Blog Archives

There is a Mark of the Beast Implant with YOUR NAME on it


This is an old topic that’s lost traction in the public eye, but in the background, the enemy continues to work ever closer to fulfilling prophecy about Mark of the Beast. Now, employees are being asked to implant themselves in order to get snacks, get through doors, and access workstations and photocopier.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

What you will learn reading this post:

  • what RFID is, who is behind it, and why you should fear it;
  • about Digital Angel, and the bio implant tracking version of RFID;
  • why you should fear it, put away petty ideological differences, and unite against it
  • what you can do to defend against it;
  • the greater strategy RFID is in support of (the ultimate threat). 

 

Invasion of privacy tiny in size, massive in scope

mxkvjtxrwdpybs6zxnuv

Tracking implant quite similar in shape to a much larger one found in my own leg some 35 years ago. State of the art, today, are smaller, translucent, bond with and look like human tissue: invisible to a surgeon and to x-ray. MRI sees them as a blemish. Less sophisticated units without GPS/cellular/wifi capability can be as small as the period in this sentence.

Recent news stories, including a particularly scary one referenced in red text, herein, have forced me to draw upon years of research and dig out my old PowerPoint presentation, 666 Reasons for Smart Dust and RFID Technology, as presented as the keynote presentation at Conspiracycon 2010, in Santa Clara. Any definitive presentation must go back to the beginning, or the dots won’t quite usefully connect. This is going to impact YOU in YOUR LIFETIME. Actually, it already has, and you just don’t know it; the water temperature is slowly being raised on we Frogs, and it’s quite hot, already. Hopefully… we can somehow jump out before its too late.

Smart Dust and RFID tracking technology are quite related, but Smart Dust is not going to be a part of this presentation, except to say that it is nanotech capable of much more than RFID, but it is not an implant. While it is represents its own significant threat to social, financial, and physical security and well being, it is less useful than a tracking implant for the population at large, and cannot play the role of Mark of the Beast. Fortunately, it will not likely ever be used against anyone not deemed a high-priority national security risk. You know, like Will Smith, in Enemy of the State.

digitalangel

The less costly Digital Angel implant

RFID, however, is the very heart of the tracking bio implant, the most obscene version and infamous of which is Digital Angel. That’s the name of a CIA front central in pushing for implants, but also often used to describe their chip, itself as a product trade name. They also offer a wide variety of tracking systems which are non implant, such as wearable items like watches and ankle bracelets.

But we need start with a broader view on RFID to fully understand the greater threat this topic represents. Non implant (and seemingly harmless) versions of RFID are already used to track an endless array of products, and you are quite likely to bring them home every time you go shopping. In retail, it is mostly benign, but it becomes the bedrock of a useful personal tracking system.

What?

Mostly benign? Check this out, an edited and updated excerpt from my book, The Professional Paranoid: How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual (third ed.) Excerpt begins…

 

Smart Dust, RFID, and the Mark of the Beast

 

i want you to consider the first letter of this sentence; the lack of capitalization is not a typo. I wanted to draw attention to the dot above the letter ‘i.’ There is a reason… there is an RFID invasion taking place, and some of the invaders can be just that small.

implantedhandThe Bible tells us that in the End Times, there can be no transaction between persons for goods or services unless both parties have the mark. Revelation 13:16-17And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: 17 and that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.”

Though the Mark of the Beast is thought of as being the number 666, that is not quite the case. That is the number of the Beast himself (the Antichrist) in numerology evaluation of his name. The original words used in the original Greek texts of the New Testament can be translated to mean ‘insert’ as well as ‘mark.’ Thus there are growing numbers of people who think that some form of Digital Angel bio implant will be the actual marking device. This section will illustrate that likelihood and educate you on just how close to that day we may be.

This will make sense later: implants are the mark for the hands of peons, and marks on the forehead are the mark for meons.

What is Digital Angel? It is a firm which is known for a series of tracking products, including bio implants, all based on RFID technology. Simply put, it is a passive device which, when scanned with a low-energy RF signal, responds with a signal of its own, broadcasting a unique identification number or other data. Early versions of this are still commonly found in clunky removable/disposable merchandise security tags installed by retailers which can trigger alarms when shoplifted goods exit the store. In the modern version, the product manufacturer includes the chip which enables the same feature without the retailer needing to do anything but take delivery of the goods.

There is a whole emerging industry based on RFID, and it, in turn, impacts on almost all other industry sectors. The industry is driven at its heart by the military and intelligence community with the help of corporations who are part and parcel of the NWO elite, as defined by the makeup of their directors and other corporate leadership or ownership. What they want to do with RFID is mind boggling, as is what RFID is capable of in terms of invasion of privacy. To start, they want every single product manufactured and sold to have its own unique RFID tag, and are pitching it to manufacturers and retailers as the next evolution of bar code.

Similar chips in credit cards technically allow purchase without the need to remove the credit card from the wallet, though they currently require us to scan the card. But all that is really be needed is to specify which of several credit cards we might be carrying was desired to be used. That could be verbal, by touch screen, or smart phone application, which avoids producing the card. RFID is also being built into phones for comparison with credit cards nearby, to allow verbal telephone purchases to be made without the need to verbally confirm credit card details. The bio implant is ‘sold’ to us as a convenience to replace all of that (examples to follow).

That is the ‘convenience’ under which it will be sold to us in the retail world, and if a cash register can scan these chips, so can the device at the door looking for merchandise which had not yet been purchased. Why stop there? Anyone can put small and hidden scanners (with or without cameras) anywhere, and for any reason… such as at every doorway where some form of security or tracking feature is desired. By scanning RFID credit cards, the identity of everyone passing through is logged and time stamped without their knowledge or participation. Actually, any RFID tag on your person can do the same thing (it is being built into clothing), because your identity can be associated with its purchase. And that is just the beginning. Ergo, the national ID ‘Real IDprogram is based on RFID, and eventually, the human body itself will be its on RFID ‘ID.’

exploded$In the very near future, it will serve law enforcement. At the scene of the crime detectives will often find discarded items potentially belonging to a suspect. They analyze these for clues, such as fingerprints, to build a list of suspects. In a world of RFID-only purchases, every object also identifies who purchased it, when, and where (often also useful clues in prosecution). What about cash purchases to thwart RFID records keeping? Not a problem. You didn’t think for a moment that those little slivers concealed in the left-hand portion of your new money was truly just a counterfeiting deterrent, did you? Put anything but a $1 bill in your microwave oven and it will explode when operated… a trait of RFID. Moral of the story; don’t casually discard product wrappers, especially if you think someone might use them to implicate you in a crime; burn them.

Unknown-1.jpeg

Actual TIAO logo

But it gets worse. For any of this to work smoothly, somewhere, someone needs to catalog and keep all those transaction records and make them available for government’s needs. Enter the Total Information Awareness Office (TIAO), AKA the Terrorist Information Awareness Office. This was modeled after an expanded version of FINCEN (Financial Crimes Enforcement Network) capabilities (check this out); and was MILITARY led and very Intelligence community friendly Defense Advanced Research Projects Agency (DARPA) project. I’ve seen the original DOD call for papers and the final description of capabilities and intended uses for the TIAO, and it has little to do with targeting terrorists. Instead, it has to do with capturing records of EVERY transaction between EVERY citizen and business, as well as the passing of ANY citizen through ANY doorway in selected locations. Further, it will track vehicles past checkpoints and can log other kinds of interactions or transactions between people and each other or real world objects (i.e., machinery, vending machines.)

tiaomap

Everything in this image under Transactional Data, and all the little colored storage systems (the cloud), and Corporate Memory, comes largely from backdoor access to RFID-based data. The red Privacy and Security dotted line was added AFTER privacy concerns, to imply a search warrant would be employed (untrue). Intel data would include access to NSA’s massive global wire tap, as well as all of the other 16 spy agencies of the U.S., and those of friendly nations.

Update: TIAO ‘went away’ due to public protest and ‘too many questions,’ including “Why was the head to be a convicted criminal participant in Iran Contra, an ex Naval officer of significant credentials tied to CIA and the Pentagon, John Poindexter?” And yet, it did not actually go away. It has instead been quietly replaced with the OIA; the Office of Intelligence Analysis, another new super-secret spy agency operated out of Homeland Security. They, in turn, gently established ‘Fusion Centers.’

Fusion Centers are ‘sold to us‘ as a happy pill having nothing to with dark deeds, and as being established by cities and state governments in order to share information between partnering civic and federal agencies, local businesses and NGOs for improved security against terrorism and ‘other threats.’ In truth, they are hotbeds of social spies who operate external of the centers within those groups of partners on behalf of DHS and the intelligence agencies. It is often a source of organized gang stalking, and a collection point of ‘data’ about ‘other threats.’ We are the threats, and the data is obtained through backdoor access to the ‘data’ about us found in participant computers, including RFID transactions, security and traffic cams — and via gang stalking and the associated psychological profiling. It is a kind of fascist Brown Shirt group without the uniform, replaced with a smile and handshake… and big eyes and ears.

And worse still. If government decides it wants to know even more about you, a black van can drive by your home and scan it to collect the sum total of all information from all RFID tags (or Smart Dust) found within the home. They will quickly know EXACTLY what is in your home, where you got it, how you got it, and when. This gives field agents the ability to gain access to that kind of information in a very focused way instead of having to run tedious database searches which would necessarily include bureaucratic handling and, perhaps, the dreaded and feared need for a pesky warrant.

And, worst of all, the ultimate expression of RFID privacy abuse is to put one in the human body, with or without the target’s knowledge. The question is, how close are we to this nightmare, and what can we do about it? The answer is, we are frighteningly close, and in fact, it has already been happening for decades.

  1. RFID is already being put on thousands of products you buy today. Even common mundane consumer goods like Gillette razors and Max Factor makeup have been ‘chipped’ with RFID. Walmart pioneered its use, and used cameras (which opens up a whole new personal security threat for the chip) to track customers through the store, and record RFID transactions. There are also shopping carts with built-in ‘product information displays’ which can track every item you handle while in the store, and profile your shopping experiences over time. You can bet there were cameras connected to scanners scattered throughout town by CIA or the military (Walmart Board included ex military and intelligence agency types at the time), as well, to see where else you went and what else you did, to test it as a spy tool. Many manufacturers have placed orders for hundreds of millions of RFID tags and millions of scanners. They have to be in use somewhere.
  2. Many tens of millions of RFID equipped credit cards have already been issued. You can spot these visually if they are transparent, or if the credit card number has a lot of zeros in the middle, or a gold foil rectangular emblem about ½ inch square. Though sold to us as a ‘security feature,’ they are the opposite: content can be stolen by proximity scanning without your knowledge, and then the RFID and card can be cloned by thieves for use at your expense. I’ve caught such a thief scanning at the doorway to Walmart. He was pretending to be making a phone call… pacing back in forth in ways that maneuvered him in behind victims. But there are also home-made scanners which can scan from hundreds of feet away.
  3. Most cell phones use SIM card technology incorporating RFID (the SIM card, more than the phone, identifies the authorized user). This is often used in phone apps to facilitate cardless credit transactions (i.e., iPay)
  4. Virtually every maker of cash registers and point of sale systems is developing low-cost attachments to existing cash register and credit card scanners to sense RFID, as well as whole new systems to replace the old with simplified operation and reduced cost — this allows self service checkout and the elimination of the sales clerk, so it will be promoted as a ‘cost reduction’ tool. But don’t expect to see savings passed on to consumers. Money already has the needed strip in place and it likely has been RFID capable all along without our knowledge.
  5. All employee scan cards use RFID. Hotel room key cards use RFID. Federal Express, UPS, etc., all use RFID shipping labels. Monthly bus passes, season tickets, and the like, also employ RFID.
  6. Pets and livestock have been being implanted with RFID for decades. Within the last ten years, thousands of people have, as well, largely through efforts to chip children ‘to protect them against kidnapping.’ There are nudist resorts where you can volunteer to have one injected to represent your credit card information for purchases at nudist-camp points of purchase for services and goods. Otherwise you must carry your wallet or purse and keep an eye on them. What fun is that if trying to commune with Mother Nature and your bank account? In July of 2017, a company announced break room vending systems and software to allow implanted employees to access snacks without money. Learn more here. Soon, you will see implants being promoted for use with parking meters, fast lane highway access, and on, and on, and on.
  7. Bioimplants can easily be implanted in a human without requiring their knowledge or consent. All they will know is they woke up with what seems to be an insect bite. This can be done while they sleep via covert entry of their home, or at distance with a special pneumatic sniper rifle.
  8. According to several news accounts, countless livestock has been slaughtered with the implants still in place, their meat ground and sold, and consumed by unaware purchasers. Despite massive recall efforts, not one package of meat was recovered. RFID implants are made of glass, plastic, and poisonous metals.
  9. Some school systems are requiring children to use their fingerprints with scanners in order to get their school lunches. This is bad enough, but the firm that makes the equipment used also offers an RFID attachment in lieu of the fingerprint scanner, and mentions implants in their literature as an option.
  10. One maker of RFID, in marketing it for aircraft part identification in an assembled aircraft (the goal being to track parts which might be subject to safety recall, and a feature useful in crash investigations) chose a trade name for their RFID of ‘The Mark.’ The part number when Boeing Aircraft orders it from the maker is alleged by employees to be 666.

 

What can you do to defend against it?

Aside from sharing this post, not much. Be very vocal and protesting at every opportunity any discovered use of the technology. You might demand RFID tagged merchandise be detagged or the tag neutralized before you leave the store, but that would make you look crazy. However, organizing endless group protests can have an effect. Any firm that covertly uses it should be razed to the ground (sued into oblivion for violation of privacy). Any government office holder should be kicked out of office if they support the technology in any way, shape or form, or simply fail to oppose it. In my opinion, preparation for revolution should be made if these efforts fail, because that would be the only remaining recourse prior to full enslavement.
Back to the bible. In The Book of Revelations where the reference originates, there is also one more clue RFID will be the basis of the Mark of the Beast. One at a time, the Seven Angels open the Seven Seals to unleash seven deadly punishments upon the unfaithful on the earth. One of these states that those with the Mark of the Beast will suffer severe pain and many will perish from it. A subtle clue.

As it happens, there is one feature about RFID which must be told to make sense of this, and it suggests how to thwart the tech: if exposed to high energy radiation, RFID heats up incredibly and explodes. A burst of high energy radiation levels will literally destroy it… such as an intense solar CME blast (Coronal Mass Ejection – a high RF/EMF energy field). At this time, I cannot tell you how to generate such an energy and safely use and aim it, but it has been suggested by other experts than a ten second microwave oven exposure should be sufficient. Now if I just had a portable unit I could waltz through the retail Aisles with… set to ‘Burst’ mode… but you can bet there will be or already are laws written to make that illegal.

But there is something simpler which also defeats the technology. Metal shields the signals. Thus wrapping a National ID or an RFID equipped credit card or object (i.e., chipped hand) in aluminum foil defeats the device’s ability to communicate. When the revolution comes, if that is our future, there will be portable devices which anyone could build from easily obtained parts to detect or destroy RFID at will. I fear the day this is needed. I also say woe to those involved in the use of RFID should it come to that. End excerpted material.

There is one other thing you can do. The response time for reading a scanned RFID is very brief. There is a ‘failure’ in reading called ‘tag collision.’ When too many RFID tags of the same frequency (usually dictated by type of tag/use of tag) are present in a confined space, the scanner can fail to capture the data, or capture the wrong data. Therefore, if one were to collect dozens of RFID tags of various types and put them into a bag to carry along with them, it would effectively become a scanner blocker. Keep all your old canceled credit cards in the same wallet as your valid ones, sandwiching the new between the old, and pull them ALL out to select the one to use, holding them all in the same hand to swipe.

I also advise against Smart Appliances, and smart meters. RFID is at the heart of interaction with Smart Meters, which in turn is its own invasive privacy and stalking threat (widely experienced as a directed energy weapon). Worse, it is tied to mapping of the interior of your home; the floor layout, location of furnishings and other appliances and electronics, smart or otherwise. Programs are being developed to allow such mapping information to be available to manufacturers of smart devices and used to market to you based on use of not just their product, but all products. Naturally, all that can be accessed by government, as well… and hackers partnered with burglars.

I also suggest taking advantage of these resources as contingency against the worst:

How to war with the NWO; How to survive the NWO; and Localized defensive strategies.

 

The history of RFD tells all

It starts with Howard Hughes, though he was a victim, not an instigator. Most of us are familiar with his rise to being the richest man on Earth in his day, and his fall due to a mental condition which impacted his ability to interact with people, and life in general. The untold story is that once debilitated, CIA agents and Mormons (CIA likes to recruit from Mormans, and Masons, because such cults have secrets and know how to keep them through compartmentalization and other methods) became his ‘caregivers and managers.’ He trusted them, and they took advantage.

Once in control, his vast resources were diverted to CIA control and application. Hughes Shipbuilding built several spy vessels including the Glomar Explorer and companion vessel, both designed to retrieve sunken Soviet Subs. Hughes TWA aircraft and assets were diverted to form (over time) three different CIA ‘airlines,’ including the most recent, Evergreen Aviation, which wound up acquiring Hughes’ Spruce Goose for its museum. Hughes Tools, the financial cash cow of Howard’s meteoric rise, a maker of drilling systems for the oil industry, would eventually become Enron, and we know how that wound up vanishing billions of dollars into thin air. The remnants of Enron’s data processing center would be applied to CIA fronts engaged in porn (to profile user sexual preferences for possible blackmail application), web site hijacking (I was a victim of that, documented here), offshore gambling, and 4-1-9 scams (Nigerian money investment scams).

Then there were Hughes operations which would evolve to serve CIA’s efforts in Political Control Technology development and application. It starts with Hughes Aircraft’s electronics division, eventually become Hughes Electronics, which invented the RFID concept. These were originally used to identify and track cattle, marketed through Hughes Identification Devices, but also found their way into humans involved in early (late 1940s) non consensual CIA mind control projects and Atomic Energy Commission radiation experiments on civilians. I wound up with one in my leg, when as a child, when I was injected with a radioactive substance in Yakima, near the Hanford Energy Reservation.

From Hughes, the chip was migrated to Destron Fearing, and from there to our friend, Digital Angel. We will come back to them. More CIA fronts or partners duped into participation would be created in America and globally to market implants for humans. They do big business in ‘police state’ countries, often for the purpose of chipping persons in the criminal system. Of course, it is privately understood they are good for tracking anyone you wish to track, such as embarrassing political activists and whistleblowers.

LocatePLUS is a Homeland Security created and CIA infected front which pushes the implant in America and advertizes that it maintains 12 billion records covering 98% of the American Population. The DHS/CIA knows all about you and is making money selling you to anyone with the money. In America, the front markets to FBI, ATF, DEA, and 2000 law enforcement agencies, primarily non implant products such as ankle bracelets.

In Europe, the front Worldwide Information is a LocatePLUS spinoff doing much the same. Global reach far outstrips American consumption (there are a lot of fascists out there, in almost every government system): Universal Microchip in Italy, IDECHIP S.A. markets in Ecuador and Brazil, Solusat Medica in Mexico, Scientific Innovation and Integration (SII) in Korea, Taiwan, China, and Japan, Inforlexus Inc., for Malaysia and Indochina, Biometronix for Germany, Glezer Technology in Israel, and Cybertek in Puerto Rico. This list continues to grow; the Swedish firm Biohax International is behind the implant for snacks story.

The primary American front (a sister to LocatePLUS), Metro Risk Management Group, sold $13M worth of chips over 5 years to the Bonneville Power Administration (to track fish, officially). BPA is a Department of Energy firm which had in the same time frame been in the news because of high-tech spying operations having been detected taking place in their facilities… while BPA and Enron were significant others in the same bed. The U.S. Military contracted for $24M, while they sold $1M to private citizens wishing to chip their children or themselves. They sold $7M to the greater Intelligence community, and $73M for ‘internal use,’ which is to say, CIA, itself. Such orders are a combination of implants and scanner systems, both portable handhelds and installable units for security gates and doorways. A typical order might consist of hundreds of thousands of devices and a thousand scanners.

All this data represents 2005-2009. Sales are increasing over time, but increasingly hard to track for a variety of reasons, including corporate name changes, mergers, spinoffs, and other tactics often seen in CIA fronts trying to be a moving target. And the implant business is a target by activists and activist organizations worried about invasion of privacy and civil rights, to say nothing of some kind of New World Order nightmare ending with the Antichrist at Armegeddon. And, they are constantly being sued in court for a wide variety of reasons.

And this brings us back to Digital Angel, the key point in the bioimplant tracking food chain. As stated, a lot of business names and hanky-panky tactics are often employed by CIA fronts, as outlined in The Professional Paranoid, a privacy/security how to which, in covering that topic, helps readers to identify who is really causing the bumps in their night, should they be so unlucky (as was I). So let’s take a look at Digital Angel, again based on older ten-year research (I’m not going through that, again).

Let’s talk corporate names as clues: though most commonly known as Digital Angel (Florida), also DBA Verachip, they were formerly Applied Digital Solutions… which was formerly Applied Cellular Technology (because RFID tracking often relies on cell phone services)… which also used the DBA ACT Financial… formely Axiom Information Technology… formerly Axiom Computer Consultants… DBA Great Bay Acquisition Company (those all based in Wisconsin/Minnesota). Digital Angel divorced itself from Verachip (being sued out of business), but then Verachip merged with Steel Vault… which became PositiveID, which then in turn tried to acquire Digital Angel… which also operates Signature Communications in the U.K., where it might (conjecture based on company data and ties to CIA fronts) enjoy backdoor access to encrypted government radio communications, the assumption being that receiving units employ an RFID chip which, like the cell phone paradigm, authorizes descrambling of transmitted data, as well as authenticated identification of the sender and recipient. Finally, Digital Angel, also being sued and hounded, ran off to the U.K. where they now promote themselves as “a developer and publisher of consumer applications and mobile games designed for tablets, smartphones and other mobile devices, as well as a distributor of two-way communications equipment.” But they still push implants, and through Signature, the two-way communications gear.

Let’s talk facts as clues: Digital Angel does not make RFID. No. They merged with Destron Fearing, the actual imputus of modern RFID systems claiming to have invented RFID technology. No, that was Hughes Aircraft’s Electronic Division. Digital Angel at one point claimed to be founded in 1948. No, but Destron Fearing was founded in 1945, did the RFID for cattle thing in 1948. No one cited so far, actually makes RFID tags, the heart of the implant. No, that’s Raytheon, a military/CIA contractor… formerly known as Hughes Aircraft. That makes sense, since it is the U.S. Army which tracks all RFID tag assignments (unique tag number assigned to (whatever) user data). Meanwhile…

Let’s talk connected dots as clues: CIA’s HHMI (Howard Hughes Medical Institute) is steadily pushing for the use of RFID in both implant and non implant versions to hospitals (49 major facilities as of 2005, more every year) and the medical industry at large, and Hughes Satellite and Hughes Communications services RFID tracking systems via cellular/wifi. How do I know this? By temporarily working for both Hughes Satellite and a major cell phone carrier where I was able to verify specific cell phone traffic and routing of tracking data. The phone account was tied to an individual which shared an address with one of the above firms (how I found it). And that led to finding dozens of such phones for more firms. And even more looking at other fronts known to me outside of the RFID playing field. In fact, such details are part of my evolving insurance policy against ‘accidents.’

Let’s talk key people as clues: Another CIA front trait has to do with who is involved in the corporate structure. At ADS (old data) Dr. Richard Seelio was Director of Medical Applications. Really? He is a Bariatric Surgeon, so he knows how to suck fat out of your thighs, not exactly as advertised by his title (a typical front man). The Senior Vice President was, prior to installation, a small time lawyer (a cutout man). A look at the Board of Directors of almost many of the above firms variously will find persons of wealth and influence, persons with backgrounds or ties to military/intelligence (or both), and persons with membership in the nefarious NWO Round Table Groups, such as the Council on Foreign Relations, Trilateralists, and the Bilderbergers. This is a kind of corporate structure is a fingerprint that lets anyone track just who are the trackers.

The other shoe drops

As I wrote this, I was listening to radio, where Clyde Lewis more thoughtfully reviewed a greater enveloping matter on his Ground Zero show, things equally important to understand, and far more sinister. Listen to it, here. The short of it is that chipping people is not just about spying on them, it is about control. It will enable a complete rewrite of social, political, religious, and economic existence, and the script is already being followed step by step, RFID again at the core. You didn’t think ‘Global Warming’ was about weather, or that Transgender Issues were about rights, or that Terrorism was about political or religious ideologies, did you?

It is, all of it, in support of ‘a brave new world’ which the New World Order seeks to establish, a world where there are only three classes of people. While my friend Clyde did not use my labels for these classes, he did so describe: there will be Meons (a Club of Rome/Bilderberger label based on an ancient word for someone worthless, less than a peon ­– a ‘useless eater’ who will not likely survive the NWO on their own, and who will be made to ‘go away’ in time); Peons who will be usefully employed to run the system (government, business) for the elites; and the Elites, the 1% of the 1% who will rule.

Clyde explains how the Middle Class will be eliminated, divided between those willing to implant and deemed useful (peons), and those unwilling or deemed useless (meons), and the a host of new topics and proofs you have likely never heard of, and more. Naturally, the upper class will be peons, and the lower class, meons. Bio implants (part of Transhumanism) are key to all these plans. You had better understand all of this or you won’t be able to cope, and likely, will end up in the red list for population reduction.

 

12 Frightening New Questions Illuminate the Dorner Urban Legend


Just when you think you’ve heard everything about a major news event which suffers questions pointing to a conspiracy, someone figures out or finds something others have missed, or failed to see in the same light. I like being that person.
 
By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice. 
 
12 new questions/veiwpoints addressed in this blog:
•  About the validity of physical evidence deliberately left at a murder scene;
•  About the validity of the ‘mental torture’ call to Randal Quan;
•  About the death of innocent bystanders;
•  About using a hotel on a Navy base;
•  About the million dollar reward?
•  About footprints in the snow, and the death of the one man with the answer;
•  About the ‘chance find’ by a citizen and a news crew of a James Bond-style assassin’s weapon;
•  Several questions about the Death of Chris Dorner.

Why Chris Dorner was murdered and framed

Questions?

mythbustThe Web is awash with questions and commentaries doubtful of the Dorner shooting, my own included. In my earlier posts, I’ve already addressed some of the same questions, and yet, have also come up with some new ones, or new insights upon existing questions. They are presented here in hopes they will help further illuminate the matter toward a better grasp of the truth — which sounds more and more like Dorner being set up as a distraction or cover up for something larger, something with Federal fingerprints.

The first postDorners ‘Manifesto’: Manufacturing a D.B. Cooper-ish Urban Legend?, analyzed Dorner’s alleged ‘Manifesto’ and showed a long list of reasons it appears fraudulent, whole sections of it written by someone else, thereby validating concerns that Dorner was a patsy and a conspiracy was in play. 

The second postDorner, the Urban Legend: Implications Behind a Fraudulent Manifesto, took a much closer look at the crime than most online treatments have employed. It provides deep-background information which suggests Dorner might have been a mere playing card in a high-stakes military or CIA project, possibly pre staging for a Martial Law sponsored coup. Ergo, the Ace of Spades graphic.

If you have not read these earlier posts, and are not comfortable with accepting the above descriptives of their content as viable concepts or factually accurate, please read them before reading this piece, or it will waste your time, as your basis of understanding will be in the absence of key information. Also be sure to review the excellent and revealing ‘related articles’ at the bottom of this page — especially the video interview relating Chris Dorner’s contacting alternative media and essentially confirming many of the points I’ve been making in my posts.

Was Chris Dorner a pawn in a Federal Plot?

Questions which point the way to understanding, even without answers

DornerMyth1) Dorner’s gear found at the first murder scene: Why would Dorner choose to leave Police equipment traceable to him at the scene, when said equipment would be valuable to ongoing operations if intending a killing spree? Curiously, there is video evidence that he did this. Someone who looked like Dorner, at least at distance in the poor quality view, in a vehicle which was apparently his (no definitive statement on that in reports, for some reason), is caught on a security camera dumping the items, including his badge and police uniform. Why would Dorner do this in front of a visible security camera in broad daylight? The murder took place at night time (see the news video report, toward end). There would have been cops already swarming the area, making it a high-risk adventure.

Why would Dorner even leave the gear at all? It would be valuable in any further covert applications if he was intent on continuing the alleged killing spree. It can’t be to deliberately ‘prove’ to Police it was him responsible: the call to Quan, a mere fingerprint, or a call to Police would have served as well and would be far safer. But it does make sense if someone was trying to frame him, sending someone who looks like him enough to pass for him, especially if borrowing his car to do it.

2) The alleged call to Quan by Dorner: If Randall Quan represented Dorner at the review hearings which resulted in Dorner’s dismissal, why is it only described in media references as a call from someone ‘claiming to be Dorner?’ Other qualifiers like ‘may have,’ ‘allegedly,’ etc., were almost always used. Would he not know Dorner’s voice?

Bear in mind that where a caller deliberately makes rude and insulting, emotional jabs at one’s psyche, the resulting change in mental state (anger, mostly) will deter one’s perceptions and judgement of such things. To me, it sounds like Quan was enough of a professional that he at least recognized the possibility of the voice not being Dorner’s, and must surely have couched his statements accordingly, else why did LAPD statements and media originally do so?

3) The death of innocent bystanders: If killing Monica was because she was family, as claimed by the manifesto, why kill her companion? Dorner should not have known he had proposed to Monica only days earlier, and Dorner has been repeatedly cited as taking care not to harm innocent persons. Likewise for the trainee with Crain. Why harm those men? Might it be because both men could have seen who the real killer was, a risk addressed by a killer who could not afford anyone saying it was not Dorner?

Kieth Lawrence, killed with Monica, can be seen wearing what appears to be a Police uniform in some online photos, but he was not a Cop. He (article) had been a security guard at a Universtity, and had undergone trainings with Ventura County Sheriffs and Oxnard Police, but should have been seen by Dorner as purely a — he was NOT wearing his guard uniform at the time of the shooting, and thus was unarmed. Many accounts say there is evidence (?) Dorner stalked them both for some time, so surely he would have known Lawrence was not with any LEA, certainly not LAPD.

It is also interesting that both were shot multiple times. In fact, so many that reloads would have been required, or for gun grabber’s edification, a high-capacity magazine was used — or — unless there were two shooters.

5) A hotel stay on a military base: Why did Dorner go the Naval Base at Point Loma (San Diego — see timeline)? It was confirmed that he had been in a hotel ON BASE and the base went into lock down when someone reported seeing him. Could it have been an attempt to meet someone who might provide him with evidence he was being framed, or something useful as a blackmail insurance policy to force (someone high up) to call off the dogs?

6) The million dollar reward: Why (and how) was a $1M reward arranged for so quickly, and who really managed that hat trick, when normally, $20K is the most anyone ever sees pinned to their name, and only after much time has transpired since the manhunt began? Only bin Laden and associates have, to my knowledge, enjoyed that level of value on a wanted poster, and so quickly. This article seems to have a convenient but implausible answer (just above second video); a collective of leaders from the area including businessmen ‘came together.’ Really? When does that ever happen, elsewhere?

7) Footprints in the snow, and the death of the only man who knew to track them: How convenient is it that the final standoff comes to pass because two officers ‘track him’ to the cabin… and one of them is fatally shot to death — a super-cop sent on Dorner’s chase like a bounty hunter? The other was wounded. Jerimiah MacKay, killed at the cabin, was a 15 year veteran of the San Bernadino’s Sheriff Dept. His specialty was going after stolen cars. He was on Dorner’s case from the outset, but fared not better than any other Cop. But in less than four hours after a truck was reported stolen by someone matching Dorner’s description, he and his partner were tracking footprints in the snow to the Cabin. Excuse me, but how did they know to track these particular footprints?

They had NOT found the stolen truck, so how and why did the presume these to be his footprints, or even know they existed, and where? NO ONE had ever seen Dorner alive near the cabin, nor any other person who might have been responsible for the footprints they choose to follow, nor, for the matter, whoever really fired the shots that felled them. Next came an swarm of lawmen and choppers, and the Cabin was set afire. Restating the question more pointedly, how did the dead Sheriff know to follow the footprints, unless there was some foreknowledge; a conspiracy afoot requiring Dorner’s body to be found cindarised? Now that he is dead, we may never know how he knew how to find those footprints, and why he knew to follow them.

8) The finding of a murder weapon by a citizen and news crew: A man reportedly found a crashed car (not the truck allegedly stolen by Dorner just prior to his being cornered) near the cabin, and nearby laying in the open in the snow at the roadway’s edge, a Walther P22 pistol with silencer and flashlight (a James-Bond style, professional assassin’s weapon). Coincidentally, a news crew happened along just then, as well? And they thought seeing a man standing at the side of the road was obviously newsworthy enough to investigate and interview?

This is three days after the Police the Cabin was fired and Police had swarmed into the area, and the day after concluding their investigation in the area, opening roadblocks to the public. Anyone see red flags here? If not Dorner’s truck, who’s car was it, and who’s gun? If Dorner had somehow stolen a car after stealing the truck, why has it not been reported? The car renews interest in and underscores the question about how MacKay choose to follow footprints, and where they originated, not just where they led. It is also raises the possibility that whomever killed MacKay was not Dorner, but a professional assigned the task.

9) The death of Chris Dorner: Was Dorner dead already, killed at some point well before the cabin event? It would be easy to have staged the events leading to the fiery conclusion, especially if one man knew to follow the footprints to the Cabin preprepared with Dorner’s body and rigged with squibs to simulate gunfire. It would only take a sniper to eliminate that man, the one possible person who might know the truth or unknowingly expose it if allowed to live, perhaps the only one outside of any inner conspiracy circle within LAPD or CIA/military camps.

10) The tale of four sets of ID, three wallets: How did the wallet survive the fire, and how many wallets and ID sets did Chris Dorner own? There had already been multiple reports of his wallet and ID being found, and yet they also find it, in tact, with readable plastic ID, in the ashes of a building where nothing else survived the flames. Add in the discarding of his badge as yet another form of ID. I DO NOT BUY IT.

That is specifically one of the oldest tricks in the intelligence community’s playbook for framing someone or making it seem that a body is someone it is not. Yes, it can also be used to misdirect authorities as to your true presence or whereabouts, but you only need employ that gambit generally once, and even then, only when making a major tactical move (like an escape, or an assault). Four times? Not synchronous with either escape or subsequent assault? And so close together in some cases, essentially wasting valuable ID resources?

11) The body of Chris Dorner: Is Dorner even dead, at all? If it were not for the phony ID find, I might not be moved to ask. But it implies official deceit. So, is he alive and vanished by virtue of NDAA style actions by our acting President or a unilateral military decision, or has he managed to pull off his own escape plan? I doubt the later, but even the Coroner’s report of dental matches, or DNA match will not be proof enough to answer the question; given the weight of material pointing to conspiracy, a fraudulent Coroner’s report is simple to arrange if CIA is involved, and easy enough for lesser groups.

12) The fire and ‘suicide’: Why did, per police radio traffic, LEA deploy multiple fire-starting ‘burners,’ incendiary tear gas canisters, if not intending to start a fire? Why did they turn away fire trucks with a decision to wait until all four corner’s had caved in once learning there was a basement? In almost every use of this kind of device, a fire erupts if it lands on or against anything flammable. Using multiple burners insures a fire. Was it to make sure the only way to ID Dorner’s body was dental records, the easiest of all to tamper with when officially faking someone’s death? Was it to insure that Dorner never had a day in court where he could expose crimes by LAPD or others well beyond those already known?

Bonus Question asked by others re Media complicity: Why did media volunteer to black out the Dorner event already underway? Choppers in the air pulled away at Police request issued thru FAA (suspicious and completely unprecedented in its own right), because Police claimed ‘news coverage might tip Dorner off.’ Excuse me, but the gun battle had already ensued, and the cabin was already surrounded. Police positions were not clearly revealed by aerial video because of dense trees about the cabin and the distance and angles involved. So what was the threat, again? If Dorner didn’t already know he was surrounded after engaging in a gun battle, he was not likely to be watching TV to find out.

And how do you get a TV signal way out there to the Cabin, in an isolated valley, when the cabin had no TV aerial visible, and the nearest broadcast station carrying feeds were in LA, 67 miles away on the other side of mountains forming the valley? What was the real reason Police wanted no one to see document they were doing? Why did media comply, knowing their signal was of no value that far away? Why did FAA aid in that cover up?

Why was an assassin’s pistol found by civilians near the cabin after Police finished investigation?

Summary

All these question and nagging discrepencies are the stuff which makes for an Urban Legend. Remember, an urban legend is always based on some kernel of truth, and yet is almost never truly what it seems on the surface. People tend to believe the legend, and fail to ask the right questions even if choosing to look closely. Dark lies need to be exposed and examined carefully in the light.

In looking closely, ALL of the above questions imply their own answer: a conspiracy, lies, and intelligence community tricks being employed. Whether those tricks are by CIA, military, or LEA application is something only the answers to the questions will reveal. But you (in bothering to read this), I, and other ‘conspiracy theorists’ seem to be the only ones asking questions. Given the obvious nature of many of them, that is its own clue something is wrong, something quite related to the bonus question. Anyone not seeing that, is not paying attention.

Turn on the damn flashlight!

How did Police find Chris Dorner?

Dorner, the Urban Legend: Implications Behind a Fraudulent Manifesto


What would it really mean if Dorner did not write the Manifesto claimed for him? Like many bumps-in-the-night mysteries in our national consciousness… the answer may lead to CIA and the Military.

By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice. The image is specifically excluded from permissions to duplicate: see text with image.
Dorner, the Urban Legend: Implications Behind a Fraudulent Manifesto
 

What you will learn reading this blog:

• That there are more, darker possibilities than the obvious bad Cop framing a good Cop;
• that possibilities include direct ties to Rodney King and Operation Verdict in support of Martial Law for a military coup;
• that CIA has infiltrated LAPD (and most major LEA) for their own criminal needs and may be at the heart of Dorner’s fate;
• that there are many clues most of us have missed which foster TEN new questions which help understanding;
Did CIA or Military frame and murder Dorner?
What is the truth about Chris Dorner?
This original artwork is trademarked and copyrighted and may not be used in full or in part, altered or unaltered, without permission, if dissociated from this blog: I do not want some bad cops turning the left-half into some kind of macabre T-shirt. If someone wants to make the WHOLE thing into a T-shirt, we can talk.

This original artwork is trademarked and copyrighted and may not be reproduced in any form dissociated from this blog in full or in part without express permission: I especially do not want some bad cops turning the left-half into some kind of racist T-shirt. If someone wants to make the WHOLE thing into a T-shirt, we can talk.

In my prior blog post in this series, I showed more than a dozen reasons to question if Dorner’s Manifesto were his manifesto, at all. While portions were surely written by him, it also seems clear that because of different writing styles and the very construction employed, as well as external evidences relating to the security of Dorner’s Computer activity — the sections which paint Dorner as a mad killer were by someone else. I’m not the first to suggest it, but perhaps the first to fully dissect and expose. Without those additions, all you have is a laundry list of LAPD wrongdoing and an open letter to LAPD pleading for resolution by a perfectly good Cop.

If we agree that there is reason to question the authorship of the condemning portions of the document… then we have to wonder what else about the greater Dorner matter is real?

There had to be a motive, and a pretty powerful one, at that, to warrant setting Dorner up for murder and feeding us lies. So much of Dorner’s laundry list of LPD sins ultimately translate into or directly relate to racial prejudice. Dorner cites everything from racial slurs to violence, specifically mentioning the Rodney King beating/video to show how systemic it has been. But this cannot be the motive, in my opinion.

Racist Cop complaints are, within LAPD, a small-potatoes issue representing little ‘threat’ sufficient to motivate the fraud and murders involved. LAPD, even as Dorner points out, has a long history of such prejudice and covering ups. When leadership habitually protects those who step out of line in this regard, there is no threat worthy of the death penalty in yet one more accusation, even if by a fellow Officer. We are moved to think it has to be something else. Or does it?

Was Dorner a CIA or DOD patsy?

In the game of Hearts, playing the Spades can steal the whole deck

In the game of political power and control, it is our Hearts and minds which are at stake via psychological manipulation of the masses. The closer you look past the thin and faulty veneer of the Dorner story, the more the clues we find which lead us not just to bad Cops in LAPD, but also, unfortunately, to the CIA and Department of Defense and very dark things that threaten to impact us all. So hang on… this is a far bumpier ride than the manhunt we see on the surface.

As I document in my bookset, Fatal Rebirth (new special low price offer in place, by the way), the 1992 Rodney King beating Dorner was careful to cite — had led to CIA reconnaissance overflights of major US Cities to perform low-level, high-resolution aerial photomapping of black neighborhoods for something called Project Verdict. Verdict was preparation for the declaration of Martial Law if rioting broke out nation-wide when the trial of the 4 LAPD Officers involved was concluded with an expected white-wash verdict of ‘innocent’. So concluded, it was.

And based on a lot of indicators, it was planned that way from the start; a plot to overthrow the Constitution.

But it failed, though LA indeed became a battle ground like never seen in any American City, requiring the National Guard AND US Marines to restore order. 53 died, more than 2,000 were injured, and nearly 4,000 fires leveled whole neighborhoods and cinderized over 1,000 businesses. Had other cities followed suit, the whole deck of cards would likely now be under military control, exactly as forecast by our highest ranking military in the event of nation-wide martial.

Now know this: in the time frame of the beating, trial, and aftermath, King was reportedly described by various officials predisposed to rude thoughts as the ‘King of Spades.’ Also active World-wide at the time was Operation Gladio (still in play, today, it seems), a US/NATO clandestine effort to topple Communist Bloc nations which further evolved to include a series of false flag terror events targeting Americans and NATO citizens to justify repressive draconian responses. Was Verdict part of Gladio? No way to know, but it sure fits the mold.

Fortunately, Verdict was thwarted. But I have to ask: was it intended from the start to foster a military coup? POTUS in ’92 was an old CIA man, George Herbert Walker Bush, a man tied to many of the darkest of bumps in the night America has ever known, from JFK to Watergate, and beyond. An excellent review exists in book by Pete Brewton, The Mafia, The CIA, and Goerge Bush, intro here. Gladio was under his watch as CIA Director, and while in the Oval Office.

1992 was a hotly contested election year, and conspiracy rumor mills of the day were warning that a military coupe was in the making to insure Bush held office; under Martial Law, the election could be cancelled. Rodney King may have been the key to such a plan. Absurd? Perhaps, but let’s consider it for a moment, anyway:

Bush was running for second term against Clinton and billionaire H. Ross Perot. Clinton had his own CIA ties, as did Hillary, but I won’t bore you with the details, here — but when I was saying the same publicly, I got hate email laced with expletives directly from the Oval Office. I was at the time researching my four-volume bookset, Fatal Rebirth, documenting crimes of the New World Order from 1947 forward.

As result of my investigation, it became clear to me that H. Ross Perot was a dangerous threat to the two-party system of power control via Dog and Pony Shows of pretended and superfluous political differences. Given Perot’s growing popularity, I feared they would take him out. He was last Century’s ‘Ron Paul,’ without the benefit of a congressional title.

I warned the Secret Service, who did nothing but put ME under surveillance for five years. Meanwhile, Anthrax was mailed to Perot’s family (the same thing used to silence one of Bill Clinton’s State Police-assigned body guards when he was Governor of Arkansas, to silence him from testifying about Clinton’s ties to CIA drug running in Iran-Contra, a George Bush sanctioned operation.) The Perot attack was confirmed to me by my own back-channel Secret Service Agent contact. It forced him to quit the race the night of the Colorado Primary, which he won even after quitting. Had he not quit, it would have given him enough electoral votes to have a place on the main Nov. election ballot.

But the NWO does not want you to have true freedom of choice. So you only get to vote for the two candidates they offer you, both of whom they own outright. If you knew the full story of how Ron Paul was prevented from being on the ballot, you would understand. Even with two candidates, the election is rigged so that it does not matter much how you vote, though wild-card antics like Chad counting can upset the equation without angering Eurobosses. Here’s how, and why it relates:

In those days, I had already interviewed a man claiming a flight crewman of CIA’s Evergreen Airline had confessed details of a secret flight: Bill Clinton, George Bush, and others (not Perot) were flown to Europe to meet with Bilderbergers to decide who would be our next President, Clinton being the answer. The plane landed and taxied to the end of the runway, where other Bilderberger planes already sat waiting.

Everyone got onto the same plane for their meet after deciding who would be the new President, and then departed in reverse manner, never officially entering the country. While we cannot confirm if this is a true event, it would give Bush a motive for circumventing by directly usurping power through martial law to end the election process. But to declare it would require some kind of internal upheaval on a national scale. Could such be engineered, and yet not seem manufactured to anyone, especially the Bilderbergers?

Are the Rodney King and Dorner matters linked to a Martial Law plot?

Playing the rest of the black cards

The race card trick: beating King and getting video taped was the first step. King was the perfect choice: he not only had the same last name as Martin Luther, but when clean shaven, he looked much like the much missed, martyred man. Beat King with video documentation, and you get instant renewed martyrdom, and kindle angst anew nation-wide in the black and white populace alike. But good quality video at night in those days was not as easy as it is, today.

The high-tech (for the day) Sony camera used had just been purchased and was taken right out of the box for the first time that night in response to the beating, it was claimed. I say claimed, because right out of the box, the battery would have been useless. The person filming was a Canadian-born contractor who had been raised in Argentina. You know, that country where the Nazi’s went after WWII, and where George Bush has bought huge tracts of land, and a fun place known to be a CIA playground in South America.

The second was to make sure the verdict in the trial was ‘not guilty.’  That was arranged by: a) having the first judge removed from the case as ‘biased,’ and b) the new judge assigned changing the venue to an all-White, well-to-do community resulting in a jury of 10 Whites and one Hispanic. But how do you make sure the violence level upon such verdict is sufficient enough to warrant calling in the National Guard? Simple — step c) have the National Guard foment violence to prime the pump. False flag stuff. Military stuff. CIA stuff. Any sign of that in LA at the time?

Well, as Dorner himself also mentions, we had for Chief of Police in LA at the time one Daryl F. Gates, clearly a New World Order Police State mentality kind of guy. He virtually invented SWAT teams and Police intelligence operations involved in wholesale spying on civilians. He also pioneered ‘sweeps’ of up to 1,000 officers at a time to arrest and detain everyone of a given class (e.g., 25,000 black and Hispanic youths, known or suspected gang members) simply for the harassment value, and to keep them off the streets for the convenience of city public relations, such as employed during the 1984 Olympic games.

The spying operation did favors directly for CIA fronts, while other police operations, including drug enforcement programs ‘invented’ by Gates (CRASH) made themselves useful to sanctioned CIA drug running in LA County. Ask ex LAPD Officer Michael Ruppert, who has been trying to blow the whistle on CIA drug operations in America ever since he was approached by CIA for the purpose of recruitment while on the Force. Ruppert thinks Gates was a CIA Case Officer, a CIA in place asset.

We should mention Gate’s role in the CIA mind-control assassination plot against RFK, where Gates ordered key evidence destroyed because ‘it was taking up too much room, and an ex-CIA Cop in the Command Center under Gates, ordered Cops not to go after the Man and his associate, the Woman in the polka dot dress seen earlier with Sirhan, and later seen running away gleefully saying “We did it! We shot Kennedy!” At the time, he said, “We don’t want them to get anything started on a big conspiracy.”

So then, was there any false flag ‘stuff’ of the sort going on in the LA Riots? In Fatal Rebirth, I detail some little known facts which national media censored, but which was revealed in local news reports. Things like someone parking an unlocked railroad box car full of guns on a siding near the LA Watts black community, and even helicopters dropping guns like they were beaded necklaces at Mardi Gras; like staging a violent attack on whites by blacks and videotaping it for news use… the participants other than victims later identified as National Guard in civies; like four black men caught by Police driving around town with a car full of guns and Molotov Cocktails, later released to a National Guard Major who claimed they were his Men. Here is a bit of a taste; guns appearing out of nowhere, a first-hand account.

Is Dorner intended to spark race riots to allow Martial Law?

To triumph, play the trump Ace

So one question which arises is, was Dorner to become the ‘Ace of Spades’ (the basis of my artwork) in some delayed completion of the Martial Law scenario by the military? Is some future revelation planned which will show him to have been framed and then murdered by LAPD, a tactic seeking to rekindle the 1992 hatreds all over again?

Keep in mind that in preceding months, there have been, and continue to be, a rash of massive live-fire (blanks) military Special Ops raid training exercises conducted in downtown Houston, LA, Minneapolis, Boston, Miami, and elsewhere (YouTube is rife with videos). Not once did city officials get advance warning, causing panicked civilians, some of whom took up arms just in case they would need defend themselves from (someone).

And, also in the weeks prior, the US Army leveled the 43 Acre Sepluveda Basin Wild Life Preserve (home to 250 species of birds) belonging to Los Angeles City WITHOUT NOTIFYING ANYONE. And as I write this, reports continue to come in of whole trains, as well as convoys of trucks carrying military vehicles along I-40 to Los Angeles. Someone is getting ready for something centered around LA.

But in truth, I rank its being tied to Dorner as being lower in likelihood than Chinese invasion or other, more useful martial law scenarios such as pandemics, nuclear or bioterrorism, etc. It might even be easier to stage an alien invasion, given that DARPA has developed huge stealth (radar absorbing, visually hard to see, soundless) UFO-like craft which have been test flown and sparked UFO flaps, already. So why go to the trouble of trying again something which didn’t work well in 1992?

A little more likely: something redacted from Dorner’s list of LAPD sins

If we presume that the Dorner’s material was altered, it is reasonable to presume something was removed. Something so dangerous if made public, that it was worth killing for, and framing Dorner to silence him. Imagine for a moment, that the people ‘killed by Dorner’ were people who also knew too much or who were considered weak links in a conspiracy. Or, some of them, perhaps even all, may have simply been targets of convenience because they were mentioned in Dorner’s complaints against LAPD.

Monica Quan was the daughter of LAPD Capt. Randal Quan, ret., who represented Dorner unsuccessfully (and poorly, according to the Manifesto) in hearings which resulted in Dorner’s termination from LAPD. Both Monica and her fiancé, were found shot dead in their car parked at their shared condo address. What if someone feared that Randal Quan might have shared some secret with her? Might that have resulted in targeting her, and the boyfriend in case she had in turn shared it with him?

Within minutes of the shooting by some accounts, the ‘manifesto’ was posted on Facebook, though not discovered for many hours. Open and shut case, right? But think about it. If you were going to launch a killing spree against cops… how much advance notice and tactical warning would you give them? Dorner’s alleged post included excruciating details of the threat and methods he would employ. And then, there was silence for four days, giving Police ample time to put investigative resources in motion, and putting Dorner at risk of capture. How logical was that, tactically, if how it really went down? It makes no sense.

On the fourth day, a gun battle ensued when two LAPD claim they spotted Dorner near the home of someone named in the post as likely target. One of the two Cops was grazed, but their suspect escaped. But how likely is it that it really was Dorner, given that a total of seven people known not to be Dorner were shot at by spooked Cops thinking them to be? We are talking about Cops opening fire without warning and shooting people clearly not Dorner — in the back in some cases. Dorner is a huge black man. So why shoot two Hispanic women, a slightly built white male, and a young surfer dude? Clearly, they had no real clue what Dorner looked like, then. So I must ask, did they really know it was him in that first gun battle?

Then, that same day, a SWAT Team Officer, Michael Crain, also a bad Cop according to Dorner, was shot dead, and a trainee with him critically wounded while they waited at a stoplight — attacked by someone who ran up to the car on foot. A bit curious to me that everyone killed by ‘Dorner’ died in the front seat of their car… which means someone was waiting for them at exactly the right place and time for a quick hit and run operation.

That requires exceedingly good intelligence and access to very detailed and current internal Police information in the case of Crain. I don’t believe Dorner, an ex Cop, would have that level of needed information available. Do you? It may be helpful to know that one of the favorite assassination points for CIA hits is while the target is in transit by car. Funny thing is, though, it takes CIA-style tricks to insure that a target will stop at the one stop light you deem most useful for the hit. That means more than one person is involved. Are we to believe Dorner pulled the feat off single-handedly, or would an internal conspiracy be more probable?

And who is Crain? An ex-Marine. Dorner is ex Navy, thanks to his problems with LAPD. But while he was still a Cop and in the Naval Reserves, both would likely have been ‘in the loop’ with respect to any illegal or paralegal joint military-police drills of the type mentioned above. And, therefore, we may presume both might have known something about an illegal future operation, or some dark matter associated with one already conducted. So how far fetched would it be for one to be killed to silence them and the other to be blamed for it, and to modify Dorner’s texts for the purpose?

It’s almost guaranteed to work, especially if the first killing is scheduled at a time when Dorner would have no alibi he could prove, such as being home, alone. Imagine being Dorner: you hear on the radio of the Quan shooting, and realize… ‘My FB page mentions the elder Quan in a bad light. That may make me a suspect. I’d better review my wording.’ So you try to do just that and discover you are locked out of your own account, and you recall your Credit Union account was hacked by an LAPD Officer once, already. So you just go to the page and find your list of complaints has suddenly become a confession (manifesto). You have no choice but to run, knowing Cops kill Cop killers almost always, no questions asked.

Especially run when you hear news reports that: a) some of your personal Police equipment was been found in a trash bin near the murder scene; and b) someone claiming to be you called Randall Quan to mentally torture him over Monica’s murder. And, thereby, unfolds the story we have been fed in media. But as we’ve seen, there has to be more at work here than that.

If the Dorner manifesto is a fraud, what can be believe about the official story?

Next up: 12 Frightening New Questions Illuminate the Dorner Urban Legend

Will America survive Chris Dorner?

 

%d bloggers like this: