Thursday, August 31, 2017

U.S. ARMY FUDGES ACCOUNTS… BY TRILLIONS OF DOLLARS  ~ hehe “Where is the money going? Nobody knows,”   Oops "somebody"  KNOWS ...but "they" ain't tell~in ...WE THE PEOPLE ,tho !  Lol maybe "it's" fly~in 'round UP the in the sky?space nawwwwwwwwwwwww every~body knows that's   E. fucking T's  shit (til "they" crash)  :)r  Image result for pic of fraud uncle sam is paying

I think it was the late U.S. Senator Everett Dirksen, from Illinois, who once quipped that "a billion here, and a billion there, and pretty soon you're talking some serious money." Of course, Senator Dirksen was talking in the 1960s, and adjusting for inflation, reckless federal spending, fiat debt-as-money, central banks, hidden systems of finance, and a budgetary process that isn't anywhere close to constitutionality, coupled with a corrupt federal judiciary that says that it is, and one would have to elevate the late Senator's remarks by several orders of magnitude, three, in fact, if the following story from Reuters which appeared during the election cycle last year, shared by Ms. K.M., is true. And frankly, I have no difficulty whatsoever believing it's true. In fact, if you've been following the various people who've been attempting to track all that "missing money" over the years - think of Congressman Grayson (D-FL) or Congresswoman Cynthia McKinney (D-GA), or Catherine Austin Fitts, or more recently, Dr. Carson at the Department of Housing and Urban Development - there's a lot of missing money, and virtually no way to account for it.
Well, now the U.S. Army, according to this 2016 Reuters article, seems to have misplaced a few trillion:
There's so much here one doesn't know where, really, to begin. So consider the opening two paragraphs:
The United States Army’s finances are so jumbled it had to make trillions of dollars of improper accounting adjustments to create an illusion that its books are balanced.
The Defense Department’s Inspector General, in a June report, said the Army made $2.8 trillion in wrongful adjustments to accounting entries in one quarter alone in 2015, and $6.5 trillion for the year. Yet the Army lacked receipts and invoices to support those numbers or simply made them up.  (Emphasis added)
Yes. That's right. In 2015, the US Army made false adjustments of $6.5 trillion dollars, and cannot show any receipts or invoices to support those numbers. But wait, there's more, because as a result of this lack of "invoices and receipts", no one knows exactly where all this money is really going.
“Where is the money going? Nobody knows,” said Franklin Spinney, a retired military analyst for the Pentagon and critic of Defense Department planning.
Well, we do know in part where it's going: it's going for expensive fighter project boondoggles like the F-35 or for warships that require to be hauled back to the USA for repairs of their sensitive systems on rented Norwegian freighters. Think about that one for a moment and imagine the operational risks. It's rather like the Royal Navy saying during World War Two that the battleship King George V contained such "sensitive stuff"(and it did, for the time) that if it became damaged far from British home waters, it would have to rent a Swedish freighter to haul it back to Portsmouth for repairs, running the risk of u-boat attacks and the tender attentions of the Luftwaffe. If systems are that sensitive, are they really operationally feasible?
I submit this is a national security issue, and during a time frame that has seen weird ramming events of US naval warships, it's a significant one. If the Army cannot account for where all that money went because of missing receipts and invoices, what about the other service branches? What, exactly, is the US taxpayer getting for all that missing money, besides very expensive systems that, if you followed my multi-part blog about the navy incidents earlier this week, either do not work, or that have been somehow compromised? What are we getting? Well, no one knows exactly, because there are no receipts and invoices!
It's those missing receipts and invoices that "get" me. What are the big defense contractors doing with all that money? One might speculate and say that the receipts and invoices are there, but they're for such deeply classified black projects, that they appear not to be. But that still leaves open the question, what are those companies doing with all that money? What are they really developing? The only other interpretive option here is plain and simple fraud, and the reality is probably some combination of both.
And that raises the issue of budget transparency to the status of a national security issue. More transparency is essential, because without it, we're going to have more incidents like the Donald Cook, the Fitzgerald, and the McCain.

Wednesday, August 30, 2017

Mayweather V. McGregor: Showtime Got Injunctions On Pirate Stream Sites Which Didn't Work & Neither Did Their Own Stream

from the oops dept

As you will already know, a boxing match recently took place between Floyd Mayweather Jr. and Conor McGregor. The fight itself was far better than it should have been, but you may not know it if you couldn't manage to actually see it. Much as it did in the run up to the Mayweather v. Pacquiao fight of a couple of years ago, Showtime went out and got some rather questionable injunctions against 44 sites it believed would be offering up the fight via an illegitimate stream during the live pay-per-view broadcast. That effort resulted in, ahem, only three million viewers watching the fight via illegal live streams. Thousands more downloaded video of the fight illicitly after it occurred. So, Showtime got a court to agree to questionable pre-crime activities with the result being rather mixed.
But if the steady mantra from the content industries that "every infringement is a lost sale" were true, then perhaps Showtime should be thanking its lucky stars that illegal streams were available, because its own streaming service wasn't able to handle the viewership load it did have.
Showtime was hit with a federal class-action lawsuit amid reports that it delivered shoddy or non-existent $99 streams of the Floyd Mayweather-Conor McGregor fight Saturday. This is contrary to Showtime's promise of 1080p resolution at 60 frames per second.
"Instead of being a 'witness to history' as defendant had promised, the only thing plaintiff witnessed was grainy video, error screens, buffer events, and stalls," declared the lawsuit (PDF) filed in federal court on behalf of a Portland man named Zack Bartel. The suit seeks to represent "thousands of other consumers" unable to stream the Mayweather fight in HD as Showtime advertised.
By all accounts, it was bad. Really bad. The fight was delayed for paying streamers for over half an hour as Showtime's service was unable to handle all of those customers who paid for the fight. I don't want to spend any time on this class lawsuit, because these kinds of class lawsuits are generally pretty silly and the fact that Showtime failed to deliver on its own streaming product isn't in and of itself the point. The point is that if the company really wanted to go to war with streaming sites prior to the fight, it should have made sure that money and effort wouldn't have been better spent actually catering to its paying customers.
What if the content industries were right and the injunctions had worked? What if Showtime had to accommodate three million more customers with pirate streams unavailable? How bad would the streaming experience to all of those paying customers have been then? Likely it would have merely added 3 million more individuals to the class action lawsuit.
Meanwhile, of those that did pay for the fight and had their experience range from "delayed and sub-par" to "holy shit, I can't even watch this thing", how many might give this whole pirate stream thing a whirl the next time Showtime puts on a fight? All because Showtime would rather play whac-a-mole with streaming sites than make its own product function, never mind actually competitively good.   

The Hollies The Air That I Breathe

...if i could make  a wish ...i think i'd pass .. can't think of anything i need  :)r  

The Hollies The Air That I Breathe

CCTV + Lip-Reading Software = Even Less Privacy, Even More SurveillanceImage result for funny pic of slipping on a bar of soap

from the HAL-would-be-proud dept

Techdirt has written a number of stories about facial recognition software being paired with CCTV cameras in public and private places. As the hardware gets cheaper and more powerful, and the algorithms underlying recognition become more reliable, it's likely that the technology will be deployed even more routinely. But if you think loss of public anonymity is the end of your troubles, you might like to think again:

Lip-reading CCTV software could soon be used to capture unsuspecting customer's private conversations about products and services as they browse in high street stores.
Security experts say the technology will offer companies the chance to collect more "honest" market research but privacy campaigners have described the proposals as "creepy" and "completely irresponsible".
That story from the Sunday Herald in Scotland focuses on the commercial "opportunities" this technology offers. It's easy to imagine the future scenarios as shop assistants are primed to descend upon people who speak favorably about goods on sale, or who express a wish for something that is not immediately visible to them. But even more troubling are the non-commercial uses, for example when applied to CCTV feeds supposedly for "security" purposes.
How companies and law enforcement use CCTV+lip-reading software will presumably be subject to legislation, either existing or introduced specially. But given the lax standards for digital surveillance, and the apparent presumption by many state agencies that they can listen to anything they are able to grab, it would be na&iumlve to think they won't deploy this technology as much as they can. In fact, they probably already have.      

HURRICANE HARVEY HYPOTHESES           ~ hehe nut~in ta C here folks ...ALLLLL an act    "of god"

I had not intended to write anything about Hurricane Harvey in this week's blogs, but felt compelled to do so because of an odd "synchronicity" that occurred as I was writing and scheduling this week's blogs. Normally, when I am scheduling blogs, I tune in to some talk radio and listen as I write, either on the radio or on the internet, just to try to "stay abreast of things."  Normally, when such disasters happen, I am loathe to take them as opportunities to indulge in our trademark "high octane speculation"; people are suffering, losing their houses, assets, pets, and there is general upheaval and suffering.  It's not an appropriate time to indulge in "high octane speculations." Certainly, watching this disaster unfold, we all empathize and offer good thoughts and prayers for the people - at this juncture, all of Houston and most of the southern Texas Gulf coast.
However, in this case, hoping that people will excuse my high octane speculating while the disaster is in progress, I felt compelled to do so, for as I was listening to my radio, the host in question was reporting on the situation as it was occurring, and he said two things that really grabbed my attention. I am paraphrasing his remarks as closely as I can: (1) "Harvey seems simply to have stopped moving inland and has basically parked itself over the Texas coast," and he added to this that all of the roads in and out of Houston are simply impassible due to flooding; (2) that "most of southern Texas' coastal plain in and around Houston might be uninhabitable for weeks, if not months."  Yes, that will be the result if hurricanes decide to "park themselves" over an area and not move along.
But of course, hurricanes don't "decide" anything.
It's the strangeness of Harvey's behavior that caught my attention as the host made these remarks. It took me back to Hurricane Katrina which infamously moved in and struck New Orleans almost a decade ago. Again, that hurricane exhibited very unusual, very "un-hurricane-like" behavior, for if you'll recall, its path was almost due west through the Gulf of Mexico when, suddenly, reaching a point almost due south of New Orleans, it veered sharply in an almost perfect ninety degree turn, and made its way north, striking the city and surrounding environs and flooding thousands of people out of their homes and livelihoods. I recall seeing at that time - and other readers here may recall seeing this as well - the jet stream suddenly moved south in "response" to Katrina's sharp turn, as if "someone" was trying to steer the storm away from New Orleans, implying, of course, that someone was trying to steer it toward New Orleans.
In other words, my view of Katrina back then was - and still remains - that this storm was steered toward the city. It was, to be blunt, "weaponized weather."
And Harvey's stubborn refusal to move along inland, but rather to stay put, spawn tornadoes, and dump more water on Houston and the Texas Gulf coast, seems a little "odd." It seems, if I may be "country simple" once again, to be too contrived. Weaponizing weather to make an entire region of a state "uninhabitable for weeks or possibly months" behind an "act of God" like a storm is a convenient way to wage war behind the ultimate cloak of plausible deniability, for most people have difficulty believing the idea that such enormous systems, such as the weather, can actually be manipulated, steered, and engineered. More informed people will know, of course, that the ability to manipulate and weaponize weather was an objective of at least America's and Russia's militaries since the 1950s. Both countries have made round-about statements over the years that their efforts were successful. More recent statements of the US military made weather manipulation a crucial component of "force multipliers" and a component of its goal of "full spectrum dominance". Researchers such as Dr. Nick Begich and Jean Manning have also pointed out that the initial patents for ionospheric heaters taken out by Bernard Eastland for the HAARP array in Alaska also discussed weather systems steerage and manipulation as one possible application of the technology. Then there's the Globaloney crowd and their "weather derivatives," securities based on weather, a handy thing to have around; after all, if one can manipulate weather, why not make money off of it (and pick up ruined properties on the cheap besides)?
So now a hurricane is parked over southern Texas, one of the USA's few smoothly functioning state governments and economies.
Bottom line: I cannot help but think that Harvey's odd behavior is a little too odd, and that we're looking at weather warfare once again, or at the minimum, the possibility that we're looking at some sort of "blowback" from the technologies that can manipulate systems on a planetary scale, systems such as HAARP and EISCAT and other ionospheric heaters, possibly even the Large Hadron Collider with its strong, immensely powerful magnetic fields. There's an aspect of "unnaturality" here, if I may coin that word, that disturbs me.
But in the meantime, Texas suffers, and my heart is saddened for Houstonians and all the people along the coast from Galveston northward.                   

Total Individual Control Technology: Insider Exposes How You & Your DNA are Being Targeted       ~ hehe ...
Americans, in the millions, are having their DNA stolen from them, without their knowledge or consent, so they become unwitting targets of this insidious program! ...
Image result for evil nazi super science

Total Individual Control Technology
Total Individual Control Technology is ultimate mind control weapon since it  targets your individual DNA.

Total Individual Control Technology

is a nefarious type of EM (Electromagnetic) and V2K (Voice to Skull) weaponized technology that is being experimented with and deployed against segments of the American population. Those attacked by this electronic stalking are known as TIs (Targeted Individuals). Recently another brave whistleblower has stepped forward to expose it. Bryan Kofron (who formerly used the alias of Justin Carter) is a security industry specialist who used to work for a private security company SIS (Security Industry Specialists) in Seattle, Washington. He quit in disgust after realizing that his former firm, and others just like it, were actively using this so-called total individual control technology to target people, then ultimately control and destroy their lives. Since he quit, he has himself become a victim of the technology via gangstalking.

What Total Individual Control Technology is Capable Of

According to Kofron, this technology is so advanced that it can be used to read your mind, program your mind with thoughts (that you would believe are your own) and induce emotional states in you (including pain, hate and fear). It can be used to tap into your optical nerve and auditory systems to see and hear what you are seeing and hearing. It can target particular people by engaging in individual-specific attacks (based on the target’s DNA resonance). Finally, it is being used in vast social engineering programs as a way to experiment upon poor, homeless and weak people who have little or no chance of fighting back.
In interviews or presentations such as this and this, Kofron explains that this technology is being used by psychopaths who have little scruples about the harm they are causing. They are targeting specific groups of people: those who are cognitively inclined, highly intelligent, knowledgeable about advanced technology or interested in alternative research (i.e. conspiracy research). In general, they are either targeting empowered individuals with free minds (to stop dissidents and revolutionaries) or those too poor and weak to fight back.
Using Kofron’s own words, here are some of the things Total Individual Control Technology is able to do:
“This technology manipulates the electrical signals in the brain, thus controlling thoughts and feelings and emotions and sensations throughout the body. It works by rewiring the brain by creating new neural pathways and destroying existing neural pathways, thus this literally changes the way a person thinks and thus behaves.”
“This technology can also be used to control the muscle movement of the target. It can take over one’s hands or feet while driving and make you press on the accelerator or press on the brake or turn. This can be used to cause accidents it can also be used to prevent accidents from happening.”
“This technology can also tap into the optical nerve of the target, and the auditory system of the target, so that those monitoring the target can see what the target is seeing and hear what target is hearing. This information is then downloaded and stored on a computer, in a highly secure classified site on servers that are guarded by some of the tightest security in the world. This results in the individual’s entire day, everything they see, everything they hear, everything they experiment, everything they experience, and everything they feel being recorded till the end of time.”
“This technology can also be used to manipulate the emotions of the target. It can induce fear, love, hate.”
“This technology can be used to beam images and even motion pictures into one’s brain. Images and motion pictures that are so realistic that you think you are actually watching a movie or seeing something in reality. It’s like a virtual reality 3D rendering that takes place within the target’s mind. The images and motion pictures manifest themselves in such a way that the target if they are not aware that this technology is being used on them will believe that they are natural thoughts and natural images.”
“This technology can also be used to induce and control dreams. It can be used to control dream cycles and sleep patterns. To cause one to sleep very deeply or to cause one to not sleep at all. REM cycles, alpha beta and delta brainwaves can be induced immediately by this technology. And this technology can also be used to mimic spiritual experiences. Joy, love, peace that passes understanding can all be induced artificially by this technology to make the target believe that they are having a genuine spiritual experience when they’re not.”
“This technology can also be used to sexually manipulate the target. Make them feel sexual arousal or turn off their sexuality altogether, it can stimulate them and it can shut them down at a moments notice. It can also be used to manipulate the hormones of the target, thus lowering and raising estrogen and testosterone levels in women and men respectively.”
“This technology can also be used to read the thoughts of the target in real time … they can read your thoughts verbatim as they occur within your own mind.”
“Anywhere from small groups of people 10-20 to 100, to medium size groups of people several thousand to tens of thousands. This is done by creating a field effect, where an entire field of electromagnetic energy is created in a geographical location and any human being within that geographical location within that electromagnetic field affecting that geographical location will be effected by the technology. This can be used to induce a general mood in a population or a crowd of people. It can be used to make them passive, it can be used to make them agitated. And this can be used to cause or stop, induce riots. Stop crime, start crime. Stop thoughts, start thoughts. Massive mind control on a citywide level.”
worldwide DNA database
The nationwide then worldwide DNA database … coming to a town near you.

Total Individual Control Technology Attacks Specific Individuals Based on DNA Resonance

As I have discussed in previous articles on mind control such as “They” Can’t Read Your Thoughts … Right?, the state of current mind control technology is beyond most’s people comprehension and idea of what is possible. Yet, we have had enough out-of-the-closet whistleblowers and leaked or declassified documents to give us a clear idea of the scary extent to which we can be psychically attacked. Whistleblowers such as Dr. Robert Duncan have lectured at length about the capabilities of V2K technology, which is defined as an EM frequency technology that utilizes RF (Radio Frequency) signals to induce sound within the cranial cavity of the target. V2K literally pipes thoughts directly into people’s heads without them knowing it.
Kofron bases his information on his own experience as an insider in this field, and also as recent victim of V2K himself. He was attacked once he went public. He claims he has been assaulted with a beta version which is especially nasty, piping thoughts into his head such as:
“Everyone’s against you”
“Please be quiet or we’re going to kill you”
“Don’t work again or we’re going to kill you” 
“You’re the lab rat now motherfucker”
Kofron claims the Total Individual Control Technology attacks are attempting to turn him against his former work colleagues, friends and family. However, since he was trained in this area, he knows that the voices are technological and can defend himself against the manipulations once he hears them.
Kofron echoes exactly what Duncan has warned about: individual-specific attacks. Duncan states that every person has a “unique resonance signature”, and in almost exactly the same words, Kofron states that:
“… the DNA of the individual is used to determine the resonant frequency of the DNA itself, the resonant frequency is then used to fine tune the technology … to tune it perfectly to the resonant frequency of the targeted individual’s DNA.”

The Drive to Create a Worldwide DNA Database

This leads into another aspect of the NWO agenda: the drive to create a worldwide DNA database. When seen in the light of Total Individual Control Technology, the acquisition of an entire population’s DNA takes on a very sinister meaning. It is no coincidence that Amazon and Google (who are ultimately controlled by the same force as David Icke suggests) are racing each other, along with Microsoft, IBM and other companies, to assemble a DNA database as quickly as they can. Those in power who gain access a completed worldwide DNA database and total individual control technology would have a horrifying weapon at their disposal to target literally anyone they wanted.
Kofron exposes how prospective employees are tricked out of their DNA. They apply for a job at SIS, get told they have to do a drug test, and when the urine sample is sent to a lab, part is siphoned off as DNA to go into Amazon’s burgeoning DNA database.
Americans, in the millions, are having their DNA stolen from them, without their knowledge or consent, so they become unwitting targets of this insidious program!

Social Engineering with Total Individual Control Technology

Kofron talks at length about how this technology is fully operational and is already being tested upon those in society who are struggling (such as those who are homeless, poor and who don’t have much family or many friends) since they make the easiest targets. On his website, he exposes the details of ongoing operations within Seattle (where he used to work for SIS). This social engineering is being done by the Federal Government, the Military Intelligence agencies, private security firms (more on this below), some of the largest US corporations (after all, we live in a corporatocracy), local and state police, and social programs within inner-city America.
In one such operation, the perpetrators would target certain geographical blocks of the city, and, for instance, cause everyone in that area to be in a bad mood. In another operation, SIS (employed by Amazon whose headquarters are in Seattle) would test upon Amazon employees. In another operation, SIS would experiment upon its own low level employees. In another operation, homeless people were brought in from all over the nation to special buildings that were then targeted. This is true gangstalking – the ganging up by sociopaths and psychopaths upon the innocent to electronically harass and stalk them.

The Rising Danger of the Private Security Firm Industry in America

Kofron warns about an alarming trend in American society: the rise of private security companies who mostly employ ex-military and ex-intelligence agents. As I covered in this 2-part series, the US Military Intelligence Complex is completely and utterly out of control. It runs the government and pulls the strings attached to all the puppet politicians, who don’t have the necessary “clearance” to access the truly top secret information. These security firms, like the MIC itself, appear to operate above and outside the law.
The culture inside of these companies is toxic. People rising up the ranks are conditioned to use this technology against innocent victims, and are told they will be rewarded with everything (money, power, women, sex, connection, access, status, belonging to the power club) if they go along with the program and become perpetrators. If they have a strong conscience and refuse, they will be sacked, shunned, cut off, threatened and even made into TIs themselves.
voice-to-skull V2K hearing voices
A madman hearing voices? Or Voice-to-Skull (V2K) technology?

The Human Rights Loophole: False Diagnoses

Another aspect of Total Individual Control Technology which the perpetrators use to shield themselves is the cruel use of false psychiatric diagnoses. Here’s how it works: they manipulate TI victims to see a psychiatrist, and then they bribe the psychiatrist to deliver a fake diagnosis that the victim is mentally unstable, deranged, delusional, crazy, incompetent, paranoid, schizophrenic, suffering from Multiple Personality Disorder – or they invent some similar legal-medical-psychobabble diagnosis. This has the unfortunate effect of stripping away the victim’s natural or human rights, which leaves him or her with no recourse to fight back against his attackers, since his claims and testimonies will be dismissed as the ravings of a madman.
This is a similar tactic to what is used with other victims of mind control. In my interview with Max Spiers, he touched on the use of the Big Pharma “false memory” foundation, which includes bogus therapists and psychiatrists who convince mind control victims that they’re having false memories (when they are actually recalling how they were tortured and programmed).

The Infrastructure Underlying Total Individual Control Technology

The infrastructure that is enabling the total individual control technology is composed mostly of antennae, radar and cell phone towers. Often, the antennae are camouflaged (hidden behind walls). Some or most of the radar used is from military bases. Kofron was not able to explain much of how the technology actually works, although an electrical engineer who called in on one of the radio interviews suggested that the perpetrators are setting up a standing wave of DNA, then doing slight variations in the phasing using pulse code modulation.

Final Thoughts: Total Individual Control Technology Perpetrated by the Cult of Power

In concluding, it’s important to realize how such cruel surveillance is being perpetuated. As Kofron explains, it’s all about creating an “in” club of perpetrators who get rewarded with money, sex, power and the intrinsic human need for belonging, get told they are on the “right” side and the TIs are on the “wrong” side – and get threatened that if they speak up or quit, they may end up on that wrong side. It’s the cult of power.
Hopefully this testimony can serve as a wakeup call for those on the fence who can’t quite bring themselves to believe or act. In many ways, time is running out and the net is being drawn tighter and tighter. The more technology advances, the more weapons the cult of power will have to enslave those who stand for truth and freedom. At a certain point, there will literally be nowhere to run or hide. The only option is to face it now before it’s too late.


Tuesday, August 29, 2017

“Weather wars” theorists claim Hurricane Harvey was engineered, “steered” toward Houston as a “weather terrorism” weapon
Image: “Weather wars” theorists claim Hurricane Harvey was engineered, “steered” toward Houston as a “weather terrorism” weapon
(Natural News) We’re bringing this claim to your attention because a growing number of observers, websites and analysts are concluding that Hurricane Harvey was “engineered” and made into a “weather weapon” through a combination of ground-based temperature manipulation tools and “chemtrail” seeding.
Yes, it sounds absurd at first, until you realize that Al Gore tells us that human activity controls the climate every day. It’s called “climate change,” and in fact, Al Gore and the climate alarmists directly tell us that we created Hurricane Harvey and all the other “extreme” weather events anyone sees. Weather modification, in other words, has become the de facto belief of climate alarmists. The entire mainstream media routinely insists that hurricanes, droughts, floods, snowstorms and tornadoes are all unintentionally created by human activity.
The key difference between Al Gore and the “weather wars” theories is that those who believe in weather wars insist these hurricanes are deliberately created, selectively amplified and steered into selected targets. Al Gore believes hurricanes are created by Man, in other words, and the weather wars theorists say they are precisely controlled and deployed as weapons of terrorism to inflict economic damage and achieve psychological goals involving terror and death.
This claim seems absurd to most people at first glance, but there is a growing community of weather skeptics who insist that such events are not accidents but weapons. That’s why we’re covering this story: Not as an endorsement of such conclusions but rather as a look at a curious corner of the internet where weather wars, weather modification and geoengineering have become popular, alternative explanations for significant weather events. In fact, there are at least two key patents (linked below) that describe this technology in great detail, including a “space-based power system” that can alter “weather elements” including hurricanes. (Keep reading for details…)
One of the most popular sites asserting such claims is, whose author — a former network engineer — explains:
For ten years, I have been proving the irrefutable reality of daily manufactured flash flood deluge and severe weather – every single day. Denying the reality of these daily manmade weather events is akin to denying the existence of the combustion engine, and it is just as easy to prove. If you can understand boiling water, you can understand where trillions of gallons of water vapor come from that create and fuel the daily trillion-gallon floods we see washing a different community away, somewhere in the world. This isn’t debatable, and it is as easy to observe as sunrise.
Unless I have the names mixed up, the author seems to go by the name of “Sofia Smallstorm” (to avoid being identified by name, of course) and goes to great lengths to protect his or her identity. This person also wrote the foreward to No Natural Weather: Introduction to Geoengineering 101.
The site has published a 14-minute analysis of Hurricane Harvey, asserting that the hurricane was augmented by “On-Land Water Vapor Generation from Texas, Louisiana, etc.” The video description also states, “It’s also no coincidence that Hurricane Harvey is hitting the United States, 25 years to the day after Hurricane Andrew hit Florida. Since all of these storms are very clearly and very obviously deliberated manufactured, this “Anniversary Hurricane” was clearly intentional.”
Another video from offers a more detailed explanation of “weather geoengineering” phenomena and how they say it relates to Hurricane Harvey, citing numerous patents, weather control conference, military technology and so on:

Do water vapor generators exist that can unleash clouds?

The idea of land-based water vapor generators that could contribute any meaningful amount of water to Hurricane Harvey seems absurd to those who have never looked into all this. According to recent estimates, Hurricane Harvey dumped 11 trillion gallons of water on Houston and surrounding areas. For any land-based machinery to contribute even 1/1000th of that volume — just 11 billion gallons of water — would take a massive fleet of mechanized water vapor generators burning through an enormous quantity of fuel or electricity. That seems unrealistic by any rational analysis.
Yet as the BBC video shows in the following video clip (starting at 15:12), there do exists large buildings that literally generate massive clouds and rainfall. Before I saw this video, even I had no idea such buildings existed. Watch the BBC explain:
Despite the existence of the technology, it is difficult to imagine the existence of such a massive operation operating covertly. That’s why the existence of a large-scale water vapor generating network seems highly unlikely. Besides, solar power does all that work for free by warming the oceans and evaporating water into the storm system. Trying to augment 11 trillion gallons of water evaporation carried out by the sun seems futile. The forces of nature are so much larger than anything mankind can contribute to them that supposing we can generate massive storm systems seems rather unlikely.
At the same time, so does the idea that human activity can drastically alter Earth’s climate in the first place. Despite all the hysteria and fear mongering of the climate change alarmists, human activity is nothing but a tiny sliver of contribution to the grand-scale phenomena driven by solar activity, volcanoes and other such events.

Weather modification technology does exist (read these patents to see for yourself)

There’s no question, by the way, that weather modification technology exists and is in widespread use across the globe. Weather control advocates are currently citing this U.S. patent #20100074390 A1, titled, “Method for weather modification and vapor generator for weather modification.”
As the patent summary states:
A nuclear fusion reactor (2) or nuclear fission reactor (22) is used as a heat source. A heat exchanger (11 or 37) that contains water to be heated (15) is used for water vapor generation. A circulating pipe (10 or 26) through which a fluid for cooling the nuclear fusion reactor or nuclear fission reactor or for conducting heat exchange circulates is disposed so as to extend in the heat exchanger and be in contact with the water to be heated. Water vapor is thus generated. This water vapor is jetted toward the sky at a state of collimation through a vapor discharge pipe (12 or 36). A cloud for blocking sunlight is formed in the sky from the water vapor jetted to reduce the temperature of the earth surface. This enables a weather modification without discharging any greenhouse gas, e.g., CO2.
Another U.S. patent (#20100224696 A1) is entitled, “Weather management using space-based power system.” It describes a space-based technology for generating and controlling hurricanes:
Space-based power system and method of altering weather using space-born energy. The space-based power system maintains proper positioning and alignment of system components without using connecting structures. Power system elements are launched into orbit, and the free-floating power system elements are maintained in proper relative alignment, e.g., position, orientation, and shape, using a control system. Energy from the space-based power system is applied to a weather element, such as a hurricane, and alters the weather element to weaken or dissipate the weather element. The weather element can be altered by changing a temperature of a section of a weather element, such as the eye of a hurricane, changing airflows, or changing a path of the weather element.
Weather modification technology isn’t a conspiracy theory, either: It’s already in use! For example, this article from SingularityHub describes Dubai’s “weather wizards” and how they use advanced electronics to create rain. It’s not a conspiracy theory; it’s just clever physics:
Meteo Systems, a Swiss company [is] developing a technology they’ve dubbed Weathertec. The idea is to erect giant ionizers wherever you’d like to have some rain. If the ambient humidity in the area reaches the required minimum of 30%, then you turn the ionizers on and start pumping electrons into the atmosphere. Assuming that you have high temperatures, the electrons will rise with the heat and water molecules will start condensing around them. At this point, you have clouds that will produce rain once they are dense enough.

Adding to the intrigue of all this, Bill Gates announced serious funding for “seawater-spraying cloud machines” designed to generate rain-producing weather systems for targeted communities. As explains:
The Microsoft founder recently announced plans to invest $300,000 into research at the University of Calgary for unique solutions and responses to climate change. Part of that research included lab tests on machines that suck up seawater and spray it into the air, seeding white clouds that reflect rays of sunlight away from Earth. Silver Lining’s floating machines can suck up ten tons of water per second. If all goes well, Silver Lining plans to test the process with 10 ships spread throughout 3800 square miles of ocean.

By the way, that was seven years ago, in 2010. Do such weather-generating fleets already exist? If so, they’ve been kept very quiet.

Another popular site that reports on Geoengineering, by the way, is Geoengineering Watch by Dane Wigington. Very informative and interesting. Check it out.

The history of hurricanes shows that Mother Nature generates them without any human engineering at all

Creating rainfall, however, is a far cry from generating a hurricane and steering it onto an intended target. That idea would likely be considered outlandish by meteorologists and scientists. The far more likely explanation, of course, is that the coriolus effect — a derivative of a spinning globe — causes rotational forces in the atmosphere that spin storm systems one way in the Northern hemisphere and the opposite way in the Southern hemisphere. (That’s why hurricanes look like opposites of each other when comparing Northern vs. Southern hemisphere storms.) Solar-heated ocean water results in large-scale water evaporation, saturating the air with vapor. That vapor condenses due to changes in temperature or pressure, causing the formation of water droplets which are now heavier than air and therefore fall to the ground. With enough solar energy, natural forces can generate truly catastrophic storms.
To think that every major storm is a “weather weapon” generated by a nefarious operation seems far-fetched to me. But then again, so does Al Gore and all his nonsense prognostications from his quack science Church of Climatology. Nevertheless, “altering” or “steering” hurricanes is technically a far easier task than generating them wholesale. What some of the weather wars people are saying is not that the hurricanes are generated wholly by artificial systems but rather that they are “steered” or “influenced” in terms of their direction or intensity. Is that really possible? Multiple patents obviously say it is, and the U.S. patent office didn’t reject those patents, interestingly.
On the other side of the argument, history has recorded dozens of hurricanes striking Gulf Coast regions over the last century. Most of these hurricanes took place long before the rise of modern technology or exotic weather modification capabilities. So how are all these hurricanes explained? (Answer: Natural phenomena.)

Conclusion: Keep asking questions and stay curious, but also think critically

My conclusion in all this? Creative, critical thinking is a healthy practice, and I always encourage people to keep asking questions and challenge official explanations for everything. We do know we’re all constantly lied to by the fake news media about almost everything, from vaccines to economics to history. And don’t forget the “Russia! Russia! Russia!” conspiracy theory that’s been pushed by the fake news media for the last 18 months, based on absolutely nothing but faked sources and shoddy journalism.
If there’s anything I can say about the weather wars websites and commentators, it’s that I applaud all efforts to challenge current paradigms with clear thinking, and I readily admit I’m no expert in weather modification technology. Perhaps there are things I will learn in the future that will change my own view on this subject. Until then, I hope to encourage critical thinking about everything, which means that I don’t believe anything by default.
The mainstream media is lying to us all the time. Most of what’s labeled “mainstream science” is often just a consensus collection of corporation-induced lies. Mainstream medicine is a corruption racket shrouded in fake science and media propaganda. You are right to question everything for the simple reason that almost everything you’re told is complete bulls##t. Yet that doesn’t justify believing every alternative theory, either. You need to think critically about which theories you believe vs. reject. For example, I’ve publicly stated that the Flat Earth theorists are flat-out wrong (although they do offer a fun thought experiment to play with). I also think Ray Kurzweil’s singularity is a misguided pipe dream rooted in self-delusion and an unhealthy God complex.
Can hurricanes be artificially generated in totality? Almost certainly not. Can they be steered into intended targets? It seems incredibly unlikely, but within the realm of technical feasibility. Does weather modification technology exist? Absolutely, yes. But that doesn’t mean that every weather event is a nefarious plot. We live on a dynamic, chaotic planet that’s home to all sorts of bizarre natural phenomena. Although I know as a fact that the status quo can fake the news, brainwash the masses and pull off massive false flag events, I very much doubt they can fake entire hurricanes.
Do you have a different take on all this? Do your research. Think critically. Don’t believe everything you read, view or hear. Most importantly, make up your own mind and don’t let the establishment tell you what’s true, because the establishment is lying to you about almost everything.

O WHO’S BEHIND IT? (PART FOUR OF WHAT’S REALLY GOING ON ...              ~ hehe my guess ...Related image

I know, I know: this is the longest multi-part blog I've written on this website, and I promise, sooner or later it will end and we'll move on to other topics (of which there are plenty). But I think the story of the ramming of the US Navy's Arleigh Burke class Aegis missile frigates is important, both for what they're telling us, and what they're not telling us. This fourth part is necessary because there's one final question to be considered, one that leads to a rather different area of high octane speculation. That question is simply: "Who's behind it?" In this respect, my high octane speculation today, compared to that of the first three parts of this blog, has even less twig underneath it than yesterday's. We are standing at the tip of the twig with our full weight with nothing but air beneath us. Nonetheless, I think it's essential to speculate here.
Who's behind it?
Readers who have been following these blogs will recall that I believe that it is necessary to view the USS Donald Cook incidents, the Fitzgerald and the McCain incidents, "whole," for the simple reason that to my mind all four incidents (remember, there were two with the Donald Cook) show signs of some sort of technologically induced deliberate external influence in the operations of the ships. It was not mere "crew" or "officer" incompetence. As I've pointed out in the previous parts of this multi-staged blog, in the case of the Donald Cook incidents, the Russians were clearly responsible, and have recently claimed responsibility for it in their media.
In consideration of the question "Who's behind it?" let's look at the two main contenders, Russia, and China.
Was it Russia?
Russia, as indicated, is a contender simply for the reason that the Donald Cook incidents were clearly initiated by that country. It is important to this question, however, to consider the conditions under which Russia sent its messages in the Donald Cook incidents. In both cases the Donald Cook was operating, so to speak, in Russia's back yard and during a period of high tension, during which rhetoric in the United States' leadership was approaching the "complete hysteria" zone of the Anti-Russia meter. During these times there were also "ratcheted up" signals of possible dramatic expansion of the American campaign against Syria and even one against Iran. Faced with the potential of war in the region, I suspect that the Donald Cook incidents, and particularly the first one, were designed not as hostile actions but as warnings to carefully consider the consequences of a military confrontation between the two nations.
In the case of the last two incidents, however, we have a case of actual ramming, with human costs in injuries and lost lives involved. I doubt highly that Russia would, in the geopolitical tensions in North Korea, Japan, and that part of the world, have risked the actions against the Fitzgerald, and similarly with the McCain with tensions so high between the USA and China in the South China Sea and the Malacca Straits.  It simply is ratcheting up tensions needlessly and risking too much to do so. The message was sent and "received" in the Donald Cook incidents, and there was no need to reinforce it. These considerations apply regardless of what the actual mechanisms causing these incidents was: electromagnetic systems interference, remote mind manipulation, or faulty computer chips or some combination of them all. Russia would have everything to lose, and little to gain, by sponsoring such attacks.
Which brings us to the next main contender:
Was it China? As we noted in the previous parts of this blog, there was a peculiar progression evident in the Fitzgerald and McCain incidents. The Fitzgerald incident did not provoke much more than tight-lips, but the McCain incident, following so closely upon it, forced the Navy to state a position, which, you'll recall, was initially the "incompetence hypothesis," which moved, quietly in the past few days, to an admission that the naval staff has "suspended all operations", and was undertaking a review of "everything," including crew training, management, and so on. During these admissions, various military officers of flag or general rank have floated the "cyber-hacking-faulty computer chips from China" meme.
From one point of view, this is certainly possible, given that the USA has shipped much of its crucial industry overseas under the various "free trade" agreements forced on the government by Mr. Globaloney, beginning with GATT(General Agreement on Tariffs and Trade).  The USA and China are certainly also at loggerheads over Chinese claims in the South China Sea and over China's "One Belt One Road" project. China, for its part, has been making slow and steady progress on the latter, and this past year we've seen the first freight trains run all the way from China to the United Kingdom, and back again. However, there are strains in the Chinese economy, and the biggest problem for the Chinese leadership remains the management of its enormous population in a land mass that cannot sustain the food needs of the population. Geopolitically, China has much to lose by risking such actions in my opinion.
There's another consideration to entertain here: assume, for a moment, that the claims of corrupted Chinese computer chips in the US military's systems are true. This would constitute a "hole card", so to speak, which would be a crucial force multiplier in situations of actual military confrontation and hostilities. Under such conditions, in my opinion it would be doubtful that the Chinese government would reveal the fact during such comparatively "low level" incidents. It would be much more likely to do so under conditions in which - God forbid - American military assets and Chinese military assets began actually shooting at each other. Showing the hand at this stage of the game only alerts the USA that its electronics and computer systems "have a problem." Russia, as noted, has only revealed a limited aspect of its capability, leaving one to guess what the full measure of their capabilities actually are.
Which brings us to a third possibility, the most "high octane" speculation of them all: some other party, possibility an extra-territorial actor, is in play, and is attempting to create tensions between these three powers. Regular readers here and of my books will know that I have posited such an "extra-territorial actor" in my various books on post-war Nazi survival, and did so again in my book on 9/11, Hidden Finance, Rogue Networks, and Secret Sorcery. In the latter, I posited not two operational levels to 9/11 - the public one and the covert one of rogue networks within the American security and intelligence apparatus, the "typical" scenario of most "911 truth" researchers - but that that second deeper level was itself penetrated by an even deeper level, an extra-territorial one of international extent. Indeed, I pointed out the pre-911 statements of Russian economist Dr. Tatyana Koryagina which warned of an attack on US soil by precisely such a network.
It stands to reason such an entity would not simply cease to operate. However, it might be objected at this juncture that in the case of the Fitzgerald and McCain incidents that we see no corresponding "operations" or attacks against Russian or Chinese interests. Granted, this is a problem, but not one that is entirely fatal to the speculative hypothesis, provided one is willing to widen the context and dataset a bit, for there have been such incidents. Recall only those strange explosions at Chinese chemical plants just a few years ago. At that time there was speculation that the USA had used its alleged "rod of God" technology, i.e., space-based kinetic weapons, to take out the Chinese plants. Again, I doubted at the time that the USA would (1) risk such an action when the consequences would be dire and (2) reveal the existence of such a capability. Another, extra-territorial entity, bent on creating tension between the three powers, might be willing to do so. Similarly, there were Russian incidents where their own sophisticated systems did not perform "up to specification," so to speak. Recall only the incident at Sevastopol, during an exercise and "show" for the civilian population when a missile firing was conducted, and the missile misfired. Recall also the incident at the Russian powerplant near Murmansk, when the power plant exploded. At the time, Russian state-controlled media was speculating that this may have been the result of deliberate action and sabotage.
Of course, all of this is speculation, and your guess is as good as mine.

Monday, August 28, 2017

The “aging” lie and how atherosclerotic narrowing is responsible for majority of American’s chronic health problems later in life

Image: The “aging” lie and how atherosclerotic narrowing is responsible for majority of American’s chronic health problems later in life
(Natural News) Have you ever heard of the “unified theory” cure for heart disease? Linus Pauling, a phenomenal American scientist, worked with a German doctor named Matthias Rath decades ago, and they discovered that most heart disease was the result of long-term vitamin C deficiency, and that the solution was to treat patients with frequent high doses of vitamin C and use amino acids (proline and lysine) to remove the plaque that was lining the inner walls of blood vessels. What’s the number one killer in civilized nations today? Heart disease. And what is the number one cause of heart disease and premature aging? The “Standard American Diet” that’s high in refined carbohydrates (stripped of vitamins and minerals) and animal fats leads directly to high blood pressure, arteriosclerosis, angina, and degenerative heart changes that rapidly “age” humans.

Heart disease can be reversed in a matter of months without surgery or dangerous medications

Heart disease is actually easier to cure than lower back pain, and without prescription medications, according to medical doctors who aren’t paid by Big Pharma to lie and push dangerous quack chemicals. Would you like to know this method that’s been proven in practice for more than twenty years? Why does Pauling Therapy utilize high doses of vitamin C? Vitamin C is required to strengthen arteries so the body won’t attempt to patch arteries with “plaster casts” – also known as atherosclerosis. The amino acid lysine is then used in high doses as a binding inhibitor to reverse the plaster (plaque) cast build-up coming from the sticky form of LDL cholesterol, or Lp(a) plaque. Both vitamin C and lysine are safe in high amounts and neither has ever been known to have a “lethal” toxic dosage.
Did you know bypass surgery brings in more money to U.S. big city hospitals than any other type of care? Bypass surgery doesn’t even extend overall life expectancy because the newly grafted artery usually begins clogging immediately. Bypass surgery accounts for up to 40 percent of many hospitals’ total income. That’s why most doctors never speak of Pauling Therapy. Did you also know that Linus Pauling is the founder of modern chemistry and holds 48 honorary Ph.D.s? He is the only two-time (unshared) Nobel prize laureate. You don’t have to be incapacitated as you age, suffering from heart attacks, strokes, chemical medications and multiple surgeries that don’t even extend your life.

Pushing back the aging process and literally protecting your DNA with antioxidants from plants

Our view of aging as we know it here in the “Western World” is completely wrong. We do not have to suffer in pain and discomfort as we grow older. No, our health does not have to deteriorate as the years go by, as we see with so many seniors today. Did you know this is the first generation in America where we are expected to live shorter lives than our parents? This simply does not have to be the case. You have complete control. You can extend your life and your health span.
It’s time to drop the “Yolo” attitude (you only live once) and increase your life and health span with a whole food, plant-based diet. This will eliminate the narrowing of coronary blood vessels and unclog arteries, plus it can eliminate erectile dysfunction and peeing problems, prevent cancer, heart disease, cognitive decline and strokes all the while.
The Okinawa diet (and study) shows us the power and health benefits of consuming plenty of dark leafy greens daily. In Okinawa they have a saying, “hara hachi bu,” which means eat until you are 80percent full. This sounds simple but is far from the American mantra and popular offerings of “all you can eat” where we chomp down until we’re 120 percent full. Overstuffing, according to the Okinawa diet, is a key reason people age quicker, because the excess calories leave behind “trace damage to the cells” until the damage accumulates into a literal “break down of the body,” also known as aging. Autopsies of Okinawans often show remarkably clean arteries that are plaque free. This could be the main reason they have 80 percent less risk of heart disease, cancer and strokes. Looking for more good advice on food choices? Be sure to avoid the websites of U.S. regulatory agencies like the CDC and the FDA. They are corrupted.
Searching for the “fountain of youth?” Mic the Vegan explains the benefits of a whole food, plant-based, vegan regimen in this video:

Sources for this article include:


The last two days I've been offering my usual high octane speculation about the various incidents that have plagued the Arliegh Burke class of US navy missile frigates, the Donald Cook incident, the Fitzgerald incident, and the most recent, the John McCain incident. Thus far, I've advanced three basic hypotheses:
1) Crew and officer incompetence, which appears to be the favored "implied meme or hypothesis" of the US Navy, particularly in the wake of the McCain incident;
2) A form of targetable remote jamming or electronic systems interference or electromagnetic pulse, "selective jamming," as I dubbed it yesterday. This appears to be the implication of all three incidents, when considered whole, as the ships affected were apparently able to do certain things (such as continue under their own power) while during a certain period of time, they apparently were not able to take evasive action (and this applies both to the warships and to the ramming commercial ships in the Fitzgerald and McCain incidents). This appears to be a hypothesis suggested by careful parsing of statements by Russians themselves, assuming such statements to be true for the sake of argument (we'll get back to that possibility in a moment);
3) A form of remote electronic interference with the crews of those ships, in a form of "selective jamming" that amounts to mind manipulation.
Of course, one may advance a fourth hypothesis here:
4) Some form or combination of all the above.
But there is a fifth possibility, namely, that the incidents were not the result of "remote selective jamming" at all, but rather, a cyber-attack, as the following articles indicate:
(See also: )
It's the last article I want to concentrate on, and in particular, these statements:
The commander of the US navy has ordered an unprecedented worldwide “operational pause” as analysts warn Chinese hackers have breached US military security, causing two recent US naval collisions. 
A report prepared for the Pentagon and officials from government and the defense industry in 2013 warned that the nation’s most sensitive advanced weapons systems had been compromised by Chinese hackers, and four years later the Pentagon’s worst fears are being realized.
More than two dozen major weapons systems whose designs were breached in 2013 were programs critical to U.S. missile defenses and navy ships, according to a Washington Post report that detailed previously undisclosed sections of a confidential report prepared for Pentagon leaders by the Defense Science Board.
This electronic intrusions were a huge issue a few years ago, with military experts warning that the practice of having all of our computer chips built in China was a disaster waiting to happen. Because we are too cheap to pay Americans to do the work, we have allowed China access to the backbone of our systems. (Emphasis added)
"Gee... you mean all the globaloney spewed by Mr. Globaloney that if we scatter industry all over the world we'll have an era of galloping and somersaulting peace, love, and brotherhood isn't true?"
Yes, Mr. Rottenchild, Mr. Rockefailure, it's not true. Shipping your critical defense industries overseas is probably not a good idea. In fact, it's pretty darned stupid. One need only imagine Kaiser Wilhelm contracting with the French firm of Schneider-Creusot to build the barrels and munitions for the German army's "Big Berthas" before World War One: soon you'll have exploding barrels, wounded or killed gun crews, and projectiles that are duds. It's the same reason the Royal Navy didn't buy its battleships from Blohm und Voss in Hamburg, or the Red Army didn't buy its T-34 tanks from Krupp in Essen.
But humor aside, there's another aspect to this cyber-attack hypothesis, for if it is the explanation behind all these incidents, including the Donald Cook incident, then one might be looking at something else than my "selective targetable jamming" idea or its corollary "mind control" hypothesis, but a simple matter of the old PROMIS software-NSA "clipper chip" scandal of the 1980s: with the export of chips to China, the entire military might be compromised by chips that are, in effect, Chinese versions of the NSA's clipper chip, and they might be reading the same mail, so to speak, that the NSA is reading. This would mean that Russian indications of a "selective jamming technology" which would include a "human interference" component are a kind of Potemkin village, a claim that might be true, or might be false, one simply does not know.
Might this fifth hypothesis be combined with the other four? Certainly. For example, imagine activating a "clipper chip" or a certain segment of a software code remotely, by a specific radio signal: "if receiving frequency "x" then execute lines of code "w,y,z..." and so on. Imagine being particularly fiendish and Byzantine, and coding software, or building a chip, to activate certain instructions when it receives a signal in a frequency frequently used by a potential enemy, or even activated on certain well-used terms in a foreign military, and you get the idea.
Of course, your guess with this story is as good as mine, but I cannot help but see why, faced with these glaring security nightmares, the US Navy is opting for the "implied incompetence hypothesis," because the alternatives are nothing less than a nightmare.
All of this leaves us with the question of who might be doing this. But for a full consideration of that question, we'll have to wait until tomorrow (yes, I know, it's a four part blog).