Are the Illuminati Jews? A trip through history on this website might lead some to understand that the conspirators and evil doers that always seem …
France
Are the Illuminati Jews?
A trip through history on this website might lead some to understand that the conspirators and evil doers that always seem to be in positions of power and influence are typically jewish, but is that true? I began to think just that as I studied the Illuminati and the financial powers of the world, the powers in Hollywood, media, and pornogrphy. The ‘jews were behind the Bolshevik revolution and surrounded Stalin when he took power. The ‘jews’ owned the brothels, banks, and media in Germany from WWI to WWII leading to the demise of their Christian culture, thus the hatred that existed leading up to WWII. The ‘jews’ own and control the same in the US today and can also be said for other countries too.
But, these ‘Jews’ are neither descendants of Judah nor were they from the province of Judah. Jews should mean either of these, but when the Bible was translated to English it began to be misinterpreted. In addition, the Edomites (descendants of Esau who gave away his birthright for a cup of porridge) mixed with the Turks and became a Khazarian nation that practiced occultism and adopted the Talmudic religion, an unwritten set of laws, and corrupted them and began to write their own. These imposters called themselves Jews, having adopted a portion of Judaism that could easily be changed and corrupted. These Khazars have long been involved in Satanic worship and secret societies and trace their ‘religion’ to the Pharisees and occult practices to Bale. Most actual Jews are good people and deceived by these imposters like most of the rest of the world. Rothschild had Khazarian descent and these Khazars make up the majority of the Illuminati’s top half of the pyramid.
Former Illuminati defector ‘Svali’ answers this:
“Absolutely not. In fact, Hitler and his people (especially Himmler and Goebbels) were top Illuminists. The Illuminati are racist in the extreme, and as a child, I was forced to play “concentration camp” both on my farm in Virginia, and also in Europe in isolated camps in Germany.
The Jews historically fought against the occult (see Deuteronomy and the Old Testament for how God through the Jew people tried to cleanse the land of the occult groups that were operating there, such as those who worshiped Baal, Ashtarte, and other Canaanite and Babylonian gods.
Yes, there are some very powerful Jew people in this group. For instance, the Rothschild family literally runs the financial empire in Europe (and indirectly the States), and are a well-known Jew family. I have also known people whose parents were Jew diamond merchants in the group, and at every level. But to rise to power in the Illuminati a Jew person at night would be forced to renounce their faith, and to give their first allegiance to Lucifer and the beliefs of the Illuminati In return for this betrayal, they believe that power (financial) and rewards come; and in one sense they do, but at too high a price (losing their eternal soul).
The nazi/concentration camp mentality is very strong, though, and I was told that Hitler, Himmler, Goebel, and others were high-ranking German members of the group (Himmler was higher than the other two), and Mengele their paid puppet as well, who later worked as a high trainer of the American branch between his periods of hiding in South America. They honestly believed that they were acting as agents of their ‘gods’ to exterminate the Jew race, and I am so, so sorry that this group has enacted so many horrors on the earth (and so, so glad that I left it).
I hope this helps you. I have always wondered this, though, why some of the highest ranking financial families in the group (baron Rothschild of France is one of the 13 European lords, or “kings” that run the group in Europe, and sits on the World Council) are Jew yet the group espouses hatred of their own race.”
The Illuminati are racist, and have a very “Aryan” outlook. They believe strongly in the rule of the “pure” and “intelligent” by their definitions, and in their ceremonies, there will occasionally be minorities killed in ceremonies.
They are trying to breed a “genetically superior” race to rule, with their children and descendants. They are also followers of Plato’s Republic, and believe that they will be the ones to usher in this “Utopian” rule with the NWO in their opinion. In their Utopia, the intelligentsia will rule, and the sheep like masses will follow their leaders (that is their view of the world; that the occult leaders are “enlightened’ and intelligent, while the average person is a “sheep” to be led by the nose).”
Editor note: I also recall my research on Zionisim for this website and was a little shocked to see that so few of the Jews (around 10-12,000 out of, I think, 3-5 million in the US at the time) supported the cause. How the Illuminati are organized in the United StatesThe Illuminati have groups in every major city of the United States. They originally entered the U.S. through Pittsburgh, Pa., and from there spread across the US.. There are 18 cities in the U.S. which are considered major “power centers” for Illuminati power and/or influence. These include: Washington, DC and the surrounding areas; Pittsburgh, Pa.; Albany, NY; Minneapolis, Minn.; Ann Arbor, Mich.; Wichita, Kan.; the “golden triangle” of the Winston Salem, Raleigh, NC area; Atlanta, Ga.; New Orleans, La.; and Springfield, Miss.; Houston, Tex.; Phoenix, Az.; Flagstaff, Az.; Seattle, Wash.; Portland, Or.; and Los Angeles, Calif. and surrounding areas. Other cities are important to the Illuminati, but the above cities funnel money for them, conduct research, and regional councils often sit within them. How the Illuminati Make Money The Illuminati are involved in many areas of making money as they need continued financing to survive. There are several illegal enterprises that they are involved in, as well as legal ones.
Drug running: The Illuminati linked up with the Mafia and the Columbians years ago to help each other out with bringing drugs into the United States. They also provide couriers for taking drugs and money out of the States. The Illuminists are generally wealthy businessmen, who have four layers of people underneath them. The fourth layer down actually has contact with the people in the drug industry. They never identify themselves as Illuminists; only as people interested in investing with a guaranteed profit. They are highly secretive. In return, the local groups supply people willing to be couriers of money or drugs, or people willing to help cover for the local operations.
Pornography: The Illuminati are linked in many cities with pornography, prostitution (adult and children, and white slavery sales. Again, several layers are present as a buffer between the true “management” and those either engaged in the activities, or in paying for/funding and eventually being paid for the activities.
Children: Children are often supplied from the local cult groups and taught to be child prostitutes (and later adult prostitutes). They are photographed and filmed in every type of pornography available, including snuff films and violent films.
Gun running: The Illuminati and other groups are also involved in international gun sales and shipments. The Illuminists have well trained couriers who will cross international and state lines. These couriers are highly secretive and will not reveal their sources on pain of suicide or assassination. These people are accountable to others above them, with two more “buffer layers” of people above these, before we get to the person in the Illuminati with money, who helps fund this.
Buying access codes for military computers: The Illuminati will have people from all strata of civilian life trained to go and make pickups near or on military bases. A typical person used might be the innocent looking wife of a military person, a local businessman, or even a college student. There is a contact inside the base, also a dissociative Illuminist, who brings the information to the outside contact. Occasionally, the contact person is paid with money, information, or goods. The military computer codes are changed on random schedules. The Illuminati have at least 5 or 6 contacts on each major base who alert them when the codes are getting ready to change. The Illuminists like having access to military computers, because that will gain them entrance to closed files the world over.
Hiring and selling assassinations: This is done worldwide, though more in Europe than in the States. These people are paid big money to do either a private or political assassination. The money is paid either to the assassin or to the trainer. Usually they both divide the fee. The assassin is offered protection in another country for awhile, until the trail runs cold. If the kill is done in Europe, they may be sent to the far east or the U.S., and vice versa if the kill is done in the U.S. The Illuminati have a wide range of places and false identities to hide these people, unless for some reason they want the assassin disposed. Then, he/she is caught and immediately executed.
Mercenaries/military trainers: Guess who gets paid money to come in and train paramilitary groups? Who has training camps all over the states of Montana, Nevada, and North Dakota? Who occasionally will offer their expertise in return for a large financial reward? They never advertise themselves as Illuminati, unless the group is known to be sympathetic to their cause. Instead, these are tough, cold, brutal military trainers, who offer to teach these groups in return for money, or even better, a promise to affiliate with their group in return (loyalty in return for knowledge). More and more paramilitary groups have been brought into the Illuminati this way, without their full knowledge of who and what the group really is. This gives the Illuminists a way to monitor these groups (their trainers report on them and their activities), and it can be useful to have trained military groups that they can call on someday.
Banking: The original Illuminists were bankers. They have highly trained financiers to organize their money and funnel the above illicit funds into more “respectable” front groups/ organizations. They will also start benevolent charities, community organizations, etc., as fronts, and funnel the money from a broad base into these groups. The Illuminati particularly pride themselves on their money making and manipulation skills, and on their ability to cover their paper trails expertly through multiple layers.
These are some of the major money making enterprises that the Illuminati are engaged in. All trails in banking eventually will lead to Belgium, the Illuminati financial center for the world. They have a wealth of financial resources backing their enterprises, which means that in reality they can engage the best lawyers, accountants, etc. to help cover their trail, as well. Jobs in the Illuminati (or Why They Spend All That Time Training People) To understand generational programming, it helps to understand why the cult goes to the amount of trouble that it does to place programming into people. Training represents time and effort, and no one – especially a cult member – will spend that amount of energy unless there will be a return on the investment. This will be a simple overview of some of the more common jobs in the cult. It is not meant to be exhaustive or in any way considered to be complete. The cult has a very organized hierarchy of jobs. Like any large organization, it needs people who are well trained in their jobs in order to run smoothly – so well trained, that they can do their tasks without even thinking about them. To maintain secrecy, this group must also have people completely dedicated to not revealing their roles in the cult – under threat of punishment or even death. The cult wants members who are completely loyal to the group and its tenets, and who never question the orders they are given. These qualities in group members ensure the continuance of the cult and that its secrets are never revealed to the outside world. Here is a sampling of some jobs in the cult (not listed in order of priority)
Informers: These people are trained to observe details and conversations with photographic recall. They are trained to report to their local cult leader or hierarchy, or trainer, and will download large amounts of information under hypnotic trance. Detailed knowledge of conversations or even documents can often be retrieved in this manner. They are often used as “plants” to gather information in both governmental settings, and within the cult meetings.
Breeders: These people are often chosen from childhood to have and breed children. They may be chosen according to bloodlines, or given in arranged marriages or cult alliances to “elevate” the children. A parent will often sell the services of a child as a breeder to the local cult leader in return for favors or status. These children are rarely used as a sacrifice. Usually they are given to others in the cult to adopt or raise, but the breeder is told that any child born to her was “sacrificed” to prevent her looking for the child. In anarchical cults, a local leader or parent will occasionally have a child as the result of an incestuous liaison. Such a child is given away or killed, but the mother will be told the child was given away to a distant branch.
Prostitutes: Prostitutes can be a male or female of any age. They are trained from earliest childhood to give sexual favors to one or more adults in return for payment to the child’s parents or their local cult group. Occasionally, the prostitute may be given to a member of the cult on a temporary basis as a reward for a job well done. Child prostitution is a big business for the cult, and training very young children in this role is taken very seriously. Child prostitutes are also used to blackmail political figures or leadership outside the cult.
Pornography: A child used in pornography (which may include bestiality) can also be of any age or sex. Child pornography is also big business in the cult and includes snuff films. Children are trained in this role from preschool on, often with the help or approval of the child’s parents. The parents are paid or given favors by the cult in return for selling their child or allowing their child to be trained in this area.
Media personnel: These are very bright, verbal people. They will be sent to journalism school and will work for local or regional media upon graduation. These individuals have many contacts within the organization as well as the outside world. They write books and articles sympathetic to the Illuministic viewpoint without ever revealing their true affiliation. They will tend to do biased research in their articles, favoring only one viewpoint, such as denying the existence of DID or ritual abuse. For instance, they will interview only psychiatrists/psychologists sympathetic to this viewpoint and will skew data to present a convincing picture to the general public. If necessary, they will outright lie or make up data to support their viewpoint. There are members of groups whose people have been purposely trained to try and help formulate public opinion on the nonexistence of the cult (i.e., cults don’t exist, no rational person would believe this “mass hysteria”). The Illuminists believe that to control the media is to control the thinking of the masses. For this reason, they take training media personnel quite seriously.
Helpers at rituals: Cleaners clean up meticulously after rituals. They will scour the site after a ceremony, rake the area, etc. They are taught this job from preschool years on.
Preparers: Set up tables, cloths, candles, and paraphernalia quickly and efficiently. This job is learned from infancy on.
Readers: Read from the book of Illumination or local group archives. They also keep copies of sacred literature in a safe vault and are trained in ancient languages. Readers are valued for their clear speaking voices and ability to dramatize important passages and bring them to life.
Cutters: Are taught to dissect animal or human sacrifices (they are also known as the “slicers and dicers” of the cult). They can do a kill quickly, emotionlessly, and efficiently. They are trained from early childhood on.
Chanters: Sing, sway, or lead choruses of sacred songs on high holy occasions.
High Priest/Priestess: The person who holds this job is changed every few years in most groups, although it may be held longer in smaller, more rural groups. These people administrate and lead their local cult group as well as coordinate jobs within the cult, give assignments, and pass on meeting dates given from the local hierarchy or leadership council. They also will activate the local group’s telephone tree, evaluate their local group members for job performance, and lead in all spiritual activities. They report to the local or regional leadership council over their group.
Trainers: These people teach local group members their assigned jobs and monitor the performance of these jobs at local group meetings or after an assigned task. These people report to the high priest/priestess over their group, as well as to the local head trainer on leadership council.
Punishers: These are the people who brutally punish/discipline members caught breaking rules or acting outside of or above their authority. They are universally despised by other cult members, although they will be praised for a job well done by the local high priest or priestess. Usually physically strong, they will employ any method deemed necessary to prevent a recurrence of the undesired behavior. Punishment may be public or private, depending upon the severity of the infraction. Each local group has several punishers.
Trackers: These people will track down and keep an eye on members who attempt to leave their local group. They are taught to use dogs, guns, tasers, and all necessary tracking techniques. They are also adept at using the internet to monitor a person’s activities. They will track credit card use, checks written, and employ other methods to find a missing person.
Teachers: These people teach group classes to children to indoctrinate cult philosophy, languages, and specialized areas of endeavor.
Child care: These people care for very young children when the adults are at local group meeting. Usually care is for young infants only. After age two, children are routinely engaged in some form of group activity led by trainers of the youngest children. Infant child care workers are usually quiet and coldly efficient.
Couriers: These members run guns, money, drugs, or illegal artifacts across state or national lines. Usually they are people who are young and single without outside accountability. They are trained in the use of firearms to get out of difficult situations. They must be reliable and able to get past any anticipated barriers.
Commanding officers: These people oversee military training in the local groups and help ensure the smooth running of these exercises. They will delegate jobs to those ranking under them and are responsible to the local leadership council. The council will have at least one member on it representing the military branch of the Illuminati. In addition, there are many military-related jobs beneath the commanding officers.
Behavioral scientists: These individuals often oversee the training in local and regional groups. These students of human behavior are intensely involved in data collection and human experimentation in the name of the pursuit of knowledge of human behavior in the scientific realm. They are almost universally cold, methodical, impersonal people, and will employ any methods to study trauma and its effects on the human personality. Their main interest centers around implementing programming and cult control in the most efficient and lasting manner.
There are many other jobs inside the cult. The cult spends quite a bit of its time getting people to do these jobs for them for free, which is why they program people to believe they are doing their “family” and the world a service. The reality, of course, is that the individual is being abused and taken advantage of by the cult. The Illuminati Plan to Rule the World (aka “Novus Ordo Seclorum”) Prior to discussing actual programming techniques, it is important to understand the philosophy underlying Illuminist programming. All groups have goals, and the Illuminists are no exception. Money making is not their final goal – it is a means to an end. This end point, or goal, is no less than to rule the world. The Illuminati has a set plan similar to the former Soviet Union’s 5-year and 10-year plans. This is what the Illuminists themselves believe and teach their followers as gospel truth. Whether they will actually succeed is another matter altogether. The following is the Illuminist agenda at all levels of the Illuminati. As with any goal, the Illuminati has specific steps which it plans to implement to reach its objectives. Briefly, each region of the United States has “nerve centers” or power bases for regional activity. The United States has been divided up into seven major geographical regions. Each region has localities within it that contain military compounds and bases that are hidden in remote, isolated areas or on large private estates. These bases are used intermittently to teach and train generational Illuminati in military techniques; hand-to-hand combat, crowd control, use of arms, and all aspects of military warfare. Why? Because the Illuminists believe that our government, as we know it, as well as the governments of most nations around the world, are destined to collapse. These will be planned collapses, and they will occur in the following ways: The Illuminati has planned first for a financial collapse that will make the great depression look like a picnic. This will occur through the maneuvering of the great banks and financial institutions of the world, and through stock manipulation and interest rate changes. Most people will be indebted to the federal government through bank and credit card debt, etc. The governments will recall all debts immediately, but most people will be unable to pay and will be bankrupted. This will cause generalized financial panic, which will occur simultaneously worldwide, as the Illuminists firmly believe in controlling people through finances. Next there will be a military takeover, region by region, as the government declares a state of emergency and martial law. People will have panicked. There will be an anarchical state in most localities, and the government will justify its move as being necessary to control panicked citizens. The cult trained military leaders and people under their direction will use arms as well as crowd control techniques to implement this new state of affairs. This is why so many survivors under 36 years of age report having military programming. People who are not Illuminists or who are not sympathetic to their cause will resist. The Illuminists expect this and will be (and are being) trained in how to deal with this eventuality. They are training their people in hand-to-hand combat, crowd control, and if necessary, will kill to control crowds. The Illuminati is training their people to be prepared for every possible reaction to the takeover. Many mind control victims will also be called into duty with preset command codes. These codes are meant to call out a new, completely cult loyal presenting system. Shatter codes programmed under trauma will be used to destroy or bury non-cult loyal alters. Military bases will be set up in each locality. Actually they are already here, but are covert. In the next few years, they will go above ground and be revealed. Each locality will have regional bases and leaders to which they are accountable. The hierarchy will closely reflect the current covert hierarchy. When I left the Illuminati about five years ago, approximately 1% of the U.S. population was either part of the Illuminati, sympathetic to it, or a victim of mind control (and therefore considered useable). While this may not sound like many, imagine 1% of the population highly trained in the use of armaments, crowd control, psychological and behavioral techniques, armed with weapons and linked to paramilitary groups. These people will also be completely dedicated to their cause. The Illuminati firmly believes that it can easily overcome the other 99% of the population, most of whom are untrained, or poorly trained, such as “weekend hunters.” Even the local military will be overcome as the Illuminati will have regional cell groups with highly trained leaders. They also count on the element of surprise helping them during their takeover. Many of the highest leaders in the militia branch of the Illuminati are or have been officers in the military, and so already have a good knowledge of which techniques will work best to overcome a region’s or locality’s defenses. After the military takeover, the general population will be given a chance to either espouse the Illuminati’s cause or reject it, with imprisonment, pain, even death being possible punishments for rejection.These people very much believe that the intelligent, or “enlightened” or Illuminated, were born to rule. They are arrogant and consider the general population as “dumb sheep” who will be easily led if offered strong leadership, financial help in an unstable world economy, and dire consequences if a person rebels. Their utter ruthlessness and ability to implement this agenda should not be minimized. The Illuminati banking leaders, such as the Rothschilds, the Vanderbilts, the Rockefellers, the Carnegies, and the Mellons, will reveal themselves and offer to “save” the floundering world economy. A new system of monetary exchange founded on an international monetary system, and based between Cairo, Egypt, and Brussels, Belgium, will be set up. A true “one world economy”, creating the longed for “one world order”, will become reality. There is more to the Illuminist agenda, but these are the basics of it. This agenda is what the Illuminati really, truly, believe, teach, and train for. They are willing to give their lives up in this cause, and even to teach the next generation, as they believe that their children are their legacy. I was told that my children’s generation would see this takeover sometime in the 21st century. At present, the Illuminati have quietly and covertly fostered their takeover plan by their goals of the infiltration of:
The media
The banking system
The educational system
The government, both local and federal
The sciences
The churches
They are currently and have been working the last several hundred years on taking over these six areas. They do not go to an institution and say “Hi, I’m a local Illuminist, and I’d like to take over your bank. Instead, they begin by having several people quietly invest funds over several years, gradually buying more and more shares in the bank (or other institution that they wish to control), until they have a financial controlling interest in it. They never openly disclose their agenda or their cult activities, as often they are amnesic to them. These are well respected, “Christian” appearing business leaders in the community. The image in the community is all important to an Illuminist. They will do anything to maintain a normal, respected facade, and despise exposure. On one leadership council in a major metropolitan city where I was a member, there sat: one head of the local small business administration; one CEO of a government defense firm; one principal of a Christian school; one vice mayor of the city; one journalist; one nurse; one doctor; one behavioral psychologist, one army colonel, and one navy commander. All except one attended church weekly; all were well respected within the community. None of them appeared “evil” or “marked”. If you met them in person, you would probably instantly like any of these intelligent, verbal, likeable, even charismatic people. This is their greatest cover, since we often expect great evil to “appear” evil, led by media portrayals of evil as causing changes in the face and demeanor of people, or marking them like the biblical Cain. None of the Illuminists that I have known had unkind or evil appearing persona in their daytime lives, although some were dysfunctional, such as being alcoholics. The dissociation that drives the Illuminists is their greatest cover for being undetected at this time. Many, if not most, of these people are completely unaware of the great evil that they are involved in during the night. There are other groups that are not actually part of the Illuminati of which they are aware. The Illuminati are not the only group that follows esoteric practices or worships ancient deities or demons. They encourage divisiveness between different groups (divide and conquer is one of their ruling principles). They will often welcome them into their umbrella, if possible. This has been happening more and more in recent years, as the Illuminati trade teaching their training principles, which are considered the best by most secretive groups, in exchange for loyalty to the Illuminati. They will send their trainers to these groups, and the trainers will report to the local regional council. In the political arena the Illuminists will fund both sides of a race, because their greatest maxim is that “out of chaos comes order”. That is why they sent arms to and funded both sides of both the great World Wars in this century. They believe that history is a game like chess; that only out of strategy, fighting, conflict, and testing can the strong emerge. I no longer agree with this philosophy, but at one time I did, with all my heart. Hopefully, as these people and their agenda are exposed, the common man will rise up against this intended rule to be foisted upon an unsuspecting mankind. Svali reveals much more about the Illuminati in her book ‘Svali Speaks’, especially regarding the various methods of programming beginning in Chapter 4.
Sources:
(25) The Colorado Bureau of Investigation analyzed and confirmed that the wooden stick used with the ligature rope in the garrote for the strangulation is, in fact, the paint brush handle from the broken paint brush from the painting supply tray owned by Patsy Ramsey, a critical second piece of weapon evidence that came from within the house. It was also noted that a portion of ...
Hear my presentation at the very first Hip Hop Summit before Hip Hop got sold out and taken over: If you think COINTELPRO is over, think again. It's on steroids now!! Here's John Potash on the assassination of Tupac Shakur. I had already found evidence of his surveillance, Potash found more! All to keep Hip Hop artists from becoming political and to degenerate into what we ...
The book, The Conspirators Hierarchy, the Committee of 300, was written by John Coleman, a man who once claimed to have worked for the CIA and MI6. Coleman learned by the early 90s that an international committee, spearheaded by the Bilderberg Group and Western intelligence agencies, would guide the world toward a “post-industrial” hellscape controlled by technocrats who came to influence during the Carter administration. “At least ...
The 1985 Disney production Return to Oz is considered by many as one of the most terrifying children’s movies ever made. While many of its scenes are indeed pure nightmare fodder for young minds, there is one fact that is even more disturbing: The movie is actually about a young girl being subjected to the sadistic world of trauma-based mind control. Warning: Gigantic spoilers ahead! When ...
Some Books would just Disappear from the Libraries In addition to revising the classics, which I alluded to awhile ago -with revising the Bible, he said: "... some books would just disappear from the libraries." This was in the vein that some books contain information or contain ideas that should not be kept around. And therefore, those books would disappear. I don't remember exactly if he said how ...
In the fall of 1969, a persistent rumor that Paul McCartney had been killed two years earlier and replaced with a look-alike captured the imaginations of Beatles fans and the general public. Clues began to appear on album covers and in music, a lookalike contest was held after the alleged death date but no winner was ever announced, but more conclusively, a team forensic scientist in ...
This is a portion of the speech that President John F. Kennedy gave at the Waldorf-Astoria Hotel on April 27, 1961. "The President and the Press" before the American Newspaper Publishers Association. Below is copied from the transcript: "The very word "secrecy" is repugnant in a free and open society; and we are as a people inherently and historically opposed to secret societies, to secret oaths ...
FBI Director, J. Edgar Hoover, gave this testimony on 6 March 1961 before the House Committee on Appropriations regarding the communist conspiracy: “They have infiltrated every conceivable sphere of activity: youth groups; radio, T.V. and motion picture industries; church, school, educational and cultural groups; the press; nationality minority groups and civil and political units.” ...
U.S. Senator Barry Goldwater in his book first published on May 5, 1955, titled 'With No Apologies' writes: "The Trilateral Commission is intended to be the vehicle for multinational consolidation of the commercial and banking interests by seizing control of the political government of the United States. The Trilateral Commission represents a skillful, coordinated effort to seize control and consolidate the four centers of power: political, monetary, ...
” style=”background: #b1d5e5; border-radius: 3px;”>Illuminati. As the premier power of Europe prior to the French Revolution, France was the largest, wealthiest, most populous nation on the continent, with a well-developed middle class, and a strong agricultural, industrial, and foreign trade base. In History of the Destruction of ScienceDeism had become popular in the 18th century which taught that God had set up a simple universe that worked like a clock works, dependent upon the laws of nature, and thus thereafter it did exactly as he had designed it to do. Deists didn’t believe in miracles, answers to prayers, prophecy, incarnation or resurrection of Christ because they didn’t believe God could or would interrupt the laws of nature. It is a view that puts God very distant in the past. With the false science theories being propagandized as fact during the time, many Christians, theologians, and apologists adopted the deist philosophy over time. Historians discovered that most theologians throughout Europe had the English Deism books in their libraries and implemented the deist ideas in their theological preaching and teaching thus popularizing deistic ideas into Christianity. Nevertheless, deistic ideas took root and spread into the 19th century, often hidden in works on natural theology which were so prevalent in the early decades. (Natural theology considers the theological/moral truth about God that can be gleaned from the study of His creation, i.e., nature.) Brooke notes: “Without additional clarification, it is not always clear to the historian (and was not always clear to contemporaries) whether proponents of design were arguing a Christian or deistic thesis. The ambiguity itself could be useful. By cloaking potentially subversive discoveries in the language of natural theology, scientists could appear more orthodox than they were, but without the discomfort of duplicity if their inclinations were more in line with deism.” One Anglican clergyman wrote in 1836 that as a result of the growing influence of natural theology and German neology “a large portion of what passes as Christianity is but deism in disguise!” In Germany and France deism flourished, especially in biblical scholarship, where the German philosopher Immanuel Kant (1724–1804) and Spinoza had great influence. Reventlow concludes his thorough study by saying: “We cannot overestimate the influence exercised by Deistic thought, and by the principles of the Humanist world view which the Deists made the criterion of their biblical criticism, on the historical-critical exegesis of the 19th century; the consequences extend right down to the present. At that time a series of almost unshakeable presuppositions were decisively shifted in a different direction.“ As critical biblical scholarship gained the upper hand on the continent in the late 18th and early 19th centuries, its penetration into the British (and North American) churches was hindered, no doubt partly because of lasting effects of the evangelical revival led by the Wesley’s and Whitefield. So a revolution in theological and philosophical worldview was in full bloom by the early 19th century. Its development can also be traced in the history of geology and cosmogony. Atheism also began to be introduced following the French Revolution and extending out from France to other parts of the world. This viewpoint was that there is no God. (Source) In the early 19th century, the old-earth proponents believed that, prior to the work of Copernicus, Kepler, and Galileo, it was quite natural for Christians to take various verses in the Bible to imply an immovable earth surrounded by the revolving heavenly bodies because they had no philosophical or observational reasons to think otherwise. But once the new mathematical descriptions and telescopic observations had been made known, they were forced to reinterpret those verses so as to remove the apparent contradiction between the (scientific theories) revealed by Scripture and the truth revealed by God’s creation. In exactly the same way, the old-earth proponents reasoned, geology has brought forward (seemingly) observational proof that the earth is much older than previously thought and so Christians must interpret Genesis 1 and 6–9 differently, so as to harmonize Scripture with this newly discovered teaching of creation. This thinking developed in stages in geology generally and in the minds of individual geologists. At first only Genesis 1 was reinterpreted, while the Flood of Genesis 6–9 was seen as a global, geologically significant event. After 1830, Genesis 6–9 was reinterpreted to mean a local and/or geologically insignificant flood. Since Bacon’s scientific method had advanced knowledge of how things work and the science behind them for more than a century, people had begun to accept everything that came from the scientific world as fact, in spite of any conflicts with the Bible. Clergy would just adjust thief teachings. How did this science for truth turn to science for propaganda? As Anthony B. Sutton explained in his excellent expose’ How the Order Controls Education (1985): First, the take-over of the Sheffield Scientific School at Yale. After returning from Europe Daniel Coit Gilman spent the next 14 years “in and around Yale, consolidating the power of the Order.” “His first task in 1856 was to incorporate Skull & Bones as a legal entity under the name of The Russell Trust. Gilman became Treasurer and William H. Russell, the co-founder, became President. It is notable to note that there is no mention of the Order, Skull & bones, the Russell Trust, or any secret society activity in Gilman’s biography, nor in open records. The Order, so far as its members are concerned, is designed to be secret … The Order has been remarkably adept at keeping it’s secret. The Order fills the first requirement for a conspiracy – IT IS SECRET.” (Pages 6-7) “The Sheffield Scientific School, the science departments at Yale, exemplifies the way in which the Order came to Control Yale and then [all of the higher educational institutions of] the United States. “In the early 1850s, Yale science was insignificant, just two or three very small departments. In 1861 these were concentrated into the Sheffield Scientific School with private funds from Joseph E. Sheffield. [Daniel Coit] Gilman went to work to raise more funds for expansion. “Gilman’s brother had married the daughter of Chemistry Professor Benjamin Silliman. [A member of the Order since 1837.] This brought Gilman into contact with Professor Dana, also a member of the Silliman family, and this group decided that Gilman should write a report on reorganization of Sheffield. This was done and entitled “Proposed Plan for the Complete Reorganization of the School of Science Connected with Yale Collage.” (Page 7). Using members of the Order in Washington and Connecticut a plan was hatched to get Federal funding. The Morrill Land Bill was first introduced in 1857 and vetoed by President Buchanan in 1859, but later signed by President Lincoln. “This bill now known as the Land Grand Collage Act donated public lands for State collages of agriculture and science … and of course Gilman’s report on just such a collage was ready”. (Page 8) As Sutton explains, this was a crucial move in the Orders plan to gain control of all of the schools of higher learning in the States. “The legal procedure was for the Federal government to issue land script in proportion to a state’s representation, but state legislatures first had to pass legislation accepting the script. Not only was Daniel Gilman first … to get Federal land script … [he] grabbed all of Connecticut’s share for Sheffield Scientific School … no other School in Connecticut received even a whisper until 1893… Of course it helped that a member of the Order, Augustus Brandegee [Initiated into the Order in 1849] was speaker of the Connecticut State legislature in 1861 when the state bill was moving through … Other member’s of the Order, like Stephen W. Kellogg [Initiated in 1846] and William Russell [Initiated in 1833], were either in the State Legislature or had influence from past service.” (Page 8) The Order next moved on the State of New York’s share of Federal money and was able to do the same thing for Cornell University.
“Andrew Dickson White, a member of our trio, was the key activist in New York and later became the first President of Cornell. Daniel Gilman was rewarded by Yale and became Professor of Physical Geography at Sheffield in 1863.” (Page 8)
From this beginning the Illuminati eventually controlled the science departments in all collages and institutions of higher learning. For the complete documented, diagrammed understanding of the steps that were taken and the people involved in this takeover I urge you to locate a copy of Sutton’s explosive book and read it. In medical science, archaeology, space science, food science, and many others, the scientist can only research what is funded at the university they are affiliated with unless they are able to find outside funding, and those universities only get funding for areas of science that the establishment allows and funds through their front organizations. And there are plenty of rented white coats available for hire when Big Pharma or Big Ag need a scientific study to get a new product out that is unsafe by all reasonable means. More and more studies simply cannot be replicated, so any false theories are not thrown out, but left floating as acceptable ‘fact’ in the hallowed scientific ethers, when they are nothing more than studies paid for and promoted by the companies who have a marked interest in proving their personal hypothesis. https://www.youtube.com/watch?v=FpCrY7x5nEE See also ‘Is Science Reliable’ video by Scishow, and John Ioannidis: “Reproducible Research: True or False?” Take for example a recent review of 67 blockbuster drug discovery research findings published in prestigious journals. A review of the studies found that three-fourths of them weren’t right. Bayer simply couldn’t replicate findings that were published in more than 75 percent of their drug trials. Another study of cancer research found that only 11 percent of preclinical cancer research could be reproduced, In 2017, Springer, the publisher of Tumor Biology, retracted 107 papers from one journal after discovering they had been accepted with fake peer reviews. – but the problem isn’t just in the pharmaceutical industry. Even in physics, supposedly the most complex and most reliable of all sciences, two of the most flaunted physics results of the past few years — the announced discovery of both cosmic inflation and gravitational waves at the BICEP2 experiment in Antarctica, as well as the supposed discovery of superluminal neutrinos at the Swiss-Italian border — have now been retracted. While some error in studies should be tolerated due to mistakes, most is due to fraud and costs the American taxpayer in excess of $28 billion per year alone. Only a third of the 100 studies published in three top psychology journals could be successfully replicated in a large 2015 test. Medicine, epidemiology, population science and nutritional studies fare no better, John Ioannidis (professor of medicine at Stanford University who specializes in the study of scientific studies) said, when attempts are made to replicate them.
“Diet is one of the most horrible areas of biomedical investigation,” professor Ioannidis added — and not just due to conflicts of interest with various food industries. “Measuring diet is extremely difficult,” he stressed. How can we precisely quantify what people eat? In this field, researchers often go in wild search of correlations within huge databases, without so much as a starting hypothesis. Even when the methodology is good, with the gold standard being a study where participants are chosen at random, the execution can fall short.
A famous 2013 study on the benefits of the Mediterranean diet against heart disease had to be retracted 3 years later by the most prestigious of medical journals, the New England Journal of Medicine, because not all participants were randomly recruited; the results have been revised downwards.
Scientists can manipulate data almost any way they deem fit. Data can be excluded, included and re-arranged to support the presupposition of any scientist. This was the case in the global warming hoax as exposed in Climategate when hacked emails showed how scientific data had been manipulated to show the earth was warming, a conclusion not supported by real, unblemished data. Today, we are burdened with the public schools, controlled cable network programs, and other means of information continuing to advance the sacrosanct theories favored by the media and little is known about any science that is banned. Evolution and the big bang continue to be taught in school while creationism is banned, vaccines and pills are pushed from youth up while homeopathic and natural cures are suppressed, 70% of our food contains GMO’s, while all but 5% contains harmful pesticides in the ingredients, and many more frauds are committed for fame and money, or to comply with an agenda necessary for a new world order. Ultimately, its about the social pandering to guys in white lab coats. We’ve made scientists Gods while ignoring that they are people with greed, lust for power, and other very human traits. Eisenhower in his farewell address warned that a “scientific-technological elite” dependent on government money would exert undue influence on government policy. Today we have the best science money can buy. Most grants to scientists and other academics at the university level come from the elite through their control of their foundations (see section on Philanthropy/NGOs). Because of this, the elite steer the direction of research by giving money for certain projects while not funding other avenues of research. All scientists are dependent on these grants and are thus controlled lackeys for the elite. Further, those projects yielding desirable results are snapped up by the elite’s private interests and used to extend their control and dominance and further particular aspects of their agenda. (GlobalistAgenda.org) P-Values Numbers don’t lie, right? Or are scientists intentionally using statistics to mislead us? The American Statistical Association’s (ASA) statement on p-values: context, process,and purpose says that, “Underpinning many published scientific conclusions is the concept of ‘statistical significance,’ typically assessed with an index called the p-value. While the p-value can be a useful statistical measure, it is commonly misused and misinterpreted.” The JAMA Network gives an “analysis of P values reported in MEDLINE abstracts and in PMC articles from 1990-2015” where they conclude that “…almost all abstracts and articles with P values reported statistically significant results, and, in a subgroup analysis, few articles included confidence intervals, Bayes factors, or effect sizes. Rather than reporting isolated P values, articles should include effect sizes and uncertainty metrics.” In the video below, Lissette Padilla explains how science manipulates research with P-Value. https://www.youtube.com/watch?v=kTMHruMz4Is Scientism https://www.youtube.com/watch?v=jjAFqo67yuU According to Discovery Institute, scientism is an effort to use the methods of science to explain and control every part of human life, in other words, the misguided effort to apply science to areas outside its proper bounds. C.S. Lewis was sceptical and highly critical of scientism as an ideology which in his view was confused with science and which tried to reduce everything that we can learn scientifically to materialistic blind undirected causes. He argued that scientism has the dehumanizing impact on ethics, politics, faith, reason, and science itself. Scientism has generally had a close relationship with atheism, as atheism and scientism ideologically support each other. Followers of scientism do not believe in God and therefore use atheism as the base of their religion, and atheists use pseudoscience to support their claims, as well as evidence against God and the Bible. Strict scientism as a worldview is self-refuting since the scientism cannot be proven to be true through science. For other significant problems with scientism as far as its unworkability, please see William Lane Craig’s commentary on scientism entitled Is scientism self-refuting. Since Scientists have an agenda to use “science” to support their denial of God, their techniques usually rely on pseudoscience. For example, the claim to know that God exists, despite the fact that it is technically scientifically impossible to disprove anything (i.e. negative proofs are impossible). Despite this, they continue to deny the existence of God without any real scientific proof. (Conservapedia) Scientism, according to historian T.J. Jackson Lears, is the “faith” that “science has discovered (or is about to discover) all the important truths about human life.” Or, as one leading proponent of scientism—the late Stephen Hawking—put it: “The scientific account is complete. Theology is unnecessary.” (Source) Sources: WakingTimes; How the order Controls Education; Scripture & science See Also:
Newly released information from the Icelandic Met Office states that yet another of Iceland’s sub-glacial volcanoes, Grimsvotn, has quickly increased the magnitude of its geothermal heat flow. This new volcanic activity substantiates that the Okjokull “Funeral” Glacier should not have been laid to rest due to climate change. This is acting to melt the thick layer of overlying glacial ice (see here and see here). This increased heat ...
The World Doctors Alliance is an independent non-profit alliance of doctors, nurses, healthcare professionals and staff around the world who have united in the wake of the Covid-19 response chapter to share experiences with a view to ending all lockdowns and related damaging measures and to re-establish universal health determinance of psychological and physical wellbeing for all humanity. Speakers in order of appearance are: HEIKO SCHÖNING, ...
A new analysis of global sea-level rise rates concludes the rising trend was 1.56 mm/yr−¹ from 1900-2018. This is the same rate as for 1958-2014 (1.5 mm/yr−¹), indicating there has not been a long-term distinctive change in sea-level rise rates in the last 120 years. In 2018, Frederikse et al. assessed the contributing factors to long-term sea-level rise from 1958 to 2014. They determined ice melt and thermal ...
https://www.youtube.com/watch?v=sjYvitCeMPc (Mercola.com) The Doctors for Disaster Preparedness lecture above, given August 16, 2020 in Las Vegas, Nevada, features Dr. Lee Merritt, an orthopedic spinal surgeon with a medical practice in Logan, Iowa. In her presentation, she discusses how geopolitical power can be swayed in the absence of an identifiable army or declared war. She talks about the cognitive dissonance we’re currently facing, when what we’re told no ...
M Fioranelli, A Sepehri, T. Lotti, and M.G. Roccia of the Department of Nuclear, Sub-nuclear and Radiation Physics, G. Marconi University in Rome, Italy; M. Jafferany of Central Michigan University in the U.S.; and O.Y. Olisova and K.M. Lomonosov of the Department of Dermatology and Venereology, I.M. Sechenov First Moscow State Medical University, Moscow, Russia conducted the study. Abstract In this research, we show that 5G millimeter waves ...
In 2005, scientist and futurist Ray Kurweil raised eyebrows with his explosive book The Singularity is Near. Concerning the possibility that humans will “transcend biology,” Kurzweil noted: “The singularity will be a merger of our bodies + minds with our technology. The world will still be human, but transcend our biology’s roots. There will be no distinction between human and machine — nor between physical and virtual reality ...
An influential study which found anti-malaria drug hydroxychloroquine raised the risk of cardiac issues has been retracted by its three authors. The study, published on May 22 in the UK's prestegious Lancet medical journal, relied on bogus data from a company called Surgisphere, which would not transfer the full dataset for an independent review, and "can no longer vouch for the veracity of the primary data sources." While the ...
For those wondering what will come after the Covid19 pandemic has successfully all but shut down the entire world economy, spreading the worst depression since the 1930s, the leaders of the premier globalization NGO, Davos World Economic Forum, have just unveiled the outlines of what we can expect next. These people have decided to use this crisis as an opportunity. On June 3 via their website, ...
(Oct 15, 2020) This week, my colleague and friend Sally Fallon Morell brought to my attention an amazing article put out by the CDC. The link to the article is here, and it was published in June 2020. The purpose of the article was for a group of about 20 virologists to describe the state of the science of the isolation, purification and biological characteristics of ...
Dr. Lawrence M. Sanger, a world-renowned technologist, respected information expert, an in-demand public speaker, and co-founder of the online non-profit encyclopedia Wikipedia, wrote a blog on his website titled 'Wikipedia Is Badly Biased.' Wikipedia’s “NPOV” is dead. The original policy long since forgotten, Wikipedia no longer has an effective neutrality policy. There is a rewritten policy, but it endorses the utterly bankrupt canard that journalists should avoid what they call “false balance.” The ...
” style=”background: #b1d5e5; border-radius: 3px;”>science, literature, and culture France led the world. According to all the most credible accounts by contemporary travelers, France was the place to live in the 18th Century, whatever one’s station in life.
While, in the main, the French people — particularly the peasants and working people — remained staunchly Christian and monarchist, the disaffected nobility and the habitués of the intellectual salons gave sway to libertine passions and head, “new” doctrines. Of the decade preceding the revolution Scott writes:
Strange cults appeared; sex rituals, black magic, Earth life is meant to be a test to see if we are willing to obey God. As immortal spiritual beings, we are given the opportunity to gain a body of flesh and blood, but overcome the passions, appetites, and desires of the natural body. We are spiritual beings going through a mortal experience, or probationary period – not mortal beings that can have spiritual experiences. God knows who we aeach are and what we are capable of. Satan seeks to destroy each of us by enslaving us to sin or those who wish to control us through their own sinful and corrupt ways – having no control of their appetites, passions, and desires – and use or seek power to fulfill their desires. To the Illuminati, Lucifer, or Satan (they are the same thing)—is good. Philosophically, religiously, whatever—it doesn’t matter. Lucifer is good to them. Lucifer is symbolically the savior because of the forbidden knowledge, self-awareness, and intellectual reasoning he (figuratively, metaphorically, or literally) gives humans with the ability to think rationally and this elevates them to a God among all other animals on earth. Lucifer, and the Illuminated have monopolized truth. They monopolize truth by deceiving the masses with pseudoscience, false reality, and distracting them with mundane things. The illuminated reveal only portions of knowledge (originally revealed by the true God, but stolen and monopolized) to those who are sworn to secrecy. Those introduced to it and show a propensity for corruption are given more and more knowledge as they go deeper and deeper into the occult religions of Luciferianism and Satanism.
“Thus “SATAN,” once he ceases to be viewed in the superstitious, dogmatic, unphilosophical spirit of the Churches, grows into the grandiose image of one who made of terrestrial a divine MAN; who gave him, throughout the long cycle of Maha-kalpa the law of the Spirit of Life, and made him free from the Sin of Ignorance, hence of death.” (Blavatsky, Helena – The Secret Doctrine V I p. 198) “Thus Lucifer – the spirit of Intellectual Enlightenment and Freedom of Thought – is metaphorically the guiding beacon, which helps man to find his way through the rocks and sand banks of Life, for Lucifer is the Logos in his highest.” – Blavatsky, H.P. – The Secret Doctrine v. II p. 162
Satanic Rituals Since the devil and his angels were cast out of Heaven, they weren’t given the opportunity to have a physical body of flesh and bones, but they often seek to possess the bodies of mortal beings. There are many such instances recorded in scripture (Matt. 9:32; 12:22; Mark 1:24; 5:7; Luke 8:30; Acts 19:15). In Ancient Egypt, Satan promised an alliance to a few people who became the Mystery School members, and are known as the Brotherhood of the “Children of the Fire”. According to author and former high-ranking Satanist Daniel Mastral, there are two kinds of portals where these cast down demons seek to possess human bodies:
Portals to the body which allow demons to interact and control humans through demonic possession. The most basic ritual is channeling, where a medium lets a spirit talk through his mouth, dispensing counseling and commands. Blood sacrifices, symbols, music, drugs and special meditation permit a higher level of demonic attachment and consequently, more spiritual powers to the follower. These powers are the classic occult tricks of divination, telepathy (in fact messages delivered by demons), creation of fire, telekinesis, etc. These are not enhancements on the individual, but merely deeds done by spirits to look like the person has “evolved”. More advanced followers can leave their bodies and perform astral projection, where they move around in their spirits, while their bodies are resting. In this condition, they can also visit and interact with demonic spirits. The whole hierarchy in Satanism depends on power and the level of the demon who is “residing” with the person, his protector. Usually people with long family ties with the occult have the most powerful demons by their sides. Strong demons can indeed inflict disease and create accidents, and fights among satanists are common. Fortunately, they can’t harm true Christians, who are protected by the Holy Spirit and angels from God.
Portal to Earth are more complicated. According to Mastral, reality is comprised of nine dimensions which overlap in space but are separated in practice. He gives us the metaphor of an elevator. Spirits from more elevated dimensions can go down to lower floors, but no one can go up. We live in the fourth dimension. Below us there are several powerful demons who have been imprisoned by God as judgement. Lucifer is the only evil spirit to visit the ninth and highest plane. Some portals are temporary and some, the most important ones, are permanent. Temporary portals depend on exact timing and special alignment of the dimensions, and this knowledge is beyond our science or perception. That’s why occultists obsess with numerology, gematria and astrology; for these are the tools that allow the calculations to be performed in order to profit from the portals to contact high level spirits.
Blood Sacrifices Evil spirits cannot manifest in the middle of Fifth Avenue. They need the strong energy created in blood rituals in order to materialize. But once the ritual ends, they must go. More stable contact can only be achieved through portals. Permanent portals are the main objective of Satanists (they like to be called children of Lucifér, with stress in the last syllable). According to Mastral, there are 90 of them, and 72 have been opened by the turn of the century. Nine more had been opened by 2006 and the last the last nine were apparently in 2013. The exact conditions for the openings of these portals are known only to few witches of the highest rank. We can expect that they require huge amounts of human sacrifice and psychic energy. A great honor given to a Satanists is to be able to pass through one of these portals and meet demonic powers in their “home turf”. In this process, there is a temporal shift, with minutes on Earth meaning hours in the other plane (much like what happens in “alien” abductions). Satan’s hope is that with the opening of the last portals, powerful demons from lower dimensions will be able to come to earth and eventually, interact with humankind. They will not present themselves as demons, but as benevolent aliens and evolved spirits of light. In Revelations 9:1-2, John witnesses Satan turn the key to unleash the very powers of hell on an unsuspecting world. Satan’s intent is to destroy the earth, and so too those that serve him. Previously, God has overmastered the plagues through his destroying angels, but Satan is permitted to direct operations from this point bringing the misery that fuels hell to the surface of the earth. The Greek for the KJV phrase “the key to the bottomless pit” literally translates to “the key to the shaft of the abyss,” the shaft, or portal, that leads to hell. Satan, the great deceiver and counterfeiter
The devil did not invent spirit possession. Jesus offers us oneness with Him. This is the kind of possession God has planned for fulfillment and happiness in our lives. Satan always counterfeits every good thing, and in this case, he uses the very mechanisms to take control of man that God has provided for us to have complete possession by Him.
What is involved is the influence of some supernatural being in the lives of people. In order for this to take place, some form of communication must occur in the form of the transfer of thoughts and feelings. Consider the following statement: “The brain nerves that connect with the whole system are the medium through which heaven communicates with man and affects the inmost life.” (Education, 209) God created in us a mechanism whereby the Holy Spirit can communicate directly with each of us. This is a Biblical concept: “Know ye not that ye are the temple of God, and that the Spirit of God dwelleth in you?” 1 Corinthians 3:16.
Satan tries to imitate the work of God by transforming himself nigh unto an angel of light (2 Cor. 11:12–15) thus deceiving his followers that he is god and the giver of light and knowledge. He is also a worker of miracles, by which he deceives many upon the earth (Rev. 13:1–15). In fact, John says that in the last days he ‘deceives the whole world’ (Rev. 12:9). He can cite scripture to make his point seem plausible (Matt. 4:1–11). He tries to persuade us to do evil, and to make those choices that will finally give him the mastery he was denied in the premortal existence—to have all power over us, to lead us captive at his will. All of this is his scheme to make man miserable like himself. He has a counterfeit for everything as the adversary of opposition, an essential element in gaining true knowledge and understanding as man could not know hot if he did not know cold, good if he did not know evil and its consequences. Thus God must allow both good and bad in this world for our own benefit or destruction. He seeks to build his counterfeit kingdom which imitates the kingdom set up by the true God of this world, Jesus Christ, with his Councils of 13 vs Christ’s 12 apostles; he and his 2 beasts (one from the sea and one from the land) vs the true Godhead (God the Father, Jesus Christ, and the Holy Ghost); his evil rituals vs the sacred rituals of Christ’s temples; his counterfeit principles (lust vs love, temporal gratification vs eternal glory, indulgence vs discipline, his scientific and medical miracles (typically fraudulent) vs unexplainable miracles that can only be the work of deity; immunity from sin (those in power don’t prosecute their own) vs forgiveness of sins from Christ (the only One worthy to excuse sin through His Eternal sacrifice); and many more counterfeits all meant to enslave mankind and bring about his evil designs. By “worshiping” Satan and turning one’s back on God’s rules, it is possible to gain control over vast empires and gather enormous riches (see Matt 4:8-9 where Satan tempts even Christ with this counterfeit glory). But these gains come with a price which is not always seen at the time. Later, when repercussions come from breaking the rules, the empire and riches one had gained will become their very undoing. Hybrids and DNA Mastral tells us that some human individuals are indeed empowered by changes in their DNA. This can happen in three ways: demonic sexual spirits (incubus and succubus) can transport semen among humans; a demon possessed man can fertilize a woman, or, very rarely, a couple can pass through a portal and have sex in the other side. In all cases, the higher energy affects the embryo’s DNA in a way that makes it easier for the individual to interact with spirits and be a channel for more powerful psychic powers. Normal people can’t stand perfect possession from high level demons, the body would die, and that’s why channelers are always exhausted after a “session”. The Satanists’ goal is to eventually perfect a human who can stand a complete possession from a very high demon and exhibit powers never seen on Earth. This person may even exist today, and he will be the antichrist. Even if you don’t believe in this weird spiritual reality, you should be very concerned that our globalist elite do, and that they require human blood for their plans. We live in the age of Alice Bailey’s Externalization of the Hierarchy, when centuries-old occult secrets will be revealed. The bad guys know that we know what they are doing, and we should expect open war soon. However, this is not a material war; it is a spiritual one: we have God on our side and his holy angels to protect us. Mastral himself decided to leave the group when he faced the fact that demons could not touch Christians. Satan knows he will be defeated, and wants to take as many as he can with him, while deceiving them with the promise of victory over God. Ultimately, we have to remember Jesus’ words: “I am the Way […] none comes to the Father but through Me”. God has given us a “portal” to a higher dimension and perfect evolution, through the sacrifice of His Son.
Recommended Reading:
The Dark Gods, by Anthony Roberts and Geoff Gilbertson
A high-level Livingston Parish Sheriff’s Office deputy — who commanded the SWAT team — and his wife have been indicted this week on more than 150 felonies for unspeakable crimes against children. Dennis Perkins, 44, and his wife Cynthia Perkins, 34, are accused of multiple counts of child rape and the production of child pornography, among other disturbing charges. In October, the couple was arrested after ...
The more TV we watch the more we prefer thinner female bodies, according to a new comprehensive study on body image. The researchers are calling on TV and advertising bosses to show people of all shapes and sizes in order to reduce the pressure on women and girls to aspire to a 'thin ideal body'. The team, led by Durham University, worked with men and women ...
Skylar Cason is typical a 16-year old attending classes at Steamboat Springs High School, but material taught during one of her classes is landing the student in the middle of a potential federal legal battle with the Steamboat Springs School District Re-2. Cason chose an elective class, “Music Literature,” because she “loves literature and music.” It seemed like a perfect fit until a partial poem was ...
Kanye West says that parents need to protect their children from being ‘indoctrinated’ into embracing lives of vapid meaninglessness by the media and the entertainment industry. The music icon was speaking to an audience at Joel Osteen’s church in Houston during one of his Sunday Service events. He began by pointing out that many famous people are in service to Satan and not God because they ...
Embattled Democratic Congressman Adam Schiff was dressed in ancient-Egyptian-themed garb at two wild costume parties at Ed Buck’s meth and sex mansion, according to a Clinton Whistleblower and insider. And the FBI is probing Schiff, who is now the target of a federal investigation focused on the Congressman’s more-than-frequent trips to Ed Buck’s meth mansion. Buck is a high-profile, millionaire Democratic benefactor who has contributed and ...
The Navy Chief at the Naval Academy sent this email: A few minutes later, the Chief who authored that e-mail sent this follow-up: (Readers, these were sent to me as screenshots. I can’t copy-and-paste in a more readable format. If you are having trouble reading it, the gist is that the Chief is a confessed Satanist, and is inviting others at the USNA to participate in ...
Fox News has cut ties with radio host Todd Starnes after a guest of his show claimed that Democrats worship Moloch, the bull god of child sacrifice. During a pro-life discussion on the Fox Nation program “Todd Starnes Show” Wednesday, guest Dr. Robert Jeffress, a pastor whom Trump retweeted on Tuesday, said that the Democrats reject Christianity in favor of Moloch, the deity of child sacrifice ...
A gigantic statue of a pagan Canaanite deity known as “Molech” was erected right at the entrance of the Colosseum in Rome prior to an exhibit that runs through March 2020. In ancient times, those that served Molech would literally sacrifice their children to him, and apparently this involved burning them to death. And now a massive statue of this pagan idol is the centerpiece of ...
Watching awards shows is an act of self-sacrifice that I suffer through a few times a year for the benefit of this site’s loyal readers. Although I strongly dislike sitting through these seemingly endless hours of televised garbage, I believe it is crucial to report on the messages that are being promoted throughout. Because, while most media sources focus their “coverage” on random items such as ...
The mass shooter in Dayton, Ohio was identified by police as Connor Betts, who was shot dead by police within seconds, but not before he killed nine innocent people including his own younger sister. The brother and sister drove together to Dayton's Oregon District, an entertainment area with bars and restaurants, sometime Saturday night. Once there, they went their separate ways, police said. The shooting started ...
” style=”background: #b1d5e5; border-radius: 3px;”>Satanism. Perversion became not only acceptable but fashionable. Homosexuals held public balls to which heterosexuals were invited and the police guarded their carriages. Prostitutes were admired; swindles and sharp business practices increased. Political clubs of the more radical sort proliferated. The Freemasons, whose lodges ranged from the sedate to the wild-eyed, extended across the nation. There were hundreds of such lodges in Paris alone, and thousands throughout the country. The air grew thick with plans to restructure and reconstruct all traditional French society and institutions.
Today, France is a leading member of the European Union, an economic and political union founded in 1952 as the European Coal and Steel Community. France’s current constitutional structure, called the Fifth Republic, was introduced in 1958. It features a president elected to a five-year term of office. The French national currency, or franc, was phased out in 1999-2002 and replaced by the euro. France is the world’s most popular tourist destination with 80 million visitors in 2011.
Since prehistoric times, France has been a crossroads of trade, travel, and migration. Three basic European ethnic stocks—Celtic, Latin, and Teutonic (Frankish)–have blended over the centuries to make up its present population. France’s birth rate was among the highest in Europe from 1945 until the late 1960s. Since then, its birth rate has fallen but remains higher than that of most other west European countries. Traditionally, France has had a high level of immigration. More than 1 million Muslims immigrated in the 1960s and early 1970s from North Africa, especially Algeria; their numbers are now above 5 million (2004 figure).
In a January 2012 poll, 31% percent of respondents indicated they were Roman Catholic, including those who never attend religious services. Of Catholics, only 4% went to Church regularly—mainly to Sunday Mass or christenings. There is a cultural particularism in France : a large percentage (30%) of people, calling themselves Catholics, don’t believe in God, nor in any kind of spiritual lifeforce. They endorse Catholicism’s moral teachings, and view Catholic dogma as a tradition.
France has seen several recent false flag attacks recently with Charlie Hebdo, the Bastille Day terror in Nice, and the Terror attacks in Paris in November 2015. These events were used to push through Surveillance State, Skype, Google, Netflix, and the Internet of Things all Predicted over 50 Years AgoThough invented by the government for the military, the internet would end up being useful to the US military, but it didn’t really take off until it became civilianized and commercialized – a phenomenon that the Arpa researchers of the 1970s could never have anticipated. “Quite honestly, if anyone would have said they could have imagined the internet of today in those days, they’re lying,” says Don Nielson who was at the Rossotti’s in ’76. What surprised him most was how “willing people were to spend money to put themselves on the internet”. “Everybody wanted to be there,” he says. “That was absolutely startling to me: the clamor of wanting to be present in this new world.” Perhaps to Neilson’s surprise, someone came close to imagining todays internet. An article in a 1965 edition of Eagle, a British comic book, predicted the arrival of the Internet with stunning accuracy, including services similar to Skype, Netflix, Kindle, Google, and even the “Internet of things” where every home appliance is linked to the world wide web. The article, entitled Computers for Everyone, predicted “world knowledge at your fingertips….as early as the 1990’s. …How would you like to be able to solve any mathematical problem in a fraction of a second: summon any page of any book or newspaper instantly before your eyes: have all factual information known to man at your own fingertips – all without leaving your own living room? This fantastic dream of scientific achievement may come true by the 1990s if a plan now being worked on by top scientists in this country and the U.S.A. is successful,” states the article. “Your TV set, your telephone, your electricity and gas meters, and your typewriter, tape-recorder and record player. All these things will be as out of date as the gas-lamp is today, for the computer will control all power supplies to your house, your videophone link and multi-channel TV signal,” states the article. The piece goes on to assert that the miniaturization process will solve the problem of computers being the size of rooms, while the “installation of the complex nationwide network of connections between the computers” will be the biggest challenge. The arrival of high speed fiber optic connections is even predicted when the article speaks of a new system that, “carries thousands of times more information than a cable at close to the speed of light.”
The article predicted at least seven fundamental aspects of the Internet, some of which are still only in their early stages today, a full four years before the very first arcane Internet-style communications were even tested, three decades before the Internet became accessible for the general public, and four decades before we saw services like Skype, Netflix and so-called ‘smart’ products.
“World knowledge at your fingertips” (the search engine).
“Summon any page of any book or newspaper instantly before your eyes” (Kindle).
“The computer will control all power supplies to your house” (smart home, Internet of things).
“Videophone” (Skype).
“Multi-channel TV signal” (Netflix, Internet TVs).
Computers/Internet to replace “Tape recorder and record player” (Spotify, iTunes).
Network to operate at speed of light (fiber optic).
All of these were predicted more than 50 years ago by a children’s comic book! Weird, but true.
Back in 1967, the ARPANET was still another two years away from making its first connection. But Arthur Miller (a law professor at the University of Michigan, not the playwright) foresaw the dangers of networked computing, an irresistible temptation for the development of a surveillance state by any tech-savvy government left unchecked by its people. Miller describes a dystopian world where computers can store vast amounts of personal, medical and financial data. He warns that while this information could prove incredibly useful, it could easily become vulnerable to nefarious entities in the government, private industry, or even individuals. “Even the most innocuous of centers,” Miller writes, “could provide the ‘foot in the door’ for the development of an individualized computer-based federal snooping system.”
There are further dangers. The very existence of a National Data Center may encourage certain federal officials to engage in questionable surveillance tactics. For example, optical scanners — devices with the capacity to read a variety of type fonts or handwriting at fantastic rates of speed — could be used to monitor our mail. By linking scanners with a computer system, the information drawn in by the scanner would be converted into machine-readable form and transferred into the subject’s file in the National Data Center. Then, with sophisticated programming, the dossiers of all of the surveillance subject’s correspondents could be produced at the touch of a button, and an appropriate entry — perhaps “associates with known criminals” — could be added to all of them. As a result, someone who simply exchanges Christmas cards with a person whose mail is being monitored might find himself under surveillance or might be turned down when he applies for a job with the government or requests a government grant or applies for some other governmental benefit. An untested, impersonal, and erroneous computer entry such as “associates with known criminals” has marked him, and he is helpless to rectify the situation. Indeed, it is likely that he would not even be aware that the entry existed. These tactics, as well as the possibility of coupling wiretapping and computer processing, undoubtedly will be extremely attractive to overzealous law-enforcement officers. Similarly, the ability to transfer into the National Data Center quantities of information maintained in nonfederal files — credit ratings, educational information from schools and universities, local and state tax information, and medical records — will enable governmental snoopers to obtain data that they have no authority to secure on their own.
By the end of his article, Miller calls for legislation to protect the data of American citizens. Miller wasn’t the only one calling for privacy legislation around this time. The following year, Paul Armer of the RAND Corporation would testify in front of a Senate subcommittee raising some of the very same concerns about the emergence of a snooper society. In fact, I wouldn’t be surprised if Armer read Miller’s article. Miller’s article appeared in the November 1967 issue of The Atlantic, over 50 years ago! But needless to say, that art would fit in nicely with the newsstands of today. Just check out the latest issue of The New Yorker. Wired Networks are Still Better Than Wi-Fi I’m sure everyone has had issues trying to connect to a wireless network. And when (not if, when) you have an issue, it’s nigh impossible to troubleshoot. And that’s just connecting to a wireless network, trying to set one up can cause all sorts of headaches. Not to mention the constantly changing standards for network encryption. Wireless networks are prone to a variety of connection issues, particularly if you try to access the network at the edge of its wireless range. It’s also not uncommon for the router to crash and need to be reset. Wired networks hardly ever go down unless the power goes out in the entire building. Wireless networks also have issues when things like walls get in the way of the signal. With modern Ethernet connections you can get speeds of up to 1 Gigabit per second. That’s more than three times the speed of the fastest Wi-Fi connections out there. And let’s face it, wireless networks aren’t very safe. That’s why we have to keep changing the encryption standards. Even when companies and schools pay exorbitant prices to secure their wireless networks up to high heaven, they can still get hacked, and the average person’s security doesn’t come anywhere close to those institutions. The Internet Digital Prison The more you participate in the automatic information fed directly to your devices that are personalizing your news, entertainment, business, and “life-patterns”, the more you will think you are free and fully informed. Actually, you will become more and more limited by what your pattern-of-life generates as your individualized algorithms. A mechanical virtual world will be created around you that becomes your personalized digital prison that, at first, may seem like digital heaven, but later rear its ugly head of control and enslavement. By then, it will be too late for any of us to break free. Your new digital prison is being created every time you do an internet search, click a ‘like’ button on Facebook, type a phrase into your computer, choose something to watch on television, or speak a word into your phone. Every speck of “information” that you participate in is used to make your personalized digital life-pattern profile. Even your bank account and everything you spend is being gathered in an NSA program called Marina[1] that knows so much about you that when you get into your car on a day you have a weekly appointment, your phone automatically pings the route and distance to your destination. Your phone can also activate all your devices that are connected to the Internet of Things. As you approach your house with your phone, your garage door opens automatically as the lights in the house come on and the house alarm is turned off while your coffee maker starts and your TV comes on with your usual show as the heating pad in your easy chair turns on to your favorite setting. There is no end to the “machine intelligence” support you can get from mechanically augmented reality. And now Facebook and its fake, phoney, stooge inventor Mark Zuckerberg wants you to put on a 3-D visor and enter a self-created virtual reality world where it feels you are free to do as you please. We have created this world by being lazy and not asking the hard questions—who owns and controls this technology, what is the ultimate goal of the Internet of Things, does this technology serve or enslave humanity? Eric Schmidt, the CEO of Alphabet has bragged about this new system that claims it is ‘ready to go’. Google, somehow, morphed into a “mother company” that is named Alphabet which owns all 26 subsidiaries of Google, including the only AI on the planet called Google Deep Mind. Alphabet seems to have unlimited money and unlimited technology patents that are supported wholesale by Wall Street and the U.S. military-industrial complex. Essentially, Google has always been owned and operated by the dark side of our military-industrial complex. Like Cisco Systems, Inc. before them, Google (Alphabet) was incubated through the U.S. Defense Advance Research Project Agency (DARPA) and the CIA’s private corporate venture capital company called In-Q-Tel. (Ask yourself how it is that a government entity can hold private companies and enjoy private profits outside of Congressional oversight, but we digress.) Google, Cisco, Facebook, Twitter, and most other search engines and social networks all run on allegedly “open source” code given out by DARPA/In-Q-Tel to universities and corporations to develop. Open source means free to the user without the need to pay royalties or fees to the inventor or creator. Basically, whoever is able to take this weaponized open source code (with encryption back door keys already built in) and develop it for the consumer wins the military contracts. Then Wall Street (Goldman Sachs and JPMorgan Chase usually) sweep in with venture capital, and within a few years values the new tech company in the tens and hundreds of billions. After that, the banks then loan whatever money these companies need to buy out all their competition. These newly acquired “Silicon Valley corporate stooges” then become even more front-men for even more weaponized military systems. This now includes Facebook, LinkedIn, Instagram, Pinterest, YouTube, Tumblr and Amazon. Whether you know it or not, what is described above is already happening on a commercial level and soon will escalate to an overt military level while the innocent internet user is lulled into believing that he is simply having fun. Since most American and global businesses have some component on the internet, the militarization of the internet can be as powerful as the threat of global nuclear annihilation. Just imagine if the internet was turned off tomorrow – permanently, never to return. Most of what we think of as modern life would end, and many people would never recover. Economies would collapse, wars would rage, and many of us wouldn’t know what to do or what to think. Modern life would collapse because the weapon of the internet already controls modern life. The life of the pygmy in Indonesia would go on uninterrupted, but American life would screech to a halt. We might not be able to “reboot” for years. This thought begs the question, “How did we let this happen?” “We”, the users of the Internet and all things digital, were happy to use the new technology without asking basic questions like: Who actually owns the cables the Internet travels through? Can “they” turn it off? Why was so much power given over to the internet? At this point, is there an alternative or way out of this digital? The answers to the questions above can be given, and there is a solution to this looming problem. But first we must see the internet and all of its “wonders” for exactly what they are – weapons of mass social manipulation. When we can see the evil plans of those who have advanced this technology without the moral compass necessary to guide such powerful tools, then perhaps we can change these innovations from weapons into the information tools that they were intended to be. Information was supposed to free humanity, not imprison it in a virtual world where education is replaced by nonsensical entertainment, religion is replaced by consumerism, and the real world by virtual reality.Patent Theft and Weaponization of the Internet Not counting the social networking technology that was stolen, taxpayers of the United States, through the CIA’s private venture capital company In-Q-tel, largely funded the open source program that became Facebook, Google, Intel, Apple, and Microsoft. These companies have weaponized these devices and systems against the citizens of the world.
‘WE THE PEOPLE’ DEMAND THAT THESE COMPANIES, AND ANY OTHER LIKE THEM THAT HAVE BEEN FINANCIALLY SEEDED AND FUNDED BY U.S. TAXPAYERS, BE GIVEN TO THE PEOPLE AS A PUBLIC UTILITY AND THAT THE FICTITIOUS OWNERS OF THESE COMPANIES BE PROSECUTED FOR PATENT INFRINGEMENT AND/OR THEFT.
In numerous articles from Americans for Innovation, the Anonymous Patriots have found unequivocal evidence that IBM’s Eclipse Foundation stole the original ideas and source code for Google and Facebook from Columbus, OH innovator Leader Technologies, Inc. through their patent attorney James P. Chandler III. Chandler was mentor of Barack Obama, Eric Holder, Robert Mueller, James Comey and John Podesta, to name but a few. Chandler represented Leader Technologies, Inc. from the moment Leader realized their innovations were patentable in early 2000. But rather than file the patents immediately, Chandler suspiciously advised Leader to “reduce to practice” the invention before he would file them. Hindsight shows that Chandler gave that advice in order to steal the actual source code when it was ready. Chandler bamboozled Leader into taking custody of a copy of the source code in 2002 which he immediately gave to the IBM Eclipse Foundation which then disseminated it to Zuckerberg/Facebook and other companies. David J. Kappos, IBM’s attorney (who also served later as Obama’s Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office from 2009 to 2013) was also a student of Chandler at the time of the theft. This theft is one of if not the largest theft of intellectual property and trade secrets in history. It was clearly part of the the weaponization of these digital platforms. For more information, please see our Citizens Intelligence Reports on these subjects:
Once the Silicon Valley high-tech “dummy” companies are established by stooges who are pre-selected for their willingness to incorporate military “back doors” into all of their products, the NSA/CIA/FBI uses the information gleaned from those companies to surveil every American through every device that broadcasts a signal – phone, computer, or any device on the Internet of Things. Any intelligence agency can simply type in a query and access the metadata collected from every digital device on the internet or that uses Wi-Fi or cell phone towers. Among these spying tools is the RIOT (Rapid Information Overlay Technology]) program by Raytheon which leaked to the public on Nov. 16, 2010.[2] This information is used to target individuals for consumer behaviors as well as DoD intelligence collection. If an internet user is targeted, there are hundreds of ways to “attack” the user and manipulate his/her buying habits, personal life-pattern choices, and even the way the user thinks.
THE OBJECT OF THE INTELLIGENCE IS SIMPLE: CONTROL THE USER. SOCIAL NETWORKS ON THE INTERNET ARE MILITARY EXPERIMENTS IN SOCIAL MANIPULATION. THIS IS WHAT IS CALLED PSYOPS – OR PSYCHOLOGICAL OPERATIONS.
Another program used to gather the Internet metadata is XKeyscore, a secret computer system first used by the NSA for searching and analyzing global Internet data, which it collects on a daily basis. It enables almost unlimited surveillance of anyone anywhere in the world. The NSA’s databank of collected communications allows its analysts to listen to the calls or read the emails of everything that the NSA has stored. It can also access your browsing histories or Google search terms that you’ve entered, and can alert them to any further activity that people connected to that email address or that IP address do in the future. XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects ALL data, on EVERYBODY, ALL THE TIME.[3] Another component of NSA data collection is a program called Marina, a database and analysis tool set for intercepted internet metadata. The database stores metadata up to a year. The Marina metadata application tracks a user’s browser experience, gathers contact information/content and develops summaries of the target. It also has the capability to look back on the last 365 days’ worth of metadata seen by the collection system, whether or not the target was tasked for collection. The stored metadata is mainly used for pattern-of-life analysis.
AMERICANS ARE NOT EXEMPT BECAUSE METADATA IS NOT CONSIDERED DATA BY U.S. LAW. (SEE SECTION 702 OF THE FISA AMENDMENTS ACT).
Once the data is collected and can be queried and targeted, the data is then stored in an NSA program called Sentient World Simulation (SWS). This program is developing a parallel to Planet Earth, with billions of individual nodes (prisons) to reflect every man, woman, and child. SWS will be a synthetic mirror of the real world with automated continuous calibration with respect to current real-world information. It provides an environment for testing psychological operations so that military leaders can develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners, including U.S. citizens. SWS also mimics financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers can predict how individuals and mobs will respond to various stressors. These four programs – XKeyscore, Marina, RIOT, and Sentient World Simulation – create some of the environments which intend to imprison and control those who willingly enter into the digital virtual reality of the internet. The internet is a WARZONE according to the people who created and weaponized it. Notice that the description of SWS says that even “neutrals” are the target of these systems. No one is safe from the surveillance, monitoring, targeting, and attacks of Facebook, Twitter, Google and Alphabet. Just look how President Donald Trump uses Twitter as a weapon against the corporate media. There is a battle for information and every person is in the middle of the battle whether they like it or not. The largest domestic military exercises in US history happened in 2015. They were entitled: “Jade Helm 2015 – Master the Human Domain.” Just the very name of the exercise should show you where the U.S. military is focusing its time and energy– on U.S. citizens. It also clearly tells us the intent of the U.S. military is – to Master the Human Domain. So much for America freedom and liberty.
SOME HISTORY ABOUT DARPA/IN-Q-TEL “FRONT MEN”
The Defense Advanced Research Projects Agency (DARPA) has controlled technological innovation since 1958 when it was created by the military-driven Department of Defense. DARPA is the father of war-fighting, both conventional and digital. DARPA was controlled by a man they called “Yoda”, who leads a group called the Highlands Forum that directs all military research and development – the weaponization of every U.S. patent, over 4,000 of which have been stolen. DARPA’s history is littered with death and destruction. DARPA and In-Q-Tel, through the Highlands Forum, have driven research and development for the military that has cost American taxpayers trillions. This same technology is also shared with countries throughout the world through open source sharing. The U. S. military wants our enemies to have the technology so that it can spy upon them and keep up with them in weaponry. If both sides have the same technology and weapons, then more money needs to be spent on bigger and better weapons continually and the military industrial complex thrives and gets richer.
THEIR BUSINESS PLAN IS SIMPLE: MAKE SURE THE CUSTOMER HAS A NEED FOR MILITARY PRODUCTS AND SERVICES BY SUPPLYING THEIR ENEMIES WITH COMPETING PRODUCTS AND SERVICES, A BUSINESS CYCLE THAT NEVER STOPS AND GUARANTEES THAT THE MILITARY INDUSTRIAL COMPLEX WILL ALWAYS BE SELLING SOMETHING TO SOMEONE.
Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the companies who then are the “front” for a DARPA sponsored company. DARPA and In-Q-Tel keep the encryption codes and build in backdoor keys so that they can always control the military weapons that have been released into the corporate world for public use. According to DARPA and In-Q-Tel, innovation and technological advances must first be a weapon that can be controlled by its makers – the military. The Highland Forum directed the creation of weapons of every sort that have been released into the corporate world and now control your laptop, phone, computer, and every other device with a “bugged” microprocessor inside. Intel microprocessors are found in most of our “private” digital devices and are, in fact, collecting “intelligence” for the Department of Defense, CIA, and NSA. DARPA/In-Q-Tel and the Highlands Forum drive the process of continuous war from creating the devices that control all nuclear weapons to incubating the technologies that created the Internet, Intel microprocessers, Cisco routers, Google search engines, Facebook social networks, the IBM Internet of Things, cellphones, Microsoft software, MacAfee security software, and all other commercial and military warfare devices using their source code. The Highlands Forum has been the headquarters of weaponizing military patents, intellectual property and trade secrets for five decades. Andrew Marshall has the blood of millions on his hands, yet he is considered an America hero instead of a warlord criminal. Though all manner of utopian myths surround the early Internet, and by extension its forerunner, Yasha Levine (‘Surveillance Valley: The Secret Military History of the Internet‘) highlights that “surveillance was baked in from the very beginning” (75). What is particularly noteworthy in Levine’s account is his emphasis on early pushback to ARPANET, an often forgotten series of occurrences that certainly deserves a book of its own. Levine describes students in the 1960s who saw in early ARPANET projects “a networked system of surveillance, political control, and military conquest being quietly assembled by diligent researchers and engineers at college campuses around the country,” and as Levine provocatively adds, “the college kids had a point” (64). Similarly, Levine highlights NBC reporting from 1975 on the CIA and NSA spying on Americans by utilizing ARPANET, and on the efforts of Senators to rein in these projects. Though Levine is not presenting, nor is he claiming to present, a comprehensive history of pushback and resistance, his account makes it clear that liberatory claims regarding technology were often met with skepticism. And much of that skepticism proved to be highly prescient. Case in point, the largely forgotten CONUS Intel program that gathered information on millions of Americans. By encoding this information on IBM punch cards, which were then fed into a computer, law enforcement groups and the army were able to access information not only regarding criminal activity, but activities protected by the first amendment. As news of these databases reached the public they generated fears of a high-tech surveillance society, leading some Senators, such as Sam Ervin, to push back against the program. And in a foreshadowing of further things to come, “the army promised to destroy the surveillance files, but the Senate could not obtain definitive proof that the files were ever fully expunged,” (87). Though there were concerns about the surveillance potential of ARPANET, its growing power was hardly checked, and more government agencies began building their own subnetworks (PRNET, SATNET). Yet, as they relied on different protocols, these networks could not connect to each other, until TCP/IP “the same basic network language that powers the Internet today” (95), allowed them to do so. Yet surveillance of citizens, and public pushback against computerized control, is not the grand origin story that most people are familiar with when it comes to the Internet. Instead the story that gets told is one whereby a military technology is filtered through the sieve of a very selective segment of the 1960s counterculture to allow it to emerge with some rebellious credibility. This view, owing much to Stewart Brand, transformed the nascent Internet from a military technology into a technology for everybody “that just happened to be run by the Pentagon” (106). Brand played a prominent and public role in rebranding the computer, as well as those working on the computers – turning these cold calculating machines into doors to utopia, and portraying computer programmers and entrepreneurs as the real heroes of the counterculture. In the process the military nature of these machines disappeared behind a tie-dyed shirt, and the fears of a surveillance society were displaced by hip promises of total freedom. The government links to the network were further hidden as ARPANET slowly morphed into the privatized commercial system we know as the Internet. It may seem mind boggling that the Internet was simply given away with “no real public debate, no discussion, no dissension, and no oversight” (121), but it is worth remembering that this was not the Internet we know. Rather it was how the myth of the Internet we know was built. A myth that combined, as was best demonstrated by Wired magazine, “an unquestioning belief in the ultimate goodness and rightness of markets and decentralized computer technology, no matter how it was used” (133). The shift from ARPANET to the early Internet to the Internet of today presents a steadily unfolding tale wherein the result is that, today, “the Internet is like a giant, unseen blob that engulfs the modern world” (169). And in terms of this “engulfing” it is difficult to not think of a handful of giant tech companies (Amazon, Facebook, Apple, eBay, Google) who are responsible for much of that. In the present Internet atmosphere people have become largely inured to the almost clichéd canard that “if you’re not paying, you are the product,” but what this represents is how people have, largely, come to accept that the Internet is one big surveillance machine. Of course, feeding information to the giants made a sort of sense, many people (at least early on) seem to have been genuinely taken in by Google’s “Don’t Be Evil” image, and they saw themselves as the beneficiaries of the fact that “the more Google knew about someone, the better its search results would be” (150). The key insight that firms like Google seem to have understood is that a lot can be learned about a person based on what they do online (especially when they think no one is watching) – what people search for, what sites people visit, what people buy. And most importantly, what these companies understand is that “everything that people do online leaves a trail of data” (169), and controlling that data is power. These companies “know us intimately, even the things that we hide from those closest to us” (171). ARPANET found itself embroiled in a major scandal, at its time, when it was revealed how it was being used to gather information on and monitor regular people going about their lives – and it may well be that “in a lot of ways” the Internet “hasn’t changed much from its ARPANET days. It’s just gotten more powerful” (168). But even as people have come to gradually accept, by their actions if not necessarily by their beliefs, that the Internet is one big surveillance machine – periodically events still puncture this complacency. Case in point: Edward Snowden’s revelations about the NSA which splashed the scale of Internet assisted surveillance across the front pages of the world’s newspapers. Reporting linked to the documents Snowden leaked revealed how “the NSA had turned Silicon Valley’s globe-spanning platforms into a de facto intelligence collection apparatus” (193), and these documents exposed “the symbiotic relationship between Silicon Valley and the US government” (194). And yet, in the ensuing brouhaha, Silicon Valley was largely able to paint itself as the victim. Levine attributes some of this to Snowden’s own libertarian political bent, as he became a cult hero amongst technophiles, cypher-punks, and Internet advocates, “he swept Silicon Valley’s role in Internet surveillance under the rug” (199), while advancing a libertarian belief in “the utopian promise of computer networks” (200) similar to that professed by Steward Brand. In many ways Snowden appeared as the perfect heir apparent to the early techno-libertarians, especially as he (like them) focused less on mass political action and instead more on doubling-down on the idea that salvation would come through technology. And Snowden’s technology of choice was Tor. While Tor may project itself as a solution to surveillance, and be touted as such by many of its staunchest advocates, Levine casts doubt on this. Noting that, “Tor works only if people are dedicated to maintaining a strict anonymous Internet routine,” one consisting of dummy e-mail accounts and all transactions carried out in Bitcoin, Levine suggests that what Tor offers is “a false sense of privacy” (213). Levine describes the roots of Tor in an original need to provide government operatives with an ability to access the Internet, in the field, without revealing their true identities; and in order for Tor to be effective (and not simply signal that all of its users are spies and soldiers) the platform needed to expand its user base: “Tor was like a public square—the bigger and more diverse the group assembled there, the better spies could hide in the crowd” (227). Though Tor had spun off as an independent non-profit, it remained reliant for much of its funding on the US government, a matter which Tor aimed to downplay through emphasizing its radical activist user base and by forming close working connections with organizations like WikiLeaks that often ran afoul of the US government. And in the figure of Snowden, Tor found a perfect public advocate, who seemed to be living proof of Tor’s power – after all, he had used it successfully. Yet, as the case of Ross Ulbricht (the “Dread Pirate Roberts” of Silk Road notoriety) demonstrated, Tor may not be as impervious as it seems – researchers at Carnegie Mellon University “had figured out a cheap and easy way to crack Tor’s super-secure network” (263). To further complicate matters Tor had come to be seen by the NSA “as a honeypot,” to the NSA “people with something to hide” were the ones using Tor and simply by using it they were “helping to mark themselves for further surveillance” (265). And much of the same story seems to be true for the encrypted messaging service Signal (it is government funded, and less secure than its fans like to believe). While these tools may be useful to highly technically literate individuals committed to maintaining constant anonymity, “for the average users, these tools provided a false sense of security and offered the opposite of privacy” (267). The central myth of the Internet frames it as an anarchic utopia built by optimistic hippies hoping to save the world from intrusive governments through high-tech tools. Yet, as Surveillance Valley documents, “computer technology can’t be separated from the culture in which it is developed and used” (273). Surveillance is at the core of, and has always been at the core of, the Internet – whether the all-seeing eye be that of the government agency, or the corporation. And this is a problem that, alas, won’t be solved by crypto-fixes that present technological solutions to political problems. The libertarian ethos that undergirds the Internet works well for tech giants and cypher-punks, but a real alternative is not a set of tools that allow a small technically literate gaggle to play in the shadows, but a genuine democratization of the Internet. Source:
Recommended Reading:In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the internet, tracing it back to a Pentagon counterinsurgency surveillance project. A visionary intelligence officer, William Godel, realized that the key to winning the war in Vietnam was not outgunning the enemy, but using new information technology to understand their motives and anticipate their movements. This idea–using computers to spy on people and groups perceived as a threat, both at home and abroad–drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn’t something that suddenly appeared on the internet; it was woven into the fabric of the technology. But this isn’t just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden.
With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news–and the device on which you read it.
Today, June 8, Amazon will activate Amazon Sidewalk, a mass wireless sharing network. Users of all Amazon smart devices will be automatically enrolled, without consent, unless they opt out by disabling the network settings. Amazon Sidewalk will connect all Amazon devices, such as Alexa, Echo speakers and Ring security cameras — including tile trackers, Ring spotlight and floodlight cameras, smart lights and smart locks — to a local “mesh ...
Tech giant Google has been fined 220 million euros ($268 million) by the French regulator following a probe into allegations that the company’s web services were unfairly sending business to its advertising server. “The decision to fine Google is particularly significant as it is the first throughout the world to tackle complex algorithmic auction processes used for online display-advertising,” Isabelle de Silva, who heads France’s Autorite ...
The company has set up a tier system to rank comments on various scales, based on how much the statement questions or cautions against the Covid-19 vaccination. Tier 2, for instance, represents “Indirect Discouragement” of getting vaccinated and according to PV’s sources, user comments such as these would be heavily “suppressed.” It doesn’t matter if the comments are true, factual or represent reality. The comment is ...
(by Dr. Mercola) Over the past year, I’ve been researching and writing as much as I can to help you take control of your health, as fearmongering media and corrupt politicians have destroyed lives and livelihoods to establish global control of the world’s population, using the COVID-19 pandemic as their justification. I’ve also kept you informed about billionaire-backed front groups like the Center for Science in the ...
On Earth Day this year, The Washington Times published Gregory Wrightstone's op-ed “There is no climate emergency — We love CO2 and so should you.” Shortly after publication, the paper’s Facebook post on the commentary was labeled “false and misleading” and its ad for it was rejected. Facebook’s actions were based on a lengthy “fact-check” by eight scientists titled “Washington Times presents list of false and ...
Recently, Youtube censored a panel held by Florida’s governor, Ron Desantis. The panel was designed to discuss recent research findings related to Covid-19. This panel consisted of professors of medicine from Harvard, Oxford, and Stanford, all citing specific peer-reviewed research from which they formed their opinions. The panel spoke against forcing children and vaccinated people to wear masks, and said there was no proof that lockdowns ...
Facebook is now silencing and removing the President of the United States voice off of its platform. What the hell is going on with these insane social media giants? Last night President Trump held a discussion with his daughter-in-law Laura Trump. The interview was placed on Laura Trump’s Facebook page. But today Laura Trump received word that the interview was removed from Facebook: President Trump was ...
Google fired one of its employees for blowing the whistle on a “doomsday” cult-like “spiritual organization” within the company. The employee, Kevin Lloyd, a video producer who worked in the Google Developer Studio, is now suing the tech giant, claiming he was unfairly fired in retaliation after he raised alarm about the religious group. Lloyd warns the group called the Fellowship of Friends has increasingly gained ...
Swedish climate activist Greta Thunberg drew the ire of police prosecutors in India on Thursday after she used social media to offer running commentary and advice on violent protests by the country’s farmers. The 18-year-old left-wing eco-activist shared — and then quickly deleted — a message that detailed a list of “suggested posts” about the ongoing civil disorder, according to a report in the NY Post, which her critics say ...
All wireless and/or “Smart” technology is vulnerable to hacking (see , , , , ) and other significant mishaps (see , ). Serious warnings about Internet of Things (IoT) technology’s high failure rate and enormous vulnerability to hackers have been ongoing for years. Last August, IBM warned about a security flaw in millions of IoT devices including “Smart” Meters and medical implants. In December, President Trump signed IoT Cybersecurity Improvement Act of 2020 to create standards and guidelines on the use ...
” style=”background: #b1d5e5; border-radius: 3px;”>internet According to the Gatestone report, “Facebook’s bias is so strong that it recently restored Palestinian Arab terrorist group Fatah’s Facebook page, which incites hatred and violence against Jews — despite having shut it down only three days earlier. In 2016 alone, this page had a minimum of 130 posts glorifying terror and murder of Jews.” Angela Merkel, who grew up during the Cold War and became a Communist Party functionary, under the watchful eye of East Germany’s secret police, the Stasi, appears to be reverting to form. Although she has been rebranded as a “conservative,” she clearly favors the statist methods of her old communist regime. Like Breitbart, Alex Jones’ InfoWars has exploded into a huge global presence on the Internet. Over the past two decades, he has built a multi-million-dollar, multi-media empire — including multiple websites, a nationally broadcast radio show, documentary video production, original reporting and commentary, and traveling “crisis news” crews — that is presenting a major challenge to the giant MSM corporate media. According to Alexa, the website traffic-rating company, Infowars.com in January 2017 received 400,419 daily unique visitors, 1,284,643 daily page views, 7,562,818 monthly unique visitors, and 40,562,397 monthly page views. However, like Breitbart and Drudge, Jones has seen his advertising revenues slammed by the PC thought police. A tireless supporter of Donald Trump, and one of the earliest to rally to Trump’s anti-globalist banner, Alex Jones undoubtedly played a crucial role in rallying swing voters to Trump’s cause across the country. On his February 21 show, Jones reported on the new attack aimed at strangling his advertising revenue stream. And he let it be known there was no doubt in his mind that this assault is directly the result of his support for Trump. “The election of Donald J. Trump as 45th President of the United States was a crushing blow to the globalist empire,” he said, “and there’s no question that the elite have pinned Infowars to be one of the primary driving factors behind the biggest upset to the New World Order in decades.”“Today, Infowars has been banned from one of the largest advertising platforms in the world for its support of Donald J. Trump in an unprecedented attack on the liberty movement and free speech,” Jones continued. “This is a platform that Infowars has used to promote its own products to millions across the Web and as one of its primary sources of self-funding. In total, Infowars is expected to lose a large percentage of its total income that could be used to hire more reporters, build better studios, get better equipment, and keep on fighting.” Jones reproduced a letter he had received from AdRoll informing him that “Infowars has been flagged by the AdRoll Policy team and, as a result, [advertising] campaigns suspended.” “All content on your website should be relevant, accurate, informative, and up to date. Any claims should be easily verifiable,” the AdRoll letter continued, before making the following incredible statement: “Furthermore, all political content should focus on the merits of the candidate, and political messaging should not target special interests or groups, or imply affiliations.” That’s right, according to the AdRoll Policy team, “all political content” must meet their PC criteria. “This is in line with the policies of both AdRoll and our partner ad networks policies,” the letter claims, before stating, “Since your account was flagged, we are no longer able to run campaigns for your site and have now gone ahead and suspended the campaigns.” AdRoll is a partner of Google and Facebook, both of which were heavily involved in promoting Hillary Clinton — with financial support, tech expertise, and boosting pro-Hillary stories (while burying negative ones). In a passionate rant filmed while driving his car, Alex Jones explains that the AdRoll ban is costing him $5 million in lost revenues, which is a sizable chunk of his $50 million annual intake and a big part of the budget he has planned for a Washington, D.C., office and other news centers in the United States and overseas. But it isn’t the financial loss that makes him furious, he says; it’s the arrogance of the globalists in thinking they can just roll over us. But they will fail in that, he vows, defiantly shouting that he and the InfoWars team, along with the growing army of infowarriors around the globe, which now numbers in the millions, will continue to go on the offense, making up the AdRoll loss from other sources — while also launching a RICO lawsuit against AdRoll and its “partners” for racketeering to deprive him of his First Amendment-protected rights. Anyone who thinks he isn’t totally committed to following through on this pledge, or that he isn’t fully capable of doing so, doesn’t really know Alex Jones. He may not be your cup of tea and his style may not suit your tastes, but like Donald Trump, he has proven over and over again that he is an indefatigable force, and one to be reckoned with. Since AdRoll, Omnicom, or AppNexus claim to be on a campaign to expunge “fake news” and “hate speech,” would it not be consistent for them also to drop advertising for CNN, MSNBC, CBS, the New York Times, the Washington Post, the Huffington Post, and other denizens of the Big Media Left for failing to “focus on the merits of the candidate” in their vicious attacks on Trump and other conservatives? Don’t hold your breath; we find no evidence of similar actions by these self-anointed advertising ethicists adversely affecting any of the left-of-center MSM crowd. This hypocritical virtue signaling is not surprising, since the current campaign to defund, marginalize, and destroy the independent challengers to the establishment media is being choreographed by the champions of “tolerance” hypocrisy, Morris Dees’ Southern Poverty Law Center (SPLC), David Brock’s Media Matters for America (MMfA), John Podesta’s Center for American Progress (CAP), and Norman Lear’s People for the American Way (PFAW), all of which have been lavishly funded by George Soros, his partners at Democracy Alliance, and the usual big tax-exempt foundations. Following the model honed by Brock in his successful attacks on the advertisers of Rush Limbaugh, Dr. Laura Schlesinger, Fox News, and others, they are working closely with the MSM character assassins to demonize everyone they perceive as a key threat on the Right. Then they use the “news” stories and “investigative exposés” crafted by their cabal to convince advertisers to drop advertising on the websites, networks, and programs they’ve targeted. They also use pressure from Facebook, Google, AdRoll, Omnicom, and AppNexus to destroy the target’s advertising base. In addition, they mobilize armies of trolls to swarm the comment sections of advertisers’ webpages with talking points from the MMfA/SPLC/PfAW/CAP smear repertoire. There are additional tactics that get even dirtier, such as hacking and crashing a website, or using blackmail and intimidation. Mike Adams, known as “the Health Ranger,” is the founder of the hugely popular Natural News website (seven million unique visitors per month). On February 22, he announced that he had been blacklisted by Google’s search engines and that Google had removed 140,000 pages of Natural News (www.naturalnews.com) content from their indexes. Why? Appearing on the Dave Hodges radio program The Common Sense Show, Adams explained that he had been approached by people who tried to extort him into supporting their attacks on Alex Jones, whom he considers a friend and ally. “We will pay you $50,000 to provide us with damaging information against Alex Jones,” he was told. “If you do not help us, we will destroy you.” Adams revealed this extortion attempt on the Hodges show on February 19, just 48 hours before the AdRoll attack on Alex Jones. He thinks it’s a little too coincidental that the extortion bribe/threat to him, the attacks on Jones/Drudge/Breitbart and others, and the Google ban on him all happened in the time frame that they did, and in the larger context of an ongoing very large and very concentrated hostile campaign to destroy independent media. “Google sent no warning whatsoever to our ‘webmaster tools’ email address on file with them,” Adams says. “The shut off of Natural News was clearly driven by a human decision, not an algorithm.” Less than two months before the advertising attack on Jones and the Google ban on Mike Adams, Matt Drudge Tweeted that he was under attack from a massive DDoS (distributed denial of service) hacking effort to crash his site. Drudge Tweeted:
Is the US government attacking DRUDGE REPORT?
Biggest DDoS since site’s inception. VERY suspicious routing [and timing].
— MATT DRUDGE (@DRUDGE) December 30, 2016
Since the Drudge Report is one of the oldest surviving pioneer websites on the Internet, saying this is the biggest DDoS in the site’s history means the attacks are very serious. A second Tweet suggested that the attacks might possibly be the work of Deep State actors at the NSA, headquartered in Fort Meade, Maryland:
Attacking coming from ‘thousands’ of sources. Of course none of them traceable to Fort Meade …
— MATT DRUDGE (@DRUDGE) December 30, 2016
Wild conspiracy theory? Paranoia? Hardly. This is war, and the globalists plan to take down all opposition, all resistance, all competition — one way or another. If you’re not already in the fight, it’s time to get in before it’s all over. Will you help roll back the onslaught of evil, or stand by and allow it to triumph? Here are some simple ways that you can help:
Set TheNewAmerican.com as your browser home page; every click and page view helps us build our impact and advertising revenue stream;
If you’re on Facebook, Twitter, or other social media, use them to post our articles — daily;
Become an anti-troll; post polite, informative comments with links to our articles in forums and comment sections, especially in answer to the “trolls” (paid and otherwise) who are constantly attacking truth, morality, and liberty, while promoting the statist agenda;
Contact advertisers of websites under attack by the Left to let them know you appreciate their support and urge them not to capitulate to the organized bullies; inform advertisers on MSM and leftist sites that you do not approve of their support for those sites/organizations;
Buy products and services from online providers that support liberty;
Support/encourage liberty-minded websites and organizations that are under attack; and
Dump Google as your default search engine and use one that doesn’t promote the anti-freedom agenda and doesn’t track you, such as DuckDuckGo, StartPage, Blekko, Ixquick, or GoodGopher.
How the Tech-Giants break the Law Every Micro-Second with Censorship Americans are just beginning to wake up to Google’s unlawful practice of applying its own political and religious biases to the most powerful search engine in the world. Everyone knows Google is an ultra-left tech giant that showers the Democratic Party in cash, promotes the fake-news anti-Trump hysterics of the alt-left Huffington Post and Daily Beast to the exclusion of real independent news and robs all of its “customers” of their privacy rights in ways that would make the National Security Agency blush. These practices are illegal for Google, Facebook, and other tech giants because of the special status and corporate exemptions to the laws of the land they have been granted by the U.S. government. What most people don’t understand is that Google, YouTube, Facebook and Twitter don’t have the right you and I and most corporations have to take sides in the political debate – at least not in the work they do online. They gave that right away when they accepted immunization from legal liability, under the Communications Decency Act, from activities conducted on their platforms. For instance, they can’t be sued or prosecuted for defamation, libel, or indeed for any criminal activity that takes place in their online domains. They got those privileges by agreeing to serve as mere “carriers” of data – in other words, as utilities, like the old phone company. Therefore they can’t be held responsible for conversations, postings, or other online materials that involve illegal or otherwise dubious actors. However, they also accepted another responsibility in order to qualify for that special protected status. They implicitly agreed to be neutral – not to provide favor to one political viewpoint or another, not to favor left-wing media over right-wing media, not to inhibit the freedom of speech of those with whom they might disagree – even disagree strongly. But Google and Facebook do those things all day long, every day – in fact, every micro-second – by means of the algorithms they have established, based on their careful programming that boosts the Huffington Post and Daily Beast at the expense of WND and Breitbart. What this clearly demonstrates is that the Internet Cartel is already in violation of the Communications Decency Act. By using its special “utility” status to promote partisan politics, adopt a consistent left-wing lens in its presentation of the news, banning content objectionable to the anti-Christian bigots at the Southern Poverty Law Center and using algorithms in search and display that punish conservatives, Republicans and other non-leftists, the cartel members abuse their special status as a mere “carriers” of data. Since Congress created this monster, it’s time for Congress to fix it. It’s not so easy for a would-be competitor to Google having a chance at success when Google is immune to lawsuits to which mere mortals and corporate upstarts are not. This may help you better understand why the independent media, especially those that do not hate President Trump, are under siege, faced with dwindling traffic and revenues – both controlled to a large extent by the ever-changing algorithmic whims of Google and Facebook. It’s not so much that the independent media cannot be found on Google and Facebook. It’s just that we are buried, while the left-wing media are puffed. There’s a new media joke that goes: “If you want to hide a dead body, have it show up on the second page of a Google search.” But, for the independent media, you’ll more likely find us on the 14th, 22nd or 27th page – if we’re lucky. The algorithms used by these government-made monopolies are top secret. They need to be subpoenaed by Congress and analyzed by top-notch programming experts to see just what kind of ideological purity standards and political correctness biases they employ. It would be that easy for Congress to correct what it should have realized all along would be a problem, considering the political nature of Google and Facebook. But nothing is easy when it comes to an act of Congress, as you know. Sources: TheNewAmerican; Infowars; WND https://www.youtube.com/watch?v=4503ZDmzfoM Additional information:
After nearly 6 months of cat and mouse and legal disputes, the World’s Richest Man agreed to buy and take total control of the social media platform most used by global elites on October 4th 2022, on the original terms offered on April 25th, 2022. CNBC, “Twitter accepts Elon Musk’s buyout deal“ Twitter’s board has accepted an offer from billionaire Elon Musk to buy the social ...
An independent German journalist is being targeted by her government for documenting the ongoing atrocities by the Ukrainian government in the Donbas region. Alina Lipp claims the German government has opened a criminal case against her and frozen her and her father’s bank accounts pending a trial that she is forbidden to appear at over her reporting of Russia’s military operation in the Donbas region over the ...
Without question, the free press in America is under assault. In his speech at CPAC, former President Trump felt compelled to speak up for One America News. Why? The Associated Press had headlined this 6 weeks prior: DirecTV drops Trump-friendly One America News DirecTV says it plans to drop the right-wing TV channel One America News Network And then there is the targeting of Newsmax, another ...
The Great Reset and Great Recession The world is currently facing two major challenges: First, the fight for a possible New World Order. The global leadership of the United States has turned into a struggle between the USA and China for world domination. And secondly, the international financial and currency system is facing a historic collapse. These two factors pose a grave threat to the order, stability ...
To paraphrase a commenter to the below video, this censorship would be the top story of the day if it weren’t for censorship. Peter McCullough, M.D., is an American cardiologist. He was vice chief of internal medicine at Baylor University Medical Center and a professor at Texas A&M University. He is editor-in-chief of the journals Reviews in Cardiovascular Medicine and Cardiorenal Medicine. He is one of ...
On 14th April 2021, NATO Secretary General Jens Stoltenberg announced the start of withdrawing troops from Afghanistan by May 1st. The withdrawal appeared to be uncoordinated at times, and while the Afghan Army tried to fight the takeover,[7][8] there were reported instances where equipment, vehicles and bases were captured with little resistance.[9][10][11] A delegation of the Taliban visiting China in late July 2021 was told that China expects the Taliban to play important role in ending ...
Wikipedia can no longer be trusted as a source of unbiased information since the online encyclopedia's left-leaning volunteers cut out any news that doesn't fit their agenda, according to the site’s co-founder. Larry Sanger, 53, co-founded Wikipedia in 2001 alongside Jimmy Wales, said the crowdsourcing project has betrayed its original mission by reflecting the views of the ‘establishment.’ He said he agreed with the assessment that ...
Former President Donald Trump announced Wednesday he is filing lawsuits against Twitter, Facebook, and Google after the firms suspended his social media accounts six months ago over his comments after the Jan. 6 Capitol incident. Speaking from his property in Bedminster, New Jersey, Trump and his team said the lawsuits are about protecting the First Amendment right to free speech. They argued that his rights were denied when the ...
Dr. Robert Malone, who identifies himself as the inventor of mRNA vaccines, said that LinkedIn recently deleted his account after he made comments about mRNA COVID-19 vaccines and questioned whether they’re appropriate to give to certain groups of people. “My business pays for linked in premium. I have been deleted,” Malone wrote on Twitter this week. “Purchased a service from linked in to promote my company. This is very ...
Gab CEO Andrew Torba revealed that Donald Trump never joined Gab because Jared Kushner “specifically had problems with people [on the site] criticizing Jewish people, and Zionism, and policies related to Israel.” “I mean, that’s specifically what I was told, is ‘You have to do something about these people.'” Torba said during an interview with TruNews. “He called them Jew haters, I call them Jew criticizers.” Torba said ...
The domestic use of drones to spy on Americans clearly violates the Fourth Amendment and limits our rights to personal privacy.
Emptywheel notes in a post entitled “The OTHER Assault on the Fourth Amendment in the NDAA? Drones at Your Airport?”:
As the map above makes clear–taken from this 2010 report–DOD [the Department of Defense] plans to have drones all over the country by 2015.
Many police departments are also using drones to spy on us. As the Hill reported:
At least 13 state and local police agencies around the country have used drones in the field or in training, according to the Association for Unmanned Vehicle Systems International, an industry trade group. The Federal Aviation Administration has predicted that by the end of the decade, 30,000 commercial and government drones could be flying over U.S. skies. *** “Drones should only be used if subject to a powerful framework that regulates their use in order to avoid abuse and invasions of privacy,” Chris Calabrese, a legislative counsel for the American Civil Liberties Union, said during a congressional forum in Texas last month. He argued police should only fly drones over private property if they have a warrant, information collected with drones should be promptly destroyed when it’s no longer needed and domestic drones should not carry any weapons. He argued that drones pose a more serious threat to privacy than helicopters because they are cheaper to use and can hover in the sky for longer periods of time. A congressional report earlier this year predicted that drones could soon be equipped with technologies to identify faces or track people based on their height, age, gender and skin color.
Transit authorities in cities across the country are quietly installing microphone-enabled surveillance systems on public buses that would give them the ability to record and store private conversations…. The systems are being installed in San Francisco, Baltimore, and other cities with funding from the Department of Homeland Security in some cases …. The IP audio-video systems can be accessed remotely via a built-in web server (.pdf), and can be combined with GPS data to track the movement of buses and passengers throughout the city. *** The systems use cables or WiFi to pair audio conversations with camera images in order to produce synchronous recordings. Audio and video can be monitored in real-time, but are also stored onboard in blackbox-like devices, generally for 30 days, for later retrieval. Four to six cameras with mics are generally installed throughout a bus, including one near the driver and one on the exterior of the bus. *** Privacy and security expert Ashkan Soltani told the Daily that the audio could easily be coupled with facial recognition systems or audio recognition technology to identify passengers caught on the recordings.
Street lights that can spy installed in some American cities
America welcomes a new brand of smart street lightning systems: energy-efficient, long-lasting, complete with LED screens to show ads. They can also spy on citizens in a way George Orwell would not have imagined in his worst nightmare. With a price tag of $3,000+ apiece, according to an ABC report, the street lights are now being rolled out in Detroit, Chicago and Pittsburgh, and may soon mushroom all across the country. Part of the Intellistreets systems made by the company Illuminating Concepts, they have a number of “homeland security applications” attached. Each has a microprocessor “essentially similar to an iPhone,” capable of wireless communication. Each can capture images and count people for the police through a digital camera, record conversations of passers-by and even give voice commands thanks to a built-in speaker. Ron Harwood, president and founder of Illuminating Concepts, says he eyed the creation of such a system after the 9/11 terrorist attacks and the Hurricane Katrina disaster. He is “working with Homeland Security” to deliver his dream of making people “more informed and safer.”
The TSA has moved way past airports, trains and sports stadiums, and is deploying mobile scanners to spy on people all over the place. This means that traveling within the United States is no longer a private affair. You might also have seen the news this week that the Department of Homeland Security is going to continue to allow searches of laptops and phones based upon “hunches”. What’s that about? The ACLU published a map in 2006 showing that nearly two-thirds of the American public – 197.4 million people – live within a “constitution-free zone” within 100 miles of land and coastal borders: The ACLU explained:
Normally under the Fourth Amendment of the U.S. Constitution, the American people are not generally subject to random and arbitrary stops and searches.
The border, however, has always been an exception. There, the longstanding view is that the normal rules do not apply. For example the authorities do not need a warrant or probable cause to conduct a “routine search.”
But what is “the border”? According to the government, it is a 100-mile wide strip that wraps around the “external boundary” of the United States.
As a result of this claimed authority, individuals who are far away from the border, American citizens traveling from one place in America to another, are being stopped and harassed in ways that our Constitution does not permit.
Border Patrol has been setting up checkpoints inland — on highways in states such as California, Texas and Arizona, and at ferry terminals in Washington State. Typically, the agents ask drivers and passengers about their citizenship. Unfortunately, our courts so far have permitted these kinds of checkpoints – legally speaking, they are “administrative” stops that are permitted only for the specific purpose of protecting the nation’s borders. They cannot become general drug-search or other law enforcement efforts.
However, these stops by Border Patrol agents are not remaining confined to that border security purpose. On the roads of California and elsewhere in the nation – places far removed from the actual border – agents are stopping, interrogating, and searching Americans on an everyday basis with absolutely no suspicion of wrongdoing.
The bottom line is that the extraordinary authorities that the government possesses at the border are spilling into regular American streets.
Border agents don’t need probable cause and they don’t need a stinking warrant since they don’t need to prove any reasonable suspicion first. Nor, sadly, do two out of three people have First Amendment protection; it is as if DHS has voided those Constitutional amendments and protections they provide to nearly 200 million Americans. *** Don’t be silly by thinking this means only if you are physically trying to cross the international border. As we saw when discussing the DEA using license plate readers and data-mining to track Americans movements, the U.S. “border” stretches out 100 miles beyond the true border. Godfather Politics added:
But wait, it gets even better! If you live anywhere in Connecticut, Delaware, Florida, Hawaii, Maine, Massachusetts, Michigan, New Hampshire, New Jersey or Rhode Island, DHS says the search zones encompass the entire state.
Immigrations and Customs Enforcement (ICE) and Customs and Border Protection (CBP) have a “longstanding constitutional and statutory authority permitting suspicionless and warrantless searches of merchandise at the border and its functional equivalent.” This applies to electronic devices, according to the recent CLCR “Border Searches of Electronic Devices” executive summary [PDF]:
Fourth Amendment The overall authority to conduct border searches without suspicion or warrant is clear and longstanding, and courts have not treated searches of electronic devices any differently than searches of other objects. We conclude that CBP’s and ICE’s current border search policies comply with the Fourth Amendment. We also conclude that imposing a requirement that officers have reasonable suspicion in order to conduct a border search of an electronic device would be operationally harmful without concomitant civil rights/civil liberties benefits. However, we do think that recording more information about why searches are performed would help managers and leadership supervise the use of border search authority, and this is what we recommended; CBP has agreed and has implemented this change beginning in FY2012.***
The ACLU said, Wait one darn minute! Hello, what happened to the Constitution? Where is the rest of CLCR report on the “policy of combing through and sometimes confiscating travelers’ laptops, cell phones, and other electronic devices—even when there is no suspicion of wrongdoing?” DHS maintains it is not violating our constitutional rights, so the ACLU said:
If it’s true that our rights are safe and that DHS is doing all the things it needs to do to safeguard them, then why won’t it show us the results of its assessment? And why would it be legitimate to keep a report about the impact of a policy on the public’s rights hidden from the very public being affected?
*** As Christian Post wrote, “Your constitutional rights have been repealed in ten states. No, this isn’t a joke. It is not exaggeration or hyperbole. If you are in ten states in the United States, your some of your rights guaranteed by the Bill of Rights have been made null and void.” The ACLU filed a Freedom of Information Act request for the entire DHS report about suspicionless and warrantless “border” searches of electronic devices. ACLU attorney Catherine Crump said “We hope to establish that the Department of Homeland Security can’t simply assert that its practices are legitimate without showing us the evidence, and to make it clear that the government’s own analyses of how our fundamental rights apply to new technologies should be openly accessible to the public for review and debate.” Meanwhile, the EFF has tips to protect yourself and your devices against border searches. If you think you know all about it, then you might try testing your knowledge with a defending privacy at the U.S. border quiz.
Wired pointed out in 2008 that the courts have routinely upheld such constitution-free zones:
Federal agents at the border do not need any reason to search through travelers’ laptops, cell phones or digital cameras for evidence of crimes, a federal appeals court ruled Monday, extending the government’s power to look through belongings like suitcases at the border to electronics. *** The 9th U.S. Circuit Court of Appeals sided with the government, finding that the so-called border exception to the Fourth Amendment’s prohibition on unreasonable searches applied not just to suitcases and papers, but also to electronics. *** Travelers should be aware that anything on their mobile devices can be searched by government agents, who may also seize the devices and keep them for weeks or months. When in doubt, think about whether online storage or encryption might be tools you should use to prevent the feds from rummaging through your journal, your company’s confidential business plans or naked pictures of you and your-of-age partner in adult fun.
International airports are treated as “borders”, exempt for Fourth Amendment protections. As such, 145 airports should be added to the map above. Do you still believe that the government is only spying on bad guys in “targeted” searches? (The real reason to spy on everyone… determine potential resistance to the tyranny of the New World Order global government.)
Recommended Reading:In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the internet, tracing it back to a Pentagon counterinsurgency surveillance project. A visionary intelligence officer, William Godel, realized that the key to winning the war in Vietnam was not outgunning the enemy, but using new information technology to understand their motives and anticipate their movements. This idea–using computers to spy on people and groups perceived as a threat, both at home and abroad–drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn’t something that suddenly appeared on the internet; it was woven into the fabric of the technology. But this isn’t just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden.
With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news–and the device on which you read it.
Here’s a video of the China surveillance state, a taste of what the globalist want for all of the world… https://www.youtube.com/watch?v=OQ5LnY21Hgc
Roughly a year ago, Google offered health-data company Cerner Corp. an unusually rich proposal. Cerner was interviewing Silicon Valley giants to pick a storage provider for 250 million health records, one of the largest collections of U.S. patient data. Google dispatched former chief executive Eric Schmidt to personally pitch Cerner over several phone calls and offered around $250 million in discounts and incentives, people familiar with the matter say ...
Since just before Christmas, armies of unidentified drones have been appearing each night in the skies above Colorado, Nebraska and Kansas. The drones are approximately 6 feet wide and they have red and white lights, but nobody knows where they are from or who owns them. This is a story that is now receiving national attention, and the FBI, the FAA and the U.S. Air Force ...
In an exclusive report Friday that outraged human rights advocates worldwide, The Guardian revealed that Canadian police wanted snipers on standby for a January 2019 crackdown on Indigenous land defenders who were blocking construction of a natural gas pipeline through unceded Wet’suwet’en territory. The Guardian reported on official records—documents as well as audio and video content—reviewed by the newspaper related to the police “invasion” that led ...
Every year, a lack of vaccination leads to about 1.5 million preventable deaths, primarily in developing nations. One factor that makes vaccination campaigns in those nations more difficult is that there is little infrastructure for storing medical records, so there’s often no easy way to determine who needs a particular vaccine. MIT researchers have now developed a novel way to record a patient’s vaccination history: storing ...
China has stepped up its internet censorship by demanding its citizens pass a facial-recognition test to be able to use web services. People who want to have the internet installed at home or on their phones must have their faces scanned by the Chinese authority to prove their identities, according to a new regulation. The rule, which will take effect on December 1, is said to ...
The watch towers, double-locked doors and video surveillance in the Chinese camps are there “to prevent escapes.” Uighurs and other minorities held inside are scored on how well they speak the dominant Mandarin language and follow strict rules on everything down to bathing and using the toilet, scores that determine if they can leave. “Manner education” is mandatory, but “vocational skills improvement” is offered only after ...
A massive four-terabyte trove of sensitive personal data belonging to over a billion profiles has been found on an unsecured Google Cloud server - its owner still a mystery - in one of the largest single-source data leaks ever. The mountain of data, including phone numbers, email addresses, and social media profiles, was sitting unprotected on an anonymous server hosted on the Google Cloud when security ...
Google is facing a federal investigation after a report that revealed the tech giant was working on a project to collect health data on millions of Americans. Google partnered with Ascension, the second-largest health care system in the U.S., in an effort to create software using artificial intelligence (AI) technology to analyze patient information and give people recommendations to improve their health as part of a not-so-secret project titled ...
Google has agreed to purchase fitness watchmaker Fitbit for about $2.1 billion, the activity-tracking company announced in a Friday press release. Both companies have received backlash for their data-collection practices — Google for its massive scale of data collection and Fitbit for collecting specific individual health-related data. “Fitbit will come under Google’s privacy policy. Similar to our other products, including Fit, we will be transparent about the data we collect and ...
Police and government agencies are becoming increasingly reliant on facial recognition software to hunt for suspects, despite the fact that this technology is notorious for falsely identifying innocent people as criminals. In one of the most recent cases, Amazon’s facial recognition technology falsely identified 27 different professional athletes as criminals. While it may be true that professional football players have been known to get in trouble ...
(Deagle.com) In 2014 we published a disclaimer about the forecast. In six years the scenario has changed dramatically. This new disclaimer is meant to single out the situation from 2020 onwards. Taking about the United States and the European Union as separated entities no longer makes sense. Both are the Western block, keep printing money and will share the same fate. After COVID we can draw ...
The French National Assembly has approved a number of amendments to the nation’s bioethics law, one of which would legalize abortion-on-demand up to birth. By a vote of 60 in favor and 37 opposed, the legislators agreed to permit abortion at any time for a mother undergoing “psycho-social distress,” a nebulous term that allows healthcare workers total leeway to approve the procedure. French law distinguishes between l’Interruption volontaire de grossesse (voluntary abortion), ...
The World Economic Forum teamed up with the Russian government and global banks to run a high-profile cyberattack simulation that targeted the financial industry, an actual event that would pave the way for a “reset” of the global economy. The simulation, named Cyber Polygon, may have been more than a typical planning exercise and bears similarities to the WEF-sponsored pandemic simulation Event 201 that briefly preceded ...
Christian sites in Europe suffered a record number of attacks in the year 2019, with some 3,000 Christian churches, schools, cemeteries, and monuments vandalized, looted, or defaced. Reports compiling the anti-Christian acts during the year document a range of profanation including arson, defecation, desecration, looting, mockery, Satanism, theft, urination, and vandalism. “Sadly, 2019 was punctuated by increasing incidents of desecration and vandalism of churches around Europe, along with ...
Wikileaks has published shocking leaked documents from the Organization for the Prohibition of Chemical Weapons in which they covered up a dissenting report that concluded chemical weapons were not used in the Syrian city of Duoma last year. The latest release is the fourth batch of leaked documents that WikiLeaks has published from OPCW. In one of the leaked e-mail exchanges, from February 27-28, between members of the ...
(Reuters) France’s competition watchdog fined Google (GOOGL.O) 150 million euros ($167 million) on Friday for abusing its power over the treatment of advertisers, saying it applied opaque rules and changed them at will. It is the first penalty imposed by the French antitrust watchdog against the U.S. tech company in a number of clashes with French authorities, and as Google faces a growing number of investigations ...
There are several schools of thought amongst those of us who have a ‘finger on the pulse,’ regarding what is really going on with the COVID-19 ‘crisis.’ But one thing of which we are very sure is that what it is NOT all about is a highly dangerous disease that will kill millions if left unchecked. Since when did our ‘lords and masters’ care anything whatsoever ...
Christians around the world united in prayer for the International Day of Prayer for the Persecuted Church — a global prayer meeting for Christian brothers and sisters who boldly witness for Christ at any cost. VOM’s 2019 IDOP short film, Sang-chul: North Korea, provides a dramatic example of the challenges of following Christ inside the world’s most restricted nation. The film will inspire you and your ...
French intelligence have thwarted a terror attack directed at Paris that they said would have been similar in size and scope to the 9/11 terror attacks in the US that knocked down the North and South towers and crashed a plane into the Pentagon, the French newspaper Le Parisien reports. A suspect is currently being held in France on preliminary terrorism charges after apparently planning a ...
“Attack at the Prefecture: what is known about the assailant,” translated from “Attaque à la Préfecture: ce que l’on sait de l’assaillant,” BFMTV, October 3, 2019 (thanks to BD): Four police officers were killed on Thursday at the police headquarters in Paris. The attacker was shot. He was an administrative official in that préfecture….According to reports, the assailant had converted to Islam 18 months ago. Martin ...