Category Archives: Uncategorized

8 False EAS Alerts in 5 Months = Conspiracy

We depend on Government in emergencies. But what if the emergency system designed to warn us was turned against us as a tool for Control? The unusual flurry of false EAS alerts of late may point to just that…

by H. Michael Sweeney   Facebook   MeWe  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

What you will learn reading this (long) post…

  • There has been a staccato series of ‘impossible’ false EAS alerts of late;
  • In fact, there have been twice as many as national media admits;
  • They defy statistical probabilities with no historical precedence;
  • This mimics other, similarly odd critical historical infrastructure failures;
  • Those infrastructures have associations w military & intelligence communities;
  • Their failures appear to serve the interests of the military/intel players;
  • The associations and interests are also a commonality to the EAS failures;
  • An analysis/projection as to what it all means: what to worry about.


Why can’t we trust the EAS System??

aaa.jpegIt makes no sense, unless you are a conspiracy theorist who knows something from history that others, do not… things having to do with CIA conspiracies which were NOT theories, but actual proven crimes. No one, I doubt, other than any conspirators involved, is in a better position to explain the true significance and offer the full details of these failures, than this writer. The full story is far bigger and scarier than the almost ‘entertaining’ or matter-of-fact dry news approaches found elsewhere, when dealing with the topic. We start with a simple question…

What is wrong such that there have been as many a EIGHT (more than a dozen, technically, depending on how one chooses to count) false Emergency Alert System issuances in the span of five short months… and that does not include several more potentially related, as separately described. That is in stark contrast to the fact that in the previous twenty years since replacing the old Cold War CONELRAD Emergency Broadcasting System in 1997, there had not been a single false alert of the same sort?*

It’s bad enough that EAS alerts start off with extremely annoying assaults in your ear, but when they turn out to have scared you into action for a false reason of some sort, you really get ticked off. Unfortunately, it appears there is even more to be angry about, than any of that… something greater to fear than these errors… even greater in scope and threat, perhaps, than the messages themselves, portrayed, even if real. Let’s take a look:

  1. False Tsunami alert, Jan 2, Seaside Oregon. Very specific, advising 4 hours to get to high ground;
  2. False Nuclear Attack alert, Jan 13, State of Hawaii. Very specific, advising “BALLISTIC MISSILE THREAT INBOUND TO HAWAII. SEEK IMMEDIATE SHELTER. THIS IS NOT A DRILL;”
  3. False Flood Warning, Jan 17, Morris County, New Jersey. Specific, narrowly distributed, and persistent, in that it was repeatedly issued to customers of only one cable provider, and could not be ended unless turning the the TV off and back on, after which it would reappear after a few moments;
  4. False Tsunami alert, Feb 6, Portland Maine. Also appeared in West Palm Beach, FL, and other locations on the East Coast, various locations in the Gulf of Mexico, and Puerto Rico. Very Specific, giving only 57 minutes warning;
  5. False Blizzard alert, Feb 19, Tucson, Arizona. Specific. Snow of any kind is extremely rare, there.
  6. False Tsunami alert, May 11, State of Alaska (two instances). Very Specific, and though only aired in Alaska, warnings itself cited entire North American Coastline (including British Columbia) and Hawaii;
  7. False Zombie Alert, May 20, Lake Worth, Florida. Very specific “POWER OUTAGE AND ZOMBIE ALERT FOR LAKE WORTH AND TERMINUS.” Companion message followed some time later “THERE ARE NOW FAR LESS THAN SEVEN THOUSAND-THREE-HUNDRED-EIGHTY CUSTOMER INVOLVED DUE TO EXTREME ZOMBIE ACTIVITY. RESTORATION TIME UNCERTAIN.” Note: for some reason, no news source makes record of BOTH messages, and many news pages on topic are now ‘404 Errors,’ as if someone is vanishing select reporting on this incident;**
  8. False Civil Emergency alert (2 messages), May 29, four counties about the Salem, Oregon State’s Capitol. Not exactly a false alert, it simply was wrong in content, non specific, “CIVIL EMERGENCY IN THIS AREA UNTIL 11:28 PM PDT PREPARE FOR ACTION.” This was followed by a second message some hours later advising that it was a “WATER EMERGENCY FOR THE SALEM AREA,” but gave no specifics, instead giving a web link for details. That clarification did not go out to adjacent areas, leaving those citizens, in the dark until media could figure it out and advise using their own services.***
  • Potentially Related: False Nuclear Power Plant Accident Alert, May 23, 2017, Salem County, New Jersey. A drill being conducted was interpreted as real by the system;
  • Potentially Related: False Blizzard Alert, May 16, State of Nebraska. Very Specific, listing all counties. Note: this alert was not found in mainstream news, but in a Youtube. However, the presenter specializes in videos of seismic activity recording instruments during events, and therefore, seems unlikely to be fake;
  • Potentially Related: False Zombie Alert, May 16, Great Falls, Montana. Very Specific, and claimed to be a hacking incident.
  • Potentially Related: False Nuclear Attack Alert April 22, 2018, Winnipeg, Canada. The Canadian system is not an American design, and works differently. However, there is some interfacing between them, as seen in the Alaskan Tsunami warning. This message was heard only (above link) through the cities various loudspeakers, which were not part of any official alert system, and is thought to be a prank. The message was, however, quite frightening and detailed, very specific, and, delivered in a computer voice with believable content: “This is a National Emergency. Important details will follow. (unintelligible) (emergency tones) The following message is transmitted at the request of the Canadian Government. This is not a Test. A nuclear attack is occurring against the United States and Canada. Six nuclear missiles have been launched from unknown locations, and are expected to strike the United States and Canada within the next 15 to 25 minutes. Due to the uncertain path of these missiles, all Canadian residents should seek out a fallout shelter immediately. If members of the Canadian armed forces direct you to a fallout shelter, please follow them for your safety. If no fallout shelters are available, get as far underground as possible. Stay away from windows, using heavy objects to put as many walls an layers of protection between you and the outside world as possible. You should put together a basic emergency survival kit including a flashlight and battery operated radio to use during your stay in the shelter. Stay tuned to local media for further information. Do not venture outside until notified it is safe to do so. Prime Minister Justin Trudeau will be speaking on all stations shortly

One final point to consider: there are ‘consistent themes’ present in all of this, not all of which are obtusely visible, and perhaps not all revealed, herein. There is a Zombie theme, a nuclear theme, a Tsunami theme, and a ‘name’ theme, where the names of some counties involved match the names of some cities involved in other alerts, or vice versa, and similarly, a map location theme (East, West, and Gulf Coasts, and dead center U.S., plus Canada; all four ‘sides’ and the ‘center’). There is also a ‘date’ theme, since all but one event transpired in the same three months, six of those in one month, two on the same date. Collectively, these thematic patterns raise additional questions as to the likelihood of mere ‘coincidences’ or ‘accidents’ being involved.

Note: this is a long post which goes into great detail that there be no misjudgment by the reader. It is suggested you not read further until you have enough time to finish (scroll now to evaluate reading time).


 The asterisks

*Each of the false alerts prior to 2018 had a completely different nature than those cited above, especially in that the older false alerts were not generated by use of the system, as such.  All but one of those above had a cause/blame element or mitigating circumstance pointing to failures in the system, even when human error was also involved, whereas all prior errors on record (about a dozen spread out over the 20 years), were due to hacking (1), mistakes in advertising (several), or film production (several). There were additional failures where tests failed to transmit, at all. It can be said that all of the historical problems boiled down to human error traced to failing to understand how the system worked, or failing to use it at all (failed transmissions). That is not true of the six in question.

The thing to underscore is that there is near zero similarity to the current failures, in analysis. Even when human error played contributory roles (two events), something in the System, itself, was also to blame… which is a mystery, because there has been no change to the system which could account for a change in reliability or performance. Differences aside, keep in mind too, that there is no guarantee that any given official explanation is necessarily the truth; such things gone wrong involving government often involve cover (up) stories… especially if there is a conspiracy, somewhere in the woodwork.

There was one instance of hacking in the older events, but a long list of those older false alerts were triggered because radio or TV stations used tape which had previously held EAS content, where the signal which triggers the system was still detected by the system though otherwise inaudible. The EAS tone has a digital signature which the system detects for actuation… and the annoying tones themselves are that digital signal in audio form… which also triggers the system if in broadcast content. Beyond the hacking, this signal was itself the source of the remaining problems, primarily because human operators were unaware of it’s technical nature:

One national Arco Ad deliberately included the tones with the ad message to get the listener’s attention in ‘gag-like’ motif, and concluded with “This test brought to you by ARCO.” One local advertiser also incorporated the tones in similar marketing intent, but the NBC affiliate running the ad locally did not know it would trigger and automatically transmit the alert nation-wide over the entire NBC network. Movies sometimes include the sound in their digital sound tracks when the plot calls for it, and when aired on TV, that, too, triggers the system (Olympus Has Fallen was an example). The most recent example was a sports radio program using the tones in a review of a sporting event where the alerts triggered during the event, a matter resulting in $2.5M in fines to the program producers and the station involved.

These differences highlight the unusual series of late, which contrast in both frequency statistics and historical relevance; if the given explanations are true (there have been few explanations yet offered, and they have been speculative or non specific in nature, chiefly passing the buck to some other quarter; ‘It wasn’t us;’ the message came from (someone else). ‘Someone else’ had nothing to say. So, we now have one more serious question to ask:

How come we have not encountered these kinds of failures, before?

**The Zombie alert is particularly disturbing for three reasons, none of which sound particularly believable, but they are true. One is tied to where it took place, in that there have been multiple news stories in Florida in this last decade, all about REAL Zombie attacks, including banned Youtube videos of a naked man who had to be shot by Police because he refused to obey orders to stop eating the face of another man he had subdued violently. Another incident had a man who was undeterred by multiple tasers and a Police Dog, and had to be pulled off of the body of his victim by four Officers, after chewing on his victim’s face. These attacks were blamed on Flakka, an exotic Chinese-made designer drug with extreme and unpredictable hallucinogenic properties.

The other is that the Center for Disease Control’s official Web site has a whole page on Zombie attack preparedness. It is a not-so-easily-detected Onion-style tongue-in-cheek attempt (they claim it a marketing gimmick) to force people into thinking about emergency preparedness. It may have worked, but given the news stories and the EAS alert, one has to wonder… how is it that the word Zombie has more something like a dozen times made it into elements of the EAS system? In the recent incident of concern, it seems the word was not typed in by a human, but somehow, it was substituted for the word for ‘weather.’ I point out that procedurally, it takes two people to enter a custom message, the typist, and a supervisor who dictates and/or approves it while watching over the shoulder; a kind of failsafe system to spot/prevent such errors.

aabb.pngThe other general false Zombie messages took place in 2009 and 2012. Highway traffic alert signs (i.e., the ‘Amber System’, School Zone signs, freeway traffic signs, etc.) started warning of Zombie attacks. Amber and many highway systems, and any local emergency cell-phone subscription services, are all interfaced with EAS to one extent or another. The Zombie messages transpired in scattered cities around the nation with some variety in specific content. One school zone speed warning sign read “ZOMBIE INFECTED SCHOOL AHEAD”,  whereas most of other traffic signs read “WARNING! ZOMBIES AHEAD.” Fortunately, those events were not based in reality… yet.

One more ‘bonus’ reason exists, but is its own matter of importance with respect to the conspiracy theory alluded to in the introduction.****

***The Oregon Capitol (Salem) suffered a biological water contamination (algae bloom toxins) which was dangerous to very young or old persons, and anyone with a hampered immune system. But though city planners were aware of the problem, they waited four days before issuing the Alert, thinking they would simply ‘fix’ the problem with water treatment, and retest the water.

That’s what they did, but the brainy (I should point out that Oregon is run by extreme leftist progressives, not known for thinking problems through to proper conclusion before acting) Oregon officials failed sent the sample to an out-of-state lab by mail despite having ample local testing resources, forcing a considerable delay. Additionally, the problem initially transpired over a holiday weekend, and they just couldn’t be bothered to be proactive in the face of a potential life-threatening situation. Oregon is often described as a ‘Let-it-burn State,’ because they habitually fail to respond to emergencies until an extreme crises, a pattern especially visible in how they respond to forest fires… which is to say not at all, unless and until it starts threatening communities or major commercial ventures, or starts to make national news (they don’t like negative PR).

In like manner, the State failed in its ability to notify citizens when the water was finally again safe to drink. Some blame the Governor, Kate Brown, who is thought to have ‘not let a good crisis go to waste,’ and who thereby let the problem get large enough for grandstanding, by calling in the National Guard to provide potable water in a near ‘Martial Law disaster response’ manner. That thus illustrated ‘leadership in a crises,’ when it was actually a non crises which had apparently already resolved itself, before she gave the orders, had anyone bothered to correctly clarify the matter.

Even the second EAS ‘explanation’ message was sufficiently non specific such that it caused extreme social and financial hardships on businesses and citizens, esp. those working for the countless eateries and other firms which shut down because they feared using water, at all, and because people panicked and hit the stores to gobble up as much bottled water as they could muster. As result, some stores raised prices on bottles to as high as $50 a case, and they got it. The Governor has ordered those firms to be prosecuted for their profiteering in a crises, which is akin to hording in terms of emergencies, under the law. This was also part of her grandstanding, as it seems the threat was never carried out, probably because the law only applies under FEMA control in disaster response, and/or in the case of actual Martial Law. I’ll defer to legal teams on that, as this is certain to lead to lawsuits against the City and the State, as well as stores involved (that’s another way Oregon burns).

In addition, Kate attempted to blame Donald Trump policies in purely political diatribe, which had nothing to do with anything. And, subsequently, the State moved to order residents of four rural counties to ‘stop using well water’ because ‘it is lowering river levels’ and threatening the water supply of the cities. The State has no legal right to usurp the property (water rights) of citizens without due process, and in point of fact, the wells in question do not impact the river levels, as is scientifically proven by several means.

But it made good PR for the liberals in the cities, who hold the greater number of votes. So, in a way, this particular EAS was part and parcel of its own little political conspiracy, though it did not originate as such, nor was it causal to the false and functionless alerts… assuming you don’t count public panic a function.

****Conspiracy? This conspiracy theorist has many times proven theories true, and in fact, correctly predicted 9-11, and afterwards, personally thwarting another predicted terror attack in Portland (link: mid page). Over the years, conspiracy theorist thinking also enable me to help put a good number of bad people into jail who were engaged in organized or individual crimes, some of which made national news. These predictions and the crime busting was largely made possible by first formulating a conspiracy theory, then postulating a means to prove it, and researching to find the predicted evidence it was so. There is no difference in methods employed by a good theorist and law enforcement, except that the later has virtually unlimited resources and tools available.

By such means, after ten years of research, I developed Unified Conspiracy Theory in and for my book set, Fatal Rebirth. It was the UTC which predicted the terrorism, and much more as cited above, including the Derivatives financial disaster, select gun violence, an assassination attempt tied to a Presidential campaign, and much more. In reverse manner, it showed how the long list of ‘random’ bumps-in-the-night of American History (i.e., S&L crises, assassinations, Iran Contra, OKC and WTC bombing, etc.) were not random, but stepwise logical acts in a PLAN to towards meeting a SPECIFIC GOAL… which also accounts for the extreme leftist nature and actions of the Democrats since Obama took and then lost office. That, I did not foresee, though at the time, it appeared that the far Right would do much the same if unchecked. Let’s just say that the UTC saw little difference between a Clinton and a Bush… ‘New Boss same as the Old Boss.’

The history which enabled the UTC itself brings us to some things which were part of those bumps in the night… which directly speak to this rash of EAS false alerts… as well as the highway sign warning system false alerts. The UTC in fact predicted abuse of EAS in false flag manner. That history tells us that these emergency alert systems were not the first to suffer highly questionably and unbelievably coincidental rashes of system ‘failures’ tied to conspiracies. To explain, we go back to CIA’s Operation Mockingbird… which through knowing, will help explain EAS matters. If already familiar with Mockingbird, you may skip to the last paragraph in the section, below.



Operation Mockingbird was a CIA project which was started in the 1950’s (Wikipedia uses the word ‘allegedly,’ but it is well documented, even indirectly referenced in the Congressional Record in both the Watergate affair, and in the Church and Rockefeller Committee reports on CIA mind control operations. Mockingbird disinformation was a subtle but effective form of mind control through, at the very least, the mid 70’s… and that date IS ‘alleged,’ because there have been many proofs it is still in play well into this Century, as one example, below, will attest.

Mockingbird was a large-scale infiltration of mainstream U.S. and foreign Media. In the U.S., alone, there were thousands of operatives involved. This included small student and cultural organizations all the way up to big TV network news and newspapers, and Internationally, it included whole Wire Services, such as A.P., U.P.I., and Copely… which of course, also impacted American news sources who regularly passed on their stories unchecked. Most were recruited as in place employees or managers ‘hired’ or ‘bribed,’ or otherwise coerced into cooperation, but actual CIA agents were also put on the payrolls of cooperative media. In some cases, CIA actually bought the firms, and staffed them with whomever they pleased.

Big names were involved, too. William S. Paley (head of CBS), Walter Cronkite (CBS), Henry Luce (Time/Life), James Copely (Copely News Services), Phil and Katherine Graham (Phil @ Washington Post and as head of Mockingbird within his industry, Kate following in his footsteps, and later, Time/Life/Warner’s infection, along with their existing Mockingbirds). The list goes on, to include many key people in at least 25 newspapers and every TV network — and Hollywood was by no means exempt. That number of newspapers is interesting, because it is not the first time.

Prior to WWI, the ‘Powder Interests’ (the predecessor to the Military Industrial Complex) organized conspiratorially to get America into the war by bribing the Managing Editors of 25 newspapers to sway America away from its isolationist and neutral thinking regarding the war in Europe. That IS succinctly and precisely found in the Congressional Record. They did this in a manner similar to the way a CIA Public Relations Firm and CIA proper arranged to get America into ‘America’s New War’ (the ‘slogan’ adopted by mainstream media in Wag-the-Dog media manipulation manner), Desert Storm, the liberation of Kuwait. This was a modern post 2000 example of Mockingbird’s model in play.

CIA and it’s CIA controlled PR firm, fostered a lie (disinformation) in news stories and in false testimony before Congress (and rolling news cameras) that Iraqi invaders were killing Kuwaiti babies, Doctors, and Nurses in order to steal incubators from hospitals. In WWI, they did the same, the lie being that Germans were raping and cutting the breasts off of Belgium women thought to be corroborating with the resistance movement. Both lies were bought, hook, line, and sinker, and helped bring America to war. The first casualty of war, is said to be ’Truth,’ and it falls well before the war actually starts.

What does that have to do with EAS, you ask? What is EAS (and the highway signs), but a way to spread key information to people… or DISINFORMATION? It is just a slightly different but much more urgent and powerful cannot-be-ignored way, than mere media.  Now, for the rest of the story: this is indeed not the first time there have been conspiracies which parallel these ‘errors’ in other kinds of critical national systems… and their very nature implies Mockingbird-like ties to the intelligence community, was involved. Everything you are about to read next about these events is fully reviewed and documented in Fatal Rebirth, and were, in fact, key components of the UTC’s evolution and ultimate predictive capabilities.


Telephone and Power Grid systems

Both of these critical national infrastructures are well regulated, if not designed, in a collaboration between their key industry players and government overseers, including one or more intelligence agencies. NSA and Ma Bell worked very closely together to design the ‘modern’ digital telephone system (‘modern,’ because it was as early as 1960… an important date in our discussion). FBI and CIA were also ‘in-the-loop,’ along with the Pentagon and at least Army Intelligence (perhaps other branches, as well).

The nation’s Power Grid, on the other hand, has been an evolving design overseen for security and technical purposes by the US. Department of Energy. DOE has historically had strong ties to CIA, to include, for instance, cooperative efforts in the area of Mind Control research (again, in the Congressional Record, and in this case, official DOE files online). Again, FBI, et. al, have always been in the oversight loop. Curious then, that both these systems have suffered mysterious rashes of failures almost identical in pattern to the EAS and highway sign failures. I summarize, here, from documentation in Fatal Rebirth:

The Power Grid has suffered two ‘batches’ of failures. The first was over two years (1996-98), during which three of the four major multi-state grid sectors suffered a complete catastrophic power outage. The second string of outages took place over three years (2001-03) with similar results. Both series involved other countries, as well, all relying on US grid design formats or the failed grid’s power, itself.

This was all blamed on trees and lightening strikes, neither of which hold water for technical reasons which render them it quite implausible, especially given the repetitive nature in tight time constraints… it would be like claiming every assassination effort in the last 50 years involved a JFK magic bullet, including the one against Reagan by Sqeaky Fromme, where no shot was fired. Simply put, trees are not allowed anywhere near the high tension lines involved, and all lines are isolated from ground, where their towers are in their place grounded lightening rods intended to prevent lightening strikes from impacting the lines. These are cover up stories. If they were valid explanation, the history of outages would consistently have the same failures ongoing, and not be isolated to neat little clusters.

And it is JFK which brings us full circle to that 1960 date… and to the phone systems. The digital phone system was launched in 1960, just in time for the assassination of JFK in 1963. The entire phone system in Washington, D.C., was shut down the very hour of the assassination, and not restored until Vice President Johnson was sworn in. Evidence generally accepted in books on topic (i.e., Mark Lane’s Plausible Denial) indict G. Gordon Liddy, ex FBI player trained in manipulation of the digital system, and closely aligned with the CIA team assassinating Kennedy according to courtroom testimony (same book), also the same team to the man involved in Watergate, along with Liddy. The D.C. outage would eventually be duplicated in a bigger scale, nationwide…

These also were in two batches. In 1991 a series of major land-line outages in America caused large area networks to go dark, all within the same two month period, each impacting key cities and whole States, D.C. style. In fact, D.C. was one of the cities, and part of the mystery is that major cities on vastly different regional networks were simultaneously failed in most of these outages, often thousands of miles apart. Like the Power Grid, post Fatal Rebirth, another series of such outages has taken place, this time impacting select Cellular carriers, the most recent recent of note impacting multiple carriers and the entire Southeast U.S. More to follow, on that. Like the EAS alert errors, no actual definitive explanations were ever fielded.


What it all means

There are two important meanings. The only one obvious and stated elsewhere in media accounts on the topic is the concern about public safety. If you cannot trust the accuracy of the EAS system, people could end up being harmed physically or financially by false alerts, or worse, end up in like state because they had lost faith in the accuracy of the system and failed to properly and promptly respond to an actual emergency. It matters now WHY the errors exist, for this concern to be valid. Be it because of hacking, human error, design flaws, or political motives, lives are still at risk of serious negative impact. But that is nothing, compared to the greater, unseen threat implied as covertly present:

The UTC says these were all test ‘failures’ caused by elements of the intelligence community, principally as ‘tests’ of their ability to manipulate the systems involved, as a matter of Civil Control. This would logically be a logical step in preparation for potential serious civil disobedience, Martial Law, or some kind of political Coup. The more recent events were, in fact, predicted by the UTC in Fatal Rebirth. Such would be a powerful disinformation tool, one having the unique potential to be both a conspiratorial false flag style pre event deception, and a support for post event cover up… ‘official proof’ as to what the ‘official truth’ was intended to be.

Certainly, any given event we have reviewed could in truth be simple natural failures with no attendant conspiracy attached. But given the batch nature and other similarities to the power/phone system failures, and the other highly coincidental clues discussed herein, the whole cannot in any way be innocent. Consider this: if we suspect conspiracy based test ‘failures,’ we must presume they would need to predate some future major event of potential concern such as to warrant such a desperate total blackout of (power, phones, or both… along with EAS, and highway signs.) Restated; if expected to be needed, you would damn well test something that complex and important, first, and early enough to perfect the effort should it test poorly. Any such predating would need allow a couple several months to years to ‘fix’ any flaws causing the tests to fail, in order to retest to insure it worked flawlessly when it really mattered. Hence, tests might require two batches.

So… what about that dating?

We need look at the outage dating and see if there were any events which might require outages of power and phone systems, as a means of validating conspiracy concerns. We must think of such outages as contingent emergency responses to control populations in an otherwise out-of-control situation threatening government security… or the security of those working in the shadows on conspiracies of their own against the nation. If we find such in place, then we have a potential UTC-like scenario we can then apply to divine what may lie ahead, based on the current flurry of false alerts.

Power, 1996-98: two years before 9-11. If that was a false flag attack, as much evidence reveals it to be (another part of the Operation Northwoods plan thought to have part of why Kennedy was assassinated), then any serious failure in keeping the truth a secret might require shutdown of the country’s ability to rally against a more dramatic coup required to prevent or deal with armed revolution, or similar civil upheaval. A FEMA takeover would be the perfect cover for such a coup, and give time to manufacture and establish an effective cover up, such as showing some dead bodies thrown under the Bus as conspirator ‘ring leaders.’ In fact, Homeland Security was established exactly two years prior to 9-11, to the day… and was planed by PNAC and the Anser Institute (an intelligence community think tank), all planned in the same general time frame as the test outages.

Power, 2001-03: one year prior to a UTC predicted terror attack on Portland, Or, which I personally thwarted, involving two of FBI’s Top 10 most wanted terrorists (identified by video and eye witnesses – details here)… not to mention at least one FBI agent, false flag style. Five years before Barrack Obama would run for President with some reason to fear possible assassination, which could in theory spark a race war or similar unrest. Either one of these events might require outages in order to retain or restore control and mitigate damages from resulting civil turmoil.

Power, regional Southwest outage, 2011 (also post Fatal Rebirth): this is the most recent and singular outage event, only suspicious because no cause for it has ever been discovered, though hacking and terrorism have both been ruled out. It is several years before the growing racial violence potential during the Obama Administration, and for the matter, the current turmoil among the radical left caused by Trump’s Presidency. Additionally, there has been an endless series of news events, mostly centering around gun violence involving black victims or civil rights issues had a potential for sparking the race war feared by the Rodney King beatings. The assassination fear would also remain.

Phones, 1991 series: three years before the Rodney King beating, the WTC bombing, and the Branch Davidian nightmare at Waco. The CIA, military intelligence, and the greater Military Industrial Complex were involved in all three events. Two years before the assassination attempt predicted by the UTC on Presidential Candidate H. Ross Perot.

Phones; regional outage 4 carriers in four Southeast States, 2011 (post Fatal Rebirth): this was allegedly due to a single cut land-line cable, but who and how the cable was severed has NEVER BEEN DETERMINED. There is a possibility that the cut took place AFTER the outage was achieved by other, unknown means. The Occupy movement was generally organized/proposed/planned beginning in May of 2011. Intelligence Agencies would have been aware then, or shortly thereafter, and would need to take some time to consider contingencies, once knowing the event’s schedule. The outage transpired in August, and the actual Occupy Event in America took place in mid September, exactly 45 days later. It had the potential to be evolve into a national or even global revolution.

A little complex to relate in a blog already long in tooth, but suffice it to say that any one of these outage events could easily be shown to be a preparatory test in support of a plot or other expected event with the potential to result in wide-spread civil disobedience. CIA operated spy planes remapping US cities and coordinated with the Pentagon in planning for military takeover if riots spread beyond LA, where military intelligence operatives initiated much of the violence disguised as angry Blacks from Watts. WTC was orchestrated and facilitated by both CIA and military intelligence, principally to empower Osama bin Laden’s Al Queda as the premier terrorist group, and place two top aids into the organization as double agents. The bloody end planned for Waco risked exposing CIA mind control programs and premeditated mass murder, and took place under Bill Clinton, he and his wife also ‘former’ CIA operatives, if not agents. Perot’s assassination attempt was by mailed Anthrax, same as used against one of Clinton’s body guards who was to testify against him in the Whitewater affair, and as used against media and Congress post 9-11. Any one of these events going wrong and leading to exposure of the truth (esp. who was behind them) could result in serious civil upheaval or dangerous collapse of government infrastructures, including the military and intelligence community.

Note: Phone and/or Power outages also generally kill Internet services in the same areas effected. Power outages kill everything, including gasoline supplies, sales of critical emergency supplies at most retailers, and access to cash from the banking system. These things critically impact the ability of Citizens to exercise much of any effort beyond mere survival, easily putting a crimp in any major organized events. Outages effectively ‘freeze’ political, social, and physical states of the region(s) affected until authorities can gain control. Emphasize, CONTROL.


What might the current EAS failures portend?

What if the theory is true? Again, in UTC manner, one can attempt to ‘look ahead’ and divine what might be needed to fulfill the last remaining ’puzzle piece’ in the theory; the otherwise inobvious ’need’ for such a test. Two such possibilities come easily to mind. Without being more in tune with current events at the book-research level, I can think of no others, but they certainly may exist. Or, of course, I could be all wet… which is for you to decide… comments welcome, even if critical.

Given the current level of unrest and hatred found on the far left, and the violence and aggressiveness they have lately resorted to, I can only conclude that many of the EAS failures were potentially tests preparatory for a national crisis based on an attempt to depose President Trump and assume control of the White House. It might be an assassination, some form of a coup attempt, an outright civil war between the left and right… or as simple as a highly questionable impeachment effort. I rate that as number one in likelihood.

Number two relates well to the Zombie element. Many conspiracy theorists… and the UTC does foresee the possibility… believe that some form of biological pathogenic pandemic based on zoonotics (man-made virus, generally race specific) is in our future. Fatal Rebirth and my latest book, Who’s Killing the Bilderbergers, both spend a lot of time examining this notion. The theory is that the New World Order will move to both reduce the population of the World and to weaken America’s ability to defend itself against foreign interests (including NWO desires to see a North American Union consisting of Canada, the U.S., Mexico, and the other Central American countries), and will foment a biological attack disguised as some random but previously unknown virus.

It is also possible that large quantities of Flakka could be manufactured and introduced into the water system, slowly. That would make some sense of the Zombie alerts, and the EAS problems related to the water system in Oregon. Slow introduction of Flakka would result in evolving mental instability of the population, at large, such as we are seeing demonstrated more and more in bizarre news stories. At some point, ‘Zombie attacks’ would start to transpire, especially with a sudden increase in Flakka distribution through secondary food sources or aerosol disbursement. If this scenario were a valid concern, the ability to interfere with the EAS system in the event of water testing producing evidence of Flakka introduction would be necessary, which therefore makes Oregon’s EAS failure a little more suspicious than simple stupidity or political malfeasance.

Regardless of if you accept my evaluation and speculations, or not, it is clear we cannot trust the EAS system, and whatever the reason behind the failures really is, it isn’t going to be an answer likely to make us warm and fuzzy about the system, or our future. Especially since it looks like we will never get that answer, at all. That, btw, is how conspiracies work best; treat the public like mushrooms in the basement. You won’t be fed useful information likely to get you out of the dark.

It helps nothing that you can find at least a dozen Youtube’s and other Web resources telling you how to fake an EAS alert. Doing so in any way which reaches the public or accidentally triggers the EAS system, is a federal crime. That so many seem to be freely promoting fakes alert methods… itself seems somewhat conspiratorial.

Yet, somewhat unfortunately, one MUST play safe and act as if any EAS alert is valid. Ultimately, that is the only advice I can offer… but as the baseball player said in Field of Dreams… “Watch out for in your ear.” If you prefer a brainier quote: “Men still have to be governed by deception,” Georg C. Lichtenberg, 18th Century Scientist and Political Satirist.


U.S.P.S. “Informed Delivery” Potential Threat to Everyone, Esp. Stalking Victims

Thanks to the Post Office, now anyone can know what’s in your mailbox, automatically… including of course, anyone in an alphabet agency. It is just another way to track you and criminalize you if deemed convenient, in time.

by H. Michael Sweeney   Facebook  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

“Informed Delivery?”

web_USPSThe idea is you register online with USPS for the FREE notification subscription service, and they then photograph the mail to be delivered to you each day, and email the images to you before delivery; that way, you know if something is stolen or lost and NOT in the delivery, and can plan on getting expected items. It is tied to other services, as well, such as package notifications, tracking services, stamp purchases, etc.

1) This is the federal government we are talking about. The FBI, CIA, and a host of other alphabeticals would have no trouble whatsoever accessing this information. There is no indication that such information is not retained indefinitely, and no privacy statement which alleviates concerns over it being used against you down the road should you become a person of interest, or a trouble maker such as a whistleblower, activist, or other targeted individual.

2) The system is achieved with online registry, and is handled by email, currently with no truly secure process for verification of the applicant or notification of the addressee that a subscription has taken place. Stalkers, private investigators, suspicious spouses or ex spouses or lovers with an axe to grind, or anyone else with minimalist information about you and where you live could sign up pretending to be you… again to include someone working for a government agency who could not be bothered with a warrant — knowing that they could later get a warrant and legally go back in time to ‘duplicate’ the effort in a manner which leaves no proof they violated your rights, earlier.

3) this means that mail must be separately sorted one more time by someone into individual stacks to ‘pose’ for the photograph, and then to take the image and email it… or the entire automated system must significantly modified at both the hardware and software level. Both are at great expense and will cost USPS more red ink… and eventually that cost will increase the price of postage for everyone, not just those using the service.

4) If the system is automated (and even a manual system will be, eventually), then it means EVERYONE’S MAIL is being imaged, all the time: The USPS becomes yet one more information tracking and tracing point available to the government, and under the program, anyone spoofing it.

I’m not the only one pointing these things out… though I’m the only one so far who has pointed out 3 & 4. Other privacy experts have echoed 1 & 2, variously, mostly item 2. Too many people PRESUME that government would NEVER use such a service to spy on them this way. That’s what they said about NSA and FBI when they first started.

Defensive Measure?

It appears the only way to prevent anyone to spoof the system to spy on your mail is to beat them to the punch and register, yourself. However, there is no assurance in place that someone could not still additionally register an alternate email identity. We can only hope and presume there is an online software check which would reject any such attempt.

Short of not taking mail, at all, there is no defense against government use of the images, if you are a person of interest targeted in someway by an agency.

Risks in 12 Step Programs, esp. for TIs

What most people fail to realize is where these programs came from and the potential for targeting abuse by sinister forces.

by H. Michael Sweeney   Facebook  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

12 Step Origins

I am not going to tell you there is no value in any specific outwardly decent 12 Step Program. They do tend to have value to the countless individuals who desperately sought and found through them a path out of a self-destructive addiction or abuse. As such, they also generally have an excellent track record of success vs. failures.
However, I am going to tell you why they can become a trap for select individuals, and just why and how. I am referring to targeted persons and non targeted persons who hold power, influence, or key positions of any kind. I am also going to offer a very simple alternative which has no traps, no downsides, and no financial or time burdens; something that’s been around for thousands of years. It has worked for me, repeatedly, for both serious uses (including targeting), and more frivolous. It is a 1-step solution.
Like the Freemasons and Knights Templar before them, 12 Steps outwardly maintain a squeaky clean public image, but what is inside at the higher levels of operation can be insidious, especially to those select individuals. Also like them, they profess to be God-centered, but fail to define the nature of God or rely on Christian doctrine in their dealings. While even the bulk of staff may think these things true and hold personal faiths they see melding with the program usefully, it does not mean that internally, the truth is not otherwise.
This is because the very first 12 step programs were introduced almost simultaneously and by the same people as two other dark forces applied to the needs of their founders — persons of mutual interests who, in oversimplification, I’ll call the New World Order. That can mean the Illuminati, the Masonic influence, the 1%, globalists, members of round table groups, or even satanists, etc. You are welcome to free associate as you wish; all is usefully accurate within the realm of perpdom.
The first such program, circa 1920, was to combat alcoholism, just in time for prohibition. Many others followed the 12-step blueprint for other ‘habits,’ over time… and while some may have been absent of dark influence when founded, they all would be rather easy to infiltrate. The two additional forces spoken of can be seen as quite related in purpose and means to the darker nature of the ‘bad’ 12 step programs; actual mind control research projects, and the New Age movement, itself. All three served as a means to the same kinds of goals; growing the force I call Shadow in my book set, Fatal Rebirth, detailing the games played by modern-day Illuminati.

Technically, there is a 13th step, one early in the program; the assigning of a help mate, intending that you each help one another to stay on the narrow path, since ‘you can’t do it on your own.’

The New Age movement and select early mind control research, as well as the first 12 Step, were all funded by and proxy organized for the Rockefellers and Rothchilds, with counterparts in Europe. The New Age stuff started with the establishment of the Theosophical Society, which evolved series of petri-dish style afterbirths of cults, false religions, and philosophical mysticisms any Mason would relish. That’s not just rhetoric, because most of these mind game groups were organized along the Masonic lodge system, where secrets were king, and held only by the higher ranks, and/or used to manipulate and control members.

Divinity    emblemfix  Rockefeller Foundation_0.png  Unknown-12    th-19

Templars          Masons                                                                    Theosophy     Rothchilds

We need not get into mind control, here; most readers will already know more than they want to about that, first hand. Those that don’t know, should stop right here, and go read my book, MC Realities. In that book, I produce a Timeline of Masonic/Illuminati/MC Evolutions. It specifically outlines with nearly 80 entries (and more again in the text of the book) several thousand years of such treachery. It includes the 12 Steps.
Again, not wanting to paint the wrong picture about 12 steps, the darker side or risk is not a concrete given for any individual program. Some are undoubtedly completely safe. But if the person seeking their help is already a TI or someone of power and influence, the risk is not insignificant. As a consultant to TIs, at least a dozen clients I have worked with were shown to have been targeted and/or manipulated through their 12-step. This was at times the origin of the targeting, and at others, simply augmentation of existing targeting. This was divided about 50-50.
The primary risk for non TIs is BLACKMAIL, as the 12 step programs always include FULL CONFESSION with prying out of juicy details, things which can result in one’s being targeted to take advantage. While the core of it is during sessions, additional information can be gleaned through the additional risk… which is the fact that attendees are given an ASSIGNED PARTNER (sometimes called a ‘sponsor’), and the resulting effort to become very close and ‘mutually reliant.’ Where the program has a nefarious side, that partner is not very likely to be one’s true helper, as proclaimed for purpose. But they will grow very close, learn much, and be able to exert influence, and even sabotage the victim of their deceits.
In some cases, other attendees and staff members of the program can also be turned against the TI, though generally in ways undetected until too late. Once participation in targeting is detected, an adversarial relationship can quickly develop, with decidedly one-sided advantage; the targeted will suffer a lack of credibility, and the threat of their secrets being revealed. In one one such case, it resulted in physical assaults and scare tactics, one of which eventually resulted in the accidental death of the TI.
Sidebar comment regarding other attendee participation: bear in mind that each attendee is in a similar position of vulnerability, and can be subject to manipulative forces at the psychological level which coerce their cooperation in any such targeting. In time, they may be discerned and known as ‘visible’ perps, but this is not quite the case.
The real evil never shows its face; the attendees themselves are also victims, likely unwitting conspirators in they know-not-what. They do not deserve hatred or vilification, but pity and prayers, if not perhaps outreach and education as to the ‘MC Realities’ of their own situation. It is not impossible to turn them to the TI’s side as covert operative; a means to learn who the invisible persons are, and their motives.
I will go so far as to say, that 12 step counseling sessions are operated using known psychological control methods designed to lower the defenses and encourage the attendee to spill their guts, and accept advice and help which in fact is intended to control them. It is not any different than any other form of mind control in terms of intent or result, even when the purpose is benevolent, as advertised. It is, after all, the intent of such programs to help the individual to do things they have been unable to achieve on their own… to control their actions for good. But when used for the nefarious, the results can be devastating well before any sense of betrayal is realized (if ever). Where already a TI, one can be easily sabotaged and brought deeper under control through the 12-step.
Where the individual is powerful or well placed to the interests of the NWO, it becomes a very simple thing to gain control over the individual either by blackmail and or influential manipulation by the assigned partner or ‘buddy.’ Imagine a Senator with a drug or sex problem, or a key corporate employee with access to proprietary secrets; perfect blackmail candidates. These manipulations can can also provide an avenue or stage for the introduction of other forms of mind control or targeting down the road; the victim becomes an ongoing TI.
Consider the oddest and most shocking news out of the District of Columbia, and other power centers. This can explain why Congressionals sometimes do some of the crazy things they do, things contrary to their party’s and constituents interests. And when failing to do as bid, it can account for public disclosure of their sins in a way which forces them from office. Government often happens by manipulation and graft more than by reasoned and proper loyalty to the oath of office.
Knowing what is going on is everything, when it comes to targeting. In all cases but the one death, my clients fared better defensively once knowing the 12 steps was involved, and broke all ties. The one situation was well out of control before the client made contact, and ended badly before we had even fully explored his case. Perhaps if he had come to me sooner. Note, by the way, due to a number of mutually impacting personal reasons, I no longer offer such client services. I am, however, happy to answer simple generic questions which do not require in-depth understanding of one’s situation. I also offer a free Helps Kit and other aids via proparanoidgroup at gmail com.

The 1 step solution is also useful in targeting issues

Many TIs will immediately understand this statement: targeting is satanic in method and intent, and its primary target is almost always a Christian, especially if weak or new to struggling with their faith. Less commonly understood, the secondary enemies are the Jew and the Muslim, for all three worship the same God of Abraham, who is the only real enemy Satan has. Yes, there are victims in other categories, including atheists, but in small numbers compared to Christians, et. al. To aid understanding, consider that all forms of mind control cause an increase in activity of those portions of the brain used in negative and sinful thoughts, moods, and actions, while suppressing those portions used for good, specifically to include prayer and meditation.
Conversely, as you might rightly deduce, prayer and meditation achieve the exact opposite.
I devote a whole chapter in my book, MC Realities, on the role played by faith in God in mounting a proper defensive campaign against targeting. It shows in clear terms just exactly how and why something as simple as PROPERLY (very easy to do it incorrectly) applying scripture and prayer can have stark and powerful results. It includes both the theological and the scientific explanations as to how that can be so. It should therefore be no surprise that a 12-step can be replaced with the same principles. Instead of applying it against targeting, it is instead simply applied against the ‘enemy’ for which a particular 12 Step Program might hold promise of relief. AND YET, IT CAN BE APPLIED AGAINST TARGETING ISSUES, TOO!
I make that chapter available free of charge on request: proparanoidgroup at gmail com.
What do I mean by ‘issues?’ The issues are the psychological harms of targeting; fear, anger, withdrawal, outbursts, hatreds, and so forth (things from the ‘dark’ side of the brain). These things work together to foster hyper vigilance, a form of paranoia, which can over time grow to exhibit or mimic schizophrenia, where everyone and everything is ‘targeting,’ when it cannot be so. Many think the goal of targeting is murder by slow death or suicide. The actual goal in most cases is simply to make the TI seem insane, and actually to drive them well into that state of mind. Suicide is merely an unhappy proof of success.
To fare well defensively, one must be able to ignore things which are not truly a threat (simply manipulative), and focus only on those things which are (especially those things which cause physiological or financial harms), or which might lead to learning more about the who, why, and how of the targeting — the things useful in mounting defensive and even offensive strategies. All else is a waste of life, and a destroyer of free will. By that, I mean that the TI does what is expected of them by their enemy, not what is useful to the self. Yet so often, I see TIs who would rather spend their time worrying about every single thing every single moment, and complaining about it constantly, instead of working in an organized manner that might better their standing.
Let me tell you how well it can work, both as 12 step substitute, and in targeting…
My personal testimony: I am an alcoholic. That is a medical fact. I exhibit every single trait or warning sign. However, unlike members of Alcoholics Anonymous, the first-ever 12-step, I am able to drink without fear of falling off the wagon. I am in full control, and can drink socially, or for the matter, simply drink for the taste — I love a couple of Margaritas with meals each week, and I might take a single or double Shot of really good aged Scotch once every couple of months. I never get drink for a buzz or to get drunk. I have replaced any ‘need’ with simple moderation. I’ve been doing it for more than a decade.
In like manner, I’ve historically had a problem with pornography. I’ve spent countless hours each week chasing after some elusive fantasy which life was unable to provide in reality. No more. I am actually amused to say I can launch a porn movie on one of my screens, and work or play a game in the other, and not be drawn to the lurid screen by temptation. But if attention is drawn by something unusual in periphery, it is for no more than a reflexive glance, no matter how ‘hot’ the action. That dual-screen game was something I did to test myself, to see if I was cured. Poof! All done!
Both of these were serious threats to my wellbeing in many ways. No need to visit all of that. The important thing is, how easy it was to stop, essentially Cold Turkey, with JUST ONE SIMPLE STEP. Obviously, any physiological aftermath such as from cold-turkey ending of a drug addiction (or nicotine) will still need to be dealt with. But even after ‘drying out,’ an addict will still have the urges and temptations, and the worry about ‘falling off the wagon.’ THAT is what the 12-step is designed to address, and why the buddy system can be of great value, and why, once you join, you need to continue, FOR LIFE. With the one-step, you instead rely on medical advice and help for the short-term physiological aftermath.
Though Christian-based and thousands of years old, it is not quite like what you would expect, and certainly not exactly like any faith-based attempts you may have already seen fail. And, it works: it even helped me with my own targeting experiences. The simplest explanation is that it allowed me to stop knee-jerk reactions and to focus only on those things which enabled victory. Three times in my life I’ve been targeted, and all three times, I ended it through defensive and offensive efforts which would not have been possible, otherwise. The details are in my books.
As to the one-step, itself, explaining that is a lot harder than is the doing. Why? Because I would need to address endless questions about this, that, and the other aspect, as rightful Doubting Thomas, or apprehensive skeptic, might have — especially if unsuccessfully having tried something thought to be ‘similar,’ before. You would want it to fit the knowledge into the context of YOUR situation. It would make this blog more like a book chapter, to deal with all of that. Instead, I’m going to refer you to a couple of videos that provide those answers. They will move you, and motivate you, and educate you — and more to the point, allow YOU to fit it to your situation, be it targeting, or something else.
The first will show you who you really are on the stage of life, and open your eyes in ways you had not previously considered about Christian faith, even if well grounded theologically. It is an 11 minute mind grabber simply called The Gospel, but it is not going to be what you expect. It will give you the foundation within which the second video will have meaningful context. Watch it!
The second is actually a sermon delivered by the same man who’s voice you heard in the first video. He is Pastor Eric Ludy of the Ellerslie Campus, which is devoted to training missionaries and teaching Bible-based living. While you can bet no one there has any inkling about mind control or much to do with dealing with addictions, this sermon can easily apply to any addiction/abuse issue a 12-step might address, as well as to the emotional and psychological woes imposed by targeting. The ONE STEP is revealed in depth.
The title is Overcoming Sin. Any addiction/abuse problem is sin. Targeting is sin. The TI is induced by targeting into sin. Therefore, the solution is to overcome sin, in all these cases, and likely, many more in our daily lives. This is the secret that I’ve never heard any other theologian reveal, and never found in any book, though a casual glance might leave one thinking it identical in nature. In nature, yes, but fullness, no. I promise you, that if you endure the full 1.5 hour presentation, you will walk away amazed and eager to apply what you have learned. You WILL thank God! BAM! Just like that. Watch it!
As you do, keep these thoughts in mind…
  • The sermon uses the topic of powers and principalities of ancient times to frame the lesson… and both addiction/abuse and targeting are born of powers and principalities, as is all sin…
  • An addict/abuser ‘worships’ their particular sin of consequence…
  • A TI ‘worships’ (by constant worried attention) their targeting issues of consequence (equating to sin)…
  • Bending the knee to Assyria in the sermon equates to giving in to sin…
  • So (the Pharaoh of Egypt) equates to you (your flesh, the Old Man) and your inadequate will power to resist sin…
  • Which in turn equates to buying into the enemy’s (sin) Press Releases (that they cannot be resisted) wholeheartedly, accepting the belief the enemy cannot be overcome, by or of ourselves…
  • If you listen carefully, you will hear echoes of 12-step program dialogs! They simply borrow the truth and apply it in their own way… and with respect to targeting, twist it to meet their own ends.
The above will help you to get more out of the sermon for the topical purposes of this post. If you get value from the sermon, you can find other of his sermons, here.
You may also benefit from select other posts related to targeting:

‘Seeing Through’ NWO ‘Illumination’

The Antichrist is coming, and there needs to be a throne ready for him to occupy. Thus the New World Order is stepping up its one-world government effort and increasing their visibility in the process… and translucence… which equates to luciferian Illuminati-like illumination… often in the form of giant glass pyramids.

by H. Michael Sweeney   Facebook  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.


What you will learn from this post:

  • the Illuminati, Freemasons, Knights Templar, & Round Table Groups are the NWO;
  • with the same fascination with ancient mysticism, occult, and numerology;
  • and the same desire to associate their works with symbolism such as the pyramid;
  • that they have been building pyramids seeking to employ mystical aspects similar to Cheops, the grandest of Egyptian pyramids;
  • said pyramids sharing commonalities in occult alignments and numerological peculiarities;
  • where one complex of pyramids is tied to a rather interesting conspiracy Egyptian in nature;
  • and another complex of pyramids appears to involve hi-tech mind control;
  • and is itself apparently aligned with all pyramids in Europe, and likely, elsewhere!


The Source of Illumination is darkness…

In several of my books touching upon aspects of the New World Order, I carefully point out the important role played by Freemasons and their involvement with the dark occult and, primarily, ancient Egyptian mysticism and numerology (specifically, where numbers can translate into meanings with magical powers of manifestation). I am not talking about the rank and file lodge members duped into thinking it merely a benevolent fraternal organization, but of the satanic High Masons and select Masonic operational organs which operate secretly, within. The satanic Illuminati, for instance, sprang out of and followed Masonic constructs and principles… and it was they who officially launched the New World Order movement in 1776, their goal to destroy all governments and religions, to replace with their own, providing a seat for the Antichrist. We can also thank them, and head Mason and avowed satanist, Albert Pike, for the KKK, and more.

It seems quite apparent to those who study the nature of Globalists who seek the N.W.O., that they are usually High Masons, satanists or otherwise steeped in the occult. They are often members of or work through the so-called Round Table Groups, such as the Council on Foreign Relations, the Trilateral Commission, the Bilderbergers, the Club of Rome… groups made up of power moguls who control corporations and whole industries, government agencies and military power, and media and education. These, collectively, can be called Globalists, because they seek a one-world government, which is needed in order to seat the Antichrist.

In their works, they frequently employ the same symbolism and engage in occult events right along side of others of their ilk (i.e., Bohemian Grove). While what they believe (occult) should seem silly to a rational person, I remind the reader that it does not matter what you believe to be true, or false… it only matters what they believe. If you fail to acknowledge their beliefs as part and parcel of their modus operandi, you will fail to recognize them and their works, and be unprepared for their plans as they unfold. And much has unfolded, in plain sight.

cheopsHere, I will focus on one small aspect of their existence which is quite central to their beliefs; one of their most sacred of visual icons, the Egyptian Pyramids. Pyramids, especially the largest, Cheops, are as important to the Masonic underpinnings of the NWO as is the Cross to Christians. More so, in fact, as it is far more than mere symbol, to them; it is a powerful tool, and their fascination with ancient Egyptian mythology is quite anchored in Cheops. One need only look at the pyramid found on the obverse of the Dollar Bill and its all-seeing eye, to find a stark example. Of late, for a variety of disparate but coincidental reasons, I have made more recent observations which relate to this notion… things which you can easily verify yourself by use of Google Earth.

Square one, the base lines of Cheops

Cheops is the largest of the Egyptian pyramids, having many astrological alignments and dimensional (numerological) mysteries, among them being it was said to have been located at the the center of all land mass; it’s axis therefore dividing the known Earth at the time into quarters; Cheops baselines were aligned due North/South/East/West. As the N.W.O. players gain in power and ability to establish a one-world government (needed if there is to be a single leader in the person of the Antichrist), they also become more blatantly visible as such a force, which means it more frequently relies upon ancient symbolism in its workings.

So, then, I wondered… might there be more than a few NWO pyramids being ‘hidden in plain sight’?

There are, of course, many pyramids around the World, especially the ancient stone variety. These come in two flavors; the Egyptian, the biggies with their seemingly smooth triangular shapes (as seen at a bit of distance), and the Mayan/Aztec stepped structures, a style not unknown in Egypt, and elsewhere for the matter. The Masons have only an interest in the former, it seems, but my curiosity was about much newer structures, those built with modern methods and materials. Would the many newer pyramids around the World exhibit traits similar to Cheops, such as alignments or dimensions of occult significance?

Absolutely. And why not? A glass pyramid is the perfect embodiment of both the ancient pyramid mythos and of Satan; sunlight reflecting from within and without by day, and electric light glowing from within by night — all work to render them both translucent and illuminated, with bright glaring highlights akin to the all-seeing eye, depending on one’s viewpoint and the angle of lighting/reflection. As a work of man, they are both awe inspiring and mysterious, working on the subconscious in unfathomable primal ways not sensed by the conscious mind without pause and consideration. Even so, one is apt to embrace and bask in their presence despite any darker connotations, for they are undeniably beautiful works of architectural ‘art.’

So let us pause and consider with conscious effort…

Square 2: a review of new pyramids around the World

There have been more than 50 new/modern pyramids quietly built around the World in the last several decades, most of them made of glass and metal, and strangely, more than half of them in North America. A couple are faux pyramids with incomplete architecture in and of their own, but one included a second pyramid on site, and the other had a completed pyramid at top, and so, were included in the study. The idea was to see if their base lines or diagonals aligned with other pyramids (ancient or modern), or if any three or more centers or corners might align. Examinations for numerological meanings were also to be considered, early on, but the growing number of pyramids made that effort too monumental. Still, some interesting discoveries along that line were made.

I found so many alignments (almost 150) and associated numerical translations in place that I felt it was appropriate to establish some sort of test group to illustrate the difference between conspiratorial intention and random coincidence. For example, at one point well into the project, EVERY new pyramid except one revealed between two and nine alignments with one-another, and/or with Cheops, itself. One had 18 alignments. So a simple control group was added: some 30 Mayan/Aztec variety, plus nearly 6 inverted modern pyramid structures were added to the study. If these, too, yielded such results, the study could easily be argued as being inconclusive.

But they did not.

Only one formed a single alignment with any other pyramid, new or ancient, and it featured no resulting numerological significance. Clearly, the massive alignments in the new pyramids were intended by the powers that be, those persons behind purchase of the location and setting design criteria as to angular placement, size, and location on the property… especially true when multiple pyramids at the same location (as is the case in ancient Egypt) were undertaken. Therefore, the test groups were excluded in findings, which proved validity of both the methodology and hypothesis. Since only the new pyramids (not inverted) formed alignments, it had to be by intention.

While about a third of the new sites are single pyramid locations, there are several with two or three (like the main pyramids at Cheops), 3 with five pyramids, and one with 8, across nearly 50 locations. I then wondered if perhaps other old, but not ancient pyramids or locations deemed ‘holy’ by the Illumnati might not also offer alignments. Adding a handful of small pyramid burial sites by Masonic persons of wealth and power, as well as the death site of Adam Weishaupt, founder of the Illuminati, and the ‘headquarters’ from which he operated his secret cabal proved that notion, as well. I was unable to discern his precise birth place beyond the name of the city (Gotha, which is ironic in its own right, because Weishaupt and the Illuminati were very goth).

At the point where I felt the matter was amply proven, I had by then added eight older sites, typically 100-200 years old, though one dates to 12 BC, in Rome. It is the Pyramid of Cestius, circa 12 BC, at a time when Rome was, like the Templars, enthralled with the mysticism of Egypt. It is a site well known to Templars and Masons. The others are all in Europe, save one in America, and two of them relate directly to the Illuminati; Adam Weishaupt’s grave, the ‘headquarters’ where he planned and executed Illuminati plans, and perhaps the definitive Knights Templar location — Templehof (Templar Temple House), all in Germany. As these last three are not known to have involved pyramids on site, they are only used in scoring other pyramids which align with them, and not evaluated on their own, even though they would score fairly high.

So the alignments created in total involved alignments between ancient, historically old, and modern pyramids. The symbolism and mysticism of such structures by their special alignments, regardless of if rendered in aged stone or in modern metal and glass — are clearly as important to their builders as the function and beauty of their designs. All were starkly beautiful, and quite functional, to be sure; a perfect way to subtly reinforce the notion of luciferian and Masonic imagery upon the subconscious minds of citizens otherwise mesmerized at what they were seeing… especially when illuminated to great advantage by sunlight or voltage.

The problem of useful presentation

But describing all these alignments textually makes for boring reading. I will give just two instances as example, next, as they are quite tied together. It will be the only review of numerological ties, though more like it, exist, and with notable frequency. Trying to present the topic graphically is also challenging for other reasons, but I will attempt that, as well, in a third review. I will then provide a very simplified summary of selected findings to illustrate the scale and nature of alignments found, with a scoring system to relate symbolic spookiness.

But first, a disclaimer is required, because I always challenge any Doubting Thomas’s to duplicate my research before they make any false presumptions as to validity of my findings, and because the research tool involved (Google Earth) has its own technical limitations with which carelessness can impact upon accuracy.

Disclaimer: regarding some figures and claims herein about alignments and measures, accuracy is sometimes more difficult to affirm via Google Earth. Google Earth allows an accuracy to within a meter or so at ground-level, but things can get more complex when one starts trying to plot and measure lines with accuracy to the far side of the globe, and/or where the locations may be nearer to the Poles than Equator, or on/near altitude changes. Satellite images used in Google Earth are sometimes taken at oblique angles on either or both the horizontal and vertical, such that visual distortions of a pyramid can make true angular alignment (in compass degrees) or even measuring its base length, difficult to accurately determine. When dealing with such angular imagery, the center of the pyramid will be other than visually depicted, requiring one to make cross lines corner-to-corner to find the true center. The quality of image can also vary, but generally, line placement accuracy can be determined within 1-3 feet (roughly the line’s width). The images for two sites were so bad that it was impossible to determine if base line/diagonal alignments existed, but at least their location was known with GPS accuracy for the purpose of central alignments.

Additionally, one must take care insure the Pyramid(s) in question are centered in the view, and to reset the ’tilt’ (View > Reset > Tilt) after zooming in, or additional angular errors can be introduced, as the lines one lays for determinations themselves ‘float’ above the ground. In fact, where the pyramid is quite large, one may find the line ‘crawls up the face,’ providing additional distortion which must be defeated. The degree of inaccuracy in any given instance should not unnecessarily render the information herein as invalid; the thrust and intent behind the location and positioning of glass pyramids is clearly not casually undertaken. Also FYI, distances between pyramids herein are rounded figures, if there is no mystical number involved.

Verbal presentation example

841142-500x334Paris features two glass pyramids at the Louvre Museum, one large, one small and inverted, which form alignments to four other sites (the only inverted structure to do so, likely because it additionally features a normal pyramid, as well). There are three much smaller ones, as well, serving as skylights, which I chose to ignore, early on, and then forgot about, later; they would likely have established other alignments, as similar skylights on streets elsewhere, had done.

Two of the alignments at the Louvre are baselines from the larger pyramid to the same pyramid site in Texas, where they also align with the baseline of one, and the diagonal of another of three found there, essentially parallel. Three more alignments exist to three other sites involving three corner/center combinations, one of which is Cheops some 3232 km distant. Masonry’s highest publicly acknowledged ranks are the 32nd and 33rd degrees. The number 3232 is a ‘magic number’ in Satanic numerology, because it is a doublet, which doubles its ‘power’ (amplifies its importance), and because it sums to 55 (another doublet), one divisible by 11 (a doublet which makes 33 three times as powerful), and further sums to make 10. Again, it matters not what you believe about numerology, but what they believe…

And, this is what they believe about these numbers:

In the occult, 5 is the number of the planet. According to one-time head of early freemasonry, and avowed satanist, Alistair Crowley, 11 is “the number of Magick, itself,” and of sin, or evil corruption. 10, on the other hand, is the number of ‘heaven and earth in interaction’ (‘good vs. evil‘), and the symbol of it in the Greek (‘deca’) is the triangle, of which a pyramid employs 4, which means ‘strength and integrity,’ which is certainly a trait of the Pyramid. For the matter, the number 32 relates to ‘inspiring of truth and living by it,’ which is to say… the very promise and implied hope of illumination.  Unfortunately, illumination means something rather different to those with a darker agenda, something closer to that which the serpent spoke of in the Garden of Eden. These are not the only meanings found in general numerology, but the ones preferred by dark occultists.

Extending the base lines of each of the Louvre pyramids westward 3500 m will take you, again in parallel manner, to the center unit of one, and a corner of the other of two glass pyramids built in Westborough, MA, by globalist pharma firm, Astra Zeneca (astra in the occult relates to supernatural weapons). Another line can be drawn from the lower corner of the larger pyramid at Louvre, through the center of the smaller one, there, to pass through the diagonal of the center pyramid of three atop a very Masonic looking Federal Government office building in Ottawa, Canada.

The smaller pyramid in Paris is 2 m shy of being 1/10th the base line dimension of Cheops, while the larger one is two meters more than 1/6th of Cheops. The larger Astra is 1/6th greater than the larger of Paris, and the smaller 1/2 the size of the smaller in Paris. The Ottawa pyramids are 1/4th the size of the largest at the Louvre, and 1/25th of Cheops, and 2 m shy of being 1/2 the smaller Astra. I would love to analyze the actual dimensions of all these, if they were readily available.

In Chile, the resort complex at San Alfonso Del Mar features a giant glass pyramid on the beach with four alignments. It is aligned such that its base line will bisect with the center of one of the lesser stepped Egyptian pyramids. Two more alignments are to diagonals of a pyramid in London, and one in China, 20 km from Hong Kong. A third aligns with the corners of two pyramids in Islamic Astana, Kazakhstan which, though richly expressing Islam in the property’s design, is also rich with Egyptian symbology.

The Chilean Pyramid base is also one/sixth the size of Cheop’s (38.3333 m, a number which is found many times in the fuller study in either location, size, or compass readings of various pyramids). It is located on the 38th Southern Parallel and the 32.32 Meridian. 38 sums to 11 (Magick) but itself can mean ‘Lucifer, the will of the Devil.’ 1/6th = 18%, where 18 = 9+9 (99 doublet) and 3 x 6 (666 triplet — even more powerful than a doublet, and Satan’s name). 18 itself means ‘Oppression, bondage, slavery,’ and = 3 (a ‘perfect number’ meaning fullness) x 6 (the soul of man) = 666 (legend/man/illumination).

A graphical review

Enough textual description; it is too boring and difficult to make sense of. Let’s try graphical, looking at hotel resort complex at Galveston, Texas, which also consisted of three Pyramids. This is one of several with 8 or more alignments, and perhaps the most interesting in terms of just what they align with, and how.

It may help to review what qualifies as ‘aligning,’ so you know what you understand why the lines look the way they do. The alignment must involve at least three points of contact between two distant pyramids, based on corners and centers. A baseline is two points, a diagonal or perpendicular from a baseline through the center being three points, but the distant pyramid must still have at least one such point of alignment, as well. If only one, it must be its center, but aligning with two corners on two different pyramids, there, is another way to align.

There are examples in my study were a baseline, perpendicular, or diagonal aligns with yet another baseline, perpendicular, or diagonal (four to six critical points total); a much harder thing to achieve. In like manner, some can be extended to align with yet other points of other pyramids at a third location; an even more dramatic alignment. I have found as many as five pyramids in three locations involved in a single alignment across the globe… with 14 points of alignment in all. These harder kinds of alignments should be next to impossible by random occurrence. Yet every single pyramid exhibits them.

And we have two such virtual impossibilities illustrated in our visual review at Moody Gardens, in Galveston, TX. Two of them actually involve Cheops, as earlier reference in the textual description, the ultimate of all possible alignments from the Masonic viewpoint. In fact, I find it the second-most interesting of all modern sites, in terms of alignments (the first, at Sauerland, Germany, is impossible to show in this manner as it enjoys 23 alignments. UPDATE: 43 in a row, and I finally stopped bothering!


Galveston Moody Gardens Hotel complex; three pyramids, one pink, one blue, one glass (gray), forming 8 alignments to six pyramids, including two with Cheops!

Clockwise from Noon in the image, we see an align to the Nekoma Air Force Station, an experimental anti-missile defense system long abandoned. What is interesting is that one of it’s seven alignments goes to the only pyramid in South Korea — quite dependent upon U.S. anti-missile technology. That’s interesting, because there is another pyramid in N. Korea, and one of its several aligns goes to the Las Vegas Casino pyramid, which in turn aligns back to the Nekoma site. It is as if both N. and S. Korea are ‘borrowing’ from American military power, after a fashion, to create or reflect a ‘stalemate.’

Next we have two aligns effectively ‘parallel’ to the ‘holiest’ of Masonic pyramids in Egypt, involving a total of nine critical points with three pyramids. There is then an align to the Rock and Roll Hall of fame in Cleveland, OH, where it passes through the center of both pyramids, there (one small, complete pyramid, and one very large incomplete, or faux pyramid. There, the base of the larger less the base of the smaller, is equal to 1/3rd the base of Cheops.

We find an align to a now defunct pyramid on Miamii’s beach. Fairly ordinary as alignments go, it was built as a promotional venue for the international beer company, Heineken. Despite being temporary, it was placed to form at least three alignments on its own. Then, in like manner to the two aligns to Cheops, we have two more going to the two pictured Biosphere pyramids, which, like the two Rock and Roll pyramids bisected with the same line from Moody Gardens, have both of their pyramids bisected with an align from Nekoma (coming full circle, if you will, to form a triangle). In fact, Nekoma is itself involved in a total of 6 such three-way triangles. One of those involves the Miramar retail store, our final align from Moody Gardens, for two such triangles sharing Moody and Nekoma locations. Miramar is the other incomplete faux pyramid, in that only two opposing sides are triangular walls. Miramar, in turn, with two pyramids, forms 6 aligns, including one to the very Masonic Capital grounds of Australia, at Canberra.

So far, we’ve only closely looked at two out of about 50 locations. You can see how hard it is to use either text and/or graphics to reveal it usefully. So let’s now try a different way, and employ a chart with a scoring system designed to rate the comparative ‘spookiness’ factor of a given ancient or historically old site’s alignments with new pyramids or other holy illuminati locations, including each other. To further reduce the clutter, it will then only look at sites which directly connect to them, in even briefer review, sans scoring. The scoring system replaces trying to compute and display the actual odds of the alignment, which would be as high as 10 figures:1, in many cases.

For example, the odds of just a single alignment of the simplest kind, center to baseline, diagonal, or perpendicular or to two corners of two pyramids at destination (earning the lowest possible score of 1 in my scoring scheme) would have actual odds of 202,500:1 against. That is based on the notion of worst case accuracy of 1/10th of a degree of arc… meaning that each pyramid would have 10 x 360 degrees of potentially useful compass positioning, divided by 8, as there are 4 lines the pyramid which establish a total of 8 possible compass vectors. You need to multiply each pyramid by each of the others involved if aligning to another baseline, diagonal, or perpendicular. A baseline to baseline alignment odds would be 164,025,000,000:1 by such reasoning. Such odds are multiplied further by additional alignments at the site. Argh!

Technically, that’s too simple, because angular placement is not the only factor. Size and relative positioning plays a role, too, when two corners/centers of two different pyramids at the same site are involved, but I’m not going there without a super computer!

Now, if you want to argue that the actual accuracy we should using is tighter than that, implying room for error in ‘finding aligns,’ consider for a moment that only one alignment with the Mayan/Aztec pyramids was possible using the same accuracy as I employed. That makes a pretty good case that the alignments were intended regardless of whatever actual accuracy was employed. Even if you allowed for my own human error, there are so many alignments that they could not all have been for my error, given the Mayan/Aztec set enjoyed no similar quantity of errors. But by all means, feel free to correct my math/assumptions if you are of bookmaker caliber in computing odds, but I’m pretty sure I’ve got it right, based on some experience in statistical data analysis; I once ran my own marketing research firm which ran probability studies. No matter: we will use scoring, instead…

Scoring is as follows:

  • center point to corners of two pyramids or a base/diagonal/perpendicular of 1 pyramid (simple alignment) = 1 point for the alignment;
  • base/diagonal/perpendicular to same (complex alignment) = 5 points for the alignment;
  • Bonus 5 points for any parallel alignments or alignments to multiple pyramids of one site to multiple pyramids of another site (parallel/pair alignment);
  • any extended link to an additional pyramid (extended alignment) = alignment score x 5;
  • link to Cheops (Cheops alignment) = x 5;
  • link to other Egyptian pyramids or Illuminati sites (Illuminati alignment) = x 3;
  • link to other historically old sites (Masonic alignment) = x 2;
  • 1 point for each alignment and for each pyramid at site;
  • magic numbers, angles, dimensions, etc., not part of scoring;
  • Cheops gets a bonus of 33 points, Illuminati sites 11 points, Masonic 7 points
  • maximum score limited to 99

Great Pyramid of Giza, Egypt

Egyptian Pyramids 13 aligns w 6 pyramids on site (Δ) = 99 points: 29°58’44.54″ 31°8’3.65″
Complex Parallel to Sauerland (5+5 points), 3 Simple Parallel to Dubai (6×3), 3 to Sauerland (6×3), 2 Simple Parallels to Galveston (6×2), Complex to Niagara Falls (5), Simple to Louvre (1), to Eatonton GA (1), to San Alfonso del Mar Chile (1) 85 total +33 > 99.

a580cb07b1ac956d82946b7d61620f36Cestius pyramid in Rome 5 aligns w 1 Δ = 99 points: 41°52’34.97″ 12°28’51.16″
Complex Extended (three times — 4 Δ at 3 sites, in all!) to Manitoba Capitol and on to Miramar Retail (5x5x5x5), Simple Masonic to Karlsruhe Mausoleum (1×2), Simple to Pheonix Jeju S. Korea (1×2 – Phoenix is Masonic/Egyptian), to Sauerland (1), to Portsmouth UK (1) > 99 points

de1cc2b8de1458f8253ea7ad9335618eStar pyramid mausoleum Scotland 3 aligns w 1 Δ = 34 points:  56° 7’19.42″  3°56’43.72″
Simple Illuminati Extended to Weishaupt’s grave, to Gold House IL in opposite direction (1x5x5), Simple to Cooperative Bank UK (1) 27 points + 7 Masonic site = 34

karlsrhueKarlsruhe pyramid mausoleum 7 aligns w 1 Δ = 27 points: 49° 0’33.22″ 8°24’14.05″
Simple Illuminati to Illuminati HQ (1×5), Simple Masonic to Cestius (1×2), to Kazakh RU (1×2 — rich with masonic/egyptian architecture), Simple to Dubai (1), to Edmonton Capitol (1), to Cal State U. (1) 20 points + 7 Masonic site = 27

th-11Bickling mausoleum UK 2 alignments w 1 Δ = 13 points:  52°49’9.01″  1°12’48.36″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13

Graceland-Landscape-Schoenhofen-MonumentSchoenhofen Mausoleum Graceland Chicago 2 alignments w 1 Δ = 13 points: 41°57’33.56″ 87°39’34.09″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13


What follows is a simpler summary of the first few of the destination sites mentioned sites as evaluated from their position…

Sauerland 23 aligns, 8 Δ, Dubai 13 aligns, 5 Δ; Moody at Galveston, 8 aligns, 3 Δ; Niagra Falls 2 aligns, 1 Δ; Louvre 7 aligns, 2 Δ; Etonton GA 2 aligns, 1 Δ; San Alfonzo del Mar 4 aligns, 1 Δ; Manitoba Capitol 9 aligns, 9 Δ treated as a single Δ as they all directly touched one another 3×3, and were each relatively small; Miramar Retail 7 aligns, 2 Δ; Pheonix Jeju S. Korea 6 aligns, 1 Δ (note: N. Korea has a Δ, too).

These are all quite typical of all sites evaluated, globally. The only site which scored 1 (1 align) was a site which has had its 2 pyramids removed/destroyed, disallowing angular alignment determinations, though the center of one of the pyramids was known, allowing an align by that method.

CONSPIRACY ALERT: That site, by the way, is tied to a little known conspiracy surrounding the Nuwabian Nation, an all-egyptian-like community of almost exclusively black people which was seized and razed to the ground by the U.S. and Georgia State and County governments. They were allegedly targeted for being a cult, subversive group, criminal organization, nest of child abusers, or a swindle… depending on who you ask. Seems like everyone had a pet excuse, including YouTube who seems to regularly censor vids on topic for their usual list of fabrications. Note the resemblance in some of the ceremonial dress to masonic lodges such as the Shriners (Nuwabians, like the lodge system, also use the terms, Orders, and Lodges). All Egyptian is wrong, too; they also were adoptively and by blood associated with Native Americans of the Yamassee Federation of Tribes, among them the Seminole.


I count at least 8 pyramids on site before destruction. The black pyramid , as primary ceremonial structure, was the only one I was able to locate, but not know its alignment with any certainty. These people were very serious and deeply involved in their culture building and adherence, despite the amusement park-like construct of their community.

Note on mausoleums: What we see in our review is that the three mausoleums share unique ‘coincidences’ in that each aligns with an Illuminati historic site honoring Weishaupt, and each in turn is honored for having done so by Sauerland aligning with them. There are many such pyramid mausoleums in Europe, America, and a few scattered elsewhere, far too many, in fact, to encourage me to dig further. Regardless, as the very first and only three reviewed all shared these two features, I’ve no doubt that others do, as well. A single Mason could easily undertake a single such alignment to a point of their own choosing, and more modern pyramid builders could easily accommodate at least one or more such mausoleums in their own alignment considerations. This brings us too…

Sauerland, enigma equal to Cheops


Sauerland is one of the newest of all sites, a complex of 8 pyramids which appears it may even involve mind control research. It certainly defies normal property development, architectural design, and building contractor norms in several ways. First, its location is on a hill overlooking an industrial park, and despite looking like a luxury retreat, is in fact the corporate campus of biomed tech company, Rayonex Schwingungstechnik (Rayonex Vibration Technology). It started with three pyramids, and has since grown to eight.

Second, the site has an adjacent and extremely unique high observation tower (about 110′ high) which overlooks the pyramids and the valley, just high enough that morning sun could shine through the large holes in the upper level and onto the pyramids, creating unique shadows. This was a trick employed in ancient Egypt using Washington Monument style oblelisks, such that at a certain time, a shadow might point to a secret place within the greater site (as seen in Indiana Jones and the Lost Ark. The tower’s corner shadow does fall over the pyramid property. But, let’s just call that a pipe dream.

You do have a pipe of some sort, don’t you… and a whip and hat?

Third, each building is offset irregularly and apart from each the other with no obvious pattern or reason, and likewise, quite contrary to normal designs, angled one from the other up to 3 degrees or so in compass alignment. It is my belief that this is what enables it to accommodate so many alignments, a thing which would require planing with a fairly complex computer program, to determine. Finally, again unlike most complexes, even where ‘luxury’ is intended, no two buildings are built or designed the same; each has an entirely different layout and appearance, though some features at least look similar. Usually, a cookie cutter approach to keep costs down would be employed. Yes, even in corporate campus design.

Then there is the very small pyramid surrounded by a water feature. I found construction photos that show a drill being used on a hole there, approximately 1 meter wide, with smooth walls. It was associated with an article on geothermal drilling which led to a very interesting YouTube promotional video that is really worth the watch; it will intrigue and educate you. After watching, though, ask yourself if the expense this likely represents would normally be deemed appropriate for a small fish pond? The video seems to address that with a blanket statement, but does it, really?

I learned also, that the small pyramid over that hole is the only one on the property using metal walls. The other, larger pyramids use some kind of unusual looking material which requires special application, according to other construction images I found. The panels used on them might logically be radiographic in nature, designed to limit or enhance radio waves of select frequencies, given the nature of the company’s work, as you shall see. In like manner, I can imagine the holes drilled by that machine could be used to install an array of underground EMF sensors or emitters. The video implies the array of radially and laterally drilled holes provides a series of ‘pipes’ which may in fact be perpendicular to one or more of the pyramids. Just why these possibilities are raised, is covered below.

Also unusual, is that one of the original three pyramids (perhaps more, now) is strictly for therapy use, with ten therapy stations. In each pyramid, a security computer controls all lights, window blinds, and door locks, and though there is no manual switch anywhere within for any of these, each workstation is said to have its own localized control over these features. But the security system computer can override, which makes it a rather creepy place with respect to potential for political control and overbearing security solutions against occupants, Big Brother style… especially if you don’t have authorized access to a workstation. Undoubtedly, there are plenty of security cameras, and I find it disconcerting that some pyramids have no windows, whatsoever — normally a code violation, unless a warehouse or factory. One must ask why so much expense and devotion to therapy and externalized security control over environment would be required? Let’s take a peek, and see.

The answer raises more questions. This is a unique kind of high tech firm. Their product/services would seem to involve mind enhancement, mind bending, or even mind control, but certainly relate to biophysics and therapy of some kind. One or more of those possibilities is very likely; the firm does research in electronic frequencies upon the human body (bioresonance), among other things. According to Wikipedia, bioresonance is all based on pseudoscience, which is a polite term for ‘made up BS by con artists’. Dunno about that, because…

This is also the sort of stuff useful in DEW Weapons for behavioral control (Political Control Technology). Of course, such tech is always researched and funded based on some good it might accomplish, including the combating of electrohypersensitivity, which many TIs suffer from because of their constant DEW targeting, or some preexisting natural sensitivity. I have it, myself. But once a patent is filed and governments or dark-minded NGOs get wind…

museumNow, about that tower… What if it was for security guards overseeing grounds security should an alarm goes off of some sort. The tower does have its own large building which might be suitable to house a security force. Hold that thought in mind while reading the next paragraphs. Turns out it is not just an observation tower, and not just any building. And, while guards might be rather far fetched a notion, there is more to consider.

The pyramid shape is also known as a Frustum by Masons; a shape used by the military in times of old in a manner not unlike a Tank Trap. Like a tank trap, as a shape, it cannot be easily overcome when several are placed together, there being no level foothold between them (a steep V shape), and its sharp corners, especially at the top, inhibiting climbing. More importantly, because its sides are sloped, one cannot hide behind a frustum, if the enemy holds high ground… such as a castle wall… or a high observation tower. Just exploring possibilities, here… but far-fetched or no, it fits the spookiness factor of the place.

But as stated, that’s not all. The platform is merely the top level of what is actually a mine shaft elevator lift. The building is currently a mining museum with access to a huge abandoned mine; they actually take you down into it with hard hat and light, etc. So, like Cheops, there are underground passages beneath the Sauerland pyramids. It is, of course, possible that some of those passages might be remodeled into something else entirely different, like many old mines are, today. It is even possible there are ways to access them from within one or more of the pyramids. Now wouldn’t that be a mystery to discover and explore, whip at the ready? However, all this causes me to hope no one would go drilling a bunch of radial holes over an abandoned mine… if they didn’t know exactly where the mine’s cavities were…

Now, last mystery. Look carefully at the top of the platform at the left corner nearest. No. That’s not a machine gun, though it can potentially be used to ‘shoot.’ It’s appears to be Yagi antenna, normally used to transmit or receive microwave signals in an amplified manner, along a narrowly aimed path. But wait! Where does it aim? At the top of that tower, as high as it is, the thing is aimed squarely at a hillside nearly four times as high as the platform. Useless, as seen. But wait! Just beneath the top rail is a what looks like a motor; the shaft can rotate. At the top is what appears to be a motor at an appropriate angle to change vertical angle. The white object appears to be a housing of a control system operated remotely. I used to sell such systems for video security setups based on microwave relay. Pretty sure of what I’m seeing. And, there is a second pole identical to the first which could be similarly fitted, and which may have been since the photo was taken.

Why would you want that? Well, you might want to tune in distant TV stations, except they don’t broadcast in microwave. You could use it to grab someone’s cell phone signal, if you knew exactly where their phone was, to aim it. There are yagi antennas that can be used for those things, but they would look different. But what if you owned a bioresonance laboratory with some human guinea pigs? What if you could place them in rooms within a pyramid, where the slope of the pyramid was roughly perpendicular to a high mounted, aimable microwave transmitter, such that every subject got exactly the same dose of signal at the same time, or such that you could specifically target a given subject with a unique signal? It would probably look a lot like Sauerland. You think?

I only mention this, because older pictures, before the pyramids were built on site, don’t show such a ‘gun.’

Is it a conspiracy?

If one concludes that it is impossible that by mere chance alone, every modern and non Mayan/Astec-style pyramid should align with other pyramids, including Egyptian… then it has to be by intelligent design by agreed-to planning by a group of many persons with like agenda. That it is done covertly and involves mystical occult reliance… removes it from the realm of benevolent methodology or intent. That these pyramids can be found in countries of opposing political, religious, and ideological beliefs… precisely fits the Illuminati model and game plan established by its founder, and reflected in Morals and Dogma, the ‘Masonic Bible’ written by Albert Pike. That the only persons financially and powerfully placed are able to arrange for such things tend to also be members of Round Table Groups and are often also Freemasons… would seem to cement all these considerations into a single image: that of a conspiracy. That there is the possibility that it even involves mind control is, to say the least, the ultimate and most heinous form of conspiracy.

Every man is entitled therefore, to give any explanation of the symbols and a system of the doctrine that he can render palatable…  Of all the means I know to lead men, the most effectual is a concealed mystery.” Adam Weishaupt




A Private Statistical Review of Targeting Data

TI’s have many commonalities in the nature of their experience… but what if it was the TI’s nature prior to targeting which led to them being selected for targeting? This anonymous poll seeks to identify any patterns which might prove revealing.

by H. Michael Sweeney   Facebook  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

The common state and nature of TIs prior to targeting?

This post seeks to help identify how TIs are selected for targeting, and why. I write as one who has had personal contact with over 12,000 TIs over roughly 25 years, which has come to some understanding of the answer. But I also write in hopes it can help better my own general understanding, and more importantly, to help individual TIs better understand the true nature of their own targeting. Such information may even prove useful in TI defense, both tactically, and legally. For example, almost all authorities who should be available as helpers to a given TI end up instead presuming them schizophrenic and attempting to persecute them with forced treatment or other forms of harassment — to say nothing of possible in place assets being used in direct targeting.

Such knee-jerk presumptions may prove easier to defeat if we can show the presumed ‘schizophrenia’ is far greater statistically than should be medically possible, it being true that the illness strikes people randomly across the entire spectrum of human existence. If a given class of people with a common personal social circumstance (state and nature) are deemed dramatically more susceptible to the traits of schizophrenia, a logical person should be moved to begin to understand… there are technologies and methods which can cause simulation of those symptoms; mental illness is not the cause, after all.

We must start this dialog  by addressing two points: things already known to be common to all TIs prior to targeting, and the tactical reason or purpose behind the targeting, things which collectively tend to relate concretely to categories of TI abuse. As to the precise methods of targeting and types of technology employed, those vary according to the individual TI, their psychological profile, and many, many circumstantial factors which dictate the most likely path to targeting success. That does not impact this dialog, but all these things are tied together into a cruelly efficient tangled web of mental torture and, all too often, physical pain.

We must attempt to separate ourselves from any personal angst and calmly review the matter objectively, if to gain useful insight. First, I’ll talk about two basic traits which are common to all TIs irrespective of their individual situation or targeting purpose:

Known commonalities and reasons


Image: fair use manipulation of photos by Rosie Hardy (Flickr)

Prior to targeting, all rank and file TI’s, are either already financially insecure or in a situation where dirty tricks can render them so fairly quickly; it is important that the target be unable to launch a useful and costly technological defense or employ professionals who can do so for them. There can be exceptions in ‘blood line’ families or offspring which employ MK/Monarch type programming to create a dynasty of (actors, political leaders, financial giants, etc.).

The wealthy ones are unable to effectively defend because of their programming, which results in various forms of self-sabotage of the effort, which may in fact include financial destruction. Their programming and resulting sabotage effects the same handicap as not being wealthy. It is this author’s belief that Dennis Quaid, the end of the Hunts, DuPonts, and Hurst family/fortunes evidence this fact. I go into some detail on this (and all aspects of targeting, including defense) in my how-to book, MC Realities.

On the other hand, programmables who are were not wealthy, but simply part of the effort to create Jason Bourneish operatives for the intelligence community or in furtherance of MC research, can also end up being targeted if deemed ‘failures’… which are victims who could not be usefully programmed and deployed. They cost too much in time, effort, and money to simply dispose of them, and because research might find a way to ‘fix them’ at a future point, it is necessary to target them to make them seem insane. That way, should the nature of their being ‘broken’ lead to revealing their true history (programming), they will be ignored as being nuts. They can be corralled at any time for further MK efforts, if needed.

Another commonality to the bulk of TIs is some form of social isolation. That may mean they have a small circle of friends and family, or perhaps there is some existing strife underlying key relationships (i.e., significant others, relatives), especially if living with or in close proximity to them. Targeting almost always includes some destruction or sabotage of personal relationships for the same reasons as financial harms. It wouldn’t do for everyone who they know to both believe and to aid the TI against the perps.

No. One by one, all such allies tend to be alienated by one means or another. The inverse is true of the MK/Monarch. There, not one of their friends or family are not part of the perp circle; everyone in their life has been carefully placed there to guide them (misguide) to a desired state. Even their employment and choices of schooling, living space, etc., is predetermined such that they at least think it was their own decision, but their entire life is little more than traversing a spider’s web and being wrapped in its unescapable cocoon.


The purpose of targeting

Now to purpose. It is fairly straightforward. I usually only cite three basic types, but here, I’ll attempt to outline a broader spectrum and to show the subtle differences in targeting aspects and the nature of the TI prior to targeting, things over and above the aforementioned commonalities to all. I should mention that the general purpose of targeting remains constant regardless of type; to render the victim a social, political, and financial zero. The reasons for those needs and resulting emphasis can vary according to the type, however, as is seen:

  1. Guinea Pigs — selected for experimenting with new targeting technology/methods. An ideal candidate would be rather socially disadvantaged, an isolated loner, and it would be advantageous for them to have already had some documented mental health issues resulting in some form of professional care, with or without prescriptions. This more readily allows them to be presumed insane should something go wrong in the experimentation; they will be disbelieved when describing the matter, regardless of any carelessly revealed evidence;
  2. Training fodder — selected to insure the growing army of MC practitioners can be effective with minimal supervision. While it should be said that many perps are themselves MK/Monarch programmables, that is certainly not the only profile. Psychopath and sociopathic personalities are a favorite recruit, and it is important to insure such mental defectives do not run amok, and can exercise restraint. Because mistakes or over-zealous application is a significant risk in the training process, the same victim traits as Guinea Pigs are found common.
  3. Social engineering — efforts against select targets who are either deemed politically incorrect activists, whistleblowers, ‘troublemakers,’ or who are Christians. MC is deeply rooted in satanic principles and can be traced back to the Garden of Eden (in my book). One goal (thankfully seldom realized) against Christians is to get them to destroy their own faith. Rare is it that we find members of any other faith, lest it be Jewish or Muslim, all three being worshipers of the same God of Abraham. Even less common, do we find atheists, unless they be targeted for reasons other than social engineering. As for the troublemakers, the goal is again simply to make them seem insane, and quickly rendered a political zero.
  4. Social engineering — undertaken against society itself, by selecting failed programmables or mentally troubled persons who can be manipulated into acting out in some useful form, such as committing mass shooting gun violence, or other crimes designed to shake confidence in the very nature of our society’s political underpinnings, such as the 2nd Amendment in the cited example. There, are no other requirements for the victim. It is why, there are so many commonalities in these tragic news stories, such as having been in psychiatric care with psychotropics prescribed, but suddenly halted… almost a guaranteed trigger to violence, when combined with MC control.
  5. Joy riding — elected against targets selected only because the perp has decided he didn’t like the victim for some reason, or because of convenience (i.e., next door neighbor). This is undertaken by the errant and out of control perp on their own time, using what they have learned and equipment they have built on their own or stolen. More could be said about them, but does not serve this dialog. As to the victims, they can be anyone, though the joy riding perp will be careful not to violate any of the principles of selection herein described unless truly doing it for spite. If the perp is caught by superiors, the value of continuing the victim in targeting is likely analyzed as well as the value of the perp to the program. This will determine the future of both. The perp may suffer any form of punishment, retraining, or redeployment, and the victim may be released from targeting, or put into the hands of other teams, usually resulting in a marked change in targeting tactics.
  6. National Security — is here mentioned as a type, but except for extremely important whistleblower situations or programmables who fully escape control, it is unheard of among TIs. The traditional target in this category would be a true threat to national security as deemed by the intelligence community or those able to give them orders. We see an example of that in the news, today, where 16 U.S. Embassy members in Cuba have been hit with various DEW and psychological methodology by the Cuban government, likely using very old Soviet tech, or perhaps, their own internally developed systems. WE CAN NOW CITE THIS NEWS AS PROOF THAT MC TARGETING IS REAL; how can media and authorities cite it has happened to our diplomates, but deny it is happening to our citizens ‘because there is no such thing?’

Finding unknown commonalities, and verifying old

Our method here, is simple. A private and anonymous poll. It cannot track your identity, and uses SSL interaction common to things like bank transactions. I must ask that only TIs participate. Politically uninformed sycophants should please refrain from acting like a child; you might learn something by looking at the truth once in a while. We must also bear in mind we are talking about legitimate TI’s, only. Those who are simply mentally ill, the perp pretenders, and the social misfit pretenders seeking sympathy, may or may not, share some of these traits, and are excluded from the dialog, though we must presume many of them may non-the-less participate in the survey and skew the data to some degree.

With that in mind, I offer a series of questions. Consider them and the choices provided carefully before answering, please, and come back later to see results and, in time, an analytical update to this post to attempt making good sense of results. This will follow each poll in the set. I remind you, all answers are based on what things were like in the year prior to targeting first being noticed. There are sixteen different poll issues, so it will take a bit more than a half hour to complete, but should prove very interesting and worth the effort. If pressed for time, come back later.


How a TI’s Belief Structure Can Fail Them Dangerously

When TIs find their defensive or offensive tactics failing, it is likely because one or more key aspects believed true of their targeting is a falsehood deliberately created for them: the enemy knows you cannot win a war defending against tactics not in play, if it blinds you to those which are.

by H. Michael Sweeney   Facebook  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

What you will learn reading this post:

  • part of targeting includes misleading the TI into false beliefs about their targeting;
  • what constitutes authoritative proofs capable of revealing the truth vs. beliefs;
  • examples of common falsehoods held as true, including scams

The problem

In some 25 years, now, I’ve had contact with more than 12,000 targeted individuals according to my email list. Out of that number, I can count on one hand the number of them who had a correct understanding as to who their enemy was and what tactics were being used against them, and how to combat them successfully. So convinced are most TIs about such misbeliefs, that they often refuse to take advice that would work to better their stance, and instead continue to try things already proven ineffective. Worse, they might simply give up trying, at all.

a6c9413ecef98eb8a5f0859f13e352aa--advertising-flyers-mission-impossible.jpgTargeting is a psychological war, and one largely invented by and often waged by the intelligence community, who live and breath in a World where nothing is what it seems. If there is one thing they know how to do well, it is how to convince their victims that something untrue is true, and something true, is false. Their chief weapon is disinformation, and its ally among the foolish, misinformation. Disinformation offered and accepted as true, is spread rumor like as misinformation by those accepting it. This was, by the way, the heart and method portrayed in the popular TV series, Mission Impossible; a spy agency who typically got what they wanted by getting the enemy to believe in an unreal set of ‘facts.’

Their other primary weapon against TIs is the psychological profile, which tells the enemy exactly how their target will respond to a given circumstance, enabling them to create situations designed to cause a certain conclusive response which builds the false narrative. When things like street theater, surveillance technology, and other targeting methods are combined with the goal to mislead in kind, the victim has almost no chance to come away with anything resembling reality. The other victory this hands the perps, is that it makes it much easier to insure that the victim will be seen as mentally imbalanced by anyone observing or brought into the affair when seeking help. Knowing the enemy’s psyche was also part of Mission Impossible, the show always starting with a summarized dossier on the mission’s target and their weaknesses.

Among the most common falsehoods most TIs presume to be true, but which cannot be true, we find a laundry list of topics sold on the basis of technobable, false credentials of ‘authoritative sources,’ circular references, and a deluge of mantra-like disinfo/misinfo. Some effort will be made, here, to summarize, but first, we need understand what a true authoritative source is, and is not. Should any doubt my summarizations are valid, they must first find an authoritative source to prove me wrong, or they simply continue in the lie with no basis.


Authoritative information sources

One cannot well prove a case for targeting technology beliefs based on material provided by a targeted individual or mind control Web site, and certainly, not based on a YouTube or someone’s blog or post. At best, such is hearsay, opinion, or personal belief or suspicion. At worst, it is a complete fabrication, or based upon one. Don’t forget that some TIs are pretenders, some even perps, such that no personal claims can ever be deemed as proofs in and of themselves. The sad truth is, I’ve yet to see more than a handful of ‘proofs’ offered by TIs as to their particulars which would serve them in a court of law. Mind control sites seldom provide actual reference proofs, commonly citing other mind control sites or proofs shown herein as illegitimate. Circular references abound.

No. A credible proof must come from some outside resource which has no reason to be biased and itself be unaffected by targeting or disinformation/misinformation, and which can be backed up with citations as to the source of their information. I’m talking about things like patents, scientific papers, government records, news accounts, and good books by solid researchers of accredited note with usefully referenced footnotes, that their statements can be verified as factual. ONLY those things can be seen as authoritative and, therefore, holding a viable resemblance of truth and reality.

A warning about patents, however: patents can be filed based on imaginary or unworkable technology without proof of concept testing, and get by the patent office. I have some background in patent writing and patent requirements, and have seen such patents on file. Unless a patent relating to Political Control Technology applications is tendered by a major corporation, it would be wise to consider it carefully before making assumptions. The unworkable patents I’ve seen were by individual citizens, only.

Even so, one must be careful. Anyone can write a book or put up a Web site, make a video. In fact, a good deal of disinfo/misinfo comes from books. The best example would be books claiming to expose secrets of mind control by ex intelligence officers. No! No! No! No intelligence officer could safely write such a book without violating a Secrecy Oath or law such as the Official Secrets Act (U.K.) in a way that would get them and their books vanished. So I would never quote or trust a Barry Trower or Robert Duncan.

I do trust and have quoted from works of ex CIA agents, but only because their work was approved by Central Intelligence Agency as NOT violating any oath… because nothing they had written of had not already been reported in media or in the Congressional Record, or other public domain literature. The books were not exposing anything new, but merely confirming it in useful manner. In other words, they were not the true originating source, the opposite of a Trower or Duncan. I also know of one CIA agent who wrote and published an unapproved book, and he was hunted down to the point of exiling himself in Cuba. So how is it that Trower and Duncan are exempt?

So when you read a book, including mine, be skeptical and judgemental: demand good citations as to source. My books are heavily footnoted to aid in that judgement call, and typically include an appendix full of additional proofs. In fact, the third book in my proparanoid series, The Defensive Field Guide, is in part a collection of such proofs and citations in a form useful in dialogs with non believers. In such a use, everything within it is verifiable by the doubter.

And, when you base conclusions on a technical source, such as a patent or scientific paper, you must make sure you understand what you are reading, or do additional research until you do. Certainly do not rely on the conclusions of other persons with no credentials in the field, for they likely do not know any more about it, than you. This is a great source of misinformation, because technical papers to the non technical lay person can be read into any number of wrong conclusions. It’s like asking an atheist to interpret scripture, in a way; the translation will be quite flawed.

And here is a simple test: Google a given topic, such as Remote Neural Monitoring. If the returns features ONLY mind control related sites and the like, you are likely looking at disinfo/misinfo. For one thing, Google has a built in bias against ‘fake news’ which they define as anything contravening the ‘official line.’ The official line is that there is no such thing as mind control, so when all you get is mind control, its fake news they want you to have. No. If it was a real thing, you would have up front the ‘scholarly articles,’ news stories, and the mainstream view on topic… and THEN you might see some mind control sites and the like, as if some kind of discredited ranting from the fringe.

Another simple test: when you see a claim for a technology, IS THERE A LINK to THEIR SOURCE so you can verify the claim? Again using RNM, there are consistent claims it is an NSA technology, but NO ONE is providing links as to how they know this to be the case. With enough research, you find the claim originated from some guy no one ever heard of who claims to be a technologist, and HE (William Starrett) gives no link as to how he happens to know. He does provide a video of Snowden talking about SOMETHING UNRELATED and tries to fit it to his narrative; disinformation. There is another source, Russel Tice, who is another claiming to be an ex intelligencia (NSA) whistleblower akin to Edward Snowden. He, too, cites unrelated technology and relies on Robert Duncan, rather than first-hand knowledge. No thank you; disinformation.

And one final test: does someone offer some magical new age technobable gadget, glass bauble or jewelry, salve, oil, or audio they claim will cure/combat the alleged technology? This crap commonly pops up just as fast as the alleged tech, a remarkable feat given that we are typically five to ten years behind the technological curve, which means we don’t understand the technology even exists, much less how it works, and far less about how to defeat it. Do you really believe a $300 pendant with a picture of you as a child engraved on it will stop imaginary scalar waves?

xWhat distresses me about disinfo/misinfo is how easily it becomes everyday ‘fact’ amid the various TI groups and Web resources. Take, for instance, this image which is being used by several organizations and web sites, including PACTS (People Against Covert Torture and Surveillance) offered as proofs of microwave attacks, and microwave murder. Make no mistake, microwave can kill, and cause horrific burns if misused. But the image is not of a microwave victim, at all. It is a bomb blast victim from the Middle East. If you can’t trust the validity of one image or claim at a Web site, can you trust the validity of any found there?

Did you know you can search for images by dropping an image into the Google search bar? Try it sometime. Its a good way to reveal fake news and disinfo/misinfo.


Falsehoods thought true

The following is a summary of commonly accepted false beliefs. Not one of them has any factual basis not originating from the enemy. The right hand dangles a Scorpion about your face after the left hand conceals the poisoned spike used to make you think you’ve been bitten; anti-venom won’t cure the actual poison used.


No. Shared Vision is easy to simulate through excellent surveillance, computer hacks, and so forth. The belief is based on scientific papers and news reports, but they reveal the ability requires hundreds of implanted probes in direct contact with the brain by drilling holes or removing the skull cap, all directly connected to a room full of supercomputer. The alternative method also written of in hypothetical papers is to replace or surgically modify the eye to be bionic, complete with video transmitter. This would be a two-three week hospital surgical procedure and recovery. I think a TI would notice any of the above clues, but not one, has; no one is seeing through our eyes. These scientific articles have become the basis for false conclusions by people who fail to understand what they were reading. This is in my books, btw.


No. Same answer as above, almost identically. However, there is another way to simulate it which approximates the result. There is a documented V2S bio implant called RAATS which can intercept and decode your brain’s EEG signals which represent the 26 phonemes making up the little voice in your head which is you talking to yourself about (whatever), including what you are about to do. It is not mind reading, but it can capture the verbalized thoughts for like result. You can learn to suppress the voice, and foil it. However, it is also a two way system capable of V2S, and remains a threat. This is in my books, as well, as is how to thwart it. See also RNM, next.


No. This is a good example of misinfo, and disinfo (per previous dialog — there are zero authoritative sources). In addition, some TI’s have tried to misapply technical proofs without understanding what they were reading. Some cite brain to brain technology which requires a supercomputer and for both parties to wear a special helmet in a system which neither reads the mind nor is capable of controlling thoughts; it merely causes muscular reaction. Others cite a similar article talking about controlling a mouse’s motor functions wirelessly, based on light, but it requires brain surgery and again has nothing to do with mind reading, and only controls muscular response.

RNM has been further mismarried and confused with Neural Linguistic Programming. NLP is not mind control, as such, but the mere clever use of words/phrases to confuse someone. It is not technology, but a method employed by magicians to misdirect, and by quick change artists to get more change back than due them. However, it is a skill often taught to CIA agents or acquired by others as a tool towards getting people to cooperate. Elements of it are often used in interrogative procedures. It has no actual relationship to RNM other than a similarity in name… and any such relationship which has been assumed is, in fact, an example of written NLP at work to confuse.


No (and yes). Make not mistake, implants are real and often employed. I’ve had one, and it eventually came out on its own, rather a rare outcome. There are tracking implants, pain causing implants, and V2S implants (there are three technological ways to cause V2S, one of which relies on implants). I don’t mean to say implants don’t exist in TIs, but I do maintain many TIs falsely conclude they are implanted as a means to explain why their defenses against other (wrong) technology does not work. We must hope this is the case, because implants are very difficult to detect or combat (remove, kill, shield).

The problem is amplified by wrong beliefs about detection. Countless TIs become victims of scam artists claiming to find implants with cheap RF/EMF detectors which allow the moving of a finger to cause the instrument to ‘indicate’ the presence of an implant, when it is actually only sensing the movement of the finger. “That will be $50, please… do you want me to keep searching for another?”

Detection is not impossible, but RF/EMF is not emitted by most implants, and therefore, they cannot be found by cheap gadgets. Getting a professional with proper gear to scan and to tell you about it is typically next to impossible. X-ray and MRI scanner techs and doctors will seldom share the information, it being thought that they are taught in medical school that implants are a government tool to track terrorists, or similar. A good TSCM (Technical Security CounterMeasures) expert tends to balk at requests to scan, they are almost always ex intelligence agents and prone to not crossing their former employers. They also don’t like to do it because if they find none, they will be disbelieved and accused of lying, and payment will be refused, resulting in litigation. And, btw, they charge an arm and a leg, when the bill is presented.


No. Time was, when someone knew something they should not, became too annoying a squeaky wheel to the ‘system,’ or in some way threatened the plans of the powerful, they would simply kill them. But with the perfection of early mind control experiments post WWII, it was quickly discovered that the best way to keep those secrets (and any others) from being revealed, was to make the pesky risks seem insane. Mind control methods have replaced the ‘wet job’ as the way to deal with potential ‘trouble makers.’ There is now no need to kill someone, and in fact, a mind control victim has great potential as a resource for some future project use as a patsy, as guinea pig in new tech or methodology, or training exercises. It costs a lot of money to MC someone, and so, why destroy the person and the investment? This is one reason why membership in the TI community seems to be ‘for life.’

More than that, MC is all about psychology, and the greatest tool in the arsenal of psychological manipulations is fear. It is easy to make someone think their life is in danger, the ultimate driver of fear. Listen. If they wanted you dead, you would already be long dead. It is just that simple.

There is no profit in a ‘slow kill,’ because it would leave forensic clues that would endanger ongoing operations. Out of my 12,000 TI contactees, easily a third or more thought they were marked for death. Out of those thousands, only one actually died from targeting, and that was seen clearly as accidental and unintended consequence by the perps. Another died of organ failure deemed due to old age (nearly 80), but which was likely augmented by constant DEW. Perhaps a dozen others have died in ways which are reported as accidents (i.e., auto), but which the TI community embraces as murder. Another dozen suicides are blamed on targeting.

Suicide is the ultimate expression of giving up, the ultimate price of failing to defend against the real facts of targeting, and the final proof that the victim has decided to voluntarily give up God’s gift of Free Will and submit to the will of their generally satanic tormentors. When Cancer patients and quadriplegics can fight on and endure with dignity, why would anyone give perps that victory? Because they grew tired of defending against the wrong things with the wrong defenses.


No. This is a perfect example of technobabble at work. There are zero authoritative articles, certainly none which scientifically address scalar waves, which are alleged to disobey the laws of physics and attributed by some people as being employed in mind control.  The primary proponents and parties attempting via Youtube and Web presentations to ‘prove’ scalar waves (leaving more questions than answers) and tie them into mind control are often the same people selling $300 pendants to ward them off. It is a sham.


No, underscored. Some claim satellite DEW torture. Some claim RNM by satellite, already debunked, above. I’ll devote some time to DEW debunking, but I will admit to the possibility that satellites can potentially be used for area wide mood control or subliminal messaging, ONLY. You can in theory broadcast EEG signals and embed subliminal messages within communications signals. This is known technology such as used in Command Solo aircraft being flown every day over the U.S. and elsewhere.

This use of satellites is mere speculation, however, but I’d not be surprised. Command Solo flies training missions every day over US cities, and not even the operators know what is in the ‘training’ tapes being broadcast. The military has admitted the technology was used to sway Bosnian elections, and to cause Iraqi soldiers to surrender in droves, sometimes to small camera mounted drones. Given the number of butthurt Democrats who have waxed violent over the elections, it appears SOMETHING has driven a good number of people beyond the edge of acceptable and normal behavior.

Why DEW attacks are not possible by satellite: Any beamed energy, other than lasers, falls off at the square of the distance. A cell tower transmitter is good to about 2~5 miles with a relatively small emitter. At the height of satellites, the amount of power required to broadcast a microwave beam to earth and have it strong enough to penetrate buildings to hit an individual would likely require a power source far too large to fit in a satellite. Powerful land communications microwaves, broadcast at seriously high energy levels with a huge emitter, have a typical maximum range of about 40 miles. Satellites are typically some 22,000 miles high, or higher.

7327orig.jpgThe harder challenge is associated with transmitter size to handle that power. Microwave communications towers require transmitters typically in the range of 8 to 18 feet in size to punch towards 40 miles. To do fire a signal 22,000 miles would take units far too large to launch. But the bigger hurdle is accuracy, given that in order to maintain the illusion of insanity, you would not want anyone nearby to be hit with a beam (collateral damage). The best military grade GPS is accurate only to about 12 feet, which means a plus or minus error of about 10 feet for the center of beam, and the beam width would be much wider than was the transmitter. Bystanders many yards away, or further, would notice the same targeting effects.

But suppose it could be done? The next problem is cost and client (TI) servicing. A typical military or intelligence satellite can only target ONE client at a time. Given the size required for DEW targeting, certainly only one. Yet how many TIs think they are targeted by satellite? There would need be thousands of such birds, but there are not even one thousand satellites in total from all nations on Earth for all purposes, inclusive. Each satellite costs roughly a half billion dollars to launch, and about $15M a year to maintain, hardly cost effective when a perp with a modified microwave oven-style weapon can do the same job from a nearby building for a few thousand dollars a month.

What about availability? There are zero satellites in geostationary orbit over the United States which are not communications or weather satellites; the military and intelligence community only use orbiting satellites. That is another inefficiency for targeting individuals, because it would only be overhead for targeting for a few moments several times a day. How many TIs can claim targeting on a regular schedule that fits that?

Satellite targeting makes no sense either technically, or financially. It is a fantasy of convenience to the greater targeting movement fostered by Robert Duncan and Barry Trower. If people believe in satellite targeting, they will stop trying to learn the truth, and stop trying to defend themselves, as there is ‘no way to fight satellites.’

True: because they are not at war with you.


Smart Phone EMF App No Value to TIs

Targeted Individuals are desperate to find verifiable proof they are electronically targeted. Unfortunately, many turn to cell phone EMF meter apps… which are useless for the purpose. Here is the right way to do it.


by H. Michael Sweeney   Facebook  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

What you will learn reading this post…

• Smart phone EMF Apps don’t work they way you think;
• What will work for TI needs;
• The types of threats a meter can see, and cannot see;
• Some common false assumptions TIs make that impact understanding

Smart phone EMF Apps can’t ‘see’ targeting signals

Unknown-10.jpegSmart phones have built-in EMF (b) detectors, which some App makers have taken advantage of to simulate EMF meters. Not quite the same thing. Cell phone detectors are designed to measure the Earth’s natural DC magnetic field in three axis. This allows them to compare sudden changes to ‘compute’ movement of the phone for game interaction. NOTHING MORE, unless you are looking for a large buried iron-bearing rock; same technology as a metal detector, just less sensitive. The detectors can also be used in other Apps, such as levels and compasses.
To see targeting EMF and RF, you need a meter designed to measure RF and fields generated by 60 cycle electrical equipment, and the kind of EMF they generate. Such meters, unlike cell phones, are intended to be aimed directionally at a given source; they can show you where a signal originates. This is perhaps the best reason to own one. Some are type B (preferred), and some are not, to make them cheaper, and somewhat less useful.
Preferably, it should have a very broad band of frequency sensitivity, because there are many kinds of targeting tech, most of which can generate symptoms which mislead the victim into false presumptions about which kind of an attack they are dealing with. A meter with a broad band can better define the type of attack correctly. Unfortunately, low cost meters will not see bands broad enough to deal directly deal with or identify microwave the way a TI would like. Some meters, such as those mentioned herein, can still read and quantify their energy, however.

You have to know what you are looking for

You must choose your meter based on the kind of attack(s) you suffer. You can’t scan for an attack which does not exist, either because you think its one kind of attack, but its another, or because there is no such technology in play. The real problem is, that very few TI’s actually know precisely what kind of attacks signals are levied against them… save V2S and microwave burns, which are pretty unmistakable. Out of 12,000 TIs I’ve dealt with over several decades, I can count the number who correctly understood the technical truth of their problem on one hand. And  there are several reasons why that is true.
For one thing, many symptoms can often be the same regardless of tech employed. I break symptoms down in my book, MC Realities. For another, the enemy will invariably seek to insure you get it wrong, by leaving false clues or having fake TI personna give you bad advice, and by employing professional dissinformation methods, to include phony retired intelligence agents who ‘come clean’ and ‘expose’ the technology. Never happened. They do this because they know you can’t fight them if you respond with the wrong weapons/methods, and because it makes you look insane to professionals from whom you might seek help (i.e., Cops, Lawyers, PIs, Doctors). Then, well meaning TI’s spread that disinformation as gospel, and muddy the waters further with their own versions. Here is a great example:
A lot of TIs think Remote Neural Monitoring is an attack tech that reads their mind or puts thoughts into one’s head, or that it has something to do with satellites, and fully a half-dozen other things it does or relates to. The Web is awash with countless pages saying RNM is mind control of this, that, or another flavor, but not one of them is an authoritative source citing the truth. NO, it is not, does not. RNM as a term relates to nothing a TI ought worry about, at least currently; it is based on use of a room full of super computer power directly wired to countless electrodes physically attached to the head of the subject, and does not directly read thoughts. It instead catalogs the brain wave patterns ALONG WITH the user’s verbalized thoughts.
Subsequently, the computer can then compare brainwaves against known thoughts to find matches. It cannot put thoughts into the user’s head, and it hardly qualifies for field use against unwitting persons as political control technology. Some efforts along this line have also managed low quality video depictions of what the subject was seeing. In order to do that, they had to remove the skull cap of the victim, a Cat, and put over 1,000 probes directly into the brain, causing the Cat to die fairly soon afterwards. The term RNM has been misused and spread by TIs mislead by disinformation or persons who did not understand what they were reading in a scientific report, or description thereof in media. The term RNM was never even used in the scientific papers, but popped up in a news article summarizing the paper. From there, it was hijacked to become a fiction.
Note: there is ALSO a patent often cited as proof of RNM, even in other patents, and in books by disinformationalists — which would SEEM to be as claimed, and which is the basis for ‘satelite targeting’ claims (along with ‘exposed truth’ by ‘ex intelligence types’). But in fact, the baseline patent, as well as any relying upon it, are bogus, in that it/they cannot work as described. It must be presumed the patent office took their word for it; if the reviewing staff at the patent office were not technically up on radio frequency technology, they might not have spotted the flaw. Patent #US3591134 A Apparatus and Method for Remotely Monitoring and Altering Brain Waves… essentially beams two radio waves at the brain, and expects the brain’s own radio frequencies to be modulated onto the them, and then captured by a radio receiver for processing, analyzing, and optionally then modifying and beaming them back yet again into the brain to alter thought.
CAN’T WORK: radio waves don’t modulate one another. If they did, all radio waves would carry the signals of all other radio waves, and AM/FM radios would not work, they would be confused. Modulation is achieved by electronic circuitry BEFORE broadcast; exactly what AM and FM radio does; audio is modulated onto the broadcast frequency, and decoded in the radio. If this patent, and remaining patents based upon it actually worked, they would be picking up not only the original signal, but modulated signals from every radio signal out there, and every brain within range, and be unable to separate one from another. Exactly this protest has been made on this patent, and the patent is no longer in force. It is presumed someone thought they had a great idea, and patented it without proof of concept, because they could not afford to develop working prototypes, and in hopes someone who could afford it, would pay them for patent rights, to do so. The same is likely true of the patents based upon it. Who knows? Perhaps the patent was actually itself a disinformation effort.
And while we are on topic, satelite targeting also does not exist, at least not the way most TIs believe. A Satelite is too expensive to target an individual, for one thing. To do so, it would need to be tasked, taking it away from other duties. No TI is so important to justify billions of dollars in hardware just on them, especially given the number of TIs who so beleive. More importantly, its simply not possible. You might be able to broadcast subliminal information or EEG entrainment signals to the entire service area of a Satellite, but not an individual, unless the individual had a satellite dish and decoder built into his head to isolate signals meant for him, alone. Moreover, a satellite could never read an individual’s brainwaves unless the he had a very LARGE and specifically aimed dish in his head.
If a TI were to worry about mind reading or having thoughts put into their head, such does not quite exist, though it can be simulated such that the target presumes it so. That requires an implant, and is not likely to be easily discovered with an EMF meter. All it does is read your brain’s EEG signals for that little voice in your head, which is you talking to yourself. That voice is also used by your EGO to cause you to react badly to stimuli. An implant which reads your brain’s EEG signals representing the 26 phonemes used to make up words can relay that by radio to a computer which can translate it to text in real time. The operator can then respond if desired via the implant using incorporated V2S ‘bonefone’ technology, or perhaps, simulate your own internal voice making you think ‘you’ thought that thought. There is no information or evidence suggesting the later capability exists; it is mere theory, but it is plausible. This implant is known and documented technology.
From my book, MC Realities: I direct you to a Dec. 18, 2000 article from the Albany Times Union, by Andrew Brownstein — a piece entitled University of Albany Suspends Mind Control Implant Research Project. This reveals current working capabilities are well beyond those demonstrated thus far. Excerpts begin — as dramatic a smoking gun as I’ve ever seen… “The University at Albany, N.Y., has shut down a research project investigating the claims of individuals who believe that they were surgically implanted with communications devices which can read and transmit their thoughts. Professor Kathryn Kelley, a fully tenured psychology professor at the University at Albany, has focused her work in recent years on surgically implanted mind control devices. A brief statement released in August by university spokeswoman Mary Fiess said, ‘The university imposed the suspension [of Kelley’s research] because of serious concerns that the experiment did not meet the standards governing such projects on campus. While we work to gather all the facts in this case, we cannot comment further.” …In 1995, gunman Ralph Tortorici held a class of 37 students hostage at the University at Albany, claiming that the government had planted microchips in his body. Tortorici, who shot one of the students during a struggle, reportedly hanged himself in his state prison cell last summer.
In spring of 1998, according to the Times Union, the university’s Psychology Department first became aware of Kelley’s interest in mind control technology when she posted a note on her office door announcing a lecture called ‘The Psychology of Invading the Self.’ The note reportedly described implant research funded by the National Security Agency and the Department of Defense with an annual budget of $2 billion. The note stated the devices were typically implanted in ‘uninformed, nonconsensual subjects” who were usually ‘federal prisoners and political dissidents.’  The newspaper has since had the article disappear from their files, but other newspaper articles reference the event, which is where I obtained the image.
But there is also an attack tech somewhat similar to RNM’s claimed methodolgy which does not use an implant: EEG entrainment. It operates in the ELF (Extra Low Frequency) RF spectrum at brain wave frequencies, typically 7-15 Hz. This is the tech used to control your wake/sleep/alertness and moods, by sending brainwave patterns as radio signals stronger than your brain’s, causing the brain to ‘adopt’ them. Very few EMF detectors operate this low, and so, are not likely to be able to document such use. I have one, but I had to pay $12,000 for it… and for that money, got a lot more functionality, as well.
At the high end of the spectrum, microwave energies used to cause pain and other dirty tricks can operate beyond the UHF frequencies, between 3 and 300 GHz. Cell phones and wi-fi systems operate in the single digit GHz, but attack signals tend to be somewhere above 6Ghz, and well into double digits. Military systems can be over 50GHz, and into the hundreds. Again, low cost EMF meters cannot ‘see’ these higher frequencies, typically stopping at 3GHz. My $12K system can see to 12GHz, and is therefore still inadequate for all situations. But many meters, like the Trifield (.com) can at least see the ENERGY put out by such systems, and can therefore still be useful to know they are in use. They just can’t specify the frequency involved.

How you use a meter is important

You should hold the meter flat looking down on it, and aim it at a suspect source. Stand and rotate rather slowly to find hot spots which represent suspect sources, for closer study. Move in on these — the closer you are, the more accurate and higher the reading will be; RF energy readings normally fall off at the square of the distance. Learn more about meters, use, and related issues not covered, here, from this earlier post. It includes, for example, information about stray voltage, smart meters, and relates the importance to a TI of EGO in the matter. Some information in that post is duplicated, here, to insure it is not overlooked.
TrifieldMeterI very much like and used to sell the TriField — get the cheaper one, the more expensive one is trickier to use by a novice. I also used and sold the MicroAlert, same source, because you can set it for an attack threshold and it will automatically sound an alarm (pulsing beeps). When I was under attack, my bird actually learned to ‘beep’ back at it, it went off so often. Had to move the bird so I wouldn’t get the two confused; at that high a pitch, I couldn’t tell the source direction.microalert2
Don’t aim meters upward unless there is something there you find suspect; the sky is full of RF energy which will invalidate reading usefulness. Take a reading of the suspect item and then compare by aiming at the same upward angle elsewhere, and subtract that reading to get the difference, which is the actual number of concern. Again, get as close as you can.
Keep your fingers away from the business end of a meter, or your body will alter the reading. This is the trick used by fake implant finders. They choose a meter that has an audible threshold alarm like the Smart Alert, but fancier and more technical looking so they, as ‘experts,’ seem ‘smarter and more capable.’ They set the threshold such that they can move a finger set it off on cue, to ‘find’ an implant. “$50, please, shall I continue looking?”
The truth is, meters are hardly useful to find implants. Unless the implant is broadcasting a radio signal, it is not seen at all. If it is broadcasting, it will be extremely difficult to find it while transmitting for numerous reasons, and unlikely unable to tell the implant signal from ambient RF, much less locate it on the body with any useful accuracy. The best way to find implants is with an MRI whole-body scan, but the trick there is to a) get someone to do a scan for the purpose, and b) get them to tell you they found something unusual. The medical community is not friendly to TI issues any more than are Police — which is to say, they will more likely send you to a psychiatrist for help.
RFMeter-HF35C-L.jpgIf you want to find perp attack sources at distance, spend more and get a meter that accepts or includes a Yagi antenna, which dramatically narrows the angle of view and increases sensitivity at distance (again, signals fall off at the square of the distance). Where the meters mentioned above are well under $200, a meter such as the HF35C (German made: Gigahertz Solutions) with Yagi will tend to start at just under $400, but will be limited to high frequency ranges, only, and will STILL not see well into the microwave bands. So if you bought it or something as good, you should likely also get a TriField or similar, for lower ranges.
Note: Almost always, an attack from distance will involve use of a Yagi system by the enemy. If you use a Yagi, your accuracy in angle of view may be good enough that you can use binoculars to spot their antenna. Scan the whole page of these examples of Yagi, and if you EVER find one of these directly aimed at your home, it is almost guaranteed to be an attack device; no such antenna should be aimed anywhere except at a radio/TV or Wifi broadcast source. They might just be after your wifi, but that is still an attack on you.
In such a case, if you can get eye-witness or video document high RF coming from it, you have potential legal-quality evidence of targeting. Increase the usefulness in court by getting an RF expert to agree in testimony that it is a dangerously high reading, and ideally, to covertly himself identify its frequency and strength with more expensive equipment.
The cheapest way to get a higher microwave readings is still over $1,000; The HFW59D, and you are still limited to 10 GHz. So you see that cost vs. performance into the higher GHz is quite a bell curve. But once you get much beyond a thousand dollars or more, you start to get into actual signal processors, and they tend to have a lot of useful features, such as data recording, safe level warnings, time/date stamps, computer interface, and so forth. And while those things are nice, they add such a complexity that even I balk at the notion, and I’ve taught digital electronics I and II at college level, and developed microwave-based security systems. I keep coming back to the TriField as the best overall low-cost single device solution for TIs at large.
Be aware that there are ‘toys’ on the market which can look like better deals. I’ve seen a $129 meter claiming 8GHz, but it turns out to be nothing much more than an old cell phone using the signal strength indicator of the cell phone, and is non directional in capability; you can see the signal, but can’t tell where it comes from. You can spot this device, because it uses the old stubby cell phone antenna, instead of an actual EMF sensor. I would avoid any device using a cell phone antenna.

Why am I Being Targeted? A Valuable Question for TIs

Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.

by H. Michael Sweeney   Facebook  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
What you will learn reading this post:
• there are three primary reasons why TIs are targeted;
• knowing which it is can result in better defensive/offensive strategies;
• it is possible to discern the difference in many cases;
• there used to be a fourth kind, but what it really is will surprise you.

The way it is

Of the 12,000 plus persons reaching out to me over the last two decades because they were being targeted with some form of Political Control Technology (PCT), almost without exception, the first thing asked is ‘Why… why me?’ Naturally, there are endless other questions which are also asked, all of them seemingly unanswerable, and all of them deeply troubling and part of the psychological mind games which are inherent in all forms of mind control.
27419003986.jpegThere were three or four possibilities, and the best answer which could be offered up front was simply to cite those reasons, a generic answer which lead to no peace of mind, and which usually lead to even more difficult to answer questions. And yet, to get to the bottom of things and mount a viable defensive/offensive strategy, such questions needed to be answered; you cannot fight a problem you do not understand.
This is why targeting tactics include significant effort into misleading the TI into thinking all manner of incorrect facts about their targeting. Out of the 12,000, I have only ever encountered perhaps 4 who truly had it right. Defending the wrong problem results in failure, amplifies the power of the mind games through frustration of defeats, and sets the TI up for looking insane (or even driving them to that state), almost always another goal of the targeting, the very means of neutralization, and the best measure of success.
And so, in order to get those answers, I established my free Helps Kit (, and its use, in turn, enabled me to offer a variety of for-fee consulting services aimed at formulating appropriate combat tactics. In almost all cases, even if not electing my services, the Kit lead to some improved understanding and ability to withstand targeting. The services almost always amplified that result, and in all-too-few cases, enabled a complete stop of the targeting, usually with some form of remuneration or compensation to the victim through what I term a ‘blackmail insurance policy.’
So YES, it is right to ask why. So let’s look at the generic answer, and see where it leads us.

The Three Answers

I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.

1) the actual intended use is ‘political,’ which translates as any form of disapproval of the TI which may require punishment or neutralization short of an assassin. Whistle blowers or potential whistle blowers, cult members evicted from, or who quit the cult, etc;
2) ‘experimentation’… extending the state of the art;
3) ‘training.’ Guinea pigs for trainees are targeted in order to achieve across the board predictable efficiency.
What we used to perceive as a fourth reason was sometimes called ‘Joyriding’. In truth, if falls into experimentation, but not upon the TI — upon the perps. Actual joyriding can take place… the unauthorized used of tech/methods for personal gratification… but more than likely, to the abuser, it is in the realm of ‘political,’ to
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
93d5bea6cce0329abcf9fc97431684c0.jpgMany perps are themselves TIs, either actual mind control victims or persons (typically sociopaths or psychopaths) who are put into experiments to see how THEY react in a perp situation based on THEIR psychological profile and the specific circumstances of the TI-to-perp interaction/response cycle. In fact, the TI is almost superfluous to the equation, once their suitability has been determined (their profile), and considered a consumable and expendable item in the project — though controls exist to prevent such harms as might result in Police investigations which might defy cover up arrangements.
An easy example is the infamous Yale experiments on authority conducted by (presumed CIA) Psychologist Stanley Milgram, ostensibly funded by CIA under MK-Ultra. There, volunteer students were given the choice of playing teacher or student roles in what was described as a learning experiment, with an observer who was authority over the ‘teacher,’ who was de facto authority over the ‘student.’ The teacher would test the student and punish wrong answers with an electrical shock, increasing the voltage for repeat errors. There were lies in the mix which changed the reality to something else, but in the end, the observer would instruct the teacher to continue the increases in voltage to the level of lethality.
In that study, those playing student were not real student volunteers, but paid actors, and no one was actually being shocked or harmed. But a similar study by Professor Phil Lombardo, the Stanford Prison Experiments, resulted in actual sadistic violence so troubling that it had was made into a motion picture. There, everyone was being studied, but the guards believed only the prisoners were being studied, so the core experiment was focused on them. This experiment, too, is thought to have had government backing of some sort, as this was in the days of COINTEL and COINTELPRO operations by FBI and the U.S. Army under Nixon, a program thought enhanced and behind much of today’s targeting of citizens. In any event, it had been ‘blessed’ by the American Psychiatric Association, which at one time was headed by former CIA mind control scientists (like all such organizations).

Knowing the difference can alter TI tactics

 One needs to fight the right problem. So it is critical to know which reason applies. There are some general defenses which can be used regardless of the form of targeting, but there are also specific defenses which in the end, are likely more productive. While every TI’s situation and circumstances can dramatically impact on exactly HOW to effect such defenses, and especially offensive responses, what follows below are my ‘generic’ answers which are, unfortunately, somewhat simplistic in description. A TI should be very cautious in experimentation trying to find the best way to implement a given solution.
The key most generics which apply to all reasons for targeting, are a bit more straightforward. Chief among them is to increase site security (i.e., pickproof deadbolt on a primary entrance, all other entrances secured such that only breaking and entering is an option — which perps don’t like to do because it leaves physical evidence in support of the victim’s claims of targeting). That can also mean use of video security monitoring systems, security lighting, and so forth. I am not a fan of monitored alarm systems (most such firms have intelligence community ties), but I do like off-the-shelf component alarm systems, perhaps with online monitoring by YOU.
Another generic tactic is to Stop, Think, then Act, instead of simply to react. Instead of reacting to a targeting stimuli or event, STOP: Think about what they want or expect you to do in reaction, and instead, Act (as actor) in some random contrary way. They use your reactions to gauge effectiveness of their methods, and methods are calculated based on your psychological profile. Acting, done believably (don’t over act, don’t elect a totally absurd response) can screw with them in ways which sees them doubting both their methods and the accuracy of your profile, and cause them to retreat to square one, reducing your trouble and giving you a rest period. However, before that happens, you must brace for increased attack levels, until they accept that something is truly wrong.
And, of course, I also advise at least the first two books in the Professional Paranoid series. The Professional Paranoid gives how-to advice with respect to traditional targeting, which is always part of PCT targeting. The second, MC Realities, gives how-to advice about the PCT variety. The third book, The Defensive Field Guide, is simply a compendium of references and resources, primarily educational and especially useful as ‘proofs’ when trying to convince non believers that the technology and history of its use by government is real. Learn more about my books, music, and videos on these kinds of topics using my WordPress pull down menu (page top). Additional blog posts on topic are also available, here.
Political targeting almost always involves a ‘full-court press.’ The victim will likely suffer electronic weapon targeting, gangstalking, dirty tricks designed to destroy all resources, including finances, relationships, and reputation. They tend to be harassed by law enforcement and other civil agencies, and will likely in time discover they have been implanted with various devices to allow tracking, cause pain, provide voices in their head, and perhaps, suffer use of chemicals and gasses. Everyone will seem to turn against them, for they have been turned by the flashing of badges and requests for ‘help’ by ‘investigators’ of some horrible thing (i.e., pedophilia, terrorism, etc.)
The best defense is to determine exactly what thing it is they fear about you such that targeting was justified in their mind (which may be false beliefs about you). It usually has to do with something work related, or if a college student, something witnessed or experienced at school. Knowing the reason for the targeting will give you the who. With the who, why, and how answered, it is often possible to crate that blackmail insurance policy.
But it also may be that you had already been a victim of childhood abuses designed to create split personalities which could be ‘programmed’ to make you into a programmable person (think in terms of a Jason Bourne or Manchurian Candidate). For every Bourne successfully created, there are likely dozens of ‘failures’ which are kept around to become patsies or for fodder in some future plot. Such persons are often targeted to keep them off balance and looking insane in order to prevent exposure of the greater programming project. If you think you might be one of these, contact me for further evaluation.
Experimental targeting almost always does NOT involve a full-court press. It is usually to test a specific PCT or PCT combination. In some cases, this is actually a better experience as a TI, because of that fact. But in other cases, it can mean very exceptional and horrific targeting levels. Where it is the perps who are the subject of the experiment, it is more likely for the TI to have a  yo-yo experience, even seeming lapses in targeting. Finally, another clue is bizarre symptoms atypical from other TIs. This usually means some new, advanced technology is in play. The more ‘crazy sounding’ the experience is, especially against other TI experiences, the more likely is it experimental tech… unless, of course, one actually is schizophrenic. But even that can be a clue (see training targeting, next).
If it is concluded that perps are the true subjects, you can apply the same defense as advised in the training targeting (next). Otherwise, it is hard to give specific advice for something which may not be based on known technology or methods, but it is just as likely to be based on psychological experimentation as it is technical. In the later case, there will be no bizarre experiences (comparatively). In either event, I suggest you contact me and perhaps we can figure out something to try which is based on whatever is going on.
Training targeting will again feature yo-yo symptoms/effects, and perhaps brief lapses in targeting, but the symptoms will not be atypical of other victims. Because it will involve perps who may be ‘stupid’ about important errors that can be made, it is typically used against people who already have some history of mental health treatment. Schizophrenia, paranoia, or extreme schisms are popular ‘excuses’ which can hide any such targeting errors and prevent exposure of the training project. Authorities will presume the mental state of the victim the cause of their complaint, even to the point of ignoring physical evidence, such as burns on the body, which would be thought self inflicted. As in all targeting cases, regardless of type, reason, etc., I advise never to go to authorities unless you have courtroom quality evidence and witnesses or other proofs to counter any notion of mental illness.
Another clue it is training leads to defensive options. One will see a routine change of players, if one can locate the nearby perp operating posts. Training commonly requires at least one ‘instructor’ and one or more ‘trainees’ at a time. They are not family, and are not in the same social or affluence levels, and will tend to seem odd matches for each other, both in dress, and likely, in age. And, there are likely three sets of them to allow three shifts a day (not always – where targeting varies during the day and is consistent at night, the nighttime targeting may be automated), which would mean a lot of coming and going of different people. And, as there will be graduations, there will be a larger cycle of all new people, which may or may not include brief lapses in targeting, or renewed cycles of targeting experience which might be described as starting low and simple, and advancing to high and complex, over time.
The defense is simply to document the comings and goings, and the patterns of electronic attack signals. Rely on video, get license plates, record times, etc. This may enable you to obtain help from authorities, or perhaps to take legal action. But I warn you, the material must be legally compelling, and overwhelming. You will need a lawyer’s advice more than mine.

About Death Threats

Many TIs talk about thinking their perps are trying to kill them. Some talk about actual death threats and events which seem to be ‘failed attempts.’ Some reference  deaths which have taken place as ‘suspicious.’ It is true that numerous TIs have died while being targeted. These deaths are not outside of the norms of actuarial tables for a given group of people, given the many tens of thousands of TIs who actively so identify themselves. And as investigator, I have yet to see any compelling evidence of an actual murder, or staged accidents. I know of only one accidental death at the hands of a perp… which would possibly warrant a murder charge… definitely warrant manslaughter charges.
So, despite the insistence of TIs, I am equally adamant that murder is not the intent of targeting. Given the resources and skills of who is involved in targeting, if they wanted a person dead, they would be dead. They would not issue a threat or any other kind of warning, they would just get the job done. And, keep in mind that one reason targeting has been developed and deployed for political use is specifically to avoid murders. Murders can result in investigations which have the potential of blowback. But targeting creates a ‘mentally ill plaintiff’ who will be ignored, and is who is therefor a political (and social, financial) zero.
Therefore, where a targeting situation involves such threats, I deem it to mean one of two things. Either the TIs defenses are becoming effective and they seek to deter… using a bluff… in which case it is likely to be in a political targeting situation — or it is part of an experimental targeting project. In all cases, it is a mind game and should be ignored outwardly, while inwardly increasing defensive posture and alertness. If actual attempts are made, that is entirely another matter, and should be documented and likely, taken to law enforcement. Not that they will do anything about it, but it gets it on the record, such that if things become more serious, they might respond appropriately.

Fake News and Its Suppression: Who Benefits?

Fake News is a political weapon which is designed to cut two ways into your freedoms, and send us deeper into the grip of the New World Order. This case study reveals it.

by H. Michael Sweeney   Facebook  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.

What is Fake News?

Depends on who you ask, and when.
Were you to ask me or the next guy, say five or ten years ago, the answer would likely be ‘fake news web sites,’ those sites which feature click bait ‘BREAKING!’ headlines which are shockingly unbelievable… but just plausible enough to get you to click. If you bother to Google, you often find the story has already been debunked by someone, or that the image used is other than claimed. You also have to worry about sites like the Onion, which use deliberately over the top ‘fake news’ as a form of politically commentary.
The stories found at fake news sites, rich with advertising to make them money for your trouble, offer no cited source, no links to a verifying source, typically have no byline (author) cited, or the author is nobody you ever heard of, and they don’t have an About US, or it is next to useless. Often, the site is truly fake, pretending to look like a legitimate news source, either by name, or outright theft of ‘look and feel’ of a mainstream site (i.e., has NOTHING to do with ABC news, despite use of their logo). has nothing to do with any news station, though designed to look like it does.
Were you to ask, today, at least half of the country, would additionally answer, Government, and Mainstream Media. Time and again they have been caught promoting stories proven to be false, always for political reasons. In the most recent Presidential campaign, the bias of media was so extreme and visible, that they no longer bothered to fact check Democrat/Hillary claims, and spent endless time fostering false narratives about Trump, story after story after story.
By way of example: If Trump said (and he did) “Russia, if you’re listening, I hope you’ll be able to find the 30,000 emails that are missing,” suddenly Hillary and media were claiming Trump was asking Russia to spy on Hillary… twisting the meaning of very clear words intending no such thing, but instead implying Hillary’s sloppy personal server emails were a National Security Risk, already very likely to have been hacked by (anyone who cared to do so), while at the same time highlighting the criminality suspected in the deletion of emails prior to FBI investigation.
But if you ask Democrats, or Government, or Media, it is only Web sites which have been critical of THEM or their own ‘news’ stories. They would include Activists and Conspiracy Theorist reviews such as Alex Jones, and actual legitimate news sites which dared go against mainstream in the election, such as FOX News, RT News. Well, I don’t trust FOX to be ‘fair and balanced,’ or ‘unafraid,’ either, but I’ve never seen RT do anything but expose things needing exposing, and reporting verifiable facts, and conduct verbatim interviews without talking over and interrupting, as is common to US mainstream. They would also include virtually all Conservative viewpoint sources, and many neutral sources long accepted as offering verifiable content, such as World Net Daily, Breitbart.
The scary part of these lists, which is nothing more than political blacklisting, is that there is a clear focus as to who is being targeted. Yes, they lump in with those they wish to ‘target’ by such labeling, actual fake sites, such as Before Its News and Federal Jack, and that is intended to legitimize via guilt by association inclusion of sites they wish to destroy for political reasons. But when you examine the list, you find out that there is such a focus; it is conservatives (opposed to the current liberal Democrats in power), Orthodox religious sites vocally opposed to select liberal policies, such as abortion, and anyone who faults Global Warming.
In fact, the primary accusation is: “This site publishes information that cannot be validated and that is anti scientific fact.” The grammatical error is theirs (‘that,’ instead of ‘which’). News sites which cite and links to their source can be validated. If you have a problem with the source, go after them. Scientific Fact? What is that? Science continually reverses and revises itself as more is learned over time. When something like Global Warming is involved, where you have legions of scientists who disagree with scientists who have a vested interest in the ‘official science’ for political reasons, the expression ‘anti-science’ is itself propaganda, and disinformation; fake news. Science is only theory until proven and accepted as fact, and that’s clearly not the case when scientists themselves cannot agree, and there is a political agenda involved — in this case the New World Order’s wish to establish Carbon Tax, Carbon Currency, and Carbon Credits.
In short, the whole Fake News, as news, in the news, is itself, manufactured Fake News for political purposes. It is so fake, in fact, that many sites listing fake news, do not even identify themselves and tend to pop up overnight, which likely means they are created through the Democrats, Establishment Republicans, George Soros, or their cronies. They, themselves, are fake. Example:

How to fight fake news

The problem with fake news as a tactic, even when from media, the Democrat machine, the Establishment Republicans, the CIA or FBI (Agency or individual rogue Agents), George Soros, or from sources in other countries, and of course, professional fake news Web sites, Conspiracy Theorists who don’t know jack, or anyone else… is it is EASY to see if it fake or at least suspect enough to look closer. Do they cite their source with a link? Do they give a byline? Do they dare offer an About Us which is useful?
HOWEVER, this only happens (looking closer) if you/we CARE. By heaping fake news upon us continually and endlessly with one thing after another, from fake source after fake source, and through ‘legitimate’ sources, as well — as they have ever since Trump threw his ring into the hat, the defenses of those who support truth and/or trump, or both, are worn down, and we become lax, thinking this, too, shall pass. We stop bothering to look, and presuming that because we see the lie, that others will too, before being hoodwinked. No. They won’t. Apathy and laziness reign.
This is why fake news works; apathy and presumptions allow it to be spread unopposed on social media. The only way to fight it is to relentlessly point it out: “Fake News: no source cited, no links to verify, no author, see what was actually said, here (link).” Or similar. IT IS THEREFORE UP TO EVERY CITIZEN TO REJECT FAKE NEWS, SEEK IT OUT, PROTEST IT, EXPOSE IT, and DECRY THE SOURCES, ALL WHO REPEAT IT, AND ALL WHO BELIEVE IT, ALL WHO BENEFIT BY IT IN THEIR SILENCE.Always check About Us, if they dare have one.

Case Study in fake news of the most dangerous and treasonous kind.

At the time of this writing, the pushers of the latest and most dangerous fake news are the Democrats, Establishment Republicans, Soros, the current Democrat Government, and George Soros. Their real TARGET AUDIENCE is, in this case, the Electoral College voters who are still being exposed to the avalanche of lies, lies, lies. A lie repeated often enough, in the company of more lies in support, eventually seem as if the truth. The core lie (fake news), is that Trump, Putin, Wikileaks, and select FBI officials conspired against Hillary. Specifically, that Putin hacked the DNC and shared files damaging to Hillary with Wikileaks, in support of Trump, and that Trump conspired with FBI to refute those charges.
It is wholly inconceivable that a Conspiracy can be formed by a single business man, a high ranking FBI agent, the Russians via Putin, and a non partisan Web leaking service (Wikileaks). If they can make enough Electoral College voters believe this lie, the outcome of the election comes into question. The stakes are high, and the hope is that there are enough fools to follow. To believe this latest fake news, you have to believe that:
a) that Wikileaks is a tool of Putin, a Fake News story planted by who? The Democrats. Planted when? When Wikileaks releases happened to revolve around Hillary. Who benefits? Democrats/Hillary;
b) that Trump bribed people in FBI to refute Russian hacking, a Fake News story planted by who? The Democrats. Planted when? After they lost the election. Who benefits? Democrats/Hillary;
c) that Trump and Putin have colluded or that Putin has elected to support Trump over Hillary. Collusion is a Fake News story planted by who? Hillary. Planted when? In the middle of a hard political fight. Who Benefits? Democrats/Hillary. As to wether or not Putin would prefer and support Trump, such is HIS RIGHT, as it is true for every individual and nation on the planet. The U.S. acts to sway elections in other countries, and should expect other countries to seek influence in our own. Hell, we even used mind control on the entire country of Bosnia to sway their elections using Command Solo Aircraft, as admitted by USAF;
d) that Putin risked an international incident, and arranged for the DNC computer to be hacked in order to share with Wikileaks, a Fake News story planted by who? The Democrats/Hillary? Planted when? In the heat of the campaign, and again well after they had lost. Who benefits? Democrats/Hillalry. If this was not fake news, why did the ‘honorable’ Democrat Congressmen NOW calling for investigation not call for it on day one? In truth, we now learn, John Podesta’s own personal carelessness with an obvious email phishing ploy lead to the least, and not hacking in the traditional sense as claimed by the Democrats, such that… (see next);
e) that all 17 US Intelligence Agencies agree that hacking by the Russians took place and shared with Wikileaks, which means the Office of the Director of National Intelligence, and the 16 INDEPENDENT agencies beneath it, EACH INDEPENDENTLY came to like conclusion through THEIR INDEPENDENT DETECTION/INVESTIGATION. This includes very unlikely Agencies, such as DEA, Atomic Energy, and each spy arm of the U.S. Military, non of which monitor anything more than those Web resources which impact on THEIR INDIVIDUAL MISSIONS. This Fake News was planted by who? Hillary. When? During the heat of the campaign, and again later, after loosing, renewed by Democrats. Who benefits? Democrats/Hillary. Again, if TRUE THEN, why wait until NOW to get upset about it enough to call for investigation? Email Phishing happens all the time, to everyone, and is way-too easy to detect to have been a sophisticated hacking effort by the Russians. It was Podesta’s stupidity, and nothing, else;
DO YOU SEE ANY PATTERN HERE, at all? But wait. We are not done, yet. Who are the other players in EACH and EVERY case? The same liberal media outlets that promoted Democrat/Hillary’s other campaign lies through the campaign. Soros. Many of the same Establishment Republicans who can’t stand loosing power to the People. So, who are the real conspirators, here? If you think about it, every player… Republican and Democrat Establishment, Hillary, controlled media, Soros… they are all part of The New World Order, either as front-line politicians with treasonous intent, or manipulated minions obeying orders.
I say Treason, because the NWO seeks above all else to destroy the sovereignty of all nations in favor of a One World Government; when your own congressional members and President seek to abandon your own laws and the Constitution in favor of Global laws contrary to your own, it is destruction of sovereignty, and therefore, Treason. When they are Bilderbergers or members of Skull and Bones or the Round Table Groups, which either require oaths which disavow the Laws of the Land or have policies and/or mission statements which support a One World Government, that is a violation of the Oath of Office, and is Treason.

Fake News real goal and threat: Democracy, the Constitution, Freedom

If those in media and government who deem themselves sole authority on what is and is not fake news are allowed to do so, We, The People, are doomed. In the tradition of the New World Order ploy of ‘creating a problem’ in order to ‘provide a solution,’ which was pre determined to achieve a hidden agenda, fake news outcry was launched specifically in order to proved just such a solution. By problem-solution-agenda, I mean that the solution just happens to be ready to go in time for immediate application (strike while the iron is hot… the people are lathered up and ripe for exploitation), and has some draconian underpinnings not readily visible without close scrutiny.
Example: As I first exposed in the Professional Paranoid Newsletter, and later in my books, The Patriot Act was already written prior to 9-11. Homeland Security was established secretly two years to the day prior to 9-11, but enabled by the Patriot Act, so it could be immediately ‘activated.’ Now comes fake news, and it, too, has ‘just in time’ legislation already written.
And lo and behold, both the House and the Senate have Bills already quietly being passed to counter ‘fake news.’ In the Senate, we have the Countering Disinformation and  Propaganda Act, and in the House, HR6393, part of the Annual Defense Intelligence Authorization Act, which has been amended to target ‘Russian Propaganda’ and, by association, other forms of ‘fake news.’
Now, the links provided above by me are deliberately from sites being officially declared by government and media as ‘fake news,’ but I defy you to find anything fake in their reporting. They give you the links to the actual material so you can judge for yourself, and reveal anything fake in their presentation. THAT does not meet my criteria for fake news, but because their report is contrary to the official story government would prefer, essentially whistle-blowing, it meets government’s criteria, and by extension, that of a controlled and biased media.
The scary part is this. Both of these acts give the government the power to establish what is effectively a Ministry of Truth (a la Orwell’s 1984), which can ultimately be used to completely shut down all dissenting voice in America and elsewhere, especially on the Web. It also can lead to establishing punishment for saying things publicly which oppose government, a de facto sedition law which inhibits free speech. That is one of things we went to war with King George over. 
Add into all this the additional censoring by Google and Facebook, and all you are going to be able to do is ‘guess’ what the truth is. Try using Google or any of the major engines to find something out using controversial or heated topics which oppose the official story. It used to be you got exactly what you requested. But now, you mostly get official versions up front, as if you didn’t really know exactly what to type in what you were looking for, and they figured that out, for you. To find what you are actually looking for, you may have to go pages and pages deep into the results.
Example: For this post, I typed in “What did trump really say about russian hacking” which produces almost exclusively opinions about what Trump said, not what he actually said. Even the one which comes close, does not go back to his original quote. It took me quite a long time to actually get back to his original quote. This is censorship for political purposes, in this case reflecting the desired liberal/Democrat and Establishment Republican desire to destroy non establishment Trump. To find the truth, ‘guessing’ will not cut it, and neither will accepting media, Google, or government’s claims, et. al.
Dig! Dig! Dig!

Related Posts:

Psyops TV: How They Dumb You Down and Set You Up
Fascistbook: The Growing Case for Government Targeting via Social Media

Who’s Killing the Bilderbergers?

Some 17 years ago, the Unified Conspiracy Theory was formulated. It was so accurate — it was able to predict in 1999 the 2001 downing of the WTC by jetliners and resulting Middle East Oil Wars, and other major news events. Now it can be seen at work in my newest book on the Bilderbergers — where fact and fiction collide… fatally.


by H. Michael Sweeney   Facebook  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
Upate Feb. 20, 2017 Paranoia Publishing is set to start shipping hard cover copies of this book as early as first week of March. Amazon will carry it right away. ebook copies available direct from author now at half price ($6 – will return to normal price once hard copy is available) via paypal orders to proparanoidgroup at gmail com. 

What led to this book? The definitive International conspiracy.

After ten years of research into crimes of the New World Order, I began to theorize that the bulk of America’s dark bumps in the night were not simply random crimes by assorted forces for varied agenda, but completely orchestrated as a single, logical, step-wise plan toward a single, yet visible goal. It resulting in the Unified Conspiracy Theory, and it was reasoned that if one knew the goal, and the steps thus far taken, such a plan was predictable, and as a theory, the ultimate test would be to do just that.

The first three predictions made with the UCT were so scary, that I had to take actions, do something… anything I could think of, to attempt to thwart them. The first was, that some kind of terror event would bring down the WTC with jetliners, and result in a series of Middle East Oil Wars. So, in the Fall of 1999, knowing no authorities would bother to respond usefully, or quickly, I published a quickly written screenplay featuring such a plot, and put it online with explanative warnings, hoping against hope it might force any such plan to be aborted. No such luck, of course, even though Oliver Stone’s people took a look at the script in search of a project. They thought it an impossible ‘false flag’ scenario.



The second UCT prediction was an assassination attempt on 1992 Independent Presidential Candidate H. Ross Perot, or his family, in order to force him out of the Primary run against Clinton/Bush. I took no chances, and this time, notified the Secret Service of my concerns, expecting they would ask me for details. I used my backchannel contact, someone I had worked with before on several Treasury matters. Some several weeks later, Perot did back out of the election, even though the very night he did so, he had won enough votes to be guaranteed a place on the General Ballot. A few weeks after that, my SS contact confirmed that an attempt had been made just before the Primary, against his family; mailed Anthrax. That has its own telling ‘false flag’ backstory.

The third was that there would be at least two more major false flag attacks to follow, specifically naming the type of attacks, and the cities. One of them was my home town, which I had predicted would suffer a bio-terror attack, and I even identified the means of delivery and rogue CIA Fronts to be used. But by the time frame where that might become a more current concern, I had finished my book set, Fatal Rebirth, which spelled these things out quite clearly, again hoping it might spoil any such plan. I also took steps to notify the City.

Again, no useful results, but fortunately, knowing such details enabled me to personally thwart that attack, or at least postpone it. It is featured on this Blog’s home page.  But I was definitely able to thwart second, different terror attack in the same time frame, likely a Plan B to the former. It was called Gas Station Tasking when announced by President Bush; the use of private planes to dive bomb the area’s largest gas station while a tanker truck was offloading gasoline, at the busiest time of the street traffic day. This is also detailed on the home page.

This could easily have taken out two gas stations, four restaurants, two banks, two two hotels, and potentially, two major shopping complexes, and the traffic on the busiest intersection in the County, plus a major Interstate and two State highways. Identified, were two of FBI’s Top Ten Most Wanted Terrorists, and others, including the Christmas Tree Bombers. They were getting help from an FBI Agent known to me, and so, as it was a false flag operation, FBI, CIA, FAA, DHS, in response to my going public, never asked for my evidence, which included fingerprints, video, multiple eye witness confirmations, and more. The cover up was started before the President even heard about it. See home page.


Why UTC matters to this new book

Other UTC predictions have since come to pass, as well. The reason this is all mentioned here, at all, is because the UTC does not just affect America, it relates perfectly to World affairs, as well. And in this world, we have various Round Table Groups of Globalists who push for a One-World Government, which is to say, elements of the modern-day Illuminati. Such groups as the Tri-Lateral Commission, the Council on Foreign Relations, and the Grandaddy of them all, the Bilderbergers, and many more (even United Nations, World Bank, et. al), all tend to be cut from the same New World Order mold.


This image relates to one of two strings of real World International murders footnoted in Who’s Killing The Bilderbergers, as cited in this book. From


Which in turn is to say, largely fascist, all-too often satanic, and decidedly power elitists seeking to rule the World through manipulation and control of (everything), and willing to do so at any cost, by any means. Not to go overboard, it is important to note that, with the exception of the Bilderbergers, most Round Table Groups, like FreeMasonry, attempt to draw in newbie membership who are completely innocent Sheep. This gives surface viability and credibility of these groups to mainstream in ways which allow them to mask the darker roles they play in seeking the Globalist rule, while also giving fresh students to draw into their world, especially the more successful up and comers. There is a backstory there, as well, as I have first hand knowledge, x 2 telling examples, having been such an up and coming business man.

Ergo, this new book is designed to do much the same thing as Fatal Rebirth; to warn you just what these people are doing, and why… and why you should be mad as hell about it and doing something to stop them. Only, my new book is global in scope, where Fatal Rebirth concerned itself only with America. And, while Fatal Rebirth began unfolding in 1947, Who’s Killing the Bilderbergers is a current-day affair. As such, it is perhaps more urgent, that you read it, and soon — because the future is revealed to be bleaker than the Dark Ages and time of the Inquisition, for those not forewarned and forearmed.


The plot thickens

I describe this book as ‘an International Novel of Novel International Affairs.’ A grand murder mystery across multiple Continents, trying to resolve mysterious death after death of prominent Globalist leaders. Are they simply random deaths by happenstance, or murders by elaborate design? Officially, they are not due foul play, and yet… each one has many unanswerable questions clouding that view. Just as troubling, their deaths seem to be tied to various strange conspiracy theories, while at the same time tied to various Globalist agenda, either narrative affording motive for murder. And, of course, it is soon enough discovered that they all turn out to be Bilderbergers.


Each Bilderberger tends to be an Officer or Board Member of multiple corporations, and has sway over yet others through major stock holder positions, or contractual agreements. Of course, many of these companies, in turn, control other companies, sometimes, long lists. Now, imagine what this Cloud Map would look like if we knew the actual identity of ALL Bilderbergers, and not just this handful. Then add CFR, Trilateral Commission, Club of Rome, Council on Foreign Relations, and on, and on; the Round Table Globalists; the modern-day illuminati.

By the time the truth of the deaths starts to be uncovered, the UTC will have started to reveal itself in action. In like manner to UTC’s ability to be predictive, readers will be propelled quickly into the future, headlong into the one final prediction which is the ultimate form of fatal rebirth… for us all. That particular prediction WILLmost certainly come to pass; it has, after all, been foretold by many authors well before my time. Among them, Satanist and high Mason, Adam Weishaupt; it is the entire purpose of and predictive goal of the Illuminati Plan, as he formulated it in 1776, when the group started their journey toward a New World Order (he first coined that term).

As this book reveals, just when it comes to pass, is largely up to you. You, are what you’ve been waiting for. They hope you don’t know that, and remain Sheeple.


An important detail

And, along the way to that story-ending element, readers will also encounter countless real-World conspiracies laid at the feet of Bilderbergers, all done in ways which let the individual decide for his or herself, which, if any, may seem fanciful, and which are more likely true.  There is much documentation within the main body, plus more than 150 footnotes (an average of one every page turn), to help that process along. Some of those footnotes are illustrated graphically. The Climax and Ending will then show you the progressional nature of the Globalist plan as it unfolds toward the very last step in the plan, the point of no return for Mankind. These conspiracies back up the UTC usefully, and in fact, understanding them helps refine the UTC more usefully; one tends to validate the other, in both directions.




Like or Hate Me, You May Wish to Quote Me

If I had a dollar, or even a dime for every web page that mentioned or quoted me or my works, I’d be a millionaire: 12 million pages can’t all be wrong; people repeat what I say. Where else but America can you become ‘famous’ for putting your foot in your mouth on a regular basis?

by H. Michael Sweeney    facebook

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.


What you will get by reading this post…

• Silly quotable one liners, gags, and full-on original jokes;

• witty quotable witticisms, wise sayings, criticisms, and other malarky;

• non PC quotable political snipes, barbs, and ruthless rhetoric;

• thoughtful quotable philosophical wisdoms, advice, and beatitudes.


My most popular writing today has been copied by permission on hundreds of Web sites, and reproduced in at least a half dozen books. So I know I’m quoted out there. It is even used in college courses on Political Science, Journalism, and Psychology. It’s called the 25 Rules of Disinformation, and includes not just how to spot disinfo, but how to out it and defeat the user in public or private venue.

This post is (mostly) a collection of my most popular Facebook posts. People generally like them, unless on the wrong end of the barb. Even then, the resulting dialogs have been interesting, and we tend to remain friends. But most people on Facebook do not ‘go looking’ for something to read, they let Facebook automatically send them random samplings in their ‘feed.’ It is really best to FOLLOW someone you like (also true of my blog posts); the only way to insure you see everything a given person posts (or blogs), is to follow them (subscribe — click that option now, while you are thinking about it.)

So, even if already a Facebook friend, it is highly unlikely you will have seen very many of what follows: a random grab bag of quotable material. Now, if you do actually choose to quote me, please do cite me as the source, and link either to this blog Page or the whole Site, or my Facebook page. New friends are welcome there, of course. You can quote me on that!


Quote on!

You May Wish to Quote Me (I do it all the time)~

If I had a dollar, or even a dime for every web page that mentioned or quoted me or my works, I’d be a millionaire: 12 million pages can’t all be wrong; people like what I say. Where else but America can you become ‘famous’ for putting your foot in your mouth on a regular basis?~

You may have noticed that I’m imminently quotable by the way I continually quote myself, because after all, “I’m imminently quotable.”~

The only good thing about putting my foot in my mouth so often is that I always know if my shoelaces are tied, or knot.~


T’was an LL Cool Day
(apologies to LL Cool J)

I saw an Armadillo while visiting Amarillo;
he sat near a willow, upon a satin pillow.
In the sun, bright yellow, this reclining fellow
seemed to be quite mellow, eating a bowl of Jello
while listening to a fellow who played a loud Cello.
Were I to say hello, I feared I must such bellow;
that seemed such a peccadillo, I ne’er met that Armadillo


If Google spies on your searches, shouldn’t their name be Goggle?
If Yahoo does, Youwho?
If Facebook tracks your info, Factlook?
If YouTube censors excessively and politically, LubeRube?
If television is propaganda, Tellyourmission?
If a newspaper is the same, Newsfaker?
If the Oval Office is a source of lies and skullduggery, the Shovel Orrafice?~


From conversation (click for their similar answer to meaning of life)

The meaning of Life? To take all gifts entrusted to you by God; Free Will, life, and the Soul which defines the inner you, and the gifts you earn through life; knowledge, talent, skills, wealth and possessions, experiences and positions… to edify yourself, edify others (family, those above you, your peers, and strangers), and above all, edify God in the doing. This is true Glory, and the source of Blessings.

To the extent you do this, you yourself fabricate that meaning. To the extent you fail to do so, you dilute or even destroy it. Any faults or failures you have along the way are challenges in learning, and otherwise non sequitur to the equation. This is true Faith, and the source of Happiness.

Don’t focus on them, learn from them, and go on. You are what you’ve been waiting for, all along. Stop looking so hard for simple answers, and stop struggling so hard against battles predestined to be won by the righteous. If God be for you, who can be against you? This is the true foundation of Peace, and the source of Strength.

The meaning of life, is YOU, and I’m glad you have friended me. As I wish for me, so I wish for you. Thank you for sharing this Sunday with me.~


Wisdom is sometimes knowing how to seem wise without anyone’s means to challenge. After struggling to the top of the mountain to ask my one-allowed question of the Guru, he preempted with an answer: “Yes, my Son,” he said, “you have at last made it to the top. Now leave me in peace.”~

I wonder if Pavlov’s Dog’s got that way eating Pavlum? Probably not, it wouldn’t make me salivate.~

You know your’e an alcoholic and an unpleasant drunk if people invite you to their parties the day after, and you are so sloshed you think you just got back from it.~

I’m sorry, but I think I misunderstood what you wanted me to consider about what you probably meant by saying what you thought I would be able to relate to as allegory to the intended thought you had in mind, but couldn’t articulate because you were afraid I would misconstrue it as something else. What were we talking about, again?~

A dirty joke is to humor in a way exactly like the Presidential election is to politics.~

Rain falls in drops because it’s happy water. When it’s mad, watch out for hail.~


Old Crow

Oh, old Crow, so cautious and suspicious,
not like the Goose, who’s calm with aplomb,
your caw is such an appalling loud calling,
unlike parakeets most cheerful earful,
or eagle’s shrill cry from high in the sky.

Your old black cloak does fail to evoke
the visual delight of a Parrot, so bright.
You walk with a hobble and a wobble,
where a Robin bounces and pounces,
and the Stork is stilted and often is tilted.

And though your flight is quite alright,
it’s not as stunning as a Bird, Humming.
Lacking the Hawk’s glide so full of pride,
sans any formation of Geese’ inclination,
nor is it as swift as can be a quick Swift.

Your Murder is a suspect some fear to detect,
and yet, I suspicion, it’s all mere superstition.
Yet do not away rush, my criticisms to hush:
let not any objection be seen as a rejection;
I do like you old Crow, so brag on, and crow.



To escape vile fate I must get past that damned wall;
because if staying here, I’ll not likely survive it at all.
I tried to climb upon it, up high, no good, then higher,
only to find it topped with wickedly sharp razor wire.
I tried to go around it, hoping an opening I would find,
but it surrounds me completely, and I’m trapped inside.

I tried to dig under, tunneling deep, deep underground
but impassable boulders and water did me confound.
To escape my foe I must get past that heartless wall;
I’ve no choice; to give up certainly means my downfall.
I’ve asked for help from all near who might could hear,
they refuse to give aid, yielding to their own dark fear.

I’ve prayed to God to help, to redeem and set me free,
but I’m afraid in here, even He can’t hear me or see.
Then came a gentle voice advising firmly to be still,
“I’m with you always, as is my gift of strong Free Will.
To escape your foe, you must get past that mere wall,
and there is yet one thing you’ve not tied, not at all.”

My thoughts reeled, and the answer came in a flash,
I’d not yet tried attacking head on, the wall to crash.
I gathered my courage and backed up for a good run,
and ran headlong screaming at the top of my lung.
I hit that wall with all my brute force, and hit it hard:
knocking myself unconscious right there in that yard.

To escape my foe, I’ve tried it all, to get past the evil wall;
but nothing has for me worked, no not one, nothing at all.
I awoke quite dazed, my fist clinched in pain and my rage,
the voice had not well helped me, its advice was not sage.
But regaining my feet, a white robed figure there stood tall,
amid the rubble of that same accursed, impassable wall.

“You’ve escaped your foe,” said he, “right through the wall;
not by your strength, nor luck, but that on me you did call.
The miracle you sought was within you right from the start,
your faith in me was all it took; and abiding love in your heart.
If God be for you, no man or thing against you can stand,
when you hit that wall, I was there with you, hand in hand.”


Sorry if I insult you. Being poor, I have to go for the cheap shots.~

Any man can toast his friends at the tavern. But a brave man toasts his enemies. That’s why I always carry a can of lighter fluid when I go drinking.~

I never quite chimed in with the 60’s by wearing bell bottom pants – until I got kicked in the groin.~

I’m never inclined to eat carrots. I just can’t see my way to do so.~


Linear or Columnar?

A rhythmic rhyme in a single line is often quite fine.
but most like a rhyme
to be of many a line,
or to metrically align; 
be symmetrically sublime,
or perhaps its just fine
to enjoy any old rhyme.


Political Risk

I’ll not vote for she who does cackle
when refusing a tough query to tackle.
While not happy with alternative Trump,
he’s still better than a kick in the rump.

While Dems are OK with criminal lies,
and Establishment Reps swarm like flies,
a candidate ripe for an email blackmail
risks a serious national security fail.


A lot of drinks call for two fingers of this or that liquor, so I always look for bartenders with really big hands.~

The path to illumination in the darkness is called a sidewalk.~


Political Seuss

I do not like this Uncle Sam, I do not like the health care scam.
I do not like these dirty crooks, or how they lie and cook the books!
I do not like when Congress steals, I do not like their secret deals.
I do not like this speaker Nan, I do not like this ‘YES WE CAN’.
I do not like this spending spree, I’m smart, I know that Nothing’s Free!
I do not like their smug replies, when I complain about their lies.
I do not like this kind of hope. I do not like it. nope, nope, nope!


There are rarely times when ‘actual’ sex is as good as ‘fantasy’ sex is imagined. However, they both involve a little ‘t’ & ‘a.’~

The only ‘gun control’ I support is that question in the mind of the criminal intent on causing trouble, “Will he remain in control of his fear or temper, or will he pull the trigger.”~


Politic’s Ticks

If Trump is such a chump we’d rather dump,
and Uncle Bernie is ample wormy and too squirmy,
and Hillary far too shrillery under FBI drillery,
with liberally bias in the press giving truth no redress…
Does that mean Biden is bid’n his tim’n in decid’n if rid’n
White Knight like last minute to the Demo’s pandemic…
Is that how we’ll be decid’n who’s presidential presid’n?
Is that Obama’s last prick on his way out, his hat trick?
That I won’t at all be abid’n, down too far we’ve been slid’n.



Yes, wine is quite fine when you have the time, or dine,
but weed has more speed if you have the need; do proceed.
The joke for this bloke is that I cannot smoke, nor toke,
and shrink from such drink – an alchoholic’s dread; brink of stink.

Dope lacks hope that I’ll survive or cope its scope,
so here’s my fears (why I’m lacking cheers amid tears):
this guy will die having never daring a high to try.
That hex did vex untill realizing that the Rx is sex!~

Never hiss at a snake; the conversation could be deadly.~



Do you know anything of the Entymology of Entomology,
or is it to you as confusing as the synopsis of synapsis?


Hillary’s Ruin
(What difference does it make?)

As I have previously stated,
I am quite totally devastated
not to have been reinstated.

I have frequently formulated
and as often have postulated
just why I’m not yet reinstated.

The cause, you see, is equated
with rumors and lies oft related
to prevent my being reinstated.

They shout with glee, as if elated
with prideful egos thus elevated,
for blocking my being reinstated.

They say my claims are overrated,
to a job where I ne’er participated,
and that’s why I can’t be reinstated.

If people died while I simply waited,
shown in lies and emails evaluated,
what difference to being reinstated?

My right, you see, as Royal rated
is for all to worship me unabated,
and vote to have me reinstated.


Never apologize to me for being you. Just stop it!~

Why do some of us eat the icing out of the middle of an Oreo? Where else would it be?~


Seasonal Orb

I saw last night the thinnest sliver of a silver Moon,
a most pleasant crescent, present this month of June.
So thin that it did quiver and thus scant light deliver,
did I realize before my eyes it would dematerialize.
Now its gone, but before too long, watching for its rise,
to my boon:
 it shall return soon, as a mirror sliver Moon.


Rhyme Defined

A simple rhyme takes little time,
a light banter with good cantor –
best if exquisite, expressed explicit;
easy to recall in its all and all.


In A Rush

Here”s a quick li’l poem:
done now, I’ll be goin’.


What’s wrong with the Mayor of New York, does he not know his soda ban and tax is suppressing Pop Culture?~

Unfortunately for Custer, at least 10 Little Indians never heard that song.~


Time Tells No Tales

Once upon a time? No, I’m highly suspicious.
If it only happened once, it must be fictitious,
especially if remarkably good and not malicious:
Real events repeat themselves through history,
written down in pages for study by you and me,
where learning not, we assure repeat eventuality.


Dear Fascists

Take heed, look around: here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.
Your words will not sway me, no dark threats dissuade me.
Take heed, look around. Here stand I, I stand my ground.

Never again will I back away, here I stand, and here I’ll stay.
No trick or lies, nor treachery will keep me from remaining free.
No unjust laws, cops or military will I respect, still shall I tarry.
Take heed, look around: here stand I, I stand my ground.

Never again will I back away, here I stand, and here I’ll stay.
Surround me with vile forces, I’ll ignore their foul loud voices.
Dare attack me if you will, I’ll reply ten fold until my body’s still.
Take heed, look around: here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.


They say the Earth’s rotation is slowing down. I have a simple cure. We all get in our cars and face them West, and synchronize burning rubber.~


Status Quo: Latin for we want you to think things are equal and as they should be so you
will shut up and do what you are told

Parity: French for we want you to think things are the same and as they should be so you
will shut up and do what you are told

Equality: Ye olde English for we want you to think things are the same and as they should
be so you will shut up and do what you are told

Same: what we mean when we are talking about one political party compared to another,
those people who want us to shut up and do what we are told.


I thought of a Hillaryous joke, but I don’t want to keep insulting Democrats.~


Social Litmus

Do my witticisms impress you or simply depress you?
Do my jokes make you laugh or think me some Jackass?
Do my poems seem lyrical or are they just predictable?
Do my posts give enlightenment, or seem closer to excrement?
Do you share, like, and follow, or is our friendship just hollow?


Smart by Default

Any wisdom I have lies in taking some care
in choosing the friends with whom I will share.
If smarter than me I will make them aware:
I agree with them, and with flattering flair.
If not as smart, then will I then declare,
their inspiring thoughts lead me to dare.


A tack pins things down, while pins prick things deeply, but a prick is always tacky, hard to pin down, offending deeply.~

Time for me to post-a-joke. Invented by a stand-up comic, it’s like a Post-it Pad, without any glue to hold it together — so it’s insanely presented in unexpected ways, and it is colorless, unless fucking off color or borrows the color of a racial inference. Wait… that’s a political speech.~

I think I understand the term ‘feedback loop,’ now: GMO crops.~

Shoot first and ask questions later. It saves dialog and you don’t get ambiguous answers… if there are any answers.~


Being Outspoken

I’m the first to admit I know so much about everything,
an expert assumed, presumed, or claimed unrelenting.
In truth it seems, I know not enough on any one thing,
to avoid putting my foot in my mouth without realizing.


Your Bad, So Sad. My Bad, And Glad

If you insult me, let me be quite perfectly clear,
you’d better be right in your basis, my dear,
because logic, facts, and reason, you’ll hear,
the weapons my response will burn in your ear.

Excuse me if I’m less than politically correct,
but especially if trying to point out your defect,
you have no legal right to avoid being upset
by my Free Speech, you fucking dumb idiot.


I’m not going to post anything useful, today. I hope this heads up proves useful. Doh!~

I get rejected a lot by the ladies. I asked one gal if she would like to go out on a double date, and she said “Sure. How about Judgement Day, and the Day after.”~

Hurry, hurry, hurry! Step right up folks, and get your fresh posts, right here, right now. Only $1, five for $3, and a surprise in every one, guaranteed, or your money back. Don’t be misled by the competitor’s claims; they only post kitties and slogans, and complaints that no one comments. Hurry, hurry, hurry!~


My Prayer today, is for you. There is nothing better than other people praying for you, especially if praying WITH you. We’re not getting older, just getting closer to home! Be Still, and at peace. Now, it is true that the Lord’s Prayer is quite sufficient and complete to God, but sometimes, we feel we want to say more. That is good with God.

May I suggest the prayer below? If ye pray it as you read, it is the same as if we have done so together; Matthew 18:19 “And I tell you more: whenever two of you on earth agree about anything you pray for, it will be done for you by my Father in heaven.” All that is required is that the prayer be righteous and fitting to God’s Will, which is defined to the extent we are able to determine in his Word. If we do not vary from that, we are apt to receive that which we NEED, if not that which we THINK we need and seek by prayer (be careful what and how you ask for [it].) Begin:

Heavenly Father, thank You for each and every day; today is a Day the Lord hath made, we rejoice and are glad in it, for You have blessed us here on earth yet again. Thank You for Your tender mercies of your Grace, and the gift of life and of Free Will, which lead us through the day; may we not abuse these gifts and offend You. Thank You for giving us family and friends to share the joys and burdens of the day. I ask You to bless my family, relatives and friends and those I care deeply for, and those who are reading this right now, especially those who are suffering and in need of your intervention.

Where there is joy, give them continued joy. Where there is pain, give them peace and mercy. Where there is self-doubt or confusion, release a renewed confidence and understanding. Where there is need, fulfill their needs. Move them to study your Word, to strengthen their faith and embrace the Gospel, and to be moved thereby to spread the Word. Bless their families, homes, finances, their goings and their comings, and turn aside their enemies in forgiveness, which is to our good as well as our enemy’s good.

Above all else, may Your Will be done, in Jesus’ name,~


If Istanbul used to be Contstantinople, does that mean they got tired of constantly being in Ople, wherever that is?~

Just because I disagree with you does not mean I don’t like you. I hate everyone equally.~

A conspiracy unfolding is like a barrage of arrows in the dark. You hear evidence that something is not right, but don’t don’t get the point until it is too late. Worse, you also get the shaft.~


Desperate Conclusion

My mind, not very clear right now, so
writing some clever rhyming ditty? No.
But I know some of you like that stuff…
So there’s only one question:
Is this good enough?


Good example of a self-fulfilling prophesy: “I’m going to enter the hot dog eating contest.”~

It must be true that you are what you eat. I live on $3 a day in food, and one look at me and you will know, I’m a cheapskate.~

Why do they call it an aptitude test? Because if you have to take one, you are apt to detest it.~

You will note I don’t call people who don’t agree with me bad names. That’s because the bastards have thick skins.~


Digital Death

My computer is dying now of old age,
and while buying a new one is truly sage,
and newer models are quite all the rage,
there’s nothing but zeros on the last page
of my checkbook; no income at my age.
My mouse is destined for the round cage,
unless comes a miracle or magical Mage.



A chant can be a kind of moving song,
easily remembered for singing along.

A chant can be a loud and angry jeer,
prompting attention, worry, and fear.

A chant might be for someone; a call,
for entertainers or leaders loved by all.

A chant gives power to thought and word,
assuring its message is clearly heard.

But a chant by Monks is the best to hear,
binding us to God and drawing Him near.


If I have a Colon for which I might need a Colonoscopy, and use :s and ;s in a similar manner all the time when I write, why can’t I get a Semicolonoscopy, and save some money?~

Lately, I’ve been thinking of taking a plane somewhere to improve my sex life. It won’t matter where, I just going through TSA will do the trick.~

OK, time for me to say something funny. But that would be deja vu.~

The next time you hear some wimpy Liberal whining about some perceived micro aggression, say to them, “To quote an oft used line in The Princess Bride, my little precious Princess… ‘I do not think you know what these words mean.” Then slug them in the mouth and say, “You cannot ‘micro’ that; there would be no point.”~

Since I’m left handed, I never need a Compass; I just use my southpaw.~


Since there is no longer rule of law in this country in high places, such that no one in government is held accountable, and the very laws they write are themselves violations of law (unconstitutional), and government itself is the biggest criminal… I reserve the right to violate ANY law at ANY time for ANY reason.

My authority is the Constitution, my basis the Pursuit of Happiness declared therein, my means is Civil Disobedience, my support is the Second Amendment, my argument the First Amendment, and my goal is the Redress guaranteed therein. I rest my case, and those who choose to oppose me may rest in peace, if that be their choice. No appointment needed.~


An election process is like a stale fast-food hamburger. On the outside it looks big and besprinkled with seeds of wisdom. On the inside are secret conspiratorial sauces and lies about quality and quantity of substance, and wilted vegetable-like promises. Do you want fries with that? Cold, greasy, and slimy press coverage.~

Never wander around in the dark. That would be you watching TV ‘news.’~

When people talk about shooting at dummy targets, are they hinting at politicians?
Is that why you never see politicians at a gun shop or shooting range?~

I encourage free speech. And, I own the concession on ear plugs in the District of Columbia.~

Cat got your tongue? I don’t know how you can stand there so silently, I know I’d be screaming; that’s got to hurt like hell.~


PC Friends?

Politically Correct is not for me, my friend,
the 1st Amendment says I’m free to offend.
My words, ideas and actions do not pretend,
that you’ve no right against them to defend;
just do so to my face with honor and it will end
with agreement or no, but still friend to friend.


Waiver Not

Never Opt for signing a waiver,
never waiver in copping a sign;
raising up high a middle finger,
rather than your rights to resign.


Prosthetic Prose

Prose is prone to rhyme in a rhythm so quaint,
but to intone it sublime; a sure given it aint’


Alien observer’s notebook: Man is a lousy Plumber. He must think the Ocean is impure because he keeps trying to filter out the fish with giant mesh filters. Silly creature. When that doesn’t work, he drills holes in the Ocean floor to drain the water out.~

Someone said I might should listen to Meatloaf on CD. I don’t get it. As soon as I put a slice on the CD, it stopped sizzling and I couldn’t hear a thing.~

Does the FCC really know what they are doing? I find myself waking up to AM Radio, so I know what they mean when they say ‘Morning Radio.’ But while I can find an FM station, I can never seem to find a PM station. They need someone from the NyQuil folks to run the outfit, I think.~

The answer to the age old riddle: what came first, the Chicken, or the Egg? Answer: neither; it was the Rooster. (surely, someone else said this somewhere, sometime earlier)~

I must be a looser. There was this gal I liked who always bought fresh produce. But when I got fresh, she just slapped my face.~


Big Enough

To big to fail cost you and me,
for bailouts, and lost property.
To big to nail, cost prohibitively
the national debt ridiculous, be.

To big to jail cost you and me,
for hall passes for Mz Hillary.
To small to hail, just you and me,
our vote has no voice collectively.


It’s It

Time to offer up a bit of wit.
Something funny to any Brit?
Are you worried just a we bit
about a future Brexit bad sit?
Afraid there’s no way out of it;
to escape a daily diet of shit,
Mushrooms often get slit and bit.


Falling Sky

Chicken Little a warning did brae,
none believed in what he did say.
Many long years since passed away,
we still refuse to believe him today.

Yet Planet X and Wormwood obey
God’s Will and ARE heading our way.
The moral to me seems thus to say:
good Chicken Littles should now pray;
for it is written, “None knows the Day,”


I never did well in Science Class. I still don’t know the conversion factors between celsius, farenheit, and college degrees.~

Hillary avoids Potatos and Corn. She knows they have eyes and ears and might testify.~

Gmail just informed me my folder :”Hate Mail” is full. Half of it is from Democrats, and half from Republicans. The difference is, the Republicans tell me exactly why they don’t like me, and the Democrats only tell me how they feel.~

Taxes are a fiction, just as are the wages taxed; when the dollar is nothing but an I.O.U., you never really get paid, and so, you can never really be taxed or pay taxes, either. Credit and Bank Loans are a also a fiction, just as are the checks (also I.O.U.s) used in obtaining the loan or repaying it ­– and the bank didn’t even have the money to loan in the first place (allowed to loan up to 20 times their bank deposits). We just keep spoofing each other to solidify the illusion.~

If you still hate someone after putting yourself into their shoes… then they are obviously too tight because you are too big in your own mind for your own good, fat head.~

Be thankful I’m retired. If I was doing this full-time, I’d bore you to tears.~

Now days, the only way to achieve inner peace, is to scream at the top of your lungs for the politicians and newsmen to fucking go to hell, until they actually do.~

Dear government, and megacorps: Winning is not taking rights away with legislation or getting the contract for weapons to be used at Armageddon. These things are mutually assured destruction.~

When people say not to worry about things, “They will get better,” I think they must mean that the things that worry you will get better at doing that.~

Never take the last train from Clarksville. Its full of Monkeys.~


Theorist’s Conspiracy

Open the door to news of tragedy obscene. The lunacy involved, what can it mean?
Turn on the light and survey the crime scene – see Rats scurry trying not to be seen.
Catch one, make it come squeaky clean: Federal ties found amid many lies between.
Note all such oddities you might glean, contrary to the official story quite glassine.
Compare to what others have seen, conclude just what it really all does mean.
Forget now all you once had been, you’re now a conspiracy theorist, a sin.


In case you are wondering, yes, I used to do stage comedy in talent contests. Often got a first place. That was great; being the first person put on the bus out of town, I got to choose the best seat.~

Let me apologize in advance for insulting you. I’m not going to stick around in case you start swinging.~

The Federal Gov has gotten to be such a big asshole that it doesn’t even have to fart to stink up the whole country, but it does so continuously, anyway. If Hillary is elected, she plans on feeding it beens and drinking water from Mexico, giving new meaning to when the SHTF. I’m thinking Trump is the BEANO.~


A Noun is a word that has a ROCK solid object identity.
A Proper Noun tells the actual name or title, my dear SIR, or may I call you JOHN.
A Pronoun is an Avatar stand in for IT.
An Adjective tells you a IDENTIFIABLE personality.
A Verb is a word in MOTION.
An Adverb tells you its VERY measure.
A Preposition pre positions the Noun TO Verb relation.
A Conjunction forms a junction function between word thoughts, SO don’t get confused.
A Contraction is a contracted attraction giving traction to two words as one, a marriage licensed by apostrophication, or a foreshortening of a word as a slang thang for those who were THINK’N they HADN’T the time or space for two words.~


I had a Checklist but can’t use it as I haven’t written a check since Debit Cards came out.
I had a folding Map but I can’t follow it because there is no place in my car’s dash to plug it in.
I had a Plan but I can’t follow it because the steps don’t appear on the Dance Dance Revolution pad.
I had a contract but I don’t abide by it because I already held both the first and second Parties. Sorry I didn’t invite you.
I had a Letter but Sesame Street is now on a channel I don’t get.
I had an envelope but didn’t give a lick.
I had a Folder but since I no longer need the checklist, plan, contract, letter, or envelope, I threw it away, too.~


A Conservative Politician in Office is conservative in measuring out his power to avoid angering the voter; he fears the people, where a Liberal believes that governmental power is end all-do all, and they use/abuse their power to manipulate the people by fear of government.

A Conservative Government heeds its own laws by conservative judgment, where a Liberal tends to apply grains of salt, rationalize, and bend slightly, each time taking more liberal advantage until it is in time fully lawless.

A Conservative Government writes Laws which are conservative in principles within the limitations of its Charter (The Constitution, Bill of Rights), where a Liberal (by the above means) takes liberties in lawmaking which take liberty out of the Law; they become increasingly unconstitutional and negate the Bill of Rights.

A Conservative Policy must always fit the national interest in obedience to Sovereignty and which honors the Charter, where a Liberal is interested in reformation to a new model, almost always globalist in nature (i.e., favoring United Nations, One-World Government) and is willing to sacrifice the Charter and Sovereignty for that agenda.

A Conservative Politician thinks in terms of limitations per the above, which allows personal and corporate governance to be at ‘”Liberty” to flourish and pursue happiness and wellbeing, trusting the people to seek what they will for their own good, where a Liberal thinks in terms of socialistic Agenda which stifle or suppress these things ‘for the good of the people, of whom they think cannot be trusted.’

A conservative understands that to become elected or to move legislation, there must be an accommodating compromise between the ideal and the attainable, where a Liberal will promise anything to get what they really want, or take any drastic measure to get what they want, even if it means legislation which cannot possibly achieve the stated purpose, and especially if it serves some unstated agenda per the above.~


Panic is in abundance, as is a loose tongue, when the SHTF. Calm reason and restraint is called for. Take a deep breath, grab a cold beer and reflect before commenting. But if the bullets are flying around you, SHOOT BACK AND SAVE THE DIALOG FOR LATER. That’s when you will really need that beer.~


Why do they call them a POEM when no other word quite right rhymes with poem?
Why do they call them a JOKE when the point is a hard straight poke?
Why do they call them a SONG when it’s really a sing?
Why do they call them a RIDDLE when the answer is a clue in the middle?
Why do they call them a SPEECH when it gives you the claps or makes you boo who?
Why do they call them a REport, REmark or REply when it’s actually the first time?
Why do they call them a QUESTion when instead of taking the path to the answer on your own,
you leave it to another to do?
Why do they call them a PARagraph when there’s really only one?
Why do they call them a SENTENCE
when they rarely involve a judge?
Why do they call them a STORY when they don’t have walls, cielings, or floors?
Why do they call this a POST… oh, wait, I know: because that’s what it’s as dumb as.~


Why is it that you can talk to ten strangers and 7 or more of them will believe or agree like minded if you tell them…

About a UFO you’ve seen…
About 911 as an inside job…
About Global Warming as a sham…
About CIA and the mob killing JFK…
About chemtrails vs. contrails…
About a Bilderberger NWO/Illuminati conspirators…
About mind control, gang stalking, Voice-2-Skull…

But when you talk to ten lawmakers, law keepers, medicals, or reporters about any of that…
You are suddenly crazy to the point of risking forced evaluation?

Because the System and its professional armies are taught not to believe in the boogyman (who arranged for their lessons).~


The addage “Follow your dreams…” with respect to career can end terribly, UNLESS you take the RIGHT path:

1 toe in the water as a hobby… Insures you really do like it and have basic skills required.
2 build a boat taking courses in the trade, even if mail order or online. This will confirm
if you have actual talent. If not, start over w next best passion.
3 float the boat as intern. This will educate you as to the harsh realities and negatives of the
trade. Lets you confirm you like it, and regardless, gives a leg up on others for getting the job.
4 if you get this far, set sail as employee, setting aside savings. You WILL do well if you are ‘all in,’
what some call the ‘work ethic,’ which is simply doing your best.
5 with savings, buy a yacht by starting your own firm. That will plot a course to your dreams.

More: at all levels, start a small home-based business for both the experience, income, and tax benefits. This allows you to build resources (eg, instruments for a musician) less expensively and helps build your resume, client base, networking resources. I have NEVER not operated my own business since entering high school, and most related in their start to my first entry into a given field of work, at the hobby stage. I have therefore mastered and become successful in many fields and industry sectors, and despite having only a high school education, I’ve been granted four experiential degrees for the purpose of teaching at college level.~


My Mom always told me not to play in the street. She was right. The freeways are much more fun – if you are agile and don’t mind the blaring horns and screeching tires…~

What did the politician say to the activist? Nothing. He doesn’t pay attention to those voters, either.~

You are free to disagree with me as long as you understand I am never wrong and never make a mitsak ni anteing I sae.~


Modern Debate

What I believe is true. If you disagree, screw you.
I know I’ m right, I do. I’m clearly smarter than you.
Don’t you dare try to argue – untill your face turns blue:
What I believe is due – to claims I find undeniably true.

Your facts will not do, they confuse what I know is true.
Such reality I pooh pooh, my mind made up for me, you
see; I won’t listen to you. What’s that you ask askew?

No, I no not just who said, but some kind of Web guru.
Its not important just who. But I know it surly wasn’t you.
What I believe is true. If you don’t agree, boo hoo to you.
Truth’s what I want it to be, no matter what you say or do.


A Democrat Congressman and a Republican Senator walked into a bar… Wait! That’s already as big a joke as can be…~

Notice: please note… In case you haven’t noticed before. Have you ever noticed there is hardly ever been and important notice delivered or posted such that you actually noticed? Nah, I bet you didn’t even notice any such post. I hereby give notice that, if you noticed this post, or not, this notice is not such a notice, but merely a post giving note to such.~


Dos You Got Down Wid Wad I Be Say’n Bout Dis and Dat, Bro?

Dis, Dat, and Dos, as ‘hip’ as they could be, went into a bar to get a drink. Dos bought the 1st round of beers. Once served, Dat said “Dis be good ‘n stuff.”

Dis replied “I try to be good like dat, you know? Mama sez to.”

Dat saw Dis was confused, “Thank yo for the compliment, Dis, but dat not wad I meant. We all be drink’n da same brew and dat be good’n stuff.”

Dis and Dat seemed confused. “Look, Man, dis is on tapn we don’t be know’n wad it be,” he clarified.

Dis choked on a swig. “What yo say, bro? No one be tap’n on me, so natch, I dont know wad it be.”

“No, Man,” Dat tried to explain further, “Dis beer be tap beer. It be good, but ah dont know wad it be.”

Dis, at least, finally understood. “I got yo drift, now, Man. But I heard dos tap beers were cheap’n stuff. You know, po shit wid no taste. So wad dis be?”

Now Dos complained. “Wad yo mean… yo be sayin I bought cheep beers?”

And now, Dis was confused, once more, too. “I be just fine, bro. Why yo ask wad I be?”

At this point, the bartender happened by. “Hey, Man,” accosted Dat. “We be wond’rn… Wad be dis here beer?”

Dat be Dos,” he replied simply. “Dat be good, n stuff.”

Dat seemed upset, now. “Look, man, we been all through Dis be’n good, n stuff. But if yo be say,n I sho nuff should be like Dos… dat Dos be gooder,n me, I take ‘ception to dat. Yo don’t know Dat, and yo sho as Hell dont know me.”

Now Dos was miffed. “Hang on a sec, man,” he said to Dat, “yo sayin yo better’n me?”

Well, things went down hill from there and it looked like a fight was about to break out, when the bartender tried to calm them with clarification. “Dis be rediculous!” he started.

But Dis did’t give him a chance to finish, and knocked him on his ass!
 “Ha!” he exclaimed. “Yo dumb ass be’n on da flo wid yo dumb fat mouth bleed’n wad be rediculous.”

This unexpected event had disrupted the conflict between Dos and Dat long enough that they had calmed down. Dis suggested they leave, and all agreeing, they stormed out in a huff.

As they exited, Dis noted “We stiil dont know wad dat beer be. I sho nuff wish I knew.” 
The others agreed, none of them noticing the neon sign in the window reading “Dos XX on tap.”~


If Trump is such a chump we’ rather dump, and Uncle Bernie is ample wormy and too squirmy, and Hillary far too shrillery under FBI drillery, then does that mean Biden is bid’n his tim’n in decid’n if rid’n White Knight style last minute to the Demo’s how we’ll be decid’n who’s presidential presid’n?~

What happens when a Socialist politician, an establishment Democrat, a non establishment Republican and an establishment Republican go into a Bar and call for a round on them, each? The price of drinks goes up, the waitresses worry about deportation, the bartender adds water to the drinks, the bouncer calls a reporter, and the Janitor worries about having to clean up all the bullshit that’s about to be spread. And, the patrons realize the hangover isn’t going to be worth it, and they leave.~



Ferrari facing cataclysm!


Fractured Isms.


Ferris Beuller (Matthew Broderick) had it right. “A person should not believe in an “ism“, he should believe in himself.” In other words, don’t be a follower of someones ideas. If you want to make a change for the better, YOU are what you’ve been waiting for.

Here are some (twisted) examples of perhaps why isms can be problematic…

Capitalism: You have two cows. Sell one and buy a bull to start a cow factory. Worship in any church you want as long as you tithe a portion of your stock options. John Lennon is a famous millionaire singer invited to sit on your Board of Directors. Apple Computer stock looks attractive, so you merge to form Cowpile Computer.

Socialism: You have two cows. Give one cow to the government to slaughter and share with the poor. You worship in any church which is left or right of center. John Lennon is a folk singer of meaningful Marxist ballads. Apple Computer is bailed out by Congress whenever its stock falls below that of Microsoft.

Communism: You had two cows, but now the State has them, and may or may not give you some milk – if you are willing to stand in a long line. You do not go to church except to attend Party meetings. John Lennon is a decadent influence on youth. Apple Computer never was, because they refused to allow government to take more than one bite of it as it would ruin the logo.

Fascism: You had two cows but the government forced you to sell them to corporations for beans (magic or otherwise) who in turn sells the dairy and beef products back to you for huge profits. You go to the same church as the fearless leader, or you don’t go at all. John Lennon sounds like he was related to a Marxist and so he was shot. Apple Computer was burned to the ground in order to blame Compaqism and sweep Bill Gates into power.

Nazism: You had two cows but the government arrested you for hording and took them. You and your religious fanatic family are burned alive in your church for refusing to Sig Heil. John Lennon was in there with you, singing Give Peace a Chance. Apple Computer users are arrested and sent to camps for daring to ‘Think Different.’

Anarchism: You have two cows running down the freeway causing car wrecks. Shoot the tax collector, steal his money, and rape his dog (unless a hunting dog – but since it is a government dog, we know that dog don’t hunt.) You blow up the church. John Lennon sings Revolution. Macintosh Computers have a high repair rate from all the bullet holes.

Constitutionalism: You have two cows and the government cannot unreasonably search or seize them without a warrant, or prevent them from mooing, or prevent you from owning them and forming a militia of fellow cow owners who meet weekends and practice milking with dummy targets. You can’t figure out which of the thousands of churches to attend. Neither can John Lennon, so he writes Imagine. Steve Jobs was a Founding Father who wrote the ‘Consitution for the rest of us.’

Patriotism: You have two cows painted red, white, and blue. Your church supports the current war. John Lennon is boycotted, and so he has a sleep in. Apple is not sold to anyone unwilling to pledge allegiance to Microsoft products.

Militarism: You have two cows which you have convinced each that the other is seeking to invade their own private pasture. You sell arms to both sides. Your church owns stock in your company. John Lennon had his visa revoked because he was a pacifist who smoked pot. Apple Computer is what makes smart bombs smart.

Pacifism: You have two contented cows which give canned milk. Your body is your temple (and you are what you eat.) The government is headed by John Lennon. Apple Computer listens to its customer complaints.

Fatalism: Your cows died after you stopped feeding them because you figured they would just die, anyway. It was the same reasoning by which you determined God is dead. You never heard of John Lennon. Apple System error messages all start with ‘You should have known better than to think this wasn’t going to happen…’

Surrealism: You have a pasture full of Dell Computers searching the Web for the best price on a Macintosh. The government worships you. There is no John Lennon, because he would have made sense, so he instead turns out to actually be Ringo Star, who never quite did.

Bushisms: Is your cows in my Big Mac? I’m a God fearing man on Sundays. Which one is Lennon, and which one is Lennin? I will not have one of those damned Macs on my desk. Jobs didn’t contribute one cent to my election fund!

Clintonisms: Wow, look at those udders! I’m a God fearing man on Sundays. I liked John Lennon. We had a lot in common. In fact, I inhaled once, myself. I don’t know about granting Apple a GSA contract… they didn’t contribute to my election fund.

Obamaisms: Your cows are being detained indefinitely to combat terrorism. I’m a God fearing man on Sundays, unless I’m playing Golf. I liked John Lennon. I had FBI sue Apple Computer, who wouldn’t let me spy on iPhones, and didn’t contribute to my election fund.

Note: If you like the isms, they were lifted from a page full of additional jokes of greater complexity than the bulk of material in this post. Find them here: To Laugh in the Face of the NWO is the Best Form of Contempt.


What Will You U$E For Currency When T$HTF?

The more we move toward a cashless society, the more we are at risk should some financial, political, or natural disaster transpire which weakens or destroys societal and governmental dynamics. What people will accept in payment or trade for scarce and critical supplies could threaten your life if you don’t have any, or the cost may be more than you can afford, if you do. Here are some ideas to help you be prepared.

by H. Michael Sweeney    facebook

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

In this post you will learn…

• what makes money valuable is also what can make it worthless;

• plastic and precious metals are useless in the aftermath of crisis;

• why government frowns and suppresses barter, and why to embrace it anyway;

• cash is usually aftermath King… but not always;

• whole new currencies evolve in serious or long term aftermath.

What money is, and why it has value

Money is nothing more than a convenient way to conduct ‘commerce’ (trade goods and services) with a standard and portable stand-in for something else of value. For this to work, all people within the trading area must agree to use it as such, and ‘it’ must have a definable and concretely known value. Any system of money is best handled by the local government, be it a tribal village in ancient times, or a modern industrialized nation. Or, it can be done by a network of banking and financial institutions, or even a combination with government. As we will see, banking options are good for them, bad for everyone else.

The later is what we have, today, and it suffers two problems most of us are aware of, both stemming from the banking side. To fully appreciate that, we should step back in time just a bit. Please take the time to read what you may otherwise presume already to know, because the points made in this section will play to remaining sections in critical ways. This is because only governments used to issue money, and to establish its value, they could not and dare not create money unless they held something of value in reserves somewhere, something of concrete and great value to back it up. Most nations, as did America, used Gold; the ‘Gold Standard.’


Whatever the value standard was, a citizen could go to a bank or government Purser, and demand to trade in the currency for its value in that item (i.e., Gold), or vice versa. This system guaranteed the value of the currency to a known unit of measure, and tended to help establish and maintain a stable economy, and made international trade viable; each currency had a concretely known valuation, and established trust between nations that the standard item, itself, could be obtained, if desired, to settle any balance of trade debt which might exist.

Then came the banks with their own idea, called Central Banks, which enables the printing of Fiat Currency, which is money which has nothing of value backing it. Enter the Federal Reserve Banking System. It has cost you and me a significant sum of our personal lifetime earrings. Some say we have literally been sold into slavery to the banks. Learn more about exactly how much it has cost you personally, here. Many, as do I, call it Treason, including the prophetic warnings of our Founding Fathers:

• “If the American people ever allow private banks to control the issue of their currency, first by inflation, then by deflation, the banks…will deprive the people of all property until their children wake-up homeless on the continent their fathers conquered…. The issuing power should be taken from the banks and restored to the people, to whom it properly belongs.” – Thomas Jefferson in the debate over the Re-charter of the Bank Bill of 1809 (millions of us, including myself, did wake up homeless with the Mortgage Derivative Collapse and associated ‘too big to fail’ bailouts, and we have had nothing but inflation and deflation cycles, not to mention devaluation of the dollar since establishing the Fed)

• “I believe that banking institutions are more dangerous to our liberties than standing armies.” –Thomas Jefferson

• “… The modern theory of the perpetuation of debt has drenched the earth with blood, and crushed its inhabitants under burdens ever accumulating.” -Thomas Jefferson (a reference to the National Debt)

• “History records that the money changers have used every form of abuse, intrigue, deceit, and violent means possible to maintain their control over governments by controlling money and its issuance.” -James Madison

• “If congress has the right under the Constitution to issue paper money, it was given them to use themselves, not to be delegated to individuals or corporations.” -Andrew Jackson (Banks are corporations)

• “The Government should create, issue, and circulate all the currency and credits needed to satisfy the spending power of the Government and the buying power of consumers. By the adoption of these principles, the taxpayers will be saved immense sums of interest. Money will cease to be master and become the servant of humanity.” -Abraham Lincoln (the Fed is all about interest paid to the banks for every dollar printed.)

• “Issue of currency should be lodged with the government and be protected from domination by Wall Street. We are opposed to…provisions [which] would place our currency and credit system in private hands.” – Theodore Roosevelt (in the long-running debate about establishing a central bak.)

But the Fed would become reality just in time to pay for WWI with fiat money. But that was not the first time. In the early days of forming new States within the United States, Banks could also print their own money with no attachment to or obligation of government, hopefully backing it up with some kind of standard; a certain degree of trust was involved, and many people found that their banker was a crook. This practice, both legitimate and criminal, was especially common in Gold and Silver mining towns, where shipping precious metals was risky due to bandits. Other negotiable instruments also came to exist, which can similarly be thought of as forms of money. Stocks, Bonds, Notes, Futures, and more. But these featured valuations tied to more complex and less tangible things, and were not simple enough for usage as currency except with brokers and special institutional trading firms.

But several new ways for banks to print their own money also arose which were useful enough by all. One is the ‘Check,’ your checking account. It is merely a highly organized and easily validated (to a point) method of trading in I.O.U.s. Anyone can write an I.O.U. on a any piece of paper, and if the other person accepts it as a debt, and the writer honors it, it has value. And, it can be passed from one person to another until paid, like a Marker used in the underworld.

But people do not trust strangers, and the bank’s checking systems addressed that by using the bank as a kind of validation and tracking of the debt, and the debtor. The underworld uses fear and organized crime to do the same with markers. And, do we not fear the wrath of our banks and the law should we write a bad check? This is called debt bondage, a very real and powerful political and social control system that keeps the locals, that’s you and me, in line for fear of loosing all they own. Unless, of course, you simply choose to  opt out, as have I.

As far as checking is concerned, eventually, the check must be traded for real currency, so no new money was actually created, but while in circulation, the total amount of ‘money in use’ is greater than had been printed, a pseudo inflation factor. Today, some 20 billion checks are written each year, with a value of 26 trillion. To put that into perspective, it would pay off the entire National Debt with money to spare. It is also roughly 20 times the value of all U.S. money in circulation. So is the National Debt, and though no causal connection seems to exist, it is an interesting coincidence, is it not?

Banks also ‘print’ money by loaning money that does not exist. They are allowed by law to loan up to 20 times the money they hold in their vaults from depositors. They write a check, and you then use that ‘money’ to write more checks for whatever purpose the loan was intended. They get deposited somewhere, and eventually returned to the issuing bank. You make monthly payments to the bank, money against which more loans can be made. As long as less than 1 in 20 of loaned dollars is converted to cash withdrawal, the bank has gotten away with printing at least 19 defacto dollars; another pseudo inflation factor. A loan is for fictitious money, and how to you repay a fiction? A question well asked, and some have an answer which will astonish you, and though giving you hope, you will fear it, as well.

The worst offender is the Central Banking System, which allows governments to print money with absolutely nothing behind it; no standard. The government itself is printing nothing more than an I.O.U. The Bank, in our case being the Federal Reserve Bank (the Fed), which is NOT a Federal Agency, but a banker-controlled corporation. The Treasury prints money in the form of Federal Reserve Notes backed only by interest bearing Treasury Bonds given to the Federal Reserve (functionally, an I.O.U.), and the Federal Reserve Note is itself therefore also an I.O.U. Some of these are sold to anyone wishing to buy them, quite often hundreds of millions of dollars held by wealthy men of note, but also, ordinary citizens. Those unsold are held by the banking cadre.

This is an automatic inflation driving machine for several reasons, not the least of which is it allows government to fund any massive and costly adventure without worrying about actually paying for it, as long as they are willing to drive up the National Debt, which no one is ever going to pay off. The downside is, of course, that our purchasing power continues to dwindle, and at some point, the dollar will need to be officially devalued, and only YOU and I will loose in that deal. Meanwhile, every increase of the national debt is de facto devaluation; you and I loose purchasing power as if officially devalued. Simultaneously, more and more of tax dollars go to the FED to pay off INTEREST (only) on T Bills, and that money goes directly to the bankers. The debt is NEVER reduced.

If it were, the Fed would actually collapse. Here is an explanation from David Graeber, and English Anthropologist, regarding the first central bank in existence: “In fact this [debt] is precisely the logic on which the Bank of England—the first successful modern central bank—was originally founded. In 1694, a consortium of English bankers made a loan of £1,200,000 to the king. In return they received a royal monopoly on the issuance of banknotes [their ‘Fed’]. What this meant in practice was they had the right to advance IOUs for a portion of the money the king now owed them to any inhabitant of the kingdom willing to borrow from them, or willing to deposit their own money in the bank—in effect, to circulate or “monetize” [create fiat currency] the newly created royal debt. This was a great deal for the bankers: they got to charge the king 8 percent annual interest for the original loan and simultaneously charge interest on the same money to the clients who borrowed it, but it only worked as long as the original loan remained outstanding. To this day, this loan has never been paid back. It cannot be. If it ever were, the entire monetary system of Great Britain would cease to exist.

There is much more which can be and should be said, but this is not about the evils of the Federal Reserve or financial institutions. The intent was simply to give a glimpse at what money is, and what makes it valuable (or not), in NORMAL circumstances. And, in normal circumstances, the ONLY thing which makes Federal Reserve Notes valuable is a law passed in support of creation of the Fed, which says and which is echoed right on the money, itself, that it is good for all debts, public and private; should you refuse to accept it as such, the debt is forgiven under that law; we are forced to accept it.


But what happens when TSHTF?

In any serious financial, societal, or natural disaster, all bets may be off, and cash may either become a monstrous burden, or have no value at all. To the extent that social systems and governmental control fails, or their function is diluted, the value of money can suddenly become undefined, except by the seller. It is not just a matter of free-market price setting, but weather or not the seller will see value in money, at all, the government no longer being in a position to enforce the law which says it must be accepted.

Pre War Germany was in financial crises which ultimately helped to sweep Hitler into power. Here, a woman purchases some food with a basket full of money. Germany's inflation rate was so high that they were printing 100 billion Deutchmark bills (i.e., a single $100,000,000,000 bill) for public use.

Pre War Germany was in severe financial crises which ultimately helped to sweep Hitler into power. Of course, he blamed the Jews, who had nothing to do with it, but scapegoats are easy to come by when people are scared. Here, a woman purchases some food with a basket full of money. Germany’s inflation rate was so high that they were printing 100 billion Deutchmark bills (i.e., a single DM100,000,000,000 bill) for public use. MONEY WAS ESSENTIALLY WORTHLESS. Welcome to fiat currency run amok.

Some say to hoard precious metals for such crisis, but that is foolishness, because you can’t spend gold. For one thing, it is too valuable, and another, it is too difficult to validate without special chemicals, scales, and knowledge. How does the seller know it is real Gold, or what its actual value currently is? Not only will there be an issue as to weight, which is multiplied by a given value per ounce, but there will be no way to know (where a crises involves loss of communications), what the actual current value per ounce actually is. The wise seller must therefore significantly undervalue any metal offered in payment.

And how do you buy something low in value with something high in value, when there is no way to ‘make change?’ Hoarding Gold is fine for long-term protection of large cash holdings, but it is next to useless and extremely costly to attempt to use it as currency in a crisis.

THEREFORE, if actual money starts to fail in usefulness, whole new currencies will arise.


What will be the new currency in a crisis?

Yes, new currencies, and nothing like money as we know it. But like money, where it is still accepted in a crisis, the value thereof will be determined mostly by the seller, and this will give new meaning to the expression, ‘shop around.’ The most common alternate currencies will become food, water, fuels, and ammunition. Too a lesser degree, anything in high demand and low supply, such as weapons and tools, or anything key to survival. Being aware of that in advance is a great advantage, because there are two things in common with all these items which allows for good preparation.

The first is, that they have a relatively low value now, before there is a crisis. You can afford to stockpile, and would be wise to do so, taking into consideration storage space requirements and shelf life. It would be good to have at least a small hoard of each item in quantities greater than for reserves for personal consumption during the emergency and, where storage space, shelf life, and finances permit, to perhaps have a large hoard of one or more items on the list to become your personally favored currency.

The second is, that anyone can produce them, themselves, to one degree or another, both before and after a crisis. Anyone can sink a well or fetch water from nature, and transport it to where it is less available for ‘profit.’ Anyone can grow and store food if they have the land for it. Anyone can chop wood or make alcohol (fuels) if they but arrange to do so. Anyone can reload spent munitions if they have a loader and can obtain gunpowder, and for the matter, anyone can make gunpowder if they know how to find the raw materials and they are locally available.

Lead for ammunition is another matter, but it is cheap to buy ahead of crisis. So the purchase of a supply of lead and tools to form bullets and reload might be a great idea. Yet most people will not do any of these things, or cannot due to finances or lack of knowledge, and it is exactly that which gives them an excellent future value – extra value, in fact, because in aftermath situations, the normal supply chain of these things has been interrupted or entirely cut off, and access to the knowledge or finances to acquire them with it.

Once TSHTF, you are locked into your current state of affairs; you are either prepared to offer the right currency at an affordable rate, or you are slave and at the mercy to/of those who can. Only one of these two groups has a good chance at survival. That is the worst kind of debt slavery.


Barter, the alternative currency

Click to get a glimpse at doing your own barter from a legal perspective.

Click to get a glimpse at doing your own barter network from a legal perspective.

The government hates barter and suppresses it in a mountain of laws restricting its use. Barter is, in fact, the basis of the new evolving currencies just discussed. But for those in that second, hapless group just mentioned, they may be able to survive for a while by bartering with their earthly possessions, albeit at a costly rate of exchange. A $3,000 professional video camera might be good for a tank of gas, or a few days worth of food; what value is there in a video camera without electricity? But it might be accepted if there is some hope that, eventually, power will be restored, or if the parts might be useful to a tinkerer seeking to build something mechanically useful.

But barter can work well, even before a crisis, despite the laws. The laws are there because the barter concept tends to ‘cheat’ government out of taxes. If you buy something with dollars, you got taxed on the income from whence you got the dollars, and the seller is taxed on the income he earned, and there is likely a sales tax, as well. In barter, as originally conceived and employed before the laws existed, you simply gave labor in exchange for items, or traded items. As long as both parties agreed the exchange was acceptable value given for acceptable value received, it was a done deal. Yes, sometimes one side might feel the value was short, and ask for augmentation with a little cash thrown in.  Or not.

Barter best works in a network situation involving more than two parties. You have Oranges and want Apples, I have Grapes and want Oranges, and someone else has Apples and wants Grapes. No problem, a three-way swap. But to do that takes an organized network with the means to track what is needed and match it to what is offered and available elsewhere. Barter associations or organizations are set up, and of course, that takes effort and manpower, and a building that has monthly rent, and other things which take actual money.

The other thing a barter group could do, was to accept goods or labor obligations (I.O.U. for work to be done) as if a deposit in a bank, against which the member offering such could make some combination of present or future withdrawal of other goods or services as they became available and needed. This allows conversion of unwanted or surplus items into future barter trade power, rendering the barter group as a kind of retail store and universal service provider. Again, government does not like anything resembling a bank in procedure, and would normally tax a retailer on inventory.

As all these functions take money to facilitate, barter groups would charge a small fee for a transaction based on the dollar value of the transaction. DOLLARS were still used as the MEDIUM for determining TRADE VALUATIONS. That meant creating a corporate entity to facilitate and organize barter transactions, and typically, charging a membership fee to allow access to the system. That was what led government to take interest in and to legislate against barter; such systems could quickly grow in membership and began processing huge numbers of transactions, some of which were themselves huge in valuation.

I, for example, belonged to such a group, and in a single transaction, moved $35,000 in goods, against which I would acquire needed goods and services which enabled me to live more inexpensively for a full decade — until the government passed laws which forced the barter group out of business, and started taxing everyone involved to the point where the advantage seemed lost. But it need not be that way, especially once TSHTF.

You can join an existing barter program, but if you do, you should also form your own local barter group, because the big programs will not be available in a crisis. Anyone do so without formal corporate existence, and without charging fees, and without a retail or banking format. I highly encourage it, though you should check with a lawyer as laws vary State to State (click the above image for the Oregon situation). Yes, there will be some concern about tax reporting, but that is a minor issue unless you start dealing in large volumes of goods and services. Frankly, most people who barter this way report nothing, because unless it is in volume, it isn’t even worth the trouble to track and report it, not to them, or the government. But the VALUE is in HAVING A NETWORK IN PLACE IN A CRISIS…   priceless.

When TSHTF, especially if communications are down, it is both difficult and even potentially dangerous to attempt to form a network. Danger stems from the fact that, unless care is taken to avoid strangers, you may offer to form a network, in which case you state what you have of interest, and if they think they have more guns than you, and want what you have, they know where to get it without cost. Moreover, mutual defense is a thing which can itself become a barter commodity, assuming you have the guns and manpower of good use to others; it is, after all, another kind of service.

So to prepare for a crisis, don’t just hoard key supplies, but establish a barter network, even if you do not choose to use it. Doing so amplifies the value of your preferred currency, because you already have people willing to accept it fairly. Consider these words of wisdom:

• “The propensity to truck, barter and exchange one thing for another is common to all men, and to be found in no other race of animals.” Adam Smith, Scottish Philosopher.

My take is that barter is natural to man, and as such, is an unstated free right to undertake at will – to hell with government, or in reverse, if government has gone to hell, what else do we have to trade with, but barter;

• “Capitalism invariably boils down to barter between two willing parties, neither of whom uses force to work with the other.” Ben Shapiro, Political Commentator.

When TSHTF, force becomes the only commodity the weak minded and hapless will have to trade with. To strengthen your defenses, you need something better, as well as a means of countering force with force of your own. A Barter network gives you both, where mutual defense agreements become a thing which may be bartered: If I have superior weapons and more gun bearers than you, an imbalance exists which might be offset in goods or other services.

• “In primitive society, Man produced directly for the satisfaction of his own wants, but with the development of society came differentiation of functions; exchange and barter arose, various trades sprang up, and with the necessity of commercial intercourse, cam the invention of money.” Charles A. Beard, renowned Historian.

This sums up this entire post in the most direct of statements: barter came first, money after. When money fails to function usefully, we must be ready to barter, either with a new currency of convenience, or outright barter networking. Our very lives could depend upon it.

Not fully convinced? Want more information?

May I humbly suggest some further reading about WHY you should worry about flying excrement from an unexpected fan, and also offer some additional valuable resources? Here is a compendium of useful material on the dangers of crisis and the topic of being prepared, not just in terms of currency, but other considerations which are well beyond the scope of this post. These are Facebook ‘pages,’ so you can FOLLOW them for updates. Please consider to Follow my blog, as well.

The Fema, Martial Law, Revolution Database. Don’t let the title scare you away; its a compendium of articles and posts about the likelihood and risks of various forms of civil unrest and social, economic, or natural disasters, as well as general advice such as found in the above post. It’s sub-name is When All Hell Breaks Loose.

The Post Apocalyptic Library. A compendium of resources where you can find critical how-to information needed for survival in a crisis. Everything from how to make a torch to how to make a portable generator from a lawn mower. The idea is to visit those sites and print the instructions, and place them in a safe place and in your ‘go bag’ so that you will have them when needed; they won’t be available once TSHTF.

Preppers Are Not Stupid; Dissonant Non Preppers Are Doomed

Even our own government, normally blind to problems until too late, has been warning us for years to be prepared for ‘something scary,’ and the list of concerns is very scary. The stakes couldn’t be higher: if even just one thing on the list takes place, being ill prepared can perish whole families and, in short order, whole communities. Here is something that can make a difference, and its free. Its called knowledge.

by H. Michael Sweeney  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.


In this post you will learn…

• What Preppers are and why they exist;

• Why YOU should become a Prepper, and HOW to proceed;

• There are 2 NEW and FREE resources to simplify the effort usefully

Note: I usually well footnote my posts so you can verify what I say for yourself. In this case, the two Facebook pages mentioned at article end, themselves, offer ample proofs for those items not otherwise footnoted.


The wise live for Today, but plan for Tomorrow: uncertainty is the only certainty

The Bible is the oldest source of Wisdom modern Man relies upon, and it clearly echoes that thought; there are no less than 25 places in the Bible which so admonish. A good number of these directly talk about the kind of preparedness this post addresses, while the remainder speak to being prepared for entry into the Kingdom of Heaven. But, if one is not prepared for things which can take one’s life, is not the later concern all the more important to prepare for, as well?

Perhaps the strongest and simplest of these are found in Proverbs (natch):

22:3The prudent sees danger and hides himself, but the simple go on and suffer for it;”

27:1Do not be confident about tomorrow, for you do not know what a day may bring.”

If we hold onto any one thing in this country, it is the wisdom of our Founding Fathers, and they were almost to a Man God Fearing and, therefore, they heeded such words. But they themselves also spoke plainly and logically about such things, and framed them in terms of the Nation, as well as the Individual and those we each love, to whom we are responsible for their well being:

John Adams, on the risk of overconfidence and reliance upon government: “I give you this warning that you may prepare your mind for your fate;”

Benjamin Franklin: “By failing to prepare, you prepare to fail;”

Alexander Hamilton: “If fortune should smile upon us, it will do us no harm to have been prepared for adversity; if she frowns upon us, by being prepared, we shall encounter it without the chagrin of disappointment. Your future rank in life is a perfect lottery;”

Thomas Jefferson: “Instead of considering what is past, however, we are to look forward and prepare for the future.”

George Washington, on wise use of funds, such that: “timely disbursements to prepare for danger frequently prevent much greater disbursements to repel it.”

Thomas Pain, on being fugitive from tyranny: “O! receive the fugitive, and prepare in time an asylum for mankind.”

The Modern Prepper and Dr. Strangelove

Early Preppers private Bomb Shelter of the 50's: Dig a hole, drop in some roofing upon a floor, and fill it in.That last quote brings us to the advent of the modern Prepper, a phenomenon brought about by the Cold War and fear of the Bomb. President Eisenhower spoke frequently about the need for Civil Defense Preparedness, and founded what ultimately became FEMA, the ‘Grandaddy Prepper.’ For the rest of us, we were encouraged to prepare for nuclear war in our thinking, and our behavior.

We were taught to ‘Duck and Cover,’ and to plan to flee the cities, or take to bomb shelters. The whole basis of our modern Interstate Highway System was to that end, and so that the military and other aid could quickly flow to any wound in need of dressing. Cold War tensions culminated in the dire climactic confrontation of the Cuban Missile Crisis, and firmly established the era of the Bomb and Fallout Shelters. There were, in fact, enough shelters built to save 100,000,000 Americans, millions being built by citizens in their own homes or back yards: Dig a hole, drop in a pipe and add a floor, and fill it in and stock it.


Why prep today? Darker times > starker threats > greater fears

For a time, I managed a gas station while investigating the Oil Industry. That led me to a face-to-face confrontation with terrorism which rendered the investigation superfluous. For those who do not appreciate or understand the Prepper, or why they do what they do, or for the matter, who do not understand Conspiracy Theorists, Truthers, or Targeted Individuals claiming mind control, I highly recommend working for at least 30 days in a gas station. Why? Because that is an excellent place to talk with a large number and a variety of people in the course of doing business, and elicit from them things they would never otherwise admit in open conversation.

sheepdip2I could ask almost anything, and if well proposed, obtain a deeply personal and meaningful reply. And I did, regularly, on on a wide range of topics. What I learned is that there are more people afraid of more things than the mere threat of global extinction from The Bomb and the ‘Red Menace.’ Terrorism, yes, and for more of a seriously right reason than the obvious, a reason unexpected even by them.

It is to me even scarier than the fact that terrorism exists. Few are aware, but the top ranking U.S. Military General, Tommy Franks (who brought the flame throwing tank to Waco), has warned in a public statement that if there is another 9-11 level terror attack in the United States, the Military will take over the government in nation-wide Martial Law. I, for one, do not want flame throwing tanks on my streets.

And, we are still threatened by nuclear war: China’s top military leader has stated that war with the U.S. is inevitable, the only thing remaining being to decide when and how to be the first to strike. And, we have recently learned, they have stealth subs we cannot detect; one surfaced unexpectedly in the middle of a U.S. Carrier Fleet in the middle of an exercise looking for subs. North Korea is constantly making threats, and Obama and Hillary Clinton have assured terroism-minded Iran has access to the Bomb. We have several times in the last year, alone, come close to trading blows with Russian forces which could easily have escalate to a nuclear exchange. And we supposedly like each other, now.

Moreover, as recently played out in the Press, we have learned that a single well placed nuke high in the atmosphere could cause an EMP wave sending us back into the stone age by wiping out all electronics, including the entire power grid. Just as bad, spurious energy waves from the Sun could achieve the same ends, globally, or for the matter, doomsday rocks from space could effect similar damage, or worse. Movie theaters are awash these kinds of with (Extenction Level Event) scenariosDeep_Impact_poster. But there are other fears, and each one seems, in turn, to begat another, often wilder and seemingly more far fetched… which unfortunately, do not seem all that far fetched if daring to explore the facts which are their basis.

Every few months there seems to be another new exotic biological threat, either a weaponized or natural pathogen or virus on the verge of pandemic capability. Each such threat additionally threatens to be incurable and impossible to stop in time because it takes such a long time to come up with defensive medicines. Then there is the risk of financial collapse, which could trigger a global replay of the Great Depression on an unimaginable scale. Civil unrest levels are at the greatest and most dramatic in all of history; the Occupy/99% movement spontaneously fielded many millions of people around the World in the space of days. Our government’s liberal policies and some unfortunate events have fomented racism issues to the point that Blacks are shooting Cops as if at war, and threatening worse.

We see paranoia rampant in our government, who treats us all as if terrorists in the wings, spying on us and taking away our rights, and leading to fears of Martial Law, and/or efforts to take away our guns. DARPA, on the other hand, has ordered billions of rounds of ammo, enough to kill every living soul in North America several times over. FEMA seems to be building large facilities some fear are closer to concentration and even death camps than to shelters. It is at least concretely true that several special inciner-ators have been built, each strategically located, and capable of efficiently destroying hundreds of millions of tons of contaminated materials — which could include human bodies. The fear of Fascism and the comparison of our government to Nazi Germany is commonplace, which brings me back to the dialogs at the gas pump, where these things were said. The most common phrase heard in response to such things was, “When the revolution comes…”

Then there is the dramatic increase in UFO sightings, and much more than that, a growing body of evidence of actual combat taking place. If chemtrails were not already their own perceived threat, consider the latest theory as to their purpose; to weaponize the atmosphere against alien aggression. There is actually some scientific basis for such wild theories, and some to additionally suggest there is an off-world secret space program with Buck Rogers-like Space marines using captured Alien technology. I don’t know about any of that, but the fact that the government is becoming more secretive about the UFO question than ever, before, does not allow me to discount the notion. Presidents Roosevelt, Regan, Bush, Clinton, and Obama, and even Putin, have all alluded to these possibilities, as well as have high ranking military. The recent discovery of a constructed mega-structure orbiting a distant Sun amplifies the possibility: we are not alone. And those at the gas pump agree. More people have seen UFOs or otherwise have reason to believe in Aliens, than not. Don’t take my word for anything in this paragraph; just tune into Ground Zero and scan the archives of shows with Clyde Lewis’ expert guests.

Dare we mention a credible Planet X, super volcanos, global warming and melting ice caps, mega earthquakes, the shifting of our magnetic poles, and any number of scientifically plausible threats and natural disasters capable of inflicting significant regional, national, or global destruction of cataclysmic proportion… or dare we say… Biblical? After all, the other common comment at the gas pump is, “We are living in the End Times.” Indeed, the Illuminati conspiracies, AKA The New World Order, are not difficult to validate with a barrage of demonstrable facts which defy coincidence. This author has made a case in several of his books that the ultimate goal of the New World Order is to form a One-World Government — in order for the Antichrist to have a seat of power, and usher in the End of Ages, the ultimate End Game. It IS prophesied, after all, and many of us fear that as much as anything else.

That brings us full circle, back to the Bible’s admonishments. Being prepared ought rightly be not only for bad tidings, but for salvation. The government agrees, at least with the first part. The last ten years have seen an unprecedented effort by the government to urge us to be prepared for disaster. They have even reinstated and updated the old Cold War emergency radio alert system, and are stockpiling huge quantities of everything from food and medicine, and other supplies, to coffins. And ammo. All they ask you to do, is to have emergency plans and a ‘go bag,’ or store of emergency foods and critical supplies.

It’s simply good common sense. Preppers have been doing this for decades. What’s your excuse? That they are crazy? Better look in the mirror, if you believe that.

Here are two simple and free tools to help you get started

Both are easy to use Facebook pages. One is a kind of compendium of information regarding the possible breakdown in civil society due to the inability of government to respond, or even perhaps government itself has gone terribly awry. It is called the FEMA, Martial Law, Revolution Database (kind of covers all possibilities). It has no subversive intent, despite the scary title. It is very informative, and can help push anyone teetering on the notion of being prepared into taking action. One way it does this, is by telling you what to expect, and what a good action plan/go bag might look like for a given scenario.

The other also has a scary title, but it implies nothing but what it is; a library. In this case, it is a series of links to critical information one might need to survive for long periods without outside help in a serious catastrophe. It is a collection of how-to survival tricks, and how to quickly and easily make common critical items such as water purification systems, emergency generators, and so forth. It is called the Post Apocalyptic Library. The idea is simple: visit the links, download or copy the information, print it out, and put it into your go bag. Instant expert on a moment’s notice! Many of the links will deserve further exploration of their sites, for other good information. There is always more than one way to solve a problem.

Have you ever wanted a certain soft drink? Well, I’m a Prepper, he’s a Prepper, she’s a Prepper, we’re a Prepper; shouldn’t you be a Prepper, too?

Great. Drink deep for best result.



Terrorist H. Michael Sweeney’s RAP Sheet

OK, it’s true. There are at least a half-dozen ways the government can ‘claim’ I’m a terrorist. YOU TOO, for that matter. But I have a Record of Arrest and Prosecution ‘sheet’ to illustrate one of the ways I am definitely a terrorist to someone, including people that think I’m merely a conspiracy theorist. I am not ‘mere,’ at anything I do…

by H. Michael Sweeney  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.


What makes you a terrorist when you live in a Police State?

Simple answer: anything you do. There have been so many Constituion trampling Acts of Congress and Executive Orders, all so vaguely worded as to allow the broadest of interpretations, that it is almost just that easy for someone in government to label YOU (and certainly me) a terrorist. That can have very unfortunate consequences, depending on who labels you, why, and what they do about it. You can end up on the no fly list, or some kind of watch list, or even be vanished forever by Men in Black whisking you off in a black van.

One such example is, that being a conspiracy theorist automatically makes you a terrorist according to FBI. That’s bluntly stated, but true, as an article at Public Intelligence illustrates: “A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. ” The flyer, linked in the article, specifically includes 9-11 Truthers (that’s about 1/3 of the U.S. population).

OK; I’m a conspiracy theorist, or if you prefer, a Conspiracy Terrorist. But I am no ordinary ‘theorist,’ because I have a R.A.P. sheet… a Record of Arrests and Prosecutions. And here it is, below the FBI Fellon ID Card (which shows that not even FBI always gets the right man)… but be sure to read the summary text before you wonder why I’m still walking around freely.


R.A.P. Sheet, H.Michael Sweeney

1976  Wire Tapping, 2 counts, charges dropped for insufficient evidence

1980  Embezzling, charges dropped after resignation from company

1983  Counterfeiting, Drug Smuggling, sentenced

1984  Wire Tapping, charges dropped for insufficient evidence

1985  Shoplifting, 4 counts, sentenced

1987  Fraud, Embezzling (pretending to be a Pastor), Bad Checks, charges dropped after restitution

1988  Wire Fraud, 3 counts, sentenced

1988  Smuggling, 2 counts (bioweapons, diamonds), sentenced

1990  Espionage, Interception of Electronic Communications, charges dropped by NSA intervention

1991  Bank Robbery, 4 counts, sentenced

1991  Wire Tapping, 4 counts, cold case due to flight to avoid prosecution

1992  Fraud, 3 counts, Witness Tampering, 3 counts, Withholding Evidence, 2 counts, Murder,

            cold case due to flight to avoid prosecution

1993  Breaking and Entering, 2 counts, Grand Theft, charges dropped after restitution

1994  Wire Tapping, cold case due to flight to avoid prosecution

1994  Attempted Murder, 12 counts, case turned over to Internal Affairs, and dropped

1996  Espionage, 3 counts, Violation of Civil Rights, cold case due to flight to avoid prosecution

1998  Wire Tapping, Stalking, cold case due to flight to avoid prosecution

1998  Grand Theft Auto, Operating Chop Shop, 3 counts, sentenced

1999  Possession of Controlled Substance with Intent to Sell, sentenced

2001  Bioterrorism, Attempted Assassination, investigation closed by DOJ intervention

2002  Terrorism, 4 counts, cold case due to flight to avoid prosecution

2004  Bioterrorism, case closed due to lack of evidence

2004  Cyberterrorism, Hacking (of CIA’s Web site), charges dropped in exchange for services rendered

2016  Armed Robbery, 2 counts, cold case due to flight to avoid prosecution

2016  Bank Robbery, cold case due to flight to avoid prosecution


Summary Judgement

By now, if you actually read the full list, you realize no one person could be guilty of all those crimes and still be walking free… and that there were crimes on the list immediately after incarceration, and no jail breaks to account for that. This is because these are not crimes that I committed, but crimes I have investigated and exposed, or helped expose and prosecute, often working with Police, FBI, SS, and CIA, sometimes working against rogue elements of those and other agencies, even spy agencies of other governments.

Left out of that list, are perhaps 200 Stalking, Wire Tapping, and Torture cases I’ve worked on as online consultant with victims of such affairs (I’ve had contact with 12,000 individuals in that kind of predicament). I left them out because it would have made the post unreadable, and that’s a shame… a disservice to the thousands of victims of this form of abuse of power and conspiratorial corruption of principalities and powers.

So I do not claim to be a mere terrorist, but to have stopped terrorism. But neither am I a mere conspiracy theorist, because many of the conspiracy theories I’ve investigated have put people in jail, or at least shut them down and forced them to run away. One Governor, possibly two, a National Guard General, an elected County Sheriff, two Police Chiefs, a Criminal Investigation Division Lt., a C.E.O. of an international software firm, and a host of lower law enforcement personnel have all vacated their posts (some being jailed) after I finished doing my thing. While I cannot claim every one of them retired or otherwise departed their posts because of me, as I was not allowed access to official internal documents, I’m fairly certain a good number of them grumbled my name under their breath on the way out the door.

All that said, I hope that you, dear reader, have come to understand that a conspiracy theorist is no different than any other standard investigative force of a more official nature. Except for two small things, we all try to fit the available evidence with the environ of facts to determine the truth. We both form hypothetical postulations as to suspect and motive, prove opportunity and method, and try each point of evidence against all others which might disprove the hypothesis (though as we see all too often, many criminal cases are happy to prosecute the innocent if they think they can make a strong enough case and hide the truth).

We both theorize up front. The first difference is that conspiracy theorists do not have the luxury of making an official determination, while the official investigators do. The second difference, and most important, is that we start with questions regarding failures in logic in the official findings and reports; we question government, which is not only the right, but the DUTY of every citizen, always. How else will you ever find a cover up? We know there have been all manner of cover ups exposed in media over the last few decades, and I remind you, you NEVER have a cover up UNLESS there is a conspiracy, because a cover up itself REQUIRES a conspiracy to execute it, and the affair being covered up is always so complex that it, too, MUST by default represent a conspiracy. Guaranteed.

OK, FBI, come and cuff me… unless I’m wearing a bomb like other terrorists,or have run off to Mexico to escape your ‘justice,’ in which case, just have a better day.

The Death of Proparanoid… again

Yes, Virginia, over the several decades of my personal battles with elements of the intelligence communities of several nations, as well as criminals and terrorists, there have been actual death threats and multiple attempts against my life, attempts to silence me.

I’m still here.

But my voice seems to be dying; I’m being methodically and systemically silenced.

To be sure, that, too, is not the first time it has happened. Some of it has actually been funny, or at least done with a sense of humor by someone with a lot of power, someone a bit more intelligent than the mindless robots normally employed in targeting someone for their political incorrectness.

The NSA was the first to employ technology to silence me. When I was guest on Art Bell’s Coast to Coast with George Noory for three hours. Part of the show was to be on the Flight 800 friendly fire shoot down, where I was going to announce discovery of startling new proofs. About five minutes before I was to be called by C2C staff for hookup, I got a strange call that lasted about 30 seconds. It consisted of nothing but high-speed tones somewhat similar in nature to the sounds of a fax machine…but this was different.

I knew what it was, and had written about it in my books. NSA helped develop the telephone networks we use today working along side of AT&T and also, Bell Laboratories, who were security related clients of mine. SoI recognized these tones as the data packets used to manipulate the phone system’s switching network. There is almost nothing these codes cannot accomplish, and they are part and parcel of how and why NSA’s Echelon gives them complete access to all phone/fax and other telecommunications.

So I went on air as expected, but when we came to the commercial break and it was announced that when we came back, we would offer blockbuster information about flight 800, the stage was set for the dirty trick which would be based on such manipulations. Coast to Coast, like most such syndicated shows in the day, feeds its program by phone to various radio network resources. Now, to make the significance of what happened next, it is important to know this is at a time frame when the official FBI/NTSB investigation was still going on and knee-deep in charges of a cover up, and all three TV networks were owned by military contractors who made various elements of shipboard missile systems or the actual missiles we now know shot down the airliner by accident.

The show continued and the information was revealed. But some weeks later it was learned that a funny (literally) thing had transpired. In the New York/New Jersey Long Island area where the plane went down and the investigation was underway… the same area where the US Navy was hauling select wreckage retrieved from the ocean to junk yards instead of the investigation site where the plan was being reassembled in an attempt to find a cause (so we were told)… I was silenced.

The truth was not to be heard. No. Some clever reworking of the phone system had people who were listening to Art Bell’s show, once the commercial break was over, suddenly found themselves instead listening to rebroadcasts of Art Linkletter’s ‘Kids Say The Darndest Things’ show from decades earlier. To my way of thinking, that’s incredibly creative and funny as dirty tricks go. Once we stopped talking Flight 800, the regular show returned to the airwaves, there. Once the show was over, five minutes later, I got another phone call with the strange tones.

A more physical silencing took place shortly thereafter when I was guest and ‘Field Correspondant’on Michael Corbin’s radio show out of the Denver area. Now he used a real radio station, but also used phones. Got the same tones phone call with that show, too. But more than this, someone took an ax to the cable feeding the show to the radio tower, itself. I was silenced.

Sadly, it was not too long after that that Michael Corbin himself was silenced. After a series of death threats, his home and the radio studio suffered an arson attack, along with one of his vehicles. He called left me a message for advice as he feared for his life, but again, telephone oddities prevented our actually making contact. Three days later, he was found dead in his good car at the side of a highway. It was ruled a heart attack, but he was, as I recall, just over 30 years old, and had no known heart conditions. He was silenced.

Not long after that, my only Web site at the time,, was hijacked by Men in Black. I was able to investigate it thoroughly and determine two CIA fronts were involved. One of these was Enron, formally known as Hughes Tools, taken over by CIA after the billionaire died. The other was a Web domain proxy service which specialized in registering domain names anonymously so you could not find out who owned them, as well as remarketing domain names… typically hijacked, on behalf of said ‘anonymous’ owners.

Only problem was, it seems they were actually the owners. They also offered hosting services, and ‘just happened’ to own thousands of porn sites thought operated by CIA in order to collect sexual preference information of powerful people, sometimes useful in blackmail efforts. Others in that collection were, in fact, traced to staff members at the firm. The head of the firm had a work history that fit the general profile common to persons running CIA fronts, but the two most condemning clues were closer to smoking guns.

One is, that the servers they used were actually housed in Enron’s headquarters building a few blocks away from… the other site that was a clue; the firm’s business offices were in the same building Lee Harvey Oswald used to work with FBI agent Guy Bannister… the building with two corner entrances, one on each cross street, which opened to the same interior, but each with a different address. This allowed the FBI and, presumably, CIA, to operate multiple fronts from the same offices, but use different addresses so that they would not be linked. It now appears CIA owned that building, and has repurposed it.

The hijacking was not to make a profit, as most such hijacking intends. The typical resale offer for a Web site of my popularity in terms of the number of hits was about $400. But if I was to get my site back, they demanded $157K. No way. I was silenced, at least temporarily, until I could create a new site. Several, actually.

Now we come to my death.

To be completely honest, part of that death is not due to politically motivated intrigues by Men in Black. Certain family affairs, health issues which prevent me from holding a job, as well as my age, perhaps, and general financial issues were clearly involved; they set the stage for and enabled the unexpected assaults. What happened happened covertly, and would take time for me to discover, making it too late to counter.

I lost my home and was forced to live in my car, which means I also lost my ISP service, and my email addys were shut down. Yet somehow, after the email accounts were no longer operational, someone with spoofing skills (cyberwarrior hacker types) sent an email from my closed email account to my Web hosting service and shut down my account, there. This effectively cut off my one source of income beyond my paltry Social Security checks.

Next, they transferred ownership of my domain names to a firm, this time, in Canada. But as I do not now enjoy useful Web access, since I still live on wheels and have no ISP, I can neither investigate the matter or usefully replace the Web sites. Somehow, by the way, they also killed the cached pages in Google and elsewhere about my previous hijacking, which included evidence. I am silenced.

Or not. My wordpress account remains open. Most of my old Web site pages can still be accessed in archived from (e.g., Google proparanoid + a keyword/phrase, and click the little pull-down menu arrow found at the end of the green secondary URL line, and select Cached).

To those who have followed me over the years, bought my books or newsletters, I thank you for your loyalty and kind comments. Death threats aside, I’ve probably had only three people say a consequential bad thing about my work, people who were sincere and intending constructive advice. Those who were simply hateful or who were clearly pushing an agenda, I happily discounted.

I can still be reached by text messages (very short messages, no subject line) at proparanoid at vtext com. I do also attempt infrequent access to my email account at proparanoidgroup at gmail com. You can still order my books using the My Books link at page top. You can still pay for books or send me contributions to proparanoidgroup at gmail com via PayPal. You can also still access my Facebook account under H. Michael Sweeney.

I have been silenced… but you can still hear my muffled words, if you try hard enough.

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View

The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some Satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.

Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that select shooting lines form a 3-D perspective view of Cheaps and transparent depiction of all inner passages;
•  that there are specific ties between Cheops and the goal of the New World Order;
• that Cheops is a kind of key to understanding European Illuminati/Templar relationships to mass shootings.

Are mass shootings by intelligent design?

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View

Is there a mass shooting conspiracy?

Mysteries of Cheops

In the prior post we saw ties between shooting event lines which formed Masonic and Satanic symbols, and a series of orange lines which led us to the Great Pyramid, Cheops, in Egypt. While those were quite remarkable and sufficiently consistent to defy any chance of random coincidence, what follows will dramatically make concrete the notion of intelligent design as well as the importance of Cheops to said design. And finally, we will see there is yet another way to look at Cheops’ roll in the Illuminati/Templar and mass shooting tie-ins, but this time, from the European point of view.

First, we need to understand a bit about Cheops and its importance in mysticism. There is so much which could be said that there are literally countless books on topic which could be entered as ‘evidence.’ Here, I will focus on less than five percent of such material topically, only able to skim the surface of them. Consider it merely to whet your appetite to learn more, for which some suggested links will be provided along the way.

One key aspect of Cheops is that it is rich with magic numbers. This seems to be true regardless of if using the original units of measure employed by ancient Egyptians, or modern day equivalents. Indeed, some of our current units of measure stem directly from the ancient Egyptian measuring system, a fact often laid at the feet of Freemasons and their predecessors, the Masons. While I won’t spend time expounding, many of the measurements of Cheops, both in original and modern increments, enjoy magic number properties, doing so in ways which, like those illustrated in the prior post, are mind boggling. Some serious mathematicians have found even more wondrous relationships to both the ancient and modern discoveries of Man well beyond any possible knowledge to Egyptians of old.

Perhaps the keymost aspect of Cheops which potentially makes it ideal for inclusion in mass shooting patterns is that it is only the Giza Pyramid which has a complex of inner passageways and rooms. Early mystics and even some studies of Cheops by persons with scientific credentials and methods, have proposed and illustrated a belief that the construction of Cheops was an enlightened project involving supernatural or mystical knowledge of the future; the internal passages and chambers thought to be a roadmap to End Times and key events along the way. That is represented by the image, below, from this interesting Web site. Others out there (with less useful images) have more detail with the most recent/current annotation being the year 2010, roughly the height of mass shootings. That marking is in the King’s Chamber, which implies ‘control and authority.’

ONE Egyptian Inch = 1 Year of History. From (click).

Of specific interest to mass shooting research and the notion of Illuminati Masonic Warlocks being the architects, thereof, is the fact that shooting lines can be found which quite correctly depict a pyramid across thousands of miles of the United States. More than this, they quite usefully do so in 3-D rendition, even to the point of detailing the inner passageways found in Cheops. In fact, the depiction is so uncanny as to have key aspects ‘to scale’ with measurements which work math magic using modern increments of measure against the ancient’s units of measure; not just scale in size, but across the barriers of time in the expression of numbers in different languages and cultures. Take a look:

 Do the pyramids really relate the entire history of the World from beginning to end?

Shootings depict Cheops


Left: perspective transparent view; Right: inner view of interior passages. Remarkably, it took only 9 shooting lines, and 14 shootings, to depict the pyramid and passages. However, 5 shootings stand alone (not on lines), meaning 9 are, giving us again the magical 99/18 result.

As you may recall from the prior proof the orange lines are lines which run from shootings directly to the Great Pyramid, Cheops, each exactly 500 miles apart as measured along a given line which is perpendicular to them all, and which itself runs through several shootings. The green line here, however, is at the distance of 10,000 miles from Cheops, which is one/fourth the distance around the World (the vertical diameter being 40,008 miles on average), and it too transverses several shootings and is perpendicular, but the distance at this point between lines is 505 miles.  Each orang line originates dead center of Cheops and is separated by almost exactly 7.5 degrees of arc to achieve this feat. That is interesting for another reason; 360 degrees divides by 7.5 exactly 48 times, and 24,000 miles (the rough diameter of the Earth horizontally), divided by 48 indeed equals 500 miles.

Now there are some admitted problems in trying to depict a pyramid with any degree of accuracy in a 3-D perspective view, especially if with cutaway to reveal interior passages. Such a view does not simply allow us to measure a line and compare it to Cheops with good expectation of results. Perspective causes a measured horizontal to be less as it is depicted further away. A line transiting diagonally in one or more axis in 3-D space is even less useful unless one knew the precise angles for each axis both it and the original against which it was to be compared, were employing (and additionally, the depiction version is arbitrarily decided by the person rendering it, and impossible to discern without their sharing).


As the satellite view is at a an angle, the ‘center’ is based on the base, not the peak.

The depiction in this case seems slanted over America as if about to slide into the Caribbean. That is for a reason: it is faced (viewed) with the same face (view) as the actual Cheops is when following the orange lines, there  — presuming in both cases one is looking from the center orange line towards it. That is to say, looking at Cheops in America from the center of the lines, would give you this same perspective view if standing in the center in Egypt. That cannot be coincidence.  The problem with that, however, is that in Egypt, in relation to the Orange lines, one corner is clearly (looking down from Google Earth) nearer the observer’s position than another; there is no line which is not at an angle to the observer.

Note: I further feel it is an error to assume that modern-day Illuminati Warlocks have the skills and knowledge base, or event he interest in the crafts and mathematics of Masonry, which they left to the Adepts when Templer remnants infiltrated the Mason’s Guild and eventually took it over to form Freemasons. They are not likely going to go for precise renderings as much as symbolism; accurate to the point which can be managed simply, but no more, I believe.

 Why do Masons, the Illuminati, and Satanists focus on Egypt and Cheops?

How much is a Royal Cubit, anyway?

It is, as result, impossible to establish a precise method or true consistency in relationships (i.e., to test for accuracy in scale) of measurements between Cheops and the American pyramid. The required data and accuracy required to plug into complex formula is beyond our ability to deduce. Ideally, a computer program modling in true 3-D space could be used to compute and confirm such comparisons… if we knew the angles employed by the architect of the American depiction.

But that does not mean we give up. We do the best we can with the tools at hand, and must come away at the very least acknowledging that in the 3-D layout, the mere visual similarities alone are sufficiently ‘coincidental’ to imply intelligent design, and in need of further study with better tools. But that does not mean we cannot ‘cheat,’ and then test to see if our cheat had any merit. After all, perhaps the architects employed a similar gambit. We wont’ know unless we try, ourselves. So…

By rotating the view as I have in the image above, we at least have the illusion that the base line is perpendicular to our viewing angle such that we are tempted to measure it anyway, and then see if there is any discerned relationship to Cheops which results in some kind of conversion factor. If we CAN find one, we can then apply that factor against other test lines and, in theory, if or factor was arrived at by other than coincidental happenstance, we should find the measurements work out correctly in the conversion. Guess what? We can, and it does!

Cheops on a side is 440 Royal Cubits, or 36524 Egyptian inches (a precise year’s worth of inches times 100), which works out to 230.4 m, or 756 feet. I will admit that finding a conversion factor took me some time. I made no headway at all until I realized that the orange lines were like rays of a projection lens in a theater, taking a small image and projecting it to be much larger at a distance. I reasoned there had to be something about analogy involved in the conversion factor.  I also felt that any such conversion MUST involve the ancient increments in some conversion to the modern, rather than a modern to modern comparison. Turned out true.

As I discovered, if you divide 36524 by 440 you find that there are 83.009 Egyptian inches in a Royal Cubit. Funny. Both sum to 20. If you then multiply this times the total degrees of arc for the American depiction, which is three orange lines, or 22.5 degrees (±.03), you end up with 1867.7, which is exactly the measurement of the depicted base line… in Kilometers; ancient to modern, using the orange lines as calculator. So, now to test the accuracy and intent, vs. the notion of coincidence (pretty big coincidence, if that is all it is.)

Testing our factor: There are only a couple of other places where lines are similarly ‘perpendicular’ to our view (like the base line) by our peculiar method of so assessing for the purpose. Two of these are passageways to the King and Queens chambers, which just happen to have shootings (house icons employed for this use to match the drawings of the actual Cheops chambers) at the approprate locations to at least approximate the inner passages with an appropriate resemblance. But there is a problem with trying to test these with our conversion factor. It has to do with the Mississippi River.

Looking at the drawing of Cheops’ interior, you will note there is an irregular passageway leading down between the upward and the downward sloping passages. This is thought by some to be a water drain, as there are interior air vents which happen to align with prominent Constellation stars on select key celestial event dates, and that admits water. The lower passage in fact has a chamber with a deep pit which resembles a Well. In America, as it happens, the Mississipi River runs a course reasonably similar to that passageway and at the appropriate points in our depiction, given some small fudge factor.

Clearly, the Illuminati has no control over the course of the Mississipi, which changes slowly with time, and therefor, any depiction of the inner passageways must in some way accommodate those changes. My conclusion is, therefore, that such accommodation would necessarily mean a skewing of measurement accuracy in these passageways. Indeed, no line among them which is angled, nor the passages to the King/Queen chambers, quite works out, though some come closer to doing so than others.

But there is an entirely different story in play once we get past that drainage passageway, at the very bottom of the network. That whole portion is, by the way, beneath the ground level of Cheops by a goodly distance. In fact, the pit, which was filled with loose rocks as if a French Drain, once cleared, measures 60 feet deeper.  Now, there are three points of interest with respect to testing our measures, and some landmark verifications we can also apply…

These are: the entrance passage to the Subterranean Chamber; an exit passage which is a dead end; and the pit. Applying our conversion faster, all three lines as depicted are of the correct length and are at the correct scale to the previously computed base line. But there was no shooting or key line to establish these lines (well, one line seems to do so), so we must seek some other verification that these are as intended by design. They do exist. Lets take a look:


The entrance passageway: The entrance passage determines the location of the Subterranean Chamber in the depiction, which we will verify separately. But it also has an unusual feature along its walkway, a kind of antichamber or alcove to one side, with no discernible purpose. On the map, at its correct location in the depiction, we find our old friend, Remington Firearms (the white arrow). That was, in fact, one reason I tested line placement at this site. Interesting then, that both this Proof and the prior Proof find their factories involved in shooting lines, baphomet lines, orange lines, and pyramid lines. That cannot be coincidence, and points to intelligent design, and intent — especially since the other Remington facility from the prior Proof is also present directly along another passageway, as seen in the first image of the depiction from above.

The exit passage and pit, on the otherhand, when extended the correct distance within ONE METER accuracy, end at… water wells, pumps, and tanks; which relate well to the purpose of the Subterranean level. That leaves the Chamber, itself. You will note a graphic image overlay veils in transparent fashion the intersect between the two measured passages and the pit. While there to represent the chamber, it is not really as ‘large’ as the chamber would be if to scale. At a particular location within the Chamber area it does cover, we find a nuclear power plant. This is interesting because much lore about Cheops includes references to end times, and equates the Subterranean Chamber to Hell, and the bottomless pit. One of hottest things we have on Earth is the interior of a thermonuclear power plant, and it burns both with heat, and invisible radiation; hell on Earth, should you care to experience it, with or without an accompanying China Syndrome ‘pit’. But there is an even more interesting verification, which is why the overlay:


It is hoped that it is not intended that this nuclear facility suffer a China Syndrome disaster such as seen at Fukushima, in order to render the ‘pit’ real on Earth in a hellish fashion.

The inset is the original artwork from which the overlay was obtained, a sketch of the what the actual Chamber looks like at Cheops, where it is described as seeming more like an underground quarry with lack of intent in what remains. The original is of very low resolution, I’m sorry to say. What I noticed about it that caused me to think to do the overlay, was the leftmost vertical protusion. I’m glad I did, because when I overlaid it, seeking to line it up with the cooling tower of the nuclear plant, I noticed something.

Actually, I noticed it while playing with the transparency level so I could see where I was positioning it. I truly wish I had video capture ability to show you the startling discovery, which, with a slight change in aspect ratio, was maximized; the darket portions of the overlay precisely match and seemingly define changes in terrain or map features. The effect is this: it gives the impression that the terrain to the South and near the power plaint has been cultivated to MATCH the overlay usefully. The best that I could hope to do to depict it here was to increase the contrast of the overlay, and alter the levels. There were originally only two discernable shades, black and gray (it is a B/W original image with some dithering in evidence). There are now four, and only the lightest of these is NOT defining a shape or darker area on the Map.

I apologize in realization that this is nowhere near as useful a description as the visible effect I’d rather show with video, but I assure you it is startling and implies, along with the wells and the Remington matter, that these lines are indeed intended to be here and at these dimensions, which in turn verifies the scale conversion factor discovered. Intention by design, in design.

 What is the the relationship of Cheops and Mass shootings to Templars and the Illuminati?

The European point of view

EuroAt right is an image looking from Cheops towards Europe, to reveal how it ties in with the Illuminati and Templars of old… not to mention any modern day Illuminati Warlocks operating there, today. Especially if their operations include casting magical designs in mass shooting in America to fast forward the formation of the North American Union and establishment of a one-World government under control of the Antichrist. Observe:

At the bottom we have our orange lines radiating outward at increments of 7.5 degrees of arc, where, in order to get to their designated array of shooting destinations in America, they must first pass through Europe. In Europe, we find one of these lines passes directly through the birthplace of Adam Weishaupt, Masonic founder of the ancient Illuminati (ironically, in 1776 — not truly ancient as most count it).

It is interesting to note that one can create in Europe, using only the birthplace of Weishaupt, and the orange lines, a baphomet which is correctly aligned Northward (the stray orange line), IF, and ONLY IF, running the North-line through the VATICAN IN ROME at the adjacent orange Cheops line. Then, IF, and ONLY IF, electing to use the Weishaupt’s birthplace as the center of said baphomet, will it then result as seen.

The significance of that is manifold. For one, it rests upon the remainder of the orange lines in precisely a mirrored orientation and in like relationships, in general, with the orange lines as does one of the baphomets in America. In other words, just as the depiction of Cheops in America was at the same viewing angle relationship as if looking at the real Cheops from an orange line, so it is, here, with the two baphomets.

Thus once more, the orange lines ‘project’ an image in useful scale with the same orientation to create a sister depiction in America. The difference is, THIS ONE, is properly aligned North for ceremonial use, and the one in America is flipped, so to speak… which allows IT, TOO, to be aligned with North IN AMERICA. How can that be by anything, but design?

Weishaupt’s baphomet, by the way, is at a point along the orange Cheops lines where, if used as a measuring point, they are exactly 333 Km apart, which is 207 miles (sums to 9), and 180 nautical (18), and since 18 = 99, that makes 3 threes and 3 9s, which is 999, or a code number for 666. And, of course, if electing to measure in both directions (the diameter of a circle about the birthplace between two adjacent orange lines), we also get 666.

Finally, we also see in the image the yellow icons for Templar castles and other properties, at least the ones we know about, and the red icons (and one balloon icon) which are Illuminati historical sites. We see also one green and one purple line coming from America, one a guideline from a baphomet depicted, there, and the other from a Masonic emblem, there… where both additionaly go directly to Cheops. The circle is complete; Cheops, European Illuminati and Masonic (Templar) histories (and arguably, current Warlock activities), and shootings in America and their resulting patters, all neatly tied together by six lines which impact all else. Coincidence?

 What is the link between Masons, the Illuminati, Satanism, the New World Order, and Egyptology?

Go back to Introduction

Go back to Proof SevenShootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Go to Proof NineShooting Sets Share ‘Magical’ Data Points Which Decode to Messages

Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols

Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.

Are mass shootings by intelligent design?

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

UPDATE:  (this comment, only) This post has generated some negative comments based on the commentors disbelief in the concepts being advanced. I need repeat myself; it matters not what you or I believe, it only matters what the architects of mass shootings believe.


What you will learn reading this post of the posting series

•  that the lines also defy randomness in their placement to form Masonic and Satanic emblems;

•  that the emblems are carefully aligned on the Earth in ways which reflect their function;

•  that they are rich with clues which hint at who and where are the designers;

that if you look closely, you can actually see how they ‘function’ as a magical weapon.

Are mass shootings by intelligent design?

Proof Six: Shootings Also Relate or Depict Masonic and Satanic Symbols

Is there a mass shooting conspiracy?

With respect to hidden symbols, we start with the basic understanding that Freemasonry and satanic cults do indeed have recognizable symbols they employ regularly. In some cases, they are more than symbolic, and have actual occult function. But one thing is true of all such symbols; a given symbol has a definite known shape with precise geometric relationships to other parts of the shape. So, if you know a select few points ANYWHERE upon the shape, you might be able to then define the remainder of the shape because you know what it is supposed to look like. This creates a potential problem when looking for such symbols in a ‘target rich environment,’ such as our map of 440 plus shootings.

Early Masonic Ceremony using satanic deity, Baphomet, from which the satanic ritual star is named.

Early Masonic Ceremony using satanic deity, Baphomet, from which the satanic ritual star is named.

In fact, some readers might rightly worry that it is too easy and therefore falls back into the realm of chance once more, no longer proof of intelligent design. I agree. Therefore, any such finding must be reviewed carefully for signs it was actually INTENDED, or traits which could not be so easily found true if by chance. In truth, I worried this might turn out to be quite a challenge, but in the end, the methods employed lent themselves to discovery of verifications suitable to address such concerns. Each one found by such means passed muster as being well beyond probabilities of chance, a fact I believe the reader will also find true.

Short of some custom computerized search, such finds still remain challenging, since one does not well know WHERE in a given intended shape a given starting point is located within the design, nor is the orientation or size of the shape known. In other words, you have to endlessly compare the same suspect points against endless possible combinations with other potential points, testing for all orientations and sizes. Tedium!

I’m operating on the assumption, here, that any architect of a grand design would want something more definite in such a ‘clue’ than something which might be seen as random, or require a custom software program; a deliberate placement, one likely with a specific relationship to a key location or course alignment which has additional meaning. The satanic baphomet, for instance, is normally aligned to North when actually employed in a rite, or ‘aimed’ at a target, and each of its five star points has a specific meaning which should likely be related to map location details; fire, water, earth, sky, and spirit.

So lets take a look: presented herein are four satanic baphomet ceremonial stars, and four Masonic emblems. It is my belief there are four intended for each, and no more, as I also believe (as do others) that there are four Globalist groups competing to field the Antichrist. Indeed, the individual Warlock designers are, themselves, likey hoping to be the chosen one.  Yes, more symbols may exist, perhaps intending nine or eighteen of each in support of magic 18. But one indication four is the right number is that it took several days of relatively easy effort to find each set of four, but several days more in each case found no more.

 What does satanism have to do with mass shootings?

Finding satanic baphomet symbols

In terms of simplicity for the designer, it is super easy to depict a baphomet upside-down, five-pointed ceremonial star with very few points. Because all the lines are the same length and join one another at the same angles to create yet another inner set of intersecting lines of equal lengths and their own duplicated angles, all you really need is to know any two line intersects at star tips or inner crossover points, and the rest could be calculated easily, though you might not know which crossover/intersects you are originally looking at (more than one star could result).  But that’s also just too easy, and would mean every two shootings could generate multiple stars. Commonplace, and unacceptable to designers, and to our purposes, here. Both they and I would prefer something more… more dramatic in order to reveal intention… the thing that made it hard to find more than four examples. If I’ve done a good job of insuring that, the more you read, the more you should be convinced of intelligent design. One clue they are not random is the sharing of shooting lines and events.

Though all 440 shootings were employed in the search, in the end, it turned out that ALL four of each symbol type (four baphomets and four Masonic emblems) employed their own limited universe of shootings… with many of the same shootings in both universes. Below we find the baphomet universe. It only took 23 shooting lines to depict four baphomets with some very interesting relationships. While each shooting line involved three shootings (I think one had four), the number of shootings depicted in the images below is only 54, because 22 shootings share common lines, and because I did not plot middle shootings of a line if not actually used to establish the symbol. Also, some are not visible at this viewing altitude because they are so close together. In such cases, I made one plot larger; when you see a larger dot, there are at least two shootings near to each other, there.

If you sum those all up by twos (line and shooting counts), we get our magic number, 18, a kind of cross-checking proof this is not random, but intended to be found design. The same exact thing will happen with our Masonic emblems, which will follow. How would it be possible to get that kind of consistent results by chance? All I know, is it is impossible for me to calculate the odds, they are so high. So, lets take a look, starting with four sample baphomets.


The variety in color and shape of shooting markers can be ignored and seen as equal. FAMOUS SHOOTINGS involved include: Sandy Hook, Aurora, Columbine, D.C. Naval yard, Sikh Temple, Virginia Tech, both Ihop Restaurant shootings, five Postal shootings, the original mass shooting at the Texas Tower in 1956, and the Seal Beach Salon shooting, worst in California history.

The lone shooting at center-top will serve as a kind of test gimmick, if you will, for determining an intended design vs. randomness in the findings. It does have its own line, one of the 23, which is not visible due an error on my part, which runs under the orange line shown below, to Aurora. The next image also shows our first baphomet along with several additional orange lines which are not themselves shooting lines as such, though they will be seen as originating from shootings, or may even be atop of actual shooting lines. These lines are all exactly 500 miles apart as measured at the green line, which has no other purpose but to show the point at which it is so. All of these orange lines are actually part of an entirely different proof of intelligent design which will be described in another post in this crime series. But they also function as aids in proving intelligent design, here.

Baphomet ONE


Color coding for added lines: Bold purple Baphomet lines, thin purple center guidelines, green line is point of measure of distance between orange lines, orange lines 500 miles apart go to Europe and serve as indicator tool for verification of intentional design vs. randomness.

This is the smallest of the four discovered. It has only one shooting at an intersect, but enjoys a large number of additional shootings, many more than needed, along all but one of its five lines. Two of these are also upon the same orange line, and two others on a another orange line. Note the thin purple center guideline line I generated. Though drawn based only on the baphomet’s construct, the line does something which relates directly to the orange lines, which while I cannot describe it here without giving away a future surprise revelation, additionally associates the shape with the orange lines. Therefore, this baphomet associates itself with the orange lines quite usefully, the importance of which will become more obvious as we go.

The center guideline also sports two white arrows. This is unique to this baphomet; both of these locations are Remington Firearms factories. I am amazed at such a ‘coincidence.’ I will not speculate on the meaning of it, as I think there are several equally intriguing possibilities, some favorable to Remington, some not so much. This may perhaps be best left for another day, another post. But in the summary section, I will analyze this emblem more closely so show you some of the ways it works its magic, and additionally illustrate intelligent design.

Baphomet TWO


Here is an example of a ‘minimal definition’ baphomet: two interests enjoy shootings and at best, only one is found along a line. However, it is uniquely defined in another way. One point and one middle intersect rest on two different orange lines. Moreover, the Northwest and East most star tips have a useful relationship, as well; one is over the orange line, and the other is short… by a like minimal distance. Indeed, the baphomets are very hard to draw with accuracy (I depend on trying to get all lines the same length — almost impossible, typically achieving to within a few miles at best), and so they may therefore actually rest on the lines perfectly in their designer’s version. Finally, note that the star line running Northeast reveals a guideline continuing on into Chesapeake Bay in Canada; this line also has something in common with the orange lines, further helping this baphomet pass the orange line test.

Baphomet THREE


At a glance, you might think this is the same image/symbol as the last. But no: it’s an amazing symbol very nearly the same size and location as the last, but with THREE intersect shootings, all augmented with five additional line shootings. But that was not enough. Two of the intersects are on the same orange line, and the same Northeastern running star line is actually parallel to another orange line. That same star line also has a guideline entering Chesapeak Bay which once more does what the orange lines do.

Baphomet FOUR


Talk about minimal definition, this one has zero intersects. However, it does have two and a questionable third shootings on a single line, and four on an intersecting line. Because it is so large, curvature becomes a factor in verification, as only a given symbol size and orientation (a small fudge factor is present) will allow all those shootings on the two lines to work, thereby eliminating a need for a shooting on an actual intersect of two lines. But we don’t have to rely on the fudge factor:

This time, it is the lower right star leg guideline which does what the orange lines do, but additionally, the rightmost orange line is actually parallel with that same line. This is only possible when the second line at any given distance has a precise difference in degree of ark from the first at a given starting point on a common perpendicular. If curious, we have that common perpendicular in the green line, and at that point, 500 miles distant, the inner-most line is running 54.04 degrees and the outer is at 51.49. Measured at the top of the line at the opposit star point, the distance error between the two lines is well within the margin of error in degrees of arc course measurement. Again, this is only possible with only ONE baphomet location, size, and orientation.

Four baphomets: all different, and yet all the same, in that;

a) they all share the same set of original shootings/lines (universe);

b) they are all therefore interconnected just as we found true of our isosceles triangles in the last proof;

c) they all have at least one line (side or center axis) which is symbiotic with the mysterious orange lines;

d) they are all verified by said orange lines, each in their own way;

e) the first four have a star point which can easily be associated appropriately with something nearby to represent fire, earth, water, air, and spirit. This is not terribly difficult if the star point is at a shooting because that means a population center with concentrated supplies of such relatable sites, but few work out that way, and therefore, your choices and chances of a match dwindle as you go to the next star point. The fourth is so large all of its points encompass water, making it the most difficult to determine: one is ‘the major air corridor’ for air traffic from North America to Europe, and one encompasses a portion of the Pacific Ring of Fire, but determining which one is spirit and which is earth, escapes me. That all of the baphomets (save that one question mark) otherwise meet this goal surprised me, as I though there would be more undefined, presuming their relationship veiled by designers to things known only to conspirators.

f) all of them seem usefully inverted in ways which imply four possible different Warlock designers from various locations: the first is inverted for anyone in Central Mexico or Central America, and there are candidates in both locations; the second is inverted for anyone in Scandinavia or Mexico/America (candidates abound), and the third is not only inverted but also aligned usefully North for anyone in America, while the fourth is aligned either for anyone in Spain/Portugal, or America/Mexico, uniquely so only because of its size.

And while there are yet more indicators of intelligent design in the summary, does it thus far seem like randomness in play, to you?

 Is there a Masonic connection to mass shootings?

Finding a Masonic Square and Compass emblem

The Masonic Square and Compass are most recognized of all Masonic emblems. Since it depicts a Mason’s (or, if you prefer, a Carpenter’s) Square rule, the first thing to try was to find right angles in the mish-mash of lines. Actually, this is how Proof Four came to be, and so we already have several good places we can look. Once having selecting a right angle for consideration, the next step would be to plot a center axis line bisecting it to form two 45 degree angles. This will become the vertical center axis of any resulting compass.

Next, one should seek to see if there were logical locations along that line from which two more lines could be drawn in mirrored angles away from the centerline to each side to create compass legs. To be valid, both lines would need some logical means to find an acceptable ending location to produce two legs of equal length. This might be determined by landmarks, or by completing a 3-D leg using a second inner leg line set devised in the same manner as the prior legs, and a like process for the square. We need to end up with something which looks very much like a logo emblem instead of a stick figure scratched into sand.

As you can imagine, this is a tedious process; it took a little over two days to find what I felt were all intended present; again 4 such emblems, likely one for each competing architect or group of designers. These are shown below, this time with the orange lines in place, along with the single stranded (lineless) shooting mentioned in the baphomet section, herein.

Once more, a limited universe is involved. In fact, it only took some 26 lines (image) created by roughly 64 shootings. All lines had three shootings, but 14 lines shared shootings in common, reducing the total involved to less than three times the line count. Sum those two numbers and you get… our old magic number 18. Another indicator these are intended and not random emblems.


Color Coding: Red, same as before; Yellow are right-angle shooting lines; Green for emblems and their guidelines. Twenty four of the 66 shootings in this universe are also found within the baphomet universe, including Aurora, Sandy Hook, and Seal Beach, and several of the postal shootings. That’s an interesting way to get 666.

Emblem ONE

This is the smallest and one of the easiest of the four emblems to find, taking just a few hours. In the image below we see it formed by the yellow line of the left portion of the square. The right portion should also be showing a yellow line as it is indeed a perpendicular. Must have failed to turn it on again after turning it off to see if there was more than one line present, as some red shooting lines are sometimes hidden by the wider yellow. Let me apologize in advance: the verbal narrative tends to be complex in nature, but is quite required if someone with an understanding of basic geometry is to see how the shapes were arrived at without having to make assumptions or guesses based on visual clues within the images. On the other hand, some people will find the images cluttered and confusing, and the text easier to grasp. Used together, issues in one should be clarified by the other.


From this was drawn a center axis at 45 degrees. Nowhere along this axis did anything jump out at me to suggest a logical compass tip, so I instead tried to find any two shootings which could establish mirrored angles at some point along that axis to ‘find’ the tip that way. Only two shootings (both blue) allowed this to happen, and a third shooting (yellow) on the right compass leg verified it legal. That same shooting, and yet another yellow shooting near the center axis, together suggested a logical upper line for establishing the square in 3D. Though not intersecting with the anything else used as a reference point, the line was indeed parallel with the lower right square line. Establishing a green guideline at the intersect with the axis by the line created by the two yellow shootings did indeed lead to another shooting beyond the image.

Another shooting line from the left compass leg had its middle shooting (blue) within the emblem area, and made establishing the complete inner line of a 3D compass easy. The other (blue) shooting on the first compass line, allowed reflective guidelines for the end lines of the square at equal distances, two more shootings helping in that effort (one off image to lower-right). This is fairly typical of how I attempted to find the other emblems.

What is atypical about this emblem is  a theme suggestive of a different designer than the others; schools. Each line seems to start,  end at, directly cross over, or is within about 200 feet or so of dozens and dozens of schools from K-8 through colleges, including several major university campuses. The square so encounters 33, the compass 46, and the center line, 11 more to total 90 in all. This sums to 18; 33 = 6, 46 = 10, 11 = 2; 6 + 10 + 2 = 18.

Before we go: not shown because we are viewing so close in on the map, is that the left compass leg guideline, extended for the purpose, does the same mysterious thing as the orange lines, yet to be revealed.

Emblem TWO

This works much like the last, so much so that I’ll not start with a detailed close up, nor describe blow by blow. But there are some unusual additional confirmations which imply a different architect than any of the others, and that’s where I’d like to start. The two images below reveal the alignments with existing perpendiculars, and the unusual confirmations. The first thing to note, perhaps, is that it is upside down (not to someone in Europe), and its pependiculars literally frame the Eastern Seaboard and Northernmost part of the U.S., leaving the compass to point at the middle of the country as if piercing it.




Marching to a different drum, this designer elected a unique theme; almost all corners and endpoints lay at a point having something to do with transportation or movement (of water). The two compass legs and several of the corners (not all shown) end precisely on roadways. Two of the corners end on railways. One of the bottom square corner (perpendicular) and the inner 3D line of the compass end at water. Confirmation of intent, and perhaps a clue as to the identity; someone big in the transportation industry, perhaps? Again, in final note, and not shown, the right leg guideline of the compass does the mysterious orange line thing when extended toward Europe.

Emblem THREE

This one was problematic, and its solution again implies a whole new architect. The issue was this: the actual perpendicular being tested (off screen to the lower-right) failed to be useful; it supported no emblem. But I noticed a shooting line that seemed perpendicular which was NOT yellow. At first I thought I had made a mistake and missed one, or had accidentally deleted its yellow companion line. But no — it was simply beyond the acceptable error of .1 degree of arc, it being hard to visually judge such small differences.

And yet, the line was begging to be considered, because in addition to looking temptingly perpendicular, it also ran usefully parallel with and atop of the edge of a large dam (see smaller image in the right margin). So I wondered? What if the designer had intended to use it, anyway? After all, I had no way of knowing what degree of error they deemed acceptable.


E3d1I thought I should at least give it a try, and went ahead and plotted a center axis test line (not shown) and looked along its length for an appropriate compass tip. What I found, changed everything. The image montage below summarizes the remarkable ‘theme’ findings, and more.

There was indeed a very logical starting point for the compass, but it was NOT on the test axis line, it was about 1.5 miles West of it. So I moved the axis line to match, and then finished trying to flesh out an emblem to see if there was good result. I reasoned that if it was so intended, the validity of the effort would reveal itself true somehow. Indeed.

The montage of insets below reveal just that, and are key to understanding why I find the results acceptable. So much so, in fact, that I now additionally reason that there may yet be an intended future shooting planned to create the very line I manufactured, but which like the one over the dam, does not actually bisect with the perpendicular to create a right angle, and thus does not spoil the count of 18 such relationships from our prior Proofs.

Indeed, this may be a very valuable find, as it MIGHT allow prediction of a shooting event, and perhaps even its prevention.


Quick montage review: The yellow line at top-right was the first attempted test center axis line, and the green line is the new relocated but parallel test line, which goes to a mountain actually named Initial Point. When you hold a compass, it is the initial point of control and placement of the compass; the handle of the compass. Now the left leg which was discovered to meet requirements would seem to represent the one with the point you stick into the paper. We deduce this because the shooting is at a hole in the ground (quarry) and that place is called Permanente (when you stick the compass down, it is permanently affixed to the spot until you lift it). More: the actual shooting took place at the Engineer’s Trailer where they very likely USE A COMPASS with their quarry maps. Confirmation of intent.

The other leg lands in the center of a square field (implying paper?). Note the terribly faint green line (of several) attempting to show the high-tension power corridor running nearby… at exactly the same angle to the inner leg as the two inner legs themselves form… and notice therefore, that the road way is perfectly placed to form an isosceles triangle just as would be a line drawn between the two legs, were the power line the other leg; a mini duplicate of the larger compass. More on that, shortly.

This in turn allowed trying to find the inner line for a 3D compass. It worked out, after finding the only place where shooting lines would form mirrored relationships, to be dead center of a circular irrigation pattern. When you spin a compass, you create a circle; a confirmation of intent. Next, I finished the square by extending a guideline from the yellow perpendicular at the point where it bisected the center axis line, and discovered it indeed intersected with a shooting (well beyond the image) to qualify. More intent.

But what about rendering the square in 3D? Simple: the complementary line had to be somewhere below where the yellow perpendicular met the new axis line. Again, scanning the axis line finds the logical place; an upside down pyramid (montage). A significant confirmation. And the ends of the square were easy, as there was a shooting (also beyond the image) which gave a nice proportional appearance. Implied intent.

And yes, the orange line thing happens here, too, it being once more the left compass leg which does it. A couple of additional confirmations are also present. This emblem, like most, is not aligned to North. However, it has an unusual 20 degree angle on the compass — all the others have fractional elements. At that angle, if one chose to lay the compass flat on the map as drawn, and then flip it to the right such that the Initial Point and right leg remained in place,it would then point North… exactly, even considering magnetic declination (which varies depending on where on Earth you take the reading) present at the new location. More: 20 degrees divides into 360 18 times, our magic number.

This is, I believe, incidental to the intended reason for the curiosities in the centermost portion of the montage; the central ‘mini compass’ duplicates this very feat (a flip). The leftmost faint green line from the left leg is the line between the original full size compass legs — the radius of any arc the compass might be used to create. That line measures 176 miles. The faint yellow line in the inset is 176 Meters along the radius of the mini compass, and then turning Northwards, perfectly bisects not only a portion of the farmer’s field (forming three virtually identical rectangles), but the mini compass, itself, becoming its central axis line. At the top of the roadway, we see a second green line which is 176 yards long, which ends exactly at the edge of the northbound road which bisects the powerline precisely between two towers, one on each side of the road. I believe these oddities are our clue to flip the compass in order to get it to point North, the same direction the road is going.

Mind you, all of this was discovered well after ploting and measuring the emblem. I am not making this stuff up or reverse engineering results somehow.

Emblem FOUR

Again, the last one is both large and arrived at uniquely. Thus far, not one of the emblems was properly aligned to North as viewed in America. There were only two perpendiculars that even came close to enabling such an alignment, but neither of them allowed emblem discovery. Then I noticed the little hiccup in the Northern Border with Canada just about dead center of the U.S. of A. It sticks up just enough to suggest the tip of a compass, or a pinching action of two fingers. And, it was right above our friendly, lone, lineless shooting. What if that was the tip of a compass? The simple answer is, it was… but it involves no obvious or pre existent right angle from our earlier proofs, and is quite minimally defined. Fortunately, we will find it verifies itself despite these ‘missing’ construction elements.



As it happens, an axis from that shooting to the Lone Star College Shooting creates an emblem alignment which is pointing due North and considers allowances for magnetic declination. So this emblem is correct for use by an American, probably someone right there in Texas, methinks. With no initial perpendiculars, I had to rely on shootings and shooting lines to come up with all remaining emblem constructs. The compass outer line was easy; the right leg has four shootings, the fourth (white square) hidden just beneath what seems to be the last one at the bottom. The left inner leg is defined by three, and of course, once you have one leg you know where the other is because it must perfectly mirror the opposite side.

The square was harder, suffering most due the lack of perpendiculars. The lower right side is established with two shootings along its guideline, and confirmed by a single shooting on the opposite side near the tip of Texas. The upper right if also formed by two formation shootings, but the left side has no confirming shooting. Again, if you know what one side is, the other side must match, so that should not be a problem. But I’ve been continually amazed at the consistency of the baphomets and emblems, and how when it seems something is not right, it turns out I’ve missed something there all along — so I’m tempted to think some future shooting will take place on this line, too. The end lines are found using two shootings on the right and a single confirmation shooting on the left.

Two more unusual things about this emblem in addition to aligning North: Our friends at Remington are back once more with highly suggestive positioning, including a third location in the New England States. I am tempted, therefore to believe that the lone baphomet which also had the Remington sites was designed by the same Warlock, and yet, that baphomet was not the one aligned North. This adds to the mystery of the meaning of this remarkable and consistent ‘coincidence.’ The second unusual thing affords even more confirmation… because this time, there are four guidelines which extend to Europe to do the orange line thing.Intention, intention, intention.

Four emblems, all different, and yet the same, in that;

a) like the baphomets, they all shared the same original shootings and lines, defying random chance;

b) like the baphomets, they are therefore all interconnected;

c) like the baphomets, they all establish guidelines which do the orange line thing;

d) they each have their own unique method of cross verification; transportation, shapes and places, schools, and perhaps, Remington.

I again ask; does this seem like random chance, to you, or is intelligent design involved?

What does the occult have to do with mass shootings?

Summary, and additional bonus proofs: the magic works

So not only do we have dozens of random shootings which happen to line up in sets of three or more to make straight lines with doorway-to-doorway-to-doorway GPS-level accuracy, but we have two different shooting universes of such lines which share many of the same shootings/lines to form four readily identifiable Masonic emblems in one, and and four satanic baphomet symbols in the other. Each symbol tends to have its own theme or characteristics to imply four different designers, and all symbols have a symbiotic relationship with the orange lines with an identical but yet-to-be explained proof of their own. This should be enough to convince anyone that mass shootings are not random events, but carefully planned, even though some of the shootings may indeed be naturally transpiring and truly random in nature. We’ve discussed in earlier Proofs how a design can incorporate a pre existing natural shooting into a line with added planned shootings.

But there are still additional proofs or mysteries to reveal within these symbols which drive the intelligent design point home; things which reveal some of the ‘magic’ in play by virtue of extreme care and attention to detail in their design and layout. Some of this is already seen in the themes, earlier mentioned. But there is much more than just that going on. Examples:

Examples of Magic in emblem TWO:

Emblem two has some additional special properties which defy coincidental happenstance, and they relate to one of the purposes of a compass and square, which is to measure things out with accuracy. Emblem two does this with uncanny consistency to an observable rule set. The image below shows a closeup of the emblem and the national view of it. Remember, the yellow lines are 90 degree right angle lines, and that because they are on a sphere, they tend to curve visually, and even though two lines my be parallel, they will eventually converge when upon the surface of a sphere. I’ve added additional colored lines to show some interesting ‘magic’ taking place which absolutely defies chance.


The inset image affords three new colors for key lines to be evaluated, each offset from the line it is measuring so you can see the original as well. The blue line at bottom is the radius of the arc formed by the compass, and the adjacent red line is the diameter (not the same thing as the radius/diameter of a circle created by rotating the compass). The light blue line is the measure of the thickness, or side of the Square, and the purple line represents the gap in the outer perpendicular yellow line which stops at a shooting in Washington D.C., even though the line serves as a chief guideline to forming the Square.

The labeled lines reflect the actual original line being measured to provide a standard of measure, and the other lines merely indicate where another line segment have that SAME measure. It does not matter what the resulting measurement is for this part of our dialog, just know they are the same. So the first thing to note is that for each one, there are three instances of line segments which match each other, though most additionally exist at reflected locations of identical construct in mirrored fashion; the compass shape is, after all, mirrored left to right. This 3 lines x 3 repetitions (3×3) is already indicative of intelligent design which defies chance. But there is much more.

The red Master line is 145.96 miles between compass leg tips, but because we have a error possibility in degree measurement for each of the two legs, we are dealing with a ± .38 mile total potential error in this distance. Regardless, this measure becomes extremely powerful; look at the larger view, and note there are red lines drawn adjacent to the various perpendiculars which define the ‘box’ around the U.S. created by these lines, doing so in a kind of ‘spiral,’ of sorts. These are numbered to match the sequence of discussion regarding discovery and use of a rule set, something not possible if the shootings which made them were random. There is a magical relationship between these six red lines and our diameter measurement, including the error potential:

These rules are significant: it means the compass was created to get a measure, and the measure was used to compute the shooting line lengths, which meant the shootings had to be planned to create the lines to meet those required lengths, and form a straight line.

Rule One: a given yellow line should be evaluated for any logically intended base line, and measured from that base line to its end point. Divide the result by 145.96 in search of a whole number. If the result is within an allowed error range, accept the whole number as valid and continue to the next rule. If it is not, try another base line. If all base lines fail to produce good result, select a new line and repeat Rule One.

The acceptable error range is determined by looking at the fractional remainder (e.g., .96 of 145.96). If less than .35 or greater than .58, the result is within the error tolerance established for the diameter line (± .38 off of the .96 remainder of that measurement). The goal is to produce a quotient with no remainder not within these limits, which can therefore be stripped away to leave a whole number which has ‘no error’.

Rule Two: Choose a perpendicular along the line just measured to become the next line to be measured, and repeat Rule One. All such perpendiculars along the new line qualify as potential base line; the previously measured line is a very logical base line, as is any line parallel to it, but the nearer it is, the more logical it is.

The remaining rules or determinations required to enjoy full success in this effort are best described by explaining them with narratives. These rules were arrived at after a great deal of experimentation based on the suspicion that some such rule set must exist to establish just how all these constructs relate to one another, and perhaps more, such as why a given shooting line is a given length. This is the result I obtained using the above rules (or as described in the narratives) which indeed prove the concept valid…

Line 1: the most logical line to be measured first seemed to me to be the one North South yellow line used to form the square, which ran uninterrupted. I gave it more weight than the interrupted line parallel with it due the fact it was an incomplete line, and yet more weight than the East West line because it enjoyed the parallel companion. The most logical base line was the East-West line which formed the square’s outer boundary. Measured to the end, we find the diameter divides into the resulting distance 7 times with a remainder well within the error limits; zero inaccuracy results.

Line 2: the measured line failed to make a useful baseline, but the parallel line did, dividing usefully into the distance 15 times (quotient).

Line 3: failed all attempts, so per the rules, went back to the square for the East-West line

Line 4: turned out line one was a base line which worked correctly, and provided a quotient of 16.

Line 5: failed all attempts.

Line 6: failed all attempts.

And now, the narratives to address the lines which failed to get past the Rules thus far stated, starting with an explanation of my guiding point of view. It is my assertion that the perpendiculars shown in the image are intended to ‘box in’ America symbolically, essentially framing it, as if a protective or restraining wall. In such a symbolic context, the compass is like a dagger penetrating that wall, and allowing entry and harm. Visually, because of the sphere’s impact on lines, it is impossible to make the box truly rectangular, because lines are not truly parallel at distance, and they are curved. A line can only be perpendicular at one point of another line, and cannot be truly parallel with another perpendicular at a different point on the same line.

This complicates the designer’s ability to use only perpendiculars to depict the complete box, and forces the use of a seemingly convoluted ‘spiral,’ as well as rules to allow compensation. But I was convinced that the compass 3×3 measurements somehow had a relationship to the founding yellow perpendicular line set. This is what led to experimentations which uncovered the Rules and their unique results:

Narrative to resolve line 4 and line 3: It struck me that line 3 automatically defined line 6 as a base line, by default. Thus line 4 was unique in that it already had a pre existing baseline to contend with, and I wondered how this might alter the rules. I noted also that line 4 had no possible way of ‘closing the box,’ as there was no land mass off the coast of Los Angeles to support a shooting location which would make the line long enough. But line 3 DID close the box. Thus I wondered if both lines were not intended to work together. Indeed, trying various measurement combinations, it turned out that combining the previously used length of line 3 with a length on 5 using line 4 as baseline to the pre established baseline which is line 6, produced a quotient  of 10.

Narrative to resolve line 6: the only remaining thing not tried was to measure the full line, which produces the error-free quotient of 14. Simple. Thus we see that a thing transpires which is impossible by random chance; the six lines which relate to one another as perpendiculars in a single collective, all enjoy a factorial or mathematically computed relationship to the very Masonic emblem which they help define, and do so by Rules created by logical deductions. I am convinced that there are likely similar findings possible with the other two measurements, else why would they be within the 3 x 3 pattern previously cited?

I additionally suspect the series of quotients, themselves, can be employed in some additionally useful manner, either symbolically, or perhaps even in the real World some way (such as map coordinates, distances, course headings), given that a compass and square is involved, as well as a map of the real World. For example, in answer to the last (3×3) question, consider this coincidence: the sum of all the quotients is 62, and just as the master diameter was divided in half to produce the radius, half of 62 = 31. If we multiply 62 x 3 x 3, we get 558, which not only sums to 18, but divides by magic 18 exactly 31 times; and additionally, 558 miles = the palindromic 898 kilometers, and 484 and a fraction, nautical.

 Do mass shootings involve black magic?

Examples of Magic in baphomet one

Because it can’t be done by computer program, and because the distances of a given side of a baphomet is great, and because of the potential for angular errors in Google Earth measurements, drawing a star with perfection in Google Earth is actually not very easy. One way of judging if I was usfully accurate was how closely I could duplicate line lengths. One can average these out, or weight the length to any known intersect points with shootings to try to judge the correct ‘target’ or appropriate median length.

In baphomet one, the resulting dimensions allow some very interesting math computations which reveal magic is indeed afoot in their design, something again not possible if randomly arrived at. These computations were NOT, repeat NOT made or even considered as something worthy of trying until more than a week AFTER arriving at the number deemed as ‘best.’ The designer of any intended baphomet, however, would do the opposite, and compute the line length needed to match target computation results.

The average length of baphomet one is 1451 miles on a side (a prime number). The average inner line is 341.5 miles. The standard ceremonial baphomet has a circle about the star points, and may employ a circle about the inner intersects, as well. It is the nature of these circles which lends power to this particular baphomet for ceremonial application. Numbers below are typically rounded:

a) the area of the inner circle results in a magic number (palindrome times 10) 282820, which expressed in kilometers (not rounded) is the palindrome 455155.4;

b) the miles sum in threes to 1210, another palindrome times 10, and sums in total to 4;

c) the area of the outer circle (a palindrome, and a prime number, times 100) is 1848100, which sums in threes to make 1201, which also sums to 4;

d) comparing the two original palindromes, note that the number 8 is every other number in both, and that the total of all remaining numbers is 6 in each case.

e) in like manner, the circumference of both circles each sum in total to 15, which sums again to 6;

f) the radius of the outer circle in miles is a palindrome 727 (a prime number), which sums in twos to 99 (18), and in kilometers is the magic series 1234, which sums in twos to 37 (37 x 18 = 666) and in total to 11, and in nautical miles, directly equals the greatest of all magic numbers, 666.

g) the vertical axis of a star point is (not rounded) the palindrome 535.35, which in kilometers is 855 (sums to 18, while 535 sums t0 13), and 461 nautical (sums to 11). Note also that 855 mirror the 558 ‘coincidence’ from above.

h) the distance from one star tip to another is the magical triplet 888 miles, which sums in twos to form (1616) pairs of palindromes; 161 and 616, which are inverses of each other.

There is only one possible size baphomet where all this is possible. Add the fact that its orientation allows each point to be near an appropriate site useful in divinations, and it seems highly unlikely this is some randomly created shape: the lower right tip is in water; the one above that rests on a cemetery (spirit); the upper point is ringed by airport runways (air) and contains one within the tip, all despite the desolate woodsy wild lands area involved; the Western point has five smoke shops (fire) within the same square block near its tip; and the lower left point is in a desert (earth).

 What do mass shootings have to do with the new world order?

The additional Magic of satanic intersects:

We have another strange confirmation of intelligent design which impacts both the baphomet and emblem causes. In all of the hundreds of shooting lines created by all of the 440 shootings thus far computed (well beyond the limited universes used to reveal baphomets and Masonic emblems), there are certain line oddities which exist. I’m talking about situations where three or more lines cross each other at the same location within the GPS accuracy limits used for our shooting site doorways. There are exactly 18 of these, our magical number, and there is something very peculiar about ALL of them.

Their map coordinates, both the longitude and latitude, each repetitively sum by twos up to some combination of 18, 13, or 11 (eleven, recall, being the number of chaos, disorder, and that which precedes destruction). That is to say, you will get one or two resulting numbers of those three possible, potentially two of the same number, but perhaps just one (i.e., 18, 18.18, 18.13). For this reason, I’m calling these ‘satanic intersects.’

Example: The image shows one of the satanic intersects, and the coordinates from Google Earth. Do the math.

Lattitude: 35 = 8, 22 = 4, 50 = 5, 82 = 10 = 1, so the final math is 8+4+5 +1 = 18

Longitude: 106 = 7, 50 = 5, 46 = 10 = 1, 05 = 5; 7 + 5 + 1 + 5 = 18



Here is the kicker. There are 18 such intersects. They ONLY APPEAR where at least one of the intersect lines is used in the baphomet or Masonic emblem universes. More: like the 18 right triangles which divided into 9 left-facing and 9 right-facing versions to yield 99, which like 18 itself is also a code number for Satan… these 18 unique intersects are located 9 each in the two universes; 9 on baphomet shooting lines, and 9 on Masonic emblem shooting lines.

Not just intelligent design, but consistency in distribution, too. What is also interesting to me is what seems to be located at or near many the various satanic intersects. Here, for example, is a gun club, but others include Locust Valley, Freedom Mt., and a church named Zoar (the location of Sodom and Gomorrah before destruction). The intersect shown, you may have noticed, enjoys complete symmetry in that it creates two idential obtuse angles and and four identical acute angles to within .1 degree of arc, which happens to be 20 degrees, which again is one 18th of a full circle. There are two which have this SAME EXACT perfect symmetry, and they are BOTH RIGHT HERE. Each universe (emblem and baphomet) of lines has a DIFFERENT shooting line going through at the same angle (the middle, most level line).

Orange line magic? Sorry, but I can only give you a hint, here. It is fully revealed in Proof Seven, link below, which also explains the orange line significance, per the title. The hint is this: It goes back to the very historical roots of the Illuminati and the Masons from which they sprang. It does it very uniquely, and consistently, through history. Keep reading…


Go back to Introduction

Go back to Proof FiveShapes in Turn Form Complementary ‘Magical’ Clusters;

Go to Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters

It defies odds that perfect shapes should cluster together in ways which share overlapping lines or corners, and be generally both aligned and mirrored in additional symbolism.

Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that the triangle shapes defy randomness in their placement to form aligned clusters;
•  that their count in groupings is again a magical number;
• that there is Masonic/satanic symbolism present which can be deciphered.

Are mass shootings by intelligent design?

Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters

Is there a mass shooting conspiracy?

In the prior post we found perfect angular relationships in a series of interconnected shooting lines to form parallels and perpendiculars, each line created by three or more mass shootings located in a row with doorway-to-doorway-to-doorway accuracy at GPS levels. That alone defied the odds of random chance, but to again do so in the magical count of 18, and to further form right triangles and non right triangles in groups of 18 as well, would be impossible by chance. It had to be by intelligent design.

In this post we look at additional magic taking place with the same original lines used to create the prior array, and learn even more remarkable and scary things yet await us. Those lines I refer to as red foundation lines, those 75 shooting lines seen in the very first image of the prior proof. That’s a good word to employ…

Those same lines, which I interpret to be akin to a Mason’s blueprint for an architectural structure, indeed seems to represent a foundation/framework for a much more complex superstructure, one built only from Isosceles triangles — where two sides are of the same length. These triangles not only have specific relationships to the prior shapes, but to each other in two distinctly different clusters, doing so in a way which implies two different architects competing with each other but following the same general guidelines, with slightly different interpretations and strategic goals in mind.

What we will see is impossible for random lines to achieve; to create like shapes which cluster together in ways which see them share common lines or corners, and conform to a general patterns based on specific rule sets, ONLY. That roughly 55,000 line intersects should only produce Isosceles triangles in a manner which conform to these rules is simply not going to happen except by intelligent design. But that is exactly what takes place in ‘random’ mass shootings.

This is easy to reveal visually, if done in stepwise fashion, but there is also likely secreted coded information which further study might reveal, such that it is perhaps the most important post thus far in terms of study. That will add some descriptive complexity. Ergo, the more you read in this post, the more you will tend to agree more such study is warranted.

What patterns result if you plot mass shootings on a map?

Overlaping and shared lines and shooting points create mirrored clusters.

The West Coast: The series of images below reveal the impossible. For some reason, all these perfect triangles share common lines and/or shooting event locations among themselves to form one huge cluster spanning the greater Western Seaboard. The actual triangles formed will be displayed in yellow, as in the prior post, as will any key parallel/perpendicular lines from the prior post being used to reveal a relationship. Any other anchoring lines will be shown in red if deemed useful.

EVERY SINGLE triangle is anchored either directly to the foundation lines by sharing one or more sides with the foundation, or its corner rest on a foundation line shooting, or one or more sides might reside on a line which itself intersects with such a shooting. We are again talking about the same 75 original shooting lines used to create the foundation in the first place. In other words, it is one integral complex of shapes created with great care. Moreover, we will see the magic numbers 18 and 9 again and again in the process.

Note: Very few such lines will be shown, only referenced, else it can become visually and verbally confusing. The final example will show all such lines as it happened to afford a simpler visual, and that will allow you to fully understand the ‘rules of design’ all Isosceles stubbornly obey, as based on the foundation. Also know that while it may appear some of the depicted triangles are not equilateral, or that their lines are not straight, this is an illusion, a function of point of view of such lines upon  a sphere. This may cause some to appear as if they are not Isoscoles. Rest assured, all of them are.

For the purpose of allowing a triangle to be seen as legal and intended, two sides must be equal in length to within an acceptable accuracy which considers known issues with Google Earth. Each of the two converging sides could be as much as .1 degree off in opposite directions (.2 total error), and a like error in the base line could additionally increase the chance of sides not quite being the same. They were therefor not allowed to exceed .5 miles difference, especially where greater distances was involved, But readings were found to be as small as .01 mile in lesser triangles, or where accuracy issues were less prevalent.




Fig. 5

Here we have a set four Isosceles triangles which all have one thing in common; they are all derived from  one of the perpendicular lines from the prior proof (which lies along their common base lines). The third smaller triangle between the two larger ones is NOT counted; it does not have equal sides, though visually it may so seem. The fourth is actually nested within the third, both pointing in the opposite direction. While its base is not on the same line as the others, it shares both sides in common with one which does, and is therefore included in this set.




Fig. 6

This set of three Isosceles also all rely upon sharing the same baseline with one of the key most perpendicular/parallel lines from the prior proof, as shown.









Fig. 7

This set of FIVE all share their baseline with one of the original red lines used to create the perpendicular/parallel lines from the prior proof. Moreover, that line intersects with the perpendicular line used in Fig. 5, above. The fifth is very small at the very bottom, if you didn’t see it at first.








Fig. 8

This set of four share their base, or in the case of the smallest, one side, with a foundation red line which intersects at one end with a mid-point shooting on a another perpendicular.








Fig. 9

The smaller Isosceles shares of this pair  has a common side with yet another perpendicular. Its other side is a foundation red line which intersects at a shooting shared by a different red foundation line used to form one a side of the larger Isosceles in the set. I probably should have included the ancillary lines to better illustrate. The shooting was a Standoff with Police in Canoga Park, Feb. 7, 2008.

It’s smaller Isosceles’ lower corner lies directly on one of California’s worst shootings, the Seal Beach Salon on Oct. 13, 2011, and is the endpoint for THREE different perpendiculars.




Fig. 10

This is what the West Coast collective looks like: 18 Isosceles triangles in all (any others which seem to exist do not measure out acceptably). The magic numbers continue: 9 of them rest directly on a foundation perpendicular or parallel with one or more sides, or a corner, and 9 share a side only on a red foundation line.





Why Isosceles?

The Isosceles triangle is a very important shape to a Mason. The Masonic emblem typically implies four of them, two making up the Square, and two making up the Compass. There are three different basic architectural structures the Masons are commonly associated with, all of them relying upon the Isosceles. The best known is the Pyramid, most notably, perhaps, being the one on reverse of the Dollar Bill, aka The All Seeing Eye. The Egyptian style obelisk, such as the Washington Monument, is also well known, and uses two Isosceles in its formation. A lesser known has the most relevance to understanding the symbolism in play, and is the use believed to be intended, here.

That is the Frustrum, an early concrete ‘tank trap’ of sorts. Only tanks did not exist at the time. Instead, they had to worry about cannon, battering rams, and assorted apparatus to breach high ramparts, all of which could not get close enough for use if the ground they required for their use was occupied by collections of cement pyramids. Most frustrums (means ‘that which frustrates,’) had a flat top like the Dollar Bill — not a pointed peak. But their design still relied upon the Isosceles.

With that in mind, the above image seems to be largely pointing to the Eastern Seaboard, with a couple pointing in other select directions. Keep that in mind when we see what’s going on in the East Coast, where we will have more clues that they are intended to frustrate.


The East Coast: The basic rules of existence found in the West Coast triangles are also present in the East Coast sets. However, it quickly becomes clear the actual layout or theme is entirely different, and at a glance, implies no consistency. Yet we discover perfect consistency to the construction rules — though a completely different intention in the design. This, to me, strongly suggests two different designers, perhaps with two different strategic concerns which dictated how they applied the symbology. We will explore this more in closing review, as it does support the frustrum argument, which provides the missing consistency found in the West Coast collective.


Fig. 11

Here we have a set of four Isosceles sharing a common base line which is one of the red foundation lines. It will also be in common (next image) with several more triangles, one of which shares a side in common with a line which is both perpendicular and parallel from our prior proof. Note that none of this set’s lines are parallel, which dramatically increases the impossibility that this pattern should exist by chance.







Fig. 12

The prior set is shown for reference at the right, as it has a common base line with four more, making eight in all on one line. The blue (looks green on some monitors) line is in common with the singular triangle added in the next image, and is the one mentioned in the prior Fig. to be in common with a foundation perpendicular/parallel, as also noted in the next.







Fig. 13

One additional Isosceles added to make nine (Figs. 11, 12, 13) in all, and it overlays the smallest of the prior set and is indeed in common with a foundation parallel/perpendicular. Thus two of the nine have sides in common with a foundation perpendicular or parallel. Interestingly, these are the ONLY ones on the East Coast which do. All others are in common with red foundation lines, only.






EC4 copy

Fig. 14

This odd set of FIVE Isosceles have obvious shared sides, only one not sharing two sides.










Fig. 15

Four more make up the final set. Here, I’ve added all the red lines and one of the foundation lines (yellow) which are used to validate them. Each red line shown is in common with a side of a triangle AND ends or interscts with a shooting either on another triangle or the foundation line. EVERY SINGLE ISOSCELES, East or West, does this, or is already sharing a line or shooting on a foundation line more directly. How is this possible if ‘random?’ NO SUCH TRIANGLES EXIST ELSEWHERE, which is to say, there is no other rule set in play.





Fig. 16

The sum total of all East Coast Isosceles is, just like the West Coast, 18. Also like the West Coast, they are divided into two groups of 9. However, this time, the division is 9 is between those which share immediate direct commonality of a single red foundation line and or a parallel/perpendicular line (Fig. 11, 12, 13), and 9 that don’t.







Summary: My belief these are frustums is based on some observations beyond those thus far offered. An Isosceles triangle is a form of an arrow, and as such, tends to point. That many ‘point’ in various directions implies there are things to be pointed to which are objects of (something I presume to be negative). At first when I saw the West Coast pointed almost exclusively inward, and the first East couple of East Coast discoveries pointed inward as well, I imagined they would all do so, and represent thereby the intent to frustrate the power of America, and subjugate it to the will of the New World Order. Then the rest of the East Coast discoveries discounted that notion by pointing every which way.

So I then considered that some were long and thin and others fat and squat, and size of course, was varied. I wondered if the ratio of length to base and size could somehow be used to represent a distance the implied ‘arrow’ factor might be intending to point. So I took a handful of them and found the center of their baseline and ploted a central vertical through and beyond their peak to see if there were any logical destinations, and where they were might be. VERY interesting.

The large long Isosceles angling about 50 degrees in a Northeasterly direction leads somewhere interesting, a place both Masonic and governmental in nature, as does the one upward Isosceles in Fig. 12. There is a similarity in destinations, as both are Capital cities where a Masonic site can be found, and which represent a power center for a modern day ‘Illuminati’ and which relates to the National government, as well. They are shown below, with additional ‘illuminating’ commentary.

Do mass shooting patterns reveal Illuminati ties?

The Pyramids know from whence Illuminati power is derived


The long Isosceles center line leads to the Louvre Pyramid, where startling ‘coincidences’ start to unfold. First, the line itself is on the same course heading as the entire property’s main axis.  That line plot is drawn to within .1 degree of arc accuracy from the Isosceles which created it. The Louvre Pyramid is also on a centerline to the original French seat of power, the Palace, perpendicularly located just to the North.

The distance of the red plot line from the base of the Isosceles to the Pyramid is 4,540 miles (rounded with .001 accuracy), whereas the side of the Isosceles, times four (something considered potentially intended only because there are four fully independent Isosceles directly over the sides which share no lines or shootings), plus the base, = 4513 miles, short a difference of 26, yielding about a .5 accuracy. These errors are all within reason given Google Earth imposed limitations.

However, there is a fifth Isosceles which does share a side which measures 13 miles, and is itself enjoying two sides shared within its own set.  Adding in 13 x 2 provides zero error. I admit it seems convoluted and ‘reaching,’ but I also find it potentially intended. One possible clue is that there are actually SIX pyramids at Louvre; four considerably smaller ones surround the one of fame, and one inverted and sunk into the ground — one for each Isosceles used in the calculation.


The second Isosceles points with like accuracy to this building in the Canadian Capitol of Ottowa which, while it was originally a government facility, is now, like the Louvre, used for the arts. Note again the course is aligned with the property’s liner aspects, and like the Louvre, bisects a glass pyramid (a roof skylight). Also like the Louvre, there are multiple pyramids on the property; one for each Isosceles used in the calculation. The building is named after a noted Canadian Prime Minister who was also a high Mason.

Here, the distance from the Isosceles base line is 467.8 miles. We can get the same distance by adding the side of the Isosceles with the sum of the shared portions of the four common baselines in the Isosceles set involved… to within 1 mile, or about .2 percent error. That sounds like an entirely different a method, but…

Amazingly: Both locations can actually be found by using one simple formula on the involved Isosceles triangles: Destination = the base of the pointing Isosceles + (the side of the pointing Isosceles x the number of independant Isosceles overlapping) + the length of any shared side or base with a nondependent Isosceles.

While I have not had time to review the remaining triangles, a superficial review implies that many of them end up pointing to the middle of nowhere. However, one of them points generally to the same neighborhood where, as we will see in a future proof, lives a suspect billionaire whose identity is implied thereby to be one of the designers. This may point to his corporate offices nearby, precise location as yet unknown.

But there are so many possible mathematical relationships/calculation rules which might additionally be in play, there is no way to know for certain short of an exhaustive study what all these Isosceles might secretly be indicating. One more reason I need help.

Another question which needs to be to be similarly explored by someone with manpower and funding is… are there numeric codes contained within triangle side lengths and angles, or relationships between such measurements among triangles of the same sets?

But even based on the minimal findings so far, I assert they support the notion of multiple competing designers, said competition being to determine which group of several such groups of Illuminati will have the dubious honor of having the Antichrist come from among their members, as well as who among their group. Therefore, to cast frustrums against European and Canadian Illuminati and their political power centers would make perfect sense.

More proofs follow…

Go back to Introduction

Go back to Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes

Go to Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols

Emergency Post: BLM vs. Bundy is an Ominous Danger

It is seen by government as a win-win ploy that raises the stakes to unimaginable levels. What we see on the surface has nothing to do with the sinister plot which it enables and portends. This is our last and only chance to save the country, or loose it to tyranny forever, and rush toward Earth’s final demise.

Will Bundy vs. BLM start Revolution 2.0?

By H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

What is going on in Nevada with the BLM?

What you will learn reading this post…

•  government’s actions against Bundy are mere window dressing — something more sinister is afoot;
•  the stakes are incredibly high, but hard to see — your very life and the fate of the World, in fact;
•  there is only one logical solution, and everyone plays a role.
What can I do to help Bundy against the BLM?

Why BLM vs. Bundy matters regardless of if his cause is just or he has no legal leg to stand on

UPDATE: Same day posted… Oh, so now we find out its really for the oil companies? What Corporate Police State? BLM sells 29 oil, gas leases in northeast Nevada End update.

Free Speech Zone meaningless when dogs and tasters are aimed directly at the people. From (click)

Government made it matter, and with dark purpose. At one glance it is an effort to usurp power over people, and the States, as well as to empower corporate ranching over private ranchers. It is a form of unfair and excessive taxation without representation against a political enemy of financial convenience to friends of the White House. And, it is an opportunity to make yet one more National Police Force out of the BLM. But, thanks to controlled media/government PR, not everyone sees these points of view.

But even that view is incomplete and misses the mark, if we but look closer. It is a deliberate series of escalations by government over time to garner public attention among and inflame we select people (why it gets little due mainstream coverage — save that which slants as it did at Ruby Ridge and Waco). They know the Web will be awash in the circles of we Patriots, Constitutionalists, Activists, and others who oppose the tyranny and oppression our government has come to represent since 9-11. The Sheeple must not be unduly disturbed until it can have false flag impact of calculated value.

I talk a lot about the need for citizens to draw lines in the sand and be willing to become Minuitmen should such lines be crossed. Now comes government to draw it for us, I write here to tell you that you have no choice but accept the challenge, and act decisively. You may perish either way, but I’d rather perish attempting to control my life and future than to leave it to others less kindly inclined to favor me. If there is to be armed revolution, let it be on our terms, not theirs.

Why so conclude? Because if they work it right, the ‘standoff gone wrong’ is a perfect chance to justify taking guns. By forcing a showdown and a gunfight (what the snipers do best – there is no justification for government deploying snipers unless for this cause, AND to selectively inflame those who stand for Liberty and who remember Ruby Ridge). There are two possible ends, of course, though I think they will insure BOTH transpire.

Regardless, such a battle is win-win for government. The “poor defensless BLM armed only with tasers,’ if loosing large numbers will be seen by Sheeple as an outrage, and given that Militia were involved from multiple quarters, and other armed parties, Obama can order Martial Law with suspension of the Constitution. Especially if also employing agent provocateurs for local violence across the country, as was employed in the LA Riots, where National Guardsmen posed as rioters to prime the pump.  This would likely result in orders for the military and Police to go door-t0-door. Who knows, Obama might even order the U.N. in as long-feared and first promoted as concept by Henry Kissinger. Or, he might simply order in the military; A-10s, attack choppers, a Stryker Battalion, and so forth.

They can then conveniently ‘quash armed rebels and terrorists,’ confiscate all guns, round up dissidents and politically incorrect opponents (like you and me — why they have been spying on us so earnestly), and hold a Con Con (they are already staging for it) to pass the Constitution of the NewStates of America, already written, which essentially enables the formation of the North American Union and surrender of US sovereignty to the U.N. in stages. All of this leads, of course, to a one-World Government (that Constitution has also already been written), and provides a single seat of power to enable the Antichrist’s coming to power.

Note: The NewStates Constitution is reprinted in my booklet, Fatal Rebirth, along with the World Constitution, complete with analysis line by line (NewStates) to show how draconian a document it really is. Rights become privileges which can be revoked at any time by any agency or party of government for any cause, even retroactively, and almost anyone in government can write law, and again, it can be retroactive. And if you think the two-party system and the FED/IRS is bad, wait until you see what follows. You can request a free copy of the ebook version of Vol I of Fatal Rebirth by email request to pppbooks at comcast net. 

THAT is what is at stake. Nothing less than EVERYTHING!

So we must be decisive: regardless of how we view Bundy’s cause or government’s viewpoint, regardless of if an armed and concerned citizen or a dumbed down Sheeple, we all have equal stake in this unfolding globalist tragedy. And, we can all play a role no matter our status, and regardless of if present in Nevada, or not. But about that decisive action…

Why is the BLM standoff against Bundy in Nevada taking place?

What we should prefer…

Should we stand up with arms in hand and enable, if not force, the ultimate showdown? I fear this is exactly what government wants, as already stated. But there is another, wiser choice.

By all means, men of arms should rally, but standing firm and waiting for the other side to blink or blunder is a fool’s plan, and it can only end in bloodshed. What must be done is that which can neuter Government’s ploy. And only one set of steps can do that:

a) anyone and everyone should file court actions against any and every agency, branch, and individual of government involved at every level of government. Any and every cause, grievance, or objection, as allowed by and based on State, County, and Federal Law, and the Constitution and Bill of Rights, should be employed. Bury them in legal actions, EACH OF WHICH includes request for either an Injunction or Stay Order. These actions should not all be done at once, but the flood should be continuous, so that new ones can replace those quickly disposed of. THIS BUYS TIME;

b) time is our friend — it generates awareness and understanding. It buys media attention and gives Sheeple a chance to better understand what is taking place. Just as the 99% movement could no longer be contained by a controlled media, so must this matter be brought into every home. Invite major networks, espcially foreign press, to specifically include RT, to set up broadcast facilities right on the Bundy Ranch, and bypassing the see nothing viewpoints established by government for controlling media in the manner done at WACO (NEVER AGAIN!). Install microwave and shortwave communication systems for the purpose. But also, LOCAL media is the key, as is the WWW; do not rely upon mainstream. Militia and other group ‘spokespersons’ in your community should approach their local news sources with proposed interviews to get the word out. IF EVERYONE UNDERSTANDS WHAT IS TRULY AT STAKE, AND TAKING PLACE, GOVERNMENT’S PLOT IS UNDERMINED AND THEY LOOSE THE SHEEPLE;

c) flood the theater with actors. There should be so many people there is not enough room in the minimal areas intended to contain them. OVERFLOW. The ‘1st Amendment’ area, itself an affront to the Constitution, and should be enlarged and enlarged again, forcing retreat or conflict which will make news favorable to our side. If you have access to a professional camera, start a ‘newspaper’ or ‘Radio station’ and flood the press area and make it overflow, as well. And Bundy’s ranch should become a city of tents, and include as many unarmed persons as possible who wield nothing but baseball bats or the proverbial pitchfork. THIS MAKES THE WHOLE AFFAIR MORE VISIBLE and LESS TENABLE TO GOVERNMENT’S GOALS;

d) involve the local Sheriff and State/County Officials. The Sheriff has effectively stated a hands-off non intervention policy. Fine. Perhaps he is a puppet put into place for the purpose, or co opted by any number of means available to government for rendering him neutral. But the flurry of legal actions should be intended to FORCE HIM to intervene on behalf of Bundy and supporters. If nothing else, he should have a presence on the Ranch to insure armed groups behave (public safety). The Governor and Legislators, and County Officials should called to DEMAND it. Perhaps even the National Guard should be called to stand by. A simple invite, if not enough, can be followed by a media blitz and public demand that such action is needed. Any politically motivated decision to remain neutral should be negated, thereby; a political suicide. INVOLVE THE SHERIFF, as WITNESS and PEACEKEEPER;

e) party! No alcohol or drugs, but good cheer, song and dance. Use loudspeakers. Mix well with speeches and ‘town hall’ dialogs. Use the platform (the nation will be watching) to air ALL GRIEVANCES with government, not just this ONE issue. Give voice to the rest of the 99% in a way that movement never was able to achieve on its own. SOROS WILL HAVE NO VOICE, this time;

e) prepare for Martial Law at home. That means emergency kits and plans (like the one government would not approve). It means weapons. If it is declared, you will have scant few hours to choose to fight, run, or to surrender to your fate at the hands of tyranny. If not taken away, you will need to survive for months without anything like normal civilization. No key resource, including electrical power or communication, can be assured, and will likely be withheld on purpose. Travel will be restricted and many will not be able to work, and there is no shopping, only rationing. BE READY TO BE SELF RELIANT, BE READY TO FIGHT IF THAT IS WHAT IT COMES DOWN TO;

f) if and when the shooting starts, DO NOT ENGAGE! Dead BLM or other Agents will be made into martyrs by mainstream. DO NOT GIVE THEM WHAT THEY WANT. Show restraint, and let the casualties be on your side. Keep putting out a continuous feed of information and video so that media and the WWW know what is going on. IF THERE ARE TO BE MARTYRS, LET THEM BE OUR OWN, and LET IT BE TELEVISED LIVE. If a full-scale armed revolt spontaneously errupts nation-wide, then by all means, defend yourself at the Ranch, and FOLLOW YOUR CONSIENCE AND DEFEND THE CONSTITUTION.

g) petition for redress. Redress of grievances is a key component of our Nation’s Constitutional form of government (this post makes clear, mid post). When it fails, we have no government, only tyranny. It seems today there is NO REDRESS POSSIBLE at the Federal level. ONLY THE STATES stand in the way of total Federal domination, which is part of what this whole affair is about; a means to increase Federal power over the States. But while all this is going on… and while we have media platforms established… we should be seeking redress through our State Legislators, making a series of calls for action to quickly pass laws which…

1) nullify all Federal gun laws, NDAA, NSA surveillance, and forbid Federal drone overflights except under warrant and oversight by State authorities;

2) eliminate Federal arrest and warrant power. If a Federal judge issues a warrant, or an Agency is moved to move against a party (like Bundy), they must instead go to the appropriate local Law Enforcement Agency and have them execute on their behalf. They may go along, but as observers, ONLY;

3) make clear a mandate that your State shall NOT approve a new Consitution if a Con Con is held, nor the removal or neutering by Amendment of the current Constitution, and any existing Federal Law which does so should be nullified;

4) add freely to this list anything which addresses abuse of power by the Federal government, such as militarization of Police, Obamacare, etc. This will be your one best chance to spark public dialog and debate, and to make certain that people, and especially State Legislators, realize THEY are the ones with the real power, and the duty to protect freedom and force the Constitution.

What is at stake in Nevada and the BLM standoff with Bundy?

Government has drawn a line in the sand

Let’s make sure they regret it. Force them to be the ones to cross it, and let them trip over their own power play. Now… go forth and spread the word.


Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes

When it comes to symbolism, nothing outperforms a graphical shape. Better still when that shape itself has magical properties or relationships to other shapes, or decodes to a precise meaning.

Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting. 

Is there any proof mass shootings are not random? 

What you will learn reading this post of the posting series

•  that the lines defy randomness in their placement to form countless perfect shapes;
•  that shapes can be perfect isosceles or equilateral triangles.

Are mass shootings by intelligent design?

Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes

 Is there a mass shooting conspiracy?

Update 4/17/14: Actually, a major rewrite to address lack of clarity and the poor graphic quality which led to it. Only the opening paragraph is much the same. Some new discoveries are also added. The patterns are much easier to grasp and the intelligent design far more apparent. Shockingly so. Please reread.

Are there patterns when you plot mass shootings on a map?

Randomness in lines vs intelligent design

OK. In the prior post we learned that while mass shooting plots in a quantity of 86 events plotted many times more lines than even 100 control group plots of truly random data (gun shop locations), it was still possible to randomly create a few lines using control groups. Even though the shooting lines which resulted were in conjoined sets sharing common shootings and providing the makings of a shape… and the control groups did not, the Doubting Thomas still might be moved to argue that we simply had the wrong control group (even though we actually used two with like results). So the question is raised: what other signs might exist to illustrate the shooting event lines are not random coincidence?

In an attempt to make patterns more visible, instead of looking at all 440 lines (a visual clutter of mish-mash-like mess), let’s see what we get looking only at 75 lines created from a bit more than twice that number of shootings. In the image below, I’ve also eliminated mid-line shootings unless they were themselves also a common shooting event in another of the depicted shooting lines. Interesting to note, given every line involves at least three shootings, it is quite common among the full collective of shootings that a given shooting is used in multiple lines, but it NEVER happened ONCE in the control groups. Below find the initial shootings reflected in red lines. Each subsequent image will show only those lines from among these which resulted in the making a pattern, and will be depicted in yellow. They are otherwise the SAME lines. But without all these lines, we would not understand that all the yellow lines were truly interconnected to each other in complex ways to form key relationships. This will be explained more in the closing paragraphs.


In the series of additional images which follow, we will be looking only at lines which form right angles; lines which are perpendicular to other lines. They might cross, with or without a common mid-point shooting, or merely intersect at a common shooting either at a common end point, or mid-point shooting. Intersecting, they form a pair  of 90° degree angles (perfect right angles), but if crossing, they form four right angles. Understand, that to qualify, I elected to constrain accuracy to within ± .1 (1/10th) of a degree. While Google Earth allows a very precise reading, to 100th of a degree, it is, at least on my computer, extremely difficult to accurately place and maneuver the tool to consistently take advantage of but about 1/10th of a degree.

To have any right angles at all with two overlapping or abutting lines randomly placed, we must consider the number of possible placements. For each line, there are 360 possible headings it might take, x 10, because our accuracy is 1/10th degree of arc. But we should also divide that by two because the line points in two directions from the point of intersection with another line. So our calculation is 1800 chances of which only 3 can possibly end up intersecting at angles which are acceptable; 90, 90.1, an 89.9 degrees, which leaves us with 600:1 odds for any given intersecting line pair creating an acceptable right angle. Ergo, to find ONE such instance, we need 600 random lines crossing/abutting, were probabilities a certainty — which they are not, or casino games would be of significantly less risk and much more profitable.

90-1Fig. 1

This is actually four lines, the East-West line is actually two lines which, at altitude, seem very close to one another. One of them is considerably shorter than its mate. So we have two sets of parallel lines in this group.

This is highly improbable by random coincidence. Since we would need to multiply odds for sequential relationships and have like odds for the existence of them being simultaneously parallel, its something like 600 cubed plus 600 squared, or, if my reasoning is correct, 216,360,000 to one against.

I’ll happily adjust errors in odds if a bookmaker or mathematics expert smarter than I would care to correct me.



Fig. 2

The left vertical remains from the prior image to make contextual relationships clear. Here we add two more horizontal and two more vertical lines in parallel pairs, making three parallel verticals and four parallel horizontals in all (Fig. 1 + Fig. 2).

Note: for any two parallel lines plotted upon a sphere, the further apart and longer they are the more it will look like they converge . In truth, they do. Slice an orange into four equal parts down its axis and you create wedges for the same cause. Latitude lines on a globe don’t count; they are parallel to each other, but the further North you go, the less straight they are; they in fact arc and are no longer perpendicular to the meridian. Only if rendered on flat map projections does it seem false.


Fig. 3

Here are two ‘independent’ sets of right angles formed by four lines which would seem to have no relationship to the others thus far.

If these were the ONLY ones to be found, I MIGHT be willing to presume them coincidentally happenstance. But as we will see, they will have key relationships established with the others; they are in no way alone.

Note: this image also shows that Google Earth correctly depicts a straight line as what appears to be a curve when peripheral of center, but it looks straight when centrally located. This is correct; the Earth is a sphere, which means the viewer’s vantage point depicts how a line appears.



Fig. 4

This group features one parallel set with a single horizontal line. Again, by itself, potentially coincidental.










Fig. 5

A little more complex; a set of parallel lines mutually crossed by a perpendicular.









What we get when we plot them all is quite a bit more interesting than their component parts. There are exactly 18 lines which qualify. That number 18, again, is magical, because it is a code number for 666, or Satan. How interesting then, that in addition to there being 18 lines involved, they cumulatively form exactly 18 right triangles, and 18 triangles which are NOT right triangles. One of these, however, is the only perfect equilateral triangle created by the perpendicular lines. Additionally, of the 18 right triangles, 9 are left handed if viewed with the short leg as base, and 9 are right handed; 9+9  (99) is also a magic code number for 666/Satan.

What is singularly true about all 18 lines is that they were made following a couple of simple rules: they all had to form perpendiculars somewhere, of course, but also, they all had to share interconnections through common shooting points with each other, or, with one or more of the original red lines which acted as go between to do so. That’s why the original set of red lines comprised as many as it did (and we will see, they play an additional role in the next proof, as well) In other words, these 18 key lines are all ‘chained’ together in a single unified and complex shape to create 18 right angles evenly divided between left and right, and 18 non right angles, including one equilateral (colored set to green). Here is the resulting structure:


Let’s shift gears. We started with approximately 440 lines which run along two general axis, essentially East-West in nature, or North South. Note that very few lines cross anywhere near the full count of those running the opposite axis, but also, that some lines will cross other lines along their same general axis. Short of counting intersections (ugh), allow me to approximate intersenction opportunties this way: large numbers of lines may cross or abut as few as a dozen lines or so, and the most that any line seems to intersect is about 200. Lets be generous and use a weighted average of 125, which, x 440 lines = 55000 intersects. Round up to 60,000, and divide it by 600 and we get about 100 intersects should likely be randomly producing right angles.

Frankly, that was reverse of what I expected to learn. We didn’t get 100, or anything near it, but precisely the same magic number (18) as we have seen repeated already endlessly in the prior proofs. And think about that for a moment. When something is by design, you control just how you might beat the odds of random chance. You can choose to make more than, or as we see here, fewer than naturally possible results.

Why is that even important?  Remember the original premise as to the who and why. The Masonic heritage is all about blueprints, lines laid out to be a foundation upon which to build more lines which become the structure of a thing to be built, be it symbolically or a real World architecture. EVERY line is critical in the foundation, or else nothing which follows will be correct, and the integrity or purpose of the final product comes into question. I maintain, and as subsequent posts will show, THIS set of perpendicular lines IS THE FOUNDATION of the illuminati plan to destroy America that it can be rebuilt anew as part of the North American Union and swallowed up whole by a one-World government to empower the Antichrist. Being mystical and hidden, of course, the design means nothing to us, at least not yet, but it has much symbolism and meaning to its designers, if we but look further (and we will).

But before we leave, I will tease you with yet one other point of evidence. We not only can produce perfect right angles, but  isosceles triangles, which is even harder to do, because it takes proper placement of three lines, not just two, to produce a triangle where two of the three angles share the same angle of arc. I may not be competent on reflecting the odds against that happening by chance, but I assure you the result is amazing both in their number, but placement and relationships; they are in adjoining groups or clusters, and tend to be aligned in ‘theme’ directions; completely impossible if random.

But because the next proof relies upon the sum total of such created triangles, I’ll not show them, here, nor even tell you how many exist in total. We will see there are so many of these, and arranged in such peculiar fashion as to once more suggest special meaning or information exists within them. Each angle and distance creates new data points which should logically be examined for coded meaning. But I have not had the time, nor will I, to seek to prove or disprove that notion. This is one reason why I seek funding, staffing, or outside third-party help from law enforcement, or others with a vested interest in the truth.

This post was rather short, but despite its powerful illustration of intelligent design, is nothing compared to the next one, which relies upon the same triangles and right angles. It’s going to get scarier and scarier as we continue. Take a Dramamine if the blue pill becomes too much to handle.

Go back to Introduction

Go back to Proof ThreeShootings Exist in Endless Sets of Three Forming Straight Lines

Go to Proof FiveShapes in Turn Form Complementary ‘Magical’ Clusters;


Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines

The same Dispersal Pattern Studies method applied by government researchers to UFO sightings reveals Mass Shootings do something UFO sightings allegedly do not: form repetitive patterns with GPS accuracy, doorway-to-doorway-to-doorway.

 Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 Do mass shootings form straight lines of three?

What you will learn reading this post of the posting series

•  that mass shootings defy randomness in their placement to form countless lines;
•  that the lines enjoy GPS accuracy doorway-to-doorway-to-doorway;
•  that they are revealed by scientific methods — including control groups.

Are mass shootings by intelligent design?

Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines

While in the USAF, I worked as volunteer taking care of the Base Photo Lab, which meant after-hours clean up and helping the uninitiated. Late one night, the Base Security Officer made me let him in for a rush job to process a roll of film taken of a remarkable UFO sighting. We spent some time analyzing the resulting images for signs of trick photography and the like. We concluded the images not only genuine, but perhaps the most startling and revealing images ever known to be taken of daytime UFOs… as close and as detailed as if taking pictures of aircraft on the ready line from one of the hangars.

In dialogs with the Officer, I learned there was a particular scientific method applied to the study of UFO sightings to determine if they were random events or if they somehow exhibited traits of intentional intelligent design; patterns in location, time, distances, angles, or other event details. It seems that such studies had been undertaken by Governments (typically the military) in South America and Europe, but had reportedly NEVER found any three UFO sightings formed so much as a straight line or any other detectible pattern.

Unstated was if there had been such a study in America (there has), or the findings (which were quite different), but THAT is another topic, for another day. The point is, the method employed by government is one which can be applied to mass shootings equally well: Dispersal Pattern Studies. Such studies are normally used in naturally occurring events such as animal migrations to reveal natural patterns, but can also be applied to other random events seeking signs of intelligent design, as in the UFO example.

In the 60’s and earlier, when such studies were employed with UFO sightings, the methodology required use of global coordinates with navigational computations common to flight planning by pilots. You can’t simply plot them on a map and draw lines (a common mistake by amateurs) because there are many kinds of map projections, each of which thwarts either distance, angular relationships, or course computations. No kind of map projection correctly depicts a spherical surface which in turn also correctly renders distance, visual angle, and course. Moreover, navigational computations were required to determine the course heading of any two sightings and, more importantly, seeing if any third or additional sightings lay along that same course. These methods also allowed determining distance between sightings with useful accuracy.

But accuracy still remained an issue; the nature of UFO sightings is such that location data might refer to the location of the observer, rather than the UFO, or vice-versa, or perhaps only the nearest city or landmark.  The location to be plotted often had to be determined based on extrapolation of other details such as angle of view, apparent object size, other eye witness vantage points, and so forth. A plus/minus error of several miles or more was not uncommon. And yet, in thousands of sightings, they found no lines in at least two continents worth. KEEP THAT IN MIND.

Can patterns be found in mass shootings plotted in Google Earth?

Google Earth saves the day

Fortunately, these mapping problems are no longer relevant. Google Earth incorporates such calculations as it renders the Earth at any given detail level one requires. While it has its own tolerance or error issues, it is far more accurate than any map projection despite the resulting ‘flat view’ on a computer screen. Better, it does afford useful course, angle, and distance measurement. It even considers magnetic declination, a fact we will come to appreciate.

Google Earth accuracy is generally well within civilian GPS accuracy; roughly 50 feet. When drawing a line over rugged terrain of dramatically varied altitude, one may see visual aberrations in the line which imply inaccuracy, but the heading and distance calculations do not suffer the same errors, unless, perhaps, taking the readings at the point of aberration. These visual flaws are not real, but reflect the differences a dramatically higher altitudes of the Earth’s surface has upon rendering a sphere on a flat screen. Since we don’t see mass shootings take place on mountain tops, we thankfully need not take measurements at such points.

To further illustrate the remarkable accuracy, let’s use Sandy Hook and just a few of the many lines which are cojoined with this shooting. In the image, we see two lines precisely (for all practical purposes), bisecting at the doorway area window allegedly shot out by Adam Lanza to gain entry. Each endpoint of a given line is ALWAYS placed at this level of accuracy. It is the MIDDLE shooting points where we want to be careful how we determine accuracy. Here, we see such a point in a line from a shooting at the Anniston Postal event in Georgia to a Lottery Worker office shooting event elsewhere in Connecticut, which passes through Sandy Hook some 56 feet (rounded up) from said entrance point (the yellow measurement line). This figure is divided by two to find the actual accuracy of 23 feet (per Google Earth); because we could move the line that far to find the center point between all three shootings and still enjoy the same 23 foot measurement at all three. Thats about 7-10 footsteps for most people.

Example of 'doorway-to-doorway-to-doorway' accuracy.

Example of ‘doorway-to-doorway-to-doorway’ accuracy and methods of measurement for such determinations. Each end point is placed as accurately as seen here, each mid point must not exceed more than 2x GPS accuracy (100′) error to qualify as being aligned by design.

This plot point itself, to restate, is based on using the known (or where not concretely known, the most logical) entrance to the shooting area, or if an outdoor area, the entrance to the area (e.g., driveway or walkway at the property border). This represents the point of first violation, a key element of importance to both the crime as well as to magical considerations of value to Satanic or Illuminati thinking (which is sociopathic; ‘violation’ is a favorite pastime). Thus we find consistency in results based on our primary postulation (NWO design), as well as forensic facts of a given shooting.

The general method for finding such lines is simple:

a) plot all shooting event locations;

b) Draw a line from any given event to every other event, and extend far enough to encompass any events further away along the same path;

c) determine if the resulting line bisects any additional plots to make three or more using the above accuracy determinations.

d) take note of any which are discovered to qualify by this means and keep the line, and discard those which do not.

Where it does bisect within accuracy limits, you have established a pattern; a straight line — something which, according to European and South American UFO studies, does not happen with random events even when using a broad error allowances of several miles. Shootings, however, prove to be quite another matter altogether, as we see. So perhaps there is indeed a cover up in UFOs?

As stated in the prior Post, when first attempting this method using only the 76 shooting events media wanted to talk about, plus about a dozen more from my own knowledge (shootings earlier considered by me as indicative of mind control operations), I did find some very interesting lines (image immediately below), though barely suggestive of ‘patterns,’ as such. The question remained, given the UFO study results, was this coincidental, or truly evidence of intelligent design. I wanted to know for certain. The only way to be sure, was to establish a control group.

88 ‘Media’ shootings create 12 lines including three sets of conjoined lines; a set of two lines sharing a common end point (5 shootings); a set of three lines with two endpoint shootings as common points (7 shootings); and a super set of three lines all sharing a single common point at Sandy Hook (7 shootings). Thus 19 of 88 shootings produced such lines, roughly 23%. Do you really believe it random?

Can dispersal pattern studies be applied in mass shootings?

Control Group Study

One thing I noticed when looking at the plots is that there were clusters of events, some of which were scattered along a given heading, more like an elongated oval than a circular grouping. At continent view altitudes, the illusion is that many more shootings are on the line than really are. Some of these seemed to be logically along population corridors, while others did not. Almost all of these clusters contained several of the more recent and best known shootings being given day-by-day news coverage. Note also, that there are hardly any clusters at actual high-density population centers, save San Francisco and, perhaps, Miami and LA. Nothing in NY or Chicago, or elsewhere.

So one thing I was mindful of when trying to establish a control group, was to see what the role of population corridors and centers might play in grouping: a truly random set of events should closely resemble the clustering of any control group which took population into account. But would they mirror in a general way the shooting clusters?

If truly random, the answer should at the least be depicted with a ‘resemblance.’ Mass shootings take place where people are drawn together, and while some portion of them should reasonably take place on farms and other outlying properties, the bulk should be taking place in cities. The bigger the city, the more shootings should be taking place, by and large.

Additionally, I felt the control group should have some similar social context which was at least symbiotic in relationship to mass shootings. A control group based on, say, businesses using the word Acme in their name, for instance, would have no such relationship to shootings, but would relate to population centers. On the other hand, if I plotted gun shops, there would be a relationship both to shootings (access to guns equates to access to gun shops, which affords the means to shoot someone) and to population centers (gun shops tend to open where customers can be found in quantity).

Ultimately, I employed both. Google Earth has a unique built-in search engine which randomly pulls up ten businesses at a time if you type in a category or keyword, pulling them from the pool of all such firms located within the map being depicted at the moment. If you zoom into a city, it will produce only local matches. If you zoom out to show the 48 States, it will produce almost exclusively random firms from the greater US. Therefore, I established two such Stateside control groups; Acme, and Gun Shops.

The Acme set employed 88 random Acme firms, the same number as shootings employed in my early search for patterns. Actually, there were not quite that many ‘Acme,’ firms which came up, but Google Earth, once running out of matching candidates, then offers names of firms it considers related, and I deemed to include some 20 of these as if actually named Acme, because they were still randomly acquired.

So the control group included was equal to the shooting events to which it is compared.

The Acme plots did manage, to my surprise, to establish 3 lines. However, all lines were entirely disassociated one from the other (no conjoined linkage). The ‘random’ shooting events, on the other hand, produced a total of 12 lines, many of which additionally shared common shooting events with other lines to form 3 groupings of such interconnected lines (linkages existed). Further, note in the image below the absence of lines along population corridors, and generally,  a lack of multiple plots creating the appearance of ‘extra’ plots along any given line (just the three that make it up). It is nothing at all like the shooting lines, above. There is modest clustering at actual population centers, and even so, this is not terribly uniform: SF, LA, Houston, Miami and New York, but not Chicogo, Seattle, or New Orleans, etc.

88 random ‘Acme’ businesses via Google Earth tools: Three disjointed lines were possible.

This differences implied shootings were ‘too random’ and less associated with population centers compared to Acme, and yet, that really meant them more likely to be of intelligent design, than not. But you are right if you are thinking, ‘this is not yet proof.’ Were I to have stopped here, I would have concluded mass shootings were only suggestive of intelligent design. The big pusher to continue the study was, of course, the dramatic difference in number of lines and the fact that many were connected to each other, and starting to suggest a potential for the generation of shapes.

So I did not stop there. In the same time frame I discovered some 100 more shootings, about 180 in total. And, I had already determined that gun shops would make perhaps a more interesting control group of more relevant value to the research topic. So, I next established a control group of only gun shops, and that group was of a full 100. The results were not dramatically different, but regardless, made the case for intelligent design even stronger.

100 random Google Earth Gun Shops established 4 disjointed lines.

100 random Google Earth Gun Shops established four disjointed lines.

There were 4 lines formed out of 100 gun shops, and again, no interconnecting lines. Gun shops again matched Acme in terms of ignoring population corridors, but non-the-less forming small clusters at some, but not all actual mega population centers. Shootings remained, even using only 86 plots, quite indicative of intelligent design in ways which defy the odds of random coincidental occurance.

But by the time I had finished this effort, I had discovered nearly 400 shootings, and was still counting.

This is the work which has yet to be completed: the full computation of lines for all shootings. It is tedious work requiring a lot of manipulation of zoom and map movement controls within Google Earth, in order to maintain and test for the needed accuracy. Regardless, to date, of some 450 shootings (I stopped adding new ones just before December, 2013), I have managed to test several hundred of them for line formation, and have discovered thus far 440 lines where three or more shootings maintain the required accuracy. Some lines have as many as five shooting in a single line with all five maintaining the required accuracy.

Clearly, that MUST be by intelligent design.

Yes, you are free at this point to argue that the more plots you have, the more likely you are to create a line. The control groups imply that; an increase in plot points of about 14% did create one more line. But if generation of random lines was the end of it, I’d have no good answer for you. But reading further, you will learn that the lines are merely building blocks for something even more useful as proof… which are in turn building blocks for something even more useful… and on and on. The lines are nothing compared to what the resulting lines themselves are in turn able to reveal. Shapes, yes. Symbols, yes. But even more; the data points on the key-most lines include code. Those are future post topics. Keep reading, and do so with an open mind.

Go back to Introduction

Go back to Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters

Go to Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes


Sidebar: The ‘Science’ of Magic Numbers, Their Meaning and Decoding

It does not matter what YOU think. What matters is what Satanists and practitioners of the Occult think. They think select numbers have meaning, translating into words of like meaning, and that gives them magical powers to bring forth that meaning in a spell. There is some science to their madness.

Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that there is a science of translating numbers to text and text to numbers, individually, or in whole text passages;
•  that numerology additionally gives meanings to numbers, among which practitioners of the occult find some magical;
•  that there is a consistency in how magical numbers work together to ‘say something hidden’ which is the basis of their ‘magic.’

 Are mass shootings by intelligent design?

Sidebar: The ‘Science’ of Magic Numbers in Mass Shootings by Intelligent Design

Is there a mass shooting conspiracy?

To start with, consider the ancient languages of the Greek and Hebrew. Both of these languages are ‘dead,’ which means we have a concrete and fixed understanding as to what the definitions were for words  in those languages. This is why the Bible is such an important book for study to Christians, and should be of interest to non Christians; it was written entirely in dead languages, and is therefore no longer subject to the evolving interpretations and meanings of words as is normal in a living, spoken language. And while we will see the Bible has a part in our topic, be not put off; what we are going to discuss relates equally to other ancient writings, religious and non religious, alike.

The science of Hermeneutics studies the meaning of such texts for literal translations and understanding in any other given living language. Interpretation with rules. THAT is how the King James Bible came to be, and is one reason why it is considered the most authoritative English Bible by those who are aware of and evaluate such translations. Only the uninformed deviate from these rules, and in so doing, twist meaning to they know not what, and spawn false teaching.

Think of it as a ‘double-blind study’ method for ancient texts. Image from (CLICK) Margith Strand/Fielding University

Closer to our topic, Satan, in his role as the Great Deceiver, uses Man’s desire for knowledge by tempting him to think he is wise above even God’s foolishness in the Bible; many false or flawed interpretations exist by such lures. More to the point, he works his own secret language from within the same dead languages, and more; as is true of many dead languages through the World’s history, such languages also assigned a number value to each letter used in the language. This is the occult tie to the ancients.

Very useful for secret mysteries. In fact, it can arbitrarily or uniformly be applied to any language for this purpose. In wartime and among spies in peace, many codes are based on simple tables of numeric-to-text relationships, typically additionally offset in starting point or randomly assigned. Even your computer knows every letter internally as a number value on the ASCII table. But what we talk about here is different, and far more mystical in nature.

Text as numbers as words as magical effect.    Image: (CLICK)

By such means, a word, sentence, or larger body of text can be translated into a number, and conversely, a number as text. A single digit can be a whole word or thought. Rules of conversion and the actual assignment of valuations varied by language. But coming forward in time, the science (that may not be the right word… a system which is based in science, at least) of GEMATRIA was evolved to allow simple ‘calculator-like’ conversions between text and numbers, and vice versa, in such languages.

There is actually a Gematria Calculator used in this presentation, and you are encouraged to use it in review of my work. Just type in a number or a word and it will display Jewish, English, and Simple Gematria results, at least those results which others have elected to save in the database. You can choose to do the same.

The other ‘science’ we must deal with is not at all truly considered science; Numerology, which itself lays at the heart of what makes Gematria tick… actually more like a symbiotic relationship. A Christian considers it a cultish thing, and Satanic in its roots, especially since it also seems inseparable at times from Astrology. But in point of fact, we are not even talking specifically about root Numerology as it is normally thought of, but the specific manipulation of numbers for hidden meanings or purpose.

Now, as it happens, if one is a Satanist or occult follower, numbers are quite important in this respect, the purpose being ‘magic.’ Therefore do they also embrace Numerology and employ Gematria as tool. But they also are free to enhance their use by additional rules seen useful for a given purpose, such as concealment or even the reverse as pointers or clues.

Some numbers are more important than others, and have special meaning, especially in a given context of use. Everything discussed thus far remains on the table. This at last brings us to what constitutes a ‘magic number’ to such practicioners: the answer is, actually, rather a lot of numbers qualify. First of all, most every key number in our counting system at the lower end of the scale has a meaning useful in magic/occult application.

But there are other numbers of value, too, and generally more special in use. It is not so much that every number is powerfully magic, but its magic or magical meaning in combination with other magic numbers can be amplified to make it more powerful. Fortunately, the bulk of truly powerful numbers need not be listed, as they are recognizable by their unique characteristics, as we shall learn. The short list then, with specific occult meanings, is as follows:

3  Fullness

5  Balance, the power and limit of man to control

6  Illumination, enlightenment, legend, man

7  Mystery, esoteric or scholarly magic, associated with Saturn, a name for Satan, might be a curse (conversely, 7 is also known as a number for God, Christ, Creation, an excellent illustration that context is everything)

9  Visitation, spirit

10  Law, obedience

11  Imperfection, disorder/chaos, that which precedes destruction

13  Rebellion, depravity, sin

16  Material power, incarnation

15  Three dimensions (reality), new direction, blinding temptation (Satan)

17  Victory, Son of Man (Christ), liberation

18  Oppression, bondage, slavery  = 3 (fullness) x 6 (legend/man/illumination)= 6+6+6 = 666

21  Distress = 3 (fullness) x 7 (mystery, magic – a curse)

29  Departure, cast out = 3 (fullness) x 13 (sin)

30  Rulership, dominion = 3 (fullness) x 10 (law, obedience)

31  Offspring, branch

33  A sign, warning, predictor = 3 (fullness) x 11 (that which precedes destruction)

36  Adversary, enemy = 2 (division, double) x 18 (oppression, 666)

39  Infirmity, death = 3 (fullness) x 13 (sin) — the wages thereof

99  Visitation (9) of the (evil) spirit (9) in this case a demon; 9+9 = 18, 666

360  Encircle, trap, capture = 36 (enemy) x 10 (obedience)

666  Satan’s name, produces 18 when summed.

999 Upside down 666, but produces two 18’s when summing adjacent 9s

Is 18 a magic number?

Magic Numbers can convey complex messages: the number 18

These meanings are not the same as might be produced by Gematria (but on occasion, they might). In fact, the three basic forms of Gematria tend to each produce a different result, but it is uncanny that there often remains a consistency across the board between the numerology and all three Gematria with respect to general tonal themes of results; they are equated as if a Math equation being resolved.

The number 18, for instance, in both Jewish and Simple Gematria can translate into ‘die,’ which is the ultimate price of suffering slavery/sin, one of the actual meanings cited above. The English Gematria is unable to translate such a small number, but it is interesting that the number 108 in the English translates to die, which in turn sums to 18 by one of the accepted methods employed and explained next. Such consistency in translation/meaning/valuation is, just as in traditional Mathematics, tends to be crucial. To the cultist, this is a magical property.

A larger number in terms of digits can be compiled into a lesser number of digits by a process called summing. It stems from the need to sum individual letter values in finding the value of a word or phrase as employed in Gematria. Summing is normally employed to find secreted magical meaning from within adjacent but related numbers within a set, such as in a date or phone number, or any other associative grouping. Such numbers seldom seem magical when considered as presented due their intended use. But it is also possible to sum any preexistent number of multiple digits to once more reveal magical numbers concealed within.

Summing can be done in any number of ways, but usually, in like numbers of digits, such as sets of two or three. In number groupings of associated use, such as in a date or phone number, each group can arbitrarily be treated as if having the required number of digits when it may be short, or one can employ the first digit of the next group to make up the shortfall, and then  employ the remaining digits in like manner  for the next calculation. Where there is an odd number of digits, the odd-man out can be in the middle and shared, or at either end. Lone zeros can be dispensed with in results, or not. Whatever method is employed, one would wish to be consistent in any related uses within the same decoding process (in our case, for the same shooting line set examination). Examples:

a)  The date 12 7 1880 can be summed in pairs as 3798 or 3816 which summed again produce 1017 or 117, both of which can be summed again to make 18 or 9, whereas the actual sum of all digits is 27. There are, of course, two 9’s in 18, which along with the lone 9 makes three, and there are three 9’s in 27.

In history, this is the date the First Boer War in South Africa was staged by the formation of the Republic, akin to the 1st Continental Congress of the United States in impact. The number 18 is, again, Slavery, oppression, where three is fullness and 9 is spirit or visitation. The Boer Wars led to the oppression of Blacks in their own land until Nelson Mandela forged the new government.

b)  The integer 1271880 can summed in threes to make 10116 or 11016 or 1017, again all eventually summing to 18.

The various means of summation are not so many as to allow just any number to end up conveniently producing a meaningful final result (i.e., magic number). It is not possible by such contrivances. Indeed, for any group of (such as used in our comparison of shootings which form straight lines, sets of three) different complex numbers to end up with an identical ‘theme’ or even for an individual number to be translated in multiple ways to produce multiple numbers of like importance or meaning would be quite unusual, and not something easily repeatable unless by design (carefully choosing the starting number(s) for the desired properties).

Within this posting series, all summations will be indicated in a way which allows the reader to understand how they were derived from the original number(s), and the reader will discern that in general, the methodology is consistent and employs very few rules. Exceptions to summation rules will be drawn out with explanation to assure like clarity. We will additionally only focus on those which are found present in ALL THREE (or more) shootings making up a given straight line.

These are not the only manipulations possible, but they are the only manipulations which will be employed in the proofs, as it is not felt additional proofs are needed, and it would simply bog the reader down further with endless detail. I assure you, however, the investigation has found many more examples of magic numbers within mass shootings examined at such depths, thus far.

What kinds of numbers are magical?

Other kinds of Magic Numbers

Summations can reveal the existence of hidden magic numbers. One type of powerful number series revealed by such means in the investigation is the palindromic number; one the same forwards and backwards, such as 43234. But Palindromes can also be discovered by another form of summing. When you read the second Proof posting, you will find a section revealing more of the ‘magic power’ of the number 18. Unstated there, but added here, is that the additional power of palindromes can derived from the fact that 18 = 2 x 9, 3 x 6, as well as 9 x 2 and 6 x 3, which individually can be summed to variously make 11 or 9.

These results can then be combined to produce the palindrome 119911 and 911119, as well as 2992 and 9229, by summing the multiplicands. The shorter of these can be added to equal the palindrome 12221, which further sums by pairs to 323.   The sum of each digit positions in the 2992/9229 set sums to 11 to make 11111111 (a Palindrome, yes, but also a repeating digit, where each digit increases the power of the root number, in this case, 1), which is 4 sets of 11. Consider then, the meaning of 11, 1,  2 (previously reviewed above), and of 4:

The meaning of 11 is Imperfection/corruption, disorder/chaos, that which precedes destruction. “The abomination which maketh Desolate” in the Jewish Gematria translates at 1802, which sums to 11.  The meaning of 1 is “single minded, intolerant, stubborn, controlling, lacking in emotion, aggressive, arrogant, dominant (some key traits of Satan)”

The meaning of 4 is “foundation (Earth) or World, or to establish order and bring plans into material form (the NWO, for instance).” Satan is given power over and resides in the Earth; seeks to destroy all creation in the End of Days. “Four horsemen of the Apocalypse” in Gematria translates and sums to 18.

Adding the larger palindromes together, we get 1031030, which can sum in pairs to 13130, or dual 13s, and you know the dark pop culture connotations of that number. But in the occult it also means “Rebellion,” which is exactly what Satan is about. It has additional significance to the Illuminati; nearly all Knights Templar, Illuminati’s predecessors, so to speak, were all assassinated by order of the Pope during their last meeting, which took place on Friday, Oct. the 13th, in the year 1307.

There are three 13’s there, given the 5th day of the week sums with the 8th month. Yet they did not trump the 7, which translates as spiritual perfection, fullness, covenant, and even the Holy Spirit. Thus we see the eternal struggle between Satan and God reflected even within the number 18 itself. That struggle is, after all, Satan’s base motivation for all he does.

In like manner palindromes can be constructed; 3663 and 6336, each summing to the doublet 99, itself summing to 18 again since the originals also summed to 18. Single digit position summing yields 9999, or 1818 summed yet again, and yet another 99 summed one more time, and again to yet another 18.

Going back to the larger 119911/91119, once more, we can produce 101010101010 by adding digits (6 x 10 = 6’s illumination x law and obedience 10 times).

This is very interesting, because if treated as a binary number, those 1s and 0s translate to ASCII decimal and character codes 170 and 10 (totals 180 = 10 x 18), and as text, the letter ‘a’ (as in Alpha of Alpha and Omega, but in lower case as if to belittle it), and in base 10, it becomes 2730, which sums to 12, which as you are about to learn, fits right in with the overall theme, as well.

In like manner, 11111111 decodes from binary to 9, and in ASCII Decimal or Character, it is in both cases 255, also summing to 12. Moreover, in raw Hexidecimal computer code, it is FF, which is the functional Omega of the beginning and end (start/end) of that computer coding construct, which is typically expressed in upper case and, thus does trump the lower case Alpha. Satan sees Armageddon as his victory over creation.

So by these various manipulations, it is possible to find the consistency talked about being found in magic numbers when intended to translate to meaning. It seem that no matter what method of manipulation you employ, you find more or less the same message in theme, if not specifics. Fortunately, the posting series will not spend this level of detail in each numeric evaluation. We will only tell you which magic numbers were discovered which proved useful in the investigation, how it was arrived at, and why it matters.

This does not by any means imply there is not much more which could be learned by further analysis. In some cases, more has already been learned. But there are many other forms of magic number analysis which I’ve not even attempted to find present in the shootings. These may indeed (and likely do) exist as further clues as to the identity of the designers. But I simply cannot take the time to spread my efforts even thinner; yet another reason to seek financial or helper resources to carry on the work.

What makes a number magical in the Occult World?


It is hard to read such number explanations without a practiced mind aware of the meanings. There are many ways to think about each starting point in order to find full realization. It takes many steps to analyze a given candidate, and more steps to full realization. It can be confusing at first, but it is not. It is a consistent series of numeric depictions of a given intended message. In the case of 18, for example; spiritual warfare with Satan being the victor. Only certain numbers support these kinds or manipulations and findings with the same consistency. That is what gives them ‘magical’ power in the minds of their users.

Therefore, these are the kinds of manipulations we must find in use and seek understand why they were used in a given shooting series which establish a straight line or shape. To ignore them because we do not believe they have any power, is to fail to see the intelligent design which their very use is critical. To make it simpler for you, the reader, I’ve already done the work. It remains therefore to you only to be open minded enough to review the work, and perhaps to double check my work if so moved. On the other hand, some of you will find the topic worthy of deeper interest.

To learn even more about magic numbers, I suggest you consider what a high Mason, Rosicrucian, Magician, and founder of the conspiratorial cult, the Hermetic Order of The Golden Dawn, one W. Wynn Wescott, had to say in his book: Numbers – their Occult Power and Mystic Virtues. He may also have been a Warlock. I make a case in my book MC Realities that Knights Templars went into hiding as Warlocks within the Rosicrucians before infiltrating and assuming control of the Mason’s Guild to subsequently form Free Masonry.

Another tool as useful in some ways akin to a Gematria Calculator, is this Web site which takes a close look at numbers from both the mystical side as well as the mathematical side. It is absolutely true that when a number has a very unusual mathematical property, such as being a prime number, it can also be considered magical. This tool was not known to me when undertaking my investigation, but may aid those who elect to follow in my footsteps to perhaps reveal even more clues about intelligent design and identities of those responsible.

Go back to Introduction

Go back to Proof TwoShootings Exist in Identical ‘Magical’ Categorical Clusters

Go back to Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages

Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters

The Illuminati loves magical numbers, as they can translate into meaningful words or names, or leverage ‘spells’. Interesting then, that basic shooting statistics establish set after set in the most magical and potent number of all, one which decodes to ‘Satan.’ This alone reveals dramatic coincidences well beyond the possibility of random chance.

Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that mass shootings defy random probabilities in their distribution;
•  instead collecting by the same count in groupings by type of event;
•  that count is a number of great significance to the planners.

Are mass shootings by intelligent design?

Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters

 Is there a mass shooting conspiracy?

This post is both the simplest to explain and reveal to the reader of all the patterns discovered, and yet, one of the most complex in terms of planning requirements for any conspirator. This particular proof, easy to grasp but harder to believe until you see it, could never be found using media statistics.  Simply put, if you look at all shootings (about 450 at the point of discovery), not just those media reports, and start to break them down categorically, you quickly find amazing results impossible by chance, with no hope of doing so using media counts:

Exactly 18 mass shootings involved high schools;

Exactly 18 mass shootings involved colleges;

Exactly 18 mass shootings involved US Post Offices (‘going Postal’);

Exactly 18 mass shootings involved Malls;

Exactly 18 mass shootings involved holidays;

Exactly 18 mass shootings involved Native Americans directly or indirectly;

Exactly 18 mass shootings involved Military/First Responders, either as shooting victims, shooters, or both.

18 shot revolver fires 3 slugs x 6 pulls; 18 is not just a magical number, but perhaps deadlier than most.          Image (CLICK) techwarelabs.

Additionally, there appears to be 12 or 13 fast food/specialty restaurants (i.e., pizza, chicken, tacos), and 14 or 15 full menu eateries. The precise number is in question because some locations are not categorically determined by their name, and have since gone out of business. This study should have been undertaken decades ago, but who knew to do so? Media was not telling us about the great bulk of these events.

In like manner, there appears to be similar numbers which make up the categories of nightclubs/strip clubs (where dancing/live entertainment is part of the venue) and bars/taverns/pubs (where only alcohol is the attraction). These are even harder to discern for the same reasons as the eateries.

Finally, there are thus far exactly 15 middle/elementary school shootings. I mention the eateries and clubs, and K-8 schools only because each falls short of 18. This implies that there will be additional shootings in these categories to bring their respective counts to 18. Such a notion, given the other patterns yet to be discussed, implies it may be possible to logically compute a next shooting event to a precise location, and perhaps, even date.

To do so will require completion of the full study, something which would take an individual such as myself far too long a time to complete. By then the events would likely already have come to pass. That is why I hope this series of posts might motivate someone to provide funding for a staff, or better still, for some authority to undertake the effort as part of a criminal investigation. Time is of the essence, which is why I’m publishing NOW, instead of two years from now.

Are mass shootings taking place in  clusters of 18?

Two unusual traits found in EACH grouping

That such perfect identical groupings should exist is alone remarkable. But once I determined such groupings existed, I wondered what else might be unusual about them as a minor data set — as opposed to their inclusion in the whole. So I simply ran connecting lines from each of the 18 to every other within the group. Two unique things became apparent, and were true in EVERY GROUP of 18.

GE plot of all 18 Postal shootings interconnected to one-another by lines. Despite confusion, you can see reflective angle patterns in several which are more isolated, but they exist in each of the 18. This should be impossible if random events.

Google Earth plot of all 18 Postal shootings interconnected to one-another by lines. Despite confusion, you can see reflective angle patterns in several which are more isolated, but they exist in each of the 18. This should be impossible if random events. Ignore the additional non postal shootings also shown, but with no lines.

a)   Each group of 18 generally formed a ring around the lower 48. Each ring would have two or three which were perhaps inset a bit more central than some of the others, but by and large, the total effect was to form a large irregularly defined shape (I’d say oval-like) which generally ran close to the borders or coastlines with a kind of regularity that implies deliberateness in its own right. You would think, if random, that there would be more shootings found centrally located, instead of generally being peripherally located.

b)   Reflective angular spacings. More remarkably, when looking at the angles created by the lines radiating outward from each individual shooting to the other 17, I was struck by what I’ll call a ‘mirroring of angles.’  That is, a given cluster of some number or perhaps even sets of clusters for a given shooting… and true in every shooting of the 18, would mirror a given angular relationship. For example, you might see lines radiating in arcs with angles of 5°, 12°, 8°, 20°, 8°, 12°, 5°.

Understand that such patterns might be a bit harder to discern because of the additional presence of a non mirrored line, but most of them literally jump out at you, visually. This might happen randomly given the total number of opportunities… in a given shooting, perhaps even more than one such example… but in all of them… in each grouping of 18? Not random.

To be sure, each set might have different numbers of such mirrored lines, and each array might consist of entirely different angles, but the point is, each shooting enjoyed this unique finding to one extent or another. I must point out, however, that measuring angles is quite time consuming and tedious, and I therefore only tested a few to measure their accuracy.

I will also state that the resulting accuracy of those checked was not perhaps as tight as I would have preferred. I would like to have seen .1 degree accuracy, but while some were within that range, .5 degrees was more common. Still, it is quite dramatic to see (image), even if the actual accuracy were found to be more than a degree (a degree is hard for the eye to detect). Very few were that far off.

This ‘opposing’ comment to the whole groups of 18 matter must also be added: shootings continue to transpire and it appears that at least some shootings will eventually fall into some of these same categories. Does that invalidate the observation? Perhaps, but not so easily.

Further study is required to examine each shooting to see if it is in the same ‘league’ as the others. For example, do the shootings make up a set of three or more in a straight line (a future discovery which will be covered as a subsequent proof)? Do their lines form a complex shape (also a future post’s proof)? Do they form equidistant – mirrored angles of interconnection points as described above?

Note: I’ve also not yet had time to chase down this important question: do any of these interconnect lines also form lines of three or more shootings, in which case, they are very important lines and shootings, events which may hold even more clues in need of discovery. Another reason I need help.

There is a clue this consistency should prove out to be true: one of the more recent shootings in the news was at a High School. That would make 19. Yet I recalled that I had arbitrarily included… because of other clues that it was INTENDED to be a mass shooting… an event where only one person was shot before the shooter was subdued. If it were intended but ‘failed,’ it is highly likely that the planners would seek to replace it.

The patterns then would seem to reflect a need to be consistent and ‘pure’ by its designers. Indeed, these reasonable questions and tests are yet another reason I hope someone will fund further research or be undertaken by LEA.

But perhaps there is a bigger question we should be asking:

What does the number 18 have to do with mass shootings?

Why 18?

Music Album Cover from (click) seems to sum it up: the wrist watch reads 18 minutes after 5; 5 x 18 = 90 = 5 sets of 2 x 9, where each pair (99) = 18, for a total of six 18s, plus the title 18 to make 7 in all, which is covertly stating, intentional or otherwise, that ‘the power of 18 (Satan) trumps the power of God (7)’

It is about ‘magical numbers.’ The general topic of numerology and the mystical or Gematria translation (coded meaning, if you will) found in numbers is a bit beyond the scope of this post’s presentation as it would be quite lengthy. Yet it is important that the reader have some grasp of the topic in order to make the points relevant, and to accept the ‘science’ or ‘validity’ of the meanings ascribed to a given number. Else it would not seem quite relevant to our investigation. Ergo…

Sidebar PostThe ‘Science’ Behind MAGIC NUMBERS, Their Meaning, and Decoding. You may be well served if unfamiliar to review how the occult World employs numbers they see as ‘magic,’ because it does not matter what YOU think of that possibility, it is what THEY think about it, that matters. Especially if those behind any intelligent design are Satanic and seeking to leverage their plans by incorporating magic numbers within them.

The number 18 might be described as the most ‘holy’ of ‘holies’ in magic numbers employed in occult mystical beliefs, including Satanism, Masonry, and the Illuminati, which was itself derived from Free Masonry. The sidebar gives you a taste of that. But let’s pick it apart to see why.

The parenthetical additions employed as we go reflect applicability. Know that the meaning of a number varies according to application or context (spiritual, non spiritual, positive nature, negative nature, and to a degree, select topical relationships, such as being masculine or feminine, relating to a season or emotion, etc.). The general meanings imparted here are generally the negative spiritual context.

18 = 6+6+6 = a coded number for Satan himself (666 being the number of the Beast in the book Revelations). In the Jewish Gematria (see above sidebar link), “Beast” translates to 198, “Devil” translates to 738, “Mystery, Babylon The Great” translates to 1926, and “The Old Serpent” translates to 567. All of these equivocal names for Satan each sum to 18. “Mark of the Beast” in the English Gematria translates as 864, while “Doomsday” translates as 576, and so forth.

In fact, in various Gematria, the founder of the Illuminati, “Adam Weishaupt,” “Adonai, Masonic God, the Great Architect,” “Grand Master Jacques De Molay,” as well as “Illuminati” and “illuminated” translate and sum to 18. Learn more here about how these words and their decodes directly relate to the Illuminati. Next, we take a look at some ‘fun with Math’ properties, which are exactly the kinds of things that make numbers ‘magical’ to those who believe it true and thus so employ the numbers in that belief. Again, what YOU think it means matters not, to THEM, because they have so believed in such ‘mysteries’ for thousands of years.

18 = 2 x 9 and sums to 9, making three 9s, where 999 is also a code number for Satan, being 666 upside down. 9 x 9 x 9 = 729, which sums to 18. Divide 729 by 666 and you get 1.09090909… ad nausium, where adding every four digits of the fractional component yields 18, again. 6 x 6 x 6 = 216, when divided by 666 = .324324324… where summing in groups of six digits also yields 18. It (999) in like manner to 666, translates in the Jewish Gematria to “Luminous Soul” as well as “Satanic philosophy.”

18 = 2 x 9 or 9 x 2, each of which sums to 11, and 3 x 6 or 6 x3, each of which sums to 9. Collectively summed (11 + 11 + 9 + 9) = 40, which is the number of Judgement in the Bible (e.g., 40 days and nights of rain in the great Flood), and the Beast is all about Judgement Day: the purpose of the Illuminati and New World Order is to create a One-World Government, providing a single throne for the Antichrist and to hasten confrontation with God and destroy all life and the Earth as we know it: Armageddon. “Judgement Day” in Gematria sums to 18.

666 and 999 are triplet numbers, and any repetitious numbers, even doublets, gain in power; 666 is more powerful than 66, which is more powerful than just 6. The meaning of 6 is “Illumination (a trait of Lucifer), enlightenment (the knowledge of good and evil), legend (the greatest lie is that Satan does not exist, he is mere legend), Man (the Antichrist will be a man in whom Satan resides).” The like manner, the meaning of 9 is “Visitation, Spirit (Satan as an unclean spirit, will visit himself upon the man who will ‘become’ the Antichrist).”

Breaking a number into its mathematical equivalents also decodes into interlocking sentence-like meanings. The meaning of 18 is “oppression, bondage, slavery (what sin represents to man, and what the Antichrist intends politically to bring on Armageddon).” The meaning of 3 is “fulfillment/fullness, or relates to the three-fold corruption of God’s Word, or Man’s three great enemies of Biblical references.” The meaning of 2 is “power of judgement (God the Father and Jesus Christ, or if you prefer, God and Satan in battle), the indecision of outcome in the battle between good and evil.”

Therefore, 18 = 3 (fullness of corruption by enemies of Man) x 6 (illumination, the knowledge of good and evil) and 2 (power of judgement in battle between God and Satan) x 9 (Satan in the person of the Antichrist). This can be done with each of the equates (i.e., 18 = 2 x 9). So we see there is complete sentence-like consistency in such translations in really powerful magic numbers, which in turn are in interlocking support of individual component number meanings.

Finally, 18 plays to Masonic mystical calculations in sympathetic manner. 360 degrees of a circle divided by 18 = 20, which is 2 x 10, where the meaning of 10 is “Law, Obedience.” Therefore, 20 is the “Power of Judgement x Law, Obedience” x all the meanings of 18, an apocalyptic theme in spades, especially since the meaning of 360 is “Encircle, trap, capture.”  That is the very plan of Satan for Armageddon; not only to capture Man, but to lure Christ into what Satan sees as a trap which will allow him to defeat Christ and, thereby, God.

By establishing a circle of 360 degrees (any scale COULD have been arbitrarily chosen), a straight line course is 180 degrees of arc, which sums to 18. So even when on a path of ‘true course,’ you are vexed. And the right angle of the Mason’s Square is thereby 90 degrees, of which there are two such arcs when formed with that true course. Each sums to 9, to make 99, which sums to 18, which also vexes the true course. Divide 360 by 666 and you get .540540540… which once more sums to 9s, this time in threes.

The meaning of 3 is “Fullness,” and of 6, again, is “Illumination, legend, Man” and 9 is “visitation” (the final fulfillment of legend in a Man, the visitation of Satan in the Antichrist). Add to that the meaning of 12, as explained next, and it makes total sense…

As we found in the number 18 a myriad of magical encoded symbolic statements expressed in various levels of occult power and interpretive meaning… that the shootings can be broken down into 12 such categories (though at this point we may simply have not found all the categories — there might actually be 18) is perhaps also telling, and happily, less complex to relate:

The number 12 is the number of Tribes of Israel, the number of Christ, and the number of the elect saved (sealed up) during Armageddon (12000 x 12 = 144,000; the prize the Antichrist seeks). “Christ,” “Jesus,” and “Savior” sum to 12 in various Gematria. So we find then that the ‘magic’ being worked in shootings, by all the lines and cleverness employed in resulting relationships we have not even begun to discover (subsequent posts)… are all aimed at confounding Christ, and Man, especially those souls who are his most prized, the 144,000. The only way he can do that, is to beat Christ at Armageddon.

Mass shootings, then, are simply a ‘bring it on,’ ploy to hurry things along.

If you find all this compelling and disturbing, you haven’t seen anything, yet. Keep reading…

Go back to Introduction

Go back to Proof OneGun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Go to Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines

Go to Sidebar: The ‘Science’ Behind MAGIC NUMBERS, Their Meaning, and Decoding

Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Any time you find a cover up, you necessarily have a conspiracy to contend with, because a cover up requires multiple parties to work together for criminal benefit. So I wonder: why do groups seeking gun control, including governmentals and liberal media, who should be using every opportunity to make their case for gun control, instead act as if the bulk of gun violence never took place? Why do they employ blinders and avoid publicizing fully?

Are there any patterns in mass shootings?  

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  media, government, and gun grabbers consistently conceal more shootings than they tell you of;
•  they are also willfully spreading mis/disinformation;
•  were they to tell you all, the patterns would be easier to spot — a defacto cover up.


Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Is there a mass shooting conspiracy?

Gun grabbers, generally speaking, seem to have a sympathetic voice in government circles and, especially, mainstream media. If you look carefully at the actual wording of media reports and politicians, you frequently see evidence of their bias in favor of tighter gun control, if not outright calling for it, even including in some cases proposing an end to the 2nd Amendment.

From article on mainstream disinformation (CLICK)

Yet if you actually dig into a given key shooting event yourself, you start to realize media frequently deems to omit certain information which, by omission, flatters gun grabber ideology by willful ignorance of the greater truth. That includes a consistent unwillingness to consider that something besides random gunplay is afoot; they never ask the obvious questions. They get away with it, in part, because they are not telling you about all the shootings.

The discoverable cover up takes form in refusing to acknowledge the true and full scope of the problem… the true number of actual mass shootings. This post spotlights the matter and considers why they choose such silence. One has to ask why, if pro gun grab, there would be such concealment? The answer is revealing, though the full answer shows how easily the issue could become clouded.

If you scan the Internet with a search you will find most mainstream sources talk about roughly 62 or so mass shootings in 30 years time (1982-2012). While other numbers and periods of time can be found, you will also find many of those reports talking about it being an increasingly more frequent event. Neither are factually correct, at least as of 2012 when the bulk of those cited were ‘selectively reported’ in order to make their point. Moreover, the narrower and arbitrary date ranges employed do make it easier to portray increasing frequency claims as ‘valid concerns.’

Point is, there is no useful consensus as to the actual number, much less any resulting trends.

There is also actual disinformation and misinformation in play, either by stupidity or intent. Much of mainstream tends to cite the same two original resources, both of which are completely worthless in terms of accuracy, and full of what at least seems intentional deceit. Worse, they are easily detected if using your brain, but even the White House and former Presidents make false statements based on their data (choosing not to think, or having no brain, perhaps, but more likely, having an agenda well served, thereby). Mother Jones, which used to be an excellent investigative journal until it came under control of Mainstream Media Moguls, is one of the flawed sources, as detailed, here.

The worst source is the Brady Campaign to Prevent Gun Violence, which maintains a huge database which is closer to mine in shooting event count than perhaps any other. However, it is so full of errors as to be useless. The same shooting can be cited as often as four times. Huge numbers of shootings have zero information which can be verified, their Web links no longer active or failing to lead the reader to the claim. Many other errors of this sort exist.

Worse, many Brady citations are not exclusively mass shootings at all, and though Brady’s use of the data does not directly claim the list is exclusively about mass shootings, they elsewhere imply it so and promote the list through dozens of Web venues without bothering to correct their wrongful assertion that it does. For example, consider a widely repeated/linked interactive map (one of three different flawed maps and data base engines based on the Brady material) citing the entire Brady list of 431 entries as separate mass shootings.

Trouble is, eliminating those with problems or not mass shootings, the actual number is closer to that of USA Today, who has the closest to an honest presentation. Even though they, too, reference Brady, they seem to have figured out the Brady problem and sought to remedy it. Note, however, that it is citing mass murders, inclusive of fires, stabbings, etc., — not exclusively shootings. This again makes it difficult for the average Joe to avoid a false impression. To their credit, they at least provide a button to filter by ‘shootings,’ which at the time of writing totaled 173 out of 227 mapped. That’s a full 100 more than the inventory cited in most reviews outside of Brady, and less than half of what Brady includes. But it still comes nowhere close to the truth.

Is media hiding something about mass shootings?

So what are the real numbers?

In my study, I elected to go back to the first known mass shooting widely publicized nationally, the Texas Tower shooting of 1966. This coincides in general with the time frame when CIA had perfected mastery of various Manchurian Candidate programs, notably the MK series. Now if you use that as a starting point and come forward, the frequency indeed increases, at least to a point, and it is indeed possible to select a limited time frame window where a range of shooting events reflect an increase… but it is also possible to find periods of decrease; fluctuation is common enough to at least support the notion of randomness which deters conclusions of increasing gun violence.

In general, national mainstream news has told us of about 100 shootings since the Texas Tower, spread out over roughly 50 years. Because where they used to only tell us about really big ones — perhaps one or two a year — they now tell us about almost each and every one, it SEEMS like there is an increase. Adding to the illusion, they talk about them days-on-end to hammer in the point, where in the past, ongoing coverage was spotty, at best, unless local, of course. But is this honest reporting of the truth? What do the real numbers say?

“NO!” is what they say. Take the 30-year number of 62. The actual count by my research totals 368, nearly SIX TIMES the number reported.

1988 – 5, 1 Postal, 2 Schools
1989 – 1
1990 – 0
1991 – 6, 4 Postal
1992 – 3, 1 School
1993 – 7, 3 Postal
1994 – 1
1995 – 2
1996 – 4, 1 Postal
1997 – 5, 2 Postal
1998 – 5, 1 Postal, 3 Schools
1999 – 8, 1 Postal, 1 School
2000 – 1
2001 – 2
2002 – 2
2004 – 5
2005 – 5, 1 School
2006 – 14, 2 Postal
2007 – 23, 3 School
2008 – 69, 5 Schools
2009 -88, 2 Schools
2010 – 47, 1 School
2011 – 35
2012 – 35, 5 Schools

Moreover, the numbers reveal something quite different than the ‘increase in random mass shootings’ being reported. Instead what you see are two periods of time where there were two distinct patterns. Before 2006 you see something approximating random distribution in low numbers, almost half of which are Postal, which I maintain are likely almost all programmable person events, the experimentation phase, if you will, where a government institution had tight control of those involved.

Note: 2006 becomes a pivot year, where the last Postal happens, and you start to get an explosion of ‘civilian’ shootings, three times as many that year, and even more in subsequent years after 2006. There we find not a steady increase, but a bell curve. What produces a bell curve? You get bell curves when you apply force to something; it starts moving slowly and gains speed, then once maximum energy has been accomodated, it coasts, and then starts to slow down. That alone implies intelligence behind the sudden spurt, and further implies we are almost at ‘End Game’ point in whatever plot is unfolding; we have precious little time remaining to thwart it.

In total, research thus far reveals more than 450 shootings through 2012, from among which media and gun grabbers can and have obviously cherry picked. There are easily another 100 which could not be plotted in my study because needed accuracy of details were not usefully available, and likely hundreds more that are simply not available through online research due mismatches in keywords; you don’t always know what to search on, and terminology used has evolved over time.

Why would media hide the truth about mass shootings?

Why disparity between media and truth?

How is it, then, that virtually all mainstream or government resources have elected to tell you of only 70(ish), or 200(ish), within select timeline widows useful to them? What are they electing to hide, and why? This is a question you must ask if you value truth and justice.

Every major city’s paper subscribes to every other major paper to keep abreast of what they are reporting. So for a major to under report mass shootings in order to proclaim a trend of increasing violence, is a willful lie. On the other hand, there are reasons for minor variations in what might be included in a given study, in case you are moved to cut some slack. I for one, am less inclined.

There is, however, a bit of a loophole through which concealment might be harder to prove or detect. A mass shooting is defined by FBI as four or more dead or injured in a shooting incident — by gunshot. Interesting then, that Brady elects to include any injury, including minor cuts and abrasions due to falling down or flying glass, etc. More manipulation of data for agenda’s sake, it seems, via hangnails.

However, FBI, despite giving it a category and definition, even breaking it down into sub groups (e.g., gang related, domestic violence, etc.), themselves fail to cite any statistics of their own, as they do in all other categories of crimes they track. To me, this proves that at the very least, government is participatory in perpetuating media myths by cover up through omission, and has a gun grabbing agenda. When a President quotes misinformation, you have even more such proof.

The FBI definition leaves us with this upshot: many drive by shootings qualify, as do tragic familicides, robberies, and so on, all of which tend to make local news. The previous article link offers other complexities which can impact on definition as to what constitutes a mass shooting, but none of these complexities seem to be impacting what media elects to include in their national coverage, and resulting limited counts; they include what suits their whim — those stories most likely to generate outrage or shock.

But, as every major community has its fair share of all defined forms of mass shootings, there is no need to elevate them all to national prominence unless there is some ‘marketing’ usefulness to the anti-gun crowd, such as if at a basketball game in a public park. Locals hear all of their local events, plus national, and the problem therefore seems sufficiently large and pervasive in support of gun control arguments, but insufficient to see any patterns; they do not know the full extent of what is happening in other communities.

This further drives them to think their own community especially dangerous (well, some are), and letters to the Editor and government authorities are dashed off seeking a ‘crackdown.’ But what if they knew the truth and realized their community was closer to normal, or understood that there was intelligent design at play? What would their letters to the Editor look like, then? Would they be calling for gun control, or Congressional Investigation into the intelligence community’s mind control research, or the power elite cultists? Would they be wanting guns to be collected, or would they be buying guns?

I’m not the only one to notice this under reporting. There has recently evolved an anti-gun group made up of loosely aligned members nationally who report ALL local mass shootings directly to their central Web page. They do use the proper definition of mass shooting, and their results underscore the problem for knowing the precise full count. They report 365 documented mass shootings in 2013 ALONE. That gives you an idea of how many shootings in prior years may simply not be on the Web in a form making them sufficiently easy to find. Therefore, even my larger numbers would seem inadequate (but as we will see, they still remain appropriate to the need).

Unfortunately, no one like them has been doing this for prior years, so once more, the ‘increase’ in shootings is seen as dramatic only due their improved full-reporting methods in ‘real time,’ but it can easily be argued as a false indicator. You can’t just go back in time and research, because unless the news source itself without reading every back issue of every daily newspaper in America. It’s damn hard to find those which have been earlier underreported.

Now, for my purposes, I elect to choose all which have available details useful for analytical purposes, which is again more than 450, less a good number of the 365 just mentioned, since that Web site was not discovered in my search until after I had stopped adding to my list. Understand, too, that anyone seeking to employ intelligent design would most likely need limit their own database to these same events, both because their own group of conspirators would face the same difficulties in finding underreported events, and more to the point, because it would be required that they be visible events to others in their NWO cabal — other competing groups.

But it is not these larger numbers which should concern us at the moment.

No. It is instead important to go back to my first attempt at looking for patterns, and much smaller numbers which were in hand. I made the mistake of trusting media and employed that list of 70 plus most cited shootings, only. It is important to note that even with that smaller data set, patterns were revealed, and further important to understand that a control group was also employed which compared favorably in verification of the method and findings as being scientifically sound. More on that, shortly.

The point is, in summary, that the patterns on this smaller group were subtly revealed, and only after exhaustive study. They would have been pointless to casual review, revealing nothing suspicious outwardly. But my unorthodox methods gave me an edge, thankfully. More so, of course, once the database grew to include the hidden shootings.

Once I realized and uncovered the full scale of event histories, the patterns became easier to find, and were quite overwhelming and more revealing of hidden information. Therefore, one very logical reason select gun grabbers with both a dark motive and the means to control media’s reporting have exercised restraint and employed confusion in their selective ‘complaints,’ is that full disclosure would increase the likelihood that someone like myself would come along and find the patterns, and expose them, perhaps even without my methods.

That perfectly defines a cover up. That, in turn, defines a conspiracy’s very existence.

Go back to Introduction

Go to Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters

Crime Series: Ten Unexpected Proofs ‘Random’ Mass Shootings are by Intelligent Design

Ten easy-to-grasp but remarkable proofs, both visible and hidden: Illuminati style mystical symbolism and related ancient magical mysteries, calling cards, bragging rights, and Warlock spells cast against America, and the World. Conventional clues, too.

Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this multi-part posting series…

•  there are 10 interlocking proofs that mass shootings are not random;
•  they include various kinds of patterns, visible and unseen, and even coded information;
•  that the pattern predicts itself, and understanding may therefore help stop the murder;
•  that the codes and clues seem to be like signatures identifying the architects.

Are mass shootings by intelligent design?

Introduction: Ten Proofs ‘Random’ Mass Shootings by Intelligent Design

Is there a mass shooting conspiracy?

Note: This series is not yet ready for full presentation, but the most recent Fort Hood forces me to start releasing the material without delay. The reason for delay has had to do with an inability to provide high quality graphics suitable for proofs. This will be overcome, shortly, I hope.

One thing you need to know about me as an investigative writer or, as media and government would prefer you to think of me, a ‘conspiracy theorist,’ is this: whenever I decide to take a close look at a potential conspiracy or lesser matter, I do it right. If I cannot uncover something no one else has brought to light, I’m either not finished, or I’ve backed out concluding it beyond reach, or a dud. If you read my findings on a given research, you will undoubtedly learn something FACTUAL no one else had previously discovered or brought to light. And so…

In this matter, we find the shear volume of startling new information overshadows and renders original headlines and competing theories essentially meaningless — especially media’s version. It will make you angry. It will scare you. The question is, will it motivate you to do something about it? YOU are what you are waiting for, you know.

But in introduction, there is still one other point which must be made; it is in form of a problematic question. Can I get you, the reader, to override your current belief structures long enough to  consider the unusual nature of the findings? This presentation will most assuredly fly in the face of what most people consider ‘traditional wisdom,’ but it also will explain why it is non-the-less valid. Can you handle the Truth, or will you wimp out to the comfort zone of current beliefs?

Area all mass shooters psycho?

On suspending belief structures


Dormer was not quite a ‘Mass Shooter’ incident, at least not at a single location/time. But the affair highlights the problem of accepting ‘random’ as the right word to apply to shootings when there are so many problems with the official story. CLICK to learn about why many people think him just another shooting patsy.

I began a ten-year research project for a book, Fatal Rebirth, in late 1989, which also begat a screenplay published on line in 1999 (The Electronic Apocalypse). In the book’s Introduction I urged the reader to suspend their belief structures briefly and read the material as if merely fiction for entertainment’s sake, because many of the concepts within were so new and unusual as to defy belief — likely seen as ‘far-fetched’ by most uninformed readers. I offered over 1,500 footnotes and a huge Appendix section to help them consider why I deemed them factual.

This blog post should be read in like manner, especially if you are content with government’s actions, are a politician, member of a government agency, military, or any part of the justice system, or Media. Especially if you are involved in a mass shooting incident as a professional or a victim seeking to know the truth. And even more so if you are gun owner, or even among what 2nd Amendment supporters refer to as a ‘gun grabber.’ I plead, therefore, that you suspend your belief structures briefly as if reading a political/horror-science fiction piece.  That’s what it is, actually, minus the fiction component.

You will, like readers of Fatal Rebirth, I would hope, realize the truth by the time you reach the end. Or, at the very least, you will be entertained for all your reluctance to let the message sink in and take root.

If nothing else, even if you choose to doubt some of the more obscure subtopics (i.e., relating to mysticism) have any factual basis in REALITY, consider this: it matters NOT what YOU think, given they ARE taken as real by persons likely to be behind any such conspiracy (i.e., ‘Illuminati’ Satanists). You MUST also ask yourself, “Can the sheer magnitude of interlocking clues be ignored?” Because at every turn they defy the odds of coincidental probability, as illustrated by carefully crafted control study groups. If thinking logically, you MUST concur that intelligent design is revealed despite what you may think about the logic of the beliefs which lay behind it, or the unusual way in which the evidence was revealed.

Pending you conclusion, by all means feel free to think me mad if you must. Read just for fun, but please read it through to end before you render final judgment as to if madness or truth be present. A logical reader will be converted unless their mind is already so firmly made up that they do not wish to be confused by facts which destroy their belief structures. Judge not what ye know not, but that upon which ye are well informed and have considered fully, judge freely.

Your future and the future of your children could well be at stake, a statement applying to all mankind. Why do I say this? The book mentioned above, Fatal Rebirth, was based on trying to illustrate what I call the Unified Conspiracy Theory; the notion that all of America’s darkest bumps in the night for the last half of the prior Century, forward, were not random oddities by random people for random agenda, but carefully orchestrated by the same core group of people with but one goal for the World in mind.

I termed them Shadow, but they are also known by other names; the New World Order, the Illuminati, the Power Elite, Globalists, and among them, member names like CIA, Skull and Bones, Bilderbergers, Council on Foreign Relations, and many more of like nature. Their goal I termed End Game; the establishment of a One World government, a single seat of power in order to seat the Antichrist upon his throne and bring us to Armageddon.

The Unified Conspiracy Theory, once justified in research and taking shape in book form, led me to realize that their stepwise actions over fifty years of mysteries were indeed leading to one goal. Knowing the goal, I reasoned, it should be possible to forecast the next logical steps. So the book also included within its presentation several terrible event predictions expected to take place in our near future. Thus far, though I do not claim to have gotten all event details precisely correct, many terrible forecasts have already come to pass. Among these were:

a) an assassination attempt on Ross Perot or his family to cause him to drop out of the Presidential Race, a matter which indeed transpired using mailed Anthrax according to a Secret Service back channel contact;

b) the false flag downing of the World Trade Center by civilian passenger jets which;

c) resulted in a series of Middle East Oil Wars. Other predictions include two more terror plots which are part and parcel of this blog post. Those are…

d) a false flag nuclear attack on Charleston, S.C. and Portland Oregon (the later of which I have already thwarted, it seems – see middle of my home page), and more to the point…


Note: you can get a free copy of Vol I of Fatal Rebirth (ebook) by email request to pppbooks at Comcast (net). You will be glad you did, as it will take you far deeper into the Rabbit Hole than Alice or Neo had ever gone. This pill is black, though trimmed in red, white, and blue.

So, if ready to suspend your belief structure, let us begin. Pretend there is, despite media’s recent attempt in the Cincia shooting to portray anyone who believes in the New World Order as mentally ill and anti-patriotic, that such a conspiracy is actually afoot. Also pretend, if you must, that Political Control Technology in the form of the Manchurian Candidate is real. There are real-life Jason Bournes out there, as my book, MC Realities, and other books on Political Control Technology illustrate more than adequately. Even the Smithsonian channel knows.

This will make the key postulations, testing methods, conclusions, and proofs of the core material easier to accept, especially as they will be offered in the manner of scientific discovery — exactly as I undertook them as investigative writer. You will, in fact, be able to retrace my work to double check it, if you wish — as long as you review the full series of posts and sidebars before you attempt it, lest you make a critical error.  Please subscribe to my blog pages to insure you are notified as the remaining posts in the series are added.

Are mass shootings are by intelligent design?

The Investigation

Jason Bourne… though fictional, is based on real-World programmable assassins. Do you suppose CIA or anyone else would not find something useful to do with failures in such programs? Might they not make excellent disposable patsies? Image/film:

Some several months ago, insulted by media’s misreporting of Aurora and Sandy Hook and outright clues that a disinformation campaign was afoot, I began finding ample cause for concern.  But how might one determine if other mass shootings were arranged as part of some kind of sick criminal conspiracy, one which might involve both real and faked shootings?

I started with several basic presumptions of truth, and then set about to see if the logical evidence such presumptions would require were indeed in place.  The ‘illogical’ presumptions fostered by the Unified Conspiracy Theory requiring suspension of belief are as follows:

1)    That Shadow and their Globalism requires destruction of America, and its Constitution in order to enable forming the North American Union, a matter which in turn requires that the Right to Bear Arms is first invalidated, and arms confiscated or gun owners otherwise neutralized in a manner similar to that of the Australia;

2)    That the New World Order, the modern day Illuminati, if you will, would be well capable of undertaking a campaign of gun violence for such cause, but being an Illumined Power Elite lost to Satanic and Masonic mysticism, they would employ mystical constructs which would leave detectible footprints if knowing what to look for;

3)    That the principle tool of such a plot would involve a small army of patsies, cut outs, and fall guys, principally from a category best known to the public as Manchurian Candidates. It may additionally involve a small army of blindly obedient members placed within our armed forces, the intelligence community, and law enforcement to aid more indirectly in supporting roles. This would include logistics, psyops, and cover up, or even command and control, generally unaware as to the truth or reason behind their orders. These are the same players frequently found playing key roles in the lives of mind control victims at large.

All three presumptions must be true to make a proper accusation, for they comprise the basic proofs of any crime: Motive, Opportunity, and Means. Normally, we think of opportunity as meaning access to the scene of the crime, typically proven by forensics such as fingerprints, or better yet, actual eye witnesses. In this case, they deliberately left their fingerprints, in a manner of speaking. In fact, the bulk of the proofs fall into this category, perhaps even naming individuals behind the plot. At the very least, we are indeed dealing with the Elite, those involved in principalities and powers.

Indeed: Two names have already surfaced by such clues, and both are billionaires. I also have a dozen other names of likely conspirators, but no names are released; these things are my Life Insurance Policy.

Sidebar PostOn Programmable People. This sidebar post addresses the notion of the possibility that at least some mass shooters are mind controlled patsies, and reconciles their coexistence with truly random shootings ­­— those which are more naturally spontaneous crimes — which can collectively still both be component parts of the same intelligent design.  This leads us to the finer details of how shooting event locations and dates lend importance to our consideration, and just how these things can additionally reveal intentional, yet concealed clues.

Here it should be mentioned, that many observers of the New World Order crowd favor the supposition that among their leadership we might find the modern-day Illuminati in spirit, if not in actual blood lineage, even though they may have since assumed a different family name. By way of example, in my research, I have had reason to conclude that the Rotheschild name was assumed; those assuming it being Knights Templar in hidding, their wealth derived from Templar treasure, and not truly Jewish by ancestry or faith, at all.

Many who favor the notion of a Modern-day Illuminati additionally believe, as do I, that there are at least two, and as many as four groups competing with each other within the movement to be the ones ‘honored’ to have one of their own selected to become the Antichrist. Much of what is discovered in this investigative series will point to this being true in one way, or inherently implied in another. It is, in fact, one very good reason to employ symbolisms and other clues which act as signatures of those so bidding for selection.

Such evidence was abundant, even easy to find, and I remain convinced that the trio of presumptions are sound enough to warrant seeking incontrovertible proofs. I sought such proofs both in quality and quantity sufficient to illustrate that ‘random’ was not the right word to describe mass shootings, but rather, ‘intelligent design,’ is.

The path of my continued investigation led to endless shocking discoveries, but there was a problem: to describe the methods and explain findings to the casual reader would, it seemed, require a tedious educational process and boring, repetitious citation of facts. It would be about as fun to read as a spreadsheet or database. Not good.

People want visual sound bites easily grasped. More so if Sheeple content with their Evening News and easily frightened off by words like ‘conspiracy theorist,’ and ‘New World Order,’ or similar. Worse, the investigation bogged because of the real life tragedies each shooting represented. Proper investigation meant exhaustive study of individual events, reviewing endless horrific detailed accounts and sad, brutal media imagery. It was taking an emotional and even physical toll upon my body and mind, and my spirit. Eventually, instead of plodding along 10-14 hours a day as at the start, I found myself barely able to work on it a few hours a week.

I played with several ideas on how to present the story NOW, without completion of the full study, for there is indeed already a mountain of proofs uncovered. But again, the complexities in presentation left me feeling it a hopeless task. Finally, I decided to break it down into about a dozen short compartmentalized components suitable for a series of blog posts. Frankly, I’m hoping it will spur someone to offer useful help; it will take funding and staffing to properly complete the study. Or better still, perhaps some Sheriff or other authority will assume the duty as result of shootings in their jurisdiction.

Follows is a synopsis of the Ten Proofs to be presented. There will additionally be, at appropriate points, companion posts detailing the scientific methods or other analytical procedures involved in select proofs where a doubting Thomas type may wish to challenge the validity of claims. I firmly believe that for my proofs to be accepted, they should be presented in a way such that ANYONE can duplicate my work and verify accuracy and conclusions.

This is a legitimate investigation despite its atypical and unorthodox methods and odd topics involved. NOTE: links will NOT WORK until the various posts involved have been posted. You may click on them to discover their current state. Again, subscription to this blog will notify you when new posts are added.

What are the ten proofs of a mass shooter conspiracy?

The Ten Proofs in review…

Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns;

Any time you find a cover up, you necessarily have a conspiracy to contend with. Gun grabbing groups, including government and biased or puppet media forces, should be using every opportunity to make their case for gun control, but act as if the bulk of gun violence never took place. Why do they employ selective blinders? There is a reason.

Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters;

The Illuminati loves magical numbers, as they can translate into meaningful words or names, or leverage ‘spells’. Interesting then, that basic shooting statistics establish set after set in the most magical and potent number of all, one which decodes to ‘Satan.’ This alone reveals dramatic coincidences well beyond the possibility of random chance.

Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines;

The same Dispersal Pattern Studies method applied by government researchers to UFO sightings reveals Mass Shootings do something UFO sightings allegedly do not: form repetitive patterns with GPS accuracy, doorway-to-doorway-to-doorway.

Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes;

When it comes to symbolism, nothing outperforms a graphical shape. Better still when that shape itself has magical properties or relationships to other shapes, or its own hidden or obvious meaning. 

Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters;

It defies odds that perfect shapes should cluster together in ways which share overlapping lines or corners, and be generally both aligned and mirrored in additional symbolism.

Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols;

Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart;

Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View;

The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.

Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages;

Shooting line sets share three or more identical magical numbers within their data points. These decode to tell us when and where the next shooting will be, name a shooter, or perfectly prophesy some specific outcome.

Proof Ten: Individual Shootings Examined in Micro Duplicate the National Study Proofs

Two examples are offered; Aurora and Sandy Hook. They not only duplicate the ten proofs, but they mirror each other and one points to the other.
Why are mass shootings on the rise?

Are you ready of this? Buckle up!

So let us begin. I propose your best bet will be to SUBSCRIBE to my blog pages so that you are automatically notified as new posts are made to complete the series. Please link, share, tweet, etc., and by all mean vote your ranking at page top of each one, and comment with your questions, criticisms, or thoughts. How else will other know this is important?

Do bear in mind as you read, each offered proof individually seems to defy the odds or logic path required for truly random shooting events. Collectively, it is monumentally clear. Also bear in mind that I am human, and I, like any other, am prone to making mistakes. A ton of information had to be entered and copied from one location to another multiple times (multiple database and software applications). Therefore, either because of a mistake on my part, or perhaps because of a mistake in media or other accounts/records, any given individual data point in any given set of proofs may be found invalid.

By all means let me know if you find such a discrepancy, but please remember this: a single error in a single data point does not invalidate all other data points, and therefore, does not invalidate the conclusions or the suppositions, themselves. In order to dispute my findings, you will need to offer proofs that the method is flawed, the entire data set was in error, or analytical logic was faulty. More: such dispute must address and ultimately invalidate all ten proofs, or short of that, offer equally viable alternative explanations which fit the findings and afford a more innocent explanation.

Since each proof tends to defy all possible odds of random coincidence, and does so consistently, again and again, naysayers will have their work cut out for them. More so, because in many cases, control groups have been established to show truly random data points enjoy no such pattern. I have done my homework, and carefully so.

I will demand the same of naysayers.

Go to Proof OneGun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Go to Side Bar: On on Programmable People


How Social Network Trolls Target, Track, and Psychologically Profile You

How to spot and deal with Trolls, including a clever tool they use in any social media capable of posting images (VERY prevalent on Facebook), and quite insidious with far reaching implications. BEWARE: you betray yourself and your friends if you take things at face value.

What is a Web Troll?

by H. Michael Sweeney

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

How does being a web troll work?

UPDATE: Nov. 11, 2014 Perhaps as if to ‘test’ me as result of this article (or not), a Web troll began the process described herein to goad me argumentatively  while also employing a good half dozen of the usual disinfo tactics in the 25 Rules of Disinformation (linked below). So I unfriended him and watched: that same day, ‘someone’ created a new FB account and almost immediately friended two of my friends, posted ONE activist post, and ONE peace post, then requested to friend me. Sure. OK. BUT I HAVE MY EYE ON YOU, because that’s how easy it is to get a new identity and hook back up to a target. Not that I care. Trolls are tasty.

Are you being targeted by online government trolls

How Social Network Trolls Target, Track, and Psychologically Profile You

Reading this post you will learn…

•  That there are three basic kinds of trolls and subsequent ‘missions’ against targets like YOU;
•  That there are troll profiling and tracking tools or methods which can be recognized;
•  That there are ways to protect yourself without drawing more unwanted attention; 
•  That the Troll represents a danger in that their ‘assessment’ can lead to escalation in your targeting.
Is social media infiltrated by government trolls?

Government and Commercial Trolls

Consider, for example, the friend ranking and layer’s of affiliation tracking tool. A graphic is created containing a simple textual message. It is graphical because there is no easy way to distinguish between two identical text messages, whereas, altering a single pixel’s color by 1 imperceptible shade of difference makes it unique, and allows thousands upon thousands of individually trackable versions. A Troll who has managed to friend a targeted person of interest then posts the textual graphic as if a sincere request. Examples will be shown.

These kinds of posts seem innocent enough and easily get spread as requested, allowing simple computerized search processes by FB’s intelligence community or marketing partners to see not only who is close to the target party, but at what layered level and loyalty or, if you prefer, like minded thinking. In point of fact, ANY image shared with a given political, philosophical, religious, or other belief or emotional message can be so tracked to perfectly define each such poster’s psychological profile, and rank their threat level to the paranoiac governmental powers that be. The same is true of marketing trolls seeking to learn about your product usage or demographic, etc.

The only safe share, then, we might presume, is textual or perhaps the sharing of a URL and it’s image, or an image we ourselves create and have perhaps included in our FB albums. Even with URL’s however, the possibility exists it is still being tracked, especially if a Troll operated resource such as Federal Jack, a known DHS sponsored Sorcha Faal disinformationa conduit targeting conspiracy theorists, activists, and other ‘potential terrorists.’ Their goal is to get you to ‘share’ their links, thereby spreading disinformation while psychologically cataloging YOU and any of your friends’ beliefs; all who click to learn more. They may need to have a troll assigned to them, after all, for being yet another ‘potential terrorist’ — a free thinker, patriot, constitutionalist, etc.

Worse, we have learned from our new Paul Revere of the coming Second American Revolution (Snowden), that NSA is not only monitoring FB activities big time but that Trolls from NSA, FBI, DHS, DOD, and even the FED, and other paranoid agencies, and even corporations who have a strong and growing list of people who think ill of them, like Monsanto and some banks — all regularly maintain false social media identities for entrapment and spying purposes. They even infiltrate online gaming. Snowden’s latest bombshell, according the foreign media analysts, indicates there were so many game Trolls that it was starting to change the character of online gaming, and special tools had to be developed so that Trolls would not end up targeting other Trolls and more easily remain inobvious. We are talking here, about games with chat or other communications capabilities within the game or as part of game support, especially when in a social network manner.

And it is clear that snooping is also rampant among commercial interests, which is certainly true in online gaming, which after all, is a commercial enterprise. FB is perhaps the biggest offender in this area.

How can you spot a social media troll?

Differentiating an innocent graphic from a potential spy tool…

There are several online graphical message generating services. FB themselves seems to be hooked up with one called your-ecards (.com). Another is someecards (.com). Anyone can use these to generate a simple textual graphic with or without use of stock illustration graphics (e.g., a man looking perplexed), typically in silhouette or line art form. They can then easily share it through their favorite social media(s) with a few additional clicks. These can always be recognized because the logo for the creating Web service is displayed at the bottom. An additional hallmark of such services is that the background is almost always colored, and there are scant few colors available. The default color or otherwise most popular seems to be pale blue, pale green, or yellow-orange.

So when you see a colored background, typically with larger or fancier text than a normal posting, you are clearly looking at a graphical text post. The next thing to look for is the logo. If you see a logo, it was likely a sincerely generated message by a genuine human resident of social media. However, if there is no such logo, the message may have been generated by a Troll using his own computerized tools to psychologically target you regarding a select individual hot button. Are you, for instance, a tax protester, pro gun, anti GMO, for or against a given politician or political topic, or simply, who is a good like-minded friend of yours as opposed to some stranger you’ve accepted on the Network. Such messages also tend to be minus any artwork — text only. There is one more defining clue to look for.

Because there may be multiple versions of the same message for targeting different individuals by multiple Trolls interested in gathering information about many someones, there is a need to tell one shared message copy from another, which is exactly why it needs to be a graphic.  YOUR version must be physically different from MINE. The simple solution is to vary one or more pixels in a way easy for a software routine to detect, and then match to a targeted individual and their Troll/need. Given the countless millions of users on FB (and other social media) who might be deemed targets, it may mean that many, many dozens of pixels will need to be manipulated. My research shows that, indeed, most of the suspicious postings, in addition to missing the logos, have such visual manipulations. Examples:


This is an example of a Troll-generated chain letter designed to find out your religious views, and who among your friends is of like mind. Note the guilt factor in the last sentence, and no true traditional Christian message. Note also the dark aberration, a visual flaw above the numeral 9 of 97%.


This is an example of a Troll-generated chain letter designed to find out more about your true close friends, as opposed to casual Network contacts you don’t personally know. Again, note the visual flaws in the slightly darker ‘blur’ areas about the letters… you may need to zoom in. This phenomenon is common in such messages, creating a pool of pixels useful in manipulations.

So one needs to look for such abberations or flaws in the background, usually darkened pixels along the edge, most commonly gathered in clusters or strips. You have to ask yourself… if going to the trouble to create a custom graphic for a text message instead of simply typing it in, why would they: a) choose the ugly colors used by such as your-ecard if not trying to make you think it such; b) take the extra steps to strip away the logo if using such a service (the point being they did not); and c) end up creating an image with a flawed background (where did the aberration come from, if not deliberate)?

When these clues are present, you are staring at a Trollish spy tool. To then share it betrays and catalogs you and links you and your beliefs with any of your friends who do the same, and theirs, and so forth, on down the line. The proper thing to do is enter into the comments: “I suggest you delete this post because it fits the description of a Troll’s chain-letter spy tool to catalog, track, or psychologically profile and establish links between like-minded persons: learn more here:” That link goes to this blog post you are reading.

Then I suggest you share the post anyway with a similar message, “Share this to warn others about Troll spy tool chain-letters to catalog or psychologically profile and establish links between like-minded persons. To learn more about this tool, visit this link”

Finally, look carefully at the original post. Most social media will have a means to indicate if it was itself being shared, or was a direct post. If direct, it’s YOUR Troll. If shared, the poster was gullible in sharing, and is not likely a Troll… but beware that that could be arranged for as a deceit — so watch to see if the poster repeats the ploy frequently. You might optionally go to the ‘cited source’ of the share and try to find the post on their wall if you want to try to see if they are the Troll, and on to the next if not, and so forth, posting or messaging those encountered along the way who are victims, if you can. But that can be a LOT of work.

Are social media trolls sociopaths or psychopaths?

More Direct Trolls; Psyops and Sociopaths

The real threat to activists and politically incorrect persons online, like myself, is government agents paid to do nothing but sit in front of a computer and pretend to be your social network friend, someone you don’t really know at all, of course. They don’t just post Trollish images, they comment, and even message you. Like the aforementioned tool, they seek to learn everything they can to psychologically profile you, as well as see who ‘likes’ your posts and what THEY comment. But they are also there to play mind games. You are officially a victim of psychological warfare, perhaps even by someone from within the U.S. military, or even the military of another country. They are quite often sociopaths, so chosen because those traits make them more efficient.

Here are some tips on how to spot and deal with this class of Troll, as well as the kind of Troll who is simply out to make trouble for a given collective of people who believe a certain way about a certain topic. You know the type, my favorite example being the warrior Atheist who deems it his life’s mission to ferret out believers in God and annoy them with endless barbs and zings as if they were evil and dangerous for daring to worship. These people will wax sociopathic, too, and even psychopathic, when given enough rope. UNFRIEND these kinds of Trolls.

Hint 1) Trolls work in packs or maintain multiple identities to be a self-contained pack. That way, if you delete one of them, others survive, and then they generate yet another new identity and friend request to maintain the pack. The advantage is that you can suffer a series of ‘In deference to your view, we all seem to believe the same (whatever)’ posts (i.e., you are an idiot on this matter). Sure. You might be an idiot. But at first, the pack is all positive and flattering to your own beliefs so you a) get used to seeing them, and b) start respecting their beliefs and presuming them the same as yours. That’s the worming in stage.

But when it is appropriate for profiling or attempting the role of agent provocateur or disinformationalist, they will all suddenly be believing in something more off the mark, and increasingly so, as often as not. But by now, you like them and their beliefs, and so, your reaction tends to be as they expect; they are pulling your chain, and observing your jerks, evaluating, and cataloging, attempting to modify your behavior through deceit — a form of mind control. Can you be controlled, or are you firmly centered in your beliefs? Are your notions your own, or being foisted upon you?

Hint 2) New Troll requests tend to be persons with scant history on the network, and very few posts, but posts akin to your own in substance. Note that Facebook asks you to suggest friends to them. NEVER do this unless someone you ACTUALLY KNOW in the real World. If you do it, you are giving them a list of new targets. Since I don’t fear and even enjoy playing with Trolls, I let anyone into my friend list, but that does not mean they get what they want from me. But you may be better off simply passing on marginally viable friend requests.

Hint 3) Try posting something deep and yet somehow provocative (in the eyes of the establishment) which requires a bit of reading and thought before drawing conclusions. Look for a pattern in response from the same suspect persons; a) almost instantaneous response in the manner of (Hint 1), and typically emotional rather than logical in nature. This is almost always short and designed to be inflammatory or provocative, a bit testy. This is followed by b) one or more secondary (pack) responses delayed rather a bit in time. These will be more in depth and thoughtful, and validate the former with logical argument, and may contain a link to give further credibility. Other brief pack replies may be sprinkled in for effect. Collectively, they are all in agreement regarding your idiocy (or whatever).

It is when the same people tend to respond in these patterns that you are very likely dealing with a Troll pack. You will find this is true regardless of what time of day or night you post. They never sleep because every psyops Troll is actually three people manning a keyboard around the clock. They can always respond quickly with the first response, but the careful response requires that they actually research and formulate the best supporting answer based on all they know about you and the topic, which they might need to first research, and likely, it involves a supervisor’s approval or must be compared against preset guidelines.

Hint 4) Thick skin, undaunted. There is nothing you can do to make these people not remain your friend, short of unfriending them, yourself. While they may match or even exceed your own expression of ire, they won’t go away no matter how you might choose to argue, or confront with insult. Indeed, they tend never to deal with insults directly, at all; they are irrelevant and serve no usefulness to their goal. A real person has an ego that must be defended, but they are just playing psychological games and feel superior regardless of what you say. But when you argue, watch out for the next hint, which is commonly employed in their responses.

This is also true of the sociopathic/psychopathic ‘cause’ trolls.

Hint 5) They tend to employ the 25 Rules of Disinformation. Easy to spot, easy to deal with, if you know what to look for. Be careful, though, because ordinary people sometimes use flawed presentation style or less-than-thoughtful posts which on the surface appear to fit one or more of the rules, when they are just being human. Watch for repeat performances, to know the difference. Give them rope.

Can trolls lead to real-world targeting?

Dangerous escalations; why we dare not ignore trolls

The real danger in online Trolls is this: their whole purpose in targeting you online can be to determine if you deserve real-World targeting, as well. With a few keystokes you can end up having your entire life put under a microscope; phone surveillance, tails, observation posts, bugs and cameras covertly placed in your home, mail intercepted and snooped, and so forth. Men in Black stuff. Its why I wrote The Professional Paranoid; a how-to book on detecting and dealing with this kind of targeting.

And, it can escalate further: electronic harassment, dirty tricks, political control technology (mind control) to make you look mentally ill to others, destroy personal relationships, wreck your income, and sabotage your life. For that, I wrote MC Realities, another how-to.

But it can also lead to the worst of all possible escalations; NDAA vanishing. If truly a pain in the neck to the government, a threat which needs to be dealt with more urgently… you can ‘legally’ (so they claim) kidnap you and make you vanish without any legal process. They can elect to torture you or give you over to some other country for ‘processing.’ Or, if they want, they can murder you and dispose of your body. This is how we know we are living in a tyrannical Police State, and why, then, government dare not tolerate free thinkers without Trolling them, and trampling on rights and freedoms at every turn, and why fear mongering is their number one justification. ‘Oooh… terrorists are everywhere! We need to TSA and NSA your ass for your own safety.’

What should I do if I encounter a social media troll?

What to do with a Troll

I personally do not mind their presence so much as some might. I enjoy providing them with disinformation, or provoking them to try to chase down a given pathway of dialogs only to suddenly drop the matter as if it never happened, or I don’t really care, or even was deliberately jerking their chain. I even kid them.

But most people would prefer to unfriend them, and there is NOTHING WRONG WITH THAT. Just know they will be right back with a new identity. It may be better to deal with the ones you know than to worry about finding the new ones you don’t yet know.

My favorite thing, however, is to educate them. I like posting factual material which challenges their personal beliefs that their job and their boss are operating on valid or just principles or beliefs, and purposes. I make them ashamed or feel guilt, whenever possible. It does not work with everyone, of course, but it is fun to try.

Are social media trolls dangerous?


Your privacy and personal safety could be at stake if you are in the hands of Trolls. The threat level is determined by how much our paranoid government fears people who fear government’s growing fascist police state/spying mentality, and dare to talk openly about it.  The more vocal you are, or the more aligned with or closer in links to others of like mind, or the more active you are elsewhere on the Web, or the more followers you have, and even the kinds of searches you make (that, too, is being watched by government) and certainly, your own original postings… each of these things determine if you might become the victim of someone else’s Troll, or have a Troll assigned to you, and what kind of Troll.

And once your ‘threat level’ has been assessed, that could lead to escalations that you will not likely want to experience. If you get a sense that such escalations are already in place or happening, by all means read my books, because they will help you know for sure, help identify the players, and form defenses. You can also contact me personally for free and for-fee online consulting or direct intervention services.

It’s what I do when I’m not being a thorn in the side of tyranny… and attracting Trolls.

Gun Shops, Grocers, Other Retailers Key to Disaster Survival

When the stinkiest FEMA kind of stuff hits the fan, anyone who has a business dealing in key resources will find their valuable inventories and property at risk of sack and pillage by looters, or outright theft by government. There is a way to protect such assets while at the same time insuring better chances of survival of families.

How do I protect my business in a disaster?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What can gun shop owners do to protect against gun consfication?

The Threat to Business Property is significant in a disaster…

Korean shop owners (rooftop) defend shops during LA Riots to augment or supplant Law Enforcement (click for riot details)

In the prior part of this series we reviewed a wide variety of disaster situations that make emergency preparedness an ultra-important concern for families, reasons far more serious and far reaching than mere quakes, floods, or tornadoes. In the second part, we proposed a disaster preparedness plan much more comprehensive and truly useful than that advised by FEMA/DHS, albeit one government will never approve. Why? Because it’s closer to their own preparations and mimics their own capabilities, and removes you from dependence upon them. That means they cannot control you by being your only source for key survival items.

But the previous material addressed family needs from their perspective. And, there were certain aspects of such a plan which would prove difficult for many families without the help of an outside party. Then we have businesses to consider, who have their own unique concerns as to what happens in dire emergencies. Business owners or responsible managers of many kinds of retail and other business with select kinds of inventories or resources, should be every bit as concerned as a family, and looking for a disaster preparedness plan which specifically protects their valuable business assets, both real property and inventories.

There are several key reasons to consider this a critical concern: One, many disasters are deemed Acts of God and are therefore not included under insurance provisions unless, perhaps, paying extra premiums for specific policy riders such as a flood or tornado insurance. No insurance policy provides protection against acts of war, which includes revolution, military coups and similar political unrest, often even excluding protection against riot losses — regardless of the cause of the riot.

And beyond the worry of insurance protection, FEMA’s plan for your assets in an emergency will very likely include confiscation and take over of your property ‘for the good of the community.’ Similar concerns exist in any Martial Law situation. So if you have such a business, you should worry and wonder if there is not some way you can protect your assets from such total or near-total loss or take over. Never fear, the Professional Paranoid is here to help…

What will happen to gun shops in a FEMA declared emergency?

Partnering with Family Collectives

The prior posts in this series dealt with idea of forming multi-family unit collectives for improved emergency preparedness at the family level, as well as why such preparedness plans and kits should go well beyond minimal FEMA advice and prepare for long-term disasters, not just three day fire/quake/flood protection. This involved numerous considerations and plans in terms of organization and supplies, individual responsibilities and more. But for many such collectives as might be established, some items become difficult to come by or store due to cost or special attributes.

The bottom line is, in a serious emergency situation, looting and general criminal activity become a serious threat to any owner of a business handling inventories of critical resources which are also valuable to long-term disaster kits. Often just as important, many such inventories represent a storage problem for long-term home survival kits. Gun shops especially, and even food or fuel can be difficult to store in quantity suitable for a long-lived disaster. Many more items could be added to such a list, as a given collective of families will have their own unique set of limitations and issues to resolve. As result, even a motorcycle shop or car dealership, auto parts store, tire shop, or tool shop, may find themselves in the same position as a gun shop. In some communities, for example, boats will be a key product in need of protection and in demand as an emergency item. So there are many kinds of businesses who can take advantage of the ideas offered here.

My goal in this series of posts was to attempt to find a solution addressing both these concerns by partnering family collectives with such owners. And, the word owners could in some cases mean ‘managers,’ where owners are corporations or persons who do not themselves manage and/or live near enough to ‘take charge’ for the purpose. Such partnerships are simple: the owner joins or heads a family collective, either one they formed on their own (perhaps made up of employee families), or by joining with someone who approaches them with an acceptable offer.

In some cases, such as gun shop owners or owners of vey large facilities (e.g., super market,), they may wish to partner with multiple collectives. This is because in the event of worst-case long-term disaster scenarios, there may be a need for significant armed resistance against third parties, even to include unconstitutional seizure by Federal forces. By unconstitutional, I mean in the event of an attempt to overthrow the government by the military, or armed insurrection to restore the Republic against some other form of tyranny.  We will know that horse when it rides into town; mass arrests or attempts to seize weapons door-to-door will be its hallmarks.

We all remember the LA Riots? Even though the National Guard was deployed, it was up to citizens to protect their own property. Neither soldier nor Police and Fire were of much help. Korean family-owned businesses gave us the model we need to consider following; they armed themselves to the teeth and took to the roofs of their stores and residences and fended off looters. Family units can band together in like fashion, and better yet if also joining with a one or more business owners in some mutually beneficial arrangement.

Gun shop owners, in particular, have a serious need. They become the highest-value target in town, and therefore, need many able-bodied people to bear arms — in sufficient number to become a significant deterrent to assault. This works well for the families involved, as well, providing them with low or no-cost access to weapons needed to protect their families and homes. The trick is to find ways to do it which do not amount to simply giving away inventory. Not a problem, given that provisional contractual agreements can be drawn up in advance.

How can we prevent government confiscation of our business assets in a declared emergency?

Making it work for all concerned

I propose that such partnerships might be best approached with a contractual agreement for mutual protection. The agreement should provision for both the possibility of taking possession of weapons and munitions immediately and only after a serious event transpires. It might provide for trade of ownership of weapons deployed once the crises is over for a minimum guarantee of service to the shop owner providing protection of the business property.  Weapons can be deemed as ‘rented’ during the disaster with options to purchase afterwards, perhaps with rental applying to the price, or may be considered as ‘payment’ for protection helps rendered, or some mix, thereof. Such items, pre any event, need not be fully deployed to family possession, allowing for normal inventory turnover so that older inventory is sold off and replaced with new, and families don’t need to worry about storage.

Take a gun shop: Only if the family collective partner wishes to take possession (ownership) of weapons for storage at home up front (the suggested kit calls for one pistol minimum), need any money change hands. Once a serious emergency transpires, the families can be issued the additional firearms from shop inventory, and sign for them. They must keep them safe, and must use them on call or by schedule in protection of the store property. It would only take one person from each family unit at a time, given the quantity of family partnerships participating — to adequately defend the store. They ‘pay for what they use’ in the form of a rental/purchase option to be addressed after the emergency ends, perhaps involving payment terms (perhaps involving very small payments pre disaster). There are any number of creative solutions to make it mutually viable.

I am no lawyer, but in a civil emergency, many laws fall by the wayside as a matter of practicality. A gun permit process is not something you worry about when the government is shut down and lives are at stake. However, a wise shop owner might want to check with a lawyer and get some advice and deal with such concerns up front. There is no reason a single individual from each family collective could not undergo a permit process as part of the contingency preparation. What they do with the weapons in an emergency should at that point no longer matter to the shop owner, with reasonable agreements to avoid illegal uses in place. One might also want to address how to safely store key records in order to insure lists of gun holders are not compromised and lead to confiscations, anyway.

Other kinds of businesses? Consumables such as food from a grocery store which have dates of expiration would be lost, anyway, so any financial arrangement to distribute storables in an emergency with any level of appropriate financial reimbursement or property protection services of participants should, IMO, be eagerly embraced. For most shop owners, it converts a disaster where they face the potential loss of all inventory and significant property damage into a situation that more closely approximates the ultimate ‘sale’ where all inventory goes out the door to happy customers, AND the property is protected.

From the family side, a collective should easily be able to field 6-10 adults to defend as many different business sites simultaneously, while still retaining sufficient adults to protect the home base camp. Therefore, they have access to 6-10 different key survival items they might not otherwise be able to afford or store long term. It is a win-win situation for everyone but looters and would-be confiscators.

Upon event occurrence, family members ‘report for duty’ and are issued weapons, sending the appropriate portion back to the family for home defense and protection from confiscation by FEMA/Military.  I propose an organized convoy is the only safe way, as otherwise, armed interlopers might dare to ambush a lone person or single vehicle. I further suggest that, if not already the case by natural instinct, a strict military-like organization and rules for command and engagement be established. Such a model should ideally trickle down to the family units as well, if a long-term event is involved.

Therefore, prior military service, especially in combat or involving combat training, is to be highly prized in any collective or partnership. Where such experience is found in a retired Officer (as opposed to an enlisted rank), so much the better. If there is additionally someone with prior intelligence or forward observer experience, or demolitions or military engineering background, better still. Likewise for any medical corps. or other medical background.

In closing, the business itself should have on hand sufficient stores of foods and other resources (as opined in the prior post) to sustain several months of a ‘stand off’ in defensive posture. A key factor will be the ability to communicate with partnering family units that they may be called in to provide force rotation, deliver emergency supplies, or outright tactical relief against assaulting forces. The prior posts cover communications alternatives in a total outage of all utilities.

How can I protect my business as well as my family in a disaster?

Logical Emergency Response Plan Government Won’t Approve

The government has for some time now been turning up our ‘threat perceptions’ regarding emergency preparedness… taking us to levels of ‘concern’ not seen since the height of the Cold War and the Cuban Missile Crises. As discussed in the prior post of this series, we need to figure out what they are NOT telling us, and prepare for THAT, too.

Why should I have an emergency plan?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What can I do to prepare for any emergency?

What you will learn reading this post:

  • That there are kinds of disasters government is not talking about which you should also prepare for;
  • That some disasters are best addressed by preparations based on collectives of households instead of reliance only upon one’s own household;
  • That the nature of the emergency dictates how long the period of time of distress, which dictates what the emergency preparedness plan should look like;
  • That some considerations go well beyond government’s advice, and in fact would not likely be approved by FEMA, DHS, or the Miltary… because they want you dependent upon their help and mercy as a means of political control.

What should my emergency preparedness plan look like?

Government is EMPHATICALLY urging us to prepare

In the first part of this series, we talked about WHY you need an emergency preparedness plan and kit which goes beyond FEMA/DHS recommendations. Regardless of their true reasons for such urgent and dramatic advice — by all means, do what they tell you: establish an emergency plan centered upon a home emergency supplies kit adequate for the kinds of emergencies they imply are of most concern (fire, quake, flood). But do it smarter than that, and cover all the bases, including the far more serious and dangerous possibilities reviewed in the prior post. Here is how best to do that without taking on the whole burden of cost and logistical overhead, yourself. But I warn you, the government will not approve, so part of your plan should include an attempt at quiet preparation and concealment.

What should my family do in a disaster? 

Multi-layered Partnerships

Don’t rely on just my advice, see what officials  have to say say (click for Morrow County Health)

A single family household, no matter how well prepared, cannot fare as well as several family units banded together. So much the better when those units are either actual neighbors, or relatives who live not too far away (say, an hour’s walk or less). So if you do not have relatives close enough to meet the need, you should immediately be sounding out the viewpoints of neighbors on this topic (a simple way is to suggest they read this post series, and ask what they think) and cultivating relationships with those of like thinking.

Herein, a ‘family unit’ may therefore consist of any combination of actual blood-related families joining with single neighbors or childless couples who are not related, or may be made up entirely of unrelated persons with no core family, as such. A unit should ideally be in the range of three-five adults, but in an emergency, teens are considered adults. So where most units are single persons or couples, you may want more participating units.

Such a collective of family units, no matter how well each unit is prepared individually, can indeed far better survive a serious matter by their alliance. It makes it possible to spread the need for more costly specialized emergency resources over a broader group; some family units can be designated as special resource parties with everyone sharing the financial burdon.  This makes a superior readiness more affordable as well as eliminating storage restrictions which might exist, such as faced by a given family unit in the group living in an apartment.

In the next Part of this series, we will also see that an ideal partner might be deemed a special resource party because they own a gas station, grocery store, gun shop, etc.  Many such businesses, in fact, have some special strategic opportunities to consider, which will be the focus of Part III — but you get what I’m hinting at.

How do I prepare an emergency survival kit?

Key Decision Point Factors

Some circumstances alter both individual and collective needs dramatically and will need to be accommodated with detailed planning. The following topics should be fully explored early in organizing the collective, because they may dictate a need to add yet another family unit into the mix, or help define who is a special resource party and what that will mean for all concerned in a disaster event:

Talk about disaster considerations in terms of resource needs and response plans…

a)    Categories of disaster events to be considered (i.e., individual events such as fire, plane crash, etc., area-wide events such as flood or terrorism, regional or national events such as Martial Law or pandemic event);

b)   Level of availability of, or threats posed by damage to critical services supply lines; water, power, gas, telecommunications;

c)    Types of destruction of home and property (i.e., fire, earthquake, flood, assault);

d)   Levels of community-wide destruction and resulting third-party threats to home/property/resources;

e)    Transportation shut down or impedance to access to home/property/resources, or each other by third-parties;

f)     Impact of communications shut down vs. alternative solutions for the collective;

g)    Disparate location of individuals (i.e., at work, home, in transit, shopping, etc.) as might impact on reaction and hooking up post event;

h)   Estimation of self sufficiency of a given family unit before connecting with the collective;

i)     Estimation of time before outside helps become available, as will vary according to the above considerations.

j)     Fully review FEMA emergency guidelines and their pitiful performance in actual disasters such as Katrina, as well as the shameful role of military and police. In Katrina, they came for the guns and gunned down blacks to keep them in their own area. In Hurricane Andrew, the National Guard deployed a psychological warfare unit who set up detention camp-like relief centers and set up telephones which were 100% monitored by the Defense Department, and CIA, etc. You need to know what frightening provisions the government has made in preparation for total control of your lives ‘in an emergency.’

Such factors are most simply addressed by establishing multi-level options for individual family unit’s responsibilities to the collective, as well as event response. Each individual’s plan/options should deal with each such contingency, and consider where the individual might be at any given time (i.e., at work). Resources should be redundantly distributed over as broad a range of storage points as may be practical — a key reason for multiple family units. Examples of determinations:

a)    A family without good storage capabilities may need to focus on an ability to relocate or hookup with one who does;

b)   A family without good financial clout may need to focus on an ability to provide special skills or manpower, or deal with relatively low cost special resources such as communications or transportation;

c)    A family with inherent special resources already in place (e.g., owns a gun shop) will likely get a free ride, financially speaking;

d)   A family with many adult males will likely be the best collective leader, though clearly, other factors also come into play. Such determinations may vary according to event type being addressed, so a different family unit might be deemed a better leader or resource for one type of event than determined for another event. Military experience, for example, would be of great value for long-term, regional, or political upheaval events, but less important in a short or localized events.

Where can I get advice on emergency preparedness?

Term of Survival without helps dictates needs…

A key factor in planning is knowing what constitutes a minimum level of stored resources (emergency preparedness kit) per household for each event type, as well as kit content details. Again, distribution of resources will likely be required, and there should be some level of redundancy to accommodate the total loss of a given family unit’s houshold kit. More: because FEMA’s draconian powers extend to cover broad powers of confiscation, and by their wish is to control ALL MANNER resources, they deem HOARDING to be a punishable crime with significant penalties to include arrest.

Hoarding generally appears to be defined as no more than a week’s supply, but some things are even more tightly controlled, such as gasoline storage. So plan on hiding long-term reserves, and likely, on protecting your weapon’s and munitions in similar manner as well; gun confiscation by military is highly likely in a long-term event.Below find a minimum suggest level of supplies and their dispersal. Naturally, your own thoughts may yield improvements based on your own skills, location or environment (e.g., lakeside = boat), and availability of special items (e.g., scuba gear):

A)   Localized and single unit events will likely require no more than 1-3 Days of self sufficiency: Food, water (1 Gallon per day per person*), blankets, three changes of clothes each for normal and extreme weather conditions, three sets of rechargeable batteries for all devices, portable lighting, one flashlight per person, multiband radio, propane stove and 3 propane refills, sleeping bags, rainslicks, first aid kit, bagged clothing, and about $250 cash. Matches, newspaper bundles for kindling or insulation.  Local storage should be sufficient even in an apartment situation. Each person can keep a ‘go bag’ in their room, or at least a flashlight, if using centralized bag location, only. Regardless, the bathroom or other storage point for prescriptions must be raided along the way*.

* Each of the levels below can impact prescription and water issues negatively. It becomes increasingly difficult to store large quantities of water, and thus some form of water reclamation or source should be considered, as indicated. Prescriptions can run out in mid event and would be near impossible to refill, and it is difficult to obtain a long term supply, and even if possible, long term storage of many prescriptions may be a bad idea as drugs degrade with time and sometimes even become dangerous through chemical changes wrought by oxidation. Since some prescriptions can be dangerous if forced to stop cold-turkey, you should consider the side effects and warnings on each prescription to see if weaning off gradually might be wiser. Fortunately, Diabetic and other select medical problems rely upon supplies and treatments which can be acquired and stored for long term needs. A final comment: each person with a significant medical need should keep on their person a card citing such concerns, medications, etc., in case they become incapacitated and found by third parties. The card should include information on any alternate location the collective is using as the emergency ‘address’ if different than that on identification, as well as names of key persons to be sought out, which should likely include more than direct family.

B)    Wide area events may require 4-14 Days self sufficiency: Add one pistol per household and box ammo, and walkie talkies locally retained by each household. Globally augment food and water appropriately, and add a store of gasoline, axe or chainsaw, shovel, generator, rope, tent(s), hammer, propane torch, handsaw, nails, screws/eyehooks, canvas. Sewing kit, 1 or two GPS devices, hand-held multi-band radio scanner, water reclamation kit (and supply of filters), road flares, pepper spray, motion alarms, binoculars, $1,500 cash.  2 additional boxes ammo per household. Secure storage facilities are a must, especially for weapons and fuels, with no exterior access to unauthorized parties. One person must jump through gun registration hoops to acquire the gun, unless given them as a gift.

C)   Regional or national events could easily require 3-12 Weeks sufficiency: Globally augment Food, water, consider augmenting a base station home with defensive modifications*. Note that GPS accuracy may be downgraded by government action from 50’ to several thousand feet. Add 1 rifle w scope per family unit, 1 pistol per adult globally, 1 or more night vision device for guard duty/firefights, short wave two-way radio, surgical kit, hiking/fishing/camping gear, flare gun, wheelbarrow or cart, 1-3 pairs binoculars, $5,000 cash. 3-5 boxes ammo per weapon. It may be advisable to bury some items or provide external hard and secure storage site(s)*. No additional gun registration applications by secondary parties should normally be needed, especially if the primary purchaser applys for a Dealer’s permit, which can additionally allow purchase of fully automatic weapons.

D)    Longer Term events such as revolution or Martial Law, invasion – Base Station only: 1-2 Shotguns, 1 or 2 targeting lasers for tactical pistol use, 1rifle per adult w or w/o scope, 1 crossbow and sword per household, Seed bank, military survival/combat protective gear, welder, expanded took kit, block/tackle, smoke grenades, flash bangs, salination system if near seawater, still, bear traps (for perimeter defense).  25 boxes ammo per weapon. 3 dozen bolts. Hardware nuts/bolts kit.  Bolts can also be used to make spears. Burried and external storage sites much more important, to include off site and well hidden locations. Here is where you want to have dosimeters, Geiger Counter, and Potassium Iodide tablets in case of radiation concerns.

E)    Regarding Vehicle kits, all levels: spare ignition cables and parts, full set of spare fuses, serviceable spare and jack, snow chains, tools, 6 flares, 1 gallon water, blankets, first aid, 1 days food per person in family unit, 1 box ammo per type of weapon (pistol, rifle, shotgun), 6 bolts. Pepper spray, sand bag, matches, newspaper. First aid kit. External of vehicle, spare set of tires, anti-freeze, case of oil, two cans each of brake, power steering, transmission fluid, service manual for vehicle. Car alarm advised.

*In my book set, Fatal Rebirth, specific advice given on how to reinforce a home or other structure, conceal critical items, and other tactical considerations, including home-made weapons. You might want to read some books which specialize in such topics for an even better insight. Also included is tactical advice for possible conflict scenarios useful to militia or other armed defenders of the Constitution. A free ebook copy of Volume I is available by request to pppbooks at Comcast dot net. Learn more at

What happens if government does not respond quickly enough in a disaster?


Some people are better prepared than others…

These considerations, with a properly organized dispersal of resources among cooperative family units, along with a good understanding of responsibilities and event responses according to event type… assure a far better defense posture against the unknown than FEMA or anyone else in government would seem to wish, even to the point of their being the actual problem against which you must defend.

If guns are to be acquired in quantity, it is imperative that all adults (including teens) take firearms safety/operation and care classes for the specific weapons. Target practice and practice breaking down and cleaning, reloading, and dealing with jams are just as important. Self defense courses in martial arts are also advised: if a long-term event comes along, all manner of problems will originate from third parties seeking to take valuable resources from you by force. Be prepared to fight with skill, and thereby hopefully deter violence, or be prepared to die.

In Part III, we look at how owners of gun shops, grocery stores, gas stations, and other key resource businesses can be incorporated to both the benefit of the collective, and to assure the owner that their resources will have the best possible chance of survival without sack and pillage by looters, and possibly even withstand government seizure. It also better explains what is meant by the last point about who the enemy might actually end up being:  Gun Shops, Grocers, and Other Retailers Key to Survival in Major Disaster

What can I expect when a disaster happens?

The REAL Reason FEMA Promotes Emergency Preparedness?

FEMA and the rest of government seems quite paranoid about disasters of late, but clues suggest there are hidden reasons behind urging preparations — not the earthquakes, floods, nor fires they talk about. Conspiracy theories based upon dialogs by geophysicists, astrophysicists, and politicos seem far more likely the cause, and that puts a whole different face on what ‘preparation’ should involve and mean for you.

Why is government pushing emergency preparedness?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Can we really trust FEMA?

Reading this post series in three parts you will learn…

  • That there are significant reasons you absolutely should have an emergency preparedness program in place;
  • These reasons go well beyond natural disasters FEMA implies of concern;
  • There is a logical preparedness program that accommodates all concerns…
  • A program which should be considered by privately-held businesses as well as families:
  • It is NOT approved by FEMA, DHS, the Military, or other elements of the New World Order

What is the history of the emergency broadcast system?

Time was…

I very clearly remember the ‘Red Scare’ spillover from McCarthyism which translated to ‘fear the bomb’ in the 1950’s and 60’s… starting with the Eisenhower White House: Air Raid sirens were tested weekly or daily, typically at a fixed time of day as if a Church Bell announcing Noon. I was a teen during the Cuban Missile Crises under Kennedy, when talk of the day was the home Fallout Shelter, and at school, we had ‘duck and cover’ drills as often as fire drills. But the scare wore off by the 70’s, and sirens and shelters were no longer in vogue, though every downtown building tended to have a well marked public shelter.  Yawn.

Fast Forward, Bush I White House: For no visible or announced reason at all, the Emergency Alert System (EAS) and CONELRAD Radio alert system which had in evolutionary form driven those sirens for two decades was turned back on in the 90’s, and updated for improved use with TV. But rarely was it tested, and then typically late at night between late-show snoozes. Just fire drills at school. No more sirens, unless there was perhaps a fire or other actual emergency. Very unobtrusive. No problem.

Fast Forward, Bush II White House: Suddenly, somewhat synchronous with the formation of Homeland Security, these alerts started increasing in frequency and were randomly interrupting all manner of broadcasts at any time of day. They now had the ability to actually take over newer televisions, even if turned off or in use with a VCR at the time. Somewhere along the way, it was expanded to include hazardous weather condition reports and the AMBER ALERT system for missing children. Schools still worried about fires. OK. Well, perhaps.

What kind of threats should an emergency preparedness plan address?

The current threat assessment

What does FEMA think is different about 2013? (Click – from FEMA ‘resolve’ page)

Fast Forward, Sorento White House: Suddenly, and synchronous with DHS seeking to buy 1.4 billion rounds of ammunition (that’s several Vietnam wars worth), all over and above military orders… not to mention a long list of equally disturbing purchase efforts involving coffins, ‘emergency housing’ which more closely resembled prison camps, food and water stores, vaccinations and anti-biotics… numbering in the millions more often than not — the tests started increasing in frequency and in duration. Annoying. Suspiciously omnipresent, excessively foreboding.

What bothers me most is a synchronous rush request for proposals on delivery of emergency preparedness items and relocation and readiness orders to military to FEMA Region III (Atlantic Seaboard States near D.C.), all with a date of October of this year. In fact, much of FEMA’s promotional material is geared to 2013, specifically. Most of the darker things cited in this post are happening right now in 2013 or otherwise generally depicted as an immediate potential threat.

Worse, both DHS and FEMA have started multiple high-profile media campaigns suggesting we all need emergency kits and emergency plans. This is also all simultaneous to a bit of mainstream news and much suppressed facts being revealed on the Web regarding an approaching Planet X, approaching comets, several near misses by planet-killing asteroids, and a flurry of unusual meteor activity to include nuclear blast-strength explosions in our atmosphere (the Russian meteor injured nearly 2,000 people and caused significant wide-spread structural damage over hundreds of miles). And there is more…

Also simultaneous are geo-political and financial threats the likes of which have never been seen in the history of the planet, each threatening dire unrest to the point of forcing Martial Law. While this goes on, the sun is spitting gigantic record bursting electromagnetic pulses at us and the pole is shifting, Fukushima is continuing to increase its threat, not to mention shifting weather patterns and an increase in seismic activities of Biblical proportions. Dare I mention strange phenomenon like objects orbiting the sun, mysterious loud and scary sounds heard over thousands of square miles, two suns and other oddities in the skies day and night? Endless wars somehow always tied to terrorism and oil keep being announced. No wonder large numbers of people are actually starting to think End Times might actually be around the corner.

The end of oil supply as we know it indeed approaches. Extremist terror groups pose theoretical threat of biological, chemical, or nuclear WMD. Criminal nations threaten to attack us with nuclear weapons. China is on the verge of surpassing the US as super power, and their top military leader has said war with the US is inevitable; their only answer to that being to strike first.  Man-made bio weapons, nanotech, and even genomic weapons are being developed daily by all modern military powers, and we get cover stories expressed as worries of a natural pandemic outbreak of catastrophic proportions. The Center for Disease Control has even gone so far as to talk about preparation for a Zombie apocalypse, and there is some evidence it is not as tongue-in-cheek as they profess. Don’t forget chemtrails and the feared NWO depopulation plot.

Actual soldier patrolling American Street. UNACCEPTABLE! (click –

The worst part is all the talk about a possible military takeover, martial law, a new Constitution and a North American Union. Why, that’s nothing short of saying the Antichrist is coming to power… and some say that’s the case, too. Agenda 21, GMO crops, Codex Alimentarius, the Small Arms Treaty (goodby 2nd Amendment), etc.  All these things tie in one to another as if all by some organized conspiracy (Illuminati?) After all, they say, the Norway Spirals were likely a test of Project Bluebeam, to simulate with a kind of holographic event the Second Coming in the Antichrist’s name. And what about those tens of thousands of ‘State of Martial Law’ warning/instruction signs coming into the US from foreign sign makers in convoy manner? Really, really not good.

Almost everyone has some kind of foreboding sense that SOMETHING bad this way comes. Armageddon Online has a more detailed summary view. And just as someone chooses to discounts all of these things as ‘baseless,’ something like this comes along to make us wonder all over again: a lot of people are saying there is a purge of the military taking place, and that usually portends a violent overthrow of government.

So, quite naturally, some of us are taking the DHS/FEMA advice to heart, or at least considering it. But I fear most of us are preparing for the wrong thing in the wrong way. Its one thing to have food, water, medical, and key supplies stashed away for an earthquake or flood… and another to truly be prepared for upheavals of the political or Biblical sort… the sort government advice is NOT addressing, because if you were prepared for that, government looses the ability to maintain political control through dependency upon government for survival.

Never fear; the Professional Paranoid is here to help you find your way through it all… in part II:  A Logical Home Emergency Response Plan: The Government Does NOT Approve

Why should I hide my emergency preparedness kit and weapons?

On False Flag Zombie Attacks in July

When the CDC starts talking about zombie attacks, DHS buys more ammunition than God and calls out all Federal Agencies to prepare for (something) at 100% strength with two weeks notice… while a Zombie blockbuster movie scares our pants off… there might just be something to worry about.

When do Zombies act on behalf of National Security?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Federal zombies may be in our future

OK, this might be tongue in cheek. MIGHT BE.

Future Post Office Poster? From, a collection of more than interesting Zombiesque material (click)

But it is completely factual (scary movie music rises). I just saw a couple of video blogs (streaming Web radio) where one of my kindred spirits (translation: conspiracy theorist, or on a good day, as we prefer it, investigative reporter) was interviewing someone claiming to be in the know: DHS, FBI, FEMA, and just about every other agency, military as well, have been ordered to bring all manpower, reserves, and resources, to 100% capacity by July 3, and to stand by for further instructions.

I’m not comforted by the fact that ALL the search engines can NO LONGER FIND THIS WARNING no matter what I type in (it would have helped if some of the words were not in use in gazillions of other vids, too). Thing is, two days ago, it was EASY to find using the same words. Who has the power to do that? No matter. I’m on the job. A few ones changed to zeros in government’s Internet won’t stop me.

Note: This kind of censorship and information manipulation is one reason I formed to create a 100% citizen-owned-and-operated wireless Internet alternative where there is no ISP (no monthly bill), no government or corporate censorship, spying, or control: YOU are the Web!

In trying to solve that problem, I encountered something which revealed even more useful information than I was searching for. The CDC is apparently involved, too. We are talking about a terror drill involving a ‘fake’ outbreak of (something awful). Wince. Gee. What could that be? Well, I got to thinking. Recall the CDC warning about what to do if a zombie attack broke out?

Well, they claimed that was tongue in cheek, too. But I’m starting to wonder. Have you seen World War Z? Nothing seems far fetched after that! I mean… first CDC puts out the defense guide… then DHS buys enough ammunition to kill all the extras in WWZ (and every citizen in North America, with order quantities in Satanic numbers, no less)… not to mention enough coffins to take care of the half-eaten bodies… and now DHS, FEMA, FBI, the National Guard, (and CDC) are manning up for something very big.

And even if not Zombies… let us not forget that some guy named Kokesh (not related to David Koresh) is planning a ‘Million-man’ armed march on Washington, D. C. on July 4th. I mean… Damn! I don’t know what it means, but what I’ve more recently learned does not make me feel any better about, it all…

Why is terror drill set to coincide with Scout Jamboree?

Terror Drill Set for Scouting Jamboree

The orders for these agencies are to be at 100% by July 3rd, and then to stand by. Turns out, unless a cover story for a general Martial Law (you don’t suppose Kokesh is going to end up in a shootout with Feds, do you?) move to seize power by the New World Order, that there is to be a terror drill in Yellowstone during the Scout National Jamboree (July 15-24). But wait one minute; is it not true that at almost EVERY major terror event blamed on some turban wrapped, kidney machine toting, Koran spouting man with a beard… that there was simultaneously a terror drill of the same exact sort taking place at the same time?

Is that not the HALLMARK of a false flag operation? You create an exercise or drill on the same date in the same community for the same kinds of details (e.g., type of attack, type of target), and then, if the people really responsible (no turban, kidney machine, or Holy book) happen to get caught before they can pull it off, you say ‘It’s OK, they are with us, and everything is coolness.’ Where have we seen that used before?

A few places. The Sarin gas attacks in Japan. Sept. 11. The London Subway bombing. Bombing in Madrid. The Norway mass shooting. Even Aurora and Sandy Hook. Retired Army Intelligence Officer, Captain Eric May has said, “The easiest way to carry out a false flag attack is by setting up a military exercise that simulates the very attack you want to carry out.”

Are Zombies real after all?

Zombies on parade

Again, ‘tongue in cheek’ can only go so far to making one comfortable about the facts. Also while searching for the missing radio show links, I instead found some disturbing video — tons of it, in fact, which claim to evidence real Zombie attacks, including one faked ‘secret FBI briefing.’ But only one of these bothers me enough to deserve sharing, as it is a montage of real news stories that are quite shocking and, collectively, imply there are real people out there who are certainly acting like Zombies, and who are apparently quite hard to kill, too.

But that’s not the only disturbing thing about the video.

The second is found at the end of the long-winded (classified) reading of a (classified) Bill on the Senate Floor that (classified) seems to regard some kind of (classified) serious catastrophe, and what government is going to do about (classified.) At the very end, as if a causal afterthought of NO IMPORTANCE, the reader quotes, “and draft a NEW BILL OF RIGHTS.”

E X C U S E    ME?

A new Bill of Rights? What’s wrong with the one we have such that once this (classified) happens, it is no longer useful? To me, the ONLY scenario where that makes sense is if the country has become an official Police State under perpetual Martial Law, the result of a military (classified.) Well, let me tell you if I see even a hint of that taking place, I’m going to (classified) and (classified) and all of (classified) had better double their (classified). Even if they claim it was the Onion Congress.

Well, that’s all I can think of to say about something that is so far fetched and based on ‘less than mainstream’ resources. So I’ll simply leave you with the original video which started the whole thing off. I did find it. But I warn you, it is not the sort of thing I would normally care very much about paying attention to now days, given the veritable flood of such ‘sky is falling’ reports on YouTube.

However, I also remind you, in my book set Fatal Rebirth, and resulting screen play published on the Internet in 1999,  that the sky was going to fall in New York City, raining passenger jets upon the World Trade Center, and resulting in Middle East Wars. Some of us Chicken Little’s base our warnings on a bit more than conjecture. You can get a free ebook copy of Volume One, and see what else I’ve correctly predicted, and what things I’ve warned of which have yet to transpire.

It also behooves me to add, here, that as a specialist in privacy/security who helps targeted individuals and deals regularly with Political Control Technology… that I should mention that some estimates are that the government has created up to two million ‘sleeper’ agents using Manchurian Candidate mind control methodology. If true, we are talking about programmable people who can, with a simple text message or other signal, be launched off on almost any kind of mission with no recourse or understanding. Blindly obedient.

Such people can be made to believe any unreal circumstance, or believe themselves to be anything or anyone, and are often capable of exhibiting super-human traits (such as seeming to be bullet resistant). I’d hate to think about what would happen if a flood of such persons were unleashed thinking themselves Zombies. They soon enough would be, for all practical purposes. I’d not want to be in their warpath. World War Z, indeed.

Sorento Secretly Installing Total Surveillance Society

15 Terrabytes of data on every Man, Woman, and Child in the U.S., tracking every trip, call, text, email you make, every URL you visit, every purchase or financial, social, and political action you take, all to profile you so they can predict you and blackmail, jail, or vanish you if it becomes convenient. Welcome to Herr Bush/Clinton/Sorento’s Total Surveillance Corporate Police State.

But wait… I have a simple $7 SOLUTION!

The NSA is secretly establishing the Total Information Awareness Office!

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

This particular post is intended to serve as recap and extended explanation of key concepts covered during a four-hour radio show interview with Clyde Lewis on Ground Zero, Friday, June 7th, 2013.

What you will learn reading this post…

• The nature of a Fascist Corporate Police State as defined largely by cooperative surveillance and spying upon ‘client’ citizens.
• That the National Security Agency (USARMY) is secretly implementing the Total Information Awareness Office under Sorento despite its being banned as unconstitutional by Congress, originally a Bush-Cheney plan;
• The Role of RFID (Radio Frequency Identification Devices) and PROMIS back-door spy software in TIAO;
• That traditional redress of grievances no longer remain a viable remedy TIAO;
• How you can spend just $7 to thwart the $2.7 billion dollar spying operation.

How can seven dollars stop government and corporations from spying on us?

How Fascism defines a Corporate Police State

NWOlogosIn America, there is something called a Social Contract between government and We, the People; the Constitution and Bill of Rights. That document makes We, the People, clients to a government body who we employ to serve our needs for societal functions; to govern and provide for the common good and protection. That is a sacred trust as well as a contractual obligation to government to so perform, and the contract additionally provides mechanisms for redress of grievances when government fails to fulfill its duties properly.

In America, We, the People also enter into financial contracts with all manner of big businesses; banks, phone companies, Internet providers, health care providers, insurance companies, and more. These contracts obligate these firms to provide select services with a certain fiduciary and legal responsibility to adhere to simple, basic guidelines of operational limits with respect to the privacy and security of our personal information entrusted to them.

These limits are essentially the same in scope and detail as those provided for in the Constitution and Bill of Rights, though perhaps spelled out in different terms. We are talking about the right to protect not just the privacy and security of our person, property, and information, but the rights of redress, freedom of speech, and so forth. No contract we have ever signed with any major firm has forfeited these rights or provided firms with any form of blank check to violate them. But that is what has happened…

Both government and most major corporations have grossly violated and betrayed every one of these rights.

How can you spot a corporate police state?

A clue:  when both government and big business act in collusion to violate those rights, and do so under Color of Law (twisting or claiming legal basis, illegally usurping the ‘power’ to violate our rights) — you have a Corporate Police State, a fascist regime.

What defines a corporate police state?

Another clue: When the intelligence community partners with or invests in Google and Facebook (and on and on) and uses their Web technology to spy on you (and in some cases to target you)… when the intelligence community accesses without warrant your email and your phone calls through partnerships with your Internet Service Provider and your telephone company… when banks report to the government your financial transactions and your medical and insurance records are available to Internal Revenue Service-enforced insurance companies… you are in a Corporate Police State, a fascist regime.

what is a corporate police state?

A final clue: when the government seeks to catalog every single activity, transaction, and event in the life of every man, woman, and child, regardless of if related to business, personal, public, or private affairs, and then employs sophisticated methods to psychologically profile and predict the individual, including sexual preferences and ‘practices,’ and saves all such information for use against them should they become ‘politically incorrect…’ you have what is called a total surveillance society, which also defines a Corporate Police State, a fascist regime. Below, we will see that is exactly what is about to take place in a matter of mere weeks.

Welcome to Sorento’s Corporate Police State.

What is a corporate police state?

Why we no longer have redress of grievances in America

In just a few short months of Sorento’s usurping the power of a pre Magna Carta King (claiming for himself the power to murder a citizen or vanish or torture them without due process or explanation under the NDAA), we have learned of an endless onslaught of exactly such proofs of the true nature of our government’s form as reviewed above. Almost daily, we learn our Constitution means nothing, and there is no redress seemingly possible, save perhaps that of armed revolt, always a serious question, but also much easier to effect than imagined. Governments literally make their own gallows.

Our Court System is too costly and slow to reign in Color of Law mechanisms (unconstitutional laws, executive orders, etc.) used to suppress rights; they can write new laws faster than we can challenge them, especially since the offending clauses are buried within innocent legislation. Because our Congress does not even read the Bills it signs, and is so full of subversive New World Order types (members of the Council on Foreign Relations, the Bilderbergers, Trilateral Commission, Skull and Bones, etc., all working to end national sovereignty in favor of a North American Union under one-World leader), we might as well give up on any help, there.

Our elections are a farce, there being no true difference in the hidden agenda of the power brokers of one party or the other, who collectively decide in back rooms who we get to choose from on our ballots in a two-party Dog and Pony Show. We are always offered candidates who are both marketable based on ‘publicly declared’ beliefs and agenda, but who in truth share a true common secret agenda and darker beliefs. We can prove this; the darker policies of Clinton were continued by Bush and then continued yet again by Obama, and yet once more this posting proves it when revealing the TIAO project being secreted within NSA.

Should poor Barry claim yet once more, ‘I didn’t know anything about (NSA=TIAO) until I turned on my TV…’ then he will have no choice but to arrest and try everyone in Command at NSA for treason. No. Instead Congress should be talking about arresting them AND Sorento, and Clinton, and, likely, Bush, Cheney, and Rumsfeld. But fat chance of any of the above, of course, as there IS NO REDRESS remaining in America. The fix is in.

Our media is bought and paid for, owned outright by essentially four corporations made up of more power Elite Boards of Directors and controlling shareholders from the New World Order crowd.  The Internet is slowly but surely being transformed into something ever more friendly to spying, censorship, and corporate/government’s total control. There is an Internet Kill switch in our near future, as well as a tax on every use. However, the Internet is where we will find the seven-dollar cure, thankfully, as disclosed at the end of this Post.

Sorento has ordered 30,000 drones to the skies to spy on us. He is spending up to 5 million per city to fund installation of surveillance cameras, some with microphones. As previously described, he has been working with the top Internet Service providers (e.g., Comcast, Century Link, et. Al) to insure every email and URL visit is accessible to government. He has done the same with every major cell phone carrier to allow access to our calls and text messages. But he was still not done, and now we learn of one final straw designed deliberately to break our backs…

What is Total Information Awareness?

Total Information Awareness is Reborn: Remember the TIAO?

Now we learn one more truth which reveals the full horror of our true predicament: Sorento, in continuation of plans started by Bush, and continued by Clinton, is having NSA (National Security Agency) quietly build a gargantuan secret new surveillance monitoring facility in Utah, and a somewhat smaller one to expand the existing facility at Ft. Mead, Maryland… in order to quietly and illegally implement the Total Information Awareness Office mandate already outlawed by Congressional decree as an unconstitutional, immoral, and intolerable invasion of privacy.

The TIAO was a military concept proposed under former Secretary of Defense (under Bush I) become Vice President (under Bush II), Dick Cheney, and former Secretary of Defense (under Ford and Bush II), Donald Rumsfeld, and former operator of CIA/DOD’s Operation Phoenix (mass assassination program of civilians during Vietnam War), and convicted felon (5 counts of obstruction of justice and lying to Congress about his illegal activities in Iran Contra), John Poindexter, Rear Admiral USN, Ret., and former head of a CIA front involved in health care database management systems.

TIAO was a Defense Advanced Research Project Agency (DARPA) plan to track every ‘transaction’ of every citizen, just as described in the teaser at page top. A transaction is defined, according to the original White Paper and Request for Proposals which I have personally reviewed, as going through doorways, passing before cameras, making a purchase or selling something or any other financial transaction, traveling, undertaking a communication by voice, fax, data, or any other information access or exchange, even to include mail and public libraries. In short, TOTAL INFORMATION AWARENESS.

It managed all this, in part, by backdoor access to corporate databases via directly partnering with businesses or by covert use of PROMIS spy software developed by CIA and embedded at every opportunity within popular commercial database as well as custom written database management software. Since all major corporate Intranets (private corporate Internet-like services) rely upon a telecommunications backplane (PBX phone systems), and because every major maker of PBX equipment includes (by buried legislation) a receptiveness to special signal codes which allow covert remote access by the military, triggering PROMIS infected database back doors is a simple matter.

Note: This fact was confirmed to me directly by a highly placed technical expert working for Lucient Technologies, a major supplier of PBX gear; his explanation as to how government was able to access and effect surveillance of any phone extension or computer within the corporate offices where I was working at the time. He revealed that clients were not to be informed that these backdoors exist.

What is RFID? What are Radio Frequency Identification Devices?

The Role of RFID

Two RFID tags of the smallest kind. (click)

The ‘secret weapon’ component of TIAO was to be RFID technology, those little Radio Frequency Identification Devices which are currently everywhere: they are in your money ($5 and up – though debunkers claim they are merely polyester strips designed to thwart counterfeiting… but polyester does not explode in a microwave, though it will melt), in most newer credit cards, many drivers licenses, all Passports, shipping labels (and soon, postage stamps), transportation tickets, and almost any product you buy (soon, all products). If you have bought Gillette razor blades, Max Factor make up, Pampers, and any of thousands of other popular items from ink pens to computers from any major retailer, you have RFID all over your home and, likely, on your person.

Cash registers, bank tellers, secure access doorways, turnstiles, security cameras, and just plane hidden sensors anywhere can be modified to scan and learn the unique serial number of an RFID tag (which it reports upon radio command at distances of several hundred feet, and even through walls when special equipment is employed for the purpose). Once a tag is identified with an individual in a database, everything they do while possessing it can be tracked and cataloged. RFID devices are often large (I’ve seen as large as two-inches square in mailing labels) and easy to spot, but they can also be as small as the period at the end of this sentence .

Note: The tracking bioimplant, Digital Angel (aka Mark of the Beast) manufactured and sold by CIA fronts, is nothing more than an RFID tag with Web/Cell phone GPS technology added, a feature common to many RFID chips installed in cell phones (common to most new phones), watches, ink pens, ankle and wrist bracelets, and other devices intended to be tracked. The original part number of the first known RFID application to ‘track inventory’ was a Boeing Aircraft component with the number 666.

In fact, there is an insidious form of it known as Smart Dust, so small they can float in the air, and even be directed up or down on currents of air as if operated by a glider pilot. These (motes) are sometimes placed on persons of interest (one way: ‘air puffer machines’ at Airport security can ‘sniff’ for explosives, or plant smart dust in your hair and clothes). These migrate from person to person in general contact with one another, and permeate anything they might handle and any place they might sit.

Smart dust can do more than track, with select motes capable of sensing (some dedicated thing) and communicating one with another to act with a hive intelligence. This allows them to report information as if a more traditional complex surveillance system, triggered remotely by laser beams perhaps a mile or more distant.

The US Army can and can track RFID at select points along American highways, railways, and some waterways (esp., ferrys, bridges). This is a key tactical component of the Canamex Corridor which will serve as precursor to and lever for the North American Union. Combined with the other ‘transactions’ earlier cited, as well as feeds from security cameras and drones using advanced facial recognition, license plate readers, and other biometric and tracking methods, not to mention the full array of telecommunications signal capture, NSA can process bulk data without human interaction for analysis,  reporting, cataloging and storage, or undertake requested analytical tasks against specific targets, or sift through information to locate or focus on select targets by human analyists.

If you suddenly are deemed politically incorrect sufficient by almost any given person in the chain of command at NSA, the military, FEMA, DHS, FBI, CIA, the White House, or almost any other government power center, you could be quickly psychologically profiled to see what kind of targeting would best reduce you to a social, financial, and political zero, or to predict your every move in case it was felt you needed a visit by Men in Black for ‘special handling.’ That could mean anything from scare tactics to arrest and detention, to torture and vanishing by murder.

That was the TIA as originally envisioned, and it was so horrifying to anyone with an inkling of understanding of words like Constitution, Rights, Freedom, and America, that even our Globalist bought Congress said “NO!” But Bush, Clinton, and now Sorento have blessed covert continuance of the military plan. The new NSA facilities will become at some level, the de facto TIAO without so declaring, according to NSA expert, James Bamford.

This whole affair is especially significant in one way which is quite calculated and extremely dangerous to your family’s future…

What is less obvious but truly significant is that TIAO establishes the only difference between all failed despot-driven tyrannical rule-the-World attempts through history and what is taking place right here, right now in America. Specifically, the technological advances you have just read about might actually let them pull it off. All prior efforts failed because once the people understand their prediciment, they can elect to revolt, and it then becomes a wild-card battle with no way to guarantee victory to the despot. Too many people doing Lord knows what quietly and acting out suddenly without warning.

Once NSA goes online with TIAO, however, within a matter of Months (by this September at soonest), no activist, no gun owner, no politician, no law enforcement official, no judge, no news reporter, no person of wealth, no citizen, and yes, no criminal or terrorist, will be able to make a move without it being documented, analyzed — duly considered and potentially countered with quiet surgical attacks before the move can even be completed.

Yet — will they use this powerful tool to prevent terrorism or criminal acts, the sole basis for justifying the tool in the first place?

NOT ON YOUR LIFE. They will be used ONLY to maintain and tighten political control (why it’s called Political Control Technology of the Military-Police-Politico Force Matrix — as defined by the Revolution in Military Affairs).  They dare not use it for something as unimportant to ‘National Security’ (their definition being security of the people in power) as might be seen in a terror plot on a school or a city, unless it happened to include an attack on the President or someone key to the Power Elite.

To risk doing so would risk revealing the true power and capability of the TIAO tools, and thereby, risk full-scale revolt by those in the Military and Law Enforcement who still understand and obey their Oaths of Office. Besides, every terror or criminal act carried out empowers them to effect more political control; government benefits thereby.

I’ve already personally done more to fight terror attacks in America as a citizen than they ever will be able to claim by using any weapon of Political Control — though Bush took credit for my efforts as if his Administration’s own.

Therefore, NSA, via TIAO, will be able to pick us off one by one as we wake up and start to exhibit politically incorrect thoughts or take actions which do not serve or go along with the interests of those in control; the corporate friendly thugs running a fascist police state for the Globalist agenda.

First they will go for Anon and Anarchists, and you won’t say anything because you are not Anon or an Anarchist. They will next go for Truthers and 99% crowd, and you won’t say anything because you are not one of them, either. Then they will go for the rest of the Activists and Conspiracy Theorists, and you still won’t say anything. Then they will start to go for the investigative writers and newsmen, and lawmen, and politicians who do start to question, and you still won’t say anything, because if they can take them out, what could YOU possibly do.

Finally, when they come for you, no one will be left to say anything on your behalf.

What can we do to stop wholesale spying on citizens?

A simple $7 cure

Only you can prevent Fascism (click)

There are many things you can do. Make clear to your Congressman that you will not tolerate a secret TIAO and demand the NSA be reigned in, and (almost literally) NUKE the project in Utah and Ft. Mead; level it to the ground. Demand reversal of all post 9-11 legislation that deals with ‘terrorism’ by taking away our rights to privacy. Demand the 30,000 drones never reach American skies. Demand an investigation as to who really runs this country with the aim to kick Globalists out of government posts, starting with criminals in the White House and Congress. We need a political purge.

Become politically incorrect, question government, protest as a 99 percenter, Truther, or activist of some useful sort; be a functioning participating citizen! Make yourself heard above the rhetoric of a controlled media.

And one more thing, as I promised…

Spend $7 (or more if you wish) to join NNN OSP, the Nodular Netizen Network Open Source Project to create a 100% citizen-owned-and-operated wireless Internet alternative. Why? Because ONLY citizens make it up, there is no corporate ISP needed and thus no monthly fee. There is no government control or censorship, no government or corporate spying even possible; YOU are the Web!

If just five people join in each neighborhood, it is sufficient to assure its existence and success, creating a communications channel which is beyond NSA’s ability to access. In fact, the ONLY way government can access NNN communications is to go directly to the sender or reciever; the data does not reside anywhere else along the chain, and never passes through a government friendly corporate portal. And, once NNN OSP becomes popular enough, it will also support VOIP with Smart Phones and take away TIAO’s access to voice conversations, as well.

Visit to learn more.

There are many, many features and benefits not even possible on the WWW. There are even ways the NNN can make you money. Become the Web, TODAY… right this very MINUTE!

Once we have millions of members, the message may just get through… errant governments are superfluous to the Will of the People when they can freely discuss in private what they think about their government (or anything else). They will at last fear us as they should… as our Founding Father’s said it should be. Then, and only then, will they do our bidding, instead of the bidding of the Globalist corporate powers.

Can you afford NOT to spend $7 to thwart the New World Order?


On the North American Union and CANAMEX Highways

A road paved with good intentions is often made with dark things — in this case the subversion of the United States into the NewStates of America, a mere co-partner within the North American Union — all in turn as support of establishing a one-World Government over six or fewer such ‘unions.’

On the North American Union and Canamex Highways

by H. Michael Sweeney
copyright © 2009, 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included. This material originally from The Professional Paranoid Newsletter.

What is the North American Union?

What you will learn reading this post…

  • The reality of an impending North American Union will be understood;
  • The relationship of NAFTA, CAFTA, will be understood;
  • The existence of the Canamex Corridors will be shown and explained;
  • The Texas Canamex Corridor will be reviewed to reveal examples of just how sovereignty is threatened;
  • The Kansas City Corridor will be reviewed to reveal military-intelligence interests;
  • The possible ties to mass internment and disposal of US populations under Martial Law will be explored.

 What is the Canamex?


From NAIPN Web Site

This is an abridged version of a much more detailed article from the Professional Paranoid Newsletter. While it was written early in 2009, it remains largely current and especially useful to those who have never heard of CANAMEX in the first place. It appears, even now, to be more comprehensive than any other single Web resource on topic. To get a free emailed copy of the Newsletter with the full article, rich with numerous additional graphics, simply (one or more) comment, like, share, tweet, or rate this post AND email pppbooks at Comcast (net) requesting same and citing your action(s) taken.

Activism, after all, has two ‘I’s in it; ‘I’ believe strongly, and ‘I’ will tell others.

Note: Unlike most of my blogs, resource links are provided in Bibliography form at post end. However, it is extremely interesting that almost every single link no longer works, as indicated in red. A sanitization has taken place on topic since publishing my newsletter: in many cases whole Web sites have been taken down, in other cases, pages have simply been pulled. Only Lou Dobbs and Alex Jones have not been censured. Further, when you attempt to search for new links, the search engines conveniently focus on CAFTA and NAFTA, mostly, but I stand by the facts as I have reported them. Only my conjecture as to meaning is subject to reasonable question.

 What is the true cost of NAFTA/CAFTA?

The NAFTA/CAFTA doorway to treason 

This author has long warned that the NWO would not stop until the US Constitution was replaced with a version which would support a one-World government. The day of the NewStates of America is now much closer than thought, and there are now two avenues by which it may come, either separately, or cojoined. The first is foretold in my book set, Fatal Rebirth, which focuses on the use of false-flag terrorism to force Martial Law and suspension of the Constitution for the purpose. The book predicted Sept. 11 and resulting Middle East Oil Wars. Want a free ebook copy of Volume I?

Now comes a second means: the implementation of the Canamex Corridors under the Security and Prosperity Partnership (SPP), which are key steps leading to the North American Union and the Amero currency, for which everyone denies any such plan exists, just as they at first denied the existence of the SPP, which had already been officially embraced by President Bush and finally admitted to by the governments of Canada, Mexico, and the US.

It is complex. It is important. Frighteningly important, as the reader may soon see for themselves. Therefore, despite aggressive abridgement efforts, this is regrettably the largest single post I have ever made. KISS cannot be applied and well serve the truth. All facts herein are from official Web sites of key players involved. All images are from authoritative sources, mostly from the ‘enemy’s own official Web sites, some DOD materials, and Google Earth images. Some editing to direct the viewer’s attention to select unedited details has been undertaken.

Decades ago Congress approved NAFTA and CAFTA international trade agreements which many opponents described as opening the doors to loss of American sovereignty, not to mention millions of jobs and other forms of equally negative impact. These international agreements bind the US into subverting national and domestic policy to the will and needs of foreign trade partners under the pretext of promoting international commerce. Many protested the veiled goals which were actually intended to move the U.S. one-step closer to a governmental position suitable for establishing the North American Union, itself a step towards a One-World government…

NAFTA/CAFTA cost jobs, and worse, just as opponents warned, and the opposite of promises of what it would do. We were sold lies and as result have had to subvert our laws to conform to the wishes of our trading partners (lost some of our sovereignty) and to the detriment of our own citizens and GNP, trade deficits, etc. Little good has been made evident. Since then, focus of opponents and activists, patriots and outraged citizens, has shifted to try to find and stop whatever the next steps in the globalization of America and the world, were next intended.

It is only a matter of time, it seems, before all of the nations of the world will unite under a single banner. Not too long thereafter, comes a special day, a day called Armageddon. Thus it may prove true that the only way to forestall the end of the World as we know it, is to delay the NWO at every step along the way. A return to good Christian values and beliefs wouldn’t hurt in that effort, either, in my opinion.

What is the Security and Prosperity Partnership? 

The North American Union (NAU) and the Security and Prosperity Partnership (SPP)

For several decades, we activists and our friends have indeed long-feared the existence of plans for the NAU (North American Union), a New World Order goal indeed advanced daily by Globalist groups, especially the Council on Foreign Relations (CFR) and the highly secretive Bilderbergers. These groups are heavily membered and led by the power elite, such as the Rockefellers and Rotheschildes, and the Bush Dynasties, as well as players from the Military-Industrial-Intelligence-Media (MIIM) Complex. Now they come upon us, again, seeking to establish a regional governmental body consisting of (at the minimum) the United States, Canada, and Mexico.

And for decades, everyone in government denied there was any such plan, or a regular group event involved in the SPP. Keep in mind, that the North American Union would require the US Constitution to be replaced with something far less useful to citizens, but much more useful to the megacorps who would profit by the NAU, just as they did under NAFTA and CAFTA. But wait, it turns out the SPP is just the merest tip of a NWO tippy-toe iceberg.

The SPP attempts to marry the military-intelligence communities and the corporate needs of all three nations. It is attributed as the source of the CANAMEX project, which in turn even forms a defacto partnership between Globalst trading partners, the Red Chinese Army, and the U.S. Army, which in turn enables spying on citizens based on their purchases. These partnerships are odd to say the least, and the spying is due a neat trick, but the idea is ‘to share intelligence’ between law enforcement and purveyors of ‘National Security’ between all three nations being sold as a tool to combat terrorism.

Funny thing is, I don’t recall much terrorism in either Mexico or Canada, at least not the sort the America has faced. So I wonder what they really want to share, and why, since citizen spying is also mixed into it, somehow. Who do they really fear? This kind of combination of ‘Security and Prosperity,’ leaves me with a need to redefine ‘National Security’ as ‘Corporate Well Being’ — again sounding a lot like Fascism, to me.

Lou Dobbs (Lou Dobbs Journal) frequently televised critical views on the topic of NAU and SPP. Dobbs also calls it a tool of the power elite which serves only the corporate giants, and he has no problem making the point, especially since SPP is being ‘sponsored’ by more than 20 mainstream US Corporations to include everyone from McDonnell Douglas to Campbell’s Soups. Dobbs and other materials on the Web confirm the declared time line for implementation of Canamex was originally 2010. This goal was not met, thanks to activists, and to Senator Ron Paul’s Presidential election bid, and specifically to the citizens of Texas who have long opposed the earliest CANAMEX efforts in that key CANAMEX State.

How does Canamex threaten national sovereignty?

Loss of US Sovereignty is a one-way road

The Canamex Corridors are strongly supported by the CFR and Rockefeller’s Council on Americas, and similar round table groups both all three countries, and corporate coalitions who, through political PACs, adopt and pocket Globalist friendly State legislators who help establish official State positions favorable to the project. Even in Texas, however, there seems to never be available an actual forum for public debate, and government itself, though pushing through legislation laden with hidden language which supports the corridors, seems not to really know what is going on. That should be a warning sign. We are being sold out by deceit, yet again.

While even Senators still today profess disbelief and lack of knowledge (as most recently in the Presidential race, Mit Romney  said ‘Huh?’), there are already more than 30 Canamex corridors already defined by US DOT legislative funding of highway projects for nearly a decade, now. Of course, they don’t call them that, preferring instead ‘High Priority’ corridors, but when you map them out, they just happen to match the corridor’s talked about at CANAMEX friendly sites. Convenient coincidence?

What is highway project TTC35?

The Texas Canamex redefines Treason; it is called Bush


65 Counties impacted by TTC35,                               and 77 Counties under Martial Law

Even before Canamex was a formal concept, (it has yet to be presented to Congress), President George Bush had opened the borders to Mexican trucks, allowing access to American highways without traditional border stops or truck inspections, with more than 5,000 trucks a day (1.8 million a year) flooding into America. The Teamster’s Union would normally have the job of handling this freight, and objects on both the basis that American jobs are being exported in the move (excused as a NAFTA obligation), but also cites that the typical Mexican truck would fail US required safety standards if checked, a function of Border stops. But then, the exportation of jobs was always one of the secret goals of CAFTA/NAFTA treaties.

We look at Texas, in part because it appears that while Bush was the State’s Governor, he pushed for something called the Trans-Texas Corridor (internally described as TTC35) project. Mexican Round Table groups were lobbying hard at both state and national levels and followed the SmartPort method described a bit later, herein, to rally supporters and fund efforts, even bringing the Red Chinese into the picture. But the prime reason for our focus on it, is that TTC35 as defined by the Texas Department of Transportation would create a new superhighway (termed a supercorridor) forming a paved and largely impassable line vertically dividing much of the State into two distinct halves. This was no State highway for use by citizens at large…

Thus communities along the way which relied upon lesser state or county roads would be forced to pay for their own multimillion dollar overpasses if they wanted and could afford them, or loose all access to what lay beyond — short of perhaps an extra hundred-mile trip to gain a quarter mile’s travel. This would absolutely kill many communities and businesses which depended on existing roadways bisected by the project. Even some farms would be bisected, and financially ruined thereby. Bush did not care.

Presumably, Oklahoma and the rest of the states in its path toward Canada would yield to the method and follow suit, creating two distinctively separate United States territories (or 60 or more if all primary Canamex highways followed suit). That certainly would simplify regional control of populations in the event of Martial Law. Martial Law?

Note: edited out, here was material about both undeclared and declared Martial Law in 77 Texas counties along the corridor, thought to be a test of ability effect sudden control in event of something dire relating to the highway.

Of course, division of the entire nation on such a scale would be untenable. Even in Texas, it was to prove to be so. Nearly 600,000 acres of private land was to confiscated by Texas using Eminent Domain laws without paying a fair value for the property (normally, when a freeway is built, fair value is paid). Farms, ranches, and other properties divided by the highway would be destroyed, as it would be impossible for a land owner or livestock to travel between both pieces of their property in a useful way.

The corridor was intended to be a full quarter-mile to two full miles wide with plans for very few entrance or exit ramps within Texas. Whole communities would be literally walled off from the remainder of their county and suburbs, emergency services, and so forth. The most troubling part about such corridors, which provide both rail and road throughways, is that there would be absolutely no US Customs or Immigrations/Border Patrol intervention along the route, except at exit points designated for the purpose (why there were few exits, we must presume).


T DOT artwork TTC35: 12 Lanes: No waiting!

As the Texas DOT artwork shows, it would at points near exits have 12 lanes, half of which would be for ‘local access,’ and the others ‘non stop express throughways,’ plus multiple rail lines and power lines for needs along the way. The only other overpasses and cloverleafs planned were for select Federal and primary State highway intersects, some of which are CANAMEX branch routes.

In addition to all these concerns, many Web references talk about dedicating a portion of land in the Kansas City area to be a landing spot for trucks and rail cars from Mexico, which would be considered Sovereign Mexican territory: loss of US Sovereignty. Of course, government documentation uses the term, “Free-Trade Zone,” but language implies there would be no US authority present. This is even a problem for the TTC35 project, and any others like it which might evolve…

A Spanish holding company, Cintra (ever heard of AeroMexico?), under a ‘Comprehensive Development Agreement’ signed by Texas officials (find the actual document link on last page), would have been given the exclusive right to provide all facilities along the highway for rest, gas, vehicle service and repair, retail, and food. Incredibly, a guaranteed return on investment by Texas to the firm was to be included, which is effectively a ‘cost plus’ arrangement which insures over-budget spending in developing such facilities: a boondoggle in the making. This absolute monopoly would last for 50 years, and could only serve to inflate the cost of goods delivered through high take-it-or-leave-it prices to travelers.

In addition, and unbelievably, the construction of TTC35 was to be contracted to Mexican firms who were also a part of the Mexican Globalist coalition, using both Federal and State tax dollars to export jobs to another country. At no time would taxpayers have an opportunity to vote on the project or have a say so in the use of their money by foreign powers, which is another form of loss of sovereignty.

But it gets worse.

Any highway crimes or other criminal matters would not be subject to either Texas or US law! Instead, anyone with a complaint would need to file a grievance within the International Court System, as if that would be useful. Let’s see, I think that Interpol phone number is in my wallet, somewhere… There would therefore, by definition, be complete loss of sovereign control over US soil the full length of the highway. This is the Bush legacy, one intended we might presume, to be a model for the rest of CANAMEX in other States.

The Texas plans were never quite public information, as such. They were first exposed to the public by a grassroots action of a group and Web site called CorridoreWatch(.org), but thus far, the Governor and State of Texas have still refused to discuss the matter publicly, and media has retained their docile, blind eye in this mater, by and large. Regardless, the battle sparked by Corridor Watch would seem to have forced TexDOT and the greater CANAMEX effort to slow down and undergo a change of policy; to adapt existing highways instead of butchering the state and terrorizing landowners and townships in the name of terracorp profits. Regardless, the entire affair shows the brute force being applied under the banner of just the SPP and, dare we presume, the non existent NAU for which the SPP is simply a first ‘baby’ step.

Kansas City and Canamex

The Kansas City Corridor: Highway of Political Control