Tag Archives: dialogue

media

media contamination

Star Wars: Lucas wrote a ‘false flag’ historical allegory about US devolution to rogue state empire. It’s true: US ‘leads’ ‘developed’ nations to war-poverty murder ~400 million in last 20 years as most evil government in world history

Posted on December 23, 2016 by Carl Herman

Star Wars’ Rogue One is a story of rebel leaders’ strategy development to stop a total-evil empire fooling many with “fake news” of bringing “safety and security” to the public after a history of false-flag terrorism (and here). In the story, insiders leak literally explosive data that unfolds to to escalating military engagement:

https://www.youtube.com/watch?v=frdj1zb9sMY

Our real world is a story exactly the same of a rogue state empire, but with an option for public awakening to Emperor’s New Clothes facts that could end the empire through lawful arrests of .01% criminal leaders.

Edited from what I wrote about Star Wars in 2015:

“How do democracies get turned into dictatorships? The democracies aren’t overthrown; they’re given away… Star Wars was really about the Vietnam War.” – George Lucas, creator of Star Wars

“The (Star Wars) Empire is like America ten years from now.” – George Lucas, 1973 

Adjusted for inflation, Star Wars is likely the most popular film series in history. Stories are popular because they communicate themes that resonate with the public. Creator George Lucas communicates that a powerful republic is overcome by false flag deception that devolves all into the most evil dictatorial empire possible.

“Dictatorship” literally means a government from what is dictated/said whenever government “leadership” says so. The US has lost almost all Constitutional rights to the dictates of “leaders” in government. In contrast, a constitutional republic is limited government acting within its constitution.

⇒ Keep Reading for many more links and two more videos

[&&]{**}[##]

 

https://www.youtube.com/watch?v=52UR7gUc4PM

[&&]{**}[##]

https://socioecohistory.files.wordpress.com/2015/02/edward_bernays-propaganda_is_the_executive_arm_of_the_invisble_government.jpg?w=500&h=255

[&&]{**}[##]

“… “The information that current marketers can use in order to generate targeted advertising is limited to the input devices that we use: keyboard, mouse, touch screen,” says Michael Madary, a researcher at Johannes Gutenberg University who co-authored the first VR code of ethics with Thomas Metzinger earlier this year. “VR analytics offers a way to capture much more information about the interests and habits of users, information that may reveal a great deal more about what is going on in [their] minds.”

The value of collecting physiological and behavioral data is all too obvious for Silicon Valley firms like Facebook, whose data scientists in 2012 conducted an infamous study titled “Experimental evidence of massive-scale emotional contagion through social networks,” in which they secretly modified users’ news feeds to include positive or negative content and thus affected the emotional state of their posts. As one chief data scientist at an unnamed Silicon Valley company told Harvard business professor Shoshanna Zuboff: “The goal of everything we do is to change people’s actual behavior at scale. … We can capture their behaviors, identify good and bad behaviors, and develop ways to reward the good and punish the bad.”….”

Read the entire long article here:

https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/ 

[&&]{**}[##]

THE MOST DANGEROUS PEOPLE ON THE INTERNET IN 2016

WRITTEN BY WIRED STAFF

DATE OF PUBLICATION: 12.22.16.

TIME OF PUBLICATION: 7:00 AM.

NOT SO LONG ago, the internet represented a force for subversion, and WIRED’s list of the most dangerous people on the internet mostly consisted of rebellious individuals using the online world’s disruptive potential to take on the world’s power structures. But as the internet has entered every facet of our lives, and governments and political figures have learned to exploit it, the most dangerous people on the internet today often are the most powerful people.

A Russian dictator has evolved his tactics from suppressing internet dissent to using online media for strategic leaks and disinformation. A media mogul who rose to prominence on a wave of hateful bile now sits at the right hand of the president. And a man who a year ago was a reality television star and Twitter troll is now the leader of the free world.

Vladimir Putin

Since experts pinned the Democratic National Committee breach in July on two teams of hackers with Russian-state ties, the cybersecurity and US intelligence community’s consensus has only grown: Russia is using the internet to screw with America’s electoral politics. The Russian hack of the Democratic National Committee and the Democratic Congressional Campaign Committee, followed by the leak of those groups’ private communications, injected chaos and distraction into the Democratic party at a crucial moment in the electoral season, and may have even helped tip the scales for Trump.

Even before those Russian hackers’ handiwork came to light, Putin’s government was already hard at work poisoning political discourse online. Its armies of paid trolls have been busy injecting false stories into online discussion forums, attacking the Kremlin’s critics on Twitter and in the comments of news sites. Taken together, that hacking and trolling makes Putin’s government one of the world’s most malevolent forces for disinformation and disruption online. And if anything, recent events have only emboldened them.

Donald Trump

When WIRED compiled its list of the internet’s most dangerous people in 2015, we called Trump a “demagogue, more interested in inciting backward fears and playing to Americans’ worst prejudices than addressing global problems.” None of that has changed. Trump still hasn’t officially renounced his promises of a ban on Muslim immigration or apologized for calling Mexican immigrants rapists. Now, he’s weeks away from becoming President of the United States.

As President-elect, Trump has continued to act as the world’s most powerful internet troll, telling his 17.6 million Twitter followers that anyone who burns the American flag should be unconstitutionally imprisoned and have their citizenship revoked, and arguing, with no evidence, that millions of fraudulent votes were cast in an election that he won. Trump’s Twitter account telegraphs his apparent disregard for the Constitution, spreads disinformation on a massive scale, and has baselessly called America’s electoral process into question.

Steve Bannon

Before Steve Bannon joined Donald Trump’s campaign as CEO, he was already in Trump’s corner as the publisher of the righter-than-right wing news site Breitbart.com. During his tenure running that site, Breitbart published the racist, anti-semitic and overtly misogynist content that made it the paper of record for the bigoted new political fringe known as the alt-right. Now, as the chief strategist for Trump’s transition team coming presidency, he stands to bring that fascist agitprop perspective into the White House itself.

James Comey

In the weeks before November’s election, FBI Director James Comey cemented his already controversial reputation by revealing that his agents would continue the investigation into Hillary Clinton’s private email server, after previously setting it aside in July. He did not explain anything about what a newly found trove of emails entailed, or why they might be significant (they weren’t). That half-clue was all the Trump campaign and its surrogates needed to start a wildfire of speculation, and even to claim that Clinton would be imminently indicted (she wasn’t).

But even before Comey’s unwarranted insertion of the FBI into the most sensitive political moment of a tense election, the FBI head had led the federal government’s war on encryption to a dangerous standoff: demanding that Apple write code to help the bureau crack its own device, the locked iPhone 5c of San Bernadino killer Rizwan Farook. That six-week battle, which finally ended in the FBI finding its own method of breaking into the phone, showed Comey’s willingness to compromise Americans’ cybersecurity and privacy in the interests of surveillance, and put a lasting strain on Silicon Valley’s relationship with the FBI.

ISIS

The pseudo-religious apocalyptic cult known as the Islamic State may be losing money, resources, and ground on its home turf in Iraq and Syria. But its tendrils still extend throughout the web and social media. The group showed in 2016 that it can still reach lone, disaffected, and even mentally ill people to inspire tragic acts of violence. Even as its direct power crumbles, ISIS’s propaganda this year contributed to horrific massacres from the Bastille Day truck attack in Nice to the Pulse night club shootings in Orlando. And unlike the rest of the individuals on this list, ISIS’ danger comes from what social media extremism expert Humera Khan calls “the ISIS Borg collective.” The deaths of dozens of top ISIS commanders in 2016, in other words, hasn’t dulled the group’s message.

Milo Yiannopoulos

The Breitbart columnist Milo Yiannpoulos in 2016 illustrated everything that’s wrong with Twitter. Not simply his role as an “alt-right troll”—a polite term for a race-baiting, misogynistic, immoral fame-monger. Yiannopoulos graduated from awful ideas to actual targeted abuse, gleefully turning his hordes of followers on targets like actress and comedian Leslie Jones, who thanks to Yiannopolous was drowned in so much nakedly racist, sexist abuse that she temporarily quit the site. Twitter eventually banned him, a decision Yiannopolous lauded as only increasing his fame. And there are plenty more people who still espouse his ideas on the platform. But it will at least keep his vile statements confined to the darker corners of the internet, where they belong.

Recep Tayyip Erdoğan

For a brief moment this summer, the world feared that a military coup would topple Turkey’s elected president Recep Tayyip Erdoğan. Then it watched in horror as Erdoğan used that failed coup to justify a internet and media crackdown rarely, if ever, seen in modern democracies. More than a hundred Turkish journalists have since been jailed, and access has been intermittently throttled or cut to Twitter, Facebook, YouTube, and WhatsApp. In response to protests that have since embroiled the country, Erdoğan’s regime has at times cut off internet access entirely to millions of Turks, denying them both the means to assemble and spread dissident information, as well as basic services.

Julian Assange

Julian Assange proved in 2016 that even from the two-room de facto prison of London’s Ecuadorean embassy, it’s possible to upend the powers-that-be. In WikiLeaks’ most influential and controversial moves since it first rose to national attention in 2010, Assange masterminded the leaks of emails from the Democratic National Committee and the email account of Hillary Clinton campaign staffer John Podesta. Never mind that those leaks appeared to come not from internal whistleblowers but from external hackers, believed by US intelligence agencies to be on Russia’s payroll. Assange has denied that his source is Russian. But it’s a curious claim: WikiLeaks is designed to guarantee sources’ anonymity, so that even he can’t identify them. He also promises those sources he’ll “maximize the impact” of their leaks. And in this election, he kept his promise.

Peter Thiel

After supporting Donald Trump’s campaign financially and vocally, Peter Thiel ended this year as arguably the most influential person in Silicon Valley, literally sitting at the left hand of the president-elect in the tech industry’s meeting with him earlier this month. The intelligence contractor Palantir, which he co-founded, will no doubt rise with him, and its powers for privacy-piercing analysis could become more broadly applied within America’s intelligence and law enforcement agencies than ever before.

But we’ll leave all that for next year’s “most dangerous” list. Thiel’s real demonstration of his power in 2016 came in the form of Hulk Hogan’s lawsuit against Gawker, which the tech billionaire was revealed to have funded. The suit effectively wiped one of his personal enemies off the internet—which, as Thiel has calmly explained, was his goal. Given that win for censorship, his role on the Trump transition team, and Trump’s promise to “open up” libel laws, Gawker may just be the canary in the First Amendment coal mine.

Updated 12/22/16 2:30pm EST to include Peter Thiel.

https://www.wired.com/2016/12/most-dangerous-people-on-the-internet 

[&&]{**}[##]

December 22-23, 2016 — Snopes co-founder embezzled funds for prostitutes 

(in: WMR GENERAL ARCHIVES December 2016) 

Dec 22, 2016

Snopes called WMR a “disreputable web site” while it employed a porn actress and aberrant sex blogger.

[&&]{**}[##]

December 23-26, 2016 — “Fake News” and “Fake Intelligence” are the neocon stock-in-trade (in: GENERAL ARCHIVES December 2016) 

Dec 23, 2016

Neocons continue to lie about Russia as they did about the Soviet Union in 1981.

[&&]{**}[##]

Cybersecurity firm finds evidence that Russian military unit was behind DNC hack

Washington Post

somewhere around the turn of the solstice

A cybersecurity firm has uncovered strong proof of the tie between the group that hacked the Democratic National Committee and Russia’s military intelligence arm – the primary agency behind the Kremlin’s interference in the 2016 election.

[Ed.: Ayuh.]

[&&]{**}[##]

First, pizza…; now fried chicken

https://www.rt.com/viral/371518-snowden-tweet-kfc-confusion/ 

[Ed.: Does the future of covert communication lie in fast food?]

[&&]{**}[##]

“The US government is planning to quiz foreign travelers entering the country about their social media status.

Anyone entering the US from another country will face questioning about their Twitter and Facebook updates, in the hope that it will help to spot and curb security-related threats. Under the Visa Waiver Program (VWP) the US ask foreign travelers to provide their social media information. The VWP is for citizens of nearly 38 countries that do not require a visa for tourism, business or while in transit for up to 90 days when entering the US. However, they do need an Electronic System for Travel Authorization (ESTA) as a valid travel document, during which time their social media information will also be requested….

However the proposal made by US Customs and Border Protection (CBP) in June had faced months of criticism from many tech giants and privacy campaigners, who believe this to be an invasion of people’s lives and privacy. Nonetheless, it was recently given the go-ahead by the Department of Homeland Security. ….”

Read more:

https://en.ria.ru/us/201612231048934370-us-foreign-travelers-quiz/ 

[&&]{**}[##]

How an Evidence-Free CIA Finding Alleging Russian Interference in the US Election was Turned into an Indisputable ‘Truth’

By Stephen Gowans

Global Research, December 19, 2016

What’s Left 17 December 2016

An excerpt:

“… The US newspaper of record reported that “two Russian hacking groups” were “found at work inside the D.N.C. network,” “Cozy Bear and “Fancy Bear.” Cozy Bear, according to the newspaper, “may or may not be associated with the F.S.B., the main successor to the Soviet-era K.G.B”

(emphasis added.) Fancy Bear, it turns out, also may or may not be associated with the Russian government, in this case, “the G.R.U., Russia’s military intelligence agency.” Nevertheless, the New York Times revealed that both groups are “believed” by Washington to be Russian government operations (though they may or may not be.) [4]

How was this belief arrived at? Through a process the New York Times describes as attribution, “the skill of identifying a cyberattacker.” This is a fancy way of describing conjecture. Attribution is “more art than science,” the newspaper concedes, while acknowledging that it “is often impossible to name an attacker with absolute certainty.” [5] Finding water with a divining rod, and predicting the future with a Ouija board, are also more art than science, and both involve the process of attribution, the skill of identifying hidden water and hidden events, though it is often impossible to find water, and foretell the future, with absolute certainty. Divination and CIA analyses apparently have much in common. ….”

Read the entirety here:

http://www.globalresearch.ca/how-an-evidence-free-cia-finding-alleging-russian-interference-in-the-us-election-was-turned-into-an-indisputable-truth/5563458 

[&&]{**}[##]

“Newspeak” and the Duplicity of Mainstream Journalism

By Julian Rose

Global Research, December 22, 2016

“… Real journalism can now only be found on discerning alternative media sites. Please note that I said ‘discerning’. Main stream journalists who knowingly distort the truth, especially in life and death situations, should be considered as directly complicit in crimes against humanity…..”

http://www.globalresearch.ca/news-speak-and-the-duplicity-of-mainstream-journalism/5563834 

[&&]{**}[##]

Seven Times [with video] The MSM Got Destroyed In A Debate In 2016

http://www.washingtonsblog.com/2016/12/64454.html 

[&&]{**}[##]

https://www.youtube.com/watch?v=w42CTq5QZtI

[&&]{**}[##]

Edward Snowden: Don’t Rely on ‘Referee’ to Censor ‘Fake News’

Original article “Snowden did not state whether he believed the claims that ‘fake news’ had swung the election in any way but rather pointed out the dangers of companies using terms like ‘fake news’ to censor content with which they disagreed. Snowden stated that rather than waiting for gatekeepers to define what is and isn’t ‘fake news,’ people should have an open dialogue with each other and point out proven facts.”

via

http://www.strike-the-root.com 

[&&]{**}[##]

Ideas are welcome.

http://www.moonofalabama.org/2016/12/false-news-by-omission-misinforms-pointing-such-out-may-soon-be-censored.html 

sinister designs

I went back to that link I put up in the last Occurrences post, the one from James Fetzer about Jade Helm going live with an EMP tomorrow in Texas. Because I set it aside hastily for future review, I did not realize the enormous length of audio material we are asked to listen to.  

It seems that if Fetzer (who seems confortable with audio and video technologies) wants us to understand something quickly, it is incumbent upon him to summarize and edit.  Fetzer is a professor emeritus, as he reminds everyone regularly, with credentials  in critical thinking, and was once a US Marine Corps officer.

I want to like Jim Fetzer and generally I think he makes his points well with regard to JFK/Dealey Plaza, the Wellstone murder, and other more recent state crimes against democracy, but in the audio method he uses, we are to listen to two people agree with one another and repeat reams of information we  most likely already know about.  If he is trying to reach people who are ignorant or in denial, he needs to turn and face the congregation, not the choir. If you are going to attend his particular church, you’re neither ignorant nor in denial.

The first link inside his package was to a Project Camelot interview:

https://www.youtube.com/watch?t=23&v=lAFsXL1fe4A (34:25)

It contains the following key phrases and concepts: normalcy bias, retro-causality, “the Rabbit Hole”, the prior proven existence of drills going live, the existence of Presidential declarations regarding emergency powers, take five minutes of the day to look it up, and Operation Condor. You get to resonate within yourself privately as to whether this has credibility.  

(If you don’t know about Operation Condor, consult  http://www.latinamericanstudies.org/chile/operation-condor.htm

and

https://en.wikipedia.org/wiki/Operation_Condor. )

Reference is made to an earlier interview with Dale Lewis which is here: https://www.youtube.com/watch?v=xzq9rlsmlUQ

but I don’t think you need to watch that if you’ve watched the one which is chronologically later but posted here earlier.  It does contain enough summary and reference.

 

As an aside, let me say that I generally don’t go near Facebook and I’ve posted a lot of information about how Facebook itself is a platform for psy op games. I do not have a Facebook page and I don’t post on Facebook.  Other people have linked to my blog on Facebook and that’s okay; I have no control over what other people do.  I have enough work to make sure I am doing my own homework and remain as accurate and credible as possible. I stand behind my work, or stand to be corrected or informed better.

I did meditate briefly on the trapezoidal pathology of paranoia, surveiilance, and the nature of being control freaks. I thought maybe I should find again that book by Draffan and Jensen entited Welcome to the machine; if it is not on your bookshelf, it should be.  I also have read and strongly recommend the other books noted at the bottom of that link,  That comment will get me another tick on the checklist next to my name in the big database out in Utah.

 

 

https://www.youtube.com/watch?v=ewJL0Yeqq9g 

The two-hour interview linked right above is breathless and regurgitant in nature and gets to the Walmart question at the half-hour mark.  The Real Deal broadcast(s?) sometimes strike me as a mechanism that allows two people to rant and one to demonstrate how smart he is. But at about the 40-minute mark, Fetzer shows us how smart he is by making a powerfully-insightful point about military logistics and POL and he and his guest note that the drills include practice (using crisis actors) on repressing crowds demanding food and water. The slides, which are fuzzy and not always clearly sourced, beginning at the 43-minute mark, go back to the Walmart question. “Anyone who’s capable of reflection”, the cognitive dissonance of denial, “Winter Soldier”  and sinister designs become functionally-key phrases. 

“It’s all taking on a sinister design as we put more and more pieces together.” 

“When you look at the vast array of data points…”  

There is commentary about unreasonable search and seizure and a list of questions you can raise as they come knocking on your door, but when there are five or more people carrying advanced weapons and who are armored and wired at your doorstep who may or may not have used flash bangs or tear gas, I don’t think it’s a time to say “excuse me, but can I go and get the list of questions I set aside?”.  

How is it rational that we respond in a lawful and civil manner when the people at the door are acting in an unlawful and uncivil manner? 

http://allnewspipeline.com/images/seperate-military-and-police.jpg 

At the 1:06:00 mark, “Al” makes an important point about going outside one’s normal or chosen field of expertise to seek information and knowledge. 

This particular show’s focus switches frorm Jade Helm to the JFK assassination at about the 1:12:00 mark.  I didn’t watch the rest, or the other.  

 

The idea of being legally right and having the ability to sue after the fact in the middle of an illegal home invasion by armed military/police representatives of a power structure that has no real basis in legality and has been assumed by a series of coups d’etat, assassinations and subterfuge and maintained by intimidation, blackmail and corruption seems to be an exercise that is not worth my time (or yours). Talk about cognitive dissonance… 

If you can no longer participate within the system (and there are arguments for both sides), then what?

If you try to participate within the system but are ostracized because you have already done sufficient homework to know — for example — that steel frame buildings don’t melt, or if you are intimidated, put into a situation where you lose your income or have to engage an expensive lawyer to fight a trumped-up charge, then the system is not going to be responsive.  

[You can’t call people on their BS and their lies or else you get your ass handed to you.  I know this because I once documented to the Vice President for Procurement for Raytheon that the reason he didn’t get the newsletter was not because I failed to send it out properly but because his own mailroom threw it in the trash on arrival. [That’s where it belonged, given the degree to which the Board didn’t want to be terribly aggressive in addressing issues.] I was relieved of duty due to “administrative deficiencies” from the best-paying job of my life.]

What are your choices when the system locks you out of responsibility? (Jack Kennedy has a famous quote about this, but look where his passion and virtue got him.) Confrontational violence, or quiet preparation for same? But then you are already known, in jeopardy, or subject to harassment and seizure, imprisonment or death.

If death is the seemingly inevitable ending, then you need to read    

this

His other books on “unspeakable” things are among the best educational investments you can make. And they all point to the same “perps”, the very same ones at work behind Jade Helm. 

 

As I also noted in that last occurrencesforeigndomestic post, one possibility still left open is the path of dialogue and community. Then the question becomes this: How can a community and its members functionally communicate in a manner that is not subject to the surveillance, interference or harassment by an illegitimate system of authority?  

The Russians did it with samizdat in the repressive Communist era. The Iranians did it with cassette tapes during the reign of the Shah and SAVAK. People do it today via the Internet, although that is still subject to surveillance, interference and harassment. Some, even the authorities, have investigated paranormal means of communication; the transmission by thought alone is practiced, and it is also the subject of research to see how it can be circumvented, crominalized or weaponized. The Sons of Liberty met in back rooms over a pint of ale, penned correspondence, sent riders, and published political cartoons. 

It is late, on the real clock and metaphorically. Tomorrow arrives soon enough.  

We will know, I guess, whether an EMP event went down in Texas. There is an argument that says that publishing about possible or forthcoming false flag attacks or other similar incidents before they happen prevents them. Good thought, but difficult indeed to prove. On the other hand, we must ask how the continual cry of “Wolf!” helps.  

I think Fetzer is, on a broad basis, very right in saying that there have been enough data points that it is no longer deniable that something evil this way comes, that we are engaged in a battle with a hidden cabal of evil-doers and evil-enablers.  The only meaningful question is quickly becoming this one:

What are we going to do about it?

There needs to be a discussion among a number of people who command high levels of evidence (those who have collected the data points), those who command a good deal of social capital (i.e., have followers and effective methods for information dissemination, or who understand these technologies), etc.  

If the Special Ops soldiers who are practicing their craft are being armed with the latest in technoiogies — http://cryptome.org/2015/06/sof-wearables.pdf  — to harness the Internet, what kinds of aps do you have on your SmartPhone?  What kinds of abilities do you maintain inside your cranium?  Have you seen my e-book on how to use your mind over at http://boydownthelane.com/2015/05/13/summon-the-magic/?   Are you up-to-date on Dr. Joe Dispenza and Dr. Bruce Lipton? on knowing how to program your own mind?

I’ll go back to that paper I wrote years ago on coalescing disaster response through communities of practice and change the parameters.

We need:

  • people to sample for and verify evidence;
  • ethicists to grasp and communicate the human dimension;
  • strategists who can provide and assess options;
  • organizers to marshal and link resources and people;
  • someone to examine and appraise choices and the consequences of those choices;
  • someone with a good handle on group dynamics; and
  • seers and prophets who can peer into the future, perhaps only by examining the past.

And they have to figure out a way to share power. 

Brandon Smith, who probably qualifies for a seat at the table in that mythical panel discussion I noted, penned a nice piece on the moral-code-for-the-post-collapse-world.  I’ve posted it previously, I think, but you ought to take a moment and read it. 

His thoughts on offering aid to those who might not deserve it is echoed beautifully in that film “The Impossible” when a badly-injured individual with responsibilities not only to herself but to her son and her missing sons and husband stops to rescue someone else. And he says:

“There is no problem we cannot solve and no opponent too large. We do not know the meaning of the word “impossible.” We operate best under pressure and during disaster. We move to disrupt crisis before it begins when possible, and we refuse to stand back as spectators when crisis does develop. We work diligently to master all knowledge and training that could be used to achieve our goal, which is a free, prosperous and independent citizenry. We do not seek leadership over others; we only wish to teach others how to lead themselves. We will not stop until this goal is accomplished or until we are no longer breathing. We are not mutable or flexible where tyranny is concerned. We are entirely uncompromising.”

I was searching around for the graphic I was going to put up top and, in the search, I found the one that appears above in the middle of the text above and it from a web link I noticed was in Fetzer’s slide group.

 So I found that web site and poked around (turned over a few rocks as it were) and what I found in here made me sit up straight, and then go and make a cup of coffee: the night was suddenly gonna go a little longer.

“… according to the Palantir Blog, there are now more than 21 million American Veterans across the country; men and women who have served America in uniform in wars including WW2, the Gulf wars, Vietnam and Korea. According to the 1st map above left taken from the Palantir Blog, those US Vets are now living largely in ‘sun belt’ areas of the US including Southern California, Nevada, Arizona, Texas and Florida.

Coincidentally, or not, many of those same states are now being targeted by Jade Helm 15… Coincidentally, or not, many of those same states are now being targeted by Jade Helm 15 as seen in the map on top right showing states that have been linked to JH15 and, as radio show host Pete Santilli shares with us in the 1st and 2nd videos below, two Bilderberg attendees’ ‘Veterans Database’ from Palantir matches the ‘Jade Helm’ map as seen directly below, superimposed over ‘Veterans by Geography’ map, almost perfectly.  Beginning at the 2:45 mark of the 1st video, Santilli asks that this information be spread far and wide, especially amongst US Veterans, as we learn that two attendees of Bilderberg,  Peter Thiel and Alex Karp,  have created the database on US Veterans at Palantir that has so infuriates Santilli as he tells us in the video below. Why would Thiel’s database targeting US Veterans match up nearly perfectly with Jade Helm 15’s geography? Is this more proof US Vets are being targeted?”

Well, folks, this makes what I have already posted about Palantir [see created by elves ] come into sharp focus. It looks like the apps for SmartPhones created by DARPA, the same folks behind the pdf at the Cryptome link above, were given a test run at the Boston Marathon bombing. Maybe they were concerned that the minute men of the current day would be responding to the mass state police presence (pardon the pun). 

That’s what you’re up against. 

How smart is your phone? How smart is the fellow carrying your phone? 

I’m still shivering over the remarks by the CEO of Beth Israel hospital who commandeered in photo-bomb fashion the press conference telling the world about the status of the Tsarnaev brother who was killed. 

 

 

 

Added three hours after posting:

http://rt.com/usa/267163-texas-cuero-explosion-fire/  [photos, video, tweets]

The explosion took place at around 8:30 pm Sunday …imagine that.

https://en.wikipedia.org/wiki/Cuero,_Texas