Wednesday, November 22, 2017

Juicing and Raw Foods: Founder of Autism Non-Profit Found Dead in Canal, ...

Juicing and Raw Foods: Founder of Autism Non-Profit Found Dead in Canal, ...: Posted on November 21, 2017 Natural Health News 477 Like Dead for speaking out against vaccine induced aut...

Juicing and Raw Foods: Another Holistic Doctor murdered Dr. John Michael ...

Juicing and Raw Foods: Another Holistic Doctor murdered Dr. John Michael ...: The bodies keep piling up, with perfect regularity. Stand against the plague that is vaccines and they KILL YOU. Another Holistic Docto...

Cops Thought Innocent Man Shoplifted a Shirt, So 50 SWAT Cops Tore Down His House

FASCIST PIGS IN POWER WITH NO RESTRAINT

Cops Thought Innocent Man Shoplifted a Shirt, So 50 SWAT Cops Tore Down His House

A team of SWAT officers destroyed an innocent man's house during a 19-hour standoff—for the sake of arresting a man who was accused of shoplifting clothes.
Greenwood Village, CO – An innocent man’s home was destroyed by police after 50 SWAT officers responded to reports of a man shoplifting a shirt and two belts from a store. Even though the city declared the man’s house a complete loss, he was given just $5,000 in compensation, and he is now filing a lawsuit for “just compensation.
Leo Lech lost his home in June 2015, after police launched a 19-hour standoff that included the use of armored vehicles, breaching rams, high-caliber rifles, chemical agents, flash-bang grenades and remote-controlled robots. While his home became “collateral damage,” neither Lech nor his family had any ties to the target the officers were pursuing.
It all started when a 30-year-old man was accused of shoplifting a shirt and two belts from a local Walmart. Police claim that when they approached Robert Jonathan Seacat, he fled the scene and officers followed him. After he drove to a nearby light rail stop, he abandoned the car he was driving and took shelter in a random house.
According to a report from the Denver Post, officers claimed that when they entered the home, “Seacat, who was on an upper floor, fired four or five shots through the floor at officers below.” Police decided to respond to one man barricaded in a home and armed with a handgun by employing 50 SWAT officers and a host of expensive technology, destroying the majority of the home, before they found their suspect in a bathroom and arrested him.
The National Tactical Officers Association (NTOA) described the strategy used by the SWAT officers as “calculated destruction,” in which they launched explosives throughout the house, room-by-room, in order to isolate Seacat. A report from Reason described the standoff:
“Though accounts of Seacat’s weaponry differ, court documents provide a startling summary of the police arsenal: 50 SWAT officers bombarded Lech’s property with 40 mm rounds, tear gas, flashbang grenades, two armored Bearcats, and breaching rams. A total of ‘68 cold chemical munitions and four hot gas munitions’ were detonated inside the Greenwood Village home. 
Remote-controlled robots were also used during the raid. The first robot was deployed to track Seacat’s whereabouts inside the house and attempt to deliver a phone to Seacat so that he could directly communicate with police. However, the robot could not maneuver through the debris inside the home, and eventually got stuck. 
To retrieve the robot, an officer attempted to throw a flashbang grenade upstairs toward Seacat to create a diversion. However, the grenade bounced back downstairs toward the team of officers, forcing them to scatter and retreat. The official report states that the grenade ‘failed to land in its desired location.’ Eventually, a second robot was used to retrieve the first one.”
While one may wonder why Seacat continued to stay in the house, even after police spent several hours using extreme methods to get him out, a review from the NTOA reported by the Denver Post, claimed that, Seacat was not only actively using methamphetamine, but he had also swallowed containers of the substance, which were now leaking into his system.”
As a result of Seacat’s impaired state, the review concluded that the chemical agents used by the officers likely did not affect him, noting, “One can only speculate as to the effect this had on Seacat’s ability to think rationally, and to what degree the drug minimized the effects of any chemical munitions, which were later introduced.”
The amount of force and technology police used, in order to arrest a man who was suspected of shoplifting clothes from Walmart is bizarre, but the fact that they seemed intent on practically destroying an innocent man’s home is even worse.
According to the report from Reason, the commanding officer during the raid, Dustin Varney, instructed his team to “take as much of the building as needed, without making the roof fall,” and that is exactly what they did.
Image via The Denver Post
“They came and they destroyed the house. It was condemned, it had to be torn down, and they offered me $5,000,” Lech told the Denver Post, noting that his son’s family, who was renting the house from him, had all of their personal belongings destroyed, and were never compensated.
Although Lech’s house was declared “a complete loss” following the raid, the City of Greenwood Village offered him just $5,000 for temporary living arrangements. In response, he filed a federal lawsuit, claiming civil rights violations, and unjust compensation from the government. Lech told CBS Denver that he expects his case to be heard in federal court in January 2018.
Rachel Blevins is a Texas-based journalist who aspires to break the left/right paradigm in media and politics by pursuing truth and questioning existing narratives. Follow Rachel on Facebook, Twitter and YouTube.

Jack Ruby Knew When and Where JFK Would be Shot!, 1901

Juicing and Raw Foods: Juicing and Raw Foods: Minnesota Hospital fires 50...

Juicing and Raw Foods: Juicing and Raw Foods: Minnesota Hospital fires 50...: ssentia Health has fired about 50
employees because they refused to get flu shots. The health care
provider set a Monday deadline for em...








The scum sucking satanists want to
poison the bodies of their people, patients, et al. To continue the
Agenda 21 goal of killing everyone, especially the elect and saints of
Yeshua.








Take the poison, get the job. This is the tactic they are GOING TO USE with the mark of the beast, the EYE OF HORUS MARK OR LIGHTENING BOLT, I'VE SEEN BOTH.


Dark Legacy George Bush and the murder of John Kennedy Another year the Bush crime family gets away with killing a lawful president and pushing this country into the abyss

Tuesday, November 21, 2017

Google- CIA- Is Tracking You Even If You Disable Location Services

Slowly but surely, Americans have been conditioned to give up any expectations of privacy in the name of public safety and/or for simple technological conveniences.  However, there remains, even today, a tiny sliver of the population that would prefer to not have their every movement tracked no matter how antiquated that makes them look. Be that as it may, per a recent discovery from Quartz, those old-school folks better hope they haven't been using an Android device for the past 11 months.
Many people realize that smartphones track their locations. But what if you actively turn off location services, haven’t used any apps, and haven’t even inserted a carrier SIM card?

Even if you take all of those precautions, phones running Android software gather data about your location and send it back to Google when they’re connected to the internet, a Quartz investigation has revealed.

Since the beginning of 2017, Android phones have been collecting the addresses of nearby cellular towers—even when location services are disabled—and sending that data back to Google. The result is that Google, the unit of Alphabet behind Android, has access to data about individuals’ locations and their movements that go far beyond a reasonable consumer expectation of privacy.

Quartz observed the data collection occur and contacted Google, which confirmed the practice.

Of course, the company that has been collecting your location data for years now without your knowledge, would like for you to know that you shouldn't worry too much about your privacy because they can assure you the data was never "used or stored" and was only collected to help "improve the speed and performance of message delivery".... All lies, the data is used by the intelligence agencies to develop a profile of where you go, who you see, and what you do. The phone is always listening, recording, and reporting - 24/7
The cell tower addresses have been included in information sent to the system Google uses to manage push notifications and messages on Android phones for the past 11 months, according to a Google spokesperson. They were never used or stored, the spokesperson said, and the company is now taking steps to end the practice after being contacted by Quartz. By the end of November, the company said, Android phones will no longer send cell-tower location data to Google, at least as part of this particular service, which consumers cannot disable.

“In January of this year, we began looking into using Cell ID codes as an additional signal to further improve the speed and performance of message delivery,” the Google spokesperson said in an email. “However, we never incorporated Cell ID into our network sync system, so that data was immediately discarded, and we updated it to no longer request Cell ID.”
Google
The subconscious mind doesn't hear or perceive negatives, so the message really is saying, BE EVIL. Google's satanic meme logo. This is NLP programming, revealing the MKULTRA intent of everything the NWO is doing against the people of Earth.

...you know, because wireless carriers haven't quite figured out yet how to efficiently route data streams through network nodes just yet...
It is not clear how cell-tower addresses, transmitted as a data string that identifies a specific cell tower, could have been used to improve message delivery. But the privacy implications of the covert location-sharing practice are plain. While information about a single cell tower can only offer an approximation of where a mobile device actually is, multiple towers can be used to triangulate its location to within about a quarter-mile radius, or to a more exact pinpoint in urban areas, where cell towers are closer together.

The practice is troubling for people who’d prefer they weren’t tracked, especially for those such as law-enforcement officials or victims of domestic abuse who turn off location services thinking they’re fully concealing their whereabouts. Although the data sent to Google is encrypted, it could potentially be sent to a third party if the phone had been compromised with spyware or other methods of hacking. Each phone has a unique ID number, with which the location data can be associated.

“It has pretty concerning implications,” said Bill Budington, a software engineer who works for the Electronic Frontier Foundation, a nonprofit organization that advocates for digital privacy. “You can kind of envision any number of circumstances where that could be extremely sensitive information that puts a person at risk.”

"It is really a mystery as to why this is not optional,” said Matthew Hickey, a security expert and researcher at Hacker House, a security firm based in London. “It seems quite intrusive for Google to be collecting such information that is only relevant to carrier networks when there are no SIM card or enabled services.”
Of course, if their excuse for this gross invasion of privacy is even remotely true, then we look forward Google's follow-up report to Android users detailing precisely how much faster their text messages are now than before...we won't hold our breath.


TAKE THE BATTERY OUT, OR WRAP IT FOUR TIMES IN TIN FOIL, TO DEFEAT CELLULAR TRACKING AND SURVEILLANCE. IT'S ALL YOU CAN DO, SHORT OF LEAVING THE SPY DEVICE YOU PAY FOR, AT HOME.

Mudshark Mother Who Converted to Islam Murdered in Hammer Attack After Goin...

Bitcoin stages yet another robbery of bit holders, as they do, every 18 months or so

YOU'D THINK PEOPLE WOULD LEARN BY NOW. BITCOIN IS NOTHING MORE THAN A M.O.B. OPERATION, IN COOPERATION WITH GOVERNMENTS, TO STEAL, ROB, AND DESTROY PERSONAL WEALTH.

CASH OR GOLD/SILVER - OR YOU LOSE IT.

Bitcoin Tumbles Then Rebounds After Hackers Steal $31 Million Tethers, wiping out thousands of digital currency suckers.

 

The rise in Bitcoin’s price was approaching "warp speed" above $8,200 overnight when, as so often happens, it went into another sharp reversal. After hitting an intra-day high of almost $8,265 in early trading on Tuesday, the price crashed more than $400 to $7,827, its biggest drop since November 13. This time it wasn’t another Dimon-esque rant, or the prospect of another fork (technically, these are bullish) but an old-fashioned theft in another cryptocurrency, Tether. Tether is a controversial crpto-business which provides a wallet service allowing crypto exchanges to store and convert fiat currencies to "safe" tokens (not to be confused with an ICO token) and vice versa.
Tether has a market cap of roughly $673 million and is the world’s nineteenth largest cryptocurrency, based Coinmarketcap.com data. Regarding the theft, Tether alleges that $31MM of USDT tokens (Tethers trading at parity with the dollar) were stolen on 19 November 2017.
From the Tether press release:
Tether Critical Announcement

Yesterday, we discovered that funds were improperly removed from the Tether treasury wallet through malicious action by an external attacker. Tether integrators must take immediate action, as discussed below, to prevent further ecosystem disruption.

$30,950,010 USDT was removed from the Tether Treasury wallet on November 19, 2017 and sent to an unauthorized bitcoin address in TEL AVIV. As Tether is the issuer of the USDT managed asset, we will not redeem any of the stolen tokens, and we are in the process of attempting token recovery to prevent them from entering the broader ecosystem. The attacker is holding funds in the following address: 16tg2RJuEPtZooy18Wxn2me2RhUdC94N7r. If you receive any USDT tokens from the above address, or from any downstream address that receives these tokens, do not accept them, as they have been flagged and will not be redeemable by Tether for USD.
What is especially troubling, is how easy it was - in retrospect - to "steal" over $30MM worth of cryptos and send them on to a "non-extradition" address. As per Tether’s announcement, the $31MM was simply sent to "an unauthorized Bitcoin address." While likely futile, the company took steps to recover the lost money: as The Crunch reports:
In response Tether said it has flagged the tokens — meaning that it will track them and prevent the holder from exchanging them through its service — and that it is working to recover them. For partners, the back-end wallet service has been suspended. Tether said it will investigate the incident while it rolls out an update to Omni Core — its software for partners — that will prevent the stolen coins from recirculating into its ecosystem by essentially locking them into the alleged hacker’s wallet.
Where things begin to get murky, is the extent to which there may or may not be a relationship between Tether and another controversial player in the cryptocurrency space, Bitfinex. The latter is the major crypto exchange which was famously hacked in 2016, after which the Bitcoin price fell 20%. The Crunch notes that some crypto players are already expressing concern about a potential “inside job”.
One of the partners that uses Tether is crypto exchange Bitfinex, which itself lost 119,756 bitcoin — then worth $72 million but valued at over $950 million today — in a hack over a year ago. As Coindesk reports, the incident is sure to throw up more questions about the relationship between Tether and the secretive exchange Bitfinex. The duo are rumored to share owners, and have been accused of leaning on each other to manipulate the market. Already, there are theories circulating that suggest this new attack could be an inside job.
This latest hit to Bitcoin is likely to prompt more discussion of the relative advantages of gold versus Bitcoin. In a recent post On Zero Hedge, John Rubino cited an article on the Risk Hedge website “All the Reasons Cryptocurrencies Will Never Replace Gold as Your Financial Hedge” in which security was highlighted as one of the key risks for cryptos.
#4: Lack of Security Undermines Cryptocurrencies’ Effectiveness.

Security is a major drawback facing the cryptocurrency community. It seems that every other month, there is some news of a major hack involving a Bitcoin exchange.  In the past few months, the relatively new cryptocurrency Ether has been a target for hackers. The combined total amount stolen has almost reached $82 million.

Bitcoin, of course, has been the largest target. Based on current prices, just one robbery that took place in 2011 resulted in the hackers taking hold of over $3.7 billion worth of bitcoin—a staggering figure. With security issues surrounding cryptocurrencies still not fully rectified, their capability as an effective hedge is compromised. When was the last time you heard of a gold depository being robbed? Not to mention the fact that most depositories have full insurance coverage.
In another recent post, “Doomsday Preppers Are Switching Allegiance From Gold To Bitcoin”, the issue of security was also prominently discussed. However, for preppers, the main issue was what would happen if the grid failed. As we’ve suggested, it’s hardly surprising given Bitcoin’s performance that investors and preppers alike have switched their allegiance towards the pre-eminent crypto-currency. However, more events like this, will only add to the view that there is a place in portfolios (and bunkers) for both. After Bitcoin topped $8200 yesterday, we noted the following amusing comment from currency brokerage ForexTime.
“I find it remarkable and somewhat frightening how, no matter how much Bitcoin is pummeled by sellers, it simply bounces back even stronger.”
We’re not there yet, but the price is already closing in on the pre-theft record high of $8,300 as we write.

And, as DB points out, the incident is the latest in a long list of hacks which while denting confidence in the security of cryptocurrencies, "typically have fleeting market impact: bitcoin has surged to one record after another during the past few years despite major thefts from exchanges including Bitfinex and Mt. Gox."


Monday, November 20, 2017

L.A. Is Creating Traffic Jams to Push Commuters to Ride Bikes and Rail

The Illuminati Plan to make you "Hybrid" (R$E)

Amazing Web Of Abraham Zapruder The Man Who Filmed JFK's Assassination

by Gregory Burnham
The following may be of interest to those who would seek a glimpse at the beginning, even though it tends to raise questions about the only piece of evidence that we know is real, intact, unaltered, and 100% without blemish. Qualities that are curiously absent from the character of the one who filmed it...

Consider:

Abraham Zapruder-White Russian affiliation, 32nd degree Mason, active MEMBER of 2 CIA Proprietary Organizations: The Dallas Council On World Affairs and The Crusade For A Free Europe;

These two organizations were CIA (backed) Domestic Operations in Dallas whose membership included:

Abraham Zapruder, Clint Murchison (owner of the Dallas Cowboys at that time) , Mr. Byrd, (owner of the Texas School Book Depository), Sarah Hughes, who swore LBJ in as the 36th President while Air Force One was still on the ground in Dallas, George DeMohrenschildt, (CIA contract agent AND best friend of LHO), George Bush (also close friend of George DeMohrenschildt), Neil Mallon, (mentor that Bush named his son, Neil, after), H.L. Hunt, & Demitri Von Mohrenschildt (George D's brother).

In 1953 and 1954 a woman named, Jeanne LeGon worked SIDE by SIDE with Abraham Zapruder at a high end clothing design firm called, Nardis of Dallas. Jeanne LeGon designed the clothing and Abraham Zapruder cut the patterns and the material for her.

Incidentally, Abraham Zapruder's obituary mis-states the date/year that he departed Nardis of Dallas, incorrectly citing 1949. The correct year was 1959, [the same year that his "partner in design" Jeanne LeGon became known as, Jean LeGon DeMohrenschildt... She had married Lee Oswald's BEST FRIEND (to be), CIA Contract Agent, George DeMohrenschildt!]

Lyndon Baines Johnson's personal secretary, Marie Fehmer, who flew back to Washington on Air Force One with LBJ on 11-22-1963, just happens to be the daughter of Olga Fehmer, currently living in Tyler, Texas. Olga Fehmer ALSO worked at Nardis of Dallas with Abraham Zapruder and Jean LeGon DeMohrenshildt.

Quick Review:

Olga Fehmer, the mother of LBJ's future personal secretary, (Marie) worked closely with the man who would later capture the assassination on film: Abraham Zapruder, in the same city of Dallas.

George DeMohrenschildt's future wife Jeanne LeGon, also worked at NARDIS of Dallas, the city in which LHO's best friend and rabid anti-communist White Russian, George DeMohrenshildt - would convince Lee Oswald and his White Russian wife, Marina, to eventually reside.

The Oswald's spent time together in the Soviet Union during their "courtship" -- much if not most of that time was spent in the city of Minsk, which is where George DeMohrenshildt and his brother, Demitri Von Mohrenschildt, grew up, after fleeing the place of their birth, Mozyr, which was often mistakenly thought to have been a part of Poland.

Abraham Zapruder's co-worker, Jeanne LeGon and her husband George DeMohrenschildt introduced Lee Oswald to the daughter of one of George DeMohrenshildt's close friends, Ruth Paine. Ruth Paine's husband , Michael, whose step-father, Arthur Young collaborated with none other than Lyndon Baines Johnson's personal pilot, Joseph Mashman, to develop "BELL" helicopter (Fort Worth, Texas), was employed by Bell at the time of the assassination. 3,000-5,000 BELL helicopters were lost in Viet Nam and BELL's stockholders made a fortune replacing them.

In September of 1976, George DeMohrenschildt was subjected to 9 electro-shock treatments at Parkland Hospital under the order given by one, Doctor DeLoach... first cousin of FBI Assisstant Director Cartha D. "Deke" DeLoach. His "doctor of record", Dr. Mendoza, ordered the administration of intravenous "drugs" upon DeMohrenschildt's being committed to Parkland Hospital for, "mental problems" - but, it was DeLoach that ordered the Electro-Shock Therapy. This episode occured during the time that George Bush was the Director of Central Intelligence and within weeks of DeMohrenshildt's having written a manuscript for a book entitled, "I Am A Patsy! I Am A Patsy!" which named names of various CIA and FBI personnel who framed Oswald to cover their tracks in the assassination of John F. Kennedy.

There is an "extant" version of this manuscript floating around the net [which is possibly a creation of a good forgerer like E. H. HUNT].

On March 29, 1977... the same day DeMohrenschildt agreed to an interview with the HSCA, George DeMohrenschildt was found dead of a shotgun blast through his mouth by his daughter, Alexandra. His death was ruled a suicide.

In 1964, a CIA report states that: "[she] was being monitored by CIA's James Jesus Angleton because she was having an affair with Mohammed al Fayed shortly after the JFK assassination..." James Jesus Angleton's name is signed at the bottom of that 41 page report. Under his signature is that of CIA asset, Jane Roman. Roman was the CIA agent who the record shows was charged with "monitoring" the movements of one, Lee Harvey Oswald, for the two months preceding the assassination.

Miscellaneous:

George Bush's roomate at Andover and Yale, who subsequently enlisted with him into the Navy was Demitri Von Mohrenschildt's step-son, Edward Gordon Hooker.

George DeMohrenschildt was business partners with Mohammed al Fayed and Clamar J. Charles in Haiti, while working for Clint Murchison's Haitian interests. He also worked for Murchison's Three States Oil & Gas Co.

Jackie Kennedy grew up calling George DeMohrenschildt, "Uncle George" -- as her mother Janet Auchincloss nearly married him after she had dated him during her divorce from Jackie's father, Black Jack Bouvier.

At one time, DeMohrenschildt actually was engaged to be married to Jackie's mother's sister, (Jackie's aunt), Michelle.

George Bush has selective Altzheimer's regarding his where abouts of 11-22-1963. Barbara Bush stated he was in Tyler, TX. although he has "speculated" that he may have been in Port Au Prince, Haiti.

FBI Special Agent, Graham Kitchell states that he received a call from George Bush on 11-22-1963, and that George Bush (and his voice) were very familiar to him at that time. The call was made to the Houston FBI office and apparently did not originate from Haiti.

Twitter Monitors User Behavior 'Off Platform'

Twitter bans all users whom associate with hate groups, like

Christians,
Church goers
Homeless Volunteers
Investigative journalists

But, if you belong to approved mudering mudshark hate groups, you not only ARE NEVER BANNED, but are promoted as diversity approved, like

black gangs
BLM
Antifa
Nambla (the rape of children under 10 years old)
etc

Satanists run twitter, the government, and the social paradigm of our times. I ask Yahua on the name and blood of  Yeshua, they be stuck down, weighed in the balance, and brought low for their crimes against all decency.

In perhaps the most intrusive move of social media platforms' efforts signal as much virtue as possible and appease their potentially-regulating government overlords, Twitter has announced that it is cracking down on what it defines at hate-speech and not just by looking at its own site.

In what amounts to a major shift in Twitter policy, Mashable's Kerry Flynn reports that the company announced on Friday that it will be monitoring user's behavior "on and off the platform" and will suspend a user's account if they affiliate with violent organizations, according to an update to Twitter's Help Center on Friday.

Abusive Behavior

We believe in freedom of expression and open dialogue, but that means little as an underlying philosophy if voices are silenced because people are afraid to speak up. In order to ensure that people feel safe expressing diverse opinions and beliefs, we prohibit behavior that crosses the line into abuse, including behavior that harasses, intimidates, or uses fear to silence another user’s voice.

Context matters when evaluating for abusive behavior and determining appropriate enforcement actions. Factors we may take into consideration include, but are not limited to whether:
  • the behavior is targeted at an individual or group of people;
  • the report has been filed by the target of the abuse or a bystander;
  • the behavior is newsworthy and in the legitimate public interest.

Violence: You may not make specific threats of violence or wish for the serious physical harm, death, or disease of an individual or group of people. This includes, but is not limited to, threatening or promoting terrorism.

You also may not affiliate with organizations that - whether by their own statements or activity both on and off the platform - use or promote violence against civilians to further their causes.

Abuse: You may not engage in the targeted harassment of someone, or incite other people to do so. We consider abusive behavior an attempt to harass, intimidate, or silence someone else’s voice.

Hateful conduct: You may not promote violence against, threaten, or harass other people on the basis of race, ethnicity, national origin, sexual orientation, gender, gender identity, religious affiliation, age, disability, or serious disease.

Hateful imagery and display names: You may not use hateful images or symbols in your profile image or profile header. You also may not use your username, display name, or profile bio to engage in abusive behavior, such as targeted harassment or expressing hate towards a person, group, or protected category.
Furthermore, Twitter says it will control the stream of information more broadly...
At times, we may prevent certain content from trending.
As Kerry Flynn notes, these changes comes amid aggressive moves by Twitter to curb abuse and harassment on the site after more than a decade of essentially letting the abusers operate freely.
Over the last week, Twitter has taken action against the accounts of white supremacists. Twitter permanently banned Tim "Treadstone" Gionet, a prominent alt-right troll more widely known as Baked Alaska, earlier this week. It also removed the verification badges of Jason Kessler, one of the organizers of the racist Unite the Right rally in Charlottesville, and of alt-right activist Richard Spencer.

Twitter's decision to monitor users off site sparked concern from free speech advocates such as Andrew Torba, founder of social network Gab.
"This is a scary precedent to set," he wrote in an email to Mashable.

"Rules like this will only force dissidents and those who are speaking truth to power to silence themselves or risk being silenced by Twitter."
Twitter's new rules will not be enforced until December 18th...
And of course, "if you're doing nothing wrong, then why would this be an issue for you" will be instant reposte of those defending yet more intrusion within America's surveillance state.

Sunday, November 19, 2017

ARCH of BAAL erected near CERN 2017 (R$E)

Strange Images Appear of Illuminati Anti-Christ (R$E)

What illuminati DON'T want you to know! (R$E)

Our Spiritual World: Jerusalem Burial Cave Reveals: Names, Testimonies ...

Our Spiritual World: Jerusalem Burial Cave Reveals: Names, Testimonies ...: by Jean Gilman JERUSALEM, Israel - Does your heart quicken when you hear someone give a personal testimony about Jesus? Do you feel exci...

The Economist’s “The World in 2017” Makes Grim Predictions Using Cryptic Tarot Cards

The influential publication The Economist released its traditional end of year edition where it predicts events of the coming year. The 2017 edition is presented in a very occult fashion: A tarot deck modified with cryptic symbols.  If you thought that 2016 was not a great year, well The Economist does not seem to optimistic about the year to come. Indeed, in its “The Year in 2017” cover, the publication  predicts death and turmoil in a dark occult context, using tarot cards and cryptic symbolism.
When The Economist released its The World in 2015 cover, I simply had to write an extensive article about it because it alluded, through symbolism, to various agendas of the elite. Indeed, The Economist is not your typical magazine, it is a ‘prestigious’ publication owned by powerful people. As I’ve written in the 2015 article:
“I wouldn’t normally dedicate an entire article analyzing the cover of a publication, but this isn’t any publication. It is The Economist and it is directly related to the world elite. It is partly owned by the Rothschild banking family of England and its editor-in-chief, John Micklethwait, attended several times to the Bilderberg Conference – the secretive meeting where the world’s most powerful figures from the world of politics, finance business and media discuss global policies. The outcome of those meetings is totally secret. It is therefore safe to say that the people at The Economist know things that most people don’t.”
While some images on that 2015 cover referred to obvious events, others were extremely cryptic – even ‘coded’ – as they were never satisfactorily explained.
This year’s edition is even more enigmatic. It uses the tarot to predict the year to come. Here it is.

The first thing one can say about this cover is that it is occult. The tarot is indeed said to contain within its symbolism the entirety of occult mysteries transmitted by secret societies. Also, considering that the cards of the Major Arcana is also referred to as “trumps”, it was a great way to emphasize that next year will be very influenced by Trump’s election.

The Tarot

Using tarot cards to predict the future, in a publication that is owned by the occult elite, is quite fitting. Through the centuries, several versions of the tarot were created. However, most of them contain the same symbolism which allude to specific esoteric concepts. Occultists agree that the tarot originate from Ancient Egypt.
“The Book of Thoth was a résumé of the esoteric learning of the Egyptians. After the decadence of their civilization, this lore became crystallized in a hieroglyphic form as the Tarot; this Tarot having become partially or entirely forgotten or misunderstood, its pictured symbols fell into the hands of the sham diviners, and of the providers of the public amusement by games of Cards.”
– Manly P. Hall, The Secret Teachings of All Ages
The tarot is an extremely dense compilation of occult concepts and symbolism, encompassing Freemasonry, numerology, the kabbalah and alchemy.
“Many symbols appearing upon the Tarot cards have definite Masonic interest. The Pythagorean numerologist will also find an important relationship to exist between the numbers on the cards and the designs accompanying the numbers. The Qabbalist will be immediately impressed by the significant sequence of the cards, and the alchemist will discover certain emblems meaningless save to one versed in the divine chemistry of transmutation and regeneration.”
– Ibid.
The Economist’s cover was inspired by the Rider-Waite deck which was published in 1909. Here it is.
The Rider-Waite tarot deck.
The Rider-Waite deck was conceived by the prominent occultist A.E. Waite who was a an initiate and a master of several secret societies.
“Waite joined the Outer Order of the Hermetic Order of the Golden Dawn in January 1891 after being introduced by E.W. Berridge. In 1893 he withdrew from the Golden Dawn. In 1896 he rejoined the Outer Order of the Golden Dawn. In 1899 he entered the Second order of the Golden Dawn. He became a Freemason in 1901, and entered the Societas Rosicruciana in Anglia in 1902. In 1903 Waite founded the Independent and Rectified Order R. R. et A. C. This Order was disbanded in 1914. The Golden Dawn was torn by internal feuding until Waite’s departure in 1914; in July 1915 he formed the Fellowship of the Rosy Cross, not to be confused with the Societas Rosicruciana.”
Therefore, by using the Rider-Waite deck to predict 2017, The Economist reveals the true force that makes these predictions happen: The occult elite.
Let’s look at the cryptic symbolism found on each card.

The Tower

thetower
The first card of ‘planet Trump’ is The Tower. By doing so, the cover begins predictions on a rather grim note. Not unlike The Tower of the Rider-Waite deck, the card features a tower being destroyed by lightning from above, a reference to the Tower of Babel being destroyed by God. This card is usually associated with danger, crisis, destruction, and liberation.
“This card follows immediately after The Devil in all Tarots that contain it, and is associated with sudden, disruptive, and potentially destructive change.”
–  Bill Butler, Dictionary of the Tarot
On The Economist’s cover, the tower is surrounded by mobs of people holding a red communist flag and a crucifix. Why are communists and Christians facing each others while the tower is being destroyed? Is The Economist alluding to the two forces that are said to have propelled Trump to power – Russia and conservative Christianity?
Or does it maybe refer to the growing division between two opposite groups – globalists/liberals/socialists versus nationalist/religious/conservatives?
On the tower’s door is nailed a piece of paper. This appears to be a reference to Martin Luther’s Ninety-five Theses.
A painting of Martin Luther nailing his Theses on the door of All Saints’ Church in Wittenberg.
Martin Luther’s thesis criticized various aspects of Catholicism, a gesture that prompted Protestant Reformation. Is The Economist predicting a difficult year for the Catholic Church?

Judgement

thejudgement
Donald Trump is sitting on the globe while holding an orb and a scepter – objects referring to monarchy. In other words, Trump is the king of the world. Monarchy and democracy are political systems that are extremely different. The Economist appears to be predicting that Trump will rule the world like a monarch.
Furthermore, why is this image associated the Judgement card? The Economist’s card looks nothing like the Judgement card from the Rider-Waite deck which depicts the Angel Gabriel on Judgement Day as described by the Book of Revelation.
The Book of Revelation mentions several times the term ‘kings of the Earth’. They are sometimes said to worship Christ and in other passages, they are said to worship the Beast.
“And I saw the beast, the kings of the earth, and their armies, gathered together to make war against Him who sat on the horse and against His army.”
– Revelation 19:19
When portrayed in a negative context, these ‘kings of the earth’ suffer the judgment symbolized in the seven seals, trumpets, and bowls, finally concluding with their defeat by the rider of the white horse in chapter 19. Strange fact: There’s a white horse on the cover.

The World

TW2017_Cover_FINALS.indd
Once again, The Economist’s The World card looks nothing like its Rider-Waite counterpart. In tarot, The World card represents an ending to a cycle of life, a pause in life before the next big cycle beginning with the fool. It is also associated with the concept of ‘unification’.
On The Economist’s version, we see images representing arts, literature and theater floating above three monuments. Two of them feature classical architecture found in Rome, Greece, Washington DC and Paris (the monument in the middle resembles the Panthéon). The Egyptian pyramid brings to the card a mystical, esoteric dimension.
These three monuments perfectly represent the historical influence of the ‘occult elite’ on society. Claiming to be the guardians of the Mysteries originating from Ancient Egypt, passed down through secret societies such the Knights Templar, the Freemasons, the Rosicrucians and the Bavarian Illuminati, the elite has been the secret force behind profound cultural and political changes.
“The direct descent of the essential program of the Esoteric Schools was entrusted to groups already well-conditioned for the work. The guilds, trade unions, and similar protective and benevolent Societies had been internally strengthened by the introduction of a new learning. The advancement of the plan required the enlargement of the boundaries of the philosophic overstate. A World Fraternity was needed, sustained by a deep and broad program of education according to the “method”. Such a Fraternity could not immediately include all men, but it could unite the activities of certain kinds of men, regardless of their racial or religious beliefs or the nations in which they dwelt. These were the men of “towardness”, those sons of tomorrow, whose symbol was a blazing sun rising over the mountains of the east.”
– Manly P. Hall, The Keys of Freemasonry
On The Economist’s card, lines connect these the three buildings of power with symbols representing popular culture. In other words, the occult elite produces a single and cohesive popular culture that is found throughout the world.

The Hermit

TW2017_Cover_FINALS.inddWhile The Hermit card in the Rider-Waite deck is rather simple, The Economist’s version is dense and full of turmoil. It depicts hordes of people marching while holding flags rejecting the TTIP (Transatlantic Trade and Investment Partnership), the TPP (Trans-Pacific Partnership) and the EU (European Union). Other flags simply say ‘STOP’ and ‘NO’ which reflect general of globalization and the agenda surrounding it. Hermits live in seclusion of society and these people want to live in seclusion from the world order.
At the bottom right of the card is a cracked globe, another ominous symbol referring to profound division and destruction.
Silently overseeing the scene is the same hermit found on the Rider-Waite deck who holds a staff and a lantern. What does he represent? Here is the esoteric meaning of The Hermit.
“The hermit thereby personifies the secret organizations which for uncounted centuries have carefully concealed the light of the Ancient Wisdom from the profane. The staff of the hermit is knowledge, which is man’s main and only enduring support. In the pseudo-Egyptian Tarot the hermit shields the lamp behind a rectangular cape to emphasize the philosophic truth that wisdom, if exposed to the fury of ignorance, would be destroyed like the tiny flame of a lamp unprotected from the storm. Man’s bodies form a cloak through which his divine nature is faintly visible like the flame of the partly covered lantern. Through renunciation – the Hermetic life – man attains depth of character and tranquility of spirit.”
– Manly P. Hall, The Secret Teachings of All Ages
The Hermit therefore represents the occult elite, the ‘secret organizations’ that have ruled the world for centuries and concealed occult knowledge from the profane (i.e. the masses). Is the hermit silently watching the masses getting excited about nationalism because it falls ultimately falls into a greater scheme? No matter what the case may be, the next card is not very optimistic.

Death

TW2017_Cover_FINALS.indd
This card cannot be more ominous. Not unlike the Rider-Waite version, the card features a skeleton sitting on a white horse. On The Economist’s version, a nuclear mushroom is in the background which probably alludes to tensions to come between nuclear powers around the world (a mushroom was also on the 2015 cover). Other calamities are found on the card such as mosquitoes (a reference to zika-type viruses?) and a dead fish in a dried up river (the growing water crisis around the world?).
Strange detail: The card features the same ‘blazing sun’ in the background found on The World card (with inverted colors).
“The field in which death reaps is the universe, and the card discloses that all things growing out of the earth shall be cut down and return to earth again.”
– Manly P. Hall, The Secret Teachings of All Ages

The Magician

TW2017_Cover_FINALS.indd
This card is very similar to its Rider-Waite counterpart. In both cases, the magician has one hand towards the heavens and another towards the earth – a reference to the hermetic axiom “as above, so below”. In The Economist’s version, the magician is wearing a VR (virtual reality) helmet while working a 3D printer.
As Arthur C. Clark’s third law stipulates:
“Any sufficiently advanced technology is indistinguishable from magic.”
On this card, 3D printing appears to be a ‘magical’ solution to create low-cost housing solutions – an industry that is already ramping up. VR will undoubtedly be a big thing in 2017 as several products are set to be released in the coming years.
The infinity symbol found above the magician can refer to the limitless possibilities of both technologies: One can create infinite virtual worlds while the other can greatly expand the limits of material resources.

The Wheel of Fortune

TW2017_Cover_FINALS.indd
This card refers to the upcoming elections in three European nations: France, Germany and the Netherlands. Marine LePen, Angela Merkel and Geert Wilders are attached to a spinning wheel next to election ballots.
In the Rider-Waite deck, the Wheel of Fortune card features an eight-spoked wheel – the Cycle of Necessity – an esoteric symbol referring to the cyclic nature of life.
The world of politics is also cyclic and, according to The Economist, a smiling Marine Le Pen is heading towards the top of the wheel while a pouting Merkel is upside down and heading down. To make things worse, Merkel is next to dark cloud while Le Pen is under a nice clear sky. Is Merkel heading towards a bitter defeat? Will her controversial “open door policy”, which allowed the entrance of over a million refugees in Germany in the past years, cause her to lose?
Conversely, will Le Pen profit from the nationalist momentum started by Brexit and the election of Trump? Will France become another powerful country ruled by the ‘far-right’ and nationalism? While Le Pen’s political party Le Front National used to be shunned and described as racist, it might gain political legitimacy in 2017.
Geert Wilders, who is another “far-right” candidate who is described by media as being “populist” and “racist”. Things are looking up for him as well.
While those who reject globalism might perceive this change in political scenery as a victory, the symbolism of this card appears to say: “It is all part of the plan”. Indeed, political parties, whether they be ‘far-right’ or ‘far-left’ are all part of the same ever-turning wheel, the “cycle of necessity” that puts into power whoever is necessary at that specific time. In other words, the momentum of nationalism might be planned by the elite to accomplish specific goals.

The Star


In tarot, The Star card represents joy, optimism and feeling connected with the divine. In The Economist’s version, the faces on 15 young people appear inside yellow stars. I could not identify any of these faces. Some of them appears to be in their early teens.
Who are these specific young people? Will they be rising stars in 2017? Why is there a shooting star in the center? Strange card.
https://vigilantcitizen.com/vigilantreport/economists-world-2017-makes-grim-predictions-using-symbolic-tarot-cards/

NXIVM: The Powerful Cult That Turns Rich Women Into Mind Controlled Slaves


Under the guise of an “executive success program”, NXIVM recruits rich women and introduces them into a bizarre secret society that brainwashes its members using rituals and trauma-inducing techniques taken directly from the MKULTRA handbook.
When one learns about the dark, disturbing truths behind NXIVM (pronounced Nexium), it is difficult to understand how this organization has managed to remain active for over two decades. While accounts about the cult’s horrific methods first surfaced more than 15 years ago, NXIVM keeps recruiting rich women, funneling millions of dollars from elite families, and expanding across America.
Founded by the “charming and charismatic” leader Keith Raniere (who requires members to call him “Vanguard”) along with his associate Nancy Salzman (who is called “Prefect”), the organization sells self-help seminars for executives. However, within NXIVM is a secret society named DOS which turns women into slaves trauma-inducing methods resembling Monarch Mind Control.
Former members have depicted Raniere as a man who manipulated his adherents, had sex with them and urged women to follow near-starvation diets to achieve the type of physique he found appealing.
– New York Times, Inside a Secretive Group Where Women Are Branded
Here’s a closer look at this bizarre “sisterhood” and its methods that are clearly based on Monarch Mind Control.

Masters of Mind Control

Keith Raniere and Nancy Salzman, satanists who beguile women into Luciferic mind control.
In 1998, Keith Raniere and Nancy Salzman founded Executive Success Programs (ESP), a company that offered life-coaching and self-improvement courses and workshops. The system was based on an “amalgam of therapeutic techniques” such as hypnosis and Neuro-linguistic programming (NLP). Both Raniere and Salzman were trained in NLP, a well-known behavior-modification technique. Unsurprisingly enough, NLP is an important part of Monarch mind control.
Programmers were using NLP before it became known as NLP in 1976. (…) If one studies NLP, one will find that NLP books such as “Basic Techniques Book II” by Clifford Wright, teach people how to create dissociative states which are alternate personalities, and that they teach people how to develop different states of mind, and pseudo multiple personalities. It is difficult to express all the different cross-overs that NLP has with Monarch Programming, but at different times the concepts of NLP certainly would be helpful to the handlers.
– Fritz Springmeier, The Formula to Create a Mind Control Slave
In only a few years, ESP trained more than 3,700 people, including high powered individuals such as: Sir Richard Branson, billionaire business mogul; Sheila Johnson, co-founder of Black Entertainment Television (BET); Antonia C. Novello, a former U.S. surgeon general; Stephen Cooper, acting chief executive of Enron; Ana Cristina Fox, daughter of the former Mexican president; and Sara and Clare Bronfman, the daughters of the heir to the Seagram fortune.
A few years later, ESP changed its name to NXIVM and raked in millions of dollars selling its patent-pending system called “Rational Inquiry”. Selling five-day courses for more than $10,000, NXIVM is said to provide “training in areas such as internal ethic, logical analysis, and problem-solving skills”.

It did not take long before journalists uncovered NXIVM’s bizarre, cult-like methods. In 2003, Forbes magazine published an article entitled Cult of Personality, which described some of the program’s particularities:
Students pay up to $10,000 for five days of lectures and intense emotional probing in daily 13-hour cram sessions. They remove their shoes for class, learn obscure handshakes and wear patented colored sashes in dozens of different variations that signify rank in the organization. When a higher-ranking student enters the room they must stand to show respect. They are taught to bow to one another and to “Vanguard.” When he makes a rare appearance, Elvis-like, students rush up to him. Some ex-clients say they have seen him greet each woman with a kiss on the mouth, although Raniere denies this.
– Forbes, Cult of Personality
All students must sign non-disclosure agreements and vow never to talk about what they learn. Not unlike most elite-secret societies, members’ secrecy is guaranteed by “collaterals”.
To gain admission, they were required to give their recruiter — or “master,” as she was called — naked photographs or other compromising material and were warned that such “collateral” might be publicly released if the group’s existence were disclosed.
– New York Times, op cit.

Bronfman Money

multi generational witches and lesbians
Sara and Clare Bronfman at the Dalai Lama event they organized for NXIVM
Sara and Clare Bronfman are the daughters of elite billionaire Edgar Bronfman Sr. who was the chairman of Seagram (once the largest distiller of alcoholic beverages in the world), President of the World Jewish Congress, and a prominent member of the Bilderberg group. They are the heiresses of a global empire that is still extremely influential in the world today. Needless to say, when they entered the ranks of NXIVM, things quickly escalated to another level.
The Bronfman sisters’ involvement with the organization did not please their father (who once called NXIVM a “cult”), but this disagreement did not prevent the transfer of massive amounts of the family fortune to Keith Raniere. Records show that Sara and Clare Bronfman gave Raniere over $150 million while rising to the top ranks of the company.
In 2009, the sisters’ crowning achievement was convincing the Dalai Lama to appear at an event in Albany, which gave NXIVM a new level of “spiritual credibility”.
Keith Raniere with the Dalai Lama in 2009, blessing a satanic order doesn't give old baldy and cred, it takes it away. No wonder the CIA rescued this guy from the communists back in the 50s, he spoke their "language."
However, Bronfman money was not only used for media-friendly events. A great chunk of that money is believed to have been used for more nefarious purposes.
In the last few months, people have begun to come forward with stories about nxivm. Stories about private detectives allegedly obtaining bank and phone records of nxivm opponents; stories of its critics being followed and threatened and, in one case, reportedly run off the road by a black limousine; accounts of a motherless three-year-old boy, brought into the group as a newborn under mysterious circumstances, and about the circumstances behind the Dalai Lama’s visit to Albany. Suddenly darker questions were being raised about how the Bronfmans’ money was being used. Indeed, today, in the multiple lawsuits involving the Bronfman sisters, there are serious allegations being lobbed—not just of possible blackmail and perjury but also of other “potentially illegal” activities, including theft and “a conspiracy to forge documents.”
– Vanity Fair, The Heiress and the Cult
Astonishingly, NXIVM is only the facade of an even more disturbing organization: An inner-circle, a secret that turned women into slaves.

DOS: The Mind Control Cult

Over the past 20 years, several journalists have exposed the sadistic and ritualistic practices of DOS (“Dominant Over Submissive”). Despite the gravity of the accusations against DOS, law enforcement has taken no action against it.
According to recent reports, one of the main figures behind DOS is Allison Mack, a former actress best known for her role in the series “Smallville”.
Mack interviewing Raniere in “Raniere Conversations”.
According to Frank Parlato, a former spokesman for NXIVM, Mack is second in command in DOS. Not only does she recruit slaves, she reportedly introduced corporeal punishment to the society. After promising them more “empowerment” and luring them in using famous actresses, DOS introduces women to a world of trauma and MKULTRA-inspired brainwashing.
Detractors say Raniere runs a cult-like program aimed at breaking down his subjects psychologically, separating them from their families and inducting them into a bizarre world of messianic pretensions, idiosyncratic language and ritualistic practices.
– Forbes, Op. Cit.
Most alarming were the accounts of near-psychotic breakdowns among some who had gone through the nxivm program, accounts that described what appeared to be classic brainwashing techniques, in which people were separated from their families and slowly broken down psychologically.
– Vanity Fair, Op. Cit.
In DOS, “masters” are told to recruit “slaves” into the circle.
Submission and obedience would be used as tools to achieve those goals, several women said. The sisterhood would comprise circles, each led by a “master” who would recruit six “slaves,” according to two women. In time, they would recruit slaves of their own.
– New York Times, Inside a Secretive Group Where Women are Branded
New recruits were then brought into initiation rituals that are, in actuality, torture sessions to cause dissociation. In short, it is trauma-based mind control.
In March, Ms. Edmondson arrived for an initiation ceremony at Ms. Salzman’s home in Clifton Park, N.Y., a town about 20 miles north of Albany where Mr. Raniere and some followers live. After undressing, she was led to a candlelit ceremony, where she removed a blindfold and saw Ms. Salzman’s other slaves for the first time. The women were then driven to a nearby house, where the branding took place.
– New York Times, op cit.
Yes, the women were branded like cattle.
Ex-member Sarah Edmondson shows the eye of horus, or Nimrod, symbol of Lucifer that was branded on her body.
Sarah Edmondson, one of the participants, said she had been told she would get a small tattoo as part of the initiation. But she was not prepared for what came next. Each woman was told to undress and lie on a massage table, while three others restrained her legs and shoulders. According to one of them, their “master,” a top Nxivm official named Lauren Salzman, instructed them to say: “Master, please brand me, it would be an honor.”
A female doctor proceeded to use a cauterizing device to sear a two-inch-square symbol below each woman’s hip, a procedure that took 20 to 30 minutes. For hours, muffled screams and the smell of burning tissue filled the room.
“I wept the whole time,” Ms. Edmondson recalled. “I disassociated out of my body.”
– Ibid.
Note that “dissociating out of one’s body” is the ultimate goal of Monarch programming. Other trauma-inducing techniques included exposing women to “ultra-violent” footage.
Dr. Porter, as part of an “experiment,” showed women graphically violent film clips while a brain-wave machine and video camera recorded their reactions, according to two women who took part.
The women said they were not warned that some of the clips were violent, including footage of four women being murdered and dismembered.
– Ibid.
Not unlike most MK slaves, those who went through DOS programming often broke down mentally.
After sleepless nights and 17-hour days of workshops, a 28-year-old woman from a prominent Mexican family says she began to have hallucinations and had a mental breakdown at her hotel near Albany. She went to a hospital and required psychiatric treatment. Her psychiatrist, Carlos Rueda, says in the last three years he has treated two others who have taken the class; one had a psychotic episode.
– Forbes, op cit.
Toni Natalie, one of Raniere’s ex-girlfriends (or, more accurately, ex-slaves) described in 2012 the trauma she was forced to endure.
 During her years with Raniere she was so broken psychologically that, according to court filings, she gave up the care of her child because Raniere had encouraged her to. (…)
He was truly brilliant, she says, but in the way “that brilliance is the closest thing to insanity,” recalling how he had insisted she keep the body of her dead puppy in her garage freezer and look at it daily in order to better deal with death.
– Vanity Fair, op cit.
Forcing slaves to neglect their children and to face dead pets are classic mind control techniques to induce trauma. And when Natalie attempted to leave Raniere, she was faced with dire consequences.
Natalie’s home was broken into; police were sent to her mother’s house; her family was threatened. (…)
During those years, Natalie would learn that nxivm had hired the controversial Israeli-born private investigator Juval Aviv to monitor her home and look into her private life and business activities. Several times, she says, she was visited by F.B.I. agents, most recently this past February.
– Ibid.
At least one woman did not make it out alive. The circumstances around the disappearance of Kristin Snyder are extremely unsettling.
In 2003, Kristin Snyder, a 35-year-old environmental consultant, disappeared after a nxivm session in Alaska. Her body was never found, but in her truck, parked on the shore of Resurrection Bay, was a note which read, “I was brainwashed and my emotional center of the brain was killed/turned off. . . . Please contact my parents . . . if you find me or this note. I am sorry . . . I didn’t know I was already dead.”
– Ibid.
While most victims are women, another bizarre story involves a motherless child who is being raised by NXIVM.
It is alleged that the Bronfmans’ foundations had used funds to pay for the care of Gaelen, the three-year-old boy who has been living in the Halfmoon “compound.” His identity is a mystery. The oft-repeated story is that he was “given” as a weeks-old infant to Barbara Jeske, one of Raniere’s longtime followers, by his grandfather, after the baby’s mother died—either in childbirth or in a car accident. He may have been born in Michigan—where sources say Jeske went to get Gaelen—but even that cannot be corroborated. Today Gaelen lives with Kristin Keeffe, the Bronfmans’ and nxivm’s “legal adviser.” Raised as Raniere’s “heir” and according to Raniere’s child-rearing theories, he is reportedly fed a raw diet, kept away from other children, and tended to by five nannies who each speak to him in a different language—including Russian, Spanish, Hindi, and Chinese. Former nxivm insiders have been so concerned about the child they have phoned child protective services, but to no avail.
– Ibid.
Is Gaelen an MK slave, too?
In Conclusion
NXIVM has been recruiting and brainwashing people for the past two decades, subjecting its participants to horrific abuse in order to break them down. Using the natural charisma of Keith Raniere, the NLP knowledge of Nancy Salzman, and the elite money of Sara and Clare Bronfman, the organization has become a high-powered cult, apparently operating above the law.
After years of revelations being all but ignored by the media and law enforcement, recent stories appear to have finally blown the organization’s cover as a “multi-level marketing organization”. However, many unsolved mysteries remain and one can easily wonder if this is just the tip of a very dark iceberg.
These revelations prove that elite organizations can and do use ritualistic mind-control techniques to create mind-controlled slaves, and, further, that these techniques actually work. The stories here are of real women and their real experience with a real, operating organization. This is not a “conspiracy theory”. It is a fact.
 https://vigilantcitizen.com/vigilantreport/nxivm-powerful-cult-turns-rich-women-mind-controlled-slaves/

Thursday, November 16, 2017

58 ADMITTED FALSE FLAG ATTACKS

In the following instances, officials in the government which carried out the attack (or seriously proposed an attack) admit to it, either orally, in writing, or through photographs or videos:
(1) Japanese troops set off a small explosion on a train track in 1931, and falsely blamed it on China in order to justify an invasion of Manchuria. This is known as the “Mukden Incident” or the “Manchurian Incident”. The Tokyo International Military Tribunal found: “Several of the participators in the plan, including Hashimoto [a high-ranking Japanese army officer], have on various occasions admitted their part in the plot and have stated that the object of the ‘Incident’ was to afford an excuse for the occupation of Manchuria by the Kwantung Army ….” And see this.
(2) A major with the Nazi SS admitted at the Nuremberg trials that – under orders from the chief of the Gestapo – he and some other Nazi operatives faked attacks on their own people and resources which they blamed on the Poles, to justify the invasion of Poland.
(3) Nazi general Franz Halder also testified at the Nuremberg trials that Nazi leader Hermann Goering admitted to setting fire to the German parliament building in 1933, and then falsely blaming the communists for the arson.
(4) Soviet leader Nikita Khrushchev admitted in writing that the Soviet Union’s Red Army shelled the Russian village of Mainila in 1939 – while blaming the attack on Finland – as a basis for launching the “Winter War” against Finland. Russian president Boris Yeltsin agreed that Russia had been the aggressor in the Winter War.
(5) The Russian Parliament, current Russian president Putin and former Soviet leader Gorbachev all admit that Soviet leader Joseph Stalin ordered his secret police to execute 22,000 Polish army officers and civilians in 1940, and then falsely blamed it on the Nazis.
(6) The British government admits that – between 1946 and 1948 – it bombed 5 ships carrying Jews attempting to flee the Holocaust to seek safety in Palestine, set up a fake group called “Defenders of Arab Palestine”, and then had the psuedo-group falsely claim responsibility for the bombings (and see this, this and this).
(7) Israel admits that in 1954, an Israeli terrorist cell operating in Egypt planted bombs in several buildings, including U.S. diplomatic facilities, then left behind “evidence” implicating the Arabs as the culprits (one of the bombs detonated prematurely, allowing the Egyptians to identify the bombers, and several of the Israelis later confessed) (and see this and this).
(8) The CIA admits that it hired Iranians in the 1950′s to pose as Communists and stage bombings in Iran in order to turn the country against its democratically-elected prime minister.
(9) The Turkish Prime Minister admitted that the Turkish government carried out the 1955 bombing on a Turkish consulate in Greece – also damaging the nearby birthplace of the founder of modern Turkey – and blamed it on Greece, for the purpose of inciting and justifying anti-Greek violence.
(10) The British Prime Minister admitted to his defense secretary that he and American president Dwight Eisenhower approved a plan in 1957 to carry out attacks in Syria and blame it on the Syrian government as a way to effect regime change.
(11) The former Italian Prime Minister, an Italian judge, and the former head of Italian counterintelligence admit that NATO, with the help of the Pentagon and CIA, carried out terror bombings in Italy and other European countries in the 1950s and blamed the communists, in order to rally people’s support for their governments in Europe in their fight against communism. As one participant in this formerly-secret program stated: “You had to attack civilians, people, women, children, innocent people, unknown people far removed from any political game. The reason was quite simple. They were supposed to force these people, the Italian public, to turn to the state to ask for greater security” (and see this) (Italy and other European countries subject to the terror campaign had joined NATO before the bombings occurred). And watch this BBC special. They also allegedly carried out terror attacks in France, Belgium, Denmark, Germany, Greece, the Netherlands, Norway, Portugal, the UK, and other countries.
False flag attacks carried out pursuant to this program include – by way of example only:
(12) In 1960, American Senator George Smathers suggested that the U.S. launch “a false attack made on Guantanamo Bay which would give us the excuse of actually fomenting a fight which would then give us the excuse to go in and [overthrow Castro]“.
(13) Official State Department documents show that, in 1961, the head of the Joint Chiefs and other high-level officials discussed blowing up a consulate in the Dominican Republic in order to justify an invasion of that country. The plans were not carried out, but they were all discussed as serious proposals.
(14) As admitted by the U.S. government, recently declassified documents show that in 1962, the American Joint Chiefs of Staff signed off on a plan to blow up AMERICAN airplanes (using an elaborate plan involving the switching of airplanes), and also to commit terrorist acts on American soil, and then to blame it on the Cubans in order to justify an invasion of Cuba. See the following ABC news report; the official documents; and watch this interview with the former Washington Investigative Producer for ABC’s World News Tonight with Peter Jennings.
(15) In 1963, the U.S. Department of Defense wrote a paper promoting attacks on nations within the Organization of American States – such as Trinidad-Tobago or Jamaica – and then falsely blaming them on Cuba.
(16) The U.S. Department of Defense even suggested covertly paying a person in the Castro government to attack the United States: “The only area remaining for consideration then would be to bribe one of Castro’s subordinate commanders to initiate an attack on Guantanamo.”
(17) The NSA admits that it lied about what really happened in the Gulf of Tonkin incident in 1964 … manipulating data to make it look like North Vietnamese boats fired on a U.S. ship so as to create a false justification for the Vietnam war.
(18) A U.S. Congressional committee admitted that – as part of its “Cointelpro” campaign – the FBI had used many provocateurs in the 1950s through 1970s to carry out violent acts and falsely blame them on political activists.
(19) A top Turkish general admitted that Turkish forces burned down a mosque on Cyprus in the 1970s and blamed it on their enemy. He explained: “In Special War, certain acts of sabotage are staged and blamed on the enemy to increase public resistance. We did this on Cyprus; we even burnt down a mosque.” In response to the surprised correspondent’s incredulous look the general said, “I am giving an example”.
(20) A declassified 1973 CIA document reveals a program to train foreign police and troops on how to make booby traps, pretending that they were training them on how to investigate terrorist acts:
The Agency maintains liaison in varying degrees with foreign police/security organizations through its field stations ….
[CIA provides training sessions as follows:]
a. Providing trainees with basic knowledge in the uses of commercial and military demolitions and incendiaries as they may be applied in terrorism and industrial sabotage operations.
b. Introducing the trainees to commercially available materials and home laboratory techniques, likely to he used in the manufacture of explosives and incendiaries by terrorists or saboteurs.
c. Familiarizing the trainees with the concept of target analysis and operational planning that a saboteur or terrorist must employ.
d. Introducing the trainees to booby trapping devices and techniques giving practical experience with both manufactured and improvised devices through actual fabrication.
***
The program provides the trainees with ample opportunity to develop basic familiarity and use proficiently through handling, preparing and applying the various explosive charges, incendiary agents, terrorist devices and sabotage techniques.
(21) The German government admitted (and see this) that, in 1978, the German secret service detonated a bomb in the outer wall of a prison and planted “escape tools” on a prisoner – a member of the Red Army Faction – which the secret service wished to frame the bombing on.
(22) A Mossad agent admits that, in 1984, Mossad planted a radio transmitter in Gaddaffi’s compound in Tripoli, Libya which broadcast fake terrorist trasmissions recorded by Mossad, in order to frame Gaddaffi as a terrorist supporter. Ronald Reagan bombed Libya immediately thereafter.
(23) The South African Truth and Reconciliation Council found that, in 1989, the Civil Cooperation Bureau (a covert branch of the South African Defense Force) approached an explosives expert and asked him “to participate in an operation aimed at discrediting the ANC [the African National Congress] by bombing the police vehicle of the investigating officer into the murder incident”, thus framing the ANC for the bombing.
(24) An Algerian diplomat and several officers in the Algerian army admit that, in the 1990s, the Algerian army frequently massacred Algerian civilians and then blamed Islamic militants for the killings (and see this video; and Agence France-Presse, 9/27/2002, French Court Dismisses Algerian Defamation Suit Against Author).
(25) In 1993, a bomb in Northern Ireland killed 9 civilians. Official documents from the Royal Ulster Constabulary (i.e. the British government) show that the mastermind of the bombing was a British agent, and that the bombing was designed to inflame sectarian tensions. And see this.
(26) The United States Army’s 1994 publication Special Forces Foreign Internal Defense Tactics Techniques and Procedures for Special Forces – updated in 2004 – recommends employing terrorists and using false flag operations to destabilize leftist regimes in Latin America. False flag terrorist attacks were carried out in Latin America and other regions as part of the CIA’s “Dirty Wars“. And see this.
(27) Similarly, a CIA “psychological operations” manual prepared by a CIA contractor for the Nicaraguan Contra rebels noted the value of assassinating someone on your own side to create a “martyr” for the cause. The manual was authenticated by the U.S. government. The manual received so much publicity from Associated Press, Washington Post and other news coverage that – during the 1984 presidential debate – President Reagan was confronted with the following question on national television:
At this moment, we are confronted with the extraordinary story of a CIA guerrilla manual for the anti-Sandinista contras whom we are backing, which advocates not only assassinations of Sandinistas but the hiring of criminals to assassinate the guerrillas we are supporting in order to create martyrs.
(28) An Indonesian fact-finding team investigated violent riots which occurred in 1998, and determined that “elements of the military had been involved in the riots, some of which were deliberately provoked”.
(29) Senior Russian Senior military and intelligence officers admit that the KGB blew up Russian apartment buildings in 1999 and falsely blamed it on Chechens, in order to justify an invasion of Chechnya (and see this report and this discussion).
(30) As reported by BBC, the New York Times, and Associated Press, Macedonian officials admit that the government murdered 7 innocent immigrants in cold blood and pretended that they were Al Qaeda soldiers attempting to assassinate Macedonian police, in order to join the “war on terror”.
(31) At the July 2001 G8 Summit in Genoa, Italy, black-clad thugs were videotaped getting out of police cars, and were seen by an Italian MP carrying “iron bars inside the police station”. Subsequently, senior police officials in Genoa subsequently admitted that police planted two Molotov cocktails and faked the stabbing of a police officer at the G8 Summit, in order to justify a violent crackdown against protesters.
(32) The U.S. falsely blamed Iraq for playing a role in the 9/11 attacks – as shown by a memo from the defense secretary – as one of the main justifications for launching the Iraq war. Even after the 9/11 Commission admitted that there was no connection, Dick Cheney said that the evidence is “overwhelming” that al Qaeda had a relationship with Saddam Hussein’s regime, that Cheney “probably” had information unavailable to the Commission, and that the media was not ‘doing their homework’ in reporting such ties. Top U.S. government officials now admit that the Iraq war was really launched for oil … not 9/11 or weapons of mass destruction. Despite previous “lone wolf” claims, many U.S. government officials now say that 9/11 was state-sponsored terror; but Iraq was not the state which backed the hijackers. (Many U.S. officials have alleged that 9/11 was a false flag operation by rogue elements of the U.S. government; but such a claim is beyond the scope of this discussion. The key point is that the U.S. falsely blamed it on Iraq, when it knew Iraq had nothing to do with it.).
(33) Although the FBI now admits that the 2001 anthrax attacks were carried out by one or more U.S. government scientists, a senior FBI official says that the FBI was actually told to blame the Anthrax attacks on Al Qaeda by White House officials (remember what the anthrax letters looked like). Government officials also confirm that the white House tried to link the anthrax to Iraq as a justification for regime change in that country.
(34) According to the Washington Post, Indonesian police admit that the Indonesian military killed American teachers in Papua in 2002 and blamed the murders on a Papuan separatist group in order to get that group listed as a terrorist organization.
(35) The well-respected former Indonesian president also admits that the government probably had a role in the Bali bombings.
(36) Police outside of a 2003 European Union summit in Greece were filmed planting Molotov cocktails on a peaceful protester.
(37) Former Department of Justice lawyer John Yoo suggested in 2005 that the US should go on the offensive against al-Qaeda, having “our intelligence agencies create a false terrorist organization. It could have its own websites, recruitment centers, training camps, and fundraising operations. It could launch fake terrorist operations and claim credit for real terrorist strikes, helping to sow confusion within al-Qaeda’s ranks, causing operatives to doubt others’ identities and to question the validity of communications.”
(38) Similarly, in 2005, Professor John Arquilla of the Naval Postgraduate School – a renowned US defense analyst credited with developing the concept of ‘netwar’ – called for western intelligence services to create new “pseudo gang” terrorist groups, as a way of undermining “real” terror networks. According to Pulitzer-Prize winning journalist Seymour Hersh, Arquilla’s ‘pseudo-gang’ strategy was, Hersh reported, already being implemented by the Pentagon:
“Under Rumsfeld’s new approach, I was told, US military operatives would be permitted to pose abroad as corrupt foreign businessmen seeking to buy contraband items that could be used in nuclear-weapons systems. In some cases, according to the Pentagon advisers, local citizens could be recruited and asked to join up with guerrillas or terrorists
The new rules will enable the Special Forces community to set up what it calls ‘action teams’ in the target countries overseas which can be used to find and eliminate terrorist organizations. ‘Do you remember the right-wing execution squads in El Salvador?’ the former high-level intelligence official asked me, referring to the military-led gangs that committed atrocities in the early nineteen-eighties. ‘We founded them and we financed them,’ he said. ‘The objective now is to recruit locals in any area we want. And we aren’t going to tell Congress about it.’ A former military officer, who has knowledge of the Pentagon’s commando capabilities, said, ‘We’re going to be riding with the bad boys.’”
(39) United Press International reported in June 2005:
U.S. intelligence officers are reporting that some of the insurgents in Iraq are using recent-model Beretta 92 pistols, but the pistols seem to have had their serial numbers erased. The numbers do not appear to have been physically removed; the pistols seem to have come off a production line without any serial numbers. Analysts suggest the lack of serial numbers indicates that the weapons were intended for intelligence operations or terrorist cells with substantial government backing. Analysts speculate that these guns are probably from either Mossad or the CIA. Analysts speculate that agent provocateurs may be using the untraceable weapons even as U.S. authorities use insurgent attacks against civilians as evidence of the illegitimacy of the resistance.
(40) Undercover Israeli soldiers admitted in 2005 to throwing stones at other Israeli soldiers so they could blame it on Palestinians, as an excuse to crack down on peaceful protests by the Palestinians.
(41) Quebec police admitted that, in 2007, thugs carrying rocks to a peaceful protest were actually undercover Quebec police officers (and see this).
(42) A 2008 US Army special operations field manual recommends that the U.S. military use surrogate non-state groups such as “paramilitary forces, individuals, businesses, foreign political organizations, resistant or insurgent organizations, expatriates, transnational terrorism adversaries, disillusioned transnational terrorism members, black marketers, and other social or political ‘undesirables.’” The manual specifically acknowledged that U.S. special operations can involve both counterterrorism and “Terrorism” (as well as “transnational criminal activities, including narco-trafficking, illicit arms-dealing, and illegal financial transactions.”)
(43) The former head of Secret Services and Head of State of Italy (Francesco Cossiga) advised the 2008 minister in charge of the police, on how to deal with protests from teachers and students:
He should do what I did when I was Minister of the Interior … infiltrate the movement with agents provocateurs inclined to do anything …. And after that, with the strength of the gained population consent, … beat them for blood and beat for blood also those teachers that incite them. Especially the teachers. Not the elderly, of course, but the girl teachers yes.
(44) At the G20 protests in London in 2009, a British member of parliament saw plain clothes police officers attempting to incite the crowd to violence.
(45) Egyptian politicians admitted (and see this) that government employees looted priceless museum artifacts in 2011 to try to discredit the protesters.
(46) Rioters who discredited the peaceful protests against the swearing in of the Mexican president in 2012 admitted that they were paid 300 pesos each to destroy everything in their path. According to Wikipedia, photos also show the vandals waiting in groups behind police lines prior to the violence.
(47) A Colombian army colonel has admitted that his unit murdered 57 civilians, then dressed them in uniforms and claimed they were rebels killed in combat.
(48) On November 20, 2014, Mexican agent provocateurs were transported by army vehicles to participate in the 2014 Iguala mass kidnapping protests, as was shown by videos and pictures distributed via social networks.
(49) The highly-respected writer for the Telegraph Ambrose Evans-Pritchard says that the head of Saudi intelligence – Prince Bandar – recently admitted that the Saudi government controls “Chechen” terrorists.
(50) High-level American sources admitted that the Turkish government – a fellow NATO country – carried out the chemical weapons attacks blamed on the Syrian government; and high-ranking Turkish government admitted on tape plans to carry out attacks and blame it on the Syrian government.
(51) The Ukrainian security chief admits that the sniper attacks which started the Ukrainian coup were carried out in order to frame others. Ukrainian officials admit that the Ukrainian snipers fired on both sides, to create maximum chaos.
(52) Burmese government officials admitted that Burma (renamed Myanmar) used false flag attacks against Muslim and Buddhist groups within the country to stir up hatred between the two groups, to prevent democracy from spreading.
(53) Britain’s spy agency has admitted (and see this) that it carries out “digital false flag” attacks on targets, framing people by writing offensive or unlawful material … and blaming it on the target.
(54) U.S. soldiers have admitted that if they kill innocent Iraqis and Afghanis, they then “drop” automatic weapons near their body so they can pretend they were militants
(55) Similarly, police frame innocent people for crimes they didn’t commit. The practice is so well-known that the New York Times noted in 1981:
In police jargon, a throwdown is a weapon planted on a victim.
Newsweek reported in 1999:
Perez, himself a former [Los Angeles Police Department] cop, was caught stealing eight pounds of cocaine from police evidence lockers. After pleading guilty in September, he bargained for a lighter sentence by telling an appalling story of attempted murder and a “throwdown”–police slang for a weapon planted by cops to make a shooting legally justifiable. Perez said he and his partner, Officer Nino Durden, shot an unarmed 18th Street Gang member named Javier Ovando, then planted a semiautomatic rifle on the unconscious suspect and claimed that Ovando had tried to shoot them during a stakeout.
Wikipedia notes:
As part of his plea bargain, Pérez implicated scores of officers from the Rampart Division’s anti-gang unit, describing routinely beating gang members, planting evidence on suspects, falsifying reports and covering up unprovoked shootings.
(As a side note – and while not technically false flag attacks – police have been busted framing innocent people in many other ways, as well.)
(56) A former U.S. intelligence officer recently alleged:
Most terrorists are false flag terrorists or are created by our own security services.
(57) The head and special agent in charge of the FBI’s Los Angeles office said that most terror attacks are committed by the CIA and FBI as false flags. Similarly, the director of the National Security Agency under Ronald Reagan – Lt. General William Odom said:
By any measure the US has long used terrorism. In ‘78-79 the Senate was trying to pass a law against international terrorism – in every version they produced, the lawyers said the US would be in violation.
(audio here).
(58) Leaders throughout history have acknowledged the “benefits” of of false flags to justify their political agenda:
Terrorism is the best political weapon for nothing drives people harder than a fear of sudden death”.
– Adolph Hitler
“Why of course the people don’t want war … But after all it is the leaders of the country who determine the policy, and it is always a simple matter to drag the people along, whether it is a democracy, or a fascist dictatorship, or a parliament, or a communist dictatorship … Voice or no voice, the people can always be brought to the bidding of the leaders. That is easy. All you have to do is to tell them they are being attacked, and denounce the pacifists for lack of patriotism and exposing the country to danger. It works the same in any country.”
– Hermann Goering, Nazi leader.
“The easiest way to gain control of a population is to carry out acts of terror. [The public] will clamor for such laws if their personal security is threatened”.
– Josef Stalin
Postscript:  Unmarked Israeli fighter jets and unmarked torpedo boats attacked – and did everything they could to sink – a U.S. ship off the coast of Egypt in 1967 called the USS Liberty.
The attack started by targeting communications on the ship so that the Americans couldn’t radio for help. The Israelis then jammed the ship’s emergency distress channel, and shot at escaping life rafts in an attempt to prevent survivors from escaping.
Transcripts of conversations between the Israeli pilots and Israeli military show that Israel knew it was an American ship.
Numerous top-level American military and intelligence officials – including Admiral Thomas H. Moorer, former Chairman of the Joint Chiefs of Staff – believe that this was a failed false flag attack, and that Israel would have attempted to blame Egypt if the Israeli military had succeeded in sinking the ship. Indeed, President Lyndon Johnson dispatched nuclear-armed fighter jets to drop nuclear bombs on Cairo, Egypt.  They were only recalled at the last minute, when Johnson realized that it was the Israelis – and not the Egyptians – who had fired on the Liberty.
The following actions are arguably an admission that Israel intended to frame Egypt for the attack, and didn’t want the Liberty’s crew to be able to tell the world what really happened: (1) using unmarked jets and boats, (2) destroying the Liberty’s communication equipment and jamming the Liberty’s emergency distress channel, and (3) trying to sink the ship and destroy all liferafts.
See this, this, this and this.