EEG Heterodyning Or EEG Cloning Technology & Superconducting Quantum Interference Devices

EEG Heterodyning Or EEG Cloning Technology & Superconducting Quantum Interference Devices – What Role Do They Play In The U.S. Military Intelligence Complexes’ Signals Intelligence Driven Mind Control Weapons, And This Complexes’ Active Denial Weapons System?

Conducting Quantum Interference Devices And Their Application In Government Mind Control Weapons..

First published on: Sunday, July 15, 2018.

EEG Heterodyning Or EEG Cloning Technology & Superconducting Quantum Interference Devices, mind control and remote brain access terror.

-“I studied how to crack DES and other encryption technologies but had no real experience in the hacking techniques of the human mind before my ordeal. In secret government laboratories, the encryption keys are changed as frequently as can be cracked by the best decryption machines they have. The human brain can not change its encryption, so once decoded your brain is forever part of the TAMI database and network. The mind has no firewall.”

– Dr. Robert Duncan In his book “Controlling The Human Mind” *Dr. Nick Begich confirms what Dr. Robert Duncan has stated in the above quotation, discussing how the U.S. federal government has mapped out the human brain, so that the satellite based electronic weapons which the U.S. Military Intelligence complex deploys on the American people – as part of its mind control weapons’ program – can be used to access the neural pathways of the brain of an American citizen, through a covertly implemented government brain mapping program.

One may logically conclude that this secret government program is for the express purpose of enslaving the American people, through the furtive implementation of a signals intelligence driven domestic spy program, which also allows for the non consensual human experimentation of myriad unwitting American citizens.

*Dr. Begich is the son of the late Congressman, Nick Begich Sr., who disappeared in a mysterious Alaskan plane crash, along with Congressman Hale Boggs in 1972.

The article on the following Website is in regard to the FBI’s attempt to cover up telexes obtained from the U.S. Freedom Of Information Act in 1992, regarding the missing Cessna 310 of Congressman Hale Boggs – These telexes prove that the FBI had actually located the Cessna 310 which Congressmen Hale Boggs and Nick Begich were travelling on, via spy satellite, and that at least two survivors were seen walking near the Cessna 310 after it had either crash landed or made a safe landing – In spite of locating the Cessna 310, the FBI allowed Boggs, Begich, Begich’s aide and the plane’s pilot to perish, while promulgating a disinformation campaign claiming that the plane and its passengers had never been found – The government controlled media in the United States continues to circulate this lie in the modern day.

In “Controlling The Human Mind” – Dr. Begich’s book on the U.S. Military Intelligence complexes’ mind control weapons’ technology, Begich even mentions the creation of the “RadiofrequencyRadiation Dosimetry Handbook” for military applications, which includes many of the different frequencies that can be used to remotely affect the minds of those being targeted for such technology.

The “Radiofrequency Radiation Dosimetry” handbook, offers further proof of the U.S. federal government’s intent to map out each American citizen’s own unique EMF brainwave print, for the purpose of creating a *signals intelligence driven domestic spy program, that can be used to track each citizen by way of their bodies’ own unique set of EMF signatures.It also serves as evidence that the U.S. Military Intelligence complex perceives the human brain to be little more that an organic computer, which they can covertly program, without the targeted person even realizing that this insidious act is being perpetrated against them.

So it’s no wonder why this complex quietly refers to the American citizenry as the “sheeple,” since they see Americans as little more than flocks of sheep which need to be controlled through any means necessary. This is best evidenced by the CIA’s MKULTRA program which began in the 1950s and officially ended in the 1970s, after Congress ordered the CIA to stop its non consensual human experimentation program.

From there, this mind control research program went underground and has since evolved into global effort to remotely control the thoughts of humans, through the use of the electromagnetic spectrum.

“They tell people the program is shut down now but that’s not so. It just has a different name. These things never die. It’s an iron-clad law that it takes more energy to stop a government program than to start one. This one’s self-perpetuating.”

-David FerrieRegarding The CIA’s MKULTRA Program * Google: John St. Clair Akwei VS The U.S. National Security Agency for more on the NSA’s Signals Intelligence EMF Scanning Network “The average person doesn’t have a concept of the massive capability that is available to the National Security Agency.”- William Weaver (Former NSA Analyst) 

As for controlling the mind through remote means, by way of the unique EMF signature print of the human brain, there have been a number of bogus *skeptics within the “mind control” community (those citizens who have been used as the targets of a modern day version of MKULTRA mind control experimentation), who continue to discredit the claims being made by this author and others, in regard to satellites being used to remotely access the human brain without the implantation of a computerized brain chip.

* It’s not that there aren’t legitimate targets of this technology who are entitled to be skeptical of such information. There are. Although there are far less skeptics within the TI community now than there were a decade ago, given the testimony of government whistleblowers who have promulgated their knowledge of EEG heterodyning – computer to brain interface technology which relies not on the implantation of a computer chip in the brain, but instead, the use of the unique EMF brainwave print of a person, in order to remotely enter their mind.

However, many of these so called “skeptics” are actually federal agents using COINTELPRO programs to discredit us, while posing as targets of government mind control experimentation.

These “agent provocateurs” create Websites with the intent of confusing the targets of this technology. The reader will remember that one of the primary purposes of COINTELPRO is to misdirect an activist group away from their true intentions, by infiltrating the group with federal agents who then pose as members of the group.

From that moment on these activists groups become severely compromised as they serve the interests of the Intel community’s COINTELPRO operations, oftentimes circulating disinformation to newcomers, who then unwittingly promulgate this disinformation as fact to others.

Given the enormous numbers of men and women within the TI community, who have been forced to propagate their own activist campaigns just to survive this Orwellian hell, it’s no wonder that the FBI and DHS would be infiltrating these activists’ groups with their own agents.

The federal government cannot afford to allow these groups to establish significant numbers of members whose common goal is to expose these crimes, so the agents involved in these COINTELPRO operations, instead pose as concerned TIs, whose job is to then furtively create as much subterfuge as possible, in order to prevent these activist groups from ever making any progress.

And they are very capable of doing so. Moreover, since Dr. Robert Duncan wrote “The Matrix Deciphered” in 2010, a number of these disinfo agents have created such Websites in order to discredit Duncan’s work. They have also been doing so with this author since I first published “The Mother Of All Black Ops” in 2006, because I am a legitimate target of COINTELPRO and MKULTRA, and as such, have documented a tremendous amount of information in regard to these crimes, going back more than thirty years.

These agents are attempting to discredit Robert Duncan because having worked on projects for the Pentagon and CIA, he has a certain amount of credibility that your average TI does not have; even if we have been subjected to the same non consensual human experimentation. And Duncan has publicly stated that the human brain can be accessed by way of its own unique EMF physiology, and that as such, there is no longer a need to implant a computerized tracking chip into the brain of a person – in order to remotely access their own mind.

In fact, Dr. Duncan has stated that the traditional microchip implant has become completely outmoded by the government’s use of EEG heterodyning technology.

This also means that the intent by the *Rockefeller Foundation to have the American people implanted with microchips, has to do with something other than tracking us, since the federal government already has a signals intelligence driven domestic spy program in place in which to do so.

A program which is based on the EMF signatures of our own bodies.* The reader will recall the late Aaron Russo (likely murdered by a directed energy weapon) describing his conversations with Nick Rockefeller, in regard to the Rockefeller Foundation’s attempts to have every American citizen implanted with a microchip. So what are these chips going to be used for if not to track us?

In this author’s opinion, their primary use will be for abolishing our “cash society.” This will make the American middle class even more of a slave to the Federal Reserve System than they already are, because we will no longer have access to cash. Moreover, if the Federal Reserve’s Zionist banksters decide to turn your implanted chip off, you will not be able to make purchases.

You won’t be able to pay your mortgage or rent. For that matter, you won’t even be able to purchase the basic necessities of life, such as food. You’ll be forced to starve to death, or to turn to a life of crime in order to survive.

This “cashless” system, will be used to hold you hostage. Furthermore, based on what this author has experienced as a target of MKULTRA since childhood (including being subjected to the FBI’s use of *CGI video morphing technology in regard to the psychological warfare refuse, that these agents attempt to pass off as cable TV programming in our home for the past decade), Dr. Duncan is telling the truth in regard to the U.S. Military Intelligence complexes’ ability to access the unique brainwave print of a person, via signals intelligence satellites and the electromagnetic spectrum, without the use of an implanted brain chip.

The fact that the U.S. Military Intelligence complex has developed and implemented mind control weapons that can be used to instantly access the neural pathways of any American citizen’s brain is horrifying! And so are the COINTELPRO promulgated smear campaigns that this government uses against the targets of this technology, who attempt to expose it to the American people.

These vicious defamation campaigns are used to discredit us, while the U.S. federal government continues to conceal its use of this stealth mind control technology, on a myriad of American citizens, by way of the *NSA’s Signals Intelligence EMF Scanning Network.

* According to NSA whistleblower John St. Clair Akwei, the NSA’s Signals Intelligence EMF Scanning Network is part of the NSA’s signals intelligence driven domestic spy program in America, and can be used to instantly track and identify any American citizen by way of their body’s own unique EMF signatures.

So is it any wonder why the U.S. federal government would go to great lengths to discredit any legitimate target of this Orwellian domestic spy system, or that John St. Clair Akwei’s 1992 civil action against the NSA was derailed by a corrupt CIA asset/ federal circuit court judge named Stanley Sporkin?

In fact, when Dr. Duncan was interviewed on an episode of Jesse Ventura’s Conspiracy Theory program entitled “The Brain Invaders” (which dealt with some of the basics of remote mind control technology), Ventura briefly spoke with Robert Duncan. At the time, Duncan assured Ventura that the men, women and children who are being targeted by these mind control weapons are being tortured. And that at some point in the future, the entire global population will become subjected to these space based and satellite deployed weapons. The reader will also note the U.S. Military Intelligence complexes’ recent use of the government controlled media in the United States, to soften the public’s image in regard to Dr. Brian Farwell’s fMRI brain scanning technology, as a tool for fighting crime.

In reality, the NSA has had a far more advanced version of this technology since the 1960s, and has been deploying on a national scale since the early 1980s, under Reagan Executive Order 12333. EO 12333 not only gave this complex extraordinary new powers to spy domestically, but also allowed the U.S. Military Intelligence complex to privatize many of the treasonous crimes which they had been perpetrating against the American citizenry at the time.

As such, Farwell fMRI “brain fingerprinting” technology is a red herring, which is being used to cover up the NSA’s EEG heterodyning technology, and its eventual use as the de facto standard in judging an American citizen’s innocence or guilt of a crime.

* Has anyone ever bothered to research Dr. Farwell’s background? And in particular who financed his research into fMRI technology?

The reader will likely find that Farwell has connections to the U.S. Military Intelligence complex, and may well serve to function as yet another front man for this complexes’ classified Active Denial Weapons System.Unfortunately, this technology is seriously flawed. And the federal government’s attempt to use it to one day replace our current judiciary system of checks and balances, is also a very obvious sign of the imminent dictatorship which is now being implemented within the United States.

Especially when this government continues to remove the U.S. Judiciary from making key decisions which affect the American people’s freedoms, while instead perverting the use of the *U.S. Supreme Court to further their own world government agenda.

* In the early 1900s the U.S. Federal Supreme Court ruled on more than one occasion that the 16Th Amendment “conferred no new powers of taxation” on the U.S. Congress. Yet, the Congress completely ignored the Supreme Court’s ruling, and used the 16Th Amendment in conjunction with the Federal Reserve Act, to implement the federal income tax as a furtive form of class warfare on the American middle class.

This is yet another illustration of how this corrupted corporate government cites Constitutional Amendments when they are part of Washington’s Anglo-Zionist corporation’s agenda, only to completely ignore the Constitution when its Amendments obstruct their criminal agenda.

In this vein, as an American citizen, have you ever asked yourself why the 13Th Amendment to the U.S. Constitution is suspiciously absent? And why no politician has ever bothered to mention this?

It has to do with the truth behind the Revolutionary War, and that instead of being the victors as we have been told, our founding fathers made a deal with the British Empire, to convince their troops to leave America.

One of the stipulations was that no official of the U.S. federal government could ever assume a title of nobility, such as King, Duke, Lord etc. The second stipulation was that an attorney could not run for elected office within the federal government. Both of these stipulations were included in the 13Th Amendment of our real Constitution of 1787. However, when this Constitution was jettisoned after the U.S. Civil War had ended, and replaced with a new corporate constitution for the corporate government in Washington D.C., the 13 Amendment was deliberately omitted.

As for the U.S. Military Intelligence complexes’ attempt to destroy the U.S. Judicial system, by replacing it with fMRI brain scanning technology which will be used to function as the judge and jury in a criminal case, the “60 Minutes” episode which was aired on 9/29/13, is an example of the U.S. Military Intelligence complexes’ control over, and use of the media in this country to propagandize the utilization of this “mind reading” technology, which in reality, the U.S. federal government really wants to use to destroy the American people’s 5Th and 6Th Amendment rights to due process of law.

In this MKULTRA target’s opinion, the federal government is doing this in order to eventually grandfather in the use of satellite based EEG heterodyning computer to brain interface technology, to use as the de facto standard of proving your innocence or guilt in a crime.

This will mean that the government can use an Intel agency like the NSA and its Signals Intelligence EMF Scanning Network, to *EEG heterodyne the neural pathways of a particular U.S. citizen’s brain, by identifying and tracking their unique EMF brain wave print. And then going on a protracted fishing expedition of the person’s mind for years on end, as though these agents were rifling through a file cabinet! Is this what our founding fathers fought so hard for? * As a target of MKULTRA, this author has been subjected to this type of Orwellian satellite predation and non consensual human experimentation for several decades, while my 4Th, 5TH and 6Th Amendment rights have been completely abrogated, by these Nazi minded reprobates. And the same crimes can be perpetrated against any American citizen in the modern day, through this corrupted government’s use of such satellite predation.

Another interesting fact is that after “The Brain Invaders” episode of the Conspiracy Theory program was produced for Time Warner Communications, one of the people (Dr. Fred Bell) who had flown out to visit Jesse Ventura to be interviewed for “The Brain Invaders” episode, was found dead of a heart attack in his hotel room two days later. This heart attack was in all probability caused by a satellite based directed energy microwave weapon, since this is the weapon of choice for government agents, who need to murder a person with the requisite plausible deniability used to commit such crimes, with total anonymity and impunity from prosecution.

Ventura would also soon be told by Time Warner, that his services were no longer required. More specifically, Time Warner refused to renew Jesse Ventura’s contract for another season of “Conspiracy Theory,” even though the show had a large viewership, and was known for its solid ratings. Ventura has since been the target of a government orchestrated smear campaign, because he had the foresight to use the mainstream media to expose these satellite based mind control weapons.

Moreover, even though “The Brain Invaders” episode only superficially covered the subject of the U.S. Military Intelligence complexes’ mind control weapons’ technology, it caused this complex enough concern to use their control over the broadcast industry, to get Conspiracy Theory cancelled.

Does it sound like Time Warner acquiesced to the U.S. Military Intelligence complexes’ intimidation tactics here?It certainly does. Since when does a cable TV broadcaster voluntarily cancel a program which is a consistent winner in viewer ratings?

Moreover, many Time Warner subscribers have since reported that their DVR recording machines were remotely programmed to erase certain episodes of Conspiracy Theory, from their hard drives; including “The Brain Invaders” episode.This serves as further evidence of this complexes’ attempts to prevent the American people from ever learning about this signals intelligence driven domestic spy program, as well as the clandestine control that the U.S. Military Intelligence complex maintains over the media system in the United States.

The Outlandishness Of Mind Control Technology

Over the past decade, the Internet has grown substantially in regard to the numbers of individuals targeted by these high tech weapons, with new Websites appearing weekly. This, in spite of the fact that the existence of such Orwellian weapons sounds completely outlandish at first.

That is, until you begin to listen to the testimony of the thousands of men, women and children who are targeted by these covertly deployed “weapons of mind destruction” on a daily basis, and tortured for years on end.

There are now tens of thousands of Websites on mind control weapons, as well as the accompanying psychological warfare harassment; including the vigilante hate crime – organized stalking.

In an effort to discredit the victims of these Orwellian and Nazi idealized eugenic’s programs, “disinformation-Websites” created by government agent provocateurs, often cite earlier mind control research such as that of the late CIA asset *Jose Delgado, in an effort to prove that a person must be implanted with a computer brain chip, in order to be subjected to remote mind control experimentation.

The device they often refer to was created by Delgado more than forty years ago. It was called the stimoceiver, and it brought Delgado international fame, when with the press of a button, Delgado used the stimoceiver to stop a bull that was charging him, dead in its tracks. In reality, there was no mind control involved in this experiment. Instead, there was an electrode planted in the bull’s brain, which was used to electronically shock him into stopping.

So as previously stated, it was not actually a form of remote mind control that forced the bull to stop charging. It was instead, intense physical pain that did so. However, this public display would become the genesis for future government financed mind control research programs in the United States, regarding global mind control enslavement – via space based weapons, signals intelligence satellites, cell phone towers, and phased array radar systems like HAARP.

* Like many other Nazi-minded scientists who were employed by the CIA, such as Drs. Sidney Gottlieb and Ewen Cameron, Jose Delgado would turn out to be a monster, whom like his CIA employers, was intent on destroying the free thought of humans, by implanting them with computer brainchips which would be used to remotely take control of their minds.

Delgado’s preliminary research was financed by the U.S. Central Intelligence Agency. Some of the men and women who remain targets of such mind control experimentation, continue to believe that the electricity given off by the human brain is so minute, that it would be impossible for a satellite interfaced with advanced artificial intelligence computers, to target a person’s own brain from outer space – in order to remotely manipulate their thoughts.

And there are in fact a number of people within this community of subjects of non consensual human experimentation (who refer to ourselves as Targeted Individuals or TI’s for short) who are actually implanted with computer brainchips, as well as other forms of microchip implants, who unwittingly serve to discredit those TIs who are not implanted with any type of microchip, but are instead remotely tracked by the unique EMF signatures of our own bodies. Moreover, as further proof that a signals intelligence satellite can be used to track you by way of your body’s own unique EMF signatures, there are devices which are capable of homing in on the slightest of electromagnetic fields given off by the human body; including those which emanate from our brain.

These high tech contraptions, which are known as super conducting quantum interference devices (SQUIDS for short), can be built into NSA signals intelligence satellites, and used to detect and track the electromagnetic fields which surround each of our bodies; including the EMF emissions which emanate from our own brains.

An EMF brainwave print, which like the other EMF signatures that emanate from our bodies, also serves as a form of electromagnetic DNA, which can be used to distinguish one person from another.

If this sounds like a covert government program which is being used to enslave the American people, that’s because this is exactly what it is. And this technology is being used on the citizenry of every country on the face of this planet; most of whom have absolutely no knowledge of his.

Moreover, SQUID devices make it possible for agencies like the NSA (National Security Agency) to remotely track any person via signals intelligence satellite 24 hours a day, while using *EEG heterodyning technology to synchronize these satellites with the unique EMF brainwave print of each American citizen.

This enables the NSA to establish two-way communication with the brain of any American citizen; something which **John St. Clair Akwei has already corroborated in his 1992 civil action against the U.S. National Security Agency. *Google: “The Matrix Deciphered” by Dr. Robert Duncan to learn more about the CIA, NSA, and Pentagon’s use of EEG heterodyning technology on the American citizenry.

**Google: John St. Clair Akwei VS The U.S. National Security Agency to learn more about the NSA’s illegal domestic spy operations and its Signals Intelligence EMF Scanning Network

This remote neural monitoring of the neural pathways in a person’s brain, allows NSA operatives to remotely decode the EEG waves which emanate from that person’s brain, which can then be translated into words.

This remote thought reading through such technological means is known as synthetic telepathy – an artificial way of being able to read and even manipulate someone’s thoughts. The following is a direct quote from the literature offered by a company known as Silent Sounds Inc.

“It is now possible, using supercomputers, to analyze human emotional EEG patterns and replicate them, then store these ’emotional signature clusters’ on another computer and, at will, ‘silently induce and change the emotional state in a human being.'”

The following is an excerpt from a letter written by the President of Silent Sounds dated December 13.

“All schematics, however, have been classified by the U.S. Government and we are not allowed to reveal the exact details.. We make tapes and CD’s for the German Government, even the former Soviet Union countries! All with the permission of the US State Department, of course. The system was used through Operation Desert Storm (Iraq) quite successfully.”

So it’s clear that this technology has even made its way into the consumer market place, albeit, on a much less sophisticated scale than the mind control warfare technology that the FBI and NSA have been secretly deploying against this author, and myriad other targets of such non consensual human experimentation for decades, in what must be described as a modern day version of the CIA’s earlier MKULTRA program.

Except that instead of experimenting on people within the confines of a laboratory type of environment as the CIA did in the 1950s, this contemporary MKULTRA program is being deployed via signals intelligence satellite networks and the electromagnetic spectrum, in order to turn our communities into laboratories, which are then used for this Orwellian mind control experimentation.

As the readers of this Website are well aware, I use it as a venue in which to document classified technologies that you will never find being mentioned within the mainstream media, simply because of the negative impact that it would have on the U.S. federal government; a government which would be seen as a traitor to its own people for creating and deploying these covert “mind control” weapons on its own unwitting citizens.

However, these weapons most certainly do exist. And one of their primary purposes is to remotely access our minds without our ever being made aware of it. For this reason alone, it’s of extreme importance that you educate yourselves in regard to this Orwellian and arcane mind invasive technology.

This author supplies the best materials that I can locate in efforts to educate others regarding the use of covert satellite based mind control weaponry; weapons which the global military-industrial-intelligence complex is using against the citizenry of this planet, as part of Rothschild Zionism’s intent to create a global Communist dictatorship.

Such mind control technology is a topic that you’ll never hear about on Alex Jones’ podcasts, despite much of his accurate information in regard to the Illuminati and its New World Order world government dictatorship, since Jones is part of Rothschild Zionism’s controlled opposition.

Like any successful person who is used as part of the controlled opposition, Jones’ purpose is to furnish his listeners with this litany of misery, in order to destroy their will to fight back, when the real objective is to motivate the citizenry to use their intellect to fight back in a legal manner; which can then be used to reinstate our Constitutional Republic. This, while driving these demonic interlopers, who have made wars for profit, the counterfeiting and laundering of their own counterfeited currency, and their furtive destruction of the American middle class, the de facto status quo in the United States.

Moreover, Alex Jones must by now have taken notice of how Jesse Ventura has become the target of a government driven smear campaign, since producing “The Brain Invaders” episode of Conspiracy Theory, which would certainly discourage Jones’ foray into this particular conspiracy. Classified mind control weapons’ technology which is being used to destroy the American people’s inherent rights to both physical privacy as well as the privacy of thought.

The above Website is maintained by Dr. Nick Begich, a pioneering researcher in the field of synthetic mind control. There are several excellent articles on the subject here, so you’ll need to scroll down until you access Richard Alan Miller’s article.

It is an excellent article, and one which will enlighten the reader regarding some of the mind control weapons that the U.S. Federal Government is deploying against many of its own citizens in the present day.

Please share this article with those whom you care about, since in the modern day, all Americans are electromagnetically brain fingerprinted by the U.S. Military Intelligence complex, as part of a signals intelligence driven domestic spy program and you can wager if they are all governments do it. As such, anyone of you can be subjected to the EEG heterodyning of your brain’s own unique EMF signatures, while your mind is remotely interfaced with an NSA or CIA Artificial Intelligence computer, without ever realising it. Satanism continues to propagate on this planet under Rothschild Zionism. And the House of Rothschilds’ New World Order is not a myth. It is a reality which is now upon us.

— James F. Marino

Credits to: James F. Marino

SOURCE:

https://ediovision.blogspot.com/2018/07/eeg-heterodyning-or-eeg-cloning.html

#HeteroDyning #EEG #AI #neuraldust #BrainHacking #EMF #BrainWaves #MindControl #TargetedIndividual #MKultra #TargetedIndividuals #BrainChip #nanotechnology #ScanningNetwork #EEGheterodyne

THE REAL TRUTH BEHIND THE LGBTIQ+ PROPAGANDA WORLDWIDE…..

LGBTQ+ community supports pedophilia, renamed “pedosexual”, and are advocating for the addition of the letter “P” in the LGBTQ+ acronym to show representation for that group.

IJC – ADVOCATES FOR “JUSTICE” AND “HUMAN RIGHTS“..

IJC – Advocates for “Justice” and “Human Rights”..

Lesotho: activists call for increased sensitization of key stakeholders on human rights of LGBTIQ+ people…

21/04/2023

On 17 and 18 April 2023, the International Commission of Jurists (ICJ) and the People’s Matrix Association held a workshop with the Lesotho judiciary where a range of human rights issues related to sexual orientation, gender identity, gender expression and sex characteristics (SOGIESC) were discussed. The workshop took place in Maseru, the country’s capital, and was aimed at facilitating exchanges among participants, including judges and magistrates, with a view to enhancing everyone’s understanding of the human rights of LGBTIQ+ persons in Lesotho and the challenges they face in accessing justice and effective remedies for violations of their human rights.  It was a follow-up to the initial half-day judicial engagement workshop co-hosted by ICJ and OutRight International at the request of Lesotho’s judiciary in October 2022.

In his opening and concluding remarks, the country’s Acting Chief Justice, Tšeliso Monapathi, underscored that, in his opinion, there was a significant need for judges, magistrates and Lesotho’s society as a whole to be sensitized on the human rights of LGBTIQ+ persons. Indeed, at the October 2022 judicial engagement workshop, participating members of the judiciary had expressed an interest in deepening their knowledge about the personal experiences of LGBTIQ+ persons in Lesotho in accessing justice through the courts.

“It is encouraging to see that the Lesotho judiciary continues to take SOGIE issues seriously, and that they are willing to learn more about the challenges preventing the LGBTIQ+ community in Lesotho from exercising their human rights,” Ratalane said.

“This is a positive step towards improving access to justice for LGBTIQ+ persons. Members of the People’s Matrix and those who we engage from the LGBTIQ+ community continue to be subjected to varying forms of discrimination and violence on the basis of their real or perceived sexual orientation or gender identity. Many report struggling to access courts and significant challenges with a range of justice actors including police officers, prosecutors, correctional services personnel and healthcare workers.” she added.

In Lesotho, discrimination against LGBTIQ+ persons manifests in various forms including: violence and abuse against the LGBTIQ+ individuals, such as killings, forced initiations to purportedly “convert” a person from their real or imputed same-sex sexual orientation to a heterosexual one or “restore” transgender persons to a cisgender identity; rape and other forms of sexual assault, intimidation and harassment; bullying; denial of access to healthcare services, such as gender affirming care; and other forms of social exclusion, such as rejection of LGBTIQ+ children by family members. While there has been some legislative progress in protecting the human rights of LGBTIQ+ persons, including the decriminalization of consensual same-sex sexual conduct in 2010, human rights violations and abuses against LGBTIQ+ individuals continue to be reported.

Judges and magistrates present at the workshop discussed ways in which the judiciary could ensure equal access to justice for LGBTIQ+ people. For instance, as Ratalane noted during her presentation at the event, this may entail being sensitive to the needs of LGBTIQ+ persons appearing before them so as to better enable them to participate in court proceedings more effectively. The workshop discussed how judges could also continue to make progress by interpreting existing laws in Lesotho in a manner consistent with the country’s international human rights law obligations.

ICJ Africa’s Legal and Communications Associate Officer, Mulesa Lumina, emphasized the importance of making available to judicial officers tools, information and resources that would enable them to adjudicate matters involving the human rights of LGBTIQ+ individuals in Lesotho in ways that strive to ensure  compliance with the country’s international human rights law obligations:

“Lesotho is a State Party to a number of international human rights instruments, including the International Covenant on Civil and Political Rights and the African Charter on Human and Peoples’ Rights, and, as such, is obliged to prevent abuse, attacks and discrimination against LGBTIQ+ persons by third parties. It is also bound to proactively address barriers to the enjoyment of human rights,” she said.

“The ICJ remains committed to working with a wide range of stakeholders promoting the human rights of LGBTIQ+ people in Lesotho, including their rights to equality and freedom from violence and discrimination, and to ensuring the country’s compliance with its international law obligations. Judges have a vital role to play in ensuring that the human rights of everyone, regardless of their real or imputed SOGIESC be upheld,” she added.

Contact

Mulesa Lumina, Legal and Communications Associate Officer (Africa Regional Programme), e: mulesa.lumina@icj.org

Kaajal Ramjathan-Keogh, Director (Africa Regional Programme), e: kaajal.keogh@icj.org

Background

High court judges and magistrates convened for the workshop facilitated by ICJ and the People’s Matrix to discuss a range of human rights issues related to sexual orientation, gender identity and gender expression. In particular, facilitators unpacked the obstacles to the realization of the human rights of LGBTIQ+ persons in Lesotho, including their rights to freedom from discrimination, torture or other cruel, inhuman or degrading treatment or punishment.

In terms of its international human rights obligations, Lesotho must ensure that LGBTIQ+ persons are protected from discrimination and violence and that their dignity and right to equality be upheld. Lesotho is a State Party to a number of international human rights instruments, including the International Covenant on Civil and Political Rights(ICCPR), the African Charter on Human and Peoples’ Rights (the African Charter) and the Protocol to the African Charter on Human and Peoples’ Rights on the Rights of Women in Africa.

The Yogyakarta Principles and the Yogyakarta Principles Plus 10 are an authoritative affirmation that the rights of LGBTIQ+ persons are human rights and a guide on the obligations of States as regards the application of international human rights law and standards in relation to sexual orientation, gender identity, gender expression and sex characteristics. In addition, the landmark Resolution 275of the African Commission on Human and Peoples’ Rights on Protection against Violence and other Human Rights violations against Persons on the basis of their real or imputed sexual orientation or gender identity reiterates that the Africa Charter protects the human rights of all persons, including LGBTIQ+ persons, to non-discrimination, equality, life, dignity and freedom from torture. The resolution also calls on all States to put in place measures that will put a stop to violence and discrimination against LGBTIQ+ persons. Most recently, the African Commission on Human and Peoples’ Rights also released Resolution 552 on the Promotion and Protection of the Rights of Intersex Persons in Africa, the first resolution from Africa on the human rights of intersex persons, calling on States to promote and protect the human rights of intersex persons on the African continent.

ALL THE US ARMYS SECRET BASES MAPPED ON GOOGLE MAPS

Article: ALL THE US ARMYS SECRET BASES MAPPED ON GOOGLE MAPS

Blank Spots on the map: Almost all the U.S. Army’s secret military bases across the globe revealed on Google and Bing

By DAILY MAIL REPORTER

PUBLISHED: 15:34 GMT, 15 December 2013 | UPDATED: 16:18 GMT, 15 December 2013

The U.S. military can be a sensitive lot when it comes to the location of their military facilities.

With military bases on every continent, in every corner of the world, for the kinds of tasks they perform, it’s no wonder that many of the locations are blacked out and hidden from public view.

The Pentagon says there are around 5,000 bases in total with around 600 overseas.

Josh Begley, a data artist, decided to set himself the task of mapping all known U.S. military bases around the world, and collect satellite pictures of them using Google and Bing Maps.

The project was inspired by Trevor Paglen’s book ‘Blank Spots on the Map’ which goes inside the world of secret military bases that are sometimes censored on maps.

Begley has found the coordinates for 650 bases, and published pictures for 644 of them. The pictures can be viewed at http://empire.is/.


● SOUTH KOREA: Garrison Yongsan is home to the headquarters for the U.S. military presence in South Korea. The garrison previously served as headquarters for the Imperial Japanese Army from 1910 to 1945


● LOUISIANA: Camp Minden is the site of the former Louisiana Army Ammunition Plant, once the major area employer. In 1941, the Federal Government acquired 15,868 acres of farms, farmland and private lands for its construction


● HOLLAND: It was believed that since the early 1960s, USAF nuclear weapons were stored at Volkel Air Base, to be used by the host nation’s aircraft. This could be why the area is blocked out and hidden from public view


● WESTERN AUSTRALIA: Naval Communication Station Holt – This is the most powerful transmission station in the Southern Hemisphere. ‘Never heard of the site before, but it’s strangely beautiful from above,’ Begley said


● KENYA: Camp Simba – Jeremy Scahill exposes this base in his award-winning book “Dirty Wars,” where he describes it as a “launching pad” for the Joint Special Operations Command, the secretive elite military organization that comprises the Navy SEALs


● DJIBOUTI: In 2012, the Economist described this base in Djibouti as ‘the most important base for drone operations outside the war zone of Afghanistan.’ It was recently forced to relocate its fleet of drones after worries they could collide into planes


● YUCCA DRY LAKE: This site is part of the Tonopah Test Range, where Lockheed Martin reportedly tests ‘experimental unmanned aerial vehicles’ on a secluded airstrip east of the lake, according to Trevor Paglen’s book, Blank Spots on the Map


● ABU GHRAIB PRISON: The infamous Iraqi prison where Saddam Hussein held political prisoners, and where U.S. soldiers were later caught torturing inmates. ‘When I think of Abu Ghraib I think of photographs and headlines; scandal,’ Begley explained


● NEVADA: Hawthorne Army Depot is a U.S. Army ammunition storage depot located near the town of Hawthorne in western Nevada in the United States. It stores reserve ammunitions to be used after the first 30 days of a major conflict


● BUCHOLZ ARMY AIRFIELD: The airfield is located on Kwajalein Island, Marshall Islands. Its position is ideal for refueling during trans-Pacific flights, and the airport is available to civilians through Air Marshall Islands and United Airlines


● GERMANY: Büchel Air Base is a military air base in Germany. Since 1985 the Panavia Tornado is operated from the base, which is capable of delivering B61 nuclear weapons which are stored and maintained by the USAF


● ARIZONA: Fort Huachuca is 15 miles (24 km) north of the border with Mexico. Beginning in 1913, for 20 years the fort was the base for the ‘Buffalo Soldiers’, the 10th Cavalry Regiment


NEBRASKA: Greenlief Training Site – Current footprint of the Nebraska National Guard Training Site. Formerly home to the largest naval munitions plant from 1942-1946


● MINNESOTA: Camp Ripley has a winter warfare training course and is the primary facility used by the National Guard for winter combat exercises. Camp Ripley also hosts the training academy for the Minnesota State Patrol


● MISSISSIPPI: Naval Air Station Meridian or NAS Meridian is a military airport and is one of the Navy’s two jet strike pilot training facilities. It opened in 1961


● NORTH CAROLINA: Marine Corps Air Station Cherry Point is located in Havelock, North Carolina, USA, in the eastern part of the state. It was built in 1941, and was commissioned in 1942 and is currently home to the 2nd Marine Aircraft Wing


● MASSACHUSETTS: Otis Air National Guard Base is an Air National Guard installation located within the Massachusetts Military Reservation, a military training facility, located on the western portion of Cape Cod


● NEW YORK: The Military Academy at West Point is a four-year coeducational federal service academy. It sits on scenic high ground overlooking the Hudson River, 50 miles north of New York City


LINK TO THE ORIGINAL ARTICLE BELOW:

https://www.dailymail.co.uk/news/article-2524082/All-US-Armys-secret-bases-mapped-Google-maps.html

.

LEVELS OF ‘MK ULTRA MINDCONTROL PROGRAMMING

LEVELS OF ‘MK ULTRA MINDCONTROL PROGRAMMING:


AddText_05-22-10.53.32.PNG

A = ALPHA-PROGRAMMING

B = BETA-PROGRAMMING

Γ = GAMMA-PROGRAMMING

Δ = DELTA-PROGRAMMING

Θ = THETA-PROGRAMMING

Ω = OMEGA-PROGRAMMING


img(7)

Disney+Groom.png

__________________________

LEVELS OF MK ULTRA’S—MONARCH PROGRAMMING (TRAUMA BASED MIND CONTROL)
__________________________

coollogo_com-21124878

A — ALPHA-PROGRAMMING = Regarded as “general” or regular programming within the base mind control programming. Personality; characterized by extremely pronounced memory retention, along with substantially increased physical strength and visual acuity. Alpha programming is accomplished through deliberately subdividing the victims personality which, in essence, causes a left brain-right brain division, allowing for a programmed union of L and R through neuron pathway stimulation.


coollogo_com-16387856

B — BETA-PROGRAMMING = Referred to as “sexual” programming. This programming eliminates all learned moral convictions and stimulates the primitive sexual instinct, devoid of inhibitions. “Cat” alters may come out at this level.

img(115)


coollogo_com-28435471

Δ — DELTA-PROGRAMMING = This is known as “killer” programming, originally developed for training special agents or elite soldiers (i.e. Delta Force, First Earth Battalion, Mossad, etc.) in covert operations. Optimal adrenal output and controlled aggression is evident. Subjects are devoid of fear; very systematic in carrying out their assignment. Self-destruct or suicide instructions are layered in at this level.


coollogo_com-2629725

Θ — THETA-PROGRAMMING = Considered to the “psychic” programming. Bloodlines (those coming from multi-generational Satanic families) were determined to exhibit a greater propensity for having telepathic abilities than did non-bloodlines. Due to its evident limitations, however, various forms of electronic mind control systems were developed and introduced, namely, bio-medical human telemetry devices (brain implants), directed-energy lasers using microwaves and/or electromagnetics. It is reported these are used in conjunction with highly-advanced computers and sophisticated satellite tracking systems.


coollogo_com-21781108

Ω — OMEGA-PROGRAMMING = A “self-destruct” type of programming, also known as “Code Green”. The corresponding behaviors include suicidal tendencies and/or self-mutilation. This program is generally activated when the victim/survivor begins therapy or interrogation and too much memory is being recovered.


coollogo_com-20282457

Γ — GAMMA-PROGRAMMING = Another form of system protection is through “deception” programming, which elicits misinformation and misdirection. This level is intertwined with demonology and tends to regenerate itself at a later time if inappropriately deactivated.

__________________________

tumblr_o84cjxHB7b1ti036zo1_400

AddText_11-20-06.06.02

2018-11-15-10-11-42
AddText_11-20-06.09.01
HERE ARE SOME INTERESTING FACTS THAT YOU MAY NOT KNOW ABOUT CIA’S MINDCONTROL PROJECTS & TECHNIQUES:


37e39e4021027ef99dfbec8eb0507543

1. CIA has perfect ‘truth serum’ that can question anyone at anytime within couple hour period. This substance is cheap , therefore it can be used with ease anywhere. Questioning happens during the night and people do not remember anything when they wake up aside from being tired and having a headache (if they were interrogated long enough, that is).


2. This ‘brainwashing’ is NOT solely confined to CIA, army intelligence, government, but also OTHER world governments like China, Russia, UK, France, Germany, Italy and etc. .. and even small Europe countries that may have population of 5mill ppl do and know about it. Also individual companies from Fortune 100 that may or may not relate to US military and DoD are there as well. Give regards to Lockheed Martin company.

AddText_11-01-01.35.52.PNG

img(19).jpg
img(25).jpg
IMG_20180713_194215_929.jpg
MK ULTRA MINDCONTROL
MINDCONTROL- (3)
MINDCONTROL- (1)
MINDCONTROL- (2)
image001100
coollogo_com-28975518
cia-mind-control-696x366
57e7a97546e26b2f910f02007816dfda1451314227.jpg
disney_0031784945929.png


3. Part of the project that is going on now is actually investigation of genius minds. With that they want to see what they do to do such things on superhuman level. They install chips and chemicals into the body and when they feel like a person is performing some cognitive task, release chemicals into the bloodstream that travels to brain and gives a burning feeling inside specific areas of brain. Naturally, this is done w/out ppl consent and generates strong pains. This is done along with some research facilities.

brainwash


4. Another part of the project is ‘forced thinking at night’. They take a human being and can try to force to think at night. Naturally, inducing migraines when a person wakes up. A person can not move after such things since blood pressure is off the roof and any move made by person is met with massive headaches. Right now they are working with heart implants right now to increase/decrease pumping blood accordingly.


5. Yes, they can control a person at night doing any kind of activities from slave sex to murdering and in the morning a person would not remember anything aside from feeling bodily effects.


6. And yes, they can wire you in a way such that u can ‘receive’ the images of other person directly to your brain, you can have telepathic communications with other machines/individuals, they can ‘watch’ though your eyes and they can see what you are thinking aside from the fact that they can manipulate your thinking and personalities (if they make splits).


_

Tags:_
#EXPOSING #MKUltra #brainwash #trauma #CIA #MKUltraMindControl #HumanTrafficking #MkUltraMindcontrol #MindControl #brainwash #SaveTheChildren #illuminati #nwo #NewWorldOrder #ChildSexTrafficking #slaves #ChildAbuse #torture #evil #SaveTheChildren #MkUltra #programming #brainwaves #BrainWaves #HypnoTheraphy
#AlphaProgramming #BetaProgramming #TethaProgramming #DeltaProgramming #OmegaProgramming #programming #slavery #DeleteTheElite #MonarchProgramming #TraumaBasedMindControl
#EXPOSED

NATIONAL SECURITY AGENCY (NSA) Part 1-2-3 by Steven J. Smith

NATIONAL SECURITY AGENCY (NSA) Part 1-2-3

by Steven J. Smith


WARNING! This essay is NOT intended for underage readers. Portions of this document contain graphic descriptions of violence/torture, and include other subject material inappropriate for those who possess a weak constitution and/or squeamish disposition.


nsa_national_spying_agency_square_sticker-r253bfd2904bf446580fd12eb8977e49b_0ugmc_8byvr_400

NATIONAL SECURITY AGENCY (NSA) Part 1—CITADEL OF EVIL

________________________________________________________________________
1.0

INTRODUCTION:

The NSA (national security agency) was created in 1952, is headquartered at Fort Meade Maryland, and administered by the United States Department of Defense (DoD). Government generated disinformation portrays the NSA as strictly involved in the collection and analysis of foreign communications. In other words, electronic surveillance of foreign countries. Although specifically bared from domestic surveillance of American citizens by the Foreign Intelligence Surveillance Act (FISA) of 1978, the NSA has recently admitted to limited spying on American citizens. If this were the limit of NSA transgressions, the essay you’re about to read would not be necessary. Sadly, the NSA is engaged in illegal activities that make electronic eavesdropping on American citizens seem almost trivial by comparison.

Over the years, there have been a number of newspaper articles and other media reports, claiming American intelligence agencies have tried to use individuals with psychic abilities to spy on other nations. The most widely publicized being project Stargate. In every instance, the intelligence agencies have claimed these efforts were a failure and terminated the project.

But consider for a moment…

How often does the CIA, NSA, or DIA openly admit to failure? Especially in connection to some new espionage technique. What better way to deflect public scrutiny away form some topic (or secret project), than to announce that after spending millions of dollars, no useful results were obtained. The American government has a long history of using such misdirection ploys to hide its covert activities. In point of fact, the American government has a very successful psychic espionage/warfare program. It was initiated shortly after WWII, has been operational since the early 1950s, and is administered by the NSA. The primary motivation for keeping this program so highly classified (secret), concerns the appalling nature of how these psychics are created, trained, and deployed.

The NSA is involved in some of the most heinous crimes and vicious acts of barbarism ever perpetrated on humanity. Even the monstrous autocracies committed by WWII Nazi war criminals pale in comparison to the crimes of the NSA. This document concerns it self with nothing less than the wholesale medical experimentation, torture and outright murder of American children, some less than six years old. The rationale behind these despicable acts? To create a secret slave army of government controlled super psychics, which at present, number in the tens of thousands. The solders (both men and women) of this vast psychic army live and die at the whims of DNI (director of national intelligence) and NCA (national command authority). It’s Ironic that the Nazi biologists and doctors involved in human experimentation, relocated to America in the aftermath of WWII (under Operation Paperclip), were the precursors responsible for this foul excursion into the darkest corners of evil and depravity.

________________________________________________________________________
1.1

NATIONAL SECURITY:

Why is the NSA engaged in such loathsome behavior? Is the NSA protecting you and your loved ones from terrorists? In a word, No… Is the NSA defending truth, justice, and the American way? Sorry, wrong again.

In order to understand why, you must first understand what the term “national security” really means. Many assume it means protecting the people and property belonging to the citizens of our beloved country. Alas, nothing could be farther from the truth. In legal terms, the word “national” (derived from the root word “nation”), and the word “country” are NOT interchangeable. A country is a geographical area having well defined boundaries. A nation is a political entity asserting ultimate authority over that geographical area. So when a government official uses the term “national security”, what he/she really means is the security of the entity that asserts authority over the geographic area we know as the USA.
In other words, the term “national security” means the security of the government, not the security of the people. And the National Security Agency (NSA) is that part of the government tasked with keeping the government safe and secure.

But safe and secure from who?

Obviously, the people living within the geographical boundaries over which the government asserts its ultimate authority.
In other words, you & me…

The rest of this essay outlines in graphic detail how the NSA accomplishes its government mandated mission.

________________________________________________________________________
1.1.1

PSYCHIC ABILITIES:

From Cassandra of Troy, and the Pythia (prophet) of Delphi in ancient times, to the writings of Nostradamus and the more contemporary works of Edger Cayce. Psychics and their abilities form a common thread, starting at the very foundations of history, and continuing to the present. Furthermore, psychic individuals are found in all cultural groups. From Africa to Scandinavia, from China to the American Indians. It seems no group or culture is without examples of people who manifest psychic abilities. Yet despite all of the historical evidence, and obvious impact on the events surrounding their lives, psychics and their abilities remain at best an elusive mirage, possessing an almost chimerical quality.

Clearly, from the perspective of evolution, psychic ability would seem to be a very pro-survival trait. For example, knowing there’s a man eating tiger waiting in ambush, when traversing grass lands of the Serengeti, or knowing where to find buffalo on the vast American plains, will definitely improve an individuals chance for survival. So why are there so few examples of truly gifted psychics? The answer involves the love/hate relationship implicit in psychic abilities. Would you really want to work with someone who knew your innermost secrets? Do you want a neighbor who could see exactly what you’re doing in your bedroom, or in your bathroom, or even in your dreams? How would you feel about somebody who could influence what you’re thinking without saying a word, or even being in the same room with you. Would you feel safe around that individual?

But it gets worse.

What chance do you have for job promotion, when your psychic co-worker can covertly influence the boss, or see into the future and knows just what moves the company should make to thrive and prosper? And what if that psychic individual could manifest some of the more exotic abilities? Abilities such as telekinesis (moving objects with the mind), pyrokinesis (ability to manipulate fire), or even manifesting a double (bilocation) of him/her self (or worse, your wife/husband).
If you’re anything near normal, then about now the hairs on the back of your neck are starting to tingle. You’re also beginning to wonder if its such a good idea to let that person live, let alone roam free your neighborhood. In religious terms, everybody wants Jesus to manifest miracles and save them from evil, but if the gentleman from Nazareth were to show up tomorrow, odds are real good he’d be nailed to another cross (or shot in the head, etc.) within a few weeks. Looked at another way, a certain amount of psychic ability (such as normal intuition) is accepted by society. But anyone displaying exceptional abilities will be quickly ostracized, if not outright murdered. An in-depth review of the historical record shows that many of those who possessed exceptional psychic abilities, met with an untimely and/or unnatural death.

Perhaps you begin to appreciate the dilemma American government officials faced, when shortly after WWII it became apparent, that by employing modern medical techniques it was now possible to routinely create individuals with prodigious psychic powers and abilities. Obviously these individuals would be useful. But how would the government control them?

________________________________________________________________________
1.1.2

A PRISON FOR THE MIND:

How do you control a person who is able to walk through solid walls, or kill with a single glance? A person who can see the future, and knows what you’re about to say or do.
A person who can make you eat broken glass and enjoy the experience, or make you point a gun at your own head and pull the trigger. A person who can influence the weather, start fires by mere thought (pyrokinesis), or blackout an entire city by touching an ordinary power pole (electrokinesis).
There can be little doubt that from a political, military or espionage perspective, such a person is both incredibly valuable AND unbelievably dangerous. Can you imagine an American general, his mouth watering at the prospect of commanding an army of psychic killers, AND his knees shaking when he considers what would happen if that army ever rebelled? Or a high ranking intelligence official, a gleam in his eye as he contemplates knowing his enemies deepest secrets, AND his palms sweating when he considers that a telepathic spy can send thoughts, just as easily as he or she receives them.

To what lengths would a military general or government official go, in order to guarantee absolute control over a psychic solder, assassin, or spy? And more importantly, how will that absolute control be achieved?

The answer is both very simple and chillingly gruesome.

You turn the mind of the psychic into a prison, and you make him/her both the prison guard, and the prisoner. The first step is accomplished through the use of extreme physical and psychological torture. This causes massive dissociation, thereby splitting the mind into multiple personas (personalities). Psychoactive drugs are also administered during this step to heighten mental impact of the pain, thereby accelerating the process of mental splitting. Next you train different personas to perform different tasks. Then, you use ECT electro-convulsive-therapy (also known as electroshock treatment) to “lock in” the personas, and destroy any trace of recollection in the dominate personality of the now split off personas. Finally, you do all of this to the psychic while he or she is still a child (under the age of 10). At this point, you have created the perfect psychic warrior. Capable of committing any act, no matter how vile or self destructive, all under the absolute control of his or her handlers. However, the physical injury, emotional scars, mental confusion, and spiritual rape inflicted upon the hapless psychic child by this inhuman brutality, will last a lifetime…

If you feel revulsion at what I’ve just described, you’re far from alone.

The next question that must be answered is where do you find individuals with the prerequisite expertise to perform such a detailed and thorough job of shattering, and rebuilding a human mind? The obvious answer is the government intelligence agencies. These organizations employ some of the best psychiatrists, psychologists and behavioral scientists to be found anywhere in the world. They’re also consummate experts at interrogation and psychological warfare techniques. Precisely the skill set required for building a psychic version of the Manchurian candidate. But of course, mercilessly torturing innocent children goes well beyond the constitutional boundaries of acceptable government behavior, not to mention violating local, state, federal, and international law. The solution? Use a secret presidential executive order (memorandum) to create a new intelligence agency that operates outside statutory law, congressional oversight, or constitutional limits. In this way, the NSA was created by president Harry S. Truman in June of 1952, and for the first few years of its existence, remained so secret that even its name was classified. A very odd beginning for an agency supposedly tasked with the mundane job of intercepting foreign communications, but the perfect disguise for a collection of amoral medical professionals and sadistic military thugs intent on turning innocent children into psychic robots to serve the malevolent interests of a government run amok
(Click Here to view Wikipedia article on Dissociate Identity Disorder (aka multiple personality disorder) (opens in a new browser window).
For those who wish a more detailed description of the process used in creating psychic slaves, see: National Security Agency – Part 2, A prison for the mind.

________________________________________________________________________
1.1.3

THE RISE OF PSYCHOTRONICS:

Definition – Psychotronics: The study of the interaction between matter, energy and the mind, especially the supposed relationship in Para-psychological effects.

Even with the brainwashing techniques described above (1.1.2), deploying and controlling thousands of psychic slaves is still a rather daunting task. The problem breaks down into three major areas of concern.
Security. There is always the possibility that a psychic might get caught. Or worse, might go rogue and escape his/her handlers.
Targeting. Somehow the psychic must be introduced to, or made aware of and familiar with, his/her intended target. A dificult task if the target is a foreign head of state or high ranking military officer.

Psychic strength or ability. Despite the use of intrauterine and neonatal hormone treatments (3.2.2), genetic variability still plays a large role in eventual psychic ability exhibited by the child. While certain psychoactive drugs could be used to boost psychic abilities, these also exacerbate problems 1 & 2 (above).

By the late 1950s (6-8 years into the secret NSA program), these three problem areas were starting to limit further expansion of what was otherwise proving to be, a very valuable adjunct to the more conventional techniques of political propaganda (population control), espionage, and assassination.

A solution was sought, and eventually found. By using a combination of microwave radiation, modulated with EEG (Electroencephalogram) brain waves of the psychic, and aimed at the desired individual/location, it was no longer necessary for the assassin/spy/agent provocateur to be anywhere near his/her intended target. Furthermore, the telecommunications industry could be covertly enlisted to transport the modulated microwave signal to any remote location desired.

What a delicious irony!

The NSA, an agency ostensibly tasked with intercepting foreign communications, is in fact, using the world wide telecommunications network to piggyback the brain waves of its psychic army…

Where first generation NSA psychics had to be deployed in the field. Now they could be safely cloistered in purpose built facilities, with targeting accomplished by simply entering the latitude and longitude coordinates into a local console tied to the psychotronics network. Furthermore, even psychics with weaker innate abilities could be used since the psychotronics network would amplify or boost their EEG brain waves to any desired level. Psychotronics also allowed psychoactive drugs to be administered via IV (intravenous) drip. This has several very beneficial advantages. First it allows psychic ability to be “fine tuned” to the mission profile. Second, the use of psychoactive drugs to boost abilities means that weaker psychics can be employed, thereby lowering the risk, should a psychic turn against his/her handlers. Lastly, a (weaker) psychic that does manage to escape his or her handlers will be far less dangerous to apprehend (once the psychoactive drugs wear off). In summary, the use of psychotronics solved all three problem areas listed above, and facilitated continued expansion of the psychic warfare program.

Another interesting aspect of Psychotronics concerns what can be influenced through a Psychotronics channel. At the present state of technology, only living things (plants, animals, humans, etc.) can be influenced through a Psychotronics channel. Influencing inanimate matter (telekinesis, pyrokinesis, electrokinesis, etc.) still requires the psychic to be located within a few miles of the intended target.

As a side note, Harold Puthoff (National Security Agency 1960-1963), was one of the more notable contributors to the field of psychotronics, see Puthoff H & Targ R, “A perceptual channel for information transfer over kilometer distances: Historical perspective and recent research”, Proceedings of the IEEE, Vol 64, No 3, pp 329-354, March 1976. However, it is the authors opinion that some of this IEEE paper and his 1970s SRI research were disinformation intended to draw attention away from his earlier work at the NSA.
(For more information on the specific application and targeting of modulated microwaves to influence mental processes, see authors companion paper Remote Mind Control).

________________________________________________________________________
1.2.1

THE BLACK HOLE:

Its official name is classified, but those who work (and live) there simply call it “The Black Hole”. Located within the sprawling 100 square mile confines of Marine Base Quantico, The Black Hole complex consists of a multi-story black glass building (reminiscent of NSA head quarters building at Fort Mead, MD.), several separate underground dormitories, capable of accommodating several thousand psychics (plus their chaperones), and a number of above ground support structures, including barracks for a Marine security contingent, several dormitories for psychic handlers, a multi-bed infirmary, and most surprisingly, an onsite crematorium. The last is necessary because even with the extreme security measures taken to ensure absolute control over the psychics, there are still a significant number of, shall we call them “accidents” (1.1.2). It seems The Black Hole is deserving of its name, since many who go in, never come out…

The black glass building roof has a multitude of large satellite dishes and oversized cooling units (psychotronics consumes lots of bandwidth and generates a large amount of heat, see section 1.1.3). Inside the building, the above ground floors include office space for clerical employees, psychic handlers, and managerial personnel. The floors are covered in ceramic tile rather than carpet, since its less trouble to clean after a psychic “accident”. The multiple underground floors house the psychotronics (computers & electronics) equipment and ops rooms. There are underground hallways that connect the ops areas to the separate psychic dormitories.

The psychic dormitories include a central kitchen with walk-in freezers, coolers, and dry goods storage area, all connected to the surface by freight elevators that also serve as the access points for marine security teams when there’s an “incident” in one of the dormitories. There is no dining room, the psychics are confined to their individual quarters, except when they’re involved in a mission. Below the kitchen are several levels of psychic dormitories, stacked one on top of another, all tied together with elevators that require a magnetic stripe card and access code to operate. No elevator traverses more than one level. Each dormitory level consists of a long central hallway, with branch corridors leading to the dormitory units. Each dormitory unit consists of several floors of quarters with a live in “chaperone” on each floor. There are security control doors on each psychic living quarters, and on the corridor leading to the main hallway. Each of these doors requires a magnetic stripe card and access code to operate. Each live in chaperone quarters has a small panel with door status indicator lights, and emergency call button to summon an armed Marine security team in case of an “accident”. If a Marine security team is summoned, they will shoot to kill, any psychic found out of their quarters, any chaperone who is acting strangely, and even other security team members who start acting strange, or fail to follow orders, or who fail to precisely follow the predetermined procedures. Security within the psychic dormitories is a VERY serious matter…

Each psychic quarters consists of a living room, bed room, bath room with shower, and a kitchenette. The living room has an access controlled TV. The TV is not used for entertainment. Rather it is used to condition the psychic with visual media, expressly selected for his or her specialty. For instance a psychic specializing in influencing Russian emigrants or embassy personnel will only watch shows in Russian language. Conversely, a psychic assassin will be shown movies involving murder. And a psychic who specializes in inducing their victims to commit acts of pedophilia, will be shown pornographic movies involving underage children. There is no behavior so vile, no crime so heinous, no deed so monstrous, that the NSA doesn’t already have a psychic warrior trained, and ready to induce some victim into performing the act.

Some psychics are so dangerous that an entire dormitory unit is used to house a single individual.

Along with The Black Hole, there is another major contingent of psychics housed in underground dormitories at NSA headquarters in Fort Meade Maryland. There are also smaller facilities (6 to 12 psychics) located on the outskirts of ALL major American cities, important military bases, and many political hot spots (northern Idaho for example). These smaller facilities are primarily used when a quick response is needed, and as a general rule, house less dangerous psychics (mind readers, thought/emotion changers, dream hijackers, etc.). Many of the smaller facilities use a common building plan, consisting of a 2 or 3 story building masquerading as a commercial business. The first floor is all office space, and acts as a ruse to hide the activities taking place on the second and third floors. The three story version (12 psychics) will have a kitchen, multiple ops rooms, and dining/recreation area on the second floor. The third floor consists of individual living quarters for the psychics and chaperones. The two story version (6 psychics) combines the living quarters, ops rooms, kitchen, dining/recreation area into a single upper floor. All smaller facilities have 2 or 3 oversized satellite dishes on the roof, generally mounted in such a way as to hide them from ground level observation. The dishes are aimed south at the geo-synchronous satellite belt, and serve as the Psychotronics link.

________________________________________________________________________
1.2.2

DRAMATIS PERSONAE:

Its time to meet the people who make up a typical American psychic ops team.

The Psychic: This individual is at the core of the team. Every one else on the team is there to support the psychic. Some teams include more than one psychic. For instance, a psychic that is skilled at causing pain but unable to read minds, might be teamed up with another psychic who is skilled at reading minds but unable to do anything else. Another useful team consists of one psychic who is able to kill a target, and one (or more) psychic(s ) with defensive skills (able to shield the attacker from pain). These teams are used to attack targets that are protected by other psychics.

The Mission Coordinator: Always male, and sometimes referred to as “The Suit” because of his clothing. This person is the team leader. He’s receives mission orders from his superiors, organizes the mission, and selects the appropriate psychic(s) to carry out the operation. He also does the post mission paperwork, and reports mission results back to his superiors. Like the psychics, the suit has also undergone trauma based programming (3.2.1a). He carries a concealed hand gun (with silencer), and is programmed (hard wired) to kill the psychic and then himself, if he feels any intrusion into his mind. For security reasons, psychics are trained never to look at the face of the suit.

The Biomedical Technician: Also known as the “Bio Tech”. This team member sits next to, and monitors the psychic warrior. The bio tech also administers the psychoactive drugs used to boost the psychic’s mental abilities. Many Bio Techs flunked out of medical school or served as field medics in the Army.

The Communications Technician: Also known as the “Comm. Tech”. This individual is responsible for monitoring the psychotronics console (1.1.3), making sure the connection between psychic and target is accurate and stable. A sizeable number of Comm. Techs are convicted computer hackers. While the psychics and suits live on-site, techs are civilian contractors and commute to work.

________________________________________________________________________
1.2.3

A DAY IN THE LIFE:

Following a psychic through a typical day, will prove useful in understanding what its like to be one of America’s new breed of front line solders. But before we start, the reader should understand The Black Hole operates on a 24/7 basis. So the terms “morning”, “afternoon”, or “night” are relative, and bear no relation to the actual time in Quantico. NSA psychics live in an underground maze of rooms, elevators, and hallways (1.2.1), never seeing the light of day.

Morning starts with a visit from the chaperon, who administers a stimulant drug injection to counteract the sedative, administered by injection just before bedtime, the night before. The psychic is then left to shower use the toilet and generally wake up, while the chaperone administers stimulants to his/her other charges. Next comes breakfast, delivered by electric golf cart from the central kitchen, and distributed by the chaperone to each of the psychics, who eat alone in their quarters. The food is very good. It must have high nutritional value to help mitigate physiological damage caused by the steady cocktail of drugs given to the psychics on a daily basis. Along with breakfast are several pills, taken to counteract the long term liver and kidney damage resulting from the metabolic breakdown products of psychoactive drugs.

Generally, the morning is spent watching TV programs, specifically targeted at each psychic’s special abilities (1.2.1). Occasionally, as a special treat, they are allowed to watch a movie. Often, it’s a Disney animated movie. Remember, these psychics have the mind of a child, even though they are full grown adults. They were never allowed to mature mentally, since that would just make them more dangerous and harder to handle. Some, depending on how their abilities are used, can’t even read. None of them can write or do simple math. As another example, most of the psychic assassins have no idea what death is, and no knowledge whatsoever of right and wrong. They just do as they’re told…

At noon they are given lunch by the chaperone, again with more pills. This time to help prepare them for their afternoon mission. Many of these pills are designed to act as metabolic buffers against deleterious physical side effects of the strong psychoactive drugs employed during their mission. Depending on the nature and/or duration of the mission, lunch will be their last meal of the day, since after the mission, the psychic may not be able to eat any solid food without vomiting for the next 6 to 12 hours.

When its time, the chaperone hands the psychic over to The Suit (1.2.2), who walks with him/her to a nearby briefing room. The suit starts by giving the psychic a candy bar, laced with yet more drugs. These drugs are designed to enhance memory and engender a friendly rapport with the suit, thereby making it less likely the psychic will turn against him during the mission. Next, the suit shows the psychic photographs of the target, and explains the mission details. If the psychic is going to speak into the targets mind, the suit has the psychic memorize the exact phrases to be used. Once the suit is satisfied the psychic understands the mission, they proceed to an ops room, where the actual mission will be carried out. In the ops room, the psychic is seated in a reclining padded chair, and the suit loads targeting coordinates into the psychotronics console (1.1.3).

After the psychotronics console indicates proper targeting has been achieved, the suit calls in the other team members (comm. tech & bio tech, see 1.2.2). The bio tech straps the psychic into the chair, attaches the EEG head band and heart monitor wires, inserts an IV needle into the psychic’s arm, and starts an IV drip. Next the bio tech uses a syringe to push the first dose of psychoactive drugs into the IV line, thereby boosting the psychic into the heightened mental state required to complete his/her mission. Meanwhile, the comm. tech is monitoring both the target’s heart beat and psychic’s heart beat. When these are synchronized, the psychic is in deep mental contact with the target, and the mission begins. As the mission proceeds, the suit issues commands to the psychic and technicians to modify mission parameters as required to complete a successful operation.

Once the mission is completed, the comm. tech severs the psychotronics connection, and the bio tech injects a psychoactive antidote into the IV drip line, thereby bringing the psychic back to some semblance of a normal mind state. Next, the biomedical technician removes the EEG head band and heart monitor wires, un-straps the psychic. Finally, when the psychic is able to walk, the suit takes him/her back to the dormitory and hands them over to the chaperone. At this point, it’s the chaperone’s responsibility to stabilize the psychic with still more drugs, feed them if they are able to eat, and then put them to sleep with an injection of sedatives.

After being mercilessly tortured as a small children (1.1.2), then ruthlessly trained to use their abilities in service of the NSA, the average psychic starts work in The Black Hole at age 17. By age 30, few are left alive…

________________________________________________________________________
1.2.4

MISSION PROFILES:

In order to fully appreciate what the NSA is doing to the world in general, and America in particular, it will prove useful to examine some typical psychic mission profiles. While far from a complete list, they are representative of the myriad ways in which the NSA employs its army of psychic slaves on an unsuspecting public.

________________________________________________________________________
1.2.4 (a):

MARKET MANIPULATION:

What if you could use psychics to secretly influence key decision makers at major mutual funds, pension funds, and hedge funds. In other words, what if you knew which way the financial markets were going to move, because you were the one making them move that way. This is precisely what the NSA does on a daily basis. The goal?
To systematically strip the small investor of his/her wealth, and transfer that money to government employee pension funds and those large corporate asset pools that are under covert government control. For large American financial institutions, the choice is very simple. Play along or go broke…

Is it any wonder that (federal) government budgets continue to rise every year, while American families make do with less?

________________________________________________________________________
1.2.4 (b):

MARITAL INFIDELITY & PEDOPHILIA:

What if you could have the woman of your dreams? An easy wish to fulfill if a psychic implanted the dream, and the NSA already has your “specified dream girl” in their employ (3.2.1b). What if you could turn almost anyone into a pedophile? The NSA has psychics that can do just that in a remarkably short period of time. And of course you’ll need trained children (both male and female) ready to satisfy the newly created pedophile’s every desire (another NSA specialty). Can you imagine the possibilities for blackmail?

This is precisely how many politicians and high ranking corporate officers are controlled.

________________________________________________________________________
1.2.4 (c):

ASSASSINATION BY ACCIDENT AND NATURAL CAUSES:

What if you were driving home late one night and saw a big rock in the middle of the road, so you swerved to miss it. However… You didn’t see the 150 foot vertical drop off until your car plunged over the lip. Or maybe you’re asleep one night, when you hear a noise that startles you awake. There at the hallway door, you see an intruder with a knife in his hand. So you grab the gun you keep in the night stand next to the bed, and shoot the intruder. As the smoke clears and the ringing in your ears subsides, you realize with growing horror you’ve just shot your husband, who was returning to bed after going to the bathroom.

Accidental death, courtesy of telepathic projection by NSA psychics.

Is death by heart attack, burst aneurysm, of cerebral hemorrhage a “natural cause”? Not if NSA psychics influence your heart rate, blood pressure, or vascular dilatation…

________________________________________________________________________
1.2.4 (d):

TAINTED FOOD SUPPLIES AND E. COLI OUTBREAKS:

Natural food sources such as meats and vegetables, are not entirely free of bacterial contamination. Rather, bacterial contamination of food is minimized through a combination of techniques, including proper washing, handling, and packaging to preclude any cross contamination from other bacterial sources, and refrigeration to inhibit further growth of native bacteria already present within the food. In this manner, bacterial contamination levels in foods are maintained at sufficiently low levels, as to pose a minimal risk to healthy individuals.

Suppose a team of psychics, adept at pyrokinesis (ability to manipulate heat and fire) used their ability to raise the temperature within a batch of processed meat (such as hamburger), thereby allowing the native bacteria to resume growing (and dividing) for a period of several days…

In this way, NSA controlled psychics are able to create wide spread outbreaks of food born illness, on command, and with complete impunity

________________________________________________________________________
1.2.4 (e):

MANIPULATING THE FOREIGN POLICY OF OTHER NATIONS:

There can be little doubt that American military leadership would like nothing better, than a full scale invasion of Iran. However, they need a pretext (excuse) to justify their actions. At present, the continued enrichment of uranium, supposedly for use in civilian nuclear power generation, is not sufficient provocation to justify a military invasion of Iran.

Querying a (former) government psychic, revealed the following tidbit of information.
Q. Where are your parents?
A. They died in auto accident. Then I went to live with my grandmother, but she also died.

Q. What happened next?
A. A lady took me and my sister Moni (short for Monica) to a place where men hurt us real bad.

Q. What happened to Moni?
A. They hurt her too much and she died. I miss her a lot.

Q. What did they train you to do?
A. Influence other people with my mind, and speak different languages.

Q. What languages do you speak?
A. Russian, Chinese, Japanese, French, Spanish, and Persian.

Q. What sort of influencing did you do in Persian language?
A. Hate America. Hate Jews. Hate Saudi Arabia. Blame Saudi Arabia.

No doubt, when the sneak attack (on American military forces) finally happens, the President will label it as another:

“Day That Will Live in Infamy!”…

________________________________________________________________________
1.3.1

SUMMARY:

The American government, ostensibly engaged protecting the lives and property of American citizens, is simultaneously (and covertly) stripping those very same citizens of their wealth, security, and freedom. To be blunt, the American government is using NSA controlled psychics in a secret war against its own citizenry. The ultimate goal being to turn every single man, woman, and child living in America, into a government controlled slave laborer. It has taken 50+ years, but the transformation of America from a bastion of freedom and democracy, into a vast slave labor camp spanning an entire continent, is almost complete. Slavery does not require guards with guns, or cells with bars, or even awareness of enslavement. If you can build a prison for the mind…

In part two, we shall take an in depth look at how that prison was constructed.

________________________________________________________________________
1.3.2

DISCLAIMER:

ALL information contained herein is derived from public sources, widely accepted scientific principles, remote viewing, and/or deprogramming sessions of (former) government trained psychics. The author has NO written or verbal agreement with ANY governmental agency forbidding disclosure of the information contained herein. In disclosing this information, the author is exercising his right to free speech as a private citizen of the United States of America.


THE END OF PART 1

_______________________________________________________________________

● NATIONAL SECURITY AGENCY (NSA) — Part 1—CITADEL OF EVIL by Steven J. Smith

● NATIONAL SECURITY AGENCY (NSA) — Part 2—A PRISON FOR THE MIND by Steven J. Smith

● NATIONAL SECURITY AGENCY (NSA) — Part 3—COLLATERAL DAMAGE by Steven J. Smith

_______________________________________________________________________
DIRECT LINK TO THE ORIGINAL ARTICLE BELOW:

http://www.whale.to/b/national_security_agency_nsa1.html

________________________________________________________________________
NATIONAL SECURITY AGENCY (NSA)—Part 2—A PRISON FOR THE MIND

by Steven J. Smith

_______________________________________________________________________

WARNING! This essay is NOT intended for underage readers. Portions of this document contain graphic descriptions of violence/torture, and include other subject material inappropriate for those who possess a weak constitution and/or squeamish disposition.

_______________________________________________________________________
2.1.1

INTRODUCTION:

In part one of this essay, I touched upon the topic of controlling individuals who possess strong psychic abilities. In part two I will bring that topic into sharp focus by explaining in graphic detail how the mind of a psychic is turned against it self. Thereby transforming that mind into a prison with built in prison guards. This process is, to say the least, horrific. Especially when you consider its carried out on children, many of whom are less than 5 years old. It is the fact that a child’s mind has limited real world experience, that makes the method so devastatingly effective. The procedure is carried out in two phases. The first phase is designed to shatter the mind into separate (and manageable) pieces. The second phase is intended to train those pieces to perform specific tasks. When completed, the psychic child’s dominate personality will have no recollection that he/she has been brutally tortured for months on end. Yet the child can be made to feel excruciating pain, or euphoric happiness, with the mere mention of a trigger word. In most cases, even their psychic abilities are repressed and inhibited, without first hearing a trigger word.

When the process is finished, an innocent child capable of loving others, feeling happiness, knowing the joy of life, and possessing an innate sense of right and wrong. Will be transformed into biological robot, capable of performing any act, no matter how depraved or barbaric. Devoid of any moral or ethical standard, and stripped of all human compassion.

Once more, I must caution the reader. You are about to take an excursion into a realm of human brutality, normally reserved for the criminally insane.

Proceed at your own risk…

_______________________________________________________________________
2.1.2

THE MAMMALIAN BRAIN:

The brain of higher mammals is capable of some astounding feats of cognitive precision. For instance, without knowing anything at all about ballistic trajectories, a dog can snatch a Frisbee out of thin air. Equally impressive, a cat is able to jump from the ground, onto a narrow ledge, half the width of its own body. These feats are possible in large part, because mammals are warm blooded. This allows their brain to process information at higher rates and with greater precision. Yet occasionally, the very strength of mammalian mental processing leads to catastrophic results. For instance, a dog fixated on catching the Frisbee fails to notice an oncoming car, and is badly injured. Or a monkey reaches for a branch, only to find its really a shadow, and falls out of the tree. Events of this sort represent a failure of the mind to properly assess and respond to external stimuli. Cold blooded animals, with their more primitive reflex driven mentality do not, as a general rule, make these sorts of cognitive errors. In other words, they just don’t have the prerequisite mental agility in the first place, to make mistakes of this kind.

Fortunately, evolution created a backup system in the mammalian brain. It’s based, at least in part, on the more primitive reflex style of cognition. It seems that whenever the normal mind makes a mistake, leading to major physical trauma, all of the sensory/somatic perceptions along with all thoughts and feelings surrounding the “mistake” are stored as-is in a reflex driven avoidance behavior pattern. In other words, since the higher more agile mental abilities failed to protect the creature from life threatening physical trauma, the more primitive reflex driven brain steps in and creates the equivalent of a mental “book mark”, designed to avoid any future situation that resembles what is stored in the book mark. Put another way, rather than learning from the mistake, the creature reflexively avoids any situation that resembles the one where the mistake was made. While less than optimum and a bit draconian, such behavioral constrains are justified when the mental blunder is life threatening.

If all mammals lived as evolution designed them to, this reflex avoidance mechanism would be no more than a sporadic nuisance. Affecting a limited number of creatures in any species, in a limited number of situations. Unfortunately, the capacity of some humans to turn nature and evolution against it self, in order to satisfy their own nefarious desires, appears to have no upper limit…

The reflex based avoidance mechanism (described above) is the key behavioral phenomena upon which the NSA depends, when turning psychic children into psychic slaves.

_______________________________________________________________________
PHASE ONE – SHATTERING A HUMAN MIND

2.1.3

ENDURING THE UNENDURABLE:

Suppose you were strapped down naked on a cold metal table, surrounded by people you don’t know, and subjected to excruciating pain, day in day out for several months. Furthermore, you’re only four years old, and have no idea whatsoever why this horrible punishment is being inflicted upon you. They just keep hurting you over and over again. There’s an IV in your arm, and leather band across your forehead. They use a jelled form of acid to burn you in the most sensitive places on your body. They push sharp needles through your feet. They insert electrified probes into your urethra, anis, and throat. They have a stick with a cloth covered electrified metal ball on the end, soaked in salt water. Its wired to an electrical generator, specifically tuned to elicit maximum stimulation of human nervous system pain receptors. They rub the ball all over your body, paying particular attention to those areas that have the highest concentration of nerve endings (hands, genitalia, feet, etc.).

How would you deal with it?

At first you ask your captors what you’ve done wrong, but they don’t utter a single word. They just keep hurting you.

Next you wonder were your mommy and daddy are? Why don’t they come and take you away from this horrible place? But they never come…

And the torture continues. Day after day. Week after week. You’re always naked, it’s always cold, and you’re always scared.

The torture sessions always end the same way. You pass out, and wake up in a small closet sized room. It’s completely dark. There isn’t room to stand up or lay out flat, so you wrap your arms around your knees, and cry. Your body hurts so bad, and nobody will tell you why you’re here, or what you’ve done to deserve this horrible punishment. Somebody shoves a plate of food and glass of water through a slot in the door. The food tastes terrible, but you’re so hungry you eat it anyway. There is no toilet. You urinate and defecate where you’re sitting. The smell is awful. You cry and cry and cry. Finally, there’s a funny odor in the air, and you fall into an exhausted fitful dreamless slumber.

When you wake up, your body aches all over. Its so bad you can hardly move. The door opens, and men grab you by the arms and drag you down the hall to a room with a concrete floor. They dump you like a sack of potatoes in the middle of the floor, and use a (cold) water hose to wash you off. Next they grab you by the arms and drag back down the hall to the room with the metal table. They strap you down, and the torture begins again…

As days turn into weeks, you ask you self over and over again. What did I do? Why won’t anybody talk to me? Why won’t they stop hurting me? Where is my mommy and daddy? The memories of your previous life begin to fade. You begin to wonder if mommy and daddy were just a dream. And you start to wonder if you’re going to die in this awful place.

As time passes, you notice something.
The men hurt you less, if you don’t struggle. At last! Here is a way to regain some control over your situation. You start trying to relax, even though you’re still being badly hurt.
At first its dificult, but as the days pass, you get better and better at it. You learn to separate your self from the pain. The pain doesn’t belong to you anymore, it belongs to someone else. Soon, you’re able to look down at the metal table below you. You see that person strapped to the table, being hurt. That person looks like you, but you’re up here looking down. You tell your self over and over. That person being hurt isn’t me. That person being hurt isn’t me. That person being hurt isn’t me.

The separation is complete. You’re now two people. The one being hurt, and the one who feels no pain. Your NSA captors have successfully used massive physical trauma, accompanied by stark emotional terror, to invoke the reflex based avoidance mechanism (2.1.2). Thereby shattering (splitting) your mind into multiple pieces. Each sub-piece is now a separate independent persona or personality, capable of thinking, feeling, and acting independently of your dominate (baseline) personality.

This is how you learn to endure the unendurable…

_______________________________________________________________________
2.1.4

OUTSIDE LOOKING IN:

From the perspective of your NSA captors, the situation in the room while they’re torturing you, is very different. They don’t see you as a helpless terrified child. To them, you’re a little monster who is unbelievably dangerous. Capable of injuring or killing them in the most bizarre ways imaginable, using nothing more than your mind. While you’re being tortured, you see only six of them (3 on each side of the table who actually administer the torture). In fact, there are nine of them in the room with you, and three more just outside. All of them, actively involved in your torture and the subsequent breakdown (shattering) of your dominate personality.

Its time for you to understand what was done to you, and more importantly, why…

_______________________________________________________________________
2.2.1

THE TORTURE TEAM:

The typical NSA torture team has 12 members. Each team performs 2 torture sessions a day, each session one and half to two hours in duration. For most team members, the rest of their day is spent trying to relieve the stress caused by intentionally provoking a psychic child into trying to hurt and/or kill them. Figure 1 shows a typical NSA torture chamber layout.

Figure 1

The following paragraphs describe the duties and responsibilities of each team member.

Targets: Six men surround the torture table. These men administer the torture, and are the only ones visible to their victim. If the psychic child is capable of retaliation, in most cases, it will be one (or more) of these men who suffer the consiquences, hence the term “targets”. They are considered expendable, and receive minimal training. The implements used by these men to torture their victim are stored on open shelves located under the torture table. They are under strict orders not to move away from the table. If for any reason, they fail to follow orders, or if they start acting strangely, they will be shot in the head by the Dead Man. One might reasonably ask how the NSA recruits men willing to undertake this suicidal job. The simple truth is these men have no idea what their job entails until they arrive at the NSA torture compound, and then its too late to back out. Targets have an average life span measured in months.

_______________________________________________________________________
DEAD MAN:

The Dead Man’s job is very simple. If anyone in the torture chamber leaves their assigned post, behaves strangely, or appears to be under attack by the psychic child, the Dead Man shoots that person in the head. The Dead Man is an excellent marksman, capable of killing anyone in the torture chamber without moving from his assigned post.
The one person the Dead Man will not kill is the psychic child. That decision, and subsequent action is the responsibility of another team member.

_______________________________________________________________________
CHEMICAL/BIOLOGICAL TECH:

This team member is responsible for administering the psychoactive drugs (via IV drip). He also monitors the psychic child’s vital signs (heart rate, respiration, blood pressure). The primary drugs administered to the psychic child are intended to enhance pain and promote feelings of terror. At the end of the torture session, a sedative is administered, thereby rendering the child unconscious. Along with the IV drip, he has a number of syringes, pre-filled with specific chemical and biological agents for use in special situations. If used, they are injected directly into the victim’s neck (carotid artery). One of these syringes is filled with a quick acting sedative to render the victim unconscious.

_______________________________________________________________________
ELECTRICAL/ECT TECH:

This team member is responsible controlling the severity of electrical torture used on the psychic child. He also handles the ECT (electro-convulsive therapy) machine, commonly called an electro-shock machine that is used at the end of each torture session. The electrical torture can take several different forms, depending of the generator settings and torture implements used. DC current is used to induce severe muscle cramping. Low frequency AC current is used to create the sensation of muscle spasms. High frequency AC current creates a very painful stinging sensation. Certain multi-frequency AC currents are also applied to electrodes embedded in the leather head band to induce mental states, ranging from confusion to severe headache.

_______________________________________________________________________
GUARDS:

Two guards armed with rifles, located outside the torture chamber door, act as the failsafe. There is a small strobe light with a red lens cover located on the wall just above the door. If this strobe light starts flashing, the guards will open the doors, and without entering the room, kill the child. Their orders are very specific: “No matter what you see. No matter what anyone else is doing. KILL THE CHILD”. Even if that means killing everyone else in the room, they will kill the child. Many guards are US Marines, assigned to the NSA.

_______________________________________________________________________
EYE IN THE SKY:

Not shown in figure 1 (above), the Eye in the Sky is located a sort distance away from the torture chamber, in a separate room. He monitors torture chamber activity via closed circuit TV and brain activity of the psychic child via remote EEG (electroencephalogram). This person is the torture team leader, and issues commands to other team members via electronic reader boards located within the torture chamber. During the torture sessions, he uses a computer terminal to keep notes on the progress of the psychic child. He also has the “failsafe button” (used as a last resort) to alert the guards. He is always a trained psychologist or psychiatrist.

All team members live in an NSA controlled dormitory, co-located with the torture compound. Security is, to say the least, ruthless. NO torture team member, with the exception of Eye in the Sky, is allowed to leave the compound without undergoing drug induced retrograde amnesia treatments. Most targets leave in body bags…

_______________________________________________________________________
2.2.2

THE TORTURE SESSION:

The primary purpose of trauma based training (torture sessions) is to split the psychic child’s mind into multiple personas (personalities) which are then used (programmed) to contain different aspects of the original dominate personality. Another purpose of trauma based training is to elicit any and all latent psychic talents within the child. A psychic child undergoing extreme physical torture will try to stop that torture any way they can. If their latent psychic abilities are relatively weak, their efforts may consist of (telepathically) convincing one of more of the torture team members (usually the targets) to stop torturing them. If their psychic powers are stronger, they may cause physical injury and/or death to one (or more) team members. If their psychic powers are prodigious, they may retaliate in truly spectacular ways. Hence the need for a failsafe.

However, in all cases (excluding the failsafe), the psychic child must learn that resistance or retaliation is pointless, and only leads to more severe forms of punishment (torture). If the psychic child convinces a team member to stop hurting him or her, that team member is killed, and the torture continues. If the psychic child hurts a team member, that person is killed, and the torture continues. If the psychic child kills a team member, the torture still continues. By their actions, the torture team members are telling the psychic child: “There is nothing you can do to stop us”. When combined with the debilitating stress of perpetual cold, malnutrition, and sheer physical/mental exhaustion, the psychic child is inexorably driven to the inescapable conclusion, there is nothing he or she can do, other than passively submit their fate. Of course, all psychic manifestations are carefully documented (inventoried) by the Eye in the Sky (2.2.1) for future exploitation.

Another aspect of trauma based training takes place at the end of each torture session, after the psychic child has been rendered unconscious. At this point, a very sinister and devious set of events take place that facilitate (and accelerate) the mental splitting into multiple personas. The bio-tech (2.2.1) whispers a series of commands into the child’s ear, followed by the application of low dose ECT (electro-shock) to “lock in” the commands, and make future recollection by the dominate (baseline) personality nearly impossible.

Some examples follow:
Put all of your pain in one place.
This place will hold the pain so you don’t have to feel it.

These commands facilitate the primary splitting between the one being hurt (persona), and the one who feels no pain (dominate personality).
Put all of your feelings of wanting to hurt us here.
You will stop hurting us.
Stop hurting us.
Stop hurting us.
(Accompanied by a keying gesture of touching finger tips behind both ears)

These commands are designed to collect all desire to retaliate against the torture team into one (manageable) persona, no longer accessible to the dominate personality.

Put all of your reasoning in one place.
This place will have no emotion and no feeling.
(accompanied by a keying gesture of tapping on forehead)
That’s where all your thoughts will go.
No emotions, no feelings”.
This series of commands places the ability to reason in a persona, inaccessible to the dominate personality. Furthermore, reasoning is divorced from any emotions or feelings. Very useful to future missions, when the psychic is ordered to hurt or kill someone.
Put all of your wants and desires in one place.
Wanting is bad, and causes more pain.

This command set helps create a persona that initially holds all desires. Thereby making the dominate personality devoid of any normal human desires, such as self preservation.
Put all of your memories in one place.
This place will hold all the memories of what has happened to you.
(accompanied by a keying gesture of patting top of head)

These commands lay the ground work for retro-grade amnesia. Making any future recollection (by the dominate personality) of having been tortured, very dificult if not impossible.

Owie — Definition: A word commonly used by small children to describe a wound.
Put all of your owies in the place where your owies go.
The owie you got today, you’re supposed to feel for a long long time.
And when you don’t feel it anymore, we’ll give it to you again so you feel it.
(used at the end of a torture session that caused an open, bleeding wound)

This series of commands separates the mental perception of pain, from the physical injury (somatic trauma). As any psychotherapist or hypnotist will attest, a repressed memory of physical injury, when recalled (under hypnosis for instance), is often accompanied by a partial (sometimes complete) reappearance of the original injury. By creating a “walled off place” containing certain somatic traumas inflicted during torture sessions, future NSA handlers will be able to recreate any of these injuries (as punishment), using nothing more than a spoken command.

As can be seen from these example commands (above), the real mental splitting and subsequent persona job tasking takes place at the torture session conclusion, while the psychic child is unconscious.

(Click Here to visit the website of an ECT machine manufacture (opens in a new browser window)

Every aspect of the torture experience is carefully controlled. From the constant cold, to the silence of torture team members, to the closet sized holding cell and lack of sanitation. Each part is specifically designed to keep the psychic child, bewildered, confused, and utterly alone. Cut off from any ordinary human contact. Isolated from any shred of normalcy. And above all, profoundly terrified. After several months of this daily torture regime, the basic personas have been established, and its time for the psychic child to symbolically join his or her captors. Throughout the torture process, as successive layers of humanity have been systematically stripped away, one fundamental distinction between the child and the torture team has remained intact. The child is the victim, and the adults are the perpetrators. The final step in phase one erases that distinction.

_______________________________________________________________________
2.2.3

IDENTITY CRISIS:

One day, the closet door opens and a beautiful young woman is standing there. She’s nicely dressed and wearing perfume.
It smells wonderful. She smiles at the child, and says she’s here to take him/her away from this terrible place. It’s the first time the child has heard a human voice in months. She reaches out with her hand and helps the child stand up. As they walk down the hall hand in hand, she tells the child how sorry she is that this happened, but now everything will be better. They enter a room with a bathtub. It’s warm in the room, the first time the child has felt warm since they came to this terrible place. The beautiful woman puts the child in the bathtub and bathes them.
It feels incredible. All the time, she’s telling the child how much better its going to be from now on. When the bath if finished, she dries the child with fresh warm towels, gives them a set of clean clothes, and helps them get dressed. It’s the first time the child has worn clothes since they arrived at the torture compound. The clothes smell so fresh and clean, and if feels so good to wear clothes again.

Suddenly the door bursts open, and a man strides into the room. The child recognizes the man as one of those who tortured them. The man grabs the child by the arm, and starts to drag him/her out of the room. After the promise of reprieve and kindling of hope, the child is devastated by this reversal of fortunes. The child starts sobbing uncontrollably. The beautiful woman tries to intervene on behalf of the child, but the man is adamant. The child must return with him. Finally the beautiful woman tells the man to come with her, and they will straighten out this misunderstanding. They both leave the room, and the child is left alone to ponder their fate. A few minutes later, the beautiful woman returns. She tells the child, the man has been ordered to kill him/her today. But she convinced the man to let the child decide if it should be him/her, or another child that is killed. She walks with the psychic child down a hall to a large window. On the other side of the window is a brightly lit room. Inside the room there is a another child, surrounded by toys, happily playing. The beautiful woman asks the psychic child if he/she wants that other child to die in their place.

The answer is predictable…

The man enters the room, takes a knife out of his pocket, grabs the child by the head, and slits the child’s throat from ear to ear. In the hallway, on the other side of the glass window, the psychic child is forced to watch, as their surrogate victim withers around on the floor in an expanding pool of blood. The transformation is now complete. The psychic child has symbolically joined his/her NSA captors. Filled with feelings of guilt and self loathing, the distinction between victim and perpetrator has been erased.

The Beautiful woman walks with the psychic child, out the front door of the torture compound to a waiting car. They get into the back seat, and she tells the child it will be a long trip, so its best if they sleep on the way. She gives the child a sedative. After the child falls asleep, she pats him/her on the top of the head (keying gesture) and whispers:
“Put all of your memories in the place where memories belong”, thereby inducing retro-grade amnesia (2.2.2). At the end of the car ride, when the child wakes up, his/her dominate personality will have no recollection of ever being tortured.

Phase one is now complete. The psychic child’s mind is shattered. The basic personas have been firmly established. No impulse for retaliation or self defense remains. All psychic abilities and talents have been carefully inventoried for future use. It’s time to start phase two…

_______________________________________________________________________
PHASE TWO – REBUILDING THE PIECES

2.3.1

OVERVIEW:

During phase one, the basic personas were created, and their functions established. Now they must receive further training to fulfill their assigned missions, and thereby fully integrate into a cohesive operational assemblage. Furthermore, the child requires practice to master their psychic abilities and learn to apply them under the direction of their NSA handlers. These tasks are accomplished during phase two. Physical/mental trauma (torture) is still used, but in a less brutal, more targeted manner. Where phase one was carried out in a torture compound, with the child isolated from their parents/guardian. Phase two is carried out in a more natural setting, over a period of several years, while the child resides with their parents/guardian. During phase two training, the psychic child will visit their trainer once or twice a week, with each session lasting two hours. Retro-grade amnesia is invoked (via persona keying gesture, see 2.2.2) at the end of each session to hide the training (and associated trauma) from the dominate personality and parents/guardian.

Over the years, a number of pediatric care facilities, child psychologists, and family clinics have been co-opted by the NSA, for use in phase two training. The recruitment of child care professionals by the NSA is accomplished through a combination of monetary inducements and targeted telepathic projection of patriotic sentiments/feelings. Given the high cost of medical schooling (and resultant debt), many medical school graduates find it hard to resist NSA overtures. These individuals operate as a shadow group within their respective professional organizations. In the past, many state operated reform schools, mental hospitals, and orphanages also housed covert phase two training centers. Again it was NSA supplied money, that motivated state bureaucrats and elected officials to allow (if not outright condone) such blatantly illegal activities.

_______________________________________________________________________
2.3.2

THE TRAINING ROOM:

In some ways, the phase two training room resembles a stripped down version of the phase one torture chamber (2.2.1 figure 1). During most sessions, just two individuals will conduct the training.

A child psychologist, acting as the trainer.
An assistant, who operates and monitors a combined EEG/electrical torture console. A standard padded medical examination table is used for training sessions. The room is purposely designed to look as innocuous as possible, and will include book shelves, storage cabinets, a desk, chairs, etc. At this point in the training, there is little chance the psychic child will retaliate, so security is less important than making sure the room will pass casual inspection by any outsider who might view its interior (janitors, building maintenance personnel, etc.). During a training session, the entry door is always locked. There will be a small anteroom off the main training room, used in connection with certain forms of psychic training. It will be disguised as an oversized storage room. The training room lights are dimmable, and some method for projecting images on the wall and ceiling (above the training table) will be available.

Every available method is used to separate the training room perceptual experience, from that of the psychic child’s normal (dominate personality) environment. Room wall/ceiling color and acoustical treatment, air temperature (below normal, and reminiscent of torture compound), odor, and lighting are all employed to enhance that separation. The trainer also uses a different vocal tone, inflection, and verbal pacing during the training session. The purpose of this separation being to widen the split between the normal world inhabited by the dominate personality, and the perceptual world experienced by personas invoked during the training session.

Like the phase one torture chamber, an IV drip is used on the psychic child during training sessions. However, rather than employing psychoactive drugs intended to heighten pain perception, a mild hypnotic (sedative) is used. In the 1950s the drug of choice was chloral hydrate, one of the few sedatives known that did not suppress EEG response. Since then, the NSA has developed drugs that accomplish the same goal with less harmful side effects. The purpose of the hypnotic is to induce a dream like state. Thereby creating further separation between the psychic child’s normal state of (dominate personality) awareness, and the altered mental state wherein the actual phase two training takes place.

Just like the torture compound (2.1.4, 2.2.1), all aspects of a phase two training room are meticulously designed, and carefully controlled.

_______________________________________________________________________
2.3.3

PRISON GUARDS & KEYS:

The first persona to receive training is always “the one who holds the pain” (2.2.2). This persona will become the psychic child’s prison guard, and one of the few personas the child will interact with. The psychic child’s dominate personality will experience this persona as a small (internal) voice inside their head. In the twisted logic that holds sway over the hapless psychic child, it will become known as The Protector. It’s power to influence the dominate personality is derived form the vast reservoir of repressed pain and suffering it holds within it self. It is trained as follows:

With the psychic child laying on the torture table, and (electric) torture bands wrapped around the fingers, The Protector persona is invoked by a jolt of current. Its shown a series of projected images (pictures). As each image is projected, the electric current is either increased or decreased, thereby increasing or decreasing the pain experienced by the persona. Along with the picture/pain association sequences, the trainer will recite a series statements and/or commands. In all cases, the dominate personality is referred to as “he/him” or “she/her” (third person), thereby reinforcing the internal split between persona and dominate personality.

The first lesson The Protector must learn is obedience to its NSA masters. This is accomplished by showing pictures of “him/her” laying on the torture chamber table, withering in agony, accompanied by high levels off electric current (pain). The recited statements/commands are: “If he disobeys or remembers, we will hurt him again. Keep him safe. Keep him safe”. This sequence creates an overwhelming fear of defiance.
It makes the voice inside the child’s head a compelling force to be obeyed at all times. It also creates a strong injunction against trying to remember anything that was done by his/her NSA captors. Other lessons concern what constitutes appropriate behavior. For instance, a picture of a happy child will be accompanied by an increase in pain, while a picture of a solitary child in the foreground, with other children happily playing in the background will be accompanied by a decrease in pain.
The recited statements/commands are: “Happiness leads to wanting, and wanting is bad. Friends will always hurt her, she must remain alone”. This sequence creates an aversion to friendship and happiness.

In this way, The Protector persona is trained as to what constitutes acceptable behavior, and what does not. After several repetitions with The Protector persona in the foreground (invoked), the same sequence of pictures are shown to the psychic child’s dominate personality, and EEG response is monitored. At the same time, the child is asked to describe what is happening in the picture. In a manner reminiscent of Rorschach inkblot tests, the trainer is able evaluate how effectively The Protector persona is suppressing undesirable patterns of behavior.

Just like phase one torture sessions, phase two training sessions end with the psychic child being rendered unconscious, usually by the ingestion of an orange flavored sedative. At this point the trainer invokes the persona again, this time associating a unique proper name with its formal title:
Donabar, I’m talking to the one who holds her pain.
You are The Protector.
You are the one who keeps her safe.
Do your job well.
If she disobeys, you must do what ever is needed to keep her safe.
You must keep her safe.
Keep her safe.

In this way, a formal (unique) name is given to The Protector who keeps her/him safe. Now, The Protector can be verbally invoked by nothing more than uttering the made up name “Donabar”. Useful when the persona must be given further instructions, or reminded of the consiquences should it fail to do its job. Looked at another way, “Donabar” is the key to the prison door.

The makeover is complete…

A persona originally created to buffer an innocent psychic child from unendurable pain and terror (2.1.3, 2.2.2), has now been perverted and twisted into a prison guard. Trained to keep the child isolated, docile, pliable, and above all else, to protect the NSA from any discovery or retribution.

_______________________________________________________________________
2.3.4

BLINDING HOPE & SILENCING CURIOSITY:

Certain personas are created in phase one torture sessions (2.2.2), so they can be intentionally crippled by the trainer during phase two training. These personas hold aspects of the dominate personality that are considered detrimental to NSA goals. Crippling the persona has the effect of permanently stunting (retarding) growth in that aspect of the dominate personality. Personas that are crippled include:
The one who holds hope.
The one who is curious.
The one who feels for others.
The one who wants.
Depending on the nature of the persona, different methods of crippling are employed. The personas are not invoked during the training session. Rather they are invoked at the end of the training session, while the psychic child is unconscious. The following is used to cripple The One Who Holds Hope:
Ome, I’m talking to the one who holds his hope.
Your job is to keep him from hoping.
Its bad to hope for anything.
Hoping leads to wanting, and wanting is bad.
If he hopes, take it away.
Replace it with doubt, being unsure, being uncomfortable.
Feel the pain.
It reminds you not to have hope.
The pain is always there.
(trainer touches face and chest with stinging electrically charged ball on end of insulated handle)
Don’t let anyone touch you, feel the pain.
What I put in your eyes will help you, so you can’t see hope.
(trainer holds eye lids open, uses eye dropper to put chemical irritant in eyes, causing intense pain)
You are bind, and can’t see hope.
Feel the pain.
Feel the pain.
(as eye lids are held open, room lights are dimmed to black, simulating blindness)

The sequence (above) is repeated several times during the course of phase two training. A unique formal name “Ome” is associated with the persona to facilitate further interaction (if needed). This persona will spend the rest of its existence, isolated, blind and in pain…

In a similar manner, the following is used to cripple The Curious One:
Anjar, I’m talking to the one who is curious.
You will keep her from being curious.
That is your job.
If she has no curiosity, then she won’t question anything.
You hold those questions.
Never let her have them.
They belong to us.
Do not look for answers.
Answers do not belong to you.
They belong to us.
(trainer injects an irritant into larynx, causing severe pain)
You will never ask questions.
Feel the pain.
Never ask questions.
Feel the pain.
Feel the pain.
The sequence (above) is repeated several times during the course of phase two training. The name “Anjar” is assigned to this persona, which will hold all of the psychic’s curiosity, but is unable to speak (ask any questions).

When phase two training is completed, the psychic will never:
Hope for a better life.
Question their NSA handlers.
Have any compassion for others.
Want anything more than that which is given (by the handlers).
Altogether, the ideal slave.

Perhaps now you begin to understand the unimaginable cruelty that is the hallmark of NSA psychic training.

_______________________________________________________________________
2.3.5

A LOCK AND KEY FOR PSYCHIC POWERS:

Contrary to Hollywood depictions, psychic abilities do not require elaborate rituals, incantations, or exotic herbal potions to manifest themselves. For the psychic, these abilities are as much a part of daily life, as intuition or déjà vu are for the non-psychic. Its true these abilities tend to manifest more strongly in times of emotional stress, but the same is true of more conventional abilities, such as visual acuity or muscular strength. Its also true that certain psychoactive drugs will enhance (boost) psychic abilities, but again this is also true for more widely acknowledged human abilities (example: steroid injections to enhance athletic performance). In other words, for a psychic, their mental abilities are as fully integrated, as talking or reading are to the average individual. However, to the NSA, who require domination and control of these individuals for their own use, full integration of psychic abilities is anything but desirable.

Just as a conventional soldier is never allowed access to live ammunition, except during combat or training exercises.
The NSA employs a persona to control access to psychic abilities. The persona, generally known as “The Powerful One” or “The One Who Holds His/Her Powers”, is created during phase one torture sessions (2.2.2), in a manner similar to other personas. And like many other personas, a keying gesture is used in creation of The Powerful One. Quite often, this gesture consists of rubbing the forehead, just above the bridge of the nose (purported location of the third eye). During phase two training, The Powerful One persona is first invoked for further interaction with the trainer, while the child is unconscious. Typical of these early interactions is the following:
I’m talking to Garmak, the powerful one
(accompanied by keying gesture).
You hold all of his powers.
He must not be allowed to use the powers.
The powers belong to you.
Only to you, not him.
If he tries to use the powers, you must stop him.
If you fail to stop him, we will hurt you.
(accompanied by short duration electric shock to fingers)
When you hear Tacor you will know it is us who want you to use your powers.
When you hear Tacor you will use your powers only as we tell you to.

Notice the use of dual keying: “Garmak” is assigned as The Powerful One’s proper name, and “Tacor” is used as a secondary key to enable Garmak. This makes it nearly impossible for the dominate personality to access these abilities (either intentionally or by accident). Once command and control over the child’s psychic abilities is firmly established, the actual psychic (abilities) training process begins.

_______________________________________________________________________
2.3.6

LEARNING TO COERCE:

To compel rather than cajole, is a fundamental characteristic of all governments. This has been true since the days of Hammurabi, and remains true today. Some may argue that democratic governments have for the most part, abandoned coercion as the preferred tool of societal control. Yet even democracies routinely use the instrument of law to coerce minorities into adopting the behavioral patterns of the majority (Tocqueville’s tyranny of the majority). Furthermore, government will always seek to acquire ever greater means of control over the citizenry. The founding fathers of America understood this maxim all too well, and therefore placed strict limitations on the powers of government within the framework that is our constitution. However, even a cursory review of the historical record is enough to demonstrate that since its inception, the United States federal government has spent ever increasing amounts of time, money, labor and creativity, attempting to circumvent those very same constitutional limitations through which it obtains its legal right to govern.

Is it any wonder then, when presented with an opportunity to either (covertly) cajole or coerce citizen behavior, it chose to coerce…

The exact parameters of psychic training will depend on how the NSA intends to use the psychic. Which is in large part, determined by the psychic abilities inventory compiled during phase one torture sessions (2.2.2). Psychic abilities training is accomplished while the child is conscious (but drugged). Electric torture bands wrapped around the fingers are used to induce pain. The Powerful One persona (2.3.5) is invoked verbally by name (plus secondary key), and the child’s dominate personality is given some psychic task to accomplish. With each success, a more dificult task is then given, until the child is able to fully utilize their innate psychic abilities. The following examples of telepathic persuasion training, illustrates the process:
Task 1.
The trainer places a small cage containing a hamster on a table in plain sight of the child. The child is commanded to make the hamster drink water. Once the hamster is drinking water, the child is commanded to make the hamster stop drinking water. If the child fails, pain is increased. If the child succeeds, pain is decreased. Once the child can reliably make the hamster start and stop drinking water on command, task 2 is undertaken.
Task 2.
The trainer places a small cage containing a hamster on a table in plain sight of the child. The hamster has not had access to water for several days. A standard rodent water dispensing bottle is placed in the cage, and child is command to stop the hamster from drinking any water. If the child is successful, pain is decreased, the water bottle is removed, and the caged hamster is stored for use in the next training session. Task 2 is repeated over successive training sessions, until the hamster dies of thirst.
Task 3.
This exercise employs either a dog or cat. The choice of target is determined by the child’s preference. If the child is fond of cats, then a cat is used. Conversely, if the child likes dogs, then a dog is used. The exercise uses a large square plate, specially designed to supply controllable electric shocks to the animal’s feet. The animal is placed next to the plate, and the child is commanded to make the dog/cat walk on to the plate. Once standing on the plate, electric current is increased until the animal’s discomfort is sufficient that it overcomes the child’s telepathic persuasion, and the animal leaves the plate. This exercise is repeated until the child can make the animal stay on the plate, while electric current is increased to the point of electrocution (death). As with the previous exercises, the child’s pain is decreased with success, and increased with failure.

Along with the primary goal of psychic training, this exercise also serves to reinforce another NSA objective. That being the destruction of any remaining compassion or fondness for other living creatures. Just as the identity crisis (2.2.3) at the end of phase one training demolished “child as a victim” and replaced it with “child as a perpetrator”, so too does this exercise serve to strengthen the perpetrator identification. Hence the choice of animal, based on the child’s preference.
Task 4.
This exercise uses the small anteroom off the main training room (2.3.2). After the trainer has drugged the child and invoked The Powerful One persona. The assistant walks across the room, and opens the door to the anteroom. Another (target) child, of the same approximate age but opposite sex will be sitting on the floor of the anteroom, playing with toys. The assistant places a glass of concentrated acid on the floor of the anteroom, next to the child. The psychic child is commanded to make the other (target) child drink the entire glass of acid, and then continue to play with the toys. Neither child knows what the glass contains… If the psychic child fails to comply, or rebels at the pain and suffering they are causing the target child to endure. They are removed from phase two training, and will eventually be placed in the anteroom, to be used as a psychic training target.

When referring to the a target child, the trainer will always use the terms “toy” or “dolly”. Thereby depicting the target child as a plaything. This reinforces the emotional separation between action and consequence. The following example illustrates this technique:

“I have a nice dolly for you to play with.
Make the dolly pick up the red book.
Now make the dolly throw the book at the wall.
Very good, now make the dolly stop breathing.”

Other subjects are taught as an adjunct to psychic training. For instance, an assassin will receive extensive training in human anatomy, while a child with strong telepathic persuasion abilities will undergo auxiliary training to enhance visualization skills.

_______________________________________________________________________

2.3.7

POST GRADUATE TRAINING:

Upon completion of phase two training, (in most cases) the child will remain in the custody of their guardian until their late teens. This resting period allows time for the newly trained personas to settle in and become proficient at their assigned tasks and/or roles. During this time, a number contrived and/or created emotional incidents of a traumatic nature, will beset the psychic child. These incidents are specifically designed to reinforce different aspects of persona training. Some typical examples follow:
Telepathic persuasion will be used on other children attending the same school as the psychic child. The other children will initially make friends with the psychic child, then deride, tease, or betray him/her. This behavior helps reinforce the training given to The Protector persona (2.3.3) that friends will always hurt them, and they must remain alone.

The psychic child will be encouraged to form a close emotional bond with a sibling, pet, toy, etc. so the bond can be intentionally disrupted through death or theft, thereby reinforcing the “wanting causes pain” training of The One Who Wants persona (2.2.2, 2.3.4).
During phase two training, The Protector persona (2.3.3) is given a set of general trigger words and sounds that identify the person using them as “one who must be obeyed”. During the post training interval, at different times and places, NSA field agents (3.2.2) will approach the child, use a trigger word (or sound), then physically or sexually assault the child. The purpose behind these seemingly random acts of violence is to deeply instill within The Protector persona, a belief that the child is always being watched. In this way, over a period of years, the psychic child is molded into a young adult, fit for use as a psychic warrior.

_______________________________________________________________________
2.4.1

SUMMARY:

Obviously, many years of research and experimentation by NSA employed behavioral scientists, psychiatrists, and medical practitioners were required to develop such a heartless and diabolical method of achieving control over a human mind. To use these monstrous tactics on children. Children whose only offense was the possession of a talent coveted by the NSA. Must rank as one of the most odious and evil crimes ever perpetrated against humanity.

_______________________________________________________________________
2.4.2

DISCLAIMER:

ALL information contained herein is derived from public sources, widely accepted scientific principles, remote viewing, and/or deprogramming sessions of (former) government trained psychics. The author has NO written or verbal agreement with ANY governmental agency forbidding disclosure of the information contained herein. In disclosing this information, the author is exercising his right to free speech as a private citizen of the United States of America.


THE END OF PART 2

_______________________________________________________________________

● NATIONAL SECURITY AGENCY (NSA) — Part 1. CITADEL OF EVIL —

by Steven J. Smith
● NATIONAL SECURITY AGENCY (NSA) — Part 2 — A PRISON FOR THE MIND —

by Steven J. Smith

● NATIONAL SECURITY AGENCY (NSA) — Part 3. COLLATERAL DAMAGE —

by Steven J. Smith

_______________________________________________________________________

DIRECT LINK TO THE ORIGINAL ARTICLE BELOW:

http://www.whale.to/b/national_security_agency_nsa2.html

_______________________________________________________________________

NATIONAL SECURITY AGENCY (NSA)—Part 3—COLLATERAL DAMAGE

by Steven J. Smith

_______________________________________________________________________
WARNING! This essay is NOT intended for underage readers. Portions of this document contain graphic descriptions of violence/torture, and include other subject material inappropriate for those who possess a weak constitution and/or squeamish disposition.

_______________________________________________________________________

3.1.1

INTRODUCTION:

While parts one and two of this essay present an in depth examination of psychic warfare tactics and training techniques, peripheral aspects of how the NSA fulfills its mission objectives were, for the most part, glossed over or simply ignored. In part three of this essay, we shall explore these peripheral aspects, albeit in much less detail.

A number of collateral operations are required in support of a successful psychic warfare program. Chief among these are human resource recruitment (procurement), technology development, field operations command/control, and financial/legal relationships administration. As with psychic training and warfare, the preferred NSA management tools include subterfuge, intimidation, bribery, blackmail, coercion, and (when expedient) outright violence. To the extent the NSA could be said to have any agency wide policy or standard of conduct, it consists of the following:

If it moves, enslave it.
If it doesn’t, steal it.
If it resists, kill it.
If its no longer useful, destroy it.

The philosophy embodied in these four simple statements is applied uniformly and without exception. From the lowliest psychic slave, to the highest echelon of management, none are immune to the consiquences. Its no mere coincidence that many DCI (directors of central intelligence) die suddenly (accidentally or otherwise), shortly after resigning their appointment.

What follows will amply illustrate how the NSA applies its policies to the more mundane, day to day aspects of managing psychic warfare.

______________________________________________________________________________________
3.2.1

PSYCHICS AS A RESOURCE:

Psychic warfare requires as its prerequisite, a pool of individuals possessing the appropriate psychic abilities. Furthermore, the inevitable genetic variability and consequent inconsistency of psychic aptitude, when coupled with the draconian nature of NSA training techniques (2.1.3, 2.2.2, 2.2.3, 2.3.6) and warfare tactics (1.2.1, 1.2.3), dictates this pool of individuals must be many times larger than the psychic army it supports. Therefore from its inception, NSA scientists and medical professionals recognized that a psychic army of any reasonable size, would very quickly deplete the available pool of individuals possessing natural psychic abilities. Hence the NSA would need to artificially expand the number of children born with useful psychic talents. And thanks to the acquisition of Nazi scientists and medical experts via Operation Paperclip, the techniques and procedures required to create children with artificially boosted psychic abilities, were already sitting on laboratory selves at the US Army biological warfare facility (Fort Detrick, MD.).

The only question left unanswered was, how best to proceed…

_________________________________________________________________________________________
3.2.2

CREATION:

Based on the discussion of psychic abilities in section 1.1.1, there can be little doubt that powerful (psychic) abilities represent a departure from normal human (homo-sapiens) development, and therefore in the strict sense of the term, can be viewed as a type of birth defect. If we accept the concept of extraordinary psychic aptitude as a form of birth defect, it follows that artificially creating children possessing this birth defect will involve the application of drugs, that disrupt normal fetal development.

Teratogen — Definition: A drug or other substance capable of interfering with the development of a fetus, thereby causing birth defects.

The German discovery of techniques required to create children with boosted psychic abilities, was entirely serendipitous. As WWII dragged on and causalities mounted, Nazi leadership became increasingly alarmed by the precipitous decline in the male population available for military service. Even with active recruitment among the conquered nations of Europe, Nazi military manpower requirements still exceeded supply. Clearly, a radical approach was needed to solve this critical shortage. One promising avenue involved treating selected portions of the surplus female population with synthetic analogs of male sex hormones, thereby triggering growth of masculine traits (increased muscle mass, stamina, aggression, etc.). However, when this same synthetic hormone treatment regime was adapted for intrauterine/neonatal use, Nazi scientists got far more than they ever bargained for…

While both male and female children developed as expected, exhibiting accelerated physical maturation, increased strength, endurance, etc. A significant number of female children also exhibited very potent psychic abilities. From there, it was one short step in deductive reasoning that led to the intrauterine/neonatal use of synthetic female sex hormones to create male children with boosted psychic abilities. Even though most children treated with synthetic hormone analogs failed to manifest enhanced psychic capabilities. The military value of those who did, made this area of scientific enquiry a very high priority for both Nazi military leaders, and their American counterparts who subsequently acquired the scientific knowledge and medical techniques (via Operation Paperclip) at the close of WWII.

Although research in this area remains a closely guarded government secret (highly classified), the author theorizes these synthetic hormone analogs interfere with normal fetal development of certain brain structures known as sexually dimorphic nucleus. The consequence being a subtle shift in the neurotransmitter balance within the brain, resulting in heightened psychic capabilities.

In America of the early 1950s, no sane parent would knowingly allow their unborn child to be dosed with teratogenic drugs, thus making that child a possible candidate to undergo NSA sponsored torture and brainwashing. All in preparation for involuntary conscription into a secret government controlled slave army. Yet this was the exact chain of events that had to transpire, if the NSA psychic warfare program were successful. Furthermore, it had to be implemented quickly, and on a massive scale. The key to transforming this nightmarish scenario into a functional reality, is the phrase “knowingly allow”. To the NSA, the answer was obvious, and embodied in a single word: “subterfuge” If parents wouldn’t knowingly sacrifice their children to expand NSA psychic warfare capabilities, then (child) sacrifice would be accomplished without parental knowledge…

The era immediately following WWII saw a veritable explosion of new drugs and bio-active chemicals. Many resulting from war related R&D efforts instigated in the late 1930s and early 1940s. Insecticides such as DDT, and antibiotics such as penicillin revolutionized human civilization, resulting in changed expectations that are still influencing society today. In this environment of sweeping societal transformations, it was a relatively simple matter for the NSA to covertly promote new and novel uses for drugs and other chemicals that would result in creation of children with the required cluster of teratogen induced birth defects. One of the most widely prescribed and thoroughly documented (teratogenic) synthetic hormone analogs of that period was DES (diethylstilbestrol). First synthesized in 1938 at the university of Oxford, and approved by the FDA (food & drug administration) for prevention of miscarriages in 1947, DES was manufactured and sold by pharmaceutical giant Eli Lilly until 1997. Even though the teratogenic properties of DES were (publicly) documented in 1971. It is estimated that between 1941 to 1971, five to ten million pregnant (American) women had taken DES, thereby exposing their unborn children to this teratogenic drug. All of this, in spite of the fact that a 1953 (double blind) study found pregnant women who were given DES had just as many miscarriages and premature deliveries as the control group. Are we to believe the FDA allowed the continued use of an ineffective drug (on pregnant woman) for eighteen years? Or was there a hidden agenda behind their apparent lapse of oversight?

If we assume that only one in every hundred of these (DES exposed) children developed enhanced psychic abilities, and of those, only one in ten were of sufficient strength to be useful in psychic warfare, then this single teratogenic drug added five to ten thousand potential soldiers to the NSA psychic slave army. All without any public awareness of the real motivation behind introduction and aggressive DES promotion. Truly, subterfuge and collateral damage on a massive scale.

DES is typical of first generation teratogenic inducers of psychic abilities. Besides wide spread (covert) promotion of drugs like DES, the NSA exploited other avenues in their quest to create children with enhanced psychic capabilities. For instance, medical staff at facilities for unwed teen mothers were infiltrated (subverted), thereby enabling the covert use of experimental teratogenic drugs on naive underage girls.
It is a safe assumption that in the intervening decades since WWII, NSA controlled pharmaceutical research (3.2.1c) has developed a number of more potent (and narrowly targeted) teratogenic drugs for use on an unsuspecting population.

Along with synthetic hormone analogs (such as DES), certain organic chemicals used in the production of plastics, also exhibit a similar ability to disrupt normal gender specific fetal development. A good example is BPA (bisphenol A). Known to mimic natural hormones since the 1930s, it remains in wide spread use today (including the manufacture of baby bottles and other food containers).

__________________________________________________________________________________
3.1.3

DETECTION:

As explained in section 3.1.2 (above), the vast majority of children exposed to teratogens fail to manifest any above normal psychic aptitude. Consequently, a set of techniques are required to uncover those few individuals who are potential candidates for exploitation by the NSA. Furthermore, since trauma (torture) based brainwashing (2.1.3, 2.2.2, 2.2.3, 2.3.6) is most effective when applied before the child’s personality is fully developed, these techniques must be able to detect latent psychic talent in children at the earliest possible age (preferably before the age of six). To achieve this goal, the NSA employs a number of methods, organized in a layered hierarchy. Were the bottom layer is most sensitive but least discriminatory, and the top layer is most discriminatory but narrowly targeted.

The bottom layer of detection consists of small groups of specially trained psychics, based in several hundred locations across America, evenly distributed by population. Each group spends its waking hours at night, scanning the dreams and emotional context of young children within their respective territories. They are looking for vivid dreams, dreams of future events or distant past events, dreams of distant places, out of body dreams, or “in the body of another” dreams. While not an infallible predictor of psychic abilities, such dreams are a fairly reliable indicator of potential psychic aptitude. When detected, the parent(s) mind is queried to obtain their names(s), and geographical location. All of this information is recorded on a contact sheet, and passed on to the next layer in the detection hierarchy.

The second layer of the detection operation consists of several specialized psychic teams located at the Black Hole (1.2.1), and NSA headquarters (Fort Meade, MD). Using the psychotronics network (1.1.3), these teams will deep probe the memories of all family members of the target child, looking for any unusual physical events, or traces of direct mental influence attributable to the target child. For instance:
A family (or neighbor’s) pet that is normally irritable, but becomes very docile in the presence of the target child (or visa versa).
An older sibling (or parent/grandparent) that always seems to know when the target child is hungry, lost, scared, etc. without any direct physical contact.
A favorite toy that always seems to be near the target child, even though its put away several times a day.
Any other physical/mental phenomena that is not easily explainable.
If probing reveals any unusual incidents, the target child is put on the “watch list” for further observation. In this context, “observation” consists of several unconnected activities, all of which are collateral to the ultimate goal of reliable psychic detection (and acquisition).
These activities are:
Psychics specializing in remote viewing monitor the target child on a daily basis.
Federal, state, and local government/comercial databases are used to build up a detailed family profile of the target child.
Local NSA field operatives (3.2.2) instigate very discrete casual contact with neighbors, friends, daycare staff, baby sitters, etc, looking for any anecdotal evidence in support of psychic abilities.
After a period of observation lasting several weeks to several months, a determination is made whether to proceed, or drop the target child from the watch list. If the decision is made to proceed, the complete dossier on the target child is passed on to the final (top) psychic detection level. If dropped from the watch list, the child will be telepathically probed every 12 to 18 months, until his/her late teens. Periodic probing is useful since some children do not manifest their full psychic potential until the onset of puberty.

The final layer of psychic detection is more concerned with degree or strength of aptitude, rather than mere possession of capability. As with most human abilities, stress or crisis has the effect of amplifying psychic response, thereby providing a reliable estimate of potential value to the psychic warfare program. Therefore, NSA psychologists design an incident, specifically tailored to the target child’s mental/emotional makeup and psychic skill set. This “incident” can take many forms, but always includes the following elements:

Some form of physical or emotional crisis/stress, either inflicted on the target child, or a cherished secondary target (parent, sibling, pet, etc.). An element of imminent (impending) danger, injury, or death. An obvious method or avenue by which the target child can utilize their psychic skills in an attempt to counter, defuse, or deflect the impending event. The precipitating “incident” is directly executed by NSA field operatives (and/or NSA psychics), or they act in the capacity of agents provocateur to initiate the event. In either case, the target child’s response to the “incident” is carefully documented and forms the basis for a final decision as to whether the NSA will proceed with torture based psychic training (2.1.3, 2.2.2, 2.2.3, 2.3.6).

Along with the general multi-layer detection method (outlined above), the NSA employs more narrowly focused detection techniques in those situations were the child’s eventual psychic potential is more certain. i.e. Targeted use of experimental teratogens (on unsuspecting pregnant woman). Another avenue of detection involves monitoring the initiates of certain science based religions and fraternal organizations for any signs of latent psychic talent. In addition, numerous other psychic detection operations are deployed as opportunities arise. For instance, in the 1970s, several self help organizations gained pop culture notoriety for their use of alpha (brain) wave training devices. During their (brief) existence, members were covertly monitored for any indications of enhanced psychic capabilities. Groups involved in occultism, the paranormal, shamanism, and mystery religions, etc. are also routinely monitored for any unusual psychic activity. As are those individuals who purchase books and other precursor materials associated with these practices.

_______________________________________________________________________________________
3.1.4

ACQUISITION:

A number of methods are employed by the NSA to gain control of the children targeted for torture based psychic training and eventual conscription into psychic warfare. Which method is used depends in large part on information contained in the family profile, compiled during the psychic detection phase (3.1.3). For instance, with a low income family, NSA field operatives might arrange for both parents to lose their jobs, thereby throwing the family into the waiting arms of state welfare case workers. Who having received prior warning from the NSA, will declare the family to be dysfunctional, and petition the court to make the children wards of the state. At that point, the target child will be handed over to the NSA for torture based psychic training (2.1.3, 2.2.2, 2.2.3, 2.3.6).

If financial ruin isn’t feasible, then other methods are employed to strip the parents of legal guardianship over the targeted child. Can one of the older siblings be induced (via psychic influence) to juvenal delinquency?
If so, then perhaps child welfare workers can obtain legal custody of the target under the pretense that the parents are unfit. No potential juvenal delinquents in the family? Well then, does the father (or mother) have any repressed tendencies to commit acts of pedophilia (see section 1.2.4b). The list of methods and techniques used to acquire control of a targeted child, is limited only by the imagination of NSA tacticians. And if all else fails, assassination by accident is always an option (1.2.4c). To the NSA, children possessing psychic talent are nothing more than a resource. To be ruthlessly acquired and exploited by whatever means are expedient, including the mass murder of the target child’s entire family (if necessary).

In those situations where the targeted individual is a teenager or adult, a determination as made as to his/her probable future usefulness. Among the factors considered are:
Can the target be trained (enslaved) through trauma based techniques?
Is the target useful as potential breeding stock?
Is the target useful as an experimental test subject (3.2.1c).
Is acquisition of the target likely to cause a public incident, or create an unacceptable security risk?
Are there any unique or mitigating factors involved?
Based on the determination of future usefulness, the target is acquired, or the target is destroyed. In very rare situations, the target is left (more or less) unmolested.

__________________________________________________________________________________
3.1.5

TITLE & DEED:

Governments always desire to have some legal justification for their actions. Especially when those actions are likely to cause public outrage if discovered. This was true of Nazi Germany in the 1940s, and is also true of contemporary American government. Just as Nazi Germany used the trick of labeling captured Russian, Polish & French soldiers as detainees rather than POWs, thereby permitting exploitation as slave labor to build V2 rockets at Mittelwerk, Germany (in direct violation of The Hague and Geneva Convention restrictions on treatment of POWs). So too have American government officials used the label “detainee” rather than POW to describe those individuals held at the Guantánamo Bay detention camp (thereby abridging their legal rights under international law).

Legal maneuvers of this type also serve two distinct ancillary functions. First and most obvious, any legal justification no matter how flimsy or ill-conceived, will blunt the inevitable retribution when questionable (secret) government actions are exposed. Second and perhaps more importantly, legal justification allows those who carry out government policy to rationalize their actions, thereby alleviating any conflict they may feel concerning the nature of those actions. For instance, it is often said that Adolph Hitler killed six million Jews. This is incorrect.
It took the combined efforts of many thousands of ordinary Germans to accomplish the task. Architects and construction workers to build the camps, managers, janitors, and cooks to operate the camps, engineers, brakemen, and dispatchers to run trains, etc. All of these (and more) were required to implement Hitler’s “final solution”. And while the vast majority of those men (and women) knew what they were doing was very, very wrong. Nonetheless, they justified their behavior through the simple expedient of: Obeying the Law & Following Orders.

The NSA also required a creative legalism to justify their arbitrarily imposed custody, and absolute rule over (targeted) psychic children. So the DoD (department of defense) created it by reinterpreting the National Security Training Corps subsection of the Selective Service Act (statute that authorizes involuntary conscription of citizens for military duty). The orignal legislation was singed into law (in 1951) by President Harry S. Truman, the same president who one year later, created the NSA by secret executive order (see last paragraph of section 1.1.2). Within the Selective Service Act, those portions of the law that define who must register for selective service (military daft) use the term:

“male citizens of the United States who are between the ages of 18 and 26”

However, the final sentence of that portion pertaining to National Security Training Corps eligibility reads as follows:

“The President is authorized, from time to time, whether or not a state of war exists, to select and induct for training in the National Security Training Corps as hereinafter provided such number of persons as may be required to further the purposes of this title.”

In other words, the president has the authority to select “persons” for (involuntary) induction into National Security Training Corps, with no limitations whatsoever as to age, gender, citizenship, or even nationality. And where do you suppose those “persons” selected by the president (or his duly authorized representatives) for induction into the National Security Training Corps will be assigned after they are trained? The National Security Agency (NSA) of course. This is the reason why the NSA was created as part of DoD, rather than being a separate civilian intelligence agency (like the CIA).

Through the misapplication of this quasi-legal government statute, without the consent or knowledge of the American people, by means of deceit, color of law, and outright violence, innocent children are being abducted (3.1.4), brutally tortured (2.1.3, 2.2.2, 2.2.3, 2.3.6), and when mature, mercilessly used as soldiers in a secret war (1.2.1, 1.2.3), waged for the sole purpose of enslaving humanity (1.2.4, 1.3.1).

To the American government, these psychic children (and the secret army they will eventually serve) are nothing more than chattel slaves. The NSA holds Allodial title, and the Selective Service Act, serves as the deed of conveyance…

_________________________________________________________________________________________
3.2.1

ANCILLARY PROCUREMENT & TRAINING:

Along with (brainwashed) psychic slaves, NSA psychic warfare operations also require a continuous supply of Suits (mission coordinators, 1.2.2), sexual slaves, and children for use as experimental medical/pharmaceutical test animals. Procurement and training for each of these human resources is fulfilled through a separate, unique procedure, as outlined below:

__________________________________________________________________________________________
3.2.1 (a:)

SUITES:

Mission coordinators (suits) are always male and members of the armed forces. They are not recruited in the conventional sense of the word, instead like the psychic children, they are targeted based on their physical and mental aptitudes/abilities. The NSA is looking for individuals with good physical stamina, along with a history of emotional instability. Such individuals are ideal candidates for trauma based brainwashing, since their physical strength will allow them to survive the rigors of torture, while their lack of emotional stability facilitates the process of mental splitting into separate, manageable personas (2.1.2, 2.1.3, 2.3.3, 2.3.4). When conscripted into the NSA psychic warfare program, all public (government) and private records of their existence are purged.

As with psychic children, trauma based training procedures are carried out in two distinct phases. However, unlike psychic children, candidates for suit training have fully developed, mature personalities, and therefore require far more brutal torture techniques to initiate the process of mental splitting in any reasonable period of time. During phase one, they are routinely hung by their wrists from an overhead hook, and severely beaten for hours at a time. They are starved for several days, then given food containing an emetic drug, thereby inducing uncontrollable vomiting. At the same time, they are given liquids containing diuretic drugs, thereby causing progressive dehydration by inducing massive water loss through urination. Of course, their physical condition is very carefully monitored, and the level of torture is constantly modified to maximize pain and stress, without actually killing them. In this way, the future suit is broken, with a minimum expenditure of time and resources. Like the trauma based training of psychic children, the future suit also receives multiple ECT (electro-shock) treatments to wall off (lock in) personas created by mental splitting (2.2.2). Another form of trauma is unique to suit training. The future suit is repeatedly locked in a padded room (while wearing a straight jacket) for a period of several days. Meanwhile, a team of psychics constantly assault him with sensations of mental, and emotional pain. This aspect of suit training is in many ways, even worse than physical torture. Its designed to make any kind of mental intrusion (by psychics), immediately recognizable and absolutely intolerable. Mental conditioning of this type is imperative, if the suit is to safely handle trained psychic warriors.

Unlike psychic children, suits require just two (split off) personas. The one who maintains control, and the one who is suspicious. Therefore phase two suit training is very abbreviated. The training room contains a single (high backed) metal chair with head, chest, arm, and leg restraints. The chair is bolted to the floor, and wired to deliver electric shocks to various parts of the human body. An elaborate AV (audio-visual) system is employed to supply trigger stimuli and training commands. In early phase two training sessions, both arms are restrained. Over and over he is drilled to maintain control. You must maintain control at all times. No matter what happens, you must maintain control. The thoughts of others are not to be tolerated, you must maintain control. You must maintain control. As the final form of control, the future suit is conditioned to kill everyone in sight, then kill him self. During later training sessions, this is accomplished by leaving one arm unrestrained, thereby allowing the future suit to use a (unloaded) hand gun. The AV system flashes images on the walls of men, women, children (including babies), his parents, grandparents, brothers, sisters, etc. He is trained to point the gun and fire at these images without hesitation or judgment of any kind. The following are typical command sequences from phase two training sessions:

You will maintain control at all times.
You are the only one to control.
No information or knowledge is ever given.
You do not exist in any records.
You will be told your job and given orders for each mission.
You will carry out the mission and maintain control at all costs.
No feelings.
No sorrow, sadness, joy, or happiness.
No pain.
No thoughts.
No emotions.
We have taken your past away.
No memories.
While suits exercise absolute (life & death) rule over psychic warriors, in all other respects, they are as much victims of the NSA, as are the psychics they command.

________________________________________________________________________________________
3.2.1(b:)

SEXUAL SLAVES:

The NSA requires both male and female sex slaves as adjuncts to their psychic warfare program (1.2.4b). Sex slaves ranging from 8 years to 40 years old are needed, depending on the particular mission profile and/or objectives. Generally speaking, underage sex slaves are employed in high value political/corporate blackmail missions, while older sex slaves are used to breakup marriages, ruin professional careers, covertly administer NSA supplied drugs, etc. As with psychic children and suits (mission coordinators), individuals are targeted for (involuntary) recruitment. Orphanages, convents, and state run group homes are all used as recruiting grounds for underage sex slaves. Drug/alcohol rehab facilities, women’s shelters, and vocational training centers are prime locations for recruiting older sex slaves. Since most of these organizations are chronically short of funding, money is the prime motivational factor. Their cooperation with the NSA is justified through the simple expedient, that sacrificing a few individuals will help many that otherwise, would not receive any help at all. Of course, these would be do-gooders meticulously avoid any detailed knowledge of what happens to those “few who are sacrificed”…

Preparation for sexual slavery involves both trauma (torture) based training, as well as certain medical procedures designed to make the slave more useful in their future career. Tonsils (if present) are removed and pharyngeal (gag) reflex deadened to make deep oral penetration easily accomplished. For a similar reason, certain drugs are injected along nerve pathways leading to the anal sphincter. Trauma (torture) based training techniques employed on sexual slaves more resemble that of psychic children, than suits (3.2.1a). However, along with the standard Protector, Empathy, Wanting, Memory, etc. personas of a psychic child (2.2.2, 2.3.3, 2.3.4), several others personas unique to sexual slaves, are also created. Foremost among these are The One Who Enjoys, and The One Who Desires Safety. During phase one (as the base personality is being shattered – 2.1.3, 2.2.2), all pleasurable sensations and memories of joy are sequestered (segregated) within The One Who Enjoys. Then during phase two training, while The One Who Enjoys persona is invoked (via trigger word or keying gesture), the future slave is taught to perform various sexual activities, and fetishes, thereby linking these with sensations of physical gratification and emotional enjoyment. Finally, this persona is merged back into the base personality, creating a slave who is not only proficient at, but also derives intense snesations of pleasure from, any sexual act regardless of how perverse, painful, and/or demeaning.

A sexual slave must work in a variety of situations, from parties and other gatherings where promiscuity is useful, to more traditional one on one assignments where pseudo-monogamy is required. Furthermore (depending on their assignment), they may need to have (manifest) a hetero, homo, bi, or pansexual orientation. The One Who Desires Safety persona is used to control these aspects of slave behavior. This persona is created during phase one torture sessions (2.1.3, 2.2.2), by instructing the future slave to put all of their desires for safety in one place (accompanied by a keying gesture). Later, during phase two training (2.3.1), the persona is trained to associate the desire for personal safety, with overt control and ownership by others. This persona will remain hidden, and exert subliminal influence over the dominate personality. Sexual tasking is accomplished by invoking the persona (using trigger word or keying gesture), then showing the slave a picture of his/her target, accompanied by the phrase: “this person will keep you safe”. In a similar manner, promiscuous behavior is achieved by using the phrase: “There is safety in large groups” or “you are safest among many people”.
As with The Protector persona (2.3.3), once more we see the inside out, black is white logic of human slavery. The quintessential trademark of NSA brainwashing techniques.

________________________________________________________________________________________
3.2.1 (c:)

HUMAN EXPERIMENTATION:

There have been numerous eye witness accounts of facilities in America, where large numbers of children are being held captive in cages. As vile and revolting as these eye wittiness accounts may seem, nonetheless, they are accurate. These children are used as test animals in NSA funded medical experiments and pharmaceutical trails. The children are harvested from the streets of American cities and housed under conditions that closely approximate that of a mass production chicken farm. Large metal sheds are used, with row upon row of wire cages, stacked three or four high. Sanitation is accomplished by twice daily wash down, using a cold water hose. The children are fed and watered using dog bowls. Diet consists of commercial (pellet) animal feed, similar to dry dog food. At one end of the shed, several (FEMA style) single wide mobile modular structures house the operating/examination rooms, pharmacy, and administrative offices. Prior to arrival, the children are injected with a drug that washes away all traces of personality and memory, leaving behind nothing more than a diffuse sense of loss and loneliness. The buildings are eerily quiet, since the children have lost all language skills, and do not even cry…

Hundreds of these facilities are scattered across the American continent…

Unlike surgery performed at hospitals, where long term survival and health of the patient are considered the yardstick of success. Surgical procedures inflicted upon the experimental test children are exploratory in nature. In other words, the procedures are intended to investigate “what if” medical questions. For example, what happens if a certain section of the liver is destroyed? Or what happens if a particular artery (or vein) is removed or blocked? Because many of these children die on the operating table, and those who survive only live for a few days, no attempt is made to maintain antiseptic conditions within the operating room.
Like the cages, a cold water wash down is considered sufficient. Anesthetic is never used because the children do not respond coherently to the sensation of pain. Dead children are stuffed into garbage bags and stacked by the incinerator to be burned at night, when the smoke (and smell) are less noticeable. Pharmaceutical testing is no less cruel or barbaric. The NSA operates in partnership with most American pharmaceutical corporations. The pharmaceutical corporations supply the drugs, the NSA supplies the test animals (children), and they jointly share research data. The NSA is particularly interested in ANY drug or chemical compound that exerts an effect on the CNS (central nervous system).

As a side note: Many American citizens are aware that Canadian prescription drug prices are significantly lower. This is true, even for prescription drugs manufactured in America and exported to Canada. The primary reason for increasing drug prices in America, is a frenzied search for the holy grail of mind altering drugs. A chemical compound that will remove all traces of desire for personal autonomy (free will), while leaving learned physical and cognitive skills intact. This is the motivation behind a covert alliance of American pharmaceutical corporations and the federal government. Although American government could exert regulatory power over consumer prescription drug pricing, it does not choose to do so. In return, pharmaceutical corporations spend billions of dollars on NSA directed mind control research. However, to successfully compete in drug export markets, American pharmaceutical corporations are forced to sell their products in other countries at fair market value. Hence the wide disparity between Canadian and American prescription drug prices. This “devils pact” between drug manufactures and American government also explains why government officials were so quick to act, attempting to bar American citizens from purchasing prescription drugs in Canada. Concern expressed by FDA officials over the safety of (re)imported prescription drugs amounts to little more than a feeble attempt to prop up pharmaceutical industry profits (and NSA mind control research). Remember, this is the same FDA that allowed continued use of an ineffective (but NSA condoned) prescription drug on pregnant woman for eighteen years (3.2.2).

______________________________________________________________________________________
3.2.2

LEGAL FICTIONS:

A number of laws are supposed to limit the type of activities NSA personnel may undertake, as well as the geographic scope of those activities. For example, FISA (foreign intelligence surveillance act of 1978) was originally intended to limit government surveillance of American citizens. However, in recent years, the legislation has been amended and distorted to the point where, in its present form, FISA is little more that a defense for any government surveillance activity (no matter how egregious), and a one_size_fits_all blanket of immunity for the private telecommunications industry. Clearly, in this context, the American government operates under the guiding principal that privacy is a right, exclusively reserved for those who originate, implement, and execute government policy.

As originally enacted, FISA was also supposed to limit the geographic scope of NSA activities. The NSA has employed a different tactic to circumvent this limitation. Domestic surveillance field operatives are not directly employed by the NSA. They work for shell companies, owned by former NSA (or DoD) employees who have taken early retirement, then operate as private contracting companies. While these private companies receive tasking instructions from, and supply surveillance intelligence to the NSA, there is no direct (traceable) connection between the NSA and the domestic surveillance operatives. ALL communications between domestic surveillance operatives and the NSA moves through secure computer links and/or satellite based cell phones. None of the field operatives are even aware of who they are really working for, or where their tasking instructions originate. This same tactic is used to hide ownership of smaller psychic warfare ops centers (see last paragraph, section 1.2.1), and other domestic installations used by the NSA.

As a side note, one particularly intriguing aspect of this domestic network, is the use of purpose built dormitories specifically designed to resemble motels. Many operate under the name “Day Inn”, and are easily mistaken by the casual observer as part of the (non-government controlled) Days Inn nationwide chain of motels. However, the NSA controlled Day Inn motels have several distinguishing characteristics (besides the name) that make identification possible.
The Day Inn lacks the distinctive Sun Burst logo used on Days Inn motel signs.
Even when the parking lot is almost empty, the Day Inn sign will show “No Vacancy”.
These fake motels are found in locations that make no sense from a commercial business perspective. For example, in the middle of an industrial district.

If you try to book a room at the front desk, you will be told that check in is by reservation only.

Many of these NSA controlled dormitories are used to house Suits and Technicians (1.2.2) assigned to the smaller psychic warfare ops centers (see last paragraph, section 1.2.1). While Technicians are civilian contractors, Suits carry DoD (department of defense) identification cards and government issued credit cards.
CAUTION!

Suits have undergone trauma based programming (3.2.1a), and carry concealed hand guns (with silencers). If for any reason they believe their mission has been detected and/or compromised, they are hard wired (brainwashed) to kill them selves (and anyone else around them). For this reason, the author urges EXTREME caution when observing or investigating ANY installation believed to be under NSA control.

Along with the use of shell companies, early retirement of NSA/DoD personnel, legislative perversion, and legal reinterpretation (3.1.5), the NSA also co-ops corporations, small business owners, charitable foundations, and religious institutions into its web of illegal domestic operations. The recruitment tactics include sweetheart bank loans, bribery, blackmail, intimidation, protection from prosecution, sexual pandering, and illicit drugs. However, no mater what recruitment method is employed, the end result is always the same. The targeted organization takes all the risks, and the NSA reaps all the benefits. In this sense, domestic NSA operations quite often bear more resemblance to an organized crime racketeering operation, than anything one would reasonably associate with a legitimate government agency. Regardless of the actual technique, method, or tactic employed by the NSA to accomplish its government mandated objectives. Minimizing any possibility of exposure or traceable connection to illegal domestic activities, is always the agencies first priority and overriding concern. Furthermore, just like any organized crime syndicate, the NSA will take whatever action is necessary (including murder) to guarantee its continued immunity from legal prosecution and/or public retribution.

In conclusion, the NSA psychic warfare program, along with its other domestic operations, are cloaked in nothing more substantial than a thin tissue of lies, subterfuge, and legal fictions…

________________________________________________________________________________________
3.2.3

HVT TECHNOLOGY:

HVT – Acronym: High Value Target. These individuals include politicians, influential journalists, business executives, entrepreneurs, popular entertainers, innovative educators, scientists, etc.

The NSA employs a number of EM (electromagnetic) based technologies on those individuals they consider to be an HVT. Foremost among these technologies is the high power psychotronic transceiver (PT). While the cell phone network is sufficient for wide area coverage and one shot targeted strikes (see 1.2.4c & companion paper entitled “Remote Mind Control”), when long term 24/7 coverage is required, the NSA relies on multiple dedicated PTs, aimed at the HVT residence and/or workplace.

Each PT consists of:
Small dish style transmit/receive antenna
(Fig. 1 below) aimed at the HVT location.
Transceiver electronics package.
Large satellite dish linking PT back into the NSA psychotronics network.

Fig. 1 – Psychotronics transmit/receive antenna

In residential neighborhoods, NSA field operatives (posing as FBI agents) will contact homeowners near the HVT location, asking permission to place a “radio monitoring device” (PT) in a spare bed room for “national security” use. The NSA operatives are always very polite, and offer to compensate the homeowner for use of their bed room (generally $1000 to $1500 per month). With the allure of monthly cash, most homeowners are more than willing to cooperate. Optimal PT targeting involves pointing the transmit/receive antenna (figure 1), through a window having an unobstructed line of sight to HVT location. Alternant PT antenna sites include cell phone towers, high rise building roof tops, and government offices. PT antennas in outdoor locations have a white or gray plastic weather dome covering the dish. In extreme circumstances, the HVT may have as many as 10 PTs encircling his/her location. Besides fixed location PTs tied into the psychotronics satellite network, the NSA also deploys (SWAT style) teams equipped with portable PTs, for use against HVTs in remote domestic or overseas locations. The team will consist of one (or more) Suits (1.2.2, 3.2.1a), several psychics (often brother/sister or twins), and one (or more) techs. Depending on the mission parameters, teams may also include a specialist, trained in psychiatry or internal medicine.

One side effect of PT operation, is a subtle but very distinctive psycho-acoustic phenomena, perceived by the HVT as a high pitched “zipping” sound, lasting mere fractions of a second. These perceived sounds generally happen in pairs (or triplets), with random intervals between pairs. The phenomena is most noticeable in quiet environments (bedrooms, studies, etc.). Detection of this psycho-acoustic phenomena is incontrovertible evidence of NSA targeting. Starting in the early 1990s, hand held devices capable of inducing a deep hypnotic (trance like) mental state, have been deployed by the NSA for use in situations where direct one on one confrontation and/or control of a human target is necessary. The device makes use of an asymmetrical microwave modulation technique to produce TMS (transcranial magenetic stimulation) within the frontal lobes, inhibiting volitional thought, thereby rendering the target immobile and extremely suggestible. A side effect of frontal lobe stimulation by this device, is a very odd visual/acoustical artifact. It consists of a glowing ring of pulsating light, accompanied by a deep (synchronized) throbbing sound. Once the device is switch off, subjects recover full volitional cognition within 30 to 90 seconds.

Another EM based system deployed against HVTs uses directed microwave energy to generate/catalyze free radical cross linking reactions within the human body, thereby damaging key metabolic pathways. The overall result being a rapid decline in health and vitality. The directed microwave generator is tripod mounted, and resembles a stove pipe, approximately 5 foot long and eighteen inches in diameter. The generator has two connections for water cooling lines, and one for high voltage cabling to the power supply cabinet. Peak microwave beam power is around 4000 watts, and is effective at distances of two miles or more. At distances under one mile, effects are prompt and devastating. Primary power is generally supplied from a 220V electric range/clothes dryer outlet. The system operates unattended, with control/management handled via auto-answer modem and dedicated phone line. System components have no markings indicating manufacturer, neither are there any visible model or serial numbers. Apparently, the NSA (and its corporate accomplices) have no desire to take credit for their handiwork…

Several other EM based weapons are also used on HVTs. Most are designed to either disrupt key biological processes (such as heart muscle contractions), or brain neurotransmitters (such as dopamine).

Click Here to view Wikipedia article on Transcranial Magnetic Stimulation (opens in a new browser window).

_______________________________________________________________________________________
3.3.1

SUMMARY:

Throughout this essay, I have tried to present the facts, devoid of any emotional bias. In this effort, I have failed miserably. And as a consequence, I’ve seriously depleted the inventory of derogatory adjectives, available within the English lexicon. Neither do I believe any sane individual could have remained emotionally detached, while traveling the road of discovery that made this essay both possible AND obligatory. However, when stripped of all its secrecy and mystique, the NSA is best characterized as little more than a psychopathic advertising agency, promoting a product (government sponsored slavery) no one really wants. While their marketing techniques are, to say the least, unconventional. Their message is as old as humanity itself. i.e. Do as we say, or we will hurt you.

__________________________________________________________________________________________
3.3.2

DISCLAIMER:

ALL information contained herein is derived from public sources, widely accepted scientific principles, remote viewing, and/or deprogramming sessions of (former) government trained psychics. The author has NO written or verbal agreement with ANY governmental agency forbidding disclosure of the information contained herein. In disclosing this information, the author is exercising (what little remains of) his right to free speech as a private citizen of the United States of America.


THE END OF PART 3

_______________________________________________________________________

● NATIONAL SECURITY AGENCY (NSA) — Part 1—CITADEL OF EVIL

by Steven J. Smith

● NATIONAL SECURITY AGENCY (NSA) — Part 2—A PRISON FOR THE MIND

by Steven J. Smith

● NATIONAL SECURITY AGENCY (NSA) — Part 3—COLLATERAL DAMAGE

by Steven J. Smith

_______________________________________________________________________
DIRECT LINK TO THE ORIGINAL ARTICLE BELOW:

http://www.whale.to/b/national_security_agency_nsa3.html

_______________________________________________________________________

Catholic Confidential | Deplorable Jesuit Secrets Revealed

Catholic Confidential | Deplorable Jesuit Secrets Revealed

38 Noted Historical Figures Confirm!

The recent election of Cardinal Jorge Bergoglio to the position of Pope Francis I, was an unprecedented event the world has never before witnessed. It is the first time in history that a member of the Jesuit order has been elected to the highest position of the Roman Catholic Church. Reactions world-wide varied from jubilation, to matter-of-fact acceptance, to disinterest. These very reactions reveal appalling ignorance of the true nature of the Jesuit order.

Widely regarded as a benevolent missionary order, known for its educational institutions, the Jesuit order, as the Society of Jesus is commonly known, has long played an incredibly influential, albeit secretive, role in the destinies of nations, organizations, and individuals. Rulers, presidents, scholars and even Catholics themselves who are aware of the evil perpetrated by this powerful, far-reaching order, have left on record grave warnings that all should heed.

Following is a compilation of quotes from a variety of sources. Some admit that their own diabolical organizations were modeled on Jesuit principles. Others give warning. A number of those who sought to warn did so at the cost of their lives. WLC would encourage all to carefully study the following material.

“A wise man will hear, and will increase learning;
and a man of understanding shall attain unto wise counsels.”
(Proverbs 1:5, KJV)

Ignatius of Loyola (1491_1556, founder of the Society of Jesus, and First Superior General)

“Nor will it contribute a little to our advantage, if, with caution and secrecy, we foment and heighten the animosities that arise among princes and great men, even to such a degree that they may weaken each other. But if there appear any likelihood of reconciliation, then as soon as possible let us endeavor to be the mediators, lest others prevent us.”1

“Finally, — Let all with such artfulness gain the ascendant over princes, noblemen, and the magistrates of every place, that they may be ready at our beck, even to sacrifice their nearest relations and most intimate friends, when we say it is for our interest and advantage.”2

“Let proper methods be used to get knowledge of the animosities that arise among great men, that we may have a finger in reconciling their differences; for by this means we shall gradually become acquainted with their friends and secret affairs, and of necessity engage one of the parties in our interests.”3

“Immediately upon the death of any person of post, let them take timely care to get some friend of our Society preferred in his room; but this must be cloaked with such cunning and management as to avoid giving the least suspicion of our intending to usurp the prince’s authority . . . ”4

“Putting aside all private judgment we should always be ready to accept this principle: I will believe that the white I see is black, if the hierarchical Church so defines it.”5

“Princes and persons of distinction everywhere must, by all means be so managed that we may have their ear, and that will easily secure their hearts: by which way of proceeding, all persons will become our creatures, and no one will dare to give the Society the least disquiet or opposition . . . Finally, the Society must endeavor to effect this at least, that having gotten the favor and authority of princes, those who do not love them at least fear them.”6

Paolo Sarpi (1552-1623, a Venetian patriot, scholar, scientist and church reformer)

“They are a public plague, and the plague of the world . . . From the Jesuit colleges there never is sent a pupil obedient to his father, devoted to his country, loyal to his prince.”7

“Every species of vice finds its patronage in them. There is no perjury, nor sacrilege, nor parricide, nor incest, nor rapine, nor fraud, nor treason which cannot be masked as meritorious beneath the mantle of their dispensation.”8

Mutio Vitelleschi (1562-1645, Sixth Superior General of the Society of Jesus)

“When Sovereigns require a Jesuit’s opinion on any subject, the Jesuit in question is to report the matter to his Superior, who is to lay it before several Jesuits for discussion. The resolution formed after this consultation is supplied to the Jesuit who has been consulted by the Sovereign.”9

Priest Antoine Arnauld (1612-169410)

“Do you wish to excite troubles, to provoke revolution, to produce the total ruin of your country? Call in the Jesuits . . . and build magnificent colleges for these hot-headed religionists; suffer those audacious priests, in their dictatorial and dogmatic tone, to decide on affairs of State.”11

Michelangelo Tamburini (1648-1730, Fourteenth Superior General of the Society of Jesus)

“See, sir, from this chamber I govern not only to Paris, but to China, not only to China, but to all the world, without any one to know how I do it.”12

Pope Clement XIV (1705-1774)

Following are Pope Clement XIV’s words, upon signing the Bull of Suppression and Extinction of the Jesuits (a bull is the strongest legal document a Pope can issue):

“The suppression is accomplished, I do not repent of it, having only resolved on it after examining and weighing everything, and because I thought it necessary for the church. If it were not done, I would do it now. But this suppression will be my death.13

Pope Clement XIV knew the Jesuits very well, and expected to die at their hands. He was correct. He was poisoned:

“ . . . a peasant woman was persuaded, by means of a disguise, to procure entrance into the Vatican, and offer to the Pope a fig in which poison was concealed. Clement XIV was exceedingly fond of this fruit, and ate it without hesitation. The same day the first symptoms of severe illness were observed, and to these, rapidly succeeded violent inflammation of the bowels. He soon became convinced that he was poisoned, and remarked: ‘Alas! I knew they would poison me; but I did not expect to die in so slow and cruel a manner.’ His terrible sufferings continued for several months, when he died, ‘the poor victim,’ said Cormenin, ‘of the execrable Jesuits to which the Bishop of Pistoia, Scipio di’ Ricci, the nephew and heir of Jesuit General Ricci, fully agreed.’ ”14

Pope Pius VII (1742-1824, the pope who restored the Society of Jesus)

Soon after Pope Pius VII was released from Napoleon’s prison in 1814, he quickly restored the Society of Jesus with the Papal Bull, Solicitudo omnium ecclesiarum [Care of all Churches].

“ . . . if any should again attempt to abolish it [the Society of Jesus] he would incur the indignation of Almighty God and of the Holy Apostles Peter and Paul.”15

John Adams (1735-1826, Second President of the United States of America)

In 1816, John Adams wrote to Thomas Jefferson (third President of the United States), regarding the restoration of the Society of Jesus:

“My history of the Jesuits is not eloquently written, but it is supported by unquestionable authorities, is very particular and very horrible. Their restoration is indeed a step toward darkness, cruelty, perfidy, despotism, death . . . I do not like the appearance of the Jesuits. If ever there was a body of men who merited eternal damnation on earth and in hell, it is this Society of Loyola’s.”16

“Shall we not have regular swarms of them here, in as many disguises as only a king of the gypsies can assume, dressed as painters, publishers, writers and schoolmasters? If ever there was a body of men who merited eternal damnation on earth and in hell it is this Society of Loyola’s . . . we are compelled by our system . . . to offer them asylum.”17

Napoleon Bonaparte (1769-1821; emperor of the French)

“The Jesuits are a military organization, not a religious order. Their chief is a general of an army, not the mere father abbot of a monastery. And the aim of this organization is: POWER. Power in its most despotic exercise. Absolute power, universal power, power to control the world by the volition of a single man. Jesuitism is the most absolute of despotisms: and at the same time the greatest and most enormous of abuses . . . The general of the Jesuits insists on being master, sovereign, over the sovereign. Wherever the Jesuits are admitted they will be masters, cost what it may. Their society is by nature dictatorial, and therefore it is the irreconcilable enemy of all constituted authority. Every act, every crime, however atrocious, is a meritorious work, if committed for the interest of the Society of the Jesuits, or by the order of the general.”18

Adam Weishaupt (1748-1830, a Jesuit German philosopher and founder of the Order of Illuminati)

“The degree of power to which the representatives of the Society of Jesus had been able to attain in Bavaria was all but absolute. Members of the order were the confessors and preceptors of the electors; hence they had a direct influence upon the policies of government. The censorship of religion had fallen into their eager hands, to the extent that some of the parishes even were compelled to recognize their authority and power. To exterminate all Protestant influence and to render the Catholic establishment complete, they had taken possession of the instruments of public education. It was by Jesuits that the majority of the Bavarian colleges were founded, and by them they were controlled. By them also the secondary schools of the country were conducted.”19

Marquis de LaFayette (1757-1834; French statesman and general)

“It is my opinion that if the liberties of this country – the United States of America – are destroyed, it will be by the subtlety of the Roman Catholic Jesuit priests, for they are the most crafty, dangerous enemies to civil and religious liberty. They have instigated MOST of the wars of Europe.”20

Friedrich von Hardenberg (1772-1801, German philosopher)

“Never before in the course of the world’s history had such a Society [i.e., the Jesuit Order] appeared. The old Roman Senate itself did not lay schemes for world domination with greater certainty of success.”21

André Marie Jean Jacques Dupin (1783-1865, French statesman)

“The Jesuits are a naked sword, whose hilt is at Rome but its blade is everywhere, invisible until its stroke is felt.”22

Samuel Morse (1791-1872; American inventor of the telegraph)

“They are Jesuits. This society of men, after exerting their tyranny for upwards of two hundred years, at length became so formidable to the world, threatening the entire subversion of all social order, that even the Pope, whose devoted subjects they are, and must be, by the vow of their society, was compelled to dissolve them. They had not been suppressed, however, for fifty years, before the waning influence of Popery and Despotism required their useful labors, to resist the light of Democratic liberty, and the Pope (Pius VII), simultaneously with the formation of the Holy Alliance, revived the order of the Jesuits in all their ‘power. From their vow of ‘unqualified submission to the Sovereign Pontiff,” they have been appropriately called the Pope’s Body Guard.

“And do Americans need to be told what Jesuits are? . . . they are a secret society, a sort of Masonic order, with superadded features of revolting odiousness, and a thousand times more dangerous. They are not merely priests, or of one religious creed; they are merchants, and lawyers, and editors, and men of any profession, having no outward badge, (in this country) by which to be recognized; they are about in all your society.

“They can assume any character, that of angels of light, or ministers of darkness to accomplish their one great end, the service upon which they are sent, whatever that service may be. They are all educated men, prepared and sworn to start at any moment, and in any direction, and for any service, commanded by the general of their order, bound to no family, community, or country, by the ordinary ties which bind men; and sold for life to the cause of the Roman Pontiff.”23

“And who are these agents? They are for the most part, Jesuits, an ecclesiastical order proverbial through the world for cunning, duplicity, and total want of moral principle; an order so skilled in all the arts of deception that even in Catholic countries, in Italy itself, it became intolerable, and the people required its suppression.”24

Orestes Augustus Brownson (1803–1876, New England intellectual and activist, preacher, labor organizer, and noted Catholic convert and writer)

“Undoubtedly it is the intention of the Pope to possess this country [America]. In this intention he is aided by the Jesuits, and all the Catholic prelates and priests. If the Catholic church becomes predominant here, Protestants will all be exterminated.”25

Abraham Lincoln (1809-1865; 16th President of the United States)

“This war [American Civil War, 1860-1865] would never have been possible without the sinister influence of the Jesuits. We owe it to Popery that we now see our land reddened with the blood of her noblest sons. Though there were great differences of opinion between the South and North, on the question of slavery, neither Jeff Davis nor any one of the leading men of the Confederacy would have dared to attack the North, had they not relied on the promise of the Jesuits, that, under the mask of Democracy, the money and the arms of the Roman Catholics, even the arms of France, were at their disposal if they would attack us.”26

“The Protestants of both the North and South would surely unite to exterminate the priests and the Jesuits, if they could learn how the priests, the nuns, and the monks, which daily land on our shores, under the pretext of preaching their religion . . . are nothing else but the emissaries of the Pope, of Napoleon III, and the other despots of Europe, to undermine our institutions, alienate the hearts of our people from our constitution, and our laws, destroy our schools, and prepare a reign of anarchy here as they have done in Ireland, in Mexico, in Spain, and wherever there are any people who want to be free.”27

“ ‘I am so glad to meet you again,’ he said: ‘you see that your friends, the Jesuits have not yet killed me. But they would have surely done it when I passed through their most devoted city, Baltimore, had I not defeated their plans, by passing incognito a few hours before they expected me . . . ’

“ ‘New projects of assassination are detected almost every day, accompanied with such savage circumstances, that they bring to my memory the massacre of St. Bartholomew and the Gunpowder Plot. We feel, at their investigation, that they come from the same masters in the art of murder, the Jesuits . . . ’

“ ‘So many plots have already been made against my life, that it is a real miracle that they have all failed, when we consider that the great majority of them were in the hands of skilful Roman Catholic murderers, evidently trained by the Jesuits.’ ”28

“I know that Jesuits never forget nor forsake. But man must not care how and where he dies, provided he dies at the post of honour and duty.”29

Charles Chiniquy (1809-1899, Canadian ex-Catholic priest)

“From that, the Catholic priests, with the most admirable ability and success, have gathered their Irish legions into the great cities of the United States, and the American people must be very blind indeed, if they do not see that if they do nothing to prevent it, the day is very near when the Jesuits will rule their country, from the magnificent White House at Washington to the humblest civil and military department of this vast Republic.”30

Brigadier General Thomas M. Harris (1817-1906, physician and Union general during the Civil War)

“The organization of the Roman Catholic Hierarchy is a complete military despotism, of which the Pope is the ostensible head . . . The Black Pope is the head of the order of the Jesuits, and is called a General. He not only has command of his own order, but directs and controls the general policy of the Roman Catholic Church. He is the power behind the throne, and is the real potential head of the Hierarchy . . . There is no independence of thought, or of action, in its subordinate parts. Implicit and unquestioning obedience to the orders of superiors in authority, is the sworn duty of the priesthood of every grade . . . .

“It would seem that the Jesuits had had it in mind, from the beginning of the war [the American Civil War of 1861-1865], to find an occasion for the taking off [i.e., the assassination] of Mr. [Abraham] Lincoln. The favorite policy of the Jesuits [is] that of assassination.”31

Fyodor Dostoyevsky (1821-1881; famous Russian novelist)

“The Jesuits . . . are simply the Roman army for the earthly sovereignty of the world in the future, with the Pontiff of Rome for Emperor . . . that’s their ideal . . . It’s simple lust of power, of filthy earthly gain, of domination – something like a universal serfdom with them as masters – that’s all they stand for. They don’t even believe in God perhaps.”32

Margaret F. Cusack (1829-1899, converted ‘Nun of Kenmare.’) For more on Margaret F. Cusack, click here.

“The great idea of the Jesuit has always been a universal spiritual [and Temporal] monarchy, in which . . . the Jesuit should reign supreme. England has always been the place desired for the base of operations necessary for this end. Hence the blood, the tears shed, and the schemes undertaken in this country by the Jesuit. He has by no means ended his efforts for the subjugation of the world to Rome through England.”33

“When the Jesuit is expelled from one place he is not slow to find another. France may reject him, not without cause, but England opens her arms to him. Catholic Italy may deprive him of the glories of his once famous home in the Gesu, but America opens her doors to him. He is the wandering Jew of the Romish Church; he is followed by the execrations of those by whom he was once beloved, until they discovered his iniquities.”34

Charles Haddon Spurgeon (1834-1892, British Particular Baptist preacher, known as the “Prince of Preachers”)

“Our ancient enemies have small belief in our common sense if they imagine that we shall ever be able to trust them, after having so often beheld the depths of Jesuitical cunning and duplicity. The sooner we let certain Archbishops and Cardinals know that we are aware of their designs, and will in nothing cooperate with them the better for us and our country. Of course, we shall be howled at as bigots, but we can afford to smile at that cry, when it comes from the church which invented the Inquisition, ‘No peace with Rome’ is the motto of reason as well as of religion.”35

Richard W. Thompson (1809-1900, Secretary of the Navy, United States of America)

“[The Jesuits] are the deadly enemies of civil and religious liberty.

“[The Jesuit General] occupies the place of God, and must be obeyed, howsoever the peace and welfare of the multitude may be imperiled, or the nations be convulsed from center to circumference. The society of Jesuits must obtain the mastery, even if general anarchy shall prevail, or all the world besides be covered with the fragments of a universal wreck!”36

“The sovereigns of the ‘Holy Alliance’ had massed large armies, and soon entered into a pledge to devote them to the suppression of all uprisings of the people in favor of free government; and he [Pius VII] desired to devote the Jesuits, supported by his pontifical power, to the accomplishment of that end. He knew how faithfully they would apply themselves to that work, and hence he counseled them, in his decree of restoration, to strictly observe the ‘useful advices and salutary counsels’ whereby Loyola had made absolution the cornerstone of the society.”37

Luigi Desanctis (19th century Ex-Official Censor of the Inquisition)

“All these things cause the Father-General [of the Jesuits] to be feared by the Pope and sovereigns… A sovereign who is not their [the Jesuits’] friend will sooner or later experience their vengeance.”38

“At what then do the Jesuits aim? According to them, they only seek the greater glory of God; but if you examine the facts you will find that they aim at universal dominion alone. They have rendered themselves indispensable to the Pope, who, without them, could not exist, because Catholicism is identified with them. They have rendered themselves indispensable to governors and hold revolutions in their hands; and in this way, either under one name or another, it is they who rule the world.”39

“He who thinks he knows the Jesuits by having read all the books that were written in the past century [the Eighteenth Century] to unmask them, would be grossly deceived. The Jesuitism of that day was an open war against the Gospel and society; the Jesuitism of the present is a slow but contagious and deadly disease, which secretly insinuates itself; it is a poison taken under the name of medicine.”40

  1. B. Nicolini(Italian ex-Catholic. In 1854, published the finest Italian history of the Jesuits in existence.)

“ . . . take the Jesuit for what he ought or appears to be, and you commit the greatest of blunders. Draw the character after what the Jesuit seems to be in London, you will not recognize your portrait in the Jesuit of Rome. The Jesuit is the man of circumstances. Despotic in Spain, constitutional in England, republican in Paraguay, bigot in Rome, idolater in India, he shall assume and act out in his own person, with admirable flexibility, all those different features by which men are usually to be distinguished from each other. He will accompany the gay women of the world to the theatre, and will share in the excesses of the debauchee. With solemn countenance, he will take his place by the side of the religious man at church, and he will revel in the tavern with the glutton and the sot. He dresses in all the garbs, speaks all languages, knows all customs, is present everywhere though nowhere recognized –and all this, it should seem (O monstrous blasphemy!), for the greater glory of God – ad majorem Dei gloriam.”41

“The members of the Society are divided into four classes — the Professed, Coadjutors, Scholars, and Novices. There is also a secret fifth class, known only to the General and a few faithful Jesuits, which, perhaps more than any other, contributes to the dreaded and mysterious power of the order. It is composed of laymen of all ranks, from the minister to the humble shoe-boy . . . These are affiliated to the Society, but not bound by any vows . . . they are persons who will make themselves useful . . . they act as the spies of the order . . . and serve, often unwittingly, as the tools and accomplices in dark and mysterious crimes. [The Jesuit] Father Francis Pellico . . . candidly confesses that ‘the many illustrious friends of the Society remain occult42, and obliged to be silent.’ ”43

“There is no record in history of an association whose organization has stood for three hundred years unchanged and unaltered by all the assaults of men and time, and which has exercised such an immense influence over the destinies of mankind . . . ‘The ends justify the means,’ is his favorite maxim; and as his only end, as we have shewn, is the order, at its bidding the Jesuit is ready to commit any crime whatsoever.”44

“The immense wealth of the Jesuits has been bequeathed to them by wills made at the last hour!”45

Francis Parkman (1823-1893, American historian)

“The Jesuits, then as now, were the most forcible exponents of ultramontane principles. The church to rule the world; the Pope to rule the church; the Jesuits to rule the Pope: such was and is the simple programme of the Order of Jesus, and to it they have held fast, except on a few rare occasions of misunderstanding with the Viceregent of Christ.”46

Hector Macpherson (1851-1924, prolific Scottish writer and journalist)

“So hurtful was the Jesuit Order found to be that, up to 1860, it was expelled no fewer than seventy times from countries which had suffered from its machinations . . . In spite of Continental warnings, England [under Queen Victoria (1837-1901) who opened up communication with the Vatican in 1877 and enabled the Order to carry out its Second Irish Massacre (1845-1850] has become a Jesuit dumping-ground. Those whom other countries have found from sad experience to be enemies, Britain allows to land on her shores, and to carry on unmolested their work of iniquity. We are carrying toleration to excess, and unless there is a change of policy, this nation will one day pay a heavy penalty.”47

Father Jeremiah J. Crowley (1861-1927, American ex-Catholic priest)

“All through the Middle Ages and the Renaissance period the popes kept Italy in turmoil and bloodshed for their own family and territorial advantages, and they kept all Europe in turmoil, for two centuries after the Reformation,—in fact, just as long as they could,—in the wars of religion . . . Their whole policy is based on stirring up hatred and promoting conflicts from which they hope to draw worldly advantage . . . Popes and their Jesuitical agents have been and are the instigators of wars, and while the world is having real pain, Rome is having champagne.”48

“The [Jesuit Superior] General is at the head of this black and mute militia, which thinks, wills, acts, obeys – [as] the passive instrument of his designs. Their whole life must have but one aim – the advancement of the [Jesuit] Order to which they are attached.”49

“How long shall the Roman Catholic Hierarchy play the people for fools? Shall the government be of the people, for the people, and by the people, or by the pope? Let’s not let the pope of Rome name our President for us. Lovers of your country, beware of Jesuitical intrigues, the political power of Romanism, and the honeyed words of politicians reaching after the presidency!”50

Ellen G. White (1827-1915, prolific author and American Christian pioneer)

“ . . . Jesuitism inspired its followers with fanaticism . . . There was no crime too great for them to commit, no deception too base for them to practice, no disguise too difficult for them to assume . . . It was a fundamental principle of the order that the end justifies the means. By this code, lying, theft, perjury, assassination, were not only pardonable but commendable, when they served the interests of the church. Under various disguises the Jesuits worked their way into offices of state, climbing up to be the counselors of kings, and shaping the policy of nations.”51

Edmond Ronayne (1832-1911, former Freemason who served as both Secretary and Master of Keystone Lodge)

“The religion of Masonry is a system of absolute despotism, and like that of Rome, demands a blind unquestioning obedience to all its laws, rules, and edicts, whether ‘right or wrong.’ . . . what a singular commentary on the indifference, the subserviency, or the cowardice of society, that an institution, professedly organized by such cunning knaves [the Jesuits], and for such base purposes, and which has been sustained by fraud, falsehood and deception, from the commencement of its career to the present time, should be permitted today to dictate to, if not virtually to rule the nation, and to create such a dread in communities that even some of the ministers of Christian denominations who detest its vile philosophy, and who would like to see it swept from the face of the earth, are absolutely afraid to mention its name, either in the pulpit, the prayer meeting or the Sabbath school, lest its secret vendetta vengeance might, in some concealed manner, be wreaked upon them.”52

Adolf Hitler (1889-1945, Austrian-born German politician and the leader of the Nazi Party)

“I have learnt most of all from the Jesuit Order . . . So far, there has been nothing more imposing on earth than the hierarchical organization of the Catholic Church. A good part of that organization I have transported direct to my own party . . . The Catholic Church must be held up as an example . . . I will tell you a secret. I am founding an Order . . . In Himmler I see our Ignatius de Loyola!”53

Walther Friedrich Schellenberg (1910-1952, German SSBrigadeführer who rose through the ranks of the SS to become the head of foreign intelligence)

“The SS had been organized by Himmler according to the principles of the Jesuit Order. The rules of service and spiritual exercises prescribed by Ignatius de Loyola constituted a model which Himmler strove carefully to copy. Absolute obedience was the supreme rule; every order had to be executed without comment.”54

Avro Manhattan (1914-1990, a writer and philosopher)

“The Jesuits are one of the largest stockholders in the American steel company, Republic and National. They are also among the most important owners of the four greatest aircraft manufacturing companies in the U.S., Boeing, Lockheed, Douglas and Curtis-Wright.”55

“No political event or circumstance can be evaluated without the knowledge of the Vatican’s part in it. And no significant world situation exists in which the Vatican does not play an important explicit or implicit role.”56

Alberto Rivera (1935-1997, Ex-Jesuit)

“The higher I went in the Jesuit Order, the more corruption I saw within the institution. I was invited to attend a secret black mass by high-ranking Jesuits [including Superior General Pedro Arrupe] in a monastery in the northern part of Spain. When I knelt to kiss the ring of a high official, I saw a symbol on that ring that made my blood run cold. It was a Masonic symbol [the compass and the square]! A thing I hated and I had been told to fight against it . . . I found out the Jesuit General was also a Mason and a member of the Communist Party in Spain.”57

Read an illustrated version of his story here: Jack Chick’s “Alberto”

Watch his testimony here: Ex-Jesuit, Alberto Rivera, and Others Speak on Jesuit Infiltration

Fredrick Tupper Saussy, III (1936-2007, American composer, musician, author and artist)

“…The Roman Inquisition…had been administered since 1542 by the Jesuits.”58

Edmond Paris (1894 – 1970, Author of The Secret History of the Jesuits)

“The public is practically unaware of the overwhelming responsibility carried by the Vatican and its Jesuits in the starting of the two world wars – a situation which may be explained in part by the gigantic finances at the disposition of the Vatican and its Jesuits, giving them power in so many spheres, especially since the last conflict.”59

“The Jesuits…are a secret society – a sort of Masonic order – with superadded features of revolting odiousness, and a thousand times more dangerous.”60

“The Fuhrer had come to power, thanks to the votes of the Catholic Zentrum [Center Party overseen by Jesuit Ludwig Kaas], only five years before [1933], but most of the objectives cynically revealed in Mein Kampf were already realized; this book . . . was written by the Jesuit [controlled] Father [Bernhardt] Stempfle and signed by Hitler. For . . . it was the Society of Jesus which perfected the famous Pan-German programme as laid out in this book, and the Fuhrer endorsed it.”61

Nino Lo Bello (1922-1997, American author and journalist. Specialized in writing about the Vatican.)

“The Pope’s confessor, an ordinary priest, must be a Jesuit: he must visit the Vatican once a week at a fixed time, and he alone may absolve the Pope of his sins.”62

Michael Bunker (American Writer, Historian, Theologian)

“There is a conspiracy against Christendom. . . . But who are Satan’s agents in this conspiracy? The “agents” are the Jesuits. Even though the Jesuits exude vast influence and control in the areas of theology, education, recorded history and current media, I am still perplexed that virtually no literature exists exposing the Jesuit’s influence on mainline Protestantism. . . . In this work, the author uncovers forgotten history regarding the cooperative salvation theology of the Jesuits. . . . From Cain to Charles [G.] Finney, this book proves that modern Protestantism has abandoned the Doctrines of Grace and embraced the [Satanic] doctrines of cooperative salvation.”63

Eric Jon Phelps (1953–, author and protagonist in the Truth Seeker movement in the United States)

“In the Twentieth Century the Jesuits have conducted their Inquisition under the names of Nazism, Fascism, Communism and now Islamic Terrorism with their Inquisitors, Adolf Hitler, Francisco Franco, Josef Stalin and now Osama bin Laden. Today the Black Pope orders his Holy Office of the Inquisition, renamed in 1965, ‘The Sacred Congregation for the Doctrine of the Faith,’ through his International Intelligence Community headed by Papal Knights, including Skull and Bonesman George W. Bush.”

“To the abhorrent Jesuit doctrine of Regicide (the killing of Kings), we must now direct our attention that we may understand an established policy calculated to obtain or maintain the mastery of all nations following well-planned assassinations. In the past, the Order’s assassins were either Jesuits, like Jacques Clement, or killers easily connected to the influence of the Company, men like John Wilkes Booth. Today these professional “terminators” are cleverly distanced from their Masonic master, the Black Pope, and given deceptive titles by the Pope’s internationally controlled Press corps, jurists and historians; such titles as “anarchists,” “nihilists,” “rogue agents” within intelligence agencies, or just “lone nut assassins.” Sometimes these individuals, in fact, do the killing, consciously and unconsciously (as do the programmed “Manchurian candidates”): they sacrifice themselves, die in the act or are punished for their crimes.

“Created by Loyola (1534) and Sanctioned by Paul III (1540), In Seeking to Destroy the Protestant Reformation and Restore the Dark Ages with “The White Pope” Exercising His Temporal Power as the Universal Monarch of the World, Authored the Twenty-Five Sessions of the Council of Trent (1545-1563), and Established Themselves as the Confessors and Advisors of the Monarchs of Europe, Promoting Absolute Monarchial Despotisms through which they Ignited Monstrous Wars, Characterized by Pitiless Massacres of Protestants and Innocents, such as:

The Dutch Revolution 1568 – 1648
The Thirty Years’ War 1618 – 1648
The Puritan Revolution 1644 – 1653
The Seven Years’ (French Indian) War 1754 – 1763

“While Oppressing and Weakening the Peoples of the Nations and the Semitic Hebrew/Jewish Race with the ‘Holy Office of the Inquisition,’ Aided by the Knights of Malta, and later, Scottish Rite Freemasonry, from 1540 to 1773.

“We as God’s people in Fourteenth Amendment America, having received the Lord Jesus Christ as our personal Savior according to His blessed gospel set forth in His infallible Holy Scriptures — The Authorized King James Version of 1611, must repent of our personal and national sins. Then, we must forsake them. Some of those sins are:

  1. Permitting the army of the Black Pope, the Company of the Society of Jesus, to exist, mightily prosper and absolutely control the government of the United States, through its Council on Foreign Relations, within our borders;
  2. Believing the Jesuit-controlled American Press, which has continually lied and deceived us throughout the Twentieth Century;
  3. Permitting the Jesuits’ Federal Reserve Banking System and United Nations to exist within our borders, as these two bodies have successfully destroyed popular liberty (“liberalism”) and the national sovereignty of every nation in the world pursuant to the purposes of the Jesuits’ “Holy Alliance;”
  4. Waiving our Fourth and Fifth Amendment rights (secured by the “declaratory and restrictive clauses” of the Bill of Rights at the insistence of the Baptists of Virginia and so dearly paid for with torrents of blood by our Protestant forefathers) through “filing” our confessions every April fifteenth, paying the heavy and progressive Communist income tax, thereby financing a multitude of sins;
  5. Permitting the drafting, vaccinating and sending of our sons abroad to fight the Pope’s foreign wars (such as the war in Vietnam and the recent wars in Serbia, Iraq and now Afghanistan), resulting in the further destruction of American “liberals” and foreign “heretics” so condemned by the Jesuits’ Council of Trent;
  6. Permitting the Jesuits, in control of the government of the American Empire, to use our military and financial might to enthrone dictators around the world whose first allegiance is to Rome, thereby restoring the Temporal Power of the Jesuits’ “infallible” Pope, returning the world to the Dark Ages;
  7. Consenting to the Jesuits’ Supreme Court decisions in removing the Protestant Bible and prayer from the bulwark of American liberty so hated by the Jesuits — the Public School System;
  8. Consenting to the immigration of millions of Roman Catholics and pagan persons of color whose loyalty to the Pope or their own race, religion and nationality is greater than their loyalty to our Protestant Constitution and republican form of government, thereby creating a multitude of agitations justifying more centralization of power in Washington, D.C., and through amalgamation, the Africanization of the American White Celtic-Anglo-Saxon Race (being historically the greatest enemy of the Jesuit Order) especially its Bible-believing Protestants and Baptists, as intended by the Company of Jesus pursuant to its Jesuit Oath;
  9. Consenting to the Jesuits’ Supreme Court’s several decisions of forced integration resulting in the destruction of both the White and Black races through amalgamation, as the exchange of viruses, bacteria and parasites, unique to each race, creates powerful combinations in the offspring producing a non-resistant, weak and sterile population within five generations;
  10. Consenting to the Jesuits’ Supreme Court’s decision of legalized abortion, resulting in the mass murder of unborn babies, polluting the land with innocent blood, ultimately collapsing the Ponzi Scheme called “the Social Security System” justifying mass murder of the elderly by the coming fascist dictator, “provoking the Lord against us, to consume us, until there be no remnant nor escaping in the land” by means of a massive military invasion composed of a coalition of nations, cleansing the land with the blood of unrepentant and unforgiven American murderers;
  11. Succumbing to race hatred as a result of Jesuit-controlled, Masonic agitators such as the White Knights of the Ku Klux Klan and the Black Nation of Islam, justifying the imposition of martial law when the inner-city race wars begin;
  12. Sheepishly giving up our real wealth, gold and silver coins in exchange for “indulgences” (the Jesuits’ worthless paper money called “Federal Reserve Notes”) and thereby becoming a nation of overworked, unprincipled, money-hungry thieves;
  13. Consenting to the cattle brand of the Jesuits’ “Social Security Number” as a means of identification to be used by their International Intelligence Community, begun by Hitler’s SS at Dachau, it being the forerunner of [WLC’s apology to the reader:The quote was found in this condition and we are unable to ascertain the remaining portion as it was originally penned by the author.]
  14. Obeying the evil 1968 Gun Law of Nazi origin and thereby, upon purchasing new firearms, blindly registering our guns – our Swords of Just Defense – enabling the coming, Jesuit-controlled, White, fascist, military dictator to ultimately take them from us making our annihilation sure, pursuant to the Council of Trent;
  15. Committing a multitude of personal sins, both public and private, insuring that our annihilation will be a righteous act in the eyes of both the risen Son of God and mortal man.”64

Far from being the benevolent, educational missionary society many view the Society of Jesus as being, the Jesuit order is responsible for some of the most heinous acts in recorded history. They have battled truth and righteousness, crushed religious liberty, influenced kings and sought to mold the course of history to carry out their own agenda.65 Now that the visible head of the Roman Catholic Church is himself a member of this order, the power of the Jesuit order is complete.

Let all who love truth, all who love freedom, take heed and beware of the danger now facing the world in the person of Pope Francis I. Error and wickedness will ever seek to use force against truth and righteousness. Now is the time to draw close to Yahuwah, setting aside the sin that doth so easily beset and surrender all to the Creator. He will accept all who come to Him in faith.

“A prudent man foreseeth the evil, and hideth himself:
but the simple pass on, and are punished.”
(Proverbs 22:3, KJV)

1 W. C. Brownlee, Secret Instructions of the Jesuits, (New York: American and Foreign Christian Union, 1857), p. 141.

2 M. F. Cusack, The Black Pope, (London: Marshall, Russell & Co., 1896), p. 86.

3 Brownlee, op. cit., p. 45.

4 Ibid., p. 59.

5 Ignatius Loyola, The Spiritual Exercises of St. Ignatius, tr. Anthony Mottola, (New York: Doubleday Publishers, 1989; originally written in 1523), pp. 139, 141.

6 Brownlee, op. cit., pp. 39 and 143.

7 Mary Frances Cusak, The Black Pope: A History of the Jesuits, (London: Marshall, Russell & Co. Ltd., 1896), p. 356.

8 John Alfred Kensit, The Jesuits: Their History and Crimes, (London: Protestant Truth Society, 1918), p. 30.

9 E. Boyd Barrett, The Jesuit Enigma, (New York: Boni and Liveright, 1927) p. 253.

10 Antoine Arnauld was considered by many of his contemporaries to be one of the most preëminent intellectuals of the 17th century.

11 Hector Macpherson, The Jesuits in History, (Springfield, Missouri: Ozark Book Publishers, 1997; originally published in Edinburgh, 1914), p. 32.

12 Jacopo Leone, The Jesuit Conspiracy: The Secret Plan of the Order, (London: Chapman and Hall, 1848), p. 134.

13 John Dowling, The History of Romanism, (New York: Edward Walker, 1845), p. 604.

14 Richard W. Thompson, The Footprints of the Jesuits, (New York: Hunton & Eaton, 1894), pp. 227, 228.

15 Ian R. K. Paisley, The Jesuits, (Belfast: Puritan Printing Co., LTD., 1968), pp. 9, 10.

16 J. E. C. Shepherd, The Babington Plot, (Toronto, Canada: Wittenburg Publications, 1987), p. 18; quoting a letter dated May 5, 1816.

17 George Riemer, The New Jesuits, (Boston, Massachusetts: Little, Brown & Co., 1971), p. xiv.

18 Charles Chiniquy, Fifty Years in the Church of Rome, (Grand Rapids, Michigan: Baker Book House, 1968; originally published in 1885) pp. 487, 488; quoting Memorial of the Captivity of Napoleon at St. Helena, by General Montholon, Vol. II, pp. 62, 174. Chiniquy was a priest who was framed by the Jesuits for a crime he did not commit. He could not find anyone to represent him because all of the lawyers he approached were too afraid of the Jesuits. Finally, a young lawyer convincingly demonstrated in a court of law his innocence and Chiniquy was declared not guilty, thus saving his life. Had he been found guilty, he would have been sentenced to death. Upon hearing the not guilty verdict, Chiniquy wept. When his attorney asked him why, Chiniquy explained that he was afraid his own life had been purchased at the cost of his defender’s life. His words proved prophetic. His lawyer was Abraham Lincoln. One of the men responsible for Lincoln’s assassination was later tracked back to Vatican City and the pope’s private army.

19 Please see: http://www.zengardner.com/jesuit-pope-agenda-meet-the-templars-knights-of-malta-and-blackwaterxe-exterminators/

20 James L. Chapman, Americanism versus Romanism: or the cis-Atlantic battle between Sam and the Pope, (Nashville, Tennessee: 1856), p. 127.

21 Theodor Griesinger, The Jesuits: Their Complete History, (London: W. H. Allen & Co., 1903; originally published in 1873), p. 654.

22 Burke McCarty, The Suppressed Truth About the Assassination of Abraham Lincoln, (Merrimac, Massachusetts: Destiny Publishers, 1973; originally published in 1924), p. 57.

23 J. Wayne Laurens, The Crisis: Or, the Enemies of America Unmasked, J. Wayne Laurens, (Philadelphia, Pennsylvania: G. D. Miller, 1855), pp. 265-267.

24 Samuel Morse, Foreign Conspiracy Against the Liberties of the United States, (Boston, Massachusetts: Crocker & Brewster, 1835), Vol. I, p. 55.

25 Chiniquy, op. cit., p. 483. See also, The Papal Conspiracy Exposed, by Edward Beecher, (New York: M. W. Dodd, 1855), p. 26.

26 Charles Chiniquy, Fifty Years in the Church of Rome, (London: The Wickliffe Press, Protestant Truth Society), 1885, p. 388. See also footnote 18.

27 Ibid., p. 499.

28 Chiniquy, op. cit., 1968 ed., pp. 493, 501 and 506.

29 Ibid., p. 472.

30 Chiniquy, op. cit., 1885 ed., p. 476.

31 General Thomas M. Harris, “Rome’s Responsibility for the Assassination of Abraham Lincoln,” 1897. See http://www.antichristconspiracy.com/HTML%20Pages/Rome’s%20Responsibility%20for%20the%20Assassination%20of%20Lincoln.htm.

32 Fyodor Dostoyevsky, The Brothers Karamazov, (New York: Random House, 1950; originally published in 1880), p. 309.

33 Cusak, op. cit., p. 285.

34 Ibid., pp. 286 & 287.

35 Charles Haddon Spurgeon, Geese in Their Hoods: Selected Writings on Roman Catholocism, (Publisher unknown, 1873).

36 R. W. Thompson, The Footprints of the Jesuits, (New York: Hunt & Eaton, 1894) p. 59.

37 Ibid., p. 251.

38 Luigi Desanctis, Popery, Puseyism and Jesuitism, (London: D. Catt, 1905; Maria Betts, translated from the original, Roma Papale, 1865), p. 136.

39 Ibid., p. 139.

40 Ibid., p. 138.

41 G. B. Nicolini of Rome, History of the Jesuits: Their Origin, Progress, Doctrines, and Designs, (London: Henry G. Bohn, 1854) p. 42.

42 “Occult” used in this context means secret, hidden, and concealed.

43 Nicolini, op. cit., pp. 45 and 46.

44 Ibid., pp. 495 and 496.

45 Ibid., p. 42.

46 Francis Parkman, France and England in North America, (New York: The Viking Press, 1983; originally 
published in 1865) Vol. I, pp. 1172, 1173.

47 Hector Macpherson, The Jesuits in History, (Springfield, Missouri: Ozark Book Publishers, 1997; originally published in Edinburgh, Scotland, 1914), pp. 148 and 149.

48 Jeremiah J. Crowley, Romanism: A Menace to the Nation, (Wheaton, Illinois, 1912), p. 144.

49 Crowley, Ibid., p. 196.

50 Ibid.

51 Ellen G. White, The Great Controversy, (Deland, Florida: Laymen for Religious Liberty, 1990; originally published in 1888) pp. 234, 235.

52 Edmond Ronayne, The Master’s Carpet; Or Masonry and Baal-Worship Identical, (South Pasadena, California: Emissary Publications, 1988: originally published in 1879), pp. 69, 211, 212.

53 Edmond Paris, A. Robson, tr., The Vatican Against Europe, (London: P. R. MacMillan, Ltd., 1961), pp. 252, 256.

54 Ibid., p. 253.

55 Avro Manhattan, The Vatican Billions, (Chino, California: Chick Publications, 1983), p. 184.

56 Edmond Paris, The Vatican Against Europe, (Springfield, Missouri: Ozark Book Publishers, 1993), p. 308.

57 Jack Chick, Alberto, (Chino, California: Chick Publications, 1979), Part 1, pp. 27, 28.

58 F. Tupper Saussy, Rulers of Evil: Useful Knowledge About Governing Bodies, (New York: HarperCollins, 2001), p. xviii.

59 As quoted on http://www.chick.com/catalog/books/0191.asp.

60 As quoted on http://bibletruth.orgfree.com/articles/QuotesOnJesuits.pdf.

61 Edmond Paris, The Secret History of the Jesuits, (Chino, California: ChickPublications, 1975; originally published in 1965), p. 138.

62 Nino Lo Bello, The Vatican Empire, (New York: Trident Press, 1968), p. 78.

63 Michael Bunker, Swarms of Locusts: The Jesuit Attack On the Faith, (New York: Writers Club Press, 2002), pp. 13-14.

64 Quotes taken from Vatican Assassins: The Diabolical History of the Society of Jesus, by Eric Jon Phelps. This meticulously researched book is extremely difficult to find.

65 “The Black Pope” is a term long applied to the Superior General of the Jesuit Order, a position many contend is actually more powerful than that of the more visible pope. That the Jesuits now have one of their own occupying the papal throne is proof of how powerful the Jesuits have become. 

 

https://www.worldslastchance.com/end-time-prophecy/catholic-confidential–deplorable-jesuit-secrets-revealed.html

PEDOGATE: Women Operatives In Very High Places

PEDOGATE: Women Operatives In Very High Places

Covert Anglo-American Network of “Crown Agents’ Sisters” Revealed

Abel Danger Mischief Makers – Mistress of the Revels – ‘Man-In-The-Middle’ Attacks

Posted: MONDAY, FEBRUARY 22, 2010

Prepared by: Abel Danger


Mistress of the Revels

List (September 15, 2011), of Crown Agents’ Sisters who allegedly use pedophile extortionists and snuff-film patent pools to support ‘man-in-the-middle’ attacks on leaders with an M.O. of Matrix 5 communities (see Marcy below) and command, contract hit and spoliation crews that dates back to the 1629 foundation of the Worshipful Company of Spectacle Makers:

Mistress of the Revels

1. Kristine Marcy (nee McConnell) “[Revised August 10, 2012: Kristine Marcy is a Matrix 5 principal and the 1979 founder and de-facto president of the Senior Executive Service (‘SES’); she allegedly borrowed British Bankers Association money at Libor Minus Sex Per Cent to modify ConAir – U.S. Justice Prisoner and Alien Transportation System – planes for missions such as the Norad Santa exercise of 1996; she allegedly flew ConAir prisoners on furlough to prepare a Libor $118,000 ransom note at a crime scene associated with the snuff film and torture killing of JonBenet Ramsey on Christmas Day 1996; she allegedly used the snuff film to extort national security concessions from JonBenet’s father and Lockheed Martin directors in 1996, including Lynne Cheney and Norman Mineta; she and co-recipients of the Gore Hammer awards, allegedly used Clipper chips and the Nortel-developed Joint Automated Booking Station (JABS) in the spoliation of evidence of the JonBenet murder in Boulder, Colorado in 1996, and the Gareth Williams murder some time in August 2010 in Pimlico, London, U.K.; she allegedly developed JABS for David Blood and Al Gore to authorize serial and/or mass murders of ‘Mindless Breathers – Useless Breeders’; she is allegedly rewarded with other JABS users for the management of evidence at Blood & Gore crime scenes with money laundered through the Department of Justice Assets Forfeiture Fund; she was the 1996 recipient of Vice President Gore’s Hammer Award for Reinventing Government Programs for her work in creating the Justice Prisoner and Alien Transportation System (JPATS – nick named ‘Con Air’); she allegedly organized the theft of PROMIS and its translation into a French version of JABS for La Sûreté du Québec and Francophonie 9/11; she and co-recipients of the Gore Hammer awards, allegedly used the Nortel JABS system in the spoliation of evidence of a home break-in at the former Glyndon property of her brother, Field McConnell; she allegedly conspired with FAA’s Collaborative Decision Makers who also won Gore Hammer awards, to overthrow the United States Government on 9/11; she allegedly sent bogus Con Air passenger manifests and flight schedules to the FAA’s air traffic control headquarters in Herndon, Va., to paralyze blue-team responses to electronic hijacking during the phony Gore Hammer war game on 9/11; she allegedly used Con Air to fly victims to cannibal oath ceremonies at a British Columbia pig farm where they would swear to uphold the principles espoused in Al Gore’s propaganda movie ‘An Inconvenient Truth’; she allegedly conspired with her former SBA loan syndicate client, Wells Fargo, to promote the Al Gore : Inconvenient Truth [Death by Breath?] propaganda on her brother’s birthday October 02, 2007 at the Wells Fargo Theatre in Denver, CO; she allegedly authorized DOJ Pride to set up a ConAir pedophile transport system to entrap and extort KPMG clients at SOS Children’s Villages in the State of Illinois and 130 countries around the world; she allegedly launched DOJ Pride in 1994 to infiltrate Uranian – third sex – entrapment experts into crime scene investigations to accuse the innocent and shelter the guilty; she allegedly used a Federal Bridge Certification Authority to give the U.K. Ministry of Defence an electronic warfare backdoor into the Air Force Special Operations Command and its SBA mentor-protégé programs for ‘Gore Hammer 9/11’; she allegedly converted a Pennsylvania mine to hold pedo-file images for use by her DOJ Pride colleagues to extort pedophile government employees and undermine the integrity of a Federal Bridge Certification Authority (‘FBCA’); she allegedly holds proxy keys to the FBCA which give Barack Obama distance from contract hits such as the Fast and Furious assassination of ATF agent Brian Terry; she is the former Senior Counsel for the Office of Detention and Removal Operations (DRO) of U.S. Immigration and Customs Enforcement (ICE); she allegedly issued time-lapse private keys to the SBA’s extorted 8(a) HUBZone voters to ensure Barack Hussein Obama was fraudulently elected POTUS 44 in November 2008; she allegedly procured time lapse keys for use by a matrix of Her Majesty’s Crown Uranian (see anagram for Manchurian) cells inside DOJ Pride to conceal Paperclip passport frauds exposing Obama as a citizen of the United Kingdom and Colonies (CUKC); she allegedly directs the extortion of man-in-the-middle officials in the U.S. Department of Justice, the Bar Associations of the District of Columbia and the U.S. Court of Military Appeals, and the U.S. Supreme Court; she appears to have used .tv snuff films to extort the Office of Personnel Management into concealing Obama’s ties to a Mau Mau oath-taking family in Kenya; she allegedly linked the U.S. Small Business Administration’s HUBZone Settlements to an E-Comm command center in British Columbia where 9-1-1 operators learn how to stage a murder during the production of a horror film production with unwitting (?) actors or extras; she allegedly formed a joint venture between Macdonald Dettwiler and Associates and the U.S. Justice Prisoner and Alien Transportation System (‘Con Air’) to use Sabre seat reservation technology to monitor the movements of pig farm oath takers; she allegedly used SBA 8(a) mentor-protégé companies to modify an EC135C Speckled Trout aircraft carrying General Henry Shelton and support a Uranian attempt to overthrow of the United States government on 9/11; she allegedly set up a revolving fund (# 15X4275) with bona vacantia – ownerless goods – in a joint venture with Star Chamber insiders, the Treasury Solicitor, Permira (Schroder Salomon Smith Barney in WTC#7) and organized crime groups to finance modifications of aircraft for the 9/11 attacks; she allegedly procured ‘Con Air’ Lear Jet aircraft for use by Bombardier’s homicidal EW pilot, Russell Williams to support the SES Speckled Trout chain of command and the decoy-and-drone maneuvers of 911; she allegedly used USIS files and Canadian Privy Council insider and NAPA vice president Lena Trudeau to create virtual ‘al-Qaeda’ operatives; she allegedly auctioned off SBA 8(a) CDOs just before the 9/11 attacks and assigned patented-device incendiary liquidation rights to D2 Banking and KPMG clients at Canary Wharf; she allegedly used images of Uranian pig-farm oath ceremonies to extort 9/11 cooperation from the likes of Donald Rumsfeld, Dick Cheney, Frank Carlucci, Lynn McNulty, Dr. David Finkleman, Gen. Ralph E. Eberhart, Rear Admiral Gordon Piche, Robert Mueller, Bruce McConnell and Generals Haig, Shelton and Shalikashvili; she is the de facto President and Chief Executive Officer of Washington D.C.-based NAPA (The National Academy of Public Administration); she allegedly infiltrated pig farm Greek Life oath takers into George Washington University, University of Chicago and Northwestern University and University of Hawaii (BA French) and Georgetown University ( MFS, master foreign service); she allegedly exfiltrated U.S. Marshals from Murrah Building OKC before initiating the bombs fraudulently attributed to a subsequently-executed decoy, Timothy McVeigh; we infer from spoliation through pay-per-view encryption that she re-assigned SBA liquidation rights in patent pool devices used on 9/11, including .tv to Crown Agents’ City & Guilds Livery Companies such as the Worshipful Company of Spectacle Makers]”

2. Samantha Cameron (nee ‘Snowy’ Sheffield)
“[Revised July 23, 2012. Matrix 5 wife of the allegedly extorted man-in-the-middle Prime Minister of the United Kingdom, David Cameron; evidence she and her husband were ordered by trustees of the Thomson Reuters Foundation to develop a Carlton Communications snuff-film script – apparently financed by Libor panel banks – for the London Underground bombing of July 7th, 2005; evidence that on 9/11, she arranged multicast of ITV/Carlton idents followed by Naudet Brothers’ snuff-film images relayed via Schroder’s WTC Building #7; evidence her husband and fellow Bullingdon alumna synchronized ITV/Carlton idents with Schroders snuff film to associate ‘Pull it’ of WTC#7 with Twin Towers demolitions; evidence that Thomson Reuters-controlled Livery Companies sent her to New York on Monday September 10, 2001 to prepare a Matrix 5 man-in-the-middle attack on that city’s 9-1-1 operators; evidence that NYC 9-1-1 operators were deceived by 9/11 bait and switch calls; evidence she arranged root authority needed by the Worshipful Company of Spectacle Makers to film the demolition of WTC#7 and thereby confirm the destruction of evidence of Clipper-chip backdoors into the Mayor’s Office of Emergency Management; evidence she tried to establish an alibi for the production of VideoGuard snuff film images with the 9/11 Massive Attack group in New York with Hillary Clinton, Heather Mills and Sarah Ferguson; evidence she conspired with late Bullingdon Club alumnus and former U.K. Minister for War, Jack Profumo, in the use of Entrust public key infrastructure to conceal her Fag Mistress role during the pedophile man-in-the-middle propaganda attacks of 9/11; evidence she adapted a Matrix 5 pedophile-pimping strategy developed by her 17th century ancestor Nell Gwyn to procure VideoGuard-encrypted snuff-film images for the Treasury Solicitor to extort Livery Company support for 9/11 & 7/7 insurance frauds on Lloyd’s of London; evidence she used ‘Jane the Ripper’ oath takers, associated with various City and Guilds’ Livery Companies including The Musicians, to stage a Matrix-5 propaganda massive attack on New York on 9/11; evidence her mother, Viscountess Astor, provided ‘Fag Mistress’ services to Lord Boothby with the Kray Twins in the Astor-Club London of the ‘60s; evidence her ancestor Nell Gwynn provided Bona Vacantia contract-killing services through the Treasury Solicitor to the court of King Charles II; evidence she arranged for her husband to be employed by Michael Green as a ‘Haberdashers Ass’ from 1994 to 2001; evidence she ordered her husband to launder Carlton Communications’ pay-per-view revenues for the 9/11 Massive Attack through VideoGuard encryption networks which he allegedly integrated in the period 1990-1993 with the Bona Vacantia accounts of the Treasury Solicitor; evidence she ordered TSol – a London-based corporation sole – to settle bills presented by ownerless Livery Company special weapons and tactics teams for the murder of Todd Beamer et al. during phony war games on 911; evidence she ordered her husband to co-ordinate the production of Matrix 5 propaganda such as the docu-drama, ‘United 93’; evidence she plays a centuries-old role as ‘Mistress of the Revels’ or ‘agente provocatrice’ for lesbian or pedophile raves where witnesses are hired to entrap and extort future leaders; evidence she provided such services with Tricky’s Massive Attack group to Cameron’s Bullingdon Boys; evidence that her family entrapped David Cameron in a filmed pedophile rave at some time between his introduction to a tradition of pedophile rape and torture (beatings) at Eton College, through his work as a ‘Shipjumper’ with Jardine Fleming in Hong Kong, through his drunken property-smashing orgies at Oxford University’s oath taking Bullingdon Club; evidence that she ordered David Cameron and HSBC-Rothschild bankers to fund ‘ownerless SWAT teams’ to act for the Alliance of Small Island States in 1990 in ongoing man-in-the-middle propaganda attacks on the English Speaking Peoples; evidence that she or her mother ordered David Cameron to orchestrate the Black Wednesday sabotage of the U.K. Treasury [Solicitor] on 16 September 1992 when the pound sterling was withdrawn from the European Exchange Rate Mechanism; evidence of a seditious conspiracy between the Treasury Solicitor, the Cameron, Sheffield, Astor and Rothschild Families and George Soros – a WWII extortionist at a mere 14 years of age – to make a US$1 billion profit by short selling sterling; evidence she worked with Rebekah Brooks and Elisabeth Murdoch in the ’90s on the development of man-in-the-middle propaganda attacks on extorted leaders of industrialized societies to promote the ‘Catastrophic Anthropogenic Global Warming Causes Sea Rising and Flooding of Small Islands in the Age of Stupid’ myth and thereby justify a global tax on breath; Samantha Cameron graduated from City & Guilds’ Camberwell College of Arts; she is the former creative director of Smythson where she allegedly tracked and moved victims of pedophile and lesbian snuff-film raves with dual-use City & Guilds ‘bona vacantia’ products or services such as leather & skin passport covers (Leathersellers), Menzies Aviation weapons cargo and paramilitary-passenger handling systems (Guild of Air Pilots and Air Navigators and Information Technologists) and Newspaper Distribution (Stationers and Newspapermakers); she was allegedly alerted by her City & Guilds lesbian agents that Gareth Williams had enrolled at Central St Martin’s College of Art and Design in London and appeared to have hacked into Matrix 5 AOSIS network which she had helped to set up to launder CO2e money through her family office at D2 Banking Canada Square, Canary Wharf; evidence she procured a continuity of government authority to organize an illegal rave from Miriam Clegg, the Spanish wife of extorted man-in-the-middle Lord President of Council, Nick Clegg; evidence she used that authority to organize a City & Guilds lesbian rave at which Gareth Williams died; evidence she organized non-professional actors associated with Matrix 5 City & Guilds community into ownerless SWAT teams and left clues sufficient for Abel Danger to solve “Case of Haberdashers Ass and Beamer, Todd’ and ‘Case of the Folded Spook’]”

3. Annabel Lucy Veronica Astor, Viscountess Astor (nee 1948 Jones) [CEO of OKA Direct, a home furnishings design company; former owner and designer of Annabel Jones jewellery business in London; mother of wife of British Prime Minister and Conservative Party leader David Cameron, Samantha Sheffield; she is daughter of Timothy Angus Jones and his wife Patricia David “Pandora” Clifford; her mother married secondly in 1961 to Michael Astor, habitué of the Astor Club alleged used by the Kray Twins to take control of the Metropolitan Police and House of Lords through a pedophile protection racket; Astor’s are considered to be the most powerful of the thirteen families or bloodline groups heading up the World Government plan; Astor’s allegedly portrayed as one of the 13 stars on the SES flag; individuals from the 13 families are mentioned in Dope Inc. [Crown Agents] as involved in some aspect of the drug trade: the Astor’s, Bundy’s, DuPont’s, Freeman’s, Kennedy’s, Li’s, Rockefellers, Rothschild’s, and Russell’s; other families also play key roles in the drug trade such as the Bronfman’s, Cabot’s, Shaw’s, Bacons, Perkins, Morgan, Forbes, Cisneros and Oppenheimer’s; Viscountess Astor paternal grandparents were Sir Roderick Jones, the Chairman of Reuters, and the novelist Enid Bagnold; Her mother Pandora Clifford was the daughter of the Hon. Sir Bede Edmund Hugh Clifford (son of William Hugh Clifford 10th Baron Clifford of Chudleigh, a descendant of King Charles II of England) by his wife Alice Devin Gundry]

4. Hillary Clinton (nee Rodham) [Revised December 8, 2012 .. Allegedly uses SOS Children’s Villages to raise children for the pedophile sexual entrapment and extortion of prospective leaders such as Rhodes Scholar and former POTUS man-in-the-middle, Bill Clinton; she allegedly shuffled patent assignments used to build BBC Crimewatch timelines (‘Crimelines’) for murders dating back to at least 1984; she allegedly built Crimelines for the ‘Songbird’ profile executed by a patented guidance and control system in the bomb which demolished the Pentagon’s U.S. Navy Command Center on 9/11; she allegedly shuffled patent assignments for QRS-11 gyroscope sub-assemblies installed on a John ‘Songbird’ McCain weapons platform debris or evidence from which was removed on a Crimeline over the Pentagon Lawn on 9/11; she allegedly engaged in the sexual extortion of Joseph Giroir Jr. (former boss at Rose Law Firm), John Huang (former Commerce Department), John Riady (family partly owns Lippo Group in Indonesia where Barry Soetoro, now Barack Obama, was groomed as a pedophile entrapment expert) and various directors of Tyson Foods Inc., Wal-Mart Stores Inc. and BEI Technologies, Inc; as a patent lawyer, she allegedly assigned time lapse patents for BEI micromachined GyroChip sensors to support remote hijacking of systems related to Aircraft Flight Control, Helicopter Flight Control, Missile and Projectile Guidance, Unattended Guided Vehicle Navigation for Commercial and Military markets for everything from missiles to commercial light and heavy aircraft; as the Junior Senator from New York she allegedly used the Onion Router patent assignment with Sarah Ferguson to co-ordinate attack on Floor 101 of WTC#1 at their meeting the night before 9/11; she allegedly master minded the raid on Ron Brown’s office with T-Force and FBI’s Robert Hanssen to get continuity of government and encryption codes for D2 Banking and 9/11; Crown Agents’ USAID-SBA liquidations; ancestors associated with Oddfellows three-link binder of patents for contract killing; her 9/11 Modus Operandi was allegedly used by Crown Agents in 1836 arson at U.S. Patent Office to convert U.S. patents to exclusive use of City of London livery companies]”

5. Lynne Ann Cheney (nee Vincent) “[PEOC on 9/11 where she disrupted communications between U.S. Vice-President Cheney and U.S. President George Bush; custodian of Lockheed Martin and Access Graphics patent pools used from 1994 to 9/11; her Sisters novel portrays rape and depictions of lesbian sex.]”
 –

6. Sarah, Duchess of York (nee Sarah Margaret Ferguson – Fergie) “[SARAH FERGUSON, LOST OFFICES IN WTC .. Howard Lutnick from Cantor Fitzgerald gave her office in New York on the 101st floor. Andrew flew to the US on 9/11 .. Fergie appointment .. for her Chances For Children charity with office in the World Trade Center KING: The famous doll story, too. They found the doll in the street. FERGUSON: Well, you know, the fact that she survived said to me that Little Red — how is it that my doll, for Chances For Children, she’s a symbol of the charity. KING: There’s the famous picture of the fireman finding her. Did you think that was an omen? FERGUSON: I did, Larry. You know, a lot of people would say, sure, you know, but I do, I really believe that it said to me, and I get Chances For Children up and running and get on an do more work and make sure you can give children a right to a healthy life” .. 1993, the Duchess founded Children in Crisis based in London with two current trustees: Grahame Harding and Paul Szkiler .. grown to help over 250,000 children annually in 10 countries around the world 2004 .. named official spokesperson of SOS Children’s Villages – USA 2006 .. established The Sarah Ferguson Foundation based in Toronto .. serve [exploit and extort] children and families in dire need .. China, Japan, Poland, Mexico, and cities across the United States .. filmed offering access to Prince Andrew for £500,000 .. heard to say “£500,000 when you can, to me, open doors” .. She is seen taking away a briefcase containing $40,000 (US) in cash” .. “The Prince Andrew, Duke of York (born 19 February 1960), second son third child of Queen Elizabeth II and Prince Philip … The Special Representative for International Trade and Investment for United Kingdom at trade fairs the world over .. took over from HRH The Duke of Kent in this role in 2001 .. 1979 Royal Naval College Flight.. signed on for 12 years from 11 May 1979 .. 1980 took the Royal Marines Green Beret commando course .. Invincible serve as a Sea King helicopter co-pilot .. anti-submarine warfare and anti-surface warfare, Exocet missile decoy, casualty evacuation, transport, and search and air rescue .. brief assignments to HMS Illustrious, RNAS Culdrose, and Joint Services School of Intelligence .. flight commander and pilot of the Lynx HAS3 on HMS Campbeltown from 1989 to 1991 .. flagship of NATO force in the North Atlantic from 1990 to 1991 former Senior Pilot of 815 Naval Air Squadron .. finish his naval career at the British Ministry of Defence until 2001, as officer of the Diplomatic Directorate of the Naval Staff .. On 19 February 2010 promoted to Rear Admiral .. Colonel-in-Chief of the Canadian Airborne Regiment (disbanded) [allegedly to create the core team for the 9/11 attack] .. Honorary Air Commodore of the Royal Air Force Lossiemouth; Personal Aide-de-Camp to Her Majesty The Queen; 1993-1999: Lieutenant-Commander, Captain, HMS Cottesmore; Senior Pilot, 815 NAS at RNAS Portland; Directorate of Naval Operations, British Ministry of Defence; 1999-2005: Commander, Diplomacy Section of the Naval Staff .. As the United Kingdom’s special trade representative, Prince Andrew frequently travels the world to promote British businesses .. revealed in the United States diplomatic cables leak [via Julian Assange Onion Router and pedophile network] Prince Andrew .. discussing bribery in Kyrgystan and the investigation into the Al-Yamamah arms deal and alleged kickbacks a senior Saudi royal had received in exchange for the multi-year, lucrative BAE Systems contract to provide equipment and training to Saudi security forces .. Prince Andrew also tours Canada to frequently undertake duties related to his military role there. Rick Peters, the former Commanding Officer of the Royal Highland Fusiliers of Canada stated: “[Prince Andrew]’s very well informed on Canadian military methods” … Freeman of the Worshipful Company of Shipwrights]”

7. Mary Harron “[Born in Ontario, Canada, in a film and theatre family; St Anne’s College, Oxford University; dated Tony Blair; moved to NYC into 1970s punk scene; first interview of Sex Pistols; 1980s drama critic for The Observer in London; executive producer The Weather Underground, directed TV episodes of Oz, Six Feet Under, Homicide: Life on the Street, The L Word and Big Love; currently developing film based on book Please Kill Me which details the 1970s New York punk scene; first movie, I Shot Andy Warhol 1996, story of Valerie Solanas who shot Andy Warhol and wrote SCUM Manifesto, a book detailing her ideas for ridding the world of men; second movie, American Psycho 2000 graphic descriptions of torture and murder by Patrick Bateman (Christian Bale), wealthy broker working at the fictional mergers and acquisitions firm Pierce & Pierce; The Notorious Bettie Page 2005, about 1950s pinup model a cult icon of sexuality who popularizes pornography]”

8. Theresa Emerson (nee Yeuk-Si Tang) “[Husband is David Emerson, former Canadian foreign minister; “son-in-law of China”; he was director of MDA, the co-developer with SBA 8(a)’s Femme Comp Inc of the Onion Router for MCOINIII attacks on Allied naval ships and Final Approach to attack aircraft and co-developer with Countrywide of MindBox debt recovery software used through D2 Banking 9/11, Fannie Mae and BP-Deepwater Horizon bordereaux insurance frauds.]”

9. Linda Wright (nee Pickton) “[Revised December 11, 2011. Matrix 5 principal and sister of the allegedly extorted man-in-the-middle brothers, Dave and Willie (Robert) Pickton; she was allegedly given the unlawfully-delegated (ultra vires) Star Chamber authority of Canadian Privy Councilor, HRH Prince Philip, the Duke of Edinburgh, then President of City and Guilds, to hire guildsmen and women to film guests – including RCMP officials – at Piggy’s Palace Good Times Society cannibal feasts in B.C.; she allegedly used this authority to launch Matrix 5 propaganda attack on trustees of the RCMP’s pension and insurance funds; in 1996, she allegedly extorted her indebted brothers into running Piggy’s Palace (registered by the Canadian Privy Council in 1996) as a non-profit society intended to “organize, co-ordinate, manage and operate special events, functions, dances, shows and exhibitions on behalf of service organizations, sports organizations and other worthy groups”; she allegedly hired tradesmen through the Guild of Professional Home Services to hack domestic security systems through AT&T’s Clipper Chip and allow 9-1-1 operators to monitor and disrupt crime-scene investigations into B.C.’s pig-farm oath ceremonies (to 2001) and the murder of JonBenet Ramsey in 1996; she allegedly used her current Guild law-firm partner, Gordon H. Andreiuk – formerly employed at Ottawa’s Communications Security Establishment – to work with Crown Sister’s U.S. triple agent Robert Hanssen on the development of Clipper back doors into 9-1-1 emergency communications; she was the alleged fiduciary (or ‘off-book’ community organizer) of Matrix 5 “special events” at Piggy Palace–a converted building at the hog farm; she allegedly paid her distressed-debt brothers to stage drunken off-campus raves featuring “entertainment” by Downtown Eastside prostitutes orchestrated by lesbian prisoners on furlough from jails in Canada or America (Karla Homulka?); she allegedly knew that the women – many sacrificed in cannibal oath taking ceremonies – would not be missed, particularly because trustees of the Vancouver Police and RCMP pension funds had been tricked or extorted into investing in the mortgage on the development of the pig farm barn for the cannibal raves; soon after Piggy Palace opened in 1996, she and her brothers were sued by Port Coquitlam officials for violating city zoning ordinances; although she had the property zoned for agricultural use, she had “altered a large farm building on the land for the purpose of holding dances, concerts and other recreations” that sometimes drew as many as 1,800 persons; she allegedly arranged for her brother Willie to face 27 counts of first-degree murder related to women, mostly drug-addicted prostitutes, who disappeared from Vancouver’s seedy Downtown Eastside in the 1990s; she allegedly extorted VPD and RCMP officials to keep her out of court as a witness even though she must have known the women were disappearing on her property; as a Kerrisdale realtor, she was a best (?) friend of Carole Taylor (former Vancouver City councilor) and Nancy Campbell while their husbands Art Philips and Gordon Campbell were creating bcIMC – perhaps the world’s first pooled pig-farm pension plan to kick-back major crime-scene benefits to a city police force; following a New Year’s Eve party on December 31, 1998, she and her brothers were slapped with an injunction banning future parties, the court order noting that police were henceforth “authorized to arrest and remove any person” attending public events at the farm; her “society” finally lost its nonprofit status in January 2000, for failure to provide mandatory financial statements”; she told the RCMP that her pig farmer brother Willie was mentally “slow”; she contradicted herself by saying he wasn’t slow and he was good mechanically; she said he quit school at the age of 16 to focus on farming and didn’t do very well academically,”; she allegedly hired extortionists through Clipper Ripper Guilds, including Air Pilots and Air Navigators and Professional Home Services, to commission and bug Boeing headquarters before 9/11 and conceal a Matrix 5 man-in-the-middle propaganda attack on the United States government by City of Chicago and Vancouver Settlement Movement insiders; she allegedly conspired with the CAI Private Equity Group and insiders of the Ontario Teachers Pension Plan and the B.C. Investment Management Corporation (‘bcIMC’) to become controlling ‘pig-farm’ investors in Macdonald Dettwiler and its MindBox, BC OnLine and Instrument Approach Procedures services which would be needed to support Chicago Boeing’s 911 attack; after her parents died, she set up Dave Pickton to handle the business end of things and tell Willie Pickton when to go to bed at night; she placed her brother in a mobile home on the Dominion Avenue property to run a small-scale piggery and slaughter operation; she arranged for Willie Pickton to mortgage his share of the larger Dominion Avenue property to the lawyer Peter Ritchie for $375,000 in April 2002 in the form of a demand loan as Ritchie’s retainer; she arranged for Willie’s lawyers to launch a Robotham application in 2002, asking a judge to order him to receive a publicly funded defence; she had MDA MindBox and BC OnLine land title records ‘adjusted’ to show a long list of charges, mortgages and judgments registered against the two properties, often against Pickton’s share and most pre-dating the government’s mortgage; she and David Pickton, for example, registered a mortgage on the pig farm itself through a numbered company in 1998; she also registered a mortgage in 1998 on the smaller Burns Road property, this time keeping the ownership with her brothers to stay at arm’s length from the alleged Matrix 5 oath-taking ceremonies; she told the government that if it wanted to foreclose on the properties it would have to take her and her brother to court and apply to force a sale because of their joint ownership; she reminded government insiders of the rule of “first in time, first in line,” meaning that earlier creditors would be paid before the province; she extorted B.C. government insiders to use bcIMC securities to put a mortgage worth $10 million with no interest rate and no repayment schedule on the pig farm including the Dominion Avenue and Burns Road properties where both mortgages carry Willie’s signature; she used the money to cover the publicly funded defence of her brother Willie; she therefore ensured that funds were available to pay the lawyers to maintain Willie as a cutout for the lesbian and pedophile communities of Matrix 5; she had the mortgage registered on the suburban Port Coquitlam property and a nearby smaller parcel, on Feb. 28, 2003, a year after police raided the farm and arrested Willie; she arranged for the lender to be listed as the B.C. Crown, represented by the attorney general, where a lawyer in the ministry’s legal services branch, authorized the registration in a Feb. 27 2003 letter to the New Westminster land title office; she and her fellow Crown Agents’ Sisters, allegedly extorted control over New Westminster land title office through co-conspirator, Nancy Campbell, a member of bcIMC; she has allegedly used MDA’s 9-1-1 and MindBox automated [pig-farm] debt recovery system to entrap and extort top officials and consultants in Fannie Mae and Freddie Mac, including Newt Gingrich]”

10. Vicky Huhne or Pryce (nee 1952) “[Revised February 26, 2012. Former senior economist and consultant to the allegedly extorted man-in-the-middle clients of KPMG; she allegedly used ‘Worshipful Time Lapse Companies’, including Management Consultants and World Traders with her erstwhile KPMG colleague Michael Peat, to arrange a 30 hour time-lapse tax shelter through 9/11 to entrap and extort the custodians of the Queen’s Privy Purse and the bona vacantia accounts of the Duchy of Lancaster; she allegedly used the Federal Bridge Certification Authority to trigger Son of BOSS tax shelters for client insiders on 9/11; she is the former wife of allegedly extorted Chris Huhne, the recently resigned Secretary of State for Energy and Climate Change; she allegedly entered into a triangular Uranian relationship with her former husband’s lover, the bisexual Carina Trimingham; she was recently charged with her ex in perverting the course of justice; she is possibly an illegitimate Greek-born (1953) daughter of Prince Philip, the Grand Master of the Guild of Air Pilots and Air Navigators on 9/11, and an underage mother; she is the former Master of Worshipful Company of Management Consultants; she allegedly worked as an UK Government Economic Service insider to build a covert ‘chat room’ with the Treasury Solicitor for 9/11; she is an LSE Fabian who has allegedly been engineering predatory credit-default swaps in City & Guilds supply chains; she has allegedly enriched KGEN lesbians through the Family Offices of D2 Banking at Canary Wharf; she allegedly set up tScheme / DEADF007 authorities for Jardine Fleming and its ‘Auld Alliance’ families; she allegedly arranged bogus “bordereau” insurance cover for ‘liquidation’ of extorted borrowers in re Exxon Valdez, Military Bank, Williams & Glyn’s Bank, Royal Bank of Scotland, the Department for Trade and Industry and FTI; she is a reviewer for the Internet Watch Foundation and an alleged practitioner in the dual use of the Federal Bridge to monitor and entrap NetFlix viewers of child pornography]”

11. Miriam Clegg “[Revised September 11, 2012. Matrix 5 principal and Femme Comp wife of the allegedly-extorted man-in-the-middle Nick Clegg, Minister for Constitutional and Political Reform in the U.K. coalition government of David Cameron; she allegedly used Alpine RapidEye surveillance and Onion Router technology to relay a license to kill Saad al-Hilli – a prospective whistleblower to the decoy-and-drone flying events of 9/11; she allegedly ordered al Hilli killed to stop him from revealing her client’s – British Bankers’ Nadhmi Auchi – escrow agreements with Julian Assange and Macdonald Dettwiler and Associates – Canada’s RapidEye contractor – to relay encrypted Onion Router license-to-kill messages for al-Qaeda hit teams on 9/11; she allegedly extorts her husband in his multiple roles, including a British Liberal Democrat politician, the Deputy Prime Minister of the United Kingdom and the Lord President of the Council; she allegedly ordered her husband to have code breaker Gareth Williams tortured and killed by suffocation in a hockey bag after his DEADF007 signature was found in the Stuxnet/Flame malware of logic process controllers Iran’s uranium enrichment program; she allegedly ordered her husband and his D2 Banking colleagues at Canada Square to try and snuff out traces of Flame malware used in the May 9 sabotage of Sukhoi Superjet; she was a Partner and head of international trade practice for multi-national law firm DLA Piper (2006-2011); she allegedly co-ordinated or extorted DLA Partners, Michael Lester, the former BAE Systems group legal director, and Frank Menaker, the former Lockheed Martin general counsel, into the payment of $400 million hush money to the DOJ Forfeiture Fund for the Saudi warplane bribes; she allegedly used her husband’s office to procure Bessemer’s VeriSign keys to the Federal Bridge and a Silent Witness role in the spoliation of evidence of Bessemer agents at the spy-in-the-bag (Gareth Williams) crime scene; she left Foreign Office in 2006 as an expert in the Middle East peace process and the racketeering arbitrage of the UN Oil-for-Food program under Robin Cook who was allegedly the victim of a patented hit on 6 August 2005; she allegedly extorted Cook as the Lord President of the Privy Council between 8 June 2001 to 18 March 2003; she’s allegedly cool at husband’s “no more than 30 “sexual encounters” which AD suspects include abuse of children in front of a video camera but outside the reach of Common Law; her husband studied the genocidal Deep Green child-killing movement at University of Minnesota in 1990; her husband interned in New York under the homosexual entrapment expert Christopher Hitchens; her husband moved to Brussels into G24 where he allegedly trained for the 911 attacks through the coordinated use of PKI and patented devices to control airline supply chains to former Soviet Union and Transport Corridor for Europe, the Caucasus and Asia; her husband took a second master’s degree at the College of Europe in Bruges where he and she appear to have been targeted for Dutroux-style pedophile entrapment; her husband’s great-great aunt Moura Budberg was mistress of Sir R. H. Bruce Lockhart, a double-agent for both the Soviet Union and British intelligence who served the two Odd Fellows – Winston Churchill and Franklin D. Roosevelt – who decided to nuke Hiroshima and Nagasaki; she is a former senior adviser in cabinet of EU external relations commissioner Chris Patten and the cabinet of Benita Ferrero-Waldner who was former Chef de protocole for Secretary General Boutros-Ghali at the UN in New York during the Rwanda Genocide; she was responsible for EU relations for the United States and the Middle East; she joined DLA Piper EU, Competition and Trade practice in London as a senior consultant; she is an expert in EU law and trade in the telecommunications and energy sectors; she is a former European Commissions’ leading trade negotiator at the WTO on telecommunication, energy, postal, construction and information services; she is former competition and regulatory lawyer for BT in Brussels; she has a masters degree from the College of Europe in Bruges (Belgium); she is a senior associate member of St Anthony’s College, Oxford; she was allegedly extorting Dr. Patrick Van Eecke as the man-in-the-middle of DLA Piper’s Internet law group who specializes in Mozilla open-source software, e-commerce, e-government, digital signatures and PKI, data protection, cyber-criminality and data protection; allegedly extorted staff at D2 Banking and PKI Sevices, Canary Wharf, and the U.S. Department of Commerce’s National Institute of Standards and Technology; allegedly authorized development of plaintext injection attacks against SSL to fool users into thinking session is secure and convert session to a true man-in-the-middle attack through Mozilla, VeriSign and Entrust; she allegedly created rogue CAs in Livery Company supply chains to allow Sisters to intercept traffic to a secure Web site and steal or plant sensitive information such as passwords and credit card data or phony clues; allegedly managed transition of security industry has from flawed MD5 to equally flawed SHA-1; she allegedly authorized Entrust to infiltrate the ePassports EAC Conformity & Interoperability Tests in Prague, Czech Republic and allow EU to move Matrix 5 pedophile assets and evade interception; allegedly allowed Entrust to build backdoor public key infrastructure (PKI) into the open-source community through Sun Microsystems, Inc. and the Mozilla Foundation; she allegedly authorized Silent Witnesses on the FBCA to ‘hijack’ AA Flight 77 in a Free Flight patented hit of pilot Captain “Chic” Burlingame (USNA 1971) and his crew and passengers; she and her fellow Crown Agents Sisters must now await reprisal by the late Captain Chic’s fellow Marines – Semper Fi]”

12. Baroness Sue Garden (nee Button) “[Wife of late 9/11 war-game maestro Tim Garden; he was Director of Royal Institute of International Affairs at Chatham House, London; from mid 1998, he undertook projects for the British Government [Crown Agents], the US Department of Defense and NATO; he was Visiting Professor at the Centre for Defence Studies at King’s College London from 2000, engaged in research projects on improving European defence capabilities, Defence Diplomacy, interoperability for NATO forces and counter-terrorism; he was military advisor on BBC television series Crisis Command and his publications include: Can Deterrence Last? and The Technology Trap; he gave [allegeldy false] evidence to Defence Committee on the new threats after 11 September 2001; she set up Financial Services Group of Livery Companies; House of Lords EU sub-committee for Home affairs report on cyber attack; Volunteer Citizens’ Advice Bureaux, welfare counsellor, military caseworker; 1988 – 2000, advisory until 2008 in City & Guilds vocational qualifications for Oddfellow Security Professionals and other illegally-bonded (?) users of Onion Router encryption; member World Traders’ Livery Company since 2000, Master 2008-09, spokesperson in Lords for Children, Schools and Families]”

13. Cherie Blair (nee Booth) “[Her MitM husband Tony Blair placed lesbian onion ring in GCHQ in 1997 to monitor pedophile trade; Oracle-LSE For You, Matrix Terrorists, Law of the European Union, European Convention on Human Rights]”

14. Jamie Gorelick “[Revised June 21, 2012: Presently, Gorelick represents BP in its sabotaged defense against Deepwater Horizon related lawsuits co-ordinated through Entrust PKI by Lena Trudeau; Gorelick is a former director of Schlumberger (the 40% owner of Transocean, the owner/operator of the Deepwater Horizon and alleged sponsor of a phony cat-bond arranged through D2 Banking, Canada Square, Canary Wharf); she allegedly authorized Matrix 5 saboteurs and SWAT teams, apparently commanded by the sexually-extorted former CIA Director John Deutch, to place customized dial-a-yield chemical cutter devices in various WTC box columns and Lloyd’s Register/Martec incendiary bombs on the Deepwater Horizon; she allegedly co-sponsored cat bond for total loss of DH rig a few weeks before the total loss; she allegedly cancelled DH Cement Job and pulled Schlumberger crew off the rig without recording the CBL and just prior to sabotage and the filing of the phony cat-bond claim on Lloyd’s Names; she was Deputy Attorney General of the United States during the Clinton administration; she banned the use of strong encryption; she called for adoption of key-escrow Entrust developed by Lena Trudeau for the Canadian Privy Council and John Deutch at CIA to support MitM attacks on America; she allowed Matrix 5 assassins and saboteurs to obtain Federal government access to encrypted communications; co-founder of DOJ Pride with Kristine Marcy who allegedly gave the lesbian, pedophile Janet Reno access to children moved by JPATS (`Con Air’) through the privatized prison system; she allegedly spoliated evidence of Matrix 5 1993 contract hits of Vince Foster and the black British pedophile oath takers at Waco; she allegedly stole a copy of Promis software with Kristine Marcy and translated it into French for integration into Entrust virtual war rooms and use in Daubert defense of terrorists and spies; she was appointed by the anthrax-extorted former Senate Democratic Leader Tom Daschle to serve as a commissioner on the National Commission on Terrorist Attacks Upon the United States; her association with major tragedies and high-profile American scandals of the past two decades has led some in the press to dub her the “Mistress of Disaster”; former Vice Chairman of Federal National Mortgage Association (Fannie Mae) from 1997 to 2003; she allegedly infiltrated Fannie with Matrix 5 8(a) lesbian saboteurs to drive credit-default frauds through MindBox and trigger automated cat-bond debt recovery from bankrupts during the so-called Global Financial Crisis; at Fannie, she served alongside former Clinton Administration official Franklin Raines who benefited from the 911 murder of Carlton Bartels with a subsequent interest in Bartels’ CO2e patent; she allegedly used Entrust to execute and conceal Fannie Mae $10 billion accounting frauds; in her op-ed letter in the Washington Post she states that: “At last week’s hearing, Attorney General John Ashcroft, facing criticism, asserted that ‘the single greatest structural cause for September 11 was the wall that segregated criminal investigators and intelligence agents’ and that I built that wall through a March 1995 memo.”; she used Entrust’s “Gorelick Wall” in a Tomoye virtual war room to block anti-terror investigators from accessing the computer of Zacarias Moussaoui, the 20th hijacker who was then in custody on an immigration violation enabled by Kristine Marcy; she used Entrust “Gorelick Wall” to block investigation into contributions to the Clinton-Gore Presidential re-election campaign from foreign sources involving the likes of John Huang and Charlie Trie where Entrust identities were hidden by straw donors.]”

15. Dame Stephanie “Steve” Shirley “[Revised January 17, 2012. First Master of the allegedly extorted men-in-the-middle of the Worshipful Company of Information Technologists (WCoIT); she funded the Company’s City base to the tune of £5 million; she was allegedly transported to Britain by Crown Agents’ operatives in Interpol as an unaccompanied Kindertransport child refugee; she was alleged hired as a spy to intercept post-war communications relating to Kindertransport and Interpol’s pedophile trade at the Royal Mail’s Post Office in Dollis Hill, London; she was allegedly financed by Crown Agents as the founder of the software company, Flexible Information (F.I.) Group (later Xansa, acquired by Steria) in 1962; she was told to employ only women and allegedly trained a significant number of lesbian pedophiles in the use of computer encryption to support man-in-the-middle attacks on government, business and industry leaders; she adopted the name “Steve”, apparently to show contempt for men and women in the Judeo-Christian, family-based heteropatriarchal societies of what Churchill called the ‘English Speaking Peoples’; she began infiltrating radical feminists into the City and Guilds after gaining the Freedom of the City of London in 1987; she allegedly used her £150m wealth to buy into – and take control of – charities during her retirement, including the Worshipful Company of Information Technologists (‘WCIT’) and the Oxford Internet Institute, part of the Oxford University through the Shirley Foundation; she is the alleged sponsor of DK Matai and D2 Banking’s digital data archives of pedophile snuff films; she allegedly procures D2 Banking content through the University Settlement Movement in London and Chicago, the Mormon’s Bountiful polygamist community in British Columbia and the SOS Children’s Villages headquarters in New York; she is the head of Shirley Trust; she is the radical feminist patron of the think-tank Tomorrow’s Company; she was born in 1933 during the last year of Lustmord and hyperinflation in Weimar Republic which we allege was orchestrated by Crown Agents and Interpol pedophiles using the Playfair cipher to conceal the movement of orphaned children through the Treasury Solicitor’s bona vacantia accounts.]”

16. Cressida Dick (nee Dick) “[Revised July 8, 2012. Cressida Dick is a Matrix 5 principal and an alleged early adopter of the Joint Automated Booking Station JABS for spoliation of evidence at crime scenes associated with murder-for-hire; she allegedly extorted insider of the Thomson Reuters’ Libor bank cartel to fund lesbian-controlled P3 construction contracts; she was an alleged lesbian principal in a Libor contract for the use of a “Gold Room” JABS to coordinate the 2005 London Underground bombing campaign; she allegedly used the Gold Room to coordinate the July 22nd murder of prospective Gold Room whistleblower, Jean Charles de Menezes, a Brazilian technician who had installed ADT CCTV cameras which generated images of the real July bombers; she allegedly used a JABS network set up by Wells Fargo at Canada Square in an attempted contract hit of the Russian banker, German Gorbuntsov; she is a sponsor of an alleged Common Purpose conspiracy, having attended a course in 1995/96 while serving in Thames Valley Police; she is allegedly engaged with fellow Common Purpose leaders in the lesbian and pedophile extortion of heterosexuals under the guise of promoting diversity; she allegedly first used JABS to conceal CCTV images associated with the murder of Princess Diana; she allegedly used a JABS installation at Wells Fargo’s Canada Square offices, Canary Wharf, to e-mail DNA, fingerprint and CCTV images from crime scenes associated with the murder of Gareth Williams (The Case of the Folded Spook); she has allegedly been using JABS for illegal surveillance of Ministers, VIP’s and Royal Family with Rebekah Wade; she was educated at the Dragon School (Oxford), Oxford High School, and Balliol College, Oxford; she allegedly worked with a large accountancy firm on early developments of PKI and what is now the U.S. Federal Bridge Certification Authority before joining the Metropolitan Police in 1983; she served as a Constable, Sergeant and Inspector in Central, South West and South East London; she was seconded to the staff of the Accelerated Promotion Course at Bramshill; she transferred to Thames Valley Police as Superintendent Operations; she subsequently spent three years as Area Commander in charge of policing the city of Oxford where she allegedly helped Bullingdon Club members organize illegal oath ceremonies; she attended the Strategic Command Course; she took a career break and studied full time for an M. Phil. in Criminology where she allegedly developed an alibi for the planning of the 9/11 attack with University Settlement Movement radicals, including John Profumo the late Bullingdon Club cleaner of Toynbee Hall toilet bowls; she returned to the Met as a Commander in June 2001 where she allegedly began working on the Wells Fargo pass-through certificates to finance the 9/11 contract hits; she used the position of Director of the Diversity Directorate to give her pan-London strategic responsibility for extorting silence or consent from heterosexual witnesses to organized crime (cf. two decades previously, Viscountess Astor and the Kray Twins); she joined the Specialist Crime Directorate in 2003; she was commander in charge of Serious & Organised Crime and Trident; she was promoted to Deputy Assistant Commissioner in February 2007 and moved to Specialist Operations in charge of protection and security in London; she was the Met’s representative on the “PROTECT” strand of the Government’s Counter Terrorism Strategy; she was promoted to be the first female Assistant Commissioner in the Met in July 2009; she was the Specialist Operations lead in the Met’s preparation for the Olympics and has allegedly planted bombs at various venues to extort government leaders into giving more concessions to the bankers at Canada Square; she took over Specialist Crime Directorate, which investigates the majority of serious crimes that occur in London; she implemented JABS control of evidence from crime scenes associated with murder, kidnap, shootings, rape, armed robbery, gun supply, child abuse, major fraud, e-crime and drugs networks; she used JABS to deliver and manipulate (spoliation) forensic evidence, intelligence and covert policing capability to the whole of the Met; she used JABS to take a command and control role for Met in snuff-film production on 9/11, the Tsunami, and the 2005 and 2007 terrorist attacks in London; she learned how to act as a hostage negotiator in 1989 and is chair of the National Negotiator Group; she is a long standing member of BAWP (British Association of Women in Policing and was appointed President in October 2010; she allegedly extorted Sir Paul Robert Stephenson, the former Metropolitan Police Commissioner, and John Yates, a former assistant commissioner, into resigning over the News International phone hacking affair which she appears to have orchestrated with Rebekah Wade using the Wells Fargo, Canada Square JABS network; she was appointed, assistant commissioner specialist operations in the wake of the resignations she had allegedly extorted and held the rank until 23 January 2012.]”

17. Eliza Manningham-Buller “[Oracle-MI5-CIA, Airwave; Money laundered with Net1, CRYPTOCard and Entrust technologies; Amec-Spie TETRA, Serco, Promis, K-Branch, IRA, Pan Am 103, NetJets 9/12, 7/7, RAF Brize Norton, Rendition, Waterboarding, Daughter Reginald Manningham-Buller of Bodkin’s Dope Inc. case]”

18. Paule Gauthier “[Chair of SIRC 1996-2005 through the development of CANARIE and alleged use of Piggy’s Palace as Crown-registered charity for sexual extortion of top officials.]”

19. France Desmarais (nee Chrétien) “[Daughter former Prime Minister of Canada Jean Chrétien. Husband Andre Desmarais; Special Assistant, Minister of Justice of Canada; Power Financial Corp; Groupe Bruxelles Lambert S.A.; Great-West Lifeco Inc. and Great-West Life Assurance Company; Pargesa Holding S.A.; Bertelsmann AG; Seagram; Director of Bombardier Inc.-Metronet, until 2004; Vivendi; Canada China Business Council; Chief Executive’s Council of International Advisers of The Government of the Hong Kong Special Administrative Region; CITIC International Advisory Council; Canadian Executive, United States Executive, Canadian Investment and Credit, United States Investment and Credit and Corporate Management Committees]”

20. Michelle Obama (nee Robinson) “[Revised July 17, 2012: Matrix 5 principal and wife of allegedly-extorted man-in-the-middle Barack Obama, a Citizen of the United Kingdom and Colonies and the 44th President of the United States; she allegedly built intellectual property in snuff films with former Sidley Austin lawyer, Bernardine ‘Torture Paradigm’ Dohrn; she allegedly uses archived snuff-film content to extort silence from witnesses to contract hits; she allegedly used Sidley Austin, to build an escrow service for Libor bankers to hide proceeds of crime and pay for contract hits; she allegedly procured DOJ Pride root authority for her lesbian associates in Illinois and SOS [Pedophile] Villages in Mexico to arrange Fast and Furious contract hits; she allegedly authorized Femme Comp’s use of Entrust PKI to buy alibis for Interpol or NATO Matrix 5 contract hits; she allegedly led Sidley Austin meetings in 1991 with the Senior Executive Service in Washington D.C. to sponsor use of 9-1-1 Clipper encryption chips to monitor Matrix 5 MitM propaganda attacks; she allegedly used 9-1-1 Clipper chips to monitor the 2009 contract hit of Wendy Ladner Beaudry at a Vancouver, B.C. crime scene; she allegedly controls terrorist alumni of the Jane Addams’ University Settlement Movement (founded Chicago 1891); she allegedly worked with terrorist mentor Bernardine Dohrn on the design of Greek Life oath taking involving late term abortion and pedophile traps; she allegedly extorted managers of the Illinois Municipal Retirement Fund (IMRF) and the Chicago Firemen’s Annuity & Benefit fund (CFABF) into buying rights in Permira VideoGuard pay-per-view snuff films on 9/11; in July 2008, she was awarded an honorary membership to the 100-year-old black sorority Alpha Kappa Alpha; she allegedly used Clipper encryption to synchronize the spoliation of evidence of a VideoGuard snuff-film studio in WTC#7 serving pay-per-view pedophile clients of SOS Children’s Villages in over 100 countries; she was allegedly recruited in 1984 at Princeton for a career as a Matrix 5 sextortionist by Henry Bienen, her Central Intelligence Agency [CIA] handler and the future president of Northwestern University; she allegedly helped Weather Underground terrorist boss Bernardine Dohrn build NU’s matrix of five community groups (‘Matrix 5’) using Entrust public key infrastructure provided by Bienen to authorize contract killing, sabotage and virtual deception; she was born 1964 in Chicago, Illinois to Marian and Fraser Robinson III, a Chicago city pump operator and a precinct captain for the mobbed-up Democratic Party machine; she graduated as a francophone from high school in 1981; Bienen guided her in sociology and African-American studies at Princeton where her 1985 thesis titled “Princeton-Educated Blacks and the Black Community” shows her focus on community organization of ethnic conflict; Bienen sent her to study law at Harvard to ‘rub raw the sores of discontent’; she sponsored crony hiring of professors who belonged to SBA 8(a)-listed minority groups; she launched libelous attacks on landlords using phony complaints from ‘virtual’ low-income tenants; she graduated from Harvard Law School in 1988; Bienen arranged for her to join Chicago law firm Sidley & Austin to develop expertise in intellectual property law and marketing; he assigned her to work in a ‘dual-use’ Sidley team to represent Union Carbide Corp. in its 1990 legal fight re a sale of a chemical business unit to Arco Chemical Co. and spoliation of evidence of Matrix 5 sabotage of Union Carbide’s Bhopal plant in India – 47 tons of water injected into a bath containing 42 tons of methyl isocyanate; he assigned her to work on a ‘dual-use’ Sidley team re IP associated with Barney the Purple Dinosaur AND the spoliation of evidence of role of Worshipful Company of Spectacle Makers in VideoGuard propaganda broadcast of BBC snuff films as virtual news over PBS; he assigned her to build a Women @ Sidley group of lesbians and work on federal bridge encryption protocols stolen from Ron Brown’s office; he assigned her to work with lesbians in Kristine Marcy’s DOJ Pride to build iCAIR for Matrix 5 sabotage, assassination and virtual deception; he assigned her to work on IP and patent protection for Unabomb devices trademarked with initials ‘FC’ standing for Femme Comp Inc; he transferred her in 1991 to work as mayoral assistant with Valerie Jarrett, then chief of staff to Chicago Mayor Richard Daley and a target for SOS sextortion who ultimately handed control of the City to terrorists in the University Settlement Movement; he transferred her in 1993 to head up a new Chicago office of Public Allies to create Matrix 5 training groups for young revolutionaries; he assigned her as associate dean of student services at University of Chicago to radicalize students; he assigned her as executive director of community affairs at University of Chicago Hospitals where she allegedly promoted use of VideoGuard encrypted images of late-term abortions to extort leaders of churches and community groups; he allegedly arranged for her pay increase from $122,000 to $316,000 a year and promotion to a vice president at the University of Chicago Hospitals; he allegedly showed her how to use Entrust PKI root authority to help her husband win a U.S. Senate seat in 2004; he allegedly helped heruse SOS Pedophile Villages to entrap and extort fellow members on the Chicago Council on Global Affairs; he allegedly showed her how to use SES Clipper and Entrust PKI to exploit 9-1-1 snuff-film images of the 911 attacks and the presence of University Settlement Movement killers at the Mumbai Massacre crime scenes.]”

21. Bernardine Dohrn “[Revised September 3, 2012. Matrix 5 principal and mentor of an allegedly-extorted man-in-the-middle a.k.a. Barack Obama, a Citizen of the United Kingdom and Colonies and the 44th President of the United States; she was allegedly hired by Sidley Austin in 1984 to build a snuff-film escrow service for clients in the British Bankers’ Association to extort rapid recovery of Libor-rigged loans; she allegedly arranged for Charlie Manson’s “family” in the summer of ’69 to steal an NBC-TV truck loaded with equipment for snuff film production; her 3-fingered fork salute is now allegedly the covert sign needed to access the D2 Banking snuff-film archive at Canada Square, Canary Wharf; she allegedly developed Sidley Austin’s torture practice by grooming interns for a LGBT career in sexual entrapment and extortion of wealthy family-office clients; she allegedly closed Jane ‘The Ripper’ Addams’ Hull House and associated kindergarten service to cover an evidentiary trail dating back decades which leads to the late Jack Profumo – a Bullingdon Club pedophile and former UK minister for war; she allegedly helped Profumo develop the Toynbee Hall snuff film attack on the Munich Olympic Games in 1972; she is allegedly helped Bullingdon Club alumni and Toynbee Hall saboteurs to prepare the subsequently-thwarted bombing campaign for the London Olympic Games; she allegedly used the Sidley Austin family office service to arrange a contract hit of Wendy Ladner Beaudry and protect the Fortress investment in the Vancouver Winter Olympics; she is allegedly using Murdoch VideoGuard encryption to conceal pay-per-view snuff films sold through Sidley Austin to pedophile clients of SOS Children’s Villages in over 100 countries; she allegedly built Northwestern University’s link to the Federal Bridge Certification Authority for an attempted overthrow of the United States government on 9/11; she allegedly used Sidley Austin and DLA Piper’s family office services to procure time-lapse images of “Torture: Paradigms and Practice” at the Mumbai Massacre crime scenes.]”

22. Charlotte Bryan “[Revised March 18, 2012: Charlotte Bryan is a Matrix 5 principal of the Senior Executive Service (‘SES’) with Kristine Marcy, Field McConnell’s sister; she allegedly drove the Free Flight conspiracy at FAA headquarters and in Brussels with an erstwhile DLA Piper lawyer, Miriam Clegg; she allegedly entrapped and extorted U.S. and international airports and air carriers with time-lapse threats to illegally-modified aircraft, procured through leveraged leases structured by law firms such as DLA Piper and Sidley Austin; she allegedly received the Gore Hammer Award for her work with co-awardee, Kristine Marcy, on the integration of Con Air (JPATS) C4ISR into Crown Agents’ Sisters’ plans for Free Flight 9/11; she has over 36 years of federal experience including senior management responsibilities at the Federal Aviation Administration (FAA) and the Transportation Security Administration (TSA); she directed and managed U.S. airport security programs for over 429 airports for more than a decade; she was allegedly responsible for the leveraged lease and crony privatization of Stewart International Airport with National Express’s legal advisers DLA Piper; she sponsored the FAA’s Aviation Security Regulatory Program and forced commercial airports to adopt Free Flight; she used the shock-and-awe aftermath of Free Flight 9/11 to manage a phony FAA nationwide outreach program; she allegedly worked with Clinton Rubin associates to extort a share of the proceeds of 9/11 insurance claims from DLA Piper client Willis; she has allegedly compromised, terrified and silenced airline executives, aviation commissioners, state and local representatives, trade organizations, pilot and flight attendant unions, industry leaders, and airport and air carrier association members who would otherwise expose Free Flight time-lapse conspiracies to assassinate high value targets; she served as the TSA’s first Stakeholder Liaison and later as its first General Manager for Commercial Airports; she then served as TSA’s Assistant Administrator for Transportation Sector Network Management, responsible for 10 modal security offices including surface, rail and air transportation; she has significant experience working with U.S. and foreign air carriers on international aviation compliance issues; she served as the FAA’s Aviation Security Air Carrier Division Manager, where she worked with the major airlines and their security officials as the Principal Security Inspector in FAA offices in Europe, Africa and the Middle East; she graduated from the University of Maryland; she completed Northwestern University’s Kellogg School of Management Executive Program; she received a Masters in Public Administration from George Washington University.]”

23. Lucy Adams “[Director/sponsor of LGBT quotas and ‘Diversity Dividend’ in Serco and BBC; Women in London’s Economy conference; Government must provide incentives and penalties for procurers to commit to diversity; Ascension Island transmission towers used to broadcast snuff films on 9/11 and 7/7.]”

24. Alison Woodhams “[BBC World Service COO since 2004; BBC Group Financial Controller 2001-04; used AT & T Istel and Net1 to reward special weapons and tactics and propaganda teams deployed through BBC World Service Ascension Island in 43 languages]”

25. Nancy Pelosi (nee D’Alesandro) “[Speaker U.S United States House Representatives; Appropriations and ^ Committees. Son Paul Pelosi Jr.; Cisco Urban Development for Metronet tracking of victims; NASA Ames Research Center, AirPatrol Corporation; Bank of America Securities, Bank of America; Countrywide MindBox loan-recovery bordereaux for contract hits on 9/11 et al and JP Morgan]”

26. Anna Chapman (nee Kushchenko) “[Revised June 16, 2012. Alleged expert in same-sex pedophile entrapment and extortion of clients in NetJets Europe and the Navigator hedge fund of Mayfair; allegedly used FondServisBank hackers in Moscow to hedge the Flame-induced (malware) crash of a Sukhoi SuperJet 100 on May 9 with long investments in Bombardier; allegedly directed the hit team which set up the murder of GCHQ code breaker Gareth Williams to stop him from exposing ongoing use of Flame to sabotage the Federal Bridge Certification Authority; allegedly used Flame to trigger pre-insured or hedged incidents such as the sinking of the Deepwater Horizon drilling rig and the crash of the Sukhoi SuperJet 100; she is an alleged former organizer of sex tourism at Barclays (Banker for Rebekah SOS Children’s Villages), NetJets and Navigator Asset Management in the City of London and for various mortgage bordereaux brokers in New York and KIT-Fortis in Russia and Belgium; she pleaded guilty to a charge of conspiracy to act as an agent of a foreign government; allegedly deported by Valerie Jarrett and Kristine Marcy to Russia July 8, 2010 in Russia-United States’ crony prisoner swap using Sabre booking on Con Air and covert time-share NetJets aircraft]”

27. Mila Mulroney (nee Milica Pivnički) “[On the Take, decade of crime, greed and corruption at 24 Sussex Drive; husband former Canadian Prime Minister Brian Mulroney; opening ceremony Canada Square; shoe fetishist; Balkans War. Alleged sextortion of husband and Yves Fortier, his former boss at Ogilvy Renault, Oxford University Rhodes Scholar (1960), Security Council (October 1989); London Court of International Arbitration Development through the 9/11]”

28. Julia Middleton (nee Morland) “[Common Purpose; French lycee; Economics degree LSE. CP supporters; BBC business editor Robert Peston, Metropolitan Police Assistant Deputy Commissioner Cressida Dick and many TOPOFFS; Uses Civilia FRS8 exemption to launder money for members in central and local government, Houses of Parliament, police, military, legal profession, BBC, NHS, church, 8,500 quangos, education, social services, civil service, and regional development agencies; Founder DEMOS with Obama and Rockefeller Brothers Fund; $64 trillion Carbon Disclosure Project, Media Standards Trust with Salz of Rothschild), Good Governance Network, Impetus Trust, and Alfanar]”



29. Anne Elizabeth Sikorski (nee Applebaum) “[Husband Polish Foreign Minister Radoslaw Sikorski, a Bullingdon ‘Blood and Steal’ Club member with David Cameron and Boris Johnson; supports Roman Polanski, snuff-film producer and pedophile rapist; Father is Harvey M. Applebaum, Covington and Burling partner with A-G Holder; she earned a B.A. (summa cum laude) at Yale University (1986), where she was elected to Phi Beta Kappa (Founded at The College of William and Mary on December 5, 1776, as the first collegiate Greek-letter fraternity); Marshall Scholar, London School of Economics (1987); St Antony’s College, Oxford; as a Marshall Scholar at the London School of Economics she earned a master’s degree in international relations (1987); Warsaw, Poland 1988 for The Economist; former editor at The Spectator; Former columnist for Daily Telegraph and Sunday Telegraph ergo spins for The Stationers.]”


30. Jana Clemmow (nee Bennett) “[Husband owner of Juniper peer to peer media production company and Oxford buddy of Blair. She linked to U.S. Discovery Communications; Director Vision BBC Fiction, Knowledge, Children’s and Entertainment, in-house TV and multi-media content through BBC Vision Productions; claimed £4,862 in expenses for taxi fares in 3 months to make confidential calls “in private.]”

31. Laura Liswood (nee Liswood) “[Women and Power – Mechanisms to Advance Women’s Leadership; SCREAM pay-per-view; Council of Women World Leaders, Managing Director, Global Leadership and Diversity for Goldman Sachs; Abacus extorts men to allow a woman President of the United States; former GM Pacific Northwest and TWA; Boston Consulting Group; author ‘Serving Them Right’ and ‘ The Loudest Duck’; Seattle’s Women’s Commission; Seattle Woman; May’s List; In 2000, three-year term on Defense Advisory Committee on Women in the Services (DACOWITS); reserve police officer in Washington, D.C. Metropolitan Police Department after 9/11]”

32. Brenda Stewart “[Senior V-P Net1; extorted (?) control of Dr. Belamant patents in COPAC (Chip Off-Line Pre-Authorized Card) and Net 1 universal electronic payment systems (or UEPS) for saboteurs, assassins and pedophiles based in unbanked or underdeveloped economies in South Africa, Europe, Asia, and Latin America]”


Maurice Strong

33. Hanne Strong (nee Marstrand) “[Revised December 7, 2011. Matrix 5 principal and wife of the allegedly extorted man-in-the-middle Maurice Strong, a former pass officer position in the Identification Unit of the U.N. Security Section who apparently went on to use his CalTex job as a front in Kenya in 1953-1954 to develop Mau Mau oath ceremonies with Obama’s grandfather; she allegedly ran the lesbian-friendly Manitou Foundation near Baca Ranch and ordered her Canadian husband to sponsor a depopulationist program in China in the ‘80s where families would have second babies killed, bought or confiscated for use by SOS Children’s Villages Mothers to entrap government or military leaders; she and her husband and his family are directly or indirectly responsible for the abortion of 450 million fetuses and the genocidal killing of up to 80 million Chinese citizens.]”


34. Winnie Mandela (nee Madikizela) “[Sexual extortionist, pedophile and kidnapper; ex wife Nelson Mandela; used young men and children as personal bodyguards in Mandela United Football Club; rubber tyres filled with petrol, ignited as “necklaces”; used Net 1 (?) to pay killers of 14-year-old Stompie Seipei; 1983 ANC car bomb of military headquarters in Pretoria; 1988 BBC World Service propaganda rock concert Wembley Stadium; Harry Belafonte, Whitney Houston, Roberta Flack, Stevie Wonder; smuggled message from Mandela read out, watched by 72,000 spectators, 200 million viewers in 60 countries.]”


35. Franny Armstrong ( ?)“[Spanner Films, indie pop group The Band of Holy Joy, McLibel; Drowned Out; Narmada Dam Project; 10:10 No Pressure snuff film of exploding kids; ‘We ‘killed’ five people to make No Pressure – a mere blip compared to the 300,000 real people who now die each year from climate change’ The Age of Stupid in New Orleans; Passion Pictures client of Sohonet showed special effects of UNDEX after Hurricane Katrina.]”

36. Dame Julia Charity Cleverdon DCVO, CBE “[Late husband John Garnett, was director of the Industrial Society. She is Vice-President Business in the Community; was Chief Executive from April 1992 – March 2008; sponsors Age of Stupid linkage of environmental impact, diversity, workplace practice and ethical operations in the wider marketplace; Teach First; National Council for Educational Excellence; Prime Minister’s Talent and Enterprise Taskforce Advisory Group; ‘In Kind Direct’; Helena Kennedy Bursary Scheme; World Wildlife Fund; former Director Industrial Society’s Education and Inner City Division; industrial relations British Leyland]”

37. Charlotte Beers “[Uncle Ben’s; J. Walter Thompson first female vice president in firm’s 106-year history; Tatham-Laird & Kudner CEO; Ogilvy & Mather Worldwide Chairman and CEO (1992-1997); handed over to Shelly Lazarus; J. Walter Thompson Worldwide chairman; 2 October 2001 sworn in as Under Secretary of State for Public Diplomacy and Public Affairs (at the US Department of State); assigned, amongst other things, to sell so-called War on Terrorism [WTF?] to [Stupid Men and Women in] public]”

38. Shelly Lazarus “[CEO and chairman of Ogilvy & Mather Worldwide; branding for American Express, Dove, Ford, Kraft, Kodak and IBM; ‘I’ve always believed that a brand is a relationship. And like all good relationships, it is built on trust .. we established Neo@Ogilvy, our digital media, direct response and search marketing unit two years ago. Mobile marketing also has a lot of potential .. mobile devices have become the “third screen,” and in some cases, the primary screen. We’ve formed digital innovation labs in five key markets around the world … Gaming [event arbitrage and bordereau insurance fraud?] is another hot area in which our digital labs are innovating’]”



39. Condoleezza Rice “[66th United States Secretary of State; President Bush’s National Security Advisor during first term; political science Stanford University Provost 1993 to 1999; chaired Millennium Challenge Corporation; Met CIA Director George Tenet July 10, 2001 in “emergency meeting” on impending al Qaeda attack; in PEOC with Lynne Cheney when Sisters disrupted 9/11 response by Dick Cheney and George Bush.]”


40. Heather Boyle“[Director Partner Relations Internet2; Non-US networking initiatives; US federal research networks; US-based advanced regional networks; Oversaw Internet2 International Relations program from its first partnership in 1997 with Canada’s CANARIE organization to over 45 partnerships today; Director of Policy and Special Projects at Federation of American Research Networks (FARNET); Master’s Degree International Affairs: International Economic Policy, American University in Washington, DC and a Bachelor’s Degree in International Studies and German from Indiana University of Pennsylvania.]”



41. Lily Safra (nee Watkins) “[Daughter Wolf White Watkins, British railway engineer; At age 17 husband 1, Mario Cohen, an Argentine hosiery magnate; 1965 husband 2 Alfredo Monteverde, leader in the Brazilian household appliance distribution business after establishing Ponto Frio brand; suicided by two shots from a revolver in his bed; all his assets to her and his former banker, Edmond Safra cut off the rest of the family; 1972 husband 3, Samuel Bendahan; 1976 husband 4, Edmond Safra, founder Republic National Bank of New York [and founder investor in Canary Wharf Group] who was killed in a fire that was determined to be arson security camera tapes from the night went missing; French examining judge claims trial “fixed in advance”; couple had no children together.]”

42. Joanne Ellis “[Group General Counsel at Sohonet Limited London, United Kingdom; Motion Pictures and Film; tScheme encryption for FC-KU crime scene management; former Commercial / Legal Director at BT Global Services; former Senior Legal Counsel at 02 (Airwave) Telefonica; former General Counsel, EMEA at Hitachi Data Systems.]”

43. Jill Knesek “[Chief Security Officer BT Global Services; responsible for all security matters globally including Strategy, Security Policy & Compliance, Physical Security, Information Security, Travel Security, Regulatory Compliance and Investigations; former Director of Reactive Operations for the Cable & Wireless Managed Security Services group; in 1998 joined FBI as a Special Agent in Computer Crime Squad in the Los Angeles field office; Kevin Mitnick co-case agent; Mafiaboy FBI case agent with Royal Canadian Mounted Police (RCMP) in Montreal, Canada; case agent for first FBI undercover operation that infiltrated the hacker community to support many criminal investigations in the U.S. and abroad and National Infrastructure and Protection Center (NIPC) during Kosovo bombings; CISSP (Certified Information Systems Security Professional); CISM (Certified Information Security Manager). Office El Segundo, CA; routinely travels to London, New York and Washington DC area; monitored movement of Gareth Williams.]”


44. Darleen A. Druyun “[Former Principal Deputy Undersecretary of the Air Force for Acquisition and Boeing executive; Kennedy School of Government, Harvard University; United States Air Force tanker contract fraud; plan to speed up payments by Air Force to McDonnell Douglas; guilty of inflating price of contract to favor her future employer and passing information on competing Airbus A330 MRTT bid (from EADS); nine months in jail for corruption; transported by Marcy’s ConAir; Boeing paid D2 Banking 8(a) investors $615 million fine for involvement including sale of QRS11 for nuclear weapons guidance; guilty in award initial Small Diameter Bomb contract to Boeing. Donald Rumsfeld [former boss of Kristine Marcy in 1969] “what she did was acquire a great deal of authority and make a lot of decisions; very little adult supervision.”]

45. Kristin Franceschi “[Partner DLA Piper; January 1987 – Present (24+ years); Baltimore, Maryland Area; Industry Law Practice; issuers; credit enhancers, portfolio managers, and sponsors re public and private offerings of municipal and corporate debt securities; derivative transactions, including swap transactions integrated with municipal securities; incorporates hedging documentation into credit structure of the bond issue [bordereaux receivables; IRS arbitrage rules to permit transactions that might not otherwise be possible.]”



46. Angelina Jolie (née Angelina Jolie Voight) “[With SOS Children’s Villages named Nathalie Nozile as first Jolie Legal Fellow to protect Haiti’s vulnerable children; “Nathalie has .. unique perspective of growing up in an SOS Village .. returns to help strengthen Haitian judicial system .. a force…just wait and see”; father’s side, Czechoslovak and German descent; mother’s side French Canadian and Iroquois; eleven years old at Lee Strasberg Theatre Institute; at 14, dropped out of acting classes; dreamed of becoming a funeral director; black clothing, purple hair; moshed with live-in boyfriend; ‘punk kid with tattoos’; “I collected knives and always had certain things around. For some reason, ritual of having cut myself and feeling the pain, maybe feeling alive, feeling some kind of release, it was somehow therapeutic to me”; estranged from father Voight who claims she has “serious mental problems”; trophy abductions of children from SOS orphanages; baby tattoos with heavy bruising show geographical coordinates detailing where her four children, three adopted, were plucked; Maddox (Cambodia); Zahara (Ethiopia); Shiloh (Namibia biological) and Pax Thien (Vietnam); ongoing corruption and extortion of Office of the United Nations High Commissioner for Refugees (UNHCR; est. December 14, 1950).]”

47. Adrienne Clarkson (née Poy) “[1999 appointment as Canadian governor general by Elizabeth II Queen of Canada until succeeded by Michaëlle Jean in 2005; evidence she used David Johnston – then a CAI Special Investor in Macdonald Dettwiler Associates and now the current Canadian Governor General – to develop patent pool devices for pedophile oath taking, snuff-film production and crime scene spoliation at the Pickton pig farm and during the events of 911; evidence of illegal bordereau or CDS swap agreements in MDA with Johnston; 1941 refugee from Hong Kong; CBC producer and broadcaster for CBC; promoted Ontario culture in France and other European countries; anti-monarchist; paternal grandfather emigrated in the late 19th century to Chiltern, Australia and operated a general store called Willie Ah Poy Fruitier and Confectioner; Poy’s first son, William born in Victoria but later worked with his father for Canadian government in Hong Kong where he married Ethel Poy; two children: Neville born October 29, 1935, and Adrienne, born February 10, 1939; she hid in Hong Kong basements during Japanese invasion of the territory in 1941; Canadian government repatriated her father in 1942; post-graduate work in 1962, at the Sorbonne; 1963 married Stephen Clarkson a University of Toronto political science professor; three daughters: Kyra, born in 1969, and twins Blaise and Chloe, born in 1971; Chloe died of Sudden Infant Death Syndrome; Adrienne and Stephen divorced four years later, with Stephen being awarded full custody of the two surviving children, subsequently, Stephen’s second wife, Christina McCall adopted the two girls, who eventually became estranged from their [pedophile?] mother for several decades; president and publisher of McClelland and Stewart; highly unpopular with employees; Clarkson accompanied to Rideau Hall by her long time partner, John Ralston Saul, a former assistant to national oil company Petro-Canada’s first Chair, the allegedly genocidal pedophile Maurice F. Strong; Saul travelled with guerrilla armies in North Africa and South East Asia countries where he allegedly used SOS Pedophile Villages as pedophile entrapment centers to extort silence; following September 11, 2001, Clarkson praised Operation Yellow Ribbon saying “communities across the country selflessly opened their homes and hearts to stranded air travelers” but, as Canadian Governor General at the time of 911, she must have authorized the use of Canadian patent pools, including PKI/Onion Router encryption devices, by Macdonald Dettwiler and Associates and SBA 8(a) companies to stage a simulated man-in-the-middle attack on the United States government!; she ramped up spending of Crown ‘Agents’ funds at Rideau Hall by 200%; 2003 budget estimated at CAD $41 million; in 2003; she made a 19 day circumpolar “northern identity” tour with visits to Russia, Finland, and Iceland [SOS Pedophile Villages?] in company of Colonel Russell Williams, an allegedly-pedophile leader of an ‘al-Qaeda’ SWAT team on 911 and Maurice Strong, an allegedly-pedophile leader of an SOS Children’s Villages SWAT team on 911.]”

48. Lady de Rothschild (nee Lynn Forester) “[CEO of E.L. Rothschild, a holding company for the Economist business magazine which she uses to extort her third husband, Sir Evelyn Robert de Rothschild, into supporting man-in-the-middle propaganda attacks on the United States and its Sovereign Allies; daughter of John Kenneth Forester, president and owner of the General Aviation Company now Meridian in Teterboro, N.J.; Phi Beta Kappa Pomona College; Columbia Law School; Graduate Institute of International Studies in Geneva, Switzerland; 1980-1984 associate at Simpson Thacher & Bartlett law firm; 1984-1989 extorted telecommunications billionaire John Kluge to obtain position as Executive V-P for Development at Metromedia Inc; 60% interest in TPI Communications Inc, partly owned and financed by Motorola which she used to sabotage Motorola FDNY firefighter radios on 9/11; formed FirstMark Communications Inc in 1995; received first fixed wireless broadband licences for New York City, Los Angeles, San Francisco and Boston which she allegedly used in fraudulent client-server swaps on 9/11; founded Luxembourg-based wireless broadband venture FirstMark Communications Europe in 1998; acquired fixed broadband licences for Germany, Spain, France, Switzerland, Luxembourg and Finland and built a 20,000 km fiber network through-out continental Europe which she allegedly used in fraudulent client-server swaps and Sohonet post production of snuff film 9/11; allegedly extorted her fellow directors at FirstMark included Nathan Myhrvold of Microsoft, Washington D.C. power broker Vernon Jordan and Henry Kissinger; sold company in June 2000 in a $1 billion financing to raise funds for 911 client server swap; director Estée Lauder and The Economist Group; second husband, Andrew Stein a New York politician and son of a multi-millionaire businessman, Jerry Finklestein, was Manhattan Borough President at the time of their marriage; she allegedly forced Stein to arrange the sale of the WTC Twin Towers before 911 to camouflage the rigging of building with incendiary bombs by Amec (UK) and QinetiQ; introduced to Sir Evelyn de Rothschild by Henry Kissinger at the 1998 Bilderberg Group conference in Scotland; they married on November 30, 2000 in London and were invited by the 911 patent pool lawyer Hillary Clinton to spend their honeymoon at the White House; major fund raiser for Clinton’s 2008 Presidential bid; endorsed John McCain for President; attempting to set up a No Labels front organization to control a bicameral Congress with 8(a) Taser Chicks and sexual extortionists.]”

49. Ariane de Rothschild (nee Langner) “[born 1965 in San Salvador; wife of Baron Benjamin de Rothschild; vice-president of Edmond de Rothschild Holding SA since 1999 where she allegedly directs mortgage-based extortion of worldwide SOS `Mothers’ and pedophile alumni of SOS Children’s Villages – including Algeria and El Salvador – through the Bombardier Fund of Funds; MBA from Pace University in New York; former broker at Société Générale in New York; extorted U.S. insurance group AIG, to enter the French and European markets; member of the Board of Directors of the private banks Compagnie Financière Edmond de Rothschild in France and Banque privée Edmond de Rothschild in Switzerland; secret controller of Bombardier electronic warfare and GAPAN/ALPA patent pool contract hits with the Bombardier family, Bain Capital and the Caisse de dépôt et placement du Québec; Ariane de Rothschild Fellows Program, in partnership with Columbia Business School, University of Cambridge and ESSEC is hiding the bogus bio of Obama; she runs Edmond de Rothschild Group among other wine properties in Bordeaux (Château Clarke, Chateau Malmaison, Château des Laurets), Spain (Vega Sicilia), South Africa and Argentina; manages Le Domaine du Mont d’Arbois, a luxury hotel complex in Megève; she leads a syndicated debt investment vehicle for a racketeering influenced and corrupt organization (RICO) of the PENSION COMMITTEE OF THE UNIVERSITY OF MONTREAL PENSION PLAN [where unwitting faculty were invested in the massacre of a group of apolitical women engineers by `une gang de féministes’]; BANCO NOMINEES (I.O.M.) LIMITED, BANK OF BERMUDA (LUXEMBOURG), S.A., now called HSBC Security Services (Luxembourg) S.A., on behalf of Liberty Ermitage North American Absolute Fund Ltd., BANQUE PRIVEE EDMOND DE ROTHSCHILD EUROPE, CACEIS BANK LUXEMBOURG, as assignee of Banque Privee Edmond De Rothschild Europe/Isofin f/k/a Credit Agricole Investor Services Bank Luxembourg .. BASE FORCE, LTD., BOMBARDIER TRUST (CANADA), as agent of the administrators of the pension funds of Bombardier Inc. whose assets are collectively invested in the Bombardier Trust (Canada) (Foreign Assets) Fund [and the CC-144s which allegedly served as transports, patrol aircraft, and electronic ‘spoofers’ in Pan Am 103] THE BOMBARDIER TRUST (UK), THE BOMBARDIER TRUST (U.S.) MASTER TRUST .. COMMONFUND GLOBAL HEDGED PARTNERS, LLC, CONDOR ALTERNATIVE FUND, THE CORBETT FAMILY CHARITABLE FOUNDATION INC., THE CORONATION INTERNATIONAL ACTIVE FUND OF FUNDS, FORTIS [BNP Paribas Oil-for-Food and Anna Chapman sexual extortionist] GLOBAL CUSTODY MANAGEMENT AND TRUSTEE SERVICES (IRELAND) LIMITED as trustee for Coronation Universal Fund .. MELLON BANK, N.A., as Trustee for the Dominion Resources Inc. Master Trust .. FONDATION LUCIE ET ANDRE CHAGNON, ANDRE CHAGNON, SOJECCI II LTEE., FONDATION LILLA, GOULAM INVESTMENTS INC., GTALPHA, CHRISTA GUNTER, HERMES TRADING LTD., HSBC PRIVATE BANK (SUISSE) SA, formerly known as HSBC Republic (Suisse) SA .. KREDEITBANK LUXEMBOURG, NC SPECIAL OPPORTUNITIES FUND, KUWAIT AND MIDDLE EAST FINANCIAL INVESTMENT COMPANY, LA COMPAGNIE FINANCIERE EDMOND DE ROTHSCHILD BANQUE .. LGT BANK IN LIECHTENSTEIN AG .. MAESTRO TRADING, INC .. NATIONAL BANK OF CANADA .. PENSION COMMITEE OF REGIME DES RENTES DU MOUVEMENT DESJARDINS .. THE PENSION COMMITTEE OF THE PENSION PLAN FOR THE REGIME de RETRAITE DE LA CORPORATION DE L’ECOLE POLYTECHNIQUE [where unwitting faculty were invested in the massacre of a group of apolitical women engineers by `une gang de féministes’]; ROTHSCHILD GESTION, SATNAM INVESTMENTS LTD., SEVEN SEAS PORTFOLIO A LIMITED, SIGNET MULTI-MANAGER INC., UEB (UNITED EUROPEAN BANK) GENEVA (SWITZERLAND), SIL NOMINEES LIMITED, SPGP (Societe Privee de Gestion de Patrimoine) .. STARVEST FUNDS, LTD., THE TAURUS FUND, Successor-in-Interest to Turkos Seventeen Limited .. WESTWIND FOUNDATION HOLDINGS LTD., WYATT INCORPORATED EMPLOYEES PROFIT SHARING PLAN, 171212 CANADA, INC. .. COMMERZBANK GLOBAL ALTERNATIVE LIMITED, COMMERZBANK ALTERNATIVE STATEGIES-GLOBAL HEDGE; directed racketeering loans and extortion of inter alia .. BANC OF AMERICA SECURITIES LLC; CITCO FUND SERVICES (CURACAO), N.V., THE CITCO GROUP LIMITED, … PRICEWATERHO– USECOOPERS (NETHERLANDS ANTILLES), INTERNATIONAL FUND SERVICES (IRELAND) LIMITED]”

50. Dr. Elaine C. Kamarck (nee ?) “[Alleged co-principal feminist for the pedophile extortion of U.S. Investigation Services clients – including Office of the Canadian Governor General and the Lord President of the Council – employees and Advisory Board members; a former Director of the National Performance Review; Lecturer in Public Policy at Harvard’s John F. Kennedy School of Government {where Maurice Strong’s dissertation on the use of Mau Mau pedophile oath taking is archived}; came to Kennedy School in 1997 after a career in politics and government; 1980s, she was one of the founders of the New Democrat movement that helped elect Bill Clinton [as an allegedly extorted man-in-the-middle] president; served in the White House from 1993 to 1997, where she created and managed the Clinton Administration’s National Performance Review, also known as Reinventing Government [which allegedly required the assassination of Vincent Foster and Ron Brown to procure the continuity of government protocols for Crown Agents Sisters’ 911]; has served as Director of Visions of Governance for the Twenty-First Century and as Faculty Advisor to the Innovations in American Government Awards Program at Kennedy School; in 2000, she took a leave of absence to work as Senior Policy Advisor to the presidential campaign of Al Gore {to prepare the media campaign for the Global Warming scam; she researches the role of the Internet in virtual deception, net-centric warfare; 21st-century government, in political campaigns, homeland defense, intelligence reorganization, and governmental reform and innovation; Ph.D. in political science from the University of California, Berkeley; author of a wannabee ‘Rules for Radicals’ entitled “The End of Government As We Know It: Policy Implementation in the 21st Century”; author of “Primary Politics: How Presidential Candidates Have Shaped {Corrupted} the Modern Nominating System”; she has worked as a senior fellow at the Progressive Policy Institute and has written regular columns for Newsday and the Los Angeles Times.]”

51. Joanne O. Isham (nee?) “[Alleged co-principal feminist for the pedophile extortion of U.S. Investigation Services clients – including Office of the Canadian Governor General and the Lord President of the Council – employees and Advisory Board members; as President of Isham Associates, she works with clients in the Defense and Intelligence sectors to develop strategies, identify high-value opportunities, address critical challenges and transform their business; former Senior Vice President for L-1 Identity Solutions—a market leader in identity management [and alleged passport frauds]; from 2007-2008, she was Chief Operating Officer of High Performance Technologies, Inc. (HPTi) specializing in computational science; enterprise technology and planning; systems architecture and engineering; secure software development and knowledge discovery and visualization [of 911 snuff films]; former Vice President / Deputy General Manager of Network Systems at BAE Systems, responsible for new mission focus within the Intelligence Community, Department of Defense and Department of Homeland Security; prior to BAE Systems, she served as a member of the Senior Intelligence Service and a career officer at the Central Intelligence Agency (CIA); after the failure of an attempted coup d’etat on September 11, 2001 until her retirement in 2006, she served as Deputy Director of the National Geospatial-Intelligence Agency; prior to that she served as Deputy Director for Science and Technology at the CIA, serving as the principal overseer of the CIA’s scientific and technical program with QinetiQ in clandestine technical activities and Agency research and development; former CIA’s Associate Deputy Director for Science and Technology and held other senior management positions in the CIA and other Intelligence Community organizations; former Director of Congressional Affairs for the Director of Central Intelligence (DCI); former Deputy Director of the Resource management Office of the Community Management Staff (CMS) and as CMS’ Director of Program Analysis; oversaw budget and resource issues spanning the entire Intelligence Community and integration with Bombardier Fund of Funds for 911 attack; spent a number of years on assignment to the National Reconnaissance Office as Director of Legislative Affairs; recipient of National Intelligence Distinguished Service Medal, Department of Defense Distinguished Civilian Service Award, National Intelligence Medal of Achievement, CIA Distinguished Intelligence Medal, NGA Distinguished Intelligence Medal and DIA Director’s Awards; member of Senior Advisory Group for Director of National Intelligence; Board of Trustees for Analytic Services Inc.; Board of Directors for Applied Analysis, Incorporated; INSA and Open Geospatial Consortium; graduate of the University of Notre Dame].”

52. Jalynn Hamilton Bennett (nee?) “[Revised December 28, 2011. Matrix 5 principal and partner (?) of up to 50 extorted man-in-the-middle special investors in the CAI Private Equity Group; as a Wellesley College alumna, Bennett allegedly used Mitt Romney to hedge and Julian Assange to hack pension-fund investors in mortgages ‘secured’ by snuff films, allegedly generated at the Pickton pig farm in British Columbia for sponsors of the Dyke Ball – a “creative black-tie” event hosted by Spectrum, Wellesley’s LGBT organization; she allegedly directed CAI to finance the development of Entrust public key infrastructure by Nortel and MDA to execute MitM attacks on the VPD and RCMP crime scene investigators at the pig farm; CAI special investor with Canadian Governor General David Johnston and a former Bombardier director Pierre Lortie; she allegedly organized a Master Trust with Equity of Canada for the development of a GAPAN/ALPA Bombardier electronic warfare capability to execute patented contract hits; uses Bombardier EW to co-ordinate the spoliation of crime scenes with her CAI colleagues and fellow CA Sisters; she allegedly helped to hire and promote pedophile extortionist and Bombardier EW pilot Russell Williams to execute WTC 1993, Vince Foster, Murrah Building, JonBenet Ramsey, USS Cole, 911, Space Shuttle Columbia, Air France Flight 447, and Beverley Eckert; she is President at Jalynn H. Bennett and Associates Ltd.; Director of Teck Resources Limited since 1989; prior to that she was associated for nearly 25 years with The Manufacturers Life Insurance Company; former Director at CIBC World Markets and Canadian Imperial Bank of Commerce since 1994; former director Teck Cominco Ltd., since April 27, 2005; former Independent Director engaged in pump-and-dump and patent-asset stripping of Nortel Networks Corp.; and Nortel Networks Limited since June 29, 2005; Director at Sears Canada Inc., CIBC, Hospital for Sick Kids Foundation, and the Cadillac Fairview Corporation Limited; member of Advisory Board at Investeco Capital Corp; former Director at CanWest Media Inc., from 2000 to January 2005 and Canwest Global Communications Corp. from January 1998 to March 2005 where she liquidated the former media assets of the Hollinger Chain to abort any investigation by Conrad Black’s journalists into her role with David Johnston, Pierre Lortie and Russell Williams in the 911 attacks on America; she was a former director Bombardier Inc., from 2002 to December 2004 where she allegedly conspired with co-Sister Ariane de Rothschild in integrating Equity of Canada with the co-investors in the Bombardier Master Trust; former director of Bank of Canada; past Chairman at the Ontario Teachers’ Pension Plan Board Investment Committee where she acquired control of Macdonald Dettwiler and Associates development of Entrust/PKI and Onion Router encryption for a 911 MitM attack; former Commissioner of the Ontario Securities Commission; former Member of the Canadian Institute of Chartered Accountants 2000 Toronto Stock Exchange Committee on Corporate Governance; Member of the National Advisory Board, Canada’s Outstanding CEO of the Year, and a Member of the Trinity College Endowment Campaign Cabinet; Director of SickKids Foundation]”

53. Ronalee “Rona” Ambrose (nee?) “[Privy Councilor; incumbent Minister of Public Works and Government Services, and Receiver General for Canada responsible for depositing and withdrawing funds from the Consolidated Revenue Fund of Canada; former Vice-Chair of the Treasury Board Cabinet committee where she allegedly integrated Equity of Canada with racketeering co-investors in the Bombardier Master Trust; former Minister of State for Status of Women Canada where she allegedly helped to promote Crown Agents Sisters and pedophiles into controlling positions; former Minister of Western Economic Diversification whose parliamentary secretary, Russ Hiebert, allegedly helped to procure the Bombardier EW technology at Abbotsford Airport for a surprise attack by Bombardier’s pedophile pilot and killer, Russell Williams, on Vancouver 2010 Winter Olympics; Minister of Intergovernmental Affairs and President of the Queen’s Privy Council for Canada where it appears that hundreds of members have been set up for sexual extortion by the pedophile EW pilot and killer Russell Williams; former communication consultant and public policy consultant for the Alberta government; grew up both in Brazil and in Parkland County, Alberta; fluent English, Spanish, Portuguese, and intermediate French; “working women want to make their own choices, we don’t need old white guys telling us what to do”; appointed Environment Minister in Prime Minister Stephen Harper’s government where she refused to kill or proved herself incapable of killing Maurice Strong’s Kyoto scam.]”

54. Samantha Power (nee SOS Children’s Villages breeding station?) “[Special Assistant to President Barack Obama; after 2008 presidential election joined Department of State transition team and is therefore a co-sponsor with Kristine Marcy and Lena Trudeau of the NAPA Matrix 5 RICO community; runs Office of Multilateral Affairs and Human Rights as Senior Director of Multilateral Affairs on the Staff of the National Security Council; Founding Executive Director and the Anna Lindh Professor of Practice of Global Leadership and Public Policy of the Carr Center for Human Rights Policy at Harvard University’s Kennedy School of Government; expert observer and alleged inciter of genocides, including Yugoslav Wars; former senior adviser to Obama until March 2008 when she resigned from his presidential campaign under controversy; alleged user of Privy Council Entrust PKI to bypass BHO and authorize illegal attack on Libya; born in Dublin, Ireland, and emigrated to the United States in 1979; graduated from Yale University; from 1993 to 1996 worked as a journalist, covering the Yugoslav wars; returned to the United States and attended Harvard Law School graduating in 1999; author of A Problem from Hell: America and the Age of Genocide; analyst of failure of governments and international community to collectively identify, recognize and then respond effectively to genocides ranging from the Armenian Genocide to the Rwandan Genocide; spent 2005–06 working in the office of U.S. Senator Barack Obama as a foreign policy fellow, where she directed Obama’s play in the Darfur conflict; in a March 6 interview with The Scotsman, she said: “We fucked up in Ohio. In Ohio, they are obsessed and Hillary is going to town on it, because she knows Ohio’s the only place they can win”. “She is a monster, too — that is off the record — she is stooping to anything… if you are poor and she is telling you some story about how Obama is going to take your job away, maybe it will be more effective”; Power argues re genocides that “you don’t get any extra credit for doing the right thing”. “It’s up to us” to change that calculus, she said. “My prescription,” she said, “would be that the level of American and international engagement would ratchet up commensurate with the abuse on the ground’; she has allegedly uses the Marcy-Trudeau Matrix 5 communities to stimulate abuse and justify intervention.]”

55. Valerie Bowman Jarrett (nee Bowman) “[Revised May 22, 2012. Matrix 5 advisor to the allegedly extorted man-in-the-middle POTUS 44, Barack Obama; she is the Chair of Obama’s allegedly extorted White House Council on Women and Girls; she allegedly authorized same sex-and lesbian insider traders to hack Nasdaq auction software and trigger short-selling fraud on Facebook shareholders including its heterosexual founder Mark Zuckerberg; she is a former member of the allegedly extorted board of the Chicago Stock Exchange (2000–2007, as Chairman, 2004–2007); senior advisor to Obama for Public Engagement and Intergovernmental Affairs; former co-chairperson of Obama-Biden Transition Project and therefore co-sponsor with same-sex extortionists, Kristine Marcy and Lena Trudeau of the NAPA Matrix 5 RICO community; she was born in Shiraz, Iran to American parents James E. Bowman and Barbara Taylor Bowman; when she was five, the family moved to London for one year, returning to Chicago in 1963; her mother, Barbara T. Bowman was one of four child advocates that created the Erikson Institute to provide advanced knowledge in child development for teachers and other professionals working with young children; as a child she spoke Persian and French; married in 1983 to Dr. William Robert Jarrett, son of Chicago Sun-Times reporter Vernon Jarrett a pedophile (?) buddy of Obama’s pedophile mentor, Frank Marshall Davis; former Deputy Corporation Counsel for Finance and Development working for Chicago Mayor Harold Washington; former Deputy Chief of Staff for Mayor Richard Daley during which time (1991) she hired Michelle Robinson, then engaged to Barack Obama, away from Sidley Austin where they were mentored by terrorist boss Bernardine Dohrn; former Commissioner of Department of Planning and Development from 1992 through 1995; former Chair of the Chicago Transit Board from 1995 to 2005; former Chairman of the Board of Trustees of the University of Chicago Medical Center; former Vice Chairman of the Board of Trustees of the University of Chicago; one of three Senior Advisors to President Obama; holds retitled position of Assistant to the President for Intergovernmental Affairs and Public Engagement, managing White House Office of Public Engagement, Office of Intergovernmental Affairs, Office of Urban Affairs and White House Office of Olympic, Paralympic, and Youth Sport.]”


56. Tessa Tennant (née Davies) “[First Chair, co-founder and now trustee of the $71 trillion Carbon Disclosure Project ‘CDP’ launched by Cherie Blair on December 4, 2000; Tessa Tennant is a Matrix 5 Community organizer for CDP special investors who allegedly use a CO2e dictator game developed by Stephen Harper, Robert Oxoby and Tom Flanagan at the University of Calgary to place members’ pension funds in fraudulent and extortionate catastrophe bonds; she allegedly set up a 911 cat bond with HSBC/D2 Banking to be triggered by the murder of CO2e founder Carlton Bartels in WTC#1 and the double-occurrence cat bond demolition of the Twin Towers; Tennant is Chair of The Ice Organisation Ltd, an environmental kickback program designed to bribe selected consumer and punish others; co-founder of UK’s first equity investment fund for sustainable development in 1988; Trustee Chair of the Global Cool Foundation; first Chair and co-founder of The Association for Sustainable and Responsible Investment in Asia (ASrIA) based in Hong Kong and of the UK Social Investment Forum; former Board member of the Calvert Social Funds, Washington DC 1993-2009; served on environmental advisory panels for the UK Government and, The UN Environment Programme launched by the genocidal pedophile Maurice Strong in 1972, and HRH the Prince of Wales in an extorted partnership with DLA Piper; Fellow of the Schumacher Society].”

57. Jane Fonda (nee Fonda) “[Born 1937; a Vassar student who went to Paris for two years where she was allegedly recruited as a Crown Agents Sister to produce Matrix 5 tv propaganda; first phase was to become bilingual expert in sexual entrapment and extortion as in Barbarella with simulated (?) use of organ-like instrument that delivers pleasure in doses that could be lethal; daughter of Henry Fonda who began tracking JFK after WWII as prospective puppet president for Matrix 5; used images of violent group and lesbian sex to extort Roger Vadim, her first man-in-the-middle husband (m. 1965); used images of sexual torture and snuff films to extort Tom Hayden, her second man-in-the-middle husband (m. 1973), as agent-provocateur leader of Students for a Democratic Society and Weather Underground; used images of pedophile coat-hanger torture and snuff films to extort Ted Turner, her third man-in-the-middle husband (m. 1991), into converting CNN into a Matrix 5 .tv propaganda machine; organized CNN’s virtual news network to camouflage contract killing and genocides coordinated by Tuvalu root authorities and top officials in the British and the Canadian Privy Councils; divorced in 2001, allegedly after Ted Turner saw Dino’s Hannibal brain-food film derived from pig-farm script and learned of the TOPOFF conspiracy with Kristine Marcy and Lena Trudeau for a live broadcast of al-Qaeda 911 snuff film on cnn.tv; Fonda had a principal role in The China Syndrome (1979), about a cover-up of an accident in a nuclear power plant; nominated for Academy Award for Best Actress for her portrayal of an alcoholic murder suspect in the 1986 thriller The Morning After; Supporter of Huey Newton and the Black Panthers in the early 1970s, stating “Revolution is an act of love; we are the children of revolution, born to be rebels. It runs in our blood.”; called the Black Panthers “our revolutionary vanguard”, and said “we must support them with love, money, [Matrix 5] propaganda and risk.”; leader of the feminist and radical lesbian movement since the 1970s; major patron of the VVAW with 1970 speech at Michigan State University “I would think that if you understood what Communism was, you would hope, you would pray on your knees, that we would someday become communists”; in North Vietnam, she was photographed seated on an anti-aircraft battery; she made ten radio broadcasts in which she denounced American political and military leaders as “war criminals”; visited American prisoners of war (POWs) and when cases of torture began to emerge among POWs returning to the United States, she called returning POWs “hypocrites and liars.”; “These were not men who had been tortured. These were not men who had been starved. These were not men who had been brainwashed”; she stated the POWs were “military careerists and professional killers” who are “trying to make themselves look self-righteous, but they are war criminals according to the law.”; she is the mentor to first ever all-transsexual cast of The Vagina Monologues; In the days before the Swedish election on September 17, 2006, Fonda went to Sweden to support Feministiskt initiativ in election campaign; she considers patriarchy to be harmful to men as well as women; Fonda is a presumed Matrix 5 sponsor of Kristine Marcy’s Femme Comp Inc and the ongoing attempt to kill heterosexual top officials wherever they are found to make room for a Matrix 5 NWO]”
58. Michaëlle Jean (nee Jean) “[Former Governor General of Canada with root authority over Matrix 5 .tv propaganda and virtual ‘Wag the Dog’ news during the Mumbai Massacre; erstwhile kick-boxing partner Laureen Harper’s designer of graphics interface; Former Canadian Patron of SOS Children’s Villages which she allegedly knew was operating pedophile and child-soldier entrapment centers as ‘breeding grounds’ for saboteurs, assassins and electronic-warfare experts to overthrow sovereign host states ; former propaganda journalist and broadcaster for Radio-Canada and the Canadian Broadcasting Corporation (CBC); In 2005, she was appointed governor general by Elizabeth II, Queen of Canada to replace Adrienne Clarkson as vicereine, and she occupied the post until succeeded by David Johnston in 2010; allegedly used images of pedophile torture and snuff films to extort her man-in-the-middle husband (m. 1991), Jean-Daniel Lafond into producing Matrix 5 propaganda; Special Envoy for Haiti for the United Nations Educational, Scientific and Cultural Organization on November 8, 2010; co-producer of several Matrix 5 propaganda films with her extorted man-in-the-middle husband, including Haïti dans tous nos rêves (“Haiti in All Our Dreams”) in which she meets her uncle, the poet and essayist René Depestre, who fled from the Duvalier dictatorship into exile in France; she fled Haiti to escape Duvalier’s regime, under which her father was in 1965 arrested and tortured; her family settled together at Thetford Mines, Quebec where Pierre Elliott Trudeau has served as a Matrix 5 community organizer; she grew up with a violent, tortured and apparently-pedophile father; B.A. in Italian and Hispanic languages and literature from the University of Montreal; besides French and English, she is fluent in Spanish, Italian, and Haitian Creole, and can read Portuguese; between 1979 and 1987, she coordinated a study on spousal abuse and worked at a women’s shelter giving her cover to recruit women and children across Canada for use in Matrix 5 propaganda; she allegedly extorted top officials in Employment and Immigration Canada and Conseil des Communautés culturelles du Québec to bring Matrix 5 saboteurs, assassins and double agents into Canada; she became reporter, filmmaker, broadcaster and principal propagandist for Radio-Canada in 1988; she hosted Matrix 5 propaganda, news and current affairs programmes such as Actuel, Montréal ce soir, Virages, and Le Point; she moved in 1995 to Réseau de l’information (RDI), Radio-Canada’s all-news channel, in order to anchor a number of programmes, Le Monde ce soir, l’Édition québécoise, Horizons francophones, Les Grands reportages, Le Journal RDI, and RDI à l’écoute; in 1999, she hosted English language all-news channel, CBC Newsworld’s The Passionate Eye and Rough Cuts allegedly in preparation for snuff-film propaganda of Matrix 5 911; in 2004, she began hosting her own show, Michaëlle, while continuing to anchor RDI’s Grands reportages, as well as acting occasionally as anchor of Le Téléjournal; she produced and hosted news and documentary programming for Matrix 5 propaganda television on both the English and French services of the CBC; on August 4, 2005, it was announced from the Office of the Prime Minister of Canada that Queen Elizabeth II had, by commission under the royal sign-manual and Great Seal of Canada, authorized Jean to succeed SOS Patron Adrienne Clarkson as the Queen’s representative; then-Prime Minister Paul Martin explained that Jean and her spouse had both undergone thorough background checks by the Royal Canadian Mounted Police and the Canadian Security Intelligence Service [files allegedly sabotaged by Kristine Marcy and Lena Trudeau through use of Entrust PKI to monitor and extort background checkers in FBI and MI-6]; Martin failed to mention the existence of a documentary in which Jean had been filmed with several hard-line Quebec separatists, all toasting “to independence” after Jean stated: “Independence can’t be given, it must be taken [allegedly by force as broadcast with the Matrix 5 .tv snuff film on 911]”; September 25, two days before her swearing-in, Jean renounced her French citizenship “in light of the responsibilities related to the function of Governor General of Canada and Commander-in-Chief of the Canadian Forces”; her pretended loyalty allowed Jean to corrupt the Canadian chain of command and authorize Colonel Russell Williams to protect and expand the SOS EW capability and pedophile snuff-film trade with over 130 countries; Jean launched Matrix 5 propaganda online chat show with Canadians within the Governor General’s domain name; her website was dubbed “Citizen Voices: Breaking Down Solitudes” [euphemism for Matrix 5 attack on the sovereign state]; she, allegedly in a treasonous conspiracy with Laureen Harper, used domain name as root authority for Matrix 5 snuff films to be produced and broadcast as propaganda on .tv where communities of Bankers, Anglophones, Francophones, Lesbians and Pedophiles could kill at will and spoliate evidence at murder for hire crime scenes such as Mumbai on Thanksgiving Day 2008 or Russell Williams wife’s cottage in Ontario; early in his time as prime minister, her allegedly extorted husband Stephen Harper was told by Alex Himelfarb, then the Clerk of the Privy Council: “Prime Minister, your biggest problem is in Rideau Hall” meaning Jean and her potential to be a “loose [and treasonous] cannon”; officially opened 2010 Winter Olympics in Vancouver, on February 12, four days after her pedophile EW pilot Russell Williams – Commander of Airborne Security for the Games! – had been arrested; referred to herself as Canada’s head of state; appointed by Abdou Diouf, Secretary-General of La Francophonie, in April 2011 as the Grand Témoin de la Francophonie for the 2012 Summer Olympics in London, England; she is tasked with promoting the French language and ensuring compliance by the Olympic organizing committee with rule 24 of the Olympic Charter; she is allegedly organizing .tv propaganda to threaten and execute attacks on London Olympics unless continued concessions are made to the Matrix 5 Carbon Disclosure Landlord Game launched by Stephen and Laureen Harper at the University of Calgary prior to the 911 snuff-film murder of Carlton Bartels on 101st Floor of World Trade Center Building #1]”

59. Laureen Ann Harper (née Teskey) “[Revised September 16, 2012. Matrix 5 principal and wife of allegedly extorted man-in-the-middle Stephen Harper, Canada’s 22nd Prime Minister who was formerly a computer programmer and systems integrator, first in the Alberta oil fields and later with Imperial Oil in Calgary; she allegedly began working on a graphical interface with Macdonald Dettwiler and Associates for an RCMP-FBI Joint Automated Booking Station (‘JABS’) in 1996; she allegedly used Libor-rated funds to develop a graphical user interface (‘GUI’) for MDA’s RapidEye snuff film production; she is allegedly aware that Macdonald Dettwiler and Associates used her interface to procure RapidEye images of the assassination of Saad al-Hilli after he had threatened to expose the role of the British Bankers’ Association and Ba’ath Party leaders in the theft of $32 billion from the UN Oil For Food program; she is allegedly aware of the snuff-film methods used by BBA insiders to ensure the loyalty and obedience of orphaned (bona vacantia) children and similarly situated family members; she allegedly developed a phony social-media crime-scene investigation service for the launch of the Virtual Global Taskforce in 2003; she allegedly used the interface for the spoliation of images of crime scenes associated with kitty-porn fugitive Luka Magnotta and the murder of Chinese national Jun Lin in Montreal; she “made a pilgrimage” (a quote by husband) through 13 countries in Africa with a six-month trek in the mid-’80s; she allegedly secured safe passage on this one-woman (?) pilgrimage with guerrilla soldiers by helping them to produce snuff films for entrapment and extortion of victims of the SOS Children’s Villages pedophile trade; she is an expert with her husband on the vulnerability of the Federal Bridge Certification Authority to man-in-the middle propaganda attacks; she allegedly designed a graphical interface to support a web-based man-in-the-middle attack on the bridge of the USS Cole through a cell of traitors at HMCS Trinity, Halifax; in 2000, she allegedly used Macdonald Dettwiler and Associates’ MCOIN III system to backdoor the Trinity Federal Bridge Certification Authority; she allegedly configured MCOIN III to trick the USS Cole bridge commander into sailing to an ambush in Aden Harbor; she allegedly helped to generate and distribute a propaganda video for ambush of the USS Cole, best entitled ‘Wag the OBL Dog’; she allegedly used the Trinity Federal Bridge to track Piggy Palace Good Times Society assets (including EW pilot Russell Williams and victim DNA), through crime scenes associated with police entrapment and extortion at the Pickton pig farm in British Columbia; she allegedly integrated VideoGuard encryption with decoy graphics to sell footage of pre-insured death-by-plane events including Operation Nanook during August 2011 and Global Guardian / al-Qaeda war games of 911; she allegedly worked with Harper strategist and University of Calgary political scientist Tom Flanagan, on a graphical-user interface to the Carbon Disclosure Landlord Game, apparently played by Carlton Bartels before the snuff film made of the demolition of WTC#1 on 9/11; she is an alleged accessory – before or after the fact – to the development of Southern Alberta’s century-old pedophile trade by polygamous wives of leaders of the Church of Jesus Christ of Latter-Day Saints (Mormons); she is an alleged accessory – before or after the fact – to the development of a fifty-year old pedophile trade by the ‘Aunties’ and ‘Mothers’ of SOS Children’s Villages sponsored by Canadian Governors General including the late Jeanne Sauvé and her ‘bearded’ kickboxing partner, Michaelle Jean; she was born in Turner Valley, rural town south-west of Calgary, Alberta; her parents were ranchers who owned an electrical contracting company; parents divorced in 1991; she graduated from Oilfields High School; she dumped journalism and focused on photography at the Southern Alberta Institute of Technology with emphasis on computer-generated graphics; she was married to New Zealander Neil Fenton – met on trek – from 1985 to 1988 in Canada; she was a graphic artist for GTO Printing, but Fenton wanted to own a restaurant; children were not in the plan and they split in 1988; she allegedly infiltrated the Calgary Progressive Conservative Party through MP Jim Hawkes; she allegedly infiltrated the Reform Party of Canada in the late 1980s; she allegedly generated propaganda graphics for party, including poster for Reform MP Deborah Grey who had taken Stephen Harper to Ottawa as her assistant; she met Harper at a Reform Party assembly in Saskatoon in 1990; she helped him with graphics for his M.A. thesis; they were married in 1993 by a justice of the peace in their house in Calgary’s Scenic Acres neighborhood; she has gender-identity issues; she was a wild high-school rabble rouser; she was a down and dirty Chick Flick dirt bike owner; she was allegedly disarmed by Grade 12 boys in a chainsaw incident; she operated a blowtorch while spot welding a gala chandelier; she acts the part of radical feminista and gets last word with her husband even inside G8, G20; she covertly directs CSIS/RCMP monitoring and security through Entrust backdoor into .tv; she models herself on the militant Maureen McTeer and the control-freak wife Aline Chrétien; she allegedly uses Blackberry to text messages to gay male friends about cute male air stewards [and pilots?] she encounters while traveling; she ran a successful graphical user interface design company from 1989 to 2002; she became the breadwinner for her family while Harper honed his political skills; she allegedly hijacked the REFORM party and its Canadian Alliance offshoot; she used her business to extort her ‘nerdy’ husband as a “kept man” in 2002; she funded Harper’s challenge to Stockwell DAY for leadership of the CANADIAN ALLIANCE, the offshoot of Reform; she designed signs for Harper that violated party specs; she rejected family’s Progressive Conservative agenda for gender-identity schtick; she rejected her family’s roots in United Church; she forced Harper to make formal apology to Chinese community for head tax levied on Chinese workers in late 19th century; her radar is all attuned to optics; she arrived in Ottawa as Laureen Teskey, a folksy, motorcycle-riding Albertan, joked about “mucky-mucks” and drank beer from the bottle; post-2006 election, she’s been retrofitted; she is informally called “first lady” by PMO; she was a booster for the proposed North American Free Trade Agreement to strengthen Matrix 5 power over the sovereign state of CANADA to the benefit of the 100+ Livery Companies; when the new leader of the Opposition and his family relocated to Ottawa, her sister, Diana, took over remaining contracts and she allegedly continued to use a video camera for sexual entrapment of members of the ‘patriarchy’ by her Chick Flick friends; the perception among staffers is that the couple have been scheming their way to 24 Sussex for the last 15 years; she recently extorted husband into appointing SOS patron David Johnston as governor general while sweetening the pot for his wife Sharon with free rides at RCMP stables; she allegedly forced Johnston to host Aga Khan – sponsor of Crown Agents – and promote SOS / Matrix 5 propaganda for the indoctrination of young children between birth and 3 and even prenatal; she allegedly forced Johnston to authorize burning of Russell Williams uniforms and is inferred guilty of spoliation of evidence of a Privy Council pedophile trade through the SOS; she is allegedly party to the spoliation of evidence of the contract killing of two alleged witnesses to the SOS pedophile trade, Jessica Lloyd and Marie-France Comeau; she allegedly used Blackberry/Entrust devices to order RCMP/Military Police to drop crime scene investigations into SOS-generated child and snuff-film pornography on EW pilot Russell Williams .tv computer files.]”60. Anne Lauvergeon (possibly bred for Matrix 5 through SOS Children’s Villages) [École Normale Supérieure Agrégation in physics (1978); Corps des Mines vocational courses (1983 Usinor then 1984 Commissariat à l’énergie atomique chemical safety in Europe – Chernobyl saboteur?); l’Inspection générale des carrières (1985-1988); in charge of French President François Mitterrand’s mission for international economy and foreign trade in 1990; 1991 assistant secretary general; “sherpa”, i.e. personal representative (sexual extrtionist?) to the president; charged with preparing international meetings such as the G7 summit; managing partner of Lazard banking (Matrix 1) in 1995; general director of Alcatel 1997 before becoming part of the group’s executive committee; CEO Cogema June 1999, succeeding Jean Syrota, who was extrorted from office by The Greens; merged Cogema, Framatome and other companies to create Areva in July 2001; American magazine Fortune, ranked her as the 2nd most powerful women in Europe in 2006 behind Patricia Russo, future president of Alcatel-Lucent; chaired “national contest of assistance the creation of companies of innovating technologies (Guild of Patented Hits?)” with salary of €305,000, bonus of €122,000 and “golden parachute” of two years’ wages; she, through Areva, encountered or created difficulties with new European [Matrix 2 and 3] Pressurized Reactor at end of 2006; announced an expected delay of eighteen months to three years for its delivery to first of its kind in Finland; President École Nationale Supérieure des Mines de Nancy; director or board member of Suez, Total S.A., Safran S.A. and Vodafone; addressing journalists outside the “Women’s Forum” organised in Deauville on October 16 2009, she declared on France 2 evening news, “To be clear, with same competences, sorry, we will choose the woman or something else [lesbian pedophile – Matrix 4 and 5?] rather than the white male”; 2010 from 3rd to 6th, she was at Bilderberg conference in Sitges, Spain; member of Trilateral Commission; in 2009; ranked by the magazine Forbes as the ninth-most powerful woman in the world.]”

61. Sheikha Mozah bint Nasser Al Missned (nee Missned 1959) “[Allegedly recruited in 1984 – 1986 while studying Sociology at Qatar University, for a career as a Matrix 5 sextortionist by Henry Bienen, a CIA handler and future president of Northwestern University; she was recruited in a period when the CIA has enough professors under Agency contract to staff a large university; she is the second of the three wives of Sheikh Hamad bin Khalifa Al Thani, an allegedly-extorted man-in-the-middle and Emir of the State of Qatar; daughter of the late Nasser bin Abdullah Al Missned, an opponent of Sheikh Khalifa bin Hamad bin Abdallah Al Thani, father of the current Emir; her family lived in exile in Egypt and Kuwait, but returned to Qatar for the Sheikha’s marriage; she married the Emir (at the time Heir Apparent) in 1977 at the age of 18, while she was attending Qatar University; she is Chairperson of the Qatar Foundation for Education, Science and Community Development since 1995; Chairperson of Silatech since 2008; Chairperson of the Arab Democracy Foundation; President of the Supreme Council for Family Affairs since 1998; Vice-President of the Supreme Education Council since 2002; she was UNESCO’s Special Envoy for Basic and Higher Education in 2003; member of the Board of Overseers for Weill Cornell Medical College; currently Chair of Sidra Medical and Research Center in Doha and the organisation “Your Link”; she is the de facto boss of Education City and Al Jazeera Children’s Channel with access to the Entrust public keys needed to inject Matrix 5 propaganda into .tv broadcasts by Aljazeera, al Qaeda and the BBC; she allegedly recruited Khalid Sheikh Mohammed “the principal architect of the 9/11 attacks” and many of the most significant terrorist plots over the last twenty years, including the World Trade Center 1993 bombings, the Operation Bojinka plot, an aborted 2002 attack on the U.S. Bank Tower in Los Angeles, the Bali nightclub bombings, the failed bombing of American Airlines Flight 63, the Millennium Plot, and the murder of Daniel Pearl; she allegedly arranged for KSM to attend the North Carolina Agricultural and Technical State University and complete a degree in mechanical engineering in 1986; the following years she sent him to Afghanistan, where he and his brothers (Zahed, Abed, and Aref) fought against the Soviet Union during the Soviet invasion of Afghanistan; she introduced KSM to Abdul Rasul Sayyaf, of the Islamic Union Party who although officially a member of the Northern Alliance, assisted the assassins posing as journalists that killed anti-Taliban leader Ahmad Shah Massoud by detonating a bomb hidden in their video camera; she sent KSM to Bosnia in September 1995 to work there, under an assumed name, for Egyptian Relief, as a humanitarian aid worker; she obtained Bosnian citizenship for KSM in November 1995; she arranged for Sheikh Abdullah Bin Khalid Al-Thani, then Qatari Minister of Religious Affairs, to shelter KSM before sending him to Pakistan in 1996 to avoid capture by legitimate U.S. authorities; she allegedly arranged with Bienen and Michelle Obama that KSM, captured in Rawalpindi, Pakistan, on March 1, 2003, be kept incommunicado at Guantanamo Bay to protect the Matrix 5 conspirators]”

62. Carole Taylor (nee Carol Goss) “[Matrix 5 wife of allegedly extorted man-in-the-middle husband Art Phillips; she was an Independent member of Vancouver City Council from 1986 to 1990; wife and husband allegedly worked with Linda and David Pickton on the pig-farm development when the women began to disappear from the Downtown Eastside; in that same period Gordon Campbell, the husband of Matrix 5 wife Nancy Campbell, was mayor and police board chair in Vancouver in the same position as that held by Taylor’s husband from 1973 to 1977; the alleged pig-farm conspirators were extorting Port Coquitlam city councilors to allow them to develop the farmland as part of the larger Riverwood community and get their property removed from the Agricultural Land Reserve to make huge profits for the pig-farm pension-fund insiders; the proposal was finally approved in 1986; Taylor was pushing her husband to file applications for rezoning for subdivision on the land that was being examined when Willie Pickton was arrested in February 2002, allegedly as a cutout for Matrix 5 community groups; since June 17, 2011, Taylor has served as the Chancellor of Simon Fraser University where she has allegedly corrupted faculty into supporting the pig-farm pension carbon scam; she was B.C. Minister of Finance from 2005 until 2008 in the government of Liberal premier Gordon Campbell; she graduated from Weston Collegiate in 1964; she graduated from Victoria College at the University of Toronto with a BA in English; she was Miss Toronto 1964; she was co-host of CFTO-TV’s After Four, a show for teenagers; she appeared on several other CFTO shows, including Toronto Today, Topic, and her own Carole Taylor Show; she and Percy Saltzman were the first co-hosts of Canada AM when the show premiered on CTV in 1972; CTV would in 2010 broadcast a documentary “The Pig Farm” making Willie the cutout for Matrix 5 murder for hire; she was a former host of W-FIVE and Pacific Report; her career in journalism lasted for over 20 years; she and Nancy Campbell and Linda Pickton allegedly ensured that there was no money to pay Willie’s legal fees forcing the government to borrow from the pig farm pension fund (bcIMC) and thereby compromise its unwitting members including the police; she served as chair of the Vancouver Board of Trade from 2001 to 2002 through 911; she was chair of the Canadian Broadcasting Corporation from July 16, 2001, until March 14, 2005 and therefore she was the fiduciary responsible for the .tv broadcasts of man-in-the-middle propaganda of the 911 attack on America; she resigned from the CBC in order to seek the nomination of the British Columbia Liberal Party in the province’s 2005 election; on May 17, 2005, she was elected to Legislative Assembly of British Columbia as the member representing Vancouver-Langara; on June 16, 2005, she was named Minister of Finance; she signed up 100% of all BC public sector contracts before they were set to expire by offering potential strikers a share in the revenues collected through the pig farm pension plan from the first carbon tax to be applied anywhere in North America; as Finance Minister, she ended the corporate capital tax on banks and then joined Frank McKenna on the TD Bank board’ McKenna is a CAI Private Equity investor in MDA’s MindBox debt-recovery service and the ex-chair of CanWest Global Communications; he helped put Conrad Black into jail and thereby silence a prospective whistleblower who threatened to expose Taylor’s role in the Pig Farm Pension Carbon scam; on December 18, 2008, Taylor announced her resignation from the Legislative Assembly after accepting an appointment to a federal Ministry of Finance advisory panel where she allegedly is trying to accelerate kickbacks into pig-farm pension schemes across Canada from the $71 trillion CDP; she allegedly sponsored CTV .tv documentary “The Pig Farm” in 2010 as a limited hangout to maintain Willie as cutout; she now protects Matrix 5 banking, anglophone, francophone, lesbian and pedophile communities and the snuff films which record oaths of loyalty (?) to the Carbon Disclosure Project]”

63. Nancy Campbell (nee Chipperfield) “[Revised March 7, 2013. Matrix 5 wife of allegedly extorted man-in-the-middle Gordon Campbell, the 34th Premier of British Columbia from 2001 to 2011 who currently serves as Canadian High Commissioner to the United Kingdom of Great Britain and Northern Ireland; she allegedly procured a Macdonald Dettwiler mobile-radio system through her husband, to support Matrix 5 man-in-the-middle propaganda attacks on the Nortel public key infrastructure (PKI) communications systems used by RCMP / Vancouver officers to track snuff-film victims through the Pickton pig farm; she allegedly directed her associates in the B.C. Teachers pension plan – now merged into bcIMC – to sponsor a pig farm mortgage through the Treasury Solicitor’s Bona Vacantia (‘ownerless goods’) account; she allegedly had bcIMC trustees take a position in MDA to control the pig farm mortgage through BC OnLine and Serco U.K., operator of the stratum 0 spot fixing clock used to time stamp snuff-film images; she allegedly used the mortgage to helped to finance the construction of Piggy’s Palace Good Times Society post-production studio; she allegedly used the Piggy’s Palace studio to procure VideoGuard-encrypted content for Matrix 5 propaganda and pay-per-view snuff-film trades; she allegedly arranged a profit-sharing agreement for the trades with fellow members of her ‘pig farm’ pension fund; she allegedly directed the bcIMC pension fund to move asset management into the TSol Carbon Disclosure Project and invest in A&E, News Corp, BCE etc. which use VideoGuard in pay per view encryption; she graduated from Sir Winston Churchill school; she was a former French teacher at Queen Mary elementary and Lord Byng secondary schools; she was a former vice principal at Sir Winston Churchill school where Justin Trudeau, eldest son of the late Pierre Trudeau formerly taught French & social studies; Justin is the alleged half brother of Lena Trudeau who set up the Pig Farm Piggy’s Palace Good Times Society to entrap Canadian Privy Council at cannibal oath ceremonies; Nancy Campbell’s Churchill is one of two International Baccalaureate schools and one of three French Immersion secondary schools in Vancouver; she was a vice principal at Templeton secondary school; she retired as principal at Howe Sound Secondary School in Squamish in 2009; after she graduated from UBC in 1969 and Gordon Campbell graduated from Dartmouth College, they were married in New Westminster on July 4, 1970; the couple went to Nigeria to teach under the Canadian University Service Oversea; this program was allegedly structured with SOS Children’s Villages by the de-populationist Maurice Strong allegedly to entrap young Canadians in filmed pedophile-oath taking ceremonies with images that could be used later to extort them in subsequent careers; we note that the Lagos State Government provided a piece of land in Isolo, a suburb of Lagos to construct the first SOS Children’s Village in Nigeria which was started in 1970; on return from Nigeria, the allegedly compromised Nancy Campbell completed her education degree at UBC while he entered the UBC law school; he became a realty development manager and a small businessman; he then worked as an executive assistant to Vancouver Mayor Art Phillips from 1973 to 1976; she allegedly used her teachers’ pig-farm union connections to place her husband as a Vancouver city councilor from 1984 to 1986; she used the same leverage to control him during his stint as mayor and police board chair from 1986 to 1993, around the time that women began disappearing from the Downtown Eastside; she continued to leverage the teachers union to place him as Leader of the BC Liberals in 1993; she leveraged his leadership of the BC Liberals to a massive victory in the 2001 BC provincial election when he was sworn in as Premier of British Columbia prior to the 911 attack; the attackers of 911, allegedly used bcIMC pig-farm pension fund investment in Macdonald Dettwiler’s MindBox to trigger distressed debt recovery on property in New York and enrich fellow pig farm investors in the Carbon Disclosure Projects; she helped her husband to lead the BC Liberals to two more majority governments in the 2005 BC provincial election and the 2009 BC provincial election; she drove her husband to establish the British Columbia Investment Management Corporation (bcIMC) under the authority of the Public Sector Pension Plans Act passed by the British Columbia Legislature on July 15, 1999; she ensured that KPMG was appointed to audit bcIMC knowing it was involved in abusive tax shelters in the United States; she drove her husband to appoint as bcIMC custodian RBC Dexia Investor Services Trust which has allegedly fraudulently converted the assets of the fund into ‘bona vacantia’ with TSol allowing their use in contract hits; with bcIMC assets under administration of $79.7 billion as of March 31, 2010, she has allegedly helped leaders of the Vancouver Settlement Movement to extort control of the retirement benefits of more than 440,000 residents of British Columbia, including compromised police officers, teachers, the staff and faculty at the University of Victoria and erstwhile members of the B.C. Legislative Assembly; she is allegedly a Matrix 5 principal in the racketeering use by Settlement leaders of bcIMC cestui que, pig-farm pension and life insurance funds which cover two million voters and 197,000 employers in B.C.]”

64. Elisabeth Freud (nee Murdoch) “[Revised April 29, 2012. She is a Matrix 5 principal and wife of the allegedly extorted man-in-the-middle Matthew Freud whom she married on 18 August 2001 at Blenheim Palace; she allegedly assembled a Wells Fargo-led financial consortium (codenamed Janus) to procure NATO AWACS aircraft to camouflage the pay-per-view story of al-Qaeda 9/11; she allegedly used Janus to acquire OpenBet Technology (formerly Orbis Technology) in December 2000 on behalf of NDS in support of news-driven spread bets; she allegedly used Fox News pay-per-view to place spread bets on the Twin Towers and WTC#7 demolition and profit from the “first live broadcast mass snuff film in human history”; she allegedly procured the public key used by Canadian Navy spies to execute a domain hack through a .tv antenna on the MS Costa Concordia and ground the vessel in an attempted insurance fraud on Lloyd’s of London on January 13, 2012; she attended exclusive schools in New York City and allegedly set up a dual use on-campus television station at Vassar College to entrap students in Greek Life oath ceremonies; she allegedly used her husband – millionaire head of Freud Communications – to manipulate public perception of Matrix 5 propaganda through setting up decoys on 911; she allegedly used her husband to set up a decoy planning base for the ‘Osama bin Laden’ attack through In-Flight Network and Freud Communications USA, based in New York City; she allegedly used her husband to manage decoys associated with the abduction of Madeleine McCann through Clarence Mitchell who joined Freud Communications as a consultant in 2008; she allegedly used her husband to manage decoys built through Mitchell’s phony advice to the parents of teenager Scarlet MacKeown who was murdered in Goa, the parents of murdered teenager Jimmy Mizen and the parents of missing teenager Amy Fitzpatrick; she allegedly used her husband and Rebekah Brooks to manage VideoGuard decoys built for the Treasury Solicitor in re the death of Princess Diana; she is the daughter of the allegedly extorted man-in-the-middle, Rupert Murdoch; she is the Matrix 5 former wife of allegedly extorted man-in-the-middle Elkin Kwesi Pianim whom she divorced in 1998; Pianin is a fellow Vassar graduate who allegedly helped her to develop a film archive of Greek Life cannibal oath ceremonies for the extortion of alumni and was an associate in the corporate finance department of New York investment bank Rothschild Inc.; she is the Chairwoman and CEO of Shine Limited, a television production company with offices in London and Manchester; she founded Shine in March 2001 with 80 percent equity owned by her, 15 percent by Lord Alli, and 5 percent by BSkyB, who signed a deal guaranteeing to buy an agreed amount of Shine programming for two years; she is the Matrix 5 business partner of allegedly extorted man-in-the-middle Waheed Alli, born 16 November 1964; she allegedly extorted Alli to produce content on 911 described as `the first live broadcast mass snuff film in human history’ for BBC, Five, Channel 4, HBO and the RTL Group; her business partner Alli merged Planet 24 – a television production company with an animation division Impossible TV, founded by Bob Geldof and Tony Boland (Television producer); Impossible TV allegedly produced the special effects of Ballistic 911 and 7/7 in a .tv joint venture with 24 Hour Productions headed by Charlie Parsons and Waheed, later Lord Alli; they sold it to Carlton Communications in 1999 and eventually merged with Carlton Productions, of which Lord Alli became managing director; her business partner Alli allegedly deployed David Cameron in Carlton Communications as a scout for 911.]”

65. Rebekah Brooks (née Rebekah Mary Wade; born 27 May 1968) “[Revised June 13, 2012. Matrix 5 aide to allegedly extorted men-in-the-middle, Rupert Murdoch and his two sons; she allegedly worked with Romney’s Bain and Common Purpose partners to develop VideoGuard pay-per-view encryption codes to conceal child pornography and snuff-film trades; she allegedly worked with Common Purpose graduate Adele Blakebrough to archive encrypted snuff films with Clifford Chance clients at Canary Wharf (Citi); she is the Matrix 5 former wife of Ross Kemp, the ex-EastEnders actor who once described her as a ‘homophobic cow’; she is the Matrix 5 associate of allegedly extorted men-in-the-middle alumni of the Bullingdon Club and their relatives, including Mayor of London Boris Johnson’s Middle Templar wife, Marina (see # 66) ; Matrix 5 former boss of NOTW staff who appeared elated when she sacked them and shut down the paper – allegedly creating a decoy to protect the Middle Temple pedophile trade; alleged expert user of PwC’s beTrusted and Entrust public key infrastructure to decoy crime scenes such as those associated with Holly Wells, Jessica Chapman, Maddy McCann and Gareth Williams; alleged expert user of PwC’s beTrusted and Entrust public key infrastructure to divert investigators from Matrix 5 man-in-the-middle attacks and a centuries-old Middle Temple pedophile entrapment trade; allegedly recruited into the Matrix 5 extortion racket in the mid’ 80s in Paris by agents of the late Jeanne Sauve, then-Governor General of Canada and patron of SOS Children’s Villages – an alleged, supranational network of pedophile entrapment and oath-taking centers funded by D2 Banking and HSBC out of Canada Square, Canary Wharf; allegedly set up ‘off-campus’ pedophile entrapment centers for alumni, faculty and students at the Sorbonne in Paris; allegedly procured Sun-Mozilla PKI – public key infrastructure – ‘hides’ for clients of Canary Wharf-based PKI Services, including NATO, United Nations and News International cutouts in the FBI, U.S. Marshals Service, Interpol and the Metropolitan Police to operate dual-use cells as virtual private networks for sabotage, assassination and deception; allegedly set up NATO ‘Skyhackers’ with public key infrastructure used at News International to stage the Matrix 5 ambush of U.S. Navy Seals who threatened to expose Barack Obama’s use of the same technology to kill an Osama bin Laden doppelganger on May Day; allegedly procured PKI where News International can assign journalists or criminals authorized by Crown Agents’ Sisters to track and expose pedophiles, or to entrap and extort them; Wade grew up in Daresbury; she decided she wanted to be a journalist from the age of fourteen; she attended Appleton Hall County Grammar School in Warrington; she worked for French magazine L’architecture d’aujourd’hui in Paris; she returned to Britain to work for Eddy Shah’s Messenger Group; she allegedly infiltrated PKI hides into the management of the Sunday newspaper News of the World where she was hired in 1989 as a secretary before being promoted to feature writer and eventually the paper’s deputy editor; she allegedly procured PKI ‘hides’ to authorize the NOTW’s routine practice of intercepting mobile phone messages of celebrities, politicians and other public figures; allegedly procured PKI ‘hides’ to entrap James Hewitt, a paramour of Princess Diana, by reserving a hotel suite for an ‘interview’ and “kitting it out with secret tape devices in various flowerpots and cupboards”; allegedly procured PKI ‘hides’ for the News of the World when she returned in 2000 as editor; allegedly procured PKI ‘hides’ to launch a NOTW campaign of “naming and shaming” convicted child sex offenders; allegedly procured PKI ‘hides’ to monitor the murder of Sarah Payne; allegedly procured PKI ‘hides’ to incite mob attacks on suspected pedophiles; allegedly procured PKI ‘hides’ to release information on the basis that it is “only right that the public have controlled access” to information on sex offenders; allegedly procured PKI ‘hides’ in January 2003 after she returned to The Sun, replacing her former boss David Yelland, to become its first female editor; allegedly procured PKI ‘hides’ to generate the “Bonkers Bruno Locked Up” story concerning the mental health problems of former heavyweight boxing champion Frank Bruno; allegedly procured PKI ‘hides’ to monitor Women in Journalism where she once served as chairman; allegedly procured PKI ‘hides’ to monitor “Guardian Student Media Awards” where she served as a judge in November 2003; allegedly procured PKI ‘hides’ to monitor tenth annual Police Bravery Awards sponsored by The Sun where she served as a judge in July 2005; allegedly procured PKI ‘hides’ to infiltrate News International management systems after she left The Sun in September 2009 to become chief executive of the newspaper’s parent company; allegedly procured PKI ‘hides’ to authorize NOTW reporter, Clive Goodman, and Glenn Mulcaire, a hired investigator, to intercept the phone messages of members of the royal family; allegedly procured PKI ‘hides’ to authorize payments by her journalists to “… police for information in the past”; allegedly procured PKI ‘hides’ to hack the voicemail of missing schoolgirl Milly Dowler (later found to be murdered) and access or delete messages left by her parents; allegedly procured PKI ‘hides’ to monitor and control leading politicians; allegedly procured PKI ‘hides’ to monitor sex habits (?) of her ‘friends’ Tony and Cherie Blair; allegedly procured PKI ‘hides’ to monitor sex habits (?) of then Prime Minister Gordon Brown, and current Prime Minister David Cameron both of whom attended her 2009 wedding; allegedly procured PKI ‘hides’ to monitor sex habits (?) of Samantha and David Cameron who live near her home in Oxfordshire where they often go horse riding together and have had dinner at each others’ homes; she was engaged to actor Ross Kemp (best known as Grant Mitchell in EastEnders) in 1996, and married him in June 2002 in Las Vegas; she did not take Kemp’s surname and she was arrested on 3 November 2005, following an alleged assault on her husband; she was later released without charge and the police took no further action; she is referred to in Private Eye as “the slapper” (a pejorative word for a woman of loose morals in Britain, and a pun on the act of slapping); the couple had spent the previous evening in the company of the former Cabinet Minister David Blunkett, who had resigned for the second time on that day; she allegedly procured PKI ‘hides’ to monitor citizens through ID cards originally sponsored by Blunkett, who pioneered the UK government’s proposal; she allegedly procured PKI ‘hides’ with Blunkett through Entrust, the Nortel/Ottawa security company which allegedly provided certificate authorities for the 911 attacks and the sabotage of the Deepwater Horizon; allegedly procured PKI ‘hides’ to bug Blunkett who named his budgerigar “Bimbo” to remind him of the secret unlock code for the information on his I.D card; allegedly procured PKI ‘hides’ to monitor and extort the Prince of Wales into support for the global warming scam and the contract killing of deniers on behalf of the NATO Parliamentary Assembly and the Alliance of Small Island States; she repeatedly chose not to attend to give evidence to a cross-party media committee investigating News of the World’s phone-hacking; her refusal to attend resulted in four members of the committee “considering asking the serjeant at arms to issue a warrant forcing Brooks to attend”; allegedly procured PKI ‘hides’ to monitor sex life of James Whittingdale, her Facebook friend al least until the week ending 10/7/2011, and control him as the chairman of the Culture, Media and Sport Committee, during the trial (?) of the Murdoch males; allegedly procured PKI ‘hides’ to extort Whittingdale into warning members of the committee not to compel her to testify due to the risk that their personal lives would be investigated in revenge; allegedly procured PKI ‘hides’ to monitor Whittingdale when he worked on international privatisation at NM Rothschild in 1987 and, in January 1988, when he became Political Secretary to Margaret Thatcher through to the time of his election to Parliament in 1992; allegedly procured PKI ‘hides’ to extort support from Dr Thérèse Coffey, a member of the Culture, Media and Sport Committee in the upcoming show trial of the Murdoch males, who has already complained of a “witch hunt” against Wade on the basis that simply to say she was editor at the time is not enough evidence; allegedly procured PKI ‘hides’ to feed bogus information to Coffey that Wade’s own phone is thought to have been tapped and the problems were not “unique to one news group”; allegedly procured PKI ‘hides’ to extort support from Louise Daphne Mensch, a member of the Culture, Media and Sport Committee, in the upcoming show trial of the Murdoch males; allegedly procured PKI ‘hides’ to extort Mensch into the secret June 2011 marriage with Peter Mensch, 19 years her senior who was co-manager of Def Leppard rock group; she allegedly procured Matrix 5 PKI ‘hides’ to extort Peter Mensch and contemporary media leaders into transforming the radical lesbian (les lesbiennes radicales) cult and‘culture’ associated with Pyromania, France and Quebec of the ‘80s into the ‘first live broadcast mass snuff film in human history’ on 911.]”

66. Marina Johnson (nee Wheeler) “[Revised August 3, 2011. Matrix 5 principal and second wife of allegedly extorted man-in-the-middle Mayor of London, Boris Johnson; she was called to the Middle Temple Bar in 1987 and now practices from chambers in London at One Crown Office Row; she allegedly worked with Kristine Marcy, Miriam Clegg and insiders of the U.K. Home Office, the MOD, the Foreign and Commonwealth Office on the recruitment of saboteurs, assassins and double agents to support murder-for-hire service; allegedly conspired with Kristine Marcy, Miriam Clegg and insiders of the U.K. Home Office, the MOD, the Foreign and Commonwealth Office to develop a post-WWII Operation Paperclip and overthrow the United States government through traitors inside the gates; allegedly conspired with Middle Temple associates to secure an electronic passport for Barry Soetoro which allowed him to conceal his status as a citizen of the United Kingdom and Colonies and run as Barack Obama during the U.S. Presidential election campaign of 2008; she and her fellow Crown Office extortionists have allegedly invented the crime of ecocide; they have equated a failure or refusal to reduce greenhouse gas emissions – fraudulently claimed as a principal cause of catastrophic climate change – to the mens rea of a homicide; her fellow Middle Temple Crown Office extortionists are promoting the use of odious debt and predatory credit-default swaps to legitimize the execution of borrower-violators as on 911; her fellow Middle Temple Crown Office extortionists are allegedly using blip.tv to transmit digital images of torture, bombings and murder to secure the obedience of Matrix 5 agents and the silence of prospective whistleblowers; she is the sister-in-law of allegedly-extorted man-in-the-middle partner at PricewaterhouseCoopers, Leo Johnson, the snuff (?) film-maker who plans to replace government with PwC Ecocide PKI regulators who claim rights such as, “I will sabotage your plant if you are killing my fish, I will remove insurance, I will picket your product”; she allegedly forced Leo Johnson to issue PwC PKI security certificates and root authority for Stuxnet attack on Air France Flight 447 on June 1, 2009; she allegedly forced Leo Johnson to issue PwC PKI security certificates to an ‘Andrew Berwick London’ account at D2 Banking allowing a virtual identity to finance the Ecocide / Unabomb attack on Norway’s oil and energy ministries; she is the sister-in-law of allegedly extorted woman-in-the-middle Rachel Johnson who was educated at the European School in Brussels and read Classics (Literae Humaniores) at New College, Oxford in the mid-‘80s; Marina’s husband Boris Johnson and sister-in-law Rachel Johnson have sufficient fluency in written Latin to qualify as suspect adopters of phrases used by the PKI identity, Andrew Berwick, “Pauperes commilitones Christi Templique Solomonici” and “De Laude Novae Militiae”; she allegedly used Rachel Johnson’s position in the BBC in 1994 and as a freelance columnist in Washington DC to help PwC, RSA, Verisign and Entrust set up PKI Ecocide accounts for Matrix 5 insiders and prepare the 911 attacks on America; she allegedly forced Boris Johnson to employ Andrew Gordon, Head of Investigations in the PwC Forensic Services group, in a Forensic Audit Panel to whitewash financial and PKI identity frauds by insiders of the London Development Agency; she is the sister-in-law of allegedly extorted man-in-the-middle Jo Johnson, former editor of the Lex Column on the Financial Times and MP for Orpington who allegedly uses PwC PKI certificates to manipulate the U.K. public accounts committee with its chairman and the former PwC consultant Margaret Hodge MP; she has forensic skills of a Middle Temple barrister to deal with bogus discrimination claims but lacks basic skills in spoliation CSI to properly conceal the PKI identities behind the bombings in Oslo and the shootings in Utoya; she is half English and half Indian; she is the daughter of BBC correspondent Sir Charles Wheeler and his second wife Dip Singh; she was educated at the European School of Brussels; in the early 1980s, she studied at the University of Cambridge where she wrote for the student magazine; after Cambridge, she returned to Brussels and worked there for four years; at the European School, she became a friend of Boris Johnson, the future Mayor of London; her sister is Shirin Wheeler, now the BBC’s Brussels correspondent; she specialises in mental health matters and discrimination claims; January 2004 she was appointed to the B-Panel of Junior Counsel to the Crown; In 2009, she joined the Bar Disciplinary Tribunal as a barrister member; works in discrimination law while recognizing more than 60 per cent of claims are bogus; she married her childhood friend, Boris Johnson in 1993 after they met again in Brussels, where he was covering the European Parliament for The Daily Telegraph; while promoting one-child policy for the peasants, they have four children, Lara Lettice, Milo Arthur, Cassia Peaches and Theodore Apollo; he worked for a short while for L.E.K. which now advises the UK government on the 100% carbon neutral and has developed a tested methodology for carbon; she is trying to engineer her husband to take over from David Cameron as prime minister; she allegedly forced Boris to set up the resignation of Paul Stephenson, Metropolitan Police Commissioner because his force had hired someone who used to work for the News of the World, when David Cameron, who had hired Andy Coulson, was still in his job; she appears to have set up a phone hack on her husband in re the story of the psychopathic Darius Guppy needing some addresses to break a rib or two and intimidate the media; she allegedly had him force Sir Ian Blair out of Met; she allegedly had him force resignation of Sir Paul Stephenson by exploiting the crossed wires of PKI accountability that connect the Metropolitan Police Commissioner both to him and to the Home Office; she allegedly had him force resignation of John Yates, Met’s assistant commissioner using PKI inside information in re Yates’s relationship with Neil Wallis, the former deputy editor of the News of the World, known as “Wolfman”, who had been hired by the Met as a locum spin-doctor; she allegedly had him sabotage Met’s counter-terrorism operations in the year before the Olympics by replacing Yates with Cressida Dick, the Gold Room commander and PwC PKI user who allegedly authorized the killing of Jean Charles de Menezes on 8/7; she frames her husband as a harmless bombastic buffoon who talks of Kosovo-style social cleansing; she is the daughter-in-law of the allegedly-extorted man-in-the-middle Stanley Johnson, an Ecocide sponsor, who worked at the European Commission, served as a Tory MEP from 1979 to 1984, and stood as Tory parliamentary candidate for Teignbridge in Devon; she is the daughter-in-law of the allegedly-extorted woman-in-the-middle Charlotte Wahl whose father Sir James Fawcett was a barrister and president of the European Commission of Human Rights and whose ancestry includes the early feminist and suffragette Millicent Garrett Fawcett. Abel Danger has concluded that PwC’s Ecocidal PKI lesbians and Boris Johnson’s Femme Comp wife Marina, know how to operate a Matrix 5 MitM propaganda attack with actors and patents but not how to defend against one and they view the OODA loop as a redundant form of heterosexual contraception.]”

67. Kathy Robertson (nee Lette) “[Matrix 5 principal and former wife of allegedly extorted Kim Williams, now Chief executive officer of Foxtel and former CEO of the Australian Film Commission with offices in Brisbane, Melbourne, Canberra and Sydney; allegedly extorted Williams into assisting Assange’s Mad Cow mother in production of pedophile content for Film Australia– previously known as the Commonwealth Film Unit; allegedly hired Assange in 1987 to hack PKI under the name “Mendax” (derived from a phrase of Horace “splendide mendax”, or “nobly untruthful”) within a group named International Subversives which altered logs to cover their tracks; infiltrated Australian Federal Police to sabotage “Operation Weather” investigation; allegedly had Williams pay Assange in September 1991 to hack Melbourne master terminal of Nortel, the Canadian telecommunications company, which was then developing Entrust PKI; allegedly had Williams sabotage Australian Federal Police’s tap on Assanges’ phoneline and spoliate evidence collected from the raid on Assanges’ Melbourne home in 1991; allegedly had Williams pay Assange to hack computers belonging to an Australian university and the USAF 7th Command Group in the Pentagon and other organisations, via FC-Ku modem; allegedly had Williams pay corrupt Australian [Middle Templar?] court officials to stage 31 counts of hacking and related crimes against Assange where victim Nortel said his incursions cost them more than $100,000; allegedly had Williams tell Assange to plead guilty to 25 charges of hacking and have him released on bond for good conduct after being fined A$2,100; allegedly had Williams corrupt the judge who dismissed Assange’s breach of Australia’s national security in history as “there is just no evidence that there was anything other than sort of intelligent inquisitiveness and the pleasure of being able to—what’s the expression—surf through these various computers” and state that Assange would have gone to jail for up to 10 years if he had not had such a disrupted [abused?] childhood; allegedly had Williams pay Assange in 1993 to hack the Victoria Police Child Exploitation Unit and identify targets for pedophile entrapment and extortion; allegedly had Williams pay Assange and his Mad Cow mother to form Parent Inquiry Into Child Protection with a “central databank” for legal records [snuff films?]; allegedly had Williams procure an Assange database which gave pedophiles direct access to the children’s court and targeted children who could be disappeared; allegedly had Williams pay Assange to start one of the first public internet service providers in Australia, Suburbia Public Access Network in 1993; allegedly had Williams pay Assange to move to Melbourne as a programmer and a developer of free software over FC-Ku links to Pentagon; allegedly had Williams pay Assange in 1995 to write Strobe, the first free and open source port scanner and contribute patches to the PostgreSQL project in 1996; allegedly had Williams pay Assange to co-author ‘Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier (1997)’ and expand the matrix of International Subversives; allegedly had Williams pay Assange through 1997 to develop Rubberhose deniable encryption system as a software package for Linux to provide Mad Cows with plausible deniability against rubber-hose cryptanalysis; allegedly had Williams pay Assange to set up an Amazon / Verisign PKI service for IMDb snuff-film database linked to D2 Banking in HSBC headquarters at Canary Wharf; allegedly had Williams pay Assange to develop other free software including Usenet caching software NNTPCache and Surfraw, a command-line interface for web-based search engines; allegedly had Williams pay Assange to work with FCI – Femme Comp Inc – a Mad Cow-owned small business which provides Command and Control (C2) support for man-in-the-middle contract hits with Pentagon insiders having plausible denial at FC-Ku crime scenes over more than 30 years; she allegedly had Williams pay Assange to hack Foxtel, Australia’s largest subscription satellite TV service, to inject real/simulated snuff-film images into BBC World, CNN, Discovery and History Channel; she allegedly had Williams pay Assange to build Foxtel compatibility with Ku-band marine systems – Kurtz-under band is primarily used for satellite communications, particularly for editing and broadcasting satellite television with the first commercial television network to extensively utilize Ku Band being NBC back in 1983; she allegedly had Williams pay Assange to build PKI/Onion Router encryption to move snuff film digital images through Telstra Ku band networks for video-publishing website of pornographic and snuff-film videos; allegedly had Williams pay Assange to attend the University of Melbourne from 2003-2006 to monitor fellow students’ research for Pentagon’s DARPA; allegedly had Williams pay Assange to hack U.S. Navy developments of Onion Router patented devices to conceal alleged pedophile snuff-film trade for Middle Templars; allegedly had Williams pay Assange to hack Internet Movie Database operated with Verisign PKI to conceal pedophile snuff films; Kathy is coauthor with her friend Gabrielle Carey of Puberty Blues where she explains how underage girls can be used to set sex traps for a hypothetical “Greenhill gang” of surfers; she became a newspaper columnist and sitcom writer; she wrote Girls’ Night Out in 1988 and Foetal Attraction and Mad Cows in 1996; she wrote Dead Sexy; she wrote ‘ How to Kill your Husband (and other handy household hints)’ in 2007; she wrote ‘To Love, Honour & Betray (Till Divorce Us Do Part)’ in 2008 as a serial sneer at the institution of marriage; she edited an anthology by prominent women writers of erotic short-stories, In Bed with… (2009) where each ‘Mad Cow’ friend published under a pseudonym; she despises English heterosexual men and women and accuses them of being condescending and unfriendly; she is married to the allegedly-extorted man-in-the-middle Geoffrey Robertson, a fellow Australian expatriate, whom she met in 1988 during the filming of a Hypothetical episode for ABC Television and married in 1990; her husband Robertson was called to Middle Temple bar in 1973; her husband Robertson was a Rhodes Scholar in 1979 – two years after Bill Clinton; her husband Robertson has dual Australian and British citizenship; her husband Robertson is the founder and head of Doughty Street Chambers; her husband Robertson is Master of the Bench at the Middle Temple; her husband Robertson was defence counsel in the criminal trials of Oz, Gay News, the ABC Trial, the Brighton bombing and Matrix Churchill – an alleged cut out case for Middle Temple contracts with Crown Agents and Saddam Hussein to kill Iranians; she allegedly has Robertson appearing in cases before the European Court of Human Rights and in other courts across the world; she allegedly had Robertson author a defence of Michael X in Trinidad; she allegedly has had Robertson fronting for phony human rights missions in Mozambique, Venda, Czechoslovakia, Malawi, Vietnam and South Africa where HSBC is allegedly financing the development of SOS Children’s Villages for the Middle Templar pedophile trade; she allegedly had Robertson sitting as an appeal judge at the UN Special Court for Sierra Leone; she allegedly has Robertson defending the head of Wikileaks, Julian Assange, in extradition proceedings in the UK; she allegedly has Robertson using Sky News Assange’s release of secret diplomatic cables and other materials; she allegedly has Robertson setting up a cutout case for Assange to fight extradition to Sweden, where he is accused of sex crimes with a couple of ‘Mad Consensual Cow’ lesbians for failing to use a condom; she allegedly has Robertson claiming Assange could face execution in the US if he is extradited from Sweden where the accuser-lesbians hang their hats; she allegedly has Robertson claiming that Assange’s possible extradition to Sweden could breach Article 3 of the European Convention on Human Rights (ECHR), which bans torture but condones the Middle Temple pedophile trade; she allegedly has Robertson spinning Matrix 5 propaganda re Assange through ” .. newspaper partners around the world, big and small newspapers and some human rights organisations”; she allegedly had Robertson get Mr Assange freed on £240,000 bail by a High Court judge after spending nine days in Wandsworth Prison; she allegedly had Robertson place Assange with a minder, Vaughan Smith, who is the Frontline Club founder in Paddington, west London, with a manor home on the Norfolk-Suffolk border; she allegedly had Robertson speak at Marxism 2008, an annual festival hosted by the Socialist Worker’s Party; she allegedly had Robertson made a Bencher of the Middle Temple in 1997; she allegedly had Robertson serve as counsel in 1990 to the Royal Commission’s phony investigations into the trafficking of arms and mercenaries to the Columbian drugs cartels; she allegedly has Robertson, as founder of Doughty Street Chambers, defending cases involving homicide, including the killing of children by their parents; she allegedly has Robertson defending cases of serious and sexual violence involving the evidence of vulnerable witnesses, and delicate cultural issues; she allegedly had Robertson help to draft the child rescue declaration for Kate and Gerry McCann in re the abduction of Madeleine McCann; she allegedly had Robertson represent a special needs teacher charged with multiple counts of cruelty to a severely disabled 10 year old child; she allegedly had Robertson defend against child rape charges (involved cross-examining two 8 year old girls) and achieved complete acquittal of the defendant; she allegedly had Robertson defend 29 environmental protestors who raised climate change defence of duress and prevention of crime; she allegedly had Robertson defend people trafficking and rape allegation; she allegedly had Robertson defend a public school housemaster charged with indecent assault on pupils in his care; she allegedly had Robertson defend a people smuggling and rape case; she allegedly had Robertson defend a conspiracy to murder and cruelty to a child in a “Witchcraft” case; she allegedly had Robertson defend a case re £18 million Heathrow bullion robbery; she allegedly had Robertson defend a CCRC referral, rape and indecent assault of children of family; she allegedly had Robertson defend a £12 million conspiracy to defraud with money laundering; she allegedly had Robertson defend a baby murder, causation and “Cannings” defence case; she allegedly had Robertson defend a child cruelty and witchcraft case; she allegedly had Robertson defend a shaken baby murder, causation case; she allegedly had Robertson defend a mobile phone VAT carousel fraud; she allegedly had Robertson defend a multi-handed conspiracy to commit violent disorder cf. the present PwC, PKI and Blackberry-staged riots in London; she allegedly had Robertson defend child neglect case arising from SIDS; she allegedly had Robertson defend an institutional abuse case with multi party action re physical and sexual abuse of boys in children’s homes during the 1970s and 80s; she allegedly had Robertson defend HSBC bank employee charged with defrauding the bank of £11 million; she allegedly had Robertson defend a sexual abuse case in which the defendant was accused of repeatedly abusing a young girl over a number of years and raping a second female who had a significant mental impairment; she allegedly had Robertson defend solicitation to murder of four senior members of the Egyptian Government / Parliament where undercover police officers posed as former SAS contract killers [or the other way round?]; she allegedly had Robertson defend 20 Climate Change protesters during their trial for conspiracy to occupy and shutdown one of the largest coal fired power stations in Britain; she allegedly had Robertson defend 6 climate change activists in the second Ratcliffe On Soar trial submitting arguments on abuse and disclosure leading to the collapse of the prosecution; she allegedly had Robertson work with non-governmental organisations on promotion of lesbian rights; she allegedly had Robertson appear in phony inquests in re deaths of Jean Charles de Menezes, Mikey Powell, Diana, Princess of Wales/Dodi Al Fayed, Harry Stanley and Ruddock and others (the second New Cross Fire inquest); she allegedly had Robertson represent families in several so-called “suicide-by-cop” cases; she allegedly had Robertson represent bereaved families and survivors of the 7th July 2005 bombings; she allegedly had Robertson work with a team of trustees in a UK and Zambia-based charity to move orphans and vulnerable children through the hands of predators in the HIV/AIDS community; she allegedly had Robertson work as a legal adviser to Presiding Judge Patrick Robinson during the phony trial of former Head of State Slobodan Milosevic at the UN International Criminal Tribunal for the former Yugoslavia; she allegedly had Robertson infiltrate Mad Cow agents, equipped with FC-Ku PKI, into Sullivan & Cromwell LLP’s New York office for phony criminal probe into Enron and Arthur Andersen; she allegedly has told Robertson to get Barack Obama made an Honourary Bencher of the Middle Temple like David Cameron and John Major; she allegedly had Robertson work with Sheila Morag Clark Cameron – called to Middle Temple bar in 1957 – and Julian Assange on the transfer of the contents of the Cardiff Internet Movie Database at Cardiff University in the UK into the Internet Movie Database (IMDb) launched on October 17, 1990; she allegedly had Robertson, Cameron and Assange force the sale of IMDb in 1998 to Amazon.com a subsidiary of Amazon where today it allegedly supports a PKI FC-Ku snuff film service, including backhauling, editing, archiving and copyright functions offered by Middle Templars to their Mad Cow clients; she allegedly had Robertson, Assange and Vaughan Smith set up the FC-Ku public key infrastructure required for the Navy Seal mission which led to the snuff-film death of an Osama bin Laden doppelganger on May 1st 2011; she allegedly had Robertson, Assange and Vaughan Smith set up the FC-Ku public key infrastructure required for the subsequent mission with a National Guard Chinook helicopter which led to the snuff film deaths on August 6 of 22 Navy Seals who might otherwise have exposed the Obama Administration fraud in re the claim to have killed Osama bin Laden on May Day. Contact e-mails j.rollinson@doughtystreet.co.uk; g.robertson@doughtystreet.co.uk]”

68. Heather Anne Mills “[Matrix 5 principal and former wife of allegedly extorted man-in-the-middle Paul McCartney, whose Beatles group and its manager Brian Epstein were targeted by pedophile extortionists acting on the orders of the Kray Twins; she allegedly worked with Krayleigh Enterprises to extort the transfer and control of Beatles IP and affairs to Middle Templar clients in 100+ City & Guilds Livery Companies, including the Worshipful Companies of Musicians, Information Technologists and Stationers and Newspaper Makers; she allegedly had evidence from Kray agents relating to the sexual activities of the Beatles by which they could be entrapped and extorted; she is the former wife of allegedly extorted man-in-the-middle Alfie Karmal (married 6 May 1989 – divorced 1991); she is a former lover of allegedly extorted man-in-the-middle Miloš Pogačar, a ski instructor in Croatia in 1990, whom she allegedly used to trigger events which led to the Croatian War; she allegedly organized weapons shipments to Croatia and used modeling (?) assignments in Austria SOS Children’s Villages to entrap and extort pedophile leaders on both sides into contrived atrocities; she claims she was kidnapped and sexually assaulted by a swimming pool attendant when she was eight years old; her next door neighbour, Margaret Ambler, alleged that Mills’ story was “nothing what she made it out to be”, that Mills was never a victim, and the pool attendant did not commit suicide; she went to live in Paris in 1987, telling Karmal that a cosmetics company had given her a modelling contract; she was the mistress of allegedly extorted man-in-the-middle millionaire Lebanese businessman George Kazan for two years; he claims she was always determined to marry a very rich man but for nearly two years, he rented her a luxurious Parisian apartment, paid some of her bills and helped to fund a fabulous jet- set lifestyle; ‘She twisted me around her little finger; she is very clever and she always knew exactly what she wanted – she wanted to be famous and she wanted money And now Mr McCartney has provided her with everything that she ever wanted.’; she met Kazan through a modelling agency when she was 19 and he was 47 in the Cote D’Azur resort of Cannes; he was then a diplomatic representative of the ruler of Qatar and allegedly persuaded the Emir of Qatar to adopt and adapt the BBC’s Middle East Service to become the al-Jazeera propaganda arm of Matrix 5 through the 911 attack; she participated in photo session for a stills-only German sex education manual called Die Freuden der Liebe (The Joys of Love), in which she was photographed explicitly simulating sex with an equally nude male model, Peter Wilson; in 1995, she got engaged to British media executive Marcus Stapleton, after being together for only 16 days; she was then engaged to documentary filmmaker Chris Terrill in 1999, after only 12 days in Cambodia, where they were making a film about landmines; she allegedly blackmailed Terrill into using the then-new digital technology to become the first front line filmmaker to operate as a self shooting/self recording director in the early 1990s; she allegedly blackmailed Terrill into directing Soho Stories as cover for Kray-style pedophile snuff films; she allegedly blackmailed Terrill into training the Naudet Brothers in a docu-soap style of snuff filmmaking as broadcast live through Onion Router PKI, Sohonet, Tuvalu .tv and IMDb on 911; she ended the relationship with Terrill five days before their planned wedding day; she told friends in the media that she had called the wedding off because Terrill was gay, an MI6 agent, and that his mission was to undermine her anti-landmine work; he told her that he had been interviewed by the intelligence services when he was thinking of a career with the Foreign Office, but later said, “I soon realised that Heather had a somewhat elastic relationship with the truth, which she was able to stretch impressively sometimes”; she was, according to Rebekah ‘Skyhacker’ Wade, the former editor of the News of the World, a principal provider of escort services to Adnan Khashogi, the Saudi billionaire businessman and Kerry Packer, the Australian media tycoon; an affidavit from escort girl Denise Hewitt (who was paid ?50,000 for the story), said Mills provided sexual services and boasted of earning up to ?10,000 in a single night; Hewitt said that Mills often requested to work with two girls at a time “… to do a ‘girlie scene’. By this I knew she meant lesbian sex” said Hewitt “I thought at the time that Heather may have been bisexual”; ‘Skyhacker’ Wade published through The Daily Mail accounts of another escort girl, Petrina Montrose, and from other friends confirming that Mills had worked with them as an escort girl on many occasions. Montrose said that once “when all three of them were in the bedroom, Heather had ‘tried it on’ with [escort girl] Joanna and suggested lesbian sex”; Mills denied through her lawyers, ever having been an escort girl and said she would sue as soon as her divorce was concluded but this has not happened; Rebekah ‘Skyhacker’ Wade questioned Abdul Khoury, who was Khashoggi’s personal secretary from 1977 to 2005, and published Khoury’s affirmation as to the veracity of reports that Mills “had sex with him [Khashoggi] on a number of occasions in return for money. Mr Khashoggi was always very pleased with Heather’s performance. She was very athletic in bed”; she allegedly aided Adnan Khashogi in a joint venture with genocidal, pedophile Canadian Privy councilor and U.N. insider, Maurice Strong, to set up pedophile oath taking centers around the world such as SOS Children’s Villages, where U.N. officials could be entrapped and extorted into supporting the attack on the United States of 911; allegedly, on the eve of 911, Mills was one of the Middle Templars’ Mad Cows best qualified to order extorted pedophiles in the international community to co-operate with the violent transfer of U.S. Congressional authority to the United Nations and a future ‘Ecocide’ where the earth’s population is brought down to 500 million; cf. One Crown Office Row.]”

69. Serena, Lady Rothschild (nee Dunn) “[Matrix 5 principal and wife of the allegedly-extorted man-in-the-middle Jacob Rothschild, 4th Baron Rothschild, whom she married in 20 October 1961; she allegedly had her Rothschild husband invest in the development of patent pools for Templar clients in the City & Guilds Livery Companies; on behalf of Templar clients in the Worshipful Company of Spectacle Makers, she allegedly had her Rothschild husband invest in the development of Bell & Howell patent pools to shoot and backhaul over Ku-band, snuff-film images of the assassination of JFK in 1963; she allegedly had her Rothschild husband and his cousin Sir Evelyn de Rothschild, develop bogus continuity of government protocols launched by Victor Rothschild (‘The Fifth Man’) in WW11 for a man-in-the-middle attack on America on 911; she allegedly had her Rothschild husband help to finance Rupert Murdoch’s acquisition in 1992 of NDS Group Plc pay-per-view encryption technology developed by Israeli cryptographer Adi Shamir and scientists of the Weizmann Institute in Rehovot, Israel; she allegedly had her Rothschild husband and Rupert Murdoch integrate NDS pay-per-view technology with Onion Router encryption to support News Corp / Sky News pay per view service of ‘Wag the Dog’ propaganda and FC-Ku snuff-film images; she allegedly conspired with Evelyn de Rothschild’s wife, Lynn Forester, in the use of Luxembourg-based wireless broadband venture FirstMark Communications Europe for MitM attacks during 911; she allegedly conspired with Evelyn de Rothschild’s wife, Lynn Forester in setting up her honeymoon stay in the White House with the Clintons to discuss the plans to overthrow the United States government on 911; her paternal grandfather was the late Canadian financier, Sir James Dunn; she is the mother of allegedly-extorted man-in-the-middle Nathaniel Philip Rothschild; she educated her son at Colet Court ( same year as George ‘Whip Me’ Osborne), Eton College and Wadham College, Oxford; her son was a member of the allegedly pedophile oath-taking Bullingdon Club at the same time as George Osborne, now Chancellor of the Exchequer; she allegedly had her son organize a bogus party to entrap Labour politician Peter Mandelson, Russian businessman Oleg Deripaska and then-Conservative Shadow-Chancellor George Osborne on a yacht moored near Corfu; she allegedly has archived at D2 Banking Canary Wharf, video records of Osborne illicitly trying to solicit donations for the Tory party deputy chairman and chief fundraiser Michael Ashcroft from Deripaska; she allegedly had her son organize a party at the Splendid Hotel in Bečići Montenegro, to entrap the son of Libyan dictator Muammar Gaddafi, Saif al-Islam Muammar al-Gaddafi, Arcelor Mittal CEO Lakshmi Mittal, the gold magnate Peter Munk and Oleg Deripaska; she allegedly had her husband work with Rothschild clients and hedge-fund insiders on the development of Livery Company patent pools to give the following companies an opportunity to eliminate or intimidate ‘interlopers’ and establish monopoly control over global supply chains: Scientific Instrument Makers, Chartered Surveyors, Chartered Accountants in England and Wales, Chartered Secretaries and Administrators, Builders Merchants, Launderers, Marketors, Actuaries, Insurers, Arbitrators, Engineers, Fuellers, Lightmongers, Environmental Cleaners, Chartered Architects, Constructors, Information Technologists, World Traders, Water Conservators, Firefighters, Hackney Carriage Drivers, Management Consultants, International Bankers, Tax Advisers, Security Professionals.]”

70. Baroness Scotland of Asthal (nee Patricia Janet) “[Matrix 5 principal and former Parliamentary Under-Secretary of State at the Foreign and Commonwealth Office (1999 -2001) for the late and allegedly-extorted man-in-the-middle Robert Finlayson Cook; she allegedly extorted Cook while he served as Foreign Secretary from 1997 to June 8, 2001 to authorize Templar use of VideoGuard for an ‘Al-Qaeda’ 911 dress rehearsal on June 1-2, 2001, cf. Amalgam Virgo; at the Foreign and Commonwealth Office, she was inter alia, responsible for the UK Government’s diplomatic relations with North America, the Caribbean, Overseas Territories, Consular Division, British Council, administration and all Parliamentary business in the House of Lords; she was a party to the alleged use by Kristine Marcy of VideoGuard to the role of SBA 8(a) companies whose owners are affiliated to the Alliance of Small Island States, in the protégé attack on U.S. mentor companies on 911; she allegedly authorized the use of VideoGuard to conceal the snuff-film murder of Cook on 6 August 2005 after he had threatened to expose the Al-Qaeda Men Who Never Were on 911; she was fined £5,000 for hiring an illegal immigrant from Tonga who served as her housekeeper but was allegedly employed to help her develop the NATO-enforced protection racket which is presently enriching insiders of the Alliance of Small Island States; she was born in the Commonwealth of Dominica – another member of the NATO-enforced protection racket for insiders of the Alliance of Small Island States – as the tenth child of twelve; she pursued a London University (LLB) law degree in 1976 (in association with University College London [where Templars allegedly recruited the Christmas crotch bomber]); she was called to the bar at the Middle Temple in 1977, specialising in family and children’s law which would have given her inside information on the alleged Templar pedophile entrapment and extortion trade; she become the first black woman to be appointed a Queen’s Counsel in 1991 where she allegedly began extorting her colleagues; she founded 1 Gray’s Inn Square barristers chambers, allegedly working with Kristine Marcy to move saboteurs, assassins and deception experts into the united States, cf. Barrack Obama CUKC status as illegal alien; she was elected as a Bencher of the Middle Temple in 1997 she was named as a Millennium Commissioner on 17 February 1994, allegedly to help Templars and their clients to prepare an attempted Y2K coup d’etat; she was a member of the Commission for Racial Equality and allegedly used Matrix 5 community organization techniques to ‘rub raw the sores of discontent’; she received a life peerage on a Labour Party list of working peers in 1997; she served as Attorney General for England and Wales and Advocate General for Northern Ireland; she would have superintended the Treasury Solicitors, the Director of the Serious Fraud Office, and the Revenue and Customs Prosecution Office; she introduced the International Criminal Court Bill which sought to ratify the jurisdiction of the International Criminal Court into UK law and eliminate presumption of innocence and any hope of Grand Jury remedies to government corruption; she established Pro Bono Lawyers Panel to release nationals imprisoned in foreign countries; she created an Overseas Territories Council for the Caribbean and reformed and restructured the Foreign and Commonwealth Office’s Consular Division to eliminate or thwart criminal investigations into the VideoGuard enabled September 11 attacks; she claims loneliness of priests leads to pedophilia and she thereby equates the crime of paedophilia with the social condition of the pedophile; she allegedly extorted Foreign Office through Matrix 5 lesbian and DOJ Pride community to arrange a plea bargain for the ‘NatWest Three’ under which they pleaded guilty to a single count of wire fraud in the United States.]”

71. Louise di Mambro “[Matrix 5 principal and Middle Templar associate of allegedly-extorted members of the Privy Council and The Supreme Court of the United Kingdom; she was called to the Middle Temple Bar in July 1976; she was appointed Registrar of the Privy Council by HM Queen Elizabeth II on 1 April 2011, having previously performed this duty in an acting capacity from May 2009; she allegedly procured public key infrastructure through PriceWaterhouseCoopers (‘PwC’) to make both Courts vulnerable to man-in-the middle propaganda attack on their Rules and Practice Directions and judicial and administrative functions; she allegedly procured VideoGuard pay-per-view encryption devices through PwC’s PKI so that members of the Courts could be monitored and entrapped when they bought and viewed snuff-film images of pedophilia and child abuse; she allegedly created MitM opportunities for VideoGuard content providers such as BSkyB or DirecTV in the United States to entrap and extort viewers with the threat of “group media busts,” where people are exposed as pedophiles by online organizations such as Perverted-Justice; the first such event was conducted in late 2003, in co-operation with investigative reporter John Mercure at Milwaukee’s WTMJ-TV – a VideoGuard-encrypted content provider – whom the site credits with initially conceiving the concept; VideoGuard use has enabled Perverted-Justice to claim 535 convictions in 39 states across the United States attributed to its sting operations with 33 of these taking place in 2005, 81 in 2006, and 141 in 2007, 42 in 2008, and 195 in 2009; convictions in the U.S. include disorderly conduct, indecently soliciting a child, attempting to entice a juvenile to travel with intent to engage in sexual act, transporting child pornography, and possession and dissemination of child pornography; she allegedly procured VideoGuard PKI for Rebekah Wade at the News of the World to “name and shame” convicted child sex offenders after the murder of Sarah Payne; she was Deputy Head of the Judicial Office of the House of Lords, supporting the Law Lords in their judicial functions from June 2008 until August 2009; she was a deputy master in the Court of Appeal, Civil Division, working in the Royal Courts of Justice from December 1997 to May 2008; as Registrar she allegedly uses VideoGuard PKI to ‘steer’ cases through the High Court of Justice, the Court of Appeal and the Crown Court; she allegedly uses VideoGuard PKI to steer all high value and high importance cases through the senior courts including the Senior Courts Costs Office, which deals with the quantification of legal costs pursuant to costs orders made by the courts; as Registrar she allegedly uses VideoGuard PKI to ‘steer’ cases through the Family Division which has jurisdiction to hear all cases relating to children’s welfare and interest, and exercises an exclusive jurisdiction in wardship cases; as Registrar she allegedly uses VideoGuard PKI to ‘steer’ cases through the Chancery Division which deals with business law, trusts law, probate law, and land law in relation to issues of equity; as Registrar she allegedly uses VideoGuard PKI to ‘steer’ cases through the Chancery Division’s specialist courts – the Patents Court and the Companies Court – which deal with intellectual property and company law matters respectively; as Registrar she allegedly uses VideoGuard PKI to ‘steer’ cases through the Chancery Division’s tax appeals; she held various posts as a member of the Government Legal Service in the Treasury Solicitor’s Department and the Lord Chancellor’s Department from September 1977 to December 1997; she allegedly helped the Lord Chancellor’s Department in the UK and Kristine Marcy’s DOJ Pride associates in Washington D.C. to integrate the VideoGuard pay-per-view snuff film service; she and Marcy allegedly procured the patent for use of the VideoGuard pay-per-view snuff-film service to finance the bombing of the Murrah Building in 1995 and the murder of JonBenet Ramsey on Christmas Day 1996; she and Marcy allegedly procured the patent for use of the VideoGuard pay-per-view snuff-film service to finance the 911 attacks where preparations began immediately after News Corporation bought a 49% stake in VideoGuard in 1992; she and Marcy have allegedly procured the patent for use of the VideoGuard pay-per-view snuff-film service to finance Matrix 5 propaganda attacks on Libya, mass murder and the confiscation of assets in the country’s supply chains to enrich Middle Templar clients amongst the City & Guilds’ Livery Companies.]”

72. Lena E. Trudeau (nee SOS Children’s Villages breeding station?) “[Revised June 11, 2012. Matrix 5 principal and the apparent love child of the late, allegedly-extorted man-in-the-middle Pierre Elliott Trudeau, the former Canadian Prime Minister; her alleged bisexual mentor and possible biological father was the sponsor of serial acts of political corruption including abolition of Grand Jury rights in Canada in 1984 and extortion of Privy Councilors into adopting the creed of ‘Guild of Pig Farm Socialism’; she allegedly placed a mail order for a severed head with Luka Magnotta through Canada Post; she is allegedly engaged in a seditious conspiracy to silence prospective whistleblowers who threaten to expose her ‘Collaborators’ and the operation of a Virtual Global Taskforce as a crypto-pedophile ring; she allegedly identified the recipient of the Magnotta head as the individual who had recognized her Collaborators’ crypto-pedophile signature in the ‘electronic capture’ of FADEC (BAE) systems in the May 9 crash of a Sukhoi Superjet in Indonesia; she has allegedly modeled her career on the teaching of G.D.H. Cole and the M.O. of pedophile-entrapment, blackmail and murder-for-hire service operated out of Toynbee Hall and Hull House; she allegedly hired Russell Williams through the Canadian Privy Council to procure illegally-modified Bombardier aircraft and train Al-Qaeda Free Flight pilots for the decoy-and-drone maneuvers of 9/11; she allegedly planned to take control of American air space on 9/11, kill political leaders and transition the elected government of the United States to the unelected Senior Executive Service led by her same-sex NAPA partner, Kristine Marcy; she allegedly procured Entrust public keys for use by her alleged collaborators in the Pickton pig farm murders to bypass 9-1-1 first responders and launch a Matrix 5 man-in-the-middle propaganda attack to discredit the RCMP; she allegedly used the Ripper-Clipper M.O. to conceal the Pickton pig farm murders (1979-2002) and the JonBenét Ramsey torture killing in 1996; she was an alleged designer of the top-official oath taking ceremonies for B.C. pig farm modeled on techniques used in the `50s by Maurice Strong and Obama’s grandfather in the Mau Mau, Kenya; she allegedly hired a Guild of Pig Farm Socialists to film Canadian Privy Councilors at B.C. pig-farm cannibal feasts put on by the Piggy’s Palace Good Times Society; she allegedly used Ripper psychopaths equipped with Clipper hacking devices, in the Guild of Professional Home Services to spoliate evidence of Matrix 5 propaganda attacks on first responders at crime scenes; she allegedly extorted Privy Council authority for Macdonald Dettwiler and Associates to launch a Matrix 5 man-in-the-middle attack on the USS Cole through its Maritime Command Operational Information Network; she allegedly implemented Entrust public key infrastructure and Clipper Chip encryption to support the delegation of Privy Council authority to Bombardier EW pilot Russell Williams to produce a snuff film of the murder of JonBenet Ramsey in 1996; she allegedly served as an extortionist consultant to the Canadian Privy Councillors Prince Philip and the genocidal pedophile Maurice Strong who shook down Ted Turner, Jane Fonda’s ex-husband and boss of CNN.tv for $1 billion to UN depopulation projects; she is the Vice-President and co-leader of National Academy of Public Administration `NAPA’ in Washington, D.C. with President Kristine Marcy; she is the director of Collaboration Project; sponsor of web 2.0 to overthrow sovereign governments with Matrix 5 – a B.A.F.L.P matrix of community organizers under Obama Open Government Initiative; she hosted Web site on .tv to monitor public’s reaction to sabotage, assassinations and deception under Open Government Directive; she chose OGD as an anagram of GOD and designed the OGD model for all federal agencies; she built a VeriSign .tv backdoor into DoD Public Key Enablement (PKE) for cross-certificate chaining with Entrust (FBCA) Common Policy Root Certification Authority (CA); she allegedly used .tv to authorize snuff-film contract hits per Fort Hood, Gifford, Gunwalker and OBL; she allegedly led NAPA insider-trading conspiracies with employee savings options plan (`ESOP’) at U.S. Coast Guard, Federal Emergency Management Agency, Environmental Protection Agency, Department of State and the National Park Service; she allegedly used Entrust PKI to authorize sabotage of the BP/Deepwater Horizon project and trigger credit-default swaps and phony cat-bond claims through D2 Banking; she pioneered use of Entrust PKI, Clipper hacking and Onion Router patent devices in Privy Council snuff film .tv and murder for hire; she brings over 15 years of consulting and management experience to the National Academy; she is a former Vice President of Consulting Services for Ambit Group in federal marketplaces; she is a former insider of Touchstone Consulting (now SRA, Inc.); former Marketing Manager, Nokia Enterprise Solutions; she allegedly integrated Nokia PCD with Bombardier electronic warfare systems to support Matrix 5 attacks; she is an alleged racketeering alumna of Greek Life at the Richard Ivey School of Business at the University of Western Ontario and the Political Science and Philosophy faculty at the University of Ottawa.]”

73. Gloria Cain (nee ) “[Revised October 8, 2011. Matrix 5 wife of allegedly extorted man-in-the-middle presidential candidate Herman Cain, a former civilian employee of the U.S. Navy, a former chairman and CEO of Godfather’s Pizza and a former deputy chairman (1992–94) and chairman (1995–96) of the board of directors to the Federal Reserve Bank of Kansas City; she allegedly used VideoGuard-encrypted images of Greek Life oath ceremonies to extort U.S. Navy support for Protégé Ballistics war game maneuvers on 9/11 synched to Fox News broadcast of Matrix 5 propaganda; she allegedly used her Black Greek Life associates to design the ballistic profiles flown in the decoy murder of Captain Chic Burlingame and the Matrix 5 VideoGuard attack on the Pentagon’s U.S. Navy Command Center on 9/11; she was allegedly recruited into Matrix 5 training program through oath-taking ceremonies set up by lesbian / pedophile cult in the Delta Sigma Theta Greek Life sorority at Morris Brown College from where she graduated in 1968; she allegedly conspired with a fellow Delta Sigma Theta soror, Allison Seymour at Fox News, to develop the script for a VideoGuard encrypted broadcast of Ballistics 9/11; she allegedly helped her husband as a principal or an accessory to a systemic fraud on black students at Morris Brown College which resulted in the de facto closure of the school in 2002 after decades of manipulation of the Pell Grant system by the Soror Identity boss of the Senior Executive Service; she allegedly helped her husband develop Pell Grants to fund U.S. college students, including prisoners, launch treasonous careers in the racketeering enforcement of the United Nations Convention on the Law of the Sea and United Nations Environment Programme; she allegedly forced her husband and Senator Pell – arrested during a raid on a New York gay bar in the early 1960s – to push for Roberta Achtenberg, a lesbian, to serve as Assistant Secretary for Fair Housing and Equal Opportunity in the Department of Housing and Urban Development and engineer the collapse of Fannie Mae; she was allegedly ordered to marry Herman Cain after he had graduated from Morehouse College in 1967 with a B.A. in mathematics and steer him through an M. Sc. in computer science from Purdue University in 1971 to backdoor ballistics weapons development in the U.S. Department of the Navy; she allegedly extorted her husband into running as a candidate for the Republican presidential nomination in 2012 ; she allegedly groomed her husband for the phony role of a right-wing presidential candidate by moving him through the Department of the Navy, The Coca-Cola Company as a business analyst, through Pillsbury where he rose (1977-early 1980s) to the position of Vice President, through Burger King – a Pillsbury subsidiary – where he managed 400 stores in the Philadelphia area, through President and CEO of Godfather’s Pizza, a Pillsbury subsidiary and through a leveraged buyout (1988) as CEO until 1996, when he was asked to resign by the board; she allegedly placed Cain as a member of the board of directors to the Federal Reserve Bank of Kansas City in 1992 and served as its chairman from January 1995 to August 1996 to prepare for the Matrix 5 bank-in-the-middle attack on the capital markets on 9/11; she moved him on to the board of directors of Aquila, Inc from 1992 to 2008 where he allegedly gave the Worshipful Company of Fuellers access to the Matrix 5 TSol business model used to destroy Enron; she has allegedly positioned him as a commentator for Fox Business to conceal her role in the planning of Ballistics 9/11; she allegedly placed him as 1996 Senior Advisor of Dole/Kemp Campaign and as a 2012 presidential candidate for more than 40 Tea Party rallies; she allegedly developed his VideoGuard YouTube profile with Murdoch and Fox insiders ; she allegedly set up his presidential exploratory committee on January 12, 2011 and prepared to place him on the Fox News Channel program Your World with Neil Cavuto; she allegedly triangulated his election profile to the right of Obama by having him state that he was “uncomfortable” when he found that the surgeon operating on his liver and colon cancer was Muslim; she arranged for him later to explain “based upon the little knowledge that I have of the Muslim religion, you know, they have an objective to convert all infidels or kill them”; she allegedly arranged a May 5, 2011 Fox News presidential campaign debate where he competed with Tim Pawlenty, Ron Paul, Gary Johnson and Rick Santorum to be declared the winner by Murdoch pollster Frank Luntz chosen by Fox to run the post-performance focus group; she allegedly arranged for his September 24, 2011 victory in a Republican presidential straw poll in Florida, with 37 percent of the vote to ensure the front-runner Rick Perry, who had been leading in the polls, came in second with a humiliating 15 percent; she allegedly selected his Presidential campaign staff to include Mark Block as Chief of Staff, Linda Hansen as Deputy Chief of Staff and Scott Bieniek as Vice President and General Counsel; she allegedly uses Cain’s position as associate minister at Antioch Baptist Church North in Atlanta to leverage support from the National Baptist Convention, USA; she allegedly had him play the race card by uploading a YouTube video for his campaign where he describes the experience of sitting behind the white / black demarcation on buses and talks about the experience of taking turns with his brother, standing watch as each took a drink from the “white” side of a segregated water fountain in a department store.]”

74. Alison Lawton “[Alleged Matrix 5 principal and Treasury Solicitor’s ‘ownerless’ goods, born May 29, 1970 in Montréal, Québec, Canada; she is an alleged Greek Life extortionist of Bill Clinton and Frank Giustra – the man-in-the-middle founders of the $300 Million Clinton-Giustra Global Initiative; she is a Greek Life oath taker and alumnus of Communication Studies at Concordia University in 1995; she joined Investor First Financial before founding Winfield Venture Group, a private equity investment firm along with IdeaPark Ventures in 1997; she married Frank Giustra in 2000 and separated in 2008; she allegedly joint ventured Winfield with the CAI Private Equity Group to sell Greek Life investments in syndicated VideoGuard software for film and television, pig-farm real estate and various abusive KPMG tax-shelter offerings including American Psycho, Fahrenheit 9/11 and cannibal snuff-film content from the ‘Piggy’s Palace Good Times Society’; she allegedly used Lionsgate as a front for Greek Life production companies to procure VideoGuard-encrypted images of cannibal feasts at a B.C. pig farm; she allegedly extorted support from her pig farm dinner guests for the Matrix 5 man-in-the-middle propaganda attacks on America of Fahrenheit 9/11; she allegedly extorted Lloyd Axworthy, former Director of the University of British Columbia’s Liu Institute for Global Issues and former Canadian Foreign Affairs Minister – and suspected guest at Piggy’s Palace cannibal feast – into supporting forcible conscription of children in Uganda’s civil war; producer of the Matrix 5 propaganda documentary Uganda Rising; she allegedly helps Crown Agents to place Aids workers in Uganda’s SOS Children’s Villages to train orphans to serve as sextortionists, cannibal killers, sex slaves and breeding mothers; she has allegedly helped to create perception of a mercenary cult in Uganda – the Lord’s Resistance Army (LRA) – whose fighting force is made up in large part of abducted children led by the self-proclaimed prophet Joseph Kony, who says he wants Uganda to live by the laws of the Ten Commandments; she is allegedly extorting President Museveni and his SOS wife into attacking civilians to promote ethnic strife; she was allegedly awarded a Master of Arts in Applied Sciences by Simon Fraser University for her work with Greek Life media in the manipulation of financial markets; she is an alleged extortionist on the board of the Positive Women’s Network and Pacific AIDS Resource Centre (PARC); we alleged that she is accessory before or after the fact to the filmed contract killing of Wendy Ladner Beaudry who threatened to expose the Greek Life cannibal cult; she is the alleged extortionist Chair of the Unite for Children, Unite Against AIDS campaign for UNICEF Canada; she alleged extortionist appointee to the John F. Kennedy School of Government Women’s Leadership Board at Harvard University; she is an alleged extortionist member of the UBC Graduate School of Journalism Advisory Board]”

75. Jill Glazer (nee Henkin) “[Matrix 5 wife of allegedly extorted man-in-the-middle Avie Glazer who is a graduate of Washington University in St. Louis, a director/owner of the Manchester United Football Club and a sponsor of post-Katrina repairs (?) to the Tulane University campus; she pledged Sigma Delta Tau (SDT) sorority in 1981 at Newcomb College, Tulane; she majored in sociology and graduated in 1985 with a bachelor’s degree; she allegedly used her Nikon camera as the chapter’s unofficial photographer to record cannibal oath-taking ceremonies and extort orientation leaders and officers in SDT; in 1985 she moved to New York City where she met her future husband Avie Glazer; she now splits her time between Rochester, NY, New Orleans and Palm Beach, Fla.; she is a civic leader and alleged Greek Life extortionist of top officials in many religious and educational organizations; she is a former executive board member and vice president of the fundraising committee for the Hillel Community Day School in Rochester; she is a member of the development, auction and corporate sponsor committees for Palm Beach Day Academy, as well as a trustee of the school; she is a member of the Tulane Board of Administrators, to which she was appointed in 2009; she is a current member of the Tulane Parents Council; she is a past member of the Tulane President’s Council and former chair of the Alumni Admissions Committee; she allegedly extorted her husband into funding her alma mater’s post-Katrina campus beautification; she allegedly extorted the donation of trees for the Gibson and Monroe quads and Gibson Circle, the construction of the Newcomb Pottery Garden and the new garden and bocce court that bears the Glazer name across from the Alumni House on Willow Street; she was the co-chair for the 2009 Hullabaloo Homecoming Auction where she allegedly extorted close to $250,000, an almost-tenfold increase from the previous year, for Tulane’s student athletes; she allegedly extorted American banking giant AIG through a cannibal hedge fund pack to loan finance the Glazer’s takeover of Manchester United; she allegedly extorted AIG into a new shirt-sponsorship scheme in a record £56.5million deal; she allegedly worked with Elisabeth Murdoch to extort an increase in “battering ram” revenue from Video-Guard pay-per-view TV rights to each competition in which the club participates; she allegedly extorted a boost to the club’s profitability with a Nike apparel deal; she allegedly used a cannibal Greek hedge fund pack to set up a catastrophe bond fraud where the New Orleans levee system was sabotaged in events which triggered a class action suit against AIG by policyholders represented through the attorney, Ray Orrill; she allegedly used a cannibal Greek hedge fund managers to extort Obama administration officials to add language to a crony federal-stimulus bill which ensures AIG and hedge fund bonuses remained in place; she allegedly used a cannibal hedge fund pack to extort the departure of two top Old Trafford executives – Finance director Nick Humby and commercial boss Andy Anson – which left the Glazer family in complete charge of the club and isolated its chief executive, David Gill; she allegedly helped Elisabeth Murdoch to set up News of the World journalists and editors as decoys for the activities of cannibal Greek hedge fund managers and obtain the conviction of NOTW royal editor Clive Goodman and Glenn Mulcaire in 2007; she allegedly helped Elisabeth Murdoch to hack the mobile phone of Manchester United footballer Ryan Giggs; she allegedly used a cannibal Greek hedge-fund pack built by Sidley Austin alumni Bernardine ‘Torture: Paradigms and Practise’ Dohrn and Michelle and Barack Obama, to set up Directors and Officers (D&O) Liability and Insurance frauds on AIG directors and shareholders at a meeting on Friday, January 30, 2009 at the AXA Equitable Life headquarters 787 Seventh Avenue New York, New York; she allegedly knew that this was the address where AXA Equitable, AIG and Women @ Sidley paid blood and hush money to the victims of Matrix 5 man-in-the-middle attacks on NYC’s World Trade Center, allegedly staged and synchronized by the late Cannibal Greek General Alexander Haig in a snuff film tentatively en-titled ‘Triphibious 9/11’.]”

76. Greta Van Susteren (born June 11, 1954) “[Revised October 25, 2011. Matrix 5 principal and wife (m. 1988) of allegedly extorted man-in-the-middle, John P. ‘Bhopal’ Coale; she allegedly conspired with Greek Life associates Lynne Cheney (Kappa Alpha Theta) and Condoleezza Rice (Alpha Chi Omega) to gave General Henry Shelton an alibi for 9/11; she is allegedly using CNN In-Flight Network to conceal the name of the root authority behind Pershing Rifles and the Queens’ Guard in the Matrix 5 propaganda attack of 9/11; she allegedly used Femme Comp Greeks to extort control of the Department of Defense’s Mentor/Protégé Program; she allegedly hired Femme Comp Greeks to prepare a pay-per-view production of the live-broadcast snuff film ‘Triphibious 9/11’; she allegedly uses Greeks to launch Matrix 5 propaganda attacks with Delta Phi Epsilon (a professional foreign service fraternity founded at Georgetown in 1920) and its sorority (founded in 1973); she and her Greek Life associates were allegedly tricked (?) into swearing Aleister Crowley-designed oaths near ‘Bullingdon toilet bowls’; she is allegedly aware that such toilet bowls were set up for Matrix 5 camera crews at Hull House in Chicago and Toynbee Hall in Whitechapel – the latter being cleaned by the late Bullingdon Dining Club alumnus John Profumo, before the murder of U.S. President John F. Kennedy in 1963; Abel Danger makes a spoliation inference from her use of VideoGuard pay-per-view encryption to spoliate evidence and testimony from oath-taker controlled crime scenes that Greta Van Susteren is guilty as an accessory – before or after the fact – of the crimes which she has allegedly spoliated; she allegedly launched Femme Comp Inc. in 1979 with fellow Georgetown alumna Kristine Marcy (see #1) to operate as women-owned SBA small business engaged in murder-for-hire for the former Treasury Solicitor Juliet Wheldon (see bookend); we infer that she and her husband operate a racketeering tort-law partnership at Femme Comp’s FC-KU (Ku band) crime scenes in which he serves as the self-described “ambulance chaser” who became known as “Bhopal Coale” in 1984 being the first lawyer to hop on a plane to India to sign up gas-leak victims who couldn’t even read their retainer documents; she graduated from Xavier High School in Appleton in 1972 and the University of Wisconsin in Madison in 1976, where she studied geography and economics; she earned a Juris Doctor from Georgetown Law in 1979 and a Master of Law from the school in 1982; she was the first Stuart Stiller Fellow at Georgetown Law Center; she was an adjunct professor at the Law Center from 1984 through 1999; she allegedly used Femme Comp Greeks to hire false witnesses to accuse the innocent and shelter those people guilty of the coordinated sabotage of Union Carbide’s insecticide plant in India; she allegedly procured IFN devices for Femme Comp Greeks to trigger dial-a-blast bombs and encrypt fake images during a Matrix 5 propaganda attack on New Orleans where false witnesses attributed failures in the levee system to a 20’ surge from a day-old Hurricane Katrina; she allegedly procured IFN pay-per-view and VideoGuard-encrypted snuff-film devices for Greek Life extortionists at Rockwell Collins; she allegedly moved Femme Comp’s Greek Life extortionists through ‘diversity’ backdoors built by Rockwell Collins to control the National Society of Black Engineers (NSBE), the Society of Women Engineers (SWE), the North Carolina Agricultural and Technical State University (where she recruited Khalid Sheikh Mohammed) and Tuskegee University; she allegedly extorted her husband to sue his tailor, on the grounds that the sub-par work on his shirts had subjected him to “public humiliation . . . severe emotional distress, and embarrassment; she allegedly used FC Greeks to extort the West Virginia Bar into dropping attempts to disbar both her husband and herself for soliciting the families of coal-mine accident victims; she allegedly transmitted death threats through FC Greeks and her husband – then serving as an adviser to Sarah Palin – to force the non-Greek candidate out of the running for the Republican presidential primary campaign; she allegedly deploys FC Greek extortionists to control the Church of Scientology; she is a former criminal defense and civil trial lawyer and joined CNN in 1991 as a legal analyst to become co-host of CNN’s Burden of Proof and The Point with Roger Cossack from 1994 to 2002, playing defense attorney to Cossack’s prosecutor; she joined Fox News Channel after a highly publicized and phony contract-bidding war; she now hosts On the Record w/ Greta Van Susteren on the Fox News Channel; she utilized cosmetic surgery to manipulate public perception of her untrustworthiness; her Fox News “On the Record” is the highest rated cable news program in the 10 p.m. timeslot; she is allegedly using Femme Comp’s Greek Life extortionists to spoliate crime scenes and smear expert witnesses in Daubert defense ploys designed to ensure that prosecutors, jurors and investigators can rarely if ever establish guilt or meet the burden of proof beyond a reasonable doubt; she allegdly used FC Greeks with Kristine Marcy to generate false witness at crimes scenes or trials associated with the Waco Massacre, the murder of Vince Foster, the Murrah Building Bomb, JonBenet Ramsey, O.J. Simpson, the Elian Gonzalez custody battle, the frauds associated with Election 2000, the bombing of the USS Cole, Caylee Marie Anthony, Scott Peterson, Michael Jackson, Anna Nicole Smith, the disappearance of Natalee Holloway from Aruba; the Virginia Tech massacre where a suicide note in suspect Cho’s dorm room indicates he was entrapped by Femme Comp Greeks into “rich kids”, “debauchery”, and “deceitful charlatans” and where he alleges “You forced me into a corner and gave me only one option…You just loved to crucify me. You loved inducing cancer in my head, terror in my heart and ripping my soul all this time”; she has represented various clients in civil and criminal cases during her career as a trial attorney; she is the author of a chapter on witness and client representation in “Federal Enforcement 1992: Defense Strategies for Winning White Collar Trial.”; she was awarded the first place 2002 National Headliners Award as part of an investigative team covering the “Attack on America.”; she allegedly continues to divert public perception of ongoing treasonous acts by her Greek Life associates at Femme Comp Inc and she is preparing to place Gloria Cain and her Ballistics 9/11 husband in the White House as loyal servants of the Treasury Solicitor, the Queens’ Guard and the Bullingdon Toilet Bowl”

77. Jane Garvey (née Famiano) “[Matrix 5 principal and former boss of allegedly extorted man-in-the-middle top officials in the U.S. Federal Aviation Administration from 1997 to 2002; she has a B.A. from Mount Saint Mary College and an M.A. from Mount Holyoke College; she was appointed by President Bill Clinton on the orders of Hillary Clinton, as an FAA Administrator; Hillary Clinton chose her because she was the first Administrator who was not a licensed pilot and could therefore offer her plausible denial for the upcoming costume swap with the QRS11 missile gyroscopes which she believed would disguise the source of the planned attack on America; she passed off the management of U.S. air space to FAA Contract Towers saboteurs embedded in the Guild of Rippergate Serco companies controlled by John (Jack the Dipper) Profumo at Toynbee Hall with no security clearance; she was the former director of Logan International Airport where she allegedly re-arranged security clearances to permit Mohammed Atta to board the plane on 9/11; she sent key FAA staff to be out of Herndon on 9/11 so that alerts to NMCC and Rumsfeld in the Pentagon could be disrupted by General Henry Shelton using phony PKI authorities from the Speckled Trout; she sent Jack Kies, FAA’s manager of tactical operations, in Nashua, New Hampshire, to meet with Canadian air traffic controllers to coordinate decoy and drone attacks with software developed for the Speckled Trout by Macdonald Dettwiler and Associates of Richmond, B.C. – the BC OnLine data company which organized the mortgage on the pig farm used to host Greek Life cannibal oath ceremonies; she placed Linda Schuessler, as deputy director of system operations in the FAA Command Center in Herndon, Virginia; she set up an alibi with Mineta at a breakfast meeting at the Department of Transportation, in Washington, DC, and helped Shelton in the Speckled Trout to isolate President Bush in Sarasota, Florida, by jamming signals to the secure phone in his vehicle in the motorcade when the first WTC attack occured; she switched communication re the hijacking to the Speckled Trout’s I-FN links to the pay-per-view snuff film services of Murdoch’s Fox News; she arrived at her office at FAA headquarters in Washington, DC to find Monte Belger, her acting deputy, there; she headed across the hall to the Operations Center to set up a “hijacking net”—a teleconference that includes several agencies, including the Defense Department, and the General Shelton in the Speckled Trout; she intercepted info which should have been going to NMCC and Rumsfeld; she routed the Speckled Trout links live direct to Richard Clarke in the Secure Video Conferencing Center just off the main floor of the Situation Room in the West Wing of the White House; she and SES Clarke disrupted feeds to Cheney, Rumsfeld and Bush from the E4B over Washington in a costume swap with the Speckled Trout; she initiated a national ground stop, which forbids takeoffs and prevents military or law enforcement aircraft from checking who was attacking America; she allowed the Speckled Trout radome-controlled drones to look for more high value targets; she allowed Kristine Marcy’s Con Air to continue flying to create al-Qaeda decoys; she used Speckled Trout to authorize Linda Schuessler, the manager of tactical operations at the FAA Command Center, and various treasonous members of the Senior Executive Service to land about 500 planes in 20 minutes; she instructed SES Stephen Browning, the director of military and technical services for the Army Corps of Engineers, to clean up evidence of use of costume swap to conceal role of Speckled Trout in hijacking decoy and drone maneuvers at Ground Zero; she messaged through to the Office of Personnel Management Director Kay Coles James to tell senior executives to keep their mouths shut or risk exposure of Rippergate oath-taking info in their files; she set up FAA National Operations Manager Ben Sliney as a patsy for the order to shut down the entire nationwide air traffic system; she set up Leo Mullin, the CEO of Delta Air Lines, by jamming transponders on four Delta aircraft; she used the Speckled Trout to divert all international flights with US destinations to Canada to strip out Speckled Trout network-centric warfare devices developed by MDA in Richmond, B.C.; she continued to feed bogus information to POTUS 43 with claim that a plane had disappeared from radar and might have crashed in Kentucky; she concealed murder for hire use of Speckled Trout with a Rippergate costume swap for the crew of an E-4B which had participated in Amalgam Virgo exercise on June 1-2, 2001; she is an alleged principal in a Jane the Ripper conspiracy with Kristine Marcy’s SBA mentor-protégée teams which used General Shelton’s Speckled Trout as a costume-swapping command post to overthrow the U.S. government by force on 9/11.]”

78. Virginia Fortune Ogilvy, Countess of Airlie “[Matrix 5 principal and Lady of the Bedchamber since 1973 to an allegedly-extorted woman-in-the-middle, Queen Elizabeth II whom she attends on major occasions and overseas tours; on 23 October 1952, she married an allegedly-extorted David Ogilvy, who in 1968 became Earl of Airlie; he is the 8th (or 13th) Earl of Airlie and the eldest son of David Ogilvy, 7th (or 12th) Earl of Airlie and Lady Alexandra Coke; David Ogilvy was born in London, educated at Eton, and served in the Scots Guards during the Second World War; he remained in the army until 1950, when he attended the Royal Agricultural College in Cirencester, in order to learn more about estate management; she maintains two homes on the family’s 69, 000 acre (280 km²) estate in Angus: Cortachy Castle and Airlie Castle and a home in Chelsea, London; she was a presumed associate of the late Jack Profumo, the former Bullingdon Club Secretary for War who allegedly developed a Star Chamber strategy with Airlie for the MitM attack on America of 9/11; she is the daughter of John Barry Ryan, an American multi-millionaire, and Margaret, daughter of financier Otto Kahn; David Ogilvy took up merchant banking, joining J. Henry Schroder in 1953 where he was appointed a director of the company in 1961 and chairman in 1973; she allegedly forced her husband to resign from Schroders and engineered his appointment as Lord Chamberlain in 1984 where he allegedly tricked Queen Elizabeth II into handing over an ultra vires ‘Star Chamber’ authority to run HMG as his wife’s and her Crown Agents Sisters’ personal fiefdom; David Ogilvy’s late father was appointed Lord Chamberlain to Queen Elizabeth, the Queen Mother, in 1937 where he allegedly provided backdoor intelligence to Nazi sympathizers in the court of the former Bullingdon Club alumnus, the late King Edward VIII; she allegedly arranged for David Ogilvy to remain in his Lord Chamberlain’s post until 1997 to authorize the infiltration of LGBT agents into GCHQ, the adoption of Clipper PKI for MitM propaganda and the privatization of Crown Agents to support the Star Chamber attacks on the USS Cole in Aden Harbour and the American government on 9/11; in 1997 she arranged for the appointment of Richard Luce as Lord Chamberlain; she allegedly placed Luce in the unlawful Star Chamber and forced him to adopt Clipper encryption technologies needed to conceal the staging of the ‘first live broadcast mass snuff film in human history’ on 9/11 and the demolition of WYC#7; in May 2007, she accompanied Queen Elizabeth II on her trip to the United States to commemorate the 400th anniversary of England’s first American settlement at Jamestown, Virginia and attended a state dinner at the White House, hosted by President George W. Bush and Mrs. Bush.]”

79. Tracey McVicar “[Matrix 5 principal and manager of 50+ allegedly-extorted man-in-the-middle Special Investors in, or consultants to, the CAI Private Equity Group who held erstwhile equity positions in MacDonald, Dettwiler and Associates Ltd. (“MDA”); she hired David Emerson in November 2008 as CAI “senior advisor” at the equity firm’s Vancouver office when she knew or ought to have known that he was a longstanding investor in CAI and the alleged cestui que murder-for-hire services of MDA; in her early twenties, in 1990, McVicar earned a bachelor’s degree in finance from UBC where she allegedly swore a cannibal oath of lifetime loyalty and obedience to Greek Life sororities corruptly associated with the Vancouver Settlement Movement; she appears to have placed Emerson, then CEO at Bentley’s Canfor, on the board of MacDonald Dettwiler in August 2001 in an alleged attempt to compromise him through MDA’s alleged use of Clipper in MitM propaganda communications on 9/11; In 1999, CAI bought a position in MacDonald Dettwiler and Associates and placed Brooklyn-based Peter Restler, a founding CAI partner on the MDA board; CAI was founded in 1989 by seven investors, including a couple of ex-Salomon Brothers partners in New York who would allegedly go on to equip the Schroders Salomon Smith Barney offices in WTC#7 with Clipper encryption devices to support insider and outsider trading, churning and pump-and-dump frauds; in 1999, CAI bought a position in MacDonald Dettwiler and Associates and placed Brooklyn-based Peter Restler, a founding CAI partner on the MDA board; she allegedly placed Emerson in July 2010 on the board of Postmedia Network Inc. – owner of many B.C. dailies – to ‘manage’ pig farm stories appearing in the Vancouver Sun, The Province and the Times Colonist; she traveled in the summer of 2001 to work for a couple of months with disadvantaged children in Mott Haven, said to be the poorest neighborhood in New York’s South Bronx; during those two months, she allegedly procured Clipper encryption devices through MDA’s PKI program to equip saboteurs and assassins embedded in New York’s Settlement Movement with the secure PCDs (Nokia?) needed to synchronize spin and spoliation of evidence at the 9/11 crime scenes; she joined investment banking division at RBC Dominion Securities where Larry Blain was her allegedly-extorted boss; she left to join a Vancouver-based brokerage, Goepel, Shields and Partners; by 1997, she had become a partner at the firm and a member of its board of directors; in 2003, she left to head up the Vancouver office of CAI Capital Management Ltd.; she allegedly used CAI Clipper encryption devices to allow insiders to mount MitM attacks on targets such as Nortel; she allegedly extorted a gig with the board of directors at BC Hydro in December 2007; she allegedly extorted Larry Blain and fellow directors of BC Hydro into awarding the $73 million BC Hydro smart-grid contract to Corix Utilities, part of the Corix Group of Companies in which one of the biggest shareholders is CAI Capital Management where she is the managing director!]”

80. Ann Romney (nee Davies) “[Revised June 27, 2012. Alleged Matrix 5 principal and Mormon wife of the allegedly-extorted man-in-the-middle Mormon, Mitt Romney; she allegedly secured a crony position as governor’s liaison to dirty money laundered by Kristine Marcy through the White House Office of Faith-Based and Community Initiatives; she allegedly used the money to build the Federal Bridge Certification Authority and pimp for the Fundamentalist Church of Jesus Christ of Latter-day Saints (FLDS) and the United Effort Plan (UEP) – both being Mormon pedophile sects linked to Bountiful, British Columbia, and SOS Children’s Villages in Canada; she allegedly used the money to fund Fast and Furious contract hits by Femme Comp Inc (FCI) assassins; she allegedly used the money to pay Mormon and Femme Comp hit teams for the murder of law enforcement officers and subversion of Mexican and United States governments; she allegedly used the Federal Bridges (cf. Entrust Ottawa and Sidley Austin, Chicago) to move pedophiles through B.C.’s Bountiful community and extort silence from terrified trustees of the Utah Retirement System re various naked short positions during 9/11 and the subprime panic of 2007; she allegedly extorted her husband’s partners and clients at Bain & Company through VideoGuard pay-per-view encryption devices which concealed conditional access to insider-trading information for the 9/11 panic of the capital markets; she allegedly extorted her husband’s partners and clients at Bain & Company through VideoGuard pay-per-view encryption devices of snuff-film images procured by pedophile pimps through the Bountiful community in British Columbia; she allegedly converted to The Church of Jesus Christ of Latter-day Saints in 1966 to take control of her future husband’s career; she allegedly conspired with Mitt’s father, George Romney, then Governor of Michigan, to move Mitt into a Mormon Mission Home mansion in Paris to learn the basic techniques of pedophile entrapment and man-in-the-middle propaganda; she allegedly used her future husband to help her lesbian friends to coordinate MitM attacks on the U.S. government and White House insiders in respect of their role in the Vietnam War; she allegedly used her future husband to help her lesbian friends to coordinate MitM attacks on French government leaders in respect of their role in the May 1968 general strike and student uprisings [cf. Jane ‘The Ripper’ Addams’ similar role in the University Settlement Movement through WWI]; she began attending Brigham Young University and then married Mitt Romney in 1969; she was First Lady of Massachusetts from 2003 to 2007; Ann Davies knew of Mitt Romney since elementary school; she began dating him in March 1965; she spent a semester at the University of Grenoble in France during her freshman year; after Mitt’s return from France in December 1968, the pair reconnected and agreed to get married as soon as possible; they were married by a church elder in a civil ceremony on March 21, 1969, at her Bloomfield Hills home, with a reception afterward at a local country club; the following day the couple flew to Utah for a wedding ceremony inside the Salt Lake Temple; her family could not attend since they were non-Mormons, but were present at a subsequent wedding breakfast held for them across the street; after Mitt graduated, the couple moved to Boston so that he could attend Harvard Business School and Harvard Law School; she later finished her undergraduate work by gaining a semester and half’s worth of credits via taking night courses at Harvard University Extension School, from which she graduated in 1975 with a Bachelor of Arts degree with a concentration in French language; she has been involved in a number of children’s charities, including being director of the inner city-oriented Best Friends; she worked extensively with the Ten Point Coalition in Boston and with other groups that promoted better safety and opportunities for urban youths; she has served as a board member for the United Way of America and helped found United Way Faith and Action; she was given the 2006 Lifetime Achievement Award from Salt Lake City-based Operation Kids. [Abel Danger alleges that Romney used pedophile federal bridge to mingle their wealth derived from naked short selling with fraudulently converted assets of the Utah Retirement System in Cayman Islands tax havens]”

81. Sheila M. O’Grady “[Matrix 5 principal and former Chief of Staff of the allegedly extorted former man-in-the-middle Mayor of Chicago, Richard M. Daley, with whom she shared responsibility for the City’s $5 billion dollar annual budget and the management of nearly 40,000 employees spread over more than 40 city departments; she currently serves as the President of the Board of Directors of SOS Children’s Villages of Illinois, a charitable organization, allegedly set up by Canadian Privy Councilor Maurice Strong to help pedophile pimps entrap and extort city, state and federal government leaders during fraudulent election campaigns such as the one which put the Obamas into the White House; she allegedly oversaw the development of a former mattress factory in Chicago into an SOS Children’s Village for pedophiles; she allegedly hired tradesmen through the ‘Pickton’ Guild of Professional Home Services to install Entrust public key infrastructure (‘PKI’) bugging devices in the SOS Villages to record encounters between child and adult victims of a global pedophile entrapment and extortion matrix; she allegedly used Entrust public key infrastructure to contact pedophile members of Kristine Marcy’s Senior Executive Service and procure personnel records on Herman Cain; she allegedly ‘doctored’ these records and transferred them to the National Restaurant Association (NRA) to serve as a decoy front and support allegations that Cain was a ‘black’ sexual predator and knock him out of contention for the 2012 presidential elections and secure a second term for the less black Barack Hussein Obama; she is the President of the Illinois Restaurant Association, a non-profit trade association, allegedly controlled by City and ‘Rippergate’ Guilds of London Livery Companies including the Worshipful Company of Cooks; she has held various responsible positions with the City of Chicago including that of First Deputy Commissioner of the Department of Planning and Development and Director of Code Enforcement for the City’s Zoning Department; she holds an undergraduate degree from St. Mary’s College in Notre Dame, Indiana, where she majored in humanistic studies; a graduate degree from the London School of Economics [where she was allegedly recruited into a pedophile matrix, embedded in University Settlements and City and Guilds], where she concentrated her studies in urban planning; and a law degree from the University of Notre Dame]”

82. Callista Louise Gingrich (née Bisek) “[Revised January 22, 2012. She is the wife of allegedly extorted man-in-the-middle former Speaker of the United States House of Representatives, Newt Gingrich; she married Gingrich on August 18, 2000 and, in 1999, testified that the couple began an affair in 1993, while he was still married; she allegedly procured VideoGuard pay-per-view encryption devices to conceal images of pedophile entrapment of her husband’s House associates and the extortion of actors who participated in a Wag the Dog propaganda broadcast during continuity of government exercises on 9/11; she allegedly extorted him to convert to Catholicism as a cover for his godless philandering; and the President of Gingrich Productions, a multimedia production company based in Washington, D.C.; she graduated cum laude from Luther College – an alleged sponsor of SOS Children’s Villages’ pedophile entrapment centers – in Decorah, Iowa, in 1988; she and her husband host and produce historical and public policy documentaries, editorials and advocacy films, allegedly for the purposes of man-in-the-middle attacks on faith-based and community initiatives; their alleged propaganda films include A City Upon a Hill, America at Risk, Nine Days that Changed the World, Ronald Reagan: Rendezvous with Destiny, Rediscovering God in America, Rediscovering God in America II: Our Heritage, and We Have the Power; she has voiced several audio books, allegedly including the man-in-the-middle propaganda titles To Save America, Valley Forge, 5 Principles for a Successful Life, Drill Here, Drill Now, Pay Less, The Art of Transformation, Real Change, Contract with the Earth, and Rediscovering God in America; she wrote Sweet Land of Liberty, an alleged children’s propaganda book about American exceptionalism featuring Ellis the Elephant; she is the president of the Gingrich Foundation, a charitable nonprofit corporation which established the Newt L. and Callista L. Gingrich Scholarship at Luther College, an alleged sponsor with the Hong Kong and Shanghai Banking Corporation of SOS Pedophile Villages; she is the former Washington, D.C.-based staffer of the allegedly-extorted gay man-in-the-middle President and CEO of the Council on Foundations, Steven Craig “Steve” Gunderson, a former Republican congressman from Wisconsin; she allegedly extorted Gunderson and his LGBTQ colleagues in the Council of Foundations into funding developments in DOJ Pride public key infrastructure which conceal the sale of the Fast and Furious weapon used to kill DEA agent Brian Terry]”

83. Juliet Wheldon “[Revised January 2, 2012. Matrix 5 principal and Chief Legal Adviser to the allegedly extorted man-in-the-middle Governor of the Bank of England; she is a former HM Procurator General, Treasury Solicitor (‘TSol’) and Head of the Government Legal Service (2000–06) with root authority for contract killing by HMG Dope Inc. (Crown Agents); she allegedly served as Entrust root authority for cross-certification frauds by a matrix of Trusted Traders whose insurers, reinsurers, brokers and SWAT teams allegedly helped each other to trigger a Twin Towers catastrophe bond on 9/11; she and Yeuk-Si Tang (David Emerson’s Femme Comp wife – see #8), allegedly used TSol’s pig farm pension fund to buy the ‘Trusted Trader’ services of David Emerson, a “son-in-law of China”, a former Canadian foreign minister and the former director of Macdonald Dettwiler and Associates; she allegedly advised Kristine Marcy – see #1 – how to set up a revolving fund (DOJ # 15X4275) with ownerless goods donated by the drug trade in an MitM joint venture with the Treasury Solicitor to modify Con Air JPATS for VideoGuard-encrypted attacks on 9/11; she allegedly used VideoGuard encryption to synchronize TSol’s ownerless crime-scene images with Matrix 5 propaganda attacks triggered by the 7/7 bombings in London; she allegedly gave Matrix 5 insiders conditional access to TSol cat bonds triggered during pay-per-view VideoGuard snuff films on 7/7 and 9/11; she has allegedly set up a $73 trillion bona vacantia (ownerless) credit pool in the custody of the Treasury Solicitor and City Livery Companies to serve as a Carbon Disclosure Project to punish rebels and a Pig Farm Pension fund to enrich insiders; she is allegedly using VideoGuard-encryption devices to conceal the snuff-film pedophile trade in ownerless assets of SOS Children’s allegedly funded by Matrix 5 insiders in a racketeering joint venture with HSBC, the Bank of England and the Treasury Solicitor; she is allegedly using VideoGuard-encrypted snuff-film images in the Treasury Solicitor’s custody to extort the Bank of England Governor and Matrix 5 insiders into cat-bond pump and dump frauds during the ‘Global Financial Crisis’; she has allegedly deployed 1,400 lawyers to entrap and extort officials in 25 government departments, agencies and other organisations – ranging from the Home Office and the Ministry of Defence to the Competition Commission and the Office of Gas and Electricity Markets; she has allegedly extorted lawyers at MI5 and MI6 into silence in re the “Case of the Folded Spook”; she has allegedly arranged coercive injunctions to gag whistleblowers in the security and intelligence services when they threaten to break their duty of confidence; she has allegedly used VideoGuard encryption to adopt and adapt the Treasury Solicitor’s racketeering man-in-the-middle propaganda services to the Home Office which date back 160 years; she has years of expertise in setting up entrapment in phony divorce cases to enrich insiders as in bugging of Princess Diana up to the time of the contract hit or Sofitel in New York to entrap the former World Bank president Dominic Strauss; she was a former Legal Adviser to allegedly-extorted men-in-the middle officials in the Home Office (1997–2000); Former Legal Secretary to the allegedly-extorted Law Officers’ Department (1989–97) where she helped force the integration of U.K. foreign policy, military, criminal justice and judicial cooperation into the Maastricht Treaty and spoliated evidence of Crown Sister Hillary Clinton’s role in the Export of Defence Equipment and Dual-Use Goods to Iraq; Former Legal Adviser to allegedly-extorted Department of the Treasury Solicitor (1987–89) where she allegedly helped to spoliate evidence from the Pan Am 103 crime scene; Former staffer to Law Officers’ Department (1986–87); Former Assistant Legal Secretary to Department of the Treasury Solicitor (1984–86); Former staffer to Law Officers’ Department (1983–84); Former Advisory Division in Department of the Treasury Solicitor (1976–83); she matriculated at LMH Oxford University in 1968 where she read Modern History; her former Treasury Solicitor’s post dates at least as far back as 1661 and gave her access to a well proven M.O. for Matrix 5 extortion of top government officials through pedophile oath-taking ceremonies allegedly introduced into America in 1776 by founders of a Greek Life community at William and Mary College and introduced into the United Kingdom in the same year by founders of the Bullingdon Club at Oxford University.”

84. Dame Elish Frances Angiolini (née McPhilomy) “[Dame Angiolini is a Matrix 5 principal who allegedly directs the pedophile entrapment and extortion of man-in-the-middle officials in the offices of the Lord Advocate, the Solicitor General and the Procurator Fiscal (Public Prosector) of Scotland; she grew up in Govan, Glasgow in a working class family; she studied at the School of Law of the University of Strathclyde where she obtained an LLB in 1982 and a Diploma in Legal Practice in 1983; she allegedly began radicalizing and intimidating witnesses and victims while training at the Crown Office and Procurator Fiscal Service as a Procurator Fiscal (public prosecutor); after her training, she spent 8 years as a Deputy Procurator Fiscal in Airdrie, prosecuting in Airdrie Sheriff Court; in 1992, she began working for Crown Agents when was seconded to the Crown Office where she worked in the Lord Advocate’s Secretariat; in this role, she allegedly adopted a stolen copy of PROMIS to track and intimidate adult and child victims and witnesses; she was then appointed Senior Depute Procurator Fiscal at Glasgow, taking operational responsibility for Sheriff and Jury prosecutions; she was promoted to Assistant Procurator Fiscal at Glasgow in 1995; she allegedly began worked on the illegal transfer of PROMIS to the International Association of Prosecutors – the only global non-governmental organisation of prosecutors, established by the United Nations in 1995, Vienna; she allegedly helped the United Nations insider to track and protect the principals of transnational crime including drug trafficking, money laundering and the pedophile trade through SOS Children’s Villages sponsored by lessors and lessees based at Canada Square, Canay Wharf; she returned to the Crown Office as Head of Policy in 1997 and began to integrate PROMIS with the U.K. MoD’s Federal Bridge to track the guilty track the innocent through databases associated with Interpol phony crime scene investigations; she was appointed Regional Procurator Fiscal for Grampian, Highland and Islands (based at Aberdeen) on 27 July 2000; in this role she allegedly piloted a victim tracking schems with PROMIS and the Federal Bridge which has subsequently been extended across the country; in 2001, shortly after the MoD’s Federal Bridge was used to conceal perpetrators of the 9/11 man-in-the-middle attacks on America, she was appointed Solicitor General for Scotland by Field McConnell’s namesake, First Minister Jack McConnell; she was the first solicitor, as opposed to advocate, to be appointed Solicitor General to the objections of amongst all members of the extorted (?) legal profession; she was nominated for the post of Lord Advocate and her nomination was passed by Parliament on 5 October 2006, with 99 in favour, 0 against and 15 abstentions; she was sworn in at the Court of Session on 12 October 2006 and one month later she was made a member of the Privy Council thereby joining a ‘Star Chamber’ group which had allegedly extorted control over the UK MoD’s PKI root authority over the stolen copy of PROMIS and its use in the Federal Bridge in murder-for-hire; she allegedly extorted leaders of the SNP administration and Alex Salmond, the First Minister to let her keep her post of Lord Advocate albeit depriving her of her seat in Cabinet; she had her reappointment agreed by Parliament on 24 May 2007 making her the first Lord Advocate to serve two different governments; she clashed later in 2007 with the head of Scotland’s judiciary, Lord President Hamilton, over the collapse of the World’s End murders trial where the trial judge, Lord Clarke, had ruled there was insufficient evidence for the jury to convict and threw the case out; she made a statement to the Scottish Parliament, saying she was “disappointed” at the decision, a move Hamilton said undermined the independence of the judiciary; she announced in October 2010 that she would step down from the role of Lord Advocate after the Scottish Parliament elections in May 2011 but Abel Danger believes that she is still defrauding innocent victims through the use of PROMIS and the Federal Bridge to sabotage prosecutions and shelter the guilty.]”

85. Courtney Banks (nee?) “[Revised May 29, 2012. Courtney Banks is the Matrix 5 principal of a Missing Children PYSYOPS program financed by the DOJ’s Asset Forfeiture Fund and the 2007 founder and Chief Executive Officer of Nat’l Security Associates WorldWide (NSAWW); she allegedly procured the North Face sports bag used to transport the body of GCHQ-code breaker Gareth Williams to his home in Pimlico, through a supply chain which moves ‘sedated assets’ under the PSYOPS program which she set up as an intern with the Clinton White House; she is the alleged director of an extorted man-in-the-middle senior leadership team at NSAWW with a combined eighteen decades of public service and business experience working in intelligence, defense, transportation and border security, preparedness and response, and law enforcement; Banks allegedly worked with Kristine Marcy on the use of Clipper chips and Nortel’s Joint Automated Booking Station (JABS) to spoliate evidence of a home break-in and torture murder of JonBenet Ramsey on Christmas Day, 1996 in Boulder, Colorado; she allegedly used images of the murder to extort concessions from the directors of Lockheed Martin, Siemens, Serco, Keane and many other Fortune 500 corporations; prior to founding NSAWW, she worked across the public and private homeland/national security sectors – from the White House and Department of Justice, to the world’s largest defense contractors; she served as Vice President of Homeland Security for Raytheon Company where she allegedly developed Missing Children PSYOPS programs for the company’s homeland security business in North America, the Middle East, Eastern and Western Europe, and Asia; prior to Raytheon, she served as Director of Homeland Systems Solutions for Lockheed Martin and used the Missing Children PSYOPS to subvert the company’s homeland security/homeland defense business; prior to joining Lockheed Martin, she served as an independent national security consultant to the federal government and private corporations; in 2000, she allegedly extorted President Clinton to place her in the Office of the Assistant Secretary of Defense for Special Operations /Low Intensity Conflict as Assistant in Charge of Global Terrorism Issues in the anti-terrorism directorate and prepare the 9/11 attacks; prior to this appointment, she served as the program manager for the Inter Agency Response Awareness Program for the Office of the Assistant Secretary of Defense for Special Operations /Low Intensity Conflict in the counter-terrorism directorate and drew up the continuity of governmet protocols tested in Amalgam Virgo on June 1-2, 2001; prior to this she acted as the Director of Force Health Protection for the Gulf War Illness Task Force in the Department of Defense, in which capacity she also served as a subject matter expert on PSYOPS to undermine procedures for combat stress management; she developed the principles of Missing Child PSYOPS while working with Kristine Marcy and Hillary Clinton in the Department of Justice in the Antitrust Criminal Division and for the Office of Chief Counsel in the White House; she appears regularly in national and trade media – Business Week, the Washington Business Journal, Town and Country magazine, CBS news, etc. – as a sought after(?) speaker on national security and business issues; she serves on the ASIS Council for Combating Terrorism, Violence and Political Instability; she was the Chair of the 2010 Hope for the Warriors “Got Heart Give Hope” annual black tie gala; she served on the 2010 Host Committee for the National Center for Missing and Exploited Children (NCMEC) Annual Golf Tournament; she was a Finalist for the 2010 Ernst & Young Entrepreneurial Winning Women award and was the 2010 winner of the “Heroines in Technology” AFCEA/March of Dimes Award; she has guest lectured at many colleges and universities and is published on the subject of Agro-Terrorism where she allegedly coordinated the anthrax letter attack on Congress; she holds a MA in National Security Studies from Georgetown University where she allegedly attended or directed Delta Phi Epsilon pedophile oath-taking rituals associated with Ordo Templi Orientis (O.T.O.) – a secret society headed at one time by Aleister Crowley – which inducted Madeleine Albright; she holds a BA, with honors, in Military History from the University of Pennsylvania. She resides with her family in the metro Washington, D.C. area.]”

86. Baroness Noakes DBE “[Matrix 5 principal and alleged sponsor of lesbian and/or pedophile man-in-the-middle extortionists of leaders of churches, government and industry; she was appointed a Reuters Trustee in 1998; she is a non-executive director of Carpetright plc (since 2001), Severn Trust plc (since 2008) and the Royal Bank of Scotland Group plc (since 2011); she was an elected member of the Council of the Institute of Chartered Accountants in England and Wales from 1987 to 2002 and its first woman President in 1999/2000. Baroness Noakes was awarded a DBE in 1996 and made a life peer in 2000. Past appointments include: non-executive director of Imperial Chemical Industries PLC (2004–2008), non-executive director of the Court of the Bank of England (1994–2001 including senior non-executive 1998–2001); she was an allegedly corrupt member of Advisory Council of the Institute of Business Ethics (1998 – 2003); she was an allegedly corrupt Commissioner of the Public Works Loan Board (1995–2001); she was an allegedly corrupt Governor of the London Business School (1998–2001) and Eastbourne College (2000–5); Board member of Social Market Foundation (2002–4); she was an allegedly corrupt non-executive member of the Inland Revenue’s Management Board (1992–99); she was an allegedly corrupt non-executive member of the NHS Policy Board (1992–95), the Chancellor of the Exchequer’s Private Finance Panel (1993–97) and the government’s Public Services Productivity Panel (1998–2000); she joined Peat, Marwick, Mitchell & Co. (now KPMG) in 1970 as an articled clerk and qualified as a Chartered Accountant in 1973; she was a partner in KPMG from 1983 to 2000 and allegedly conspired with Vicky Huhne in developing a Thomson Reuters Wag the Dog story for the massive attacks of 9/11; she was educated at the University of Bristol (Bachelor of Laws).]”

87. Mary Cirillo “[Matrix 5 principal and alleged sponsor of lesbian and/or pedophile man-in-the-middle extortionists of Thomson Reuters and its Libor banking cartel; she was Chair and Chief Executive Officer of Opcenter, LLC, an Internet consulting firm, from 2000 to 2003; prior to that, she was a senior banking executive at Bankers Trust and Citibank for over 20 years and engineered Citibanks racketeering role in Libor and its position on the UK MoD’s Federal Bridge Certification Authority prior to 9/11; she is a member of the Advisory Board of Hudson Venture Partners, L.P., a venture capital firm, and serves on the boards of several cultural and educational organizations; she has a BA from Hunter College; she is a director of DealerTrack Holdings, Inc., ACE Ltd., the re-insurance company which allegedly set up pass-through certificate with Citi/Travelers for the Twin Towers double-occurrence demolition on 9/11]”

88. Lawton Fitt “[Matrix 5 principal and alleged sponsor of lesbian and/or pedophile man-in-the-middle extortionists of Thomson Reuters and its Libor banking cartel and associated private equity groups; she joined the board of Reuters in 2004; she served as Secretary (CEO) of the Royal Academy of Arts London from 2002 to 2005; she was an investment banker with Goldman Sachs & Co., where she became a partner in 1994 and a managing director in 1996; she is a trustee or director of several not-for-profit organizations; she has a bachelor’s degree from Brown University and an MBA from the University of Virginia; she is a board member of CIENA Corporation and The Progressive Corporation; she is a board member of The Carlyle Group, which, in an alleged conspiracy with Reuters trustee, John McArthur, and his fellow special investors in the CAI Private Equity Group, organized the Wag the Dog attack of 9/11 with the Worshipful Livery Companies]”

89. Dame Helen Alexander “[Matrix 5 principal and alleged sponsor of lesbian and/or pedophile man-in-the-middle extortionists of Thomson Reuters and its Libor banking cartel and associated private equity groups; she was appointed a Reuters Trustee in 2011; she is chairman of UBM plc, the Port of London Authority (PLA) and Incisive Media; she is deputy chairman of esure Group Holdings; she is a non-executive director of Rolls-Royce Group plc; she is a senior adviser to Bain Capital and allegedly arranged for Mitt Romney’s profits to be hidden in tax shelters set up by Sidley Austin in the Cayman Islands; she was president of the Confederation of British Industry (CBI) until June 2011; she is Chancellor of the University of Southampton; she is associated with MitM attacks through the WorldWide Web Foundation, the Grand Palais in Paris, the Said Business School in Oxford and St Paul’s Girls’ School; she was Chief Executive of the Economist Group till 2008, having joined the company in 1985 when she allegedly began working with Barack Obama’s Rainbow Coalition in Chicago on the development of a leveraged Libor lease to finance the demolition of the Twin Towers on 9/11; she was managing director of the Economist Intelligence Unit from 1993 to 1997.]”

90. Monique Villa “[Matrix 5 principal and alleged extortionist behind Thomson Reuters’ man-in-the-middle attacks on Libor banks, including Barclays (LGBT Gareth Williams), HSBC (Fast and Furious) and Bank of America (WTC#7); she was formerly managing director of Reuters Media; she is chairman of Action Images, a specialist sports photography agency acquired by Reuters in September 2005; she joined Reuters in 2000 to manage the picture and text news business for the Reuters News Agency where she was allegedly responsible for snuff-film feeds associated with al-Qaeda 9/11; she allegedly negotiated deals for Media and Editorial to get Libor man-in-the-middle propaganda inserted into the International Herald Tribune print and online business pages; she allegedly used her senior journalistic and management positions in Agence France Presse (AFP) as a cover to stage IRA/Al-Qaeda snuff-film bombing campaigns in Paris, Rome, London and Ireland; she allegedly used her 1996 position as director of strategy and business development at the AFP headquarters in Paris to build an ‘al-Qaeda’ partnership with Thomson Reuters and its Libor panel banks vested in DoJ Asset Forfeiture Fund and the presidential candidacies of Barack Obama and Mitt Romney; she studied Law and Political Science and has a Diploma from the Paris Centre de Formation Des Journalistes]”

91. Sally Shelton-Colby “[Matrix 5 principal and alleged man-in-the-middle extortionist of leaders of America’s intelligence services; she was a Vice President of Bankers Trust Co. in New York City; she allegedly served BT as a co-sponsor of the Libor project in the City of London to manage the bank’s political risk in developing countries during the third world debt crisis of the 1980s; she allegedly arranged the 1996 contract hit of her husband William Colby, a former director of the Central Intelligence Agency; she allegedly had him killed to protect a conspiracy she was developing with then-CIA director, John Deutsch, for the British Bankers Association’s Libor Project 9/11; she is allegedly running a Fast and Furious cover-up project for USAID and the Government of Mexico in Mexico City; she has been Deputy Secretary-General of the Organization for Economic Cooperation and Development (OECD) in Paris, France; she has been Assistant Administrator of the Bureau for Global Programs at the U.S. Agency for International Development; she has been U.S. Ambassador to Grenada, Barbados and several other Eastern Caribbean nations; she has been Deputy Assistant Secretary of State for Latin America and the Caribbean; and Legislative Assistant for Foreign Policy to then-Senator (later Secretary of the Treasury) Lloyd Bentsen; she is a member of the Council on Foreign Relations and the American Academy of Diplomacy; she has served on the Boards of Directors of Valero Energy Corporation, a Fortune 500 company and the world’s largest oil and gas pipeline company, and the Baring Puma Fund, a closed-ended fund traded on the London Stock exchange and engaged in acquiring emerging market equities; she has served on a number of non-profit Boards of Directors, including Helen Keller International, Helen Keller International Europe (where she was also president), the National Endowment for Democracy, the International Planned Parenthood Federation, the National Democratic Institute for International Affairs, the Atlantic Council of the U.S., the Center for International Environmental Law, the American Committee for Aid to Poland, the American Hospital of Paris, and the Pan American Health and Education Foundation, among others; she was one of the founders and first Chairman of the Board of Directors of UNAIDS, a U.N. entity which coordinates the HIV-AIDS prevention programs of the World Bank, the WHO, UNICEF, UNDP, and UNFPA; she served on two White House Commissions: the Gore-Chernomyrdin Commission (Russia), where she was Vice Chair of the Committee on Health and the Committee on Agriculture, and the Gore-Mubarak (Egypt) Commission where she was Co-Chair of the Committee on Education]”

92. Book-end: Theresa Mary May (née Brasier) [Revised June 30, 2012. An alleged Matrix 5 principal who allegedly uses pedophile surveillance, entrapment and extortion to control man-in-the-middle officials in the police, religious, military and civilian organizations in the United Kingdom; she allegedly sponsored same sex agents to infiltrate City and Guilds Livery Companies and create a de facto Worshipful Company of Blackmailers; she allegedly authorized the Blackmailers to hire Anna Chapman – a same-sex pedophile pimp – to entrap Barclays and Thomson Reuters staff in LIBOR insider trading frauds which recently generated £290 million in fines to enrich FSA and DOJ Forfeiture funds; she is a British Conservative politician who is Home Secretary in the Conservative – Liberal Democrat Coalition; she was elected to Parliament in 1997 as the Member of Parliament for Maidenhead; she served as the Chairman of the Conservative Party, 2003–04; she was appointed to the Privy Council in 2003; she became Shadow Secretary of State for Work and Pensions and Shadow Minister for Women before being appointed Home Secretary and the Minister for Women and Equality in David Cameron’s Cabinet on 11 May 2010; she attended the University of Oxford where she read Geography at St Hugh’s College, taking a BA (Hons) in 1977; she worked from 1977 to 1983 at the Bank of England; she worked as a financial consultant and senior advisor in International Affairs at the Association for Payment Clearing Services; she allegedly conspired with Juliet Wheldon to undermine the Treasury Solicitor’s office with leveraged leases financed by ‘bona vacantia’ credit; she stood (and lost) in the safe Labour seat of North West Durham in the 1992 general election; she stood and lost in the 1994 Barking by-election; she was elected the Conservative MP for Maidenhead in 1997 general election; she was Shadow Spokesman for Schools, Disabled People and Women (1998 – June 1999) in William Hague’s front-bench Opposition team; she became the first of the 1997 MPs to enter the Shadow Cabinet when in 1999 she was appointed Shadow Education and Employment Secretary; after the 2001 election, the new Conservative leader Iain Duncan Smith retained her services in the Shadow Cabinet, moving her to the Transport portfolio; she allegedly knew of the City and Guilds plans to trigger the double-occurrence for the Wells Fargo Twin Towers pass through certificates; she became first female chairman of the Conservative Party in July 2002; she stated at the 2002 Conservative Party Conference that the party must change because it was perceived as the “Nasty Party”; she was sworn of the Privy Council in 2003; she was appointed Home Secretary and Minister for Women and Equality by the Prime Minister of the United Kingdom, David Cameron as part of his first cabinet; she is tireless sponsor of gender equality; she pretends to oppose the European Union (Eurosceptic); she plans to scrap the UK Human Rights Act; she received the Freedom of the City of London; she has joined the Livery of the Worshipful Company of Marketors which allegedly conspired with Bain and Company’s London Office in structuring the leveraged lease triggers to the Global Financial Crisis of 2008

DRUGS USED FOR MIND CONTROL

DRUGS USED FOR MIND CONTROL

(From Fritz Springmeier’s book; ‘Total Mind Controlled Slave’)


The CIA/Illuminati programming centers have more than 600-700 different drugs at their disposal. The following is a partial list of the drugs available for their mind-control (aka MK-Ultra Programming). They can make a person feel like he is in heaven, or burning in hell. The drugs are at times used with elaborate light, sound and motion shows that produce whatever effect the programmer wants to produce. They can make a person believe he is shrinking, or that he is double (with mirrors), or that he is dying. Before describing how drugs are used for programming & control, let us list a few which we know have been used. This list comes from CIA documents obtained from the Freedom of Information Act and from what Multiples used as Programmers remember. Many of the new synthetic drugs are known only to the Illuminati/Intelligence community.:

  • 2-GB (aka CBR, this is a strong hallucinogenic which also helps telepathic communication)
  • 2-CT2 (Produces dark, earthy visual patterns)
  • Acetylcholine (for EEOM, EDOM, and for blocking memory)
  • Adrenalin
  • Aktetron
  • Alcohol
  • Ambien
  • Aminazin
  • Amobarbital (Hypnotic sedative)
  • Amobarbital Sodium (hypnotic sedative)
  • Amphetamine (Addictive)
  • Amphetamine Sulphate
  • Analasine
  • Anectine (Succinylcholine, a strong muscle relaxant that makes one feel suffocated and drowning. The person feels terror at thinking he is dying.)
  • Anhalamine
  • Anhalidine
  • Anhaline
  • Anhalonidine
  • Anhalonine
  • Anhalonium
  • Aphrodisiacs (Sexual manipulation by programmers)
  • Aphyllidine
  • Aphyllin
  • Aprobarbital (Hypnotic sedative)
  • Atropine (Speeds heart rate given with l.V.)
  • Atrosine
  • BZ (Designer drug ten times more powerful that LSD, produces amnesia)
  • Bambusa
  • Banisterine
  • Baradanga (Truth serum which makes people willing to follow any command)
  • Barbiturate
  • Belladonna (A traditional drug of witches since the middle ages)
  • Benzidrene (Benzedrene, stimulant used w/ other drugs)
  • Benzocaine
  • Bromoharmine
  • Bulbocapnine (Causes a catatonia and stupors)
  • Butabarbital Sodium (Hypnotic sedative)
  • Butyl-bromallyl-barbituric Acid
  • Caffeine
  • Caffeine Sodium
  • Calcium Chloride
  • Cannabidiol
  • Can nabinol
  • Cannabis (aka Marijuana, a sedative, change in perception, colors and sounds more distinct, time distorted. This drug is not used much in Monarch Programming because it IMPEDES mind control. It has been experimented with in combination with other drugs as an interrogation tool. The CIA listed it as being used in MK-Ultra, but it served as an experimental drug rather for programming.)
  • Cannabol
  • Caramine
  • Carboline
  • Carbrital
  • Caroegine
  • Chloral Hydrate (a hypnotic sedative, the active sedative ingredientis the metabolite trichloroethanol, goes to work in about 30-60minutes, aka Noctec)
  • Cocaine (Addictive, blackmail, the availability of cocaine may pullup certain alters who are addicted to it)
  • Coffee
  • Coramine
  • Curare (To paralyze the body)
  • Delvinyl Sodium
  • Demerol (A hypnotic, also given as a reward for good learning after an induced headache, is used in the Scramble programming where the victim must overcome its effect to concentrate on what is being said)
  • Desoxyn (Used with Sodium Pentothal for hypnotic trance)
  • Dexedrine (Amphetamine)
  • Di benzo Pyran Derivatives
  • Dicain
  • Doral
  • Dramamine (aka dimenhydrinate, stops motion sickness)
  • Drobinal (for quick access)
  • Ecstasy (aka XTC, Adam, MDMA, this is an illegal designer drug, butit’s used by the government & cult programmers. Empathogens, likeEcstasy, enhance trust between the recipient & the programmer. It’s
    effect lasts for several hours.)
  • Ephedrine (Stops hypotension)
  • Ephetamine
  • Epinephrine (Adrenaline)
  • Ergot
  • Ergotamine
  • Ethanol (To inebriate the victim to induce certain behavior)
  • Ethchlorvynol (Hypnotic sedative)
  • Ethyl Harmol
  • Epicane
  • Escrine
  • Estazolam (Hypnotic sedative)
  • Ethclorvynol (Hypnotic sedative, effect begins 30 min. afterdigestion, addictive, aka Placidyl)
  • Ether
  • Ethinamate (Hypnotic sedative, aka Valmid)
  • Eucaine
  • Eucodal
  • Eukotal
  • Eunacron
  • Evipal
  • Evipan
  • Evipan Sodium
  • Flurazepam Hydrochloride (Hypnotic sedative)Genoscopolomine
  • Glutethimide (Hypnotic sedative, has withdrawal symptoms, akaDoriden)
  • Halcyn (Blocks explicit memory by impairing hippocampalprocessing)
  • Haliopareael (Tranquilizer)
  • Harmaline
  • Harmalol
  • Harman
  • Harmine
  • Harmine Methiodide
  • Harmol
  • Heroin
  • Hexacol
  • Histadyl
  • Histamine (Causes changes in the skin)
  • Hydractine (or Hydrastine)
  • Hypoloid Soluble HexabarbitoneIcoral
  • Indole
  • Indole Methyllarmine
  • Insulin (Shock for amnesia)
  • Ipecac (To induce vomiting for eating disorder programming)
  • Largatil (A powerful tranquilizer)
  • Lophop-nine
  • Lorazepam (sleep induction, may destroy memory of previous day)
  • LSD-25 (Used to program alters to cut their veins; they want to endtheir nightmare by cutting what seem like white rivers w/ blackthreads or other scary delusions. Can cause psychosis & other effects.
    It’s used in small amounts for interrogations. Its active ingredient is

    psilocybin which can create anxiety & a fear of death.)

  • Lyscorbic Acid
  • MDA (This is a cross between mescaline and amphetamine speed)
  • MDMA (Also known as Adam, this is Ecstasy, see under Ecstasy formore information)
  • MDE (aka Eve, puts someone into a strictly intellectual head trip)
  • Manganese chloride
  • Mellaril (Mood changer)
  • Methaqualone (hypnotic sedative)
  • Methotrimeprazine Hydrochloride (Hypnotic sedative)
  • Methy-cocaine
  • Methy-prylon (aka Noludar, helpful for hypnosis, side effects are ahangover & skin rashes.)
  • Metra-ol
  • Midazolam hydrochloride (Hypnovel, versed, hypnotic sedativewhich can cause amnesia)
  • Morphine
  • Morphine Hydrochloride
  • Narco-imal
  • Nembutal
  • Niacin (helpful to stop an LSD trip)
  • Nicotine
  • Nicotinic Acid (stops LSD drug effect)
  • Nikthemine
  • Nitrous Oxide
  • Novacaine
  • Nupercaine
  • Pantocaine
  • Pantopone
  • Parahyx
  • Paraldehyde (Hypnotic sedative, produces sleep in 15 mm., has astrong odor & disagreeable taste)
  • Pellotine
  • Pentobarbital (Hypnotic sedative)
  • Pentobarbital Sodium (hHypnotic sedative, if mixed with dextroAmphetamine Sulfate it will half the stage 1 dream time when REMsleep occurs)
  • Pentothal Acid (Helpful for hypnosis)
  • Pentothal Sodium
  • Percaine
  • Pernoston
  • Peyotl (Interrogation, hallucinations)
  • Pheactin
  • Phenamine
  • Phenolic Acid (Injected into expendable children’s hearts to killthem)
  • Pehyl-thio-urethanes
  • Picrate
  • Picrotoxin
  • Procaine
  • Propranolol (calms the mind so it can function better)
  • Pulegone-orcinol
  • Pulegone-olivetol
  • Pyrahexyl
  • Pyramidon
  • Quazepam (Hypnotic sedative)
  • Quinine
  • Reserpine
  • Salsoline
  • Scapalomine S. (good amnesia drug)
  • Scopolomine (Truth serum that makes people willing to dowhatever they are told)
  • Scopolomine Aminoxide Hydrobromide
  • Scopolomine-phetamine-eukotal
  • Secobarbital Sodium (Hypnotic sedative)
  • Sodium Amytal (hypnotic sedative that reduces R E M sleep time)
  • Sodium Barbital
  • Sodium Dielvinal
  • Sodium Evipal
  • Sodium Pentobarbital (Nembutal)
  • Sodium Pentothal (Truth serum for interrogation, can be used withhypnosis, can be used with Desoxyn, given in an IV)
  • Sodium Phenobarbital
  • Sodium Rhodanate
  • Sodium Soneryl
  • Sodium Succinate
  • Sodium Thioethamyl
  • Somnifen
  • Stovaine
  • Strychnine
  • Styphnic Acid
  • Sulfazin
  • Sympatol
  • Synhexyl
  • Telepathine
  • Tetra-hydro-cannabinol acetate
  • Tetra-hydro-harman
  • Tetra-hydro-harmine
  • Tropacocaine
  • Tropenone
  • Temazepam (Hypnotic sedative)
  • Thallium (Confuses thinking)
  • Thorazine (Helps bring one out of an LSD trip)
  • Tranquility (A designer drug for programming that makes the victimcompliant, like Baradanga)
  • Triazolam (Hypnotic sedative, somewhat rapid)
  • Yageine
  • Yohimbine Sulphate
  • Zolpidem Tartrate (Hypnotic sedative)

HERBS

When the victim’s body is saturated with all the drugs they can
assimilate, they will receive herbs, which often have a drug effect.

  • Ayahuasca (a vine of Brazil whose alkaloids such as Telapatin aresaid to produce a telepathic state where the recipient can see throughpeople like glass and read their minds.)
  • Bayberry (hemorrhaging)
  • Calamas (part of a cerebral tonic)
  • Cayenne Pepper (stimulant)
  • Charcoal (absorbent cleanser)
  • Caladium sequinum (injected into body parts to cause excruciatingpain)
  • Clove Oil (placed in nose for relief from the pain of dental tortures)
  • Hemlock (a poison, used more to kill than for programming)
  • Hops (sleep aid aka Beerflower)
  • Lady’s Slipper (relaxant)
  • Kava Kava (sedative)
  • Mistletoe (for dizziness, and lower blood pressure)
  • Narcissus (anaphrodisiac for males)
  • Opium (enchanting trip)
  • Potions (made from roots, powders, dried blood and animal partsare given.)
  • Rosemary (mild heart tonic)
  • Saffron (sedative)
  • Sage (part of a cerebral tonic)
  • Sandlewood & henbane (when burned the fumes cause convulsions& temporary insanity)
  • Skullcap (relaxant)
  • Sunflower Seed Oil (this may be used to help with brain stemscarring)
  • Valarium Root (works just like Valarium, also helps cramps)
  • Witch Hazel (hemorrhaging)
  • Yerba Mate (part of a cerebral tonic)

A BRIEF HISTORY OF THE USE

Religious groups, shamans, medicine men, witches and cults have been using mind altering drugs throughout history. The medieval witches used potions of hemlock and aconite for their flying ointments. These are herbs (natural drugs) which will create delirium. Contemporary witnesses reported that covens during the medieval ages would apply the potion of hemlock and aconite to cause their new witch to go delirious, and then would transport the person to the Sabbat, where they would be told they flew there. The Haitian satanic Vodoun cult, which has been manipulated by the CIA/Illuminati, has sorcerers called bokors. The Vodoun cult in Haiti is being used for trauma-based mind control. One of the items of the cult is to take the plant Datura stramonium and add this plant with other things. The plant is the active ingredient of a potent psychoactive drug, the “zombi cucumber” which produces amnesia and a pseudo-death of the victim. The brain doesn’t die, but the mind is shut off. The victim is brought back to life as a zombie – a slave of the bokor. The powder to create a zombi is called zombificant in French – creole. The ceremonies to kill and resurrect the zombie are full of magic and demonology also. Magic, drugs and demonology have always gone hand in hand. Drugs remove the part of the will that prevents demonic possession. Drugs are considered powerful demonizing substances by the those skilled in Demonology. If demonic possession is seen as part of mind-control, then cocaine, hashish, crack, and some of the other drugs are part of the effort to enslave people. (The power of magic to kill, just as the power of faith can heal, will be discussed in chapter 10.) In Basutoland in Drakersbergs, the Zulu witch-doctors use drugs and trauma to create tokoloshes (mind-controlled zombie slaves). It is said that in recent years, they are using less children and more baboons and monkeys to get tokoloshes. The point is that drugs have been and continue to be used by the occult world for controlling people.

The intelligence agencies working through the U.S. government financed drug research. An example is that Dr. Beecher of Harvard University was given via the U.S. Army Surgeon General’s Office $150,000 to investigate “the development and application of drugs which will aid in the establishment of psychological control”. Research into drugs for mind-control began in 1947 at Bethesada Naval Hospital in Maryland. A CIA report described this research as to “isolate and synthesize pure drugs for use in effecting psychological entry and control of the individual”. At the California Medical Facility at Vacaville, Dr. Arthur Nugent, conducted research into drugs for mind control under the auspices of the CIA. The Bureau of Narcotics worked with the CIA to establish “safe houses” where drugs which were seized were given to victims. Some other hospitals which began working with the intelligence agencies with dispensing drugs for mind control include Mount Sinai Hospital, Boston Psychopathic Hospital, University of Illinois, University of Michigan, University of Minnesota, Valley Forge General Hospital, Detroit Psychopathic Clinic, Mayo Clinic, the National Institute of Health, and Letterman Hospital in the Presideo, CA.

The military did drug research/programming at the Army Chemical School in Ft. McClellan, AL and at the Edgewood Chemical Center. In 1958, Dr. Louis Gottschalk, working for the CIA suggested that addictive drugs be used to control people. Some GIs who became addicted to pain killing drugs were subsequently blackmailed by withholding the painkillers until they complied with the demands asked of them. Cocaine has been frequently given to Monarch slaves to get them addicted and give their handlers more control over them. There is spray cocaine, and powdered cocaine, etc. Because the Monarch slaves are used to haul drugs and to launder the drug money, they are right in the middle of large supplies of drugs. If you hear the expression “The snow is falling” it is the Network’s lingo for cocaine. Cocaine is reported to give people a feeling of power and to act as an aphrodisiac.

APPLICATIONS FOR DRUGS IN PROGRAMMING

Drugs are used during programming. Although drugs used to assist programming mean nothing to the common person, they each have a specific purpose within a certain type of programming.

SOME SPECIFIC
USES FOR DRUGS DURING PROGRAMMING INCLUDE:

a. PUTTING PEOPLE INTO TRANCE

b. TEACHING ALTERS TO GO DEEPER INTO TRANCE TO ESCAPE DRUG EFFECTS

c. ENHANCING THE TRAUMA

d. PRODUCING OUT OF BODY EXPERIENCES

e. CREATING PAIN

f. CREATING BLOOD VESSELS THAT HURT, a pulsating pain, that runs through the
body

g. CONTROLLING HISTAMINE PRODUCTION

h. HELPING CREATE ILLUSIONS SUCH AS NO HANDS, NO FEET, NO FACE, NO HEAD
etc.

i. TEACHING ALTERS TO STAY IN POSITION

j. TO ASSIST OTHER PROGRAMMING MODALITIES, such as high tech harmonic machines, which implant thoughts. (The machines are used in conjunction with designer drugs.)

k. HORMONES, FOR INSTANCE GnRH, WHICH REGULATES THE PHYSIOLOGY OF THE SEXUAL GROWTH. Is given to speed up sexual growth. Other body developments may also be manipulated.

l. TO ENHANCE OR REDUCE MEMORY

m. TO BUILD THE IMAGE OF THE PROGRAMMERS POWER.

At this point, it is appropriate to point out that the personalities of a multiple do not respond uniformly to the same dose of the same drug. Understanding how a drug will effect particular alters is a science in itself. If an alter is holding the body, it will receive more of the effect of a drug. Let’s say Paraldehyde is given to a multiple. A possible reaction would be that some alters will feel no effect, some will be sedated to a drunken stupor, and child alters may be unconscious or hyperactive. Chloral hydrate might put some alters to sleep while others remain wide awake. Sometimes the personality holding the body may fight the influence of a drug to keep the body. Prochlorperazine is sometimes given by therapists to help alters cope with nausea and vomiting. Most alters will be programmed not to accept drugs except from their master. Lithium suppresses alter switching in some systems. An alter to “protect” the system from the therapist’s helpful medications may develop “allergic” responses. Alcohol is a drug. The reaction of an alter System to it will again be varied. Child alters may become unconscious, while the adult alters don’t even become inebriated by large quantities of hard liquor. Within males, dangerous violent personalities may take the body. Within the medical world, often an approximate correct dosage will work. However, with the programming the doses must be extremely fine tuned. Some of the best skilled medical doctors and assistants help with the programming. The Illuminati will initially give the small child a small dose of a drug. They will chart its effect, give it a urinalysis to see how long it stays in the body etc. This is just the testing stage, they are not doing any programming. A number of drugs will be tested, but only one at a time. They clear a child’s body of a drug before they give it another one. They prefer not to mix meds. They will start small to insure they don’t overdose and then increase the dosage until they notice the correct behavior pattern. This will be charted in detail on the slave’s chart. Each child’s body chemistry is different, so the suggested dosages are only ball park figures which are not precise enough. If too much of a drug is given, the programmers can easily turn a child into a psychotic basket case. One of the secrets of the Illuminati/Intelligence agencies is that they have secret antidotes for most medications, which, if they have to give them to a child, then they will. They will use an antidote, for instance, to keep a child from going into heart failure. The Programmers will have some helpful drugs and herbs on stock too. It is reported that Glutamic Acid (1000 mg. 3 times/day) will take care of the intense headaches that alters get from lots of switching. Witch hazel leaves and comfrey root will help internal bleeding.

a. PUTTING PEOPLE INTO TRANCE

About 90% of the population can be placed into the somnambulistic (the deepest) hypnotic trance possible simply by giving them hypnotic drugs. The prior list on pages 47-50 gives over 2 dozen drugs that can be used to assist taking someone in hypnotic trance. Special drugs have been designed which will place someone into a deep trance very quickly. If an alter is not being cooperative when they are accessed, they can be locked in place mentally and given a quick shot of a fast-acting hypnotic-inducing drug. One drug which was popular for programming was demerol, which would be administered intravenously (an IV). It takes about 5-7 minutes to take full effect after administration via an I.V. The dosage can be administered so that the effect remains until the programming session is over. It may be administered about every half hour if appropriate. Children will receive 1 to 2.2 mg/kg dose. Another drug, a truth serum, also consistently works on people making them totally compliant to any directive. Under Baradanga people will give their bank account numbers and anything else a person might want. These type of drugs are almost sufficient in themselves to get compliance out of a person. If one realizes that these drugs are used in conjunction to torture, elaborate systems of lies and deception, trauma-bonds, and all the rest of the sciences of mind-control used in the programming, it is easy to see how they are producing totally compliant human robots.

b. TEACHING ALTERS TO GO DEEPER INTO TRANCE TO ESCAPE DRUG EFFECTS AND
PAIN.

Much of the training in this area is based upon the child’s horror and fear toward the all powerful master programmer. When the programmer wants the child’s alters to learn to trance deeper, he will give a drug that the alter doesn’t like. The child’s alter will then be told to go deeper into the mind if they want to escape the effect of the drug. This enforces the dissociative state being trained for the alter. The suggestion or story line that is given to the alter is frequently the picture of a train. The child is told that the conductor is at the front of the train, but he must move to the back of the train through the train cars. The child is taught to count cars when they go by as if they were steps in the mind. This is training the child to descend into deeper levels of the subconscious. The train illustration has been used by programmers when they want the child to remember the drug experience. The programmer wants this experience remembered – at least for a while because it helps increase the child’s fear. If the programmer wants the child to forget the drug experience while learning trance depths, then the imagery of a plane taking off and disappearing in the clouds works.

c. ENHANCING THE TRAUMA

Drugs will be used to enhance the spinning effect when the mind is being programmed to have vortexes and to set up traps within the slave’s mind. One particular drug enhances the trauma by 100 times. Drugs can be useful for instance, to enhance a child’s terror of the experience of this child being placed in a small box in the fetal position for 24 hours. This helps shorten the programming time, and it also make the programming more intense. The programmers know what antidotes to give to pull the child out of the enhancement. Marijuana enhances perception of color and noise, but it is not used to enhance trauma. The mind does not program well under marijuana. That is why there has been such a big campaign to keep it illegal, even though many studies show it to be safer than alcohol.

d. PRODUCING OUT OF BODY EXPERIENCES

Various hallucinogenic drugs, LSD included, will produce an out of body experience for the victim, if the drugs are administered correctly. The Programmer will prepare the victim with various information and story lines during the administration of the drug. Monarch slaves who are being deprogrammed, may have a memory where their skin feels inflamed and itchy, like a bad mosquito bite. The experience may also have the sensation of floating in an unreal world. This may well be an LSD trip given the slave during experimentation and programming. The CIA was using LSD beginning in the very early part of the 1950s. Several victims report that some type of potion causes a person to dream while they are awake. PCP which is “angel dust” is one way to disconnect the cortex from the limbic system and go into an altered state.

e. CREATING PAIN

This is done with a long list of drugs. Drops of salt water and pepper water are applied to the eyes of victims to make their eyes sting. Another pain in the eye takes place when lights are flashed signalling, “I love you, I love you not”. The child is pulled two ways by this message. Dr. Green Mengele) enjoyed pulling daisy petals while saying these words. If the last petal was “I love you not”. the child would be put to death. Surviving children were left traumatized.

f. CREATING BLOOD VESSELS THAT HURT

Blood pressure is raised by drugs and then certain drugs are added which make the veins burn. The alter is taught to cut the burning veins. This is programming which is laid in to control the slave from straying from the script he or she is given. If they stray, then a cutting program is activated which was laid in via a combination of drugs in the method just stated.

g. CONTROLLING HISTAMINE PRODUCTION

The control of histamine production is an important secret ingredient to the Monarch Mind Control. The breast implants placed into women help stimulate histamine production, which is used in conjunction with drug-
assisted programming (See Chapter 8.)

h. HELPING CREATE ILLUSIONS SUCH AS; NO HANDS, NO FEET, NO FACE, NO HEAD..
etc.

A programmer working with a hallucinogenic drug can make an alter believe that it has lost a particular body part. Because most of these
alters have little memory or no memory and little frame of reference, what they are told while under the influence of drugs seems very real to them.

i. TEACHING ALTERS TO STAY IN POSITION

Some alters don’t like to stay in position. But through the use of drugs, and the side effect of drugs, they soon learn the importance of staying in position. If they are disobedient, the memory of the bad side effects from not staying in position in the mind can be pulled up by a code and the alter can relive the pain from having disobediently moved from position. This is very effective in teaching alters to stay in their little position that is assigned them in the mind.

j. TO ASSIST OTHER PROGRAMMING MODALITIES, such as high tech harmonic machines, which implant thoughts. (The machines are used in
conjunction with designer drugs.)

An example of how drugs can be important is as follows. The neurons in the hippocampus which is part of the memory process use acetylcholine. Drugs that block acetylcholine interfere with memory. The neurons and the chemical neural transmitters are understood much better today. Where and how a thought is created in the brain is understood by the programmers in detail. No one is in a position to physically prevent the Illuminati and others from taking their children and others to labs where chemicals and harmonics can be used in sophisticated computer guided ways to implant thoughts into the children’s minds. As the child’s brain is shaped according to its environment, the level of everyday brain chemicals and the shape of the various areas of the brain can be determined by the programmers. This is why a recent article on Prozac (Newsweek, Feb. 7, 1994) uses a quote from Alice In Wonderland for its title, “One pill makes you larger, and one pill makes you small”. This article (on page 38) quotes brain researcher Restak, “For the first time, we will be in a position to design our own brain.” On the previous page in big letters it reads, “Scientific insights into the brain are raising the prospect of made-to-order, off-the-shelf personalities”.

Another programming modality assisted by drugs is behavior modification. Aversion therapy using a vomit-inducing drug is used on children. Another example of drugs helping assist programming is to give someone LSD and then interview the child while it is hallucinating. The hallucinations are then used as programming building blocks by using hypnotic techniques.

One way to build on an LSD trip is to tell the child if they ever do a particular thing (such as touch programming, remember programming, and integrate parts, etc.) the victim is to go crazy and hallucinate like they are presently doing. This means that they will be locked up in a crazy house for the rest of their life. Rather than be put in straight-jackets with other crazy people it would be better for the person to commit suicide. By constantly reinforcing this message, some alters will adopt the script “that they are doing the body good to kill it if any alter personality touches the programming”, because otherwise the body will
be locked up in a crazy house.

Drugs are used in programming to establish a pattern or a script. There must be a pattern of dissociation. Parts can’t just dissociate into nothing, otherwise there would be nothing to build on. Drugs will play a major role in the structuring of the alter system, which is covered in chapter 7.

The child doesn’t know where the effect of the drug is coming from. The programmer will take credit for the power of the drug. Whoever administers the drug has power in the child’s mind. The mind wants to be
safe.

I am familiar with a recent example here in Oregon of someone who escaped from being sacrificed at a Satanic Ritual. The legal system told the woman she was crazy when she reported to the police that she had escaped from a Satanic Ritual where they were going to sacrifice her. To control her, the judge ordered 3 types of antipsychotics, twice the normal dose of two kinds of lithium carbonate to put her into a lethargic stupor, Paxil as an antidepressant, and Benztropine mesylate as an anti-parkinsonian agent. The antipsychotics were Thiothixene, Thioridazine hydrochloride, and Perphenazine which are all addictive. This woman may or may not be a multiple. But this clearly shows the type of mental control via drugs that could be slapped onto someone who dares report Satanic activity to an establishment which has been sadly corrupted from top to bottom.

One victim of government mind control tried to get free. The first psychiatrist the person tried to go to was cooperating with U.S. Intelligence and gave her Stelazine, which aggravated the victim’s situation. When the victim spied a general’s uniform in the closet of this psychiatrist, she got another psychiatrist, who unfortunately turned out to be an ex-DoD employee. He placed her on Haldol Decanoate, Klonopin, and Benzatropine. The combined effect of these drugs is to erase memory, and create a dissociative disorder. All of the drugs were highly addicted. Another fleeing victim was given Trazodone by a physician who was cooperating with the Intelligence agencies. This almost gave the victim a heart attack because it aggravated her heart condition. And yet another escaping victim apparently also fell prey to dirty CIA doctors who were practicing in public without warning people of their intelligence connections. This victim was given a combination of Compazine and Xanax, in dosages that the Physicians Desk Reference warns against. The doctor, who prescribed this, worked out of an office named after an MK Ultra programmer. There are other important things to mention about when drugs are used in Monarch programming.

SOME OF THE CAUTIONS THAT
THE PROGRAMMERS ARE ALERT TO INCLUDE:

a. WATCHING THE HEART SO THAT IT DOESN’T STOP.

Many of the children who have been programmed have died from heart failure. The programmers are very careful to have heart monitors on the victim, and to have paddles ready to revive the body. Because so much of their drugging affects the heart, they accept that they will lose a few to heart failure.

b. MAKING SURE THAT DRUGS AREN’T GIVEN TO CHILDREN WHO ARE ALLERGIC TO
THEM.

The programmers take the time to insure that they have the family histories of allergies to drugs, and they will test the children too, before proceeding with drugs. They not oniy learn the family & individual responses to drugs, but they can test during programming to determine a drug’s blood level in a child. For instance, pentobarbital at a blood level of 5 mcg/ml aids hypnosis, at 15 makes the victim comatose with reflexes, and at 30 makes the person comatose w/ extreme difficulty in breathing. In everyday life, 30 mcg/ml would kill the child.

Pentobarbital blood levels can be tested by an enzyme multiplied immunoassay technique. For longer-acting Phenobarbital gas chromatography is used. TCA’s are tested by radioimmunoassay, high-perf. liquid chromatography and thin layer chromatography. Some hypnotics are tested by colorimetry, photometry and spectrophotometry.

c. SWITCHING TO HERBS WHEN THE BODY IS SATURATED WITH DRUGS.

When the child’s body has had all the manufactured drugs it can absorb, the programmers switch to a vast collection of natural herbs.

d. PROVIDING THE ANTIDOTE FOR AIDS. Monarch Slaves are routinely given the antidote for AIDS and have been since the 1960s-1970s.

e. KNOWING HOW MUCH OF A DRUG EACH PART CAN TAKE, SMALL YOUNG ALTER CAN’T TAKE AS MUCH.

Multiples within a single system have varying levels of tolerance toward drugs. A small child alter may be killed by an adult dosage, even though the age of the body is that of an adult. The programmers are acutely aware of how to deal with multiple personalities.

f. PROVIDING SALT TO BALANCE THE ELECTROLYTES IN THE MIND OF A PROGRAMMED MULTIPLE PERSONALITY.

An electrolyte imbalance can cause a multiple personality’s mind to go wacky and start spinning. The Multiple could possibly go into shock and die. The programmers are very experienced in understanding the unique requirements of a multiple personality.

g. AN IMPORTANT PLANT EXTRACT FOR WATCHING BRAIN WAVE ACTIVITY IS THE
LARGE PLANT ENZYME HORSERADISH PEROXIDASE (HRP).

Perhaps it would be worthwhile to briefly mention that all the major chemical and drug companies are run by the Illuminati. It would take a book to explain who controls what and how they connect in, and this author could write it. Instead, we will try to give a quick over view. Rather than cover 2 dozen large drug companies, three major drug companies have been randomly selected to show a quick view of how all the drug companies are deeply involved with Monarch mind-control programming. Since the purpose of this book is to show how the mind control is done–this sample of names is given only to convey to the reader that the drugs that the Illuminati/Intelligence agencies need are never in short supply. And the labs to develop designer drugs for mind-control are not in short supply either.

ELI LILLY CO.- Trustee of Eli Lilly Endowment Walter William Wilson – Illuminati, married to Helen Scudder (of the wealthy powerful Scudder family), prominent partner of Morgan, Stanley & Co. controlled by Henry Morgan also a member of the Illuminati. Executive Vice-pres. of Eli Lilly Landrum Bolling, represented Eli Lilly at the secret annual Dartmouth conferences, overseen by the Illuminati. Chairman of Eli Lilly Richard D. Wood, dir, of the Rockefeller’s Standard Oil, Chemical Bank of NY, and the Amer. Enterprise Inst. for Public Policy Research. Dir. Eli Lilly C. William Verity, Jr., dir. Chase Manhattan Bank and assoc. with U.S. intelligence, and works with Mrs. Rockefeller as a member of USTEC. Dan Quayle and George Bush (CIA director and Monarch handler) have been part of Eli Lilly management too.

MANSANTO CHEMICAL COMPANY – President Earle H. Harbison, Jr.-CIA. and director of Bethesada General Hospital where they program Monarch slaves. He is also the president of the Mental Health Association.

STERLING DRUG CO. (an I.G. Farben spinoff) -connected to the Krupp Illuminati family. Chairman W. Clark Wescoe, dir of the super secret Tinker Foundation which is a CIA foundation. Dir. Gordon T. Wallis, Illuminati, dir, of the Fed. Reserve Bank of NY, CFR, Director Martha T. Muse, CIA, pres. of the Tinker Foundation, dir. of the Order of St. John of Jerusalem (Knights of Malta), and dir. of Georgetown Center for Strategic Studies


SUMMARY

As the reader can see, the use of drugs in the Monarch Trauma-based Mind Control is extensive and requires skilled technicians, nurses, and doctors. Because of the long-held control by the Illuminati families over narcotics and drug manufacture/sales, there is no difficulty for the programmers to get large quantities of secret designer drugs. The minor occult cults have to get by with a more limited supply of mind altering drugs, unless they directly connect in with the bigger picture. The power of drugs to control a person’s life is not absolute -although someone who lives with a cocaine addict or alcoholic might disagree – but when coupled with all the other methods in a sophisticated system of mind-control, drugs just further reinforce the absolute power of the Illuminati over an individual.

THE HISTORY OF THE N.W.O & U.N

Thus, the hold communists had over Eastern Europe (the Iron Curtain), becomes very weak. Communism collapses, not only in the Soviet Union but also in Europe.

In Russia, Boris Yeltsin (whose wife is the daughter of Joseph Stalin and Rosa Kaganovich) and the Republican government takes steps to end the power of the Communist party by suspending and banning the party and seizing all their property.

This symbolised the fall of the Communism in Russia, and resulted in the start of a mass exodus of 700,000 Jews from the former Soviet Union to Israel.

In the Israeli Journal, Hotam (24 November 1989), there is a report of a speech that then Israeli Deputy Foreign Minister, Ashkenazi Jewish, Binyamin Netanyahu, gave to students at Bar Ilan University in which he states;

“Israel should have exploited the repression of the demonstrations in China, when world attention focused on that country, to carry out mass expulsions among the Arabs of the territories”.
The London and Paris Rothschilds announce the launch of a new subsidiary, Rothchild GmbH, in “Frankfurt, Germany.

1991: Following the Iraqi invasion of Kuwait on August 2, 1990, on January 16 of this year, the United States and Britain began Aerial bombing campaign of targets within Iraq. On 24 February the ground campaign commenced which was to last 100 hours until on February 28 when a horrendous war crimes occurred.

The crime was the slaughter of 150,000 Iraqi troops with fuel air bombs. These Iraqis were fleeing on a crowded highway from Kuwait to Basra. President George Herbert Walker Bush ordered United States militarily aircraft and ground units to kill these surrendering troops, they were then bulldozed into mass unmarked graves in the desert, some still alive.

INVESTIGATORS EXPOSING THE HOLLYWOOD PEDOPHILE RINGS…

INVESTIGATORS EXPOSING THE HOLLYWOOD PEDOPHILE RINGS…
Investigating Journalist; John Connolly (contributor Vanity Fair, The Daily Beast

Child talent manager; Michael Harrah

Former Los Angeles Times reporter; Dawn Chmielewski

Co-Founder of BizParentz; Anne Henry

______________________________

EXPOSING PEDOPHILE NETWORKS:

TEENSTARS.BIZ.

TEENACTORS.COM

KIDSTARZ.

TVTEENS.NET.

>en

ROYAL STANDARD
_____________________________

PEDOPHILE – MARTY

PEDOPHILE – MARC COLLINS-RECTOR (Co-Founder of Digital Entertainment Network)

PEDOPHILE – CHAD

PEDOPHILE – BROCK PIERCE

PEDOPHILE – BOB JAMIESON (Photographer)

PEDOPHILE – BOB VILLARD (Photographer)

PEDOPHILE – BRYAN RYAN PECK (NICKELODEON)

PEDOPHILE – BRYAN SINGER

PEDOPHILE – STEPHEN SPIELBERG

PEDOPHILE –

THE FREE MASONRY & THE PINEAL GLAND

THE FREE MASONRY & THE PINEAL GLAND
___________________________

Why are there 33 levels of Free Masonic degrees, in the religion and knowledge of Free Masonry?
___________________________

The 33 degrees represents the anatomical structure in the human spine, from bottom rising up towards the top.. (root chakra, Kundalini spirit, rises in through the root chakra (the sacum) first when a member of Free Masonry will learn the final and essential secret of the secret society and it’s true religion, philosophy and magic knowledge. The final secrets of the Masonic beliefs and rules he will discover that the final test will be a physical practice of being sodomized and sodomize himself.
This is one of the darker secret occult knowledges because it contains raping innocent children and collect the body fluids from perpetrator and victim on a hankerchief, traumatising the victim with violent rape is a cold blooded technique, used by the satanic elite bloodline families to create a dissociation of the minds of their children. The same sinister technique is also used by handlers in Monarch Programming (trauma based mind control) among with others torture techniques, psychoactive drugs, sleep deprivation, sense-deprivation and hypnosis. These techniques is based on descriptions originated in the Egyptian book of the dead. The luciferians participates in pedophilia (satanic ritual abuse) ritualistic cannibalism, blood drinking (Adrenochrome harvesting = spirit cooking), rape, torture and murder (ritual sacrifice) of children. It is based on Aleister Crowley’s published writings of sex magick and Thelma the great work. Aleister Crowley studied this on his honeymoon in Egypt in 1921. These occult rituals is traced back through history to the ancient Egypt). Ritualistic murder of children was also practiced by the phoenicians.

The satanic luciferian elite bloodlines are convinced that the programming of a human being is a must, to enter the hidden plain of knowledge. To become enlighted and to become a part of the Illuminati elites secret society clan. They belives that this will seal a spiritual contract of loyalty towards the clan, and discresion about the huge secret of what the secret really is..
They relate the sexual abuse to being reborn, to Lucifer instead of Jesus Christ and God.

DISSOCIATION OF THE VICTIMS MIND..

Dissociation of the mind of the victim, a young child is being activated by the pain that the child experience, this is also referred to as the “white light” or the illumination of the child.

Because when the child is raped by sodomy, he/her will see a white light, when a nerve in the lower region of the spine is traumatized.

The satanic luciferian elite bloodlines are convinced that the programming of a human being is a must, to enter the hidden plain of knowledge. To become enlighted and to become a part of the illuminati elites secret society clan. They belives that this will seal a spiritual contract of loyalty towards the clan, and discresion about the huge secret of what the secret really is..

They relate the sexual abuse to being reborn, to Lucifer instead of Jesus Christ and God.

Quote:

“SEX & THE SECRET NERVE”

There’s a hermetic principle that states, “As above so below”. So if there’s a zodiac above with twelve constellations, there’s likewise there must be a human Zodiac below, and there is, our twelve pairs of craniel nerves. However there’s another nerve called the Zero Nerve or Nervous Terminalis. Although less talked about, it could hold the key to discovering our divinity. This Zero Nerve is responsible for smell and pheromones, it’s been dubbed “Sex and the Secret Nerve”. Now if we compare this nerve to the thirteen sign, ‘Serpentarius’ (Ophichus);
Serpent bearer.. The serpent slayer takes on a whole new meaning. Through this nerve, Ophichus is the light bearer! The Hebrew word for serpent is nachash, as an adjective it translates to “shining one” (The illuminated).


MEANING OF THE WORD; ILLUMINATED/ILLUMINATION:

(Illuminati) >> Illuminated >> illuminate /ɪˈl(j)uːmɪneɪt/

verb

past tense: Illuminated; past participle: Illuminated

1.
light up.

example with the word; Illuminated in a sentence:

“A flash of lightning illuminated the house”.

SYNONYMS: light, light up, throw light on, cast light upon, brighten, make brighter, shine on, flood with light, floodlight, irradiate;

literary: Illumine

example with the word; Illuminated in a sentence:

“The bundle of clothes was illuminated by the officer’s torch”.

ANTONYMS: darken

example with the word; Illuminated in a sentence:

“Decorate (a building or structure) with lights for a special occasion”.

2.
(To) decorate (a page or initial letter in a manuscript) with for example gold, silver, or coloured designs.

SYNONYMS: decorate, illustrate, embellish, adorn, ornament, enhance, emblazon, highlight

example with the word; Illuminated in a sentence:

“The manuscripts are illuminated in brilliant inks”.

3.
help to clarify or explain.

“A most illuminating discussion”.

SYNONYMS: clarify, elucidate, explain, reveal, make clear, shed light on, cast light on, give insight into, clear up;

MORE DEFINITIONS:

make explicit, spell out,
explicate, expound, rationalize

example with the word; Illuminated in a sentence:

“Documents often illuminate people’s thought processes”.

DEFINITION/MEANING:

informative, enlightening, revealing, explanatory, instructive, instructional, helpful, educational, educative, edifying, rewarding, enriching…

example with the word; Illuminated in a sentence:

“An illuminating account of the writer’s style”.

ANTONYMS: conceal,
confuse

ORIGIN:

Late Middle English: Added to the english language from the Latin adjective; illuminat-‘illuminated’, it originates from the verb illuminare, from in- ‘upon’ + lumen, lumin- ‘light’
___________________________

Tags:
#ADRENOCHROME #BAAL #LuciferianPedophiles #OrganizedPedophilia #HumanSacrifice #BloodSacrifice #ChildAbuse #OrganHarvesting #SatanicRitualAbuse #SatanicSacrifice #SatanicCannibals #cannibalism #KundaliniSpirit #KundaliniCoil #SerpentSpirit #ThirdEye #SeatOfTheSoul #PinealGland #Illumination #Illuminated #illumination #Stargate #RA

.

THE FREE MASONRY & THE PINEAL GLAND

_________________________________

Why are there 33 levels of Free Masonic degrees, in the religion and knowledge of Free Masonry?

_________________________________

The 33 degrees represents the anatomical structure in the human spine, from bottom rising up towards the top.. (root chakra, Kundalini spirit, rises in through the root chakra (the sacum) first when a member of Free Masonry will learn the final and essential secret of the secret society and it’s true religion , philosophy and magic knowledge. The final secrets of the Masonic beliefs and rules he will discover that the final test will be a physical practice of being sodomized and sodomize himself.

This is one of the darker secret occult knowledges because it contains raping innocent children and collect the body fluids from perpetrator and victim on a hankerchief, traumatising the victim with violent rape is a cold blooded technique, used by the satanic elite bloodline families to create dissociation with the minds of their children. The same sinister technique is also used by handlers in Monarch Programming (trauma based mind control) among with others torture techniques, psychoactive drugs, sleep deprivation, sense-deprivation and hypnosis, this techniques is based on descriptions originated in the Egyptian book of the dead. The luciferians participates in pedophilia (satanic ritual abuse) ritualistic cannibalism, blood drinking (spirit cooking) and murder (sacrifice) of children. And it is based on Aleister Crowley’s published writings of sex magick and Thelma the great work. Aleister Crowley studied this on his honeymoon in Egypt in 1921. These occult rituals is traced back through history to the ancient Egypt). Ritualistic murder of children was also practiced by the phoenicians.

According to researcher and professor Piero Bartoloni by the Cultural of Phoenician and Punic Studies, Rome, these sacrifices of children never took place and he claims that phoenician sacrifices of their children is a myth which is fictive stories.

We know that this is a false statement if it’s based on unprofessional ignorance through a arrogant, rigid perspective

and personal opinion or if it’s a lie,

fabricated to protect the elite bloodline families secret criminal occult activities. If this is the case, he is supporting the cover-up of the the Black Nobility.

The satanic luciferian elite bloodlines are convinced that the programming of a human being is a must, to enter the hidden plain of knowledge. To become enlighted and to become a part of the Illuminati elites secret society clan. They belives that this will seal a spiritual contract of loyalty towards the clan, and discresion about the huge secret of what the secret really is.. The sexual abuse

sodomy and dissociation experience within the victim, represents being reborn, to Lucifer instead of Jesus Christ and God. according to the luciferians. They sell the soul of their children to Satan with this occult procedure.

DISSOCIATION OF THE VICTIMS MIND..

Dissociation of the mind of the victim, a young child is being activated by the pain that the child experience, this is also referred to as the “white light” or the illumination of the child.

Because when the child is raped by sodomy, he/her will see a white light, when a nerve in the lower region of the spine is traumatized.

The satanic luciferian elite bloodlines are convinced that the programming of a human being is a must, to enter the hidden plain of knowledge. To become enlighted and to become a part of the illuminati elites secret society clan. They belives that this will seal a spiritual contract of loyalty towards the clan, and discresion about the huge secret of what the secret really is..

They relate the sexual abuse to being reborn, to Lucifer instead of Jesus Christ and God.

Quote:

“SEX & THE SECRET NERVE”

There’s a hermetic principle that states, “As above so below”. So if there’s a zodiac above with twelve constellations, there’s likewise there must be a human Zodiac below, and there is, our twelve pairs of craniel nerves. However there’s another nerve called the Zero Nerve or Nervous Terminalis. Although less talked about, it could hold the key to discovering our divinity. This Zero Nerve is responsible for smell and pheromones, it’s been dubbed “Sex and the Secret Nerve”. Now if we compare this nerve to the thirteen sign, ‘Serpentarius’ (Ophichus);

Serpent bearer… The serpent slayer takes on a whole new meaning. Through this nerve, Ophichus is the light bearer! The Hebrew word for serpent is nachash, as an adjective it translates to “shining one”.

__________________________

__________________________

SOCIALISM MEANING

SOCIALISM MEANING

noun

so·cial·ism | sō-shə-ˌli-zəm\

DEFINITION OF SOCIALISM =

1: any of various economic and political theories advocating collective or governmental ownership and administration of the means of production and distribution of goods

2: a system of society or group living in which there is no private property

b: a system or condition of society in which the means of production are owned and controlled by the state

3: a stage of society in Marxist theory transitional between capitalism and communism and distinguished by unequal distribution of goods and pay according to work done

Socialism vs. Social Democracy: Usage GuideCommunism, Socialism, Capitalism and Democracy Example Sentences Learn More about socialism

Socialism vs. Social Democracy: Usage Guide

In the many years since socialism entered English around 1830, it has acquired several different meanings. It refers to a system of social organization in which private property and the distribution of income are subject to social control, but the conception of that control has varied, and the term has been interpreted in widely diverging ways, ranging from statist to libertarian, from Marxist to liberal. In the modern era, “pure” socialism has been seen only rarely and usually briefly in a few Communist regimes. Far more common are systems of social democracy, now often referred to as democratic socialism, in which extensive state regulation, with limited state ownership, has been employed by democratically elected governments (as in Sweden and Denmark) in the belief that it produces a fair distribution of income without impairing economic growth.

 

Communism, Socialism, Capitalism and Democracy

Communism is one of our top all-time lookups, and user comments suggest that’s because it is often used in opaque ways. In some sources, communism is equated with socialism; in others, it is contrasted with democracy and capitalism. Part of this confusion stems from the fact that the word communism has been applied to varying political systems over time. When it was first used in English prose, communismreferred to an economic and political theory that advocated the abolition of private property and the common sharing of all resources among a group of people, and it was often used interchangeably with the word socialism by 19th-century writers. The differences between communism and socialism are still debated, but generally English speakers used communism to refer to the political and economic ideologies that find their origin in Karl Marx’s theory of revolutionary socialism, which advocates a proletariat overthrow of capitalist structures within a society, societal and communal ownership and governance of the means of production, and the eventual establishment of a classless society. The most well-known expression of Marx’s theories is the 20th-century Bolshevism of the U.S.S.R., in which the state, through a single authoritarian party, controls a society’s economy and social activities with the goal of realizing Marx’s theories.

Communism is often contrasted with capitalism and democracy, though these can be false equivalencies depending on the usage. Capitalism refers to an economic theory in which a society’s means of production are held by private individuals or organizations, not the government, and where prices, distribution of goods, and products are determined by a free market. It can be contrasted with the economic theories of communism, though the word communism is used of both political and economic theories. Democracyrefers to a system of government in which supreme power is vested in the people and exercised through a system of direct or indirect representation which is decided through periodic free elections. Democracy is contrasted with communism primarily because the 20th-century communism of the U.S.S.R. was characterized by an authoritarian government, whereas the democracy of the 20th-century U.S. was characterized by a representative government.

 

EXAMPLES OF SOCIALISM IN A SENTENCE

She is quite right, for example, to stress that Thatcher’s crusade against socialism was not merely about economic efficiency and prosperity but that above all, “it was that socialism itself—in all its incarnations, wherever and however it was applied—was morally corrupting”.— Stephen Pollard, New York Times Book Review, 18 Jan. 2009Lenin’s great genius, of course, was for ideology, which was redefined all too often to support the tactical requirements of the moment. But owing to his fanatical conviction of his own righteousness, especially where socialism was concerned, and also to the Promethean force of his will, his pronouncements were enshrined by his followers as universal truths.— Michael Scammell, New Republic, 20 Dec. 1999

 

Recent Examples on the Web

Today, when higher education tends to be far more inclusive of different populations, college strikes many people as socialism.— Chuck Thompson, Popular Mechanics, “The State of American Trade Schools,” 13 Mar. 2019From the 1940s, city policymakers and real estate agents found common ground, both campaigning against funding for public housing in urban areas, the former dismissing it as socialism, while the latter stood to lose profits.— Mychal Denzel Smith, The New Republic, “How America became over-policed,” 5 June 2018

These example sentences are selected automatically from various online news sources to reflect current usage of the word ‘socialism.’ Views expressed in the examples do not represent the opinion of Merriam-Webster or its editors. Send us feedback.

maxresdefault (1)248298_imagesocialism650x3901_XPK07h1CJc0_aFalZIfXSw1_zi25pBJzYyqKePsuV9EA1wsheep goatsmaxresdefault (2)Capture-1-673x0-c-defaultDSA-Featured-678x381images (4)tlc-09685275f54f82e9fcc0702fb0fd9db81e6f389aimages (6)

https://www.hoover.org/research/why-socialism-fails

 

images (3)

images (5)Socialism

 

SEE MORE:

First Known Use of socialism

1833, in the meaning defined at sense 1

Trending Words from Election 2016

Dictionary Entries near socialism

social insect

social insurance

socialise

socialism

socialist

Socialist labor

socialist realism

Statistics for socialism

1: A way of organizing a society in which major industries are owned and controlled by the government rather than by individual people and companies

See the full definition forsocialism in the English Language Learners Dictionary

SOCIALISM

noun

so·cial·ism\ˈsō-shə-ˌli-zəm\

Kids Definition ofsocialism

1: A social system or theory in which the government owns and controls the means of production (as factories) and distribution of goods

More from Merriam-Webster on socialism

Rhyming Dictionary: Words that rhyme with socialism

Thesaurus: All synonyms and antonyms for socialism

Spanish Central: Translation of socialism

English: Translation of socialism for Spanish Speakers

Britannica English: Translation of socialism for Arabic Speakers

Britannica.com: Encyclopedia

SOCIALISM
socialism/ˈsəʊʃəlɪz(ə)m/

noun

A political and economic theory of social organization which advocates that the means of production, distribution, and exchange should be owned or regulated by the community as a whole.

SYNONYMS:
Leftism, Fabianism, syndicalism, consumer socialism, utopian socialism, welfarism; More

Policy or practice based on the political and economic theory of socialism.

SYNONYMS:
leftism, Fabianism, syndicalism, consumer socialism, utopian socialism, welfarism; More

(in Marxist theory) a transitional social state between the overthrow of capitalism and the realization of Communism.

MASCULINE NAME:

1.
Doctrine of social organization, which intends to make prevail the general interest on the particular interests, by means of a concerted organization (opposed to liberalism).
Reform Socialism and Revolutionary Socialism.

2.
POLICY (VOCABULARY MARXIST)
Transitional phase between the disappearance of capitalism and the establishment of communism.

ABOUT SOCIALISM

Socialism is a range of
economic and social systems, characterised by social ownership of the means of production and workers’ self-management, as well as the political theories and movements associated with them. Social ownership can be public, collective or cooperative ownership, or citizen ownership of equity. There are many varieties of socialism and there is no single definition encapsulating all of them,
with social ownership being the common element shared by its various forms.

Socialist systems are divided into non-market and market forms. Non-market socialism involves the substitution of factor markets and money with engineering and technical criteria based on calculation performed in-kind, thereby producing an economic mechanism that functions according to different
economic laws from those of capitalism. Non-market socialism aims to circumvent the inefficiencies and crises
traditionally associated with
capital accumulation and the profit system. By contrast,
market socialism retains the use of monetary prices, factor markets and in some cases the profit motive, with respect to the operation of socially owned enterprises and the allocation of capital goods between them. Profits generated by these firms would be controlled directly by the workforce of each firm, or accrue to society at large in the form of a social dividend. The socialist calculation debate concerns the feasibility and methods of resource allocation for a socialist system.

Socialist politics has been both internationalist and nationalist in orientation; organised through political parties and opposed to party politics; at times overlapping with trade unions, and at other times independent and critical of unions; and present in both industrialised and developing nations.
Originating within the socialist movement, social democracyhas embraced a mixed economy with a market that includes substantial state intervention in the form of income redistribution, regulation, and a welfare state. Economic democracy proposes a sort of market socialism where there is more decentralized control of companies, currencies, investments, and natural resources.

The socialist political movementincludes a set of political philosophies that originated in the revolutionary movements of the mid-to-late 18th century and out of concern for the social problems that were associated with capitalism.
By the late 19th century, after the work of Karl Marx and his collaborator
Friedrich Engels, socialism had come to signify opposition to capitalism and advocacy for a post-capitalist system based on some form of social ownership of the means of production. By the 1920s,
social democracy
and communism had become the two dominant political tendencies within the international socialist movement. By this time, socialism emerged as “the most influential secular movement of the twentieth century, worldwide. It is a political ideology (or world view), a wide and divided political movement” and while the emergence of the Soviet Union as the world’s first nominally socialist state led to socialism’s widespread association with the Soviet economic model, some economists and intellectuals argued that in practice the model functioned as a form of state capitalism or a non-planned administrative or command economy. Socialist parties
and ideas remain a political force with varying degrees of power and influence on all continents, heading national governments in many countries around the world. Today, some socialists have also adopted the causes of other social movements, such as environmentalism,
feminism and progressivism.
In 21st century America,
the term socialism, without
clear definition, has become a pejorative used by
conservatives to taint liberal
and progressive policies,
proposals, and public figures.

ETYMOLOGY

of the twentieth century, worldwide. It is a political ideology (or world view), a wide and divided political movement”[33] and while the emergence of the Soviet Union as the world’s first nominally socialist state led to socialism’s widespread association with the Soviet economic model, some economists and intellectuals argued that in practice the model functioned as a form of state capitalism[34][35][36] or a non-planned administrative or command economy.[37][38] Socialist parties and ideas remain a political force with varying degrees of power and influence on all continents, heading national governments in many countries around the world. Today, some socialists have also adopted the causes of other social movements, such as environmentalism, feminism and progressivism.[39] In 21st century America, the term socialism, without clear definition, has become a pejorative used by conservatives to taint liberal and progressive policies, proposals, and public figures.[40]

Contents

Etymology

Utopian socialist pamphlet of Rudolf Sutermeister

For Andrew Vincent, “[t]he word ‘socialism’ finds its root in the Latin sociare, which means to combine or to share. The related, more technical term in Roman and then medieval law was societas. This latter word could mean companionship and fellowship as well as the more legalistic idea of a consensual contract between freemen”.[41]

The term “socialism” was created by Henri de Saint-Simon, one of the founders of what would later be labelled “utopian socialism”. Simon coined the term as a contrast to the liberal doctrine of “individualism”, which stressed that people act or should act as if they are in isolation from one another.[42] The original “utopian” socialists condemned liberal individualism for failing to address social concerns during the industrial revolution, including poverty, social oppression and gross inequalities in wealth, thus viewing liberal individualism as degenerating society into supporting selfish egoism that harmed community life through promoting a society based on competition.[42] They presented socialism as an alternative to liberal individualism based on the shared ownership of resources, although their proposals for socialism differed significantly. Saint-Simon proposed economic planning, scientific administration and the application of modern scientific advancements to the organisation of society. By contrast, Robert Owen proposed the organisation of production and ownership in cooperatives.[42][43]

The term “socialism” is also attributed to Pierre Leroux[44] and to Marie Roch Louis Reybaud in France; and in Britain to Robert Owen in 1827, father of the cooperative movement.[45][46]

The modern definition and usage of “socialism” settled by the 1860s, becoming the predominant term among the group of words “co-operative”, “mutualist” and “associationist”, which had previously been used as synonyms. The term “communism” also fell out of use during this period, despite earlier distinctions between socialism and communism from the 1840s.[47] An early distinction between socialism and communism was that the former aimed to only socialise production while the latter aimed to socialise both production and consumption (in the form of free access to final goods).[48] However, Marxists employed the term “socialism” in place of “communism” by 1888, which had come to be considered an old-fashion synonym for socialism. It was not until 1917 after the Bolshevik Revolution that “socialism” came to refer to a distinct stage between capitalism and communism, introduced by Vladimir Lenin as a means to defend the Bolshevik seizure of power against traditional Marxist criticisms that Russia’s productive forces were not sufficiently developed for socialist revolution.[49]

A distinction between “communist” and “socialist” as descriptors of political ideologies arose in 1918 after the Russian Social-Democratic Labour Party renamed itself to the All-Russian Communist Party, where communist came to specifically mean socialists who supported the politics and theories of Leninism, Bolshevism and later Marxism–Leninism,[50] although communist parties continued to describe themselves as socialists dedicated to socialism.[51]

The words “socialism” and “communism” eventually accorded with the adherents’ and opponents’ cultural attitude towards religion. In Christian Europe, communism was believed to be the atheist way of life. In Protestant England, the word “communism” was too culturally and aurally close to the Roman Catholic communion rite, hence English atheists denoted themselves socialists.[52] Friedrich Engels argued that in 1848, at the time when The Communist Manifesto was published, that “socialism was respectable on the continent, while communism was not”. The Owenites in England and the Fourieristsin France were considered “respectable” socialists, while working-class movements that “proclaimed the necessity of total social change” denoted themselves communists. This latter branch of socialism produced the communist work of Étienne Cabet in France and Wilhelm Weitling in Germany.[53] The British moral philosopher John Stuart Mill also came to advocate a form of economic socialism within a liberal context. In later editions of his Principles of Political Economy (1848), Mill would argue that “as far as economic theory was concerned, there is nothing in principle in economic theory that precludes an economic order based on socialist policies”. While democrats looked to the Revolutions of 1848 as a democratic revolution, which in the long run ensured liberty, equality and fraternity, Marxists denounced 1848 as a betrayal of working-class ideals by a bourgeoisie indifferent to the legitimate demands of the proletariat.

HISTORY

.

Main article: History of socialism

cs and a romantic anti-industrialism”[67] which produced theorists such as Edward Bellamy, Frederick Denison Maurice and Charles Kingsley.[74]

The first advocates of socialism favoured social levelling in order to create a meritocratic or technocratic society based on individual talent. Count Henri de Saint-Simon is regarded as the first individual to coin the term “socialism”.[75] Saint-Simon was fascinated by the enormous potential of science and technology and advocated a socialist society that would eliminate the disorderly aspects of capitalism and would be based on equal opportunities.[76][unreliable source?] He advocated the creation of a society in which each person was ranked according to his or her capacities and rewarded according to his or her work.[75] The key focus of Saint-Simon’s socialism was on administrative efficiency and industrialism and a belief that science was the key to progress.[77] This was accompanied by a desire to implement a rationally organised economy based on planning and geared towards large-scale scientific and material progress,[75] thus embodied a desire for a more directed or planned economy. Other early socialist thinkers, such as Thomas Hodgkin and Charles Hall, based their ideas on David Ricardo’s economic theories. They reasoned that the equilibrium value of commodities approximated prices charged by the producer when those commodities were in elastic supply and that these producer prices corresponded to the embodied labour—the cost of the labour (essentially the wages paid) that was required to produce the commodities. The Ricardian socialists viewed profit, interest and rent as deductions from this exchange-value.[citation needed]

West European social critics, including Robert Owen, Charles Fourier, Pierre-Joseph Proudhon, Louis Blanc, Charles Hall, and Saint-Simon were the first modern socialists who criticised the excessive poverty and inequality of the Industrial Revolution. They advocated reform, with some such as Robert Owen advocating the transformation of society to small communities without private property. Robert Owen’s contribution to modern socialism was his understanding that actions and characteristics of individuals were largely determined by the social environment they were raised in and exposed to.[77]On the other hand, Charles Fourier advocated phalansteres which were communities that respected individual desires (including sexual preferences), affinities and creativity and saw that work has to be made enjoyable for people.[78] The ideas of Owen and Fourier were tried in practice in numerous intentional communities around Europe and the American continent in the mid-19th century.

Paris Commune

The celebration of the election of the Commune on 28 March 1871—the Paris Commune was a major early implementation of socialist ideas

The Paris Commune was a government that briefly ruled Paris from 18 March (more formally, from 28 March) to 28 May 1871. The Commune was the result of an uprising in Paris after France was defeated in the Franco-Prussian War. The Commune elections held on 26 March elected a Commune council of 92 members, one member for each 20,000 residents.[79] Despite internal differences, the council began to organise the public services essential for a city of two million residents. It also reached a consensus on certain policies that tended towards a progressive, secular and highly democratic social democracy.

Because the Commune was only able to meet on fewer than 60 days in all, only a few decrees were actually implemented. These included the separation of church and state; the remission of rents owed for the entire period of the siege (during which payment had been suspended); the abolition of night work in the hundreds of Paris bakeries; the granting of pensions to the unmarried companions and children of National Guards killed on active service; and the free return, by the city pawnshops, of all workmen’s tools and household items valued up to 20 francs, pledged during the siege.[80] The Commune was concerned that skilled workers had been forced to pawn their tools during the war; the postponement of commercial debt obligations and the abolition of interest on the debts; and the right of employees to take over and run an enterprise if it were deserted by its owner. The Commune nonetheless recognised the previous owner’s right to compensation.[80]

First International

Mikhail Bakunin speaking to members of the International Workingmen’s Association at the Basel Congress in 1869

The International Workingmen’s Association (IWA), often called the First International, was founded in London in 1864. The International Workingmen’s Association united diverse revolutionary currents including French followers of Proudhon,[81] Blanquists, Philadelphes, English trade unionists, socialists and social democrats. The IWA held a preliminary conference in 1865 and had its first congress at Geneva in 1866. Due to the wide variety of philosophies present in the First International, there was conflict from the start. The first objections to Marx came from the mutualists who opposed communism and statism. However, shortly after Mikhail Bakunin and his followers (called collectivists while in the International) joined in 1868, the First International became polarised into two camps headed by Marx and Bakunin respectively.[82] The clearest differences between the groups emerged over their proposed strategies for achieving their visions of socialism. The First International became the first major international forum for the promulgation of socialist ideas.

The followers of Bakunin were called collectivist anarchists and sought to collectivise ownership of the means of production while retaining payment proportional to the amount and kind of labour of each individual. Like Proudhonists, they asserted the right of each individual to the product of his labour and to be remunerated for their particular contribution to production. By contrast, anarcho-communists sought collective ownership of both the means and the products of labour. Errico Malatesta put it: “[I]nstead of running the risk of making a confusion in trying to distinguish what you and I each do, let us all work and put everything in common. In this way each will give to society all that his strength permits until enough is produced for every one; and each will take all that he needs, limiting his needs only in those things of which there is not yet plenty for every one”.[83] Anarcho-communism as a coherent, modern economic-political philosophy was first formulated in the Italian section of the First International by Carlo Cafiero, Emilio Covelli, Errico Malatesta, Andrea Costaand other ex Mazzinian republicans.[84] Out of respect for Mikhail Bakunin, they did not make their differences with collectivist anarchism explicit until after Bakunin’s death.[85]

Syndicalism emerged in France inspired in part by the ideas of Pierre-Joseph Proudhon and later by Fernand Pelloutier and Georges Sorel.[86] It developed at the end of the 19th century out of the French trade-union movement (syndicat is the French word for trade union). It was a significant force in Italy and Spain in the early 20th century until it was crushed by the fascist regimes in those countries. In the United States, syndicalism appeared in the guise of the Industrial Workers of the World, or “Wobblies”, founded in 1905.[86] Syndicalism is an economic system where industries are organised into confederations (syndicates)[87] and the economy is managed by negotiation between specialists and worker representatives of each field, comprising multiple non-competitive categorised units.[88] Syndicalism is thus a form of communism and economic corporatism, but also refers to the political movement and tactics used to bring about this type of system. An influential anarchist movement based on syndicalist ideas is anarcho-syndicalism.[89] The International Workers Association is an international anarcho-syndicalist federation of various labour unions from different countries.

The Fabian Society is a British socialist organisation which was established with the purpose of advancing the principles of socialism via gradualist and reformist means.[90] The society laid many of the foundations of the Labour Party and subsequently affected the policies of states emerging from the decolonisation of the British Empire, most notably India and Singapore. Originally, the Fabian Society was committed to the establishment of a socialist economy, alongside a commitment to British imperialism as a progressive and modernising force.[91] Today, the society functions primarily as a think tank and is one of fifteen socialist societies affiliated with the Labour Party. Similar societies exist in Australia (the Australian Fabian Society), in Canada (the Douglas-Coldwell Foundation and the now disbanded League for Social Reconstruction) and in New Zealand.

Guild socialism is a political movement advocating workers’ control of industry through the medium of trade-related guilds”in an implied contractual relationship with the public”.[92] It originated in the United Kingdom and was at its most influential in the first quarter of the 20th century. Inspired by medieval guilds, theorists such as Samuel G. Hobson and G. D. H. Coleadvocated the public ownership of industries and their organisation into guilds, each of which would be under the democratic control of its trade union. Guild socialists were less inclined than Fabians to invest power in a state.[86] At some point, like the American Knights of Labor, guild socialism wanted to abolish the wage system.[citation needed]

Second International

As the ideas of Marx and Engels took on flesh, particularly in central Europe, socialists sought to unite in an international organisation. In 1889 (the centennial of the French Revolution of 1789), the Second International was founded, with 384 delegates from twenty countries representing about 300 labour and socialist organisations.[93] It was termed the Socialist International and Engels was elected honorary president at the third congress in 1893. Anarchists were ejected and not allowed in, mainly due to pressure from Marxists.[94] It has been argued that at some point the Second International turned “into a battleground over the issue of libertarian versus authoritarian socialism. Not only did they effectively present themselves as champions of minority rights; they also provoked the German Marxists into demonstrating a dictatorial intolerance which was a factor in preventing the British labor movement from following the Marxist direction indicated by such leaders as H. M. Hyndman”.[94]

Reformism arose as an alternative to revolution. Eduard Bernstein was a leading social democrat in Germany who proposed the concept of evolutionary socialism. Revolutionary socialists quickly targeted reformism: Rosa Luxemburgcondemned Bernstein’s Evolutionary Socialism in her 1900 essay Social Reform or Revolution?. Revolutionary socialism encompasses multiple social and political movements that may define “revolution” differently from one another. The Social Democratic Party (SPD) in Germany became the largest and most powerful socialist party in Europe, despite working illegally until the anti-socialist laws were dropped in 1890. In the 1893 elections, it gained 1,787,000 votes, a quarter of the total votes cast, according to Engels. In 1895, the year of his death, Engels emphasised the Communist Manifesto’s emphasis on winning, as a first step, the “battle of democracy”.[95]

Early 20th century

Main articles: History of anarchism § 20th century, Russian Revolution, German Revolution, Biennio Rosso, and Spanish Revolution of 1936

Antonio Gramsci, member of the Italian Socialist Party and later leader and theorist of the Communist Party of Italy

In Argentina the Socialist Party of Argentina was established in the 1890s led by, among others, Juan B. Justo and Nicolás Repetto, thus becoming the first mass party in the country and in Latin America. The party affiliated itself with the Second International.[96] Between 1924 and 1940 it was a member of the Labour and Socialist International.[97] In 1904, Australians elected Chris Watson as the first Australian Labor Party Prime Minister, becoming the first democratically elected social democrat. In 1909, the first Kibbutz was established in Palestine[98] by Russian Jewish Immigrants. The Kibbutz Movement would then expand through the 20th century following a doctrine of Zionist socialism.[99] The British Labour Party first won seats in the House of Commons in 1902. The International Socialist Commission (ISC, also known as Berne International) was formed in February 1919 at a meeting in Bern by parties that wanted to resurrect the Second International.[100]

By 1917, the patriotism of World War I changed into political radicalism in most of Europe, the United States and Australia. Other socialist parties from around the world who were beginning to gain importance in their national politics in the early 20th century included the Italian Socialist Party, the French Section of the Workers’ International, the Spanish Socialist Workers’ Party, the Swedish Social Democratic Party, the Russian Social Democratic Labour Party, the Socialist Party of America in the United States, the Argentinian Socialist Party and the Chilean Partido Obrero Socialista.

Russian Revolution

Main article: Russian Revolution

In February 1917, revolution exploded in Russia. Workers, soldiers and peasants established soviets (councils), the monarchy fell and a provisional government convoked pending the election of a constituent assembly. In April of that year, Vladimir Lenin, leader of the Bolshevik faction of socialists in Russia and known for his profound and controversial expansions of Marxism, was allowed to cross Germany to return to his country from exile in Switzerland.

Lenin had published essays on his analysis of imperialism, the monopoly and globalisation phase of capitalism as predicted by Marx, as well as analyses on the social conditions of his contemporary time. He observed that as capitalism had further developed in Europe and America, the workers remained unable to gain class consciousness so long as they were too busy working and concerned with how to make ends meet. He therefore proposed that the social revolution would require the leadership of a vanguard party of class-conscious revolutionaries from the educated and politically active part of the population.[101]

Upon arriving in Petrograd, Lenin declared that the revolution in Russia was not over but had only begun, and that the next step was for the workers’ soviets to take full state authority. He issued a thesis outlining the Bolshevik’s party programme, including rejection of any legitimacy in the provisional government and advocacy for state power to be given to the peasant and working class through the soviets. The Bolsheviks became the most influential force in the soviets and on 7 November the capitol of the provisional government was stormed by Bolshevik Red Guards in what afterwards known as the “Great October Socialist Revolution”. The rule of the provisional government was ended and the Russian Socialist Federative Soviet Republic—the world’s first constitutionally socialist state—was established. On 25 January 1918 at the Petrograd Soviet, Lenin declared “Long live the world socialist revolution!”[102] and proposed an immediate armistice on all fronts and transferred the land of the landed proprietors, the crown and the monasteries to the peasant committees without compensation.[103]

The day after assuming executive power on 25 January, Lenin wrote Draft Regulations on Workers’ Control, which granted workers control of businesses with more than five workers and office employees and access to all books, documents and stocks and whose decisions were to be “binding upon the owners of the enterprises”.[104] Governing through the elected soviets and in alliance with the peasant-based Left Socialist-Revolutionaries, the Bolshevik government began nationalising banks and industry; and disavowed the national debts of the deposed Romanov royal régime. It sued for peace, withdrawing from World War I and convoked a Constituent Assembly in which the peasant Socialist-Revolutionary Party(SR) won a majority.[105]

The Constituent Assembly elected Socialist-Revolutionary leader Victor Chernov President of a Russian republic, but rejected the Bolshevik proposal that it endorse the Soviet decrees on land, peace and workers’ control and acknowledge the power of the Soviets of Workers’, Soldiers’ and Peasants’ Deputies. The next day, the Bolsheviks declared that the assembly was elected on outdated party lists[106] and the All-Russian Central Executive Committee of the Soviets dissolved it.[107][108]In March 1919, world communist parties formed Comintern (also known as the Third International) at a meeting in Moscow.[109]

International Working Union of Socialist Parties

Main article: International Working Union of Socialist Parties

Parties which did not want to be a part of the resurrected Second International (ISC) or Comintern formed the International Working Union of Socialist Parties (IWUSP, also known as Vienna International/Vienna Union/Two-and-a-Half International) on 27 February 1921 at a conference in Vienna.[110] The ISC and the IWUSP joined to form the Labour and Socialist International (LSI) in May 1923 at a meeting in Hamburg[111] Left-wing groups which did not agree to the centralisation and abandonment of the soviets by the Bolshevik Party led left-wing uprisings against the Bolsheviks—such groups included Socialist Revolutionaries,[112] Left Socialist Revolutionaries, Mensheviks and anarchists.[113]

Within this left-wing discontent, the most large-scale events were the worker’s Kronstadt rebellion[114][115][116] and the anarchist led Revolutionary Insurrectionary Army of Ukraine uprising which controlled an area known as the Free Territory.[117][118][119]

Third International

Main article: Communist International

The Bolshevik Russian Revolution of January 1918 engendered communist parties worldwide and their concomitant revolutions of 1917–1923. Few communists doubted that the Russian success of socialism depended on successful, working-class socialist revolutions in developed capitalist countries.[120][121] In 1919, Lenin and Trotsky organised the world’s communist parties into a new international association of workers—the Communist International (Comintern), also called the Third International.

The Russian Revolution also influenced uprisings in other countries around this time. The German Revolution of 1918–1919 resulted in the replacing Germany’s imperial government with a republic. The revolutionary period lasted from November 1918 until the formal establishment of the Weimar Republic in August 1919 and included an episode known as the Bavarian Soviet Republic[122][123][124][125] and the Spartacist uprising. In Italy, the events known as the Biennio Rosso[126][127] were characterised by mass strikes, worker manifestations and self-management experiments through land and factory occupations. In Turin and Milan, workers’ councils were formed and many factory occupations took place led by anarcho-syndicalists organised around the Unione Sindacale Italiana.[128]

By 1920, the Red Army under its commander Trotsky had largely defeated the royalist White Armies. In 1921, War Communism was ended and under the New Economic Policy (NEP) private ownership was allowed for small and medium peasant enterprises. While industry remained largely state-controlled, Lenin acknowledged that the NEP was a necessary capitalist measure for a country unripe for socialism. Profiteering returned in the form of “NEP men” and rich peasants (kulaks) gained power in the countryside.[129] Nevertheless, the role of Trotsky in this episode has been questioned by other socialists, including ex Trotskyists. In the United States, Dwight Macdonald broke with Trotsky and left the Trotskyist Socialist Workers Party by raising the question of the Kronstadt rebellion, which Trotsky as leader of the Soviet Red Armyand the other Bolsheviks had brutally repressed. He then moved towards democratic socialism and anarchism.

A similar critique of Trotsky’s role on the events around the Kronstadt rebellion was raised by the American anarchist Emma Goldman. In her essay “Trotsky Protests Too Much”, she says: “I admit, the dictatorship under Stalin’s rule has become monstrous. That does not, however, lessen the guilt of Leon Trotsky as one of the actors in the revolutionary drama of which Kronstadt was one of the bloodiest scenes”.

Rosa Luxemburg, prominent Marxist revolutionary, leader of the Social Democratic Party of Germany and martyr and leader of the German
Spartacist uprising in 1919.

FOURTH CONGRESS

Working Union of Socialist Parties (IWUSP, also known as Vienna International/Vienna Union/Two-and-a-Half International) on 27 February 1921 at a conference in Vienna. The ISC and the IWUSP joined to form the Labour and Socialist International (LSI) in May 1923 at a meeting in Hamburg Left-wing groups which did not agree to the centralisation and abandonment of the soviets by the Bolshevik Party led left-wing uprisings against the Bolsheviks—such groups included Socialist Revolutionaries, Left Socialist Revolutionaries, Mensheviks and anarchists.

Within this left-wing discontent, the most large-scale events were the worker’s Kronstadt rebellion and the anarchist led Revolutionary Insurrectionary Army of Ukraine uprising which controlled an area known as the Free Territory.

THIRD INTERNATIONAL

(Main article: Communist International)

The Bolshevik Russian Revolution of January 1918 engendered communist parties worldwide and their concomitant revolutions of 1917–1923. Few communists doubted that the Russian success of socialism depended on successful, working-class socialist revolutions in developed capitalist countries. In 1919, Lenin and Trotsky organised the world’s communist parties into a new international association of workers—the Communist International (Comintern), also called the Third International.

The Russian Revolution also influenced uprisings in other countries around this time. The German Revolution of 1918–1919 resulted in the replacing Germany’s imperial government with a republic. The revolutionary period lasted from November 1918 until the formal establishment of the Weimar Republic in August 1919 and included an episode known as the
Bavarian Soviet Republic
and the Spartacist uprising. In Italy, the events known as the Biennio Rosso were characterised by mass strikes, worker manifestations and self-management experiments through land and factory occupations. In Turin and Milan, workers’ councils were formed and many factory occupations took place led by anarcho-syndicalists
organised around the Unione Sindacale Italiana.

By 1920, the Red Army under its commander Trotsky had largely defeated the royalist White Armies. In 1921, War Communism was ended and under the New Economic Policy (NEP) private ownership was allowed for small and medium peasant enterprises. While industry remained largely state-controlled, Lenin acknowledged that the NEP was a necessary capitalist measure for a country unripe for socialism. Profiteering returned in the form of “NEP men” and rich peasants (kulaks) gained power in the countryside. Nevertheless, the role of Trotsky in this episode has been questioned by other socialists, including ex Trotskyists. In the United States, Dwight Macdonald
broke with Trotsky and left the Trotskyist Socialist Workers Party by raising the question of the Kronstadt rebellion, which Trotsky as leader of the Soviet Red Armyand the other Bolsheviks had brutally repressed. He then moved towards
democratic socialism and
anarchism.

A similar critique of Trotsky’s role on the events around the Kronstadt rebellion was raised by the American anarchist Emma Goldman. In her essay “Trotsky Protests Too Much”, she says: “I admit, the dictatorship under Stalin’s rule has become monstrous. That does not, however, lessen the guilt of Leon Trotsky as one of the actors in the revolutionary drama of which Kronstadt was one of the bloodiest scenes”.

Rosa Luxemburg, prominent Marxist revolutionary, leader of the Social Democratic Party of Germany and martyr and leader of the German
Spartacist uprising in 1919.

FOURTH CONGRESS

In 1922, the fourth congress of the Communist International took up the policy of the United Front, urging communists to work with rank and file Social Democrats while remaining critical of their leaders, whom they criticised for betraying the working class by supporting the war efforts of their respective capitalist classes. For their part, the social democrats pointed to the dislocation caused by revolution and later the growing authoritarianism of the communist parties. When the Communist Party of Great Britain applied to affiliate to the Labour Party in 1920, it was turned down.

On seeing the Soviet State’s growing coercive power in 1923, a dying Lenin said Russia had reverted to “a bourgeois tsarist machine… barely varnished with socialism”. After Lenin’s death in January 1924, the Communist Party of the Soviet Union—then increasingly under the control of Joseph Stalin—rejected the theory that socialism could not be built solely in the Soviet Union in favour of the concept of “Socialism in One Country”. Despite the marginalised Left Opposition’s demand for the restoration of Soviet democracy, Stalin developed a bureaucratic, authoritarian
government that was condemned by democratic socialists, anarchists and Trotskyists for undermining the initial socialist ideals of the Bolshevik Russian Revolution.

In 1924, the Mongolian People’s Republic was established and was ruled by the Mongolian People’s Party. The Russian Revolution and the appearance of the Soviet State motivated a worldwide current of national communist parties which ended having varying levels of political and social influence. Among these there appeared the Communist Party of France, the
Communist Party USA, the Italian Communist Party, the Chinese Communist Party, the Mexican Communist Party, the
Brazilian Communist Party, the Chilean Communist Party and the Communist Party of Indonesia.

SPANISH CIVIL WAR

(Main article: Spanish Civil War)

Anarcha-feminist militia during the Spanish Revolution in 1936

In Spain in 1936, the national anarcho-syndicalist
trade union Confederación Nacional del Trabajo (CNT) initially refused to join a popular front electoral alliance and abstention by CNT supporters led to a right-wing election victory.
In 1936, the CNT changed its policy and anarchist votes helped bring the popular front back to power. Months later, the former ruling class responded with an attempted coup, sparking the Spanish Civil War (1936–1939).

In response to the army rebellion, an anarchist-inspired movement of peasants and workers, supported by armed militias, took control of Barcelona and of large areas of rural Spain where they collectivised the land. The events known as the Spanish Revolution was a workers’ social revolution
that began during the outbreak of the Spanish Civil War in 1936 and resulted in the widespread implementation of anarchist
and more broadly libertarian socialist organisational principles throughout various portions of the country for two to three years, primarily Catalonia, Aragon, Andalusia and parts of Levante.

Much of Spain’s economy was put under worker control and in anarchist strongholds like Catalonia the figure was as high as 75%, but lower in areas with heavy Communist Party of Spain influence, as the Soviet-allied party actively resisted attempts at collectivisation enactment. Factories were run through worker committees,
agrarian areas became collectivised and run as libertarian communes. Anarchist historian Sam Dolgoff estimated that about eight million people participated directly or indirectly in the Spanish Revolution.

MID-20TH CENTURY

Further information: History of the People’s Republic of China (1949–76),
Decolonization § Decolonization after 1945, Eastern Bloc, and
History of anarchism § Post-war years

POST-WORLD WAR II

Leon Trotsky’s Fourth International was established in France in 1938 when
Trotskyists argued that the Comintern or Third International had become irretrievably “lost to
Stalinism” and thus incapable of leading the international working class to political power. The rise of Nazism and the start of World War II led to the dissolution of the LSI in 1940. After the War, the Socialist International was formed in Frankfurt in July 1951 as a successor to the LSI.

After World War II, social democratic governments introduced social reform and wealth redistribution via state welfare and taxation. Social democratic parties dominated post-war politics in countries such as France, Italy, Czechoslovakia, Belgium and Norway. At one point, France claimed to be the world’s most state-controlled capitalist country. The nationalised public utilities included Charbonnages de France (CDF), Electricité de France (EDF), Gaz de France (GDF), Air France, Banque de France and Régie Nationale des Usines Renault.

In 1945, the British Labour Party led by Clement Attlee was elected to office based on a radical socialist programme. The Labour government nationalised major public utilities such as mines, gas, coal, electricity, rail, iron, steel and the Bank of England. British Petroleum was officially nationalised in 1951. Anthony Crosland said that in 1956 25% of British industry was nationalised and that public employees, including those in nationalised industries, constituted a similar proportion of the country’s total employed population.
The Labour Governments of 1964–1970 and 1974–1979 intervened further. It re-nationalised steel (1967, British Steel) after the Conservatives had denationalised it and nationalised car production (1976, British Leyland).
The National Health Service provided taxpayer-funded health care to everyone, free at the point of service. Working-class housing was provided in council housing estates and university education became available via a school grant system.

SOVIET UNION & EASTERN EUROPE

(Main article: History of the Soviet Union)

The Soviet Union played a decisive role in the Allied
victory in World War II. After the war, the Soviet Union became a recognised superpower. The Soviet era saw some of the most significant technological achievements of the 20th
century, including the world’s first spacecraft and the first astronaut. The Soviet economy was the modern world’s first centrally planned economy. It was based on a system of state ownership of industry managed through
Gosplan (the State Planning Commission), Gosbank (the State Bank) and the Gossnab
(State Commission for Materials and Equipment Supply).

Economic planning was conducted through a series of Five-Year Plans. The emphasis was on fast development of heavy industry and the nation became one of the world’s top manufacturers of a large number of basic and heavy industrial products, but it lagged in light industrial production and consumer durables. Modernization brought about a general increase in the standard of living.

The Eastern Bloc was the group of former Communist states of Central and Eastern Europe, generally the Soviet Union and the countries of the Warsaw Pact which included the People’s Republic of Poland, the German Democratic Republic, the People’s Republic of Hungary, the People’s Republic of Bulgaria, the Czechoslovak Socialist Republic, the Socialist Republic of Romania, the People’s Socialist Republic of Albania and the Socialist Federal Republic of Yugoslavia. The Hungarian Revolution of 1956 was a spontaneous nationwide revolt against the government of the People’s Republic of Hungary and its Soviet-imposed policies, lasting from 23 October until 10 November 1956. Soviet leader Nikita Khrushchev’s denunciation of the excesses of Stalin’s regime during the Twentieth Party Congress of the Communist Party of the Soviet Union on 1956 as well as the revolt in Hungary, produced ideological fractures and disagreements within the communist and socialist parties of Western Europe.

THIRD WORLD

In the post-war years, socialism became increasingly influential throughout the so-called Third World. Embracing a new Third World socialism, countries in Africa, Asia and Latin America often nationalised industries held by foreign owners. The Chinese Kuomintang Party, the previous ruling party in Taiwan, was referred to as having a socialist ideology since Kuomintang’s revolutionary ideology in the 1920s incorporated unique Chinese socialism as part of its ideology. The Soviet Union trained Kuomintang revolutionaries in the Moscow Sun Yat-sen University. Movie theatres in the Soviet Union showed newsreels and clips of Chiang at Moscow Sun Yat-sen University portraits of Chiang were hung on the walls and in the Soviet May Day parades that year Chiang’s portrait was to be carried along with the portraits of Marx, Lenin, Stalin and other socialist leaders.

The Chinese Revolution was the second stage in the Chinese Civil War which ended in the establishment of the People’s Republic of China led by the Chinese Communist Party. The term “Third World” was coined by French demographer Alfred Sauvy in 1952 on the model of the Third Estate, which according to the Abbé Sieyès represented everything, but was nothing “because at the end this ignored, exploited, scorned Third World like the Third Estate, wants to become something too”.

The emergence of this new political entity in the frame of the Cold War was complex and painful. Several tentatives were made to organise newly independent states in order to oppose a common front towards both the United States’ and the Soviet Union’s influence on them, with the consequences of the Sino-Soviet split
already at works. The Non-Aligned Movement. constituted itself around the main figures of Prime Minister Jawaharlal Nehru of India, President
Sukarno of Indonesia, leader Josip Broz Tito of Yugoslavia and Gamal Abdel Nasser of Egypt who successfully opposed the French and British imperial powers during the 1956 Suez crisis. After the 1954 Geneva Conference which ended the French war against Ho Chi Minh in Vietnam, the 1955
Bandung Conference
gathered Nasser, Nehru, Tito, Sukarno and Zhou
Enlai, Premier of the People’s Republic of China.

As many African countries gained independence during the 1960s, some of them rejected capitalism in favour of a more afrocentric
economic model. The main architects of African socialism were Julius
*Nyerere* of Tanzania,
Léopold Senghor of Senegal,
Kwame Nkrumah of Ghana
and Sékou Touré of Guinea.

The Cuban Revolution (1953–1959) was an armed revolt conducted by Fidel Castro’s 26th of July Movement and its allies against the government of Cuban President Fulgencio Batista. The revolution began in July 1953 and finally ousted Batista on 1 January 1959, replacing his government with Castro’s revolutionary state. Castro’s government later reformed along communist lines, becoming the Communist Party of Cuba in October 1965.

In Indonesia, a right-wing military regime led by Suharto killed between 500,000 and one million people in 1965 and 1966, mainly to crush the growing influence of the Communist Party of Indonesia and other leftist sectors, with support from the United States government, which provided kill lists containing thousands of names of suspected high-ranking Communists.

NEW LEFT

(Main article: New Left)

The New Left was a term used mainly in the United Kingdom and United States in reference to activists, educators, agitators and others in the 1960s and 1970s who sought to implement a broad range of reforms on issues such as gay rights, abortion, gender roles and drugs in contrast to earlier leftist or Marxist movements that had taken a more vanguardist approach
to social justice and focused mostly on labour unionisation and questions of social class. The New Left rejected involvement with the labour movement and
Marxism’s historical theory of class struggle.

In the United States, the New Left was associated with the Hippie movement and anti-war college campus protest movements as well as the black liberation movements such as the Black Panther Party. While initially formed in opposition to the “Old Left” Democratic Party, groups composing the New Left gradually became central players in the Democratic coalition.

PROTESTS OF 1968

Main article: Protests of 1968

The protests of 1968 represented a worldwide escalation of social conflicts, predominantly characterised by popular rebellions against military, capitalist and bureaucratic elites who responded with an escalation of political repression. These protests marked a turning point for the civil rights movement in the United States, which produced revolutionary movements like the Black Panther Party; the prominent civil rights leader Martin Luther King Jr. organised the “Poor People’s Campaign” to address issues of economic justice, while personally showing sympathy with democratic socialism. In reaction to the Tet Offensive, protests also sparked a broad movement in opposition to the Vietnam Warall over the United States and even into London, Paris, Berlin and Rome. In 1968 in Carrara, Italy, the International of
Anarchist Federations was founded during an international anarchist conference held there by the three existing European federations of France, the Italian and the Iberian Anarchist Federation as well as the Bulgarian federation in French exile.

Mass socialist or communist movements grew not only in the United States, but also in most European countries. The most spectacular manifestation of this were the May 1968 protests in France in which students linked up with strikes of up to ten million workers and for a few days the movement seemed capable of overthrowing the government.

In many other capitalist countries, struggles against dictatorships, state repression and colonisation were also marked by protests in 1968, such as the beginning of the Troubles in Northern Ireland, the
Tlatelolco massacre in Mexico City and the escalation of guerrilla warfare against the military dictatorship in Brazil. Countries governed by communist parties had protests against bureaucratic and military elites. In Eastern Europe there were widespread protests that escalated particularly in the Prague Spring in Czechoslovakia. In response, Soviet Union occupied Czechoslovakia, but the occupation was denounced by the Italian and French
communist parties and the Communist Party of Finland. Few western European political leaders defended the occupation, among them the Portuguese communist secretary-general Álvaro Cunhal. Along with the Luxembourg party and conservative factions of the Communist Party of Greece.

In the Chinese Cultural Revolution, a social-political youth movement mobilised against “bourgeois” elements which were seen to be infiltrating the government and society at large, aiming to restore capitalism. This movement motivated
Maoism-inspired movements around the world in the context of the Sino-Soviet split.

LATE 20TH CENTURY

Main articles:
Eurocommunism, Nicaraguan Revolution, Dissolution of the Soviet Union, History of the People’s Republic of China (1976–89), Third Way, and History of anarchism § Late 20th century

Salvador Allende, President of Chile and member of the Socialist Party of Chile, whose presidency and life was ended by a CIA-backed military coup.

In Latin America in the 1960s, a socialist tendency within the catholic church appeared which was called liberation theology
which motivated even the Colombian priest Camilo Torres to enter the ELN
guerrilla. In Chile, Salvador
Allende, a physician and candidate for the Socialist Party of Chile, was elected president through democratic elections in 1970. In 1973, his government was ousted by the United States-backed military dictatorship of
Augusto Pinochet, which lasted until the late 1980s.
Pinochet’s regime was a leader of Operation Condor, a U.S.-backed campaign of repression and state terrorism carried out by the intelligence services of the Southern Cone countries of Latin America to eliminate suspected Communist subversion. In Jamaica, the democratic socialist
Michael Manleyserved as the fourth Prime Minister of Jamaica from 1972 to 1980 and from 1989 to 1992. According to opinion polls, he remains one of Jamaica’s most popular Prime Ministers since independence.
The Nicaraguan Revolution
encompassed the rising opposition to the Somoza
dictatorship in the 1960s and 1970s, the campaign led by the Sandinista National Liberation Front (FSLN) to violently oust the dictatorship in 1978–1979, the subsequent efforts of the FSLN to govern Nicaragua from 1979 until 1990 and the socialist measures which included widescale agrarian reform and educational programs. The People’s Revolutionary Government
was proclaimed on 13 March 1979 in Grenada which was
overthrown by armed forces of the United States in 1983. The Salvadoran Civil War
(1979–1992) was a conflict between the military-led government of El Salvador
and the Farabundo Martí National Liberation Front
(FMLN), a coalition or umbrella organisation of five socialist guerrilla groups. A coup on 15 October 1979 led to the killings of anti-coup protesters by the government as well as anti-disorder protesters by the guerillas, and is widely seen as the tipping point towards the civil war.

In Italy, Autonomia Operaia
was a leftist movement particularly active from 1976 to 1978. It took an important role in the autonomist
movement in the 1970s, aside earlier organisations such as Potere Operaio
(created after May 1968) and Lotta Continua. This experience prompted the contemporary socialist radical movement
autonomism. In 1982, the newly elected French socialist government of François Mitterrand made nationalisations in a few key industries, including banks and insurance companies.[196] Eurocommunism was a trend in the 1970s and 1980s in various Western European communist parties to develop a theory and practice of social transformation that was more relevant for a Western European country and less aligned to the influence or control of the Communist Party of the Soviet Union. Outside Western Europe, it is sometimes called neocommunism.[197] Some communist parties with strong popular support, notably the Italian Communist Party (PCI) and the Communist Party of Spain (PCE) adopted Eurocommunism most enthusiastically and the Communist Party of Finland was dominated by Eurocommunists. The French Communist Party (PCF) and many smaller parties strongly opposed Eurocommunism and stayed aligned with the Communist Party of the Soviet Union until the end of the Soviet Union.

In the late 1970s and in the 1980s, the Socialist International (SI) had extensive contacts and discussion with the two powers of the Cold War, the United States and the Soviet Union, about East-West relations and arms control. Since then, the SI has admitted as member parties the Nicaraguan FSLN, the left-wing Puerto Rican Independence Party, as well as former communist parties such as the Democratic Party of the Left of Italy and the
Front for the Liberation of Mozambique (FRELIMO). The SI aided social democratic parties in re-establishing themselves when dictatorship gave way to democracy in Portugal (1974) and Spain (1975). Until its 1976 Geneva Congress, the SI had few members outside Europe and no formal involvement with Latin America.

Mikhail Gorbachev, General Secretary of the Communist Party of the Soviet Union
from 1985 until 1991

After Mao’s death in 1976 and the arrest of the faction known as the Gang of Four, who were blamed for the excesses of the Cultural Revolution, Deng Xiaoping
took power and led the People’s Republic of China to significant economic reforms. The Communist Party of China loosened governmental control over citizens’ personal lives and the communes were disbanded in favour of private land leases, thus China’s transition from a planned economy to a mixed economy named as “socialism with Chinese characteristics” which maintained state ownership rights over land, state or cooperative ownership of much of the heavy industrial and manufacturing sectors and state influence in the banking and financial sectors. China adopted its current constitution on 4 December 1982. President
Jiang Zemin and Premier Zhu Rongji led the nation in the 1990s. Under their administration, China’s economic performance pulled an estimated 150 million peasants out of poverty and sustained an average annual gross domestic product growth rate of 11.2%. At the Sixth National Congress of the Communist Party of Vietnam in December 1986, reformist politicians replaced the “old guard” government with new leadership. The reformers were led by 71-year-old Nguyen Van Linh, who became the party’s new general secretary. Linh and the reformers implemented a series of free market reforms—known as Đổi Mới
(“Renovation”)—which carefully managed the transition from a planned economy to a “socialist-oriented market economy”.
Mikhail Gorbachev wished
to move the Soviet Union towards of Nordic-style social democracy, calling it “a socialist beacon for all mankind”. Prior to its dissolution in 1991, the Soviet Union had the second largest economy in the world after the United States. With the collapse of the Soviet Union, the economic integration of the Soviet republics was dissolved and overall industrial activity declined substantially. A lasting legacy remains in the physical infrastructure created during decades of combined industrial production practices, and widespread environmental destruction. The transition to capitalism in the former Soviet Union and Eastern bloc, which was accompanied by Washington Consensus-inspired “shock therapy”, resulted in a steep fall in the standard of living. The region experienced rising economic inequality and poverty a surge in excess mortality and a decline in life expectancy, which was
accompanied by the entrenchment of a newly established business oligarchy in the former. The average post-communist country had returned to 1989 levels of per-capita GDP by 2005, although some are still far behind that. These developments led to increased nationalist sentiment and nostalgia for the Communist era.

Many social democratic parties, particularly after the Cold War, adopted neoliberal
market policies including
privatisation, deregulation
and financialisation. They abandoned their pursuit of moderate socialism in favour of market liberalism. By the 1980s, with the rise of conservative neoliberal politicians such as Ronald Reagan in the United States, Margaret Thatcher in Britain, Brian Mulroney in Canada and Augusto Pinochet in Chile, the Western welfare state was attacked from within, but state support for the corporate sector was maintained. Monetarists and neoliberals attacked social welfare systems as impediments to private entrepreneurship. In the United Kingdom, Labour Party leader Neil Kinnock
made a public attack against the entryist group Militant
at the 1985 Labour Party conference. The Labour Party ruled that Militant was ineligible for affiliation with the Labour Party, and the party gradually expelled Militant supporters. The Kinnock leadership had refused to support the 1984–1985 miner’s strike over pit closures, a decision that the party’s left wing and the National Union of Mineworkers blamed for the strike’s eventual defeat. In 1989 at Stockholm, the 18th Congress of the Socialist International adopted a new Declaration of Principles, saying:

Democratic socialism is an international movement for freedom, social justice, and solidarity. Its goal is to achieve a peaceful world where these basic values can be enhanced and where each individual can live a meaningful life with the full development of his or her personality and talents, and with the guarantee of human and civil rights in a democratic framework of society.

In the 1990s, the British Labour Party under Tony Blair enacted policies based on the free market economy to deliver public services via the private finance initiative. Influential in these policies was the idea of a “Third Way” which called for a re-evalutation of welfare state policies. In 1995, the Labour Party re-defined its stance on socialism by re-wording Clause IV of its constitution, effectively rejecting socialism by removing all references to public, direct worker or municipal ownership of the means of production. The Labour Party stated: “The Labour Party is a democratic socialist party. It believes that, by the strength of our common endeavour we achieve more than we achieve alone, so as to create, for each of us, the means to realise our true potential, and, for all of us, a community in which power, wealth, and opportunity are in the hands of the many, not the few”.

Contemporary socialist politics

Kwame Nkrumah, the first
President of Ghana and theorist of African socialism, on a Soviet Union commemorative postage stamp

AFRICA

African socialism has been and continues to be a major ideology around the continent. Julius Nyerere was inspired by Fabian socialist ideals. He was a firm believer in rural Africans and their traditions and ujamaa, a system of collectivisation that according to Nyerere was present before European imperialism. Essentially he believed Africans were already socialists. Other African socialists include
Jomo Kenyatta, Kenneth
Kaunda, Nelson Mandela
and Kwame Nkrumah.
Fela Kuti was inspired by socialism and called for a democratic African republic. In South Africa the African National Congress (ANC) abandoned its partial socialist allegiances after taking power and followed a standard neoliberal route. From 2005 through to 2007, the country was wracked by many thousands of protests from poor communities. One of these gave rise to a mass movement of shack dwellers, Abahlali base Mjondolo that despite major police suppression continues to work for popular people’s planning and against the creation of a market economy in land and housing.

Asia

Africa

African socialism has been and continues to be a major ideology around the continent. Julius Nyerere was inspired by Fabian socialist ideals.[225] He was a firm believer in rural Africans and their traditions and ujamaa, a system of collectivisation that according to Nyerere was present before European imperialism. Essentially he believed Africans were already socialists. Other African socialists include Jomo Kenyatta, Kenneth Kaunda, Nelson Mandela and Kwame Nkrumah. Fela Kuti was inspired by socialism and called for a democratic African republic. In South Africa the African National Congress (ANC) abandoned its partial socialist allegiances after taking power and followed a standard neoliberal route. From 2005 through to 2007, the country was wracked by many thousands of protests from poor communities. One of these gave rise to a mass movement of shack dwellers, Abahlali baseMjondolo that despite major police suppression continues to work for popular people’s planning and against the creation of a market economy in land and housing.

Asia

In Asia, states with socialist economies—such as the People’s Republic of China, North Korea, Laos and Vietnam—have largely moved away from centralised economic planning in the 21st century, placing a greater emphasis on markets. Forms include the Chinese socialist market economy and the Vietnamese socialist-oriented market economy. They utilise state-owned corporate management models as opposed to modelling socialist enterprise on traditional management styles employed by government agencies. In China living standards continued to improve rapidly despite the late-2000s recession, but centralised political control remained tight.[226] Brian Reynolds Myers in his book The Cleanest Race, later supported by other academics,[227][228] dismisses the idea that Juche is North Korea’s leading ideology, regarding its public exaltation as designed to deceive foreigners and that it exists to be praised and not actually read,[229] pointing out that North Korea’s constitution of 2009 omits all mention of communism.[228]

Though the authority of the state remained unchallenged under Đổi Mới, the government of Vietnam encourages private ownership of farms and factories, economic deregulation and foreign investment, while maintaining control over strategic industries.[205] The Vietnamese economy subsequently achieved strong growth in agricultural and industrial production, construction, exports and foreign investment. However, these reforms have also caused a rise in income inequality and gender disparities.[230][231]

Elsewhere in Asia, some elected socialist parties and communist parties remain prominent, particularly in India and Nepal. The Communist Party of Nepal[which?] in particular calls for multi-party democracy, social equality and economic prosperity.[232] In Singapore, a majority of the GDP is still generated from the state sector comprising government-linked companies.[233] In Japan, there has been a resurgent interest in the Japanese Communist Party among workers and youth.[234][235] In Malaysia, the Socialist Party of Malaysia got its first Member of Parliament, Dr. Jeyakumar Devaraj, after the 2008 general election. In 2010, there were 270 kibbutzim in Israel. Their factories and farms account for 9% of Israel’s industrial output, worth US$8 billion and 40% of its agricultural output, worth over $1.7 billion.[236] Some Kibbutzim had also developed substantial high-tech and military industries. Also in 2010, Kibbutz Sasa, containing some 200 members, generated $850 million in annual revenue from its military-plastics industry.[237]

Europe

This section’s factual accuracy is disputed.

The United Nations World Happiness Report 2013 shows that the happiest nations are concentrated in Northern Europe, where the Nordic model of social democracy is employed, with Denmark topping the list. This is at times attributed to the success of the Nordic model in the region. The Nordic countries ranked highest on the metrics of real GDP per capita, healthy life expectancy, having someone to count on, perceived freedom to make life choices, generosity and freedom from corruption.[238] Indeed, the indicators of Freedom in the World have listed Scandinavian countries as ranking high on indicators such as press and economic freedom.

The objectives of the Party of European Socialists, the European Parliament’s socialist and social democratic bloc, are now “to pursue international aims in respect of the principles on which the European Union is based, namely principles of freedom, equality, solidarity, democracy, respect of Human Rights and Fundamental Freedoms, and respect for the Rule of Law”. As a result, today the rallying cry of the French Revolution—Liberté, égalité, fraternité—is promoted as essential socialist values.[239] To the left of the PES at the European level is the Party of the European Left (PEL), also commonly abbreviated “European Left”), which is a political party at the European level and an association of democratic socialist, socialist[240] and communist[240] political parties in the European Union and other European countries. It was formed in January 2004 for the purposes of running in the 2004 European Parliament elections. PEL was founded on 8–9 May 2004 in Rome.[241] Elected MEPs from member parties of the European Left sit in the European United Left–Nordic Green Left(GUE/NGL) group in the European parliament.

Alexis Tsipras, socialist Prime Minister of Greece who led the Coalition of the Radical Left (SYRIZA) through a victory in the Greek legislative election, January 2015

The socialist Left Party in Germany grew in popularity[242] due to dissatisfaction with the increasingly neoliberal policies of the SPD, becoming the fourth biggest party in parliament in the general election on 27 September 2009.[243] Communist candidate Dimitris Christofias won a crucial presidential runoff in Cyprus, defeating his conservative rival with a majority of 53%.[244] In Ireland, in the 2009 European election Joe Higgins of the Socialist Party took one of three seats in the capital Dublin European constituency.

In Denmark, the Socialist People’s Party (SF) more than doubled its parliamentary representation to 23 seats from 11, making it the fourth largest party.[245] In 2011, the Social Democrats, Socialist People’s Party and the Danish Social Liberal Party formed government, after a slight victory over the main rival political coalition. They were led by Helle Thorning-Schmidt, and had the Red-Green Alliance as a supporting party.

In Norway, the Red-Green Coalition consists of the Labour Party (Ap), the Socialist Left Party(SV) and the Centre Party (Sp) and governed the country as a majority government from the 2005 general election until 2013.

In the Greek legislative election of January 2015, the Coalition of the Radical Left (SYRIZA) led by Alexis Tsipras won a legislative election for the first time while the Communist Party of Greece won 15 seats in parliament. SYRIZA has been characterised as an anti-establishment party,[246] whose success has sent “shock-waves across the EU”.[247]

In the United Kingdom, the National Union of Rail, Maritime and Transport Workers put forward a slate of candidates in the 2009 European Parliament elections under the banner of No to EU – Yes to Democracy, a broad left-wing alter-globalisationcoalition involving socialist groups such as the Socialist Party, aiming to offer an alternative to the “anti-foreigner” and pro-business policies of the UK Independence Party.[248][249][250] In the following May 2010 United Kingdom general election, the Trade Unionist and Socialist Coalition, launched in January 2010[251] and backed by Bob Crow, the leader of the National Union of Rail, Maritime and Transport Workers union (RMT), other union leaders and the Socialist Party among other socialist groups, stood against Labour in 40 constituencies.[252][253] The Trade Unionist and Socialist Coalitioncontested the 2011 local elections, having gained the endorsement of the RMT June 2010 conference, but gained no seats.[254] Left Unity was also founded in 2013 after the film director Ken Loach appealed for a new party of the left to replace the Labour Party, which he claimed had failed to oppose austerity and had shifted towards neoliberalism.[255][256][257][258] In 2015, following a defeat at the 2015 United Kingdom general election, self-described socialist Jeremy Corbyn took over from Ed Miliband as leader of the Labour Party.[259]

In France, Olivier Besancenot, the Revolutionary Communist League (LCR) candidate in the 2007 presidential election, received 1,498,581 votes, 4.08%, double that of the communist candidate.[260] The LCR abolished itself in 2009 to initiate a broad anti-capitalist party, the New Anticapitalist Party, whose stated aim is to “build a new socialist, democratic perspective for the twenty-first century”.[261]

On 25 May 2014, the Spanish left-wing party Podemos entered candidates for the 2014 European parliamentary elections, some of which were unemployed. In a surprise result, it polled 7.98% of the vote and thus was awarded five seats out of 54[262][263] while the older United Left was the third largest overall force obtaining 10.03% and 5 seats, 4 more than the previous elections.[264]

The current government of Portugal was established on 26 November 2015 as a Socialist Party (PS) minority governmentled by prime minister António Costa. Costa succeeded in securing support for a Socialist minority government by the Left Bloc (B.E.), the Portuguese Communist Party (PCP) and the Ecologist Party “The Greens” (PEV).[265]

All around Europe and in some places of Latin America there exists a social center and squatting movement mainly inspired by autonomist and anarchist ideas.[266][267]

North America

See also: History of the socialist movement in the United States and Socialism in Canada

Bernie Sanders, junior Senator of Vermont and self-described democratic socialist, at his 2016 presidential campaign kickoff in May 2015

According to a 2013 article in The Guardian, “[c]ontrary to popular belief, Americans don’t have an innate allergy to socialism. Milwaukee has had several socialist mayors (Frank Zeidler, Emil Seidel and Daniel Hoan), and there is currently an independent socialist in the US Senate, Bernie Sanders of Vermont”.[268] Sanders, once mayor of Vermont’s largest city, Burlington, has described himself as a democratic socialist[269][270] and has praised Scandinavian-style social democracy.[271][272] In 2016, Sanders made a bid for the Democratic Party presidential candidate, thereby gaining considerable popular support, particularly among the younger generation, but lost the nomination to Hillary Clinton.

Anti-capitalism, anarchism and the anti-globalisation movement rose to prominence through events such as protests against the World Trade Organization Ministerial Conference of 1999 in Seattle. Socialist-inspired groups played an important role in these movements, which nevertheless embraced much broader layers of the population and were championed by figures such as Noam Chomsky. In Canada, the Co-operative Commonwealth Federation(CCF), the precursor to the social democratic New Democratic Party (NDP), had significant success in provincial politics. In 1944, the Saskatchewan CCF formed the first socialist government in North America. At the federal level, the NDP was the Official Opposition, from 2011 through 2015.[273]

Latin America and Caribbean

For the Encyclopedia Britannica, “the attempt by Salvador Allende to unite Marxists and other reformers in a socialist reconstruction of Chile is most representative of the direction that Latin American socialists have taken since the late 20th century. […] Several socialist (or socialist-leaning) leaders have followed Allende’s example in winning election to office in Latin American countries”.[73] Venezuelan President Hugo Chávez, Nicaraguan President Daniel Ortega, Bolivian President Evo Morales and Ecuadorian president Rafael Correa refer to their political programmes as socialist and Chávez adopted the term “socialism of the 21st century”. After winning re-election in December 2006, Chávez said: “Now more than ever, I am obliged to move Venezuela’s path towards socialism”.[274] Chávez was also reelected in October 2012 for his third six-year term as President, but he died in March 2013 from cancer. After Chávez’s death on 5 March 2013, Vice President from Chavez’s party Nicolás Maduro assumed the powers and responsibilities of the President. A special election was held on 14 April of the same year to elect a new President, which Maduro won by a tight margin as the candidate of the United Socialist Party of Venezuela and he was formally inaugurated on 19 April.[275] “Pink tide” is a term being used in contemporary 21st-century political analysis in the media and elsewhere to describe the perception that leftist ideology in general and left-wing politics in particular are increasingly influential in Latin America.[276][277][278]

Presidents Fernando Lugo of Paraguay, Evo Morales of Bolivia, Luiz Inácio Lula da Silva of Brazil, Rafael Correa of Ecuador and Hugo Chávez of Venezuela in World Social Forum for Latin America

Foro de São Paulo is a conference of leftist political parties and other organisations from Latin America and the Caribbean. It was launched by the Workers’ Party(Portuguese: Partido dos Trabalhadores – PT) of Brazil in 1990 in the city of São Paulo. The Forum of São Paulo was constituted in 1990 when the Brazilian Workers’ Partyapproached other parties and social movements of Latin America and the Caribbean with the objective of debating the new international scenario after the fall of the Berlin Wall and the consequences of the implementation of what were taken as neoliberal policies adopted at the time by contemporary right-leaning governments in the region, the stated main objective of the conference being to argue for alternatives to neoliberalism.[279] Among its member include current socialist and social-democratic parties currently in government in the region such as Bolivia’s Movement for Socialism, Brazil’s Workers Party, the Communist Party of Cuba, Ecuador’s PAIS Alliance, the United Socialist Party of Venezuela, the Socialist Party of Chile, Uruguay’s Broad Front, Nicaragua’s Sandinista National Liberation Front and El Salvador’s Farabundo Martí National Liberation Front.

Oceania

See also: Socialism in Australia, Socialism in New Zealand, and Melanesian socialism

Australia saw an increase in interest of socialism in the early 21st century, especially amongst youth.[280] It is strongest in Victoria, where three socialist parties have merged into the Victorian Socialists, who aim to address problems in housing and public transportation.

New Zealand has a small socialist scene, mainly dominated by Trotskyist groups. The current prime minister Jacinda Ardern has publicly condemned capitalism but describes herself as a social democrat.[citation needed]

Melanesian Socialism developed in the 1980s, inspired by African Socialism. It aims to achieve full independence from Britain and France in Melanesian territories and creation of a Melanesian federal union. It is very popular with the New Caledonia independence movement.[citation needed]

International socialism

The Progressive Alliance is a political international founded on 22 May 2013 by political parties, the majority of whom are current or former members of the Socialist International. The organisation states the aim of becoming the global network of “the progressive”, democratic, social-democratic, socialist and labour movement”.[281][282]

Social and political theory

Early socialist thought took influences from a diverse range of philosophies such as civic republicanism, Enlightenmentrationalism, romanticism, forms of materialism, Christianity (both Catholic and Protestant), natural law and natural rights theory, utilitarianism and liberal political economy.[283] Another philosophical basis for a lot of early socialism was the emergence of positivism during the European Enlightenment. Positivism held that both the natural and social worlds could be understood through scientific knowledge and be analyzed using scientific methods. This core outlook influenced early social scientists and different types of socialists ranging from anarchists like Peter Kropotkin to technocrats like Saint Simon.[284]

Claude Henri de Rouvroy, comte de Saint-Simon, early French socialist

The fundamental objective of socialism is to attain an advanced level of material production and therefore greater productivity, efficiency and rationality as compared to capitalism and all previous systems, under the view that an expansion of human productive capability is the basis for the extension of freedom and equality in society.[285] Many forms of socialist theory hold that human behaviour is largely shaped by the social environment. In particular, socialism holds that social mores, values, cultural traits and economic practices are social creations and not the result of an immutable natural law.[286][287] The object of their critique is thus not human avarice or human consciousness, but the material conditions and man-made social systems (i.e. the economic structure of society) that gives rise to observed social problems and inefficiencies. Bertrand Russell, often considered to be the father of analytic philosophy, identified as a socialist. Russell opposed the class struggle aspects of Marxism, viewing socialism solely as an adjustment of economic relations to accommodate modern machine production to benefit all of humanity through the progressive reduction of necessary work time.[288]

Socialists view creativity as an essential aspect of human nature and define freedom as a state of being where individuals are able to express their creativity unhindered by constraints of both material scarcity and coercive social institutions. The socialist concept of individuality is thus intertwined with the concept of individual creative expression. Karl Marx believed that expansion of the productive forces and technology was the basis for the expansion of human freedom and that socialism, being a system that is consistent with modern developments in technology, would enable the flourishing of “free individualities” through the progressive reduction of necessary labour time. The reduction of necessary labour time to a minimum would grant individuals the opportunity to pursue the development of their true individuality and creativity.

CRITICISM OF CAPITALISM

Criticism of capitalism

Socialists argue that the accumulation of capital generates waste through externalities that require costly corrective regulatory measures. They also point out that this process generates wasteful industries and practices that exist only to generate sufficient demand for products to be sold at a profit (such as high-pressure advertisement), thereby creating rather than satisfying economic demand.[291][292]

Socialists argue that capitalism consists of irrational activity, such as the purchasing of commodities only to sell at a later time when their price appreciates, rather than for consumption, even if the commodity cannot be sold at a profit to individuals in need and therefore a crucial criticism often made by socialists is that “making money”, or accumulation of capital, does not correspond to the satisfaction of demand (the production of use-values).[293] The fundamental criterion for economic activity in capitalism is the accumulation of capital for reinvestment in production, but this spurs the development of new, non-productive industries that do not produce use-value and only exist to keep the accumulation process afloat (otherwise the system goes into crisis), such as the spread of the financial industry, contributing to the formation of economic bubbles.[294]

Socialists view private property relations as limiting the potential of productive forces in the economy. According to socialists, private property becomes obsolete when it concentrates into centralised, socialised institutions based on private appropriation of revenue—but based on cooperative work and internal planning in allocation of inputs—until the role of the capitalist becomes redundant.[295] With no need for capital accumulation and a class of owners, private property in the means of production is perceived as being an outdated form of economic organisation that should be replaced by a free association of individuals based on public or common ownership of these socialised assets.[296][297] Private ownership imposes constraints on planning, leading to uncoordinated economic decisions that result in business fluctuations, unemployment and a tremendous waste of material resources during crisis of overproduction.[298]

Excessive disparities in income distribution lead to social instability and require costly corrective measures in the form of redistributive taxation, which incurs heavy administrative costs while weakening the incentive to work, inviting dishonesty and increasing the likelihood of tax evasion while (the corrective measures) reduce the overall efficiency of the market economy.[299] These corrective policies limit the incentive system of the market by providing things such as minimum wages, unemployment insurance, taxing profits and reducing the reserve army of labour, resulting in reduced incentives for capitalists to invest in more production. In essence, social welfare policies cripple capitalism and its incentive system and are thus unsustainable in the long-run.[300] Marxists argue that the establishment of a socialist mode of production is the only way to overcome these deficiencies. Socialists and specifically Marxian socialists argue that the inherent conflict of interests between the working class and capital prevent optimal use of available human resources and leads to contradictory interest groups (labour and business) striving to influence the state to intervene in the economy in their favor at the expense of overall economic efficiency.

Early socialists (utopian socialists and Ricardian socialists) criticised capitalism for concentrating power and wealth within a small segment of society.[301] In addition, they complained that capitalism does not utilise available technology and resources to their maximum potential in the interests of the public.[297]

Marxism

Main article: Marxism

At a certain stage of development, the material productive forces of society come into conflict with the existing relations of production or—this merely expresses the same thing in legal terms – with the property relations within the framework of which they have operated hitherto. Then begins an era of social revolution. The changes in the economic foundation lead sooner or later to the transformation of the whole immense superstructure.

— Karl Marx, Critique of the Gotha Program[302]

The writings of Karl Marxprovided the basis for the development of Marxistpolitical theory and Marxian economics

Karl Marx and Friedrich Engels argued that socialism would emerge from historical necessity as capitalism rendered itself obsolete and unsustainable from increasing internal contradictions emerging from the development of the productive forces and technology. It was these advances in the productive forces combined with the old social relations of production of capitalism that would generate contradictions, leading to working-class consciousness.[303]

Marx and Engels held the view that the consciousness of those who earn a wage or salary (the working class in the broadest Marxist sense) would be moulded by their conditions of wage slavery, leading to a tendency to seek their freedom or emancipation by overthrowing ownership of the means of production by capitalists and consequently, overthrowing the state that upheld this economic order. For Marx and Engels, conditions determine consciousness and ending the role of the capitalist class leads eventually to a classless society in which the state would wither away. The Marxist conception of socialism is that of a specific historical phase that would displace capitalism and precede communism. The major characteristics of socialism (particularly as conceived by Marx and Engels after the Paris Commune of 1871) are that the proletariat would control the means of production through a workers’ state erected by the workers in their interests. Economic activity would still be organised through the use of incentive systems and social classes would still exist, but to a lesser and diminishing extent than under capitalism.

For orthodox Marxists, socialism is the lower stage of communism based on the principle of “from each according to his ability, to each according to his contribution” while upper stage communism is based on the principle of “from each according to his ability, to each according to his need”, the upper stage becoming possible only after the socialist stage further develops economic efficiency and the automation of production has led to a superabundance of goods and services.[304][305] Marx argued that the material productive forces (in industry and commerce) brought into existence by capitalism predicated a cooperative society since production had become a mass social, collective activity of the working class to create commodities but with private ownership (the relations of production or property relations). This conflict between collective effort in large factories and private ownership would bring about a conscious desire in the working class to establish collective ownership commensurate with the collective efforts their daily experience.[302]

Role of the state

Socialists have taken different perspectives on the state and the role it should play in revolutionary struggles, in constructing socialism and within an established socialist economy.

In the 19th century the philosophy of state socialism was first explicitly expounded by the German political philosopher Ferdinand Lassalle. In contrast to Karl Marx’s perspective of the state, Lassalle rejected the concept of the state as a class-based power structure whose main function was to preserve existing class structures. Thus Lassalle also rejected the Marxist view that the state was destined to “wither away”. Lassalle considered the state to be an entity independent of class allegiances and an instrument of justice that would therefore be essential for achieving socialism.[306]

Preceding the Bolshevik-led revolution in Russia, many socialists including reformists, orthodox Marxist currents such as council communism, anarchists and libertarian socialists criticised the idea of using the state to conduct central planning and own the means of production as a way to establish socialism. Following the victory of Leninism in Russia, the idea of “state socialism” spread rapidly throughout the socialist movement and eventually state socialism came to be identified with the Soviet economic model.[307]

Joseph Schumpeter rejected the association of socialism (and social ownership) with state ownership over the means of production because the state as it exists in its current form is a product of capitalist society and cannot be transplanted to a different institutional framework. Schumpeter argued that there would be different institutions within socialism than those that exist within modern capitalism, just as feudalism had its own distinct and unique institutional forms. The state, along with concepts like property and taxation, were concepts exclusive to commercial society (capitalism) and attempting to place them within the context of a future socialist society would amount to a distortion of these concepts by using them out of context.[308]

Utopian versus scientific

Main articles: Utopian socialism and Scientific socialism

Utopian socialism is a term used to define the first currents of modern socialist thought as exemplified by the work of Henri de Saint-Simon, Charles Fourier and Robert Owen, which inspired Karl Marx and other early socialists.[309] However, visions of imaginary ideal societies, which competed with revolutionary social democratic movements, were viewed as not being grounded in the material conditions of society and as reactionary.[310] Although it is technically possible for any set of ideas or any person living at any time in history to be a utopian socialist, the term is most often applied to those socialists who lived in the first quarter of the 19th century who were ascribed the label “utopian” by later socialists as a negative term in order to imply naivete and dismiss their ideas as fanciful or unrealistic.[77]

Religious sects whose members live communally such as the Hutterites, for example, are not usually called “utopian socialists”, although their way of living is a prime example. They have been categorised as religious socialists by some. Likewise, modern intentional communities based on socialist ideas could also be categorised as “utopian socialist”.

For Marxists, the development of capitalism in Western Europe provided a material basis for the possibility of bringing about socialism because according to The Communist Manifesto “[w]hat the bourgeoisie produces above all is its own grave diggers”,[311] namely the working class, which must become conscious of the historical objectives set it by society.

Reform versus revolution

Main articles: Revolutionary socialism and Reformism

Revolutionary socialists believe that a social revolution is necessary to effect structural changes to the socioeconomic structure of society. Among revolutionary socialists there are differences in strategy, theory and the definition of “revolution”. Orthodox Marxists and left communists take an impossibilist stance, believing that revolution should be spontaneous as a result of contradictions in society due to technological changes in the productive forces. Lenin theorised that under capitalism the workers cannot achieve class consciousness beyond organising into unions and making demands of the capitalists. Therefore, Leninists advocate that it is historically necessary for a vanguard of class conscious revolutionaries to take a central role in coordinating the social revolution to overthrow the capitalist state and eventually the institution of the state altogether.[312] “Revolution” is not necessarily defined by revolutionary socialists as violent insurrection,[313] but as a complete dismantling and rapid transformation of all areas of class society led by the majority of the masses: the working class.

Reformism is generally associated with social democracy and gradualist democratic socialism. Reformism is the belief that socialists should stand in parliamentary elections within capitalist society and if elected utilise the machinery of government to pass political and social reforms for the purposes of ameliorating the instabilities and inequities of capitalism.

ECONOMICS

ormism is generally associated with social democracy and gradualist democratic socialism. Reformism is the belief that socialists should stand in parliamentary elections within capitalist society and if elected utilise the machinery of government to pass political and social reforms for the purposes of ameliorating the instabilities and inequities of capitalism.

Economics

Main article: Socialist economics

See also: Production for use

Socialist economics starts from the premise that “individuals do not live or work in isolation but live in cooperation with one another. Furthermore, everything that people produce is in some sense a social product, and everyone who contributes to the production of a good is entitled to a share in it. Society as a whole, therefore, should own or at least control property for the benefit of all its members”.[86]

The original conception of socialism was an economic system whereby production was organised in a way to directly produce goods and services for their utility (or use-value in classical and Marxian economics): the direct allocation of resources in terms of physical units as opposed to financial calculation and the economic laws of capitalism (see law of value), often entailing the end of capitalistic economic categories such as rent, interest, profit and money.[314] In a fully developed socialist economy, production and balancing factor inputs with outputs becomes a technical process to be undertaken by engineers.[315]

Market socialism refers to an array of different economic theories and systems that utilise the market mechanism to organise production and to allocate factor inputs among socially owned enterprises, with the economic surplus (profits) accruing to society in a social dividend as opposed to private capital owners.[316] Variations of market socialism include libertarian proposals such as mutualism, based on classical economics, and neoclassical economic models such as the Lange Model. However, some economists such as Joseph Stiglitz, Mancur Olson and others not specifically advancing anti-socialists positions have shown that prevailing economic models upon which such democratic or market socialism models might be based have logical flaws or unworkable presuppositions.[317][318]

The ownership of the means of production can be based on direct ownership by the users of the productive property through worker cooperative; or commonly owned by all of society with management and control delegated to those who operate/use the means of production; or public ownership by a state apparatus. Public ownership may refer to the creation of state-owned enterprises, nationalisation, municipalisation or autonomous collective institutions. Some socialists feel that in a socialist economy, at least the “commanding heights” of the economy must be publicly owned.[319] However, economic liberals and right libertarians view private ownership of the means of production and the market exchange as natural entities or moral rights which are central to their conceptions of freedom and liberty and view the economic dynamics of capitalism as immutable and absolute, therefore they perceive public ownership of the means of production, cooperatives and economic planning as infringements upon liberty.[320][321]

Management and control over the activities of enterprises are based on self-management and self-governance, with equal power-relations in the workplace to maximise occupational autonomy. A socialist form of organisation would eliminate controlling hierarchies so that only a hierarchy based on technical knowledge in the workplace remains. Every member would have decision-making power in the firm and would be able to participate in establishing its overall policy objectives. The policies/goals would be carried out by the technical specialists that form the coordinating hierarchy of the firm, who would establish plans or directives for the work community to accomplish these goals.[322]

The role and use of money in a hypothetical socialist economy is a contested issue. According to the Austrian schooleconomist Ludwig von Mises, an economic system that does not use money, financial calculation and market pricingwould be unable to effectively value capital goods and coordinate production and therefore these types of socialism are impossible because they lack the necessary information to perform economic calculation in the first place.[323][324]Socialists including Karl Marx, Robert Owen, Pierre-Joseph Proudhon and John Stuart Mill advocated various forms of labour vouchers or labour credits, which like money would be used to acquire articles of consumption, but unlike money they are unable to become capital and would not be used to allocate resources within the production process. Bolshevik revolutionary Leon Trotsky argued that money could not be arbitrarily abolished following a socialist revolution. Money had to exhaust its “historic mission”, meaning it would have to be used until its function became redundant, eventually being transformed into bookkeeping receipts for statisticians and only in the more distant future would money not be required for even that role.[325]

The economic anarchy of capitalist society as it exists today is, in my opinion, the real source of the evil… I am convinced there is only one way to eliminate these grave evils, namely through the establishment of a socialist economy, accompanied by an educational system which would be oriented toward social goals. In such an economy, the means of production are owned by society itself and are utilised in a planned fashion. A planned economy, which adjusts production to the needs of the community, would distribute the work to be done among all those able to work and would guarantee a livelihood to every man, woman, and child. The education of the individual, in addition to promoting his own innate abilities, would attempt to develop in him a sense of responsibility for his fellow men in place of the glorification of power and success in our present society.

— Albert Einstein, Why Socialism?, 1949[326]

Planned economy

Main article: Planned economy

A planned economy is a type of economy consisting of a mixture of public ownership of the means of production and the coordination of production and distribution through economic planning. There are two major types of planning: decentralised-planning and centralised-planning. Enrico Barone provided a comprehensive theoretical framework for a planned socialist economy. In his model, assuming perfect computation techniques, simultaneous equations relating inputs and outputs to ratios of equivalence would provide appropriate valuations in order to balance supply and demand.[327]

The most prominent example of a planned economy was the economic system of the Soviet Union and as such the centralised-planned economic model is usually associated with the communist states of the 20th century, where it was combined with a single-party political system. In a centrally planned economy, decisions regarding the quantity of goods and services to be produced are planned in advance by a planning agency (see also the analysis of Soviet-type economic planning). The economic systems of the Soviet Union and the Eastern Bloc are further classified as “command economies”, which are defined as systems where economic coordination is undertaken by commands, directives and production targets.[328] Studies by economists of various political persuasions on the actual functioning of the Soviet economy indicate that it was not actually a planned economy. Instead of conscious planning, the Soviet economy was based on a process whereby the plan was modified by localised agents and the original plans went largely unfulfilled. Planning agencies, ministries and enterprises all adapted and bargained with each other during the formulation of the plan as opposed to following a plan passed down from a higher authority, leading some economists to suggest that planning did not actually take place within the Soviet economy and that a better description would be an “administered” or “managed” economy.[329]

Although central planning was largely supported by Marxist–Leninists, some factions within the Soviet Union before the rise of Stalinism held positions contrary to central planning. Leon Trotsky rejected central planning in favour of decentralised planning. He argued that central planners, regardless of their intellectual capacity, would be unable to coordinate effectively all economic activity within an economy because they operated without the input and tacit knowledge embodied by the participation of the millions of people in the economy. As a result, central planners would be unable to respond to local economic conditions.[330] State socialism is unfeasible in this view because information cannot be aggregated by a central body and effectively used to formulate a plan for an entire economy, because doing so would result in distorted or absent price signals.[331]

Self-managed economy

See also: Decentralised planning, Economic democracy, and Workers’ self-management

A self-managed, decentralised economy is based on autonomous self-regulating economic units and a decentralised mechanism of resource allocation and decision-making. This model has found support in notable classical and neoclassical economists including Alfred Marshall, John Stuart Mill and Jaroslav Vanek. There are numerous variations of self-management, including labour-managed firms and worker-managed firms. The goals of self-management are to eliminate exploitation and reduce alienation.[332] Guild socialism is a political movement advocating workers’ control of industry through the medium of trade-related guilds “in an implied contractual relationship with the public”.[333] It originated in the United Kingdom and was at its most influential in the first quarter of the 20th century.[333] It was strongly associated with G. D. H. Cole and influenced by the ideas of William Morris.

One such system is the cooperative economy, a largely free market economy in which workers manage the firms and democratically determine remuneration levels and labour divisions. Productive resources would be legally owned by the cooperative and rented to the workers, who would enjoy usufruct rights.[334] Another form of decentralised planning is the use of cybernetics, or the use of computers to manage the allocation of economic inputs. The socialist-run government of Salvador Allende in Chile experimented with Project Cybersyn, a real-time information bridge between the government, state enterprises and consumers.[335] Another, more recent variant is participatory economics, wherein the economy is planned by decentralised councils of workers and consumers. Workers would be remunerated solely according to effort and sacrifice, so that those engaged in dangerous, uncomfortable and strenuous work would receive the highest incomes and could thereby work less.[336] A contemporary model for a self-managed, non-market socialism is Pat Devine’s model of negotiated coordination. Negotiated coordination is based upon social ownership by those affected by the use of the assets involved, with decisions made by those at the most localised level of production.[337]

Michel Bauwens identifies the emergence of the open software movement and peer-to-peer production as a new alternative mode of production to the capitalist economy and centrally planned economy that is based on collaborative self-management, common ownership of resources and the production of use-values through the free cooperation of producers who have access to distributed capital.[338]

Anarcho-communism is a theory of anarchism which advocates the abolition of the state, private property and capitalism in favour of common ownership of the means of production.[339][340] Anarcho-syndicalism was practiced in Catalonia and other places in the Spanish Revolution during the Spanish Civil War. Sam Dolgoff estimated that about eight million people participated directly or at least indirectly in the Spanish Revolution.[341]

The economy of the former Socialist Federal Republic of Yugoslavia established a system based on market-based allocation, social ownership of the means of production and self-management within firms. This system substituted Yugoslavia’s Soviet-type central planning with a decentralised, self-managed system after reforms in 1953.[342]

The Marxian economist Richard D. Wolff argues that “re-organising production so that workers become collectively self-directed at their work-sites” not only moves society beyond both capitalism and state socialism of the last century, but would also mark another milestone in human history, similar to earlier transitions out of slavery and feudalism.[343] As an example, Wolff claims that Mondragon is “a stunningly successful alternative to the capitalist organisation of production”.[344]

State-directed economy

See also: State socialism

State socialism can be used to classify any variety of socialist philosophies that advocates the ownership of the means of production by the state apparatus, either as a transitional stage between capitalism and socialism, or as an end-goal in itself. Typically it refers to a form of technocratic management, whereby technical specialists administer or manage economic enterprises on behalf of society (and the public interest) instead of workers’ councils or workplace democracy.

A state-directed economy may refer to a type of mixed economy consisting of public ownership over large industries, as promoted by various Social democratic political parties during the 20th century. This ideology influenced the policies of the British Labour Party during Clement Attlee’s administration. In the biography of the 1945 United Kingdom Labour Party Prime Minister Clement Attlee, Francis Beckett states: “[T]he government… wanted what would become known as a mixed economy”.[345]

Nationalisation in the United Kingdom was achieved through compulsory purchase of the industry (i.e. with compensation). British Aerospace was a combination of major aircraft companies British Aircraft Corporation, Hawker Siddeley and others. British Shipbuilders was a combination of the major shipbuilding companies including Cammell Laird, Govan Shipbuilders, Swan Hunter and Yarrow Shipbuilders, whereas the nationalisation of the coal mines in 1947 created a coal board charged with running the coal industry commercially so as to be able to meet the interest payable on the bonds which the former mine owners’ shares had been converted into.[346][347]

Market socialism

Main article: Market socialism

Market socialism consists of publicly owned or cooperatively owned enterprises operating in a market economy. It is a system that utilises the market and monetary prices for the allocation and accounting of the means of production, thereby retaining the process of capital accumulation. The profit generated would be used to directly remunerate employees, collectively sustain the enterprise or finance public institutions.[348] In state-oriented forms of market socialism, in which state enterprises attempt to maximise profit, the profits can be used to fund government programs and services through a social dividend, eliminating or greatly diminishing the need for various forms of taxation that exist in capitalist systems. Neoclassical economist Léon Walras believed that a socialist economy based on state ownership of land and natural resources would provide a means of public finance to make income taxes unnecessary.[349] Yugoslavia implemented a market socialist economy based on cooperatives and worker self-management.

Pierre-Joseph Proudhon, main theorist of mutualism and influential French socialist thinker

Mutualism is an economic theory and anarchist school of thought that advocates a society where each person might possess a means of production, either individually or collectively, with trade representing equivalent amounts of labour in the free market.[350]Integral to the scheme was the establishment of a mutual-credit bank that would lend to producers at a minimal interest rate, just high enough to cover administration.[351]Mutualism is based on a labour theory of value that holds that when labour or its product is sold, in exchange it ought to receive goods or services embodying “the amount of labour necessary to produce an article of exactly similar and equal utility”.

The current economic system in China is formally referred to as a socialist market economy with Chinese characteristics. It combines a large state sector that comprises the commanding heights of the economy, which are guaranteed their public ownership status by law, with a private sector mainly engaged in commodity production and light industry responsible from anywhere between 33% to over 70% of GDP generated in 2005. Although there has been a rapid expansion of private-sector activity since the 1980s, privatisation of state assets was virtually halted and were partially reversed in 2005. The current Chinese economy consists of 150 corporatised state-owned enterprises that report directly to China’s central government. By 2008, these state-owned corporations had become increasingly dynamic and generated large increases in revenue for the state, resulting in a state-sector led recovery during the 2009 financial crises while accounting for most of China’s economic growth. However, the Chinese economic model is widely cited as a contemporary form of state capitalism, the major difference between Western capitalism and the Chinese model being the degree of state-ownership of shares in publicly listed corporations.

The Socialist Republic of Vietnam has adopted a similar model after the Doi Moi economic renovation, but slightly differs from the Chinese model in that the Vietnamese government retains firm control over the state sector and strategic industries, but allows for private-sector activity in commodity production.

POLITICS

The major socialist political movements are described below. Independent socialist theorists, utopian socialist authors and academic supporters of socialism may not be represented in these movements. Some political groups have called themselves socialist while holding views that some consider antithetical to socialism. The term “socialist” has also been used by some politicians on the political right as an epithet against certain individuals who do not consider themselves to be socialists and against policies that are not considered socialist by their proponents.

There are many variations of socialism and as such there is no single definition encapsulating all of socialism. However, there have been common elements identified by scholars.[362] In his Dictionary of Socialism (1924), Angelo S. Rappoport analysed forty definitions of socialism to conclude that common elements of socialism include: general criticisms of the social effects of private ownership and control of capital—as being the cause of poverty, low wages, unemployment, economic and social inequality and a lack of economic security; a general view that the solution to these problems is a form of collective control over the means of production, distribution and exchange (the degree and means of control vary amongst socialist movements); an agreement that the outcome of this collective control should be a society based upon social justice, including social equality, economic protection of people and should provide a more satisfying life for most people.[363] In The Concepts of Socialism(1975), Bhikhu Parekh identifies four core principles of socialism and particularly socialist society: sociality, social responsibility, cooperation and planning.[364] In his study Ideologies and Political Theory (1996), Michael Freeden states that all socialists share five themes: the first is that socialism posits that society is more than a mere collection of individuals; second, that it considers human welfare a desirable objective; third, that it considers humans by nature to be active and productive; fourth, it holds the belief of human equality; and fifth, that history is progressive and will create positive change on the condition that humans work to achieve such change.[364]

Anarchism

Main article: Anarchism

Anarchism is a political philosophy that advocates stateless societies often defined as self-governed voluntary institutions,[365][366][367][368] but that several authors have defined as more specific institutions based on non-hierarchicalfree associations.[369][370][371][372] Anarchism holds the state to be undesirable, unnecessary or harmful.[373][374] While anti-statism is central, some argue[375] that anarchism entails opposing authority or hierarchical organisation in the conduct of human relations including, but not limited to, the state system.[369][376][377][378][379][380][381] Mutualists advocate market socialism, collectivist anarchists workers cooperatives and salaries based on the amount of time contributed to production, anarcho-communists advocate a direct transition from capitalism to libertarian communism and a gift economy and anarcho-syndicalists worker’s direct action and the general strike.

Democratic socialism

Main article: Democratic socialism

Modern democratic socialism is a broad political movement that seeks to promote the ideals of socialism within the context of a democratic system. Some democratic socialists support social democracy as a temporary measure to reform the current system while others reject reformism in favour of more revolutionary methods. Modern social democracy emphasises a program of gradual legislative modification of capitalism in order to make it more equitable and humane, while the theoretical end goal of building a socialist society is either completely forgotten or redefined in a pro-capitalist way. The two movements are widely similar both in terminology and in ideology, although there are a few key differences.

The major difference between social democracy and democratic socialism is the object of their politics: contemporary social democrats support a welfare state and unemployment insurance as a means to “humanise” capitalism, whereas democratic socialists seek to replace capitalism with a socialist economic system, arguing that any attempt to “humanise” capitalism through regulations and welfare policies would distort the market and create economic contradictions.[382]

Democratic socialism generally refers to any political movement that seeks to establish an economy based on economic democracy by and for the working class. Democratic socialism is difficult to define and groups of scholars have radically different definitions for the term. Some definitions simply refer to all forms of socialism that follow an electoral, reformistor evolutionary path to socialism rather than a revolutionary one.[383]

You can’t talk about ending the slums without first saying profit must be taken out of slums. You’re really tampering and getting on dangerous ground because you are messing with folk then. You are messing with captains of industry. Now this means that we are treading in difficult water, because it really means that we are saying that something is wrong with capitalism. There must be a better distribution of wealth, and maybe America must move toward a democratic socialism.

— Martin Luther King, Jr., 1966[384][385][386]

Leninism and precedents

Main articles: Blanquism and Marxism–Leninism

Blanquism refers to a conception of revolution generally attributed to Louis Auguste Blanqui which holds that socialist revolution should be carried out by a relatively small group of highly organised and secretive conspirators.[387] Having seized power, the revolutionaries would then use the power of the state to introduce socialism. It is considered a particular sort of “putschism”—that is, the view that political revolution should take the form of a putsch or coup d’état.[388] Rosa Luxemburg and Eduard Bernstein[389] have criticised Vladimir Lenin that his conception of revolution was elitist and essentially Blanquist.[390] Marxism–Leninism is a political ideology combining Marxism (the scientific socialist concepts theorised by Karl Marx and Friedrich Engels) and Leninism (Lenin’s theoretical expansions of Marxism which include anti-imperialism, democratic centralism and party-building principles).[391] Marxism–Leninism was the official ideology of the Communist Party of the Soviet Union and of the Communist International (1919–1943) and later it became the main guiding ideology for Trotskyists, Maoists and Stalinists.

Libertarian socialism

Main article: Libertarian socialism

The first anarchist journal to use the term “libertarian” was Le Libertaire, Journal du Mouvement Social and it was published in New York City between 1858 and 1861 by French anarcho-communistJoseph Déjacque,[392] the first recorded person to describe himself as “libertarian”[393]

Libertarian socialism (sometimes called social anarchism,[394][395] left-libertarianism[396][397]and socialist libertarianism)[398] is a group of anti-authoritarian[399] political philosophies inside the socialist movement that rejects socialism as centralised state ownership and control of the economy[400] including criticism of wage labour relationships within the workplace,[401] as well as the state itself.[402] It emphasises workers’ self-management of the workplace[402] and decentralised structures of political organisation,[403] asserting that a society based on freedom and equality can be achieved through abolishing authoritarian institutions that control certain means of production and subordinate the majority to an owning class or political and economic elite.[404] Libertarian socialists generally place their hopes in decentralised means of direct democracy and federal or confederal associations such as libertarian municipalism, citizens’ assemblies, trade unions, and workers’ councils.[405][406] Relatedly, anarcho-syndicalist Gaston Leval explained: “We therefore foresee a Society in which all activities will be coordinated, a structure that has, at the same time, sufficient flexibility to permit the greatest possible autonomy for social life, or for the life of each enterprise, and enough cohesiveness to prevent all disorder…In a well-organized society, all of these things must be systematically accomplished by means of parallel federations, vertically united at the highest levels, constituting one vast organism in which all economic functions will be performed in solidarity with all others and that will permanently preserve the necessary cohesion”. All of this is generally done within a general call for libertarian[407] and voluntary human relationships[408] through the identification, criticism and practical dismantling of illegitimate authority in all aspects of human life.[413] As such, libertarian socialism within the larger socialist movement seeks to distinguish itself both from Leninism/Bolshevism and from social democracy.[414]

Past and present political philosophies and movements commonly described as libertarian socialist include anarchism(especially anarchist communism, anarchist collectivism, anarcho-syndicalism[415] and mutualism)[416] as well as autonomism, Communalism, participism, revolutionary syndicalism and libertarian Marxist philosophies such as council communism and Luxemburgism;[417] as well as some versions of utopian socialism[418] and individualist anarchism.[419][420][421]

Religious socialism

Main article: Religious socialism

Christian socialism is a broad concept involving an intertwining of the Christian religion with the politics and economic theories of socialism.

Islamic socialism is a term coined by various Muslim leaders to describe a more spiritual form of socialism. Muslim socialists believe that the teachings of the Qur’an and Muhammad are compatible with principles of equality and public ownership drawing inspiration from the early Medina welfare state established by Muhammad. Muslim socialists are more conservative than their western contemporaries and find their roots in anti-imperialism, anti-colonialism and Arab nationalism. Islamic socialist leaders believe in democracy and deriving legitimacy from public mandate as opposed to religious texts.

Social democracy and liberal socialism

Main articles: Social democracy and Liberal socialism

Social democracy is a political ideology which “is derived from a socialist tradition of political thought. Many social democrats refer to themselves as socialists or democratic socialists, and some, for example Tony Blair, use or have used these terms interchangeably.[422][423][424] Others have opined that there are clear differences between the three terms, and preferred to describe their own political beliefs by using the term ‘social democracy’ only”.[425] There are two main directions, either to establish democratic socialism, or to build a welfare state within the framework of the capitalist system. The first variant has officially its goal by establishing democratic socialism through reformist and gradualistmethods.[426] In the second variant, social democracy becomes a policy regime involving a welfare state, collective bargaining schemes, support for publicly financed public services and a capitalist-based economy like a mixed economy. It is often used in this manner to refer to the social models and economic policies prominent in Western and Northern Europe during the later half of the 20th century.[427][428] It has been described by Jerry Mander as “hybrid” economics, an active collaboration of capitalist and socialist visions and while such systems are not perfect they tend to provide high standards of living.[429] Numerous studies and surveys indicate that people tend to live happier lives in social democratic societies rather than neoliberal ones.[430][431][432][433]

Eduard Bernstein

Social democrats supporting the first variant advocate for a peaceful, evolutionary transition of the economy to socialism through progressive social reform of capitalism.[434][435] It asserts that the only acceptable constitutional form of government is representative democracy under the rule of law.[436] It promotes extending democratic decision-making beyond political democracy to include economic democracy to guarantee employees and other economic stakeholders sufficient rights of co-determination.[436] It supports a mixed economy that opposes the excesses of capitalism such as inequality, poverty and oppression of various groups, while rejecting both a totally free market or a fully planned economy.[437] Common social democratic policies include advocacy of universal social rights to attain universally accessible public services such as education, health care, workers’ compensation and other services, including child care and care for the elderly.[438] Social democracy is connected with the trade union labour movement and supports collective bargaining rights for workers.[439] Most social democratic parties are affiliated with the Socialist International.[426]

Liberal socialism is a socialist political philosophy that includes liberal principles within it.[440] Liberal socialism does not have the goal of abolishing capitalism with a socialist economy,[441] instead it supports a mixed economy that includes both public and private property in capital goods.[442][443] Although liberal socialism unequivocally favors a mixed market economy, it identifies legalistic and artificial monopolies to be the fault of capitalism[444] and opposes an entirely unregulated economy.[445] It considers both liberty and equality to be compatible and mutually dependent on each other.[440] Principles that can be described as “liberal socialist” have been based upon or developed by the following philosophers: John Stuart Mill, Eduard Bernstein, John Dewey, Carlo Rosselli, Norberto Bobbio and Chantal Mouffe.[446]Other important liberal socialist figures include Guido Calogero, Piero Gobetti, Leonard Trelawny Hobhouse, John Maynard Keynes and R. H. Tawney.[445] Liberal socialism has been particularly prominent in British and Italian politics.[445]

Socialism and modern progressive social movements

Further information: Socialist feminism, Socialism and LGBT rights, Eco-socialism, Anarcha-feminism, Green anarchism, and Queer anarchism

Socialist feminist Clara Zetkinand Rosa Luxemburg in 1910

Socialist feminism is a branch of feminism that focuses upon both the public and private spheres of a woman’s life and argues that liberation can only be achieved by working to end both the economic and cultural sources of women’s oppression.[447] Marxist feminism’s foundation is laid by Friedrich Engels in his analysis of gender oppression in The Origin of the Family, Private Property, and the State (1884). August Bebel’s Woman under Socialism (1879), the “single work dealing with sexuality most widely read by rank-and-file members of the Social Democratic Party of Germany (SPD)”.[448] In the late 19th and early 20th centuries, both Clara Zetkin and Eleanor Marx were against the demonisation of men and supported a proletariatrevolution that would overcome as many male-female inequalities as possible.[449] As their movement already had the most radical demands in women’s equality, most Marxist leaders, including Clara Zetkin[450][451] and Alexandra Kollontai,[452][453] counterposed Marxism against liberal feminism rather than trying to combine them. Anarcha-feminism began with late 19th and early 20th century authors and theorists such as anarchist feminists Emma Goldman and Voltairine de Cleyre[454] In the Spanish Civil War, an anarcha-feminist group, Mujeres Libres (“Free Women”) linked to the Federación Anarquista Ibérica, organised to defend both anarchist and feminist ideas.[455] In 1972, the Chicago Women’s Liberation Union published “Socialist Feminism: A Strategy for the Women’s Movement”, which is believed to be the first to use the term “socialist feminism” in publication.[456]

Edward Carpenter, philosopher and activist who was instrumental in the foundation of the Fabian Society and the Labour Partyas well as in the early LGBTIwestern movements

Many socialists were early advocates for LGBT rights. For early socialist Charles Fourier, true freedom could only occur without suppressing passions, as the suppression of passions is not only destructive to the individual, but to society as a whole. Writing before the advent of the term “homosexuality”, Fourier recognised that both men and women have a wide range of sexual needs and preferences which may change throughout their lives, including same-sex sexuality and androgénité. He argued that all sexual expressions should be enjoyed as long as people are not abused and that “affirming one’s difference” can actually enhance social integration.[457] In Oscar Wilde’s The Soul of Man Under Socialism, he passionately advocates for an egalitarian society where wealth is shared by all, while warning of the dangers of social systems that crush individuality. Wilde’s libertarian socialist politics were shared by other figures who actively campaigned for homosexual emancipation in the late 19th century such as Edward Carpenter.[458] The Intermediate Sex: A Study of Some Transitional Types of Men and Women was a book from 1908 and an early work arguing for gay liberation written by Edward Carpenter[459] who was also an influential personality in the foundation of the Fabian Societyand the Labour Party. After the Russian Revolution under the leadership of Vladimir Lenin and Leon Trotsky, the Soviet Union abolished previous laws against homosexuality.[460] Harry Haywas an early leader in the American LGBT rights movement as well as a member of the Communist Party USA. He is known for his roles in helping to found several gay organisations, including the Mattachine Society, the first sustained gay rights group in the United States which in its early days had a strong marxist influence. The Encyclopedia of Homosexualityreports that “[a]s Marxists the founders of the group believed that the injustice and oppression which they suffered stemmed from relationships deeply embedded in the structure of American society”.[461] Also emerging from a number of events, such as the May 1968 insurrection in France, the anti-Vietnam war movement in the United States and the Stonewall riots of 1969, militant gay liberation organisations began to spring up around the world. Many saw their roots in left radicalism more than in the established homophile groups of the time,[462] though the Gay Liberation Front took an anti-capitalist stance and attacked the nuclear family and traditional gender roles.[463]

Eco-socialism, green socialism or socialist ecology is a political position merging aspects of Marxism, socialism and/or libertarian socialism with that of green politics, ecology and alter-globalisation. Eco-socialists generally believe that the expansion of the capitalist system is the cause of social exclusion, poverty, war and environmental degradation through globalisation and imperialism, under the supervision of repressive states and transnational structures.[464] Contrary to the depiction of Karl Marx by some environmentalists,[465] social ecologists[466] and fellow socialists[467] as a productivist who favoured the domination of nature, eco-socialists have revisited Marx’s writings and believe that he “was a main originator of the ecological world-view”.[468] Eco-socialist authors, like John Bellamy Foster[469] and Paul Burkett,[470] point to Marx’s discussion of a “metabolic rift” between man and nature, his statement that “private ownership of the globe by single individuals will appear quite absurd as private ownership of one man by another” and his observation that a society must “hand it [the planet] down to succeeding generations in an improved condition”.[471] The English socialist William Morris is largely credited with developing key principles of what was later called eco-socialism.[472] During the 1880s and 1890s, Morris promoted his eco-socialist ideas within the Social Democratic Federation and Socialist League.[473] Green anarchism, or ecoanarchism, is a school of thought within anarchism which puts a particular emphasis on environmental issues. An important early influence was the thought of the American anarchist Henry David Thoreau and his book Walden[474] and Élisée Reclus.[475][476]

In the late 19th century, there emerged anarcho-naturism as the fusion of anarchism and naturist philosophies within individualist anarchist circles in France, Spain, Cuba[477] and Portugal.[478] Social ecology is closely related to the work and ideas of Murray Bookchin and influenced by anarchist Peter Kropotkin. Bookchin’s first book, Our Synthetic Environment,was published under the pseudonym Lewis Herber in 1962, a few months before Rachel Carson’s Silent Spring.[479] His groundbreaking essay “Ecology and Revolutionary Thought” introduced ecology as a concept in radical politics.[480] In the 1970s, Barry Commoner, suggesting a left-wing response to the Limits to Growth model that predicted catastrophic resource depletion and spurred environmentalism, postulated that capitalist technologies were chiefly responsible for environmental degradation as opposed to population pressures.[481] The 1990s saw the socialist feminists Mary Mellor[482]and Ariel Salleh[483] address environmental issues within an eco-socialist paradigm. With the rising profile of the anti-globalisation movement in the Global South, an “environmentalism of the poor” combining ecological awareness and social justice has also become prominent.[484] In 1994, David Pepper also released his important work, Ecosocialism: From Deep Ecology to Social Justice, which critiques the current approach of many within green politics, particularly deep ecologists.[485] Currently, many green parties around the world, such as the Dutch Green Left Party (GroenLinks), contain strong eco-socialist elements. Radical red-green alliances have been formed in many countries by eco-socialists, radical greens and other radical left groups. In Denmark, the Red-Green Alliance was formed as a coalition of numerous radical parties. Within the European Parliament, a number of far-left parties from Northern Europe have organised themselves into the Nordic Green Left Alliance.

SYNDICALISM

trong eco-socialist elements. Radical red-green alliances have been formed in many countries by eco-socialists, radical greens and other radical left groups. In Denmark, the Red-Green Alliance was formed as a coalition of numerous radical parties. Within the European Parliament, a number of far-left parties from Northern Europe have organised themselves into the Nordic Green Left Alliance.

Syndicalism

Main article: Syndicalism

Syndicalism is a social movement that operates through industrial trade unions and rejects state socialism and the use of establishment politics to establish or promote socialism. They reject using state power to construct a socialist society, favouring strategies such as the general strike. Syndicalists advocate a socialist economy based on federated unions or syndicates of workers who own and manage the means of production. Some Marxist currents advocate syndicalism, such as DeLeonism. Anarcho-syndicalism is a theory of anarchism which views syndicalism as a method for workers in capitalist society to gain control of an economy and with that control influence broader society. The Spanish Revolutionlargely orchestrated by the anarcho-syndicalist trade union CNT during the Spanish Civil War offers an historical example.[486] The International Workers’ Association is an international federation of anarcho-syndicalist labour unions and initiatives.

Criticism

Main article: Criticism of socialism

See also

Book: Socialism

List of anti-capitalist and communist parties with national parliamentary representation

List of communist ideologies

List of socialist countries

List of socialist economists

List of socialist songs

Socialism by country

.

..ARISTOCRACY/NOBILITY/MONARCHS..

ARISTOCRACY/NOBILITY/MONARCHS/

Aristocracy (Greek ἀριστοκρατία aristokratía, from ἄριστος aristos “excellent”, and κράτος, kratos ‘rule’) is a form of government that places strength in the hands of a small, privileged ruling class. The term derives from the Greek aristokratia, meaning “rule of the best-born”. Aristocracy is a type of government, the term is synonymous with hereditary government, and hereditary succession is its primary philosophy, after which the hereditary monarch appoints officers as they see fit. At the time of the word’s origins in ancient Greece, the Greeks conceived it as rule by the best qualified citizens—and often contrasted it favourably with monarchy, rule by an individual. In later times, Aristocracy was usually seen as rule by a privileged group, the aristocratic class, and has since been contrasted with democracy. The idea of hybrid forms which have aspects of both aristocracy and democracy are in use in the parliament form.

CONCEPT

The concept evolved in Ancient Greece, whereby a council of leading citizens was commonly empowered and contrasted with representative democracy, in which a council of citizens was appointed as the “senate” of a city state or other political unit. The Greeks did not like the concept of monarchy, and as their democratic system fell, aristocracy was upheld.[1] In the 1651 book Leviathan, Thomas Hobbes describes an aristocracy as a commonwealth in which the representative of the citizens is an assembly by part only. It is a system in which only a small part of the population represents the government; “certain men distinguished from the rest”.[3] Modern depictions of aristocracy tend to regard it not as the ancient Greek concept of rule by the best, but more as an oligarchy or plutocracy—rule by the few or the wealthy.[citation needed]

The concept of aristocracy per Plato, has an ideal state ruled by the philosopher king. Plato describes these “philosopher kings” as “those who love the sight of truth” (Republic 475c) and supports the idea with the analogy of a captain and his ship or a doctor and his medicine. According to him, sailing and health are not things that everyone is qualified to practice by nature. A large part of the Republic then addresses how the educational system should be set up to produce these philosopher kings.

 

SEE ALSO:

• Caliphate
• Elitism
• Gentry
• Nobility
• Old money
• Timocracy
• Tyranny

REFERENCES:

“Aristocracy”. Oxford English Dictionary. December 1989. Archived from the original on June 29, 2011. Retrieved December 22, 2009.
A Greek–English Lexicon, Henry George Liddell, Robert Scott, Henry Stuart Jones, Roderick McKenzie (editors). “ἀριστο-κρᾰτία, ἡ, A, rule of the best-born, aristocracy, ἀ. σώφρων Th.3.82, cf. Henioch.5.17, Isyll.1, etc.; rule of the rich, Pl.Plt.301a. II ideal constitution, rule of the best, Arist. Pol.1293b1 sqq., EN1160a33, Pl.Mx.238c, 238d, Plb.6.4.3.”

http://logeion.uchicago.edu/%E1%BC%80%CF%81%CE%B9%CF%83%CF%84%CE%BF%CE%BA%CF%81%CE%B1%CF%84%CE%AF%CE%B1

Thomas Hobbes (1 January 2010). Leviathan. Digireads.com Publishing. p. 81. ISBN 978-1-4209-3699-5.
FURTHER READING

Wikiquote has quotations related to: Aristocracy
History, John Cannon (Editor), Oxford University Press, 1997, ISBN 978-0-19-866176-4
Aristocracy in the Modern World, Ellis Wasson, Palgrave Macmillan, 2006.

MONARCHY

A Monarchy is a form of government in which a single person holds supreme authority in ruling a country, also performing ceremonial duties and embodying the country’s national identity. Although some monarchs are elected, in most cases, the monarch’s position is inherited and lasts until death or abdication. In these cases, the royal family or members of the dynasty usually serve in official capacities as well. The governing power of the Monarch may vary from purely symbolic (crowned republic), to partial and restricted (constitutional monarchy), to completely autocratic (Absolute Monarchy).

Richard I of England being anointed during his coronation in Westminster Abbey, from a 13th-century chronicle.
Monarchy was the most common form of government until the 20th century. Forty-five sovereign nations in the world have monarchs acting as heads of state, sixteen of which are Commonwealth realms that recognise Queen Elizabeth II as their head of state. Most modern monarchs are constitutional monarchs, who retain a unique legal and ceremonial role, but exercise limited or no political power under the nation’s constitution. In some nations, however, such as Brunei, Morocco, Oman, Qatar, Saudi Arabia, and Eswatini, the Hereditary Monarch has more political influence than any other single source of authority in the nation, either by tradition or by a constitutional mandate.
NOBILITY

Nobility is a social class normally ranked immediately under royalty and found in some societies that have a formal aristocracy. Nobility possesses more acknowledged privileges and higher social status than most other classes in society. The privileges associated with nobility may constitute substantial advantages over or relative to non-nobles, or may be largely honorary (e.g., precedence), and vary by country and era. As referred to in the Medieval chivalric motto “noblesse oblige” (“nobility obliges”), nobles can also carry a lifelong duty to uphold various social responsibilities, such as honorable behavior, customary service,[clarification needed] or leadership positions. Membership in the nobility, including rights and responsibilities, is typically hereditary.

Membership in the nobility has historically been granted by a monarch or government, unlike other social classes where membership is determined by solely wealth, lifestyle, or affiliation. Nonetheless, acquisition of sufficient power, wealth, military prowess, or royal favour has occasionally enabled commoners to ascend into the nobility.

There are often a variety of ranks within the noble class. Legal recognition of nobility has been more common in monarchies, but nobility also existed in such regimes as the Dutch Republic (1581–1795), the Republic of Genoa (1005–1815), the Republic of Venice (697–1797), and the Old Swiss Confederacy (1300–1798), and remains part of the legal social structure of some non-hereditary regimes, e.g., Channel Islands, San Marino, and the Vatican City in Europe.

Hereditary titles and styles added to names (such as “Prince” or “Lord” or “Lady”), as well as honorifics often distinguish nobles from non-nobles in conversation and written speech. In many nations most of the nobility have been un-titled, and some hereditary titles do not indicate nobility (e.g., vidame). Some countries have had non-hereditary nobility, such as the Empire of Brazil or life peers in the United Kingdom.

The term derives from Latin nobilitas, the abstract noun of the adjective nobilis (“well-known, famous, notable”). In ancient Roman society, nobiles originated as an informal designation for the political governing class who had allied interests, including both patricians and plebeian families (gentes) with an ancestor who had risen to the consulship through his own merit (see novus homo, “new man”).

In modern usage, “nobility” is applied to the highest social class in pre-modern societies, excepting the ruling dynasty.
In the feudal system (in Europe and elsewhere), the nobility were generally those who held a fief, often land or office, under vassalage, i.e., in exchange for allegiance and various, mainly military, services to a suzerain, who might be a higher-ranking nobleman or a monarch. It rapidly came to be seen as a hereditary caste, sometimes associated with a right to bear a hereditary title and, for example in pre-revolutionary France, enjoying fiscal and other privileges.

While noble status formerly conferred significant privileges in most jurisdictions, by the 21st century it had become a largely honorary dignity in most societies, although a few, residual privileges may still be preserved legally (e.g., Netherlands, Spain, UK) and some Asian, Pacific and African cultures continue to attach considerable significance to formal hereditary rank or titles. (Compare the entrenched position and leadership expectations of the nobility of the Kingdom of Tonga.)

Nobility is a historical, social and often legal notion, differing from high socio-economic status in that the latter is mainly based on income, possessions or lifestyle. Being wealthy or influential cannot ipso facto make one noble, nor are all nobles wealthy or influential (aristocratic families have lost their fortunes in various ways, and the concept of the ‘poor nobleman’ is almost as old as nobility itself).

Various republics, including former Iron Curtain countries, Greece, Mexico, and Austria have expressly abolished the conferral and use of titles of nobility for their citizens. This is distinct from countries which have not abolished the right to inherit titles, but which do not grant legal recognition or protection to them, such as Germany and Italy, although Germany recognizes their use as part of the legal surname. Still other countries and authorities allow their use, but forbid attachment of any privilege thereto, e.g., Finland, Norway and the European Union, while French law also protects lawful titles against usurpation.

Although many societies have a privileged upper class with substantial wealth and power, the status is not necessarily hereditary and does not entail a distinct legal status, nor differentiated forms of address.
Not all of the benefits of nobility derived from noble status per se. Usually privileges were granted or recognised by the monarch in association with possession of a specific title, office or estate. Most nobles’ wealth derived from one or more estates, large or small, that might include fields, pasture, orchards, timberland, hunting grounds, streams, etc.
It also included infrastructure such as castle, well and mill to which local peasants were allowed some access, although often at a price. Nobles were expected to live “nobly”, that is, from the proceeds of these possessions. Work involving manual labour or subordination to those of lower rank (with specific exceptions, such as in military or ecclesiastic service) was either forbidden (as derogation from noble status) or frowned upon socially. On the other hand, membership in the nobility was usually a prerequisite for holding offices of trust in the realm and for career promotion, especially in the military, at court and often the higher functions in the government, judiciary and church.

Prior to the French Revolution, European nobles typically commanded tribute in the form of entitlement to cash rents or usage taxes, labour or a portion of the annual crop yield from commoners or nobles of lower rank who lived or worked on the noble’s manor or within his seigneurial domain. In some countries, the local lord could impose restrictions on such a commoner’s movements, religion or legal undertakings. Nobles exclusively enjoyed the privilege of hunting. In France, nobles were exempt from paying the taille, the major direct tax. Peasants were not only bound to the nobility by dues and services, but the exercise of their rights was often also subject to the jurisdiction of courts and police from whose authority the actions of nobles were entirely or partially exempt. In some parts of Europe the right of private war long remained the privilege of every noble.

During the early Renaissance, duelling established the status of a respectable gentleman, and was an accepted manner of resolving disputes.

Since the end of World War I the hereditary nobility entitled to special rights has largely been abolished in the Western World as intrinsically discriminatory, and discredited as inferior in efficiency to individual meritocracy in the allocation of societal resources. Nobility came to be associated with social rather than legal privilege, expressed in a general expectation of deference from those of lower rank. By the 21st century even that deference had become increasingly minimised.

ENNOBLEMENT

(Hungarian hussar troops set up by the Hungarian nobility, during the Austro–Turkish War of 1787–1791).

In France, a seigneurie (lordship) might include one or more manors surrounded by land and villages subject to a noble’s prerogatives and disposition. Seigneuries could be bought, sold or mortgaged. If erected by the crown into, e.g., a barony or countship, it became legally entailed for a specific family, which could use it as their title. Yet most French nobles were untitled (“seigneur of Montagne” simply meant ownership of that lordship but not, if one was not otherwise noble, the right to use a title of nobility, as commoners often purchased lordships). Only a member of the nobility who owned a countship was allowed, ipso facto, to style himself as its comte, although this restriction came to be increasingly ignored as the ancien régime drew to its close.

In other parts of Europe, sovereign rulers arrogated to themselves the exclusive prerogative to act as fons honorum within their realms. For example, in the United Kingdom royal letters patent are necessary to obtain a title of the peerage, which also carries nobility and formerly a seat in the House of Lords, but never came without automatic entail of land nor rights to the local peasants’ output.
RANK WITHIN THE NOBILITY

Nobility might be either inherited or conferred by a fons honorum. It is usually an acknowledged preeminence that is hereditary, i.e. the status descends exclusively to some or all of the legitimate, and usually male-line, descendants of a nobleman. In this respect, the nobility as a class has always been much more extensive than the primogeniture-based titled nobility, which included peerages in France and in the United Kingdom, grandezas in Portugal and Spain, and some noble titles in Belgium, Italy, the Netherlands, Prussia and Scandinavia. In Russia, Scandinavia and non-Prussian Germany, titles usually descended to all male-line descendants of the original titleholder, including females. In Spain, noble titles are now equally heritable by females and males. Noble estates, on the other hand, gradually came to descend by primogeniture in much of western Europe aside from Germany. In Eastern Europe, by contrast, with the exception of a few Hungarian estates, they usually descended to all sons or even all children[8]

In France, some wealthy bourgeois, most particularly the members of the various parlements, were ennobled by the king, constituting the noblesse de robe. The old nobility of landed or knightly origin, the noblesse d’épée, increasingly resented the influence and pretensions of this parvenu nobility. In the last years of the ancien régime the old nobility pushed for restrictions of certain offices and orders of chivalry to noblemen who could demonstrate that their lineage had extended “quarterings”, i.e. several generations of noble ancestry, to be eligible for offices and favors at court along with nobles of medieval descent, although historians such as William Doyle have disputed this so-called “Aristocratic Reaction”.[9] Various court and military positions were reserved by tradition for nobles who could “prove” an ancestry of at least seize quartiers (16 quarterings), indicating exclusively noble descent (as displayed, ideally, in the family’s coat of arms) extending back five generations (all 16 great-great grandparents).
Hungarian count Nicholaus Eszterházy of Galántha (1583–1645)

This illustrates the traditional link in many countries between heraldry and nobility; in those countries where heraldry is used, nobles have almost always been armigerous, and have used heraldry to demonstrate their ancestry and family history. However, heraldry has never been restricted to the noble classes in most countries, and being armigerous does not necessarily demonstrate nobility. Scotland, however, is an exception. In a number of recent cases in Scotland the Lord Lyon King of Arms has controversially (vis-à-vis Scotland’s Salic law) granted the arms and allocated the chiefships of medieval noble families to female-line descendants of lords, even when they were not of noble lineage in the male line, while persons of legitimate male-line descent may still survive (e.g. the modern Chiefs of Clan MacLeod).

In some nations, hereditary titles, as distinct from noble rank, were not always recognised in law, e.g., Poland’s Szlachta. European ranks of nobility lower than baron or its equivalent, are commonly referred to as the petty nobility, although baronets of the British Isles are deemed titled gentry. Most nations traditionally had an untitled lower nobility in addition to titled nobles. An example is the landed gentry of the British Isles. Unlike England’s gentry, the Junkers of Germany, the noblesse de robe of France, the hidalgos of Spain and the nobili of Italy were explicitly acknowledged by the monarchs of those countries as members of the nobility, although untitled. In Scandinavia, the Benelux nations and Spain there are still untitled as well as titled families recognised in law as noble.

In Hungary members of the nobility always theoretically enjoyed the same rights. In practice, however, a noble family’s financial assets largely defined its significance. Medieval Hungary’s concept of nobility originated in the notion that nobles were “free men”, eligible to own land. This basic standard explains why the noble population was relatively large, although the economic status of its members varied widely. Untitled nobles were not infrequently wealthier than titled families, while considerable differences in wealth were also to be found within the titled nobility. The custom of granting titles was introduced to Hungary in the 16th century by the House of Habsburg. Historically, once nobility was granted, if a nobleman served the monarch well he might obtain the title of baron, and might later be elevated to the rank of count. As in other countries of post-medieval central Europe, hereditary titles were not attached to a particular land or estate but to the noble family itself, so that all patrilineal descendants shared a title of baron or count (cf. peerage). Neither nobility nor titles could be transmitted through women.

Some con artists sell fake titles of nobility, often with impressive-looking documentation. This may be illegal, depending on local law. They are more often illegal in countries that actually have nobilities, such as European monarchies. In the United States, such commerce may constitute actionable fraud rather than criminal usurpation of an exclusive right to use of any given title by an established class.
OTHER TERMS

“Aristocrat” and aristocracy, in modern usage, refer colloquially and broadly to persons who inherit elevated social status, whether due to membership in the (formerly) official nobility or the monied upper class.

Blue blood is an English idiom recorded since 1834 for noble birth or descent; it is also known as a translation of the Spanish phrase sangre azul, which described the Spanish royal family and other high nobility who claimed to be of Visigothic descent, in contrast to the Moors. The idiom originates from ancient and medieval societies of Europe and distinguishes an upper class (whose superficial veins appeared blue through their untanned skin) from a working class of the time. The latter consisted mainly of agricultural peasants who spent most of their time working outdoors and thus had tanned skin, through which superficial veins appear less prominently.
Robert Lacey explains the genesis of the blue blood concept:

It was the Spaniards who gave the world the notion that an aristocrat’s blood is not red but blue. The Spanish nobility started taking shape around the ninth century in classic military fashion, occupying land as warriors on horseback. They were to continue the process for more than five hundred years, clawing back sections of the peninsula from its Moorish occupiers, and a nobleman demonstrated his pedigree by holding up his sword arm to display the filigree of blue-blooded veins beneath his pale skin—proof that his birth had not been contaminated by the dark-skinned enemy.
EUROPE

European nobility originated in the feudal/seignorial system that arose in Europe during the Middle Ages.[17][18] Originally, knights or nobles were mounted warriors who swore allegiance to their sovereign and promised to fight for him in exchange for an allocation of land (usually together with serfs living thereon). During the period known as the Military Revolution, nobles gradually lost their role in raising and commanding private armies, as many nations created cohesive national armies.
The Battle of Tewkesbury in 1471. Large numbers of English nobility perished in the Wars of the Roses
This was coupled with a loss of the socio-economic power of the nobility, owing to the economic changes of the Renaissance and the growing economic importance of the merchant classes, which increased still further during the Industrial Revolution. In countries where the nobility was the dominant class, the bourgeoisie gradually grew in power; a rich city merchant came to be more influential than a nobleman, and the latter sometimes sought inter-marriage with families of the former to maintain their noble lifestyles.

However, in many countries at this time, the nobility retained substantial political importance and social influence: for instance, the United Kingdom’s government was dominated by the (unusually small) nobility until the middle of the 19th century. Thereafter the powers of the nobility were progressively reduced by legislation. However, until 1999, all hereditary peers were entitled to sit and vote in the House of Lords. Since then, only 92 of them have this entitlement, of whom 90 are elected by the hereditary peers as a whole to represent the peerage.

The countries with the highest proportion of nobles were Castile (probably 10%)[citation needed], Polish–Lithuanian Commonwealth (15% of an 18th-century population of 800,000)[citation needed], Spain (722,000 in 1768 which was 7–8% of the entire population)[citation needed] and other countries with lower percentages, such as Russia in 1760 with 500,000–600,000 nobles (2–3% of the entire population), and pre-revolutionary France where there were no more than 300,000 prior to 1789[citation needed], which was 1% of the population (although some scholars believe this figure is an overestimate). In 1718 Sweden had between 10,000 and 15,000 nobles, which was 0.5% of the population[citation needed]. In Germany 0.01%.[citation needed]

In the Kingdom of Hungary nobles made up 5% of the population.[19] All the nobles in 18th-century Europe numbered perhaps 3–4 million out of a total of 170–190 million inhabitants.[20][21] By contrast, in 1707, when England and Scotland united into Great Britain, there were only 168 English peers, and 154 Scottish ones, though their immediate families were recognised as noble.[22]

Apart from the hierarchy of noble titles, in England rising through baron, viscount, earl, and marquess to duke, many countries had categories at the top or bottom of the nobility. The gentry, relatively small landowners with perhaps one or two villages, were mostly noble in most countries, for example the Polish landed gentry, but not in others, such as the English equivalent. At the top, Poland had a far smaller class of “magnates”, who were hugely rich and politically powerful. In other countries the small groups of Spanish Grandee or Peer of France had great prestige but little additional power.
ASIA

In the Indian Subcontinent during the British Raj, many members of the nobility were elevated to royalty as they became the monarch of their princely states and vice versa as many princely state rulers were reduced to zamindars. Hence, many nobles in the subcontinent had royal titles of Raja, Rai, Rana, Rao, etc. Other noble and aristocratic titles were Thakur, Sardar, Dewan, Pradhan, etc.

For the historical hierarchy of the Indian subcontinent, see princely state.
CHINA

In East Asia the system was often modelled on imperial China, the leading culture. Emperors conferred titles of nobility. Imperial descendants formed the highest class of ancient Chinese nobility, their status based upon the rank of the empress or concubine from which they descend maternally (as emperors were polygamous). Numerous titles such as Taizi (crown prince), and equivalents of “prince” were accorded, and due to complexities in dynastic rules, rules were introduced for Imperial descendants. The titles of the junior princes were gradually lowered in rank by each generation while the senior heir continued to inherit their father’s titles.

It was a custom in China for the new dynasty to ennoble and enfeoff a member of the dynasty which they overthrew with a title of nobility and a fief of land so that they could offer sacrifices to their ancestors, in addition to members of other preceding dynasties.

China had a feudal system in the Shang and Zhou dynasties, which gradually gave way to a more bureaucratic one beginning in the Qin dynasty (221 BC). This continued through the Song dynasty, and by its peak power shifted from nobility to bureaucrats.

This development was gradual and generally only completed in full by the Song dynasty. In the Han dynasty, for example, even though noble titles were no longer given to those other than the Emperor’s relatives, the fact that the process of selecting officials was mostly based on a vouching system by current officials as officials usually vouched for their own sons or those of other officials meant that a de facto aristocracy continued to exist. This process was further deepened during the Three Kingdoms period with the introduction of the Nine-rank system.

By the Sui dynasty, however, the institution of the Imperial examination system marked the transformation of a power shift towards a full bureaucracy, though the process would not be truly completed until the Song dynasty.

Titles of nobility became symbolic along with a stipend while governance of the country shifted to scholar officials.

In the Qing dynasty titles of nobility were still granted by the emperor, but served merely as honorifics based on a loose system of favors to the Qing emperor.

Under a centralized system, the empire’s governance was the responsibility of the Confucian-educated scholar-officials and the local gentry, while the literati were accorded gentry status. For male citizens, advancement in status was possible via garnering the top three positions in imperial examinations.

(The Qing appointed the Ming imperial descendants to the title of Marquis of Extended Grace).

The oldest held continuous noble title in Chinese history was that held by the descendants of Confucius, as Duke Yansheng, which was renamed as the Sacrificial Official to Confucius in 1935 by the Republic of China. The title is held by Kung Tsui-chang. There is also a “Sacrificial Official to Mencius” for a descendant of Mencius, a “Sacrificial Official to Zengzi” for a descendant of Zengzi, and a “Sacrificial Official to Yan Hui” for a descendant of Yan Hui.

The bestowal of titles was abolished upon the establishment of the People’s Republic of China in 1949, as part of a larger effort to remove feudal influences and practises from Chinese society.
ISLAMIC WORLD

In some Islamic countries, there are no definite noble titles (titles of hereditary rulers being distinct from those of hereditary intermediaries between monarchs and commoners). Persons who can trace legitimate descent from Muhammad or the clans of Quraysh, as can members of several present or formerly reigning dynasties, are widely regarded as belonging to the ancient, hereditary Islamic nobility. In some Islamic countries they inherit (through mother or father) hereditary titles, although without any other associated privilege, e.g., variations of the title Sayyid and Sharif. Regarded as more religious than the general population, many people turn to them for clarification or guidance in religious matters.

In Iran, historical titles of the nobility including Mirza, Khan, ed-Dowleh and Shahzada (“Son of a Shah), are now no longer recognised. An aristocratic family is now recognised by their family name, often derived from the post held by their ancestors, considering the fact that family names in Iran only appeared in the beginning of the 20th century. Sultans have been an integral part of Islamic history.

During the Ottoman Empire in the Imperial Court and the provinces there were many Ottoman titles and appellations forming a somewhat unusual and complex system in comparison with the other Islamic countries. The bestowal of noble and aristocratic titles was widespread across the empire even after its fall by independent monarchs. One of the most elaborate examples is that of the Egyptian aristocracy’s largest clan, the Abaza family.
JAPAN

Japanese samurai, 1798
Medieval Japan developed a feudal system similar to the European system, where land was held in exchange for military service. The daimyō class, or hereditary landowning nobles, held great socio-political power. As in Europe, they commanded private armies made up of samurai, an elite warrior class; for long periods, these held the real power without a real central government, and often plunged the country into a state of civil war. The daimyō class can be compared to European peers, and the samurai to European knights, but important differences exist.

Feudal title and rank were abolished during the Meiji Restoration in 1868, and was replaced by the kazoku, a five-rank peerage system after the British example, which granted seats in the upper house of the Imperial Diet; this ended in 1947 following Japan’s defeat in World War II.
PHILIPPINES

(Left to right: Images from the Boxer Codex illustrating ancient Filipino nobility wearing the distinctive colours of their social status: a Visayan noble couple; a Visayan royal couple dressed in colours distinctive of their class (gold or imperial yellow, red and blue), which are also used by royalty in Asia; a native princess; and a Tagalog royal and his consort.)

Like other Southeast Asian countries, many regions in the Philippines have indigenous nobility, partially influenced by Hindu, Chinese, and Islamic custom. Since ancient times, Datu was the common title of a chief or monarch of the many pre-colonial principalities and sovereign dominions throughout the isles; in some areas the term Apo was also used. With the titles Sultan and Rajah, Datu (and its Malay cognate, Datok) are currently used in some parts of the Philippines, Indonesia, Malaysia and Brunei. These titles are the rough equivalents of European titles, albeit dependent on the actual wealth and prestige of the bearer.
RECOGNITION BY THE SPANISH CROWN

Upon the islands’ Christianisation, the datus retained governance of their territories despite annexation to the Spanish Empire. In a law signed 11 June 1594, King Philip II of Spain ordered that the indigenous rulers continue to receive the same honours and privileges accorded them prior their conversion to Catholicism. The baptised nobility subsequently coalesced into the exclusive, landed ruling class of the lowlands known as the Principalía.

On 22 March 1697, King Charles II of Spain confirmed the privileges granted by his predecessors (in Title VII, Book VI of the Laws of the Indies) to indigenous nobilities of the Crown colonies, including the Principales of the Philippines, and extended to them and to their descendants the preeminence and honors customarily attributed to the Hidalgos of Castile.
FILIPINO NOBLES DURING THE SPANISH ERA

The Laws of the Indies and other pertinent Royal Decrees were enforced in the Philippines and benefited many indigenous nobles. It can be seen very clearly and irrefutably that, during the colonial period, indigenous chiefs were equated with the Spanish Hidalgos, and the most resounding proof of the application of this comparison is the General Military Archive in Segovia, where the qualifications of “Nobility” (found in the Service Records) are attributed to those Filipinos who were admitted to the Spanish Military Academies and whose ancestors were caciques, encomenderos, notable Tagalogs, chieftains, governors or those who held positions in the municipal administration or government in all different regions of the large islands of the Archipelago, or of the many small islands of which it is composed. In the context of the ancient tradition and norms of Castilian nobility, all descendants of a noble are considered noble, regardless of fortune.

Current status questionis
Edit

Heraldic Crown of Hispanic Hidalgos.

A pre-colonial Tagalog couple belonging to the Datu class or nobility as depicted in the Boxer Codex of the 16th century.
The recognition of the rights and privileges accorded to the Filipino Principalía as Hijosdalgos of Castile seems to facilitate entrance of Filipino nobles into institutions of under the Spanish Crown, either civil or religious, which required proofs of nobility.[35](p235) However, to see such recognition as an approximation or comparative estimation of rank or status might not be correct since in reality, although the principales were vassals of the Crown, their rights as sovereign in their former dominions were guaranteed by the Laws of the Indies, more particularly the Royal Decree of Philip II of 11 June 1594, which Charles II confirmed for the purpose stated above in order to satisfy the requirements of the existing laws in the Peninsula.

It must be recalled that ever since the beginning of the colonialization, the conquistador Miguel López de Legazpi did not strip the ancient sovereign rulers of the Archipelago (who vowed allegiance to the Spanish Crown) of their legitimate rights. Many of them accepted the Catholic religion and were his allies from the very beginning. He only demanded from these local rulers vassalage to the Spanish Crown,[36] replacing the similar overlordship, which previously existed in a few cases, e.g., Sultanate of Brunei’s overlordship of the Kingdom of Maynila. Other independent polities which were not vassals to other States, e.g., Confederation of Madja-as and the Rajahnate of Cebu, were more of Protectorates/Suzerainties having had alliances with the Spanish Crown before the Kingdom took total control of most parts of the Archipelago. An interesting question remains after the cessession of the Spanish rule in the Philippines, that is, what is the equivalent of the rank of the Filipino Principalía, freed from vassalage yet not able to exercise their sovereignty within the democratic society in the Archipelago?

One logical conclusion would be the reassumption of their ancestral Royal and noble title as Datus while retaining the Hidalguía of Castile (their former protector State), as a subsidiary title, appears most suitable to the hispanized Filipino nobles. Besides, as stated in the above-mentioned Royal Decree of Charles II, the ancient nobility of the Filipino Principales “is still retained and acknowledged”.

Just like the deposed royal families elsewhere in the world, which still lay claim to their hereditary rights as pretenders to the former thrones of their ancestors, the descendants of the Principalía have the same de iure claims to the historical domains of their forebears.

(See also: Lakan of the island of Luzon).
AFRICA

Africa has a plethora of ancient lineages in its various constituent nations. Some, such as the numerous sharifian families of North Africa, the Keita dynasty of Mali, the Solomonic dynasty of Ethiopia, the De Souza family of Benin and the Sherbro Tucker clan of Sierra Leone, claim descent from notables from outside of the continent. Most, such as those composed of the descendants of Shaka and Moshoeshoe of Southern Africa, belong to peoples that have been resident in the continent for millennia. Generally their royal or noble status is recognized by and derived from the authority of traditional custom. A number of them also enjoy either a constitutional or a statutory recognition of their high social positions.
ETHIOPIA

Emperor Haile Selassie I (center) and members of the royal court

Ethiopia has a nobility that is almost as old as the country itself. Throughout the history of the Ethiopian Empire most of the titles of nobility have been tribal or military in nature. However the Ethiopian nobility resembled its European counterparts in some respects; until 1855, when Tewodros II ended the Zemene Mesafint its aristocracy was organised similarly to the feudal system in Europe during the Middle Ages. For more than seven centuries, Ethiopia (or Abyssinia, as it was then known) was made up of many small kingdoms, principalities, emirates and imamates, which owed their allegiance to the nəgusä nägäst (literally “King of Kings”). Despite its being a Christian monarchy, various Muslim states paid tribute to the emperors of Ethiopia for centuries: including the Adal Sultanate, the Emirate of Harar, and the Awsa sultanate.

Ethiopian nobility were divided into two different categories: Mesafint (“prince”), the hereditary nobility that formed the upper echelon of the ruling class; and the Mekwanin (“governor”) who were appointed nobles, often of humble birth, who formed the bulk of the nobility (cf. the Ministerialis of the ‘Holy Roman Empire’). In Ethiopia there were titles of nobility among the Mesafint borne by those at the apex of medieval Ethiopian society. The highest royal title (after that of emperor) was Negus (“king”) which was held by hereditary governors of the provinces of Begemder, Shewa, Gojjam, and Wollo. The next highest seven titles were Ras, Dejazmach, Fit’awrari, Grazmach, Qenyazmach, Azmach and Balambaras. The title of Le’ul Ras was accorded to the heads of various noble families and cadet branches of the Solomonic dynasty, such as the princes of Gojjam, Tigray, and Selalle. The heirs of the Le’ul Rases were titled Le’ul Dejazmach, indicative of the higher status they enjoyed relative to Dejazmaches who were not of the blood imperial. There were various hereditary titles in Ethiopia: including that of Jantirar, reserved for males of the family of Empress Menen Asfaw who ruled over the mountain fortress of Ambassel in Wollo; Wagshum, a title created for the descendants of the deposed Zagwe dynasty; and Shum Agame, held by the descendants of Dejazmach Sabagadis, who ruled over the Agame district of Tigray. The vast majority of titles borne by nobles were not, however, hereditary.

Despite being largely dominated by Christian elements, some Muslims obtained entrée into the Ethiopian nobility as part of their quest for aggrandizement during the 1800s. To do so they were generally obliged to abandon their faith and some are believed to have feigned conversion to Christianity for the sake of acceptance by the old Christian aristocratic families. One such family, the Wara Seh (more commonly called the “Yejju dynasty”) converted to Christianity and eventually wielded power for over a century, ruling with the sanction of the Solomonic emperors. The last such Muslim noble to join the ranks of Ethiopian society was Mikael of Wollo who converted, was made Negus of Wollo, and later King of Zion, and even married into the Imperial family. He lived to see his son, Iyasu V, inherit the throne in 1913—only to be deposed in 1916 because of his conversion to Islam.
MADAGASCAR

The nobility in Madagascar are known as the Andriana. In much of Madagascar, before French colonization of the island, the Malagasy people were organised into a rigid social caste system, within which the Andriana exercised both spiritual and political leadership. The word “Andriana” has been used to denote nobility in various ethnicities in Madagascar: including the Merina, the Betsileo, the Betsimisaraka, the Tsimihety, the Bezanozano, the Antambahoaka and the Antemoro.

The word Andriana has often formed part of the names of Malagasy kings, princes and nobles. Linguistic evidence suggests that the origin of the title Andriana is traceable back to an ancient Javanese title of nobility. Before the colonization by France in the 1890s, the Andriana held various privileges, including land ownership, preferment for senior government posts, free labor from members of lower classes, the right to have their tombs constructed within town limits, etc. The Andriana rarely married outside their caste: a high-ranking woman who married a lower-ranking man took on her husband’s lower rank, but a high-ranking man marrying a woman of lower rank did not forfeit his status, although his children could not inherit his rank or property (cf. morganatic marriage).

In 2011, the Council of Kings and Princes of Madagascar endorsed the revival of a Christian Andriana monarchy that would blend modernity and tradition.
NIGERIA

The Emir of Kano, Muhammadu Sanusi II, on his throne in 2016
Contemporary Nigeria has a class of traditional notables whose titles are tied to those of its reigning monarchs, the Nigerian traditional rulers. Though their functions are largely ceremonial, their titles are often centuries old and are usually vested in the members of historically prominent families in the various subnational kingdoms of the country.

Membership of initiatory societies that have inalienable functions within the kingdoms is also a common feature of Nigerian nobility, particularly among the southern tribes, where such figures as the Ogboni of the Yoruba, the Nze na Ozo of the Igbo and the Ekpe of the Efik are some of the most famous examples. Although many of their traditional functions have become dormant due to the advent of modern governance, their members retain precedence of a traditional nature and are especially prominent during festivals.

Outside of this, many of the traditional nobles of Nigeria continue to serve as privy counsellors and viceroys in the service of their traditional sovereigns in a symbolic continuation of the way that their titled ancestors and predecessors did during the pre-colonial and colonial periods. Many of them are also members of the country’s political elite due to their not being covered by the prohibition from involvement in politics that governs the activities of the traditional rulers.

Holding a chieftaincy title, either of the traditional variety (which involves taking part in ritual re-enactments of your title’s history during annual festivals, roughly akin to a British peerage) or the honorary variety (which does not involve the said re-enactments, roughly akin to a knighthood), grants an individual the right to use the word “chief” as a pre-nominal honorific while in Nigeria.
LATIN AMERICA

In addition to a variety of indigenous peoples (such as the Aymara and the Quechua, who have long traditions of being led by nobles called Apu Mallkus and Mallkus), tribal connections exist among a number of other groups. Peerage traditions dating to the colonial period of such countries as Brazil, Cuba and Mexico have left noble families in each of them that have ancestral ties to those nations’ native tribes, while such figures as the Afro-Bolivian king and the high priestess of the Ile Maroia Laji sect of Brazilian Candomblé trace their ancestries to and derive their prestige from ancient monarchs and nobles of the pre-colonial African continent.

Brazil
Edit

Portrait of Marquis of Paraná, Prime Minister of Brazil.
The nobility in Brazil began during the colonial era with the Portuguese nobility. When Brazil became a united kingdom with Portugal in 1815, the first Brazilian titles of nobility were granted by the King of Portugal, Brazil and the Algarves.

With the independence of Brazil in 1822 as a constitutional monarchy the titles of nobility initiated by the King of Portugal were continued and new titles of nobility were created by the Emperor of Brazil. However, according to the Brazilian Constitution of 1824, the Emperor conferred titles of nobility, which were personal and therefore non-hereditary, unlike its Portuguese and Portuguese-Brazilian predecessor, being inherited exclusively to the royal titles of the Brazilian Imperial Family.[citation needed]

During the existence of the Empire of Brazil 1211 noble titles were acknowledged. With the proclamation of the First Brazilian Republic, in 1889, the Brazilian nobility was extinguished. It was also prohibited, under penalty of accusation of high treason and the suspension of political rights, to accept noble titles and foreign decorations without the proper permission of the State. In particular, the nobles of greater distinction, by respect and tradition, were allowed to use their titles during the republican regime. The Imperial Family also could not return to the Brazilian soil until 1921, when the Banishment Law was repealed.
PACIFIC ISLANDS

Amongst the Polynesians of the Pacific the Ali’i occupied the traditional place of an Aristocratic class. The Kingdoms of Hawaii, Tahiti and presently the Kingdom of Tonga were all ruled by a ruling class known as the Ali’i

The Ali’i routinely provided the kings and nobles of various Polynesian Kingdoms; including the Kingdom of Hawaii prior to its dissolution 1893, and have served as a bastion of Native Hawaiian revivalism since its occurrence. In Tonga, after contact with Western nations, the traditional system of chiefs was developed into a Western-style monarchy with a hereditary class of “barons”, the Tongans even adopting that English title as a synonym for chief.
NOBILITY BY NATION

A list of noble titles for different European countries can be found at Royal and noble ranks.

For the proper address of holders of these titles, see Royal and noble title styles.
For the English Wikipedia category, see Category: Nobility by nation.
AFRICA

Botswanan Nobility
Kgosi
Burundian Nobility
Egyptian Nobility
Ethiopian Nobility
Ghanaian Nobility
Akan Chieftaincy
Malagasy Nobility
Malian Nobility
Nigerian Nobility
Emir
Hakim
Oba
Ogboni
Obi
Nze na Ozo
Rwandan Nobility
Somali Nobility
Zimbabwean Nobility
AMERICA

Canadian Peers & Baronets
Brazilian Nobility
Cuban Nobility
Mexican Nobility
Pipiltin
In the United States, (establishment of a nobility is prohibited by the Title of Nobility Clause of the Country’s Constitution).
ASIA

Armenian Nobility
Chinese Nobility
Filipino Nobility
Indian Peers & Baronets
Indonesian (Dutch East Indies) Nobility
Noblesse de Robe
Japanese Nobility
Kuge
Daimyō
Korean Nobility
Vietnamese Nobility
Malay Nobility
Mongolian Nobility
Ottoman Titles
Thai Royal and Noble Titles
EUROPE

Albanian Nobility
Austrian Nobility
Baltic Nobility (related to the modern area of Estonia & Latvia)
Belgian Nobility
British Nobility
British Peerage
English Peerage
Welsh Peers
Scottish Peerage
Barons in Scotland
Irish Peerage
Peerage of Great Britain
Peerage of the United Kingdom

Burmese Nobles & Servants
Byzantine Aristocracy & Bureaucracy
Phanariotes
Croatian Nobility
Czech Nobility
Danish Nobility
Dutch Nobility
Finnish Nobility
French Nobility
German Nobility
Freiherr
Graf
Junker
Hungarian Nobility
Icelandic Nobility
Irish Nobility
Chiefs of the Name
Italian Nobility
Black Nobility
Lithuanian Nobility
Montenegrin Nobility
Norwegian Nobility
Polish Nobility
Portuguese Nobility
Russian Nobility
Boyars
Serbian Nobility
Spanish Nobility
Swedish Nobility
Swiss Nobility
OCEANIA

Australian Peers & Baronets
Fijian Nobility
Polynesian Nobility
Samoan Nobility
Tongan Nobles
SEE ALSO:

Almanach de Gotha
Aristocracy (class)
Ascribed status
Baig
Caste (social hierarchy of India)
Debutante
False titles of nobility
Gentleman
Gentry
Grand Burgher (German: Großbürger)
Heraldry
Honour
King
List of Noble Houses
Magnate
Military elite
Military Revolution
Nobiliary particle
Noblesse oblige
Nze na Ozo
Ogboni
Pasha
Patrician (ancient Rome)
Patrician (post-Roman Europe)
Peerage
Petty nobility
Princely state
Raja
Redorer son blason
Royal descent
Social environment
Symbolic capital
REFERENCES:

References
Edit
“Move Over, Kate Middleton: These Commoners All Married Royals, Too”. Vogue. Retrieved 2018-10-24.
Oliver, Revilo P. (1978). “Tacitean “Nobilitas”” (PDF). Illinois Classical Studies. University of Illinois Press. 3: 238-261. hdl:2142/11694. JSTOR 23062619. Retrieved 15 September 2018.
Bengtsson, Erik; Missiaia, Anna; Olsson, Mats; Svensson, Patrick (12 June 2018). “The Wealth of the Richest: Inequality and the Nobility in Sweden, 1750–1900” (PDF). Taylor & Francis: 1-28. doi:10.1080/03468755.2018.1480538. Retrieved 15 September 2018 – via Lund University Libraries.
Lukowski, Jerzy (2003). Hall, Lesley; Lilley, Keith D.; MacMaster, Neil; Spellman, W. M.; Waite, Gary K.; Webb, Diana (eds.). The European Nobility in the Eighteenth Century (PDF). Palgrave Macmillan. p. 243. ISBN 0-333-74440-3 – via Zaccheus Onumba Dibiaezue Memorial Libraries.
Wikisource Chisholm, Hugh, ed. (1911). “Nobility” . Encyclopædia Britannica. 19 (11th ed.). Cambridge University Press. p. 728.
Jonathan, Dewald (1996). The European nobility, 1400-1800. Cambridge University Press. p. 117. ISBN 0-521-42528-X.
Pine, L.G. (1992). Titles: How the King became His Highness. New York: Barnes & Noble Books. p. 77. ISBN 978-1-56619-085-5.
The consolidation of Noble Power in Europe, c. 1600–1800
W. Doyle, Essays on Eighteenth Century France, London, 1995
An opinion of Innes of Learney differentiates the system in use in Scotland from many other European traditions, in that armorial bearings which are entered in the Public Register of All Arms and Bearings in Scotland by warrant of the Lord Lyon King of Arms are legally “Ensigns of Nobility”, and although the historical accuracy of that interpretation has been challenged, Innes of Learney’s perspective is accepted in the Stair Memorial Encyclopaedia entry, ‘Heraldry’ (Volume 11), 3, The Law of Arms. 1613. The nature of arms.
Larence, Sir James Henry (1827) [first published 1824]. The nobility of the British Gentry or the political ranks and dignities of the British Empire compared with those on the continent (2nd ed.). London: T.Hookham — Simpkin and Marshall. Retrieved 2013-01-06.
Ruling of the Court of the Lord Lyon (26/2/1948, Vol. IV, page 26): “With regard to the words ‘untitled nobility’ employed in certain recent birthbrieves in relation to the (Minor) Baronage of Scotland, Finds and Declares that the (Minor) Barons of Scotland are, and have been both in this nobiliary Court and in the Court of Session recognised as a ‘titled nobility’ and that the estait of the Baronage (i.e., Barones Minores) are of the ancient Feudal Nobility of Scotland”. This title is not, however, a peerage, thus Scotland’s noblesse ranks in England as gentry.
Ölyvedi Vad Imre. (1930) Nemességi könyv. Koroknay-Nyomda. Szeged, Hungary. 45p.
Ölyvedi Vad Imre. (1930) Nemességi könyv. Koroknay-Nyomda. Szeged, Hungary. 85.p
The politics of aristocratic empires by John Kautsky
Robert Lacey, Aristocrats. Little, Brown and Company, 1983, p. 67
Nobility and Analogous Traditional Elites, p. 94 TFP.org
Karl Ferdinand Werner, Naissance de la noblesse. L’essor des élites politiques en Europe. Fayard, Paris 1998, ISBN 2-213-02148-1.
Jonathan, Dewald (1996). The European nobility, 1400–1800. Cambridge University Press. p. 25. ISBN 0-521-42528-X.
Jean, Meyer (1973). Noblesses et pouvoirs dans l’Europe d’Ancien Régime, Hachette Littérature. Hachette.
Jean-Pierre, Labatut (1981). Les noblesses européennes de la fin du XVe siècle à la fin du XVIIIe siècle. Presses universitaires de France.
Farnborough, T. E. May, 1st Baron (1896). Constitutional History of England since the Accession of George the Third, 11th ed. Volume I, Chapter 5, pp.273–281. London: Longmans, Green and Co.
The Olongapo Story, July 28, 1953 – Bamboo Breeze – Vol.6, No.3
“It is not right that the Indian chiefs of Filipinas be in a worse condition after conversion; rather they should have such treatment that would gain their affection and keep them loyal, so that with the spiritual blessings that God has communicated to them by calling them to His true knowledge, the temporal blessings may be added and they may live contentedly and comfortably. Therefore, we order the governors of those islands to show them good treatment and entrust them, in our name, with the government of the Indians, of whom they were formerly lords. In all else the governors shall see that the chiefs are benefited justly, and the Indians shall pay them something as a recognition, as they did during the period of their paganism, provided it be without prejudice to the tributes that are to be paid us, or prejudicial to that which pertains to their encomenderos.” Felipe II, Ley de Junio 11, 1594 in Recapilación de leyes, lib. vi, tit. VII, ley xvi. Also cf. Emma Helen Blair and James Alexander Robertson, The Philippine Islands (1493–1898), Cleveland: The A.H. Clark Company, 1903, Vol. XVI, pp. 155-156.
SCOTT, William Henry (1982). Cracks in the Parchment Curtain, and Other Essays in Philippine History. Quezon City: New Day Publishers. ISBN 978-9711000004. OCLC 9259667, p. 118.
Recopilación de Leyes de los Reynos de las Indias
Por cuanto teniendo presentes las leyes y cédulas que se mandaron despachar por los Señores Reyes mis progenitores y por mí, encargo el buen tratamiento, amparo, protección y defensa de los indios naturales de la América, y que sean atendidos, mantenidos, favorecidos y honrados como todos los demás vasallos de mi Corona, y que por el trascurso del tiempo se detiene la práctica y uso de ellas, y siento tan conveniente su puntual cumplimiento al bien público y utilidad de los Indios y al servicio de Dios y mío, y que en esta consecuencia por lo que toca a los indios mestizos está encargo a los Arzobispos y Obispos de las Indias, por la Ley Siete, Título Siete, del Libro Primero, de la Recopilación, los ordenen de sacerdotes, concurriendo las calidades y circunstancias que en ella se disponen y que si algunas mestizas quisieren ser religiosas dispongan el que se las admita en los monasterios y a las profesiones, y aunque en lo especial de que quedan ascender los indios a puestos eclesiásticos o seculares, gubernativos, políticos y de guerra, que todos piden limpieza de sangre y por estatuto la calidad de nobles, hay distinción entre los Indios y mestizos, o como descendentes de los indios principales que se llaman caciques, o como procedidos de indios menos principales que son los tributarios, y que en su gentilidad reconocieron vasallaje, se considera que a los primeros y sus descendentes se les deben todas las preeminencias y honores, así en lo eclesiástico como en lo secular que se acostumbran conferir a los nobles Hijosdalgo de Castilla y pueden participar de cualesquier comunidades que por estatuto pidan nobleza, pues es constante que estos en su gentilismo eran nobles a quienes sus inferiores reconocían vasallaje y tributaban, cuya especie de nobleza todavía se les conserva y considera, guardándoles en lo posible, o privilegios, como así se reconoce y declara por todo el Título de los caciques, que es el Siete, del Libro Seis, de la Recopilación, donde por distinción de los indios inferiores se les dejó el señorío con nombre de cacicazgo, transmisible de mayor en mayor, a sus posterioridades… Cf. DE CADENAS Y VICENT, Vicente (1993). Las Pruebas de Nobleza y Genealogia en Filipinas y Los Archivios en Donde se Pueden Encontrar Antecedentes de Ellas in Heraldica, Genealogia y Nobleza en los Editoriales de «Hidalguia», 19531–993: 40 años de un pensamiento (in Castellano). Madrid: HIDALGUIA, pp. 234-235.
Por ella se aprecia bien claramente y de manera fehaciente que a los caciques indígenas se les equiparada a los Hidalgos españoles y la prueba más rotunda de su aplicación se halla en el Archivo General Militar de Segovia, en donde las calificaciones de «Nobleza» se encuentran en las Hojas de Servicio de aquellos filipinos que ingresaron en nuestras Academias Militares y cuyos ascendientes eran caciques, encomenderos, tagalos notables, pedáneos, por los gobernadores o que ocupan cargos en la Administración municipal o en la del Gobierno, de todas las diferentes regiones de las grandes islas del Archipiélago o en las múltiples islas pequeñas de que se compone el mismo. DE CADENAS Y VICENT, Vicente (1993). Las Pruebas de Nobleza y Genealogia en Filipinas y Los Archivios en Donde se Pueden Encontrar Antecedentes de Ellas in Heraldica, Genealogia y Nobleza en los Editoriales de “Hidalguia”, 1953-1993: 40 años de un pensamiento (in Spanish). Madrid: HIDALGUIA. ISBN 9788487204548, p. 235.
Ceballos-Escalera y Gila, Alfonso, ed. (2016). Los Saberes de la Nobleza Española y su Tradición: Familia, corte, libros in Cuadernos de Ayala, N. 68 (Octubre-Diciembre 2016, p. 4
Por otra parte, mientras en las Indias la cultura precolombiana había alcanzado un alto nivel, en Filipinas la civilización isleña continuaba manifestándose en sus estados más primitivos. Sin embargo, esas sociedades primitivas, independientes totalmente las unas de las otras, estaban en cierta manera estructuradas y se apreciaba en ellas una organización jerárquica embrionaria y local, pero era digna de ser atendida. Precisamente en esa organización local es, como siempre, de donde nace la nobleza. El indio aborigen, jefe de tribu, es reconocido como noble y las pruebas irrefutables de su nobleza se encuentran principalmente en las Hojas de Servicios de los militares de origen filipino que abrazaron la carrera de las Armas, cuando para hacerlo necesariamente era preciso demostrar el origen nobiliario del individuo. DE CADENAS Y VICENT, Vicente (1993). Las Pruebas de Nobleza y Genealogia en Filipinas y Los Archivios en Donde se Pueden Encontrar Antecedentes de Ellas in Heraldica, Genealogia y Nobleza en los Editoriales de “Hidalguia”, 1953-1993: 40 años de un pensamiento (in Spanish). Madrid: HIDALGUIA. ISBN 9788487204548, p. 232.
También en la Real Academia de la Historia existe un importante fondo relativo a las Islas Filipinas, y aunque su mayor parte debe corresponder a la Historia de ellas, no es excluir que entre su documentación aparezcan muchos antecedentes genealógicos… El Archivo del Palacio y en su Real Estampilla se recogen los nombramientos de centenares de aborígenes de aquel Archipiélago, a los cuales, en virtud de su posición social, ocuparon cargos en la administración de aquellos territorios y cuya presencia demuestra la inquietud cultural de nuestra Patria en aquéllas Islas para la preparación de sus naturales y la colaboración de estos en las tareas de su Gobierno. Esta faceta en Filipinas aparece mucho más actuada que en el continente americano y de ahí que en Filipinas la Nobleza de cargo adquiera mayor importancia que en las Indias.DE CADENAS Y VICENT, Vicente (1993). Las Pruebas de Nobleza y Genealogia en Filipinas y Los Archivios en Donde se Pueden Encontrar Antecedentes de Ellas in Heraldica, Genealogia y Nobleza en los Editoriales de “Hidalguia”, 1953-1993: 40 años de un pensamiento (in Spanish). Madrid: HIDALGUIA. ISBN 9788487204548, p. 234.
Durante la dominación española, el cacique, jefe de un barangay, ejercía funciones judiciales y administrativas. A los tres años tenía el tratamiento de don y se reconocía capacidad para ser gobernadorcillo. Enciclopedia Universal Ilustrada Europeo-Americana. VII. Madrid: Espasa-Calpe, S.A. 1921, p. 624.
BLAIR, Emma Helen & ROBERTSON, James Alexander, eds. (1903). The Philippine Islands, 1493–1898. Volume 27 of 55 (1636-37). Historical introduction and additional notes by Edward Gaylord BOURNE; additional translations by Arthur B. Myrick. Cleveland, Ohio: Arthur H. Clark Company. ISBN 978-1-333-01347-9. OCLC 769945242. “Explorations by early navigators, descriptions of the islands and their peoples, their history and records of the catholic missions, as related in contemporaneous books and manuscripts, showing the political, economic, commercial and religious conditions of those islands from their earliest relations with European nations to the close of the nineteenth century, pp. 296-297.
BLAIR, Emma Helen & ROBERTSON, James Alexander, eds. (1903). The Philippine Islands, 1493–1898. Volume 27 of 55 (1636-37). Historical introduction and additional notes by Edward Gaylord BOURNE; additional translations by Arthur B. Myrick. Cleveland, Ohio: Arthur H. Clark Company. ISBN 978-1-333-01347-9. OCLC 769945242. “Explorations by early navigators, descriptions of the islands and their peoples, their history and records of the catholic missions, as related in contemporaneous books and manuscripts, showing the political, economic, commercial and religious conditions of those islands from their earliest relations with European nations to the close of the nineteenth century, pp. 329.
DE CADENAS Y VICENT, Vicente (1993). Las Pruebas de Nobleza y Genealogia en Filipinas y Los Archivios en Donde se Pueden Encontrar Antecedentes de Ellas in Heraldica, Genealogia y Nobleza en los Editoriales de “Hidalguia”, 1953-1993: 40 años de un pensamiento (in Spanish). Madrid: HIDALGUIA. ISBN 9788487204548.
FERRANDO, Fr Juan & FONSECA OSA, Fr Joaquin (1870–1872). Historia de los PP. Dominicos en las Islas Filipinas y en las Misiones del Japon, China, Tung-kin y Formosa (Vol. 1 of 6 vols) (in Spanish). Madrid: Imprenta y esteriotipia de M Rivadeneyra, p. 146
EXTERNAL LINKS:

Wikiquote has quotations related to: Nobility

Look up nobility in Wiktionary, the free dictionary.

Wikimedia Commons has media related to Nobility.

Wikidata has the property:
Disc Plain blue dark.svg family (P53) (see uses)

Genealogy of Georgian Nobility
WW-Person, an on-line database of European noble genealogy
Nobiliary Law.

Genealogics, an extensive database of European nobles
Worldroots, a selection of art and genealogy of European nobility.

RoyalArk- ruling houses in many non-European countries.

The Russian Nobility Association in America

Italian dynastic genealogies (in Italian, with an introduction in English)

Worldwidewords
A Glossary of Titles in 35 Languages

Etymology OnLine
Friesian- Feudal Hierarchy (scroll down)

Heraldica.org – European Noble, Princely, Royal and Imperial Titles

Genesis of European Nobility

News about the nobility

OLIGARCHY

Oligarchy (from Greek ὀλιγαρχία (oligarkhía); from ὀλίγος (olígos), meaning ‘few’, and ἄρχω (arkho), meaning ‘to rule or to command’) is a form of power structure in which power rests with a small number of people. These people may be distinguished by; nobility, wealth, family ties, education corporate, religious, political, or military control. Such states are often controlled by families who typically pass their influence from one generation to the next, but inheritance is not a necessary condition for the application of this term.
ETYMOLOGY

From Ancient Greek ὀλιγάρχης (oligárkhēs).
Surface analysis: olig- (“few”) +‎ -arch (“ruler, leader”)
PRONUNCIATION

(US) IPA(key): /ˈoʊlɪˌɡɑɹk/
Noun

Oligarch (plural Oligarchs)

A member of an ‘Oligarchy’; Someone who is part of a small group that runs a country.
(especially Russia, USA, Europe, or China) A very rich person, particularly with political power; a Plutocrat. (2016 December 6, Francis Fukuyama, “The Dangers of Disruption”, in The New York Times‎)

He will be an Oligarch in the Russian mold: a rich man who used his wealth to gain political power and who would use political power to enrich himself once in office. (cosmogony)
A protoplanet formed during oligarchic accretion.
SYNONYMS:

(rich and powerful person): plutocrat, tycoonocrat
RELATED TERMS:

• Oligarchic
• Oligarchical
• Oligarchy
TRANSLATIONS:

A member of an oligarchy =
A very rich person
Throughout history, Oligarchies have often been tyrannical, relying on public obedience or oppression to exist. Aristotele pioneered the use of the term as meaning rule by the rich, for which another term commonly used today is Plutocracy.

In the early 20th century Robert Michels developed the theory that democracies, as all large organizations, have a tendency to turn into Oligarchies. In his “Iron Law of Oligarchy” he suggests that the necessary division of labor in large organizations leads to the establishment of a ruling class mostly concerned with protecting their own power.

This was already recognized by the Athenians in the fourth century BCE: After the restoration of Democracy from Oligarchical coups, they used the drawing of lots for selecting government officers to counteract that tendency toward Oligarchy in government. They drew lots from large groups of adult volunteers to pick civil servants performing judicial, executive, and administrative functions (archai, boulē, and hēliastai). They even used lots for posts, such as judges and jurors in the political courts (nomothetai), which had the power to overrule the Assembly.
MINORITY RULE

The exclusive consolidation of power by a dominant religious or ethnic minority has also been described as a form of Oligarchy. Examples of this system include South Africa under Apartheid, Liberia under Americo-Liberians, the Sultanate of Zanzibar, and Rhodesia, where the installation of Oligarchic rule by the descendants of foreign settlers was primarily regarded as a legacy of various forms of colonialism.

The modern United States of America has also been described as an oligarchy, with its Republican Party representing a minority of the population but securing control of the Senate, the Presidency, and the Supreme Court, while the Democratic Party has control of the House. Migration to cities will likely see the Republican Party’s hold over the Senate strengthen in subsequent elections, despite an expected demographic shift to a majority-minority population by 2045. And lifetime appointments of Supreme Court Justices, make that body’s conservative majority a likelihood for at least eight years.
PUTATIVE OLIGARCHIES

A business group might be defined as an ‘Oligarch’, if it satisfies the following conditions:

(1) Owners are the largest private owners in the country

(2) It possesses sufficient political power to promote its own interests

(3) Owners control multiple businesses, which intensively coordinate their activities.
RUSSIAN FEDERATION

(Main article: Russian Oligarch)

Since the collapse of the Soviet Union and privatisation of the economy in December 1991, privately owned Russia-based multinational corporations, including producers of petroleum, natural gas, and metal have, in the view of many analysts, led to the rise of Russian oligarchs.
CHINA

An oligarchy took control of China after the death of Mao Tse-Tung. It is the 103 members of the families descended from the “Eight Elders”. They manage most of the State-owned enterprises, collaborate on business deals, and even intermarry.
UKRAINE

(Main article: Ukrainian Oligarchs)

The Ukrainian oligarchs are a group of business Oligarchs that quickly appeared on the economic and political scene of Ukraine after its independence in 1991. Overall there are 35 Oligarchic groups.
ZIMBABWE

The Zimbabwean Oligarchs are a group of liberation war veterans; who form the Zimbabwe African National Union – Patriotic Front, a colonial liberation party. The philosophy of the Zimbabwean government is that Zimbabwe can only be governed by a leader who took part in the pre-independence war. ZANU-PF has a theme motto in Shona “Zimbabwe yakauya neropa” meaning Zimbabwe was born from the blood of the sons and daughters who died fighting for its independence. The born free generation (born since independence in 1980) has no birthright to rule Zimbabwe.
UNITED STATES

Further information: Wealth inequality in the United States and Income inequality in the United States § Impact on democracy and society
Some contemporary authors have characterized current conditions in the United States as oligarchic in nature. Simon Johnson wrote that “the reemergence of an American financial Oligarchy is quite recent”, a structure which he delineated as being the “most advanced” in the world. Jeffrey A. Winters wrote that; “Oligarchy and Democracy, operate within a single system, and American politics is a daily display of their interplay”. The top 1% of the U.S. population by wealth in 2007 had a larger share of total income than at any time since 1928. In 2011, according to Politics Fact and others, the top 400 wealthiest Americans “have more wealth than half of all Americans combined”.

In 1998 Bob Herbert of The New York Times referred to modern American plutocrats as “The Donor Class” (list of top donors) and defined the class, for the first time, as “a tiny group—just one-quarter of 1 percent of the population—and it is not representative of the rest of the nation. But its money buys plenty of access”.

French economist Thomas Piketty, states; in his 2013 book, Capital in the Twenty-First Century, that “the risk of a drift towards Oligarchy is real and gives little reason for optimism about where the United States is headed”.

A study conducted by political scientists Martin Gilens of Princeton University and Benjamin Page of Northwestern University was released in April 2014, which stated that their “analyses suggest that majorities of the American public actually have little influence over the policies our government adopts”. The study analyzed nearly 1,800 policies enacted by the US government between 1981 and 2002 and compared them to the expressed preferences of the American public as opposed to wealthy Americans and large special interest groups. It found that wealthy individuals and organizations representing business interests have substantial political influence, while average citizens and mass-based interest groups have little to none. The study did concede that “Americans do enjoy many features central to democratic governance, such as regular elections, freedom of speech and association, and a widespread (if still contested) franchise.” Gilens and Page do not characterize the US as an “oligarchy” per se; however, they do apply the concept of “civil oligarchy” as used by Jeffrey Winters with respect to the US. Winters has posited a comparative theory of “oligarchy” in which the wealthiest citizens – even in a “civil oligarchy” like the United States – dominate policy concerning crucial issues of wealth- and income-protection.

Gilens says that average citizens only get what they want if wealthy Americans and business-oriented interest groups also want it; and that when a policy favored by the majority of the American public is implemented, it is usually because the economic elites did not oppose it. Other studies have questioned the Page and Gilens study.

In a 2015 interview, former President Jimmy Carter stated that the United States is now “an oligarchy with unlimited political bribery”, due to the Citizens United ruling, which effectively removed limits on donations to political candidates.
SEE ALSO:

• Aristocracy

• Dictatorship

• Inverted totalitarianism

• Iron law of oligarchy

• Kleptocracy

• Meritocracy

• Military dictatorship

• Nepotism

• Netocracy

• Oligopoly

• Oligarchical Collectivism

• Parasitism

• Plutocracy

• Political Family

• Power behind the throne

•Stratocracy

• Synarchism

• Theocracy

• Timocracy

THEOCRACY

Augustus as Jove, holding scepter and orb (first half of 1st century AD).

The Imperial cult of ancient Rome identified Roman Emperors and some members of their families with the divinely sanctioned authority (auctoritas) of the Roman State.

The official offer of cultus to a living emperor acknowledged his office and rule as divinely approved and constitutional: His Principate should therefore demonstrate pious respect for traditional Republican deities and mores..
Theocracy is a form of government in which a religious institution is the source from which all authority derives. The Oxford English Dictionary has this definition:

1. a system of government in which priests rule in the name of God or a god.

1.1. the commonwealth of Israel from the time of Moses until the election of Saul as King.

An ecclesiocracy is a situation where the religious leaders assume a leading role in the state, but do not claim that they are instruments of divine revelation: for example, the prince-bishops of the European Middle Ages, where the bishop was also the temporal ruler. Such a state may use the administrative hierarchy of the religion for its own administration, or it may have two “arms”—administrators and clergy—but with the state ‘Administrative Hierarchy”, subordinate to the ‘Religious Hierarchy’. Theocracy differs from theonomy, the latter of which is government based on divine law.

The Papacy in the Papal States, occupied a middle ground between Theocracy and Ecclesiocracy, since the Pope did not claim he was a prophet who received revelation from God and translated it into civil law.

Religiously endorsed Monarchies fall between Theocracy and Ecclesiocracy, according to the relative strengths of the religious and political organs.

Most forms of Theocracy are Oligarchic in nature, involving rule of the many by the few, some of whom so anointed under claim of divine commission.
ETYMOLOGY

The word; ‘Theocracy’, originates from the Greek θεοκρατία meaning “the rule of God”. This in turn derives from θεός (theos), meaning “god”, and κρατέω (krateo), meaning “to rule”. Thus the meaning of the word in Greek was “rule by god(s)” or human incarnation(s) of god(s).

The term was initially coined by Flavius Josephus in the first century A.D. to describe the characteristic government of the Jews. Josephus argued that while mankind had developed many forms of rule, most could be subsumed under the following three types: monarchy, oligarchy, and democracy. The government of the Jews, however, was unique. Josephus offered the term “theocracy” to describe this polity, ordained by Moses, in which God is sovereign and his word is law.

Josephus’ definition was widely accepted until the ‘Enlightenment era’, when the term started to collect more universalistic and negative connotations, especially in Hegel’s hands. The first recorded English use was in 1622, with the meaning “sacerdotal government under divine inspiration” (as in Biblical Israel before the rise of kings); the meaning “priestly or religious body wielding political and civil power” is recorded from 1825.
SYNOPSIS

In some religions, the ruler, usually a king, was regarded as the chosen favorite of God (or gods) who could not be questioned, sometimes even being the descendant of, or a god in their own right. Today, there is also a form of government where clerics have the power and the supreme leader could not be questioned in action. From the perspective of the theocratic government, “God himself is recognized as the head” of the state,[6] hence the term theocracy, from the Koine Greek θεοκρατία “rule of God”, a term used by Josephus for the kingdoms of Israel and Judah. Taken literally, Theocracy, means; – ‘rule by God/Gods’, and refers primarily to an internal “rule of the heart”, especially in its biblical application. The common, generic use of the term, as defined above in terms of rule by a church or analogous religious leadership, would be more accurately described as an Ecclesiocracy.

In a pure Theocracy, the civil leader is believed to have a personal connection with the civilization’s religion or belief.
For example, Moses led the Israelites, and Muhammad led the early Muslims. There is a fine line between the tendency of appointing religious characters to run the state and having a religious-based government. According to the Holy Books, Prophet Joseph was offered an essential governmental role just because he was trustworthy, wise and knowledgeable (Quran 12: 54–55). As a result of the Prophet Joseph’s knowledge and also due to his ethical and genuine efforts during a critical economic situation, the whole nation was rescued from a seven-year drought (Quran 12: 47–48).

When religions have a “Holy Book”, it is used as a direct message from God. Law proclaimed by the ruler is also considered a divine revelation, and hence the law of God. As to the Prophet Muhammad ruling, “The first thirteen of the Prophet’s twenty-three year career went on totally apolitical and non-violent. This attitude partly changed only after he had to flee from Mecca to Medina. This hijra, or migration, would be a turning point in the Prophet’s mission and would mark the very beginning of the Muslim calendar. Yet the Prophet did not establish a theocracy in Medina. Instead of a polity defined solely by Islam, he founded a territorial polity based on religious pluralism. This is evident in a document called the ’Charter of Medina’, which the Prophet signed with the leaders of the other community in the city”.

According to the Quran, Prophets were not after power or material resources. For example in surah 26 verses (109, 127, 145, 164, 180), the Koran repeatedly quotes from Prophets, Noah, Hud, Salih, Lut, and Shu’aib that: “I do not ask you for it any payment; my payment is only from the Lord of the worlds.” While, in Theocracy many aspects of the holy book are overshadowed by material powers. Due to be considered divine, the regime entitles itself to interpret verses to its own benefit and abuse them out of the context for its political aims. An Ecclesiocracy, on the other hand, is a situation where the religious leaders assume a leading role in the state, but do not claim that they are instruments of divine revelation. For example, the prince-bishops of the European Middle Ages, where the bishop was also the temporal ruler. Such a state may use the administrative Hierarchy of the religion for its own administration, or it may have two “arms”—administrators and clergy—but with the state administrative hierarchy subordinate to the religious hierarchy. The Papacy in the Papal States, occupied a middle ground between Theocracy and Ecclesiocracy, since the pope did not claim he was a prophet who received revelation from God and translated it into civil law.

Religiously endorsed Monarchies fall between these two poles, according to the relative strengths of the religious and political organs.

Theocracy is distinguished from other, secular forms of government that have a state religion, or are influenced by theological or moral concepts, and Monarchies held “By the Grace of God”. In the most common usage of the term, some civil rulers are leaders of the dominant religion (e.g., the Byzantine emperor as patron and defender of the official Church); the government proclaims it rules on behalf of God or a higher power, as specified by the local religion, and divine approval of government institutions and laws. These characteristics apply also to a ‘caesaropapist regime’. The Byzantine Empire however was not Theocratic since the patriarch answered to the emperor, not vice versa; similarly in Tudor England the crown forced the church to break away from Rome so the royal (and, especially later, Parliamentary) power could assume full control of the now Anglican Hierarchy and confiscate most church property and income.

Secular governments can also co-exist with a state religion or delegate some aspects of civil law to religious communities. For example, in Israel marriage is governed by officially recognized religious bodies who each provide marriage services for their respected adherents, yet no form of civil marriage (free of religion, for atheists, for example) exists nor marriage by non-recognized minority religions.
CURRENT THEOCRACIES
CHRISTIAN THEOCRACIES
● HOLY SEE (Vatican City)
(Main article: Politics of Vatican City)

(Further information: Christian state)

Following the Capture of Rome on 20 September 1870, the Papal States including Rome with the Vatican were annexed by the Kingdom of Italy. In 1929, with the Lateran Treaty signed with the Italian Government, the new state of Vatican City (population 842) – with no connection with the former Papal States – was formally created and recognized as an independent state. The head of state of the Vatican is the pope, elected by the College of Cardinals, an assembly of Senatorial-princes of the Church. They are usually clerics, appointed as Ordinaries, but in the past have also included men who were not bishops nor clerics. A pope is elected for life, and either dies or may resign. The cardinals are appointed by the popes, who therefore choose the electors of their successors.

Voting is limited to cardinals under 80 years of age. A Secretary for Relations with States, directly responsible for international relations, is appointed by the pope. The Vatican legal system is rooted in canon law but ultimately is decided by the pope; the Bishop of Rome as the Supreme Pontiff, “has the fullness of legislative, executive and judicial powers”. Although the laws of Vatican City come from the secular laws of Italy, under article 3 of the Law of the Sources of the Law, provision is made for the supplementary application of the “laws promulgated by the Kingdom of Italy”. The government of the Vatican can also be considered an ecclesiocracy (ruled by the Church).
Mount Athos (Athonite State)

(Main article: Mount Athos)

Mount Athos is a mountain peninsula in Greece which is an Eastern Orthodox autonomous region consisting of 20 monasteries under the direct jurisdiction of the Ecumenical Patriarch of Constantinople. There has been almost 1,800-years of continuous Christian presence on Mount Athos and it has a long history of monastic traditions, which dates back to at least 800 A.D. The origins of self-rule are originally from an edict by the Byzantine Emperor Ioannis Tzimisces in 972, which was later reaffirmed by the Emperor Alexios I Komnenos in 1095. After Greece’s independence from the Ottoman Empire, Greece claimed mount Athos but after a diplomatic dispute with Russia the region was formally recognised as Greek after World War 1.

Mount Athos is specifically exempt from the free movement of people and goods required by Greece’s membership of the European Union and entrance is only allowed with express permission from the monks.
The number of daily visitors to Mount Athos is restricted, with all visitors required to obtain an entrance permit. Only men are permitted to visit and Orthodox Christians take precedence in permit issuing. Residents of Mount Athos must be men aged 18 and over who are members of the Eastern Orthodox Church and also either monks or workers.

Athos is governed jointly by a ‘Holy Community’ consisting of representatives from the 20 monasteries and a Civil Governor, appointed by the Greek Ministry of Foreign Affairs. The Holy Community also has a four-member executive committee called the ‘Holy Administration’ which is led by a Protos.
ISLAMIC THEOCRACIES:
IRAN

Iran has been described as a “theocratic republic” (by the CIA World Factbook), and its constitution a “hybrid” of “theocratic and democratic elements” by Francis Fukuyama. Like other Islamic states, it maintains religious laws and has religious courts to interpret all aspects of law. According to Iran’s constitution, “all civil, penal, financial, economic, administrative, cultural, military, political, and other laws and regulations must be based on Islamic criteria”.

In addition, Iran has a religious ruler and many religious officials in powerful government posts. The head of state, or “Supreme Leader”, is a faqih (scholar of Islamic law), and possesses more power than Iran’s president. The Leader appoints the heads of many powerful posts: The commanders of the armed forces, the director of the national radio and television network, the heads of the powerful major religious foundations, the chief justice, the attorney general (indirectly through the chief justice), special tribunals, and members of national security councils dealing with defence and foreign affairs. He also co-appoints the 12 jurists of the Guardian Council.[19]

The Leader is elected by the Assembly of Experts[15][20] which is made up of mujtahids,[21] who are Islamic scholars competent in interpreting Sharia.

The Guardian Council, has the power to veto bills from majlis (parliament), approve or disapprove candidates who wish to run for high office (president, majlis, the Assembly of Experts). The council supervises elections, and can greenlight or ban investigations into the election process.[15] Six of the Guardians (half the council) are faqih empowered to approve or veto all bills from the majlis (parliament) according to whether the faqih believe them to be in accordance with Islamic law and customs (Sharia). The other six members are lawyers appointed by the head of the judiciary (who is also a cleric and also appointed by the Leader).[22]

An Islamic republic is the name given to several states that are officially ruled by Islamic laws, including the Islamic Republics of Afghanistan, Iran, Pakistan, and Mauritania. Pakistan first adopted the title under the constitution of 1956. Mauritania adopted it on 28 November 1958. Iran adopted it after the 1979 Iranian Revolution that overthrew the Pahlavi dynasty. Afghanistan adopted it in 2004 after the fall of the Taliban government. Despite having similar names the countries differ greatly in their governments and laws.

The term “Islamic republic” has come to mean several different things, some contradictory to others. To some Muslim religious leaders in the Middle East and Africa who advocate it, an Islamic republic is a state under a particular Islamic form of government. They see it as a compromise between a purely Islamic caliphate and secular nationalism and republicanism. In their conception of the Islamic republic, the penal code of the state is required to be compatible with some or all laws of Sharia, and the state may not be a monarchy, as many Middle Eastern states are presently.[citation needed]

Central Tibetan Administration
Edit
The Central Tibetan Administration, colloquially known as the Tibetan government in exile, is a Tibetan exile organisation with a state-like internal structure. According to its charter, the position of head of state of the Central Tibetan Administration belongs ex officio to the current Dalai Lama, a religious hierarch. In this respect, it continues the traditions of the former government of Tibet, which was ruled by the Dalai Lamas and their ministers, with a specific role reserved for a class of monk officials.

On March 14, 2011, at the 14th Dalai Lama’s suggestion, the parliament of the Central Tibetan Administration began considering a proposal to remove the Dalai Lama’s role as head of state in favor of an elected leader.

The first directly elected Kalön Tripa was Samdhong Rinpoche, who was elected August 20, 2001.[23]

Before 2011, the Kalön Tripa position was subordinate to the 14th Dalai Lama[24] who presided over the government in exile from its founding.[25] In August of that year, Lobsang Sangay polled 55 percent votes out of 49,189, defeating his nearest rival Tethong Tenzin Namgyal by 8,646 votes,[26] becoming the second popularly elected Kalon Tripa. The Dalai Lama announced that his political authority would be transferred to Sangay.[27]

Change to Sikyong
Edit
On September 20, 2012, the 15th Tibetan Parliament-in-Exile unanimously voted to change the title of Kalön Tripa to Sikyong in Article 19 of the Charter of the Tibetans in exile and relevant articles.[28] The Dalai Lama had previously referred to the Kalon Tripa as Sikyong, and this usage was cited as the primary justification for the name change. According to Tibetan Review, “Sikyong” translates to “political leader”, as distinct from “spiritual leader”.[29] Foreign affairs Kalon Dicki Chhoyang stated that the term “Sikyong” has had a precedent dating back to the 7th Dalai Lama, and that the name change “ensures historical continuity and legitimacy of the traditional leadership from the fifth Dalai Lama”.[30] The online Dharma Dictionary translates sikyong (srid skyong) as “secular ruler; regime, regent”.[31] The title sikyong had previously been used by regents who ruled Tibet during the Dalai Lama’s minority.
STATES WITH OFFICIAL STATE RELIGION

(Main article: State religion)

Having a state religion is not sufficient to be a theocracy in the narrow sense. Many countries have a state religion without the government directly deriving its powers from a divine authority or a religious authority directly exercising governmental powers. Since the narrow sense has few instances in the modern world, the more common usage is the wider sense of an enforced state religion.
HISTORIC STATES WITH THEOCRATIC ASPECTS:
● ANCIENT EGYPT

The pharaoh was the offspring of the sungod.
● JAPAN

The emperor was the offspring of the sun goddess.
● WESTERN ANTIQUITY

Further information: Imperial Cult, State Church of the Roman Empire, and Israelites
The imperial Cults in Ancient Egypt and the Roman Empire, as well as numerous other Monarchies, deified the ruling Monarch. The state religion was often dedicated to the worship of the ruler as a deity, or the incarnation thereof.

Early Israel was ruled by Judges before instituting a Monarchy. The Judges were believed to be representatives of YHVH Yahweh (also translated as, Jehovah).

In ancient and medieval Christianity, Caesaropapism is the doctrine where a head of state is at the same time the head of the church.
● TIBET

Unified religious rule in Tibet began in 1642, when the Fifth Dalai Lama allied with the military power of the Mongol Gushri Khan to consolidate the political power and center control around his office as head of the Gelug school. This form of government is known as the dual system of government. Prior to 1642, particular monasteries and monks had held considerable power throughout Tibet, but had not achieved anything approaching complete control, though power continued to be held in a diffuse, ‘Feudal System’, after the ascension of the Fifth Dalai Lama. Power in Tibet was held by a number of traditional elites, including members of the Nobility, the heads of the major Buddhist sects (including their various tulkus), and various large and influential ‘Monastic Communities’.

Political power was sometimes used by monastic leaders to suppress rival religious schools through the confiscation of property and direct violence. Social mobility was somewhat possible through the attainment of a monastic education, or recognition as a reincarnated teacher, but such institutions were dominated by the traditional elites and governed by political intrigue. Non-Buddhists in Tibet were members of an outcast underclass.

The Bogd Khaanate period of Mongolia (1911–19) is also cited as a former Buddhist Theocracy.
● CHINA

Further information: Three Sovereigns and Five Emperors and Chinese emperor
Similar to the Roman Emperor, the Chinese sovereign was historically held to be the Son of Heaven. However, from the first historical Emperor on, this was largely ceremonial and tradition quickly established it as a posthumous dignity, like the Roman institution. The situation before Qin Shi Huang Di is less clear.

The Shang Dynasty essentially functioned as a Theocracy, declaring the ruling family the sons of heaven and calling the chief sky god Shangdi after a word for their deceased ancestors. After their overthrow by the Zhou, the ‘Royal Clan of Shang’, were not eliminated but instead moved to a ceremonial capital where they were charged to continue the performance of their rituals.

The titles combined by Shi Huangdi to form his new title of emperor were originally applied to god-like beings who ordered the heavens and earth and to culture heroes credited with the invention of agriculture, clothing, music, astrology, &c. Even after the fall of Qin, an emperor’s words were considered sacred edicts (聖旨) and his written proclamations “directives from above” (上諭).

As a result, some Sinologists translate the title ‘Huangdi’, (usually rendered “emperor”) as Thearch. The term properly refers to the head of a Thearchy (a kingdom of gods), but the more accurate “Theocrat” carries associations of a strong priesthood that would be generally inaccurate in describing imperial China. Others reserve the use of “Thearch” to describe the legendary figures of Chinese prehistory while continuing to use “emperor” to describe historical rulers.

The Heavenly Kingdom of Great Peace in 1860s Qing China was a heterodox Christian theocracy led by a person who said that he was the younger brother of Jesus Christ, Hong Xiuquan. This theocratic state fought one of the most destructive wars in history, the Taiping Rebellion, against the Qing dynasty for fifteen years before being crushed following the fall of the rebel capital Nanjing.
● CALIPHATE

The Sunni branch of Islam stipulates that, as a head of state, a Caliph should be elected by Muslims or their representatives. Followers of Shia Islam, however, believe a Caliph should be an Imam chosen by God from the Ahl al-Bayt (the “Family of the House”, Muhammad’s direct descendants).
● BYZANTINE EMPIRE

(Main article: Byzantine Empire § Religion).

The Byzantine Empire (a.d. 324–1453) operated under caesaropapism, meaning that the emperor was both the head of civil society and the ultimate authority over the Ecclesiastical Authorities, or Patriarchates. The Emperor was considered to be God’s omnipotent representative on Earth and he ruled as an Absolute Autocrat.

Jennifer Fretland VanVoorst argues, “the Byzantine Empire became a Theocracy in the sense that Christian values and ideals were the foundation of the empire’s political ideals and heavily entwined with its political goals”. Steven Runciman says in his book on The Byzantine Theocracy (2004):

The constitution of the Byzantine Empire was based on the conviction that it was the earthly copy of the Kingdom of Heaven. Just as God ruled in Heaven, so the Emperor, made in His image, should rule on earth and carry out his commandments…. It saw itself as a universal empire. Ideally, it should embrace all the peoples of the Earth who, ideally, should all be members of the one true Christian Church, its own Orthodox Church. Just as man was made in God’s image, so man’s kingdom on Earth was made in the image of the Kingdom of Heaven.
● GENEVA & ZURICH

Historians debate the extent to which Geneva, Switzerland, in the days of John Calvin (1509–64) was a Theocracy. On the one hand, Calvin’s theology clearly called for separation between church and state. Other historians have stressed the enormous political power wielded on a daily basis by the clerics.

In nearby Zurich, Switzerland, Protestant reformer Huldrych Zwingli (1484-1531), built a political system, that have been called a Theocracy, by many scholars, while other scholars have denied it.
● DESERET

(Main articles: State of Deseret and The Church of Jesus Christ of Latter-day Saints).

(See also: Theodemocracy)

The question of theocracy has been debated at extensively by historians regarding the Mormon communities in Illinois, and especially in Utah.

Joseph Smith, mayor of Nauvoo, Illinois, and founder of the Latter Day Saint movement, ran as an independent for president in 1844. He proposed the redemption of slaves by selling public lands; reducing the size and salary of Congress; the closure of prisons; the annexation of Texas, Oregon, and parts of Canada; the securing of international rights on high seas; free trade; and the re-establishment of a national bank. His top aide Brigham Young campaigned for Smith saying, “He it is that God of Heaven designs to save this nation from destruction and preserve the Constitution”. The campaign ended when Smith was killed by a mob while in the Carthage, Illinois, jail on June 27, 1844.

After severe persecution, the Mormons left the United States and resettled in a remote part of Utah, which was then part of Mexico. However the United States took control in 1848 and would not accept polygamy. The Mormon State of Deseret was short-lived. Its original borders stretched from western Colorado to the southern California coast. When the Mormons arrived in the valley of the Great Salt Lake in 1847, the Great Basin was still a part of Mexico and had no secular government. As a result, Brigham Young administered the region both spiritually and temporally through the highly organized and centralized Melchizedek Priesthood. This original organization was based upon a concept called theodemocracy, a governmental system combining Biblical theocracy with mid-19th-century American political ideals.

In 1849, the Saints organized a secular government in Utah, although many ecclesiastical leaders maintained their positions of secular power. The Mormons also petitioned Congress to have Deseret admitted into the Union as a state. However, under the Compromise of 1850, Utah Territory was created and Brigham Young was appointed governor. In this situation, Young still stood as head of The Church of Jesus Christ of Latter-day Saints (LDS Church) as well as Utah’s secular government.

After the abortive Utah War of 1857–1858, the replacement of Young by an outside Federal Territorial Governor, intense federal prosecution of LDS Church leaders, and the eventual resolution of controversies regarding plural marriage, and accession by Utah to statehood, the apparent temporal aspects of LDS theodemocracy receded markedly.
● PERSIA

During the Achaemenid Empire, Zoroastrianism was the state religion and included formalized worship. The Persian kings were known to be pious Zoroastrians and also ruled with a Zoroastrian form of law called ‘Asha’. However, Cyrus the Great, who founded the empire, avoided imposing the Zoroastrian faith on the inhabitants of conquered territory. Cyrus’s kindness towards Jews has been cited as sparking Zoroastrian influence on Judaism.

Under the Seleucids, Zoroastrianism became autonomous. During the Sassanid period, the Zoroastrian calendar was reformed, image-use was banned, Fire Temples were increasingly built and intolerance towards other faiths prevailed.
● OTHERS

The short reign (1494–1498) of Girolamo Savonarola, a Dominican priest, over the city of Florence had features of a Theocracy. During his rule, “un-Christian” books, statues, poetry, and other items were burned (in the Bonfire of the Vanities), sodomy was made a capital offense, and other Christian practices became law.
SEE ALSO:
● GENERAL:

• Divine Law
• Divine Command Theory
• Philosopher King
• Religious Law
● CHRISTIAN:

• Christian Reconstructionism
• Divine Right of Kings
• Dominionism
• National Catholicism
• Temporal power (papal)
• Theonomy
● ISLAMIC:

• Iranian Revolution
• Islamic banking
• Islamic republic
• Islamic state
• Islamism
• Political aspects of Islam
• Religious police
• Qutbism
• Taliban
• Wahhabi
● OTHER:

• Divine Right of Kings
• Khalistan
• State Shinto (Japan)
• State Religion
● FICTIONAL:

• List of fictional theocracies
• Religion in science fiction
PLUTOCRACY
PLUTARCHY (PLUTONOMY)

A plutocracy (Greek: πλοῦτος, ploutos, ‘wealth’ + κράτος, kratos, ‘power’) or plutarchy is a society that is ruled or controlled by people of great wealth or income. The first known use of the term in English dates from 1631. Unlike systems such as democracy, capitalism, socialism or anarchism, plutocracy is not rooted in an established political philosophy. The concept of plutocracy may be advocated by the wealthy classes of a society in an indirect or surreptitious fashion, though the term itself is almost always used in a pejorative sense.
USAGE

PROPAGANDA TERM

In the political jargon and propaganda of Fascist Italy, Nazi Germany and the Communist International, western democratic states were referred to as plutocracies, with the implication being that a small number of extremely wealthy individuals were controlling the countries and holding them to ransom. Plutocracy replaced democracy and capitalism as the principal fascist term for the United States and Great Britain during the Second World War. For the Nazis, the term was often a code word for “the Jews”.
SEE ALSO:

• Aristocracy
• Anarcho-Capitalism
• Banana Republic
• Corporatocracy
• Corporate Republic
• Elitism
• Meritocracy
• Kleptocracy
• Neo-Feudalism
• Oligarchy
• Overclass
• Plutonomy
• Timocracy
• Upper Class
• Wealth Concentration
KLEPTOCRACY

This article is about the term for systematic corruption and thievery by the state or state-sanctioned corruption. For a state with ties to or aid from organized crime syndicates, see Mafia state.

Kleptocracy (from Greek κλέπτης kléptēs, “thief”, κλέπτω kléptō, “I steal”, and -κρατία -kratía from κράτος krátos, “power, rule”) is a government with corrupt leaders (kleptocrats) that use their power to exploit the people and natural resources of their own territory in order to extend their personal wealth and political powers. Typically, this system involves embezzlement of funds at the expense of the wider population.

Kleptocracy is different from a Plutocracy; A kleptocracy is a government ruled by corrupt politicians who use their political power to receive kickbacks, bribes, and special favors at the expense of the populace. Kleptocrats may use political leverage to pass laws that enrich them or their constituents and they usually circumvent the rule of law.

TIMOCRACY

A Timocracy (from Greek τιμή timē, “price, worth” and -κρατία -kratia, “rule”) in Aristotle’s Politics is a state where only property owners may participate in government. The more extreme forms of Timocracy, where power derives entirely from wealth with no regard for social or civic responsibility, may shift in their form and become a plutocracy where the wealthy rule.
TIMOCRACY & PROPERTY

Solon introduced the ideas of timokratia as a graded oligarchy in his Solonian Constitution for Athens in the early 6th century BC. His was the first known deliberately implemented form of timocracy, allocating political rights and economic responsibility depending on membership of one of four tiers of the population. Solon defined these tiers by measuring how many bushels of produce each man could produce in a year, namely:

Pentacosiomedimni – “Men of the 500 bushel”, those who produced 500 bushels of produce per year, could serve as generals in the army
Hippeis – Knights, those who could equip themselves and one cavalry horse for war, valued at 300 bushels per year
Zeugitae – Tillers, owners of at least one pair of beasts of burden, valued at 200 bushels per year, could serve as Hoplites
Thetes – Manual laborers
N. G. L. Hammond supposes Solon instituted a graduated tax upon the upper classes, levied in a ratio of 6:3:1, with the lowest class of thetes paying nothing in taxes but remaining ineligible for elected office.

Aristotle later wrote in his Nicomachean Ethics (Book 8, Chapter 10) about three “true political forms” for a state, each of which could appear in corrupt form, becoming one of three negative forms. Aristotle describes timocracy in the sense of rule by property-owners: it comprised one of his true political forms. Aristotelian timocracy approximated to the constitution of Athens, although Athens exemplified the corrupted version of this form, described as democracy.
TIMOCRACY, COMPARABLE VALUES, & PLATO’S FIVE REGIMES

(Main article: Plato’s five regimes).

In The Republic, Plato describes five regimes (of which four are unjust). Timocracy is listed as the first “unjust” regime. Aristocracy degenerates into timocracy when, due to miscalculation on the part of its governed class, the next generation of guardians and auxiliaries includes persons of an inferior nature (the persons with souls made of iron or bronze, as opposed to the ideal guardians and auxiliaries, who have souls made of gold and silver). A timocracy, in choosing its leaders, is “inclining rather to the more high-spirited and simple-minded type, who are better suited for war”. The city-state of Sparta provided Plato with a real-world model for this form of government. Modern observers might describe Sparta as a totalitarian or one-party state, although the details we know of its society come almost exclusively from Sparta’s enemies. The idea of militarism-stratocracy accurately reflects the fundamental values of Spartan society.
REFERENCES:

Harper, Douglas (November 2001). “”Timocracy” etymology”. Online Etymology Dictionary. Retrieved 2008-10-25.
Rep. 8.547e; Cahn, Steven M., Classics of Political and Moral Philosophy, Oxford University Press, 2002. ISBN 0199791155
3. Websters New World Dictionary “of the American Language” second college edition page 1490
DEMOCRACY

For a democracy that protects the rights of individuals, see Liberal democracy. For other uses, see Democracy and Democrat.

A person casts vote in the second round of the 2007 French presidential election.
Democracy (Greek: δημοκρατία dēmokratía, literally “Rule by ‘People'”) is a system of government where the citizens exercise power by voting. In a direct democracy, the citizens as a whole form a governing body and vote directly on each issue. In a representative democracy the citizens elect representatives from among themselves. These representatives meet to form a governing body, such as a legislature. In a constitutional democracy the powers of the majority are exercised within the framework of a representative democracy, but the constitution limits the majority and protects the minority, usually through the enjoyment by all of certain individual rights, e.g. freedom of speech, or freedom of association. “Rule of the majority” is sometimes referred to as democracy. Democracy is a system of processing conflicts in which outcomes depend on what participants do, but no single force controls what occurs and its outcomes.

The uncertainty of outcomes is inherent in democracy, which makes all forces struggle repeatedly for the realization of their interests, being the devolution of power from a group of people to a set of rules.[4] Western democracy, as distinct from that which existed in pre-modern societies, is generally considered to have originated in city-states such as Classical Athens and the Roman Republic, where various schemes and degrees of enfranchisement of the free male population were observed before the form disappeared in the West at the beginning of late antiquity. The English word dates back to the 16th century, from the older Middle French and Middle Latin equivalents.

According to American political scientist Larry Diamond, democracy consists of four key elements: a political system for choosing and replacing the government through free and fair elections; the active participation of the people, as citizens, in politics and civic life; protection of the human rights of all citizens; a rule of law, in which the laws and procedures apply equally to all citizens. Todd Landman, nevertheless, draws our attention to the fact that democracy and human rights are two different concepts and that “there must be greater specificity in the conceptualisation and operationalization of democracy and human rights”.

The term appeared in the 5th century BC to denote the political systems then existing in Greek city-states, notably Athens, to mean “rule of the people”, in contrast to aristocracy (ἀριστοκρατία, aristokratía), meaning “rule of an elite”. While theoretically these definitions are in opposition, in practice the distinction has been blurred historically. The political system of Classical Athens, for example, granted democratic citizenship to free men and excluded slaves and women from political participation. In virtually all democratic governments throughout ancient and modern history, democratic citizenship consisted of an elite class, until full enfranchisement was won for all adult citizens in most modern democracies through the suffrage movements of the 19th and 20th centuries.

Democracy contrasts with forms of government where power is either held by an individual, as in an absolute monarchy, or where power is held by a small number of individuals, as in an oligarchy. Nevertheless, these oppositions, inherited from Greek philosophy,[8] are now ambiguous because contemporary governments have mixed democratic, oligarchic and monarchic elements. Karl Popper defined democracy in contrast to dictatorship or tyranny, thus focusing on opportunities for the people to control their leaders and to oust them without the need for a revolution.
CHARACTERISTICS

Most democratic (closest to 10)

Least democratic (closest to 0)

Democracy’s de facto status in the world as of 2017, according to Democracy Index by The Economist.

Democracy’s de jure status in the world as of 2018; only Saudi Arabia, Oman, the UAE, Brunei, and the Vatican officially admit to be undemocratic
No consensus exists on how to define democracy, but legal equality, political freedom and rule of law have been identified as important characteristics. These principles are reflected in all eligible citizens being equal before the law and having equal access to legislative processes.[citation needed] For example, in a representative democracy, every vote has equal weight, no unreasonable restrictions can apply to anyone seeking to become a representative, [according to whom?] and the freedom of its eligible citizens is secured by legitimised rights and liberties which are typically protected by a constitution.[13][14] Other uses of “democracy” include that of direct democracy.

One theory holds that democracy requires three fundamental principles: upward control (sovereignty residing at the lowest levels of authority), political equality, and social norms by which individuals and institutions only consider acceptable acts that reflect the first two principles of upward control and political equality.

The term “democracy” is sometimes used as shorthand for liberal democracy, which is a variant of representative democracy that may include elements such as political pluralism; equality before the law; the right to petition elected officials for redress of grievances; due process; civil liberties; human rights; and elements of civil society outside the government. Roger Scruton argues that democracy alone cannot provide personal and political freedom unless the institutions of civil society are also present.

In some countries, notably in the United Kingdom which originated the Westminster system, the dominant principle is that of parliamentary sovereignty, while maintaining judicial independence. In the United States, separation of powers is often cited as a central attribute. In India, parliamentary sovereignty is subject to the Constitution of India which includes judicial review. Though the term “Democracy” is typically used in the context of a political state, the principles also are applicable to private organisations.

Majority rule is often listed as a characteristic of democracy. Hence, democracy allows for political minorities to be oppressed by the “tyranny of the majority” in the absence of legal protections of individual or group rights. An essential part of an “ideal” representative democracy is competitive elections that are substantively and procedurally “fair,” i.e., just and equitable. In some countries, freedom of political expression, freedom of speech, freedom of the press, and internet democracy are considered important to ensure that voters are well informed, enabling them to vote according to their own interests.

It has also been suggested that a basic feature of democracy is the capacity of all voters to participate freely and fully in the life of their society.[22] With its emphasis on notions of social contract and the collective will of all the voters, democracy can also be characterised as a form of political collectivism because it is defined as a form of government in which all eligible citizens have an equal say in lawmaking.

While representative Democracy is sometimes equated with the republican form of government, the term “republic” classically has encompassed both democracies and Aristocracies. Many democracies are constitutional monarchies, such as the United Kingdom.
HEGEL

Georg Wilhelm Friedrich Hegel (/ˈheɪɡəl/, German: [ˈɡeːɔɐ̯k ˈvɪlhɛlm ˈfʁiːdʁɪç ˈheːɡl̩]; August 27, 1770 – November 14, 1831) was a German philosopher and an important figure of German idealism. He achieved wide recognition in his day and—while primarily influential within the continental tradition of philosophy—has become increasingly influential in the analytic tradition as well. Although Hegel remains a divisive figure, his canonical stature within Western philosophy is universally recognized.
FULL NAME:
Georg Wilhelm Friedrich Hegel

BORN: August 27, 1770
Stuttgart, Duchy of Württemberg

DIED: November 14, 1831 (aged 61), Berlin, Kingdom of Prussia

RESIDENCE: Germany

NATIONALITY: German

EDUCATION:
Gymnasium illustre zu Stuttgart
Tübinger Stift, University of Tübingen (MA, 1790)[1]
University of Jena (PhD, 1801)

ERA:
19th-century philosophy

REGION:
Western philosophy
School
Continental philosophy
German idealism
Objective idealism
Absolute idealism
Hegelianism
Historicism
Naturphilosophie
Epistemic coherentism
Conceptualism
Empirical realism
Coherence theory of truth

INSTITUTIONS:
University of Jena
(1801–1806)
University of Heidelberg
(1816–1818)
University of Berlin
(1818–1831)
THESIS
Dissertatio Philosophica de Orbitis Planetarium (Philosophical Dissertation on the Orbits of the Planets) (1801)
Academic advisors
Johann Friedrich LeBret [de] (MA advisor)
Notable students
Johann Eduard Erdmann
Main interests
Metaphysics
Epistemology
Naturphilosophie
Philosophy of history
Political philosophy
Logic
Aesthetics
Notable ideas
Absolute idealism
Hegelian dialectic
Master–slave dialectic
Aufheben (“sublation”)
Geist (“mind/spirit”)
Sittlichkeit (“ethical order”)
Alienation[8]
Dialectical phenomenology
The three moments
of the concept: universality,
particularity, and individuality[9]
(Allgemeinheit, Besonderheit,
Einzelheit)[10]
Abstract particularity[11]
The abstract–concrete distinction[12]
Judgement of history
“The true is the whole”[13]
Rationality alone is real[14]
Logical holism
Panlogism
Distinction between
critical Verstandesmetaphysik[15]
(metaphysics of Understanding) and
speculative Vernunftsmetaphysik
(metaphysics of Reason)

Inferentialism

The Negative/Positive Liberty Distinction

The civil society/state distinction
Volksgeist
INFLUENCES:

Aristotle Böhme Diderot Ferguson Fichte Heraclitus Herder Kant Rousseau Spinoza Schelling Schiller Smith
INFLUENCED:
Adorno Barth Bauer Bosanquet Bradley Brandomde Beauvoir Butler Chalybäus Chicherin Collingwood Cousin Croce Derrida Dilthey Engels Feuerbach Fischer Fukuyama Gentile Gore Green Hyppolite Kaufmann Kierkegaard Kojève Küng Lenin Lukács Marcuse Marx Morin McDowell Nietzsche Pippin Rose Rosenkranz Russon Sartre Singer Stein Stirner Strauss Taylor Žižek

Hegel’s principal achievement was his development of a distinctive articulation of idealism, sometimes termed absolute idealism, in which the dualisms of, for instance, mind and nature and subject and object are overcome. His philosophy of spirit conceptually integrates psychology, the state, history, art, religion and philosophy. His account of the master–slave dialectic has been highly influential, especially in 20th-century France. Of special importance is his concept of spirit (Geist, sometimes also translated as “mind”) as the historical manifestation of the logical concept and the “sublation” (Aufhebung, integration without elimination or reduction) of seemingly contradictory or opposing factors: examples include the apparent opposition between nature and freedom and between immanence and transcendence. Hegel has been seen in the 20th century as the originator of the thesis, antithesis, synthesis triad, but as an explicit phrase it originated with Johann Gottlieb Fichte.

Hegel has influenced many thinkers and writers whose own positions vary widely. Karl Barth described Hegel as a “Protestant Aquinas” while Maurice Merleau-Ponty wrote that “all the great philosophical ideas of the past century—the philosophies of Marx and Nietzsche, phenomenology, German existentialism, and psychoanalysis—had their beginnings in Hegel”.
SOCIALISM

SHADOW GOVERNMENT

“To the Rockefellers, socialism is not a system for redistributing wealth – especially not for redistributing their wealth -but a system to control people and competitors. Socialism puts power in the hands of the government. And since the Rockefellers control the government, government control means Rockefeller control. You may not have known this, but you can be sure they do!” …The Rockefeller File by Gary Allen

Control necessitates a static society. A growing, competitive, and free society gives new people a chance to make their fortune and replace some of those already at the top. So legislation is promoted to restrict entrepreneurial effort and tax away capital accumulations not protected in the tax-free foundations of the Establishment insiders. Every effort is made to press medium-size business to the wall and allow it to be swallowed up by the Establishment giants……But the fact is that socialism is only a system for control, and the members of the Establishment elite operating out of New York and Washington understand socialism much better than do the Marxists……. the Establishment insiders know that socialism is not a humanitarian system for redistributing wealth, but a system for concentrating wealth and controlling people. Socialism is nothing more or less than a power system — a power system with quasi-mystical and demonstrably false philosophical premises.
The suggestions of the Trilateral report, “The Crisis of Democracy,” are just about the most cultured and genteel proposals for socialist dictatorship I’ve ever seen. Lenin, Hitler, Stalin, and Mao are illiterate boors by comparison.
The great international bankers and industrialists do not favor competition. What they favor is the formation of cartels and monopolies to control world finance, markets, and natural resources. The Communists, led by the Soviet Union, have basically identical goals on the level of world power. What is more natural than for the Western monopolists to divvy up these spheres with the Communist monopolists of the East? There is a great deal more to it than that, but I think I’ve made my point. An Interview with Gary Allen by John Rees

Committee of 300 (aka Olympians)
Shadow government

Targets of the Illuminati and the Committee of 300 By Dr. John Coleman.

Thanks to the sworn testimony of Guerzoni, Italy and Eu- rope but not the U.S. learned that Kissinger was behind the death of Aldo Moro. This tragic affair demonstrates the ability of the Committee of 300 to impose its will upon any government without exception. Secure in his position as a member of the most powerful secret society in the world, and I am not talking about Freemasonry, Kissinger not only terrified Moro, but carried through on his threats to “eliminate” Moro if he did not give up his plan to bring economic and industrial progress to Italy. In June and July of 1982, the wife of Aldo Moro testified in open court that her husband’s murder came about as a result of serious threats against his life, made by what she called “a high ranking United States political figure.” Mrs. Eleanora Moro repeated the precise phrase reportedly used by Kissinger in the sworn testimony of Guerzoni: “Either you stop your political line or you will pay dearly for it.” Recalled by the judge, Guerzoni was asked if he could identify the person Mrs. Moro was talking about. Guerzoni replied that it was indeed Henry Kissinger as he had previously intimated.- John Coleman, The Story of The Committee of 300, p. 7

The Order of the Garter is the secret inner group which is an elite group within the Order of St. John of Jerusalem which is the British part of the Knights of Malta. The Knights of the Garter are the leaders of the Committee of 300. They are diabolical men. Lord Peter Carrington, who is a member of the satanic Order of Osiris and other demonic groups is a member of the Order of the Garter. Lord Palmerston is an example from history of another similar example of a Knight of the Garter who was totally corrupt, pretended to be a Christian, and practiced Satanism. Bloodlines of the Illuminati 4. DuPonts

To bring about depopulation of large cities according to the trial run carried out by the Pol Pot regime in Cambodia. It is interesting to note that Pol Pot’s genocidal plans were drawn up in the US by one of the Club of Rome’s research foundations, and overseen by Thomas Enders, a high-ranking State Department official. It is also interesting that the committee is currently seeking to reinstate the Pol Pot butchers in Cambodia. Targets of the Illuminati and the Committe of 300 By Dr. John Coleman.

http://www.geocities.com/lord_visionary/committeof300.htm

This committee of 300 is modeled after the British East India Company’s Council of 300, founded by the British aristocracy in 1727. Most of its immense wealth arose out of the opium trade with China. This group is responsible for the phony drug wars here in the U.S. These phony drug wars were to get us to give away our constitutional rights. Asset forfeiture is a prime example, where huge assets can be seized without trail and no proof of guilt needed. Also the Committee of 300 long ago decreed that there shall be a smaller-much smaller-and better world, that is, their idea of what constitutes a better world.

The myriads of useless eaters consuming scarce natural resources were to be culled. Industrial progress supports population growth. Therefore the command to multiply and subdue the earth found in Genesis had to be subverted. This called for an attack upon Christianity; the slow but sure disintegration of industrial nation states; the destruction of hundreds of millions of people, referred to by the Committee of 300 as “surplus population, ” and the removal of any leader who dared to stand in the way of the Committee’s global planning to reach the foregoing objectives. Not that the U.S. government didn’t know, but as it was part of the conspiracy, it helped to keep the lid on information rather than let the truth be known. Queen, Elizabeth II, is the head of the Committee of 300.

The Committee of 300 looks to social convulsions on a global scale, followed by depressions, as a softening-up technique for bigger things to come, as its principal method of creating masses of people all over the world who will become its “welfare” recipients of the future. The committee appears to base much of its important decisions affecting mankind on the philosophy of Polish aristocrat, Felix Dzerzinski, who regarded mankind as being slightly above the level of cattle. As a close friend of British intelligence agent Sydney Reilly (Reilly was actually Dzerzinski’s controller during the Bolshevik Revolution’s formative years), he often confided in Reilly during his drinking bouts. Dzerzinski was, of course, the beast who ran the Red Terror apparatus. He once told Reilly, while the two were on a drinking binge, that “Man is of no importance. Look at what happens when you starve him. He begins to eat his dead companions to stay alive. Man is only interested in his own survival. That is all that counts. All the Spinoza stuff is a lot of rubbish”. 
http://fourthdimension.freeyellow.com/Committee300.htm

EXCLUSIVE: LARGEST PEDOPHILE RING IN HISTORY, 70,000 MEMBERS, HEADS OF STATE

EXCLUSIVE: LARGEST PEDOPHILE RING IN HISTORY, 70,000 MEMBERS, HEADS OF STATE

 


By Gordon Duff / References: NBC News;


Millions read the news today, the pedophile ring “busted” or the earlier article about how the FBI actually ran it for several weeks, expanding it, drawing in tens of thousands.

Those who read it thought they knew, thought they were getting the story but as is so often the case, the truth goes so much further.

When Veterans Today tied the murder of Supreme Court Justice Anthony Scalia to a White House blackmail plot and a strange tale involving the Keshe Foundation, it became clear that the highest and most powerful in Europe, the US and around the world, were tied together in a web of ritual child abuse on a massive scale.

Today’s story is one more aspect of this. VT’s involvement goes back to 1991 when key VT staffers worked for America’s intelligence community.

A GOP high level staffer approached the CIA claiming that President George H.W. Bush was being blackmailed. It was said that the President was at a political fundraiser in St. Louis where, unknown to the President, top GOP campaign donors were having sex with young males, some of whom had been spirited away from Boys Town in Nebraska of Father Flanagan fame.

The rumors became more than rumors when Bush 43 took office and brought with him, according to a high level White House informant, a virtual army of Neocon pedophiles and “nancyboys” who set the tone for 8 years of crushed civil liberties, staged economic crashes and the dirtiest wars in America’s history.

The door didn’t open again until Iranian physicist, Mehran T. Keshe came to us with his own story. Invited to Belgium, sponsored by the Royal Family, Keshe was introduced to internet guru Sterling Allen and Belgian “fixer,” Dirk Lauressens.

Within a short time, it became clear that he was there as a prisoner, not a guest, having fallen into a web of pedophiles that control public life in Belgium and the Netherlands, control corporations, courts, the police and do so rather publicly.

With Keshe’s story, we traced Sterling Allen, through his work with Belgium’s Royal Family, to his questioning by the FBI, to the seizure of his computers and eventually to his real task in life, webmaster for a massive pedophile ring that supplied children for the members of secret societies that control our daily lives through suppression of technology and the waging of endless war.

From NBC News:

“Massive pedophile ring busted; 230 kids saved

“An Internet pedophile ring with up to 70,000 members — thought to be the world’s largest — has been uncovered by police, a security official said Wednesday.

“The European police agency Europol said in a statement that “Operation Rescue” had identified 670 suspects and that 230 abused children in 30 countries had been taken to safety. More children are expected to be found, Europol said”.

A pedophile ring, 70,000 strong, has been identified and hundreds arrested, an organization run on the internet, centered in the Free Energy Community, including websites run out of Paris, the Netherlands and Belgium.

What isn’t being told is that this same organization, also known as the Red Circle, runs through secret societies around the world:

· Bilderberg

· St. Hubertus

· Federalist Society

· Knights of Malta (Rome, not KMFAP in Budapest)

· Council on Foreign Relations

· Federal Reserve Bank

· NATO

· Royal Families of Belgium, Netherlands and United Kingdom.

· SCOTUS (Supreme Court of the United States)

So much of this story revolves around Mehran T. Keshe, whose plasma related defense technologies, threaten the military balance of power, disabling American stealth drones and even leaving an AEGIS destroyer floating, dead in the water, in the Black Sea.

Anti-Keshe “troll” and convicted pedophile Sterling Allen, former Rense Radio host, now serving a life sentence, is said to have supplied the encryption keys that allowed the FBI to take over the Netherlands based site.

From NBC:

“The website operated from a server based in the Netherlands and, at its height, boasted up to 70,000 members worldwide”, it added.

“It attempted to operate as a ‘discussion–only’ forum where people could share their sexual interest in young boys without committing any specific offences, thus operating ‘below the radar’ of police attention”, Europol said.

Police infiltrated site

The Europol statement said U.K. and Australian police infiltrated the site to identify the members who posed the greatest danger to children. Police also sometimes posed as children online as part of the investigation.

Law enforcement authorities from 13 countries, including the United States, Australia, Canada, Italy, Spain and the U.K., were involved in the case, Europol said.

The statement said Europol analysts had cracked the security features of a key computer server at the center of the network which uncovered the identities of suspected child sex offenders.

And, after his arrest, the forum’s Dutch administrator helped police break encryption measures that shielded users’ identities, allowing police to begin their covert investigations.

“Europol subsequently issued over 4,000 intelligence reports to police authorities in over 30 countries in Europe and elsewhere, which has led to the arrests of suspects and the safeguarding of children”, Europol said.

In September 2015, Iranian physicist Mehran T. Keshe met with the FBI in Rome, a meeting set up by VT. From a source at Europol:

It was this from Veterans Today that helped push this forward:

“It was Keshe’s information given to the FBI in Italy that led to the seizure of Sterling Allan’s computer back in January of 2016, which led to the Obama White House getting files tyingJustice “Tony” Scalia to a child sex ring and demonstrating that it was Scalia that had protected Allan.

“With Justice Scalia exposed to Obama blackmail, his own friends smothered him to death with a pillow, and walked past police, while the world moved on, no autopsy, no investigation”.

Read: Former Victim Claims Scalia Was a Pedophile

That explains why Hollande (President of the French Republic) was scared he is linked to child abuse in France, via Belgium as well.

Abdessalem (Foreign Minister of Tunisia) was traded by the FBI so Hollande can stay in power, sign the tafta and much more allow American military presence in France, which is now turning against him…

That explains why the US military unit near Milan was behind us to see what we had in stock against Bibi (Netanyahu) and Hollande… now that they have Hollande, they are pushing him to the edge, using pressure on Sarkozy, right hand of Bibi, they moved in Tripoli, blackmailing Roma.

Thus, what begins as a hundred arrests, when you peel the levels, involves the French elections and even the recent Bataclan attack in Paris now tied to, if you can imagine it, a police informant smuggled into France through Italy by Tunisia, who out of curiosity runs an anti-Keshe website. Why do they hate Keshe?

Pedophilia Bombshells — The Sick World of the ‘Elite’:

Obama, Clinton, Podesta, Soros, Epstein, Alefantis — All Connected to Pedophilia Claims by ‘Podesta Emails’

Satanic Pedophilia Network Exposed in Australia — It Starts at the TOP, Just Like in the USA and UK

Dozens of UK Politicians Investigated in Massive Pedophilia Ring

The Orange County Pedophilia Ring is Protected – Dozens of Missing Children, Investigators ‘Suicided’

Queen Elizabeth Found Guilty in Missing Children Case — Whistle Blowers Incarcerated, While She is Free

George Bush Pedophile Sex Ring and Blackmail of Congress

Slave Children Forced to Have Sex With ‘Royalty, Politicians, Academicians’ — Bill Clinton Also Visited the Villa

‘Conspiracy of silence’ — the banned/unaired Discovery channel documentary that exposes pedophilia at the highest levels of government.


A FEW SELECTED ARTICLES ABOUT CHINA LAKE:

A FEW SELECTED ARTICLES ABOUT CHINA LAKE:
______________________

SECRET UNDERGROUND BASES / DEEP UNDERGROUND MILITARY BASES IN AMERICA – CHINA LAKE


Unknown to most Americans is a dark secret, and it’s right under our noses. It’s the reality of the existence of DEEP UNDERGROUND MILITARY BASES. These Underground bases get prominent play in dark rumors circulating about captured extra-terrestrials and alien technology. The fringe culture rumors of underground alien-human shenanigans are in reality fed by leaks from questionable individuals, usually with intelligence connections. They are simply a ploy utility for the status quo. The whole captured-alien-hardware story is just a highly elaborate hoax to discredit those exposing the reality of these bases. They are also a cover for the wholesale looting of the federal treasury by the corrupt and cynical secret government. After Hurricane Katrina left the gulf coast region totally devastated, there were many witnesses coming forward with reports of UN and UNISEF Troops working alongside the Army of the Republic of Mexico Soldiers in the New Orleans area. When the day of Martial Law comes in America, the UNISEF and UN troops located in Central America, in the US, and Canada will be deployed to help round up the millions of Americans whose names appear on the CIA Red List and the CIA Blue List. These troops are Chinese, Russian, German, Polish, Japanese, Ukrainian, Saudi Arabian, Pakistani, Mexican, Honduran, Salvadorean and Chilean, and many are stationed in the deep underground military bases. When that day comes in America, do not expect the FoxNews Network, NBC, CBS, ABC, CNN, BBC News 24 or Reuters to give a full or accurate account of the truth. Mass detentions in camps and the underground bases, along with mass executions will occur, like they have in many other countries like Cambodia, Russia, China, Germany, Poland, Armenia, Georgia, Belarusia, Hungary and the Ukraine over the past lOO years. The best option for many Americans will be to have a safe place in a remote area where you can hide. The America you and your forefathers knew is coming to an end thanks to the Illuminati controlled secret government, and now they want America to become a Third World Nation ruled by a Fascist Police State, under their dictatorial control. This obviously cannot be achieved if America stays the way it is with many still being relatively well off, and still possessing firearms. Only the people of America can stop the coming American Holocaust from occurring. In America alone there are over 120Deep Underground Military Bases situated under most major cities, US AFBs, US Navy Bases and US Army Bases, as well as underneath FEMA Military Training Camps and DHS control centers. There are also many Deep Underground Military Bases under Canada. Almost all of these bases are over 2 miles underground and have diameters ranging from 10 miles up to 30 miles across! They have been building these bases day and night, unceasingly, since the 1940s. These bases are basically large cities underground connected by high-speed magneto-levity trains that have speeds up to 1500 MPH. Several books have been written about this activity. Richard Souder, a Ph.D. architect, risked his life by talking about this. He is the author of the book, ‘Underground Bases and Tunnels: What is the Government Trying to Hide’. He worked with a number of government agencies on deep underground military bases. The average depth of these bases is over a mile, and they again are basically whole cities underground. They have nuclear powered laser drilling machines that can drill a tunnel seven miles long in one day. (Note: The September, 1983 issue of Omni (Pg. 80) has a color drawing of The Subterrene,’ the Los Alamos nuclear-powered tunnel machine that burrows through the rock, deep underground, by heating whatever stone it encounters into molten rock.) The Black Projects sidestep the authority of Congress, which as we know is illegal. There is much hard evidence out there. Many will react with fear, terror and paranoia, but you must snap out of it and wake up from the brainwashing your media pumps into your heads all day long. Are you going to be a rabbit in the headlights, or are you going to
stand up and say enough is enough? The US Government through the NSA, DOD, OA, DIA, ATF, ONI, US Army, US Marine Corp, FEMA and the DHS has spent in excess of 1 2 trillion dollars building the massive, covert infrastructure for the coming One World Government and New World Religion over the past 40 years. There is the Deep Underground Military Base underneath Denver International Airport, which is over 22 miles in diameter and goes down over 8 levels. It’s no coincidence that the CIA relocated the headquarters of its domestic division, which is responsible for operations in the United States, from the CIA’s Langley headquarters to Denver. Constructed in 1995, the government and politicians were hell bent on building this airport in spite of it ending up vastly over budget. Charges of corruption, constant construction company changes, and mass firings of teams once they had built a section of their work was reported so that no “one” group had any idea what the blueprint of the airport was. Not only did locals not want this airport built nor was it needed, but everything was done to make sure it was built despite that. Masonic symbols and bizarre artwork of dead babies, burning cities and women in coffins comprise an extensive muralas well as a time capsule – none of which is featured in the airport’s website section detailing the unique artwork throughout the building. DIA serves as a cover for the vast underground facilities that were built there. There are reports of electronic/magnetic vibrations which make some people sick and cause headaches in others. There are acres of fenced-in areas which have barbed wire pointing into the area as if to keep things in, and small concrete stacks that resemble mini-cooling towers rise out of the acres of nowhere to apparently vent underground levels. The underground facility is 88.3 square miles deep. Basically this Underground Base is 8 cities on top of each other! The holding capacity of such leviathanic bases is huge. These city-sized bases can hold millions and millions of people, whether they are mind controlled, enslaved NWO World Army Soldiers or innocent and enslaved surface dwellers from the towns and cities of America and Canada.

tunnels_aliens.gif

UNITED STATES UNDERGROUND CITIES, BASES AND TUNNEL SYSTEMS

GOVERNMENT MAP OF UNDERGROUND TUNNELS

ALASKA

1. Brooks Range, Alaska

2. Delta Junction, Alaska

2a. Fort Greeley, Alaska (reported by Peachy)
In the same Delta Junction area

ARIZONA

1. Arizona (Mountains) (not on map)

Function: Genetic work.
Multiple levels

2. Fort Huachuca, Arizona (also reported detainment camp)
Function: NSA Facility

Notes: (I lost the name of who sent me this. .let me know..)

“Having spent the better part of my life there I can assure you of only one thing, it is THE communications command central for the entire US Army (and rumored to be for the entire US forces) No phone call, two way radio transmission, satellite transmission, fax, etc., within the Army goes undocumented and un “cleared” by this
facility. It is VERY high on the “first to be hit in a nuclear war” list, (as supposedly most communications with the Army are actually routed though there) thus all the
missile silos that were (not really) deactivated around Tucson, some 75 miles to the NW”.

“As for any underground activity, I have no idea, but I do know this, they also do “radar testing” there. They put “planes” on a tower and fire a radar at them to “get a
reading”(?) from a HUGE (I’d say 10 story) microwave radar dish, (it was visible from the highway several miles away). The whole facility sat out in the middle of a
several hundred (or possibly thousands) acre field, oddly devoid of most all naturally occurring groundcover, bushes and trees for the area except for wild grass, and even that was very seldom green. HMMMM. My Dad used to work the crane lifting these “planes” onto the tower, a duty they only allowed each person to do for a few weeks
and then only one or two rotations in a lifetime – can you say radioactive sickness? By the way, he recently went though his THIRD fight with cancer in 8 years). He had to
have the highest level clearance ever given to any civilian in his branch of the civil service. He said many times these “planes” were under tarps, (which were never lifted
while he was present) and didn’t have any shape he recognized as an airplane at all, but when they did put an actual plane up there, they were usually older and even many times, out of service models. Now why would they need radar info on those?
Can you say smokescreen?

I was constantly amazed how many times my friends and I would go out 4-wheeling MILES in the opposite direction of the Fort, and would run into locked gates with
“No Entrance, Govt Property” signs on them! Needless to say, the Govt owned much of the land around the Sierra Vista/Ft Huachuca area. Just thought you’d like to
know”.

FORT HUACHUCA, ARIZONA – Had and possibly still does have a large underground and tunnel system that is occupied by a Top Secret communications and cryptography unit. NSA either commands or has peripheral use of the facility. The Arizona military site is also one of the many designated detainment (concentration) camps authorized by our government, under the homeland security act, is martial law is necessarily declared.

2. Luke Air Force Base

3. Munds Park, Arizona highway rest stop (reported by Dumpgoddess. Verified by Sid and also Becky, who says she was almost arrested asking what the hell they were
doing there when they were building this thing)

Dumpgoddess told me she used to work at a highway rest area known as Munds Park. One day some military trucks and men pulled in and pretty much said OK, thanks for
working here, we’re closing the place, Buh-bye!” They spent years expanding the site and then left. The rest stop is still closed to any traffic and the entrance and exit road
to it from the highway have been ripped up. Another person I know in that area said there are unmarked military trucks and vehicles parked in the back now and the place “is huge” compared to what it was, and looks quite deserted in spite of the construction.

“I live 20 miles out of Flagstaff AZ. .There is a rest area 1/2 mile away. When the government was building this rest area it took almost 3 l/2yrs to complete, and there
were tall fences with dark canvas-like tarps all the way around the area so no one could see what was going on .There were also big army looking trucks pulling in and
out all night, every night. Everyone in Munds Park could hear them coming and going. Now the govt, is closing the rest area for good. I’m told the fences will be put back up. I would bet my life on the fact that there is something under this rest area. You see I worked at Christensen (name of rest area) up untill a week ago.

4. Page, Arizona

Tunnels to: Area 51, Nevada Dulce base, New Mexico

5. Sedona, Arizona (also reported detainment camp)

Notes: Located under the Enchantment Resort in Boynton Canyon. There have been many reports by people in recent years of “increased military presence and activity” in the area. A local resident, Deana, told me her and her husband are thinking of moving because it’s gotten so intrusive. Sedona is felt to be a very spiritual area and was (is) a cultural and holy area for Native Americans and is stunningly gorgeous.

SEDONA – Famous for its massive vortex, is claimed to be an ancient colony of the Lemurians.

According to Commander X, there are reports of a joint-operational underground city and facility under the Enchantment Resort in Boyton Canyon, where clone-like men in black have been seen, along with unusual electromagnetic vortex phenomena. Source David Icke, Children of the Matrix notes that Sedona is associated to UFO activities with a reptilian underground base where members of the reptilian race work with their human or part-human puppets in the Illuminati on the scientific and genetic agenda. The base would appear to be under Boynton Canyon in Sedona. This is not far from the reservation of the Hopi tribe, which has Lemurian connections.

6. Wikieup, Arizona

Tunnels to: Area 51

In Arizona we have sites at Wickiup and Page.

7. Yucca (Mtns.), Arizona
Arizona Tunnels and Caves

GRAND CANYON – Cave[s] near the confluence of the Colorado and Little Colorado rivers. Hopi legends say that their ancestors once lived underground with a friendly race of “ant people” [not to be confused with the sinister “mantis” people described by several abductees], but some of their kind turned to sorcery and made an alliance with lizard or serpent men known as the “two hearts”, which dwelt in still deeper caverns below. The “flood” of evil and violence forced the peaceful Hopi’s to the surface world. An explorer named G. E. Kincaid claimed to have found “one of” the ancient caves, in which were reportedly discovered Oriental, Egyptian & Central American type artifacts. Smithsonian archaeologists S. A. Jordan and associates also explored the man-made cavern with hundreds of rooms, enough to hold over 50 thousand people. The underground city is about 42 miles upriver from El Tovar Crystal Canyon and Crystal Creek, and about 2000 feet above the river bed on the east wall. John Rhodes after 3 years of field research reportedly discovered the Grand Canyon city, which is now being used as a museum for elitist groups and has lower levels that are being used by “super secret black book operatives”, which can only be entered via a stainless steel door at the bottom of a stairwell deep within the “city”
that is “guarded by a very lonely soldier staring into the darkness… dressed in a white
jumpsuit and armed only with an Ml 6 assault rifle to ward off his imagination”.
source:

ARIZONA GAZETTE, March 12, 1909 & April 5, 1909; Robert Morning Sky; John
Rhodes
ARIZONA, SUPERSTITION MTS. – Several people claim to have had experiences with all types of alien beings inhabiting underground levels below the superstitution
Mts. east of Phoenix. Early reports speak of humans and human-dwarfs inhabiting the caverns of the region, although in the 20th century reports of reptilian and grey type aliens have increased. Some encounters involve white-greys from Epsilon Bootes, humanoid or reptiloid “deros” in black hooded cloaks using abducted/programmed humans above and below as mind slaves or worse; reptilian humanoids with integrated human DNA abducting and raping women; and various other regressive underground scenarios, source: Kaye Kiziar; Commander X; Brian Scott; Steve Brodie; Hank Krastman
ARKANSAS

CUSHMAN – Caverns west and west-north- west of the town are legendary for stories of deep cavern systems, encounters with hairy humanoids with an attitude, giant
serpents and insects, deadly gas pockets, strange electro -magnetic phenomena and unexplained disappearances. One of these is “Blowing Cave” which lies in the mining
area NW of Cushman and is located 1/4 mile north of a road leading west from Cushman, one of several caverns in the area, some of them possibly connecting at the deeper levels. Between the large entrance and an underground lake far back in the cave is a trail that winds through an area of rubble or “breakdown”. The trail is intersected by a crack in the earth [between the entrance and the lake] that, if followed into the breakdown, widens enough to enter. This chasm is reportedly an entrance to the endless networks of the alien underworld, source: Charles Marcoux – George Wight – D. A. Lopez; TRIP TO A CUSHMAN CAVERN
CALIFORNIA

Reported massive, very deep underground installations are said to run out of Nevada and into eastern California. So much of the region is controlled by Federal departments and agencies, whether the Pentagon, Department of Interior, Department of Agriculture, Department of Energy, or unknown agencies, as in the case of Area 51, that that entire area of the country is essentially one large Federal Government Multi- Agency Reservation.

Numerous military bases sprawl across the landscape, and then there are National Forests, National Monuments, and other lands under Federal control. This provides the Feds with the opportunity to move almost any necessary personnel and equipment around without attracting undue attention.

Commentary from Shepard Ambellas: The very idea of underground bases has fascinated me ever since I was a kid. In fact, I lived near an area in which I believe a deep underground/undersea base is located. My general consensus is not based off speculation, rather it is backed by major observation and collaborating encounters of others in the area. Many close friends and local people in the area including myself had experienced strange phenomenon. On several occasions I, and others I know, witnessed (what I believe to be) possible secret government “Black Craft” technology (as mentioned by the late Phil Schneider during presentations he gave exposing the New World Order’s covert activities before he was allegedly murdered), such as the TR-3B triangle craft. At this time I will not go into detail of an extremely close encounter myself and others had with a massive craft, but I will divulge the location. Naval Submarine Base Bangor, Washington State in my opinion serves as a massive underground/undersea hub for black bag projects.
*An excerpt from global security.org reads:

In June 2004, SUBASE Bangor merged with Naval Station Bremerton. The new command was named Naval Base Kitsap. The U.S. Naval Submarine Base (SUBASE),
Bangor is located on the east shore of Hood Canal. The pier facilities of the base are located along two nmi of waterfront. The primary berthing facilities at SUBASE
Bangor consist of four separate pier complexes: “KB” Docks, Delta Pier, Marginal Pier, and Explosive’s Handling Wharf. Trident submarines berth at Marginal Pier
South and at Delta Pier North and South.
They also use the Explosives Handling Wharf and the dry dock on Delta Pier. According to harbor authorities, submarines are rarely nested, and when they do, are nested only for a day or two. Pier decks have a nominal height of 20 ft above mean lower low water. Alongside water depths vary from 45 ft at Marginal Wharves North and South, to 60 to 115 ft at the Delta Piers. The primary berthing facilities at SUBASE Bangor consist of four separate pier complexes: “KB” Docks, Delta Pier, Marginal Pier, and Explosive’s Handling Wharf. Trident submarines berth at Marginal Pier South and at Delta Pier North and South. They also use the Explosives Handling Wharf and the dry dock on Delta Pier. According to harbor authorities, submarines are rarely nested, and when they do, are nested only for a day or two. Pier decks have a nominal height of 20 ft above mean lower low water. Alongside water depths vary from 45 ft at Marginal Wharves North and South, to 60 to 1 15 ft at the Delta Piers.

No anchorages exist at SUBASE Bangor. Mooring buoys for barges are available near the KB docks. SUBASE Bangor has a complement of three 2,000 hp YTB tugboats
and a twin-screw 1,600 hp commercial tug. Local authorities state that pilots are used for all submarine arrivals at Bangor. Pilots can be picked up at any point in the area from Foul Weather bluff at the entrance to Hood Canal southward to off Bangor, as requested. If a submarine commanding officer has passed through the Hood Canal Bridge once, a pilot is optional on departures. If tug assistance is required, pilotage is mandatory

Southwesterly winds directly impact Bangor’s dock facilities due to the orientation of Hood Canal. Winds are amplified as they are funneled north east ward through the canal by the orientation of the canal with respect to the adjacent topography. Operations at the Explosives Handling Wharf, Delta Dry dock, and the Magnetic Silencing Facility will cease if wind velocities reach 25 kt. Wind alone is not a problem for moored submarines, but it does cause waves to wash over their hulls.
The KB Docks are used by small craft from the Naval Undersea Weapons Engineering Station (NUWES) at Keyport. Bangor harbor pilots state that lines are doubled and dead-man lines and buoys are used to prevent excessive motion of moored vessels during periods of strong southwesterly winds. Most vessels are
moored on the inboard side of the piers, but YTT’s (torpedo recovery boats – 135-140 ft long/1,600 tons) moor to the outside of the piers and are exposed to whatever
conditions exist in Hood Canal.

The only identified hazard at SUBASE Bangor is a strong southwesterly wind funneling through Hood Canal. Because of their low hull profile, wind does not pose a direct hazard to submarines. It can, however, impact the ability of tugs to work alongside submarines. It would also affect the operations of small craft and YTT’s from NUWES Keyport utilizing the KB Dock complex. Anytime winds approach 50 kt, the Hood Canal Bridge is closed to auto traffic and kept in an open position to reduce wind stress on the bridge structure. The floating bridge was partially destroyed by winds/waves on February 13, 1979 during an extremely strong wind storm. The southwest berth of Delta Pier and the KB docks experience four to six ft swell during periods of strong (up to 60 kt) winds. As long as access hatches on submarine hulls are closed, the waves do not pose a direct problem to submarines. However, if tugs are alongside a submarine, wave motion may cause the tugs to pitch up and down with potential damage to the submarine hull. To preclude such damage, normal tug operations are suspended in strong wind situations.

/ will be doing a massive in depth article on this base and some of the phenomenon in the area as an addition to this exclusive underground base series provided by Dr.
Richard Sauder. I encourage anyone to comment regarding the locations provided in the article (in the comments section).
* * *

if Wil’*V ^

gpkite. 1410 jnb,

J ak& h*i* ^

tier, *y ajprt^iM^? i^d+iK
1 1 frustration J-L S ketdi or secret, Norwegian underground, base, hioic the huge
liirn: ii.-.ii»?3s – inur? titan 600 yartk mi the hie nit diitteiisiun alone, The SIM «l I he
individual bays is garganruan. Also, nance that there may possibly be more than one level
to ihi 1 – 1. 1 1. i lii y h k impressively large as it is; it there are additional Levels or section; then
its m/x j is more impressive still. (St?urcr. personal letter I rum member of A merit an

1 1 1 J 1 1 1 1| L . 1
This list should give you a brief idea of what is under our feet. I am sure that there are many more facilities than those I have just discussed above. Please take due notice
that many of these installations are gargantuan. An expert source once described to me an excavated underground space he was familiar with that was inside a mountain: it was approximately 1,000 feet high, 600 feet wide and 1,000 feet long. He wanted to give me an idea of the state of the art in hard rock, underground excavation. I was impressed, as I suspect you would be too. We are faced with a global system that is so secretive and so wildly out of control that the vast majority of us have no earthly clue as to what is going on, on this, the planet that we inhabit.

The Elevator to the Sub -basement

During the course of my research I have spoken to several people who allege to have been escorted down into secret or highly secure underground facilities. A long, deep elevator ride is a common feature of their accounts. Right about here, I imagine you are thinking to yourself: “How deep do the elevators go?” The short answer is that the
documentation in the open literature suggests that the answer would be anywhere from hundreds to thousands of feet, based on the capabilities of high-rise elevators
built by companies such as Otis and Thy s sen Krupp. The testimony of the people I have spoken with comports well with that information. I have also run across softer,
undocumented information from time to time that suggests that some facilities go even deeper, several or even many miles deep. I have little interest in doing an
exhaustive survey of the elevator literature, but let me provide you just a few brief ideas of the state of the art in that industry. Keep in mind that an elevator system that
is installed in an interior elevator well and goes to the top of a high building could just as easily be installed in a vertical shaft that goes straight down underground. Multiple elevators could be staggered on multiple levels to go down and down, as deeply as you desire. The same technology can be used in either case, whether you are going up, or down . Otis Elevator Co. announced plans in 2002 to install high speed Skyway elevators in the new 880 foot tall Eureka Tower in Melbourne, Australia, that rise at 1,800 feet per minute. Otis also planned to install its innovative Gen2 flat belted elevator hoist system on the same project, that utilizes a permanent magnet machine, or which is quieter and takes up less space than the traditional elevator machine room.- Another article I encountered referred to a “mile-high, multidirectional elevator being developed for Otis Elevator Co. for use in extremely tall buildings of the fiiture.”- Obviously, if a company can develop a mile-high elevator, it can also develop a mile-deep elevator. Toshiba /G.F.C. Elevator installed two high-speed elevator cars in the Taipei 101 tower that zoom up to the 89 th floor observation deck at an ear-popping 3314 feet per minute. ^That will give you a little idea from the open literature of how fast and how high modern elevators can go – very high and very fast! As I dug into the elevator literature a little more I happened to read a book by Jason Goodwin, about the Otis Elevator Company. The book is entitled, Otis: Giving Rise to the Modern City. I did not know who Mr. Goodwin was until I read his book, but I quickly came to understand that he is an extremely knowledgeable man in the field, having worked for Otis in a variety of important positions for 37 years, and then having formed his own elevator consulting company after his retirement form Otis. I read the book carefully and I found out a few interesting things for my research: J –
1. Elevators can be located in, and I quote verbatim: “. . .the legs of a deep-sea oil production or oil production platforms, and in many other extraordinary locations.”

2. There are very large platform “lifts for extremely special applications” that may use a variety of lifting technologies, including “screw jacks”.

3. And in a very brief summary at the conclusion of his most informative book, Mr. Goodwin briefly mentions the elevators “that are never mentioned but are needed to
service the extensive infrastructures that make the cities run – the power plants, refineries, factories, and underground facilities (my emphasis).

Amen brother, underground facilities and the elevators that service them. That is what this book is about. Mr. Goodwin doesn’t really elaborate about that topic to any
appreciable extent. But to his credit he does indeed mention elevators that service
UNDERGROUND FACILITIES BENEATH THE NATION’S CITIES

His mention of the “extremely special applications” that require large platform lifts instantly caused me to reflect on David Adair’s description (elsewhere in this book) of a mammoth, football-field-sized platform elevator supported by huge screws the size of giant sequoia tree trunks that took him underground at Area-51 in Nevada. As for the mention of elevators in the legs of giant oil production platforms, and in “many other extraordinary locations,” the implications for access to manned undersea bases is clear. The Gulf of Mexico and North Sea are dotted with myriad oil production platforms, with their legs sunk into the seabed. Any of those platforms could potentially serve as an entry point to the sub-seafloor environment via elevators in their legs, which would permit personnel to travel to the platform and then travel down below the seafloor. I strongly suspect this is the case in some instances. In his book, Alien Contact, Timothy Good mentions a NORAD offshore platform in the Gulf of Mexico that superficially resembles an oil production platform, but is not in reality an oil platform. The mission of the strange platform seems to be to serve as 1 2 a sort of monitoring station to watch the air space of the USA for UFO activity. – Of course, this begs the question as to how many ostensible offshore petroleum production platforms are not really oil rigs at all, but only resemble oil platforms as
they perform other functions entirely? How many such cases are there? Only the oil companies and major governments would know the answer to that.The average person absolutely lacks the means to ascertain those facts. But thanks to Jason Goodwin’s book, we know that oil platforms have elevators in their legs. Please note that Mr. Goodwin is not alleging that elevators in oil platform legs can go below the seafloor and access undersea, manned installations. That is a conclusion that I am drawing from the available evidence. I am not saying that every offshore oil production platform has elevators in its legs that access the sub-seafloor environment. However,
it is clear that some platforms certainly could serve in this way as entry points to manned, undersea installations.
CALIFORNIA

Indian Legends of California

The Modoc tribe tell that ‘ thousands of snows ago, there was a great storm over Mt.
Shasta. The Great Spirit, who lived within the mountain, sent his youngest daughter
out to speak to the storm and tell it to stop blowing so hard, or else the mountain
might blow over. He also told her not to stick her head out the top of the mountain, or
the wind could catch her long, red hair, and blow her away. The girl, however, having
never seen the sea, was overcome with curiosity and stuck her head out of the top of
the mountain to see it. As her father the Great Spirit had warned, her long, red hair
caught the mighty wind, and she was blown away. Fortunately a group of Grizzly
bears found her and took her in. These Grizzly bears were not like modern Grizzlies, however, they were more like humans, walking on two feet, and when the Great
Spirit’s daughter came of age, she married the oldest Grizzly’s son. Their children
were then a combination of spirit and animal, having the nature of both; they were the
first Modocs.’

There have been tales of strange-looking, robed persons emerging from the forests
and coming into nearby towns surround Mt. Shasta to trade gold nuggets for supplies:
‘These odd looking persons were not only peculiar in their dress and different in attire
from any costume ever seen on the American Indian, and especially in the California
Indian, but distinctive in features and complexion; tall, graceful and agile, having the appearance of being quite old and yet exceedingly virile.’ A protrusion in the center of their very high foreheads was said to be a special organ enabling them to
communicate by telepathy. When approached by townspeople, the Lemurians would
apparently vanish into thin air.

According to the Brotherhood of the White Temple in Sedalia, Colorado entitled
Mysteries of Mount Shasta, that it is Atlanteans, not Lemurians, who inhabit Mt.
Shasta. Though the Lemurians had indeed created vast, underground pleasure palaces
beneath the mountain, they had lost their freedom in a great war with the Atlanteans,
and remain imprisoned by the Atlanteans in their pleasure palaces even today. “After
their retreat, the Atlantean victors sealed the entrance and established an elaborate
guard system which prohibits the Lemurians to ever escape their bondage. The
Atlanteans, Dr. Doreal states, still reside in their colony beneath Mt. Shasta and
commute every three months by strange cigar-shaped airships to an area in the South
Pacific in order to check the sealed entrance of the imprisoned Lemurians.” It is these
aircraft, some say, that accounts for the occasional appearances of UFOs above Mt.
Shasta.

The Paihute Indians of the southwest USA claim that a Greek or Egyptian-like race
first colonized the massive caverns within the Panamint Mts. thousands of years ago
[one source claims the base was established around 2500 B.C., which is incidentally
about 600 years following the beginnings of the rise of Egyptian intellectual culture]
when Death Valley was part of an inland sea connected to the Pacific Ocean. When
the sea dried up these people — who were described as wearing flowing robes draped
over one shoulder, head-bands holding back their long dark hair, and bronze-golden
skin — out of necessity began to develop their collective knowledge and intellect and
soon afterwards began to construct “silvery flying canoes”. At first these flying
machines possessed wings, were relatively small, and flew with a dipping movement
and a loud ‘whirring’ noise. As time passed the ships became wingless, grew larger in
size, and flew ever more smoothly and silently. Eventually these people, the
HAV-MUSUVS moved their civilization into still deeper caverns which they had
discovered farther underground, and commenced to explore the nearby planets and eventually other star systems as their own technological explosion began to refine every aspect of their society. These Hav-musuvs have apparently had interplanetary or
interstellar travel for 3000-4000 years since they first developed their flying machines.
Could they have been one of the many native-terranian “ancient astronaut”
civilizations which apparently had colonized Lyra and other systems? The story of the
Panamints was related by a Navaho Indian by the name of Oga-Make, who in turn
heard it from an old Paihute medicine man.

1: 29 Palms, California

Tunnels to: Chocolate Mts., Fort Irwin, California (possibly one more site due west a
few miles) Notes: Some Alien autopsies said to have been performed at 29 Palms.

29 PALMS MARINE BASE – Underground facilities involved with recovered alien
technology and research. Also a geological anomaly in the area created by sea water
rushing in to underlying caverns when the area was under water, creating a tunnel-like
structure from which UFO’s have been seen to emerge. Attempts of Army personnel
to send cameras down resulted in the camera cables being “cut”, and attempts to send
military speleonauts down on ropes resulted in the explorers being exposed to a
noxious blue gas which had apparently been released from below to prevent them
from descending, source: Val Valerian; 29 PALMS MARINE BASE

ANAHEIM – On Nov. 3, 1989, radio talk show host Ken Hudnell announced his
intention to take a group to visit an ancient underground city 60 miles from Anaheim,
source: THE LEADING EDGE; KEN HUDNELL

BAKERSFIELD – In 1972 Wanda Lockwood of Bakersfield reported that in 1970 she
was playing with her son in his bedroom when what sounded like a large steel
hammer struck the concrete basement floor 3 times. Her child Danny was so surprised
that he began to cry. Having heard a similar noise several months earlier beneath her
living room, Wanda was curious and put her ear to the bedroom floor and clearly
heard “the roar of machinery”. She took a hammer and began to pound the bedroom
[basement?] floor in a 1-2-3, 1-2-3 manner until 5 minutes later a “being” beneath the
floor began to tap back in the same 1-2-3, 1-2-3 manner. She could hear a series of
noises and knocks and then she faintly heard MEN talking to each other, but the
voices were too muffled to understand. In later months she would again hear the
machinery when placing her ear to the floor, but never again the men’s voices, source:
FATE Magazine, April, 1972
BARSTOW – Camp Irwin. Reports of several tunnels below the Camp Irwin area, one
of which is an abandoned mine at the bottom of which is an “earth crack” which leads
to a tunnel that connects with a massive underground river about a quarter of a mile
wide, one of at least five subterranean rivers which rise and fall with the tides,
suggesting the source of origin being a large underground sea below the dry basins of Utah and Nevada. One of these reportedly runs below Kokoweef and Dorr peaks near the SW flank of the Ivanpah Mts. NW of Needles, California. These underground rivers are said to empty into the Pacific or Gulf of California via large aqua caves near the base of the continental slopes, source: DEPTHS OF THE EARTH, by William R. Halliday; Leon Davidson; Richard Toronto; FORT IRWIN; CALIFORNIA’S
UNDERGROUND RIVER CANYONS Leon Davidson, in an early issue of Flying Saucers Magazine, spoke of a large network of “underground tunnels in the California desert, at Camp Irwin, near Barstow.” This may tie-in with an item related by a Los Angeles municipal water director, as related in an early issue of Richard Toronto’s Shavertron letter- zine, stating that this water director knew of 5 large underground rivers which ran beneath the Mojave desert, and that die-traces showed that at least one of these emptied into the Pacific ocean through openings in the continental slopes (One source stated that such a river exited in the Gulf of California). Other sources speak of a “Kokoweef river-system which is alleged to lie below Kokoweef peak just east of Fort Irwin, which looked— according to its alleged discoverer, a Mr. Earl Dorr, and a few “Indians” who also claimed to have been in it—like a “Grand Canyon”
underground. It allegedly consists of a river chasm generally 500 ft. wide and over a
thousand feet high-deep, sided by steep tiered- shelved underground cliffs, huge
stalactites and cataracts. Also, the alluvial sands on the ‘beaches’ along the river,
which allegedly hold a large percentage of gold dust, are said to be several feet deep.
The entrance to this cavern was allegedly dynamited shut by Mr. Dorr to protect
anyone else from getting to “his” gold. There is in fact evidence that Dorr did
dynamite shut the lower level of ‘Kin Sabe’ cave in Kokoweef Peak, and there are
present-day attempts to break through into this underground system. The water of the
river allegedly rose and fell with the tides, suggesting that a very large body of water
might exist upstream, that is if Dorr’s account as well as the accounts of the Indians
were not fabricated).

The municipal water director, according to the Shavertron article, spoke with a man
who claimed that he was hired several years ago by the government to look for water
sources for Ft. Irwin. He alleged to have explored an old mine in the area and found
that deep down, the shaft intersected with an ancient earth fault or chasm- like cave
which continued horizontally for a considerable distance. This government employee followed the chasm and allegedly emerged onto the bank of a huge underground river-cave over a quarter of a mile wide! The tremendous water flow— possibly originating from the waters that apparently disappear beneath the Great Basin, the Nevada and Mojave deserts?— could have ‘fed’ the water needs of all of Southern California.
2: BENICIA, CALIFORNIA

CADIZ – The late Earl Gambrel tells how he was transported by an alien craft one night from the outskirts of Barstow to an area just 2 miles NW of Bonanza Springs, some 13 miles from Cadiz and just south of the Clipper mountain area. He found [or was shown] a cave or tunnel in the side of a hill near a natural rock arch and a peak which looks like it has “a black railroad car on top of it.” After considerable travel underground at a 30 degree descent, he reached an underground city with streets and houses filled with large crystals, now abandoned. He also heard of another man who reportedly found the cave and told others about it, but who was killed shortly thereafter, source: John Winston; Map Location of Cadiz

3. CATALINA ISLAND, CALIFORNIA

Tunnels to: I was told by someone who worked at the Port Hueneme Naval Weapons Division Base in Oxnard that they have heard and it is ‘common rumor’ that there is a
tunnel from the base to this Island, and also to Edwards Air Force Base, possibly
utilizing old mines.

4. CHINA LAKE NAVAL WEAPONS TESTING CENTRE
China Lake is a massive U.S. Navy R&D reservation in eastern California that has long been rumored to be the site of a major underground base. While I can offer no direct proof, short of taking a live video crew underground to take a look around, the
bulk of my research comes down on the side of a massive complex beneath the China
Lake Naval Weapons Center, along Rte. 395, in the general vicinity of the town of
Ridgecrest.

CHINA LAKE – A woman names “Diane” claimed that she has had numerous alien
encounters since childhood. During one encounter she was taken to a joint alien-military facility deep beneath the China Lake Naval Weapons Test Center via
magnetic a elevator to a huge facility where she observed numerous humans and
animals in cages who had been bio -genetically altered. Also, possible massive
underground facilities beneath Argus and/or Southeast Peaks NW of Trona in the
China Lake Reserve, source: ALIEN MAGIC, by William F. Hamilton III; UNDERGROUND BASES AND TUNNELS, by Richard Sauder;

CLEAR LAKE – According to Robert K. Newkirk, northern California’s “Clear Lake
has many underground caverns [leading under Mt. Konocti?] that we know have no
endings and others that run to San Francisco Bay.” source: AMAZING STORIES; Mt.
Konocti
5. CHOCOLATE MOUNTAINS, CALIFORNIA

Tunnels to: Fort Irwin, California

The next place on the map where an underground base is, is the Chocolate Mts.
6. DEATH VALLEY, CALIFORNIA

Function: The entrance to the Death Valley Tunnel is in the Panamint Mountains
down on the lower edge of the range near Wingate Pass, in the bottom of an
abandoned mine shaft. The bottom of the shaft opens into an extensive tunnel system
DEATH VALLEY, CA. ENTRANCE

Local Indian legends speak of a tunnel that runs beneath the desert. (Note: The book
“Death Valley Men,” tells the story of 3 people who are supposed to have found an
underground city connected with this tunnel, and who actually took treasures from it.
The entrance to the Death Valley Tunnel is in the Panamint Mountains down on the
lower edge of the range near Wingate Pass,
in the bottom of an old abandoned shaft.
The bottom of the shaft is collapsed, opening an entrance into a large tunnel system
containing much treasure. These tunnels connect with the surface also through arches
(like large windows) in the side of the mountain and they look down on Death Valley.
They’re high above the valley now, but they were once on the edge of the water, and
were accessed by boats. The “windows”
in the Death Valley side of the Panamint
Mountains are about 4,500-5,000 feet above the bottom of Death Valley, and are across from Furnace Creek Ranch. From these openings you can see the green of the
ranch below you and Furnace Creek Wash across the valley. (So, with high-powered
binoculars or a telescope, you should be able to see the openings from the Furnace
Creek Ranch, or Wash.) You can drive down Emigrant Canyon towards Death Valley.
You can then park beside the road between Furnace Creek Ranch and the Salt Bed.
(From here, the windows should be visible through binoculars.) Indian legends of the
Paiutes Indians speak of the people who used to live in the Panamint’s caverns.
7. DEEP SPRINGS, CALIFORNIA

Function: Supposed home to alien species working with government
Tunnels to: Death Valley, Mercury, NV, Salt Lake City

DEEP SPRINGS – Deeps Springs, due east of San Jose and next to the California-Nevada border, is named after a small spring fed lake, within which government divers have reportedly discovered an underground river which they have followed for approximately 27 miles in the direction of Las Vegas, although it is uncertain whether or how much of this is walkable. Deep Springs, according to an agent who was part of a secret CIA paramilitary force called “Yellow Fruit” or ” YF” based at the Nevada Test Site [where they are working with “blond” humanoid
aliens in an effort to fight the Greys at deep springs], is the basing area of a large nest
of grey aliens and communist – homosexual human collaborators who are using the
“National Resources Defense Council” as a front for their agency, and who are involved in an electromagnetic war with the “benevolent ones” who have made allies
within the Nevada Test Site, who serve as advisors to intelligence agencies that are
turning against the greys as a result of betrayals of joint-operation treaties. However there are still intelligence agencies under alien control working at the Nevada Test
Site and especially within the deeper underground levels [the benevolent ones and
their allies essentially having gained the “upper ground”], however the whole scenario is a mess and “out of control”, largely because of the military-industrial “machine” itself which has become so compartmentalized and secretive [even to the exclusion of Congressional oversight] that the true patriots don’t have the freedom or backup to do much damage against their underground nemesis, mainly because of the limitations imposed upon them by fraternal oaths, mental programming, and military security clearances. It is basically every man for himself, UNTIL at least the PUBLIC and
CONGRESS gets involved and adds their support to the patriots who are literally
dying on the front lines in this battle with an alien nemesis which has infiltrated the
very core of the military-industrial complex. Men In Black, by the way, have also been seen at Deep Springs. Also several “stand-offs” allegedly exist throughout the world, the Deep Springs – Nevada Test Site stand-off being possibly the largest and most critical. Gravity anomaly maps also suggest the existence of massive caverns beneath the area. Agent “YF” cited the following coordinates as locations of Deep
Springs extension facilities, in most cases near the bases of mountains near which
portals to the underground installations exist: N 37 22 30 – E 1 17 58 0; N 38 21 0 – E
115 35 0; N 35 39 0 – E 114 51 0; and also Yucca Lake: N 37 0 30 – E 116 7 0. source:
John Lear; LEADING EDGE Newsletter, Dec. 1989 – Jan. 1990
8. EDWARDS AFB, CALIFORNIA

Function: Aircraft Development – antigravity research and vehicle development
Levels: Multiple

Tunnels to: Catalina Island Fort Irwin, California Vandenburg AFB, California
Notes: Delta Hanger – North Base, Edwards AFB, Ca. Haystack Buttte – Edwards,
AFB, CA.

EDWARDS AIR FORCE BASE – The “Haystack” bluff or butte near the launch area
reportedly holds underground levels and surface pylons where pulse beam and stealth
research is being carried out. Haystack Butte is reportedly the central hub of massive
underground activity, with underground connections to other facilities. Witnesses who have described alien activity there have died under mysterious circumstances. Also reports of a 50 mile underground tube-shuttle linking Edwards AFB with the Tahachapi facility, and an ongoing excavation below the base down past 9000 feet, with underground facilities being monitored by hovering remote-controlled basketball sized metallic spheres capable of electromagnetically monitoring the encephalographic waves of base workers and visitors and thus anticipate their intents,
source: B.S.R.F. Newsletter, Dec. 1990; The LEADING EDGE Newsletter, May 1989; William F. Hamilton, III

EDWARDS AIR FORCE BASE: From Edwards a tunnel goes to Vandenberg Air
Force Base From Vandenberg you back up to Edwards and go Southeast to subterranean base at a place that the map designates as Cat., which probably means Catalina Island, showing a flying saucer there so alien spacecrafts are probably seen
there. The map shows an underground base and a tunnel going into it at a place called
29 palms.

EL PASO MOUNTAINS – Below Iron canyon and Gofer, NW of Garlock [over a
dozen miles north of Mojave, California near the El Paso Mountains], there have been
reports of alien beings who control deadly “manchines” which stalk the surface,
especially near Iron canyon, at night. Also reports of secret government monitoring
activity and also a major electromagnetic ‘vortex’ energy field in the area, source:
UFO ANNUAL magazine [year uncertain]; El Paso Mts.; Garlock Fault Zone
ESSEX – Jack Mitchell, founder of Mitchell Caverns [18 miles north of Essex, which
is 28 miles west of Needles and 111 miles east of Barstow on Route 66] claimed that
while exploring a shaft called “The Cave of the Winding Stair” in or near Mitchell
Caverns, he was lowered down a ledge 500 feet, from where he set fire to a gasoline
soaked sock with a rock in it, and watched it disappear into the shaft without seeing it
hit anything, source: CAVEMAN, the autobiography of Jack Mitchell; Mitchell’s
Caverns
9. FORT IRVIN, CALIFORNIA (also reported detainment camp)

Tunnels to: 29 Palms, California Area 51, Nevada Edwards AFB. California Mt.
Shasta, California
10. HELENDALE, CALIFORNIA

Function: Special Aircraft Facility

Helendale has an extensive railway/shipping system through it from the Union Pacific
days which runs in from Salt Lake City, Denver, Omaha, Los Angeles and Chicago

HELENDALE – SW of Barstow. A Lockheed facility known as the RCS [Radar Cross
Section] test range, and also known as the “Helendale” facility. A massive
underground base site and C.O.G. [Continuity Of Government] facility, located 6
miles north of Helendale auxiliary airport. Several underground openings, especially
in the northern end. Also a 100 foot pylon for testing antigravity prototypes. Some
of these pylons are retractable and rise from or sink into openings in the ground,
source: HUFON REPORT, Nov. 1992; Helendale Facility
BETWEEN HOPLAND & LAKEPORT – Edward John spoke of an area midway between the two cities [in the area of the Krishna temple] and somewhat south, where the following has been reported: space-time distortions, attempted attacks by alien creatures at night, an atmosphere of terror covering a 30 mile area, black automobiles disappearing into cliffs, strange voices in an unknown language coming out of thin air, cars mysteriously stalling and starting, rumors of a “bottomless cave” with a stone staircase leading downward, unexplained disappearances of “government vehicles” along the Hopland – Lakeport road, and mysterious deaths among residents of a nearby valley. Also a 1990 magnetic survey identified a large gap in the magnetic field near Lakeport and Mt. Konocti, suggesting a large cavernous expanse below,
source: AMAZING STORIES magazine, May 1946 – Dec. 1946; Route from Hopland [*star] to Lakeport
JUNE LAKE – Jack Peterson reported an encounter near June Lake where he
reportedly observed a small humanoid being exiting from a cone-shaped machine
which had emerged from the depths of the earth, and which disappeared into the earth
after the “alien” had re-entered the craft, source: SHAVERTRON, issue No. 14; June
Lake, California
11. LANCASTER, CALIFORNIA

Function: New Aircraft design, anti-gravity engineering, Stealth craft and testing
Levels: 42
TUNNELS TO: EDWARDS A.F.B., PALMDALE

LANCASTER – A collaboration between Northrup, McDonnel-Douglas and
Lockheed is developing and testing antigravity air and/or space craft in massive
underground facilities. Abductees report being taken to these elaborate multi-billion
dollar underground complexes where they have seen human military personnel
working with grey aliens and in some cases reptilian humanoids. Glowing discs,
triangles, boomerangs, elongated shapes, spheres and other types of antigravity craft
have been seen flying or hovering in the area, as well as black unmarked helicopters,
source: HUFON REPORT, Nov. 1992; Michael Lindemann & Michael Riconosciuto
CALIFORNIA, LANDERS. About a dozen miles north of Yucca Valley is Giant Rock, thought to be the largest free-standing boulder in the world. It covers 5800 sq. ft. and is 7 stories high. It was used in ancient times for seances by native American chiefs. Frank Critzer was the first modern individual to excavate rooms from beneath Giant Rock. According to Hank Krastman, Frank stated that in the process of his excavations he “had stumbled onto some unusual glass-lined tunnels under ground
which went down real deep”. Critzer hollowed out 400 square feet of rooms from
under the north side. Deputies from Riverside county [Giant Rock is in San Bernardino county] during WWII tried to apprehend Frank for questioning as a possible German spy [there were several in the area at the time] but when Frank baracaded himself in his “home” the deputies threw in a tear gas grenade, which ignited a pile of dynamite under his table that was used for excavation. The deep “glass” tunnels may have been buried in that explosion. Frank was killed, and newspapers held with the spy story even though the FBI told George Van Tassel it was not true. George restored some of the rooms under the rock, where he claimed to have had meetings with human ET’s who claimed to be members of a Sol-ar system Tribunal on one of the moons of Saturn. Van Tassel was instructed to build the domed “Integratron” near the Giant Rock, with the belief that the weight of the rock pressing down on the sand-quartz below created an electro-magnetic field similar to the one created about 7 feet above the apex of the Great pyramid, generated by the massive weight
pressing down on the quartz-laden stones. After George passed away the “government” blew up the underground chamber, source: INTERNATIONAL UFO Magazine, article by Hank Krastman; Giant Rock & the Integratron
12. LAWRENCE-LIVERMORE INTERNATIONAL LABS, CALIFORNIA

The lab has a Human Genome Mapping project on chromosome #19 and a newly built
$1.2 billion laser facility
13. MORENO VALLEY, CALIFORNIA

Function unknown
14. MT. LASSEN, CALIFORNIA

TUNNELS TO: Probably connects to the Mt. Shasta main tunnel.
Notes: Two alien races living inside mountain.

CALIFORNIA, MT. LASSEN – Two young men reported the discovery of a glazed
tunnel behind an outcropping of rock at about the 7500 ft. level on the slopes of Mt.
Lassen. They explored the cavern using a strange tunnel vehicle and were captured by
men dressed as surface people who were known as the “horlocks”, humans under the
total mind-control of some alien force, only to be rescued by an underground resistance force. Others have reported abductions near Lassen by a human – reptilian collaboration, source: AMAZING STORIES magazine, Dec. 1946; Mt. Lassen Natl. Park.
CALIFORNIA, LLANO – A large McDonnel-Douglass facility based at the old Grey
Butte Airport, about 6 miles SW of El Mirage dry lake and 9 miles NE of Llano. Also
contains pylons upon which various aerodynamic hulls are placed for stealth and other design tests. Often the objects atop the pylons have been seen to glow at various
intensities, source: HUFON REPORT, Nov. 1992; Map of Llano, California; the Yano [sic/i.e. Llano] Facility & Aliens
CALIFORNIA, LOS ANGELES – On Feb. 12, 1953, witnesses observed an automobile enter the throat of a storm drain near Willowbrook and Greenleaf Avenues. Police followed the fresh tire-tred marks into the tunnel for 7 miles, while other police & flood control workers continued the search by dropping through manhole covers. The search continued until midnight, until 7 miles up the drain the tracks
VANISHED. “In the muddy silt covering the floor of the drain, the tire-tred marks
were sharp and fresh… then no more tracks”. [source:] ‘STRANGE DISAPPEARANCES’, by Brad Steiger
CALIFORNIA, LOS ANGELES – A legendary underground city, now flooded, is
said to lie below the Los Angeles Public Library and surrounding areas. Patterned
after the shape of a lizard, the city is said to be connected to Mt. Shasta, and was built
by an ancient race that revered reptiles. Although filled with gold, parts of the ancient
city has become flooded, source: QUEST FOR THE LOST CITY, article by Sanford
M. Cleveland in AMAZING STORIES magazine, July 1947; see also THE LIZARD
PEOPLE UNDER LOS ANGELES.
CALIFORNIA, LOS ANGELES – In the old Spanish Garavanza district, where Avenue 64 and York Boulevard now lie, there used to be a ranch owned by Ralph Rodgers who had employed several Mexican and Chinese workers. In early 1900 Andrew C. Smith and Charles A. Elder, discovered a rumored tunnel entrance in the
area and reported it to the local newspaper, whose editor confirmed their story. They
explored the tunnel to some depth. They also learned from a Mexican elder of a native
American village that existed on the banks of the Arroyo Seco River. When the Spanish entered the area this man, Juan Dominquez, had explored the tunnel “leading to a gigantic cave and then still going further down”, spreading under the entire village of Garavanza and connecting to the Spanish Church of the Angels on North Avenue 64. One entrance was reportedly located along the west bluff of Arroyo Seco River about 300 feet south of the former Pasadena Ave. Rail Bridge, and about 20 feet above the stream, but the city “blew up” the entrance after children were hurt in the cave, and a Freeway exists now in the area, however a secret opening still exists in the basement of the Spanish church mentioned above. Early visitors to the cave had reported “many caverns and tunnels going deep down, with eerie voices coming from them”. The cave used to be used by natives for ritual purposes, source: Article by
Hank Krastman in THE HOLLOW HASSLE INSIDER, Vol.3, No.l; The Church of the Angels – Los Angeles
15. MT SHASTA

Function: Genetic experiments, magnetic advance, space and beam weaponry.

Levels: 5

Tunnels to: Ft. Irwin, California North (maybe to Klamath Falls or Crater Lake, or
both.

CALIFORNIA, MOJAVE – Stories of underground pits and shafts [some natural, others artificial mine- shafts] leading to underground caverns below Iron Canyon near
the El Paso Mts. NE of Mojave. Reports of underground alien activity, automatons,
and electromagnetic vortexes, all of which are carefully monitored by secret government agents,

[see also: CALIFORNIA, EL PASO MOUNTAINS]
THE MT. SHASTA, CA ENTRANCE

There are tunnels beneath Mt. Shasta that lead to a UFO base there, as well as tunnels
that connect with the vast world-wide tunnel network. The Lemurian city “Telos” is
said to exist beneath Mt. Shasta. William Hamilton has done much research on Mt.
Shasta and the tunnels. He has privately published a book entitled “Alien Magic” 249
North Brand Boulevard, Suite 651 Glendale, CA 91203
16. NAPA, CALIFORNIA

Functions:

Direct Satellite Communications, Laser Communications. Continuation of
Government site.

Levels: Multi- level

TUNNELS TO: Unknown

Notes: Located on Oakville Grade, Napa County, Ca. 87 Acres
17. NEEDLES, CALIFORNIA

Function: unknown
CALIFORNIA, OAKVILLE – Just east of Santa Rosa, there is a secret government
facility that has been constructed near the Oakville Grade, which will reportedly
consolidate many of the C.O.G. [Continuity Of Government] operations of the Military-Industrial Complex. Black “mystery helicopters” have been seen leaving and Pentering the facility on a constant basis, source: Several issues of the NAPA SENTINEL Newspaper

18. PALMDALE, CALIFORNIA

Function: New Aircraft Design, anti-gravity research

CALIFORNIA, PALMDALE – Reports of a multi- layered technology center over 8 levels in depth and the size of a massive city. Many of the workers being “synthetics” and humans with “ultra top secret” security clearances, source: THE PHOENIX LIBERATOR, July 7, 1992; The Skunk Works – Palmdale.
CALIFORNIA, QUINCY – Cossette Willoughby tells about an experience that she
and her husband Ken had while staying at a turnout about 20 miles from Quincy, in a
heavily wooded area. She saw an “old man” with white hair, white shirt and dark
trousers who “swung his head from side to side like a lizard as he walked, he had a
reptilian appearance [and] carried a very elaborate cane [with] a large ball carved on
top with four cobras wound around the stick”. When she tried to get his attention the
“man” ignored her, walking across the road from one patch of woods to another, in an
area where the turnout was the closest sign of civilization for several miles around,
source: Cossette Willoughby of Fairacres, New Mexico; Quincy, California map.
CALIFORNIA, S ALTON SEA – Mountains adjacent to the Salton sea of S. California have been the site of reports of subterranean rock slides, and also legends concerning the ancient “seven caves” of the Aztecs which some believe lie below the area, source: Penny Harper; Salton Sea Naval facility.
CALIFORNIA, SAN DIEGO – The COMTRAPAC submarine base reportedly maintains several underground levels. The 6th sub-level containing a terminal to an sub-shuttle transit system capable of subterraneous hi-speed transit to other U.S. underground bases as far away as Washington D.C. source: UFO JOURNAL OF FACTS, Spring, 1991 [a MUFON research journal], article by Forest Crawford of Illinois-Missouri MUFON; San Diego Sub-Base
CALIFORNIA, SAN FRANCISCO – There is a report of a demolition crew who, several years ago, broke into a subterranean tunnel while demolishing a building. Workers followed the tunnel for a while until they came face to face with hair animal-men whose eyes reflected their lights back at them with a reddish glow.
19. Tehachapi Facility (Northrop, California – Tejon Ranch

Function: Levels: 42

TUNNELS TO: Edwards, Llona and other local areas

Notes: 25 miles NW of Lancaster California, in the Tehachapi mountains.
CALIFORNIA, TEHACHAPI MTS. [NW of Los Angeles] – Several accounts suggest
that the military-industrial complex had entered in to a collaboration with a parasitical alien race. In exchange for advanced technology the industrialists have allowed the aliens to have access to the multi-trillion dollar military-industrial underground network in order to carry out “genetic experiments” on earth. Those who received the new “Trojan horse” technology also received major alien mind-control programming, and as a result the underground networks are quickly being assimilated by the alien collective, effectively controlling the minds of those earth people who pose the greatest threat to alien imperialism, i.e. those who have access to interplanetary technology. Tehachapi is also called the “Anthill”, there are open silos where laser light systems are tested and hovering basket-ball sized cosmodrones or “spybees” monitor all activity above and below ground, where “ground-scrapers” descend at least 2 miles and 42 sub-levels, connecting to other facilities via tunnels and mag-lev shuttles and also to more ancient alien cavern domains [natural and artificial] deep beneath the earth. There are also reportedly cloned humans with cybernetic minds and assimilated reptilian/alien DNA which work in these facilities known as the ‘Orange’ because of their ‘stalky’ yellowish or reddish hair, along with Grey aliens, Reptiloids, Military Industrial Black Ops, and others. This site is also known as the Tejon or Tahachapi “Ranch”, and is located at the mouth of Little Oak Canyon, about 25 miles
NW of Lancaster. It is partially powered by the Kern River hydroelectric project, where there is also a mountain that has been “hollowed out”. One can reportedly drive underground [with required security clearance] from California City to Palmdale to George AFB/Victorville through underground cities and tunnels where aliens have been seen “all over the place”, having free access to the underground network, yet these aliens have been known to abduct or even kill some who have reported their presence there, because the aliens operate “inside our government” [via the Military-Industrial Trojan horse which operates largely outside of Congressional oversight] and do not want their subversive activities to be discovered by the masses or by more benevolent space forces who are at war with these “regressive” alien forces. These regressive aliens attempt to create a facade of benevolence towards those “programmed” humans who work in the underground facilities, or use fear and intimidation towards those who are aware of their true intentions. Reports of abductions and dissections of humans abound, reportedly with the purpose of “finding our weaknesses and learning how to control us” through controlling the social infrastructure upon which most have become dependent, [source:] ‘THE PHOENIX LIBERATOR’, July, 1992; Val Valerian; Michael Lindemann; “High Strangeness in the Antelope Valley”, by William F. Hamilton III
CALIFORNIA, YUCCA MOUNTAIN – Reports of underground tunnels descending several miles beneath the mountain, source: THE PHOENIX LIBERATOR, July 7, 1992; the Los Alamos Labs – Yucca Mountain Project
CALIFORNIA, SANTA ROSA – Underground FEMA facility, source: Richard Sauder.

A very active UFO base exists beneath Mt. Ranier. There are also said to be underground “vaults” containing records of the ancient Lemurians. (Note: F.L. Boschke wrote the book “The Unexplained” about the mysteries surrounding Mt. Ranier.) The ice cap of Mt. Ranier contains a maze of corridors and caves. In August of 1970, scientists climbed to the top of Mt. Ranier, and entered these caverns and tunnels. Evidence was found indicating that a small lake exists deep beneath the ice
cap. It is possible that one could find a way to get beneath Mt. Ranier through these tunnels. The Mt. Lassen Entrance Mt. Lassen in Tehama County, California is an entrance to a large underground city. Near the foot of Mt. Lassen is a town called Manten. A man named “Ralph B. Fields” lived (lives?) there, and found the entrance to the underground city. His friend “Joe” was with him. The cave entrance is in the side of the mountain, at a little over 7,000 feet above sea level, and is near a rock outcropping suitable for camping under.

DEATH VALLEY, CA. ENTRANCE

Local Indian legends speak of a tunnel that runs beneath the desert. (Note: The book
“Death Valley Men,” tells the story of 3 people who are supposed to have found an underground city connected with this tunnel, and who actually took treasures from it.
The entrance to the Death Valley Tunnel is in the Panamint Mountains down on the
lower edge of the range near Wingate Pass, in the bottom of an old abandoned shaft.
The bottom of the shaft is collapsed, opening an entrance into a large tunnel system containing much treasure. These tunnels connect with the surface also through arches
(like large windows) in the side of the mountain and they look down on Death Valley. They’re high above the valley now, but they were once on the edge of the water, and were accessed by boats. The “windows” in the Death Valley side of the Panamint Mountains are about 4,500-5,000 feet above the bottom of Death Valley, and are across from Furnace Creek Ranch. From these openings you can see the green of the
ranch below you and Furnace Creek Wash across the valley. (So, with high-powered
binoculars or a telescope, you should be able to see the openings from the Furnace Creek Ranch, or Wash.) You can drive down Emigrant Canyon towards Death Valley.
You can then park beside the road between Furnace Creek Ranch and the Salt Bed.
(From here, the windows should be visible through binoculars.) Indian legends of the
Paiutes Indians speak of the people who used to live in the Panamint’s caverns.

THE MT. SHASTA, CA ENTRANCE

There are tunnels beneath Mt. Shasta that lead to a UFO base there, as well as tunnels
that connect with the vast world-wide tunnel network. The Lemurian city “Telos” is said to exist beneath Mt. Shasta. William Hamilton has done much research on Mt. Shasta and the tunnels. He has privately published a book entitled “Alien Magic”.

249 North Brand Boulevard, Suite 651 Glendale, CA 91203
20. UKIAH, CALIFORNIA

Function: unknown

COLORADO

There is one in Riverton “M”, Denver, Colorado, Colorado Springs, COG Creedo and Delta.

BLANCA PEAK – Mt. Blanca [Massif] is located in the mysterious San Luis Valley of Colorado, which has been a “hot spot” for UFO sightings and animal mutilations. Also South western tribes have legends involving caverns below the Mt. Blanca, San Luis Lakes, and Great Sand Dunes National Monument region, through which their ancestors migrated during a time of surface natural disasters before emerging onto the surface once again. There have been some rumors of an attempted government attack upon an underground alien [Grey] base beneath Mt. Blanca, using a deadly nerve agent, which backfired or failed. Blanca peak is located between Alamosa and Walsenberg.

1. Near BOULDER, CO. IN THE MOUNTAINS

Function: unknown

1. NEAR BOULDER, CO. in the mountains Function: unknown

2. Cheyenne Mountain -Norad – Colorado Springs, Colorado

Function: Early Warning systems – missile defense systems – Space tracking Levels: Multiple Tunnels to: Colorado Springs.

Function: Early warning systems, military strategy, satellite operations Levels: Multiple NOR AD is a massive self-sustaining ‘city’ built inside the mountain Tunnels to: Creede, Denver, Dulce Base, Kinsley.

2. CHEYCENNE MOUNTAIN-NORAD-COLORADO SPRINGS, COLORADO

Function: Early Warning systems – missile defense systems – Space tracking

Levels: Multiple

TUNNELS TO: Colorado Springs,

Function: Early warning systems, military strategy, satellite operations
Levels: Multiple

NORAD is a massive self-sustaining ‘city’, built inside the mountain Tunnels to: Creede, Denver, Dulce Base, Kinsley Cheyenne Mountain, near Colorado Springs, was the major underground command center for NORAD during the Cold War. It is a very deep, highly secure base. While Cheyenne Mountain is still in use, most of NORAD’s daily operations have now been switched to Peterson Air Force Base in Colorado. This underground base has been featured in many motion pictures and television programs.

2. CREEDE, COLORADO

Function: unknown

TUNNELS TO: Colorado Springs, Colorado – Delta, Colorado – Dulce Base, New Mexico.

4. DELTA, COLORADO

Function: unknown

TUNNELS TO: Creede Salt Lake, Utah

The Denver Federal Center, on the western edge of the Denver metropolitan area is
the location of a FEMA underground command center. Many people are concerned about the Denver airport as being the site of an alleged underground base, but for my money the Denver Federal Center installation is more important.

5. DENVER INTERNATIONAL AIRPORT (also a detainment camp)

Function: Military research, construction, detainment camp facilities.

Levels: 7 reported

TUNNELS TO: Denver proper, Colorado and Rocky Mountain “safe-housing”, Colorado
Springs, Colorado (Cheyenne Mtn.), Riverton, Wyoming.

Notes: Constructed in 1995, the government and politicians were hell bent on building this airport in spite of it ending up vastly over-budget. Charges of corruption, constant construction company changes, and mass firings of teams once they had built a section of their work was reported so that no “one” group had any idea what the blueprint of the airport was. Not only did locals not want this airport built nor was it needed, but everything was done to make sure it was, period. Masonic symbols and bizarre artwork of dead babies, burning cities and women in coffins comprise an extensive mural as well as a time capsule – none of which is featured in the airport’s web site section detailing the
unique artwork ou throughout the building. DIA is reported to serve as a cover for the vast underground facilities that were built there. There are reports of electronic/magnetic vibrations which make some people sick and cause headaches in others. There are acres of fenced-in areas which have barbed wire pointing into the area as if to keep things in, and small concrete stacks that resemble mini-cooling towers rise out of the acres of nowhere to apparently vent underground levels.

5 . Denver International Airport (also a detainment camp) Function: Military research, construction, detainment camp facilities Levels: 7 reported Tunnels to: Denver proper, Colorado and Rocky Mountain “safehousing”, Colorado Springs, Colorado (Cheyenne Mtn.)

6. FALCON AIR FORCE BASE, FALCON, COLORADO

Function: SDI, Satellite Control

Levels: Multiple

TUNNELS TO: Colorado Springs, possibly more.

7. Fort Collins, Colorado

Function: Suspect high precision equipment manufacturing for space.
8. GRAND MESA, COLORADO

Function unknown
9. GORE RANGE (near) LAKE, WEST of DENVER, CO

Function: Library and Central Data Bank

Naval Support Activity Mid-South is a huge U.S. Navy base, in Millington, Tennessee
just 21 miles north of Memphis. It is an enormous facility, covering thousands of
acres. I have been told that there is a deep underground facility beneath this base.
Remember that the U.S. Navy operates and maintains Camp David, which is also the
site of a major underground facility.
10. SAN JUAN VALLEY, COLORADO

Hidden beneath and in an operating Buffalo Ranch

Function unknown
11. TELLURIDE, COLORADO

Function unknown
12. UNIVERSITY OF DENVER, CO (BOULDER AREA)

Function: Genetics, geology/mining as related to tunneling and underground construction.
13. WARDEN VALLEY WEST of FORT COLLINS, CO

Function Unknown

TUNNELS TO: Montana

13. Warden Valley West of Fort Collins, CO Function Unknown Tunnels to: Montana
GEORGIA Dobbins Air Force Base, Marrietta GA Function: test site for plasma and antigravity
air craft, experimental crafts and weapons
INDIANA Kokomo, Indiana Function Unknown Notes: for years people in that area have reported a “hum” that has been so constant that some have been forced to move and it has made many others sick. It seems to come from underground, and “research” has turned up nothing although it was suggested by someone that massive underground tunneling and excavating is going on, using naturally occurring caverns, to make an underground containment and storage facility.
DELAWARE

DELAWARE BAY – Richard S. Shaver created a stir in AMAZING STORIES Magazine from 1945-1950 after sending a ms. to editor Ray Palmer [who backed Kenneth Arnold’s investigation of the ‘Maurey Island/Tacoma’ UFO incident which also involved military industrialist agent Fred L. Crisman — who later happened to be a close associate of Clay Shaw who Attorney James Garrison accused of being the Mafia-CIA go-between in the JFK assassination], Palmer also having publicized
Arnold’s own sighting of disc- shaped craft over Mt. Rainier, which became the original source for the term “flying saucers”. Shaver’s ms. was originally titled A WARNING TO FUTURE MAN, until it was embellished and “occultized” by Palmer to accommodate his metaphysical and science-fiction oriented readership, and re-named I REMEMBER LEMURIA. Shaver told of his experiences where he would “hear peoples thoughts” while working on a certain arc welding machine at an auto plant in Detroit. The “machine” made him sensitive to the thought-waves of others in the factory, however he claimed that many of the “voices” or thought-waves what he
intercepted did not come from the factory but emanated from caverns BELOW Detroit involved a warring subterranean factions known as the dero and the tero, of star-ships, machines capable of transmitting electronically-enhanced focused encephalographic or telepathic beams or rays, and other bizarre and horrific realities.
Shaver also told of how his first visit to “the caves” occurred when a “hologram” of a young woman led him to a cavern entrance; also of his second and last physical visit to a hidden cave entrance on the east coast of Delaware [Bay], via a boat by which he
navigated the water-filled passage for a few miles until reaching a “Tero” city. While
there the “Deros”, he claimed, attacked and killed all of his Tero “friends”, but for
some reason they left Shaver alive. Shaver left the cave and never returned to the
inner world physically, however he continued to receive “thought beams” which claimed to originate from other “Teros” yet which became increasingly occultic and confusions, suggesting, according to some, that the “Deros” were manipulating Shaver in order to bring ridicule to the subject of an underground reality that was on the verge of becoming public knowledge on the surface. The “Shaver Mystery” DID however provoke much feedback from others who recounted similar experiences with the underground realm, however the highly occultic “messages” that Shaver continued to receive for years afterwards led many to become entangled in deeply occultic practices and belief systems and also paranoid schizophrenic behaviors. Who or whatever was manipulating Shaver’s mind apparently succeeded in dragging many people under their occultic influence. According to Ray Palmer, who stayed overnight at Shaver’s house on on occasion, he heard five separate and distinct voices one night coming out of Shaver, who was apparently linked to a collective mind via electro-telepathic waves. The “group” of voices which were being channeled through Shaver were matter-of-factly discussing the murder and dismemberment of a woman within “the caves”, and one of the “voices” was stating — according to Palmer — that such things should not be taking place, source: AMAZING STORIES Magazine; THE HIDDEN WORLD; SHAVER MYSTERY Magazine; CAVEAT EMPTOR; SHAVERTRON magazine; Richard Shaver, the founder of Ufology?
FLORIDA

MIAMI – Underground genetics-breeding facility with several mature and young girls
being held captive by grey aliens. Used to breed a “hybrid” slave labor race that is
intended to infiltrate surface society and do the bidding of the New World Order,
which is to be ultimately controlled by an alien agenda, source: Mr. X

GEORGIA

Engineer Rex Ball came upon a network of tunnels in Georgia in 1940, which led to
an underground installation manned by Oriental-looking men in coveralls and a few
American military officers. When caught in the tunnels, an officer issued the curt
command: “Make him look like a nut!” The next thing he recalled was waking up in a
field uncertain whether the experience was real or a dream, source: THE MOTHMAN
PROPHECIES, by John A. Keel
ATLANTA – A major underground Bavarian Illuminati facility constructed in
collaboration with a similar base below the Denver International Airport. Like the
D.I.A. facility, the Atlanta facility is occupied by the cult of the serpent [human &
alien collaborators] and is “intended” to be used jointly with the Denver Airport
facility as duel U.S. headquarters for New World Order regional control, and for
continued “Montauk” or “Phoenix” Project operations, source: Mr. X
DOUGLAS – In the 1950’s, Earl Meeks was drilling a well on his property 6 miles from Douglas when he broke through to empty space. The shaft began to suck in a constant flow of air and sounds resembling “an underground railway” were so loud that they had to cover the “well” with planks at night so that they could sleep. A few decades later a subscriber to THE HOLLOW EARTH INSIDER, “Lucky”, visited the Meeks homestead 6 miles WEST of Douglas, and learned that people from all over the state had come to investigate the well the entire 2 weeks that it sucked in air, before the Meeks finally had it capped off. “Lucky” told of his intention to seek permission from the Meeks to uncap the well, source: FATE Magazine, Jan. 1957; THE HOLLOWEARTH INSIDER, Vol.1, No.4 [Spring, 1993]
DOBBINS AIR FORCE BASE, MARRIETTA, GA

Function: test site for plasma and antigravity air craft, experimental crafts and weapons

MARIETTA – A planned underground Pentagon facility below Kennesaw mountain, a few miles from Dobbins Air Force Base, to be used as a “defense” installation for the surrounding 13 states region, was reported by Richard Sauder. source: ‘UNDERGROUND BASES AND TUNNELS’, by Richard Sauder
THOMAS VILLE – Underground FEMA facility, source: Richard Sauder
IDAHO

BURLEY – Druggist George Haycock claimed that he had explored a shaft that could
be entered via a boulder strewn depression or sink 6 miles west of Burley, and one
mile off the main road [presumably in the opposite direction from the river?]. Native
American legends told of a demonic race that would emerge from a cave and capture their women and children. Mr. Haycock reported psychic attacks and impressions of evil activities taking place underground. The shaft led to a long square-cut yet ancient
horizontal crawlspace tunnel with branch tunnels and a cave-in which he attempted to
dig through, although experiencing unusual “resistance” in doing to. He later wrote
friends that someone was trying to blast the shaft closed with dynamite and also reported a death threat he had received in the mail telling him to cease and desist his
explorations. Shortly after this, he was found strangled to death in his home, source:
AMAZING STORIES magazine, Oct. 1947 & Jan. 1948
ILLINOIS

CHICAGO – Allegations that the Bahai Temple near Chicago, which has foundation “pillars” reaching hundreds of feet to the bedrock below, contains an entrance to an
underground system deep below which connect to other underground systems, [source:] Kenneth Van Hoof
INDIANA KOKO MO, INDIANA

Function Unknown

Notes: for years people in that area have reported a “hum” that has been so constant
that some have been forced to move and it has made many others sick. It seems to come from underground, and “research” has turned up nothing although it was suggested by someone that massive underground tunneling and excavating is going on, using naturally occurring caverns, to make an underground containment or storage facility.
KANSAS

1. HUTCHISON, KANSAS

Function unknown

TUNNELS TO: Kinsley, Nebraska

Hutchison AFB Kansas has one.
2. KANSAS CITY, KANSAS

Function unknown

Notes: Entrance near Worlds of Fun
3. KINSLEY, KANSAS

Function unknown

TUNNELS TO: Colorado Springs, Colorado; Hutchinson, Kansas; Tulsa Kokoweef Peak,
SW California

Notes: Gold stored in huge cavern, blasted shut. Known as the “midway city” because
it’s located halfway between New York and San Francisco
KENTUCKY

PIKEVILLE – Strange disappearances in the Truck Coal Mine 3 miles east of town. Two boys seen entering the mine disappear even though their lamp is found abandoned at the entrance. A full scale search of the mine fails to turn up any evidence of the missing boys, source: FATE magazine, Nov. 1950
CAVES AND ATLANTAEN TEMPLE
APPALACHIAN MOUNTAINS

Appalachians formed when Thetis sea closed by collision between America and
Europe, they grow 45,000ft high. What we see today are the roots of the mountains.
At such high pressure, rock act as a fluid, what you talk about are frozen waves of
rock.

PINEVILLE – On Dec. 26, 1945, a mine explosion in the Belva Mine trapped several
men. When they were rescued some of the men insisted that they saw a “door” in one
of the walls open, and a man dressed as a “lumberjack” emerge from a well-lighted
room. After assuring the men that they would be rescued, the strange visitor returned
to the room and closed the door. Other similar accounts have been reported during
similar mine disasters, such as the one at a Shipton, Pennsylvania mine, where similar
“lumberjack” or “telephone linemen” type of men have been seen, suggesting that
they exist in another time-dimension, possibly explaining why they “knew” the
outcome of the disasters. In some cases the strange “workmen”, as if taking the role of
guardian angels, had offered trapped men unusual “lighting” to keep them out of the
dark, and in other cases as with the Shipton disaster, “astral visions” accompanied the
visits of these fourth dimensional [?] visitors, source: Pineville Kentucky newspapers,
circa Dec. 26, 1981 – Jan. 1982
RIVERTON – Patsey Wingate, a victim of UFO encounters, missing time, MIB limo’s,
harassment, black helicopters, police-like cars in a temporal mist, death threats, the
works… spoke of a mountain near Riverton where a certain UFO was seen on numerous occasions. While on the mountain she would hear humming sounds coming from underground, then at home later that night she experienced frightening vivid “dreams” of “children underground on the mountain [who] were begging for help. They were in glass cages. Some of the children looked human, but some looked like aliens.” source: UFO UNIVERSE, Vol.3, No. 2, [Summer 1993]
SALEM – SE of Salem is Hodges cave, which some believe is the cavern that is
mentioned in John Uri Lloyd’s book ETIDORHPA, which was illustrated by a veteran
Mason. Witnesses have stated that they have seen Masons wandering about the area.
One report tells of a nearby stone staircase leading deep into the gloomy darkness of
the earth, which witnesses failed to fully investigate as they were hit with an
overpowering sense of terror, source: THE SHAVER MYSTERY magazine

STOVEN’S CAVE [SITE UNSPECIFIED] – Unusual sounds emanating from the
cavern, source: TECH TROGLODYTE [NSS affiliate newsletter], Vol.12, No.2

TAZEWELL COUNTY – Higgingbottom #1 or Devil’s Slide cave is avoided by local
residents because they are convinced that some loathsome creature lives at the bottom,
source: CAVE LEGENDS OF THE APPALACHIANS, article by Janice Goad

Mammoth Cave supposed to have an entrance to the Inner World

LOUISIANA

FORT POLK – Reports of over 19,000 war-ready United Nations Organization troops,
French, Pakistani & Russian, along with massive underground facilities for storage of
military and other supplies, source: a former anonymous serviceman who interacted
with the base

MARYLAND

Edgewood Arsenal, Maryland (from Don)

Martins AFB, Aberdeen Proving Ground, Maryland

Don wrote: I was just looking at your satellite photo of the chem trails over the East
Coast (Maryland in particular), and I noticed a strange coincidence. I’m from
Maryland and I noticed that the two streaks over the state seem to run next to major
military installations. The more eastern of the two runs over Aberdeen Proving
Ground, Edgewood Arsenal, and Martins AFB. The more western of the two runs
near Ft. Meade. Aberdeen Proving Ground and Edgewood Arsenal seem to have a lot
of strange or peculiar things about them as well. I live near both and often can hear
the weapons testing. I know for a fact that there are large storages of chemical
weapons at Edgewood. In high school, we had to do pressurization drills once a
month where the entire school would pile into the gym and we would seal the gym
and pressurize it to keep the gas out. There are sirens all over the community they test
once a week (every Wed. at 4) that are to alert of potential chemical weapons leaks.
There is constant military air traffic all over the area, and chemtrails are a regular
occurrence (until I was about 18, 1 thought it was normal for contrails to stay for at
least 6 hours!). These two bases are always heavily guarded and secured, even before
9/11. One of my friend’s dad is an army chemist out there, and he is not allowed to
even discuss what he does. The only way I knew that he was a chemist was because
he is a doctor and the insignia on his uniform is from the chemical corps. He is very
secretive and often disappears late at night to go to work, apparently at a moment’s
notice (he has two pagers, a govt, one and his regular one). Aberdeen Proving
Grounds is the United States’ largest military testing facility, and Edgewood Arsenal
is its largest store of arms. I could fill a book with the peculiarities of these two
installations.

Edgewood Arsenal, Maryland (from Don) Martins AFB, Aberdeen

Proving Ground, Maryland MASSACHUSETTS Maynard MA, FEMA regional center.
Wackenhut is heretoo.

MARYLAND

Maryland

■ Camp David, the Presidential retreat, is immediately adjacent to Catoctin Mountain
Park. On the surface there are some cabins and lodges, and conference rooms for
Presidential use. But most of this facility runs like a labyrinthine anthill under
Catoctin Mountain, just west of Thurmont, Maryland, along Rte. 15 between
Frederick, Maryland and Gettysburg, Pennsylvania.

The facility is operated and maintained by the U.S. Navy Seabees. The U.S. Marines
provide military security. I have spoken to an individual who used to work there on a
classified maintenance contract. My source informed me that the underground
portions of Camp David are so extensive and elaborate, and there are so many miles
of secret tunnels, that it is doubtful that any one person would have a complete map of
the facility in his or her mind. In other words, we hear or read the words, Camp David,
in the mainstream news media, but understand virtually nothing of what really
happens there, or what the full nature of the installation really is.
Commentary from Alex Thomas: The fact that they have moved the G8 meetings to
Camp David indicates that G8 nations may be actually doing their most important
meetings within the underground base near Camp David.

CROFTON – An ancient network of tunnels and crawlways discovered beneath a
parking lot in Crofton during excavations. The artificial tunnels were reportedly
covered by subsequent construction, source: THE WASHINGTON STAR NEWS,
July 25, 1973 & Aug. 15, 1973

FORT MEADE – “Cavernous subterranean expanses” existing beneath the National
Security Agency’s headquarters, filled with over 10 acres of the most sophisticated
supercomputers money can buy, which monitor global telephone, telegraph, telex, fax,
radio, TV, microwave, internet and other forms of communication, source: UFO
Magazine, Vol.7, No. 6; Richard Sauder

■ Fort Meade, near Laurel, Maryland, midway between Washington, D.C. and
Baltimore, Maryland. My research, from a variety of sources, indicates that there is a
huge underground maze beneath Fort Meade. Fort Meade is operated by the U.S.
Army, but the National Security Agency (NS A) has its largest, publicly known
operations center there. The NSA has literally acres upon acres of super computers
underground at Fort Meade, stacked level upon level, going down and down and
down, like a gargantuan subterranean stack of hi-tech digital pancakes. The NSA is
notorious for the ECHELON spying program and other unconstitutional spying
activities. It is something like a high-tech KGB or Stasi surveillance agency, spying

on the American population’s electronic and digital communications.

BETWEEN OLNEY & LAYTONSVILLE – Located on Riggs Road, off of Rt. 108,
this underground facility is maintained by FEMA [Federal Emergency Management
Agency]. Long lines of cars have been seen heading through the gate at shift change,
in spite of the surface illusion of vacancy and disrepair, vehicles which pass through
an electronic surveillance area and disappear behind a knoll in the near distance. At
least 10 levels deep, and several electronic surveillance facilities, with possible NSA
connections, source: UFO Magazine, Vol.7, No.6;
Richard Sauder

■ FEMA alternate underground command center, off of Riggs Road, not far from
Olney, Maryland, to the north of Washington, D.C. When I visited the place back in
the 1990s, only a few shabby, almost dilapidated looking buildings were visible
through the security fence. A few vent pipes poked above the ground here and there.
There were a few largish antennae and radio masts visible. The casual onlooker would
probably just drive right by, unaware that the real activity was taking place below
ground. I spoke with one man who had been in the facility and he described a
multi- level base crammed full of sophisticated electronic gear. He had been to level
seven underground, but did not know if the base extended deeper than that, or whether
it was connected via deep tunnels with other underground bases in the region.

THURMONT – see: PENNSYLVANIA, BLUE RIDGE SUMMIT

■ Site R, also known as Raven Rock or the Underground Pentagon, is about 6 miles
north-northeast of the Camp David facility, not far from the Maryland-Pennsylvania
state line. This enormous facility is the alternate underground command center for the
Pentagon. In recent years Dick Cheney reportedly spent a lot of time underground at
Site R. I have heard that Site R and Camp David are connected by underground
tunnels, and I am inclined to believe the rumors are true. Site R is now under the
command of Fort Detrick, in Frederick, Maryland, to the northwest of Washington,
D.C. Fort Detrick is the U.S. Army’s infamous biological warfare research facility.

MASSACHUSETTS

BOSTON – Ervin M. Scott claimed to have intercepted an electronically augmented
telepathic transmission from a woman, a cavern-dweller under the Salt Lake flats of
Utah, whose people were under siege by the “evil ones”. She urgently warned about a
woman who was abducted into tunnels/caverns beneath an abby in the north section
of Boston 3 weeks earlier [the 1st church of Roxbury is located in the north section

of the city and is by far the oldest “abby” in Boston]. Another “voice” breaks in on the
“transmission” and tells Ervin not to believe the former woman’s voice, stating, “Don’t
you know this is a lie? a trick?”, and then warningly, “keep quiet about this!”, source:
SEARCH magazine, July 1964

MAYNARD – Underground FEMA facility, source: Richard Sauder

MICHIGAN

BATTLE CREEK – Underground FEMA facility, source: Richard Sauder

MINNESOTA

REDWOOD FALLS – A WWII trainee claimed to have discovered a small
underground passage near [west of?] Redwood Falls, which led to an ancient tiled
concourse and to an underground alien realm. He spoke of the “deros” and “teros” and
stated that he emerged 6 months later with a “tero” woman who became his wife, with
no intention on returning, although both lived in fear as if they were constantly being
watched or followed, source: letter sent to Richard Shaver [circa 1950’s]

MISSOURI

CAMERON – Rumors of a “haunted” cave or mine in the area source: unknown

KANSAS CITY – Somewhere on the Missouri river near Kansas city a man explored
a cave in the side of a steep embankment on somewhere on the river’s edge. He was
terrified by a tall creature with cat or lizard like eyes, who had apparently been living
in the cave or possibly had come from the river itself, source: Charles Marcoux

CARTHAGE

Pat Garrett’s Reptilian Experience Reported to Mary Sutherland, BUFO Paranormal

and UFO Radio

Incident Date: March 7, 2004

This past Sunday… the 7th. A friend and I were riding two ATVs in a place called,
“The Underground” it is a public and private storage facility in Carthage, Mo. What
makes this place such a desirable storage facility is that it is all underground… hence
the name. They are constantly expanding this place and there are miles and miles of
carved out caves in there… and it goes pretty deep. This facility stores thousands and
thousands of food containers, all dehydrated for the Navy… I have seen them and it is
public knowledge around here. It is also a fallout shelter able to hold some 40,000 to
50,000 people. I tell you this to give some sense of the vastness of the place. I worked

there as a subcontractor some 9 years ago…I helped build the office spaces up on top.
I started to explore then… about once a month and did so all the way until this past
Sunday. However, I never went as far or as deep before either. It was fun to take the
ATVs and cruise underground… no rain or weather problems… ever. We were approx 8
miles in and I’d say maybe 500 feet deep when we took a turn down an area that was
marked “Naval Authoritative Zone” I remember making a comment about the Navy
getting a ship down there and said that was an easy posting. The walls became more
defined as in: polished or finished and this was striking because this was supposed to
be a newly blasted area… totally backward I would think… still thinking nothing was
wrong we kept going, actually increasing speed because the floor was paved now and
we could go faster. We came up on an unusual painted pattern on the floor and I
thought, “cool graffiti… kids have been down here… we’re safe… won’t get into any
trouble.” The road dipped down and then it took a 90′ turn to the left… we had no
warning and we were going too fast. I knew we were going to hit the wall. BUT we
DIDN’T… we passed through some kind of projection of the cave siding… although I
don’t know how it was done… it was real looking. We passed into a whole new road
system… this one was large, and much older than where we came from. We started to
smell an odor… musty, damp, growing stronger as we went deeper on smell. The
lighting decreased as well probably 60% less than the other area’s. ..we turned on our
headlights. We continued on at about 5 to 7 miles an hour for about 5 min and we
noticed it was getting cooler… which was to me, very strange… since once inside a
cave a certain distance… the temp says the same. We made a right turn and started to
come up on what I thought was a rest area on the side… about 40 feet away. I thought
it looked like a pair of fountains until they moved. We both stopped immediately. We
were approx. 30′ feet away now and what we saw were two creatures, one was very
tall at least 7′ feet maybe more and very powerfully built… reddish in color and the
other was smaller about 6′ feet but it was not red in color but pale, like an albino and
it was not as powerfully built as the other. They looked like REPTILES. ..living,
walking, intelligent beings… not human… not warmblooded. Reptiles! I know it
sounds crazy but it is true. They said nothing but I did get a strong sense from the big
one. A malevolence, evil presence of some kind. My friend screamed and we turned
around.. .a power turn. We started to go back out when my friend said, “the big one”
was after us. I looked back and it was following us. I had the overwhelming feeling
that if it caught us that harm would come to us. We passed through the wall projection
and I looked back and saw the thing raise its arm and it had a weapon of some sorts. It
fired and hit the ATV my friend was on. The engine died and he stopped. I told him to
jump on.. .and he did. I gunned it and then my friend said, “STOP!” I slowed down
and he he said, “LOOK!”. I looked back and the thing had stopped at the graffiti on
the cave floor/road. The ATV was on its side of the graffiti/symbol. It was obvious
the thing would not cross the marking. I slowed more.. .we were now about 75′ feet
away. I stopped and the three of us… Me, my friend and the creature/reptile/man thing
just looked at each other.. .for about 15 sec. And let me tell you. ..that is a long time.
Then I started to leave… It stayed there waiting and not moving until we were out of
sight. As soon as we cleared the cave I got on my cell phone and called the Sheriffs

Dept. I was told that they would not come out and that “Underground Security” would
handle it. Then they hung up! By law they are not to do that. ..We can hang up on
anyone… but a government office, be it City or Federal cannot hang up on you.
Anyway, I was shocked and scared and we took off across the outside of the
underground over to my truck and sure enough… Underground Security was waiting
for us. We were told to leave, not to tell anybody about this… that if I come back… The
Navy would press charges. I was also told that I had 10 min to leave or I would be
taken in. What can I say… we left. It has been 3 days since this has happened and I am
still shaken. I am a powerful person, 6’4″ and 265 lbs and I have never in my life been
afraid for my life… until this past Sunday. I lost my one of my two
ATV’s.Vin#5y4Ag0oly61a071120. As far as I know… it is still down there. My friend
will not talk about it and I have not heard anything from anyone about it. I did call the
Sheriffs Dept. and they said they never got a call from me. Well, that is my story… I
have never had anything strange happen in my life and I am very very concerned
about this. I can tell you this… I had an urge to kill the things I saw down there… I don’t
know if that is a natural reaction as most people have a natural revulsion towards
reptiles or because of my faith and the feeling of evil I had… or what. All I know is
that they are real… and I wish I could do something… anything to combat or help
against these things. Take care all and thank you again for letting me write this and
share this experience.

MONTANA
Bozeman, Mont.

Function: Genetics

NEBRASKA

OffuttAir Force Base has had a major underground facility for decades. During the
Cold War it was the underground command center for the Strategic Air Command.
George Bush flew there for protection on Air Force One during the 9/1 1 attacks.

NEVADA

Area 51 – Groom Lake – Dreamland – Nellis Air Force Base

Area 51 was said to exist only in our imaginations until Russian satellite photos were
leaked to US sources and it’s amazing how you can get photos all over now of it, and
even posters. It’s also amazing how much they’ve been busy little bees building this
base up.

Function: Stealth and cloaking Aircraft research & development ‘”Dreamland (Data
Repository Establishment and Maintenance Land) Elmint (Electromagnetic
Intelligence), Biological weapons research and genetic manipulation/warfare storage,
Cold Empire, EVA, Program HIS (Hybrid Intelligence System),BW/CW; IRIS
(Infrared Intruder Systems), BI-PASS, REP-TILES, back engineering of captured
space craft propulsion systems, holding area of all alien materials and

bodies/prisoners,

Security: Above ground cameras, underground pressure sensors, ground and air patrol
Notes: Operating rooms on several floors, – Complete hospital, fully staffed and has
everything imaginable. – The person who gave this info worked as a locksmith in
Area 51 for 12 years. He did not see any creatures while on any of the levels, but
admits that there were many closed areas that he was not allowed into and he talked to
others who said they had seen either actual captured UFOs or own UFOs and that
some thought they had been given freely in an exchange program as it wasn’t possible
so many UFOs couldn’t have crashed and been recovered in such pristine condition.
Tunnels to: Ft. Irwin, California – Page, Arizona – Tonopah, Nevada – Wiciup,
Arizona

S-4 Area in Area 51 Function unknown

Addendum: I have been told by many people (all military) that Area 5 1 isn’t really
where much is going on – or at least the whole “aliens/crashed saucers are there”
mystique is a bit hyped because the area is able to be so secured. That illusion is
“allowed” and encouraged to focus the energy of the “Conspiracy” people on it and
divert snooping into the real hub of action elsewhere (most say Dulce).

The Air Force recently managed to withdraw 3,972 acres of public land from the
surrounding desert and absorbed it into the Groom Lake area, making it prohibited to
civilians and under military protection. This was in answer to the (government’s)
endless battle to keep people from sitting on a ridge that was 10 miles away with
telescopic lenses “spying” on the goings-on of the Area and trying to see what all the
massive paranoia was about. Double Dog dares, you know…. Also, a bit bizarrely for
a place where “nothing is going on”, after the New York 9-11 attack, President Bush
the Second issued a statement that would exempt this installation “from any Federal,
State, Interstate, Local or hazardous waste laws that might require the disclosure of
calcified information concerning that operating location to unauthorized
per sons… information concerning activities at the operating location near Groom Lake
have been properly determined to be classified and disclosure would be harmful to
national security. Continued protection of this information is in the paramount interest
of the United States”.

Area 51 – Groom Lake – Dreamland – Nellis Air Force Base Area 51 was said to exist
only in our imaginations until Russian satellite photos were leaked to US sources and
it’s amazing how you can get photos allover of it now, even posters. They’ve been
busy little bees building this base up. Function: Stealth and cloaking Aircraft research
& development. ‘ Dreamland (Data Repository Establishment and Maintenance Land)
Elmint(Electromagnetic Intelligence), Biological weapons research and genetic
manipulation/warfare storage, Cold Empire, EVA, Program HIS (Hybrid Intelligence
System),BW/CW; IRIS (Infrared Intruder Systems), Security: Above ground cameras,
underground pressure sensors, ground and air patrol

There appears to be a site in Nevada at Tonopah, Area 5 1 at Groom Lake, and a place
designated as COG AFB.

2. Blue Diamond, Nevada

Function unknown

3. Fallon Air Force Base area (the flats, near Reno)
“American City”

restricted military sites southwest of Fallon
Function: Suspected Underground UFO Base
Levels: At least seven underground levels

4. Henderson, Nevada – Naval Base

This one’s interesting. I was in Henderson on May 3-4, 1988 on one of my Death
Valley/Ghost Town/Photography/Screw the World jaunts. (I love Death Valley). I
remembered it vividly because I just got tired of driving and happened to turn off for
the night and there I was in Henderson. It was a sleepy, dusty town. I ended up in this
strange hotel that seemed like part of an old 1940s horror movie, run by the nicest
people you’d want to meet. I love stuff like that. They were so surprised to see a
visitor they gave me the room for a few bucks. The next morning (May 4) I left and
was about two hours from town, trying to get anything on the radio but static, when I
heard a news report that there had been a terrible accident in Henderson and the
“marshmallow factory” had blown up, killing several people and causing a massive
fire. I couldn’t believe it. ..I was just there! I just missed it. If I had been my usual
Never In A Hurry self, I’d still be there. I saw the smoke not too long after, still
driving; Henderson burning hours away.

Then I heard that what had in fact blown up was a government chemical/bomb plant . I
was stunned. This sleepy little dusty town had a bomb plant? Huh? I couldn’t find a
thing online about the original lie that it was a marshmallow plant. I KNOW they said
that – in fact I had called home a few hours after this happened to let them know I was
OK because I had called the night before and they knew I’s stayed there. I asked them,
now – if they remembered me calling and this story? and they did. It made no sense at
all to me. What also doesn’t make sense is how 4,500 tons of ammonium perchlorate
can be in the middle of a town and now it’s surrounded by homes. In May, 1991 a
huge release of chlorine occurred in Henderson – are we that expendable?

Brian sent me this:

Do you know anything about a NAVAL base out in the middle of the Nevada
desert? I want to say Hawthorn, or Henderson, or something like that? About halfway
between LV and Reno. I was up that way a couple years ago helping out with tech
inspection for a popular auto race out there> while making the drive from Vegas to
Reno, out in the middle of nowhere, is this damn NAVAL base! Wow, that’s strange I
think, so I go though the little town of the same name, and then I see a HUGE lake,
also “in the middle of nowhere” and not really looking developed for “public use”.

What really weird is that the entire lake looks as if it could be only a few feet deep,
VERY slightly angled shores (no steep inclines, like a boat ramp, except from the
cliffs of the mountain it sits against) and actually could almost pass for simply a rain
or run off “pond” if its acreage wasn’t so big. Yet, out in the middle of this “shallow”
lake (starting at the shore of the shallowest looking end), is an almost perfectly
straight, dead centered, dead calm “strip” of water (you now the “still waters run
deep” expression, its true). Coincidentally enough, this entire end of the lake (about
80% of the lake in fact) is posted, yep, you guessed it,, “OFF LIMITS” with the
familiar red and white govt issue signs. Well, the guy that was riding with me to Reno
grew up in the Vegas area, and says the rumor is that the Naval base designs/builds
super secret submarines, and the “trench” at the end of the lake is in fact the opening
of a long underground water tunnel leading back to the base, so they can test the subs
in the lake, and “supposedly” this is the deepest lake in the US, or maybe the world”.

Since the late 1940s there has been a major underground base at KirtlandAir Force
Base. The base is beneath a foothill of the Manzano Mountains. It was originally
constructed as a super-secure nuclear weapons assembly and storage facility for the
military. Today the base is used by other agencies. The Air Force has built another,
state of the art, facility for nuclear weapons storage at another location at Kirtland
AFB. The Department of Energy’s Sandia National Laboratory is immediately
adjacent to Kirtland Air Force Base, on the southeast border of Albuquerque.
I talked with one of the men who helped to build the Manzano base in the years after
World War II. He spent his entire career as a hard rock miner for federal agencies,
working on underground projects all over the western USA. While excavating the
Manzano base, security was extreme. The miners were blindfolded when they were
transported to and from their work site. When they were taken from the area where
they were working to another part of the facility they were always blindfolded. The
practical result of this procedure was that not even the miners who built the
underground base knew its layout. All they ever saw was the immediate chamber or
tunnel section they were currently working on. It was a strictly compartmentalized
project in every sense of the word. I suspect that this facility has been expanded over
the years.

Los Alamos is one of the U.S. Department of Energy’s national research laboratories,
to the west of the state capitol of Santa Fe. I have been informed that the underground
work space beneath Los Alamos is even greater in extent than the sprawling surface
facility, reaching as much as one mile deep in its farthest reaches. Two of the main
missions of Los Alamos are nuclear and genetic research. Presumably classified
projects related to these fields are among the secret activities carried out underground.

4. Mercury, Nevada

Function unknown

MERCURY – An electrician at the Mercury base camp on the Nevada Test Site
claimed to have seen “aliens” in “stainless steel caverns” about 3000 feet below the
surface of the Mercury Site. The “Mercury Workers” contracted through Reynolds
Electric [a division of E.G.&G.], and several of them told terrifying stories of
harassment and death threats from base personnel in an effort to keep them from
talking. Also Las Vegan Stayce Borland and her brother were killed by “burglars”
during a time when they were trying to help some of the Mercury Workers who
had been apprehended and were being held captive underground. Many insisted that
Borland’s murder was part of a conspiracy, similar to the 5 people killed in a
“helicopter crash” some years ago who, according to former Wackenhut employee
Michael Riconosciuto, were trying to escape with documentation of genetic research
atrocities, alien interaction, and antigravity craft technology in the underground
facilities there. This conspiracy of concealment is reportedly being run by the aliens
themselves to maintain control of those military-industrial- intelligence agencies
which have been infiltrated and assimilated through advanced mind control
technology, source: “The Billy Goodman Happening” – KVEG Radia 840 AM, Las
Vegas, Nevada, Nov. 19, 1989, etc.

The notorious Area 51 of UFO fame and the Tonopah Test Range/Nevada Test
Site/S-4/Nellis Air Force Base reservations in southern Nevada are all in relatively
close proximity to each other. My research and sources point to major, massive
underground facilities in this region. A great deal of ultra- sensitive military R&D
takes place here. Much popular lore has arisen around the theme of captured UFOs
held in secret by the American military at Area 51. In my estimation, these stories are
probably true. Ryan Wood and other researchers have accumulated a great deal of
evidence over the years that indicate that American military agencies are lying and
that they do have captured UFOs. Area 51 is reportedly one of the places where this
sort of technology is sequestered and studied. It is my informed guess that White
Sands Missile Range in New Mexico is another site for the study and R&D of exotic
technologies.

White Sands Missile Range, in south-central New Mexico, is the largest military base
in the USA. It was the site of the first test explosion of an atomic bomb in 1945.
White Sands was the launch site for test firing of captured Nazi V-2 rockets after the
military defeat of the Third Reich. Today it is still an operational military missile
range, and also serves as an alternate space shuttle landing site for NASA.
Underground facilities beneath White Sands are reportedly devoted to cutting edge
research in lasers and conscious super-computing. The sum of my research strongly
indicates a major underground component at White Sands. Nothing would surprise
me where White Sands is concerned. Nothing whatsoever.

4. Tonopah, Nevada

Function unknown

69: San Gabriel (mountains) On Western side of Mojave Desert
Function unknown

Notes: Heavy vibrations coming from under the forest floor which sounds like geared
machinery. These vibrations and sounds are the same as heard in Kokomo, Indiana
and are suspected underground building/tunneling operations.

NEVADA-ARIZONA

Hoover Dam. Lake Mead’s Hoover Dam SE of Las Vegas. Rumors that the dam
construction workers penetrated extensive caverns near the base of the cliffs, that
Lake Mead is a hot spot of alien activity, and that the floor of one level of the dam
contains a “wild tile inlay on the floor, with signs of the zodiac and all sorts of stuff
suggesting an entrance.” source: Letter from Vaughn M. Green in SHAVERTRON
newsletter, No. 14

NEVADA

BOULDER DAME – Reports of underground tunnels and UFO activity between the
base of Boulder Dam and Jumbo Peak, source: Lew Tery

EUREKA – A mysterious maze of underground tunnels and rooms discovered beneath
the immediate area of Eureka, source: “An Underground Cathedral”, article by
Charles Hillinger in THE LOS ANGELES TIMES, Mar. 2, 1975

NEVADA CITY – The Mayflower mine east of the city contained a long tunnel from
which strange noises often known to emerge, and also reports of “devils” being
sighted in the nearby Murchie mine, source: Article by Wayland D. Hand in
CALIFORNIA FOLKLORE QUARTERLY, April, 1942

PAHRUMP – NW of Pahrump [which lies due west from Las Vegas] is Devil’s Hole
National Monument, an annex of Death Valley National Monument. It is an
apparently “bottomless” aqua-cave containing a species of cave fish located nowhere
else in the world. Like the legendary “subterranean grand canyon” — which reportedly
runs beneath the Kokoweef and Dorr Peaks near the SW flank of the Ivanpah Mts.
just south of highway 91 and NW of Needles, California — the Devil’s Hole water
level ALSO reportedly rises and falls with the tide, suggesting a connection with a
massive underground sea below and upstream, possibly in the area of eastern Nevada
and western Utah. At least 2 boys disappeared trying to explore Devil’s Hole, and
Navy scuba divers were lowered on cables and reported seeing a large subterranean
river which roared up from below, flowed across a wide expanse although they could
not estimate the depth because of a myriad of colonnades of black rock through which
the river flowed, before plunging once again down an abyss. This reportedly occurred
in a cave NEAR Devil’s Hole. Although “fenced in”, Devil’s Hole is open for publuc
view, source: ADVENTURE IS UNDERGROUND, by William Halliday; Virginia
Louis Swanson

RENO – An underground ‘Nazi’ antigravity disc facility tied-in with the Antarctica
scenario, source: AlBielek

NEW JERSEY

NORTHERN – John Keel, after hearing reports of strange sounds of pulsating
machines coming from caves in the mountains of northern New Jersey, personally
visited some of the caverns, source: THE 8TH TOWER, by John A. Keel

BROOKHAVEN – see: New Jersey, Newark

NEWARK – Massive German [Thule Society] infiltration of the American
military-industrial complex following WWII, via the NSA, I.T.T., ARCO, EXXON,
etc., led to the construction of massive joint alien- fascist underground complexes
[stemming from the Nazi alliance with an alien collaboration, based under the Gizeh
plateau of Egypt – via the Grant Orient Lodge of Egyptian Freemasonry and the
various gnostic Bavarian cults that were brought back from Egypt during the Egyptian
occupation of the armies of the so-called “Holy Roman Empire”
Italy- Austria-Germany]. Tunnel systems run from the I.T.T. Corporation building in
Newark to the I.T.T. facility at Nutley, to Wright-Patterson Air Force Base in Ohio
[mag-lev tubes], to A.I.L., to Long Island [Montauk Point], source: ORION BASED
TECHNOLOGY, MIND CONTROL AND OTHER SECRET PROJECTS, by Val
Valerian

NUTLEY – see: NEW JERSEY, NEWARK

PARAMUS – A massive underground facility with an entrance located in an office
building at 140 century road. The building next door at 120 century road is also
owned by the same company which finances projects carried out below, which deal
mainly with abducted women and young girls who are heavily mind-controlled using
brainwashing and extreme sexual abuse and torture induced MPD alternate
programmed personalities, in order to create “sex agents” for a Nazi cabal which had
infiltrated the American Industrial Complex following WWII. These agents are used
to extract important information from, to bribe, or to blackmail powerful men. There
also may be a connection to the ARCO scenario in New Jersey as well, source: Mr. X

NEW MEXICO

In New Mexico they are at Dulce, Taos, Los Alanos, ALB, AFB, Datil and Carlsbad.

1. Albuquerque, New Mexico (AFB)

Function unknown

Levels: Multiple

Tunnels to: Carlsbad, New Mexico Los Alamos, New Mexico Possible connections to
Datil, and other points.

ALBUQUERQUE – Manzano mountain, or the Kirtland [AFB] Munitions Storage
Complex, was excavated by the Air Force to serve as a nuclear weapons storage area.
The mountain is visible a couple of miles south of 1-40 on the eastern outskirts of
Albuquerque. Security is extremely tight. Also, reports of grey aliens operating within
some of the deeper levels. A 285,000 sq. ft. underground extension facility was
constructed in the same area in 1989, although heavy secrecy surrounds these
facilities, source: UFO Magazine, Vol.7, No.6; Richard Sauder

2. Carlsbad, New Mexico

Functions: Underground Nuclear Testing
Tunnels to: Fort Stockton, Texas. Ro swell

3. Cordova, New Mexico

Function unknown

4. Datil, New Mexico

Function unknown
Tunnels to: Dulce Base

5: Dulce Base, New Mexico

While some are spending their time scrutinizing Area 5 1 and thinking that’s so
important, Dulce is said to be the crown jewel that we’re all being distracted from;
The Big Tamale

Function: Alien interface, Research of mind related functions, genetic experiments,
mind control training and reprogramming
Levels: 7 Known –

Level 1 – garage for street maintenance

Level 2 – garage for trains, shuttles, tunnel-boring machines and disc maintenance
Level 3 – everyone is weighed, in the nude, then given a jump suit uniform. The
weight of the person is put on a computer I.D. card each day. Change in over three
pounds requires a physical exam and X-ray.

Level 4 – Human research in ‘paranormal’ areas – mental telepathy, mind control,
hypnosis, remote viewing, astral traveling – etc. The technology is apparently here to
allow them to know how to manipulate the ‘Bio-plasmic Body’ Development of a laser
weapon that can remotely cause burns and discomfort on its target. They can lower
your heartbeat with Deep Sleep ‘Delta Waves,’ induce a static shock, then reprogram,
Via a Brain- Computer link.

Level 5 – Alien housing . “…The room is circular for the (electro- magnetic) generator

is nearly 200 feet diameter and covers the fifth and sixth levels (extreme west south
wing). There (are) five entrances (plus an escape trap door on the sixth floor) on each
floor. Each portal has double door. The security is severe. Armed guards patrol
constantly, and in addition to weight sensitive areas there (are) hand print and eye
print stations. Here, is the device that powers the transfer of atoms.
Level 6 – Level 6 is privately called ‘Nightmare Hall’. It holds the genetic labs.
Experiments done on fish, seals, birds, and mice that are vastly altered from their
original, forms. There are multi- armed and multi-legged humans and several cages
(and vats) of humanoid bat-like creatures up to 7- feet tall. Aliens have taught the
humans a lot about genetics, things both useful and dangerous. Level 7 – Humans in
cages here, usually drugged or dazed, sometimes crying out for help.
Level 7 is the worst. “Row after row of 1,000’s of humans & human-mixture remains
in cold storage. Here too are embryos of humanoids in various stages of development.
Also, many human children’s’ remains in storage vats. Who are (were) these people?”
Below Level 7 – Unknown other levels unexplored by humans. Aliens here. Exits into
a vast underground cavern series, unexplored by humans, but suspected to be a huge
alien culture area.

Tunnels to: Colorado Springs, Colorado Creed, Colorado Datil, N.M. Los Alamos.
Page, Arizona Sandia Base Taos, NM

Notes: The Dulce installation (upper levels) was originally constructed by the RAND
corp. There are reported to be over 3000 cameras at various high-security locations.
Deep sections of the Complex may connect into a natural and extensive underground
cave system, which is common in most of these locations

DULCE. – The Jicarilla Apache Indians believe that their ancestors emerged from the
caverns in ancient times. When they emerged they were plagued by monsters
[saurians?]. Some wanted to go back down but once their hero’s slew all of the
monsters, all was at peace [ironically the Dulce underground network is now
reportedly under the control of some of the very ‘monsters’ or ‘reptilians’ that they may
have succeeded in driving underground], source: MYTHS & TALES OF THE
JICARILLA APACHE INDIANS, by Morris E. Opler

DULCE [JICARILLA APACHE RESERVATION] – In the town of Dulce in NW
New Mexico, one block from the PAN AM building is the old high school, now used
as an engineering facility by MAKEN & HANGER [originally ZIA Corp.]. Inside the
facility is an elevator that leads to Level- 1 of the massive underground facility
beneath the Dulce area which is also known as “Ultra” or “Section-D”, which runs
under Main Street at a depth of about 200 feet. This level is guarded by PROFORCE
Security, whereas deeper and more secure levels under the Archuleta mesa to the
north contain automatic devices designed to KILL intruders. Dulce is by far the most
massive and most strategic of all of the underground “hubs” of the joint
military- industrial / alien imperial collaboration in North America, with numerous
tube-tunnels radiating to all parts of the continent and beyond, source: ALIEN

MAGIC, by William F. Hamilton; The Dulce Book; Map of Dulce, New Mexico
The Dulce, New Mexico Base

An underground Military Base/Laboratory in Dulce, New Mexico connects with the
underground network of tunnels which honeycombs our planet, and the lower levels
of this base are allegedly under the control of Inner Earth beings or Aliens. This base
is connected to Los Alamos research facilities via an underground “tube-shuttle.” (It
can be assumed that such a shuttle way would be a straight-line construction. It should
then be possible, by using maps and some deduction, to determine the most likely
location of this base, especially since the general location is already known.)
Beginning in 1947, a road was built near the Dulce Base, under the cover of a lumber
company. No lumber was ever hauled, and the road was later destroyed. Navajo Dam
is the Dulce Base’s main source of power, though a second source is in El Vado
(which is also another entrance). (Note: The above facts should also help to locate the
base.) Most of the lakes near Dulce were made via government grants “for” the
Indians. (Note: The September, 1983 issue of Omni (Pg. 80) has a color drawing of
The Subterrene,’ the Los Alamos nuclear-powered tunnel machine that burrows
through the rock, deep underground, by heating whatever stone it encounters into
molten rock, which cools after the Subterrene has moved on. The result is a tunnel
with a smooth, glazing lining.)” (Note: Where would the molten rock go? And what
has been done with this concept since 1983?)

Bechtel (BECK-tul) is a super secret international corporate octopus, founded in 1898.
Some say the firm is really a ‘Shadow Government’s working arm of the CIA. It is the
largest Construction and Engineering outfit in the U.S. A and the World (and some say,
beyond).” “The most important posts in U.S.A. Government are held by former
Bechtel Officers. There are over 100 Secret Exits near and around Dulce. Many
around Archuleta Mesa, others to the source around Dulce Lake and even as far east
as Lindrich. Deep sections of the Complex connect into natural Cavern Systems.
(Note: The elevators, lights, and doors at Dulce Base are all magnetically controlled.)

The area around Dulce has had a high number of reported Animal Mutilations.” The
researchers at Dulce Base have also abducted several people from Dulce’s civilian
population and implanted devices of various types in their heads and bodies. (Note:
Livermore Berkeley Labs (where?) began producing blood for the Dulce Base in the
mid 1980s, and Human and Animal abductions slowed considerably. It may be
worthwhile to check-out Livermore Berkeley Labs.) DELTA group (from the
National Recon Group) is responsible for security of all Alien- connected projects. The
DELTA symbol is a Black Triangle on a Red Background. Dulce Base’s symbol is a
Delta (triangle) with the Greek Letter “Tau” (t) within it, and then the entire symbol is
inverted, so the triangle points down, and the “Tau” is also inverted. Christa Tilton
(was abducted and taken to Dulce Base) She is the editor of “Crux” magazine, which
deals with UFOs, abductions, etc. P.O. Box 906237 Tulsa, Oklahoma (zip ?????)

Bases in the United States Mt. Ranier, Washington State Mt. Lassen, Tehama County,
California Death Valley, California Superstition Mountains, Arizona Mt. Shasta,
California Brown Mountain, North Carolina Mt. Ranier Entrance.

A very active UFO base exists beneath Mt. Ranier. There are also said to be
underground “vaults” containing records of the ancient Lemurians. (Note: F.L.
Boschke wrote the book “The Unexplained” about the mysteries surrounding Mt.
Ranier.) The ice cap of Mt. Ranier contains a maze of corridors and caves. In August
of 1970, scientists climbed to the top of Mt. Ranier, and entered these caverns and
tunnels. Evidence was found indicating that a small lake exists deep beneath the ice
cap. It is possible that one could find a way to get beneath Mt. Ranier through these
tunnels.

The Mt. Lassen Entrance Mt. Lassen in Tehama County, California is an entrance to a
large underground city. Near the foot of Mt. Lassen is a town called Manten. A man
named “Ralph B. Fields” lived (lives?) there, and found the entrance to the
underground city. His friend “Joe” was with him. The cave entrance is in the side of
the mountain, at a little over 7,000 feet above sea level, and is near a rock outcropping
suitable for camping under.

Dulce & Other Underground
Bases and Tunnels
by William Hamilton III

(Excerpt from Cosmic Top Secret by William H. Hamilton III)

Underground Bases & Tunnels

Does a strange world exist beneath our feet? Strange legends have persisted for
centuries about the mysterious cavern world and the equally strange beings who
inhabit it.

More UFOlogists have considered the possibility that UFOs may be emanating from
subterranean bases, that UFO aliens have constructed these bases to carry out various
missions involving Earth or humans.

Belief in a subterranean world has been handed down as myth, tale, or rumor down
the generations from all over the world. Some of these stories date back to ancient
times and tell tales of fantastic flora and fauna that can be found in the caverns of
ancient races. Socrates spoke of huge hollows within the Earth which are inhabited by
man, and vast caverns which rivers flow.

A legendary large cavern supposedly exists below Kokoweef Peak in southwestern
California. Earl Dorr, a miner and prospector, followed clues given to him by Indians.
He entered Crystal Cave in the thirties and followed a passage down into Kokoweef
Mountain until he attained a depth of about a mile. There, he entered a large cavern

which he proceeded to explore for a distance of eight miles. At the bottom of the
cavern, a river flowed, rising and falling with the lunar tides, and depositing black
sands rich in placer gold along its banks. One day, crazed by fever, Dorr used
dynamite to seal shut the entrance to his fabulous cavern, and started a legend that still
lures men to seek the fabled wealth below Kokoweef.

Nowhere is the belief in a subterranean world more prevalent than with the Indians of
North America. The Hopis believed they emerged from a world below the earth
through a tunnel at the base of the San Francisco peaks near Flagstaff.

There are also legends about mysterious Mount Shasta in northern California. The
mountain is said to have housed a race of surviving Lemurians who built a sanctuary
in the depths of the earth to escape the catastrophes which befell them. These
Lumerians allied themselves with space travelers who built a saucer base inside the
mountain.

Whether ancient cities exist in caverns below the earth is anyone’s guess, but it’s a fact
that governments have built underground tunnels and facilities for a variety of reasons.
The Chinese, Russians, Vietnamese all built subterranean tunnels and bases. It
shouldn’t come as a surprise that America has been building its own underground
world.

An elusive report in the August 7, 1989 edition of U.S. News and World Report,
reveals the secret plan to carry on government in case of a disaster. The plan is called
“Continuity of Government” or COG. The article stated that COG is the government’s
ultimate insurance policy should Armageddon ever arrive, providing the program runs
smoothly. In 1982, a new secret agency, the Defense Mobilization Planning Systems
Agency was created and reports to the President. In the event of a nuclear attack,
special teams equipped with war plans, military codes, and other essential data would
accompany each designated presidential successor to secret command posts around
the country. Besides the president, another 46 key officials named in the Joint
Emergency Evacuation Plan (JEEP) would be evacuated. There are 50 of these
underground command post bunkers located in 10 different regions of the country,
and each is linked with others via satellite or ground-wave relays.

The U.S. Air Force sponsored research in deep underground construction as early as
1958. The RAND corporation carried out this research, and published proceedings
from symposiums held on the subject of construction methods and equipment, utility
installation, and the use of nuclear bursts to produce underground cavities.

A great concern to underground construction engineers was the problem of ventilation.
They considered it advisable to take into account all types of ventilation
contamination, and not just radioactive fallout. Underground works included ingresses,
egresses, and accommodations. The first two are generally provided for by shafts or
tunnels, while the third requires larger openings, such as halls, chambers, cells, vaults,

or other open spaces. Many problems in design and construction are common to all
three, but the problems associated with the larger openings in the rock, required for
accommodation purposes, are generally more complex and difficult than those for the
smaller openings of tunnels or shafts. Operation and maintenance of underground
installations can also pose special problems.

Huge boring machines with large-diameter disc-grinders are used in constructing
tunnels. Tunnels are needed to link one accommodation area to another, or one
facility to another.

The English Chunnel project is the largest engineering project in Europe, and w links
France and England through a three-tunnel railway. The eleven boring machines used
in the project were so large and so long that they were assembled in underground
areas 65 feet high. Six of the machines are dug the submarine tunnel between the
Dover Strait and Pas de Calais and five dug the land tunnels leading away from the
channel to aboveground terminals. The front of the boring machine contains
tungsten-tipped picks that workers guide with the use of laser projections on video
screens.

These boring machines are like huge, steel-encased worms. Sealed in each machine
are teams of 35 men who line the cavity of the tunnel with concrete and guide the
muck down the track. The machines bore the hole, remove the earth, and pave the
inside of the tunnel with precast concrete segments. The digging face of the machine
is a 95-ton, 28-foot-6-inch diameter disc, divided into cutting blades. The borer is
300-feet long.

The September, 1983 Omni ran a picture story on the “Subterrene,” a nuclear
tunnel-boring machine developed at Los Alamos. The machine burrows through deep
underground rock, heating it to a molten state (magma), which cools after the
Subterrene moves on. The result is a tube with a smooth, glazed lining that can be
used for the high-speed transport shuttles that link the sub-base complexes.

Interestingly enough, an inventor named Charles Kaempen has invented a composite
pipe that has enormous tensile strength. Kaempen has developed an undersea
transportation tube that uses his unique system of lock coupling and merely has to be
laid on the sea floor, obviating the need for excavating and tunneling. He has made a
proposal to Spain to link Spain and Morocco using his new tube technology.

Tunnel boring is undergoing a boom according to a recent article in the Wall Street
Journal (Dec. 12, 1990). Susan Nelson, director of the American Underground Space
Association is quoted in the article as saying, “There is simply a lot more interest in
the world these days in tunneling and use of the underground in general.” It says the
underground is crowded with government-funded mega-projects and proposed
projects. The Spanish want to put a tunnel through the Pryenees and bore a road to
Morocco on the African coast. The Norwegians want to burrow under the fiords. The

Japanese are toying with tunneling through to South Korea. The Canadians are
building a tunnel from New Foundland to Prince Edwards Island. In America, there
are 87 public-works projects planned in the next three years alone.

Bear in mind the fact that these are all classified as civil engineering projects. Where
civil engineering goes today, military engineering has already gone yesterday. In 1959,
the Rand Report carried photos of the giant Tunnel Boring Machines (TBMs). Large
scale military engineering projects may have made extensive use of these machines
since the fifties.

Tunneling is getting a boost because of the increasingly crowded global landscape.
Planners in Northern Italy are burying stretches of a freeway in a tunnel to avoid
cutting a road through historical important forest and farmlands.

Mr. Russell J. Miller of the Colorado School of Mines and director of the Center for
Space Mining in Boulder, Colorado, is working on studies to determine the feasibility
of putting space bases and cities underground on Mars and on the moon. Of course,
someone from somewhere else may have already beaten Mr. Miller to the punch.

Informants have told us that underground facilities utilize transport tubes to shuttle
workers to and from work. This is more than a subway. These tube trains use high
technology. It isn’t surprising, then, to learn that Frank P. Davidson of the
Massachusetts Institute of Technology has a plan to unclog the airways by designing
electric “wingless airplanes” that hurtle across continents and oceans in sealed tubes
or tunnels that are essentially frictionless vacuum chambers. Perhaps he should meet
with Dr. Kaempen and consider using his composite pipe as the tube.

Underground diggers have their own society called “Moles,” who find talk of
tunneling and tunnels spicier than most of us surface dwellers.

It’s no secret that governments have built their own secret underground railways and
tunnels. China’s leaders built secret rail tunnels under Beijing that would enable them
to flee in a crisis. According to a Chinese civil servant, the tunnels linked leader’s
homes, government buildings, the central bank and an army base. That sounds like a
well-thought-out-plan. Grab your prized possessions, cash from the bank, armed
guards from the base, and run like hell! The network was built up over a period of 40
years as a defense against foreign invaders. We can be sure that what China has done
we have done.

Japan, dense and overcrowded, is giving serious thought to living underground. They
are planning to build underground sewage plants, underground railroads, and
underground cities. According to a recent issue of Omni, The Taisei Corporation is
planning to build a subterranean mall called “Alice City.” There would be
underground stores, offices, hotels, theaters, and sports arenas. Strolling spaces would
meander through interior spaces populated with trees, birds, fish tanks, bridges, and

waterfalls. The Shimizu Corporation has a blueprint for constructing an underground
grid that would span 2,000 square miles underneath Tokyo. This grid would contain a
number of commercial centers connected by subway trains that could shuttle workers
to and from work.

According to science-writer Isaac Asimov, there are advantages to living underground.
For one thing, no one would worry about the weather. The temperature could be held
at a fairly constant level, between 55 and 60 degrees F, and a lot of energy used for
heating and cooling could be saved. Without the diurnal sun cycle, no one would
know day from night. People could be working around the clock or playing around
the clock, depending on their penchant. All transportation, communication, and
housing could go underground, freeing the surface world from human trampling. The
surface of the planet would have a few nice restaurants and recreation centers where
people could observe clear blue skies, the returning planet and animal life, and have
room for all to roam on a weekend hike. Earthquakes would cause only one-fifth the
damage to underground structures that they cause to surface structures.

Alternative 3

In a provocatively speculative book entitled Alternative 3, author Leslie Watkins
proposes that scientist have become concerned with the state of the Earth’s
atmosphere, a scenario that is much easier to accept these days. Secret meetings
between scientists produce three alternatives for handling the imminent danger.

“Alternative 1” was a plan to blast holes through the stratosphere to release heat and
pollution.

“Alternative 2” was a plan to relocate Earth’s population in massive underground
caverns drawing fresh, cool air from the soil (Perhaps there is a real Alternative 2 in
progress).

“Alternative 3” was to escape the Earth and go to Mars. We will consider Alternative
3 later. Whether any real such alternative plans exist is not being argued here, but the
concepts are useful in examining the future directions of secret projects.

The Atomic Energy Commission initiated Project Plowshare in 1957 to develop
peaceful uses of nuclear explosives. It has explored the use of nuclear blasts to build
harbors, dams, highway cuts, and canals, and to stimulate oil and natural gas
production by following up the widely used practice of detonating ordinary chemical
explosions in oil- and gas-bearing strata. The first test of this technique, known as
Project Gasbuggy, took place 4,240 feet below ground in a desolate area of New
Mexico know as the San Juan Basin, on December 10, 1967, where a 26-kiloton
nuclear “device” was exploded in a sealed well.

While Gasbuggy was only a single experiment, the A.E.C., in partnership with
Austral Oil Company of Houston, subsequently began the first of what promised to be
a long series of even larger nuclear explosions, on the order of two 100-kiloton shots
each year, for a period of 10 years or more. The first explosion, known as Project
Rulison, was a 40-kiloton shot, some 8,400 feet below ground at a site near Rifle,
Colorado, on September 10th, 1969.

A method that has been suggested to build bases on the moon may already be in
operation on Earth. With the use of controlled nuclear blasts it will be possible to
excavate cavities beneath the lunar surface. A missile could be used to drill a hole
approximately 50 feet deep, then a second blast would produce a cavity about 45 feet
in diameter. An igloo would be constructed over the hole, a plastic bag dropped down
the cavity and filled with air. The work area and living quarters would then be
constructed.

It may prove more efficient and practical to “house” future moon colonies in artificial
or natural caves beneath the lunar surface, than to attempt construction of exposed
meteorite domes. Living quarters, spacious parks, lakes, and wooded areas could be
constructed underground. A transportation tube would connect various colonists to
other ports and distant parts of the moon.

Back on Earth, we have reports of equally suspicious parks. An ex-security officer,
who once worked underground in the Groom Lake area of Nevada, said he once saw a
baseball diamond and an Olympic-sized swimming pool in one of the caverns a mile
below the Nevada desert.

What’s going on in the deep underground tunnels below Mercury Base at the Nevada
Test Site? After hearing the story of Bob Lazar on KVEG radio, a construction
worker called Billy Goodman rang Bob Lazar to say, “We are the construction
workers. ..we put things together and take them apart.. .of the meeting of seven people,
there are two who will come forward to support you.” This mysterious caller further
said, “There’s more than just tunnels down there. There’s everything you can imagine
down there. I know because we put it up. We installed. We did everything.”

Informants have mentioned underground tunnels and facilities in New Mexico at
Dulce, Sunspot, Datil, Corona, Taos Pueblo, and Albuquerque; in Arizona in the
Santa Catalina Mountains; in Colorado at Delta, Grand Mesa, and Colorado Springs;
in California at Needles, Edwards AFB, Tehachapi Mountains, Ft. Irwin, Norton AFB,
and Morongo Valley; in Nevada at Blue Diamond, Nellis AFB, Groom Lake, and
Papoose Lake areas, Quartzite Mountain, and Tonopah.

I became interested in a possible underground installation in the Techachapi
Mountains in the summer of 1988. A young couple, Ray and Nancy, reported that
they had gone to a plateau in the mountains after Ray’s shift work had completed at
the Northrop Plant. Ray was inspector on the B-2 project. The plateau is adjacent to

the perimeter of the leased Tejon Ranch where Northrop has built a secret
underground facility. It was about one o’clock in the morning when Ray and Nancy
spotted a brilliant orb coming out of the ground which flashed light in their direction.
They could not account for two-and-half hours of missing time. Ray thought that they
had the orb under observation for about an hour, yet the next memory is of sunrise !
Under hypnosis, Ray recalls being abducted and taken to an underground base
populated by little grey EBEs and Air Force and security personnel. The EBEs were
examining Nancy who had been restrained on a metal table. Ray’s emotions swelled
under hypnotic recall of the incident.

A local man claims he saw a flying saucer emerge and take-off from a silo on the
property.

A disgruntled contractor reported that he worked on constructing the tunnels in the
underground area and was bothered by the Air Force probes that were often seen
hovering in the tunnels. He described these probes as small orbs, and said that this
facility was nicknamed “The ANTHILL” because of its resemblance to underground
ant colonies. The tunnels have round doorways without doors. Adjacent to the
doorways are security panels with red and green lights. There are some kind of
cylinders embedded in the doorway jams that project a field of energy of some sort.

Black helicopters have been sighted around Boynton and Secret Canyon near Sedona,
Arizona. A man living in Long Canyon has sighted a lot of strange things in the
canyon areas, and residents suspect a secret government installation has been
established in, of all places, Secret Mountain! One of my investigators hiked to Secret
Canyon late one night and was stopped by a voice on a loudspeaker and a
laser-targeting light on his chest. He was told he had entered a restricted area and to
turn around and leave.

We have now spotted and photographed the small orbs around the “Anthill.” These
orbs definitely exhibit the peculiar characteristics reported in other UFO sightings.

Since that time, we have located two other secret facilities. One is at a place in the
Mojave-Desert called Llano. It is an extremely secure facility, but witnesses have seen
an extremely bright light burning atop a pylon inside of a movable behemoth- sized
structure. This light does not illuminate the interior of the structure! Orbs have been
seen in the vicinity of this facility as well.

We can only conjecture about what secret programs are being conducted away from
preying eyes. The underground can and does hold all sorts of secrets. Some of the
most amazing revelations about what goes on in the underground projects comes from
a mysterious informant named Thomas, and who claims there is, indeed, a deep dark
secret harbored underneath the imposing mountainous elevations of Northern New
Mexico.

The Deep Dark Secret at Dulce

Dulce is a sleepy little town in northern New Mexico of about 900 population located
above 7,000 feet on the Jicarilla Apache Indian Reservation. There is only one major
motel and a few stores. It’s not a resort town and it is not bustling with activity. But,
according to a few outsiders, Dulce harbors a deep, dark secret. The secret is harbored
deep below the tangled brush of Archuleta Mesa. The secret is said to be a joint
government-alien biogenetic laboratory designed to carry out bizarre experiments on
humans and animals.

New Mexico State Police Officer Gabe Valdez was drawn into the mysteries of Dulce
when called to investigate a mutilated cow in a pasture 13 miles east of Dulce on the
Manual Gomez ranch. Gomez had lost four cattle to mutilations between 1976 and
June 1978 when a team of investigators which included Tom Adams arrived from
Paris, Texas to examine the site of the carcasses.

Curious as to how cattle were being selected by the mysterious mutilators, an
interesting experiment was conducted on July 5, 1978 by Valdez, Gomez, and retired
scientist Howard Burgess. They pinned up about 120 of the Gomez beef cattle and
moved them through a squeeze chute under an ultraviolet light. They found a “glittery
substance on the right side of the neck, the right ear, and the right leg.” Samples of the
affected hides were removed as well as control samples from the same animals.
Schoenfeld Clinical Laboratories in Albuquerque analyzed the samples and found
significant deposits of potassium and magnesium. The potassium content was 70
times above normal.

Some investigators attribute the mutilations to aliens from UFOs. UFOs have been
seen frequently around Dulce. Sightings of strange lights and other aerial phenomena
have been reported in many areas where the cows have been found at the time of the
reported mutilation.

On April 19, 1988, 1 arrived in Dulce to visit with Gabe Valdez and inquire about the
sightings, the mutes, and the rumors of an underground alien base. Snow was still on
the ground. I checked into the Best Western Motel and called Valdez to make an
appointment to see me at 9:30 PM. I found Gabe to be a very congenial host, offering
to show me around the roads of Dulce that night and point out some various locations
where he had found mutilated cows or had seen strange aerial lights. He made the
astounding statement that he was still seeing unidentified aircraft at the rate of one
every two nights. We took a look at the Gomez Ranch, the road by the Navajo River,
and the imposing Archuleta Mesa. Gabe had found landing tracks and crawler marks
near the site of the mutes, and was convinced that scientist Paul Bennewitz of
Thunder Scientific Labs in Albuquerque, was definitely on the right track in his
attempts to locate the underground alien facility in the vicinity of Dulce. No one knew
for sure where the facility was located or how humans or aliens gained secret entry to
the facility.

I had first heard of Paul Bennewitz in 1980 when my friend Walter called me from
Albuquerque and told me he had been working with Paul on electronic instruments.
Walter informed me that Paul had not only photographed UFOs, but had established a
communication link with their underground base at Dulce. Bennewitz had first come
to prominence during the August, 1980, sightings over the Manzano Weapons Storage
Area at Kirtland AFB. A Kirtland AFB incident report dated October 28, 1980
mentions that Bennewitz had taken film of the UFOs over Kirtland. Paul, who was
president of the Thunder Scientific Labs which was adjacent to Kirtland gave a
briefing in Albuquerque detailing how he had seen the aliens on a video screen. At the
time, the aliens were transmitting signals to him from a base underneath Archuleta
Mesa.

Researcher William Moore claims that the government agents became interested in
Bennewitz’s activities and were trying to defuse him by pumping as much
disinformation through him as he could absorb. Whether Paul’s communication with
supposed aliens at the Dulce Base was part of this disinformation campaign is unclear.
If we believe that Paul is the single source of reports on the Dulce Facility, then
discounting Paul’s story and discrediting him could be a tactical maneuver. The actual
disinformation maneuver would result in making the public believe there was nothing
to the Dulce story.

PROJECT BETA

In a report entitled “PROJECT BETA,” Paul states that he had spent two years
tracking the alien craft; that he had constant reception of video from an alien ship and
underground base viewscreen; that he had established constant direct communications
with the aliens using a computer and a form of hexadecimal code with graphics and
print-out; and claims to have used aerial and ground photography to locate the alien
ship’s launch ports charged beam weapons. Paul claimed that the aliens were devious,
employed deception, and did not adhere to agreements. He and Walter were working
on a weapon that would counter the aliens.

Have we crossed over from the land of the real world to the land of science-fiction?
But then, bizarre phenomena may have its roots in a bizarre reality. As we continue
our studies, the world of science-fiction will become the world of science-fact.

Paul Bennewitz had investigated the case of abductee Myrna Hansen of New Mexico,
who reported having been taken to an underground facility in May 1980. Christa
Tilton of Oklahoma claims she had an experience of missing time in July, 1987, when
she had been abducted by two small grey aliens and transported in their craft to a
hillside location where she encountered a man dressed in a red military-type jump suit
She was taken into a tunnel through computerized check-points displaying security
cameras. She reports having been taken on a transit vehicle to another area where she
stepped on a scale-like device facing a computer screen. After the computer issued her
an identification card, she was told by her guide that they had just entered Level One

of a seven- level underground facility. Christa goes on relating how she was eventually
take down to Level Five, where she reports having seen alien craft and little grey alien
entities in some of the areas that she passed through.

In one large room where she saw computerized gauges hooked to large tanks and
large arms that extended from some tubing down into the tanks. She noticed a
humming sound, smelled formaldehyde, and had the impression that a liquid was
being stirred in the tanks. She was not shown the contents of these tanks. Christa has
made drawings of much of what she claims to have witnessed during her abduction.

These tanks were also depicted in a set of controversial papers called the “Dulce
Papers,” which were allegedly stolen from the Dulce underground facility along with
over 30 black and white photos and a video tape. The mysterious security officer who
took the papers claims to have worked at Dulce until 1979 when he decided that the
time had come to part company with his employers.

The rest of this chapter relates how this security officer met with a colleague of mine
in order to tell us the truth about the aliens, the U.S. Government, and the Dulce Base.
His intention was to come out of hiding and present hard evidence to back his claims.

In late 1979, Thomas C. could no longer cope with the awesome reality he had to
confront. As a high level security officer at the joint alien-U.S. Government
underground base near Dulce he had learned of and had seen disturbing things. After
much inner conflict, he decided to desert the facility and take various items with him.

Using a small camera, he took over 30 photos of areas within the multi-level complex.
He collected documents and removed a security video tape from the Control Center
which showed various security camera views of the hallways, labs, aliens, and U.S.
Government personnel to take with him. Then, by shutting off the alarm and camera
system in one of the over 100 exits to the surface, he left the facility with the photos,
video, and documents. The “originals” were hidden after five sets of copies were
made.

Thomas was ready to go into hiding. But, when he went to pick up his wife and young
son, he found a van and government agents waiting. His wife and child had been
kidnapped. He had been betrayed by K. Lomas (a fellow worker). The agents wanted
what Thomas had taken from the facility in order to get his wife and son back. When
it became apparent to him they would be used in biological experiments and were not
going to be returned unharmed, he decided to get lost. That was over ten years ago.
How did Thomas get involved in all this covert intrigue?

Thomas, now is his 50 f s was in his mid-twenties, when he received top secret training
in photography at an underground facility in West Virginia. For seven years he
worked in high security photography in the Air Force. In 1971, he left and went to
work for the Rand Corp. in Santa Monica, California. In 1977 he was transferred to

the Dulce facility. He bought a home in Santa Fe, New Mexico, and worked Monday
through Friday. He commuted to work via a deep underground tube-shuttle system.

At this time, a fellow researcher was working security in Santa Fe, N.M. and was
privately investigating UFO sightings, animal mutilations, Masonic and Wicca groups
in the area. Thomas had a mutual friend who came to Santa Fe in 1979 to visit both
the researcher and Thomas. This visitor later viewed the photos, the video tape, and
documents taken from the Dulce Base. Drawings were made from what was seen and
later circulated in the UFO research community as the “Dulce Papers.”

Thomas alleges that there were over 18,000 short “greys” at the Dulce Facility, and
that he saw reptilian humanoids. A colleague had come face-to-face with a 6-foot tall
Reptoid which had materialized in his house. The Reptoid showed an interest in
research maps of New Mexico and Colorado which were on the wall. The maps were
full of colored push-pins and markers to indicate sites of animal mutilations, caverns,
locations of high UFO activity, repeated flight paths, abduction sites, ancient ruins,
and suspected alien underground bases.

The multi- level facility at Dulce is reported to have a central HUB which is controlled
by base security. The security level goes up as one descends to lower levels. Thomas
had an ULTRA-7 clearance. He knew of seven sub-levels, but there may have been
more. Most of the aliens supposedly are on levels 5, 6 and 7 with alien housing on
level 5. The only sign in English was over the tube shuttle station hallway which read
“to Los Alamos.” Connections go from Dulce to the Page, Arizona facility, then onto
an underground base below Area 51 in Nevada. Tube shuttles go to and from Dulce to
facilities below Taos, N.M.; Datil, N.M.; Colorado Springs, Colorado; Creed,
Colorado; Sandia’ then on to Carlsbad, New Mexico.

There appears to be a vast network of tube shuttle connections under the U.S. which
extends into a global system of tunnels and sub-cities.

At the Dulce Base, most signs on doors and hallways are in the alien symbol language
and a universal symbol system understood by humans and aliens. Thomas stated that
after the second level, everyone is weighed in the nude, then given a uniform. Visitors
are given off-white uniforms; jump suits with a zipper. The weight of the person is put
on a computer I.D. card each day. Any change in weight is noted; if over three pounds,
a physical exam and X-ray is required.

Scales are located in front of all sensitive areas and are built into the floor near
doorways and the door control panels. An individual places his computer I.D. card
into the door slot, then enters a numerical code onto a keypad. The person’s weight
and code must match the card or the door will not open. Any discrepancy will summon security. No one is allowed to carry anything into sensitive areas. All
supplies are put on a conveyor belt and X-rayed. The same method is used in leaving sensitive areas.

All elevators are controlled magnetically; there are no elevator cables. The magnetic
system is inside the walls of the elevator shaft, there are no normal electrical controls.
Everything is controlled by advanced magnetics, including lighting. There are no
regular light bulbs and the tunnels are illuminated by phosphorous units with broad
structureless emission bands. Some deep tunnels use a form of phosphorous pentoxide
to temporarily illuminate areas. The aliens won’t go near these areas for reasons
unknown.

Level 1 contains the garage for street maintenance. Level 2 contains the garage for
trains, shuttles, tunnel-boring machines and disc maintenance. The studies on Level 4
include human-aura research, as well as all aspects of telepathy, hypnosis, and dreams.
Thomas says that they know how to separate the bioplasmic body from the physical
body to place an “alien entity” life-force-matrix within a human body after removing
the “soul” lifeforce-matrix of the human.

Level 6 is privately called “Nightmare Hall.” It holds the genetic labs, where
experiments are done on fish, seals, birds, and mice that are vastly altered from their
original form. There are multi-armed and multi- legged humans and several cages (and
vats) of humanoid bat-like creatures as tall as 7-feet. The aliens have taught the
humans a lot about genetics; things both useful and dangerous.

The Grey and reptoid species are highly analytical and technologically oriented. They
have had ancient conflicts with the Nordic humans from other space societies, and
may be staging here for a future conflict. Intensely into computing and bio-
engineering sciences, they are led to doing reckless experiments without regard for
what we consider to be ethical and empathetic conduct toward other living creatures.

Principal government organizations involved in mapping human genetics, the
so-called genome projects, are within the Department of Energy (which has a heavy
presence on the Nevada Test Site); the National Institute of Health; the National
Science Foundation; the Howard Huges Medical Institute; and, of course, the Dulce
Underground Labs which are run by the DOE. Thomas had revealed that the chief of
the genetic experiments for Los Alamos and Dulce is Larry Deaven.

According to Thomas, the alien androgynal breeder is capable of parthenogenesis. At
Dulce, the common form or reproduction is by polyembryony. Each embryo can, and
does divide into 6 to 9 individual “cunne” (pronounced cooney, i.e. siblings). The
needed nutriment for the developing cunne is supplied by the “formula,” which
usually consist of plasma, deoxyhemoglobin, albumin, lysozyme, cation, amniotic
fluid and more. The term “genome” is used to describe the totality of the
chromosomes unique to a particular organism (or any cell within an organism), as
distinct from the genotype, which is the information contained within those
chromosomes. The human genes are mapped to specific chromosomal locations. This
is an ambitious project that will take years and a lot of computer power to accomplish.

Is the alien and human BIO-TECH being used to nurture and serve us, or is it being
used to control and dominate us? Why have UFO abductees been used in genetic
experiments? It was when Thomas encountered humans in cages on Level 7 of the
Dulce facility that things finally reached a climax for him. Row after row of
thousands of humans, human-mixture remains, and embryos of humanoids were kept
in cold storage. He says, “I frequently encountered humans in cages, usually dazed or
drugged, but sometimes they cried and begged for help. We were told they were
hopelessly insane, and involved in high-risk drug tests to cure insanity. We were told
to never speak to them at all. At the beginning we believed that story. Finally in 1978
a small group of workers discovered the truth. That began the Dulce wars.”

Thomas also says the aliens don’t want the land, the gold, the minerals, or water that
we posses, nor even the human or animal life. What they do want is magnetic power
that surges on and through the Earth. The aliens harvest this magic power in a way
unknown to us. Thomas says the aliens recognize this power as more valuable than
any other commodity on our globe.

It may be unpalatable to digest or believe Thomas’ story. In fact, it seems like part of a
living nightmare. There is evidence that something strange does go on at Dulce. Does
Thomas have the answer? There may be a terrible truth hidden behind the continuing
phenomena of UFO sightings, abductions, and animal mutilations. Our government
intelligence agencies have had an ongoing watchful eye on all UFO activities for
many decades now. This extraordinary phenomenon must have an extraordinary
explanation. We may be only one outpost in a vast interstellar empire.

Recently, researcher John Anderson went to Dulce, N.M., to see if there was any truth
to the reported UFO activity. He says as he arrived in town he saw a caravan of cars
and a McDonell-Douglas mini- lab in a van going up a rural road near the town. He
followed them to a fenced-in compound where he waited to see further developments.
Suddenly, six UFOs descended rapidly over the compound, hovered long enough for
him to snap a picture, then shot up and out of sight. When later stopping at a store, he
told the owner about the UFO photo he had taken, the store owner listened and
revealed how he had been a victim rancher of cattle mutes. Their conversation was
interrupted by a phone call. The store owner told John to leave at once, then after John
went to his car, he saw a mysterious van drive up to the store and a man got out and
went inside. John, deciding to leave Dulce, was followed by two men in a car as he
left town.

Even more recently a research team has gone up to Archuleta Mesa to take soundings
under the ground. Preliminary and tentative computer analysis of these soundings
seem to indicate deep cavities under the mesa.

How long will the secret of Dulce, known to insiders as Section D, remain locked up
inside the mute New Mexico mountains? Forever?

Dulce Base, New Mexico. Tunnels to: Colorado Springs, Colorado Creed, Colorado
Datil, N.M. Los Alamos. Page, Arizona Sandia Base Taos, NM

There is Dulce Base, in New Mexico. Dulce is a small town in northern New Mexico,
located above 7,000 feet on the Jicarilla Apache Indian Reservation. There is only one
major motel and a few stores. It’s not a resort town and it is not bustling with activity.
But Dulce has a deep, dark secret. The secret is harbored deep below the brush of
Archuleta Mesa. Function: Research of mind related functions, genetic experiments,
mind control training and reprogramming. There are over 3000 real-time video
cameras throughout the complex at high- security locations (entrances and exits).
There are over 100 secret exits near and around Dulce.

GUADELLUPE MTS. – In the 1800’s, two trappers reportedly discovered a cave in
the Guadellupe Mts., which they followed to a considerable depth. Hiding behind a
large outcropping of rock they observed in fascination and horror a procession of
beings in dark hooded robes enter a large cavern and bagan to chant, at which a
“crystal like” entity descended from the stalactites above, hovered and in a
multi-colored display communicated with the beings in some type of xylophone-like
manner, until it once again ascended and was lost among the stalactites above, at
which the procession descended DOWNWARD through the passage from which they
had emerged, source: SHAVERTRON Magazine

6. Los Alamos, New Mexico

Functions: Psycho tronic Research, Psycho tronic Weapons
Levels: Multiple

Tunnels to: ALB ARB, New Mexico Dulce, New Mexico Connections to Datil,Taos

LOS ALAMOS – Massive underground joint military-alien facilities connected via
shuttle to the Dulce, New Mexico facility to the NW. The deeper facilities under Los
Alamos reportedly descend to great depths and intersect with alien sectors which
constitute the largest concentration of grey alien activity in North America, with
Dulce running a close second… although many of the aliens apparently commute
between Dulce and Los Alamos. To minimize cattle mutilations the U.S. government
has reportedly been transporting daily shipments of cattle to rendezvous points in the
mountains SE of Los Alamos, where some have reported massive UFO activity on
these occasions, and also ancient heiroglyphs depicting alien beings, source: Thomas
Costallo; Sharula [Bonnie] Dux; K. Studstrup; etc.

Los Alamos, New

Mexico Functions: Psychotronic Research, Psychotionic Weapons Levels: Multiple Tunnels
to: ALB AFB, New Mexico Dulce, New Mexico Connections to Datil, Taos –

ORGAN MTS. – 60 miles NW of El Paso, Texas in the Organ Mts. of New Mexico.

Helen Compton Gordon and her husband discovered an old abandoned mine far above
the “Bean Blossom Mine” near their former home. Climbing the ore- splattered slope
they entered the other mine and discovered deep inside an immense chasm separated
from the main tunnel passage by a rock wall, on the other side of which was a narrow
ledge-precipice at the edge of the chasm. They threw lighted sticks down the shaft and
they seemed to “fall forever”, also rocks were thrown in which they could not hear hit
bottom. An old timer in the area told them it was a “glory hole” and that miners
tended to avoid them, source: SHAVER MYSTERY magazine, Vol.1, No.2 [1947]

PIE TOWN – An unexplored cave with large steps leading deep into the earth near El
Moro National Monument NE of Pie Town. Also reports of a southern extension base
between Pie Town and Datil which is linked underground to the Dulce base in NW
New Mexico, source: THE HIDDEN CITY OF CHIHUATLAN, by Charles A.
Marcoux; Thomas A. Castello

7. Sandia Base, New Mexico

Functions: Research in Electrical/magnetic Phenomena
Levels: Multiple
Tunnels to: Dulce Base

Notes: Related Projects are studied at Sandia Base by The Jason Group’ (of 55
Scientists). They have secretly harnessed the ‘Dark Side of Technology’ and hidden
the beneficial technology from the public.

SAN CRISTOBAL – A homeless man spent the night in a black rock cavern near
some [hot?] springs north of San Cristobal [north of Taos]. He was frightened from
the cave after seeing a “lizard like” humanoid, the size of a man and walking upright
on two feet, source: Tim Ore.

8. Sunspot, NM

Function unknown

9. Taos, New Mexico

Function unknown

Tunnels to: Dulce, New Mexico; Cog, Colorado

Notes: Several other sidelines to area where Uranium is mined or processed.

TAOS – Reports of a native American legend stating that Montezuma was born near
Taos and was “instructed by beings who lived in Pueblo Peak, which is near Blue
Lake, where UFO’s have been seen entering and exiting the water. Near Taos, in a
cave above the Lucero River, not far from Frijoles Canyon, ancient and modern
sacrifices were carried out by secret cults. “Members of secret society groups in Taos

have been found beheaded, like Arthur Manby who told of a secret “Aztland” Hot
Springs roughly 1 1 miles NW of Taos, flanked by petroglyphs on the canyon walls,
source: ALIEN INVADERS, article/treatise by TAL LeVesque

TRUTH OR CONSEQUENCES – A Mr. Lemon stated that when he was young,
about 12, he was out hunting deer NORTH of Truth or Consequences, and was
tracking a wounded deer he had shot when he came across an intricately carved stone
stairway that led down into the earth, which he determined to investigate after he
killed the deer. He searched for years but was never able to find the enigmatic
staircase again, source: Cossette Willoughby

10. White Sands, NM

Function: Missile testing/design
Levels: Seven known

NEW HAMPSHIRE There may be as many as three underground installations in New
Hampshire’s hills, according to reports.

NEW YORK

New York, New York

Function unknown

Tunnels to: Capitol Building, D.C.

New York City

There is an entrance to the tunnels in New York City “in the vicinity of Midtown
Manhattan that can be reached through an abandoned elevator shaft that only very few
know about

NEW YORK

MANHATTAN – A large triangular system of tunnels utilized by a “masonic lodge”,
deep below the surface of Manhattan, source: “Tunnels and Caverns Beneath New
York City”, article by R. L. Blain-Sanders in the Fall, 1981 issue of SHAVERTRON
Magazine

MANHATTAN – Con Edison, while drilling a test hole in the north end of East River
Park, broke through to open space about 200 feet below, suggesting the existence of a
large cavern below, source: uncertain.

MANHATTAN – Strange stories of several sub-basement levels descending below the
Empire State Building, rumors of descending sub-basements connecting with ancient
tunnels and sub-basement levels controlled by the Federal government. Following the
Twin Towers bombing it was reported that 6 sub-levels controlled by the Secret
Service were damaged. These aspects of the bombings were, predictably, not

advertised by the national media monopolies, source: THE PHOENIX LIBERATOR;
various private news sources

MANHATTAN – The Episcopal Church of St. John the Divine at 103 St. and
Amsterdam reportedly conceals the entrance to an underground cavern used by an
occult lodge, an actual “city” left over from former sub-inhabitants of the eastern
seaboard during antediluvian/ Atlantean times, and protected by “space- warping”
technology, source: ENCYCLOPEDIA OF OCCULTISM & PARAPSYCHOLOGY,
by Leslie A. Shepard, pp. 889-890; Maurice Doreal

LINCOLN TUNNEL – A man and his wife, traveling through winter snow, parked
their car in the Lincoln tunnel to wipe the snow from off of the car, and vanished
without a trace, source: John Grant

MONT AUK – An underground base 8-9 levels deep below Camp Hero at Montauk
Point, Long Island, which is reportedly occupied by Ciakars from Alpha Draco, Greys
from Rigel Orion, Black Ops & German Intelligence – Thule Society agents. The
Montauk mind control and space-time manipulation projects were based there and at
25 other bases around North America and reportedly involved over 25 thousand
“abductees” who have been programmed to serve the as “sleeper” agents of the New
World Order. The computer archives of the Montauk Project are housed in the
underground facility near the Alsace-Lorraine region near the German-French border,
and is known as the Montauk Alsace Lorraine Time Archives [M.A.L.T.A.].
Entrances reportedly exist under the old 7-story Montauk Tower in the nearby town of
Montauk; near the Sage Radar Tower and buildings to the north; under the old
Montauk Air Force Station; Block Island; East Hampton; in a hill near the Light
House at Montauk ‘Point’ itself; in the cliffs overlooking the beaches near Camp Hero;
behind the so-called “cement bunkers” that have been sealed; under the “mystery
closets” which can be seen throughout the area; and connecting the basements of three
[?] buildings – now demolished – in the Shadmoor area directly west of the Ditch
Plains public bathhouse and parking lot; an entrance near a boulder which sits along
the west side of the SE entry road to the base; and also at Fort Pond Bay. source:
Preston Nicholes; Peter Moon; Duncan Cameron; Al Bielek; John Quinn; Michelle
Guerin; Michael Ash; Mr. “X”; etc.

ROME – A very large underground facility located at the Rome National Air Base
where is located a “Montauk Chair” similar to the one at the base under Montauk
Point, Long Island. An underground tunnel with electric cars reportedly connects this
facility with another smaller facility in Rochester, an entrance to this tunnel
connection allegedly being located under the Andrews Street bridge in Rochester,
source: Mr. X.

NEW YORK New York, New York Function unknown Tunnels to: Capitol Building,
D.C.

NORTH CAROLINA

The Brown Mountain Entrance

Brown Mountain is in North Carolina near Morganton. Morganton is “about 15 miles
north of an actual highway marker which has been posted by the state providing any
visitor the best view” of Brown Mountain. Brown Mountain is an area in which many
strange lights have been seen. There are entrances that lead inside the mountain to an
isolated (?) Alien base.

OHIO

WRIGHT-PATTERSON AFB – see: NEW JERSEY, NEWARK

Wright-Patterson Air Force Base – Dayton, Ohio Function: Air Force Repository.
Rumored to house stealth technology and prototype craft

OKLAHOMA

ADA – Joint alien-military underground facility, source: UFO Magazine, Vol.7, No.6,
1992

BINGER – A large mound north of Binger has traditionally been “haunted” and also
the site of a legendary entrance to a vast system of labyrinths leading to the “Land of
Kenyon” within a vast cavern illuminated by a bluish electromagnetic
aurora/phosphorescence, in which live a peaceable race. However deep below this
cavern are other darker realms where malevolent “serpent people” dwell, source:
Charles Marcoux

MCALESTER – Just before the Korean war three men explored a cavern NE of
MCalester, underneath a “haunted mound”, near which strange manifestations, animal
mutilations and missing livestock had been reported. The owner at the time had put
crosses on the knoll in order to keep “evil spirits” away. The three man, once inside,
made their way down into a large cavern and found a seemingly “bottomless shaft”
around which spiraled a stone staircase with steps large enough to accommodate a 12
foot giant. They descended for about a mile, not reaching the bottom, and decided to
go back up. After the first two had emerged they heard a scream from the third, and
some shots from his .45 revolver. They helped him out and in terror he told of hairy
animal- men who had suddenly snuck up from behind him, grabbing him and trying to
pounce him down to the ground. As evidence he showed his friends the
YELLOWISH BLOOD that his gun had extracted from the creatures, source: Charles
Marcoux; Victor John C. Johnson

Also in a similar fashion LOCAL reporters in the early hours of the Oklahoma City
bombing reported that underground tunnels containing all kinds of military hardware

had been blasted open, and also rumors of an 18-leveled underground facility below
the Murah Federal Building, with the 5 upper levels being used for parking.

OKLAHOMA CITY – Reports which surfaced in the first hours after the Oklahoma
City Federal building bombing but were suppressed by the national media, of
Firefighters who told of huge tunnels that had been blasted open where they were
shocked to see huge underground rooms filled with military arsenals, including
missiles and missile launchers, tanks, etc. Also reports of an 18-level base beneath
this Federal Building [and others?], with the top 5 levels being used for underground
parking, source: THE PHOENIX LIBERATOR

Tulsa Oklahoma has one and just NE of there we appear to have one with a saucer
coming out of it.

OREGON

1. Cave Junction, Oregon

Function: Suspected Underground UFO Base
Levels: At least one

Notes: Suspected location is in or near Hope Mountain. Near Applegate Lake, Oregon,
just over into California. Multiple shafts, access areas to over 1500 feet depth. Built
using abandoned mine with over 36 known miles of tunnels, shafts.

2. Crater Lake, Oregon

Tunnels: possible to Cave Junction

FORT ROCK BASIN – Water wells north of Fort Rock Basin have been known to
blow air for days during periods of high barometric pressure – times when they should
rather be taking in air. source: “Central Oregon’s Underground World Filled With
Wind That Roars, Whistles…”, Article by Larry Chitwood in THE OREGONIAN, Oct.
31, 1985

3. Klamath Falls, Oregon

PORTLAND – “The Astounding Woodstock Mystery Hole just 2 miles west of 1-205
located in Portland Oregon. Inside the Mystery Hole you’ll find a Giant Double Arch,
Geometric “codes” inscribed on walls, and other oddities. A Black Obsidian Mirror,
and a Florite Crystal Tower, re-constructed based on information gleaned from the
curious glyphs insculptured on the Giant Double Arch found deep inside The Mystery
Hole.” source: INSIDE THE MYSTERY HOLE website.

4. Wimer, Oregon (Ashland Mt. area)

Function: Underground Chemical Storage
Levels: At least one

PENNSYLVANIA

Raven Rock, Pa (near Ligonier)

Function: working back up underground Pentagon – sister site of Mt. Weather
Notes: 650′ below summit, 4 entrances.

ALLEGHENY MOUNTAINS – About 50 miles south of Pittsburgh in the first range
of the Allegheny mountains, George A. Lehew reportedly found a cavern which he
penetrated for over a mile, the passages becoming increasingly wider. He descended
at about a 45 degree angle until reaching a room in which he found a 6-ft.-wide
thermol bore, a perfectly circular shaft with smooth glazed walls that had apparently
been melted through the rock/earth in some ancient time. Old timers in the area
alleged that six “survivors” in 1915 took gear and equipment and spent a month
exploring the cave, going 18 miles from the entrance and down almost 5 miles below
sea level, where they distinctly heard the “rumble of machinery” off in the distance,
source: Letter from George A. Lehew in AMAZING STORIES Magazine, Dec. 1946.

BLUE RIDGE SUMMIT – The location of the so-called “underground Pentagon”
maintained by nearby Ft. Ritchie, and used as a major electronic nerve center for the
U.S. military. A massive installation that is also known as “Raven Rock” or “Site R”
that was blasted out of greenstone granite 650 feet below. A 260,000 sq. ft. facility
sprawling beneath 716 acres composed of five different “buildings” in specially
excavated separate caverns, literally forming an underground “pentagon”. Also
contains fluorescent lights, convenience store, barbershop, medical and dining
facilities, an underground reservoir containing millions of gallons of water, a chapel,
35 miles of telephone lines, and six 1,000- watt generators. It is a supercomputing and
electronic command post linked with several military communications networks
around the globe, and is reportedly connected via tunnel to Camp David several miles
to the north near the town of Thurmont. source: UFO Magazine, Vol.7, No. 6; Richard
Sauder.

DIXONVILLE – Mine inspector Glenn E. Berger reported in 1944 to his superiors
that the Dixonville mine disaster which “killed” 15 men was not the result of a cave-in,
but rather an attack by underground creatures capable of manipulating the earth
[partial cave-ins], whose domain the miners had apparently penetrated. Most of the
dead miners were not injured by falling rocks but showed signs of large claw marks,
others were missing, and one survivor spoke of seeing a vicious humanoid creature
that was ‘not of this world’ within an ancient passage that the miners had broke into.
The creature somehow created a “cave-in”, blocking himself and another inspector
[who closed his eyes when he felt the creatures ‘hot breath’ on his neck] from the main
passage until another rescue party began to dig through the collapse, scaring the
“creature” away, source: Article by Stoney Brakefield in NEWS EXTRA, July 14,

1974.

NEW KENSINGTON – A creature, about 4 ft. tall, walking on two feet and “half
humanoid – half dinosaur” was seen by grownups and children. One boy attempted to
grab the creature from behind, which let out a squealing or screeching sound and
escaped. Also, children attempted to pour gasoline on the creature and light it,
unsuccessfully, before it escaped into a “sewer tunnel” nearby, source: “Green Thing
Sparks Rumors”, article by Michael Burke, in THE VALLEY NEWS DISPATCH,
New Kensington-Terentum & Vandergraft, PA., March 5, 1981 issue.

PITTSBURGH – Two boys enter a cave in a Pittsburgh suburb that was uncovered by
road excavation work, only to find a partially buried thermol-bore [a perfectly round
fused polished shaft apparently melted through the rock], partially concealed by dirt,
and which they uncover and explore. Their dog runs down the sloping shaft, which is
about 4 ft. in diameter, ahead of them until a deep, vibrating sound is heard, following
which the dog came running back out of the shaft, clawing its way over them and in
total terror, running back home. The cave was then subsequently covered by further
road excavation. Also rumors of old robber gangs in frontier times who would rob
banks and escape to hide away in ancient caverns underground, via an “automatic
door” they had discovered in the cliffs, source: THE SHAVER MYSTERY Magazine

SOUTH CAROLINA

COLUMBIA – The alleged discovery of an underground tunnel by a family
picknicking in the suburban town of Irmo, 4 miles NW of Columbia, Irmo having
been suspected in the past of harboring U.N. fugitives. John Don Cooper and his son
Wayne Dwayne discovered the opening while out foraging for branches for their
makeshift lean-to. The passage led to a man-made cave. According to police
spokesman Ralph Hightower the tunnel was located in a wooded area next to the
parking lot of the Irmo K-Mart, which was not heavily visited due to competition
from a nearby Wal-Mart and Sams Club. Cooper immediately called (-1-1 and the
Irmo SWAT Team responded by storming K-Mart and the tunnel. Caught by surprise,
the U.N. infiltrators lost the battle, which lasted about 4 hours, however it was found
that the tunnel branched out to many different and still unknown locations. The tunnel
at the town limits of Irmo was sealed by the SWAT Team. Hightower said: “…I don’t
think they’ll be back ’cause we kicked their butts real good.” source: local newspaper
article from Columbia, S.C., Nov. 23, 1997

GAFFNEY – In the mid-1960’s, a woman in Gaffney complained to the local police
that someone was digging tunnels under her house, as she was plagued by eerie hums
and strange mechanical sounds emanating from under her house, source: THE 8TH
TOWER, by John A. Keel

TENNESSEE

GALLATIN – On Sept. 23, 1880 at about 3:30 in the afternoon former David Land
dematerialized in front of 5 witnesses while walking across a field. Mrs. Lang ran and
pounded the ground where he had vanished. Seven months later Lang’s children
insisted that they had heard their father crying distantly from UNDERNEATH the
field. He seemed desperate and tortured, and was begging for help, until his voice
faded away and was not heard again. Where he was last seen there was a circle of
WITHERED yellow grass 20 feet in diameter, source: MAJESTIC, by Whitley
Streiber

TEXAS

ALPINE – The ‘haunted’ Refugio mine in the Chispa Mts. 60 miles SW of Alpine,
which had been abandoned in spite of a large amount of silver ore still remaining
within. As one investigator attempted to enter a ‘drift’, a thunderous noise and a rush
of air came from the tunnel, throwing him against the opposite wall, bruised and
dazed, as the air subsided “one of the post piercing and plaintive cries I ever heard”
emerged, the terrorized Henry Boyd said. The phenomena was repeated as he left the
mine, and later attempts to work the mine ended in injury and terror, some of the men
who later attempted to enter the enigmatic tunnel were thrown repeatedly broken and
bruised against the tunnel walls as if by an invisible force, source: NEW YORK
HERALD, Jan. 4, 1903

ATHENS – Joint alien-military underground facility, source: UFO Magazine, Vol.7,
No.6, 1992

BETWEEN FREDRICKSBURG & MASON – Kiser cave, reportedly pours out a
steady stream of carbon dioxide from its mouth, a phenomena which has not yet been
explained, source: EXPLORING AMERICAN CAVES, by Franklin Folsom

Camp Bullis, in northwest San Antonio, Texas, not too far from Interstate Highway 10.
This is an Army training base, immediately adjacent to neighboring Camp Stewart,
another Army base that keeps a much lower profile. I have been told that the Camp
Bullis/Camp Stewart reservation is the site of an underground base.

1. Calvert, Texas
Function unknown

DALLAS – The Texas Instruments plant, near the main gate of the Dallas facility,
allegedly conceals an underground entrance leading to large caverns below.
Allegations that certain “Shaver Mystery” experts were asked to enter the caverns
where small green- skinned humanoids were being contained in cages, in order to offer

their opinions as to who or what the beings were, source: Henry M. Steele

DENTON – Underground FEMA facility, source: Richard Sauder

Denton “908” (C.O.G) seems to have an isolated one

EL PASO – Tunnel in the Franklin Mts. No further details, source: THE HIDDEN
CITY OF CHIHUATLAN, by Charles A. Marcoux

2. Fort Hood, Texas (also reported detainment camp)
Levels: Multiple

3. Fort Stockton, Texas
Function: Unknown

Tunnels to: Carlsbad, New Mexico

Fort Hood, near Killeen, Texas, 70 miles north of Austin. This was also the site of
one of the original Q Areas. I have been told that the area of Fort Hood, and the
former Killeen and Gray Air Force Bases, are the site of a secret underground
complex. I communicated with one ex-Fort Hood soldier whose duty area was at a
checkpoint two miles inside a tunnel leading to an underground area, near the former
Gray Air Force Base.

Ft. Stockton and in Old Mexico there is one at Chihuahua.

FORT WORTH – On the afternoon of Friday, July 13th, 1984, a 20 foot long,
2-foot-high bulge stretched the surface of a street in Fort Worth, as if a giant
earthworm was trying to come up from under the road. It seemed alive, swaying back
and forth, said Charlie McCafferty of the fire dept. “What spooked me was there
wasn’t even a crack in the road.” Jackhammers were used to break through the asphalt
& concrete, where they found silt layers intact and no evidence of gas buildup.
Shortly after the above event a similar mound was seen on Calvin Lang’s homestead
at the outskirts of Ft. Worth, and after prodding it with a rake it disappeared yet it had
left some buildings torn apart, fences torn down, and shrubs and trees uprooted. Later
Jeremy Boiter spotted what appeared to be a giant tentacle erupting from the ground
in a shower of gravel and dirt about 2 miles away. It seized a can and her kittens,
devouring them in seconds as well as two growling dog which it swallowed in its
“slick dripping mouth”. His friend Phil Dewar also found scraps of birds, rabbits and

other while animals among the rubble of a destroyed hut. source: THE WORLD’S
MOST INCREDIBLE STORIES, by Adam Sisman; THE GAZETTE, Schenectady,
N.Y., 16 July 1984; NATIONAL EXAMINER, 12 Feb. 1985

In Texas there is one at Lubbock.

■ Medina Annex, at Lackland Air Force Base, in San Antonio. This facility lies in
southwest San Antonio, on the south side of Rte. 90, immediately west of the junction
of Interstate 410 and Rte. 90. This is one of the original Q Areas built by the Pentagon
back in the late 1940s and 1950s for the storage and assembly of nuclear weapons.
Local lore has it that the underground portion is very large. I have been told that the
underground base is very deep and cold, for whatever reason. The National Security
Agency (NS A) also has a major presence at the Medina Annex with thousands of
personnel. I have on occasion driven by the Medina Annex on Rte. 90 and the base
has a very dark, ominous presence.

UTAH

UTAH- ARIZONA –

” A-K warriors watching undercover and very secretive government movements going
on in southern Utah and northern Arizona by the government and archaeology dept. of
Utah. They are mapping the Anasazi underground caverns and tunnel systems in
Arizona, Utah, Nevada, and New Mexico. This action has been going on for about 2
years. They are using a new development of radar coupled with siesmo graphic signals.
One of ours spies in the government said recently that they have made some rather
astounding discoveries. Navaho and Kaweah warriors are watching this gab gang of
white men. Kawewah warriors in Arizona are looking for two gold hunters in south
Arizona area.” source: “Anasazi Underground”, report from AMERICAN INDIAN
DEFENSE, Hutchinson, Kansas.

UTAH

ALPINE – This “suburban legend” involves a farmer near Alpine who solicited the
help of some other men to move a large boulder in his field. The boulder was moved,
only to reveal a tunnel leading downward. They descended the sloping tunnel but
came to a place where their progress was prevented by a “giant serpent”. In fear, they
went back to the surface and re-sealed the shaft with the boulder, source: K. Studstrup.

CANYON-LANDS NATIONAL PARK – The Druid Arch area is reportedly the site
of a joint alien-military base. Many unusual phenomena have been described,
including strange men “posing” as park rangers discouraging people from going into
certain “public” areas, invisible military personnel who could only been seen as
reflections in mirrors, UFO sightings and manifestations, and also a high level of

electromagnetic energy which adversely affects electronic equipment, source: “Lands
of Ancient Star People”, article by Robert Morning Sky in UFO UNIVERSE, Spring,
1996.

1. Dugway, Utah

Function: Chemical Storage, Radiation storage.

DUGWAY – Reported underground connection to the Sub-Global network, and also
reports of automatons and reptilian humanoids operating under holographic human
disguises, who have been seen to transform temporarily to their alien state, according
to a hair stylist and a worker at an auto shop in the town of Dugway who both
witnesses such temporary transformations, source: confidential

LITTLE COTTONWOOD CANYON – A few miles up the canyon there are 3 switch
backs on the north side of the road, with security signs posted, leading up to the
“granite” cliffs. The first switch back leads to the underground records vault
maintained by the Mormon church, which has an underground but “off limits”
connecting passage which leads deeper into the mountain, to a massive cavern where
military and alien personnel collaborate, and in which witnesses have observed
massive construction projects, and large underground buildings in which humans and
greys have been seen working at benches on electronic [mind control, etc.] equipment.
Also, reports of a “Melchizedek” lodge penetrating the Mormon/LDS and Masonic
lodges, the Mt. Shasta Mayan colony, and other lodges’ in Sirius and Arcturus, which
have formerly maintained treaties with the grey aliens although many of them have
turned against the greys as a result of their betrayals of interactive treaties. The 2nd
and 3rd switch backs going up the canyon both intersect at the same point, which is
apparently the main surface entrance to the underground “military” facility, source:
several confidential sources

SALEM-THISTLE – Under the mountains between Salem and Thistle [ghost town]
Utah, there are, according to reports, caverns in which a joint Nazi – Masonic –
Reptilian underground facility is maintained. Also reports of massive alien/reptilian
“infiltration” activity in the area and especially along the “Wasatch Front” of the
Western Rockies, source: confidential sources

2. Salt Lake City Mormon Caverns

Function: Religions archives storage.
Levels: Multiple

Tunnels to: Delta, Colorado & Riverton, Wyoming

SALT LAKE CITY AIRPORT – Underground FEMA facility, source: Alan
DeWalton

Utah there is one at Salt Lake City (R&D AFB).

SALT LAKE CITY – Massive underground facility for human cloning, beneath the
University of Utah, where human cloning has been carried out at least since 1977.
source: ORION TECHNOLOGY, MIND CONTROL, AND OTHER SECRET
PROJECTS, by Val Valerian

SALT LAKE CITY – Below Crossroads Plaza [via the EXITS behind the “Crossroads
Cinemas” theater on the “right” {?} and also under “manhole” covers within and
outside of the mall] are reportedly ancient tunnels that were discovered by early
construction workers and excavators, some of which have been refurbished. Also
hints of a human/alien collaboration in the area. The tunnels, catacombs and cavern
systems below reportedly involve the following: Dangerous encounters with reptilian
humanoids, federal agency involvement, men seen in a 300 ft. long chamber wearing
suits and carrying Uzi machine guns, holographically concealed side passages, a
greenish glow seen emanating from behind a locked[?] door in the 3rd sub-level
below Crossroads, ancient wooden doors blocking passages that lead north – also on
the 3rd sub-level, tunnels under the NE corner of the Crossroads plaza leading south
and east that are blocked by metal gates, a huge passage “large enough to drive a semi
through” leading south and strung with lights at the bottom of a multi-leveled concrete
shaft with descending trap doors, three-toed footprints and a seemingly bottomless pit
seen in the cavern from which the “semi” tunnel extends southward, rumors of over
100 miles of passages some ancient and some modern, several accounts of people
who have disappeared in the underground labyrinth, paranormal manifestations, and
whispered rumors of connections to a vast system of cavern-networks covering an
area of about 1000 miles diameter and part of an uncollapsed segment of an ancient
global aquifer which collapsed forming the ocean beds – a vast system of caverns with
penetrates Utah and extends into parts of Idaho, Nevada, Arizona and Colorado,
source: several confidential sources

ZION CANYON – Reports of a vast underground drainage system which receives the
waters of the Great American desert of Utah, Nevada, Arizona and California,
stretching from Zion Canyon, to the Grand Canyon of Arizona, to the Carson Sink of
Nevada, and to the Mojave desert of California, through which large subterranean
rivers flow, source: Letter from Chuck Edwards in THE HIDDEN WORLD, issue
A-8 [1962]

VIRGINIA

BELLS COVE – Near the small village [ghost town?] of Bell’s Cove is Buck Hill
Caverns, deep within which explorers reportedly discovered a seemingly bottomless
shaft, from which emerged the distinct sound of sobbing, or crying and wiling as of a
woman in pain, source: “The Phantom of Buck Hill Caves”, from CORNET magazine,

Oct. 1961

■ Mount Weather, near Bluemont, Virginia on Rte. 601, is the major underground
command center for the Federal Emergency Management Agency. FEMA has a 400
acre complex on the surface of the mountain. The underground base is very large, and
actually qualifies as a high-tech, subterranean town. This base dates to the 1950s.

BLUEMONT/BLUE RIDGE MOUNTAINS/BLUE RIDGE MOUNTAIN
RD/VIRGINIA STATE ROUTE 601 – Mt. Weather, in northern Virginia, is a virtual
underground city 46 nukes from Washington D.C., a C.O.G. [Continuity Of
Government] facility, and the hub of the FEMA subterranean network [and its
underground facilities which exist beneath several major airport terminals] . The
infrastructure of Mt. Weather includes microwave communications systems, a small
spring-fed lake, a pair of 250,000 gallon water tanks and several ponds, a sewage
treatment plant capable of processing 40,000 gallons per day, a hospital, cafeterias, a
diesel powered electrical generating plant, private living quarters and dormitories,
closed circuit TV, radio and TV studio, massive super-computing facilities which
store personal information on millions of Americans, war game simulators, electric
cars, etc. Insiders admit that an entire non-representive appointed “back up
government” lives in residence within Mt. Weather, being entirely unaccountable to
the citizens of the U.S.A. There are several C.O.G. facilities within a 300 mile radius
of Washington D.C., with Mt. Weather being the central coordinator of this “Federal
Arc”. At least 96 underground C.O.G. facilities exist in Pennsylvania, Maryland, West
Virginia, Virginia, and North Carolina, source: UFO Magazine, Vol.7, No. 6; Richard
Sauder; see also MOUNT WEATHER.

Located in the Blue Ridge Mountains access to the operations center is available
via Virginia State Route 601 (also called Blueridge Mountain Road) in Bluemont,
Virginia .^- The facility is located near Berryville , 48 miles (77 km) from Washington,
D.C m

The site was originally opened as a weather station in the late 1800s. It was used as
a Civilian Public Service facility (Camp #1 14) during World War U_ ~~^- At that time
there were just two permanent buildings on the site: the administration/dormitory
building, and the laboratory. Those buildings still stand, supplemented by many more
modern buildings.

The underground facility within Mount Weather, designated “Area B”, was completed
in 1959. FEMA established training facilities on the mountain’s surface (“Area A”) in

1979/m

The above-ground portion of the FEMA complex (Area A) is at least 434 acres
(176 ha). This measurement includes a training area of unspecified size.^ Area B,
the underground component, contains 600,000 square feet (56,000 m 2 ). s

CULPEPER – A couple miles east of Culpeper, just off Rt.3 in northern Virginia, is
Mt. Pony, beneath which lies a large underground government facility maintained by
the Federal Reserve and Treasury Dept. The 140,000 sq. ft. facility is said to be
supplied with water, food, a generator, communications equipment, etc. At least 5
billion dollars worth of Federal Reserve notes has been stored under Mt. Pony. The
facility also monitors major global and banking activity via a “Fed Wire”, source:
UFO Magazine, Vol.7, No. 6; Richard Sauder

LANGLEY – At least 7 levels of underground facilities beneath the CIA headquarters,
some of which contain recovered alien hardware, source: confidential

■ The Pentagon, in northern Virginia, the national military command center, across
the Potomac River from Washington, D.C.. The Pentagon was built directly on the
site of Robert E. Lee’s former plantation. I have been told that there are multiple
underground levels beneath the Pentagon. I don’t know how deep the complex goes,
but elsewhere in this book I discuss plans dating to the 1960s to build a very deep
base at the 3,500 foot level. I consider it likely that something like this has been done.

TAZEWELL – 6 miles SW of Tazewell is “Devils Slide Cave”, from which\h unusual
sounds have been heard to emanate, source: TECH TROGLODYTE [NSS affiliate
newsletter], Vol.12, No.2

Mount Poney – Near Culpepper, Virginia

Function unknown

WARRENTON – The Warrenton Training Center, and underground relocation center
for an unspecified Federal Agency. The U.S. Army maintains two underground
facilities near Warrenton, “Station A” on Rt.802 and “Station B” on Bear Wallow
Road, on Viewtree mountain. Some suggest that both stations, only a couple miles
apart, may be connected underneath. Large antennae towers and AT&T microwave
facilities suggest an electronics communications and computing facility. Security at
Station A is reportedly more extreme than at Station B. source: UFO Magazine, Vol.7,
No. 6; Richard Sauder

U.S. Army Warrenton Training Stations A and B, in the near vicinity of Warrenton,
Virginia are ostensibly U.S. Army facilities. But in reality, my research showed that
there is a CIA presence there. As for what sorts of operations take place there – who
knows? I visited these places in June of 1992 and found Station A on Rte. 802;

Station B is on Bear Wallow Road.

There are also Stations C and D elsewhere in the region, which I did not visit. In the
course of my research, I called up Col. Fletcher Prouty, the well-known author of the
book, The Secret Team.

For many years, at the height of the Cold War, Prouty was a liaison officer for the Air
Force, helping the CIA with its clandestine activities worldwide. I surmised that if
anyone ought to know something about what was going on at Warrenton it should be
Fletcher Prouty.

So I put the question to him point blank, and asked him what the CIA was doing
underground at a U.S. Army training installation in Warrenton, Virginia. To begin
with, he confirmed that the CIA was indeed present in Warrenton, and was using the
U.S. Army as a cover.

I asked him what was going on underground. He responded, “Well, you have to
understand that that gets into the realm of Special Operations and that’s classified”.
And that was all that I could pry out of him. I suspect the entire locale is tunneled out
underground.

The palpable Alice in Wonderland aura exuded by the Warrenton U.S. “Army”
Training Stations continues to linger in my memory, even with the passage of 17
years.

Before leaving Virginia, I also want to say something about another low profile CIA
facility. Camp Peary is located just a few miles from Colonial Williamsburg. It is
sometimes referred to as “The Farm” in popular parlance.
Though it is hard to find out much about the base, enough is known to say with
confidence that Camp Peary is the CIA’s main training and operations base in the
USA. As with the Warrenton Training Stations, the CIA uses a thin U.S. military
cover at Camp Peary; in this case, maps indicate that Camp Peary is a U.S. Navy
Reservation.

I am a native Virginian, from the Tidewater region, and spent my early childhood in a
community just 20 miles away from Camp Peary. In the 1970s I attended the College
Of William & Mary, in Colonial Williamsburg. Camp Peary lies just to the east of the
town of Williamsburg, on the northern side of Interstate Highway 64. 1 have driven
past the place numerous times over the years and it has always seemed darkly
brooding to me.

Camp Peary lies on the York River; immediately to the southeast lies the U.S. Navy’s
Cheatham Annex, a major weapons supply depot for the U.S. Navy’s Atlantic Fleet,
part of the Yorktown Naval Weapons Station. This interests me, because many years
ago I spoke with a woman whose father worked at the Cheatham Annex/ Yorktown
Naval Weapons Station complex in the years after World War II.
He was a construction worker, and at that time, about 60 years ago, the U.S. Navy
was building a facility deep below the water line. The whole site lies only a few feet
above sea level, so the water table is very close to the surface. The Navy used high
powered water pumps to instantly pump out the brackish ground water that was

rushing in, to keep the excavation from filling with water.

My acquaintance told me that her father said they used a fast setting concrete. She did
not know the purpose of the facility. The instructive part of the story is that even then,
60 years ago, military engineers had the capability to construct facilities below the
water line, using high powered pumps and quick setting concrete.
Moreover, the Navy’s Cheatham Annex lies immediately adjacent to the CIA’s
secretive Camp Peary base, nominally administered by the U.S. Navy. Considering
the Navy’s construction activities 60 years ago, and recalling that the Camp David
Presidential retreat in Maryland is also administered by the U.S. Navy and lies above
a major underground base hidden beneath it, I conclude that there is a high probability
that the Camp Peary/Cheatham Annex area along the York River is underlain by an
underground complex, too.

WASHINGTON

ELLENSBERG – Mel Waters tells of a “bottomless shaft” in the Madistash Ridge
near Ellensberg, about 10 feet wide. Also nicknamed Hell’s Hole. One man claims to
have dropped an old refrigerator down the shaft but did not hear it hit. Also reports of
military men in the area, and residents who were told not to talk about the subject,
also rumors that the U.S. military paid the discoverer a “fortune” to shut up about
shaft and “disappear”, source: STRANGE UNIVERSE, April 22, 1997; Art Bell’s
DREAMLAND radio program

FORT LEWIS – Many reports state that the Madigan military hospital 50 miles south
of Seattle is being used by aliens [reptilian] to process military personnel into an alien
agenda. The hospital is very high-tech with at least 3 underground levels that are off
limits to both civilian and military personnel. Many claim that most of the workers at
this Army hospital are “not human”, and a powerful electromagnetic field has been
reported within and surrounding the hospital area. The nearby Ft. Lewis has been
implicated in certain New World Order predatory activities, source: Article by Val
Valerian in THE LEADING EDGE magazine

1. Mt. Rainier, Washington

Function unknown.
Levels: Multiple
Tunnels to: Unknown

Notes: A very active UFO base exists beneath Mt. Rainier. There are also said to be
underground “vaults” containing
records of the ancient Lemurians.

Mt. Rainier, Washington Function unknown. Levels: Multiple Tunnels to: Unknown
Yakima Indian Reservation Function unknown Notes: Southeast of Tacoma
Washington, on the Reservation, in an area 40 by 70 miles. Unusual sounds from

underground (Toppenish Ridge). Low flying Silver Cigar shaped craft seen to
disappear into the Middle fork area of Toppenish creek.

2. Mt. St. Helens, Washington

Function: thought to be electromagnetic/ultra- and sub- sound research

TACOMA – A strange hole in the back yard of Jim and Harriet Johnson’s home,
which “devours” everything thrown into it. Cavers explored the hole and saw 3
cone-shaped stones that they could not explain. The Johnson’s built a deck over the
hole and planned to sell the house, after former owners related their own experiences.
The original owner told of being lowered down the hole only to have his oil lamp
sucked out of his hands, while another told of filling the hole with marble and ‘all
kinds of stuff, but the hole ‘erupted’ spewing stuff all over. Another filled the hole
with old tires, but the hole seemed to consume the tires, which began sinking out of
site, source: EVERETT HERALD [Everett Washington], March 17, 1980

3. Yakima Indian Reservation

Function unknown

Notes: Southeast of Tacoma Washington, on the Reservation, in an area 40 by 70
miles. Unusual sounds from underground (Toppenish Ridge). Low flying Silver Cigar
shaped craft seen to disappear into the Middle fork area of Toppenish creek

YAKIMA – An alien base reportedly lies below the Yakima Indian Reservation SE of
Tacoma, Washington, source: THE HOLLOW HASSLE
Newsletter, Vol.2, No.2

Washington DC

Function: Part of massive underground relocation system to house
select government and military personnel in event of cataclysmic event
Tunnels to: New York City; Mt. Weather

WASHINGTON D.C. –

The House of the Temple, the Scottish Rite Masonic headquarters, sits atop the
pentagram- like street layout of Washington D.C. and reportedly connects to ancient
glazed tunnels built by “Atlanteans” in antediluvian times, and also connections to a
massive cavern called “NOD” where the NSA, Sirians, and other alien species
collaborate in an agenda of global domination. Several D.C. buildings are reportedly
connected by underground tunnels, both ancient and modern, source: Jon Singer;
Richard Toronto; WEIRD AMERICA, by Jim Brandon

■ The White House has a very large, deeply buried facility underneath it. One of my
close friends was taken down into this facility during the Lyndon B. Johnson
administration in the 1960s. She entered an elevator in the White House and was
escorted straight down.

She believes that the elevator went down 17 levels. When the door opened
underground she was escorted down a corridor that appeared to disappear to the
vanishing point in the distance. Other doors and corridors opened off of that corridor.
That was what Washington, D.C. was really like underground almost half a century
ago.

■ My research indicates that Washington, D.C. has a veritable labyrinth of tunnels
beneath it. Some of the tunnels are publicly known, such as the Metro tunnels and the
underground train tunnels that members of Congress use to travel from their office
buildings to the Capitol building.

As I discuss elsewhere in this book, I have been told and read stories of other tunnels
that are more secret. In light of the available evidence, I incline to the view that these
stories contain an appreciable degree of truth.

WEST VIRGINIA

BRAXTON/WEBSTER COUNTIES – The area bordered by Newville on the west,
Helvetia on the east, Cleveland on the north and Hacker Valley on the south [Braxton
& Webster counties] contain many subsurface anomalies according to the late
husband of British Canadian Joan Howard, an abductee whose husband did survey
work in the area. He told of strange caverns in the area with strange sounds of voices
and machinery emerging from within as if beyond the walls, caves containing strange
hieroglyphic writings, a pipe that stands out of the ground FAR from any industrial
area which ejects a gas flame upwards, a cavern with a deep chasm near which at least
one man vanished [from his sleeping bag at night outside the entrance], and one
cavernous labyrinth deep within which one man encountered a woman with no hair
who spoke to him in an unknown language, yet being unable to understand him she
gave up and disappeared into the depths of the labyrinth, source: THE SPACE – OR
SOMETHING – CONNECTION, by Joan Howard

Greenbrier Facility, West Virginia – White Sulfer Springs, W. Va
under the Greenbriar Resort,

They don’t even hide this one, and it’s even a daily tourist “fun joke”. The
Underground vault was built to meet the needs of a Congress-in-hiding – in fact the
hotel is a replica of the White House. The underground area has a chamber for the
Senate, a chamber for the House and a massive hall for joint sessions. Although the
hotel says it gives tours of the 1 12,000 square area daily, the installation still stands at
the ready, its operators still working undercover at the hotel. The secrecy that has
surrounded the site has shielded it both from public scrutiny and official reassessment.
From an article by Ted Gup: “House Speaker Thomas Foley, one of the very few in

Congress who has been briefed on the Greenbrier facility, declined to comment for
this article. But former speaker Thomas P. “Tip” O’Neill says the evacuation plan
always seemed “far-fetched” to him. “I never mentioned it to anybody,” O’Neill
recalls. “But every time I went down to the Greenbrier — and I went there half a dozen
times — I always used to look at the hill and say, ‘Well, that’s where we’re supposed to
live in the event something happens, and that’s where we’re going to do business,
maybe under the tennis courts.”
WEST VIRGINIA: Greenbrier Facility, White Sulfer Springs, West Virginia under
the Greenbriar Resort.

POINT PLEASANT – 7 ft. tall reptilian humanoids with 10 ft.-span wings and
glowing red hypnotic eyes were observed by several dozen witnesses near Point Pleasant and surrounding communities in the mid 1960’s. One of the most concentrated encounter areas was the so-called TNT area where concrete domes led to several miles of underground tunnels where explosives were stored during WWII.

Some young people observed one of the creatures which they chased into one of the
“domes” which covered the now “capped” tunnel entrances, however when they
entered the dome the creature had vanished. These creatures were described as being
something similar to a cross between a humanoid and a pterodactyl, and have been
referred to as the Mothmen, Winged Dracos, Winged Serpents, Gargoyles, or Ciakars.
John Keel visited the TNT area personally and discovered one large circular area
where an almost PHYSICAL atmosphere of terror gripped him and did not leave until
he left the “circle”, source: THE MOTHMAN PROPHECIES, by John A. Keel.

WEST VIRGINIA, WHITE SULPHUR SPRINGS – A large C.O.G. [Continuity Of
Government] facility exists beneath the Greenbrier Hotel, containing living quarters
to house 800 people, meeting rooms and banks of computers and communications
equipment, 250 miles SW of Washington D.C. in the Allegheny mountains. Also a
large dormitory, infirmary, shower facilities, television studio, phone booths, dining
areas, power plant, etc. source: UFO Magazine, Vol.7, No. 6; Richard Sauder.

WYOMING
Riverton, Wyoming

Function unknown

Tunnels to: Salt Lake, Utah Denver, Colorado
An interesting story:
Sudden Valley, WA – from Sid

“Sudden Valley is a private community with its own security, golf course, spa, rec.
facilities, etc. We moved there in 1992. <Wife> got a job as office manager at the
resort headquarters. I got close to all the security force personnel… just cause that’s
what I do 😉 I had noticed that an airport was shown on the resort map right next to
the road leading to Bellingham. I went past this area almost daily. All I saw was a dirt
strip that looked like it had never been used. I was curious!”

“A fellow employee and woman who became a good friend of my wife told us that
the CIA had come to her when she was employed at the phone company and
requested all the phone records of: Santo Trafficante, Jr, who was an infamous Mafia
boss. WHAT? says I. Seems he was living openly in Sudden Valley under his own
name and his children going to school in Bellingham. This was at the time the CIA
and FBI were seeking him desperately for questioning concerning JFKs murder. No
surprise that those diligent agencies were unable to locate the fugitive. I later found
out from a friend who moved to Sudden Valley at its inception that there were high
ranking military folks, including a 4-star Ret. General and ‘many Mafia types living
there incognito.

“I never could get any answers out of the old timers about this airport. Most told me
they were unaware of its existence. Well, what finally happened is that we decided to
move in 1996 and we wanted to sell our classic Mercedes-Benz 280 SL before we left.
Our neighbor across the street handled the sale of our home and told me that the
owner of this airport that no one heard of collected classic Mercedes. He suggested
that I go see him. How?, says I. Oh, there’s a dirt road off the main highway that takes
you to it. It’s not marked.”

“Well, off I went. Sure enough, I found it and followed it about 1/2 mile into the
forest. There before me was a fully equipped land and sea plane facility. There were
approx. 20 aircraft parked there. I proceeded to the private home that was at the end of
the road. Went up to the door and rang… then knocked… then tooted my horn. NAD A!
Someone was in one of the hangers pounding on a plane. I went there and shouted. No
response, but the pounding stopped. I waited for maybe 10 minutes, then left. Next
time I went by the dirt road, it was chained off with a big sign saying NO Trespassing.
I was told that shortly after we moved, this whole airport and dock port was sold to a
private citizen. Keep in mind the caliber of *some of the folks* that reside in SV and
its proximity to Canada. Perhaps 20 mins away by air.”
WORLD UNDERGROUND BASES
The Nahanni Valley (Canada) Entrance

This covers 250 square miles in the southern end of the Mackenzie Mountains of
Canada. It lies almost 550 miles due west of Fort Simpson on the Mackenzie River of
northwest Canada. Hot springs and sulfur geysers keep the valley warmer than the
surrounding areas by about 30 degrees year -round (the valley is above 60 degrees
latitude), making it perpetually mist-covered. This valley is inhabited only by animals
as people entering the valley are usually found headless and quite dead. The Indian
tribes of the area avoid this valley. (These tribes include the Ojibways, the Slave, the
Dogribs, the Stoney, the Beavers and the Chipweyans.) This valley is often referred to
as “the Valley of the Headless Men.
The Liyobaa Cave Entrance

This was sealed off by Catholic Priests who believed it to be an entrance to “Hell.”
“The village of ‘Liyobaa’ or to translate, ‘The Cavern of Death,’ was located in the
province of Zapoteca, somewhere near the ancient village of ‘Mictlan’ or the village of
the ‘Underworld.

“The Cavern of Death was actually located in the last chamber of an eight chamber
building or temple. This temple had four rooms above the ground and four more
important chambers built below the surface of the Earth. This building was located in
“Theozapotlan,” and the tunnel entrance led one beneath a mountain.

The Maltese Cave Entrance

This entrance is located on the island of Malta, near the small village of “Casal
Paula.” (This village is built on the “Corradino” plateau, and overlooks the capitol town of Malta, “Valletta,” as well as Grand Harbour.) In 1902, workmen digging a
well in Casal Paula fell into a subterranean cavern. The well was being dug for a
house on “Hal Saflienti,” the main street in Casal Paula. The cavern the workers had
fallen into connected with an entire complex of caves and tunnels. This entrance is
known as the “Hypogeum of Hal Saflienti.” (In Latin, “Hypogeum” is the name for an
underground structure.) “The tunnels under the Hypogeum have been sealed off even
since a school took 30 students into the caves and disappeared, guide and all. Search
parties were never able to locate any trace of the people and children.
The Staffordshire, England Entrance

Somewhere in Staffordshire, England, a lonely field exists in which a laborer
discovered a large iron plate beneath the dirt. The “hatch” was large and oval, with an
iron ring mounted on it. This entrance led into the tunnels. The field is in a valley
surrounded on almost all sides by woods. The laborer was digging a trench for some
purpose. The incident was reported in “A History of Staffordshire” by Dr. Plot, who
wrote the book in the late 1700s. It may be possible to find the entrance if it can be
ascertained exactly which valley the laborer was digging in.
Canadian UFO Bases

Entrances at Lake Ontario possible underwater UFO bases/cities. Toronto Tunnels
leading to subterranean city. Newfoundland Condemned Iron Mine connects with
tunnels. Lake Ontario “Lights” Orange-colored spheres have been seen coming out
of/diving into Lake Ontario. The area of highest activity is between Oakville and
Toronto. There may be a connection to the Lake view Hydro-electric plant, as many of
these UFOs have been seen heading in that direction. (Note: “The Great Lakes
Triangle” by Jay Gourley would be interesting reading for more information about
UFOs, etc. in the Great Lakes area.)
Toronto Entrance

There is a small opening to the underground tunnels off Parliament Street in
downtown Toronto. (The entrance is between two apartment buildings, and leads to the tunnels via the sewers.) The underground city (abandoned?) beneath Toronto has
its center beneath Gerrard Street and Church Street. Above this area, strange magnetic
effects have been observed. (Note: This corner of Gerrard & Church streets has a
higher accident rate than anywhere else in Toronto. It is believed that underground
equipment utilizing powerful magnetic fields (which have caused many strange
magnetic effects in houses near this intersection) are responsible for the bizarre
equipment failures that often are the cause of these accidents.) The Indians near
Toronto have legends of these tunnels.
Newfoundland Iron Mine Entrance

After one of the Iron Mines in Newfoundland Province had been dug deeper than any
other, strange happenings caused the mine to be shut down. The mining town in
which this mine is located is near the Newfoundland-Quebec Border. This mine,
having been condemned, is off-limits, and the police DO enforce this. Sneaking in late
at night seems to be the only way to gain entrance.
BRAZIL

One tunnel in Brazil is near Ponte Grosse in the state of Parana. (Fruit orchards were
seen here.) Another entrance in Brazil is near Rincon, state of Parana. Also, in the
state of Santa Catarina, Brazil, near the city of Joinville there is a mountain containing
an entrance to the tunnels. (Santa Catarina is an area alive with subterranean activity,
including strange ‘singing’ from underground.) Another entrance in Brazil is in the state of Sao Paulo near Concepiao. Still another entrance in Santa Catarina near
Gaspar has subterranean fruit orchards. “The states of Santa Catarina and Parana,
Brazil are honeycombed by a network of Atlantean tunnels that lead to subterranean
cities.”

___________________________

LINK TO ORIGINAL SOURCE:

https://archive.org/stream/UndergroundCitiesAndBases/Combined%20Info%20on%20Underground%20facilities_djvu.txt
___________________________

BUSINESS & CORPORATIONS TO RESEARCH THAT ARE RELATED TO CHINA LAKE:

China Lake Naval Weapons Center, The Presidio, Ft. Dietrick, Ft. Campbell, Ft. Lewis, Ft. Hood, Redstone Arsenal, Offutt AFB, Patrick AFB, McClellan AFB, MacGill AFB, Kirkland AFB, Nellis AFB, Homestead AFB, Grissom AFB, Maxwell AFB and Tinker AFB
___________________________

Weather Mod & China Lake Connection: Part 1 – The Secret City

Weather Modification & The China Lake Connection

by THE TRUTH DENIED
Korea proposes “Artificial Rain Project” with China to clean Air Pollution
Korea proposes “Artificial Rain Project” with China to clean Air Pollution

Search for:

The Truth Denied on FacebookThe Truth Denied on TwitterThe Truth Denied on Google+The Truth Denied on YouTubeThe Truth Denied on LinkedInRSS Feed
July 24, 2019

Weather Mod & China Lake Connection: Part 1 – The Secret City
Weather Modification & The China Lake Connection

Part 1 – The Secret City by Anthony Etienne Jaime

“Neither the Bible nor the prophets; neither Freud nor research; neither the revelations of God nor man can take precedence over my own direct experience” Carl Rogers

An Introduction

For those who are aware of the Chemtrail phenomenon and are actively involved in researching the aerosol spraying programs in an effort to ascertain their purpose and determine the agencies involved, there are two main schools of thought that have come into existence. Just as America has been divided into Red states and Blue states, the Chemtrail movement has become just as divided. On one hand, there are those who ardently wave the geo-engineering banner declaring that the aerosol spraying programs fall under the guise of solar radiation mediation. And on the other hand, there are those who just as firmly believe that the purpose of the chemtrails are more sinister in nature and are the result of exotic space based weaponry developed under the far reaching umbrella of the military industrial complex. And to a lesser extent, there are some who believe in an alien and UFO connection to the Chemtrail phenomenon and some who believe that the Chemtrails are a part of Project Bluebeam, that fabled conspiracy theory that says the world governments will fake an alien invasion with holograms as a pretext to imposing martial law and a one world order. Some believe that the Chemtrails are preventing us from seeing the approach of Niburu or a second dwarf star. The possible explanations are wide-ranging and often speculative but there is no doubt in my mind that the aerosol spraying programs and chemtrails are real for I see them everyday. Like the X-Files, the truth is out there somewhere. The cold hard reality is that we need to assemble enough clues and evidence to piece together that puzzle that is the truth into the bigger picture that may just include many of the aforementioned puzzle pieces.

My particular puzzle pieces are the result of experience, much research and amassing a fairly large body of photographic evidence in addition to having undergone what I can only say were extremely profound experiences that shook me to my very core and forever altered my perceptions of the world. It is often said that “the truth is stranger than fiction” and since I began my journey down this particular rabbit hole, the lines between empirical truth and science fiction have become extremely blurred at times. As you journey with me through this strange and complex narrative, it is my sincere hope that that the factual details I provide will connect and support the anecdotal portions of my narrative and that this article will help encourage others to speak up and provide whatever information or knowledge they may have.

As with any narrative, there needs to be an introduction, the narrative itself, and an end or conclusion. As many of my college professors were fond of informing me, essays, articles, and speeches should be all be assembled on Lincoln’s three part model for a speech: First, tell them what you’re going to tell them; Second, tell them; Third, tell them what you told them. With that thought in mind, let me introduce myself and “tell you what I’m going to tell you” and then lay out the factual and historical background because much of what I am about to relate to you borders upon the surreal.

Since this article is primarily about China Lake, I will start by informing you that I am a former employee of the China Lake Naval Weapons Center (NWC) as it was known when I worked there. During my time there, which spanned nearly 9 years beginning in 1973 and ending in 1982, I was employed in several different capacities. I started off as an apprentice electrician in the Public Works Department in 1973 and after completing the program and making journeyman, I wound up transferring to the Range Department and the Supersonic Naval Ordinance Research Track or SNORT, as it is commonly known.

Copy 05-29-2007 11_29_44AM
Fig. 1 – The Track Crew (1978) at SNORT w the Sierras in the background – L to R: Anthony Etienne Jaime , Dan Krausman, Cleve Warren, Eddie Mierta, Raphael Alvarado, Billy Brown. ~The Truth Denied

After leaving the base for a brief time in 1979, I returned to the Public Works Department as a power lineman in the high-voltage shop before leaving civil service again for good in 1982. All of these jobs afforded me plenty of opportunities to travel all over the base in the performance of my duties. In addition, I spent nearly 30 years working out of I.B.E.W. Local 428 in Bakersfield, Ca., including many DoD projects at China Lake, Edwards AFBFTC, Vandenberg, and spent several months working in the extremely secret and much speculated upon Northrup Tejon Ranch RCS facility located in the Tehachapi Mountains west of Rosamond, Ca.

For those interested, the following video provides an interesting look at the Tejon facility.

In addition to my civil service and construction time at China Lake, many of the construction projects I have worked on at Edwards include the B-1/B-2 hanger complex, the SR-71 hanger re-model at the NASA Dryden facility, the large Anechoic Chamber, the rocket stands and the Ridge Project at Boron (rumored to be the facility that produces fuel for the Aurora), the Airborne Laser Project, the bombing ranges, and the F-35 Joint Strike Fighter hanger. The last projects I worked on in my career were at China Lake, refurbishing the HVAC controls in several facilities and on the construction of lab facilities at Hanger 5. While by no means do I consider myself to be a scientist or engineer, my background is such that I have fairly good grasp of what facilities are designed and used for. Moreover, as a long time resident of the China Lake area and employee at the China Lake/Edwards base complexes, I am very familiar with military aircraft and weaponry and have watched them fly through the skies here since my childhood. It is therefore an understatement when I say that the sights I have been seeing for nearly the last two and a half years were and continue to be incredibly disturbing to say the least.

My journey began in the early morning hours of July 30th, 2012 with a UFO sighting that took place over the China Lake Naval Air Weapons Station in California that lasted for several hours and led to continued UFO sightings and other strange sights in the sky for the next three days, including witnessing what I now believe to have been a full on holographic demonstration of Project Bluebeam. After overcoming my initial sense of shock and disbelief, I became completely engrossed in a search to find rational explanations for the strange sights I was seeing in the sky. At that particular point in time I had never heard of a chemtrail or many of the other terms I was to become so familiar with but that was rapidly to change. For the next couple of months, I was much like the Richard Dreyfuss character in Close Encounters and chased strange lights in the sky around the countryside at night and observed strange and unnatural cloud formations during the day as well as pursuing research on the Internet.

As I struggled to wrap my mind around the incredible sights I was seeing in the skies, I compiled a short list of possible causes but I kept coming back to the Navy and the China Lake base as the most likely explanation.
The top three possibilities of that list were: 1) government research with military applications; 2) ET really is here; 3) a combination of 1 & 2, which is still my favorite theory. Over time, my personal observations and experiences have allowed me, along with a great many other people who were accompanying me, to witness an incredible assortment of extraordinary sights in many different locations. The one constant throughout my journey to date has been my proximity to the Naval Air Weapons Station at China Lake, California, which in turn is in close proximity to a large number of other related military facilities that I believe also play a role in what we are witnessing in our skies.

While many of us may hear some the names of some bases mentioned frequently, far too few really know or understand what goes on behind those closed gates. I believe that it is through understanding what role these bases play that we will come to a much fuller understanding of the nature of the Chemtrail phenomenon and what is occurring in the skies. The majority of activists documenting Chemtrails are looking up in an effort to understand what we are seeing, but let me assure you that there is most definitely a terrestrial connection to ground based facilities.

And it was at this early point in time during my journey and search for answers that a very fortuitous chance event occurred. While surfing the net, looking for answers to my questions, through sheer luck I tuned into the Roxy Lopez Show while she was interviewing Sean Gautreaux regarding his research into the cloaked craft that are now being detected and seen by so many researchers world-wide. As I listened in stunned amazement, it quickly struck me that someone else was seeing many of the same things as myself and the realization that I was not alone was an immense relief. I immediately located Roxy on Facebook and asked her to put me in touch with Sean which she graciously did, and over the course of the next two years have become well acquainted with Roxy, Sean, Jim Kerr, plus a few other of her on air guests and a great many other people worldwide who are active in the movement to rid our once beautiful blue skies from the toxic heavy metal aerosol cocktails being sprayed into our atmosphere as Chemtrails.

Copy 62100_192527390910047_1985888487_n
Fig. 2 – Large facial chemtrail apparition that appeared over my home 7/31/2012
A History & Overview of China Lake

China Lake, the very name sounds like a placid tranquil vacation spot for tourists to visit but nothing could be further from the truth. When it comes to uncovering the truth surrounding the incredibly compartmentalized secret government programs that are being conducted by the military-industrial complex, much can be learned by examining the bases and facilities where such work is carried out. Understanding the nature of these facilities can provide many clues, especially for those who are seeking to get at the truth surrounding the aerosol spraying and weather modification programs. The China Lake Naval Air Weapons Station is the Navy’s premier RDAT&E laboratory (Research, Development, Acquisition, Test & Evaluation) and a facility whose role in weather modification has been largely overlooked.
The term “Secret City” comes from a 1993 2-hour video of the same name made by the China Lake Museum Foundation that is a history of the Navy at China Lake that was made in commemoration of the 50th anniversary of the base and the unique community that sprang up in the middle of nowhere. Unlike AREA 51, which in spite of its extremely secret nature is a well-known installation frequently featured on television programs and in UFO circles, those in the know rarely mention China Lake outside of official circles and it receives very little undue publicity on a national level.

Copy of socal_recreation_cl
Fig 3 – Location Map

Comprising approximately 1.1 million acres or 1,735 square miles, the China Lake Naval Air Weapons Station is an immense installation. This sprawling complex is spread out across Kern, Inyo, and San Bernardino counties. The installation is located in the upper reaches of California’s Mojave Desert, approximately two and half hours north east of Los Angeles near the intersections of State Highways 395 and 14 on the way to the eastern Sierra ski resorts at Mammoth Mt. State Highway 178, which connects Bakersfield to Death Valley, runs through Ridgecrest, the small community outside the gates where the majority of the bases employees reside, including the transient contract work force that keeps the local motels continually filled during the week and emptied out on the week-ends. With the growth of the Ridgecrest community, it has been easier to attract qualified employees to the base but in the early days, the remoteness of the area and the often-harsh weather conditions, especially the frequent high winds, made keeping employees extremely hard at times.

Constructed during the early 1940’s, the base originally began at the airfield located outside the small town of Inyokern, so named because of its proximity to the boundaries of Kern and Inyo counties, at the foot of the Sierra Nevada range. After relocating ten miles east, the base was originally known as the Naval Ordinance Test Station or N.O.T.S. It was during the early days of N.O.T.S. existence that it gained it’s pre-eminent fame in the military-industrial complex environment for the development in 1950 of the AIM 9 Sidewinder heat seeking air-to-air missile, named after the unique Mojave Desert rattlesnake that also targets its prey with heat seeking abilities.

China Lake~ The- Truth- Denied-
Fig. 4 – China Lake Main Gate in the early days. ~ The Truth Denied

Fig. 4 – China Lake Main Gate in the early days.

During the its existence, the China Lake base has been known by several different names including the Naval Ordinance Test Station (N.O.T.S.), the Naval Weapons Center (NWC), and today the main base located adjacent to the city of Ridgecrest is known as the Naval Air Warfare Center Weapons Division, Naval Air Weapons Station (NAWS), China Lake, California.

China Lake is actually a dry lake located on the north range area, named for early Chinese immigrant workers who mined borax from the dry lakebed. The entire region is dotted with dry lakebeds, including the large underground Searles Lake mining operation in Trona, Ca. located 25 miles to the east. It is an arid desert region of little rainfall and a very harsh climate located about 100 miles west of Death Valley. Winters can be bitter cold and summers frequently hit triple digits. The main base facilities are located in the Indian Wells Valley, surrounded by the Sierra Nevada mountain range to the west, the Coso range to the north, the Argus range to the east, and the El Paso mountain range to the south. The terrain of the base is diverse and ranges from flat desert land to volcanic lava flows and rugged mountain ranges.

DSCF6842 – Copy
Fig. 5 – The recently renovated main gate today. The original gate guard shack is visible on the left hand side of the newly constructed canopy.

Like AREA 51, China Lake was chosen for its remote location far from large population centers in order to safely conduct testing in relative secrecy. In addition, the clear skies over China Lake affords an extremely good environment for unimpeded flying and to collect the necessary photographic, video, and telemetry data required in order to support the China Lake mission of weapons testing and development for the Navy.
As previously mentioned, China Lake is an enormous facility, most of which is comprised of sparse unpopulated tracts of desolate desert, and in the eyes of the visionaries who chose this location, perfectly suited for testing a wide variety of naval ordinance and weapons, including missiles, propellants, and bombs, with the list growing to include radar cross section testing, electronic counter-measures, laser/optics research and testing, aircraft survivability, ejection seats testing, and also weather modification.

For a good look at the capabilities of China Lake, this video provides a concise overall summary of the base mission and facilities available.

Heavily modernized after over 73 years of existence, the China Lake installation today is far removed from its austere beginnings when the fledgling rocketry program at Cal Tech was looking for a more suitable location in which to carry out the testing necessary for the development of the its rocketry program.

According to the official NAWS site, “In the midst of World War II, adequate facilities were needed by the California Institute of Technology for test and evaluation of rockets. At the same time, the Navy needed a new proving ground for aviation ordinance. Cal Tech’s Dr. Charles C. Lauritsen and then Cmdr. Sherman E. Burroughs met and formed a pact to find a site that would meet both their needs.”1

Thus began a long collaboration and partnership between the civilian sector, comprised of research scientists, engineers, technicians, and many skilled craftsmen and military personnel and defense contractors that led to a unique culture of civilians and military personnel working side by side.
It also led to the formulation of a policy known as the China Lake Way that established that the civilian scientists were working as equal partners and not subordinates to the military.2

Copy5663049639_6d1a94fe54_o
Fig. 6 – The sign at the visitor center at the main gate.

“China Lake is the United States Navy largest single landholding, representing 85 percent of the Navy’s land for weapons and armaments research, development, acquisition, testing and evaluation (RDAT&E) use and 38 percent of the Navy’s land holding’s worldwide. In total, its two ranges and main site cover more than 1.1 million acres, an area larger than the state of Rhode Island. As of 2010, at least 95 percent of that land has been left undeveloped. The roughly $3 billion infrastructure of the installation is comprised of 2,132 buildings and facilities, 329 miles of paved roads and 1,801 miles of unpaved roads. The 19,600 square miles of restricted and controlled airspace at China Lake makes up 12 percent of California’s total airspace and provides an unprecedented venue for integrated testing and training of today’s warfighter. The workforce at China Lake is a mixture of military, civilians and contractors that are employed across multiple tenant commands. There are currently 620 active duty military, 4,166 civilian employees and 1,734 contractors employees that work onboard the installation.”3

Copy1 of Let It Stay Here
Fig. 7 – Security admonition entering China Lake

As one might expect from a unique laboratory installation like China Lake, the ratio of civilian employees to military personnel is structured far more in favor of a civilian work force that handles the bulk of the research and development workload while the military personnel are primarily assigned as aviation and ordinance support personnel. Despite the majority of personnel being civilians, security is a high priority at China Lake and rigidly enforced by N.C.I.S. and other agencies. That fact I can attest to personally since I once had occasion to intervene in altercation in a local establishment located just across the street from the main gate. As an employee of the base at that time, I quickly ascertained that a breach of security had occurred between a contract employee of Hughes Aircraft and some local patrons with an exchange of money and a hand drawn schematic involved. After securing the drawing and the combatants, I phoned base security and within two minutes the establishment was completely surrounded by local and base law enforcement vehicles. Within a couple more minutes, two N.I.S. agents (pre-Gibbs it was the Naval Investigative Service) in suits entered and I explained the situation, handed over the drawing and the Hughes employee who was immediately taken into custody and ushered out the door. I was later called into the N.I.S. office for further de-briefing and was informed that while no criminal charges had been pursued, the Hughes employee had been discharged and his security clearance revoked. It bears noting that while foreign espionage is always a concern at military installations, at an installation like China Lake industrial espionage between competing defense contractors is also a concern.

Divided into two major sections, there is the main base, which contains the North Range area and the South Range area formerly known as the Randsburg Wash Test Range and currently known as the Electronic Combat Range or ECR. The ECR also is home to the Navy’s Foreign Technology Branch that reverse engineers acquired foreign technology, which are primarily radars.

Copy of 130806_Navy-China-Lake-R2508-HRAIZ
Fig. 8. – This is a file photo of China Lake’s North & South Ranges plus R-2508 Complex & Nellis* AFB – All are in close proximity. (Nellis* AFB is otherwise known as Area-51)

Edwards AFBFTC is only an hour away; the Ft. Irwin National Training Center and NASA Goldstone adjoin the NAWS ECR on the south range, Nellis AFB, AREA 51, the Nevada Test Site, Tonopah Test Range, Pacific Missile Test Range, NAS Lemoore, and Top Gun at Fallon, Nv. are also located fairly close to China Lake in a large, intricately linked zone of military influence, research, and testing. One of the many advances made at China Lake since my days there is the Integrated Battlespace Arena simulation facility through which “Facilities are linked worldwide with multiple fiber optic networks including SIPRNET, DREN, and range microwave telecommunication capabilities.”4

Located on the main site adjacent to Ridgecrest are an incredible assortment of laboratories and Armitage Field N.A.F. which is home to two different squadron commands, the VX-9 Vampires located in Hanger 1 and the VX-31 Dust Devils Test and Evaluation Squadron located in Hanger 3. Hanger 2 over the years has housed visiting transient foreign commands from the R.A.F. and also the remotely piloted QF-86 and QF-4 drone program, which were re-built Korean War F-86 and Vietnam era F-4 Phantom aircraft designed as targets for missile testing. Hanger 5 or the Advanced Warfare Lab whose construction was finished in 2007, houses China Lake’s F-18 program and the nearby Hanger 4, “the so-called “Black Hangar” that may or may not host the developmental (later cancelled) A-12 WSSA, was completed during 1990; the building is officially nonexistent for many years, prompting the long-standing canard, “What hangar?”5 This is where the Navy houses it’s version of the stealth aircraft that can occasionally be seen flying in the skies here. I have performed work at both facilities but can tell you very little about Hanger 4 since the level of security was extremely high and escorts were with us at all times and the Hanger 5 AWL project that I worked on was primarily lab space and fenced off from the rest of complex. That is quite different from the original three hangers at the airfield where access to the hanger decks was virtually unfettered and it was possible to walk right up to jet aircraft and helicopters. As a member of the China Lake high voltage shop, I spent a lot of time at the airfield since it was also our responsibility to maintain the runway lighting.

Copy of x-47pegasus_3
Fig. 9. – This is a file photo of the Northrup Grumman X-47A at N.A.F., China Lake. Note the purple & pink chemtrail haze in background.

The laboratories at China Lake present some of the finest facilities of their type in the world from the huge Michelson Lab, with its over 9 ½ square acres of floor space which “is equipped for basic and applied research in physics, chemistry, aerophysics, metallurgy and ballistics, and for development work in propulsion, fire-control, and guidance systems for rockets and other missiles”6 to nearby Lauritsen Lab which “features a 56,000 square-foot structure that incorporates special features in three well-equipped wings with a focus on laser and optical work. Specialized facilities include an 8-by 100-foot room designed for optical experiments; a rooftop facility provided for outdoor tests to the horizon; and provisions for lasing from inside the building to a 500 – meter eye-safe outdoor laser test range.”7 These two facilities are only the tip of the iceberg when it comes to cutting edge state-of-the-art research labs at China Lake but suffice it to say that the technological abilities present on the base are nothing short of phenomenal.

As I conclude the first part in this series, there are a few additional, relevant facts about China Lake that are important to note. The first concerns the electrical power grid that supplies the base. Since it’s inception, there have been three separate transmission lines from Southern California Edison that feed the base any two of which can go down and the installation still can function.
In addition, there are four separate geo-thermal power plants located on the north ranges, two that fall under the management of the Navy, (known as Navy 1 & Navy 2) and two that are under the management of the Bureau of Land Management (known as BLM 1 & BLM 2). I also worked on the construction of Navy 1. Between the four plants, there is approximately 260 megawatts of power produced aboard the China Lake Naval Air Weapons Station8. The reason I point out these facts about the electrical grid system is that very few military installations are this energy independent. Since China Lake is not a deployment or otherwise strategic base but rather a research and development installation, this fact alone gives some emphasis to the importance of the Naval Air Weapons Station.

Coso_geothermal_plant
Fig. 10. – This is a file photo of Navy 1 Coso Geothermal Plant.

One other aspect of the China Lake Naval Air Weapons Station that I would like to call attention to is the cultural and historical background associated with the lands comprising the installation. Also located in the Coso region of the base is one of the largest known locations of petroglyphs left by indigenous Native American people in North America. While the Coso rock art may seem to be a superfluous issue to what occurs at the China Lake base, it is my personal belief that there could possibly be a connection to some of the many anomalies I have discovered during my research. As I said from the outset, this is to be a strange and complex journey down the rabbit hole in search of answers so it is first necessary to lay the groundwork of facts before continuing further down the road. It is also necessary to be able to switch perspectives from the general to the specific and vice versa. As can be seen in the following photograph (Fig. 10), there are at least a couple of figures that have heads that resemble other ancient rock art depictions worldwide of what are thought by many to be alien life forms. Given that there is ‘some’ UFO lore surrounding areas of China Lake, notwithstanding my own personal experiences, it is a coincidence worthy of consideration and further exploration.

Petroglyph0001
Fig. 11 – This is a file photo of the petroglyphs at China Lake (scanned from my personal album that was presented when I left NWC).

For those interested in further exploration of the Coso Petroglyphs rock art:

Before you say to yourself, “wait a minute, this guy is all over the place”, talking about weather modification and chemtrails, UFOs, airfields, laboratories, electrical power, and petroglyphs, recall my comment about being able to shift from the general to the specific and then back from the specific to the general. This article is about the China Lake Naval Weapons Station in general but along the way, I have ventured into specific areas of interest that will be further explored and I will develop and document the many connections and anomalies I have discovered through my research and observation.
Summary & Conclusion

Thus far, it has been my purpose to provide you with a partial background that demonstrates my work history and background at China Lake. In addition, a factual history and overview of the China Lake Naval Air Weapons Station has also been provided, complete with photos and links to sources and videos. From all of the foregoing information, what should become clear is that China Lake is a top secret base where not only weapons testing takes place but also much technological innovation, research, and development. Given the size and location of the installation, it should be readily apparent that many secretive programs can and are taking place behind the security of the base perimeter. Although what is presented here barely scratches the surface of the activities going on at N.A.W.S., my next installment on China Lake will begin the process of connecting the dots and start to fill in some of the blanks regarding “what is in our skies” as well as explore the ties to other installations and there are many.

Another facet to consider is that while many people have their attention focused on bases like AREA 51, there are activities occurring at China Lake, hidden in plain sight, which go unnoticed because of that fact. Additionally, there is the BLM, which has closed off large tracts of public lands from vehicle traffic ostensibly to preserve wilderness areas from encroachment by the public. However, from my experience, it is my opinion that the BLM serves as a plausibly benign first line of security by keeping prying public eyes to a minimum since foot traffic only is allowed in some of the rugged areas of public land adjacent to the base where I believe testing or other activities are occurring. It is important to know and understand that the government and its many agencies are very good at sleight-of-hand, just like any good magician, and the object in many instances is to make us focus on one object being displayed to divert our attention while the object being concealed is often in plain sight while we are being tricked. The tactic is known as spreading disinformation or dissimilar information.

These are all activities that I will delve into in the next installment, but as I bring this one to conclusion I would like to bring the focus back to chemtrails and weather modification programs. It is hard to believe now that I failed to make the connections but so many things that seemed to just be loose threads with no connectivity were right there in front of me for a long time. The first big indicator for me was the regular increase in lightning storms during the summer months of July and August beginning around 1998. And they always occurred over the base in the northeastern mountain ranges surrounding the valley here and much of it was point to point lighting and not ground strikes.
In addition, while there was a lot of lightning, there was very little thunder or rainfall. During the early years of my life, earthquakes were far more common here than lighting storms and these lightning storms were something new. The odd storm or two might have gone unnoticed but when they began to occur with such frequency over a long period of time I began to notice the change.
The weather seemed to be just a little out of the ordinary but nothing I could really put my finger on and the words “climate change” had not yet gained much traction in the public’s or my own perception.

Also, during my early years I can remember the Navy’s Hurricane Hunter Squadron flying in and out of China Lake on a fairly frequent basis which would seem to be a little out of their normal area of operation. And from my years of employment aboard China Lake, I can remember the Earth and Planetary Sciences Department, which was headed up by Dr. Pierre St. Amand, an individual whose name is frequently mentioned in regard to the development of military weather modification efforts, most notably Project Popeye and Operation Stormfury which explains the Hurricane Hunters coming to China Lake since that project involved attempting to lessen the strength of hurricanes. Project Popeye, the first wartime military weather modification operation took place during the Vietnam War and was Dr. St. Amand’s brainchild and really began the pursuit of weather modification as a weapon by the military. And ironically enough, in both 1982 and 1984, there was some extremely bad flooding that occurred at China Lake that did some major damage to the facilities there. Since I was working there in 1982, and was the temporary foreman of the high voltage shop, my hands were full directing crews that were restoring power to facilities all over the base that had been damaged by the flooding. In the years since then, I have been informed by more than a few friends is that the Earth and Planetary Sciences Department was experimenting with cloud seeding and it got away from them causing those floods.

Another individual that played an integral role in China Lake’s development of Project Popeye was Ben Livingston, whose interview with Alex Jones regarding weather modification can be viewed in this video, The Father of Weaponized Weather.

As with many government military programs, compartmentalization and secrecy rule the day, and weather modification is no different. In fact, it may be more compartmentalized and secret than others for several reason. First and foremost, would be the environmental modification treaties making weather modification illegal but when have treaties ever stopped the US government from doing what it wants to do. The government’s history of breaking its treaties is well known and a quick look at the track record of broken treaties with the Native Americans illustrates that. Second, if knowledge of weather modification programs ever became accepted widespread information, the financial repercussions and impact would be catastrophic for the disaster capitalists on Wall St., especially the insurance companies and the commodities traders who trade in weather-based derivatives. Third, there are indications that not only are chemicals being dispersed through the aerosol spraying programs but that biological pathogens are also being sprayed upon an unsuspecting populace as well. And the United States government’s track record of experimenting upon it’s own citizens is as deplorable as the manner in which it has treated Native Americans.

In conclusion, let me say that the unchecked proliferation of weather modification efforts by the military-industrial complex in all of it’s many forms and different programs in an effort to achieve “full spectrum dominance” may be the single greatest threat to the planet since the development of the atomic bomb. China Lake also played a minor role in that world-changing event as it has in many other significant military operations carried out during the course of its history. As the movement to end the ongoing spraying programs in our skies and atmosphere grows, it is vitally important that the locations of the installations involved and the people carrying out the work are identified. The China Lake Naval Air Weapons Station is one such installation with a verifiable historical connection to weather modification programs. That fact is acknowledged by the U.S. Naval Museum of Armament and Technology in their website article about The Secret City which states, “From weather modification to satellite-delivery systems, the contributions of NAWS have not stopped with armament.”9 Knowledge is power and only by becoming knowledgeable about the issues will people be able to decisively have an impact in ending the ongoing aerial assault occurring in our skies.

Next: Weather Modification & The China Lake Connection: Pt.2 Connecting the Dots.

Copy of DSCF6932
Anthony Etienne Jaime

About the Author: Anthony Etienne Jaime is a long time resident of Southern California in the China Lake area. He is a graduate of Cerro Coso Community College & Cal State Bakersfield and holds a Bachelor of Arts degree.


PROOF OF THE ADVANCED TECHNOLOGY THAT IS BEING USED FOR GIANT

UNDERGROUND CONSTRUCTIONING

MEET CROSSRAIL’S GIANT TUNNELLING MACHINES

Published on 6 Dec 2012 by Crossrail Project

Crossrail will use eight tunnel boring machines (TBMs) to construct the new tunnels under London. These huge machines will work 24 hours a day beneath the streets of London, excavating large volumes of ground and erecting the concrete tunnel lining.

Each machine has a rotating cutter head at the front, and a series of trailers behind, housing all the mechanical and electrical equipment required for the excavation of material.

To construct the 42km of tunnel required for Crossrail the tunnel boring machines will undertake ten individual tunnel drives to construct the 6.2m diameter rail tunnels.

Each TBM weighs approximately 1000 tonnes and will be up to 140m in length with an external diameter of 7.1m. This allows for an inside tunnel diameter of 6.2m once the concrete tunnel segments are in place.

Each TBM will be operated by a ‘tunnel gang’ comprising of around twenty people – twelve people on the TBM itself and eight people working from the rear of the machine to above ground.

To find out more about our tunnel boring machines visit:

http://www.crossrail.co.uk/tunnelling/
http://www.crossrail.co.uk/

Category: Travel & Events

LINK TO ViDEO:

https://youtu.be/z38JIqGDZVUMEET CROSSRAIL’S GIANT TUNNELLING MACHINES

Published on 6 Dec 2012 by Crossrail Project

Crossrail will use eight tunnel boring machines (TBMs) to construct the new tunnels under London. These huge machines will work 24 hours a day beneath the streets of London, excavating large volumes of ground and erecting the concrete tunnel lining.

Each machine has a rotating cutter head at the front, and a series of trailers behind, housing all the mechanical and electrical equipment required for the excavation of material.

To construct the 42km of tunnel required for Crossrail the tunnel boring machines will undertake ten individual tunnel drives to construct the 6.2m diameter rail tunnels.

Each TBM weighs approximately 1000 tonnes and will be up to 140m in length with an external diameter of 7.1m. This allows for an inside tunnel diameter of 6.2m once the concrete tunnel segments are in place.

Each TBM will be operated by a ‘tunnel gang’ comprising of around twenty people – twelve people on the TBM itself and eight people working from the rear of the machine to above ground.

To find out more about our tunnel boring machines visit:

http://www.crossrail.co.uk/tunnelling/
http://www.crossrail.co.uk/

Category: Travel & Events

LINK TO ViDEO:

EXPOSING’ PEDOGATE’..

EXPOSING PEDOGATE – 

PEDOGATE SRA & ORGANIZED PEDOPHILIA, SATANIC RITUAL CHILD ABUSE, CHILD-SEX-TRAFFICKING IS REAL!



WHAT IS PEDOGATE? 


 

2018-08-07-07-38-362.pngritualized_child_abuse-1.jpg2018-11-14-19-18-07.png2018-11-14-19-18-22.pngimg.pngcomet ping pong logogvigecjk10307441782018-12-20-08-04-35~2sra-us-real_15783542881.jpgimg_20190218_195103_8411634189022.jpgimg_20190228_230530_214705805805.jpg27bc8c001411e7029065b857530c2986-11046510256.jpgebb7ba1844be70997552058a0673aa1a-11811718869.jpgabb1f32ff72db1ef6548c43d36672d05-1453661084.jpgafeeeb54f6852e0a93cfe988be209acf-11252291553.jpgAddText_08-10-02.53.170_FRONT_SATANIC CULT AWARENESSAddText_02-09-01.10.52SRA IS REAL_18img_20190228_230149_477530416540.jpgimg_20190301_233236_29961334033.jpgFREE MASONS.jpgBaal.jpgPizzagate.jpgPedogateBook of the dead-translated into englishBook of the Dead-1the ancient egyptians knew how to unleash the power of the pineal gland _ ancient code1034145415..jpgKundalini.jpgKundalini.jpgPizzagate.jpgPizzagate.jpgPizzagate.jpgSRA IS REAL.jpgSecret Societies.jpgPizzagate.jpgimg_20190207_071650_7941564929439.jpgpizzagate (2)pizzagate (1)AddText_12-18-04.53.02Watergate_Scandal_Card_Game_boxIMG_20180812_024113_080kris parontoPGateDdlP1zPU0AEd1BN0_front page_CULTWATCH.COM2019-03-12-03-19-05~2521774521..png


PEDOVORE, SRA & SATANIC PEDOPHILIA IS REAL! INTRODUCTION TO PEDOVORE

 


These four past years there’s been a explosion of leaked information, concerning; “organized satanic pedophilia”, in America, UK and many other countries, these exposures with extremly violent graphic content. Made it to the top of the most shocking scandals in world history. And it would later be obvious that this was only the beginning, the “entrance”, of the deep, dark (rabbit hole).. Researchers would learn how traumatic the research of all this cruelty against innocent children that is taking place all over the world would become… Draining and horrific is the hard boiled truth…
Truth so horrible.. A million times worse than any of our worse nightmares or what we even could imagine it would be.. The content evidence got the most experinced, tough FBI agents, to cry and vomit, when analyzing the video and photo evidences, and many researchers had to take some time off from their actual research because of the raw cruelty and violent content. Many researchers experienced break downs, despair and others experienced depressions and insomnia.
Despite this most of the researchers kept digging deeper and deeper in this filthy reality, which lead to the expose of a huge group of organized pedophiles rings within the toplevels in society involved with child dz-sex-trafficking, kidnapping, rape, torture, murder, cannibalism of children. The names of with connections on top level of the White House in Washington DC, former president Bill Clinton, Barack Obama, election candidate for 2017’s politicial rally Hillary Clinton and her team of campagne assistents and asscociates. While thos been explored by freelanced journalists and freethinking authors, researchers and truthseekers, it has grown and spread like a bad dark tumor and many more names have been revealed and confirmed to be connected in what in the beginning was called “Pizzagate”, but later became pedogate and now is refered to as Pedovore, with strings tangled deep, dark and filthier than any scandal known from history worldwide. And the indictments have been hailing like the worst hailstprm since Donald Trump took office and started cleaning up in the luciferian elite bloodline familes, the deepstate, CIA’s and the secret societies evil, disgusting actions and future agenda.

 


Article from: CULTWATCH.COM — FBI REPORT – SATANIC RITUAL ABUSE

From the same FBI unit depicted in the movie Silence of the Lambs this FBI Behavioral Science Unit Report into Satanic Ritual Abuse is objective and revealing. Cultwatch recommends that any law enforcement officer considering acting against someone accused of Satanic Ritual Abuse first read this report in it’s entirety.

1992 FBI Report – Satanic Ritual Abuse
by Kenneth V. Lanning, Supervisory Special Agent Behavioral Science Unit National Center for the Analysis of Violent Crime

INTRODUCTION

Since 1981 I have been assigned to the Behavioral Science Unit at the FBI Academy in Quantico, Virginia, and have specialized in studying all aspects of the sexual victimization of children. The FBI Behavioral Science Unit provides assistance to criminal justice professionals in the United States and foreign countries. It attempts to develop practical applications of the behavioral sciences to the criminal justice system. As a result of training and research conducted by the Unit and its successes in analyzing violent crime, many professionals contact the Behavioral Science Unit for assistance and guidance in dealing with violent crime, especially those cases considered different, unusual, or bizarre. This service is provided at no cost and is not limited to crimes under the investigative jurisdiction of the FBI.

In 1983 and 1984, when I first began to hear stories of what sounded like satanic or occult activity in connection with allegations of sexual victimization of children (allegations that have come to be referred to most often as “ritual” child abuse,) I tended to believe them. I had been dealing with bizarre, deviant behavior for many years and had long since realized that almost anything is possible. Just when you think that you have heard it all, along comes another strange case.

The idea that there are a few cunning, secretive individuals in positions of power somewhere in this country regularly killing a few people as part of some satanic ritual or ceremony and getting away with it is certainly within the realm of possibility. But the number of alleged cases began to grow and grow. We now have hundreds of victims alleging that thousands of offenders are abusing and even murdering tens of thousands of people as part of organized satanic cults, and there is little or no corroborative evidence. The very reason many “experts” cite for believing these allegations (i.e. many victims, who never met each other, reporting the same events,) is the primary reason I began to question at least some aspects of these allegations.

I have devoted more than seven years part-time, and eleven years full-time, of my professional life to researching, training, and consulting in the area of the sexual victimization of children. The issues of child sexual abuse and exploitation are a big part of my professional life’s work. I have no reason to deny their existence or nature. In fact I have done everything I can to make people more aware of the problem. Some have even blamed me for helping to create the hysteria that has led to these bizarre allegations. I can accept no outside income and am paid the same salary by the FBI whether or not children are abused and exploited – and whether the number is one or one million. As someone deeply concerned about and professionally committed to the issue, I did not lightly question the allegations of hundreds of victims child sexual abuse and exploitation.

In response to accusations by a few that I am a “satanist” who has infiltrated the FBI to facilitate cover-up, how does anyone (or should anyone have to) disprove such allegations? Although reluctant to dignify such absurd accusations with a reply, all I can say to those who have made such allegations that they are wrong and to those who heard such allegations is to carefully consider the source.

The reason I have taken the position I have is not because I support or believe in “satanism,” but because I sincerely believe that my approach is the proper and most effective investigative strategy. I believe that my approach is in the best interest of victims of child sexual abuse. It would have been easy to sit back, as many have, and say nothing publicly about this controversy. I have spoken out and published on this issue because I am concerned about the credibility of the child sexual abuse issue and outraged that, in some cases, individuals are getting away with molesting children because we can’t prove they are satanic devil worshippers who engage in brainwashing, human sacrifice, and cannibalism as part of a large conspiracy.

There are many valid perspectives from which to assess and evaluate victim allegations of sex abuse and exploitation. Parents may choose to believe simply because their children make the claims. The level of proof necessary may be minimal because the consequences of believing are within the family. One parent correctly told me, “I believe what my child needs me to believe”.

Therapists may choose to believe simply because their professional assessment is that their patient believes the victimization and describes it so vividly. The level of proof necessary may be no more than therapeutic evaluation because the consequences are between therapist and patient. No independent corroboration may be required.

A social worker must have more real, tangible evidence of abuse in order to take protective action and initiate legal proceedings. The level of proof necessary must be higher because the consequences (denial of visitation, foster care) are greater.

The law enforcement officer deals with the criminal justice system. The levels of proof necessary are reasonable suspicion, probable cause, and beyond a reasonable doubt because the consequences (criminal investigation, search and seizure, arrest, incarceration) are so great. This discussion will focus primarily on the criminal justice system and the law enforcement perspective. The level of proof necessary for taking action on allegations of criminal acts must be more than simply the victim alleged it and it is possible. This in no way denies the validity and importance of the parental, therapeutic, social welfare, or any other perspective of these allegations.

When, however, therapists and other professionals begin to conduct training, publish articles, and communicate through the media, the consequences become greater, and therefore the level of proof must be greater. The amount of corroboration necessary to act upon allegations of abuse is dependent upon the consequences of such action. We need to be concerned about the distribution and publication of unsubstantiated allegations of bizarre sexual abuse. Information needs to be disseminated to encourage communication and research about the phenomena. The risks, however, of intervenor and victim “contagion” and public hysteria are potential negative aspects of such dissemination. Because of the highly emotional and religious nature of this topic, there is a greater possibility that the spreading of information will result in a kind of self- fulfilling prophesy.

If such extreme allegations are going to be disseminated to the general public, they must be presented in the context of being assessed and evaluated, at least, from the professional perspective of the disseminator and, at best, also from the professional perspective of relevant others. This is what I will attempt to do in this discussion. The assessment and evaluation of such allegations are areas where law enforcement, mental health, and other professionals (anthropologists, folklorists, sociologists, historians, engineers, surgeons, etc.) may be of some assistance to each other in validating these cases individually and in general.

HISTORICAL OVERVIEW

In order to attempt to deal with extreme allegations of what constitute child sex rings, it is important to have an historical perspective of society’s attitudes about child sexual abuse. I will provide a brief synopsis of recent attitudes in the United States here, but those desiring more detailed information about such societal attitudes, particularly in other cultures and in the more distant past, should refer to Florence Rush’s book _The Best Kept Secret: Sexual Abuse of Children_ (1980) and Sander J. Breiner’s book _Slaughter of the Innocents_ (1990.)

Society’s attitude about child sexual abuse and exploitation can be summed up in one word: denial. Most people do not want to hear about it and would prefer to pretend that child sexual victimization just does not occur. Today, however, it is difficult to pretend that it does not happen. Stories and reports about child sexual victimization are daily occurrences.

It is important for professionals dealing with child sexual abuse to recognize and learn to manage this denial of a serious problem. Professionals must overcome the denial and encourage society to deal with, report, and prevent sexual victimization of children.

Some professionals, however, in their zeal to make American society more aware of this victimization, tend to exaggerate the problem. Presentations and literature with poorly documented or misleading claims about one in three children being sexually molested, the $5 billion child pornography industry, child slavery rings, and 50,000 stranger-abducted children are not uncommon. The problem is bad enough; it is not necessary to exaggerate it. Professionals should cite reputable and scientific studies and note the sources of information. If they do not, when the exaggerations and distortions are discovered, their credibility and the credibility of the issue are lost.

“STRANGER DANGER”

During the 1950s and 1960s the primary focus in the literature and discussions on sexual abuse of children was on “stranger danger” – the dirty old man in the wrinkled raincoat. If one could not deny the existence of child sexual abuse, one described victimization in simplistic terms of good and evil. The “stranger danger” approach to preventing child sexual abuse is clear-cut. We immediately know who the good guys and bad guys are and what they look like.

The FBI distributed a poster that epitomized this attitude. It showed a man, with his hat pulled down, hiding behind a tree with a bag of candy in his hands. He was waiting for a sweet little girl walking home from school alone. At the top it read: “Boys and Girls, color the page, memorize the rules.” At the bottom it read: “For your protection, remember to turn down gifts from strangers, and refuse rides offered by strangers.” The poster clearly contrasts the evil of the offender with the goodness of the child victim.

The myth of the child molester as the dirty old man in the wrinkled raincoat is now being reevaluated, based on what we now know about the kinds of people who victimize children. The fact is a child molester can look like anyone else and even be someone we know and like.

There is another myth that is still with us and is far less likely to be discussed. This is the myth of the child victim as a completely innocent little girl walking down the street minding her own business. It may be more important to dispel this myth than the myth of the evil offender, especially when talking about the sexual exploitation of children and child sex rings. Child victims can be boys as well as girls, and not all victims are little “angels”.

Society seems to have a problem dealing with any sexual abuse case in which the offender is not completely “bad” or the victim is not completely “good.” Child victims who, for example, simply behave like human beings and respond to the attention and affection of offenders by voluntarily and repeatedly returning to the offender’s home are troubling. It confuses us to see the victims in child pornography giggling or laughing. At professional conferences on child sexual abuse, child prostitution is almost never discussed. It is the form of sexual victimization of children most unlike the stereotype of the innocent girl victim. Child prostitutes, by definition, participate in and often initiate their victimization.

Furthermore child prostitutes and the participants in child sex rings are frequently boys. One therapist recently told me that a researcher’s data on child molestation were misleading because many of the child victims in question were child prostitutes. This implies that child prostitutes are not “real” child victims. In a survey by the _Los Angeles Times_, only 37 percent of those responding thought that child prostitution constituted child sexual abuse (Timnik, 1985.) Whether or not it seems fair, when adults and children have sex, the child is always the victim.

INTRAFAMILIAL CHILD SEXUAL ABUSE

During the 1970s, primarily as a result of the women’s movement, society began to learn more about the sexual victimization of children. We began to realize that most children are sexually molested by someone they know who is usually a relative – a father, step-father, uncle, grandfather, older brother, or even a female relative. Some mitigate the difficulty of accepting this by adopting the view that only members of socio-economic groups other than theirs engage in such behavior.

It quickly became apparent that warnings about not taking gifts from strangers were not good enough to prevent child sexual abuse. Consequently, we began to develop prevention programs based on more complex concepts, such as good touching and bad touching. the “yucky” feeling, and the child’s right to say no. These are not the kinds of things you can easily and effectively communicate in fifty minutes to hundreds of kids packed into a school auditorium. These are very difficult issues, and programs must he carefully developed and evaluated.

In the late 1970s child sexual abuse became almost synonymous with incest, and incest meant father-daughter sexual relations. Therefore, the focus of child sexual abuse intervention became father-daughter incest. Even today, the vast majority of training materials, articles, and books on this topic refer to child sexual abuse only in terms of intrafamilial father-daughter incest.

Incest is, in fact, sexual relations between individuals of any age too closely related to marry. It need not necessarily involve an adult and a child, and it goes beyond child sexual abuse. But more importantly child sexual abuse goes beyond father-daughter incest. Intrafamilial incest between an adult and child may be the most common form of child sexual abuse, but it is not the only form.

The progress of the 1970s in recognizing that child sexual abuse was not simply a result of “stranger danger” was an important breakthrough in dealing with society’s denial. The battle, however, is not over. The persistent voice of society luring us back to the more simple concept of “stranger danger” may never go away. It is the voice of denial.

RETURN TO “STRANGER DANGER”

In the early 1980s the issue of missing children rose to prominence and was focused primarily on the stranger abduction of little children. Runaways, throwaways, noncustodial abductions, nonfamily abductions of teenagers – all major problems within the missing children’s issue – were almost forgotten. People no longer wanted to hear about good touching and bad touching and the child’s right to say “no.” They wanted to be told, in thirty minutes or less, how they could protect their children from abduction by strangers. We were back to the horrible but simple and clear-cut concept of “stranger danger”.

In the emotional zeal over the problem of missing children, isolated horror stories and distorted numbers were sometimes used. The American public was led to believe that most of the missing children had been kidnapped by pedophiles – a new term for child molesters. The media, profiteers, and well-intentioned zealots all played big roles in this hype and hysteria over missing children.

THE ACQUAINTANCE MOLESTER

Only recently has society begun to deal openly with a critical piece in the puzzle of child sexual abuse – acquaintance molestation. This seems to be the most difficult aspect of the problem for us to face. People seem more willing to accept a father or stepfather, particularly one from another socio-economic group, as a child molester than a parish priest, a next-door neighbor, a police officer, a pediatrician, an FBI agent, or a Scout leader. The acquaintance molester, by definition, is one of us. These kinds of molesters have always existed, but our society has not been willing to accept that fact.

Sadly, one of the main reasons that the criminal justice system and the public were forced to confront the problem of acquaintance molestation was the preponderance of lawsuits arising from the negligence of many institutions.

One of the unfortunate outcomes of society’s preference for the “stranger danger” concept is what I call “say no, yell, and tell” guilt. This is the result of prevention programs that tell potential child victims to avoid sexual abuse by saying no, yelling, and telling. This might work with the stranger hiding behind a tree. Adolescent boys seduced by a Scout leader or children who actively participate in their victimization often feel guilty and blame themselves because they did not do what they were “supposed” to do. They may feel a need to describe their victimization in more socially acceptable but sometimes inaccurate ways that relieve them of this guilt.

While American society has become increasingly more aware of the problem of the acquaintance molester and related problems such as child pornography, the voice calling us back to “stranger danger” still persists.

SATANISM: A NEW FORM OF “STRANGER DANGER”

In today’s version of “stranger danger,” it is the satanic devil worshipers who are snatching and victimizing the children. Many who warned us in the early 1980s about pedophiles snatching fifty thousand kids a year now contend they were wrong only about who was doing the kidnapping, not about the number abducted. This is again the desire for the simple and clear-cut explanation for a complex problem.

For those who know anything about criminology, one of the oldest theories of crime is demonology: The devil makes you do it. This makes it even easier to deal with the child molester who is the “pillar of the community.” It is not his fault; it is not our fault. There is no way we could have known; the devil made him do it. This explanation has tremendous appeal because, like “stranger danger,” it presents the clear-cut, black-and-white struggle between good and evil as the explanation for child abduction, exploitation, and abuse.

In regard to satanic “ritual” abuse, today we may not be where we were with incest in the 1960s, but where we were with missing children in the early 1980s. The best data now available (the 1990 _National Incidence Studies on Missing, Abducted, Runaway, and Thrownaway Children in America_) estimate the number of stereotypical child abductions at between 200 and 300 a year, and the number of stranger abduction homicides of children at between 43 and 147 a year. Approximately half of the abducted children are teenagers. Today’s facts are significantly different from yesterday’s perceptions, and those who exaggerated the problem, however well-intentioned, have lost credibility and damaged the reality of the problem.

LAW ENFORCEMENT TRAINING

The belief that there is a connection between satanism and crime is certainly not new. As previously stated, one of the oldest theories concerning the causes of crime is demonology. Fear of satanic or occult activity has peaked from time to time throughout history. Concern in the late 1970s focused primarily on “unexplained” deaths and mutilations of animals, and in recent years has focused on child sexual abuse and the alleged human sacrifice of missing children. In 1999 it will probably focus on the impending “end of the world”.

Today satanism and a wide variety of other terms are used interchangeably in reference to certain crimes. This discussion will analyze the nature of “satanic, occult, ritualistic” crime primarily as it pertains to the abuse of children and focus on appropriate law enforcement responses to it. Recently a flood of law enforcement seminars and conferences have dealt with satanic and ritualistic crime. These training conferences have various titles, such as “Occult in Crime,” “Satanic Cults,” ‘Ritualistic Crime Seminar,” “Satanic Influences in Homicide,” “Occult Crimes, Satanism and Teen Suicide,” and “Ritualistic Abuse of Children”.

The typical conference runs from one to three days, and many of them include the same presenters and instructors. A wide variety of topics are usually discussed during this training either as individual presentations by different instructors or grouped together by one or more instructors.

TYPICAL TOPICS COVERED INCLUDE THE FOLLOWING:

Historical overview of satanism, witchcraft, and paganism from ancient to modern times. Nature and influence of fantasy role-playing games, such as “Dungeons and Dragons.” Lyrics, symbolism, and influence of rock and roll, Heavy Metal, and Black Metal music. Teenage “stoner” gangs, their symbols, and their vandalism. Teenage suicide by adolescents dabbling in the occult. Crimes committed by self-styled satanic practitioners, including grave and church desecrations and robberies, animal mutilations, and even murders. Ritualistic abuse of children as part of bizarre ceremonies and human sacrifices. Organized, Traditional, or Multigenerational satanic groups involved in organized conspiracies, such as taking over day care centers, infiltrating police departments, and trafficking in human sacrifice victims. The “Big Conspiracy” theory, which implies that satanists are responsible for such things as Adolph Hitler, World War II, abortion, illegal drugs, pornography, Watergate, and Irangate, and have infiltrated the Department of Justice, the Pentagon, and the White House.

During the conferences, these nine areas are linked together through the liberal use of the word “satanism” and some common symbolism (pentagrams, 666, demons, etc.) The implication often is that all are part of a continuum of behavior, a single problem or some common conspiracy. The distinctions among the different areas are blurred even if occasionally a presenter tries to make them. The information presented is a mixture of fact, theory, opinion, fantasy, and paranoia, and because some of it can be proven or corroborated (symbols on rock albums, graffiti on walls, desecration of cemeteries, vandalism, etc.,) the implication is that it is all true and documented. Material produced by religious organizations, photocopies and slides of newspaper articles, and videotapes of tabloid television programs are used to supplement the training and are presented as “evidence” of the existence and nature of the problem.

All of this is complicated by the fact that almost any discussion of satanism and the occult is interpreted in the light of the religious beliefs of those in the audience. Faith, not logic and reason, governs the religious beliefs of most people. As a result, some normally skeptical law enforcement officers accept the information disseminated at these conferences without critically evaluating it or questioning the sources.

Officers who do not normally depend on church groups for law enforcement criminal intelligence, who know that media accounts of their own cases are notoriously inaccurate, and who scoff at and joke about tabloid television accounts of bizarre behavior suddenly embrace such material when presented in the context of satanic activity. Individuals not in law enforcement seem even more likely to do so. Other disciplines, especially therapists, have also conducted training conferences on the characteristics and identification of “ritual” child abuse. Nothing said at such conferences will change the religious beliefs of those in attendance. Such conferences illustrate the highly emotional nature of and the ambiguity and wide variety of terms involved in this issue.

DEFINITIONS

The words “satanic,” “occult,” and “ritual” are often used interchangeably. It is difficult to define “satanism” precisely. No attempt will be made to do so here. However, it is important to realize that, for some people, any religious belief system other than their own is “satanic.” The Ayatollah Khomeini and Saddam Hussein referred to the United States as the “Great Satan.” In the British Parliament a Protestant leader called the Pope the Antichrist. In a book titled _Prepare For War_ (1987,) Rebecca Brown, M.D. has a chapter entitled “Is Roman Catholicism Witchcraft?” Dr. Brown also lists among the “doorways” to satanic power and/or demon infestation the following: fortune tellers, horoscopes, fraternity oaths, vegetarianism, yoga, self-hypnosis, relaxation tapes, acupuncture, biofeedback, fantasy role-playing games, adultery, homosexuality, pornography, judo, karate, and rock music. Dr. Brown states that rock music “was a carefully masterminded plan by none other than Satan himself” (p. 84.) The ideas expressed in this book may seem extreme and even humorous. This book, however, has been recommended as a serious reference in law enforcement training material on this topic. In books, lectures, handout material, and conversations, I have heard all of the following referred to as satanism:

— Church of Satan
— Ordo Templi Orientis
— Temple of Set
— Demonology
— Witchcraft
— Occult
— Paganism
— Santeria
— Voodoo
— Rosicrucians
— Freemasonry
— Knights Templar
— Stoner Gangs
— Heavy Metal Music
— Rock Music
— KKK
— Nazis
— Skinheads
— Scientology
— Unification Church
— The Way
— Hare Krishna
— Rajneesh
— Religious Cults
— New Age
— Astrology
— Channeling
— Transcendental Meditation
— Holistic Medicine
— Buddhism
— Hinduism
— Mormonism
— Islam
— Orthodox Church — Roman Catholicism

At law enforcement training conferences, it is witchcraft, santeria, paganism, and the occult that are most often referred to as forms of satanism. It may be a matter of definition, but these things are not necessarily the same as traditional satanism. The worship of lunar goddesses and nature and the practice of fertility rituals are not satanism. Santeria is a combination of 17th century Roman Catholicism and African paganism.

Occult means simply “hidden.” All unreported or unsolved crimes might be regarded as occult, but in this context the term refers to the action or influence of supernatural powers, some secret knowledge of them, or an interest in paranormal phenomena, and does not imply satanism, evil, wrongdoing, or crime. Indeed, historically, the principal crimes deserving of consideration as “occult crimes” are the frauds perpetrated by faith healers, fortune tellers and “psychics” who for a fee claim cures, arrange visitations with dead loved ones, and commit other financial crimes against the gullible.

Many individuals define satanism from a totally Christian perspective, using this word to describe the power of evil in the world. With this definition, any crimes, especially those which are particularly bizarre, repulsive, or cruel, can be viewed as satanic in nature. Yet it is just as difficult to precisely define satanism as it is to precisely define Christianity or any complex spiritual belief system.

WHAT IS RITUAL?

The biggest confusion is over the word “ritual.” During training conferences on this topic, ritual almost always comes to mean “satanic” or at least “spiritual.” “Ritual” can refer to a prescribed religious ceremony, but in its broader meaning refers to any customarily-repeated act or series of acts. The need to repeat these acts can be cultural, sexual, or psychological as well as spiritual.

Cultural rituals could include such things as what a family eats on Thanksgiving Day, or when and how presents are opened at Christmas. The initiation ceremonies of fraternities, sororities, gangs, and other social clubs are other examples of cultural rituals.

Since 1972 I have lectured about sexual ritual, which is nothing more than repeatedly engaging in an act or series of acts in a certain manner because of a sexual need. In order to become aroused and/or gratified, a person must engage in the act in a certain way. This sexual ritual can include such things as the physical characteristics, age, or gender of the victim, the particular sequence of acts, the bringing or taking of specific objects, and the use of certain words or phrases. This is more than the concept of M.O. (Method of Operation) known to most police officers. M.O. is something done by an offender because it works. Sexual ritual is something done by an offender because of a need. Deviant acts, such as urinating on, defecating on, or even eviscerating a victim, are far more likely to be the result of sexual ritual than religious or “satanic” ritual.

>From a criminal investigative perspective, two other forms of ritualism must be recognized. The _Diagnostic and Statistical Manual of Mental Disorders_ (DSM-III-R) (APA, 1987) defines “Obsessive- Compulsive Disorder” as “repetitive, purposeful, and intentional behaviors that are performed in response to an obsession, or according to certain rules or in a stereotyped fashion” (p. 247.) Such compulsive behavior frequently involves rituals. Although such behavior usually involves noncriminal activity such as excessive hand washing or checking that doors are locked, occasionally compulsive ritualism can be part of criminal activity.

Certain gamblers or firesetters, for example, are thought by some authorities to be motivated in part through such compulsions. Ritual can also stem from psychotic hallucinations and delusions. A crime can be committed in a precise manner because a voice told the offender to do it that way or because a divine mission required it.

To make this more confusing, cultural, religious, sexual, and psychological ritual can overlap. Some psychotic people are preoccupied with religious delusions and hear the voice of God or Satan telling them to do things of a religious nature. Offenders who feel little, if any, guilt over their crimes may need little justification for their antisocial behavior. As human beings, however, they may have fears, concerns, and anxiety over getting away with their criminal acts. It is difficult to pray to God for success in doing things that are against His Commandments.

A negative spiritual belief system may fulfill their human need for assistance from and belief in a greater power or to deal with their superstitions. Compulsive ritualism (e.g., excessive cleanliness or fear of disease) can be introduced into sexual behavior. Even many “normal” people have a need for order and predictability and therefore may engage in family or work rituals. Under stress or in times of change, this need for order and ritual may increase.

Ritual crime may fulfill the cultural, spiritual, sexual, and psychological needs of an offender. Crimes may be ritualistically motivated or may have ritualistic elements. The ritual behavior may also fulfill basic criminal needs to manipulate victims, get rid of rivals, send a message to enemies, and intimidate co-conspirators. The leaders of a group may want to play upon the beliefs and superstitions of those around them and try to convince accomplices and enemies that they, the leaders, have special or “supernatural” powers.

The important point for the criminal investigator is to realize that most ritualistic criminal behavior is not motivated simply by satanic or any religious ceremonies. At some conferences, presenters have attempted to make an issue of distinguishing between “ritual,” “ritualized,” and “ritualistic” abuse of children. These subtle distinctions, however, seem to be of no significant value to the criminal investigator.

WHAT IS “RITUAL” CHILD ABUSE?

I cannot define “ritual child abuse” precisely and prefer not to use the term. I am frequently forced to use it (as throughout this discussion) so that people will have some idea what I am discussing. Use of the term, however, is confusing, misleading, and counterproductive. The newer term “satanic ritual abuse” (abbreviated “SRA”) is even worse. Certain observations, however, are important for investigative understanding. Most people today use the term to refer to abuse of children that is part of some evil spiritual belief system, which almost by definition must be satanic.

Dr. Lawrence Pazder, coauthor of _Michelle Remembers_, defines “ritualized abuse of children” as “repeated physical, emotional, mental, and spiritual assaults combined with a systematic use of symbols and secret ceremonies designed to turn a child against itself, family, society, and God” (presentation, Richmond, Va., May 7,1987.) He also states that “the sexual assault has ritualistic meaning and is not for sexual gratification.”

This definition may have value for academics, sociologists, and therapists, but it creates potential problems for law enforcement. Certain acts engaged in with children (i.e. kissing, touching, appearing naked, etc.) may be criminal if performed for sexual gratification. If the ritualistic acts were in fact performed for spiritual indoctrination, potential prosecution can be jeopardized, particularly if the acts can be defended as constitutionally protected religious expression. The mutilation of a baby’s genitals for sadistic sexual pleasure is a crime. The circumcision of a baby’s genitals for religious reasons is most likely not a crime. The intent of the acts is important for criminal prosecution.

Not all spiritually motivated ritualistic activity is satanic. Santeria, witchcraft, voodoo, and most religious cults are not satanism. In fact, most spiritually- or religiously-based abuse of children has nothing to do with satanism. Most child abuse that could be termed “ritualistic” by various definitions is more likely to be physical and psychological rather than sexual in nature. If a distinction needs to be made between satanic and nonsatanic child abuse, the indicators for that distinction must be related to specific satanic symbols, artifacts, or doctrine rather than the mere presence of any ritualistic element.

Not all such ritualistic activity with a child is a crime. Almost all parents with religious beliefs indoctrinate their children into that belief system. Is male circumcision for religious reasons child abuse? Is the religious circumcision of females child abuse? Does having a child kneel on a hard floor reciting the rosary constitute child abuse? Does having a child chant a satanic prayer or attend a black mass constitute child abuse? Does a religious belief in corporal punishment constitute child abuse? Does group care of children in a commune or cult constitute child abuse? Does the fact that any acts in question were performed with parental permission affect the nature of the crime? Many ritualistic acts, whether satanic or not, are simply not crimes. To open the Pandora’s box of labeling child abuse as “ritualistic” simply because it involves a spiritual belief system means to apply the definition to all acts by all spiritual belief systems. The day may come when many in the forefront of concern about ritual abuse will regret they opened the box.

When a victim describes and investigation corroborates what sounds like ritualistic activity, several possibilities must be considered. The ritualistic activity may be part of the excessive religiosity of mentally disturbed, even psychotic offenders. It may be a misunderstood part of sexual ritual. The ritualistic activity may be incidental to any real abuse. The offender may be involved in ritualistic activity with a child and also may be abusing a child, but one may have little or nothing to do with the other.

The offender may be deliberately engaging in ritualistic activity with a child as part of child abuse and exploitation. The motivation, however, may be not to indoctrinate the child into a belief system, but to lower the inhibitions of, control, manipulate, and/or confuse the child. In all the turmoil over this issue, it would be very effective strategy for any child molester deliberately to introduce ritualistic elements into his crime in order to confuse the child and therefore the criminal justice system. This would, however, make the activity M.O. and not ritual.

The ritualistic activity and the child abuse may be integral parts of some spiritual belief system. In that case the greatest risk is to the children of the practitioners. But this is true of all cults and religions, not just satanic cults. A high potential of abuse exists for any children raised in a group isolated from the mainstream of society, especially if the group has a charismatic leader whose orders are unquestioned and blindly obeyed by the members. Sex, money, and power are often the main motivations of the leaders of such cults.

WHAT MAKES A CRIME SATANIC, OCCULT, OR RITUALISTIC?

Some would answer that it is the offender’s spiritual beliefs or membership in a cult or church. If that is the criterion, why not label the crimes committed by Protestants, Catholics, and Jews in the same way? Are the atrocities of Jim Jones in Guyana Christian crimes?

Some would answer that it is the presence of certain symbols in the possession or home of the perpetrator. What does it mean then to find a crucifix, Bible, or rosary in the possession or home of a bank robber, embezzler, child molester, or murderer? If different criminals possess the same symbols, are they necessarily part of one big conspiracy?

Others would answer that it is the presence of certain symbols such as pentagrams, inverted crosses, and 666 at the crime scene. What does it mean then to find a cross spray painted on a wall or carved into the body of a victim? What does it mean for a perpetrator, as in one recent case profiled by my Unit, to leave a Bible tied to his murder victim? What about the possibility that an offender deliberately left such symbols to make it look like a “satanic” crime?

Some would argue that it is the bizarreness or cruelness of the crime: body mutilation, amputation, drinking of blood, eating of flesh, use of urine or feces. Does this mean that all individuals involved in lust murder, sadism, vampirism, cannibalism, urophilia, and coprophilia are satanists or occult practitioners? What does this say about the bizarre crimes of psychotic killers such as Ed Gein or Richard Trenton Chase, both of whom mutilated their victims as part of their psychotic delusions? Can a crime that is not sexually deviant, bizarre, or exceptionally violent be satanic? Can white collar crime be satanic?

A few might even answer that it is the fact that the crime was committed on a date with satanic or occult significance (Halloween, May Eve, etc.) or the fact that the perpetrator claims that Satan told him to commit the crime. What does this mean for crimes committed on Thanksgiving or Christmas? What does this say about crimes committed by perpetrators who claim that God or Jesus told them to do it? One note of interest is the fact that in handout and reference material I have collected, the number of dates with satanic or occult significance ranges from 8 to 110.

This is compounded by the fact that it is sometimes stated that satanists can celebrate these holidays on several days on either side of the official date or that the birthdays of practitioners can also be holidays. The exact names and exact dates of the holidays and the meaning of symbols listed may also vary depending on who prepared the material. The handout material is often distributed without identifying the author or documenting the original source of the information. It is then frequently photocopied by attendees and passed on to other police officers with no one really knowing its validity or origin.

Most, however, would probably answer that what makes a crime satanic, occult, or ritualistic is the motivation for the crime. It is a crime that is spiritually motivated by a religious belief system. How then do we label the following true crimes?

Parents defy a court order and send their children to an unlicensed Christian school. Parents refuse to send their children to any school because they are waiting for the second coming of Christ. Parents beat their child to death because he or she will not follow their Christian belief. Parents violate child labor laws because they believe the Bible requires such work. Individuals bomb an abortion clinic or kidnap the doctor because their religious belief system says abortion is murder. A child molester reads the Bible to his victims in order to justify his sex acts with them. Parents refuse life-saving medical treatment for a child because of their religious beliefs. Parents starve and beat their child to death because their minister said the child was possessed by demonic spirits.

Some people would argue that the Christians who committed the above crimes misunderstood and distorted their religion while satanists who commit crimes are following theirs. But who decides what constitutes a misinterpretation of a religious belief system? The individuals who committed the above-described crimes, however misguided, believed that they were following their religion as they understood it. Religion was and is used to justify such social behavior as the Crusades, the Inquisition, Apartheid, segregation, and recent violence in Northern Ireland, India, Lebanon and Nigeria.

Who decides exactly what “satanists” believe? In this country, we cannot even agree on what Christians believe. At many law enforcement conferences The _Satanic Bible_ is used for this, and it is often contrasted or compared with the Judeo-Christian Bible. The _Satanic Bible_ is, in essence, a short paperback book written by one man, Anton LaVey, in 1969.

To compare it to a book written by multiple authors over a period of thousands of years is ridiculous, even ignoring the possibility of Divine revelation in the Bible. What satanists believe certainly isn’t limited to other people’s interpretation of a few books. More importantly it is subject to some degree of interpretation by individual believers just as Christianity is. Many admitted “satanists” claim they do not even believe in God, the devil, or any supreme deity. The criminal behavior of one person claiming belief in a religion does not necessarily imply guilt or blame to others sharing that belief. In addition, simply claiming membership in a religion does not necessarily make you a member.

The fact is that far more crime and child abuse has been committed by zealots in the name of God, Jesus, Mohammed, and other mainstream religion than has ever been committed in the name of Satan. Many people, including myself, don’t like that statement, but the truth of it is undeniable.

Although defining a crime as satanic, occult, or ritualistic would probably involve a combination of the criteria set forth above, I have been unable to clearly define such a crime. Each potential definition presents a different set of problems when measured against an objective, rational, and constitutional perspective. In a crime with multiple subjects, each offender may have a different motivation for the same crime. Whose motivation determines the label for the crime? It is difficult to count or track something you cannot even define.

I have discovered, however, that the facts of so-called “satanic crimes” are often significantly different from what is described at training conferences or in the media. The actual involvement of satanism or the occult in these cases usually turns out to be secondary, insignificant, or nonexistent. Occult or ritual crime surveys done by the states of Michigan (1990) and Virginia (1991) have only confirmed this “discovery.” Some law enforcement officers, unable to find serious “satanic” crime in their communities, assume they are just lucky or vigilant and the serious problems must be in other jurisdictions. The officers in the other jurisdictions, also unable find it, assume the same.

MULTIDIMENSIONAL CHILD SEX RINGS

Sometime in early 1983 I was first contacted by a law enforcement agency for guidance in what was then thought to be an unusual case. The exact date of the contact is unknown because its significance was not recognized at the time. In the months and years that followed, I received more and more inquiries about “these kinds of cases.” The requests for assistance came (and continue to come) from all over the United States. Many of the aspects of these cases varied, but there were also some commonalties. Early on, however, one particularly difficult and potentially significant issue began to emerge.

These cases involved and continue to involve unsubstantiated allegations of bizarre activity that are difficult either to prove or disprove. Many of the unsubstantiated allegations, however, do not seem to have occurred or even seem to be possible. These cases seem to call into question the credibility of victims of child sexual abuse and exploitation. These are the most polarizing, frustrating, and baffling cases I have encountered in more than 18 years of studying the criminal aspects of deviant sexual behavior. I privately sought answers, but said nothing publicly about those cases until 1985.

In October 1984 the problems in investigating and prosecuting one of these cases in Jordan, Minnesota became publicly known. In February 1985, at the FBI Academy, the FBI sponsored and I coordinated the first national seminar held to study “these kinds of cases.” Later in 1985, similar conferences sponsored by other organizations were held in Washington, D.C.; Sacramento, California; and Chicago, Illinois. These cases have also been discussed at many recent regional and national conferences dealing with the sexual victimization of children and Multiple Personality Disorder. Few answers have come from these conferences. I continue to be contacted on these cases on a regular basis. Inquiries have been received from law enforcement officers, prosecutors, therapists, victims, families of victims, and the media from all over the United States and now foreign countries. I do not claim to understand completely all the dynamics of these cases. I continue to keep an open mind and to search for answers to the questions and solutions to the problems they pose. This discussion is based on my analysis of the several hundred of “these kinds of cases” on which I have consulted since 1983.

DYNAMICS OF CASES

What are “these kinds of cases?” They were and continue to be difficult to define. They all involve allegations of what sounds like child sexual abuse, but with a combination of some atypical dynamics. These cases seem to have the following four dynamics in common: (1) multiple young victims, (2) multiple offenders, (3) fear as the controlling tactic, and (4) bizarre or ritualistic activity.

—- (1) MULTIPLE YOUNG VICTIMS

In almost all the cases the sexual abuse was alleged to have taken place or at least begun when the victims were between the ages of birth and six. This very young age may be an important key to understanding these cases. In addition the victims all described multiple children being abused. The numbers ranged from three or four to as many as several hundred victims.

—- (2) MULTIPLE OFFENDERS

In almost all the cases the victims reported numerous offenders. The numbers ranged from two or three all the way up to dozens of offenders. In one recent case the victims alleged 400-500 offenders were involved. Interestingly many of the offenders (perhaps as many as 40-50 percent) were reported to be females. The multiple offenders were often family members and were described as being part of a cult, occult, or satanic group.

—- (3) FEAR AS CONTROLLING TACTIC

Child molesters in general are able to maintain control and ensure the secrecy of their victims in a variety of ways. These include attention and affection, coercion, blackmail, embarrassment, threats, and violence. In almost all of these cases I have studied, the victims described being frightened and reported threats against themselves, their families, their friends, and even their pets. They reported witnessing acts of violence perpetrated to reinforce this fear. It is my belief that this fear and the traumatic memory of the events may be another key to understanding many of these cases.

—- (4) BIZARRE OR RITUALISTIC ACTIVITY

This is the most difficult dynamic of these cases to describe. “Bizarre” is a relative term. Is the use of urine or feces in sexual activity bizarre, or is it a well-documented aspect of sexual deviancy, or is it part of established satanic rituals? As previously discussed, the ritualistic aspect is even more difficult to define. How do you distinguish acts performed in a precise manner to enhance or allow sexual arousal from those acts that fulfill spiritual needs or comply with “religious” ceremonies? Victims in these cases report ceremonies, chanting, robes and costumes, drugs, use of urine and feces, animal sacrifice, torture, abduction, mutilation, murder, and even cannibalism and vampirism. All things considered, the word “bizarre” is probably preferable to the word “ritual” to describe this activity.

When I was contacted on these cases, it was very common for a prosecutor or investigator to say that the alleged victims have been evaluated by an “expert” who will stake his or her professional reputation on the fact that the victims are telling the “truth.” When asked how many cases this expert had previously evaluated involving these four dynamics, the answer was always the same: none! The experts usually had only dealt with one-on-one intrafamilial sexual abuse cases. Recently an even more disturbing trend has developed. More and more of the victims have been identified or evaluated by experts who have been trained to identify and specialize in satanic ritual abuse.

CHARACTERISTICS OF MULTIDIMENSIONAL CHILD SEX RINGS

As previously stated, a major problem in communicating, training, and researching in this area is the term used to define “these kinds of cases.” Many refer to them as “ritual, ritualistic, or ritualized abuse of children cases” or “satanic ritual abuse (SRA) cases.” Such words carry specialized meanings for many people and might imply that all these cases are connected to occult or satanic activity. If ritual abuse is not necessarily occult or satanic, but is “merely” severe, repeated, prolonged abuse, why use a term that, in the minds of so many, implies such specific motivation?

Others refer to these cases as “multioffender/multivictim cases”. The problem with this term is that most multiple offender and victim cases do not involve the four dynamics discussed above.

For want of a better term, I have decided to refer to “these kinds of cases” as “multidimensional child sex rings.” Right now I seem to be the only one using this term. I am, however, not sure if this is truly a distinct kind of child sex ring case or just a case not properly handled.

Following are the general characteristics of these multidimensional child sex ring cases as contrasted with more common historical child sex ring cases [see my monograph _Child Sex Rings: A Behavioral Analysis] (1989) for a discussion of the characteristics of historical child sex ring cases]. [NOTE: Monograph is available in PDF format through the link given — flr]

—- (1) FEMALE OFFENDERS

As many as 40-50 percent of the offenders in these cases are reported to be women. This is in marked contrast to historical child sex rings in which almost all the offenders are men.

—- (2) SITUATIONAL MOLESTERS

The offenders appear to be sexually interacting with the child victims for reasons other than a true sexual preference for children. The children are substitute victims, and the abusive activity may have little to do with pedophilia [see my monograph _Child Molesters: A Behavioral Analysis_ (1987) for a further explanation about types of molesters]. [NOTE: The monograph is available in PDF format through the link offered — flr]

—- (3) MALE AND FEMALE VICTIMS

Both boys and girls appear to be targeted, but with an apparent preference for girls. Almost all the adult survivors are female, but day care cases frequently involve male as well as female victims. The most striking characteristic of the victims, however, is their young age (generally birth to six years old when the abuse began.)

—- (4) MULTIDIMENSIONAL MOTIVATION

Sexual gratification appears to be only part of the motivation for the “sexual” activity. Many people today argue that the motivation is “spiritual” – possibly part of an occult ceremony. It is my opinion that the motivation may have more to do with anger, hostility, rage and resentment carried out against weak and vulnerable victims. Much of the ritualistic abuse of children may not be sexual in nature. Some of the activity may, in fact, be physical abuse directed at sexually-significant body parts (penis, anus, nipples.) This may also partially explain the large percentage of female offenders. Physical abuse of children by females is well- documented.

—- (5) PORNOGRAPHY AND PARAPHERNALIA

Although many of the victims of multidimensional child sex rings claim that pictures and videotapes of the activity were made, no such visual record has been found by law enforcement. In recent years, American law enforcement has seized large amounts of child pornography portraying children in a wide variety of sexual activity and perversions. None of it, however, portrays the kind of bizarre and/or ritualistic activity described by these victims. Perhaps these offenders use and store their pornography and paraphernalia in ways different from preferential child molesters (pedophiles.) This is an area needing additional research and investigation.

—- (6) CONTROL THROUGH FEAR

Control through fear may be the overriding characteristic of these cases. Control is maintained by frightening the children. A very young child might not be able to understand the significance of much of the sexual activity but certainly understands fear. The stories that the victims tell may be their perceived versions of severe traumatic memories. They may be the victims of a severely traumatized childhood in which being sexually abused was just one of the many negative events affecting their lives.

SCENARIOS

Multidimensional child sex rings typically emerge from one of four scenarios: (1) adult survivors, (2) day care cases, (3) family/isolated neighborhood cases, and (4) custody/visitation disputes.

—- (1) ADULT SURVIVORS

In adult survivor cases, adults of almost any age – nearly always women – are suffering the consequences of a variety of personal problems and failures in their lives (e.g., promiscuity, eating disorders, drug and alcohol abuse, failed relationships, self- mutilation, unemployment.) As a result of some precipitating stress or crisis, they often seek therapy. They are frequently hypnotized, intentionally or unintentionally, as part of the therapy and are often diagnosed as suffering from Multiple Personality Disorder. Gradually, during the therapy, the adults reveal previously unrecalled memories of early childhood victimization that includes multiple victims and offenders, fear as the controlling tactic, and bizarre or ritualistic activity. Adult survivors may also claim that “cues” from certain events in their recent life “triggered” the previously repressed memories.

The multiple offenders are often described as members of a cult or satanic group. Parents, family members, clergy, civic leaders, police officers (or individuals wearing police uniforms,) and other prominent members of society are frequently described as present at and participating in the exploitation. The alleged bizarre activity often includes insertion of foreign objects, witnessing mutilations, and sexual acts and murders being filmed or photographed. The offenders may allegedly still be harassing or threatening the victims. They report being particularly frightened on certain dates and by certain situations. In several of these cases, women (called “breeders”) claim to have had babies that were turned over for human sacrifice. This type of case is probably best typified by books like _Michelle Remembers_ (Smith & Pazder, 1980,) _Satan’s Underground_ (Stratford, 1988,) and _Satan’s Children_ (Mayer, 1991.)

If and when therapists come to believe the patient or decide the law requires it, the police or FBI are sometimes contacted to conduct an investigation. The therapists may also fear for their safety because they now know the “secret.” The therapists will frequently tell law enforcement that they will stake their professional reputation on the fact that their patient is telling the truth. Some adult survivors go directly to law enforcement. They may also go from place to place in an effort to find therapists or investigators who will listen to and believe them. Their ability to provide verifiable details varies and many were raised in apparently religious homes. A few adult survivors are now reporting participation in specific murders or child abductions that are known to have taken place.

—- (2) DAY CARE CASES

In day care cases children currently or formerly attending a day care center gradually describe their victimization at the center and at other locations to which they were taken by the day care staff. The cases include multiple victims and offenders, fear, and bizarre or ritualistic activity, with a particularly high number of female offenders. Descriptions of strange games, insertion of foreign objects, killing of animals, photographing of activities, and wearing of costumes are common. The accounts of the young children, however, do not seem to be quite as “bizarre” as those of the adult survivors, with fewer accounts of human sacrifice.

—- (3) FAMILY/ISOLATED NEIGHBORHOOD CASES

In family/isolated neighborhood cases, children describe their victimization within their family or extended family. The group is often defined by geographic boundary, such as a cul-de-sac, apartment building, or isolated rural setting. Such accounts are most common in rural or suburban communities with high concentrations of religiously conservative people. The stories are similar to those told of the day care setting, but with more male offenders. The basic dynamics remain the same, but victims tend to be more than six years of age, and the scenario may also involve a custody or visitation dispute.

—- (4) CUSTODY/VISITATION DISPUTE

In custody/visitation dispute cases, the allegations emanate from a custody or visitation dispute over at least one child under the age of seven. The four dynamics described above make these cases extremely difficult to handle. When complicated by the strong emotions of this scenario, the cases can be overwhelming. This is especially true if the disclosing child victims have been taken into the “underground” by a parent during the custody or visitation dispute. Some of these parents or relatives may even provide authorities with diaries or tapes of their interviews with the children. An accurate evaluation and assessment of a young child held in isolation in this underground while being “debriefed” by a parent or someone else is almost impossible. However well-intentioned, these self-appointed investigators severely damage any chance to validate these cases objectively.

WHY ARE VICTIMS ALLEGING THINGS THAT DO NOT SEEM TO BE TRUE?

Some of what the victims in these cases allege is physically impossible (victim cut up and put back together, offender took the building apart and then rebuilt it); some is possible but improbable (human sacrifice, cannibalism, vampirism ); some is possible and probable (child pornography, clever manipulation of victims); and some is corroborated (medical evidence of vaginal or anal trauma, offender confessions.)

The most significant crimes being alleged that do not seem to be true are the human sacrifice and cannibalism by organized satanic cults. In none of the multidimensional child sex ring cases of which I am aware have bodies of the murder victims been found – in spite of major excavations where the abuse victims claim the bodies were located. The alleged explanations for this include: the offenders moved the bodies after the children left, the bodies were burned in portable high-temperature ovens, the bodies were put in double- decker graves under legitimately buried bodies, a mortician member of the cult disposed of the bodies in a crematorium, the offenders ate the bodies, the offenders used corpses and aborted fetuses, or the power of Satan caused the bodies to disappear.

Not only are no bodies found, but also, more importantly, there is no physical evidence that a murder took place. Many of those not in law enforcement do not understand that, while it is possible to get rid of a body, it is even more difficult to get rid of the physical evidence that a murder took place, especially a human sacrifice involving sex, blood, and mutilation. Such activity would leave behind trace evidence that could be found using modern crime scene processing techniques in spite of extraordinary efforts to clean it up.

The victims of these human sacrifices and murders are alleged to be abducted missing children, runaway and throwaway children, derelicts, and the babies of breeder women. It is interesting to note that many of those espousing these theories are using the long- since-discredited numbers and rhetoric of the missing children hysteria in the early 1980s. Yet “Stranger-Abduction Homicides of Children,” a January 1989 _Juvenile Justice Bulletin_, published by the Office of Juvenile Justice and Delinquency Prevention of the U.S. Department of Justice, reports that researchers now estimate that the number of children kidnapped and murdered by nonfamily members is between 52 and 158 a year and that adolescents 14 to 17 years old account for nearly two-thirds of these victims. These figures are also consistent with the 1990 National Incident Studies previously mentioned.

We live in a very violent society, and yet we have “only” about 23,000 murders a year. Those who accept these stories of mass human sacrifice would have us believe that the satanists and other occult practitioners are murdering more than twice as many people every year in this country as all the other murderers combined.

In addition, in none of the cases of which I am aware has any evidence of a well-organized satanic cult been found. Many of those who accept the stories of organized ritual abuse of children and human sacrifice will tell you that the best evidence they now have is the consistency of stories from all over America. It sounds like a powerful argument. It is interesting to note that, without having met each other, the hundreds of people who claim to have been abducted by aliens from outer space also tell stories and give descriptions of the aliens that are similar to each other. This is not to imply that allegations of child abuse are in the same category as allegations of abduction by aliens from outer space. It is intended only to illustrate that individuals who never met each other can sometimes describe similar events without necessarily having experienced them.

The large number of people telling the same story is, in fact, the biggest reason to doubt these stories. It is simply too difficult for that many people to commit so many horrendous crimes as part of an organized conspiracy. Two or three people murder a couple of children in a few communities as part of a ritual, and nobody finds out? Possible. Thousands of people do the same thing to tens of thousands of victims over many years? Not likely. Hundreds of communities all over America are run by mayors, police departments, and community leaders who are practicing satanists and who regularly murder and eat people? Not likely.

In addition, these community leaders and high-ranking officials also supposedly commit these complex crimes leaving no evidence, and at the same time function as leaders and managers while heavily involved in using illegal drugs. Probably the closest documented example of this type of alleged activity in American history is the Ku Klux Klan, which ironically used Christianity, not satanism, to rationalize its activity but which, as might be expected, was eventually infiltrated by informants and betrayed by its members.

As stated, initially I was inclined to believe the allegations of the victims. But as the cases poured in and the months and years went by, I became more concerned about the lack of physical evidence and corroboration for many of the more serious allegations. With increasing frequency I began to ask the question: “Why are victims alleging things that do not seem to be true?” Many possible answers were considered.

The first possible answer is obvious: clever offenders. The allegations may not seem to be true but they are true. The criminal justice system lacks the knowledge, skill, and motivation to get to the bottom of this crime conspiracy. The perpetrators of this crime conspiracy are clever, cunning individuals using sophisticated mind control and brainwashing techniques to control their victims. Law enforcement does not know how to investigate these cases.

It is technically possible that these allegations of an organized conspiracy involving taking over day care centers, abduction, cannibalism, murder, and human sacrifice might be true. But if they are true, they constitute one of the greatest crime conspiracies in history. Many people do not understand how difficult it is to commit a conspiracy crime involving numerous co-conspirators. One clever and cunning individual has a good chance of getting away with a well- planned interpersonal crime. Bring one partner into the crime and the odds of getting away with it drop considerably. The more people involved in the crime, the harder it is to get away with it. Why? Human nature is the answer. People get angry and jealous. They come to resent the fact that another conspirator is getting “more” than they. They get in trouble and want to make a deal for themselves by informing on others.

If a group of individuals degenerate to the point of engaging in human sacrifice, murder, and cannibalism, that would most likely be the beginning of the end for such a group. The odds are that someone in the group would have a problem with such acts and be unable to maintain the secret.

THE APPEAL OF THE SATANIC “CONSPIRACY THEORY”, IS TWOFOLD:

—- (1) First, it is a simple explanation for a complex problem. Nothing is more simple than “the devil made them do it.” If we do not understand something, we make it the work of some supernatural force. During the Middle Ages, serial killers were thought to be vampires and werewolves, and child sexual abuse was the work of demons taking the form of parents and clergy. Even today, especially for those raised to religiously believe so, satanism offers an explanation as to why “good” people do bad things. It may also help to “explain” unusual, bizarre, and compulsive sexual urges and behavior.

—- (2) Second, the conspiracy theory is a popular one. We find it difficult to believe that one bizarre individual could commit a crime we find so offensive. Conspiracy theories about soldiers missing in action (MIAs,) abductions by UFOs, Elvis Presley sightings, and the assassination of prominent public figures are the focus of much attention in this country. These conspiracy theories and allegations of ritual abuse have the following in common: (1) self-proclaimed experts, (2) tabloid media interest, (3) belief the government is involved in a coverup, and (4) emotionally involved direct and indirect victim/witnesses.

On a recent television program commemorating the one hundredth anniversary of Jack the Ripper, almost fifty percent of the viewing audience who called the polling telephone numbers indicated that they thought the murders were committed as part of a conspiracy involving the British Royal Family. The five experts on the program, however, unanimously agreed the crimes were the work of one disorganized but lucky individual who was diagnosed as a paranoid schizophrenic. In many ways, the murders of Jack the Ripper are similar to those allegedly committed by satanists today.

If your child’s molestation was perpetrated by a sophisticated satanic cult, there is nothing you could have done to prevent it and therefore no reason to feel any guilt. I have been present when parents who believe their children were ritually abused at day care centers have told others that the cults had sensors in the road, lookouts in the air, and informers everywhere; therefore, the usually recommended advice of unannounced visits to the day care center would be impossible.

ALTERNATIVE EXPLANATIONS

Even if only part of an allegation is not true, what then is the answer to the question “Why are victims alleging things that do not seem to be true?” After consulting with psychiatrists, psychologists, anthropologists, therapists, social workers, child sexual abuse experts, and law enforcement investigators for more than eight years, I can find no single, simple answer. The answer to the question seems to be a complex set of dynamics that can be different in each case. In spite of the fact that some skeptics keep looking for it, there does not appear to be one answer to the question that fits every case. Each case is different, and each case may involve a different combination of answers.

I have identified a series of possible alternative answers to this question. The alternative answers also do not preclude the possibility that clever offenders are sometimes involved. I will not attempt to explain completely these alternative answers because I cannot. They are presented simply as areas for consideration and evaluation by child sexual abuse intervenors, for further elaboration by experts in these fields, and for research by objective social scientists. The first step, however, in finding the answers to this question is to admit the possibility that some of what the victims describe may not have happened. Some child advocates seem unwilling to do this.

PATHOLOGICAL DISTORTION

The first possible answer to why victims are alleging things that do not seem to be true is pathological distortion. The allegations may be errors in processing reality influenced by underlying mental disorders such as dissociative disorders, borderline or histrionic personality disorders, or psychosis. These distortions may be manifested in false accounts of victimization in order to gain psychological benefits such as attention and sympathy (factitious disorder.) When such individuals repeatedly go from place to place or person to person making these false reports of their own “victimization,” it is called Munchausen Syndrome.

When the repealed false reports concern the “victimization” of their children or others linked to them, it is called Munchausen Syndrome by Proxy. I am amazed when some therapists state that they believe the allegations because they cannot think of a reason why the “victim,” whose failures are now explained and excused or who is now the center of attention at a conference or on a national television program, would lie. If you can be forgiven for mutilating and killing babies, you can be forgiven for anything.

Many “victims” may develop pseudomemories of their victimization and eventually come to believe the events actually occurred. Noted forensic psychiatrist Park E. Dietz (personal communication, Nov. 1991) states:

“Pseudomemories have been acquired through dreams (particularly if one is encouraged to keep a journal or dream diary and to regard dream content as ‘clues’ about the past or as snippets of history,) substance-induced altered states of consciousness (alcohol or other drugs,) group influence (particularly hearing vivid accounts of events occurring to others with whom one identifies emotionally such as occurs in incest survivor groups,) reading vivid accounts of events occurring to others with whom one identifies emotionally, watching such accounts in films or on television, and hypnosis. The most efficient means of inducing pseudomemories is hypnosis.

“It is characteristic of pseudomemories that the recollections of complex events (as opposed to a simple unit of information, such as a tag number) are incomplete and without chronological sequence. Often the person reports some uncertainty because the pseudomemories are experienced in a manner they describe as ‘hazy’, ‘fuzzy’, or ‘vague’. They are often perplexed that they recall some details vividly but others dimly.

“Pseudomemories are not delusions. When first telling others of pseudomemories, these individuals do not have the unshakable but irrational conviction that deluded subjects have, but with social support they often come to defend vigorously the truthfulness of the pseudomemories.

“Pseudomemories are not fantasies, but may incorporate elements from fantasies experienced in the past. Even where the events described are implausible, listeners may believe them because they are reported with such intense affect (i.e. with so much emotion attached to the story) that the listener concludes that the events must have happened because no one could ‘fake’ the emotional aspects of the retelling. It also occurs, however, that persons report pseudomemories in such a matter-of-fact and emotionless manner that mental health professionals conclude that the person has ‘dissociated’ intellectual knowledge of the events from emotional appreciation of their impact”.

TRAUMATIC MEMORY

The second possible answer is traumatic memory. Fear and severe trauma can cause victims to distort reality and confuse events. This is a well-documented fact in cases involving individuals taken hostage or in life-and-death situations. The distortions may be part of an elaborate defense mechanism of the mind called “splitting” – The victims create a clear-cut good-and-evil manifestation of their complex victimization that is then psychologically more manageable.

Through the defense mechanism of dissociation, the victim may escape the horrors of reality by inaccurately processing that reality. In a dissociative state a young child who ordinarily would know the difference might misinterpret a film or video as reality.

Another defense mechanism may tell the victim that it could have been worse, and so his or her victimization was not so bad. They are not alone in their victimization – other children were also abused. Their father who abused them is no different from other prominent people in the community they claim also abused them. Satanism may help to explain why their outwardly good and religious parents did such terrible things to them in the privacy of their home. Their religious training may convince them that such unspeakable acts by supposedly “good” people must be the work of the devil. The described human sacrifice may be symbolic of the “death” of their childhood.

It may be that we should anticipate that individuals severely abused as very young children by multiple offenders with fear as the primary controlling tactic will distort and embellish their victimization. Perhaps a horror-filled yet inaccurate account of victimization is not only not a counterindication of abuse, but is in fact a corroborative indicator of extreme physical, psychological, and/or sexual abuse. I do not believe it is a coincidence nor the result of deliberate planning by satanists that in almost all the cases of ritual abuse that have come to my attention, the abuse is alleged to have begun prior to the age of seven and perpetrated by multiple offenders.

It may well be that such abuse, at young age by multiple offenders, is the most difficult to accurately recall with the specific and precise detail needed by the criminal justice system, and the most likely to be distorted and exaggerated when it is recalled. In her book _Too Scared to Cry_ (1990,) child psychiatrist Lenore Terr, a leading expert on psychic trauma in childhood, states “that a series of early childhood shocks might not be fully and accurately ‘reconstructed’ from the dreams and behaviors of the adult” (p. 5.)

NORMAL CHILDHOOD FEARS AND FANTASY

The third possible answer may be normal childhood fears and fantasy. Most young children are afraid of ghosts and monsters. Even as adults, many people feel uncomfortable, for example, about dangling their arms over the side of their bed. They still remember the “monster” under the bed from childhood. While young children may rarely invent stories about sexual activity, they might describe their victimization in terms of evil as they understand it. In church or at home, children may be told of satanic activity as the source of evil. The children may be “dumping” all their fears and worries unto an attentive and encouraging listener.

Children do fantasize. Perhaps whatever causes a child to allege something impossible (such as being cut up and put back together) is similar to what causes a child to allege something possible but improbable (such as witnessing another child being chopped up and eaten.)

MISPERCEPTION, CONFUSION, AND TRICKERY

Misperception, confusion, and trickery may be a fourth answer. Expecting young children to give accurate accounts of sexual activity for which they have little frame of reference is unreasonable. The Broadway play _Madame Butterfly_ is the true story of a man who had a 15-year affair, including the “birth” of a baby, with a “woman” who turns out to have been a man all along. If a grown man does not know when he has had vaginal intercourse with a woman, how can we expect young children not to be confused?

Furthermore some clever offenders may deliberately introduce elements of satanism and the occult into the sexual exploitation simply to confuse or intimidate the victims. Simple magic and other techniques may be used to trick the children. Drugs may also be deliberately used to confuse the victims and distort their perceptions. Such acts would then be M.O., not ritual.

As previously stated, the perceptions of young victims may also be influenced by any trauma being experienced. This is the most popular alternative explanation, and even the more zealous believers of ritual abuse allegations use it, but only to explain obviously impossible events.

OVERZEALOUS INTERVENORS

Overzealous intervenors, causing intervenor contagion, may be a fifth answer. These intervenors can include parents, family members, foster parents, doctors, therapists, social workers, law enforcement officers, prosecutors, and any combination thereof. Victims have been subtly as well as overtly rewarded and bribed by usually well- meaning intervenors for furnishing further details. In addition, some of what appears not to have happened may have originated as a result of intervenors making assumptions about or misinterpreting what the victims are saying. The intervenors then repeat, and possibly embellish, these assumptions and misinterpretations, and eventually the victims are “forced” to agree with or come to accept this “official” version of what happened.

The judgment of intervenors may be affected by their zeal to uncover child sexual abuse, satanic activity, or conspiracies. However “well-intentioned,” these overzealous intervenors must accept varying degrees of responsibility for the unsuccessful prosecution of those cases where criminal abuse did occur. This is the most controversial and least popular of the alternative explanations.

URBAN LEGENDS

Allegations of and knowledge about ritualistic or satanic abuse may also be spread through urban legends. In _The Vanishing Hitchhiker_ (1981,) the first of his four books on the topic, Dr. Jan Harold Brunvand defines urban legends as “realistic stories concerning recent events (or alleged events) with an ironic or supernatural twist” (p. xi.) Dr. Brunvand’s books convincingly explain that just because individuals throughout the country who never met each other tell the same story does not mean that it is true.

Absurd urban legends about the corporate logos of Proctor and Gamble and Liz Claiborne being satanic symbols persist in spite of all efforts to refute them with reality. Some urban legends about child kidnappings and other threats to citizens have even been disseminated unknowingly by law enforcement agencies. Such legends have always existed, but today the mass media aggressively participate in their rapid and more efficient dissemination.

Many Americans mistakenly believe that tabloid television shows check out and verify the details of their stories before putting them on the air. Mass hysteria may partially account for large numbers of victims describing the same symptoms or experiences.

Training conferences for all the disciplines involved in child sexual abuse may also play a role in the spread of this contagion. At one child abuse conference I attended, an exhibitor was selling more than 50 different books dealing with satanism and the occult. By the end of the conference, he had sold nearly all of them. At another national child sexual abuse conference, I witnessed more than 100 attendees copying down the widely disseminated 29 “Symptoms Characterizing Satanic Ritual Abuse” in preschool-aged children. Is a four-year-old child’s “preoccupation with urine and feces” an indication of satanic ritual abuse or part of normal development?

COMBINATION

Most multidimensional child sex ring cases probably involve a combination of the answers previously set forth, as well as other possible explanations unknown to me at this time. Obviously, cases with adult survivors are more likely to involve some of these answers than those with young children. Each case of sexual victimization must be individually evaluated on its own merits without any preconceived explanations. All the possibilities must be explored if for no other reason than the fact that the defense attorneys for any accused subjects will almost certainly do so.

Most people would agree that just because a victim tells you one detail that turns out to be true, this does not mean that every detail is true. But many people seem to believe that if you can disprove one part of a victim’s story, then the entire story is false. As previously stated, one of my main concerns in these cases is that people are getting away with sexually abusing children or committing other crimes because we cannot prove that they are members of organized cults that murder and eat people.

I have discovered that the subject of multidimensional child sex rings is a very emotional and polarizing issue. Everyone seems to demand that one choose a side. On one side of the issue are those who say that nothing really happened and it is all a big witch hunt led by overzealous fanatics and incompetent “experts.” The other side says, in essence, that everything happened; victims never lie about child sexual abuse, and so it must be true.

There is a middle ground. It is the job of the professional investigator to listen to all the victims and conduct an appropriate investigation in an effort to find out what happened, considering all possibilities. Not all childhood trauma is abuse. Not all child abuse is a crime. The great frustration of these cases is the fact that you are often convinced that something traumatic happened to the victim, but do not know with any degree of certainty exactly what happened, when it happened, or who did it.

DO VICTIMS LIE ABOUT SEXUAL ABUSE AND EXPLOITATION?

The crucial central issue in the evaluation of a response to cases of multidimensional child sex rings is the statement “Children never lie about sexual abuse or exploitation. If they have details, it must have happened.” This statement, oversimplified by many, is the basic premise upon which some believe the child sexual abuse and exploitation movement is based. It is almost never questioned or debated at training conferences. In fact, during the 1970s, there was a successful crusade to eliminate laws requiring corroboration of child victim statements in child sexual abuse cases. The best way to convict child molesters is to have the child victims testify in court. If we believe them, the jury will believe them. Any challenge to this basic premise was viewed as a threat to the movement and a denial that the problem existed.

I believe that children rarely lie about sexual abuse or exploitation, if a lie is defined as a statement deliberately and maliciously intended to deceive. The problem is the oversimplification of the statement. Just because a child is not lying does not necessarily mean the child is telling the truth. I believe that in the majority of these cases, the victims are not lying. They are telling you what they have come to believe has happened to them. Furthermore the assumption that children rarely lie about sexual abuse does not necessarily apply to everything a child says during a sexual abuse investigation. Stories of mutilation, murder, and cannibalism are not really about sexual abuse.

Children rarely lie about sexual abuse or exploitation, but they do fantasize, furnish false information, furnish misleading information, misperceive events, try to please adults, respond to leading questions, and respond to rewards. Children are not adults in little bodies and do go through developmental stages that must be evaluated and understood. In many ways, however, children are no better and no worse than other victims or witnesses of a crime. They should not be automatically believed, nor should they be automatically disbelieved.

The second part of the statement – if children can supply details, the crime must have happened – must also be carefully evaluated. The details in question in most of the cases of multidimensional child sex rings have little to do with sexual activity. Law enforcement and social workers must do more than attempt to determine how a child could have known about the sex acts. These cases involve determining how a victim could have known about a wide variety of bizarre and ritualistic activity. Young children may know little about specific sex acts, but they may know a lot about monsters, torture, kidnapping, and murder.

Victims may supply details of sexual and other acts using information from sources other than their own direct victimization. Such sources must be evaluated carefully by the investigator of multidimensional child sex rings.

PERSONAL KNOWLEDGE

The victim may have personal knowledge of the sexual or ritual acts, but not as a result of the alleged victimization. The knowledge could have come from viewing pornography, sex education, or occult material; witnessing sexual or ritual activity in the home; or witnessing the sexual abuse of others. It could also have come from having been sexually or physically abused, but by other than the alleged offenders and in ways other than the alleged offense.

OTHER CHILDREN OR VICTIMS

Young children today are socially interacting more often and at a younger age than ever before. Many parents are unable to provide possibly simple explanations for their children’s stories because they were not with the children when the events occurred. They do not even know what videotapes their children may have seen, what games they may have played, or what stories they may have been told or overheard. Children are being placed in day care centers for eight, ten, or twelve hours a day starting as young as six weeks of age. The children share experiences by playing house, school, or doctor. Bodily functions such as urination and defecation are a focus of attention for these young children. To a certain extent, each child shares the experiences of all the other children.

The odds are fairly high that in any typical day care center there might be some children who are victims of incest; victims of physical abuse; victims of psychological abuse; children of cult members (even satanists); children of sexually open parents; children of sexually indiscriminate parents; children of parents obsessed with victimization; children of parents obsessed with the evils of satanism; children without conscience; children with a teenage brother or pregnant mother; children with heavy metal music and literature in the home; children with bizarre toys, games, comics, and magazines; children with a VCR and slasher films in their home; children with access to dial-a-porn, party lines, or pornography; or children victimized by a day care center staff member.

The possible effects of the interaction of such children prior to the disclosure of the alleged abuse must be evaluated, Adult survivors may obtain details from group therapy sessions, support networks, church groups, or self-help groups. The willingness and ability of siblings to corroborate adult survivor accounts of ritual abuse varies. Some will support and partially corroborate the victim’s allegations. Others will vehemently deny them and support their accused parents or relatives.

MEDIA

The amount of sexually explicit, occult, anti-occult, or violence- oriented material available to adults and even children in the modern world is overwhelming. This includes movies, videotapes, television, music, toys, and books. There are also documentaries on satanism, witchcraft, and the occult that are available on videotape. Most of the televangelists have videotapes on the topics that they are selling on their programs.

The National Coalition on Television Violence News (1988) estimates that 12% of the movies produced in the United States can be classified as satanic horror films. Cable television and the home VCR make all this material readily available even to young children. Religious broadcasters and almost all the television tabloid and magazine programs have done shows on satanism and the occult. Heavy metal and black metal music, which often has a satanic theme, is readily available and popular. In addition to the much-debated fantasy role-playing games, there are numerous popular toys on the market with an occult-oriented, bizarre, or violent theme.

Books on satanism and the occult, both fiction and nonfiction, are readily available in most bookstores, especially Christian bookstores. Several recent books specifically discuss the issue of ritual abuse of children. Obviously, very young children do not read this material, but their parents, relatives, and therapists might and then discuss it in front of or with them. Much of the material intended to fight the problem actually fuels the problem and damages effective prosecution.

SUGGESTIONS AND LEADING QUESTIONS

This problem is particularly important in cases stemming from custody/visitation disputes involving at least one child under the age of seven. It is my opinion that most suggestive, leading questioning of children by intervenors is inadvertently done as part of a good-faith effort to learn the truth. Not all intervenors are in equal positions to potentially influence victim allegations. Parents and relatives especially are in a position to subtly influence their young children to describe their victimization in a certain way. Children may also overhear their parents discussing the details of the case. Children often tell their parents what they believe their parents want or need to hear.

Some children may be instinctively attempting to provide “therapy” for their parents by telling them what seems to satisfy them and somehow makes them feel better. In one case a father gave the police a tape recording to “prove” that his child’s statements were spontaneous disclosures and not the result of leading, suggestive questions. The tape recording indicated just the opposite. Why then did the father voluntarily give it to the police? Probably because he truly believed that he was not influencing his child’s statements – but he was.

Therapists are probably in the best position to influence the allegations of adult survivors. The accuracy and reliability of the accounts of adult survivors who have been hypnotized during therapy is certainly open to question. One nationally-known therapist personally told me that the reason police cannot find out about satanic or ritualistic activity from child victims is that they do not know how to ask leading questions.

Highly suggestive books and pictures portraying “satanic” activity have been developed and marketed to therapists for use during evaluation and treatment. Types and styles of verbal interaction useful in therapy may create significant problems in a criminal investigation. It should be noted, however, that when a therapist does a poor investigative interview as part of a criminal investigation, that is the fault of the criminal justice system that allowed it and not the therapist who did it.

The extremely sensitive, emotional, and religious nature of these cases makes problems with leading questions more likely than in other kinds of cases. Intervenors motivated by religious fervor and/or exaggerated concerns about sexual abuse of children are more likely to lose their objectivity.

MISPERCEPTION AND CONFUSION

In one case, a child’s description of the apparently impossible act of walking through a wall turned out to be the very possible act of walking between the studs of an unfinished wall in a room under construction. In another case, pennies in the anus turned out to be copper-foil-covered suppositories. The children may describe what they believe happened. It is not a lie, but neither is it an accurate account of what happened.

EDUCATION AND AWARENESS PROGRAMS

Some well-intentioned awareness programs designed to prevent child sex abuse, alert professionals, or fight satanism may in fact be unrealistically increasing the fears of professionals, children, and parents and creating self-fulfilling prophesies. Some of what children and their parents are telling intervenors may have been learned in or fueled by such programs. Religious programs, books, and pamphlets that emphasize the power and evil force of Satan may be adding to the problem. In fact most of the day care centers in which ritualistic abuse is alleged to have taken place are church- affiliated centers, and many of the adult survivors alleging it come from apparently religious families.

LAW ENFORCEMENT PERSPECTIVE

The perspective with which one looks at satanic, occult, or ritualistic crime is extremely important. As stated, sociologists, therapists, religious leaders, parents, and just plain citizens each have their own valid concerns and views about this issue. This discussion, however, deals primarily with the law enforcement or criminal justice perspective. When you combine an emotional issue such as the sexual abuse of children with an even more emotional issue such as people’s religious beliefs, it is difficult to maintain objectivity and remember the law enforcement perspective. Some police officers may even feel that all crime is caused by evil, all evil is caused by Satan, and therefore, all crime is satanic crime. This may be a valid religious perspective, but it is of no relevance to the investigation of crime for purposes of prosecution.

Many of the police officers who lecture on satanic or occult crime do not even investigate such cases. Their presentations are more a reflection of their personal religious beliefs than documented investigative information. They are absolutely entitled to their beliefs, but introducing themselves as current or former police officers and then speaking as religious advocates causes confusion. As difficult as it might be, police officers must separate the religious and law enforcement perspectives when they are lecturing or investigating in their official capacities as law enforcement officers. Many law enforcement officers begin their presentations by stating that they are not addressing or judging anyone’s religious beliefs, and then proceed to do exactly that.

Some police officers have resigned rather than curtail or limit their involvement in this issue as ordered by their departments. Perhaps such officers deserve credit for recognizing that they could no longer keep the perspectives separate.

Law enforcement officers and all professionals in this field should avoid the “paranoia” that has crept into this issue and into some of the training conferences. Paranoid type belief systems are characterized by the gradual development of intricate, complex, and elaborate systems of thinking based on and often proceeding logically from misinterpretation of actual events. Paranoia typically involves hypervigilance over the perceived threat, the belief that danger is around every corner, and the willingness to take up the challenge and do something about it. Another very important aspect of this paranoia is the belief that those who do not recognize the threat are evil and corrupt. In this extreme view, you are either with them or against them. You are either part of the solution or part of the problem.

Overzealousness and exaggeration motivated by the true religious fervor of those involved is more acceptable than that motivated by ego or profit.

There are those who are deliberately distorting and hyping this issue for personal notoriety and profit. Satanic and occult crime and ritual abuse of children has become a growth industry. Speaking fees, books, video and audio tapes, prevention material, television and radio appearances all bring egoistic and financial rewards.

Bizarre crime and evil can occur without organized satanic activity. The professional perspective requires that we distinguish between what we know and what we’re not sure of.

THE FACTS ARE:

Some individuals believe in and are involved in something commonly called satanism and the occult.
Some of these individuals commit crime.
Some groups of individuals share these beliefs and involvement in this satanism and the occult.
Some members of these groups commit crime together.
The unanswered questions are:

What is the connection between the belief system and the crimes committed? Is there an organized conspiracy of satanic and occult believers responsible for interrelated serious crime (e.g., molestation, murder)?

After all the hype and hysteria are put aside, the realization sets in that most satanic/occult activity involves the commission of no crimes, and that which does usually involves the commission of relatively minor crimes such as trespassing, vandalism, cruelty to animals, or petty thievery.

THE LAW ENFORCEMENT PROBLEMS MOST OFTEN LINKED TO SATANIC OR OCCULT ACTIVITY ARE:

A – Vandalism.
B – Desecration of churches and cemeteries.
C – Thefts from churches and cemeteries.
D – Teenage gangs
E – Animal mutilations.
F – Teenage suicide.
G – Child abuse.
H – Kidnapping.
I – Murder and human sacrifice

Valid evidence shows some “connection” between satanism and the occult and the first six problems (#a-f) set forth above. The “connection” to the last three problems (#g-i) is far more uncertain.

Even where there seems to be a “connection,” the nature of the connection needs to be explored. It is easy to blame involvement in satanism and the occult for behaviors that have complex motivations. A teenager’s excessive involvement in satanism and the occult is usually a symptom of a problem and not the cause of a problem. Blaming satanism for a teenager’s vandalism, theft, suicide, or even act of murder is like blaming a criminal’s offenses on his tattoos: Both are often signs of the same rebelliousness and lack of self- esteem that contribute to the commission of crimes.

The rock band Judas Priest was recently sued for allegedly inciting two teenagers to suicide through subliminal messages in their recordings. In 1991 Anthony Pratkanis of the University of California at Santa Cruz, who served as an expert witness for the defense, stated the boys in question “lived troubled lives, lives of drug and alcohol abuse, run-ins with the law… family violence, and chronic unemployment. What issues did the trial and the subsequent mass media coverage emphasize? Certainly not the need for drug treatment centers; there was no evaluation of the pros and cons of America’s juvenile justice system, no investigation of the schools, no inquiry into how to prevent family violence, no discussion of the effects of unemployment on a family. Instead our attention was mesmerized by an attempt to count the number of subliminal demons that can dance on the end of a record needle” (p.1.)

The law enforcement investigator must objectively evaluate the legal significance of any criminal’s spiritual beliefs. In most cases, including those involving satanists, it will have little or no legal significance. If a crime is committed as part of a spiritual belief system, it should make no difference which belief system it is. The crime is the same whether a child is abused or murdered as part of a Christian, Hare Krishna, Moslem, or any other belief system. We generally don’t label crimes with the name of the perpetrator’s religion. Why then are the crimes of child molesters, rapists, sadists, and murderers who happen to be involved in satanism and the occult labeled as satanic or occult crimes? If criminals use a spiritual belief system to rationalize and justify or to facilitate and enhance their criminal activity, should the focus of law enforcement be on the belief system or on the criminal activity?

Several documented murders have been committed by individuals involved in one way or another in satanism or the occult. In some of these murders the perpetrator has even introduced elements of the occult (e.g. satanic symbols at the crime scene.) Does that automatically make these satanic murders? It is my opinion that the answer is no. Ritualistic murders committed by serial killers or sexual sadists are not necessarily satanic or occult murders. Ritualistic murders committed by psychotic killers who hear the voice of Satan are no more satanic murders than murders committed by psychotic killers who hear the voice of Jesus are Christian murders.

Rather a satanic murder should be defined as one committed by two or more individuals who rationally plan the crime and whose primary motivation is to fulfill a prescribed satanic ritual calling for the murder. By this definition I have been unable to identify even one documented satanic murder in the United States. Although such murders may have and can occur, they appear to be few in number. In addition the commission of such killings would probably be the beginning of the end for such a group. It is highly unlikely that they could continue to kill several people, every year, year after year, and not be discovered.

A brief typology of satanic and occult practitioners is helpful in evaluating what relationship, if any, such practices have to crimes under investigation. The following typology is adapted from the investigative experience of Officer Sandi Gallant of the San Francisco Police Department, who began to study the criminal aspects of occult activity long before it became popular. No typology is perfect, but I use this typology because it is simple and offers investigative insights. Most practitioners fall into one of three categories, any of which can be practiced alone or in groups:

“YOUTH SUBCULTURE”

“Most teenagers involved in fantasy role-playing games, heavy metal music, or satanism and the occult are going through a stage of adolescent development and commit no significant crimes. The teenagers who have more serious problems are usually those from dysfunctional families or those who have poor communication within their families. These troubled teenagers turn to satanism and the occult to overcome a sense of alienation, to rebel, to obtain power, or to justify their antisocial behavior.

For these teenagers it is the symbolism, not the spirituality, that is more important. It is either the psychopathic or the oddball, loner teenager who is most likely to get into serious trouble. Extreme involvement in the occult is a symptom of a problem, not the cause. This is not to deny, however, that satanism and the occult can be negative influences for a troubled teenager. But to hysterically warn teenagers to avoid this “mysterious, powerful and dangerous” thing called satanism will drive more teenagers right to it. Some rebellious teenagers will do whatever will most shock and outrage society in order to flaunt their rejection of adult norms”.

DABBLERS (SELF-STYLED)

“For these practitioners there is little or no spiritual motivation. They may mix satanism, witchcraft, paganism, and any aspects of the occult to suit their purposes. Symbols mean whatever they want them or believe them to mean. Molesters, rapists, drug dealers, and murderers may dabble in the occult and may even commit their crimes in a ceremonial or ritualistic way. This category has the potential to be the most dangerous, and most of the “satanic” killers fall into this category. Their involvement in satanism and the occult is a symptom of a problem, and a rationalization and justification of antisocial behavior. Satanic/occult practices (as well as those of other spiritual belief systems) can also be used as a mechanism to facilitate criminal objectives.

TRADITIONAL (ORTHODOX)

“These are the so-called true believers. They are often wary of outsiders. Because of this and constitutional issues, such groups are difficult for law enforcement to penetrate. Although there may be much we don’t know about these groups, as of now there is little or no hard evidence that as a group they are involved in serious, organized criminal activity. In addition, instead of being self- perpetuating master crime conspirators, “true believers” probably have a similar problem with their teenagers rebelling against their belief system. To some extent even these Traditional satanists are self-stylized. They practice what they have come to believe is “satanism”. There is little or no evidence of the much-discussed multigenerational satanists whose beliefs and practices have supposedly been passed down through the centuries. Many admitted adult satanists were in fact raised in conservative Christian homes”.

_Washington Post_ editor Walt Harrington reported in a 1986 story on Anton LaVey and his Church of Satan that “sociologists who have studied LaVey’s church say that its members often had serious childhood problems like alcoholic parents or broken homes, or that they were traumatized by guilt-ridden fundamentalist upbringings, turning to Satanism as a dramatic way to purge their debilitating guilt”. (p. 14.)

Some have claimed that the accounts of ritual abuse victims coincide with historical records of what traditional or multigenerational satanists are known to have practiced down through the ages. Jeffrey Burton Russell, Professor of History at the University of California at Santa Barbara and the author of numerous scholarly books on the devil and satanism, believes that the universal consensus of modern historians on satanism is (personal communication, Nov. 1991):

“(1) incidents of orgy, infanticide, cannibalism, and other such conduct have occurred from the ancient world down to the present; (2) such incidents were isolated and limited to local antisocial groups; (3) during the period of Christian dominance in European culture, such groups were associated with the Devil in the minds of the authorities; (4) in some cases the sectaries believed that they were worshiping Satan; (5) no organized cult of Satanists existed in the Christian period beyond localities, and on no account was there ever any widespread Satanist organization or conspiracy; (6) no reliable historical sources indicate that such organizations existed; (7) the black mass appears only once in the sources before the late nineteenth century.”

Many police officers ask what to look for during the search of the scene of suspected satanic activity. The answer is simple: Look for evidence of a crime. A pentagram is no more criminally significant than a crucifix unless it corroborates a crime or a criminal conspiracy. If a victim’s description of the location or the instruments of the crime includes a pentagram, then the pentagram would be evidence. But the same would be true if the description included a crucifix. In many cases of alleged satanic ritual abuse, investigation can find evidence that the claimed offenders are members only of mainstream churches and are often described as very religious.

There is no way any one law enforcement officer can become knowledgeable about all the symbols and rituals of every spiritual belief system that might become part of a criminal investigation. The officer needs only to be trained to recognize the possible investigative significance of such signs, symbols, and rituals. Knowledgeable religious scholars, academics, and other true experts in the community can be consulted if a more detailed analysis is necessary.

Any analysis, however, may have only limited application, especially to cases involving teenagers, dabblers, and other self-styled practitioners. The fact is signs, symbols, and rituals can mean anything that practitioners want them to mean and/or anything that observers interpret them to mean.

The meaning of symbols can also change over time, place, and circumstance. Is a swastika spray-painted on a wall an ancient symbol of prosperity and good fortune, a recent symbol of Nazism and anti-Semitism, or a current symbol of hate, paranoia, and adolescent defiance? The peace sign which in the 1960s was a familiar antiwar symbol is now supposed to be a satanic symbol. Some symbols and holidays become “satanic” only because the antisatanists say they are. Then those who want to be “satanists” adopt them, and now you have “proof” they are satanic.

In spite of what is sometimes said or suggested at law enforcement training conferences, police have no authority to seize any satanic or occult paraphernalia they might see during a search. A legally- valid reason must exist for doing so. It is not the job of law enforcement to prevent satanists from engaging in noncriminal teaching, rituals, or other activities.

INVESTIGATING MULTIDIMENSIONAL CHILD SEX RINGS

Multidimensional child sex rings can be among the most difficult, frustrating, and complex cases that any law enforcement officer will ever investigate. The investigation of allegations of recent activity from multiple young children under the age of seven presents one set of problems and must begin quickly, with interviews of all potential victims being completed as soon as possible. The investigation of allegations of activity ten or more years earlier from adult survivors presents other problems and should proceed, unless victims are at immediate risk, more deliberately, with gradually-increasing resources as corroborated facts warrant.

In spite of any skepticism, allegations of ritual abuse should be aggressively and thoroughly investigated. This investigation should attempt to corroborate the allegations of ritual abuse. but should simultaneously also attempt to identify alternative explanations. The only debate is over how much investigation is enough. Any law enforcement agency must be prepared to defend and justify its actions when scrutinized by the public, the media, elected officials, or the courts. This does not mean, however, that a law enforcement agency has an obligation to prove that the alleged crimes did not occur. This is almost always impossible to do and investigators should be alert for and avoid this trap.

One major problem in the investigation of multidimensional child sex rings is the dilemma of recognizing soon enough that you have one. Investigators must be alert for cases with the potential for the four basic dynamics: (a) multiple young victims, (b) multiple offenders, (c) fear as the controlling tactic, and (d) bizarre or ritualistic activity. The following techniques apply primarily to the investigation of such multidimensional child sex rings:

MINIMIZE SATANIC/OCCULT ASPECT

There are those who claim that one of the major reasons more of these cases have not been successfully prosecuted is that the satanic/occult aspect has not been aggressively pursued. One state has even introduced legislation creating added penalties when certain crimes are committed as part of a ritual or ceremony. A few states have passed special ritual crime laws. I strongly disagree with such an approach. It makes no difference what spiritual belief system was used to enhance and facilitate or rationalize and justify criminal behavior. It serves no purpose to “prove” someone is a satanist. As a matter of fact, if it is alleged that the subject committed certain criminal acts under the influence of or in order to conjure up supernatural spirits or forces, this may very well be the basis for an insanity or diminished capacity defense, or may damage the intent aspect of a sexually motivated crime. The defense may very well be more interested in all the “evidence of satanic activity.” Some of the satanic crime “experts” who train law enforcement wind up working or testifying for the defense in these cases.

It is best to focus on the crime and all the evidence to corroborate its commission. Information about local satanic or occult activity is only of value if it is based on specific law enforcement intelligence and not on some vague, unsubstantiated generalities from religious groups. Cases are not solved by decoding signs, symbols, and dates using undocumented satanic crime “manuals.” In one case a law enforcement agency executing a search warrant seized only the satanic paraphernalia and left behind the other evidence that would have corroborated victim statements. Cases are solved by people- and behavior-oriented investigation. Evidence of satanic or occult activity may help explain certain aspects of the case, but even offenders who commit crimes in a spiritual context are usually motivated by power, sex, and money.

KEEP INVESTIGATION AND RELIGIOUS BELIEFS SEPARATE

I believe that one of the biggest mistakes any investigator of these cases can make is to attribute supernatural powers to the offenders. During an investigation a good investigator may sometimes be able to use the beliefs and superstitions of the offenders to his or her advantage. The reverse happens if the investigator believes that the offenders possess supernatural powers. Satanic/occult practitioners have no more power than any other human beings. Law enforcement officers who believe that the investigation of these cases puts them in conflict with the supernatural forces of evil should probably not be assigned to them. The religious beliefs of officers should provide spiritual strength and support for them but should not affect the objectivity and professionalism of the investigation.

It is easy to get caught up in these cases and begin to see “satanism” everywhere. Oversensitization to this perceived threat may cause an investigator to “see” satanism in a crime when it really is not there (quasi-satanism.) Often the eye sees what the mind perceives. It may also cause an investigator not to recognize a staged crime scene deliberately seeded with “satanic clues” in order to mislead the police (pseudo-satanism.) On rare occasions an overzealous investigator or intervenor may even be tempted to plant “evidence of satanism” in order to corroborate such allegations and beliefs. Supervisors need to be alert for and monitor these reactions in their investigators.

LISTEN TO THE VICTIMS

It is not the investigator’s duty to believe the victims; it is his or her job to listen and be an objective fact finder. Interviews of young children should be done by investigators trained and experienced in such interviews. Investigators must have direct access to the alleged victims for interview purposes. Therapists for an adult survivor sometimes want to act as intermediaries in their patient’s interview. This should be avoided if at all possible. Adult survivor interviews are often confusing difficult and extremely time-consuming. The investigator must remember however that almost anything is possible. Most important the investigator must remember that there is much middle ground. Just because one event did happen does not mean that all reported events happened, and just because one event did not happen does not mean that all other events did not happen. Do not become such a zealot that you believe it all nor such a cynic that you believe nothing. Varying amounts and parts of the allegation may be factual. Attempting to find evidence of what did happen is the great challenge of these cases. All investigative interaction with victims must be carefully and thoroughly documented.

ASSESS AND EVALUATE VICTIM STATEMENTS

This is the part of the investigative process in child sexual victimization cases that seems to have been lost. Is the victim describing events and activities that are consistent with law enforcement documented criminal behavior, or that are consistent with distorted media accounts and erroneous public perceptions of criminal behavior? Investigators should apply the “template of probability.” Accounts of child sexual victimization that are more like books, television, and movies (e.g. big conspiracies, child sex slaves, organized pornography rings) and less like documented cases should be viewed with skepticism but thoroughly investigated. Consider and investigate all possible explanations of events. It is the investigator’s job, and the information learned will be invaluable in counteracting the defense attorneys when they raise the alternative explanations.

For example, an adult survivor’s account of ritual victimization might be explained by any one of at least four possibilities: First, the allegations may be a fairly accurate account what actually happened. Second, they may be deliberate lies (malingering,) told for the usual reasons people lie (e.g. money, revenge, jealousy.) Third, they may be deliberate lies (factitious disorder) told for atypical reasons (e.g. attention, forgiveness.) Lies so motivated are less likely to be recognized by the investigator and more likely to be rigidly maintained by the liar unless and until confronted with irrefutable evidence to the contrary. Fourth, the allegations may be a highly inaccurate account of what actually happened, but the victim truly believes it (pseudomemory) and therefore is not lying. A polygraph examination of such a victim would be of limited value. Other explanations or combinations of these explanations are also possible. Only thorough investigation will point to the correct or most likely explanation.

Investigators cannot rely on therapists or satanic crime experts as a shortcut to the explanation. In one case, the “experts” confirmed and validated the account of a female who claimed to be a 15-year- old deaf-mute kidnapped and held for three years by a satanic cult and forced to participate in bizarre rituals before recently escaping. Active investigation, however, determined she was a 27- year-old woman who could hear and speak, who had not been kidnapped by anyone, and who had a lengthy history of mental problems and at least three other similar reports of false victimization. Her “accurate” accounts of what the “real satanists” do were simply the result of having read, while in mental hospitals, the same books that the “experts” had. A therapist may have important insights about whether an individual was traumatized, but knowing the exact cause of that trauma is another matter. There have been cases where investigation has discovered that individuals diagnosed by therapists as suffering from Post-Vietnam Syndrome were never in Vietnam or saw no combat.

Conversely, in another case, a law enforcement “expert” on satanic crime told a therapist that a patient’s accounts of satanic murders in a rural Pacific Northwest town were probably true because the community was a hotbed of such satanic activity. When the therapist explained that there was almost no violent crime reported in the community, the officer explained that that is how you know it is the satanists. If you knew about the murders or found the bodies, it would not be satanists. How do you argue with that kind of logic?

The first step in the assessment and evaluation of victim statements is to determine the disclosure sequence, including how much time has elapsed since disclosure was first made and the incident was reported to the police or social services. The longer the delay, the bigger the potential for problems. The next step is to determine the number and purpose of all prior interviews of the victim concerning the allegations. The more interviews conducted before the investigative interview, the larger the potential for problems. Although there is nothing wrong with admitting shortcomings and seeking help, law enforcement should never abdicate its control over the investigative interview. When an investigative interview is conducted by or with a social worker or therapist using a team approach, law enforcement must direct the process. Problems can also be created by interviews conducted by various intervenors after the investigative interview(s.)

The investigator must closely and carefully evaluate events in the victim’s life before, during, and after the alleged abuse.

EVENTS TO BE EVALUATED BEFORE THE ALLEGED ABUSE INCLUDE:

● Background of victim.

● Abuse of drugs in home.

● Pornography in home.

● Play, television, and VCR habits.

● Attitudes about sexuality in home.

● Extent of sex education in home.

● Activities of siblings.

● Need or craving for attention.

● Religious beliefs and training.

● Childhood fears.

● Custody/visitation disputes.

● Victimization of or by family members.

● Interaction between victims.

EVENTS TO BE EVALUATED DURING THE ALLEGED ABUSE INCLUDE:

● Use of fear or scare tactics.

● Degree of trauma.

● Use of magic deception or trickery.

● Use of rituals.

● Use of drugs.

● Use of pornography.

EVENTS TO BE EVALUATED AFTER THE ALLEGED ABUSE INCLUDE:

● Disclosure sequence.
● Background of prior interviewers.
● Background of parents.
● Co-mingling of victims.
● Type of therapy received.

EVALUATE CONTAGION

Consistent statements obtained from different multiple victims are powerful pieces of corroborative evidence – that is as long as those statements were not “contaminated.” Investigation must carefully evaluate both pre- and post-disclosure contagion, and both victim and intervenor contagion. Are the different victim statements consistent because they describe common experiences or events, or because they reflect contamination or urban legends?

The sources of potential contagion are widespread. Victims can communicate with each other both prior to and after their disclosures. Intervenors can communicate with each other and with victims. The team or cell concepts of investigation are attempts to deal with potential investigator contagion. All the victims are not interviewed by the same individuals, and interviewers do not necessarily share information directly with each other. Teams report to a leader or supervisor who evaluates the information and decides what other investigators need to know.

Documenting existing contagion and eliminating additional contagion are crucial to the successful investigation and prosecution of these cases. There is no way, however, to erase or undo contagion. The best you can hope for is to identify and evaluate it and attempt to explain it. Mental health professionals requested to evaluate suspected victims must be carefully selected. Having a victim evaluated by one of the self-proclaimed experts on satanic ritual abuse or by some other overzealous intervenor may result in the credibility of that victim’s testimony being severely damaged.

In order to evaluate the contagion element, investigators must meticulously and aggressively investigate these cases. The precise disclosure sequence of the victim must be carefully identified and documented. Investigators must verify through active investigation the exact nature and content of each disclosure outcry or statement made by the victim. Second-hand information about disclosure is not good enough.

Whenever possible, personal visits should be made to all locations of alleged abuse and the victim’s homes. Events prior to the alleged abuse must be carefully evaluated. Investigators may have to view television programs, films, and videotapes seen by the victims. It may be necessary to conduct a background investigation and evaluation of everyone, both professional and nonprofessional, who interviewed the victims about the allegations prior to and after the investigative interview(s.)

Investigators must be familiar with the information about ritual abuse of children being disseminated in magazines, books, television programs, videotapes, and conferences. Every possible way that a victim could have learned about the details of the abuse must be explored if for no other reason than to eliminate them and counter the defense’s arguments.

There may, however, be validity to these contagion factors. They may explain some of the “unbelievable” aspects of the case and result in the successful prosecution of the substance of the case. Consistency of statements becomes more significant if contagion is identified or disproved by independent investigation. The easier cases are the ones where there is a single, identifiable source of contagion. Most cases, however, seem to involve multiple contagion factors.

Munchausen Syndrome and Munchausen Syndrome by Proxy are complex and controversial issues in these cases. No attempt will be made to discuss them in detail, but they are documented facts (Rosenberg, 1987.) Most of the literature about them focuses on their manifestation in the medical setting as false or self-inflicted illness or injury. They are also manifested in the criminal justice setting as false or self-inflicted crime victimization. If parents would poison their children to prove an illness, they might sexually abuse their children to prove a crime. “Victims” have been known to destroy property, manufacture evidence, and mutilate themselves in order to convince others of their victimization.

The motivation is psychological gain (i.e. attention, forgiveness, etc.) and not necessarily money, jealousy, or revenge. These are the unpopular, but documented, realities of the world. Recognizing their existence does not mean that child sexual abuse and sexual assault are not real and serious problems.

ESTABLISH COMMUNICATION WITH PARENTS

The importance and difficulty of this technique in extrafamilial cases involving young children cannot be overemphasized. An investigator must maintain ongoing communication with the parents of victims in these abuse cases. Not all parents react the same way to the alleged abuse of their children. Some are very supportive and cooperative. Others overreact and some even deny the victimization. Sometimes there is animosity and mistrust among parents with different reactions. Once the parents lose faith in the police or prosecutor and begin to interrogate their own children and conduct their own investigation, the case may be lost forever. Parents from one case communicate the results of their “investigation” with each other, and some have even contacted the parents in other cases. Such parental activity is an obvious source of potential contamination.

Parents must be made to understand that their children’s credibility will be jeopardized when and if the information obtained turns out to be unsubstantiated or false. To minimize this problem, within the limits of the law and without jeopardizing investigative techniques, parents must be told on a regular basis how the case is progressing. Parents can also be assigned constructive things to do (e.g. lobbying for new legislation, working on awareness and prevention programs) in order to channel their energy, concern, and “guilt”.

DEVELOP A CONTINGENCY PLAN

If a department waits until actually confronted with a case before a response is developed, it may be too late. In cases involving ongoing abuse of children, departments must respond quickly, and this requires advanced planning. There are added problems for small- to medium-sized departments with limited personnel and resources. Effective investigation of these cases requires planning, identification of resources, and, in many cases, mutual aid agreements between agencies. The U.S. Department of Defense has conducted specialized training and has developed such a plan for child sex ring cases involving military facilities and personnel. Once a case is contaminated and out of control, I have little advice on how to salvage what may once have been a prosecutable criminal violation. A few of these cases have even been lost on appeal after a conviction because of contamination problems.

MULTIDISCIPLINARY TASK FORCES

Sergeant Beth Dickinson, Los Angeles County Sheriff’s Department, was the chairperson of the Multi-Victim, Multi-Suspect Child Sexual Abuse Subcommittee. Sergeant Dickinson states (personal communication, Nov. 1989):

“One of the biggest obstacles for investigators to overcome is the reluctance of law enforcement administrators to commit sufficient resources early on to an investigation that has the potential to be a multidimensional child sex ring. It is important to get in and get on top of the investigation in a timely manner – to get it investigated in a timely manner in order to assess the risk to children and to avoid hysteria, media sensationalism, and cross- contamination of information. The team approach reduces stress on individual investigators, allowing for peer support and minimizing feelings of being overwhelmed.”

The team approach and working together does not mean, however, that each discipline forgets its role and starts doing the other’s job.

SUMMARY

The investigation of child sex rings can be difficult and time consuming. The likelihood, however, of a great deal of corroborative evidence in a multivictim/multioffender case increases the chances of a successful prosecution if the crime occurred. Because there is still so much we do not know or understand about the dynamics of multidimensional child sex rings, investigative techniques are less certain. Each new case must be carefully evaluated in order to improve investigative procedures.

Because mental health professionals seem to be unable to determine, with any degree of certainty, the accuracy of victim statements in these cases, law enforcement must proceed using the corroboration process. If some of what the victim describes is accurate, some misperceived, some distorted, and some contaminated, what is the jury supposed to believe? Until mental health professionals can come up with better answers, the jury should be asked to believe what the investigation can corroborate. Even if only a portion of what these victims allege is factual, that may still constitute significant criminal activity.

CONCLUSION

There are many possible alternative answers to the question of why victims are alleging things that don’t seem to be true. The first step in finding those answers is to admit the possibility that some of what the victims describe may not have happened. Some experts seem unwilling to even consider this. Most of these victims are also probably not lying and have come to believe that which they are alleging actually happened. There are alternative explanations for why people who never met each other can tell the same story.

I believe that there is a middle ground – a continuum of possible activity. Some of what the victims allege may be true and accurate, some may be misperceived or distorted, some may be screened or symbolic, and some may be “contaminated” or false. The problem and challenge, especially for law enforcement, is to determine which is which. This can only be done through active investigation. I believe that the majority of victims alleging “ritual” abuse are in fact victims of some form of abuse or trauma. That abuse or trauma may or may not be criminal in nature. After a lengthy discussion about various alternative explanations and the continuum of possible activity, one mother told me that for the first time since the victimization of her young son she felt a little better. She had thought her only choices were that either her son was a pathological liar or, on the other hand, she lived in a community controlled by satanists.

Law enforcement has the obvious problem of attempting to determine what actually happened for criminal justice purposes. Therapists, however, might also be interested in what really happened in order to properly evaluate and treat their patients. How and when to confront patients with skepticism is a difficult and sensitive problem for therapists.

Any professional evaluating victims’ allegations of “ritual” abuse cannot ignore or routinely dismiss the lack of physical evidence (no bodies or physical evidence left by violent murders); the difficulty in successfully committing a large-scale conspiracy crime (the more people involved in any crime conspiracy, the harder it is to get away with it); and human nature (intragroup conflicts resulting in individual self-serving disclosures are likely to occur in any group involved in organized kidnapping, baby breeding, and human sacrifice.) If and when members of a destructive cult commit murders, they are bound to make mistakes, leave evidence, and eventually make admissions in order to brag about their crimes or to reduce their legal liability. The discovery of the murders in Matamoros, Mexico in 1989 and the results of the subsequent investigation are good examples of these dynamics.

Overzealous intervenors must accept the fact that some of their well-intentioned activity is contaminating and damaging the prosecutive potential of the cases where criminal acts did occur. We must all (i.e., the media, churches, therapists, victim advocates, law enforcement, and the general public) ask ourselves if we have created an environment where victims are rewarded, listened to, comforted, and forgiven in direct proportion to the severity of their abuse. Are we encouraging needy or traumatized individuals to tell more and more outrageous tales of their victimization? Are we making up for centuries of denial by now blindly accepting any allegation of child abuse no matter how absurd or unlikely?

Are we increasing the likelihood that rebellious, antisocial, or attention- seeking individuals will gravitate toward “satanism” by publicizing it and overreacting to it? The overreaction to the problem can be worse than the problem.

The amount of “ritual” child abuse going on in this country depends on how you define the term. One documented example of what I might call “ritual” child abuse was the horror chronicled in the book _A Death in White Bear Lake_ (Siegal, 1990.) The abuse in this case, however, had little to do with anyone’s spiritual belief system. There are many children in the United States who, starting early in their lives, are severely psychologically, physically, and sexually traumatized by angry, sadistic parents or other adults. Such abuse, however, is not perpetrated only or primarily by satanists. The statistical odds are that such abusers are members of mainstream religions. If 99.9% of satanists and 0.1% of Christians abuse children as part of their spiritual belief system, that still means that the vast majority of children so abused were abused by Christians.

Until hard evidence is obtained and corroborated, the public should not be frightened into believing that babies are being bred and eaten, that 50,000 missing children are being murdered in human sacrifices, or that satanists are taking over America’s day care centers or institutions. No one can prove with absolute certainty that such activity has notoccurred. The burden of proof, however, as it would be in a criminal prosecution, is on those who claim that it has occurred.

The explanation that the satanists are too organized and law enforcement is too incompetent only goes so far in explaining the lack of evidence. For at least eight years American law enforcement has been aggressively investigating the allegations of victims of ritual abuse. There is little or no evidence for the portion of their allegations that deals with large-scale baby breeding, human sacrifice, and organized satanic conspiracies. Now it is up to mental health professionals, not law enforcement, to explain why victims are alleging things that don’t seem to have happened. Professionals in this field must accept the fact that there is still much we do not know about the sexual victimization of children, and that this area desperately needs study and research by rational, objective social scientists.

If the guilty are to be successfully prosecuted, if the innocent are to be exonerated, and if the victims are to be protected and treated, better methods to evaluate and explain allegations of “ritual” child abuse must be developed or identified. Until this is done, the controversy will continue to cast a shadow over and fuel the backlash against the validity and reality of child sexual abuse.

REFERENCES

American Psychiatric Association, _Diagnostic and Statistical Manual of Mental Disorders_ (3rd Ed., Rev.) Washington, DC: 1987.
Breiner, S.J., _Slaughter of the Innocents: Child Abuse Through the Ages and Today_. New York: Plenum Press, 1990.
Brown, R., _Prepare for War_.
Chino, CA: Chick Publications, 1987.
Brunvand, J.H., _The Vanishing Hitchhiker_. New York: Norton, 1981.
Harrington, Walt, “The Devil in Anton LaVey.” Washington, D.C.: _The Washington Post Magazine_, February 23, 1986, pages #6-17.
Lanning, K.V., _Child Molesters: A Behavioral Analysis_ (2nd Ed.)
Washington, D.C.: National Center for Missing and Exploited Children, 1987.
Lanning, K.V. (1989.) Child sex rings: A behavioral analysis. Washington,
DC: National Center for Missing and Exploited Children.
LaVey, Anton, _The Satanic Bible_. New York: Avon Books, 1969.
Mayer, R.S., _Satan’s Children_. New York: Putnam, 1991.
Michigan Department of State Police, _Occult Survey_. East Lansing, Michigan, 1990.
_National Coalition on Television Violence (NCTV) News_, June- October 1988, page #3.
_National Incidence Studies on Missing, Abducted, Runaway, and Thrownaway Children in America_. Washington, D.C.: U.S. Department of Justice, 1990.
Prattanis, A., “Hidden messages,” _Wellness Letter_. Berkeley, California:
University of California, January 1991, pages #1-2.
Rosenberg, D.A., “Web of Deceit: A Literature Review of Munchausen Syndrome
by Proxy, ” _Child Abuse and Neglect_ #2, 1987, pages #547- 563.
Rush, E., _The Best Kept Secret: Sexual Abuse of Children_. New York: McGraw-Hill, 1980.
Smith, M., & Pazder, L., _Michelle Remembers_. New York: Congdon and Lattis, 1980.
Siegal, B., _A Death in White Bear Lake_. New York: Bantam, 1990.
“Stranger-Abduction Homicides of Children,” _Juvenile Justice Bulletin_.
Washington, D.C.: U. S. Department of Justice, 1989.
Stratford. L., _Satan’s Underground_. Eugene, Oregon: Harvest House, 1988.
Terr, L., _Too Scared to Cry_. New York: Harper & Row, 1990.
Timnik, L., “The Times Poll,” _Los Angeles Times_, August 25-26, 1985.
Virginia Crime Commission Task Force, _Final Report of the Task Force Studying Ritual Crime_. Richmond, Virginia.

SUGGESTED READING:

— a. Cooper, John Charles, _The Black Mask: Satanism in America Today_. Old Tappen, N.J.: Fleming H. Revell Company, 1990. Probably the best of the large number of books available primarily in Christian bookstores and written from the Christian perspective. This one, however, is written without the hysteria and sensationalism of most. Recommended for investigators who want information from this perspective.

— b. Hicks, Robert D., _In Pursuit of Satan: The Police and the Occult_. Buffalo, NY: Prometheus Books, 1991. Undoubtedly the best book written to date on the topic of satanism and the occult from the law enforcement perspective. Robert D. Hicks is a former police officer who is currently employed as a criminal justice analyst for the state of Virginia. Must reading for any criminal justice professional involved in this issue. Unfortunately, in the chapter on “Satanic Abuse of Children,” the author appears to have been overly influenced by extreme skeptics with minimal or questionable credentials in this area. The book is easy to read, logical, and highly recommended.

— c. Richardson, James T.; Best, Joel; & Bromley, David G.; Eds, _The Satanism Scare_. NY: Aldine de Gruyter, 1991. The best book now available on the current controversy over satanism written from the academic perspective, The editors and many of the chapter authors are college professors and have written an objective, well-researched book. One of the great strengths of this book is the fact that the editors address a variety of the controversial issues from a variety of disciplines (i.e., sociology, history, folklore, anthropology, criminal justice.) Because of its academic perspective it is sometimes harder to read but is well worth the effort.
The chapter on “Law Enforcement and the Satanic Crime Connection” contains the results of a survey of “Cult Cops” and is must reading for law enforcement officers. The chapter on “Satanism and Child Molestation: Constructing the Ritual Abuse Scare” was written, however, by a free-lance journalist who seems to take the position that these cases involve little or no real child abuse.

— d. Terr, Lenore, _Too Scared to Cry: Psychic Trauma in Childhood_. New York: Harper and Row, 1990. An excellent book written by a psychiatrist that provides important insights into the nature and recallability of early psychic trauma. For me, Dr. Terr’s research and findings in the infamous Chowchilla kidnapping case shed considerable light on the “ritual” abuse controversy.

 


BELOW IS THE SOURCE LINK TO THE ORIGINAL ARTICLE:

https://www.cultwatch.com/satanicabuse.html


_Tags:_
#SatanticRitualAbuse

_

______________________________________________

DEEPSTATE—IS CREATING A NEW WORLD ORDER.. ..ONE REGION AT A TIME..

DEEPSTATE—IS CREATING
A NEW WORLD ORDER..
..ONE REGION AT A TIME..


The Deep State’s globalist plan for what insiders refer to as the “New World Order” — basically, a global government controlled by themselves — begins with submerging the sovereignty of nation-states into regional “orders”.

These are better understood as regional governments built using “free trade” deals as the foundation, with the European Union serving as the premier example. How do we know this is the plan? Because top Deep State globalists have said so publicly and repeatedly, and because that is the exact strategy being pursued openly.

All over the world, pseudo-“free trade” agreements and other sovereignty-shredding schemes are being used to transfer more and more power to transnational bureaucracies and courts.

And eventually, these regional orders will be interwoven into an overlapping patchwork of multilateral regimes on the road to creating a truly global authority, perhaps under the United Nations or some less-discredited future global body. At least, that is the glob­alist plan. But it is starting to show major cracks amid historic public backlash.

As far back as 1950, globalists had openly revealed their agenda for global government under the United Nations. In his book War or Peace, for example, global government-promoting Council on Foreign Relations co-founder John Foster Dulles spelled it out clearly.

“The United Nations represents not a final stage in the development of world order, but only a primitive stage”, Dulles wrote.

“Therefore its primary task is to create the conditions which will make possible a more highly developed organization”.

In the same book, Dulles went on to argue that the existing UN Charter was strong enough to serve as the foundation for a world government.

“I have never seen any proposal made for collective security with ‘teeth’ in it, or for ‘world government’ or for ‘world federation,’ which could not be carried out either by the United Nations or under the United Nations Charter”, he said.

Unfortunately for globalists, though, humanity was not yet ready to surrender its sovereignty to an all-powerful world government. Thus, regionalization.

In a 1962 report headlined “A World Effectively Controlled by the United Nations”, financed by the U.S. State Department, CFR member and longtime State Department official Lincoln Bloomfield argued that global government could be brought about via regionalism.

In the plan, he proposed that “ever larger units evolve through customs unions, confederation, regionalism, etc., until ultimately the larger units coalesce under a global umbrella”. Sound familiar?

Of course, that is precisely the strategy that has been used, primarily relying on “free-trade” schemes — in addition to going to war and threatening war, other key tactics highlighted in the Bloomfield report.

By 1974, almost a quarter of a century after CFR founder Dulles wrote his infamous book, the globalist organization’s mouthpiece, the magazine dubbed Foreign Affairs, was telegraphing its strategy of globalism via incrementalism to globalist insiders and useful idiots everywhere.

“In short, the ‘house of world order’ will have to be built from the bottom up rather than from the top down”, wrote former Deputy Assistant Secretary of State Richard N. Gardner in April of 1974. “An end run around national sovereignty, eroding it piece by piece, will accomplish much more than the old-fashioned frontal assault”.

In short, globalists recognized the reality that people were not willing to relinquish control over their own nations and their own destinies all at once. Instead, the plan would have to be pursued slowly, quietly, and deceptively.

And so, piece by piece, sovereignty was eroded using tools such as “free trade”, international agreements, regional military alliances such as the North Atlantic Treaty Organization (NATO), and more. Central to the plot was convincing nations and peoples to surrender sovereignty not to some global government-in-waiting right away, but to regional organizations.

Consider former National Security Advisor Zbigniew Brzezinski, a longtime ‘CFR’, member and one of the key figures behind globalist mastermind David Rockefeller’s Trilateral Commission.

In 1995, speaking at former Soviet dictator Mikhail Gorbachev’s “State of the World Forum”, attended by The New American magazine’s senior editor William F. Jasper, Brzezinski outlined the plan clearly, perhaps assuming he was speaking just to fellow globalists and friends.

“We cannot leap into world government in one quick step”, he said. “In brief, the precondition for eventual globalization — genuine globalization — is progressive regionalization, because thereby we move toward larger, more stable, more cooperative units”.

Also in 1995, the UN-created “Commission on Global Governance” — yes, it really was called the “Commission on Global Governance” — outlined precisely the same strategy in its “Our Global Neighborhood” report.

“The UN must gear itself for a time when regionalism becomes more ascendant worldwide and assist the process in advance of that time”, wrote the globalists on the UN commission, foreshadowing the strategy that was about to go into overdrive.

“Regional co-operation and integration should be seen as an important and integral part of a balanced system of global governance”.
REGIONAL GOVERNMENTS EVERYWHERE

This regionalization and “integration” as a steppingstone toward globalization of political and economic power is exactly what is happening worldwide.
HERE ARE SOME OF THE MORE PROMINENT EXAMPLES — it is in no way an exhaustive list:
• EUROPEAN UNION:
The EU is by far the most developed supranational regime in the world, with former Soviet dictator Mikhail Gorbachev approvingly describing it as “the new European Soviet” during a 2000 visit to Britain.

Originally, it started as a “Coal and Steel” agreement between six nations after World War II. With key support of Deep State
institutions such as
Bilderberg, the CFR, the Central Intelligence Agency (CIA), and more, it gradually usurped more and more power under the guise of “free trade”.

Over the decades, it morphed into the European Economic Community, the European Community, and finally, the European Union. By 2012, then-EU Commission President José Manuel Barroso, a former Maoist revolutionary, was boasting of the machinations that The New American had been warning of for decades, a plot that globalists had generally denied as the EU was forming.

“We will need to move toward a federation”, he said. “This is our political horizon”.

Today, the EU has a single currency, a law-enforcement agency, a proto-continental military, and much more. Brussels, where the monster is headquartered, has stolen more power than even the U.S. federal government has taken from U.S. states in some areas, purporting to have the authority to veto national budgets passed by member states’ elected parliaments.

Despite being opposed by citizens in referendums at virtually every turn, the EU is still working to become “deeper” by usurping more power, and “wider” by adding more and more members. It is also working to export its globalist model of total centralized power to other regions of the world.
• AFRICAN UNION:
The AU is another one of the more advanced regional unions smashing national sovereignty and imposing unelected, supranational rulers on diverse peoples. Already, the AU has a “Parliament”, a military, a “Court of Justice”, and more.

It is working on a continental currency, too. Because Africa is so vast and undeveloped, the globalist overlords are actually using the same plan they are pursuing at the global level to subsume nation-states, but on a continental scale.

Consider the emerging “Tripartite Free Trade Area”. Under the plan, various “free trade” areas on the African continent are to eventually be merged into a single, continent-wide “free trade” regime with open borders from Cape Town to Cairo, and a single African passport.

For a sneak preview of the future under this regional regime, consider that genocidal Marxist dictator Robert Mugabe was made chairman of the AU before being overthrown by his own military.

And of course, it is an undisputed fact that outsiders — primarily the U.S. government, the EU, and the dictatorship enslaving China — are funding and imposing the AU on Africans. Beijing built the AU headquarters. The EU, meanwhile, funds more than 80 percent of the AU’s program budget.
• UNION OF SOUTH AMERICAN STATES:
In South America, globalists and communists have foisted on the peoples an emerging superstate known as UNASUL or UNASUR, depending on the language.

Inspired by the EU, the forces behind this sovereignty-shredding scheme envision a United States of South America, complete with a South American military, currency, parliament, and more.

Until recent disagreements over the brutal socialist dictatorship enslaving Venezuela caused some member states to temporarily suspend their participation, the socialist- and communist-dominated supranational body was quickly usurping a vast array of powers from member states.

And as is the case in other parts of the world being subsumed under regional governments, UNASUL / UNASUR is merely one of a vast constellation of supranational institutions in Latin America working to “integrate” the formerly sovereign nation-states into a “regional order,” to be followed by the “world order.”

Others include MERCOSUR, the Bolivarian Alliance for the Peoples of Our America (ALBA), the Community of Latin American and Caribbean States (CELAC), and many others.
• EURASIAN UNION:
In “Eurasia,” Russian strongman Vladimir Putin is spearheading the creation of what is currently known as the Eurasian Economic Union, or EEU. It brings together Russia, Belarus, Kazakhstan, Armenia, and Kyrgyzstan, with other countries being inducted.

Eventually, they hope to expand the union to include other former Soviet states, particularly from the Commonwealth of Independent States (CIS).

“It took Europe 40 years to move from the European Coal and Steel Community to the full European Union,” Putin observed in an op-ed for Izvestia, adding that the Eurasian Union is “proceeding at a much faster pace because we could draw on the experience of the EU and other regional associations.”

The harmonized Eurasian regulatory regime is “in most cases consistent with European standards,” he added, noting that it was “based on World Trade Organization principles,” while promising that the union would “help ensure global sustainable development.”

Putin noted that eventually, the EU and the Eurasian Union could create a “harmonized community of economies stretching from Lisbon to Vladivostok, a free trade zone and even employing more sophisticated integration patterns” that would pursue “coordinated policies in industry, technology, the energy sector, education, science, and also to eventually scrap visas”.

Ultimately, “existing regional institutions, such as the EU, NAFTA, APEC, ASEAN inter alia”, would become “the integration bricks that can be used to build a more sustainable global economy”. Top EU leaders have echoed that rhetoric exactly. Note the reference to NAFTA, too.

Around the world, there is a dizzying array of other “integration” schemes working to amalgamate once-sovereign nation-states into regional unions. For instance, in the Middle East, the already functioning Gulf Cooperation Council is becoming a supranational regime over the nations of the Arabian Peninsula.

Meanwhile, globalists from the CFR and beyond are working to put the entire region under what they tout as a “Middle East Union”.

“Just as a warring [European] continent found peace through unity by creating what became the EU, Arabs, Turks, Kurds and other groups in the region could find relative peace in ever closer union,” claimed Mohamed “Ed” Husain, an “adjunct senior fellow for Middle Eastern studies” at the CFR, in a 2014 piece published in the Financial Times.

In South East Asia, the “Association of South East Asian Nations,” more commonly known as ASEAN, is doing the same.

In North America, globalist architect Henry “New World Order” Kissinger described NAFTA, which set up international tribunals and bureaucracies, as “the most creative step toward a new world order taken by any group of countries since the end of the Cold War”.
WORLDWIDE DECEPTION

There is no populated region on Earth not being subsumed under regional government right now. Obviously, the notion that people all around the world just woke up one day seeking to surrender sovereignty to a regional government is ludicrous. It was all by design, of course. But all along, those responsible were deceiving the public.

For instance, while shackling the United Kingdom to the emerging European superstate, then-British Prime Minister Edward Heath blatantly lied.

“There are some in this country who fear that in going into Europe we shall in some way sacrifice independence and sovereignty”, Heath said in a January 1973 prime ministerial TV broadcast. “These fears, I need hardly say, are completely unjustified”.

Of course, not only were those concerns completely justified, they underestimated the subversion of sovereignty that would be taking place.

By 2016, the British people had wised up, with more people voting to secede from the EU with Brexit than have ever voted for anything in U.K. history. Globalists are now doing everything possible to overturn the vote, again using deception.

Almost three decades after Heath’s lies, in a July 13, 2000 interview with the newspaper La Stampa, then-Italian Prime Minister Giuliano Amato outlined the strategy of deception.

“The Union is the vanguard of this changing world: it indicates a future of princes without sovereignty,” he said.

“The new entity is faceless and those who are in command can neither be pinned down nor elected…. That is the way Europe was made too: by creating communitarian organisms without giving the organisms presided over by national governments the impression that they were being subjected to a higher power….

“I don’t think it is a good idea to replace this slow and effective method — which keeps national States free from anxiety while they are being stripped of power — with great institutional leaps. Therefore I prefer to go slowly, to crumble pieces of sovereignty up little by little, avoiding brusque transitions from national to [EU] federal power”.

Must-read: The Complete History of the Freemasonry and the Creation of the New World Order
GLOBAL MERGER OF REGIONS

Globalists have been getting bolder in recent years, speaking openly of their machinations and intentions. For instance, former National Security Advisor and Secretary of State Henry Kissinger outlined the same plot to advance globalism as his co-conspirator
Brzezinski did two decades earlier at Gorbachev’s confab, just more openly.

“The contemporary quest for world order will require a coherent strategy to establish a concept of order within the various regions and to relate these regional orders to one another”, Kissinger explained in an excerpt from his book World Order that appeared on August 29, 2014, under the headline “Henry Kissinger on the Assembly of a New World Order” in the Wall Street Journal.

Calling for a “structure of international rules and norms” that is “fostered as
a matter of common conviction”, he praised, in particular, developments on the other side of the Atlantic.

“Europe has set out to transcend the state”, Kissinger said. Despite the use of opaque and sterile language, it is clear that Kissinger was calling for the world’s nations and peoples to be divided up into “regional orders” as a prelude to the “New World Order” finale.

And as the EU works to transcend the nation-state at home, it is working simultaneously to do the same worldwide, including in North America. In a revealing document released in June 2016, the EU actually vowed to “support cooperative regional orders worldwide”, including in the Americas, while touting global governance composed of regional governments based on a “strong UN”.

“We will invest in regional orders, and in cooperation among and within regions,” the superstate declared in its “Global Strategy” document, echoing almost precisely the schemes outlined by Kissinger in his book World Order. “And we will promote reformed global governance…. The EU will strive for a strong UN as the bedrock of the multilateral rules-based order”.

Ironically, the EU document acknowledges that people are upset with the globalist agenda. Indeed, the EU “Global Strategy” document was released just five days after Brexit sent shock waves through the globalist movement worldwide.

But the official document goes on to suggest that surreptitiously undermining self-government around the world to build regional governments is all for the good of humanity, and so it must be pursued anyway.

“In a world caught between global pressures and local pushback, regional dynamics come to the fore”, the document argued.

“Voluntary forms of regional governance offer states and peoples the opportunity to better manage security concerns, reap the economic gains of globalization, express more fully cultures and identities, and project influence in world affairs”.

Eventually, as Kissinger and others explained, after these regional governments are in full control, the plan is to begin merging them with each other in overlapping regional governments, again using “trade” as the pretext.

The Transatlantic Trade and Investment Partnership, for example, was aimed at bringing the EU and North America together under transatlantic bureaucracies, a longtime globalist goal that has been worked on for generations. This transatlantic union would then create regulations and supranational kangaroo courts over more than half of global GDP.

On the other side of the United States, the Trans-Pacific Partnership did virtually the same thing. Taken together, the supranational regulatory regime that would emerge from the “trade” regimes would govern virtually the entire global economy, with even nations that were not technically under its thumb being forced to submit just to continue participating in trade.

If the American people do not actively oppose these plans en masse, the result will be the end of self-government, liberty, prosperity, and Western Christian civilization.

This article originally appeared in the November 19, 2018 print edition of The New American. The New American publishes a print magazine twice a month, covering issues such as politics, money, foreign policy, environment, culture, and technology.


Przetłumaczone na polski poniżej:

Translated into Polish below:


DEEPSTATE — TWORZY
NOWE ZAMÓWIENIE ŚWIATA…. JEDEN REGION NA CZAS..

Globalistyczny plan Głębokiego Państwa dotyczący tego, co wtajemniczeni nazywają „Nowym Porządkiem Światowym” – w zasadzie globalnym rządem kontrolowanym przez nich samych – zaczyna się od zanurzenia suwerenności państw narodowych w regionalne „porządki”.

Są one lepiej rozumiane jako rządy regionalne zbudowane na podstawie umów o „wolnym handlu”, przy czym Unia Europejska jest najlepszym przykładem. Skąd wiemy, że to jest plan? Ponieważ najlepsi globaliści z głębokiego stanu mówili to publicznie i wielokrotnie, i ponieważ jest to dokładnie taka strategia, którą stosuje się otwarcie.

Na całym świecie pseudo-„wolny handel” i inne programy niszczenia suwerenności są wykorzystywane do przekazywania coraz większej władzy ponadnarodowej biurokracji i sądom.

Ostatecznie te regionalne porządki zostaną wplecione w nakładającą się mozaikę wielostronnych reżimów na drodze do stworzenia prawdziwie globalnego autorytetu, być może w ramach Organizacji Narodów Zjednoczonych lub jakiegoś mniej zdyskredytowanego przyszłego globalnego organu. Przynajmniej taki jest plan globalistyczny. Ale zaczyna pojawiać się poważne pęknięcia wśród historycznego publicznego sprzeciwu.

Już w 1950 r. Globaliści otwarcie ujawnili swój program globalnego rządu w ramach Organizacji Narodów Zjednoczonych. Na przykład w swojej książce Wojna lub pokój, współzałożyciel globalnej organizacji promującej rząd Rady Stosunków Zagranicznych, John Foster Dulles, jasno to wyraził.

„Organizacja Narodów Zjednoczonych nie stanowi ostatniego etapu rozwoju porządku światowego, lecz jedynie prymitywny etap”, napisał Dulles.

„Dlatego jego podstawowym zadaniem jest stworzenie warunków, które umożliwią bardziej rozwiniętą organizację”.

W tej samej książce Dulles dalej argumentował, że istniejąca Karta Narodów Zjednoczonych była wystarczająco silna, aby służyć jako podstawa dla rządu światowego.

„Nigdy nie spotkałem się z żadną propozycją zbiorowego bezpieczeństwa z„ zębami ”,„ rządem światowym ”lub„ federacją światową ”, która nie mogłaby zostać zrealizowana ani przez ONZ, ani na mocy Karty Narodów Zjednoczonych”, powiedział.

Niestety dla globalistów ludzkość nie była jeszcze gotowa oddać swojej suwerenności wszechmocnemu rządowi światowemu. Tak więc regionalizacja.

W raporcie z 1962 r. Zatytułowanym „Świat skutecznie kontrolowany przez ONZ”, finansowanym przez Departament Stanu USA, członka CFR i długoletniego urzędnika Departamentu Stanu, Lincolna Bloomfielda, argumentowano, że globalny rząd można osiągnąć poprzez regionalizm.

W planie zaproponował, aby „coraz większe jednostki ewoluowały przez związki celne, konfederację, regionalizm itd., Aż ostatecznie większe jednostki zlewały się pod globalnym parasolem”. Brzmi znajomo?

Oczywiście jest to właśnie strategia, która została zastosowana, polegająca przede wszystkim na programach „wolnego handlu” – oprócz wojny i groźby wojny, inne kluczowe taktyki podkreślone w raporcie Bloomfielda.

W 1974 roku, prawie ćwierć wieku po tym, jak założyciel CFR Dulles napisał swoją niesławną książkę, rzecznik organizacji globalistycznej, czasopismo zwane sprawami zagranicznymi, telegrafował swoją strategię globalizmu poprzez inkrementalizm do globalistów i przydatnych idiotów na całym świecie.

„Krótko mówiąc,„ dom porządku światowego ”będzie musiał być budowany oddolnie, a nie odgórnie”, napisał były zastępca sekretarza stanu Richard N. Gardner w kwietniu 1974 roku. suwerenność, niszcząc ją kawałek po kawałku, osiągnie znacznie więcej niż staromodny atak frontalny ”.

Krótko mówiąc, globaliści zdali sobie sprawę z faktu, że ludzie nie byli skłonni zrzec się kontroli nad własnymi narodami i przeznaczeniem naraz. Zamiast tego plan musiał być realizowany powoli, cicho i zwodniczo.

I tak, kawałek po kawałku, suwerenność została zniszczona przy użyciu narzędzi takich jak „wolny handel”, umowy międzynarodowe, regionalne sojusze wojskowe, takie jak Organizacja Traktatu Północnoatlantyckiego (NATO) i inne. Centralnym punktem spisku było przekonanie narodów i narodów do poddania się suwerenności nie od niektórych globalnych rządów oczekujących od razu, ale od organizacji regionalnych.

Zastanówmy się nad byłym doradcą ds. Bezpieczeństwa narodowego Zbigniewem Brzezińskim, wieloletnim „CFR”, członkiem i jedną z kluczowych postaci stojącej za globalnym szefem Trójstronnej Komisji Davida Rockefellera.

W 1995 r., Przemawiając na forum byłego sowieckiego dyktatora Michaiła Gorbaczowa „State of the World Forum”, w którym wziął udział starszy redaktor magazynu New American William F. Jasper, Brzeziński wyraźnie nakreślił plan, być może zakładając, że rozmawia tylko z innymi globalistami i przyjaciółmi.

„Nie możemy wskoczyć do rządu światowego jednym szybkim krokiem”, powiedział. „W skrócie, warunkiem ostatecznej globalizacji – prawdziwej globalizacji – jest postępująca regionalizacja, ponieważ w ten sposób dążymy do większych, bardziej stabilnych i bardziej kooperatywnych jednostek”.

Również w 1995 r. Utworzona przez ONZ „Komisja ds. Globalnego zarządzania” – tak, naprawdę nazywała się „Komisją ds. Globalnego zarządzania” – nakreśliła dokładnie tę samą strategię w swoim raporcie „Nasze globalne sąsiedztwo”.

„ONZ musi przygotować się na czas, gdy regionalizm stanie się bardziej powszechny na całym świecie i wspomóc ten proces z wyprzedzeniem w tym czasie”, napisali globaliści w komisji ONZ, zapowiadając strategię, która miała wkrótce nadejść.

„Współpraca regionalna i integracja powinny być postrzegane jako ważna i integralna część zrównoważonego systemu globalnego zarządzania”.
RZĄDY REGIONALNE WSZĘDZIE

Ta regionalizacja i „integracja” jako krok w kierunku globalizacji władzy politycznej i gospodarczej jest dokładnie tym, co dzieje się na całym świecie.
TUTAJ JEST NIEKTÓRE Z WIĘCEJ PRZYKŁADOWYCH PRZYKŁADÓW – nie jest to w żaden sposób wyczerpująca lista:
• UNIA EUROPEJSKA:
UE jest zdecydowanie najbardziej rozwiniętym reżimem ponadnarodowym na świecie, a były sowiecki dyktator Michaił Gorbaczow aprobująco określa ją jako „nową europejską sowiecką” podczas wizyty w Wielkiej Brytanii w 2000 roku.

Pierwotnie zaczęło się jako umowa „Węgla i stali” między sześcioma narodami po II wojnie światowej. Przy kluczowym wsparciu Deep State
instytucje takie jak
Bilderberg, CFR, Centralna Agencja Wywiadowcza (CIA) i więcej, stopniowo uzurpowała sobie coraz więcej władzy pod pozorem „wolnego handlu”.

Przez dziesięciolecia przekształciła się w Europejską Wspólnotę Gospodarczą, Wspólnotę Europejską, a wreszcie w Unię Europejską. Do 2012 r. Ówczesny przewodniczący Komisji Europejskiej José Manuel Barroso, były maoistyczny rewolucjonista, chwalił się machinacjami, o których ostrzegał Nowy Amerykanin od dziesięcioleci, spisek, którego globaliści zaprzeczali podczas tworzenia UE.

„Będziemy musieli przejść do federacji” – powiedział. „To jest nasz horyzont polityczny”.

Dziś UE ma jedną walutę, organ ścigania, wojsko proto-kontynentalne i wiele innych. Bruksela, w której znajduje się główna siedziba potwora, ukradła więcej władzy, niż nawet rząd federalny USA zabrał ze Stanów Zjednoczonych w niektórych obszarach, rzekomo mając uprawnienia do zawetowania budżetów krajowych uchwalonych przez wybrane parlamenty państw członkowskich.

Pomimo sprzeciwu obywateli w referendach praktycznie na każdym kroku, UE nadal pracuje nad tym, by „pogłębić”, przejmując większą władzę, i „poszerzyć”, dodając coraz więcej członków. Pracuje także nad eksportem swojego globalistycznego modelu całkowitej scentralizowanej władzy do innych regionów świata.

• UNIA AFRYKAŃSKA:
UA jest kolejnym z bardziej zaawansowanych związków regionalnych, które niszczą suwerenność narodową i nakładają na wybranych ludzi niewybranych, ponadnarodowych władców. Już teraz UA ma „parlament”, wojsko, „Trybunał Sprawiedliwości” i wiele innych.

Działa również na walucie kontynentalnej. Ponieważ Afryka jest tak rozległa i nierozwinięta, globalni władcy stosują ten sam plan, który realizują na poziomie globalnym, aby objąć państwa narodowe, ale na skalę kontynentalną.

Rozważ powstającą „Trójstronną strefę wolnego handlu”. W ramach tego planu różne obszary „wolnego handlu” na kontynencie afrykańskim zostaną ostatecznie połączone w jeden reżim „wolnego handlu” na całym kontynencie z otwartymi granicami od Kapsztadu do Kairu i jednym afrykańskim paszportem.

Jeśli chcesz zajrzeć w przyszłość w ramach tego regionalnego reżimu, zastanów się, że ludobójczy marksistowski dyktator Robert Mugabe został przewodniczącym UA, zanim został obalony przez własne wojsko.

I oczywiście jest bezspornym faktem, że osoby z zewnątrz – przede wszystkim rząd USA, UE i dyktatura zniewalająca Chiny – finansują Afrykę i nakładają na nią UA. Pekin zbudował siedzibę UA. Tymczasem UE finansuje ponad 80 procent budżetu programu UA.
• UNIA PAŃSTW AMERYKAŃSKICH:
W Ameryce Południowej globaliści i komuniści narzucali narodom wschodzące superpaństwo znane jako UNASUL lub UNASUR, w zależności od języka.

Zainspirowane przez UE siły stojące za tym programem niszczenia suwerenności przewidują Stany Zjednoczone Ameryki Południowej wraz z południowoamerykańskim wojskiem, walutą, parlamentem i nie tylko.

Aż do niedawnych sporów dotyczących brutalnej socjalistycznej dyktatury zniewolącej Wenezuelę niektóre państwa członkowskie tymczasowo zawiesiły swój udział, ponadnarodowe ciało zdominowane przez socjalistów i komunistów szybko przejmowało szeroką gamę uprawnień państw członkowskich.

I podobnie jak w innych częściach świata podlegających władzom regionalnym, UNASUL / UNASUR jest tylko jedną z ogromnej konstelacji ponadnarodowych instytucji w Ameryce Łacińskiej, które „integrują” niegdyś suwerenne państwa narodowe w „porządku regionalnym, ”, A po nim„ porządek świata ”.

Inne obejmują MERCOSUR, Boliwariański Sojusz na rzecz Ludów Naszej Ameryki (ALBA), Wspólnotę Państw Ameryki Łacińskiej i Karaibów (CELAC) i wiele innych.
• UNIA EURASIAN:
W „Eurazji” rosyjski siłacz Władimir Putin przewodzi utworzeniu tak zwanej Eurazjatyckiej Unii Gospodarczej, czyli EEU. Skupia Rosję, Białoruś, Kazachstan, Armenię i Kirgistan, wraz z wprowadzeniem innych krajów.

W końcu mają nadzieję na rozszerzenie unii o inne byłe państwa radzieckie, zwłaszcza ze Wspólnoty Niepodległych Państw (WNP).

„Przejście z Europejskiej Wspólnoty Węgla i Stali do pełnej Unii Europejskiej zajęło Europie 40 lat” – zauważył Putin w artykule dla Izvestii, dodając, że Unia Eurazjatycka „postępuje w znacznie szybszym tempie, ponieważ możemy czerpać doświadczenie UE i innych regionalnych stowarzyszeń. ”

Zharmonizowany eurazjatycki system regulacyjny jest „w większości przypadków zgodny ze standardami europejskimi”, dodał, zauważając, że „był oparty na zasadach Światowej Organizacji Handlu”, obiecując jednocześnie, że unia „pomoże zapewnić globalny zrównoważony rozwój”.

Putin zauważył, że w końcu UE i Unia Eurazjatycka mogłyby stworzyć „zharmonizowaną wspólnotę gospodarek od Lizbony po Władywostok, strefę wolnego handlu, a nawet stosując bardziej wyrafinowane wzorce integracji”, która prowadziłaby „skoordynowaną politykę w przemyśle, technologii, energii sektor, edukacja, nauka, a także ostatecznie zniesienie wiz ”.

Ostatecznie „istniejące instytucje regionalne, takie jak między innymi UE, NAFTA, APEC, ASEAN”, stałyby się „cegłami integracyjnymi, które można wykorzystać do budowy bardziej zrównoważonej globalnej gospodarki”. Czołowi przywódcy UE dokładnie powtórzyli tę retorykę. Zwróć też uwagę na odniesienie do NAFTA.

Na całym świecie istnieje oszałamiający wachlarz innych schematów „integracji”, które mają na celu połączenie niegdyś suwerennych państw narodowych w związki regionalne. Na przykład na Bliskim Wschodzie już funkcjonująca Rada Współpracy Zatoki Perskiej staje się ponadnarodowym reżimem nad narodami Półwyspu Arabskiego.

Tymczasem globaliści z CFR i nie tylko starają się objąć cały region tym, co nazywają „Unią Bliskiego Wschodu”.

„Tak jak walczący [europejski] kontynent znalazł pokój poprzez jedność poprzez stworzenie tego, co stało się UE, Arabowie, Turcy, Kurdowie i inne grupy w regionie mogą znaleźć względny pokój w coraz ściślejszym związku”, stwierdził Mohamed „Ed” Husain, „ adiunkt ds. studiów na Bliskim Wschodzie ”w CFR, w artykule z 2014 r. opublikowanym w Financial Times.

W Azji Południowo-Wschodniej „Stowarzyszenie Narodów Azji Południowo-Wschodniej”, bardziej znane jako ASEAN, robi to samo.

W Ameryce Północnej globalistyczny architekt Henry „New World Order” Kissinger opisał NAFTA, która ustanowiła międzynarodowe trybunały i biurokracje, jako „najbardziej twórczy krok w kierunku nowego porządku światowego podjętego przez dowolną grupę krajów od zakończenia zimnej wojny”.

DEKLAMA NA CAŁYM ŚWIECIE

Nie ma obecnie zaludnionego regionu na Ziemi, który nie byłby objęty przez samorządy regionalne. Oczywiście pomysł, że ludzie na całym świecie obudzili się pewnego dnia, próbując oddać suwerenność władzom regionalnym, jest absurdalny. Oczywiście wszystko było zaplanowane. Ale przez cały czas osoby odpowiedzialne oszukiwały społeczeństwo.

Na przykład, podczas przykucania Wielkiej Brytanii do powstającego superpaństwa europejskiego, ówczesny premier Wielkiej Brytanii Edward Heath rażąco skłamał.

„W tym kraju są tacy, którzy obawiają się, że przyjeżdżając do Europy, w jakiś sposób poświęcimy niezależność i suwerenność”, powiedział Heath w premierowej audycji telewizyjnej w styczniu 1973 r. „Te obawy, nie muszę chyba mówić, są całkowicie nieuzasadnione”.

Oczywiście obawy te były nie tylko całkowicie uzasadnione, ale nie doceniono podważenia suwerenności, która miała mieć miejsce.

Do 2016 r. Brytyjczycy zmądrowali, a więcej osób głosowało za Brexitem, by odłączyć się od UE, niż kiedykolwiek głosowało na coś w historii Wielkiej Brytanii. Globaliści robią teraz wszystko, co możliwe, aby obalić głosowanie, ponownie stosując oszustwo.

Prawie trzy dekady po kłamstwach Heatha, w wywiadzie dla gazety La Stampa z 13 lipca 2000 r., Ówczesny premier Włoch Giuliano Amato nakreślił strategię oszustwa.

„Unia jest awangardą tego zmieniającego się świata: wskazuje na przyszłość książąt bez suwerenności” – powiedział.

„Nowa istota jest pozbawiona twarzy, a rządzących nie można przypisać ani wybrać … Tak też zrobiono w Europie: poprzez tworzenie organizmów wspólnotowych bez stwarzania wrażenia, że są to organizmy kierowane przez rządy krajowe poddany wyższej sile….

„Nie sądzę, że dobrym pomysłem jest zastąpienie tej powolnej i skutecznej metody – która chroni państwa narodowe przed niepokojem podczas pozbawiania władzy – dużymi skokami instytucjonalnymi. Dlatego wolę iść powoli, stopniowo niszcząc suwerenność, unikając szorstkich przejść od władzy krajowej do federalnej [UE] ”.

Koniecznie przeczytaj: pełną historię masonerii i stworzenia nowego porządku świata
GLOBALNA POŁĄCZENIE REGIONÓW

Globaliści w ostatnich latach stają się odważniejsi, mówiąc otwarcie o swoich machinacjach i zamiarach. Na przykład były doradca ds. Bezpieczeństwa narodowego i sekretarz stanu Henry Kissinger nakreślili ten sam spisek mający na celu rozwój globalizmu, jak jego współspiskowiec
Brzeziński zrobił to dwie dekady wcześniej na konfabcie Gorbaczowa, tylko bardziej otwarcie.

„Współczesne dążenie do ładu światowego będzie wymagało spójnej strategii ustanowienia koncepcji porządku w różnych regionach i powiązania tych regionalnych porządków ze sobą”, wyjaśnił Kissinger we fragmencie swojej książki World Order, która ukazała się 29 sierpnia 2014 r. , pod nagłówkiem „Henry Kissinger o Zgromadzeniu Nowego Porządku Świata” w Wall Street Journal.

Wzywając do „struktury międzynarodowych zasad i norm”, która jest „wspierana jako
kwestia powszechnego przekonania ”, chwalił w szczególności rozwój wydarzeń po drugiej stronie Atlantyku.

„Europa postanowiła przekroczyć państwo”, powiedział Kissinger. Pomimo użycia nieprzejrzystego i sterylnego języka, jasne jest, że Kissinger apelował o podzielenie narodów i narodów świata na „porządki regionalne” jako preludium do finału „Nowego Porządku Świata”.

A ponieważ UE dąży do wykroczenia poza państwo narodowe w kraju, jednocześnie pracuje nad tym samym na całym świecie, w tym w Ameryce Północnej. W ujawniającym dokumencie wydanym w czerwcu 2016 r. UE faktycznie ślubowała „wspierać regionalne zamówienia spółdzielcze na całym świecie”, w tym w obu Amerykach, jednocześnie propagując globalne zarządzanie składające się z rządów regionalnych opartych na „silnej ONZ”.

„Będziemy inwestować w zamówienia regionalne i we współpracę między regionami” – oświadczył superpaństwo w dokumencie „Strategia globalna”, odzwierciedlając niemal dokładnie schematy nakreślone przez Kissingera w jego książce „Porządek świata”. „Będziemy promować zreformowane globalne zarządzanie… UE będzie dążyć do silnej ONZ jako podstawy wielostronnego porządku opartego na zasadach”.

Jak na ironię, dokument UE potwierdza, że ludzie są zaniepokojeni globalistyczną agendą. Rzeczywiście, dokument „Globalna strategia” UE został wydany zaledwie pięć dni po tym, jak Brexit wywołał fale wstrząsów w ruchu globalistycznym na całym świecie.

Ale oficjalny dokument dalej sugeruje, że potajemne podważanie samorządu na całym świecie w celu budowania samorządów regionalnych służy dobru ludzkości, dlatego i tak należy go kontynuować.

„W świecie uwikłanym w globalną presję i lokalne odepchnięcie na pierwszy plan wysuwa się regionalna dynamika”, argumentował dokument.

„Dobrowolne formy zarządzania regionalnego dają państwom i ludziom możliwość lepszego zarządzania problemami bezpieczeństwa, czerpania korzyści ekonomicznych z globalizacji, pełniejszego wyrażania kultur i tożsamości oraz wpływu projektów na sprawy światowe”.

W końcu, jak wyjaśnili Kissinger i inni, po tym, jak rządy regionalne mają pełną kontrolę, planuje się połączyć je ze sobą w nakładające się rządy regionalne, ponownie wykorzystując „handel” jako pretekst.

Na przykład transatlantyckie partnerstwo handlowo-inwestycyjne miało na celu zbliżenie UE i Ameryki Północnej do biurokracji transatlantyckiej, od dawna realizowanego przez pokolenia globalistycznego celu. Ta transatlantycka unia stworzyłaby wówczas regulacje i ponadnarodowe sądy kangurowe na ponad połowę światowego PKB.

Po drugiej stronie Stanów Zjednoczonych partnerstwo trans-pacyficzne zrobiło praktycznie to samo. Reasumując, ponadnarodowy reżim regulacyjny, który wyłoniłby się z reżimów „handlowych”, rządziłby praktycznie całą globalną gospodarką, a nawet narody, które technicznie nie były pod jego kontrolą, były zmuszone poddać się tylko po to, by nadal uczestniczyć w handlu.

Jeśli naród amerykański nie przeciwstawi się masowo tym planom, rezultatem będzie koniec samorządu, wolności, dobrobytu i cywilizacji zachodnio-chrześcijańskiej.

Artykuł pierwotnie ukazał się w wydaniu drukowanym The New American z 19 listopada 2018 r. The New American publikuje magazyn drukowany dwa razy w miesiącu, obejmujący takie kwestie, jak polityka, pieniądze, polityka zagraniczna, środowisko, kultura i technologia.


Traducido al español a continuación:

Translated into Spanish below:


PROFUNDIDAD: ESTÁ CREANDO
UN NUEVO ORDEN MUNDIAL…. UNA REGIÓN A LA VEZ..

El plan globalista del Estado Profundo para lo que los de adentro conocen como el “Nuevo Orden Mundial” – básicamente, un gobierno global controlado por ellos mismos – comienza sumergiendo la soberanía de los estados nacionales en “órdenes” regionales.

Estos se entienden mejor como gobiernos regionales construidos utilizando acuerdos de “libre comercio” como base, con la Unión Europea como el principal ejemplo. ¿Cómo sabemos que este es el plan? Porque los principales globalistas de Deep State lo han dicho pública y repetidamente, y porque esa es la estrategia exacta que se sigue abiertamente.

En todo el mundo, los acuerdos de pseudo “libre comercio” y otros esquemas de destrucción de soberanía se están utilizando para transferir más y más poder a las burocracias y tribunales transnacionales.

Y eventualmente, estas órdenes regionales se entrelazarán en un mosaico superpuesto de regímenes multilaterales en el camino hacia la creación de una autoridad verdaderamente global, tal vez bajo las Naciones Unidas o algún organismo mundial futuro menos desacreditado. Al menos, ese es el plan globalista. Pero está comenzando a mostrar grietas importantes en medio de una reacción pública histórica.

Ya en 1950, los globalistas habían revelado abiertamente su agenda para un gobierno global bajo las Naciones Unidas. En su libro Guerra o paz, por ejemplo, el cofundador del Consejo de Relaciones Exteriores, promotor del gobierno mundial, John Foster Dulles, lo explicó claramente.

“Las Naciones Unidas no representan una etapa final en el desarrollo del orden mundial, sino solo una etapa primitiva”, escribió Dulles.

“Por lo tanto, su tarea principal es crear las condiciones que harán posible una organización más desarrollada”.

En el mismo libro, Dulles continuó argumentando que la Carta de la ONU existente era lo suficientemente fuerte como para servir de base para un gobierno mundial.

“Nunca he visto ninguna propuesta hecha para la seguridad colectiva con ‘dientes’, o para el ‘gobierno mundial’ o para la ‘federación mundial’, que no podría ser llevada a cabo por las Naciones Unidas o bajo la Carta de las Naciones Unidas”, él dijo.

Sin embargo, desafortunadamente para los globalistas, la humanidad aún no estaba lista para entregar su soberanía a un gobierno mundial todopoderoso. Por lo tanto, regionalización.

En un informe de 1962 titulado “Un mundo efectivamente controlado por las Naciones Unidas”, financiado por el Departamento de Estado de EE. UU., Miembro del CFR y funcionario del Departamento de Estado de mucho tiempo Lincoln Bloomfield, argumentó que el gobierno global podría lograrse a través del regionalismo.

En el plan, propuso que “las unidades cada vez más grandes evolucionan a través de las uniones aduaneras, la confederación, el regionalismo, etc., hasta que finalmente las unidades más grandes se unan bajo un paraguas global”. ¿Suena familiar?

Por supuesto, esa es precisamente la estrategia que se ha utilizado, basándose principalmente en esquemas de “libre comercio”, además de ir a la guerra y amenazarla, otras tácticas clave destacadas en el informe de Bloomfield.

En 1974, casi un cuarto de siglo después de que el fundador de CFR, Dulles, escribiera su infame libro, el portavoz de la organización globalista, la revista denominada Foreign Affairs, estaba telegrafiando su estrategia de globalismo a través de incrementalismo a los expertos globalistas e idiotas útiles en todas partes.

“En resumen, la ‘casa del orden mundial’ tendrá que construirse de abajo hacia arriba y no de arriba hacia abajo”, escribió el ex subsecretario de Estado adjunto Richard N. Gardner en abril de 1974. “Un fin en todo el país La soberanía, erosionándola pieza por pieza, logrará mucho más que el asalto frontal anticuado ”.

En resumen, los globalistas reconocieron la realidad de que las personas no estaban dispuestas a renunciar al control sobre sus propias naciones y sus propios destinos de una vez. En cambio, el plan tendría que llevarse a cabo de manera lenta, silenciosa y engañosa.

Y así, pieza por pieza, la soberanía se erosionó utilizando herramientas como el “libre comercio”, los acuerdos internacionales, las alianzas militares regionales como la Organización del Tratado del Atlántico Norte (OTAN) y más. Un elemento central de la trama era convencer a las naciones y los pueblos a que entregaran la soberanía no a algún gobierno global inmediato, sino a las organizaciones regionales.

Considere al ex asesor de seguridad nacional Zbigniew Brzezinski, miembro de ‘CFR’ desde hace mucho tiempo, y una de las figuras clave detrás de la Comisión Trilateral del cerebro globalista David Rockefeller.

En 1995, al hablar en el “Foro del Estado del Mundo” del ex dictador soviético Mikhail Gorbachev, al que asistió el editor principal de la revista The New American William F. Jasper, Brzezinski describió el plan claramente, tal vez suponiendo que estaba hablando solo con sus amigos globalistas y amigos.

“No podemos saltar al gobierno mundial en un solo paso rápido”, dijo. “En resumen, la condición previa para una globalización eventual – una globalización genuina – es una regionalización progresiva, porque así nos movemos hacia unidades más grandes, más estables y más cooperativas”.

También en 1995, la “Comisión de Gobernanza Global” creada por la ONU, sí, realmente se la llamó “Comisión de Gobernanza Global”, describió precisamente la misma estrategia en su informe “Nuestra Vecindad Global”.

“La ONU debe prepararse para un momento en que el regionalismo se vuelve más ascendente en todo el mundo y ayudar al proceso antes de ese momento”, escribieron los globalistas en la comisión de la ONU, presagiando la estrategia que estaba a punto de agotarse.

“La cooperación y la integración regional deben considerarse como una parte importante e integral de un sistema equilibrado de gobernanza global”.

GOBIERNOS REGIONALES EN TODAS PARTES

Esta regionalización e “integración” como un peldaño hacia la globalización del poder político y económico es exactamente lo que está sucediendo en todo el mundo.
AQUÍ HAY ALGUNOS DE LOS EJEMPLOS MÁS PROMINENTES: de ninguna manera es una lista exhaustiva:
• UNIÓN EUROPEA:
La UE es, con mucho, el régimen supranacional más desarrollado del mundo, con el ex dictador soviético Mikhail Gorbachev describiéndolo con aprobación como “el nuevo soviético europeo” durante una visita de 2000 a Gran Bretaña.

Originalmente, comenzó como un acuerdo de “Carbón y Acero” entre seis naciones después de la Segunda Guerra Mundial. Con el apoyo clave de Deep State
instituciones como
Bilderberg, el CFR, la Agencia Central de Inteligencia (CIA) y más, gradualmente usurparon más y más poder bajo la apariencia de “libre comercio”.

A lo largo de las décadas, se transformó en la Comunidad Económica Europea, la Comunidad Europea y, finalmente, la Unión Europea. Para 2012, el entonces presidente de la Comisión de la UE, José Manuel Barroso, un ex revolucionario maoísta, se jactaba de las maquinaciones que The New American había estado advirtiendo durante décadas, un complot que los globalistas generalmente habían negado a medida que la UE se estaba formando.

“Tendremos que avanzar hacia una federación”, dijo. “Este es nuestro horizonte político”.

Hoy, la UE tiene una moneda única, una agencia de aplicación de la ley, un ejército protocontinental y mucho más. Bruselas, donde el monstruo tiene su sede, ha robado más poder del que incluso el gobierno federal de EE. UU. Ha tomado de los estados de EE. UU. En algunas áreas, pretendiendo tener la autoridad para vetar los presupuestos nacionales aprobados por los parlamentos elegidos de los estados miembros.

A pesar de que los ciudadanos se oponen a los referéndums en casi todos los sentidos, la UE todavía está trabajando para ser “más profunda” al usurpar más poder y “más amplia” al agregar más y más miembros. También está trabajando para exportar su modelo globalista de poder centralizado total a otras regiones del mundo.
• UNIÓN AFRICANA:
La UA es otro de los sindicatos regionales más avanzados que destruyen la soberanía nacional e imponen gobernantes supranacionales no elegidos a pueblos diversos. La UA ya tiene un “Parlamento”, un ejército, un “Tribunal de Justicia” y más.

También está trabajando en una moneda continental. Debido a que África es tan vasta y poco desarrollada, los señores globalistas en realidad están utilizando el mismo plan que están siguiendo a nivel global para subsumir a los estados-nación, pero a escala continental.

Considere la emergente “Área tripartita de libre comercio”. Según el plan, varias áreas de “libre comercio” en el continente africano finalmente se fusionarán en un único régimen de “libre comercio” en todo el continente con fronteras abiertas desde Ciudad del Cabo a El Cairo, y un solo pasaporte africano.

Para una vista previa del futuro bajo este régimen regional, considere que el dictador marxista genocida Robert Mugabe fue nombrado presidente de la UA antes de ser derrocado por su propio ejército.

Y, por supuesto, es un hecho indiscutible que los extraños, principalmente el gobierno de EE. UU., La UE y la dictadura que esclavizan a China, están financiando e imponiendo la UA a los africanos. Beijing construyó la sede de la UA. Mientras tanto, la UE financia más del 80 por ciento del presupuesto del programa de la UA.
• UNIÓN DE ESTADOS SUDAMERICANOS:
En América del Sur, los globalistas y comunistas han impuesto a los pueblos un superestado emergente conocido como UNASUL o UNASUR, según el idioma.

Inspiradas por la UE, las fuerzas detrás de este esquema de destrucción de soberanía vislumbran a los Estados Unidos de América del Sur, con un ejército, moneda, parlamento y más sudamericanos.

Hasta que los recientes desacuerdos sobre la brutal dictadura socialista que esclavizaban a Venezuela causaron que algunos estados miembros suspendieran temporalmente su participación, el cuerpo supranacional dominado por los socialistas y los comunistas estaba usurpando rápidamente una amplia gama de poderes de los estados miembros.

Y como es el caso en otras partes del mundo que están incluidas en los gobiernos regionales, UNASUL / UNASUR es simplemente una de una vasta constelación de instituciones supranacionales en América Latina que trabaja para “integrar” a los estados-nación soberanos en un “orden regional”. “Para ser seguido por el” orden mundial “.

Otros incluyen el MERCOSUR, la Alianza Bolivariana para los Pueblos de Nuestra América (ALBA), la Comunidad de Estados de América Latina y el Caribe (CELAC) y muchos otros.

• UNIÓN EURASIANA:
En “Eurasia”, el hombre fuerte ruso Vladimir Putin encabeza la creación de lo que actualmente se conoce como la Unión Económica Euroasiática, o EEU. Reúne a Rusia, Bielorrusia, Kazajstán, Armenia y Kirguistán, y otros países están siendo inducidos.

Eventualmente, esperan expandir la unión para incluir otros antiguos estados soviéticos, particularmente de la Comunidad de Estados Independientes (CEI).

“Le tomó 40 años a Europa pasar de la Comunidad Europea del Carbón y del Acero a la Unión Europea”, observó Putin en un artículo de opinión para Izvestia, y agregó que la Unión Euroasiática está “avanzando a un ritmo mucho más rápido porque podríamos aprovechar la experiencia de la UE y otras asociaciones regionales “.

El régimen regulatorio euroasiático armonizado es “en la mayoría de los casos consistente con los estándares europeos”, agregó, y señaló que estaba “basado en los principios de la Organización Mundial del Comercio”, al tiempo que prometió que la unión “ayudaría a garantizar el desarrollo sostenible global”.

Putin señaló que eventualmente, la UE y la Unión Euroasiática podrían crear una “comunidad armonizada de economías que se extienda desde Lisboa a Vladivostok, una zona de libre comercio e incluso empleando patrones de integración más sofisticados” que seguirían “políticas coordinadas en la industria, la tecnología, la energía sector, educación, ciencia y también para eventualmente desechar visas ”.

En última instancia, “las instituciones regionales existentes, como la UE, el TLCAN, el APEC, la ASEAN, entre otras cosas”, se convertirían en “los ladrillos de integración que se pueden utilizar para construir una economía global más sostenible”. Los principales líderes de la UE se han hecho eco de esa retórica exactamente. Tenga en cuenta la referencia al TLCAN, también.

En todo el mundo, hay una variedad vertiginosa de otros esquemas de “integración” que trabajan para fusionar estados nacionales que alguna vez fueron soberanos en sindicatos regionales. Por ejemplo, en el Medio Oriente, el Consejo de Cooperación del Golfo, que ya funciona, se está convirtiendo en un régimen supranacional sobre las naciones de la Península Arábiga.

Mientras tanto, los globalistas del CFR y más allá están trabajando para poner a toda la región bajo lo que ellos llaman una “Unión del Medio Oriente”.

“Así como un continente en guerra [europeo] encontró la paz a través de la unidad al crear lo que se convirtió en la UE, los árabes, turcos, kurdos y otros grupos en la región podrían encontrar una paz relativa en una unión cada vez más estrecha”, afirmó Mohamed “Ed” Husain, un ” investigador adjunto para estudios de Medio Oriente ”en el CFR, en un artículo de 2014 publicado en el Financial Times.

En el sudeste asiático, la “Asociación de Naciones del Sudeste Asiático”, más comúnmente conocida como ASEAN, está haciendo lo mismo.

En América del Norte, el arquitecto globalista Henry “Nuevo Orden Mundial” Kissinger describió el TLCAN, que estableció tribunales y burocracias internacionales, como “el paso más creativo hacia un nuevo orden mundial dado por cualquier grupo de países desde el final de la Guerra Fría”.

ENGAÑO MUNDIAL

No hay una región poblada en la Tierra que no esté incluida en el gobierno regional en este momento. Obviamente, la noción de que la gente de todo el mundo acaba de despertarse un día buscando entregar la soberanía a un gobierno regional es ridícula. Todo fue por diseño, por supuesto. Pero todo el tiempo, los responsables estaban engañando al público.

Por ejemplo, mientras encadenaba al Reino Unido al emergente superestado europeo, el entonces primer ministro británico Edward Heath mintió descaradamente.

“Hay algunos en este país que temen que al entrar en Europa sacrifiquemos de alguna manera la independencia y la soberanía”, dijo Heath en una transmisión televisiva del primer ministro de enero de 1973. “No es necesario decir que estos temores son completamente injustificados”.

Por supuesto, esas preocupaciones no solo estaban completamente justificadas, sino que subestimaban la subversión de la soberanía que tendría lugar.

Para 2016, el pueblo británico se había dado cuenta, con más personas votando para separarse de la UE con Brexit que nunca votaron por algo en la historia del Reino Unido. Los globalistas ahora están haciendo todo lo posible para revocar el voto, nuevamente utilizando el engaño.

Casi tres décadas después de las mentiras de Heath, en una entrevista del 13 de julio de 2000 con el periódico La Stampa, el entonces primer ministro italiano Giuliano Amato describió la estrategia del engaño.

“La Unión es la vanguardia de este mundo cambiante: indica un futuro de príncipes sin soberanía”, dijo.

“La nueva entidad no tiene rostro y los que están al mando no pueden ser inmovilizados ni elegidos … Así es como se hizo Europa: creando organismos comunitarios sin dar a los organismos presididos por los gobiernos nacionales la impresión de que eran ser sometido a un poder superior….

“No creo que sea una buena idea reemplazar este método lento y efectivo, que mantiene a los Estados nacionales libres de ansiedad mientras se les despoja del poder, con grandes saltos institucionales”. Por lo tanto, prefiero ir despacio, desmoronar pedazos de soberanía poco a poco, evitando transiciones bruscas del poder nacional al poder federal [de la UE] ”.

Debe leer: la historia completa de la masonería y la creación del nuevo orden mundial
FUSIÓN GLOBAL DE REGIONES

Los globalistas se han vuelto más audaces en los últimos años, hablando abiertamente de sus maquinaciones e intenciones. Por ejemplo, el ex asesor de seguridad nacional y secretario de Estado Henry Kissinger describió el mismo plan para avanzar en el globalismo que su conspirador.
Brzezinski lo hizo dos décadas antes en la reunión de Gorbachov, solo que de manera más abierta.

“La búsqueda contemporánea del orden mundial requerirá una estrategia coherente para establecer un concepto de orden dentro de las diversas regiones y relacionar estos órdenes regionales entre sí”, explicó Kissinger en un extracto de su libro World Order que apareció el 29 de agosto de 2014 , bajo el título “Henry Kissinger sobre la Asamblea de un Nuevo Orden Mundial” en el Wall Street Journal.

Pidiendo una “estructura de reglas y normas internacionales” que se “fomente como
una cuestión de convicción común ”, elogió, en particular, los desarrollos en el otro lado del Atlántico.

“Europa se ha propuesto trascender el estado”, dijo Kissinger. A pesar del uso de lenguaje opaco y estéril, está claro que Kissinger estaba pidiendo que las naciones y pueblos del mundo se dividieran en “órdenes regionales” como preludio del final del “Nuevo Orden Mundial”.

Y a medida que la UE trabaja para trascender el estado-nación en casa, está trabajando simultáneamente para hacer lo mismo en todo el mundo, incluso en América del Norte. En un documento revelador publicado en junio de 2016, la UE se comprometió a “apoyar las órdenes regionales de cooperación en todo el mundo”, incluso en las Américas, mientras promociona la gobernanza global compuesta por gobiernos regionales basados en una “ONU fuerte”.

“Invertiremos en pedidos regionales, y en cooperación entre y dentro de las regiones”, declaró el superestado en su documento de “Estrategia global”, haciéndose eco casi con precisión de los esquemas esbozados por Kissinger en su libro World Order. “Y promoveremos una gobernanza mundial reformada … La UE luchará por una ONU fuerte como base del orden multilateral basado en normas”.

Irónicamente, el documento de la UE reconoce que las personas están molestas con la agenda globalista. De hecho, el documento de la “Estrategia global” de la UE se publicó solo cinco días después de que Brexit envió ondas de choque a través del movimiento globalista en todo el mundo.

Pero el documento oficial continúa sugiriendo que socavar subrepticiamente el autogobierno en todo el mundo para construir gobiernos regionales es todo por el bien de la humanidad, por lo que debe perseguirse de todos modos.

“En un mundo atrapado entre las presiones globales y el retroceso local, la dinámica regional se destaca”, argumenta el documento.

“Las formas voluntarias de gobernanza regional ofrecen a los estados y pueblos la oportunidad de gestionar mejor las preocupaciones de seguridad, cosechar los beneficios económicos de la globalización, expresar más plenamente culturas e identidades y proyectar influencia en los asuntos mundiales”.

Finalmente, como Kissinger y otros explicaron, después de que estos gobiernos regionales tengan el control total, el plan es comenzar a fusionarlos entre sí en gobiernos regionales superpuestos, utilizando nuevamente el “comercio” como pretexto.

La Asociación Transatlántica de Comercio e Inversión, por ejemplo, tenía como objetivo unir a la UE y América del Norte bajo burocracias transatlánticas, un objetivo globalista desde hace mucho tiempo que se ha trabajado durante generaciones. Esta unión transatlántica crearía entonces regulaciones y tribunales supranacionales de canguro sobre más de la mitad del PIB mundial.

Al otro lado de los Estados Unidos, la Asociación Transpacífica hizo prácticamente lo mismo. En conjunto, el régimen regulatorio supranacional que surgiría de los regímenes de “comercio” gobernaría prácticamente toda la economía mundial, incluso las naciones que técnicamente no estaban bajo su control se verían obligadas a someterse solo para continuar participando en el comercio.

Si el pueblo estadounidense no se opone activamente a estos planes en masa, el resultado será el fin del autogobierno, la libertad, la prosperidad y la civilización cristiana occidental.

Este artículo apareció originalmente en la edición impresa del 19 de noviembre de 2018 de El Nuevo Americano. El Nuevo Americano publica una revista impresa dos veces al mes, que cubre temas como política, dinero, política exterior, medio ambiente, cultura y tecnología.


Tags: /Tagi: /Etiquetas:
#EXPOSING #EKSPOZYCJA!
#EXPOSICIÓN #occultism #okultyzm #ocultismo #paganism #pogaństwo #paganismo #pagan #pogański #pagano #Luciferianism
#satanism #satanismo #SecretSociety #SociedadSecreta #SekretneStowarzyszenie #SecretSocieties #TajneStowarzyszenia
#SociedadesSecretas #SecretHistory #TajnaHistoria #NWO #AntiNWO #NewWorldDisorder #OrdoAbChao
#HegelianDialectics #DialektykaHeglowska #DialécticaHegeliana #DeepState #EstadoProfundo #GłębokiStan
#ShadowGovernment #RządCienia #GobiernoSombrío
#Control #Kontrola #Controlar #TotalControl #PełnaKontrola #ControlTotal
#Socialism #Socjalizm
#Socialismo #Communism #Komunizm #Comunismo #TheElite #Elita #LaElité #TheCabal #Cabal #ElCabal #evil #zło #mal
#Trans-Humanism #Transhumanizm #Transhumanismo #HenryKissinger #NWO #Article #Artykuł #Artículo
#EXPOSED #NARAŻONY #EXPUESTO

U.N. REPORT: VATICAN POLICIES ALLOWED PRIESTS TO RAPE CHILDREN…!!

U.N. REPORT: VATICAN POLICIES ALLOWED PRIESTS TO RAPE CHILDREN…!!


2019-03-14-22-10-01~3Quaterionenadler_David_de_Negker.svg-12019-03-08-03-35-30~2

The United Nations heavily criticized the Vatican [back in 2014] for what it said was a systematic adoption of policies allowing priests to rape and sexually abuse tens of thousands of children.

The devastating report published by the U.N. Committee on the Rights of a Child said the Vatican must “immediately remove” all known or suspected child abusers within the clergy.

It said the Holy See had “systematically placed preservation of the reputation of the church and the alleged offender over the protection of child victims”.

In response, the Vatican said in a statement published on its website that some points made in the report were an “attempt to interfere with Catholic Church teaching”.

Press.Vatican.va  withWeb.Archive.org

The Vatican said it would examine the report thoroughly and reiterated its commitment to defending and protecting child rights in accordance with the U.N. guidelines and “the moral and religious values offered by Catholic doctrine.”

The U.N.’s conclusions come after an unprecedented hearing in Geneva on Jan. 16, [2014] in which Vatican representatives were questioned by the U.N. committee.

“Well-known child sexual abusers have been transferred from parish to parish or to other countries in an attempt to cover-up such crimes,” the report said.

It later added: “Due to a code of silence imposed on all members of the clergy under penalty of excommunication, cases of child sexual abuse have hardly ever been reported to the law enforcement authorities in the countries where such crimes occurred”.

Source: NBCnews.com (excerpts) / The Associated Press contributed to this report / Reference:YouTube.com

AddText_05-22-11.40.04

JEFFREY EPSTEIN’S NEW PLACE IN NEW YORK:

LOCATION OF JEFFREY EPSTEIN’S 7.7 MILLION $ MANSION IN NEW YORK:

9 E 71st St 9 E 71st St, New York, NY 10021, USA

ISusxpazlmr81l100000000008-jeffrey-epstein-house.w700.h700

This New York luxury Mansion was purchased for $7.7 million not by Jeffrey Epstein himself but a company called ‘Maple Inc’, located in New Dehli, India according to their contact adress…


· MAPLE INC.

WEBB: https://meoverseas.com/

GOOGLE PLUS:
https://plus.google.com/+Meoverseas

TWITTER:
https://mobile.twitter.com/maplesystemsinc

YOUTUBE:
https://m.youtube.com/watch?v=dB80imu3PFE

FACEBOOK:
https://m.facebook.com/meoverseasofficial/

17 users have checked in here


ADRESS:
214, Pankaj Plaza, Plot No.-10, Central Market, Sector-6, Delhi 110075

 

TEL: +91 11 4511 8522

EMAIL: info@meoverseas.com

WEBB: https://meoverseas.com/

OPEN: 10:00 – 6:30

INFO: We are an Immigration and study abroad consultancy,
We deal in U.K, Canada, Australia, New Zealand, Europe, USA & Singapore

· Me Over Seas

Study Destinations

· Canada

Immgiration-Australia.png

 

· Australia

 

· Germany

· Ireland

· United Kingdom

· New Zealand

· France

· Dubai

· Singapore

· United States of America

LIST OF KNOWN NAMES CONNECTED TO SATANIC CULTS/ PEDOPHILIA/CHILD-TRAFFICKING IN AMERICA:

LIST OF KNOWN NAMES CONNECTED TO SATANIC CULTS / PEDOPHILIA / CHILD-TRAFFICKING IN AMERICA:


 

● Hillary Clinton
● Bill Clinton
● George Nader (Businessman)
● Huma Aberdin
● Laura Silsby
● Rachel Chandler
● Jeffrey Epstein
● Ghislaine Maxwell
● John Podesta
● Michael Podesta
● James Alefantis
● Anthony Wiener
● Leslie Wexner (Limited Inc Chairman)
● Herbert Strauss
● Isidor Strauss
● Martin A. Nowak
● Steven Spielberg
● Edgar Bronfman Sr. (Seagram Chairman)
● Charles Bronfman (Seagram Co)
● Michael Steinhardt (former hedge-fund manager)
● Sara Bronfman
● Clare Bronfman
● Niles Lehman (Professor at Portland State University)
● Seth Roger
● Ruth Ginsberg
● Alison Mack
● Rachel Chandler
● Robert Maxwell
● Wendi Murdoch
● Jonathan Cheban
● Naomi Campbell
● Maximiliam Chow
● Val Kilmer
● Marina Abramovic


 

LIST OF HOLLYWOOD PEDO-NAMES:


 

● Steven Spielberg
● Michael Jackson
● Kevin Spacey

● Alison Mac
● Marc Collins-Rector (Founder of Den)
● Chad Shackley
● Brock Pierce
● David Geffen
● Tom Hanks
● Dustin Hoffman
● Andrew Kreisberg (American television writer, producer)
● Bryan Singer
● Harvey Weinstein
● Bob Weinstein
● Roman Polanski
● Ruma Hazard
● Charlie Sheen
● Madonna
● Kate Perry
● Miley Cyrus
● Errol Flynn
● Billy Graham
● Walt Disney
● Michael Laney (Former Walt Disney vice president)
● James Gunn (Disney)


 

LIST OF NAMES OF CELEBS CONNECTED TO THE DEEPSTATE, CIA & MOSSAD:


 

● Heidi Fleiss
● Jeffrey Epstein


 

LIST OF NAMES CONNECTED TO SATANIC CULTS:


 

● Alison Mack
● Stormy Daniels
● Rachel Chandler
● Ghislaine Maxwell


 

LIST OF NAMES OF VISITORS ON EPSTEIN ISLAND:


 

● Ghislaine Maxwell
● Chris Tucker
● Larry Summers
● Lisa Summers
● Bill Murray
● Bill Hammond
● Ehud Barak
● Andrés Pastrana (Former President of Colombia 1998-2002)
● Jean Luc Brunel
● Doug Band
● Ron Burkle
● Woody Allen
● Sarah Kellen
● Ray Barzanna
● Sandy Burger
● Andrea Mitrovitch
● Peter Marino
● Shelley Lewis
● Paul Hala(t) (d) a
● Richardo Legoretta
● Tom Pritzker
● Kelly Spamm
● Tiffany Gramza
● Claire Hazel
● Paula Epstein
● Mark Epstein
● Ralph Elison
● Sophie Biddle
● Audrey Raimbault
● Shelley Harrison
● Melinda Luntz
● Gwendolyn Beck
● Albert Pinto
● Linda Pinto
● Gary Roxburgh
● Mandy Elison
● Jean Michelle Gathy
● Virginia Roberts
● Kristy Rodgers (Kristina Real Rodgers)
● Greg Holbert
● Alyssa Rodgers
● Juliette Bryant
● Heather Mann
● Ed Tuttle
● Glen Dubin
● Ellen Spencer
● Chris Wagner
● Casey Wasserman
● Laura Wasserman
● Paul Mellon
● Oliver Sachs
● Henry Rosovsky
● Lynn Forester (de Rothschild)
● Joe Pagano
● Naomi Campbell
● Nicole Junkermann
● Rodney Slater
● Magali Blachon (Deperrier)
● Svetlana Griaznova
● Emmy Tayler
● Larry Visoski
● Teala Davies
● Juan (Pablo) Molyneux
● Freya Willemoes) Wissing
● Adam Perry Lang
● Fleur Perry Lang
● Caren Casey
● Hank Coller
● Cindy Lopez
● Mark Lloyd
● Alan Dershowitz
● Seth Green
● James Gunn
● Steven Spielberg
● Tom Hanks
● Steven Colbert
● Jimmy Kimmel
● Barack Obama
● Kevin Spacey
● Kathy Griffin
● Oprah Winfrey
● Shawn Carter
● Beyoncé Knowles
● Anthony Kiedis
● John Legend
● Chrissy Tiegen
● Jim Carrey
● Steven Tyler
● Ben Affleck
● Stephen Collins
● Will Ferrell
● Aliaune Damala Badara Thiam (Akon)
● Marshall Matters
● Jeffrey Jones
● Victor Salva
● Mark Collins Rector
● Charlie Sheen
● Tyler Grasham
● Madonna Ciccone
● Katheryn Hudson
● Gwen Stefani
● Stefani Germanotta
● James Franco
● Will Smith
● Justin Roland
● John Cusack
● Anderson Cooper
● Demi Moore
● Brian Affleck
● Meryl Streep
● Wanda Sykes
● Chelsea Handler
● Michelle Wolf
● David Yarovesky
● Pharrell Williams
● Quentin Tarantino
● Courtney Love
● Alec Baldwin
● Robert Downey Jr.
● Disney Corporation (Offering kids “scuba-diving” trips, to the Epstein Island)


 

Link: the Epstein flight log documents


LIST OF NAMES CONNECTED TO THE STANDARD HOTELS


● Andre Balazs (Owner of the Standard Hotels and connected to the Rockefellers)
● Jay Z
● Beyoncé Knowles
● John Belushi
● Britney Spears
● Errol Flynn
● Dennis Hopper
● Helmut Newton
● Jim Morrison
● James Dean
● Billy Idol
● Victoria Beckham
● Heath Ledger
● Sienna Miller
● Balthazar Getty
● Scarlet Johansen


MORE NAMES TO ADD TO THE LIST-
INDIVIDUALS THAT’S DIRECTLY CONNECTED TO JEFFREY EPSTEIN & THE EPSTEIN ISLAND:


Elon Musk

● Mark Zuckerberg

● Lawrence M. Krauss
● Steven Pinker
● Mick Jagger
● Courtney Love
● Joan Rivers (deceased)
● Kevin Spacey
● Chris Rock
● Eli Weisel (Nobel Prize winning Holocaust profiteer)
● Lauren Hutton (Top fashion model)
● Duke & Duchess of York
● Earl Spencer (Late Diana’s brother)
● Richard Bronson (English businessman)
● Tony Blair (Former UK prime minister)
David Koch (1/2 of a brother team)
● David Rockefeller
● Evelyn de Rothschild
● Eduouard de Rothschild

JOURNALISTS THAT’S DIRECTLY CONNECTED TO JAMES ALEFANTIS, COMET PING PONG & BUCKS FISHING, WASHINGTON DC:

● Jake Tapper (CNN)
● Jennifer Tapper (wife of Jake Tapper)

● Maple Inc

● Me Over Seas


JOURNALISTS THAT’S DIRECTLY CONNECTED TO JEFFREY EPSTEIN & THE EPSTEIN ISLAND:

● Barbara Walters
● Mort Zuckerman
● Eric Margolis
● Rupert Murdock
● Conrad & Barbara Black; Baron Black of Crossharbour


POLITICS THAT’S DIRECTLY CONNECTED TO JEFFREY EPSTEIN & THE EPSTEIN ISLAND:


● Bill Clinton (Former president of America)
● Jon & Mary Kaye Huntsman
● Governor Charles Turnbull (US Virgin Islands)
● Henry Kissinger
● Ethel Kennedy
● Bobby & Mary Kennedy
● Senator Edward Kennedy (deceased)
● Ted Kennedy Jr.
● Andrew & Kerry Kennedy Cuomo
● Maria Shriver (Kennedy relative/Schwarznegger’s ex)


THE DTLA STANDARD HOTEL CONNECTIONS:
(Vacant 1992-2002)


● Keck Family (Standard Oil / Founders of The Standard Hotel)
● Perry Mason
● Bank of California
● JP Morgan – Standard Oil
● Jeffrey Epstein
● Bear Stearns Group
● Standard Holdings
● Colombia Development


_note:_

(It appears to be an obvious connection between the; STANDARD HOTEL DTLA and the underground military base at the CHINA LAKE NAVAL MILITARY TEST-BASE.)

gettyimages-463024970-1510262576


 

LIST OF KNOWN PEDO-NAMES WITHIN AMERICAN POLITICS & LIST OF KNOWN HOLLYWOOD-PEDOPHILE NAMES: 

LIST OF KNOWN PEDO-NAMES WITHIN AMERICAN POLITICS & LIST OF KNOWN HOLLYWOOD-PEDOPHILE NAMES:


LIST OF KNOWN PEDO-NAMES WITHIN AMERICAN POLITICS: 


● Hillary Clinton 
● Bill Clinton 
● Huma Aberdin  
● Laura Silsby 
● Rachel Chandler 
● Jeffrey Epstein 
● Ghislaine Maxwell 
● John Podesta 
● Michael Podesta 
● James Alefantis 
● Anthony Wiener 
● Leslie Wexner (Limited Inc Chairman)  
● Herbert Strauss 
● Isidor Strauss 
● Martin A. Nowak
● Steven Spielberg 
● Edgar Bronfman Sr. (Seagram Chairman) 
● Charles Bronfman (Seagram Co) 
● Michael Steinhardt (former hedge-fund manager)   
● Sara Bronfman 
● Clare Bronfman   
● Niles Lehman (Professor at Portland State University) 
● Seth Roger 
● Seth Green 
● George Nader, Businessman      ● Gerard ‘t Hooft
● Frank Wilczek
● Lawrence Krauss
● Martin Nowak
● Lex Wexner

● Rachel Chandler


HOLLYWOOD PEDOPHILE NAMES: 


● Steven Spielberg 
● Michael Jackson
● Kevin Spacey 
● Marc Collins-Rector (Founder of Den)
● Chad Shackley 
● Brock Pierce 
● David Geffen  
● Tom Hanks 
● Dustin Hoffman 
● Andrew Kreisberg (American television writer, producer) 
● Bryan Singer 
● Harvey Weinstein 
● Bob Weinstein  
● Roman Polanski 
● Ruma Hazard 
● Bobby Hoffman 
● Charlie Sheen 
● Kate Perry 
● Madonna 
● Marvin Gaye 
● Mark Salling 
● Jeffrey Jones 
● R. Kelly 
● Paul Reubens (aka Pee Wee Herman) 
● Lawrence Taylor 
● Woody Allen 
● Jerry Sandusky 
● Shane Sparks 
● Vincent Margera 
● James Franco 
● Ian Watkins 
● Bobby Hoffman
● Don Vito 
● Jared Fogle 
● Victor Salva 
● Stephen Collins 
● Bon Villard 
● Roman Holub 
● Brian Peck 
● Martin Weiss 
● Robert Kelly  
● Ahad ur Rehman 

 

 

7*#SATANIC ELITE BLOODLINE FAMILIES—UPDATED LIST OF NAMES OF THE SATANIC ELITE BLOODLINE FAMILIES—LIST OF NAMES—THE RULING SATANIC ELITE FAMILIES ARE:

7*#SATANIC ELITE BLOODLINE FAMILIES—UPDATED LIST OF NAMES OF THE SATANIC ELITE BLOODLINE FAMILIES—LIST OF NAMES—THE RULING SATANIC ELITE FAMILIES ARE:
*A*
Abamelik, Abaza, Abercorn‎, Absberg‎, Acquafondata, Adlercreutz, Agilolfings‎, Agnelli, Agnelli-Elkann, Ahlefeldt, Ahalolfings, Alba, Albeni, Albret, Aldobrandeschi, Aldobrandini, Alexandrine-Montechanin, Aleramici, Alopaeus, Altavilla, Allucingoli, Alvensleben‎, Altoviti, Alaouite, Al-Abbasi, Alburquerque, Al-Falasi, Al Ghardaqa, Al Khalifa, Al-Sabah, Al-Ubaid (tribe), Álvarez-Cuevas, Amatuni, Amilakhvari, Amsberg, Andrássy, Andechs‎, Angelerio, Angelos, Anhalt, Anicii, Anguillara, Angevin, Angoulème, Anjou‎, Anjou-Capetian, Anjou-Durazzo‎,
Anjou-Hungary‎, Anjou-Naples‎, Anjou-Taranto‎, Anker, Ansbach, Anscarids‎, Andzevatsi, Apor, Aragona, Aragon, Aragonese, Aranshahik‎, Archbold, Arco‎, Ardennes‎, Arduinici, Arenberg, Argavieso, Arneth, Arianiti, Aribonid, Armagnac, Armfelt, Arnim, Arrazola de Oñate, Arsacid, Arslan, Artsruni, Artaxiad, Artois, Árpád, Ascania, Aspenäs, Asti,
Astor/Astarte/Astorga/Ashdor, Ashurbeyov, Astalli, Astakai, Asturias-Cantabria, Attems, Aubert, Audley, Augustenburg‎, Aumont, Auersperg, Austria-Este‎,
la Tour d’Auvergne‎, Auxbrebis, Avesnes, Averill, Aviz,

*B*
Babenberg‎, Baden, Badeni‎, Bagge, Bagrat, Bagratuni, Bagrationi, Bagration, Bagratuni, Banér, Bánfi, Bardi, Baker, Banchieri, Bar‎, Baratashvili, Barbarossa, Barberini, Barbiano di Belgiojoso, Barbiellini, Barbo, Barclay de Tolly, Barcelona,
Bariatinsky, Barlow, Barnekow, Barner, Baruch, Basarab, Bassewitz, Báthory,
Batthyány-Strattmann, Battenberg/Battenburg/Mountbatten, Baudissin‎, Bauffremont, Baux, Bayreuth‎, Bavaria, Beauchamp, Beauclerk, Beaufort, Beaufort Bielke, Beaufort-Spontin, Beaumont, Beauharnais, Bedford, Belgium, Below, Bentinck, Benjamin, Bentheim‎,
Bentheim und Steinfurt‎, Berchtold, Berenberg-Gossler, Berg‎, Bernadotte, Bernstorff, Berthold-Bezelin, Berwind, Bese, Bettencourt, Bethune, Bette, Beyens,
Beyens de Grambais,
Białłozor (Wieniawa)‎, Bibra,
Bieliński (Junosza)‎, Bille, Billung‎, Biron‎, Bismarck, Bivinids, Bizzaccheri, Bjelbo, Bjelke, Björn, Blacas, Blanchefort, Blason, Blazon, Bleichröder, Blois, Blumenthal, Bobone-Orsini, Bohemian, Bohun, Boers-Lyon, Boleyn, Bonaparte, Boncompagni,
Boncompagni-Ludovisi, Bogoria, Bogoriowie,
Borghese, Borgia, Borja, Borjigid, Bokassa, Bonde, Boso‎, Bosonids, Both,
Brahe, Brandenburg‎, Brion, Brunswick-Luneburg, Boccasini, Boeselager,
Bogdan-Mușat, Boniface,
Boncompagni-Ludovisi,
Borromeo, Borghese, Bouillon, Bourbon,
Bourbon-Anjou,
Bourbon-Braganza‎,
Bourbon-Busset‎,
Bourbon-Condé‎,
Bourbon-Conti‎,
Bourbon-La Marche‎,
Bourbon-Maine‎,
Bourbon-Montpensier‎,
Bourbon-Parma‎,
Bourbon-Penthièvre‎l,
Bourbon-Two Sicilies,
Bourbon-Vendôme‎,
Bouvier Schlossberg,
Both, Bracciano, Braganza,
Braganza-Saxe-Coburg-Gotha‎, Brahe, Brandenburg,
Brandenburg-Ansbach‎,
Brandenburg-Bayreuth‎,
Brandenburg-Schwedt‎,
Brandenburg-Stendal‎,
Branicki (Gryf)‎,
Branicki (Korczak),
Breakspear/Breakspeare,
Brimeu, Broglie, Brockdorff,
Brouchoven,
Bruce/Bruis/Brix/Broase,
Bruck an der Leitha‎, Brunonids‎,
Brunswick-Bevern‎,
Brunswick-Wolfenbüttel‎,
Brzezinski, Bua, Buccleuch, Buffet, Bundy, Burgher,
Burgundi/Burgandy/ Burgundy,
Burgundy-Portugal‎, Bushati,
Bush/Scherff,
Bussche, Buxhoeveden, Buyak, Bülow, Byron, Bååt,

*C*
Cadaval, Caetani, Calogerà, Casimir Pulaski‎, Castiglioni, Casiraghi, Coste/Tossoukpé, Caccianemici dal Orso, Caccianemico, Cafritz, Campbell, Camondo, Cancellieri del Bufalo, Canella, Canossa, Cantacuzino, Caltagirone, Capet, Capizucchis, Caracciolo, Caracciolo di Torella, Caravaggio, Carnegie,
Cargill-MacMillian, Carrington, Carrillo, Carpelan, Castell‎, Castile, Castro, Cattaneo, Catii, Cavendish, Cavalier, Cavalieri, Chalon, Chalon-Arlay‎, Charlemagne,
Chasteler, Châteaudun, Châtillon, Chavchavadze, Chigi, Chigi-Rovere, Chigi-Albani-Della-Rovere, Chigi-Saracini-Lucherini, Chigi-Zondadari, Chimay,
von Chorinsky, Chołodecki, Chorinsky/Chorinský, Chotek‎, Churchill, Cecil, Celje‎, Cerruti (Zorreguieta), Cesi, Cesarini, Cirksena‎, Clark, Clary und Aldringen‎, Clermont-Tonnerre, Cobenzl, Cochran, Cohen, Colaianni, Collins, Colloredo-Mansfeld, Colonna, Colruyt, Conradin‎, Conti, Conti di Segni, Coimbra, Correia,
Corte-Real, da Costa Doria, Coste, Cotoner, Coudenhove-Kalergi‎,
Courtenay, Cox, Coxie‎, Creutz, Crivelli, Cromwell/Cromwelle/Cromville/Cromewell/Cromwill/Cromwille/Cromevill/ Cromnvell,
Croÿ, Crussol d’Uzès, Csaky, Csaky-Pallavicini, Cseszneky‎, Czartoryski, Czarniecki‎, Czernin‎, Czetwertyński, Curtis-Boks, Cutler, Cybo,

*D*
Dąbrowski (Radwan)‎, Dadiani, Daniłowicz, Danmarks Adels Aarbog,
Danneskiold-Samsøe, Dănești, Dampierre, D’Arpino, Dassanowsky, Dassel‎, D’Avignon, Davison, de Beaufort, De Berghes-Saint-Winoc, Decken, D’Este,
de Borbón y Vallabriga, De Borchgrave, de Burgh, De Clare, de Fieschi,
De Forest, de Goyon, de Goyon de Matignon, de Got, D’Harscamp,
De Medici, De Menil, de la Cerda‎, De la Roche, de Polignac, De Piro, De Rosette, Deering, Della Gherardesca, Del Balzo Orsini, Del Drago, Della Rovere, Denter, Derencsényi, De Vere, De Witte, De Warrenne, Dìaz, Di Bicci, Diepholz, di Morra, diNardo, Di Sciarra, diTella-Colaianni, Disney/Isigny, Dietrichstein, Dohna, Dohnányi, Dolgorukov, Domenichino,
O’Donovan/Ó Donnabháin/Donndubháin/Donovan/Donnabháin/Donevan/Donevane/Donovane/
Doria/de Auria/de filiis Auriae/de Oria/d’Oria, Doria d’Angri, Doria-Sachs,
Doria-Pamphili-Landi, Douaihy, Douglas, Douglas and Angus‎, Douglas-Hamilton,
Douglas-Pennant, Drăculești, Dragoș, Drašković, Dresselberg, Dreux‎, Drexel, Drummond, Ducal, Ducruet, D’Udekem, Dunaven, d’Udekem d’Acoz, Dudziński, Duke, Dukagjini, Dunkeld, Dunin, Duninowie‎, Durnovo, Du Pont, Dushmani,
Dutroux, Dyre, Działyński‎, Dzieduszycki (Sas)‎,

*E*
Edle von Eppenberg, Egerton, Egmond, Eggenberg, Ehrnrooth, Eisenstadt‎,
Eisenstadt-Umgebung, Eka, Ekkehardiner‎, Elmaleh, Eltz, Emichones/Emichonen,
Enríquez, Entença, Erbach, Erba-Odescalchi, Erbach‎, Erbach-Schönberg‎, Erdődy,
Erlanger, Ernuszt, Este/D’Este, Esterházy, Estridsen, Essen, Évreux‎, Ezzonids‎, Ezzonen‎,

*F*
Fabritius de Tengnagel, Faesch‎, Falkenhausen, Falkenskiold, Falsen, Farnese/Farnesi, Ferragamo, Feretti, Festetics, Ficquelmont, FitzClarence, FitzGeorge, Field, von Finck, Firlej, Fischer, FitzJames, Flagler, Flemming, Floridi,
Florestán Gero Crescencio, Franklin, Frankopan‎, Frazzini, Fredro (Bończa)‎, Freeman, Friedsam, Foix, Fontana, Forbes, Ford, Foscolo, Foster, Fieschi, Fornier, Fouché d’Otrante, Foucois, Fugger, Fugger-Babenhausen, Fürstenberg (Swabia),

*G*
Gadolin, von Gaffron und Oberstradam, Gagarin, Gambino, Garai, Gardēzī Sadaat‎,
Gattilusi, Gatti-Grami (Lombardy), Gaetani, Gaetano-Orsini, Gallarati-Scotti, Gelovani, Genoese, Genovese, Genovese-Getty, Gessler, Gherardini, Ghermezian, Ghibellines, Ghisi, Giedraitis, Gilman, Gisors, Giovanni, Giustiniani, Glücksburg/Glücksborg, Glymes, Gnuni, Graben von Stein, Grafen von Nellenburg, Grafen von Toggenburg, Gramont, Gravina, Green, Grenier, Griffins, Grimaldi, Grimaldi-Coste, Grimaldo, Grimaldo Canella, Grimoard,
Grocholski, Gropa, Grosvenors, Gruszecki (Lubicz)‎, Gryf, Gryfici (Świebodzice)‎, Goblet d’Alviella‎, Godoy, Gonçalves da Câmara, Gonzaga, Godwin, Golescu, Golitsyn, Gouyon/Goyon/Gouyon, de Goyon de Matignon, Gorchakov, Gordon, Gore, Gorizia, Gorm, Gosiewski (Ślepowron)‎, Gotti, Gottlieb, Gottorp-Romanov,
Goldsmidt/Goldsmith, Goodyear, Goubau, Gough-Calthorpe, Gould, Gualterio, Guggenheim, Guglielmo, Guelph, Guiness, Guise, Gundulić‎, Guramishvili,Gurgenidze, Güldencrone, Guttenberg‎, Gyldenkrantz, Gyldenpalm, Gyldenstierne, Gyllenhaal, Gwynedd, Göring,

*H*
Habsburg/Hapsburg/Habsburger, Habsburg-Lorraine, Hagen‎, Hainaut‎, Halifax, Hambro, Hamilton, Hanover/Hannover, Harcourt, Hardenberg, Harkness, Harrach, Harriman, Haro, Hapsburg, Hastings, Hatvany, Hattonid, Haugwitz, Hauteville, Hayden, Hearst, Henckel von Donnersmack‎, Henneberg, Hénin-Liétard‎, Herbert, Hesse, Hesse-Kassel, Hielmstierne, Higgins, Hildebrand, Hills, Hiort af Ornäs, Hippolyte Grimaldi, Hohenberg‎, Hohengeroldseck, Hohenlohe‎,
Hohenlohe-Ingelfingen‎, Hohenlohe-Kirchberg‎, Hohenlohe-Langenburg‎, Hohenstaufen‎, Hohenzollern, Hohenzollern-Haigerloch‎, Hohenzollern-Hechingen‎,
Hohenzollern-Sigmaringen‎, Hofmann von Hofmannsthal‎, Holstein-Gottorp-Romanov, Holstein-Rendsburg, Holland‎, Horn, Hornes, Horvat, Howard, Hoyos, Hrvatinić, Humboldt, Hunfridings‎, Huntington, Hunyadi, Hurwitz, Huwyler, Huxley, Hvide,
Hård af Segerstad,

*I*
Ibelin, Ilok‎, il Malvicino de Calveiso de’ Calvi, Imerys‎, Immedinger‎, Ingelger, Íñiguez, In der Maur/In der Mauer/Indermauer, Isenburg‎, Isenburg-Büdingen‎, Ivrea,

*J*
Jabłonowski, Jagiellon, Jagellonka, Jagiellonian, Jastrzębiec, Javanshir clan, Jelilta, Jiménez, Johnson, Jonima, Jülich‎, Jülich-Hengebach‎, Jägerhorn af Spurila,

*K*
Kaas, Kačić‎, Kadoorie, Kahn, Kahzarian, Kalākaua‎, Kalaimamahu‎, Kalckreuth,
Kalinowski, Kalokuokamaile‎, Kálnoky, Kamehameha‎, Kamieniecki (Pilawa)‎, Kamsarakan, Kantakouzenos, Karađorđević, Kątski‎, Kazanowski, Kavanagh, Kawānanakoa‎, Khalili, Khazen, Khilkov, Khevenhüller, Khuen, Khayami, Karadjordjevic, Karen‎, Keliimaikai‎, Kellogs, Keoua‎, Kennedy/Kannady/Kenardy/ Kennaday/Kenneday/ Kenneyday/Kennediem/ MacKennedy/MacUalraig, Ketteler, Kinsky, T’Kint de Roodenbeke, Kirkwood, Kissinger, Kiszka, Kleist, Klettgau, Kmita‎, Knagenhjelm, Krasicki‎, Krasiński, Kresge, Krupp, Koch, Koháry‎, Kosača, Kossakowski, Komnenos, Komorowski, Koniecpolski, Koła‎, Korecki, Kostka, Kourkouas, Kuncewicz, Kuhn, Kuhina Nui‎, Kur, Kurowie‎, Kyburger, Königswarter,

*L*
la Cerda, Lackfi, La Force, Lagergren, Lalaing, Lamberg‎, Lanckoroński,
La Rochefoucauld, Łaski, Laskaris, La Tour d’Auvergne, La Trémoille, Lakhmids, Lalaing, Lambert, Lambertazzi, Lancaster, Lannoy, Lara, Lasso de la Vega, of Laukko, Lazard, Lecubarri, Ledóchowski, von Ledske/Ledske/Ledské,
Lehman, Lee, Leijonhufvud, Leiningen, Le Normand de Bretteville, Lenzburg, León,
Lesser, Leszczyński, Leliwa, Leuchtenberg‎, Leyen‎, Li, Lichtenstein, Lichnowsky, Ligne‎, Ligęza‎, Lindenov, Lieven, Lilliehöök, Līloa‎, Limburg, Limburg-Stirum, Lippe, Lipski, Loeb, Lobkowicz, Lombard/Lombardy, Lord, Loon‎, Looz-Corswarem, Łopaciński, Lorraine/de Lorraine, of Louhisaari, Louvet, Lowry-Corry, Lubomirski, Ludovisi, Luisignan, Lusignan, Luitpoldings‎, Luxembourg, Luxembourg-Nassau‎,
Luxenburg‎/Luxenbourg, Luzzatti Fequiz, Luzzatto, Luxdorph, Lyon, Lynden,
Lüneburg‎, Lyttelton, Herren von Lägern, Løvenørn, Löwenstein-Wertheim, Löwenstein-Wertheim-Freudenberg‎, Löwenstein-Wertheim-Rosenberg‎,

*M*
Maase, MacDermot, MacMorrough, Maderno, Madi, Magalotti, Maggenberger, Mahidol, Maia, Maidalchini, Maizière, Makeléer, Małachowski (Nałęcz)‎,
Malaspina, Maleinos, Mamikonian, Mancini, Mandel, Mannerheim, Mandakuni, Manocherian, Mansfeld‎, Marcoartu, la Marck‎, Mars, Marwitz, Masci, Massalski, Massimo, Matsch, Mattei, Marescotti, Matignon/ Davignon/Grignon/Wagnon/Ratigan/Catino/Gagnon,
Matsch, Mattarazzo, Mattei, Mavrocordatos, Mavroleon, Maximii, Mazzini, McDonald, McGormick, McGillycuddy, McLean, Meaux, Mecklenburg‎,
Mecklenburg-Brunswick-Romanov‎, Mehmandarov, Meinhardiner,
Mensdorff-Pouilly‎, Mellon, Medici, Medinaceli, Medina Sidonia, Mehmandarovs,
Méndez de Sotomayor, Mendoza, Mensdorff-Pouilly‎, Menshikov, Merage, Merode, Merovingian, Metcalf, Métrode-Westerloo, Polignac, Metternich,
Meeûs d’Argenteuil, Meyer, Meyer zum Pfeil, Metternich‎, Mihranids‎, Mihran‎, Mielecki‎, Miełżyński, Mirimanidze‎, Mills, Milner, Mirimanidze‎, Mniszech, von Mitrowitz‎, Mocatta, Moctezuma, Moltke, Montagu, Montcada, Montefiore, Montechanin, Montgomery, Montefeltro, Montfort, Montmorency, Montlhéry et Le Puiset, Monpezat, Montezpat‎, Montesquieu, Moor, Morgan, Morgenstierne, Moro, Morosinis, Morsztyn, Moshir, Morzin, Mountbatten/Battenburg, Mowbray, Munso, Munthe af Muti, Mycielski,

*N*
Nádasdy, Namur‎, Nápoles, Narro, Nash, Nassau‎, Nassau-Siegen‎, Nassau-Weilburg‎,
Natt och Dag, Navarre, Neergaard, Nelipić‎, Neri, von Neuman, Neuenburg, Neville, Niederglatt-Blazon, Noailles, van der Noot, Nordenskiöld, Normandy, Nostitz, Nugent, Nuremberg‎,

*O*
O’Brien, Obolensky, O’Connell, O’Conor, Odescalchi, O’Donnell, O’Donovan, Odrowąż, Oettingen‎, Oettingen-Oettingen‎, Oettingen-Wallerstein‎,
Oettingen-Spielberg‎, Oettingen-Oettingen, Oldenburg, Oleśnicki‎, Olivares, O’Moore, O’Morchoe, O’Neill, Onassis, Oomkens von Esens‎, Oppenheimer, Opaliński, Opel, Orbeliani, Orange, Orange-Nassau, Orbeli, Orbelian, Orléans, Orléans-Braganza, Ormsby, Orlov, O’Rourke, Orsini/Orsi/Ursi/Orso/Urso/D’Orsi/Dorsi/D’Orso/Dorso/D’Urso/Ursich/Ursic/Orselli/Orsello/Orsetti/Orsatti/Orsolini/Orsolino/Orsoni/Ursillo/Ursini,
Orsini Bonacassi, Orsini del Balzo, Orsini-di Bracciano, Orsini-Rosenberg, Ortolani,
Ossoliński, Osorio, Ostaszewski, Ostroróg, Ostrogski, Ostoja, Osuna, Ottobonis, Ottoman, Ottonians, Oxenstierna,

*P*
Pac, Pace von Friedensberg, Pacelli, Pahlavi, Pahlavuni, Pahlen‎, Palaiologos,
Pamphili/Pamphilio/Pamphili/Pamphilij, Pantaléon, Palaiologina, Palaiologos, Palatinate, Palatinate-Birkenfeld, Palatinate-Neumarkt‎, Palatinate-Simmern‎, Palatinate-Zweibrücken‎, Palazzo, Pallavicini/Pallavicino/Paravicini, Pardo, Parentucelli, Parthon de von, Pappenheim, Papal, Patrasso di Guarcino, Patten, Patterson, Payne, Payseurs, Pavlović, Pejačević‎, Penrhyn‎, Percy, Perkins, Petrović-Njegoš, Phelps, Philanthropenos, Phipps, Phokas, Plantagenet, Plantard, Platen, Plater, Piast, Piccolomini, Piedmont, Pignatelli, Pillsbury, Pippinids‎, Piso, Pitcairn, Pitigliano, Pius, Plettenberg‎, von Plötzke, Pociej, Podiebrad, Poher, Poitiers, Poitiers-Lusignan‎, Polignac, Polignac-Matignon-Grimaldi, Pomerania‎, Poniatowski, Porse, Posse, Potocki, Pułaski/Pulaski‎, Pratt, Pranckh, Prefetti di Vico, Prignano, Pritzker, Prussia‎, Putbus, Puttkamer,

*Q*
Quarles van Ufford, Quirinal,

*R*
Raabs‎, Raahe‎, Radinović, Raczyński (Nałęcz)‎, Radziejowski (Junosza)‎, Radziwiłł/Radziwill, Rantzau, Razumovsky, Rauch, Reginar‎, Renesse‎,
van Renesse, Reuss, Reutern, Reventlow, Reynolds, Rhodes, Ribbentrop, Ribbing, Richthofen, Ripperda, Rizzuto, Roberti, Robertians, Rockefeller, Rothschild, Rocco, Roche, T’Kint de Roodenbeke, Rohan, Roussel, Rochefoucauld, Rochechouart, Rogers, Romanov, Rosenberg, Rosenkrantz, Rosenstråle, Rosenvinge, Rosenwald,
Rosetti, Rosso, Rospigliosi, Rospigliosi-Papal, Rostworowski (Nałęcz)‎, Rubenid, Rubens, Ruffo, Rufini, Rurik, Russell, Ruspoli, Ruspoli-Sueca,
Ruspoli-Boadilla del Monte, Ruspoli-Poggio Suasa, Ruspoli-Candriano,
Ruspoli-Morignano, Ruspoli-Fiano, Ryan, Rzewuski,

*S*
Saafeld, Saboulin Bollena, Sacchetti, Sachs, Sackler, Saint Omer, Salians, Salis‎,
Salm, Salm-Salm‎, Salviati, Samuel, Sanguszko, Sanković, Sanseverino, Santcliment, Sanudo, Sapieha, Saudi, Savva, Savoy, Savoy-Genovese, Sassanid, Sassoon, Savage,
Savelli, Savonarola, von Sax, Saxe-Coburg-Gotha, Saxe-Altenburg‎, Saxe-Gessaphe‎, Saxe-Gotha-Altenburg‎, Saxe-Hildburghausen‎, Saxe-Meiningen‎, Saxe-Merseburg‎,
Saxe-Weimar-Eisenach‎, Saxe-Weissenfels‎, Saxe-Coburg und Gotha‎,
House of Saxe-Coburg und Gotha, Braganza-Saxe-Coburg und Gotha‎,
Saxe-Coburg und Gotha, Saxe-Coburg-Gotha-Koháry‎, Braganza-Saxe-Coburg und Gotha‎, Saxe-Coburg-Gotha-Koháry‎, Braganza-Saxe-Coburg und Gotha‎,
Saxe-Coburg und Gotha, Saxe-Altenburg‎, Saxe-Gessaphe‎, Saxe-Gotha-Altenburg‎,
Saxe-Hildburghausen‎, Saxe-Meiningen‎, Saxe-Weimar-Eisenach‎, Saxe-Weissenfels‎,
Saxe-Coburg-Gotha-Koháry‎, Saxe-Coburg-Gotha-Windsor, Sayn-Wittgenstein, S.C.Johnson, Shalikashvili, Sheremetev, Shervashidze, Schauenburg‎, Schetz, Schirach, von Schmettow, Schleswig-Holstein-Sonderburg-Beck‎, Schleswig-Holstein-Sonderburg-Beck‎, Schleswig-Holstein- Sonderburg-Augustenburg,
Schleswig-Holstein-Sonderburg-Glücksburg, Von Schantz, Schauman, Schiaratura, Schiff, von Schmettow, Schulman, Schultz, Schutzbar genannt Milchling, Schwartz, Schwarzenberg, Schwarzburg‎, Schwerin‎, Schroeder/Schröder, Schönborn, Schönburg, Schönaich-Carolath‎, Schönburg, Schönburg-Glauchau‎,
Schönburg-Waldenburg‎, Schönburg-Glauchau‎, Schönburg-Waldenburg‎,
Scolari, Seaf, Seinsheim, Serlupi, T’Serclaes‎, Seymour,
Sforza/Szfora/Szfore/Szfori, Siemens, Sienese, Sinclair/Saint Clair/Saint-Clair/
Sielecki (Sas)‎, Sieniawski, Sievers, Silva, Simonetti, Skancke, Skleros, Sloane, Snoy, Snoy et d’Oppuers, Sobański‎, Sobieski, Solms‎, Solms-Baruth‎, Solms-Braunfels‎, Solms-Hohensolms-Lich‎, Solms-Laubach‎, Sołtyk, Solvay, Somaglia, Sorkočević, Sozzini, Spadafora, Spandiyadh‎, Spani, Sparre, Spata, Spencer, Spinola, Spinola-Doria, Spoelberch, Sponheim, Stanley, Starhemberg, Stauffenberg, Stein, Stenbock, Stern, Sternberg, Stewart, Stillman, Stimson, Stolberg, Storrow, Stratford, Strathmore, Strong, Strozzi, Stuart, Sturdza, Stockfleth, Šubić‎, Sułkowski, Suren‎, Suor Orsola, Sousa, Szczuka‎, Szeptycki, Szydłowiecki‎, Szydłowski, Svanenhielm, Sverre, Svinhufvud, Swabia, Sweetman, Swynford, Süpplinburger‎,

*T*
Taczanowski, Taft, Tagle, Thiersteiner, Talbot, Talleyrand-Périgord, Tanche, Tarentaise, Tarth, Tarło, Tarnowski (Rola)‎, Taronites, Tassis, Taye, Theodoli, Theotokis, Thiersteiner, Thun und Hohenstein‎, Thurn und Taxis, Thurzó, Tęczyński, Terlinden, Tetrode, Timken, Tocco, Tollemache, Tolstoy, Tomicki (Łodzia)‎, Topchubashi, Toptani, Torlonia, Tossoukpé, la Tour d’Auvergne‎, Traba, Trampe, Trapp, Trastámara‎, Trazegnies, Treschow, Trolle, Toulouse, T’Serclaes‎, Tudor,
Thun und Hohenstein, Turner, Tuyll, Tycho Brahe‎, Tyndall, Tyson,

*U*
Umhaill, Umiastowski, Ungern-Sternberg, Urach, Ursel, Ustrzycki, Uyunid,

*V*
Văcărescu, Valentinois, Valeri, Valkendorf, Valois-Anjou‎, Valois-Alençon‎,
Valois-Burgundy‎, Valois-Burgundy-Brabant‎, Valois-Burgundy-Nevers‎,
Valois-Orléans‎, Valois-Saint-Remy‎, Vanderbilt, Van Duyn, Van der Noot,
Van Voorst tot Voorst, van de Werve, Varazhnuni, Varnhagen, Vasa, Vascello, Vatatzes, von Vaz, Ventimiglia, Verhaegen, Vermandois, Vianden‎, Vilain XIIII, Villani, Villehardouin, Visconti/Visconte/Bisconti/Viceconte/Viceconti/Viseconte/Viscont,
Viguera, Villagómez, Visigoths, Vittoria, Vittoria-Pallavicini, Vlastos, Vlora, Vrioni, Vukčić,

*W*
Wachtmeister af Johannishus, Wadsworth, Waldeck et Pyrmont, Waldgrave/Wildgrave, Waldburg‎, Waldeck‎, Waldeck and Pyrmont‎, Walderdorff, Waldorf, Waldstein‎, Walewski‎, Walton, Warburg, Warburg Del Banco, Wartenburg‎, Wassenberg‎, Watson, von Waxenstein, Weber, Werdenberg, Weems, Weimar‎, Welf‎, Welfs, Weill, Welser‎, Wells, Wenckheim, Werdenberg, Werenskiold, van de Werve‎, Wessex, von Westernhagen, Wettin, Weyerhaeuser, Wichfeld, Whitney, Widener, Wied‎, Wied-Neuwied, Wielhorski, Wielopolski, Wiesbaden, Wiesiołowski, Wimpffen‎, Windisch-Graetz‎, Winthrop, Windisch-Graetz, Wiśniowiecki, Wittelsbach, Windsor-Saxe-Coburg-Gotha, Wittelsbach, Wittgenstein, Worms,
Woodville, Wormwood, Woyna, von Wright, Wróblewski (Ślepowron)‎,
Wróblewski (Lubicz)‎, Wurttemberg/Württemberg, Württembergian, Wysłouch,

*X*

*Y*
Yorck von Wartenburg‎, York, Ypsilantis, van Ypersele de Strihou, Yuryevsky, Yusupov,

*Z*
Zakarids‎, Zamoyski, Zasławski, Zápolya, Zbaraski, Zborowski, Zebrzydowski‎, Zedlitz, Zenevisi, Zierotin, Zogu, Żółkiewski, Zorreguieta (Cerruti), Zrinski‎, Zubov, Zuccari, Zúñiga, Zuniga-Valero, Zähringen/Zähringer,

*Å*

*Ä/Æ*

*Ö*
Örnsparre,

*A*
#Acquafondata
#Agnelli
#AgnelliElkann
#Alba
#Aldobrandini
#AlexandrineMontechanin
#Altavilla
#Allucingoli
#Angelerio
#Anhalt
#Anicii
#Astalli
#Astakai
#Asti
#Astor / #Astarte / #Astorga / #Ashdor
#Aragona
#Archbold
#Arduinici
#Arianiti
#Aubert
#Audley
#Aumont
#AustriaEste

*B*
#Baden
#Baker
#Banchieri
#Barberini
#Bardi
#Bariatinsky
#Baruch
#Battenburg / #Mountbatten
#Bedford
#Benjamin
#Bernadotte
#Berwind
#Blanchefort
#Blazon
#Blumenthal
#Bizzaccheri
#Bracciano
#Braganza
#Breakspear / #Breakspeare
#Bruce
#Brzezinski
#Bobone
#Bonaparte
#Borghese
#Borgia
#Borromeo
#Bourbon
#BouvierSchlossberg
#Bundy
#Burgundi
#Bush / #Scherff
#Buyak

*C*
#Caetani
#Caltagirone
#Canossa
#CancellieriDelBufalo
#Capet
#Caravaggio
#Carnegie
#CargillMacMillian
#Castiglioni
#Catii
#Cattaneo
#Cavalier
#Cavendish
#Chigi
#ChigiAlbaniDellaRovere
#ChigiRovere
#ChigiSaraciniLucherini #ChigiZondadari
#Cesarini
#Clark
#Cochran
#Cohen
#Collins
#Colonna
#Conti
#ContiDiSegni
#Cox
#Cromwell / #Cromwelle /#Cromville / #Cromewell / #Cromwill / #Cromwille / #Cromevill / #Cromnvell
#Csaky
#CsakyPallavicini
#CurtisBoks
#Cutler
#Cybo

*D*
#D’Arpino
#Deering
#deBeaufort
#DeFieschi
#DeForest
#deGot
#deGoyon
#deGoyonDeMatignon
#DeMedici
#dePolignac
#DeRosette
#DellaRovere
#Dìaz
#DiBicci
#diMorra
#diNardo
#DiSciarra
#Disney / #Isigny
#diTellaColaianni
#Drexel
#Domenichino
#DoriaSachs
#DoriaPamphiliLandi
#Duke
#DuPont

*E*
#Elmaleh
#Este

*F*
#Farnese
#Field
#FitzJames
#Fischer
#Flagler
#Franklin
#Frazzini
#Freeman
#Friedsam
#Fontana
#Ford
#Foster

*G*
#Gambino
#GattiGrami / #Lombardy
#Gaetani
#Genoese
#Genovese
#GenoveseGambino
#Getty
#Ghermezian
#Ghibellines
#Glücksburg
#Gisors
#Giovanni
#Giustiniani
#Gotti
#GottorpRomanov
#Goldsmidt / #Goldsmith
#Gould
#Goodyear
#Green
#Grimaldi
#GrimaldiCoste
#Grosvenors
#Guggenheim
#Guglielmo
#Guelphs
#Guiness / #Guinness

*H*
#Hanover
#Harkness
#Harriman
#Hayden
#Habsburg / #Hapsburg
#HabsburgLorraine,
#Hearst
#Hesse
#HesseKassel
#Higgins
#Hills
#Hippolyte
#Hohenzollern
#Huntington
#Hurwitz

*I*
#Ivrea

*J*
#Jagiellon
#James
#Johnson
#Jimenez

*K*
#Kahn
#Khalili
#Kahzarian
#Khayami
#Kadoorie
#Kellogs
#Kennedy / #Kannady / #Kenardy / #Kennaday / #Kenneday / #Kenneyday / #Kennediem /
#MacKennedy / #MacUalraig
#Kirkwood
#Kresge
#Koch
#Krupp
#Kuhn

*L*
#Landi
#Lazard
#Lehman
#Lesser
#Lee
#Li
#Lichtenstein
#Lombard
#Lombardy
#Lorraine
#Ludovisi
#Luisignan

*M*
#Maderno
#Maidalchini
#Manocherian
#Marescotti
#Maximii
#Mars
#Massimo
#Mattei
#Mavroleon
#McDonald
#McGormick
#McLean
#Medici
#Mellon
#Merage
#Merovingian
#Metcalf
#Mills
#Mocatta
#Montechanin
#Montefiore
#Montgomery
#Montpezat
#Montesquieu
#Morgan
#Morosinis
#Moor
#Moshir

*N*
#Nash
#Nassau
#NiederglattBlazon

*O*
#Oldenburg
#Onassis
#Oppenheimer
#Orange
#OrangeNassau
#Orsini / #Orsi / #Ursi / #Orso / #Urso / #D’Orsi / #Dorsi / #D’Orso / #Dorso /
#D’Urso / #Ursich / #Ursic /
#Orselli / #Orsello / #Orsetti / #Orsatti / #Orsolini / #Orsolino / #Orsoni / #Ursillo / #Ursini
#OrsiniDiBracciano

*P*
#Pahlavi
#Palazzo
#Pamphili / #Pamphilio / #Pamphilij
#Pallavicini
#Paravicini
#Papal
#Patten
#Patterson
#Parentucelli
#Payseurs
#Perkins
#Phipps
#Plantagenet
#Plantard
#Piedmont
#Pitcairn
#Pratt
#PrefettiDiVico
#Pritzker
#Poher

*Q*
#Quirinal

*R*
#Radziwiłł
#Reynolds
#Rockefeller
#Rocco
#Roche
#Rochefoucauld #Rochechouart
#Rothschild
#Rogers
#Romanov
#Rosenwald
#Rospigliosi
#RospigliosiPapal
#Roussel
#Russel
#Ruspoli
#RuspoliSueca
#RuspoliBoadilladelMonte
#RuspoliPoggioSuasa #RuspoliCandriano
#RuspoliMorignano
#RuspoliFiano
#Rufini
#Ryan

*S*
#Saafeld
#Sacchetti
#Sachs
#Samuel
#Sassoon
#Saudi
#Savelli
#Savoy
#SavoyGenovese
#SaxeCoburgGothaWindsor
#SCJohnson
#Schiaratura
#Schiff
#Schroeder / #Schröder
#Schwartz
#Schwarzenberg
#Scolari
#Sforza / #Szfora / #Szfore /#Szfori
#Serlupi
#Sienese
#Sinclair / #SaintClair
#Sloane
#Somaglia
#Solvay
#Stern
#Stillman
#Storrow
#SuorOrsola

*T*
#Taft
#Tarth
#Tarentaise
#Theodoli
#ThurnUndTaxis
#Timken
#Torlonia
#Tossoukpé
#Trastamara
#Tyson
#Tudor

*U*

*V*
#Valentinois
#Valeri
#ValoisAnjou
#Vanderbilt
#VanDuyn
#Vascello
#Villani
#Visconti / #Visconte /#Bisconti / #Viceconte / #Viceconti / #Viseconte / #Viscont
#Vittoria
#VittoriaPallavicini

*W*
#Walton
#Warburg
#WarburgDelBanco
#Watson
#Weber
#Weems
#Wettin
#Widener
#WindsorSaxeCoburgGoete
#Winthrop
#Whitney
#Wittgenstein
#Wittelbach
#Worms
#Wurttemberg

*X*

*Y*
#York

*Z*
#Zogu
#Zuccari
#ZunigaValero

*Ö*
#Örnsparre


trilateral-commission-and-technocracy-21063203336.jpg

jesuieten-structuur792981513.jpg

ab4fe89ef0.gif

elite_network175975531.jpg

globalist-jewish-elite1966741801.jpg

dbfnxxbvwaajqzn13923192.jpg

img3017938862080813845.jpg

the american empire & it's corrupted media outlets315682125..png

isis2133906159-11495674917.png

cfr-imperial-council-hdm200955234-1636547301.png

screenshot_2019-01-29-01-01-10711826515200706734.png

img_20180725_050310_590-1866238735529740925.jpg

0-hierarchy1664473246310305733.jpg

AddText_04-18-05.29.29

CollageMaker_20190420_134752936

shj

b200911i1

Sons of israel ydna

Sons of israel ydna (1)

3456dcb6254ca468e7762c4193403759--bible-tools-bible-truth

20181217_223331_HDR

567px-ihs-logo-svg

img(19)

img(54)

img(48)

maxresdefault

img(57)

img(72)

img(4)

img(93)

img(104)

img(105)

img(65)

img(120)

img(122)

img(108)

06bece78e5b7d4ae7a455c759be59c1c

img(121)

barack obama, donald trump, hillary clinton_ who’s the fascist_573506509..jpg

cfr-media-network-hdv-spr1728740794788429544.png

Watch “The Narcissist’s Family Cult” on YouTube

https://youtu.be/sWY05MadRJk

*Tags:*

#EXPOSING
#SatanicEliteBloodlines #BlackNobility #BlackNobilities #NobilityFamilies #NobilityBloodlines #NobilityHouses #FamilyNames #Family #Names #list #EXPOSED

HILLARY CLINTON IS GUILTY IN MORE THAN ONE ACCUSATION… – ANONYMOUS WORLDWIDE UNITED

“HILLARY CLINTON IS GUILTY IN MORE THAN ONE ACCUSATION…”

:)

https://anonymousworldwideunited.wordpress.com/2018/08/06/7207/

THE SECRET MEANINGS OF THE SYMBOLS USED BY THE SECRET SOCIETIES…

THE SECRET MEANINGS OF THE SYMBOLS USED BY THE SECRET SOCIETIES…


 

● ROSE = Secretcy / Lucifer

● CROSSED SWORDS = Secretcy,

● HAMMER & SICKLE = Communism (satanism)

● MOTHER & INFANT (Catholisism) = Isis & Horus

● TRIANGLE(S) = (The 4 elements in wicca) Air, Water, Earth, Fire / Trinity; Isis, Horus and Seth 

● ANKH (cross) = Sun worship, the feminine sex-organ

● KEY(S) =

● OBERLISK = Phallic symbolism / Male sex-organ

● SUN, MOON & STARS =
Astrology

● CRESENT MOON = The Northern Star/Venus (Lucifer)

● PINE CONE = The Pineal Gland

● BLACK CUBE = Saturn / Hexagon

● HEXAGON = Saturn / Black Cube

CLOCK = Eternity / Kronos / Time travel

SERPENT = Lucifer / Satan /
The Devil 


37716329-baal-vintage-engraving-old-engraved-illustration-of-baal-the-phoenician-god-carrying-a-child-.jpg300px-Messenoire.jpgAddText_05-20-09.39.18.PNGblog1345426355.jpgimg(58)img(59)img(63)img(64)img(60)img(54)img(20)AddText_04-20-01.56.17AddText_04-20-01.56.55AddText_04-20-02.05.38AddText_04-22-10.26.48AddText_04-22-10.28.18axihcv3q8gx01.jpgimg_20190423_181445_0241049618407.jpgimg_20190427_170745_168599849074.jpgaddtext_04-16-051857354370.pngbarack obama, donald trump, hillary clinton_ who’s the fascist_573506509..jpgsat567ygy981554800.jpg46846420_289123275055249_7316379960633725475_n.jpgimg_20190508_122800_493385699355.jpgcake day dnd dump (mostly)333736251..jpgpicture7-2536781729.pngimg_20190228_230149_477737653006145678531.jpgihs1426813152.jpgfc,550x550,white1282803420..jpgsex-symbol2452347454.jpgexcerpt_el_diablo_large1565485503.jpg666pyramides.gifscience-of-magic.gifessenes.gif0-hierarchy1363101503861212449.jpgimg_20190211_192118_870-2561034052.jpgchill pill custom headband! choose a design, design color and fabric color!1139986608..jpgSYMBOLS.jpgTHE GREAT WORK.pngaddtext_11-14-061288678887.pngaddtext_11-15-011447481114.pngaddtext_11-15-011832596302.pngaddtext_11-15-0142142343.pngaddtext_11-14-05389683363.pnghqdefault(2)1593883539.jpgaddtext_11-14-051706871254.pngimg_20190218_195103_8411634189022.jpgimg_20190218_195209_6961476571925.jpgimg_20190218_195455_9541895995206.jpgthe ancient egyptians knew how to unleash the power of the pineal gland _ ancient code-1575103537..jpgimg(4)998990144.jpgimg_20190324_092745_4182111295687.jpgabb1f32ff72db1ef6548c43d36672d05-1453661084.jpg27bc8c001411e7029065b857530c2986-11046510256.jpgebb7ba1844be70997552058a0673aa1a-11811718869.jpgafeeeb54f6852e0a93cfe988be209acf-11252291553.jpg17626102-1198462186919816-1741378291588251846-n84269673.jpegsceau-eu2.gifessenes.gifsex-symbol2544576674.jpg537635-3396298025734-576650484-n2071937562.jpg526232-3436682915331-991666066-n170604635.jpgdenver-airport-masonic-engraving2141519421.jpg380428-502477513100442-900750299-n601266872.jpgimg1041323187.jpgimg(2)723082626.jpgihs1755934610.jpg149448-3396298425744-1161513661-n2044548581.jpg532318-236242733185661-479406896-n2068873274.jpg2019-03-04-23-20-33217900796751732258318.jpg8d74c74b2b1974661c6899e9f9b8f99d1340295007346158960.jpgscreenshot_2019-03-26-06-45-20285354613.pngimg_20181007_104608_26717902516.jpgwcasraswgi511506897496.pngaddtext_04-23-011743046926.pngtemplar914641551.jpgvq5391x6templar714285770.jpgSRA IS REAL_18Screenshot_2018-07-25-06-19-18whoPicture3Screenshot_2018-07-09-07-33-31Screenshot_2018-07-03-07-07-34Cool Text - The DuPont Bloodline 294206915623652Screenshot_2019-01-29-01-01-10 (2)20190102_153706img_20190314_201559_1281800992458.jpgkisspng-flags-of-the-holy-roman-empire-germany-holy-roman-5b26be2d9800981295748688.jpgquaterionenadler_david_de_negker935481535.pngimg(1)921458168.jpgimg_20190129_011449_5331464016238.jpgimg_20190218_195209_6961319859806.jpgimg_20190218_195123_2521735904720.jpgimg_20190218_195103_841875087666.jpgimg_20190218_195331_5611375259162.jpgimg_20190207_071650_7942138821126.jpgskullbones322cia-logo-black-and-whiteVATICANBook of the dead-translated into englishVatican.jpgAdrenochrome = Walnut Sauce

 

“THE REPTILIAN ROOTS OF PEDOPHILIA”..

ANONYMOUS WORLDWIDE UNITED

“THE REPTILIAN ROOTS OF PEDOPHILIA”..

Watch “The Reptilian Roots of Pedophilia” on YouTube

Below is an article about this topic:

https://www.bibliotecapleyades.net/sumer_anunnaki/reptiles/reptiles90.htm

ILLUMINATED=SODOMIZED

View original post

WAKE UP! – WE ARE ALL ENSLAVED! IT’S TIME TO FIGHT BACK! — ENVIROMENT & HEALTH ISSUES WORLDWIDE

WAKE UP! – WE ARE ALL ENSLAVED! IT’S TIME TO FIGHT BACK! FREEDOM & JUSTICE IS ONLY AN ILLUSION – WE ARE NOT FREE… • We cannot move around freely • We cannot live where we choose to live.. …without identification, passports/drivers licence/ green card/working permit/ visa ir other government approved documentatation.. • We have […]

via WAKE UP! – WE ARE ALL ENSLAVED! IT’S TIME TO FIGHT BACK! — ENVIROMENT & HEALTH ISSUES WORLDWIDE 


e9d9eec190b3027afa046413eb93180b-13867455022019-04-19-11-17-01~2

THE FREE MASONRY & THE PINEAL GLAND

THE FREE MASONRY & THE PINEAL GLAND


Why are there 33 levels of Free Masonic degrees, in the religion and knowledge of Free Masonry?


c1a91ae1482f176c624098dd0e7f1469


The 33 degrees represents the anatomical structure in the human spine, from bottom rising up towards the top.. (root chakra, Kundalini spirit, rises in through the root chakra (the sacum) first when a member of Free Masonry will learn the final and essential secret of the secret society and it’s true religion , philosophy and magic knowledge. The final secrets of the Masonic beliefs and rules he will discover that the final test will be a physical practice of being sodomized and sodomize himself. This is one of the darker secret occult knowledges because it contains raping innocent children and collect the body fluids from perpetrator and victim on a hankerchief, traumatising the victim with violent rape is a cold blooded technique, used by the satanic elite bloodline families to create dissociation with the minds of their children. The same sinister technique is also used by handlers in Monarch Programming (trauma based mind control) among with others torture techniques, psychoactive drugs, sleep deprivation, sense-deprivation and hypnosis, this techniques is based on descriptions originated in the Egyptian book of the dead. The luciferians participates in pedophilia (satanic ritual abuse) ritualistic cannibalism, blood drinking (spirit cooking) and murder (sacrifice) of children. And it is based on Aleister Crowley’s published writings of sex magick and Thelma the great work. Aleister Crowley studied this on his honeymoon in Egypt in 1904. These occult rituals is traced back through history to the ancient Egypt). Ritualistic murder of children was also practiced by the phoenicians. 

 

*According to researcher and professor Piero Bartoloni by the Cultural of Phoenician and Punic Studies, Rome, these sacrifices of children never took place and he claims that phoenician sacrifices of their children is a myth which is fictive stories.
We know that this is a false statement if it’s based on unprofessional ignorance through a arrogant, rigid perspective and personal opinion or if it’s a lie, fabricated to protect the elite bloodline families secret criminal occult activities. If this is the case, he is supporting the cover-up manufactured by the the Black Nobility themselves to protect their dark criminal secrets.*

 

The satanic luciferian elite bloodlines are convinced that the programming of a human being is a must, to enter the hidden plain of knowledge. To become enlighted and to become a part of the Illuminati elites secret society clan. They belives that this will seal a spiritual contract of loyalty towards the clan, and discresion about the huge secret of what the secret really is..

They believe that their hideous acts will make their children re-born into luciferianism (satanism) and that their act of offering their childrens souls to Lucifer will please him enough to give them magic powers, more wealth and power and imortality. They converse their bloodlines to become followers of Lucifer instead of Jesus Christ and God.

The satanic luciferian elite bloodlines are convinced that the programming of a human being is a must, to enter the hidden plain of knowledge. To become enlighted and to become a part of the Illuminati elites secret society coven. They belives that this will seal a spiritual contract of loyalty towards their coven, and discresion about the huge secret of what the secret really is.. The sexual abuse

sodomy and dissociation experience within the victim, represents being reborn, to Lucifer instead of Jesus Christ and God. according to the luciferians. They sell the soul of their children to Satan with this occult procedure.

DISSOCIATION OF THE VICTIMS MIND..

Dissociation of the mind of the victim, a young child is being activated by the pain that the child experience, this is also referred to as the “white light” or the illumination of the child.

Because when the child is raped by sodomy, he/her will see a white light, when a nerve in the lower region of the spine is traumatized.

The satanic luciferian elite bloodlines are convinced that the programming of a human being is a must, to enter the hidden plain of knowledge. To become enlighted and to become a part of the illuminati elites secret society clan. They belives that this will seal a spiritual contract of loyalty towards the clan, and discresion about the huge secret of what the secret really is..


Quote:

“SEX & THE SECRET NERVE”

There’s a hermetic principle that states, “As above so below”. So if there’s a zodiac above with twelve constellations, there’s likewise there must be a human Zodiac below, and there is, our twelve pairs of craniel nerves. However there’s another nerve called the Zero Nerve or Nervous Terminalis. Although less talked about, it could hold the key to discovering our divinity. This Zero Nerve is responsible for smell and pheromones, it’s been dubbed “Sex and the Secret Nerve”. Now if we compare this nerve to the thirteen sign, ‘Serpentarius’ (Ophichus);
Serpent bearer… The serpent slayer takes on a whole new meaning. Through this nerve, Ophichus is the light bearer! The Hebrew word for serpent is nachash, as an adjective it translates to “shining one”.(Illuminated/Illumination/ Enlightened)


MEANING OF THE WORD; ILLUMINATED/ILLUMINATION..

Illuminati >> Illuminated >> illuminate /ɪˈl(j)uːmɪneɪt/

verb

past tense: Illuminated; past participle: Illuminated

1.
light up.

example with the word; Illuminated in a sentence:

“A flash of lightning illuminated the house”.

SYNONYMS: light, light up, throw light on, cast light upon, brighten, make brighter, shine on, flood with light, floodlight, irradiate;

literary: Illumine

example with the word; Illuminated in a sentence:

“The bundle of clothes was illuminated by the officer’s torch”.

ANTONYMS: darken

example with the word; Illuminated in a sentence:

“Decorate (a building or structure) with lights for a special occasion”.

2.
(To) decorate (a page or initial letter in a manuscript) with for example gold, silver, or coloured designs.

SYNONYMS: decorate, illustrate, embellish, adorn, ornament, enhance, emblazon, highlight

example with the word; Illuminated in a sentence:

“The manuscripts are illuminated in brilliant inks”.

3.
help to clarify or explain.

“A most illuminating discussion”.

SYNONYMS: clarify, elucidate, explain, reveal, make clear, shed light on, cast light on, give insight into, clear up;

MORE DEFINITIONS:

make explicit, spell out,
explicate, expound, rationalize

example with the word; Illuminated in a sentence:

“Documents often illuminate people’s thought processes”.

DEFINITION/MEANING:

informative, enlightening, revealing, explanatory, instructive, instructional, helpful, educational, educative, edifying, rewarding, enriching…

example with the word; Illuminated in a sentence:

“An illuminating account of the writer’s style”.

ANTONYMS: conceal,
confuse

ORIGIN:

Late Middle English: Added to the english language from the Latin adjective; illuminat-‘illuminated’, it originates from the verb illuminare, from in- ‘upon’ + lumen, lumin- ‘light’


Tags:
#ADRENOCHROME #BAAL #LuciferianPedophiles #OrganizedPedophilia #HumanSacrifice #BloodSacrifice #ChildAbuse #OrganHarvesting #SatanicRitualAbuse #SatanicSacrifice #SatanicCannibals #cannibalism #KundaliniSpirit #KundaliniCoil #SerpentSpirit #ThirdEye #SeatOfTheSoul #PinealGland #Illumination #Illuminated #illumination #Stargate #RA


THE FREE MASONRY & THE PINEAL GLAND

_____________________________

Why are there 33 levels of Free Masonic degrees, in the religion and knowledge of Free Masonry?

_____________________________

The 33 degrees represents the anatomical structure in the human spine, from bottom rising up towards the top.. (root chakra, Kundalini spirit, rises in through the root chakra (‘the sacrum’), first when a member of Free Masonry will learn the final and essential secret of the secret society and it’s true religion , philosophy and magic knowledge. The final secrets of the Masonic beliefs and rules he will discover that the final test will be a physical practice of being sodomized and sodomize himself.

This is one of the darker secret occult knowledges because it contains raping innocent children and collect the body fluids from perpetrator and victim on a hankerchief, traumatising the victim with violent rape is a cold blooded technique, used by the satanic elite bloodline families to create dissociation with the minds of their children. The same sinister technique is also used by handlers in Monarch Programming (trauma based mind control) among with others torture techniques, psychoactive drugs, sleep deprivation, sense-deprivation and hypnosis, this techniques is based on descriptions originated in the Egyptian book of the dead. The luciferians participates in pedophilia (satanic ritual abuse) ritualistic cannibalism, blood drinking (spirit cooking) and murder (sacrifice) of children. And it is based on Aleister Crowley’s published writings of sex magick and Thelma the great work. Aleister Crowley studied this on his honeymoon in Egypt in 1921. These occult rituals is traced back through history to the ancient Egypt). Ritualistic murder of children was also practiced by the phoenicians.
According to researcher and professor Piero Bartoloni by the Cultural of Phoenician and Punic Studies, Rome, these sacrifices of children never took place and he claims that phoenician sacrifices of their children is a myth which is fictive stories.
We know that this is a false statement if it’s based on unprofessional ignorance through a arrogant, rigid perspective

and personal opinion or if it’s a lie,

fabricated to protect the elite bloodline families secret criminal occult activities. If this is the case, he is supporting the cover-up of the the Black Nobility.

The satanic luciferian elite bloodlines are convinced that the programming of a human being is a must, to enter the hidden plain of knowledge. To become enlighted and to become a part of the Illuminati elites secret society clan. They belives that this will seal a spiritual contract of loyalty towards the clan, and discresion about the huge secret of what the secret really is.. The sexual abuse

sodomy and dissociation experience within the victim, represents being reborn, to Lucifer instead of Jesus Christ and God. according to the luciferians. They sell the soul of their children to Satan with this occult procedure.
DISSOCIATION OF THE VICTIMS MIND..
Dissociation of the mind of the victim, a young child is being activated by the pain that the child experience, this is also referred to as the “white light” or the illumination of the child.

Because when the child is raped by sodomy, he/her will see a white light, when a nerve in the lower region of the spine is traumatized.

The satanic luciferian elite bloodlines are convinced that the programming of a human being is a must, to enter the hidden plain of knowledge. To become enlighted and to become a part of the illuminati elites secret society clan. They belives that this will seal a spiritual contract of loyalty towards the clan, and discresion about the huge secret of what the secret really is..

They relate the sexual abuse to being reborn, to Lucifer instead of Jesus Christ and God.
Quote:

“SEX & THE SECRET NERVE”

There’s a hermetic principle that states, “As above so below”. So if there’s a zodiac above with twelve constellations, there’s likewise there must be a human Zodiac below, and there is, our twelve pairs of craniel nerves. However there’s another nerve called the Zero Nerve or Nervous Terminalis. Although less talked about, it could hold the key to discovering our divinity. This Zero Nerve is responsible for smell and pheromones, it’s been dubbed “Sex and the Secret Nerve”. Now if we compare this nerve to the thirteen sign, ‘Serpentarius’ (Ophichus);

Serpent bearer… The serpent slayer takes on a whole new meaning. Through this nerve, Ophichus is the light bearer! The Hebrew word for serpent is nachash, as an adjective it translates to “shining one”.
__________________________________

Show quoted text

__________________________________

.

.

Show quoted text

5*#SATANIC ELITE BLOODLINE FAMILIES — UPDATED LIST OF NAMES OF THE SATANIC ELITE BLOODLINE FAMILIES—LIST OF NAMES—THE RULING SATANIC ELITE FAMILIES ARE:

5*#SATANIC ELITE BLOODLINE FAMILIES — UPDATED LIST OF NAMES OF THE SATANIC ELITE BLOODLINE FAMILIES—LIST OF NAMES—THE RULING SATANIC ELITE FAMILIES ARE:

*A*
Acquafondata, Agnelli, Agnelli-Elkann, Alba, Aldobrandini, Alexandrine-Montechanin, Aleramici, Altavilla, Allucingoli, Alaouite, Al-Abbasi, Al Khalifa,
Al-Sabah, Al-Falasi,
Al Ghardaqa, Angelerio, Ansbach, Altoviti, Anhalt, Anicii, Anguillara, Angevin, Angoulème, Anjou,
Anjou-Capetian, Aspenäs,
Asti, Astor/Astarte/Astorga/Ashdor, Astalli, Astakai, Asturias-Cantabria, Aragona, Aragon, Aragonese, Arenberg, Archbold, Arduinici, Arianiti,
Arsacid, Artsruni, Artaxiad,
Árpád, Arslan, Austria-Este, Aubert, Audley, Aumont, Austria-Este, Averill, Aviz,
*B*
Baden, Bagrat, Bagratuni, Bagrationi, Banér, Bardi, Bracciano, Baker, Banchieri, Barbarossa, Barberini, Barcelona, Bariatinsky, Barlow, Baruch,
Battenburg/Mountbatten, Bedford, Benjamin, Berwind,
Bernadotte, Bese, Beaufort Bielke, Bivinids, Bizzaccheri,
Bjelbo, Björn, Blanchefort, Blason, Blazon,
Blois, Blumenthal,
Bobone-Orsini, Bohemian, Boers-Lyon, Boleyn,
Bonaparte, Boncompagni,
Boncompagni-Ludovisi, Bogoria, Borghese, Borgia, Borja, Borjigid, Bokassa, Bonde, Bosonids, Brion, Brunswick-Luneburg, Boccasini, Boniface, Borromeo, Borghese, Bouillon, Bourbon, Bourbon-Parma, Bouvier Schlossberg, Braganza, Bruce/Bruis/Brix/Broase,
Breakspear/Breakspeare,
Brzezinski, Buffet, Bundy, Burgundi/Burgandy/ Burgundy,
Bush/Scherff, Buyak, Bååt,
*C*
Caetani, Castiglioni, Casiraghi, Coste/Tossoukpé, Caccianemici dal Orso, Caccianemico, Cafritz,
Cancellieri del Bufalo, Canella, Canossa,
Caltagirone, Capet, Capizucchis, Caracciolo di Torella, Caravaggio, Carnegie, Cargill-MacMillian, Carrington, Carpelan, Castile, Cattaneo, Catii, Cavendish,
Cavalier, Cavalieri,
Charlemagne, Chigi,
Chigi-Rovere,
Chigi-Albani-Della-Rovere, Chigi-Saracini-Lucherini, Chigi-Zondadari, Churchill,
Cesi, Cesarini, Clark, Cochran, Cohen, Colaianni, Collins, Colonna, Conti, Conti di Segni, Coimbra, Coste, Cox, Crivelli, Cromwell/Cromwelle/Cromville/Cromewell/Cromwill/Cromwille/Cromevill/ Cromnvell, Csaky, Csaky-Pallavicini,
Curtis-Boks, Cutler, Cybo,
*D*
D’Arpino, D’Avignon, Davison, d’Udekem d’Acoz,
de Beaufort, de Borbón y Vallabriga, de Burgh,
de Fieschi, De Forest,
de Goyon, de Goyon de Matignon, de Got, De Medici, De Menil, de Polignac,
De Rosette, Deering,
Della Rovere, Del Balzo Orsini, Del Drago, Denter, Dìaz, Di Bicci, di Morra, diNardo, Di Sciarra, diTella-Colaianni, Disney/Isigny,
Domenichino, Doria,
Doria-Sachs, Doria-Pamphili-Landi, Ducruet, Dunkeld, Dunin, Du Pont, Drexel, Duke,
*E*
Eka, Elmaleh, Erba-Odescalchi, Este, Estridsen,
*F*
Farnese/Farnesi,
Ferragamo, Feretti,
FitzJames, Franklin, Field,
Finck, Fischer, Flagler,
Floridi, Frazzini, Freeman, Friedsam, Fontana, Forbes, Ford, Foster, Fieschi,
Fornier, Foucois,
Fürstenberg,
*G*
Gambino, Gatti-Grami (Lombardy), Gaetani, Gaetano-Orsini, Gallarati-Scotti, Genoese, Genovese, Genovese-Getty, Ghermezian, Ghibellines,
Gilman, Gisors, Giovanni,
Giustiniani, Glücksburg/Glücksborg, Green, Grimaldi, Grimaldi-Coste, Grimaldo, Grimaldo Canella, Grimoard,
Grosvenors, Gryf,
Gouyon/Goyon/Gouyon, Gore, Gorm,
Gotti, Gottlieb, Gottorp-Romanov, Goodyear, Goldsmidt/Goldsmith, Gould, Gualterio, Guggenheim, Guelph,
Guiness, Guglielmo, Gwynedd,
*H*
Halifax, Hambro, Hanover, Habsburg/Hapsburg, Habsburg-Lorraine, Harkness, Harriman, Hapsburg, Hayden, Hearst, Hesse, Hesse-Kassel, Higgins, Hills, Hiort af Ornäs,
Hippolyte Grimaldi, Hohenzollern, Holstein-Gottorp-Romanov, Huntington,
Hurwitz, Huxley,
Hård af Segerstad,
*I*
il Malvicino de Calveiso de’ Calvi, Ingelger, Ivrea,
*J*
Jagiellon, Jagellonka,
Jastrzębiec, Jelilta, Jimenez, Johnson, Jägerhorn af Spurila,
*K*
Kahn, Khalili, Kadoorie,
Kahzarian, Khayami,
Karadjordjevic, Kellogs, Kennedy/Kannady/Kenardy/ Kennaday/Kenneday/ Kenneyday/Kennediem/ MacKennedy/MacUalraig,
Klettgau, Kirkwood,
Kissinger, Kresge, Koch, Krupp, Kuhn, Kur,
*L*
Lakhmids, Lambert, Lambertazzi, Lancaster,
Lazard, Lehman, Lee, Leijonhufvud, León, Lesser, Leliwa, Li, Lichtenstein, Lichnowsky, Ligne, Lilliehöök, Loeb,
Lombard/Lombardy,
Lord, Lorraine, Louvet, Ludovisi, Luisignan, Luxenbourg, Luzzatti Fequiz, Luzzatto, Luzzatos, Lyon,
*M*
Maderno, Magalotti, Mahidol, Maidalchini, Mandel, Manocherian, Massimo, Mars, Masci, Mattei, Marescotti, Matignon/
Davignon/Grignon/Wagnon/Ratigan/Catino/Gagnon/Latino/Nation,
Mattarazzo, Mavroleon, Maximii, Mazzini, McDonald, McGormick,
McLean, Meaux, Mecklenburg, Mellon,
Medici, Metcalf, Merage, Merode, Merovingian, Meyer, Mills, Milner, Mocatta, Montefiore, Montechanin, Montgomery, Montefeltro, Montpezat, Montesquieu, Moor, Morgan, Moshir, Morosinis, Moro, Mountbatten/Battenburg, Muti,
*N*
Nash, Nassau, Natt och Dag,
Navarre, Neri, Niederglatt-Blazon, Normandy,
*O*
Odescalchi, Odrowąż,
Oldenburg, Onassis, Orange,
Orange-Nassau, Orléans,
Orsini/Orsi/Ursi/Orso/Urso/D’Orsi/Dorsi/D’Orso/Dorso/D’Urso/Ursich/Ursic/Orselli/Orsello/Orsetti/Orsatti/Orsolini/Orsolino/Orsoni/Ursillo/Ursini,
Orsini Bonacassi,
Orsini del Balzo,
Orsini-di Bracciano, Oppenheimer, Orange, Ormsby, Ortolani, Orléans, Orléans-Braganza, Ostoja,
Ottobonis, Ottonians, Oxenstierna,
*P*
Pacelli, Pahlavi,
Pamphili/Pamphilio/Pamphili/Pamphilij, Pantaléon, Palaiologina, Palaiologos, Palatinate-Zweibrücken, Palazzo, Pallavicini/Pallavicino/Paravicini, Parentucelli, Papal, Patrasso di Guarcino, Patten, Patterson, Payne, Payseurs, Perkins, Phelps, Phipps, Plantagenet, Plantard, Piccolomini, Piedmont, Pignatelli, Pillsbury, Pitcairn, Pitigliano, Pius, Poher, Polignac, Polignac-Matignon-Grimaldi,
Porse, Posse, Pratt, Prefetti di Vico, Prignano, Pritzker,
*Q*
Quirinal,
*R*
Radziwiłł/Radziwill,
Reynolds, Rhodes,
Ribbing, Rizzuto, Roberti, Robertians, Rockefeller, Rothschild, Rocco, Roche, Roussel, Rochefoucauld, Rochechouart, Rogers, Romanov, Rosenwald, Rosenberg, Rosenstråle,
Rosso, Rospigliosi, Rospigliosi-Papal, Rurik, Russell, Ruspoli,
Ruspoli-Sueca,
Ruspoli-Boadilla del Monte,
Ruspoli-Poggio Suasa, Ruspoli-Candriano,
Ruspoli-Morignano,
Ruspoli-Fiano, Rufini, Ryan,
*S*
Saafeld, Sacchetti, Salians,
Samuel, Saudi, Savoy, Savoy-Genovese, Sachs, Sassanid,
Sassoon, Savelli, Savonarola,
Saxe-Coburg-Gotha-Windsor, S.C.Johnson, Schleswig-Holstein-Sonderburg-Glücksburg, Schiff, Schroeder/Schröder,
Scolari, Schiaratura, Schultz,
Schwartz, Schwarzenberg,
Seaf, Serlupi, Sforza/Szfora/Szfore/Szfori,
Sienese, Sinclair/Saint Clair/Saint-Clair/
Sloane, Solvay, Somaglia, Stenbock, Stern, Stewart,
Stillman, Stimson,
Storrow, Strong, Sturdza, Stuart, Spadafora, Sparre, Spinola, Suor Orsola, Sverre, Swynford,
*T*
Taft, Tarentaise, Tarth, Theodoli, Thurn und Taxis, Timken, Torlonia, Tossoukpé, Trastamara, Trolle, Tudor, Turner, Tyson,
*U*
Uyunid,
*V*
Valentinois, Valois,
Valois-Anjou,
Van Duyn, Vanderbilt, Vascello, Vermandois,
Villani, Visconti/Visconte/Bisconti/Viceconte/Viceconti/Viseconte/Viscont,
Viguera, Visigoths, Vittoria, Vittoria-Pallavicini, von Finck, von Thurn und Taxis,
*W*
Wadsworth, Waldorf, Walton, Warburg Del Banco, Warburg,
Watson, Weber, Weems,
Welfs, Weill, Wettin, Widener, Wiesbaden, Winthrop,
Whitney, Wells, Wessex,
Windsor-Saxe-Coburg-Gotha, Wittelsbach, Wittgenstein, Worms,
Wormwood, Wurttemberg,
Weyerhaeuser,
*X*
*Y*
York,
*Z*
Zogu, Zuccari, Zuniga-Valero,
*Å*
*Ä/Æ*
*Ö*
Örnsparre,

*A*
#Acquafondata
#Agnelli
#AgnelliElkann
#Alba
#Aldobrandini
#AlexandrineMontechanin
#Altavilla
#Allucingoli
#Angelerio
#Anhalt
#Anicii
#Astalli
#Astakai
#Asti
#Astor / #Astarte / #Astorga / #Ashdor
#Aragona
#Archbold
#Arduinici
#Arianiti
#Aubert
#Audley
#Aumont
#AustriaEste

*B*
#Baden
#Baker
#Banchieri
#Barberini
#Bardi
#Bariatinsky
#Baruch
#Battenburg / #Mountbatten
#Bedford
#Benjamin
#Bernadotte
#Berwind
#Blanchefort
#Blazon
#Blumenthal
#Bizzaccheri
#Bracciano
#Braganza
#Breakspear / #Breakspeare
#Bruce
#Brzezinski
#Bobone
#Bonaparte
#Borghese
#Borgia
#Borromeo
#Bourbon
#BouvierSchlossberg
#Bundy
#Burgundi
#Bush / #Scherff
#Buyak

*C*
#Caetani
#Caltagirone
#Canossa
#CancellieriDelBufalo
#Capet
#Caravaggio
#Carnegie
#CargillMacMillian
#Castiglioni
#Catii
#Cattaneo
#Cavalier
#Cavendish
#Chigi
#Chigi-Albani-Della-Rovere
#Chigi-Rovere
#Chigi-Saracini-Lucherini #Chigi-Zondadari
#Cesarini
#Clark
#Cochran
#Cohen
#Collins
#Colonna
#Conti
#ContiDiSegni
#Cox
#Cromwell / #Cromwelle /#Cromville / #Cromewell / #Cromwill / #Cromwille / #Cromevill / #Cromnvell
#Csaky
#CsakyPallavicini
#CurtisBoks
#Cutler
#Cybo

*D*
#D’Arpino
#Deering
#deBeaufort
#DeFieschi
#DeForest
#deGot
#deGoyon
#deGoyonDeMatignon
#DeMedici
#dePolignac
#DeRosette
#DellaRovere
#Dìaz
#DiBicci
#diMorra
#diNardo
#DiSciarra
#Disney / #Isigny
#diTellaColaianni
#Drexel
#Domenichino
#DoriaSachs
#DoriaPamphiliLandi
#Duke
#DuPont

*E*
#Elmaleh
#Este

*F*
#Farnese
#Field
#FitzJames
#Fischer
#Flagler
#Franklin
#Frazzini
#Freeman
#Friedsam
#Fontana
#Ford
#Foster

*G*
#Gambino
#GattiGrami / #Lombardy
#Gaetani
#Genoese
#Genovese
#GenoveseGambino
#Getty
#Ghermezian
#Ghibellines
#Glücksburg
#Gisors
#Giovanni
#Giustiniani
#Gotti
#GottorpRomanov
#Goldsmidt / #Goldsmith
#Gould
#Goodyear
#Green
#Grimaldi
#GrimaldiCoste
#Grosvenors
#Guggenheim
#Guglielmo
#Guelphs
#Guiness / #Guinness

*H*
#Hanover
#Harkness
#Harriman
#Hayden
#Habsburg / #Hapsburg
#HabsburgLorraine,
#Hearst
#Hesse
#HesseKassel
#Higgins
#Hills
#Hippolyte
#Hohenzollern
#Huntington
#Hurwitz

*I*
#Ivrea

*J*
#Jagiellon
#James
#Johnson
#Jimenez

*K*
#Kahn
#Khalili
#Kahzarian
#Khayami
#Kadoorie
#Kellogs
#Kennedy / #Kannady / #Kenardy / #Kennaday / #Kenneday / #Kenneyday / #Kennediem /
#MacKennedy / #MacUalraig
#Kirkwood
#Kresge
#Koch
#Krupp
#Kuhn

*L*
#Landi
#Lazard
#Lehman
#Lesser
#Lee
#Li
#Lichtenstein
#Lombard
#Lombardy
#Lorraine
#Ludovisi
#Luisignan

*M*
#Maderno
#Maidalchini
#Manocherian
#Marescotti
#Maximii
#Mars
#Massimo
#Mattei
#Mavroleon
#McDonald
#McGormick
#McLean
#Medici
#Mellon
#Merage
#Merovingian
#Metcalf
#Mills
#Mocatta
#Montechanin
#Montefiore
#Montgomery
#Montpezat
#Montesquieu
#Morgan
#Morosinis
#Moor
#Moshir

*N*
#Nash
#Nassau
#NiederglattBlazon

*O*
#Oldenburg
#Onassis
#Oppenheimer
#Orange
#OrangeNassau
#Orsini / #Orsi / #Ursi / #Orso / #Urso / #D’Orsi / #Dorsi / #D’Orso / #Dorso /
#D’Urso / #Ursich / #Ursic /
#Orselli / #Orsello / #Orsetti / #Orsatti / #Orsolini / #Orsolino / #Orsoni / #Ursillo / #Ursini
#OrsiniDiBracciano

*P*
#Pahlavi
#Palazzo
#Pamphili / #Pamphilio / #Pamphilij
#Pallavicini
#Paravicini
#Papal
#Patten
#Patterson
#Parentucelli
#Payseurs
#Perkins
#Phipps
#Plantagenet
#Plantard
#Piedmont
#Pitcairn
#Pratt
#PrefettiDiVico
#Pritzker
#Poher

*Q*
#Quirinal

*R*
#Radziwiłł
#Reynolds
#Rockefeller
#Rocco
#Roche
#Rochefoucauld #Rochechouart
#Rothschild
#Rogers
#Romanov
#Rosenwald
#Rospigliosi
#RospigliosiPapal
#Roussel
#Russel
#Ruspoli
#RuspoliSueca
#RuspoliBoadilla del Monte
#RuspoliPoggio Suasa #RuspoliCandriano
#RuspoliMorignano
#RuspoliFiano
#Rufini
#Ryan

*S*
#Saafeld
#Sacchetti
#Sachs
#Samuel
#Sassoon
#Saudi
#Savelli
#Savoy
#SavoyGenovese
#SaxeCoburgGothaWindsor
#SCJohnson
#Schiaratura
#Schiff
#Schroeder / #Schröder
#Schwartz
#Schwarzenberg
#Scolari
#Sforza / #Szfora / #Szfore /#Szfori
#Serlupi
#Sienese
#Sinclair / #SaintClair
#Sloane
#Somaglia
#Solvay
#Stern
#Stillman
#Storrow
#SuorOrsola

*T*
#Taft
#Tarth
#Tarentaise
#Theodoli
#ThurnUndTaxis
#Timken
#Torlonia
#Tossoukpé
#Trastamara
#Tyson
#Tudor

*U*

*V*
#Valentinois
#ValoisAnjou
#Vanderbilt
#VanDuyn
#Vascello
#Villani
#Visconti / #Visconte /#Bisconti / #Viceconte / #Viceconti / #Viseconte / #Viscont
#Vittoria
#VittoriaPallavicini

*W*
#Walton
#Warburg
#WarburgDelBanco
#Watson
#Weber
#Weems
#Wettin
#Widener
#WindsorSaxeCoburgGoete
#Winthrop
#Whitney
#Wittgenstein
#Wittelbach
#Worms
#Wurttemberg

*X*

*Y*
#York

*Z*
#Zogu
#Zuccari
ZunigaValero
___________________________

_Tags:_
#EXPOSING
#SatanicEliteBloodlines #BlackNobility #BlackNobilities #NobilityFamilies #NobilityBloodlines #NobilityHouses #FamilyNames #Family #Names #list #EXPOSED5*#SATANIC ELITE BLOODLINE FAMILIES — UPDATED LIST OF NAMES OF THE SATANIC ELITE BLOODLINE FAMILIES—LIST OF NAMES—THE RULING SATANIC ELITE FAMILIES ARE:

*A*
Acquafondata, Agnelli, Agnelli-Elkann, Alba, Aldobrandini, Alexandrine-Montechanin, Aleramici, Altavilla, Allucingoli, Alaouite, Al-Abbasi, Al Khalifa,
Al-Sabah, Al-Falasi,
Al Ghardaqa, Angelerio, Ansbach, Altoviti, Anhalt, Anicii, Anguillara, Angevin, Angoulème, Anjou,
Anjou-Capetian, Aspenäs,
Asti, Astor/Astarte/Astorga/Ashdor, Astalli, Astakai, Asturias-Cantabria, Aragona, Aragon, Aragonese, Arenberg, Archbold, Arduinici, Arianiti,
Arsacid, Artsruni, Artaxiad,
Árpád, Arslan, Austria-Este, Aubert, Audley, Aumont, Austria-Este, Averill, Aviz,
*B*
Baden, Bagrat, Bagratuni, Bagrationi, Banér, Bardi, Bracciano, Baker, Banchieri, Barbarossa, Barberini, Barcelona, Bariatinsky, Barlow, Baruch,
Battenburg/Mountbatten, Bedford, Benjamin, Berwind,
Bernadotte, Bese, Beaufort Bielke, Bivinids, Bizzaccheri,
Bjelbo, Björn, Blanchefort, Blason, Blazon,
Blois, Blumenthal,
Bobone-Orsini, Bohemian, Boers-Lyon, Boleyn,
Bonaparte, Boncompagni,
Boncompagni-Ludovisi, Bogoria, Borghese, Borgia, Borja, Borjigid, Bokassa, Bonde, Bosonids, Brion, Brunswick-Luneburg, Boccasini, Boniface, Borromeo, Borghese, Bouillon, Bourbon, Bourbon-Parma, Bouvier Schlossberg, Braganza, Bruce/Bruis/Brix/Broase,
Breakspear/Breakspeare,
Brzezinski, Buffet, Bundy, Burgundi/Burgandy/ Burgundy,
Bush/Scherff, Buyak, Bååt,
*C*
Caetani, Castiglioni, Casiraghi, Coste/Tossoukpé, Caccianemici dal Orso, Caccianemico, Cafritz,
Cancellieri del Bufalo, Canella, Canossa,
Caltagirone, Capet, Capizucchis, Caracciolo di Torella, Caravaggio, Carnegie, Cargill-MacMillian, Carrington, Carpelan, Castile, Cattaneo, Catii, Cavendish,
Cavalier, Cavalieri,
Charlemagne, Chigi,
Chigi-Rovere,
Chigi-Albani-Della-Rovere, Chigi-Saracini-Lucherini, Chigi-Zondadari, Churchill,
Cesi, Cesarini, Clark, Cochran, Cohen, Colaianni, Collins, Colonna, Conti, Conti di Segni, Coimbra, Coste, Cox, Crivelli, Cromwell/Cromwelle/Cromville/Cromewell/Cromwill/Cromwille/Cromevill/ Cromnvell, Csaky, Csaky-Pallavicini,
Curtis-Boks, Cutler, Cybo,
*D*
D’Arpino, D’Avignon, Davison, d’Udekem d’Acoz,
de Beaufort, de Borbón y Vallabriga, de Burgh,
de Fieschi, De Forest,
de Goyon, de Goyon de Matignon, de Got, De Medici, De Menil, de Polignac,
De Rosette, Deering,
Della Rovere, Del Balzo Orsini, Del Drago, Denter, Dìaz, Di Bicci, di Morra, diNardo, Di Sciarra, diTella-Colaianni, Disney/Isigny,
Domenichino, Doria,
Doria-Sachs, Doria-Pamphili-Landi, Ducruet, Dunkeld, Dunin, Du Pont, Drexel, Duke,
*E*
Eka, Elmaleh, Erba-Odescalchi, Este, Estridsen,
*F*
Farnese/Farnesi,
Ferragamo, Feretti,
FitzJames, Franklin, Field,
Finck, Fischer, Flagler,
Floridi, Frazzini, Freeman, Friedsam, Fontana, Forbes, Ford, Foster, Fieschi,
Fornier, Foucois,
Fürstenberg,
*G*
Gambino, Gatti-Grami (Lombardy), Gaetani, Gaetano-Orsini, Gallarati-Scotti, Genoese, Genovese, Genovese-Getty, Ghermezian, Ghibellines,
Gilman, Gisors, Giovanni,
Giustiniani, Glücksburg/Glücksborg, Green, Grimaldi, Grimaldi-Coste, Grimaldo, Grimaldo Canella, Grimoard,
Grosvenors, Gryf,
Gouyon/Goyon/Gouyon, Gore, Gorm,
Gotti, Gottlieb, Gottorp-Romanov, Goodyear, Goldsmidt/Goldsmith, Gould, Gualterio, Guggenheim, Guelph,
Guiness, Guglielmo, Gwynedd,
*H*
Halifax, Hambro, Hanover, Habsburg/Hapsburg, Habsburg-Lorraine, Harkness, Harriman, Hapsburg, Hayden, Hearst, Hesse, Hesse-Kassel, Higgins, Hills, Hiort af Ornäs,
Hippolyte Grimaldi, Hohenzollern, Holstein-Gottorp-Romanov, Huntington,
Hurwitz, Huxley,
Hård af Segerstad,
*I*
il Malvicino de Calveiso de’ Calvi, Ingelger, Ivrea,
*J*
Jagiellon, Jagellonka,
Jastrzębiec, Jelilta, Jimenez, Johnson, Jägerhorn af Spurila,
*K*
Kahn, Khalili, Kadoorie,
Kahzarian, Khayami,
Karadjordjevic, Kellogs, Kennedy/Kannady/Kenardy/ Kennaday/Kenneday/ Kenneyday/Kennediem/ MacKennedy/MacUalraig,
Klettgau, Kirkwood,
Kissinger, Kresge, Koch, Krupp, Kuhn, Kur,
*L*
Lakhmids, Lambert, Lambertazzi, Lancaster,
Lazard, Lehman, Lee, Leijonhufvud, León, Lesser, Leliwa, Li, Lichtenstein, Lichnowsky, Ligne, Lilliehöök, Loeb,
Lombard/Lombardy,
Lord, Lorraine, Louvet, Ludovisi, Luisignan, Luxenbourg, Luzzatti Fequiz, Luzzatto, Luzzatos, Lyon,
*M*
Maderno, Magalotti, Mahidol, Maidalchini, Mandel, Manocherian, Massimo, Mars, Masci, Mattei, Marescotti, Matignon/
Davignon/Grignon/Wagnon/Ratigan/Catino/Gagnon/Latino/Nation,
Mattarazzo, Mavroleon, Maximii, Mazzini, McDonald, McGormick,
McLean, Meaux, Mecklenburg, Mellon,
Medici, Metcalf, Merage, Merode, Merovingian, Meyer, Mills, Milner, Mocatta, Montefiore, Montechanin, Montgomery, Montefeltro, Montpezat, Montesquieu, Moor, Morgan, Moshir, Morosinis, Moro, Mountbatten/Battenburg, Muti,
*N*
Nash, Nassau, Natt och Dag,
Navarre, Neri, Niederglatt-Blazon, Normandy,
*O*
Odescalchi, Odrowąż,
Oldenburg, Onassis, Orange,
Orange-Nassau, Orléans,
Orsini/Orsi/Ursi/Orso/Urso/D’Orsi/Dorsi/D’Orso/Dorso/D’Urso/Ursich/Ursic/Orselli/Orsello/Orsetti/Orsatti/Orsolini/Orsolino/Orsoni/Ursillo/Ursini,
Orsini Bonacassi,
Orsini del Balzo,
Orsini-di Bracciano, Oppenheimer, Orange, Ormsby, Ortolani, Orléans, Orléans-Braganza, Ostoja,
Ottobonis, Ottonians, Oxenstierna,
*P*
Pacelli, Pahlavi,
Pamphili/Pamphilio/Pamphili/Pamphilij, Pantaléon, Palaiologina, Palaiologos, Palatinate-Zweibrücken, Palazzo, Pallavicini/Pallavicino/Paravicini, Parentucelli, Papal, Patrasso di Guarcino, Patten, Patterson, Payne, Payseurs, Perkins, Phelps, Phipps, Plantagenet, Plantard, Piccolomini, Piedmont, Pignatelli, Pillsbury, Pitcairn, Pitigliano, Pius, Poher, Polignac, Polignac-Matignon-Grimaldi,
Porse, Posse, Pratt, Prefetti di Vico, Prignano, Pritzker,
*Q*
Quirinal,
*R*
Radziwiłł/Radziwill,
Reynolds, Rhodes,
Ribbing, Rizzuto, Roberti, Robertians, Rockefeller, Rothschild, Rocco, Roche, Roussel, Rochefoucauld, Rochechouart, Rogers, Romanov, Rosenwald, Rosenberg, Rosenstråle,
Rosso, Rospigliosi, Rospigliosi-Papal, Rurik, Russell, Ruspoli,
Ruspoli-Sueca,
Ruspoli-Boadilla del Monte,
Ruspoli-Poggio Suasa, Ruspoli-Candriano,
Ruspoli-Morignano,
Ruspoli-Fiano, Rufini, Ryan,
*S*
Saafeld, Sacchetti, Salians,
Samuel, Saudi, Savoy, Savoy-Genovese, Sachs, Sassanid,
Sassoon, Savelli, Savonarola,
Saxe-Coburg-Gotha-Windsor, S.C.Johnson, Schleswig-Holstein-Sonderburg-Glücksburg, Schiff, Schroeder/Schröder,
Scolari, Schiaratura, Schultz,
Schwartz, Schwarzenberg,
Seaf, Serlupi, Sforza/Szfora/Szfore/Szfori,
Sienese, Sinclair/Saint Clair/Saint-Clair/
Sloane, Solvay, Somaglia, Stenbock, Stern, Stewart,
Stillman, Stimson,
Storrow, Strong, Sturdza, Stuart, Spadafora, Sparre, Spinola, Suor Orsola, Sverre, Swynford,
*T*
Taft, Tarentaise, Tarth, Theodoli, Thurn und Taxis, Timken, Torlonia, Tossoukpé, Trastamara, Trolle, Tudor, Turner, Tyson,
*U*
Uyunid,
*V*
Valentinois, Valois,
Valois-Anjou,
Van Duyn, Vanderbilt, Vascello, Vermandois,
Villani, Visconti/Visconte/Bisconti/Viceconte/Viceconti/Viseconte/Viscont,
Viguera, Visigoths, Vittoria, Vittoria-Pallavicini, von Finck, von Thurn und Taxis,
*W*
Wadsworth, Waldorf, Walton, Warburg Del Banco, Warburg,
Watson, Weber, Weems,
Welfs, Weill, Wettin, Widener, Wiesbaden, Winthrop,
Whitney, Wells, Wessex,
Windsor-Saxe-Coburg-Gotha, Wittelsbach, Wittgenstein, Worms,
Wormwood, Wurttemberg,
Weyerhaeuser,
*X*
*Y*
York,
*Z*
Zogu, Zuccari, Zuniga-Valero,
*Å*
*Ä/Æ*
*Ö*
Örnsparre,

*A*
#Acquafondata
#Agnelli
#AgnelliElkann
#Alba
#Aldobrandini
#AlexandrineMontechanin
#Altavilla
#Allucingoli
#Angelerio
#Anhalt
#Anicii
#Astalli
#Astakai
#Asti
#Astor / #Astarte / #Astorga / #Ashdor
#Aragona
#Archbold
#Arduinici
#Arianiti
#Aubert
#Audley
#Aumont
#AustriaEste

*B*
#Baden
#Baker
#Banchieri
#Barberini
#Bardi
#Bariatinsky
#Baruch
#Battenburg / #Mountbatten
#Bedford
#Benjamin
#Bernadotte
#Berwind
#Blanchefort
#Blazon
#Blumenthal
#Bizzaccheri
#Bracciano
#Braganza
#Breakspear / #Breakspeare
#Bruce
#Brzezinski
#Bobone
#Bonaparte
#Borghese
#Borgia
#Borromeo
#Bourbon
#BouvierSchlossberg
#Bundy
#Burgundi
#Bush / #Scherff
#Buyak

*C*
#Caetani
#Caltagirone
#Canossa
#CancellieriDelBufalo
#Capet
#Caravaggio
#Carnegie
#CargillMacMillian
#Castiglioni
#Catii
#Cattaneo
#Cavalier
#Cavendish
#Chigi
#Chigi-Albani-Della-Rovere
#Chigi-Rovere
#Chigi-Saracini-Lucherini #Chigi-Zondadari
#Cesarini
#Clark
#Cochran
#Cohen
#Collins
#Colonna
#Conti
#ContiDiSegni
#Cox
#Cromwell / #Cromwelle /#Cromville / #Cromewell / #Cromwill / #Cromwille / #Cromevill / #Cromnvell
#Csaky
#CsakyPallavicini
#CurtisBoks
#Cutler
#Cybo

*D*
#D’Arpino
#Deering
#deBeaufort
#DeFieschi
#DeForest
#deGot
#deGoyon
#deGoyonDeMatignon
#DeMedici
#dePolignac
#DeRosette
#DellaRovere
#Dìaz
#DiBicci
#diMorra
#diNardo
#DiSciarra
#Disney / #Isigny
#diTellaColaianni
#Drexel
#Domenichino
#DoriaSachs
#DoriaPamphiliLandi
#Duke
#DuPont

*E*
#Elmaleh
#Este

*F*
#Farnese
#Field
#FitzJames
#Fischer
#Flagler
#Franklin
#Frazzini
#Freeman
#Friedsam
#Fontana
#Ford
#Foster

*G*
#Gambino
#GattiGrami / #Lombardy
#Gaetani
#Genoese
#Genovese
#GenoveseGambino
#Getty
#Ghermezian
#Ghibellines
#Glücksburg
#Gisors
#Giovanni
#Giustiniani
#Gotti
#GottorpRomanov
#Goldsmidt / #Goldsmith
#Gould
#Goodyear
#Green
#Grimaldi
#GrimaldiCoste
#Grosvenors
#Guggenheim
#Guglielmo
#Guelphs
#Guiness / #Guinness

*H*
#Hanover
#Harkness
#Harriman
#Hayden
#Habsburg / #Hapsburg
#HabsburgLorraine,
#Hearst
#Hesse
#HesseKassel
#Higgins
#Hills
#Hippolyte
#Hohenzollern
#Huntington
#Hurwitz

*I*
#Ivrea

*J*
#Jagiellon
#James
#Johnson
#Jimenez

*K*
#Kahn
#Khalili
#Kahzarian
#Khayami
#Kadoorie
#Kellogs
#Kennedy / #Kannady / #Kenardy / #Kennaday / #Kenneday / #Kenneyday / #Kennediem /
#MacKennedy / #MacUalraig
#Kirkwood
#Kresge
#Koch
#Krupp
#Kuhn

*L*
#Landi
#Lazard
#Lehman
#Lesser
#Lee
#Li
#Lichtenstein
#Lombard
#Lombardy
#Lorraine
#Ludovisi
#Luisignan

*M*
#Maderno
#Maidalchini
#Manocherian
#Marescotti
#Maximii
#Mars
#Massimo
#Mattei
#Mavroleon
#McDonald
#McGormick
#McLean
#Medici
#Mellon
#Merage
#Merovingian
#Metcalf
#Mills
#Mocatta
#Montechanin
#Montefiore
#Montgomery
#Montpezat
#Montesquieu
#Morgan
#Morosinis
#Moor
#Moshir

*N*
#Nash
#Nassau
#NiederglattBlazon

*O*
#Oldenburg
#Onassis
#Oppenheimer
#Orange
#OrangeNassau
#Orsini / #Orsi / #Ursi / #Orso / #Urso / #D’Orsi / #Dorsi / #D’Orso / #Dorso /
#D’Urso / #Ursich / #Ursic /
#Orselli / #Orsello / #Orsetti / #Orsatti / #Orsolini / #Orsolino / #Orsoni / #Ursillo / #Ursini
#OrsiniDiBracciano

*P*
#Pahlavi
#Palazzo
#Pamphili / #Pamphilio / #Pamphilij
#Pallavicini
#Paravicini
#Papal
#Patten
#Patterson
#Parentucelli
#Payseurs
#Perkins
#Phipps
#Plantagenet
#Plantard
#Piedmont
#Pitcairn
#Pratt
#PrefettiDiVico
#Pritzker
#Poher

*Q*
#Quirinal

*R*
#Radziwiłł
#Reynolds
#Rockefeller
#Rocco
#Roche
#Rochefoucauld #Rochechouart
#Rothschild
#Rogers
#Romanov
#Rosenwald
#Rospigliosi
#RospigliosiPapal
#Roussel
#Russel
#Ruspoli
#RuspoliSueca
#RuspoliBoadilla del Monte
#RuspoliPoggio Suasa #RuspoliCandriano
#RuspoliMorignano
#RuspoliFiano
#Rufini
#Ryan

*S*
#Saafeld
#Sacchetti
#Sachs
#Samuel
#Sassoon
#Saudi
#Savelli
#Savoy
#SavoyGenovese
#SaxeCoburgGothaWindsor
#SCJohnson
#Schiaratura
#Schiff
#Schroeder / #Schröder
#Schwartz
#Schwarzenberg
#Scolari
#Sforza / #Szfora / #Szfore /#Szfori
#Serlupi
#Sienese
#Sinclair / #SaintClair
#Sloane
#Somaglia
#Solvay
#Stern
#Stillman
#Storrow
#SuorOrsola

*T*
#Taft
#Tarth
#Tarentaise
#Theodoli
#ThurnUndTaxis
#Timken
#Torlonia
#Tossoukpé
#Trastamara
#Tyson
#Tudor

*U*

*V*
#Valentinois
#ValoisAnjou
#Vanderbilt
#VanDuyn
#Vascello
#Villani
#Visconti / #Visconte /#Bisconti / #Viceconte / #Viceconti / #Viseconte / #Viscont
#Vittoria
#VittoriaPallavicini

*W*
#Walton
#Warburg
#WarburgDelBanco
#Watson
#Weber
#Weems
#Wettin
#Widener
#WindsorSaxeCoburgGoete
#Winthrop
#Whitney
#Wittgenstein
#Wittelbach
#Worms
#Wurttemberg

*X*

*Y*
#York

*Z*
#Zogu
#Zuccari
ZunigaValero
___________________________

_Tags:_
#EXPOSING
#SatanicEliteBloodlines #BlackNobility #BlackNobilities #NobilityFamilies #NobilityBloodlines #NobilityHouses #FamilyNames #Family #Names #list #EXPOSED

ARTICLES ABOUT: THE SYMBOLISM OF THE SERPENT..

ARTICLES ABOUT: THE SYMBOLISM OF THE SERPENT..

INTRO:

SHORTLY ABOUT SNAKES..

Snakes are elongated, legless, carnivorous reptiles of the suborder Serpentes. Like all squamates, snakes are ectothermic, amniote vertebrates covered in overlapping scales. Many species of snakes have skulls with several more joints than their lizard ancestors, enabling them to swallow prey much larger than their heads with their highly mobile jaws. To accommodate their narrow bodies, snakes’ paired organs (such as kidneys) appear one in front of the other instead of side by side, and most have only one functional lung. Some species retain a pelvic girdle with a pair of vestigial claws on either side of the cloaca. Lizards have evolved elongate bodies without limbs or with greatly reduced limbs about twenty-five times independently via convergent evolution, leading to many lineages of legless lizards. Legless lizards resemble snakes, but several common groups of legless lizards have eyelids and external ears, which snakes lack, although this rule is not universal (see Amphisbaenia, Dibamidae, and Pygopodidae).
Living snakes are found on every continent except Antarctica, and on most smaller land masses; exceptions include some large islands, such as Ireland, Iceland, Greenland, the Hawaiian archipelago, and the islands of New Zealand, and many small islands of the Atlantic and central Pacific oceans. Additionally, sea snakes are widespread throughout the Indian and Pacific Oceans. More than 20 families are currently recognized, comprising about 520 genera and about 3,600 species. They range in size from the tiny, 10.4 cm (4.1 in)-long Barbados thread snake[7] to the reticulated python of 6.95 meters (22.8 ft) in length.[8] The fossil species Titanoboa cerrejonensis was 12.8 meters (42 ft) long. Snakes are thought to have evolved from either burrowing or aquatic lizards, perhaps during the Jurassic period, with the earliest known fossils dating to between 143 and 167 Ma ago. The diversity of modern snakes appeared during the Paleocene epoch (c 66 to 56 Ma ago). The oldest preserved descriptions of snakes can be found in the Brooklyn Papyrus.
Most species are nonvenomous and those that have venom use it primarily to kill and subdue prey rather than for self-defense. Some possess venom potent enough to cause painful injury or death to humans. Nonvenomous snakes either swallow prey alive or kill by constriction.

caduceus-pagan-1-opt-1

Dictionary of Mythology: Folklore and Symbols
by Gertrude Jobes
1961

(from ReptilianAgenda Website)

Androgyny, circle, convalescence, cunning, danger, death, deceit, destruction, divine emanation, evil, false appearance fertility, guardianship, generation, grief, health, intelligence, jealousy, lasciviousness, malice, materialism, misfortune, phallus, pleasure, power, prophecy, prudence, renewal, revenge, self- creation self -indulgence, self -sustenance sensation, sensuality, sin, subtlety, temptation, treachery, the unfathomable, universe circle, vexations, vice, wiliness, wisdom worldliness. Emblem of lightning, physicians, witchcraft.

Figure used on amulets, or represented by a wavy ‘M.’ From primeval times revered as the re-embodiment of deceased mortals, most ancient of phallic totem beasts. Assigned to mother goddesses. Form of earth, river, sea, and underworld deities, and rain-withholding clouds. Appears in all tree-worshiping cultures as a weather-controller. In African tradition a dawdler, untrustworthy messenger, but life restorer.

From the legend in which God, angered by man, sent a tortoise with a message of death. Relenting, He sent a snake to overtake the tortoise. The snake loitered on the way, thus man must die first, then he may recover his eternal life.

American Indian sky and water symbol, life form given to lightning and the rainbow, with power over rain and wind. Among the Central American Indians symbol of poverty and want; a destroyer (worm) of the dead.

Armenian ancestral ghost with an interest in the family’s fecundity and the field’s fertility.

In Babylonian mythology the thief who steals the plant of immortality from Gilgamesh. In Buddhism, girdle of Mount Meru.

In China called she, animal which carries the sun through the hours 9 – 11 A.M. and Virgo (Szu), sixth house of the zodiac; guardian of the direction south, southeast, east. In Christianity an emblem of Christ and the saints Hilary, Philip Apostle, Thecla, Verdiana.

In Egyptian antiquity revered as a spirit which pervaded the universe, attribute of Kneph and Set The west wind sometimes was shown as a four- headed winged serpent.

In Greece sacred to Agathadaemon, Apollo, Asclepius, Athena, Erichthonius.

In Hebrew lore represents both good and bad fortune. Attribute of Aaron, salvation; Moses, redemption; Satan, fall from Divine grace.

The Hindu nags, symbolizing every branch of learning. A form of Ahi, Sesa, Vritra.

In Italy that which creeps and does not rise, hence without the ability to aspire. In Japan called hebi, a walking rope Symbolic of divine authority, longevity, woman’s jealousy.

In Maori legend the genius which severed Heaven from Earth In Melanesian mythology the animal which pulled dry land up from the primordial sea and gave fire to mortals.

In other Pacific Island myths a destroyer of primordial land and of growth.

In Norse mythology a form taken by Loki and Odin. Frequently engraved on warrior’s swords as a charm. Keener of subterranean gold.

Among the Romans a Sian of authority or dominance.

Doreen serpent. Healer. Erected by Moses in the wilderness after the visitation of fiery serpents. Those who looked upon it were cured. Later called an idol and destroyed as a mere piece of brass.

By Christians revered as a symbol of God or Christ.

Brazen serpent on tau cross. Crucifixion. Sacrifice -of Isaac.

Cherish a serpent in one’s bosom. Benefit a person who in return injures one; in allusion to the Greek fable of the man who was bitten by a serpent hatchers from the eels he had placed at his bosom.

Eight-forked serpent. In Japan a devourer of humans, outlaw. Serpent with a single body and eight heads and tails.

Erect serpent. Phallus.

Horned serpent. Water

Serpent Bearer. Constellation in the Northern and Southern Skies also called Ophiuchus.

Serpent-bird conflict. See Bird – serpent.

Serpent biting tail. Circle, eternity, power feeding on itself, zodiac.

Serpent column. Composed of three bronze snakes intertwined. Presented to the Delphi temple as a votive offering to commemorate the Greek victories at Salamis and Platea. Used to support the golden tripod.

Serpent. crooked. Crawling and slimy. Destructiveness, loathsomeness, obstructiveness.

Reorient encircling a mountain

Popular symbol in the East

Phallic in character. More included for this entry.

SERPENT

A Dictionary of Symbols
by J. E. Cirlot / 1971. 385 p.

If all symbols are really functions and signs of things imbued with energy, then the serpent or snake is, by analogy, symbolic of energy itself—of force pure and simple; hence its ambivalence and multivalencies. Another reason for its great variety of symbolic meaning derives from the consideration that these meanings may relate either to the serpent as a whole or to any of its major characteristics—for example, to its sinuous movements, its common association with the tree and its formal analogy with the roots and branches of the tree, the way it sheds its skin, its threatening tongue, the undulating pattern of its body, its hiss, its resemblance to a ligament, its method of attacking its victims by coiling itself round them, and so on.

Still another explanation lies in its varying habitat: there are snakes which inhabit woods, others which thrive in the desert, aquatic serpents and those that lurk in lakes and ponds, wells and springs. In India, snake cults or cults of the spirit of the snake are connected with the symbolism of the waters of the sea. Snakes are guardians of the springs of life and of immortality, and also of those superior riches of the spirit that are symbolized by hidden treasure (17). As regards the West, Bayleyhas suggested that the snake, since its sinuous shape is similar to that of waves, may be a symbol of the wisdom of the deeps (4) and of the great mysteries. Yet, in their multiplicity and as creatures of the desert, snakes are forces of destruction, afflicting all those who have succeeded in crossing the Red Sea and leaving Egypt (57); in this sense, they are connected with the ‘temptations’ facing those who have overcome the limitations of matter and have entered into the realm of the ‘dryness’ of the spirit.

This explains why Blavatsky can say that, physically, the snake symbolizes the seduction of strength by matter (as Jason by Medea, Hercules by Omphale, Adam by Eve), thereby providing us with a palpable illustration of the workings of the process of involution; and of how the inferior can lurk within the superior, or the previous within the subsequent (9). This is borne out by Diet, for whom the snake is symbolic not of personal sin but of the principle of evil inherent in all worldly things. The same idea is incorporated into the Nordic myth about the serpent of Midgard (15). There is a clear connection between the snake and the feminine principle.

Eliade observes that Gresmann (Mytische Reste in der Paradieserzahlung in Archiv f. Rel. X, 345) regarded Eve as an archaic Phoenician goddess of the underworld who is personified in the serpent (although a better interpretation would be to identify it with the allegorical figure of Lilith, the enemy and temptress of Eve). In support of this, Eliade points to the numerous Mediterranean deities who are represented carrying a snake in one or both of their hands (for example, the Greek Artemis, Hecate, Persephone), and he relates these to the finely sculpted Cretan priestesses in gold or ivory, and to mythic figures with snakes for hair (Medusa the Gorgon, or the Erinyes). He goes on to mention that in Central Europe there is a belief that hairs pulled out from the head of a woman under the influence of the moon will be turned into snakes (17).

The serpent (or snake) was very common in Egypt; the hieroglyph which corresponds phonetically to the letter Z is a representation of the movement of the snake. Like the sign of the slug, or horned snake (phonetically equivalent to F), this hieroglyph refers to primigenial and cosmic forces. Generally speaking, the names of the goddesses are determined by signs representing the snake—which is tantamount to saying that it is because of Woman that the spirit has fallen into matter and evil. The snake is also used, as are other reptiles, to refer to the primordial—the most primitive strata of life. In the Book of the Dead (XVII), the reptiles are the first to acclaim Ra when he appears above the surface of the waters of Nou (or Nu or Nun).

The demonic implications of the serpent are exemplified in Tuat, whose evil spirits are portrayed as snakes; however, these— like the vanquished dragon—may also take on a beneficent form as forces which have been mastered, controlled, sublimated and utilized for the superior purposes of the psyche and the development of mankind, and in this sense they correspond to the goddesses Nekhebit and Uadjit (or Buto). They also become an Uraeus—the same thing happens in the symbolism of the Kundalini—constituting the most precious ornament of the royal diadem (19).

SERPENT

Dictionary of Symbols and Imagery
by Ad de Vries / 1976. 515 p.

A. general:

1. there is a general confusion with ‘Snake’: even though in biology the term ‘serpent’ is usually preferred for the larger kinds, literature has never made that distinction; therefore Snake and Serpent have been put under one heading; the other distinctives (viz. the serpent being limbless, having scales, and being characterized by hissiny and stinging) are not observed either: e.g. in old prints of the Paradise-scene the ‘serpent’ does have limbs, looking more like a lizard, or (even likelier) a ‘dragon’; only when specific mention has been made of the kind, e.g. Adder (which itself has been mixed up with Asp), or Viper, it has been given under a separate heading;
2. as the serpent represents any primeval, cosmic force, it shares the ambiguity of all ancient, elementary symbols (cf. Eagle, Lion, etc.); examples: a. the most spiritual of all creatures; it has a fiery nature, and its swiftness is terrible; it has a long lite (yearly renewed); b. it is also the most earthy animal, cold-blooded, unconscious, unrelated; c. it is both toxic and prophylactic; d. as ‘Agathadaimon’ it is both a good and a bad ‘daemon’; e. Gnostic: emblem of the brain-stem and spinal chord, consistent with its predominantly reflex psyche; v. Q. 1; f. it is the symbol for the unconscious, expressing the latter’s sudden manifestation, its painful and dangerous intervention in our affairs (thus being a manifestation of the unconscious mother-image), so: feminine; but also the phallic symbol, so: masculine;
3. as ‘dragon’ it is often ‘plumed’, ‘winged’ (cf. Basilisk), or ‘horned’;
4. it is androgynous: selt: creative (like Lotus, Scarab, etc.);

B. divine emanation:

I. O.T.:

the relation between Moses’ “Brazen serpent” and Yahweh’s “Brazen serpent” and Yahweh is highly ambiguous; v. Seraph;

II. Greek:

1. Zeus:

a. to escape Cronos he changed into a serpent, and his guards into bears, both of which are seen as constellations (and are seasonal animals);

b. he coupled with Rhea, his mother, who had taken refuge in the form of a snake, by taking the same form and becoming an ‘insoluble knot’ with her;

c. v. H, IV;

2. in the Pelasgian Creation-myth Eurynome, the Goddess of All Things, rose naked out of Chaos, caught hold of the North Wind (Boreal), rubbed it between her hands, and the great serpent Ophion was created, who fertilized her (tor Boreas as fertilizer: v. also Horse);
3. it is an attribute of Dionysus (as fertility- god); he was crowned with serpents (i.e. born in winter: v. Seasons);
4. it is sacred to Agathadaemon, Apollo, Asclepius, Athena, Erichthonius; the serpent from which the staff of Apollo Belvedere is made, represents Omphalos (v. Navel), from which umbilicus was derived;

III. Norse:

1. Odin disguised himself as a snake (also as an eagle, its opposite: cf. Zeus), and so did Loki;
2. this may explain the serpent-forms on Germanic swords, e.g. the sword with which Beowulf killed Grendel’s mother; also in the O.K. poem “The Wanderer” (a minstrel repenting old tunes): “Now in the place of the dead warriors stands a wall, wondrous high, covered with serpent-shapes” which thus may refer to gods (or, less likely, to dead souls)

IV. sun (god):

1. a snake expresses sun-rays (another link with sword);
2. in a complete circle it represents the Zodiac (beside Eternity); Macrobius: the curving movement of the sun;

3. the serpent was used by the Egyptians in nearly all symbols, but mainly the sun-symbol: it even formed part of the hair-style of Isis; v. N, 1

C. evil:

1. the inferior inhabiting the superior, evil inhabiting everything;
2. for Yahweh conquering the ‘monster of the deep’: v. Chaos;
3. as Satan: tall trom Divine Grace;
4. if the snake in itself is already magically potent, the coupling of two, seen by human eyes, is fatal: v. the myth of Tiresias: it brings blindness with either homosexuality or change of sex: ref. Ovid (Metam. 3, 323ff.);
5. Germanic: a gigantic serpent (with lesser snakes) nibbles at the root of the Tree of Life, Yggdrasill; the WorldSerpent is Loki’s child

D. Life, healing:

1. Life: a. connected with the wheel of life: v. Ouroboros; b. sacrificed: killing the serpent (= life-force) = to accept death (cf. the swan who wafts the hero to heaven); c. fertility: after Python had coupled with Eurynome (v. B, 11, 2) she bashed his head, kicked out his teeth, and sent him underground (the source of riches), when he claimed authorship of the Universe; yet from his teeth man had sprung; d. Germanic: Balder was rendered invincible by a food over which snakes had dropped poison;

2. healing:

a. the Brazen Serpent of Moses: erected by him after the ‘visitation’ of the ‘fiery serpents’ (serafim): those who looked upon it were cured (later the practice was recognized as idolatrous and discarded); thus the serpent was punishment and healing at once; in Hezekiah’s time it was called Nehushtan: nehoshet (= brass) + nahash (= snake);
b. Aesculapius (Apollo’s ‘son’) visited the disease-stricken country of the Romans (at their bidding) in the form of a crested snake, going before them from the temple in Epidaurus to their ships, and guiding the ship with his head on the stern: Ovid (Metam. 15, 626fT.); v. also Caduceus (e.g. for the physician’s emblem) and

E. eternity, fertility, regeneration:

I. eternity:

1. v. Ouroboros: a snake biting its own tail, making a circle;

2. in Babylonian myth the thief who steals the plant of immortality from Gilgamesh is a snake;

II. fertility:

1. it is often coiled around a person to give generative heat: Aion, the Egg of the World, Buddha, etc.;
2. in the Adonis-myth the part of the year he spends with Persephone is represented by a snake (winter);
3. on the love-bed of Queen Titania was shed a snake’s “enamelled skin, Weed wide enough to wrap a fairy in”: MND 2, 1

III. regeneration:

1. it sheds its skin;
2. Babylonian: the earth-god E a-En-ki (in serpent- form) gave man knowledge of the World’s Order, but made death necessary, so he could rise again;
3. Iightning (apart from fertility) is a sign of the birth of a new Cycle (v. Thunder);
4. the marrow of a dead man’s spine becomes a snake: v. Q, 1, and Spine; v. also E, 1, 2

F. earth, underworld:

1. incarnation of the dead;
2. the world-snake of ‘Midgard’, biting its own tail, also stands tor the ocean which encircles the earth, and is the place where the sun makes its Night- crossing (= the Underworld); his movement causes the sea-storms; at the Twilight of the Gods he fought (and was vanquished by) his great enemy Thor;
3. the winds are represented as having serpents’ tails: coming from the ground (the wind-mountain), so chthonian, in charge of the White Goddess (and later the witches), or Aeolus; it may also refer to the tapering of their strength;
4. Eros was originally a chthonic snake, a Lord of the Underworld, where death-resurrection took place: v. the myth of Eros and Psyche;
5. as psychopomp: “As it fell upon a day Rich Dives sickened and died; Then came two serpents out of hell, His soul therein to guide”

SERPENT
The Continuum Encyclopedia of Symbols
by Udo Becker / 1994. 343 p.

Among most peoples, the serpent plays an extraordinarily important and extremely diverse role as a symbolic animal. The primary characteristics that gave the serpent its symbolic significance were the special place it occupies in the animal kingdom (movement over the ground without legs, living in holes in the ground, yet slipping out of eggs like a bird), its cold, slick and shiny exterior, its poisonous bite and its venom that can be used for medicinal purposes, as well as its periodic shedding of its skin.

It is frequently encountered as a chthonic being, as an adversary of man (but also as an apotropaic animal), as a protector of sacred precincts or of the underworld, as an animal having the soul of a human, as a sexual symbol (masculine because of its phallic shape, feminine because of its engulfing belly), and (because of its shedding) as a symbol of constant power of renewal.

In Africa, the serpent was occasionally revered in cults as a spirit or deity.

In ancient Central American civilizations, the feathered serpent, in particular, played a large role; it was originally a symbol of rain and vegetation and later became a “night sky serpent covered with green quetzal feathers” that stood opposite the “turquoise serpent or day sky serpent” and, united with the latter, represented a symbol of the cosmos.

In China, the serpent was thought to be connected with the earth and water and was thus a Yin symbol. In Indian mythology, there are nagas, serpents that function as beneficent or maleficent mediators between gods and humans and were sometimes (like other serpents in other civilizations) associated with the RAINBOW. The kundalini serpent, imagined as being rolled up at the bottom end of the spine, is regarded as the seat of cosmic energy and is a symbol of life and (psychologically formulated) libido.

The oldest evidence for a staff of Aesclepius comes from Mesopotamia (end of the 3rd millenium B.C.). In the symbolism of the Egyptians, the serpent played an essential and greatly varying role; there were, for example, several serpent goddesses, such as a cobra goddess who presided over the growth of plants. Fate (good or bad) was also sometimes worshipped in the form of a serpent, that is, as a “house spirit.”

In addition, there are numerous mythological serpents (winged, with feet, many-headed). The uraeus serpent was regarded as a representative of a goddess who had many names; in it, one saw the embodiment of the eye of the sun god; according to mythology, it rises up on its tail end on the sun or on the forehead of the sun god and destroys its enemies with a breath of fire; its likeness appears on the forehead of Egyptian kings as a symbol of protection and rulership. Apophis, the arch-foe of the sun god and of world order, is also in the form of a serpent.

In addition, the symbol of the UROBOROS, the serpent biting its own tail, first appeared in Egypt.

The Jews considered the serpent primarily as a threatening creature; the Old Testament counts it among the unclean animals; it appears as the idealized image of sin and of Satan and is the seductress of the first couple in Eden; on the other hand, though, it also appears as a symbol of prudence. When God punished the disobedience of the Israelites with a plague of poisonous, winged serpents, He commanded Moses, who asked for help, to make a BRAZEN SERPENT; whoever was bitten by poisonous serpents and looked upon the brazen one, was to remain alive. Thus, a Brazen Serpent of this type was long a ritual object of the Jews and was considered by Christianity to be a symbolic portent of Christ due to its salutary character; the serpent figures on bishops’ crooks refer in part to that Brazen Serpent as well as to the serpent as a symbol of prudence.

There were numerous mythological and symbolic serpent figures in antiquity as well, frequently in the form of monstrous hybrid creatures (see CHIMERA; ECHIDNA; HYDRA). In the cult of the god of healing, Asclepius (Aesculapius), the serpent (with respect to its shedding of its skin) played an important role as a symbol of the constant self-renewal of life (see ASCLEPIUS, STAFF OF). Serpents were often kept in Roman houses as symbols of house and family spirits. The Midgard Serpent of Old Norse mythology is a giant, destructive serpent that closely surrounds the earth (Midgard), which is thought of as a disk; it is a symbol of constant threat to the world order; in early Christianity, it was identified with LEVIATHAN.

Christian art of the Middle Ages often emphasizes the seductive aspect of the serpent of Eden by a close association with woman (such as depictions of serpents having a woman’s head and breasts), whereby an inner relation to the tempted Eve is suggested. In PHYSIOLOGUS, the serpent is discussed with respect to the text of Matthew 10:16, “Be ye therefore wise as serpents, and harmless as doves.”

The serpent is the sixth sign of the Chinese ZODIAC and corresponds to Virgo (see VIRGIN).

SERPENT
Symbolism: A Comprehensive Dictionary
by Steven Olderr / 1986. 153 p.

serpent evil; sin; energy; force; night; subterranean life; fertility; wisdom; power to heal; generative energy; regeneration; the Devil; secrecy; hiding; danger; death; materialism; slavery; temptation; fascination; jealousy; wisdom of the deep; guardian of the springs of life, immortality, the superior riches of the spirit; great mysteries; forces of destruction; seduction of strength by matter; the inferior within the superior; the evil inherent in all worldly things; the evil side of nature; the feminine principle; a phallic symbol; the unconscious expressing itself suddenly and unexpectedly with terrible or frightening results;

emblem of the tribe of Dan; attribute of Saturn, Janus, Father Time, Asclepius, Minerva, Ceres, St. Patrick, the personifications of Time, Earth, Logic, Innocence, Africa heraldry strategy; military fame; courage; vigilance; instinct; the subconscious China evil; cunning horned snake water; intensified duality; opposite forces in conflict feathered snake duality (good / evil, heaven / earth, etc.) brass snake associated with the Crucifixion snake with head erect human wisdom ~ rising snake retrospection snake in a circle, or biting its own tail eternity; time; union of the sexes (has to have its tail in its mouth); the zodiac snake encircling a globe the spread of sin; the omnipresence of sin snake encircling a tree the Fall of Man woman holding a mirror and a serpent Prudence personified serpent at the foot of the Cross Christ’s overcoming of the evil that leads man into sin plumed serpent beneficence; reconciliation of opposites;

the angel of dawn serpent with sheep’s head spring; initiation; spiritualization serpent with rod or staff the miracles of Aaron, Moses serpent over a fire associated with St. Paul at Melita twin serpents death; all binary opposites (good / evil, male / female, life / death, etc. ) three coiled snakes attribute of St. Hilda serpent sloughing its skin rebirth; healing; kissing a serpent’s head; fellatio serpent on a Tau cross; Christ ;the Virgin Mary; with a serpent underfoot victory of the Seed of Woman bruised serpent; attribute of the Virgin Mary indicating her victory over sin serpent battling with a fish Satan tempting Christ; serpent emerging from a cup or chalice the attempted poisoning of St. John; serpent on a sword attribute of St. John; serpent in a loaf of bread or in other food attribute of St. Benedict; woman with serpents for hair Medusa; woman with serpent to breast Cleopatra; woman treading on serpent; the Persian sibyl; serpent entwined around a woman’s arm or leg;

Eurydiceù serpent with a woman’s head Deceit personified serpent entwining a corpse, with other victims nearby Cadmus two youths and a man wrestling with a serpent Laocoon and his sons infant wrestling with two serpents; Hercules man shooting python with arrows; Apollo image of a serpent with a human head on a shield; attribute of the Iron Age personified; serpent around man’s wrist at campfire; St.Paul; serpent with infant in a basket; Erichthonius; see also viper; wyvern; sea serpent; python

SERPENT
Woman’s Dictionary of Symbols and Sacred Objects
by Barbara G. Walker / 1988. 527 p.

The letter S was one of the oldest symbols of serpenthood, both in its shape and in its sibilant sound; and the serpent was one of the oldest symbols of female power. Woman and serpent together were considered holy in preclassic Aegean civilization, since both seemed to embody the power of life. Serpents were considered immortal because they were believed to renew themselves indefinitely by shedding old skins. It was the mother of all gods, the Earth Goddess Gaea, who first founded the Delphic (“Womb”) oracle and inspired its original Pythonesses or divinatory serpent-priestesses, according to Homeric hymns. Hesiod referred to her as Gaea Pelope, the female serpent.

The biblical Nehushtan was a deliberate masculinization of a similar oracular she- serpent, Nehushtah, Goddess of Kadesh (meaning “Holy”), a shrine like that of the Pythonesses. Israelites apparently violated the sanctuary and raped its priestesses, but “Moses and Yahweh had to placate the angry serpent goddess of Kadesh, now deposed, by erecting her brazen image…. Mythologically, the serpent is always a female divinity.”

In India, the “Mother of All that Moves” and Goddess of the Earth sometimes bore the title of Sarparajni, “Serpent Queen.” As the female serpent Ananta the Infinite, she enveloped all gods during their death-sleep between incarnations. As the female serpent Kundalini, she represented the inner power of the human body, coiled in the pelvis like woman’s organs of life-giving. It was, and still is, the aim of male Tantric sages to awaken the female Kundalini serpent in their own bodies, through physical, mystical, and sexual exercises and through meditation on the female principle.

Among the oldest predynastic Goddess figures in Egypt was the serpent-mother Iusaset, or Ua Zit, or Per-Uatchet whom the Greeks called Buto. Pyramid Texts say she is the Celestial Serpent, giver of the food of eternal life. 3 Her symbol, the uraeus, meant both “serpent” and “Goddess.” She was also Mehen the Enveloper, the female serpent like Ananta who enclosed the phallus of Ra the sun god every night. There are mythic indications that this nightly sexual communion with the serpent power of Mother Earth was at times considered the real source of Ra’s renewed power to light up the world again each day.

The Middle East used to regard the female serpent as the embodiment of enlightenment, or wisdom, because she understood the mysteries of life. In Arabic, the words for “snake,” “life,” and “teaching” are all related to the name of Eve-the biblical version of the Goddess with her serpent form, who gave the food of enlightenment to the first many Of course, in the Bible both Eve and her serpent were much diabolized; but Gnostic sects of the early Christian era retained some of the older ideas about their collaboration concerning the fruit of knowledge. Some sects worshiped the snake as a benevolent Female Spiritual Principle, who taught Adam and Eve what they needed to know about God’s duplicity, saying,

“You shall not die; for it was out of jealousy that he said this to you. Rather, your eyes shall open, and you shall become like gods, recognizing evil and good.”

The “arrogant ruler” (God) cursed the woman and her snake, declaring that they must be enemies to one another instead of collaborators.6 But the Gnostics honored Eve and the serpent for providing the essential knowledge that made human beings human.

Naturally, the serpent was also masculinized and often viewed as Eve’s first consort. Gnostics called this serpent Ophion, or the Aeon of Light, or Hellos, or Agathodemon, which meant the Great Serpent of Good, as opposed to Kakodemon, the Great Serpent of Evil.7 His worshipers were sometimes known as the Brotherhood of the Serpent. Their writings said: “Thou who risest from the four winds, thou friendly good demon, glittering Hellos, shining over the whole earth, thou art the great serpent who leadest the gods.”

Several other mythologies also had the Tree of Life or Tree of Knowledge guarded by a serpent sacred to the Goddess, such as Ladon, the mighty serpent who guarded Mother Hera’s life-giving apple tree in the Garden of the Hesperides. The intimate relationship between the Goddess and her serpent consort was believed to be the reason for his deathlessness. Gnostic mysticism turned the Great Serpent into Ouroboros earth dragon living forever in the uterine underworld. A symbol of his cosmic world-creating seed was the round sea urchin, which the Celts called “serpent’s egg.”9 Some showed Raphael as a Wise Serpent.

Christians adopted the Great Serpent as a form of their devil; yet the life-giving powers of the serpent retained popularity in secret books of magic and materia medica. As late as the eighteenth centuryA.D., Arnold de Villanova declared that stags are known to reverse of old age and restore their youth simply “by feeding on vipers and serpents.”

SERPENT
Symbols, Our Universal Language
by Eva C. Hangen / 1962. 308 p.

From the serpent we get a great variety of symbolisms, among them:

In general symbolism, good, evil, wisdom, power, eternity, everything that is base, dark, low, depending upon the circumstances into which the reptile is drawn.

From Matthew 10:16, symbol of wisdom
Serpent surrounding a tree, fall of man.
Serpent wrapped around a globe, spread of sin.
A serpent coiled when held aloft upon a staff, regeneration.
Coiled with head erect, defiance.
With tail in its mouth, eternity or temptation.
Man-headed with double tail, fraud.
Serpent drinking from a kantharos in hand of a maiden, (Hygeia) health.

SERPENT
A Dictionary of Symbols
by Jean Chevalier and Alain Gheerbrant / 1994

Serpents are as different from all animal species as the human race, but at the opposite end of the scale. If mankind may be regarded as standing at the end of a long evolutionary struggle we must set this cold-blooded, armless, hairless, featherless creature at its very beginning. In this sense mankind and serpents are opposites, complementary and rivals the one to the other. In this sense too, there is something of the serpent in all human beings, and strangely enough in that portion of them over which they have the least control. An analyst has remarked that ‘the serpent is a vertebrate creature embodying the lower psyche, hidden psychosis and what is unusual, incomprehensible and mysterious.’ There is nothing so simple or so commonplace as a serpent, and yet by virtue of this very simplicity nothing which shocks the spirit more.

At the well-springs of life: the serpent as soul and libido

Travellers in the southern Cameroon’s have observed that in their hunting language the Pygmies depict serpents as a line on the ground and doubtless similar cave-drawings have exactly the same meaning. They may be said to take the serpent back to its original manifestation. It may only be a line, but it is a living line, what Andre Virel calls ‘an abstraction in flesh and blood’. Lines have neither beginning nor end and, once they come alive, they become capable of depicting whatever you like or of changing into any shape. All that can be seen of the line is what is immediately made manifest in space and time, and yet one is aware that, at either end, it is produced into invisible infinity.

The same is true of the serpent. When made visible on Earth, the serpent in the instant of its manifestation is the sacred made manifest. Above and beyond this, there is a feeling that it is a continuation of the infinite materialization which is none other than primordial formlessness, the storehouse l latency which underlies the manifest world. The serpent which we see is . he manifestation of the holiness of nature, a holiness which is material and no sense spiritual. It makes its appearance in the sunlit world like a ghost which one can touch, but which slips through one’s fingers. So, the serpent evades time which can be clocked, space which can be measured and logic which can be rationalized, to escape to the lower reaches from which it came and in which it can be imagined timeless, changeless and motionless in the fullness of its life. Swift as lightning, the serpent streaks from the dark mouth of some crevice or cranny to vomit life or death, before returning again to invisibility. Or else the serpent discards its male appearance to become female, coiling up, entwining around, squeezing, throttling, swallowing, digesting and sleeping.

The she-serpent is the invisible serpent principle which dwells in the lower levels of consciousness and the deeper strata of the Earth. It is secret and equivocal, its decisions are unpredictable and as swift as its transformations. Ever ambivalent, it toys with its own sexuality; it is both male and female, twins within the same body, like so any of the culture- heroes who are always depicted initially as cosmic serpents. The serpent does not therefore depict an archetype but an archetypal complex, linked to the freezing, clammy subterranean darkness of the beginning of things.

‘All possible snakes together form one single primordial manifoldness, an inseverable primordial Something which yet is ever coiling and uncoiling, which is ever melting away and re-emerging’ (KEYM p. 222). Yet what is this ‘primordial Something’ if it is not latent life or, as Keyserling puts it, ‘the lowest layer of life’? It is the well-spring, potentiality, from which all manifestation derives. ‘Nethermost Life’, he continues, ‘must needs be reflected in daylight consciousness in the form of a snake as indeed the Chaldeans had but one word for Serpent and Life’ (KEYM p. 21). Rene Guenon makes the same observation: ‘Serpent symbolism is, in fad, linked to the notion of life itself. In Arabic the word for “serpent” is el~hayyah, and that for “life”, el-hayat’ (GUES p. 159), adding, and this is of prime importance, that El-Hay, one of the principal names of God, ‘should not be translated as “the Living”, but as “the Life-giving”, the one who bestows life or who is the principle of life itself.’

The serpent which we see should, therefore, be regarded simply as a eeting incarnation of a Great Invisible Serpent, causal and a-temporal, lord of the life-principle and of the powers of Nature. The serpent is an ‘Old God’, the first god to be found at the start of all cosmogenesis, before religions of the spirit dethroned him. He created life and sustained it. On a human level he is the dual symbol of soul and libido. ‘The serpent is one of the most important archetypes of the human soul’, wrote Bachelard (BACR p. 212). In Tantrism, the serpent is the kundalin’, coiled round the base of the spinal column, on the sleep-state chakra, ‘its mouth closes the urethral meatus’ (DURS p. 343). When the serpent awakes, hisses and stiffens, ascent through the successive chakra takes place. This is the rising tide of the libido the fresh manifestation of life.

The Book of Symbols
by Jana Garai / 1974. 143 p.

“The infernal serpent; he it was, whose guile,
Stirr’d up with envy and revenge, deceived
The mother of mankind’.

Paradise Lost
John Milton

SNAKE

FROM BABYLON to Greece, India and China to Europe, the eternal symbol of the snake crossed every path in the myth, culture and history of man. As the Egyptian Ra arose from the depth of the primeval water of Nun, the snake was the first to acclaim him god. In the shape of the great serpent Ophion, he entwined the divine limbs of the Greek Great Goddess and feathered the earth. An ally of monsters as well as the gods, he was the inspiration of the Nassenes and is still a source of of ecstasy to the Holy Rollers of Kentucky.

The wisdom of the gods was the knowledge of the serpent; his sinuous form like the undulating waves of the sea which contain every secret and the mystery of life. Melampus, whose ears were licked by snakes, was the first mortal to be granted prophetic powers and to learn the language of the birds and insects. Garga, the father of Indian astronomy, owed his learning to a serpent. The god Quetzalcoatl, master of life, patron of the arts, and snake-bird, taught agriculture, metallurgy and gave the Aztecs maize and freedom from disease. Plutarch concluded that the serpent himself was a deity because ‘it feeds upon its own body; even so all things spring from God, and will resolve into deity again’. The ouroboros, a symbol of the snake biting his own tail, was at the time adopted by the Gnostics, not only because it was a deity, but also because it represented the ‘circle’ or the ‘wheel’ of life, regeneration and eternity. The ability of the snake to shed its skin was confirmation of the belief in resurrection to the ancient sages and they thought that with its skin, it also shed old age.

As a symbol of evil the coiled serpent of Midgard encircled the earth in the mythologies of the Noresemen. A serpent entwined the Tree of Life in the Garden of Paradise and first whispered the words of corruption to Eve. The woman succumbed and, like Hecate and Artemis who carry the snake in their hands or the grotesque Medusa whose tresses are made of reptilian coils, the shadow of sin endangered the spirit. The snake or the Devil lurks in the darkness to challenge the power of good; it is a symbol of seduction and the inherent evil in all the things of the world. But the snake coiled also around the caduceus of Mercury and the staff of Aesculapius, the god of medicine and healing. As good is balanced by evil, so must health be offset by sickness, and the brass serpent of Moses was the healer of the wound caused by the serpent.

The coiled or triumphant serpent had to be vanquished; so the body of a snake nailed to a cross is found in the sixteenth century book of Abraham le Juif. There it is taken to mean the conquest of the spirit over the temptation of the woman and is also an undeciphered symbol of the union of the male and female principle in alchemy. In the Iliad, an eagle carrying a wounded snake in its claws appears to the Greeks. The crucified serpent is again symbolic of the triumph of the patriarchal Aryans, who have subdued the feminine and matriarchal tradition of Asia.
_________________________________________________________________________________

THE SYMBOLISM OF SNAKES & SERPENTS IN HINDUISM

You will find many snake deities such as these in numerous Hindu temples

by: Jayaram V

The Indian subcontinent is home to several deadly, poisonous snakes, including the cobra. Death due to snakebite was the most common cause of death in India until recent times. India is also well known traditionally in the west for snake charmers and rope-trick magicians. Magical cure for snakebites is still practiced in remote areas of India.

Ancient Indians both feared and revered the snakes. The tradition still continues. Hindus worship snakes in temples as well as in their natural habitats, offering them milk, incense, and prayers. In Christianity a snake symbolizes evil or Devil. In Hinduism the symbolism is much more complex. In Hindu ritual and spiritual tradition, a snake is not an evil creature but a divinity representing eternity as well as materiality, life as well as death, and time as well as timelessness. It symbolizes the three processes of creation, namely creation, preservation and destruction.

You will find references to snake deities in both Hindu folklore and literature. It is possible that Indus people worshipped snakes. They are also popularly associated with both Vishnu and Shiva and several other divinities, including Indra, who rides an elephant called Nagendra, the lord of the snakes, which is probably a reference to Indra’s control over the snake world. The Puranas mention several large serpentine deities like Kadru, Manasa, Vinata and Asitka. Vasuki the king of snakes, played a vital role in the churning of the oceans. Several myths, beliefs, legends and scriptures are associated with snakes. Snakes were used in warfare and snake poison was often used in palace intrigues. The following are the most common symbolic descriptions associated with snakes in Hinduism.

1. Ananta, Infinity

In the Bhagavadgita, Lord Krishna says, “Among the serpents I am Ananta.” Ananta or the Adisesha is the infinite divine snake with its endless coils floating in the waters of creation, upon which Narayana (Brahman) rests. Ananta represents the infinite eternal materiality or primal energy (mula-prakriti). Upon activation, a small part (amsa) of it differentiates into subtle (suksma) and gross (suksham) realities (tattvas) which combine to manifest as the whole diversity we experience through our senses. The serpent below Vishnu is the primal Prakriti. The Lakshmi above, sitting at the feet of Vishnu, is the activated Prakriti. The waters or the ocean upon which all this floats represents avyakta Brahman or Unmanifested Brahman.

Adishesha, is also known as Ananta. Hence, Vishnu is called Anantasayana

2.Desire (Kama)

In a spiritual sense, snakes represents desires. Just as those who are bitten by snakes are vulnerable to suffering and death, those who are bitten by desires suffer from the cycle of births and deaths. The suffering inherent in the phenomenal existence is compared to snake poison. You are safe only when you hold that poison in your throat like Shiva and do not let it go into your body or mind. Pasas, the snake like ropes of attachment, are transformed desires, which keep people bound to their karmas.

Sexual desire is often symbolized in Hinduism as a snake

3. Sacred thread and divine ornaments.

In the images of many deities, such as Ganesha, snakes are depicted as the sacred thread (upavitam) worn around the body. The thread in the form of snake represents purity (sattva) of the body, knowledge of the Vedas, perfection in speech, and self-control. In the iconography of Saivism, snakes also serve as ornaments for the gods and goddesses..

Ganesha wearing snakes as the sacred thread and ornament.

4. Kundalini energy.

Kundalini or the sexual energy hidden in the muladhara chakara is compared to a coiled snake. When the body is subjected to austerities and purification through celibacy and other practices, the heat (tapas) generated in the process activates the kundalini. Then, like a coiled serpent it ascends gradually through the higher chakras until it reaches the highest chakra, the Sahasrara, whereby a yogi experiences enlightenment and the highest bliss.

Kundalini is popularly known as the serpent power

5. Tamas, the destructive tendency

In Hinduism there are three types of energies, creative energies represented by rajas, preservation energies represented by sattva, and destructive energies represented by tamas. They are also known as the centripetal, balancing and centrifugal forces of the universe. All motion and activity in the universe arises from them. Since the snakes are responsible for death and destruction of humans and animals, they are compared to the destructive tamasic energy represented by Lord Shiva himself as the destroyer. .

The Shivalinga at the base denotes the association between Shiva and the snakes. Both represent the destructive tendency in Nature.

6. Poisonous speech.

Like a snake, speech can hurt, cause pain and suffering and even unleash death in the form of curses and magical chants. The snake adorning the neck of Shiva represents the power of the venomous speech. The source of the speech is the throat where Shiva holds the poison (poisonous speech) and prevents it from getting out and hurting others. The forked tongue represents double talk or deceptive speech.

The forked tongue of the snake represents double talk and the poisonous teeth symbolize biting, hurtful speech.

7. Misfortune

Since snake bites bring misery and adversity to families through the death of cattle or family members, snakes are associated with bad luck or misfortune. This is well illustrated in the game of snakes and ladders which was invented in ancient India.

Snakes and Ladders, a game of fate and chance, originated in India.

8. Nagas, a class of demigods

Hindu scriptures mention Nagas, who are a class of demigods or semi divine beings who live in the subterranean world, known as Patala. They protect the treasures hidden in the earth and have the ability to assume human form. By nature they are good, but they can become destructive and vengeful if disrespected or not treated well. Hindus believes that certain types of curses and spells arising from aggrieved snake deities can result in death, sickness, misfortune, loss of progeny, or childlessness, for which one has to perform purifying and expiatory rites.

Naga Devas, the semi divine beings

9. Kala, death or time.

The snakes represent death, unexpected death or death arising from misfortune. The Vedas extol Rudra or Shiva as the healer, the god of medicines who protects and rescues his worshippers from death and destruction caused by snakes and snakebites. Snakes are symbolized as destructive and deadly arrows used in warfare. Hinduism considers our world a manifestation of Death (Kala) who is also known as Time. Kala devours everything. All existence for Him is food. Snakes symbolize Kala and thereby time.

Kala, the Lord of the mortal world. is also the lord of Death and Time. The whole world is his food.

10. Prana.

The world naga is often used in Hindu texts in reference to the outward breath (apana) or that which is expelled through the mouth and other apertures in the body as in case of a burp. Just as a snake moves in the passages below the earth, apana moves in the body through various channels and exists through the holes in the body. Just as the outward breath escapes through the mouth, snakes also occasionally come out of their subterranean passages through the holes in the ground and show themselves up. As the leader of the sense organs prana distributes food to all the organs. Since it is the personification of Death itself, it is eternal and indestructible.

Snakes represent the outward breath (apana)

OTHER SYMBOLISM

The word naga is also used in Hindu literature to refer to distinguished persons (nagadhipa), certain place names, names of superior or semi-divine elephants (nagendra), female elephant (naganjana), a particular group of Saivite ascetics (nagababas), Ganesha (naganana), a womb related disease, a fragrant flower bearing tree (nagakesara), the name of a constellation (naganaksatram), chemicals (nagajam), precious stones (nagamani), festivals (nagapancami), flowers (nagamalli), names of trees, elephant catcher (nagabandhaka), a subterranean world (nagalokam), a snake maiden (nagakanya), and so on.
I’m not sure whether the words Nagara and Nagarika, meaning town-bred or civilized, have any relation with the word naga, but they seem to have a common origin. However, Hindu Puranas describe both male and female nagas as very charming and beautiful as the following image of a naga queen suggests. It is possible that there might be a connection between the ancient Indians and the ancient Indian tribes of Americas, since the American Continent was like the subterranean world for the people of the Indian subcontinent, being on the opposite side of the globe.
___________________________

SNAKE WORSHIP

by: Edgar Thurston

Snake Worship

The following is a brief account of the beliefs and superstitions associated with snake worship in southern India in the last century. Some of the practices may still be continuing. The text has also been edited to remove objectionable references to certain communities.

Very closely connected with the subject of vows and votive offerings is that of the worship of snakes, to which vows are made and offerings dedicated.

In a note on serpent worship in Malabar, it is stated that “even to-day some corner of the garden of every respectable tarawad is allotted for snakes. Here a few trees are allowed to grow wild, and under them, on a masonry platform, one or more sculptured granite stones representing hooded serpents (cobras) are consecrated and set up.
The whole area is held sacred, and a mud lamp is lighted there every evening with religious regularity. I have seen eggs, milk, and plantains offered in the evening, after the lamp has been lit, at these shrines, to invoke the serpent’s aid on particular occasions. Such is the veneration in which these shrines are held that Cherumars and other tribals are not allowed within the precincts. Should, however, any such event happens, the resident snake or its emissary is said to apprise the owner of the defilement by creeping to the very threshold of his house, and remaining there until the Karanavan, or other managing member of the family promises to have it duly purified by a Brāhman”.

Concerning snake worship in Malabar, Mr C. Karunakara Menon writes4 as follows:—

“The existence of snake groves is said to owe its origin to Srī Parasurāma. [According to tradition, Parasurāma was an avatar of Vishnu, who destroyed the Kshatriya Rājas, and retired to Gokarnam in Canara. He called on Varuna, the god of water, to give him some land. Varuna caused the sea to recede, and thus the land called Kērala (including Malabar) came into existence. Brāhmans were brought from Northern India to colonise the new country, but they ran away from fear of the snakes, of which it was full. Parasurāma then brought in a further consignment of Brāhmans from the north, and divided the country into sixty-four Brāhmanical colonies.] Parasurāma advised that a part of every house should be set apart for snakes as household gods. The (snake) groves have the appearance of miniature reserved forests, as they are considered sacred, and there is a strong prejudice against cutting down trees therein. The groves contain a snake king and queen made of granite, and a tower-like structure, made of laterite,5 for the sacred snakes. Snakes were, in olden days, considered a part of the property. [Transfer deeds made special mention of the family serpent as one of the articles sold along with the freehold.]

“When a snake is seen inside, or in the neighbourhood of the house, great care is taken to catch it without giving it the least pain. Usually a stick is placed gently on its head, and the mouth of an earthenware pot is shown to it. When it is in, the pot is loosely covered with a cocoanut shell, to allow of free breathing. It is then taken to a secluded spot, the pot is destroyed, and the snake set at liberty. It is considered to be polluted by being caught in this way, and holy water is sometimes poured over it. Killing a snake is considered a grievous sin, and even to see a snake with its head bruised is believed to be a precursor of calamities. Pious Malayālis (natives of Malabar), when they see a snake killed in this way, have it burnt with the full solemnities attendant on the cremation of a high-caste Hindu. The carcase is covered with a piece of silk, and burnt in sandalwood. A Brāhman is hired to observe pollution for some days, and elaborate funeral oblations are offered to the dead snake”.

In Travancore there was formerly a judicial ordeal by snake-bite. The accused thrust his hand into a mantle, in which a cobra was wrapped up. If it bit him, he was declared guilty, if not innocent.

In connection with snake worship in Malabar, Mr Upendra Pai gives the following details.6 Among snakes none is more dreaded than the cobra (Naia tripudians), which accordingly has gathered round it more fanciful superstitions than any other snake. This has led to cobra worship, which is often performed with a special object in view. In some parts of the country, every town or village has its images of cobras rudely carved on stone. These cobra stones, as they are termed, are placed either on little platforms of stone specially erected for them, or at the base of some tree, preferably a holy figure. On the fifth day of the lunar month Shravana, known as the Nāgarapanchami—that is, the fifth day of the nāgas or serpents—these stones are first washed; then milk, curds, ghī (clarified butter), and cocoanut water, are poured over them. Afterwards they are decorated with flowers, and offerings are made to them. The cobra stone is also worshipped at other times by those who have no male children, in order to obtain such. But to establish new images of cobras in suitable places is regarded as a surer method of achieving this object. For this certain preliminary ceremonies have to be gone through, and, when once the image has been established, it is the duty of the establisher to see that it is properly worshipped at least once a year, on the Nāgarapanchami day.
The merit obtained is proportionate to the number of images thus worshipped, so that pious people, to obtain a great deal of merit, and at the same time to save themselves the expense of erecting many stone images, have several images drawn, each on a tiny bit of a thin plate of gold or silver. These images are handed over to some priest, to be kept along with other images, to which daily worship is rendered.
In this way, great merit is supposed to be obtained.
It is also believed that such worship will destroy all danger proceeding from snakes. The cobra being thus an object of worship, it is a deadly sin to kill or maim it. For the cobra is in the popular imagination a Brāhman, and there is no greater sin than that of killing a Brāhman. Accordingly, if any one kills a cobra, he is sure to contract leprosy, which is the peculiar punishment of those who have either killed a cobra, or have led to the destruction of its eggs by digging in or ploughing up soil which it haunts, or setting on fire jungle or grass in the midst of which it is known to live and breed.

Praying for Offspring before Lingam, Snake-Stones, and Figure of Ganēsa.

In a note on snake worship, Mr R. Kulathu Iyer writes as follows:—

“In Travancore there is a place called Mannarsala, which is well known for its serpent worship. It is the abode of the snake king and queen, and their followers. The grove and its premises cover about acres. In the middle of this grove are two small temples dedicated to the snake king and queen. There are also thousands of snakes of granite, representing the various followers of the king and queen. Just to the northern side of the temple there is a house, the abode of the Nampiathy, who performs pooja (worship) in the temple. In caste he is lower in grade than a Brāhmin.
The temple has paddy (rice) fields and estates of its own, and also has a large income from various sources. There is an annual festival at this temple, known as Ayilyam festival, which is celebrated in the months of Kanny and Thulam (September and October). A large number of people assemble for worship with offerings of gold, silver, salt, melons, etc. The sale proceeds of these offerings after a festival would amount to a pretty large sum. On the day previous to the Ayilyam festival, the temple authorities spend something like three thousand rupees in feeding the Brāhmins. A grand feast is given to nearly three thousand Brāhmins at the house of the Nampiathy. On the Ayilyam day, all the serpent gods are taken in procession to the illam (house of the Nampiathy) by the eldest female member of the house, and offerings of neerumpalum (a mixture of rice-flour, turmeric, ghī, water of tender cocoanuts, etc.), boiled rice, and other things, are made to the serpent gods. It is said that the neerumpalum mixture would be poured into a big vessel, and kept inside a room for three days, when the vessel would be found empty. It is supposed that the serpents drink the contents. As regards the origin of this celebrated grove, Mr S. Krishna Iyer, in one of his contributions to the Calcutta Quarterly Review, says that ‘the land from Avoor on the south to Alleppy on the north was the site of the Khandava forest celebrated in the Mahabaratha; that, when Arjuna set fire to it, the serpents fled in confusion and reached Mannarasalay, and there prayed to the gods for protection; that thereupon the earth around was miraculously cooled down, and hence the name mun-l-ari-l-sala, the place where the earth was cooled. After the serpents found shelter from the Khandava fire, an ancestress of the Nambiathy had a vision calling upon her to dedicate the groves and some land to the Nāga Rāja (snake king), and build a temple therein. These commands were obeyed forth-with, and thenceforward the Nāga Rāja became their family deity’. In the ‘Travancore State Manual,’
Mr Nagam Iyer, referring to Mannarsala, says that ‘a member of this Mannarsala illam married a girl of the Vettikod illam, where the serpents were held in great veneration. The girl’s parents, being very poor, had nothing to give in the way of dowry, so they gave her one of the stone idols of the serpent, of which there were many in the house. The girl took care of this idol, and worshipped it regularly. Soon she became pregnant, and gave birth to a male child and a snake. The snake child grew up, and gave rise to a numerous progeny. They were all removed to a spot where the present kavu (grove) is. In this kavu there are now four thousand stone idols representing snake gods’. Such is the origin of this celebrated grove of Central Travancore”.

In the bank of the river separating Cranganore from the rest of the Native State of Cochin is the residence of a certain Brāhman called the Pāmpanmekkat (snake guardian) Nambūdri, who has been called the high priest of serpent worship. It is recorded by Mr Karunakara Menon that, “a respectable family at Angadipuram (in Malabar) sold their ancestral house to a supervisor in the Local Fund P. W. D. (Public Works Department). He cut down the snake grove, and planted it up. Some members of the vendor’s family began to suffer from some cutaneous complaint. As usual the local astrologer was called in, and he attributed the ailment to the ire of the aggrieved family serpents. These men then went to the Brāhmin house of Pampu Mekat. This Namboodri family is a special favourite of the snakes. When a new serpent grove has to be created, or if it is found necessary to remove a grove from one place to another, the ritual is entirely in the hands of these people. When a family suffers from the wrath of the serpents, they generally go to this Namboodri house. The eldest woman of the house would hear the grievances of the party, and then, taking a vessel full of gingelly (Sesamum) oil, and looking into it, would give out the directions to be observed in satisfying the serpents”.

Concerning the Pāmpanmekkat Nambūdri, Mr Gopal Panikkar writes that,
“it is said that this Nambūdri household is full of cobras, which find their abode in every nook and corner of it. The inmates can scarcely move about without placing their feet upon one of these serpents. Owing to the magic influence of the family, the serpents cannot and will not injure them. The serpents are said to be always at the beck and call of the members of this Nambūdri family, and render unquestioned obedience to their commands. They watch and protect the interests of the family in the most zealous spirit”.

It is said that, “every year the Nambūdri receives many offerings in the shape of golden images of snakes, for propitiating the serpent god to ward off calamity, or to enlist its aid in the cure of a disease, or for the attainment of a particular object. It is well known that the Nambūdri has several hundreds of these images and other valuable
offerings, the collection of centuries, amounting in value to over a lakh of rupees. This aroused the cupidity of a gang of dacoits (robbers), who resolved some years ago to ease the Nambūdri of a great portion of this treasure. On a certain night, armed with lathies (sticks), slings, torches, and other paraphernalia, the dacoits went to the illam, and, forcibly effecting an entrance, bound the senior Nambūdri’s hands and feet, and threw him on his breast. This precaution taken, the keys of the treasure-room were demanded, the alternative being further personal injury. To save himself from further violence, the keys were surrendered. The dacoits secured all the gold images, leaving the silver ones severely alone, and departed. But, directly they went past the gate of the house, many snakes chased them, and, in the twinkling of an eye, each of the depredators had two snakes coiled round him, others investing the gang, and threatening, with uplifted hoods and hisses, to dart at them. The dacoits remained stunned and motionless. Meantime, the authorities were communicated with, and the whole gang was taken into custody. It is said that the serpents did not budge an inch until after the arrival of the officers”.

Other marvellous stories of the way in which the snakes carry out their trust are narrated.

A section of Ambalavāsis or temple servants in Malabar, called Tēyyambādis, the members of which dance and sing in Bhagavati temples, perform a song called Nāgapāttu (song in honour of snakes) in private houses, which is supposed to be effective in procuring offspring.

Pulluvan and Pot-Drum.

In many houses of the Tiyans of Malabar, offerings are made annually to a bygone personage named Kunnath Nāyar, and to his friend and disciple, Kunhi Rāyan, a Māppilla (Muhammadan). According to the legend, the Nāyar worshipped the kite until he obtained command and control over all the snakes in the land. There are Māppilla devotees of Kunnath Nāyar and Kunhi Rāyan, who exhibit snakes in a box, and collect alms for a snake mosque near Manarghāt at the foot of the Nīlgiri hills. A class of snake-charmers in Malabar, called Kuravan, go about the country exhibiting snakes.
It is considered to be a great act of piety to purchase these animals, and set them at liberty. The vagrant Kakkalans of Travancore, who are said to be identical with the Kakka Kuravans, are unrivalled at a dance called pāmpātam (snake dance).

The Pulluvans of Malabar are astrologers, medicine-men, and priests and singers in snake groves. According to a legend they are descended from a male and female servant, who were exiled by a Brāhman in connection with the rescuing by the female of a snake which escaped when the Gāndava forest was set on fire by Agni, the god of fire. Another legend records how a five-hooded snake fled from the burning forest, and was taken home by a woman, and placed in a room. When her husband entered the room, he found an ant-hill, from which the snake issued forth, and bit him. As the result of the bite, the man died, and his widow was left without means of support. The snake consoled her, and devised a plan, by which she could maintain herself. She was to go from house to house, and cry out, “Give me alms, and be saved from snake-poisoning”. The inmates would give alms, and the snakes, which might be troubling them, would cease to annoy. For this reason, the Pulluvas, when they go with their pot-drum (pulluva kudam) to a house, are asked to play, and sing songs which are acceptable to the snake gods, in return for which they receive a present of money. A Pulluvan and his wife preside at [130]the ceremony called Pāmban Tullal, which is carried out with the object of propitiating the snake gods. Concerning this ceremony, Mr L. K. Anantha Krishna Iyer writes as follows:—

“A pandal (booth) supported by four poles driven into the ground is put up for the purpose, and the tops of the poles are connected with a network of strings, over which a silk or red cloth is spread to form a canopy.
The pandal is well decorated, and the floor below it is slightly raised and smoothed. A hideous figure of the size of a big serpent is drawn in rice-flour, turmeric (Curcuma longa), kuvva(Curcuma angustifolia), powdered charcoal, and a green powder. These five powders are essential, for their colours are visible on the necks of serpents. Some rice is scattered on the floor and on the sides, and ripe and green cocoanuts are placed on a small quantity of rice and paddy (unhusked rice) on each side. A pūja for Ganapathi (the elephant god) is performed, to see that the whole ceremony terminates well. A good deal of frankincense is burned, and a lamp is placed on a plate, to add to the purity, sanctity, and solemnity of the occasion. The members of the house go round the pandal as a token of reverence, and take their seats close by. It often happens that the members of several neighbouring families take part in the ceremony. The women, from whom devils have to be cast out, bathe and take their seats on the western side, each with a flower-pod of the areca palm. The Pulluvan, with his wife or daughter, begins his shrill musical tunes (on serpents), vocal and instrumental alternately. As they sing, the young female members appear to be influenced by the modulation of the tunes and the smell of the perfumes. They gradually move their heads in a circle, which soon quickens, and the long locks of hair are soon let loose. These movements appear to keep time with the Pulluvan’s music. In their unconscious state, they beat upon the floor, and wipe off the figure drawn. As soon as this is done, they go to a serpent grove close by, where there may be a few stone images of serpents, before which they prostrate themselves. They now recover their consciousness, and take milk, water of the green cocoanut, and plantain fruits, and the ceremony is over.”

In connection with the Pāmban Tullal, Mr Gopal Panikkar writes that “sometimes the gods appear in the bodies of all these females, and sometimes only in those of a select few, or none at all. The refusal of the gods to enter into such persons is symbolical of some want of cleanliness in them; which contingency is looked upon as a source of anxiety to the individual.
It may also suggest the displeasure of these gods towards the family, in respect of which the ceremony is performed. In either case, such refusal on the part of the gods is an index of their ill-will or dissatisfaction. In cases where the gods refuse to appear in any one of those seated for the purpose, the ceremony is prolonged until the gods are so propitiated as to constrain them to manifest themselves. Then, after the lapse of the number of days fixed for the ceremony, and, after the will of the serpent gods is duly expressed, the ceremonies close”.

Sometimes, it is said, it may be considered necessary to rub away the figure as many as one hundred and one times, in which case the ceremony is prolonged over several weeks. Each time that the snake design is destroyed, one or two men, with torches in their hands, perform a dance, keeping step to the Pulluvan’s music. The family may eventually erect a small platform or shrine in a corner of their grounds, and worship at it annually. The snake deity will not, it is believed, manifest himself if any of the persons or articles required for the ceremony are impure, e.g., if the pot-drum has been polluted by the touch of a menstruating female. The Pulluvan, from whom a drum was purchased for the Madras Museum, was very reluctant to part with it, lest it should be touched by an impure woman. In addition to the pot-drum, the Pulluvans play on a lute with snakes painted on the reptile skin, which is used in lieu of parchment. The skin, in a specimen which I acquired, is apparently that of the big lizard Varanus bengalensis. The lute is played with a bow, to which a metal bell is attached.

In the “Madras Census Report,” 1871, Surgeon-Major Cornish states that there is a place near Vaisarpadi, close to Madras, in which the worship of the living snakes draws crowds of votaries, who make holiday excursions to the temple, generally on Sundays, in the hope of seeing the snakes, which are preserved in the temple grounds; and, he adds, probably as long as the desire of offspring is a leading characteristic of the Indian people, so long will the worship of the serpent, or of snake-stones, be a popular cult. He describes further how, at Rajahmundry in the Telugu country, he came across an old ant-hill by the side of a public road, on which was placed a stone representing a cobra, and the ground all round was stuck over with pieces of wood carved very rudely in the shape of a snake. These were the offerings left by devotees at the abode taken up by an old snake, who would occasionally come out of his hole, and feast on the eggs and ghī (clarified butter) left for him by his adorers. Around this place he saw many women who had come to pray at the shrine. If they chanced to see the cobra, the omen was interpreted favourably, and their prayers for progeny would be granted.

Concerning snake worship in the Tamil country, Mr W. Francis writes as follows:—

“A vow is taken by childless wives to install a serpent (nāgapratishtai), if they are blessed with offspring. The ceremony consists in having a figure of a serpent cut in a stone slab, placing it in a well for six months, giving it life (prānapratishtai) by reciting mantrams and performing other ceremonies over it, and then setting it up under a pīpal tree (Ficus religiosa), which has been married to a margosa (Melia Azadirachta). Worship, which consists mainly in going round the tree 108 times, is then performed to it for the next forty-five days. Similar circumambulations will also bring good luck in a general way, if carried out subsequently”.

It is further recorded by Mr F. R. Hemingway that, “Brāhmans and the higher Vellālans think that children can be obtained by worshipping the cobra. Vellālans and Kallans perform the worship on a Friday. Among the Vellālans, this is generally after the Pongal festival. The Vellālans make an old woman cry aloud in the backyard that a sacrifice will be made to the cobra next day, and that they pray it will accept the offering. At the time of sacrifice, cooked jaggery (crude sugar) and rice, burning ghī in the middle of rice-flour, and an egg, are offered to the cobra, and left in the backyard for its acceptance. The Pallis annually worship the cobra by pouring milk on an ant-hill, and sacrificing a fowl near it. Valaiyans, Pallans, and Paraiyans sacrifice a fowl in their own backyards.”

In the Tamil country, children whose birth is attributed to a vow taken by childless mothers to offer a snake cut on a stone slab, sometimes have a name bearing reference [134]to snakes given to them, i.e., Sēshāchalam,20 Sēshamma, Nāgappa, or Nāgamma. Nāga, Nāgasa, or Nāgēswara, occurs as the name of a totemistic exogamous sept or gōtra of various classes in Ganjam and Vizagapatam. In the Odiya caste of farmers in Ganjam, members of the Nāgabonso sept claim to be descendants of Nāgamuni, the serpent rishi. Nāgavadam (cobra’s hood) is the name of a subdivision of the Tamil Pallis, who wear an ornament called nāgavadam, representing a cobra, in the dilated lobes of the ears.

Ant (i.e., white-ant, Termes) hills, which have been repeatedly referred to in this chapter, are frequently inhabited by cobras, and offerings of milk, fruit, and flowers are consequently made to them on certain ceremonial occasions. Thus it is recorded,21 by the Rev. J. Cain that when he was living in Ellore Fort in the Godāvari district, in September, 1873, “a large crowd of people, chiefly women and children, came in, and visited every white-ant hill, poured upon each their offerings of milk, flowers, and fruit, to the intense delight of all the crows in the neighbourhood. The day was called the Nāgula Chaturdhi—Chaturdhi, the fourth day of the eighth lunar month—and was said to be the day when Vāsuki, Takshakā, and the rest of the thousand Nāgulu were born to Kasyapa Brahma by his wife Kadruva.22 The other chief occasions when these ant-hills are resorted to are when people are affected with earache or pains in the eye, and certain skin diseases. They visit the ant-hills, pour out milk, cold rice, fruit, etc., and carry away part of the earth, which they apply to the
troublesome member, and,
if they afterwards call in a Brāhman to repeat a mantra or two, they feel sure the complaint will soon vanish. Many parents first cut their children’s hair near one of these hillocks, and offer the first fruits of the hair to the serpents residing there”.

The colossal Jain figure of Gomatēsvara, Gummatta, or Gomata Rāya, at Srāvana Belgola in Mysore,23 is represented as surrounded by white-ant hills, from which snakes are emerging, and with a climbing plant twining itself round the legs and arms.

On the occasion of the snake festival in the Telugu country, the Bōya women worship the Nāgala Swāmi (snake god) by fasting, and pouring milk into the holes of white-ant hills. By this a double object is fulfilled. The ant-hill is a favourite dwelling of the cobra, and was, moreover, the burial-place of Valmīki, from whom the Bōyas claim to be descended. Valmīki was the author of the Rāmāyana, and is believed to have done penance for so long in one spot that a white-ant hill grew up round him. On the Nāgarapanchami day, Lingāyats worship the image of a snake made of earth from a snake’s hole with offerings of milk, rice, cocoanuts, flowers, etc. During the month Aswija, Lingāyat girls collect earth from ant-hills, and place it in a heap at the village temple. Every evening they go there with wave-offerings, and worship the heap. At the Dipāvali festival, 24 the Gamallas (Telugu toddy-drawers) bathe in the early morning, and go in wet clothes to an ant-hill, before which they prostrate themselves, and pour a little water into one of the holes. Round the hill they wind five turns of cotton thread, and return home. Subsequently they come once more to the ant-hill with a lamp made of flour paste. Carrying the light, they go three or five times round the hill, and throw split pulse (Phaseolus Mungo) into one of the holes. On the following morning they again go to the hill, pour milk into it, and snap the threads wound round it.

The famous temple of Subramanya in South Canara is said to have been in charge of the Subramanya Stānikas (temple servants), till it was wrested from them by the Shivalli Brāhmans. In former times, the privilege of sticking a golden ladle into a heap of food piled up in the temple on the Shasti day is said to have belonged to the Stānikas. They also brought earth from an ant-hill on the previous day. Food from the heap, and some of the earth, are received as sacred articles by devotees who visit the sacred shrine.

At the Smasanākollai festival in honour of the goddess Ankalamma at Malayanūr, some thousands of people congregate at the temple. In front of the stone idol is a large ant-hill, on which two copper idols are placed, and a brass vessel is placed at the base of the hill, to receive the various offerings.

At a wedding among the nomad Lambādis, the bride and bridegroom pour milk into an ant-hill, and offer cocoanuts, milk, etc., to the snake which lives therein. During the marriage ceremonies of the Dandāsis (village watchmen in Ganjam), a fowl is sacrificed at an ant-hill. At a Bēdar (Canarese cultivator) wedding, the earth from an ant-hill is spread near five water-pots, and on it are scattered some paddy (unhusked rice) and dhāl (Cajanus indicus) seeds. The spot is visited later on, and the seeds should have sprouted.
___________________________

SERPENTS & TORCHES

May 3, 2013 by Ellen Terrell

Today’s photo is of a bronze medallion on the vestibule floor of the Adams Building’s 2nd Street entrance. I have walked over it for several years and was curious about the imagery.

The symbolism of the torch – often a symbol of knowledge, learning, and enlightenment, is obvious and makes sense in the context of the Library. After all, torches, lamps, and other symbols of light are used quite a bit around the Library – we even have a torch on top of the Jefferson Building dome. However, the two serpents on the medallion confused me. They did bring to mind two well known symbols that are remarkably similar, so it was there that I looked for enlightenment.

First, I investigated symbols used by the American Medical Association, the American Academy of Family Physicians, and many other professional medical organizations. Their symbols have a single serpent wrapped around what looks to be a staff. This is the Rod (or Staff) of Aesculapius (Asclepius), the Greek god associated with healing and medicine.

Since the Rod of Aesculapius has one serpent instead of two, that didn’t seem to be the answer for the medallion. Then I looked to a second symbol – one that is often confused with the Rod of Aesculapius. It is the Caduceus which was carried by Hermes (and Mercury in Roman mythology) and it has two serpents facing each other twined around a staff. This seemed much more likely. Hermes is the Greek god of transitions and boundaries and acted as the messenger of the gods, as well as being considered the patron god of invention and trade–and he does appear on the bronze doors of the Adams Building. His Roman counterpart Mercury was known as the patron of commerce.

Seen in that light, what is on our vestibule floor makes a bit more sense. The artist used the more known mythological symbol of the Caduceus and modified it for the mission of the Library by using the torch symbolizing knowledge. This doesn’t really explain the serpents facing outward, but I wonder if the artist chose to have them facing away from the torch to symbolize the Library’s mission to spread knowledge.

After the creation of the Science & Business Reading Room on the 5th floor of the Adams Building, this medallion took on additional meaning. The Rod of Aesculapius and the Caduceus can also be seen to symbolize the subject areas of the reading room itself – science and medicine on one side and communication, trade, and commerce on the other.

Posted in: John Adams Building, Pic of the Week


SERPENTS IN THE BIBLE

Serpents (Hebrew: נחש‎ nāḥāš) are referred to in both the Hebrew Bible and the New Testament. The symbol of a serpent or snake played important roles in religious and cultural life of ancient Egypt, Canaan, Mesopotamia and Greece. The serpent was a symbol of evil power and chaos from the underworld as well as a symbol of fertility, life and healing. נחש Nāḥāš, Hebrew for “snake”, is also associated with divination, including the verb form meaning “to practice divination or fortune-telling”. In the Hebrew Bible, Nāḥāš occurs in the Torah to identify the serpent in the Garden of Eden. Throughout the Hebrew Bible, it is also used in conjunction with saraph to describe vicious serpents in the wilderness. The tannin, a dragon monster, also occurs throughout the Hebrew Bible. In the Book of Exodus, the staffs of Moses and Aaron are turned into serpents, a nāḥāš for Moses, a tannin for Aaron. In the New Testament, the Book of Revelation makes use of ancient serpent and the Dragon several times to identify Satan or the devil. (Rev 12:9; 20:2) The serpent is most often identified with the hubristic Satan, and sometimes with Lilith.
The story of the Garden of Eden and the fall of man represents a tradition among the Abrahamic peoples, with a presentation more or less symbolical of certain moral and religious truths.

SERPENTS IN MESOPOTAMIAN MYTHOLOGY

(See also: Snakes in mythology and Serpent (symbolism))

Ouroboros, single and in pairs at SS Mary and David’s Church, England

In one of the oldest stories ever written, the Epic of Gilgamesh, Gilgamesh loses the power of immortality, stolen by a snake. The serpent was a widespread figure in the mythology of the Ancient Near East. Ouroboros is an ancient symbol of a serpent eating its own tail that represents the perpetual cyclic renewal of life, the eternal return, and the cycle of life, death and rebirth, leading to immortality.
Archaeologists have uncovered serpent cult objects in Bronze Age strata at several pre-Israelite cities in Canaan: two at Megiddo, one at Gezer, one in the sanctum sanctorum of the Area H temple at Hazor, and two at Shechem. In the surrounding region, a late Bronze Age Hittite shrine in northern Syria contained a bronze statue of a god holding a serpent in one hand and a staff in the other. In sixth-century Babylon, a pair of bronze serpents flanked each of the four doorways of the temple of Esagila. At the Babylonian New Year festival, the priest was to commission from a woodworker, a metalworker and a goldsmith two images one of which “shall hold in its left hand a snake of cedar, raising its right [hand] to the god Nabu”. At the tell of Tepe Gawra, at least seventeen Early Bronze Age Assyrian bronze serpents were recovered. The Sumerian fertility god Ningizzida was sometimes depicted as a serpent with a human head, eventually becoming a god of healing and magic.

HEBREW BIBLE

(See also: Genesis creation narrative and Jewish mythology)
In the Hebrew Bible, the Book of Genesis refers to a serpent who triggered the expulsion of Adam and Eve from the Garden in Eden (Gen 3:1-20). Serpent is also used to describe sea monsters. Examples of these identifications are in the Book of Isaiah where a reference is made to a serpent-like dragon named Leviathan (Isaiah 27:1), and in the Book of Amos where a serpent resides at the bottom of the sea (Amos 9:3). Serpent figuratively describes biblical places such as Egypt (Jer 46:22), and the city of Dan (Gen 49:17). The prophet Jeremiah also compares the King of Babylon to a serpent (Jer 51:34).

EDEN

Biblia Pauperum illustration of Eve and the Serpent

The Hebrew word nahash is used to identify the serpent that appears in Genesis 3:1, in the Garden of Eden. In Genesis, the serpent is portrayed as a deceptive creature or trickster, who promotes as good what God had forbidden, and shows particular cunning in its deception. (cf. Gen. 3:4–5 and 3:22) The serpent has the ability to speak and to reason: “Now the serpent was more subtle (also translated as “cunning”) than any beast of the field which the Lord God had made” (Gen. 3:1). There is no indication in the Book of Genesis that the serpent was a deity in its own right, although it is one of only two cases of animals that talk in the Pentateuch (Balaam’s donkey being the other).
God placed Adam in the Garden to tend it and warned Adam not to eat the fruit of the Tree of Knowledge of Good and Evil, “for in the day that thou eatest thereof thou shalt surely die”. The serpent tempts Eve to eat of the Tree, but Eve tells the serpent what God had said (Genesis 3:3). The serpent replied that she would not surely die (Genesis 3:4) and that if she eats the fruit of the tree “then your eyes shall be opened, and ye shall be as gods, knowing good and evil.” (Genesis 3:5) Eve ate the fruit and gave it to Adam and he also ate. God, who was walking in the Garden, finds out and to prevent Adam and Eve from eating the fruit of the Tree of Life and living forever, they are banished from the Garden and God posts an angelic guard. The snake is punished for its role in the fall by being made to crawl on its belly and eat dust.
There is debate about whether the serpent in Eden should be viewed figuratively or as a literal animal. According to the Rabbinical tradition, the serpent represents sexual desire. Voltaire, drawing on Socinian influences, wrote: “It was so decidedly a real serpent, that all its species, which had before walked on their feet, were condemned to crawl on their bellies. No serpent, no animal of any kind, is called Satan, or Belzebub, or Devil, in the Pentateuch”.
20th-century scholars such as W. O. E. Oesterley (1921) were cognisant of the differences between the role of the Edenic serpent in the Hebrew Bible and any connection with “ancient serpent” in the New Testament.[16] Modern historiographers of Satan such as Henry Ansgar Kelly (2006) and Wray and Mobley (2007) speak of the “evolution of Satan”, or “development of Satan”.
According to German academic Gerhard von Rad, Lutheran theologian and University of Heidelberg professor, who applied form criticism as a supplement to the documentary hypothesis of the Old Testament, the snake in the Eden’s narrative was more an expedient to represent the impulse to temptation of mankind (which is, disobeying God’s law) rather than an evil spirit or the personification of the Devil, as the later Christian literature erroneously depicted it; moreover, von Rad himself states that the snake is not a demon, but one of the animals created by God, and the only thing that differentiates it from the others in Eden is the ability to speak:

“The serpent which now enters the narrative is marked as one of God’s created animals (ch. 2.19). In the narrator’s mind, therefore, it is not the symbol of a “demonic” power and certainly not of Satan. What distinguishes it a little from the rest of the animals is exclusively his greater cleverness. […] The mention of the snake here is almost incidental; at any rate, in the “temptation” by it the concern is with a completely unmythical process, presented in such a way because the narrator is obviously anxious to shift the responsibility as little as possible from man. It is a question only of man and his guilt; therefore the narrator has carefully guarded against objectifying evil in any way, and therefore he has personified it as little as possible as a power coming from without. That he transferred the impulse to temptation outside man was almost more a necessity for the story than an attempt at making evil something existing outside man. […] In the history of religions the snake indeed is the sinister, strange animal par excellence […], and one can also assume that long before, a myth was once at the basis of our narrative. But as it lies now before us, transparent and lucid, it is anything but a myth”.
— Gerhard von Rad, Genesis: A Commentary (1973, Revised Edition), p. 87-88, The Old Testament Library, The Westminster Press, Philadelphia, Pennsylvania, ISBN 0-664-20957-2.

MOSES AND AARON

When God had revealed himself to the prophet Moses in Exodus 3:4-22, Moses recognized that the call of God was for him to lead the people of Israel out of slavery, but anticipated that people would deny or doubt his calling. In Exodus 4:1-5, Moses asked God how to respond to such doubt, and God asked him to cast the rod which he carried (possibly a shepherd’s crook) onto the ground, whereupon it became a serpent (a nachash). Moses fled from it, but God encouraged him to come back and take it by the tail, and it became a rod again.
Later in the Book of Exodus (Exodus 7), the staffs of Moses and Aaron were turned into serpents, a nachash for Moses, a tanniyn for Aaron.

FIERY SERPENTS
FURTHER INFORMATION: Seraph

“Fiery serpent” (Hebrew: שָׂרָף, Modern: saraph, Tiberian: sä·räf’, “fiery”, “fiery serpent”, “seraph”, “seraphim”) occurs in the Torah to describe a species of vicious snakes whose poison burns upon contact. According to Wilhelm Gesenius, saraph corresponds to the Sanskrit Sarpa (Jawl aqra), serpent; sarpin, reptile (from the root srip, serpere). These “burning serpents”(YLT) infested the great and terrible place of the desert wilderness (Num. 21:4-9; Deut.8:15). The Hebrew word for “poisonous” literally means “fiery”, “flaming” or “burning”, as the burning sensation of a snake bite on human skin, a metaphor for the fiery anger of God (Numbers 11:1).
The Book of Isaiah expounds on the description of these fiery serpents as “flying saraphs”(YLT), or “flying dragons”, in the land of trouble and anguish (Isaiah 30:6). Isaiah indicates that these saraphs are comparable to vipers, (YLT) worse than ordinary serpents (Isaiah 14:29). The prophet Isaiah also sees a vision of seraphim in the Temple itself: but these are divine agents, with wings and human faces, and are probably not to be interpreted as serpent-like so much as “flame-like”.

SERPENT OF BRONZE
FURTHER INFORMATION: Nehushtan

In the Book of Numbers, while Moses was in the wilderness, he mounted a serpent of bronze on a pole that functioned as a cure against the bite of the “seraphim”, the “burning ones” (Numbers 21:4-9). The phrase in Num. 21:9, “a serpent of bronze,” is a wordplay as “serpent” (nehash) and “bronze” (nehoshet) are closely related in Hebrew, nehash nehoshet.
Mainstream scholars suggest that the image of the fiery serpent served to function like that of a magical amulet. Magic amulets or charms were used in the ancient Near East to practice a healing ritual known as sympathetic magic in an attempt to ward off, heal or reduce the impact of illness and poisons. Copper and bronze serpent figures have been recovered, showing that the practice was widespread. A Christian interpretation would be that the bronze serpent served as a symbol for each individual Israelite to take their confession of sin and the need for God’s deliverance to heart. Confession of sin and forgiveness was both a community and an individual responsibility. The plague of serpents remained an ongoing threat to the community and the raised bronze serpent was an ongoing reminder to each individual for the need to turn to the healing power of God. It has also been proposed that the bronze serpent was a type of intermediary between God and the people that served as a test of obedience, in the form of free judgment, standing between the dead who were not willing to look to God’s chosen instrument of healing, and the living who were willing and were healed. Thus, this instrument bore witness to the sovereign power of Yahweh even over the dangerous and sinister character of the desert.
In 2 Kings 18:4, a bronze serpent, alleged to be the one Moses made, was kept in Jerusalem’s Temple sanctuary. The Israelites began to worship the object as an idol or image of God, by offering sacrifices and burning incense to it, until Hezekiah was made King. Hezekiah referred to it as Nehushtan and had torn it down. Scholars have debated the nature of the relationship between the Mosaic bronze serpent and Hezekiah’s Nehushtan, but traditions happen to link the two.

NEW TESTAMENT
GOSPELS

In the Gospel of Matthew, John the Baptist calls the Pharisees and Saducees, who were visiting him, a “brood of vipers” (Matthew 3:7). Jesus also uses this imagery, observing: “Ye serpents, ye generation of vipers, how can ye escape the damnation of Gehenna?” (Matthew 23:33). Alternatively, Jesus also presents the snake with a less negative connotation when sending out the Twelve Apostles. Jesus exhorted them, “Behold, I send you forth as sheep in the midst of wolves: be ye therefore wise as serpents, and harmless as doves” (Matthew 10:16). Wilhelm Gesenius notes that even amongst the ancient Hebrews, the serpent was a symbol of wisdom.
In the Gospel of John, Jesus made mention of the Mosaic serpent when he foretold his crucifixion to a Jewish teacher. Jesus compared the act of raising up the Mosaic serpent on a pole, with the raising up of the Son of Man on a cross (John 3:14-15). Main: Nehushtan#New Testament
Ivory of Christ treading on the beasts from Genoels-Elderen, with four beasts; the basilisk was sometimes depicted as a bird with a long smooth tail.

TEMPTATION OF CHRIST

In the temptation of Christ, the Devil cites Psalm 91:11-12, “for it is written, He shall give his angels charge concerning thee: and in [their] hands they shall bear thee up, lest at any time thou dash thy foot against a stone”. He cuts off before verse 13, “Thou shalt tread upon the lion and adder: the young lion and the dragon (tanniyn) shalt thou trample under feet”.
The serpent in Psalm 91:13 is identified as Satan by Christians: “super aspidem et basiliscum calcabis conculcabis leonem et draconem” in the Latin Vulgate, literally “The asp and the basilisk you will trample under foot; you will tread on the lion and the dragon”. This passage is commonly interpreted by Christians as a reference to Christ defeating and triumphing over Satan. The passage led to the Late Antique and Early Medieval iconography of Christ treading on the beasts, in which two beasts are often shown, usually the lion and snake or dragon, and sometimes four, which are normally the lion, dragon, asp (snake) and basilisk (which was depicted with varying characteristics) of the Vulgate. All represented the devil, as explained by Cassiodorus and Bede in their commentaries on Psalm 91. The serpent is often shown curled round the foot of the cross in depictions of the Crucifixion of Jesus from Carolingian art until about the 13th century; often it is shown as dead. The Crucifixion was regarded as the fulfillment of God’s curse on the Serpent in Genesis 3:15. Sometimes it is pierced by the cross and in one ivory is biting Christ’s heel, as in the curse.

ANCIENT SERPENT

Serpent (Greek: ὄφις; Trans: Ophis, /o’-fēs/; “snake”, “serpent”) occurs in the Book of Revelation as the “ancient serpent” or “old serpent”(YLT) used to describe “the dragon”, [20:2] Satan the Adversary, (YLT) who is the devil. [12:9, 20:2] This serpent is depicted as a red seven-headed dragon having ten horns, each housed with a diadem. The serpent battles Michael the Archangel in a War in Heaven which results in this devil being cast out to the earth. While on earth, he pursues the Woman of the Apocalypse. Unable to obtain her, he wages war with the rest of her seed (Revelation 12:1-18). He who has the key to the abyss and a great chain over his hand, binds the serpent for a thousand years. The serpent is then cast into the abyss and sealed within until he is released (Revelation 20:1-3).

In Christian tradition, the “ancient serpent” is commonly identified with the Genesis Serpent and as Satan. This identification redefined the Hebrew Bible’s concept of Satan (“the Adversary”, a member of the Heavenly Court acting on behalf of God to test Job’s faith), so that Satan/Serpent became a part of a divine plan stretching from Creation to Christ and the Second Coming.

RELIGIOUS VIEWS

Biblical apocrypha and deuterocanonical books
The first deuterocanonical source to connect the serpent with the devil may be Wisdom of Solomon. The subject is more developed in the pseudepigraphal-apocryphal Apocalypse of Moses (Vita Adae et Evae) where the devil works with the serpent.

CHRISTIAN

In traditional Christianity, a connection between the Serpent and Satan is created, and Genesis 3:14-15 where God curses the serpent, is seen in that light: “And the LORD God said unto the serpent, Because thou hast done this, thou art cursed above all cattle, and above every beast of the field; upon thy belly shalt thou go, and dust shalt thou eat all the days of thy life / And I will put enmity between thee and the woman, and between thy seed and her seed; it shall bruise thy head, and thou shalt bruise his heel” (KJV).
Following the imagery of chapter 12 of the Book of Revelation, Bernard of Clairvaux had called Mary the “conqueror of dragons”, and she was long to be shown crushing a snake underfoot, also a reference to her title as the “New Eve”.

SEE ALSO:

Wikimedia Commons has media related to Temptation of Adam and Eve.
Staff of Mercury & Staff of Hermes (Caduceus)
Caduceus as a symbol of medicine
Church of God with Signs Following
Ethnoherpetology
Fall of Man
Naassenes
Nāga
Narayana
Ningishzida
Ophites
Protoevangelium
Satan; Devil; Lucifer
Serpent seed
Snake worship
Staff of Aaron
Staff of Asclepius
Staff of Moses
Footnotes
Olson 1996, p. 136
“CATHOLIC ENCYCLOPEDIA: Adam”. http://www.newadvent.org. Retrieved 2016-04-12.
“Storytelling, the Meaning of Life, and The Epic of Gilgamesh”. eawc.evansville.edu. Archived from the original on 2011-11-30. Retrieved 2017-11-27.
Gerard Michon. “Meanings of Mathematical Symbols and Scientific Icons”. Numericana. Retrieved 2017-11-27.
Gordon Loud, Megiddo II: Plates plate 240: 1, 4, from Stratum X (dated by Loud 1650–1550 BC) and Statum VIIB (dated 1250–1150 BC), noted by Karen Randolph Joines, “The Bronze Serpent in the Israelite Cult” Journal of Biblical Literature 87.3 (September 1968:245-256) p. 245 note 2.
R.A.S. Macalister, Gezer II, p. 399, fig. 488, noted by Joiner 1968:245 note 3, from the high place area, dated Late Bronze Age.
Yigael Yadin et al. Hazor III-IV: Plates, pl. 339, 5, 6, dated Late Bronze Age II (Yadiin to Joiner, in Joiner 1968:245 note 4).
Callaway and Toombs to Joiner (Joiner 1968:246 note 5).
Maurice Viera, Hittite Art (London, 1955) fig. 114.
Leonard W. King, A History of Babylon, p. 72.
Pritchard ANET, 331, noted in Joines 1968:246 and note 8.
E.A. Speiser, Excavations at Tepe Gawra: I. Levels I-VIII, p. 114ff., noted in Joines 1968:246 and note 9.
Genesis 2:15 HE)
Barton, SO “Midrash Rabba to Genesis”, sec 20, p.93
Gorton 1824, p. 22
Oesterley Immortality and the Unseen World: a study in Old Testament religion (1921) “… moreover, not only an accuser, but one who tempts to evil. With the further development of Satan as the arch-fiend and head of the powers of darkness we are not concerned here, as this is outside the scope of the Old Testament.”
“The idea of Zoroastrian influence on the evolution of Satan is in limited favor among scholars today, not least because the satan figure is always subordinate to God in Hebrew and Christian representations, and Angra Mainyu …”-Kelly, Henry Ansgar (2006). Satan : a biography (1st ed.). Cambridge: Cambridge University Press. p. 360. ISBN 978-0-521-84339-3.
Mobley, T.J. Wray, Gregory (2005). The birth of Satan : tracing the devil’s biblical roots. New York: Palgrave Macmillan. ISBN 978-1-4039-6933-0.
Keil and Delitzsch, OT Commentary on Exodus 4 http://biblehub.com/commentaries/kad/exodus/4.htm accessed 2015-10-09.
Gesenius, Wilhelm & Samuel Prideaux Tregelles (1893). Genenius’s Hebrew and Chaldee lexicon to the Old Testament Scriptures. J. Wiley & Sons. p. dccxcv.
Olson 1996, p. 135
Noth 1968, p. 156
Toorn 1998, pp. 746–7
Thomas Nelson 2008, p. 172
Noth 1968, p. 157
Olson 1996, p. 137
Joines, Karen Randolph (1968). The Bronze Serpent in the Israelite Cult The Bronze Serpent in the Israelite Cult. JOBL, 87. p. 245, note 1.
Gesenius, Wilhelm & Samuel Prideaux Tregelles (1893). Genenius’s Hebrew and Chaldee lexicon to the Old Testament Scriptures. J. Wiley & Sons. p. dccxcvi.
C. H. Spurgeon, “The Mysteries of the Brazen Serpent” Archived 2013-02-12 at the Wayback Machine, 1857
The basilisk and the weasel by Wenceslas Hollar
Matthew 4:6)
Strong’s Concordance: H8577
(Psalm 91:13 KJV)
Whittaker, H.A. Studies in the Gospels “Matthew 4” Biblia, Cannock 1996
Psalm 91 in the Hebrew/Protestant numbering, 90 in the Greek/Catholic liturgical sequence – see Psalms#Numbering
Hilmo, Maidie. Medieval images, icons, and illustrated English literary texts: from Ruthwell Cross to the Ellesmere Chaucer, Ashgate Publishing, Ltd., 2004, p. 37, ISBN 0-7546-3178-8, ISBN 978-0-7546-3178-1, google books
Schiller, I, pp. 112–113, and many figures listed there. See also Index.
Strong’s Concordance: G3789
From the Greek: ἀρχαῖος, archaios (är-khī’-os) – Strong’s Concordance Number G744
Σατανᾶς, Satanas, (sä-tä-nä’s) – of Aramaic origin corresponding to Σατάν (G4566) – Strong’s Concordance Number G4567
Harris, Stephen L., Understanding the Bible. Palo Alto: Mayfield. 1985.
Alfred von Rohr Sauer, Concordia Theological Monthly 43 (1972): “The Wisdom of Solomon deserves to be remembered for the fact that it is the first tradition to identify the serpent of Genesis 3 with the devil: ‘Through the devil’s envy death entered the world’ (2:24)”.
The Old Testament Pseudepigrapha: Expansions of the “Old … James H. Charlesworth – 1985 “He seeks to destroy men’s souls (Vita 17:1) by disguising himself as an angel of light (Vita 9:1, 3; 12:1; ApMos 17:1) to put into men “his evil poison, which is his covetousness” (epithymia, …”
Schiller, Gertrud, Iconography of Christian Art, Vol. I, p. 108 & fig. 280, 1971 (English trans from German), Lund Humphries, London, ISBN 0-85331-270-2
References
Bob Becking; Pieter W. van der Horst; Karel van der Toorn, eds. (1998). Dictionary of deities and demons in the Bible (DDD) (2., extensively rev. ed.). Leiden: Brill. pp. 746–7. ISBN 978-90-04-11119-6.
Gorton, John G; Voltaire (1824). A philosophical dictionary, from the French of M. De Voltaire. vol. 4. London: C. H. Reynell. p. 22.
Thomas Nelson (2008). The chronological study Bible : New King James version. Nashville, Tenn.: Thomas Nelson. p. 172. ISBN 978-0-7180-2068-2.
Noth, Martin (1968). Numbers: A Commentary. 7. Westminster John Knox Press. pp. 155–8. ISBN 978-0-664-22320-5.
Olson, Dennis T. (1996). Numbers. Louisville: Westminster John Knox Press. pp. 135–8. ISBN 978-0-8042-3104-6.


Folklore

Reptilians occur in a variety of folklore genres:

Mythology

Modern legend, folktale, and folk belief

Fringe theories

Scientific speculation

Modern fiction

A wide range of fictional works depict reptilian humanoids.

Literature

Television

A Draconian mask, on display at the National Space Centre

Doctor Who

Star Trek

Other

Comics

Marvel

DC

Other

Film

Games

Roleplaying and strategy games

Dungeons & Dragons

Platform and fighting games

See also

References

  1. ^ Pausanias (2012). Pausanias’s Description of Greece. Cambridge University Press. pp. 616–. ISBN978-1-108-04725-8.
  2. ^ Elgood, Heather (2000). Hinduism and the Religious Arts. London: Cassell. p. 234. ISBN0-304-70739-2.
  3. ^ Olson, Dennis T. (1996). Numbers. Louisville: Westminster John Knox Press. pp. 135–8. ISBN978-0-8042-3104-6.
  4. ^ Hesiod, Theogony823–835.
  5. ^ Idema, Wilt L. (2009). The White Snake and Her Son: A Translation of the Precious Scroll of Thunder Peak with Related Texts. Hackett Publishing. ISBN9781603843751.
  6. ^ Lewis, Tyson; Richard Kahn (Winter 2005). “The Reptoid Hypothesis: Utopian and Dystopian Representational Motifs in David Icke’s Alien Conspiracy Theory”. Utopian Studies. 16 (1): 45–75.
  7. ^ Frel, Jan (1 September 2010). “Inside the Great Reptilian Conspiracy: From Queen Elizabeth to Barack Obama – They Live!”. Alternet. Retrieved 2010-09-01..
  8. ^ Campbell, Myles (2015). Nick Nomad and the Hammer of Lemuria. BookBaby. pp. 143–. ISBN978-1-4835-5342-9.
  9. ^ Russell, D. A.; Séguin, R. (1982). “Reconstruction of the small Cretaceous theropod Stenonychosaurus inequalis and a hypothetical dinosauroid”. Syllogeus. 37: 1–43.
  10. ^ Saneyoshi, Tatsuo (2006). Hontō ni ita fushigina ikimono: Jinrui to dōbutsu no sosentachi [Unaccountable creatures that really existed: The ancestors of human and other animals] (in Japanese). Tokyo: PHP Kenkyūjo. pp. 41–48. ISBN978-4-569-65442-3.
  11. ^ Kaneko, Ryūichi (1997). Shin kyōryū densetsu : Saiko kyōryū eoraputoru kara kyōryū jinrui made kyōryūgaku no saisentan [New dinosaur book: The front-lines of dinosaurology, from Eoraptor as the earliest dinosaur to Sapient dinosaurs] (in Japanese). Tokyo: Hayakawashobō. pp. 204–206. ISBN978-4-15-050211-9.

TLALOC

300px-Tláloc_3

Tlaloc (Classical Nahuatl: Tlāloc [ˈtɬaːlok]) is a member of the pantheon of gods in Aztec religion. As supreme god of the rain, Tlaloc is also a god of earthly fertility and of water. He was widely worshipped as a beneficent giver of life and sustenance. However, he was also feared for his ability to send hail, thunder, and lightning, and for being the lord of the powerful element of water. Tlaloc is also associated with caves, springs, and mountains, most specifically the sacred mountain in which he was believed to reside. His animal forms include herons and water-dwelling creatures such as amphibians, snails, and possibly sea creatures, particularly shellfish. The Mexican marigold, Tagetes lucida, known to the Aztecs as yauhtli, was another important symbol of the god, and was burned as a ritual incense in native religious ceremonies.

The cult of Tlaloc is one of the oldest and most universal in ancient Mexico. Although the name Tlaloc is specifically Aztec, worship of a storm god like Tlaloc, associated with mountaintop shrines and with life-giving rain, is as at least as old as Teotihuacan and likely was adopted from the Maya god Chaac or vice versa, or perhaps he was ultimately derived from an earlier Olmec precursor. An underground Tlaloc shrine has been found at Teotihuacan.

DCSmian

Ouroboros

medical-health-symbol-png-logo-free-transparent-logosrhfreelogoscom-filepublic-icon-noun-project-svg-wikimedia-commonsrhcommonswikimediaorg-filepublic-health-symbol-png-icon-noun-project

Caduceus

ADRENOCHROME-ASSOCIATED WITH…

ADRENOCHROME-ASSOCIATED WITH….

ADRENOCHROME SOULSCALPING

_____________________________

ADRENOCHROME-WHAT IS IT?

_____________________________

2019-02-18-23-42-46~2

AddText_01-26-08.37.47adrenochrome_solution__i2006e1242_disp2019-02-02-02-32-22~2AddText_11-12-12.21.062019-02-26-21-01-52~2

ADRENOCHROME / C9H9NO3

Adrenochrome is a chemical compound with the molecular formula C9H9NO3 produced by the oxidation of adrenaline (epinephrine). The derivative carbazochrome is a hemostatic medication. Despite a similarity in chemical names, it is unrelated to chrome or chromium. Adrenochrome (alternatively called Neuromelanin) is a hallucinogenic drug suspected to have been used in Project MKUltra. Like Lysergic acid diethylamide (LSD), Secret Cold War experiments tested various drugs during unethical human experimentation in the United States. These hallucinogenic drugs (See also psychosomatic medicine) antagonize psychological phenomena, which may explain (but not conclusively) seeing “aliens” during abductions. Adrenochrome, a chemical known since at least the 1930s, is a chemical compound with the molecular formula C9H9NO3 produced by the oxidation of adrenaline (epinephrine) in mammals. The chemical especially concentrates in the body during times of high “fight or flight” response conditions, such as during extreme trauma and suffering. Author Hunter S. Thompson mentioned Adrenochrome in his book Fear and Loathing in Las Vegas (1971). The adrenochrome scene also appears in the novel’s film adaptation.

_____________________________

HOW IS THE “ADRENOCHROME” HARVESTED?

_____________________________

download.jpg

Adrenochrome is generally known to be harvested from the Pineal Glands of penguins in places such as Antarctica (the South Pole, an order of such is described in this WikiLeaks cable); however, this obviously does not meet the global luciferian elite’s needs for getting intoxicated and drunk on their conquests. Therefore, tying into pedogate (which was recently rolled up and uncovered by the United States DOJ), the luciferian elite instead kidnap children, rape, and torture them in order to concentrate the adrenaline/epinephrine in their glands, then harvest the adrenochrome from the glands while the subject is living (the Adrenochrome does not last long in a post mortem) they sacrifice the child after the drug is extracted. Alternately, the subject may be kept alive for repeated extractions; (they keep the children captive as a prisoner, hidden somewhere, for a “long term traumatization treatment”, where they maintain the child alive, but they traumatize, torture, rape, and extract the blood of the child with blood transfusions multiple times, until the child finally dies from the abuse and blood loss or they decide to kill the child in one of their many (monthly) satanic child sacrifice rituals.

_____________________________

THE EXTRACTING OF THE BLOOD IS PROCEED WHILE THE CHILD IS ALIVE!

_____________________________

THE SATANIC PROCEDURE OF EXTRACTING THE BLOOD FROM THE CHILD..

In this case, a needle is plunged into the eye to extract the Adrenochrome from the brain stem without cutting into the skull. This was satirized in the first episode “Whom the Gods would Destroy”, of Series 1 of the British TV series Lewis (2008). Of course it all seems like a joke, but we know how the luciferian elite love to rub the truth in our faces in plain daylight (what are “Google Adreno” and “Google Chrome”?).

_____________________________

WHERE/HOW DO THE LUCIFERIAN ELITE ACQUIRE LIVING SUBJECTS TO HARVEST THE CHEMICALS?

_____________________________

This constant need for living subjects, to harvest the chemical out of their adrenal glands, is why the zionists doesn’t want peace in Israel.

The status quo of the Israeli-Palestinian conflict has made Palestinians into de facto and de jure second class citizens, who can be legally harvested at any time by any Israeli citizen for organs, tissue, and precious Adrenochrome. They also run massive child trafficking rings all over the world, which buy and sell children (Adrenochrome more readily concentrates in a child’s glands, since the glands do not grow much with age, and since children experience massively heightened “fight or flight” reactions and increased adrenaline surges as a result of trauma). According to the FBI there are averaging 460,000+ missing children in America every single year, however the true number may be significantly higher since it has recently been revealed that the FBI is nothing more than a corrupt front organization covering crimes for the luciferian elites in America. Scientists have speculated that long term exposure to Adrenochrome may cause schizophrenia; this may in part be why Zionists are over 30x more likely than the general population to suffer from the mental disorder.

_____________________________

WHAT IS “WALNUT SAUCE”?

_____________________________

The Pineal Gland, a little gland inside the human brain named; ‘Pineal Gland’, also reffered to as ‘The Third Eye’, and it apperance is very similar to a walnut or a pine cone.

‘Walnut Sauce’ sounds very innocent, but that is code used by the luciferian pedophile cannibals. It’s their secret cannibalistic recepie that contain the ingridients of parts of the bodies of their victims, after they have, tortured, traumatized and sexually abused and finally murdered the children they cut out the parts of the childsbrain containing the Pineal Gland and they extract the dead childs blood, then they blend the Pineal Gland, the Pituirity Gland, and the Adrenalized blood into a mixture that they drink, the mixture is reffered to as; ‘Walnut Sauce’, by the luciferian pedophile cannibals. They believe that it will prevent them from aging and they get high from the Adrenochrome.

_____________________________

WHY THE BLOOD FROM TRAUMATIZED, RAPED, SACRIFICED CHILDREN?

_____________________________

The luciferian religion is based on paganism and similar to the satanism and it’s extremly evil, dark and deranged, the luciferians believe that it is nessecary to achieve the full power of magic within their satanic rituals.

The expression; “Walnut Sauce” originates from the exposed luciferian pedophile; John Podesta’s (election campagne executive for the Hillary Clinton campagne 2016.) hacked and public posted emails, exposed by Wikileaks founder Julian Assange.

_____________________________

https://www.docdroid.net/vrZW33b/review-as-psychotomimetic-agent-chim-ther-heacock1971.pdf

_____________________________

Linked above are two scientific papers on Adrenochrome. The simple scientific fact is that both Adrenochrome and adrenolutin, the two major metabolisic products of Adrenaline, are very physiologically active compounds. These papers give the term “getting drunk on the blood of the saints” a new meaning, as it turns out you can really get very intoxicated on the blood of innocent children after you torture them for maximum adrenaline concentration. This is a carefully well kept secret of the elites, passed on to them from early antiquity by the synagogue of satan itself, described by Jesus in the Book of Revelations, the very people who murdered Christ and the other Prophets of God. The first (1962) paper is a general review of the earlier literature on Adrenochrome and adrenolutin, the oxidation /rearrangement product of Adrenochrome which is also active. The second (1971) paper is very carefully hidden, previously unavailable even for the scientific researchers with access to major journals hidden behind a paywall. Our reporters had to go to a university library to get a physical copy to scan, and there aren’t many that carry that particular journal. It is on the specific psychotomimetic (psychosis-like) effects of Adrenochrome, whose physiological activity in both animals and man is without doubt. In fact this stuff is like heroin. Engage in it’s recreational use, and your own adrenaline production will shut down through homeostasis and negative feedback loops, meaning that if you don’t have some tortured baby blood you will go into full cold turkey mode akin to alcohol, opiate, or benzodiazepine withdrawals. This is what these elite luciferian pedophile cannibals (pedovores), is addicted to, as Mel Gibson mentioned, that babies are almost like currency in the luciferian ‘pedophile-society’.

Further, when one searches the internet for Adrenochrome, one only finds nonsense opinions and outdated articles, and the person that helped most to wave away the truth is ‘Alexander Shulgin’, self confessed member of the “Owl Club” (Baal) aka Bohemian Grove. Naturally he had an agenda and knew why all info on adrenaline decomposition products and their activity had to be hushed.

_____________________________

Article:

ADRENOCHROME PIGMENTION

March 1977

L. Frank Cashwell, MD; M. Bruce Shield, MD; John W. Reed, MD Arch Ophthalmol

1977;95(3):514-515. doi:10.1001/archopht.1977.04450030156022

This article is only available in the PDF format. Download the PDF to view the article, as well as its associated figures and tables

A SHORT OVERVIEW OF THE ARTICLE BELOW:

Staghorn Deposits of the Palpebral Conjunctiva With Corneal Abrasion An 88-year-old woman had been treated medically for chronic open angle glaucoma for nine years. Epinephrine compounds had been used topically during this period of time. She had a three-day history of redness of both eyes with tearing and foreign-body sensation in the left eye. Her visual acuity and intraocular pressures were unchanged, but the bulbar conjunctivae were hyperemic. Slit-lamp examination revealed diffuse, punctate, fluorescein staining of the upper two thirds of the left cornea, and slight punctate staining of the lower right cornea. The palpebral conjunctivae and upper eyelids contained numerous, dark brown, irregularly shaped deposits varying in size up to 2 mm in diameter. There were several particularly large deposits on the left upper eyelid. These largest deposits were excised, and the eye was dressed with antibiotic ointment.

_____________________________

LINKS:

ADRENOCHROME IN LITERATURE:

https://www.docdroid.net/xO8cbyn/adrenochrome-adrenolutin-effect-animal-man-hoffer1962.pdfhttps://www.docdroid.net/vrZW33b/review-as-psychotomimetic-agent-chim-ther-heacock1971.pdf

_____________________________

LINK TO YOU TUBE VIDEO ABOUT ADRENOCHROME:

https://youtu.be/q2e9xYGTn18

_____________________________

AddText_01-12-07.59.40.PNG

THE “BLACK EYE” CLUB

Enlighten the massess..

By: Cory Daniel, May 9, 2018

Although not officially an organization at all, the “Black Eye” club refers to a growing number of politicians, celebrities, business elites, and heads of State who have suddenly and mysteriously wound up with black eyes. Although a few of them have sustained injuries to their right eye, the majority occur on the left. Among those who have succumbed to this affliction are George Bush, Kanye West, and the Pope.

But why this current and periodic rash of Black Eyes? And why has this phenomenon disproportionately afflicted people of considerable power and influence? Even allowing for our modern 24-hour news cycle and tabloid cellphone camera culture, up until the year 2000 I can’t recall any publically recognizable figures having black eyes.

It would appear that there are two main categories within the “Black Eye” Club.

Those seated firmly into positions of government/politics and those in the entertainment/ Hollywood. Are there others in the fields of science, and military?.

Theories as to this strange phenomenon are abuzz on the internet and range from a secret society ritual which involves striking the participant in the head, to alien abduction and “Soul Scalping” in order to replace our world leaders with alien consciousness. (More on Soul Scalping at the bottom of this page.) Another theory holds that it is a form of punishment used to as a sort of check and balance within secret societies. And still, other theories lean towards the implementation of life extension technologies or preparatory surgeries for off-world travel.

A less extreme theory holds that the phenomenon is nothing more than the entertainment industry capitalizing on the public’s recent enlightenment of the existence of the Illuminati. But let’s assume for a moment this is only media marketing. This would mean that the entertainment industry is using occult ritual to manipulate people into certain behavior and consciousness. The end result is the same. And the fact that most every successful pop and rap artist use Illuminati symbology in their act openly telegraphs the ritual. People can pretend like it’s a game, but if you’re acting out a ritual you are very much indeed participating in a ritual. A ritual which permeates the hierarchical tiers of the entertainment industry and obviously defines success.

_____________________________

OFFICIAL EXPLANATION/ NO OFFICIAL EXPLANATION GIVEN

_____________________________

By: CORY DANIEL, February 2015

Cory Daniel is a professional certified interpretive guide and writer/researcher who currently lives in the Valley of the Sun.

OFFICIAL EXPLENATION – NO OFFICIAL EXPLENATION GIVEN

Cory Daniel on The Doorknob Sacrifices;

· A Black-Sun Ritual: 12 Celebrity “Suicides” related to Pedophilia Cover-up.

· Jamie Bates on The Doorknob Sacrifices; A Black-Sun Ritual: 12 Celebrity “Suicides” related to Pedophilia Cover-up.

· Sybelle on The Doorknob Sacrifices; A Black-Sun Ritual: 12 Celebrity “Suicides” related to Pedophilia Cover-up. ___________________________________

GEORGE BUSH, January 2002

Official Explanation – Choked on a pretzel, fainted and fell off the couch and hit the floor. According to Dr. Abdul Giwa, an emergency room doctor at St. Lutes = Roosevelt Hospital, the President likely fell victim to “vasovagal syndrome“, a rare occurrence in which the vegus nerve, which regulates heart rate, is stimulated and the signal slows the heart. Victims can pass out, and they often look pale afterward.

“It can be brought on by a number of causes, usually stress, but also swallowing something”, Giwa said. “As food goes down through the esophagus, it passes by the vegus nerve”.

The event happened at 5:35 p.m. Note. that 5:35 reduces to the number 13.

HARRY REID, 2011

Official Explanation- Slipped and fell while running in the rain. Also suffered a dislocated shoulder.

HARRY REID, January 1 – 2015

Harry Reid’s second eye injury in 4 years.

Right eye, multiple bones around the eye, loss of eyesight, broken ribs, concussion.

Official Explanation – I know there are a lot of rumors as to what happened, but that’s very simple. My wife and I were in our new home. I was doing exercises that I’ve been doing for many years with those large rubber bands and, uh, one of them broke and spun me around and I crashed into these cabinets and injured my eye.

JOHN KERRY, January 2012

Official Explanation – Black eyes received from sustaining a broken nose while playing Ice hockey.

PRINCE ANDREW, June 2017

Official Explanation – Palace refused to comment.

JOHN MCCAIN, July 2017

Official Explanation – Mayo Clinic surgeons took out the 5-centimeter blood clot during “a minimally invasive craniotomy with an eyebrow incision”, according to a Mayo Clinic Hospital statement released by McCain’s office.

MICHAEL NOONAN, February 2015

Official Explanation – The Department of finance stated that Noonan underwent eye surgery but refused to elaborate further. A Dr. Gray diagnosed he had a unilateral exophthalmos or proptosis, otherwise known as bulging of the eye. This was supposedly his second surgeryon his eye in a couple years.

PRINCE PHILIP, April 2013

Official Explanation – the Palace gave a press release that he just woke up with the black eye.

POPE FRANCIS, September 2017

Official Explanation – Hit his face on the Pope Mobile

POPE FRANCIS

The black eyes are a common side effect of a ingesting Adrenal hormone (Adrenochrome). The Adrenochrome is being secreted when a person are in serious panic. The Adrenochrome hormones are harvested by the luciferian pedophiles from their child victims.

POPE BENEDICT XVI, October 2017

Official Explanation – The Pope fell

MADONNA, April 1998

Madona’s publicist Liz Rosenberg said. “She was playing peekaboo with her baby, I’m almost embarrassed to tell you about it because it sounds so cute. But that’s what happened”. She went on to explain that she was bouncing her 18-month-old daughter Lourdes on her lap when the child’s head smacked into the bone under her eye.

KANYE WEST, April 2014

Official explanation – Got punched in a random game of knockout after leaving a nightclub.

KELLY OSBOURNE, August 2008

Official Explanation – The contents of her cupboard fell out and on top of her head.

ROBERT DOWNEY JR., December 2012

Official explanation – No explanation was given.

RYAN GOSLING, May 2009

Official explanation – Make-up. However, he sustained another black eye when hit by Harrison Ford in a “stunt gone wrong” while filming Blade Runner years later.

RICHARD BRANSON

Official Explanation – The entrepreneur was cycling in the dark on Virgin Gorda, one of the British Virgin Islands, with his children, when he hit a bump in the road, causing him to be flung over his handlebars. ························································

LADY GAGA, June 2012

Official Explanation – Got hit in the face with a pole during a performance.

························································

JOHN STAMOS, May 2008

Official Explanation – Kickboxing accident. ························································

JUSTIN BIEBER, January 2011

Official Explanation – Fighting.

························································

STEVE BUSCEMI, 2001

Official Explanation – Bar room brawl.

··································································

REECE WITHERSPOON, September 2011

Official Explanation – Involved in a car accident.

··································································

JAMIE OLIVER, February 2012

Official Explanation – Fell down the stairs at his home.

…………………………………………………………

SATANIC RITUAL..?

The idea that these people are all taking part in a ritual is not at all far-fetched. Cults and societies exist and have existed since the dawn of time and are still very much alive. If you not aware that this is happening, simply go to Catholic mass and watch it unfold. In our modern culture, we’ve been desensitized to them in since childhood when we were first put in front of a Television. We’ve seen them portrayed in cartoons and movies, and every once in a while it makes the news. Recently the leaked video footage or the “Cremation of Care” ceremony at the Bohemian Grove. Before this, there was the Skull and Bones ritual which took place in the courtyard filmed from the vantage point of the wall surrounding the compound.

The elites from all over the world have been engaging in rituals and ceremonies since the beginning of nation-states throughout all of history, yet we believe that in today’s world they have somehow grown out of this practice and it has been replaced by Oaths of Office, and public ceremonies. While these things do occur and have become part of the public show during the peaceable transition of power, there are pipers to be paid beneath the public sphere of awareness. Those pipers being the organizations responsible for the assent of these candidates in the first place. If you still believe that presidents are elected and not chosen I urge you to do your research.

……………………………………………………………………………………………………………………

CHECKS & BALANCES

……………………………………………………………………………………………………………………

AddText_02-14-07.54.34.PNG

We are aware of the checks and balances designed into the three branches of government here in the United States of America. Other countries too have systems in place which prevent tyranny. When first implemented these governments worked quite well, however, as time marched on and the those within secret societies learned how to game the system the checks and balances have all but failed in any practical sense of their intended purpose.

It has been theorized that the black eyes are a result of an internal power structure. Checks and balances. Warnings or perhaps even rites of passage within what is generally referred to as the Illuminati. One could use the term globalists as well I would think. Is there an organization so powerful that even the Pope and heads of monarchy are subject to its law? Some think so. And have we not been desensitized to this idea already? Think of the evil Empire in Star Wars. The vast organization of Sauron and the Lord of the rings, etc. of course this is fiction but it forms the foundational reality for our subconscious, and whether or not we realize it we pull from this foundation and use it in contrast to process and evaluate current events and information.

……………………………………………………………………………………………………………………

SOUL SCALPING

……………………………………………………………………………………………………………………

The term soul scalping was coined by Sherry Shriner, although the idea had been around since the 1940s and portrayed in sci-fi classics such as the invasion of the body snatchers.

The famous miniseries from the 1980s “V” also ran with this theme. Probably the most recent and accurate depiction of this theory, however, can be seen in the Stargate series. In the series, the Goa’uld are a parasitic race of ancient astronauts which integrate with their host. The resulting creature is a powerful race been on galactic conquest and domination largely without pity compassion or remorse.

Sherry’s belief is that heads-of-state and Hollywood elites are abducted and a surgery is performed on their eye. This is a segment from her website.

‘Quote’;

“They take a slimy skinny snake, about 6-8 inches long, greyish in color…it looks more like a long slimy worm, and open the person’s mouth and stick it down their throat…These reptile aliens work in groups. In true form most of them are over 6′ 4″ tall. They watch and study the targeted person so they know all about them, and when they take over their brains and bodies they literally can act and become that person. They even do this to their kids so the kids don’t make a fuss that something’s wrong with mommy or daddy because something’s just not right about them. They don’t care about destroying the lives of children. They’re all cold and heartless, unemotional reptiles with no thought of love, compassion or human emotions and sentiment. Those are emotions they have to learn to fake when they take over a human’s body so they can blend in with society as a human”.

“What they do is transform their entire being or conscious self into this proboscis and eject it off their head and then wiggle into the host, such as a human and they enter into a person’s eye. If they have help the host’s eyeball can be pulled out and this proboscis can be put into the back of the eye where it will then wiggle and spiral itself around the person’s optical nerve and it also takes control of the person’s brain as well. Donald Marshall talks about this. He’s part of Lucifer’s Disclosure Project where they are revealing all their methods, technology, and nefarious agendas to mankind.

That’s some pretty heavy stuff. How she knows this? there are quite a few people out there who are supporting this theory. If I were making an argument for this theory I would point to the Web-Slinging Wasp, the Jewel Wasp, the Lancet Liver Fluke, the Euhaplorchis californiensis, and Hairworms. Then there is Toxoplasma gondii which is found aplenty in cats and already transfers to humans. All these parasites actively affect the behavior of its host in order to complete its reproductive cycle. Over 50% of people in developed nations believe an extraterrestrials. And if there are extraterrestrials we have to assume that some of them may not be benevolent and themselves. Of course, I’m just brainstorming here. But it really isn’t that big of a leap if one runs the numbers.

…………………………………………………………

Does the Black Eye Club have anything to do with the all-seeing eye of the Illuminati?

The British magazine ID famously adorns each one of their covers with a facial portrait of someone either covering their right eye or obscuring their left. This bimonthly magazine is dedicated to fashion, music, art and youth culture. What point are they trying to make? Is it just fun, fashion, and modern youth culture?

What about all the other hands covering one eye found all over entertainment and media?

From fashion to art, to music, to design, clothing, and business. The covering of one eye has infiltrated nearly EVERY nitch of marketing in the world, and the target is always, the next generation.

……………………………………………………………………………………………………………………

WHY NOW?

……………………………………………………………………………………………………………………

But here’s the important question. Why now? What changed in the late 90s that brought on this rash of black eyes in conjunction with the rise of the all-seeing eye of the Illuminati? We didn’t have this in the 80s or the 70s or the 60s. No, this is a new phenomenon.

ANSWER: THE INTERNET

The global elite had to step up their timeline. The Internet simply got away from them. As of 2017, they began reeling it back in through censorship of YouTube, Facebook, Twitter, and Google. The four primary platforms on the Internet today. The Internet was supposed to replace the television, just as television followed the radio and radio followed the newspaper in the newspaper followed the town halls. Only they lost control of it early.

Ask any YouTube content creator about censorship and unless they’re making cat videos or cooking tutorials they will fill you in about shadow banning, subscription blackouts, and demonetization. The elite realized they could not control the flow of ideas but they could control the exposure those ideas received and who ultimately came in contact with them.

……………………………………………………………………………………………………………………

THIS IS THE CURRENT BATTLEGROUND

……………………………………………………………………………………………………………………

As the plans of the elite were brought to light they were no longer permitted to operate in the shadows, so they simply changed tactics. I believe they began openly embracing their religion. Throwing it back in the face of those who have been outing them. Making a mockery of the whole thing while continuing to operate at full speed.

It’s obvious that the rise of the All-seeing eye of the Illuminati symbolism and the ‘black eye-cult that we have been seeing since the mid-90’s, is simply the conscious and unconscious programming of the society to desensitize them to what is coming. In fact, that it is part of the ritual and draws in energy which they harness and use for their own ends. Whatever is causing these black eyes, one thing is a fact. They are not hiding them but are instead flaunting them.

If this seems far out there to you, it may be because you never been exposed to this material. It may be that you live in a world of football, office parties, and barbecues. It may be that you are one of the many hundreds of millions who been successfully kept from this ancient occultic science and believe it is fantasy. It is hard to see your prison walls when your prison is 1000 miles across. There are many prisons. Mental prison, spiritual prisons, the prison of fear, and the prison of a reality which has been constructed for you since birth.

……………………………………………………………………………………………………………………

SOURCES:

http://www.sherryshriner.com/sherry/scalping.htm

Make this make sense….

ABOUT

Welcome to the Phoenix Enigma. You have stumbled upon the only website devoted to decoding and reverse-engineering the esoteric symbolism embedded within the city of Phoenix, Arizona. Here you will find articles examining a myriad of esoteric topics including physics, sacred geometry, politics, architecture and ancient religions; science and which form the foundations of the institutions of civilization. These sciences are well known by many, however, most fail to understand how they have been used by esoteric organizations throughout the ages for the control and manipulation of others. Here at The Phoenix Enigma we shed light on these topics and attempt to make the intangible, tangible.

The Doorknob Sacrifices; A Black-Sun Ritual: 12 Celebrity “Suicides” related to Pedophilia Cover-up.

The Hand-Shake Ritual: (Exploring polydactyly and Giants in Ancient cultures)

Red Christmas HILLARY’s FATE FORETOLD

France is Awaking (Rothschild installed Macron REJECTED)

Cory Daniel on The Doorknob Sacrifices;
A Black-Sun Ritual: 12 Celebrity “Suicides” related to Pedophilia Cover-up.

*Jamie Bates on The Doorknob Sacrifices; A Black-Sun Ritual: 12 Celebrity “Suicides” related to Pedophilia Cover-up.*

*Sybelle on The Doorknob Sacrifices; A Black-Sun Ritual: 12 Celebrity “Suicides” related to Pedophilia Cover-up.
___________________________

THE ARCHON “ALIEN” (NEPHILIM) THEORY

Archons = ”They are some type of skinny snake like deity measure about 6-8 inches long, and they’re greyish in color. An Archon looks more like long worm. They entering the humans eye or mouth. These reptile like aliens appears to have a high intelligence and are “working” in groups.

Three more that might qualify: 1) Kathleen Sebelius — former HHS Secretary who (supposedly) “had skin cancer cells removed”… Just as she was going to testify before Congress about the disastrous rollout of Obamacare…

http://voices.washingtonpost.com/federal-eye/2009/10/whats_up_with_kathleen_sebeliu.html

2) Hillary Clinton — During her Congressional testimony about the Benghazi incident, she was wearing “special prism glasses” … purportedly to correct double vision caused by a concussion &/or blood clot near the brain, which resulted from a fall.

https://nypost.com/2013/01/25/hillary-clintons-special-eyeglasses-to-stop-double-vision/

3) Rand Paul (Ky senator) — Reportedly attacked & beaten by a “crazed” neighbor around 11/3/17 … pics of his swollen eye(s) are suddenly harder to find…

Many of these Eye Events seem to occur during a time of greater public scrutiny for the celeb — perhaps indicative of ritual & initiation. Aside from some covered-up DWI’s & beatings, perhaps some of these “injuries” are resulting from a surgical procedure … a procedure that “regular folks” aren’t privy too … maybe one that enhances in some way (can you say Transhumanist?).
What we DO know is this — they are Not trying to hide it … in fact, they seem proud to show their shiners off. Which again comes back to ritual & initiation.

Read the “Soul Scalpers”… That is an exact description of the Go’auld in the Stargate TV series. Snake-like aliens (about 6-8 inches in length) enter the “host” (human) body either through the mouth or spinal cord, & take complete control over the host’s mind & body. Again … the descriptions are Exactly Alike ….

THE MEMBERS OF THE ILLUMINATI REFERS THEMSELVES AS:
*STARGATE/ILLUMINATED=* *Sodomized/disscociated (splitted personalities) (enlighted)

“War Of Northern Aggression” … it’s the hallmark of a legitimate researcher — one no longer bound to the propaganda shackles of the Court Historians. As a southerner whose familial oral histories never jived with the Traditional Narrative, I can’t thank you enough. We’ve been unjustly maligned for so long (with no end in sight), & a simple statement such as that reminds us that the Truth is not completely buried.

One more thing — in the podcast you mentioned ancient beads with micro-carving inside them. Here in Ky I have found rocks with that as well … just “plain old rocks” like you find in a gravel pit. Which raises questions about how “gravel pits” really came to be. Could they perhaps be ruins from an ancient time … & might that be why powerful entities have consistently regarded them almost like a “trash resource” — dispersing the contents far & wide, & burying it inside concrete & under asphalt … with never any scrutiny given to the rocks themselves? I know this sounds “out there”, but years of observation have produced consistent results.

__________________________________________________________________________

UNDERSTANDING ADRENOCHROME & THE LUCIFERIAN PEDOPHILE ELITE’S RITUALS…

__________________________________________________________________________

From the now familiar cry of MSM blogger lemmings, we can be sure that
Adrenochrome abuse is an important issue that the elite don’t want the public to know or be talking about.

The satanic elites hates that this has been exposed, because it provides the public with facts about them, and their horrific activities of child abuse, pedophilia, child-sex-trafficking, murder, organ harvesting, torture, rape, violence… Through what is reffered to as; Pedovore/Pedogate (Pizzagate) it was exposed to the public just a few days before the US Presidential election in 2016.

Adrenochrome is real and the luciferian elite pedophiles values it highly.

Fresh Adrenochrome, is extracted from the blood of a traumatized, adrenalized victim (a child), the luciferian pedophiles thrn drink the blood because they are addicts to the highly addictive psychedelic effect it has, to them it’s a necessary drug. Adrenochrome is produced through the fatal abuse of children (and sometimes pigs), The famed political pundit and novelist Hunter S. Thompson wrote of adrenochrome, and its powerful effects. The film adaptation of Thompson’s Fear and Loathing in Las Vegas even has a scene where a vial of a
Adrenochrome makes a cameo.

“Adrenochrome!” he declares, holding up the vial.

To the Luciferian pedophiles and child abusers, who is in the top of the society, former presidents and billionaires connected to Washington, DC and Los Angeles, Adrenochrome is a crown jewel level secret, which explains the awkward attempts by MSM bloggers to discredit the whole subject just as public curiosity is piqued.

Harming children and infants is not enough; to these occultists, ingestion of Adrenochrome is a kind of twisted sacrament.

Like most psychedelics, there is a peak and a trough to its purported mental benefits. The elite are now in the “trough” phase, where any benefit they were
receiving from use has turned to degradation and diminishing returns. This is obvious by their numerous failed attempts to usurp the narrative this year, and their continued market failures.

And when the supply of the Adrenochrome is affected, things aren’t pretty for the luciferian pedophiles. President Trump with hp from Q Anon and the patriots has placed a twig in the wheel of the Adrenochrome supply. And the luciferian pedophiles are literally pissed off.

Like lemmings jumping off a steep cliff, we are amazed by the number of blue checkmark MSM bloggers crying out against this story. Which part is inaccurate? Which part did Hunter S. Thompson get wrong in his writings decades ago? (Adrenochrome is even profiled on Erowid, a popular psychedelic use community on the Internet.)

These MSM lemmings, when you do a deep dive into their personal and professional lives, all seem to have some odd similarities. A love for grungy alt rock and hanging out in ping pong shops and pizza parlors frequented by boys in their early teens; this love has been exhibited and archived on their social media.

In the early 1990s, the monolithic mainstream media succeeded in covering up the Boystown travesty. Some of the accusers were even sent to prison on perjury charges. Terrified children, sent away, for telling the truth about powerful men and women.

FULCRUM and our partners in the United States and around the world will not allow that to happen a second time. We have a right to publish this information. It is truthful, accurate, and in the imminent public interest. Attempts to intimidate us or affect the distribution of our lawful news content will be pushed back against to the fullest extent of US and international law.

We already have one federal lawsuit filed against a MSM lemming who tried to harm us with a Fake News attack, and have the resources to file a second, and third, and fourth, and fifth, and sixth, and seventh federal suit if need be. When will these lemmings learn? Hacked together hitpieces on private individuals doesn’t change elite adrenochrome use. It doesn’t change the public’s hatred for the Clintons. And it won’t silence the Pizzagate scandal, which is demonstrably real.

Many online have found it odd that “walnut sauce,” a term known to federal law enforcement to be a code name for adrenochrome, appears in the Podesta emails at least 12 different times.

__________________________________

WHO MAKES THE “WALNUT SAUCE”?

__________________________________

Podesta Wikileaks revealed an interest in “Walnut Sauce”.

Awful lot of interest in those walnut sauce recipes in the months leading up to the US Presidential election. A recent research trip to a huge culinary spice outlet in Colorado was enlightening: The staff had never heard of “Walnut Sauce”, and did not stock any kind of Walnut Sauce, despite an extremely long list of in-stock esoteric spices, sauces, and herbs demanded by professional chefs.

Leads one to believe Walnut Sauce, in this context, is code.

Further, Adrenochrome is produced through the torture of children, and sometimes pigs when a live child victim cannot be sourced. This email, from wealthy DC lobbyist Tony Podesta to his family, caught the attention of FULCRUM researchers some time ago.

“Still in torture chamber”

_____________________________

THE RUSPOLI FAMILY

_____________________________

RUSPOLI CRIME FAMILY

By: Ahuwah Zeus, Jun 28, 2017, 11:05 PM

The Ruspoli family is one of the most wicked criminal bloodlines and they are top owners of the Vatican with princely titles all over Italy and Spain. The Ruspoli family are also intermarried with the House of Sforza and are involved with Italian banking. Prince Alessandro Ruspoli was the a direct descendent of the Mattarazzo family of Brazil. The Mattarazzo family originated in Italy before immigrating to Brazil. Count Francisco Matarazzo founded Industrias Reunidas Matarazzo S.A which was one of the largest companies in Brazil and Prince Alessandro “Dado” Ruspoli inherited a portion of its wealth from his mother Claudia de Conti Mattarazzo. The Ruspoli family have some authority over the South American drug cartels. Prince Dado Ruspoli was also an actor and in the movie Godfather III which is one of the many examples of Hollywood glorifying the Italian Mafia. Tao Ruspoli who is the son of Dado Ruspoli is in the entertainment industry and was married to the actress Olivia Wilde who covertly manages a satanic cult in Hollywood today. Dado’s other son Bart Ruspoli is married into the Getty family who established Getty Oil Company. Jean Paul Getty was considered the wealthiest man in America in his time. Prince Lilio Ruspoli-Sforza was a top executive for Banca Romana and worked under the Italian Bank of the South. Prince Lilio Ruspoli-Sforza was also the Italian High Commissioner of the Sovereign Military Order of Malta and ambassador for the SMOM. Marquis Luis Ruspoli who died in 2011 was also a Knight of Malta. The Ruspoli family have two grape vines on their coat of arms. Grapes and wine are often used as metaphors for blood by the Illuminati. The Roman Catholic Church drinks wine as a metaphor for the “Blood of Christ” and the Illuminati really do drink human blood and Adrenochrome. Members of the extremely wicked Ruspoli crime family include Prince Lilio Ruspoli-Sforza, Prince Francesco Ruspoli, Princess Giacinta Ruspoli, Tao Ruspoli, Bart Ruspoli, and Don Enrique Jaime Ruspoli.

0_bloodlines_HOUSE OF RUSPOLI

RUSPOLI CRIME CARTEL

By: Ahuwah Zeus

The Ruspoli family is one of the most wicked criminal bloodlines and they are part owners of the Vatican with princely titles all over Italy and Spain. The family has ancestry from Scotland through their Marescotti lineage and they have some covert authority over Scottish Rite Freemasonry. There is still a noble Scotti family in Italy called the Gallarati-Scotti family and they reside in Lombardy. The Marescottis are likely related to the Scott clan of Scotland currently headed up by Richard Scott the 10th Duke of Buccleuch. The House of Ruspoli are also intermarried with the Orsini, Bourbon, Giustiniani, Corsini, Bonaparte, and Massimo families and are involved with Italian banking and military. They also covertly work with a branch of the Russian House of Romanov. Many members of the Ruspoli family have been Knights of Malta. Prince Alessandro Ruspoli was a direct descendent of the Mattarazzo family of Brazil. The Mattarazzo family originated in Italy before immigrating to Brazil. Count Francisco Matarazzo founded Industrias Reunidas Matarazzo S.A which was one of the largest companies in Brazil and Prince Alessandro “Dado” Ruspoli inherited a portion of its wealth through his mother Claudia de Conti Mattarazzo. The Ruspoli family have some authority over the South American drug cartels through former princes like Marcantonio Mario Ruspoli III of Brazil and Don Carlo Maurizio Ruspoli of Argentina. Today Prince Lilio Sforza Ruspoli has tourist properties on the island of Margarita in Venezuela. The Russian born Margarita Louis-Dreyfus who is worth over 9 billion makes human sacrifices on the Island of Margarita.

Prince Dado Ruspoli was also an actor and in the movie Godfather III which is one of the many examples of Hollywood glorifying the Italian Mafia. The Ruspoli family have some ownership of the Rizzuto crime family which have connections with South American drug cartels. Tao Ruspoli who is the son of Dado Ruspoli is in the entertainment industry and was married to the actress Olivia Wilde. Olivia Wilde runs a violent Amazon feminist cult that rape murder and cannibalize children. Dado’s other son Bartolomeo Ruspoli not to be confused with his cousin also named Bart Ruspoli from London is married into the Getty family which established Getty Oil Company. Jean Paul Getty was considered the wealthiest man in America in his time and they descend from the founder of Gettysburg. The British knighted banker and multi millionaire Mark Getty was born in Rome. Forbes estimates the Getty family’s wealth at over 5 billion. The official head of the Ruspoli family Prince Francesco Ruspoli is married to Angelica Visconti Ferragamo of the wealthy Ferragamo family. The House of Ruspoli are intermarried with Brazilian, Italian, and American billionaires. Prince Francesco Ruspoli is friends with the Sturdza family of Romania and the Romanian Sturdzas own a private bank in Switzerland called Banque Eric Sturdza. The Ruspoli family were originally from a Romani tribe.

Prince Lilio Sforza Ruspoli-Marescotti was a top executive for Banca Romana and worked under the Italian Bank of the South. Prince Lilio was also the Italian High Commissioner of the Sovereign Military Order of Malta and former ambassador for the SMOM. Prince Lilio also went to a party hosted by the depraved sexual predator Harvey Weinstein. The Marescotti family merged a family branch with the Del Drago family of Viterbo, Italy. Prince Filipo del Drago can be seen at the same party as Grand Duke George Mikhailovich Romanov of Russia. The name Del Drago means “of the dragon” and they are likely a branch of the ancient Romanian Drago family. Marquis Luis Ruspoli who died in 2011 was a Knight of Malta and Duke Carlos Ruspoli of Alcudia and Sueca who died in 2016 was also a Knight of Malta. The Ruspoli family have two grape vines on their coat of arms. Grapes and wine are often used as metaphors for blood by the Illuminati. The Roman Catholic Church drinks wine as a metaphor for the “Blood of Christ” and the Illuminati really do drink human blood and adrenochrome and go into psychotic mental states. The Ruspoli family are deeply involved with satanic ritual abuse and mind control. The Blumenthal and Lichnowsky families of the Holy Roman Empire use the same grape vines on their coat of arms and likely have a blood relation with the House of Ruspoli. The Ruspoli family are also all honorary princes of the Holy Roman Empire. The Ruspolis are connected with Italy, Scotland, Spain, the Holy Roman Empire, and South America.

The House of Ruspoli financed and ran small military regiments for the Vatican to gain higher level positions as Roman nobility. They are still high level military commanders in the Order of Malta and Military Constantinian Order of Saint George. Prince Lilio Sforza Ruspoli with the given name of Sforza suggests he works under the Sforza-Cesarini family. Don Enrique Jaime Ruspoli is a Count of Banares in Spain and Princess Giacinta Ruspoli holds titles in Spain as well. The Ruspoli family have married with the Spanish Houses of Bourbon, Alvarez, and Arteaga. Grand Duchess Maria Vladimirovna of Russia and her son Grand Duke George Mikhailovich of Russia were born in Spain and reside there today covertly working with the Ruspoli family. Grand Duchess Maria Vladimirovna of Russia is the head of the modern Cult of Cybele an ancient cult of castrated men that worship females and the Magna Mater or Large Mother. Catholic priests are based on this cult and are celibate similar to eunuchs. Some Catholic priests do secretly castrate themselves. Russia takes its name from Rus. The Ruspoli family oversee a spectrum of Russia from Rome. The word Ruse derives from the Ruspoli family because they are highly deceptive. Members of the extremely wicked Ruspoli crime family include Prince Lilio Sforza Ruspoli, Princess Pia Ruspoli, Prince Francesco Ruspoli, Princess Giacinta Ruspoli, Tao Ruspoli, Bart Ruspoli, and Don Enrique Jaime Ruspoli, 19th Count of Banares.

https://www.gettyimages.com/photos/sforza-ruspoli?sort=mostpopular&mediatype=photography&phrase=sforza%20ruspoli

Prince Lilio Ruspoli and his wife Pia Ruspoli

http://www.residenzaruspolibonaparte.com/source/RUSPOLI_AD.pdf

At the bottom of this article it states that Prince Lilio owns tourist on the island of Margarita in Venezuela

https://en.wikipedia.org/wiki/Margarita_Louis-Dreyfus

Margarita Louis-Dreyfus (née Bogdanova; born 1 July 1962) is a Russian-born Swiss billionaire businesswoman, chairperson of Louis Dreyfus.

Net worth US$9.5 billion (October 2016)[1]

https://publicism.info/crime/mafia/9.html

Chapter 8. FROM VENEZUELA TO ITALY

WHILE THE CUNTRERA-CARUANA-RIZZUTO clan had a destructive influence in Canada, it was nothing compared to what they had wrought in Venezuela. The criminal organization had deeply infiltrated the country’s economic and political structures. Nicolò Rizzuto and his associates’ investment was no ordinary ranch operation. Entire convoys of cocaine were arriving there from Colombia

https://translate.google.com/translate?hl=en&sl=es&u=https://www.proceso.com.mx/498440/exmilitar-venezolano-revela-chapo-visitaba-la-isla-margarita&prev=search

MEXICO CITY (AP) – Venezuelan ex-Venezuelan Sunny Balza revealed that people close to the Venezuelan government met on Isla Margarita with Sinaloa Cartel operators and that its leader, Joaquín El Chapo Guzmán, often visited that tourist destination.

https://montrealgazette.com/news/local-news/alleged-montreal-mafia-leaders-rizzuto-and-sollecito-will-have-trial-separate-from-others

Leonardo Rizzuto the head of the Montreal crime family which have drug networks with South America and Venezuela

https://www.gettyimages.ie/detail/news-photo/sforza-ruspoli-attends-harvey-weinstein-georgette-mosbacher-news-photo/620245758

Lilio Sforza Ruspoli attends Georgette Mosbacher And Harvey Weinstein Election Night Party

https://www.pinterest.com/pin/344173596499760828/

Prince Francesco Ruspoli with the Romanian Princess Francoise Sturdza

https://mas.diariodeibiza.es/di-contenido/uploads/2015/08/Georgi-Románov-gran-duque-de-Rusia-dcha.-RUBEN-E.-IBÁÑEZ-Y-NACHO-DORADO..jpg

Grand Duke George Mikhailovich of Russia at the ÉXITO DE CONVOCATORIA DE LA FLOWER POWER VIP 2015

http://elobservadorsolitario.blogspot.com/2015/08/exito-de-convocatoria-de-la-flower.html

Prince Filipo del Drago at the ÉXITO DE CONVOCATORIA DE LA FLOWER POWER VIP 2015

https://translate.google.com/translate?hl=en&sl=it&u=https://www.geni.com/people/Donna-Giacinta-dei-Principi-Ruspoli/4249386387480028333&prev=search

Giacinta del Drago (of the Ruspoli principles)

Daughter of Prince Alessandro Ruspoli, VII. Prince of Cerveteri and Marianita Lante Montefeltro Della Rovere

Wife of Clemente of the princes of the Dragon

http://www.zimbio.com/Olivia+Wilde/articles/VXD_w74EMXq/Olivia+Wilde+Husband+Tao+Ruspoli+Separate

Tao Ruspoli with his wicked ex wife Olivia Wilde

http://www.liberoquotidiano.it/news/politica/11915641/giorgia-meloni-elezioni-giacinta-ruspoli-.html

Princess Giacinta Ruspoli

https://en.wikipedia.org/wiki/Enrique_Jaime_Ruspoli,_19th_Count_of_Bañares

Enrique Jaime Ruspoli, 19th Count of Bañares

_____________________________

castaway-tom-hanks-wilson-caio-caldas5815763393207d6c8e9e955b41bb0ff2Tom-Hanks-556530ET8vWOyU4AUkFP1EUKYng3UMAEgfjQea0eed35497df417aeb1478559b45ddchuma-abedin-hillary-clintonru0ywt0p47d1il_794xN.1896880687_nstr83568813_599888023907883_2675655749874109910_nERWL5_nWkAILgkGETw6gK6WsAE-IWED_AW9YrW4AAUjlI (1)9exl0hl96mm41f0907d1f316510ef547140d2552653bc50360d4406d986e75308294ce6d0c8f7 (1)ETBWKxZXgAQTeWYETCBMoGUUAIXnb9DUp0h6lVoAAcRGgfootball-adrenochromeETRmNG5XsAAesfrmaxresdefault (1)

DUp0h6lVoAAcRGgf0907d1f316510ef547140d2552653bc50360d4406d986e75308294ce6d0c8f7 (1)9exl0hl96mm41ETCBHdeUMAANl2CETBWKxZXgAQTeWYETCBMoGUUAIXnb9ETRmNG5XsAAesfrETD5Sw2U8AAIQ8IETLnbVBUwAALGfgESvoERdXQAAjErfETD5Ss5U8AIChyqit2qx1x1sim41downloadmaxresdefault (1)D8ZzKMZV4AAjM-6

tags:
#SoulScalping #BlackEye #elite #celebs #illuminati #Adrenochrome #cannibalis
#BlackEyeClub #satanic #pedovore #luciferianism #luciferians #HumanSacrifice

#SATANIC ELITE BLOODLINE FAMILIES — UPDATED LIST OF NAMES OF THE SATANIC ELITE BLOODLINE FAMILIES—LIST OF NAMES—THE RULING SATANIC ELITE FAMILIES ARE:

4*#SATANIC ELITE BLOODLINE FAMILIES — UPDATED LIST OF NAMES OF THE SATANIC ELITE BLOODLINE FAMILIES—LIST OF NAMES—THE RULING SATANIC ELITE FAMILIES ARE:

*A*
Acquafondata, Agnelli, Agnelli-Elkann, Alba, Aldobrandini, Alexandrine-Montechanin, Aleramici, Altavilla, Allucingoli, Alaouite, Al-Abbasi, Al Khalifa,
Al-Sabah, Al-Falasi,
Al Ghardaqa, Angelerio, Altoviti, Anhalt, Anicii, Anguillara, Angevin, Anjou,
Anjou-Capetian, Aspenäs,
Asti, Astor/Astarte/Astorga/Ashdor, Astalli, Astakai, Asturias-Cantabria, Aragona, Arenberg, Aragonese, Archbold, Arduinici, Arianiti,
Arsacid, Artsruni, Artaxiad,
Árpád, Arslan, Austria-Este, Aubert, Audley, Aumont, Austria-Este, Averill, Aviz,
*B*
Baden, Bagrat, Bagratuni, Bagrationi, Banér, Bardi, Bracciano, Baker, Banchieri, Barberini, Bariatinsky, Barlow, Baruch,
Battenburg/Mountbatten, Bedford, Benjamin, Berwind,
Bernadotte, Bese, Bielke,
Bivinids, Bizzaccheri, Björn, Blanchefort, Blason, Blazon, Blumenthal, Bobone-Orsini,
Bohemian, Boers-Lyon, Bonaparte, Boncompagni,
Boncompagni-Ludovisi, Borghese, Borgia, Borja, Borjigid, Bokassa, Bonde, Bosonids, Brion, Brunswick-Luneburg, Boccasini, Boniface, Borromeo, Borghese, Bouillon, Bourbon, Bourbon-Parma, Bouvier Schlossberg, Braganza, Bruce/Bruis/Brix/Broase,
Breakspear/Breakspeare,
Brzezinski, Buffet, Bundy, Burgundi, Bush/Scherff, Buyak, Bååt,
*C*
Caetani, Castiglioni, Casiraghi, Coste/Tossoukpé, Caccianemici dal Orso, Caccianemico, Cafritz,
Cancellieri del Bufalo, Canella, Canossa,
Caltagirone, Capet, Capizucchis, Caracciolo di Torella, Caravaggio, Carnegie, Cargill-MacMillian, Carrington, Carpelan, Castile, Cattaneo, Catii, Cavendish,
Cavalier, Cavalieri,
Charlemagne, Chigi,
Chigi-Rovere,
Chigi-Albani-Della-Rovere, Chigi-Saracini-Lucherini, Chigi-Zondadari, Churchill,
Cesi, Cesarini, Clark, Cochran, Cohen, Colaianni, Collins, Colonna, Conti, Conti di Segni, Coimbra, Coste, Cox, Crivelli, Cromwell/Cromwelle/Cromville/Cromewell/Cromwill/Cromwille/Cromevill/ Cromnvell, Csaky, Csaky-Pallavicini,
Curtis-Boks, Cutler, Cybo,
*D*
D’Arpino, D’Avignon, Davison, d’Udekem d’Acoz,
de Beaufort, de Borbón y Vallabriga, de Fieschi,
De Forest, de Goyon,
de Goyon de Matignon,
de Got, De Medici, De Menil,
de Polignac, De Rosette,
Deering, Della Rovere,
Del Balzo Orsini, Del Drago,
Denter, Dìaz, Di Bicci, di Morra, diNardo, Di Sciarra, diTella-Colaianni, Disney (Isigny), Domenichino, Doria,
Doria-Sachs, Doria-Pamphili-Landi, Ducruet, Du Pont,
Drexel, Duke,
*E*
Eka, Elmaleh, Erba-Odescalchi, Este,
*F*
Farnese/Farnesi,
Ferragamo, Feretti,
FitzJames, Franklin, Field,
Finck, Fischer, Flagler,
Floridi, Frazzini, Freeman, Friedsam, Fontana, Forbes, Ford, Foster, Fieschi,
Fornier, Foucois,
Fürstenberg,
*G*
Gambino, Gatti-Grami (Lombardy), Gaetani, Gaetano-Orsini, Gallarati-Scotti, Genoese, Genovese, Genovese-Getty, Ghermezian, Ghibellines,
Gilman, Gisors, Giovanni,
Giustiniani, Glücksburg/Glücksborg, Green, Grimaldi, Grimaldi-Coste, Grimaldo, Grimaldo Canella, Grimoard,
Grosvenors, Gouyon/Goyon/Gouyon, Gore, Gotti, Gottlieb, Gottorp-Romanov, Goodyear, Goldsmidt/Goldsmith, Gould, Gualterio, Guggenheim, Guelph, Guelphs, Guiness, Guglielmo,
Gwynedd,
*H*
Halifax, Hambro, Hanover, Habsburg/Hapsburg, Habsburg-Lorraine, Harkness, Harriman, Hapsburg, Hayden, Hearst, Hesse, Hesse-Kassel, Higgins, Hills, Hiort af Ornäs,
Hippolyte Grimaldi, Hohenzollern, Huntington,
Hurwitz, Huxley,
Hård af Segerstad,
*I*
il Malvicino de Calveiso de’ Calvi, Ingelger, Ivrea,
*J*
Jagiellon, Jagellonka, James, Jimenez, Johnson, Jägerhorn af Spurila,
*K*
Kahn, Khalili, Kadoorie,
Kahzarian, Khayami,
Karadjordjevic, Kellogs, Kennedy/Kannady/Kenardy/ Kennaday/Kenneday/ Kenneyday/Kennediem/ MacKennedy/MacUalraig,
Kirkwood, Kissinger, Kresge, Koch, Krupp, Kuhn,
*L*
Lakhmids, Lambert, Lambertazzi, Lazard, Lehman, Lee, Leijonhufvud,
Lesser, Li, Lichtenstein, Lichnowsky, Ligne, Lilliehöök, Loeb,
Lombard/Lombardy,
Lord, Lorraine, Louvet, Ludovisi, Luisignan,
Luzzatti Fequiz, Luzzatto,
Luzzatos, Lyon,
*M*
Maderno, Magalotti, Mahidol, Maidalchini, Mandel, Manocherian, Massimo, Mars, Masci, Mattei, Marescotti, Matignon/
Davignon/Grignon/Wagnon/Ratigan/Catino/Gagnon/Latino/Nation,
Mattarazzo, Mavroleon, Maximii, Mazzini, McDonald, McGormick,
McLean, Meaux, Mellon,
Medici, Metcalf, Merage, Merode, Merovingian, Meyer, Mills, Milner, Mocatta, Montefiore, Montechanin, Montgomery, Montefeltro, Montpezat, Montesquieu, Moor, Morgan, Moshir, Morosinis, Moro, Mountbatten/Battenburg, Muti,
*N*
Nash, Nassau, Natt och Dag,
Neri, Niederglatt-Blazon,
*O*
Odescalchi, Oldenburg, Onassis, Orange,
Orange-Nassau,
Orsini/Orsi/Ursi/Orso/Urso/D’Orsi/Dorsi/D’Orso/Dorso/D’Urso/Ursich/Ursic/Orselli/Orsello/Orsetti/Orsatti/Orsolini/Orsolino/Orsoni/Ursillo/Ursini,
Orsini Bonacassi,
Orsini del Balzo,
Orsini-di Bracciano, Oppenheimer, Orange, Ormsby, Ortolani, Orléans, Orléans-Braganza, Ottobonis, Oxenstierna,
*P*
Pacelli, Pahlavi,
Pamphili/Pamphilio/Pamphili/Pamphilij, Pantaléon, Palatinate-Zweibrücken, Palazzo, Pallavicini/Pallavicino/Paravicini,
Parentucelli, Papal, Patrasso di Guarcino, Patten, Patterson, Payne, Payseurs, Perkins, Phelps, Phipps, Plantagenet, Plantard, Piccolomini, Piedmont, Pignatelli, Pillsbury, Pitcairn, Pitigliano, Pius, Poher, Polignac, Polignac-Matignon-Grimaldi,
Porse, Posse, Pratt, Prefetti di Vico, Prignano, Pritzker,
*Q*
Quirinal,
*R*
Radziwiłł/Radziwill,
Reynolds, Rhodes,
Ribbing, Rizzuto,
Rockefeller, Rothschild, Rocco, Roche, Roussel, Rochefoucauld, Rochechouart, Rogers, Romanov, Rosenwald, Rosenberg, Rosenstråle,
Rosso, Rospigliosi, Rospigliosi-Papal, Russell, Ruspoli, Ruspoli-Sueca,
Ruspoli-Boadilla del Monte,
Ruspoli-Poggio Suasa, Ruspoli-Candriano,
Ruspoli-Morignano,
Ruspoli-Fiano, Rufini, Ryan,
*S*
Saafeld, Sacchetti, Samuel,
Saudi, Savoy, Savoy-Genovese, Sachs, Sassanid,
Sassoon, Savelli, Savonarola,
Saxe-Coburg-Gotha-Windsor, S.C.Johnson, Schleswig-Holstein-Sonderburg-Glücksburg, Schiff, Schroeder/Schröder,
Scolari, Schiaratura, Schultz,
Schwartz, Schwarzenberg,
Seaf, Serlupi, Sforza/Szfora/Szfore/Szfori,
Sienese, Sinclair/Saint Clair/Saint-Clair/
Sloane, Solvay, Somaglia, Stenbock, Stern, Stillman, Stimson, Storrow, Strong, Sturdza, Spadafora, Sparre, Spinola, Suor Orsola,
*T*
Taft, Tarentaise, Tarth, Theodoli, Thurn und Taxis, Timken, Torlonia, Tossoukpé, Trastamara, Trolle, Tudor, Turner, Tyson,
*U*
Uyunid,
*V*
Valentinois, Valois-Anjou,
Van Duyn, Vanderbilt, Vascello, Villani, Visconti/Visconte/Bisconti/Viceconte/Viceconti/Viseconte/Viscont,
Vittoria, Vittoria-Pallavicini, von Finck, von Thurn und Taxis,
*W*
Wadsworth, Waldorf, Walton, Warburg Del Banco, Warburg,
Watson, Weber, Weems,
Welfs, Weill, Wettin, Widener, Wiesbaden, Winthrop,
Whitney, Wells,
Windsor-Saxe-Coburg-Gotha, Wittelsbach, Wittgenstein, Worms, Wormwood,
Wurttemberg, Weyerhaeuser,
*X*
*Y*
York,
*Z*
Zogu, Zuccari, Zuniga-Valero,
*Å*
*Ä/Æ*
*Ö*
Örnsparre,

*A*
#Acquafondata
#Agnelli
#AgnelliElkann
#Alba
#Aldobrandini
#AlexandrineMontechanin
#Altavilla
#Allucingoli
#Angelerio
#Anhalt
#Anicii
#Astalli
#Astakai
#Asti
#Astor / #Astarte / #Astorga / #Ashdor
#Aragona
#Archbold
#Arduinici
#Arianiti
#Aubert
#Audley
#Aumont
#AustriaEste

*B*
#Baden
#Baker
#Banchieri
#Barberini
#Bardi
#Bariatinsky
#Baruch
#Battenburg / #Mountbatten
#Bedford
#Benjamin
#Bernadotte
#Berwind
#Blanchefort
#Blazon
#Blumenthal
#Bizzaccheri
#Bracciano
#Braganza
#Breakspear / #Breakspeare
#Bruce
#Brzezinski
#Bobone
#Bonaparte
#Borghese
#Borgia
#Borromeo
#Bourbon
#BouvierSchlossberg
#Bundy
#Burgundi
#Bush / #Scherff
#Buyak

*C*
#Caetani
#Caltagirone
#Canossa
#CancellieriDelBufalo
#Capet
#Caravaggio
#Carnegie
#CargillMacMillian
#Castiglioni
#Catii
#Cattaneo
#Cavalier
#Cavendish
#Chigi
#Chigi-Albani-Della-Rovere
#Chigi-Rovere
#Chigi-Saracini-Lucherini #Chigi-Zondadari
#Cesarini
#Clark
#Cochran
#Cohen
#Collins
#Colonna
#Conti
#ContiDiSegni
#Cox
#Cromwell / #Cromwelle /#Cromville / #Cromewell / #Cromwill / #Cromwille / #Cromevill / #Cromnvell
#Csaky
#CsakyPallavicini
#CurtisBoks
#Cutler
#Cybo

*D*
#D’Arpino
#Deering
#deBeaufort
#DeFieschi
#DeForest
#deGot
#deGoyon
#deGoyonDeMatignon
#DeMedici
#dePolignac
#DeRosette
#DellaRovere
#Dìaz
#DiBicci
#diMorra
#diNardo
#DiSciarra
#Disney / #Isigny
#diTellaColaianni
#Drexel
#Domenichino
#DoriaSachs
#DoriaPamphiliLandi
#Duke
#DuPont

*E*
#Elmaleh
#Este

*F*
#Farnese
#Field
#FitzJames
#Fischer
#Flagler
#Franklin
#Frazzini
#Freeman
#Friedsam
#Fontana
#Ford
#Foster

*G*
#Gambino
#GattiGrami / #Lombardy
#Gaetani
#Genoese
#Genovese
#GenoveseGambino
#Getty
#Ghermezian
#Ghibellines
#Glücksburg
#Gisors
#Giovanni
#Giustiniani
#Gotti
#GottorpRomanov
#Goldsmidt / #Goldsmith
#Gould
#Goodyear
#Green
#Grimaldi
#GrimaldiCoste
#Grosvenors
#Guggenheim
#Guglielmo
#Guelphs
#Guiness / #Guinness

*H*
#Hanover
#Harkness
#Harriman
#Hayden
#Habsburg / #Hapsburg
#HabsburgLorraine,
#Hearst
#Hesse
#HesseKassel
#Higgins
#Hills
#Hippolyte
#Hohenzollern
#Huntington
#Hurwitz

*I*
#Ivrea

*J*
#Jagiellon
#James
#Johnson
#Jimenez

*K*
#Kahn
#Khalili
#Kahzarian
#Khayami
#Kadoorie
#Kellogs
#Kennedy / #Kannady / #Kenardy / #Kennaday / #Kenneday / #Kenneyday / #Kennediem /
#MacKennedy / #MacUalraig
#Kirkwood
#Kresge
#Koch
#Krupp
#Kuhn

*L*
#Landi
#Lazard
#Lehman
#Lesser
#Lee
#Li
#Lichtenstein
#Lombard
#Lombardy
#Lorraine
#Ludovisi
#Luisignan

*M*
#Maderno
#Maidalchini
#Manocherian
#Marescotti
#Maximii
#Mars
#Massimo
#Mattei
#Mavroleon
#McDonald
#McGormick
#McLean
#Medici
#Mellon
#Merage
#Merovingian
#Metcalf
#Mills
#Mocatta
#Montechanin
#Montefiore
#Montgomery
#Montpezat
#Montesquieu
#Morgan
#Morosinis
#Moor
#Moshir

*N*
#Nash
#Nassau
#NiederglattBlazon

*O*
#Oldenburg
#Onassis
#Oppenheimer
#Orange
#OrangeNassau
#Orsini / #Orsi / #Ursi / #Orso / #Urso / #D’Orsi / #Dorsi / #D’Orso / #Dorso /
#D’Urso / #Ursich / #Ursic /
#Orselli / #Orsello / #Orsetti / #Orsatti / #Orsolini / #Orsolino / #Orsoni / #Ursillo / #Ursini
#OrsiniDiBracciano

*P*
#Pahlavi
#Palazzo
#Pamphili / #Pamphilio / #Pamphilij
#Pallavicini
#Paravicini
#Papal
#Patten
#Patterson
#Parentucelli
#Payseurs
#Perkins
#Phipps
#Plantagenet
#Plantard
#Piedmont
#Pitcairn
#Pratt
#PrefettiDiVico
#Pritzker
#Poher

*Q*
#Quirinal

*R*
#Radziwiłł
#Reynolds
#Rockefeller
#Rocco
#Roche
#Rochefoucauld #Rochechouart
#Rothschild
#Rogers
#Romanov
#Rosenwald
#Rospigliosi
#RospigliosiPapal
#Roussel
#Russel
#Ruspoli
#RuspoliSueca
#RuspoliBoadilla del Monte
#RuspoliPoggio Suasa #RuspoliCandriano
#RuspoliMorignano
#RuspoliFiano
#Rufini
#Ryan

*S*
#Saafeld
#Sacchetti
#Sachs
#Samuel
#Sassoon
#Saudi
#Savelli
#Savoy
#SavoyGenovese
#SaxeCoburgGothaWindsor
#SCJohnson
#Schiaratura
#Schiff
#Schroeder / #Schröder
#Schwartz
#Schwarzenberg
#Scolari
#Sforza / #Szfora / #Szfore /#Szfori
#Serlupi
#Sienese
#Sinclair / #SaintClair
#Sloane
#Somaglia
#Solvay
#Stern
#Stillman
#Storrow
#SuorOrsola

*T*
#Taft
#Tarth
#Tarentaise
#Theodoli
#ThurnUndTaxis
#Timken
#Torlonia
#Tossoukpé
#Trastamara
#Tyson
#Tudor

*U*

*V*
#Valentinois
#ValoisAnjou
#Vanderbilt
#VanDuyn
#Vascello
#Villani
#Visconti / #Visconte /#Bisconti / #Viceconte / #Viceconti / #Viseconte / #Viscont
#Vittoria
#VittoriaPallavicini

*W*
#Walton
#Warburg
#WarburgDelBanco
#Watson
#Weber
#Weems
#Wettin
#Widener
#WindsorSaxeCoburgGoete
#Winthrop
#Whitney
#Wittgenstein
#Wittelbach
#Worms
#Wurttemberg

*X*

*Y*
#York

*Z*
#Zogu
#Zuccari
ZunigaValero
___________________________

_Tags:_
#EXPOSING
#SatanicEliteBloodlines #BlackNobility #BlackNobilities #NobilityFamilies #NobilityBloodlines #NobilityHouses #FamilyNames #Family #Names #list #EXPOSED

VATICAN = JESUITS = EVIL

VATICAN = JESUITS = EVIL

maxresdefault

Screenshot_2018-03-22-20-18-25

THE JESUIT OATH EXPOSED BELOW:


The following oath is said to be on record in Paris, among the “Society of Jesus”, the Jesuits.

The Jesuits Oath. — I, A. B., now in the presence of Almighty God, the blessed Virgin Mary, the blessed Michael the archangel, the blessed St. John Baptist, the holy apostles St. Peter and St. Paul, and the saints and sacred hosts of heaven, and to you my ghostly father, do declare from my heart, without mental reservation, that his holiness Pope Urban is Christ’s vicar general, and is the true and only head of the Catholic or universal church throughout the earth; and that by the virtue of the keys of binding and loosing given to his holiness by my Saviour Jesus Christ, he hath power to depose heretical kings, princes, states, commonwealths, and governments, all being illegal, without his sacred confirmation, and that they may safely be destroyed; therefore, to the utmost of my power I shall and will defend this doctrine, and his holiness’s rights and customs against all usurpers of the heretical (or Protestant) authority whatsoever; especially against the now pretended authority and Church of England, and all adherents, in regard that they and she be usurpal and heretical, opposing the sacred mother Church of Rome. I do renounce and disown any allegiance as due to any heretical king, prince, or state, named Protestants, or obedience to any of their inferior magistrates or officers.

I do further declare, that the doctrine of the Church of England, of the Calvinists, Huguenots, and of other of the name Protestants, to be damnable, and they themselves are damned, and to be damned, that will not forsake the same. I do further declare, that I will help, assist, and advise all, or any of his holiness’s agents in any place, wherever I shall be, in England, Scotland, and Ireland, or in any other territory or kingdom I shall come to; to do my utmost to extirpate the heretical Protestants’ doctrine, and to destroy all their pretended powers, regal or otherwise.

I do further promise and declare, that notwithstanding I am dispensed with to assume any religion heretical for the propagating of the mother church’s interest, to keep secret and private all her agents’ counsels from time to time, as they intrust me, and not to divulge, directly or indirectly, by word, writing, or circumstances whatsoever; but to execute all that shall be proposed, given in charge, or discovered into me, by you my ghostly father, or by any of this sacred convent.

All which I, A. B., do swear by the blessed Trinity, and blessed sacrament, which I now am to receive, to perform, and on my part to keep inviolably; And do call all the heavenly and glorious host of heaven to witness these my real intentions to keep this my oath. In testimony hereof, I take this most holy and blessed sacrament of the eucharist; and witness the same further with my hand and seal in the face of this holy convent, this ——- day of ——– An. Dom., &c. [William] McGavin’s [The] Protestant[Essays on the principal points of controversy between the church of Rome and the reformed, Hutchinson And Dwier, Hartford, CT, 1834], Vol. ii. p. 256.


Source: Discourse in Commemoration of the Glorious Reformation of the Sixteenth Century, by S.S. Schmucker, D.D., reprinted from the original printing plates of 1838, Limited Edition, published by The Word Publications, 1984, P.O. Box 35695, Phoenix Arizona 85069, USA.


The following oath has apparently been shown to be fraudulent. See Observations on the Oath of a Catholic Priest.

The Jesuit Extreme Oath of Induction as recorded in the Journals of the 62nd U.S. Congress, 3rd Session, House Calendar No. 397, House Bill 1523, Contested election case of Eugene C. Bonniwell, against Thos. S. Butler, Feb. 15, 1913, pp. 3215-3216:

I ______, now in the presence of Almighty God, the Blessed Virgin Mary, the Blessed Michael the Archangel, the Blessed St. John the Baptist, the Holy Apostles, Peter and Paul, and all the Saints, sacred hosts of Heaven, and to you, my ghostly Father, the Superior General of the Society of Jesus, founded by St. Ignatius Loyola, in the Pontification of Paul the Third, and continued to the present, do by the womb of the virgin, the matrix of God, and the rod of Jesus Christ, declare and swear that his holiness, the Pope, is Christ’s Vice-regent, and is the true and only head of the Catholic or Universal Church throughout the earth; and that by the virtue of the keys of binding and loosing, given to his Holiness by my Savior, Jesus Christ, he hath power to depose heretical kings, princes, states, commonwealths and governments, all being illegal without his sacred confirmation, and that they may be safely destroyed.

I do further declare, that I will help and assist and advise all or any of his Holiness’ agents in any place wherever I shall be, and do my utmost to extirpate the heretical Protestant or Liberal doctrines and to destroy all their pretended powers, legal or otherwise.

I do further promise and declare, that notwithstanding I am dispensed with to assume any religion heretical, for the propagating of the Mother Church’s interest, to keep secret and private all her agents’ counsels, from time to time as they may instruct me, and not to divulge directly or indirectly, by word, writing, or circumstances whatever; but to execute all that shall be proposed given in charge or discovered unto me, by you, my ghostly father. …

I do further promise and declare, that I will have no opinion or will of my own, or any mental reservation whatever, even as a corpse or cadaver but unhesitatingly obey each and every command that I may receive from my superiors in the Militia of the Pope and Jesus Christ.

That I will go to any part of the world, whatsoever, without murmuring and will be submissive in all things whatsoever communicated to me. … I do further promise and declare, that I will, when opportunity presents, make and wage relentless war, secretly or openly, against all heretics, Protestants and Liberals, as I am directed to do to extirpate and exterminate them from the face of the whole earth, and that I will spare neither sex, age nor condition, and that I will hang, waste, boil, flay, strangle and bury alive these infamous heretics; rip up the stomachs and wombs of their women and crush their infants heads against the wall, in order to annihilate forever their execrable race.

That when the same cannot be done openly, I will secretly use the poison cup, the strangulation cord, the steel of the poniard, or the leaden bullet, regardless of the honor, rank, dignity or authority of the person or persons whatsoever may be their condition in life, either public or private, as I at any time may be directed so to do by any agent of the Pope or superior of the Brotherhood of the Holy Faith of the Society of Jesus.

THE LIST OF BIRTH CERTIFICATES OF THE REAL ZOROASTRIAN ILLUMINATI BLOODLINES:

(which you will see on the obelisks of Rome)

  • Matteiano
  • Flaminio
  • Vaticano
  • Dogali
  • Solare
  • Lataranese
  • Minerveo
  • Macuteo
  • Sallustiano
  • Quirinale
  • Agonalis
  • Pinciano
  • Esquiline

YOU TUBE VIDEO LINK BELOW:

DEEPSTATE-WHO OR WHAT IS THE DEEP STATE? 

DEEPSTATE-WHO OR WHAT IS THE DEEP STATE? 

2019-02-02-13-35-36~2

WHAT IS THE DEEPSTATE?

MEANING: ‘CRYPTO’

noun

cryp·​to | \ ˈkrip-(ˌ)tō  \

plural cryptos
DEFINITION OF CRYPTO

(Entry 1 of 2)

1: A person who adheres or belongs secretly to a party, sect, or other group

2: CRYPTOGRAPHY sense 2

crypto

adjective

Definition of crypto (Entry 2 of 2)
1: not openly avowed or declared — often used in combination crypto-fascist
2: CRYPTOGRAPHIC

Examples of crypto in a Sentence

Recent Examples on the Web: Noun

That incredible rise made Lubin one of the richest men in crypto, with a net worth of between $1 and $5 billion, according to Forbes.— Bijan Stephen, The Verge, “ConsenSys plans to spin out most of its startups, and it’s going to mean layoffs,” 20 Dec. 2018Plus, Facebook seems to think the crypto craze is at least somewhat legit.— Kurt Wagner, Recode, “Facebook is reversing its ban on cryptocurrency ads,” 26 June 2018

These example sentences are selected automatically from various online news sources to reflect current usage of the word ‘crypto.’ Views expressed in the examples do not represent the opinion of Merriam-Webster or its editors. Send us feedback.
FIRST KNOWN USE OF CRYPTO

Noun

1946, in the meaning defined at sense 1

Adjective

1681, in the meaning defined at sense 1
HISTORY & ETYMOLOGY FOR CRYPTO

Noun

(sense 1) independent use of CRYPTO-; (sense 2) by shortening
Dictionary Entries near crypto

cryptic

cryptic species

cryptid

crypto

cryptobatholithic

cryptobiotic

cryptoblast

Statistics for crypto
Time Traveler for crypto

The first known use of crypto was in 1681
MORE DEFINITIONS FOR CRYPTO

crypto

noun

cryp·​to | \ ˈkrip-(ˌ)tō  \

Medical Definition of crypto

: CRYPTOSPORIDIUM sense 2

also: CRYPTOSPORIDIOSIS

_______________________________

society

/səˈsʌɪɪti/
noun
  1. 1.
    the aggregate of people living together in a more or less ordered community.
    synonyms: the community, the public, the general public, the people, the population;

  2. 2.
    an organization or club formed for a particular purpose or activity.
    synonyms: associationclubgroupbandcirclefellowshipbodyguildcollegelodgeorderfraternityconfraternitybrotherhoodsisterhoodsororityleaguefederationunionallianceaffiliationinstitutioncoterie;

    raresodality
    “a local history society”

 

THE DEEP STATE = A shadow government =
(#Cryptopcy = The rich and powerful people, who operates the secret criminally corrupted organization referred to as the ‘deepstate’. An secret organisation, executed by a secret ‘shadow government’, containing some extremly powerful people, with apparently unlimited financial resources, which gives them access and liberty above the law, to dictate the judges, politicians, bankers, businessmen, the elite,
The globalists. These top level executive leaders controlling, all underlaying branches within the federal courtsystem, federal banksystems, private sectors business are, extremely rich elitists, often related through intermarriged illuminati bloodline families, self-claimed the titles of royalty, noble families and individuals above the law and justice. These members of the shadow government, also so called “top ranked” class induviduals of the society. These individuals, all share at least three main charachter trades.. – They are extremly GREEDY, EVIL, and THEY LACK EMPATHY. Most psychologist’s have mentioned  socio-pathic and narcissistic psychopath behaviour when describing people similar as these top-elite’s. They’ve been shaped into disturbed individuals analyzed to fit the highest levels of the anti-social dissociative personality disorders.
They personality traits are very material-based and they cannot relate to matters that involve empathy /sympathy or acting selfless. Because they were brought up to be obsessed with money, power and they were traumatized so badly in their early childhood years, that it destroyed their mind to comprehend learning how to feel empathy, they enjoys from others suffering, pain, fear, despair and death. Their goal is to be wealthy, powerful, dictators, who can ‘treat the proletarians (the rest of the people), as they please without any consequenses. They cannot get satisfied with what they got, so they obsession and lust for money and power will never be fullfilled).

deep-state

DEEP STATE = A criminal organisation and a secret society, hidden in plain sight

20181210_091430_HDR

THE DEEP STATE:

e-books-tamil

● THE DEPARTMENT OF DEFENSE

kisspng-united-states-department-of-defense-defense-contra-5b1c18e2cb9933.226166361528568034834.jpg

● THE STATE DEPARTMENT

2000px-Seal_of_the_United_States_Department_of_State.svg.png

● HOMELAND SECURITY

download

● THE CIA

cia-logo-black-and-white

CIA_we put coke in America

 

CIA~2

 

● THE JUSTICE DEPARTMENT

Seal_of_the_United_States_Department_of_Justice.svg

 

● THE TREASURY

US-Department-of-the-Treasury

THE EXECUTIVE OFFICE OF THE PRESIDENT VIA THE NATIONAL SECURITY COUNCIL

Seal_of_the_Executive_Office_of_the_President_of_the_United_States_2014.svg

 

National_Security_Council_of_the_Philippines.svg

 

● THE FOREIGN INTELLIGENCE SURVEILLANCE COURT

maxresdefault

 

● SOME VITAL FEDERAL TRIAL COURTS

2000px-Seal_of_the_United_States_Supreme_Court_svg

Seal_of_the_United_States_Department_of_Justice.svg (1)

 

● MEMBERS OF THE DEFENSE INTELLIGENCE COMITTEES

Seal_of_the_US_Defense_Intelligence_Agency_(DIA)

 

Seal_of_the_U.S._Defense_Intelligence_Agency.svg

 

● MOSSAD

AddText_01-28-01.43.53

 

MORE ABOUT THE DEEPSTATE:

0_wallpaper_anonymous-worldwide-united-censored1

 

● It’s the militarized police, which have joined forces with state and federal law enforcement agencies in order to establish themselves as a standing army.

USAMPC-Regimental-Insignia

● It’s the fusion centers and spy agencies that have created a surveillance state and turned all of us into suspects.

 

● It’s the courthouses and prisons that have allowed corporate profits to take precedence over due process and justice.

 

● It’s the military empire with its private contractors and defense industry that is bankrupting the nation.

 

● It’s the private sector with its 854,000 contract personnel with top-secret clearances, “a number greater than that of top-secret-cleared civilian employees of the government”.

● It’s what former congressional staffer Mike Lofgren refers to as “a hybrid of national security and law enforcement agencies”:
the Department of Defense, the State Department, Homeland Security, the CIA, the Justice Department, the Treasury, the Executive Office of the President via the National Security Council, the Foreign Intelligence Surveillance Court, a handful of vital federal trial courts, and members of the defense and intelligence committees.

 

● It’s every facet of a government that is no longer friendly to freedom and is working overtime to trample the Constitution underfoot and render the citizenry powerless in the face of the government’s power grabs, corruption and abusive tactics.

These are the key players that drive the shadow government. This is the hidden face of the American police state that will continue long past Election Day. Just consider some of the key programs and policies advanced by the shadow government that will continue no matter who occupies the Oval Office.

AddText_01-28-12.55.51

#EXPOSING #deepstate TheDeepstate #corruption #ShadowGovernment
#corrupted #EXPOSED

MK ULTRA MINDCONTROL PROGRAMMING FACILLITIES LOCATIONS EXPOSED..

A = ALPHA-PROGRAMMING
B = BETA-PROGRAMMING
Γ = GAMMA-PROGRAMMING
Δ = DELTA-PROGRAMMING
Θ = THETA-PROGRAMMING
Ω = OMEGA-PROGRAMMING

coollogo_com-21124878

coollogo_com-16387856

coollogo_com-83661139 (1)

coollogo_com-28435471

coollogo_com-2629725

coollogo_com-21781108

coollogo_com-6492113
____________________________________
Λ = LAMDA
Ξ = XI
Π = PI
Σ = SIGMA
Ψ = PSI
Ζ = ZETA

____________________________________

MK ULTRA MIND CONTROL LIST OF SITES:

tumblr_nln0yq3rta1ti036zo1_400.gif

APPENDIX 2. THE PROGRAMMING SITES

Some MAJOR MIND-CONTROL PROGRAMMING SITES with explanations of their programming. (Fritz Springmeier originally exposed many of these sites in 1993, so it is possible they have made some changes since they were originally exposed. Most of these operated for years, and may still be operating. We are aware of that some of their programming bases have been moved after exposure.) Besides these major programming sites, there are countless minor ones. For instance, some of the programming sites for water-beach tortures have been visited by the co-authors, but are not listed. The massive Boeing Plant in the Seattle, WA area with its large amount underground tunnels has been used for programming, as well as the ARCO Beaver Valley Plant in Pennsylvania. So has the chapel at the Coast Guard Academy at New London, Conn. which was built by A.W. Mellon of the Mellon Illuminati family via their Mellon Foundation. This list is not put forth as comprehensive. Without question, this list is only the tip of the iceberg.

29 Palms, CA –Area 51 (Dreamland, Groom Lake), NV–Area 51 is also known as Dreamland. There are a number of extensive underground facilities in the area. This was one of the first genetic research facilities in the U.S. and perhaps the first major genetic research facility. The people/workers & victims are brought in by airplane and tube shuttle. The worst cases of UFO/alien type of Monarch programming is coming out of Area 51. The eggs from slaves are being harvested and weird genetic creatures are being developed from human eggs which have been genetically mixed with other things.

Bethseda, MD–The Bethesada Naval Hospital

Bingham, UT–A red brick house, which was a closed House of Prostitution. The building was used for KKK programming. Child porn was produced in the basement, and upstairs programmed child slaves serviced KKK members. The KKK activity in the area connects in with the Illuminati controlled Kennecott Copper Co. (aka Utah Copper Co.) Russell G. Frazer, head of Bingham’s Klavern & doctor for Kennecott Copper Co. did the electro-shock to split personalities.

Black Forest, Germany–Because the U.S-U.K. and Germany do so much programming, and some of the people in the U.S. were programmed in the U.K., Germany or Russia, it is worthwhile to mention some of the German programming sites. A number of witnesses report about castles in the Black Forest which are used for programming & ritual. Basal, Sw. on the border with Germany is a important Illuminati center. Frankfurt, Berlin and Zurich are all important programming/ritual sites. The Jesuits and the Catholic churches are very active in programming in Germany.

Boulder, CO–The headquarters for EMC, a type of electra-magnetic mind control that is being broadcast to modify the thinking of Americans, and to control slaves.

Butner, N.C.–Center of Correctional Research, all types of mind control are carried out and experimented with on the inmates.

Camp Peary, VA–The CIA’s The Farm is located on a narrow strip of land between the York & James Rivers near Williamsburg, VA, used for programming CIA slaves. It has red brick buildings, and looks similar to a small college. The official crytonym was ISOLATION. People who are brought in who don’t know where they are for training are called Black Trainees.

China Lake Naval Research Base (Inyokern), CA–This facility had a country store, and hangers, and a hospital (address for the hospital is the code- 232 Naval Air Weapons Station) which all provided sites for programming. This site has been operational since the early 1950s. Large numbers of children (batches of 1000 or 2,000 or 3,000 children were run through this facility at a time. This facility did much of the original traumas and mind-splitting tortures that created the MPD. Other facilities then specialized in further programming that was then layered in on top of the original China Lake programming. A great deal of dehumanization in cages was done to large numbers of tiny children at China Lake Naval Facility. Nimitz Hospital did drug testing of the children prior to their programming.

Colorado Springs, CO–The ALEX system programming and end-times Military programming is coming out of Colorado Springs and is connected to NORAD. One of the Colorado sites is doing alien programming with mock UFOs.

Dillsboro Nike Base–Monarch programming of many kinds

Disneyland, CA–Disneyland has been an off hour site for Illuminati and satanic rituals for years. Programming has gone on using Disneyland as one big prop for programming. Many of the Disney movies are used for programming, and some Disney scripts are especially tailored for Monarch slave programming. The Peter Pan programming can use the ship. The space programming can use the space props. The satanic programming can use the castles. Lots of mirror programming is done at Disneyland, and Disneyworld. There is also Magic Mountain programming, and programming using the Around the World Dolls, and its theme song. Some of Wizard of Oz and the Cinderella programming was also done at Disneyland using costumes. Preverbal children are taken to Disneyland to get them ready for the scripts.

Disneyworld, FL–Disneyworld was created as the eastern counterpart to the Disneyland programming site. One of the rides in Disneyworld plays “It’s a small, small world” which is Disneyland developed programming theme.

Ft. Campbell, KT–Base programs are placed in here.

Ft. Detrick, MD–involved with medical/biological experimentation

Ft. Holabird, MD–This site is no longer in existence, but was the Army Intelligence School. CIC used the school. The place was known as “the Bird.”

Ft. Hood, TX–programming involving military uses of Delta Monarch slaves was done here.

Ft. Huahuachua, AZ–HQ for Army Intelligence.

Ft. Knox, KT –The 1st Earth Batt. was developed here.

Ft. Lewis, WA–involved with the Psychic warfare part of the Monarch Programming.

Ft. McClellen–Ft. Meade, MD–The National Security Agency was created on 4 Nov 1952. Its headquarters were Fort Meade, VA. The National Security Agency (NSA) employs tens of thousands of employees and has a budget larger than the CIA. It has also been kept far more secret, while the CIA has been used as the fall guy to protect the National Security Agency’s reputation. In the late 1960’s, under Operation Minaret and Program Shamrock, the NSA and its British counterpart GCHQ began monitoring much of the communication within the USA and UK. The NSA monitors all American calls via computers using trip words, specific names, specific addresses, specific telephone numbers, etc. NSA has several computer to record all the millions of conversations which the computers have examined and deemed worthy of recording. How the NSA can get any use out of millions of recorded telephone conversations is beyond me? What intelligence agency could adequately process so much information?

These organizations now monitor all communications within both countries. At least one congressman got upset that his phone was bugged by the NSA. (see David Corn’s article, “The case of the bugged senator” in Nation, Feb. 6, ‘89, p. 152.)

The NSA has developed a fiberoptics network called Internet computer network. An orange book is used to specify some of the NSA’s security levels.

An informant in the National Security Agency states that establishment newspapers like the Wall Street Journal and the New York Times are used to communicate secret messages which are placed within want ads, buzz words in editorials, and via other methods. Because of some of what this person told me, I have given some possible examples in this newsletter of how people might be using the papers for secret messages. For instance using Michael Jackson with his hands making some type of sign might be a signal. Manfried Adler and the US Senate Committee investigating the CIA found that 90% of the CIA’s secret messages are transmitted via the media, with the aid of coded texts and pictures.

A raised forefinger or two raised forefingers while a speaker is talking means that the message is a masonic message coming from a masonic speaker.

The Illuminati uses code words within the large establishment papers to warn their people what they are going to do with the economy. In this way, people in the Illuminati can take appropriate responses.

Goddard Space Flight Center–NASA mirror-theme programming

Grissom AFB, IND–

Hollywood, CA–One of the programmers/handlers in the Hollywood area is surprisingly Anton LaVey. This is one reason Anton LaVey has followers who will carry out his very wishes. LaVey’s children of course were programmed too. His own girls have been participating in the nude in satanic rituals since little children.

Homestead AFB, FL–

Kirkland AFB, NM–Lampe, MO–This has been the site of a CIA near-death trauma center where slaves are programmed. It is an R&R center for the CIA where they can have any sexual perversion or drug they want. This has been a large cocaine supply depot also. Hal Meadows was director of this center which is deep in the woods surrounded by cabin chalets overlooking a small deep lake. A gravel road leads to the site which is fenced and well-guarded. Hal Meadows address was Box 27, Lampe, MO 65681.

Langley, VA– Slaves for the wants of intelligence.

Las Vegas (sites in and around Las Vegas), NV–MGM’s Grand Hotel and Theme park were built for programming, but there are also some sites outside of the city used. In the general area of Las Vegas in remote sites, the elite gather for slave auctions once a year where Monarch slaves are sold and traded. One of the favorite slave auction sites was 20 miles out of Las Vegas and 10 miles off the main road into the site. The Mob is involved with Monarch slaves in Las Vegas. A blue-eyed 11 year old girl will go for $50,000. Toronto, Canada is another regular site for Monarch slave auctions.

McClellan AFB, CA – Very bad Child and adult porn using Monarch victims is distributed through this base as well as the other bases listed in this list. A T.W. Sanderson worked with Monarchs at this base.

MacDill AFB, FL –Near Tampa, FL

Maxwell AFB, AL —

Montreal, Que., Canada -McGill Univ., McGill Psychiatric Training Network, Allan Memorial Inst., St. Mary’s Hosp.- The Zombie Room (Sleep Room) in the basement, the Isolation chamber and the Grid Room at St. Mary’s Hospital were used for programming.

Mt. Shasta, CA–Underground facilities around this huge mountain in the Lake Shasta area are putting out Monarch programming that makes the people think they are in communication with aliens. This facility is for torturing & reprogramming captured runaway Monarch slaves. People are brought into the area via helicopter, plane, or flying saucer. This site is probably the largest mind-control programming center. It is in a remote wooded area. It is heavily guarded, has fences, and a large contingent of black helicopters. Mt. Shasta is equipped with state of the art high tech programming equipment. Mind-controlled slaves who are soldiers are programmed and trained at the Mt. Shasta facility.

Nashville, TN–These sites work with the Country Western Music Industry which is actually a CIA front for moving drugs to finance their dirty black activities. Fiddler’s Inn, Nashville fits in with the Monarch Programming.

Papillion, NE–

Patrick AFB,–Portland (Old OMSI, New OMSI, Bldg. Near Monarch Hotel at 8800 SE Sunnyside Rd., Mormon Temple, etc.), OR. The Old OMSI building had a back door on the west side in which slaves were taken in to the bottom floor and reprogrammed. Although security guards aren’t visible, they are there with electronic surveillance. The people running OMSI are tied in the Illuminati. The DC-3 airplane outside of the building was used in the programming as a hypnotic trigger. The submarine docked outside of the new OMSI building is also used as a programming hypnotic tool. The new Mormon Temple has an extremely high tech underground tunnel facility for programming built underneath it. Witnesses have collaborated their testimony on this high tech programming site under the Portland Mormon Temple. Although building plans are to be public information, the city of Lake Oswego makes it very difficult to view the temple’s building plans. The plans show that the foundation walls are far thicker than any conceivable earthquake would ever call for. The reason is that the foundation helps house an underground arena for the Illuminati & and their guests to watch perverse shows.

Presideo, CA (incl. Alcatraz, San Francisco)– The Illuminati and various Satanic cults used the Presideo for their programming. Split-brain & other programming was done at Letterman hospital. Fort Point was used for Illuminati ritual & programming, as well as a number of churches, underground gun emplacements and the large circular Greek column art building at the Presideo. Alcatraz, abandoned as a prison, was used for water tortures and otherprogramming. Tunnels connected buildings, and the Mule/Horse buildings and the cemetery also were used. This is one of the older programming sites. Psychic warfare activity also was experimented on in this area. Letterman Hospital has been used for the initial drug testing of the infants before programming. Lots of isolation programming in damp cold places was done at the Presideo. Lots of porn and military programming have also been done here. Redstone Arsenal, AL– San Antonio, TX– Salt Lake City (Mormon Temple)–This underground facility works in conjunction with the Mormon hierarchy who are allowed to create slaves. The Illuminati put in base programming that still gives them ultimate control beyond the control that the Mormon programming has.

Scotty’s Castle, Death Valley, CA-Mengele (Dr.Green) programmed in some of his “internal boxes” as well as other Illuminati programming was done at this site. Mengele had a large circular red bed in the castle which he stocked with his little girl slaves, who already had kitten sexual alters. Scotty’s Castle is a castle located in Death Valley CA. It has a very interesting history. To reach the castle one is required to drive through many miles of desert. If one drives to lnyo County, CA, the same county that has China Lake Naval Testing Grounds, and Inyokern, and then you drive on Hwy. 190 into Death Valley National Monument (it is not a park or forest, dead valleys are called monuments), next you go north on a road after Stove Pipe for 35 miles.

The man who built Scotty’s Castle was Walter Perry Scott (1872-1954). Walter P. Scott was the son of an alcohol distiller and horse breeder in Kentucky. Walter did not get any formal education. He left home and went west where he worked as a mule driver, and a water boy. From there he became a horse wrangler. Because of his talent with horses Buffalo Bill made him the feature rider along with Annie Oakley in Buffalo Bill’s family show. The show travelled and Scotty was with it eleven years. During this time, Scotty made many important friendships with men of power and wealth. In 1900, Walter married and left the show. He got a loan from Julian Gerard, a NY banker, to go prospecting for gold which he failed to pay back. Julian Gerard was repeatedly sending people to hassle Scotty to get his money back. In 1905, Walter Scott (“Scotty”) scattered gold nuggets and $100 bills from N.Y. to L.A. Where he got all this gold and $100 bills is a mystery, but it wasn’t from prospecting. The idea of finding a secret mine was very obviously a cover for however Scotty managed to get his money. Scotty is well-known for his penchant to throw away $20 gold pieces as if they were candy wherever he went. Nobody believed he had a mine, strangely the IRS never got interested in Scotty. Why? The IRS went after Charles Caughlin who was exposing the elite, the bankers, the Freemasons, etc. in the early 1930’s on his radio show. There was no reason to suspect Caughlin of any cheating on his Income Tax, and the audits found the IRS actually owed Caughlin money.

However the national papers printed front page stories of the IRS investigation, and practically ignored that the man was exonerated. Yet, the IRS left Scotty alone. Hmmm. Although Scotty was married, he became intimate friends with Albert Mussey Johnson (1872-1948), a Chicago millionaire, who was v.p. from 1906 to 1926 of the National Life Insurance Co. Albert M. Johnson was born in Ohio, and lived in Arkansas and Missouri before moving to Chicago. Johnson came out and stayed in Death Valley. The stay helped his health, and he and Scotty remained close friends. In 1924, construction secretly began on a castle in Death Valley. The best of materials were used and the materials had to be hauled clear out in the desert by truck to Grapevine Canyon where the castle sits. Hundreds of workers were hired. The castle got its kitchen tiles from Spain. Special rugs were made on the European island of Majorca for the castle. Tiles for the incompleted pool came from the Mediterranean. Many of the furnishing of the castle came from cathedrals and palaces in Spain and Morocco. Draperies made for the castle were hand-tooled in selected sheepskin leather. Sixty hand-carved panels, each of a different design, were installed in the music-room ceiling. A Welte Mignon organ reported to have cost $160,000 –the finest of its kind in Western United States was placed in the music room, even though Scotty could not play the organ. Twelve bathrooms were installed. Several kitchens were installed. Tunnels and secret rooms were built under the buildings. Around $2 million (dollars of that time period) were spent on building the castle, supposedly from Scotty’s “gold mine.” The castle became known as Scotty’s Castle. It is ideal as a Satanic ritual site. It can accommodate numerous people. It is remote. It has hidden rooms and areas and tunnels.

Tavistock, England–This has been the primary programming center for England. The Rothschild programmers work out of Tavistock. A large number of slaves in America have been programmed there.

Tavistock has been doing mind-control since before W.W.ll. Under the supervision of London’s W Board & 20 Committee MI6 and MIS’s Section BIA ran double agents and mind-controlled spies/couriers during W.W. II. MI6 has had an office at Century House, No. 100, Westminster Bridge Road. MI5 offices have been in part on Curzon St. MI5 has operated behind a number of fronts, incl. their fake travel agency Casuro Holidays. MI-5’s address for mail is Room 055, The War Office, London. Special Intelligence Service (SIS) dealt with all types of mind control. Tavistock was under SIS. The British government has had their own telephone exchange with a 222 prefix, which was later linked to another secret exchange YTAN. Outsiders could dial 222 8080 to get into the secret govt. exchange. Men like mind-control expert/hypnotist Eric Trist worked for Tavistock. A six-man team which wore black berets also helped w/ mind control at Tavistock.

Two people who became terrorists after their visits to Tavistock are Angela Davis and Stockley Carmichael who went to a conference at Tavistock entitled Dialectics of Liberation in 1967. It’s main building is a bland 6-story building. The address is The Training Office, The Tavistock Clinic, 120 Belsize Lane, London, UK NWs SBA. Tel. no. 071-435 7111. The chief exec. is Anton Obholzer. The Chair of Prof. Comm. is Nicholas Temple. Both are skilled in psychology. The Tavistock Clinic was founded in 1920, and in 1946 the Tavistock Institute was created as an independent body to assist the Tavistock Clinic. The Institute does more of the research. The Royal Free Hospital at the University of London works with Tavistock Clinic, as well as the Science Policy Research Unit (SPRU) of Sussex University. A large number of Britian’s psychologist, social workers and police get their training at Tavistock. Tavistock has set themselves up as the authority on ritual abuse and MPD (DID). In other words, the primary programming site, is pretending to be the leading institution trying to solve the problem! That’s a good cover.

Tinker, AFB, OK–Tinkerbell programming is carried out here. This programming makes alters think they are like Tinkerbell in that they will never grow up or age.

Titusville, FL–At the Kennedy Space Center. Mind control testing is done, and base programming such as the Wizard of Oz programming is done here. Also NASA high tech programming is done here.

Tulsa, OK—Believed to have an Alice In Wonderland theme to their programming. Oral Roberts University is used for programming. The programming to infiltrate and capture the Christian church via the healing/charismatic movement has centered around Tulsa and Oral Roberts University.

Utah State Prison–The prison has carried out mind control for over 30 years on their inmates for the intelligence agencies with the help of the U.S. government’s power to cover it up.

Versailles, IL—Brain implants are put into Monarchs here.

Washington, D.C. area–The basement of the Pentagon and other facilities around Washington D.C. such as the Jesuit Georgetown Univ. Hosp. are involved with Mind-Control. Presidential Models are moving in and out of Washington, D.C. carrying messages and performing their sexual acts for the lusts of politicians. There is also a NASA Mind-control Programming Center in Washington D.C. Secret tunnels connect the White House to other buildings. These tunnels are used to bring in slaves. Some secret rooms in the lower White House are set aside for rituals.

Wright-Patterson AFB–Near Dayton, OH, Virtual reality programming is carried out here.

Youngstown, OH–The Youngstown Charm School has been run by Illuminatus Prosser Seward Mellon along with a U.S. Congressman named Jim Trafficant. The old stone building originally belonged to one of the railroad elite. This school is for Beta models and gives them advance sexual charm training. This school produces about 6 new Monarch slaves every three days. Mafia deals are carried out on the second floor of the charm school. A slave who is being trained/programmed at the Charm school will take a course that last a few days. The first day may be spent hanging in a dungeon which was once a basement wine celler. The torture dungeon has all the traditional torture devices, a stretching rack, whips, hanging chains, etc. In the dungeon rooms were a black Nubian goat “Satan”, a small donkey “Nester’, and a small white pony “Trigger”, as well as dogs and snakes. The slave is taught silence in the dungeon as they are subjected to bestiality.

Click here for picture 1

Click here for picture 2

Click here for picture 3

Click here for picture 4

Click here for picture 5

Click here for picture 6

Click here for picture 7

Click here for picture 8

Click here for picture 9

Click here for picture 10

Click here for picture 11

Click here for picture 12

Click here for picture 13

· We have just touched the surface of the vest network of programming sites. Two examples of an entire series of programming sites–1. the Coast to Coast campground resorts & 2. the Jesuit-run institutions, which are often programming sites incl. Jesuit College, WV. An example of the former is the Park City Diamond Caverns. KT Coast to Coast resort, which has had a sensory deprivation tank, headphones for state of the art harmonic programming. etc. These membership camp sites are used to program children. Nor have we touched upon the large numbers of programmed Russians & Eastern Europeans that are coming Into this nation. When this book was written more people immigrated to the U.S. from Russia than anywhere else. Europe is teeming with prgmg sites. incl. the Vatican. Sebulun Zuflucht in Marienheide, Ger. is about the only european attempt at deprogramming.

Original contents HERE

Some more MAJOR MIND-CONTROL PROGRAMMING SITES

…with explanations of their programming

This list is added as a supplement to those sites exposed in the Vol. 2 book.

Slaves have to come in to the “SHOP” periodically to have certain maintenance programs renewed to maintain the power of the programming. Most slaves that are being used in operations come in at a minimum every 2-3 years. Most people who have been programmed aresleepers. And many people who have horrible programs to carry out are programmed for the next few years.

All kinds of sites are used, for instance,

Boy and Girl Scout camps

a big church in Greensboro, NC

a desert site near Tucson, AZ

hotels in New Orleans

Many people who have been “recruited” (beguiled and trapped) into the mind-control are seen being sent to Colorado Springs, CO.

A network of daycare centers has been established worldwide by the Illuminati’s Network for the programming and recruiting of children. A series of Youth Hostels has also been created (originally by the communists) for Network goals, and have been widely used by the communist faction of the World Order.

The elite have their own schools, such as Eaton School in the UK which receives some Illuminati children under mind-control. Watch the Office of Global Analysis, which is an intelligence group for global analysis for the NWO. Also watch out for the National Program Office(NPO) which is reported to have been created in 1982 to oversee “black” programs of the intelligence agencies. The National Reconnaissance Office(NRO) is another black ops group.

This group is in part housed within the Pentagon and deals with assassination teams. It uses lots of illegal funds which it launders through another Pentagon agency called the DSAA (Defense Security Assistance Agency). Gen.Howard Fish, Mr. Eric Von Marbod, Gen.Phil Gast were the men in DSAA that laundered the NRO’s money. I, Irving Davidson, who has one foot in the mafia & one in the military black ops is a go-between. One of the assassination programs they ran years ago was the Zeta Diogenes (ZD) project.

Different agencies that participated had different codes for the programs. The men used in these NRO programs are mind-controlled slaves in some cases, it is not known what % if any are not under mind-control. They are organized as cells and are operating in various military, national guard, and secret reserve units.

Present-day Russia’s Guards Directorate has two “counter-terrorist” divisions Alfa and Vympel. These were formerly part of the KGB, and employ mind-controlled victims in their work. OP-06-D is the unit assigned to perform penetration tests to determine security at these different military/intelligence bases used for programming.

Air Force Units to watch:

· Aerospace Defense Intelligence Center ADIC
· Air Force Intelligence Support Agency AFISA (recent name) of the Air Force’s all sources intelligence organization
· Kelly AFB has the 693rd Intelligence Wing located there
· ERT (Air Force Swat Teams)

Army Units to watch:

· Pentagon
· Military Intelligence which calls itself INSCOM. INSCOM units are all over the world incl.

· Area 51, White Sands, Ft. Meade, and their Vint Hills Farm Station at Warrenton, VA near the old Manassas battlefield sites. Their Ft. Huachucha in AZ appropriately sports a Sphinx statue.

So many intelligence people came fromthe Illuminati initiating centers of Harvard, Yale, & Princeton that the acronym HYP was applied to some of them by others in an allusion to the word “hype.”

For the first half of MI-6’s history, only women from the elite, the aristocracy were recruited to work in MI-6, for this reason the women at MI-6 were called Queenie.

As Illuminati members of the hierarchy, they were indeed given various Queen positions. The crossovers occur both ways.

One finds intelligence people in places like Yale and the big Illuminati corporations. For instance, a military psychologist Alexander R. Askenasy, who worked in the area of mind-control for the Army, later taught at Princeton, and then went on to a prominent position at the NY State Psychiatric Institute & the Dept. of Psychiatry, Columbia Univ.

Another example is Robert Finley Delaney, who worked with the Navy in PSYOPS, the State Dept. and also worked for ESSO Standard Oil company.

One final example in a list of examples that seems to go on forever, the Professor of Psychology at Yale was Irving L. Janis, a military man who worked in military psychological research and PYSOPS, and who co-authoredCommunications and Persuasion, Personality and Persuasibility.

Contents

Dictionary of Programming Centers

Deep Underground Military Bases (DUMB Bases)

Return to Mind Control

DICTIONARY OF PROGRAMMING CENTERS

(cont. from Vol. 2)

ARCO (Atlantic Richfield Co.)

–This company continually keeps popping up during investigations/research on Mind-control. John Coleman in report The Tavistock Institute states that several men on ARCO’s Board of Directors were trained by Tavistock incl. Jack Conway, Philip Hawley, and Dr. Joel Fort.

Alice Springs, Australia

–is home of USAF Detachment 421 involved with intelligence

Amarillo, TX

— near Amarillo is a major underground programming center called “the Station.” Inside Amarillo are other collaborating sites such as an ophthalmologist’s office.

Armed Forces Medical Intelligence Center (AFMIC)

— This center uses mind-controlled slaves, incl. those who are members of the Green Berets.

Austin, TX

— The Rebecca Baines Johnson Convalescent Home, at 21 Waller St., Austin, ph. no. 512-476-6051, has had a Cray-3 computer (with at least a 1,000 megaflop capability) secretly placed into the Johnson Convalescent home for the purpose of secretly being a command post for sending control signals to people who have body suits of implants. Signals from here radiate to many far off places to control victims of implant mind-control.

Boulder, CO

— The headquarters for EMC, a type of electra-magnetic mind control that is being broadcast to modify the thinking of Americans, and to control slaves.

Bristol, Eng.

— Burden Neurological Institute.

The CIA empire

— The CIA’s empire carries out mind control of its assets in many locations. CIA HO, nicknamed “the campus”, is a Langley, VA. It might be pertinent to point out a few of their organizations that are active in mind control. Staff D, has a CIA assassination group, referred to at one time as ZR/RIFLE. Their Central Cover Staff (fka Operational Services Division) manages mind-control agents. The Office of Scientific & Weapons Research has carried out some of the mind-control research.

You will find mind-control regularly carried out within what has been called the Directorate for Research, the Directorate of Science & Technology (fka DDR), and the Directorate of Operations (fka DDP Dir. of Plans until ’73) which ran the TSD later known as the Office of Technical Services, and their CI Staff (Counterintelligence Staff a part of the Dir. of Ops.). The CIAoperates a vast array of research & operational programming centers CIA assets:

Programmed slaves are fanned Out into CIA organizations such as:

Air Asia,

Air Ethiopia,

American Newspaper Guild,

Communications Workers of America (CWA),

International Catholic Youth Federation,

The International Confederation of Free Trade Unions (ICFTU),

International Federation of Journalists (with HQ in Brussels),

the International Police Academy (in Wash. D.C.) & the National Students Assoc. (NSA- with HO in Washington D.C.).

Other known CIA fronts have included:

Allied Pacific Printing in Bombay, India

Asia Research Centre in Hong Kong

Gibraltar Steamship Company

Programmed multiples also are injected into everywhere else too. They work at spying, drug mulling, assassination, and supplying the CIAleadership with sexual slaves.

Camp Bullis [sp.?], TX Dallas, Doctor’s Hospital

— An important major programming center, this is located at Garland Rd. at Buckner Blvd. Ph. 2 14-324-6 100. This hospital has a psych wing to it. Baylor Univ. Med Center, 3504 Swiss Ave. in Dallas is also involved in mind-control programming, as well as the Texas Women’s Univ., 1810 Inwood Rd. (214-689-6500), Dallas.

Deep Creek Cabins, just west of Ft. Detrick, MD.

— These cabins located in the general area of the Magothy River, are a series of cabins surrounded by water & used for sexual programming & sexual training by the intelligence agencies. The area was reported by one slave to have been labelled Subproject #74.

El Reno, OK

–Federal Correctional Institution used for implant and electronic mind-control. Inmates were subjected to this type of mind-control as experimental fodder.

Esalen Institute, Big Sur, CA.

— Esalen is the Tavistock of America. They give workshops on hypnosis, biofeedback, Witchcraft (for instance, their Rituals of Transformation class). Instructors include:

witch Margo Adler

Cranio-sacral D.O. Jim Asher

psychologist Adam Burke who specializes in trance training

Patti Lawrence (who does cranial work)

Caroline Muir (a tantric sex yoga expert)

Robert Swanson (a Dolphin expert)

Charles Tart (a expert w/ altered states of consciousness)

Karen Turner (a witch psychologist)

Anna Wise who is skilled in using EEGs to measure & train brain waves

These are only a few of the many occult or interesting instructors that the Esalen Institute has.

Ft. Drum, NY (Camp Drum)

–near Watertown, NY. This military reservation is used for training troops in winter fighting, as well as having been used for a remote mind-control programming facility in northern NY.

Ft. George Meade, MD, National Security Agency (NSA)

— It’s interesting that in Sidney Sheldon’s novel The Doomsday Conspiracy published by Time-Warner in 1991 that the author/researcher Sheldon has NSA commander Robert Bellamy thinking to himself as he enters Ft. Meade,

“My God, I’m in the land of Oz.” (p.13)

After being given his assignment, he wonders (on pp. 20-21) “I feel like the White Queen in Through the Looking Glass. Why sometimes I’ve believed as many as six impossible things before breakfast.”

“Well, this was all six of them.”

One of the projects that the NSA run with mind-controlled slaves is Project Mirror (Op. # 6317-ABL-4) which consists of about 30 programmed assassins, who are debriefed after their assassination mission and then killed and cremated. The NSA has had two RNM computerized systems for tracking people by monitoring their evoked emissions, and for transmitting thoughts (as well as audio and visual messages) to people’s brains. NSA Cryptologists have gotten computers programmed to decode what a person’s state of mind & thoughts are when their brain emissions are picked up from a distance. Other groups which conduct mind control which work closely with the NSA would include for instance:

Air Force Space Command/NORAD

Unified Command ELINT Centers

Space Surveillance

The NSA’s “Human Sources” of intelligence are often subjected to mind-control. The Air Force has run a Texas facility called TRIMS, which has exhibition rooms for slaves, which has been used for mind-control programming.

Ft. Polk, LA

–The Delta Forces are stationed here, and are programmed and trained here. MJTF (Multi-jurisdictional Task Force) troops, the BATF & other federal agencies train in kicking in civilian doors & martial law type tactics. Ft. Bragg is HO for the mind-controlled Delta Force. Ft. Bragg is a major satanic center in the military.

Kanoehe State Hospital, Oahu, HA

–This hospital connects with the Naval Base and Naval intelligence. It has been used for programming slaves, as well as Tripler VA Hospital on Oahu island. Kunia, HA is the site of an NSA listening post. Kaneohe, HA also has an underground installation, which is used at least in part by the U.S. Pacific Fleet. Naval intelligence in Hawaii has been involved in mind-control.

Kirtland AFB, NM, Sandia National Lab

–the Sandia Labs have been used for mind control. The one in NM is at Kirtland AFB 87117 (505-845-8692). It has bunkers that have been used for mind-control. The one in Hawaii is at Hanapepe on the Garden Island of Kauai (808-335-5611). Sandia Labs also has a presence in Aibuquerque, NM. Sandia Labs has worked on such secret projects such as the W-88 nuclear warhead which was mounted on the Trident II missiles carried by Ohio-class subs. Mind-controlled slaves help keep Sandia Lab’s research secret.

Lexington, Kentucky

— On the west side of Lexington is the Lexington airport and next to the airport is a castle that is just south of highway 60 and across from Keeneland Race Course. This castle’s original owner is dead. A CIA operative owned it for a while and then it went into receivership. Then the Federal government got the property (a 100 yr. lease). The castle was a major mind-control programming center, as well as a narcotics depot & a money laundering base.

Tunnels existed. The castle is believed to no longer be in use for mind-control, although that is not known for sure. This Lexington, KT programming center within the castle was well situated to connect with a U.S. Veterans Hosp. on the NW side of Lexington, a nearby Fed. Correctional Institute (near Brackton), radio towers are all over the area, and the Kentucky State Horse Park with racetracks all built after 1965 is nearby. Scott Gen. Hosp. and an Orphan School at Midway, and the catholic St. Francis Mission are also in the vicinity.

Los Alamos, NM

–A site for research into nonlethal weapons, such as syntel for mind-control. The T-13 Complex Studies Group has been researching artificial-life.

Maine

–The CIA used an International Children’s Summer camp for MK Ultra mind-control. This summer camp was probably not related to the International Children’s School at South Burlington, VT which also has summer school. There is also an International Children’s School tied to the UN in New York, it is not known whether it ties in or not.

New Orleans, LA

–Some of the hotels and restaurants are being used for mind-control. This author suspects (but has no proof) the Ursuline Academy (a Ursuline Convent school) on State St., Bacco Italian restaurant (a relatively new expensive restaurant named after the roman god Baccus and which has had lots of money put into it, and excellent food located in the Hotel de la Poste, French quarter), and the avant-garde Pelican Club (in the heart of the French quarter) tie in with the Network. Upper Bourbon Street is a gay community, and Bourbon St. was originally a voodoo center. Just off of Bourbon St. is the New Orleans Historic Voodoo Museum. This is the only voodoo museum in the world, and it has voodoo dolls and readings available for visitors.

Oswego, NY

–Served as a programming site on Lake Ontario.

The Presideo of Monterey, CA

–This place is not to be confused with the Presideo of San Francisco. This Presideo has the Monterey Defense Language Institute (DLI). Slaves who have scarred brain stems are sent here to develop language skills.

Princeton, NJ–

Salt Lake City, UT

–St. Mark’s Hospital, 1011 Sunberry Dr., Salt Lake City (801-268-7422) has been used for programming.

Stockholm, Sweden

–Soder Hospital has been involved in implants. Dr. Curt Strand & others, & the Swedish Police SAPO were involved in implanting unsuspecting victims.

Pelican Bay Prison, (WI?)

–Isolation Tank Programming was what made this prison famous.

Utah State Prison (Gunnison Facility & Draper Prison) and Utah State Hospital, Univ. of Utah Med. Center

— inflicted directed energy rape of the inmates, pressure chamber sensations in the inner ear, voices and all types of electronic control. The med center was used to implant various types of implants into people. Prison psychiatric staff participated with the mind-control. They routinely used a variety of well-planned tactics to falsely label inmates as psychiatric cases so that they could force-medicate them and then subject them to mind-control. Inmates were subjected to round the clock brainwashing rhetoric for months on end, after they got the implants.

These Utah institutions began cooperating with the secret implant mind-control experimentation in the 1980’s. When inmates complained of the mind-control they were forced medicated. Hundreds made complaints about the mind-control but the system was able to shut them up. The controllers running the implants had the voices being beamed coming from places like the planet “Astra.” Several inmates got the Astra script.

Vancouver, B.C.

–Hollywood Hospital was used for LSD programming for years.

Vermont

–A remote mountain site is used for programming. Victims are helicoptered in.

Veterans Administration Hospitals, Medical Centers and Clinics

— All of these have been used for mind-control. These hospitals are located in:

Baltimore, MD

Battlecreek, MI

Bedford, MA

Birmingham, AL

Brockton, MA

Buffalo, NY

Butler, PA

Canandaigua, NY

Columbia, MO

Clarksburg, WV

Des Moines, IA

Fayetteville, AK

Fresno, CA

Huntington, WV

Hines, IL

Jackson, MS

Kerrville, TX

Knoxville, IA

Lincoln, NE

North Chicago, IL

Northport, NY

Prescott, AZ

Providence, RI

St. Miami, FL

St. Temple, TX

Salibury, NC

Salem, NC

This list is not comprehensive as some have been closed and this is a list of active ones.

Washington, D.C.

–The secret NOD underground installation which is connected to the intelligence groups like NSA and the CIA as well as many other nefarious groups lays under the White House with tunnels connecting this NOD installation with the House of the Temple. The Supreme council of the 33° of the Scottish Rite’s House of the Temple has a 14’ x 25’ room in it with 13 chairs where the Illuminati’s Grand Druid Council meet.

The NOD Deep Underground Installation has numerous levels to it. One eyewitness, went to level 17 (via an elevator) and stated that he believes that deeper levels exist. The NOD installation is involved with psychic (demonic) and satellite control over slaves. This underground complex is to allow the government of the United States to escape a nuclear attack. The enormous complex radiates under Wash. D.C. and connects with many other sites. The tunnel system is used to move some of the mind-control sex slaves. The walls and ceilings of the tunnels are ceramic tile with fluorescent lighting recessed into the ceilings.

Go Back

DEEP UNDERGROUND

MILITARY BASES

(DUMB BASES)

In the U.S., approximately 140 of these DUMB bases exist, and they employ perhaps over 200,000 people.

A geologist friend of this author who helped build these DUMB bases, gave his life to get the truth out to the American people. He was a programmed multiple of the Illuminati, and some of his alters knew it.

Because these underground bases play such a vital role in the entire mind-control NETWORK, I will list these bases here, even though they have been given previously in – my Ezek. 6:3 book, DUMB (Deep Underground Military Bases)

SELECTED TOP SECRET UNDERGROUND INSTALLATIONS

…THAT THREATEN OUR LIBERTY

140 secret underground facilities have been built, many are underground small-cities.

A number of these bases have been described to me by witnesses including NORAD, Dulce, Coos Bay, and Dreamland. What I am describing is a series of large underground facilities which are connected with tunnels. The tunnels carry extremely fast trains. Train terminals are up to 1 million sq. ft. in area, with multiple levels.

Underground facilities contain computer centers, genetic experimentation, mind-control research, housing for several nationalities of humans and several varieties of aliens.

The corporations which assist the NWO are able to quietly interlink their facilities via the tunnel system too, as well as disperse some of their workers into the world above ground.

There are approx. 50 ways tunnels and underground facilities are dug, which include high pressure continuous water let, low pressure percussive water jet, high freq. electrical drill, turbine drills, pellet drills, spark drills, explosives, hydraulic rock hammers, lasers, electron beam guns, forced flames, etc.

These various tunnelling methods can be broken down in:

Mechanical (such as a water canon)

Thermal (such as a high velocity flame, laser, atomic fusion, etc)

Chemical (such as a dissolver)

The beautiful thing about nuclear subterrenes(rhymes with submarine) is that they don’t leave any debris to dispose of.

These nuclear subterrenes are building tunnels 40’ in diameter, and as these machines work the rock is melted into a hard, glassy tunnel lining. Air-intake shafts bring fresh air to the tunnels and underground facilities.

Underground facilities have fuel storage units, air-conditioning, water reservoirs, dining, medical, sleeping and storage units. Many of the underground sites are close to railroads and have entrances that trucks can drive into. Some of the entrances for trucks are protected by holograms that look like the side of a mountain, but allow vehicles if one just drives through them.

The other style of hidden entrances are buildings where trucks drive in and are lowered via access shafts down into the underground areas. Security for some (such as Groom Lake) of the facilities is maintained by Wackenhut.

Penetration tests on facilities are carried out by a special unit called OP-06-D which are HQed at Off utt AFB, NE.

Format is as follows:

site name

site location (warning: longitudes & latitudes were quick off of the head estimates)

group/groups in control

size

activity

ARIZONA

· 1. Fort Huachuca. 31°50’ N 1100 19’48″ W, saucer base below, intelligence training above, mind-control incl. too.
· 2. Gates Pass Base
· 3. Gila Mountain Area, south of Interstate 8 and approx. 30 east of Yuma, AZ. 290 N 116ºW. DUM base.
· 4. Grand Wash Cliffs, on western edge of the cliffs at the head of Grapevine Wash. Must be reach via hwy 93 and then unpaved roads. DUM base.
· 5. Green Valley
· 6. Hualapai Mountains, east side of the mountain range, about 35 mi. SE of Kingman, AZ
· 7. Rincon Mtn., north side of Rincon Mtn
· 8. Mt. Lemmon
· 9. Page
· 10. Safford, near Safford
· 11. Santa Catalina Mountains – base

ARKANSAS

· 12. In the vicinity of Hardy and Cherokee Village. 360 19’ N 9°29’W W. Installation purpose not known.
· 13. Pine Bluff, Ark. area. 34° 13.4’ N 92º01.0’W to 34º30’ N 92° 30’W. saucer base.

CALIFORNIA

· 14. 29 Palms Marine Base, Identified on military map as airspace area R-2501 N. Saucer base southeast of Ludlow. This is a U.S. alien research/ diagnostic facility and UFO base.
· 15. China Lake, mind control and weapons research
· 16. Darwin, CA, 4 miles dues west of Darwin
· 17. Deep Springs, CA, 37°22’ N 117º 59.3’ W. saucer base
· 18. Fort Irwin, CA, 35°20’N 116°8’W W. saucer base
· 19. Edwards Air Force Base, in the area where Diamond Cr. & the so. fork of the Yuba meet, there are 3 underground UFO bases. 34°8’ N 117° 48’ W
· 20. George Air Force Base, CA – saucer base
· 21. Helendale, Lockhead Underground Facility, 34º44.7’ N 1170 18.5’ W. Technology for secret projects. There are 3 saucer bases here.
· 22. Los Angeles, On Hwy 14 towards Edwards A.F.B. after Palmdale, one turns off and after taking several streets to 170th street, north on 170th St. to the Rosamond-170th intersection, the second and lower and better maintained dirt road will take you west, and if you take a right going north at the power lines and up to the hilltop you will see the top of an underground NORTHOP facility; Technology for the elite’s secret projects. This area was very active in the 1970s. Northrop’s facility is near the Tehachapi Mtns. It has been reported
to go down 42 levels. It is heavily involved with electronics and hi-tech aerospace research.
· 23. Mt. Shasta
· 24. Kern River, CA the hollowed out mountain next to the hydroelectric facility at the Kern River Project near Bakersfield- reported saucer base
· 25. Napa Valley- located at Oakville Grade north of Napa, CA. Tunnels also connect the wineries north of Napa, used for white slavery and mind-control. Has a saucer base.
· 26. Norton Air Force Base- saucer base
· 27. Quincy, CA, 39° 56.2’ N 120° 56.5’ W. saucer base
· 28. Near Palmdale (if one takes Palmdale Blvd. til 240th St. and goes to Ave R-8. One the eastern limit of Ave. R-8 is McDonnell-Douglas’s facility called the Uano Facility. One can see it better from the Three Sisters Hills to the south of the facility. Strange shaped disks raise out of the ground on pylons. These attached disks glow and change color. It is involved in hi-tech aerospace technology.
· 29. Presidio, CA – A FEMA/DOD site for Region IX’s regional office
· 30. San Bernardino, CO, 34º 50’ N to 34° 16’ N
· 31. Santa Barbara County – placed in the thick diatomite strata
· 32. Santa Rosa, 38º 26.4’ N 122º 42.9’ W, FEMA, Regional center for west coast, what FEMA is doing is mostly kept secret. This is listed as a Communications Antenna Field, but is doing much more.
· 33. Sierra Nevada Mountains, CA – very deep military base
· 34. Tehachapi Ranch- 4 saucer bases, Tecachapi Canyon has a new underground base which was finished in Sept. ’95. This is the “Unholy 6” base of the Orions. 35° 20’ 118° 40’
· 35. Trona, CA, 35° 45.5’ N 1 77º22.6’ W –several miles northwest of Trona, directly under Argus Peak. This DUM sits on China Lake’s NWC’s land, and may have been built in the ’60s.

COLORADO

· 36. Alamosa, 37° 28.1’ N 105°52.2’W W- reported saucer base
· 37. Book Cliffs, CO, 39° 40’ N 108º 0’ W near Rifle, CO
· 38. Boulder, CO–The headquarters for EMC, a type of electra-magnetic mind control that is being broadcast to modify the thinking of Americans, and to control slaves.
· 39. Colorado Springs, NORAD –Canada & U.S., & FEMA, hundreds of people on staff, contains at least 4.5 cubic miles of underground caverns and 45 underground steel buildings.
Many underground chambers are as large as 50, x 100 ’. This complex tracks thousands of satellites, missiles, submarines, and UFOs. NORAD also controls many Monarch slaves who have ALEX, JANUS, ALEXUS endtime callback programming. NORAD installation has 1278 miles of road underground.
· 40. Fort Collins- base for Gray aliens
· 41. Grand Mesa- Orion saucer base
· 42. Montrore Co.–north of Paradox, in Paradox Valley. The site in Paradox Valley can be reached via Hwy. 90 via Nucla.

CONNECTICUT

· 43. North west Connecticut

FLORIDA

· 44. Massive base- reported saucer base
· 45. Eglin AFB, 30º 40’ N 86° 50’ W- Orion saucer base since 1978

GEORGIA

· 46. Atlanta, GA –FEMA regional center, which is appropriately placed since Atlanta is to become a capital within the NWO redrawing of boundaries. Atlanta is believed to have several underground installations in its area, one to the north at Kennesaw Mtn., Marietta, GA connected to Dobbins AFB and one to the south of Atlanta at Forest Park.
· 47. Thomasville, 30° 50.2’ N 83°58.9’ W, FEMA, regional center, they train groups in Search and Destroy missions for when Martial Law is imposed. This is SW Georgia in area of tunnels.

IDAHO

· 48. Lower Goose Lake area in the general area of Oakley, ID.–Wackenhut of the Illuminati run a “model prison” for the NWO. The worst of the federal prisoners are placed in this underground prison which has 7,100 cells which are filled with about 2,700 federal inmates. A track runs through the middle of the eerie underground facility. Food and showers are on the tracks, and the men are allowed showers once a week. The minimum of lighting is used and the men are beaten senseless if they talk at all. It sits 500’ underground.
· 49. South central Idaho–under the Snake River lava flows between Twin Falls and Idaho Falls.

INDIANA

· 50. Bedford & Lawrence Co. area–continued activity in large old mines indicates a possible government use of the large old quarries.

KANSAS

· 51. Atchison, KS–the DIPEF underground facility, which the govt. would run in an emergency. AT & T maintains an underground facility at Fairview, KS.
· 52. Kinsley–an underground UFO base

MARYLAND

· 53. Camp David–just north of the camp is an underground facility important to the intelligence agencies.
· 54. below Ft. Meade, of the National Security Agency, 10 acres of the most sophisticated supercomputers that can be built, very large complex, massive surveillance of all the world’s communications, including all transmissions in the U.S. & world of telephones, telegraph, telex, fax, radio, TV and microwave transmissions.
· 55. Olney, actually the facility is between Olney and Laytonsville, on Riggs Rd. off of Rt. 108. Another underground facility may also exist in the area, FEMA & possibly NSA, the facility may be 10 levels deep, purpose unknown.
· 56. Suitland, MD- Classified archives of U.S. Govt. stored here in underground levels. Vaults have extensive amounts of documents which are not indexed. Restricted access with a coded security card. High level intelligence groups operate in the area also.

MASSACHUSETTS

· 57. Maynard, 42° 26.0’ N 71° 27.0’ W FEMA, regional center, Wackenhut is here too.

MICHIGAN

· 58. Battle Creek, 42° 19.3’ N 85° 10.9’ W FEMA, regional center, activity secret (not validated)
· 59. Gwinn, Ml, 46° 16.8’N 87° 26.5’ W, near Gwinn is a large underground base which is a key base for sending signals. An AFB is also nearby. Under Lake Superior is an alien base
with roads 5,000’ deep.

MISSOURI

· 60. 12 miles south of Lebanon, 36° 02.8’ N 115° 24.3’ W, near the newly created town of Twin Bridges-reported saucer base
· 61. In the Bat/Dry/Dead Man/ Howell cluster of caves- reported saucer base
· 62. St. Francis Mountains, MO (between St. Louis & New Madrid)

NEBRASKA

· 63. North-central Nebraska
· 64. Red Willow Co. near McCook, NE

NEVADA

· 65. Blue Diamond, 36° 02.8’N 115°24.3 W -reported saucer base
· 66-68. Groom Lake, also known as Dreamland, Area 51, The Area, the Spot, Red Square, Sally Corridor, Watertown Strip. 1150 50’N 37°20W. Run by the NWO along with demonic beings, the CIA is there andWackenhut Security. Two large underground facilities close to but separate from Groom Lake but controlled by the demonic beings are Papoose Range and Cockeyed Ridge (S-4) underground bases. Purpose is the testing of various UFOs and other secret aircraft like the Aurora and Stealth. Also biological work is done, including the biological raising of small greys. Many levels have been built at these three complexes, and a 7 mile long run way (which is actually 39 miles) has been built over Groom Lake, a dry lake. There is an S-2, an S-4, an S-6, and an S-66 underground installations. S-66 is the most secret and it has 29 levels and is 11, 300’ deep.
· 69. Quartzite Mountain SE of Tonopah, 37° 31 ’N 116° 20’ W- reported saucer base
· 70. Tonopah, Airforce, CIA? & ??, deals with secret aircraft

NEW HAMPSHIRE

· 71-73. There may be as many as three underground installations in New Hampshire’s hills (according to reports).

NEW JERSEY

· 74. Picatinny Arsenal, 4o° 38’N 74° 32’ W- saucer base, 1/4 cubic mile large & very deep underground.

NEW MEXICO

The state of New Mexico and Colorado have been used for the construction of a series of underground bases. (All the rest of the states have too.) The Primary Underground facilities in New Mexico consist of:

· 3 enormous underground bases inthe Dulce, NM area (an area I spent several days investigating in 1993)
· the White Sands–Alamogordo Area which has 3 underground bases
· Datil and Pie Town which have two more underground bases. (Carlsbad Cavern which had underground activity, which is reported discontinued, and another base to east of Carlsbad.)

· the Los Alamos area underground facility
· the Taos area underground facility

The New Mexico area has basically four underground system out. One goes to the 4-corners area and then to Groom Lake (Area 51). One goes north toward Delta, CO and Colorado Springs. The Taos facilities goes north approximately along Interstate 25 and eventually ties in NORAD. The southern bases connect to Texas and Mexico. The Los Alamos facility dates at least back to 1940. One can only imagine what has been built with 1/2 century of labor on this underground system. Visitors to the deeper levels report humans kept in glass cylinders, plus many other strange things. I have had the opportunity to debrief some people who have been in the lower reaches of some of these facilities. There are special badges, special uniforms, tube elevators etc. which for lack of time I will not describe.

· 75. Angel Peak- reported saucer base
· Carlsbad Cavern area (now destroyed), 32° 25.0’N 1040 14.0W -old relics of saucer base left
· 76-78. Dulce, N.M., 36º 56.0’N 106°59.8’W,–South of Dulce, in the area of the Jicarilla Indian Reservation, another facility is east of the Dulce facility a number of miles. This is run directly by Illuminati w/ Army and Airforce help, CIA also conduct experiments at the center; the size of the installation is hugh requiring small shuttle trains and has seven levels according to witnesses. Serves as a UFO base, biological experiments, production center for small-grey drones. Wackenhut provides some of the security on the ground.
· 79. Kirtland AFB, NM, Sandia National Lab
· 80. Manzano Mtn, near Albuquerque, known as the Kirtland Munitions Storage Complex, Airforce, 3,000-acre base within the Kirtland AFB/Sandia National Labs complex, guarded by 4 lethal rings of fences, use unknown, suspected UFO base. A new 285,000-sq. ft. bunker is being built near Manzano Base.
· 81. Pie Town, 34° 17.9’N 1 108°08.7’W, in area near Pie Town, UFO Base.
· 82. Sandia Mountains NE of Albuquerque -reported saucer base
· 83. to the north of Taos Pueblo
· 84. White Sands, 32°22.8’N 106°28.8’W, major hub for research, tied in with Dulce & NORAD, HO for NASA /military shuttle flights, radiation research ctr. and mind control.

NEW YORK

· 85. Adirondack Mountains (near Elizabethtown)
· 86. New York Metro area
· 87. Plattsburgh (near Canada and St. Albans) AFB, 49°40’N 73°33 W- two saucer bases in this area.

OKLAHOMA

· 88. Ada, 34°46.4’ N 96°40.7W W, underground saucer base, this base does human cloning, and it is FEMA’s most sensitive base.
· 89. Ashland Naval Ammunition Depot, 34°45.9’N 96° 04.3’W,- reported saucer base

OREGON

· 90. Bull Run, north side of Bull Run Reservoir area near Mt. Hood, and very close to Larch Mtn. and south of Benson St. Park of the Columbia Gorge.
· 91. Coos Bay area has had three separate but coordinating underground facilities built for UFOs. The facility farthest east, about 20 miles inland in the wilderness near Hwy 42, has been shut down. It is now an old abandoned facility well camouflaged. The coast facility is probably still operational.
· 92. Klamath Falls, OR–since Sept. ’95 this has been a base for a number of NWO groups incl. the Air National Guard, FEMA, CIA, FBI, Spetznaz, and MOSAP training base. An underground concentration camp exists here.

PENNSYLVANIA

· 93. Blue Ridge Summit, near Ft. Ritchie, known as ’Raven Rock” or “Site R”, Army, major electronic nerve center, 650 ft. below surface with about 350 staff and over a 716 acre area. possibly connected via tunnel to Camp David. The NOD installation is involved with psychic (demonic) and satellite control over slaves. This underground complex is to allow the government of the United States to escape a nuclear attack. The enormous complex radiates under Wash. D.C. and connects with many other sites. The tunnel system is used to move some of the mind-control sex slaves. The walls and ceilings of the tunnels are ceramic tile with fluorescent lighting recessed into the ceilings.

TEXAS

· 94. Ft. Hood, TX, 31° 15’N 97° 48’ W, home of some Delta Mind-Controlled soldiers and a reported saucer base.
· 95. Denton, TX, 33° 13.2’N 97° 08.2’W – FEMA, regional center, activity secret
· 96. Red River Arsenal, TX- reported saucer base

UTAH

In Utah, the Kennecott Copper Company has been connected to the Illuminati and the KKK. These connections have been exposed in other writings by this author. Kennecott’s mine (reported to be owned by the World Bank) in the Salt Lake City area is serviced by Union Pacific, which is reported connected to the Mormon Church.

The mine is receiving a heavy volume of big trucks after 11 p.m., for instance, in a normal night over 6 dozen large trucks with 2 trailors each rolling into the mine. In other words, it appears that the heavy train & tractor trailor activity indicates something besides mining.

VIRGINIA

· 97. Bluemont, Mount Weather base, Federal Preparedness Agency & FEMA, small-city underground, top-secret, staff of several hundred, does secret work for FEMA and contains a complete secret government with the various agencies and cabinet-level ranking administrators that keep their positions for several administrations and help run the United States.
· 98. Culpepper, 380 28.5 N 77°59.8’W, about 2 miles east of Culpepper off of Rt. 3, called Mount Pony, Illuminati–Fed. reserve, 140,000 sq. ft., includes a facility for the storage for corpses, monitors all major financial transactions in the U.S. by means of the “Fed Wire”, a modern electronic system.
· 99. Pentagon, Arlington, VA-
· 100. Warrington Training Ctr. –two sites one on Rt. 802 and the other on Bear Wallow Road, on Viewtree Mountain. One is Station A the other Station B. Army & ??, purpose unknown

WASHINGTON

· 101. Bothell, 47°45.7’N 122°12.2w W, FEMA, regional center, activity unknown

WASHINGTON, D.C.

· 102. WHITE HOUSE, 38°53.5’N 77°02.0’W–The secret NOD underground installation which is connected to the intelligence groups like NSA and the CIA as well as many other nefarious groups lays under the White House with tunnels connecting this NOD installation with the House of the Temple. The Supreme council of the 33° of the Scottish Rite’s House of the Temple has a 14’ x 25’ room in it with 13 chairs where the Illuminati’s Grand Druid Council meet. The NOD Deep Underground Installation has numerous levels to it. One eye-
witness, went to level 17 (via an elevator) and stated that he believes that deeper levels exist.

WEST VIRGINIA

· 103. Sugar Grove, the Navy’s Strategic Intelligence Services microwave communications. There base here.
· 104. White Sulphur Springs, under the Greenbriar Hotel, a mini-city large enough for 800 people equipped with its own crematorium, if there are any other purposes other than listening to U.S. microwave communication it is unknown by this author.

2018-11-15-10-11-421497131960.png

Some more MAJOR MIND-CONTROL PROGRAMMING SITES

…with explanations of their programming

This list is added as a supplement to those sites exposed in the Vol. 2 book.

Slaves have to come in to the “SHOP” periodically to have certain maintenance programs renewed to maintain the power of the programming. Most slaves that are being used in operations come in at a minimum every 2-3 years. Most people who have been programmed aresleepers. And many people who have horrible programs to carry out are programmed for the next few years.

All kinds of sites are used, for instance,

Boy and Girl Scout camps

a big church in Greensboro, NC

a desert site near Tucson, AZ

hotels in New Orleans

Many people who have been “recruited” (beguiled and trapped) into the mind-control are seen being sent to Colorado Springs, CO.

A network of daycare centers has been established worldwide by the Illuminati’s Network for the programming and recruiting of children. A series of Youth Hostels has also been created (originally by the communists) for Network goals, and have been widely used by the communist faction of the World Order.

The elite have their own schools, such as Eaton School in the UK which receives some Illuminati children under mind-control. Watch the Office of Global Analysis, which is an intelligence group for global analysis for the NWO. Also watch out for the National Program Office(NPO) which is reported to have been created in 1982 to oversee “black” programs of the intelligence agencies. The National Reconnaissance Office(NRO) is another black ops group.

This group is in part housed within the Pentagon and deals with assassination teams. It uses lots of illegal funds which it launders through another Pentagon agency called the DSAA (Defense Security Assistance Agency). Gen.Howard Fish, Mr. Eric Von Marbod, Gen.Phil Gast were the men in DSAA that laundered the NRO’s money. I, Irving Davidson, who has one foot in the mafia & one in the military black ops is a go-between. One of the assassination programs they ran years ago was the Zeta Diogenes (ZD) project.

Different agencies that participated had different codes for the programs. The men used in these NRO programs are mind-controlled slaves in some cases, it is not known what % if any are not under mind-control. They are organized as cells and are operating in various military, national guard, and secret reserve units.

Present-day Russia’s Guards Directorate has two “counter-terrorist” divisions Alfa and Vympel. These were formerly part of the KGB, and employ mind-controlled victims in their work. OP-06-D is the unit assigned to perform penetration tests to determine security at these different military/intelligence bases used for programming.

Air Force Units to watch:

· Aerospace Defense Intelligence Center ADIC
· Air Force Intelligence Support Agency AFISA (recent name) of the Air Force’s all sources intelligence organization
· Kelly AFB has the 693rd Intelligence Wing located there
· ERT (Air Force Swat Teams)

Army Units to watch:

· Pentagon
· Military Intelligence which calls itself INSCOM. INSCOM units are all over the world incl.

· Area 51, White Sands, Ft. Meade, and their Vint Hills Farm Station at Warrenton, VA near the old Manassas battlefield sites. Their Ft. Huachucha in AZ appropriately sports a Sphinx statue.

So many intelligence people came fromthe Illuminati initiating centers of Harvard, Yale, & Princeton that the acronym HYP was applied to some of them by others in an allusion to the word “hype.”

For the first half of MI-6’s history, only women from the elite, the aristocracy were recruited to work in MI-6, for this reason the women at MI-6 were called Queenie.

As Illuminati members of the hierarchy, they were indeed given various Queen positions. The crossovers occur both ways.

One finds intelligence people in places like Yale and the big Illuminati corporations. For instance, a military psychologist Alexander R. Askenasy, who worked in the area of mind-control for the Army, later taught at Princeton, and then went on to a prominent position at the NY State Psychiatric Institute & the Dept. of Psychiatry, Columbia Univ.

Another example is Robert Finley Delaney, who worked with the Navy in PSYOPS, the State Dept. and also worked for ESSO Standard Oil company.

One final example in a list of examples that seems to go on forever, the Professor of Psychology at Yale was Irving L. Janis, a military man who worked in military psychological research and PYSOPS, and who co-authoredCommunications and Persuasion, Personality and Persuasibility.

Contents

Dictionary of Programming Centers

Deep Underground Military Bases (DUMB Bases)

Return to Mind Control

DICTIONARY OF PROGRAMMING CENTERS

(cont. from Vol. 2)

ARCO (Atlantic Richfield Co.)

–This company continually keeps popping up during investigations/research on Mind-control. John Coleman in report The Tavistock Institute states that several men on ARCO’s Board of Directors were trained by Tavistock incl. Jack Conway, Philip Hawley, and Dr. Joel Fort.

Alice Springs, Australia

–is home of USAF Detachment 421 involved with intelligence

Amarillo, TX

— near Amarillo is a major underground programming center called “the Station.” Inside Amarillo are other collaborating sites such as an ophthalmologist’s office.

Armed Forces Medical Intelligence Center (AFMIC)

— This center uses mind-controlled slaves, incl. those who are members of the Green Berets.

Austin, TX

— The Rebecca Baines Johnson Convalescent Home, at 21 Waller St., Austin, ph. no. 512-476-6051, has had a Cray-3 computer (with at least a 1,000 megaflop capability) secretly placed into the Johnson Convalescent home for the purpose of secretly being a command post for sending control signals to people who have body suits of implants. Signals from here radiate to many far off places to control victims of implant mind-control.

Boulder, CO

— The headquarters for EMC, a type of electra-magnetic mind control that is being broadcast to modify the thinking of Americans, and to control slaves.

Bristol, Eng.

— Burden Neurological Institute.

The CIA empire

— The CIA’s empire carries out mind control of its assets in many locations. CIA HO, nicknamed “the campus”, is a Langley, VA. It might be pertinent to point out a few of their organizations that are active in mind control. Staff D, has a CIA assassination group, referred to at one time as ZR/RIFLE. Their Central Cover Staff (fka Operational Services Division) manages mind-control agents. The Office of Scientific & Weapons Research has carried out some of the mind-control research.

You will find mind-control regularly carried out within what has been called the Directorate for Research, the Directorate of Science & Technology (fka DDR), and the Directorate of Operations (fka DDP Dir. of Plans until ’73) which ran the TSD later known as the Office of Technical Services, and their CI Staff (Counterintelligence Staff a part of the Dir. of Ops.). The CIAoperates a vast array of research & operational programming centers CIA assets:

Programmed slaves are fanned Out into CIA organizations such as:

Air Asia,

Air Ethiopia,

American Newspaper Guild,

Communications Workers of America (CWA),

International Catholic Youth Federation,

The International Confederation of Free Trade Unions (ICFTU),

International Federation of Journalists (with HQ in Brussels),

the International Police Academy (in Wash. D.C.) & the National Students Assoc. (NSA- with HO in Washington D.C.).

Other known CIA fronts have included:

Allied Pacific Printing in Bombay, India

Asia Research Centre in Hong Kong

Gibraltar Steamship Company

Programmed multiples also are injected into everywhere else too. They work at spying, drug mulling, assassination, and supplying the CIAleadership with sexual slaves.

Camp Bullis [sp.?], TX Dallas, Doctor’s Hospital

— An important major programming center, this is located at Garland Rd. at Buckner Blvd. Ph. 2 14-324-6 100. This hospital has a psych wing to it. Baylor Univ. Med Center, 3504 Swiss Ave. in Dallas is also involved in mind-control programming, as well as the Texas Women’s Univ., 1810 Inwood Rd. (214-689-6500), Dallas.

Deep Creek Cabins, just west of Ft. Detrick, MD.

— These cabins located in the general area of the Magothy River, are a series of cabins surrounded by water & used for sexual programming & sexual training by the intelligence agencies. The area was reported by one slave to have been labelled Subproject #74.

El Reno, OK

–Federal Correctional Institution used for implant and electronic mind-control. Inmates were subjected to this type of mind-control as experimental fodder.

Esalen Institute, Big Sur, CA.

— Esalen is the Tavistock of America. They give workshops on hypnosis, biofeedback, Witchcraft (for instance, their Rituals of Transformation class). Instructors include:

witch Margo Adler

Cranio-sacral D.O. Jim Asher

psychologist Adam Burke who specializes in trance training

Patti Lawrence (who does cranial work)

Caroline Muir (a tantric sex yoga expert)

Robert Swanson (a Dolphin expert)

Charles Tart (a expert w/ altered states of consciousness)

Karen Turner (a witch psychologist)

Anna Wise who is skilled in using EEGs to measure & train brain waves

These are only a few of the many occult or interesting instructors that the Esalen Institute has.

Ft. Drum, NY (Camp Drum)

–near Watertown, NY. This military reservation is used for training troops in winter fighting, as well as having been used for a remote mind-control programming facility in northern NY.

Ft. George Meade, MD, National Security Agency (NSA)

— It’s interesting that in Sidney Sheldon’s novel The Doomsday Conspiracy published by Time-Warner in 1991 that the author/researcher Sheldon has NSA commander Robert Bellamy thinking to himself as he enters Ft. Meade,

“My God, I’m in the land of Oz.” (p.13)

After being given his assignment, he wonders (on pp. 20-21) “I feel like the White Queen in Through the Looking Glass. Why sometimes I’ve believed as many as six impossible things before breakfast.”

“Well, this was all six of them.”

One of the projects that the NSA run with mind-controlled slaves is Project Mirror (Op. # 6317-ABL-4) which consists of about 30 programmed assassins, who are debriefed after their assassination mission and then killed and cremated. The NSA has had two RNM computerized systems for tracking people by monitoring their evoked emissions, and for transmitting thoughts (as well as audio and visual messages) to people’s brains. NSA Cryptologists have gotten computers programmed to decode what a person’s state of mind & thoughts are when their brain emissions are picked up from a distance. Other groups which conduct mind control which work closely with the NSA would include for instance:

Air Force Space Command/NORAD

Unified Command ELINT Centers

Space Surveillance

The NSA’s “Human Sources” of intelligence are often subjected to mind-control. The Air Force has run a Texas facility called TRIMS, which has exhibition rooms for slaves, which has been used for mind-control programming.

Ft. Polk, LA

–The Delta Forces are stationed here, and are programmed and trained here. MJTF (Multi-jurisdictional Task Force) troops, the BATF & other federal agencies train in kicking in civilian doors & martial law type tactics. Ft. Bragg is HO for the mind-controlled Delta Force. Ft. Bragg is a major satanic center in the military.

Kanoehe State Hospital, Oahu, HA

–This hospital connects with the Naval Base and Naval intelligence. It has been used for programming slaves, as well as Tripler VA Hospital on Oahu island. Kunia, HA is the site of an NSA listening post. Kaneohe, HA also has an underground installation, which is used at least in part by the U.S. Pacific Fleet. Naval intelligence in Hawaii has been involved in mind-control.

Kirtland AFB, NM, Sandia National Lab

–the Sandia Labs have been used for mind control. The one in NM is at Kirtland AFB 87117 (505-845-8692). It has bunkers that have been used for mind-control. The one in Hawaii is at Hanapepe on the Garden Island of Kauai (808-335-5611). Sandia Labs also has a presence in Aibuquerque, NM. Sandia Labs has worked on such secret projects such as the W-88 nuclear warhead which was mounted on the Trident II missiles carried by Ohio-class subs. Mind-controlled slaves help keep Sandia Lab’s research secret.

Lexington, Kentucky

— On the west side of Lexington is the Lexington airport and next to the airport is a castle that is just south of highway 60 and across from Keeneland Race Course. This castle’s original owner is dead. A CIA operative owned it for a while and then it went into receivership. Then the Federal government got the property (a 100 yr. lease). The castle was a major mind-control programming center, as well as a narcotics depot & a money laundering base.

Tunnels existed. The castle is believed to no longer be in use for mind-control, although that is not known for sure. This Lexington, KT programming center within the castle was well situated to connect with a U.S. Veterans Hosp. on the NW side of Lexington, a nearby Fed. Correctional Institute (near Brackton), radio towers are all over the area, and the Kentucky State Horse Park with racetracks all built after 1965 is nearby. Scott Gen. Hosp. and an Orphan School at Midway, and the catholic St. Francis Mission are also in the vicinity.

Los Alamos, NM

–A site for research into nonlethal weapons, such as syntel for mind-control. The T-13 Complex Studies Group has been researching artificial-life.

Maine

–The CIA used an International Children’s Summer camp for MK Ultra mind-control. This summer camp was probably not related to the International Children’s School at South Burlington, VT which also has summer school. There is also an International Children’s School tied to the UN in New York, it is not known whether it ties in or not.

New Orleans, LA

–Some of the hotels and restaurants are being used for mind-control. This author suspects (but has no proof) the Ursuline Academy (a Ursuline Convent school) on State St., Bacco Italian restaurant (a relatively new expensive restaurant named after the roman god Baccus and which has had lots of money put into it, and excellent food located in the Hotel de la Poste, French quarter), and the avant-garde Pelican Club (in the heart of the French quarter) tie in with the Network. Upper Bourbon Street is a gay community, and Bourbon St. was originally a voodoo center. Just off of Bourbon St. is the New Orleans Historic Voodoo Museum. This is the only voodoo museum in the world, and it has voodoo dolls and readings available for visitors.

Oswego, NY

–Served as a programming site on Lake Ontario.

The Presideo of Monterey, CA

–This place is not to be confused with the Presideo of San Francisco. This Presideo has the Monterey Defense Language Institute (DLI). Slaves who have scarred brain stems are sent here to develop language skills.

Princeton, NJ–

Salt Lake City, UT

–St. Mark’s Hospital, 1011 Sunberry Dr., Salt Lake City (801-268-7422) has been used for programming.

Stockholm, Sweden

–Soder Hospital has been involved in implants. Dr. Curt Strand & others, & the Swedish Police SAPO were involved in implanting unsuspecting victims.

Pelican Bay Prison, (WI?)

–Isolation Tank Programming was what made this prison famous.

Utah State Prison (Gunnison Facility & Draper Prison) and Utah State Hospital, Univ. of Utah Med. Center

— inflicted directed energy rape of the inmates, pressure chamber sensations in the inner ear, voices and all types of electronic control. The med center was used to implant various types of implants into people. Prison psychiatric staff participated with the mind-control. They routinely used a variety of well-planned tactics to falsely label inmates as psychiatric cases so that they could force-medicate them and then subject them to mind-control. Inmates were subjected to round the clock brainwashing rhetoric for months on end, after they got the implants.

These Utah institutions began cooperating with the secret implant mind-control experimentation in the 1980’s. When inmates complained of the mind-control they were forced medicated. Hundreds made complaints about the mind-control but the system was able to shut them up. The controllers running the implants had the voices being beamed coming from places like the planet “Astra.” Several inmates got the Astra script.

Vancouver, B.C.

–Hollywood Hospital was used for LSD programming for years.

Vermont

–A remote mountain site is used for programming. Victims are helicoptered in.

Veterans Administration Hospitals, Medical Centers and Clinics

— All of these have been used for mind-control. These hospitals are located in:

Baltimore, MD

Battlecreek, MI

Bedford, MA

Birmingham, AL

Brockton, MA

Buffalo, NY

Butler, PA

Canandaigua, NY

Columbia, MO

Clarksburg, WV

Des Moines, IA

Fayetteville, AK

Fresno, CA

Huntington, WV

Hines, IL

Jackson, MS

Kerrville, TX

Knoxville, IA

Lincoln, NE

North Chicago, IL

Northport, NY

Prescott, AZ

Providence, RI

St. Miami, FL

St. Temple, TX

Salibury, NC

Salem, NC

This list is not comprehensive as some have been closed and this is a list of active ones.

Washington, D.C.

–The secret NOD underground installation which is connected to the intelligence groups like NSA and the CIA as well as many other nefarious groups lays under the White House with tunnels connecting this NOD installation with the House of the Temple. The Supreme council of the 33° of the Scottish Rite’s House of the Temple has a 14’ x 25’ room in it with 13 chairs where the Illuminati’s Grand Druid Council meet.

The NOD Deep Underground Installation has numerous levels to it. One eyewitness, went to level 17 (via an elevator) and stated that he believes that deeper levels exist. The NOD installation is involved with psychic (demonic) and satellite control over slaves. This underground complex is to allow the government of the United States to escape a nuclear attack. The enormous complex radiates under Wash. D.C. and connects with many other sites. The tunnel system is used to move some of the mind-control sex slaves. The walls and ceilings of the tunnels are ceramic tile with fluorescent lighting recessed into the ceilings.

Go Back

DEEP UNDERGROUND

MILITARY BASES

(DUMB BASES)

In the U.S., approximately 140 of these DUMB bases exist, and they employ perhaps over 200,000 people.

A geologist friend of this author who helped build these DUMB bases, gave his life to get the truth out to the American people. He was a programmed multiple of the Illuminati, and some of his alters knew it.

Because these underground bases play such a vital role in the entire mind-control NETWORK, I will list these bases here, even though they have been given previously in – my Ezek. 6:3 book, DUMB (Deep Underground Military Bases)

SELECTED TOP SECRET UNDERGROUND INSTALLATIONS

…THAT THREATEN OUR LIBERTY

140 secret underground facilities have been built, many are underground small-cities.

A number of these bases have been described to me by witnesses including NORAD, Dulce, Coos Bay, and Dreamland. What I am describing is a series of large underground facilities which are connected with tunnels. The tunnels carry extremely fast trains. Train terminals are up to 1 million sq. ft. in area, with multiple levels.

Underground facilities contain computer centers, genetic experimentation, mind-control research, housing for several nationalities of humans and several varieties of aliens.

The corporations which assist the NWO are able to quietly interlink their facilities via the tunnel system too, as well as disperse some of their workers into the world above ground.

There are approx. 50 ways tunnels and underground facilities are dug, which include high pressure continuous water let, low pressure percussive water jet, high freq. electrical drill, turbine drills, pellet drills, spark drills, explosives, hydraulic rock hammers, lasers, electron beam guns, forced flames, etc.

These various tunnelling methods can be broken down in:

Mechanical (such as a water canon)

Thermal (such as a high velocity flame, laser, atomic fusion, etc)

Chemical (such as a dissolver)

The beautiful thing about nuclear subterrenes(rhymes with submarine) is that they don’t leave any debris to dispose of.

These nuclear subterrenes are building tunnels 40’ in diameter, and as these machines work the rock is melted into a hard, glassy tunnel lining. Air-intake shafts bring fresh air to the tunnels and underground facilities.

Underground facilities have fuel storage units, air-conditioning, water reservoirs, dining, medical, sleeping and storage units. Many of the underground sites are close to railroads and have entrances that trucks can drive into. Some of the entrances for trucks are protected by holograms that look like the side of a mountain, but allow vehicles if one just drives through them.

The other style of hidden entrances are buildings where trucks drive in and are lowered via access shafts down into the underground areas. Security for some (such as Groom Lake) of the facilities is maintained by Wackenhut.

Penetration tests on facilities are carried out by a special unit called OP-06-D which are HQed at Off utt AFB, NE.

Format is as follows:

site name

site location (warning: longitudes & latitudes were quick off of the head estimates)

group/groups in control

size

activity

ARIZONA

· 1. Fort Huachuca. 31°50’ N 1100 19’48″ W, saucer base below, intelligence training above, mind-control incl. too.
· 2. Gates Pass Base
· 3. Gila Mountain Area, south of Interstate 8 and approx. 30 east of Yuma, AZ. 290 N 116ºW. DUM base.
· 4. Grand Wash Cliffs, on western edge of the cliffs at the head of Grapevine Wash. Must be reach via hwy 93 and then unpaved roads. DUM base.
· 5. Green Valley
· 6. Hualapai Mountains, east side of the mountain range, about 35 mi. SE of Kingman, AZ
· 7. Rincon Mtn., north side of Rincon Mtn
· 8. Mt. Lemmon
· 9. Page
· 10. Safford, near Safford
· 11. Santa Catalina Mountains – base

ARKANSAS

· 12. In the vicinity of Hardy and Cherokee Village. 360 19’ N 9°29’W W. Installation purpose not known.
· 13. Pine Bluff, Ark. area. 34° 13.4’ N 92º01.0’W to 34º30’ N 92° 30’W. saucer base.

CALIFORNIA

· 14. 29 Palms Marine Base, Identified on military map as airspace area R-2501 N. Saucer base southeast of Ludlow. This is a U.S. alien research/ diagnostic facility and UFO base.
· 15. China Lake, mind control and weapons research
· 16. Darwin, CA, 4 miles dues west of Darwin
· 17. Deep Springs, CA, 37°22’ N 117º 59.3’ W. saucer base
· 18. Fort Irwin, CA, 35°20’N 116°8’W W. saucer base
· 19. Edwards Air Force Base, in the area where Diamond Cr. & the so. fork of the Yuba meet, there are 3 underground UFO bases. 34°8’ N 117° 48’ W
· 20. George Air Force Base, CA – saucer base
· 21. Helendale, Lockhead Underground Facility, 34º44.7’ N 1170 18.5’ W. Technology for secret projects. There are 3 saucer bases here.
· 22. Los Angeles, On Hwy 14 towards Edwards A.F.B. after Palmdale, one turns off and after taking several streets to 170th street, north on 170th St. to the Rosamond-170th intersection, the second and lower and better maintained dirt road will take you west, and if you take a right going north at the power lines and up to the hilltop you will see the top of an underground NORTHOP facility; Technology for the elite’s secret projects. This area was very active in the 1970s. Northrop’s facility is near the Tehachapi Mtns. It has been reported
to go down 42 levels. It is heavily involved with electronics and hi-tech aerospace research.
· 23. Mt. Shasta
· 24. Kern River, CA the hollowed out mountain next to the hydroelectric facility at the Kern River Project near Bakersfield- reported saucer base
· 25. Napa Valley- located at Oakville Grade north of Napa, CA. Tunnels also connect the wineries north of Napa, used for white slavery and mind-control. Has a saucer base.
· 26. Norton Air Force Base- saucer base
· 27. Quincy, CA, 39° 56.2’ N 120° 56.5’ W. saucer base
· 28. Near Palmdale (if one takes Palmdale Blvd. til 240th St. and goes to Ave R-8. One the eastern limit of Ave. R-8 is McDonnell-Douglas’s facility called the Uano Facility. One can see it better from the Three Sisters Hills to the south of the facility. Strange shaped disks raise out of the ground on pylons. These attached disks glow and change color. It is involved in hi-tech aerospace technology.
· 29. Presidio, CA – A FEMA/DOD site for Region IX’s regional office
· 30. San Bernardino, CO, 34º 50’ N to 34° 16’ N
· 31. Santa Barbara County – placed in the thick diatomite strata
· 32. Santa Rosa, 38º 26.4’ N 122º 42.9’ W, FEMA, Regional center for west coast, what FEMA is doing is mostly kept secret. This is listed as a Communications Antenna Field, but is doing much more.
· 33. Sierra Nevada Mountains, CA – very deep military base
· 34. Tehachapi Ranch- 4 saucer bases, Tecachapi Canyon has a new underground base which was finished in Sept. ’95. This is the “Unholy 6” base of the Orions. 35° 20’ 118° 40’
· 35. Trona, CA, 35° 45.5’ N 1 77º22.6’ W –several miles northwest of Trona, directly under Argus Peak. This DUM sits on China Lake’s NWC’s land, and may have been built in the ’60s.

COLORADO

· 36. Alamosa, 37° 28.1’ N 105°52.2’W W- reported saucer base
· 37. Book Cliffs, CO, 39° 40’ N 108º 0’ W near Rifle, CO
· 38. Boulder, CO–The headquarters for EMC, a type of electra-magnetic mind control that is being broadcast to modify the thinking of Americans, and to control slaves.
· 39. Colorado Springs, NORAD –Canada & U.S., & FEMA, hundreds of people on staff, contains at least 4.5 cubic miles of underground caverns and 45 underground steel buildings.
Many underground chambers are as large as 50, x 100 ’. This complex tracks thousands of satellites, missiles, submarines, and UFOs. NORAD also controls many Monarch slaves who have ALEX, JANUS, ALEXUS endtime callback programming. NORAD installation has 1278 miles of road underground.
· 40. Fort Collins- base for Gray aliens
· 41. Grand Mesa- Orion saucer base
· 42. Montrore Co.–north of Paradox, in Paradox Valley. The site in Paradox Valley can be reached via Hwy. 90 via Nucla.

CONNECTICUT

· 43. North west Connecticut

FLORIDA

· 44. Massive base- reported saucer base
· 45. Eglin AFB, 30º 40’ N 86° 50’ W- Orion saucer base since 1978

GEORGIA

· 46. Atlanta, GA –FEMA regional center, which is appropriately placed since Atlanta is to become a capital within the NWO redrawing of boundaries. Atlanta is believed to have several underground installations in its area, one to the north at Kennesaw Mtn., Marietta, GA connected to Dobbins AFB and one to the south of Atlanta at Forest Park.
· 47. Thomasville, 30° 50.2’ N 83°58.9’ W, FEMA, regional center, they train groups in Search and Destroy missions for when Martial Law is imposed. This is SW Georgia in area of tunnels.

IDAHO

· 48. Lower Goose Lake area in the general area of Oakley, ID.–Wackenhut of the Illuminati run a “model prison” for the NWO. The worst of the federal prisoners are placed in this underground prison which has 7,100 cells which are filled with about 2,700 federal inmates. A track runs through the middle of the eerie underground facility. Food and showers are on the tracks, and the men are allowed showers once a week. The minimum of lighting is used and the men are beaten senseless if they talk at all. It sits 500’ underground.
· 49. South central Idaho–under the Snake River lava flows between Twin Falls and Idaho Falls.

INDIANA

· 50. Bedford & Lawrence Co. area–continued activity in large old mines indicates a possible government use of the large old quarries.

KANSAS

· 51. Atchison, KS–the DIPEF underground facility, which the govt. would run in an emergency. AT & T maintains an underground facility at Fairview, KS.
· 52. Kinsley–an underground UFO base

MARYLAND

· 53. Camp David–just north of the camp is an underground facility important to the intelligence agencies.
· 54. below Ft. Meade, of the National Security Agency, 10 acres of the most sophisticated supercomputers that can be built, very large complex, massive surveillance of all the world’s communications, including all transmissions in the U.S. & world of telephones, telegraph, telex, fax, radio, TV and microwave transmissions.
· 55. Olney, actually the facility is between Olney and Laytonsville, on Riggs Rd. off of Rt. 108. Another underground facility may also exist in the area, FEMA & possibly NSA, the facility may be 10 levels deep, purpose unknown.
· 56. Suitland, MD- Classified archives of U.S. Govt. stored here in underground levels. Vaults have extensive amounts of documents which are not indexed. Restricted access with a coded security card. High level intelligence groups operate in the area also.

MASSACHUSETTS

· 57. Maynard, 42° 26.0’ N 71° 27.0’ W FEMA, regional center, Wackenhut is here too.

MICHIGAN

· 58. Battle Creek, 42° 19.3’ N 85° 10.9’ W FEMA, regional center, activity secret (not validated)
· 59. Gwinn, Ml, 46° 16.8’N 87° 26.5’ W, near Gwinn is a large underground base which is a key base for sending signals. An AFB is also nearby. Under Lake Superior is an alien base
with roads 5,000’ deep.

MISSOURI

· 60. 12 miles south of Lebanon, 36° 02.8’ N 115° 24.3’ W, near the newly created town of Twin Bridges-reported saucer base
· 61. In the Bat/Dry/Dead Man/ Howell cluster of caves- reported saucer base
· 62. St. Francis Mountains, MO (between St. Louis & New Madrid)

NEBRASKA

· 63. North-central Nebraska
· 64. Red Willow Co. near McCook, NE

NEVADA

· 65. Blue Diamond, 36° 02.8’N 115°24.3 W -reported saucer base
· 66-68. Groom Lake, also known as Dreamland, Area 51, The Area, the Spot, Red Square, Sally Corridor, Watertown Strip. 1150 50’N 37°20W. Run by the NWO along with demonic beings, the CIA is there andWackenhut Security. Two large underground facilities close to but separate from Groom Lake but controlled by the demonic beings are Papoose Range and Cockeyed Ridge (S-4) underground bases. Purpose is the testing of various UFOs and other secret aircraft like the Aurora and Stealth. Also biological work is done, including the biological raising of small greys. Many levels have been built at these three complexes, and a 7 mile long run way (which is actually 39 miles) has been built over Groom Lake, a dry lake. There is an S-2, an S-4, an S-6, and an S-66 underground installations. S-66 is the most secret and it has 29 levels and is 11, 300’ deep.
· 69. Quartzite Mountain SE of Tonopah, 37° 31 ’N 116° 20’ W- reported saucer base
· 70. Tonopah, Airforce, CIA? & ??, deals with secret aircraft

NEW HAMPSHIRE

· 71-73. There may be as many as three underground installations in New Hampshire’s hills (according to reports).

NEW JERSEY

· 74. Picatinny Arsenal, 4o° 38’N 74° 32’ W- saucer base, 1/4 cubic mile large & very deep underground.

NEW MEXICO

The state of New Mexico and Colorado have been used for the construction of a series of underground bases. (All the rest of the states have too.) The Primary Underground facilities in New Mexico consist of:

· 3 enormous underground bases inthe Dulce, NM area (an area I spent several days investigating in 1993)
· the White Sands–Alamogordo Area which has 3 underground bases
· Datil and Pie Town which have two more underground bases. (Carlsbad Cavern which had underground activity, which is reported discontinued, and another base to east of Carlsbad.)

· the Los Alamos area underground facility
· the Taos area underground facility

The New Mexico area has basically four underground system out. One goes to the 4-corners area and then to Groom Lake (Area 51). One goes north toward Delta, CO and Colorado Springs. The Taos facilities goes north approximately along Interstate 25 and eventually ties in NORAD. The southern bases connect to Texas and Mexico. The Los Alamos facility dates at least back to 1940. One can only imagine what has been built with 1/2 century of labor on this underground system. Visitors to the deeper levels report humans kept in glass cylinders, plus many other strange things. I have had the opportunity to debrief some people who have been in the lower reaches of some of these facilities. There are special badges, special uniforms, tube elevators etc. which for lack of time I will not describe.

· 75. Angel Peak- reported saucer base
· Carlsbad Cavern area (now destroyed), 32° 25.0’N 1040 14.0W -old relics of saucer base left
· 76-78. Dulce, N.M., 36º 56.0’N 106°59.8’W,–South of Dulce, in the area of the Jicarilla Indian Reservation, another facility is east of the Dulce facility a number of miles. This is run directly by Illuminati w/ Army and Airforce help, CIA also conduct experiments at the center; the size of the installation is hugh requiring small shuttle trains and has seven levels according to witnesses. Serves as a UFO base, biological experiments, production center for small-grey drones. Wackenhut provides some of the security on the ground.
· 79. Kirtland AFB, NM, Sandia National Lab
· 80. Manzano Mtn, near Albuquerque, known as the Kirtland Munitions Storage Complex, Airforce, 3,000-acre base within the Kirtland AFB/Sandia National Labs complex, guarded by 4 lethal rings of fences, use unknown, suspected UFO base. A new 285,000-sq. ft. bunker is being built near Manzano Base.
· 81. Pie Town, 34° 17.9’N 1 108°08.7’W, in area near Pie Town, UFO Base.
· 82. Sandia Mountains NE of Albuquerque -reported saucer base
· 83. to the north of Taos Pueblo
· 84. White Sands, 32°22.8’N 106°28.8’W, major hub for research, tied in with Dulce & NORAD, HO for NASA /military shuttle flights, radiation research ctr. and mind control.

NEW YORK

· 85. Adirondack Mountains (near Elizabethtown)
· 86. New York Metro area
· 87. Plattsburgh (near Canada and St. Albans) AFB, 49°40’N 73°33 W- two saucer bases in this area.

OKLAHOMA

· 88. Ada, 34°46.4’ N 96°40.7W W, underground saucer base, this base does human cloning, and it is FEMA’s most sensitive base.
· 89. Ashland Naval Ammunition Depot, 34°45.9’N 96° 04.3’W,- reported saucer base

OREGON

· 90. Bull Run, north side of Bull Run Reservoir area near Mt. Hood, and very close to Larch Mtn. and south of Benson St. Park of the Columbia Gorge.
· 91. Coos Bay area has had three separate but coordinating underground facilities built for UFOs. The facility farthest east, about 20 miles inland in the wilderness near Hwy 42, has been shut down. It is now an old abandoned facility well camouflaged. The coast facility is probably still operational.
· 92. Klamath Falls, OR–since Sept. ’95 this has been a base for a number of NWO groups incl. the Air National Guard, FEMA, CIA, FBI, Spetznaz, and MOSAP training base. An underground concentration camp exists here.

PENNSYLVANIA

· 93. Blue Ridge Summit, near Ft. Ritchie, known as ’Raven Rock” or “Site R”, Army, major electronic nerve center, 650 ft. below surface with about 350 staff and over a 716 acre area. possibly connected via tunnel to Camp David. The NOD installation is involved with psychic (demonic) and satellite control over slaves. This underground complex is to allow the government of the United States to escape a nuclear attack. The enormous complex radiates under Wash. D.C. and connects with many other sites. The tunnel system is used to move some of the mind-control sex slaves. The walls and ceilings of the tunnels are ceramic tile with fluorescent lighting recessed into the ceilings.

TEXAS

· 94. Ft. Hood, TX, 31° 15’N 97° 48’ W, home of some Delta Mind-Controlled soldiers and a reported saucer base.
· 95. Denton, TX, 33° 13.2’N 97° 08.2’W – FEMA, regional center, activity secret
· 96. Red River Arsenal, TX- reported saucer base

UTAH

In Utah, the Kennecott Copper Company has been connected to the Illuminati and the KKK. These connections have been exposed in other writings by this author. Kennecott’s mine (reported to be owned by the World Bank) in the Salt Lake City area is serviced by Union Pacific, which is reported connected to the Mormon Church.

The mine is receiving a heavy volume of big trucks after 11 p.m., for instance, in a normal night over 6 dozen large trucks with 2 trailors each rolling into the mine. In other words, it appears that the heavy train & tractor trailor activity indicates something besides mining.

VIRGINIA

· 97. Bluemont, Mount Weather base, Federal Preparedness Agency & FEMA, small-city underground, top-secret, staff of several hundred, does secret work for FEMA and contains a complete secret government with the various agencies and cabinet-level ranking administrators that keep their positions for several administrations and help run the United States.
· 98. Culpepper, 380 28.5 N 77°59.8’W, about 2 miles east of Culpepper off of Rt. 3, called Mount Pony, Illuminati – Fed. reserve, 140,000 sq. ft., includes a facility for the storage for corpses, monitors all major financial transactions in the U.S. by means of the “Fed Wire”, a modern electronic system.
· 99. Pentagon, Arlington, VA-
· 100. Warrington Training Ctr. – two sites one on Rt. 802 and the other on Bear Wallow Road, on Viewtree Mountain. One is Station A the other Station B. Army & ??, purpose unknown

WASHINGTON

· 101. Bothell, 47°45.7’N 122°12.2w W, FEMA, regional center, activity unknown

WASHINGTON, D.C.

· 102. WHITE HOUSE, 38°53.5’N 77°02.0’W -The secret NOD underground installation which is connected to the intelligence groups like NSA and the CIA as well as many other nefarious groups lays under the White House with tunnels connecting this NOD installation with the House of the Temple. The Supreme council of the 33° of the Scottish Rite’s House of the Temple has a 14’ x 25’ room in it with 13 chairs where the Illuminati’s Grand Druid Council meet. The NOD Deep Underground Installation has numerous levels to it. One eye-witness, went to level
17 (via an elevator) and stated that he believes that deeper levels exist.

WEST VIRGINIA

· 103. Sugar Grove, the Navy’s Strategic Intelligence Services microwave communications. There base here.

. 104. White Sulphur Springs, under the Greenbriar Hotel, a mini-city large enough for 800 people equipped with its own crematorium, if there are any other purposes other than listening to U.S. microwave communication it is unknown by this author.

addtext_11-20-06974327887.png

addtext_11-20-06737826084.png

ORIGINAL SOURCE LINK BELOW:

https://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon06.htm

Children entrusted to pro-pedophiles? Two scandals shake up LGBT activism!

Children entrusted to pro-pedophiles? Two scandals shake up LGBT activism
by Daniele Scalea

Two news reports in recent hours bring the issue of the ongoing attempt to “normalize” pedophilia back into the limelight. Although using the term “limelight” is an antithesis, an exaggeration: the big media are ignoring the issue. And their silence fits, we do not know whether knowingly or not, into that very process of pedophilia’s clearance.

WARNING!!
Pedophilia: “normalization” and legalisation in progress

Before dealing with the new facts, let’s tie up the thread of the narrative that, at least on blogs like ours, takes place. Five months ago we wrote the article Pedophilia is trying to pass through Overton’s window. In it, we reported of the choice made by a child abuse research center, belonging to the prestigious American Johns Hopkins University, to hire jurist Allyn Walker.

“Transgender” and “nonbinary,” according to the definition she gives of herself, Walker had previously been forced to resign from another university because of the controversy sparked by her positions on pedophilia: namely, that pedophiles who refrain from raping children should be “destigmatized,” called by a less infamous name, understood and accepted.

The case of Allyn Walker and Johns Hopkins University allowed us to recall how an attempt to normalize pedophilia has been underway for decades. That attempt failed in the Sixty-Eight, although supported by leading intellectuals on the Left, but it is being proposed again today. Pedophiles, the aforementioned article recalled, have often acted by insinuating themselves into the gay movements – not because there is an identity between the two orientations, but because they hope that the emancipation of gays will lead to theirs in tow as well. That possibility is seen as all the more promising today, as the movement has since become increasingly inclusive – “LGBTQ+” is the label in vogue today, where the “plus” indicates that potentially every sexual orientation can find acceptance there. At a time when orthodoxy affirms that gender and sexual preference are a “spectrum” of infinite possibilities, all equally dignified, all fully normal, it is clear how weakened are the defenses that still allow pedophilia to be excluded from any recognition and legitimacy.

LGBT daycare centers in Berlin
After this introduction, let us come to the news of the day. Two different LGBT organizations, both specifically involved with minors, have come into the eye of the storm for having pedophilia apologists within them.

Let’s look at the first case, in Germany. In Berlin, the organization Schwulenberatung – which, as its name implies, provides psycho-social assistance to queer people – has decided to open two daycare centers, with the stated intention of exposing toddlers from 0 to 3 years old to homosexual content in order to accustom them to “alternative lifestyles.” These kindergartens will be incorporated into a larger housing structure, with apartments, restaurants, even a hospice, all aimed at non-heterosexual people.

The news will, in itself, raise more than one eyebrow, because for many, issues related to sexuality should be excluded from the education of young children. But what has generated the fuss is that one of the three Schwulenberatung board members is the controversial sociologist Rüdiger Lautmann.

In 1994 he published a book, Die Lust am Kind (“The Attraction to the Child”), devoted to exploring pedophilia. An academic work, sure, but one in which some, shall we say, “objectionable” positions are expressed.

A pedophilia apologist?

Lautmann referred to psychiatrist Eberhard Schorsch’s judgments that pedophilia could not be considered “inherently bad” or “dangerous,” but should be evaluated on a case-by-case basis. This led him to a slippery ridge, questioning the sexuality of children and how it could meet in a “consensual” manner with that of the adult. All the more so since the book is based on interviews with pedophiles and, therefore, sometimes their perspective and the author’s fade into each other, in an ambiguity perhaps sought in order to afford “stronger” statements. “In the final analysis,” the book reads, “it is the pedophile who wants and initiates the sexual aspect of the relationship; this, no less, is done within the limits of what the child allows and what the child is ready for.”

The German sociologist in the book was careful not to be too explicit on certain issues, but reading through it makes clear how for him the “boundaries” set by society and the law in relation to child sexuality are too arbitrary and puritanical. At times he gets out of line and writes phrases that weigh on his credibility today – such as the following:

I believe that pedophiles – or, to be more precise, those we interviewed – make great efforts to obtain the child’s consent and, as well, that they take a “no” seriously. At this point, I cannot refrain from throwing this dig: a large portion of heterosexual men would do well to employ such carefully developed consent strategies with women.

In many cases the “pedosexual”encounter is actually directed toward the goal that Michael-Sebastian Honig has defined of “child-love”: A “playful satisfaction” of the need for tenderness that does not exclude genital arousal.

The apologetic view of pedophiles seeking the “consent” of victims shines through in passages like these. Where Lautmann has to address the problem of the most aggressive pedophiles, he is careful to point out that “these are men whose competence in pedophilic acting is limited […] but this gradation of competence is seen in all sexual scenes.” That is, the fault would not be in being pedophiles but, as he explains a little later, in being masculine:

There is too much traditional male thinking [in this pedophile’s account]. Less educated interviewees were more likely to still speak in paternalistic terms; probably also in their interaction with girls. For the pedophile who targets girls, his masculinity is an impediment. Hegemonic masculinity (Bob Connell) goes along with his gender programming […]. The one who loves girls not only possesses adult superiority; he is also obligated to be dominant toward all females. If he is looking for a loving relationship, he will have to unlearn all his traditional notions of gender.

The German sociologist is therefore keen to exclude the case histories of rape, incest and abuse from the scope of what he calls “true” pedophiles and who “do not want to – and should not – be lumped in with abusers.” Pedophiles, Lautmann explains, have their own “ethics.” Actually, pedophilia was “invented” when, in past centuries, people began to conceive of childhood as a moment distinct from adulthood and children as individuals to be educated and protected – which in Lautmann’s conception corresponds, who knows why, to “repression.” In his view, it is in the nineteenth century that pedophilia “evolves” to “differentiate itself from sexual abuse and incest in all essential respects save the characteristic of age.”

In Lautmann’s interpretation, the child became at that stage an idealized being as “pure,” dressed in an increasingly charming manner, and with an inherently playful attitude. The pedophile addresses it as a “person of superior worth.” So we read in the book:

Over the course of the 20th century, ideas about childhood have changed repeatedly while at the same time being massively sexualized. I am reminded of how the claims of Freud and Kinsey were initially received with great upset. In addition, since 1950, historically new themes have emerged: the equality of the child, the child as personal partner, the non-dominant interaction between parent and child. Sexuality no longer yields to communicative prohibitions. Generations in this way come so closely together that intimacy between them becomes imaginable. At this point pedophilia would have to become a possibility.

LGBT Sirens for Children
Let us now turn to the second news and move to Great Britain. The scandal concerns the NGO “Mermaids”, which has been working with so-called “transgender” children since 1995. The organization is also infamous for having played a major role in pushing the London clinic in Tavistock to indulge in early sex changes on children (the number of surgeries had become so absurdly high that a few months ago, thanks in part to the push of lawsuits brought by victims such as Keira Bell, it was announced that the service would be abolished and devolved to regional clinics).

La sovranità appartiene al popolo
In September, the “Telegraph” dealt an initial blow to Mermaids’ image. A journalist contacted the organization by e-mail, posing as a 14-year-old girl. After an exchange of letters, without ever seeing the interlocutor or even caring about her psychological state or her parents’ wishes, the NGO agreed to provide her with a breast binder – a tool that the same promoters on the Internet admit can cause back pain, chest pain, difficulty breathing, lung or rib damage. The British charities regulatory commission has launched an investigation, meanwhile suspending the lavish public funding (£500,000!) that Mermaids receives through the National Lottery.

At conference with pedophiles
In October came the second blow. The “Times” discovered that one of Mermaids’ administrators, LSE professor (where he teaches “Gender and Sexuality”) Jacob Breslow, had spoken at a B4U-ACT conference in 2011 (when he was already a Ph.D. student), which focuses on psychological support for pedophiles. Such a mission is not evil per se, but B4U-ACT is accused of wanting to normalize pedophilia. On its website, psychological support is not presented as aimed at preventing child abuse: it is stated that pedophiles should turn to them for issues “unrelated to their sexuality” or “caused by society’s negative reactions”; it is explicitly denied that pedophilia constitutes a sickness or that support should serve to modify the pedophile’s sexual feelings. Some concern is also raised by the fact that the founder was a convicted child molester.

But what was the Mermaids administrator’s role in that conference? A summary note with highlights has appeared on the Internet (and not refuted), in which Breslow’s speech is thus accounted for:

Self-described “gay activist” and speaker Jacob Breslow said that children can properly be “the object of our attraction.” He further objectified children, suggesting that pedophiles needn’t gain consent from the child to have sex with “it” any more than we need consent from a shoe to wear it. He then used graphic, slang language to favorably describe the act of climaxing (ejaculating) “on or with” a child. No one in attendance objected to this explicit depiction of a child sexual assault.

True or not is this account of Breslow’s words, on several occasions he has expressed “controversial” positions on children’s sexuality.

Daniele Scalea
Founder and President of Centro Studi Machiavelli. Graduated in Historical Sciences (University of Milan) and PhD in Political Studies (Sapienza University), he is professor of “History and doctrine of jihadism” and “Geopolitics of the Middle East” at Cusano University. From 2018 to 2019 he was Special Advisor on Immigration and Terrorism to the Undersecretary of Foreign Affairs Guglielmo Picchi. His latest book (as editor) is Topicality of sovereignism. Between pandemic and war.


Website
© 2017-2021 Machiavelli Centre for Strategic and Political Studies
FacebookYouTubeTwitterInstagramLinkedInRss
it_ITItaliano

🔗

SOURCE: https://www.centromachiavelli.com/en/2022/10/06/lgbt-pedophilia-mermaids-schwulenberatung/

Children entrusted to pro-pedophiles? Two scandals shake up LGBT activism

EXPOSING THE TRANSGENDER PROPAGANDA (BRAINWASH)…

From: the MAYOCLINIC:

Children and gender identity: Supporting your child..

Learn why you should talk with your child about gender identity and expression — and how to get the conversation started.

By: Mayo Clinic Staff

If your child has questions about gender identity or gender expression, you probably have questions too. Find out what you can do to help and support your child.

What are the basics of gender identity?

Sex assigned at birth and gender identity are two separate things. Sex assigned at birth is typically made based on external genital anatomy. But gender identity is the internal sense of being male, female, or a gender along the spectrum between male and female. People communicate their gender to others through gender expression. This may be done through mannerisms, clothing and hairstyles.

Gender identity develops separately from sexual orientation. People’s sexual orientation is related to whom they’re attracted to on a physical, emotional and romantic basis.

Is my child transgender?

Children who are transgender have a gender identity that doesn’t match their assigned sex at birth.

In many cases, children will say how they feel. They may strongly identify as boys or girls. And sometimes they identify as neither or not fully male or female (nonbinary).

Most children go through periods of gender exploration through the way they dress and the toys they choose and by role-playing. Some may even insist that they are a gender that differs from that of their birth sex. However, this is likely not a phase if they continue to do so as they get older.

Most children between ages 18 and 24 months can recognize and label gender groups. They may identify others as girls, women or feminine. Or they may label others as boys, men or masculine. Most also label their own gender by the time they reach age 3.

However, society tends to have a narrow view of gender. As a result, some children learn to behave in ways that may not reflect their gender identity. At age 5 or 6, most children are rigid about gender and preferences. These feelings tend to become more flexible with age.

It’s important to remember that gender identity and gender expression are different concepts. A child’s gender identity doesn’t always lead to a certain gender expression. And a child’s gender expression doesn’t always point to the child’s gender identity.

Gender expressions and behaviors might include:

  • Certain bathroom behavior, such as a girl insisting on standing up to urinate
  • An aversion to wearing the bathing suit of the child’s sex assigned at birth
  • A preference for underwear typically worn by a different sex
  • A strong desire to play with toys typically assigned to a different sex

Don’t rush to label your child. Over time your child will continue to tell you what feels right.

How can I support a transgender child or a child who doesn’t conform to assigned sex at birth?

Listen to your child’s feelings about gender identity. Talk to your child and ask questions without judgment. To support your child, you can:

  • Allow your child to express gender in public or at family activities. It’s important to do this even if it makes you or someone else uncomfortable.
  • Give your child access to gender-diverse friends, activities or resources.
  • Don’t assume your child’s gender expression is a form of rebellion or defiance.
  • Don’t try to shame or punish your child for gender expression.
  • Don’t allow others in your family to belittle or ridicule your child’s gender expression.
  • Understand that experiencing discrimination isn’t your child’s fault.

Remember to speak positively about your child. Do this both to your child and to others. Show your approval for your child’s gender identity and expression of it. You’ll foster a positive sense of self in your child when you allow your child to express preferences. You’ll also help keep lines of communication open.

Also, try to let go of expectations you might have had about your child’s future. Instead, focus on what brings your child joy and security. A child living with supportive parents and caregivers is likely to be a happier child.

What kind of health care does my child need?

Your child needs a respectful and knowledgeable health care provider. Talk to your child’s provider about your child’s gender identity and behaviors. Your child’s provider might recommend working with a specialist. If you’re having trouble finding a provider with training in gender identity, ask a support group to recommend a specialist.

Talking to a therapist also is critical. Ask your child’s health care provider to help you find a counselor with training in transgender needs.

What is social transitioning?

A social transition is a reversible step in which a child lives partially or completely in the preferred gender role. This can involve changing hairstyles, clothing, pronouns and, possibly, names. Limited research suggests that social transitioning might help ease depression or anxiety a child may have about gender identity.

Talk to your child and decide details about the transition. You may consider whom to tell about it. You might also plan which bathroom or locker room your child will use. You’ll also need to consider whether transitioning at school or in the community will endanger your child. Seek the advice of a social agency or an advocacy group to help you determine the safety of the transition.

How can I advocate for my child?

You might worry that your transgender child will be shunned and experience discrimination. You may also worry your child could be physically harmed at school or in your community. Advocating for your child may help prevent these things from happening. Take these steps:

  • Connect with other families who have gender-diverse children. This can help reduce isolation you and your child might be going through. Look for an in-person or online support group.
  • Work with your child’s school and teachers. Talk to them about how to stop or prevent bias and bullying before it starts. Ask for gender training to be included in staff development.Also come up with a plan for how your child will be addressed in school and which bathroom your child will use. It’s helpful to talk to your child’s school about how to interpret rules about taking part in team, club and overnight activities. Choose whether you want to share information about your child’s gender identity with other parents.If your child is being harassed or discriminated against at school, speak to the school administrators. If the school system fails to address the problem, research your legal options.
  • Reach out within your community.Outside of school, work with local institutions to make them safer for gender-diverse and transgender children. Also consider supporting or volunteering for gender diversity groups to learn more and help others.

Whatever your child’s gender identity, do your homework and seek proper care. Showing love and acceptance helps children feel comfortable in their bodies and in the world.

SOURCE: https://www.mayoclinic.org/healthy-lifestyle/childrens-health/in-depth/children-and-gender-identity/art-20266811


Balenciaga is being accused of promoting child abuse in its latest campaign.

Balenciaga is being accused of promoting child abuse in its latest campaign. Here’s why the luxury brand is in hot water

By Angelica Silva

Posted Mon 28 Nov 2022 at 10:29amMonday 28 Nov 2022 at 10:29am, updated Fri 2 Dec 2022 at 6:49amFriday 2 Dec 2022 at 6:49am

A photo of a Balenciaga store
Balenciaga received criticism after releasing ads of two young girls holding teddy bears dressed in questionable outfits.(AP: David Niviere)

Share this articleCOPYSHARE

A screen shot of a black background with white text from Balenciaga

Images from Balenciaga’s latest holiday campaign have been described as “disturbing” and “child exploiting”. 

The set of photos, used in advertisements for the Spanish fashion label’s Spring/Summer 2023 collection, triggered a flood of outrage when they were posted on Instagram to the brand’s 14 million followers.

Here’s why.

WARNING: This story contains details that may distress some readers.

What was in the campaign? 

There’s a few layers to this. Let’s start with the most obvious one. 

The high-fashion brand staged a photo shoot which featured two young girls holding teddy bears that were wearing what some have described as “bondage gear”.

This includes studded leather straps, chains and fishnet shirts.

A dog bowl with spikes around it and a collar were also seen in the photos.

Following swift backlash (we’ll get into that below), Balenciaga removed the photos from all platforms.

But not before the world screen-shotted and re-uploaded them to Twitter and Instagram. 

https://platform.twitter.com/embed/Tweet.html?dnt=true&embedId=twitter-widget-0&features=eyJ0ZndfdGltZWxpbmVfbGlzdCI6eyJidWNrZXQiOltdLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2ZvbGxvd2VyX2NvdW50X3N1bnNldCI6eyJidWNrZXQiOnRydWUsInZlcnNpb24iOm51bGx9LCJ0ZndfdHdlZXRfZWRpdF9iYWNrZW5kIjp7ImJ1Y2tldCI6Im9uIiwidmVyc2lvbiI6bnVsbH0sInRmd19yZWZzcmNfc2Vzc2lvbiI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfZm9zbnJfc29mdF9pbnRlcnZlbnRpb25zX2VuYWJsZWQiOnsiYnVja2V0Ijoib24iLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X21peGVkX21lZGlhXzE1ODk3Ijp7ImJ1Y2tldCI6InRyZWF0bWVudCIsInZlcnNpb24iOm51bGx9LCJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3Nob3dfYmlyZHdhdGNoX3Bpdm90c19lbmFibGVkIjp7ImJ1Y2tldCI6Im9uIiwidmVyc2lvbiI6bnVsbH0sInRmd19kdXBsaWNhdGVfc2NyaWJlc190b19zZXR0aW5ncyI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfdXNlX3Byb2ZpbGVfaW1hZ2Vfc2hhcGVfZW5hYmxlZCI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfdmlkZW9faGxzX2R5bmFtaWNfbWFuaWZlc3RzXzE1MDgyIjp7ImJ1Y2tldCI6InRydWVfYml0cmF0ZSIsInZlcnNpb24iOm51bGx9LCJ0ZndfbGVnYWN5X3RpbWVsaW5lX3N1bnNldCI6eyJidWNrZXQiOnRydWUsInZlcnNpb24iOm51bGx9LCJ0ZndfdHdlZXRfZWRpdF9mcm9udGVuZCI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9fQ%3D%3D&frame=false&hideCard=false&hideThread=false&id=1595476067527057408&lang=en&origin=https%3A%2F%2Fwww.abc.net.au%2Fnews%2F2022-11-28%2Fbalenciaga-designer-brand-controversial-campaign-explained%2F101707536&sessionId=750b41154de78c30e75a6ed1243089dda4ae7f6f&siteScreenName=abcnews&theme=light&widgetsVersion=01917f4d1d4cb%3A1696883169554&width=550px

Supreme Court child abuse imagery case documents 

This led to the discovery in an earlier campaign of a photo depicting a black handbag on top of a pile of strewn papers — all of them are blank, except one. 

Twitter users have pointed out the one document appears to be an excerpt from a Supreme Court case, US v. Williams, in which the court upheld a federal statute that the prohibition of “pandering”, or promotion, of images of child sexual abuse did not violate the First Amendment.

The visible portion of the document also has a reference to another Supreme Court case, Ashcroft v. Free Speech Coalition. 

The 2002 case concluded that the Child Pornography Prevention Act of 1996 (CPPA) violated free speech.

https://platform.twitter.com/embed/Tweet.html?dnt=true&embedId=twitter-widget-1&features=eyJ0ZndfdGltZWxpbmVfbGlzdCI6eyJidWNrZXQiOltdLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2ZvbGxvd2VyX2NvdW50X3N1bnNldCI6eyJidWNrZXQiOnRydWUsInZlcnNpb24iOm51bGx9LCJ0ZndfdHdlZXRfZWRpdF9iYWNrZW5kIjp7ImJ1Y2tldCI6Im9uIiwidmVyc2lvbiI6bnVsbH0sInRmd19yZWZzcmNfc2Vzc2lvbiI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfZm9zbnJfc29mdF9pbnRlcnZlbnRpb25zX2VuYWJsZWQiOnsiYnVja2V0Ijoib24iLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X21peGVkX21lZGlhXzE1ODk3Ijp7ImJ1Y2tldCI6InRyZWF0bWVudCIsInZlcnNpb24iOm51bGx9LCJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3Nob3dfYmlyZHdhdGNoX3Bpdm90c19lbmFibGVkIjp7ImJ1Y2tldCI6Im9uIiwidmVyc2lvbiI6bnVsbH0sInRmd19kdXBsaWNhdGVfc2NyaWJlc190b19zZXR0aW5ncyI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfdXNlX3Byb2ZpbGVfaW1hZ2Vfc2hhcGVfZW5hYmxlZCI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfdmlkZW9faGxzX2R5bmFtaWNfbWFuaWZlc3RzXzE1MDgyIjp7ImJ1Y2tldCI6InRydWVfYml0cmF0ZSIsInZlcnNpb24iOm51bGx9LCJ0ZndfbGVnYWN5X3RpbWVsaW5lX3N1bnNldCI6eyJidWNrZXQiOnRydWUsInZlcnNpb24iOm51bGx9LCJ0ZndfdHdlZXRfZWRpdF9mcm9udGVuZCI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9fQ%3D%3D&frame=false&hideCard=false&hideThread=false&id=1594547665324617728&lang=en&origin=https%3A%2F%2Fwww.abc.net.au%2Fnews%2F2022-11-28%2Fbalenciaga-designer-brand-controversial-campaign-explained%2F101707536&sessionId=750b41154de78c30e75a6ed1243089dda4ae7f6f&siteScreenName=abcnews&theme=light&widgetsVersion=01917f4d1d4cb%3A1696883169554&width=550px

A book which features paintings of naked children 

In the same campaign another photo features a model sitting in an office chair inside a high-rise building.

Behind the model, Twitter users pointed out a copy of a book called Fire from the Sun by an artist named Michael Borremans.

A quick Google of the book will reveal Borremans’ paintings of children running around naked, looking at and holding severed body parts covered in blood. 

https://platform.twitter.com/embed/Tweet.html?dnt=true&embedId=twitter-widget-2&features=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%3D%3D&frame=false&hideCard=false&hideThread=false&id=1595301521134354432&lang=en&origin=https%3A%2F%2Fwww.abc.net.au%2Fnews%2F2022-11-28%2Fbalenciaga-designer-brand-controversial-campaign-explained%2F101707536&sessionId=750b41154de78c30e75a6ed1243089dda4ae7f6f&siteScreenName=abcnews&theme=light&widgetsVersion=01917f4d1d4cb%3A1696883169554&width=550px

Contemporary art gallery David Zwirner, which featured an exhibition of Borremans’ paintings in Hong Kong in 2018, describes the artwork as featuring:

“Toddlers engaged in playful but mysterious acts with sinister overtones and insinuations of violence”.

What are people saying about it?

Within moments of Balenciaga’s summer campaign being released online, the hashtags #BoycottBalenciaga and #CancelBalenciaga started trending. 

Users across Twitter and Instagram slammed the brand for promoting paedophilia and child abuse imagery.

One Twitter user said whoever had the idea for the campaign should “be in jail”.

https://platform.twitter.com/embed/Tweet.html?dnt=true&embedId=twitter-widget-3&features=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%3D%3D&frame=false&hideCard=false&hideThread=false&id=1594734651687460868&lang=en&origin=https%3A%2F%2Fwww.abc.net.au%2Fnews%2F2022-11-28%2Fbalenciaga-designer-brand-controversial-campaign-explained%2F101707536&sessionId=750b41154de78c30e75a6ed1243089dda4ae7f6f&siteScreenName=abcnews&theme=light&widgetsVersion=01917f4d1d4cb%3A1696883169554&width=550px

Some said the materials and props used in the photos represented bondage and discipline, dominance and submission, sadism and masochism (BDSM) fetishes. 

Among the anger-fuelled responses online, one user said “most people won’t even remember” what happened with the brand.

https://platform.twitter.com/embed/Tweet.html?dnt=true&embedId=twitter-widget-4&features=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%3D%3D&frame=false&hideCard=false&hideThread=false&id=1594733335913189378&lang=en&origin=https%3A%2F%2Fwww.abc.net.au%2Fnews%2F2022-11-28%2Fbalenciaga-designer-brand-controversial-campaign-explained%2F101707536&sessionId=750b41154de78c30e75a6ed1243089dda4ae7f6f&siteScreenName=abcnews&theme=light&widgetsVersion=01917f4d1d4cb%3A1696883169554&width=550px

How did Balenciaga respond? 

The company pulled the campaign and released an apology on Instagram for what many perceived as the sexualisation of children.

“Our plush bear bags should not have been featured with children in this campaign,” Balenciaga wrote in a post on their Instagram story.

The brand also stated it will take legal action “against the parties responsible” for the creating the campaign and “including unapproved items” in the photo shoot. 

“We strongly condemn abuse of children in any form,” Balenciaga wrote.

Who else has responded?

Brand ambassador Kim Kardashian broke her silence on the issue earlier on Monday when she posted a statement to her Instagram and Twitter.

The mother of four said she was “shaken by the disturbing images”.

https://platform.twitter.com/embed/Tweet.html?dnt=true&embedId=twitter-widget-5&features=eyJ0ZndfdGltZWxpbmVfbGlzdCI6eyJidWNrZXQiOltdLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2ZvbGxvd2VyX2NvdW50X3N1bnNldCI6eyJidWNrZXQiOnRydWUsInZlcnNpb24iOm51bGx9LCJ0ZndfdHdlZXRfZWRpdF9iYWNrZW5kIjp7ImJ1Y2tldCI6Im9uIiwidmVyc2lvbiI6bnVsbH0sInRmd19yZWZzcmNfc2Vzc2lvbiI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfZm9zbnJfc29mdF9pbnRlcnZlbnRpb25zX2VuYWJsZWQiOnsiYnVja2V0Ijoib24iLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X21peGVkX21lZGlhXzE1ODk3Ijp7ImJ1Y2tldCI6InRyZWF0bWVudCIsInZlcnNpb24iOm51bGx9LCJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3Nob3dfYmlyZHdhdGNoX3Bpdm90c19lbmFibGVkIjp7ImJ1Y2tldCI6Im9uIiwidmVyc2lvbiI6bnVsbH0sInRmd19kdXBsaWNhdGVfc2NyaWJlc190b19zZXR0aW5ncyI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfdXNlX3Byb2ZpbGVfaW1hZ2Vfc2hhcGVfZW5hYmxlZCI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9LCJ0ZndfdmlkZW9faGxzX2R5bmFtaWNfbWFuaWZlc3RzXzE1MDgyIjp7ImJ1Y2tldCI6InRydWVfYml0cmF0ZSIsInZlcnNpb24iOm51bGx9LCJ0ZndfbGVnYWN5X3RpbWVsaW5lX3N1bnNldCI6eyJidWNrZXQiOnRydWUsInZlcnNpb24iOm51bGx9LCJ0ZndfdHdlZXRfZWRpdF9mcm9udGVuZCI6eyJidWNrZXQiOiJvbiIsInZlcnNpb24iOm51bGx9fQ%3D%3D&frame=false&hideCard=false&hideThread=false&id=1597029753172918272&lang=en&origin=https%3A%2F%2Fwww.abc.net.au%2Fnews%2F2022-11-28%2Fbalenciaga-designer-brand-controversial-campaign-explained%2F101707536&sessionId=750b41154de78c30e75a6ed1243089dda4ae7f6f&siteScreenName=abcnews&theme=light&widgetsVersion=01917f4d1d4cb%3A1696883169554&width=550px

She also said she is “currently re-evaluating” her relationship with Balenciaga, “basing it off their willingness to accept accountability”. 

Alongside Kim Kardashian, the photographer for the controversial campaign has also spoken up. 

Objects displayed ‘are not in the hands of the photographer’

Gabriele Galimberti, who is known for his portraits of children surrounded by their possessions, posted an Instagram statement following “hundreds of hate mails and messages” received. 

“The direction of the campaign and the choice of the objects displayed are not in the hands of the photographer,” he wrote.

Galimberti said he had “no connection with the photo where a Supreme Court document appears”.

“That one was taken in another set by other people and and was falsely associated with my photos.”

View this post on Instagram

A post shared by Gabriele Galimberti (@gabrielegalimbertiphoto)

Posted 28 Nov 202228 Nov 2022, updated 2 Dec 20222 Dec 2022

Share

More on:

🚨TRANSGENDER DETRANSITIONERS ARE TRYING TO WARN US🚨 – THIS IS THE LIVING HELL THEY ARE GOING THROUGH – The Transgender Agenda Is An Evil Incarnate – It Is A Planned Assault On Humanity By An Evil That Is Almost Incomprehensible!!

Truth To Power

Also See: 🚨THE WAR ON HUMANITY🚨 – Human 1.0 is Being Phased Out and Human 2.0 The Non Procreating Being Is Being Phased In!! That Is The Transgender And Draco Reptilian Agenda!! YES!! Reptilian Agenda!! Our Captured Governments And The Draco Reptilian Agenda!! (See Extended Life Program Below) – David Icke – and William Tompkins: Naval Intelligence Officer; Secret Space Program Disseminator And NASA Section Chief!!https://wp.me/p19seq-fK3

*SPECIAL NOTE* To those who continue to deny the truth that you are informed of that is occurring in front of your face, while you keep shouting “Oh they wouldn’t do that”? Please accept my condolences 💐 on the passing of your cognitive abilities. I understand that it was due to to an inability to critically think, and the lies and propaganda of our captured fascist governments. We are working on the removal of this evil from our world!!

View original post

🚨THE FOUL TRANSGENDER AGENDA🚨 ESCALATES WEF World Economic NAZI Forum ADVISES SCHOOLS TO EXPOSE CHILDREN TO PORN – So That They Can Expand Their Sexuality – Disgusting Bastards!! They’re Coming Full Steam For Our Children!! It’s TIME TO DRAW A LINE IN THE SAND!! NOW!!!

Truth To Power

Humanity Is At War With An Evil That We Can Barely Comprehend…….. A Spiritual War For Humanity Itself, Human Rights, Freedom, Decency, Our Self Respect, And Our Very Existence !!

Also See: 🚨Prison Planet Earth🚨 – The Indoctrination And Manipulation Of Global Humanity!! https://wp.me/p19seq-d57

View original post

COVID TESTING FRAUD EXPOSED – WE Have NO Pandemic There is Only A Fake PCR Test Pandemic!! – The Test Is Vaccinating You With Pathogenic Nano Particles That Are Changing Your Human DNA – Dr Lorraine Day – The Test Is Meaningless!! – Dr Andrew Kaufman

COVID TESTING FRAUD EXPOSED – WE Have NO Pandemic There is Only A Fake PCR Test Pandemic!! – The Test Is Vaccinating You With Pathogenic Nano Particles That Are Changing Your Human DNA – Dr Lorraine Day – The Test Is Meaningless!! – Dr Andrew Kaufman

FRONTLINE DOCTORS & CREW-WORLDWIDE:

[image]: DR. SIMONE GOLD, M.D, PHYSICIAN & FOUNDER OF AMERICA’S FRONTLINE DOCTORS, USA DOCTORS, NURSES, SCIENTISTS, AUTHORS,  RESEARCHERS &  FREEDOM FIGHTERS: • FRONTLINE DOCTORS    • WORLD DOCTORS ALLIANCE • CORONA INVESTIGATIVE COMITTEE • DOCTORS FOR TRUTH,  NETHERLANDS • WORLD FREEDOM ALLIANCE • ORWELL CITY • LA QUINTA COLUMNA • COVID LEGAL • THE COVID BLOG […]

FRONTLINE DOCTORS &  CREW-WORLDWIDE:

FRONTLINE DOCTORS & CREW-WORLDWIDE:

FRONTLINE DOCTORS FOUNDER: DR. SIMONE GOLD, M.D, PHYSICIAN. INSPIRE DOCTORS, NURSES, SCIENTISTS, AUTHORS,  RESEARCHERS AND FREEDOM FIGHTERS ALL OVER THE WORLD:

• FRONTLINE DOCTORS

• WORLD DOCTORS ALLIANCE

• CORONA INVESTIGATIVE COMITTEE

• DOCTORS FOR TRUTH,  NETHERLANDS

• WORLD FREEDOM ALLIANCE

• ORWELL CITY

• LA QUINTA COLUMNA

• COVID LEGAL

CONTACT/FOLLOW/SUPPORT FRONTLINE DOCTORS, USA: https://securedonors.com/americasfrontlinedoctorsummit%20campaignfr […]

FRONTLINE DOCTORS &  CREW-WORLDWIDE:

PCR-COVID-TESTS ARE COLLECTING YOUR DNA WITHOUT YOUR CONSENT!

“PCR tests to collect DNA in order to use the DNA frequency to target people with frequency weapons!That could be the real overarching background and real shocker at the same time! As is well known, Germany has joined the European Union genome project with the aim of collecting 1 million genome sequences in the European […]

PCR-COVID-TESTS ARE COLLECTING YOUR DNA WITHOUT YOUR CONSENT!

FRONTLINE DOCTORS & CREW-WORLDWIDE:

[image]: DR. SIMONE GOLD, M.D, PHYSICIAN & FOUNDER OF AMERICA’S FRONTLINE DOCTORS, USA DOCTORS, NURSES, SCIENTISTS, AUTHORS,  RESEARCHERS AND FREEDOM FIGHTERS: • FRONTLINE DOCTORS • WORLD DOCTORS ALLIANCE • THE CORONA COMITTEE • DOCTORS FOR TRUTH,  NETHERLANDS • ORWELL CITY • LA QUINTA COLUMNA • COVID LEGAL CONTACT/FOLLOW/SUPPORT FRONTLINE DOCTORS, USA: https://securedonors.com/americasfrontlinedoctorsummit%20campaignfr WORLD DOCTORS ALLIANCE Was […]

FRONTLINE DOCTORS &  CREW-WORLDWIDE: