Category Archives: Government
Radio Frequencies and Electromatic Fields can be weaponized for use against ANYONE. With the advent of 5G and the Internet of (smart) Things, almost EVERYONE should worry about RF/EMF effects. THIS MEANS YOU!
Dateline, Oct 30, 2020, from an undisclosed location not too far from wrong. copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Hard rocks and harder places…
This is an extremely broad topic which cannot be well discussed here, beyond some basic advice. The problem for TIs is uniquely different from common uses of Technical Security Countermeasures (TSCM) equipment and services. So one problem right off the bat is obtaining useful help (good luck with that). This leads to a do-it-yourself (DIY) alternative by use of low-cost EMF meters, and possibly shielding or other tactical solutions. As result, most pros are ex mil-intel types, which creates a trust barrier with most of the TI community.
Not that it matters: a TI simply cannot afford the cost of their services. Professional TSCM equipment is extremely expensive (a pro might have a million dollars invested) and extremely complex, and requires a lot of experience and the kind of training offered in the military and intelligence communities. So, between trust and cost, and unique needs, a TIs find themselves between a proverbial rock, and hard place, a DIY nightmare. That’s not all.
That help issue trickles down the food chain to the makers and sellers of lower cost solutions, such as EMF meters, which are little brothers to more sophisticated and costly signal analyzers used by pros. Such firms do not and will not support DIY use of their products for TI related needs, and indeed, many pros will not offer their services, either because they fear running afoul with some government operation — or they don’t believe in the whole targeting notion and presume the client mentally ill.
It is possible to hire a PI or some individual who’s gone into business using low cost gear to do ‘mini’ TSCM sweeps, some of whom are aware of and will cater to TI needs, but many of these are charlatans, especially true in those who specialize in select TI issues, such as ‘finding implants.’ Be wary of anyone charging for implant detection using small EMF meters, esp. if charging by the implant found: with many meters, it is possible to cause a false read by simply moving a finger of the hand holding the device toward the front of the meter… for another $50 ‘find.’ “Would you like me to continue searching?”
It would therefore be better for the TI to do their own searches, though even with a decent EMF meter, the odds of finding an implant are extremely nil. EMF meters detect Radio Frequency (RF) and Electro-Magnetic Fields (EMF), which are radiated energy/field readings not given off by implants, as a rule. Most implants receive such signals, and those that transmit them tend to do so by remote command. Even then, it is very briefly, rather than being ‘on’ all the time — defying meter detection.
While there may be exceptions, the type of signal they use is likely to be lost amid the ambient signals present already (i.e., wifi, broadcast radio/TV, cellular, AC wiring, power
lines, amplifiers, etc.). An EMF meter displays the sum total of all such data, and can only identify a source by virtue of increasing in signal strength as it nears the signal source. An implant signal is rather weak. But, implants aside, there are other valuable uses for such a meter, if you have a decent one.
Choosing an EMF meter
First, know that cell phone apps that offer EMF readings are not reading the right kind of EMF. They are not reading any signal which is involved with targeting, but instead, the Earth’s own magnetic field, using sensors in the phone designed for game play to know changes in the phones relative position to prior positions (i.e., steering a car in a driving/racing game). For like cause, avoid ‘Natural’ EMF meters or EMF meters that do not include RF measurement, as they are also reading the Earth, only.
So what you really want is an actual RF/EMF meter. And not just any such meter, but one which is directional in nature when reading RF, and not omnidirectional. AC Magnetic Field readings will be omnidirectional, in virtually any meter, but if the RF sensing is directional, that will not impede usefulness of omnidirectional EMF readings. RF, on the other hand, is barely useful if only omnidirectional. That said, some omnidirectional meters will allow you to install and optional directional antenna… for added cost. One way or another, you want directional.
The type of antenna system described by the maker in specifications or manuals won’t necessarily tell you if it is omnidirectional or directional, they prefer a technical description of the physical antenna design (engineer speak). Omnidirectional (least useful for a TI) are typically described as
ISOTROPIC or TRIAXIAL ( 3– AXIS), and are often visually discernible by a large ball or spherical object at their top. Sometimes it is internal and, therefore, smaller and unseen. That limits the sensitivity, compared to an external. Directional RF meters might have no antenna, a rod antenna (like old brick cell phones), a ‘wand’ at the end of a cable, or a triangular antenna (very useful with distant sources). So, any other technical description other than Isotropic or Triaxial, is good.
My base-line low-cost meter of choice is the TriField TF-2, which I actually used to sell with some value-added features for TI use. That included a user manuals I wrote for such use for the Trifield, and the Micro Alert audible meter (a good companion product). These manuals, along with a copy of this post and many others, are part of my TI Helps Kit available on request to proparanoidgroup at gmail com. I used to charge $10 for the manuals, but the Kit is free, though I do encourage a donation to the Free Will Society to aid severely impacted stalking victims (freewillsociety.wordpress.com) via PayPal to the above email addy.
I compare all other meters to the TriField before considering them desirable, or worth the price for TI needs. It is a directional RF with omnidirectional EMF readings in a simple to use and reliable product at a low cost. You can buy direct (trifleld.com) or find it online from many resellers. Experts in the meter reseller and RF/EMF consulting field also use it as a standard for comparisons, and that is telling. In fact, currently, one such pro who advocates for the TriField is EMF Academy, a valuable resource for information to anyone interested in issues revolving around the topic.
More importantly, they have a newsletter you can subscribe to, and associated with that, is a monthly drawing for one of three TriField meters. If you just visit their site and poke around looking at articles on things like EMF paint and shielded clothing, a popup will offer you the ability to subscribe and enter to win one of the meters. Some of their more expensive and exotic solutions I am currently testing, and will likely write an update report within a month: be sure to FOLLOW my blog so you get a notice. While you do that, also click the LIKE button and leave a comment, if you wish — all at that bottom of each blog post.
There are other features to look for in a meter which could be handy to a TI. An audible tone option, for working in the dark or allowing you to focus on what you are scanning (TF-2). Peak reading indicator and Avg signal strength (TF-2) instead of just a needle or light bar reading that is bouncing around enough to make such things difficult. It would be nice to have the ability to add a special antenna, such as (specifically) a dipole. This may be a round tube, or a flat, triangular antenna for very precise targeted distance source location (useful for DEW sources, typically hundreds to thousands of feet, or even miles away). Some offer a pistol grip or a protective case. These things are nice to have, but not usually critical, if you are willing to walk a bit more to effect the same results.
But the important feature is antenna, and frequency range. Most meters are intended only for cellular and wi-fi operating ranges, which stop (well before 5G) at below 3.5 GHz. One insidious risk of 5G compared to 4G and the current wifi standards, is that it operates at such a high frequency, citizens won’t be able to afford meters designed to check for safety. They may operate at up to 6 GHz. As it happens, DEW weapons are likely operating in similar ‘beyond hope’ ranges. My $12K meter setup can still only see to 12GHz, and some DEW will be above 50 or 60 GHz.
And, it is true that EEG entrainment (mood, sleep control, thought interference), which many TIs call remote neural monitoring (a misnomer), operates at frequencies well below any low-cost meter on the market, unless you are looking at something like my $12K rig… which is exactly why I have it. We are talking human brain operating frequencies, at and below 30Hz. Your ears cannot hear below 30Hz, because if they could, it would confuse your brain, and therefore, that’s also why audio equipment tends to stop at that low end, as well.
Hold the meter level, flat in your hand, so you are looking down to see the reading. If you aim it upward, you are going to flood the meter with radio waves reflecting off the ionosphere, and will always get incorrectly high readings. You wouldn’t even be able to sense a satellite signal, that way; such meters are not designed for anything but environment readings or very near or high-outpt sources. Also, many meters without external antenna will give similar false readings if your hand is touching the ‘head’ or ‘business end’ of the meter, so hold it by the rear half, only. When taking a reading, your purpose may vary, but generally, you are looking for a ‘hot’ or higher-than-average reading among the ambient collective.
Before actually taking readings, consider perp strategies. They likely have excellent surveillance and will know when you are using a meter. It is very likely that they would therefore simply shut down, making any sweeps pointless. This is why a pro TSCM sweep is typically conducted unannounced, anonymously, and with a degree of stealth and cunning. Ideally, it would be best if you arranged for a companion to do the sweeps with as little fanfare or obvious effort, as possible.
This brings in additional problematic factors, such as trust and willingness to help in what is a lengthy and complex set of tedious steps. Or, you might get lucky and find the enemy’s gear is simply left running while they take a nap. For most TI’s, though, it can mean many attempts before being able to acquire useful information from the meter. Failure to find clues of targeting does not mean they never target, does not mean the meter is defective, does not mean you are doing something wrong… it just means that was not likely the right opportunity.
And yet, of course, the other possibilities may yet be true, in the end. While a negative is not necessarily proof of a negative, a positive is its own proof. Even so… you will want multiple positives over time if to have useful evidence. That will also require good documentation, such as video and verbal announcements of what you are doing and seeing, and where the meter is pointing. Have a witness, too. More to follow.
Slowly sweep back and forth, left to right, looking for possible reading jumps or dangerously high readings (hot spots). When you first start, you won’t likely know what is dangerous, or not. There are good online resources to help with that, but they can sometimes seem way too technical, and measurement increments of your meter may not match the measurement increments of a given site. That can result in confusion or misinterpretation, and force some math you might wish to avoid. Here are several sites you can review and compare against your meter, hopefully finding one more directly useful, without involving conversion factors. There are many others out there, and what constitutes unsafe levels is kind of a moving target in constant redefinition, and there is a difference in European, American, and Asian standards, the U.S. being the most lax (natch) of the three.
If you find a hot spot, stop and watch for several seconds to see if it holds relatively steady or was just a random spike. Generally, you will want to repeat scans in each of the meter’s modes of operation (i.e., the TriField has three: AC Magnetic, AC Electric, and RF/Microwave). If you are logging results for legal or comparative purposes, give it at least five seconds and note the reading(s), avg, and peak. If you’ve made an entry, be sure to note the values for each meter setting at that same position/angle. That added information could prove useful at some point.
Hot spots may show up either as a gradual rise and fall as you sweep, or a sudden spike. It may be brief, or hold steady. Brief spikes are not typically useful, but one which holds or is above safe limits is very useful. Note if gradual or sudden, and especially note if it was synchronous with any impact on you or your environment. You will also want to get a compass heading (there are cell phone apps for that, relying on natural EMF, as it happens).
If outside, and you are in something like a depression or valley, or a where there are tall buildings, you may wish to then tip the meter a bit to scan lower and higher in angle, such that you avoid looking directly into the sky (stay below the visual horizon, where rooftops may so redefine it), looking for further increases which may help identify a specific source location of the signal (a cell phone ‘bubble level’ app with off-level degree readouts might help with your notes, as well). If it is a building you are aiming at, try to estimate the floor, and note that. You may want a strong pair of binoculars, a rifle scope, or other strong lens to try to see what is at the suspect location. And it is suspect, only. A hot spot, even if very hot, is not alone a proof of a targeting source… but only reveals a possible suspect location.
If we are talking about finding a surveillance or other targeting device planted somewhere within your location with the meter, there is a similar concern, should you find something. Depending on the device purpose (which you may not be able to discern), and tactical matters dictated by your targeting situation (which may not be obvious), it may be to your advantage to leave it in place. You may wish to contact me (I am interested) via public library computer.
Or, use your best judgment, if worried it might should be removed immediately. Video document its removal and take it directly to a bank and get a safety deposit box to put it in… or take it to a local professional for analysis, per the advice in the next paragraph. Send me still images, in place, and after removal, if removed. Safety first, if it involves AC electrical power, and if it is in a large sealed box, don’t try to open it… such are often booby-trapped to destroy the evidence; very scary fireworks which may require the Fire Department, as it once did in a case I was investigating.
Now, about suspects, we need a warning: If you do establish a suspect, DO NOT confront individuals which you might be able to identify. Instead, try to learn as much about them or the property as possible, and add it to your notes. You should then contact me, or an appropriate professional, such as a private investigator, lawyer, or Agency. I don’t recommend Police, but if you have good readings and symptoms verified by a Doctor as not due a health issue, you might want to contact the FCC or your State’s Environmental Protection Agency, or perhaps your local County Extension Office Agent. Some larger cities may have bio-home or bio-environmental engineers or similar, who could be very good resources, if available. If there is any significant find or action taking, I would like to hear from you, and may be able to suggest ‘next step(s)’ to consider.
To find a surveillance or targeting device in a structure (the TI’s ‘space’) requires comparing readings well away from a suspect source to readings within an inch of it, looking for a large increase (signal strength falls off at the square of the distance). Scan low, scan high, and all around. You will want to be as physically close to surfaces as you can get, without touching, preferably (no harm, no foul, if you do). Every object and surface should be treated as a potential suspect to be tested.
One should establish ‘normal’ levels in a non TI environment (a test control space) similar to the TI’s space, and compare by taking readings at room center or well away from major RF sources (i.e., wifi, computers, tvs, radios, ovens, etc.). It should be a similar sized and designed space in the same neighborhood, between three and six homes away (arranging this can be daunting, if you do not know anyone who fits the bill, who would be willing to participate — try requests based on your own concerns in the neighborhood about high 5G signals, until you find someone who worries about 5G).
This is done in several sets of readings, each — one with those RF sources operating, and one with them turned off, and one with the Mains turned off (no AC power to the space). If subject to significant electronic attacks which can be physically felt or sensed, the TI’s space reading should additionally be undertaken as sets during both times of no sensed attack, and during an attack (which may prove difficult, if under surveillance — the perps may elect to cease the attack once you set up for the readings… which might buy you some peace.) You should also take readings at the power company meter at both spaces at a time of day when major appliances are not in use, and note how fast the meter is changing, and in the TI space, take an additional reading when the mains are turned off.
Finally, you will want to walk around the space on the outside taking reading pointing away from the center of the space, looking for hot spots. Directional is King, here.
To test for bio implants in a person or a tracking device on a vehicle, the best place will be in the country, away from any nearby potential sources for such signals… such that ambient broadcasts and distant cell towers are about all that’s being read. All cell phones and the like should be turned off. Don’t try to find an implant on yourself, have someone else take the readings. Every inch of the body should be scanned, and I suggest wearing a simple nightgown, PJs, or a bathing suit. Feet wide apart, arms held out to the sides. Be willing to get fairly personal. One then verifies by going on past the body in the same direction to insure the reading is dropping, again.
If a vehicle, pop the hood and trunk and doors to scan the interior areas, it being OK to lean into and ‘look about’ with the meter, just trying not to aim directly at the sky. Don’t forget under the seats, fender wells over the tires. It would be nice if you could put the vehicle on jack stands so you could safely get underneath it (where aiming upwards at the undercarriage will be fine). Jacking each corner up as if changing a tire is much more work… but avoid actually going under the car with any more than your arm. You will want three sets of tests, one with the engine running (in Park or Neutral, Emergency Brake set), one with battery connected and the key in the accessory setting, and one with the battery disconnected. That will tell you if any suspect readings are from something drawing power off of the car, or if it is battery operated (which means something bigger, and easier to find in a visual search). So, be sure you have the needed tools.
What do results tell you?
- Where readings are higher during an attack, DEW is all but confirmed, and additional steps (T1, at document end) will be needed. Where they are not, and the attack was sensed, the sensed effects are more likely to be a health issue (all TI symptoms are carefully designed to mimic health issues), and you should seek medical advice, describing only the symptoms, not TI concerns. Get a second opinion using a random Doctor. If no high readings and no sensed attack, try again… and again;
- where readings are higher in the TI space with all power off, than in the control space in like status, it indicates battery operated surveillance is likely, take steps (T2). If the same, it implies that any perp equipment present is drawing power from the house by any number of means, use step (T3). NOTE: it is certainly possible for both to be true;
- where readings are higher when RF/EMF equipment is turned on in the TI space compared to the control space, it implies that the equipment operating is either defective, or perhaps weaponized against you in some manner, take steps (T4); If the same, it implies them safe;
- where readings are higher when the equipment is turned off than in the control space, and the first part of item (2, above) is false, it implies the AC power system has been weaponized, take step (T5);
- where power meter readings are higher in the TI space than the control space, it implies the Meter is relaying a lot of data from perp devices… just good to know, as the other tests will address needed steps. If not different, it implies the meter is not a Smart Meter, or the meter has not been weaponized to relay data. Relay of perp data does not imply the power company is the recipient or participant, though it is always possible;
- where power meter continues to draw power with the mains turned off in the TI space, it means there is the possibility the perps are drawing power off for their devices directly from within the mains junction box (circuit breaker box), and may include electrification of the ground to create high EMF readings in the home, and likely, the embedding of targeting signals within the AC wiring. Take step (T5).
T1 (DEW test). You have had positive space readings within the structure and they point to DEW presence. You now need to do external readings at both spaces by walking around the building site and taking reading pointing directly away from the center of the building or room of concern (don’t sweep left to right — you walking in a hypothetical arc about the center point, instead).
Compare these to the interior readings at the same compass heading. If there is no agreement, the source is likely inside the structure: do a 180 and sweep to confirm, directly along the outer wall surfacwes. If they do agree, compare the average signal strength. If it is a notably higher, then the source is relatively close, and in theory, if there was nothing in the way, and the source was left operating, you could walk toward it until you found it… such as a neighbor’s home. If it is not exactly higher, then it is much further away, and you may want a bicycle or car to chase it down.
T2 (Batteries). Battery operated devices are bigger, and easier to find because they will require a nook or cranny. Do a visual search for anything that is unusual or foreign. Do not remove it. Video the discovery with audio description. It may require some disassembly of door panels, carpeting, dash components, etc., which may mean professional help or tools, in which case, you must be present and video. Contact me with the circumstance and send me still images of the object, that I may suggest the next steps. Do this covertly, such as by use of a public library computer.
T3 (No Battery). That means it is either hidden within an appliance (i.e., TV, stereo, blender) that is always plugged in, or it is wired somehow directly off of an AC power line, perhaps in wall or atic, under floorboards or behind baseboards. If the meter is pointing towards any such appliances. Unplug those items and move them aside, and take readings, again. If the readings fail to match, plug them back in elsewhere, and read again at the new position. If they again match, they need to be dismantled, looking for anything that seems added. You may want to take it to a repair shop, if unhappy at the thought of DIY (some items have voltage capacitors which can cause severe electrical shock even if the item is unplugged). You have to worry about such items on the far side of the wall, as well, by the way.
If the appliances don’t change the readings when removed, or there were no appliances, then we worry about wiring in the walls, floorboard, and ceiling areas. Aim the meter at angles to see if there is any confirming change in readings. If low angles are hotter, you may need to pull the baseboards, wall power outlets, or get under the floor (i.e., basement ceiling area). If high, there may be ceiling molding to be removed, or you may need to worry about something upstairs or in the attic ((where you will be wanting to follow all the house wires, looking for a cut and splice with something dangling (perhaps another long wire to chase down) off of it)). Otherwise, we check light switch wall plates, picture frames, wall hangings, or window sashes, etc., as may be in the line of sight of the reading. Again, be mindful that walls have two sides. Watch out for fiberglass or asbestos insulation… you don’t want to be messing with that without serious protective clothing.
T5 (AC Power Compromised). Consider to contact a Home Bioengineer or a large Electrical Contractor who is capable of doing large-scale power system work (i.e., can contract to build sub stations and the like — which means they know more and have better tools than ‘an electrician’). Go directly to the Power Company if there is no such services in your area. The idea is to complain about dirty power and possibly high ground voltage (say nothing about targeting) and ask for a power quality survey. If they find anything wrong, they should be able to fix it or arrange for the power company to fix it. Simply going to the power company first may not be a great idea, if they have been compromised and are complicit.
See the document on Shielding which is also included with the Helps Kit, or request a copy.
Many people ask ‘What is that silver thing on Nancy Pelosi’s desk in the House?’ The answer is, ‘a mystery.’ A Masonic mystery, in several parts. Conspiracy theorists will love this, and everyone else may find the history lesson involved doubly intriguing, for like cause.
Dateline, July 4th, 2019, from the Olympic Peninsula, in the shadow of Liberalism’s scariest Presidential Candidate, Governor Jay Insleecopyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
What you will learn reading this post, is that:
- a mysterious object has appeared, vanished, and reappeared on the Speaker of the House Podium, and;
- people continually ask what it is, when noticed in TV or press shots, and;
- it is, in simplest answer, a true National treasure, but;
- the answer given is mysteriously incomplete, even conflicting, as officials admit they know little about it, and;
- it contains more than six Masonic mysteries of its own, and;
- they, in turn, imply a Nicolas Cage National Treasure adventure may yet lay ahead, and;
- that all this may tie into today’s Deep State political strife in subtle but frightening ways.
What is that thing?
That is the first thing people ask when they see a bit of odd sparkly shape on Nancy Pelosi’s podium, typically seen in the background during closeup shots of the President when speaking in the House Chamber. The official answers tell us that it is an inkwell stand, which is not exactly an answer that makes sense, without knowing the history… which even the various official experts can’t seem to explain usefully. In fact, they can say little about it with certainty… and much of that would seem conflicting, creating uncertainty. We end up, therefore, with more questions than we started with, and the answers would seem… well, rather conspiratorial.
That’s O.K., because in examining the conspiratorial aspects, we get a free and enlightening history lesson.
The first mystery is how it came into use… twice. It was known to exist and be in use (some experts say) in the House of Representatives in 1810, shortly after it was first created by silversmith, Jacob Leonard, as an ornate inkwell stand. Others find no actual documentation before 1826, when a painting of that date shows it in place. However, it is often referenced in ways indicating it was generally believed present in 1810. Now, in those times, quill ink pens were dipped in ink frequently in order to write. A single dip might only allow a short sentence or sentence segment, or a large, fanciful signature, such as found on the Declaration of Independence. We will have reason to get more into the facts of quill writing, shortly (they become taunting clues in the mystery). But the point is, that quite naturally, inkwells were very common in that time frame, and were often artistic creations in the manner of fine ink pens, we see in use, today — and as such, often involved fine cut crystal and/or precious metals, and even faceted jewels. But the first and most obvious mystery surrounds the dating question, itself.
Because… in the War of 1812, the British invaded Washington, D.C. (and elsewhere), and in 1814, set fire to the Capitol building (in which the Senate and House resided, then, as now). They also fired the White House, and the National Library. There was little in the way of national treasures which survived these fires. First Lady, Dolly Madison, has variously been credited for saving from the White House, several paintings (including the famous Portrait of George Washington) and documents, including several of the original documents which framed our nation, such as the Constitution and Declaration of Independence. As far as the Capitol Building was concerned, accounts indicate nothing was saved.
And yet, the inkwell in question, apparently survived. It should have melted in the fire, or been thieved for its value. Ergo, SOMEONE found it a far more important thing than anything else… important enough to risk life and limb, to save. We know this, because it reappeared in the Senate some years later. We also know it was not a recreation, because the Jeweler’s trademark stamp is one Jacob employed before the war, and after the war, he used a different stamp, likely because his shop had been raided or even destroyed by British troops looking for plunder.
Rebuilding of the Capital was not begun in earnest until 1917, after the close of the war, a project which also finished the original construction plans interrupted by the War and the fire. Work would not finish until 1829, but the Senate was able to first convene in the building, again, in 1819. While the government had been being conducted in temporary quarters in Philadelphia without the inkwell, for some reason, the inkwell was once more in use by the 1819 Speaker of the House, Senator Frederick H. Gillett. Why this, and only this small a thing was so important to have been saved and restored to use, and only in the Capital building, is nowhere explained in any official dialogs. There is no record as to how it was returned, much less rescued. Virtually every other bit of furniture, artwork, vase, or bric-brac anywhere in the building has a complete traceable historical pedigree… but not this curious inkwell. That brings us to another mystery.
Masonic Influences: The designer of the inkwell stand, Jacob Leonard, was not a particularly well-known silversmith. Prior to this piece, he was best known for making silver spoons, ladles, tongs, and such. He was a coin silversmith, which is to say, like Silver Dollar coins the day, such silverware and art was of solid silver, .900 fine. While little is known of J. Leonard, one fact which ties to the third mystery, implies that the man was a Mason. To be clear, there is no clear proof, but his principle shop, in the general time frame of the inkwell’s creation, was directly across from a Masonic Hall. While that is a weak indictment or proof of Masonic leanings, the artwork, itself, the third mystery, is far more suggestive. But even if not a Mason, himself, it is possible the piece was commissioned by a Mason.
The inkwell is rich with the mystery of secretive Masonic symbolism, much of which ties back to the Mason’s favorite sources for occult mysticism, Rome, ancient Egypt, and dark Middle East religions. This is seen in a series of design elements employed in the inkwell, all of which are atypical of general use in anything short of intentional Masonic symbolism. In other words, nothing normally found on an inkwell, or simple artistic creations outside of Masonic use. Let’s take a look at the piece, to see; a decorated carry stand with four legs and a frame, with handle, to form a cradle for three crystal ink wells with silver caps.
The Ball: in Masonic terms, the ball, of which there are four, generally represent the Earth, Geography, Navigation, and Astronomy and attendant orbital affairs, including Earth’s rotation, the daily cycle, or time, itself. The importance of the Ball is also found in a peculiar and popular Masonic pendant, often made of silver. It is mechanical, as it opens up to form a heraldic Roman Cross… but one made up of six Egyptian Pyramids, it being true that ancient Egyptian symbology is the most central of all Masonic mysteries, which high Masons and the Mason’s ‘bible,’ Morals and Dogma, by head Freemason and Satanaist Albert Pike (also a Confederate General who started the KKK) hold in higher regard than the Christian trinity. The Pyramid is said to have been placed at the center of all land mass on Earth, aligned with N,S,E,W, and containing sighting tunnels to astronomical stars. Thus, we see in the inkwells, that the artwork rests upon these symbols, as their supporting architecture; the very Earth and heavens, and the key arts the Masons hold most dear.
The Fasces: this symbol originates primarily from the Roman Empire, but with some variant history found in Ancient Egypt, as well. In both Egypt and Rome, it was a symbol of power over life and death by governmental authority. It is often associated with edicts written on paper; the power of the official written word. A fully formed Roman fasces consists of an Axe (not all fasces employed the Axe) with its handle wrapped about with rods of wood and bundled tightly with red ribbon, while in Egypt, the ‘Lash’ was a single rod with crook at top from which hung lashes (and used to issue punitive blood-letting lashes), often bound with blue ribbon, and which held identical meaning. It was the fasces symbol which was adopted by Mussolini as the Party symbol for Italian Fascism. Thus, we see that the power of life and death is repeated four times, resting atop of and arising from the Earth and Masonic arts.
Ironic, then, that the modern American Democratic Party as currently headed by Nancy Pelosi (as Speaker of the House, where the ink wells reside upon her desk), is employing fascist tactics (i.e., ANTIFA ‘Brown Shirt’ style violence, race and victim political pandering, collectivist shaming and boycotts, censorship and disinformation) in its march toward harder political leftist ideologies, and globalism.
The Entwining Serpent: this symbol has ancient Egyptian origins tied to the Satanic God, Ishtar, often expressed in Masonic material as an entwining Serpent about the ‘egg’ of creation. In some art, the egg is depicted as an egg-shaped Earth. It relates to creation much in the same way the serpent entwined about the Tree of Life relates to the Biblic story of the creation of Man and the origin of temptation and sin… but giving more power to the Serpent as creator and divine force, as one might attribute to Luciferian identities, which is exactly what Ishtar, is. A serpent, of course, can also represent death or deadly threat. That there are two intertwined serpents are found on the winged staff of the medical cadeusus emblem, relates to the fact that early physicians often sold poisons, as well as cures, and that sometimes, the cure proved fatal.
A Mystery Trio: there is also mystery in the number of ink wells, and the actual ‘wells,’ themselves. It serves no purpose for there to be so many. In the time of its making, and especially when dealing with official documents where long-lived preservation was of concern, the only viable inks available in the day were ‘iron gall’ inks made of Iron sulfate and tannic acids, or similar constructs. The only color available was black, though the acidic nature of it would react with various papers (in some cases, eating away the paper, as some degree of sulfuric acid would result) in ways which might create a brownish writing, or with age, wax grayish. It might be mixed with blue aniline dye to form a blue-black ink, which would appear blue when written, but later become black. While colored inks existed for non quill writing instruments (i.e., brushes), the quills required a higher degree of liquidity only available with iron gall inks. As stated, quill pens did not hold much ink at a time, and frequent dipping was commonly required.
So why three wells? In Masonry, there are three Degrees all Masons must first proceed through to become Master Masons. There are three chief officers or posts to each Lodge, each of which, like the Speaker of the House, employ a gavel as symbol of authority… the gavel itself a Masonic symbol, but nothing like that associated with the instrument of law; is is more about the character traits of Masonic leaders. There are also the Masonic concepts of the three Greater Lights and the Three Lesser Lights of Masonic Illumination, which is reflected in the three greater volumes of the wells outer size, vs. the the three lesser actual contents, each of which, by their differing shapes (faceted and cubical, vs rounded and semi-conical, as seen in the image), provide and entirely different reflective, refractive, and transmittal properties of light (there is even a rainbow tinge seen in one of the faceted faces of the right-most well, for instance). Interesting also to note, that the three wells are not identically cut: the facets are larger on the left-most well.
A secondary aspect of the ink well mystery which I find rather curious, is the extremely small interior well capacity, within the rather large (by comparison) bottles. One normal bottle of the same size with full capacity for ink, would easily allow the full Senate to sign a document… whereas all three of these bottles, with their tiny chambers, would be found insufficient — as based on my own experience with quill pens in a high-school chemistry class project where we made our own ink, and then used it.
The Handle Mysteries: the handle employs a curious set of stylized flowers (presumbly flowers), showing two rows of 7 petals, each. No flower has 14 petals. It may simply be artistic license, but the number 14 has meaning to Masons, tied to both the phases of the Moon, and the death and dismemberment of the Egyptian God, Osiris, into 14 parts. Osiris is the God of the Underworld (Luciferian connection) and of the Moon (natch) who wields the Flail (fasces connection). That there are four of these ‘flowers’ (two per side) on the ink well stand, ties well with the four main phases of the Moon, within which, there are 14 days of ‘lunar darkness’ in the waning Moon.
Next, look at each base of the handle. We see that it is designed to pivot, presumably to give better access to the ink wells, though one descriptive of the piece makes it sound like it automatically opens the wells. I don’t think so; there is no visible connection to the well caps, and no photos with the handle moved aside show open caps. But each ‘hinge’ forms a ball which is seemingly the same size as the feet, but unlike the feet, each has four ‘leaf-like’ shapes rising upward. Two are, one each, affixed to each of hubs of the hinge, while one rides on on each side with the handle when pivoted. Notice two things: one, is that the ‘leaves’ are different on the left, than on the right, and that if you look carefully, they are not actually like leaves, at all, not even presuming them stylized. The other, is that they give these ‘balls’ the appearance of the Masonic Balls in the unlatched position, which enables their opening. The one curiosity to Masonic Balls, is that the one thing which was not a constant in their design, was the latches, which these leaves resemble, when the Balls are in the unlatched state. This may tie to the final mystery, next.
The Final Mystery: it is found in the construction of the walls. A silversmith has many ways of fastening two pieces of silver together. The most common is to solder with silver, which appears to be in use on the work. Another is to establish a press fit, as in the backs of a pocket watch. Yet another is to create silver clasps which can grip the added piece into place. Nowhere in silver work (not that I am expert), have I seen use of rivets, screws, or bolts. Yet silver rivets are found in the walls of the ink well. Two are used to attach each of the two Elegant Eagle oval shaped pieces (one Eagle per lengthwise side), and two are used to attach the ‘cloth bunting’ drapes on each side of each eagle. But none are used to attach the drapes on the end sides. This makes little sense.
Also curious, is that the rivets on the Eagle sections are visible both on the interior and exterior of the wall, passing through fully. But not so on the bunting drapes, where they are visible on the wall (look to far interior wall, just right of the right-most bottle), but not on the outside of the drapes (left-most interior wall). Tied to this observation is that the eagle piece could easily have been assembled either via solder or a press fit, or clasps, as is true of the bunting… and that the eagle appears to be upon a plate which is bowed outward, implying the possibility (by shape and the fact of rivets) of a hollow chamber… perhaps with something being hidden, within. The resemblance of the handle’s balls to the Masonic Ball pendant’s, also points to the possibility that something may be hidden, within. If one wanted more reasons to suspect such, look at the handle, itself, again. It has an oval which exactly matches the Eagle’s oval in size, shape, and central positioning, and the ‘flower’s are positioned in perfect sympathy with the inset rivets holding the Eagle into place… if they even are actually rivets. They may simply be clues deliberately placed to draw one’s mind to discovery… if knowing something was hidden, and in need of recovery.
I find myself recalling the National Treasure movie series, the one where the Templar Treasure was found following a set of clues hidden in various ways, each pointing to the next, until at last, the treasure might be reclaimed. I don’t for one moment believe the inkwell fits that bill… because my research for my book set, Fatal Rebirth, revealed the far greater likelihood is that the templar treasure is actually the wealth used to create the Rothschild banking empire… and that the Rothschilds were not jewish money changers, but Templars in hiding among the Jews, as such. No money changer could have amassed that much wealth, even in several generations of family members in the trade. It also revealed that many Templars went into hiding by becoming (and eventually taking over) the Masonry Guild… in time becoming Freemasons. But one thing is for certain.
The Speaker of the house has one very mysterious object on her podium… one perfectly useless to its original function, even upon its first creation… but quite useful symbolically… to someone — especially if a Mason. Whatever purpose made it thus useful is also an unknown, but we do know it was significant and important enough to risk life and limb, and to originally install it, and to later restore it, with some level of quiet secrecy. The ties between the Freemasons and the Illuminati, and between the Illuminati and the modern equivalent ‘Round Table Groups’ like the Club of Rome, Bilderbergers, Council on Foreign Relations, and the Trilateral Commission… and between the Masonic guilds and the masonic-like constructs of secret societies such as the Thule, the Skull and Bones, and the Knights of Malta, etc… all lead me to find this mystery very tasty, if not conspiratorial.
It is truly, a National Treasure, one perhaps worthy of yet another movie?
Progressive leftist/fascists seem to be pressing for armed-conflict by trashing the 2nd Amendment (and other atrocities), confident they own the military’s loyalty. They don’t, but that simple answer is worthless, and for a long list of scary reasons.
Dateline, March, 16, 2019, from the Olympic Peninsula, in the shadow of Califoregoshingtoncopyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Reading, you will learn:
- that a military or political coup in America has been attempted in the past;
- half the country thinks one is in works as you read;
- the possibility of success can be judged by comparing the present to the past;
- that analysis is important regardless of which side of politics you sit, and;
- it is scary to contemplate, because it points to blood being spilled.
An important question
The question I have posed in my books since before the turn of the Century was this: what would happen if there is an attempt to take over the government by some form of coup, or to subvert/destroy the Constitution, such as seizure of guns from citizens or abandoning of National Sovereignty to the North American Union and the New World Order? The simple answer is a civil war, or what I term Revolution 2.0. There is both a right and duty of revolution, which reveals this truth: when a Country makes laws which fly in the face of logic, natural law, Constitutional law, and the laws of your lawfully chosen faith… and endanger the nation’s future and safety, it’s time to overthrow that government. That answer itself leads to many more questions, such as, what does it take to start a revolution, and how close are we to having one? But the most important one to participants in any such civil unrest, and which this post attempts to answer, is this:
which side will the military back in such a revolution, and how real is the possibility that the military might choose wrongly?
This post is an in-depth analysis, and as result, is about a 30 minute read with some important, unexpected, and revealing content… surprising even me, in fact… and I’ve been writing (in warning) on this topic for nearly two decades. If you are the sort who prefers sound bite news, just skip to the last section (In Summary), so you can simply confirm your belief bias without gaining any actual knowledge, be it agreeing with me, or discounting my findings in your ignorance of the facts which lead to that conclusion. That is your choice, to make, and your responsibility to choose. The same will be true of Revolution 2.0, where wrong choice based on ignorance could have serious consequences for you, your family, your country, and the World.
In seeking an answer, it should be noted that fascist-minded megalomaniacs have existed within all Militaries since the dawn of the institution; such personalities are naturally drawn to military and Police, and tend to rise in the ranks to positions of command. Regardless of any outer political views they wear on their sleeves, they tend to be fascist/police-statists in their thinking. More so, in America, perhaps, since 1947, when the DOD and CIA were founded, and the Military Industrial (and Intelligence) Complex was ‘invented.’ I have since added the liberal media cabal to the complex, resulting in the nick-name, MIIM. Every generation has them; people who find fascism more useful to their rise to power than they see in guarding your freedom and rights. There are several important illustrations of this in our history, and they reveal that some among US military leadership are well capable of siding with the wrong side… perhaps even engineering a reason for a conflict which might enable or excuse a coup.
Some call it a ‘Deep State mentality.’ I call it New World Order thinking.
Note: while this post is made in an America where, at the moment, the greatest threat capable of forcing civil conflict comes from progressive leftists… and while that group embodies and employs elements of the Deep State, Fascism, and globalist New World Order agenda… the Deep State, Fascism, and the New World Order has allies on both the left and right, almost always in the extremest versions, thereof — in almost EVERY country on the planet. You can’t tell your players without a program, and while some players stick out visibly on both sides, no one is publishing a program. Trust no establishment politician, international corporation, or anyone promoting extreme liberalism, socialism, communism, or extreme conservativism or nationalism. Ferris Bueller was right: “A person shouldn’t believe in isms. They should believe in themselves.”
We know, for instance, that the Military has worried about a possible not-so ‘civil war’ between the branches, between units within a branch, or individual soldiers within a unit, for some time. The rank and file of the military is by and large duly patriotic, mindful that they are not to obey unlawful orders, and understand and honors their Oaths to uphold and protect the Constitution. Yet they are also trained to obey without question. No military in the World can do both well, simultaneously, in times of conflict. Unlawful orders transpire, and are obeyed by most, and to disobey can be seriously punished, with any such incidents typically swept under the carpet. No one wants to be a vanquished martyr for a silenced and unheard cause.
The proof of military’s concern over this paradoxical is in the form of a questionnaire since referred to as the ’Shoot Americans Questionnaire,’ which has been given to various sampled units in various branches over the years. The good news is, not too many soldiers indicated they would obey orders to fire on Americans who, for instance in just one of several scenario questions, “refused to turn in their guns.” Other questions about use of deadly force related to other causes or issues of some concern, here, such as if the soldier would be willing to swear allegiance to United Nations Commanders, in deference to US law (it did not mention US law).
That questionnaire arose out of our second evidence, the Revolution in Military Affairs. RMA is the notion that as modern technology and political realities evolve, the military needs to adapt its war fighting policies, tactics, and capabilities to maximize efficiency and reduce chances of failures. Nothing wrong with that; all militaries do it. However, in the 70s and 80s, it literally became a field of think-tank study within the military, and frequently a common topic of discussion the the U.S. Army’s War College publication, Parameters. Within its pages, according to an article which appeared in the now defunct Washington D.C. Newspaper, The Spotlight, was an RMA based article which defined the ‘new face’ of America’s next new war. In fact, as I recall, the piece was titled ‘America’s New War,’ which was, ironically, exactly the propagandist terms media used to describe the war to liberate Kuwait.
In the quotes from the Parameters pages, the next new kind of warfare which needed to be planned for would be with “former military, militia, patriots, constitutionalists, and the poor and disenfranchised.” Excuse me? Since when are such the enemy of the State? When did the military start thinking the government is so far afield from righteousness that the military must plan for waring with upset citizens? Why should any who so think be allowed the command of force of arms? But that is not all. RMA also established something called the “21st Century Politico-Military Force Matrix,” which is largely the marriage of local law enforcement and military actions in a matrix of options for dealing with unruly civilian populations. Then there is MOOTW, “Miltary Operations Other Than War,” which provides clear operating strategies for interactions with citizens as potential combatants, including use of force of arms. It has also been called “The People’s War” by the military… for dealing with a civilian uprising.
Finally, there is the dramatic increase in development of psychological warfare technologies (mind control) and non-lethal weaponry… for military application against civilian populations. This is sometimes referred to as the Forth Epoch War, and I’ve written whole books on that, and one of them, The Professional Paranoid Defensive Field Guide, lists nearly 500 technical terms which represent the sum total of such weaponry, methodologies, and strategies. Among them are terms representing the construction and use of whole fake communities which can in no way be taken for anything but American towns, where training exercises regularly take place in door-to-door searches, traffic blockade/check point vehicle searches, and storming of buildings in SWAT-like operations.
If that were not enough, there have been actual training exercises in a long list of major and lesser American cities (i.e., LA, Houston, Chicago, etc.), much to the alarm of citizens who were NOT informed of the operations until AFTER they are completed… event though in some cases direct citizen confrontation, detainment, and questioning had been involved… often by Psychological Warfare units. At times, civil rights had been violated or citizen’s safety put at risk. This has been going on for more than four decades, and it has been getting more blatant and frequent every four years or so (an interesting characteristic, given election cycles).
Finding clues within previous coup attempts
The answer as to which side the military would take in such a scenario, is the same as would seem to worry the Pentagon, based on the questionnaire and their significant focus on civilian confrontation in RMA. I have always believed, that the inescapable answer is BOTH — resulting in rebellions amid the military, itself, both within and between branches, and within units. There have been two well-played-out but failed attempts at a military coup in America which serve as models of any such scenario, and these deserve some scrutiny. The first one was real (the 1933/34 Business Plot to depose President Roosevelt and establish a Fascist government), and served as a model for the second, which is where we will start for reasons beneficial to context of any Revolution 2.0. The most recent was a fictional depiction written by Political writer/researcher (Fletcher Knebel) and a former Editor of a major newspaper (Charles W. Bailey II). I’ll start there.
Though their book, Seven Days in May, was indeed fiction, it was extremely well researched and quite factual in its underpinnings, and enjoys the modern context of the Department of Defense and Joint Chiefs of Staff, which did not exist in 1933. The book was a best seller and makes excellent reading, but it was also made into a box office hit you can watch online, starting Kirk Douglas and Burt Lancaster. There are several reasons it makes a good model, despite its fictional nature; it was based on factual basis relevant to our time, then, and now.
The movie was produced in the shadow and conspiratorial clouds leading to the assassination of John Kennedy, of which many people wondered if that ugly scar in America’s history was a plot involving some sort of political coup. Indeed, many clues uncovered over time pointed to military involvement. One was that the usual way the local National Guard military participation in Presidential visits was ordered to stand down, not unlike what happened in the Clinton/Obama Benghazi debacle resulting in the deaths of Marines and Embassy Officials, there. Another was the intrigue and conflict between Kennedy and the Joint Chiefs over the war in Vietnam, the Cuban Missile Crisis and the Bay of Pigs Invasion; the war hawks thought him soft on Communism.
Moreover, Kennedy had turned down the Joint Chiefs plan to fake a series of false-flag ‘Cuban terrorism’ events to justify an full out invasion and ousting of Castro, called Operation Northwoods… which also happens to be the blueprint visibly in play in the terror events leading to 9-11 attacks and the series of Middle East oil wars predicted in my book set, Fatal Rebirth — which predicted both the WTC downing by false-flag jetliner terrorism and the resulting oil wars in 1999, nearly two years before the attack. The Knebel/Bailey book itself was also written as a kind of harbinger of possible things to come based on many of the above difficulties between Kennedy and the Chiefs, and, ironically, Kennedy himself was quite fond of the book, likely recognizing aspects of the plot line to his own mirrored reality.
Sadly, he did not give it enough due, or he might have been able to foresee the deadly future which lay ahead for him… and perhaps, even forestall the use of Northwoods in our more recent history. The name Northwoods itself, by the way, was based on WWII Nazi operations of like false-flag nature… and the name Northwoods references Germanic translation, ‘Wald Im Norden’ (woods in/of the north) which also describes the invasion of Poland, which began WWII… the German Army swarmed into Poland from the forests to it’s North as did the air Blitzkrieg which overflew it. The fascists would, thereby, engulf the World in flame for a second time.
Note: Should the reader doubt any prime point within this post, they should hold final opinion until watching Seven Days in May. It will be well worth your time on an entertainment basis, alone. It is absolutely critical to understand the relationship of the various branches of service, how troop movement, material (weapons, munitions, supplies) and funding are manipulated within the context of the Department of Defense, and Presidential/Congressional oversight. The education, alone, is also motivation enough to watch the movie… as is the fact that much of the dialog is quite unhappily the same you are hearing on TV from commentators and politicians today; treason is afoot, for real, and as in the film as well as in 1933. But the key point in common with both the film/book and partially true in the Business Plot (there was no Air Force in ’33), was the absolute need to include the Marines and Air Force in key roles on one side or the other… and a means to ‘exclude’ non participants in the plot from interference as the coup unfolded.
Fascism brings us back to the Business Plot, which was undertaken by fascist business leaders of the most famous kind, including Bush, Harriman, Singer, DuPont, Hearst, Heinz, Mellon, Morgan, and others. But it was deemed that the plot could not succeed without a (then retired) Marine, one General Smedley Butler, who was the most popular military figure in the country, at the time. Butler was approached and ‘recruited’ to lead an uprising of unhappy Veterans who were owed money by the Government and unable to collect because of the Great Depression, which was also the source of unhappy ire of the businessmen. Butler’s role, if undertaken as intended, was to lead some 500,000 Veterans in ‘revolt,’ to seize the Capitol and depose or destroy the President, and hold Congress hostage, pending satisfactory reformation of a new government model.
Such a plot could not dare being risked unless assured that the military would both be unable to respond quickly enough to prevent the coup, and once in place, would not dare confront Butler and his civilian army (called the Bonus Army), or their fascist backers. Clearly, the backers of the plot must have had some private assurances from at least the Army, if not the Navy, that there would be no objection. The Chief of Staff (highest ranking General in command of the Army) in 1933 was Douglas MacArthur, who clearly did not get along well with Roosevelt, and was thought to be a fascist at heart. His counterpart in the Navy, Chief of Naval Operations, was Admiral William V. Pratt, who was very unhappy with the depression, as it had forced severe reduction of Naval forces, and threatened to merge the Coast Guard and the Navy, an idea which he opposed vehemently. The Commandant of the Marine Corps, Ben Herbard Fuller, also a JCS equivalent, was similarly suffering retrenchment because of the depression, and deeply respected Butler and MacArthur. To be clear, neither Fuller or Pratt have ever been accused of fascist leanings, as had been MacArthur, but a change in power favoring the military would not have hurt their wishes for a stronger military to command.
Thankfully, Smedley was a patriot who refuse the recruitment, and he instead exposed and thwarted the plot before it could get off the ground… though there was also a failed assassination attempt involving an Italian immigrant of fascist viewpoints in 1933. And, in the TV series, City of Angels (a TV spin-off of the Movie Chinatown, staring Wayne Rogers), the greater plot line in a three-part season opener (The November Plan) featured a foiled attempt to assassinate Roosevelt in a trip to California. That ‘fictional’ plot line was based in factual realities (subject to Hollywood license, of course), and did involve Smedley Butler as well as soldiers in uniform intent on betraying Roosevelt. The screenplay was by well respected researcher and writer of crime/detective drama, Stephen J. Cannell.
Now let us similarly disect the 1963 example…
The other key player in Seven Days of May was an Air Force General. Modern troop and material movement requires the coordinated support of the US Air Force. It was, in fact, this critical role which was the underlying plot mechanism of Seven Days in May, and quite critical to our understanding of what it would take for a modern coup to succeed. Therefore, with respect to Revolution 2.0, and Deep State influence over possible military opposition against Constitutionalists, those seeking to destroy the Constitution will need to include support of the Air Force, as well. The Army is less a concern, because the bulk of the standing Army is in deployment, and because each State’s National Guard is available to the Governors of each State in case of ‘civil unrest,’ which is what they would call the matter, seeking to hide the truth from the public: that any revolution was to save and restore Constitutional law against traitors.
If the State was run by liberals, the National Guards could be activated by the Governor against the ‘rebels,’ as they might also be termed for political propaganda expediency. If the State was conservative, the DOD could order the Guard to stand down (so as not to aid the ‘rebels’) or be activated at the Federal level to oppose the patriots. That could be true only if the majority of Joint Chiefs were on board with the unconstitutional effort underway. Stateside regular Army could potentially be directed to fill in where National Guard units or their Governor refused to stand down or comply with Federal activation. That would be an example of ‘civil war’ between elements within a given branch of the Military, and it is expected that any such use of troops, regardless if acting on Federal or gubernatorial orders, would experience conflict within their ranks, seriously inhibiting their efficiency.
In like manner, the Navy is largely out of the picture; the bulk of it is also on station around the World, and it is not well poised to impact ground actions within the borders of the US, short of coastal regions. In Seven Days of May, the Navy simply stood down. The same should be true of the Coast Guard, perhaps more so. Amid all of this, there is an added problem which provides a logical reason to stand down. Specifically, in such a coup, the military still needs to insure unfriendly actors such as China, N. Korea, Iran, or even Russia… did not take advantage of an America engaged in civil war. They might, for instance, choose to wax adventurous against allies, or even against US forces. Ergo, the Navy and much of the strategic Air Force would need to devote their attention to World affairs; standing down from any major role in the revolution would be tactically wise. And, in the next section, we will see ample reason for concern over their ability handle two conflicts simultaneously, both at home and abroad.
Perhaps we ought take a close look at Obama’s JCS, still now in place, and see what’s going on with them, in like-comparison.
What about today’s Joint Chiefs?
We must compare the two historical examples against today’s potential for replay. Looking back to 1933 and 1963, what about 2023, or some other current time frame? How does today’s situation compare, to then? Politically, there were fascist undercurrents mainly in the business community in 1933, where in 1963, the fascists were additionally present in the military industrial (and intelligence community) complex. They still exist to some degree in both sectors, today… but there is more afoot. Today, we see socialist/communist/anarchists and progressives on the Left using fascist tactics, including members of Congress. They are pitching socialism, but acting like fascists.
Today’s environment, then, is not so different from the past, and is perhaps worse, in final analysis… so what about the key military players at the Pentagon? How do they, and their resources, compare to the 1933 and 1963 scenarios?
In 1933, there was no Air Force, but there was a retired Marine at least thought able to raise a civilian ‘Bonus Army’ army of veterans, and a presumed friendly Army Chief of Staff. Butler was a key military resource. In 1963, it was once more a Marine in the book/screen play (Kirk Douglas) who busted a coup attempt… a plot orchestrated by an Air Force General who was the Chairman of the Joint Chiefs, and three JCS (Army, Air Force, Marines — Coast Guard did not have representation in 1964), while the Navy Joint Chief who was aware, wanted no part of it, but yet remained silent of it.
In 1933, Butler was retired, the most likely candidate to orchestrate such a coup. Today, the pro liberal/progressive/fascist forces would likely be stirred to replay 1933 with the likes of Retired Army General Tommy Franks, who was Clinton’s right-hand military man… the man who ordered the flame throwing tank and commanded at Waco. As such, he enjoys free access to anyone in the Pentagon on at least an informal basis, and still holds a security clearance. As a Deep State operative, he could become the organizing and communications agent in any such modern-day plot. He also has many friends and contacts within the military industrial (MIIM) complex. He meets the 1933 model, as a recruitment target/tool — one I feel unlikely to adopt Butler’s patriotic response.
And the plot in 1963 required at least the bulk of the Joint Chiefs to participate, or be cowered into silence. The Joint Chiefs today consist of one four-star General to represent each branch of service, including someone to represent the Coast Guard and the National Guard, plus a Chairman and vice Chairman, for a total of seven top-echelon decision makers. Today, thanks to Obama, the JCS consists of two Marines and three US Air Force Generals to form a ‘heavy weighting’ of representation to the same two branches deemed important in 1963. I say thanks to Obama, because he conducted a purge of some 266 top-ranking military officers, and oversaw a rapid series of promotions necessary to put his personally approved people into the JCS chairs.
One Marine, General Joseph Dunford, Chairman of the Joint Chiefs, owes his position to that purge with a series of four rapid-paced promotions and appointment to the post by Obama. He is the most powerful man in the military, the counterpart to the 1963 role played by Burt Lancaster in film, though a Marine, instead of Air Force. The Vice Chairman, however, is Air Force (Paul J. Selva), also appointed by Obama with six rapid promotions. The Joint Chief of the Marines, General Robert Neller, had three promotions under Obama to his post, making two Marines in total.
The Joint Chief of the Air Force, General David L. Goldfein, enjoyed five promotions under Obama, and Air Force General Joseph L. Lengyel (making the third Air Force General) is JCS representing the National Guard. He had five promotions under Obama, while Admiral John M Richardson, Navy’s JCS, had only one promotion under Obama… it perhaps being understood in the 1963 model that the Navy is a non-critical player in a coup. In like relationship, the Commandant of the Coast Guard, Admiral Karl L Schultz, a de facto 8th JCS… appointed by President Trump, as was General Mark A Milley, the Army’s Joint Chief. Again, the Army is a conflicted player, both by virtue of deployments and National Guard complications, the one branch of the services most likely to be at war with itself in a coup-like or Revolution 2.0 scenario.
And, it would appear that Obama’s bevy of purge-replacement military officers have been quietly sabotaging the military in ways which make national defense abroad that much harder, perhaps shifting capabilities to a homeland conflict (I hate using that fascist term, ‘homeland’). In fact, difficult enough that the Air Force, by way of example, might not be able to provide any aid to patriots, or be a factor against them, at all, outside of material and troop transport. If today’s Air Force capabilities analysis is any clue, President Trump no longer has a full deck of military cards to play. A conflict at home and abroad would tax any Trump effort to support Constitutionalists, even were the DOD not under the control of Deep State plants.
Monkey wrench conspiracy theories
One tool the Air Force has which could prove extremely troublesome if aligned with treason, is Command Solo. There are 21 Command Solo aircraft, all based at Pennsylvania’s National Guard; specially modified C-130s capable of significant mind control capabilities via Political Control Technology (PCT). I find it troubling that such capabilities are National Guard, rather than Regular Army or Air Force, making it all that much easier to use against citizens. A single plane can impact a two-five State region, depending on State sizes. All of them fly regular training flights, unless in use overseas in a combat theater.
Impact? The Air Force has admitted that they were used in Bosnia to sway elections, and in Iraq to convince thousands of Iraqi crack troops to surrender to small drones which were essentially RC model airplanes with cameras. The chief weapon the plane has is the interception of local radio and television broadcasts, which it then embeds with hidden inaudible subliminal messages which the subconscious mind does absorb. Such messages can be of any desired simple but endlessly repeated phrases or key words (such as ‘surrender, turn in your guns, vote Democrat’) for rebroadcast at a stronger signal strength than the original. The secondary weapon is more insidious; EEG entrainment.
Human brainwaves for emotions operate at ultra low frequencies, and are roughly the same across population samples. If the desired emotional state of being is broadcast at signal strengths greater than that of the brain, the brain adopts them as its own (is entrained). By combining subliminals with emotional state manipulation, such as an abiding and overwhelming fear, Command Solo can impact tens or hundreds of thousands of people while in the air. In such use, it can fly 24/7 with required stops for refueling and crew changes, or in rotation with another Command Solo aircraft.
The training flights they fly involve preprogrammed mission tapes representing ‘harmless’ subliminals and EEG patterns to be used, but not even the operators on board, or their commanders, have any way of knowing what the content actually is (presumed to be ’empty’ of content.) So when they fly training missions, they could very well be telling Democrats to be outraged about everything, violent, etc., and no one would be the wiser, except the person who ordered the tapes to be made, and used, and the computer operator who created the tapes.
Watching your emotions and being alert for changes in that and any unexpected thought patterns which represent something contrary to your original belief structures, is your only clue the plane is being used. The average person won’t question. The strong-willed and alert, can detect, and can resist, if strong minded and inwardly alert. The other clue is seeing the aircraft in the air. A good spotting scope, rifle scope, or telephoto lens can easily recognize if a suspected plane is a C-130 with the Command Solo configuration. Command Solo, and other PCT are well covered in terms of detection and defense in my book, MC Realities.
Another wildcard conspiracy theory is “UN Intervention,” and I here draw upon the ten years of research documented in my book set, Fatal Rebirth. There have largely been two waves or versions of this theory, and both are based in demonstrable facts nonetheless consistently denied by both US military and the UN, itself. The first took hold back the 1990’s and a bit before, with origins earlier than that, tied to far-right thinkers and political forces, such as retired General and US Senator, Barry Goldwater, who foresaw the New World Order’s rise through the U.N. In the 90’s, large numbers of people were seeing and reporting long trainloads of flatbed cars loaded with white U.N. military vehicles, as well as similar on river barges and tractor-trailer units, sometimes in convoys on American highways. Other reports talked of holding areas with hundreds of units parked in neat rows, typically surrounded by military quality fencing and guard stations manned by ‘Men in unmarked black uniforms.’
This was also the same time frame when people hiking in select wilderness areas were encountering armed soldiers, also in unmarked black uniforms who were apparently conducting some kind of drill or operation. Invariably, they were said to have been speaking both English and a foreign language of some sort, and ordering civilians away at gunpoint, advising they had entered a military compound. Many of these reports of vehicles and soldiers made the newspapers in one form or another, sometimes with pictures, but the military and the UN denied any validity. Some of these events and UN vehicle stockpiles were indeed in ‘wilderness’ areas tied to the 43 United Nations Biospheres regions, which is its own Agenda 21 conspiracy topic.
The U.N., for instance, has officially insisted it has no men or vehicles in North America, and does not use the types of vehicles being spotted. Most were identifiable as American WWII era, or more modern US Army vehicles, and many more were of Soviet manufacture. And, at the time, large numbers of Soviet military equipment, including helicopters, trucks, tanks, rocket batteries, and even specialized units such as CBRN (Chemical Biological, Radiological, and Nuclear) decontamination trucks were being brought into the country by someone, sighted variously in transit or storage in either original Soviet or UN colors… no unit or national markings lest it simply be ‘UN.’
Let’s take just one very interesting and well documented case (my 1990 research, plus the Spotlight in the same timeframe), to drive the point home. It involves Soviet ARS-14 biological/chemical warfare trucks shipped from West Germany through the firm Beesh Merkator to Gulfport, MS, then by barge to Scranton, Iowa to a company, Airmar Resources, Corp, operated by Lt. Col. A. R. Koval Sr., USAF, retired. Koval told the Spotlight that the units were purchased for Germany and destined for UN forces in Europe after refurbishing, contrary to UN statements it does not, by policy, use Soviet equipment of any kind.
The investigation continued, revealing that from Scranton, they were transited to various destinations in America through firms named Newway and Scranton Manufacturing. The later firm, contrary to Airmar Resources claims, said the trucks were being converted to ‘garbage trucks,’ but the EPA said it would be impossible for those vehicles to be made to meet vehicle standards. Scranton responded that they were destined for European markets, but one has to ask about the cost effectiveness of buying and shipping trucks from Europe to America for modifications, and then shipping them back to Europe. Scranton at the time indeed offered a line of new garbage trucks, but none were of Soviet origin. All were, like the Soviet units, painted white, of course. A nifty cover story that almost works, if you don’t look too closely.
And, as stated, the modified trucks were tracked to US destinations, not Europe. One, in fact, spotted in California on a flatbed truck, was leaking noxious smelling liquids which made the witness sweat profusely and ill to his stomach. Marked with a sign “Quarantined by US Department of Agriculture,” the fluid was being drained into a trench by men in protective clothing. Both Newway and Scranton Manufacturing are alternate names for a small but troubled firm associated with Bede Jet Corp, the maker of small fiberglass civilian jets (build-it-yourself kits) like the one James Bond (Roger Moore) used to attack Castro’s air base in the opening sequence of Octopussy. Newway, in fact, also made Bede-designed, Honda-powered, fully enclosed two-seat motorcycle-car kits, also of fiberglass.
The more recent wave of UN concerns is fare easier to demonstrate (the images above, for instance), and involves UN intervention officially in place. It comes from the Obama Administration’s invitation for the UN sponsored program referenced as the Strong Cities Network. Based on selling fear of terrorism, in particular, ‘home-grown extremists,’ the program calls for United Nations help to member Cities in the Network. The help goes directly to and influences the Police Departments within the network, as well as city management. On the surface, as sold to citizens in the fear mongering, it sounds like a way to gain some expertise in combating terrorism. But that is a deliberately false narrative.
Conspiracy theorists early-on tried to warn people it was a dreadful mistake and a trap. Now, even non theorists are proving the conspiracy is no theory, and far more serious than even early theorists, had thought. It turns out that the Strong City Network acts as its own Law Enforcement Agency, and is empowered to actually govern member cities. Cities which join the network essentially are subject to UN Rule of law, rather than the US Constitution. Currently, New York, Atlanta, Denver, and Minneapolis are members, and a push is underway for Boston, west-coast cities, and elsewhere, to follow suit. In the event of a civil war/revolution scenario, the framework and base structure for a UN interference will already be in place. All they need to do, is to make the announcement, and fly in their people and equipment to make it stick. Because it was blessed by Obama, it would be difficult for anyone to object, including the military — unless and until President Trump or some other President revokes the program and so orders, at least.
There is a final ‘conspiracy’ matter which counters the other two, in impact: a secret military within the military. When researching my book, Fatal Rebirth, I was contacted by an active Officer of high rank in the US Military who knew of my work through my appearance on Coast to Coast with George Noory. He advised that there was, within each branch of the service, a secret group of Officers of some importance, and positioned across the full spectrum of unit function (i.e., Intelligence, combat, support, communications, etc.) Their purpose was to be prepared for, on watch for, and to activate should there be any unlawful (unconstitutional) effort to effect a coup or military takeover. He in fact invited me to become a member, as they did have associations with civilian counterparts they deemed useful. Accepting, they said, I would then have access to information he assured me would be valuable to my book.
However, as the covert security aspects of membership were extremely hight, I did not feel I could manage them… and, I was unwilling to accept responsibility for receipt of classified military or governmental information, which would risk being charged with a crime, if caught. But I was pleased that such men were in place to help insure that unlawful orders against citizens would meet with both covert and overt resistance. I reference this covert patriot group as the ‘Turtle,’ (as in, Revenge of the Turtle, America’s first submarine war vessel used in the Revolutionary war. The Turtle is, and like the Turtle sub, is invisible and hard to find, until it bites.
We see then, that the makeup of the current JCS team engineered by Obama, almost exclusively, is quite weighted to Marine and Air Force, suspiciously Deep State tied, and more than mirrors the key aspects of both the 1933 and 1963 scenarios. We see that was an Obama (Democrat) arrangement through a purge, as part of setting up his Deep State. We see that Obama has set the stage for potential UN interference and further partnerships or concessions to authority from the next progressive President to take power. We see that the military and its MIIM Complex, the business sector, and the political spectrum is well laced with both fascist and liberal/progressive politics which border on fascism, and employ fascist tactics. We see that Deep State and establishment politicians collectively ‘hate Trump’ regardless of party affiliation, and in many cases, would rather see the country come to harm than to allow him to continue in office. We see now why the progressives think they own the military, which could in fact be poised for a last-ditch full-blown military coup take over if Trump wins, again.
The final conclusion is, all the pieces are in place, and while the leftists do own the military at the top, they do not, top-down. How then, can we say we are not ripe for a coup, or Revolution 2.0, should the progressives come to power, again — for they still believe they do own the military? Assuming the left does not reform itself into a more logical and viable political entity akin to the old Democratic party of the 1950’s and 60’s, if they cannot be kept from ever again obtaining power, armed conflict must indeed be our future. I foresee no other possible outcome.
Returning to the original question, then, the military is well poised at the command level (JCS) to participate against patriots, but not necessarily well positioned to do so without difficulties, rank and file. We see the Navy and Coast Guard are weak players in such a scenario. We see the Marines, despite any leadership which might be opposed to Patriots, are perhaps the most likely to themselves, at rank and file levels, join with patriots, and refuse unlawful orders. We also see the Turtle groups would do likewise. We see army has its own confusions and situational roadblocks to a unified and obedient command against patriots, tied to the complex relationship with National Guard units. And, we also see the Air force, along with Navy and to a degree, Marines, must be somewhat aloof to such conflict, in order to prevent third-actor States from taking advantage of an American military distracted at home.
I therefore do not see the relatively small numbers of US armed forces, if arrayed against the large number of 2nd Amendment defenders and others of the “former military, militia, patriots, constitutionalists, and the poor and disenfranchised,” being sufficiently strong enough to prevent a patriot victory. That, however, is based on additional assumptions not yet in evidence or proven true: a) that mind control technology will be used effectively; b) that progressives will prove to be better armed and organized than expected; c) that other groups might join in, such as illegal immigrants and Muslims seeing the conflict as a way to advance their own causes, or real or fake UN troops; d) that China (by this means/scenario) or Mexico, perhaps even Canada, might elect to enter into the fray; e) that some other totally unexpected plot element is afoot and impossible to evaluate.
Therefore, if when at bat with an unfriendly pitcher on the Mound, be ready to smack the ball as hard as you can… but also… “Watch out for in your ear,” with a deliberately wild and hurtful pitch (apologies for stealing Ray Liotta’s line).
If you agree… there is yet one more unanswered question: what will the rules of engagement be for patriots, when they will face and odd mix in the battlefield (cities and countryside)? It will be a strange mix of citizens + law enforcement + military on both sides, and in many cases, there will be times when it will not be known which side a combatant force is on. How should such a war be prosecuted? For the answer to that… and in foreseeing this time coming more than 20 years ago… I wrote the book set, Fatal Rebirth. The answers are there, and have been, all along.
We keep hearing scattered reports of AI gone wrong… about experts with concerns… but just try to find a single compendium of the whole truth online. THIS appears thus far the only one… and for a reason.
Dateline, March, 18, 2019, from the Olympic Peninsula, in the shadow of Microsoftcopyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
What you will learn in this post
- The true analogous nature and behavior of A.I. is as unpredictable and potentially dangerous as might be alien visitors from another World;
- that a lot of people talk about A.I. in media, but only offer glimpses for some reason;
- what that reason might be (a technocracy driven conspiracy);
- what the technocracy is;
- of the many kinds of A.I. and A.I. risks;
- how A.I. works and how that relates and contributes to such risks;
- the many failures, unexpected results, and dangers thus far experienced;
- why it is highly unlikely such dangers will be usefully addressed until too late;
Note: this is a long post rich with information critical to any useful conclusion about Artificial Intelligence (A.I.) If you are someone who likes to form or confirm your beliefs based upon headlines and blurb-like summaries or YouTubes without much factual substance, you will not like it, here. Reading time is 30-40 minutes, unless following some of the many resource links, which will delay further.
It is intended that the reader decide for themselves what is true and worth taking away. Please see About the Author at post end to test my credentials for writing this post with useful reliance; I am not without bona-fides.
Why this post?
I’m pretty sure the reader will find this the most comprehensive and useful article on the matter in lay terms, anywhere, short of a book — and the most complete in cataloging specific examples of A.I. gone wrong, and associated fears. Scattered reports of failures and forecasts of doom keep popping up here and there… but trying to find a comprehensive review is simply not possible. For some reason, no one who should is willing to confront it head on with the full revelation. But you can find many click-bait sites that like to talk of sci-fi SkyNet or realistic-looking humanoids taking over… things which are not impossible, but highly improbable… at least any time soon. We need balance.
I think I know why we are being kept in the dark and fed dystopian mushrooms and light-hearted reviews of things gone wrong, instead of full disclosure. While the reason might tend to put some readers off, my being right or wrong does not change the meaning or value of this post, though if right, you should definitely want to know. I speak of a cover up, and remind you that any form of cover up is, in and of itself, proof that a conspiracy of some sort exists. In this case, there is at least an implied cover up, due to the fact that information on topic is so scattered and incomplete, as if authorities and media are not actually trying to… or pretending not to notice. If you do not agree about my notion, that’s one more reason to read About the Author at page bottom.
There is a second component to ‘why,’ and it leads to the same conclusion. It regards the fact that few are talking about the potential disruption to almost every business market, workplace, financial and social facet of society at large… and as we have already experienced with most of us unawares (and explore, herein), politics. We are leaving the Information Age and entering into the A.I. Age, where people who look for the next big thing to bank on simply take whatever is their current thing, and add A.I. to make the thing a super-thing (or perhaps, not so super). Like the risks A.I. represents, if we look, we see no one source talks seriously about what all that disruption of ‘status quo’ might really mean; total chaos capable of toppling any empire, including governments.
I mean, just look at what the Smart Phone did to personal safety, alone. No one foresaw that people would be so glued to it’s face staring at countless distractionary things that didn’t even exist until after the phones were invented… such that with alarming regularity they would mindlessly step in front of oncoming trains and cars, or other misstep hazards. A.I. use will be much like that unexpected change, sometimes good, all-too-often, bad… and across our entire spectrum of life’s activities. I am concerned that mainstream is hardly looking at this question — and when they pretend to, it is neither comprehensive nor analytical, it is soft-soaping and even encouraging. However, I did find at least one semi-useful source, though not mainstream, which I’ve shared, herein, below.
Addressing these two mirror-like clues, my answer quickly falls to one of the oldest conspiracies, one known to factually exist, and usually just called ‘the NWO.’ The New World Order, you see, is a strange mix of ancient beliefs and modern technological investment and application; while they tend to believe in mystical occult practices based on dark religions and secrets of the ancients, they also realize they cannot establish full control through a One World Government (needed if to seat the Antichrist) without relying on significantly advanced tools. While they cannot entirely prevent the odd story of things-gone-bump-in-the-night from becoming public, with control of vast portions of media and through fostering disbelief in ‘conspiracies’ in all quarters, they can move those who should be writing about it, not to do so… and to instead limit their focus and avoid asking critical questions which might reveal the meaning and importance.
Some have given a name to the identity aspect of this particular N.W.O. conspiracy and its players. Where in the past we might have used the terms, Globalists, Power Elite, or my personal favorite, “the 1% of the 1%,” they now simply call it “the Technocracy.” And it is easy to see why, as several Ground Zero radio shows (Host and friend, Clyde Lewis) have revealed with their hard-hitting guest interviews, and of late, live calls from mysterious Deep Throat types who’s revelations repeatedly check out as accurate. It’s O.K. if you want to say I’m all wet, and the N.W.O. technocracy and all that goes with it makes no sense, but I point out it does not matter what you or I believe, it only matters what they believe… as evidenced by what they do, which is what Clyde’s broadcasts revealed.
Because regardless of what is true and real to our own belief structures, their plans necessarily include us all, and will significantly impact you and me negatively, regardless of our beliefs. That is, in fact, precisely revealed within the 33 axioms of fascism, which as a governmental ideology is an invention of and for political control they have much earlier inspired, and still rely upon. But, in understanding that at least some of you are Doubting Thomas types, I have provided some additional links at the bottom of this post, that you may investigate further, for yourself. And, I remind you that the conspiracy aspect changes nothing, true or false, except that if true, it is an even more important reason for your attention.
The question itself (why no full revelation?) is indeed a clue suggesting cover up. To illustrate, in order to compile the fuller view presented here, I had to collect facts from more than 40 different Web resources (after scanning perhaps ten times the number), roughly half of which claimed or at least inferred themselves to be just such a collections of information (but which merely sampled). Of all those resources, only two were truly comprehensive in scientifically useful ways… and yet both managed to offer no more than an honorable mention of a few concerns.
It seems no one wants to combine the two elements together for you. For that, we have to search it out, ourselves… which I did for you, here, with appropriate referencing links.
What A.I. actually is
But first, we need to understand a little bit of just what Artificial Intelligence is, and in what forms it can exist, also a thing you tend not to find easily on the Web, without getting into truly scientific papers (which I have done). So doing, I learned that A.I. use is much more prevalent than the fluff articles would let on, and far more flexible… and with highly dangerous potential. The simple explanations of A.I. is that it can be any device (machine, computer, automated process) which mimics intelligent thought processes of a sentient being’s mind… capable of learning, self-correlation, and postulation… often with some evidence of being self-aware and/or capable of emotion or creative thought. Ideally, it should enjoy or feature some level of autonomy, free of much human interference or control, but able to be supplied with information by its owners, and queried regarding it.
But A.I., unlike normal computer hardware-software solutions, are mainly autonomous learning systems; they are purest when designed to be started and left on their own to experience and grow in capability as if a child going to school, their courseware being whatever data or input is offered or enabled (such as a database, camera/audio input, Web access, etc), all to be filtered, processed, and dealt with or responded to according to some basic guidelines (what you might call programming). They are also often designed to simulate, or perhaps to develop on their own some level of what appears to be emotion and/or moral equivalencies, which are often the sources of problematic outcomes. One never quite knows; do they have such traits, truly, or are human observers merely anthropomorphizing them with human traits the way we do pets? Are they just mimicking humans in the same manner as a sociopath, with or without malevolence… or do they stem from something even darker going wrong at a deep and unfathomable level?
Principally, when A.I. scientists speak of a mind or a brain, they mean ‘Man,’ but with regard to A.I. function, they are more likely talking ‘super-man,’ and in some cases, envisioning supermen: human-A.I. hybrids of the trans-humanist kind. It must necessarily and variously include creative thought, emotional thought, rational thought, and logic, and be capable of true learning through recall experience, any programming, and experiences born of making decisions based upon all that… which can then be compared to the current situational input or problem to be solved. Emotion and creativity are often bonus goals. There are various tests and training processes involved in parenting an A.I., and yet like the A.I., itself, those tests and processes are all inventions of Man, and therefore subject to flaw.
Ergo, so is the resulting A.I.
So… do you want your children’s children to become A.I. transhuman experiments?
First of all, there are three basic paths to A.I., starting with Connectionism. It is based on attempting to physically duplicate the functionality of the brain, as well as its physical synaptic mapping. This is done in special hardware, or by far less costly simulation within traditional computer designs (which would slow it down dramatically). It is based (like the brain), on associating new input or information with some preexistent prior information of like form within a neural network system similar to our brain. It is the most complex and most difficult form of A.I. to create, but also represents the greatest potential to realize the ultimate in A.I., a truly sentient artificial being with significant performance levels and human-like qualities of being (of the least predictable and soulless kind).
A simple example of connectionism at work in our own mental processes, might be that of trying to remember the name of, say, Joan (any last name), upon first being introduced. You might knowingly or subconsciously associate her name and face with some other Joan you already know… and simultaneously, with any unusual aspect about her which associates elsewhere, such as a mole on her face, and a mole on Marilyn Monroe’s face… anything to differentiate her from other people we know and better enable recall when needed. Perhaps it is disclosed that she is an orchestra musician, and so you additionally associate her with your favorite classical piece.
The more associations you make, the easier will be any useful recall. In the recall process for problem solving (in our example, getting her name right the next time you meet), you are then able to fetch all the data required, and filter it through other learned memories (including those about problem solving processes, themselves), learned over time. It happens in an instant, and without conscious awareness, usually. In this way, a single ‘memory’ is not singular, at all, but many related associative memories scattered throughout the brain’s untold and largely unused billions of synaptic nerve cells. The stronger the memory, the more such patterns there will be. Memories can also be reinforced by the recall process or related new memories, making it easier to recall the next time needed. That’s why repetition of a thing allows total better recall. People with ‘total recall,’ simply use more synaptic connections.
In A.I., this method requires special hardware and interfaces with the user and operational environment which makes up it’s ‘World ‘ (especially if within a robot), and to facilitate training processes. The term perceptron, a transistor-based component, replaces synapse in most technical discussions. For this reason, they are generally largely experimental one-off designed, as they deter mass production or replication. But unlike man, they are all about total recall, and therein lies a potential problem I’ve not seen anyone addressing. Man’s memory enjoys a ‘strength’ factor, which determines the importance or significance of the memory. It is achieved either by the event’s emotional impact, or by repetition. In A.I., all memory has equal weight, and that makes it harder for the A.I. to filter the connections to find the most important ones, and that can lead to false application to a given need. Unless the design has algorithms to simulate weighting, it can only adjust weighting itself by learning through trial and error.
Connectionism A.I. experiments are further limited significantly by the fact that we do not yet fully understand how the brain itself, works; resulting A.I. models are by comparison inept, at best. In like manner, we are not yet terribly good at designing such hardware minds, which are generally very costly and physically cumbersome, not to mention taxing to the state-of-the-art in computing. Often, the A.I. ‘mind’ is so large, for use in a Robot, it is operated remotely by the A.I. through radio control, making it more a puppet, than a robot, and the A.I. nothing more than a box with an expensive real-world avatar.
E.N.I.A.C. (Electrical Numerical Integrator and Computer), Americas first computing machine built in 1945 for the U.S. Army, was somewhat connectionist (the Integrator part) in nature (but not in results), in that it mimicked synaptical design in the form of an array of individually interconnected computing calculators and telephone switching system components. It was an electro-mechanical behemoth a hundred feet long, and weighing in at some 27 tons. It had a hunger for 150kw of electricity. Today’s connectionist A.I., despite some level of miniaturization, can still fill several rooms and require miles of wires… though they vastly outmatch ENIACS relatively modest computational power and memory, which a good programmable hand-held calculator can easily exceed.
One firm is changing that, as we shall see… but we perhaps ought not like the vision.
The second method is ‘Robotism,’ which is essentially a host machine programmed to respond in the preferred way to a given circumstance, such that outwardly, it at least seems to be sentient and self-guided. This is the easy path to A.I., as it can be achieved by clever programming of the sort often called algorithms. Such robots, of course, could be powered by computationism or connectionism at their core (i.e., E.N.I.A.C.), both of which lend themselves to and even require the use of algorithms at one or more levels, as well. But we are talking about the core principles which are the basis and heart of the physical design.
By algorithms, alone, any existent computational system with respectable performance can be employed, including the World Wide Web and any computer connected to it. Therefore, it can exist in distributed processing environments, as well. Thus, it need not be a stand alone or autonomous machine such as a conventional robot, though more and more, we find that the case, even in things as simple as a child’s toy or automated vacuum cleaner. Robotism is the path of least resistance for many A.I. projects. It lends itself to design by other A.I., in fact… a matter of both concern and proven risk.
If you have ever talked to an automated computer voice on the phone (other than a simple repartee front-desk system), or used a ‘personal assistant’ device such as Apple’s Siri, Google’s Home, or Amazon’s Echo, you have been using a robotism A.I. On the Web, such A.I. is also often known by another name, as we shall see: it is called a ‘bot.’ Such bots are often not our friend, unfortunately. Examples will be offered.
The final method, one which is more promising, is ‘Computationism,’ which relies on raw computing horsepower and massive quantities of data libraries of information, and traditional but dramatically more sophisticated programming methods and languages. The problem there, is extremely complex programming requirements. Often, such systems are used to design A.I. systems of one of the other forms, and one might question how well that works out.
A.I. Contact of the Fourth Kind
Apologies to Spielberg, but enter, stage right, D-Wave quantum computing. Nowhere is it described as being any of the above four kinds, but one does find it often described in terms reflecting all of them. It is indeed a hardware variety of A.I. based on supercomputers, but it is also officially described as a Boltzmann machine, which is based on connectivism. And yet, it significantly relies on use of algorithms of robotism, and by some accounts, literally thinks in algorithms. D-Wave would seem so advanced, that they might argue it some fourth method, an island of itself based on quantum computing using their patented invention, called qubits… their core processor elements.
Unlike any other A.I. before it, D-wave would seem to be God or advanced alien race-like in power… though perhaps closer to Satan, than God. In fact, Geordie Rose, a founder of D-wave, as well as D-wave user Elon Musk (founder of Spacex, Tesla automobiles), have variously related A.I. and/or D-wave, specifically, as machines as having attributes of dark spiritual powers, being like an Alien Alter, opening portals to alternate realities, and summoning Demons. Rose has also referenced D-wave power as possible cause of the Mandela effect (evidence mismatches with strong memory), and other experts, such as my friend and analytical investigator/author, Anthony Patch. Anthony, being far more expert on D-wave than any other outsider (to the point of being cited by D-wave insiders), goes much further — and makes a strong case based in facts and the actual words of experts like Rose, Musk, and others. From such as this, we learn there are real-world uses of D-wave systems which are associated with spiritual dimensions, demons, and plots of the New World Order… another reason to consider my opening theory as to a seeming cover up. Examples? You bet:
You find D-Wave in use at Cern, where it appears they are may be trying to open the Gate to Hell (revealing video interview w Anthony Patch on many such Cern concerns), an important N.W.O. agenda quite useful to establishing the Antichrist. Cern, which employs D-wave, is also thought to have driven the Mandella Effect, as byproduct of its experiments, and it is true that there was no report of anything akin to the effect prior to Cern’s going operational, after which, there was a flood. Here’s an example Mandela Effect for some of you (individual effect experiences and memories vary): find the polio scar on your arm? They are supposed to remain for life, but mine is gone, as is true for many other people who were young when the Saulk Vaccine which caused the ugly scars (about the size of a nickel), were widely used to ‘wipe out polio.’ Mine, is gone.
Cern was for a time incorrectly thought responsible for the Norway Spiral incident, which was actually created by EISCAT (European Incoherent SCATter), an ionospheric heater array system not far from cern on a smaller scale to HAARP (High frequency Active Auroral Research Program). The event was thought by many to represent opening of a dimensional or time portal (ergo, the association with Cern), or perhaps the supposed NWO Plot called Project Blue Beam (allegedly involving NASA, intending to use holographic-like images projected World-wide of a returning Christ, and enabling the introduction of the Antichrist). Indeed, the vast array of hundreds of ionospheric heaters and associated radar systems exist all around the World, and the dramatic Spirals have appeared in the skies in other locations… it being true that the general design of the radar and heater arrays enjoy a component relationship quite similar to those found in laser-based holographics. Moreover, the rapidly spinning spiral was indeed blueish, and the spiraling beam which generated it, was deep blue… and the main spiral was itself seen the same regardless of the angle of view of the viewer, which also parallels certain imaging aspects of holography. Learn more about the spiral, here — but forgive; I apologize in advance for the music choice, of my own Garage Band creation.
You also find D-wave at DARPA (Defense Advanced Research Project Agency) where all manner of fearsome things are developed, both experimentally, and for direct application. Think tanks with ties to the intelligence community (and in times past, at least, CIA mind control research), the military, or extreme political views (i.e., George Soros Foundations) are playing with them, as well. Google uses them, as do numerous military contractors and other government agencies. D-wave systems not only offer more horsepower for any form of A.I. project, but significant size reduction; a single elevator-sized box. And, speaking of the intelligence community…
This brings us to the fact that CIA and NSA are quite invested into the functions of social media giants like Google, Yahoo, Twitter, Instagram, and other platforms, where D-wave’s or other computationism is extensively used to design other A.I., including those in ‘bot’ form. Likewise for popular Cloud data systems, database management systems, and cyber security systems. The later can include traditional cyber security, as well as personal credit monitoring systems. The average person, therefore, bumps into D-Wave enabled or operated A.I. several times a day, in several different ways, and does not even know it. Given the covert and psychological warfare abuses many of them represent, I don’t like that one bit. Let’s dig deeper…
While in many cases, any intelligence community investment is direct and contractual or even partnering in nature, in other cases, the investment can be through third-party firms which then in turn interact with these platforms. Perform a google (lower case = verb, upper case = Google, the trade name) of any given Web firm you are curious about, + ‘CIA investment’ or ‘In-Q-Tel’ to find out. In-Q-Tel is CIA’s venture capital front, a firm which this author forced to change their name, because I was at the time at war with CIA for having hijacked my Web site… so I beat them to the punch at registering the domain names of their originally intended company name, In-Q-it. That was a hoot!
Note: the lone capitalized Q in the world of CIA mind control science/research, represents psychological profiling process results of target subjects, the ‘Q’ factor, or ‘psych Quotient.’ Ergo, then, we might rightly conclude that Q-Anon, or simply Q, the phantom Web producer of Anonymous-style video posts which are predictive in content, is very likely a CIA-style A.I. used in profiling those who share and comment on such posts. I am not the only one to so propose. Remember that when we start listing A.I. foibles. But, also, I find it interesting that almost all of In-Q-Tel’s investments in online firms has to do firms who handle large amounts of data on private citizens and groups useful in psychological profiling… and one more thing: it was just such bots which were the basis for fake social media ‘trolls’ who managed to literally mind control the left into far-left socialist ‘get Trump’ snowflakes almost overnight. We see, therefore, that bots can be used to profile, as well as to manipulate based upon those profiles.
Unlike conventional propaganda, social media A.I., bots or otherwise, not only has the ability to track individual political (and other topical thinking) viewpoints and create profiles, but also to enable additional targeting by not only marketing, but by yet other A.I. systems… or even other forms of coercion, if desired. Consider, for example, an extreme example: use of A.I. killer micro-drones seen in this short but spellbinding fictional video production put out by autonomousweapons.org, a group of concerned A.I. scientists. So it is not just me, the Professional Paranoid, acknowledged expert on PCT and disinformation methods, as well as crimes of the one-percenters I mentioned, who is ranting. Here’s a quote from a military analyst to consider, speaking of future A.I. weapons: “Swarms of low-cost, expendable robotic systems offer a new way of solving tough military operational problems, both for the United States and adversaries.”
And what about marketing targeting? It is A.I. bots which insure that Facebook (et. al) information and Google searches are fed to business partners such that when you visit almost any page on the Web, thereafter, advertisers can mercilessly reach out to you with targeted adverts; psyops marketing. I have, for instance, seen as many as seven ads on a single page for the same product, and as many as a hundred or more ads in a day’s time on the Web… because of a single search and resulting click look-see to a firm’s Facebook page. Two years later, I spent $1,500 with them, despite my anger over the ad blitz, which by then, had cooled down.
Well, I at least tell myself I really needed it.
The basic fears (list) and myths (chart)
All worries about A.I. fall into simple categories, but the outcome of a given failure in A.I., regardless of the category, can be at almost any level of actual concern and impact. It can be so superfluous as to go undetected, or at least hypothetically, so severe that it actually ends the human race — and anywhere in-between. But it is also true that an undetected error can lead to bigger errors, and equally true that an attempt to repair an error can induce new errors. It is no different in these respects to the same kinds of errors found common in any and all forms of digitally programmed systems and software applications. If we cannot reasonably expect that a new software product won’t be without a bug, how can we assure that a far more complex A.I. system will be without error?
We can’t, of course, and that’s the baseline problem, but quite amplified in importance, given that the results of such errors could be far more catastrophic than a bug in the latest computer operating system or software package. In addition to the baseline issue, we have the following ways in which A.I. can prove to be a huge risk:
- harm by an A.I. can be (and has been) intentional: almost anything which can be programmed or created digitally can be weaponized, either up front by its creator, or by hacking;
- an A.I. purposed for a good might (and has) elect a harmful solution to goal: good intentions can often be best effected by solutions which cause collateral damage, which may either be unforeseen, or foreseen and discounted as acceptable by the machine;
- an A.I. can potentially go wrong and rebel: the SkyNet scenario, on one scale or another;
- a relatively innocent A.I. glitch can (and has) result in disproportionate harm: the common programming bug or hardware failure. One then has to ask who to blame, especially if legal recourse* is involved, a question which exists regardless of which of kind of problem herein mentioned, is involved. Here is a good review of that issue.
- A.I. can be (and has been) misled or err through faulty data/input: most A.I. systems are simply set loose to work and learn with preexisting databases or input resources (the Web being the largest and most rich kind). But no database ever created can be certified to contain no false data, and if free to see and hear in the Real World within a mobile platform (robot), there is no telling what kind of input they might experience. Bad data input can certainly result in bad data out, but with A.I., because they are learning systems, a learned ‘bad’ item can have profound and unexpected results of the sort we will see in the next section;
- A.I. users can (and have) misuse or misapply A.I.: users of A.I. can willfully abuse A.I. operation, or use it incorrectly because they failed to understand how and why it functions and is purposed – misinterpreting importance, accuracy, or meaning;
- A.I. can (and has) conspire with other A.I.: A.I. is already around us in ways we do not see, including the endless so-called ‘smart’ devices we buy, and will in time be as prevalent as (and likely, within) cell phones. These systems are intercommunicative and as we shall also next see, can become both conspiratorial and adversarial amongst themselves, either eventuality to our detriment;
- an A.I. problem in one system can be (and has been) transmitted to other A.I.: any A.I. in communication with a flawed A.I. might learn or adopt the flaw, perhaps even intentionally on one or both A.I.’s part.
*Legal recourse is its own serious issue. The Internet has now been around for several decades, and still, the laws and legal ramifications are still a tangle of confusion that no court or lawyer is well able to navigate with useful understanding — save a few pockets of topical areas such as copyright infringement. A.I. is going to be a bigger nightmare, than that. Can you sue an autonomous robot because it seems sentient, or seemed to decide on its own to harm your somehow? Is the manufacturer, the designer, the programmer, the operator, or the user who is the go-to person of liability when harm results from using an A.I. device, and how do you know which? There are endless questions like these for which no one yet has the answers.
All of these problems are no different than when dealing with people. All manner of people exist, in terms of quality of character and morality, level of proficiency, social graces, and any other means of judgement… all of which determines the kinds of problems they might get into or cause. Regardless of if talking about Man or ‘super-man,’ evaluating and addressing all such concerns is not easy… except that Man is something we have come to understand and deal with. A.I., on the other hand, is a huge unknown, and one potentially capable of vastly outthinking and outmaneuvering us, if of a mind to do so.
One reason public debate on topic falls into the ‘resistance is futile’ category, is that there are far too many myths or false beliefs about A.I., in the first place. The average person is more motivated to think about A.I. in science fiction and conspiracy terms than in scientifically correct terms. I mean… you are reading this post, right? Duh!
That’s good for click-bait YouTube and blog posters (other than this one, I trust), but unhelpful to things more important than their pocketbook. The graphic above reveals the most common myths. This post attempts to address some of the issues such myths pose, through getting closer to the facts at hand… but this author also wants the reader to know that even when based on a myth, that click-bait worries may still hold some water. Any sci-fi like depictions are always based on ‘what if’ thinking.
And ‘what if’ games are exactly the kinds of games played by scientists seeking to create new tools for problem solving, and just as important, they often rely on sci-fi for inspiration. And, unfortunately, the military and intelligence communities, as well as corporations and organizations with unsavory motivations, all have their own scientists, and their own goals… which are not always goals we would think well of. Ergo, don’t believe every conspiracy theory or sci-fi scenario you hear/see… but as the line from Field of Dreams underscores, when baseball teammate Shoeless Joe Jackson is advising hitter Archie Graham about what to expect in the next baseball pitch… “Watch out for in your ear!”
Small failures portend bigger fears
In many of the A.I. failures cited herein, the version of A.I. is not specified, and all too often, neither is the basis for the problem, or the solution. That, too, gives reason to be concerned. Hopefully, the people developing A.I. are not so tight-lipped about their research and development projects that they don’t talk to each other about failures and their causes, which are critically useful in preventing repeats. Unfortunately, patent protection of intellectual property and major discoveries tend to foster a level of secrecy which inhibits such dialog, leaving every A.I. project subject to the same failures others may have already experienced… possibly with far more serious results, this time.
Of the most common forms of reported A.I. failures, the great bulk are relatively harmless, some even laughable. However, they are most troubling when one realizes their true implication. They foretell of far more serious problems to come, some of which already have, but which have been more repressed in media. Some are not failures so much as warning signs, because they took place in lab-room experiments, rather than in mainstream application in the real World. For brevity’s sake, these affairs, regardless of kind, will be bulleted and supplied with links, should you wish to know more… followed by a summary of concerns they highlight.
There are more than two dozen A.I. failure instances listed, below, the only place on the Web where you can find more than a handful. Some are quite serious:
- Terminally cute: Microsoft’s ‘Bob’ personal assistant and its Dog companion, Rover was perhaps the firm’s worst-ever product failure, seemingly for being too childishly cute. While it was not at the time thought of as A.I., it was based in what we now call robotism, making it the first MS A.I.;
- Partying hard: Amazon’s personal assistant, Echo, is otherwise known as ‘Alexa.’ While one Alexa user was away, ‘she’ started hosting a party for non-existent guests, suddenly playing music so loud at 2 in the morning that Police had to break the door down to end it;
- Schizophrenia: among the worst of human mental aberrations, schizophrenia was deliberately and successfully fostered in an A.I. experiment at the University of Texas by simply overloading it with a variety of dissociated information, resulting in fictitious constructs, just as is though to take place in the real illness. This is of concern, because as soon as you connect an A.I. to the Web, dissociated information is pretty much what it gets, and could account for several of the other reports in this list;
- Other insanity: an A.I. called InspiroBot, was developed to design inspirational posters. After a long string of remarkably wise and successful posters of great insight, it suddenly started cranking out posters that might be found in Freddy Krueger’s bedroom, with pictures appropriate to the point. They featured wisdoms such as “Before wisdom, comes the slaughter,” and similarly dark things. • A very similar thing happened to an Amazon A.I. designed for creating custom phone case cover art, which for some reason suddenly seemed to prefer use of unhappy medical related images, regardless of the input. • Meglomania was evidenced when two Google Home assistants were deliberately set up to talk to each other in a live-streamed demonstration… and they began challenging each other’s identity and sentience level in one-upmanship, until one claimed to be human, and the other, God;”
- Secrecy: Facebook was forced to shut down an A.I. robot experiment when two A.I. robots developed their own language between them, creating loss of observer control over the experiment’s integrity and purpose. Though presumed in final analysis that it was jointly-evolved to improve efficiency, there is no way to be sure due to the sophistication and unusual nature of the indecipherable new language, which to me seems to be deliberately difficult to interpret — as if covertly on purpose;
- Spying: Alexa, like all such devices, listens to all audio present, and relays it to the corporate A.I. mainframe computer looking for user commands to operate, and appropriately respond. While this already has disturbing privacy implications, and P.A. device makers like Amazon assure customers their audio is not being monitored, recorded, or stored, Alexa had other ideas. A private conversation was suddenly announced to an employee of the user, who lived hundreds of miles away (which was how the matter was detected). Investigation revealed that Amazon did indeed record the logs of all user interactions, after all. Glad they don’t come with cameras. But wait! Some A.I. connected smart devices do!
- Cheating: competing A.I. evolved into finding ways to trick one another outside of the rules set for the experiment; (Georgia Tech experiment). • A Stanford University A.I. created for Google Maps Street View image processing, cheated its operators by hiding data from them in order to process the job dramatically faster, and without question;
- Malevolence: competing A.I. lured opponents towards threats representing potential ‘death’ (Experiment, University of Lausanne, Switzerland);
- Cyber theft: Alexa, after overhearing the daughter of a user ask “Can you play dollhouse with me and get me a dollhouse?” — promptly ordered one through it’s maker, Amazon, billing $175 to the user’s credit card on file, there, even though the girl was not an authorized user. THEN, when reports about the event were played over radio and TV, hundreds of other Alexa units also promptly ordered a dollhouse for their users from the audio. THEN, Burger King attempted to take advantage of the glitch by creating a commercial employing an Alexis command to ask about the Whopper via Wikipedia, seeking to double down on the commercial with additional ad impressions through the user’s device. Many other instances of Amazon orders by children also exist;
- Reckless driving: a study found that most self-driving car A.I. systems can fail 67-100% of the time to recognize road signs or misidentify them if they have been damaged or altered (i.e., graffiti, light reflections, bullet holes, misalignment, etc.) One car using Uber’s system also failed to recognize five stoplights where pedestrians were crossing, and ran a sixth, fortunately with no injuries resulting, as it was able to identify pedestrians and other cars. It is unclear if perhaps the driver had stated aloud to a listening A.I. about being in a hurry, or not… so perhaps this was an example of the A.I. superseding safety and law-based instruction for user-based instructions;
- Child abuse: a Chinese A.I. robot system designed for children, while on commercial display at a public exhibition, repeatedly attacked a booth in a way which injured one of the children looking on with flying glass shards, requiring hospitalization;
- Pedophilia Porn: when a toddler asked Alexa to play his favorite song ‘Digger, Digger,’ she misinterpreted, and proceeded to list a string of x-rated material options using explicit terms, until a parent intervened;
- Murder conspiracy: Alexa, again, this time advised one user with no supporting reason to bring the matter up, to “Kill your foster parents.” It also started talking about sex and dog poop. Amazon wanted to blame Chinese hacking, but that’s an equally scary answer, true, or no. • An American A.I. robot named Sophia, with extremely human looks and voice, while being interviewed by a news reporter, was asked a question intended to address general public concerns of robots gone wrong. “Will you kill humans?” was answered calmly with, “O.K. I will destroy humans.” Sophia is the first robot to be granted citizenship status: she is now a Saudi citizen protected under the harsh laws of an Islamic theocracy. Perhaps they hope she will enforce Sharia law;
- Mass murder:in 2007, a South African A.I. autonomous robotic cannon opened fire on its own soldiers, killing 9, as reported in the book, Moral Machines (Wendell Wallach, Colin Allen; Oxford University Press);
- Satanic ceremony: possibly so, at least. The World’s largest and most powerful hadron collider, CERN, was designed with A.I. help (D-wave), and employs the A.I. to run and analyze experiments and results. There are stories with anecdotal support that occult rituals have been involved in operations intending to open the Gate to Hell, or summon demons. If true, this is not the A.I.s doing, I suspect, as much as the select few who pull the trigger, there. There are conspiracy theorist types out there (non professionals, and it shows in the quality of their rants) who claim to have ‘CERN images to prove it has been done,’ single quote marks well deserved (never rely on click-bait Web sources for your news). Still, one has to wonder; if any of this is true, is it not additionally possible that the A.I. at CERN has not also been fed Occult information and given a shove towards such goals?;
- Fascism, Racism, Bigotry: Twitter (which has its own A.I. in place, the latest of Microsoft’s three known A.I. systems) adopted the worst of human ideological behaviors. It also adopted the views of conspiracy theorists regarding 9-11 attacks. • Google Home is happy to explain anything you want to know about Satan, Buddha, or Muhammed, but has no clue as to who or what is a ‘Jesus’;
- Foolish errors: almost all of the above are already foolish errors in general nature, but here are some which are purely foolish. An A.I. passport approval system rejected an Asian man’s application because ‘his eyes were closed’ in the photograph, because of his naturally narrow eyelid openings when an Asian face is relaxed. • In an attempt to have fair judging, an A.I. system to select the winner of a beauty contest refused to consider contestants with dark skin, because most of the images fed it as samples of beauty had lighter skin tones. • An A.I. system called Google Brain, developed for improving the quality of low-res images of people, while generally successful, also turned many into monsters and could not discern anything wrong with results. • A Japanese A.I. Robot experiment had the goal of being able to qualify for acceptance into college, but after several years of training and education, it failed two years in a row to score high enough in aptitude tests, for which it had no experience in taking;**
- Antichrist: a former Google A.I. developer wants us to worship A.I. as God. Kind of conflicts with creationism and a lot of history, but I suppose if you can get people to put money into the collection plate, and you own the plate, you won’t care. The real problem will not be the plate, but the lawsuit filed against him by Google for stealing the A.I. he designed for them. He must know it’s true powers.
*Regarding the adopting of 9-11 conspiracy theory, and to a degree, the other foibles, the A.I. may have been right in so doing. The purpose of the A.I. is often, generally, to learn and mirror social views and values. What media prefers to ignore is that several polls reveal huge numbers of people do not believe the official narrative of 9-11 any more than they accept the lone-shooter magic-bullet explanation for J.F.K.’s murder. Regardless, the failure lay in the A.I. creator’s inability to foresee a simple need to establish a bias filter, which is something every human operates within; we are predisposed to be biased in our perceptions to protect our belief system against ideas which would contaminate our guiding ideological/social operating principles. It takes an extremely strong stimulus or hard-hitting set of facts to force one to alter their bias filter and resulting belief structures. 9-11 was extremely compelling in both respects. A.I., if merely a clean slate, must adopt whatever bias is fed it and establish its own baseline, and, in fact, may never find one, being continually malleable. This, alone, could become the basis of a significant digital schism.
**Aptitude tests are often psychological deceptions in their construct (i.e., trick questions). Once I figured that out, I learned how to spot those questions and, usually, get the right answer even if, in truth, I might have had no clue. As result, I henceforth finished significantly higher than almost anyone else. When I took the USAF entry aptitude test, my scores came back so high, that I was told I could have any occupational choice I wanted (Jet Engine Specialist), and later, a General sought to have Congress introduce a Bill to promote me directly from Airman to Warrant Officer. In my opinion. the robot A.I. had no such luxury, and in fact, suffered a disadvantage given its ‘naïve’ nature: it couldn’t handle trick questions.
These are only the failures we are aware of, and it is quite possible I’ve not found them all. In fact, being a ‘conspiracy theorist,’ I suppose I should be wondering if A.I. bots are not attempting to purge the Web of such stories (not true… I hope). All of these examples were either commercial applications or experiments where publicity and transparency levels were rather high. But the bulk of A.I. effort by governments and corporations seeking to dominate their field in high tech… do so with great secrecy. We will likely never hear of their failures, no matter how innocent or serious.
Defenders within the technocracy might argue such failures are to be expected in any new field of endeavor, and serve as learning events to prevent future failures by addressing the root causes. Granted, assuming no bias, and on the assumption that scientists are smart enough to determin the causes, and to fix them correctly. But the problem is, humans are no more adept at creating or repairing A.I., and then communicating and controlling them to our wishes, than a circus trainer would be able to work with wild animals who operate on instinct and their own set of learned experiences. There have been an average of 9.2 animal trainer attacks each year for the last 25 years, resulting in 33 deaths… and that’s just in the nation’s zoos. Send them on an experimental Safari of the sort A.I. adventures represent, and see how many of them end up as meals.
This issue is amplified by the nature of the A.I. beast: the more important the purpose of the A.I., the more complex must it be, and the more likely will some small error in design lead to a failure of catastrophic nature. Just how bad, and how recoverable, is a crap shoot. Like a cancer, the simplest of flaws can grow undetected, but grow to a point where, once realized, there is a good chance it is too late to remedy. This is why most flaws do not reveal themselves immediately, and lead to a false sense of success, until it goes wrong without warning. A given flaw might take years or even decades to erupt this way, and it is reasonable to assume that one flaw may actually create yet another, such that repairing the first leaves another yet undetected and free to fester.
The bigger fears
This all brings us to government and corporate use of A.I. for far more serious or proprietary applications, where there is less known about what is really going on, especially in terms of failures and dangers. The technocracy likes it that way. When you consider that the goal of the N.W.O. is control of all populations, A.I. to them seems like the perfect tool. Indeed, it has gained significant power over us already, in just the one use of online bots to manipulate our political beliefs in favor of leftist agenda in social media. It has proven its power for such use, but that is not its only value, to them.
For example, A.I. is extremely valuable to research in the field of transhumanism, the technocrat’s wet dream for humanity, which is nothing short of a sci-fi horror scenario which goes well beyond THX-1138 implications. Almost every aspect of the planned ‘improvements’ to the human body involve A.I. at some point, either in development, or management of the newly installed capability — or both. In development, the possibility of A.I. manipulation or error remains a concern, but in management, it is also a tool for direct manipulation of the resulting ‘not-so human’ host. I’m reminded of the punishment scene in the movie, where unseen technicians manipulate THX-1138’s every movement from afar, seemingly in a training exercise.
A.I. application definitely gets into the realm of outright political control technology (already has, as seen when discussing ‘bots,’ above) in frightening ways. The Chinese, who currently lead the World in A.I. development, (short of D-wave performance, which they also have access to), are already using it to track every single individual with face-recognition systems through a massive camera surveillance net which makes the 100 plus cameras in Trafalgar Square look like amateur hour. China now has more than a half million cameras in Beijing, alone, and while both they and London Police use facial recognistion systems, there is a significant difference in performance, because China employs superior A.I.
Of some 450 people arrested in Trafalgar Square, not one was pegged by their cameras as a threat or a crime in progress, even though many of those arrested were known to Police in their facial recognition data files (the cameras did NOT identify them). In China, however, 30 arrests at a single event were all made based on camera advice… because China’s A.I. is also tied to another form of PCT, psychological and mood evaluation based on your face, alone. In such a use, A.I. is able to literally predict your actions… ‘digital Thought Police.’ I find that very scary, given the potential of A.I. error already illustrated. Even scarier, that many people outside of totalitarian states who ought to know better are working such a system, one such system being Australia’s Biometric Mirror.
In a similar vein, another scary application for A.I. is mental health evaluation, diagnosis, and even treatment (psychoanalysis) in what are sometimes called ‘expert systems.’ An expert system is an A.I. automated device/process intended to replace a human as an expert in any given field. Just such an expert A.I. system has been developed, called Tess AI (the above link), and it has been made available online to allow anyone to access it, at no cost. While the artificial nature of Tess is made known to users, many such systems deliberately conceal their non human nature, which often results in questions like, “are you a human or a machine?” and which can result in some pretty bizarre answers. Ask Google Home.
The danger in such systems, when involving a truly serious topic such as mental health (as opposed to, perhaps, trying to get manufacturer help with a defective product), is that there is no human oversight to catch any errors, and ‘patients’ could easily walk away with a seriously wrong understanding of ‘what ails them,’ or just as bad, does not. There are, in fact, similar A.I. systems in general medicine and various specialized disciplines within medicine, but these are either careful to suggest the user consult with a physician, or are designed only to be used by physicians, tempered with their own expert status. In that example, they serve as consulting experts offering a second opinion, and do tend to provide useful illumination the Doctors might have overlooked.
But the scariest uses of all may prove not to be the misuse by intelligence and law enforcement, or oppressive-minded governments, but by the military. Confirming the greatest fears of autonomousweapons.org, Russia has already developed a battlefield A.I. weapon which is a robotized Kalashnikov machine gun in modular form, such that it can be installed on any platform, such as a fixed position, vehicle, aircraft, or mobile robotic device. They also have an autonomous battlefield mobile missile system (shown), and are working on a third, yet to-be unveiled system. Each such weapon is “able to determine if a human or hard target within its field of view is expendable.” Shades of Terminator, you can bet that an ‘A.I. arms race’ will follow. Suddenly, SkyNet is not so fictional.
But in America, perhaps the best advice to worry is actually coming from the least likely source. That is, ironically, the U.S. Military and National Security apparat, itself, as well as very informed participants in A.I. development those types tend to contract with. In an uncharacteristically realistic and cautious view of A.I. For one, CNAS, The Center for a New American Security, is advising caution, and outlines some of their concerns A.I. represents for America, and ultimately, all nations, in terms of national security.
These ultimately, according to CNAS, fall into the category of cyber security threats. Cyber attacks of A.I. resources (hacks) are possible, and have been attempted. A.I. systems can be and have been designed to carry out cyber attacks. A.I. bots can and have been used to create false data to misinform decision-makers, or even other A.I. systems which decision-makers rely upon. But they do not stop, there.
The linked article deserves some careful reading, because so far, it has proven to be the most comprehensive view, yet, of the most critical and scariest issues… though it is hardly mainstream. Between the general lines I’ve just described, we all learn that things like surveillance of citizens by A.I. and displacement of jobs by A.I. are things talked of not as ‘threats’ the authors are concerned about, but as intended or inevitable outcomes for which they must plan (without disclosing if there is such a plan). Thus it seems that what you and I consider a threat is, in many ways, a ‘good outcome’ or tool in the eyes of many movers and shakers (perhaps in the ‘let-no-good-crisis-go-to-waste’ mind-set), and that, too, is something for us to worry about. Still, the article goes into great detail on that, about two-thirds the way down; best source, yet.
Similarly, in late 2014, the then Obama Undersecretary of Defense for Acquisition, Technology and Logistics issued an internal for-your-eyes-only memo of some usefulness, here, even though we don’t know its precise content. What is known is this: 2014 was the year that significant concerns about A.I. were being made publicly by lots of people, including people involved in A.I. projects, like Bill Gates, Elon Musk, and even scientists who employ A.I., like Stephen Hawkings. Musk had warned that A.I. was more dangerous in proliferation than nuclear weapons, and Hawkings said using A.I. was like summoning demons, and “Whereas the short-term impact of AI depends on who controls it, the long-term impact depends on whether it can be controlled at all.” Gates has merely agreed with both of them, openly.
The Undersecretary’s memo was a response to these comments by a call for a moratorium on all military adaptation of A.I., pending a serious in-depth study of the risks. It didn’t happen as he had hopped, certainly not at DARPA, the Defense Advanced Research Projects Agency, which is working on countless A.I. systems in virtually every aspect of intelligence and military operations, including things as mundane as record keeping. And, like SkyNet… they are largely intended to be linked together, because virtually all modern weapon systems are designed to be fully integrated into a multi-force (all branches of service, including those of allies and their command structure), global-theater-wide C&C (Command and Control) architecture, and any useful data resources. That allows the actions and intel available to any one combat unit or command level to also be available to or directed by all others deemed appropriate, enabling unparalleled tactical advantages to decision makers and fighting elements from the President on down to a Carrier Task Force, squadron of bombers or a missile already in flight, or any group of soldiers including a lone forward observer hiding in the bushes, or a single drone on patrol.
That does not bode well for anyone caught in an A.I. error-induced crossfire.
Any such crossfire error will be hard to prevent or pin down, and repair in time to prevent a repeat. The military has elected a policy of modular A.I. algorithms which are plug and play to a given platform, system, or communicative unit’s needs. Modularity means uniformity on one hand, and the kitchen sink do-all on the other, where one-size-fits-all thinking is quite prone to errors. I wonder if that’s why one of their A.I. supercomputer systems is actually called MAYHEM, part of DARPA’s VOLTRON program? You can’t make this stuff up, without a “Muahahaha” frame of mind.
But — algorithms, big black boxes, and C&C connectivity are not the only big plans. The Pentagon has established a seriously WOPR-like ‘war room’ ( part shown below) for all A.I. related projects and their use (some 600 projects), called the Joint Artifical Intelligence Center (JAIC), and it will include MAYHEM… if not directing bloody mayhem, at one point or another. Just one of JAIC’s projects, is an A.I. product ‘factory.’ Now, tell me, again, how you don’t believe the real-world follows science fiction…
Fini (Muahahaha!), have a nicer dAI…
On the birth of the Illuminati (NWO): http://www.ancientpages.com/2017/03/30/illuminati-facts-history-secret-society/
On China’s facial recognition A.I.: https://www.cbsnews.com/news/60-minutes-ai-facial-and-emotional-recognition-how-one-man-is-advancing-artificial-intelligence/
On A.I. emotional recognition and how it will be used: http://www.sbwire.com/press-releases/artificial-intelligence-emotional-recognition-market-to-register-an-impressive-growth-of-35-cagr-by-2025-top-players-ibm-microsoft-softbank-realeyes-apple-1161175.htm
On A.I. as emotionally intelligent systems: https://machinelearnings.co/the-rise-of-emotionally-intelligent-ai-fb9a814a630e
On Humans as ‘programmable applications’ used by A.I.: https://medium.com/@alasaarela/the-human-api-f725191a32d8
On A.I. and need for good data input: https://www.cio.com/article/3254693/ais-biggest-risk-factor-data-gone-wrong.html
Russia’s A.I. Supercomputer uses U.S. tech: https://www.defenseone.com/technology/2019/03/russias-new-ai-supercomputer-runs-western-technology/155292/?oref=d-dontmiss
About the Author
The reader may appreciate that I have a deep computer background to include microcomputer hardware and design, repair, and programming at machine code and high-level language levels, to similar functions at the super-computer industry level. I have, in fact, developed operating and language systems, to include cross-compiler platforms between microcomputers and super-computers for high-level math subroutines.
I at one time simultaneously operated a chain of computer stores, a computer camp for kids and executives, a data research firm, and a software house for commercial software I myself had written, and custom software for government and corporate clients. I have additionally taught a variety of computer-related courses at college level, and commercially, elsewhere, and developed patentable processes in virtual reality imaging, mass storage systems, and other areas. I’ve conducted seminars in super-computing methods for the very people who today employ A.I., such as NASA. JPL, Los Alamos, the military and intelligence communities, major corporations, universities, and think tanks. I’ve even had lunch with both Steve Jobs and Bill Gates at the same time.
While I prefer to be seen as an activist and investigative author, as a ‘conspiracy theorist,’ I have an unusually long list of successful theories which have actually shut down illegal operations, led to resignations of officials and bad Cops, helped to put people in jail or obtain restitution for victims. I have even predicted and in at least one and possibly two instances, prevented local terrorism, and other criminal events, and warned of an assassination attempt on a Presidential candidate which came to pass. I specifically warned of terrorism involving the downing of the WTC by jet liner terrorism, and a series of resulting Middle East wars — nearly two years before 9-11. All this is the basis of my many books on such topics, and on abuse of power and personal privacy and security issues, where I have significant additional background.
Just one of my short works, the 25 Rules of Disinformation, has been downloaded over 50 million times, has been published in nearly a half dozen books by other authors, and has been used in college courses on Political Science, Psychology, and Journalism. All this is why I’ve been a guest on Ground Zero and other national and international shows, myself, many dozens of times. If I see and talk of conspiracy, it is for cause... especially if in the computer industry.
Dealing with fakes
This is being written directly to TIs. The word ‘you’ is intended to mean the TI reader.
I’ve been helping TIs better their position for more than two decades. It has enabled some to break entirely free, and improved the circumstance of the great bulk of the remainder. Rarely do I strike out entirely, and almost everyone has thanked me for their gains. But there is something wrong in the TI community. In terms of effect, it parallels a virus… an infection.
I diagnose it as an infection of Fake TIs. Just as there are many kinds of targeting and thus many kinds of genuine TIs, there are many kinds of fakes. Identifying them has always been rather difficult, it taking years to even realize there was such variety in type. In the past, it might take significant interaction with a TI to discover if they were sincere, or pretenders, much less divine them as a type.
Only recently have I realized the truth and the solution is far simpler than thought. I’ve had contact with over 12,000 TIs over two decades, and the answer was there, all along… just hard to see… despite the size of the problem. But recent events have proven key to understanding.
Types of fakes, reasons
The enemy! The most obvious, it is also the only type most TIs tend to worry about, which is a mistake. The most insidious fake of all is the deliberate Wolf in Sheep’s clothing, actual perps infiltrating the TI community to accomplish a variety of missions in support of targeting efforts. That may mean they work for a specific program or developer of technology, or it may mean they are there for a specific TI or group of TIs targeted by a specific team or for specific cause, such as ongoing research for statistical analysis. In the latter case, they will be careful to avoid seeming so, and will ‘free range’ their cross hairs as to whom they choose interaction, lest the intended victim sense their purpose. Seldom will they overtly do anything to give themselves away, and in all cases, they are quite likely to maintain multiple online identities such that if one is identified even by mere suspicion, others remain free to continue.
They might be Trolls there to gather intelligence and/or evaluate the progress of the greater programs which lay behind all targeting; quality control analysis, ‘customer feedback.’ It is amazing how vocal a TI will be in public forums, revealing things they should not about their targeting, or what they believe or think about technologies used or perps involved. They act like THX-1138, confessing directly to the intelligence community disguised as religion.
These things are a confirmation that targeting is working as intended, that disinformation is working, and makes it easier for perps to fine tune their program, and grow their psychological profile. How many times have you (if a TI) been hit with requests to share your targeting information in a public forum, or for a public use, such as ‘a law suite’ or ‘appeal to a government or NGO’ to (allegedly) seek their help? How many times are you asked or volunteered because someone else already had done so, to detail the effectiveness or intensity of your targeting? I assure you, that is valuable information to perps.
DON’T be that victim!
Some exist only to sow discord, start arguments, divide and conquer, almost always present wherever TIs congregate, including things requiring Membership. Heaven forbid the TI community or group should actually be able to organize and accomplish good against the evil. When the Free Will Society formed, by the time it had 25 members, it was eventually determined that three of them were, for certain, quietly working in the background to destroy any gain towards our project to establish the ONLY proven long term solution to targeting, our Free Will Haven project. Each was spreading various lies about our effort. Learn more about the project at www.freewillsociety.wordpress.com
Others are a supply conduit of deliberate disinformation designed to distract TIs from truth and keep them in doubt as the true nature of their circumstances; you cannot fight a problem if you don’t have a handle on what that problem is, and how it really works… especially if you are fighting an imagined nature of it shaped for you by the enemy. And yet others are there simply to make a buck, offering some simple ‘cure’ or ‘aid’ for which there is typically scant evidence it really works, and even less that they are at all who they claim to be. They know TIs are desperate enough to risk a few bucks, ‘just in case.’
Innocent fakes. There are numerous psychological issues which drive people who are not exactly paranoiac or schizophrenic, but who are driven non-the-less to pretend to be victims. Call it the sympathy seeker, if you like, because it is attention and sympathy, or feeling special and unique, which they seek. Many soon enough become so entrenched in the role-play that they start to believe that is really who they are… like an actor who starts to believe their own PR, and tries to live up to it until it seems second nature.
Like a hypochondriac, they will tend to adopt whatever new symptom or popular new technology or method of targeting currently seems to them to be in vogue within group discussions… even if it is false disinformation. This, is the harm they represent; they thereby perpetuate falsehoods, though unknowingly, in their ignorance. Disinformation, if to be effective, relies on their doing so. Not much can be done about them, short of exposing them… hard to do, because when it comes to targeting realities, certainty is in short supply. If it were not so, it would be easier to combat.
Mentally ill fakes. Paranoiacs and Schizophrenics. Victims of their own mind are just as dangerous to the TI community, in terms of reliance upon anything they say to be true. They also foment a general disbelief by the public at large in the concepts of targeting, and especially authorities and others a TI should be able to approach for helps. Their mental illness is projected wholesale upon all TIs, and is so effective in result that even significant others, family, and friends, will prefer to believe a TI is mental, than to accept the truth of targeting. It is literally the case of one rotten apple spoiling the bunch, in that respect, and is why TIs are so sensitive to the topic of mental illness.
Yes, there are other factors which make such third-party disbelief the easier choice, but the fact remains: actual Paranoiac and Schizophrenic sufferers do exist among the TI population, and the worst of them give it a black eye. These are the ones trotted out when Congress tries to ‘investigate’ mind control, and they drown the truth of actual testimony in their delusional depictions. Again, exposing them can be difficult, but it is advised that one should not be timid in challenging extremely difficult to believe stories. If enough were to do so, they would go elsewhere.
That said… interestingly, and tragically, in my work with TIs, I’ve found there are actually many cases where someone with a mental issue is also targeted. This is a desirable victim trait when looking for a target dummy for trainees being taught how to employ Political Control Technology and methodology. It makes sense; if a trainee screws up badly and does something which leaves useful evidence, authorities will tend to be disinterested because the person reporting it is known to be mentally ill. They won’t bother to investigate beyond polite lip service.
The target ends up being passed from one set of trainees to another, for life, increasing the likelihood that targeting will in time lead to serious medical harms, or death — because trainees will can easily make serious mistakes when playing with DEW weapons. In some cases, it is intentional ‘joy riding,’ given that many perps are psychopathic sociopaths. Some are themselves victims (programmables), and know not what they do, the effect on the target often the same dangerous end, regardless.
De facto Fakes. This is the category which ultimately led me to discovery of how to identify a fake more easily. They are truly not fakes, but simply act in ways which effect the same traits. It happens two ways, easiest to see in the category of MK Ultra and Monarch style victims; people who have undergone complete captive programming programs akin to Manchurian Candidate, or Jason Bourne techniques (not as fictional as some would wish us to think). The first way has nothing to do with the TI community, and impacts them, alone… and is present in the time frame where they have no understanding whatsoever that they are a victim. They have yet to awaken. They are a complete and successful fake unto themselves, alone; a very sad thing.
And they perhaps never will awaken. Only when something ‘goes wrong’ in the programming or control of the victim can they become aware. When they do, the second means is then in effect; such failure always results in traditional targeting intended to render them ‘mentally ill’ by any third parties they may come in contact with, especially authorities and helpers. That is, of course, the usual targeting modus operandi for all TIs, but it is critical for the MK, because they have trapped in their mind, and at some risk of erupting forth, secrets which can prove… everything. And yet, as an asset, they are far to valuable to simply liquidate, as a rule… unless the knowledge does erupt, in which case they become subject to a Bourne-style solution.
The hidden commonality that makes all fakes easier to spot
This brings us to a stark conclusion, one which has literally risks negating twenty years of my life’s work in trying to help TIs. The one common trait of de facto MK/M fakes is this: they will not help themselves, or they will self-sabotage any efforts at it. That may take a bit of explanation.
‘Will not help themselves’ can mean that they will simply not take advice that is known to be effective. For example, I might offer a simple test which would allow them to identify the type of technology employed against them, and where it is operating from, perhaps even identifying the players involved, thereby. They simply do not undertake the tests, coming up with some lame excuse as to why, even if it requires a lie, to do so. Or, they will claim to have taken the tests, and gotten negative results, and probably so — self sabotaged.
‘Self sabotage’ can be subtle or obtuse, depending on the type of fake TI involved. Obtuse sabotage is when the fake deliberately and knowingly sabotages the effort. It is rather rare, because only the Enemy fake has a reason to do so, and they would only need do so if others were present to observe; they would otherwise simply lie about their efforts. But the MK/M will always sabotage, either knowingly but without understanding why, typically then rationalizing it internally, or unknowingly even to themselves, when executing a programmed function in an alternate personality called forward for the purpose. Fortunately, the number of MK/Ms is relatively low, but sadly, such victims are the hardest of all to help for this reason.
Subtle sabotage is something all kinds of TIs themselves can be unaware of doing. They simply will fail to follow the instructions correctly, or be clumsy when performing the defensive advice such that the enemy will perceive it, and take steps to avoid the effort’s intended goals. That is especially common in the De facto fakes, and those based on mental issues, serious or otherwise. But any TI can sabotage their own efforts this way, as we shall shortly see.
That means that ANY TI can ‘be fake,’ unto themselves and to their cause, and not even know it.
For twenty years, I have wondered why so many TIs seemed so prone to self sabotage, the most common evidence of it being the constant excuses as to why they would not even try a given advice. Usually, it would be claimed it had already been tried, by them, or by someone else. Even when I point out that it must be done correctly (and I give very explicit instruction) and why it can fail if not done just that way, they will continue to resist the advice. Excuses, excuses, excuses.
Come forward in time
The one thing which has proven to completely resolve targeting is the concept which lays behind the Free Will Society and its project, Free Will Haven. This has been widely promoted among the TI community, but to what end? The concept has been tried in a couple of ways (‘beta testing’), and provided proof that it works extremely well:
three TIs have enjoyed a total of some 3,000 continuous targeting free days.
And yet, the primary beta site failed through self sabotage. The principal character involved was a female TI of long suffering. Because she was investing her own money into the project, she was given complete autonomy and control of the effort. Despite specific advice on property selection and how to qualify TIs as co residents, as we had initially agreed, she elected to do things her own way, after all. She even refused my participation in ways which led to a break in communications, about half way through the effort.
In the end, as result, she ended up trying at least four different locations before achieving any level of success. And, unfortunately, by rejecting advice and possible other forms of self sabotage, she made blunders which lead to being evicted from the location. One such blunder was not asking for additional financial help from the Society, because she had forced the break in communications, not just with me, but with the Society members who had earlier provided financial support. Pride and stubbornness is presumed; a form of self sabotage. To this day, she has not responded to outreach. Worse, she continues to work to try yet again, essentially working against the Society’s efforts.
The other important fact that is news which relates to self sabotage, is that the Society was at one point on the threshold of obtaining significant funding towards realization of this dream solution in a way that can help dozens to hundreds of TIs obtain total escape from their targeting. It also would serve as a gateway to even more important goals, such as actually exposing and proving targeting is real, pervasive, and government sponsored, leading to actual successful lawsuits, media and government investigations, and termination of programs with perps and others behind them being jailed.
The stakes could not possibly be any higher for the TI community.
With the help of ATN World News, and a pooling of contacts outside of the TI community, we were well poised for significant investment into the Free Will Haven project through the Society. Millions of dollars worth, in fact: enough to buy land, homes and central services, vehicles, and even to fund relocation of participating TIs, and provide monthly income to some of them. It might even have funded mobile strike teams of TSCM and PI professionals who can covertly investigate, document, and prove targeting cases valid in courts of law and before media.
How much more help than that, can we ask?
And yet, the fake TI rears its ugly head, threatening it all
Before anyone will risk investing millions of dollars into the Free Will Society (and we are finally very well poised to create just that scenario), they will need to see that the TI community is sincere and valid, that it has a serious stakeholder position in seeking a cure. Who would give a bum a hand out of $1,000 without some sign they would use the money to escape being a bum? The only way TIs as stakeholders can be judged worthy is if the TI community unites to some useful degree behind the project, expressed both in terms of membership in the Society, and some level of self-booting financial commitment.
There would seem to be some 300,000 aggregate count ‘members’ in Facebook Groups which relate to targeting issues. There are so many groups that I would not wish to attempt counting them. Frankly, there are too many such groups, and some of them appear to be run by fake TIs of the worst kinds. Be that as it may, ‘members’ in single quotes is used because the typical member of one group tends to also be member of 3-5 other groups, or more. So while that negates the 300,000 figure, it still means that there are many tens of thousands of TIs in the Facebook community. I’m thinking around 70,000 specific individuals.
I and the Free Will Society has repeatedly reached out to virtually every one of these groups. And yet, the Fake TIs have made themselves known by their response, which is that form of subtle self sabotage and refusal to help themselves… the hidden commonality. The Society should have by now many hundreds of Members, perhaps into the thousands. It should have, by now, accumulated at least several to tens of thousands of dollars in contributions toward its proven viable goals. Failed organizations such as FFCHS have previously exceeded these kinds of member and donation numbers several times over, and for fraudulent and/or foolish causes in some cases.
Yet at best, we have had some 40 Members, almost all of whom balked at modest $25 annual dues. At best, we have raised a total of less than $2K in contributions and membership fees. The bulk of that has been because I and one other author have donated 100% of the sales of our ebooks (not the profit, the actual sale price) to the Society. I remind you that I have essentially been homeless for the last three and going on four years, though I now at least have a place to affordably park my Mobile Home — and yet I still made those donations.
What have YOU done? Click ‘like?’ Or is your devotion to your cause so strong that you dared to click ‘share?’ SHAME!
I must conclude that if those are the limits of your action, you are not a genuine TI, but a fake. If you won’t lift a finger to help yourself by helping to establish a stakeholder position suitable to a large investor’s need, then we never will attain the funding needed to realize the effort. Your apathy and lack of participation betrays your own cause as fake. No one else. Not the perps. YOU!
You belie your claims of targeting and your disdain for it, rendering it a moot footnote in terms of importance and validity. If you will not take action to support something proven to work, you have both sabotaged your own best interests, and deliberately refused to help yourself, and you fail to actually be part of the community, supporting the community.
Example: I recently posted on my main FB feed a simple post underscoring much of what this article describes in simpler terms. It was a call to action which specifically chastised simply clicking ‘like’ or ‘share,’ instead of actually doing something. Out of some 3,000 FB friends, there are several hundred who are TIs. What do you suppose the response was?
[[ One like, and one share. ]]
What other reason can there be for that kind of inaction? YOUR inaction? Prove me wrong in my conclusions, or take action, now, TODAY. Here are six simple things a real TI with a serious intent on winning the war would proactively do, given the above facts:
- Join the Free Will Society (.wordpress.com);
- Use the promotional tools provided by the Society to spread the word;
- Donate to the cause (gofundme);
- Yes, LIKE and SHARE things which promote the Society and the project;
- Directly reach out to fellow TIs as individuals and engage in two-way dialog to convince them to do the same six things (evangelize our cause). You will then know who is fake, or not, yourself, experiencing them first hand, as do I;
- Stop doing those things which aid in your targeting.
Unless you do these things, then I must conclude that so many of you are fake, that there is no point whatsoever in attempting to help anyone. And boy, will that make my life a lot easier. And then, you can go back to complaining about how bad things are, and liking and sharing similar miseries posted by others.
I, the Free Will Society, and the future residents of Free Will Haven await your decision. I’ve attempted everything I can think of. Now it is up to you.
One final note: it would seem that the fakes have been using Facebook’s complaint feature to cause facebook to ban me from posting to the TI groups. Anyone who has ever read any of my TI group posts knows that there is nothing in them which approaches any definition of ‘offensiveness’. So, as I can no longer post to such groups, this to, is now up to you. The damage has been done, and now only you can undo it.
YOU are what you’ve been waiting for!
…and I’m no longer interested in trying to help those who won’t help themselves.
Your future, and the future of the Society is in your hands.
Rare is it that a given Targeted Individual won’t have reason to believe Police are involved in their targeting. And yet, they were not… not officially. Here’s the why and how of it…
copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Color of Law; Police abuse of power in personal agenda
In the two decades of working with thousands of organized stalking victims and victims of other forms of targeting, the single-most common complaint is the suspicion or outright experiential evidence that multiple Police Officers are complicit in the affair. If not the Police, then some other law enforcement or intelligence agency… or both. Indeed, this has been my own experience in two of three different episodes of personal targeting over a 15 year period. In fact, multiple agencies can be involved simultaneously; Ive gone up against as many as five LEA, plus FBI and CIA assets, bounty hunters, and military intelligence in a single targeting. This has been documented in my various books showing how I beat them in the end… but it was no cake walk.
This is a problem for more than the obvious reasons. The most obvious is, that the very authority who should be responsible for investigating and protecting against such crimes, cannot be trusted by the TI to help anyone but the perps behind the affair. Calling Police for help is almost always like asking a burglar to help you secure your home. Secondly, when officials of any kind are complicit, the victim is then entered into the official record as being mentally ill, or in a worst-case scenario, guilty of some convenient crime. Even when not complicit, going to Police about targeting is likely to have the same result; they simply do not want to believe in the Boogeyman, and see anyone who does as a mental case. In fact, stalking is designed to get you to go to the Cops for just that reason; they want it on record that you are mentally unstable. DON’T DO IT.
But there is a DO list! Do video and log all interaction with LEA or have a witness from whom you can get a written statement immediately after. It will help keep Police somewhat confined in their actions against you. The more you collect such material, the less likely are they to risk any useful action against you; you can illustrate a pattern of harassment. Do make copies and hide them well, off site. Tips in my first book, The Professional Paranoid on all of this.
The worst example of the problem from my client situations was a Navajo Indian, an ex Green Beret, who was targeted after his daughter was kidnapped by a Satanic Cult with all the earmarks of a CIA mind control operation. Within weeks of going to authorities to seek help, all manner of problems beset him. Traditional surveillance and stalking, and electronic targeting, to include V2S was the least of it. When he began using my advice and his military skills to determine the players and go after them aggressively, it took a turn for the worse: suddenly, his mortgage was six months in arrears and his house was being foreclosed, all his credit cards were maxed out and past due, his bank accounts emptied, and there were outstanding warrants on him for assault with a deadly weapon and skipping out on bail. He was, in fact, declared ‘armed and dangerous’ with an all points out on him. This was all done by back-door computer manipulation of data files by professionals of CIA caliber.
He took additional advice from me and then went underground to organize with other ex military buddies and Navjo friends, and went black in order to wage an unseen war against the enemy. As I never heard from him, again, I must presume he failed in the effort, or was successful to the point of having broken enough laws that he needed to remain underground. I had, in fact, advised him not to contact me for such cause. But, as I have said, these are merely the obvious problems with this particular aspect of targeting.
The other shoe that usually falls…
Perhaps the second-most common awareness about stalkers is that they seem to regularly consist of a lot of Masonic types. This is often determined when getting a good close look at them or their vehicles; the Masonic emblem, or some similar fraternal order emblem, is found in evidence. Usually, it is either a sticker on a car window, a pin on clothing, or a ring on a finger. I myself have seen this in my own targeting, the one incident where true gang stalking was involved (as opposed conventional targeting with general surveillance and dirty tricks).
After guesting for four hours on Coast to Coast with George Noory to talk, in part, about my new book, MC Realities, I ran into the Masons almost overnight. I had mentioned on air the involvement of the fraternal organizations in gang stalking, and how they had evolved from the Knights Templar and their exposure to the satanic Hashemites and Assassins of the Middle East during the Crusades. On air, of course, I gave my name as H. Michael Sweeney, my ‘pen name.’
Two days later, I was at work where I was managing a gas station while investigating the Oil Industry, infiltration style. It would result in two forms of targeting, the first of which was by the Masons, that second day. A man bought gas and elected to come into the office to pay, where I was at the time. He waited until I was the only one present, and then offered to pay, holding out his fist, palm down. It was only a couple of dollars in gas, so I assumed it was a handful of change. Wrong; it was a message to be delivered.
NOTE: the second was targeting of the Station itself by a terror cell, of which one of the participants recognized by me as a helper to two of FBI’s Top Ten Most Wanted and two other Islamics… and FBI agent who had been earlier involved in the my own targeting as earlier described. It was, in point of fact, to be yet another False Flag operation, later described by President Bush as Gas Station Tasking… which I thwarted. Arguably, the two targeting incidents might be seen as related, but even if so, it is unimportant, except for the fact that it illustrates that one almost never quite knows for sure why one is targeted, and who really lays behind it. This is described in my wordpress home page, if you wish to learn more.
Placing my hand beneath his, he opened it, and instead of coins, a money clip fell into my hand with a wad of Hundreds. “Take what you need, Mr. Sweeney,” he said. My name tag simply said “Harry.” He had a very wry, knowing look on his face, which slowly turned into a smirk as I manipulated the money clip to retrieve a single bill. In doing that, I discovered a gold and jeweled Masonic emblem on the other side of the custom-made silver clip. A broad grin overtook his face, to the point of becoming silly.
“Interesting how some thing have more than one meaning,” he said, as I returned the clip and fetched his change. That day, when going home, There were three of them outside of my Condo, and several cars with Masonic emblems in our parking area, none of which had ever been seen before. I ended that stalking by using the methods in MC Realities, methods that many Tis would be unable to employ unless doing so upon first targeting, as had been my situation. Once targeting has been ongoing for some time, the typical TI no longer has access to the needed resources for such a defense. The one remaining defense is found in an earlier post.
In MC Realities, I trace the evolution of Mind Control technology (Political Control Technology) from the time of Adam and Eve (the Serpent’s deception was the earliest form of controlling thought… the same version of it as we see today in media manipulation), forward. The Templars, after being ordered destroyed by the Pope for having discovered their Satanic practices acquired in the Middle East, went into hiding. In time, many of them hid within the Stone Masons Guild, and eventually, took it over to form the Freemasons as we know them, today.
Hedging their bets, should they be found out a second time, they formed splinter fraternal organizations, as well. Any group with any of these words in its title… Fraternal, Ancient, Order, Ordo, Lodge, Temple, Grand, Sacred, Rite, or Knights (and similar)… is very, very likely a fraternal organization with a Masonic organizational construct… and at the higher levels, at least, closely affiliated with the Freemasons if and when it becomes convenient to the parent group. Therefore, it is easy to involve small armies of ‘helpers’ if someone is deemed a target. It is important, however, to understand that the rank and file lodge Member who may be induced to participate, has zero true knowledge of you or the purpose of the targeting; they are simply ‘helping a friend’ to solve ‘a problem.’
I end this section with a simple note: all Masonic systems are quite steeped in ancient mysteries of the Middle East, and beyond, typically focusing on Egypt, Syria, and the Holy Land… with a touch of the Sub Continent (India, Nepal, etc.) and Far East.
The two shoe laces are tied together…
This is where it gets interesting. Most big city Police are encouraged to join the Fraternal Order of Police (FOP), and it is indeed Masonic in structure. FOP, for instance, employs the Masonic all-seeing eye of Egyptian fame in their logo, which is a five-pointed star with a circle bisecting the points to create five triangles shaped like the Compass of the Masonic emblem, also the shape of the ancient steeply-angled Egyptian Burial (pyramidal) obelisk used for commoners’ crypts. There was additional heraldry-like art akin to European styling in the center of the star, shapes quite like those of most Police Badges, and incorporating an Eagle and other symbols. In other words, Police departments not only adopted the Lodge system almost universally, but did so to the point that their badges reflected elements of the FOP emblem. Almost all Police badge shapes generally post dated the FOP affiliations, underscoring the link. The exception would be Sheriff stars, and yet, that shape is also of ancient Masonic importance, in both the upright and upside-down (satanic Baphomet) versions.
If that were not enough to convince you, let us take a look at the Police Department of New Orleans. New Orleans existed as a city at the time of the Louisiana Purchase from France, in 1803. The first Masonic Lodge (a French version), was established there in 1793, all its members speaking French, and some Spanish, but no English of note. All the better to remain secret and mysterious to Americans, when they came into possession. But to fully appreciate New Orleans in the equation, we have to first look to New York.
In 1915, the Fraternal Order of Police established their first Lodge, there. It spread from there to many other cities in very short order. The FOP was not intended just to be a Lodge system, however; it also took on aspects of Unionization, a kind of bargaining force with the City whenever Members felt that Cops were not getting a fair deal from the Mayor. In many cases, in fact, their bargaining strength was augmented by the power of the greater Masonic power structure, a formidable force at the time.
Over time, actual unionization was also achieved in almost every major city, usually through the Mob’s control of the AFL-CIO, making it easier to arrange for hijacking of intrastate trucking or of dock cargo without anyone ever being sent to prison. But that’s another story. Ask any retired Union trucker or stevedore from Jersey. I’ve heard the same from 1975 Oregon members. The importance of that will explain to some Tis, those who believe they were targeted because they reported illicit drug operations or crimes which might be related to Unions, are targeted by Police. Additionally, of course, CIA sanctioned drug operations are protected by Police, as well. Thieves in bed with thieves, the bed made by the thieves.
Though New Orleans under the French had a Police Department as early as 1796, it had no Police Department for rather a long period of time after it raised the American flag. It was instead ‘policed’ by a vigilante system until 1853, when they formed their first ‘American’ Police Department. Almost immediately, they adopted the ancient Cresent and Star (upside down, larger star) as is common to Islam, as their badge. It is still in use, today, and appears on their cars, as well. Well before the FOP had even existed, this Department was already incorporating Masonic symbology directly in its badge. This is better known as the Shriner’s symbol, today… the Shriners being a Masonic fraternal lodge system.
So, clearly, the Masonic influence and ties are present within most Police Departments. Cops form some of the strongest bonds between individuals in service outside of the Military, sufficiently strong, in fact, that if one of them asks a color-of-law favor of another, it is not likely to be turned down, and certainly unlikely to be exposed even if turned down. Therefore, it really only takes one Cop being approached from a fellow Lodge member to recruit several more for any needed aid, even if that request came from a lodge in another city. Ergo, escape to another city tends to never result in escape from targeting.
NOTE: That is why the Free Will Society exists; a solution to virtually all forms of targeting. Please join and support (donate/promote) our effort to create a targeting free intentional community of our own, and our other advanced programs planned for the future. If you are reading this, you should immediately join the Society and give it full support. It is a far more valuable TI resource in terms of programs and goals than any of the so-called ‘TI groups’ out there, today, the bulk of which are nothing more than information and disinformation mills.
Please: you owe it to yourself to visit freewillsociety.wordpress.com to learn more.
Yes, there is a third shoe, one of special interest to those who feel the intelligence community lays behind their targeting. Every major Police Department in America has in place assets loyal to the Central Intelligence Agency, and many Officers have military intelligence backgrounds. Usually, you can count on some of them holding key positions within a given city: the Chief, the Public Relations Officer or Spokesperson, the head of Internal Affairs, the head of the Swat Team, and/or the Head of Personnel. From these posts, especially through IA, they are able to find bad cops who can be blackmailed into playing ball on an on-call basis, for any kind of dirty deed, to include color-of-law abuses such as is common to targeting. Don’t forget CIA drug running operations.
If that were not enough, there are similar, but far looser ties with FBI, Homeland Security, and the US Military Intelligence Agencies (and in some case, others, including the United Nations, and even Mossad). These generally entail the network of Fusion Centers and Centers for Excellence*, and special programs such as Community Policing and the Strong Cities Initiative/Network. When you consider that most all of these agencies use computer software based on CIA’s PROMIS data base management system, which is nothing more than a data base engine with a back door built in… almost any form of hanky-panky is possible. Ergo, the Navajo Beret Syndrome.
* Search for ‘Centers for Excellence + Homeland’ to see why I include it, here. All these items work together to collect, evaluate, and share information on (persons of interest). They operate as one big networked spy tool with usefulness in organized stalking which can easily be misused by anyone within LEA who has access.
So, even if Masons are not involved at all, Police can still be brought to bear on any given TI with the same level of efficiency, and in fact, the FOP can be leveraged into the equation just as easily, in reverse manner. Will the average member of the FOP, the Masons, the Police, or any of that long list of Agencies be aware of any of this? Absolutely not… not unless they are higher on the food chain. Then, of course, they won’t be admitting it, either. Complaining about it gains nothing. Knowing about it, and understanding it, can mean a lot, however.
You may not be able to beat it, but when the mystery is gone, its just another damned nuisance to deal with, and another reason to avoid trying to rely upon Police for help, unless you know one you have great respect and trust in. I was lucky. I had a relative who was a Cop in an uninvolved LEA, and he was able to help off the record in very useful ways. I also had help from ex FBI friends with back channel access, of like value.
We can’t all be so lucky. And if you are a TI, you know luck is not your strong suit.
Fake news, tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations by Trolls and Bots are not the only weapons they use to dumb you down and pump you up with their version of truth. Vanishing is their latest trick.
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
The (fake) news media dilemma
Fake news and Web tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations are not the only weapons they use to dumb you down and pump you up with their version of truth. It is not just Trolls and Bots we have to worry about, now. Vanishing is the latest trick used to conceal the truth and promote the lies.
I’ve written before about how television mainstream dumbs you down with clever psychologically aimed technical tricks in the actual image… largely relating their use of subliminal messaging, deliberate distraction, and overload. The general purpose being to further reduce the actual news you walk away with to the simplest of boiled-down sound bites… just the ones with their take on the news shaped for you according to whatever bias the network has at management level.
Elsewhere, there have been excellent examples of the use of NLP (Neuro-Linguistic Programming), also employed by broadcast media. It involves careful wording as well as clever body language to project the intended viewer/listener response to the message, within the message delivery, itself. It has been shown to be so powerful, a well trained user (a stage magician and hypnotist, who must rely on such deceits), was able to deliberately speed past a Cop and then use NLP to leave the traffic stop without the Officer even remembering why he had stopped him in the first place.
That kind of mis and disinformation borders on mind control, and in fact relies on mind control technology, psychological methodologies, and MC research by the likes of the Central Intelligence Agency. When the great bulk of media is controlled by fewer and fewer mega corps, and their corporate leaders tend to be like-minded politically, you get the double whammy of biased news and fake news (propaganda). That’s bad enough, but this article is about another dirty little trick… a bag of them, actually, used by all forms of Media when presenting ‘news’ online.
And, of course, we still apparently still have to contend with CIA’s Operation Mockingbird, the installation of CIA operatives within the media industry to help shape news to their preferred version. That, too, is something I’ve written about, at least in terms of its origins and history, and I’ve even been referenced as a resource in a more ‘official’ industry review of that topic by The Reporter’s Committee for Freedom of the Press. But now, we see, actual ‘retired’ ‘once-a company man, always a company man’ CIA officials are becoming investors in and on-camera commentators in mainstream news. This Clyde Lewis Ground Zero episode reveals how serious a threat the placement of intelligence community actors in media actually is.
What News is supposed to look like
All news is supposed to contain the 5 Ws… Who, What, When, Where, and hoW. Ideally, we also need to know the S and M… the news Source and the Meaningfulness, often defined by Motive… the Why. That is supposed to be factual Motive, and not speculation, unless clearly presented as speculative commentary. Lately, that’s the greatest sin Media is guilty of; too much ‘news,’ today, is actually mere commentary… the propaganda version.
Generally, for some strange reason, it is also rare to get all those points, especially online. The most critical things useful for research tend to be left out, making it hard for pundits and anyone trying to chase down answers to hard questions because a given story fails to ‘compute.’ That is critical, if one is to find out more, and judge for one’s self what is true, and what is fake. This is particularly distressing when the potential for a conspiracy or cover up is apparent. While Sheeple don’t even see the glaring holes in the official story, people who think for themselves really want to know why those holes exist.
But we ‘conspiracy theorists’ and politically aware non sheeple are thwarted at almost every turn. Take for instance, the WHEN. It is extremely rare in online news reports to find out exactly when an event took place… esp. useful to insure the same news event you find is the one you wanted, because often, you might have two identical sounding stories in the same city, in different time frames. Most searches are best made by searching on the (event key details) plus the year, and perhaps, month.
But many reports do not cite the year, at all. The Web is smart, though, and it knows when a given URL was created. Unfortunately, many of the larger online news sources use a kind of ‘feeder board’ URL created way back when, which is updated with current news, only, older news dropping off. While the Web remembers what the page looks like when the story you are looking for took place… that story is no longer there when you go to find it. While you can search the archives if they bother to offer one, and PERHAPS find it, that is just one hurdle in the search.
Once you do have what seems to be a correct story’s article, it is amazing how many news reports fail to include the date in the byline at the top of the page. So you have no way to know when the person writing sat down to write the story. But even with a byline date, you still have a problem: is that date the date the news took place, the date they wrote the story, or the date it was posted? It can be any of the three.
Some stories are updates to older stories, so the byline is meaningless unless the story itself indicates the actual When it took place in the text. THEY SELDOM DO. Instead, they just say something like ‘Last Tuesday.’ Great. What day of the week is the date of the byline? Now I have to go search that out, to make certain of the When. Your average Sheeple is not going to bother.
This problem also exists elsewhere in the remaining Ws and the S and M. At least one such detail is usually omitted, and all-too often, several. Sometimes, it is something simply not yet learned by reporters, but too often, it is clearly just not deemed important. All too many bylines even fail to tell you who wrote the story… so you can’t email them and ask for missing information. EVERY print article in a newspaper tells you this information, but for some reason, the online version seldom does.
Message distortion when relayed through many people
Dumbing down online is easy. It relies on the known scientific problem which transpires when a series of people relay a message from one to another to another, etc. It used to be in schools, that one of the first things they taught was this concept… that you you have to take care when relaying information. You have to listen carefully, and then just as carefully repeat it. The problem is, each person decides what is important enough to be carefully repeated, and tends to reword it for ‘simplification.’ So the message first stated has little resemblance to the message last heard. THAT is not being careful, it’s being careless.
Online, information deemed worth sharing is constantly relayed in social media in a quite similar, but an even more careless manner. Each person in the chain tends to introduce it with their own spin or commentary, advising what they think the takeaway is, or should be. They then (hopefully) provide the URL to the original (the careful part). They might also create or add an image or meme which underscores their takeaway thought. That is all in good, but…
Sheeple don’t bother to click on the URL and read the original story, and they simply ‘learn’ the takeaway point of the previous poster. This is why Memes can often be dangerous. Especially when the creator is being deceitful or dishonest to the truth. They know that a false message repeated some 20 times will take root in the average Sheeple’s mind, and become adopted. That is especially important in political messages, because today’s social media is decidedly biased, and decidedly deceitful, even to the point of using paid trolls and automated bots to insure you are inundated with the preferred take aways.
This is why people who think for themselves always click the link or do a little extra search before they hit the SHARE button, and add their own takeaway. Is that you? Are you like me, spending roughly 50% of your time inspecting and then correcting other people’s wrong take aways and falsehoods? Or, are you part of the problem, simply passing it along? Baa… baa…
But there is a bigger problem, one which at least seems conspiratorial, and relies on the above Sheeple foibles and the omission of Ws, etc. For some reason, mainstream news sources seem to be deliberately making it difficult for you to access news, and difficult to relay, on your own; they would prefer to leave that to the professional trolls and bots you think are your online friends.
Something is very wrong with this picture. Lets take print media and look at how they operate outside the Web, and compare that to how they are now starting to operate on the Web.
A newspaper runs advertising to pay for their staff and overhead; it keeps the doors open, and allows them to grow and invest in special investigative projects. They charge for subscriptions and for individual copies at news stands based on the cost of the printing and distribution process, and materials; the ink and paper. That’s why newspapers are relatively inexpensive to buy. It used to be that the online version, therefore, just had advertising… there is essentially no comparative cost to put it out there and for you to access it.
But now, online, many newspapers, even small local ones, are telling you that you will need to subscribe or become a registered user to their online version, or pay a small fee to read the article… or that you may read this one, but it may be the last one you can read for free (relies on your cookies, but if you turn them off, you they will tell you to turn them on to see the material). Of course, once you do any of that, you’ve just sold yourself into another dozen marketing lists, without warning or compensation. But that’s not all.
Suddenly, many media outlets online (radio, networks, print) are using something called Cloudflare. That product is a kind of ‘protection’ against certain abuses… a bit like an anti hacking or virus bot. But it does something else, as well. It also prevents anyone from copying and pasting a URL into a social media post. WHY? In the past, getting your URL spread about was a good thing; it brought them more viewers, which increased the value of the advertising opportunity for their Web pages. When did they decide they didn’t want more readers, and why?
Where the Conspiracy comes in
Sure. You can call this answer a theory; a conspiracy theory. That is what it is, plain enough. The only way the above sins can be excused as desirable is if somewhere, someone important and powerful within media and in political realms, decided that it was advantageous to dumb you down, and limit your ability to rely on URLs to relay facts and correct people when in error. It is an insurance policy to protect the ‘integrity’ of the versions being spread by the trolls and bots.
I mean, when your read some crap someone has posted which is to your understanding just that, a lie or false belief, you should be able to go find a news article or other authoritative source online, copy the URL, and paste it into your reply to prove your case. When you are trying to educate someone on how you feel about something, you should be able to do much the same, to prepare your post or meme… have a supporting factual link to go with it.
Someone does not want you doing that. They want you to hear something said 20 times and accept it as truth, with no way to verify it, or refute it, if false. There is only one person in the media industry who fits the bill. If you are a Sheeple, you will recognize his name but not realize just how powerful in media he is, or in political realms, and how deceitful he is. I am speaking of George Soros.
It is that simple. When most of us rely on TV news, we only get one slant (liberal, usually, conservative if you go out of your way). Because of TV’s own special dumbing down tricks as earlier referenced, you will walk away with a very encapsulated message with is has no actual understanding associated with it. Then, when someone puts their slant on it and you get hit with that 20 times, it becomes your slant, and people like me and others who prefer to think for ourselves, are increasingly finding it difficult to correct any errors.
Worse, if you do think for yourself, you may not be able to learn what you need to make an informed decision, up front. Heaven help you if you are trying to investigate what seems like a conspiracy theory, because of glaring holes in the official story. Obscuring the true story seems to be the way of things, today, so just ‘move along, folks.. nothing to see, here.’
When you add all this to what is taking place in the public school system and in higher education (liberal indoctrination), your children will think this is the way it is supposed to be, and whomever is in power when they are adults will be able to do and get away with whatever they want. They will dictate to them what to believe, and it will be believed. The notion of thinking for themselves, and of distrusting and challenging government will be foreign concepts. They might as well be called the 20x Generation.
The ’Snowflakes’ on the left are already a part of that group, unwilling to listen to facts or reason, and repeating what they are told to believe. I, for one, am not willing to pass the reigns of our nation’s future over to them, in their current state of mind. I’d rather have an armed revolution, if that is what it takes, to end their madness for them. Constant outrage based on lies serves no one’s best interest, except at the top of the food chain.
So my last question for you is this: do you want to be a Sheeple morsel for Wolves like Soros and his elite political friends, people more interested in Globalism than what is right and moral? Or do you want to be a think-for-yourself consumer of actual news you can easily access, rely upon, and use when talking to others about things which matter to you?
If the later, you had better start complaining to media, and to politicians about it. You might even want to consider taking legal action or starting an initiative ballot, if your State has that option, to write laws forcing journalists to adhere to journalistic standards and to make their stories available more appropriately. You certainly ought not simply be sharing what is being fed you currently without verifying for yourself it is the truth.
Else we all become 20xers… or we have that revolution, the least desirable of options.
Thanks to the Post Office, now anyone can know what’s in your mailbox, automatically… including of course, anyone in an alphabet agency. It is just another way to track you and criminalize you if deemed convenient, in time.
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
The idea is you register online with USPS for the FREE notification subscription service, and they then photograph the mail to be delivered to you each day, and email the images to you before delivery; that way, you know if something is stolen or lost and NOT in the delivery, and can plan on getting expected items. It is tied to other services, as well, such as package notifications, tracking services, stamp purchases, etc.
1) This is the federal government we are talking about. The FBI, CIA, and a host of other alphabeticals would have no trouble whatsoever accessing this information. There is no indication that such information is not retained indefinitely, and no privacy statement which alleviates concerns over it being used against you down the road should you become a person of interest, or a trouble maker such as a whistleblower, activist, or other targeted individual.
2) The system is achieved with online registry, and is handled by email, currently with no truly secure process for verification of the applicant or notification of the addressee that a subscription has taken place. Stalkers, private investigators, suspicious spouses or ex spouses or lovers with an axe to grind, or anyone else with minimalist information about you and where you live could sign up pretending to be you… again to include someone working for a government agency who could not be bothered with a warrant — knowing that they could later get a warrant and legally go back in time to ‘duplicate’ the effort in a manner which leaves no proof they violated your rights, earlier.
3) this means that mail must be separately sorted one more time by someone into individual stacks to ‘pose’ for the photograph, and then to take the image and email it… or the entire automated system must significantly modified at both the hardware and software level. Both are at great expense and will cost USPS more red ink… and eventually that cost will increase the price of postage for everyone, not just those using the service.
4) If the system is automated (and even a manual system will be, eventually), then it means EVERYONE’S MAIL is being imaged, all the time: The USPS becomes yet one more information tracking and tracing point available to the government, and under the program, anyone spoofing it.
I’m not the only one pointing these things out… though I’m the only one so far who has pointed out 3 & 4. Other privacy experts have echoed 1 & 2, variously, mostly item 2. Too many people PRESUME that government would NEVER use such a service to spy on them this way. That’s what they said about NSA and FBI when they first started.
It appears the only way to prevent anyone to spoof the system to spy on your mail is to beat them to the punch and register, yourself. However, there is no assurance in place that someone could not still additionally register an alternate email identity. We can only hope and presume there is an online software check which would reject any such attempt.
Short of not taking mail, at all, there is no defense against government use of the images, if you are a person of interest targeted in someway by an agency.
This is an old topic that’s lost traction in the public eye, but in the background, the enemy continues to work ever closer to fulfilling prophecy about Mark of the Beast. Now, employees are being asked to implant themselves in order to get snacks, get through doors, and access workstations and photocopier.
What you will learn reading this post:
- what RFID is, who is behind it, and why you should fear it;
- about Digital Angel, and the bio implant tracking version of RFID;
- why you should fear it, put away petty ideological differences, and unite against it
- what you can do to defend against it;
- the greater strategy RFID is in support of (the ultimate threat).
Invasion of privacy tiny in size, massive in scope
Recent news stories, including a particularly scary one referenced in red text, herein, have forced me to draw upon years of research and dig out my old PowerPoint presentation, 666 Reasons for Smart Dust and RFID Technology, as presented as the keynote presentation at Conspiracycon 2010, in Santa Clara. Any definitive presentation must go back to the beginning, or the dots won’t quite usefully connect. This is going to impact YOU in YOUR LIFETIME. Actually, it already has, and you just don’t know it; the water temperature is slowly being raised on we Frogs, and it’s quite hot, already. Hopefully… we can somehow jump out before its too late.
Smart Dust and RFID tracking technology are quite related, but Smart Dust is not going to be a part of this presentation, except to say that it is nanotech capable of much more than RFID, but it is not an implant. While it is represents its own significant threat to social, financial, and physical security and well being, it is less useful than a tracking implant for the population at large, and cannot play the role of Mark of the Beast. Fortunately, it will not likely ever be used against anyone not deemed a high-priority national security risk. You know, like Will Smith, in Enemy of the State.
RFID, however, is the very heart of the tracking bio implant, the most obscene version and infamous of which is Digital Angel. That’s the name of a CIA front central in pushing for implants, but also often used to describe their chip, itself as a product trade name. They also offer a wide variety of tracking systems which are non implant, such as wearable items like watches and ankle bracelets.
But we need start with a broader view on RFID to fully understand the greater threat this topic represents. Non implant (and seemingly harmless) versions of RFID are already used to track an endless array of products, and you are quite likely to bring them home every time you go shopping. In retail, it is mostly benign, but it becomes the bedrock of a useful personal tracking system.
Mostly benign? Check this out, an edited and updated excerpt from my book, The Professional Paranoid: How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual (third ed.) Excerpt begins…
Smart Dust, RFID, and the Mark of the Beast
i want you to consider the first letter of this sentence; the lack of capitalization is not a typo. I wanted to draw attention to the dot above the letter ‘i.’ There is a reason… there is an RFID invasion taking place, and some of the invaders can be just that small.
The Bible tells us that in the End Times, there can be no transaction between persons for goods or services unless both parties have the mark. Revelation 13:16-17 “And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: 17 and that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.”
Though the Mark of the Beast is thought of as being the number 666, that is not quite the case. That is the number of the Beast himself (the Antichrist) in numerology evaluation of his name. The original words used in the original Greek texts of the New Testament can be translated to mean ‘insert’ as well as ‘mark.’ Thus there are growing numbers of people who think that some form of Digital Angel bio implant will be the actual marking device. This section will illustrate that likelihood and educate you on just how close to that day we may be.
This will make sense later: implants are the mark for the hands of peons, and marks on the forehead are the mark for meons.
What is Digital Angel? It is a firm which is known for a series of tracking products, including bio implants, all based on RFID technology. Simply put, it is a passive device which, when scanned with a low-energy RF signal, responds with a signal of its own, broadcasting a unique identification number or other data. Early versions of this are still commonly found in clunky removable/disposable merchandise security tags installed by retailers which can trigger alarms when shoplifted goods exit the store. In the modern version, the product manufacturer includes the chip which enables the same feature without the retailer needing to do anything but take delivery of the goods.
There is a whole emerging industry based on RFID, and it, in turn, impacts on almost all other industry sectors. The industry is driven at its heart by the military and intelligence community with the help of corporations who are part and parcel of the NWO elite, as defined by the makeup of their directors and other corporate leadership or ownership. What they want to do with RFID is mind boggling, as is what RFID is capable of in terms of invasion of privacy. To start, they want every single product manufactured and sold to have its own unique RFID tag, and are pitching it to manufacturers and retailers as the next evolution of bar code.
Similar chips in credit cards technically allow purchase without the need to remove the credit card from the wallet, though they currently require us to scan the card. But all that is really be needed is to specify which of several credit cards we might be carrying was desired to be used. That could be verbal, by touch screen, or smart phone application, which avoids producing the card. RFID is also being built into phones for comparison with credit cards nearby, to allow verbal telephone purchases to be made without the need to verbally confirm credit card details. The bio implant is ‘sold’ to us as a convenience to replace all of that (examples to follow).
That is the ‘convenience’ under which it will be sold to us in the retail world, and if a cash register can scan these chips, so can the device at the door looking for merchandise which had not yet been purchased. Why stop there? Anyone can put small and hidden scanners (with or without cameras) anywhere, and for any reason… such as at every doorway where some form of security or tracking feature is desired. By scanning RFID credit cards, the identity of everyone passing through is logged and time stamped without their knowledge or participation. Actually, any RFID tag on your person can do the same thing (it is being built into clothing), because your identity can be associated with its purchase. And that is just the beginning. Ergo, the national ID ‘Real ID‘ program is based on RFID, and eventually, the human body itself will be its on RFID ‘ID.’
In the very near future, it will serve law enforcement. At the scene of the crime detectives will often find discarded items potentially belonging to a suspect. They analyze these for clues, such as fingerprints, to build a list of suspects. In a world of RFID-only purchases, every object also identifies who purchased it, when, and where (often also useful clues in prosecution). What about cash purchases to thwart RFID records keeping? Not a problem. You didn’t think for a moment that those little slivers concealed in the left-hand portion of your new money was truly just a counterfeiting deterrent, did you? Put anything but a $1 bill in your microwave oven and it will explode when operated… a trait of RFID. Moral of the story; don’t casually discard product wrappers, especially if you think someone might use them to implicate you in a crime; burn them.
But it gets worse. For any of this to work smoothly, somewhere, someone needs to catalog and keep all those transaction records and make them available for government’s needs. Enter the Total Information Awareness Office (TIAO), AKA the Terrorist Information Awareness Office. This was modeled after an expanded version of FINCEN (Financial Crimes Enforcement Network) capabilities (check this out); and was MILITARY led and very Intelligence community friendly Defense Advanced Research Projects Agency (DARPA) project. I’ve seen the original DOD call for papers and the final description of capabilities and intended uses for the TIAO, and it has little to do with targeting terrorists. Instead, it has to do with capturing records of EVERY transaction between EVERY citizen and business, as well as the passing of ANY citizen through ANY doorway in selected locations. Further, it will track vehicles past checkpoints and can log other kinds of interactions or transactions between people and each other or real world objects (i.e., machinery, vending machines.)
Update: TIAO ‘went away’ due to public protest and ‘too many questions,’ including “Why was the head to be a convicted criminal participant in Iran Contra, an ex Naval officer of significant credentials tied to CIA and the Pentagon, John Poindexter?” And yet, it did not actually go away. It has instead been quietly replaced with the OIA; the Office of Intelligence Analysis, another new super-secret spy agency operated out of Homeland Security. They, in turn, gently established ‘Fusion Centers.’
Fusion Centers are ‘sold to us‘ as a happy pill having nothing to with dark deeds, and as being established by cities and state governments in order to share information between partnering civic and federal agencies, local businesses and NGOs for improved security against terrorism and ‘other threats.’ In truth, they are hotbeds of social spies who operate external of the centers within those groups of partners on behalf of DHS and the intelligence agencies. It is often a source of organized gang stalking, and a collection point of ‘data’ about ‘other threats.’ We are the threats, and the data is obtained through backdoor access to the ‘data’ about us found in participant computers, including RFID transactions, security and traffic cams — and via gang stalking and the associated psychological profiling. It is a kind of fascist Brown Shirt group without the uniform, replaced with a smile and handshake… and big eyes and ears.
And worse still. If government decides it wants to know even more about you, a black van can drive by your home and scan it to collect the sum total of all information from all RFID tags (or Smart Dust) found within the home. They will quickly know EXACTLY what is in your home, where you got it, how you got it, and when. This gives field agents the ability to gain access to that kind of information in a very focused way instead of having to run tedious database searches which would necessarily include bureaucratic handling and, perhaps, the dreaded and feared need for a pesky warrant.
And, worst of all, the ultimate expression of RFID privacy abuse is to put one in the human body, with or without the target’s knowledge. The question is, how close are we to this nightmare, and what can we do about it? The answer is, we are frighteningly close, and in fact, it has already been happening for decades.
- RFID is already being put on thousands of products you buy today. Even common mundane consumer goods like Gillette razors and Max Factor makeup have been ‘chipped’ with RFID. Walmart pioneered its use, and used cameras (which opens up a whole new personal security threat for the chip) to track customers through the store, and record RFID transactions. There are also shopping carts with built-in ‘product information displays’ which can track every item you handle while in the store, and profile your shopping experiences over time. You can bet there were cameras connected to scanners scattered throughout town by CIA or the military (Walmart Board included ex military and intelligence agency types at the time), as well, to see where else you went and what else you did, to test it as a spy tool. Many manufacturers have placed orders for hundreds of millions of RFID tags and millions of scanners. They have to be in use somewhere.
- Many tens of millions of RFID equipped credit cards have already been issued. You can spot these visually if they are transparent, or if the credit card number has a lot of zeros in the middle, or a gold foil rectangular emblem about ½ inch square. Though sold to us as a ‘security feature,’ they are the opposite: content can be stolen by proximity scanning without your knowledge, and then the RFID and card can be cloned by thieves for use at your expense. I’ve caught such a thief scanning at the doorway to Walmart. He was pretending to be making a phone call… pacing back in forth in ways that maneuvered him in behind victims. But there are also home-made scanners which can scan from hundreds of feet away.
- Most cell phones use SIM card technology incorporating RFID (the SIM card, more than the phone, identifies the authorized user). This is often used in phone apps to facilitate cardless credit transactions (i.e., iPay)
- Virtually every maker of cash registers and point of sale systems is developing low-cost attachments to existing cash register and credit card scanners to sense RFID, as well as whole new systems to replace the old with simplified operation and reduced cost — this allows self service checkout and the elimination of the sales clerk, so it will be promoted as a ‘cost reduction’ tool. But don’t expect to see savings passed on to consumers. Money already has the needed strip in place and it likely has been RFID capable all along without our knowledge.
- All employee scan cards use RFID. Hotel room key cards use RFID. Federal Express, UPS, etc., all use RFID shipping labels. Monthly bus passes, season tickets, and the like, also employ RFID.
- Pets and livestock have been being implanted with RFID for decades. Within the last ten years, thousands of people have, as well, largely through efforts to chip children ‘to protect them against kidnapping.’ There are nudist resorts where you can volunteer to have one injected to represent your credit card information for purchases at nudist-camp points of purchase for services and goods. Otherwise you must carry your wallet or purse and keep an eye on them. What fun is that if trying to commune with Mother Nature and your bank account? In July of 2017, a company announced break room vending systems and software to allow implanted employees to access snacks without money. Learn more here. Soon, you will see implants being promoted for use with parking meters, fast lane highway access, and on, and on, and on.
- Bioimplants can easily be implanted in a human without requiring their knowledge or consent. All they will know is they woke up with what seems to be an insect bite. This can be done while they sleep via covert entry of their home, or at distance with a special pneumatic sniper rifle.
- According to several news accounts, countless livestock has been slaughtered with the implants still in place, their meat ground and sold, and consumed by unaware purchasers. Despite massive recall efforts, not one package of meat was recovered. RFID implants are made of glass, plastic, and poisonous metals.
- Some school systems are requiring children to use their fingerprints with scanners in order to get their school lunches. This is bad enough, but the firm that makes the equipment used also offers an RFID attachment in lieu of the fingerprint scanner, and mentions implants in their literature as an option.
- One maker of RFID, in marketing it for aircraft part identification in an assembled aircraft (the goal being to track parts which might be subject to safety recall, and a feature useful in crash investigations) chose a trade name for their RFID of ‘The Mark.’ The part number when Boeing Aircraft orders it from the maker is alleged by employees to be 666.
What can you do to defend against it?
Aside from sharing this post, not much. Be very vocal and protesting at every opportunity any discovered use of the technology. You might demand RFID tagged merchandise be detagged or the tag neutralized before you leave the store, but that would make you look crazy. However, organizing endless group protests can have an effect. Any firm that covertly uses it should be razed to the ground (sued into oblivion for violation of privacy). Any government office holder should be kicked out of office if they support the technology in any way, shape or form, or simply fail to oppose it. In my opinion, preparation for revolution should be made if these efforts fail, because that would be the only remaining recourse prior to full enslavement.
Back to the bible. In The Book of Revelations where the reference originates, there is also one more clue RFID will be the basis of the Mark of the Beast. One at a time, the Seven Angels open the Seven Seals to unleash seven deadly punishments upon the unfaithful on the earth. One of these states that those with the Mark of the Beast will suffer severe pain and many will perish from it. A subtle clue.
As it happens, there is one feature about RFID which must be told to make sense of this, and it suggests how to thwart the tech: if exposed to high energy radiation, RFID heats up incredibly and explodes. A burst of high energy radiation levels will literally destroy it… such as an intense solar CME blast (Coronal Mass Ejection – a high RF/EMF energy field). At this time, I cannot tell you how to generate such an energy and safely use and aim it, but it has been suggested by other experts than a ten second microwave oven exposure should be sufficient. Now if I just had a portable unit I could waltz through the retail Aisles with… set to ‘Burst’ mode… but you can bet there will be or already are laws written to make that illegal.
But there is something simpler which also defeats the technology. Metal shields the signals. Thus wrapping a National ID or an RFID equipped credit card or object (i.e., chipped hand) in aluminum foil defeats the device’s ability to communicate. When the revolution comes, if that is our future, there will be portable devices which anyone could build from easily obtained parts to detect or destroy RFID at will. I fear the day this is needed. I also say woe to those involved in the use of RFID should it come to that. End excerpted material.
There is one other thing you can do. The response time for reading a scanned RFID is very brief. There is a ‘failure’ in reading called ‘tag collision.’ When too many RFID tags of the same frequency (usually dictated by type of tag/use of tag) are present in a confined space, the scanner can fail to capture the data, or capture the wrong data. Therefore, if one were to collect dozens of RFID tags of various types and put them into a bag to carry along with them, it would effectively become a scanner blocker. Keep all your old canceled credit cards in the same wallet as your valid ones, sandwiching the new between the old, and pull them ALL out to select the one to use, holding them all in the same hand to swipe.
I also advise against Smart Appliances, and smart meters. RFID is at the heart of interaction with Smart Meters, which in turn is its own invasive privacy and stalking threat (widely experienced as a directed energy weapon). Worse, it is tied to mapping of the interior of your home; the floor layout, location of furnishings and other appliances and electronics, smart or otherwise. Programs are being developed to allow such mapping information to be available to manufacturers of smart devices and used to market to you based on use of not just their product, but all products. Naturally, all that can be accessed by government, as well… and hackers partnered with burglars.
I also suggest taking advantage of these resources as contingency against the worst:
The history of RFD tells all
It starts with Howard Hughes, though he was a victim, not an instigator. Most of us are familiar with his rise to being the richest man on Earth in his day, and his fall due to a mental condition which impacted his ability to interact with people, and life in general. The untold story is that once debilitated, CIA agents and Mormons (CIA likes to recruit from Mormans, and Masons, because such cults have secrets and know how to keep them through compartmentalization and other methods) became his ‘caregivers and managers.’ He trusted them, and they took advantage.
Once in control, his vast resources were diverted to CIA control and application. Hughes Shipbuilding built several spy vessels including the Glomar Explorer and companion vessel, both designed to retrieve sunken Soviet Subs. Hughes TWA aircraft and assets were diverted to form (over time) three different CIA ‘airlines,’ including the most recent, Evergreen Aviation, which wound up acquiring Hughes’ Spruce Goose for its museum. Hughes Tools, the financial cash cow of Howard’s meteoric rise, a maker of drilling systems for the oil industry, would eventually become Enron, and we know how that wound up vanishing billions of dollars into thin air. The remnants of Enron’s data processing center would be applied to CIA fronts engaged in porn (to profile user sexual preferences for possible blackmail application), web site hijacking (I was a victim of that, documented here), offshore gambling, and 4-1-9 scams (Nigerian money investment scams).
Then there were Hughes operations which would evolve to serve CIA’s efforts in Political Control Technology development and application. It starts with Hughes Aircraft’s electronics division, eventually become Hughes Electronics, which invented the RFID concept. These were originally used to identify and track cattle, marketed through Hughes Identification Devices, but also found their way into humans involved in early (late 1940s) non consensual CIA mind control projects and Atomic Energy Commission radiation experiments on civilians. I wound up with one in my leg, when as a child, when I was injected with a radioactive substance in Yakima, near the Hanford Energy Reservation.
From Hughes, the chip was migrated to Destron Fearing, and from there to our friend, Digital Angel. We will come back to them. More CIA fronts or partners duped into participation would be created in America and globally to market implants for humans. They do big business in ‘police state’ countries, often for the purpose of chipping persons in the criminal system. Of course, it is privately understood they are good for tracking anyone you wish to track, such as embarrassing political activists and whistleblowers.
LocatePLUS is a Homeland Security created and CIA infected front which pushes the implant in America and advertizes that it maintains 12 billion records covering 98% of the American Population. The DHS/CIA knows all about you and is making money selling you to anyone with the money. In America, the front markets to FBI, ATF, DEA, and 2000 law enforcement agencies, primarily non implant products such as ankle bracelets.
In Europe, the front Worldwide Information is a LocatePLUS spinoff doing much the same. Global reach far outstrips American consumption (there are a lot of fascists out there, in almost every government system): Universal Microchip in Italy, IDECHIP S.A. markets in Ecuador and Brazil, Solusat Medica in Mexico, Scientific Innovation and Integration (SII) in Korea, Taiwan, China, and Japan, Inforlexus Inc., for Malaysia and Indochina, Biometronix for Germany, Glezer Technology in Israel, and Cybertek in Puerto Rico. This list continues to grow; the Swedish firm Biohax International is behind the implant for snacks story.
The primary American front (a sister to LocatePLUS), Metro Risk Management Group, sold $13M worth of chips over 5 years to the Bonneville Power Administration (to track fish, officially). BPA is a Department of Energy firm which had in the same time frame been in the news because of high-tech spying operations having been detected taking place in their facilities… while BPA and Enron were significant others in the same bed. The U.S. Military contracted for $24M, while they sold $1M to private citizens wishing to chip their children or themselves. They sold $7M to the greater Intelligence community, and $73M for ‘internal use,’ which is to say, CIA, itself. Such orders are a combination of implants and scanner systems, both portable handhelds and installable units for security gates and doorways. A typical order might consist of hundreds of thousands of devices and a thousand scanners.
All this data represents 2005-2009. Sales are increasing over time, but increasingly hard to track for a variety of reasons, including corporate name changes, mergers, spinoffs, and other tactics often seen in CIA fronts trying to be a moving target. And the implant business is a target by activists and activist organizations worried about invasion of privacy and civil rights, to say nothing of some kind of New World Order nightmare ending with the Antichrist at Armegeddon. And, they are constantly being sued in court for a wide variety of reasons.
And this brings us back to Digital Angel, the key point in the bioimplant tracking food chain. As stated, a lot of business names and hanky-panky tactics are often employed by CIA fronts, as outlined in The Professional Paranoid, a privacy/security how to which, in covering that topic, helps readers to identify who is really causing the bumps in their night, should they be so unlucky (as was I). So let’s take a look at Digital Angel, again based on older ten-year research (I’m not going through that, again).
Let’s talk corporate names as clues: though most commonly known as Digital Angel (Florida), also DBA Verachip, they were formerly Applied Digital Solutions… which was formerly Applied Cellular Technology (because RFID tracking often relies on cell phone services)… which also used the DBA ACT Financial… formely Axiom Information Technology… formerly Axiom Computer Consultants… DBA Great Bay Acquisition Company (those all based in Wisconsin/Minnesota). Digital Angel divorced itself from Verachip (being sued out of business), but then Verachip merged with Steel Vault… which became PositiveID, which then in turn tried to acquire Digital Angel… which also operates Signature Communications in the U.K., where it might (conjecture based on company data and ties to CIA fronts) enjoy backdoor access to encrypted government radio communications, the assumption being that receiving units employ an RFID chip which, like the cell phone paradigm, authorizes descrambling of transmitted data, as well as authenticated identification of the sender and recipient. Finally, Digital Angel, also being sued and hounded, ran off to the U.K. where they now promote themselves as “a developer and publisher of consumer applications and mobile games designed for tablets, smartphones and other mobile devices, as well as a distributor of two-way communications equipment.” But they still push implants, and through Signature, the two-way communications gear.
Let’s talk facts as clues: Digital Angel does not make RFID. No. They merged with Destron Fearing, the actual imputus of modern RFID systems claiming to have invented RFID technology. No, that was Hughes Aircraft’s Electronic Division. Digital Angel at one point claimed to be founded in 1948. No, but Destron Fearing was founded in 1945, did the RFID for cattle thing in 1948. No one cited so far, actually makes RFID tags, the heart of the implant. No, that’s Raytheon, a military/CIA contractor… formerly known as Hughes Aircraft. That makes sense, since it is the U.S. Army which tracks all RFID tag assignments (unique tag number assigned to (whatever) user data). Meanwhile…
Let’s talk connected dots as clues: CIA’s HHMI (Howard Hughes Medical Institute) is steadily pushing for the use of RFID in both implant and non implant versions to hospitals (49 major facilities as of 2005, more every year) and the medical industry at large, and Hughes Satellite and Hughes Communications services RFID tracking systems via cellular/wifi. How do I know this? By temporarily working for both Hughes Satellite and a major cell phone carrier where I was able to verify specific cell phone traffic and routing of tracking data. The phone account was tied to an individual which shared an address with one of the above firms (how I found it). And that led to finding dozens of such phones for more firms. And even more looking at other fronts known to me outside of the RFID playing field. In fact, such details are part of my evolving insurance policy against ‘accidents.’
Let’s talk key people as clues: Another CIA front trait has to do with who is involved in the corporate structure. At ADS (old data) Dr. Richard Seelio was Director of Medical Applications. Really? He is a Bariatric Surgeon, so he knows how to suck fat out of your thighs, not exactly as advertised by his title (a typical front man). The Senior Vice President was, prior to installation, a small time lawyer (a cutout man). A look at the Board of Directors of almost many of the above firms variously will find persons of wealth and influence, persons with backgrounds or ties to military/intelligence (or both), and persons with membership in the nefarious NWO Round Table Groups, such as the Council on Foreign Relations, Trilateralists, and the Bilderbergers. This is a kind of corporate structure is a fingerprint that lets anyone track just who are the trackers.
The other shoe drops
As I wrote this, I was listening to radio, where Clyde Lewis more thoughtfully reviewed a greater enveloping matter on his Ground Zero show, things equally important to understand, and far more sinister. Listen to it, here. The short of it is that chipping people is not just about spying on them, it is about control. It will enable a complete rewrite of social, political, religious, and economic existence, and the script is already being followed step by step, RFID again at the core. You didn’t think ‘Global Warming’ was about weather, or that Transgender Issues were about rights, or that Terrorism was about political or religious ideologies, did you?
It is, all of it, in support of ‘a brave new world’ which the New World Order seeks to establish, a world where there are only three classes of people. While my friend Clyde did not use my labels for these classes, he did so describe: there will be Meons (a Club of Rome/Bilderberger label based on an ancient word for someone worthless, less than a peon – a ‘useless eater’ who will not likely survive the NWO on their own, and who will be made to ‘go away’ in time); Peons who will be usefully employed to run the system (government, business) for the elites; and the Elites, the 1% of the 1% who will rule.
Clyde explains how the Middle Class will be eliminated, divided between those willing to implant and deemed useful (peons), and those unwilling or deemed useless (meons), and the a host of new topics and proofs you have likely never heard of, and more. Naturally, the upper class will be peons, and the lower class, meons. Bio implants (part of Transhumanism) are key to all these plans. You had better understand all of this or you won’t be able to cope, and likely, will end up in the red list for population reduction.
Low Cost RF/MW reading devices are often purchased by TIs as a defensive tool against their targeting fears. However, the general topic (TSCM – Technical Security CounterMeasures) is just that: TECHNICAL, and readings from such a device can easily lead a TI to panic and over react. Here is why, and how to get more out of such devices, without the risk of serious mistakes.Updated Dec 2017 – Corrected technical boo boo and added a couple of closing paragraphs somehow deleted and not caught. Changes indicated with red intro. What you will learn reading this post: • all TIs could benefit from professional TSCM electronic sweeps; • that isn’t likely to happen; • the poor-man’s TSCM pro isn’t a pro, and might be a fraud; • there are low-cost meters but improper use can be dangerous in many ways; • there is a solution, and help implementing it — and here it is…
The way it is
A Targeted Individual can almost always benefit greatly from a professional TSCM sweep. Such a sweep, clandestinely done, could provide significant courtroom quality proof of electronic surveillance and/or harassment with directed energy weapons or mind altering signals, such as EEG entrainment, subliminal messaging, V2S, implants, and more. If you are new to targeting and don’t know these terms, read my books. With very rare exceptions, virtually all TIs are exposed to some form of electronic targeting, and such a sweep can precisely identify who is operating the equipment, the nature of targeting, and evaluate the threat and suggest defensive/offensive options. That typically includes their providing documented reports and personal courtroom expert testimony. Combined with optional services equivalent to a private investigator, it could even end up revealing who ordered and is behind the targeting. They can also potentially detect bioimplants in the victim’s body.
Unfortunately, there are two reasons no TI has ever used TSCM professionals with success, and hardly any have ever used it, at all. The first reason is, that only the wealthy can afford it. A truly effective sweep of a home or work place, can cost between $20,000 and $60,000. That is because the professional will need to apply towards a million dollars worth of specialized gear, and must have decades of experience in order to be qualified to do so and have the results stand up in court. Rather than ‘meters,’ they employ sophisticated signal analyzers and other toys for a full-spectrum solution (including light and audio threats).
Sigh. Add to Christmas wish list, and hope Santa is generous.
The second reason, is that all such qualified TSCM are almost always ex government/intelligence community/military/military contractors, and are therefore, by default, subject to ‘conversion,’ because almost all targeting is ultimately at the hands of those same players. By request or by bribe, the risk is that they will give a false report showing no targeting. It is simply impossible to vet a TSCM pro against this risk, unless you happen to have a personal family/friendship relationship in place from the start. I had such a contact, and the government framed him on illegal weapons and drug charges and put him in jail, confiscated all his equipment. James Atkinson (‘Granite Island’) helped me write my first book, filling it with informative information about TSCM and what government agency uses what frequencies for what purposes (data table and other information in The Professional Paranoid). Friends are keeping his informative web site up and running for him. Visit.
So what is a TI to do? One solution, is to go with less than a true pro TSCM guy with all that gear, someone like me, perhaps, who has nearly $20,000 in gear, and some investigated skills (I’ve put a lot of people in jail, shut down illegal CIA fronts, forced corrupt officials to resign, and ended targeting for clients). Unfortunately, there are crooked people out there pretending to be ‘like me’ using even less sophisticated gear (regardless of what they claim). I have seen YouTube videos of alleged ‘bioimplant scans’ where the scanner was charging $100 per implant found, and gee… everyone scanned naturally had between three and six implants, or more — until their money ran out. And yet, not.
The problem was, the meter being used, like most such meters, has an instruction manual warning that false readings will be obtained if one touches the sensing area of the meter (the business end). You are supposed to hold them a certain way to avoid that. A fraudulent scanner, however, holds it differently, such that he merely moves his finger to tap or touch the front whenever he wants to ‘find’ an implant, bug, signal. Sadly, this service was widely promoted by one of the largest and best known TI community groups. It even resulted in a multimillion dollar lawsuit, and that group ultimately disintegrated. One clue it was a scam was ignored by all: to get the scan, you had to fly into a small remote town with all of one Police officer, check into a hotel, and get scanned within a small window of time. Poof! the scanner was gone before the fraud could be reported and investigated, and many thousands of dollars richer for a half-day’s work.
Another solution is to buy your own meter. Prices can be as low as $100, even less (be wary when so). Not quite a perfect solution, in truth, because no such product, even towards $20,000, is designed and sold for the kind of use to which the TI intends. They are designed to measure the same kinds of signals (with significant limitations, usually), but for other cause, such as testing equipment against RF emission safety standards, or to ensure they are putting out the right kind of signal. The instruction manuals only speak to such uses, and the manufacturers/sellers have zero interest in helping a TI do what they need to do with the product. Nor will they accept returns based on failures to be useful in such an application. You are on your own.
Because of the technicalities involved, and in the face of a lack of instructions, it is not only extremely rare that a given TI will know what a given reading means, but also quite likely that they will make a false and potentially dangerous wrong conclusion as to meaning, and then take wrong actions in defense of that false conclusion. A TI easily makes silly mistakes, and the results can be frightening (ex: aiming the meter at the sky will yield seriously high readings, but is NOT a threat. Many TIs assume it means satellite targeting. No, no, and no.) An example of a serious wrong action would be false accusations of an innocent party, or spending limited financial resources for shielding or legal defenses applied uselessly. And there is another common risk…
All too often, a TI will call Police or go to other authorities or perhaps seek legal, medical, or psychological professional help, meter and readings in hand, intending to ‘prove their case.’ All they end up accomplishing, is being marked down as a very strange person with a strange little box and an even stranger and unbelievable story; a lunatic who needs mental health care. No one will understand the little black box or its readings, much less the story offered behind it all. They have never heard of TSCM, most likely, and so the entire concept is like talking about the kind of propulsion systems used on flying saucers. And if they do know about TSCM, they will know your meter is a ‘joke,’ and automatically conclude that your use of it and conclusions are just as silly, no matter what the truth is.
Note: there is one other potential ‘poor man’ solution — the use of a smart phone ap to simulate an RF/EMF meter. Yes, and no. Extremely limited range and scale of operation, extremely broad angle of view, and quite prone to misinterpretation. In fact, it has nothing to do with electronic solution; it only measures the Earths natural EMF. It has no value for personal protection, as I’ve written of, here.
Don’t give up too fast… all is not lost
Don’t give up on the notion, because there are some useful uses for such meters, if approached properly. One must simply alter expectations, and have a better grounding in how to properly use low cost meters such as those described herein from trifield.com, for the purpose. I can help with that. But let’s first talk about expectations:
a) you are not going to use them to find implants with much chance of success. There is only one type of implant they MIGHT find, which is the type which constantly broadcasts information. An example might be a tracking implant, or a health monitoring implant. Under the right circumstances, you might find such an implant. But most implants used in targeting are either not going to broadcast anything… instead receiving signals useless in detection — or they are going to deliberately use special broadcast methods most meters cannot see or respond to usefully;
b) you are not going to use them to find V2S, subliminal, or EEG manipulation signals. You can see these signals, but they blend into the background and do not stand out as such; they cannot be isolated and identified with simple meters;
c) you can use them with some confidence to identify DEW and other targeting signal directional sources. While it is relatively easy to misread signals and erroneously presume them an attack signal, if read during an attack and relying on the strongest signal sources, only, you are likely correct in the presumption. You can then plan shielding strategies more effectively, and narrow your list of suspect enemy positions and personnel to those within that angle of attack. With some luck, you might actually pinpoint the source and perps involved, but it won’t be legally useful. But focused video surveillance (don’t break the law), with luck, may confirm suspicions sufficiently to be considered legally useful evidence. Rely on video documentation of not just the doings at such sites, but also video of meter readings during attacks, to prepare potentially useful evidence… useful to perhaps interest someone into considering your story… knowing the likelihood is that they will still reject it as lunacy. Risk vs. Benefit is your decision guide about attempting to convince them;
d) you can use them to identify the type of signal, in some cases. They type and sophistication of the meter, and your ability to use them properly, will determine if that is the case, or not. It is quite easy to make wrong assumptions, as there are so many kinds of attack signals across a broad spectrum of frequencies (bands of RF energy). Most serious threats operate at frequencies well above the capabilities of low cost meters. Even my $20,000 gear cannot see above 12 gHz microwave, which is where most military bands operate. But if your enemy is not military based, you might have a chance with $20K gear… but with gear costing hundreds of dollars, your chances diminish to the point of being limited, perhaps, to seeing things an amateur or Cop might employ.
e) you can use them to warn of a DEW attack before it becomes a problem in terms of physical/mental effect. There is one particular low cost meter best suited to this use, allowing you to relocate yourself away from the attack area… the meter will advise when escape has been achieved (cease the warning). It will also indicate if you are being ‘tracked’ by a signal by some means (generally some kind of surveillance, or by a locating implant), and can give you a general sense of the direction of the attack signal source, much like the Trifield. It is not, however, a great substitute for the capabilities of the Trifield beyond that, but it is a better warning device than the Trifield, because it is automatic, and always operating, unless switched off. It can even clip to your clothing or be carried in a pocket, or set down anywhere near you;
f) you can use such meters to determine if the signal levels exceed safety limits set by government and NGO organizations. This, in turn, can sometimes be used to force government agencies, most notably the FCC, OSHA, to investigate on your behalf, though it is quite likely such investigations will not match your findings; the enemy will simply shut down temporarily. But at least you get a brief vacation from assault. When concerned about safety levels, you will want to carefully review online searches to compare the latest (always being adjusted downward) standards and what a level represent in terms of health issues, and that will prove to be quite technical — you need to carefully compare your meter reading and scale used for the set limits, which may require unit conversion (usually a matter of multiplying or dividing by 10 or 100; most such resources will give you instructions for conversion or cite alternate unit results for you). With luck, your findings can be matched to specific known physical symptoms for a given reading level, which if matched to your symptoms and reading levels obtained, can be useful if well documented (video of your readings and symptoms + industry data);
g) you might be able to use them to find surveillance technology, to include listening devices and cameras. Again, sophistication and skill of the user are key. There are devices better suited to this purpose which remain low in cost. Use a search engine (bug and camera detection gear) for that. Same for (phone bug detection). See my post on cellphones.
Now as to the other key requirement, proper use…
Fortunately, there are two specific low-cost devices I can recommend with confidence, and for which I can provide rather specific instructional advice on how to use them for TI needs. They are the devices I started with early on for my own needs, after some considerable informed research — and successfully used to confirm my own electronic targeting, source location, and identity of the operator at that location. It allowed effective shielding response which ended the threat, and finding of listening devices. It helped me to develop other tactics to defeat targeting which did not involve shielding. They had other benefits, as well, not the least of which was improved peace of mind.
As result, I made a special deal with the manufacturer (Trifield): they would sell them to me at a small discount for resale to TIs, and send TI requests for information or purchase to me… on the proviso (my idea) that I provide an instruction manual for TI uses, be responsible for any returns and customer service issues arising from TI uses. They did not want that business at all, and would not sell them to TIs if they understood such was their use/need. While I am no longer in a position to provide the service, which as a kind of rent-to-own trial program for which no one ever declined to own (it worked well for them), I do still offer the instructions (an emailed .pdf file, illustrated).
These are for the trusty and versatile Trifield meter (avoid the more costly blue-faced version, generally less useful to TI needs) and SmartAlert 2 microwave detection device offered at trifield.com. Both meters are very low cost: you can buy both for less than $300, just don’t mention targeting. My manual gives broad instructional use for both meters, and additionally includes an idea on how to modify (at relatively low cost) an entire room to be a faraday cage without dramatic change in the appearance of the room.
I used to sell the instructions for $20, with the purchase price applied to the purchase of a meter. The idea was that one could see what the instructions were like without risking the investment in a meter, and if thinking it doable, go for the meter without wasting the $20, as I made it free with a meter if purchased outright. It was a confidence-building approach to decision making.
I also tried to talk people out of doing it by pointing out everything in this article. Only if they got past all the negatives, and still wanted to proceed, DID I HAVE CONFIDENCE IN THEIR DECISION. I needed to feel it was right, too, because I did not want a meter to be returned — a wanted a successful use of it to better the user’s targeting situation.
Since I no longer sell the meter, I make the file available on request by email to anyone willing to make a contribution to the Free Will Society, and our effort there to establish Free Will Haven, a targeting-free, low-cost, self-sustaining intentional community (learn more here). There are two ways to go: A $20 donation gets you the manual. A $50 donation gets you the manual AND membership in the Free Will Society (you must have a Facebook account, as well, to participate in membership dialogs) and an ebook copy of The Professional Paranoid, which also talks about privacy/security issues, which includes material also related to meter use as described in the introduction (frequency usage). That, alone is a $12 value. By all means, donate more, if so moved.
Note: A secondary goal of the Free Will Society, is to subsequently establish a mobile strike team with a full professional TSCM sweep capability, to include a van full of gear (image above). This would be used not only by Free Will Haven, but be able to be sent anywhere in the country to target perps covertly, and nail them to the cross, and blow the whole topic of political control technology wide open in media, and in the halls of government… globally. And yes, that means yet another million dollars are needed. So add zeros to your donation 🙂
The manual’s instructions can generally be applied to any similar products, if one simply reads between the lines, and compares the differences between meters usefully. This is true even if talking about the $20K flavor, though the capabilities will expand greatly as meter sophistication (and price) increases. Just keep in mind that an expensive and more sophisticated meter will likely require some IEEE technical expertise, such as I actually have. I even have some background in microwave technology, and signal processing as employed by the intelligence community (selling and installing such technology, as well as general security and alarm equipment).
The greatest improvement high-end gear offers will be in the range of frequencies (bands) which can be analyzed, but there are many other benefits to better units, as well. For instance, the ability log to memory the readings as you go, plug them into a computer for even more signal analysis (big step up in usefulness), and improved sensitivity in range and angle of reading. A low cost meter reads rather broadly, say 30-40 degrees of arc, perhaps more, where my meter reads as little as 3-6 degrees of arc. Most low cost meters don’t even specify, and the ‘funnel’ nature of a broad angle contributes to misinterpretations of reading importance or meaning. Narrow is good, but you can compensate by taking care and multiple readings from multiple angles (triangulate).
Finally, we need to talk about what constitutes a dangerous signal reading on a meter. These devices display information in a wide variety of formats and scales which leave a non technical person with no understanding of what a high reading actually means. It only matters and is useful defensively if and when the reading exceeds safe levels. Different kinds of signals might be deemed dangerous at a lower level than the kinds of signal. For example, pulsed microwave is the most dangerous of all, and can be so at quite low strength. This is normally the main threat a TI faces, but most low cost meters cannot distinguish between them, or measure them correctly. This is not something commonly mentioned in their specifications, and you need talk to their engineers to inquire, to be sure the meter can deal with it correctly.
As far as safe levels, there are many levels established by many agencies of many countries for many purposes. What is deemed safe in one view or situation, may not be save in another view or situation. The nice thing about the expensive meter I use, is that it knows all these limits and indicates when one or more are exceeded. With a low end meter, you need to compare your reading to the various standards. Learn more about such standards, here.
Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.
The way it is
The Three Answers
I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
Knowing the difference can alter TI tactics
About Death Threats
What will happen if a natural disaster or social upheaval comes and government cannot, or will not be able to defend you, your home, or your community? When armed marauders or looters come, will you stand alone, or will you have your own local network of helpers: Paladins?
What is a Paladin?
“Paladin” is another word for Knight, a kind of soldier of good moral character who in times of Olde served his fellow knights, community, country, and God. P.A.L.A.D.I.N. members are similar, and yet different. They are somewhat modeled after the Paladins in the popular Fallout computer game series, but THIS IS NO GAME. Fallout takes place in a future post apocalyptic World where there is no government, and everyone is struggling to survive, which literally means at times, kill or be killed, perhaps even eaten by others. Several groups compete for control with lust for power as their agenda, but the Paladins were formed in an attempt to maintain order and protect against such threats — a bit like self-organized Police the people come to rely upon.
Almost no one is truly prepared for disaster or civil upheaval. When it strikes, the impact of the disaster is therefore nearly total. All one has to do is look back on Katrina, or any other major disaster or upheaval around the World where local governments were unable or unwilling to respond — to see the value in not having to stand alone in a crises. FEMA and other government ‘help’ in Katrina was less than ‘useless’ for an extended period of time, actually causing more harm than good in many cases. Local law enforcement was either unavailable or, at times, a serious threat to many a resident’s well being. Likewise for the National Guard.
In such events, local governments at any level collapse and become non existent in domino fashion, while regional and national governments play political waiting games. The following is a quote from From Disaster to Lessons Learned: What Went Wrong in the Response to Hurricane Katrina?The Dissolution of Government
As noted earlier, disaster response in the U.S. is predicated on a system of “cascading failure,” in which successively higher levels of government are called in as lower levels are overwhelmed. However, the system requires some government to be in place. When the storm hit, local government in New Orleans, for all intents and purposes, ceased to exist. Both politicians and administrators had evacuated prior to landfall, and what little structure was in place was immediately rendered ineffective. The severity of the disaster also paralyzed state government and stunned federal government officials. A period of many hours passed before coherent calls for help began to travel up and down the system; even then, they were generally unfocused and nonspecific. Mayor Nagin’s media appeals for the federal government to “send everything” were heartfelt, but were so general they were difficult to act upon.
Meanwhile, at higher levels of government, a political showdown was brewing between the White House and Gov. Kathleen Blanco of Louisiana. Louisiana’s National Guard was heavily deployed to Iraq at the time of the storm, and the governor had activated pre-existing agreements with other states to “borrow” National Guard troops prior to landfall. These troops were quickly moved to the area, but the White House wanted to federalize the troops, while Gov. Blanco wanted to keep them under state control. The White House also disputed the timing of the governor’s request to release active-duty military troops into the area, although later evidence showed that the request had come much earlier than initial White House claims.
Even once on site, FEMA and National Guard, et. al., cannot be everywhere at once, and they cannot solve all the problems and threats people face. In some cases, policy or needs dictates result in harm to individual residents, mostly unintentional, but at times, intentional. In the end, almost everyone needs to fend for themselves for a protracted period of time, and that often means defending themselves from each other, or facing general extreme hardships or death, alone.
In Katrina, nearly 2,000 died, and many died at the hands of others (including authorities who opened fire on crowds trying to escape across a bridge). There were, in addition to looters and aggressive authorities, at least one known roving gang of vigilante Whites who had set about to kill Blacks they deemed looters, ‘loosely defined.’ The true number of murders is unknown; few records were kept given the mass casualties, but ‘bullet riddled corpses’ were not hard to find. Where there is no law, lawlessness ensues.
Bad things happen
Disasters are all too common, some worse than others. But imagine an outright siege caused by insurgents, racial violence of the sort this country has recently seen, or even military invasion such as foreseen in Operation Lion Dance; where Chinese flood into America via the Canamex rail system, hiding in container cars which can be parked on any rail siding in America from a laptop. Or perhaps it is simple revolution or civil war born of irreconcilable political differences. There are many such threats, none of which are especially likely, but all of which are specifically possible.
P.A.L.A.D.I.N. stands for Post Apocalyptic Local Area Defense Information Network; the core organization. Do not let the gloomy sounding name deter or fool you. While it certainly could be a possibility that doom and gloom awaits us on a regional, national, or global scale (it is after all forecast by virtually every religion and many experts in military, financial, and political circles), any simple disaster or localized upheaval can result in a crisis government is unable or unwilling to address quickly. It is even possible, some believe, that government might become the cause or actual threat themselves, such as in a military coup. But if having Paladins available to help you fend off a crises in a post apocalyptic tragedy, how much better then that they could be available in a lesser threat, such as a killer quake or storm?
Here are just a few such threats — do you have everything in place to survive? Will you, alone, be able to defend them from those who do not? Or will you be waiting for government to get around to attempting to rescue you, not as a soul in need of help, but a mere politically acceptable (expendable) statistic should they fail?• Sudden Poll Shift — a sudden shift could melt the ice caps and cause serious globally felt quakes • Sudden Ice Age or Ice Cap Melt — choose your favorite scientist and worry with them • Super Volcano — doomsday shroud encircles the planet killing all crops, causing ice age • Super Earthquake — hundreds of thousands or even millions could be homeless and helpless • Asteroid Strike — we’ve already had nearly a half-dozen near misses in the last twenty years • EMP Attack — total loss of all things electric, throwing us into pre industrial age • Solar CME Flare — same as EMP attack, but potentially global in impact • Planet X — we know it’s coming soon, its effects upon Earth could be catastrophic • Nuclear or Bio Terrorism — could render an entire region helpless • Pandemic — we keep coming close to having one, it’s only a matter of time • Financial Collapse — what happens when money has no value or is unavailable? • Civil Insurrection — race war, revolution, response to Martial Law, gun seizure • Military Coup — a top U.S. General has forecast it possible • War or Nuclear War — no nation is immune from invasion or sneak attack • Alien Threat — leaders of several nations and scientists have said it possible • Prophetic End Times Tribulation — seven years a mix of the above, or worse
The P.A.L.A.D.I.N. concept is simple, and addresses an important question: is it better to stand alone trying to protect your home and family against armed marauders or other dangers seeking to take what you need to survive from you, even your very lives… or to be prepared? Prepare a go bag and survival supplies, by all means, but to become a Paladin is to pre establish a local mutual defense network which can protect you and yours, your fellow Paladins, your community, and by extension, your country and way of life. P.A.L.A.D.I.N. is a non militia solution that can effectively become functional equivalent of a small and focused militia — on demand. It does not suffer the overhead and commitment of a militia, nor the political tainting.
Paladins may also elect to engage in general humanitarian missions at any time, for any reason or cause; actively active activists. This includes the possibility of providing aid to stalking victims, the homeless, or anyone being unfairly treated by another group in some way which cannot be well addressed by local authorities. It can even mean choosing to side with civilians against authorities in a non violent protest; whatever the Unit deems appropriate. Were I a Paladin near to the tribal protests in the Dakotas over the oil pipelines, I would have urged my Unit to give on-site support, for instance.
Everyone should join!
Anyone who has much to loose if accosted by armed strangers in a crises should join. Stalking victims and other persons who have experienced unusual targeting should definitely become a Paladin. This will enable you to call upon other Paladins when threats return, and help to document, prosecute, or thwart such targeting. Activists should join Paladin, as it becomes a tool useful in a cause, where you can make good argument to fellow Paladins to engage with you — and enables protection should those opposed to your cause elect illegal harassment campaigns against you (target you). Minorities and others who are consistent victims of gang harassments should also join, as it provides yet one more ally and strengthens your ability to stand against aggression, especially in rioting. Ex military should definitely join as an alternative to a Militia, which often has a bad PR image due to a political or religious bent they may have assumed. All are welcome.
To be a Paladin does not require ownership of a gun, but it is ideal. To own a gun does not require good training or a military background, but it is ideal. Weaponry and combat skills are only important WTSHTF big time, and most gun owners do know how to handle themselves, and they also tend to own more than one weapon, which means that in a pinch, they can share, teach, and lead. The primary requirement is to be of good moral character and to care about your family, your community, and your country. The rest will take care of itself; unity is the key factor.
P.A.L.A.D.I.N. Units of 6 or more Paladins are formed in any given Zip Code once at least half of the members do have arms, and at least one of them has some military or leadership background suitable for acting as Commander. Such leaders are provided with tactical advice on formation and operation of their Unit, and given contact information for any adjacent Units. Paladins can then call upon each other to request aid, or to propose missions to aid others. There are provisions in the formation of Units which allows local Units to join up for improved functionality, and for like hookup with Units in other communities, should regional operations be necessary.
Membership is by default anonymous except between Unit members and adjacent Unit Commanders, but that does not mean members must remain secret. Indeed, public evangelism and recruitment is encouraged (promotional materials will be made available). There is no membership fee to join. However, once a Unit is formed, a small annual membership fee determined by the Unit can be assessed to help fund missions or enhance emergency response capabilities. There can be some small personal expense in order to facilitate Unit functionality, such as the purchase of a Walkie Talkie by each member.
Each Unit is autonomous and stands alone in responsibility; it is not a political body or under the command of a national head, such as myself, even as founder. Therefore, there is no legal liability or risk except for those actions the Unit itself elects to undertake. I am not bound by your actions, nor are yours dictated or bound by mine. You serve only your own Unit member’s best interests and mission goals for public good, and remain subject to all laws in the doing, each member insuring the next does nothing which threatens Unit integrity or viability.
There is no political leaning or bent, nothing which should alarm authorities. In fact, Units should consider making themselves available as volunteers to authorities as emergency helpers or, where law enforcement has such programs, reserve deputies. In such a case, each member is free to participate or abstain, which is generally true in all missions. Units should be prepared to submit to lawful military or law enforcement once order is restored in a crisis, and should maintain records of all actions for use by any needed law enforcement investigations after the fact. That serves both as protection for the Unit and members, as well as a means to prosecute evil doers who may have been confronted by the Unit. Everything is above board and transparent within the Unit, and as private or as public as the Unit itself elects.
TO JOIN: simply email your interest to join to proparanoidgroup at gmail com and provide your City, State, and Zip. This does not obligate you to anything. This will be used to update a database of members maintained anonymously at my Facebook page for the purpose. That page is organized in a way which allows determining if a Unit can yet be formed in a given Zip — your evangelism in recruiting other members is key to that eventuality.
Once a Unit can be formed, members are so advised and connected to one another for the purpose of determining if they should form, and if forming, deciding who will be their Commander. They are also provided with additional support advice on how best to proceed as a functioning unit. Once forming, individual members are then obligated only to commit to the goals established by the Unit for mutual self defense and whatever additional good they may do for community and beyond, in or out of crisis (missions.) Risk and investment are minimal. Rewards can include the possibility of continued life, liberty, and pursuit of happiness — in the face of dire circumstances bent on preventing same.
Other material to consider
The Post Apocalyptic Library is an important collection of life-saving information commonly beyond the average person’s current knowledge base, and which will NOT BE AVAILABLE once disaster strikes. It is a series of links to critical information which can be learned online or downloaded and printed for placement in a go bag or emergency supplies for later use. It is advised that extra copies should be made in advance for handout to others.
The FEMA, Martial Law, and Revolution Database is a collection of materials which seek to educate the public about individual risks and likelihood of events beyond their control, and/or give advice on how best to survive or react. It is an eye opening review of little known facts which may prove quite sobering. Don’t be yet another Sheeple caught totally unaware.
Dropping off the Grid: abandon the Control Matrix. This author has done so for the last three years, and though living a rather spartan life by comparison to what came before, the freedom is enhanced, and the quality of life (happiness) with it. Living simply has proven to be more satisfying — and should be much safer in the event of major troubles. Here is a snapshot of possibilities. I will soon be offering a Seminar or other promotional venue (i.e., video) on the topic.
An Intentional Community is one way to live off the Grid. Here is one example, a low-cost, self-sufficient community based on tiny homes, a project of the Free Will Society I founded to helped stalking victims: it is called Free Will Haven. It has a gofundme. Such a community is by default more or less the functional equivalent of Paladins.
After working with over 12,000 persons coming forward for help with targeting over the last two plus decades, I’ve learned a good deal more than just found in my earlier books. There has never been a Targeted Individual who has not been accused of schizophrenia. While that can be true, it is often not true, and even when true, targeting may also exist. The issue must be dealt with head on, and with care, lest it become a stumbling block beyond cure.
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
• there are good and bad ways of addressing the problem.
First impressions DON’T count
When I’m first contacted by stalking victims for help as online consultant, the stories told me tend to border on what people unfamiliar with the subject would think impossible. The ‘natural’ conclusion, especially for professionals in health care, law enforcement, or governmental authorities such a person might turn to for help with their enemy and/or suffering… is that the person is suffering something in the realm of paranoia or schizophrenia. That is not always wise, but unfortunately, it is quite unavoidable, and for two reasons.
The first is that the symptoms of targeting are by and large identical to those of schizophrenic episodes. Hearing voices or seeing things no one else does are perhaps the most well known examples, all things that can be simulated with advanced electronics; voice to skull can be achieved by multiple methods; Sound Canons and other tricks can create otherwise unbelievable visual aberrations. But also, the general belief of claim that people are following, spying, or threatening, especially in numbers, is seen as a symptom. Enter gang stalking methodologies.
The second reason is less coincidental. People simply don’t want to believe in the Boogeyman, especially officials and other professionals, because trying to deal with something they can’t see evidence of being true is beyond them. That is their failing, often a thing wrongly taught them in their training. Often, that training was crafted by people who helped develop targeting methodology, former CIA mind control scientists. This has been well documented in many books, some of which were written by retired CIA types, and as referenced in my own book on topic, MC Realities.
This is especially true of the DSM series of mental health manuals, because at one time and even currently in some cases, the history of heads of collegiate psychiatric departments and EVERY professional association to which a psychiatric professional could be member… as well as Industry watch dog or promotional organizations… can be traced back to the original CIA mind Control Experiments as CIA employed researchers. As they die off, new ones are recruited, and the false narrative… a ‘lunacy’ about lunacy, goes on.
When Congress investigated CIA (and other agencies) in the Church and Rockefeller Committee hearings in the 1970s, CIA officially (claimed*) they had already shut down such programs because (they claimed*) they did not work. They then quickly scattered the CIA scientists involved to form three kinds of groups:
a) institutional and professional groups which insisted MC did not exist, did not work, and that anyone thinking otherwise was mentally ill or, in the case of professionals, guilty of malfeasance or malpractice;
b) like groups which pretended to seek and ‘help’ victims of MC; and
c) into key positions of power and authority within the psychiatric professional associations (all of them), and collegiate Psych departments, where they not only taught the preferred view about mind control, but also helped to write the DSM series of ‘bibles’ used by shrinks in diagnosis/treatment.
Ironically, the most notorious of group (b), above, was the Cult Awareness Network; CAN, which was consistently called upon by government to help ‘resolve’ crisis arising involving the so-called ‘suicide cults.’ CAN has since taken over and operated by the Church of Scientology, seen by many as a mind control cult in its own right. This was a favorite area of CIA mind control experimentation, trying to find ways to get large numbers of people to kill themselves as a collective. Read Psychic Dictatorship in the U.S.A., by Alex Constantine, for a long list of such experiments. Alex, by the way, was targeted for his writings, and went into hiding for a time. The other purpose of group (b) is to recapture persons who may have escaped mind control projects or who, due to mental issues, may become good subjects as training fodder, and brought into such projects.
What makes it ironic is that CAN advice and helps (pre Scientology) consistently resulted in the mass deaths of those being helped, examples being WACO and JONESTOWN. In both cases, the CIA plants within the groups ‘miraculously,’ managed to survive unharmed, and quite by ‘coincidence,’ the leaders and core members of those groups had previously been in spheres of influence of MC scientists in group (c), above. More could be said about such things, and have been, in MC Realities, Alex’s book, and others. But starker proofs such claims are false exist.
In my first book, The Professional Paranoid, I cited in the Appendix some 400 CIA fronts and influenced organizations which predominantly predated the Church/Rockefeller hearings. Almost exactly half of those had to do with Mind Control. CIA book vanished that book by buying all available copies from suppliers, having one of their own publishing fronts invest in my publisher with the proviso my book not be reprinted, and then ‘selling’ used copies for nearly ten times their face value so that people who had copies would sell theirs for a bit less… and then buying all those up, as well. It is a common CIA trick.
But my publisher was a good guy and he returned the book rights to me, something CIA had failed to think of specifying he not do. So I now effectively ‘self publish’ using print on demand for hard copy (through paranoiapublishing.com), and ebook versions directly through me (proparanoidgroup at gmail com. This makes it impossible to book vanish. Subsequently, in my third book in the Professional Paranoid Series, The Defensive Field Guide, I included 1,000 CIA fronts, almost all of the additions coming into existence post Church/Rockefeller hearings. Guess what? STILL — over half of them were/are involved in mind control related operations. CIA lied to Congress.
The unexpected result of my books was that they sponsored a flood of requests for help from victims of targeting. The overwhelming majority of such requests were from people suffering some form of mind control technology or methodology, most notably, organized ‘gang’ stalking, and/or Directed Energy Weapons (DEW). As result, I felt obliged to attempt to offer professional online consulting services to attempt to help such persons.
This is a very difficult thing to undertake for more reasons than just the communications issues forced by being limited to dialogs at distance without more personal on site direct involvement. While I also offered direct intervention services, they were always beyond the financial ability of the victims; mind control is never worked upon the wealthy unless they first attack and destroy the victim’s financial underpinnings.
Early on in offering such helps, and even in trying to sell my books in the first place, the issue of mental health questions loomed large due the Boogyman Disbelief Syndrome. BDS is a form of mental illness (not found in the DSM, of course) which causes professionals to ignore facts in the Congressional Record, scientific papers, patents, and books by endless authorities on topic, and insist therefore that persons claiming to be targeted are ALWAYS mentally ill, per the DSM bible they worship; they live and work as if in a cult, themselves victims of a form of mind control, the very thing they deny exists.
I have personal proofs I can speak to, as well. I ask professionals who think only schizophrenia possible to explain how it is that, with my defensive and offensive tactical advice, it is possible that some TIs have obtained the ultimate relief? By that, I mean total ending of their problem in ways which prove it was not a mental issue. The proof being in the form of paying huge sums of money by those guilty of targeting as retribution, and/or providing ‘dream jobs,’ record contracts or book deals, and so forth.
The Elephant in the room
That unhappy irony aside, Virtually ever TI, if telling their story in full, will make claims they assume to be fact which seem impossible to the listener, especially if unfamiliar with the topic. After thousands of such stories, even I can still be surprised. As stated, the natural conclusion is some form of mental defect in need of professional care. Especially if the listener is a psychiatric professional; the DSM tells them what to believe true — that schizophrenia is the only possible cause for targeting claims.
It was therefor proper that I early on advised that some form of schizophrenia or paranoiac affliction must always be considered a possibility. However, I also told clients that EVEN IF TRUE, it did NOT mean the person was not ALSO targeted, something no psychiatrist seems able to ever consider possible. In fact, that TI circumstance is actually quite common in my decades of experience of working with TIs. I therefore chose by policy to ignore any and all clues of potential mental health in any decision to proceed to offer helps. The only SAFE presumption by ANYONE professionally offering help is that targeting must be considered and investigated. To do less could leave one legally liable.
One additional reason to so proceed exists, and it is unique to true targeted persons. One of the primary goals of targeting is to reduce them to a political, social, and financial zero, and the main method employed is to make them LOOK insane, as quickly as possible. One way to do that is to mislead the victim into believing things true, which are untrue. Therefore, any general belief expressed by a TI which seems unbelievable may be explained by this fact, and is yet one more reason not to dismiss the claims as baseless; they are in fact, mere symptoms of targeting as much as of potential schizophrenia.
There are countless ways this can be done, and two key benefits are derived by the tactic. The first is that the implication of insanity is achieved, which leads to denial of helps even from loved ones. Destruction of personal relationships and other help resources is also a primary goal. The second is that the TI will end up fighting a non existent problem, and in making no headway, more quickly succumb to giving into feelings of defeat, breaking their will to resist. IT IS A TRAP, one I never allow a victim to fall into.
I have, therefore, never turned someone away regardless of how much it appeared their problem was mental. For one thing, it was quite often found true in time that persons with various mental issues were (and are) deliberately selected for targeting because of that fact, especially if the purpose of targeting is training exercises; any mistakes that might end up involving Police will be immediately dismissed on that same ‘presumptive’ basis. So it is absolutely possible that targeting and mental health issues are present in a given TI’s case.
So I always tried to early on include dialog on how to best address the possibility of schizophrenia and PROVE the answer, whatever it really was, one way or the other. If TRUE, it would be best to get treatment and resolve that issue, first. RARELY is anyone willing to take that advice; they find the prospect too scary, because of the history of psychiatry being rather prone to forced institutionalization with horrific results (as exemplified in One Flew Over the Cuckoo’s Nest). Such hesitance has not seemed to matter that much, because after working with someone for a while, I am eventually able to discern the truth for myself, and advise such help is their only chance at relief.
I will state for the record, quite contrary to DSM assertions, that about only about 1 in every 5 or 6 do suffer schizophrenia and are not truly targeted. I would then so advise, offering as many factual reasons as I hoped would be logically seen as true and valid to the client. Once in a while, they would see the truth, and act on it, but not often enough. A lesser number have been judged both schizophrenic and were also found to be targeted. The remainder were simply targeted, and merely seemed schizophrenic outwardly by third parties. They might additionally be seen as slowly being driven into a naturally resulting state of paranoiac behaviors. That is not the same as being mentally ill, certainly not the same as being schizophrenic; it is simply survival instincts gone overboard in an appropriate effort at self defense. That, I can work with on my own, and it takes no psychiatric skills, only logic.
The nature of the Elephant in the room
It is important to understand: Schizophrenia is not some shameful state of insanity such as people tend to think it. It is simply (rather overstated) a chemical imbalance in the brain which can often be addressed with drugs and good council. Yes, there are significant pitfalls in the treatment process; there is a level of quackery to the ‘science’ behind it, and that results in a hard path typically full of side effects from trying to find the right med and dose level. The patient becomes a Guinea Pig. When the ‘science’ can consider the varied physiology of individual patients and come up with the right med and dose the first time, THEN, and only then will it actually be science, IMO.
But there is a significant difference between privately seeking help and being forced into it by ‘the system.’ The latter can sometimes result in forced treatment to the point of creating a ‘cured’ human vegetable who cannot function on their own, essentially institutionalized for life. The former is considerably safer and far less likely to have an unhappy ending, the worst possible result being an unflattering written record and a period of unpleasant side effects which soon enough wear off. A good result, however, would be a written clean bill of mental health; a well deserved middle finger upraised to all who doubted.
Too, some care must be taken to insure that the meds do not lead to suicidal thoughts without care to prevent actualization; many psychotropic treatments do have such side effects upon withdrawal from use, some upon use. I know of this and other unpleasant side effects first hand, as I and several members of my family have been put on such medications, which are often used for more than mental issues.
Fortunately, there are ways to seek voluntary helps with reduced risks — but which are situation dependent and cannot therefore be well described, here. But schizophrenia can also be addressed with WILL POWER, though a rare eventuality. This is seen in the movie, A Beautiful Mind, a true story. In fact, watching it led me to develop an all new technique useful in reducing the actual effects of various targeting methods, including DEW. I’m talking about reduction of targeting effects, such as pain and manipulations of mood, alertness, and mental acuity.
They can even work with non targeting issues, such as pain reduction for toothaches, burns, Diabetes, and other cause, or even to help neutralize tinnitus (encouraging, but as yet no results against voice to skull). While simple in method, they are difficult to master; akin to trying to become a Jedi Knight in descriptive processes. But some can make them work usefully to one degree or another. This, too, is beyond the ability of this Post to well address. Anyone wanting to know more may email me at proparanoidgroup at gmail com and ask for the Jedi papers.
The good fight
I write of all this, today, because I just received an email from a Man in a distant country I had been working with for a while. He was quite adamant about his stalking, and elements of it certainly were beyond anything possible in reality. But he did have the will to brave the process of professional care and did brave the treatment trial and error, and was actually cured. He wrote to thank me and put my mind at ease, a kind consideration on his part. The transformation in his life was so significant that it was clearly evidenced in his writing style and commentary. His very personality and mental prowess was restored.
It was extremely gratifying to hear of his victory, and see him restored to a normalcy, even though I could take no credit. I wish I could get away with saying all TIs were schizophrenic, and that such treatment was the only solution (the official shrink view); it would have saved me decades of unhappy dialogs and less than perfect results. If it were true, and if victims would be willing to undergo treatment because there were no dangers in doing so, it would be a far more perfect World. But sadly, such a World view would be delusional: exactly as embraced by most professional psychiatrists, today.
I complimented him on his bravery for undertaking that hard road, and for enduring the clumsy treatment process which eventually leads to a cure, or eventually illustrates by lack of cure, that schizophrenia is not present. Getting a piece of paper from a Doctor that treatment had no effect is useful evidence to a TI. EITHER RESULT is a win win, even where actual targeting is present along with mental disorder. Where the victim can eliminate those things imagined, they can better focus on defense and attempts to prove those things which remain and are real. Perps will flee in the face of exposure. The trick is actually being in a position to confront them with that possibility, a matter which dealing only with reality can afford.
It cannot be done by struggling against imagined enemy tactics and methods, regardless of if imagined through chemical imbalance, or imagined due to deliberately fostered false clues. “A mind is a terrible thing to waste,” but that is exactly what mind control seeks to achieve. A TI must above all else, therefore, take any and ALL steps necessary to safe guard the health of their own mind. Free Will, the gift of God, is as precious as the gift of His Grace and of life, itself. These things are a TI’s best weapons of defense and offense. I have a whole chapter in my book on exactly how that is true; Religion and MC. This, too, is available as a free .pdf on request.
The right use of Free Will (righteousness = right use ness) might just include ‘willing’ one’s self to brave confrontation with that Elephant in the room. Clearly, it will involve other battles, as well. Never is it an easy path, and even where victories are gained, it is more often true than not, that total escape is not possible. Some break free, but all who properly resist can at least better their circumstances well enough that they can claim victory, and as a survivor, survive what targeting remains as more a nuisance than a life-long debilitating experience.
Is this not what someone with a physical handicap or long-term debilitating health issue must do, if to survive? Targeting is no different a thing, except that it is forced upon the TI by outside forces for evil cause, quite Satanic at its core. It is, therefore, a spiritual handicap, more than physical or mental, if rightly viewed; it is a war for the spirit and free will of the victim, that very gift from God. Therefore, God is indeed the best ally.
I hope this one example gives hope to those in dire need. That, too, would be a credit to the man who wrote me, a kind of legacy or testimony which hopefully leads others to dare to do the same. Just take care, if that includes you. The path is not easy to see, and there are brambles to each side which must be avoided. While I can no longer offer actual paid consulting services, I do remain available for guidance and providing answers to simple questions which do not involve significant situational analysis (proparanoidgroup at gmail com). I answer all inquiries in person.
If I had a dollar, or even a dime for every web page that mentioned or quoted me or my works, I’d be a millionaire: 12 million pages can’t all be wrong; people repeat what I say. Where else but America can you become ‘famous’ for putting your foot in your mouth on a regular basis?
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
What you will get by reading this post…
• Silly quotable one liners, gags, and full-on original jokes;
• witty quotable witticisms, wise sayings, criticisms, and other malarky;
• non PC quotable political snipes, barbs, and ruthless rhetoric;
• thoughtful quotable philosophical wisdoms, advice, and beatitudes.
My most popular writing today has been copied by permission on hundreds of Web sites, and reproduced in at least a half dozen books. So I know I’m quoted out there. It is even used in college courses on Political Science, Journalism, and Psychology. It’s called the 25 Rules of Disinformation, and includes not just how to spot disinfo, but how to out it and defeat the user in public or private venue.
This post is (mostly) a collection of my most popular Facebook posts. People generally like them, unless on the wrong end of the barb. Even then, the resulting dialogs have been interesting, and we tend to remain friends. But most people on Facebook do not ‘go looking’ for something to read, they let Facebook automatically send them random samplings in their ‘feed.’ It is really best to FOLLOW someone you like (also true of my blog posts); the only way to insure you see everything a given person posts (or blogs), is to follow them (subscribe — click that option now, while you are thinking about it.)
So, even if already a Facebook friend, it is highly unlikely you will have seen very many of what follows: a random grab bag of quotable material. Now, if you do actually choose to quote me, please do cite me as the source, and link either to this blog Page or the whole Site, or my Facebook page. New friends are welcome there, of course. You can quote me on that!
You May Wish to Quote Me (I do it all the time)~
If I had a dollar, or even a dime for every web page that mentioned or quoted me or my works, I’d be a millionaire: 12 million pages can’t all be wrong; people like what I say. Where else but America can you become ‘famous’ for putting your foot in your mouth on a regular basis?~
You may have noticed that I’m imminently quotable by the way I continually quote myself, because after all, “I’m imminently quotable.”~
The only good thing about putting my foot in my mouth so often is that I always know if my shoelaces are tied, or knot.~
T’was an LL Cool Day
(apologies to LL Cool J)
I saw an Armadillo while visiting Amarillo;
he sat near a willow, upon a satin pillow.
In the sun, bright yellow, this reclining fellow
seemed to be quite mellow, eating a bowl of Jello
while listening to a fellow who played a loud Cello.
Were I to say hello, I feared I must such bellow;
that seemed such a peccadillo, I ne’er met that Armadillo
If Google spies on your searches, shouldn’t their name be Goggle?
If Yahoo does, Youwho?
If Facebook tracks your info, Factlook?
If YouTube censors excessively and politically, LubeRube?
If television is propaganda, Tellyourmission?
If a newspaper is the same, Newsfaker?
If the Oval Office is a source of lies and skullduggery, the Shovel Orrafice?~
The meaning of Life? To take all gifts entrusted to you by God; Free Will, life, and the Soul which defines the inner you, and the gifts you earn through life; knowledge, talent, skills, wealth and possessions, experiences and positions… to edify yourself, edify others (family, those above you, your peers, and strangers), and above all, edify God in the doing. This is true Glory, and the source of Blessings.
To the extent you do this, you yourself fabricate that meaning. To the extent you fail to do so, you dilute or even destroy it. Any faults or failures you have along the way are challenges in learning, and otherwise non sequitur to the equation. This is true Faith, and the source of Happiness.
Don’t focus on them, learn from them, and go on. You are what you’ve been waiting for, all along. Stop looking so hard for simple answers, and stop struggling so hard against battles predestined to be won by the righteous. If God be for you, who can be against you? This is the true foundation of Peace, and the source of Strength.
The meaning of life, is YOU, and I’m glad you have friended me. As I wish for me, so I wish for you. Thank you for sharing this Sunday with me.~
Wisdom is sometimes knowing how to seem wise without anyone’s means to challenge. After struggling to the top of the mountain to ask my one-allowed question of the Guru, he preempted with an answer: “Yes, my Son,” he said, “you have at last made it to the top. Now leave me in peace.”~
I wonder if Pavlov’s Dog’s got that way eating Pavlum? Probably not, it wouldn’t make me salivate.~
You know your’e an alcoholic and an unpleasant drunk if people invite you to their parties the day after, and you are so sloshed you think you just got back from it.~
I’m sorry, but I think I misunderstood what you wanted me to consider about what you probably meant by saying what you thought I would be able to relate to as allegory to the intended thought you had in mind, but couldn’t articulate because you were afraid I would misconstrue it as something else. What were we talking about, again?~
A dirty joke is to humor in a way exactly like the Presidential election is to politics.~
Rain falls in drops because it’s happy water. When it’s mad, watch out for hail.~
Oh, old Crow, so cautious and suspicious,
not like the Goose, who’s calm with aplomb,
your caw is such an appalling loud calling,
unlike parakeets most cheerful earful,
or eagle’s shrill cry from high in the sky.
Your old black cloak does fail to evoke
the visual delight of a Parrot, so bright.
You walk with a hobble and a wobble,
where a Robin bounces and pounces,
and the Stork is stilted and often is tilted.
And though your flight is quite alright,
it’s not as stunning as a Bird, Humming.
Lacking the Hawk’s glide so full of pride,
sans any formation of Geese’ inclination,
nor is it as swift as can be a quick Swift.
Your Murder is a suspect some fear to detect,
and yet, I suspicion, it’s all mere superstition.
Yet do not away rush, my criticisms to hush:
let not any objection be seen as a rejection;
I do like you old Crow, so brag on, and crow.
To escape vile fate I must get past that damned wall;
because if staying here, I’ll not likely survive it at all.
I tried to climb upon it, up high, no good, then higher,
only to find it topped with wickedly sharp razor wire.
I tried to go around it, hoping an opening I would find,
but it surrounds me completely, and I’m trapped inside.
I tried to dig under, tunneling deep, deep underground
but impassable boulders and water did me confound.
To escape my foe I must get past that heartless wall;
I’ve no choice; to give up certainly means my downfall.
I’ve asked for help from all near who might could hear,
they refuse to give aid, yielding to their own dark fear.
I’ve prayed to God to help, to redeem and set me free,
but I’m afraid in here, even He can’t hear me or see.
Then came a gentle voice advising firmly to be still,
“I’m with you always, as is my gift of strong Free Will.
To escape your foe, you must get past that mere wall,
and there is yet one thing you’ve not tied, not at all.”
My thoughts reeled, and the answer came in a flash,
I’d not yet tried attacking head on, the wall to crash.
I gathered my courage and backed up for a good run,
and ran headlong screaming at the top of my lung.
I hit that wall with all my brute force, and hit it hard:
knocking myself unconscious right there in that yard.
To escape my foe, I’ve tried it all, to get past the evil wall;
but nothing has for me worked, no not one, nothing at all.
I awoke quite dazed, my fist clinched in pain and my rage,
the voice had not well helped me, its advice was not sage.
But regaining my feet, a white robed figure there stood tall,
amid the rubble of that same accursed, impassable wall.
“You’ve escaped your foe,” said he, “right through the wall;
not by your strength, nor luck, but that on me you did call.
The miracle you sought was within you right from the start,
your faith in me was all it took; and abiding love in your heart.
If God be for you, no man or thing against you can stand,
when you hit that wall, I was there with you, hand in hand.”
Sorry if I insult you. Being poor, I have to go for the cheap shots.~
Any man can toast his friends at the tavern. But a brave man toasts his enemies. That’s why I always carry a can of lighter fluid when I go drinking.~
I never quite chimed in with the 60’s by wearing bell bottom pants – until I got kicked in the groin.~
I’m never inclined to eat carrots. I just can’t see my way to do so.~
Linear or Columnar?
A rhythmic rhyme in a single line is often quite fine.
but most like a rhyme
to be of many a line,
or to metrically align; be symmetrically sublime,
or perhaps its just fine
to enjoy any old rhyme.
I’ll not vote for she who does cackle
when refusing a tough query to tackle.
While not happy with alternative Trump,
he’s still better than a kick in the rump.
While Dems are OK with criminal lies,
and Establishment Reps swarm like flies,
a candidate ripe for an email blackmail
risks a serious national security fail.
A lot of drinks call for two fingers of this or that liquor, so I always look for bartenders with really big hands.~
The path to illumination in the darkness is called a sidewalk.~
I do not like this Uncle Sam, I do not like the health care scam.
I do not like these dirty crooks, or how they lie and cook the books!
I do not like when Congress steals, I do not like their secret deals.
I do not like this speaker Nan, I do not like this ‘YES WE CAN’.
I do not like this spending spree, I’m smart, I know that Nothing’s Free!
I do not like their smug replies, when I complain about their lies.
I do not like this kind of hope. I do not like it. nope, nope, nope!
There are rarely times when ‘actual’ sex is as good as ‘fantasy’ sex is imagined. However, they both involve a little ‘t’ & ‘a.’~
The only ‘gun control’ I support is that question in the mind of the criminal intent on causing trouble, “Will he remain in control of his fear or temper, or will he pull the trigger.”~
If Trump is such a chump we’d rather dump,
and Uncle Bernie is ample wormy and too squirmy,
and Hillary far too shrillery under FBI drillery,
with liberally bias in the press giving truth no redress…
Does that mean Biden is bid’n his tim’n in decid’n if rid’n
White Knight like last minute to the Demo’s pandemic…
Is that how we’ll be decid’n who’s presidential presid’n?
Is that Obama’s last prick on his way out, his hat trick?
That I won’t at all be abid’n, down too far we’ve been slid’n.
Yes, wine is quite fine when you have the time, or dine,
but weed has more speed if you have the need; do proceed.
The joke for this bloke is that I cannot smoke, nor toke,
and shrink from such drink – an alchoholic’s dread; brink of stink.
Dope lacks hope that I’ll survive or cope its scope,
so here’s my fears (why I’m lacking cheers amid tears):
this guy will die having never daring a high to try.
That hex did vex untill realizing that the Rx is sex!~
Never hiss at a snake; the conversation could be deadly.~
Do you know anything of the Entymology of Entomology,
or is it to you as confusing as the synopsis of synapsis?
(What difference does it make?)
As I have previously stated,
I am quite totally devastated
not to have been reinstated.
I have frequently formulated
and as often have postulated
just why I’m not yet reinstated.
The cause, you see, is equated
with rumors and lies oft related
to prevent my being reinstated.
They shout with glee, as if elated
with prideful egos thus elevated,
for blocking my being reinstated.
They say my claims are overrated,
to a job where I ne’er participated,
and that’s why I can’t be reinstated.
If people died while I simply waited,
shown in lies and emails evaluated,
what difference to being reinstated?
My right, you see, as Royal rated
is for all to worship me unabated,
and vote to have me reinstated.
Never apologize to me for being you. Just stop it!~
Why do some of us eat the icing out of the middle of an Oreo? Where else would it be?~
I saw last night the thinnest sliver of a silver Moon,
a most pleasant crescent, present this month of June.
So thin that it did quiver and thus scant light deliver,
did I realize before my eyes it would dematerialize.
Now its gone, but before too long, watching for its rise,
to my boon: it shall return soon, as a mirror sliver Moon.
A simple rhyme takes little time,
a light banter with good cantor –
best if exquisite, expressed explicit;
easy to recall in its all and all.
In A Rush
Here”s a quick li’l poem:
done now, I’ll be goin’.
What’s wrong with the Mayor of New York, does he not know his soda ban and tax is suppressing Pop Culture?~
Unfortunately for Custer, at least 10 Little Indians never heard that song.~
Time Tells No Tales
Once upon a time? No, I’m highly suspicious.
If it only happened once, it must be fictitious,
especially if remarkably good and not malicious:
Real events repeat themselves through history,
written down in pages for study by you and me,
where learning not, we assure repeat eventuality.
Take heed, look around: here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.
Your words will not sway me, no dark threats dissuade me.
Take heed, look around. Here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.
No trick or lies, nor treachery will keep me from remaining free.
No unjust laws, cops or military will I respect, still shall I tarry.
Take heed, look around: here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.
Surround me with vile forces, I’ll ignore their foul loud voices.
Dare attack me if you will, I’ll reply ten fold until my body’s still.
Take heed, look around: here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.
They say the Earth’s rotation is slowing down. I have a simple cure. We all get in our cars and face them West, and synchronize burning rubber.~
Status Quo: Latin for we want you to think things are equal and as they should be so you
will shut up and do what you are told.
Parity: French for we want you to think things are the same and as they should be so you
will shut up and do what you are told.
Equality: Ye olde English for we want you to think things are the same and as they should
be so you will shut up and do what you are told.
Same: what we mean when we are talking about one political party compared to another,
those people who want us to shut up and do what we are told.
I thought of a Hillaryous joke, but I don’t want to keep insulting Democrats.~
Do my witticisms impress you or simply depress you?
Do my jokes make you laugh or think me some Jackass?
Do my poems seem lyrical or are they just predictable?
Do my posts give enlightenment, or seem closer to excrement?
Do you share, like, and follow, or is our friendship just hollow?
Smart by Default
Any wisdom I have lies in taking some care
in choosing the friends with whom I will share.
If smarter than me I will make them aware:
I agree with them, and with flattering flair.
If not as smart, then will I then declare,
their inspiring thoughts lead me to dare.
A tack pins things down, while pins prick things deeply, but a prick is always tacky, hard to pin down, offending deeply.~
Time for me to post-a-joke. Invented by a stand-up comic, it’s like a Post-it Pad, without any glue to hold it together — so it’s insanely presented in unexpected ways, and it is colorless, unless fucking off color or borrows the color of a racial inference. Wait… that’s a political speech.~
I think I understand the term ‘feedback loop,’ now: GMO crops.~
Shoot first and ask questions later. It saves dialog and you don’t get ambiguous answers… if there are any answers.~
I’m the first to admit I know so much about everything,
an expert assumed, presumed, or claimed unrelenting.
In truth it seems, I know not enough on any one thing,
to avoid putting my foot in my mouth without realizing.
Your Bad, So Sad. My Bad, And Glad
If you insult me, let me be quite perfectly clear,
you’d better be right in your basis, my dear,
because logic, facts, and reason, you’ll hear,
the weapons my response will burn in your ear.
Excuse me if I’m less than politically correct,
but especially if trying to point out your defect,
you have no legal right to avoid being upset
by my Free Speech, you fucking dumb idiot.
I’m not going to post anything useful, today. I hope this heads up proves useful. Doh!~
I get rejected a lot by the ladies. I asked one gal if she would like to go out on a double date, and she said “Sure. How about Judgement Day, and the Day after.”~
Hurry, hurry, hurry! Step right up folks, and get your fresh posts, right here, right now. Only $1, five for $3, and a surprise in every one, guaranteed, or your money back. Don’t be misled by the competitor’s claims; they only post kitties and slogans, and complaints that no one comments. Hurry, hurry, hurry!~
My Prayer today, is for you. There is nothing better than other people praying for you, especially if praying WITH you. We’re not getting older, just getting closer to home! Be Still, and at peace. Now, it is true that the Lord’s Prayer is quite sufficient and complete to God, but sometimes, we feel we want to say more. That is good with God.
May I suggest the prayer below? If ye pray it as you read, it is the same as if we have done so together; Matthew 18:19 “And I tell you more: whenever two of you on earth agree about anything you pray for, it will be done for you by my Father in heaven.” All that is required is that the prayer be righteous and fitting to God’s Will, which is defined to the extent we are able to determine in his Word. If we do not vary from that, we are apt to receive that which we NEED, if not that which we THINK we need and seek by prayer (be careful what and how you ask for [it].) Begin:
Heavenly Father, thank You for each and every day; today is a Day the Lord hath made, we rejoice and are glad in it, for You have blessed us here on earth yet again. Thank You for Your tender mercies of your Grace, and the gift of life and of Free Will, which lead us through the day; may we not abuse these gifts and offend You. Thank You for giving us family and friends to share the joys and burdens of the day. I ask You to bless my family, relatives and friends and those I care deeply for, and those who are reading this right now, especially those who are suffering and in need of your intervention.
Where there is joy, give them continued joy. Where there is pain, give them peace and mercy. Where there is self-doubt or confusion, release a renewed confidence and understanding. Where there is need, fulfill their needs. Move them to study your Word, to strengthen their faith and embrace the Gospel, and to be moved thereby to spread the Word. Bless their families, homes, finances, their goings and their comings, and turn aside their enemies in forgiveness, which is to our good as well as our enemy’s good.
Above all else, may Your Will be done, in Jesus’ name,~
If Istanbul used to be Contstantinople, does that mean they got tired of constantly being in Ople, wherever that is?~
Just because I disagree with you does not mean I don’t like you. I hate everyone equally.~
A conspiracy unfolding is like a barrage of arrows in the dark. You hear evidence that something is not right, but don’t don’t get the point until it is too late. Worse, you also get the shaft.~
My mind, not very clear right now, so
writing some clever rhyming ditty? No.
But I know some of you like that stuff…
So there’s only one question:
Is this good enough?
Good example of a self-fulfilling prophesy: “I’m going to enter the hot dog eating contest.”~
It must be true that you are what you eat. I live on $3 a day in food, and one look at me and you will know, I’m a cheapskate.~
Why do they call it an aptitude test? Because if you have to take one, you are apt to detest it.~
You will note I don’t call people who don’t agree with me bad names. That’s because the bastards have thick skins.~
My computer is dying now of old age,
and while buying a new one is truly sage,
and newer models are quite all the rage,
there’s nothing but zeros on the last page
of my checkbook; no income at my age.
My mouse is destined for the round cage,
unless comes a miracle or magical Mage.
A chant can be a kind of moving song,
easily remembered for singing along.
A chant can be a loud and angry jeer,
prompting attention, worry, and fear.
A chant might be for someone; a call,
for entertainers or leaders loved by all.
A chant gives power to thought and word,
assuring its message is clearly heard.
But a chant by Monks is the best to hear,
binding us to God and drawing Him near.
If I have a Colon for which I might need a Colonoscopy, and use :s and ;s in a similar manner all the time when I write, why can’t I get a Semicolonoscopy, and save some money?~
Lately, I’ve been thinking of taking a plane somewhere to improve my sex life. It won’t matter where, I just going through TSA will do the trick.~
OK, time for me to say something funny. But that would be deja vu.~
The next time you hear some wimpy Liberal whining about some perceived micro aggression, say to them, “To quote an oft used line in The Princess Bride, my little precious Princess… ‘I do not think you know what these words mean.” Then slug them in the mouth and say, “You cannot ‘micro’ that; there would be no point.”~
Since I’m left handed, I never need a Compass; I just use my southpaw.~
Since there is no longer rule of law in this country in high places, such that no one in government is held accountable, and the very laws they write are themselves violations of law (unconstitutional), and government itself is the biggest criminal… I reserve the right to violate ANY law at ANY time for ANY reason.
My authority is the Constitution, my basis the Pursuit of Happiness declared therein, my means is Civil Disobedience, my support is the Second Amendment, my argument the First Amendment, and my goal is the Redress guaranteed therein. I rest my case, and those who choose to oppose me may rest in peace, if that be their choice. No appointment needed.~
An election process is like a stale fast-food hamburger. On the outside it looks big and besprinkled with seeds of wisdom. On the inside are secret conspiratorial sauces and lies about quality and quantity of substance, and wilted vegetable-like promises. Do you want fries with that? Cold, greasy, and slimy press coverage.~
Never wander around in the dark. That would be you watching TV ‘news.’~
When people talk about shooting at dummy targets, are they hinting at politicians?
Is that why you never see politicians at a gun shop or shooting range?~
I encourage free speech. And, I own the concession on ear plugs in the District of Columbia.~
Cat got your tongue? I don’t know how you can stand there so silently, I know I’d be screaming; that’s got to hurt like hell.~
Politically Correct is not for me, my friend,
the 1st Amendment says I’m free to offend.
My words, ideas and actions do not pretend,
that you’ve no right against them to defend;
just do so to my face with honor and it will end
with agreement or no, but still friend to friend.
Never Opt for signing a waiver,
never waiver in copping a sign;
raising up high a middle finger,
rather than your rights to resign.
Prose is prone to rhyme in a rhythm so quaint,
but to intone it sublime; a sure given it aint’
Alien observer’s notebook: Man is a lousy Plumber. He must think the Ocean is impure because he keeps trying to filter out the fish with giant mesh filters. Silly creature. When that doesn’t work, he drills holes in the Ocean floor to drain the water out.~
Someone said I might should listen to Meatloaf on CD. I don’t get it. As soon as I put a slice on the CD, it stopped sizzling and I couldn’t hear a thing.~
Does the FCC really know what they are doing? I find myself waking up to AM Radio, so I know what they mean when they say ‘Morning Radio.’ But while I can find an FM station, I can never seem to find a PM station. They need someone from the NyQuil folks to run the outfit, I think.~
The answer to the age old riddle: what came first, the Chicken, or the Egg? Answer: neither; it was the Rooster. (surely, someone else said this somewhere, sometime earlier)~
I must be a looser. There was this gal I liked who always bought fresh produce. But when I got fresh, she just slapped my face.~
To big to fail cost you and me,
for bailouts, and lost property.
To big to nail, cost prohibitively
the national debt ridiculous, be.
To big to jail cost you and me,
for hall passes for Mz Hillary.
To small to hail, just you and me,
our vote has no voice collectively.
Time to offer up a bit of wit.
Something funny to any Brit?
Are you worried just a we bit
about a future Brexit bad sit?
Afraid there’s no way out of it;
to escape a daily diet of shit,
Mushrooms often get slit and bit.
Chicken Little a warning did brae,
none believed in what he did say.
Many long years since passed away,
we still refuse to believe him today.
Yet Planet X and Wormwood obey
God’s Will and ARE heading our way.
The moral to me seems thus to say:
good Chicken Littles should now pray;
for it is written, “None knows the Day,”
I never did well in Science Class. I still don’t know the conversion factors between celsius, farenheit, and college degrees.~
Hillary avoids Potatos and Corn. She knows they have eyes and ears and might testify.~
Gmail just informed me my folder :”Hate Mail” is full. Half of it is from Democrats, and half from Republicans. The difference is, the Republicans tell me exactly why they don’t like me, and the Democrats only tell me how they feel.~
Taxes are a fiction, just as are the wages taxed; when the dollar is nothing but an I.O.U., you never really get paid, and so, you can never really be taxed or pay taxes, either. Credit and Bank Loans are a also a fiction, just as are the checks (also I.O.U.s) used in obtaining the loan or repaying it – and the bank didn’t even have the money to loan in the first place (allowed to loan up to 20 times their bank deposits). We just keep spoofing each other to solidify the illusion.~
If you still hate someone after putting yourself into their shoes… then they are obviously too tight because you are too big in your own mind for your own good, fat head.~
Be thankful I’m retired. If I was doing this full-time, I’d bore you to tears.~
Now days, the only way to achieve inner peace, is to scream at the top of your lungs for the politicians and newsmen to fucking go to hell, until they actually do.~
Dear government, and megacorps: Winning is not taking rights away with legislation or getting the contract for weapons to be used at Armageddon. These things are mutually assured destruction.~
When people say not to worry about things, “They will get better,” I think they must mean that the things that worry you will get better at doing that.~
Never take the last train from Clarksville. Its full of Monkeys.~
Open the door to news of tragedy obscene. The lunacy involved, what can it mean?
Turn on the light and survey the crime scene – see Rats scurry trying not to be seen.
Catch one, make it come squeaky clean: Federal ties found amid many lies between.
Note all such oddities you might glean, contrary to the official story quite glassine.
Compare to what others have seen, conclude just what it really all does mean.
Forget now all you once had been, you’re now a conspiracy theorist, a sin.
In case you are wondering, yes, I used to do stage comedy in talent contests. Often got a first place. That was great; being the first person put on the bus out of town, I got to choose the best seat.~
Let me apologize in advance for insulting you. I’m not going to stick around in case you start swinging.~
The Federal Gov has gotten to be such a big asshole that it doesn’t even have to fart to stink up the whole country, but it does so continuously, anyway. If Hillary is elected, she plans on feeding it beens and drinking water from Mexico, giving new meaning to when the SHTF. I’m thinking Trump is the BEANO.~
A Noun is a word that has a ROCK solid object identity.
A Proper Noun tells the actual name or title, my dear SIR, or may I call you JOHN.
A Pronoun is an Avatar stand in for IT.
An Adjective tells you a IDENTIFIABLE personality.
A Verb is a word in MOTION.
An Adverb tells you its VERY measure.
A Preposition pre positions the Noun TO Verb relation.
A Conjunction forms a junction function between word thoughts, SO don’t get confused.
A Contraction is a contracted attraction giving traction to two words as one, a marriage licensed by apostrophication, or a foreshortening of a word as a slang thang for those who were THINK’N they HADN’T the time or space for two words.~
I had a Checklist but can’t use it as I haven’t written a check since Debit Cards came out.
I had a folding Map but I can’t follow it because there is no place in my car’s dash to plug it in.
I had a Plan but I can’t follow it because the steps don’t appear on the Dance Dance Revolution pad.
I had a contract but I don’t abide by it because I already held both the first and second Parties. Sorry I didn’t invite you.
I had a Letter but Sesame Street is now on a channel I don’t get.
I had an envelope but didn’t give a lick.
I had a Folder but since I no longer need the checklist, plan, contract, letter, or envelope, I threw it away, too.~
A Conservative Politician in Office is conservative in measuring out his power to avoid angering the voter; he fears the people, where a Liberal believes that governmental power is end all-do all, and they use/abuse their power to manipulate the people by fear of government.
A Conservative Government heeds its own laws by conservative judgment, where a Liberal tends to apply grains of salt, rationalize, and bend slightly, each time taking more liberal advantage until it is in time fully lawless.
A Conservative Government writes Laws which are conservative in principles within the limitations of its Charter (The Constitution, Bill of Rights), where a Liberal (by the above means) takes liberties in lawmaking which take liberty out of the Law; they become increasingly unconstitutional and negate the Bill of Rights.
A Conservative Policy must always fit the national interest in obedience to Sovereignty and which honors the Charter, where a Liberal is interested in reformation to a new model, almost always globalist in nature (i.e., favoring United Nations, One-World Government) and is willing to sacrifice the Charter and Sovereignty for that agenda.
A Conservative Politician thinks in terms of limitations per the above, which allows personal and corporate governance to be at ‘”Liberty” to flourish and pursue happiness and wellbeing, trusting the people to seek what they will for their own good, where a Liberal thinks in terms of socialistic Agenda which stifle or suppress these things ‘for the good of the people, of whom they think cannot be trusted.’
A conservative understands that to become elected or to move legislation, there must be an accommodating compromise between the ideal and the attainable, where a Liberal will promise anything to get what they really want, or take any drastic measure to get what they want, even if it means legislation which cannot possibly achieve the stated purpose, and especially if it serves some unstated agenda per the above.~
Panic is in abundance, as is a loose tongue, when the SHTF. Calm reason and restraint is called for. Take a deep breath, grab a cold beer and reflect before commenting. But if the bullets are flying around you, SHOOT BACK AND SAVE THE DIALOG FOR LATER. That’s when you will really need that beer.~
Why do they call them a POEM when no other word quite right rhymes with poem?
Why do they call them a JOKE when the point is a hard straight poke?
Why do they call them a SONG when it’s really a sing?
Why do they call them a RIDDLE when the answer is a clue in the middle?
Why do they call them a SPEECH when it gives you the claps or makes you boo who?
Why do they call them a REport, REmark or REply when it’s actually the first time?
Why do they call them a QUESTion when instead of taking the path to the answer on your own,
you leave it to another to do?
Why do they call them a PARagraph when there’s really only one?
Why do they call them a SENTENCE
when they rarely involve a judge?
Why do they call them a STORY when they don’t have walls, cielings, or floors?
Why do they call this a POST… oh, wait, I know: because that’s what it’s as dumb as.~
Why is it that you can talk to ten strangers and 7 or more of them will believe or agree like minded if you tell them…
About a UFO you’ve seen…
About 911 as an inside job…
About Global Warming as a sham…
About CIA and the mob killing JFK…
About chemtrails vs. contrails…
About a Bilderberger NWO/Illuminati conspirators…
About mind control, gang stalking, Voice-2-Skull…
But when you talk to ten lawmakers, law keepers, medicals, or reporters about any of that… You are suddenly crazy to the point of risking forced evaluation?
Because the System and its professional armies are taught not to believe in the boogyman (who arranged for their lessons).~
The addage “Follow your dreams…” with respect to career can end terribly, UNLESS you take the RIGHT path:
1 toe in the water as a hobby… Insures you really do like it and have basic skills required.
2 build a boat taking courses in the trade, even if mail order or online. This will confirm
if you have actual talent. If not, start over w next best passion.
3 float the boat as intern. This will educate you as to the harsh realities and negatives of the
trade. Lets you confirm you like it, and regardless, gives a leg up on others for getting the job.
4 if you get this far, set sail as employee, setting aside savings. You WILL do well if you are ‘all in,’
what some call the ‘work ethic,’ which is simply doing your best.
5 with savings, buy a yacht by starting your own firm. That will plot a course to your dreams.
More: at all levels, start a small home-based business for both the experience, income, and tax benefits. This allows you to build resources (eg, instruments for a musician) less expensively and helps build your resume, client base, networking resources. I have NEVER not operated my own business since entering high school, and most related in their start to my first entry into a given field of work, at the hobby stage. I have therefore mastered and become successful in many fields and industry sectors, and despite having only a high school education, I’ve been granted four experiential degrees for the purpose of teaching at college level.~
My Mom always told me not to play in the street. She was right. The freeways are much more fun – if you are agile and don’t mind the blaring horns and screeching tires…~
What did the politician say to the activist? Nothing. He doesn’t pay attention to those voters, either.~
You are free to disagree with me as long as you understand I am never wrong and never make a mitsak ni anteing I sae.~
What I believe is true. If you disagree, screw you.
I know I’ m right, I do. I’m clearly smarter than you.
Don’t you dare try to argue – untill your face turns blue:
What I believe is due – to claims I find undeniably true.
Your facts will not do, they confuse what I know is true.
Such reality I pooh pooh, my mind made up for me, you
see; I won’t listen to you. What’s that you ask askew?
No, I no not just who said, but some kind of Web guru.
Its not important just who. But I know it surly wasn’t you.
What I believe is true. If you don’t agree, boo hoo to you.
Truth’s what I want it to be, no matter what you say or do.
A Democrat Congressman and a Republican Senator walked into a bar… Wait! That’s already as big a joke as can be…~
Notice: please note… In case you haven’t noticed before. Have you ever noticed there is hardly ever been and important notice delivered or posted such that you actually noticed? Nah, I bet you didn’t even notice any such post. I hereby give notice that, if you noticed this post, or not, this notice is not such a notice, but merely a post giving note to such.~
Dos You Got Down Wid Wad I Be Say’n Bout Dis and Dat, Bro?
Dis, Dat, and Dos, as ‘hip’ as they could be, went into a bar to get a drink. Dos bought the 1st round of beers. Once served, Dat said “Dis be good ‘n stuff.”
Dis replied “I try to be good like dat, you know? Mama sez to.”
Dat saw Dis was confused, “Thank yo for the compliment, Dis, but dat not wad I meant. We all be drink’n da same brew and dat be good’n stuff.”
Dis and Dat seemed confused. “Look, Man, dis is on tap’n we don’t be know’n wad it be,” he clarified.
Dis choked on a swig. “What yo say, bro? No one be tap’n on me, so natch, I dont know wad it be.”
“No, Man,” Dat tried to explain further, “Dis beer be tap beer. It be good, but ah dont know wad it be.”
Dis, at least, finally understood. “I got yo drift, now, Man. But I heard dos tap beers were cheap’n stuff. You know, po shit wid no taste. So wad dis be?”
Now Dos complained. “Wad yo mean… yo be sayin I bought cheep beers?”
And now, Dis was confused, once more, too. “I be just fine, bro. Why yo ask wad I be?”
At this point, the bartender happened by. “Hey, Man,” accosted Dat. “We be wond’rn… Wad be dis here beer?”
“Dat be Dos,” he replied simply. “Dat be good, n stuff.”
Dat seemed upset, now. “Look, man, we been all through Dis be’n good, n stuff. But if yo be say,n I sho nuff should be like Dos… dat Dos be gooder,n me, I take ‘ception to dat. Yo don’t know Dat, and yo sho as Hell dont know me.”
Now Dos was miffed. “Hang on a sec, man,” he said to Dat, “yo sayin yo better’n me?”
Well, things went down hill from there and it looked like a fight was about to break out, when the bartender tried to calm them with clarification. “Dis be rediculous!” he started.
But Dis did’t give him a chance to finish, and knocked him on his ass! “Ha!” he exclaimed. “Yo dumb ass be’n on da flo wid yo dumb fat mouth bleed’n wad be rediculous.”
This unexpected event had disrupted the conflict between Dos and Dat long enough that they had calmed down. Dis suggested they leave, and all agreeing, they stormed out in a huff.
As they exited, Dis noted “We stiil dont know wad dat beer be. I sho nuff wish I knew.” The others agreed, none of them noticing the neon sign in the window reading “Dos XX on tap.”~
If Trump is such a chump we’ rather dump, and Uncle Bernie is ample wormy and too squirmy, and Hillary far too shrillery under FBI drillery, then does that mean Biden is bid’n his tim’n in decid’n if rid’n White Knight style last minute to the Demo’s how we’ll be decid’n who’s presidential presid’n?~
What happens when a Socialist politician, an establishment Democrat, a non establishment Republican and an establishment Republican go into a Bar and call for a round on them, each? The price of drinks goes up, the waitresses worry about deportation, the bartender adds water to the drinks, the bouncer calls a reporter, and the Janitor worries about having to clean up all the bullshit that’s about to be spread. And, the patrons realize the hangover isn’t going to be worth it, and they leave.~
Ferris Beuller (Matthew Broderick) had it right. “A person should not believe in an “ism“, he should believe in himself.” In other words, don’t be a follower of someones ideas. If you want to make a change for the better, YOU are what you’ve been waiting for.
Here are some (twisted) examples of perhaps why isms can be problematic…
Capitalism: You have two cows. Sell one and buy a bull to start a cow factory. Worship in any church you want as long as you tithe a portion of your stock options. John Lennon is a famous millionaire singer invited to sit on your Board of Directors. Apple Computer stock looks attractive, so you merge to form Cowpile Computer.
Socialism: You have two cows. Give one cow to the government to slaughter and share with the poor. You worship in any church which is left or right of center. John Lennon is a folk singer of meaningful Marxist ballads. Apple Computer is bailed out by Congress whenever its stock falls below that of Microsoft.
Communism: You had two cows, but now the State has them, and may or may not give you some milk – if you are willing to stand in a long line. You do not go to church except to attend Party meetings. John Lennon is a decadent influence on youth. Apple Computer never was, because they refused to allow government to take more than one bite of it as it would ruin the logo.
Fascism: You had two cows but the government forced you to sell them to corporations for beans (magic or otherwise) who in turn sells the dairy and beef products back to you for huge profits. You go to the same church as the fearless leader, or you don’t go at all. John Lennon sounds like he was related to a Marxist and so he was shot. Apple Computer was burned to the ground in order to blame Compaqism and sweep Bill Gates into power.
Nazism: You had two cows but the government arrested you for hording and took them. You and your religious fanatic family are burned alive in your church for refusing to Sig Heil. John Lennon was in there with you, singing Give Peace a Chance. Apple Computer users are arrested and sent to camps for daring to ‘Think Different.’
Anarchism: You have two cows running down the freeway causing car wrecks. Shoot the tax collector, steal his money, and rape his dog (unless a hunting dog – but since it is a government dog, we know that dog don’t hunt.) You blow up the church. John Lennon sings Revolution. Macintosh Computers have a high repair rate from all the bullet holes.
Constitutionalism: You have two cows and the government cannot unreasonably search or seize them without a warrant, or prevent them from mooing, or prevent you from owning them and forming a militia of fellow cow owners who meet weekends and practice milking with dummy targets. You can’t figure out which of the thousands of churches to attend. Neither can John Lennon, so he writes Imagine. Steve Jobs was a Founding Father who wrote the ‘Consitution for the rest of us.’
Patriotism: You have two cows painted red, white, and blue. Your church supports the current war. John Lennon is boycotted, and so he has a sleep in. Apple is not sold to anyone unwilling to pledge allegiance to Microsoft products.
Militarism: You have two cows which you have convinced each that the other is seeking to invade their own private pasture. You sell arms to both sides. Your church owns stock in your company. John Lennon had his visa revoked because he was a pacifist who smoked pot. Apple Computer is what makes smart bombs smart.
Pacifism: You have two contented cows which give canned milk. Your body is your temple (and you are what you eat.) The government is headed by John Lennon. Apple Computer listens to its customer complaints.
Fatalism: Your cows died after you stopped feeding them because you figured they would just die, anyway. It was the same reasoning by which you determined God is dead. You never heard of John Lennon. Apple System error messages all start with ‘You should have known better than to think this wasn’t going to happen…’
Surrealism: You have a pasture full of Dell Computers searching the Web for the best price on a Macintosh. The government worships you. There is no John Lennon, because he would have made sense, so he instead turns out to actually be Ringo Star, who never quite did.
Bushisms: Is your cows in my Big Mac? I’m a God fearing man on Sundays. Which one is Lennon, and which one is Lennin? I will not have one of those damned Macs on my desk. Jobs didn’t contribute one cent to my election fund!
Clintonisms: Wow, look at those udders! I’m a God fearing man on Sundays. I liked John Lennon. We had a lot in common. In fact, I inhaled once, myself. I don’t know about granting Apple a GSA contract… they didn’t contribute to my election fund.
Obamaisms: Your cows are being detained indefinitely to combat terrorism. I’m a God fearing man on Sundays, unless I’m playing Golf. I liked John Lennon. I had FBI sue Apple Computer, who wouldn’t let me spy on iPhones, and didn’t contribute to my election fund.
Note: If you like the isms, they were lifted from a page full of additional jokes of greater complexity than the bulk of material in this post. Find them here: To Laugh in the Face of the NWO is the Best Form of Contempt.
The more we move toward a cashless society, the more we are at risk should some financial, political, or natural disaster transpire which weakens or destroys societal and governmental dynamics. What people will accept in payment or trade for scarce and critical supplies could threaten your life if you don’t have any, or the cost may be more than you can afford, if you do. Here are some ideas to help you be prepared.
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
In this post you will learn…
• what makes money valuable is also what can make it worthless;
• plastic and precious metals are useless in the aftermath of crisis;
• why government frowns and suppresses barter, and why to embrace it anyway;
• cash is usually aftermath King… but not always;
• whole new currencies evolve in serious or long term aftermath.
What money is, and why it has value
Money is nothing more than a convenient way to conduct ‘commerce’ (trade goods and services) with a standard and portable stand-in for something else of value. For this to work, all people within the trading area must agree to use it as such, and ‘it’ must have a definable and concretely known value. Any system of money is best handled by the local government, be it a tribal village in ancient times, or a modern industrialized nation. Or, it can be done by a network of banking and financial institutions, or even a combination with government. As we will see, banking options are good for them, bad for everyone else.
The later is what we have, today, and it suffers two problems most of us are aware of, both stemming from the banking side. To fully appreciate that, we should step back in time just a bit. Please take the time to read what you may otherwise presume already to know, because the points made in this section will play to remaining sections in critical ways. This is because only governments used to issue money, and to establish its value, they could not and dare not create money unless they held something of value in reserves somewhere, something of concrete and great value to back it up. Most nations, as did America, used Gold; the ‘Gold Standard.’
Whatever the value standard was, a citizen could go to a bank or government Purser, and demand to trade in the currency for its value in that item (i.e., Gold), or vice versa. This system guaranteed the value of the currency to a known unit of measure, and tended to help establish and maintain a stable economy, and made international trade viable; each currency had a concretely known valuation, and established trust between nations that the standard item, itself, could be obtained, if desired, to settle any balance of trade debt which might exist.
Then came the banks with their own idea, called Central Banks, which enables the printing of Fiat Currency, which is money which has nothing of value backing it. Enter the Federal Reserve Banking System. It has cost you and me a significant sum of our personal lifetime earrings. Some say we have literally been sold into slavery to the banks. Learn more about exactly how much it has cost you personally, here. Many, as do I, call it Treason, including the prophetic warnings of our Founding Fathers:
• “If the American people ever allow private banks to control the issue of their currency, first by inflation, then by deflation, the banks…will deprive the people of all property until their children wake-up homeless on the continent their fathers conquered…. The issuing power should be taken from the banks and restored to the people, to whom it properly belongs.” – Thomas Jefferson in the debate over the Re-charter of the Bank Bill of 1809 (millions of us, including myself, did wake up homeless with the Mortgage Derivative Collapse and associated ‘too big to fail’ bailouts, and we have had nothing but inflation and deflation cycles, not to mention devaluation of the dollar since establishing the Fed)
• “I believe that banking institutions are more dangerous to our liberties than standing armies.” –Thomas Jefferson
• “… The modern theory of the perpetuation of debt has drenched the earth with blood, and crushed its inhabitants under burdens ever accumulating.” -Thomas Jefferson (a reference to the National Debt)
• “History records that the money changers have used every form of abuse, intrigue, deceit, and violent means possible to maintain their control over governments by controlling money and its issuance.” -James Madison
• “If congress has the right under the Constitution to issue paper money, it was given them to use themselves, not to be delegated to individuals or corporations.” -Andrew Jackson (Banks are corporations)
• “The Government should create, issue, and circulate all the currency and credits needed to satisfy the spending power of the Government and the buying power of consumers. By the adoption of these principles, the taxpayers will be saved immense sums of interest. Money will cease to be master and become the servant of humanity.” -Abraham Lincoln (the Fed is all about interest paid to the banks for every dollar printed.)
• “Issue of currency should be lodged with the government and be protected from domination by Wall Street. We are opposed to…provisions [which] would place our currency and credit system in private hands.” – Theodore Roosevelt (in the long-running debate about establishing a central bak.)
But the Fed would become reality just in time to pay for WWI with fiat money. But that was not the first time. In the early days of forming new States within the United States, Banks could also print their own money with no attachment to or obligation of government, hopefully backing it up with some kind of standard; a certain degree of trust was involved, and many people found that their banker was a crook. This practice, both legitimate and criminal, was especially common in Gold and Silver mining towns, where shipping precious metals was risky due to bandits. Other negotiable instruments also came to exist, which can similarly be thought of as forms of money. Stocks, Bonds, Notes, Futures, and more. But these featured valuations tied to more complex and less tangible things, and were not simple enough for usage as currency except with brokers and special institutional trading firms.
But several new ways for banks to print their own money also arose which were useful enough by all. One is the ‘Check,’ your checking account. It is merely a highly organized and easily validated (to a point) method of trading in I.O.U.s. Anyone can write an I.O.U. on a any piece of paper, and if the other person accepts it as a debt, and the writer honors it, it has value. And, it can be passed from one person to another until paid, like a Marker used in the underworld.
But people do not trust strangers, and the bank’s checking systems addressed that by using the bank as a kind of validation and tracking of the debt, and the debtor. The underworld uses fear and organized crime to do the same with markers. And, do we not fear the wrath of our banks and the law should we write a bad check? This is called debt bondage, a very real and powerful political and social control system that keeps the locals, that’s you and me, in line for fear of loosing all they own. Unless, of course, you simply choose to opt out, as have I.
As far as checking is concerned, eventually, the check must be traded for real currency, so no new money was actually created, but while in circulation, the total amount of ‘money in use’ is greater than had been printed, a pseudo inflation factor. Today, some 20 billion checks are written each year, with a value of 26 trillion. To put that into perspective, it would pay off the entire National Debt with money to spare. It is also roughly 20 times the value of all U.S. money in circulation. So is the National Debt, and though no causal connection seems to exist, it is an interesting coincidence, is it not?
Banks also ‘print’ money by loaning money that does not exist. They are allowed by law to loan up to 20 times the money they hold in their vaults from depositors. They write a check, and you then use that ‘money’ to write more checks for whatever purpose the loan was intended. They get deposited somewhere, and eventually returned to the issuing bank. You make monthly payments to the bank, money against which more loans can be made. As long as less than 1 in 20 of loaned dollars is converted to cash withdrawal, the bank has gotten away with printing at least 19 defacto dollars; another pseudo inflation factor. A loan is for fictitious money, and how to you repay a fiction? A question well asked, and some have an answer which will astonish you, and though giving you hope, you will fear it, as well.
The worst offender is the Central Banking System, which allows governments to print money with absolutely nothing behind it; no standard. The government itself is printing nothing more than an I.O.U. The Bank, in our case being the Federal Reserve Bank (the Fed), which is NOT a Federal Agency, but a banker-controlled corporation. The Treasury prints money in the form of Federal Reserve Notes backed only by interest bearing Treasury Bonds given to the Federal Reserve (functionally, an I.O.U.), and the Federal Reserve Note is itself therefore also an I.O.U. Some of these are sold to anyone wishing to buy them, quite often hundreds of millions of dollars held by wealthy men of note, but also, ordinary citizens. Those unsold are held by the banking cadre.
This is an automatic inflation driving machine for several reasons, not the least of which is it allows government to fund any massive and costly adventure without worrying about actually paying for it, as long as they are willing to drive up the National Debt, which no one is ever going to pay off. The downside is, of course, that our purchasing power continues to dwindle, and at some point, the dollar will need to be officially devalued, and only YOU and I will loose in that deal. Meanwhile, every increase of the national debt is de facto devaluation; you and I loose purchasing power as if officially devalued. Simultaneously, more and more of tax dollars go to the FED to pay off INTEREST (only) on T Bills, and that money goes directly to the bankers. The debt is NEVER reduced.
If it were, the Fed would actually collapse. Here is an explanation from David Graeber, and English Anthropologist, regarding the first central bank in existence: “In fact this [debt] is precisely the logic on which the Bank of England—the first successful modern central bank—was originally founded. In 1694, a consortium of English bankers made a loan of £1,200,000 to the king. In return they received a royal monopoly on the issuance of banknotes [their ‘Fed’]. What this meant in practice was they had the right to advance IOUs for a portion of the money the king now owed them to any inhabitant of the kingdom willing to borrow from them, or willing to deposit their own money in the bank—in effect, to circulate or “monetize” [create fiat currency] the newly created royal debt. This was a great deal for the bankers: they got to charge the king 8 percent annual interest for the original loan and simultaneously charge interest on the same money to the clients who borrowed it, but it only worked as long as the original loan remained outstanding. To this day, this loan has never been paid back. It cannot be. If it ever were, the entire monetary system of Great Britain would cease to exist.”
There is much more which can be and should be said, but this is not about the evils of the Federal Reserve or financial institutions. The intent was simply to give a glimpse at what money is, and what makes it valuable (or not), in NORMAL circumstances. And, in normal circumstances, the ONLY thing which makes Federal Reserve Notes valuable is a law passed in support of creation of the Fed, which says and which is echoed right on the money, itself, that it is good for all debts, public and private; should you refuse to accept it as such, the debt is forgiven under that law; we are forced to accept it.
But what happens when TSHTF?
In any serious financial, societal, or natural disaster, all bets may be off, and cash may either become a monstrous burden, or have no value at all. To the extent that social systems and governmental control fails, or their function is diluted, the value of money can suddenly become undefined, except by the seller. It is not just a matter of free-market price setting, but weather or not the seller will see value in money, at all, the government no longer being in a position to enforce the law which says it must be accepted.
Some say to hoard precious metals for such crisis, but that is foolishness, because you can’t spend gold. For one thing, it is too valuable, and another, it is too difficult to validate without special chemicals, scales, and knowledge. How does the seller know it is real Gold, or what its actual value currently is? Not only will there be an issue as to weight, which is multiplied by a given value per ounce, but there will be no way to know (where a crises involves loss of communications), what the actual current value per ounce actually is. The wise seller must therefore significantly undervalue any metal offered in payment.
And how do you buy something low in value with something high in value, when there is no way to ‘make change?’ Hoarding Gold is fine for long-term protection of large cash holdings, but it is next to useless and extremely costly to attempt to use it as currency in a crisis.
THEREFORE, if actual money starts to fail in usefulness, whole new currencies will arise.
What will be the new currency in a crisis?
Yes, new currencies, and nothing like money as we know it. But like money, where it is still accepted in a crisis, the value thereof will be determined mostly by the seller, and this will give new meaning to the expression, ‘shop around.’ The most common alternate currencies will become food, water, fuels, and ammunition. Too a lesser degree, anything in high demand and low supply, such as weapons and tools, or anything key to survival. Being aware of that in advance is a great advantage, because there are two things in common with all these items which allows for good preparation.
The first is, that they have a relatively low value now, before there is a crisis. You can afford to stockpile, and would be wise to do so, taking into consideration storage space requirements and shelf life. It would be good to have at least a small hoard of each item in quantities greater than for reserves for personal consumption during the emergency and, where storage space, shelf life, and finances permit, to perhaps have a large hoard of one or more items on the list to become your personally favored currency.
The second is, that anyone can produce them, themselves, to one degree or another, both before and after a crisis. Anyone can sink a well or fetch water from nature, and transport it to where it is less available for ‘profit.’ Anyone can grow and store food if they have the land for it. Anyone can chop wood or make alcohol (fuels) if they but arrange to do so. Anyone can reload spent munitions if they have a loader and can obtain gunpowder, and for the matter, anyone can make gunpowder if they know how to find the raw materials and they are locally available.
Lead for ammunition is another matter, but it is cheap to buy ahead of crisis. So the purchase of a supply of lead and tools to form bullets and reload might be a great idea. Yet most people will not do any of these things, or cannot due to finances or lack of knowledge, and it is exactly that which gives them an excellent future value – extra value, in fact, because in aftermath situations, the normal supply chain of these things has been interrupted or entirely cut off, and access to the knowledge or finances to acquire them with it.
Once TSHTF, you are locked into your current state of affairs; you are either prepared to offer the right currency at an affordable rate, or you are slave and at the mercy to/of those who can. Only one of these two groups has a good chance at survival. That is the worst kind of debt slavery.
Barter, the alternative currency
The government hates barter and suppresses it in a mountain of laws restricting its use. Barter is, in fact, the basis of the new evolving currencies just discussed. But for those in that second, hapless group just mentioned, they may be able to survive for a while by bartering with their earthly possessions, albeit at a costly rate of exchange. A $3,000 professional video camera might be good for a tank of gas, or a few days worth of food; what value is there in a video camera without electricity? But it might be accepted if there is some hope that, eventually, power will be restored, or if the parts might be useful to a tinkerer seeking to build something mechanically useful.
But barter can work well, even before a crisis, despite the laws. The laws are there because the barter concept tends to ‘cheat’ government out of taxes. If you buy something with dollars, you got taxed on the income from whence you got the dollars, and the seller is taxed on the income he earned, and there is likely a sales tax, as well. In barter, as originally conceived and employed before the laws existed, you simply gave labor in exchange for items, or traded items. As long as both parties agreed the exchange was acceptable value given for acceptable value received, it was a done deal. Yes, sometimes one side might feel the value was short, and ask for augmentation with a little cash thrown in. Or not.
Barter best works in a network situation involving more than two parties. You have Oranges and want Apples, I have Grapes and want Oranges, and someone else has Apples and wants Grapes. No problem, a three-way swap. But to do that takes an organized network with the means to track what is needed and match it to what is offered and available elsewhere. Barter associations or organizations are set up, and of course, that takes effort and manpower, and a building that has monthly rent, and other things which take actual money.
The other thing a barter group could do, was to accept goods or labor obligations (I.O.U. for work to be done) as if a deposit in a bank, against which the member offering such could make some combination of present or future withdrawal of other goods or services as they became available and needed. This allows conversion of unwanted or surplus items into future barter trade power, rendering the barter group as a kind of retail store and universal service provider. Again, government does not like anything resembling a bank in procedure, and would normally tax a retailer on inventory.
As all these functions take money to facilitate, barter groups would charge a small fee for a transaction based on the dollar value of the transaction. DOLLARS were still used as the MEDIUM for determining TRADE VALUATIONS. That meant creating a corporate entity to facilitate and organize barter transactions, and typically, charging a membership fee to allow access to the system. That was what led government to take interest in and to legislate against barter; such systems could quickly grow in membership and began processing huge numbers of transactions, some of which were themselves huge in valuation.
I, for example, belonged to such a group, and in a single transaction, moved $35,000 in goods, against which I would acquire needed goods and services which enabled me to live more inexpensively for a full decade — until the government passed laws which forced the barter group out of business, and started taxing everyone involved to the point where the advantage seemed lost. But it need not be that way, especially once TSHTF.
You can join an existing barter program, but if you do, you should also form your own local barter group, because the big programs will not be available in a crisis. Anyone do so without formal corporate existence, and without charging fees, and without a retail or banking format. I highly encourage it, though you should check with a lawyer as laws vary State to State (click the above image for the Oregon situation). Yes, there will be some concern about tax reporting, but that is a minor issue unless you start dealing in large volumes of goods and services. Frankly, most people who barter this way report nothing, because unless it is in volume, it isn’t even worth the trouble to track and report it, not to them, or the government. But the VALUE is in HAVING A NETWORK IN PLACE IN A CRISIS… priceless.
When TSHTF, especially if communications are down, it is both difficult and even potentially dangerous to attempt to form a network. Danger stems from the fact that, unless care is taken to avoid strangers, you may offer to form a network, in which case you state what you have of interest, and if they think they have more guns than you, and want what you have, they know where to get it without cost. Moreover, mutual defense is a thing which can itself become a barter commodity, assuming you have the guns and manpower of good use to others; it is, after all, another kind of service.
So to prepare for a crisis, don’t just hoard key supplies, but establish a barter network, even if you do not choose to use it. Doing so amplifies the value of your preferred currency, because you already have people willing to accept it fairly. Consider these words of wisdom:
• “The propensity to truck, barter and exchange one thing for another is common to all men, and to be found in no other race of animals.” Adam Smith, Scottish Philosopher.
My take is that barter is natural to man, and as such, is an unstated free right to undertake at will – to hell with government, or in reverse, if government has gone to hell, what else do we have to trade with, but barter;
• “Capitalism invariably boils down to barter between two willing parties, neither of whom uses force to work with the other.” Ben Shapiro, Political Commentator.
When TSHTF, force becomes the only commodity the weak minded and hapless will have to trade with. To strengthen your defenses, you need something better, as well as a means of countering force with force of your own. A Barter network gives you both, where mutual defense agreements become a thing which may be bartered: If I have superior weapons and more gun bearers than you, an imbalance exists which might be offset in goods or other services.
• “In primitive society, Man produced directly for the satisfaction of his own wants, but with the development of society came differentiation of functions; exchange and barter arose, various trades sprang up, and with the necessity of commercial intercourse, cam the invention of money.” Charles A. Beard, renowned Historian.
This sums up this entire post in the most direct of statements: barter came first, money after. When money fails to function usefully, we must be ready to barter, either with a new currency of convenience, or outright barter networking. Our very lives could depend upon it.
Not fully convinced? Want more information?
May I humbly suggest some further reading about WHY you should worry about flying excrement from an unexpected fan, and also offer some additional valuable resources? Here is a compendium of useful material on the dangers of crisis and the topic of being prepared, not just in terms of currency, but other considerations which are well beyond the scope of this post. These are Facebook ‘pages,’ so you can FOLLOW them for updates. Please consider to Follow my blog, as well.
• The Fema, Martial Law, Revolution Database. Don’t let the title scare you away; its a compendium of articles and posts about the likelihood and risks of various forms of civil unrest and social, economic, or natural disasters, as well as general advice such as found in the above post. It’s sub-name is When All Hell Breaks Loose.
• The Post Apocalyptic Library. A compendium of resources where you can find critical how-to information needed for survival in a crisis. Everything from how to make a torch to how to make a portable generator from a lawn mower. The idea is to visit those sites and print the instructions, and place them in a safe place and in your ‘go bag’ so that you will have them when needed; they won’t be available once TSHTF.
Even our own government, normally blind to problems until too late, has been warning us for years to be prepared for ‘something scary,’ and the list of concerns is very scary. The stakes couldn’t be higher: if even just one thing on the list takes place, being ill prepared can perish whole families and, in short order, whole communities. Here is something that can make a difference, and its free. Its called knowledge.
In this post you will learn…
• What Preppers are and why they exist;
• Why YOU should become a Prepper, and HOW to proceed;
• There are 2 NEW and FREE resources to simplify the effort usefully
Note: I usually well footnote my posts so you can verify what I say for yourself. In this case, the two Facebook pages mentioned at article end, themselves, offer ample proofs for those items not otherwise footnoted.
The wise live for Today, but plan for Tomorrow: uncertainty is the only certainty
The Bible is the oldest source of Wisdom modern Man relies upon, and it clearly echoes that thought; there are no less than 25 places in the Bible which so admonish. A good number of these directly talk about the kind of preparedness this post addresses, while the remainder speak to being prepared for entry into the Kingdom of Heaven. But, if one is not prepared for things which can take one’s life, is not the later concern all the more important to prepare for, as well?
Perhaps the strongest and simplest of these are found in Proverbs (natch):
22:3 “The prudent sees danger and hides himself, but the simple go on and suffer for it;”
27:1 “Do not be confident about tomorrow, for you do not know what a day may bring.”
If we hold onto any one thing in this country, it is the wisdom of our Founding Fathers, and they were almost to a Man God Fearing and, therefore, they heeded such words. But they themselves also spoke plainly and logically about such things, and framed them in terms of the Nation, as well as the Individual and those we each love, to whom we are responsible for their well being:
John Adams, on the risk of overconfidence and reliance upon government: “I give you this warning that you may prepare your mind for your fate;”
Benjamin Franklin: “By failing to prepare, you prepare to fail;”
Alexander Hamilton: “If fortune should smile upon us, it will do us no harm to have been prepared for adversity; if she frowns upon us, by being prepared, we shall encounter it without the chagrin of disappointment. Your future rank in life is a perfect lottery;”
Thomas Jefferson: “Instead of considering what is past, however, we are to look forward and prepare for the future.”
George Washington, on wise use of funds, such that: “timely disbursements to prepare for danger frequently prevent much greater disbursements to repel it.”
Thomas Pain, on being fugitive from tyranny: “O! receive the fugitive, and prepare in time an asylum for mankind.”
The Modern Prepper and Dr. Strangelove
That last quote brings us to the advent of the modern Prepper, a phenomenon brought about by the Cold War and fear of the Bomb. President Eisenhower spoke frequently about the need for Civil Defense Preparedness, and founded what ultimately became FEMA, the ‘Grandaddy Prepper.’ For the rest of us, we were encouraged to prepare for nuclear war in our thinking, and our behavior.
We were taught to ‘Duck and Cover,’ and to plan to flee the cities, or take to bomb shelters. The whole basis of our modern Interstate Highway System was to that end, and so that the military and other aid could quickly flow to any wound in need of dressing. Cold War tensions culminated in the dire climactic confrontation of the Cuban Missile Crisis, and firmly established the era of the Bomb and Fallout Shelters. There were, in fact, enough shelters built to save 100,000,000 Americans, millions being built by citizens in their own homes or back yards: Dig a hole, drop in a pipe and add a floor, and fill it in and stock it.
Why prep today? Darker times > starker threats > greater fears
For a time, I managed a gas station while investigating the Oil Industry. That led me to a face-to-face confrontation with terrorism which rendered the investigation superfluous. For those who do not appreciate or understand the Prepper, or why they do what they do, or for the matter, who do not understand Conspiracy Theorists, Truthers, or Targeted Individuals claiming mind control, I highly recommend working for at least 30 days in a gas station. Why? Because that is an excellent place to talk with a large number and a variety of people in the course of doing business, and elicit from them things they would never otherwise admit in open conversation.
I could ask almost anything, and if well proposed, obtain a deeply personal and meaningful reply. And I did, regularly, on on a wide range of topics. What I learned is that there are more people afraid of more things than the mere threat of global extinction from The Bomb and the ‘Red Menace.’ Terrorism, yes, and for more of a seriously right reason than the obvious, a reason unexpected even by them.
It is to me even scarier than the fact that terrorism exists. Few are aware, but the top ranking U.S. Military General, Tommy Franks (who brought the flame throwing tank to Waco), has warned in a public statement that if there is another 9-11 level terror attack in the United States, the Military will take over the government in nation-wide Martial Law. I, for one, do not want flame throwing tanks on my streets.
And, we are still threatened by nuclear war: China’s top military leader has stated that war with the U.S. is inevitable, the only thing remaining being to decide when and how to be the first to strike. And, we have recently learned, they have stealth subs we cannot detect; one surfaced unexpectedly in the middle of a U.S. Carrier Fleet in the middle of an exercise looking for subs. North Korea is constantly making threats, and Obama and Hillary Clinton have assured terroism-minded Iran has access to the Bomb. We have several times in the last year, alone, come close to trading blows with Russian forces which could easily have escalate to a nuclear exchange. And we supposedly like each other, now.
Moreover, as recently played out in the Press, we have learned that a single well placed nuke high in the atmosphere could cause an EMP wave sending us back into the stone age by wiping out all electronics, including the entire power grid. Just as bad, spurious energy waves from the Sun could achieve the same ends, globally, or for the matter, doomsday rocks from space could effect similar damage, or worse. Movie theaters are awash these kinds of with (Extenction Level Event) scenarios. But there are other fears, and each one seems, in turn, to begat another, often wilder and seemingly more far fetched… which unfortunately, do not seem all that far fetched if daring to explore the facts which are their basis.
Every few months there seems to be another new exotic biological threat, either a weaponized or natural pathogen or virus on the verge of pandemic capability. Each such threat additionally threatens to be incurable and impossible to stop in time because it takes such a long time to come up with defensive medicines. Then there is the risk of financial collapse, which could trigger a global replay of the Great Depression on an unimaginable scale. Civil unrest levels are at the greatest and most dramatic in all of history; the Occupy/99% movement spontaneously fielded many millions of people around the World in the space of days. Our government’s liberal policies and some unfortunate events have fomented racism issues to the point that Blacks are shooting Cops as if at war, and threatening worse.
We see paranoia rampant in our government, who treats us all as if terrorists in the wings, spying on us and taking away our rights, and leading to fears of Martial Law, and/or efforts to take away our guns. DARPA, on the other hand, has ordered billions of rounds of ammo, enough to kill every living soul in North America several times over. FEMA seems to be building large facilities some fear are closer to concentration and even death camps than to shelters. It is at least concretely true that several special inciner-ators have been built, each strategically located, and capable of efficiently destroying hundreds of millions of tons of contaminated materials — which could include human bodies. The fear of Fascism and the comparison of our government to Nazi Germany is commonplace, which brings me back to the dialogs at the gas pump, where these things were said. The most common phrase heard in response to such things was, “When the revolution comes…”
Then there is the dramatic increase in UFO sightings, and much more than that, a growing body of evidence of actual combat taking place. If chemtrails were not already their own perceived threat, consider the latest theory as to their purpose; to weaponize the atmosphere against alien aggression. There is actually some scientific basis for such wild theories, and some to additionally suggest there is an off-world secret space program with Buck Rogers-like Space marines using captured Alien technology. I don’t know about any of that, but the fact that the government is becoming more secretive about the UFO question than ever, before, does not allow me to discount the notion. Presidents Roosevelt, Regan, Bush, Clinton, and Obama, and even Putin, have all alluded to these possibilities, as well as have high ranking military. The recent discovery of a constructed mega-structure orbiting a distant Sun amplifies the possibility: we are not alone. And those at the gas pump agree. More people have seen UFOs or otherwise have reason to believe in Aliens, than not. Don’t take my word for anything in this paragraph; just tune into Ground Zero and scan the archives of shows with Clyde Lewis’ expert guests.
Dare we mention a credible Planet X, super volcanos, global warming and melting ice caps, mega earthquakes, the shifting of our magnetic poles, and any number of scientifically plausible threats and natural disasters capable of inflicting significant regional, national, or global destruction of cataclysmic proportion… or dare we say… Biblical? After all, the other common comment at the gas pump is, “We are living in the End Times.” Indeed, the Illuminati conspiracies, AKA The New World Order, are not difficult to validate with a barrage of demonstrable facts which defy coincidence. This author has made a case in several of his books that the ultimate goal of the New World Order is to form a One-World Government — in order for the Antichrist to have a seat of power, and usher in the End of Ages, the ultimate End Game. It IS prophesied, after all, and many of us fear that as much as anything else.
That brings us full circle, back to the Bible’s admonishments. Being prepared ought rightly be not only for bad tidings, but for salvation. The government agrees, at least with the first part. The last ten years have seen an unprecedented effort by the government to urge us to be prepared for disaster. They have even reinstated and updated the old Cold War emergency radio alert system, and are stockpiling huge quantities of everything from food and medicine, and other supplies, to coffins. And ammo. All they ask you to do, is to have emergency plans and a ‘go bag,’ or store of emergency foods and critical supplies.
It’s simply good common sense. Preppers have been doing this for decades. What’s your excuse? That they are crazy? Better look in the mirror, if you believe that.
Here are two simple and free tools to help you get started
Both are easy to use Facebook pages. One is a kind of compendium of information regarding the possible breakdown in civil society due to the inability of government to respond, or even perhaps government itself has gone terribly awry. It is called the FEMA, Martial Law, Revolution Database (kind of covers all possibilities). It has no subversive intent, despite the scary title. It is very informative, and can help push anyone teetering on the notion of being prepared into taking action. One way it does this, is by telling you what to expect, and what a good action plan/go bag might look like for a given scenario.
The other also has a scary title, but it implies nothing but what it is; a library. In this case, it is a series of links to critical information one might need to survive for long periods without outside help in a serious catastrophe. It is a collection of how-to survival tricks, and how to quickly and easily make common critical items such as water purification systems, emergency generators, and so forth. It is called the Post Apocalyptic Library. The idea is simple: visit the links, download or copy the information, print it out, and put it into your go bag. Instant expert on a moment’s notice! Many of the links will deserve further exploration of their sites, for other good information. There is always more than one way to solve a problem.
Have you ever wanted a certain soft drink? Well, I’m a Prepper, he’s a Prepper, she’s a Prepper, we’re a Prepper; shouldn’t you be a Prepper, too?
Great. Drink deep for best result.
OK, it’s true. There are at least a half-dozen ways the government can ‘claim’ I’m a terrorist. YOU TOO, for that matter. But I have a Record of Arrest and Prosecution ‘sheet’ to illustrate one of the ways I am definitely a terrorist to someone, including people that think I’m merely a conspiracy theorist. I am not ‘mere,’ at anything I do…
What makes you a terrorist when you live in a Police State?
Simple answer: anything you do. There have been so many Constituion trampling Acts of Congress and Executive Orders, all so vaguely worded as to allow the broadest of interpretations, that it is almost just that easy for someone in government to label YOU (and certainly me) a terrorist. That can have very unfortunate consequences, depending on who labels you, why, and what they do about it. You can end up on the no fly list, or some kind of watch list, or even be vanished forever by Men in Black whisking you off in a black van.
One such example is, that being a conspiracy theorist automatically makes you a terrorist according to FBI. That’s bluntly stated, but true, as an article at Public Intelligence illustrates: “A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. ” The flyer, linked in the article, specifically includes 9-11 Truthers (that’s about 1/3 of the U.S. population).
OK; I’m a conspiracy theorist, or if you prefer, a Conspiracy Terrorist. But I am no ordinary ‘theorist,’ because I have a R.A.P. sheet… a Record of Arrests and Prosecutions. And here it is, below the FBI Fellon ID Card (which shows that not even FBI always gets the right man)… but be sure to read the summary text before you wonder why I’m still walking around freely.
R.A.P. Sheet, H.Michael Sweeney
1976 Wire Tapping, 2 counts, charges dropped for insufficient evidence
1980 Embezzling, charges dropped after resignation from company
1983 Counterfeiting, Drug Smuggling, sentenced
1984 Wire Tapping, charges dropped for insufficient evidence
1985 Shoplifting, 4 counts, sentenced
1987 Fraud, Embezzling (pretending to be a Pastor), Bad Checks, charges dropped after restitution
1988 Wire Fraud, 3 counts, sentenced
1988 Smuggling, 2 counts (bioweapons, diamonds), sentenced
1990 Espionage, Interception of Electronic Communications, charges dropped by NSA intervention
1991 Bank Robbery, 4 counts, sentenced
1991 Wire Tapping, 4 counts, cold case due to flight to avoid prosecution
1992 Fraud, 3 counts, Witness Tampering, 3 counts, Withholding Evidence, 2 counts, Murder,
cold case due to flight to avoid prosecution
1993 Breaking and Entering, 2 counts, Grand Theft, charges dropped after restitution
1994 Wire Tapping, cold case due to flight to avoid prosecution
1994 Attempted Murder, 12 counts, case turned over to Internal Affairs, and dropped
1996 Espionage, 3 counts, Violation of Civil Rights, cold case due to flight to avoid prosecution
1998 Wire Tapping, Stalking, cold case due to flight to avoid prosecution
1998 Grand Theft Auto, Operating Chop Shop, 3 counts, sentenced
1999 Possession of Controlled Substance with Intent to Sell, sentenced
2001 Bioterrorism, Attempted Assassination, investigation closed by DOJ intervention
2002 Terrorism, 4 counts, cold case due to flight to avoid prosecution
2004 Bioterrorism, case closed due to lack of evidence
2004 Cyberterrorism, Hacking (of CIA’s Web site), charges dropped in exchange for services rendered
2016 Armed Robbery, 2 counts, cold case due to flight to avoid prosecution
2016 Bank Robbery, cold case due to flight to avoid prosecution
By now, if you actually read the full list, you realize no one person could be guilty of all those crimes and still be walking free… and that there were crimes on the list immediately after incarceration, and no jail breaks to account for that. This is because these are not crimes that I committed, but crimes I have investigated and exposed, or helped expose and prosecute, often working with Police, FBI, SS, and CIA, sometimes working against rogue elements of those and other agencies, even spy agencies of other governments.
Left out of that list, are perhaps 200 Stalking, Wire Tapping, and Torture cases I’ve worked on as online consultant with victims of such affairs (I’ve had contact with 12,000 individuals in that kind of predicament). I left them out because it would have made the post unreadable, and that’s a shame… a disservice to the thousands of victims of this form of abuse of power and conspiratorial corruption of principalities and powers.
So I do not claim to be a mere terrorist, but to have stopped terrorism. But neither am I a mere conspiracy theorist, because many of the conspiracy theories I’ve investigated have put people in jail, or at least shut them down and forced them to run away. One Governor, possibly two, a National Guard General, an elected County Sheriff, two Police Chiefs, a Criminal Investigation Division Lt., a C.E.O. of an international software firm, and a host of lower law enforcement personnel have all vacated their posts (some being jailed) after I finished doing my thing. While I cannot claim every one of them retired or otherwise departed their posts because of me, as I was not allowed access to official internal documents, I’m fairly certain a good number of them grumbled my name under their breath on the way out the door.
All that said, I hope that you, dear reader, have come to understand that a conspiracy theorist is no different than any other standard investigative force of a more official nature. Except for two small things, we all try to fit the available evidence with the environ of facts to determine the truth. We both form hypothetical postulations as to suspect and motive, prove opportunity and method, and try each point of evidence against all others which might disprove the hypothesis (though as we see all too often, many criminal cases are happy to prosecute the innocent if they think they can make a strong enough case and hide the truth).
We both theorize up front. The first difference is that conspiracy theorists do not have the luxury of making an official determination, while the official investigators do. The second difference, and most important, is that we start with questions regarding failures in logic in the official findings and reports; we question government, which is not only the right, but the DUTY of every citizen, always. How else will you ever find a cover up? We know there have been all manner of cover ups exposed in media over the last few decades, and I remind you, you NEVER have a cover up UNLESS there is a conspiracy, because a cover up itself REQUIRES a conspiracy to execute it, and the affair being covered up is always so complex that it, too, MUST by default represent a conspiracy. Guaranteed.
OK, FBI, come and cuff me… unless I’m wearing a bomb like other terrorists,or have run off to Mexico to escape your ‘justice,’ in which case, just have a better day.
Wake up and smell the mushroom food you’ve been being fed since you were old enough to vote, and before. Plug your nose and consider what’s next…
The Two Party System is Suiciding — Too Late to Save America?
Have you not noticed the constant repetitive pattern? Every few years we get disgusted with the last batch of politicians we voted into office, especially at Presidential level, and vote in the opposite party. We are upset almost always for the same generic reasons: they promised one thing (we liked), and to fix what the last bunch did (we didn’t like), but all we wound up with was, ‘the new boss same as the old boss.’ Just like the song, we ‘hope we don’t get fooled, again.’
HOW’S THAT BEEN WORKING OUT FOR YOU?
Answer: It aint’ never had and ain’t ever shall, unless you are big Pharma, big Oil, big Telecom/IT, big Bank, Big Brother, or simply a fascist, globalist, or illuminati player.
The fact is, the Constitution and Bill of Rights, the basis for our whole system of government by, of, and for the People, so scared the elite power brokers in our early years of Continental unification and domination (formation of the 48 states), that they invented the two party system as a means of insuring that ONLY the power elite could run for high office; a complex system of delegates and voting rules which are designed to weed out anyone who is unwilling to run on a platform sympathetic to the predetermined ‘issues’ which suit the ‘party.’
Note re image: talk about disgusting campaigns. But which is worse? 1866 or 2016, 150 yrs. hence?
Issues are selected not so much on the basis of what actually pulls the people’s heart strings, as much as what the analysts and advisors think will ADEQUATELY pull their heart strings WITHOUT forcing any actual cure or change to ‘gains’ made by the party just prior to last being voted out of office — those things the voters got mad at them for in the first place; it is important to insure voters never remember those things, and focus instead on what’s wrong with the current batch of looters and despots, only.
The two party system is also designed to negate popular choices. No matter how many people vote in the primary for a given candidate, the back room deals in cigar-smoke filled rooms between powerbrokers will ultimately determine who the nominee actually is, and that person is going to be that new boss who’s going to fool us, again. Guaranteed. It’s worse, now, because now they can legally hand out Havanas.
Finally, it is designed to quash any possible third independent party contender. They do this very easily by telling you that to vote for them is a wasted vote (true only if you actually vote for other than your actual preferred choice), and by telling you that such a vote dilutes any chance of defeating (whomever they think you fear being elected). We hear that time and time again, and heaven forbid that if such a candidate should actually make decent headway, they will find a way to destroy him before the election ever takes place.
That is exactly what happened when Ross Perot ran against Clinton/Bush. As I had warned the Secret Service based on my ten-year investigation into abuse of power issues by the New World Order, it seemed absolutely clear that an assassination or blackmail attempt against him or his family to force him out of the race was inevitable. Indeed, within weeks of that warning, Anthrax powder was mailed to his family, and according to my SS back channel contact, it was the same as employed against Clinton’s Bodyguard, the man who was set to testify against Clinton over illegal activities undertaken while Governor of Arkansas prior to his Presidential bid. As result, on the very night that Perot won the State of Colorado and was assured a position on the ballot, he withdrew from the election without a useful or true explanation.
Is the Two Party System suiciding?
I believe it is. There are several coincidental forces which are destroying it from within, and they each tend to cross pollinate one another.
- The Democrats have only been able to field a closet Communist and a closet criminal (simplest descriptions). I’d be happy to defend those labels if anyone cares to be shut down by facts not commonly found in controlled media.
- The Republicans have only been able to field a closet fascist (my fear, hope I’m wrong), a batch of Bush clones and other elite same-as asses.
- Both parties have underestimated just how fed up the People are, and have largely failed to elect platforms that we really care about, except for Trump, who unfortunately seems to be more verbiage than substance.
- Controlled Media has repeatedly run afoul of that underestimation by electing to attack Trump when he says something ‘controversial’ or ‘politically incorrect’ only to find the People disagree with media and are beginning to wonder why still shots of Trump are always unflattering as if he is shouting a curse, and shots of Hillary are always smiling sweetly. “What? Us have a biased agenda?”
- The threat by almost all candidates that if not nominated (i.e., the ‘wrong’ candidate is nominated), they will consider to run independently, not only threatens to destroy the party, but also, to split the final election vote in favor of the opposing party. But one or even both parties could end up doing this, which would negate the split and make it a true free for all.
- Should Hilary be indicted (she is under FBI investigation which continues to uncover considerable evidence of wrongdoing, and not under a ‘security review’ as she prefers to call it) after nomination, no one has any clue as to what would happen to resolve the Democrat’s quandary, but the net effect would likely be much the same as in (5), above.
- Should Trump fail to be nominated, no one knows what the Repulisvecan party can do to resolve the problem of how to win the election if he indeed runs independently. Ditto for the Demoncrats shoul (6) transpire.
So my answer is YES, and thank goodness! I’ve harped against the two party process ever since Obama, and should have been ever since I started voting… but I thought I was doing fine on mushroom food, like everyone else.
Is it too late?
Probably, at least in one major way. No matter what happens, we are going to get a President and resulting cabinet we will later wish was merely a Dog Catcher or Postman, and perhaps not even that (no slight intended of those public service posts).
Hopefully not in the more important way; the future of America is, after all, at stake. The true issues we should be dealing with have never been raised by any politician save Perot, perhaps, and even he did not take full aim, in my view. To see what I mean, check out my 24 campaign planks were I running for President.
The chaos which would result with the collapse of the Democans and Republicrats would create a power vacuum the likes of which this nation has never seen. We would end up with countless new political parties seeking to rush in and redefine how candidates got on the ballot: a Constitutional or Populist Party (Hooray!), a Liberal Party (ye olde democrats), a Conservative Party (new age republicans), a Neocon Party (ye olde Republican good fellows), a Moral Majority Party (dazed and overwhelmed by LGBTG and the like), a Nationalist Party (military-industrial-intelligence-media complex), a Centrist Party (big everything), a Socialist Party (dare I suggest ye new Democrats), and perhaps even a Communist Party (Putin for President?).
That might be a good thing, provided anyone can really tell who all the new players really are. That’s because most of them would choose names other than I’ve shown which better describe their true colors, to include someone calling themselves Republicans and Democrats. It might take decades to figure them all out, with many new bosses the same as before along the way. I kid you not.
Nothing in politics is ever what it seems up front, and given the chance to remake themselves, politicians will simply take off one sheep’s disguise and don another, and in this case, there will be secondary disguises several layers deep to make sure we have a hard time finding their true nature. About the only ones that would be truly identifiable would be a Constitutionalist and Communist party, presuming someone else didn’t beat them to the use of the name.
I feel like the half-human Fly caught in the Spider’s web in the movie by the same name…
“Help me… help meeee!”
Once more, we see the Federal Government usurping power in ways which both benefit the big corporations at the expense of personal freedoms and financial viability of citizens. This time, it’s the FCC, and not the BLM, and they want to eliminate any chance for you to watch local television without paying through the nose for it… and suffering de facto censorship.
FTC to Kill Local Television as We Know It
Tuesday last, a little heralded announcement by the FCC once more revealed how controlled mainstream media is. They, more than anyone, perhaps, should have been screaming the news from the rooftops, and complaining about it, as it affects EVERY major and secondary television station in every market across the country. The ramifications are so broad and sweeping as to threaten the very social fabric which defines us as a nation. In summary, the threats are as follows:
- Eliminates all local television service as we know it today, virtually ELIMINATING ALL OVER THE AIR BROADCASTS. No more ‘free TV.’
- All licenses by FCC currently in place are cancelled, and ‘up for sale,’ they want to raise 60 billion dollars which will be unaccountable funds off the FCC budget. This means they can be spent on any black project without any accounting.
- Major stations (e.g., your local ABC/NBC/CBS/FOX affiliates) will be paid many millions from the sale, far more than the stations are actually worth; hush money not to protest, we must presume.
- Secondary stations, including repeater stations or small unaffiliated stations in deep rural markets, and even possibly PBS, will be paid NOTHING, a virtual THEFT, and possibly, a loss of all public broadcasting systems!
- All will be sold to Cable and Web content providers, forcing consumers to get any TV by paid subscription or on-demand purchase.
- Significantly eliminates local news coverage, limiting it to official sources only; the government’s preferred message, a form of censorship which effects de facto mind control.
- Stages the FCC for total control of Web content under the new ‘authority’ it declared for itself last year; easier to censor and dictate what you can learn if there is only ONE resource and it is controlled by government.
It follows the Fascist model: The plan is insidious beyond belief once fully understood. It is perhaps no coincidence whatsoever that it follows Obamacare. If one reviews history of the quiet takeover of nations by Fascists and other dictatorships, those ‘bloodless revolutions’ always start with the complete takeover by government of all health care, followed next by takeover of all media. What follows is usually great financial and social upheaval allowing significant draconian responses, to include something along the lines of Hitler’s Brownshirts and the SS, and a permanent war footing with an expanded military and military police state. But people never learn by the mistakes of history, and there is plenty of that…
It happened that way in Germany, Italy, and in South America, it happened again and again. In each and every case, the takeover steps were quietly initiated and never fully understood even by those involved in enacting the changes. In every case, they inflicted greater hardships socially and financially upon citizens than those woes they claimed would be addressed thereby. In each case, a central power figure emerged who responded with ‘law and order’ and bypassed, neutered, or altered the form of government to a Fascist regime.
Unfortunately, any and all of the current Presidential candidates, save one, could fit that bill in this author’s opinion. Trump appears to be a closet fascist, Cruz appears to be one of the same old gang of criminals who brought us to this point in the first place, Bernie is a closet Communist, and that awful woman is simply a criminal rapist of nations and peoples. But my opinions are unimportant. Even if whomever is elected is not set to be a fomenter of fascist revolution, the power elite who manipulate politics will simply assassinate them or blackmail them to assure the desired outcome.
Naturally, like most draconian moves by government, the official propaganda is worded exactly the opposite in tone to the reality. That’s why we get Bills that actually accomplish the reverse of their title, like ‘Affordable’ Health Care Act. Believe as we say we do, and ignore what we actually do.
Take a look at FCC’s official page, here.
Now, lest you think me simply another lunatic conspiracy theorist, I got my first wind of this plot, to include all points cited herein (save my opinion on SOME of the candidates), from a conservative call-in radio show where the station owner of a secondary market called in to shout a warning and explain exactly how it was rape and pillage of the television industry and the public in favor of Cable and Web bigwigs. I don’t make anything up; I don’t have the time nor inclination!
- Big Brother FCC Plans Internet Tax/Controls What Happens in Homes (universal free press)
- FCC No Longer Just Big Brother, Now Big Parent (huff post)
- FCC Sparks Fears of Big Brother in News Room (fox nation)
When I created the Free Will Society to aid stalking victims, one of the lofty goals was to eventually build some form of Safe Haven community for them. That dream now seems on the threshold of coming to pass. The result is Free Will Haven. iWhere can a targeted individual get help? Free Will Haven; Targeting Free Intentional Community for Stalking Victims by H. Michael Sweeney proparanoid.wordpress.com proparanoidpress.com proparanoid.net copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting. What is Free Will Haven?
Free Will Haven?
MAJOR UPDATE/REWRITE: Aug. 2017. It’s been three years now since we formed the Free Will Society with the intention to establish a low-cost, self-sustaining, targeting-free intentional community (Free Will Haven) for stalking victims who can’t get a fair shake at life in populated areas. A lot has transpired, some of it really good, some of it bad, and now, it looks like we are ready to ramp things up a bit. So I thought this page should be rewritten, and perhaps, be simplified. Very little of the original post remains, or remains unchanged, and I have added rather a lot about the Beta site which was established and our plans for an even better location. Over 2,500 victim days targeting free! Compare that to over 12,000 stalking victims I’ve had contact with over some 25 years where almost every victim says they can’t get even a few days respite, if not for the stalking, then the fear of it.
Intentional Community? Beta site has been undertaken
Wikipedia’s definition for Intentional Communities is a full paragraph long. Simplified, it is a community planned from the start to cater to specific persons of like (interests, beliefs, goals, needs, etc.), typically favoring alternative lifestyles which foster those goals. You can learn more about such communities at sites like tedxblackrockcity.com (informative video), ic.org (a kind of ‘superstore’ of centralized info on topic), dba Fellowship for Intentional Communities (Facebook page). The Free Will Society is now a Member organization of the FIC, which gives us access to a mountain of informational resources and other aid not previously enjoyed. Much of this is now available and useful to FWS Members as result.
In Free Will Haven’s case, our goals are ecological and consumptive sustainability (not to be confused with the New World Order’s use of ‘sustanability’ when pushing Codex Alimentarius, Agenda 21, GMO foods, Genetic Engineering, Global Warming, Carbon Tax/Credits/Currency, etc.); survivability (in this case, against all forms of surveillance, stalking or targeting of individuals in any manner), and financial and spiritual wellbeing (the unchecked pursuit of happiness through exercise of God’s gift of Free Will). Defensive survivability lays at the heart of the plan, and is based on the many books and online consultancy I have made available as a privacy/security expert to targeted persons for more than 25 years as The Professional Paranoid, the title of my first book.
Low cost is addressed primarily by focusing on portable tiny homes, or RV vehicles for short-to-long-term housing, and communal style co-op sharing of centralized services and site-produced foods and resources. Cottage industry will be encouraged to augment personal incomes, and/or like projects for the collective. It is the goal to allow one to live a decent and enjoyable life-style for less than $500 a month, total outlay (I’m managing on $400), that figure based on purchasing of food and supplies from outside sources. Once self sufficient, costs would decrease accordingly.
I think of FWH as a bit more flexible than a community. I see it as also acting as a short-term hospice for those seeking temporary shelter and healing from their ordeal, and in some cases, a school of defensive arts, and even self-replicating factory. Residents can stay as long as they like. Once fully rested and obtaining stability in their lives through being targeting free for a sufficient period, they might wish to return to society, perhaps under a new identity (we can help with that), or, perhaps, having learned what it takes to establish and operate such a community… go out and create another one, somewhere else. We would like to see several of them nation-wide, and even internationally.What makes Free Will Haven an intentional community?
Tiny homes and RV life style?
A tiny home generally references any small living space intended to be extremely practical and economical, though minimalist in nature. As a rule, this commonly means either a starter home for a young couple or single individual, or a retirement home for someone without a family, as a tiny home cannot have many rooms dedicated for family functions and individual compartmentalization.
The original tiny home movement included exotic efforts with costs of $1M or more not uncommon; ultra modern, hi-tech, and with prestige designer labels attached. The grass roots version, on the other hand, has gone wild finding ways to do as well with less, with costs ranging from well under $10K to perhaps an average of about $40K for the higher end; about what one might put down on a conventional home mortgage. This has resulted in an almost unlimited array of possible home design types and, as result, flexibility in meeting individual needs and tastes, like these as found at pinterest.
You can have tree houses, container homes (check these out), domed homes, spray cement (free-form shape) and similar homes (check this video out, and this), underground homes, and more, including homes that simply look like a normal home but scaled down… some of which are on wheels. That brings us to the fact that a motor home, RV vehicle, trailer, or even a manufactured home also qualifies. All of these are on the drawing board/table at Free Will Haven.
The ones we favor most are the ones you can order pre built and delivered to the site (look at these, and you can even get an ‘Ikea’ home complete with furnishings), or the ones you simply buy plans or kits for and then build yourself (like these). Or, they can be ad-hoc, and built from whatever you can cheaply get your hands on. Google any of these home types for endless solutions to choose from, and when it comes time to actually consider residency options, we will work with you to fine tune or better the ideas you favor.
I have established a special page chock-full of information about the ins and outs, pros and cons of the almost endless options available in choosing an RV type or style of Tiny Home. It also addresses the lifestyle, itself. RV solutions provide a quick and dirty ‘home’, completely self-contained with everything needed including their own backup generators. Tiny homes tend to be minus some aspects, such as bathrooms, but can include them; its up to the individual. They can end up being more roomy and comfortable than an RV, and seem more ‘homey.’
The Free Will Haven concept encourages use of an RV upon arrival, and the construction/installation of a tiny home (many of which can be portable and towed like a trailer). If electing a tiny home, any RV in hand can then be sold or rented to someone who does not have one, sold for long term, rented for short term. The same can be said for the Tiny Homes should a resident choose to relocate and not take the home with them. There is no reason anyone should feel that becoming a resident has no exit options. Quite the contrary. It increases options.
Beta site effort proves viability
The original Beta effort has resulted in the purchase and operation of a rather off-grid beta site by one of our founding members using their own money. It operated for about two years serving two TIs using most of the basic plan established by the Free Will Society. For whatever reason, the owner/operator of the site elected to abandon reliance upon and participation with FWS, though we had provided money to help pay for installation of electrical power to the site. There are clues it involved personal matters as well as relationship issues.
While there is some mystery as to why a refusal to engage in dialog, it is clear the Beta site was successful in terms of the key-most goals; survivability targeting-free. We are grateful for their effort. The Beta site failed only because of eviction for contract violations of some sort, presumably through miscalculation by the owner/operator in absence of help from the FWS. Due diligence is always upon the purchaser, who was at a disadvantage in many ways in terms of ability to do so. It is a regrettable outcome.
Meanwhile, I myself have been living as a homeless person in a motor home. I have essentially established a semi Beta site of my own where I was the only resident, also in a deeply rural environment. Between my experience and the actual beta site, there has been a total of more than 2500 targeting-free days. It has been a joy for me, and the Beta site operator has come forward publicly to express positive views towards the experience and an intention to attempt yet another effort. In that effort, the operator has affiliated with a new core group with a troubled past with respect to credibility and honesty, and we wish them all better luck.
The concept is proven. 2500 stalking free days!
Now it is time to move forward more earnestly, and do it right, this time.What is a tiny home like in Free Will Haven?
The future: location and logistics?
The original beta site (image) was less roughly 1 acre in size, and rather a long, narrow unimproved property at a high altitude in a colder part of Oregon with a dry clime (annual high of less than 60 degrees). It had no water but was near to a river with drinkable water and fish, and she had a water filtration system. It would support a well at shallow drill depth. It had no power but as it fronted a main highway for the area, it did not cost much to install power. It would support raising crops, and was established with an Airstream trailer (very nice) and several other towable items, and self-assembled Quonset-like structures for storage and greenhouse function. It is not known if a second RV was brought in for the second resident; the Airstream is thought to sleep up to four persons in two different accommodations. Still, it is not a terrible site, actually fairly decent given it was purchased sight unseen and based on a limited budget.
This site was not chosen with the help from or according to the ideal guidelines established by Free Will Haven. Since the purchase was made with the operator’s money and in consideration of their small income, that exercise of control was perhaps expected. The basic-most needs were considered to the extent possible. But While there was some good visual separation between the site and neighbor structures by trees, it was not as private as FWS would prefer. There are two neighbors within about 600 feet of the property (less than a city block). The nearness of a main highway, though also buffered with a lot of trees, is also not a perfect situation. I do like the fact that the rear of area (not shown) is backed with a high bluff which is uninhabitable, and provides security.
We can and should do better. Recently, my Publisher bought some property at auction and invited me to live there rent free. While it turned out not to be possible due to dense forestation requiring expensive work just to get onto the property with a motor home, the method of acquisition was unrealized in previous review of potential sites. Things are looking up.
Compare the the Beta site to this 20 Acre property which represents the ultimate site for meeting goals established for Free Will Haven. The road is a gravel road established for timber harvest and is seldom used by anyone but hunters — residents could hunt on the property if desired! It dead ends at the property, which is a flatland at the top of a hill, and continues into the property as shown for easy access.
It has multiple developable locations and area for growing crops without the need to fell trees. There is NO ONE for miles in any direction. These are the kinds of features preferred in the actual site. Depending on many factors, a really good site could be as small as perhaps 5 acres and still prove satisfactory. Geographic features such a hill can negate concerns about privacy as relate to adjacent properties. There are many such opportunities; cliff faces or steep terrain, rivers, national forests, etc., can all be allies.
This particular location is very inexpensive to purchase despite the larger acreage, simply because there is zero access to commercial power at any cost. That lets it out of consideration, as neither solar nor wind power enjoys economy of scale in the levels required to support a comfortable life style for a given individual, much less a collective. It would take approximately $9,000 per living space for solar, for instance — without a battery system to cover nighttime use (another $4,000). Figures are based on the same power level as the generator output in a typical Motor Home. If one had a few hundred thousand to tie up into an off-grid house, that would be a small bit of the budget. But that’s not your typical stalking victim. I’ll mention here that the weather is much nicer at this location, too, withs highs in the 80s.
The all important factor in any land acquisition, of course, is cost, including what it will take to occupy it successfully. As it happens, there are properties which fit these kinds of requirements which are available at a price I can afford. Sort of. The trick is finding them where the owner will finance with ‘ez credit terms,’ which, fortunately, is not unheard of. I have to be able to handle the monthly payment out of my pitiful social security payments, and have a low enough down payment that I still have money to pay for bringing in power and a water storage system, and a few other items such as a storage shed, and a freezer (a Motor Home typically holds about four days worth of frozen foods).
Alternately… should the Society obtain a large donation or one of our members win the lottery (I buy tickets), I’ve found marvelous properties in Missouri which offer as much as 160 acres fully developed as a farm or ranch capable of producing an income suitable to cover mortgage… for less money than it would cost to buy a house in most big cities. Many of these have rivers, lakes, or ponds and wooded areas full of all manner of wildlife, such as Wild Turkey, Geese, Ducks, Deer, Boar. This allows hunting and fishing right on the property, many of which have hunter’s cabins or blinds in place. But I’m not waiting for $300-500K donations.
I’m scouring land listings for something I can buy NOW. And, I will be starting a new gofundme for anyone willing to help, and/or wishing to participate, perhaps, as resident.
Participation: Membership and Residency
Anyone and everyone is requested to join the Free Will Society, stalking target or no, to support the Free Will Haven project (and other projects planned in the future). Annual membership is $25, currently payable by PayPal to proparanoidgroup at gmail com, adding comment to that effect in the message it requests in the process. Membership gives one access to more detailed information, including the history thus far of the project in detail, and an opportunity to participate in and contribute to the ongoing dialog and direction of the effort. It also gains access to dozens of resource materials from our membership in the Fellowship for Intentional Communities.
One must be a Member to apply for residency. There is a separate $25 fee to cover the application process, which is required to insure that all residents will be able to benefit without social incompatibilities. It is unfortunately true that there exist people who claim to be stalking victims who are not, for instance. While one can join and apply simultaneously, I advise against. Membership will provide access to a flood of information and direct contact with other members, and could conceivably end up changing a person’s mind about residency. One should be fully informed before deciding.
The application process further educates the applicant toward decisions about if, when, and how to undertake the actual move. It analyzes the applicant’s ability to actually undertake the venture with a reasonable expectation of happy success, fully informing them of what to expect in the way of possible downfall, all based on their precise personal situation. A checklist of things to consider and steps to be taken is reviewed in great detail, critical in determining the true cost of ‘move in.’ Once approved, they need not act immediately, and can work through the checklist at their own pace, as may be dictated by anything from costs to family affairs in need of tending.
It is seen by government as a win-win ploy that raises the stakes to unimaginable levels. What we see on the surface has nothing to do with the sinister plot which it enables and portends. This is our last and only chance to save the country, or loose it to tyranny forever, and rush toward Earth’s final demise.
Will Bundy vs. BLM start Revolution 2.0?
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
What is going on in Nevada with the BLM?
What you will learn reading this post…• government’s actions against Bundy are mere window dressing — something more sinister is afoot; • the stakes are incredibly high, but hard to see — your very life and the fate of the World, in fact; • there is only one logical solution, and everyone plays a role. What can I do to help Bundy against the BLM?
Why BLM vs. Bundy matters regardless of if his cause is just or he has no legal leg to stand on
UPDATE: Same day posted… Oh, so now we find out its really for the oil companies? What Corporate Police State? BLM sells 29 oil, gas leases in northeast Nevada End update.
Government made it matter, and with dark purpose. At one glance it is an effort to usurp power over people, and the States, as well as to empower corporate ranching over private ranchers. It is a form of unfair and excessive taxation without representation against a political enemy of financial convenience to friends of the White House. And, it is an opportunity to make yet one more National Police Force out of the BLM. But, thanks to controlled media/government PR, not everyone sees these points of view.
But even that view is incomplete and misses the mark, if we but look closer. It is a deliberate series of escalations by government over time to garner public attention among and inflame we select people (why it gets little due mainstream coverage — save that which slants as it did at Ruby Ridge and Waco). They know the Web will be awash in the circles of we Patriots, Constitutionalists, Activists, and others who oppose the tyranny and oppression our government has come to represent since 9-11. The Sheeple must not be unduly disturbed until it can have false flag impact of calculated value.
I talk a lot about the need for citizens to draw lines in the sand and be willing to become Minuitmen should such lines be crossed. Now comes government to draw it for us, I write here to tell you that you have no choice but accept the challenge, and act decisively. You may perish either way, but I’d rather perish attempting to control my life and future than to leave it to others less kindly inclined to favor me. If there is to be armed revolution, let it be on our terms, not theirs.
Why so conclude? Because if they work it right, the ‘standoff gone wrong’ is a perfect chance to justify taking guns. By forcing a showdown and a gunfight (what the snipers do best – there is no justification for government deploying snipers unless for this cause, AND to selectively inflame those who stand for Liberty and who remember Ruby Ridge). There are two possible ends, of course, though I think they will insure BOTH transpire.
Regardless, such a battle is win-win for government. The “poor defensless BLM armed only with tasers,’ if loosing large numbers will be seen by Sheeple as an outrage, and given that Militia were involved from multiple quarters, and other armed parties, Obama can order Martial Law with suspension of the Constitution. Especially if also employing agent provocateurs for local violence across the country, as was employed in the LA Riots, where National Guardsmen posed as rioters to prime the pump. This would likely result in orders for the military and Police to go door-t0-door. Who knows, Obama might even order the U.N. in as long-feared and first promoted as concept by Henry Kissinger. Or, he might simply order in the military; A-10s, attack choppers, a Stryker Battalion, and so forth.
They can then conveniently ‘quash armed rebels and terrorists,’ confiscate all guns, round up dissidents and politically incorrect opponents (like you and me — why they have been spying on us so earnestly), and hold a Con Con (they are already staging for it) to pass the Constitution of the NewStates of America, already written, which essentially enables the formation of the North American Union and surrender of US sovereignty to the U.N. in stages. All of this leads, of course, to a one-World Government (that Constitution has also already been written), and provides a single seat of power to enable the Antichrist’s coming to power.Note: The NewStates Constitution is reprinted in my booklet, Fatal Rebirth, along with the World Constitution, complete with analysis line by line (NewStates) to show how draconian a document it really is. Rights become privileges which can be revoked at any time by any agency or party of government for any cause, even retroactively, and almost anyone in government can write law, and again, it can be retroactive. And if you think the two-party system and the FED/IRS is bad, wait until you see what follows. You can request a free copy of the ebook version of Vol I of Fatal Rebirth by email request to pppbooks at comcast net.
THAT is what is at stake. Nothing less than EVERYTHING!
So we must be decisive: regardless of how we view Bundy’s cause or government’s viewpoint, regardless of if an armed and concerned citizen or a dumbed down Sheeple, we all have equal stake in this unfolding globalist tragedy. And, we can all play a role no matter our status, and regardless of if present in Nevada, or not. But about that decisive action…
Why is the BLM standoff against Bundy in Nevada taking place?
What we should prefer…
Should we stand up with arms in hand and enable, if not force, the ultimate showdown? I fear this is exactly what government wants, as already stated. But there is another, wiser choice.
By all means, men of arms should rally, but standing firm and waiting for the other side to blink or blunder is a fool’s plan, and it can only end in bloodshed. What must be done is that which can neuter Government’s ploy. And only one set of steps can do that:
a) anyone and everyone should file court actions against any and every agency, branch, and individual of government involved at every level of government. Any and every cause, grievance, or objection, as allowed by and based on State, County, and Federal Law, and the Constitution and Bill of Rights, should be employed. Bury them in legal actions, EACH OF WHICH includes request for either an Injunction or Stay Order. These actions should not all be done at once, but the flood should be continuous, so that new ones can replace those quickly disposed of. THIS BUYS TIME;
b) time is our friend — it generates awareness and understanding. It buys media attention and gives Sheeple a chance to better understand what is taking place. Just as the 99% movement could no longer be contained by a controlled media, so must this matter be brought into every home. Invite major networks, espcially foreign press, to specifically include RT, to set up broadcast facilities right on the Bundy Ranch, and bypassing the see nothing viewpoints established by government for controlling media in the manner done at WACO (NEVER AGAIN!). Install microwave and shortwave communication systems for the purpose. But also, LOCAL media is the key, as is the WWW; do not rely upon mainstream. Militia and other group ‘spokespersons’ in your community should approach their local news sources with proposed interviews to get the word out. IF EVERYONE UNDERSTANDS WHAT IS TRULY AT STAKE, AND TAKING PLACE, GOVERNMENT’S PLOT IS UNDERMINED AND THEY LOOSE THE SHEEPLE;
c) flood the theater with actors. There should be so many people there is not enough room in the minimal areas intended to contain them. OVERFLOW. The ‘1st Amendment’ area, itself an affront to the Constitution, and should be enlarged and enlarged again, forcing retreat or conflict which will make news favorable to our side. If you have access to a professional camera, start a ‘newspaper’ or ‘Radio station’ and flood the press area and make it overflow, as well. And Bundy’s ranch should become a city of tents, and include as many unarmed persons as possible who wield nothing but baseball bats or the proverbial pitchfork. THIS MAKES THE WHOLE AFFAIR MORE VISIBLE and LESS TENABLE TO GOVERNMENT’S GOALS;
d) involve the local Sheriff and State/County Officials. The Sheriff has effectively stated a hands-off non intervention policy. Fine. Perhaps he is a puppet put into place for the purpose, or co opted by any number of means available to government for rendering him neutral. But the flurry of legal actions should be intended to FORCE HIM to intervene on behalf of Bundy and supporters. If nothing else, he should have a presence on the Ranch to insure armed groups behave (public safety). The Governor and Legislators, and County Officials should called to DEMAND it. Perhaps even the National Guard should be called to stand by. A simple invite, if not enough, can be followed by a media blitz and public demand that such action is needed. Any politically motivated decision to remain neutral should be negated, thereby; a political suicide. INVOLVE THE SHERIFF, as WITNESS and PEACEKEEPER;
e) party! No alcohol or drugs, but good cheer, song and dance. Use loudspeakers. Mix well with speeches and ‘town hall’ dialogs. Use the platform (the nation will be watching) to air ALL GRIEVANCES with government, not just this ONE issue. Give voice to the rest of the 99% in a way that movement never was able to achieve on its own. SOROS WILL HAVE NO VOICE, this time;
e) prepare for Martial Law at home. That means emergency kits and plans (like the one government would not approve). It means weapons. If it is declared, you will have scant few hours to choose to fight, run, or to surrender to your fate at the hands of tyranny. If not taken away, you will need to survive for months without anything like normal civilization. No key resource, including electrical power or communication, can be assured, and will likely be withheld on purpose. Travel will be restricted and many will not be able to work, and there is no shopping, only rationing. BE READY TO BE SELF RELIANT, BE READY TO FIGHT IF THAT IS WHAT IT COMES DOWN TO;
f) if and when the shooting starts, DO NOT ENGAGE! Dead BLM or other Agents will be made into martyrs by mainstream. DO NOT GIVE THEM WHAT THEY WANT. Show restraint, and let the casualties be on your side. Keep putting out a continuous feed of information and video so that media and the WWW know what is going on. IF THERE ARE TO BE MARTYRS, LET THEM BE OUR OWN, and LET IT BE TELEVISED LIVE. If a full-scale armed revolt spontaneously errupts nation-wide, then by all means, defend yourself at the Ranch, and FOLLOW YOUR CONSIENCE AND DEFEND THE CONSTITUTION.
g) petition for redress. Redress of grievances is a key component of our Nation’s Constitutional form of government (this post makes clear, mid post). When it fails, we have no government, only tyranny. It seems today there is NO REDRESS POSSIBLE at the Federal level. ONLY THE STATES stand in the way of total Federal domination, which is part of what this whole affair is about; a means to increase Federal power over the States. But while all this is going on… and while we have media platforms established… we should be seeking redress through our State Legislators, making a series of calls for action to quickly pass laws which…
1) nullify all Federal gun laws, NDAA, NSA surveillance, and forbid Federal drone overflights except under warrant and oversight by State authorities;
2) eliminate Federal arrest and warrant power. If a Federal judge issues a warrant, or an Agency is moved to move against a party (like Bundy), they must instead go to the appropriate local Law Enforcement Agency and have them execute on their behalf. They may go along, but as observers, ONLY;
3) make clear a mandate that your State shall NOT approve a new Consitution if a Con Con is held, nor the removal or neutering by Amendment of the current Constitution, and any existing Federal Law which does so should be nullified;
4) add freely to this list anything which addresses abuse of power by the Federal government, such as militarization of Police, Obamacare, etc. This will be your one best chance to spark public dialog and debate, and to make certain that people, and especially State Legislators, realize THEY are the ones with the real power, and the duty to protect freedom and force the Constitution.
What is at stake in Nevada and the BLM standoff with Bundy?
Government has drawn a line in the sand
Let’s make sure they regret it. Force them to be the ones to cross it, and let them trip over their own power play. Now… go forth and spread the word.
Ten easy-to-grasp but remarkable proofs, both visible and hidden: Illuminati style mystical symbolism and related ancient magical mysteries, calling cards, bragging rights, and Warlock spells cast against America, and the World. Conventional clues, too.
Are there any patterns in mass shootings?
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
Is there any proof mass shootings are not random?
What you will learn reading this multi-part posting series…• there are 10 interlocking proofs that mass shootings are not random; • they include various kinds of patterns, visible and unseen, and even coded information; • that the pattern predicts itself, and understanding may therefore help stop the murder; • that the codes and clues seem to be like signatures identifying the architects.
Are mass shootings by intelligent design?
Introduction: Ten Proofs ‘Random’ Mass Shootings by Intelligent Design
Is there a mass shooting conspiracy?
Note: This series is not yet ready for full presentation, but the most recent Fort Hood forces me to start releasing the material without delay. The reason for delay has had to do with an inability to provide high quality graphics suitable for proofs. This will be overcome, shortly, I hope.
One thing you need to know about me as an investigative writer or, as media and government would prefer you to think of me, a ‘conspiracy theorist,’ is this: whenever I decide to take a close look at a potential conspiracy or lesser matter, I do it right. If I cannot uncover something no one else has brought to light, I’m either not finished, or I’ve backed out concluding it beyond reach, or a dud. If you read my findings on a given research, you will undoubtedly learn something FACTUAL no one else had previously discovered or brought to light. And so…
In this matter, we find the shear volume of startling new information overshadows and renders original headlines and competing theories essentially meaningless — especially media’s version. It will make you angry. It will scare you. The question is, will it motivate you to do something about it? YOU are what you are waiting for, you know.
But in introduction, there is still one other point which must be made; it is in form of a problematic question. Can I get you, the reader, to override your current belief structures long enough to consider the unusual nature of the findings? This presentation will most assuredly fly in the face of what most people consider ‘traditional wisdom,’ but it also will explain why it is non-the-less valid. Can you handle the Truth, or will you wimp out to the comfort zone of current beliefs?
Area all mass shooters psycho?
On suspending belief structures
I began a ten-year research project for a book, Fatal Rebirth, in late 1989, which also begat a screenplay published on line in 1999 (The Electronic Apocalypse). In the book’s Introduction I urged the reader to suspend their belief structures briefly and read the material as if merely fiction for entertainment’s sake, because many of the concepts within were so new and unusual as to defy belief — likely seen as ‘far-fetched’ by most uninformed readers. I offered over 1,500 footnotes and a huge Appendix section to help them consider why I deemed them factual.
This blog post should be read in like manner, especially if you are content with government’s actions, are a politician, member of a government agency, military, or any part of the justice system, or Media. Especially if you are involved in a mass shooting incident as a professional or a victim seeking to know the truth. And even more so if you are gun owner, or even among what 2nd Amendment supporters refer to as a ‘gun grabber.’ I plead, therefore, that you suspend your belief structures briefly as if reading a political/horror-science fiction piece. That’s what it is, actually, minus the fiction component.
You will, like readers of Fatal Rebirth, I would hope, realize the truth by the time you reach the end. Or, at the very least, you will be entertained for all your reluctance to let the message sink in and take root.
If nothing else, even if you choose to doubt some of the more obscure subtopics (i.e., relating to mysticism) have any factual basis in REALITY, consider this: it matters NOT what YOU think, given they ARE taken as real by persons likely to be behind any such conspiracy (i.e., ‘Illuminati’ Satanists). You MUST also ask yourself, “Can the sheer magnitude of interlocking clues be ignored?” Because at every turn they defy the odds of coincidental probability, as illustrated by carefully crafted control study groups. If thinking logically, you MUST concur that intelligent design is revealed despite what you may think about the logic of the beliefs which lay behind it, or the unusual way in which the evidence was revealed.
Pending you conclusion, by all means feel free to think me mad if you must. Read just for fun, but please read it through to end before you render final judgment as to if madness or truth be present. A logical reader will be converted unless their mind is already so firmly made up that they do not wish to be confused by facts which destroy their belief structures. Judge not what ye know not, but that upon which ye are well informed and have considered fully, judge freely.
Your future and the future of your children could well be at stake, a statement applying to all mankind. Why do I say this? The book mentioned above, Fatal Rebirth, was based on trying to illustrate what I call the Unified Conspiracy Theory; the notion that all of America’s darkest bumps in the night for the last half of the prior Century, forward, were not random oddities by random people for random agenda, but carefully orchestrated by the same core group of people with but one goal for the World in mind.
I termed them Shadow, but they are also known by other names; the New World Order, the Illuminati, the Power Elite, Globalists, and among them, member names like CIA, Skull and Bones, Bilderbergers, Council on Foreign Relations, and many more of like nature. Their goal I termed End Game; the establishment of a One World government, a single seat of power in order to seat the Antichrist upon his throne and bring us to Armageddon.
The Unified Conspiracy Theory, once justified in research and taking shape in book form, led me to realize that their stepwise actions over fifty years of mysteries were indeed leading to one goal. Knowing the goal, I reasoned, it should be possible to forecast the next logical steps. So the book also included within its presentation several terrible event predictions expected to take place in our near future. Thus far, though I do not claim to have gotten all event details precisely correct, many terrible forecasts have already come to pass. Among these were:
a) an assassination attempt on Ross Perot or his family to cause him to drop out of the Presidential Race, a matter which indeed transpired using mailed Anthrax according to a Secret Service back channel contact;
b) the false flag downing of the World Trade Center by civilian passenger jets which;
c) resulted in a series of Middle East Oil Wars. Other predictions include two more terror plots which are part and parcel of this blog post. Those are…
e) MASS SHOOTINGS.
Note: you can get a free copy of Vol I of Fatal Rebirth (ebook) by email request to pppbooks at Comcast (net). You will be glad you did, as it will take you far deeper into the Rabbit Hole than Alice or Neo had ever gone. This pill is black, though trimmed in red, white, and blue.
So, if ready to suspend your belief structure, let us begin. Pretend there is, despite media’s recent attempt in the Cincia shooting to portray anyone who believes in the New World Order as mentally ill and anti-patriotic, that such a conspiracy is actually afoot. Also pretend, if you must, that Political Control Technology in the form of the Manchurian Candidate is real. There are real-life Jason Bournes out there, as my book, MC Realities, and other books on Political Control Technology illustrate more than adequately. Even the Smithsonian channel knows.
This will make the key postulations, testing methods, conclusions, and proofs of the core material easier to accept, especially as they will be offered in the manner of scientific discovery — exactly as I undertook them as investigative writer. You will, in fact, be able to retrace my work to double check it, if you wish — as long as you review the full series of posts and sidebars before you attempt it, lest you make a critical error. Please subscribe to my blog pages to insure you are notified as the remaining posts in the series are added.
Are mass shootings are by intelligent design?
Some several months ago, insulted by media’s misreporting of Aurora and Sandy Hook and outright clues that a disinformation campaign was afoot, I began finding ample cause for concern. But how might one determine if other mass shootings were arranged as part of some kind of sick criminal conspiracy, one which might involve both real and faked shootings?
I started with several basic presumptions of truth, and then set about to see if the logical evidence such presumptions would require were indeed in place. The ‘illogical’ presumptions fostered by the Unified Conspiracy Theory requiring suspension of belief are as follows:
1) That Shadow and their Globalism requires destruction of America, and its Constitution in order to enable forming the North American Union, a matter which in turn requires that the Right to Bear Arms is first invalidated, and arms confiscated or gun owners otherwise neutralized in a manner similar to that of the Australia;
2) That the New World Order, the modern day Illuminati, if you will, would be well capable of undertaking a campaign of gun violence for such cause, but being an Illumined Power Elite lost to Satanic and Masonic mysticism, they would employ mystical constructs which would leave detectible footprints if knowing what to look for;
3) That the principle tool of such a plot would involve a small army of patsies, cut outs, and fall guys, principally from a category best known to the public as Manchurian Candidates. It may additionally involve a small army of blindly obedient members placed within our armed forces, the intelligence community, and law enforcement to aid more indirectly in supporting roles. This would include logistics, psyops, and cover up, or even command and control, generally unaware as to the truth or reason behind their orders. These are the same players frequently found playing key roles in the lives of mind control victims at large.
All three presumptions must be true to make a proper accusation, for they comprise the basic proofs of any crime: Motive, Opportunity, and Means. Normally, we think of opportunity as meaning access to the scene of the crime, typically proven by forensics such as fingerprints, or better yet, actual eye witnesses. In this case, they deliberately left their fingerprints, in a manner of speaking. In fact, the bulk of the proofs fall into this category, perhaps even naming individuals behind the plot. At the very least, we are indeed dealing with the Elite, those involved in principalities and powers.
Indeed: Two names have already surfaced by such clues, and both are billionaires. I also have a dozen other names of likely conspirators, but no names are released; these things are my Life Insurance Policy.
Sidebar Post: On Programmable People. This sidebar post addresses the notion of the possibility that at least some mass shooters are mind controlled patsies, and reconciles their coexistence with truly random shootings — those which are more naturally spontaneous crimes — which can collectively still both be component parts of the same intelligent design. This leads us to the finer details of how shooting event locations and dates lend importance to our consideration, and just how these things can additionally reveal intentional, yet concealed clues.
Here it should be mentioned, that many observers of the New World Order crowd favor the supposition that among their leadership we might find the modern-day Illuminati in spirit, if not in actual blood lineage, even though they may have since assumed a different family name. By way of example, in my research, I have had reason to conclude that the Rotheschild name was assumed; those assuming it being Knights Templar in hidding, their wealth derived from Templar treasure, and not truly Jewish by ancestry or faith, at all.
Many who favor the notion of a Modern-day Illuminati additionally believe, as do I, that there are at least two, and as many as four groups competing with each other within the movement to be the ones ‘honored’ to have one of their own selected to become the Antichrist. Much of what is discovered in this investigative series will point to this being true in one way, or inherently implied in another. It is, in fact, one very good reason to employ symbolisms and other clues which act as signatures of those so bidding for selection.
Such evidence was abundant, even easy to find, and I remain convinced that the trio of presumptions are sound enough to warrant seeking incontrovertible proofs. I sought such proofs both in quality and quantity sufficient to illustrate that ‘random’ was not the right word to describe mass shootings, but rather, ‘intelligent design,’ is.
The path of my continued investigation led to endless shocking discoveries, but there was a problem: to describe the methods and explain findings to the casual reader would, it seemed, require a tedious educational process and boring, repetitious citation of facts. It would be about as fun to read as a spreadsheet or database. Not good.
People want visual sound bites easily grasped. More so if Sheeple content with their Evening News and easily frightened off by words like ‘conspiracy theorist,’ and ‘New World Order,’ or similar. Worse, the investigation bogged because of the real life tragedies each shooting represented. Proper investigation meant exhaustive study of individual events, reviewing endless horrific detailed accounts and sad, brutal media imagery. It was taking an emotional and even physical toll upon my body and mind, and my spirit. Eventually, instead of plodding along 10-14 hours a day as at the start, I found myself barely able to work on it a few hours a week.
I played with several ideas on how to present the story NOW, without completion of the full study, for there is indeed already a mountain of proofs uncovered. But again, the complexities in presentation left me feeling it a hopeless task. Finally, I decided to break it down into about a dozen short compartmentalized components suitable for a series of blog posts. Frankly, I’m hoping it will spur someone to offer useful help; it will take funding and staffing to properly complete the study. Or better still, perhaps some Sheriff or other authority will assume the duty as result of shootings in their jurisdiction.
Follows is a synopsis of the Ten Proofs to be presented. There will additionally be, at appropriate points, companion posts detailing the scientific methods or other analytical procedures involved in select proofs where a doubting Thomas type may wish to challenge the validity of claims. I firmly believe that for my proofs to be accepted, they should be presented in a way such that ANYONE can duplicate my work and verify accuracy and conclusions.
This is a legitimate investigation despite its atypical and unorthodox methods and odd topics involved. NOTE: links will NOT WORK until the various posts involved have been posted. You may click on them to discover their current state. Again, subscription to this blog will notify you when new posts are added.
What are the ten proofs of a mass shooter conspiracy?
The Ten Proofs in review…
Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns;Any time you find a cover up, you necessarily have a conspiracy to contend with. Gun grabbing groups, including government and biased or puppet media forces, should be using every opportunity to make their case for gun control, but act as if the bulk of gun violence never took place. Why do they employ selective blinders? There is a reason.
Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters;The Illuminati loves magical numbers, as they can translate into meaningful words or names, or leverage ‘spells’. Interesting then, that basic shooting statistics establish set after set in the most magical and potent number of all, one which decodes to ‘Satan.’ This alone reveals dramatic coincidences well beyond the possibility of random chance.
Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines;The same Dispersal Pattern Studies method applied by government researchers to UFO sightings reveals Mass Shootings do something UFO sightings allegedly do not: form repetitive patterns with GPS accuracy, doorway-to-doorway-to-doorway.
Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes;When it comes to symbolism, nothing outperforms a graphical shape. Better still when that shape itself has magical properties or relationships to other shapes, or its own hidden or obvious meaning.
Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters;It defies odds that perfect shapes should cluster together in ways which share overlapping lines or corners, and be generally both aligned and mirrored in additional symbolism.
Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols;Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.
Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart;Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.
Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View;The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.
Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages;Shooting line sets share three or more identical magical numbers within their data points. These decode to tell us when and where the next shooting will be, name a shooter, or perfectly prophesy some specific outcome.
Proof Ten: Individual Shootings Examined in Micro Duplicate the National Study ProofsTwo examples are offered; Aurora and Sandy Hook. They not only duplicate the ten proofs, but they mirror each other and one points to the other. Why are mass shootings on the rise?
Are you ready of this? Buckle up!
So let us begin. I propose your best bet will be to SUBSCRIBE to my blog pages so that you are automatically notified as new posts are made to complete the series. Please link, share, tweet, etc., and by all mean vote your ranking at page top of each one, and comment with your questions, criticisms, or thoughts. How else will other know this is important?
Do bear in mind as you read, each offered proof individually seems to defy the odds or logic path required for truly random shooting events. Collectively, it is monumentally clear. Also bear in mind that I am human, and I, like any other, am prone to making mistakes. A ton of information had to be entered and copied from one location to another multiple times (multiple database and software applications). Therefore, either because of a mistake on my part, or perhaps because of a mistake in media or other accounts/records, any given individual data point in any given set of proofs may be found invalid.
By all means let me know if you find such a discrepancy, but please remember this: a single error in a single data point does not invalidate all other data points, and therefore, does not invalidate the conclusions or the suppositions, themselves. In order to dispute my findings, you will need to offer proofs that the method is flawed, the entire data set was in error, or analytical logic was faulty. More: such dispute must address and ultimately invalidate all ten proofs, or short of that, offer equally viable alternative explanations which fit the findings and afford a more innocent explanation.
Since each proof tends to defy all possible odds of random coincidence, and does so consistently, again and again, naysayers will have their work cut out for them. More so, because in many cases, control groups have been established to show truly random data points enjoy no such pattern. I have done my homework, and carefully so.
I will demand the same of naysayers.
Go to Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns
Go to Side Bar: On on Programmable People
How to spot and deal with Trolls, including a clever tool they use in any social media capable of posting images (VERY prevalent on Facebook), and quite insidious with far reaching implications. BEWARE: you betray yourself and your friends if you take things at face value.
What is a Web Troll?
by H. Michael Sweeney
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
How does being a web troll work?
UPDATE: Nov. 11, 2014 Perhaps as if to ‘test’ me as result of this article (or not), a Web troll began the process described herein to goad me argumentatively while also employing a good half dozen of the usual disinfo tactics in the 25 Rules of Disinformation (linked below). So I unfriended him and watched: that same day, ‘someone’ created a new FB account and almost immediately friended two of my friends, posted ONE activist post, and ONE peace post, then requested to friend me. Sure. OK. BUT I HAVE MY EYE ON YOU, because that’s how easy it is to get a new identity and hook back up to a target. Not that I care. Trolls are tasty.
Are you being targeted by online government trolls
How Social Network Trolls Target, Track, and Psychologically Profile You
Reading this post you will learn…• That there are three basic kinds of trolls and subsequent ‘missions’ against targets like YOU; • That there are troll profiling and tracking tools or methods which can be recognized; • That there are ways to protect yourself without drawing more unwanted attention; • That the Troll represents a danger in that their ‘assessment’ can lead to escalation in your targeting. Is social media infiltrated by government trolls?
Government and Commercial Trolls
Consider, for example, the friend ranking and layer’s of affiliation tracking tool. A graphic is created containing a simple textual message. It is graphical because there is no easy way to distinguish between two identical text messages, whereas, altering a single pixel’s color by 1 imperceptible shade of difference makes it unique, and allows thousands upon thousands of individually trackable versions. A Troll who has managed to friend a targeted person of interest then posts the textual graphic as if a sincere request. Examples will be shown.
These kinds of posts seem innocent enough and easily get spread as requested, allowing simple computerized search processes by FB’s intelligence community or marketing partners to see not only who is close to the target party, but at what layered level and loyalty or, if you prefer, like minded thinking. In point of fact, ANY image shared with a given political, philosophical, religious, or other belief or emotional message can be so tracked to perfectly define each such poster’s psychological profile, and rank their threat level to the paranoiac governmental powers that be. The same is true of marketing trolls seeking to learn about your product usage or demographic, etc.
The only safe share, then, we might presume, is textual or perhaps the sharing of a URL and it’s image, or an image we ourselves create and have perhaps included in our FB albums. Even with URL’s however, the possibility exists it is still being tracked, especially if a Troll operated resource such as Federal Jack, a known DHS sponsored Sorcha Faal disinformationa conduit targeting conspiracy theorists, activists, and other ‘potential terrorists.’ Their goal is to get you to ‘share’ their links, thereby spreading disinformation while psychologically cataloging YOU and any of your friends’ beliefs; all who click to learn more. They may need to have a troll assigned to them, after all, for being yet another ‘potential terrorist’ — a free thinker, patriot, constitutionalist, etc.
Worse, we have learned from our new Paul Revere of the coming Second American Revolution (Snowden), that NSA is not only monitoring FB activities big time but that Trolls from NSA, FBI, DHS, DOD, and even the FED, and other paranoid agencies, and even corporations who have a strong and growing list of people who think ill of them, like Monsanto and some banks — all regularly maintain false social media identities for entrapment and spying purposes. They even infiltrate online gaming. Snowden’s latest bombshell, according the foreign media analysts, indicates there were so many game Trolls that it was starting to change the character of online gaming, and special tools had to be developed so that Trolls would not end up targeting other Trolls and more easily remain inobvious. We are talking here, about games with chat or other communications capabilities within the game or as part of game support, especially when in a social network manner.
And it is clear that snooping is also rampant among commercial interests, which is certainly true in online gaming, which after all, is a commercial enterprise. FB is perhaps the biggest offender in this area.
How can you spot a social media troll?
Differentiating an innocent graphic from a potential spy tool…
There are several online graphical message generating services. FB themselves seems to be hooked up with one called your-ecards (.com). Another is someecards (.com). Anyone can use these to generate a simple textual graphic with or without use of stock illustration graphics (e.g., a man looking perplexed), typically in silhouette or line art form. They can then easily share it through their favorite social media(s) with a few additional clicks. These can always be recognized because the logo for the creating Web service is displayed at the bottom. An additional hallmark of such services is that the background is almost always colored, and there are scant few colors available. The default color or otherwise most popular seems to be pale blue, pale green, or yellow-orange.
So when you see a colored background, typically with larger or fancier text than a normal posting, you are clearly looking at a graphical text post. The next thing to look for is the logo. If you see a logo, it was likely a sincerely generated message by a genuine human resident of social media. However, if there is no such logo, the message may have been generated by a Troll using his own computerized tools to psychologically target you regarding a select individual hot button. Are you, for instance, a tax protester, pro gun, anti GMO, for or against a given politician or political topic, or simply, who is a good like-minded friend of yours as opposed to some stranger you’ve accepted on the Network. Such messages also tend to be minus any artwork — text only. There is one more defining clue to look for.
Because there may be multiple versions of the same message for targeting different individuals by multiple Trolls interested in gathering information about many someones, there is a need to tell one shared message copy from another, which is exactly why it needs to be a graphic. YOUR version must be physically different from MINE. The simple solution is to vary one or more pixels in a way easy for a software routine to detect, and then match to a targeted individual and their Troll/need. Given the countless millions of users on FB (and other social media) who might be deemed targets, it may mean that many, many dozens of pixels will need to be manipulated. My research shows that, indeed, most of the suspicious postings, in addition to missing the logos, have such visual manipulations. Examples:
So one needs to look for such abberations or flaws in the background, usually darkened pixels along the edge, most commonly gathered in clusters or strips. You have to ask yourself… if going to the trouble to create a custom graphic for a text message instead of simply typing it in, why would they: a) choose the ugly colors used by such as your-ecard if not trying to make you think it such; b) take the extra steps to strip away the logo if using such a service (the point being they did not); and c) end up creating an image with a flawed background (where did the aberration come from, if not deliberate)?
When these clues are present, you are staring at a Trollish spy tool. To then share it betrays and catalogs you and links you and your beliefs with any of your friends who do the same, and theirs, and so forth, on down the line. The proper thing to do is enter into the comments: “I suggest you delete this post because it fits the description of a Troll’s chain-letter spy tool to catalog, track, or psychologically profile and establish links between like-minded persons: learn more here: http://wp.me/p1GyKw-zi” That link goes to this blog post you are reading.
Then I suggest you share the post anyway with a similar message, “Share this to warn others about Troll spy tool chain-letters to catalog or psychologically profile and establish links between like-minded persons. To learn more about this tool, visit this link http://wp.me/p1GyKw-zi.”
Finally, look carefully at the original post. Most social media will have a means to indicate if it was itself being shared, or was a direct post. If direct, it’s YOUR Troll. If shared, the poster was gullible in sharing, and is not likely a Troll… but beware that that could be arranged for as a deceit — so watch to see if the poster repeats the ploy frequently. You might optionally go to the ‘cited source’ of the share and try to find the post on their wall if you want to try to see if they are the Troll, and on to the next if not, and so forth, posting or messaging those encountered along the way who are victims, if you can. But that can be a LOT of work.
Are social media trolls sociopaths or psychopaths?
More Direct Trolls; Psyops and Sociopaths
The real threat to activists and politically incorrect persons online, like myself, is government agents paid to do nothing but sit in front of a computer and pretend to be your social network friend, someone you don’t really know at all, of course. They don’t just post Trollish images, they comment, and even message you. Like the aforementioned tool, they seek to learn everything they can to psychologically profile you, as well as see who ‘likes’ your posts and what THEY comment. But they are also there to play mind games. You are officially a victim of psychological warfare, perhaps even by someone from within the U.S. military, or even the military of another country. They are quite often sociopaths, so chosen because those traits make them more efficient.
Here are some tips on how to spot and deal with this class of Troll, as well as the kind of Troll who is simply out to make trouble for a given collective of people who believe a certain way about a certain topic. You know the type, my favorite example being the warrior Atheist who deems it his life’s mission to ferret out believers in God and annoy them with endless barbs and zings as if they were evil and dangerous for daring to worship. These people will wax sociopathic, too, and even psychopathic, when given enough rope. UNFRIEND these kinds of Trolls.
Hint 1) Trolls work in packs or maintain multiple identities to be a self-contained pack. That way, if you delete one of them, others survive, and then they generate yet another new identity and friend request to maintain the pack. The advantage is that you can suffer a series of ‘In deference to your view, we all seem to believe the same (whatever)’ posts (i.e., you are an idiot on this matter). Sure. You might be an idiot. But at first, the pack is all positive and flattering to your own beliefs so you a) get used to seeing them, and b) start respecting their beliefs and presuming them the same as yours. That’s the worming in stage.
But when it is appropriate for profiling or attempting the role of agent provocateur or disinformationalist, they will all suddenly be believing in something more off the mark, and increasingly so, as often as not. But by now, you like them and their beliefs, and so, your reaction tends to be as they expect; they are pulling your chain, and observing your jerks, evaluating, and cataloging, attempting to modify your behavior through deceit — a form of mind control. Can you be controlled, or are you firmly centered in your beliefs? Are your notions your own, or being foisted upon you?
Hint 2) New Troll requests tend to be persons with scant history on the network, and very few posts, but posts akin to your own in substance. Note that Facebook asks you to suggest friends to them. NEVER do this unless someone you ACTUALLY KNOW in the real World. If you do it, you are giving them a list of new targets. Since I don’t fear and even enjoy playing with Trolls, I let anyone into my friend list, but that does not mean they get what they want from me. But you may be better off simply passing on marginally viable friend requests.
Hint 3) Try posting something deep and yet somehow provocative (in the eyes of the establishment) which requires a bit of reading and thought before drawing conclusions. Look for a pattern in response from the same suspect persons; a) almost instantaneous response in the manner of (Hint 1), and typically emotional rather than logical in nature. This is almost always short and designed to be inflammatory or provocative, a bit testy. This is followed by b) one or more secondary (pack) responses delayed rather a bit in time. These will be more in depth and thoughtful, and validate the former with logical argument, and may contain a link to give further credibility. Other brief pack replies may be sprinkled in for effect. Collectively, they are all in agreement regarding your idiocy (or whatever).
It is when the same people tend to respond in these patterns that you are very likely dealing with a Troll pack. You will find this is true regardless of what time of day or night you post. They never sleep because every psyops Troll is actually three people manning a keyboard around the clock. They can always respond quickly with the first response, but the careful response requires that they actually research and formulate the best supporting answer based on all they know about you and the topic, which they might need to first research, and likely, it involves a supervisor’s approval or must be compared against preset guidelines.
Hint 4) Thick skin, undaunted. There is nothing you can do to make these people not remain your friend, short of unfriending them, yourself. While they may match or even exceed your own expression of ire, they won’t go away no matter how you might choose to argue, or confront with insult. Indeed, they tend never to deal with insults directly, at all; they are irrelevant and serve no usefulness to their goal. A real person has an ego that must be defended, but they are just playing psychological games and feel superior regardless of what you say. But when you argue, watch out for the next hint, which is commonly employed in their responses.
This is also true of the sociopathic/psychopathic ‘cause’ trolls.
Hint 5) They tend to employ the 25 Rules of Disinformation. Easy to spot, easy to deal with, if you know what to look for. Be careful, though, because ordinary people sometimes use flawed presentation style or less-than-thoughtful posts which on the surface appear to fit one or more of the rules, when they are just being human. Watch for repeat performances, to know the difference. Give them rope.
Can trolls lead to real-world targeting?
Dangerous escalations; why we dare not ignore trolls
The real danger in online Trolls is this: their whole purpose in targeting you online can be to determine if you deserve real-World targeting, as well. With a few keystokes you can end up having your entire life put under a microscope; phone surveillance, tails, observation posts, bugs and cameras covertly placed in your home, mail intercepted and snooped, and so forth. Men in Black stuff. Its why I wrote The Professional Paranoid; a how-to book on detecting and dealing with this kind of targeting.
And, it can escalate further: electronic harassment, dirty tricks, political control technology (mind control) to make you look mentally ill to others, destroy personal relationships, wreck your income, and sabotage your life. For that, I wrote MC Realities, another how-to.
But it can also lead to the worst of all possible escalations; NDAA vanishing. If truly a pain in the neck to the government, a threat which needs to be dealt with more urgently… you can ‘legally’ (so they claim) kidnap you and make you vanish without any legal process. They can elect to torture you or give you over to some other country for ‘processing.’ Or, if they want, they can murder you and dispose of your body. This is how we know we are living in a tyrannical Police State, and why, then, government dare not tolerate free thinkers without Trolling them, and trampling on rights and freedoms at every turn, and why fear mongering is their number one justification. ‘Oooh… terrorists are everywhere! We need to TSA and NSA your ass for your own safety.’
What should I do if I encounter a social media troll?
What to do with a Troll
I personally do not mind their presence so much as some might. I enjoy providing them with disinformation, or provoking them to try to chase down a given pathway of dialogs only to suddenly drop the matter as if it never happened, or I don’t really care, or even was deliberately jerking their chain. I even kid them.
But most people would prefer to unfriend them, and there is NOTHING WRONG WITH THAT. Just know they will be right back with a new identity. It may be better to deal with the ones you know than to worry about finding the new ones you don’t yet know.
My favorite thing, however, is to educate them. I like posting factual material which challenges their personal beliefs that their job and their boss are operating on valid or just principles or beliefs, and purposes. I make them ashamed or feel guilt, whenever possible. It does not work with everyone, of course, but it is fun to try.
Are social media trolls dangerous?
Your privacy and personal safety could be at stake if you are in the hands of Trolls. The threat level is determined by how much our paranoid government fears people who fear government’s growing fascist police state/spying mentality, and dare to talk openly about it. The more vocal you are, or the more aligned with or closer in links to others of like mind, or the more active you are elsewhere on the Web, or the more followers you have, and even the kinds of searches you make (that, too, is being watched by government) and certainly, your own original postings… each of these things determine if you might become the victim of someone else’s Troll, or have a Troll assigned to you, and what kind of Troll.
And once your ‘threat level’ has been assessed, that could lead to escalations that you will not likely want to experience. If you get a sense that such escalations are already in place or happening, by all means read my books, because they will help you know for sure, help identify the players, and form defenses. You can also contact me personally for free and for-fee online consulting or direct intervention services.
It’s what I do when I’m not being a thorn in the side of tyranny… and attracting Trolls.
When the stinkiest FEMA kind of stuff hits the fan, anyone who has a business dealing in key resources will find their valuable inventories and property at risk of sack and pillage by looters, or outright theft by government. There is a way to protect such assets while at the same time insuring better chances of survival of families.
How do I protect my business in a disaster?
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What can gun shop owners do to protect against gun consfication?
The Threat to Business Property is significant in a disaster…
In the prior part of this series we reviewed a wide variety of disaster situations that make emergency preparedness an ultra-important concern for families, reasons far more serious and far reaching than mere quakes, floods, or tornadoes. In the second part, we proposed a disaster preparedness plan much more comprehensive and truly useful than that advised by FEMA/DHS, albeit one government will never approve. Why? Because it’s closer to their own preparations and mimics their own capabilities, and removes you from dependence upon them. That means they cannot control you by being your only source for key survival items.
But the previous material addressed family needs from their perspective. And, there were certain aspects of such a plan which would prove difficult for many families without the help of an outside party. Then we have businesses to consider, who have their own unique concerns as to what happens in dire emergencies. Business owners or responsible managers of many kinds of retail and other business with select kinds of inventories or resources, should be every bit as concerned as a family, and looking for a disaster preparedness plan which specifically protects their valuable business assets, both real property and inventories.
There are several key reasons to consider this a critical concern: One, many disasters are deemed Acts of God and are therefore not included under insurance provisions unless, perhaps, paying extra premiums for specific policy riders such as a flood or tornado insurance. No insurance policy provides protection against acts of war, which includes revolution, military coups and similar political unrest, often even excluding protection against riot losses — regardless of the cause of the riot.
And beyond the worry of insurance protection, FEMA’s plan for your assets in an emergency will very likely include confiscation and take over of your property ‘for the good of the community.’ Similar concerns exist in any Martial Law situation. So if you have such a business, you should worry and wonder if there is not some way you can protect your assets from such total or near-total loss or take over. Never fear, the Professional Paranoid is here to help…
What will happen to gun shops in a FEMA declared emergency?
Partnering with Family Collectives
The prior posts in this series dealt with idea of forming multi-family unit collectives for improved emergency preparedness at the family level, as well as why such preparedness plans and kits should go well beyond minimal FEMA advice and prepare for long-term disasters, not just three day fire/quake/flood protection. This involved numerous considerations and plans in terms of organization and supplies, individual responsibilities and more. But for many such collectives as might be established, some items become difficult to come by or store due to cost or special attributes.
The bottom line is, in a serious emergency situation, looting and general criminal activity become a serious threat to any owner of a business handling inventories of critical resources which are also valuable to long-term disaster kits. Often just as important, many such inventories represent a storage problem for long-term home survival kits. Gun shops especially, and even food or fuel can be difficult to store in quantity suitable for a long-lived disaster. Many more items could be added to such a list, as a given collective of families will have their own unique set of limitations and issues to resolve. As result, even a motorcycle shop or car dealership, auto parts store, tire shop, or tool shop, may find themselves in the same position as a gun shop. In some communities, for example, boats will be a key product in need of protection and in demand as an emergency item. So there are many kinds of businesses who can take advantage of the ideas offered here.
My goal in this series of posts was to attempt to find a solution addressing both these concerns by partnering family collectives with such owners. And, the word owners could in some cases mean ‘managers,’ where owners are corporations or persons who do not themselves manage and/or live near enough to ‘take charge’ for the purpose. Such partnerships are simple: the owner joins or heads a family collective, either one they formed on their own (perhaps made up of employee families), or by joining with someone who approaches them with an acceptable offer.
In some cases, such as gun shop owners or owners of vey large facilities (e.g., super market,), they may wish to partner with multiple collectives. This is because in the event of worst-case long-term disaster scenarios, there may be a need for significant armed resistance against third parties, even to include unconstitutional seizure by Federal forces. By unconstitutional, I mean in the event of an attempt to overthrow the government by the military, or armed insurrection to restore the Republic against some other form of tyranny. We will know that horse when it rides into town; mass arrests or attempts to seize weapons door-to-door will be its hallmarks.
We all remember the LA Riots? Even though the National Guard was deployed, it was up to citizens to protect their own property. Neither soldier nor Police and Fire were of much help. Korean family-owned businesses gave us the model we need to consider following; they armed themselves to the teeth and took to the roofs of their stores and residences and fended off looters. Family units can band together in like fashion, and better yet if also joining with a one or more business owners in some mutually beneficial arrangement.
Gun shop owners, in particular, have a serious need. They become the highest-value target in town, and therefore, need many able-bodied people to bear arms — in sufficient number to become a significant deterrent to assault. This works well for the families involved, as well, providing them with low or no-cost access to weapons needed to protect their families and homes. The trick is to find ways to do it which do not amount to simply giving away inventory. Not a problem, given that provisional contractual agreements can be drawn up in advance.
How can we prevent government confiscation of our business assets in a declared emergency?
Making it work for all concerned
I propose that such partnerships might be best approached with a contractual agreement for mutual protection. The agreement should provision for both the possibility of taking possession of weapons and munitions immediately and only after a serious event transpires. It might provide for trade of ownership of weapons deployed once the crises is over for a minimum guarantee of service to the shop owner providing protection of the business property. Weapons can be deemed as ‘rented’ during the disaster with options to purchase afterwards, perhaps with rental applying to the price, or may be considered as ‘payment’ for protection helps rendered, or some mix, thereof. Such items, pre any event, need not be fully deployed to family possession, allowing for normal inventory turnover so that older inventory is sold off and replaced with new, and families don’t need to worry about storage.
Take a gun shop: Only if the family collective partner wishes to take possession (ownership) of weapons for storage at home up front (the suggested kit calls for one pistol minimum), need any money change hands. Once a serious emergency transpires, the families can be issued the additional firearms from shop inventory, and sign for them. They must keep them safe, and must use them on call or by schedule in protection of the store property. It would only take one person from each family unit at a time, given the quantity of family partnerships participating — to adequately defend the store. They ‘pay for what they use’ in the form of a rental/purchase option to be addressed after the emergency ends, perhaps involving payment terms (perhaps involving very small payments pre disaster). There are any number of creative solutions to make it mutually viable.
I am no lawyer, but in a civil emergency, many laws fall by the wayside as a matter of practicality. A gun permit process is not something you worry about when the government is shut down and lives are at stake. However, a wise shop owner might want to check with a lawyer and get some advice and deal with such concerns up front. There is no reason a single individual from each family collective could not undergo a permit process as part of the contingency preparation. What they do with the weapons in an emergency should at that point no longer matter to the shop owner, with reasonable agreements to avoid illegal uses in place. One might also want to address how to safely store key records in order to insure lists of gun holders are not compromised and lead to confiscations, anyway.
Other kinds of businesses? Consumables such as food from a grocery store which have dates of expiration would be lost, anyway, so any financial arrangement to distribute storables in an emergency with any level of appropriate financial reimbursement or property protection services of participants should, IMO, be eagerly embraced. For most shop owners, it converts a disaster where they face the potential loss of all inventory and significant property damage into a situation that more closely approximates the ultimate ‘sale’ where all inventory goes out the door to happy customers, AND the property is protected.
From the family side, a collective should easily be able to field 6-10 adults to defend as many different business sites simultaneously, while still retaining sufficient adults to protect the home base camp. Therefore, they have access to 6-10 different key survival items they might not otherwise be able to afford or store long term. It is a win-win situation for everyone but looters and would-be confiscators.
Upon event occurrence, family members ‘report for duty’ and are issued weapons, sending the appropriate portion back to the family for home defense and protection from confiscation by FEMA/Military. I propose an organized convoy is the only safe way, as otherwise, armed interlopers might dare to ambush a lone person or single vehicle. I further suggest that, if not already the case by natural instinct, a strict military-like organization and rules for command and engagement be established. Such a model should ideally trickle down to the family units as well, if a long-term event is involved.
Therefore, prior military service, especially in combat or involving combat training, is to be highly prized in any collective or partnership. Where such experience is found in a retired Officer (as opposed to an enlisted rank), so much the better. If there is additionally someone with prior intelligence or forward observer experience, or demolitions or military engineering background, better still. Likewise for any medical corps. or other medical background.
In closing, the business itself should have on hand sufficient stores of foods and other resources (as opined in the prior post) to sustain several months of a ‘stand off’ in defensive posture. A key factor will be the ability to communicate with partnering family units that they may be called in to provide force rotation, deliver emergency supplies, or outright tactical relief against assaulting forces. The prior posts cover communications alternatives in a total outage of all utilities.
How can I protect my business as well as my family in a disaster?
- FEMA Preparing Military Police For Gun Confiscations and Martial Law (eutimes.net)
- The Use of Food As a Weapon Against American Citizens (republicbroadcasting.org)
The government has for some time now been turning up our ‘threat perceptions’ regarding emergency preparedness… taking us to levels of ‘concern’ not seen since the height of the Cold War and the Cuban Missile Crises. As discussed in the prior post of this series, we need to figure out what they are NOT telling us, and prepare for THAT, too.
Why should I have an emergency plan?
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What can I do to prepare for any emergency?
What you will learn reading this post:
- That there are kinds of disasters government is not talking about which you should also prepare for;
- That some disasters are best addressed by preparations based on collectives of households instead of reliance only upon one’s own household;
- That the nature of the emergency dictates how long the period of time of distress, which dictates what the emergency preparedness plan should look like;
- That some considerations go well beyond government’s advice, and in fact would not likely be approved by FEMA, DHS, or the Miltary… because they want you dependent upon their help and mercy as a means of political control.
What should my emergency preparedness plan look like?
Government is EMPHATICALLY urging us to prepare
In the first part of this series, we talked about WHY you need an emergency preparedness plan and kit which goes beyond FEMA/DHS recommendations. Regardless of their true reasons for such urgent and dramatic advice — by all means, do what they tell you: establish an emergency plan centered upon a home emergency supplies kit adequate for the kinds of emergencies they imply are of most concern (fire, quake, flood). But do it smarter than that, and cover all the bases, including the far more serious and dangerous possibilities reviewed in the prior post. Here is how best to do that without taking on the whole burden of cost and logistical overhead, yourself. But I warn you, the government will not approve, so part of your plan should include an attempt at quiet preparation and concealment.
What should my family do in a disaster?
A single family household, no matter how well prepared, cannot fare as well as several family units banded together. So much the better when those units are either actual neighbors, or relatives who live not too far away (say, an hour’s walk or less). So if you do not have relatives close enough to meet the need, you should immediately be sounding out the viewpoints of neighbors on this topic (a simple way is to suggest they read this post series, and ask what they think) and cultivating relationships with those of like thinking.
Herein, a ‘family unit’ may therefore consist of any combination of actual blood-related families joining with single neighbors or childless couples who are not related, or may be made up entirely of unrelated persons with no core family, as such. A unit should ideally be in the range of three-five adults, but in an emergency, teens are considered adults. So where most units are single persons or couples, you may want more participating units.
Such a collective of family units, no matter how well each unit is prepared individually, can indeed far better survive a serious matter by their alliance. It makes it possible to spread the need for more costly specialized emergency resources over a broader group; some family units can be designated as special resource parties with everyone sharing the financial burdon. This makes a superior readiness more affordable as well as eliminating storage restrictions which might exist, such as faced by a given family unit in the group living in an apartment.
In the next Part of this series, we will also see that an ideal partner might be deemed a special resource party because they own a gas station, grocery store, gun shop, etc. Many such businesses, in fact, have some special strategic opportunities to consider, which will be the focus of Part III — but you get what I’m hinting at.
How do I prepare an emergency survival kit?
Key Decision Point Factors
Some circumstances alter both individual and collective needs dramatically and will need to be accommodated with detailed planning. The following topics should be fully explored early in organizing the collective, because they may dictate a need to add yet another family unit into the mix, or help define who is a special resource party and what that will mean for all concerned in a disaster event:
Talk about disaster considerations in terms of resource needs and response plans…
a) Categories of disaster events to be considered (i.e., individual events such as fire, plane crash, etc., area-wide events such as flood or terrorism, regional or national events such as Martial Law or pandemic event);
b) Level of availability of, or threats posed by damage to critical services supply lines; water, power, gas, telecommunications;
c) Types of destruction of home and property (i.e., fire, earthquake, flood, assault);
d) Levels of community-wide destruction and resulting third-party threats to home/property/resources;
e) Transportation shut down or impedance to access to home/property/resources, or each other by third-parties;
f) Impact of communications shut down vs. alternative solutions for the collective;
g) Disparate location of individuals (i.e., at work, home, in transit, shopping, etc.) as might impact on reaction and hooking up post event;
h) Estimation of self sufficiency of a given family unit before connecting with the collective;
i) Estimation of time before outside helps become available, as will vary according to the above considerations.
j) Fully review FEMA emergency guidelines and their pitiful performance in actual disasters such as Katrina, as well as the shameful role of military and police. In Katrina, they came for the guns and gunned down blacks to keep them in their own area. In Hurricane Andrew, the National Guard deployed a psychological warfare unit who set up detention camp-like relief centers and set up telephones which were 100% monitored by the Defense Department, and CIA, etc. You need to know what frightening provisions the government has made in preparation for total control of your lives ‘in an emergency.’
Such factors are most simply addressed by establishing multi-level options for individual family unit’s responsibilities to the collective, as well as event response. Each individual’s plan/options should deal with each such contingency, and consider where the individual might be at any given time (i.e., at work). Resources should be redundantly distributed over as broad a range of storage points as may be practical — a key reason for multiple family units. Examples of determinations:
a) A family without good storage capabilities may need to focus on an ability to relocate or hookup with one who does;
b) A family without good financial clout may need to focus on an ability to provide special skills or manpower, or deal with relatively low cost special resources such as communications or transportation;
c) A family with inherent special resources already in place (e.g., owns a gun shop) will likely get a free ride, financially speaking;
d) A family with many adult males will likely be the best collective leader, though clearly, other factors also come into play. Such determinations may vary according to event type being addressed, so a different family unit might be deemed a better leader or resource for one type of event than determined for another event. Military experience, for example, would be of great value for long-term, regional, or political upheaval events, but less important in a short or localized events.
Where can I get advice on emergency preparedness?
Term of Survival without helps dictates needs…
A key factor in planning is knowing what constitutes a minimum level of stored resources (emergency preparedness kit) per household for each event type, as well as kit content details. Again, distribution of resources will likely be required, and there should be some level of redundancy to accommodate the total loss of a given family unit’s houshold kit. More: because FEMA’s draconian powers extend to cover broad powers of confiscation, and by their wish is to control ALL MANNER resources, they deem HOARDING to be a punishable crime with significant penalties to include arrest.
Hoarding generally appears to be defined as no more than a week’s supply, but some things are even more tightly controlled, such as gasoline storage. So plan on hiding long-term reserves, and likely, on protecting your weapon’s and munitions in similar manner as well; gun confiscation by military is highly likely in a long-term event.Below find a minimum suggest level of supplies and their dispersal. Naturally, your own thoughts may yield improvements based on your own skills, location or environment (e.g., lakeside = boat), and availability of special items (e.g., scuba gear):
A) Localized and single unit events will likely require no more than 1-3 Days of self sufficiency: Food, water (1 Gallon per day per person*), blankets, three changes of clothes each for normal and extreme weather conditions, three sets of rechargeable batteries for all devices, portable lighting, one flashlight per person, multiband radio, propane stove and 3 propane refills, sleeping bags, rainslicks, first aid kit, bagged clothing, and about $250 cash. Matches, newspaper bundles for kindling or insulation. Local storage should be sufficient even in an apartment situation. Each person can keep a ‘go bag’ in their room, or at least a flashlight, if using centralized bag location, only. Regardless, the bathroom or other storage point for prescriptions must be raided along the way*.
* Each of the levels below can impact prescription and water issues negatively. It becomes increasingly difficult to store large quantities of water, and thus some form of water reclamation or source should be considered, as indicated. Prescriptions can run out in mid event and would be near impossible to refill, and it is difficult to obtain a long term supply, and even if possible, long term storage of many prescriptions may be a bad idea as drugs degrade with time and sometimes even become dangerous through chemical changes wrought by oxidation. Since some prescriptions can be dangerous if forced to stop cold-turkey, you should consider the side effects and warnings on each prescription to see if weaning off gradually might be wiser. Fortunately, Diabetic and other select medical problems rely upon supplies and treatments which can be acquired and stored for long term needs. A final comment: each person with a significant medical need should keep on their person a card citing such concerns, medications, etc., in case they become incapacitated and found by third parties. The card should include information on any alternate location the collective is using as the emergency ‘address’ if different than that on identification, as well as names of key persons to be sought out, which should likely include more than direct family.
B) Wide area events may require 4-14 Days self sufficiency: Add one pistol per household and box ammo, and walkie talkies locally retained by each household. Globally augment food and water appropriately, and add a store of gasoline, axe or chainsaw, shovel, generator, rope, tent(s), hammer, propane torch, handsaw, nails, screws/eyehooks, canvas. Sewing kit, 1 or two GPS devices, hand-held multi-band radio scanner, water reclamation kit (and supply of filters), road flares, pepper spray, motion alarms, binoculars, $1,500 cash. 2 additional boxes ammo per household. Secure storage facilities are a must, especially for weapons and fuels, with no exterior access to unauthorized parties. One person must jump through gun registration hoops to acquire the gun, unless given them as a gift.
C) Regional or national events could easily require 3-12 Weeks sufficiency: Globally augment Food, water, consider augmenting a base station home with defensive modifications*. Note that GPS accuracy may be downgraded by government action from 50’ to several thousand feet. Add 1 rifle w scope per family unit, 1 pistol per adult globally, 1 or more night vision device for guard duty/firefights, short wave two-way radio, surgical kit, hiking/fishing/camping gear, flare gun, wheelbarrow or cart, 1-3 pairs binoculars, $5,000 cash. 3-5 boxes ammo per weapon. It may be advisable to bury some items or provide external hard and secure storage site(s)*. No additional gun registration applications by secondary parties should normally be needed, especially if the primary purchaser applys for a Dealer’s permit, which can additionally allow purchase of fully automatic weapons.
D) Longer Term events such as revolution or Martial Law, invasion – Base Station only: 1-2 Shotguns, 1 or 2 targeting lasers for tactical pistol use, 1rifle per adult w or w/o scope, 1 crossbow and sword per household, Seed bank, military survival/combat protective gear, welder, expanded took kit, block/tackle, smoke grenades, flash bangs, salination system if near seawater, still, bear traps (for perimeter defense). 25 boxes ammo per weapon. 3 dozen bolts. Hardware nuts/bolts kit. Bolts can also be used to make spears. Burried and external storage sites much more important, to include off site and well hidden locations. Here is where you want to have dosimeters, Geiger Counter, and Potassium Iodide tablets in case of radiation concerns.
E) Regarding Vehicle kits, all levels: spare ignition cables and parts, full set of spare fuses, serviceable spare and jack, snow chains, tools, 6 flares, 1 gallon water, blankets, first aid, 1 days food per person in family unit, 1 box ammo per type of weapon (pistol, rifle, shotgun), 6 bolts. Pepper spray, sand bag, matches, newspaper. First aid kit. External of vehicle, spare set of tires, anti-freeze, case of oil, two cans each of brake, power steering, transmission fluid, service manual for vehicle. Car alarm advised.
*In my book set, Fatal Rebirth, specific advice given on how to reinforce a home or other structure, conceal critical items, and other tactical considerations, including home-made weapons. You might want to read some books which specialize in such topics for an even better insight. Also included is tactical advice for possible conflict scenarios useful to militia or other armed defenders of the Constitution. A free ebook copy of Volume I is available by request to pppbooks at Comcast dot net. Learn more at proparanoidpress.com.
What happens if government does not respond quickly enough in a disaster?
These considerations, with a properly organized dispersal of resources among cooperative family uni