Category Archives: Uncategorized

A Private Statistical Review of Targeting Data

TI’s have many commonalities in the nature of their experience… but what if it was the TI’s nature prior to targeting which led to them being selected for targeting? This anonymous poll seeks to identify any patterns which might prove revealing.

by H. Michael Sweeney   Facebook  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

The common state and nature of TIs prior to targeting?

This post seeks to help identify how TIs are selected for targeting, and why. I write as one who has had personal contact with over 12,000 TIs over roughly 25 years, which has come to some understanding of the answer. But I also write in hopes it can help better my own general understanding, and more importantly, to help individual TIs better understand the true nature of their own targeting. Such information may even prove useful in TI defense, both tactically, and legally. For example, almost all authorities who should be available as helpers to a given TI end up instead presuming them schizophrenic and attempting to persecute them with forced treatment or other forms of harassment — to say nothing of possible in place assets being used in direct targeting.

Such knee-jerk presumptions may prove easier to defeat if we can show the presumed ‘schizophrenia’ is far greater statistically than should be medically possible, it being true that the illness strikes people randomly across the entire spectrum of human existence. If a given class of people with a common personal social circumstance (state and nature) are deemed dramatically more susceptible to the traits of schizophrenia, a logical person should be moved to begin to understand… there are technologies and methods which can cause simulation of those symptoms; mental illness is not the cause, after all.

We must start this dialog  by addressing two points: things already known to be common to all TIs prior to targeting, and the tactical reason or purpose behind the targeting, things which collectively tend to relate concretely to categories of TI abuse. As to the precise methods of targeting and types of technology employed, those vary according to the individual TI, their psychological profile, and many, many circumstantial factors which dictate the most likely path to targeting success. That does not impact this dialog, but all these things are tied together into a cruelly efficient tangled web of mental torture and, all too often, physical pain.

We must attempt to separate ourselves from any personal angst and calmly review the matter objectively, if to gain useful insight. First, I’ll talk about two basic traits which are common to all TIs irrespective of their individual situation or targeting purpose:

Known commonalities and reasons


Image: fair use manipulation of photos by Rosie Hardy (Flickr)

Prior to targeting, all rank and file TI’s, are either already financially insecure or in a situation where dirty tricks can render them so fairly quickly; it is important that the target be unable to launch a useful and costly technological defense or employ professionals who can do so for them. There can be exceptions in ‘blood line’ families or offspring which employ MK/Monarch type programming to create a dynasty of (actors, political leaders, financial giants, etc.).

The wealthy ones are unable to effectively defend because of their programming, which results in various forms of self-sabotage of the effort, which may in fact include financial destruction. Their programming and resulting sabotage effects the same handicap as not being wealthy. It is this author’s belief that Dennis Quaid, the end of the Hunts, DuPonts, and Hurst family/fortunes evidence this fact. I go into some detail on this (and all aspects of targeting, including defense) in my how-to book, MC Realities.

On the other hand, programmables who are were not wealthy, but simply part of the effort to create Jason Bourneish operatives for the intelligence community or in furtherance of MC research, can also end up being targeted if deemed ‘failures’… which are victims who could not be usefully programmed and deployed. They cost too much in time, effort, and money to simply dispose of them, and because research might find a way to ‘fix them’ at a future point, it is necessary to target them to make them seem insane. That way, should the nature of their being ‘broken’ lead to revealing their true history (programming), they will be ignored as being nuts. They can be corralled at any time for further MK efforts, if needed.

Another commonality to the bulk of TIs is some form of social isolation. That may mean they have a small circle of friends and family, or perhaps there is some existing strife underlying key relationships (i.e., significant others, relatives), especially if living with or in close proximity to them. Targeting almost always includes some destruction or sabotage of personal relationships for the same reasons as financial harms. It wouldn’t do for everyone who they know to both believe and to aid the TI against the perps.

No. One by one, all such allies tend to be alienated by one means or another. The inverse is true of the MK/Monarch. There, not one of their friends or family are not part of the perp circle; everyone in their life has been carefully placed there to guide them (misguide) to a desired state. Even their employment and choices of schooling, living space, etc., is predetermined such that they at least think it was their own decision, but their entire life is little more than traversing a spider’s web and being wrapped in its unescapable cocoon.


The purpose of targeting

Now to purpose. It is fairly straightforward. I usually only cite three basic types, but here, I’ll attempt to outline a broader spectrum and to show the subtle differences in targeting aspects and the nature of the TI prior to targeting, things over and above the aforementioned commonalities to all. I should mention that the general purpose of targeting remains constant regardless of type; to render the victim a social, political, and financial zero. The reasons for those needs and resulting emphasis can vary according to the type, however, as is seen:

  1. Guinea Pigs — selected for experimenting with new targeting technology/methods. An ideal candidate would be rather socially disadvantaged, an isolated loner, and it would be advantageous for them to have already had some documented mental health issues resulting in some form of professional care, with or without prescriptions. This more readily allows them to be presumed insane should something go wrong in the experimentation; they will be disbelieved when describing the matter, regardless of any carelessly revealed evidence;
  2. Training fodder — selected to insure the growing army of MC practitioners can be effective with minimal supervision. While it should be said that many perps are themselves MK/Monarch programmables, that is certainly not the only profile. Psychopath and sociopathic personalities are a favorite recruit, and it is important to insure such mental defectives do not run amok, and can exercise restraint. Because mistakes or over-zealous application is a significant risk in the training process, the same victim traits as Guinea Pigs are found common.
  3. Social engineering — efforts against select targets who are either deemed politically incorrect activists, whistleblowers, ‘troublemakers,’ or who are Christians. MC is deeply rooted in satanic principles and can be traced back to the Garden of Eden (in my book). One goal (thankfully seldom realized) against Christians is to get them to destroy their own faith. Rare is it that we find members of any other faith, lest it be Jewish or Muslim, all three being worshipers of the same God of Abraham. Even less common, do we find atheists, unless they be targeted for reasons other than social engineering. As for the troublemakers, the goal is again simply to make them seem insane, and quickly rendered a political zero.
  4. Social engineering — undertaken against society itself, by selecting failed programmables or mentally troubled persons who can be manipulated into acting out in some useful form, such as committing mass shooting gun violence, or other crimes designed to shake confidence in the very nature of our society’s political underpinnings, such as the 2nd Amendment in the cited example. There, are no other requirements for the victim. It is why, there are so many commonalities in these tragic news stories, such as having been in psychiatric care with psychotropics prescribed, but suddenly halted… almost a guaranteed trigger to violence, when combined with MC control.
  5. Joy riding — elected against targets selected only because the perp has decided he didn’t like the victim for some reason, or because of convenience (i.e., next door neighbor). This is undertaken by the errant and out of control perp on their own time, using what they have learned and equipment they have built on their own or stolen. More could be said about them, but does not serve this dialog. As to the victims, they can be anyone, though the joy riding perp will be careful not to violate any of the principles of selection herein described unless truly doing it for spite. If the perp is caught by superiors, the value of continuing the victim in targeting is likely analyzed as well as the value of the perp to the program. This will determine the future of both. The perp may suffer any form of punishment, retraining, or redeployment, and the victim may be released from targeting, or put into the hands of other teams, usually resulting in a marked change in targeting tactics.
  6. National Security — is here mentioned as a type, but except for extremely important whistleblower situations or programmables who fully escape control, it is unheard of among TIs. The traditional target in this category would be a true threat to national security as deemed by the intelligence community or those able to give them orders. We see an example of that in the news, today, where 16 U.S. Embassy members in Cuba have been hit with various DEW and psychological methodology by the Cuban government, likely using very old Soviet tech, or perhaps, their own internally developed systems. WE CAN NOW CITE THIS NEWS AS PROOF THAT MC TARGETING IS REAL; how can media and authorities cite it has happened to our diplomates, but deny it is happening to our citizens ‘because there is no such thing?’

Finding unknown commonalities, and verifying old

Our method here, is simple. A private and anonymous poll. It cannot track your identity, and uses SSL interaction common to things like bank transactions. I must ask that only TIs participate. Politically uninformed sycophants should please refrain from acting like a child; you might learn something by looking at the truth once in a while. We must also bear in mind we are talking about legitimate TI’s, only. Those who are simply mentally ill, the perp pretenders, and the social misfit pretenders seeking sympathy, may or may not, share some of these traits, and are excluded from the dialog, though we must presume many of them may non-the-less participate in the survey and skew the data to some degree.

With that in mind, I offer a series of questions. Consider them and the choices provided carefully before answering, please, and come back later to see results and, in time, an analytical update to this post to attempt making good sense of results. This will follow each poll in the set. I remind you, all answers are based on what things were like in the year prior to targeting first being noticed. There are sixteen different poll issues, so it will take a bit more than a half hour to complete, but should prove very interesting and worth the effort. If pressed for time, come back later.



How a TI’s Belief Structure Can Fail Them Dangerously

When TIs find their defensive or offensive tactics failing, it is likely because one or more key aspects believed true of their targeting is a falsehood deliberately created for them: the enemy knows you cannot win a war defending against tactics not in play, if it blinds you to those which are.

by H. Michael Sweeney   Facebook  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

What you will learn reading this post:

  • part of targeting includes misleading the TI into false beliefs about their targeting;
  • what constitutes authoritative proofs capable of revealing the truth vs. beliefs;
  • examples of common falsehoods held as true, including scams

The problem

In some 25 years, now, I’ve had contact with more than 12,000 targeted individuals according to my email list. Out of that number, I can count on one hand the number of them who had a correct understanding as to who their enemy was and what tactics were being used against them, and how to combat them successfully. So convinced are most TIs about such misbeliefs, that they often refuse to take advice that would work to better their stance, and instead continue to try things already proven ineffective. Worse, they might simply give up trying, at all.

a6c9413ecef98eb8a5f0859f13e352aa--advertising-flyers-mission-impossible.jpgTargeting is a psychological war, and one largely invented by and often waged by the intelligence community, who live and breath in a World where nothing is what it seems. If there is one thing they know how to do well, it is how to convince their victims that something untrue is true, and something true, is false. Their chief weapon is disinformation, and its ally among the foolish, misinformation. Disinformation offered and accepted as true, is spread rumor like as misinformation by those accepting it. This was, by the way, the heart and method portrayed in the popular TV series, Mission Impossible; a spy agency who typically got what they wanted by getting the enemy to believe in an unreal set of ‘facts.’

Their other primary weapon against TIs is the psychological profile, which tells the enemy exactly how their target will respond to a given circumstance, enabling them to create situations designed to cause a certain conclusive response which builds the false narrative. When things like street theater, surveillance technology, and other targeting methods are combined with the goal to mislead in kind, the victim has almost no chance to come away with anything resembling reality. The other victory this hands the perps, is that it makes it much easier to insure that the victim will be seen as mentally imbalanced by anyone observing or brought into the affair when seeking help. Knowing the enemy’s psyche was also part of Mission Impossible, the show always starting with a summarized dossier on the mission’s target and their weaknesses.

Among the most common falsehoods most TIs presume to be true, but which cannot be true, we find a laundry list of topics sold on the basis of technobable, false credentials of ‘authoritative sources,’ circular references, and a deluge of mantra-like disinfo/misinfo. Some effort will be made, here, to summarize, but first, we need understand what a true authoritative source is, and is not. Should any doubt my summarizations are valid, they must first find an authoritative source to prove me wrong, or they simply continue in the lie with no basis.


Authoritative information sources

One cannot well prove a case for targeting technology beliefs based on material provided by a targeted individual or mind control Web site, and certainly, not based on a YouTube or someone’s blog or post. At best, such is hearsay, opinion, or personal belief or suspicion. At worst, it is a complete fabrication, or based upon one. Don’t forget that some TIs are pretenders, some even perps, such that no personal claims can ever be deemed as proofs in and of themselves. The sad truth is, I’ve yet to see more than a handful of ‘proofs’ offered by TIs as to their particulars which would serve them in a court of law. Mind control sites seldom provide actual reference proofs, commonly citing other mind control sites or proofs shown herein as illegitimate. Circular references abound.

No. A credible proof must come from some outside resource which has no reason to be biased and itself be unaffected by targeting or disinformation/misinformation, and which can be backed up with citations as to the source of their information. I’m talking about things like patents, scientific papers, government records, news accounts, and good books by solid researchers of accredited note with usefully referenced footnotes, that their statements can be verified as factual. ONLY those things can be seen as authoritative and, therefore, holding a viable resemblance of truth and reality.

A warning about patents, however: patents can be filed based on imaginary or unworkable technology without proof of concept testing, and get by the patent office. I have some background in patent writing and patent requirements, and have seen such patents on file. Unless a patent relating to Political Control Technology applications is tendered by a major corporation, it would be wise to consider it carefully before making assumptions. The unworkable patents I’ve seen were by individual citizens, only.

Even so, one must be careful. Anyone can write a book or put up a Web site, make a video. In fact, a good deal of disinfo/misinfo comes from books. The best example would be books claiming to expose secrets of mind control by ex intelligence officers. No! No! No! No intelligence officer could safely write such a book without violating a Secrecy Oath or law such as the Official Secrets Act (U.K.) in a way that would get them and their books vanished. So I would never quote or trust a Barry Trower or Robert Duncan.

I do trust and have quoted from works of ex CIA agents, but only because their work was approved by Central Intelligence Agency as NOT violating any oath… because nothing they had written of had not already been reported in media or in the Congressional Record, or other public domain literature. The books were not exposing anything new, but merely confirming it in useful manner. In other words, they were not the true originating source, the opposite of a Trower or Duncan. I also know of one CIA agent who wrote and published an unapproved book, and he was hunted down to the point of exiling himself in Cuba. So how is it that Trower and Duncan are exempt?

So when you read a book, including mine, be skeptical and judgemental: demand good citations as to source. My books are heavily footnoted to aid in that judgement call, and typically include an appendix full of additional proofs. In fact, the third book in my proparanoid series, The Defensive Field Guide, is in part a collection of such proofs and citations in a form useful in dialogs with non believers. In such a use, everything within it is verifiable by the doubter.

And, when you base conclusions on a technical source, such as a patent or scientific paper, you must make sure you understand what you are reading, or do additional research until you do. Certainly do not rely on the conclusions of other persons with no credentials in the field, for they likely do not know any more about it, than you. This is a great source of misinformation, because technical papers to the non technical lay person can be read into any number of wrong conclusions. It’s like asking an atheist to interpret scripture, in a way; the translation will be quite flawed.

And here is a simple test: Google a given topic, such as Remote Neural Monitoring. If the returns features ONLY mind control related sites and the like, you are likely looking at disinfo/misinfo. For one thing, Google has a built in bias against ‘fake news’ which they define as anything contravening the ‘official line.’ The official line is that there is no such thing as mind control, so when all you get is mind control, its fake news they want you to have. No. If it was a real thing, you would have up front the ‘scholarly articles,’ news stories, and the mainstream view on topic… and THEN you might see some mind control sites and the like, as if some kind of discredited ranting from the fringe.

Another simple test: when you see a claim for a technology, IS THERE A LINK to THEIR SOURCE so you can verify the claim? Again using RNM, there are consistent claims it is an NSA technology, but NO ONE is providing links as to how they know this to be the case. With enough research, you find the claim originated from some guy no one ever heard of who claims to be a technologist, and HE (William Starrett) gives no link as to how he happens to know. He does provide a video of Snowden talking about SOMETHING UNRELATED and tries to fit it to his narrative; disinformation. There is another source, Russel Tice, who is another claiming to be an ex intelligencia (NSA) whistleblower akin to Edward Snowden. He, too, cites unrelated technology and relies on Robert Duncan, rather than first-hand knowledge. No thank you; disinformation.

And one final test: does someone offer some magical new age technobable gadget, glass bauble or jewelry, salve, oil, or audio they claim will cure/combat the alleged technology? This crap commonly pops up just as fast as the alleged tech, a remarkable feat given that we are typically five to ten years behind the technological curve, which means we don’t understand the technology even exists, much less how it works, and far less about how to defeat it. Do you really believe a $300 pendant with a picture of you as a child engraved on it will stop imaginary scalar waves?

xWhat distresses me about disinfo/misinfo is how easily it becomes everyday ‘fact’ amid the various TI groups and Web resources. Take, for instance, this image which is being used by several organizations and web sites, including PACTS (People Against Covert Torture and Surveillance) offered as proofs of microwave attacks, and microwave murder. Make no mistake, microwave can kill, and cause horrific burns if misused. But the image is not of a microwave victim, at all. It is a bomb blast victim from the Middle East. If you can’t trust the validity of one image or claim at a Web site, can you trust the validity of any found there?

Did you know you can search for images by dropping an image into the Google search bar? Try it sometime. Its a good way to reveal fake news and disinfo/misinfo.


Falsehoods thought true

The following is a summary of commonly accepted false beliefs. Not one of them has any factual basis not originating from the enemy. The right hand dangles a Scorpion about your face after the left hand conceals the poisoned spike used to make you think you’ve been bitten; anti-venom won’t cure the actual poison used.


No. Shared Vision is easy to simulate through excellent surveillance, computer hacks, and so forth. The belief is based on scientific papers and news reports, but they reveal the ability requires hundreds of implanted probes in direct contact with the brain by drilling holes or removing the skull cap, all directly connected to a room full of supercomputer. The alternative method also written of in hypothetical papers is to replace or surgically modify the eye to be bionic, complete with video transmitter. This would be a two-three week hospital surgical procedure and recovery. I think a TI would notice any of the above clues, but not one, has; no one is seeing through our eyes. These scientific articles have become the basis for false conclusions by people who fail to understand what they were reading. This is in my books, btw.


No. Same answer as above, almost identically. However, there is another way to simulate it which approximates the result. There is a documented V2S bio implant called RAATS which can intercept and decode your brain’s EEG signals which represent the 26 phonemes making up the little voice in your head which is you talking to yourself about (whatever), including what you are about to do. It is not mind reading, but it can capture the verbalized thoughts for like result. You can learn to suppress the voice, and foil it. However, it is also a two way system capable of V2S, and remains a threat. This is in my books, as well, as is how to thwart it. See also RNM, next.


No. This is a good example of misinfo, and disinfo (per previous dialog — there are zero authoritative sources). In addition, some TI’s have tried to misapply technical proofs without understanding what they were reading. Some cite brain to brain technology which requires a supercomputer and for both parties to wear a special helmet in a system which neither reads the mind nor is capable of controlling thoughts; it merely causes muscular reaction. Others cite a similar article talking about controlling a mouse’s motor functions wirelessly, based on light, but it requires brain surgery and again has nothing to do with mind reading, and only controls muscular response.

RNM has been further mismarried and confused with Neural Linguistic Programming. NLP is not mind control, as such, but the mere clever use of words/phrases to confuse someone. It is not technology, but a method employed by magicians to misdirect, and by quick change artists to get more change back than due them. However, it is a skill often taught to CIA agents or acquired by others as a tool towards getting people to cooperate. Elements of it are often used in interrogative procedures. It has no actual relationship to RNM other than a similarity in name… and any such relationship which has been assumed is, in fact, an example of written NLP at work to confuse.


No (and yes). Make not mistake, implants are real and often employed. I’ve had one, and it eventually came out on its own, rather a rare outcome. There are tracking implants, pain causing implants, and V2S implants (there are three technological ways to cause V2S, one of which relies on implants). I don’t mean to say implants don’t exist in TIs, but I do maintain many TIs falsely conclude they are implanted as a means to explain why their defenses against other (wrong) technology does not work. We must hope this is the case, because implants are very difficult to detect or combat (remove, kill, shield).

The problem is amplified by wrong beliefs about detection. Countless TIs become victims of scam artists claiming to find implants with cheap RF/EMF detectors which allow the moving of a finger to cause the instrument to ‘indicate’ the presence of an implant, when it is actually only sensing the movement of the finger. “That will be $50, please… do you want me to keep searching for another?”

Detection is not impossible, but RF/EMF is not emitted by most implants, and therefore, they cannot be found by cheap gadgets. Getting a professional with proper gear to scan and to tell you about it is typically next to impossible. X-ray and MRI scanner techs and doctors will seldom share the information, it being thought that they are taught in medical school that implants are a government tool to track terrorists, or similar. A good TSCM (Technical Security CounterMeasures) expert tends to balk at requests to scan, they are almost always ex intelligence agents and prone to not crossing their former employers. They also don’t like to do it because if they find none, they will be disbelieved and accused of lying, and payment will be refused, resulting in litigation. And, btw, they charge an arm and a leg, when the bill is presented.


No. Time was, when someone knew something they should not, became too annoying a squeaky wheel to the ‘system,’ or in some way threatened the plans of the powerful, they would simply kill them. But with the perfection of early mind control experiments post WWII, it was quickly discovered that the best way to keep those secrets (and any others) from being revealed, was to make the pesky risks seem insane. Mind control methods have replaced the ‘wet job’ as the way to deal with potential ‘trouble makers.’ There is now no need to kill someone, and in fact, a mind control victim has great potential as a resource for some future project use as a patsy, as guinea pig in new tech or methodology, or training exercises. It costs a lot of money to MC someone, and so, why destroy the person and the investment? This is one reason why membership in the TI community seems to be ‘for life.’

More than that, MC is all about psychology, and the greatest tool in the arsenal of psychological manipulations is fear. It is easy to make someone think their life is in danger, the ultimate driver of fear. Listen. If they wanted you dead, you would already be long dead. It is just that simple.

There is no profit in a ‘slow kill,’ because it would leave forensic clues that would endanger ongoing operations. Out of my 12,000 TI contactees, easily a third or more thought they were marked for death. Out of those thousands, only one actually died from targeting, and that was seen clearly as accidental and unintended consequence by the perps. Another died of organ failure deemed due to old age (nearly 80), but which was likely augmented by constant DEW. Perhaps a dozen others have died in ways which are reported as accidents (i.e., auto), but which the TI community embraces as murder. Another dozen suicides are blamed on targeting.

Suicide is the ultimate expression of giving up, the ultimate price of failing to defend against the real facts of targeting, and the final proof that the victim has decided to voluntarily give up God’s gift of Free Will and submit to the will of their generally satanic tormentors. When Cancer patients and quadriplegics can fight on and endure with dignity, why would anyone give perps that victory? Because they grew tired of defending against the wrong things with the wrong defenses.


No. This is a perfect example of technobabble at work. There are zero authoritative articles, certainly none which scientifically address scalar waves, which are alleged to disobey the laws of physics and attributed by some people as being employed in mind control.  The primary proponents and parties attempting via Youtube and Web presentations to ‘prove’ scalar waves (leaving more questions than answers) and tie them into mind control are often the same people selling $300 pendants to ward them off. It is a sham.


No, underscored. Some claim satellite DEW torture. Some claim RNM by satellite, already debunked, above. I’ll devote some time to DEW debunking, but I will admit to the possibility that satellites can potentially be used for area wide mood control or subliminal messaging, ONLY. You can in theory broadcast EEG signals and embed subliminal messages within communications signals. This is known technology such as used in Command Solo aircraft being flown every day over the U.S. and elsewhere.

This use of satellites is mere speculation, however, but I’d not be surprised. Command Solo flies training missions every day over US cities, and not even the operators know what is in the ‘training’ tapes being broadcast. The military has admitted the technology was used to sway Bosnian elections, and to cause Iraqi soldiers to surrender in droves, sometimes to small camera mounted drones. Given the number of butthurt Democrats who have waxed violent over the elections, it appears SOMETHING has driven a good number of people beyond the edge of acceptable and normal behavior.

Why DEW attacks are not possible by satellite: Any beamed energy, other than lasers, falls off at the square of the distance. A cell tower transmitter is good to about 2~5 miles with a relatively small emitter. At the height of satellites, the amount of power required to broadcast a microwave beam to earth and have it strong enough to penetrate buildings to hit an individual would likely require a power source far too large to fit in a satellite. Powerful land communications microwaves, broadcast at seriously high energy levels with a huge emitter, have a typical maximum range of about 40 miles. Satellites are typically some 22,000 miles high, or higher.

7327orig.jpgThe harder challenge is associated with transmitter size to handle that power. Microwave communications towers require transmitters typically in the range of 8 to 18 feet in size to punch towards 40 miles. To do fire a signal 22,000 miles would take units far too large to launch. But the bigger hurdle is accuracy, given that in order to maintain the illusion of insanity, you would not want anyone nearby to be hit with a beam (collateral damage). The best military grade GPS is accurate only to about 12 feet, which means a plus or minus error of about 10 feet for the center of beam, and the beam width would be much wider than was the transmitter. Bystanders many yards away, or further, would notice the same targeting effects.

But suppose it could be done? The next problem is cost and client (TI) servicing. A typical military or intelligence satellite can only target ONE client at a time. Given the size required for DEW targeting, certainly only one. Yet how many TIs think they are targeted by satellite? There would need be thousands of such birds, but there are not even one thousand satellites in total from all nations on Earth for all purposes, inclusive. Each satellite costs roughly a half billion dollars to launch, and about $15M a year to maintain, hardly cost effective when a perp with a modified microwave oven-style weapon can do the same job from a nearby building for a few thousand dollars a month.

What about availability? There are zero satellites in geostationary orbit over the United States which are not communications or weather satellites; the military and intelligence community only use orbiting satellites. That is another inefficiency for targeting individuals, because it would only be overhead for targeting for a few moments several times a day. How many TIs can claim targeting on a regular schedule that fits that?

Satellite targeting makes no sense either technically, or financially. It is a fantasy of convenience to the greater targeting movement fostered by Robert Duncan and Barry Trower. If people believe in satellite targeting, they will stop trying to learn the truth, and stop trying to defend themselves, as there is ‘no way to fight satellites.’

True: because they are not at war with you.


Smart Phone EMF App No Value to TIs

Targeted Individuals are desperate to find verifiable proof they are electronically targeted. Unfortunately, many turn to cell phone EMF meter apps… which are useless for the purpose. Here is the right way to do it.


by H. Michael Sweeney   Facebook  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

What you will learn reading this post…

• Smart phone EMF Apps don’t work they way you think;
• What will work for TI needs;
• The types of threats a meter can see, and cannot see;
• Some common false assumptions TIs make that impact understanding

Smart phone EMF Apps can’t ‘see’ targeting signals

Unknown-10.jpegSmart phones have built-in EMF (b) detectors, which some App makers have taken advantage of to simulate EMF meters. Not quite the same thing. Cell phone detectors are designed to measure the Earth’s natural DC magnetic field in three axis. This allows them to compare sudden changes to ‘compute’ movement of the phone for game interaction. NOTHING MORE, unless you are looking for a large buried iron-bearing rock; same technology as a metal detector, just less sensitive. The detectors can also be used in other Apps, such as levels and compasses.
To see targeting EMF and RF, you need a meter designed to measure RF and fields generated by 60 cycle electrical equipment, and the kind of EMF they generate. Such meters, unlike cell phones, are intended to be aimed directionally at a given source; they can show you where a signal originates. This is perhaps the best reason to own one. Some are type B (preferred), and some are not, to make them cheaper, and somewhat less useful.
Preferably, it should have a very broad band of frequency sensitivity, because there are many kinds of targeting tech, most of which can generate symptoms which mislead the victim into false presumptions about which kind of an attack they are dealing with. A meter with a broad band can better define the type of attack correctly. Unfortunately, low cost meters will not see bands broad enough to deal directly deal with or identify microwave the way a TI would like. Some meters, such as those mentioned herein, can still read and quantify their energy, however.

You have to know what you are looking for

You must choose your meter based on the kind of attack(s) you suffer. You can’t scan for an attack which does not exist, either because you think its one kind of attack, but its another, or because there is no such technology in play. The real problem is, that very few TI’s actually know precisely what kind of attacks signals are levied against them… save V2S and microwave burns, which are pretty unmistakable. Out of 12,000 TIs I’ve dealt with over several decades, I can count the number who correctly understood the technical truth of their problem on one hand. And  there are several reasons why that is true.
For one thing, many symptoms can often be the same regardless of tech employed. I break symptoms down in my book, MC Realities. For another, the enemy will invariably seek to insure you get it wrong, by leaving false clues or having fake TI personna give you bad advice, and by employing professional dissinformation methods, to include phony retired intelligence agents who ‘come clean’ and ‘expose’ the technology. Never happened. They do this because they know you can’t fight them if you respond with the wrong weapons/methods, and because it makes you look insane to professionals from whom you might seek help (i.e., Cops, Lawyers, PIs, Doctors). Then, well meaning TI’s spread that disinformation as gospel, and muddy the waters further with their own versions. Here is a great example:
A lot of TIs think Remote Neural Monitoring is an attack tech that reads their mind or puts thoughts into one’s head, or that it has something to do with satellites, and fully a half-dozen other things it does or relates to. The Web is awash with countless pages saying RNM is mind control of this, that, or another flavor, but not one of them is an authoritative source citing the truth. NO, it is not, does not. RNM as a term relates to nothing a TI ought worry about, at least currently; it is based on use of a room full of super computer power directly wired to countless electrodes physically attached to the head of the subject, and does not directly read thoughts. It instead catalogs the brain wave patterns ALONG WITH the user’s verbalized thoughts.
Subsequently, the computer can then compare brainwaves against known thoughts to find matches. It cannot put thoughts into the user’s head, and it hardly qualifies for field use against unwitting persons as political control technology. Some efforts along this line have also managed low quality video depictions of what the subject was seeing. In order to do that, they had to remove the skull cap of the victim, a Cat, and put over 1,000 probes directly into the brain, causing the Cat to die fairly soon afterwards. The term RNM has been misused and spread by TIs mislead by disinformation or persons who did not understand what they were reading in a scientific report, or description thereof in media. The term RNM was never even used in the scientific papers, but popped up in a news article summarizing the paper. From there, it was hijacked to become a fiction.
Note: there is ALSO a patent often cited as proof of RNM, even in other patents, and in books by disinformationalists — which would SEEM to be as claimed, and which is the basis for ‘satelite targeting’ claims (along with ‘exposed truth’ by ‘ex intelligence types’). But in fact, the baseline patent, as well as any relying upon it, are bogus, in that it/they cannot work as described. It must be presumed the patent office took their word for it; if the reviewing staff at the patent office were not technically up on radio frequency technology, they might not have spotted the flaw. Patent #US3591134 A Apparatus and Method for Remotely Monitoring and Altering Brain Waves… essentially beams two radio waves at the brain, and expects the brain’s own radio frequencies to be modulated onto the them, and then captured by a radio receiver for processing, analyzing, and optionally then modifying and beaming them back yet again into the brain to alter thought.
CAN’T WORK: radio waves don’t modulate one another. If they did, all radio waves would carry the signals of all other radio waves, and AM/FM radios would not work, they would be confused. Modulation is achieved by electronic circuitry BEFORE broadcast; exactly what AM and FM radio does; audio is modulated onto the broadcast frequency, and decoded in the radio. If this patent, and remaining patents based upon it actually worked, they would be picking up not only the original signal, but modulated signals from every radio signal out there, and every brain within range, and be unable to separate one from another. Exactly this protest has been made on this patent, and the patent is no longer in force. It is presumed someone thought they had a great idea, and patented it without proof of concept, because they could not afford to develop working prototypes, and in hopes someone who could afford it, would pay them for patent rights, to do so. The same is likely true of the patents based upon it. Who knows? Perhaps the patent was actually itself a disinformation effort.
And while we are on topic, satelite targeting also does not exist, at least not the way most TIs believe. A Satelite is too expensive to target an individual, for one thing. To do so, it would need to be tasked, taking it away from other duties. No TI is so important to justify billions of dollars in hardware just on them, especially given the number of TIs who so beleive. More importantly, its simply not possible. You might be able to broadcast subliminal information or EEG entrainment signals to the entire service area of a Satellite, but not an individual, unless the individual had a satellite dish and decoder built into his head to isolate signals meant for him, alone. Moreover, a satellite could never read an individual’s brainwaves unless the he had a very LARGE and specifically aimed dish in his head.
If a TI were to worry about mind reading or having thoughts put into their head, such does not quite exist, though it can be simulated such that the target presumes it so. That requires an implant, and is not likely to be easily discovered with an EMF meter. All it does is read your brain’s EEG signals for that little voice in your head, which is you talking to yourself. That voice is also used by your EGO to cause you to react badly to stimuli. An implant which reads your brain’s EEG signals representing the 26 phonemes used to make up words can relay that by radio to a computer which can translate it to text in real time. The operator can then respond if desired via the implant using incorporated V2S ‘bonefone’ technology, or perhaps, simulate your own internal voice making you think ‘you’ thought that thought. There is no information or evidence suggesting the later capability exists; it is mere theory, but it is plausible. This implant is known and documented technology.
From my book, MC Realities: I direct you to a Dec. 18, 2000 article from the Albany Times Union, by Andrew Brownstein — a piece entitled University of Albany Suspends Mind Control Implant Research Project. This reveals current working capabilities are well beyond those demonstrated thus far. Excerpts begin — as dramatic a smoking gun as I’ve ever seen… “The University at Albany, N.Y., has shut down a research project investigating the claims of individuals who believe that they were surgically implanted with communications devices which can read and transmit their thoughts. Professor Kathryn Kelley, a fully tenured psychology professor at the University at Albany, has focused her work in recent years on surgically implanted mind control devices. A brief statement released in August by university spokeswoman Mary Fiess said, ‘The university imposed the suspension [of Kelley’s research] because of serious concerns that the experiment did not meet the standards governing such projects on campus. While we work to gather all the facts in this case, we cannot comment further.” …In 1995, gunman Ralph Tortorici held a class of 37 students hostage at the University at Albany, claiming that the government had planted microchips in his body. Tortorici, who shot one of the students during a struggle, reportedly hanged himself in his state prison cell last summer.
In spring of 1998, according to the Times Union, the university’s Psychology Department first became aware of Kelley’s interest in mind control technology when she posted a note on her office door announcing a lecture called ‘The Psychology of Invading the Self.’ The note reportedly described implant research funded by the National Security Agency and the Department of Defense with an annual budget of $2 billion. The note stated the devices were typically implanted in ‘uninformed, nonconsensual subjects” who were usually ‘federal prisoners and political dissidents.’  The newspaper has since had the article disappear from their files, but other newspaper articles reference the event, which is where I obtained the image.
But there is also an attack tech somewhat similar to RNM’s claimed methodolgy which does not use an implant: EEG entrainment. It operates in the ELF (Extra Low Frequency) RF spectrum at brain wave frequencies, typically 7-15 Hz. This is the tech used to control your wake/sleep/alertness and moods, by sending brainwave patterns as radio signals stronger than your brain’s, causing the brain to ‘adopt’ them. Very few EMF detectors operate this low, and so, are not likely to be able to document such use. I have one, but I had to pay $12,000 for it… and for that money, got a lot more functionality, as well.
At the high end of the spectrum, microwave energies used to cause pain and other dirty tricks can operate beyond the UHF frequencies, between 3 and 300 GHz. Cell phones and wi-fi systems operate in the single digit GHz, but attack signals tend to be somewhere above 6Ghz, and well into double digits. Military systems can be over 50GHz, and into the hundreds. Again, low cost EMF meters cannot ‘see’ these higher frequencies, typically stopping at 3GHz. My $12K system can see to 12GHz, and is therefore still inadequate for all situations. But many meters, like the Trifield (.com) can at least see the ENERGY put out by such systems, and can therefore still be useful to know they are in use. They just can’t specify the frequency involved.

How you use a meter is important

You should hold the meter flat looking down on it, and aim it at a suspect source. Stand and rotate rather slowly to find hot spots which represent suspect sources, for closer study. Move in on these — the closer you are, the more accurate and higher the reading will be; RF energy readings normally fall off at the square of the distance. Learn more about meters, use, and related issues not covered, here, from this earlier post. It includes, for example, information about stray voltage, smart meters, and relates the importance to a TI of EGO in the matter. Some information in that post is duplicated, here, to insure it is not overlooked.
TrifieldMeterI very much like and used to sell the TriField — get the cheaper one, the more expensive one is trickier to use by a novice. I also used and sold the MicroAlert, same source, because you can set it for an attack threshold and it will automatically sound an alarm (pulsing beeps). When I was under attack, my bird actually learned to ‘beep’ back at it, it went off so often. Had to move the bird so I wouldn’t get the two confused; at that high a pitch, I couldn’t tell the source direction.microalert2
Don’t aim meters upward unless there is something there you find suspect; the sky is full of RF energy which will invalidate reading usefulness. Take a reading of the suspect item and then compare by aiming at the same upward angle elsewhere, and subtract that reading to get the difference, which is the actual number of concern. Again, get as close as you can.
Keep your fingers away from the business end of a meter, or your body will alter the reading. This is the trick used by fake implant finders. They choose a meter that has an audible threshold alarm like the Smart Alert, but fancier and more technical looking so they, as ‘experts,’ seem ‘smarter and more capable.’ They set the threshold such that they can move a finger set it off on cue, to ‘find’ an implant. “$50, please, shall I continue looking?”
The truth is, meters are hardly useful to find implants. Unless the implant is broadcasting a radio signal, it is not seen at all. If it is broadcasting, it will be extremely difficult to find it while transmitting for numerous reasons, and unlikely unable to tell the implant signal from ambient RF, much less locate it on the body with any useful accuracy. The best way to find implants is with an MRI whole-body scan, but the trick there is to a) get someone to do a scan for the purpose, and b) get them to tell you they found something unusual. The medical community is not friendly to TI issues any more than are Police — which is to say, they will more likely send you to a psychiatrist for help.
RFMeter-HF35C-L.jpgIf you want to find perp attack sources at distance, spend more and get a meter that accepts or includes a Yagi antenna, which dramatically narrows the angle of view and increases sensitivity at distance (again, signals fall off at the square of the distance). Where the meters mentioned above are well under $200, a meter such as the HF35C (German made: Gigahertz Solutions) with Yagi will tend to start at just under $400, but will be limited to high frequency ranges, only, and will STILL not see well into the microwave bands. So if you bought it or something as good, you should likely also get a TriField or similar, for lower ranges.
Note: Almost always, an attack from distance will involve use of a Yagi system by the enemy. If you use a Yagi, your accuracy in angle of view may be good enough that you can use binoculars to spot their antenna. Scan the whole page of these examples of Yagi, and if you EVER find one of these directly aimed at your home, it is almost guaranteed to be an attack device; no such antenna should be aimed anywhere except at a radio/TV or Wifi broadcast source. They might just be after your wifi, but that is still an attack on you.
In such a case, if you can get eye-witness or video document high RF coming from it, you have potential legal-quality evidence of targeting. Increase the usefulness in court by getting an RF expert to agree in testimony that it is a dangerously high reading, and ideally, to covertly himself identify its frequency and strength with more expensive equipment.
The cheapest way to get a higher microwave readings is still over $1,000; The HFW59D, and you are still limited to 10 GHz. So you see that cost vs. performance into the higher GHz is quite a bell curve. But once you get much beyond a thousand dollars or more, you start to get into actual signal processors, and they tend to have a lot of useful features, such as data recording, safe level warnings, time/date stamps, computer interface, and so forth. And while those things are nice, they add such a complexity that even I balk at the notion, and I’ve taught digital electronics I and II at college level, and developed microwave-based security systems. I keep coming back to the TriField as the best overall low-cost single device solution for TIs at large.
Be aware that there are ‘toys’ on the market which can look like better deals. I’ve seen a $129 meter claiming 8GHz, but it turns out to be nothing much more than an old cell phone using the signal strength indicator of the cell phone, and is non directional in capability; you can see the signal, but can’t tell where it comes from. You can spot this device, because it uses the old stubby cell phone antenna, instead of an actual EMF sensor. I would avoid any device using a cell phone antenna.

Why am I Being Targeted? A Valuable Question for TIs

Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.

by H. Michael Sweeney   Facebook  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
What you will learn reading this post:
• there are three primary reasons why TIs are targeted;
• knowing which it is can result in better defensive/offensive strategies;
• it is possible to discern the difference in many cases;
• there used to be a fourth kind, but what it really is will surprise you.

The way it is

Of the 12,000 plus persons reaching out to me over the last two decades because they were being targeted with some form of Political Control Technology (PCT), almost without exception, the first thing asked is ‘Why… why me?’ Naturally, there are endless other questions which are also asked, all of them seemingly unanswerable, and all of them deeply troubling and part of the psychological mind games which are inherent in all forms of mind control.
27419003986.jpegThere were three or four possibilities, and the best answer which could be offered up front was simply to cite those reasons, a generic answer which lead to no peace of mind, and which usually lead to even more difficult to answer questions. And yet, to get to the bottom of things and mount a viable defensive/offensive strategy, such questions needed to be answered; you cannot fight a problem you do not understand.
This is why targeting tactics include significant effort into misleading the TI into thinking all manner of incorrect facts about their targeting. Out of the 12,000, I have only ever encountered perhaps 4 who truly had it right. Defending the wrong problem results in failure, amplifies the power of the mind games through frustration of defeats, and sets the TI up for looking insane (or even driving them to that state), almost always another goal of the targeting, the very means of neutralization, and the best measure of success.
And so, in order to get those answers, I established my free Helps Kit (, and its use, in turn, enabled me to offer a variety of for-fee consulting services aimed at formulating appropriate combat tactics. In almost all cases, even if not electing my services, the Kit lead to some improved understanding and ability to withstand targeting. The services almost always amplified that result, and in all-too-few cases, enabled a complete stop of the targeting, usually with some form of remuneration or compensation to the victim through what I term a ‘blackmail insurance policy.’
So YES, it is right to ask why. So let’s look at the generic answer, and see where it leads us.

The Three Answers

I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.

1) the actual intended use is ‘political,’ which translates as any form of disapproval of the TI which may require punishment or neutralization short of an assassin. Whistle blowers or potential whistle blowers, cult members evicted from, or who quit the cult, etc;
2) ‘experimentation’… extending the state of the art;
3) ‘training.’ Guinea pigs for trainees are targeted in order to achieve across the board predictable efficiency.
What we used to perceive as a fourth reason was sometimes called ‘Joyriding’. In truth, if falls into experimentation, but not upon the TI — upon the perps. Actual joyriding can take place… the unauthorized used of tech/methods for personal gratification… but more than likely, to the abuser, it is in the realm of ‘political,’ to
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
93d5bea6cce0329abcf9fc97431684c0.jpgMany perps are themselves TIs, either actual mind control victims or persons (typically sociopaths or psychopaths) who are put into experiments to see how THEY react in a perp situation based on THEIR psychological profile and the specific circumstances of the TI-to-perp interaction/response cycle. In fact, the TI is almost superfluous to the equation, once their suitability has been determined (their profile), and considered a consumable and expendable item in the project — though controls exist to prevent such harms as might result in Police investigations which might defy cover up arrangements.
An easy example is the infamous Yale experiments on authority conducted by (presumed CIA) Psychologist Stanley Milgram, ostensibly funded by CIA under MK-Ultra. There, volunteer students were given the choice of playing teacher or student roles in what was described as a learning experiment, with an observer who was authority over the ‘teacher,’ who was de facto authority over the ‘student.’ The teacher would test the student and punish wrong answers with an electrical shock, increasing the voltage for repeat errors. There were lies in the mix which changed the reality to something else, but in the end, the observer would instruct the teacher to continue the increases in voltage to the level of lethality.
In that study, those playing student were not real student volunteers, but paid actors, and no one was actually being shocked or harmed. But a similar study by Professor Phil Lombardo, the Stanford Prison Experiments, resulted in actual sadistic violence so troubling that it had was made into a motion picture. There, everyone was being studied, but the guards believed only the prisoners were being studied, so the core experiment was focused on them. This experiment, too, is thought to have had government backing of some sort, as this was in the days of COINTEL and COINTELPRO operations by FBI and the U.S. Army under Nixon, a program thought enhanced and behind much of today’s targeting of citizens. In any event, it had been ‘blessed’ by the American Psychiatric Association, which at one time was headed by former CIA mind control scientists (like all such organizations).

Knowing the difference can alter TI tactics

 One needs to fight the right problem. So it is critical to know which reason applies. There are some general defenses which can be used regardless of the form of targeting, but there are also specific defenses which in the end, are likely more productive. While every TI’s situation and circumstances can dramatically impact on exactly HOW to effect such defenses, and especially offensive responses, what follows below are my ‘generic’ answers which are, unfortunately, somewhat simplistic in description. A TI should be very cautious in experimentation trying to find the best way to implement a given solution.
The key most generics which apply to all reasons for targeting, are a bit more straightforward. Chief among them is to increase site security (i.e., pickproof deadbolt on a primary entrance, all other entrances secured such that only breaking and entering is an option — which perps don’t like to do because it leaves physical evidence in support of the victim’s claims of targeting). That can also mean use of video security monitoring systems, security lighting, and so forth. I am not a fan of monitored alarm systems (most such firms have intelligence community ties), but I do like off-the-shelf component alarm systems, perhaps with online monitoring by YOU.
Another generic tactic is to Stop, Think, then Act, instead of simply to react. Instead of reacting to a targeting stimuli or event, STOP: Think about what they want or expect you to do in reaction, and instead, Act (as actor) in some random contrary way. They use your reactions to gauge effectiveness of their methods, and methods are calculated based on your psychological profile. Acting, done believably (don’t over act, don’t elect a totally absurd response) can screw with them in ways which sees them doubting both their methods and the accuracy of your profile, and cause them to retreat to square one, reducing your trouble and giving you a rest period. However, before that happens, you must brace for increased attack levels, until they accept that something is truly wrong.
And, of course, I also advise at least the first two books in the Professional Paranoid series. The Professional Paranoid gives how-to advice with respect to traditional targeting, which is always part of PCT targeting. The second, MC Realities, gives how-to advice about the PCT variety. The third book, The Defensive Field Guide, is simply a compendium of references and resources, primarily educational and especially useful as ‘proofs’ when trying to convince non believers that the technology and history of its use by government is real. Learn more about my books, music, and videos on these kinds of topics using my WordPress pull down menu (page top). Additional blog posts on topic are also available, here.
Political targeting almost always involves a ‘full-court press.’ The victim will likely suffer electronic weapon targeting, gangstalking, dirty tricks designed to destroy all resources, including finances, relationships, and reputation. They tend to be harassed by law enforcement and other civil agencies, and will likely in time discover they have been implanted with various devices to allow tracking, cause pain, provide voices in their head, and perhaps, suffer use of chemicals and gasses. Everyone will seem to turn against them, for they have been turned by the flashing of badges and requests for ‘help’ by ‘investigators’ of some horrible thing (i.e., pedophilia, terrorism, etc.)
The best defense is to determine exactly what thing it is they fear about you such that targeting was justified in their mind (which may be false beliefs about you). It usually has to do with something work related, or if a college student, something witnessed or experienced at school. Knowing the reason for the targeting will give you the who. With the who, why, and how answered, it is often possible to crate that blackmail insurance policy.
But it also may be that you had already been a victim of childhood abuses designed to create split personalities which could be ‘programmed’ to make you into a programmable person (think in terms of a Jason Bourne or Manchurian Candidate). For every Bourne successfully created, there are likely dozens of ‘failures’ which are kept around to become patsies or for fodder in some future plot. Such persons are often targeted to keep them off balance and looking insane in order to prevent exposure of the greater programming project. If you think you might be one of these, contact me for further evaluation.
Experimental targeting almost always does NOT involve a full-court press. It is usually to test a specific PCT or PCT combination. In some cases, this is actually a better experience as a TI, because of that fact. But in other cases, it can mean very exceptional and horrific targeting levels. Where it is the perps who are the subject of the experiment, it is more likely for the TI to have a  yo-yo experience, even seeming lapses in targeting. Finally, another clue is bizarre symptoms atypical from other TIs. This usually means some new, advanced technology is in play. The more ‘crazy sounding’ the experience is, especially against other TI experiences, the more likely is it experimental tech… unless, of course, one actually is schizophrenic. But even that can be a clue (see training targeting, next).
If it is concluded that perps are the true subjects, you can apply the same defense as advised in the training targeting (next). Otherwise, it is hard to give specific advice for something which may not be based on known technology or methods, but it is just as likely to be based on psychological experimentation as it is technical. In the later case, there will be no bizarre experiences (comparatively). In either event, I suggest you contact me and perhaps we can figure out something to try which is based on whatever is going on.
Training targeting will again feature yo-yo symptoms/effects, and perhaps brief lapses in targeting, but the symptoms will not be atypical of other victims. Because it will involve perps who may be ‘stupid’ about important errors that can be made, it is typically used against people who already have some history of mental health treatment. Schizophrenia, paranoia, or extreme schisms are popular ‘excuses’ which can hide any such targeting errors and prevent exposure of the training project. Authorities will presume the mental state of the victim the cause of their complaint, even to the point of ignoring physical evidence, such as burns on the body, which would be thought self inflicted. As in all targeting cases, regardless of type, reason, etc., I advise never to go to authorities unless you have courtroom quality evidence and witnesses or other proofs to counter any notion of mental illness.
Another clue it is training leads to defensive options. One will see a routine change of players, if one can locate the nearby perp operating posts. Training commonly requires at least one ‘instructor’ and one or more ‘trainees’ at a time. They are not family, and are not in the same social or affluence levels, and will tend to seem odd matches for each other, both in dress, and likely, in age. And, there are likely three sets of them to allow three shifts a day (not always – where targeting varies during the day and is consistent at night, the nighttime targeting may be automated), which would mean a lot of coming and going of different people. And, as there will be graduations, there will be a larger cycle of all new people, which may or may not include brief lapses in targeting, or renewed cycles of targeting experience which might be described as starting low and simple, and advancing to high and complex, over time.
The defense is simply to document the comings and goings, and the patterns of electronic attack signals. Rely on video, get license plates, record times, etc. This may enable you to obtain help from authorities, or perhaps to take legal action. But I warn you, the material must be legally compelling, and overwhelming. You will need a lawyer’s advice more than mine.

About Death Threats

Many TIs talk about thinking their perps are trying to kill them. Some talk about actual death threats and events which seem to be ‘failed attempts.’ Some reference  deaths which have taken place as ‘suspicious.’ It is true that numerous TIs have died while being targeted. These deaths are not outside of the norms of actuarial tables for a given group of people, given the many tens of thousands of TIs who actively so identify themselves. And as investigator, I have yet to see any compelling evidence of an actual murder, or staged accidents. I know of only one accidental death at the hands of a perp… which would possibly warrant a murder charge… definitely warrant manslaughter charges.
So, despite the insistence of TIs, I am equally adamant that murder is not the intent of targeting. Given the resources and skills of who is involved in targeting, if they wanted a person dead, they would be dead. They would not issue a threat or any other kind of warning, they would just get the job done. And, keep in mind that one reason targeting has been developed and deployed for political use is specifically to avoid murders. Murders can result in investigations which have the potential of blowback. But targeting creates a ‘mentally ill plaintiff’ who will be ignored, and is who is therefor a political (and social, financial) zero.
Therefore, where a targeting situation involves such threats, I deem it to mean one of two things. Either the TIs defenses are becoming effective and they seek to deter… using a bluff… in which case it is likely to be in a political targeting situation — or it is part of an experimental targeting project. In all cases, it is a mind game and should be ignored outwardly, while inwardly increasing defensive posture and alertness. If actual attempts are made, that is entirely another matter, and should be documented and likely, taken to law enforcement. Not that they will do anything about it, but it gets it on the record, such that if things become more serious, they might respond appropriately.

Fake News and Its Suppression: Who Benefits?

Fake News is a political weapon which is designed to cut two ways into your freedoms, and send us deeper into the grip of the New World Order. This case study reveals it.

by H. Michael Sweeney   Facebook  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.

What is Fake News?

Depends on who you ask, and when.
Were you to ask me or the next guy, say five or ten years ago, the answer would likely be ‘fake news web sites,’ those sites which feature click bait ‘BREAKING!’ headlines which are shockingly unbelievable… but just plausible enough to get you to click. If you bother to Google, you often find the story has already been debunked by someone, or that the image used is other than claimed. You also have to worry about sites like the Onion, which use deliberately over the top ‘fake news’ as a form of politically commentary.
The stories found at fake news sites, rich with advertising to make them money for your trouble, offer no cited source, no links to a verifying source, typically have no byline (author) cited, or the author is nobody you ever heard of, and they don’t have an About US, or it is next to useless. Often, the site is truly fake, pretending to look like a legitimate news source, either by name, or outright theft of ‘look and feel’ of a mainstream site (i.e., has NOTHING to do with ABC news, despite use of their logo). has nothing to do with any news station, though designed to look like it does.
Were you to ask, today, at least half of the country, would additionally answer, Government, and Mainstream Media. Time and again they have been caught promoting stories proven to be false, always for political reasons. In the most recent Presidential campaign, the bias of media was so extreme and visible, that they no longer bothered to fact check Democrat/Hillary claims, and spent endless time fostering false narratives about Trump, story after story after story.
By way of example: If Trump said (and he did) “Russia, if you’re listening, I hope you’ll be able to find the 30,000 emails that are missing,” suddenly Hillary and media were claiming Trump was asking Russia to spy on Hillary… twisting the meaning of very clear words intending no such thing, but instead implying Hillary’s sloppy personal server emails were a National Security Risk, already very likely to have been hacked by (anyone who cared to do so), while at the same time highlighting the criminality suspected in the deletion of emails prior to FBI investigation.
But if you ask Democrats, or Government, or Media, it is only Web sites which have been critical of THEM or their own ‘news’ stories. They would include Activists and Conspiracy Theorist reviews such as Alex Jones, and actual legitimate news sites which dared go against mainstream in the election, such as FOX News, RT News. Well, I don’t trust FOX to be ‘fair and balanced,’ or ‘unafraid,’ either, but I’ve never seen RT do anything but expose things needing exposing, and reporting verifiable facts, and conduct verbatim interviews without talking over and interrupting, as is common to US mainstream. They would also include virtually all Conservative viewpoint sources, and many neutral sources long accepted as offering verifiable content, such as World Net Daily, Breitbart.
The scary part of these lists, which is nothing more than political blacklisting, is that there is a clear focus as to who is being targeted. Yes, they lump in with those they wish to ‘target’ by such labeling, actual fake sites, such as Before Its News and Federal Jack, and that is intended to legitimize via guilt by association inclusion of sites they wish to destroy for political reasons. But when you examine the list, you find out that there is such a focus; it is conservatives (opposed to the current liberal Democrats in power), Orthodox religious sites vocally opposed to select liberal policies, such as abortion, and anyone who faults Global Warming.
In fact, the primary accusation is: “This site publishes information that cannot be validated and that is anti scientific fact.” The grammatical error is theirs (‘that,’ instead of ‘which’). News sites which cite and links to their source can be validated. If you have a problem with the source, go after them. Scientific Fact? What is that? Science continually reverses and revises itself as more is learned over time. When something like Global Warming is involved, where you have legions of scientists who disagree with scientists who have a vested interest in the ‘official science’ for political reasons, the expression ‘anti-science’ is itself propaganda, and disinformation; fake news. Science is only theory until proven and accepted as fact, and that’s clearly not the case when scientists themselves cannot agree, and there is a political agenda involved — in this case the New World Order’s wish to establish Carbon Tax, Carbon Currency, and Carbon Credits.
In short, the whole Fake News, as news, in the news, is itself, manufactured Fake News for political purposes. It is so fake, in fact, that many sites listing fake news, do not even identify themselves and tend to pop up overnight, which likely means they are created through the Democrats, Establishment Republicans, George Soros, or their cronies. They, themselves, are fake. Example:

How to fight fake news

The problem with fake news as a tactic, even when from media, the Democrat machine, the Establishment Republicans, the CIA or FBI (Agency or individual rogue Agents), George Soros, or from sources in other countries, and of course, professional fake news Web sites, Conspiracy Theorists who don’t know jack, or anyone else… is it is EASY to see if it fake or at least suspect enough to look closer. Do they cite their source with a link? Do they give a byline? Do they dare offer an About Us which is useful?
HOWEVER, this only happens (looking closer) if you/we CARE. By heaping fake news upon us continually and endlessly with one thing after another, from fake source after fake source, and through ‘legitimate’ sources, as well — as they have ever since Trump threw his ring into the hat, the defenses of those who support truth and/or trump, or both, are worn down, and we become lax, thinking this, too, shall pass. We stop bothering to look, and presuming that because we see the lie, that others will too, before being hoodwinked. No. They won’t. Apathy and laziness reign.
This is why fake news works; apathy and presumptions allow it to be spread unopposed on social media. The only way to fight it is to relentlessly point it out: “Fake News: no source cited, no links to verify, no author, see what was actually said, here (link).” Or similar. IT IS THEREFORE UP TO EVERY CITIZEN TO REJECT FAKE NEWS, SEEK IT OUT, PROTEST IT, EXPOSE IT, and DECRY THE SOURCES, ALL WHO REPEAT IT, AND ALL WHO BELIEVE IT, ALL WHO BENEFIT BY IT IN THEIR SILENCE.Always check About Us, if they dare have one.

Case Study in fake news of the most dangerous and treasonous kind.

At the time of this writing, the pushers of the latest and most dangerous fake news are the Democrats, Establishment Republicans, Soros, the current Democrat Government, and George Soros. Their real TARGET AUDIENCE is, in this case, the Electoral College voters who are still being exposed to the avalanche of lies, lies, lies. A lie repeated often enough, in the company of more lies in support, eventually seem as if the truth. The core lie (fake news), is that Trump, Putin, Wikileaks, and select FBI officials conspired against Hillary. Specifically, that Putin hacked the DNC and shared files damaging to Hillary with Wikileaks, in support of Trump, and that Trump conspired with FBI to refute those charges.
It is wholly inconceivable that a Conspiracy can be formed by a single business man, a high ranking FBI agent, the Russians via Putin, and a non partisan Web leaking service (Wikileaks). If they can make enough Electoral College voters believe this lie, the outcome of the election comes into question. The stakes are high, and the hope is that there are enough fools to follow. To believe this latest fake news, you have to believe that:
a) that Wikileaks is a tool of Putin, a Fake News story planted by who? The Democrats. Planted when? When Wikileaks releases happened to revolve around Hillary. Who benefits? Democrats/Hillary;
b) that Trump bribed people in FBI to refute Russian hacking, a Fake News story planted by who? The Democrats. Planted when? After they lost the election. Who benefits? Democrats/Hillary;
c) that Trump and Putin have colluded or that Putin has elected to support Trump over Hillary. Collusion is a Fake News story planted by who? Hillary. Planted when? In the middle of a hard political fight. Who Benefits? Democrats/Hillary. As to wether or not Putin would prefer and support Trump, such is HIS RIGHT, as it is true for every individual and nation on the planet. The U.S. acts to sway elections in other countries, and should expect other countries to seek influence in our own. Hell, we even used mind control on the entire country of Bosnia to sway their elections using Command Solo Aircraft, as admitted by USAF;
d) that Putin risked an international incident, and arranged for the DNC computer to be hacked in order to share with Wikileaks, a Fake News story planted by who? The Democrats/Hillary? Planted when? In the heat of the campaign, and again well after they had lost. Who benefits? Democrats/Hillalry. If this was not fake news, why did the ‘honorable’ Democrat Congressmen NOW calling for investigation not call for it on day one? In truth, we now learn, John Podesta’s own personal carelessness with an obvious email phishing ploy lead to the least, and not hacking in the traditional sense as claimed by the Democrats, such that… (see next);
e) that all 17 US Intelligence Agencies agree that hacking by the Russians took place and shared with Wikileaks, which means the Office of the Director of National Intelligence, and the 16 INDEPENDENT agencies beneath it, EACH INDEPENDENTLY came to like conclusion through THEIR INDEPENDENT DETECTION/INVESTIGATION. This includes very unlikely Agencies, such as DEA, Atomic Energy, and each spy arm of the U.S. Military, non of which monitor anything more than those Web resources which impact on THEIR INDIVIDUAL MISSIONS. This Fake News was planted by who? Hillary. When? During the heat of the campaign, and again later, after loosing, renewed by Democrats. Who benefits? Democrats/Hillary. Again, if TRUE THEN, why wait until NOW to get upset about it enough to call for investigation? Email Phishing happens all the time, to everyone, and is way-too easy to detect to have been a sophisticated hacking effort by the Russians. It was Podesta’s stupidity, and nothing, else;
DO YOU SEE ANY PATTERN HERE, at all? But wait. We are not done, yet. Who are the other players in EACH and EVERY case? The same liberal media outlets that promoted Democrat/Hillary’s other campaign lies through the campaign. Soros. Many of the same Establishment Republicans who can’t stand loosing power to the People. So, who are the real conspirators, here? If you think about it, every player… Republican and Democrat Establishment, Hillary, controlled media, Soros… they are all part of The New World Order, either as front-line politicians with treasonous intent, or manipulated minions obeying orders.
I say Treason, because the NWO seeks above all else to destroy the sovereignty of all nations in favor of a One World Government; when your own congressional members and President seek to abandon your own laws and the Constitution in favor of Global laws contrary to your own, it is destruction of sovereignty, and therefore, Treason. When they are Bilderbergers or members of Skull and Bones or the Round Table Groups, which either require oaths which disavow the Laws of the Land or have policies and/or mission statements which support a One World Government, that is a violation of the Oath of Office, and is Treason.

Fake News real goal and threat: Democracy, the Constitution, Freedom

If those in media and government who deem themselves sole authority on what is and is not fake news are allowed to do so, We, The People, are doomed. In the tradition of the New World Order ploy of ‘creating a problem’ in order to ‘provide a solution,’ which was pre determined to achieve a hidden agenda, fake news outcry was launched specifically in order to proved just such a solution. By problem-solution-agenda, I mean that the solution just happens to be ready to go in time for immediate application (strike while the iron is hot… the people are lathered up and ripe for exploitation), and has some draconian underpinnings not readily visible without close scrutiny.
Example: As I first exposed in the Professional Paranoid Newsletter, and later in my books, The Patriot Act was already written prior to 9-11. Homeland Security was established secretly two years to the day prior to 9-11, but enabled by the Patriot Act, so it could be immediately ‘activated.’ Now comes fake news, and it, too, has ‘just in time’ legislation already written.
And lo and behold, both the House and the Senate have Bills already quietly being passed to counter ‘fake news.’ In the Senate, we have the Countering Disinformation and  Propaganda Act, and in the House, HR6393, part of the Annual Defense Intelligence Authorization Act, which has been amended to target ‘Russian Propaganda’ and, by association, other forms of ‘fake news.’
Now, the links provided above by me are deliberately from sites being officially declared by government and media as ‘fake news,’ but I defy you to find anything fake in their reporting. They give you the links to the actual material so you can judge for yourself, and reveal anything fake in their presentation. THAT does not meet my criteria for fake news, but because their report is contrary to the official story government would prefer, essentially whistle-blowing, it meets government’s criteria, and by extension, that of a controlled and biased media.
The scary part is this. Both of these acts give the government the power to establish what is effectively a Ministry of Truth (a la Orwell’s 1984), which can ultimately be used to completely shut down all dissenting voice in America and elsewhere, especially on the Web. It also can lead to establishing punishment for saying things publicly which oppose government, a de facto sedition law which inhibits free speech. That is one of things we went to war with King George over. 
Add into all this the additional censoring by Google and Facebook, and all you are going to be able to do is ‘guess’ what the truth is. Try using Google or any of the major engines to find something out using controversial or heated topics which oppose the official story. It used to be you got exactly what you requested. But now, you mostly get official versions up front, as if you didn’t really know exactly what to type in what you were looking for, and they figured that out, for you. To find what you are actually looking for, you may have to go pages and pages deep into the results.
Example: For this post, I typed in “What did trump really say about russian hacking” which produces almost exclusively opinions about what Trump said, not what he actually said. Even the one which comes close, does not go back to his original quote. It took me quite a long time to actually get back to his original quote. This is censorship for political purposes, in this case reflecting the desired liberal/Democrat and Establishment Republican desire to destroy non establishment Trump. To find the truth, ‘guessing’ will not cut it, and neither will accepting media, Google, or government’s claims, et. al.
Dig! Dig! Dig!

Related Posts:

Psyops TV: How They Dumb You Down and Set You Up
Fascistbook: The Growing Case for Government Targeting via Social Media

Who’s Killing the Bilderbergers?

Some 17 years ago, the Unified Conspiracy Theory was formulated. It was so accurate — it was able to predict in 1999 the 2001 downing of the WTC by jetliners and resulting Middle East Oil Wars, and other major news events. Now it can be seen at work in my newest book on the Bilderbergers — where fact and fiction collide… fatally.


by H. Michael Sweeney   Facebook  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
Upate Feb. 20, 2017 Paranoia Publishing is set to start shipping hard cover copies of this book as early as first week of March. Amazon will carry it right away. ebook copies available direct from author now at half price ($6 – will return to normal price once hard copy is available) via paypal orders to proparanoidgroup at gmail com. 

What led to this book? The definitive International conspiracy.

After ten years of research into crimes of the New World Order, I began to theorize that the bulk of America’s dark bumps in the night were not simply random crimes by assorted forces for varied agenda, but completely orchestrated as a single, logical, step-wise plan toward a single, yet visible goal. It resulting in the Unified Conspiracy Theory, and it was reasoned that if one knew the goal, and the steps thus far taken, such a plan was predictable, and as a theory, the ultimate test would be to do just that.

The first three predictions made with the UCT were so scary, that I had to take actions, do something… anything I could think of, to attempt to thwart them. The first was, that some kind of terror event would bring down the WTC with jetliners, and result in a series of Middle East Oil Wars. So, in the Fall of 1999, knowing no authorities would bother to respond usefully, or quickly, I published a quickly written screenplay featuring such a plot, and put it online with explanative warnings, hoping against hope it might force any such plan to be aborted. No such luck, of course, even though Oliver Stone’s people took a look at the script in search of a project. They thought it an impossible ‘false flag’ scenario.



The second UCT prediction was an assassination attempt on 1992 Independent Presidential Candidate H. Ross Perot, or his family, in order to force him out of the Primary run against Clinton/Bush. I took no chances, and this time, notified the Secret Service of my concerns, expecting they would ask me for details. I used my backchannel contact, someone I had worked with before on several Treasury matters. Some several weeks later, Perot did back out of the election, even though the very night he did so, he had won enough votes to be guaranteed a place on the General Ballot. A few weeks after that, my SS contact confirmed that an attempt had been made just before the Primary, against his family; mailed Anthrax. That has its own telling ‘false flag’ backstory.

The third was that there would be at least two more major false flag attacks to follow, specifically naming the type of attacks, and the cities. One of them was my home town, which I had predicted would suffer a bio-terror attack, and I even identified the means of delivery and rogue CIA Fronts to be used. But by the time frame where that might become a more current concern, I had finished my book set, Fatal Rebirth, which spelled these things out quite clearly, again hoping it might spoil any such plan. I also took steps to notify the City.

Again, no useful results, but fortunately, knowing such details enabled me to personally thwart that attack, or at least postpone it. It is featured on this Blog’s home page.  But I was definitely able to thwart second, different terror attack in the same time frame, likely a Plan B to the former. It was called Gas Station Tasking when announced by President Bush; the use of private planes to dive bomb the area’s largest gas station while a tanker truck was offloading gasoline, at the busiest time of the street traffic day. This is also detailed on the home page.

This could easily have taken out two gas stations, four restaurants, two banks, two two hotels, and potentially, two major shopping complexes, and the traffic on the busiest intersection in the County, plus a major Interstate and two State highways. Identified, were two of FBI’s Top Ten Most Wanted Terrorists, and others, including the Christmas Tree Bombers. They were getting help from an FBI Agent known to me, and so, as it was a false flag operation, FBI, CIA, FAA, DHS, in response to my going public, never asked for my evidence, which included fingerprints, video, multiple eye witness confirmations, and more. The cover up was started before the President even heard about it. See home page.


Why UTC matters to this new book

Other UTC predictions have since come to pass, as well. The reason this is all mentioned here, at all, is because the UTC does not just affect America, it relates perfectly to World affairs, as well. And in this world, we have various Round Table Groups of Globalists who push for a One-World Government, which is to say, elements of the modern-day Illuminati. Such groups as the Tri-Lateral Commission, the Council on Foreign Relations, and the Grandaddy of them all, the Bilderbergers, and many more (even United Nations, World Bank, et. al), all tend to be cut from the same New World Order mold.


This image relates to one of two strings of real World International murders footnoted in Who’s Killing The Bilderbergers, as cited in this book. From


Which in turn is to say, largely fascist, all-too often satanic, and decidedly power elitists seeking to rule the World through manipulation and control of (everything), and willing to do so at any cost, by any means. Not to go overboard, it is important to note that, with the exception of the Bilderbergers, most Round Table Groups, like FreeMasonry, attempt to draw in newbie membership who are completely innocent Sheep. This gives surface viability and credibility of these groups to mainstream in ways which allow them to mask the darker roles they play in seeking the Globalist rule, while also giving fresh students to draw into their world, especially the more successful up and comers. There is a backstory there, as well, as I have first hand knowledge, x 2 telling examples, having been such an up and coming business man.

Ergo, this new book is designed to do much the same thing as Fatal Rebirth; to warn you just what these people are doing, and why… and why you should be mad as hell about it and doing something to stop them. Only, my new book is global in scope, where Fatal Rebirth concerned itself only with America. And, while Fatal Rebirth began unfolding in 1947, Who’s Killing the Bilderbergers is a current-day affair. As such, it is perhaps more urgent, that you read it, and soon — because the future is revealed to be bleaker than the Dark Ages and time of the Inquisition, for those not forewarned and forearmed.


The plot thickens

I describe this book as ‘an International Novel of Novel International Affairs.’ A grand murder mystery across multiple Continents, trying to resolve mysterious death after death of prominent Globalist leaders. Are they simply random deaths by happenstance, or murders by elaborate design? Officially, they are not due foul play, and yet… each one has many unanswerable questions clouding that view. Just as troubling, their deaths seem to be tied to various strange conspiracy theories, while at the same time tied to various Globalist agenda, either narrative affording motive for murder. And, of course, it is soon enough discovered that they all turn out to be Bilderbergers.


Each Bilderberger tends to be an Officer or Board Member of multiple corporations, and has sway over yet others through major stock holder positions, or contractual agreements. Of course, many of these companies, in turn, control other companies, sometimes, long lists. Now, imagine what this Cloud Map would look like if we knew the actual identity of ALL Bilderbergers, and not just this handful. Then add CFR, Trilateral Commission, Club of Rome, Council on Foreign Relations, and on, and on; the Round Table Globalists; the modern-day illuminati.

By the time the truth of the deaths starts to be uncovered, the UTC will have started to reveal itself in action. In like manner to UTC’s ability to be predictive, readers will be propelled quickly into the future, headlong into the one final prediction which is the ultimate form of fatal rebirth… for us all. That particular prediction WILLmost certainly come to pass; it has, after all, been foretold by many authors well before my time. Among them, Satanist and high Mason, Adam Weishaupt; it is the entire purpose of and predictive goal of the Illuminati Plan, as he formulated it in 1776, when the group started their journey toward a New World Order (he first coined that term).

As this book reveals, just when it comes to pass, is largely up to you. You, are what you’ve been waiting for. They hope you don’t know that, and remain Sheeple.


An important detail

And, along the way to that story-ending element, readers will also encounter countless real-World conspiracies laid at the feet of Bilderbergers, all done in ways which let the individual decide for his or herself, which, if any, may seem fanciful, and which are more likely true.  There is much documentation within the main body, plus more than 150 footnotes (an average of one every page turn), to help that process along. Some of those footnotes are illustrated graphically. The Climax and Ending will then show you the progressional nature of the Globalist plan as it unfolds toward the very last step in the plan, the point of no return for Mankind. These conspiracies back up the UTC usefully, and in fact, understanding them helps refine the UTC more usefully; one tends to validate the other, in both directions.




Like or Hate Me, You May Wish to Quote Me

If I had a dollar, or even a dime for every web page that mentioned or quoted me or my works, I’d be a millionaire: 12 million pages can’t all be wrong; people repeat what I say. Where else but America can you become ‘famous’ for putting your foot in your mouth on a regular basis?

by H. Michael Sweeney    facebook

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.


What you will get by reading this post…

• Silly quotable one liners, gags, and full-on original jokes;

• witty quotable witticisms, wise sayings, criticisms, and other malarky;

• non PC quotable political snipes, barbs, and ruthless rhetoric;

• thoughtful quotable philosophical wisdoms, advice, and beatitudes.


My most popular writing today has been copied by permission on hundreds of Web sites, and reproduced in at least a half dozen books. So I know I’m quoted out there. It is even used in college courses on Political Science, Journalism, and Psychology. It’s called the 25 Rules of Disinformation, and includes not just how to spot disinfo, but how to out it and defeat the user in public or private venue.

This post is (mostly) a collection of my most popular Facebook posts. People generally like them, unless on the wrong end of the barb. Even then, the resulting dialogs have been interesting, and we tend to remain friends. But most people on Facebook do not ‘go looking’ for something to read, they let Facebook automatically send them random samplings in their ‘feed.’ It is really best to FOLLOW someone you like (also true of my blog posts); the only way to insure you see everything a given person posts (or blogs), is to follow them (subscribe — click that option now, while you are thinking about it.)

So, even if already a Facebook friend, it is highly unlikely you will have seen very many of what follows: a random grab bag of quotable material. Now, if you do actually choose to quote me, please do cite me as the source, and link either to this blog Page or the whole Site, or my Facebook page. New friends are welcome there, of course. You can quote me on that!


Quote on!

You May Wish to Quote Me (I do it all the time)~

If I had a dollar, or even a dime for every web page that mentioned or quoted me or my works, I’d be a millionaire: 12 million pages can’t all be wrong; people like what I say. Where else but America can you become ‘famous’ for putting your foot in your mouth on a regular basis?~

You may have noticed that I’m imminently quotable by the way I continually quote myself, because after all, “I’m imminently quotable.”~

The only good thing about putting my foot in my mouth so often is that I always know if my shoelaces are tied, or knot.~


T’was an LL Cool Day
(apologies to LL Cool J)

I saw an Armadillo while visiting Amarillo;
he sat near a willow, upon a satin pillow.
In the sun, bright yellow, this reclining fellow
seemed to be quite mellow, eating a bowl of Jello
while listening to a fellow who played a loud Cello.
Were I to say hello, I feared I must such bellow;
that seemed such a peccadillo, I ne’er met that Armadillo


If Google spies on your searches, shouldn’t their name be Goggle?
If Yahoo does, Youwho?
If Facebook tracks your info, Factlook?
If YouTube censors excessively and politically, LubeRube?
If television is propaganda, Tellyourmission?
If a newspaper is the same, Newsfaker?
If the Oval Office is a source of lies and skullduggery, the Shovel Orrafice?~


From conversation (click for their similar answer to meaning of life)

The meaning of Life? To take all gifts entrusted to you by God; Free Will, life, and the Soul which defines the inner you, and the gifts you earn through life; knowledge, talent, skills, wealth and possessions, experiences and positions… to edify yourself, edify others (family, those above you, your peers, and strangers), and above all, edify God in the doing. This is true Glory, and the source of Blessings.

To the extent you do this, you yourself fabricate that meaning. To the extent you fail to do so, you dilute or even destroy it. Any faults or failures you have along the way are challenges in learning, and otherwise non sequitur to the equation. This is true Faith, and the source of Happiness.

Don’t focus on them, learn from them, and go on. You are what you’ve been waiting for, all along. Stop looking so hard for simple answers, and stop struggling so hard against battles predestined to be won by the righteous. If God be for you, who can be against you? This is the true foundation of Peace, and the source of Strength.

The meaning of life, is YOU, and I’m glad you have friended me. As I wish for me, so I wish for you. Thank you for sharing this Sunday with me.~


Wisdom is sometimes knowing how to seem wise without anyone’s means to challenge. After struggling to the top of the mountain to ask my one-allowed question of the Guru, he preempted with an answer: “Yes, my Son,” he said, “you have at last made it to the top. Now leave me in peace.”~

I wonder if Pavlov’s Dog’s got that way eating Pavlum? Probably not, it wouldn’t make me salivate.~

You know your’e an alcoholic and an unpleasant drunk if people invite you to their parties the day after, and you are so sloshed you think you just got back from it.~

I’m sorry, but I think I misunderstood what you wanted me to consider about what you probably meant by saying what you thought I would be able to relate to as allegory to the intended thought you had in mind, but couldn’t articulate because you were afraid I would misconstrue it as something else. What were we talking about, again?~

A dirty joke is to humor in a way exactly like the Presidential election is to politics.~

Rain falls in drops because it’s happy water. When it’s mad, watch out for hail.~


Old Crow

Oh, old Crow, so cautious and suspicious,
not like the Goose, who’s calm with aplomb,
your caw is such an appalling loud calling,
unlike parakeets most cheerful earful,
or eagle’s shrill cry from high in the sky.

Your old black cloak does fail to evoke
the visual delight of a Parrot, so bright.
You walk with a hobble and a wobble,
where a Robin bounces and pounces,
and the Stork is stilted and often is tilted.

And though your flight is quite alright,
it’s not as stunning as a Bird, Humming.
Lacking the Hawk’s glide so full of pride,
sans any formation of Geese’ inclination,
nor is it as swift as can be a quick Swift.

Your Murder is a suspect some fear to detect,
and yet, I suspicion, it’s all mere superstition.
Yet do not away rush, my criticisms to hush:
let not any objection be seen as a rejection;
I do like you old Crow, so brag on, and crow.



To escape vile fate I must get past that damned wall;
because if staying here, I’ll not likely survive it at all.
I tried to climb upon it, up high, no good, then higher,
only to find it topped with wickedly sharp razor wire.
I tried to go around it, hoping an opening I would find,
but it surrounds me completely, and I’m trapped inside.

I tried to dig under, tunneling deep, deep underground
but impassable boulders and water did me confound.
To escape my foe I must get past that heartless wall;
I’ve no choice; to give up certainly means my downfall.
I’ve asked for help from all near who might could hear,
they refuse to give aid, yielding to their own dark fear.

I’ve prayed to God to help, to redeem and set me free,
but I’m afraid in here, even He can’t hear me or see.
Then came a gentle voice advising firmly to be still,
“I’m with you always, as is my gift of strong Free Will.
To escape your foe, you must get past that mere wall,
and there is yet one thing you’ve not tied, not at all.”

My thoughts reeled, and the answer came in a flash,
I’d not yet tried attacking head on, the wall to crash.
I gathered my courage and backed up for a good run,
and ran headlong screaming at the top of my lung.
I hit that wall with all my brute force, and hit it hard:
knocking myself unconscious right there in that yard.

To escape my foe, I’ve tried it all, to get past the evil wall;
but nothing has for me worked, no not one, nothing at all.
I awoke quite dazed, my fist clinched in pain and my rage,
the voice had not well helped me, its advice was not sage.
But regaining my feet, a white robed figure there stood tall,
amid the rubble of that same accursed, impassable wall.

“You’ve escaped your foe,” said he, “right through the wall;
not by your strength, nor luck, but that on me you did call.
The miracle you sought was within you right from the start,
your faith in me was all it took; and abiding love in your heart.
If God be for you, no man or thing against you can stand,
when you hit that wall, I was there with you, hand in hand.”


Sorry if I insult you. Being poor, I have to go for the cheap shots.~

Any man can toast his friends at the tavern. But a brave man toasts his enemies. That’s why I always carry a can of lighter fluid when I go drinking.~

I never quite chimed in with the 60’s by wearing bell bottom pants – until I got kicked in the groin.~

I’m never inclined to eat carrots. I just can’t see my way to do so.~


Linear or Columnar?

A rhythmic rhyme in a single line is often quite fine.
but most like a rhyme
to be of many a line,
or to metrically align; 
be symmetrically sublime,
or perhaps its just fine
to enjoy any old rhyme.


Political Risk

I’ll not vote for she who does cackle
when refusing a tough query to tackle.
While not happy with alternative Trump,
he’s still better than a kick in the rump.

While Dems are OK with criminal lies,
and Establishment Reps swarm like flies,
a candidate ripe for an email blackmail
risks a serious national security fail.


A lot of drinks call for two fingers of this or that liquor, so I always look for bartenders with really big hands.~

The path to illumination in the darkness is called a sidewalk.~


Political Seuss

I do not like this Uncle Sam, I do not like the health care scam.
I do not like these dirty crooks, or how they lie and cook the books!
I do not like when Congress steals, I do not like their secret deals.
I do not like this speaker Nan, I do not like this ‘YES WE CAN’.
I do not like this spending spree, I’m smart, I know that Nothing’s Free!
I do not like their smug replies, when I complain about their lies.
I do not like this kind of hope. I do not like it. nope, nope, nope!


There are rarely times when ‘actual’ sex is as good as ‘fantasy’ sex is imagined. However, they both involve a little ‘t’ & ‘a.’~

The only ‘gun control’ I support is that question in the mind of the criminal intent on causing trouble, “Will he remain in control of his fear or temper, or will he pull the trigger.”~


Politic’s Ticks

If Trump is such a chump we’d rather dump,
and Uncle Bernie is ample wormy and too squirmy,
and Hillary far too shrillery under FBI drillery,
with liberally bias in the press giving truth no redress…
Does that mean Biden is bid’n his tim’n in decid’n if rid’n
White Knight like last minute to the Demo’s pandemic…
Is that how we’ll be decid’n who’s presidential presid’n?
Is that Obama’s last prick on his way out, his hat trick?
That I won’t at all be abid’n, down too far we’ve been slid’n.



Yes, wine is quite fine when you have the time, or dine,
but weed has more speed if you have the need; do proceed.
The joke for this bloke is that I cannot smoke, nor toke,
and shrink from such drink – an alchoholic’s dread; brink of stink.

Dope lacks hope that I’ll survive or cope its scope,
so here’s my fears (why I’m lacking cheers amid tears):
this guy will die having never daring a high to try.
That hex did vex untill realizing that the Rx is sex!~

Never hiss at a snake; the conversation could be deadly.~



Do you know anything of the Entymology of Entomology,
or is it to you as confusing as the synopsis of synapsis?


Hillary’s Ruin
(What difference does it make?)

As I have previously stated,
I am quite totally devastated
not to have been reinstated.

I have frequently formulated
and as often have postulated
just why I’m not yet reinstated.

The cause, you see, is equated
with rumors and lies oft related
to prevent my being reinstated.

They shout with glee, as if elated
with prideful egos thus elevated,
for blocking my being reinstated.

They say my claims are overrated,
to a job where I ne’er participated,
and that’s why I can’t be reinstated.

If people died while I simply waited,
shown in lies and emails evaluated,
what difference to being reinstated?

My right, you see, as Royal rated
is for all to worship me unabated,
and vote to have me reinstated.


Never apologize to me for being you. Just stop it!~

Why do some of us eat the icing out of the middle of an Oreo? Where else would it be?~


Seasonal Orb

I saw last night the thinnest sliver of a silver Moon,
a most pleasant crescent, present this month of June.
So thin that it did quiver and thus scant light deliver,
did I realize before my eyes it would dematerialize.
Now its gone, but before too long, watching for its rise,
to my boon:
 it shall return soon, as a mirror sliver Moon.


Rhyme Defined

A simple rhyme takes little time,
a light banter with good cantor –
best if exquisite, expressed explicit;
easy to recall in its all and all.


In A Rush

Here”s a quick li’l poem:
done now, I’ll be goin’.


What’s wrong with the Mayor of New York, does he not know his soda ban and tax is suppressing Pop Culture?~

Unfortunately for Custer, at least 10 Little Indians never heard that song.~


Time Tells No Tales

Once upon a time? No, I’m highly suspicious.
If it only happened once, it must be fictitious,
especially if remarkably good and not malicious:
Real events repeat themselves through history,
written down in pages for study by you and me,
where learning not, we assure repeat eventuality.


Dear Fascists

Take heed, look around: here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.
Your words will not sway me, no dark threats dissuade me.
Take heed, look around. Here stand I, I stand my ground.

Never again will I back away, here I stand, and here I’ll stay.
No trick or lies, nor treachery will keep me from remaining free.
No unjust laws, cops or military will I respect, still shall I tarry.
Take heed, look around: here stand I, I stand my ground.

Never again will I back away, here I stand, and here I’ll stay.
Surround me with vile forces, I’ll ignore their foul loud voices.
Dare attack me if you will, I’ll reply ten fold until my body’s still.
Take heed, look around: here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.


They say the Earth’s rotation is slowing down. I have a simple cure. We all get in our cars and face them West, and synchronize burning rubber.~


Status Quo: Latin for we want you to think things are equal and as they should be so you
will shut up and do what you are told

Parity: French for we want you to think things are the same and as they should be so you
will shut up and do what you are told

Equality: Ye olde English for we want you to think things are the same and as they should
be so you will shut up and do what you are told

Same: what we mean when we are talking about one political party compared to another,
those people who want us to shut up and do what we are told.


I thought of a Hillaryous joke, but I don’t want to keep insulting Democrats.~


Social Litmus

Do my witticisms impress you or simply depress you?
Do my jokes make you laugh or think me some Jackass?
Do my poems seem lyrical or are they just predictable?
Do my posts give enlightenment, or seem closer to excrement?
Do you share, like, and follow, or is our friendship just hollow?


Smart by Default

Any wisdom I have lies in taking some care
in choosing the friends with whom I will share.
If smarter than me I will make them aware:
I agree with them, and with flattering flair.
If not as smart, then will I then declare,
their inspiring thoughts lead me to dare.


A tack pins things down, while pins prick things deeply, but a prick is always tacky, hard to pin down, offending deeply.~

Time for me to post-a-joke. Invented by a stand-up comic, it’s like a Post-it Pad, without any glue to hold it together — so it’s insanely presented in unexpected ways, and it is colorless, unless fucking off color or borrows the color of a racial inference. Wait… that’s a political speech.~

I think I understand the term ‘feedback loop,’ now: GMO crops.~

Shoot first and ask questions later. It saves dialog and you don’t get ambiguous answers… if there are any answers.~


Being Outspoken

I’m the first to admit I know so much about everything,
an expert assumed, presumed, or claimed unrelenting.
In truth it seems, I know not enough on any one thing,
to avoid putting my foot in my mouth without realizing.


Your Bad, So Sad. My Bad, And Glad

If you insult me, let me be quite perfectly clear,
you’d better be right in your basis, my dear,
because logic, facts, and reason, you’ll hear,
the weapons my response will burn in your ear.

Excuse me if I’m less than politically correct,
but especially if trying to point out your defect,
you have no legal right to avoid being upset
by my Free Speech, you fucking dumb idiot.


I’m not going to post anything useful, today. I hope this heads up proves useful. Doh!~

I get rejected a lot by the ladies. I asked one gal if she would like to go out on a double date, and she said “Sure. How about Judgement Day, and the Day after.”~

Hurry, hurry, hurry! Step right up folks, and get your fresh posts, right here, right now. Only $1, five for $3, and a surprise in every one, guaranteed, or your money back. Don’t be misled by the competitor’s claims; they only post kitties and slogans, and complaints that no one comments. Hurry, hurry, hurry!~


My Prayer today, is for you. There is nothing better than other people praying for you, especially if praying WITH you. We’re not getting older, just getting closer to home! Be Still, and at peace. Now, it is true that the Lord’s Prayer is quite sufficient and complete to God, but sometimes, we feel we want to say more. That is good with God.

May I suggest the prayer below? If ye pray it as you read, it is the same as if we have done so together; Matthew 18:19 “And I tell you more: whenever two of you on earth agree about anything you pray for, it will be done for you by my Father in heaven.” All that is required is that the prayer be righteous and fitting to God’s Will, which is defined to the extent we are able to determine in his Word. If we do not vary from that, we are apt to receive that which we NEED, if not that which we THINK we need and seek by prayer (be careful what and how you ask for [it].) Begin:

Heavenly Father, thank You for each and every day; today is a Day the Lord hath made, we rejoice and are glad in it, for You have blessed us here on earth yet again. Thank You for Your tender mercies of your Grace, and the gift of life and of Free Will, which lead us through the day; may we not abuse these gifts and offend You. Thank You for giving us family and friends to share the joys and burdens of the day. I ask You to bless my family, relatives and friends and those I care deeply for, and those who are reading this right now, especially those who are suffering and in need of your intervention.

Where there is joy, give them continued joy. Where there is pain, give them peace and mercy. Where there is self-doubt or confusion, release a renewed confidence and understanding. Where there is need, fulfill their needs. Move them to study your Word, to strengthen their faith and embrace the Gospel, and to be moved thereby to spread the Word. Bless their families, homes, finances, their goings and their comings, and turn aside their enemies in forgiveness, which is to our good as well as our enemy’s good.

Above all else, may Your Will be done, in Jesus’ name,~


If Istanbul used to be Contstantinople, does that mean they got tired of constantly being in Ople, wherever that is?~

Just because I disagree with you does not mean I don’t like you. I hate everyone equally.~

A conspiracy unfolding is like a barrage of arrows in the dark. You hear evidence that something is not right, but don’t don’t get the point until it is too late. Worse, you also get the shaft.~


Desperate Conclusion

My mind, not very clear right now, so
writing some clever rhyming ditty? No.
But I know some of you like that stuff…
So there’s only one question:
Is this good enough?


Good example of a self-fulfilling prophesy: “I’m going to enter the hot dog eating contest.”~

It must be true that you are what you eat. I live on $3 a day in food, and one look at me and you will know, I’m a cheapskate.~

Why do they call it an aptitude test? Because if you have to take one, you are apt to detest it.~

You will note I don’t call people who don’t agree with me bad names. That’s because the bastards have thick skins.~


Digital Death

My computer is dying now of old age,
and while buying a new one is truly sage,
and newer models are quite all the rage,
there’s nothing but zeros on the last page
of my checkbook; no income at my age.
My mouse is destined for the round cage,
unless comes a miracle or magical Mage.



A chant can be a kind of moving song,
easily remembered for singing along.

A chant can be a loud and angry jeer,
prompting attention, worry, and fear.

A chant might be for someone; a call,
for entertainers or leaders loved by all.

A chant gives power to thought and word,
assuring its message is clearly heard.

But a chant by Monks is the best to hear,
binding us to God and drawing Him near.


If I have a Colon for which I might need a Colonoscopy, and use :s and ;s in a similar manner all the time when I write, why can’t I get a Semicolonoscopy, and save some money?~

Lately, I’ve been thinking of taking a plane somewhere to improve my sex life. It won’t matter where, I just going through TSA will do the trick.~

OK, time for me to say something funny. But that would be deja vu.~

The next time you hear some wimpy Liberal whining about some perceived micro aggression, say to them, “To quote an oft used line in The Princess Bride, my little precious Princess… ‘I do not think you know what these words mean.” Then slug them in the mouth and say, “You cannot ‘micro’ that; there would be no point.”~

Since I’m left handed, I never need a Compass; I just use my southpaw.~


Since there is no longer rule of law in this country in high places, such that no one in government is held accountable, and the very laws they write are themselves violations of law (unconstitutional), and government itself is the biggest criminal… I reserve the right to violate ANY law at ANY time for ANY reason.

My authority is the Constitution, my basis the Pursuit of Happiness declared therein, my means is Civil Disobedience, my support is the Second Amendment, my argument the First Amendment, and my goal is the Redress guaranteed therein. I rest my case, and those who choose to oppose me may rest in peace, if that be their choice. No appointment needed.~


An election process is like a stale fast-food hamburger. On the outside it looks big and besprinkled with seeds of wisdom. On the inside are secret conspiratorial sauces and lies about quality and quantity of substance, and wilted vegetable-like promises. Do you want fries with that? Cold, greasy, and slimy press coverage.~

Never wander around in the dark. That would be you watching TV ‘news.’~

When people talk about shooting at dummy targets, are they hinting at politicians?
Is that why you never see politicians at a gun shop or shooting range?~

I encourage free speech. And, I own the concession on ear plugs in the District of Columbia.~

Cat got your tongue? I don’t know how you can stand there so silently, I know I’d be screaming; that’s got to hurt like hell.~


PC Friends?

Politically Correct is not for me, my friend,
the 1st Amendment says I’m free to offend.
My words, ideas and actions do not pretend,
that you’ve no right against them to defend;
just do so to my face with honor and it will end
with agreement or no, but still friend to friend.


Waiver Not

Never Opt for signing a waiver,
never waiver in copping a sign;
raising up high a middle finger,
rather than your rights to resign.


Prosthetic Prose

Prose is prone to rhyme in a rhythm so quaint,
but to intone it sublime; a sure given it aint’


Alien observer’s notebook: Man is a lousy Plumber. He must think the Ocean is impure because he keeps trying to filter out the fish with giant mesh filters. Silly creature. When that doesn’t work, he drills holes in the Ocean floor to drain the water out.~

Someone said I might should listen to Meatloaf on CD. I don’t get it. As soon as I put a slice on the CD, it stopped sizzling and I couldn’t hear a thing.~

Does the FCC really know what they are doing? I find myself waking up to AM Radio, so I know what they mean when they say ‘Morning Radio.’ But while I can find an FM station, I can never seem to find a PM station. They need someone from the NyQuil folks to run the outfit, I think.~

The answer to the age old riddle: what came first, the Chicken, or the Egg? Answer: neither; it was the Rooster. (surely, someone else said this somewhere, sometime earlier)~

I must be a looser. There was this gal I liked who always bought fresh produce. But when I got fresh, she just slapped my face.~


Big Enough

To big to fail cost you and me,
for bailouts, and lost property.
To big to nail, cost prohibitively
the national debt ridiculous, be.

To big to jail cost you and me,
for hall passes for Mz Hillary.
To small to hail, just you and me,
our vote has no voice collectively.


It’s It

Time to offer up a bit of wit.
Something funny to any Brit?
Are you worried just a we bit
about a future Brexit bad sit?
Afraid there’s no way out of it;
to escape a daily diet of shit,
Mushrooms often get slit and bit.


Falling Sky

Chicken Little a warning did brae,
none believed in what he did say.
Many long years since passed away,
we still refuse to believe him today.

Yet Planet X and Wormwood obey
God’s Will and ARE heading our way.
The moral to me seems thus to say:
good Chicken Littles should now pray;
for it is written, “None knows the Day,”


I never did well in Science Class. I still don’t know the conversion factors between celsius, farenheit, and college degrees.~

Hillary avoids Potatos and Corn. She knows they have eyes and ears and might testify.~

Gmail just informed me my folder :”Hate Mail” is full. Half of it is from Democrats, and half from Republicans. The difference is, the Republicans tell me exactly why they don’t like me, and the Democrats only tell me how they feel.~

Taxes are a fiction, just as are the wages taxed; when the dollar is nothing but an I.O.U., you never really get paid, and so, you can never really be taxed or pay taxes, either. Credit and Bank Loans are a also a fiction, just as are the checks (also I.O.U.s) used in obtaining the loan or repaying it ­– and the bank didn’t even have the money to loan in the first place (allowed to loan up to 20 times their bank deposits). We just keep spoofing each other to solidify the illusion.~

If you still hate someone after putting yourself into their shoes… then they are obviously too tight because you are too big in your own mind for your own good, fat head.~

Be thankful I’m retired. If I was doing this full-time, I’d bore you to tears.~

Now days, the only way to achieve inner peace, is to scream at the top of your lungs for the politicians and newsmen to fucking go to hell, until they actually do.~

Dear government, and megacorps: Winning is not taking rights away with legislation or getting the contract for weapons to be used at Armageddon. These things are mutually assured destruction.~

When people say not to worry about things, “They will get better,” I think they must mean that the things that worry you will get better at doing that.~

Never take the last train from Clarksville. Its full of Monkeys.~


Theorist’s Conspiracy

Open the door to news of tragedy obscene. The lunacy involved, what can it mean?
Turn on the light and survey the crime scene – see Rats scurry trying not to be seen.
Catch one, make it come squeaky clean: Federal ties found amid many lies between.
Note all such oddities you might glean, contrary to the official story quite glassine.
Compare to what others have seen, conclude just what it really all does mean.
Forget now all you once had been, you’re now a conspiracy theorist, a sin.


In case you are wondering, yes, I used to do stage comedy in talent contests. Often got a first place. That was great; being the first person put on the bus out of town, I got to choose the best seat.~

Let me apologize in advance for insulting you. I’m not going to stick around in case you start swinging.~

The Federal Gov has gotten to be such a big asshole that it doesn’t even have to fart to stink up the whole country, but it does so continuously, anyway. If Hillary is elected, she plans on feeding it beens and drinking water from Mexico, giving new meaning to when the SHTF. I’m thinking Trump is the BEANO.~


A Noun is a word that has a ROCK solid object identity.
A Proper Noun tells the actual name or title, my dear SIR, or may I call you JOHN.
A Pronoun is an Avatar stand in for IT.
An Adjective tells you a IDENTIFIABLE personality.
A Verb is a word in MOTION.
An Adverb tells you its VERY measure.
A Preposition pre positions the Noun TO Verb relation.
A Conjunction forms a junction function between word thoughts, SO don’t get confused.
A Contraction is a contracted attraction giving traction to two words as one, a marriage licensed by apostrophication, or a foreshortening of a word as a slang thang for those who were THINK’N they HADN’T the time or space for two words.~


I had a Checklist but can’t use it as I haven’t written a check since Debit Cards came out.
I had a folding Map but I can’t follow it because there is no place in my car’s dash to plug it in.
I had a Plan but I can’t follow it because the steps don’t appear on the Dance Dance Revolution pad.
I had a contract but I don’t abide by it because I already held both the first and second Parties. Sorry I didn’t invite you.
I had a Letter but Sesame Street is now on a channel I don’t get.
I had an envelope but didn’t give a lick.
I had a Folder but since I no longer need the checklist, plan, contract, letter, or envelope, I threw it away, too.~


A Conservative Politician in Office is conservative in measuring out his power to avoid angering the voter; he fears the people, where a Liberal believes that governmental power is end all-do all, and they use/abuse their power to manipulate the people by fear of government.

A Conservative Government heeds its own laws by conservative judgment, where a Liberal tends to apply grains of salt, rationalize, and bend slightly, each time taking more liberal advantage until it is in time fully lawless.

A Conservative Government writes Laws which are conservative in principles within the limitations of its Charter (The Constitution, Bill of Rights), where a Liberal (by the above means) takes liberties in lawmaking which take liberty out of the Law; they become increasingly unconstitutional and negate the Bill of Rights.

A Conservative Policy must always fit the national interest in obedience to Sovereignty and which honors the Charter, where a Liberal is interested in reformation to a new model, almost always globalist in nature (i.e., favoring United Nations, One-World Government) and is willing to sacrifice the Charter and Sovereignty for that agenda.

A Conservative Politician thinks in terms of limitations per the above, which allows personal and corporate governance to be at ‘”Liberty” to flourish and pursue happiness and wellbeing, trusting the people to seek what they will for their own good, where a Liberal thinks in terms of socialistic Agenda which stifle or suppress these things ‘for the good of the people, of whom they think cannot be trusted.’

A conservative understands that to become elected or to move legislation, there must be an accommodating compromise between the ideal and the attainable, where a Liberal will promise anything to get what they really want, or take any drastic measure to get what they want, even if it means legislation which cannot possibly achieve the stated purpose, and especially if it serves some unstated agenda per the above.~


Panic is in abundance, as is a loose tongue, when the SHTF. Calm reason and restraint is called for. Take a deep breath, grab a cold beer and reflect before commenting. But if the bullets are flying around you, SHOOT BACK AND SAVE THE DIALOG FOR LATER. That’s when you will really need that beer.~


Why do they call them a POEM when no other word quite right rhymes with poem?
Why do they call them a JOKE when the point is a hard straight poke?
Why do they call them a SONG when it’s really a sing?
Why do they call them a RIDDLE when the answer is a clue in the middle?
Why do they call them a SPEECH when it gives you the claps or makes you boo who?
Why do they call them a REport, REmark or REply when it’s actually the first time?
Why do they call them a QUESTion when instead of taking the path to the answer on your own,
you leave it to another to do?
Why do they call them a PARagraph when there’s really only one?
Why do they call them a SENTENCE
when they rarely involve a judge?
Why do they call them a STORY when they don’t have walls, cielings, or floors?
Why do they call this a POST… oh, wait, I know: because that’s what it’s as dumb as.~


Why is it that you can talk to ten strangers and 7 or more of them will believe or agree like minded if you tell them…

About a UFO you’ve seen…
About 911 as an inside job…
About Global Warming as a sham…
About CIA and the mob killing JFK…
About chemtrails vs. contrails…
About a Bilderberger NWO/Illuminati conspirators…
About mind control, gang stalking, Voice-2-Skull…

But when you talk to ten lawmakers, law keepers, medicals, or reporters about any of that…
You are suddenly crazy to the point of risking forced evaluation?

Because the System and its professional armies are taught not to believe in the boogyman (who arranged for their lessons).~


The addage “Follow your dreams…” with respect to career can end terribly, UNLESS you take the RIGHT path:

1 toe in the water as a hobby… Insures you really do like it and have basic skills required.
2 build a boat taking courses in the trade, even if mail order or online. This will confirm
if you have actual talent. If not, start over w next best passion.
3 float the boat as intern. This will educate you as to the harsh realities and negatives of the
trade. Lets you confirm you like it, and regardless, gives a leg up on others for getting the job.
4 if you get this far, set sail as employee, setting aside savings. You WILL do well if you are ‘all in,’
what some call the ‘work ethic,’ which is simply doing your best.
5 with savings, buy a yacht by starting your own firm. That will plot a course to your dreams.

More: at all levels, start a small home-based business for both the experience, income, and tax benefits. This allows you to build resources (eg, instruments for a musician) less expensively and helps build your resume, client base, networking resources. I have NEVER not operated my own business since entering high school, and most related in their start to my first entry into a given field of work, at the hobby stage. I have therefore mastered and become successful in many fields and industry sectors, and despite having only a high school education, I’ve been granted four experiential degrees for the purpose of teaching at college level.~


My Mom always told me not to play in the street. She was right. The freeways are much more fun – if you are agile and don’t mind the blaring horns and screeching tires…~

What did the politician say to the activist? Nothing. He doesn’t pay attention to those voters, either.~

You are free to disagree with me as long as you understand I am never wrong and never make a mitsak ni anteing I sae.~


Modern Debate

What I believe is true. If you disagree, screw you.
I know I’ m right, I do. I’m clearly smarter than you.
Don’t you dare try to argue – untill your face turns blue:
What I believe is due – to claims I find undeniably true.

Your facts will not do, they confuse what I know is true.
Such reality I pooh pooh, my mind made up for me, you
see; I won’t listen to you. What’s that you ask askew?

No, I no not just who said, but some kind of Web guru.
Its not important just who. But I know it surly wasn’t you.
What I believe is true. If you don’t agree, boo hoo to you.
Truth’s what I want it to be, no matter what you say or do.


A Democrat Congressman and a Republican Senator walked into a bar… Wait! That’s already as big a joke as can be…~

Notice: please note… In case you haven’t noticed before. Have you ever noticed there is hardly ever been and important notice delivered or posted such that you actually noticed? Nah, I bet you didn’t even notice any such post. I hereby give notice that, if you noticed this post, or not, this notice is not such a notice, but merely a post giving note to such.~


Dos You Got Down Wid Wad I Be Say’n Bout Dis and Dat, Bro?

Dis, Dat, and Dos, as ‘hip’ as they could be, went into a bar to get a drink. Dos bought the 1st round of beers. Once served, Dat said “Dis be good ‘n stuff.”

Dis replied “I try to be good like dat, you know? Mama sez to.”

Dat saw Dis was confused, “Thank yo for the compliment, Dis, but dat not wad I meant. We all be drink’n da same brew and dat be good’n stuff.”

Dis and Dat seemed confused. “Look, Man, dis is on tapn we don’t be know’n wad it be,” he clarified.

Dis choked on a swig. “What yo say, bro? No one be tap’n on me, so natch, I dont know wad it be.”

“No, Man,” Dat tried to explain further, “Dis beer be tap beer. It be good, but ah dont know wad it be.”

Dis, at least, finally understood. “I got yo drift, now, Man. But I heard dos tap beers were cheap’n stuff. You know, po shit wid no taste. So wad dis be?”

Now Dos complained. “Wad yo mean… yo be sayin I bought cheep beers?”

And now, Dis was confused, once more, too. “I be just fine, bro. Why yo ask wad I be?”

At this point, the bartender happened by. “Hey, Man,” accosted Dat. “We be wond’rn… Wad be dis here beer?”

Dat be Dos,” he replied simply. “Dat be good, n stuff.”

Dat seemed upset, now. “Look, man, we been all through Dis be’n good, n stuff. But if yo be say,n I sho nuff should be like Dos… dat Dos be gooder,n me, I take ‘ception to dat. Yo don’t know Dat, and yo sho as Hell dont know me.”

Now Dos was miffed. “Hang on a sec, man,” he said to Dat, “yo sayin yo better’n me?”

Well, things went down hill from there and it looked like a fight was about to break out, when the bartender tried to calm them with clarification. “Dis be rediculous!” he started.

But Dis did’t give him a chance to finish, and knocked him on his ass!
 “Ha!” he exclaimed. “Yo dumb ass be’n on da flo wid yo dumb fat mouth bleed’n wad be rediculous.”

This unexpected event had disrupted the conflict between Dos and Dat long enough that they had calmed down. Dis suggested they leave, and all agreeing, they stormed out in a huff.

As they exited, Dis noted “We stiil dont know wad dat beer be. I sho nuff wish I knew.” 
The others agreed, none of them noticing the neon sign in the window reading “Dos XX on tap.”~


If Trump is such a chump we’ rather dump, and Uncle Bernie is ample wormy and too squirmy, and Hillary far too shrillery under FBI drillery, then does that mean Biden is bid’n his tim’n in decid’n if rid’n White Knight style last minute to the Demo’s how we’ll be decid’n who’s presidential presid’n?~

What happens when a Socialist politician, an establishment Democrat, a non establishment Republican and an establishment Republican go into a Bar and call for a round on them, each? The price of drinks goes up, the waitresses worry about deportation, the bartender adds water to the drinks, the bouncer calls a reporter, and the Janitor worries about having to clean up all the bullshit that’s about to be spread. And, the patrons realize the hangover isn’t going to be worth it, and they leave.~



Ferrari facing cataclysm!


Fractured Isms.


Ferris Beuller (Matthew Broderick) had it right. “A person should not believe in an “ism“, he should believe in himself.” In other words, don’t be a follower of someones ideas. If you want to make a change for the better, YOU are what you’ve been waiting for.

Here are some (twisted) examples of perhaps why isms can be problematic…

Capitalism: You have two cows. Sell one and buy a bull to start a cow factory. Worship in any church you want as long as you tithe a portion of your stock options. John Lennon is a famous millionaire singer invited to sit on your Board of Directors. Apple Computer stock looks attractive, so you merge to form Cowpile Computer.

Socialism: You have two cows. Give one cow to the government to slaughter and share with the poor. You worship in any church which is left or right of center. John Lennon is a folk singer of meaningful Marxist ballads. Apple Computer is bailed out by Congress whenever its stock falls below that of Microsoft.

Communism: You had two cows, but now the State has them, and may or may not give you some milk – if you are willing to stand in a long line. You do not go to church except to attend Party meetings. John Lennon is a decadent influence on youth. Apple Computer never was, because they refused to allow government to take more than one bite of it as it would ruin the logo.

Fascism: You had two cows but the government forced you to sell them to corporations for beans (magic or otherwise) who in turn sells the dairy and beef products back to you for huge profits. You go to the same church as the fearless leader, or you don’t go at all. John Lennon sounds like he was related to a Marxist and so he was shot. Apple Computer was burned to the ground in order to blame Compaqism and sweep Bill Gates into power.

Nazism: You had two cows but the government arrested you for hording and took them. You and your religious fanatic family are burned alive in your church for refusing to Sig Heil. John Lennon was in there with you, singing Give Peace a Chance. Apple Computer users are arrested and sent to camps for daring to ‘Think Different.’

Anarchism: You have two cows running down the freeway causing car wrecks. Shoot the tax collector, steal his money, and rape his dog (unless a hunting dog – but since it is a government dog, we know that dog don’t hunt.) You blow up the church. John Lennon sings Revolution. Macintosh Computers have a high repair rate from all the bullet holes.

Constitutionalism: You have two cows and the government cannot unreasonably search or seize them without a warrant, or prevent them from mooing, or prevent you from owning them and forming a militia of fellow cow owners who meet weekends and practice milking with dummy targets. You can’t figure out which of the thousands of churches to attend. Neither can John Lennon, so he writes Imagine. Steve Jobs was a Founding Father who wrote the ‘Consitution for the rest of us.’

Patriotism: You have two cows painted red, white, and blue. Your church supports the current war. John Lennon is boycotted, and so he has a sleep in. Apple is not sold to anyone unwilling to pledge allegiance to Microsoft products.

Militarism: You have two cows which you have convinced each that the other is seeking to invade their own private pasture. You sell arms to both sides. Your church owns stock in your company. John Lennon had his visa revoked because he was a pacifist who smoked pot. Apple Computer is what makes smart bombs smart.

Pacifism: You have two contented cows which give canned milk. Your body is your temple (and you are what you eat.) The government is headed by John Lennon. Apple Computer listens to its customer complaints.

Fatalism: Your cows died after you stopped feeding them because you figured they would just die, anyway. It was the same reasoning by which you determined God is dead. You never heard of John Lennon. Apple System error messages all start with ‘You should have known better than to think this wasn’t going to happen…’

Surrealism: You have a pasture full of Dell Computers searching the Web for the best price on a Macintosh. The government worships you. There is no John Lennon, because he would have made sense, so he instead turns out to actually be Ringo Star, who never quite did.

Bushisms: Is your cows in my Big Mac? I’m a God fearing man on Sundays. Which one is Lennon, and which one is Lennin? I will not have one of those damned Macs on my desk. Jobs didn’t contribute one cent to my election fund!

Clintonisms: Wow, look at those udders! I’m a God fearing man on Sundays. I liked John Lennon. We had a lot in common. In fact, I inhaled once, myself. I don’t know about granting Apple a GSA contract… they didn’t contribute to my election fund.

Obamaisms: Your cows are being detained indefinitely to combat terrorism. I’m a God fearing man on Sundays, unless I’m playing Golf. I liked John Lennon. I had FBI sue Apple Computer, who wouldn’t let me spy on iPhones, and didn’t contribute to my election fund.

Note: If you like the isms, they were lifted from a page full of additional jokes of greater complexity than the bulk of material in this post. Find them here: To Laugh in the Face of the NWO is the Best Form of Contempt.


What Will You U$E For Currency When T$HTF?

The more we move toward a cashless society, the more we are at risk should some financial, political, or natural disaster transpire which weakens or destroys societal and governmental dynamics. What people will accept in payment or trade for scarce and critical supplies could threaten your life if you don’t have any, or the cost may be more than you can afford, if you do. Here are some ideas to help you be prepared.

by H. Michael Sweeney    facebook

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

In this post you will learn…

• what makes money valuable is also what can make it worthless;

• plastic and precious metals are useless in the aftermath of crisis;

• why government frowns and suppresses barter, and why to embrace it anyway;

• cash is usually aftermath King… but not always;

• whole new currencies evolve in serious or long term aftermath.

What money is, and why it has value

Money is nothing more than a convenient way to conduct ‘commerce’ (trade goods and services) with a standard and portable stand-in for something else of value. For this to work, all people within the trading area must agree to use it as such, and ‘it’ must have a definable and concretely known value. Any system of money is best handled by the local government, be it a tribal village in ancient times, or a modern industrialized nation. Or, it can be done by a network of banking and financial institutions, or even a combination with government. As we will see, banking options are good for them, bad for everyone else.

The later is what we have, today, and it suffers two problems most of us are aware of, both stemming from the banking side. To fully appreciate that, we should step back in time just a bit. Please take the time to read what you may otherwise presume already to know, because the points made in this section will play to remaining sections in critical ways. This is because only governments used to issue money, and to establish its value, they could not and dare not create money unless they held something of value in reserves somewhere, something of concrete and great value to back it up. Most nations, as did America, used Gold; the ‘Gold Standard.’


Whatever the value standard was, a citizen could go to a bank or government Purser, and demand to trade in the currency for its value in that item (i.e., Gold), or vice versa. This system guaranteed the value of the currency to a known unit of measure, and tended to help establish and maintain a stable economy, and made international trade viable; each currency had a concretely known valuation, and established trust between nations that the standard item, itself, could be obtained, if desired, to settle any balance of trade debt which might exist.

Then came the banks with their own idea, called Central Banks, which enables the printing of Fiat Currency, which is money which has nothing of value backing it. Enter the Federal Reserve Banking System. It has cost you and me a significant sum of our personal lifetime earrings. Some say we have literally been sold into slavery to the banks. Learn more about exactly how much it has cost you personally, here. Many, as do I, call it Treason, including the prophetic warnings of our Founding Fathers:

• “If the American people ever allow private banks to control the issue of their currency, first by inflation, then by deflation, the banks…will deprive the people of all property until their children wake-up homeless on the continent their fathers conquered…. The issuing power should be taken from the banks and restored to the people, to whom it properly belongs.” – Thomas Jefferson in the debate over the Re-charter of the Bank Bill of 1809 (millions of us, including myself, did wake up homeless with the Mortgage Derivative Collapse and associated ‘too big to fail’ bailouts, and we have had nothing but inflation and deflation cycles, not to mention devaluation of the dollar since establishing the Fed)

• “I believe that banking institutions are more dangerous to our liberties than standing armies.” –Thomas Jefferson

• “… The modern theory of the perpetuation of debt has drenched the earth with blood, and crushed its inhabitants under burdens ever accumulating.” -Thomas Jefferson (a reference to the National Debt)

• “History records that the money changers have used every form of abuse, intrigue, deceit, and violent means possible to maintain their control over governments by controlling money and its issuance.” -James Madison

• “If congress has the right under the Constitution to issue paper money, it was given them to use themselves, not to be delegated to individuals or corporations.” -Andrew Jackson (Banks are corporations)

• “The Government should create, issue, and circulate all the currency and credits needed to satisfy the spending power of the Government and the buying power of consumers. By the adoption of these principles, the taxpayers will be saved immense sums of interest. Money will cease to be master and become the servant of humanity.” -Abraham Lincoln (the Fed is all about interest paid to the banks for every dollar printed.)

• “Issue of currency should be lodged with the government and be protected from domination by Wall Street. We are opposed to…provisions [which] would place our currency and credit system in private hands.” – Theodore Roosevelt (in the long-running debate about establishing a central bak.)

But the Fed would become reality just in time to pay for WWI with fiat money. But that was not the first time. In the early days of forming new States within the United States, Banks could also print their own money with no attachment to or obligation of government, hopefully backing it up with some kind of standard; a certain degree of trust was involved, and many people found that their banker was a crook. This practice, both legitimate and criminal, was especially common in Gold and Silver mining towns, where shipping precious metals was risky due to bandits. Other negotiable instruments also came to exist, which can similarly be thought of as forms of money. Stocks, Bonds, Notes, Futures, and more. But these featured valuations tied to more complex and less tangible things, and were not simple enough for usage as currency except with brokers and special institutional trading firms.

But several new ways for banks to print their own money also arose which were useful enough by all. One is the ‘Check,’ your checking account. It is merely a highly organized and easily validated (to a point) method of trading in I.O.U.s. Anyone can write an I.O.U. on a any piece of paper, and if the other person accepts it as a debt, and the writer honors it, it has value. And, it can be passed from one person to another until paid, like a Marker used in the underworld.

But people do not trust strangers, and the bank’s checking systems addressed that by using the bank as a kind of validation and tracking of the debt, and the debtor. The underworld uses fear and organized crime to do the same with markers. And, do we not fear the wrath of our banks and the law should we write a bad check? This is called debt bondage, a very real and powerful political and social control system that keeps the locals, that’s you and me, in line for fear of loosing all they own. Unless, of course, you simply choose to  opt out, as have I.

As far as checking is concerned, eventually, the check must be traded for real currency, so no new money was actually created, but while in circulation, the total amount of ‘money in use’ is greater than had been printed, a pseudo inflation factor. Today, some 20 billion checks are written each year, with a value of 26 trillion. To put that into perspective, it would pay off the entire National Debt with money to spare. It is also roughly 20 times the value of all U.S. money in circulation. So is the National Debt, and though no causal connection seems to exist, it is an interesting coincidence, is it not?

Banks also ‘print’ money by loaning money that does not exist. They are allowed by law to loan up to 20 times the money they hold in their vaults from depositors. They write a check, and you then use that ‘money’ to write more checks for whatever purpose the loan was intended. They get deposited somewhere, and eventually returned to the issuing bank. You make monthly payments to the bank, money against which more loans can be made. As long as less than 1 in 20 of loaned dollars is converted to cash withdrawal, the bank has gotten away with printing at least 19 defacto dollars; another pseudo inflation factor. A loan is for fictitious money, and how to you repay a fiction? A question well asked, and some have an answer which will astonish you, and though giving you hope, you will fear it, as well.

The worst offender is the Central Banking System, which allows governments to print money with absolutely nothing behind it; no standard. The government itself is printing nothing more than an I.O.U. The Bank, in our case being the Federal Reserve Bank (the Fed), which is NOT a Federal Agency, but a banker-controlled corporation. The Treasury prints money in the form of Federal Reserve Notes backed only by interest bearing Treasury Bonds given to the Federal Reserve (functionally, an I.O.U.), and the Federal Reserve Note is itself therefore also an I.O.U. Some of these are sold to anyone wishing to buy them, quite often hundreds of millions of dollars held by wealthy men of note, but also, ordinary citizens. Those unsold are held by the banking cadre.

This is an automatic inflation driving machine for several reasons, not the least of which is it allows government to fund any massive and costly adventure without worrying about actually paying for it, as long as they are willing to drive up the National Debt, which no one is ever going to pay off. The downside is, of course, that our purchasing power continues to dwindle, and at some point, the dollar will need to be officially devalued, and only YOU and I will loose in that deal. Meanwhile, every increase of the national debt is de facto devaluation; you and I loose purchasing power as if officially devalued. Simultaneously, more and more of tax dollars go to the FED to pay off INTEREST (only) on T Bills, and that money goes directly to the bankers. The debt is NEVER reduced.

If it were, the Fed would actually collapse. Here is an explanation from David Graeber, and English Anthropologist, regarding the first central bank in existence: “In fact this [debt] is precisely the logic on which the Bank of England—the first successful modern central bank—was originally founded. In 1694, a consortium of English bankers made a loan of £1,200,000 to the king. In return they received a royal monopoly on the issuance of banknotes [their ‘Fed’]. What this meant in practice was they had the right to advance IOUs for a portion of the money the king now owed them to any inhabitant of the kingdom willing to borrow from them, or willing to deposit their own money in the bank—in effect, to circulate or “monetize” [create fiat currency] the newly created royal debt. This was a great deal for the bankers: they got to charge the king 8 percent annual interest for the original loan and simultaneously charge interest on the same money to the clients who borrowed it, but it only worked as long as the original loan remained outstanding. To this day, this loan has never been paid back. It cannot be. If it ever were, the entire monetary system of Great Britain would cease to exist.

There is much more which can be and should be said, but this is not about the evils of the Federal Reserve or financial institutions. The intent was simply to give a glimpse at what money is, and what makes it valuable (or not), in NORMAL circumstances. And, in normal circumstances, the ONLY thing which makes Federal Reserve Notes valuable is a law passed in support of creation of the Fed, which says and which is echoed right on the money, itself, that it is good for all debts, public and private; should you refuse to accept it as such, the debt is forgiven under that law; we are forced to accept it.


But what happens when TSHTF?

In any serious financial, societal, or natural disaster, all bets may be off, and cash may either become a monstrous burden, or have no value at all. To the extent that social systems and governmental control fails, or their function is diluted, the value of money can suddenly become undefined, except by the seller. It is not just a matter of free-market price setting, but weather or not the seller will see value in money, at all, the government no longer being in a position to enforce the law which says it must be accepted.

Pre War Germany was in financial crises which ultimately helped to sweep Hitler into power. Here, a woman purchases some food with a basket full of money. Germany's inflation rate was so high that they were printing 100 billion Deutchmark bills (i.e., a single $100,000,000,000 bill) for public use.

Pre War Germany was in severe financial crises which ultimately helped to sweep Hitler into power. Of course, he blamed the Jews, who had nothing to do with it, but scapegoats are easy to come by when people are scared. Here, a woman purchases some food with a basket full of money. Germany’s inflation rate was so high that they were printing 100 billion Deutchmark bills (i.e., a single DM100,000,000,000 bill) for public use. MONEY WAS ESSENTIALLY WORTHLESS. Welcome to fiat currency run amok.

Some say to hoard precious metals for such crisis, but that is foolishness, because you can’t spend gold. For one thing, it is too valuable, and another, it is too difficult to validate without special chemicals, scales, and knowledge. How does the seller know it is real Gold, or what its actual value currently is? Not only will there be an issue as to weight, which is multiplied by a given value per ounce, but there will be no way to know (where a crises involves loss of communications), what the actual current value per ounce actually is. The wise seller must therefore significantly undervalue any metal offered in payment.

And how do you buy something low in value with something high in value, when there is no way to ‘make change?’ Hoarding Gold is fine for long-term protection of large cash holdings, but it is next to useless and extremely costly to attempt to use it as currency in a crisis.

THEREFORE, if actual money starts to fail in usefulness, whole new currencies will arise.


What will be the new currency in a crisis?

Yes, new currencies, and nothing like money as we know it. But like money, where it is still accepted in a crisis, the value thereof will be determined mostly by the seller, and this will give new meaning to the expression, ‘shop around.’ The most common alternate currencies will become food, water, fuels, and ammunition. Too a lesser degree, anything in high demand and low supply, such as weapons and tools, or anything key to survival. Being aware of that in advance is a great advantage, because there are two things in common with all these items which allows for good preparation.

The first is, that they have a relatively low value now, before there is a crisis. You can afford to stockpile, and would be wise to do so, taking into consideration storage space requirements and shelf life. It would be good to have at least a small hoard of each item in quantities greater than for reserves for personal consumption during the emergency and, where storage space, shelf life, and finances permit, to perhaps have a large hoard of one or more items on the list to become your personally favored currency.

The second is, that anyone can produce them, themselves, to one degree or another, both before and after a crisis. Anyone can sink a well or fetch water from nature, and transport it to where it is less available for ‘profit.’ Anyone can grow and store food if they have the land for it. Anyone can chop wood or make alcohol (fuels) if they but arrange to do so. Anyone can reload spent munitions if they have a loader and can obtain gunpowder, and for the matter, anyone can make gunpowder if they know how to find the raw materials and they are locally available.

Lead for ammunition is another matter, but it is cheap to buy ahead of crisis. So the purchase of a supply of lead and tools to form bullets and reload might be a great idea. Yet most people will not do any of these things, or cannot due to finances or lack of knowledge, and it is exactly that which gives them an excellent future value – extra value, in fact, because in aftermath situations, the normal supply chain of these things has been interrupted or entirely cut off, and access to the knowledge or finances to acquire them with it.

Once TSHTF, you are locked into your current state of affairs; you are either prepared to offer the right currency at an affordable rate, or you are slave and at the mercy to/of those who can. Only one of these two groups has a good chance at survival. That is the worst kind of debt slavery.


Barter, the alternative currency

Click to get a glimpse at doing your own barter from a legal perspective.

Click to get a glimpse at doing your own barter network from a legal perspective.

The government hates barter and suppresses it in a mountain of laws restricting its use. Barter is, in fact, the basis of the new evolving currencies just discussed. But for those in that second, hapless group just mentioned, they may be able to survive for a while by bartering with their earthly possessions, albeit at a costly rate of exchange. A $3,000 professional video camera might be good for a tank of gas, or a few days worth of food; what value is there in a video camera without electricity? But it might be accepted if there is some hope that, eventually, power will be restored, or if the parts might be useful to a tinkerer seeking to build something mechanically useful.

But barter can work well, even before a crisis, despite the laws. The laws are there because the barter concept tends to ‘cheat’ government out of taxes. If you buy something with dollars, you got taxed on the income from whence you got the dollars, and the seller is taxed on the income he earned, and there is likely a sales tax, as well. In barter, as originally conceived and employed before the laws existed, you simply gave labor in exchange for items, or traded items. As long as both parties agreed the exchange was acceptable value given for acceptable value received, it was a done deal. Yes, sometimes one side might feel the value was short, and ask for augmentation with a little cash thrown in.  Or not.

Barter best works in a network situation involving more than two parties. You have Oranges and want Apples, I have Grapes and want Oranges, and someone else has Apples and wants Grapes. No problem, a three-way swap. But to do that takes an organized network with the means to track what is needed and match it to what is offered and available elsewhere. Barter associations or organizations are set up, and of course, that takes effort and manpower, and a building that has monthly rent, and other things which take actual money.

The other thing a barter group could do, was to accept goods or labor obligations (I.O.U. for work to be done) as if a deposit in a bank, against which the member offering such could make some combination of present or future withdrawal of other goods or services as they became available and needed. This allows conversion of unwanted or surplus items into future barter trade power, rendering the barter group as a kind of retail store and universal service provider. Again, government does not like anything resembling a bank in procedure, and would normally tax a retailer on inventory.

As all these functions take money to facilitate, barter groups would charge a small fee for a transaction based on the dollar value of the transaction. DOLLARS were still used as the MEDIUM for determining TRADE VALUATIONS. That meant creating a corporate entity to facilitate and organize barter transactions, and typically, charging a membership fee to allow access to the system. That was what led government to take interest in and to legislate against barter; such systems could quickly grow in membership and began processing huge numbers of transactions, some of which were themselves huge in valuation.

I, for example, belonged to such a group, and in a single transaction, moved $35,000 in goods, against which I would acquire needed goods and services which enabled me to live more inexpensively for a full decade — until the government passed laws which forced the barter group out of business, and started taxing everyone involved to the point where the advantage seemed lost. But it need not be that way, especially once TSHTF.

You can join an existing barter program, but if you do, you should also form your own local barter group, because the big programs will not be available in a crisis. Anyone do so without formal corporate existence, and without charging fees, and without a retail or banking format. I highly encourage it, though you should check with a lawyer as laws vary State to State (click the above image for the Oregon situation). Yes, there will be some concern about tax reporting, but that is a minor issue unless you start dealing in large volumes of goods and services. Frankly, most people who barter this way report nothing, because unless it is in volume, it isn’t even worth the trouble to track and report it, not to them, or the government. But the VALUE is in HAVING A NETWORK IN PLACE IN A CRISIS…   priceless.

When TSHTF, especially if communications are down, it is both difficult and even potentially dangerous to attempt to form a network. Danger stems from the fact that, unless care is taken to avoid strangers, you may offer to form a network, in which case you state what you have of interest, and if they think they have more guns than you, and want what you have, they know where to get it without cost. Moreover, mutual defense is a thing which can itself become a barter commodity, assuming you have the guns and manpower of good use to others; it is, after all, another kind of service.

So to prepare for a crisis, don’t just hoard key supplies, but establish a barter network, even if you do not choose to use it. Doing so amplifies the value of your preferred currency, because you already have people willing to accept it fairly. Consider these words of wisdom:

• “The propensity to truck, barter and exchange one thing for another is common to all men, and to be found in no other race of animals.” Adam Smith, Scottish Philosopher.

My take is that barter is natural to man, and as such, is an unstated free right to undertake at will – to hell with government, or in reverse, if government has gone to hell, what else do we have to trade with, but barter;

• “Capitalism invariably boils down to barter between two willing parties, neither of whom uses force to work with the other.” Ben Shapiro, Political Commentator.

When TSHTF, force becomes the only commodity the weak minded and hapless will have to trade with. To strengthen your defenses, you need something better, as well as a means of countering force with force of your own. A Barter network gives you both, where mutual defense agreements become a thing which may be bartered: If I have superior weapons and more gun bearers than you, an imbalance exists which might be offset in goods or other services.

• “In primitive society, Man produced directly for the satisfaction of his own wants, but with the development of society came differentiation of functions; exchange and barter arose, various trades sprang up, and with the necessity of commercial intercourse, cam the invention of money.” Charles A. Beard, renowned Historian.

This sums up this entire post in the most direct of statements: barter came first, money after. When money fails to function usefully, we must be ready to barter, either with a new currency of convenience, or outright barter networking. Our very lives could depend upon it.

Not fully convinced? Want more information?

May I humbly suggest some further reading about WHY you should worry about flying excrement from an unexpected fan, and also offer some additional valuable resources? Here is a compendium of useful material on the dangers of crisis and the topic of being prepared, not just in terms of currency, but other considerations which are well beyond the scope of this post. These are Facebook ‘pages,’ so you can FOLLOW them for updates. Please consider to Follow my blog, as well.

The Fema, Martial Law, Revolution Database. Don’t let the title scare you away; its a compendium of articles and posts about the likelihood and risks of various forms of civil unrest and social, economic, or natural disasters, as well as general advice such as found in the above post. It’s sub-name is When All Hell Breaks Loose.

The Post Apocalyptic Library. A compendium of resources where you can find critical how-to information needed for survival in a crisis. Everything from how to make a torch to how to make a portable generator from a lawn mower. The idea is to visit those sites and print the instructions, and place them in a safe place and in your ‘go bag’ so that you will have them when needed; they won’t be available once TSHTF.

Preppers Are Not Stupid; Dissonant Non Preppers Are Doomed

Even our own government, normally blind to problems until too late, has been warning us for years to be prepared for ‘something scary,’ and the list of concerns is very scary. The stakes couldn’t be higher: if even just one thing on the list takes place, being ill prepared can perish whole families and, in short order, whole communities. Here is something that can make a difference, and its free. Its called knowledge.

by H. Michael Sweeney  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.


In this post you will learn…

• What Preppers are and why they exist;

• Why YOU should become a Prepper, and HOW to proceed;

• There are 2 NEW and FREE resources to simplify the effort usefully

Note: I usually well footnote my posts so you can verify what I say for yourself. In this case, the two Facebook pages mentioned at article end, themselves, offer ample proofs for those items not otherwise footnoted.


The wise live for Today, but plan for Tomorrow: uncertainty is the only certainty

The Bible is the oldest source of Wisdom modern Man relies upon, and it clearly echoes that thought; there are no less than 25 places in the Bible which so admonish. A good number of these directly talk about the kind of preparedness this post addresses, while the remainder speak to being prepared for entry into the Kingdom of Heaven. But, if one is not prepared for things which can take one’s life, is not the later concern all the more important to prepare for, as well?

Perhaps the strongest and simplest of these are found in Proverbs (natch):

22:3The prudent sees danger and hides himself, but the simple go on and suffer for it;”

27:1Do not be confident about tomorrow, for you do not know what a day may bring.”

If we hold onto any one thing in this country, it is the wisdom of our Founding Fathers, and they were almost to a Man God Fearing and, therefore, they heeded such words. But they themselves also spoke plainly and logically about such things, and framed them in terms of the Nation, as well as the Individual and those we each love, to whom we are responsible for their well being:

John Adams, on the risk of overconfidence and reliance upon government: “I give you this warning that you may prepare your mind for your fate;”

Benjamin Franklin: “By failing to prepare, you prepare to fail;”

Alexander Hamilton: “If fortune should smile upon us, it will do us no harm to have been prepared for adversity; if she frowns upon us, by being prepared, we shall encounter it without the chagrin of disappointment. Your future rank in life is a perfect lottery;”

Thomas Jefferson: “Instead of considering what is past, however, we are to look forward and prepare for the future.”

George Washington, on wise use of funds, such that: “timely disbursements to prepare for danger frequently prevent much greater disbursements to repel it.”

Thomas Pain, on being fugitive from tyranny: “O! receive the fugitive, and prepare in time an asylum for mankind.”

The Modern Prepper and Dr. Strangelove

Early Preppers private Bomb Shelter of the 50's: Dig a hole, drop in some roofing upon a floor, and fill it in.That last quote brings us to the advent of the modern Prepper, a phenomenon brought about by the Cold War and fear of the Bomb. President Eisenhower spoke frequently about the need for Civil Defense Preparedness, and founded what ultimately became FEMA, the ‘Grandaddy Prepper.’ For the rest of us, we were encouraged to prepare for nuclear war in our thinking, and our behavior.

We were taught to ‘Duck and Cover,’ and to plan to flee the cities, or take to bomb shelters. The whole basis of our modern Interstate Highway System was to that end, and so that the military and other aid could quickly flow to any wound in need of dressing. Cold War tensions culminated in the dire climactic confrontation of the Cuban Missile Crisis, and firmly established the era of the Bomb and Fallout Shelters. There were, in fact, enough shelters built to save 100,000,000 Americans, millions being built by citizens in their own homes or back yards: Dig a hole, drop in a pipe and add a floor, and fill it in and stock it.


Why prep today? Darker times > starker threats > greater fears

For a time, I managed a gas station while investigating the Oil Industry. That led me to a face-to-face confrontation with terrorism which rendered the investigation superfluous. For those who do not appreciate or understand the Prepper, or why they do what they do, or for the matter, who do not understand Conspiracy Theorists, Truthers, or Targeted Individuals claiming mind control, I highly recommend working for at least 30 days in a gas station. Why? Because that is an excellent place to talk with a large number and a variety of people in the course of doing business, and elicit from them things they would never otherwise admit in open conversation.

sheepdip2I could ask almost anything, and if well proposed, obtain a deeply personal and meaningful reply. And I did, regularly, on on a wide range of topics. What I learned is that there are more people afraid of more things than the mere threat of global extinction from The Bomb and the ‘Red Menace.’ Terrorism, yes, and for more of a seriously right reason than the obvious, a reason unexpected even by them.

It is to me even scarier than the fact that terrorism exists. Few are aware, but the top ranking U.S. Military General, Tommy Franks (who brought the flame throwing tank to Waco), has warned in a public statement that if there is another 9-11 level terror attack in the United States, the Military will take over the government in nation-wide Martial Law. I, for one, do not want flame throwing tanks on my streets.

And, we are still threatened by nuclear war: China’s top military leader has stated that war with the U.S. is inevitable, the only thing remaining being to decide when and how to be the first to strike. And, we have recently learned, they have stealth subs we cannot detect; one surfaced unexpectedly in the middle of a U.S. Carrier Fleet in the middle of an exercise looking for subs. North Korea is constantly making threats, and Obama and Hillary Clinton have assured terroism-minded Iran has access to the Bomb. We have several times in the last year, alone, come close to trading blows with Russian forces which could easily have escalate to a nuclear exchange. And we supposedly like each other, now.

Moreover, as recently played out in the Press, we have learned that a single well placed nuke high in the atmosphere could cause an EMP wave sending us back into the stone age by wiping out all electronics, including the entire power grid. Just as bad, spurious energy waves from the Sun could achieve the same ends, globally, or for the matter, doomsday rocks from space could effect similar damage, or worse. Movie theaters are awash these kinds of with (Extenction Level Event) scenariosDeep_Impact_poster. But there are other fears, and each one seems, in turn, to begat another, often wilder and seemingly more far fetched… which unfortunately, do not seem all that far fetched if daring to explore the facts which are their basis.

Every few months there seems to be another new exotic biological threat, either a weaponized or natural pathogen or virus on the verge of pandemic capability. Each such threat additionally threatens to be incurable and impossible to stop in time because it takes such a long time to come up with defensive medicines. Then there is the risk of financial collapse, which could trigger a global replay of the Great Depression on an unimaginable scale. Civil unrest levels are at the greatest and most dramatic in all of history; the Occupy/99% movement spontaneously fielded many millions of people around the World in the space of days. Our government’s liberal policies and some unfortunate events have fomented racism issues to the point that Blacks are shooting Cops as if at war, and threatening worse.

We see paranoia rampant in our government, who treats us all as if terrorists in the wings, spying on us and taking away our rights, and leading to fears of Martial Law, and/or efforts to take away our guns. DARPA, on the other hand, has ordered billions of rounds of ammo, enough to kill every living soul in North America several times over. FEMA seems to be building large facilities some fear are closer to concentration and even death camps than to shelters. It is at least concretely true that several special inciner-ators have been built, each strategically located, and capable of efficiently destroying hundreds of millions of tons of contaminated materials — which could include human bodies. The fear of Fascism and the comparison of our government to Nazi Germany is commonplace, which brings me back to the dialogs at the gas pump, where these things were said. The most common phrase heard in response to such things was, “When the revolution comes…”

Then there is the dramatic increase in UFO sightings, and much more than that, a growing body of evidence of actual combat taking place. If chemtrails were not already their own perceived threat, consider the latest theory as to their purpose; to weaponize the atmosphere against alien aggression. There is actually some scientific basis for such wild theories, and some to additionally suggest there is an off-world secret space program with Buck Rogers-like Space marines using captured Alien technology. I don’t know about any of that, but the fact that the government is becoming more secretive about the UFO question than ever, before, does not allow me to discount the notion. Presidents Roosevelt, Regan, Bush, Clinton, and Obama, and even Putin, have all alluded to these possibilities, as well as have high ranking military. The recent discovery of a constructed mega-structure orbiting a distant Sun amplifies the possibility: we are not alone. And those at the gas pump agree. More people have seen UFOs or otherwise have reason to believe in Aliens, than not. Don’t take my word for anything in this paragraph; just tune into Ground Zero and scan the archives of shows with Clyde Lewis’ expert guests.

Dare we mention a credible Planet X, super volcanos, global warming and melting ice caps, mega earthquakes, the shifting of our magnetic poles, and any number of scientifically plausible threats and natural disasters capable of inflicting significant regional, national, or global destruction of cataclysmic proportion… or dare we say… Biblical? After all, the other common comment at the gas pump is, “We are living in the End Times.” Indeed, the Illuminati conspiracies, AKA The New World Order, are not difficult to validate with a barrage of demonstrable facts which defy coincidence. This author has made a case in several of his books that the ultimate goal of the New World Order is to form a One-World Government — in order for the Antichrist to have a seat of power, and usher in the End of Ages, the ultimate End Game. It IS prophesied, after all, and many of us fear that as much as anything else.

That brings us full circle, back to the Bible’s admonishments. Being prepared ought rightly be not only for bad tidings, but for salvation. The government agrees, at least with the first part. The last ten years have seen an unprecedented effort by the government to urge us to be prepared for disaster. They have even reinstated and updated the old Cold War emergency radio alert system, and are stockpiling huge quantities of everything from food and medicine, and other supplies, to coffins. And ammo. All they ask you to do, is to have emergency plans and a ‘go bag,’ or store of emergency foods and critical supplies.

It’s simply good common sense. Preppers have been doing this for decades. What’s your excuse? That they are crazy? Better look in the mirror, if you believe that.

Here are two simple and free tools to help you get started

Both are easy to use Facebook pages. One is a kind of compendium of information regarding the possible breakdown in civil society due to the inability of government to respond, or even perhaps government itself has gone terribly awry. It is called the FEMA, Martial Law, Revolution Database (kind of covers all possibilities). It has no subversive intent, despite the scary title. It is very informative, and can help push anyone teetering on the notion of being prepared into taking action. One way it does this, is by telling you what to expect, and what a good action plan/go bag might look like for a given scenario.

The other also has a scary title, but it implies nothing but what it is; a library. In this case, it is a series of links to critical information one might need to survive for long periods without outside help in a serious catastrophe. It is a collection of how-to survival tricks, and how to quickly and easily make common critical items such as water purification systems, emergency generators, and so forth. It is called the Post Apocalyptic Library. The idea is simple: visit the links, download or copy the information, print it out, and put it into your go bag. Instant expert on a moment’s notice! Many of the links will deserve further exploration of their sites, for other good information. There is always more than one way to solve a problem.

Have you ever wanted a certain soft drink? Well, I’m a Prepper, he’s a Prepper, she’s a Prepper, we’re a Prepper; shouldn’t you be a Prepper, too?

Great. Drink deep for best result.



Terrorist H. Michael Sweeney’s RAP Sheet

OK, it’s true. There are at least a half-dozen ways the government can ‘claim’ I’m a terrorist. YOU TOO, for that matter. But I have a Record of Arrest and Prosecution ‘sheet’ to illustrate one of the ways I am definitely a terrorist to someone, including people that think I’m merely a conspiracy theorist. I am not ‘mere,’ at anything I do…

by H. Michael Sweeney  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.


What makes you a terrorist when you live in a Police State?

Simple answer: anything you do. There have been so many Constituion trampling Acts of Congress and Executive Orders, all so vaguely worded as to allow the broadest of interpretations, that it is almost just that easy for someone in government to label YOU (and certainly me) a terrorist. That can have very unfortunate consequences, depending on who labels you, why, and what they do about it. You can end up on the no fly list, or some kind of watch list, or even be vanished forever by Men in Black whisking you off in a black van.

One such example is, that being a conspiracy theorist automatically makes you a terrorist according to FBI. That’s bluntly stated, but true, as an article at Public Intelligence illustrates: “A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. ” The flyer, linked in the article, specifically includes 9-11 Truthers (that’s about 1/3 of the U.S. population).

OK; I’m a conspiracy theorist, or if you prefer, a Conspiracy Terrorist. But I am no ordinary ‘theorist,’ because I have a R.A.P. sheet… a Record of Arrests and Prosecutions. And here it is, below the FBI Fellon ID Card (which shows that not even FBI always gets the right man)… but be sure to read the summary text before you wonder why I’m still walking around freely.


R.A.P. Sheet, H.Michael Sweeney

1976  Wire Tapping, 2 counts, charges dropped for insufficient evidence

1980  Embezzling, charges dropped after resignation from company

1983  Counterfeiting, Drug Smuggling, sentenced

1984  Wire Tapping, charges dropped for insufficient evidence

1985  Shoplifting, 4 counts, sentenced

1987  Fraud, Embezzling (pretending to be a Pastor), Bad Checks, charges dropped after restitution

1988  Wire Fraud, 3 counts, sentenced

1988  Smuggling, 2 counts (bioweapons, diamonds), sentenced

1990  Espionage, Interception of Electronic Communications, charges dropped by NSA intervention

1991  Bank Robbery, 4 counts, sentenced

1991  Wire Tapping, 4 counts, cold case due to flight to avoid prosecution

1992  Fraud, 3 counts, Witness Tampering, 3 counts, Withholding Evidence, 2 counts, Murder,

            cold case due to flight to avoid prosecution

1993  Breaking and Entering, 2 counts, Grand Theft, charges dropped after restitution

1994  Wire Tapping, cold case due to flight to avoid prosecution

1994  Attempted Murder, 12 counts, case turned over to Internal Affairs, and dropped

1996  Espionage, 3 counts, Violation of Civil Rights, cold case due to flight to avoid prosecution

1998  Wire Tapping, Stalking, cold case due to flight to avoid prosecution

1998  Grand Theft Auto, Operating Chop Shop, 3 counts, sentenced

1999  Possession of Controlled Substance with Intent to Sell, sentenced

2001  Bioterrorism, Attempted Assassination, investigation closed by DOJ intervention

2002  Terrorism, 4 counts, cold case due to flight to avoid prosecution

2004  Bioterrorism, case closed due to lack of evidence

2004  Cyberterrorism, Hacking (of CIA’s Web site), charges dropped in exchange for services rendered

2016  Armed Robbery, 2 counts, cold case due to flight to avoid prosecution

2016  Bank Robbery, cold case due to flight to avoid prosecution


Summary Judgement

By now, if you actually read the full list, you realize no one person could be guilty of all those crimes and still be walking free… and that there were crimes on the list immediately after incarceration, and no jail breaks to account for that. This is because these are not crimes that I committed, but crimes I have investigated and exposed, or helped expose and prosecute, often working with Police, FBI, SS, and CIA, sometimes working against rogue elements of those and other agencies, even spy agencies of other governments.

Left out of that list, are perhaps 200 Stalking, Wire Tapping, and Torture cases I’ve worked on as online consultant with victims of such affairs (I’ve had contact with 12,000 individuals in that kind of predicament). I left them out because it would have made the post unreadable, and that’s a shame… a disservice to the thousands of victims of this form of abuse of power and conspiratorial corruption of principalities and powers.

So I do not claim to be a mere terrorist, but to have stopped terrorism. But neither am I a mere conspiracy theorist, because many of the conspiracy theories I’ve investigated have put people in jail, or at least shut them down and forced them to run away. One Governor, possibly two, a National Guard General, an elected County Sheriff, two Police Chiefs, a Criminal Investigation Division Lt., a C.E.O. of an international software firm, and a host of lower law enforcement personnel have all vacated their posts (some being jailed) after I finished doing my thing. While I cannot claim every one of them retired or otherwise departed their posts because of me, as I was not allowed access to official internal documents, I’m fairly certain a good number of them grumbled my name under their breath on the way out the door.

All that said, I hope that you, dear reader, have come to understand that a conspiracy theorist is no different than any other standard investigative force of a more official nature. Except for two small things, we all try to fit the available evidence with the environ of facts to determine the truth. We both form hypothetical postulations as to suspect and motive, prove opportunity and method, and try each point of evidence against all others which might disprove the hypothesis (though as we see all too often, many criminal cases are happy to prosecute the innocent if they think they can make a strong enough case and hide the truth).

We both theorize up front. The first difference is that conspiracy theorists do not have the luxury of making an official determination, while the official investigators do. The second difference, and most important, is that we start with questions regarding failures in logic in the official findings and reports; we question government, which is not only the right, but the DUTY of every citizen, always. How else will you ever find a cover up? We know there have been all manner of cover ups exposed in media over the last few decades, and I remind you, you NEVER have a cover up UNLESS there is a conspiracy, because a cover up itself REQUIRES a conspiracy to execute it, and the affair being covered up is always so complex that it, too, MUST by default represent a conspiracy. Guaranteed.

OK, FBI, come and cuff me… unless I’m wearing a bomb like other terrorists,or have run off to Mexico to escape your ‘justice,’ in which case, just have a better day.

The Death of Proparanoid… again

Yes, Virginia, over the several decades of my personal battles with elements of the intelligence communities of several nations, as well as criminals and terrorists, there have been actual death threats and multiple attempts against my life, attempts to silence me.

I’m still here.

But my voice seems to be dying; I’m being methodically and systemically silenced.

To be sure, that, too, is not the first time it has happened. Some of it has actually been funny, or at least done with a sense of humor by someone with a lot of power, someone a bit more intelligent than the mindless robots normally employed in targeting someone for their political incorrectness.

The NSA was the first to employ technology to silence me. When I was guest on Art Bell’s Coast to Coast with George Noory for three hours. Part of the show was to be on the Flight 800 friendly fire shoot down, where I was going to announce discovery of startling new proofs. About five minutes before I was to be called by C2C staff for hookup, I got a strange call that lasted about 30 seconds. It consisted of nothing but high-speed tones somewhat similar in nature to the sounds of a fax machine…but this was different.

I knew what it was, and had written about it in my books. NSA helped develop the telephone networks we use today working along side of AT&T and also, Bell Laboratories, who were security related clients of mine. SoI recognized these tones as the data packets used to manipulate the phone system’s switching network. There is almost nothing these codes cannot accomplish, and they are part and parcel of how and why NSA’s Echelon gives them complete access to all phone/fax and other telecommunications.

So I went on air as expected, but when we came to the commercial break and it was announced that when we came back, we would offer blockbuster information about flight 800, the stage was set for the dirty trick which would be based on such manipulations. Coast to Coast, like most such syndicated shows in the day, feeds its program by phone to various radio network resources. Now, to make the significance of what happened next, it is important to know this is at a time frame when the official FBI/NTSB investigation was still going on and knee-deep in charges of a cover up, and all three TV networks were owned by military contractors who made various elements of shipboard missile systems or the actual missiles we now know shot down the airliner by accident.

The show continued and the information was revealed. But some weeks later it was learned that a funny (literally) thing had transpired. In the New York/New Jersey Long Island area where the plane went down and the investigation was underway… the same area where the US Navy was hauling select wreckage retrieved from the ocean to junk yards instead of the investigation site where the plan was being reassembled in an attempt to find a cause (so we were told)… I was silenced.

The truth was not to be heard. No. Some clever reworking of the phone system had people who were listening to Art Bell’s show, once the commercial break was over, suddenly found themselves instead listening to rebroadcasts of Art Linkletter’s ‘Kids Say The Darndest Things’ show from decades earlier. To my way of thinking, that’s incredibly creative and funny as dirty tricks go. Once we stopped talking Flight 800, the regular show returned to the airwaves, there. Once the show was over, five minutes later, I got another phone call with the strange tones.

A more physical silencing took place shortly thereafter when I was guest and ‘Field Correspondant’on Michael Corbin’s radio show out of the Denver area. Now he used a real radio station, but also used phones. Got the same tones phone call with that show, too. But more than this, someone took an ax to the cable feeding the show to the radio tower, itself. I was silenced.

Sadly, it was not too long after that that Michael Corbin himself was silenced. After a series of death threats, his home and the radio studio suffered an arson attack, along with one of his vehicles. He called left me a message for advice as he feared for his life, but again, telephone oddities prevented our actually making contact. Three days later, he was found dead in his good car at the side of a highway. It was ruled a heart attack, but he was, as I recall, just over 30 years old, and had no known heart conditions. He was silenced.

Not long after that, my only Web site at the time,, was hijacked by Men in Black. I was able to investigate it thoroughly and determine two CIA fronts were involved. One of these was Enron, formally known as Hughes Tools, taken over by CIA after the billionaire died. The other was a Web domain proxy service which specialized in registering domain names anonymously so you could not find out who owned them, as well as remarketing domain names… typically hijacked, on behalf of said ‘anonymous’ owners.

Only problem was, it seems they were actually the owners. They also offered hosting services, and ‘just happened’ to own thousands of porn sites thought operated by CIA in order to collect sexual preference information of powerful people, sometimes useful in blackmail efforts. Others in that collection were, in fact, traced to staff members at the firm. The head of the firm had a work history that fit the general profile common to persons running CIA fronts, but the two most condemning clues were closer to smoking guns.

One is, that the servers they used were actually housed in Enron’s headquarters building a few blocks away from… the other site that was a clue; the firm’s business offices were in the same building Lee Harvey Oswald used to work with FBI agent Guy Bannister… the building with two corner entrances, one on each cross street, which opened to the same interior, but each with a different address. This allowed the FBI and, presumably, CIA, to operate multiple fronts from the same offices, but use different addresses so that they would not be linked. It now appears CIA owned that building, and has repurposed it.

The hijacking was not to make a profit, as most such hijacking intends. The typical resale offer for a Web site of my popularity in terms of the number of hits was about $400. But if I was to get my site back, they demanded $157K. No way. I was silenced, at least temporarily, until I could create a new site. Several, actually.

Now we come to my death.

To be completely honest, part of that death is not due to politically motivated intrigues by Men in Black. Certain family affairs, health issues which prevent me from holding a job, as well as my age, perhaps, and general financial issues were clearly involved; they set the stage for and enabled the unexpected assaults. What happened happened covertly, and would take time for me to discover, making it too late to counter.

I lost my home and was forced to live in my car, which means I also lost my ISP service, and my email addys were shut down. Yet somehow, after the email accounts were no longer operational, someone with spoofing skills (cyberwarrior hacker types) sent an email from my closed email account to my Web hosting service and shut down my account, there. This effectively cut off my one source of income beyond my paltry Social Security checks.

Next, they transferred ownership of my domain names to a firm, this time, in Canada. But as I do not now enjoy useful Web access, since I still live on wheels and have no ISP, I can neither investigate the matter or usefully replace the Web sites. Somehow, by the way, they also killed the cached pages in Google and elsewhere about my previous hijacking, which included evidence. I am silenced.

Or not. My wordpress account remains open. Most of my old Web site pages can still be accessed in archived from (e.g., Google proparanoid + a keyword/phrase, and click the little pull-down menu arrow found at the end of the green secondary URL line, and select Cached).

To those who have followed me over the years, bought my books or newsletters, I thank you for your loyalty and kind comments. Death threats aside, I’ve probably had only three people say a consequential bad thing about my work, people who were sincere and intending constructive advice. Those who were simply hateful or who were clearly pushing an agenda, I happily discounted.

I can still be reached by text messages (very short messages, no subject line) at proparanoid at vtext com. I do also attempt infrequent access to my email account at proparanoidgroup at gmail com. You can still order my books using the My Books link at page top. You can still pay for books or send me contributions to proparanoidgroup at gmail com via PayPal. You can also still access my Facebook account under H. Michael Sweeney.

I have been silenced… but you can still hear my muffled words, if you try hard enough.

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View

The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some Satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.

Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that select shooting lines form a 3-D perspective view of Cheaps and transparent depiction of all inner passages;
•  that there are specific ties between Cheops and the goal of the New World Order;
• that Cheops is a kind of key to understanding European Illuminati/Templar relationships to mass shootings.

Are mass shootings by intelligent design?

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View

Is there a mass shooting conspiracy?

Mysteries of Cheops

In the prior post we saw ties between shooting event lines which formed Masonic and Satanic symbols, and a series of orange lines which led us to the Great Pyramid, Cheops, in Egypt. While those were quite remarkable and sufficiently consistent to defy any chance of random coincidence, what follows will dramatically make concrete the notion of intelligent design as well as the importance of Cheops to said design. And finally, we will see there is yet another way to look at Cheops’ roll in the Illuminati/Templar and mass shooting tie-ins, but this time, from the European point of view.

First, we need to understand a bit about Cheops and its importance in mysticism. There is so much which could be said that there are literally countless books on topic which could be entered as ‘evidence.’ Here, I will focus on less than five percent of such material topically, only able to skim the surface of them. Consider it merely to whet your appetite to learn more, for which some suggested links will be provided along the way.

One key aspect of Cheops is that it is rich with magic numbers. This seems to be true regardless of if using the original units of measure employed by ancient Egyptians, or modern day equivalents. Indeed, some of our current units of measure stem directly from the ancient Egyptian measuring system, a fact often laid at the feet of Freemasons and their predecessors, the Masons. While I won’t spend time expounding, many of the measurements of Cheops, both in original and modern increments, enjoy magic number properties, doing so in ways which, like those illustrated in the prior post, are mind boggling. Some serious mathematicians have found even more wondrous relationships to both the ancient and modern discoveries of Man well beyond any possible knowledge to Egyptians of old.

Perhaps the keymost aspect of Cheops which potentially makes it ideal for inclusion in mass shooting patterns is that it is only the Giza Pyramid which has a complex of inner passageways and rooms. Early mystics and even some studies of Cheops by persons with scientific credentials and methods, have proposed and illustrated a belief that the construction of Cheops was an enlightened project involving supernatural or mystical knowledge of the future; the internal passages and chambers thought to be a roadmap to End Times and key events along the way. That is represented by the image, below, from this interesting Web site. Others out there (with less useful images) have more detail with the most recent/current annotation being the year 2010, roughly the height of mass shootings. That marking is in the King’s Chamber, which implies ‘control and authority.’

ONE Egyptian Inch = 1 Year of History. From (click).

Of specific interest to mass shooting research and the notion of Illuminati Masonic Warlocks being the architects, thereof, is the fact that shooting lines can be found which quite correctly depict a pyramid across thousands of miles of the United States. More than this, they quite usefully do so in 3-D rendition, even to the point of detailing the inner passageways found in Cheops. In fact, the depiction is so uncanny as to have key aspects ‘to scale’ with measurements which work math magic using modern increments of measure against the ancient’s units of measure; not just scale in size, but across the barriers of time in the expression of numbers in different languages and cultures. Take a look:

 Do the pyramids really relate the entire history of the World from beginning to end?

Shootings depict Cheops


Left: perspective transparent view; Right: inner view of interior passages. Remarkably, it took only 9 shooting lines, and 14 shootings, to depict the pyramid and passages. However, 5 shootings stand alone (not on lines), meaning 9 are, giving us again the magical 99/18 result.

As you may recall from the prior proof the orange lines are lines which run from shootings directly to the Great Pyramid, Cheops, each exactly 500 miles apart as measured along a given line which is perpendicular to them all, and which itself runs through several shootings. The green line here, however, is at the distance of 10,000 miles from Cheops, which is one/fourth the distance around the World (the vertical diameter being 40,008 miles on average), and it too transverses several shootings and is perpendicular, but the distance at this point between lines is 505 miles.  Each orang line originates dead center of Cheops and is separated by almost exactly 7.5 degrees of arc to achieve this feat. That is interesting for another reason; 360 degrees divides by 7.5 exactly 48 times, and 24,000 miles (the rough diameter of the Earth horizontally), divided by 48 indeed equals 500 miles.

Now there are some admitted problems in trying to depict a pyramid with any degree of accuracy in a 3-D perspective view, especially if with cutaway to reveal interior passages. Such a view does not simply allow us to measure a line and compare it to Cheops with good expectation of results. Perspective causes a measured horizontal to be less as it is depicted further away. A line transiting diagonally in one or more axis in 3-D space is even less useful unless one knew the precise angles for each axis both it and the original against which it was to be compared, were employing (and additionally, the depiction version is arbitrarily decided by the person rendering it, and impossible to discern without their sharing).


As the satellite view is at a an angle, the ‘center’ is based on the base, not the peak.

The depiction in this case seems slanted over America as if about to slide into the Caribbean. That is for a reason: it is faced (viewed) with the same face (view) as the actual Cheops is when following the orange lines, there  — presuming in both cases one is looking from the center orange line towards it. That is to say, looking at Cheops in America from the center of the lines, would give you this same perspective view if standing in the center in Egypt. That cannot be coincidence.  The problem with that, however, is that in Egypt, in relation to the Orange lines, one corner is clearly (looking down from Google Earth) nearer the observer’s position than another; there is no line which is not at an angle to the observer.

Note: I further feel it is an error to assume that modern-day Illuminati Warlocks have the skills and knowledge base, or event he interest in the crafts and mathematics of Masonry, which they left to the Adepts when Templer remnants infiltrated the Mason’s Guild and eventually took it over to form Freemasons. They are not likely going to go for precise renderings as much as symbolism; accurate to the point which can be managed simply, but no more, I believe.

 Why do Masons, the Illuminati, and Satanists focus on Egypt and Cheops?

How much is a Royal Cubit, anyway?

It is, as result, impossible to establish a precise method or true consistency in relationships (i.e., to test for accuracy in scale) of measurements between Cheops and the American pyramid. The required data and accuracy required to plug into complex formula is beyond our ability to deduce. Ideally, a computer program modling in true 3-D space could be used to compute and confirm such comparisons… if we knew the angles employed by the architect of the American depiction.

But that does not mean we give up. We do the best we can with the tools at hand, and must come away at the very least acknowledging that in the 3-D layout, the mere visual similarities alone are sufficiently ‘coincidental’ to imply intelligent design, and in need of further study with better tools. But that does not mean we cannot ‘cheat,’ and then test to see if our cheat had any merit. After all, perhaps the architects employed a similar gambit. We wont’ know unless we try, ourselves. So…

By rotating the view as I have in the image above, we at least have the illusion that the base line is perpendicular to our viewing angle such that we are tempted to measure it anyway, and then see if there is any discerned relationship to Cheops which results in some kind of conversion factor. If we CAN find one, we can then apply that factor against other test lines and, in theory, if or factor was arrived at by other than coincidental happenstance, we should find the measurements work out correctly in the conversion. Guess what? We can, and it does!

Cheops on a side is 440 Royal Cubits, or 36524 Egyptian inches (a precise year’s worth of inches times 100), which works out to 230.4 m, or 756 feet. I will admit that finding a conversion factor took me some time. I made no headway at all until I realized that the orange lines were like rays of a projection lens in a theater, taking a small image and projecting it to be much larger at a distance. I reasoned there had to be something about analogy involved in the conversion factor.  I also felt that any such conversion MUST involve the ancient increments in some conversion to the modern, rather than a modern to modern comparison. Turned out true.

As I discovered, if you divide 36524 by 440 you find that there are 83.009 Egyptian inches in a Royal Cubit. Funny. Both sum to 20. If you then multiply this times the total degrees of arc for the American depiction, which is three orange lines, or 22.5 degrees (±.03), you end up with 1867.7, which is exactly the measurement of the depicted base line… in Kilometers; ancient to modern, using the orange lines as calculator. So, now to test the accuracy and intent, vs. the notion of coincidence (pretty big coincidence, if that is all it is.)

Testing our factor: There are only a couple of other places where lines are similarly ‘perpendicular’ to our view (like the base line) by our peculiar method of so assessing for the purpose. Two of these are passageways to the King and Queens chambers, which just happen to have shootings (house icons employed for this use to match the drawings of the actual Cheops chambers) at the approprate locations to at least approximate the inner passages with an appropriate resemblance. But there is a problem with trying to test these with our conversion factor. It has to do with the Mississippi River.

Looking at the drawing of Cheops’ interior, you will note there is an irregular passageway leading down between the upward and the downward sloping passages. This is thought by some to be a water drain, as there are interior air vents which happen to align with prominent Constellation stars on select key celestial event dates, and that admits water. The lower passage in fact has a chamber with a deep pit which resembles a Well. In America, as it happens, the Mississipi River runs a course reasonably similar to that passageway and at the appropriate points in our depiction, given some small fudge factor.

Clearly, the Illuminati has no control over the course of the Mississipi, which changes slowly with time, and therefor, any depiction of the inner passageways must in some way accommodate those changes. My conclusion is, therefore, that such accommodation would necessarily mean a skewing of measurement accuracy in these passageways. Indeed, no line among them which is angled, nor the passages to the King/Queen chambers, quite works out, though some come closer to doing so than others.

But there is an entirely different story in play once we get past that drainage passageway, at the very bottom of the network. That whole portion is, by the way, beneath the ground level of Cheops by a goodly distance. In fact, the pit, which was filled with loose rocks as if a French Drain, once cleared, measures 60 feet deeper.  Now, there are three points of interest with respect to testing our measures, and some landmark verifications we can also apply…

These are: the entrance passage to the Subterranean Chamber; an exit passage which is a dead end; and the pit. Applying our conversion faster, all three lines as depicted are of the correct length and are at the correct scale to the previously computed base line. But there was no shooting or key line to establish these lines (well, one line seems to do so), so we must seek some other verification that these are as intended by design. They do exist. Lets take a look:


The entrance passageway: The entrance passage determines the location of the Subterranean Chamber in the depiction, which we will verify separately. But it also has an unusual feature along its walkway, a kind of antichamber or alcove to one side, with no discernible purpose. On the map, at its correct location in the depiction, we find our old friend, Remington Firearms (the white arrow). That was, in fact, one reason I tested line placement at this site. Interesting then, that both this Proof and the prior Proof find their factories involved in shooting lines, baphomet lines, orange lines, and pyramid lines. That cannot be coincidence, and points to intelligent design, and intent — especially since the other Remington facility from the prior Proof is also present directly along another passageway, as seen in the first image of the depiction from above.

The exit passage and pit, on the otherhand, when extended the correct distance within ONE METER accuracy, end at… water wells, pumps, and tanks; which relate well to the purpose of the Subterranean level. That leaves the Chamber, itself. You will note a graphic image overlay veils in transparent fashion the intersect between the two measured passages and the pit. While there to represent the chamber, it is not really as ‘large’ as the chamber would be if to scale. At a particular location within the Chamber area it does cover, we find a nuclear power plant. This is interesting because much lore about Cheops includes references to end times, and equates the Subterranean Chamber to Hell, and the bottomless pit. One of hottest things we have on Earth is the interior of a thermonuclear power plant, and it burns both with heat, and invisible radiation; hell on Earth, should you care to experience it, with or without an accompanying China Syndrome ‘pit’. But there is an even more interesting verification, which is why the overlay:


It is hoped that it is not intended that this nuclear facility suffer a China Syndrome disaster such as seen at Fukushima, in order to render the ‘pit’ real on Earth in a hellish fashion.

The inset is the original artwork from which the overlay was obtained, a sketch of the what the actual Chamber looks like at Cheops, where it is described as seeming more like an underground quarry with lack of intent in what remains. The original is of very low resolution, I’m sorry to say. What I noticed about it that caused me to think to do the overlay, was the leftmost vertical protusion. I’m glad I did, because when I overlaid it, seeking to line it up with the cooling tower of the nuclear plant, I noticed something.

Actually, I noticed it while playing with the transparency level so I could see where I was positioning it. I truly wish I had video capture ability to show you the startling discovery, which, with a slight change in aspect ratio, was maximized; the darket portions of the overlay precisely match and seemingly define changes in terrain or map features. The effect is this: it gives the impression that the terrain to the South and near the power plaint has been cultivated to MATCH the overlay usefully. The best that I could hope to do to depict it here was to increase the contrast of the overlay, and alter the levels. There were originally only two discernable shades, black and gray (it is a B/W original image with some dithering in evidence). There are now four, and only the lightest of these is NOT defining a shape or darker area on the Map.

I apologize in realization that this is nowhere near as useful a description as the visible effect I’d rather show with video, but I assure you it is startling and implies, along with the wells and the Remington matter, that these lines are indeed intended to be here and at these dimensions, which in turn verifies the scale conversion factor discovered. Intention by design, in design.

 What is the the relationship of Cheops and Mass shootings to Templars and the Illuminati?

The European point of view

EuroAt right is an image looking from Cheops towards Europe, to reveal how it ties in with the Illuminati and Templars of old… not to mention any modern day Illuminati Warlocks operating there, today. Especially if their operations include casting magical designs in mass shooting in America to fast forward the formation of the North American Union and establishment of a one-World government under control of the Antichrist. Observe:

At the bottom we have our orange lines radiating outward at increments of 7.5 degrees of arc, where, in order to get to their designated array of shooting destinations in America, they must first pass through Europe. In Europe, we find one of these lines passes directly through the birthplace of Adam Weishaupt, Masonic founder of the ancient Illuminati (ironically, in 1776 — not truly ancient as most count it).

It is interesting to note that one can create in Europe, using only the birthplace of Weishaupt, and the orange lines, a baphomet which is correctly aligned Northward (the stray orange line), IF, and ONLY IF, running the North-line through the VATICAN IN ROME at the adjacent orange Cheops line. Then, IF, and ONLY IF, electing to use the Weishaupt’s birthplace as the center of said baphomet, will it then result as seen.

The significance of that is manifold. For one, it rests upon the remainder of the orange lines in precisely a mirrored orientation and in like relationships, in general, with the orange lines as does one of the baphomets in America. In other words, just as the depiction of Cheops in America was at the same viewing angle relationship as if looking at the real Cheops from an orange line, so it is, here, with the two baphomets.

Thus once more, the orange lines ‘project’ an image in useful scale with the same orientation to create a sister depiction in America. The difference is, THIS ONE, is properly aligned North for ceremonial use, and the one in America is flipped, so to speak… which allows IT, TOO, to be aligned with North IN AMERICA. How can that be by anything, but design?

Weishaupt’s baphomet, by the way, is at a point along the orange Cheops lines where, if used as a measuring point, they are exactly 333 Km apart, which is 207 miles (sums to 9), and 180 nautical (18), and since 18 = 99, that makes 3 threes and 3 9s, which is 999, or a code number for 666. And, of course, if electing to measure in both directions (the diameter of a circle about the birthplace between two adjacent orange lines), we also get 666.

Finally, we also see in the image the yellow icons for Templar castles and other properties, at least the ones we know about, and the red icons (and one balloon icon) which are Illuminati historical sites. We see also one green and one purple line coming from America, one a guideline from a baphomet depicted, there, and the other from a Masonic emblem, there… where both additionaly go directly to Cheops. The circle is complete; Cheops, European Illuminati and Masonic (Templar) histories (and arguably, current Warlock activities), and shootings in America and their resulting patters, all neatly tied together by six lines which impact all else. Coincidence?

 What is the link between Masons, the Illuminati, Satanism, the New World Order, and Egyptology?

Go back to Introduction

Go back to Proof SevenShootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Go to Proof NineShooting Sets Share ‘Magical’ Data Points Which Decode to Messages

Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols

Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.

Are mass shootings by intelligent design?

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

UPDATE:  (this comment, only) This post has generated some negative comments based on the commentors disbelief in the concepts being advanced. I need repeat myself; it matters not what you or I believe, it only matters what the architects of mass shootings believe.


What you will learn reading this post of the posting series

•  that the lines also defy randomness in their placement to form Masonic and Satanic emblems;

•  that the emblems are carefully aligned on the Earth in ways which reflect their function;

•  that they are rich with clues which hint at who and where are the designers;

that if you look closely, you can actually see how they ‘function’ as a magical weapon.

Are mass shootings by intelligent design?

Proof Six: Shootings Also Relate or Depict Masonic and Satanic Symbols

Is there a mass shooting conspiracy?

With respect to hidden symbols, we start with the basic understanding that Freemasonry and satanic cults do indeed have recognizable symbols they employ regularly. In some cases, they are more than symbolic, and have actual occult function. But one thing is true of all such symbols; a given symbol has a definite known shape with precise geometric relationships to other parts of the shape. So, if you know a select few points ANYWHERE upon the shape, you might be able to then define the remainder of the shape because you know what it is supposed to look like. This creates a potential problem when looking for such symbols in a ‘target rich environment,’ such as our map of 440 plus shootings.

Early Masonic Ceremony using satanic deity, Baphomet, from which the satanic ritual star is named.

Early Masonic Ceremony using satanic deity, Baphomet, from which the satanic ritual star is named.

In fact, some readers might rightly worry that it is too easy and therefore falls back into the realm of chance once more, no longer proof of intelligent design. I agree. Therefore, any such finding must be reviewed carefully for signs it was actually INTENDED, or traits which could not be so easily found true if by chance. In truth, I worried this might turn out to be quite a challenge, but in the end, the methods employed lent themselves to discovery of verifications suitable to address such concerns. Each one found by such means passed muster as being well beyond probabilities of chance, a fact I believe the reader will also find true.

Short of some custom computerized search, such finds still remain challenging, since one does not well know WHERE in a given intended shape a given starting point is located within the design, nor is the orientation or size of the shape known. In other words, you have to endlessly compare the same suspect points against endless possible combinations with other potential points, testing for all orientations and sizes. Tedium!

I’m operating on the assumption, here, that any architect of a grand design would want something more definite in such a ‘clue’ than something which might be seen as random, or require a custom software program; a deliberate placement, one likely with a specific relationship to a key location or course alignment which has additional meaning. The satanic baphomet, for instance, is normally aligned to North when actually employed in a rite, or ‘aimed’ at a target, and each of its five star points has a specific meaning which should likely be related to map location details; fire, water, earth, sky, and spirit.

So lets take a look: presented herein are four satanic baphomet ceremonial stars, and four Masonic emblems. It is my belief there are four intended for each, and no more, as I also believe (as do others) that there are four Globalist groups competing to field the Antichrist. Indeed, the individual Warlock designers are, themselves, likey hoping to be the chosen one.  Yes, more symbols may exist, perhaps intending nine or eighteen of each in support of magic 18. But one indication four is the right number is that it took several days of relatively easy effort to find each set of four, but several days more in each case found no more.

 What does satanism have to do with mass shootings?

Finding satanic baphomet symbols

In terms of simplicity for the designer, it is super easy to depict a baphomet upside-down, five-pointed ceremonial star with very few points. Because all the lines are the same length and join one another at the same angles to create yet another inner set of intersecting lines of equal lengths and their own duplicated angles, all you really need is to know any two line intersects at star tips or inner crossover points, and the rest could be calculated easily, though you might not know which crossover/intersects you are originally looking at (more than one star could result).  But that’s also just too easy, and would mean every two shootings could generate multiple stars. Commonplace, and unacceptable to designers, and to our purposes, here. Both they and I would prefer something more… more dramatic in order to reveal intention… the thing that made it hard to find more than four examples. If I’ve done a good job of insuring that, the more you read, the more you should be convinced of intelligent design. One clue they are not random is the sharing of shooting lines and events.

Though all 440 shootings were employed in the search, in the end, it turned out that ALL four of each symbol type (four baphomets and four Masonic emblems) employed their own limited universe of shootings… with many of the same shootings in both universes. Below we find the baphomet universe. It only took 23 shooting lines to depict four baphomets with some very interesting relationships. While each shooting line involved three shootings (I think one had four), the number of shootings depicted in the images below is only 54, because 22 shootings share common lines, and because I did not plot middle shootings of a line if not actually used to establish the symbol. Also, some are not visible at this viewing altitude because they are so close together. In such cases, I made one plot larger; when you see a larger dot, there are at least two shootings near to each other, there.

If you sum those all up by twos (line and shooting counts), we get our magic number, 18, a kind of cross-checking proof this is not random, but intended to be found design. The same exact thing will happen with our Masonic emblems, which will follow. How would it be possible to get that kind of consistent results by chance? All I know, is it is impossible for me to calculate the odds, they are so high. So, lets take a look, starting with four sample baphomets.


The variety in color and shape of shooting markers can be ignored and seen as equal. FAMOUS SHOOTINGS involved include: Sandy Hook, Aurora, Columbine, D.C. Naval yard, Sikh Temple, Virginia Tech, both Ihop Restaurant shootings, five Postal shootings, the original mass shooting at the Texas Tower in 1956, and the Seal Beach Salon shooting, worst in California history.

The lone shooting at center-top will serve as a kind of test gimmick, if you will, for determining an intended design vs. randomness in the findings. It does have its own line, one of the 23, which is not visible due an error on my part, which runs under the orange line shown below, to Aurora. The next image also shows our first baphomet along with several additional orange lines which are not themselves shooting lines as such, though they will be seen as originating from shootings, or may even be atop of actual shooting lines. These lines are all exactly 500 miles apart as measured at the green line, which has no other purpose but to show the point at which it is so. All of these orange lines are actually part of an entirely different proof of intelligent design which will be described in another post in this crime series. But they also function as aids in proving intelligent design, here.

Baphomet ONE


Color coding for added lines: Bold purple Baphomet lines, thin purple center guidelines, green line is point of measure of distance between orange lines, orange lines 500 miles apart go to Europe and serve as indicator tool for verification of intentional design vs. randomness.

This is the smallest of the four discovered. It has only one shooting at an intersect, but enjoys a large number of additional shootings, many more than needed, along all but one of its five lines. Two of these are also upon the same orange line, and two others on a another orange line. Note the thin purple center guideline line I generated. Though drawn based only on the baphomet’s construct, the line does something which relates directly to the orange lines, which while I cannot describe it here without giving away a future surprise revelation, additionally associates the shape with the orange lines. Therefore, this baphomet associates itself with the orange lines quite usefully, the importance of which will become more obvious as we go.

The center guideline also sports two white arrows. This is unique to this baphomet; both of these locations are Remington Firearms factories. I am amazed at such a ‘coincidence.’ I will not speculate on the meaning of it, as I think there are several equally intriguing possibilities, some favorable to Remington, some not so much. This may perhaps be best left for another day, another post. But in the summary section, I will analyze this emblem more closely so show you some of the ways it works its magic, and additionally illustrate intelligent design.

Baphomet TWO


Here is an example of a ‘minimal definition’ baphomet: two interests enjoy shootings and at best, only one is found along a line. However, it is uniquely defined in another way. One point and one middle intersect rest on two different orange lines. Moreover, the Northwest and East most star tips have a useful relationship, as well; one is over the orange line, and the other is short… by a like minimal distance. Indeed, the baphomets are very hard to draw with accuracy (I depend on trying to get all lines the same length — almost impossible, typically achieving to within a few miles at best), and so they may therefore actually rest on the lines perfectly in their designer’s version. Finally, note that the star line running Northeast reveals a guideline continuing on into Chesapeake Bay in Canada; this line also has something in common with the orange lines, further helping this baphomet pass the orange line test.

Baphomet THREE


At a glance, you might think this is the same image/symbol as the last. But no: it’s an amazing symbol very nearly the same size and location as the last, but with THREE intersect shootings, all augmented with five additional line shootings. But that was not enough. Two of the intersects are on the same orange line, and the same Northeastern running star line is actually parallel to another orange line. That same star line also has a guideline entering Chesapeak Bay which once more does what the orange lines do.

Baphomet FOUR


Talk about minimal definition, this one has zero intersects. However, it does have two and a questionable third shootings on a single line, and four on an intersecting line. Because it is so large, curvature becomes a factor in verification, as only a given symbol size and orientation (a small fudge factor is present) will allow all those shootings on the two lines to work, thereby eliminating a need for a shooting on an actual intersect of two lines. But we don’t have to rely on the fudge factor:

This time, it is the lower right star leg guideline which does what the orange lines do, but additionally, the rightmost orange line is actually parallel with that same line. This is only possible when the second line at any given distance has a precise difference in degree of ark from the first at a given starting point on a common perpendicular. If curious, we have that common perpendicular in the green line, and at that point, 500 miles distant, the inner-most line is running 54.04 degrees and the outer is at 51.49. Measured at the top of the line at the opposit star point, the distance error between the two lines is well within the margin of error in degrees of arc course measurement. Again, this is only possible with only ONE baphomet location, size, and orientation.

Four baphomets: all different, and yet all the same, in that;

a) they all share the same set of original shootings/lines (universe);

b) they are all therefore interconnected just as we found true of our isosceles triangles in the last proof;

c) they all have at least one line (side or center axis) which is symbiotic with the mysterious orange lines;

d) they are all verified by said orange lines, each in their own way;

e) the first four have a star point which can easily be associated appropriately with something nearby to represent fire, earth, water, air, and spirit. This is not terribly difficult if the star point is at a shooting because that means a population center with concentrated supplies of such relatable sites, but few work out that way, and therefore, your choices and chances of a match dwindle as you go to the next star point. The fourth is so large all of its points encompass water, making it the most difficult to determine: one is ‘the major air corridor’ for air traffic from North America to Europe, and one encompasses a portion of the Pacific Ring of Fire, but determining which one is spirit and which is earth, escapes me. That all of the baphomets (save that one question mark) otherwise meet this goal surprised me, as I though there would be more undefined, presuming their relationship veiled by designers to things known only to conspirators.

f) all of them seem usefully inverted in ways which imply four possible different Warlock designers from various locations: the first is inverted for anyone in Central Mexico or Central America, and there are candidates in both locations; the second is inverted for anyone in Scandinavia or Mexico/America (candidates abound), and the third is not only inverted but also aligned usefully North for anyone in America, while the fourth is aligned either for anyone in Spain/Portugal, or America/Mexico, uniquely so only because of its size.

And while there are yet more indicators of intelligent design in the summary, does it thus far seem like randomness in play, to you?

 Is there a Masonic connection to mass shootings?

Finding a Masonic Square and Compass emblem

The Masonic Square and Compass are most recognized of all Masonic emblems. Since it depicts a Mason’s (or, if you prefer, a Carpenter’s) Square rule, the first thing to try was to find right angles in the mish-mash of lines. Actually, this is how Proof Four came to be, and so we already have several good places we can look. Once having selecting a right angle for consideration, the next step would be to plot a center axis line bisecting it to form two 45 degree angles. This will become the vertical center axis of any resulting compass.

Next, one should seek to see if there were logical locations along that line from which two more lines could be drawn in mirrored angles away from the centerline to each side to create compass legs. To be valid, both lines would need some logical means to find an acceptable ending location to produce two legs of equal length. This might be determined by landmarks, or by completing a 3-D leg using a second inner leg line set devised in the same manner as the prior legs, and a like process for the square. We need to end up with something which looks very much like a logo emblem instead of a stick figure scratched into sand.

As you can imagine, this is a tedious process; it took a little over two days to find what I felt were all intended present; again 4 such emblems, likely one for each competing architect or group of designers. These are shown below, this time with the orange lines in place, along with the single stranded (lineless) shooting mentioned in the baphomet section, herein.

Once more, a limited universe is involved. In fact, it only took some 26 lines (image) created by roughly 64 shootings. All lines had three shootings, but 14 lines shared shootings in common, reducing the total involved to less than three times the line count. Sum those two numbers and you get… our old magic number 18. Another indicator these are intended and not random emblems.


Color Coding: Red, same as before; Yellow are right-angle shooting lines; Green for emblems and their guidelines. Twenty four of the 66 shootings in this universe are also found within the baphomet universe, including Aurora, Sandy Hook, and Seal Beach, and several of the postal shootings. That’s an interesting way to get 666.

Emblem ONE

This is the smallest and one of the easiest of the four emblems to find, taking just a few hours. In the image below we see it formed by the yellow line of the left portion of the square. The right portion should also be showing a yellow line as it is indeed a perpendicular. Must have failed to turn it on again after turning it off to see if there was more than one line present, as some red shooting lines are sometimes hidden by the wider yellow. Let me apologize in advance: the verbal narrative tends to be complex in nature, but is quite required if someone with an understanding of basic geometry is to see how the shapes were arrived at without having to make assumptions or guesses based on visual clues within the images. On the other hand, some people will find the images cluttered and confusing, and the text easier to grasp. Used together, issues in one should be clarified by the other.


From this was drawn a center axis at 45 degrees. Nowhere along this axis did anything jump out at me to suggest a logical compass tip, so I instead tried to find any two shootings which could establish mirrored angles at some point along that axis to ‘find’ the tip that way. Only two shootings (both blue) allowed this to happen, and a third shooting (yellow) on the right compass leg verified it legal. That same shooting, and yet another yellow shooting near the center axis, together suggested a logical upper line for establishing the square in 3D. Though not intersecting with the anything else used as a reference point, the line was indeed parallel with the lower right square line. Establishing a green guideline at the intersect with the axis by the line created by the two yellow shootings did indeed lead to another shooting beyond the image.

Another shooting line from the left compass leg had its middle shooting (blue) within the emblem area, and made establishing the complete inner line of a 3D compass easy. The other (blue) shooting on the first compass line, allowed reflective guidelines for the end lines of the square at equal distances, two more shootings helping in that effort (one off image to lower-right). This is fairly typical of how I attempted to find the other emblems.

What is atypical about this emblem is  a theme suggestive of a different designer than the others; schools. Each line seems to start,  end at, directly cross over, or is within about 200 feet or so of dozens and dozens of schools from K-8 through colleges, including several major university campuses. The square so encounters 33, the compass 46, and the center line, 11 more to total 90 in all. This sums to 18; 33 = 6, 46 = 10, 11 = 2; 6 + 10 + 2 = 18.

Before we go: not shown because we are viewing so close in on the map, is that the left compass leg guideline, extended for the purpose, does the same mysterious thing as the orange lines, yet to be revealed.

Emblem TWO

This works much like the last, so much so that I’ll not start with a detailed close up, nor describe blow by blow. But there are some unusual additional confirmations which imply a different architect than any of the others, and that’s where I’d like to start. The two images below reveal the alignments with existing perpendiculars, and the unusual confirmations. The first thing to note, perhaps, is that it is upside down (not to someone in Europe), and its pependiculars literally frame the Eastern Seaboard and Northernmost part of the U.S., leaving the compass to point at the middle of the country as if piercing it.




Marching to a different drum, this designer elected a unique theme; almost all corners and endpoints lay at a point having something to do with transportation or movement (of water). The two compass legs and several of the corners (not all shown) end precisely on roadways. Two of the corners end on railways. One of the bottom square corner (perpendicular) and the inner 3D line of the compass end at water. Confirmation of intent, and perhaps a clue as to the identity; someone big in the transportation industry, perhaps? Again, in final note, and not shown, the right leg guideline of the compass does the mysterious orange line thing when extended toward Europe.

Emblem THREE

This one was problematic, and its solution again implies a whole new architect. The issue was this: the actual perpendicular being tested (off screen to the lower-right) failed to be useful; it supported no emblem. But I noticed a shooting line that seemed perpendicular which was NOT yellow. At first I thought I had made a mistake and missed one, or had accidentally deleted its yellow companion line. But no — it was simply beyond the acceptable error of .1 degree of arc, it being hard to visually judge such small differences.

And yet, the line was begging to be considered, because in addition to looking temptingly perpendicular, it also ran usefully parallel with and atop of the edge of a large dam (see smaller image in the right margin). So I wondered? What if the designer had intended to use it, anyway? After all, I had no way of knowing what degree of error they deemed acceptable.


E3d1I thought I should at least give it a try, and went ahead and plotted a center axis test line (not shown) and looked along its length for an appropriate compass tip. What I found, changed everything. The image montage below summarizes the remarkable ‘theme’ findings, and more.

There was indeed a very logical starting point for the compass, but it was NOT on the test axis line, it was about 1.5 miles West of it. So I moved the axis line to match, and then finished trying to flesh out an emblem to see if there was good result. I reasoned that if it was so intended, the validity of the effort would reveal itself true somehow. Indeed.

The montage of insets below reveal just that, and are key to understanding why I find the results acceptable. So much so, in fact, that I now additionally reason that there may yet be an intended future shooting planned to create the very line I manufactured, but which like the one over the dam, does not actually bisect with the perpendicular to create a right angle, and thus does not spoil the count of 18 such relationships from our prior Proofs.

Indeed, this may be a very valuable find, as it MIGHT allow prediction of a shooting event, and perhaps even its prevention.


Quick montage review: The yellow line at top-right was the first attempted test center axis line, and the green line is the new relocated but parallel test line, which goes to a mountain actually named Initial Point. When you hold a compass, it is the initial point of control and placement of the compass; the handle of the compass. Now the left leg which was discovered to meet requirements would seem to represent the one with the point you stick into the paper. We deduce this because the shooting is at a hole in the ground (quarry) and that place is called Permanente (when you stick the compass down, it is permanently affixed to the spot until you lift it). More: the actual shooting took place at the Engineer’s Trailer where they very likely USE A COMPASS with their quarry maps. Confirmation of intent.

The other leg lands in the center of a square field (implying paper?). Note the terribly faint green line (of several) attempting to show the high-tension power corridor running nearby… at exactly the same angle to the inner leg as the two inner legs themselves form… and notice therefore, that the road way is perfectly placed to form an isosceles triangle just as would be a line drawn between the two legs, were the power line the other leg; a mini duplicate of the larger compass. More on that, shortly.

This in turn allowed trying to find the inner line for a 3D compass. It worked out, after finding the only place where shooting lines would form mirrored relationships, to be dead center of a circular irrigation pattern. When you spin a compass, you create a circle; a confirmation of intent. Next, I finished the square by extending a guideline from the yellow perpendicular at the point where it bisected the center axis line, and discovered it indeed intersected with a shooting (well beyond the image) to qualify. More intent.

But what about rendering the square in 3D? Simple: the complementary line had to be somewhere below where the yellow perpendicular met the new axis line. Again, scanning the axis line finds the logical place; an upside down pyramid (montage). A significant confirmation. And the ends of the square were easy, as there was a shooting (also beyond the image) which gave a nice proportional appearance. Implied intent.

And yes, the orange line thing happens here, too, it being once more the left compass leg which does it. A couple of additional confirmations are also present. This emblem, like most, is not aligned to North. However, it has an unusual 20 degree angle on the compass — all the others have fractional elements. At that angle, if one chose to lay the compass flat on the map as drawn, and then flip it to the right such that the Initial Point and right leg remained in place,it would then point North… exactly, even considering magnetic declination (which varies depending on where on Earth you take the reading) present at the new location. More: 20 degrees divides into 360 18 times, our magic number.

This is, I believe, incidental to the intended reason for the curiosities in the centermost portion of the montage; the central ‘mini compass’ duplicates this very feat (a flip). The leftmost faint green line from the left leg is the line between the original full size compass legs — the radius of any arc the compass might be used to create. That line measures 176 miles. The faint yellow line in the inset is 176 Meters along the radius of the mini compass, and then turning Northwards, perfectly bisects not only a portion of the farmer’s field (forming three virtually identical rectangles), but the mini compass, itself, becoming its central axis line. At the top of the roadway, we see a second green line which is 176 yards long, which ends exactly at the edge of the northbound road which bisects the powerline precisely between two towers, one on each side of the road. I believe these oddities are our clue to flip the compass in order to get it to point North, the same direction the road is going.

Mind you, all of this was discovered well after ploting and measuring the emblem. I am not making this stuff up or reverse engineering results somehow.

Emblem FOUR

Again, the last one is both large and arrived at uniquely. Thus far, not one of the emblems was properly aligned to North as viewed in America. There were only two perpendiculars that even came close to enabling such an alignment, but neither of them allowed emblem discovery. Then I noticed the little hiccup in the Northern Border with Canada just about dead center of the U.S. of A. It sticks up just enough to suggest the tip of a compass, or a pinching action of two fingers. And, it was right above our friendly, lone, lineless shooting. What if that was the tip of a compass? The simple answer is, it was… but it involves no obvious or pre existent right angle from our earlier proofs, and is quite minimally defined. Fortunately, we will find it verifies itself despite these ‘missing’ construction elements.



As it happens, an axis from that shooting to the Lone Star College Shooting creates an emblem alignment which is pointing due North and considers allowances for magnetic declination. So this emblem is correct for use by an American, probably someone right there in Texas, methinks. With no initial perpendiculars, I had to rely on shootings and shooting lines to come up with all remaining emblem constructs. The compass outer line was easy; the right leg has four shootings, the fourth (white square) hidden just beneath what seems to be the last one at the bottom. The left inner leg is defined by three, and of course, once you have one leg you know where the other is because it must perfectly mirror the opposite side.

The square was harder, suffering most due the lack of perpendiculars. The lower right side is established with two shootings along its guideline, and confirmed by a single shooting on the opposite side near the tip of Texas. The upper right if also formed by two formation shootings, but the left side has no confirming shooting. Again, if you know what one side is, the other side must match, so that should not be a problem. But I’ve been continually amazed at the consistency of the baphomets and emblems, and how when it seems something is not right, it turns out I’ve missed something there all along — so I’m tempted to think some future shooting will take place on this line, too. The end lines are found using two shootings on the right and a single confirmation shooting on the left.

Two more unusual things about this emblem in addition to aligning North: Our friends at Remington are back once more with highly suggestive positioning, including a third location in the New England States. I am tempted, therefore to believe that the lone baphomet which also had the Remington sites was designed by the same Warlock, and yet, that baphomet was not the one aligned North. This adds to the mystery of the meaning of this remarkable and consistent ‘coincidence.’ The second unusual thing affords even more confirmation… because this time, there are four guidelines which extend to Europe to do the orange line thing.Intention, intention, intention.

Four emblems, all different, and yet the same, in that;

a) like the baphomets, they all shared the same original shootings and lines, defying random chance;

b) like the baphomets, they are therefore all interconnected;

c) like the baphomets, they all establish guidelines which do the orange line thing;

d) they each have their own unique method of cross verification; transportation, shapes and places, schools, and perhaps, Remington.

I again ask; does this seem like random chance, to you, or is intelligent design involved?

What does the occult have to do with mass shootings?

Summary, and additional bonus proofs: the magic works

So not only do we have dozens of random shootings which happen to line up in sets of three or more to make straight lines with doorway-to-doorway-to-doorway GPS-level accuracy, but we have two different shooting universes of such lines which share many of the same shootings/lines to form four readily identifiable Masonic emblems in one, and and four satanic baphomet symbols in the other. Each symbol tends to have its own theme or characteristics to imply four different designers, and all symbols have a symbiotic relationship with the orange lines with an identical but yet-to-be explained proof of their own. This should be enough to convince anyone that mass shootings are not random events, but carefully planned, even though some of the shootings may indeed be naturally transpiring and truly random in nature. We’ve discussed in earlier Proofs how a design can incorporate a pre existing natural shooting into a line with added planned shootings.

But there are still additional proofs or mysteries to reveal within these symbols which drive the intelligent design point home; things which reveal some of the ‘magic’ in play by virtue of extreme care and attention to detail in their design and layout. Some of this is already seen in the themes, earlier mentioned. But there is much more than just that going on. Examples:

Examples of Magic in emblem TWO:

Emblem two has some additional special properties which defy coincidental happenstance, and they relate to one of the purposes of a compass and square, which is to measure things out with accuracy. Emblem two does this with uncanny consistency to an observable rule set. The image below shows a closeup of the emblem and the national view of it. Remember, the yellow lines are 90 degree right angle lines, and that because they are on a sphere, they tend to curve visually, and even though two lines my be parallel, they will eventually converge when upon the surface of a sphere. I’ve added additional colored lines to show some interesting ‘magic’ taking place which absolutely defies chance.


The inset image affords three new colors for key lines to be evaluated, each offset from the line it is measuring so you can see the original as well. The blue line at bottom is the radius of the arc formed by the compass, and the adjacent red line is the diameter (not the same thing as the radius/diameter of a circle created by rotating the compass). The light blue line is the measure of the thickness, or side of the Square, and the purple line represents the gap in the outer perpendicular yellow line which stops at a shooting in Washington D.C., even though the line serves as a chief guideline to forming the Square.

The labeled lines reflect the actual original line being measured to provide a standard of measure, and the other lines merely indicate where another line segment have that SAME measure. It does not matter what the resulting measurement is for this part of our dialog, just know they are the same. So the first thing to note is that for each one, there are three instances of line segments which match each other, though most additionally exist at reflected locations of identical construct in mirrored fashion; the compass shape is, after all, mirrored left to right. This 3 lines x 3 repetitions (3×3) is already indicative of intelligent design which defies chance. But there is much more.

The red Master line is 145.96 miles between compass leg tips, but because we have a error possibility in degree measurement for each of the two legs, we are dealing with a ± .38 mile total potential error in this distance. Regardless, this measure becomes extremely powerful; look at the larger view, and note there are red lines drawn adjacent to the various perpendiculars which define the ‘box’ around the U.S. created by these lines, doing so in a kind of ‘spiral,’ of sorts. These are numbered to match the sequence of discussion regarding discovery and use of a rule set, something not possible if the shootings which made them were random. There is a magical relationship between these six red lines and our diameter measurement, including the error potential:

These rules are significant: it means the compass was created to get a measure, and the measure was used to compute the shooting line lengths, which meant the shootings had to be planned to create the lines to meet those required lengths, and form a straight line.

Rule One: a given yellow line should be evaluated for any logically intended base line, and measured from that base line to its end point. Divide the result by 145.96 in search of a whole number. If the result is within an allowed error range, accept the whole number as valid and continue to the next rule. If it is not, try another base line. If all base lines fail to produce good result, select a new line and repeat Rule One.

The acceptable error range is determined by looking at the fractional remainder (e.g., .96 of 145.96). If less than .35 or greater than .58, the result is within the error tolerance established for the diameter line (± .38 off of the .96 remainder of that measurement). The goal is to produce a quotient with no remainder not within these limits, which can therefore be stripped away to leave a whole number which has ‘no error’.

Rule Two: Choose a perpendicular along the line just measured to become the next line to be measured, and repeat Rule One. All such perpendiculars along the new line qualify as potential base line; the previously measured line is a very logical base line, as is any line parallel to it, but the nearer it is, the more logical it is.

The remaining rules or determinations required to enjoy full success in this effort are best described by explaining them with narratives. These rules were arrived at after a great deal of experimentation based on the suspicion that some such rule set must exist to establish just how all these constructs relate to one another, and perhaps more, such as why a given shooting line is a given length. This is the result I obtained using the above rules (or as described in the narratives) which indeed prove the concept valid…

Line 1: the most logical line to be measured first seemed to me to be the one North South yellow line used to form the square, which ran uninterrupted. I gave it more weight than the interrupted line parallel with it due the fact it was an incomplete line, and yet more weight than the East West line because it enjoyed the parallel companion. The most logical base line was the East-West line which formed the square’s outer boundary. Measured to the end, we find the diameter divides into the resulting distance 7 times with a remainder well within the error limits; zero inaccuracy results.

Line 2: the measured line failed to make a useful baseline, but the parallel line did, dividing usefully into the distance 15 times (quotient).

Line 3: failed all attempts, so per the rules, went back to the square for the East-West line

Line 4: turned out line one was a base line which worked correctly, and provided a quotient of 16.

Line 5: failed all attempts.

Line 6: failed all attempts.

And now, the narratives to address the lines which failed to get past the Rules thus far stated, starting with an explanation of my guiding point of view. It is my assertion that the perpendiculars shown in the image are intended to ‘box in’ America symbolically, essentially framing it, as if a protective or restraining wall. In such a symbolic context, the compass is like a dagger penetrating that wall, and allowing entry and harm. Visually, because of the sphere’s impact on lines, it is impossible to make the box truly rectangular, because lines are not truly parallel at distance, and they are curved. A line can only be perpendicular at one point of another line, and cannot be truly parallel with another perpendicular at a different point on the same line.

This complicates the designer’s ability to use only perpendiculars to depict the complete box, and forces the use of a seemingly convoluted ‘spiral,’ as well as rules to allow compensation. But I was convinced that the compass 3×3 measurements somehow had a relationship to the founding yellow perpendicular line set. This is what led to experimentations which uncovered the Rules and their unique results:

Narrative to resolve line 4 and line 3: It struck me that line 3 automatically defined line 6 as a base line, by default. Thus line 4 was unique in that it already had a pre existing baseline to contend with, and I wondered how this might alter the rules. I noted also that line 4 had no possible way of ‘closing the box,’ as there was no land mass off the coast of Los Angeles to support a shooting location which would make the line long enough. But line 3 DID close the box. Thus I wondered if both lines were not intended to work together. Indeed, trying various measurement combinations, it turned out that combining the previously used length of line 3 with a length on 5 using line 4 as baseline to the pre established baseline which is line 6, produced a quotient  of 10.

Narrative to resolve line 6: the only remaining thing not tried was to measure the full line, which produces the error-free quotient of 14. Simple. Thus we see that a thing transpires which is impossible by random chance; the six lines which relate to one another as perpendiculars in a single collective, all enjoy a factorial or mathematically computed relationship to the very Masonic emblem which they help define, and do so by Rules created by logical deductions. I am convinced that there are likely similar findings possible with the other two measurements, else why would they be within the 3 x 3 pattern previously cited?

I additionally suspect the series of quotients, themselves, can be employed in some additionally useful manner, either symbolically, or perhaps even in the real World some way (such as map coordinates, distances, course headings), given that a compass and square is involved, as well as a map of the real World. For example, in answer to the last (3×3) question, consider this coincidence: the sum of all the quotients is 62, and just as the master diameter was divided in half to produce the radius, half of 62 = 31. If we multiply 62 x 3 x 3, we get 558, which not only sums to 18, but divides by magic 18 exactly 31 times; and additionally, 558 miles = the palindromic 898 kilometers, and 484 and a fraction, nautical.

 Do mass shootings involve black magic?

Examples of Magic in baphomet one

Because it can’t be done by computer program, and because the distances of a given side of a baphomet is great, and because of the potential for angular errors in Google Earth measurements, drawing a star with perfection in Google Earth is actually not very easy. One way of judging if I was usfully accurate was how closely I could duplicate line lengths. One can average these out, or weight the length to any known intersect points with shootings to try to judge the correct ‘target’ or appropriate median length.

In baphomet one, the resulting dimensions allow some very interesting math computations which reveal magic is indeed afoot in their design, something again not possible if randomly arrived at. These computations were NOT, repeat NOT made or even considered as something worthy of trying until more than a week AFTER arriving at the number deemed as ‘best.’ The designer of any intended baphomet, however, would do the opposite, and compute the line length needed to match target computation results.

The average length of baphomet one is 1451 miles on a side (a prime number). The average inner line is 341.5 miles. The standard ceremonial baphomet has a circle about the star points, and may employ a circle about the inner intersects, as well. It is the nature of these circles which lends power to this particular baphomet for ceremonial application. Numbers below are typically rounded:

a) the area of the inner circle results in a magic number (palindrome times 10) 282820, which expressed in kilometers (not rounded) is the palindrome 455155.4;

b) the miles sum in threes to 1210, another palindrome times 10, and sums in total to 4;

c) the area of the outer circle (a palindrome, and a prime number, times 100) is 1848100, which sums in threes to make 1201, which also sums to 4;

d) comparing the two original palindromes, note that the number 8 is every other number in both, and that the total of all remaining numbers is 6 in each case.

e) in like manner, the circumference of both circles each sum in total to 15, which sums again to 6;

f) the radius of the outer circle in miles is a palindrome 727 (a prime number), which sums in twos to 99 (18), and in kilometers is the magic series 1234, which sums in twos to 37 (37 x 18 = 666) and in total to 11, and in nautical miles, directly equals the greatest of all magic numbers, 666.

g) the vertical axis of a star point is (not rounded) the palindrome 535.35, which in kilometers is 855 (sums to 18, while 535 sums t0 13), and 461 nautical (sums to 11). Note also that 855 mirror the 558 ‘coincidence’ from above.

h) the distance from one star tip to another is the magical triplet 888 miles, which sums in twos to form (1616) pairs of palindromes; 161 and 616, which are inverses of each other.

There is only one possible size baphomet where all this is possible. Add the fact that its orientation allows each point to be near an appropriate site useful in divinations, and it seems highly unlikely this is some randomly created shape: the lower right tip is in water; the one above that rests on a cemetery (spirit); the upper point is ringed by airport runways (air) and contains one within the tip, all despite the desolate woodsy wild lands area involved; the Western point has five smoke shops (fire) within the same square block near its tip; and the lower left point is in a desert (earth).

 What do mass shootings have to do with the new world order?

The additional Magic of satanic intersects:

We have another strange confirmation of intelligent design which impacts both the baphomet and emblem causes. In all of the hundreds of shooting lines created by all of the 440 shootings thus far computed (well beyond the limited universes used to reveal baphomets and Masonic emblems), there are certain line oddities which exist. I’m talking about situations where three or more lines cross each other at the same location within the GPS accuracy limits used for our shooting site doorways. There are exactly 18 of these, our magical number, and there is something very peculiar about ALL of them.

Their map coordinates, both the longitude and latitude, each repetitively sum by twos up to some combination of 18, 13, or 11 (eleven, recall, being the number of chaos, disorder, and that which precedes destruction). That is to say, you will get one or two resulting numbers of those three possible, potentially two of the same number, but perhaps just one (i.e., 18, 18.18, 18.13). For this reason, I’m calling these ‘satanic intersects.’

Example: The image shows one of the satanic intersects, and the coordinates from Google Earth. Do the math.

Lattitude: 35 = 8, 22 = 4, 50 = 5, 82 = 10 = 1, so the final math is 8+4+5 +1 = 18

Longitude: 106 = 7, 50 = 5, 46 = 10 = 1, 05 = 5; 7 + 5 + 1 + 5 = 18



Here is the kicker. There are 18 such intersects. They ONLY APPEAR where at least one of the intersect lines is used in the baphomet or Masonic emblem universes. More: like the 18 right triangles which divided into 9 left-facing and 9 right-facing versions to yield 99, which like 18 itself is also a code number for Satan… these 18 unique intersects are located 9 each in the two universes; 9 on baphomet shooting lines, and 9 on Masonic emblem shooting lines.

Not just intelligent design, but consistency in distribution, too. What is also interesting to me is what seems to be located at or near many the various satanic intersects. Here, for example, is a gun club, but others include Locust Valley, Freedom Mt., and a church named Zoar (the location of Sodom and Gomorrah before destruction). The intersect shown, you may have noticed, enjoys complete symmetry in that it creates two idential obtuse angles and and four identical acute angles to within .1 degree of arc, which happens to be 20 degrees, which again is one 18th of a full circle. There are two which have this SAME EXACT perfect symmetry, and they are BOTH RIGHT HERE. Each universe (emblem and baphomet) of lines has a DIFFERENT shooting line going through at the same angle (the middle, most level line).

Orange line magic? Sorry, but I can only give you a hint, here. It is fully revealed in Proof Seven, link below, which also explains the orange line significance, per the title. The hint is this: It goes back to the very historical roots of the Illuminati and the Masons from which they sprang. It does it very uniquely, and consistently, through history. Keep reading…


Go back to Introduction

Go back to Proof FiveShapes in Turn Form Complementary ‘Magical’ Clusters;

Go to Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters

It defies odds that perfect shapes should cluster together in ways which share overlapping lines or corners, and be generally both aligned and mirrored in additional symbolism.

Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that the triangle shapes defy randomness in their placement to form aligned clusters;
•  that their count in groupings is again a magical number;
• that there is Masonic/satanic symbolism present which can be deciphered.

Are mass shootings by intelligent design?

Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters

Is there a mass shooting conspiracy?

In the prior post we found perfect angular relationships in a series of interconnected shooting lines to form parallels and perpendiculars, each line created by three or more mass shootings located in a row with doorway-to-doorway-to-doorway accuracy at GPS levels. That alone defied the odds of random chance, but to again do so in the magical count of 18, and to further form right triangles and non right triangles in groups of 18 as well, would be impossible by chance. It had to be by intelligent design.

In this post we look at additional magic taking place with the same original lines used to create the prior array, and learn even more remarkable and scary things yet await us. Those lines I refer to as red foundation lines, those 75 shooting lines seen in the very first image of the prior proof. That’s a good word to employ…

Those same lines, which I interpret to be akin to a Mason’s blueprint for an architectural structure, indeed seems to represent a foundation/framework for a much more complex superstructure, one built only from Isosceles triangles — where two sides are of the same length. These triangles not only have specific relationships to the prior shapes, but to each other in two distinctly different clusters, doing so in a way which implies two different architects competing with each other but following the same general guidelines, with slightly different interpretations and strategic goals in mind.

What we will see is impossible for random lines to achieve; to create like shapes which cluster together in ways which see them share common lines or corners, and conform to a general patterns based on specific rule sets, ONLY. That roughly 55,000 line intersects should only produce Isosceles triangles in a manner which conform to these rules is simply not going to happen except by intelligent design. But that is exactly what takes place in ‘random’ mass shootings.

This is easy to reveal visually, if done in stepwise fashion, but there is also likely secreted coded information which further study might reveal, such that it is perhaps the most important post thus far in terms of study. That will add some descriptive complexity. Ergo, the more you read in this post, the more you will tend to agree more such study is warranted.

What patterns result if you plot mass shootings on a map?

Overlaping and shared lines and shooting points create mirrored clusters.

The West Coast: The series of images below reveal the impossible. For some reason, all these perfect triangles share common lines and/or shooting event locations among themselves to form one huge cluster spanning the greater Western Seaboard. The actual triangles formed will be displayed in yellow, as in the prior post, as will any key parallel/perpendicular lines from the prior post being used to reveal a relationship. Any other anchoring lines will be shown in red if deemed useful.

EVERY SINGLE triangle is anchored either directly to the foundation lines by sharing one or more sides with the foundation, or its corner rest on a foundation line shooting, or one or more sides might reside on a line which itself intersects with such a shooting. We are again talking about the same 75 original shooting lines used to create the foundation in the first place. In other words, it is one integral complex of shapes created with great care. Moreover, we will see the magic numbers 18 and 9 again and again in the process.

Note: Very few such lines will be shown, only referenced, else it can become visually and verbally confusing. The final example will show all such lines as it happened to afford a simpler visual, and that will allow you to fully understand the ‘rules of design’ all Isosceles stubbornly obey, as based on the foundation. Also know that while it may appear some of the depicted triangles are not equilateral, or that their lines are not straight, this is an illusion, a function of point of view of such lines upon  a sphere. This may cause some to appear as if they are not Isoscoles. Rest assured, all of them are.

For the purpose of allowing a triangle to be seen as legal and intended, two sides must be equal in length to within an acceptable accuracy which considers known issues with Google Earth. Each of the two converging sides could be as much as .1 degree off in opposite directions (.2 total error), and a like error in the base line could additionally increase the chance of sides not quite being the same. They were therefor not allowed to exceed .5 miles difference, especially where greater distances was involved, But readings were found to be as small as .01 mile in lesser triangles, or where accuracy issues were less prevalent.




Fig. 5

Here we have a set four Isosceles triangles which all have one thing in common; they are all derived from  one of the perpendicular lines from the prior proof (which lies along their common base lines). The third smaller triangle between the two larger ones is NOT counted; it does not have equal sides, though visually it may so seem. The fourth is actually nested within the third, both pointing in the opposite direction. While its base is not on the same line as the others, it shares both sides in common with one which does, and is therefore included in this set.




Fig. 6

This set of three Isosceles also all rely upon sharing the same baseline with one of the key most perpendicular/parallel lines from the prior proof, as shown.









Fig. 7

This set of FIVE all share their baseline with one of the original red lines used to create the perpendicular/parallel lines from the prior proof. Moreover, that line intersects with the perpendicular line used in Fig. 5, above. The fifth is very small at the very bottom, if you didn’t see it at first.








Fig. 8

This set of four share their base, or in the case of the smallest, one side, with a foundation red line which intersects at one end with a mid-point shooting on a another perpendicular.








Fig. 9

The smaller Isosceles shares of this pair  has a common side with yet another perpendicular. Its other side is a foundation red line which intersects at a shooting shared by a different red foundation line used to form one a side of the larger Isosceles in the set. I probably should have included the ancillary lines to better illustrate. The shooting was a Standoff with Police in Canoga Park, Feb. 7, 2008.

It’s smaller Isosceles’ lower corner lies directly on one of California’s worst shootings, the Seal Beach Salon on Oct. 13, 2011, and is the endpoint for THREE different perpendiculars.




Fig. 10

This is what the West Coast collective looks like: 18 Isosceles triangles in all (any others which seem to exist do not measure out acceptably). The magic numbers continue: 9 of them rest directly on a foundation perpendicular or parallel with one or more sides, or a corner, and 9 share a side only on a red foundation line.





Why Isosceles?

The Isosceles triangle is a very important shape to a Mason. The Masonic emblem typically implies four of them, two making up the Square, and two making up the Compass. There are three different basic architectural structures the Masons are commonly associated with, all of them relying upon the Isosceles. The best known is the Pyramid, most notably, perhaps, being the one on reverse of the Dollar Bill, aka The All Seeing Eye. The Egyptian style obelisk, such as the Washington Monument, is also well known, and uses two Isosceles in its formation. A lesser known has the most relevance to understanding the symbolism in play, and is the use believed to be intended, here.

That is the Frustrum, an early concrete ‘tank trap’ of sorts. Only tanks did not exist at the time. Instead, they had to worry about cannon, battering rams, and assorted apparatus to breach high ramparts, all of which could not get close enough for use if the ground they required for their use was occupied by collections of cement pyramids. Most frustrums (means ‘that which frustrates,’) had a flat top like the Dollar Bill — not a pointed peak. But their design still relied upon the Isosceles.

With that in mind, the above image seems to be largely pointing to the Eastern Seaboard, with a couple pointing in other select directions. Keep that in mind when we see what’s going on in the East Coast, where we will have more clues that they are intended to frustrate.


The East Coast: The basic rules of existence found in the West Coast triangles are also present in the East Coast sets. However, it quickly becomes clear the actual layout or theme is entirely different, and at a glance, implies no consistency. Yet we discover perfect consistency to the construction rules — though a completely different intention in the design. This, to me, strongly suggests two different designers, perhaps with two different strategic concerns which dictated how they applied the symbology. We will explore this more in closing review, as it does support the frustrum argument, which provides the missing consistency found in the West Coast collective.


Fig. 11

Here we have a set of four Isosceles sharing a common base line which is one of the red foundation lines. It will also be in common (next image) with several more triangles, one of which shares a side in common with a line which is both perpendicular and parallel from our prior proof. Note that none of this set’s lines are parallel, which dramatically increases the impossibility that this pattern should exist by chance.







Fig. 12

The prior set is shown for reference at the right, as it has a common base line with four more, making eight in all on one line. The blue (looks green on some monitors) line is in common with the singular triangle added in the next image, and is the one mentioned in the prior Fig. to be in common with a foundation perpendicular/parallel, as also noted in the next.







Fig. 13

One additional Isosceles added to make nine (Figs. 11, 12, 13) in all, and it overlays the smallest of the prior set and is indeed in common with a foundation parallel/perpendicular. Thus two of the nine have sides in common with a foundation perpendicular or parallel. Interestingly, these are the ONLY ones on the East Coast which do. All others are in common with red foundation lines, only.






EC4 copy

Fig. 14

This odd set of FIVE Isosceles have obvious shared sides, only one not sharing two sides.










Fig. 15

Four more make up the final set. Here, I’ve added all the red lines and one of the foundation lines (yellow) which are used to validate them. Each red line shown is in common with a side of a triangle AND ends or interscts with a shooting either on another triangle or the foundation line. EVERY SINGLE ISOSCELES, East or West, does this, or is already sharing a line or shooting on a foundation line more directly. How is this possible if ‘random?’ NO SUCH TRIANGLES EXIST ELSEWHERE, which is to say, there is no other rule set in play.





Fig. 16

The sum total of all East Coast Isosceles is, just like the West Coast, 18. Also like the West Coast, they are divided into two groups of 9. However, this time, the division is 9 is between those which share immediate direct commonality of a single red foundation line and or a parallel/perpendicular line (Fig. 11, 12, 13), and 9 that don’t.







Summary: My belief these are frustums is based on some observations beyond those thus far offered. An Isosceles triangle is a form of an arrow, and as such, tends to point. That many ‘point’ in various directions implies there are things to be pointed to which are objects of (something I presume to be negative). At first when I saw the West Coast pointed almost exclusively inward, and the first East couple of East Coast discoveries pointed inward as well, I imagined they would all do so, and represent thereby the intent to frustrate the power of America, and subjugate it to the will of the New World Order. Then the rest of the East Coast discoveries discounted that notion by pointing every which way.

So I then considered that some were long and thin and others fat and squat, and size of course, was varied. I wondered if the ratio of length to base and size could somehow be used to represent a distance the implied ‘arrow’ factor might be intending to point. So I took a handful of them and found the center of their baseline and ploted a central vertical through and beyond their peak to see if there were any logical destinations, and where they were might be. VERY interesting.

The large long Isosceles angling about 50 degrees in a Northeasterly direction leads somewhere interesting, a place both Masonic and governmental in nature, as does the one upward Isosceles in Fig. 12. There is a similarity in destinations, as both are Capital cities where a Masonic site can be found, and which represent a power center for a modern day ‘Illuminati’ and which relates to the National government, as well. They are shown below, with additional ‘illuminating’ commentary.

Do mass shooting patterns reveal Illuminati ties?

The Pyramids know from whence Illuminati power is derived


The long Isosceles center line leads to the Louvre Pyramid, where startling ‘coincidences’ start to unfold. First, the line itself is on the same course heading as the entire property’s main axis.  That line plot is drawn to within .1 degree of arc accuracy from the Isosceles which created it. The Louvre Pyramid is also on a centerline to the original French seat of power, the Palace, perpendicularly located just to the North.

The distance of the red plot line from the base of the Isosceles to the Pyramid is 4,540 miles (rounded with .001 accuracy), whereas the side of the Isosceles, times four (something considered potentially intended only because there are four fully independent Isosceles directly over the sides which share no lines or shootings), plus the base, = 4513 miles, short a difference of 26, yielding about a .5 accuracy. These errors are all within reason given Google Earth imposed limitations.

However, there is a fifth Isosceles which does share a side which measures 13 miles, and is itself enjoying two sides shared within its own set.  Adding in 13 x 2 provides zero error. I admit it seems convoluted and ‘reaching,’ but I also find it potentially intended. One possible clue is that there are actually SIX pyramids at Louvre; four considerably smaller ones surround the one of fame, and one inverted and sunk into the ground — one for each Isosceles used in the calculation.


The second Isosceles points with like accuracy to this building in the Canadian Capitol of Ottowa which, while it was originally a government facility, is now, like the Louvre, used for the arts. Note again the course is aligned with the property’s liner aspects, and like the Louvre, bisects a glass pyramid (a roof skylight). Also like the Louvre, there are multiple pyramids on the property; one for each Isosceles used in the calculation. The building is named after a noted Canadian Prime Minister who was also a high Mason.

Here, the distance from the Isosceles base line is 467.8 miles. We can get the same distance by adding the side of the Isosceles with the sum of the shared portions of the four common baselines in the Isosceles set involved… to within 1 mile, or about .2 percent error. That sounds like an entirely different a method, but…

Amazingly: Both locations can actually be found by using one simple formula on the involved Isosceles triangles: Destination = the base of the pointing Isosceles + (the side of the pointing Isosceles x the number of independant Isosceles overlapping) + the length of any shared side or base with a nondependent Isosceles.

While I have not had time to review the remaining triangles, a superficial review implies that many of them end up pointing to the middle of nowhere. However, one of them points generally to the same neighborhood where, as we will see in a future proof, lives a suspect billionaire whose identity is implied thereby to be one of the designers. This may point to his corporate offices nearby, precise location as yet unknown.

But there are so many possible mathematical relationships/calculation rules which might additionally be in play, there is no way to know for certain short of an exhaustive study what all these Isosceles might secretly be indicating. One more reason I need help.

Another question which needs to be to be similarly explored by someone with manpower and funding is… are there numeric codes contained within triangle side lengths and angles, or relationships between such measurements among triangles of the same sets?

But even based on the minimal findings so far, I assert they support the notion of multiple competing designers, said competition being to determine which group of several such groups of Illuminati will have the dubious honor of having the Antichrist come from among their members, as well as who among their group. Therefore, to cast frustrums against European and Canadian Illuminati and their political power centers would make perfect sense.

More proofs follow…

Go back to Introduction

Go back to Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes

Go to Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols

Emergency Post: BLM vs. Bundy is an Ominous Danger

It is seen by government as a win-win ploy that raises the stakes to unimaginable levels. What we see on the surface has nothing to do with the sinister plot which it enables and portends. This is our last and only chance to save the country, or loose it to tyranny forever, and rush toward Earth’s final demise.

Will Bundy vs. BLM start Revolution 2.0?

By H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

What is going on in Nevada with the BLM?

What you will learn reading this post…

•  government’s actions against Bundy are mere window dressing — something more sinister is afoot;
•  the stakes are incredibly high, but hard to see — your very life and the fate of the World, in fact;
•  there is only one logical solution, and everyone plays a role.
What can I do to help Bundy against the BLM?

Why BLM vs. Bundy matters regardless of if his cause is just or he has no legal leg to stand on

UPDATE: Same day posted… Oh, so now we find out its really for the oil companies? What Corporate Police State? BLM sells 29 oil, gas leases in northeast Nevada End update.

Free Speech Zone meaningless when dogs and tasters are aimed directly at the people. From (click)

Government made it matter, and with dark purpose. At one glance it is an effort to usurp power over people, and the States, as well as to empower corporate ranching over private ranchers. It is a form of unfair and excessive taxation without representation against a political enemy of financial convenience to friends of the White House. And, it is an opportunity to make yet one more National Police Force out of the BLM. But, thanks to controlled media/government PR, not everyone sees these points of view.

But even that view is incomplete and misses the mark, if we but look closer. It is a deliberate series of escalations by government over time to garner public attention among and inflame we select people (why it gets little due mainstream coverage — save that which slants as it did at Ruby Ridge and Waco). They know the Web will be awash in the circles of we Patriots, Constitutionalists, Activists, and others who oppose the tyranny and oppression our government has come to represent since 9-11. The Sheeple must not be unduly disturbed until it can have false flag impact of calculated value.

I talk a lot about the need for citizens to draw lines in the sand and be willing to become Minuitmen should such lines be crossed. Now comes government to draw it for us, I write here to tell you that you have no choice but accept the challenge, and act decisively. You may perish either way, but I’d rather perish attempting to control my life and future than to leave it to others less kindly inclined to favor me. If there is to be armed revolution, let it be on our terms, not theirs.

Why so conclude? Because if they work it right, the ‘standoff gone wrong’ is a perfect chance to justify taking guns. By forcing a showdown and a gunfight (what the snipers do best – there is no justification for government deploying snipers unless for this cause, AND to selectively inflame those who stand for Liberty and who remember Ruby Ridge). There are two possible ends, of course, though I think they will insure BOTH transpire.

Regardless, such a battle is win-win for government. The “poor defensless BLM armed only with tasers,’ if loosing large numbers will be seen by Sheeple as an outrage, and given that Militia were involved from multiple quarters, and other armed parties, Obama can order Martial Law with suspension of the Constitution. Especially if also employing agent provocateurs for local violence across the country, as was employed in the LA Riots, where National Guardsmen posed as rioters to prime the pump.  This would likely result in orders for the military and Police to go door-t0-door. Who knows, Obama might even order the U.N. in as long-feared and first promoted as concept by Henry Kissinger. Or, he might simply order in the military; A-10s, attack choppers, a Stryker Battalion, and so forth.

They can then conveniently ‘quash armed rebels and terrorists,’ confiscate all guns, round up dissidents and politically incorrect opponents (like you and me — why they have been spying on us so earnestly), and hold a Con Con (they are already staging for it) to pass the Constitution of the NewStates of America, already written, which essentially enables the formation of the North American Union and surrender of US sovereignty to the U.N. in stages. All of this leads, of course, to a one-World Government (that Constitution has also already been written), and provides a single seat of power to enable the Antichrist’s coming to power.

Note: The NewStates Constitution is reprinted in my booklet, Fatal Rebirth, along with the World Constitution, complete with analysis line by line (NewStates) to show how draconian a document it really is. Rights become privileges which can be revoked at any time by any agency or party of government for any cause, even retroactively, and almost anyone in government can write law, and again, it can be retroactive. And if you think the two-party system and the FED/IRS is bad, wait until you see what follows. You can request a free copy of the ebook version of Vol I of Fatal Rebirth by email request to pppbooks at comcast net. 

THAT is what is at stake. Nothing less than EVERYTHING!

So we must be decisive: regardless of how we view Bundy’s cause or government’s viewpoint, regardless of if an armed and concerned citizen or a dumbed down Sheeple, we all have equal stake in this unfolding globalist tragedy. And, we can all play a role no matter our status, and regardless of if present in Nevada, or not. But about that decisive action…

Why is the BLM standoff against Bundy in Nevada taking place?

What we should prefer…

Should we stand up with arms in hand and enable, if not force, the ultimate showdown? I fear this is exactly what government wants, as already stated. But there is another, wiser choice.

By all means, men of arms should rally, but standing firm and waiting for the other side to blink or blunder is a fool’s plan, and it can only end in bloodshed. What must be done is that which can neuter Government’s ploy. And only one set of steps can do that:

a) anyone and everyone should file court actions against any and every agency, branch, and individual of government involved at every level of government. Any and every cause, grievance, or objection, as allowed by and based on State, County, and Federal Law, and the Constitution and Bill of Rights, should be employed. Bury them in legal actions, EACH OF WHICH includes request for either an Injunction or Stay Order. These actions should not all be done at once, but the flood should be continuous, so that new ones can replace those quickly disposed of. THIS BUYS TIME;

b) time is our friend — it generates awareness and understanding. It buys media attention and gives Sheeple a chance to better understand what is taking place. Just as the 99% movement could no longer be contained by a controlled media, so must this matter be brought into every home. Invite major networks, espcially foreign press, to specifically include RT, to set up broadcast facilities right on the Bundy Ranch, and bypassing the see nothing viewpoints established by government for controlling media in the manner done at WACO (NEVER AGAIN!). Install microwave and shortwave communication systems for the purpose. But also, LOCAL media is the key, as is the WWW; do not rely upon mainstream. Militia and other group ‘spokespersons’ in your community should approach their local news sources with proposed interviews to get the word out. IF EVERYONE UNDERSTANDS WHAT IS TRULY AT STAKE, AND TAKING PLACE, GOVERNMENT’S PLOT IS UNDERMINED AND THEY LOOSE THE SHEEPLE;

c) flood the theater with actors. There should be so many people there is not enough room in the minimal areas intended to contain them. OVERFLOW. The ‘1st Amendment’ area, itself an affront to the Constitution, and should be enlarged and enlarged again, forcing retreat or conflict which will make news favorable to our side. If you have access to a professional camera, start a ‘newspaper’ or ‘Radio station’ and flood the press area and make it overflow, as well. And Bundy’s ranch should become a city of tents, and include as many unarmed persons as possible who wield nothing but baseball bats or the proverbial pitchfork. THIS MAKES THE WHOLE AFFAIR MORE VISIBLE and LESS TENABLE TO GOVERNMENT’S GOALS;

d) involve the local Sheriff and State/County Officials. The Sheriff has effectively stated a hands-off non intervention policy. Fine. Perhaps he is a puppet put into place for the purpose, or co opted by any number of means available to government for rendering him neutral. But the flurry of legal actions should be intended to FORCE HIM to intervene on behalf of Bundy and supporters. If nothing else, he should have a presence on the Ranch to insure armed groups behave (public safety). The Governor and Legislators, and County Officials should called to DEMAND it. Perhaps even the National Guard should be called to stand by. A simple invite, if not enough, can be followed by a media blitz and public demand that such action is needed. Any politically motivated decision to remain neutral should be negated, thereby; a political suicide. INVOLVE THE SHERIFF, as WITNESS and PEACEKEEPER;

e) party! No alcohol or drugs, but good cheer, song and dance. Use loudspeakers. Mix well with speeches and ‘town hall’ dialogs. Use the platform (the nation will be watching) to air ALL GRIEVANCES with government, not just this ONE issue. Give voice to the rest of the 99% in a way that movement never was able to achieve on its own. SOROS WILL HAVE NO VOICE, this time;

e) prepare for Martial Law at home. That means emergency kits and plans (like the one government would not approve). It means weapons. If it is declared, you will have scant few hours to choose to fight, run, or to surrender to your fate at the hands of tyranny. If not taken away, you will need to survive for months without anything like normal civilization. No key resource, including electrical power or communication, can be assured, and will likely be withheld on purpose. Travel will be restricted and many will not be able to work, and there is no shopping, only rationing. BE READY TO BE SELF RELIANT, BE READY TO FIGHT IF THAT IS WHAT IT COMES DOWN TO;

f) if and when the shooting starts, DO NOT ENGAGE! Dead BLM or other Agents will be made into martyrs by mainstream. DO NOT GIVE THEM WHAT THEY WANT. Show restraint, and let the casualties be on your side. Keep putting out a continuous feed of information and video so that media and the WWW know what is going on. IF THERE ARE TO BE MARTYRS, LET THEM BE OUR OWN, and LET IT BE TELEVISED LIVE. If a full-scale armed revolt spontaneously errupts nation-wide, then by all means, defend yourself at the Ranch, and FOLLOW YOUR CONSIENCE AND DEFEND THE CONSTITUTION.

g) petition for redress. Redress of grievances is a key component of our Nation’s Constitutional form of government (this post makes clear, mid post). When it fails, we have no government, only tyranny. It seems today there is NO REDRESS POSSIBLE at the Federal level. ONLY THE STATES stand in the way of total Federal domination, which is part of what this whole affair is about; a means to increase Federal power over the States. But while all this is going on… and while we have media platforms established… we should be seeking redress through our State Legislators, making a series of calls for action to quickly pass laws which…

1) nullify all Federal gun laws, NDAA, NSA surveillance, and forbid Federal drone overflights except under warrant and oversight by State authorities;

2) eliminate Federal arrest and warrant power. If a Federal judge issues a warrant, or an Agency is moved to move against a party (like Bundy), they must instead go to the appropriate local Law Enforcement Agency and have them execute on their behalf. They may go along, but as observers, ONLY;

3) make clear a mandate that your State shall NOT approve a new Consitution if a Con Con is held, nor the removal or neutering by Amendment of the current Constitution, and any existing Federal Law which does so should be nullified;

4) add freely to this list anything which addresses abuse of power by the Federal government, such as militarization of Police, Obamacare, etc. This will be your one best chance to spark public dialog and debate, and to make certain that people, and especially State Legislators, realize THEY are the ones with the real power, and the duty to protect freedom and force the Constitution.

What is at stake in Nevada and the BLM standoff with Bundy?

Government has drawn a line in the sand

Let’s make sure they regret it. Force them to be the ones to cross it, and let them trip over their own power play. Now… go forth and spread the word.


Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes

When it comes to symbolism, nothing outperforms a graphical shape. Better still when that shape itself has magical properties or relationships to other shapes, or decodes to a precise meaning.

Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting. 

Is there any proof mass shootings are not random? 

What you will learn reading this post of the posting series

•  that the lines defy randomness in their placement to form countless perfect shapes;
•  that shapes can be perfect isosceles or equilateral triangles.

Are mass shootings by intelligent design?

Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes

 Is there a mass shooting conspiracy?

Update 4/17/14: Actually, a major rewrite to address lack of clarity and the poor graphic quality which led to it. Only the opening paragraph is much the same. Some new discoveries are also added. The patterns are much easier to grasp and the intelligent design far more apparent. Shockingly so. Please reread.

Are there patterns when you plot mass shootings on a map?

Randomness in lines vs intelligent design

OK. In the prior post we learned that while mass shooting plots in a quantity of 86 events plotted many times more lines than even 100 control group plots of truly random data (gun shop locations), it was still possible to randomly create a few lines using control groups. Even though the shooting lines which resulted were in conjoined sets sharing common shootings and providing the makings of a shape… and the control groups did not, the Doubting Thomas still might be moved to argue that we simply had the wrong control group (even though we actually used two with like results). So the question is raised: what other signs might exist to illustrate the shooting event lines are not random coincidence?

In an attempt to make patterns more visible, instead of looking at all 440 lines (a visual clutter of mish-mash-like mess), let’s see what we get looking only at 75 lines created from a bit more than twice that number of shootings. In the image below, I’ve also eliminated mid-line shootings unless they were themselves also a common shooting event in another of the depicted shooting lines. Interesting to note, given every line involves at least three shootings, it is quite common among the full collective of shootings that a given shooting is used in multiple lines, but it NEVER happened ONCE in the control groups. Below find the initial shootings reflected in red lines. Each subsequent image will show only those lines from among these which resulted in the making a pattern, and will be depicted in yellow. They are otherwise the SAME lines. But without all these lines, we would not understand that all the yellow lines were truly interconnected to each other in complex ways to form key relationships. This will be explained more in the closing paragraphs.


In the series of additional images which follow, we will be looking only at lines which form right angles; lines which are perpendicular to other lines. They might cross, with or without a common mid-point shooting, or merely intersect at a common shooting either at a common end point, or mid-point shooting. Intersecting, they form a pair  of 90° degree angles (perfect right angles), but if crossing, they form four right angles. Understand, that to qualify, I elected to constrain accuracy to within ± .1 (1/10th) of a degree. While Google Earth allows a very precise reading, to 100th of a degree, it is, at least on my computer, extremely difficult to accurately place and maneuver the tool to consistently take advantage of but about 1/10th of a degree.

To have any right angles at all with two overlapping or abutting lines randomly placed, we must consider the number of possible placements. For each line, there are 360 possible headings it might take, x 10, because our accuracy is 1/10th degree of arc. But we should also divide that by two because the line points in two directions from the point of intersection with another line. So our calculation is 1800 chances of which only 3 can possibly end up intersecting at angles which are acceptable; 90, 90.1, an 89.9 degrees, which leaves us with 600:1 odds for any given intersecting line pair creating an acceptable right angle. Ergo, to find ONE such instance, we need 600 random lines crossing/abutting, were probabilities a certainty — which they are not, or casino games would be of significantly less risk and much more profitable.

90-1Fig. 1

This is actually four lines, the East-West line is actually two lines which, at altitude, seem very close to one another. One of them is considerably shorter than its mate. So we have two sets of parallel lines in this group.

This is highly improbable by random coincidence. Since we would need to multiply odds for sequential relationships and have like odds for the existence of them being simultaneously parallel, its something like 600 cubed plus 600 squared, or, if my reasoning is correct, 216,360,000 to one against.

I’ll happily adjust errors in odds if a bookmaker or mathematics expert smarter than I would care to correct me.



Fig. 2

The left vertical remains from the prior image to make contextual relationships clear. Here we add two more horizontal and two more vertical lines in parallel pairs, making three parallel verticals and four parallel horizontals in all (Fig. 1 + Fig. 2).

Note: for any two parallel lines plotted upon a sphere, the further apart and longer they are the more it will look like they converge . In truth, they do. Slice an orange into four equal parts down its axis and you create wedges for the same cause. Latitude lines on a globe don’t count; they are parallel to each other, but the further North you go, the less straight they are; they in fact arc and are no longer perpendicular to the meridian. Only if rendered on flat map projections does it seem false.


Fig. 3

Here are two ‘independent’ sets of right angles formed by four lines which would seem to have no relationship to the others thus far.

If these were the ONLY ones to be found, I MIGHT be willing to presume them coincidentally happenstance. But as we will see, they will have key relationships established with the others; they are in no way alone.

Note: this image also shows that Google Earth correctly depicts a straight line as what appears to be a curve when peripheral of center, but it looks straight when centrally located. This is correct; the Earth is a sphere, which means the viewer’s vantage point depicts how a line appears.



Fig. 4

This group features one parallel set with a single horizontal line. Again, by itself, potentially coincidental.










Fig. 5

A little more complex; a set of parallel lines mutually crossed by a perpendicular.









What we get when we plot them all is quite a bit more interesting than their component parts. There are exactly 18 lines which qualify. That number 18, again, is magical, because it is a code number for 666, or Satan. How interesting then, that in addition to there being 18 lines involved, they cumulatively form exactly 18 right triangles, and 18 triangles which are NOT right triangles. One of these, however, is the only perfect equilateral triangle created by the perpendicular lines. Additionally, of the 18 right triangles, 9 are left handed if viewed with the short leg as base, and 9 are right handed; 9+9  (99) is also a magic code number for 666/Satan.

What is singularly true about all 18 lines is that they were made following a couple of simple rules: they all had to form perpendiculars somewhere, of course, but also, they all had to share interconnections through common shooting points with each other, or, with one or more of the original red lines which acted as go between to do so. That’s why the original set of red lines comprised as many as it did (and we will see, they play an additional role in the next proof, as well) In other words, these 18 key lines are all ‘chained’ together in a single unified and complex shape to create 18 right angles evenly divided between left and right, and 18 non right angles, including one equilateral (colored set to green). Here is the resulting structure:


Let’s shift gears. We started with approximately 440 lines which run along two general axis, essentially East-West in nature, or North South. Note that very few lines cross anywhere near the full count of those running the opposite axis, but also, that some lines will cross other lines along their same general axis. Short of counting intersections (ugh), allow me to approximate intersenction opportunties this way: large numbers of lines may cross or abut as few as a dozen lines or so, and the most that any line seems to intersect is about 200. Lets be generous and use a weighted average of 125, which, x 440 lines = 55000 intersects. Round up to 60,000, and divide it by 600 and we get about 100 intersects should likely be randomly producing right angles.

Frankly, that was reverse of what I expected to learn. We didn’t get 100, or anything near it, but precisely the same magic number (18) as we have seen repeated already endlessly in the prior proofs. And think about that for a moment. When something is by design, you control just how you might beat the odds of random chance. You can choose to make more than, or as we see here, fewer than naturally possible results.

Why is that even important?  Remember the original premise as to the who and why. The Masonic heritage is all about blueprints, lines laid out to be a foundation upon which to build more lines which become the structure of a thing to be built, be it symbolically or a real World architecture. EVERY line is critical in the foundation, or else nothing which follows will be correct, and the integrity or purpose of the final product comes into question. I maintain, and as subsequent posts will show, THIS set of perpendicular lines IS THE FOUNDATION of the illuminati plan to destroy America that it can be rebuilt anew as part of the North American Union and swallowed up whole by a one-World government to empower the Antichrist. Being mystical and hidden, of course, the design means nothing to us, at least not yet, but it has much symbolism and meaning to its designers, if we but look further (and we will).

But before we leave, I will tease you with yet one other point of evidence. We not only can produce perfect right angles, but  isosceles triangles, which is even harder to do, because it takes proper placement of three lines, not just two, to produce a triangle where two of the three angles share the same angle of arc. I may not be competent on reflecting the odds against that happening by chance, but I assure you the result is amazing both in their number, but placement and relationships; they are in adjoining groups or clusters, and tend to be aligned in ‘theme’ directions; completely impossible if random.

But because the next proof relies upon the sum total of such created triangles, I’ll not show them, here, nor even tell you how many exist in total. We will see there are so many of these, and arranged in such peculiar fashion as to once more suggest special meaning or information exists within them. Each angle and distance creates new data points which should logically be examined for coded meaning. But I have not had the time, nor will I, to seek to prove or disprove that notion. This is one reason why I seek funding, staffing, or outside third-party help from law enforcement, or others with a vested interest in the truth.

This post was rather short, but despite its powerful illustration of intelligent design, is nothing compared to the next one, which relies upon the same triangles and right angles. It’s going to get scarier and scarier as we continue. Take a Dramamine if the blue pill becomes too much to handle.

Go back to Introduction

Go back to Proof ThreeShootings Exist in Endless Sets of Three Forming Straight Lines

Go to Proof FiveShapes in Turn Form Complementary ‘Magical’ Clusters;


Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines

The same Dispersal Pattern Studies method applied by government researchers to UFO sightings reveals Mass Shootings do something UFO sightings allegedly do not: form repetitive patterns with GPS accuracy, doorway-to-doorway-to-doorway.

 Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 Do mass shootings form straight lines of three?

What you will learn reading this post of the posting series

•  that mass shootings defy randomness in their placement to form countless lines;
•  that the lines enjoy GPS accuracy doorway-to-doorway-to-doorway;
•  that they are revealed by scientific methods — including control groups.

Are mass shootings by intelligent design?

Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines

While in the USAF, I worked as volunteer taking care of the Base Photo Lab, which meant after-hours clean up and helping the uninitiated. Late one night, the Base Security Officer made me let him in for a rush job to process a roll of film taken of a remarkable UFO sighting. We spent some time analyzing the resulting images for signs of trick photography and the like. We concluded the images not only genuine, but perhaps the most startling and revealing images ever known to be taken of daytime UFOs… as close and as detailed as if taking pictures of aircraft on the ready line from one of the hangars.

In dialogs with the Officer, I learned there was a particular scientific method applied to the study of UFO sightings to determine if they were random events or if they somehow exhibited traits of intentional intelligent design; patterns in location, time, distances, angles, or other event details. It seems that such studies had been undertaken by Governments (typically the military) in South America and Europe, but had reportedly NEVER found any three UFO sightings formed so much as a straight line or any other detectible pattern.

Unstated was if there had been such a study in America (there has), or the findings (which were quite different), but THAT is another topic, for another day. The point is, the method employed by government is one which can be applied to mass shootings equally well: Dispersal Pattern Studies. Such studies are normally used in naturally occurring events such as animal migrations to reveal natural patterns, but can also be applied to other random events seeking signs of intelligent design, as in the UFO example.

In the 60’s and earlier, when such studies were employed with UFO sightings, the methodology required use of global coordinates with navigational computations common to flight planning by pilots. You can’t simply plot them on a map and draw lines (a common mistake by amateurs) because there are many kinds of map projections, each of which thwarts either distance, angular relationships, or course computations. No kind of map projection correctly depicts a spherical surface which in turn also correctly renders distance, visual angle, and course. Moreover, navigational computations were required to determine the course heading of any two sightings and, more importantly, seeing if any third or additional sightings lay along that same course. These methods also allowed determining distance between sightings with useful accuracy.

But accuracy still remained an issue; the nature of UFO sightings is such that location data might refer to the location of the observer, rather than the UFO, or vice-versa, or perhaps only the nearest city or landmark.  The location to be plotted often had to be determined based on extrapolation of other details such as angle of view, apparent object size, other eye witness vantage points, and so forth. A plus/minus error of several miles or more was not uncommon. And yet, in thousands of sightings, they found no lines in at least two continents worth. KEEP THAT IN MIND.

Can patterns be found in mass shootings plotted in Google Earth?

Google Earth saves the day

Fortunately, these mapping problems are no longer relevant. Google Earth incorporates such calculations as it renders the Earth at any given detail level one requires. While it has its own tolerance or error issues, it is far more accurate than any map projection despite the resulting ‘flat view’ on a computer screen. Better, it does afford useful course, angle, and distance measurement. It even considers magnetic declination, a fact we will come to appreciate.

Google Earth accuracy is generally well within civilian GPS accuracy; roughly 50 feet. When drawing a line over rugged terrain of dramatically varied altitude, one may see visual aberrations in the line which imply inaccuracy, but the heading and distance calculations do not suffer the same errors, unless, perhaps, taking the readings at the point of aberration. These visual flaws are not real, but reflect the differences a dramatically higher altitudes of the Earth’s surface has upon rendering a sphere on a flat screen. Since we don’t see mass shootings take place on mountain tops, we thankfully need not take measurements at such points.

To further illustrate the remarkable accuracy, let’s use Sandy Hook and just a few of the many lines which are cojoined with this shooting. In the image, we see two lines precisely (for all practical purposes), bisecting at the doorway area window allegedly shot out by Adam Lanza to gain entry. Each endpoint of a given line is ALWAYS placed at this level of accuracy. It is the MIDDLE shooting points where we want to be careful how we determine accuracy. Here, we see such a point in a line from a shooting at the Anniston Postal event in Georgia to a Lottery Worker office shooting event elsewhere in Connecticut, which passes through Sandy Hook some 56 feet (rounded up) from said entrance point (the yellow measurement line). This figure is divided by two to find the actual accuracy of 23 feet (per Google Earth); because we could move the line that far to find the center point between all three shootings and still enjoy the same 23 foot measurement at all three. Thats about 7-10 footsteps for most people.

Example of 'doorway-to-doorway-to-doorway' accuracy.

Example of ‘doorway-to-doorway-to-doorway’ accuracy and methods of measurement for such determinations. Each end point is placed as accurately as seen here, each mid point must not exceed more than 2x GPS accuracy (100′) error to qualify as being aligned by design.

This plot point itself, to restate, is based on using the known (or where not concretely known, the most logical) entrance to the shooting area, or if an outdoor area, the entrance to the area (e.g., driveway or walkway at the property border). This represents the point of first violation, a key element of importance to both the crime as well as to magical considerations of value to Satanic or Illuminati thinking (which is sociopathic; ‘violation’ is a favorite pastime). Thus we find consistency in results based on our primary postulation (NWO design), as well as forensic facts of a given shooting.

The general method for finding such lines is simple:

a) plot all shooting event locations;

b) Draw a line from any given event to every other event, and extend far enough to encompass any events further away along the same path;

c) determine if the resulting line bisects any additional plots to make three or more using the above accuracy determinations.

d) take note of any which are discovered to qualify by this means and keep the line, and discard those which do not.

Where it does bisect within accuracy limits, you have established a pattern; a straight line — something which, according to European and South American UFO studies, does not happen with random events even when using a broad error allowances of several miles. Shootings, however, prove to be quite another matter altogether, as we see. So perhaps there is indeed a cover up in UFOs?

As stated in the prior Post, when first attempting this method using only the 76 shooting events media wanted to talk about, plus about a dozen more from my own knowledge (shootings earlier considered by me as indicative of mind control operations), I did find some very interesting lines (image immediately below), though barely suggestive of ‘patterns,’ as such. The question remained, given the UFO study results, was this coincidental, or truly evidence of intelligent design. I wanted to know for certain. The only way to be sure, was to establish a control group.

88 ‘Media’ shootings create 12 lines including three sets of conjoined lines; a set of two lines sharing a common end point (5 shootings); a set of three lines with two endpoint shootings as common points (7 shootings); and a super set of three lines all sharing a single common point at Sandy Hook (7 shootings). Thus 19 of 88 shootings produced such lines, roughly 23%. Do you really believe it random?

Can dispersal pattern studies be applied in mass shootings?

Control Group Study

One thing I noticed when looking at the plots is that there were clusters of events, some of which were scattered along a given heading, more like an elongated oval than a circular grouping. At continent view altitudes, the illusion is that many more shootings are on the line than really are. Some of these seemed to be logically along population corridors, while others did not. Almost all of these clusters contained several of the more recent and best known shootings being given day-by-day news coverage. Note also, that there are hardly any clusters at actual high-density population centers, save San Francisco and, perhaps, Miami and LA. Nothing in NY or Chicago, or elsewhere.

So one thing I was mindful of when trying to establish a control group, was to see what the role of population corridors and centers might play in grouping: a truly random set of events should closely resemble the clustering of any control group which took population into account. But would they mirror in a general way the shooting clusters?

If truly random, the answer should at the least be depicted with a ‘resemblance.’ Mass shootings take place where people are drawn together, and while some portion of them should reasonably take place on farms and other outlying properties, the bulk should be taking place in cities. The bigger the city, the more shootings should be taking place, by and large.

Additionally, I felt the control group should have some similar social context which was at least symbiotic in relationship to mass shootings. A control group based on, say, businesses using the word Acme in their name, for instance, would have no such relationship to shootings, but would relate to population centers. On the other hand, if I plotted gun shops, there would be a relationship both to shootings (access to guns equates to access to gun shops, which affords the means to shoot someone) and to population centers (gun shops tend to open where customers can be found in quantity).

Ultimately, I employed both. Google Earth has a unique built-in search engine which randomly pulls up ten businesses at a time if you type in a category or keyword, pulling them from the pool of all such firms located within the map being depicted at the moment. If you zoom into a city, it will produce only local matches. If you zoom out to show the 48 States, it will produce almost exclusively random firms from the greater US. Therefore, I established two such Stateside control groups; Acme, and Gun Shops.

The Acme set employed 88 random Acme firms, the same number as shootings employed in my early search for patterns. Actually, there were not quite that many ‘Acme,’ firms which came up, but Google Earth, once running out of matching candidates, then offers names of firms it considers related, and I deemed to include some 20 of these as if actually named Acme, because they were still randomly acquired.

So the control group included was equal to the shooting events to which it is compared.

The Acme plots did manage, to my surprise, to establish 3 lines. However, all lines were entirely disassociated one from the other (no conjoined linkage). The ‘random’ shooting events, on the other hand, produced a total of 12 lines, many of which additionally shared common shooting events with other lines to form 3 groupings of such interconnected lines (linkages existed). Further, note in the image below the absence of lines along population corridors, and generally,  a lack of multiple plots creating the appearance of ‘extra’ plots along any given line (just the three that make it up). It is nothing at all like the shooting lines, above. There is modest clustering at actual population centers, and even so, this is not terribly uniform: SF, LA, Houston, Miami and New York, but not Chicogo, Seattle, or New Orleans, etc.

88 random ‘Acme’ businesses via Google Earth tools: Three disjointed lines were possible.

This differences implied shootings were ‘too random’ and less associated with population centers compared to Acme, and yet, that really meant them more likely to be of intelligent design, than not. But you are right if you are thinking, ‘this is not yet proof.’ Were I to have stopped here, I would have concluded mass shootings were only suggestive of intelligent design. The big pusher to continue the study was, of course, the dramatic difference in number of lines and the fact that many were connected to each other, and starting to suggest a potential for the generation of shapes.

So I did not stop there. In the same time frame I discovered some 100 more shootings, about 180 in total. And, I had already determined that gun shops would make perhaps a more interesting control group of more relevant value to the research topic. So, I next established a control group of only gun shops, and that group was of a full 100. The results were not dramatically different, but regardless, made the case for intelligent design even stronger.

100 random Google Earth Gun Shops established 4 disjointed lines.

100 random Google Earth Gun Shops established four disjointed lines.

There were 4 lines formed out of 100 gun shops, and again, no interconnecting lines. Gun shops again matched Acme in terms of ignoring population corridors, but non-the-less forming small clusters at some, but not all actual mega population centers. Shootings remained, even using only 86 plots, quite indicative of intelligent design in ways which defy the odds of random coincidental occurance.

But by the time I had finished this effort, I had discovered nearly 400 shootings, and was still counting.

This is the work which has yet to be completed: the full computation of lines for all shootings. It is tedious work requiring a lot of manipulation of zoom and map movement controls within Google Earth, in order to maintain and test for the needed accuracy. Regardless, to date, of some 450 shootings (I stopped adding new ones just before December, 2013), I have managed to test several hundred of them for line formation, and have discovered thus far 440 lines where three or more shootings maintain the required accuracy. Some lines have as many as five shooting in a single line with all five maintaining the required accuracy.

Clearly, that MUST be by intelligent design.

Yes, you are free at this point to argue that the more plots you have, the more likely you are to create a line. The control groups imply that; an increase in plot points of about 14% did create one more line. But if generation of random lines was the end of it, I’d have no good answer for you. But reading further, you will learn that the lines are merely building blocks for something even more useful as proof… which are in turn building blocks for something even more useful… and on and on. The lines are nothing compared to what the resulting lines themselves are in turn able to reveal. Shapes, yes. Symbols, yes. But even more; the data points on the key-most lines include code. Those are future post topics. Keep reading, and do so with an open mind.

Go back to Introduction

Go back to Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters

Go to Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes


Sidebar: The ‘Science’ of Magic Numbers, Their Meaning and Decoding

It does not matter what YOU think. What matters is what Satanists and practitioners of the Occult think. They think select numbers have meaning, translating into words of like meaning, and that gives them magical powers to bring forth that meaning in a spell. There is some science to their madness.

Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that there is a science of translating numbers to text and text to numbers, individually, or in whole text passages;
•  that numerology additionally gives meanings to numbers, among which practitioners of the occult find some magical;
•  that there is a consistency in how magical numbers work together to ‘say something hidden’ which is the basis of their ‘magic.’

 Are mass shootings by intelligent design?

Sidebar: The ‘Science’ of Magic Numbers in Mass Shootings by Intelligent Design

Is there a mass shooting conspiracy?

To start with, consider the ancient languages of the Greek and Hebrew. Both of these languages are ‘dead,’ which means we have a concrete and fixed understanding as to what the definitions were for words  in those languages. This is why the Bible is such an important book for study to Christians, and should be of interest to non Christians; it was written entirely in dead languages, and is therefore no longer subject to the evolving interpretations and meanings of words as is normal in a living, spoken language. And while we will see the Bible has a part in our topic, be not put off; what we are going to discuss relates equally to other ancient writings, religious and non religious, alike.

The science of Hermeneutics studies the meaning of such texts for literal translations and understanding in any other given living language. Interpretation with rules. THAT is how the King James Bible came to be, and is one reason why it is considered the most authoritative English Bible by those who are aware of and evaluate such translations. Only the uninformed deviate from these rules, and in so doing, twist meaning to they know not what, and spawn false teaching.

Think of it as a ‘double-blind study’ method for ancient texts. Image from (CLICK) Margith Strand/Fielding University

Closer to our topic, Satan, in his role as the Great Deceiver, uses Man’s desire for knowledge by tempting him to think he is wise above even God’s foolishness in the Bible; many false or flawed interpretations exist by such lures. More to the point, he works his own secret language from within the same dead languages, and more; as is true of many dead languages through the World’s history, such languages also assigned a number value to each letter used in the language. This is the occult tie to the ancients.

Very useful for secret mysteries. In fact, it can arbitrarily or uniformly be applied to any language for this purpose. In wartime and among spies in peace, many codes are based on simple tables of numeric-to-text relationships, typically additionally offset in starting point or randomly assigned. Even your computer knows every letter internally as a number value on the ASCII table. But what we talk about here is different, and far more mystical in nature.

Text as numbers as words as magical effect.    Image: (CLICK)

By such means, a word, sentence, or larger body of text can be translated into a number, and conversely, a number as text. A single digit can be a whole word or thought. Rules of conversion and the actual assignment of valuations varied by language. But coming forward in time, the science (that may not be the right word… a system which is based in science, at least) of GEMATRIA was evolved to allow simple ‘calculator-like’ conversions between text and numbers, and vice versa, in such languages.

There is actually a Gematria Calculator used in this presentation, and you are encouraged to use it in review of my work. Just type in a number or a word and it will display Jewish, English, and Simple Gematria results, at least those results which others have elected to save in the database. You can choose to do the same.

The other ‘science’ we must deal with is not at all truly considered science; Numerology, which itself lays at the heart of what makes Gematria tick… actually more like a symbiotic relationship. A Christian considers it a cultish thing, and Satanic in its roots, especially since it also seems inseparable at times from Astrology. But in point of fact, we are not even talking specifically about root Numerology as it is normally thought of, but the specific manipulation of numbers for hidden meanings or purpose.

Now, as it happens, if one is a Satanist or occult follower, numbers are quite important in this respect, the purpose being ‘magic.’ Therefore do they also embrace Numerology and employ Gematria as tool. But they also are free to enhance their use by additional rules seen useful for a given purpose, such as concealment or even the reverse as pointers or clues.

Some numbers are more important than others, and have special meaning, especially in a given context of use. Everything discussed thus far remains on the table. This at last brings us to what constitutes a ‘magic number’ to such practicioners: the answer is, actually, rather a lot of numbers qualify. First of all, most every key number in our counting system at the lower end of the scale has a meaning useful in magic/occult application.

But there are other numbers of value, too, and generally more special in use. It is not so much that every number is powerfully magic, but its magic or magical meaning in combination with other magic numbers can be amplified to make it more powerful. Fortunately, the bulk of truly powerful numbers need not be listed, as they are recognizable by their unique characteristics, as we shall learn. The short list then, with specific occult meanings, is as follows:

3  Fullness

5  Balance, the power and limit of man to control

6  Illumination, enlightenment, legend, man

7  Mystery, esoteric or scholarly magic, associated with Saturn, a name for Satan, might be a curse (conversely, 7 is also known as a number for God, Christ, Creation, an excellent illustration that context is everything)

9  Visitation, spirit

10  Law, obedience

11  Imperfection, disorder/chaos, that which precedes destruction

13  Rebellion, depravity, sin

16  Material power, incarnation

15  Three dimensions (reality), new direction, blinding temptation (Satan)

17  Victory, Son of Man (Christ), liberation

18  Oppression, bondage, slavery  = 3 (fullness) x 6 (legend/man/illumination)= 6+6+6 = 666

21  Distress = 3 (fullness) x 7 (mystery, magic – a curse)

29  Departure, cast out = 3 (fullness) x 13 (sin)

30  Rulership, dominion = 3 (fullness) x 10 (law, obedience)

31  Offspring, branch

33  A sign, warning, predictor = 3 (fullness) x 11 (that which precedes destruction)

36  Adversary, enemy = 2 (division, double) x 18 (oppression, 666)

39  Infirmity, death = 3 (fullness) x 13 (sin) — the wages thereof

99  Visitation (9) of the (evil) spirit (9) in this case a demon; 9+9 = 18, 666

360  Encircle, trap, capture = 36 (enemy) x 10 (obedience)

666  Satan’s name, produces 18 when summed.

999 Upside down 666, but produces two 18’s when summing adjacent 9s

Is 18 a magic number?

Magic Numbers can convey complex messages: the number 18

These meanings are not the same as might be produced by Gematria (but on occasion, they might). In fact, the three basic forms of Gematria tend to each produce a different result, but it is uncanny that there often remains a consistency across the board between the numerology and all three Gematria with respect to general tonal themes of results; they are equated as if a Math equation being resolved.

The number 18, for instance, in both Jewish and Simple Gematria can translate into ‘die,’ which is the ultimate price of suffering slavery/sin, one of the actual meanings cited above. The English Gematria is unable to translate such a small number, but it is interesting that the number 108 in the English translates to die, which in turn sums to 18 by one of the accepted methods employed and explained next. Such consistency in translation/meaning/valuation is, just as in traditional Mathematics, tends to be crucial. To the cultist, this is a magical property.

A larger number in terms of digits can be compiled into a lesser number of digits by a process called summing. It stems from the need to sum individual letter values in finding the value of a word or phrase as employed in Gematria. Summing is normally employed to find secreted magical meaning from within adjacent but related numbers within a set, such as in a date or phone number, or any other associative grouping. Such numbers seldom seem magical when considered as presented due their intended use. But it is also possible to sum any preexistent number of multiple digits to once more reveal magical numbers concealed within.

Summing can be done in any number of ways, but usually, in like numbers of digits, such as sets of two or three. In number groupings of associated use, such as in a date or phone number, each group can arbitrarily be treated as if having the required number of digits when it may be short, or one can employ the first digit of the next group to make up the shortfall, and then  employ the remaining digits in like manner  for the next calculation. Where there is an odd number of digits, the odd-man out can be in the middle and shared, or at either end. Lone zeros can be dispensed with in results, or not. Whatever method is employed, one would wish to be consistent in any related uses within the same decoding process (in our case, for the same shooting line set examination). Examples:

a)  The date 12 7 1880 can be summed in pairs as 3798 or 3816 which summed again produce 1017 or 117, both of which can be summed again to make 18 or 9, whereas the actual sum of all digits is 27. There are, of course, two 9’s in 18, which along with the lone 9 makes three, and there are three 9’s in 27.

In history, this is the date the First Boer War in South Africa was staged by the formation of the Republic, akin to the 1st Continental Congress of the United States in impact. The number 18 is, again, Slavery, oppression, where three is fullness and 9 is spirit or visitation. The Boer Wars led to the oppression of Blacks in their own land until Nelson Mandela forged the new government.

b)  The integer 1271880 can summed in threes to make 10116 or 11016 or 1017, again all eventually summing to 18.

The various means of summation are not so many as to allow just any number to end up conveniently producing a meaningful final result (i.e., magic number). It is not possible by such contrivances. Indeed, for any group of (such as used in our comparison of shootings which form straight lines, sets of three) different complex numbers to end up with an identical ‘theme’ or even for an individual number to be translated in multiple ways to produce multiple numbers of like importance or meaning would be quite unusual, and not something easily repeatable unless by design (carefully choosing the starting number(s) for the desired properties).

Within this posting series, all summations will be indicated in a way which allows the reader to understand how they were derived from the original number(s), and the reader will discern that in general, the methodology is consistent and employs very few rules. Exceptions to summation rules will be drawn out with explanation to assure like clarity. We will additionally only focus on those which are found present in ALL THREE (or more) shootings making up a given straight line.

These are not the only manipulations possible, but they are the only manipulations which will be employed in the proofs, as it is not felt additional proofs are needed, and it would simply bog the reader down further with endless detail. I assure you, however, the investigation has found many more examples of magic numbers within mass shootings examined at such depths, thus far.

What kinds of numbers are magical?

Other kinds of Magic Numbers

Summations can reveal the existence of hidden magic numbers. One type of powerful number series revealed by such means in the investigation is the palindromic number; one the same forwards and backwards, such as 43234. But Palindromes can also be discovered by another form of summing. When you read the second Proof posting, you will find a section revealing more of the ‘magic power’ of the number 18. Unstated there, but added here, is that the additional power of palindromes can derived from the fact that 18 = 2 x 9, 3 x 6, as well as 9 x 2 and 6 x 3, which individually can be summed to variously make 11 or 9.

These results can then be combined to produce the palindrome 119911 and 911119, as well as 2992 and 9229, by summing the multiplicands. The shorter of these can be added to equal the palindrome 12221, which further sums by pairs to 323.   The sum of each digit positions in the 2992/9229 set sums to 11 to make 11111111 (a Palindrome, yes, but also a repeating digit, where each digit increases the power of the root number, in this case, 1), which is 4 sets of 11. Consider then, the meaning of 11, 1,  2 (previously reviewed above), and of 4:

The meaning of 11 is Imperfection/corruption, disorder/chaos, that which precedes destruction. “The abomination which maketh Desolate” in the Jewish Gematria translates at 1802, which sums to 11.  The meaning of 1 is “single minded, intolerant, stubborn, controlling, lacking in emotion, aggressive, arrogant, dominant (some key traits of Satan)”

The meaning of 4 is “foundation (Earth) or World, or to establish order and bring plans into material form (the NWO, for instance).” Satan is given power over and resides in the Earth; seeks to destroy all creation in the End of Days. “Four horsemen of the Apocalypse” in Gematria translates and sums to 18.

Adding the larger palindromes together, we get 1031030, which can sum in pairs to 13130, or dual 13s, and you know the dark pop culture connotations of that number. But in the occult it also means “Rebellion,” which is exactly what Satan is about. It has additional significance to the Illuminati; nearly all Knights Templar, Illuminati’s predecessors, so to speak, were all assassinated by order of the Pope during their last meeting, which took place on Friday, Oct. the 13th, in the year 1307.

There are three 13’s there, given the 5th day of the week sums with the 8th month. Yet they did not trump the 7, which translates as spiritual perfection, fullness, covenant, and even the Holy Spirit. Thus we see the eternal struggle between Satan and God reflected even within the number 18 itself. That struggle is, after all, Satan’s base motivation for all he does.

In like manner palindromes can be constructed; 3663 and 6336, each summing to the doublet 99, itself summing to 18 again since the originals also summed to 18. Single digit position summing yields 9999, or 1818 summed yet again, and yet another 99 summed one more time, and again to yet another 18.

Going back to the larger 119911/91119, once more, we can produce 101010101010 by adding digits (6 x 10 = 6’s illumination x law and obedience 10 times).

This is very interesting, because if treated as a binary number, those 1s and 0s translate to ASCII decimal and character codes 170 and 10 (totals 180 = 10 x 18), and as text, the letter ‘a’ (as in Alpha of Alpha and Omega, but in lower case as if to belittle it), and in base 10, it becomes 2730, which sums to 12, which as you are about to learn, fits right in with the overall theme, as well.

In like manner, 11111111 decodes from binary to 9, and in ASCII Decimal or Character, it is in both cases 255, also summing to 12. Moreover, in raw Hexidecimal computer code, it is FF, which is the functional Omega of the beginning and end (start/end) of that computer coding construct, which is typically expressed in upper case and, thus does trump the lower case Alpha. Satan sees Armageddon as his victory over creation.

So by these various manipulations, it is possible to find the consistency talked about being found in magic numbers when intended to translate to meaning. It seem that no matter what method of manipulation you employ, you find more or less the same message in theme, if not specifics. Fortunately, the posting series will not spend this level of detail in each numeric evaluation. We will only tell you which magic numbers were discovered which proved useful in the investigation, how it was arrived at, and why it matters.

This does not by any means imply there is not much more which could be learned by further analysis. In some cases, more has already been learned. But there are many other forms of magic number analysis which I’ve not even attempted to find present in the shootings. These may indeed (and likely do) exist as further clues as to the identity of the designers. But I simply cannot take the time to spread my efforts even thinner; yet another reason to seek financial or helper resources to carry on the work.

What makes a number magical in the Occult World?


It is hard to read such number explanations without a practiced mind aware of the meanings. There are many ways to think about each starting point in order to find full realization. It takes many steps to analyze a given candidate, and more steps to full realization. It can be confusing at first, but it is not. It is a consistent series of numeric depictions of a given intended message. In the case of 18, for example; spiritual warfare with Satan being the victor. Only certain numbers support these kinds or manipulations and findings with the same consistency. That is what gives them ‘magical’ power in the minds of their users.

Therefore, these are the kinds of manipulations we must find in use and seek understand why they were used in a given shooting series which establish a straight line or shape. To ignore them because we do not believe they have any power, is to fail to see the intelligent design which their very use is critical. To make it simpler for you, the reader, I’ve already done the work. It remains therefore to you only to be open minded enough to review the work, and perhaps to double check my work if so moved. On the other hand, some of you will find the topic worthy of deeper interest.

To learn even more about magic numbers, I suggest you consider what a high Mason, Rosicrucian, Magician, and founder of the conspiratorial cult, the Hermetic Order of The Golden Dawn, one W. Wynn Wescott, had to say in his book: Numbers – their Occult Power and Mystic Virtues. He may also have been a Warlock. I make a case in my book MC Realities that Knights Templars went into hiding as Warlocks within the Rosicrucians before infiltrating and assuming control of the Mason’s Guild to subsequently form Free Masonry.

Another tool as useful in some ways akin to a Gematria Calculator, is this Web site which takes a close look at numbers from both the mystical side as well as the mathematical side. It is absolutely true that when a number has a very unusual mathematical property, such as being a prime number, it can also be considered magical. This tool was not known to me when undertaking my investigation, but may aid those who elect to follow in my footsteps to perhaps reveal even more clues about intelligent design and identities of those responsible.

Go back to Introduction

Go back to Proof TwoShootings Exist in Identical ‘Magical’ Categorical Clusters

Go back to Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages

Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters

The Illuminati loves magical numbers, as they can translate into meaningful words or names, or leverage ‘spells’. Interesting then, that basic shooting statistics establish set after set in the most magical and potent number of all, one which decodes to ‘Satan.’ This alone reveals dramatic coincidences well beyond the possibility of random chance.

Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that mass shootings defy random probabilities in their distribution;
•  instead collecting by the same count in groupings by type of event;
•  that count is a number of great significance to the planners.

Are mass shootings by intelligent design?

Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters

 Is there a mass shooting conspiracy?

This post is both the simplest to explain and reveal to the reader of all the patterns discovered, and yet, one of the most complex in terms of planning requirements for any conspirator. This particular proof, easy to grasp but harder to believe until you see it, could never be found using media statistics.  Simply put, if you look at all shootings (about 450 at the point of discovery), not just those media reports, and start to break them down categorically, you quickly find amazing results impossible by chance, with no hope of doing so using media counts:

Exactly 18 mass shootings involved high schools;

Exactly 18 mass shootings involved colleges;

Exactly 18 mass shootings involved US Post Offices (‘going Postal’);

Exactly 18 mass shootings involved Malls;

Exactly 18 mass shootings involved holidays;

Exactly 18 mass shootings involved Native Americans directly or indirectly;

Exactly 18 mass shootings involved Military/First Responders, either as shooting victims, shooters, or both.

18 shot revolver fires 3 slugs x 6 pulls; 18 is not just a magical number, but perhaps deadlier than most.          Image (CLICK) techwarelabs.

Additionally, there appears to be 12 or 13 fast food/specialty restaurants (i.e., pizza, chicken, tacos), and 14 or 15 full menu eateries. The precise number is in question because some locations are not categorically determined by their name, and have since gone out of business. This study should have been undertaken decades ago, but who knew to do so? Media was not telling us about the great bulk of these events.

In like manner, there appears to be similar numbers which make up the categories of nightclubs/strip clubs (where dancing/live entertainment is part of the venue) and bars/taverns/pubs (where only alcohol is the attraction). These are even harder to discern for the same reasons as the eateries.

Finally, there are thus far exactly 15 middle/elementary school shootings. I mention the eateries and clubs, and K-8 schools only because each falls short of 18. This implies that there will be additional shootings in these categories to bring their respective counts to 18. Such a notion, given the other patterns yet to be discussed, implies it may be possible to logically compute a next shooting event to a precise location, and perhaps, even date.

To do so will require completion of the full study, something which would take an individual such as myself far too long a time to complete. By then the events would likely already have come to pass. That is why I hope this series of posts might motivate someone to provide funding for a staff, or better still, for some authority to undertake the effort as part of a criminal investigation. Time is of the essence, which is why I’m publishing NOW, instead of two years from now.

Are mass shootings taking place in  clusters of 18?

Two unusual traits found in EACH grouping

That such perfect identical groupings should exist is alone remarkable. But once I determined such groupings existed, I wondered what else might be unusual about them as a minor data set — as opposed to their inclusion in the whole. So I simply ran connecting lines from each of the 18 to every other within the group. Two unique things became apparent, and were true in EVERY GROUP of 18.

GE plot of all 18 Postal shootings interconnected to one-another by lines. Despite confusion, you can see reflective angle patterns in several which are more isolated, but they exist in each of the 18. This should be impossible if random events.

Google Earth plot of all 18 Postal shootings interconnected to one-another by lines. Despite confusion, you can see reflective angle patterns in several which are more isolated, but they exist in each of the 18. This should be impossible if random events. Ignore the additional non postal shootings also shown, but with no lines.

a)   Each group of 18 generally formed a ring around the lower 48. Each ring would have two or three which were perhaps inset a bit more central than some of the others, but by and large, the total effect was to form a large irregularly defined shape (I’d say oval-like) which generally ran close to the borders or coastlines with a kind of regularity that implies deliberateness in its own right. You would think, if random, that there would be more shootings found centrally located, instead of generally being peripherally located.

b)   Reflective angular spacings. More remarkably, when looking at the angles created by the lines radiating outward from each individual shooting to the other 17, I was struck by what I’ll call a ‘mirroring of angles.’  That is, a given cluster of some number or perhaps even sets of clusters for a given shooting… and true in every shooting of the 18, would mirror a given angular relationship. For example, you might see lines radiating in arcs with angles of 5°, 12°, 8°, 20°, 8°, 12°, 5°.

Understand that such patterns might be a bit harder to discern because of the additional presence of a non mirrored line, but most of them literally jump out at you, visually. This might happen randomly given the total number of opportunities… in a given shooting, perhaps even more than one such example… but in all of them… in each grouping of 18? Not random.

To be sure, each set might have different numbers of such mirrored lines, and each array might consist of entirely different angles, but the point is, each shooting enjoyed this unique finding to one extent or another. I must point out, however, that measuring angles is quite time consuming and tedious, and I therefore only tested a few to measure their accuracy.

I will also state that the resulting accuracy of those checked was not perhaps as tight as I would have preferred. I would like to have seen .1 degree accuracy, but while some were within that range, .5 degrees was more common. Still, it is quite dramatic to see (image), even if the actual accuracy were found to be more than a degree (a degree is hard for the eye to detect). Very few were that far off.

This ‘opposing’ comment to the whole groups of 18 matter must also be added: shootings continue to transpire and it appears that at least some shootings will eventually fall into some of these same categories. Does that invalidate the observation? Perhaps, but not so easily.

Further study is required to examine each shooting to see if it is in the same ‘league’ as the others. For example, do the shootings make up a set of three or more in a straight line (a future discovery which will be covered as a subsequent proof)? Do their lines form a complex shape (also a future post’s proof)? Do they form equidistant – mirrored angles of interconnection points as described above?

Note: I’ve also not yet had time to chase down this important question: do any of these interconnect lines also form lines of three or more shootings, in which case, they are very important lines and shootings, events which may hold even more clues in need of discovery. Another reason I need help.

There is a clue this consistency should prove out to be true: one of the more recent shootings in the news was at a High School. That would make 19. Yet I recalled that I had arbitrarily included… because of other clues that it was INTENDED to be a mass shooting… an event where only one person was shot before the shooter was subdued. If it were intended but ‘failed,’ it is highly likely that the planners would seek to replace it.

The patterns then would seem to reflect a need to be consistent and ‘pure’ by its designers. Indeed, these reasonable questions and tests are yet another reason I hope someone will fund further research or be undertaken by LEA.

But perhaps there is a bigger question we should be asking:

What does the number 18 have to do with mass shootings?

Why 18?

Music Album Cover from (click) seems to sum it up: the wrist watch reads 18 minutes after 5; 5 x 18 = 90 = 5 sets of 2 x 9, where each pair (99) = 18, for a total of six 18s, plus the title 18 to make 7 in all, which is covertly stating, intentional or otherwise, that ‘the power of 18 (Satan) trumps the power of God (7)’

It is about ‘magical numbers.’ The general topic of numerology and the mystical or Gematria translation (coded meaning, if you will) found in numbers is a bit beyond the scope of this post’s presentation as it would be quite lengthy. Yet it is important that the reader have some grasp of the topic in order to make the points relevant, and to accept the ‘science’ or ‘validity’ of the meanings ascribed to a given number. Else it would not seem quite relevant to our investigation. Ergo…

Sidebar PostThe ‘Science’ Behind MAGIC NUMBERS, Their Meaning, and Decoding. You may be well served if unfamiliar to review how the occult World employs numbers they see as ‘magic,’ because it does not matter what YOU think of that possibility, it is what THEY think about it, that matters. Especially if those behind any intelligent design are Satanic and seeking to leverage their plans by incorporating magic numbers within them.

The number 18 might be described as the most ‘holy’ of ‘holies’ in magic numbers employed in occult mystical beliefs, including Satanism, Masonry, and the Illuminati, which was itself derived from Free Masonry. The sidebar gives you a taste of that. But let’s pick it apart to see why.

The parenthetical additions employed as we go reflect applicability. Know that the meaning of a number varies according to application or context (spiritual, non spiritual, positive nature, negative nature, and to a degree, select topical relationships, such as being masculine or feminine, relating to a season or emotion, etc.). The general meanings imparted here are generally the negative spiritual context.

18 = 6+6+6 = a coded number for Satan himself (666 being the number of the Beast in the book Revelations). In the Jewish Gematria (see above sidebar link), “Beast” translates to 198, “Devil” translates to 738, “Mystery, Babylon The Great” translates to 1926, and “The Old Serpent” translates to 567. All of these equivocal names for Satan each sum to 18. “Mark of the Beast” in the English Gematria translates as 864, while “Doomsday” translates as 576, and so forth.

In fact, in various Gematria, the founder of the Illuminati, “Adam Weishaupt,” “Adonai, Masonic God, the Great Architect,” “Grand Master Jacques De Molay,” as well as “Illuminati” and “illuminated” translate and sum to 18. Learn more here about how these words and their decodes directly relate to the Illuminati. Next, we take a look at some ‘fun with Math’ properties, which are exactly the kinds of things that make numbers ‘magical’ to those who believe it true and thus so employ the numbers in that belief. Again, what YOU think it means matters not, to THEM, because they have so believed in such ‘mysteries’ for thousands of years.

18 = 2 x 9 and sums to 9, making three 9s, where 999 is also a code number for Satan, being 666 upside down. 9 x 9 x 9 = 729, which sums to 18. Divide 729 by 666 and you get 1.09090909… ad nausium, where adding every four digits of the fractional component yields 18, again. 6 x 6 x 6 = 216, when divided by 666 = .324324324… where summing in groups of six digits also yields 18. It (999) in like manner to 666, translates in the Jewish Gematria to “Luminous Soul” as well as “Satanic philosophy.”

18 = 2 x 9 or 9 x 2, each of which sums to 11, and 3 x 6 or 6 x3, each of which sums to 9. Collectively summed (11 + 11 + 9 + 9) = 40, which is the number of Judgement in the Bible (e.g., 40 days and nights of rain in the great Flood), and the Beast is all about Judgement Day: the purpose of the Illuminati and New World Order is to create a One-World Government, providing a single throne for the Antichrist and to hasten confrontation with God and destroy all life and the Earth as we know it: Armageddon. “Judgement Day” in Gematria sums to 18.

666 and 999 are triplet numbers, and any repetitious numbers, even doublets, gain in power; 666 is more powerful than 66, which is more powerful than just 6. The meaning of 6 is “Illumination (a trait of Lucifer), enlightenment (the knowledge of good and evil), legend (the greatest lie is that Satan does not exist, he is mere legend), Man (the Antichrist will be a man in whom Satan resides).” The like manner, the meaning of 9 is “Visitation, Spirit (Satan as an unclean spirit, will visit himself upon the man who will ‘become’ the Antichrist).”

Breaking a number into its mathematical equivalents also decodes into interlocking sentence-like meanings. The meaning of 18 is “oppression, bondage, slavery (what sin represents to man, and what the Antichrist intends politically to bring on Armageddon).” The meaning of 3 is “fulfillment/fullness, or relates to the three-fold corruption of God’s Word, or Man’s three great enemies of Biblical references.” The meaning of 2 is “power of judgement (God the Father and Jesus Christ, or if you prefer, God and Satan in battle), the indecision of outcome in the battle between good and evil.”

Therefore, 18 = 3 (fullness of corruption by enemies of Man) x 6 (illumination, the knowledge of good and evil) and 2 (power of judgement in battle between God and Satan) x 9 (Satan in the person of the Antichrist). This can be done with each of the equates (i.e., 18 = 2 x 9). So we see there is complete sentence-like consistency in such translations in really powerful magic numbers, which in turn are in interlocking support of individual component number meanings.

Finally, 18 plays to Masonic mystical calculations in sympathetic manner. 360 degrees of a circle divided by 18 = 20, which is 2 x 10, where the meaning of 10 is “Law, Obedience.” Therefore, 20 is the “Power of Judgement x Law, Obedience” x all the meanings of 18, an apocalyptic theme in spades, especially since the meaning of 360 is “Encircle, trap, capture.”  That is the very plan of Satan for Armageddon; not only to capture Man, but to lure Christ into what Satan sees as a trap which will allow him to defeat Christ and, thereby, God.

By establishing a circle of 360 degrees (any scale COULD have been arbitrarily chosen), a straight line course is 180 degrees of arc, which sums to 18. So even when on a path of ‘true course,’ you are vexed. And the right angle of the Mason’s Square is thereby 90 degrees, of which there are two such arcs when formed with that true course. Each sums to 9, to make 99, which sums to 18, which also vexes the true course. Divide 360 by 666 and you get .540540540… which once more sums to 9s, this time in threes.

The meaning of 3 is “Fullness,” and of 6, again, is “Illumination, legend, Man” and 9 is “visitation” (the final fulfillment of legend in a Man, the visitation of Satan in the Antichrist). Add to that the meaning of 12, as explained next, and it makes total sense…

As we found in the number 18 a myriad of magical encoded symbolic statements expressed in various levels of occult power and interpretive meaning… that the shootings can be broken down into 12 such categories (though at this point we may simply have not found all the categories — there might actually be 18) is perhaps also telling, and happily, less complex to relate:

The number 12 is the number of Tribes of Israel, the number of Christ, and the number of the elect saved (sealed up) during Armageddon (12000 x 12 = 144,000; the prize the Antichrist seeks). “Christ,” “Jesus,” and “Savior” sum to 12 in various Gematria. So we find then that the ‘magic’ being worked in shootings, by all the lines and cleverness employed in resulting relationships we have not even begun to discover (subsequent posts)… are all aimed at confounding Christ, and Man, especially those souls who are his most prized, the 144,000. The only way he can do that, is to beat Christ at Armageddon.

Mass shootings, then, are simply a ‘bring it on,’ ploy to hurry things along.

If you find all this compelling and disturbing, you haven’t seen anything, yet. Keep reading…

Go back to Introduction

Go back to Proof OneGun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Go to Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines

Go to Sidebar: The ‘Science’ Behind MAGIC NUMBERS, Their Meaning, and Decoding

Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Any time you find a cover up, you necessarily have a conspiracy to contend with, because a cover up requires multiple parties to work together for criminal benefit. So I wonder: why do groups seeking gun control, including governmentals and liberal media, who should be using every opportunity to make their case for gun control, instead act as if the bulk of gun violence never took place? Why do they employ blinders and avoid publicizing fully?

Are there any patterns in mass shootings?  

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  media, government, and gun grabbers consistently conceal more shootings than they tell you of;
•  they are also willfully spreading mis/disinformation;
•  were they to tell you all, the patterns would be easier to spot — a defacto cover up.


Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Is there a mass shooting conspiracy?

Gun grabbers, generally speaking, seem to have a sympathetic voice in government circles and, especially, mainstream media. If you look carefully at the actual wording of media reports and politicians, you frequently see evidence of their bias in favor of tighter gun control, if not outright calling for it, even including in some cases proposing an end to the 2nd Amendment.

From article on mainstream disinformation (CLICK)

Yet if you actually dig into a given key shooting event yourself, you start to realize media frequently deems to omit certain information which, by omission, flatters gun grabber ideology by willful ignorance of the greater truth. That includes a consistent unwillingness to consider that something besides random gunplay is afoot; they never ask the obvious questions. They get away with it, in part, because they are not telling you about all the shootings.

The discoverable cover up takes form in refusing to acknowledge the true and full scope of the problem… the true number of actual mass shootings. This post spotlights the matter and considers why they choose such silence. One has to ask why, if pro gun grab, there would be such concealment? The answer is revealing, though the full answer shows how easily the issue could become clouded.

If you scan the Internet with a search you will find most mainstream sources talk about roughly 62 or so mass shootings in 30 years time (1982-2012). While other numbers and periods of time can be found, you will also find many of those reports talking about it being an increasingly more frequent event. Neither are factually correct, at least as of 2012 when the bulk of those cited were ‘selectively reported’ in order to make their point. Moreover, the narrower and arbitrary date ranges employed do make it easier to portray increasing frequency claims as ‘valid concerns.’

Point is, there is no useful consensus as to the actual number, much less any resulting trends.

There is also actual disinformation and misinformation in play, either by stupidity or intent. Much of mainstream tends to cite the same two original resources, both of which are completely worthless in terms of accuracy, and full of what at least seems intentional deceit. Worse, they are easily detected if using your brain, but even the White House and former Presidents make false statements based on their data (choosing not to think, or having no brain, perhaps, but more likely, having an agenda well served, thereby). Mother Jones, which used to be an excellent investigative journal until it came under control of Mainstream Media Moguls, is one of the flawed sources, as detailed, here.

The worst source is the Brady Campaign to Prevent Gun Violence, which maintains a huge database which is closer to mine in shooting event count than perhaps any other. However, it is so full of errors as to be useless. The same shooting can be cited as often as four times. Huge numbers of shootings have zero information which can be verified, their Web links no longer active or failing to lead the reader to the claim. Many other errors of this sort exist.

Worse, many Brady citations are not exclusively mass shootings at all, and though Brady’s use of the data does not directly claim the list is exclusively about mass shootings, they elsewhere imply it so and promote the list through dozens of Web venues without bothering to correct their wrongful assertion that it does. For example, consider a widely repeated/linked interactive map (one of three different flawed maps and data base engines based on the Brady material) citing the entire Brady list of 431 entries as separate mass shootings.

Trouble is, eliminating those with problems or not mass shootings, the actual number is closer to that of USA Today, who has the closest to an honest presentation. Even though they, too, reference Brady, they seem to have figured out the Brady problem and sought to remedy it. Note, however, that it is citing mass murders, inclusive of fires, stabbings, etc., — not exclusively shootings. This again makes it difficult for the average Joe to avoid a false impression. To their credit, they at least provide a button to filter by ‘shootings,’ which at the time of writing totaled 173 out of 227 mapped. That’s a full 100 more than the inventory cited in most reviews outside of Brady, and less than half of what Brady includes. But it still comes nowhere close to the truth.

Is media hiding something about mass shootings?

So what are the real numbers?

In my study, I elected to go back to the first known mass shooting widely publicized nationally, the Texas Tower shooting of 1966. This coincides in general with the time frame when CIA had perfected mastery of various Manchurian Candidate programs, notably the MK series. Now if you use that as a starting point and come forward, the frequency indeed increases, at least to a point, and it is indeed possible to select a limited time frame window where a range of shooting events reflect an increase… but it is also possible to find periods of decrease; fluctuation is common enough to at least support the notion of randomness which deters conclusions of increasing gun violence.

In general, national mainstream news has told us of about 100 shootings since the Texas Tower, spread out over roughly 50 years. Because where they used to only tell us about really big ones — perhaps one or two a year — they now tell us about almost each and every one, it SEEMS like there is an increase. Adding to the illusion, they talk about them days-on-end to hammer in the point, where in the past, ongoing coverage was spotty, at best, unless local, of course. But is this honest reporting of the truth? What do the real numbers say?

“NO!” is what they say. Take the 30-year number of 62. The actual count by my research totals 368, nearly SIX TIMES the number reported.

1988 – 5, 1 Postal, 2 Schools
1989 – 1
1990 – 0
1991 – 6, 4 Postal
1992 – 3, 1 School
1993 – 7, 3 Postal
1994 – 1
1995 – 2
1996 – 4, 1 Postal
1997 – 5, 2 Postal
1998 – 5, 1 Postal, 3 Schools
1999 – 8, 1 Postal, 1 School
2000 – 1
2001 – 2
2002 – 2
2004 – 5
2005 – 5, 1 School
2006 – 14, 2 Postal
2007 – 23, 3 School
2008 – 69, 5 Schools
2009 -88, 2 Schools
2010 – 47, 1 School
2011 – 35
2012 – 35, 5 Schools

Moreover, the numbers reveal something quite different than the ‘increase in random mass shootings’ being reported. Instead what you see are two periods of time where there were two distinct patterns. Before 2006 you see something approximating random distribution in low numbers, almost half of which are Postal, which I maintain are likely almost all programmable person events, the experimentation phase, if you will, where a government institution had tight control of those involved.

Note: 2006 becomes a pivot year, where the last Postal happens, and you start to get an explosion of ‘civilian’ shootings, three times as many that year, and even more in subsequent years after 2006. There we find not a steady increase, but a bell curve. What produces a bell curve? You get bell curves when you apply force to something; it starts moving slowly and gains speed, then once maximum energy has been accomodated, it coasts, and then starts to slow down. That alone implies intelligence behind the sudden spurt, and further implies we are almost at ‘End Game’ point in whatever plot is unfolding; we have precious little time remaining to thwart it.

In total, research thus far reveals more than 450 shootings through 2012, from among which media and gun grabbers can and have obviously cherry picked. There are easily another 100 which could not be plotted in my study because needed accuracy of details were not usefully available, and likely hundreds more that are simply not available through online research due mismatches in keywords; you don’t always know what to search on, and terminology used has evolved over time.

Why would media hide the truth about mass shootings?

Why disparity between media and truth?

How is it, then, that virtually all mainstream or government resources have elected to tell you of only 70(ish), or 200(ish), within select timeline widows useful to them? What are they electing to hide, and why? This is a question you must ask if you value truth and justice.

Every major city’s paper subscribes to every other major paper to keep abreast of what they are reporting. So for a major to under report mass shootings in order to proclaim a trend of increasing violence, is a willful lie. On the other hand, there are reasons for minor variations in what might be included in a given study, in case you are moved to cut some slack. I for one, am less inclined.

There is, however, a bit of a loophole through which concealment might be harder to prove or detect. A mass shooting is defined by FBI as four or more dead or injured in a shooting incident — by gunshot. Interesting then, that Brady elects to include any injury, including minor cuts and abrasions due to falling down or flying glass, etc. More manipulation of data for agenda’s sake, it seems, via hangnails.

However, FBI, despite giving it a category and definition, even breaking it down into sub groups (e.g., gang related, domestic violence, etc.), themselves fail to cite any statistics of their own, as they do in all other categories of crimes they track. To me, this proves that at the very least, government is participatory in perpetuating media myths by cover up through omission, and has a gun grabbing agenda. When a President quotes misinformation, you have even more such proof.

The FBI definition leaves us with this upshot: many drive by shootings qualify, as do tragic familicides, robberies, and so on, all of which tend to make local news. The previous article link offers other complexities which can impact on definition as to what constitutes a mass shooting, but none of these complexities seem to be impacting what media elects to include in their national coverage, and resulting limited counts; they include what suits their whim — those stories most likely to generate outrage or shock.

But, as every major community has its fair share of all defined forms of mass shootings, there is no need to elevate them all to national prominence unless there is some ‘marketing’ usefulness to the anti-gun crowd, such as if at a basketball game in a public park. Locals hear all of their local events, plus national, and the problem therefore seems sufficiently large and pervasive in support of gun control arguments, but insufficient to see any patterns; they do not know the full extent of what is happening in other communities.

This further drives them to think their own community especially dangerous (well, some are), and letters to the Editor and government authorities are dashed off seeking a ‘crackdown.’ But what if they knew the truth and realized their community was closer to normal, or understood that there was intelligent design at play? What would their letters to the Editor look like, then? Would they be calling for gun control, or Congressional Investigation into the intelligence community’s mind control research, or the power elite cultists? Would they be wanting guns to be collected, or would they be buying guns?

I’m not the only one to notice this under reporting. There has recently evolved an anti-gun group made up of loosely aligned members nationally who report ALL local mass shootings directly to their central Web page. They do use the proper definition of mass shooting, and their results underscore the problem for knowing the precise full count. They report 365 documented mass shootings in 2013 ALONE. That gives you an idea of how many shootings in prior years may simply not be on the Web in a form making them sufficiently easy to find. Therefore, even my larger numbers would seem inadequate (but as we will see, they still remain appropriate to the need).

Unfortunately, no one like them has been doing this for prior years, so once more, the ‘increase’ in shootings is seen as dramatic only due their improved full-reporting methods in ‘real time,’ but it can easily be argued as a false indicator. You can’t just go back in time and research, because unless the news source itself without reading every back issue of every daily newspaper in America. It’s damn hard to find those which have been earlier underreported.

Now, for my purposes, I elect to choose all which have available details useful for analytical purposes, which is again more than 450, less a good number of the 365 just mentioned, since that Web site was not discovered in my search until after I had stopped adding to my list. Understand, too, that anyone seeking to employ intelligent design would most likely need limit their own database to these same events, both because their own group of conspirators would face the same difficulties in finding underreported events, and more to the point, because it would be required that they be visible events to others in their NWO cabal — other competing groups.

But it is not these larger numbers which should concern us at the moment.

No. It is instead important to go back to my first attempt at looking for patterns, and much smaller numbers which were in hand. I made the mistake of trusting media and employed that list of 70 plus most cited shootings, only. It is important to note that even with that smaller data set, patterns were revealed, and further important to understand that a control group was also employed which compared favorably in verification of the method and findings as being scientifically sound. More on that, shortly.

The point is, in summary, that the patterns on this smaller group were subtly revealed, and only after exhaustive study. They would have been pointless to casual review, revealing nothing suspicious outwardly. But my unorthodox methods gave me an edge, thankfully. More so, of course, once the database grew to include the hidden shootings.

Once I realized and uncovered the full scale of event histories, the patterns became easier to find, and were quite overwhelming and more revealing of hidden information. Therefore, one very logical reason select gun grabbers with both a dark motive and the means to control media’s reporting have exercised restraint and employed confusion in their selective ‘complaints,’ is that full disclosure would increase the likelihood that someone like myself would come along and find the patterns, and expose them, perhaps even without my methods.

That perfectly defines a cover up. That, in turn, defines a conspiracy’s very existence.

Go back to Introduction

Go to Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters

Crime Series: Ten Unexpected Proofs ‘Random’ Mass Shootings are by Intelligent Design

Ten easy-to-grasp but remarkable proofs, both visible and hidden: Illuminati style mystical symbolism and related ancient magical mysteries, calling cards, bragging rights, and Warlock spells cast against America, and the World. Conventional clues, too.

Are there any patterns in mass shootings? 

by H. Michael Sweeney  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this multi-part posting series…

•  there are 10 interlocking proofs that mass shootings are not random;
•  they include various kinds of patterns, visible and unseen, and even coded information;
•  that the pattern predicts itself, and understanding may therefore help stop the murder;
•  that the codes and clues seem to be like signatures identifying the architects.

Are mass shootings by intelligent design?

Introduction: Ten Proofs ‘Random’ Mass Shootings by Intelligent Design

Is there a mass shooting conspiracy?

Note: This series is not yet ready for full presentation, but the most recent Fort Hood forces me to start releasing the material without delay. The reason for delay has had to do with an inability to provide high quality graphics suitable for proofs. This will be overcome, shortly, I hope.

One thing you need to know about me as an investigative writer or, as media and government would prefer you to think of me, a ‘conspiracy theorist,’ is this: whenever I decide to take a close look at a potential conspiracy or lesser matter, I do it right. If I cannot uncover something no one else has brought to light, I’m either not finished, or I’ve backed out concluding it beyond reach, or a dud. If you read my findings on a given research, you will undoubtedly learn something FACTUAL no one else had previously discovered or brought to light. And so…

In this matter, we find the shear volume of startling new information overshadows and renders original headlines and competing theories essentially meaningless — especially media’s version. It will make you angry. It will scare you. The question is, will it motivate you to do something about it? YOU are what you are waiting for, you know.

But in introduction, there is still one other point which must be made; it is in form of a problematic question. Can I get you, the reader, to override your current belief structures long enough to  consider the unusual nature of the findings? This presentation will most assuredly fly in the face of what most people consider ‘traditional wisdom,’ but it also will explain why it is non-the-less valid. Can you handle the Truth, or will you wimp out to the comfort zone of current beliefs?

Area all mass shooters psycho?

On suspending belief structures


Dormer was not quite a ‘Mass Shooter’ incident, at least not at a single location/time. But the affair highlights the problem of accepting ‘random’ as the right word to apply to shootings when there are so many problems with the official story. CLICK to learn about why many people think him just another shooting patsy.

I began a ten-year research project for a book, Fatal Rebirth, in late 1989, which also begat a screenplay published on line in 1999 (The Electronic Apocalypse). In the book’s Introduction I urged the reader to suspend their belief structures briefly and read the material as if merely fiction for entertainment’s sake, because many of the concepts within were so new and unusual as to defy belief — likely seen as ‘far-fetched’ by most uninformed readers. I offered over 1,500 footnotes and a huge Appendix section to help them consider why I deemed them factual.

This blog post should be read in like manner, especially if you are content with government’s actions, are a politician, member of a government agency, military, or any part of the justice system, or Media. Especially if you are involved in a mass shooting incident as a professional or a victim seeking to know the truth. And even more so if you are gun owner, or even among what 2nd Amendment supporters refer to as a ‘gun grabber.’ I plead, therefore, that you suspend your belief structures briefly as if reading a political/horror-science fiction piece.  That’s what it is, actually, minus the fiction component.

You will, like readers of Fatal Rebirth, I would hope, realize the truth by the time you reach the end. Or, at the very least, you will be entertained for all your reluctance to let the message sink in and take root.

If nothing else, even if you choose to doubt some of the more obscure subtopics (i.e., relating to mysticism) have any factual basis in REALITY, consider this: it matters NOT what YOU think, given they ARE taken as real by persons likely to be behind any such conspiracy (i.e., ‘Illuminati’ Satanists). You MUST also ask yourself, “Can the sheer magnitude of interlocking clues be ignored?” Because at every turn they defy the odds of coincidental probability, as illustrated by carefully crafted control study groups. If thinking logically, you MUST concur that intelligent design is revealed despite what you may think about the logic of the beliefs which lay behind it, or the unusual way in which the evidence was revealed.

Pending you conclusion, by all means feel free to think me mad if you must. Read just for fun, but please read it through to end before you render final judgment as to if madness or truth be present. A logical reader will be converted unless their mind is already so firmly made up that they do not wish to be confused by facts which destroy their belief structures. Judge not what ye know not, but that upon which ye are well informed and have considered fully, judge freely.

Your future and the future of your children could well be at stake, a statement applying to all mankind. Why do I say this? The book mentioned above, Fatal Rebirth, was based on trying to illustrate what I call the Unified Conspiracy Theory; the notion that all of America’s darkest bumps in the night for the last half of the prior Century, forward, were not random oddities by random people for random agenda, but carefully orchestrated by the same core group of people with but one goal for the World in mind.

I termed them Shadow, but they are also known by other names; the New World Order, the Illuminati, the Power Elite, Globalists, and among them, member names like CIA, Skull and Bones, Bilderbergers, Council on Foreign Relations, and many more of like nature. Their goal I termed End Game; the establishment of a One World government, a single seat of power in order to seat the Antichrist upon his throne and bring us to Armageddon.

The Unified Conspiracy Theory, once justified in research and taking shape in book form, led me to realize that their stepwise actions over fifty years of mysteries were indeed leading to one goal. Knowing the goal, I reasoned, it should be possible to forecast the next logical steps. So the book also included within its presentation several terrible event predictions expected to take place in our near future. Thus far, though I do not claim to have gotten all event details precisely correct, many terrible forecasts have already come to pass. Among these were:

a) an assassination attempt on Ross Perot or his family to cause him to drop out of the Presidential Race, a matter which indeed transpired using mailed Anthrax according to a Secret Service back channel contact;

b) the false flag downing of the World Trade Center by civilian passenger jets which;

c) resulted in a series of Middle East Oil Wars. Other predictions include two more terror plots which are part and parcel of this blog post. Those are…

d) a false flag nuclear attack on Charleston, S.C. and Portland Oregon (the later of which I have already thwarted, it seems – see middle of my home page), and more to the point…


Note: you can get a free copy of Vol I of Fatal Rebirth (ebook) by email request to pppbooks at Comcast (net). You will be glad you did, as it will take you far deeper into the Rabbit Hole than Alice or Neo had ever gone. This pill is black, though trimmed in red, white, and blue.

So, if ready to suspend your belief structure, let us begin. Pretend there is, despite media’s recent attempt in the Cincia shooting to portray anyone who believes in the New World Order as mentally ill and anti-patriotic, that such a conspiracy is actually afoot. Also pretend, if you must, that Political Control Technology in the form of the Manchurian Candidate is real. There are real-life Jason Bournes out there, as my book, MC Realities, and other books on Political Control Technology illustrate more than adequately. Even the Smithsonian channel knows.

This will make the key postulations, testing methods, conclusions, and proofs of the core material easier to accept, especially as they will be offered in the manner of scientific discovery — exactly as I undertook them as investigative writer. You will, in fact, be able to retrace my work to double check it, if you wish — as long as you review the full series of posts and sidebars before you attempt it, lest you make a critical error.  Please subscribe to my blog pages to insure you are notified as the remaining posts in the series are added.

Are mass shootings are by intelligent design?

The Investigation

Jason Bourne… though fictional, is based on real-World programmable assassins. Do you suppose CIA or anyone else would not find something useful to do with failures in such programs? Might they not make excellent disposable patsies? Image/film:

Some several months ago, insulted by media’s misreporting of Aurora and Sandy Hook and outright clues that a disinformation campaign was afoot, I began finding ample cause for concern.  But how might one determine if other mass shootings were arranged as part of some kind of sick criminal conspiracy, one which might involve both real and faked shootings?

I started with several basic presumptions of truth, and then set about to see if the logical evidence such presumptions would require were indeed in place.  The ‘illogical’ presumptions fostered by the Unified Conspiracy Theory requiring suspension of belief are as follows:

1)    That Shadow and their Globalism requires destruction of America, and its Constitution in order to enable forming the North American Union, a matter which in turn requires that the Right to Bear Arms is first invalidated, and arms confiscated or gun owners otherwise neutralized in a manner similar to that of the Australia;

2)    That the New World Order, the modern day Illuminati, if you will, would be well capable of undertaking a campaign of gun violence for such cause, but being an Illumined Power Elite lost to Satanic and Masonic mysticism, they would employ mystical constructs which would leave detectible footprints if knowing what to look for;

3)    That the principle tool of such a plot would involve a small army of patsies, cut outs, and fall guys, principally from a category best known to the public as Manchurian Candidates. It may additionally involve a small army of blindly obedient members placed within our armed forces, the intelligence community, and law enforcement to aid more indirectly in supporting roles. This would include logistics, psyops, and cover up, or even command and control, generally unaware as to the truth or reason behind their orders. These are the same players frequently found playing key roles in the lives of mind control victims at large.

All three presumptions must be true to make a proper accusation, for they comprise the basic proofs of any crime: Motive, Opportunity, and Means. Normally, we think of opportunity as meaning access to the scene of the crime, typically proven by forensics such as fingerprints, or better yet, actual eye witnesses. In this case, they deliberately left their fingerprints, in a manner of speaking. In fact, the bulk of the proofs fall into this category, perhaps even naming individuals behind the plot. At the very least, we are indeed dealing with the Elite, those involved in principalities and powers.

Indeed: Two names have already surfaced by such clues, and both are billionaires. I also have a dozen other names of likely conspirators, but no names are released; these things are my Life Insurance Policy.

Sidebar PostOn Programmable People. This sidebar post addresses the notion of the possibility that at least some mass shooters are mind controlled patsies, and reconciles their coexistence with truly random shootings ­­— those which are more naturally spontaneous crimes — which can collectively still both be component parts of the same intelligent design.  This leads us to the finer details of how shooting event locations and dates lend importance to our consideration, and just how these things can additionally reveal intentional, yet concealed clues.

Here it should be mentioned, that many observers of the New World Order crowd favor the supposition that among their leadership we might find the modern-day Illuminati in spirit, if not in actual blood lineage, even though they may have since assumed a different family name. By way of example, in my research, I have had reason to conclude that the Rotheschild name was assumed; those assuming it being Knights Templar in hidding, their wealth derived from Templar treasure, and not truly Jewish by ancestry or faith, at all.

Many who favor the notion of a Modern-day Illuminati additionally believe, as do I, that there are at least two, and as many as four groups competing with each other within the movement to be the ones ‘honored’ to have one of their own selected to become the Antichrist. Much of what is discovered in this investigative series will point to this being true in one way, or inherently implied in another. It is, in fact, one very good reason to employ symbolisms and other clues which act as signatures of those so bidding for selection.

Such evidence was abundant, even easy to find, and I remain convinced that the trio of presumptions are sound enough to warrant seeking incontrovertible proofs. I sought such proofs both in quality and quantity sufficient to illustrate that ‘random’ was not the right word to describe mass shootings, but rather, ‘intelligent design,’ is.

The path of my continued investigation led to endless shocking discoveries, but there was a problem: to describe the methods and explain findings to the casual reader would, it seemed, require a tedious educational process and boring, repetitious citation of facts. It would be about as fun to read as a spreadsheet or database. Not good.

People want visual sound bites easily grasped. More so if Sheeple content with their Evening News and easily frightened off by words like ‘conspiracy theorist,’ and ‘New World Order,’ or similar. Worse, the investigation bogged because of the real life tragedies each shooting represented. Proper investigation meant exhaustive study of individual events, reviewing endless horrific detailed accounts and sad, brutal media imagery. It was taking an emotional and even physical toll upon my body and mind, and my spirit. Eventually, instead of plodding along 10-14 hours a day as at the start, I found myself barely able to work on it a few hours a week.

I played with several ideas on how to present the story NOW, without completion of the full study, for there is indeed already a mountain of proofs uncovered. But again, the complexities in presentation left me feeling it a hopeless task. Finally, I decided to break it down into about a dozen short compartmentalized components suitable for a series of blog posts. Frankly, I’m hoping it will spur someone to offer useful help; it will take funding and staffing to properly complete the study. Or better still, perhaps some Sheriff or other authority will assume the duty as result of shootings in their jurisdiction.

Follows is a synopsis of the Ten Proofs to be presented. There will additionally be, at appropriate points, companion posts detailing the scientific methods or other analytical procedures involved in select proofs where a doubting Thomas type may wish to challenge the validity of claims. I firmly believe that for my proofs to be accepted, they should be presented in a way such that ANYONE can duplicate my work and verify accuracy and conclusions.

This is a legitimate investigation despite its atypical and unorthodox methods and odd topics involved. NOTE: links will NOT WORK until the various posts involved have been posted. You may click on them to discover their current state. Again, subscription to this blog will notify you when new posts are added.

What are the ten proofs of a mass shooter conspiracy?

The Ten Proofs in review…

Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns;

Any time you find a cover up, you necessarily have a conspiracy to contend with. Gun grabbing groups, including government and biased or puppet media forces, should be using every opportunity to make their case for gun control, but act as if the bulk of gun violence never took place. Why do they employ selective blinders? There is a reason.

Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters;

The Illuminati loves magical numbers, as they can translate into meaningful words or names, or leverage ‘spells’. Interesting then, that basic shooting statistics establish set after set in the most magical and potent number of all, one which decodes to ‘Satan.’ This alone reveals dramatic coincidences well beyond the possibility of random chance.

Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines;

The same Dispersal Pattern Studies method applied by government researchers to UFO sightings reveals Mass Shootings do something UFO sightings allegedly do not: form repetitive patterns with GPS accuracy, doorway-to-doorway-to-doorway.

Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes;

When it comes to symbolism, nothing outperforms a graphical shape. Better still when that shape itself has magical properties or relationships to other shapes, or its own hidden or obvious meaning. 

Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters;

It defies odds that perfect shapes should cluster together in ways which share overlapping lines or corners, and be generally both aligned and mirrored in additional symbolism.

Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols;

Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart;

Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View;

The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.

Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages;

Shooting line sets share three or more identical magical numbers within their data points. These decode to tell us when and where the next shooting will be, name a shooter, or perfectly prophesy some specific outcome.

Proof Ten: Individual Shootings Examined in Micro Duplicate the National Study Proofs

Two examples are offered; Aurora and Sandy Hook. They not only duplicate the ten proofs, but they mirror each other and one points to the other.
Why are mass shootings on the rise?

Are you ready of this? Buckle up!

So let us begin. I propose your best bet will be to SUBSCRIBE to my blog pages so that you are automatically notified as new posts are made to complete the series. Please link, share, tweet, etc., and by all mean vote your ranking at page top of each one, and comment with your questions, criticisms, or thoughts. How else will other know this is important?

Do bear in mind as you read, each offered proof individually seems to defy the odds or logic path required for truly random shooting events. Collectively, it is monumentally clear. Also bear in mind that I am human, and I, like any other, am prone to making mistakes. A ton of information had to be entered and copied from one location to another multiple times (multiple database and software applications). Therefore, either because of a mistake on my part, or perhaps because of a mistake in media or other accounts/records, any given individual data point in any given set of proofs may be found invalid.

By all means let me know if you find such a discrepancy, but please remember this: a single error in a single data point does not invalidate all other data points, and therefore, does not invalidate the conclusions or the suppositions, themselves. In order to dispute my findings, you will need to offer proofs that the method is flawed, the entire data set was in error, or analytical logic was faulty. More: such dispute must address and ultimately invalidate all ten proofs, or short of that, offer equally viable alternative explanations which fit the findings and afford a more innocent explanation.

Since each proof tends to defy all possible odds of random coincidence, and does so consistently, again and again, naysayers will have their work cut out for them. More so, because in many cases, control groups have been established to show truly random data points enjoy no such pattern. I have done my homework, and carefully so.

I will demand the same of naysayers.

Go to Proof OneGun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Go to Side Bar: On on Programmable People


How Social Network Trolls Target, Track, and Psychologically Profile You

How to spot and deal with Trolls, including a clever tool they use in any social media capable of posting images (VERY prevalent on Facebook), and quite insidious with far reaching implications. BEWARE: you betray yourself and your friends if you take things at face value.

What is a Web Troll?

by H. Michael Sweeney

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

How does being a web troll work?

UPDATE: Nov. 11, 2014 Perhaps as if to ‘test’ me as result of this article (or not), a Web troll began the process described herein to goad me argumentatively  while also employing a good half dozen of the usual disinfo tactics in the 25 Rules of Disinformation (linked below). So I unfriended him and watched: that same day, ‘someone’ created a new FB account and almost immediately friended two of my friends, posted ONE activist post, and ONE peace post, then requested to friend me. Sure. OK. BUT I HAVE MY EYE ON YOU, because that’s how easy it is to get a new identity and hook back up to a target. Not that I care. Trolls are tasty.

Are you being targeted by online government trolls

How Social Network Trolls Target, Track, and Psychologically Profile You

Reading this post you will learn…

•  That there are three basic kinds of trolls and subsequent ‘missions’ against targets like YOU;
•  That there are troll profiling and tracking tools or methods which can be recognized;
•  That there are ways to protect yourself without drawing more unwanted attention; 
•  That the Troll represents a danger in that their ‘assessment’ can lead to escalation in your targeting.
Is social media infiltrated by government trolls?

Government and Commercial Trolls

Consider, for example, the friend ranking and layer’s of affiliation tracking tool. A graphic is created containing a simple textual message. It is graphical because there is no easy way to distinguish between two identical text messages, whereas, altering a single pixel’s color by 1 imperceptible shade of difference makes it unique, and allows thousands upon thousands of individually trackable versions. A Troll who has managed to friend a targeted person of interest then posts the textual graphic as if a sincere request. Examples will be shown.

These kinds of posts seem innocent enough and easily get spread as requested, allowing simple computerized search processes by FB’s intelligence community or marketing partners to see not only who is close to the target party, but at what layered level and loyalty or, if you prefer, like minded thinking. In point of fact, ANY image shared with a given political, philosophical, religious, or other belief or emotional message can be so tracked to perfectly define each such poster’s psychological profile, and rank their threat level to the paranoiac governmental powers that be. The same is true of marketing trolls seeking to learn about your product usage or demographic, etc.

The only safe share, then, we might presume, is textual or perhaps the sharing of a URL and it’s image, or an image we ourselves create and have perhaps included in our FB albums. Even with URL’s however, the possibility exists it is still being tracked, especially if a Troll operated resource such as Federal Jack, a known DHS sponsored Sorcha Faal disinformationa conduit targeting conspiracy theorists, activists, and other ‘potential terrorists.’ Their goal is to get you to ‘share’ their links, thereby spreading disinformation while psychologically cataloging YOU and any of your friends’ beliefs; all who click to learn more. They may need to have a troll assigned to them, after all, for being yet another ‘potential terrorist’ — a free thinker, patriot, constitutionalist, etc.

Worse, we have learned from our new Paul Revere of the coming Second American Revolution (Snowden), that NSA is not only monitoring FB activities big time but that Trolls from NSA, FBI, DHS, DOD, and even the FED, and other paranoid agencies, and even corporations who have a strong and growing list of people who think ill of them, like Monsanto and some banks — all regularly maintain false social media identities for entrapment and spying purposes. They even infiltrate online gaming. Snowden’s latest bombshell, according the foreign media analysts, indicates there were so many game Trolls that it was starting to change the character of online gaming, and special tools had to be developed so that Trolls would not end up targeting other Trolls and more easily remain inobvious. We are talking here, about games with chat or other communications capabilities within the game or as part of game support, especially when in a social network manner.

And it is clear that snooping is also rampant among commercial interests, which is certainly true in online gaming, which after all, is a commercial enterprise. FB is perhaps the biggest offender in this area.

How can you spot a social media troll?

Differentiating an innocent graphic from a potential spy tool…

There are several online graphical message generating services. FB themselves seems to be hooked up with one called your-ecards (.com). Another is someecards (.com). Anyone can use these to generate a simple textual graphic with or without use of stock illustration graphics (e.g., a man looking perplexed), typically in silhouette or line art form. They can then easily share it through their favorite social media(s) with a few additional clicks. These can always be recognized because the logo for the creating Web service is displayed at the bottom. An additional hallmark of such services is that the background is almost always colored, and there are scant few colors available. The default color or otherwise most popular seems to be pale blue, pale green, or yellow-orange.

So when you see a colored background, typically with larger or fancier text than a normal posting, you are clearly looking at a graphical text post. The next thing to look for is the logo. If you see a logo, it was likely a sincerely generated message by a genuine human resident of social media. However, if there is no such logo, the message may have been generated by a Troll using his own computerized tools to psychologically target you regarding a select individual hot button. Are you, for instance, a tax protester, pro gun, anti GMO, for or against a given politician or political topic, or simply, who is a good like-minded friend of yours as opposed to some stranger you’ve accepted on the Network. Such messages also tend to be minus any artwork — text only. There is one more defining clue to look for.

Because there may be multiple versions of the same message for targeting different individuals by multiple Trolls interested in gathering information about many someones, there is a need to tell one shared message copy from another, which is exactly why it needs to be a graphic.  YOUR version must be physically different from MINE. The simple solution is to vary one or more pixels in a way easy for a software routine to detect, and then match to a targeted individual and their Troll/need. Given the countless millions of users on FB (and other social media) who might be deemed targets, it may mean that many, many dozens of pixels will need to be manipulated. My research shows that, indeed, most of the suspicious postings, in addition to missing the logos, have such visual manipulations. Examples:


This is an example of a Troll-generated chain letter designed to find out your religious views, and who among your friends is of like mind. Note the guilt factor in the last sentence, and no true traditional Christian message. Note also the dark aberration, a visual flaw above the numeral 9 of 97%.


This is an example of a Troll-generated chain letter designed to find out more about your true close friends, as opposed to casual Network contacts you don’t personally know. Again, note the visual flaws in the slightly darker ‘blur’ areas about the letters… you may need to zoom in. This phenomenon is common in such messages, creating a pool of pixels useful in manipulations.

So one needs to look for such abberations or flaws in the background, usually darkened pixels along the edge, most commonly gathered in clusters or strips. You have to ask yourself… if going to the trouble to create a custom graphic for a text message instead of simply typing it in, why would they: a) choose the ugly colors used by such as your-ecard if not trying to make you think it such; b) take the extra steps to strip away the logo if using such a service (the point being they did not); and c) end up creating an image with a flawed background (where did the aberration come from, if not deliberate)?

When these clues are present, you are staring at a Trollish spy tool. To then share it betrays and catalogs you and links you and your beliefs with any of your friends who do the same, and theirs, and so forth, on down the line. The proper thing to do is enter into the comments: “I suggest you delete this post because it fits the description of a Troll’s chain-letter spy tool to catalog, track, or psychologically profile and establish links between like-minded persons: learn more here:” That link goes to this blog post you are reading.

Then I suggest you share the post anyway with a similar message, “Share this to warn others about Troll spy tool chain-letters to catalog or psychologically profile and establish links between like-minded persons. To learn more about this tool, visit this link”

Finally, look carefully at the original post. Most social media will have a means to indicate if it was itself being shared, or was a direct post. If direct, it’s YOUR Troll. If shared, the poster was gullible in sharing, and is not likely a Troll… but beware that that could be arranged for as a deceit — so watch to see if the poster repeats the ploy frequently. You might optionally go to the ‘cited source’ of the share and try to find the post on their wall if you want to try to see if they are the Troll, and on to the next if not, and so forth, posting or messaging those encountered along the way who are victims, if you can. But that can be a LOT of work.

Are social media trolls sociopaths or psychopaths?

More Direct Trolls; Psyops and Sociopaths

The real threat to activists and politically incorrect persons online, like myself, is government agents paid to do nothing but sit in front of a computer and pretend to be your social network friend, someone you don’t really know at all, of course. They don’t just post Trollish images, they comment, and even message you. Like the aforementioned tool, they seek to learn everything they can to psychologically profile you, as well as see who ‘likes’ your posts and what THEY comment. But they are also there to play mind games. You are officially a victim of psychological warfare, perhaps even by someone from within the U.S. military, or even the military of another country. They are quite often sociopaths, so chosen because those traits make them more efficient.

Here are some tips on how to spot and deal with this class of Troll, as well as the kind of Troll who is simply out to make trouble for a given collective of people who believe a certain way about a certain topic. You know the type, my favorite example being the warrior Atheist who deems it his life’s mission to ferret out believers in God and annoy them with endless barbs and zings as if they were evil and dangerous for daring to worship. These people will wax sociopathic, too, and even psychopathic, when given enough rope. UNFRIEND these kinds of Trolls.

Hint 1) Trolls work in packs or maintain multiple identities to be a self-contained pack. That way, if you delete one of them, others survive, and then they generate yet another new identity and friend request to maintain the pack. The advantage is that you can suffer a series of ‘In deference to your view, we all seem to believe the same (whatever)’ posts (i.e., you are an idiot on this matter). Sure. You might be an idiot. But at first, the pack is all positive and flattering to your own beliefs so you a) get used to seeing them, and b) start respecting their beliefs and presuming them the same as yours. That’s the worming in stage.

But when it is appropriate for profiling or attempting the role of agent provocateur or disinformationalist, they will all suddenly be believing in something more off the mark, and increasingly so, as often as not. But by now, you like them and their beliefs, and so, your reaction tends to be as they expect; they are pulling your chain, and observing your jerks, evaluating, and cataloging, attempting to modify your behavior through deceit — a form of mind control. Can you be controlled, or are you firmly centered in your beliefs? Are your notions your own, or being foisted upon you?

Hint 2) New Troll requests tend to be persons with scant history on the network, and very few posts, but posts akin to your own in substance. Note that Facebook asks you to suggest friends to them. NEVER do this unless someone you ACTUALLY KNOW in the real World. If you do it, you are giving them a list of new targets. Since I don’t fear and even enjoy playing with Trolls, I let anyone into my friend list, but that does not mean they get what they want from me. But you may be better off simply passing on marginally viable friend requests.

Hint 3) Try posting something deep and yet somehow provocative (in the eyes of the establishment) which requires a bit of reading and thought before drawing conclusions. Look for a pattern in response from the same suspect persons; a) almost instantaneous response in the manner of (Hint 1), and typically emotional rather than logical in nature. This is almost always short and designed to be inflammatory or provocative, a bit testy. This is followed by b) one or more secondary (pack) responses delayed rather a bit in time. These will be more in depth and thoughtful, and validate the former with logical argument, and may contain a link to give further credibility. Other brief pack replies may be sprinkled in for effect. Collectively, they are all in agreement regarding your idiocy (or whatever).

It is when the same people tend to respond in these patterns that you are very likely dealing with a Troll pack. You will find this is true regardless of what time of day or night you post. They never sleep because every psyops Troll is actually three people manning a keyboard around the clock. They can always respond quickly with the first response, but the careful response requires that they actually research and formulate the best supporting answer based on all they know about you and the topic, which they might need to first research, and likely, it involves a supervisor’s approval or must be compared against preset guidelines.

Hint 4) Thick skin, undaunted. There is nothing you can do to make these people not remain your friend, short of unfriending them, yourself. While they may match or even exceed your own expression of ire, they won’t go away no matter how you might choose to argue, or confront with insult. Indeed, they tend never to deal with insults directly, at all; they are irrelevant and serve no usefulness to their goal. A real person has an ego that must be defended, but they are just playing psychological games and feel superior regardless of what you say. But when you argue, watch out for the next hint, which is commonly employed in their responses.

This is also true of the sociopathic/psychopathic ‘cause’ trolls.

Hint 5) They tend to employ the 25 Rules of Disinformation. Easy to spot, easy to deal with, if you know what to look for. Be careful, though, because ordinary people sometimes use flawed presentation style or less-than-thoughtful posts which on the surface appear to fit one or more of the rules, when they are just being human. Watch for repeat performances, to know the difference. Give them rope.

Can trolls lead to real-world targeting?

Dangerous escalations; why we dare not ignore trolls

The real danger in online Trolls is this: their whole purpose in targeting you online can be to determine if you deserve real-World targeting, as well. With a few keystokes you can end up having your entire life put under a microscope; phone surveillance, tails, observation posts, bugs and cameras covertly placed in your home, mail intercepted and snooped, and so forth. Men in Black stuff. Its why I wrote The Professional Paranoid; a how-to book on detecting and dealing with this kind of targeting.

And, it can escalate further: electronic harassment, dirty tricks, political control technology (mind control) to make you look mentally ill to others, destroy personal relationships, wreck your income, and sabotage your life. For that, I wrote MC Realities, another how-to.

But it can also lead to the worst of all possible escalations; NDAA vanishing. If truly a pain in the neck to the government, a threat which needs to be dealt with more urgently… you can ‘legally’ (so they claim) kidnap you and make you vanish without any legal process. They can elect to torture you or give you over to some other country for ‘processing.’ Or, if they want, they can murder you and dispose of your body. This is how we know we are living in a tyrannical Police State, and why, then, government dare not tolerate free thinkers without Trolling them, and trampling on rights and freedoms at every turn, and why fear mongering is their number one justification. ‘Oooh… terrorists are everywhere! We need to TSA and NSA your ass for your own safety.’

What should I do if I encounter a social media troll?

What to do with a Troll

I personally do not mind their presence so much as some might. I enjoy providing them with disinformation, or provoking them to try to chase down a given pathway of dialogs only to suddenly drop the matter as if it never happened, or I don’t really care, or even was deliberately jerking their chain. I even kid them.

But most people would prefer to unfriend them, and there is NOTHING WRONG WITH THAT. Just know they will be right back with a new identity. It may be better to deal with the ones you know than to worry about finding the new ones you don’t yet know.

My favorite thing, however, is to educate them. I like posting factual material which challenges their personal beliefs that their job and their boss are operating on valid or just principles or beliefs, and purposes. I make them ashamed or feel guilt, whenever possible. It does not work with everyone, of course, but it is fun to try.

Are social media trolls dangerous?


Your privacy and personal safety could be at stake if you are in the hands of Trolls. The threat level is determined by how much our paranoid government fears people who fear government’s growing fascist police state/spying mentality, and dare to talk openly about it.  The more vocal you are, or the more aligned with or closer in links to others of like mind, or the more active you are elsewhere on the Web, or the more followers you have, and even the kinds of searches you make (that, too, is being watched by government) and certainly, your own original postings… each of these things determine if you might become the victim of someone else’s Troll, or have a Troll assigned to you, and what kind of Troll.

And once your ‘threat level’ has been assessed, that could lead to escalations that you will not likely want to experience. If you get a sense that such escalations are already in place or happening, by all means read my books, because they will help you know for sure, help identify the players, and form defenses. You can also contact me personally for free and for-fee online consulting or direct intervention services.

It’s what I do when I’m not being a thorn in the side of tyranny… and attracting Trolls.

Gun Shops, Grocers, Other Retailers Key to Disaster Survival

When the stinkiest FEMA kind of stuff hits the fan, anyone who has a business dealing in key resources will find their valuable inventories and property at risk of sack and pillage by looters, or outright theft by government. There is a way to protect such assets while at the same time insuring better chances of survival of families.

How do I protect my business in a disaster?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What can gun shop owners do to protect against gun consfication?

The Threat to Business Property is significant in a disaster…

Korean shop owners (rooftop) defend shops during LA Riots to augment or supplant Law Enforcement (click for riot details)

In the prior part of this series we reviewed a wide variety of disaster situations that make emergency preparedness an ultra-important concern for families, reasons far more serious and far reaching than mere quakes, floods, or tornadoes. In the second part, we proposed a disaster preparedness plan much more comprehensive and truly useful than that advised by FEMA/DHS, albeit one government will never approve. Why? Because it’s closer to their own preparations and mimics their own capabilities, and removes you from dependence upon them. That means they cannot control you by being your only source for key survival items.

But the previous material addressed family needs from their perspective. And, there were certain aspects of such a plan which would prove difficult for many families without the help of an outside party. Then we have businesses to consider, who have their own unique concerns as to what happens in dire emergencies. Business owners or responsible managers of many kinds of retail and other business with select kinds of inventories or resources, should be every bit as concerned as a family, and looking for a disaster preparedness plan which specifically protects their valuable business assets, both real property and inventories.

There are several key reasons to consider this a critical concern: One, many disasters are deemed Acts of God and are therefore not included under insurance provisions unless, perhaps, paying extra premiums for specific policy riders such as a flood or tornado insurance. No insurance policy provides protection against acts of war, which includes revolution, military coups and similar political unrest, often even excluding protection against riot losses — regardless of the cause of the riot.

And beyond the worry of insurance protection, FEMA’s plan for your assets in an emergency will very likely include confiscation and take over of your property ‘for the good of the community.’ Similar concerns exist in any Martial Law situation. So if you have such a business, you should worry and wonder if there is not some way you can protect your assets from such total or near-total loss or take over. Never fear, the Professional Paranoid is here to help…

What will happen to gun shops in a FEMA declared emergency?

Partnering with Family Collectives

The prior posts in this series dealt with idea of forming multi-family unit collectives for improved emergency preparedness at the family level, as well as why such preparedness plans and kits should go well beyond minimal FEMA advice and prepare for long-term disasters, not just three day fire/quake/flood protection. This involved numerous considerations and plans in terms of organization and supplies, individual responsibilities and more. But for many such collectives as might be established, some items become difficult to come by or store due to cost or special attributes.

The bottom line is, in a serious emergency situation, looting and general criminal activity become a serious threat to any owner of a business handling inventories of critical resources which are also valuable to long-term disaster kits. Often just as important, many such inventories represent a storage problem for long-term home survival kits. Gun shops especially, and even food or fuel can be difficult to store in quantity suitable for a long-lived disaster. Many more items could be added to such a list, as a given collective of families will have their own unique set of limitations and issues to resolve. As result, even a motorcycle shop or car dealership, auto parts store, tire shop, or tool shop, may find themselves in the same position as a gun shop. In some communities, for example, boats will be a key product in need of protection and in demand as an emergency item. So there are many kinds of businesses who can take advantage of the ideas offered here.

My goal in this series of posts was to attempt to find a solution addressing both these concerns by partnering family collectives with such owners. And, the word owners could in some cases mean ‘managers,’ where owners are corporations or persons who do not themselves manage and/or live near enough to ‘take charge’ for the purpose. Such partnerships are simple: the owner joins or heads a family collective, either one they formed on their own (perhaps made up of employee families), or by joining with someone who approaches them with an acceptable offer.

In some cases, such as gun shop owners or owners of vey large facilities (e.g., super market,), they may wish to partner with multiple collectives. This is because in the event of worst-case long-term disaster scenarios, there may be a need for significant armed resistance against third parties, even to include unconstitutional seizure by Federal forces. By unconstitutional, I mean in the event of an attempt to overthrow the government by the military, or armed insurrection to restore the Republic against some other form of tyranny.  We will know that horse when it rides into town; mass arrests or attempts to seize weapons door-to-door will be its hallmarks.

We all remember the LA Riots? Even though the National Guard was deployed, it was up to citizens to protect their own property. Neither soldier nor Police and Fire were of much help. Korean family-owned businesses gave us the model we need to consider following; they armed themselves to the teeth and took to the roofs of their stores and residences and fended off looters. Family units can band together in like fashion, and better yet if also joining with a one or more business owners in some mutually beneficial arrangement.

Gun shop owners, in particular, have a serious need. They become the highest-value target in town, and therefore, need many able-bodied people to bear arms — in sufficient number to become a significant deterrent to assault. This works well for the families involved, as well, providing them with low or no-cost access to weapons needed to protect their families and homes. The trick is to find ways to do it which do not amount to simply giving away inventory. Not a problem, given that provisional contractual agreements can be drawn up in advance.

How can we prevent government confiscation of our business assets in a declared emergency?

Making it work for all concerned

I propose that such partnerships might be best approached with a contractual agreement for mutual protection. The agreement should provision for both the possibility of taking possession of weapons and munitions immediately and only after a serious event transpires. It might provide for trade of ownership of weapons deployed once the crises is over for a minimum guarantee of service to the shop owner providing protection of the business property.  Weapons can be deemed as ‘rented’ during the disaster with options to purchase afterwards, perhaps with rental applying to the price, or may be considered as ‘payment’ for protection helps rendered, or some mix, thereof. Such items, pre any event, need not be fully deployed to family possession, allowing for normal inventory turnover so that older inventory is sold off and replaced with new, and families don’t need to worry about storage.

Take a gun shop: Only if the family collective partner wishes to take possession (ownership) of weapons for storage at home up front (the suggested kit calls for one pistol minimum), need any money change hands. Once a serious emergency transpires, the families can be issued the additional firearms from shop inventory, and sign for them. They must keep them safe, and must use them on call or by schedule in protection of the store property. It would only take one person from each family unit at a time, given the quantity of family partnerships participating — to adequately defend the store. They ‘pay for what they use’ in the form of a rental/purchase option to be addressed after the emergency ends, perhaps involving payment terms (perhaps involving very small payments pre disaster). There are any number of creative solutions to make it mutually viable.

I am no lawyer, but in a civil emergency, many laws fall by the wayside as a matter of practicality. A gun permit process is not something you worry about when the government is shut down and lives are at stake. However, a wise shop owner might want to check with a lawyer and get some advice and deal with such concerns up front. There is no reason a single individual from each family collective could not undergo a permit process as part of the contingency preparation. What they do with the weapons in an emergency should at that point no longer matter to the shop owner, with reasonable agreements to avoid illegal uses in place. One might also want to address how to safely store key records in order to insure lists of gun holders are not compromised and lead to confiscations, anyway.

Other kinds of businesses? Consumables such as food from a grocery store which have dates of expiration would be lost, anyway, so any financial arrangement to distribute storables in an emergency with any level of appropriate financial reimbursement or property protection services of participants should, IMO, be eagerly embraced. For most shop owners, it converts a disaster where they face the potential loss of all inventory and significant property damage into a situation that more closely approximates the ultimate ‘sale’ where all inventory goes out the door to happy customers, AND the property is protected.

From the family side, a collective should easily be able to field 6-10 adults to defend as many different business sites simultaneously, while still retaining sufficient adults to protect the home base camp. Therefore, they have access to 6-10 different key survival items they might not otherwise be able to afford or store long term. It is a win-win situation for everyone but looters and would-be confiscators.

Upon event occurrence, family members ‘report for duty’ and are issued weapons, sending the appropriate portion back to the family for home defense and protection from confiscation by FEMA/Military.  I propose an organized convoy is the only safe way, as otherwise, armed interlopers might dare to ambush a lone person or single vehicle. I further suggest that, if not already the case by natural instinct, a strict military-like organization and rules for command and engagement be established. Such a model should ideally trickle down to the family units as well, if a long-term event is involved.

Therefore, prior military service, especially in combat or involving combat training, is to be highly prized in any collective or partnership. Where such experience is found in a retired Officer (as opposed to an enlisted rank), so much the better. If there is additionally someone with prior intelligence or forward observer experience, or demolitions or military engineering background, better still. Likewise for any medical corps. or other medical background.

In closing, the business itself should have on hand sufficient stores of foods and other resources (as opined in the prior post) to sustain several months of a ‘stand off’ in defensive posture. A key factor will be the ability to communicate with partnering family units that they may be called in to provide force rotation, deliver emergency supplies, or outright tactical relief against assaulting forces. The prior posts cover communications alternatives in a total outage of all utilities.

How can I protect my business as well as my family in a disaster?

Logical Emergency Response Plan Government Won’t Approve

The government has for some time now been turning up our ‘threat perceptions’ regarding emergency preparedness… taking us to levels of ‘concern’ not seen since the height of the Cold War and the Cuban Missile Crises. As discussed in the prior post of this series, we need to figure out what they are NOT telling us, and prepare for THAT, too.

Why should I have an emergency plan?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What can I do to prepare for any emergency?

What you will learn reading this post:

  • That there are kinds of disasters government is not talking about which you should also prepare for;
  • That some disasters are best addressed by preparations based on collectives of households instead of reliance only upon one’s own household;
  • That the nature of the emergency dictates how long the period of time of distress, which dictates what the emergency preparedness plan should look like;
  • That some considerations go well beyond government’s advice, and in fact would not likely be approved by FEMA, DHS, or the Miltary… because they want you dependent upon their help and mercy as a means of political control.

What should my emergency preparedness plan look like?

Government is EMPHATICALLY urging us to prepare

In the first part of this series, we talked about WHY you need an emergency preparedness plan and kit which goes beyond FEMA/DHS recommendations. Regardless of their true reasons for such urgent and dramatic advice — by all means, do what they tell you: establish an emergency plan centered upon a home emergency supplies kit adequate for the kinds of emergencies they imply are of most concern (fire, quake, flood). But do it smarter than that, and cover all the bases, including the far more serious and dangerous possibilities reviewed in the prior post. Here is how best to do that without taking on the whole burden of cost and logistical overhead, yourself. But I warn you, the government will not approve, so part of your plan should include an attempt at quiet preparation and concealment.

What should my family do in a disaster? 

Multi-layered Partnerships

Don’t rely on just my advice, see what officials  have to say say (click for Morrow County Health)

A single family household, no matter how well prepared, cannot fare as well as several family units banded together. So much the better when those units are either actual neighbors, or relatives who live not too far away (say, an hour’s walk or less). So if you do not have relatives close enough to meet the need, you should immediately be sounding out the viewpoints of neighbors on this topic (a simple way is to suggest they read this post series, and ask what they think) and cultivating relationships with those of like thinking.

Herein, a ‘family unit’ may therefore consist of any combination of actual blood-related families joining with single neighbors or childless couples who are not related, or may be made up entirely of unrelated persons with no core family, as such. A unit should ideally be in the range of three-five adults, but in an emergency, teens are considered adults. So where most units are single persons or couples, you may want more participating units.

Such a collective of family units, no matter how well each unit is prepared individually, can indeed far better survive a serious matter by their alliance. It makes it possible to spread the need for more costly specialized emergency resources over a broader group; some family units can be designated as special resource parties with everyone sharing the financial burdon.  This makes a superior readiness more affordable as well as eliminating storage restrictions which might exist, such as faced by a given family unit in the group living in an apartment.

In the next Part of this series, we will also see that an ideal partner might be deemed a special resource party because they own a gas station, grocery store, gun shop, etc.  Many such businesses, in fact, have some special strategic opportunities to consider, which will be the focus of Part III — but you get what I’m hinting at.

How do I prepare an emergency survival kit?

Key Decision Point Factors

Some circumstances alter both individual and collective needs dramatically and will need to be accommodated with detailed planning. The following topics should be fully explored early in organizing the collective, because they may dictate a need to add yet another family unit into the mix, or help define who is a special resource party and what that will mean for all concerned in a disaster event:

Talk about disaster considerations in terms of resource needs and response plans…

a)    Categories of disaster events to be considered (i.e., individual events such as fire, plane crash, etc., area-wide events such as flood or terrorism, regional or national events such as Martial Law or pandemic event);

b)   Level of availability of, or threats posed by damage to critical services supply lines; water, power, gas, telecommunications;

c)    Types of destruction of home and property (i.e., fire, earthquake, flood, assault);

d)   Levels of community-wide destruction and resulting third-party threats to home/property/resources;

e)    Transportation shut down or impedance to access to home/property/resources, or each other by third-parties;

f)     Impact of communications shut down vs. alternative solutions for the collective;

g)    Disparate location of individuals (i.e., at work, home, in transit, shopping, etc.) as might impact on reaction and hooking up post event;

h)   Estimation of self sufficiency of a given family unit before connecting with the collective;

i)     Estimation of time before outside helps become available, as will vary according to the above considerations.

j)     Fully review FEMA emergency guidelines and their pitiful performance in actual disasters such as Katrina, as well as the shameful role of military and police. In Katrina, they came for the guns and gunned down blacks to keep them in their own area. In Hurricane Andrew, the National Guard deployed a psychological warfare unit who set up detention camp-like relief centers and set up telephones which were 100% monitored by the Defense Department, and CIA, etc. You need to know what frightening provisions the government has made in preparation for total control of your lives ‘in an emergency.’

Such factors are most simply addressed by establishing multi-level options for individual family unit’s responsibilities to the collective, as well as event response. Each individual’s plan/options should deal with each such contingency, and consider where the individual might be at any given time (i.e., at work). Resources should be redundantly distributed over as broad a range of storage points as may be practical — a key reason for multiple family units. Examples of determinations:

a)    A family without good storage capabilities may need to focus on an ability to relocate or hookup with one who does;

b)   A family without good financial clout may need to focus on an ability to provide special skills or manpower, or deal with relatively low cost special resources such as communications or transportation;

c)    A family with inherent special resources already in place (e.g., owns a gun shop) will likely get a free ride, financially speaking;

d)   A family with many adult males will likely be the best collective leader, though clearly, other factors also come into play. Such determinations may vary according to event type being addressed, so a different family unit might be deemed a better leader or resource for one type of event than determined for another event. Military experience, for example, would be of great value for long-term, regional, or political upheaval events, but less important in a short or localized events.

Where can I get advice on emergency preparedness?

Term of Survival without helps dictates needs…

A key factor in planning is knowing what constitutes a minimum level of stored resources (emergency preparedness kit) per household for each event type, as well as kit content details. Again, distribution of resources will likely be required, and there should be some level of redundancy to accommodate the total loss of a given family unit’s houshold kit. More: because FEMA’s draconian powers extend to cover broad powers of confiscation, and by their wish is to control ALL MANNER resources, they deem HOARDING to be a punishable crime with significant penalties to include arrest.

Hoarding generally appears to be defined as no more than a week’s supply, but some things are even more tightly controlled, such as gasoline storage. So plan on hiding long-term reserves, and likely, on protecting your weapon’s and munitions in similar manner as well; gun confiscation by military is highly likely in a long-term event.Below find a minimum suggest level of supplies and their dispersal. Naturally, your own thoughts may yield improvements based on your own skills, location or environment (e.g., lakeside = boat), and availability of special items (e.g., scuba gear):

A)   Localized and single unit events will likely require no more than 1-3 Days of self sufficiency: Food, water (1 Gallon per day per person*), blankets, three changes of clothes each for normal and extreme weather conditions, three sets of rechargeable batteries for all devices, portable lighting, one flashlight per person, multiband radio, propane stove and 3 propane refills, sleeping bags, rainslicks, first aid kit, bagged clothing, and about $250 cash. Matches, newspaper bundles for kindling or insulation.  Local storage should be sufficient even in an apartment situation. Each person can keep a ‘go bag’ in their room, or at least a flashlight, if using centralized bag location, only. Regardless, the bathroom or other storage point for prescriptions must be raided along the way*.

* Each of the levels below can impact prescription and water issues negatively. It becomes increasingly difficult to store large quantities of water, and thus some form of water reclamation or source should be considered, as indicated. Prescriptions can run out in mid event and would be near impossible to refill, and it is difficult to obtain a long term supply, and even if possible, long term storage of many prescriptions may be a bad idea as drugs degrade with time and sometimes even become dangerous through chemical changes wrought by oxidation. Since some prescriptions can be dangerous if forced to stop cold-turkey, you should consider the side effects and warnings on each prescription to see if weaning off gradually might be wiser. Fortunately, Diabetic and other select medical problems rely upon supplies and treatments which can be acquired and stored for long term needs. A final comment: each person with a significant medical need should keep on their person a card citing such concerns, medications, etc., in case they become incapacitated and found by third parties. The card should include information on any alternate location the collective is using as the emergency ‘address’ if different than that on identification, as well as names of key persons to be sought out, which should likely include more than direct family.

B)    Wide area events may require 4-14 Days self sufficiency: Add one pistol per household and box ammo, and walkie talkies locally retained by each household. Globally augment food and water appropriately, and add a store of gasoline, axe or chainsaw, shovel, generator, rope, tent(s), hammer, propane torch, handsaw, nails, screws/eyehooks, canvas. Sewing kit, 1 or two GPS devices, hand-held multi-band radio scanner, water reclamation kit (and supply of filters), road flares, pepper spray, motion alarms, binoculars, $1,500 cash.  2 additional boxes ammo per household. Secure storage facilities are a must, especially for weapons and fuels, with no exterior access to unauthorized parties. One person must jump through gun registration hoops to acquire the gun, unless given them as a gift.

C)   Regional or national events could easily require 3-12 Weeks sufficiency: Globally augment Food, water, consider augmenting a base station home with defensive modifications*. Note that GPS accuracy may be downgraded by government action from 50’ to several thousand feet. Add 1 rifle w scope per family unit, 1 pistol per adult globally, 1 or more night vision device for guard duty/firefights, short wave two-way radio, surgical kit, hiking/fishing/camping gear, flare gun, wheelbarrow or cart, 1-3 pairs binoculars, $5,000 cash. 3-5 boxes ammo per weapon. It may be advisable to bury some items or provide external hard and secure storage site(s)*. No additional gun registration applications by secondary parties should normally be needed, especially if the primary purchaser applys for a Dealer’s permit, which can additionally allow purchase of fully automatic weapons.

D)    Longer Term events such as revolution or Martial Law, invasion – Base Station only: 1-2 Shotguns, 1 or 2 targeting lasers for tactical pistol use, 1rifle per adult w or w/o scope, 1 crossbow and sword per household, Seed bank, military survival/combat protective gear, welder, expanded took kit, block/tackle, smoke grenades, flash bangs, salination system if near seawater, still, bear traps (for perimeter defense).  25 boxes ammo per weapon. 3 dozen bolts. Hardware nuts/bolts kit.  Bolts can also be used to make spears. Burried and external storage sites much more important, to include off site and well hidden locations. Here is where you want to have dosimeters, Geiger Counter, and Potassium Iodide tablets in case of radiation concerns.

E)    Regarding Vehicle kits, all levels: spare ignition cables and parts, full set of spare fuses, serviceable spare and jack, snow chains, tools, 6 flares, 1 gallon water, blankets, first aid, 1 days food per person in family unit, 1 box ammo per type of weapon (pistol, rifle, shotgun), 6 bolts. Pepper spray, sand bag, matches, newspaper. First aid kit. External of vehicle, spare set of tires, anti-freeze, case of oil, two cans each of brake, power steering, transmission fluid, service manual for vehicle. Car alarm advised.

*In my book set, Fatal Rebirth, specific advice given on how to reinforce a home or other structure, conceal critical items, and other tactical considerations, including home-made weapons. You might want to read some books which specialize in such topics for an even better insight. Also included is tactical advice for possible conflict scenarios useful to militia or other armed defenders of the Constitution. A free ebook copy of Volume I is available by request to pppbooks at Comcast dot net. Learn more at

What happens if government does not respond quickly enough in a disaster?


Some people are better prepared than others…

These considerations, with a properly organized dispersal of resources among cooperative family units, along with a good understanding of responsibilities and event responses according to event type… assure a far better defense posture against the unknown than FEMA or anyone else in government would seem to wish, even to the point of their being the actual problem against which you must defend.

If guns are to be acquired in quantity, it is imperative that all adults (including teens) take firearms safety/operation and care classes for the specific weapons. Target practice and practice breaking down and cleaning, reloading, and dealing with jams are just as important. Self defense courses in martial arts are also advised: if a long-term event comes along, all manner of problems will originate from third parties seeking to take valuable resources from you by force. Be prepared to fight with skill, and thereby hopefully deter violence, or be prepared to die.

In Part III, we look at how owners of gun shops, grocery stores, gas stations, and other key resource businesses can be incorporated to both the benefit of the collective, and to assure the owner that their resources will have the best possible chance of survival without sack and pillage by looters, and possibly even withstand government seizure. It also better explains what is meant by the last point about who the enemy might actually end up being:  Gun Shops, Grocers, and Other Retailers Key to Survival in Major Disaster

What can I expect when a disaster happens?

The REAL Reason FEMA Promotes Emergency Preparedness?

FEMA and the rest of government seems quite paranoid about disasters of late, but clues suggest there are hidden reasons behind urging preparations — not the earthquakes, floods, nor fires they talk about. Conspiracy theories based upon dialogs by geophysicists, astrophysicists, and politicos seem far more likely the cause, and that puts a whole different face on what ‘preparation’ should involve and mean for you.

Why is government pushing emergency preparedness?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Can we really trust FEMA?

Reading this post series in three parts you will learn…

  • That there are significant reasons you absolutely should have an emergency preparedness program in place;
  • These reasons go well beyond natural disasters FEMA implies of concern;
  • There is a logical preparedness program that accommodates all concerns…
  • A program which should be considered by privately-held businesses as well as families:
  • It is NOT approved by FEMA, DHS, the Military, or other elements of the New World Order

What is the history of the emergency broadcast system?

Time was…

I very clearly remember the ‘Red Scare’ spillover from McCarthyism which translated to ‘fear the bomb’ in the 1950’s and 60’s… starting with the Eisenhower White House: Air Raid sirens were tested weekly or daily, typically at a fixed time of day as if a Church Bell announcing Noon. I was a teen during the Cuban Missile Crises under Kennedy, when talk of the day was the home Fallout Shelter, and at school, we had ‘duck and cover’ drills as often as fire drills. But the scare wore off by the 70’s, and sirens and shelters were no longer in vogue, though every downtown building tended to have a well marked public shelter.  Yawn.

Fast Forward, Bush I White House: For no visible or announced reason at all, the Emergency Alert System (EAS) and CONELRAD Radio alert system which had in evolutionary form driven those sirens for two decades was turned back on in the 90’s, and updated for improved use with TV. But rarely was it tested, and then typically late at night between late-show snoozes. Just fire drills at school. No more sirens, unless there was perhaps a fire or other actual emergency. Very unobtrusive. No problem.

Fast Forward, Bush II White House: Suddenly, somewhat synchronous with the formation of Homeland Security, these alerts started increasing in frequency and were randomly interrupting all manner of broadcasts at any time of day. They now had the ability to actually take over newer televisions, even if turned off or in use with a VCR at the time. Somewhere along the way, it was expanded to include hazardous weather condition reports and the AMBER ALERT system for missing children. Schools still worried about fires. OK. Well, perhaps.

What kind of threats should an emergency preparedness plan address?

The current threat assessment

What does FEMA think is different about 2013? (Click – from FEMA ‘resolve’ page)

Fast Forward, Sorento White House: Suddenly, and synchronous with DHS seeking to buy 1.4 billion rounds of ammunition (that’s several Vietnam wars worth), all over and above military orders… not to mention a long list of equally disturbing purchase efforts involving coffins, ‘emergency housing’ which more closely resembled prison camps, food and water stores, vaccinations and anti-biotics… numbering in the millions more often than not — the tests started increasing in frequency and in duration. Annoying. Suspiciously omnipresent, excessively foreboding.

What bothers me most is a synchronous rush request for proposals on delivery of emergency preparedness items and relocation and readiness orders to military to FEMA Region III (Atlantic Seaboard States near D.C.), all with a date of October of this year. In fact, much of FEMA’s promotional material is geared to 2013, specifically. Most of the darker things cited in this post are happening right now in 2013 or otherwise generally depicted as an immediate potential threat.

Worse, both DHS and FEMA have started multiple high-profile media campaigns suggesting we all need emergency kits and emergency plans. This is also all simultaneous to a bit of mainstream news and much suppressed facts being revealed on the Web regarding an approaching Planet X, approaching comets, several near misses by planet-killing asteroids, and a flurry of unusual meteor activity to include nuclear blast-strength explosions in our atmosphere (the Russian meteor injured nearly 2,000 people and caused significant wide-spread structural damage over hundreds of miles). And there is more…

Also simultaneous are geo-political and financial threats the likes of which have never been seen in the history of the planet, each threatening dire unrest to the point of forcing Martial Law. While this goes on, the sun is spitting gigantic record bursting electromagnetic pulses at us and the pole is shifting, Fukushima is continuing to increase its threat, not to mention shifting weather patterns and an increase in seismic activities of Biblical proportions. Dare I mention strange phenomenon like objects orbiting the sun, mysterious loud and scary sounds heard over thousands of square miles, two suns and other oddities in the skies day and night? Endless wars somehow always tied to terrorism and oil keep being announced. No wonder large numbers of people are actually starting to think End Times might actually be around the corner.

The end of oil supply as we know it indeed approaches. Extremist terror groups pose theoretical threat of biological, chemical, or nuclear WMD. Criminal nations threaten to attack us with nuclear weapons. China is on the verge of surpassing the US as super power, and their top military leader has said war with the US is inevitable; their only answer to that being to strike first.  Man-made bio weapons, nanotech, and even genomic weapons are being developed daily by all modern military powers, and we get cover stories expressed as worries of a natural pandemic outbreak of catastrophic proportions. The Center for Disease Control has even gone so far as to talk about preparation for a Zombie apocalypse, and there is some evidence it is not as tongue-in-cheek as they profess. Don’t forget chemtrails and the feared NWO depopulation plot.

Actual soldier patrolling American Street. UNACCEPTABLE! (click –

The worst part is all the talk about a possible military takeover, martial law, a new Constitution and a North American Union. Why, that’s nothing short of saying the Antichrist is coming to power… and some say that’s the case, too. Agenda 21, GMO crops, Codex Alimentarius, the Small Arms Treaty (goodby 2nd Amendment), etc.  All these things tie in one to another as if all by some organized conspiracy (Illuminati?) After all, they say, the Norway Spirals were likely a test of Project Bluebeam, to simulate with a kind of holographic event the Second Coming in the Antichrist’s name. And what about those tens of thousands of ‘State of Martial Law’ warning/instruction signs coming into the US from foreign sign makers in convoy manner? Really, really not good.

Almost everyone has some kind of foreboding sense that SOMETHING bad this way comes. Armageddon Online has a more detailed summary view. And just as someone chooses to discounts all of these things as ‘baseless,’ something like this comes along to make us wonder all over again: a lot of people are saying there is a purge of the military taking place, and that usually portends a violent overthrow of government.

So, quite naturally, some of us are taking the DHS/FEMA advice to heart, or at least considering it. But I fear most of us are preparing for the wrong thing in the wrong way. Its one thing to have food, water, medical, and key supplies stashed away for an earthquake or flood… and another to truly be prepared for upheavals of the political or Biblical sort… the sort government advice is NOT addressing, because if you were prepared for that, government looses the ability to maintain political control through dependency upon government for survival.

Never fear; the Professional Paranoid is here to help you find your way through it all… in part II:  A Logical Home Emergency Response Plan: The Government Does NOT Approve

Why should I hide my emergency preparedness kit and weapons?

On False Flag Zombie Attacks in July

When the CDC starts talking about zombie attacks, DHS buys more ammunition than God and calls out all Federal Agencies to prepare for (something) at 100% strength with two weeks notice… while a Zombie blockbuster movie scares our pants off… there might just be something to worry about.

When do Zombies act on behalf of National Security?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Federal zombies may be in our future

OK, this might be tongue in cheek. MIGHT BE.

Future Post Office Poster? From, a collection of more than interesting Zombiesque material (click)

But it is completely factual (scary movie music rises). I just saw a couple of video blogs (streaming Web radio) where one of my kindred spirits (translation: conspiracy theorist, or on a good day, as we prefer it, investigative reporter) was interviewing someone claiming to be in the know: DHS, FBI, FEMA, and just about every other agency, military as well, have been ordered to bring all manpower, reserves, and resources, to 100% capacity by July 3, and to stand by for further instructions.

I’m not comforted by the fact that ALL the search engines can NO LONGER FIND THIS WARNING no matter what I type in (it would have helped if some of the words were not in use in gazillions of other vids, too). Thing is, two days ago, it was EASY to find using the same words. Who has the power to do that? No matter. I’m on the job. A few ones changed to zeros in government’s Internet won’t stop me.

Note: This kind of censorship and information manipulation is one reason I formed to create a 100% citizen-owned-and-operated wireless Internet alternative where there is no ISP (no monthly bill), no government or corporate censorship, spying, or control: YOU are the Web!

In trying to solve that problem, I encountered something which revealed even more useful information than I was searching for. The CDC is apparently involved, too. We are talking about a terror drill involving a ‘fake’ outbreak of (something awful). Wince. Gee. What could that be? Well, I got to thinking. Recall the CDC warning about what to do if a zombie attack broke out?

Well, they claimed that was tongue in cheek, too. But I’m starting to wonder. Have you seen World War Z? Nothing seems far fetched after that! I mean… first CDC puts out the defense guide… then DHS buys enough ammunition to kill all the extras in WWZ (and every citizen in North America, with order quantities in Satanic numbers, no less)… not to mention enough coffins to take care of the half-eaten bodies… and now DHS, FEMA, FBI, the National Guard, (and CDC) are manning up for something very big.

And even if not Zombies… let us not forget that some guy named Kokesh (not related to David Koresh) is planning a ‘Million-man’ armed march on Washington, D. C. on July 4th. I mean… Damn! I don’t know what it means, but what I’ve more recently learned does not make me feel any better about, it all…

Why is terror drill set to coincide with Scout Jamboree?

Terror Drill Set for Scouting Jamboree

The orders for these agencies are to be at 100% by July 3rd, and then to stand by. Turns out, unless a cover story for a general Martial Law (you don’t suppose Kokesh is going to end up in a shootout with Feds, do you?) move to seize power by the New World Order, that there is to be a terror drill in Yellowstone during the Scout National Jamboree (July 15-24). But wait one minute; is it not true that at almost EVERY major terror event blamed on some turban wrapped, kidney machine toting, Koran spouting man with a beard… that there was simultaneously a terror drill of the same exact sort taking place at the same time?

Is that not the HALLMARK of a false flag operation? You create an exercise or drill on the same date in the same community for the same kinds of details (e.g., type of attack, type of target), and then, if the people really responsible (no turban, kidney machine, or Holy book) happen to get caught before they can pull it off, you say ‘It’s OK, they are with us, and everything is coolness.’ Where have we seen that used before?

A few places. The Sarin gas attacks in Japan. Sept. 11. The London Subway bombing. Bombing in Madrid. The Norway mass shooting. Even Aurora and Sandy Hook. Retired Army Intelligence Officer, Captain Eric May has said, “The easiest way to carry out a false flag attack is by setting up a military exercise that simulates the very attack you want to carry out.”

Are Zombies real after all?

Zombies on parade

Again, ‘tongue in cheek’ can only go so far to making one comfortable about the facts. Also while searching for the missing radio show links, I instead found some disturbing video — tons of it, in fact, which claim to evidence real Zombie attacks, including one faked ‘secret FBI briefing.’ But only one of these bothers me enough to deserve sharing, as it is a montage of real news stories that are quite shocking and, collectively, imply there are real people out there who are certainly acting like Zombies, and who are apparently quite hard to kill, too.

But that’s not the only disturbing thing about the video.

The second is found at the end of the long-winded (classified) reading of a (classified) Bill on the Senate Floor that (classified) seems to regard some kind of (classified) serious catastrophe, and what government is going to do about (classified.) At the very end, as if a causal afterthought of NO IMPORTANCE, the reader quotes, “and draft a NEW BILL OF RIGHTS.”

E X C U S E    ME?

A new Bill of Rights? What’s wrong with the one we have such that once this (classified) happens, it is no longer useful? To me, the ONLY scenario where that makes sense is if the country has become an official Police State under perpetual Martial Law, the result of a military (classified.) Well, let me tell you if I see even a hint of that taking place, I’m going to (classified) and (classified) and all of (classified) had better double their (classified). Even if they claim it was the Onion Congress.

Well, that’s all I can think of to say about something that is so far fetched and based on ‘less than mainstream’ resources. So I’ll simply leave you with the original video which started the whole thing off. I did find it. But I warn you, it is not the sort of thing I would normally care very much about paying attention to now days, given the veritable flood of such ‘sky is falling’ reports on YouTube.

However, I also remind you, in my book set Fatal Rebirth, and resulting screen play published on the Internet in 1999,  that the sky was going to fall in New York City, raining passenger jets upon the World Trade Center, and resulting in Middle East Wars. Some of us Chicken Little’s base our warnings on a bit more than conjecture. You can get a free ebook copy of Volume One, and see what else I’ve correctly predicted, and what things I’ve warned of which have yet to transpire.

It also behooves me to add, here, that as a specialist in privacy/security who helps targeted individuals and deals regularly with Political Control Technology… that I should mention that some estimates are that the government has created up to two million ‘sleeper’ agents using Manchurian Candidate mind control methodology. If true, we are talking about programmable people who can, with a simple text message or other signal, be launched off on almost any kind of mission with no recourse or understanding. Blindly obedient.

Such people can be made to believe any unreal circumstance, or believe themselves to be anything or anyone, and are often capable of exhibiting super-human traits (such as seeming to be bullet resistant). I’d hate to think about what would happen if a flood of such persons were unleashed thinking themselves Zombies. They soon enough would be, for all practical purposes. I’d not want to be in their warpath. World War Z, indeed.

Sorento Secretly Installing Total Surveillance Society

15 Terrabytes of data on every Man, Woman, and Child in the U.S., tracking every trip, call, text, email you make, every URL you visit, every purchase or financial, social, and political action you take, all to profile you so they can predict you and blackmail, jail, or vanish you if it becomes convenient. Welcome to Herr Bush/Clinton/Sorento’s Total Surveillance Corporate Police State.

But wait… I have a simple $7 SOLUTION!

The NSA is secretly establishing the Total Information Awareness Office!

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

This particular post is intended to serve as recap and extended explanation of key concepts covered during a four-hour radio show interview with Clyde Lewis on Ground Zero, Friday, June 7th, 2013.

What you will learn reading this post…

• The nature of a Fascist Corporate Police State as defined largely by cooperative surveillance and spying upon ‘client’ citizens.
• That the National Security Agency (USARMY) is secretly implementing the Total Information Awareness Office under Sorento despite its being banned as unconstitutional by Congress, originally a Bush-Cheney plan;
• The Role of RFID (Radio Frequency Identification Devices) and PROMIS back-door spy software in TIAO;
• That traditional redress of grievances no longer remain a viable remedy TIAO;
• How you can spend just $7 to thwart the $2.7 billion dollar spying operation.

How can seven dollars stop government and corporations from spying on us?

How Fascism defines a Corporate Police State

NWOlogosIn America, there is something called a Social Contract between government and We, the People; the Constitution and Bill of Rights. That document makes We, the People, clients to a government body who we employ to serve our needs for societal functions; to govern and provide for the common good and protection. That is a sacred trust as well as a contractual obligation to government to so perform, and the contract additionally provides mechanisms for redress of grievances when government fails to fulfill its duties properly.

In America, We, the People also enter into financial contracts with all manner of big businesses; banks, phone companies, Internet providers, health care providers, insurance companies, and more. These contracts obligate these firms to provide select services with a certain fiduciary and legal responsibility to adhere to simple, basic guidelines of operational limits with respect to the privacy and security of our personal information entrusted to them.

These limits are essentially the same in scope and detail as those provided for in the Constitution and Bill of Rights, though perhaps spelled out in different terms. We are talking about the right to protect not just the privacy and security of our person, property, and information, but the rights of redress, freedom of speech, and so forth. No contract we have ever signed with any major firm has forfeited these rights or provided firms with any form of blank check to violate them. But that is what has happened…

Both government and most major corporations have grossly violated and betrayed every one of these rights.

How can you spot a corporate police state?

A clue:  when both government and big business act in collusion to violate those rights, and do so under Color of Law (twisting or claiming legal basis, illegally usurping the ‘power’ to violate our rights) — you have a Corporate Police State, a fascist regime.

What defines a corporate police state?

Another clue: When the intelligence community partners with or invests in Google and Facebook (and on and on) and uses their Web technology to spy on you (and in some cases to target you)… when the intelligence community accesses without warrant your email and your phone calls through partnerships with your Internet Service Provider and your telephone company… when banks report to the government your financial transactions and your medical and insurance records are available to Internal Revenue Service-enforced insurance companies… you are in a Corporate Police State, a fascist regime.

what is a corporate police state?

A final clue: when the government seeks to catalog every single activity, transaction, and event in the life of every man, woman, and child, regardless of if related to business, personal, public, or private affairs, and then employs sophisticated methods to psychologically profile and predict the individual, including sexual preferences and ‘practices,’ and saves all such information for use against them should they become ‘politically incorrect…’ you have what is called a total surveillance society, which also defines a Corporate Police State, a fascist regime. Below, we will see that is exactly what is about to take place in a matter of mere weeks.

Welcome to Sorento’s Corporate Police State.

What is a corporate police state?

Why we no longer have redress of grievances in America

In just a few short months of Sorento’s usurping the power of a pre Magna Carta King (claiming for himself the power to murder a citizen or vanish or torture them without due process or explanation under the NDAA), we have learned of an endless onslaught of exactly such proofs of the true nature of our government’s form as reviewed above. Almost daily, we learn our Constitution means nothing, and there is no redress seemingly possible, save perhaps that of armed revolt, always a serious question, but also much easier to effect than imagined. Governments literally make their own gallows.

Our Court System is too costly and slow to reign in Color of Law mechanisms (unconstitutional laws, executive orders, etc.) used to suppress rights; they can write new laws faster than we can challenge them, especially since the offending clauses are buried within innocent legislation. Because our Congress does not even read the Bills it signs, and is so full of subversive New World Order types (members of the Council on Foreign Relations, the Bilderbergers, Trilateral Commission, Skull and Bones, etc., all working to end national sovereignty in favor of a North American Union under one-World leader), we might as well give up on any help, there.

Our elections are a farce, there being no true difference in the hidden agenda of the power brokers of one party or the other, who collectively decide in back rooms who we get to choose from on our ballots in a two-party Dog and Pony Show. We are always offered candidates who are both marketable based on ‘publicly declared’ beliefs and agenda, but who in truth share a true common secret agenda and darker beliefs. We can prove this; the darker policies of Clinton were continued by Bush and then continued yet again by Obama, and yet once more this posting proves it when revealing the TIAO project being secreted within NSA.

Should poor Barry claim yet once more, ‘I didn’t know anything about (NSA=TIAO) until I turned on my TV…’ then he will have no choice but to arrest and try everyone in Command at NSA for treason. No. Instead Congress should be talking about arresting them AND Sorento, and Clinton, and, likely, Bush, Cheney, and Rumsfeld. But fat chance of any of the above, of course, as there IS NO REDRESS remaining in America. The fix is in.

Our media is bought and paid for, owned outright by essentially four corporations made up of more power Elite Boards of Directors and controlling shareholders from the New World Order crowd.  The Internet is slowly but surely being transformed into something ever more friendly to spying, censorship, and corporate/government’s total control. There is an Internet Kill switch in our near future, as well as a tax on every use. However, the Internet is where we will find the seven-dollar cure, thankfully, as disclosed at the end of this Post.

Sorento has ordered 30,000 drones to the skies to spy on us. He is spending up to 5 million per city to fund installation of surveillance cameras, some with microphones. As previously described, he has been working with the top Internet Service providers (e.g., Comcast, Century Link, et. Al) to insure every email and URL visit is accessible to government. He has done the same with every major cell phone carrier to allow access to our calls and text messages. But he was still not done, and now we learn of one final straw designed deliberately to break our backs…

What is Total Information Awareness?

Total Information Awareness is Reborn: Remember the TIAO?

Now we learn one more truth which reveals the full horror of our true predicament: Sorento, in continuation of plans started by Bush, and continued by Clinton, is having NSA (National Security Agency) quietly build a gargantuan secret new surveillance monitoring facility in Utah, and a somewhat smaller one to expand the existing facility at Ft. Mead, Maryland… in order to quietly and illegally implement the Total Information Awareness Office mandate already outlawed by Congressional decree as an unconstitutional, immoral, and intolerable invasion of privacy.

The TIAO was a military concept proposed under former Secretary of Defense (under Bush I) become Vice President (under Bush II), Dick Cheney, and former Secretary of Defense (under Ford and Bush II), Donald Rumsfeld, and former operator of CIA/DOD’s Operation Phoenix (mass assassination program of civilians during Vietnam War), and convicted felon (5 counts of obstruction of justice and lying to Congress about his illegal activities in Iran Contra), John Poindexter, Rear Admiral USN, Ret., and former head of a CIA front involved in health care database management systems.

TIAO was a Defense Advanced Research Project Agency (DARPA) plan to track every ‘transaction’ of every citizen, just as described in the teaser at page top. A transaction is defined, according to the original White Paper and Request for Proposals which I have personally reviewed, as going through doorways, passing before cameras, making a purchase or selling something or any other financial transaction, traveling, undertaking a communication by voice, fax, data, or any other information access or exchange, even to include mail and public libraries. In short, TOTAL INFORMATION AWARENESS.

It managed all this, in part, by backdoor access to corporate databases via directly partnering with businesses or by covert use of PROMIS spy software developed by CIA and embedded at every opportunity within popular commercial database as well as custom written database management software. Since all major corporate Intranets (private corporate Internet-like services) rely upon a telecommunications backplane (PBX phone systems), and because every major maker of PBX equipment includes (by buried legislation) a receptiveness to special signal codes which allow covert remote access by the military, triggering PROMIS infected database back doors is a simple matter.

Note: This fact was confirmed to me directly by a highly placed technical expert working for Lucient Technologies, a major supplier of PBX gear; his explanation as to how government was able to access and effect surveillance of any phone extension or computer within the corporate offices where I was working at the time. He revealed that clients were not to be informed that these backdoors exist.

What is RFID? What are Radio Frequency Identification Devices?

The Role of RFID

Two RFID tags of the smallest kind. (click)

The ‘secret weapon’ component of TIAO was to be RFID technology, those little Radio Frequency Identification Devices which are currently everywhere: they are in your money ($5 and up – though debunkers claim they are merely polyester strips designed to thwart counterfeiting… but polyester does not explode in a microwave, though it will melt), in most newer credit cards, many drivers licenses, all Passports, shipping labels (and soon, postage stamps), transportation tickets, and almost any product you buy (soon, all products). If you have bought Gillette razor blades, Max Factor make up, Pampers, and any of thousands of other popular items from ink pens to computers from any major retailer, you have RFID all over your home and, likely, on your person.

Cash registers, bank tellers, secure access doorways, turnstiles, security cameras, and just plane hidden sensors anywhere can be modified to scan and learn the unique serial number of an RFID tag (which it reports upon radio command at distances of several hundred feet, and even through walls when special equipment is employed for the purpose). Once a tag is identified with an individual in a database, everything they do while possessing it can be tracked and cataloged. RFID devices are often large (I’ve seen as large as two-inches square in mailing labels) and easy to spot, but they can also be as small as the period at the end of this sentence .

Note: The tracking bioimplant, Digital Angel (aka Mark of the Beast) manufactured and sold by CIA fronts, is nothing more than an RFID tag with Web/Cell phone GPS technology added, a feature common to many RFID chips installed in cell phones (common to most new phones), watches, ink pens, ankle and wrist bracelets, and other devices intended to be tracked. The original part number of the first known RFID application to ‘track inventory’ was a Boeing Aircraft component with the number 666.

In fact, there is an insidious form of it known as Smart Dust, so small they can float in the air, and even be directed up or down on currents of air as if operated by a glider pilot. These (motes) are sometimes placed on persons of interest (one way: ‘air puffer machines’ at Airport security can ‘sniff’ for explosives, or plant smart dust in your hair and clothes). These migrate from person to person in general contact with one another, and permeate anything they might handle and any place they might sit.

Smart dust can do more than track, with select motes capable of sensing (some dedicated thing) and communicating one with another to act with a hive intelligence. This allows them to report information as if a more traditional complex surveillance system, triggered remotely by laser beams perhaps a mile or more distant.

The US Army can and can track RFID at select points along American highways, railways, and some waterways (esp., ferrys, bridges). This is a key tactical component of the Canamex Corridor which will serve as precursor to and lever for the North American Union. Combined with the other ‘transactions’ earlier cited, as well as feeds from security cameras and drones using advanced facial recognition, license plate readers, and other biometric and tracking methods, not to mention the full array of telecommunications signal capture, NSA can process bulk data without human interaction for analysis,  reporting, cataloging and storage, or undertake requested analytical tasks against specific targets, or sift through information to locate or focus on select targets by human analyists.

If you suddenly are deemed politically incorrect sufficient by almost any given person in the chain of command at NSA, the military, FEMA, DHS, FBI, CIA, the White House, or almost any other government power center, you could be quickly psychologically profiled to see what kind of targeting would best reduce you to a social, financial, and political zero, or to predict your every move in case it was felt you needed a visit by Men in Black for ‘special handling.’ That could mean anything from scare tactics to arrest and detention, to torture and vanishing by murder.

That was the TIA as originally envisioned, and it was so horrifying to anyone with an inkling of understanding of words like Constitution, Rights, Freedom, and America, that even our Globalist bought Congress said “NO!” But Bush, Clinton, and now Sorento have blessed covert continuance of the military plan. The new NSA facilities will become at some level, the de facto TIAO without so declaring, according to NSA expert, James Bamford.

This whole affair is especially significant in one way which is quite calculated and extremely dangerous to your family’s future…

What is less obvious but truly significant is that TIAO establishes the only difference between all failed despot-driven tyrannical rule-the-World attempts through history and what is taking place right here, right now in America. Specifically, the technological advances you have just read about might actually let them pull it off. All prior efforts failed because once the people understand their prediciment, they can elect to revolt, and it then becomes a wild-card battle with no way to guarantee victory to the despot. Too many people doing Lord knows what quietly and acting out suddenly without warning.

Once NSA goes online with TIAO, however, within a matter of Months (by this September at soonest), no activist, no gun owner, no politician, no law enforcement official, no judge, no news reporter, no person of wealth, no citizen, and yes, no criminal or terrorist, will be able to make a move without it being documented, analyzed — duly considered and potentially countered with quiet surgical attacks before the move can even be completed.

Yet — will they use this powerful tool to prevent terrorism or criminal acts, the sole basis for justifying the tool in the first place?

NOT ON YOUR LIFE. They will be used ONLY to maintain and tighten political control (why it’s called Political Control Technology of the Military-Police-Politico Force Matrix — as defined by the Revolution in Military Affairs).  They dare not use it for something as unimportant to ‘National Security’ (their definition being security of the people in power) as might be seen in a terror plot on a school or a city, unless it happened to include an attack on the President or someone key to the Power Elite.

To risk doing so would risk revealing the true power and capability of the TIAO tools, and thereby, risk full-scale revolt by those in the Military and Law Enforcement who still understand and obey their Oaths of Office. Besides, every terror or criminal act carried out empowers them to effect more political control; government benefits thereby.

I’ve already personally done more to fight terror attacks in America as a citizen than they ever will be able to claim by using any weapon of Political Control — though Bush took credit for my efforts as if his Administration’s own.

Therefore, NSA, via TIAO, will be able to pick us off one by one as we wake up and start to exhibit politically incorrect thoughts or take actions which do not serve or go along with the interests of those in control; the corporate friendly thugs running a fascist police state for the Globalist agenda.

First they will go for Anon and Anarchists, and you won’t say anything because you are not Anon or an Anarchist. They will next go for Truthers and 99% crowd, and you won’t say anything because you are not one of them, either. Then they will go for the rest of the Activists and Conspiracy Theorists, and you still won’t say anything. Then they will start to go for the investigative writers and newsmen, and lawmen, and politicians who do start to question, and you still won’t say anything, because if they can take them out, what could YOU possibly do.

Finally, when they come for you, no one will be left to say anything on your behalf.

What can we do to stop wholesale spying on citizens?

A simple $7 cure

Only you can prevent Fascism (click)

There are many things you can do. Make clear to your Congressman that you will not tolerate a secret TIAO and demand the NSA be reigned in, and (almost literally) NUKE the project in Utah and Ft. Mead; level it to the ground. Demand reversal of all post 9-11 legislation that deals with ‘terrorism’ by taking away our rights to privacy. Demand the 30,000 drones never reach American skies. Demand an investigation as to who really runs this country with the aim to kick Globalists out of government posts, starting with criminals in the White House and Congress. We need a political purge.

Become politically incorrect, question government, protest as a 99 percenter, Truther, or activist of some useful sort; be a functioning participating citizen! Make yourself heard above the rhetoric of a controlled media.

And one more thing, as I promised…

Spend $7 (or more if you wish) to join NNN OSP, the Nodular Netizen Network Open Source Project to create a 100% citizen-owned-and-operated wireless Internet alternative. Why? Because ONLY citizens make it up, there is no corporate ISP needed and thus no monthly fee. There is no government control or censorship, no government or corporate spying even possible; YOU are the Web!

If just five people join in each neighborhood, it is sufficient to assure its existence and success, creating a communications channel which is beyond NSA’s ability to access. In fact, the ONLY way government can access NNN communications is to go directly to the sender or reciever; the data does not reside anywhere else along the chain, and never passes through a government friendly corporate portal. And, once NNN OSP becomes popular enough, it will also support VOIP with Smart Phones and take away TIAO’s access to voice conversations, as well.

Visit to learn more.

There are many, many features and benefits not even possible on the WWW. There are even ways the NNN can make you money. Become the Web, TODAY… right this very MINUTE!

Once we have millions of members, the message may just get through… errant governments are superfluous to the Will of the People when they can freely discuss in private what they think about their government (or anything else). They will at last fear us as they should… as our Founding Father’s said it should be. Then, and only then, will they do our bidding, instead of the bidding of the Globalist corporate powers.

Can you afford NOT to spend $7 to thwart the New World Order?


On the North American Union and CANAMEX Highways

A road paved with good intentions is often made with dark things — in this case the subversion of the United States into the NewStates of America, a mere co-partner within the North American Union — all in turn as support of establishing a one-World Government over six or fewer such ‘unions.’

On the North American Union and Canamex Highways

by H. Michael Sweeney
copyright © 2009, 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included. This material originally from The Professional Paranoid Newsletter.

What is the North American Union?

What you will learn reading this post…

  • The reality of an impending North American Union will be understood;
  • The relationship of NAFTA, CAFTA, will be understood;
  • The existence of the Canamex Corridors will be shown and explained;
  • The Texas Canamex Corridor will be reviewed to reveal examples of just how sovereignty is threatened;
  • The Kansas City Corridor will be reviewed to reveal military-intelligence interests;
  • The possible ties to mass internment and disposal of US populations under Martial Law will be explored.

 What is the Canamex?


From NAIPN Web Site

This is an abridged version of a much more detailed article from the Professional Paranoid Newsletter. While it was written early in 2009, it remains largely current and especially useful to those who have never heard of CANAMEX in the first place. It appears, even now, to be more comprehensive than any other single Web resource on topic. To get a free emailed copy of the Newsletter with the full article, rich with numerous additional graphics, simply (one or more) comment, like, share, tweet, or rate this post AND email pppbooks at Comcast (net) requesting same and citing your action(s) taken.

Activism, after all, has two ‘I’s in it; ‘I’ believe strongly, and ‘I’ will tell others.

Note: Unlike most of my blogs, resource links are provided in Bibliography form at post end. However, it is extremely interesting that almost every single link no longer works, as indicated in red. A sanitization has taken place on topic since publishing my newsletter: in many cases whole Web sites have been taken down, in other cases, pages have simply been pulled. Only Lou Dobbs and Alex Jones have not been censured. Further, when you attempt to search for new links, the search engines conveniently focus on CAFTA and NAFTA, mostly, but I stand by the facts as I have reported them. Only my conjecture as to meaning is subject to reasonable question.

 What is the true cost of NAFTA/CAFTA?

The NAFTA/CAFTA doorway to treason 

This author has long warned that the NWO would not stop until the US Constitution was replaced with a version which would support a one-World government. The day of the NewStates of America is now much closer than thought, and there are now two avenues by which it may come, either separately, or cojoined. The first is foretold in my book set, Fatal Rebirth, which focuses on the use of false-flag terrorism to force Martial Law and suspension of the Constitution for the purpose. The book predicted Sept. 11 and resulting Middle East Oil Wars. Want a free ebook copy of Volume I?

Now comes a second means: the implementation of the Canamex Corridors under the Security and Prosperity Partnership (SPP), which are key steps leading to the North American Union and the Amero currency, for which everyone denies any such plan exists, just as they at first denied the existence of the SPP, which had already been officially embraced by President Bush and finally admitted to by the governments of Canada, Mexico, and the US.

It is complex. It is important. Frighteningly important, as the reader may soon see for themselves. Therefore, despite aggressive abridgement efforts, this is regrettably the largest single post I have ever made. KISS cannot be applied and well serve the truth. All facts herein are from official Web sites of key players involved. All images are from authoritative sources, mostly from the ‘enemy’s own official Web sites, some DOD materials, and Google Earth images. Some editing to direct the viewer’s attention to select unedited details has been undertaken.

Decades ago Congress approved NAFTA and CAFTA international trade agreements which many opponents described as opening the doors to loss of American sovereignty, not to mention millions of jobs and other forms of equally negative impact. These international agreements bind the US into subverting national and domestic policy to the will and needs of foreign trade partners under the pretext of promoting international commerce. Many protested the veiled goals which were actually intended to move the U.S. one-step closer to a governmental position suitable for establishing the North American Union, itself a step towards a One-World government…

NAFTA/CAFTA cost jobs, and worse, just as opponents warned, and the opposite of promises of what it would do. We were sold lies and as result have had to subvert our laws to conform to the wishes of our trading partners (lost some of our sovereignty) and to the detriment of our own citizens and GNP, trade deficits, etc. Little good has been made evident. Since then, focus of opponents and activists, patriots and outraged citizens, has shifted to try to find and stop whatever the next steps in the globalization of America and the world, were next intended.

It is only a matter of time, it seems, before all of the nations of the world will unite under a single banner. Not too long thereafter, comes a special day, a day called Armageddon. Thus it may prove true that the only way to forestall the end of the World as we know it, is to delay the NWO at every step along the way. A return to good Christian values and beliefs wouldn’t hurt in that effort, either, in my opinion.

What is the Security and Prosperity Partnership? 

The North American Union (NAU) and the Security and Prosperity Partnership (SPP)

For several decades, we activists and our friends have indeed long-feared the existence of plans for the NAU (North American Union), a New World Order goal indeed advanced daily by Globalist groups, especially the Council on Foreign Relations (CFR) and the highly secretive Bilderbergers. These groups are heavily membered and led by the power elite, such as the Rockefellers and Rotheschildes, and the Bush Dynasties, as well as players from the Military-Industrial-Intelligence-Media (MIIM) Complex. Now they come upon us, again, seeking to establish a regional governmental body consisting of (at the minimum) the United States, Canada, and Mexico.

And for decades, everyone in government denied there was any such plan, or a regular group event involved in the SPP. Keep in mind, that the North American Union would require the US Constitution to be replaced with something far less useful to citizens, but much more useful to the megacorps who would profit by the NAU, just as they did under NAFTA and CAFTA. But wait, it turns out the SPP is just the merest tip of a NWO tippy-toe iceberg.

The SPP attempts to marry the military-intelligence communities and the corporate needs of all three nations. It is attributed as the source of the CANAMEX project, which in turn even forms a defacto partnership between Globalst trading partners, the Red Chinese Army, and the U.S. Army, which in turn enables spying on citizens based on their purchases. These partnerships are odd to say the least, and the spying is due a neat trick, but the idea is ‘to share intelligence’ between law enforcement and purveyors of ‘National Security’ between all three nations being sold as a tool to combat terrorism.

Funny thing is, I don’t recall much terrorism in either Mexico or Canada, at least not the sort the America has faced. So I wonder what they really want to share, and why, since citizen spying is also mixed into it, somehow. Who do they really fear? This kind of combination of ‘Security and Prosperity,’ leaves me with a need to redefine ‘National Security’ as ‘Corporate Well Being’ — again sounding a lot like Fascism, to me.

Lou Dobbs (Lou Dobbs Journal) frequently televised critical views on the topic of NAU and SPP. Dobbs also calls it a tool of the power elite which serves only the corporate giants, and he has no problem making the point, especially since SPP is being ‘sponsored’ by more than 20 mainstream US Corporations to include everyone from McDonnell Douglas to Campbell’s Soups. Dobbs and other materials on the Web confirm the declared time line for implementation of Canamex was originally 2010. This goal was not met, thanks to activists, and to Senator Ron Paul’s Presidential election bid, and specifically to the citizens of Texas who have long opposed the earliest CANAMEX efforts in that key CANAMEX State.

How does Canamex threaten national sovereignty?

Loss of US Sovereignty is a one-way road

The Canamex Corridors are strongly supported by the CFR and Rockefeller’s Council on Americas, and similar round table groups both all three countries, and corporate coalitions who, through political PACs, adopt and pocket Globalist friendly State legislators who help establish official State positions favorable to the project. Even in Texas, however, there seems to never be available an actual forum for public debate, and government itself, though pushing through legislation laden with hidden language which supports the corridors, seems not to really know what is going on. That should be a warning sign. We are being sold out by deceit, yet again.

While even Senators still today profess disbelief and lack of knowledge (as most recently in the Presidential race, Mit Romney  said ‘Huh?’), there are already more than 30 Canamex corridors already defined by US DOT legislative funding of highway projects for nearly a decade, now. Of course, they don’t call them that, preferring instead ‘High Priority’ corridors, but when you map them out, they just happen to match the corridor’s talked about at CANAMEX friendly sites. Convenient coincidence?

What is highway project TTC35?

The Texas Canamex redefines Treason; it is called Bush


65 Counties impacted by TTC35,                               and 77 Counties under Martial Law

Even before Canamex was a formal concept, (it has yet to be presented to Congress), President George Bush had opened the borders to Mexican trucks, allowing access to American highways without traditional border stops or truck inspections, with more than 5,000 trucks a day (1.8 million a year) flooding into America. The Teamster’s Union would normally have the job of handling this freight, and objects on both the basis that American jobs are being exported in the move (excused as a NAFTA obligation), but also cites that the typical Mexican truck would fail US required safety standards if checked, a function of Border stops. But then, the exportation of jobs was always one of the secret goals of CAFTA/NAFTA treaties.

We look at Texas, in part because it appears that while Bush was the State’s Governor, he pushed for something called the Trans-Texas Corridor (internally described as TTC35) project. Mexican Round Table groups were lobbying hard at both state and national levels and followed the SmartPort method described a bit later, herein, to rally supporters and fund efforts, even bringing the Red Chinese into the picture. But the prime reason for our focus on it, is that TTC35 as defined by the Texas Department of Transportation would create a new superhighway (termed a supercorridor) forming a paved and largely impassable line vertically dividing much of the State into two distinct halves. This was no State highway for use by citizens at large…

Thus communities along the way which relied upon lesser state or county roads would be forced to pay for their own multimillion dollar overpasses if they wanted and could afford them, or loose all access to what lay beyond — short of perhaps an extra hundred-mile trip to gain a quarter mile’s travel. This would absolutely kill many communities and businesses which depended on existing roadways bisected by the project. Even some farms would be bisected, and financially ruined thereby. Bush did not care.

Presumably, Oklahoma and the rest of the states in its path toward Canada would yield to the method and follow suit, creating two distinctively separate United States territories (or 60 or more if all primary Canamex highways followed suit). That certainly would simplify regional control of populations in the event of Martial Law. Martial Law?

Note: edited out, here was material about both undeclared and declared Martial Law in 77 Texas counties along the corridor, thought to be a test of ability effect sudden control in event of something dire relating to the highway.

Of course, division of the entire nation on such a scale would be untenable. Even in Texas, it was to prove to be so. Nearly 600,000 acres of private land was to confiscated by Texas using Eminent Domain laws without paying a fair value for the property (normally, when a freeway is built, fair value is paid). Farms, ranches, and other properties divided by the highway would be destroyed, as it would be impossible for a land owner or livestock to travel between both pieces of their property in a useful way.

The corridor was intended to be a full quarter-mile to two full miles wide with plans for very few entrance or exit ramps within Texas. Whole communities would be literally walled off from the remainder of their county and suburbs, emergency services, and so forth. The most troubling part about such corridors, which provide both rail and road throughways, is that there would be absolutely no US Customs or Immigrations/Border Patrol intervention along the route, except at exit points designated for the purpose (why there were few exits, we must presume).


T DOT artwork TTC35: 12 Lanes: No waiting!

As the Texas DOT artwork shows, it would at points near exits have 12 lanes, half of which would be for ‘local access,’ and the others ‘non stop express throughways,’ plus multiple rail lines and power lines for needs along the way. The only other overpasses and cloverleafs planned were for select Federal and primary State highway intersects, some of which are CANAMEX branch routes.

In addition to all these concerns, many Web references talk about dedicating a portion of land in the Kansas City area to be a landing spot for trucks and rail cars from Mexico, which would be considered Sovereign Mexican territory: loss of US Sovereignty. Of course, government documentation uses the term, “Free-Trade Zone,” but language implies there would be no US authority present. This is even a problem for the TTC35 project, and any others like it which might evolve…

A Spanish holding company, Cintra (ever heard of AeroMexico?), under a ‘Comprehensive Development Agreement’ signed by Texas officials (find the actual document link on last page), would have been given the exclusive right to provide all facilities along the highway for rest, gas, vehicle service and repair, retail, and food. Incredibly, a guaranteed return on investment by Texas to the firm was to be included, which is effectively a ‘cost plus’ arrangement which insures over-budget spending in developing such facilities: a boondoggle in the making. This absolute monopoly would last for 50 years, and could only serve to inflate the cost of goods delivered through high take-it-or-leave-it prices to travelers.

In addition, and unbelievably, the construction of TTC35 was to be contracted to Mexican firms who were also a part of the Mexican Globalist coalition, using both Federal and State tax dollars to export jobs to another country. At no time would taxpayers have an opportunity to vote on the project or have a say so in the use of their money by foreign powers, which is another form of loss of sovereignty.

But it gets worse.

Any highway crimes or other criminal matters would not be subject to either Texas or US law! Instead, anyone with a complaint would need to file a grievance within the International Court System, as if that would be useful. Let’s see, I think that Interpol phone number is in my wallet, somewhere… There would therefore, by definition, be complete loss of sovereign control over US soil the full length of the highway. This is the Bush legacy, one intended we might presume, to be a model for the rest of CANAMEX in other States.

The Texas plans were never quite public information, as such. They were first exposed to the public by a grassroots action of a group and Web site called CorridoreWatch(.org), but thus far, the Governor and State of Texas have still refused to discuss the matter publicly, and media has retained their docile, blind eye in this mater, by and large. Regardless, the battle sparked by Corridor Watch would seem to have forced TexDOT and the greater CANAMEX effort to slow down and undergo a change of policy; to adapt existing highways instead of butchering the state and terrorizing landowners and townships in the name of terracorp profits. Regardless, the entire affair shows the brute force being applied under the banner of just the SPP and, dare we presume, the non existent NAU for which the SPP is simply a first ‘baby’ step.

Kansas City and Canamex

The Kansas City Corridor: Highway of Political Control

Top: Phase 1, including SubTropolis; Middle: Phase 2 expansion, including existing USAF underground; 3 308th PsyOps Group and 'Housing.'

Top: Phase 1, including SubTropolis; Middle: Phase 2 expansion, existing USAF underground; Bottom and beyond image: 308th PsyOps Group and ‘Housing.’

But now, we have the Kansas City corridor to look at. Actually, let’s just look at what is going on in the Kansas City area. Like Texans, local and other activists are quite alarmed at discovering that an Air Force Base is being renovated into an Intermodal Hub for transferring cargo between trucks/rail/air traffic along that Canamex corridor, just South of Kansas City. Actually, more than one such military base is involved, and civilian properties, too.

Since we activists are also described variously as alarmists and conspiracy theory nuts, some of us have been forced to meet those expectations. We worry about the usual NWO things and look for clues which might support dark goals, such as declaration of Martial Law in order to force replacement of the Constitution upon us.

We know the goal (the Constitution of the NewStates of America has already been written at the cost of $12M, as reproduced with analysis in Fatal Rebirth), and thus, work backwards to see what steps would be required to meet it. We then compare that with what we see unfolding before us to insure it is not wolf in sheep’s clothing, something much more dangerous in purpose than we are told up front.

Thus we worry about the fact that there is tons of housing on the property which could be used to hold large numbers of politically incorrect detainees that might be rounded up under Martial Law — use of the so-called ‘Red and Green Lists,’ for instance. We worry that the reported underground facilities being constructed (described as the World’s largest underground city in the contractor’s words) could be used to hide the processing of detainees. We worry that the whole center could be used to invisibly distribute detainees to other detention facilities around the country, perhaps to include death camps.

In point of fact, it could, as could any such center, if that was intended. It is no different than it was for Hitler’s death camps, where the Railroads played a key role. Conjecture is fun to amature theorists, but the facts are actually much scarier to investigative writers:

Richard-Gebaur AFB and CANAMEX

Richard-Gebaur AFB Intermodal Center 

The idea is that the AFB was acquired by commercial interests (I think that would be a first for a military base) with the intention of remodeling it into an Intermodal Center, which is a kind of joint hub for varied forms of transportation where cargo may be transferred between them. In this case, we are talking about rail and trucking hubs. Even though the facility is being built on a former Air Base, there is no air service at the site, the rail load/offload sidings being built atop the old runways. To my mind, this is the first warning sign that something is not right with the project: it is quite a bit more expensive and difficult to lay rail on 3 foot-thick cement runways than on open soil. I suspect something is being built under the runway, something which benefits from the protection and sound proofing of a cement ceiling.

First lets describe the center, and then take a look at some other things going on, there. The closer one looks at the matter, both in the micro and the macro, the more one wants to ask tougher questions, and the more such questions we find in the answers. This is a very large elephant, and so we have no choice but to look at it one bite at a time. Richard-Gebaur is located just south of Kansas City, Missouri. It is an unabandoned abandoned AFB, which is to say the USAF no longer uses it, but someone in the military does. I won’t say who, just yet. But they are not leaving, and would seem to have no such intent. They have made room, giving up all but the nuclear attack proof building with the umpteen-foot thick walls and underground facilities, and the barracks and other base housing. Actually, lots and lots of barracks and base housing. More on that, later.

Someone decided it would be a great idea to make the base into an intermodal center — to simply lay railroad tracks on the runway and build massive warehouses with their own underground interconnecting networks and such atop of what used to be hangar pads. Ignore that the plans have areas marked ‘Detention Area,’ (see images below and on next page — four areas shaded pale blue) since that is talking about ground water collection and drainage (at least above ground). But it does get one thinking, does it not, about what might be underground, there?

This is no small project. I could throw lots of massive numbers like acres, square footage, dollars involved, etc. But that’s not what I mean. I mean, you’ve got to line up endless green lights from dozens of government agencies at federal, state, county, and city level, including all manner of DOD brass. We are talking about people not prone to giving green lights without lots and lots of red tape and hoop jumping, some of which might reasonably involve tons of fees or even bribes. But that is not enough. Especially since we are not talking about doing just the RichardGebaur deal, also known as KCS Centerpoint, but no fewer than six such deals — all within an hour’s drive of one another, most of them within a half hour of Kansas City.

In fact, four existing air fields, two military, one private, and one international airport, plus 6 rail yards would be involved, providing highly redundant and overlapping intermodal services for rail, air, and trucking. The Kansas City area already has amassive network of intermodal facilities, but the six new facilities would seem to give it perhaps a 30 or 40 fold increase, based simply by comparing visually (Google Earth) the current real estate devoted to the task against the proposed additions.

In the images found herein offered in support of that claim and others, the reader will find the new projects in green overtones, and existing facilities in blue, with rail lines shown in pink. I would have to ask if it is financially viable to glut the market with capacity, but then, I haven’t been fired up by being offered a slice of the action (phone number at bottom of page, guys).

Which brings us to money — always follow the money when suspicious. You absolutely would need to line up some serious capital for even just one, much less six such projects. So much, in fact, that only an extremely powerful megacorp or megacorp owner (e.g., a Warren Buffett) could possibly afford to play. Think about it for a second. If this was a really legit deal with lots of profit potential, would there not be such a player involved?

There is no Warren type around (and I’m thankful). I wonder why not. No. Instead, in order to get enough funding, they had to do something else. And that in and of itself offers clues.

What is the Kansas City SmartPort or Smart Port?

The Kansas City SmartPort effort

It’s an old parlor trick, of sorts. First you spend a lot of time and money on promoting the concept somewhat quietly (can’t upset the environmentalists, activists, and the like until you have enough momentum to overrun their objections). You promote it to all the kinds of companies that can stand to make a lot of money any time property is developed, marketed, managed, etc.

You need to build a concerted body of like-minded individuals who are willing to take up political, social, and financial arms on your behalf. You create as many organizations as possible of interested parties to develop the idea and further promote it to fruition in tandem, which makes it seem like a virtual ground swell of support. Of course, you don’t tell participants everything, but you do tell them it will make them rich. Greed, after all, is the best salesman known to man.

Such an organization typically needs to fund its own way, so you offer investment opportunities which make the organization itself a vested partner in the venture (and thus, its member firms) and go to work. You can then use your funded and highly credentialed and official sounding organizations to impress green light givers and companies who might be interested in being customers once the sites are ready for business. This would be trucking and rail companies, warehousers, and local manufacturers and other firms involved in or relying upon import/export trade, and service, insurance, and real estate firms who cater to the needs of all such entities, and so forth.

Uh… we find all this at the Web site of such a group, where it lists its investors in promotion of the six sites. The group is something called KC SmartPort, made up of almost exclusively the key players, movers, and shakers who stand to benefit if the six (or even just some of the six) intermodal facilities are actually built. A visit to their Web site will find a comprehensive list of all investors, and almost without exception, they are as described above: realtors, managers, developers, contractors, etc., plus logical partners such as railroads near or already serving the properties, and local civic groups (e.g., Chamber of Commerce, etc.) interested in driving jobs and business to their communities. All very reasonable, of course.

Note: The term SmartPort likely refers to the employment of RFID smart chip technology to control movement and tracking of goods through the Port. That is its own topic of significant concerns, covered below.

Then there is also the KC Area Development Council, Greater KC Free Trade Zone, Inc., and the Mid-America Regional Council, all pretty much the same people saying the same thing from as many different angles as possible. Pretty soon, everyone thinks it must be a great idea. There are even whole Globalist tri-national alignments such as NAIPN, the North American Inland Ports Network, NASCO, the North American SuperCorridor Coalition, and NACC (North American Competitiveness Council). This was enough juice to have all six sites declared Free Trade Zones (2006 Free Trade Zone Act) in just two years of effort. Someone paved the way!

Whoa! A few SmartPort executives, according to World Net Daily, are now even admitting that portions of the SmartPort properties may need to be declared as sovereign Mexican soil! Imagine that. But no one is admitting to the need to create the Amero, the NAU monetary unit not unlike the Euro. That, is another thing everyone denies.

Then there is the other little bombshell one can find in foreign press and on the Web: the Red Chinese Army has heavily invested in the entire supercorridor project. They are paying to expand and modernize Mexican ports and have even been guaranteed profit sharing with Mexican firms who profit from the highway. This could even be a means for support of a military land invasion of America.

OK. We have our army of supporting organizations. Once you have some momentum behind the project, you start dolling out portions of the project to those who might be become prime contractors or service providers, and get them to sign onto the project (e.g., Chinese/Mexican construction firms). This is all done behind the scenes. You go for redundancy, which means that you have multiples of realtors, managers, contractors, etc., all doing the same thing. Nobody sees or gets the whole pie, probably not even a full slice.

Now that could also be a clue, unless you simply say it’s too big for just one company. Normally, however, the greed factor would make one company despise the presence of a competitor, so when I see whole legions of competitors working happily together, I wonder if it is not simply a tool to create something other than the project, itself. There could be unseen goals, and even unseen partners/players. It could even mean that someone has sold 1000% or more of the project (in the way of Mel Brooks’ The Producers, a zany film featuring Zero Mostel and Gene Wilder, Crossbow Productions, 1968). Mostel’s character sold 50% of a theater production’s profits to about six different investors, expecting the play to be a flop so there would be no payout, at all.

If you get a lot of local movers and shakers excited enough, you can start to go public and talk to green light specialists out loud — you have nexus for dealing with environmentalists and other potential protesters. Of course, this whole process goes a lot better if somewhere along the line, the fix is in, or grease has been applied, arrangements already in place. I’ll simply state that if there was any form of conspiracy or NWO at work, it wouldn’t be undertaken unless already assured of relatively smooth sailing. Government agencies (e.g., DOD) would likely already be holding the door open, and there would probably be some boondoggling to go along with it. That may explain why military contractors abound in this particular project.

The above critical commentary on SmartPort stems from review of SmartPort’s’ own materials as well as those of their participating corporate partners, as well as materials related to the various projects as cited on the last page of the newsletter. Review those links to get a start on comparing against my commentary.

Why is there an underground city at Richard-Gebaur?

What lies underground may be lies, indeed

All of this convoluted investment promotion is, however, merely superficial surface discoloration, at best. It is not sufficient to condemn SmartPort or the intent of the project(s) based on their methodology, which certainly may be legitimate, contrary to my conjecture. Rather, the questions raised discolor things sufficiently that we might want to take a closer look. To best do that, we focus at Richard-Gebaur, and how it relates to the players themselves, who indeed deserve a the inspection. Because if there is a hidden agenda, there will be warning signs in both the project and the participants.

Put another way, if we find problems similar to those of funding in both the participants and the project itself, then the picture is far more serious, and conjecture leans toward being factual. Thus, it is not what we see on the surface, but what lies underneath, which is of concern. That is both figurative and literal in meaning, as we shall see: The base itself indeed contains underground facilities designed to survive a nuclear attack, as stated.

The base includes a large command and control building, as well as munitions bunkers, and perhaps other areas which are already underground. The planned intermodal facility is intended to have what is acknowledged to be SubTropolis, which is to say, complete underground city of facilities which are all interconnected. A firm named Hunt Midwest has trademarked the term, and is a major player in the underground portion of the project.

SubTropolis is a viable business concept, and the firm has marketed or participated in several small-scale projects of this kind already. It provides numerous benefits to include improved efficiency above ground, and safety — as there will be less above ground motor and pedestrian traffic. Their participation at KCS represents no reason to condemn the firm or the concept, but it does worry those who fear it could be used to conceal processing of human detainees at the facility, or any other covert operation.

What we need is something which suggests that possibility is more than wild conjecture. That’s a tough assignment, to be sure, because covert operations by nature, are, well, secret and unseen. So where do you look when you need to find something invisible?

What is the military and intelligence community involvement in CANAMEX?

The Military-Industrial-Intelligence players at Richard-Gebaur

If there were any darker plans for the Centerpoint facility at Richard-Gebaur, we should be able to find the footprints or fingerprints of appropriate military or intelligence community players, or firms who are key service providers to them. This brings us to TranSystem Corporation, an international transportation solution firm based in Kansas City, as it happens; a member of SmartPort. They are listed in Janes Aerospace and boast military and aerospace contractors as clients. Might be a footprint, but the company actually looks squeaky clean upon casual review, more like innocent bystanders.

Are there any other footprints to suggest more than just standing around is taking place? Well… yes, and TranSystem seems to partner with them at every opportunity well beyond Centerpoint, to include both military, civilian, and even intelligence community related matters or affiliations. We might presume them to be almost inseparable, in fact with this other firm, but there are no true management ties which make it perfectly clear:

URS Corp. is this other SmartPort player of concern; United Research Services. They are a major US federal contractor serving DOD, DHS, and DOE, and FEMA, and were originally a think tank for DOD. They are a Carlyle Group company, which makes them especially scary to anyone familiar with conspiracy theories having anything to do with the military and or the NWO, and URS certainly has to do with both.

They specialize in refurbishing and modernizing weapons systems and military vehicles and aircraft, and manage entire government installations. The firm was chief manager of Ground Zero recovery processes at the WTC, placing in a key position were there to be any cover up of otherwise useful clues as to crimes other than visually apparent on September 11, such as controlled demolition, or remotely flown aircraft, etc. Read all about those kinds of things in Fatal Rebirth, which was after all ‘The book that foretold of 9/11.’

URS started small and grew quickly not by traditional means, but by gobbling up other defense companies. Notables would include EG&G about which many conspiracy theories have danced, perhaps the most colorful being they serviced Area 51 with aircraft and management teams when it didn’t exist. The first company absorbed, which led to its name change from Broadview Research, was United Research, both research firms steeped in secrecy and black projects for the DOD/DOE/AEC since the inception of those agencies. That, by the way, should logically have included Mind Control projects.

While there is no mention of their direct participation in available documentation, non consensual radiation tests on both American GIs and private citizens, including children, was the kind of research undertaken by these agencies until uncovered and terminated (they tell us) as part of Congressional action against those agency’s mind control experiments. However, the Rockefeller Commission and Church Committee reports both failed to note the details of participating sub agencies or proprietaries, by and large.

FEMA prisoner detention processing center 

The notion of plans for detainee processing at Richard-Gebaur

Since 9/11, URS has managed various terrorism exercises on behalf of FEMA, DOD, and Homeland Security, to involve local communities. They also run the Denver Airport, thought by many activists to be a ‘on-demand’ extension of FEMA, since that agency has its own national emergency headquarters based virtually on site. In the event of Martial Law, the airport would undoubtedly be used to serve FEMA needs, which to those who fear the roundup of the politically incorrect, could also serve the needs of collection and distribution of detainees. So if Martial Law ever is declared, URS will be very close to FEMA, indeed.

These are also the folks (URS) that manage all four of the nations over-engineered disposal sites for chemweapon stockpiles in Alabama, Arkansas, Utah, and Oregon. Each site has approximately a 4000% capacity greater than the entire national need as mandated by UN agreements to destroy all such weapons. They were each built at a cost of hundreds of millions when smaller and less expensive systems would do, and they are only needed for a few short years (after which the weapons will be gone).

So I have been asking all along, what else might they do with these facilities such that they deliberately over engineered capacity and longevity? The answer of course is, that they can reduce ANYTHING (or any body) to hot gases in an instant. That is well beyond where we might allow our imaginations to go, except that we do plan for worst case scenarios in war (against the NWO), and we know the Fascist legacy in WWII regarding the Final Solution.

All of these locations are secure facilities well away from prying eyes, all operated by a relatively small handful of people (and a large number of guards), and all served by rail connections: anything transportable by rail can be destroyed quietly. Thus it is logical that if there was to be a program of mass liquidation or even just detention, URS would want to be involved at key facilities having to do with distribution and disposition of said detainees. To this author, if there is no such dark intent, the participation by URS in SmartPort does not quite make much sense. So let’s look a little closer.

Who is General Joseph Ralston

URS underpinnings

We could talk all day about the evil Carlyle Group and scare any reader, but most readers already know how scary that might be with names like Cheney and Bush previously at the helm. So let’s instead look at URS key people, such as General Joseph W. Ralston, USAF (Ret.) Ralston has served as one of URS directors since October 2003.

He also served as Vice Chairman of The Cohen Group since 2003, which is scarier than Carlyle, headed by three Generals, an Admiral, and even a Lord and UK Defense Minister. Hmmm. Carlyle had a Lord and a lot of Generals and such, too, and Presidents. But Cohen had Henry Kissinger at one time, perhaps the world’s most prominent and outspoken Globalist planner.

The Cohen Group is a blatantly Globalist firm involved peripherally in intelligence matters and deeply involved in ‘Red’ China projects which might serve as a base of intelligence operations. I personally rate it as a spook company (what in the old days would be a CIA proprietary, except that this ‘front’ would serve the needs of the DOD). As such, it likely has at least one hidden agenda in each and every thing it does. While it is not quite so, it is ironic that the emblem behind Ralston (image) looks like CIA’s logo.

General Ralston was also a director of Lockheed Martin since 2003. Lockheed was waist-deep in development of Global Hawk technology this author believes (Fatal Rebirth) was used to facilitate the 9/11 attacks, so it is interesting that he is also involved with the very firm (URS) which cleaned up after the attacks. While at Lockheed, the firm enjoyed lucrative F-16 sales to Turkey… while Ralston was also advisory member to the American-Turkish League, a CIA-veted Turkish lobby group in Washington, and he was therefore accused of a conflict of interest. This is the fascist model: military, politics, intelligence, and business incest.

The General’s military career ran between 1965 and 2003. He served as Vice Chairman of the Joint Chiefs of Staff and, later, Commander, U.S. European Command, and even as NATO Supreme Allied Commander, almost exactly the same career path as Army General, Tommy Franks. He actually has connections within the intelligence community to include an embarrassing extramarital affair with a CIA officer which resulted in scrutiny by both media and Congress, and a team of divorce lawyers.

Both the General and URS share a common trait, which is to have both a public and a private agenda associated with all of their strategic moves. This is hallmark of intelligence operations, as well as of fascist government, not to mention greed. Thus Ralston’s otherwise honorable career is twice tainted with scandal. While not a spook, it would seem that he knows them… a little too intimately. Sorry. Could not resist.

Why does CANAMEX need a psychological warfare unit? 

Spooks at Richard-Gebaur?

That leaves us with multiple footsteps at Richard Gebaur, some suggesting military if not intelligence community shoes were involved. But who really left those prints? Do they lead to a dark threat, or are they merely strolling about for fun and profit as they seem to claim? To find out, lets once more look at KCS, itself.

It seems that the Centerpoint project is not fully utilizing the property, as it otherwise seems to be doing at the other locations. In fact, a look at their own strategic plans shows the base is essentially divided into three parts. Two of the parts are described as phases, a common thing to do in real estate development. If you build it, they will come, but not necessarily in a flood, so you build it in stages. This is legitimate, normally.

But look carefully at the dividing lines shown in both the Google Earth image on the prior pages, and the project plan. The underground facilities already in place are located in the area held back in phase II (another map shows the red-line areas are ‘base’ property). This implies there may actually be another (covert) use intended for phase II which has nothing to do with warehouses, since commercial firms probably don’t need nuke-proof underground facilities. The real clue to the truth may lie in who controls the rest of the base as current resident, one not intended to leave any time soon, and one that might enjoy the original underground facilities, especially if secretly accessed and thought associated with civilian, and not military use.

Why is a mind control part of CANAMEX?

Mind Control is a terrible thing to waste

The question is who is this resident? It is a military unit: The 308th Psychological Operations Group. What? An Army unit on a closed Air base? What for? Psy Ops? That’s a tactical form of mind control used by the military. Tactical means covert, and can include interrorgation (misspelled on purpose, given the current bloodlust in Washington in favor of torture) of hostile prisoners.

Frankly, the whole thing reeks of a frightening hidden agenda complete with a cast of characters and plots (capabilities) out of spy novel about a military coup… exactly what we find when projecting the steps needed to force America toward the NAU.

To repeat myself, in the exotic world of the military and intelligence communities, you plan for caabilities, not intentions, and thus, we should do the same when considering RichardGebaur. The sharing of a facility, especially one with multiple underground facilities which could easily be interconnected with high-security gateways, makes the entire Centerpoint project into a resource which (as a mere speculative capability) remains ‘on tap’ for any military application, regardless of how scary you define it.

Recall that in an earlier Newsletter I revealed that Tom Ridge, the original head of Homeland Security, and his Number One man (Roger Mackin, Chief of Security for DHS,) were both snipers in Operation Phoenix, the Vietnam assassination program run by CIA which is said to have murdered tens of thousands of North and South Vietnamese citizens deemed politically incorrect by the South Vietnam Police? I offered a copy of DOD records as proof.

I only mention the whole Phoenix thing as being kind of interesting for a couple of reasons. One is this: Normally, a Psy Ops group is a support group for a larger battalion, and as such, is based with the battalion. In this case, that would the 10th Psychological Operations Battalion stationed in St. Louis. The 10th actually has three such groups attached to it, but ONLY the 308th is ‘misplaced.’ I wonder why? So let’s look at the 10th and see what is different about them, if anything. Turns out there is something interesting

The 10th was created during the Vietnam War and was deployed there. There it operated under the command structure of something called JUSPAO (Joint US Public Affairs Office), which is generally responsible for, among other things, disseminating disinformation to the populace. In point of fact, many Psy Ops units actually call themselves ‘Civil Affairs Groups’ because their job includes making civilians think something other than the truth — a form of mind control well exercised by mainstream media here in this country, as it happens, and well documented, too…

As it happens, there are declassified Army documents (page bottom) which tells us a bit about JUSPAO activities in Vietnam. Turns out that Operation Phoenix involved USAID (CIA front) and JUSPAO, among others, with specific involvement of psychological operations (and other deeds). Of course, they don’t use words like assassination in the document when describing those deeds, preferring instead the prettier term ‘pacification.’

Additionally, document snippets reveal the 10th was directly involved in the pacification portion of operations, though it generally talks about propaganda leaflets. Thus it seems fairly clear that if the 10th was under JUSPAO command and JUSPAO was associated with Phoenix. Therefore the 308th is tied to Phoenix just as is Homeland Security, if not more.

So now, the ‘wild theory’ about possible covert use of the Centerpoint facility for processing of civilian detainees at the hands of Homeland Security or the military would now seem to hold at least a little water. It is as if Tom wanted his old friends to be with him in Kansas City, when the hard red rain falls. I bet you wonder if he has any other friends going along for the ride. Let’s look…

Well, funny you should ask. Tom Ridge no longer heads Homeland Security, of course. No. He does other things. One of them has him being a board member at Savi Technology, a firm specializing in container security, which includes RFID identification systems. Funny. Also turns out that Savi has partnered with NASCO such that NASCO, a Globalist promotional organization key to establishing the Canamex corridors, mind you, will reap huge profits from the Kansas City corridor, earning a fee every time a container is tagged with the ID chips. No conflict of interest, of course. Oh, but remember the Red Chinese? They also get a cut of that action. Isn’t that special?

And Tom serves on the Board of Lockheed Martin, primary sponsor of SPP, where, lo, it also turns out that each RFID transaction will be monitored. What? A defense contractor monitors shipping containers. You bet, and its called a ‘Center for Excellence,’ the new code word for surveillance facilities. If you check around, you will find something spooky going on in almost any such facility regardless of its outward nature (e.g., colleges, foundations, government bodies, etc.)

No, really. This is not some civilian project contracted to Lockheed, because all such data is going directly into Lockheed’s militarized Global Transport Network Command (GTN) and Control Center. The GTN was specifically developed for the DOD and is operated by the U.S. Transportation Command (USTRANSCOM) at Scott Air Force Base in Illinois. I owe this and the above tidbits on Savi, by the way, to World Net Daily in their review of NASCO, and a little digging of my own, which includes discovery that SmartPort also had to sign off on the GTN/Savi/NASCO deal, according to the 2006 North America Works Conference reports.

But it gets better… er, worse, actually. Savi developed its technology with Lockheed Martin and SAIC (Science Applications International Corporation), a heady mix of CIA/DOD proprietary interests that works hand-in-hand with DARPA (Defense Advanced Research Project Agency) to develop its nastiest, most secret toys, mostly. SAIC’s hallways and executive offices have been no stranger to men like John Poindexter & Richard Secord. You remember them… something to do with Iran Contra? Oh, yes, and one other lesser known little tidbit. They, too were in Operation Phoenix, right at the topmost posts.

Thus what we really have is an intermodal facility which is capable of receiving large numbers of persons by rail delivery who could then be taken underground and sorted into categories, some of which can be accessed by the 308th for questioning and disposition to other facilities as appropriate, be it detention or ‘disposal.’ The entire process can be automated using RFID chipped shipping containers and rail cars, and monitored and operated remotely by the military; no human ever need approach a rail car in the entire journey, save to open the doors, and that can be a military person.

So we see one of the prime companies involved in pushing for and, likely, to be involved in the management of the center also has access to and control of sites suitable for disposal of an endless volume of persons deemed expendable. They are also deeply enmeshed with military and FEMA such as to be a virtual partner, planner, and executor of any declared Martial Law. The footprints lead us in a circle of capabilities about Richard-Gebaur which fully encompass all requirements of any such covert agenda.

Almost all of the key players have something to do with Operation Phoenix, or firms and/or person tied to it and one another like a chain link fence. Worse, they all will profit by whatever takes place with the Canamex corridor through Kansas City, whether legitimate, treasonous, or murderous. This is, again, the fascist model.

While most activists focus on worries about SPP and NAU, Globalization and loss of Sovereignty, the real concerns may be far more dangerous, especially to the activists, themselves, since they would be the first to be on a ‘Red List.’ The greater network of six sites in works by SmartPort amplifies any such concerns. A greater review is in the newsletter, but I’m terminating the blog post, here. It, too, supports the scariest of ‘connectures.’

If one agrees there is more fire than smoke at work, they need not protest the feared conspiracy, they need only protest the SPP NAU and the entire SmartPort project with it. Even if not fearing detention camps or fascists, you should fear the NAU, which is yet one more advance toward the NWO, which is one more step toward the Antichrist’s coming. Hell is not far behind, especially those who choose to ignore the warning.

The truth about Canamex


Official information on SSP:

Critical Reviews on SSP:

Official information on Canamex

Critical Reviews on Canamex:

Official information on NAU (“does not exist”)

Critical commentary:

About firms, persons, military:

Does God Ever Approve of Deposing Tyrannical Governments by Force?

When peaceful change does not correct a tyrannical government, what remains is armed revolution — or — docile subjugation. History shows revolutions are slow to come, but when they do, swift to take hold. Yet, there is an important difference between being able to say ‘this government is tyrannical…’ as opposed to ‘This government is Godless…’

Does God ever approve of deposing tyrannical governments?

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Does God approve of revolution?

Reading this post you will learn:

  • Citizens of any nation may believe there is reason for armed revolt
  • That the Antichrist cannot come to power until there is a massive Global revolt
  • That God commands we not revolt against authority
  • But that there may be some forms of government where revolt is not revolt, but just punishment in the eyes of God
Is America ruled by government, or is government ruled by the people?

Who is really in charge? Who SHOULD be in charge?

Iranian Revolution: Governments fall when people unite.

In a prior post we sought by means of two polls, to determine who the real authority and source of power is in America, currently, compared to who is the RIGHTFUL source of authority. If you have not read that post, this post will likely be more valuable to you if you first at least review the Poll, and hopefully, employ it. Now, while the answers are specific to the United States, the question posed in THIS blog post, remain valid for any country under any form of government, even if Islamic.

The reason it applies globally, and as many of my posts point out, we are in a life and death battle with the New World Order, then we are up against powers and principalities who seek to seat the Antichrist. Even if not so, if we feel our government tyrannical and evil, we may be predisposed to considering armed revolt if we see no peaceful choices working.

But also as pointed out, if we resist properly, we can delay the unpleasant and totally fatal End Times that go along with that scenario. That means a Righteous (right-use-ness) fight to assert our right to God’s gift of free will as opposed to an evil (vile-use) motivation.

Scripture clearly tells us that we are to submit to authorities, even if they are oppressive, the example given being Caesar; the Roman Empire, eventually headed by an ungodly man who thought he was a God, and which literally enslaved most of the known World at the time. There are several verses which we should consider to see if there is perhaps any exception or justification for rebellion:

Hebrews 13:17 and Romans 13:1-7 are the primary establishing commands we seek to question, saying, “Obey them that have the rule over you, and submit yourselves: for they watch for your souls, as they that must give account, that they may do it with joy, and not with grief: for that [is] unprofitable for you.” “Let every soul be subject unto the higher powers. For there is no power but of God: the powers that be are ordained of God.”

1 Peter 2:13-14 echoes, “Submit yourselves to every ordinance of man for the Lord’s sake: whether it be to the king, as supreme; Or unto governors, as unto them that are sent by him for the punishment of evildoers, and for the praise of them that do well.”

Thus if we are faithful to God, it seems we must presume even tyrants were given authority over men with God’s blessing for some reason known only to him, and that their authority serves Him in such hidden cause. Yet it also sounds like it is based on the assumption that there is at least some degree of responsibility to protect and care for the nation, to specifically include spiritual care for their souls. And it is true, that even Caesar allowed the captive Jews to worship their own God. How odd was that, when such as he would soon claim to be a God?

So two questions come to mind which may alter the equation, and deserve further consideration.

One: What if the authorities actively seek to destroy God by advancing the Antichrist?

That is, after all, the primary premise which is in play up front and which drives the new World Order movement at its inner-most core. It is one thing to revolt because of tyranny and loss of freedoms, which is certainly a motivation in any revolt. But it is another to do so because the authorities seek to destroy men, destroy their spirituality and lead them to sin, and destroy God. What does scripture say about that?

An answer may exist in the complex story of Nabal and Abigail. Overly simplified, perhaps, for the sake of focus to topic and the limited space of a blog, Nabal was a powerful man of self-assumed authority at a local level who, when some of David’s people came under his power, was harsh with them, and took actions which were a threat to even David’s life by denial of food, offering instead great insult. Nabal worshiped Belial, a name for Satan.

David responds by gathering 400 men in arms to confront and deal with Nabal in reprisal. But one of David’s men warned Abigail, Nabal’s wife, explaining the problem. 1 Samual 25:17 is his conclusion and of interest to answering our question. “Now therefore know and consider what thou wilt do; for evil is determined against our master, and against all his household: for he [is such] a son of Belial, that [a man] cannot speak to him.”

Is that not how powerless we feel in the face of the NWO and their ceaseless crimes against us, plots all against God? Do they listen to our reasonable pleas?

But rather than justifying David’s intended battle, which we might deem rebellion, Abigail intercedes with great wisdom on behalf of and in acting authority of Nabal’s houshold. She brought food to David, and pleaded that there be no battle. David agreed, and Abigail returned to Nabal saying nothing. In the days that followed, Nabal died, God’s judgement upon him.

The story would seem to have no true relevance if that were the end of examination, for there is no Abigail likely to intercede on our behalf within the construct of the NWO (if one exists, please email me, and let’s fix this!). But there is one more passage which does apply. David, as God’s servant in the passage, thanks Abigail for stopping him from attacking Nabal, an act he himself describes as, in afterthought, evil (unrighteous). In part…

1 Samual 25:39 “And when David heard that Nabal was dead, he said, Blessed be the Lord, that hath pleaded the cause of my reproach from the hand of Nabal, and hath kept his servant from evil: for the Lord hath returned the wickedness of Nabal upon his own head.”  In other words, had David attacked, it would have been wrong. He indeed should have left the matter to God, who in the end did take care of it.

On this, then, we see the Bible remains adamant that we not ‘fall away,’ the term for rebellion, even when authority is clearly Satanic and seeks to harm us. And yet, I still wonder… there is the one other question…

Two: What if WE are the authority, and it is our servants that we need take to task by force of arms?

socialcontractThis is one reason why the poll was offered in the prior post. One may find there is a distinct difference between a government based on divine right as addressed by the above Bible admonishments to submission, and government based on a social contract; the Constitution and Bill of Rights. If, in the polls, We the People or the Constitution/Bill of Rights were seen as the ultimate authority, and especially if the poll also showed that the darkness of the New World Order was the true current power, then divine right would no longer seem a valid component.We would not be rebelling against authority, for we are that authority.

We would instead be rebuking those assigned the task of executing authority on our behalf, our public servants. Restated, if We the People deemed to grant the power of governmental authority to those in Congress, the White House, the military, and so forth… by means of a document we (our Forefathers, anyway) penned and signed as their charter of such powers, then they serve us at our pleasure, and should they err and refuse correction, we ought be justified in using force to end the matter, per Thomas Jefferson’s beliefs and intent; the whole reason for the 2nd Amendment right to bear arms of like capability as the military.

Biblically, that would be a Master-servant relationship, and we would still be in compliance with God’s Word to punish our errant servants. A master does not fall away from a servant in rebuking, punishing, or even killing him for just cause, nor does he do an evil thing in the eyes of God. Indeed, it is the servant that falls away in violating the will of the master, and punishment of any kind may be in order according to circumstance.

Luke 12:47 “And that servant, which knew his lord’s will, and prepared not himself, neither did according to his will, shall be beaten with many stripes.”

And one more thing…

If the poll would seem to insufficiently justify the above reasoning, or you otherwise find it unacceptable, the Bible does specify one, and only one other just reason to fall away and not obey authority. That singular reason is when authority commands something which is contrary to God’s commands. You are to obey God, and not man, in such a case.

Acts 5:27-29 (and similar in Acts 4:19) makes clear: “And when they had brought them, they set them before the council: and the high priest asked them, Saying, Did not we straitly command you that ye should not teach in this name? and, behold, ye have filled Jerusalem with your doctrine, and intend to bring this man’s blood upon us. Then Peter and the other apostles answered and said, We ought to obey God rather than men.”

Therefore, we must seek and define just cause for rebellion; such deeds or laws or deciets which prevent or thwart obedience to God. How can we judge if this be the case, or no? Start with what God has commanded, and compare. Look to the Ten Commandments, and we only find two which may qualify.

One: Thou shalt have no other Gods before me. Unless and until we are commanded to worship some other God, this is no justification. If the one-World religion is forced upon us, we might justly revolt, but that is something not expected until after the falling away and the one-World government is established. It is yet for a future time.

Six: Thou shalt not kill. Now we start to wonder if this is not a basis. Wars fostered by deceit to steal resources and confound the God of Abraham by putting Satanic sects in power (Hashemites – see prior post) would seem to be commanding our soldiers to kill for unjust cause. Depopulation efforts such as Chemtrails, Agenda 21 and Codex Alimentarius, and GMO crops is asking us to submit to being killed, and if we do not submit, to aid in the killing of our own children.

Indeed, the laws have already been written to enable and essentially require that we unknowingly allow the State to guide our unwed teens to kill their children by abortion. The 1.4 billion rounds of munitions ordered by DHS likewise seems destined to be used against us. Must we submit ourselves and our families unto death?

Suppose they do at last come for the guns? To do so is the final step in their revolt against our authority. Once they have the guns, they become the Master, and we become the servents; slaves, really. From that moment forward we are forced to serve Satan’s desires of any and all manner without recourse, and no longer have any means to resist. The Antichrist can come to power, and it is End Game.

Does God intend we should serve Satan without a fight, or is that a sin. There are more than a dozen verses on this but the one with the strongest and simplest clarity perhaps is Matthew 4:10 “Then saith Jesus unto him, Get thee hence, Satan: for it is written, thou shalt worship the Lord thy God, and him only shalt thou serve.”

Only Him shalt thou serve.

Him only.


And how do we do that? Do we grab our guns and start shooting? It is, after all, relatively easy to start a revolution. I hope not, unless perhaps it is in defense of the guns, that final signpost, that final straw… or perhaps if some cold, hard proof of genocide or like atrocity toward depopulation. But then, we each draw our own lines in the sand, and choose how to resist. I’m thinking there needs to be a way to fight back which does not require violence, one which can be applied more safely, and immediately… by anyone… today. This moment.

There is.

It’s available to us all, and has been all along.

It’s called the 1st Amendment; free speech, and when combined with an even more powerful tool, God’s gift of Free Will, it is all powerful. Become activist and use these weapons, or the entire Constitution and Bill of Right have no meaning for you, and perhaps the Word of God as well, for you may end up being doomed and unable to obey it when it is found to be, for you, too late. You can always just opt out of the system… and drop off their control Matrix (take the Red Pill).

The Mark of the Beast, or death may be your only choice, then — or armed revolt. But if you ever end up deciding the time is ripe for such revolt, I pray you do so in agreement with God’s view of your actions as being righteous (right-use-ness). That is one reason for having two polls to compare one to the other: if we be the rightful authority, than it is not revolt, at all, but due punishment, and not just our right, but our obligation in the eyes of the God.

How to War With the New World Order (Checklist)

No matter how simple the weapons and tactics of war, you need a checklist; an action plan which is your method to the madness which is war.

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

How to drop out of society

Continuation of prior post: a checklist on how to drop out

Exit the system, stage left

In the prior segment we introduced the notion of going to War with the New World Order by defining the problem, the underlying mechanics and principles involved, and getting a good look at our enemy. If you have not read that, and especially if you are skeptical that such a War MUST be waged, please read it now. We closed with Step Two of how to take the War to our Globalist enemy: Drop out of the System. That, in turn, opens up a series of possible tactics from which one might choose to employ, offered here as if a checklist for customizing your battle plan.

To repeat an important consideration, don’t expect to jump in with both feet, but rather, ease into those things which seem easiest to accomplish, and then expand upon them as opportunity and ability allows, and in like manner, move into other areas. Unless one simply happens to have the needed resources and capabilities in place, it is not likely even possible to undertake all of the ideas simultaneously: Some of them you simply might not care for, or accept as viable or workable with respect to their goals or your personal circumstances. Don’t feel you need to follow these suggestions any more than you need to ‘play their game.’ After all, it is about free will choice; God’s greatest gift to Man short of life itself.

And that’s exactly what we are trying to stop the New World Order from ending. Free Will.

What do I do to drop out of the system?

The Checklist

Don’t buy into the system: Don’t rely upon credit of any form. Debt is control, a thing admitted through history by bankers themselves. They sell credit to you with the promise of instant gratification and convenience, and even ‘perks,’ but the price is not mere interest, but firm control which locks you into their system. Once there, they own you and are assured you will not easily revolt. The banks and lending institutions, and the retail creditors, oil companies all… all rely upon credit to trap you into a Debtor Control System some call the Matrix, or the Grid.

Then there is the endless electronic transaction trail it generates which is of great interest to TIAO (Total Information Awareness Office — since renamed Terrorist IAO to make us think we are not the true targets of interest) to track your every movement. TIA is designed to eventually detect and record any and all forms of social transactions where information, money, or property changes hands, and even to calculate psychological profiles and future actions based on that information.

If enough people stopped using credit religiously, the banks would falter and interest rates would be less artificial and manipulative. The shockwaves would have a negative, inflationary impact on the economy, especially for MIIM corporations, because the dollar would falter against foreign competitors, seeking its true value (0).

Since the bulk of the National Debt is held in the form of Bonds owned almost entirely by the wealthy elite who make up the NWO, their financial power base is eaten away from within by the very stuff they covet most, which dwindles in value and usefulness. While a bad economy also has a negative impact on personal situations, it also hastens the general public’s realization that MIIM’s system serves them more than us, and will lead to more converts over time, and lead to victory and the chance to rebuild anew. That is the long term effect.

In the short term, forgoing credit and relying instead on alternatives herein not only saves you interest (money), but allows you the freedom to choose what you will pay with. In essence, it makes it easier for you to survive a bad economy by relying instead on an underground economy, ignoring fake Federal IOUs in favor of the truest currency of all; value given for value received, in a transaction where each transactional party dictates what is of value, and its worth.

For instance, there are barter institutions which allow you to trade goods and services for other goods and services — no money or little money needs be involved at all. They act as a kind of ‘bank’ trading ‘credits’ used in such barters for a small percentage of the transaction — much less than would be the interest in a credit-purchase situation. But of course, you can also effect barter with individuals directly, often providing increased flexibility in coming to an agreement.

Be careful, however, when using services, because there are tax issues which generally force such services to report at least select transactions, and that may be undesirable. The System is trying to make barter unworkable, even illegal. But in an underground economy, such concerns are no different than highway speed limit signs when hurry, you must. You can simply offer to trade directly with those you personally do commerce with most often. Offer to trade excess items or items you make, or services, for whatever you want. There are people who live completely by this method, not even paying rent with cash or credit, though such is rare. I could tell of wonderful outcomes with barter, personally.

Somewhere, if you ask around with persistence, you will find someone who is willing to trade, and in such a case, you mutually agree upon values and no one, not even Uncle Sam, gets a cut in the ideal circumstances. Enter Craigslist, and the like. Of course, there will be things you cannot easily barter for, many of them essential, such as certain foods, rent, and utilities. We will address such needs elsewhere.

Don’t fund the NWO brand names: Determine what companies belong to MIIM, and boycott their goods and services, and do not buy their stocks. That means some hard decisions. If the company is a military contractor, or a multinational, or owned or controlled by one (a subsidiary), it is a company you should avoid doing business with and one worthy of constant public condemnation in activist style. Also, avoid purchases of any precious gems or metals, since the great bulk of the mines are owned by the NWO — else why to think they push these commodities so hard by selling fear and uncertainty?

Unfortunately, this means doing without certain goods altogether, such as new cars and appliances as technology advances. It IS OK to buy used, if it is not going to be financed. I drive a six year-old car and use a six-year old computer — and they work great. I am not so far behind the technology curve as to ‘hurt.’ I might spend more on repairs but have no monthly payments and the original cost was well below new — so it costs considerably less to give up a little prestige or performance, or whiz-bang feature. Doing so means the system is not profiting by my presence — I am not participating. You can amplify upon this by growing your own food (to be illegal under Agenda 21 and Codex Alimentarius), making your own clothes, and similar self reliance.

Don’t buy the advertising: Boycott the newspapers, magazines, and media outlets owned by MIIM. Obviously, you will need to keep up with the news, somehow, despite the fact that you know you cannot fully trust any such source for complete honesty. I suggest TV can stay, or perhaps radio, but NEVER select ONE news source (channel, station, commentator).

But whenever you hear an ad for a product on ANY mainstream source, or see one in a magazine you happen to read despite your strategy (e.g., waiting rooms), take a moment to write a letter, even if a form letter, to the advertiser(s). Do not use Email for the purpose, for only a written letter will have impact — and then, only if it is business-like and polite. Don’t wax as politically indignant as might I; “Dear Fascist: Regarding your sinful and shamless partnership with XYZ Media in their evil plot to…

Better idea: tell them you do not trust the media source which aired their ad and believe it biased, because it is owned by (insert the appropriate military contractor or megacorps, here), and thus, you refuse to buy their products because they are paying for disinformation to be disseminated. If enough people did this religiously, advertisers would be more careful, and Media would falter, its income stream hampered and profitability down. It might even wax honest.


Don’t be tracked by purchases: Demand retailers destroy or remove RFID chips on products you buy, and protest their use. Most will have no clue, so educate them at the register, perhaps forcing a call to a Manager… simultaneously educating those waiting in line (no angry rants — just calm explanations and politeness). In the end you will likely need to destroy them yourself (microwave oven for tiny ones, scissors, shredder or burning for larger ones).

Items where removal and destruction is not possible should be kept in a foil pouch when not in use (this includes some state drivers licenses, passports, and other chipped items). Pull clothing tags and similar, and destroy them, shred purchase documents unless you are desperate to be allowed a return or warranty remedy in event of a defective item, in which cass.. Simple discarding may not be sufficient for such items if you think you are being sought or surveilled; trash is not your friend, it is a data mine. Don’t pay by debit card unless it is prepaid and not tied to you by name (one reason many places don’t accept prepaid). Cash is King of safety, though it labels you a convenient ‘terrorist,’ in FBI retailer snitch programs (one reason we need to kill the System; its insane paranoia creates that which it fears in self-fulfilling cycles).

Don’t work for the system; Do not allow yourself to be employed by a member of MIIM or one of their subsidiaries unless willing to use that employment to their disadvantage. An example would be seeking to find and expose information damaging to the company, especially if exposing wrongdoing. I, for instance, took a job working at Shell Oil, where I uncovered a terror plot, by chance. More likely, it would simply be better to take a job with a smaller firm, one more likely to itself be a struggling competitor to the larger MIIM players in its field.

Help them to succeed, remembering that a small firm is more nimble and creative, and can often fare quite well compared to a megacorps, which relies mostly on boardroom antics and bookkeeping tricks to advance its position. If enough people did this, MIIM firms would not know which employees they could trust and it would likely force them to be more honest and less conspiratorial for fear of being exposed. And, they would need pay more to attract better people, driving the wage base upwards for all workers, instead of conspiring to beat it downward.

Avoid the paper trails: Avoid seeking permits and licenses where at all practical. Consider doing so under an alias, and using bogus addresses. An illegal extreme might be completely false ID, or multiple IDs, which I’d not advise as wise unless there was a shooting war. Remember that an alias is legal, as long as it still ties to your true identity. It is where and when you allow a given tie (i.e., your correct phone number) to be used or established that will help limit the usefulness of the paper trail.

If unsure, check with a lawyer. If enough people did this, the tracking systems would bog down in duplicated efforts and be confused by the alternatives, increasing your true freedom; paper trails that go nowhere. You literally route paper trails to alternate addresses or phone numbers. These can be real-World addresses/numbers where you have access and discovery regarding any attempt to use them (by the system), or PO boxes or similar mail drops (i.e., blind drops, double blind drops).

Examples might be relative’s addresses, or unused mail boxes such as where an apartment complex of 44 units has 45 mailboxes (slap a number on it), and so forth. Keep your real world address only for those things which you wish to receive mail for — and I don’t mean bills. They should go to one of the alternates. Have many such alternates, and establish a list of parameters as to the type of material you allow to be sent there. This is how to deal with utilities in a way that reduces trails. There is a difference between a physical address where the service is delivered, and a billing address.

Another very valuable tool is a lawyer or bookkeeping service, or any professional service that is willing to hold mail for you. Another tool is to swap addresses with trusted friends, or to take select mail at work, if you have access to it in a way that is not obtrusive or invasive to your employer. This is an even better way to deal with utilities: send the bills to your lawyer for collection. You can establish a trust and put the bills in that name, or pay directly through a lawyer. There are similar arrangements possible through financial management services available through banks and elsewhere, though they keep records and report to government. Think outside the box, and get some expert advice about alternatives.

Avoid communications traps: Avoid using mainstream communications channels. Use disposable prepaid cell phones you replace frequently, donating old units to groups who give them to battered women and others who need a way to dial 911 without having a monthly bill for the privelege of safety. Read this about cell phone privacy and security issues. Create and employ a steady stream of free Webmail accounts and abandon older ones as you go, keeping perhaps three active at any given time, and using alternatives for varied purposes. I use one for Real-World contact in key transactions (let’s call it the ‘official’ number), one for my most important confidants, and one for things between. Consider mail box services, blind drops, etc., if needing secure and neutral mail delivery, such as described in my book, The Professional Paranoid.

Don’t fall into the insurance trap: Avoid insurance whenever possible, to the extent your strategy allows. This advice can be very bad advice for some people, so be sure to examine the option carefully before you decide. I only suggest some alternative logic paths may increase the choices available to you, which are these…

Insurance is a bet between you and the insurance company and like all good casinos, the odds are stacked in their favor. The bet is this: They bet you and others like you will face problems which requires insurance pay outs which are collectively less than the monthly premiums paid by you and others like you. In the meantime, they invest your payments in stocks and other business deals and earn interest or dividends on your money while waiting to pay out any claims.

You, in turn, are betting that you will benefit by having a problem which exceeds your personal ability to cover the expense yourself. Who cares? Only those who fear the odds should care. The insurance company knows they will win, or they would not make the bet. If enough people did not take that bet, the cost of insurance would rise (because of fewer participants increase their risk to profit ratio) to the point that the system would fail; only the rich could afford it, and they don’t need it.
Take medical insurance. If you don’t have it, hospitals must still accept you and treat you. So you end up owing them a big fortune? Even a three day stay can cost between 12 and 100 thousand dollars! The insurance wouldn’t have covered it all, anyway, and you would still end up owing them a small fortune. If you are reading this, likely, you could no more easily pay back a small fortune than a big one. So let the debt stand, as either way, they would have no means to collect it if you have dropped out of the system.

Regardless, the hospitals (the big ones owned by MIIM) will write off the debt or work with you to cover it. There is also bankruptcy as an option, if they press you, as discussed later. I’ve used that one, myself, and while it had its down side, it had many benefits. Yet in the final analysis, if you don’t pay, and have no assets which can be attached, and don’t care about your credit rating… let them go fish! Bankruptcy is not needed, just toss the bills into the trash, and don’t talk to them on the phone.

Likewise with home or renter’s insurance. If you don’t have it, the worst case scenario is that you are homeless and without your possessions. All the insurance company would do for you, after an endless battle of paperwork and legal moves designed to avoid paying, is help offset some of your expense. With insurance with the same firm for nearly fourty years, I had some $40,000 in computers stolen, and never saw a dime, for instance. But gee, they were quick to pay off a $1,600 repair bill… and increase my premiums to compensate. Good neighbor?

In the meantime, you would still be depending on charity and the mercy of relatives or friends. You can go that route all the way and fare just as well in the end, avoid the legal hassles, and the insurance payments. Sure, for many of you that’s probably untenable advice. But tell me, what are the odds of a total casualty loss? If truly concerned, stuff that money away in your own investment methods against such a need; self insure. Some states have Self Insure laws which make it easier to do that effectively and safely, a bit like being Bonded.

Auto insurance is another problem. In many states, you cannot get a license or buy a car without it. So, perhaps you should not own a car, or have a license. If you choose to drive without and get caught without a license or insurance, the vehicle will probably be impounded or even permanently confiscated depending on local law, so the risk may be great. Or, you could just drive a junker and abandon it to the system in such a case.

But if your identification does not well track to you (per the earlier suggestions), you may care little about the fines and courtroom proceedings demanded by traffic tickets and fines which result. If your car was a $200 beater, as suggested, you may consider it expendable and cheaper to have lost it than paying the insurance and tickets over time.

On the other hand, remember that part of auto insurance is liability, and you probably don’t want to wind up being responsible for another citizen’s financial woes because you did not have insurance. Of course, one can buy just liability insurance and minimally be in the system. But if you are in a ‘no fault’ state, the other fellow’s insurance would cover it, and if he was uninsured, like you, then that was by his choice, making you de facto partners in suffering.

Doing without a car altogether may be the best bet — relying instead on public transportation. In fact, overloading public transportation will tax the system greatly and hasten good results, because it is inordinately expensive infrastructure which never quite pays its own way. Convenience isn’t everything. A Monthly Pass, $40. Watching the transportation system go bankrupt, Priceless. Moreso because they CAN’T shut it down, but will instead ‘bail it out,’ and that will cause more people to join with you, in the end.

Don’t feed the system: Avoid paying taxes where possible, always vote taxes down if given a chance (unless something you just can’t resist supporting), and always demand more services which require tax funding. If enough people did this, the system would be forced to raise taxes to cover the need against the will of the people; more and more citizens will come to realize the system is not working, or not working to meet their needs. The movement grows.

There are many ways to avoid paying taxes, and most all of them are legal, though they represent a significant exposure to harassment and punitive response. It only takes courage to use them. I won’t waste the reader’s time with the details, because there is a wealth of material on the Web about the tax protest movement. Here are a few to get you started, including some eye openers which addresses the tax protest movement in historical and practical terms, as well as religious — many of them (those critical of ‘schemes to avoid taxes’) being created by the system to protect the system (use a grain of salt). On the flip side, some advice is just plain wrong, even fraudulent or criminal (take care).
One can simply decide they are not going to pay taxes, and opt out of the IRS’ system. This is fraught with danger despite claims in some quarters that there are legal ways to do so, per several of the links found in the pages cited above, so I’m not suggesting it is a great idea for everyone. One could further rely on multiple IDs and poor tracking to addresses, and frequent change of jobs (if we had a better job market), declaring tax exempt status each time. You get to keep more of your pay until such time as you feel you are being closed in upon by the system demanding you comply or account for yourself, and then move on, and reinvent yourself once more.

Taken to the extreme, one could obtain false ID under the Social Security number of a deceased person. This would be illegal, and is not being advised — but CIA agents do this all the time, even multiple times for a given assignment. At some point, if a shooting revolution begins, this would be a more logical step, one we should all consider for personal safety. But by then there may be a National ID and chipping in place, rendering it an unworkable alternative. Preemptive moves may be wisest of all.

But if you can seek income from self employment or be legally considered a ‘contractor,’ you become responsible for your own taxation, and that offers opportunities to deal with taxes in a more useful manner. But it would take a book to discuss all of the many strategies involved in a good tax game plan. The Web links provided mention more than I’ve covered, here, including such books. And, of course, it is always true that you should seek every legal deduction or tool you can to simply reduce the taxes actually owed. You shouldn’t need to be a disenfranchised activist to see the value.

Know what the system knows and help them unlearn it: Make a list of every business and governmental agency that likely has information on you. Contact each of them and ask for a complete hard copy of what they hold on you. Invoke FOIA if you must with agencies, and rely upon various consumer laws for the business sources. Force them to expend the hundreds of hours (in many cases) and other resources it takes to comply. If enough people did this often enough, their cost of doing business would skyrocket.

Take the care and time to review information carefully, and fight to have errors corrected. Demand that businesses do not share information about you with others (specifically forbid them to sell your name or information to others). If possible, ask to be expunged entirely from their electronic records. Many laws or corporate policies require them to comply, unless you are talking about data on contractual or financial obligations, or other legal histories of like importance.

Don’t bank with the system: Avoid checkbooks and savings accounts. If possible, arrange to sign over your paycheck to a relative who does bank and have them cash you out. Of course, you can also go to the check cashing services, but they will demand ID and charge a hefty fee. The less paperwork, the better, but if dealing with a relative, have a written understanding between you so that the IRS won’t claim all your money is income they have not paid taxes upon.

The best arrangement would be an employer or work situation where cash payrolls were involved, ideally with no reporting to the IRS. Illegal migrant workers are often paid under the table and don’t get taxed, and thus working for less than ‘minimum wage’ may mean you still have almost the same spending power as if getting the minimum. So, perhaps joining them is better than fighting them for service jobs. That would truly take you off the grid.

Consider Bankruptcy as a tool and a weapon: Do not fear bankruptcy, but do not blindly embrace it, either. Study and know the full ramifications of a bankruptcy as it would play in your specific circumstances, before deciding on its use. For many people, it is a valuable tool for exiting the system. Not only does it allow a fairly clean exit, but it can do harm to the system in the process where the creditors are of the MIIM variety.

I know of some people who deliberately build up large debt with MIIM institutions and firms, and then go bankrupt. Even though they may have hundreds of thousands of dollars in such debts, this is actually only a minor inconvenience and a drop in the bucket to most MIIM players. Still, I suppose, if enough people used this approach, immoral though I rank it, it could add up rather quickly. It is a dirty war forced upon us, and thus such immorality is not mine to judge, but yours and God’s.

Just know that while bankruptcy provides certain protections and allows the complete elimination of commercial and private debt, it does not protect against taxes and may not prevent repossession of some goods. The exception can be one’s home, car, and tools, but laws vary from state to state and even case to case — and the government is trying to make it so hard, it is almost impossible. A lawyer should likely be involved, and that is yet another expense to consider. Even a simple bankruptcy will mean many hundreds of dollars out of pocket up front.

Don’t Educate Within The System: Take your kids out of public school and put them into private school or home school programs. The quality of education will rise (as will the cost, because you will still be paying taxes for schools unless you have dropped off the property tax roles). The moral teachings and principles of leadership and responsibility will once more be included as part of education. If you remain in the system, don’t be shocked when you learn your underage daughter has an abortion without your knowledge, or if your kids start being put on Prozac or similar psychotropic drugs without your consent. They will certainly be dumbed down politically, and have no useful grasp of history for preservation of America’s true heritage and core beliefs.

This ends the overt or outward steps one can take to drop out of the System. There are many other good ideas out there. I’ve tried to focus on the mainmost effective steps to start you thinking outside the box. In the next section, we will look at COVERT steps you can take, thinks not outward in nature, things which will increase your defensive posture should things turn nasty, even to include a shooting war. They remain none-the-less critical to your ability to well live off the grid, in or out of a shooting war, as they leverage your personal abilities by allying with others of like interest.

That will be Step Three, the final step: Establish and underground network

Network and establish an underground: There is already a large network of ‘underground’ players which you may choose to rely upon. For a more trusting relationship, it is easier to start your own. Find like-minded people in your area and establish relationships based on keeping to as many of the below advised procedures as can be achieved. You will find that you can help one another in immeasurable ways.

One of the most valuable may prove to be bartering amongst networked peers, and learning from one another what works and what does not, or how best to apply a given tactic. My wisdom is miniscule compared to someone who is in your exact situation and who has already tried and discarded, or tried and refined a tactic. Make their experience work for you.

One place to look for established networks is public access television and radio, and underground newspapers. You can also find allies through bulletin boards at local colleges and places frequented by modern society’s ‘les miserables,’ such as head shops, book stores, music stores, secondhand stores, and so forth. Political rallies, especially for more Constitutional issues or controversies, is also a good place. While it is preferred that your network be closely aligned politically, remember thaty the enemy of your enemy is your friend, even if they be an Anarchist or Communist at heart.

Start up conversations and be friendly. Find common bonds (music, books, news topics) and get started just like any other attempt to make new friends. Then pose a question or offer a sentence which suggests you are dropping out of the system for political cause, and state your concerns. If they don’t know what you mean, educate them. If they do know, or after hearing your explanation, you will know almost immediately if they are kindred spirits. Develop such relationships with appropriate caution and reasonable paranoia towards possible betrayal. With a little time and patience, you will find some real gems. Discard the losers, and attempt to rehabilitate fence sitters.
Another way to network is to directly use Public Access radio and television resources, or the underground presses, yourself. You can (for free) learn to use broadcast equipment and create and present your own public access programs, or simply be a guest or participant in someone else’s show. Such shows are a wealth of information relevant to a broad array of social injustice and crimes or other victimization, and how to fight back. You will find allies, and you will make converts. In short, you will become an activist if not one already. That is what the system fears most — someone that pricks them, and they can’t reach out and correctively scratch back.

Establish a Personal Network: Within the broader network, set up your own, smaller core underground support group using methodology similar to that used by the intelligence community when setting up an organization or project. This raises several sub topics, to include information as well as personnel issues. First, figure out who is the primary authority for the group (group leader). It need not be you if you don’t have a head for leadership or a desire for the tremendous responsibility it can represent.

Compartmentalization is a key intelligence community tool, and it would serve organizers to read up on that methodology, as well as other methods intelligence spooks employ. A hint of these methodologies is offered in these general guidelines or ‘talking points.’ As you seek to establish your group, these should indeed be discussed among you as issues to be addressed and decided upon.

Terms like covert, secret, and sensitive as used herein could be misconstrued to imply the purpose of such a group is clandestine or illegal in nature. That need not be true, but could be so, to a degree, yet still not be dark in purpose. For instance, you may wish to barter or trade services or goods privately in deference to what the system would prefer or considers legal. You will need a network of people with like interests in order to do this at will, safely. You will want to protect that network from discovery or the system will move to squash it (and you).

Of course, if a shooting war erupts, you will then have everything in place to escalate to darker needs as you see appropriate in defense of your family, country, and the Constitution. Everything will be illegal, then, but the true criminals are the ones judging it so. A network can easily be adapted for true intelligence gathering and black ops against any usurper of power, or formed into underground combat units, were that to become your collective wish. That is the real reason they won’t like the existence of networks. Here are some basic covert network guidelines:

Categorize information: Identify material as being either sensitive (controlled) or public, (uncontrolled) and determine who has both a right to know (authority), and need to know (required to do their job/assignment) for access to controlled information.

Establish a formal means for controlling (restricting) and tracking (recording) both access and the ability to make copies. Never give both access and the ability to copy unless the copies and the process that generates them are also controlled and tracked. You need to be able to reconstruct any possible leak of sensitive information based on who accessed it, when, and how. Eject from your group any violators of protocols, even if accidental or seemingly innocent. The Network’s integrity is more important than risking it further to an uncertain loyalty.

Safeguard information: Where possible, insert dummy information into sensitive information as a further tool for tracking leaks. Dummy information should be ‘detectible’ in terms of identifying the nature of the leak and ‘neutral’ in terms of impact on those accessing it (it should not cause them to alter their legitimate use of the information). It should be unique to a given or limited person or group of persons in terms of access, to better identify the leak source; a given person knows a given thing no one else knows, something which seems important and rightfully sensitive, but which is not, and something which would be easy to detect if leaked (cause visible actions as result). Establish ways to test such loyalties and detect any betrayal.

Control access to information: Organizational members (family, fellow dropouts, and trusted friends or coworkers who support you in any way) should be categorized as protected or visible in terms of identities and operations. Protected individuals will be given and referred to only by code names, and only their operators or handlers (i.e., group leader) will know who they are and how to contact them. A protected person may assume a cover as a visible person, or may prefer to be seen as completely unaffiliated with the group. A good example would be a liaison with another group. A visible person might be a spokesperson, or a Lawyer, etc.

Likewise with operations: Things you plan to do should be categorized as sensitive (covert) or open (overt) in nature. Only team leaders assigned a given operation will know all details. Even the assigning authority (team leader) might not need to know all details, though they will need to know those required to accomplish the goal and the general plan, that they might pick the best team members, and properly monitor the outcome or status of the effort.

Team members (operatives) may or may not need not know precise plans, timetables, operatives, lead-in event details, actual objectives, and so forth. Individual operatives will know only their individual assignments, restrictions or other parameters, and goal, but not have an understanding of the nature of the project or the identities of others involved unless part of the same interim goal.

Form network alliances: The primary authority (group leader) will likely wish to establish special relationships as part of an ‘intelligence’ network for seeking out and sharing of critical information useful to the needs of the group. This should likely include counterparts in similar groups located elsewhere, where such trades of information can be mutually useful. But it might include ‘insiders’ positioned within non underground businesses, agencies, or groups able to provide useful information, persons considered friendly to your cause for whatever reason.

The usual formal first-contact means is a simple presentation of needs/interests and possibly the exchange of bona fides (proof of identity, purpose, and sincerity of beliefs based on prior accomplishments). It is better to rely upon gradual building of trust and bonds. Don’t show all your cards up front; it can backfire and get you into trouble, or scare them away.

You will want to establish simple tests of fidelity for the alliance partners, too, and conduct these with a subtle degree of covert manipulation, being careful to insure you can demonstrate, if caught, any deceit was not intended to be harmful to the other side and was necessary for your satisfaction of their integrity. Restated, give them something which seems like it could be used against you but which would backfire if they do (a trip wire, of sorts), and yet, which you can explain as such should they detect the deceit.

Protect alliances: This creates a network of networks and amplifies the power base and resources for each group. It is acceptable to define limits of operation, mutual goals, etc., each group is willing or interested in working on. It would be dangerous to assume anything about another group, as there can be ‘guilt by association’ complications if something they do causes too much attention. Likewise, whatever you do can cause problems for others, so be sincere and honest when presenting your beliefs and intents, or you may find yourself cast to the wolves by an angry cadre. In essence, you live or die as a group by what you say as well as what you do, so live up to your own stated expectations, and hold everyone accountable for failures so there are no mysteries as to why they failed.

Establish a Recon Team: The primary authority should find persons with skills and real-World resources, contacts, etc., suitable to establish conduits of reliable covert collection of information (intelligence gathering) about key strategic matters relating to persons or groups deemed a threat or activism target of the group. All group members should participate to the extent possible in overtly safe ways, but some individuals would excel in covert application, and their assignment to duties in this regard should not be known to the group. Special skills such as investigative or research skills, photography, locksmithing, communications technology, and computers are good starting points for considering who to assign.

This function is critical in a shooting war, but even if just trying to survive as an underground community, there will be threats which will require attention, and activism toward preferred reforms will need to continue in ways which do not threaten group integrity of operation. To fail to have such team in place as an underground group could be a significant risk if matters evolved to a shooting war.

Additionally, omnipresence in the greater community is desired with respect to information access. Therefore, project leaders and even group members may be asked to separately recruit ‘operatives’ who will contribute to the project or goals of the group without necessarily having allegiance to it, or even be aware of its existence. This is ‘recruitment’ which may involve any of the inducement methods used by the intelligence community itself, provided such methods have been approved by the group leader (some might be seen as illegal or immoral, such as bribes or blackmail). Not everyone will be good at recruitment, but those who are become good candidates for inclusion in the Recon Team.

Establish a security team: The primary authority will also wish to establish a small team of persons who covertly address internal security — counterintelligence. They should be active in various projects as if ordinary team members, but would additional focus on internal security matters (watching for security leaks, infiltrators, etc.) Only the most trusted of persons should be members of this group, but all members should share the responsibility of watching for and reporting signs of security threats, external and internal.

Use a consistent model: Each project leader will wish to mirror the organization of the group in small scale with respect to networking policies and layout, but bona fides will not be an issue, nor will they need their own security team, but rather, one individual would be assigned internal security matters. They will likewise wish to mirror the group leader with respect to operatives who will report directly to the project leader, only.

Be discrete with all communications: Communications between various covert components must be established such that contact, sharing of instructions, information, and reporting, can be undertaken without anyone within or outside of the group being the wiser. The use of code names, code words or phrases, and flag actions (i.e., placing an object in a certain place or position), covert meetings, blind drops, and so forth, will be called for in almost every instance.

Delegate where possible: These operational guidelines create a certain project management overhead which should be delegated downward so that a higher level is not overly involved in the operational details of a lower level. Upward/downward reports or downward group- or team-wide presentations keep leaders and group members informed as appropriate. The group leader should not worry about how the project leader communicates with his operatives, etc. Everyone with a special skill should seek to clone themselves by training a possible replacement so that the loss of any person’s would not seriously harm the group’s operational integrity, and delegate tasks to trainees to test their abilities and grow their confidence.

Weapons of war: Early in the formation of the group, a consensus should be sought regarding definition of what weapons of war are deemed acceptable or required to meet group goals and maintain operational integrity. It is presumed and hoped that such weapons will be limited to the same weapons as used by any activist outside of an underground group (words, public protest, etc.). But given that Homeland Security has placed bid requests for 1.4 billion rounds of ammunition for use outside of the military, it seems clear that someone intends or expects there to be a shooting war, soon.

Therefore, a ‘policy’ should be calculated to everyone’s satisfaction regarding actual weapons and munitions which may be needed if a shooting war erupts, be they intended for self defense or for offensive operations against forces of oppression, be it on an individual or group basis. Considerations should include: a) access — will there money available to purchase, will there be a market in tact which can sell? If not, get them while you still can and stockpile for future need — you won’t want to wait until your only option is a criminal black market under Martial Law; b) choice — is there someone in the group who knows what weapons are good for what uses? If not, assign someone to find out; c) training — is anyone able to shoot a weapon or even comfortable doing so? If not, they should take courses while they still can; d) storage — where will they be kept until needed, stowed by individuals or the group? A secure place safe from deliberate detection efforts will be required.

Thus ends our review on how to drop out of the system and form your own underground. These are fairly basic in nature, and yet may simply be too much for most readers to contemplate. But sooner or later, the way MIIM is heading, we are all going to have to make a tough choice: do we stay within the system and be controlled by it, or do we break away from the system and seek its destruction, or at least be ready to do so at some strategic point before it is too late to do so?

Our survival as free-will individuals and citizens, and as a free nation, will likely depend on that decision. Better to make the decision sooner, than later. Better to do it methodically and with good principles of operation than by spontaneous guesswork. When MIIM makes its final moves, the warning may be mere hours before they start going door-to-door and results in shooting, and it will be too late for decisions, much less planning, then.


Do I hear someone knocking at your door? Better check your political watch and peek out the window before you open it.

Globalism’s Self-Serving Cycles of Terrorism

A reality check for citizens in every nation, democratic, communist, totalitarian, or religiously governed (e.g., Islamic); terrorism is not waged between governments or ideologies as outwardly advertised, but a covert weapon for political control used by Globalists against all peoples, especially the very members of terror groups duped into participation. More to the point, it is waged by powers and principalities, against God and Man, and serves Satan.

Globalism’s Deliberate Self-Fulfilling Cycles of Paranoiac ‘Terror Threats’

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What you will learn reading this post…

  • Terrorism is a sham, a weapon of political control technology;
  • Terrorism never benefits terrorists in any real way, given the backlash;
  • Terrorism is never approached as a problem to actually be solved because it serves the ‘target’ government’s interests as long as it exists;
  • Terrorism is about control of the masses through fears designed to sponsor a willingness to subjugate ourselves to the New World Order;
  • Therein is the real secret; the NWO is Satan’s Illuminati plan to seat the Antichrist, terrorism being a mere tool.

Who benefits from terrorism?

Reality Check Time for citizens of all nations

Image: Agence France-Presse Getty Images; India Ink blog post      on lessons learned on terrorism in India (click)

Rewind the clock and review the last few decades or so — the time frame of the alleged ‘War against Terrorism.’ If you consider cause and effect relationships with much care, you quickly see that there would be no terrorism of true consequence except for government’s need to both instill fear in you as a form of Political Control Technology (behavior and thought control through deciet), and as a generator of ‘fuel’ for that very mechanism.

Look more closely, however, and we find even the governments are not the true benefactors. That would be Globalists, which put in other terms, is the modern-day Illuminati; the New World Order movement for a one-World government. This is governments run by the power elite, also called Fascism in some circles. Such rule is required if the Antichrist is ever to come to power. That is what I hope to illustrate in this post, along with some other eye openers of like nature:

Case Study; Control Group

But before we do that, we should first establish and consider, in the method of good scientific study, a ‘control group.’ We can then hold up the control group for comparison to the ‘terror group’ of events we will consider to make our final findings. Any differences should be for us valuable clues. For this purpose, let’s use something entirely unrelated which, like terrorism, represents a deadly threat to lives and the wellbeing of any nation; traffic accidents. Rewind the last decade or two in your mind and replay as you consider…

At regional and local levels, mostly, and to somewhat lesser degree at national levels, the high death toll and financial cost to the nation inherent in traffic crashes, including GNP impact, typically sparks ongoing efforts to improve highway and auto safety. This consists of an endless series of changes in rules, laws, and regulations, as well as advertising campaigns to educate drivers.

Specific examples over the years would include improving crash safety standards for auto makers, improved highway lighting, signage, and general design considerations, mandating seat belt use, ‘Don’t drink and drive,’ and other safety ad campaigns, tougher traffic laws and fines, more enforcement, and so forth.

In replay of that history, can you uncover recollection of ANY instance where a given governmentally sponsored approach significantly resulted in an INCREASE of traffic accidents or fatalities? I think not. The point is, in this control group review, we see that a problem which is seriously addressed for its own sake tends to evolve improvements, rather than degradation, over time. Restated, a legitimate problem genuinely and sincerely addressed in this way can always be made better by a cure, or an ineffective cure can be discarded in favor of a renewed attempt.

We must also ask, for reasons which should become apparent, who benefits thereby? The answer is, essentially, everyone. Drivers live longer and suffer less as a class, costs of accidents go down, though costs of ownership of vehicles tends to increase somewhat due to more expense in manufacturing and, for some, higher fines or fees associated with use of their vehicles, and taxes for improvements in highways. Most of us are content with these offsetting costs, and do not complain too much. The nation’s quality of life and GNP are enhanced.

More to the point, there are no significant losses of freedom or increases in political control by government, though new laws addressing safety issues may impose changes in procedures and provide for penalties; no one is unduly oppressed or repressed thereby, and basic rights remain unscathed.

Hmm… that seems to fit rather well with Titus 2:7 “In all things shewing thyself a pattern of good works: in doctrine shewing uncorruptness, gravity, sincerity.”

The Comparison Group; Terrorism

Osama bin Bushadine

Rewinding and replaying the same period of time, but this time looking at Terrorism, let us compare to the Control Group. One difference we see almost immediately is that virtually all of the effort to combat ‘the problem’ stems from national government responses, rather than regional and local levels. They, alone, by and large, have defined the problem and ‘solutions offered.’ That, alone, might be a significant clue; a small handful of Men, all of like nature and purpose within the power elite, control all aspects related to the issue.

Indeed, no one else’s opinions are even allowed to hold sway, regardless of their quality of logic or popularity among the People. In almost every case we find, in reverse to the Control Group, that their actions have stimulated, rather than abated, the problem of terrorism. Indeed, if we go back far enough, we find that the problem did not even exist except for the causality of their actions. To make the point, let us look at several ‘models’ of terrorism. Start with the European model:

Go back to the time prior to the European Community, and you find that terrorism essentially was non existent in the early years of Post War Europe. But it came to be, based on the nature of groups formed to foment terrorism, because of ‘Cold War tensions,’ if we believe the political rhetoric of the day. Based on the rest of this presentation, I’m thinking you will rightly conclude that assumption a sham, and the true cause lay elsewhere: false flag psychological operations. And should you not naturally so conclude, we will see there is proof it is so.

In point of fact, the processes which will be described, next (in the American model), apply to quite well to the European model. Terror attacks in Europe enabled the same exact processes, and in Europe, I assert, directly helped and led to the formation of the European Community, itself, a key Globalist early goal. Remember that notion as we near the end of looking at the American model, which will bring the point home in unexpected ways, and fully relate the Globalist aspect.

I only thought to bring up European model because it underscores and echoes in reenforcement the discoveries we will find in the American model. Any nation which has in the past or currently experiences terrorism should find these same factors in play, as well; they are portable concepts useful in any governmental environment. But in all cases, they serve only one special interest group, a group present in every governmental environment; Globalists. Allow me to make the case…

In America, terrorism was not even in the American lexicon until CIA began funding, training, and arming radical Muslims as part of their meddling in the affairs of Islamic nations rich with natural resources. Such meddling is a sure-fire way to generate resentment and hatred given their religious beliefs, beliefs which impact political actions in ways perhaps uncommon elsewhere.

I remember, in fact, one of the early newspaper articles (and later, others) on topic having to actually DEFINE the basic terminologies of terrorism in order to write about terror events. The point is, however, that we can lay terrorism at the feet of CIA and American foreign policy (on the one hand closest to our observation), and, as we will see, on Globalism, on the other, less visible hand.

If I were willing to make this blog longer than you would wish it in reading time, I could detail that for you to a level which showed CIA and the Department of Defense, often in alliance with military contractors and Globalist firms, actually imported most terrorists we have heard about acting on US soil (and elsewhere), often aiding in their visitation, training, and financing up to the moment of their terror acts, and even in their escape and any subsequent reentry into country. This I do in my four volume bookset, Fatal Rebirth, with over 1,500 footnotes of factual evidence. Want a free ebook of volume one?

So we see right away that the very problem was created by government. In defense, or rather concealment of the fuller truth, they claimed it unintended, even coincidental or unavoidable, and most of us believed them. But the footnotes I speak of show otherwise, especially in terms of lesser known ‘smoking gun’ events. One test of the sincerity of the claim is the question, does government move to ‘address’ this new terrorism problem as they did in our Control Group? Well, sort of…

The very first effort in response of note was the Patriot Act, a major assault on Constitutionally guaranteed liberties which, they promised, would be repealed as soon as they got a handle on the problem. Tyrannical governments which have evolved throughout history have always got their start with that very argument in justification of repressive actions, creating for themselves that slippery slope of no return. So many times have they had the chance to repeal the Patriot Act and instead elected to extend it, if not add to it, that I’ve lost count. Full grease ahead, downard, Ho!

Virtually all Congressional and White House actions aimed at combating terrorism have followed this self-same pattern: repressive responses which reduce Liberty in exchange for alleged security, a formula known to leave the people with neither, and which instead leads to a totalitarian police state. That’s how the Communist revolution in Russia led to something Karl Marx never intended for his movement. That’s how South American dictators grew their power. That’s how Hitler came to be, and so forth. But it is not how you combat terrorism, for it has not abated, though one may argue there is a current lull. So again, I ask, who profits?

To be sure, not the terrorists, who are guaranteed to generate a backlash against their own homelands. Examine all of history, and it is rare to find an example of the use of terror which resulted in good outcome for the nation from whence attacks originated, and on whose behalf their acts were supposedly committed. Their people suffered, typically through military response, worse casualties and consequence, than did the nation targeted with terrorism. It is a loose-loose situation for terrorists. There is but one exception, to be noted shortly.

Indeed, it is instead the nations targeted by terrorism who benefit. Not the citizens thereof, who bear the brunt of attacks at a personal level, but the men and political forces in power. Terrorism, in fact, gives power to the national government and its leaders, big time. Always; Hitler the perfect example. In international terrorism, the real loosers are the citizens of both nations, and more importantly, all religions who worsiph the God of Abraham; the Jewish, Christian, and Islamic faiths for whom terrorism is a great tool for Globalist (Satanic Illuminati) divide and conquer tactics.

But it is a double whammy for citizens of the target nation, because they not only suffer the casualties of attacks, but the loss of freedoms and rights usurped by a government become more tyrannical. Such benefits are why false flag terrorism is often the tool of one’s own government. Hitler used it, and many Americans are convinced George Bush used it in Sept. 11, and so forth. Fatal Rebirth offers much evidence in support of that belief. Such powers and principalities go out of their way to foment or fake terror acts, even if they have to supply and fund the ‘leadership’ of the terrorists and grow them into a local power — the only terrorists to benefit being those paid and empowered at leadership levels.

Proof, in Fatal Rebirth, shows the number two man of al Quaeda, in fact, to be a double or triple agent working for CIA and the Department of Defense. That’s right, the man who not only planned, but helped execute the attacks on American Embassies, the USS Cole, and the bombing of the World Trade Center, the man who managed to put bin Laden into power and unify other terror groups under his command… was one of our own. And if that were not enough, he held a job with a major defense contractor when not employed by the United States Army.

Is terrorism false flag?

Terror culture growth in a petri dish

The macro illustrates further. Government actions to combat terror actually stimulate it, rather than fighting it. Every action in the Middle East has tended to angrify Muslims even more, making it easier for them to recruit combatants to use against us. Middle East policy continues to be based on previous failures, with no learning curve in evidence. Even those things we would outwardly see as ‘good acts,’ were often deliberate betrayals.

For example, an American company providing schoolbooks for use in the Middle East for very young children used pictures of bombs, grenades, and guns for counting exercises… early enough that by the time CIA was training Osama bin Laden, those children were old enough to be recruited into al Quaeda. Now, once we have invaded and seized control of Afghanistan, the same publisher is providing books with butterflies and Poppy blooms. So now, instead of growing terrorists, Afghanistani youth will grow up thinking it perfectly normal to grow and sell the crops used to make Heroine, those fields guarded by American soldiers as you read.

We continually arm radical groups for use against their own local regimes we conveniently deem ‘repressive’ after decades of working with them as allies and arming them to the teeth in many cases. And then wonder why the radicals soon enough turn those weapons on us, irrespective of if a new regime was put in place, or not. Moreover, any new regime is more dangerous than the old, outwardly, though I maintain it is an intended consequence. This is indeed on purpose of our terror and foreign policies, as reflected by the fact that we keep repeating these mistakes as if oblivious to their cause and effect relationships. There is proof.

Fatal Rebirth, recounts a specific PowerPoint presentation at the Pentagon by Defense Policy Board kingpin, Richard Perle, part of the PNAC (Project for a New American Century) plans to take control of the Middle East, and by capture of the bulk of remaining Oil repositories therein, to control the World. It is all based on concepts espoused by the Council on Foreign Relations and other Globalists, and Zionist interests via a partnership with a joint US-Israeli think tank. It laid out a multi-year, multi-war/revolution plan for takeover of the major Middle East nations in domino fashion, specifically with the intent of giving control over to radicals, specific persons controlled by or partnering with Globalists. Every war in the Middle East, including the more current revolts, was in the Power Point, with more such to come.

For example, Fatal Rebirth shows you that the top two people now running the Afghani government were both former CIA employees who also did work for the Oil Industry, and both were directly involved in trying to get the Taliban to grant oil and gas pipeline rights to American oil companies. Do you honestly think citizens at large in Afghanistan would benefit by and approve of covert CIA/oil industry control of their nation in the guise of a new democracy? This is what I mean when I say outwardly, new regimes may seem less than friendly, but secretly, they remain Globalist puppets to perpetuate control mechanisms there, as well as elsewhere.

Make no mistake. This is not an American plot so much as an international plot by Globalists, the modern Illuminati.

This is also revealed in the referenced PowerPoint, where even darker aspects tie directly to Mysticism, Satanism, and Illuminati principles, matters requiring too much detail to explain in this venue. But I will add that Perle himself has his own CIA front-like operation which works directly with Arms smugglers for the purpose. Stability in the Middle East is NOT a goal, and never was. Such political machinations foster a kind of hidden control of the Middle East through secret alliances with terrorist leadership in exchange for quid-pro quo cooperation (attacks). There is no usefulness for political control plots found in peace and stability.

This covert alliance betrays the very reasons rank and file membership of terror groups join, as well as the greater citizenry and governments of their homelands, not to mention putting at risk the long-term welfare of religious doctrine which often guides their nation and political movements. If the people joining terror groups fully understood this, they would behead their leaders as traitors, and rethink their strategies in realization that terrorism is political control weapon being used against their own people as well is those of the target nation(s). Only the Globalists and their proxies in the involved governments and terror groups, can possibly win.

It deserves restating of who benefits, and how: in funding, arming, and aiding in terror attacks against the U.S. and other nations where Globalism runs rampant, the target nation governmentals (and the Globalist movement) gain two things, and the leaders of terror groups gain prestige and power over their own people for their ‘successes,’ and loyalty and devotion in anger evolving out of backlash-sponsored ‘failures.’ The two things the Globalist proxies gain are an empowerment to further restrict freedoms and wax oppressive through legislative response to terror event ‘successes,’ and validating police state mentality by offering minimal proofs of effectiveness at the few terror attack-sponsord ‘failures.’ Perfect quid-quo pro.

So we see that regardless of if a terror even is effective, or fails, there is win-win for the Globalist and their terrorist cohorts, but only loose-loose for citizens and terror participants, who are mere pawns in a grand deceit.

Ergo, in our comparison, Luke 6:43-44 seem quite appropriate; “For a good tree bringeth not forth corrupt fruit; neither doth a corrupt tree bring forth good fruit. For every tree is known by its own fruit. Figs aren’t gathered from thornbushes, or grapes picked from a bramble bush.”

A need to shift gears: homegrown terror

A kind of proof that such terror is artificially generated and outcome is controlled lays in the fact that if it were NOT so, the focus would remain on the foreign sponsored terrorism, and changes or experimentation in solutions would evolve to some eventual gaining of ground. But, if one is intending a Police State, one realizes that eventually, there will be internal resistance and insurrection forces to be dealt with at some point — given that the only solutions applied are repressive to freedom in nature. There is only so far one can go in oppressive reduction of personal freedoms without sparking resistance.

What is domestic state sponsored terrorism?

The answer? Raise the stakes and ‘broaden the war.’

Image: (click)

Therefore, almost immediately on the heels of the Truther movement, we here in America started to hear about homegrown terrorism, a thing which caused most of us to respond with ‘???’ And from this has evolved a whole new series of staged events to justify the next waves of repressive acts and moves which, like those for Islamic terror, actually tend to foment and generate the very terrorism they would pretend to combat.

These also served to empower the TSA and other repressive acts designed to train us to be obedient to Police State social controls (and the basest of personal insults and groping to which we dare not protest.) This additionally causes us to realize we need to fear and respect our government, despite the fact that our whole form of government is based on the notion that they should fear displeasure of We, the People. Once we have it upside down in our head, it is easier for them to advance with less meaningful resistance.

But then, they had yet to meet the 99%.

But the general strategy creats self-fulfilling harbingers. To worry about and act to ‘prevent’ or ‘combat’ terrorism will eventually spawn it. At some point, you no longer need false flag or even entrapment provocateurs. Fascists want and need internal civil unrest in order to justify further tightening of their power grip, and the unraveling of and discarding of the Constitution (esp. 2nd Amendment) that they may evolve into a truly Globalist entity. Specifically, in America, as I frequently detail in other posts, the establishment of the NAU; the North American Union. An exact replay of Europe, and why that model was briefly examined.

We see signs this is so by the fact that there are separate non terror-related actions which are preparing for acceptance of Globalist programs which can only function if there is a new Constitution under an NAU construct. Agenda 21, Codex Alimentarius, the CANAMEX Highway, United Nations Small Arms Treaty and other U.N. sponsored mandates such as Biospheres, all clue us in to this fact. Our Constitution and, more directly, the Second Amendment make these things almost impossible under our present form of government. They need Martial Law, suspension of the Constitution, seizure of firearms, and a new Constitution with more leeway.

They are easing us into the mentality of Globalist control by selling us on grandiose benefits which seem lofty, but which are truly unworkable and intended to conceal the truth: total control is not freedom, but slavery, and a one World government sponsored by the New World Order is nothing but a mechanism to seat the Antichrist as World Leader — the whole point of the Satanic Illuminati plan to create the NWO in the first place.

So they push for gun control legislation guaranteed to make more militant the mindset of gun owners. Then we conveniently have a wave of gun violence worthy of sparking demands for gun control, a matter deeply tied psychotropic drugs evolved out of CIA mind control research. I don’t even own a gun and yet they make me want to stockpile weapons and ammunition to protect the Second Amendment from panic-driven, unthinking gun grabbers and their Globalist sponsors.

I can only imagine that militia members are waxing paranoid and actively planning for and training for combat with government or United Nations forces. Eventually, someone from such a group will undertake an act of violence to ‘strike a blow for freedom,’ but it will most likely be a false flag event intended to justify efforts to enact gun confiscation. It will, in point of fact, be labeled as ‘terrorism.’ No right thinking group of gun owners would effect a first strike policy, knowing this would be the result, though a paranoidal schizophrenic individual, may, with entrapment encouragements.

They passed the NDAA and the DOD embarked on reckless and provocative mock raids of American cities in violation of Posse Commitatus to make us fear government to levels that may spark shooting of federal agents, soldiers, or cops in perceived self defense, as examined in an earlier post. Again, if some truly paranoid person does not eventually do so, I fear a false flag series of events will be staged. It is absolutely critical that government be able to vilify gun owners if the NAU is to come to pass, lest there be a full-scale armed revolt.

They passed the Monsanto Protection Act, which protects Monsanto from liability and enables their forcing of dangerous genetically modified crops into the food chain (to include meat supplies since corn and soy are fed to animals as well as to humans). This will most surely make militant a number of the millions of farmers who have sued Monsanto, and tens of millions more who realize GMO foods KILL livestock, cause birth defects or sterility, and even cause hair to grow through the digestive tract from tongue to intestines.

Eventually, again as I have posted earlier in full review, someone will get the idea in their head to act out in a violently against Monsanto, perhaps an arson or a bombing, or worse.  When you take away the right of redress through the courts, you guarantee revolt in some violent form. False flag efforts will hardly be needed, IMO, but entrapment encouragements will likely be involved. Fascists NEED such violence to come to power, and once more, they will call it ‘terrorism:’

We must have terror and internal chaos if we are to have a New World Order. In fact, it would seem it is forecast by God to follow a period of great upheaval. 2 Thessalonians 2:3 “Let no man deceive you by any means: for that day shall not come, except there come a falling away first, and that man of sin be revealed, the son of perdition;” In the text of King James, ‘falling away’ means ‘rebellion,’ and the day spoken of is the End Days, the ‘son of perdition’ the Antichrist. Be not deceived by your leaders.

How is terrorism a tool for political control?


In summary, we see the pattern is complete in all instances, following the path of cause and effect which is opposite the model of the Control Group. There is no effort to combat terror, but instead, to generate it.  It is a political control technology, a kind of mind control; it generates fear to enable tighter security control at the expense of liberty, generates resentment to foment new terror threats and, thereby, to repeat the cycle even well after any foreign threats might be abated through takeover of their governments (per the PowerPoint).

There is a great falling away taking place in the Muslim World, as they war amongst themselves for radical supremecy. In the non Muslim World, where radical Islam conducts terror strikes, populations loose freedoms which will steadily lead them toward having no other choice but armed revolt. My prior blogs are full of this warning, and show how perilously close it may be right here, in America. But this is a World-wide phenomenon, as the Occupy movement has shown. We are ripe. We have been deceived by a cyclic strategy which brings us ever closer to boil over.

Such cyclic strategy worked in the Middle East flavor, it worked in the European flavor, and the South American flavor, and it will work in the homegrown flavor (if we allow it). Dumbed-down Sheeple comply with little true objection in the false belief it is perfectly logical to so evolve, not realizing, like the frog in pot of water on the stove, that the political control temperature will soon be fatal and leave them with no way to escape a terrible unwanted and unforeseen fate; rule by a totalitarian police state, and even the Antichrist. Got 666? Almost.

In Fatal rebirth, the cover of the first volume expresses it all this way: Terrorism creates Nationalism (obedience and loyalty to government ­— who’s political leaders benefit from terrorism); Nationalism fosters Capitalism (most notably, the Military-Industrial-Intelligence-Media Complex — who profit from terrorism); Capitalism empowers Globalism ­­— the power elite of the round table groups, the modern Illuminati (who benefit and profit from terrorism); Globalism therefore requires Terrorism — funding it directly, and through their control mechanisms within capitalism, nationalism. In effect, it is nothing more than a cyclic machine, an engine to power control mechanisms, and made up of control mechanisms, cyclic in nature.

I call it the Armageddon Machine. I also call it treason, though that is just the outer shell at the national level. If a shooting war erupts (armed revolt), the shooting should not stop until that machine is destroyed. It will not be a revolution simply to restore the Constitution and reestablish freedom, but to delay or prevent the end of the World as we know it. The modern Illuminati, the Globalists of the World, will be the true enemy, not just some handful of govermentals and their obedient armies. It will be a war with powers and principalities, the truest source and form of terror imaginable.

They exist not just here in our own country, but in other countries, from whence they manipulate and participate in events, here. We will likely have to take that war to them, as well. Any such revolution will need to be enlarged to an internationally scope, or we will never be able to start anew with hope of long success. Emptying Freedom’s lifeboat of Illuminati water has little effect if the satanic hole from which it springs forth is not also plugged.

This is true in every nation. Fascism, the outward manifestation of Globalism, exists in every government to one degree or another. The more affluent and powerful the nation, the more it controls the nation in subversively covert or openly overt ways. It matters not if the country is socialist, communist, democratic, or religiously governed (e.g., Islamic); fascist-globalist mechanisms guide it toward Illuminati goals. As the Occupy movement has illustrated, there is hardly a nation where the people are not starting to awaken to these facts.

The next revolution will undoubtedly spread to be global — especially if it originate in the one nation thought to be ‘most’ free. As America goes, so goes Canada, and Mexico. As America and Canado goes, so goes Britain. As Mexico goes, so goes Central and South America. As Britain goes, so goes the European Community. As they go, so goes the entirety of the former Soviet Bloc. And from there it is only logical that Middle East and Asiatic, and the rest, join in.

Is the war on terrorism fake?


That possibility moves me to employ something from the Prolog of Fatal Rebirth as Epilog, here. Because all men seeking freedom in such a battle will become John Gault in that day. If not, or if John Gault falters and fails, the Antichrist will come to power; we suffer End Game. But if Gault prevails, as in the fictional character’s role in Atlas Shrugged (Ayn Rand), the World will come to a screeching halt on its current course to Hell, and get a second chance, a reprieve, and an extension to our lease on the Planet, though at great cost. From Fatal Rebirth:

Truth cannot live on a diet of secrets, withering within a web of entangled lies. Freedom cannot live on a diet of lies, in the end surrendering to the veil of their oppression. The human spirit cannot live on a diet of oppression, being subservient against the will to that unchecked evil. God, as truth incarnate, will not long let stand a world devoted to such evils. Therefore, let us have the truth and freedom our spirits require… or let us die seeking these things, for without them, we shall surely and justly perish in an evil world.

And yet, in final note for this post, I am also moved to write… as the Bible text indicates, that to so revolt may play directly into their hands. The answer is found in the nature and outcome of any such revolt, especially if Global. The key, I am convinced, is where the revolt starts, when and why, and how it concludes. That, however, will be another blog post. Here, I will simply say this: God has our back, either way — provided we make no foolish mistakes and act without right-use-ness of Free Will (righteousness). Subscribe to learn more.

Has NDAA Made Shooting Federal Agents, Soldiers, and Cops Legal?

No court should ever find one guilty of murder or manslaughter if defending their own lives from murder or kidnapping. For many people, NDAA, and violations of Posse Comitatus by military represents such a threat, and more recently, the Monsanto Protection Act. Therefore, we all might ought to so consider their reasoning; if one man should so fear the tyrannical act of their government, so then should we all.

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Reading this post you will learn…

  • That self defense is a right, perhaps even when facing authorities acting legally;
  • That NDAA threatens EVERYONE’s life and liberty if it threatens even ONE;
  • That NDAA may just have let loose the Dogs of War, one confrontation at a time.

 Can you shoot a lawman or soldier lawfully exercising his duty and still claim self defense?

Are Molotov Cocktails ever self defense? (click) From interesting art collection

In a casual conversation with some friends, an interesting dialog evolved which led to some serious debate and troubling afterthought at the implications of what had been said. It started simply. The topic of NDAA, having come up, someone replied, “Given that the government can simply haul someone away without any form of due process, and vanish them to some hell hole in Cuba or elsewhere for torture, endless imprisonment, I’m wondering…”

He was invited to continue. “Suppose some activist feels targeted by government in heavy-handed ways… someone who has been forced to a paranoiac defensive posture as result… and some Federal agents decide to show up for some reason.  What happens if he figures they are there to vanish him like some South American dictatorship?  What if he acts in self defense and pops the agents before they can do much more than flash their badges. Would that be reasonable self defense? Even if they were only there for some more innocent reason?”

“Or…” added another, “suppose someone started shooting at soldiers or Cops when they engage in these so-called ‘mock drills’ with Police in urban settings… thinking that the soldiers were coming after them or their guns. I’m surprised that pop shots haven’t already been fired.”

And I would have added, if the conversation were taking place today, the day Barry Sorento signed the Monsanto Protection Act… “Suppose someone burns down a Monsanto factory and ends up killing company employees in the process, trying to prevent the company from poisoning everyone with GMO crops, knowing that now, it is illegal to seek redress in the courts for cause? Would that be self defense?”

I know. You are probably thinking what I was thinking. Absurd questions. No one could convince a jury the FBI or the Army was there to kill them, or that the mere appearance of Agents or soldiers was logically a threat, right? Or arson and resulting deaths? And that is what caused the conversation to get interesting, because that very doubt sparked a lot of verbal wrestling in anecdotal exchanges.  We eventually pinned the issue to the mat with a chain of logic which indeed deserves further consideration, here.

“There was this case I saw in the news,” another started, and he proceeded to describe something I myself recalled seeing, once he got out the details — which actually hit a little close to home, as will be explained shortly. “This Black guy, a known felon, used an illegal machine pistol to gun down a bunch of cops who had just busted down his door to serve a warrant. He went to jail, but not for their murder. It was ruled self defense. Imagine. A Black kills White cops in New York, and gets away with it?”

“How is that possible?” asked another.

“I saw a reenactment on TV,” I offered. “He was seated with his back to the door, watching TV in the dark with the volume up. Seven Cops entered the front door after a knock with guns drawn, and shouted for him. He had a fully automatic Ingram there on his armrest with 30 rounds, because some bad cops had already threatened his life. So he instinctively grabbed the gun and emptied it on full-auto and dove for cover, and then made good an escape. All but one of the cops died, despite wearing vests. He feared for his life, and once apprehended, the Defense was able to prove in court a reasonable basis for that fear. They got him on weapons charges, but not murder.”

Then I told them how easily I could identify with that. I recounted true events about a time when my first brush with ‘spooks,’ where some of those arrayed against me were in-place assets within five different local law enforcement agencies. When my investigations got close to unraveling their criminal enterprises, several of them apparently felt their offices gave them cart blanch to ‘get away with murder’ to protect their part in matters. They unilaterally sought to eliminate me, it seems:

a)  a County Sheriff from a distant County threatened me with a gun in a folded newspaper, but was turned away due to a security camera’s presence after I pointed it out to him;
b) a local cop, with a possible helper as getaway driver, carved out a sniper’s nest in a tree on a hill outside my bedroom, from which a laser beam shown through my window as I retired in the dark one night — but I saw the beam drawing down the wall and rolled out of bed to avoid it;
c)  that same cop later used a patrol car as a weapon. He zoomed onto the empty freeway from an entrance as I passed it, no lights or siren (not even headlights, until after he fled the scene). He crossed six lanes at about a 45 degree angle to force me to run me off the road on the far side at a bridge abutment, himself swerving into the parking meridian to avoid crashing himself, because I had managed to successfully evaded a side-swipe and retained control without ending up in the river;
d) two patrol cars pulled me over at an underpass at two AM in the morning, joined by several more pairs of cars both ahead of and behind me; County, local Police, and unmarked units. It was an ambush. But my wife turned out to be present, so they ‘explained’ their stop: “You have a burned out tail light.”  Uh huh.

There were other incidents not quite as scary, too, involving high-speed chases with up to six vehicles, and a series of break ins by men with walkie talkies. So I had every reason to be paranoid about cops in those times. If you want to know how I ended these problems, read my book set, Fatal Rebirth, which also explains why I had become targeted in the first place. But here is the part which directly relates, also in the book: you can imagine my surprise when, after all those threats, two local Sheriffs walked in my front door without so much as knocking.

Had I had a gun sitting on my sofa arm, I would likely have at the least leveled it on them and demand their hands up. Fortunately, there were extenuating circumstances and their purpose was no true threat, and I had no such gun to risk any undue complications. But I would certainly have considered my actions to have been in self defense had it been so. I surely could relate to the story being cited.

With that realization, the dialog between us started to examine the questions asked more carefully. What follows are some additional observations and conclusions which illuminate the matter more thoughtfully, some of which include references to appropriate quotes. Some were offered at the time, others are added here, by me.

1) The Bill of Rights has as its sole purpose the intent, beyond cementing the integrity of government’s covenant with We, The People, that all citizens should be able to pursue happiness, and enjoy life and liberty, and carefully spells out a series of interlocking safeguarding Amendments to insure it so. One has no liberty if kidnappable on demand, and no assurance to life when torture and murder are part of the kidnapper’s tools. While it does not specifically addresses self defense as topic, it was concluded that “the Fourth, Fifth, and Sixth Amendments specifically assure us that the Man who would be King’s portion of NDAA has no force of Constitutional law behind it”, as it tramples on these rights in the worst possible ways. Me.

2)  Seven people felt so terrorized by NDAA’s threat upon their lives as activists and journalists reporting on sins of government that they went to Court. These included Pulitzer Prize-winning journalist Chris Hedges, MIT Professor Noam Chomsky, and Daniel Ellsberg who was a focal point in the Pentagon Papers and Watergate debacles in the 60s, both exposing the Federal government’s abuses of the day. Supporters of Wikileaks were also party to the suit. A lawyer for the group said “There’s a lot of activists who understand how serious this is, but it’s less well known to the general public.”

3) We concur