Why has no one brought this up to bust Mueller operations?

This notation was sent to us by Charles, an American Intelligence Media reader who wants to know why no one has brought this up to bust the Mueller operation. We aren’t attorneys so welcome others to leave comments in the box below. 

NO PROSECUTION POSSIBLE FOR MANAFORT OR OTHERS ASSOCIATED TO TRUMP BY MUELLER AND CROOKS LLP

From the United States Attorney Manual

.

650. Length of Limitations Period

Current federal law contains a single statute prescribing a general period of limitations, as well as several statutes that provide longer periods for specific offenses.

Section 3282 of Title 18, United States Code, is the statute of general application. It states that, “(e)xcept as otherwise expressly provided by law,” a prosecution for a non-capital offense shall be instituted within five years after the offense was committed.

Section 3281 of Title 18 deals with capital offenses and provides that an indictment for an offense “punishable by death” may be filed at any time. Despite the invalidity of some former federal statutory death penalty provisions, it is arguable that the unlimited time period remains applicable to those statutes that formerly carried that penalty. See United States v. Helmich, 521 F. Supp. 1246 (M.D.Fla. 1981), aff’d on other grounds, 704 F.2d 547 (11th Cir. 1983); see Matter of Extradition of Kraiselburd, 786 F.2d 1395 (9th Cir. 1986).

Section 3286 of Title 18, United States Code, provides for an eight (8) year statute of limitations for the non-capital offenses under certain terrorism offenses. These offenses include: 18 U.S.C. §§ 32 (aircraft destruction), 37 (airport violence), 112 (assaults upon diplomats and internationally protected persons), 351 (violent crimes against Congresspersons or Cabinet officers), 1116 (murder of diplomats and internationally protected persons), 1203 (hostage taking), 1361 (willful injury to government property), 1751 (violent crimes against the President), 2280 (maritime violence), 2281 (maritime platform violence), 2332 (terrorist acts abroad against United States nationals), 2332a (use of weapons of mass destruction), 2332b (acts of terrorism transcending national boundaries), or 2340A (torture) or 49 U.S.C. §§ 46502 (aircraft piracy), 46504 (interference with flight crew), 46505 (carrying a weapon or explosive on an aircraft), or 46506 (certain crimes committed aboard an aircraft). Section 3286 first became effective on September 13, 1994, and was applicable to any relevant offense committed on or after September 15, 1989. In 1996, the new 18 U.S.C. § 2332b was added to the statute.

Section 3293 of Title 18, United States Code, provides for a ten (10) year statute of limitations for certain financial institution offenses which involve violations of, or conspiracy to violate, (1) 18 U.S.C. §§ 215, 656, 657, 1005, 1006, 1007, 1014, 1033, or 1344; (2) 18 U.S.C. §§ 1342 or 1343 if the offense affects a financial institution; or (3) 18 U.S.C. § 1963 to the extent that the racketeering activity involves a violation of 18 U.S.C. § 1344.

Section 3294 of Title 18, United States Code, provides a twenty (20) year statute of limitations for a violation of 18 U.S.C. § 668 involving the theft of major art work.

Section 3295 of Title 18, United States Code, which was enacted on April 24, 1996, provides for a 10 year statute of limitations for certain non-capital arson or use-of-explosives offenses under 18 U.S.C. §§ 81 or 844(f), (h), or (i). (Section 844(i) had a seven year statute of limitations period for offenses committed on or after September 13, 1989, but before April 24, 1996.) See this Manual at 1445.

A one year statute of limitations is provided for criminal contempt under 18 U.S.C. § 402 (see 18 U.S.C. § 3285).

Section 507(a) of Title 17 provides that no criminal proceeding shall be maintained under Title 17 (relating to copyrights) unless commenced within three years after the cause of action arose.

Section 6531 of Title 26 provides that prosecutions for violation of the internal revenue laws shall be commenced within three years after commission of the offense, except for eight enumerated categories of offenses as to which a six-year limitations period is made applicable. See this Manual at 658.

Section 3291 of Title 18 provides that prosecutions for violations of nationality, citizenship, and passport laws, or a conspiracy to violate such laws, shall be commenced within ten years after the commission of the offense. Section 19 of the Internal Security Act of 1950, 64 Stat. 1005, provides a ten-year limitations period for prosecutions under the espionage statutes, 18 U.S.C. Secs. 792 to 794.

Section 2278 of Title 42 provides a similar ten-year period for prosecution of restricted data offenses under the atomic energy laws, 42 U.S.C. Secs. 2274 to 2276.

Section 783(e) of Title 50 provides that a prosecution for an offense under that section, part of the Subversive Activities Control Act, shall be instituted within ten years after the commission of the offense.

[cited in USAM 9-18.000]

.

18 U.S. Code § 3282 – Offenses not capital

(a)In General.—
Except as otherwise expressly provided by law, no person shall be prosecuted, tried, or punished for any offense, not capital, unless the indictment is found or the information is instituted within five years next after such offense shall have been committed.
(b) DNA Profile Indictment.—
(1)In general.—
In any indictment for an offense under chapter 109A for which the identity of the accused is unknown, it shall be sufficient to describe the accused as an individual whose name is unknown, but who has a particular DNA profile.
(2)Exception.—Any indictment described under paragraph (1), which is found not later than 5 years after the offense under chapter 109A is committed, shall not be subject to—
(A) the limitations period described under subsection (a); and
(B) the provisions of chapter 208 until the individual is arrested or served with a summons in connection with the charges contained in the indictment.
(3)Defined term.—
For purposes of this subsection, the term “DNA profile” means a set of DNA identification characteristics.

The Highly Duplicitous World of Peter A. Thiel

After we read the article below on Peter Thiel, we thought our readers might like to have a tool to create their own map of how connected Peter Thiel is to your every day life. After reading the article, use our links below to build your own version.

Palantir Knows Everything About You

.

Using this PPT version, patriots can build on this work. These files have also been posted in (pdf, pptx, jpg and tif). Add you own special mapping touch that shows how connected your own life and gadgets are to Peter and Palantir.

https://www.fbcoverup.com/docs/library/2018-04-28-The-Highly-Duplicitous-World-of-Peter-Thiel-prepared-Apr-28-2018.pdf

https://www.fbcoverup.com/docs/library/2018-04-28-The-Highly-Duplicitous-World-of-Peter-Thiel-prepared-Apr-28-2018.pptx

https://www.fbcoverup.com/docs/library/2018-04-28-The-Highly-Duplicitous-World-of-Peter-Thiel-prepared-Apr-28-2018.tif

Diane Feinstein’s Strange Bedfellows

.

The two articles below were posted on Truth News Headlines where it was confirmed that a Feinstein staffer hired the notorious opposition research firm, Fusion GPS. We also are reminded that Feinstein was a part of the Gang of Eight until she abruptly resigned following the 2016 presidential election.

.

CONFIRMED: Former Feinstein Staffer Raised $50 Million, Hired Fusion GPS And Christopher Steele After 2016 Election

A declassified congressional report confirms that Daniel Jones, a former intelligence committee staffer for Sen. Dianne Feinstein, hired Fusion GPS and Christopher Steele to push the Russian collusion narrative against Donald Trump.
 .
.

A declassified congressional report confirms prior reporting by The Federalist that Daniel Jones, a former staffer for Sen. Dianne Feinstein (D-Calif.), hired Fusion GPS and Christopher Steele after the 2016 election to push the anti-Trump Russian collusion narrative.

According to the report, Jones, who runs an investigative outfit called the Penn Quarter Group (PQG), told the Federal Bureau of Investigation (FBI) in March of 2017 that he had retained the services of Fusion GPS and Christopher Steele to “continue exposing Russian interference” in the 2016 election. Steele is the former British spy who authored the infamous unverified dossier of allegations against President Donald Trump.

Although Jones’ name is redacted in the report, the biographical details plus previous reporting on the matter make clear that he is the individual referenced. The report also revealed that Jones told federal investigators that he had raised $50 million from “7 to 10 wealthy donors located primarily in New York and California.”

.

House Intel Committee Releases Final Report on Active Russia Measures

There are some initially revealing aspects to the release including: revelations that DNI James Clapper was a leaker to CNN about the Steele Dossier content and Presidential Briefing; and that Former Dianne Feinstein staff raised $50 million after the election to continue funding Fusion-GPS and Christopher Steele. …

…However, the revelations of Senator Dianne Feinstein participating in the overall post-election scheme to deploy the insurance policy do answer a nagging question that always seemed to lay quietly below the surface.

During 2016 Senator Feinstein was part of the Gang of Eight by way of her position as vice-chair of the Senate Intelligence Committee.  It always seemed odd that Feinstein gave up that position immediately following the 2016 presidential election.

There was something about Feinstein’s abdication that appeared to be a move to diminish risk.  With the discovery that her top staff was actually involved in close coordination with Fusion-GPS, Christopher Steele and the advancement of the Russian conspiracy/collusion narrative, Feinstein’s move to create distance after the election makes sense.
.

∞∞∞∞∞∞∞

.

We recalled other strange bedfellows of Diane Feinstein’s  — Kristine Marcy and Senior Executive Service. Just two interesting facts put into the digital archives in case the connection means something one day. 

 

Feinstein

See link below to access the image above and its hyperlinks:

SES Federal Takeover of San Francisco

Silent Weapons for Quiet Wars

This document represents the doctrine adopted by the Policy Committee of the Bilderburg Group during its first known meeting in 1954.

The following document, dated May 1979, was found on July 7, 1986,  in an IBM copier that had been purchased at a surplus sale.

http://www.lawfulpath.com/ref/sw4qw/index.shtml – preface

http://www.lawfulpath.com/ref/sw4qw/

top secret silent wars

The following document is taken from two sources. The first, was acquired on a website (of which I can’t remember the address) listing as its source the book titled Behold A Pale Horse by William Cooper; Light Technology Publishing, 1991. The second source is a crudely copied booklet, which does not contain a copyright notice, or a publisher’s name.

With the exception of the Forward, the Preface, the main thing that was missing from the first source was the illustrations. As we began comparing the two, we realized that the illustrations, and the accompanying text (also missing from the first) made up a significant part of the document. This has now been restored by The Lawful Path, and so far as I know, is the only internet copy available complete with the illustrations.

We have no first-hand knowledge that this document is genuine, however many of the concepts contained herein are certainly reasonable, important, and bear strong consideration.

If anyone has additional knowledge about the source of this document; has better copies of the illustrations than the ones posted here; has any missing pieces to this document, or has any comments which can improve upon the quality of this document, we will appreciate your comments.

The Lawful Path http://www.lawfulpath.com/

Additional information includes confirmation that this policy was adopted by the

International “Elites” at the first Bilderberg Meeting in 1954.

Forward

This manuscript was delivered to our offices by an unknown person. We did not steal the document, nor are we involved with any theft from the United States Government, and we did not get the document by way of any dishonest methods. We feel that we are not endangering the “National Security” by reproducing this document, quite the contrary; it has been authenticated and we feel that we are not only within our rights to publish it, but morally bound to do so.

Regarding the training manual, you may have detected that we had to block out the marginal notes made by the selectee at the C.I.A. Training Center, but I can assure you that the manual is authentic, and was printed for the purpose of introducing the selectee to the conspiracy. It has been authenticated by four different technical writers for Military Intelligence, one just recently retired who wants very much to have this manual distributed throughout the world, and one who is still employed as an Electronics Engineer by the Federal Government, and has access to the entire series of Training

Manuals. One was stationed in Hawaii, and held the highest security clearance in the Naval Intelligence, and another who is now teaching at a university, and has been working with the Central Intelligence Agency for a number of years, and wants out before the axe falls on the conspirators.

Caution NWO aheadWe believed that the entire world should know about this plan, so we distributed internationally one-hundred of these manuscripts, to ask individuals at top level positions their opinions. The consensus opinion was to distribute this to as many people as who wanted it, to the end that they would not only understand that “War” had been declared against them, but would be able to properly identify the true enemy to Humanity. – Delamer Duverus

Preface

Conspiracy theories are nothing new to history. Plots to “kill Caesar” and overthrow Rome abounded, for instance. However, it is seldom that concrete clues to such plots come to light, and are generally known.

Silent Weapons for Quiet Wars, An Introduction Programming Manual was uncovered quite by accident on July 7, 1986 when an employee of Boeing Aircraft Co. purchased a surplus IBM copier for scrap parts at a sale, and discovered inside details of a plan, hatched in the embryonic days of the “Cold War” which called for control of the masses through manipulation of industry, peoples’ pastimes, education and political leanings. It called for a quiet revolution, putting brother against brother, and diverting the public’s attention from what is really going on.

The document you are about to read is real. It is reprinted in its virgin form, with diagrams, as a touch of reality.

Table of Contents

    * Security  
    * Historical Introduction  
    * Political Introduction  
    * Energy  
    * Descriptive Introduction of the Silent Weapon  
    * Theoretical Introduction  
    * General Energy Concepts  
    * Mr. Rothschild’s Energy Discovery  
    * Apparent Capital as “Paper” Inductor  
    * Breakthrough  
    * Application in Economics  
    * The Economic Model  
    * Industrial Diagrams
    * Three Industrial Classes
    * Aggregation  
    * The E-model  
    * Economic Inductance  
    * Inductive Factors to Consider  
    * Translation  
    * Time Flow Relationships and Self-destructive Oscillations  
    * Industry Equivalent Circuits  
    * Stages of Schematic Simplification  
    * Generalization  
    * Final Bill of Goods  
    * The Technical Coefficients
    * The Types of Admittances  
    * The Household Industry  
    * Household Models  
    * Economic Shock Testing  
    * Introduction to the Theory of Shock Testing  
    * Example of Shock Testing  
    * Introduction to Economic Amplifiers  
    * Short List of Inputs  
    * Short List of Outputs  
    * Table of Strategies  
    * Diversion, the Primary Strategy  
    * Diversion Summary  
    * Consent, the Primary Victory  
    * Amplification Energy Sources  
    * Logistics  
    * The Artificial Womb  
    * The Political Structure of a Nation – Dependency  
    * Action/Offense  
    * Responsibility  
    * Summary  
    * System Analysis  
    * The Draft  
    * Enforcement  

TOP SECRET 

Silent weapons for quiet wars

Operations Research Technical Manual

TW-SW7905.1

Welcome Aboard

This publication marks the 25th anniversary of the Third World War, called the “Quiet War”, being conducted using subjective biological warfare, fought with “silent weapons”.

This book contains an introductory description of this war, its strategies, and its weaponry.

May 1979 #74-1120

Security

It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i.e., slavery and genocide.

This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be recognized as a technically formal declaration of domestic war. Furthermore, whenever any person or group of persons in a position of great power and without full knowledge and consent of the public, uses such knowledge and methodologies for economic conquest – it must be understood that a state of domestic warfare exists between said person or group of persons and the public.

The solution of today’s problems requires an approach which is ruthlessly candid, with no agonizing over religious, moral or cultural values.

You have qualified for this project because of your ability to look at human society with cold objectivity, and yet analyze and discuss your observations and conclusions with others of similar intellectual capacity without the loss of discretion or humility. Such virtues are exercised in your own best interest. Do not deviate from them.

Historical Introduction

Silent weapon technology has evolved from Operations Research (O.R.), a strategic and tactical methodology developed under the Military Management in England during

World War II. The original purpose of Operations Research was to study the strategic and tactical problems of air and land defense with the objective of effective use of limited military resources against foreign enemies (i.e., logistics).

It was soon recognized by those in positions of power that the same methods might be useful for totally controlling a society. But better tools were necessary.

Social engineering (the analysis and automation of a society) requires the correlation of great amounts of constantly changing economic information (data), so a high-speed computerized data-processing system was necessary which could race ahead of the society and predict when society would arrive for capitulation.

Relay computers were to slow, but the electronic computer, invented in 1946 by J. Presper Eckert and John W. Mauchly, filled the bill.

The next breakthrough was the development of the simplex method of linear programming in 1947 by the mathematician George B. Dantzig.

Then in 1948, the transistor, invented by J. Bardeen, W.H. Brattain, and W. Shockley, promised great expansion of the computer field by reducing space and power requirements.

With these three inventions under their direction, those in positions of power strongly suspected that it was possible for them to control the whole world with the push of a button.

Immediately, the Rockefeller Foundation got in on the ground floor by making a fouryear grant to Harvard College, funding the Harvard Economic Research Project for the study of the structure of the American Economy.i One year later, in 1949, The United States Air Force joined in.

In 1952 the grant period terminated, and a high-level meeting of the Elite was held to determine the next phase of social operations research. The Harvard project had been very fruitful, as is borne out by the publication of some of its results in 1953 suggesting the feasibility of economic (social) engineering.

Engineered in the last half of the decade of the 1940’s, the new Quiet War machine stood, so to speak, in sparkling gold-plated hardware on the showroom floor by 1954.

With the creation of the maser in 1954, the promise of unlocking unlimited sources of fusion atomic energy from the heavy hydrogen in sea water and the consequent availability of unlimited social power was a possibility only decades away.

The combination was irresistible.

Although the silent weapons system was nearly exposed 13 years later, the evolution of the new weapon-system has never suffered any major setbacks.

This volume marks the 25th anniversary of the beginning of the Quiet War. Already this domestic war has had many victories on many fronts throughout the world.

Political Introduction

In 1954 it was well recognized by those in positions of authority that it was only a matter of time, only a few decades, before the general public would be able to grasp and upset the cradle of power, for the very elements of the new silent-weapon technology were as accessible for a public utopia as they were for providing a private utopia.

The issue of primary concern that of dominance, revolved around the subject of the energy sciences.

Energy

Energy is recognized as the key to all activity on earth. Natural science is the study of the sources and control of natural energy, and social science, theoretically expressed as economics, is the study of the sources and control of social energy. Both are bookkeeping systems: mathematics. Therefore, mathematics is the primary energy science. And the bookkeeper can be king if the public can be kept ignorant of the methodology of the bookkeeping.

All science is merely a means to an end. The means is knowledge. The end is control. Beyond this remains only one issue: Who will be the beneficiary?

In 1954 this was the issue of primary concern. Although the so-called “moral issues” were raised, in view of the law of natural selection [1] it was agreed that a nation or world of people who will not use their intelligence are no better than animals who do not have intelligence. Such people are beasts of burden and steaks on the table by choice and consent.

Consequently, in the interest of future world order, peace, and tranquility, it was decided to privately wage a quiet war against the American public with an ultimate objective of permanently shifting the natural and social energy (wealth) of the undisciplined and irresponsible many into the hands of the self-disciplined, responsible, and worthy few. In order to implement this objective, it was necessary to create, secure, and apply new weapons which, as it turned out, were a class of weapons so subtle and sophisticated in their principle of operation and public appearance as to earn for themselves the name “silent weapons”.

_______________________

[1 This concept was never more than a questionable theory of elitist Charles Darwin]

.

In conclusion, the objective of economic research, as conducted by the magnates of capital (banking) and the industries of commodities (goods) and services, is the establishment of an economy which is totally predictable and manipulatable.

In order to achieve a totally predictable economy, the low-class elements of society must be brought under total control, i.e., must be housebroken, trained, and assigned a yoke and long-term social duties from a very early age, before they have an opportunity to question the propriety of the matter. In order to achieve such conformity, the lower-class family unit must be disintegrated by a process of increasing preoccupation of the parents and the establishment of government-operated day-care centers for the occupationally orphaned children.

The quality of education given to the lower class must be of the poorest sort, so that the moat of ignorance isolating the inferior class from the superior class is and remains incomprehensible to the inferior class. With such an initial handicap, even bright lower class individuals have little if any hope of extricating themselves from their assigned lot in life. This form of slavery is essential to maintain some measure of social order, peace, and tranquility for the ruling upper class.

Descriptive Introduction of the Silent Weapon

Everything that is expected from an ordinary weapon is expected from a silent weapon by its creators, but only in its own manner of functioning.

It shoots situations, instead of bullets; propelled by data processing, instead of chemical reaction (explosion); originating from bits of data, instead of grains of gunpowder; from a computer, instead of a gun; operated by a computer programmer, instead of a marksman; under the orders of a banking magnate, instead of a military general.

It makes no obvious explosive noises, causes no obvious physical or mental injuries, and does not obviously interfere with anyone’s daily social life.

Yet it makes an unmistakable “noise,” causes unmistakable physical and mental damage, and unmistakably interferes with the daily social life, i.e., unmistakable to a trained observer, one who knows what to look for.

The public cannot comprehend this weapon, and therefore cannot believe that they are being attacked and subdued by a weapon.

The public might instinctively feel that something is wrong, but that is because of the technical nature of the silent weapon, they cannot express their feeling in a rational way, or handle the problem with intelligence. Therefore, they do not know how to cry for help, and do not know how to associate with others to defend themselves against it.

When a silent weapon is applied gradually, the public adjusts/adapts to its presence and learns to tolerate its encroachment on their lives until the pressure (psychological via economic) becomes too great and they crack up.

Therefore, the silent weapon is a type of biological warfare. It attacks the vitality, options, and mobility of the individuals of a society by knowing, understanding, manipulating, and attacking their sources of natural and social energy, and their physical, mental, and emotional strengths and weaknesses.

Theoretical Introduction

Give me control over a nation’s currency, and I care not who makes its laws. — Mayer Amshel Rothschild (1743-1812)

Today’s silent weapons technology is an outgrowth of a simple idea discovered, succinctly expressed, and effectively applied by the quoted Mr. Mayer Amschel Rothschild. Mr. Rothschild discovered the missing passive component of economic theory known as economic inductance. He, of course, did not think of his discovery in these 20th-century terms, and, to be sure, mathematical analysis had to wait for the Second Industrial Revolution, the rise of the theory of mechanics and electronics, and finally, the invention of the electronic computer before it could be effectively applied in the control of the world economy.

General Energy Concepts

In the study of energy systems, there always appears three elementary concepts. These are potential energy, kinetic energy, and energy dissipation. And corresponding to these concepts, there are three idealized, essentially pure physical counterparts called passive components.

  • In the science of physical mechanics, the phenomenon of potential energy is associated with a physical property called elasticity or stiffness, and can be represented by a stretched spring. In electronic science, potential energy is stored in a capacitor instead of a spring. This property is called capacitance instead of elasticity or stiffness.
  • In the science of physical mechanics, the phenomenon of kinetic energy is associated with a physical property called inertia or mass, and can be represented by a mass or a flywheel in motion.

In electronic science, kinetic energy is stored in an inductor (in a magnetic field) instead of a mass. This property is called inductance instead of inertia.

  • In the science of physical mechanics, the phenomenon of energy dissipation is associated with a physical property called friction or resistance, and can be represented by a dashpot or other device which converts energy into heat. In electronic science, dissipation of energy is performed by an element called either a resistor or a conductor, the term “resistor” being the one generally used to describe a more ideal device (e.g., wire) employed to convey electronic energy efficie ntly from one location to another. The property of a resistance or conductor is measured as either resistance or conductance reciprocals.

In economics these three energy concepts are associated with:

  1. Economic Capacitance – Capital (money, stock/inventory, investments in buildings and durables, etc.)
  2. Economic Conductance – Goods (production flow coefficients)
  3. Economic Inductance – Services (the influence of the population of industry on output)

All of the mathematical theory developed in the study of one energy system (e.g., mechanics, electronics, etc.) can be immediately applied in the study of any other energy system (e.g., economics).

Mr. Rothschild’s Energy Discovery

What Mr. Rothschild [2] had discovered was the basic principle of power, influence, and control over people as applied to economics. That principle is “when you assume the appearance of power, people soon give it to you.”

Mr. Rothschild had discovered that currency or deposit loan accounts had the required appearance of power that could be used to induce people (inductance, with people corresponding to a magnetic field) into surrendering their real wealth in exchange for a promise of greater wealth (instead of real compensation). They would put up real collateral in exchange for a loan of promissory notes. Mr. Rothschild found that he could issue more notes than he had backing for, so long as he had someone’s stock of gold as a persuader to show his customers.

Mr. Rothschild loaned his promissory notes to individuals and to governments. These would create overconfidence. Then he would make money scarce, tighten control of the system, and collect the collateral through the obligation of contracts. The cycle was then repeated. These pressures could be used to ignite a war. Then he would control the availability of currency to determine who would win the war. That government which agreed to give him control of its economic system got his support.

Collection of debts was guaranteed by economic aid to the enemy of the debtor. The profit derived from this economic methodology made Mr. Rothschild all the more able to expand his wealth. He found that the public greed would allow currency to be printed by government order beyond the limits (inflation) of backing in precious metal or the production of goods and services.

                                               

[2 Read The Synagogue of Satan by Andrew Hitchcock to discover the truth about Mr. Rothschild.]

.   

Apparent Capital as “Paper” Inductor

In this structure, credit, presented as a pure element called “currency,” has the appearance of capital, but is in effect negative capital. Hence, it has the appearance of service, but is in fact, indebtedness or debt. It is therefore an economic inductance instead of an economic capacitance, and if balanced in no other way, will be balanced by the negation of population (war, genocide). The total goods and services represent real capital called the gross national product, and currency may be printed up to this level and still represent economic capacitance; but currency printed beyond this level is subtractive, represents the introduction of economic inductance, and constitutes notes of indebtedness.

War is therefore the balancing of the system by killing the true creditors (the public which we have taught to exchange true value for inflated currency) and falling back on whatever is left of the resources of nature and regeneration of those resources.

Mr. Rothschild had discovered that currency gave him the power to rearrange the economic structure to his own advantage, to shift economic inductance to those economic positions, which would encourage the greatest economic instability and oscillation.

The final key to economic control had to wait until there was sufficient data and highspeed computing equipment to keep close watch on the economic oscillations created by price shocking and excess paper energy credits – paper inductance/inflation .

Breakthrough

The aviation field provided the greatest evolution in economic engineering by way of the mathematical theory of shock testing. In this process, a projectile is fired from an airframe on the ground and the impulse of the recoil is monitored by vibration transducers connected to the airframe and wired to chart recorders.

By studying the echoes or reflections of the recoil impulse in the airframe, it is possible to discover critical vibrations in the structure of the airframe which either vibrations of the engine or aeolian vibrations of the wings, or a combination of the two, might reinforce resulting in a resonant self-destruction of the airframe in flight as an aircraft. From the standpoint of engineering, this means that the strengths and weaknesses of the structure of the airframe in terms of vibrational energy can be discovered and manipulated.

Application in Economics

To use this method of airframe shock testing in economic engineering, the prices of commodities are shocked, and the public consumer reaction is monitored. The resulting echoes of the economic shock are interpreted theoretically by computers and the psychoeconomic structure of the economy is thus discovered. It is by this process that partial differential and difference matrices are discovered that define the family household and make possible its evaluation as an economic industry (dissipative consumer structure).

Then the response of the household to future shocks can be predicted and manipulated, and society becomes a well-regulated animal with its reins under the control of a sophisticated computer-regulated social energy bookkeeping system.

Eventually every individual element of the structure comes under computer control through a knowledge of personal preferences, such knowledge guaranteed by computer association of consumer preferences (universal product code, UPC; zebra-striped pricing codes on packages) with identified consumers (identified via association with the use of a credit card and later a permanent “tattooed” body number invisible under normal ambient illumination).

Summary 

Economics is only a social extension of a natural energy system. It, also, has its three passive components. Because of the distribution of wealth and the lack of communication and lack of data, this field has been the last energy field for which a knowledge of these three passive components has been developed.

Since energy is the key to all activity on the face of the earth, it follows that in order to attain a monopoly of energy, raw materials, goods, and services and to establish a world system of slave labor, it is necessary to have a first strike capability in the field of economics. In order to maintain our position, it is necessary that we have absolute first knowledge of the science of control over all economic factors and the first experience at engineering the world economy.

In order to achieve such sovereignty, we must at least achieve this one end: that the public will not make either the logical or mathematical connection between economics and the other energy sciences or learn to apply such knowledge.

This is becoming increasingly difficult to control because more and more businesses are making demands upon their computer programmers to create and apply mathematical models for the management of those businesses.

It is only a matter of time before the new breed of private programmer/economists will catch on to the far-reaching implications of the work begun at Harvard in 1948. The speed with which they can communicate their warning to the public will largely depend upon how effective we have been at controlling the media, subverting education, and keeping the public distracted with matters of no real importance.

The Economic Model

Economics, as a social energy science has as a first objective the description of the complex way in which any given unit of resources is used to satisfy some economic want. (Leontief Matrix). This first objective, when it is extended to get the most product from the least or limited resources, comprises that objective of general military and industrial logistics known as Operations Research. (See simplex method of linear programming.)

The Harvard Economic Research Project (1948-) was an extension of World War II Operations Research. Its purpose was to discover the science of controlling an economy: at first the American economy, and then the world economy. It was felt that with sufficient mathematical foundation and data, it would be nearly as easy to predict and control the trend of an economy as to predict and control the trajectory of a projectile. Such has proven to be the case. Moreover, the economy has been transformed into a guided missile on target.

The immediate aim of the Harvard project was to discover the economic structure, what forces change that structure, how the behavior of the structure can be predicted, and how it can be manipulated. What was needed was a well-organized knowledge of the mathematical structures and interrelationships of investment, production, distribution, and consumption.

To make a short story of it all, it was discovered that an economy obeyed the same laws as electricity and that all of the mathematical theory and practical and computer knowhow developed for the electronic field could be directly applied in the study of economics. This discovery was not openly declared, and its more subtle implications were and are kept a closely guarded secret, for example that in an economic model, human life is measured in dollars, and that the electric spark generated when opening a switch connected to an active inductor is mathematically analogous to the initiation of war.

The greatest hurdle which theoretical economists faced was the accurate description of the household as an industry. This is a challenge because consumer purchases are a matter of choice which in turn is influenced by income, price, and other economic factors.

This hurdle was cleared in an indirect and statistically approximate way by an application of shock testing to determine the current characteristics, called current technical coefficients, of a household industry

Finally, because problems in theoretical electronics can be translated very easily into problems of theoretical electronics, and the solution translated back again, it follows that only a book of language translation and concept definition needed to be written for economics. The remainder could be gotten from standard works on mathematics and electronics. This makes the publication of books on advanced economics unnecessary, and greatly simplifies project security.

Industrial Diagrams

An ideal industry is defined as a device which receives value from other industries in several forms and converts them into one specific product for sales and distribution to other industries. It has several inputs and one output. What the public normally thinks of as one industry is really an industrial complex, where several industries under one roof produce one or more products.

A pure (single output) industry can be represented oversimply by a circuit block as follows:

Diagram 1

The flow of product from industry #1 (supply) to industry #2 (demand) is denoted by 112. The total flow out of industry “K” is denoted by Ik (sales, etc.).

A three industry network can be diagrammed as follows:

Diagram 2

A node is a symbol of collection and distribution of flow. Node #3 receives from industry #3 and distributes to industries #1 and #3. If industry #3 manufactures chairs, then a flow from industry #3 back to industry #3 simply indicates that industry #3 is using part of its own output product, for example, as office furniture. Therefore the flow may be summarized by the equations:

Diagram 3

Three Industrial Classes

Industries fall into three categories or classes by type of output:

Class #1 – Capital (resources)

Class #2 – Goods (commodities or use – dissipative)

Class #3 – Services (action of population

Class #1 industries exist at three levels:

  • Nature – sources of energy and raw materials.
  • Government – printing of currency equal to the gross national product (GNP), and extension of currency in excess of GNP.
  • Banking – loaning of money for interest, and extension (inflation/counterfeiting) of economic value through the deposit loan accounts.

Class #2 industries exist as producers of tangible or consumer (dissipated) products. This sort of activity is usually recognized and labeled by the public as “industry.”

Class #3 industries are those which have service rather than a tangible product as their output. These industries are called (1) households, and (2) governments. Their output is human activity of a mechanical sort, and their basis is population.

Aggregation

The whole economic system can be represented by a three-industry model if one allows the names of the outputs to be (1) capital, (2) goods, and (3) services. The problem with this representation is that it would not show the influence, say, the textile industry on the ferrous metal industry. This is because both the textile industry and the ferrous metal industry would be contained within a single classification called the “goods industry” and by this process of combining or aggregating these two industries under one system block they would lose their economic individuality.

The E-Model

A national economy consists of simultaneous flows of production, distribution, consumption, and investment. If all of these elements including labor and human functions are assigned a numerical value in like units of measure, say, 1939 dollars, then t his flow can be further represented by a current flow in an electronic circuit, and its behavior can be predicted and manipulated with useful precision.

The three ideal passive energy components of electronics, the capacitor, the resistor, and the inductor correspond to the three ideal passive energy components of economics called the pure industries of capital, goods, and services, respectively:

∗ Economic capacitance represents the storage of capital in one form or another.

∗ Economic conductance represents the level of conductance of materials for the production of goods.

∗ Economic inductance represents the inertia of economic value in motion. This is a population phenomenon known as services.

Economic Inductance

An electrical inductor (e.g., a coil or wire) has an electric current as its primary phenomenon and a magnetic field as its secondary phenomenon (inertia). Corresponding to this, an economic inductor has a flow of economic value as its primary phenome non and a population field as its secondary field phenomenon of inertia. When the flow of economic value (e.g., money) diminishes, the human population field collapses in order to keep the economic value (money) flowing (extreme case – war).

This public inertia is a result of consumer buying habits, expected standard of living, etc., and is generally a phenomenon of self-preservation.

Inductive Factors to Consider

  • Population
  • Magnitude of the economic activities of the government
  • The method of financing these government activities (See Peter-Paul Principle – inflation of the currency.)

Translation

(a few examples will be given)

  • Charge: Coulombs Dollars (1939)
  • Flow/Current: Amperes (coulombs/ second) Dollars of flow per year
  • Motivating Force: Volts; Dollars (output) demand
  • Conductance: Amperes per volt; Dollars of flow per year per dollar demand
  • Capacitance: Coulombs per volt: Dollars of production inventory/ stocks per dollar demand

Time Flow Relationships and Self-Destructive Oscillations

An ideal industry may be symbolized electronically in various ways. The simplest way is to represent a demand by a voltage and a supply by a current. When this is done, the relationship between the two becomes what is called an admittance, which can result from three economic factors: (1) foresight flow, (2) present flow, and (3) hindsight flow.

  1. Foresight flow is the result of that property of living entities to cause energy (food) to be stored for a period of low energy (e.g., a winter season). It consists of demands made upon an economic system for that period of low energy (winter season).

In a production industry it takes several forms, one of which is known as production stock or inventory. In electronic symbology this specific industry demand (a pure capital industry) is represented by capacitance and the stock or resource is represented by a stored charge. Satisfaction of an industry demand suffers a lag because of the loading effect of inventory priorities.

  1. Present flow ideally involves no delays. It is, so to speak, input today for output today, a “hand to mouth” flow. In electronic symbology, this specific industry demand (a pure us industry) is represented by a conductance which is then a simple economic valve (a dissipative element).
  1. Hindsight flow is known as habit or inertia. In electronics this phenomenon is the characteristic of an inductor (economic analog = a pure service industry) in which a current flow (economic analog = flow of money) creates a magnetic field (economic analog = active human population) which, if the current (money flow) begins to diminish, collapse (war) to maintain the current (flow of money – energy).

Other large alternatives to war as economic inductors or economic flywheels are an openended social welfare program, or an enormous (but fruitful) open-ended space program.

The problem with stabilizing the economic system is that there is too much demand on account of (1) too much greed and (2) too much population.

This creates excessive economic inductance which can only be balanced with economic capacitance (true resources or value – e.g., in goods or services).

The social welfare program is nothing more than an open-ended credit balance system which creates a false capital industry to give nonproductive people a roof over their heads and food in their stomachs. This can be useful, however, because the recipients become state property in return for the “gift,” a standing army for the elite. For he who pays the piper picks the tune.

Those who get hooked on the economic drug must go to the elite for a fix. In this, the method of introducing large amounts of stabilizing capacitance is by borrowing on the future “credit” of the world. This is a fourth law of motion – onset, and consists of performing an action and leaving the system before the reflected reaction returns to the point of action – a delayed reaction.

The means of surviving the reaction is by changing the system before the reaction can return. By this means, politicians become more popular in their own time and the public pays later. In fact, the measure of such a politician is the delay time.

The same thing is achieved by a government by printing money beyond the limit of the gross national product, and economic process called inflation. This puts a large quantity of money into the hands of the public and maintains a balance against their greed, creates a false self-confidence in them and, for awhile, stays the wolf from the door.

They must eventually resort to war to balance the account, because war ultimately is merely the act of destroying the creditor, and the politicians are the publicly hired hit men that justify the act to keep the responsibility and blood off the public conscience. (See section on consent factors and social-economic structuring.)

If the people really cared about their fellow man, they would control their appetites (greed, procreation, etc.) so that they would not have to operate on a credit or welfare social system which steals from the worker to satisfy the bum.

Since most of the general public will not exercise restraint, there are only two alternatives to reduce the economic inductance of the system.

  1. Let the populace bludgeon each other to death in war, which will only result in a total destruction of the living earth.
  2. Take control of the world by the use of economic “silent weapons” in a form of “quiet warfare” and reduce the economic inductance of the world to a safe level by a process of benevolent slavery and genocide.

The latter option has been taken as the obviously better option. At this point it should be crystal clear to the reader why absolute secrecy about the silent weapons is necessary. The general public refuses to improve its own mentality and its faith in its fellow man. It has become a herd of proliferating barbarians, and, so to speak, a blight upon the face of the earth.

They do not care enough about economic science to learn why they have not been able to avoid war despite religious morality, and their religious or self-gratifying refusal to deal with earthly problems renders the solution of the earthly problem unreachable to them.

It is left to those few who are truly willing to think and survive as the fittest to survive, to solve the problem for themselves as the few who really care. Otherwise, exposure of the silent weapon would destroy our only hope of preserving the seed of the future true humanity.

Industry Equivalent Circuits

The industry ‘Q’ can be given a block symbol as follows:

Diagram 4

Terminals #1 through #m are connected directly to the outputs of industries #1 and #m, respectively.

The equivalent circuit of industry ‘Q’ is given as follows:

Diagram 5

Characteristics:

All inputs are at zero volts.

A – Amplifier – causes output current IQ to be represented by a voltage EQ. Amplifier delivers sufficient current at EQ to drive all loads Y10 through YmQ and sink all currents i1Q through imQ.

The unit transconductance amplifier AQ is constructed as follows:

Diagram 7

* Arrow denotes the direction of the flow of capital, goods, and services. The total demand is given as EQ, where EQ=IQ.

Diagram 8

The coupling network YPQ symbolizes the demand which industry Q makes on industry P. the connective admittance YPQ is called the ‘technical coefficient’ of the industry Q stating the demand of industry Q, called the industry of use, for the output in capital, goods, or services of industry P called the industry of origin.

The flow of commodities from industry P to industry Q is given by iPQ evaluated by the formula:

iPQ = YPQ* EQ.

When the admittance YPQ is a simple conductance, this formula takes on the common appearance of Ohm’s Law, iPQ = gPQ* IQ.

The interconnection of a three industry system can be diagrammed as follows. The blocks of the industry diagram can be opened up revealing the technical coefficients, and a much simpler format. The equations of flow are given as follows:

diagram 9

 

Stages of Schematic Simplification

diagram 10

.

Generalization

All of this may now be summarized.

Let Ij represent the output of industry j, and

* ijk, the amount of the product of industry j absorbed annually by industry k, and     * ijo, the amount of the same product j made available for ‘outside’ use. Then

diagram 11

Substituting the technical coefficiences, yjk which is the general equation of every admittance in the industry circuit.

diagram 12

 

Final Bill of Goods

diagram 13

This is called the final bill of goods or the bill of final demand, and is zero when the system can be closed by the evaluation of the technical coefficients of the ‘non-productive’ industries, government and households. Households may be regarded as a productive industry with labor as its output product.

The Technical Coefficients

The quantities yjk are called the technical coefficients of the industrial system. They are admittances and can consist of any combination of three passive parameters, conductance, capacitance, and inductance. Diodes are used to make the flow unidirectional and point against the flow.

  • gjk = economic conductance, absorption coefficient
  • yjk = economic capacitance, capital coefficient
  • Ljk = economic inductance, human activity coefficient
  •  

Types of Admittances

Diagram 14a Diagram 14b

The Household Industry

The industries of finance (banking), manufacturing, and government, real counterparts of the pure industries of capital, goods, and services, are easily defined because they are generally logically structured. Because of this their processes can be described mathematically and their technical coefficients can be easily deduced. This, however, is not the case with the service industry known as the household industry.

Household Models

When the industry flow diagram is represented by a 2-block system of households on the right and all other industries on the left, the following results:

diagram 15

The arrows from left to right labeled A, B, C, etc., denote flow of economic value from the industries in the left hand block to the industry in the right hand block called ‘households’. These may be thought of as the monthly consumer flows of the following commodities. A – alcoholic beverages, B – beef, C – coffee, . . . . , U – unknown, etc. . .

The problem which a theoretical economist faces is that the consumer preferences of any household is not easily predictable and the technical coefficients of any one household tend to be a nonlinear, very complex, and variable function of income, prices, etc.

Computer information derived from the use of the universal product code in conjuction with credit-card purchase as an individual household identifier could change this state of affairs, but the U.P.C. method is not yet available on a national or even a significant regional scale. To compensate for this data deficiency, an alternate indirect approach of analysis has been adopted known as economic shock testing. This method, widely used in the aircraft manufacturing industry, develops an aggregate statistical sort of data.

Applied to economics, this means that all of the households in one region or in the  whole nation are studied as a group or class rather than individually, and the mass behavior rather than the individual behavior is used to discover useful estimates of  the technical coefficients governing the economic structure of the hypothetical singlehousehold industry…

Notice in the industry flow diagram that the values for the flows A, B, C, etc. are accessible to measurement in terms of selling prices and total sales of commodities.

One method of evaluating the technical coefficients of the household industry depends upon shocking the prices of a commodity and noting the changes in the sales of all of the commodities.

Economic Shock Testing

In recent times, the application of Operations Research to the study of the public economy has been obvious for anyone who understands the principles of shock testing.

In the shock testing of an aircraft airframe, the recoil impulse of firing a gun mounted on that airframe causes shock waves in that structure which tell aviation engineers the conditions under which some parts of the airplane or the whole airplane or its wings will start to vibrate or flutter like a guitar string, a flute reed, or a tuning fork, and disintegrate or fall apart in flight.

Economic engineers achieve the same result in studying the behavior of the economy and the consumer public by carefully selecting a staple commodity such as beef, coffee, gasoline, or sugar, and then causing a sudden change or shock in its price or availability, thus kicking everybody’s budget and buying habits out of shape.

They then observe the shock waves which result by monitoring the changes in advertising, prices, and sales of that and other commodities.

The objective of such studies is to acquire the know-how to set the public economy into a predictable state of motion or change, even a controlled self-destructive state of motion which will convince the public that certain “expert” people should take control of the money system and reestablish security (rather than liberty and justice) for all. When the subject citizens are rendered unable to control their financial affairs, they, of course, become totally enslaved, a source of cheap labor.

Not only the prices of commodities, but also the availability of labor can be used as the means of shock testing. Labor strikes deliver excellent tests shocks to an economy, especially in the critical service areas of trucking (transportation), communication, public utilities (energy, water, garbage collection), etc.

By shock testing, it is found that there is a direct relationship between the availability of money flowing in an economy and the real psychological outlook and response of masses of people dependent upon that availability.

For example, there is a measurable quantitative relationship between the price of gasoline and the probability that a person would experience a headache, feel a need to watch a violent movie, smoke a cigarette, or go to a tavern for a mug of beer.

It is most interesting that, by observing and measuring the economic models by which the public tries to run from their problems and escape from reality, and by applying the mathematical theory of Operations Research, it is possible to program computers to predict the most probable combination of created events (shocks) which will bring about a complete control and subjugation of the public through a subversion of the public economy (by shaking the plum tree).

Introduction to the Theory of Economic Shock Testing

Let the prices and total sales of commodities be given and symbolized as follows:

Commodities Price Function Total Sales
alcoholic beverages A fA
beef B fB
coffee C fC
gasoline G fG
sugar S fS
tobacco T fT
unknown balance U fU

Let us assume a simple economic model in which the total number of important (staple) commodities are represented as beef, gasoline, and an aggregate of all other staple commodities which we will call the hypothetical miscellaneous staple commodity ‘M’ (e.g., M is an aggregate of C, S, T, U, etc.).

Example of Shock Testing

Assume that the total sales, P, of petroleum products can be described by the linear function of the quantities B, G, and M, which are functions of the prices of those respective commodities.

P = aPG B + aPG G + aPM M

Then where B, G, and M are functions of the prices of beef, gasoline, and miscellaneous, respectively, and aPB, aPG, and aPM are constant coefficients defining the amount by which each of the functions B, G, and M affect the sales, P, of petroleum products. We are assuming that B, G, and M are variables independent of each other.

If the availability or price of gasoline is suddenly changed, then G must be replaced by G +  G. This causes a change in the petroleum sales from P to P +  P. Also we will assume that B and M remain constant when G changes to G +  G.

(P + P) = aPB B + aPG (G + G) + aPMM.

Expanding upon this expression, we get

P + P = aPB B + aPG G + aPG G + aPM M

and subtracting the original value of P we get for the change in P

Change in P = P = aPG G

Dividing by G we get

aPG = P / G .

This is a rate of change in P due only to an isolated change in G,  G.

In general, ajk is the partial rate of change in the sales effect j due to a change in the causal price function of commodity k. If the interval of time were infinitesimal, this expression would be reduced to the definition of the total differential of a function, P.

Diagram 16a

diagram 16b

When the price of gasoline is shocked, all of the coefficients with round G (2G) in the denominator are evaluated at the same time. If B, G, and M were independent, and sufficient for description of the economy, then three shock tests would be necessary to evaluate the system.

There are other factors which may be represented the same way.

For example, the tendency of a docile sub-nation to withdraw under economic pressure may be given by

diagram 17

where G is the price of gasoline, WP is the dollars spent per unit time (referenced to say 1939) for war production during ‘peace’ time, etc. These quantities are presented to a computer in matrix format as follows:

diagram 18

and

 X1 = G      Y1 = P – KP

X2 = B       Y2 = F – KF

X3 = etc.    Y3 = etc.

 

Finally, inverting this matrix, i.e., solving for the Xk terms of the Yj, we get, say,

[bkj] [Yj ] = [Xk]

This is the result into which we substitute to get that set of conditions of prices of commodities, bad news on TV, etc., which will deliver a collapse of public morale ripe for take over.

Once the economic price and sales coefficients ajk and bkj are determined, they may be translated into the technical supply and demand coefficients gjk, Cjk, and 1/Ljk.

Shock testing of a given commodity is then repeated to get the time rate of change of these technical coefficients. 

Introduction to Economic Amplifiers

Economic amplifiers are the active components of economic engineering. The basic characteristic of any amplifier (mechanical, electrical, or economic) is that it receives an input control signal and delivers energy from an independent energy source to a specified output terminal in a predictable relationship to that input control signal.

The simplest form of an economic amplifier is a device called advertising.

If a person is spoken to by a T.V. advertiser as if he were a twelve-year-old, then, due to suggestibility, he will, with a certain probability, respond or react to that suggestion with the uncritical response of a twelve-year-old and will reach in to his economic reservoir and deliver its energy to buy that product on impulse when he passes it in the store.

An economic amplifier may have several inputs and output. Its response might be instantaneous or delayed. Its circuit symbol might be a rotary switch if its options are exclusive, qualitative, “go” or “no-go”, or it might have its parametric input/ output relationships specified by a matrix with internal energy sources represented.

Whatever its form might be, its purpose is to govern the flow of energy from a source to an output sink in direct relationship to an input control signal. For this reason, it is called an active circuit element or component.

Economic Amplifiers fall into classes called strategies, and, in comparison with electronic amplifiers, the specific internal functions of an economic amplifier are called logistical instead of electrical.

Therefore, economic amplifiers not only deliver power gain but also, in effect, are used to cause changes in the economic circuitry.

In the design of an economic amplifier we must have some idea of at least five functions, which are:

  • the available input signals,
  • the desired output-control objectives,
  • the strategic objective,
  • the available economic power sources,
  • the logistical options.

The process of defining and evaluating these factors and incorporating the economic amplifier into an economic system has been popularly called game theory.

The design of an economic amplifier begins with a specification of the power level of the output, which can range from personal to national. The second condition is accuracy of response, i.e., how accurately the output action is a function of the input commands. High gain combined with strong feedback helps to deliver the required precision.

Most of the error will be in the input data signal. Personal input data tends to be specified, while national input data tends to be statistical.

Short List of Inputs

Questions to be answered:

  • what
  • where
  • why
  • when
  • how
  • who

General sources of information:

  • telephone taps
  • analysis of garbage
  • surveillance
  • behavior of children in school

Standard of living by:

  • food
  • shelter
  • clothing
  • transportation

Social contacts:

  • telephone – itemized record of calls
  • family – marriage certificates, birth certificates, etc.
  • friends, associates, etc.
  • memberships in organizations
  • political affiliation

The Personal Paper Trail 

Personal buying habits, i.e., personal consumer preferences:

  • checking accounts
  • credit-card purchases
  • “tagged” credit-card purchases – the credit-card purchase of products bearing the U.P.C. (Universal Product Code)

Assets:

  • checking accounts
  • savings accounts
  • real estate * business
  • automobile, etc.
  • safety deposit at bank
  • stock market

Liabilities:

  • creditors
  • enemies (see – legal)
  • loans

Government sources (ploys)*:

  • Welfare
  • Social Security
  • S.D.A. surplus food
  • doles
  • grants
  • subsidies
  • Principle of this ploy — the citizen will almost always make the collection of information easy if he can operate on the “free sandwich principle” of “eat now, and pay later.”

Government sources (via intimidation):

  • Internal Revenue Service
  • OSHA * Census     * etc.

Other government sources — surveillance of U.S. mail.

Habit Patterns — Programming

Strengths and weaknesses:

  • activities (sports, hobbies, etc.)
  • see “legal” (fear, anger, etc. — crime record)
  • hospital records (drug sensitivities, reaction to pain, etc.)
  • psychiatric records (fears, angers, disgusts, adaptability, reactions to stimuli, violence, suggestibility or hypnosis, pain, pleasure, love, and sex)

Methods of coping — of adaptability — behavior:

  • consumption of alcohol
  • consumption of drugs
  • entertainment
  • religious factors influencing behavior
  • other methods of escaping from reality

Payment modus operandi (MO) — pay on time, etc.:

  • payment of telephone bills
  • energy purchases
  • water purchases
  • repayment of loans
  • house payments
  • automobile payments
  • payments on credit cards

Political sensitivity:

  • beliefs
  • contacts
  • position
  • strengths/weaknesses
  • projects/activities

Legal inputs — behavioral control (Excuses for investigation, search, arrest, or employment of force to modify behavior)

  • court records
  • police records — NCIC
  • driving record
  • reports made to police
  • insurance information
  • anti-establishment acquaintances

National Input Information

Business sources (via I.R.S., etc):

  • prices of commodities
  • sales * investments in stocks/inventory * production tools and machinery         *buildings and improvements  * the stock market

Banks and credit bureaus:

  • credit information
  • payment information

Miscellaneous sources:

  • polls and surveys
  • publications
  • telephone records
  • energy and utility purchases

Short List of Outputs

Outputs — create controlled situations — manipulation of the economy, hence society — control by control of compensation and income.

Sequence:

  1. allocates opportunities
  2. destroys opportunities
  3. controls the economic environment 4. controls the availability of raw materials 5. controls capital.
  4. controls bank rates
  5. controls the inflation of the currency
  6. controls the possession of property
  7. controls industrial capacity
  8. controls manufacturing
  9. controls the availability of goods (commodities).
  10. controls the prices of commodities.
  11. controls services, the labor force, etc.
  12. controls payments to government officials.
  13. controls the legal functions.
  14. controls the personal data files — uncorrectable by the party slandered.
  15. controls advertising.
  16. controls media contact.
  17. controls material available for T.V. viewing
  18. disengages attention from real issues.
  19. engages emotions.
  20. creates disorder, chaos, and insanity.
  21. controls design of more probing tax forms.
  22. controls surveillance.
  23. controls the storage of information.
  24. develops psychological analyses and profiles of individuals. 27. controls legal functions [repeat of 15]
  25. controls sociological factors.
  26. controls health options.
  27. preys on weakness.
  28. cripples strengths.
  29. leaches wealth and substance.

Table of Strategies

Do This To Get This
Keep the public ignorant Less public organization
Maintain access to control point for feedback Required reaction to outputs (prices, sales)
Create preoccupation Lower defense
Attack the family unit Control of the education of the young
Give less cash and more credit and doles More self-indulgence and more data
Attack the privacy of the church Destroy faith in this sort of government
Social conformity Computer programming simplicity
Minimize the tax protest Maximum economic data, minimum enforcement problems
Stabilize the consent Simplicity coefficients
Tighten control of variables Simpler computer input data – greater predictability
Establish boundary conditions Problem simplicity/solutions of differential and difference equations
Proper timing Less data shift and blurring
Maximize control Minimum resistance to control
Collapse of currency Destroy the faith of the American people in each other

Diversion, the Primary Strategy

Experience has prevent that the simplest method of securing a silent weapon and gaining control of the public is to keep the public undisciplined and ignorant of the basic system principles on the one hand, while keeping them confused, disorganized, and distracted with matters of no real importance on the other hand.

This is achieved by:

  • disengaging their minds; sabotaging their mental activities; providing a low-quality program of public education in mathematics, logic, systems design and economics; and discouraging technical creativity.
  • engaging their emotions, increasing their self-indulgence and their indulgence in emotional and physical activities, by *unrelenting emotional affrontations and attacks (mental and emotional rape) by   *way of constant barrage of sex, violence, and wars in the media – especially the T. V. and the newspapers.* giving them what they desire – in excess – “junk food for thought” – and depriving them of what they really need.
  • rewriting history and law and subjecting the public to the deviant creation, thus being able to shift their thinking from personal needs to highly fabricated outside priorities.

These preclude their interest in and discovery of the silent weapons of social automation technology.

The general rule is that there is a profit in confusion; the more confusion, the more profit. Therefore, the best approach is to create problems and then offer solutions.

Diversion Summary

Media: Keep the adult public attention diverted away from the real social issues, and captivated by matters of no real importance.

Schools: Keep the young public ignorant of real mathematics, real economics, real law, and real history.

Entertainment: Keep the public entertainment below a sixth-grade level.

Work: Keep the public busy, busy, busy, with no time to think; back on the farm with the other animals.

Consent, the Primary Victory

A silent weapon system operates upon data obtained from a docile public by legal (but not always lawful) force. Much information is made available to silent weapon systems programmers through the Internal Revenue Service. (See Studies in the Structure of the American Economy for an I.R.S. source list.)

This information consists of the enforced delivery of well-organized data contained in federal and state tax forms, collected, assembled, and submitted by slave labor provided by taxpayers and employers.

Furthermore, the number of such forms submitted to the I.R.S. is a useful indicator of public consent, an important factor in strategic decision making. Other data sources are given in the Short List of Inputs.

Consent Coefficients – numerical feedback indicating victory status. Psychological basis: When the government is able to collect tax and seize private property without just compensation, it is an indication that the public is ripe for surrender and is consenting to enslavement and legal encroachment. A good and easily quantified indicator of harvest time is the number of public citizens who pay income tax despite an obvious lack of reciprocal or honest service from the government.

Amplification Energy Sources

The next step in the process of designing an economic amplifier is discovering the energy sources. The energy sources which support any primitive economic system are, of course, a supply of raw materials, and the consent of the people to labor and consequently assume a certain rank, position, level, or class in the social structure, i.e., to provide labor at various levels in the pecking order.

Each class, in guaranteeing its own level of income, controls the class immediately below it, hence preserves the class structure. This provides stability and security, but also government from the top.

As time goes on and communication and education improve, the lower-class elements of the social labor structure become knowledgeable and envious of the good things that the upper-class members have. They also begin to attain a knowledge of energy systems and the ability to enforce their rise through the class structure.

This threatens the sovereignty of the elite.

If this rise of the lower classes can be postponed long enough, the elite can achieve energy dominance, and labor by consent no longer will hold a position of an essential energy source.

Until such energy dominance is absolutely established, the consent of people to labor and let others handle their affairs must be taken into consideration, since failure to do so could cause the people to interfere in the final transfer of energy sources to the control of the elite.

It is essential to recognize that at this time, public consent is still an essential key to the release of energy in the process of economic amplification.

Therefore, consent as an energy release mechanism will now be considered.

Logistics

The successful application of a strategy requires a careful study of inputs, outputs, the strategy connecting the inputs and the outputs, and the available energy sources to fuel the strategy. This study is called logistics.

A logistical problem is studied at the elementary level first, and then levels of greater complexity are studied as a synthesis of elementary factors.

This means that a given system is analyzed, i.e., broken down into its subsystems, and these in turn are analyzed, until by this process, one arrives at the logistical “atom,” the individual.

This is where the process of synthesis properly begins, at the time of birth of the individual.

The Artificial Womb

From the time a person leaves its mother’s womb, its every effort is directed towards building, maintaining, and withdrawing into artificial wombs, various sorts of substitute protective devices or shells.

The objective of these artificial wombs is to provide a stable environment for both stable and unstable activity; to provide a shelter for the evolutionary processes of growth and maturity – i.e., survival; to provide security for freedom and to provide defensive protection for offensive activity.

This is equally true of both the general public and the elite. However, there is a definite difference in the way each of these classes go about the solution of problems.

The Political Structure of a Nation – Dependency

The primary reason why the individual citizens of a country create a political structure is a subconscious wish or desire to perpetuate their own dependency relationship of childhood. Simply put, they want a human god to eliminate all risk from their life, pat them on the head, kiss their bruises, put a chicken on every dinner table, clothe their bodies, tuck them into bed at night, and tell them that everything will be alright when they wake up in the morning.

This public demand is incredible, so the human god, the politician, meets incredibility with incredibility by promising the world and delivering nothing. So who is the bigger liar? the public? or the “godfather”?

This public behavior is surrender born of fear, laziness, and expediency. It is the basis of the welfare state as a strategic weapon, useful against a disgusting public.

Action/Offense

Most people want to be able to subdue and/or kill other human beings which disturb their daily lives, but they do not want to have to cope with the moral and religious issues which such an overt act on their part might raise. Therefore, they assign the dirty work to others (including their own children) so as to keep the blood off their hands. They rave about the humane treatment of animals and then sit down to a delicious hamburger from a whitewashed slaughterhouse down the street and out of sight. But even more hypocritical, they pay taxes to finance a professional association of hit men collectively called politicians, and then complain about corruption in government.

Responsibility

Again, most people want to be free to do the things (to explore, etc.) but they are afraid to fail.

The fear of failure is manifested in irresponsibility, and especially in delegating those personal responsibilities to others where success is uncertain or carries possible or created liabilities (law), which the person is not prepared to accept. They want authority (root word – “author”), but they will not accept responsibility or liability. So they hire politicians to face reality for them.

Summary

The people hire the politicians so that the people can:

  • obtain security without managing it.
  • obtain action without thinking about it.
  • inflict theft, injury, and death upon others without having to contemplate either life or death.
  • avoid responsibility for their own intentions.
  • obtain the benefits of reality and science without exerting themselves in the discipline of facing or learning either of these things.

They give the politicians the power to create and manage a war machine:

  • provide for the survival of the nation/womb.
  • prevent encroachment of anything upon the nation/womb.
  • destroy the enemy who threatens the nation/womb.
  • destroy those citizens of their own country who do not conform for the sake of stability of the nation/womb.

Politicians hold many quasi-military jobs, the lowest being the police which are soldiers, the attorneys and C.P.A.s next who are spies and saboteurs (licensed), and the judges who shout orders and run the closed union military shop for whatever the market will bear. The generals are industrialists. The “presidential” level of commander-in-chief is shared by the international bankers.

The people know that they have created this farce and financed it with their own taxes (consent), but they would rather knuckle under than be the hypocrite.

Thus, a nation becomes divided into two very distinct parts, a docile sub-nation [great silent majority] and a political sub-nation. The political sub-nation remains attached to the docile sub-nation, tolerates it, and leaches its substance until it grows strong enough to detach itself and then devour its parent.

System Analysis

In order to make meaningful computerized economic decisions about war, the primary economic flywheel, it is necessary to assign concrete logistical values to each element of the war structure – personnel and material alike.

This process begins with a clear and candid description of the subsystems of such a structure.

The Draft (as military service)

Few efforts of human behavior modification are more remarkable or more effective than that of the socio-military institution known as the draft. A primary purpose of a draft or other such institution is to instill, by intimidation, in the young males of a society the uncritical conviction that the government is omnipotent. He is soon taught that a prayer is slow to reverse what a bullet can do in an instant. Thus, a man trained in a religious environment for eighteen years of his life can, by this instrument of the government, be broken down, be purged of his fantasies and delusions in a matter of mere months. Once that conviction is instilled, all else becomes easy to instill.

Even more interesting is the process by which a young man’s parents, who purportedly love him, can be induced to send him off to war to his death. Although the scope of this work will not allow this matter to be expanded in full detail, nevertheless, a coarse overview will be possible and can serve to reveal those factors which must be included in some numerical form in a computer analysis of social and war systems.

We begin with a tentative definition of the draft.

The draft (selective service, etc.) is an institution of compulsory collective sacrifice and slavery, devised by the middle-aged and elderly for the purpose of pressing the young into doing the public dirty work. It further serves to make the youth as guilty as the elders, thus making criticism of the elders by the youth less likely (Generational Stabilizer). It is marketed and sold to the public under the label of “patriotic = national” service.

Once a candid economic definition of the draft is achieved, that definition is used to outline the boundaries of a structure called a Human Value System, which in turn is translated into the terms of game theory. The value of such a slave laborer is given in a Table of Human Values, a table broken down into categories by intellect, experience, post-service job demand, etc.

Some of these categories are ordinary and can be tentatively evaluated in terms of the value of certain jobs for which a known fee exists. Some jobs are harder to value because they are unique to the demands of social subversion, for an extreme example: the value of a mother’s instruction to her daughter, causing that daughter to put certain behavioral demands upon a future husband ten or fifteen years hence; thus, by suppressing his resistance to a perversion of a government, making it easier for a banking cartel to buy the State of New York in, say, twenty years.

Such a problem leans heavily upon the observations and data of wartime espionage and many types of psychological testing. But crude mathematical models (algorithms, etc.) can be devised, if not to predict, at least to predeterminate these events with maximum certainty. What does not exist by natural cooperation is thus enhanced by calculated compulsion. Human beings are machines, levers which may be grasped and turned, and there is little real difference between automating a society and automating a shoe factory.

These derived values are variable. (It is necessary to use a current Table of Human Values for computer analysis.) These values are given in true measure rather than U.S. dollars, since the latter is unstable, being presently inflated beyond the production of national goods and services so as to give the economy a false kinetic energy (“paper” inductance).

The silver value is stable, it being possible to buy the same amount with a gram of silver today as it could be bought in 1920. Human value measured in silver units changes slightly due to changes in production technology.

Enforcement

Factor I

As in every social system approach, stability is achieved only by understanding and accounting for human nature (action/reaction patterns). A failure to do so can be, and usually is, disastrous.

As in other human social schemes, one form or another of intimidation (or incentive) is essential to the success of the draft. Physical principles of action and reaction must be applied to both internal and external subsystems.

To secure the draft, individual brainwashing/programming and both the family unit and the peer group must be engaged and brought under control.

Factor II – Father

The man of the household must be housebroken to ensure that junior will grow up with the right social training and attitudes. The advertising media, etc., are engaged to see to it that father-to-be is pussy-whipped before or by the time he is married. He is taught that he either conforms to the social notch cut out for him or his sex life will be hobbled and his tender companionship will be zero. He is made to see that women demand security more than logical, principled, or honorable behavior.

By the time his son must go to war, father (with jelly for a backbone) will slam a gun into junior’s hand before father will risk the censure of his peers, or make a hypocrite of himself by crossing the investment he has in his own personal opinion or self-esteem. Junior will go to war or father will be embarrassed. So junior will go to war, the true purpose not withstanding.

Factor III – Mother

The female element of human society is ruled by emotion first and logic second. In the battle between logic and imagination, imagination always wins, fantasy prevails, maternal instinct dominates so that the child comes first and the future comes second. A woman with a newborn baby is too starry-eyed to see a wealthy man’s cannon fodder or a cheap source of slave labor. A woman must, however, be conditioned to accept the transition to “reality” when it comes, or sooner.

As the transition becomes more difficult to manage, the family unit must be carefully disintegrated, and state-controlled public education and stateoperated child-care centers must be become more common and legally enforced so as to begin the detachment of the child from the mother and father at an earlier age. Inoculation of behavioral drugs [Ritalin] can speed the transition for the child (mandatory). Caution: A woman’s impulsive anger can override her fear. An irate woman’s power must never be underestimated, and her power over a pussy-whipped husband must likewise never be underestimated. It got women the vote in 1920.

Factor IV – Junior

The emotional pressure for self-preservation during the time of war and the self-serving attitude of the common herd that have an option to avoid the battlefield – if junior can be persuaded to go – is all of the pressure finally necessary to propel Johnny off to war. Their quiet blackmailings of him are the threats: “No sacrifice, no friends; no glory, no girlfriends.”

Factor V – Sister

And what about junior’s sister? She is given all the good things of life by her father, and taught to expect the same from her future husband regardless of the price.

Factor VI – Cattle

Those who will not use their brains are no better off than those who have no brains, and so this mindless school of jelly-fish, father, mother, son, and daughter, become useful beasts of burden or trainers of the same.

This concludes what is available of this document

                                               

i “Studies in the Structure of Américan Economy” (1953), by Wassily Leontief (Director of the Harvard Economic Research Project), International Science Press Inc., White Plains, New York.

 

FOIA Request Reveals Technology for Psycho-Electronic Weapons

This topic appeared on several websites. We have copied it on this page so you can follow along with deFango’s presentation. 

.

Once you listen to deFango, you may want to know how to protect yourself. See our notes at the bottom of the page for helpful links.

∞∞∞∞∞∞∞

Written by Curtis Waltman
Edited by JPat Brown

Washington State Fusion Center accidentally releases records on remote mind control

As part of a request for records on Antifa and white supremacist groups, WSFC inadvertently bundles in “EM effects on human body.zip”

When you send thousands of FOIA requests, you are bound to get some very weird responses from time to time. Recently, we here at MuckRock had one of our most bizarre gets yet – Washington State Fusion Center’s accidental release of records on the effects of remote mind control.

As part of my ongoing project looking at fusion centers’ investigations into Antifa and various white supremacist groups, I filed a request with the WSFC. I got back many standard documents in response, including emails, intelligence briefings and bulletins, reposts from other fusion centers – and then there was one file titled “EM effects on human body.zip.”

Hmmm. What could that be? What does EM stand for and what is it doing to the human body? So I opened it up and took a look:

psycho electronic weapon

EM stands for electromagnetic. What you are looking at here is “psycho-electronic” weapons that purportedly use electromagnetism to do a wide variety of horrible things to people, such as reading or writing your mind, causing intense pain, “rigor mortis,” or most heinous of all, itching.

Now to be clear, the presence of these records (which were not created by the fusion center, and are not government documents) should not be seen as evidence that DHS possesses these devices, or even that such devices actually exist. Which is kind of unfortunate because “microwave hearing” is a pretty cool line of technobabble to say out loud.

remote mind control

You know what’s even cooler? “Remote Brain Mapping.” It is insanely cool to say. Go ahead. Say it. Remote. Brain. Mapping.

Just check the detail on these slides too. The black helicopter shooting off its psychotronic weapons, mapping your brain, broadcasting your thoughts back to some fusion center. I wish their example of “ELF Brain stimulation” was a little clearer though.

bio electro

It’s difficult to source exactly where these images come from, but it’s obviously not government material. One seems to come from a person named “Supratik Saha,” who is identified as a software engineer, the brain mapping slide has no sourcing, and the image of the body being assaulted by psychotronic weapons is sourced from raven1.net, who apparently didn’t renew their domain.

It’s entirely unclear how this ended up in this release. It could have been meant for another release, it could have been gathered for an upcoming WSFC report, or it could even be from the personal files of an intelligence officer that somehow got mixed up in the release. A call to the WSFC went unreturned as of press time, so until we hear back, their presence remains a mystery.

∞∞∞∞∞∞∞

.

To read more about this see:

US government accidentally sends a strange conspiracy theory file describing ‘remote mind control’ and ‘forced memory blanking’

.

∞∞∞∞∞∞∞

.

Below are other articles we have written over the last few years, trying to alert readers to the dangers of these technologies.

Also, we highly recommend the ASCEND protocol to help clear your body of toxins and create a clear channel for your kundalini awakening and crown chakra activation. This is what the planetary rulers really don’t want you to know.

How to Antidote EMFs and 5G

How 5G Will Kill the Birds, Bees, and Your Loved Ones

SPYING ALERT: VERIZON HAS ASSUMED BIG BROTHER POWERS WITHOUT YOUR KNOWLEDGE

Weaponized Cell Towers and Cellphones: 21st Century’s Silent, Invisible Killer by Design

LOCK DOWN ON PRISON PLANET ALMOST COMPLETE

The Our Spirit Sigil is a Worldwide Meme

What is the Qube? How do you use Ormus? What do crystals have to do with the Schumann wave?

DARPA VADER AND THE EVIL INTEL EMPIRE INSIDE UNCOVERING THE DOD SITH LORDS THAT CONTROL YOUR LAPTOP

BEHOLD: THE FRANKENSTEIN OF OUR DAY

ascend

Ascension Sacraments for the Cosmic and Earthly Nutrition Die

 

 

There were no commercial plane crashes on September 11, 2001

By Twncpcone JimmyJones Fri, 04/20/2018

.

EVERY supposed one of the 256 passengers on 9-11 paid for their tickets in cash on THE MORNING 0f 9-11!  NOT ONE used a single credit card and there are no electronic receipts from anyone or any company anywhere in the world.  Why?  There were no commercial plane crashes on 9-11.

Except for the supposed Atta and all of his massive incriminating evidence on a supposed suicide flight….NOT ONE single supposed passenger parked a car at any airport on 9-11 NOT ONE. Why? There were no commercial plane crashes on 9-11.

The reason the US government spends billions of dollars a year on infiltrating truth groups and forums , suiciding activists, and staging and writing media propaganda around the world is because there were no commercial plane crashes on 9-11.

The reason the US military owned media outlets like GE and Westinghouse who own NBC and CBS will never expose their own crimes of conspiracy to murder is because there were no commercial plane crashes on 9-11.

The reason the US government set up the Homeland security agency, TSA, Patriot Act, wiretapping, torture through confessions, and renditions….all to keep you quite and scared about 9-11 is because there were no commercial plane crashes on 9-11.

The reason Rosie O’Donnell was fired from TV for mentioning the WTC 7 collapse which would immediately expose 9-11 as some form of controlled demolition is because there were no commercial plane crashes on 9-11.

The reason HUNDRED’s of so-called “terrorist training drills” like Tripod II and Vigilant Guardian were taking place on 9-11….at the exact time of the plane crashes…..was for plausible deniability because there were no commercial plane crashes on 9-11.

The reason that NONE of the voice data recorders, flight data recorders, or BLACK BOXES had serial numbers….a first in aviation history and it happened 4 times on the same day…is because there were no commercial plane crashes on 9-11.

(Update:  Mueller…yes that Mueller has stated that the FBI has ‘lost all the black boxes’ from 9-11! Maybe it’s with the original moon landing video that they ALSO said they have lost?)

The reason that EVERY TV interview on the DAY OF 9-11 was given my military owned media outlet personnel (watch September Clues online) is because there were no commercial plane crashes on 9-11.

The reason that ALL the buildings and locations on 9-11 appear to have been destroyed by some form of demolition or Directed Energy Weapon is because there was no jet fuel because there were no commercial plane crashes on 9-11.

The reason the US government allocated only $3 million dollars to investigate ALL of 9-11(Lewinsky Scandal got $50 million) is because there were no commercial plane crashes on 9-11.

The reason NORAD stood down on 9-11 to immediately intercept the planes was because there were no planes to shoot down because there were no commercial plane crashes on 9-11.

The reason EVERY video filming the Pentagon was immediately confiscated (80+ at last count) was because there were no commercial plane crashes on 9-11.

The reason the command procedure to shoot down a rogue plane was changed just weeks before 9-11 to having to get Donald Rumsfeld’s permission first….and then was changed back immediately the day AFTER 9-11 to the pilots discretion…..was because there were no commercial plane crashes on 9-11.

The reason that NONE of the 256 passengers (except ATTA) drove and parked their own cars at ANY airport on 9-11 is because there were no commercial plane crashes on 9-11.

The reason that NOT ONE single video exists of any person(except ATTA) at any airport in any way from any of the planes of 9-11 is because there were no commercial plane crashes on 9-11.

The reason that Tens of millions of dollars were made on “put options” which shorted United and American Airlines just days before 9-11 and the US REFUSES to release exactly who made those financial bets is because there were no commercial plane crashes on 9-11.

The reason the US conducted a terrorist training drill at the Buffalo Intl Airport one week BEFORE 9-11 which included terrorists blowing up a plane (the exact people conducting this drill just so happen to be the ones who then conducted the “rescues” at ground zero one week later!) was because there were no commercial plane crashes on 9-11.

The reason that Rumsfeld announced $2.3 TRILLION had been “lost” at the Pentagon on 9-10-01 and that the 28 accounting experts would be looking into it (ALL 28 died in the Pentagon plane attack and all investigations were immediately dropped) was because there were no commercial plane crashes on 9-11.

The reason the Pentagon was conducting a “MASCAL” (Mass Casualty) exercise ON THE DAY OF 9-11 at the Pentagon involving a PLANE CRASHING INTO IT…was once again for a weak plausible deniability excuse because there were no commercial plane crashes on 9-11.

The reason the doors, fire escapes, observation decks, and ALL access to the tops WTC’s 1 and 2 buildings was closed and chained up on Monday 9-10-01…was because survivors could talk….because there were no commercial plane crashes on 9-11.

The reason Mayor Gulliani was conducting Operation Tripod II at Pier 92 (rather than his NEW multiple million dollar bunker inside WTC 7) on Monday 9-10-01 which involved terrorist attacks on the WTC’s and then the same exact people were then in charge of 9-11….was because there were no commercial plane crashes on 9-11.

The reason the FBI released the names, addresses, photos, religious beliefs, whereabouts, affiliations, professional connections, flight training schools, nationalities, personal histories, ages, visa status OF ALL the highjackers within DAYS Of 9-11 (Unibomber took 17 years!)…..is because there were no commercial plane crashes on 9-11.

The reason PA Gov. Tom Ridge, who would then head a new agency called Homeland Security, said that the WTC debris would be buried at CDI’s smelting plant which was purchased just months before 9-11 in PA (no debris went overseas or to China for example!) was because there were no commercial plane crashes on 9-11.

Even though it was illegal Gulliani banned ALL photography and video of the WTC’s after the attacks which clearly showed serious problems with the official stories because there were no commercial plane crashes on 9-11.

The reason Osama Bin Laden denies any connection to wrong doing and basically says the US government and military are sick and murderous for their own gains http://911review.com/articles/usamah/khilafah… is because he had nothing to do with 9-11 because there were no commercial plane crashes on 9-11.

The reason there were SERIOUS problems with ALL the videos showing planes on 9-11 is because there were no commercial plane crashes on 9-11.

The reason that there will always be massive problems with the passenger lists and why NONE of the hijackers were listed on ANY of them is because there were no commercial plane crashes on 9-11.

The reason there will NEVER be a single piece of verified debris from ANY of the 4 planes from ANY of the 4 locations on 9-11 is because there were no commercial plane crashes on 9-11.

The reason that NO engines, NO tail sections, NO seats, NO fuselage, NO luggage, and NOTHING from any of the planes has ever been found and verified through a serial number is because there were no commercial plane crashes on 9-11.

The reason there are massive problems with the take-off records of the 4 flights on 9-11 is because there were no commercial plane crashes on 9-11.

The reason that NOT ONE PENNY has been paid from insurance companies to replace the planes themselves is because they pay only be verifiable debris….and NONE has ever been found….is because there were no commercial plane crashes on 9-11.

The reason Bush threatened Congressman to never investigate 9-11, then delayed the investigation 18 months, then handpicked the Commission members, had Commission members quit because they said the Commission was a fraud because they were never going to be allowed to inspect the plane wreckage because of “national security”, and then told them to never “cross the line” with regards to plane investigations……is because there were no commercial plane crashes on 9-11. (Sen. Paul Wellstone paid with his life. He demanded to verify the plane debris. That’s why he was killed)

The reason that thermite and cordite tested POSITIVE and was found EVERYWHERE on 9-11 is because there was no jet fuel because there were no commercial plane crashes on 9-11.

The reason that jet fuel tested NEGATIVE at ALL 4 crash sites on 9-11 is because there were no commercial plane crashes on 9-11.

The reason that the WTC towers 1 and 2, which were each 110 stories high of reinforced concrete and steel covering ONE ACRE for each floor…….which was then turned into a pile of dust standing only TWO STORIES HIGH from a fuel fire ( a first in world history)…..was because there were no commercial plane crashes on 9-11.

The reason CDI, Control Demolition Inc, (A DEMOLITION COMPANY….even though there was no piece of building debris larger than what could fit onto their existing trucks!) was paid $35 Billion to clean up 9-11 (similar to what the US government paid CDI after the OKCity bombing in 1995) and was seen in and around the WTC’s AND OKCity Murrah building for weeks and months PRIOR to 9-11 and April 1995….was because there were no commercial plane crashes on 9-11.

The reason everyone smelled cordite and NOT ONE person smelled ANY of the 12,000 gallons of toxic jet fuel at the Pentagon was because there were no commercial plane crashes on 9/11.

The reason NONE of the 600 FBI agents at the Pentagon were wearing masks, even though 12,000 gallons of fuel had just been released, was because there were no commercial plane crashes on 9-11.

The reason the Naudet Brothers have not been seen since 9-11, even though they were related to the fire company they just so happen to be filming on 9-11 to capture the ONLY supposed video of the first plane of 9-11…(http://www.spingola.com/jules_naudet.htm) ….is because there were no commercial plane crashes on 9-11.

The reason the FAA boss destroyed the taped testimony of the 3 air traffic controllers immediately following 9-11 which basically said they could not have been commercial planes….was because there were no commercial plane crashes on 9/11.

The reason 16 supposed Saudi Arabian men who averaged 5’4″ 120 lbs with ONE inch knives could highjack 4 planes without a single mayday or hijacking code being entered by a single pilot on 9-11…was because there were no commercial plane crashes on 9-11.

The reason that ALL EIGHT, 6-ton, 9ft wide Titanium alloy engines DISAPPEARED ( a first in world history and it happened 8 times) on 9-11 and have never been physically verified since was because there were no commercial plane crashes on 9-11.

The reason $15 billion dollars was paid out to the US airline companies within 2 weeks of 9-11 was because there were no commercial plane crashes on 9-11.

The reason the airline insurance companies have yet to pay a single penny to replace a single plane from 9-11 (which by the way they ONLY pay by debris verification)….is because there were no commercial plane crashes on 9-11.

The reason it is now against US law to investigate or even contact the exact people who took the supposed “man from the street “ films, photos, and videos of planes of 9-11…..it because there were no commercial plane crashes on 9-11.

The reason you will never have ANY truly independent investigation of 9-11 is because your legal system is owned by the same murderers and there were no commercial plane crashes on 9-11.

The reason that everything will be kept in secrecy with regards to any legal procedures, covered with terms like “national security” even though the ENTIRE PLANET supposedly saw it, and ANY court cases will all have gag orders and be closed to the public is because there were no commercial plane crashes on 9-11.

The reason the families will NEVER ask for verification of plane debris from any of the 4 planes from any of the 4 locations on 9-11 is because there were no commercial plane crashes on 9-11.

The reason that NOT ONE single family member gave or demanded a DNA sample or independent test from the planes of 9-11 (which means authorities could never have matched the DNA as positive from the Pentagon Flt. 77 without a sample FROM the family)….is because there were no commercial plane crashes on 9-11.

Thorium Myth vs Facts

From Thorium Myth vs Facts

There are a number of persistent myths about radiation, nuclear energy, reactors, thorium, and the LFTR itself that are often repeated at all levels of education and experience. This is an attempt to separate myth from fact.

Myth: Thorium is just another idea being pushed by the nuclear industry.

Fact: The predominant “nuclear industry” of today consists of companies like Westinghouse, General Electric, Toshiba, AREVA, Rosatom, Babcock & Wilcox that are pursuing water-cooled reactor designs fueled by solid uranium dioxide. They have expressed very little if any interest in thorium as a nuclear fuel for the simple reason that it is not a good technological fit with their solid-fueled, water-cooled reactors. For them to embrace thorium in a liquid-fueled, high-temperature reactor like LFTR would require a complete “reboot” of their nuclear business strategy thus far, which is heavily dependent on revenues from the sale of fabricated solid nuclear fuel.

It is highly unlikely that they will ever have an economic incentive to adopt thorium in a liquid-fueled form, and most of them have evaluated the potential benefits of thorium in a solid-fueled form and found them uncompelling. The notion that thorium fuel is a fad that they are embracing to improve their public relations position has no basis in reality, and is a figment of the imagination of anti-nuclear campaigners who are troubled by the growing interest in the thorium fuel cycle implemented in liquid-fluoride nuclear reactors.

Myth: Thorium as a nuclear fuel has been a failure.

Fact: Almost all efforts to use thorium as a nuclear fuel in the past have been connected with solid-fueled reactors, where as previously mentioned, it does not offer compelling advantages, a fact that we have never contested. The effective use of thorium as a nuclear fuel, by definition, implies a system that employs chemical processing to separate uranium from thorium, and fuel from fission products. Chemical processing of any type is very difficult with solid nuclear fuels, like uranium dioxide fuel or thorium dioxide fuel. It is much simpler with fluid fuels, and simplest of all with liquid fluoride fuels. In liquid fluoride form, the chemical processing needed to realize the potential of thorium as a nuclear fuel is much more straightforward, and thus the benefits of thorium can be realized.

Myth: We know that it will take at least thirty years to build a thorium reactor.

thorium reactor

Fact: No one knows how long it will take, but we do have valuable analogies to examine. The Molten-Salt Reactor Experiment (MSRE) went from a new start to criticality in five years, and went on to operate for another five years, in the equivalent of $80M in today’s funding. When Rickover asked the Atomic Energy Commission in the early 1950s how long it would take them to build a reactor for a nuclear submarine, they carefully considered it and told him that one should be ready by the 1980s. The USS Nautilus put to sea in 1954. Drive and determination to achieve a goal, coupled with technological competence, work wonders on the timeline for a new technology development. Given incentive, financial resources, and a responsive regulatory environment, thorium-fueled liquid-fluoride reactors can be designed, demonstrated, and implemented in a reasonable period.

Misrepresentation: Thorium reactors still need uranium or plutonium. This is a proliferation risk.

This is a misrepresentation of how a liquid-fluoride thorium reactor (LFTR) operates. It is true that any reactor, including a LFTR, needs fissile material in order to start up. This is the “initial inventory” by nuclear engineers, and it is necessary for “achieving criticality,” which is what the startup of a nuclear reactor is called. Natural thorium contains no fissile isotopes, so this material must be supplied initially. But it is a misrepresentation to say that LFTRs still need to be supplied with uranium or plutonium after this initial startup. LFTRs generate new fissile fuel from the thorium in their blanket (a region of the reactor that surrounds the active core).

In the blanket thorium absorbs neutrons and forms new nuclear fuel, uranium-233, which is chemically extracted and added to the fuel salt of the LFTR. So after being provided with the initial fissile material to start the reactor, it doesn’t need anymore. It uses the neutrons of the fission reaction to continue to make the fuel it needs. Furthermore, if enriched uranium or plutonium were to be used to start LFTRs, this would not constitute a “proliferation risk”. Using this material to start a LFTR is not going to help countries that don’t have nuclear weapons to obtain them. Rather, it would work against that risk by permanently destroying this material (through fission) and replacing it with a material (uranium-233) that has strong intrinsic barriers against diversion for use in nuclear weapons.

Misrepresentation: Using thorium would require a resumption of reprocessing in the United States.

This misrepresentation requires some additional background explanation. Early in the nuclear era, it was assumed that the spent nuclear fuel produced from solid-uranium-fueled reactors (which also contained plutonium) would be chemically processed to separate the uranium and plutonium from the fission products and from one another. Then the uranium and plutonium would be refabricated into new solid fuel pellets and used again in uranium-fueled reactors. There was particularly strong interest that the uranium/plutonium fuel would be used for sodium-cooled fast breeder reactors. France built a huge chemical processing facility for nuclear fuel at La Hague for this purpose.

There was a fear that the same chemical processing technology that would be used to handle civilian spent nuclear fuel would be exported, along with civilian nuclear power plants, to developing countries around the world that did not already have either a civilian nuclear power program or a nuclear weapons program. The fearful scenario continued with the expectation that the possession of the technology to chemically separate plutonium from uranium would prove so tempting to those non-weapons countries that they would build special plutonium-producing “production” reactors, just as the US, USSR, UK, France, and China had done, in order to produce plutonium for nuclear weapons, and then employ the chemical processing technology to extract that plutonium and use it to fabricate weapons.

This never happened. Any country that wanted to develop nuclear weapons did so prior to obtaining civilian nuclear power or chemical processing technology. Other countries like Germany and Japan developed conventional chemical processing technology for nuclear fuel but never built “production reactors” or fabricated nuclear weapons. Furthermore, conventional nuclear chemical processing has nothing to do with the liquid-fluoride thorium reactor (LFTR) technology we advocate since the chemical processing in a LFTR is based on fluoride chemistry (totally different from conventional chemical processing technology) and on the separation of uranium from thorium, not plutonium from uranium.

The chemical processing technology proposed for a LFTR would be ineffective if someone attempted to use it to separate plutonium from uranium, and furthermore the LFTR is designed to make as little plutonium as possible. If plutonium is used to start a LFTR, it is consumed in the first few months as the reactor establishes its fuel cycle, again, based on thorium and uranium-233. The chemical processing system proposed for use in the LFTR is entirely contained in the reactor facility, and operates at high temperatures and under high radiation fields. It is essentially impossible to repurpose this system once it has operated, and it simply isn’t designed to produce any materials suitable for weapons.

Those who perpetuate this misrepresentation play on public ignorance of different chemical processing techniques to cause people to believe that conventional, aqueous reprocessing techniques (often called “PUREX”) are just the same as those that would be used in the LFTR. They’re not. In fact, they’re absolutely nothing like one another.

Myth: There’s no point to developing thorium reactors because it will still produce radiation.

Fact: Yes, the fission of uranium-233 from thorium will still produce fission products that are highly radioactive, and these will have to be carefully isolated until they decay away. But to reject fission because of the production of radioactive materials is to miss a tremendous opportunity to help mankind. Many desirable products of thorium reactors come about precisely because the fission products are radioactive. The beneficial use of medical radioisotopes relies on the fact that these products are radioactive, which allows them to be used for imaging and treatment in the body. Fission reactions are the only practical ways for many of these medical radioisotopes to be generated in sufficient quantities and at affordable prices.

Furthermore, nearly all fission products have short half-lives, which means that they rapidly decay to a stable, non-radioactive state. Only a handful of fission products, including strontium-90, cesium-137, and samarium-151, have half-lives that require isolation beyond a century.

Myth: Molten salt will explode on contact with air and water.

FHRFact: Anti-nuclear campaigners who propagate this myth are confusing chemically-stable fluoride salts with chemically-reactive liquid metals like sodium that have been proposed as reactor coolants in other types of reactors. Fluoride salts do not explode or react with air and water because of their tremendous chemical stability. Furthermore, they chemically trap important fission products like strontium and cesium as very stable fluorides in their fuel form. Finally, to be clear, liquid metallic sodium (not used in liquid fluoride reactors) is very reactive with air and water; sodium chloride (table salt, also not used in liquid fluoride reactors) is not reactive; sodium fluoride (sometimes used in liquid fluoride reactors) is not reactive and is even more chemically stable than sodium chloride.

Myth: All radiation is dangerous at any dose level.

Fact: We are continuously surrounded by radiation, nearly all of which comes from natural sources. Our bodies themselves are naturally radioactive due to the presence of carbon-14 and potassium-40. All lifeforms have radiation repair mechanisms and indeed are always repairing radiation damage to their DNA, a great deal of which comes from being exposed to the Sun. Small doses of radiation are not dangerous because they do not overwhelm the body’s radiation repair mechanisms, and most natural and manmade doses are very small.

Myth: Radiation is a silent threat that is difficult to detect.

Fact: While we do not have natural senses that detect ionizing radiation, radiation in utterly miniscule quantities is easy to detect and verify with modern instruments, and the various signatures will determine whether it is naturally-occurring or manmade. The intensity of the radiation will allow trained personnel to evaluate the potential risk.

Myth: All radioactive material is dangerous, and a long half life means it is really dangerous.

Fact: The longer the half-life, the less radioactive and less dangerous a substance is. Some radioactive materials with long half-lives, such as plutonium-239, are hazardous only in certain conditions such as inhalation because of their specific type of radioactive decay (alpha emission). Fission products—the results of the fission reaction—do not decay by alpha emission but rather by beta and gamma emission. This still presents a hazard but one of a different nature, and one that is well-understood.

Myth: radioactivity lasts forever.

Fact: Radioactivity means the material is decaying away and the most radioactive substances are those that are going away the most quickly.

Myth: Nuclear energy equals nuclear weapons.

Fact: Nuclear reactors that generate power and nuclear weapons are totally different things. Every country that has developed nuclear weapons has done so because they set out to do so. They used the same techniques that the United States did during the Manhattan Project of World War 2, namely the enrichment of natural uranium and the production of plutonium in dedicated nuclear reactors meant only for this purpose. No country has taken electricity-generated nuclear reactor technology from another country and perverted it into a means to produce nuclear weapons. Furthermore, the inherent resistance of thorium and its byproducts to use in nuclear weapons were the central reason why it was rejected for use in nuclear weapons during the Manhattan Project and why it has lagged in development ever since.

thorium_reservesMyth: The world will never change and accept energy from thorium.

Fact: The world is always changing. We have to decide whether to make the changes needed to embrace this natural, sustainable, reliable and economical energy source.

Golden Don of the Golden Dawn: The Illuminated Suns Series

c-change is the author of the series below.
In the video, Douglas Gabriel interviews c-change (Nicholas) to discuss his protocols and revelations.
.
 .

The series is divided into Protocols and Revelations. The Protocols outline a sequence of discrete actions for the Alliance to take in the process of enacting a controlled demolition of the cabal. The Revelations unveil some of the most vital tenets of occult knowledge as well as the specific techniques used by the dark occultists of the cabal to deceive, entrap, and enslave people into their Beast system.

.

Together, they form a battle plan for the controlled but absolute destruction of the Satanic New World Order, to hasten the inevitable dawning of a new Golden Age.

 

The People Have Weaponized Truth

..

Protocols of the Illuminated Suns of the Golden Dawn (Part 1)

.
Protocol 1: Gaslighting the Media
Protocol 2: Secure Victory Before Firing a Shot
Protocol 3: Weaponize the Light (Disclosure)
Protocol 4: Cut Off the Cabal’s Money
.

Protocols of the Illuminated Suns of the Golden Dawn (Part 2)

.
Protocol 5: Topple Globalist Pedocracy
Protocol 6: Reset Global Financial System
.

Revelations of the Illuminated Suns of the Golden Dawn (Part 1)

.
Revelation 1: The ‘United States’ is a Corporation, Subverted by Globalist SES, Fed, and SERCO
Revelation 2: The Truth About Fame, Power, and the Cabal Trap
Revelation 3: The True Meaning of ‘Illuminati,’ and the Truth About Social Darwinism and Royal ‘Bloodlines’
Revelation 4: The Truth About ‘Moral Relativism,’ Natural Law, and Karma
Revelation 5: The Truth About Population Control and Climate Change
Revelation 6: The Truth About Eugenics, Disgenics, and Epi-Disgenics
.

Revelations of the Illuminated Suns of the Golden Dawn (Part 2)

Revelation 7: The Truth About Advanced Energy Technologies

Revelation 8: The Truth About Gang Stalking (Part 1) It Exists

Revelation 9: The Truth About Gang Stalking (Part 2) The Technology, and the Real End Game

Revelation 10: The Truth About the Spiritual War

Revelation 11: The True Meaning of the Occult Symbols of Obelisk and Pyramid

A Note on the Name: Illuminated Suns of the Golden Dawn

.
.

AIM4Truth on YouTube

cropped-aim-4-truth-png22.pngWe have created several sites for truth education that provide in-depth citizen intelligence reports, daily truth news, and trending articles. These are located at:

American Intelligence Media

Americans for Innovation

Patriots for Truth

Truth Bits

We also maintain a great selection of playlists on YouTube. New videos are added each week.

Betsy and Thomas

Betsy and Thomas discuss leading current events with an eye for discerning truth from fiction.

AIM Insights

Thomas leads interesting and timely interviews and discussions with other patriots.

Truth History

What is our real history? The global cabal’s rule over planet Earth is coming to an end. Patriots want to know what really happened before the rulers of the planet wrote their history books of lies.

New Energy

There are many forms of energy that are available to humanity. Once the global elite are imprisoned for their crimes against humanity, they will no longer be able to keep these secrets hidden. Begin your learning process by exploring these energy alternatives.

New World Awakening

Douglas Gabriel explains how the Second American Revolution is one that will free humanity and lead us into a time of rejuvenation and renewal. This must-see eight-part video series can help you awaken to truth.

Leader Technologies

The story of the theft of social media is the biggest heist of all time. Once IBM Eclipse Foundation stole Leader Technologies proprietary codes for creating scalable internet platforms, they gave it away to anyone who wanted it – Google, YouTube, Twitter, LinkedIn, and anything that requires a log in code.

Critical Thinking

Many people missed classes in critical thinking when they were in high school and/or college. We are placing video tutorials in this playlist selection so that you can learn how to be a better, clearer thinker.

Glass Bead Game

Once you begin your travels inside our various websites, you will find that they are connected and that there are bridges between sites which you can take (or not) as your curiosity arises. We have carefully selected videos in this playlist that will support your journey towards truth and enlightenment.

OPIC is a Total Fraud

Good project for the Conclave and other digital sleuths: Find the faked up organizations in the OPIC Partnership list and expose their fraudulent activity. Hint: all you need to do is scratch the surface of the OPIC façade and you’ll find the fraud. My find was the FIRST ONE I picked!

Call me crazy, but this reads like a radical leftist globalist agenda to me.

Partnerships and Resources. (Accessed Apr.14, 2018). Overseas Private Investment Corporation (OPIC).

https://www.opic.gov/doing-business-us/opic-partnerships-resources

Note: Silicon Valley needed some financing help. Boo hoo. (Note: this website does not exist now!) So fake. Here’s their “founder”: https://www.linkedin.com/in/angie-cardoza-84770313/  So FAKE! No doubt the first para. of her bio describes the only work she actually did: create the non-profit 501(c)(3). Notice that she was in financial service prior. No experience for what she describes.

chamber of commerce

Huh? Silicon Valley needs financing help? Are you kidding me?! Can anyone say siphon of US gov’t dollars to leftists worldwide?

Chamber 2.jpg

.

.

This is not accounting, it is corrupt lawyers and SJWs at OPIC taking care of themselves and their friends.

The Clintons knew this was going on and were just following suit in the Clinton Foundation.

My hunch is proving to be 100% right: OPIC is a total fraud. Here’s just the second example I picked out of Jim’s spreadsheet.

https://www.opic.gov/sites/default/files/docs/marriott_kabul_hotel.pdf

opic fraud

General Systems International, LLC ( GSI ) is a fake company. Just look at their ridiculous website. These people a frauds:

http://gensysint.com/OPIC_Press_Release.html

Here’s the entire PDF of this website: https://www.fbcoverup.com/docs/library/2018-04-14-General-Systems-International-GCI-OPIC-financed-Website-accessed-Apr-14-2018.pdf

GCI. (Accessed Apr. 14, 2018). General Systems International (GCI) full website archive. GCI / Overseas Private Investment Corporation (OPIC).

GSI 2

GSI 3

GSI 4

GSI 1

That’s it! Not much work to get $60,000,000 in OPIC financing. This is probably all they had to do to get it. (Besides pad all those British Virgin Islands accounts).

http://gensysint.com/OPIC_Press_Release.html

.

..

Here’s the full description from this page (we have it if it gets taken down):

https://www.opic.gov/sites/default/files/docs/marriott_kabul_hotel.pdf

It is just crazy how they list their offshore location for the grifter funds.

Opic 3

.

https://www.opic.gov/sites/default/files/docs/bancentro_nicaragua.pdf

Opic 4

.

.

Ivanka and dad

Ivanka Trump Joins Senior Executive Service-Run OPIC Initiative