, Council on Foreign Relations, and even Rhodes Scholars. Some say it is the high Freemasons, Skull and Bones, and the like. Others think it the Jewish Cabal (bankers, mostly, primarily due the Rothschildes influence, but I maintain they were Knight Templars who assumed Jewish identities to avoid persecution by the Pope). Such forces do exist and make themselves felt, and all those elements cited can be seen as a collective. But do they actually rule, or are we grasping at paranoiac straws? Do they really control all power in order to seek the New World Order, and to seat the Antichrist, as first suggested?
Is it the FED and Banksters? Wallstreet & Culprits, Inc. This rightly belongs in the Shadow category, but it is such a singular force in American life that it deserves to be listed separately. What one giveth, the other oft takes away, resulting in yo-yo financial forces which define our economy in ways which in turn define our politics and national policies. Attempts at to police them tend to be negated with ease by these institutions, who repeatedly bring us to the brink of fiscal doom and then propel themselves forward with profits galore, often out of thin air. But seldom do we gain or recover our losses from wealth redistribution to their favor.
Is it the Corporations? Big Pharma? The Oil Companies? Military contractors? The Board Rooms of legally defined living entities seem to hold sway over Congress and even the President. Monsanto writes laws which give it a blank check, submitted to Congress by their pocket Congressman, and Monsanto backed PACS contribute to other Congressmen to insure passage. Then the President not only signs the Bill into law (deliberate lower case, I refuse to believe his signature lawful), and appoints Monsanto kingpins to guide the FDA to ‘oversee’ Monsanto. We see the same thing in Big Pharma, in the Oil Industry, and in the Defense Sector. The fix is in. The public trough is for sale to the highest bidder; it should be renamed corporate trough, because the Public cannot access it — we just pay for it.
The Constitution and Bill of Rights? This is the very charter which defines the organization, operation, limits and authority of all branches of our government. Without it, there is no authority of the President, Congress, or the Supreme Court. And yet, it does not actually rule us, as such. And most certainly, it seems to be loosing its power as both Congress and the President continually issue laws and executive orders deemed to violate and negate it. This is why so many people deem our leaders to be outlaws, and why Sheriffs are starting to say ‘NO!’ It’s why many people are buying guns, and talking about Revolution being a real possibility.
It’s the primary reason I write, in fact.
We the People? We are, after all, the ones who authored and empowered the Charter. It has no power except that which we gave it by our signature (Founding Fathers), which means neither does the President, Congress, etc. have power but that which the charter affords. We are supposed to be the ones who control government, giving it limited powers to manage our nation for us. Government is supposed to be a tool which works for us, not the reverse. They are supposed to fear our anger should they err, we are not supposed to fear our government, which is more and more our sad state.
Who really rules, as opposed to who is the rightful ruler?
The Poll, in two parts
So please use the Poll so we can see if there is consensus as to who is the RIGHTFUL ruler, vs. who truly rules at the moment. There are, therefore, two parts: who is the PROPER final authority in the power structure; and who do you think really controls us, currently? These two answers will define much of what follows; our fates, and as I fear most likely so, our judgment by God, and, more to the point, how soon it comes to pass. Will that be two o’s or three (SOOON!)?
Please use both polls; you may vote for any THREE choices in each (e.g., the three branches of the Federal government, the three most conspiratorial choice, etc.). The closing comments show why it is important to answer both polls, and will lead to the first of two analysis posts which logically result.
And here’s why it’s critical we know the answer to BOTH polls, as we will explore further in parts II, and III… if there is a dichotomy in the two Polls’ results… where the current power resides not in the hands of the rightful authority, then should not that be rectified? If, for example, the rightful authority is We, the People or even the Constitution, and we find any other in power instead… then ought we not be seeking in earnest to change that?
And more to the point, if we see there is no peaceful way to effect such change, there is a more key question we must ask (part II):
Part III will be a specific analysis of Poll results once sufficient votes are cast.
- One in four Americans fear Barack Obama is antichrist (metro.co.uk)
- Poll: 1 of 5 Republicans Believe Obama is the Antichrist (atlantablackstar.com)
No matter how simple the weapons and tactics of war, you need a checklist; an action plan which is your method to the madness which is war.
by H. Michael Sweeney
How to drop out of society
Continuation of prior post: a checklist on how to drop out
In the prior segment we introduced the notion of going to War with the New World Order by defining the problem, the underlying mechanics and principles involved, and getting a good look at our enemy. If you have not read that, and especially if you are skeptical that such a War MUST be waged, please read it now. We closed with Step Two of how to take the War to our Globalist enemy: Drop out of the System. That, in turn, opens up a series of possible tactics from which one might choose to employ, offered here as if a checklist for customizing your battle plan.
To repeat an important consideration, don’t expect to jump in with both feet, but rather, ease into those things which seem easiest to accomplish, and then expand upon them as opportunity and ability allows, and in like manner, move into other areas. Unless one simply happens to have the needed resources and capabilities in place, it is not likely even possible to undertake all of the ideas simultaneously: Some of them you simply might not care for, or accept as viable or workable with respect to their goals or your personal circumstances. Don’t feel you need to follow these suggestions any more than you need to ‘play their game.’ After all, it is about free will choice; God’s greatest gift to Man short of life itself.
And that’s exactly what we are trying to stop the New World Order from ending. Free Will.
What do I do to drop out of the system?
❑ Don’t buy into the system: Don’t rely upon credit of any form. Debt is control, a thing admitted through history by bankers themselves. They sell credit to you with the promise of instant gratification and convenience, and even ‘perks,’ but the price is not mere interest, but firm control which locks you into their system. Once there, they own you and are assured you will not easily revolt. The banks and lending institutions, and the retail creditors, oil companies all… all rely upon credit to trap you into a Debtor Control System some call the Matrix, or the Grid.
Then there is the endless electronic transaction trail it generates which is of great interest to TIAO (Total Information Awareness Office — since renamed Terrorist IAO to make us think we are not the true targets of interest) to track your every movement. TIA is designed to eventually detect and record any and all forms of social transactions where information, money, or property changes hands, and even to calculate psychological profiles and future actions based on that information.
If enough people stopped using credit religiously, the banks would falter and interest rates would be less artificial and manipulative. The shockwaves would have a negative, inflationary impact on the economy, especially for MIIM corporations, because the dollar would falter against foreign competitors, seeking its true value (0).
Since the bulk of the National Debt is held in the form of Bonds owned almost entirely by the wealthy elite who make up the NWO, their financial power base is eaten away from within by the very stuff they covet most, which dwindles in value and usefulness. While a bad economy also has a negative impact on personal situations, it also hastens the general public’s realization that MIIM’s system serves them more than us, and will lead to more converts over time, and lead to victory and the chance to rebuild anew. That is the long term effect.
In the short term, forgoing credit and relying instead on alternatives herein not only saves you interest (money), but allows you the freedom to choose what you will pay with. In essence, it makes it easier for you to survive a bad economy by relying instead on an underground economy, ignoring fake Federal IOUs in favor of the truest currency of all; value given for value received, in a transaction where each transactional party dictates what is of value, and its worth.
For instance, there are barter institutions which allow you to trade goods and services for other goods and services — no money or little money needs be involved at all. They act as a kind of ‘bank’ trading ‘credits’ used in such barters for a small percentage of the transaction — much less than would be the interest in a credit-purchase situation. But of course, you can also effect barter with individuals directly, often providing increased flexibility in coming to an agreement.
Be careful, however, when using services, because there are tax issues which generally force such services to report at least select transactions, and that may be undesirable. The System is trying to make barter unworkable, even illegal. But in an underground economy, such concerns are no different than highway speed limit signs when hurry, you must. You can simply offer to trade directly with those you personally do commerce with most often. Offer to trade excess items or items you make, or services, for whatever you want. There are people who live completely by this method, not even paying rent with cash or credit, though such is rare. I could tell of wonderful outcomes with barter, personally.
Somewhere, if you ask around with persistence, you will find someone who is willing to trade, and in such a case, you mutually agree upon values and no one, not even Uncle Sam, gets a cut in the ideal circumstances. Enter Craigslist, and the like. Of course, there will be things you cannot easily barter for, many of them essential, such as certain foods, rent, and utilities. We will address such needs elsewhere.
❑ Don’t fund the NWO brand names: Determine what companies belong to MIIM, and boycott their goods and services, and do not buy their stocks. That means some hard decisions. If the company is a military contractor, or a multinational, or owned or controlled by one (a subsidiary), it is a company you should avoid doing business with and one worthy of constant public condemnation in activist style. Also, avoid purchases of any precious gems or metals, since the great bulk of the mines are owned by the NWO — else why to think they push these commodities so hard by selling fear and uncertainty?
Unfortunately, this means doing without certain goods altogether, such as new cars and appliances as technology advances. It IS OK to buy used, if it is not going to be financed. I drive a six year-old car and use a six-year old computer — and they work great. I am not so far behind the technology curve as to ‘hurt.’ I might spend more on repairs but have no monthly payments and the original cost was well below new — so it costs considerably less to give up a little prestige or performance, or whiz-bang feature. Doing so means the system is not profiting by my presence — I am not participating. You can amplify upon this by growing your own food (to be illegal under Agenda 21 and Codex Alimentarius), making your own clothes, and similar self reliance.
❑ Don’t buy the advertising: Boycott the newspapers, magazines, and media outlets owned by MIIM. Obviously, you will need to keep up with the news, somehow, despite the fact that you know you cannot fully trust any such source for complete honesty. I suggest TV can stay, or perhaps radio, but NEVER select ONE news source (channel, station, commentator).
But whenever you hear an ad for a product on ANY mainstream source, or see one in a magazine you happen to read despite your strategy (e.g., waiting rooms), take a moment to write a letter, even if a form letter, to the advertiser(s). Do not use Email for the purpose, for only a written letter will have impact — and then, only if it is business-like and polite. Don’t wax as politically indignant as might I; “Dear Fascist: Regarding your sinful and shamless partnership with XYZ Media in their evil plot to…”
Better idea: tell them you do not trust the media source which aired their ad and believe it biased, because it is owned by (insert the appropriate military contractor or megacorps, here), and thus, you refuse to buy their products because they are paying for disinformation to be disseminated. If enough people did this religiously, advertisers would be more careful, and Media would falter, its income stream hampered and profitability down. It might even wax honest.
❑ Don’t be tracked by purchases: Demand retailers destroy or remove RFID chips on products you buy, and protest their use. Most will have no clue, so educate them at the register, perhaps forcing a call to a Manager… simultaneously educating those waiting in line (no angry rants — just calm explanations and politeness). In the end you will likely need to destroy them yourself (microwave oven for tiny ones, scissors, shredder or burning for larger ones).
Items where removal and destruction is not possible should be kept in a foil pouch when not in use (this includes some state drivers licenses, passports, and other chipped items). Pull clothing tags and similar, and destroy them, shred purchase documents unless you are desperate to be allowed a return or warranty remedy in event of a defective item, in which cass.. Simple discarding may not be sufficient for such items if you think you are being sought or surveilled; trash is not your friend, it is a data mine. Don’t pay by debit card unless it is prepaid and not tied to you by name (one reason many places don’t accept prepaid). Cash is King of safety, though it labels you a convenient ‘terrorist,’ in FBI retailer snitch programs (one reason we need to kill the System; its insane paranoia creates that which it fears in self-fulfilling cycles).
❑ Don’t work for the system; Do not allow yourself to be employed by a member of MIIM or one of their subsidiaries unless willing to use that employment to their disadvantage. An example would be seeking to find and expose information damaging to the company, especially if exposing wrongdoing. I, for instance, took a job working at Shell Oil, where I uncovered a terror plot, by chance. More likely, it would simply be better to take a job with a smaller firm, one more likely to itself be a struggling competitor to the larger MIIM players in its field.
Help them to succeed, remembering that a small firm is more nimble and creative, and can often fare quite well compared to a megacorps, which relies mostly on boardroom antics and bookkeeping tricks to advance its position. If enough people did this, MIIM firms would not know which employees they could trust and it would likely force them to be more honest and less conspiratorial for fear of being exposed. And, they would need pay more to attract better people, driving the wage base upwards for all workers, instead of conspiring to beat it downward.
❑ Avoid the paper trails: Avoid seeking permits and licenses where at all practical. Consider doing so under an alias, and using bogus addresses. An illegal extreme might be completely false ID, or multiple IDs, which I’d not advise as wise unless there was a shooting war. Remember that an alias is legal, as long as it still ties to your true identity. It is where and when you allow a given tie (i.e., your correct phone number) to be used or established that will help limit the usefulness of the paper trail.
If unsure, check with a lawyer. If enough people did this, the tracking systems would bog down in duplicated efforts and be confused by the alternatives, increasing your true freedom; paper trails that go nowhere. You literally route paper trails to alternate addresses or phone numbers. These can be real-World addresses/numbers where you have access and discovery regarding any attempt to use them (by the system), or PO boxes or similar mail drops (i.e., blind drops, double blind drops).
Examples might be relative’s addresses, or unused mail boxes such as where an apartment complex of 44 units has 45 mailboxes (slap a number on it), and so forth. Keep your real world address only for those things which you wish to receive mail for — and I don’t mean bills. They should go to one of the alternates. Have many such alternates, and establish a list of parameters as to the type of material you allow to be sent there. This is how to deal with utilities in a way that reduces trails. There is a difference between a physical address where the service is delivered, and a billing address.
Another very valuable tool is a lawyer or bookkeeping service, or any professional service that is willing to hold mail for you. Another tool is to swap addresses with trusted friends, or to take select mail at work, if you have access to it in a way that is not obtrusive or invasive to your employer. This is an even better way to deal with utilities: send the bills to your lawyer for collection. You can establish a trust and put the bills in that name, or pay directly through a lawyer. There are similar arrangements possible through financial management services available through banks and elsewhere, though they keep records and report to government. Think outside the box, and get some expert advice about alternatives.
❑ Avoid communications traps: Avoid using mainstream communications channels. Use disposable prepaid cell phones you replace frequently, donating old units to groups who give them to battered women and others who need a way to dial 911 without having a monthly bill for the privelege of safety. Read this about cell phone privacy and security issues. Create and employ a steady stream of free Webmail accounts and abandon older ones as you go, keeping perhaps three active at any given time, and using alternatives for varied purposes. I use one for Real-World contact in key transactions (let’s call it the ‘official’ number), one for my most important confidants, and one for things between. Consider mail box services, blind drops, etc., if needing secure and neutral mail delivery, such as described in my book, The Professional Paranoid.
❑ Don’t fall into the insurance trap: Avoid insurance whenever possible, to the extent your strategy allows. This advice can be very bad advice for some people, so be sure to examine the option carefully before you decide. I only suggest some alternative logic paths may increase the choices available to you, which are these…
Insurance is a bet between you and the insurance company and like all good casinos, the odds are stacked in their favor. The bet is this: They bet you and others like you will face problems which requires insurance pay outs which are collectively less than the monthly premiums paid by you and others like you. In the meantime, they invest your payments in stocks and other business deals and earn interest or dividends on your money while waiting to pay out any claims.
You, in turn, are betting that you will benefit by having a problem which exceeds your personal ability to cover the expense yourself. Who cares? Only those who fear the odds should care. The insurance company knows they will win, or they would not make the bet. If enough people did not take that bet, the cost of insurance would rise (because of fewer participants increase their risk to profit ratio) to the point that the system would fail; only the rich could afford it, and they don’t need it.
Take medical insurance. If you don’t have it, hospitals must still accept you and treat you. So you end up owing them a big fortune? Even a three day stay can cost between 12 and 100 thousand dollars! The insurance wouldn’t have covered it all, anyway, and you would still end up owing them a small fortune. If you are reading this, likely, you could no more easily pay back a small fortune than a big one. So let the debt stand, as either way, they would have no means to collect it if you have dropped out of the system.
Regardless, the hospitals (the big ones owned by MIIM) will write off the debt or work with you to cover it. There is also bankruptcy as an option, if they press you, as discussed later. I’ve used that one, myself, and while it had its down side, it had many benefits. Yet in the final analysis, if you don’t pay, and have no assets which can be attached, and don’t care about your credit rating… let them go fish! Bankruptcy is not needed, just toss the bills into the trash, and don’t talk to them on the phone.
Likewise with home or renter’s insurance. If you don’t have it, the worst case scenario is that you are homeless and without your possessions. All the insurance company would do for you, after an endless battle of paperwork and legal moves designed to avoid paying, is help offset some of your expense. With insurance with the same firm for nearly fourty years, I had some $40,000 in computers stolen, and never saw a dime, for instance. But gee, they were quick to pay off a $1,600 repair bill… and increase my premiums to compensate. Good neighbor?
In the meantime, you would still be depending on charity and the mercy of relatives or friends. You can go that route all the way and fare just as well in the end, avoid the legal hassles, and the insurance payments. Sure, for many of you that’s probably untenable advice. But tell me, what are the odds of a total casualty loss? If truly concerned, stuff that money away in your own investment methods against such a need; self insure. Some states have Self Insure laws which make it easier to do that effectively and safely, a bit like being Bonded.
Auto insurance is another problem. In many states, you cannot get a license or buy a car without it. So, perhaps you should not own a car, or have a license. If you choose to drive without and get caught without a license or insurance, the vehicle will probably be impounded or even permanently confiscated depending on local law, so the risk may be great. Or, you could just drive a junker and abandon it to the system in such a case.
But if your identification does not well track to you (per the earlier suggestions), you may care little about the fines and courtroom proceedings demanded by traffic tickets and fines which result. If your car was a $200 beater, as suggested, you may consider it expendable and cheaper to have lost it than paying the insurance and tickets over time.
On the other hand, remember that part of auto insurance is liability, and you probably don’t want to wind up being responsible for another citizen’s financial woes because you did not have insurance. Of course, one can buy just liability insurance and minimally be in the system. But if you are in a ‘no fault’ state, the other fellow’s insurance would cover it, and if he was uninsured, like you, then that was by his choice, making you de facto partners in suffering.
Doing without a car altogether may be the best bet — relying instead on public transportation. In fact, overloading public transportation will tax the system greatly and hasten good results, because it is inordinately expensive infrastructure which never quite pays its own way. Convenience isn’t everything. A Monthly Pass, $40. Watching the transportation system go bankrupt, Priceless. Moreso because they CAN’T shut it down, but will instead ‘bail it out,’ and that will cause more people to join with you, in the end.
❑ Don’t feed the system: Avoid paying taxes where possible, always vote taxes down if given a chance (unless something you just can’t resist supporting), and always demand more services which require tax funding. If enough people did this, the system would be forced to raise taxes to cover the need against the will of the people; more and more citizens will come to realize the system is not working, or not working to meet their needs. The movement grows.
There are many ways to avoid paying taxes, and most all of them are legal, though they represent a significant exposure to harassment and punitive response. It only takes courage to use them. I won’t waste the reader’s time with the details, because there is a wealth of material on the Web about the tax protest movement. Here are a few to get you started, including some eye openers which addresses the tax protest movement in historical and practical terms, as well as religious — many of them (those critical of ‘schemes to avoid taxes’) being created by the system to protect the system (use a grain of salt). On the flip side, some advice is just plain wrong, even fraudulent or criminal (take care).
One can simply decide they are not going to pay taxes, and opt out of the IRS’ system. This is fraught with danger despite claims in some quarters that there are legal ways to do so, per several of the links found in the pages cited above, so I’m not suggesting it is a great idea for everyone. One could further rely on multiple IDs and poor tracking to addresses, and frequent change of jobs (if we had a better job market), declaring tax exempt status each time. You get to keep more of your pay until such time as you feel you are being closed in upon by the system demanding you comply or account for yourself, and then move on, and reinvent yourself once more.
Taken to the extreme, one could obtain false ID under the Social Security number of a deceased person. This would be illegal, and is not being advised — but CIA agents do this all the time, even multiple times for a given assignment. At some point, if a shooting revolution begins, this would be a more logical step, one we should all consider for personal safety. But by then there may be a National ID and chipping in place, rendering it an unworkable alternative. Preemptive moves may be wisest of all.
But if you can seek income from self employment or be legally considered a ‘contractor,’ you become responsible for your own taxation, and that offers opportunities to deal with taxes in a more useful manner. But it would take a book to discuss all of the many strategies involved in a good tax game plan. The Web links provided mention more than I’ve covered, here, including such books. And, of course, it is always true that you should seek every legal deduction or tool you can to simply reduce the taxes actually owed. You shouldn’t need to be a disenfranchised activist to see the value.
❑ Know what the system knows and help them unlearn it: Make a list of every business and governmental agency that likely has information on you. Contact each of them and ask for a complete hard copy of what they hold on you. Invoke FOIA if you must with agencies, and rely upon various consumer laws for the business sources. Force them to expend the hundreds of hours (in many cases) and other resources it takes to comply. If enough people did this often enough, their cost of doing business would skyrocket.
Take the care and time to review information carefully, and fight to have errors corrected. Demand that businesses do not share information about you with others (specifically forbid them to sell your name or information to others). If possible, ask to be expunged entirely from their electronic records. Many laws or corporate policies require them to comply, unless you are talking about data on contractual or financial obligations, or other legal histories of like importance.
❑ Don’t bank with the system: Avoid checkbooks and savings accounts. If possible, arrange to sign over your paycheck to a relative who does bank and have them cash you out. Of course, you can also go to the check cashing services, but they will demand ID and charge a hefty fee. The less paperwork, the better, but if dealing with a relative, have a written understanding between you so that the IRS won’t claim all your money is income they have not paid taxes upon.
The best arrangement would be an employer or work situation where cash payrolls were involved, ideally with no reporting to the IRS. Illegal migrant workers are often paid under the table and don’t get taxed, and thus working for less than ‘minimum wage’ may mean you still have almost the same spending power as if getting the minimum. So, perhaps joining them is better than fighting them for service jobs. That would truly take you off the grid.
❑ Consider Bankruptcy as a tool and a weapon: Do not fear bankruptcy, but do not blindly embrace it, either. Study and know the full ramifications of a bankruptcy as it would play in your specific circumstances, before deciding on its use. For many people, it is a valuable tool for exiting the system. Not only does it allow a fairly clean exit, but it can do harm to the system in the process where the creditors are of the MIIM variety.
I know of some people who deliberately build up large debt with MIIM institutions and firms, and then go bankrupt. Even though they may have hundreds of thousands of dollars in such debts, this is actually only a minor inconvenience and a drop in the bucket to most MIIM players. Still, I suppose, if enough people used this approach, immoral though I rank it, it could add up rather quickly. It is a dirty war forced upon us, and thus such immorality is not mine to judge, but yours and God’s.
Just know that while bankruptcy provides certain protections and allows the complete elimination of commercial and private debt, it does not protect against taxes and may not prevent repossession of some goods. The exception can be one’s home, car, and tools, but laws vary from state to state and even case to case — and the government is trying to make it so hard, it is almost impossible. A lawyer should likely be involved, and that is yet another expense to consider. Even a simple bankruptcy will mean many hundreds of dollars out of pocket up front.
❑ Don’t Educate Within The System: Take your kids out of public school and put them into private school or home school programs. The quality of education will rise (as will the cost, because you will still be paying taxes for schools unless you have dropped off the property tax roles). The moral teachings and principles of leadership and responsibility will once more be included as part of education. If you remain in the system, don’t be shocked when you learn your underage daughter has an abortion without your knowledge, or if your kids start being put on Prozac or similar psychotropic drugs without your consent. They will certainly be dumbed down politically, and have no useful grasp of history for preservation of America’s true heritage and core beliefs.
This ends the overt or outward steps one can take to drop out of the System. There are many other good ideas out there. I’ve tried to focus on the mainmost effective steps to start you thinking outside the box. In the next section, we will look at COVERT steps you can take, thinks not outward in nature, things which will increase your defensive posture should things turn nasty, even to include a shooting war. They remain none-the-less critical to your ability to well live off the grid, in or out of a shooting war, as they leverage your personal abilities by allying with others of like interest.
That will be Step Three, the final step: Establish and underground network
❑ Network and establish an underground: There is already a large network of ‘underground’ players which you may choose to rely upon. For a more trusting relationship, it is easier to start your own. Find like-minded people in your area and establish relationships based on keeping to as many of the below advised procedures as can be achieved. You will find that you can help one another in immeasurable ways.
One of the most valuable may prove to be bartering amongst networked peers, and learning from one another what works and what does not, or how best to apply a given tactic. My wisdom is miniscule compared to someone who is in your exact situation and who has already tried and discarded, or tried and refined a tactic. Make their experience work for you.
One place to look for established networks is public access television and radio, and underground newspapers. You can also find allies through bulletin boards at local colleges and places frequented by modern society’s ‘les miserables,’ such as head shops, book stores, music stores, secondhand stores, and so forth. Political rallies, especially for more Constitutional issues or controversies, is also a good place. While it is preferred that your network be closely aligned politically, remember thaty the enemy of your enemy is your friend, even if they be an Anarchist or Communist at heart.
Start up conversations and be friendly. Find common bonds (music, books, news topics) and get started just like any other attempt to make new friends. Then pose a question or offer a sentence which suggests you are dropping out of the system for political cause, and state your concerns. If they don’t know what you mean, educate them. If they do know, or after hearing your explanation, you will know almost immediately if they are kindred spirits. Develop such relationships with appropriate caution and reasonable paranoia towards possible betrayal. With a little time and patience, you will find some real gems. Discard the losers, and attempt to rehabilitate fence sitters.
Another way to network is to directly use Public Access radio and television resources, or the underground presses, yourself. You can (for free) learn to use broadcast equipment and create and present your own public access programs, or simply be a guest or participant in someone else’s show. Such shows are a wealth of information relevant to a broad array of social injustice and crimes or other victimization, and how to fight back. You will find allies, and you will make converts. In short, you will become an activist if not one already. That is what the system fears most — someone that pricks them, and they can’t reach out and correctively scratch back.
❑ Establish a Personal Network: Within the broader network, set up your own, smaller core underground support group using methodology similar to that used by the intelligence community when setting up an organization or project. This raises several sub topics, to include information as well as personnel issues. First, figure out who is the primary authority for the group (group leader). It need not be you if you don’t have a head for leadership or a desire for the tremendous responsibility it can represent.
Compartmentalization is a key intelligence community tool, and it would serve organizers to read up on that methodology, as well as other methods intelligence spooks employ. A hint of these methodologies is offered in these general guidelines or ‘talking points.’ As you seek to establish your group, these should indeed be discussed among you as issues to be addressed and decided upon.
Terms like covert, secret, and sensitive as used herein could be misconstrued to imply the purpose of such a group is clandestine or illegal in nature. That need not be true, but could be so, to a degree, yet still not be dark in purpose. For instance, you may wish to barter or trade services or goods privately in deference to what the system would prefer or considers legal. You will need a network of people with like interests in order to do this at will, safely. You will want to protect that network from discovery or the system will move to squash it (and you).
Of course, if a shooting war erupts, you will then have everything in place to escalate to darker needs as you see appropriate in defense of your family, country, and the Constitution. Everything will be illegal, then, but the true criminals are the ones judging it so. A network can easily be adapted for true intelligence gathering and black ops against any usurper of power, or formed into underground combat units, were that to become your collective wish. That is the real reason they won’t like the existence of networks. Here are some basic covert network guidelines:
❑ Categorize information: Identify material as being either sensitive (controlled) or public, (uncontrolled) and determine who has both a right to know (authority), and need to know (required to do their job/assignment) for access to controlled information.
Establish a formal means for controlling (restricting) and tracking (recording) both access and the ability to make copies. Never give both access and the ability to copy unless the copies and the process that generates them are also controlled and tracked. You need to be able to reconstruct any possible leak of sensitive information based on who accessed it, when, and how. Eject from your group any violators of protocols, even if accidental or seemingly innocent. The Network’s integrity is more important than risking it further to an uncertain loyalty.
❑ Safeguard information: Where possible, insert dummy information into sensitive information as a further tool for tracking leaks. Dummy information should be ‘detectible’ in terms of identifying the nature of the leak and ‘neutral’ in terms of impact on those accessing it (it should not cause them to alter their legitimate use of the information). It should be unique to a given or limited person or group of persons in terms of access, to better identify the leak source; a given person knows a given thing no one else knows, something which seems important and rightfully sensitive, but which is not, and something which would be easy to detect if leaked (cause visible actions as result). Establish ways to test such loyalties and detect any betrayal.
❑ Control access to information: Organizational members (family, fellow dropouts, and trusted friends or coworkers who support you in any way) should be categorized as protected or visible in terms of identities and operations. Protected individuals will be given and referred to only by code names, and only their operators or handlers (i.e., group leader) will know who they are and how to contact them. A protected person may assume a cover as a visible person, or may prefer to be seen as completely unaffiliated with the group. A good example would be a liaison with another group. A visible person might be a spokesperson, or a Lawyer, etc.
❑ Likewise with operations: Things you plan to do should be categorized as sensitive (covert) or open (overt) in nature. Only team leaders assigned a given operation will know all details. Even the assigning authority (team leader) might not need to know all details, though they will need to know those required to accomplish the goal and the general plan, that they might pick the best team members, and properly monitor the outcome or status of the effort.
Team members (operatives) may or may not need not know precise plans, timetables, operatives, lead-in event details, actual objectives, and so forth. Individual operatives will know only their individual assignments, restrictions or other parameters, and goal, but not have an understanding of the nature of the project or the identities of others involved unless part of the same interim goal.
❑ Form network alliances: The primary authority (group leader) will likely wish to establish special relationships as part of an ‘intelligence’ network for seeking out and sharing of critical information useful to the needs of the group. This should likely include counterparts in similar groups located elsewhere, where such trades of information can be mutually useful. But it might include ‘insiders’ positioned within non underground businesses, agencies, or groups able to provide useful information, persons considered friendly to your cause for whatever reason.
The usual formal first-contact means is a simple presentation of needs/interests and possibly the exchange of bona fides (proof of identity, purpose, and sincerity of beliefs based on prior accomplishments). It is better to rely upon gradual building of trust and bonds. Don’t show all your cards up front; it can backfire and get you into trouble, or scare them away.
You will want to establish simple tests of fidelity for the alliance partners, too, and conduct these with a subtle degree of covert manipulation, being careful to insure you can demonstrate, if caught, any deceit was not intended to be harmful to the other side and was necessary for your satisfaction of their integrity. Restated, give them something which seems like it could be used against you but which would backfire if they do (a trip wire, of sorts), and yet, which you can explain as such should they detect the deceit.
❑ Protect alliances: This creates a network of networks and amplifies the power base and resources for each group. It is acceptable to define limits of operation, mutual goals, etc., each group is willing or interested in working on. It would be dangerous to assume anything about another group, as there can be ‘guilt by association’ complications if something they do causes too much attention. Likewise, whatever you do can cause problems for others, so be sincere and honest when presenting your beliefs and intents, or you may find yourself cast to the wolves by an angry cadre. In essence, you live or die as a group by what you say as well as what you do, so live up to your own stated expectations, and hold everyone accountable for failures so there are no mysteries as to why they failed.
❑ Establish a Recon Team: The primary authority should find persons with skills and real-World resources, contacts, etc., suitable to establish conduits of reliable covert collection of information (intelligence gathering) about key strategic matters relating to persons or groups deemed a threat or activism target of the group. All group members should participate to the extent possible in overtly safe ways, but some individuals would excel in covert application, and their assignment to duties in this regard should not be known to the group. Special skills such as investigative or research skills, photography, locksmithing, communications technology, and computers are good starting points for considering who to assign.
This function is critical in a shooting war, but even if just trying to survive as an underground community, there will be threats which will require attention, and activism toward preferred reforms will need to continue in ways which do not threaten group integrity of operation. To fail to have such team in place as an underground group could be a significant risk if matters evolved to a shooting war.
Additionally, omnipresence in the greater community is desired with respect to information access. Therefore, project leaders and even group members may be asked to separately recruit ‘operatives’ who will contribute to the project or goals of the group without necessarily having allegiance to it, or even be aware of its existence. This is ‘recruitment’ which may involve any of the inducement methods used by the intelligence community itself, provided such methods have been approved by the group leader (some might be seen as illegal or immoral, such as bribes or blackmail). Not everyone will be good at recruitment, but those who are become good candidates for inclusion in the Recon Team.
❑ Establish a security team: The primary authority will also wish to establish a small team of persons who covertly address internal security — counterintelligence. They should be active in various projects as if ordinary team members, but would additional focus on internal security matters (watching for security leaks, infiltrators, etc.) Only the most trusted of persons should be members of this group, but all members should share the responsibility of watching for and reporting signs of security threats, external and internal.
❑ Use a consistent model: Each project leader will wish to mirror the organization of the group in small scale with respect to networking policies and layout, but bona fides will not be an issue, nor will they need their own security team, but rather, one individual would be assigned internal security matters. They will likewise wish to mirror the group leader with respect to operatives who will report directly to the project leader, only.
❑ Be discrete with all communications: Communications between various covert components must be established such that contact, sharing of instructions, information, and reporting, can be undertaken without anyone within or outside of the group being the wiser. The use of code names, code words or phrases, and flag actions (i.e., placing an object in a certain place or position), covert meetings, blind drops, and so forth, will be called for in almost every instance.
❑ Delegate where possible: These operational guidelines create a certain project management overhead which should be delegated downward so that a higher level is not overly involved in the operational details of a lower level. Upward/downward reports or downward group- or team-wide presentations keep leaders and group members informed as appropriate. The group leader should not worry about how the project leader communicates with his operatives, etc. Everyone with a special skill should seek to clone themselves by training a possible replacement so that the loss of any person’s would not seriously harm the group’s operational integrity, and delegate tasks to trainees to test their abilities and grow their confidence.
❑ Weapons of war: Early in the formation of the group, a consensus should be sought regarding definition of what weapons of war are deemed acceptable or required to meet group goals and maintain operational integrity. It is presumed and hoped that such weapons will be limited to the same weapons as used by any activist outside of an underground group (words, public protest, etc.). But given that Homeland Security has placed bid requests for 1.4 billion rounds of ammunition for use outside of the military, it seems clear that someone intends or expects there to be a shooting war, soon.
Therefore, a ‘policy’ should be calculated to everyone’s satisfaction regarding actual weapons and munitions which may be needed if a shooting war erupts, be they intended for self defense or for offensive operations against forces of oppression, be it on an individual or group basis. Considerations should include: a) access — will there money available to purchase, will there be a market in tact which can sell? If not, get them while you still can and stockpile for future need — you won’t want to wait until your only option is a criminal black market under Martial Law; b) choice — is there someone in the group who knows what weapons are good for what uses? If not, assign someone to find out; c) training — is anyone able to shoot a weapon or even comfortable doing so? If not, they should take courses while they still can; d) storage — where will they be kept until needed, stowed by individuals or the group? A secure place safe from deliberate detection efforts will be required.
Thus ends our review on how to drop out of the system and form your own underground. These are fairly basic in nature, and yet may simply be too much for most readers to contemplate. But sooner or later, the way MIIM is heading, we are all going to have to make a tough choice: do we stay within the system and be controlled by it, or do we break away from the system and seek its destruction, or at least be ready to do so at some strategic point before it is too late to do so?
Our survival as free-will individuals and citizens, and as a free nation, will likely depend on that decision. Better to make the decision sooner, than later. Better to do it methodically and with good principles of operation than by spontaneous guesswork. When MIIM makes its final moves, the warning may be mere hours before they start going door-to-door and results in shooting, and it will be too late for decisions, much less planning, then.
Do I hear someone knocking at your door? Better check your political watch and peek out the window before you open it.
- 20 Key Ways to Defeat The New World Order (thedailysheeple.com)
- New polls on N.W.O beliefs and need for Revolution are in! Truth is rising in the light! (notesonthenwo.wordpress.com)
If you are no fan of the notion of a fascist, satanic World government ruling a depopulated World with all the power of the Antichrist, you may want to know there is one simple weapon we hold that the NWO fears we will discover and use, one more dangerous than guns.
How to War with the New World Order (a Primer)by H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
How to war with the New World Order
Any enemy can be defeated if you know their weaknesses
Follows is an abbreviated collection of excerpts and updates from my book, The Professional Paranoid Defensive Field Guide, which includes many more such tactical advices, many being useful in any kind of war the New World Order force upon us, even a shooting war. But this post addresses a war that we can more safely bring to them, one non violent, perhaps forestalling the need for guns altogether by stopping the NWO cold.
Regardless, it also undoubtedly gets me listed officially as a ‘financial terrorist’ with evil Men in Black (or Army green, Police blue). Who cares? We are all treated as terrorists anyway, pending a moment of convenient political gain for actual ‘attention’ to our particular branding. Screw them and their paranoiac need to so label free thinkers, of whom Thomas Jefferson says government should rightly fear (for cause of making them BEHAVE RIGHTLY).
They can NDAA-vanish me at anytime, if they dare — just as they can any of YOU. That’s the whole point, isn’t it? If one man is not free because government violates its own Constitutional Law, then no one can rightly claim to be free. And so, given Homeland Security has placed bid requests for 1.4 billion rounds of ammunition for use outside of the military, the threat of an outlaw government seeking or expecting a shooting war with Constitutionalists forces me to write. If they so expect, so must we.
I must write, if for no other reason than personal self defense, which depends in turn upon the successful defense of others, give such advice. It is the collective WE, The People, who must survive, not mere individuals. Governments can come and go, can fail and be reconstituted, overnight if need be. But if freedom dies and We the People become a historical footnote, transformed into mere chattle as manageable individuals for feeding the profit grist mill of a corporate state (that’s fascism, by the way), something precious and extremely difficult to replace is lost for a long, long time.
The advice of which I speak consists of three simple steps, each with multiple topical elements, options, or ways to grasp and effect them. This post details Steps One of three. Collectively, they would allow us to be effective in the effort, and better assure individual and collective safety even if armed conflict is forced upon us.
And there are other resources online, some of which I have linked as you read. There is, for instance, fightthenwo.org, numerous sites promoting an effort called ‘global noncompliance’, and illuminati-news.com, where one finds an article somewhat like my own. Just type in the appropriate search terms to amplify your knowledge base, and your options, and to cement your confidence if daring to stand against the machine as do I.
You and I are not alone, given the broad range of topics which stir people to activisim in causes with which you should become familiar, for it makes of such persons a thing called allies. You need not agree with them all, but we all should stand together, for all such activists become targets of the NWO. I’m talking about things like Agenda 21, Canamex Highway, gun bans, Codex Alimentarius, Digital Angel, TIAO Dataveillance, RFID, NDAA, the FED, Political Control Technology, Chemtrails, Animal Rights, Occupy, Anonymous, and on and on and on.
Often, we should consider allying with both sides, perhaps one more than another if so moved — but ever mindful that the enemy loves to divide and conquer by fueling our disdain for one side over another. Fighting amongst ourselves means we don’t even see the real enemy. All these groups, save moments of manipulation, should be ally and enemy to the Globalist agenda, and not enemy, mine. To steal from another anti-NWO group’s slogan… which I essentially endorse, and again for which the operative word elected is WE…
“We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.”
What can we learn from Anonymous? The most obvious lesson is that invisibility equates to an invulnerability to retaliation. Sure, they have losses, but the group is getting stronger and gaining in popularity in pop culture and elsewhere, and doing some real good as it goes, as some count good (no movement pleases all its supporters all the time). But by and large, their integrity as a working force against evil is unchecked because of their anonymity. They are off the Grid, beyond the Matrix (though hiding within and manipulating it), they have gone Underground.
That is were we must be to be both safe and effective in battle; underground.
So begins our review on how to drop out of the system and form your own underground — which is also to say, how to more covertly and safely defend your country from enemies foreign and domestic. These are fairly basic ideas, and yet may simply be too much for most readers to contemplate actually undertaking, at least wholesale (easing in may indeed be easier). But sooner or later, the way MIIM is heading with insane abandon, we are all going to be forced to make a tough choice: do we stay within the system and be controlled by it with no recourse, or do we break away from the system and seek its destruction through violent confrontation, or at least prepare for that eventuality? I think dropping out is a better, safer choice, one which also serves as preparation for a possible violent day; it covers all bases.
Our survival as free-will individuals and citizens, and as a free nation, will likely depend on our decision. Better to make the decision sooner, than later. Better to do it methodically under a plan and with good principles of operation than by forced into spontaneous guesswork on the fly by sudden, unexpected perils. When MIIM makes its final moves, the warning may be mere hours before they start going door-to-door and shooting erupts, and politically incorrect persons are vanished. It will be too late for decisions, much less planning, then.
What can be done to stop the New World Order?
Step 1: Understand the Problem, Know Thy Enemy
One must realize that the New World Order movement, with its roots going back to the Satanic Illuminati in, perhaps not so coincidentally, 1776, was a centuries-long plan to form a one-World government that their might be one World leader; the Antichrist. Believe it or not, we are dealing with powers and principalities, a relentless and seemingly unstoppable force which never sleeps, has countless minions of dark allies and dupes like forces to work with them unknowingly, and employs clever deceits and sinister plots to lubricate its machinations. Most of the battle is invisible, as often is also the outcome; we can loose significant ground and not even be aware until much later — the price of forgetting or pretending there is no Satan or Hell… or even a God, for too many of us.
It is not the United States Federal Government, or the United Nations, or the initialed Agencies or Department of Defense, or local law enforcement that we face. It is not globalist corporate giants, the FED and Jewish or international bankers, or the Military-Industrial Complex or the oil companies who are our enemies, nor their boards of directors, foundations, religious and charity fronts, or their political action groups. It is not the modern-day leadership of Illuminati philosophies inherent in the Power Elite round table groups such as the Bilderbergers, Club of Rome, Council on Foreign Relations, Tri Lateral Commission, Rhodes Scholar disciples, or even the infamous Skull and Bones/Thule Societies and their counterparts, or even the Freemasons from which sprang the Satanic Illuminati. Neither is it CIA, FBI, NSA, DHS, DEA, ATF, ONI, DIA, or any of the endless initialed investigative and enforcement agencies.
No. It is instead all these entities combined, and much, much more, who make up the face of our enemy. To define or limit the enemy to any one group or several, short of the whole, will miss the mark, and fail. It matters not if they participate knowingly in support of Illuminati goals, or by coincidentally by coincidentally aligned or secretly guided agenda. They are the collective wall of hardened, massive stones which lay between being free in all pursuit of life, and being a slave dead to God. Those stones form the Pyramid upon which sits the All-Seeing Eye, which is the symbolism of the very Antichrist and End Times; the ‘eye’ of Lucifer taking up the key-most position (where one should instead find a stone referred to as the frustrum), thereby frustrating the placement of the capstone, the return of Christ.
The question then arises, what chance does the individual (YOU, me, all of us who prefer FREEDOM and LIFE to slavery and death) against such a vast array of forces? What chance would we have to make a difference in what essentially appears on the surface to be prophecy being fulfilled, day by day, regarding a predestined final-day battle between God and Satan? Who are we that dare intercede in such contests between Titans of Biblic proportions, and what could we possibly hope to contribute of any value or impact in a battle of such scale; that which leads to and includes the showdown at Armageddon?
The answer is, in my humble opinion, EVERYTHING.
It is not simply God vs. the Devil. It is God and the good sought and achieved by Man through God’s gift of free will vs. Satan and the evil done by Man by subversion of free will. It is about righteousness (right-use-ness) vs. evil (vile-ness), both effected by our own individual choices. I believe that to the extent that there remains sufficient good will and righteousness in Man in his time on Earth, the date of Armageddon, and those things which lead to it, are delayed. Scripture refers to this as Grace.
This whole notion is reflected manifold in scripture, for those willing to heed a rather short Bible lesson, which is an all important part of Step 1 — to fully understand the stakes involved and the true unseen mechanisms which guide outcome…
Jerimiah 5:1 regarding God’s Judgement upon Jerusalem for failing to honor God and his Commandments says “Go up and down the streets of Jerusalem, look around and consider, search through her squares. If you can find but one person who deals honestly and seeks the truth, I will forgive this city.”
Genesis 18:26 regarding Abraham’s prayers beseeching God not to destroy Sodom, God says in respose, “If I find fifty righteous people in the city of Sodom, I will spare the all the place for their sakes.” Abraham negotiates the number down to 10, an important number spiritually.
Romans 2:4 tells us why the forbearance of Grace is offered (though all-too often sadly betrayed by Man’s delight in sin) with “Or do you show contempt for the riches of his kindness, forbearance and patience, not realizing that God’s kindness is intended to lead you to repentance?”
2 Peter 3:9 is more to the point with dialog on the coming of Judgement Day, and Christ’s return. “The Lord is not slow in keeping his promise, as some understand slowness. Instead he is patient with you, not wanting anyone to perish, but everyone to come to repentance.” Being patient, he gives us time (a period of Grace) in which to work toward salvation. What we do with that time is our own choice.
But if we make no effort on behalf of good in the face of evil, no matter how overwhelming it may seem, then we deserve the fruits of evil, as spelled out in Ecclesiastes 9:3 “This is the evil in everything that happens under the sun: the same destiny overtakes all. The hearts of people, moreover, are full of evil and there is madness in their hearts while they live, and afterward they join the dead.” More such as this can be found.
So let us also heed God’s advice and enter into battle. Ephesians 6:13 tells us how: “Therefore put on the full armor of God, so that when the day of evil comes, you may be able to stand your ground, and after you have done everything, to stand.” Much more is also available on this topic, as well. But hey – this video says it in an extremely beautiful way.
The number 10 in the Bible (and elsewhere), for instance, represents fullness, full measure, fulfillment. Thus, as long as Good can be seen sufficiently ‘full,’ as in ‘full of Grace,’ which is God’s forgiveness and forbearance, there is no reason for Judgement Day to come to pass. Should Man drop below a rating of ’10,’ Judgement is enabled and will come to pass. Thus, I argue; it is all up to you and me, to decide that moment — perhaps why ‘No man knoweth the hour,’ of that day, for we cannot take self measure.
The Bible offers more and better advice, than this feeble attempt at presentation. I simply offer how you might apply it using specific strategems. Let us consider:
Short of armed revolution, and in the absence of any seeming control over our government through the traditional election processes, the alleged system of checks and balances and for obtaining redress in the courts… as illustrated by the failure of Congress and the Courts to ever address crimes of the White House, or to curb the military or intelligence communities when they go awry… and surely their failure to quash NDAA, the Patriot Act, the outrageous acts of TSA, ICE, and all such madness — is the option to undertake another kind of war with the NWO; a guerrilla war fought on our terms, not theirs. I speak of an offensive war, one which effects a defensive posture, as well.
It may be time we take the battle to them, and use their own System to ensnare them.
Let’s face it. The enemy, as it otherwise stands, holds all the cards: We must use their money, follow their laws and suffer under their court judgements (for most of us, relying upon their lawyers appointed on our behalf — unless we are wealthy, in which case, we are more likely part of the problem), are subjected to controls by their police and military, must depend on our news from sources their Military-Industrial-Intelligence-Media complex (MIIM) controls, send our kids to schools in an educational system they manipulate, and use their insurance to visit their Doctors, hospitals, and take their drugs, etc. All the way we foot the bill for these things which define our limitations, and profit their machine.
At every turn, they hold control over our lives: we cannot get a job without identifying ourselves using their number. We cannot keep that job without giving them a huge portion of our wages as taxes, which they then frequently use against us, along with other monies they manage to extort, steal, or siphon from us through societal forces of their design. We cannot well protest our lot because they own the media by which we would have our say, and we use an Internet rife with their control, censorship, and eavesdropping (there is a better Web alternative in works, however — take a look).
We cannot ‘vote the scoundrels out’ because they control the voting process and the choices we are to be given. Ergo, Dog and Poney shows replete with hanging chads or worse, and if not that, assassination of candidates or death threats against them or their loved ones. In short, the terms ‘Republic’ and ‘Democratic Process’ have become a sham, as no matter who we vote for, the same old policies are continued toward NWO domination.
As bad, ‘redress’ is a word no longer in the American political lexicon; the System is rigged at every turn to defy it except in the most well-funded of battles, it costing millions for instance to employ media to advantage, or prosecute a case through the Courts, and the Internet is so controlled by cyberwarrior tactics that most organizational efforts there are easily derailed through infiltration and sabotage. And now they want to take the guns, which if allowed to come to pass, will mean all doors for redress can be permanently shut tight against us.
No thank you. Gunfire before gun grabbing, for me.
But the purpose of this post is to avoid the need for that eventuality. We must realize who MIIM is, and deal with them accordingly. MIIM’s arrayed forces and allies are by and large fascists and racists, and even Satanists, or some combination thereof. They tend to be psychopaths and sociopaths who wield immense wealth and power in all areas of societal and governmental structures. Their collective is hundreds of years old, and thus, they have had ample time to calculate and think ahead, to plan for every contingency, and tend to easily defeat a defense before we can think to undertake it.
But there is good news in all this.
Despite their position of dominance, it happens that there is one thing all principalities and powers fear, something which we possess… something they fear we will discover as the weakness or flaw in their plan. And it is such a simple thing, and defines Step Two. The beauty of it is, that implementing it now not only weakens their hand and strengthens ours, but if at some point the war becomes a shooting war, we will stand a much better chance of being able to either run and hide or to stand and fight. Either way, it will be harder for them to find and manipulate and destroy individuals, and thereby, the whole.
You can do neither if they collect you, first, or already control you outright in their System, what some call the Matrix. The solution? That’s the next post…
What scares the New World Order?
Step Two: Drop out of the System:
To explain that first requires that we understand what the System is. The System is two infrastructural parts; the commercial side and the government side. The commercial side sells itself to you every day. Advertising for products and services creates desire. Desire leads to purchase. Purchase yields profits against cost, and is a two-edged sword used against you. Part of the cost is payroll, which is used to pay you less than you are actually worth. They reap the GNP at your expense; you provide both the labor and the capital which drives their machine, so whatever they pay you, they get back by the resale of your fruits (you effectively work for free by giving them back their own money in exchange for very little of true value).
All along the way, taxes are levied to fund the other part of the System. They win-win, you loose-loose, but you get (something) they’ve convince you that you can’t live without, despite the fact that the World did just fine without it since the beginning of time. Everything from better deoderant to cars that talk, from perfect pills to pornographic movies through your cable company. And let us not forget GMO produce and foods so processed and full of additives that ants no longer eat anything in our kitchens but raw suger. As Dr. Phil has said, “If it wasn’t food 100 years ago, it probably isn’t food, today.”
Lucky you to have it so good, at long last. Whatever happened to happiness; the contentment that comes from simply living and enjoying nature and the company of others, and the fruits of our own labor? Who decided that these things had to be purchased in newly constituted forms, and that we should have no other choices? And, I might add, who can believe anything they tell you about what is good for you when every few years a new study reverses a previous finding, and perfect pills result in class action law suits for the harm they do?
Oh, but the System cares not for trivial details as these, because we are so dumbed down we don’t see the problem, and buy the next new thing.
Meanwhile, the government part of the system tracks and manipulates our participation in the first part in many ways. Your social security number, as mentioned, plays a major role. Your credit rating and banking numbers further track your every move financially, and government’s FINCEN (Financial Crimes Enforcement Network) and the Total Information Awareness Office (Department of Defense) are both gearing up to access every transaction from birth to death for every citizen. As the Bible has predicted, you already can hardly buy or sell without a number of some sort, a de facto Mark of the Beast by some accounts. But that yolk has not yet come to pass in its bitter fullness (Digital Angel awaits you).
The money itself also has tracking systems built into the bills (the little embedded strip you can see holding the bills up to the light can be sensed by special equipment), and FINCEN will be able to track cash as easily as credit once it is fully established and retail systems have evolved to accommodate the technology, called RFID (Radio Frequency Identification Device).
The Military AND the commercial side are partnering to establish wholesale use of RFID technology which will allow transactional tracking at points of sale to include a complete and total understanding of each and every product you purchase, effectively giving it a unique serial number. It can tell how and when you acquired it, whatever it is, right down to razor blades (already chipped). In fact, retailers have actually used cameras to track shoppers as they move through the store by zeroing in on select RFID chips in products in their cart, or already owned and in their possession (e.g., lipstick tube). You are the sum of your RFID, and once cataloged, you can be tracked anywhere.
As you read this, cash registers, inventory control systems, and security systems (doorway monitors, cameras, traffic monitors) are being designed and built which can scan RFID at a distance. Millions of credit cards, mailing labels, ID cards and driver’s licenses, and even cell phones have already been chipped with RFID, and some things, like select cell phones and cars, include GPS tracking. Security cameras and roadside or sidewalk monitors are being upgraded to track them. Unless you go naked in the World, or make your own clothes and use no manufactured objects, you can be tracked by RFID, because everything manufactured and sold will eventually have chips embedded.
We register with government for everything. We register to be born and to die. We register for school, to vote, to get driver’s licenses, to fish or hunt, to buy or rent a car or home, to have a phone or utility services, or to save a little extra money when we shop or to use credit, and so forth. At every turn we are giving out information about ourselves which is fed into computers, computers with back doors and inherent ‘links’ or leaks between databases to serve marketing and or government purposes. Hence Dataveillance.
How else do you suppose that you get so much junk mail with your name on it? One CIA front (two fronts, actually, one here and one in Europe), as I document in my book, the Professional Paranoid Defensive Field Guide offer to sell information on 98% of American adults. The other two percent have already dropped out of the system. Why should government intelligence agencies be in the business of spying on you and then selling your little ones and zeros for a profit? Do something about it, and drop out. Let them sell just zeros, if they can.
If you elect to remain in the System, if and when they want to reach out and get you for some reason, they will know right where you are, that very moment. Their data will let them profile you psychologically and predict your actions (as described in the Department of Defense’s original RFP White Paper for the TIAO). Don’t answer that knock at the door… you don’t want what they are selling. And you won’t be able to run at that point, because they can freeze all your financial assets, and in some cases, can remotely disable your car, and in all cases, turn resources such as your cell phone against you. It will be too late, then.
Proactive and preemptive tactics are what you need.
To preempt, disengage yourself from the system. When someone drops out of the system, the overhead of the system is actually increased to a degree, but the funding thereof is reduced. This causes subtle instability within the system which impacts the remainder of those still within the system. By deliberately weakening the system in this way, the New World Order is forced to become less transparent, and more domineering, more visible to those who have not yet seen that particular light. It compounds like interest as more and more people figure out they should exit.
Thus, more persons will exit, recruiting others as they go; the cycle will continue to the point where the system must either fail, or seek to seize absolute control sooner than it otherwise intended, before they are ready to do so with full confidence of victory. A shift in balance of power is achieved, the stronger side left unstable and off balance, giving the weaker side a chance to make significant gains with smaller efforts. The domino effect, slow motion though it will seem, at first.
Dropping out is fairly easy — just stop playing the game. Take actions which reduce your exposure to their ever evolving control matrix, and which free you up for further actions at reduced risk. Risk tends to lessen with time as you get better at living off the grid. Most of these things are very easy to do, and have little true risk, but may represent major inconveniences or social roadblocks up front.
You may likely face serious decisions about how you execute such a plan, and to what extent you are willing to go to make it happen. Fortunately, it need not be an overnight matter, which means you can ease into it over several months time, perhaps a few years (presuming we have that much time remaining). Just know that for every cost you are willing to bear up front, the benefits to which it leads tend to be far more valuable in the final analysis. The more steps you manage to accomplish, the easier are the remaining steps.
This ends the introduction to Step Two. What follows in the next segment are a series of suggested guidelines or action options to actually be effective doing it. Some of them you simply might not care for, or accept as viable or workable with respect to their goals or your personal circumstances. Don’t feel you need to follow these suggestions any more than you need to ‘play their game.’ After all, it is about free will choice; God’s greatest gift to Man short of life itself.
And that’s exactly what we are trying to stop the New World Order from ending: Free Will.
What are the tools of the New World Order?
Next up: How to War With the New World Order (Drop Out Checklist)
A reality check for citizens in every nation, democratic, communist, totalitarian, or religiously governed (e.g., Islamic); terrorism is not waged between governments or ideologies as outwardly advertised, but a covert weapon for political control used by Globalists against all peoples, especially the very members of terror groups duped into participation. More to the point, it is waged by powers and principalities, against God and Man, and serves Satan.
Globalism’s Deliberate Self-Fulfilling Cycles of Paranoiac ‘Terror Threats’
by H. Michael Sweeney
What you will learn reading this post…
- Terrorism is a sham, a weapon of political control technology;
- Terrorism never benefits terrorists in any real way, given the backlash;
- Terrorism is never approached as a problem to actually be solved because it serves the ‘target’ government’s interests as long as it exists;
- Terrorism is about control of the masses through fears designed to sponsor a willingness to subjugate ourselves to the New World Order;
- Therein is the real secret; the NWO is Satan’s Illuminati plan to seat the Antichrist, terrorism being a mere tool.
Who benefits from terrorism?
Reality Check Time for citizens of all nations
Rewind the clock and review the last few decades or so — the time frame of the alleged ‘War against Terrorism.’ If you consider cause and effect relationships with much care, you quickly see that there would be no terrorism of true consequence except for government’s need to both instill fear in you as a form of Political Control Technology (behavior and thought control through deciet), and as a generator of ‘fuel’ for that very mechanism.
Look more closely, however, and we find even the governments are not the true benefactors. That would be Globalists, which put in other terms, is the modern-day Illuminati; the New World Order movement for a one-World government. This is governments run by the power elite, also called Fascism in some circles. Such rule is required if the Antichrist is ever to come to power. That is what I hope to illustrate in this post, along with some other eye openers of like nature:
Case Study; Control Group
But before we do that, we should first establish and consider, in the method of good scientific study, a ‘control group.’ We can then hold up the control group for comparison to the ‘terror group’ of events we will consider to make our final findings. Any differences should be for us valuable clues. For this purpose, let’s use something entirely unrelated which, like terrorism, represents a deadly threat to lives and the wellbeing of any nation; traffic accidents. Rewind the last decade or two in your mind and replay as you consider…
At regional and local levels, mostly, and to somewhat lesser degree at national levels, the high death toll and financial cost to the nation inherent in traffic crashes, including GNP impact, typically sparks ongoing efforts to improve highway and auto safety. This consists of an endless series of changes in rules, laws, and regulations, as well as advertising campaigns to educate drivers.
Specific examples over the years would include improving crash safety standards for auto makers, improved highway lighting, signage, and general design considerations, mandating seat belt use, ‘Don’t drink and drive,’ and other safety ad campaigns, tougher traffic laws and fines, more enforcement, and so forth.
In replay of that history, can you uncover recollection of ANY instance where a given governmentally sponsored approach significantly resulted in an INCREASE of traffic accidents or fatalities? I think not. The point is, in this control group review, we see that a problem which is seriously addressed for its own sake tends to evolve improvements, rather than degradation, over time. Restated, a legitimate problem genuinely and sincerely addressed in this way can always be made better by a cure, or an ineffective cure can be discarded in favor of a renewed attempt.
We must also ask, for reasons which should become apparent, who benefits thereby? The answer is, essentially, everyone. Drivers live longer and suffer less as a class, costs of accidents go down, though costs of ownership of vehicles tends to increase somewhat due to more expense in manufacturing and, for some, higher fines or fees associated with use of their vehicles, and taxes for improvements in highways. Most of us are content with these offsetting costs, and do not complain too much. The nation’s quality of life and GNP are enhanced.
More to the point, there are no significant losses of freedom or increases in political control by government, though new laws addressing safety issues may impose changes in procedures and provide for penalties; no one is unduly oppressed or repressed thereby, and basic rights remain unscathed.
Hmm… that seems to fit rather well with Titus 2:7 “In all things shewing thyself a pattern of good works: in doctrine shewing uncorruptness, gravity, sincerity.”
The Comparison Group; Terrorism
Rewinding and replaying the same period of time, but this time looking at Terrorism, let us compare to the Control Group. One difference we see almost immediately is that virtually all of the effort to combat ‘the problem’ stems from national government responses, rather than regional and local levels. They, alone, by and large, have defined the problem and ‘solutions offered.’ That, alone, might be a significant clue; a small handful of Men, all of like nature and purpose within the power elite, control all aspects related to the issue.
Indeed, no one else’s opinions are even allowed to hold sway, regardless of their quality of logic or popularity among the People. In almost every case we find, in reverse to the Control Group, that their actions have stimulated, rather than abated, the problem of terrorism. Indeed, if we go back far enough, we find that the problem did not even exist except for the causality of their actions. To make the point, let us look at several ‘models’ of terrorism. Start with the European model:
Go back to the time prior to the European Community, and you find that terrorism essentially was non existent in the early years of Post War Europe. But it came to be, based on the nature of groups formed to foment terrorism, because of ‘Cold War tensions,’ if we believe the political rhetoric of the day. Based on the rest of this presentation, I’m thinking you will rightly conclude that assumption a sham, and the true cause lay elsewhere: false flag psychological operations. And should you not naturally so conclude, we will see there is proof it is so.
In point of fact, the processes which will be described, next (in the American model), apply to quite well to the European model. Terror attacks in Europe enabled the same exact processes, and in Europe, I assert, directly helped and led to the formation of the European Community, itself, a key Globalist early goal. Remember that notion as we near the end of looking at the American model, which will bring the point home in unexpected ways, and fully relate the Globalist aspect.
I only thought to bring up European model because it underscores and echoes in reenforcement the discoveries we will find in the American model. Any nation which has in the past or currently experiences terrorism should find these same factors in play, as well; they are portable concepts useful in any governmental environment. But in all cases, they serve only one special interest group, a group present in every governmental environment; Globalists. Allow me to make the case…
In America, terrorism was not even in the American lexicon until CIA began funding, training, and arming radical Muslims as part of their meddling in the affairs of Islamic nations rich with natural resources. Such meddling is a sure-fire way to generate resentment and hatred given their religious beliefs, beliefs which impact political actions in ways perhaps uncommon elsewhere.
I remember, in fact, one of the early newspaper articles (and later, others) on topic having to actually DEFINE the basic terminologies of terrorism in order to write about terror events. The point is, however, that we can lay terrorism at the feet of CIA and American foreign policy (on the one hand closest to our observation), and, as we will see, on Globalism, on the other, less visible hand.
If I were willing to make this blog longer than you would wish it in reading time, I could detail that for you to a level which showed CIA and the Department of Defense, often in alliance with military contractors and Globalist firms, actually imported most terrorists we have heard about acting on US soil (and elsewhere), often aiding in their visitation, training, and financing up to the moment of their terror acts, and even in their escape and any subsequent reentry into country. This I do in my four volume bookset, Fatal Rebirth, with over 1,500 footnotes of factual evidence. Want a free ebook of volume one?
So we see right away that the very problem was created by government. In defense, or rather concealment of the fuller truth, they claimed it unintended, even coincidental or unavoidable, and most of us believed them. But the footnotes I speak of show otherwise, especially in terms of lesser known ‘smoking gun’ events. One test of the sincerity of the claim is the question, does government move to ‘address’ this new terrorism problem as they did in our Control Group? Well, sort of…
The very first effort in response of note was the Patriot Act, a major assault on Constitutionally guaranteed liberties which, they promised, would be repealed as soon as they got a handle on the problem. Tyrannical governments which have evolved throughout history have always got their start with that very argument in justification of repressive actions, creating for themselves that slippery slope of no return. So many times have they had the chance to repeal the Patriot Act and instead elected to extend it, if not add to it, that I’ve lost count. Full grease ahead, downard, Ho!
Virtually all Congressional and White House actions aimed at combating terrorism have followed this self-same pattern: repressive responses which reduce Liberty in exchange for alleged security, a formula known to leave the people with neither, and which instead leads to a totalitarian police state. That’s how the Communist revolution in Russia led to something Karl Marx never intended for his movement. That’s how South American dictators grew their power. That’s how Hitler came to be, and so forth. But it is not how you combat terrorism, for it has not abated, though one may argue there is a current lull. So again, I ask, who profits?
To be sure, not the terrorists, who are guaranteed to generate a backlash against their own homelands. Examine all of history, and it is rare to find an example of the use of terror which resulted in good outcome for the nation from whence attacks originated, and on whose behalf their acts were supposedly committed. Their people suffered, typically through military response, worse casualties and consequence, than did the nation targeted with terrorism. It is a loose-loose situation for terrorists. There is but one exception, to be noted shortly.
Indeed, it is instead the nations targeted by terrorism who benefit. Not the citizens thereof, who bear the brunt of attacks at a personal level, but the men and political forces in power. Terrorism, in fact, gives power to the national government and its leaders, big time. Always; Hitler the perfect example. In international terrorism, the real loosers are the citizens of both nations, and more importantly, all religions who worsiph the God of Abraham; the Jewish, Christian, and Islamic faiths for whom terrorism is a great tool for Globalist (Satanic Illuminati) divide and conquer tactics.
But it is a double whammy for citizens of the target nation, because they not only suffer the casualties of attacks, but the loss of freedoms and rights usurped by a government become more tyrannical. Such benefits are why false flag terrorism is often the tool of one’s own government. Hitler used it, and many Americans are convinced George Bush used it in Sept. 11, and so forth. Fatal Rebirth offers much evidence in support of that belief. Such powers and principalities go out of their way to foment or fake terror acts, even if they have to supply and fund the ‘leadership’ of the terrorists and grow them into a local power — the only terrorists to benefit being those paid and empowered at leadership levels.
Proof, in Fatal Rebirth, shows the number two man of al Quaeda, in fact, to be a double or triple agent working for CIA and the Department of Defense. That’s right, the man who not only planned, but helped execute the attacks on American Embassies, the USS Cole, and the bombing of the World Trade Center, the man who managed to put bin Laden into power and unify other terror groups under his command… was one of our own. And if that were not enough, he held a job with a major defense contractor when not employed by the United States Army.
Is terrorism false flag?
Terror culture growth in a petri dish
The macro illustrates further. Government actions to combat terror actually stimulate it, rather than fighting it. Every action in the Middle East has tended to angrify Muslims even more, making it easier for them to recruit combatants to use against us. Middle East policy continues to be based on previous failures, with no learning curve in evidence. Even those things we would outwardly see as ‘good acts,’ were often deliberate betrayals.
For example, an American company providing schoolbooks for use in the Middle East for very young children used pictures of bombs, grenades, and guns for counting exercises… early enough that by the time CIA was training Osama bin Laden, those children were old enough to be recruited into al Quaeda. Now, once we have invaded and seized control of Afghanistan, the same publisher is providing books with butterflies and Poppy blooms. So now, instead of growing terrorists, Afghanistani youth will grow up thinking it perfectly normal to grow and sell the crops used to make Heroine, those fields guarded by American soldiers as you read.
We continually arm radical groups for use against their own local regimes we conveniently deem ‘repressive’ after decades of working with them as allies and arming them to the teeth in many cases. And then wonder why the radicals soon enough turn those weapons on us, irrespective of if a new regime was put in place, or not. Moreover, any new regime is more dangerous than the old, outwardly, though I maintain it is an intended consequence. This is indeed on purpose of our terror and foreign policies, as reflected by the fact that we keep repeating these mistakes as if oblivious to their cause and effect relationships. There is proof.
Fatal Rebirth, recounts a specific PowerPoint presentation at the Pentagon by Defense Policy Board kingpin, Richard Perle, part of the PNAC (Project for a New American Century) plans to take control of the Middle East, and by capture of the bulk of remaining Oil repositories therein, to control the World. It is all based on concepts espoused by the Council on Foreign Relations and other Globalists, and Zionist interests via a partnership with a joint US-Israeli think tank. It laid out a multi-year, multi-war/revolution plan for takeover of the major Middle East nations in domino fashion, specifically with the intent of giving control over to radicals, specific persons controlled by or partnering with Globalists. Every war in the Middle East, including the more current revolts, was in the Power Point, with more such to come.
For example, Fatal Rebirth shows you that the top two people now running the Afghani government were both former CIA employees who also did work for the Oil Industry, and both were directly involved in trying to get the Taliban to grant oil and gas pipeline rights to American oil companies. Do you honestly think citizens at large in Afghanistan would benefit by and approve of covert CIA/oil industry control of their nation in the guise of a new democracy? This is what I mean when I say outwardly, new regimes may seem less than friendly, but secretly, they remain Globalist puppets to perpetuate control mechanisms there, as well as elsewhere.
Make no mistake. This is not an American plot so much as an international plot by Globalists, the modern Illuminati.
This is also revealed in the referenced PowerPoint, where even darker aspects tie directly to Mysticism, Satanism, and Illuminati principles, matters requiring too much detail to explain in this venue. But I will add that Perle himself has his own CIA front-like operation which works directly with Arms smugglers for the purpose. Stability in the Middle East is NOT a goal, and never was. Such political machinations foster a kind of hidden control of the Middle East through secret alliances with terrorist leadership in exchange for quid-pro quo cooperation (attacks). There is no usefulness for political control plots found in peace and stability.
This covert alliance betrays the very reasons rank and file membership of terror groups join, as well as the greater citizenry and governments of their homelands, not to mention putting at risk the long-term welfare of religious doctrine which often guides their nation and political movements. If the people joining terror groups fully understood this, they would behead their leaders as traitors, and rethink their strategies in realization that terrorism is political control weapon being used against their own people as well is those of the target nation(s). Only the Globalists and their proxies in the involved governments and terror groups, can possibly win.
It deserves restating of who benefits, and how: in funding, arming, and aiding in terror attacks against the U.S. and other nations where Globalism runs rampant, the target nation governmentals (and the Globalist movement) gain two things, and the leaders of terror groups gain prestige and power over their own people for their ‘successes,’ and loyalty and devotion in anger evolving out of backlash-sponsored ‘failures.’ The two things the Globalist proxies gain are an empowerment to further restrict freedoms and wax oppressive through legislative response to terror event ‘successes,’ and validating police state mentality by offering minimal proofs of effectiveness at the few terror attack-sponsord ‘failures.’ Perfect quid-quo pro.
So we see that regardless of if a terror even is effective, or fails, there is win-win for the Globalist and their terrorist cohorts, but only loose-loose for citizens and terror participants, who are mere pawns in a grand deceit.
Ergo, in our comparison, Luke 6:43-44 seem quite appropriate; “For a good tree bringeth not forth corrupt fruit; neither doth a corrupt tree bring forth good fruit. For every tree is known by its own fruit. Figs aren’t gathered from thornbushes, or grapes picked from a bramble bush.”
A need to shift gears: homegrown terror
A kind of proof that such terror is artificially generated and outcome is controlled lays in the fact that if it were NOT so, the focus would remain on the foreign sponsored terrorism, and changes or experimentation in solutions would evolve to some eventual gaining of ground. But, if one is intending a Police State, one realizes that eventually, there will be internal resistance and insurrection forces to be dealt with at some point — given that the only solutions applied are repressive to freedom in nature. There is only so far one can go in oppressive reduction of personal freedoms without sparking resistance.
What is domestic state sponsored terrorism?
The answer? Raise the stakes and ‘broaden the war.’
Therefore, almost immediately on the heels of the Truther movement, we here in America started to hear about homegrown terrorism, a thing which caused most of us to respond with ‘???’ And from this has evolved a whole new series of staged events to justify the next waves of repressive acts and moves which, like those for Islamic terror, actually tend to foment and generate the very terrorism they would pretend to combat.
These also served to empower the TSA and other repressive acts designed to train us to be obedient to Police State social controls (and the basest of personal insults and groping to which we dare not protest.) This additionally causes us to realize we need to fear and respect our government, despite the fact that our whole form of government is based on the notion that they should fear displeasure of We, the People. Once we have it upside down in our head, it is easier for them to advance with less meaningful resistance.
But then, they had yet to meet the 99%.
But the general strategy creats self-fulfilling harbingers. To worry about and act to ‘prevent’ or ‘combat’ terrorism will eventually spawn it. At some point, you no longer need false flag or even entrapment provocateurs. Fascists want and need internal civil unrest in order to justify further tightening of their power grip, and the unraveling of and discarding of the Constitution (esp. 2nd Amendment) that they may evolve into a truly Globalist entity. Specifically, in America, as I frequently detail in other posts, the establishment of the NAU; the North American Union. An exact replay of Europe, and why that model was briefly examined.
We see signs this is so by the fact that there are separate non terror-related actions which are preparing for acceptance of Globalist programs which can only function if there is a new Constitution under an NAU construct. Agenda 21, Codex Alimentarius, the CANAMEX Highway, United Nations Small Arms Treaty and other U.N. sponsored mandates such as Biospheres, all clue us in to this fact. Our Constitution and, more directly, the Second Amendment make these things almost impossible under our present form of government. They need Martial Law, suspension of the Constitution, seizure of firearms, and a new Constitution with more leeway.
They are easing us into the mentality of Globalist control by selling us on grandiose benefits which seem lofty, but which are truly unworkable and intended to conceal the truth: total control is not freedom, but slavery, and a one World government sponsored by the New World Order is nothing but a mechanism to seat the Antichrist as World Leader — the whole point of the Satanic Illuminati plan to create the NWO in the first place.
So they push for gun control legislation guaranteed to make more militant the mindset of gun owners. Then we conveniently have a wave of gun violence worthy of sparking demands for gun control, a matter deeply tied psychotropic drugs evolved out of CIA mind control research. I don’t even own a gun and yet they make me want to stockpile weapons and ammunition to protect the Second Amendment from panic-driven, unthinking gun grabbers and their Globalist sponsors.
I can only imagine that militia members are waxing paranoid and actively planning for and training for combat with government or United Nations forces. Eventually, someone from such a group will undertake an act of violence to ‘strike a blow for freedom,’ but it will most likely be a false flag event intended to justify efforts to enact gun confiscation. It will, in point of fact, be labeled as ‘terrorism.’ No right thinking group of gun owners would effect a first strike policy, knowing this would be the result, though a paranoidal schizophrenic individual, may, with entrapment encouragements.
They passed the NDAA and the DOD embarked on reckless and provocative mock raids of American cities in violation of Posse Commitatus to make us fear government to levels that may spark shooting of federal agents, soldiers, or cops in perceived self defense, as examined in an earlier post. Again, if some truly paranoid person does not eventually do so, I fear a false flag series of events will be staged. It is absolutely critical that government be able to vilify gun owners if the NAU is to come to pass, lest there be a full-scale armed revolt.
They passed the Monsanto Protection Act, which protects Monsanto from liability and enables their forcing of dangerous genetically modified crops into the food chain (to include meat supplies since corn and soy are fed to animals as well as to humans). This will most surely make militant a number of the millions of farmers who have sued Monsanto, and tens of millions more who realize GMO foods KILL livestock, cause birth defects or sterility, and even cause hair to grow through the digestive tract from tongue to intestines.
Eventually, again as I have posted earlier in full review, someone will get the idea in their head to act out in a violently against Monsanto, perhaps an arson or a bombing, or worse. When you take away the right of redress through the courts, you guarantee revolt in some violent form. False flag efforts will hardly be needed, IMO, but entrapment encouragements will likely be involved. Fascists NEED such violence to come to power, and once more, they will call it ‘terrorism:’
We must have terror and internal chaos if we are to have a New World Order. In fact, it would seem it is forecast by God to follow a period of great upheaval. 2 Thessalonians 2:3 “Let no man deceive you by any means: for that day shall not come, except there come a falling away first, and that man of sin be revealed, the son of perdition;” In the text of King James, ‘falling away’ means ‘rebellion,’ and the day spoken of is the End Days, the ‘son of perdition’ the Antichrist. Be not deceived by your leaders.
How is terrorism a tool for political control?
In summary, we see the pattern is complete in all instances, following the path of cause and effect which is opposite the model of the Control Group. There is no effort to combat terror, but instead, to generate it. It is a political control technology, a kind of mind control; it generates fear to enable tighter security control at the expense of liberty, generates resentment to foment new terror threats and, thereby, to repeat the cycle even well after any foreign threats might be abated through takeover of their governments (per the PowerPoint).
There is a great falling away taking place in the Muslim World, as they war amongst themselves for radical supremecy. In the non Muslim World, where radical Islam conducts terror strikes, populations loose freedoms which will steadily lead them toward having no other choice but armed revolt. My prior blogs are full of this warning, and show how perilously close it may be right here, in America. But this is a World-wide phenomenon, as the Occupy movement has shown. We are ripe. We have been deceived by a cyclic strategy which brings us ever closer to boil over.
Such cyclic strategy worked in the Middle East flavor, it worked in the European flavor, and the South American flavor, and it will work in the homegrown flavor (if we allow it). Dumbed-down Sheeple comply with little true objection in the false belief it is perfectly logical to so evolve, not realizing, like the frog in pot of water on the stove, that the political control temperature will soon be fatal and leave them with no way to escape a terrible unwanted and unforeseen fate; rule by a totalitarian police state, and even the Antichrist. Got 666? Almost.
In Fatal rebirth, the cover of the first volume expresses it all this way: Terrorism creates Nationalism (obedience and loyalty to government — who’s political leaders benefit from terrorism); Nationalism fosters Capitalism (most notably, the Military-Industrial-Intelligence-Media Complex — who profit from terrorism); Capitalism empowers Globalism — the power elite of the round table groups, the modern Illuminati (who benefit and profit from terrorism); Globalism therefore requires Terrorism — funding it directly, and through their control mechanisms within capitalism, nationalism. In effect, it is nothing more than a cyclic machine, an engine to power control mechanisms, and made up of control mechanisms, cyclic in nature.
I call it the Armageddon Machine. I also call it treason, though that is just the outer shell at the national level. If a shooting war erupts (armed revolt), the shooting should not stop until that machine is destroyed. It will not be a revolution simply to restore the Constitution and reestablish freedom, but to delay or prevent the end of the World as we know it. The modern Illuminati, the Globalists of the World, will be the true enemy, not just some handful of govermentals and their obedient armies. It will be a war with powers and principalities, the truest source and form of terror imaginable.
They exist not just here in our own country, but in other countries, from whence they manipulate and participate in events, here. We will likely have to take that war to them, as well. Any such revolution will need to be enlarged to an internationally scope, or we will never be able to start anew with hope of long success. Emptying Freedom’s lifeboat of Illuminati water has little effect if the satanic hole from which it springs forth is not also plugged.
This is true in every nation. Fascism, the outward manifestation of Globalism, exists in every government to one degree or another. The more affluent and powerful the nation, the more it controls the nation in subversively covert or openly overt ways. It matters not if the country is socialist, communist, democratic, or religiously governed (e.g., Islamic); fascist-globalist mechanisms guide it toward Illuminati goals. As the Occupy movement has illustrated, there is hardly a nation where the people are not starting to awaken to these facts.
The next revolution will undoubtedly spread to be global — especially if it originate in the one nation thought to be ‘most’ free. As America goes, so goes Canada, and Mexico. As America and Canado goes, so goes Britain. As Mexico goes, so goes Central and South America. As Britain goes, so goes the European Community. As they go, so goes the entirety of the former Soviet Bloc. And from there it is only logical that Middle East and Asiatic, and the rest, join in.
Is the war on terrorism fake?
That possibility moves me to employ something from the Prolog of Fatal Rebirth as Epilog, here. Because all men seeking freedom in such a battle will become John Gault in that day. If not, or if John Gault falters and fails, the Antichrist will come to power; we suffer End Game. But if Gault prevails, as in the fictional character’s role in Atlas Shrugged (Ayn Rand), the World will come to a screeching halt on its current course to Hell, and get a second chance, a reprieve, and an extension to our lease on the Planet, though at great cost. From Fatal Rebirth:
Truth cannot live on a diet of secrets, withering within a web of entangled lies. Freedom cannot live on a diet of lies, in the end surrendering to the veil of their oppression. The human spirit cannot live on a diet of oppression, being subservient against the will to that unchecked evil. God, as truth incarnate, will not long let stand a world devoted to such evils. Therefore, let us have the truth and freedom our spirits require… or let us die seeking these things, for without them, we shall surely and justly perish in an evil world.
And yet, in final note for this post, I am also moved to write… as the Bible text indicates, that to so revolt may play directly into their hands. The answer is found in the nature and outcome of any such revolt, especially if Global. The key, I am convinced, is where the revolt starts, when and why, and how it concludes. That, however, will be another blog post. Here, I will simply say this: God has our back, either way — provided we make no foolish mistakes and act without right-use-ness of Free Will (righteousness). Subscribe to learn more.
- Non-Muslims Carried Out More than 90% of All Terrorist Attacks on U.S. Soil ! Jewish & ‘Latino’ Extremists Carried Out Even More Attacks Than Muslims! (socioecohistory.wordpress.com)
- The FBI’s Fake Terror Plots – Judge Napolitano (therebel.org)
- N. Korea EMP Attack Next False Flag per Wag-The-Dog Evidence (proparanoid.wordpress.com)
If a military coupe planner needed an excuse for Martial Law in a hurry, what better way than to EMP the country and blame N. Korea? Such an attack from N. K. is impossible, and yet Sheeple wallow in the wag-the-dog Sheep Dip in a daze.
North Korea EMP Attack Next False Flag per Wag-The-Dog Evidenceby H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
How will North Korea attack America?
What you will learn reading this post…
- A review of signs that a false flag EMP nuclear detonation in our atmosphere will be staged;
- A review of what such an event enables and sponsors of value to the NWO traitors;
- What you can do to preempt and deal with consequences if it happens;
- How you can help prevent it from happening.
Is an EMP attack against America possible?
Why I write and you should read…
On April 3rd someone advised me that Google showed there were almost 200,000 Web sites claiming doom and gloom in the form of a North Korean EMP attack on the U.S. While many of these were the usual conspiracy theory resources (some with good reputations, some questionable, and some known disinfo organs such as federaljack.com.), unlike many conspiracy matters, there were also some mainstream news sorces carrying the story.
That, alone, made me sit up, but two days later, it had jumped to over 309,000, and is now nearly 900,000 (Korea + EMP attack.)
Even many mainstream outlets (e.g., Newsmax, Investors Business Daily, Washington Times) normally quite conservative were forecasting the darkest of all possible outcomes, some claiming up to 9 out of 10 Americans would die as result. I smelled, as did the person sending me the information, a big federal disinformation rat. Ever hear of Wag-The-Dog? Remember WMD in Iraq? That was really WTD.
If not, go rent or otherwise watch the Dustin Hofman, Robert De Niro movie with the same name, Wag The Dog. It will give you a hilarious review of EXACTLY what it is, and how it works, in a tongue-in-cheek presentation of real-World disinformation tactics employed by the Military-Industrial-Intelligence-Media complex. It’s all about manipulating people so they won’t question government crimes.
This EMP attack story is particularly disconcerting because it smacks of portending a false flag attack by our own government for reasons explained herein. Shades of the hit TV series Revolution, in fact, where there is sudden loss of power and political chaos results, almost as if the TV show was to prep us for what is to come that we might be easier to subdue in appreciation to military ‘rescue.’
What is an EMP attack?
What is an EMP attack?
When a nuclear bomb is set off, huge bursts of radiation of all manner are released in an unstoppable flood. Everything from heat and light to atomic radiation. Normally such bombs are used for their physical destruction capability, eviscerating a core area and causing blast and fire damage over a much broader area, and radioactively poisoning and rendering unsafe an even greater area. But there is another, more tactical use.
It is widely known but little spoken of, untill late (wag-the-dog tactic: foster massive dialogs in support of false story point), that if such a device is detonated high in the atmosphere over an enemy territory, the sudden burst of gamma rays creates a massive electromagnetic pulse (EMP.) So massive, in fact, that it destroys or interferes with most anything electronic. Motors, generators, and many digital and non digital components are, in fact, destroyed if in operation at the time, and some items will be harmed even if not in use, unless sufficiently shielded. The entire power grid would, in fact, fail and be extremely difficult to repair for a long, long time.
The result in such an attack on a modern society is total and instantaneous transportation into the Stone Age (more correctly, perhaps, the 18th Century, the agricultural age). But given that modern societies have no infrastructures in place which rely upon 18th Century technology, it might as well be the Stone Age. The ONLY defense against EMP attacks is to destroy the warhead in flight to destination, one of the reasons America has stubbornly tried to develop anti-ballistic missile systems since the time of Reagan and, truth be known, before.
But I note that wag-the-dog disinformation tends not to mention this factuality. Better if we think we are defenseless, where the only benefit to such a belief exists if one intends a false flag event.
Note: most of what is written from this point forward is covered, along with other related topics, in great detail in my four volume book set, Fatal Rebirth, including copies of the Constitutions mentioned below, with analysis. Want a free ebook of volume one? The book literally predicted 9-11 and resulting Middle East wars, and much, much more. It also predicted false flag attacks would be used to justify the Martial Law and subsequent events discussed herein, and what can be done about it.
What is a false flag event?
The nature of False Flag attacks
When a country wishes to start a war or enact some terribly repressive changes in political/governmental paradigms, it is historically common to stage a fake attack by some designated group or country as fall-guy. The people become enraged and demand retaliation, enabling a war, and wax super-patriotic and tolerant of any losses of freedoms or dramatic shifts in the structure of government to ‘better assure victory.’ Wag-the-dog rhetoric is required well before the event to paint the would-be source of the attack as a very dangerous opponent, vile and full of unchecked hatred — but the real purpose is to build fear and hatred of the ‘enemy.’
Internationally, the country employing false flag is seen as innocent victim, and may bash away at their new enemy freely, perhaps even recruiting ally nations. In some cases, even the people in the target country think their own country guilty as charged, which can foster an underground or more overt revolt which further helps assure victory. Only their leaders know the truth, but who will believe their claims?
Not very many beyond the most loyal, not many that count. Wag-the-dog efforts must, therefore, include ‘evidences’ after the fact, but one clue is that such evidences may seem just a little too convenient and quick to be located — such as the old reliable and oft used ‘found wallet’ belonging to the terrorits. Sheeple really are stupid to fall for that time and again. It has been used about six times, now.
All that is required is to stage a single, large-scale or politically sensitive event (e.g., assassination), or several smaller events which can be tied together at the desired time, all ‘evidence’ pointing to the same (false) source, also a job for the wag-the-dog folks. Hitler used the Reichstag Fire, burning of the beloved national library and many rare books, which was blamed on the Communists to justify changes in governmental structure which altered Germany from a Republic to a one-man show controlled by the fascist Nazi party. It launched the World down the path to WWII.
How can you spot false flag events?
Detecting false flag operations
The Truther movement can offer a great deal of evidence that Sept. 11 was such an operation, and in fact, as I will offer in another post (and detail in Fatal Rebirth), most, if not all, terrorism against America and elsewhere, is demonstrably false flag in nature. All that is needed to establish or illustrate a false flag event is to use one’s brain in review of the basic facts, which, of course, Sheeple don’t know how to do because they’ve been dumbed down by psyops TV programming technology, rich with wag-the-dog. False flags look like this:
a) there is an abundance of early, pre-event wag-the-dog negative media coverage painting the bad guys as evil and out of control, building them up as a huge threat — perhaps even a specific threat;
(e.g. pre 9-11, Osama bin Laden was not exactly a household word, not even amongst the many radical Muslim terror groups, but he had an excellent PR firm, called CIA, who was fond of trotting out videos of him making threats, and listing him as prime suspect in prior attacks — while a CIA station chief pays him a visit in a Saudi hospital.)
b) the event takes place and immediate evidence is produced;
(e.g., within mere hours of 9-11, a terrorist’s wallet was found ‘laying in the street amid debris’, and other evidence sufficient to allow President Bush to provide the full names of all 19 alleged participants.)
c) the official story and available facts conflict, often in spades;
(e.g. 9-11 hijack flight passengers used cell phones to call relatives; cell phones did not work in flight in those days)
d) it contains nonsensical or illogical, impossible facts, or ‘magic bullet’ explanations;
(e.g. the nose of the South Tower plane passes completely through the building in tact, but nothing larger than a shard is found of it on the ground — no plane blown up by missile, by bomb, or fuel tank explosion has ever had the nose section destroyed so utterly, large sections of it should have been found.)
e) there are signs of a cover up regarding evidence: vanishing, altering, or manufacturing of evidence;
(e.g. Flight 993 cratered into a field, again with only shards remaining, and yet the crater is shown by earlier satellite images to have existed as a geographic feature well before 9-11. No FAA investigations looking at serial numbers of parts, either.)
f) there is a wag-the-dog disinformation effort evident; a cover up;
(e.g., American media refused to report what international media had already reported: that the date of the Afghan invasion was set, and allies arranged for prior to the 9-11 event, and that the Defense Policy Board had presented a PowerPoint presentation at DOD which, in fact, laid out a series of domino wars and revolutions in the Middle East to put radical Muslims into power as puppet governments — the Hashemites. It also failed to tell you that the top two men in the new Afghani government are ex CIA/DOD employees who also worked with Chevron Oil with Condaleeza Rice trying to get the Taliban to agree to an oil/gas pipeline deal pre 9-11. This is meticulously detailed in Fatal Rebirth, which has over 1,500 footnotes.)
g) there is an attempt to discredit anyone who questions the official story, and offer lame excuses for conflicting facts;
(e.g., Truthers are constantly ridiculed and labeled in casual remarks by media and governmentals as mere ‘conspiracy theorists,’ called traitors, insane, and even terrorists — more wag-the-dog disinfo. In ‘debunking’ various Truther claims, almost every one of the 25 Rules of Disinformation have been employed.)
h) an official investigative body (i.e., special ‘independent’ prosecutor, Grand Jury, panel, commission) is established to ‘find the truth, no matter where it leads,’ but they selectively examine evidence, alter, vanish, or falsify evidence, and are generally made up of people who benefit;
(e.g., the 9-11 “Independent Commission” was entirely, save one, made up of Bush cronies, each of which had previously bailed him out or were in his debt. Some had ties to the very institutions and technologies used in the attacks. And as Truthers easily point out, their efforts were white wash in nature with respect to manipulating, hiding evidence. All but two of the 12 had intelligence community ties. See table of cronyism toward bottom of this Noilwar! page.)
i) there is evidence of prior knowledge and/or media complicity.
(e.g., the Pentagon was making plans for emergency response in event of aircraft crashing into the Pentagon — photo of models planes and firetrucks and Pentagon with military brass in Fatal Rebirth… – or – BBC news in a live report announced that Building 7 of the WTC collapsed while it was still standing in the background… and then it collapsed on air, later, causing the Reporter to ad, “Oh, there it goes, now.” Google removes the vid, and BBC claims they lost the footage.)
Collectively, even individually, such wag-the-dog tactics are nothing more than a cover up. Whenever a cover up is in play, it is proof of a conspiracy, because if for no other reason, than to effect a cover up REQUIRES a conspiracy of players. Further, as there is no reason for a cover up unless there is an original criminal act, that, too, is part of the conspiracy.
Why would happen in an EMP attack?
What is the value in an EMP attack to Globalists here, and abroad?
As I have written of in many prior posts, there is an existing intent, in response to a perceived cause, to declare Martial Law and suspend the Constitution, and establish a new military government. This is out of the mouth of one of the nation’s top military leaders. You can bet that door-to-door searches and seizure of guns will follow, as was done in Katrina.
We next start to see mainstream media actually cover the fact that the military is practicing raids on American cities, in some cases with helicopter gattling guns blazing, and troops repelling, doors being blown off of buildings. They have never covered such events this way, before, indirectly indicating it is wag-the-dog psyops, again prepping citizens for future events. But of late, the quantity and intensity of such violations of Posse Comitatus has skyrocketed to include many major cities, indicating something big is on the horizon.
There is further the general intent by Globalists to establish a new Constitution for the NewStates of America, and the World Constitution, both documents already written (and both reproduced and analyzed in Fatal Rebirth), which makes rights more like a privileges, and provides an endless array of reasons, methods, and governmental authorities who can rescind them at any time, even retroactively, for individuals, groups, or all citizens.
Moreover, it enables the formation of the North American Union, and makes easier the acceptance of U.N. Treaties without ‘violation’ of ‘national sovereignty’ or the (new) Constitution. End Game ensues; the one-World government is formed (the World Constitution is ratified (already ratified in some countries), and the Antichrist can be seated.
Can you predict a false flag attack?
What are the signs EMP false flag may be afoot?
To answer this, we go back to our signs from above. I suspect that CIA types have infiltrated the N. Korean government to act as agent provocateurs assigned to stir up the young leader to his current state of rhetoric and provocative acts. The true likelihood of them launching an attack is nill, as indicated, below. But for a false flag event to enjoy any plausibility, there must be a seed basis for blaming another party.
a) there is an abundance of early wag-the-dog negative media coverage painting the bad guys as evil and out of control, building them up as a huge threat — perhaps even a specific threat;
(N. K. stories started weeks ago, and then suddenly the web was awash with EMP stories, both mainstream and Web.)
b) the event takes place;
c) the official story and available facts conflict, often in spades;
(Such conflicts are already known: an EMP attack requires an intercontinental ballistic missile and a large hydrogen bomb, both technologies at much lower states of development in N. Korea than required for the job — according to an insider analysts who should know — but who cannot say so publicly because it would blow his security clearance.)
d) it contains nonsensical or illogical, impossible facts, or ‘magic bullet’ explanations;
(This would only become apparent after the event, explanations forced to address any major holes in the official story — they might claim it was a high-altitude weather ballon-delivered device that escaped detection.)
e) there are signs of a cover up regarding evidence: vanishing, altering, or manufacturing of evidence;
(also post event)
f) there is a wag-the-dog disinformation effort evident;
(We have a taste: there are currently nearly 900 thousand Web articles forecasting EMP attack on the U.S. by N. Korea, some of which are mainstream, but most of which stem from a select few sources associated with government disinfo sources such as Sorcha Faal, who is often used by DHS and State Department. These, in turn, are replicated and virally spread as if trustworthy, typically enlisting the aid of those conspiracy theorists prone to not well checking sources or examining the basic facts; fear mongering.)
g) there is an attempt to discredit anyone who questions the official story;
(Currently, there is hardly anyone in this category to discredit. I knew of only know seven of us when writing this, who consider EMP a false flag scenario. But we are ahead of the curve: this is normally a post event phenomenon, and until and unless naysayers abound or have a major following and are widely believed, there is no reason to bother labeling us insane, etc. Worse, an EMP event negates the need as there will be no media/Web platform for dissenting views and swaying anyone in the first place.)
h) An official investigation;
(Also a post event item, and again in this case, no need, as there is no way to get the ‘report’ out to anyone.)
i) prior knowledge.
(also post event.)
I will add one more thing, also from my reluctant resource. Any such actual detonation of a device will leave a fingerprint. Nuclear devices put out radiation signatures which can identify the maker of the device. In like manner, it is impossible to launch a missile from that part of the World without it being detected, and tracked. Indeed, a false flag missile would be detected. Many countries around the globe have the technical ability to monitor these fingerprints.
However, ONLY those in power (and their agents who run the equipment employed) in those countries are the ones who would know the truth. You would think it represents a de facto attack on their country to one degree or another, given the release of radiation. Regardless, given that most such countries are Globalist controlled (e.g., the European Community) or otherwise U.S. allies, even to include Russia — you cannot depend on their honesty.
They will likely say ‘Yup, N. Korea did it!’ Others, like China, may say ‘Not possible! It was a U.S. device.’ The number and nature of opposing nations will determine the degree of plausible deniability at home and abroad. A few dissenting nations known to be less than friendly toward America will be dismissed easily. But if any neutral (watch South America) countries concur, then you will see a magic bullet explantion offered to counter; scientific mumbo jumbo to discredit or counter such claims. But here, no one will hear any of those arguments, so who cares what others are saying?
How to prepare for EMP attack?
What can you do to preempt, or prepare?
Preempting such a false flag event is easy: just spread the word. Share this post, replicate it, make it viral, and so forth. Kick Sheeple in the butt and wake them up, teach them to use their brain, and make disciple activist of them if you can. If we can get 200,000 posts revealing it a false flag out there, they are less likely to feel safe in fostering it.
Preparation is easy enough, but tactically difficult in many cases, and costly. There are several areas of concern, most of which can be usefully addressed with some effort and or money, but some defy good solution for many of us:
There will be total loss of electrical power, and it will be long-term. A good portable gasoline-driven generator will become worth its weight in Gold. But because gas stations will not be able to pump gas until they can establish their own generators, you will also need a goodly supply. Because it is not particularly safe to store a lot of gasoline in the garage, an Oil furnace tank becomes the better solution. The generator should be stored in a well shielded location, or covered with a metallic ‘blanket,’ or grounded mesh. You should have spare fuses and circuit breakers for every such item in your home.
There will be serious interruptions in the flow of food, water, and all goods. Even when goods can be found, most key items will be seized by FEMA. The price will be sky high an anything you can find as it will all revert to black markets, though FEMA and authorities will eventually use deadly force to attempt remedy. The first interruption could last for many months. So a good Emergency Kit of critical items and supplies is very valuable. The ability to quickly become self reliant (e.g., like a farmer) may make a significant difference in the ability to long survive. Rainwater collection may be appropriate, and despite alarmist concerns about radiation levels, it will remain safe. Regardless, plan on distilling all water prior to consumption, because water can only be stored for so long before things tend to start growing in the containers.
Transportation will be almost non existent. Any vehicle in operation at the time of the attack, and many newer (computerized) vehicles not in operation may no longer run, requiring replacement of many components before they will run (generators, alternators, various computer components, sensors, controls, switches, etc.) So now you know what spare parts to stockpile in a heavily shielded storage. Those few that do run will quickly become highly sought targets for theft. Vehicle security will take on a whole new definition and importance.
No single existing security scheme will seem adequate, and one may need to be willing to run over or shoot people trying to hijack you when traveling. Having at least one vehicle at all times not in operation, and of older technology with lots of spare parts in hand. Don’t forget windshield wiper and heater fan motors, and multiple sets of spare tires, as well, because tires will become targets for disabling a working vehicle. Have bicycles, scooters, and other alternatives available, too — but travel only in the case of dire need, or be prepared to defend yourself in the effort.
Computers, radio gear, and other digital systems not shielded from EMP are at significant risk. Those in operation will surely die, those not in operation and not well shielded may die. Walkie talkies, short wave radios, and computers, digital cameras, infrared goggles, and other critical devices should be placed in an Emergency Kit and the kit should be well shielded. A Farady cage (e.g., chicken coup wire mesh, or better), with a grounding wire, is best, but even just wrapping in aluminum foil may be sufficient, especially if stored beneath layers of buildig structure, such as in a basement. Of course, a TON of rechargeable batteries are in order with rechargers for use with the gas generator.
There will be rampant criminality: those caught without preparation will not see relief from FEMA or the Military early enough to prevent a ‘survival of the fittest’ mentality from taking over. If you have food, water, a generator, or a working vehicle, YOU BECOME A TARGET. You will need to be well armed and have security provisions in place against assaults on your home or your person when you travel. It will be in the best interests of the military to let things go crazy… to let people use up their ammunition and grow desperate for survival goods so that when they do come to help, we will be willing to cooperate in any way they demand, including forfeiture of our guns and other properties, accepting a new Constitution, and so forth.
No immediate help, not even from the military. Even if they wanted to help, they will be quite preoccupied in a war with N. Korea, and likely, Red China. We will hear only rumors, of course, because radio, TV, and the WWW will be none existent. That’s why helping to establish Web Walker, now NNN OSP (the Nodular Netizen Network Open Source Project — a 100% citizen-owned and operated wireless network which is operable even in disaster) may be of great value. NNN will also be useful against Web 2.0. When Internet services are reestablished (outside of Web Walker), they will be VERY government friendly; no politically correct sites will be found, only government approved information and globalist firms, and all Web data will be transparent and readable by the intelligence agencies at will. Support NNN OSP!
This is a bleak picture. Ask yourself, if FEMA was really there to prevent disaster and help in times of disaster, would there not be some such advice as this coming from them? No. The Globalists need a catalyst to propel them into power. It is not in their best interests to protect you from such chaos, or warn you of the risks and protections you can effect yourself.
They need to destroy the country if they are to advance to the next stage… and to insure you are without guns when they do — or at least out of ammunition. I hope you noticed there is a shortage of ammunition right now, in part because DHS has ordered 1.4 billion rounds in Satanic quantities for (?).
- FBI Created 17 False Flag Terrorist Attacks (adask.wordpress.com)
- The Art of Catching Government False Flags in Real Time (activistpost.com)
Self Defense is the right of all Men regardless of any Law. When an illegal law deems to both make redress and self defense illegal, many will see it as time for a revolution. The Monsanto are coming. To Arms! To Arms! by H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included. Will Monsanto GMO spark a revolution?
Reading this post and its links, you will learn…• Things so terrible that I will not bullet list them, lest you flee this page in fear of dark things; • Things which may mean life or death to you, your family, and America as you know it; • Things which, in the best of outcomes will undoubtedly mean thousands of lives taken by violence and/or a biowar intending depopulation. Why does Monsanto have its own Police Force?
Many of us ‘prepers’ and ‘conspiracy buffs’ have warned for some time that government wants a showdown with YOU in their gunsights. Now we start to see proof there is a price to be paid for failing to heed, for those not prepared to face what apathy and inaction leads us all toward at speed. Got Bushmaster? No? Gave it up to Feinstan, Bloomberg, Sorento, et. al? Better put your affairs in order, then.
This latest tyrannical atrocity, The Farmer Assurance Provision Act of 2013, also dubbed the Monsanto Protection Act to reflect fascist provisions burried deep within it, is one line in the sand many will not likely let be crossed without a gunfight, or similar violence. Understand this: a fuse has been lit, and while the length of its burn is not known, the bang at the end could very well turn into a repeat of 1776.
Frankly, I don’t know whether to pray it does, or does not; it’s THAT SERIOUS a line in the sand, to me.
But it is not my opinion which matters as much as does YOURS. But do you even have one? If you do not, or don’t even know of and understand the nature of the threat from GMO corn, soy, and other bioengineered seed programs, and matters closely related, you will be happy to know Mother nature has a special place for you. It is called survival of the fittest, and destruction of the weakest, you being the latter in the equation; those who die from eating genocidal foods, a very real possibility in almost any proper review of facts.
We are talking about crops genetically modified to have built-in pesticide powers based on Monsanto’s Roundup, a known poisonous substance, and other ‘properties’ which make it even more dangerous. The Act gives Monsanto the power of life and death decisions with zero responsibility (impunity), and takes away the ONE THING which is designed by our Forefathers to PREVENT armed revolution; the means of the People to seek redress of grievances with government through the courts.
OK, then, if that’s how they want it… get ready to ‘pass the ammunition,’ instead.
Because why? Because there is so much resistance to labeling such foods at every turn, and because they are used to feed animals you eat in other foods, there is no way currently to avoid eating them, or know if you are or are not, save perhaps eating only organic produce. Even then, contamination is not impossible. The only solution left would be to stop Monsanto and friends DEAD in their tracks, and unfortunately, it appears they wish for force matters such that the only option available for us to do so may be to seek it in literal terms.
We would rather it be figurative. But if YOU otherwise make no collective effort to stop them peacefully, you will deserve your fate for being a dumbed-downed mind-controlled Sheeple. Your apathy and non participation will be causal to any escalation toward violence forced on those unable to make headway peacefully. Their failure will be because of your lack of support.
If you don’t get that, stop reading this until you’ve visited Oz to find some brain matter to replace the straw in your head. It’s all over the Internet, and from many, many viable sources (even the disinformation deliberately put out as a straw man tactic is based on ‘kernels’ of fearsome truth — and efforts to debunk this particular ‘conspiracy theory’ themselves lack credibility and tend to follow the 25 Rules of Disinformation, such as employing straw men, vanishing evidence, and so forth).
Is self defense justified if GMO threatens the lives of you and your family?
Things to know for your survival:
- What Farmers have to say of their general concerns;
- What Organic Farmers say about GMO contaminating non GMO crops, 270,000 sue Monanto;
- Why 5 million famers are suing Monsanto over GMO for monopolistic practices;
- Why 17,000 Famers in India committed suicide over GMO (due those practices);
- How Monsanto in turn sues farmers when crops are contaminated with GMO, claiming ‘patent infringement;’
- What Monsanto is doing to establish a private police force to use against farmers;
- Why Monsanto spent $4.2 Million to defeat a GM food labeling law in just ONE State;
- What Lawyers have to say about why the legislation to protect Monsanto from lawsuits is needed;
- What Third-World nations have to say about GMO as a threat to their national security;
- What Huff Post has to say about GMO causing infertility and infant mortality;
- What UK news is saying about GMO causing cancers and birth defects;
- German Law Suite for GMO corn killing 65 Cows, causing infertility in others;
- About White House interference through Justice Department to prevent Monsanto investigation;
- On Sorento’s incestuous appointment of Monsanto Chief to Senior Advisor to the FDA, the only agency with authority over Monsanto;
- On Supreme Court Justice Clarence Thomas’ rise to absolute power after four years as Monsanto attorney;
- On Monsanto Employees in Congress and elsewhere in government;
- On Monsanto Protection Act introduced by Monsanto pocket Congressman, worded by Monsanto advisors;
- What Monsanto says internally about liability;
- Peaceful Protest Groups like OccupyMonsanto are undoubtedly now or soon to be labeled ‘terrorists.’
- OccupyMonsanto leadership is arrested at the White House though there on legitimate business and behaving according to protocol;
GMO is tied to the Doomsday Vault, Agenda 21, Codex Alimentarius, depopulation
Doomsday Vault, Agenda 21, Codex Alimentarius, = depopulation
If the above still does not convince you, ask yourself why GMO crop makers, Bill Gates, and Rockefeller have funded, along with Bilderberger leaders, a ‘Doomsday Seed Vault’ protected by the highest of security on a private Island in frozen wastelands owned by a Bilderberger. There, non GMO seeds are being stored for some future use, accessible ONLY by the Globalist Elite — while at the same time we see from the above that these same people are taking steps to insure non GMO seed cannot even be purchased, much less used, without violating law. We are talking about billionaires who have private chefs, often having them travel with them on trips, and NEVER eat anything we eat, except on a rare lark.
Part of that story requires us to add to this complex mix of topics some equally scary things outside of, but tangent to GMO: Agenda 21 and Codex Alimentarius, for instance, and the concept of depopulation, long a known goal of Globalists to reduce us to a half million souls. Consider all these things collectively, and you realize that violence may be the only recourse, sooner or later, unless we can unify and find a quick way to avoid it. But the fuse, having been lit, makes sooner more urgent, and later less tenable.
Now, Sorento and Congress show their true colors as traitors to all Americans and the American way of life… even life itself, in fact, the hallmark of Satanic thinking in the Illuminati Plan to create a one-World government that they might seat the Antichrist. It’s O.K. if you don’t want to subscribe to that ‘theory,’ but I’ve written books with over 1,500 footnotes to make that very case.
But it is just a Congressional Bill we are talking about, and, after all, Congressmen will simply excuse themselves, saying they ‘didn’t read the Bill’ before they voted it. Sorry, but if things erupt with violence (and to a lesser degree if it does not), they will still be held accountable if they voted for it, as will the Great Pretender who signed it. Consider the full measure of risk they undertake by their crime against humanity, which is also treasonous. There can be no greater penalty than those common in such crimes, especially if during a war (revolution).
And for the matter, therein (Sorento’s signature) lies the problem for Monsanto. Even if Monsanto is not razed to the ground by angry citizens… even if their poisonous ‘product,’ which is nothing more than a tool designed to give them a global monopoly on farming and to depopulate the World with a soft kill is not destroyed in grain stores and warehouses before it is planted… even if they survive attacks against them and their evil seed… the Act does not afford the protection they presume by its signing into ‘law’. It is a fictional belief… not Law at all, but a fictional ‘law’ which is at best temporarily useful while government pretends it legitimate.
Any Bill signed by Mr. Sorento under a false identity will eventually be ruled null and void as will be all ‘law’ of the last four plus years of his charade; his pretense cannot long last, even if it requires a number of years after his final term in office expires to force the Courts to admit it. He has no power, and neither does anything he signs. There has been zero Law enacted since he took Office. He, and all who helped in the charade will be jailed or worse, and of no power whatsoever to help Monsanto (Oh, happy day!)
There will be no protections if the ‘law’ thought affording them was found illegal. Nor if collusion between Monsanto and politicians writing the Bill, and the White House are established as criminal in nature (as is already seeming to be the case in the links above). Even if the Courts were so foolish as to overlook such reasons for nullification, perhaps due to bribes or threats, or the influence of Clarence Thomas, the court of Public Opinion and a little thing called self defense will still afford a final ruling which will be enforced.
Can self defense ever be peaceful?
PEOPLE HAVE THE RIGHT TO DEFEND THEMSELVES FROM HARM
This ACT, I fear, is the final spark which has at last lit a fuse which cannot easily be put out; a fuse leading to armed insurrection. I’ve tried to warn government and citizens in my earlier posts that every time politicians elect a criminal or unconstitutional choice, they put a gun to their own heads in a game of Russian Roulette, a game which decides if armed revolt breaks out.
Given the levels of frustration that I feel in this matter, I can only imagine how famers feel, and picture them raiding grain stores and destroying Monsanto product wholesale, if not marching on Monsanto properties with guns and torches to level them and drag corporate bosses into the streets. I fear hanging in effigy may not be seen sufficient. Hopefully I am wrong, and mere alarmist. But if I thought it would actually end the matter usefully, I’d be tempted myself. But would it be useful, really?
I wonder. I wonder because I also fear this is exactly the situation intended by Globalist leaders who seem to control our government. I fear it why DHS has placed bid requests for 1.4 billion rounds of munitions, including 9 million sniper rounds, none of it for normal military operations. In fact, I fear it related to a long list of other curious purchases and moves by government over the last few years, especially those since Sorento took office.
They collectively point to an intent to light such a fuse, I fear. Such pointers include, for instance, a steady stream of military mock raids on American cities with armed helicopters discharging gattling guns, soldiers repelling from or landed from the choppers to blow the doors off of buildings and engage in combat with ‘resistance,’ of some imagined sort.
Who will stop GMO crops from killing you or your family?
WE ARE THAT RESISTANCE
Confrontation is exactly what I and many others have feared all along was intended at some point in the future, and now, with the Act — it seems absolutely unavoidable and on the near horizon. Now that they see they cannot arrange to ban guns which approximate military grade, thereby effecting a de facto gun seizure, indications are now that they are going to instead foment a wave of violence in the heartlands and cities to justify labeling gun owners as a threat to national security, and come after them by force.
I even worry they may even foment that violence themselves and blame it on us (false flag operations) to justify their heavy hand to passive onlookers, the Sheeple at large. For this Act will undoubtedly result in such outrage and frustration as to move those most concerned to violence, even if it takes some entrapment or priming of the pump of anger and concern. If not shooting, then arson or bombing, from which must eventually evolve shooting by on side or the other. The fuse has been lit.
While there are only a few million rural persons who’s livelihoods still depend on farming success, almost all are quite well armed. There are tens of millions more who truly understand GMA enough to side with Farmers, a large number of them also armed, and some number of them are surely angry enough to say, “Pass the ammunition!”
But even if only 1% of farmers dared take a militant stand and resist with forceful action to protect their way of life, and the lives of all us… to save us from domination and ruination by Monsanto and a truly insane and clearly fascist government (defined, in part, as a government which makes oppressive laws to the benefit of corporate profits and the power elite to the detriment of the citizens)… even 1/tenth that number is more than enough people to start a full-scale armed revolution (statistically proven through history).
The mechanics of revolution, as I have pointed out in above linked post, clearly require only two things: a handful of angry people willing to do something which cannot be ignored by government, something which is seen to strike a blow for freedom; and a government willing to use a heavy hand to quash them for their trouble. In every instance, instead of quashing them, they make martyrs and fuel the anger in those previously asleep in their inaction. As result, those who survived the start of matters are joined by many millions more, and a full-scale revolution is born. “Pass the ammunition!”
This time, I fear government has indeed gone to far, and I urge everyone who is angered and moved to action to please stop, think, and act responsibly. Do not react carelessly out of emotion. Violence on your part is likely expected, and desired. Do not give in. Instead, organize and resist in every legal way you can muster (there are ways to do that). As part of the protest, I beg you make clear, as this post attempts to warn, that escalation will be the consequence of inaction by government and the criminal corporations.
They must be shown we will not let them continue to consider humans as mere objects they may move about on a financial and political chessboards, and knock off the board as pawns to suffer death or a life of misery or servitude. We will not idly stand by and let them win the game in which only they, Globalists all, deem to be onlyplayers with any chance at winning. We pawns must become our own self-guided army, and change the rule of the game so that we… we mere avatars of their avarice, are the ones who win.
How can GMO crops be stopped?
WE DARE NOT LET THE GAME CONTINUE AS IS
The fuse is lit. Who will help extinguish it by right action? Who will fan it to burn faster? Only YOU can decide. YOU are what you’ve been waiting for. Either way, I’m looking forward to ruining their game. But I can do nothing without YOU, be it words or bullets that eventually do the talking.
Enough talking. It’s all made me hungry. Let’s get something to eat…
On second thought, I’m not so sure there’s anything good to eat any more. Perhaps I’ll just share this post with some friends, instead, and start a dialog about what we might be able to do change that little problem.
What can we do to stop Monsanto madness?\\\\\\\\\\\
- Monsanto Required (Nutrition Optional) (factgammon.wordpress.com)
- Top 10 excuses for Obama signing the Monsanto Protection Act (thedailysheeple.com)
- Monsanto = GMO? ~ Oh HELL No! (conservativeread.com)
Whenever you get a magic bullet explanation, you know there is a cover up. A cover up is proof of a conspiracy; a hidden agenda or dark plot. Why is that so hard for most of us to grasp that we accept without question the claim that it is, instead, mere conspiracy theory?by H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included. What is a magic bullet explanation? What you will learn reading this post: • Magic Bullet explanations are commonly used as a cover up tool; • Such explanations do not always involve bullets, but use the same methodology; • To make explanations stick, it is necessary for media or government to label any who question as ‘conspiracy theorists;’ • Magic bullets, when unquestioned and excused by labeling, are themselves proof a conspiracy exists; • There are many dark bumps-in-the-night in our recent history which so illustrate (several included).
Despite the fact that there is a dramatic and continual reduction in gun violence in America over many decades… part of the national experience involves an increase in traumatic mass shootings which are seemingly random and without cause… and we have media to point out every shooting event as though it somehow relates directly to the mass shooting madness, presumably in hopes we will say, ‘Please, won’t someone take our guns away?’
If everything were as it is presented on the surface, I might not be so upset with those who so conclude. The idiocy of a Piers Morgan and others suffering from Feinsteinian mental incapacitation would seem tolerable and understandable. But is everything as it is presented on the surface? Cleary it is not, if you pay the least bit of attention and are not dumbed down by TV Psyops News technology. I speak of magic bullets being used in the guns they want to ban, and similar use of failed logic in ‘factual presentations’.
I’m talking about JFK assassination quality explanations and related tactics employed in cover ups, even beyond shooting events.
Where do we get the expression, “magic bullet”?
What is a Magic Bullet?
The first Magic Bullet, the definitive illustration, arose out of the conspiracy to conceal the truth behind the murder of President, John Kennedy. In review, the Warren Commission investigating the matter had a big problem in two parts. The first was, the number of shots fired in a narrow interval of time from an obsolete bolt-action rifle in poor repair could not possibly account for the number of wounds of the two men the shots struck — unless there were two or more shooters… or unless there was some magic involved. FBI’s best sharpshooters could not duplicate the number of shots and hits fired in the space of time allotted and came nowhere close to the magical performance alleged of the designated patsy, Lee Harvy Oswald.
The second problem was that they dare not rule a conspiracy of multiple shooters.
In fact, Supreme Court Justice, Earl Warren had privately been both warned and threatened by President Lyndon Johnson that it MUST be ruled a ‘lone gunman,’ because there was a significant fear that the truth would require the U.S. go to war with either Cuba and/or Russia, as there was anecdotal (staged) evidence pointing in those directions. Too, there were early conspiracy theories evolving putting the blame on, variously, the Department of Defense, the CIA, and the Mob. But the later (Mob) included ties yet again to the former (CIA and elements of Defense), and so there could certainly be no conspiracy allowed if one were to skillfully avoid detection of skeletons in the national closet.
In the end, the conspiracy theorists would be proven right, of course — but even today, no one in media or government will so admit. It HAS been proven by sworn courtroom testimony of CIA agents involved (Marita Lorenz, E. Howard Hunt; Hunt vs. Liberty Lobby), and more recently, a Mob shooter involved , and additional evidences over time, all of which has been addressed in earlier blog posts and most of which was covered in detail in my book set, Fatal Rebirth. The Warren Commission had Marita’s testimony, but chose to ignore it.
The solution to prevent any such discovery was, like the problem, in two main parts, plus a third supplemental component. The first was a lie, and the second was to seal the records to conceal the lie. The lie was in the form of a bullet which defied multiple laws of physics and over 100 years of ballistics forensic science. It was first dubbed the ‘Magic Bullet,’ by New Orleans District Attorney, Jim Garrison in the trial for murder of JFK of CIA operative, Clay Bertrand Shaw… who indeed also had significant ties to the military and the Mob, not to mention an international assassination ring using both military and CIA resources (what Lyndon Johnson later called ‘Murder Inc.’), to include persons involved in the Dallas shooting.
The Magic Bullet did the impossible: it inflicted two non-fatal wounds in Kennedy (entrance/exit), and four wounds in Texas Governor, John Connally, hardly any two of which lay in a straight path with a former point of origin. It traversed through 15 layers of clothing as well as the knot in the President’s tie (say, another 8 dense layers), 7 layers of skin, 15 inches of body tissue, destroyed 4 inches of a rib bone, shattered a radius bone, and came to rest in the Governor’s thigh, whereupon it elected to fall out onto his stretcher so it could be discovered at Parkland Hospital.
There it was found in near pristine condition with no signs whatsoever of having struck anything other than, say, a swimming pool filled with Jello. Such a bullet, copper jacketed, should have not only been significantly deformed by impact with the bodies, but also, shattered or splintered by the bones. But this was indeed a bullet with magical properties…
To have done as claimed, the bullet would have had to changed directions in mid air multiple times, and, according to Garrison, paused briefly in flight if to match the wound reactions in Conally seen in the Zapruder film. You can see why Garrison called it a magic bullet. So problematic was the conclusion, that the Warren Commission arranged for (bought) the testimony of a physics professor that all of the above was possible through a series of incredulous existential explanations using scientific theory (techno-babble). The cover up was begun, and much of America knew it, but could do nothing about it.
And if that were not bad enough… to make the Magic Bullet theory stick, Walter Cronkite, ex military intelligence turned CBS news anchor, thought to be acting under CIA’s Operation Mockingbird (media infiltration and manipulation), effected the supplemental component and coined the term: ‘Conspiracy Theorist.’ This he used skillfully to make anyone who dared question the Warren Commission’s findings seem ‘crazy,’ and ‘unpatriotic.’ That tactic (labeling) is one of the 25 Rules of disinformation, and dovetails nicely with the Official Formula for Conspiracy Coverups. It was so successful that it is still used, today, and in Spades.
Who uses magic bullet explanations, and why?
More Magic Bullets…
Not all magic bullet explanations are directly tied to shooting bullets, though some, as used in Sandy Hook and Aurora, do — as we see, below. They can instead be any key evidencial matter which simply does not make sense, but which is fully embraced and remains unquestioned by government and media, as if nothing were amiss. So let us go down the Rabbit Hole of our more immediate history and find some more magic bullets.
Oklahoma City domestic
state sponsored (false flag) home-grown terrorist bombing: there are many magic bullet explanations we might discuss regarding the devastating blast at the Murrah Building that took 168 lives, including 19 young children at a day care facility on site. The most glaring is the nature of the bomb, itself. The official explanation is the use of a traditional home-made ANSFO (oil and fertilizer) explosive. The problem with that explanation is that the blast damage was such that ANSFO was impossible, a matter which forced FBI to continually upgrade the estimated size of (number of containers) the explosives used until they were forced to stop because they would exceed the capacity of the truck used.
The real problem was that the forensic evidence did not quite properly match ANSFO with respect to explosive residue, and, in point of fact, included pointers to a new type of explosive developed at a CIA proprietary which had earlier reported the equipment used to make the devices as having been ‘stolen.’ Additionally, the specific damage to the structure and nearby objects were unique and in opposition to the nature of the relatively low pressure blast waves associated with ANSFO, but sympathetic to the high pressure blast waves created by the CIA device, called METC, which produced forces of nuclear blast caliber on a small scale using an incredibly small bomb construct.
This is fully documented at my Web site, which, unfortunately, the IRS has effectively shut down as I can no longer afford to operate Web sites pending payment of an unexpected tax claim arising out of loosing our home in the Mortgage crunch (contributions via paypal using proparanoid at century link net would help get me back online). But I was not alone in this realization.
Brigadere General, Ben Partin, Ret, was the military’s foremost authority on explosives, and he essentially said much the same thing, and so, while I can’t link to my own Web site, you can hear him explain it in his own words, here. I’d rather you go to my Web site because it additionally contains condemning evidence that the bomb factory, complete with the appropriate Ryder truck used to deliver and detonate the bomb, had been photographed from the air by a hang glider pilot. He appears to have been shot down for the effort… at a secret facility constructed by the National Guard and protected on the roads by Marines with machine gun-mounted jeeps and in the surrounding woods by Men in Black — identically dressed in suits, sunglasses, and sporting shoulder-holstered weapons. You know… your typical National Guard facility built in a STATE PARK, complete with a cover story they were ‘testing Humvees’.
True to the above magic bullet explanation in multiple parts, even Partin was labeled a mere ‘conspiracy theorist,’ despite his credentials — or media failed to tell you he even existed. However, both he and I, among others, were invited by Willis Carto, former Editor of The Spotlight, a defunct Washington, D.C. newspaper — to participate in a round table review of OKC and Flight 800. That event, which I was unable to attend, also failed to make the news despite Carto’s best efforts to insure it.
Robert Kennedy’s murder by
CIA’s Thane Ceasar and patsy Sirhan Sirhan: OK, just because a CIA mind control shrink was murdered after bragging to a prostitute that he programmed Sirhan… and because the woman in the Polka Dot dress that shouted ‘We killed Kennedy!’ in glee was seen with Sirhan, earlier… and because the cop in command on the radio that day told the cop that overheard the woman not to investigate because ‘We don’t want any conspiracy theories,’ was himself ex CIA… or because the man that ordered all RFK murder evidence relating to bullets fired destroyed was ex CIA, too…
That does not mean CIA had anything to do with RFK’s death, unless you are a wild conspiracy theorist. But there were some actual magic bullets to deal with, like the ones found in the woodwork destroyed as evidence, which exceeded the number of bullets in Sirhan’s gun… and the fact that the only shots which hit RFK were from immediately behind and fired upward (Sirhan was an appreciable distance in front of Kennedy). These bullets sound pretty magical, to me.
Thane Ceasar, an armed security guard on loan from a CIA proprietary was the person standing immediately behind Robert, that day, but of course, Police never thought to check his gun, lest THEY become conspiracy theorists. Amen.
The Vince Foster
murder suicide: A key staff member of the Bill Clinton Whitehouse, Vince Foster, was found dead in a park at a precise location known in some circles for frequent use by spys in clandestine meets (e.g., a KGB meet with CIA). There was a conspiracy coverup at the time sus