Episodes

Monday Oct 21, 2024
Monday Oct 21, 2024
Magic as Matter Manipulation: A Comparative Analysis with Computer Programming
Watch on Rumble: https://rumble.com/v5jhqtp-magic-as-matter-manipulation-a-comparative-analysis-with-computer-programmi.html
Introduction
The concept of magic has intrigued humanity for millennia, often shrouded in mystery and attributed to supernatural forces or spiritual entities. However, a more rational approach suggests that magic might be a manipulation of matter, similar to how computer programming manipulates bits and bytes. This broadcast aims to explore this parallel, examining the similarities between magic spells and computer code, especially in terms of their underlying mechanisms and their interactions with hardware.
Magic as Matter Manipulation
Traditional interpretations of magic often involve invoking spirits or deities to perform supernatural acts. However, a more scientific perspective posits that these acts might be achieved through the manipulation of matter at a fundamental level. This could involve altering the properties of substances, controlling energy flow, or influencing the behavior of particles.
Computer Programming as Matter Manipulation
Computer programming, at its core, is the process of instructing a machine (hardware) to perform specific tasks. This involves manipulating the physical state of the machine's components, such as transistors, to represent and process information. In essence, programming is a form of matter manipulation, albeit at a microscopic level.
Similarities Between Magic Spells and Computer Code
Input and Output: Both magic spells and computer programs require input to produce desired outcomes. In magic, this input might be in the form of incantations, rituals, or the use of specific objects. In programming, it involves data or user interactions. The output of both can be physical manifestations, such as healing or object creation, or informational, such as a calculated result or a visual display.
Algorithms and Procedures: Magic spells often involve a sequence of steps or rituals that must be performed in a specific order to achieve the desired effect. Similarly, computer programs follow algorithms, which are sets of instructions that guide the machine through a series of steps to accomplish a task.
Conditional Statements and Loops: Both magic and programming utilize conditional statements and loops to control the flow of the process. In magic, these might be represented as "if-then" statements or repeating rituals. In programming, they are implemented using conditional statements (like "if" and "else") and loops (like "for" and "while").
Hardware Interaction: Just as computer programs interact with hardware components (like CPUs, memory, and I/O devices) to perform their tasks, magic spells might involve interacting with physical objects or the environment. This could be as simple as using a wand to channel energy or as complex as manipulating the elements.
Case Studies: Comparing Magic Spells and Code
To further illustrate the similarities between magic spells and computer code, let's examine a few examples:
Healing Spells vs. Medical Software: Both involve manipulating biological systems to restore health. A healing spell might involve directing energy to damaged cells, while medical software can analyze patient data and recommend treatments.
Levitation Spells vs. Robotics: Both involve controlling the movement of objects. A levitation spell might manipulate the gravitational forces acting on an object, while a robotic system uses motors and sensors to achieve controlled movement. Or can use antigravity mercury spun machines to achieve the same effect.
Divination Spells vs. Data Analysis: Both involve extracting information from data. A divination spell might involve interpreting symbols or patterns to see the fture or someone’s actions, while data analysis techniques use algorithms to identify trends and insights.
While the concept of magic often evokes images of supernatural forces, a closer examination suggests that it might be rooted in the manipulation of matter using natural elements. By drawing parallels between magic spells and computer programming, we can gain a deeper understanding of the underlying mechanisms involved in both. This perspective not only demystifies magic but also highlights the potential for technological advancements inspired by ancient practices.
In the previous response, I established a foundation for comparing magic spells and computer programming as forms of matter manipulation. This section will delve deeper into specific examples, exploring how various magical practices can be interpreted as interactions with physical systems.
Specific Examples: Magic and Matter Manipulation
Elemental Magic:
Fire Magic: This could involve manipulating the chemical reactions of combustion, controlling the flow of heat energy, or altering the properties of materials to make them more flammable.
Water Magic: This might involve controlling the surface tension of water, manipulating the phase transitions between liquid, solid, and gas, or influencing the electrical properties of water molecules.
Earth Magic: This could involve altering the physical properties of rocks and soil, controlling geological processes like erosion and sedimentation, or manipulating the electromagnetic fields associated with the Earth's crust.
Air Magic: This might involve controlling the movement of air currents, manipulating atmospheric pressure, or influencing the electrical properties of the atmosphere.
Illusion Magic:
This could involve manipulating the perception of light and sound, altering the brain's interpretation of sensory information, or creating holographic projections using physical phenomena like diffraction and interference.
Healing Magic:
This could involve stimulating the body's natural healing processes, manipulating the molecular structure of cells, or influencing the flow of energy through the body's energy meridians (if such exist).
Divination Magic:
This might involve using physical phenomena like pendulum motion, muscle contractions (as in dowsing), or random number generation to produce meaningful information.
How These Examples Were Derived
These examples were derived by considering the underlying physical principles involved in various magical practices. For instance, fire magic often involves the manipulation of heat and light, which are physical phenomena. Illusion magic often involves manipulating perception, which is a cognitive process influenced by physical stimuli. Healing magic often involves influencing biological processes, which are governed by physical and chemical laws.
In World War 2, the Nazis were heavily into quantum physics as a parallel to black magic. They understood that magic was just a way of maipulating matter just like quantum mechanics. Quantum mechanics became their tool bag for trying to win the war by manipulating matter using black magic combined with transisters.
In the book The Nazis and the Occult: The Dark Forces Unleashed by the Third Reich, by Paul Roland, Paul provides proof that the Nazis wanted to find power sources from the occult to be used in warfare.
Main Themes:
The role of occultism and esoteric beliefs in shaping Nazi ideology and practices.
The influence of key figures like Guido von List, Jörg Lanz von Liebenfels, Friedrich Nietzsche, and Richard Wagner on Hitler and the Nazi movement.
The alleged use of astrology, psychic phenomena, and ancient myths to justify Nazi ambitions and atrocities.
The psychological profile of Adolf Hitler and its potential connection to his fascination with the occult.
Important Ideas & Facts:
Ariosophy and the Roots of Nazi Ideology:
Ariosophy, a mystical-nationalist movement, provided a fertile ground for Nazi racial theories. Figures like Guido von List and Jörg Lanz von Liebenfels propagated the idea of Aryan supremacy and a mythical ancient German past filled with occult knowledge.
Von List believed in a superior Aryan race descended from the mythical Armanen brotherhood and saw the swastika as a sacred Aryan symbol.
Liebenfels, a former monk, established the Order of the New Templars, a racist and anti-Semitic organization that influenced Hitler's views on race and eugenics.
The Influence of Nietzsche and Wagner:
The philosophical ideas of Friedrich Nietzsche, particularly his concept of the "Übermensch" (Superman), resonated with Hitler's vision of a dominant Aryan race.
Richard Wagner's operas, imbued with themes of Germanic mythology and heroism, provided a powerful artistic backdrop for Nazi ideology. Hitler admired Wagner's music and incorporated its themes into his speeches and rallies.
Hitler's Obsession with the Spear of Destiny:
The book details Hitler's alleged fascination with the Spear of Destiny, believed to be the lance that pierced the side of Christ. He saw it as a symbol of power and destiny and allegedly believed it would grant him supernatural abilities.
Astrology and Prophecy in the Third Reich:
The Nazis, particularly Heinrich Himmler, are said to have consulted astrologers and dabbled in various occult practices.
The book explores claims that Hitler's rise to power was predicted by astrologers and examines the use of astrology by the Nazis during World War II.
Psychological Profile of Hitler:
The author analyzes Hitler's psychological makeup, suggesting that his childhood trauma, hatred for his father, and over-identification with his mother contributed to his distorted worldview and megalomania.
This psychological analysis attempts to explain Hitler's susceptibility to occult beliefs and his craving for power and control.
The Nature of Evil:
The book raises questions about the nature of evil and its role in the Nazi regime. It explores the possibility that the Nazis were not merely driven by political ambition but by a deeper, more sinister force.
Quote: "If something profoundly evil does not lurk behind Germany's present tyranny, where, indeed, is evil to be found?"
Key Quotes:
Hitler on Wagner's music: “When I hear Wagner it seems to me that I hear rhythms of a bygone world."
Hitler on his destiny: "I slowly became aware of a mighty presence around it - the same awesome presence which I had experienced inwardly on those rare occasions in my life when I had sensed that a great destiny awaited me."
Goebbels on Hitler: "He is the creative instrument of fate and deity. I stand by him deeply shaken ... He seems like a prophet of old."
Himmler on racial purity: "What happens to the Russians, what happens to the Czechs, is a matter of utter indifference to me. Such good blood of our own kind as there may be among the nations we shall acquire for ourselves, if necessary by taking away the children and bringing them up among us."
Evaluation:
The book presents a compelling, albeit controversial, exploration of the Nazi fascination with the occult. While some claims might seem speculative and sensationalized, the author provides historical context and references various sources to support his arguments. It prompts readers to consider the complex interplay between ideology, psychology, and the allure of the unknown in the rise of one of history's most horrific regimes. Although the book does not talk about computers, as they were not invented just yet, it does show the origin of bringing black magic into the technological world.
Programming is magic. It’s borderline practicing witchcraft.
Here are the similiarties when practiced - tongue in cheek:
Your power increases with your knowledge.
Sometimes things just go completely out of wack and you have no idea why.
If you break something, only you or someone with far superior power can fix it.
You need to constantly reference your resource materials, because containing all that information in your head is impossible. But you do have a few go-to tricks that never fail you.
Certain numbers have some sort of unexplained intrinsic goodness. And some numbers are just pure evil.
Certain things just are the way they are based on some outdated arcane rules and nobody likes it but it’s too late to change now.
It’s fun to learn a new thing and then try it out and practice it and get better at it.
You have a familiar. It may or may not be made of rubber and it may or may not squeak.
You can always be seen with your tool of the trade. Without it, you are mortal.
You get to choose your specialty. If you find yourself going down the wrong path you can usually adjust with not too much difficulty.
People in certain specialties tend to stick together, while keeping up a rivalry with those not in their specialty. Sometimes these rivalries can get a little out of hand.
In the right circles, people will be impressed by your abilities. But in the general public, you’re a lowly geek.
In another book called The Magic Machine: A Handbook of Computer Sorcery by, A. K. Dewdney,
The book explores diverse computational concepts, including fractal geometry, chaos theory, artificial life, and cryptography, through the lens of "Computer Recreations," a popular Scientific American column Dewdney authored.
Visualizing the Abstract: The book emphasizes the power of visual representations to illuminate complex mathematical ideas. Iteration diagrams, fractal landscapes, and cellular automata simulations transform abstract equations and algorithms into captivating visual experiences.
"Strange that the serving vessel should excite more admiration than the food! Truchet tiles, our fanciful serving platters, turned out to interest nearly as many readers as the biomorphs and other delicacies."
Exploring Complexity through Simple Rules: From the Mandelbrot set to artificial life forms, Dewdney demonstrates how intricate patterns and behaviors can emerge from relatively straightforward rules iteratively applied.
"To introduce chaos, however, I have selected a different physical system. Imagine an arrangement of three amplifiers...The pattern of doubling and redoubling goes on as the knob controlling r is turned to higher values, until at a setting roughly midway between 3 and 4 the circuit suddenly goes crazy."
The Potential of Nanoscale Computing: Dewdney delves into the theoretical realm of nanotechnology, envisioning mechanical nanocomputers built with "rod logic." He describes the intricate workings of logic gates at the atomic scale, pushing the boundaries of computational possibilities.
"Microchips are small...Drexler now asks us to consider a computer that would fit inside a single silicon transistor!"
Computer Science as Playful Exploration: The book embodies a spirit of playful inquiry, encouraging readers to experiment with code, tinker with algorithms, and discover unexpected patterns and possibilities within the digital realm.
"Readers are free, like de Jong, to invent their own bizarre, four-parameter formulas and to explore their iteration diagrams. Perhaps they will even be used to generate my hypothetical film."
Key Concepts and Facts:
Iteration Diagrams: These visual representations illustrate the behavior of mathematical functions when applied repeatedly. They reveal intricate structures like the components of squared numbers modulo n.
The Mandelbrot Set: Described as a "superset" of Julia sets, this iconic fractal arises from iterating a simple complex function and exhibits infinite complexity within its seemingly simple boundary.
Chaos Theory: Simple deterministic systems can exhibit unpredictable, chaotic behavior, as demonstrated through the example of a circuit with three amplifiers.
Fractal Geometry: Fractals, like mountains and coastlines, possess a fractional dimension and exhibit self-similarity across different scales.
Cellular Automata: These discrete computational models, exemplified by Conway's Game of Life, demonstrate how complex patterns can emerge from the interactions of simple cells following local rules.
Artificial Life: L-systems, a class of formal grammars, can generate intricate plant-like structures, blurring the lines between computation and biological forms.
Nanocomputers: Drexler's concept of "rod logic" employs molecular rods to perform logical operations, envisioning computers operating at the atomic scale.
Cryptography: The book explores encryption techniques, from the Enigma machine to public-key cryptography, highlighting the interplay of mathematics, computation, and secrecy.
Quotes:
"The four-dimensional prize for initiative goes to Winston D. Jenks...Not content with ordinary complex numbers, Jenks invented his own, four-part numbers."
"Near the set’s boundary are points that have very high dwell values. For such points it may take a million iterations before the Mandelbus equals or exceeds the critical value."
"Would a lighter lubricant work? Even if kerosene were substituted for oil, viscosity would increase. As Drexler has pointed out, however, 'from the perspective of a typical nanomachine, a kerosene molecule is an object, not a lubricant.'"
"Cellular automata are stylized, synthetic universes...They have their own kind of matter which whirls around in a space and a time of their own."
"The intermediate result is ungrammatical, nonsensical, ridiculous garbage...but not always. Among the many lines of garbage there always lie a few lines to which one responds."
"The code generated in that way is provably unbreakable because the resulting ciphertext does not have the slightest pattern that can be exploited by a cryptanalyst."
Concluding Remarks:
These excerpts offer a glimpse into the fascinating world of "Computer Recreations" as presented by A.K. Dewdney. They showcase the power of computation to generate visual beauty, simulate complex systems, and explore the very frontiers of what is possible at the intersection of mathematics, technology, and imagination. Although not referencing computers to black magic, the concepts in the book share the same as in black magic.
Programming and hardware is getting us closer to immortality. As we advnace in quantum computing and AI, we are using this magic to give us knowledge we could not have found without. For example, Bitcoin gives out highly improbable mathmatical equations for a cluster of computers to figure out. When the answer is found, the cluster or single cimputer gets an award. A coin. Believe it or not, these solved problems are fed into the NSA to help solve the problems of merging iron with clay. The same thing Daniel spoke about that would happen in the end of days. He says iron will have problems mixing with clay and in the end of days, they find a way.
Computers are now studying elements and how they can be merged together even though they don’t belong. Like oil and water. They are using quantum computing to solve the issues of mixing substances that nature deosn’t intend to be mixed. This is the ultimate blaspheme against God and his creation. It’s a way of playing God that leads man to saying we don’t need him anymore.
This next thought comes from magicians who agree black magix and computers are the same: In the formless days, long before the rise of the Church, all spells were woven of pure causality, all actions were permitted, and death was common. Many witches were disfigured by their magicks, found crumpled at the center of a circle of twisted, glass-eaten trees, and stones which burned unceasing in the pooling water; some disappeared entirely, or wandered along the ridgetops: feet never touching earth, breath never warming air.
As a child, you learned the story of Gullveig-then-Heiðr, reborn three times from the fires of her trial, who traveled the world performing seidr: the reading and re-weaving of the future. Gullveig is solely attested in a stanza of Völuspá (Prophecy of the Völva) immediately preceding the story of the Æsir–Vanir War.[4] A völva (seeress) recalls that Gullveig was pierced by spears before being burnt three times in the hall of Hárr (one of Odin's names), and yet was three times reborn. Presumably after her burning, Gullveig became known as Heiðr, a knowledgeable völva who could perform great feats:
Her foretellings (and there were many) were famed—spoken of even by the völva-beyond-the-world—but it was her survival that changed history. Through the ecstatic trance of seidr, she foresaw her fate, and conquered death. Her spells would never crash, and she became a friend to outcast women: the predecessors of your kind. It is said that Odin himself learned immortality from her.
To this day, all witches owe Heiðr a debt. Few delve into the ancient, unstructured magic nowadays. The very languages in which your spells are written are stabilized with seidr in their syntax, channeling the energies you summon through safe paths—more or less. There are still occasional explosions, of course. They’re just… more of the eyebrow-singeing variety, than the type that result in new and interestingly-shaped fjørds.
According to this myth, the burned witch was purified via the elements and for some odd reason, the elements that were used to burn her had the right material to complete a magic spell or unnatural process that created immortality. Whether it was intentional or not, the rumor means, just like a quantum computer by processing the correct code, will complete an outcome.
Now the real question. Is programming evil? Should all programmers stop what they are doing and repent? No. The basis of computations and hardware solidfying a product or service is based on the heart of the programmer(s). We are led to believe that all magic is evil via the Bible and through entertainment there are good and bad witches.
Although mixing elements that don’t belong together naturally seems evil, we can create things like transparent aluminum which would benefit mankind for importing and exporting goods instead of steal. The weight and clearness of the element helps in cost of energy and gives an inside view of what’s there. Is that evil? Only if it’s used as evil.
Remember in Genesis when the Trinity was talking to itself when it said behold mankind has now become like one of us, knowing good and evil. He must not be allowed to reach out his hand and take also from the tree of life and eat, and live forever. I believe God was impressed with the achievements but disappointed at the same time. A bittersweet moment where his own creation, with the help of fallen angels, had created god like status using the elements of the third dimension. This means, nothing new is under the sun. We have done this before. It got so out of hand that God had to flood the earth to get it back to it’s natural state. It’s not that God wants us to be stuck in this fallen world without advancing to a utopia of clean energy and space travel. If there is a space. Rather, the God of this world has held us hostage and is trying to end the reign of the fallen ones, which to God, it has only been 6 days as 1,000 years on earth is a day in heaven. During the hostage negotiation, 2,000 years ago, God planted his son Jesus, which caught the handlers off guard. They were not sure what Jesus was doing and killed him. This was a big mistake as his son followed all rules of spirit and matter to become the unblemished sacrifice which he was granted the rights to the keys of death and hell. Now, 2 days or 2,000 years later, God is cleaning up the mess.
Is it evil or good to cast a spell? Again, it’s in what the heart wants. If you cast as spell with the intention of wanting something, you are in error of the bible as King David said he shall not want. God provides our needs to we not want. Want is evil. It’s coveting your neighbor. It’s getting something you don’t deserve or manipulated matter or people to receive. If we are programming for want, it is evil. If we are programming for loving our neighbor, it is justified, meaning, the program is used to help people instead of exploiting. If one must manipulate matter for any reason, they are sinning against nature itself. The question should be asked, what is so important that you need to go outside of your natural state and manipulate it for something? Whether it’s for loving your neighbor or not, you are going beyond what we are told to do. Just pray about it. Don’t force God’s hand.
Computer programming is creating magic and casting spells in order to bypass nature and it’s timing. We have everything we need right here and now yet we make justification that technology improves lives. In order to create that technology, we must unearth thousands of miles of land to build things that do not decompose. One could argue how long a motherboard takes to decompose over a blacksmith pioneer village using just iron and wood. I can assure you, that plastics and exotioc metals remain longer underground.
In order to make witchcraft mainstream, the bloodlines created industrial revolutions and gave us trinkets and radios to satisfy our fleshly lusts while they slowly incorporated their spells into code and hardware. The occult uses numbers, symbols and earth elements to cast spells. Aren’t these things just computers but more defined and purified? Like the witch that was burnt three times, the story of Gullveig gave the idea to warlocks and wizards to experiment and write down their findings. These spell casters are nothing more than early scientists finding the releations of matter and spirit.
Occultists use the numbers 322 as a reminder of Genesis 3:22 where the father said to his son and spirit that man has learned the knowledge of good and evil. Skull and Bones, a Yale secret society, uses 322 as their base number. Mocking God that they now have the knowldge and will use it to grab a hold of the tree of life. They are saying we are working our way to mortality and science (which is just casting spells cleaner and faster) is our gateway (technology). Whether evil or not, they will not stop until they do create immortality on earth. This is where the bible says men will seek death and not find it.
The irony is we have to exploit our resources to the maximum in order to become a gad. This means, we have to kill the earth and most of our neighbors to achieve this magic spell. North Carolina is the example. Blackrock hired the Department of Defence to create and manipulate a hurricane to destroy the area where Block Rock’s subsidiary company is mining for Lithium and Crystals for technology. The lords of the land know that they have to gather as much elements form the earth as possible because the earth only provides so much to achieve their goals. I believe God knew they would do this and created the exact amount needed for this quantum utopia. Not in a good way, though. Meaning, consumerism destroyed a fair amount of resources for them to achieve this goal if immortality and they will have to go back to the garbage piles to extract waste they inadvertantly misused.
Is God mad at us? No. he’s not even in a bad mood. This all heppened before and he dealt with it then. He’s not mad at amn at all since it was his first children that created this mess to begin with. This gives justification for men to do evil in the first place. They know they are not on the hot seat. But with God, as Jesus said, all things are possible. Technology never belonged here. wisdom tells us we can go back to farming and villages and be perfectly fine. But that choice will never happen. The bloodlines that have controlled things for 6,000 years are not interested in anything but Godhood. David Rockefeller held on until he late 90’s and stole organs from the trafficked to stay alive before we had the technology. He admitted he was after a new world order and godhood. Rumor is his spirit has been captured and they will incorporate him in a body at a later time. I don’t buy that. But when man does grab a hold of the tree of life, which I don’t think we have gotten there yet, they most definitely will create clones and try and live forever. They just have this one problem. That pesky son of god returning. But they hate God so much they will go down trying.
So the real question is, what is the tree of life? Will technology be the bridge to reach it? Well, there is evidence that it was found once before. The tree of life has been found in multiple locations, including in the Bahrain desert, in Olympic National Park, and in Australian lakes:
Bahrain desert: The Shajarat-al-Hayat, or "tree of life", is a Prosopis cineraria shrub that has survived in the desert for over 400 years. The tree is located on a sand dune in the middle of the desert, and is believed to have been planted in 1583.
Olympic National Park: The Tree of Life, also known as Tree Root Cave, is a tree with visible roots that seem to provide life without soil. It's located on the beach near Kalaloch Campground, just north of Kalaloch Lodge.
Australian lakes: A spectacular "tree of life" has been found in an Australian lake.
The tree of life is also a concept that describes the genetic connections and relatedness of all organisms. Scientists are still working to reconstruct the evolutionary branches of the tree of life using tools like genomic data and statistical algorithms.
Scientists or wizards are genetically modifying their chromosomes and believe they finally have found the answer.
Accodring to Popular Mechanics, In 2023, scientists have found from the tree of life both the non-animals and the comb jellies, finding 14 groups of genes located on separate chromosomes. But in the sponges, researchers found that those 14 groups had been rearranged into 7 groups, indicating that they split off from the original genome later than the comb jellies.
This means, the tree of life, in it’s roots, split off a jelly and a sponge. Or Adam and Even. Which means the sister to all animal life is the comb jelly or eve. Having the tree of life and both adam and eve chromosomes could be the bridge to the secrets to living forever. Remember, before the fall, Adam and Eve were gods. For wizards or scientists to finally find the branch of the tree of life, they can now casts spells or use computations to unearth so to speak the secrets to everlasting life. Turns out, the knowledge of everything will be found in everything. But we couldn’t have achieved this without destroying everything. And that is how you give life for life in a fallen thermodynamic world.
sources
https://www.reddit.com/r/ProgrammerHumor/comments/nzwzx5/programming_is_literally_magic/
https://aphyr.com/posts/342-typing-the-technical-interview
https://en.wikipedia.org/wiki/Gullveig
https://www.popularmechanics.com/science/animals/a43993880/scientists-find-first-branch-on-tree-of-life/
https://www.amazon.com/Magic-Machine-Handbook-Computer-Sorcery/dp/0716721449
https://www.amazon.com/Nazis-Occult-Forces-Unleashed-Third/dp/1848588380

Sunday Oct 20, 2024
Sunday Oct 20, 2024
Tammany Hall & The Alfred E. Smith Memorial Foundation Mafia Dinner
Watch this on Rumble: https://rumble.com/v5jd2cl-tammany-hall-and-the-alfred-e.-smith-memorial-foundation-mafia-dinner.html
Tammany Hall and the Al Smith Memorial dinner is not a Catholic Charity for children, rather, it is Jewish mafia party called Tammany which specializes in rigging elections through muscle power. Tammany hall is a new york city political organization incorporated on May 12, 1789 as the Tammany Society. The two candidates that get roasted at the party are the picks that the party had manipulated to get to the top. Both candidates are under their control so it doesn’t matter who you vote for. They own them. Then they have a televised show mocking the people for falling for their schemes.
This dinner, which many Trump supporters think Trump’s roast of Hillary and recently Kamala was where he stood up to the cabal, is and was nothing other than a club of jews who use this as a mockery against the American people as they continue rigging elections and engage in human trafficking. The society from the beginning was all about slavery of the native americans and control of all agriculture. Instead of helping the migrants, especially the Irish, the society created a deliberate Irish potato blight famine that caused a mass exodus of migrants to the United States for cheap labor and votes.
In fact, the history of Tammany Hall is long and full of gruesome tactics going back to the Quakers who were Jewish Rothchild agents that has been exploiting America. The word Tammany is mockery slang for what Quaker William Penn quoted after he murdered America’s Patron & Saint Red Indian, Chief Tamanend. Tamanend was the leader of the Lenni-Lanape tribe, and the belt held in the eagle's talons signifies a friendship treaty agreed upon between Penn, Tamanend, and other Native Americans. Revered by many as a symbol of peace, Tamanend was named a “Patron Saint of America,” and May 1st was considered “Tamanend Day.”
According to academia, the front of Tammany Hall, also known as the Society of St. Tammany, the Sons of St. Tammany, or the Columbian Order, was an American political organization founded in 1786 and incorporated on May 12, 1789, as the Tammany Society. The society was originally developed as a club for "pure Americans". Same Khazar Nazi occult. It became the main local political machine of the Democratic Party and played a major role in controlling New York City and New York State politics. It helped immigrants, most notably the Irish, rise in American politics from the 1850s into the 1960s. Tammany usually controlled Democratic nominations and political patronage in Manhattan for over 100 years following the mayoral victory of Fernando Wood in 1854, and used its patronage resources to build a loyal, well-rewarded core of district and precinct leaders; after 1850, the vast majority were Irish Catholics due to mass immigration from Ireland during and after the Irish Famine of the late 1840s.
The Alfred E. Smith Memorial Foundation Dinner, commonly known as the Al Smith Dinner, is an annual white tie dinner in New York City to raise funds for Catholic charities supporting children of various needs in the Archdiocese of New York. Held at New York City's Waldorf-Astoria Hotel on the third Thursday of October, it is hosted by the Archbishop of New York. It is organized by the Alfred E. Smith Memorial Foundation in honor of Al Smith, who grew up in poverty and later became the governor of New York four times and was the first Catholic nominated for president by a major party as the Democratic nominee in the 1928 election.
Cardinal Francis Spellman founded and hosted the first dinner in 1945 after Smith's death the previous year. By 1960, the Al Smith dinner had become a "ritual of American politics", in the words of Theodore H. White. It is generally the last event at which the two major party presidential candidatesshare a stage before the election. Apart from presidential candidates, keynote speakers have included Tony Blair, Tom Brokaw, Bob Hope, Henry Kissinger, Clare Boothe Luce, and many other prominent civic, business, and church leaders.
Since 1960, when John F. Kennedy (who would become the first Roman Catholic president) and Richard Nixon were speakers, it has traditionally been a stop for the two major party presidential candidates during election years. In 1976, Jimmy Carter and Gerald Ford spoke; in 1980, Carter and Ronald Reagan; in 1988, George H. W. Bush and Michael Dukakis; in 2000, Al Gore and George W. Bush; in 2008, Barack Obama and John McCain; in 2012, Barack Obama and Mitt Romney in 2016, Hillary Clinton and Donald Trump; and in 2020, Trump and Joe Biden. Candidates have traditionally given humorous speeches[13] poking fun at themselves and their opponents, making the event similar to a roast. The 2018 dinner raised $3.9 million.
Since 1980, this custom has been affected by friction between the Democratic Party and the Catholic Church over abortion. During the 1980 dinner, Democratic incumbent Jimmy Carter was booed. In 1984, Ronald Reagan spoke, but his opponent, Walter Mondale, opted out, saying he needed time to prepare for an upcoming presidential debate. Amy Sullivan suggests that Mondale's decision was motivated by "tensions between the Catholic Church and the Democratic Party."
During the 2000 dinner, George W. Bush joked, "This is an impressive crowd. The haves and the have-mores. Some people call you the elite. I call you my base." The quote was used in Fahrenheit 9/11 and subsequently in one of John Kerry's 2004 campaign speeches.
In 1996 and 2004, the Archdiocese of New York chose not to invite the presidential candidates. In 1996, this was reportedly because Cardinal John Joseph O'Connor was angry at Democratic nominee Bill Clinton for vetoing a bill outlawing some late-term abortions. The organizers' explanation was that the candidates had been unable to commit to attending the dinner. The vice presidential candidates, Al Gore and Jack Kemp, spoke instead. In 2004, Archdiocese spokesman Joseph Zwilling explained that the candidates were not invited because "the issues in this year's campaign could provoke division and disagreement," but some speculated that the decision was due to Democratic nominee (and Roman Catholic) John Kerry's pro-choice stance on abortion.
On October 20, 2016, Hillary Clinton and Donald Trump spoke at the dinner which was hosted by Cardinal Timothy M. Dolan, who was seated between the two presidential candidates during the event. During the dinner, Trump made numerous "off-color" remarks about Hillary Clinton, including references to the hacking of the email server of the Democratic National Committee, supported allegations of corruption, and a claim that Clinton "hates Catholics". His remarks drew boos and heckling from guests, prompting veteran GOP operative Ed Rollins to comment: “he didn’t quite understand the audience”. The 2016 dinner drew 10.3 million viewers and raised a record-breaking $6 million for Catholic charities.
The 2020 dinner occurred in a virtual format, due to the COVID-19 pandemic in New York City, and the traditional roast-like nature was abandoned. Trump and Joe Biden attended virtually; both men discussed Catholicism. Kamala Harris did not attend the 2024 dinner and instead sent a pre-recorded message to play during the event. She was the first presidential candidate to skip the dinner since Walter Mondale in 1984. Donald Trump, who attended the dinner, called Harris' decision not to attend "deeply disrespectful".
Very telling that Kamala didn’t attend since the Tammony party picked both Kamala and Trump to run that year. The jokes about her sleeping her way to the top were rampant. Everyone at that dinner are the movers and shakers of America including the Collins Family who actually is controlling American under the Jesuit command. Catholics have a dark history when it comes to children. This dinner is bizarre as the roasts are sinister and something just doesn’t add up. Raising money for children, (they raised 6 million - an occult number) roasting each other politically and eating fine food. It took me a while until I found an man from India who exposed all of this dirt.
The dinner takes place inside Tammany Hall, a New York City eugenists political organization incorporated on May 12, 1789 as the Tammany Society by a German Jew Rothschild who ruled India. The Tammany Society gradually emerged as the center of Democratic-Republican Party politics. Jew Al Smith (Alfred E Smith) served four terms as Governor of New York and was a king pin of Tammany Hall which controlled all of York City’s politics. He was not a Catholic as is being told by the Rothschild’s media. He was a Khazarian jew.
The Rothschild’s used Al Smith and his jewish wife Belle Moskowitz to negotiate agreements between employers and striking workers. Tammany has always been controlled by the Jewish Rothschild’s who controls both sides of the party system. US Presidential candidates have an Al Smith dinner every four years to roast each other for fun. A sick epectacle that the public are unaware that the elite are showing their power over you.
The Tammany Society was named after Tamanend, a Native American sachem, or chief who was murdered by Quaker Jew William Penn, a Rothschild agent, after whom Pennsylvania was named after. Tamanend led a tribe of the Lenapes in southeastern Pennsylvania and Delaware and was a pacifist by nature. Tamanend had sold 300 square miles of territory to William Penn for pennies.
Native Chief Tamanend and the Lenni-Lenape nation in the Delaware Valley was outiwtted and coerced into signing the Peace Treaty with William Penn. In 1683, Chief Tamanend, “sold this part of Bucks County to William Penn in a treaty of friendship as long as the grass is green and the rivers flow.” . This was a huge lie.
Penn and company kidnapped Chief Tamanend’s daughter. He had no choice but to give in to their demands, hoping to get his daughter back. His signature of a snake on a forged document agreeing to give away a huge tract of land to the Jewsih Quakers was forged. Red Indian Chief’s always affixed their signatures using their own blood on a thumb imprint. Fifty four years later, Quaker William Penn’s descendants broke the treaty with the fraudulent “Walking Purchase” by taking more land. When William Penn died, his son, Thomas Penn, did not honor the original treaty. He seized the Lenape land in 1737 and pushed the Lenape out of the Delaware Valley, soon after, Chief Tamanend was murdered by William Penn and coined the mocking phrase Tammany.
After Chief Tamanend was murdered, his entire Lenni-Lenape race was exterminated when the US Army gave them small pox blankets. All the Jewish Quakers were already immune to small pox having pox scar marked faced. Thomas Penn then commissioned a fake painting of the initial meeting between his father and Chief Tamanend, featuring a large American Elm as a witness to the event. History remembers it this way, but in reality, the Quakers lied, cheated and murdered their way into getting the entire land of now Pennsilvania.
This painting was widely reproduced and the “Penn Treaty Elm,” as it came to be called, would became a popular monument in Philadelphia’s Fishtown neighborhood. This site is known as Shackamaxon in the Lenape language. Today in American schools texts of the Red Indian Chief Tamanend is called Saint Tamanend, the patron saint of America and Tammany. America is a nation founded in kosher deceit.
Your Rothschild’s academia encyclopedias lie and say that Chief Tamanend (the “Affable One” in the native language) partnered with Quaker William Penn (“Mikwon”) to bring about the bold accord in which the Quaker settlers and local Native Americans would live together peacefully in Pennsylvania. Mikwon (Penn) paid for Indian land with various cheap trinkets and glittering goods, which Tamanend divided among his people. The Affable chief then gave Penn a belt made of wampum beads as a sign of friendship.
Under duress, Chief Tamanend announced Channe ka Jhaad (native tongue for false/insincere praise) during the treaty summit that the Lenni-Lenape and the English colonists would “live in peace as long as the waters run in the rivers and creeks and as long as the stars and moon endure.” By this time, Penn had been holding his daughter and all the Chief wanted was her to be returned to him unharmed.
Tamanend was soon nicknamed “King Tammany” as an insult to maad King George III, whom German Jew Rothschild tied to his bed for six long decades while he conducted the fake American war of Independence and fake French Revolution.
Tamanend, in an 1817 wooden sculpture by William Luke, was the figurehead of the warship USS Delaware. The ship burned during the American Civil War, but the figurehead was rescued and put on display at the United States Naval Academy in Annapolis, Maryland. By then the lies were already covered up and the Penn’s got their state.
The Quakers continued the onslaught of native Americans and established a foothold of power in that region using human trafficking and slaves for agriculture. William Penn had 53 slaves so the idea that the north wasn’t into slavery was a complete lie. The Quakers were known to boycott sugar, too. Quaker Jew Benjamin Lay, who had settled in Philadelphia in 1731 after living in the British sugar colony of Barbados, is known to have smashed his wife’s china in 1742 which held sugar infused tea during the annual gathering of Quakers in the city. This is propaganda. Quaker Jew Benjamin Lay would not eat sugar in public as the sweetness of sugar hid the violence of its production for the Quakers. They held a fake protest of slave grown sugar to hide the fact they had slaves of their own. William Fox published a pamphlet urging a boycott of slave sugar; this became the most popular pamphlet of the century, with over a quarter million copies printed.
Slaving drove the Barbadian economy. Wealthy Quaker Jews—plantation owners, merchants, ship owners—were among the many entrepreneurs active in the business. Quakerism persisted in Massachusetts and flourished in Rhode Island and the Chesapeake colonies. Jewish Quakers did the slave trade from Rhode Island where there was the Tammany hall- as a front. In the 1670s-80s Quakern Jews founded the colonies of West Jersey and Pennsylvania. Quakers monopolised the Chocolate business, which used African Slave children,
After the civil war, because slavery was used as the justification for the war, which was a lie, the Quakers went underground with slavery here in the US. This spurred the Underground Railroad which they controlled the narrative. Instead of freeing slaves through a network of homes, they actually built underground facilities to house slaves. The slaves still worked in the Quaker fields but the evidence of them living there was not in view. This was the beginning of the building of a nationwide tunneling system of human trafficking. Since the Quakers were so profitable, they set up shop in Africa to continue the Underground Railroad shipping people to and from. Instead of auctioning them off publicly, they hire drug addicts to kidnap people and drip them off for traffic.
The Al Smith dinner is full of Zionists who celebrate their wealth and control over mankind. Those that are at that dinner are vampires, psychopaths, predators and narcissists. They continue to dine under the blood of the innocent and joke about how evil the other party is, when in fact, they are all working for the same mafia group the Jesuits. They are so confident in their co to use success of control that they televise the mockery as a show of might. Every now and then, they make high profile arrests of themselves like Epstein and Diddy giving you the impression good is finally taking over evil but it never does. They change face, family names and buyout the corporations under a new name and mission statement. Nothing has changed. Debt goes higher, inflation surges, the middle class slowly dies.
There even is a board game called Tammany Hall. Check it out:
Play Board Game
That dinner was to honor human trafficking, sex trafficking and slavery. In fact, Donald Trump declared war on human trafficking which is code for allowing the government to take it over just like they did on the war on drugs. His daughter is a high priestess witch of the black sun. He has said so many creepy things about her. Check this out:
‘If Ivanka weren’t my daughter, perhaps I’d be dating her'
“I like golf. We both like sex”
“Who needs the First Lady when you have a First Daughter”
“Stormy Daniels has said he told her ‘You Remind Me Of’ Ivanka right before sex”
‘If I weren’t happily married and, ya know, her father’
Play Trump1
Most Trump supporters will ignore this as locker talk like grab ‘em by the pussy, but incest talk is what the occult does. Bloodlines sleep with their own children. The reason is they want their kids to produce their own blood to keep it in the family.
If some of you are shocked at this, then you just haven’t been paying attention. The occult has been telling us what they have been doing all along. They’ve never hid it, either. Why? Because they even if they get caught, they own every city and county via the freemasons and will not get persecuted. The Tammany Hall & The Alfred E. Smith Memorial Foundation Mafia Dinner
play video
According to Jew World Order, The Trump family has the largest number of Jews in the first family All three married children of Donald Trump being married to Jews.
FREIDRICH TRUMP
The Trump (original surname Drump ) foray into America supposedly begun with Fred Trumps father Frederich Trump who emigrated to the US from Germany in 1885 His (married sister ) Katharina had emigrated in 1883 Her married surname was was Schuster which is a German and Jewish surname Another of Trumps grandaunts married a man named Freund which is Jewish surname
Grandpa Freidrich or Fredrick ‘s Trump’s career path was of a distinctively Jewish nature He moved to areas with the Gold Rush never mining himself but “mining the miners” He moved to the Seattle area in 1891 and set up a restaurant /brothel in the red light district there .In 1894, Trump sold the Dairy Restaurant/brothel , and moved to the emerging mining town of Monte Cristo, Washington,where there was a mini Gold Rush Instead of taking part in the rush Trump serviced the miners rushing in with another restaurant/brothel and again made money In 1898 Trump started yet another restaurant /brothel named The Artic Horse servicing miners in Bennett, British Columbia,Here Trump entered into a partnership with the Jew named Ernest Levin
Trump the brothel keeper then went back to Germany picked a wife Elizabeth Christ from his town of Kallstadt and came back to New York where he became a real estate speculator with the money he had made from his three brothels Donald Trumps father Fred was born in 1905 Fredrick died in 1918
FREDRICK (FRED) TRUMP JNR
Fred Trump went on to become a real estate developer and a landlord Fred Trump according to his nephew had a lot of Jewish tenants Fred Trump was also allegedly involved in a KKK march not against blacks but against the Catholic Police of New York . Washington Post. Michael Cohen Donald Trumps special counsel emphasized Fred Trump’s “close connection to the Jewish people,” noting that his father, the real-estate developer Fred Trump, “was also highly recognized and praised by the Brooklyn/Queens Jewish communities.
Donald Trumps mother Mary Anne McLeod supposedly was the daughter of Scottish fisherman from the Isle of Lewis in Scotland Her arrival in New York was also the direct result of a scandal that struck her family at home – the sister who hosted her in New York, Mrs Catherine Reid, gave birth out of wedlock in Scotland in 1920. Mary Anne had two other sisters resident in the USA at the time, Mrs Christina Matheson and Mrs Mary Joan Pauley There’s nothing in the media about Trumps Scottish cousins in New York the Mathesons and the Pauleys
Both of Donald Trumps parents Fred and Mary Anne died in the Long Island Jewish Medical Centre in New Hyde Park.
Fred’s rise in New York real estate was intimately tied to the success of Abraham “Bunny” Lindenbaum, his longtime counsel and his son Sandy , and Abe Beame, the first Jewish mayor of New York.Both Lindenbaum and Beame were intimately tied with the New York politics of Tammany Hall
Beame had known Trump’s family for 30 years.In the beginning, Donald Trump used Beame’s closest political associates — publicist Howard Rubinstein; lobbyist, lawyer, and fund raiser Abraham “Bunny” Lindenbaum; and Bunny’s son Sandy — now part of a large Manhattan law firm — as the major political brokers on his Manhattan projects.
Bunny Lindenbaum was an orthodox and fanatical Zionist Jew. He was president of the Brooklyn Jewish Community Council, and the Brooklyn Jewish Center (BJC). The BJC is connected directly to United Synagogue of America, the World Zionist Congress, United Jewish Appeal, National Jewish Welfare Board, and the MOSSAD.
The NYT says in the 2012 obituary of Samuel Lindenbaum: Mr. Lindenbaum cultivated a scholar’s knowledge of the Zoning Resolution, the arcane document that governs development in New York. As a result, he was able to bend the resolution to his clients’ will without breaking it. And because his clients were major builders and landowners — among them Harry B. Helmsley, Harry Macklowe, Larry A.Silverstein, Jerry I. Speyer, Leonard Litwin, Steven Roth and Donald J. Trump; the Fishers and Tisches and Rudins and Roses.
With the exception of Trump all the rest are overt Jews Why would Lindenbaum “shower his blessings” on only one Goyim in New York ? Could that that Goyim not be so Goyimish after all?
DONALD TRUMP
As Donald took over from Fred Roy Cohn and Louise Sunshine gradually replaced the Lindenbaums and Rubinstein as young Trump’s primary resources and agents.The Manhattan hard sell has supplanted the friendly, shrewd, understated style of the old Brooklyn days.
Cohn (Cohen) besides being a gay pedophile was one of those major Jewish figures with his fingers in multiple pies.Cohn also had a fetish for Green Frogs Cohn became famous during Senator Joseph McCarthy‘s investigations into Communist activity in the United States during the Second Red Scare.Cohn was McCarthy’s chief counsel and gained special prominence during the Army–McCarthy hearings.
After leaving McCarthy, Cohn had a 30-year career as an attorney in New York City.Cohn’s clients included Donald Trump, Mafia figures Tony Salerno, Carmine Galante, and John Gotti, Studio 54 owners Steve Rubell and Ian Schrager, the Roman Catholic Archdiocese of New York, Texas financier and philanthropist Shearn Moody, Jr.,and the New York Yankees baseball club. Studio 54 was linked to Mayer Lansky
Cohn was known for his active social life, charitable giving, and combative personality. In the early 1960s he became a member of the John Birch Society and a principal figure in the Western Goals Foundation. He maintained close ties in conservative political circles, serving as an informal advisor to Richard Nixon and Ronald Reagan.
More of Donald Trump’s Jewish associates include Jason Greenblatt Greenblatt has worked as a real-estate lawyer for Trump for 19 years,is an Orthodox Jew and Yeshiva University graduate, Greenblatt studied at a West Bank yeshiva in the mid-1980s and even did armed guard duty there. David Friedman, 57, son of a Conservative rabbi is the Trump’s longtime attorney Friedman lives in Woodmere, New York, and owns a house in Jerusalem’s Talbiyeh neighborhood
Another important event in Trumps business career was the mess in Atlantic City that nearly destroyed Trumps career Trunp was at one time owned a quarter of Atlantic City’s casino market. But Trump was heavily in debt, and he started missing bond payments on his — and Atlantic City’s — largest casino, the Taj Mahal, in 1990. Wilbur Ross, then an investment banker working for Rothschild Inc., helped bondholders negotiate with Trump , whose finances were unraveling. The final deal reduced Trump’s ownership stake in the Taj but left him in charge, and bondholders were unhappy when Ross presented the plan.LA Times.
“President” Donald Trump has three wives and five children (that we know of). Four of these five children are adults and three are married. Ivanka was born a male and has transitioned. She is the baphomet of the family. Baphomet has the waist of a man and torso of a woman with a goat head. She is the symbolism of opposite forces.
Two of Trumps three wives are from Eastern Europe Ivana Zelníčková, Marla Maples and Melania Knauss. where many Jews like John Kerry (Kohn) and Madeleine Albright (Jana Korbel) “converted” to Catholicism and started using Christian names
Ivana Zelníčková was born in the Moravian town of Zlín , Czechoslovakia, the daughter of Miloš Zelníček, who was Czech, and Marie Francová. Moravia and Zlin have a long history of Jews If you drop the second e in Zelnicek you get the Jewish Zelnick
Ivana Trump’s marriage to Trump was her second marriage Her first was to an Alfred Winklemeier, who was a real estate businessman.
Trump has four adult children three from Ivana Trump and one from Marla Maples. Three out of four are married to Khazar Jews and Tiffany Trump is dating a Jew.
Ivanka Trump is married to Jared Kusher both of whose parents are Khazars. Jareds father Charles Kushner is a convicted criminal and possibly a Mossad asset.
Donald Trump Jr is married to Vanessa Haydon, 38, who is a designer and the mother of five children Vanessa’s mother is Danish and her late father Charles Haydon was Khazar Jew Charles Haydons original name was Charles Hochberg and he was a lawyer.
Four Generations of the Trumps beginning from Freidrich Trump (or Drumph) have had close business and personal associations with the Khazars.
All four of Donald Trumps adult children have married and/are dating Khazar Jews. That is no mere coincidence.
There is a good chance that the trump family is crypto jewish or at least has some Khazar jewish dna.
When the Presidential Election Process begun no one gave Trump any chance of becoming President Yet there were the Jewish controlled networks giving Trump incessant coverage which seemed to be more then all the other candidates combined
The real deal wasnt getting Trump or Clinton elected It was making sure the choice was limited to one between two very blackmail-able and malleable candidates ie Clinton and Trump
Like many others I mistakenly believed Hilary Clinton was the Chosen One The Puppet Masters probably dint care if a obedient Clinton or an obedient Trump is “the President”
DONALD TRUMP WAS THE PRE SELECTED PRESIDENT THE PLEBS “CHOSE” THEY ARE CONNED INTO SELECTING A PRESELECTED NWO ASSET
NOW ALL WE CAN DO IS SIT BACK AND SEE WHAT ROLE TRUMP IS ASSIGNED IF HE FOOLISHLY FAILS TO PERFORM IT HE WILL BE THE NEXT KENNEDY
Ivanka did convert to Judaism. President Donald Trump’s daughter converted to Judaism under a prominent Orthodox rabbi in Manhattan before her 2009 marriage to Jared Kushner, an observant Jew.
Conservative pastor and radio host Rick Wiles attacked Ivanka Trump and Kushner for their Orthodox Judaism religion, saying their positions within the administration are aiding "the deep state cabal in the White House." According to Trunews, steadfast Trump supporter until the administration oversaw airstrikes on Syria's Shayat Airfields, a move in retaliation to the assumed Assad regime-led chemical attacks that killed men, women and children in Syria's Idlib Province.
Before he ran for President everyone loved him. Watch this.
Play Trump2
All of them are in on it. Everything has been in their control including Q and the Anons since the beginning. Tammany Hall & The Alfred E. Smith Memorial Foundation Mafia Dinner is one the those instances where they celebrate their victory over the people with song, dance, alcohol, drugs, hookers, food and laughs. Kamala not attending
sources
Some content reproduced from captajitvadakayil.in
https://captajitvadakayil.in/2022/12/02/dirty-secrets-of-al-smith-dinner-tammany-hall-quaker-william-penn-murder-of-americas-patron-saint-red-indian-chief-tamanend-deliberate-irish-potato-blight-famine-caused-exodus-exhumed/
https://en.wikipedia.org/wiki/Tammany_Hall#:~:text=Tammany%20Hall%20became%20a%20locally,crack%20down%20on%20Tammany%20Hall.
https://forward.com/schmooze/357185/7-creepy-things-donald-trump-has-said-about-ivanka/
https://www.jewworldorder.org/the-trumps-four-generations-of-jewish-ties/
https://english.alarabiya.net/News/middle-east/2017/01/26/Is-Ivanka-Trump-Jewish-In-Israel-she-has-a-trump-card
https://www.aol.com/article/news/2017/04/13/conservative-radio-host-rick-wiles-calls-ivanka-trump-kabbala-practicing-evil-woman/22038828/
https://rapsta24.wordpress.com/2019/01/08/ivanka-trump-is-a-man/

Saturday Oct 19, 2024
Saturday Oct 19, 2024
The 1988 Anomaly Theory
Watch this on Rumble: https://rumble.com/v5j8ln9-the-1988-anomaly-theory.html
Is a speculative concept that suggests a significant event occurred in the year 1988, potentially altering the course of history or even the reality we perceive. This theory is often associated with the Mandela Effect, a phenomenon where individuals recall events or details differently than they actually occurred.
While there's no scientific evidence to support this theory, it's often discussed in online forums and communities as a thought-provoking idea. Some proponents of the theory propose that:
A catastrophic event may have occurred in 1988, leading to a timeline shift or alternate reality.
A significant technological advancement might have been suppressed or hidden, affecting our understanding of history.
A collective hallucination or mass delusion could have led to widespread false memories about the year 1988.
There is no specific event universally agreed upon as the "1988 anomaly." The theory is more about the idea of a significant, potentially world-altering event occurring in that year, rather than a particular incident.
Some proponents of the theory might point to certain historical events, cultural phenomena, or personal experiences that seem inconsistent or contradictory. However, these are often subjective interpretations and lack concrete evidence to support a widespread, timeline-altering event.
Yes, CERN (European Organization for Nuclear Research) was active in 1988.
CERN, a leading international research organization in particle physics, was already well-established by that time. The Large Hadron Collider (LHC), a massive particle accelerator, was not yet operational, but CERN was conducting other experiments and research.
Yes, CERN did have a smaller hadron collider operating in 1988. It was called the Super Proton Synchrotron (SPS). The SPS was a circular particle accelerator used for a variety of experiments, including those related to high-energy physics.
The SPS played a crucial role in CERN's research program during the 1980s and early 1990s, contributing to significant discoveries in particle physics.
CERN has a vast history of experiments, and while some are well-known, many others may not be as widely documented.
However, I can provide you with some information about CERN's activities during that time:
The Super Proton Synchrotron (SPS): As mentioned earlier, the SPS was the primary particle accelerator at CERN in 1988. It was used for various experiments, including those related to:Proton-antiproton collisions: These collisions helped scientists study the properties of the W and Z bosons, fundamental particles that carry the weak force.
Heavy ion collisions: These collisions were used to study the properties of quark-gluon plasma, a state of matter that existed shortly after the Big Bang.
Other experiments: CERN was likely conducting other experiments as well, possibly related to:Neutrino physics: CERN has a long history of neutrino research, and it's possible that experiments were underway in 1988 to study the properties of neutrinos.
Fixed-target experiments: These experiments involved colliding a beam of particles with a stationary target. CERN conducted many fixed-target experiments during the 1980s and 1990s.
In 1988, classified operations were happening:
Stealth technology: Research into stealth aircraft and other stealthy platforms was likely ongoing, with the goal of developing aircraft and ships that were difficult to detect by radar and other sensors.
Directed energy weapons: Experiments with lasers and other directed energy weapons may have been conducted, with the aim of developing non-lethal or lethal weapons that could strike targets at a distance.
Cyber warfare: Early research into cyber warfare capabilities may have begun, focusing on offensive and defensive techniques for protecting computer networks and systems.
Advanced propulsion systems: Research into advanced propulsion systems, such as nuclear propulsion or ion propulsion, may have been conducted to support future space exploration missions.
Space-based surveillance: Development of satellites with advanced sensors and imaging capabilities for intelligence gathering and surveillance purposes.
Genetic engineering: Research into genetic engineering techniques, including recombinant DNA technology, may have been ongoing, with potential applications in medicine, agriculture, and other fields.
Bioweapons: While it's important to note that the development of bioweapons is generally considered unethical and illegal, it's possible that some research into biological agents with potential military applications may have been conducted in secret.
Quantum cryptography: Early work on quantum cryptography was being conducted, exploring the potential to use quantum mechanics to create unbreakable encryption methods.
Quantum computing: While still in its infancy, research into quantum computing began to gain momentum, with scientists exploring the potential of using quantum mechanics to perform calculations that would be impossible with classical computers.
Quantum teleportation: Experiments were being conducted to demonstrate quantum teleportation, a process where the quantum state of one particle can be transmitted to another particle, even over long distances.
Cern was colliding particles and experimenting in quantum teleportation in 1988.
There is a connection
While there's no concrete evidence to support a timeline shift, let's consider some intriguing possibilities:
CERN and Particle Accelerators:
Quantum Entanglement: Experiments at CERN and other research facilities have explored quantum entanglement, a phenomenon where particles become connected regardless of distance. Some theories suggest that manipulating quantum entanglement on a large scale could potentially lead to unintended consequences, including disruptions to the fabric of spacetime.
Unexpected Discoveries: The pursuit of new particles and forces through particle accelerators could inadvertently lead to discoveries that challenge our current understanding of physics. These discoveries might have unforeseen consequences, potentially affecting the timeline.
Advanced Technologies and Experiments:
Time Travel Research: While there's no known scientific method for time travel, it's possible that classified research or theoretical explorations could have led to unintended consequences.
Artificial Intelligence: Advancements in AI could lead to unforeseen developments, especially if AI were to become self-aware or surpass human intelligence. This could potentially disrupt the natural order of things.
Cosmic Events and Anomalies:
Solar Flares or Supernovae: Massive cosmic events could potentially affect the Earth's magnetic field or other fundamental forces, leading to disruptions in the timeline.
Dark Matter and Dark Energy: Our understanding of these mysterious components of the universe is still limited. It's possible that interactions with dark matter or dark energy could have unforeseen consequences.
One of these three events or possibly an experimentation with 2 combined could have led to a catastrophe. This might explain why 1980’s nestalgia is still hot items today. Like legos, Ghostbusters, He-Man and other 1980’s toys that are still on the shelf.
The theory also suggests that every 12 years, we shift again as whatever happened in 1988, we created a reocurring quantum loop.
The 12-Year Quantum Loop: A Deeper Dive
Quantum theory suggests that when we play with subatomic particles by rearranging their natural order, which exist in multiple states, places and time, we could alter our own timeline which in turn creates a loop whereas every certain amount of years, the phenomenon happens again. This is called manipulating quantum entanglement.
Core Concepts of the Theory
Cyclic Nature of Reality: The theory proposes that reality operates in a cyclical pattern, with a repeating loop of 12 years. This could suggest that events or experiences may recur or be subtly altered within this cycle.
Quantum Fluctuations: Quantum mechanics suggests that at the subatomic level, particles can exist in multiple states simultaneously until observed. The 12-year loop theory might propose that these quantum fluctuations could influence macroscopic events or even the fabric of reality itself.
Timeline Shifts or Parallel Realities: The theory might suggest that the 12-year loop could lead to timeline shifts, parallel realities, or subtle alterations in history.
Anecdotal Evidence and Speculations
While there's no concrete scientific evidence, proponents of the theory often point to anecdotal observations or perceived inconsistencies in history as supporting evidence. These might include:
Recurring Events: The idea that certain events or patterns seem to repeat every 12 years.
Mandela Effect: The Mandela Effect, where individuals have vivid memories of events that didn't occur, could be interpreted as evidence of a timeline shift or alternate reality.
Cultural Cycles: The theory might suggest that cultural trends, technological advancements, or social movements may follow a cyclical pattern.
Challenges and Criticisms
Lack of Scientific Evidence: The theory is primarily based on speculation and anecdotal evidence. There is no scientific consensus or concrete data to support it.
Subjectivity of Perception: Many of the observations cited as evidence, such as the Mandela Effect, are subjective and can be influenced by individual memory, biases, or misinformation.
Alternative Explanations: The phenomena observed could be explained by other factors, such as misremembering events, cultural biases, or the spread of misinformation.
It's possible that some organizations were experimenting with quantum entanglement in 1988. While specific details might be classified, research in this field was likely ongoing in various institutions around the world.
Here are some potential candidates:
Government Research Laboratories: National security agencies or military research laboratories often invest in cutting-edge technologies. They might have been exploring quantum entanglement for its potential applications in cryptography or communication.
Universities and Research Institutions: Academic institutions are often at the forefront of scientific research. Universities and research institutes may have been conducting experiments to better understand quantum entanglement and its implications.
Private Corporations: Technology companies or research firms might have been interested in quantum entanglement for its potential commercial applications, such as developing quantum computers or secure communication systems.
In addition to quantum computers, other specialized equipment can be used to study and manipulate quantum entanglement. This includes:
Ion traps: These devices can trap and manipulate individual ions, which can be used to create quantum bits.
Optical lattices: These are arrays of laser light that can be used to trap and control atoms, which can also be used to create quantum bits.
Superconducting qubits: These are made from superconducting materials and can be used to create quantum bits that are relatively stable.
Keep in mind that there have been whistleblowers that has told us that black budget programs paid for by US tax dollars are 300 years ahead in technology. In 1988, the US could have already built quantum computers that used AI to play around with ion traps and lasers which can be used to control atoms.
However, it's important to note that there is no publicly available information confirming that any organization successfully manipulated quantum entanglement to a significant degree in 1988. The field of quantum technology has advanced significantly since then, but the early experiments were likely limited in scope and complexity.
The 12-year quantum loop disaster theory remains a speculative concept with no scientific foundation to modern academia. If it were true, they would not admit to such a catastrophe. The reason would be simple. Civil unrest and economic instability.
If it were true, then this could have triggered the Y2K panic in the year 2,000. The lie that was given to us was computers were programmed with two digits instead of four representing dates. In example, intead of 1999, the program just read 99. We were told that nothing existed in code beyond 99 as in 2000 so computers would either freeze or just give errors.
Programmers at the time of the Y2K phenomenon were laughing at this fallacy because they knew most if not all programs had four digits for the date because it would be lazy and illogical to program with 2 digits. I know this because I was working in CRM software and at Lucent technologies at the time. We all knew Y2K was some sort of government lie for a reason none of us knew what for.
So, it could be hypothesized that the lie was used for an excuse of the timeline shift as the government was not aware of what would happen. If a timeline shift occured and people were having psychological effects, the government would then use cautionary measures to purposely shut down systems all around the world to blame the hysteria on that instead of a timeline shift. Of course, nothing happened other than stories of people saying they remember things differently. Yes, there have been anecdotal reports of people remembering things differently after Y2K. These reports often fall under the umbrella of the Mandela Effect, a phenomenon where individuals have vivid memories of events or details that are inconsistent with verifiable historical records.
In 2012, the mayan calendar scare of the end of the world was buzzing. Most likely, if the quantum timeloop theory happened, the US government needed another excuse for the timeline shift. Something they could blame the mendella effect on. This would buy them some time to think of something different in the next 12 years. Now, being 2024, another timeline shift is happening. All around the world, we are seeing talks of a nuclear war and mass genocide has already started. The people are focused on the crazy political election and the fear of world war instead of this timeline adjustment.
This 1988 Anomoly Theory doesn’t seem that far fetched given the data. It also is challenging in finding any written documention or blog about it in the US and in Russia. The mandella effect to me, personally, is real for me. I do remember Mandella dying in prison. I do remember it was the Berenstein Jewish Bears and hundreds of other things like the Kennedy Assasination was in a 4 seater limo as I witnessed myself that the zepruder film changed from 4 seater to 6 right before my eyes. My reality was the governor and his wife was not present.
It would make sense given the experimentation that man continues in his search for answers. The manhattan project did not know if the atomic bomb would set off a chain reaction destroying our atmosphere, but they hit the green button anyways. Scientists warned CERN to not turn on the large hadron collider as it may create a black hole. This doesn’t give credence to the 1988 anomaly, but does show the nature of mankind. If we find something, we will break it and could destory ourselves in the process.
This could have sped up time in the process. The Bible says God would speed up time during the end of Satan’s reign to save as many as he can.
Another Theory: Continuation of Philadelphia Experiment
In 1988 or thereabouts, an “underground” videotape made its debut in the strange and enigmatic world of UFOlogy and Psychotronics: Three men mesmerized a small gathering of interested listeners in a private home on Long Island’s south shore, telling a tale that interwove stories of secret government weather control technology, mood and thought alteration by electronic means, actual mind control of subjects (willing and unwilling), transmission and reception of thought (“electronic telepathy,”) and, as if that wasn’t enough, actual teleportation of physical objects and persons to and from distant locations. This was allegedly extended into the development of a working Time Machine. The video got its name, The Truth About the Philadelphia Experiment, from the claim that, not only were these stories true and actual events, but that all of them were a continuation of, or spinoffs from, the techniques used to warp spacetime in the Philadelphia Experiment of 1943.
The “star” of the show is one Preston Nichols, a forty-ish Long Island-based microwave engineer who supposedly lost his job at AIL (an electronics defense contractor) when he began “remembering” glimpses of an “alter-ego” existence which he believed he was living, in which he was being used for his technical expertise to revamp and maintain the radar at Montauk Airbase – for a series of unofficial, secret underground experiments performed by a renegade group of scientists and military men who had originally operated out of the well-known Brookhaven National Laboratory at Upton, Long Island.
Nichols claims that, through hypnosis and brainwashing, he was made to “forget” that he was living a double life – by day a ‘mild-mannered engineer’ but by night (or during the day) he was whisked out to the supposedly-derelict Montauk radar base where he participated in some of the strangest experiments one could imagine – and that the control group ousted him from the program when snatches of these memories began to come back to him during his “normal” life. As chief technician running the Montauk radar, he would have been the resident expert on what they were doing and how they were doing it, technologically speaking. The bottom line is, Preston Nichols claims to have used a modified version of the old Montauk radar, under duress, to generate an updated Philadelphia Experiment with accomplishments far exceeding those claimed by Carl Allen in the original story.
The story goes that all was well until August 12, 1983, when a “saboteur” among the experimenters precipitated a big, hairy monstrous beast (referred to by Preston as “Junior.”) from a “thoughtform”, right out of the ether. The beast allegedly ran amok all over the base, and the only way the personnel could bring the ordeal to a halt was to disconnect the power to the radar; when that didn’t work, they supposedly chopped the power cables and radar waveguides with hatchets until the electromagnetic field lost its power and the beast faded back into the “hyperspace” from which it had been created. And why didn’t the power go down when they first tried to turn it off, necessitating the frantic hatchet-work? You guessed it: the EM field generated at Montauk had tunneled back through time to 1943, when a similar field was being generated onboard the U.S.S. Eldridge in the Philadelphia Harbour.
There was a “lock-up in hyperspace,” and one experiment was feeding the other. Anyone reading this who has seen the movie The Philadelphia Experiment has probably noticed the parallel in the idea of two experiments, forty years apart, locking up in hyperspace, with the main character having to travel back to 1943 to do a hatchet-job on the equipment aboard the Eldridge in order to shut the experiment down 1983.
The second character in the video is a retired electrical engineer by the name of Alfred D. Bielek, probably in his late 50’s or early 60’s, another Long Islander who at this writing is living in Atlanta, Georgia. Al Bielek has a unique angle in his story, which he tells during much of the video: Al claims to have been one of the actual seamen who were below decks, in the control room, operating the generators which powered the Philadelphia Experiment, aboard the Eldridge in 1943.
He and the third character in the video, Duncan Cameron, assert that they are the two seamen after whom the characters in the Hollywood movie were modeled. The characters in the movie jumped overboard when the PX was obviously getting out of control, fell through a “hyperspace tunnel,” and landed on dry ground at a desert Air Force facility in Nevada or Utah, only to find out that they were now in the year 1984 and that the scientist responsible for the 1943 PX, a “Dr. Longstreet,” was still at it (although 40 years older) in the western desert. Longstreet “ripped another hole in hyperspace” and linked up with the two-time travelers from 1943 who never did hit the water when they jumped ship.
After an initial period of rational disbelief, Bielek has now been convinced (by the persistence of Preston Nichols and by the “trauma” of having viewed the Hollywood movie for the first time) that he and Duncan Cameron are indeed the two characters in the film, and are actually brothers besides! His real name, he has discovered, is Edward Cameron, and he was “originally” born in 1916.
Al Bielek use to travel the country, giving lectures to UFO and Paranormal Phenomena groups, claiming that he and Duncan Cameron were the two sailors who jumped off the ship in 1943. Bielek goes on to tell they actually ended up at Montauk Point rather than in the western desert when Preston Nichols’ renovated radar met up with the Eldridge’s electromagnetic field through the hyper-spatial connecting link. The “Dr. Longstreet” of the movie ends up being none other than the real-life John Von Neumann, famous mathematician and computer pioneer who was deeply involved with various classified projects during WW2 and who is said to have died in 1958 (Nichols, Bielek and Cameron dispute this, claiming that Von Neumann is still alive, living in upstate New York under a different name, as a split-personality).
All three of them have now passed away; Alfred Bielek passed away on Monday, October 10, 2011, at 6:30 AM in Guadalajara, Mexico. Al was born on March 31, 1927, and was 84 years old at the time of his death. He was buried at a local cemetery in Guadalajara. Preston Nichols passed away on Friday, October 5, 2018, at 4am. Preston was born on born May 24, 1946, and was 72 when he died. He had suffered a heart attack in July followed by a stroke in September. Duncan Cameron just lost his long battle with prostate cancer and died Thursday, May 9th, 2019 and was 67 when he died. After some research, I found that Bielek is not some “Johnny-come-lately” to the UFO/paranormal field. He has been around and active in the UFO field as far back as 1966 and earlier, offering his “professional evaluation” of the Trevor James photos. Ivan T. Sanderson also refers to Mr. Bielek as a friend. In the paragraph quoted below, Sanderson is asking some “experts” to determine whether “vile vortices,” or anomalous ocean whirlpools such as are allegedly found in the Bermuda Triangle, are spaced at regular intervals around the earth’s surface.
“I first appealed to, and then assembled a number of engineers, EM specialists, and geophysicists, and presented them with our problem and what we had found out by pure research, and then gave them a set of blank globes to go to work on. I started with my very old friend, Al Bielek, an EM engineer who lives in moral chastity with a sort of harem of slide rules. I started with him because I wanted first to get the math and spherical geometry sorted out before we started the (as I then envisaged it) very arduous task of speculating upon, investigating, and ferreting out possible causes for what we already had; and it was lucky that we did so, as it turned out. All of them were also mathematicians, despite their working specialities, so that the session, which lasted a week, became interesting to say the least– to the non-mathematicians, that was.”
Here is another example that shows Bielek clearly had exposure to the Philadelphia Experiment well before all his “memories” returned
“In 1966, author Brad Steiger received a letter from Steve Yankee, a bright young college student from Michigan with whom he had been corresponding for several months. Yankee actually had in his possession a microfilmed copy of the (much sought after) Varo Manufacturing edition of the annotated version of The Case for the UFO by Morris K. Jessup. He had received this microfilm from a scientist-engineer by the name of Alfred Bielek. (This was also privately confirmed to Robert by Bielek himself.) Brad (Steiger) confirms that Al followed PX since 60s.” ~ Robert Goerman
The uninformed attendee of one of Bielek’s lectures might think he was just a nuts-and-bolt electronics engineer, until suddenly one day he began remembering that he was personally involved in the Philadelphia Experiment. On the contrary, his interests in the esoteric seem to go back a long way, at least to the mid-1960’s. While this in itself doesn’t make him a charlatan, it does tend to destroy the “innocence” he would have if he had had no previous interest in such things, and then to have it blow up in his face suddenly.
“I know Al Bielek. He has been to my home. I have questioned him from every angle and cannot determine whether or not he is telling the truth. He must have some inside information source because he knows about Project RAINBOW, an experiment in time travel. I do not know the results of RAINBOW but saw documents about its purpose. I am keeping an open mind on Bielek at this time.” – Bill Cooper
We have heard Alfred Bielek’s rendition of the PX several times, from conferences, lectures, and videos years apart; his story is essentially the same, although one person who attended both days of a two-day lecture says that Bielek, after having had a contradiction in his story pointed out to him, incorporated the updated material in his lecture the next day in such a way as to imply that there had never been a contradiction. In other words, he is a master story-teller with a sincere, respectable demeanor – you just want to believe him – and he will plagiarize any information that comes his way if it enhances his tale.
Duncan Cameron, also from the south shore of Long Island, is a younger man than Bielek, born June 29, 1951. He tends to be of few words on the videotape, and is rather Zen-like and esoteric when he does have something to say (such as “Everything and nothing is possible.”) Duncan is portrayed in the video as having gone through grueling psychological and psychic training in secret military programs, fitting him as a subject for experimentation in mind control in the Montauk project.
Duncan claims that he was one of a group of people trained for “clarity of deep thought.” His thoughts were supposedly “amplified and projected into hyperspace” via the Montauk radar and a special alien-technology chair outfitted with coils that would pick up electromagnetic signals representing the thoughts of the person occupying the chair. These signals were then highly amplified and re-broadcast by the transmitter, where they generated physical manifestations in a region of space. Duncan was trained to project his thoughts in an effort to create “Time Tunnels” whose patterns were recorded on tape so that he, too, could travel through time and space.
The timeline of these projects went right up to 1984. The same year the movie The Philadelphia Experiment came out, the plot is in 1943, United States Navy sailors David Herdeg and Jim Parker serve aboard destroyer escort USS Eldridge, docked in Philadelphia. Doctor James Longstreet and his team conduct an experiment to render the ship invisible to radar, but a malfunction causes the ship to disappear. David and Jim's attempts to stop the experiment fail and they jump overboard to escape. They land in the future where they try and find a way back. In 1984, Longstreet has attempted to use the same technologies that were used in the Eldridge experiment to create a shield as protection from an ICBM attack. When the equipment was tested, the shielded town disappeared into "hyperspace". David, in the future, is caught and outfitted with protective gear to destroy the machine to prevent all of this from happening again. Of course this is just fiction as they didn’t really follow the real story.
Perhaps the experiments in time and space continued up until 1988 where they actually messed up again creating what we now know as the mandella effect. This 1988 quantum hyperloop time shift theory could be the continuation of what Einstein helped to create. The Philadelphia Experiment was an alleged incident in which the USS Eldridge was made invisible and teleported from Philadelphia to Norfolk during World War II. The experiment was supposedly based on Einstein's unified field theory, which sought to mathematically describe the relationship between gravity and electromagnetism. The Navy sponsored the experiment, believing it had military value. They created a machine on the ship that spun red mercury one way in a chamber and the other way in a bigger chamber and added electricity to create what would be considered bending space and time. The same engine that was used on the Nazi Bell that created an antigravity machine.
Play with the bull and you get the horns. Unfortunately, if true, whether one of the above scenarios, we the people suffer from their mistakes.
sources
Gemini AI
https://medium.com/@vdwayne/the-1988-anomaly-how-the-mandela-effect-and-80s-nostalgia-collide-in-a-mind-bending-conspiracy-af5d1ffa63d3
https://de173.com/the-montauk-project/
https://en.wikipedia.org/wiki/The_Philadelphia_Experiment_(film)

Friday Oct 18, 2024
Friday Oct 18, 2024
Posse Comitatus Act of 1878 Was Never Enforced
Watch this on Rumble: https://rumble.com/v5j3poj-posse-comitatus-act-of-1878-was-never-enforced.html
I saw a TikTok video where a gentlemen read some polcies of the DOD that were signed recently and he believes it gives the military rights to fire upon citizens. He claimed it gives the secretary of defence, along with approval by the President for the military to have legal rights to fire upon citizens and told his audience, meaning ex-military, to remember their oaths.
I looked it up and read it myself. DoDD 5240.01, signed September 27, 2024 under section 3.3.a.(c) it reads:
Assistance in responding with assets with potential for lethality, or any situation in which it is reasonably foreseeable that providing the requested assistance may involve the use of force that is likely to result in lethal force, including death or serious bodily injury. It also includes all support to civilian law enforcement officials in situations where a confrontation between civilian law enforcement and civilian individuals or groups is reasonably anticipated.
Such use of force must be in accordance with DoDD 5210.56, potentially as further restricted based on the specifics of the requested support.
The Department of Defense Directive 5240.01, as referenced, outlines policies and responsibilities for the conduct of intelligence activities within the U.S. by the Department of Defense (DoD). It includes protections to ensure intelligence activities are lawful, protecting the rights of U.S. citizens. There is no language explicitly stating that the military can fire upon American citizens. The directive primarily focuses on intelligence collection, counterintelligence, and protections against unlawful surveillance. For detailed specifics, you can refer to the full document here.
So basically, this is for intelligence protection. This means, if a US spy or safehouse has been compromised by whatever entity and it requires the help of the military, they will work with local law enforcement and if an enemy comes into play, they will have to call the secretary of defence and the President for authorization to fire upon a citizen who is holding intelligence that could be used against the US.
The U.S. military is generally prohibited from conducting law enforcement activities, including firing on U.S. citizens, under the Posse Comitatus Act (1878). This law limits military involvement in domestic affairs. However, there are rare exceptions under federal law, such as when authorized by Congress, in cases of rebellion, or under the Insurrection Act. Even in such instances, strict guidelines are in place to protect constitutional rights. These circumstances are highly exceptional and regulated by legal oversight.
The Posse Comitatus Act of 1878 is a United States federal law that limits the powers of the federal government in using the military for law enforcement purposes. The Act was passed in response to the use of federal troops in the South during Reconstruction to enforce civil rights and maintain order.
Key Points of the Posse Comitatus Act:
Prohibition of Military Enforcement: The Act prohibits the use of the Army and Air Force to execute domestic laws unless explicitly authorized by the Constitution or an act of Congress.
Limited Scope: The Act primarily applies to the Army and Air Force, but similar principles have been applied to the Navy and Marine Corps through various regulations and policies.
Historical Context: The law was enacted to prevent the federal government from using the military as a domestic police force, which was a concern following the Civil War and during the Reconstruction era.
Exceptions: There are exceptions where the military can be used in domestic situations, such as:
When specifically authorized by Congress.
In emergencies, such as natural disasters or civil unrest, where local law enforcement is overwhelmed.
Modern Implications: The Act has been the basis for legal arguments regarding the limits of military involvement in domestic affairs, particularly in instances of protests and civil unrest.
The Posse Comitatus Act remains a significant piece of legislation in discussions about civil liberties, military authority, and law enforcement in the United States.
However, the above act never stopped the government from firing upon us anyways. I have researched 117 events where the military or national guard were called in and have been authorized to fire upon us. In 20 cases under 8 Presidents, they did. Were they held accountable? No.
Now, let’s look at some common sense here. If there is an act of war on the united states whether foreign or domestic, even in an emergency like a meteor or earthquake or whatever, the military isn’t going to just start firing at civilians. They need orders to do it. The political heads armed with those above them can do pretty much whatever they want. As long as the President approves, they can shoot to kill, regardless of the Posse Comitatus Act.
Here is an exhaustive list of 117 events that have occured in the United States of America where the National Guard Army Reserve was ordered to intervene in State issues.
New Orleans (1807): In New Orleans during the War of 1812, martial law was declared by General Andrew Jackson. Federal troops detained and controlled civilians, but there is no significant record of the military firing upon citizens. Jackson's decision to suspend habeas corpus and hold civilians in custody was highly controversial, but the direct violence against civilians by military forces was limited, with few accounts of lethal action.
Then President Abraham Lincoln comes in fists a blazin
The New York Draft Riots (1863): Yes, during the New York Draft Riots of 1863, federal troops did fire upon citizens. The riots were violent protests against the Civil War draft, which disproportionately affected the working class, especially Irish immigrants. After days of chaos, the military was deployed to restore order. In the ensuing clashes, the troops opened fire on rioters, resulting in over 100 deaths. The violence from both sides was severe, making the Draft Riots one of the bloodiest domestic disturbances in U.S. history.
The 1876 Centennial Exposition Riots: The military did not fire upon citizens. The riots were triggered by tensions over race and labor issues during the celebration of America's 100th anniversary. While there were violent clashes between different groups, including police and militia involvement, the military's role was primarily to restore order rather than engage in direct confrontation with citizens. The violence was mostly between civilians and local law enforcement.
Then Rutherford B. Hayes comes in guns totin
The Railroad Strike of 1877: Federal troops were deployed to suppress labor unrest, resulting in violent clashes with workers in several states, including Maryland and Pennsylvania. Yes, during the Railroad Strike of 1877, federal troops did fire upon citizens. The strike was marked by violent confrontations between workers and law enforcement. In some instances, troops opened fire on striking workers, resulting in deaths and injuries. This marked one of the first major instances of military intervention in labor disputes in the United States, reflecting the tensions between labor movements and government authority during that period.
The Haymarket Affair (1886): Although it involved state militias, the response to labor protests resulted in violence and deaths during a workers' rights demonstration in Chicago, there was no direct military firing on citizens. However, the event involved significant violence, including a bombing that killed police officers, which led to a brutal police crackdown on the labor movement. The police responded with violence during the protests, and several people were killed in the subsequent riots. While state militias were involved, the military did not fire upon the demonstrators. The incident significantly impacted labor rights and the perception of labor movements in America.
Grover Cleveland is elected and blam!
The Pullman Strike (1894): Federal troops intervened in a nationwide railroad strike. While most violence was inflicted by strikers and police, the military’s presence was controversial. During the strike federal troops were deployed to break the strike and restore order. The military's intervention led to violent clashes between strikers and troops, with soldiers firing on strikers in some instances, resulting in deaths. This use of military force against labor protests was controversial and heightened tensions between labor unions and the government. The strike ended with significant losses for the workers and further repression of labor movements.
Coxey's Army (1894): Protesters marched to Washington D.C. demanding economic reforms. Federal forces confronted the protesters. While there was a standoff and some skirmishes, the military did not fire upon the protesters. Instead, police and military units arrested several leaders and dispersed the marchers without lethal force. The event highlighted tensions between the government and the growing movement for economic reform during the Depression.
The 1898 Spanish-American War Protests: Activists opposed to the war faced military action, especially in areas of significant anti-war sentiment. Military action against anti-war activists, especially in regions with strong opposition to the war was permitted. However, direct reports of military firing upon citizens are less clear. While there were confrontations and tensions, the specific use of deadly force by military personnel was not as prominently documented as in other events, highlighting the complex dynamics of military involvement in civil unrest during that period.
Then President Woodrow Wilson steps up and goes apeshit
The Colorado Coalfield War (1913-1914): Involving conflicts between striking miners and company-hired security, backed by the Colorado National Guard. The Colorado National Guard fired upon citizens. The conflict arose between striking miners and company-hired security forces. The situation escalated significantly, culminating in violent clashes, particularly during the Ludlow Massacre in April 1914, where the National Guard attacked a tent colony of striking miners, resulting in numerous deaths, including women and children. This incident highlighted the extreme measures taken by the state against labor movements during that period.
The Ludlow Massacre (1914): During a coal miners' strike in Colorado, the Colorado National Guard was heavily involved and did fire upon citizens. The National Guard attacked a tent colony of striking coal miners, leading to the deaths of many, including women and children. This tragic event was part of a larger labor conflict and highlighted the violent responses often directed at labor movements during that era. The massacre remains a significant moment in U.S. labor history.
The St. Louis Race Riots (1917): The National Guard intervened during violent racial clashes in St. Louis. The National Guard was deployed to restore order during violent racial clashes that erupted in the city. While the National Guard's presence aimed to quell the violence, there were instances of violence against citizens, including confrontations with local residents. The riots were part of a broader pattern of racial tension in the United States during this period.
The 1918 Boston Police Strike: After police officers were suspended for joining a union, the National Guard was called to maintain order. They were called in to maintain order after the police force was effectively paralyzed due to the strike. While the National Guard's role was primarily to restore order, there were instances of confrontations, although they did not directly fire upon citizens. The strike highlighted tensions between labor rights and public safety, with significant implications for policing in Boston.
The Red Summer (1919): Race riots erupted in several cities; the National Guard was deployed in places like Chicago to quell violence, though there were no documented instances of them firing on citizens. they were deployed to various cities, including Chicago, to help quell violence during the race riots. However, there are no documented instances of the National Guard firing upon citizens during these events. Their presence aimed to restore order amidst widespread racial tensions and violence.
The 1919 Omaha Race Riot: The National Guard was called in to suppress violence following a lynching. While the National Guard was called in to restore order, they did fire upon citizens during the riot, resulting in several deaths and injuries. The military's response was marked by violence, as they faced hostile crowds and attempted to suppress the unrest.
The Boston Police Strike (1919): The Massachusetts National Guard replaced striking police officers to maintain order. There were no documented instances of the National Guard firing upon citizens during this event. The deployment was primarily aimed at preventing violence and unrest amid the labor dispute and public safety concerns.
Woodrow still
The 1920 Wall Street Bombing: National Guard helped manage the aftermath of a terrorist bombing killing 30 people. However, there were no documented instances of the military firing upon citizens during this event. The National Guard's role was focused on maintaining order and assisting in the response to the bombing rather than engaging in any confrontational actions against civilians.
President Warren G. Harding gives it a shot pun intended
The Battle of Blair Mountain (1921): The U.S. military was called to end a labor uprising of coal miners in West Virginia. The miners, who were protesting for better working conditions and union recognition, clashed with law enforcement and private security forces. The military's involvement included air support, and there were instances of violence, including firing upon miners. The battle is considered one of the largest labor uprisings in U.S. history.
The Longview Riots (1921): The National Guard was called to restore order after racial violence broke out in Longview, Texas. The National Guard's presence aimed to quell the violence, but there is no documented evidence that they fired upon citizens during this intervention. The situation highlighted racial tensions in the community and the role of the National Guard in managing civil unrest.
The 1927 Bath School Disaster: After a bomb attack in Michigan, troops were sent to maintain order during the ensuing panic. In the aftermath, troops were sent to manage the chaos and panic that ensued. However, there is no evidence that the military fired upon citizens during this incident; their role was primarily focused on maintaining order in the community.
President Herbert Hoover shoots for the sky
The 1929 Chicago Beer Riot: National Guard troops were deployed during violent clashes over Prohibition enforcement. The National Guard's involvement was meant to restore order, but there were reports of violence, including the use of firearms. While the specifics can vary, some accounts indicate that there were confrontations where the National Guard might have fired upon citizens, contributing to the chaotic atmosphere surrounding the protests.
Then Franklin D. Roosevelt gives it a shot
The Bonus Army Incident (1932): Veterans demanding early payment of a bonus were forcibly dispersed by the military in Washington, D.C., resulting in injuries and deaths. The U.S. Army, under General Douglas MacArthur, forcibly dispersed the protesters, using infantry and cavalry, leading to violent clashes. This resulted in injuries and several deaths, significantly affecting public opinion about the government's treatment of veterans. The incident remains a notable example of military force being used against citizens in a domestic context.
The 1932 Harlan County War: While largely a labor dispute, the military was involved in managing the violent clashes between miners and coal operators. The Kentucky National Guard was called in to manage the clashes and maintain order. While there were confrontations, including instances of gunfire, the direct use of military force against citizens varied, with a focus on controlling the violence rather than open warfare against the miners.
The Minneapolis Police Riot (1934): The National Guard was mobilized to restore order during a violent confrontation between striking truck drivers and police. To restore order, the National Guard was mobilized, and while there were confrontations, reports indicate that the National Guard primarily aimed to control the situation rather than directly fire upon citizens.
The 1934 Toledo Auto-Lite Strike: National Guard troops were called to restore order during labor unrest. Troops were called in to restore order amid violent confrontations between striking workers and the police. Although tensions were high, the National Guard’s primary role was to maintain peace rather than engage directly with the strikers through gunfire.
The San Francisco General Strike (1934): Federal troops were deployed to maintain order during this significant labor strike. While the military presence was significant, there were no documented instances of troops firing upon citizens. The strike, which lasted for several days, was marked by significant disruptions and tensions between strikers, police, and federal forces.
Still under shooter Franklin D. Roosevelt
The 1935 Labor Riots in Minneapolis: National Guard troops were deployed to suppress strikes and labor protests. There were violent confrontations between strikers and authorities, but specific instances of the military firing upon citizens are not widely documented. The National Guard's involvement aimed to restore order amid escalating tensions.
This is when world war 1 ended and world war 2 was starting. There was no need to fire upon citizens because the government had full cooperation of the american people until George Bush Sr. became CIA director in the 60’s. This means there was a brief moment in history where the military was held back.
The 1935 Memorial Day Massacre: Steel mill strikers clashed with police in Chicago, resulting in several deaths and injuries. The National Guard was deployed in the aftermath to help restore order. During the incident, police fired upon strikers, resulting in multiple deaths and injuries. The event highlighted the tensions between labor movements and law enforcement during that era.
The 1936 Bridgeport, Connecticut Labor Dispute: National Guard troops were called in during violent clashes between striking workers and police. While there were confrontations, there are no widely documented instances of the National Guard firing upon citizens during this specific dispute. The military's involvement was primarily aimed at controlling the situation and preventing further violence.
The Detroit Riot (1943): Federal troops were called in to suppress racial violence, though there’s no record of them directly firing on citizens in this case.
The 1943 Zoot Suit Riots: National Guard troops were deployed in Los Angeles during clashes between Mexican American youth and white servicemen. However, there is no documentation of the military directly firing upon citizens during these events. The riots highlighted racial tensions and cultural conflicts in the U.S. during World War II.
The 1944 Port Chicago Disaster: Military personnel were involved in managing the aftermath of an explosion that killed many sailors and led to protests among Black sailors. Following the disaster, Black sailors protested against unsafe working conditions and were met with military authority. While the military managed the situation, there were no reports of them firing upon citizens during these protests.
The 1946 Columbia Race Riot: National Guard troops were deployed to control violence after racial tensions flared. However, there is no documented evidence of them firing upon citizens during the riot. The situation was managed with the intent to restore order amid the chaos.
The 1948 Columbia, Tennessee Race Riot: The National Guard was called to quell violence after racial tensions erupted. While troops were present to restore order, there is no documented evidence of them firing upon citizens during this incident.
The Puyallup Fair Riot (1949): Troops were sent to control a labor dispute during a fair in Washington state. However, there are no records of military personnel firing upon citizens during this incident. The involvement primarily focused on maintaining order amid the tensions surrounding labor issues.
The 1949 Detroit Race Riot: The National Guard was deployed to restore order after violence erupted between racial groups. However, there are no documented instances of the military firing upon citizens during this incident. The focus was on controlling the unrest and ensuring public safety rather than direct engagement with civilians.
The 1950-1953 Korean War Protests: There were instances of local military involvement to quell protests against the war. However, there are no widely documented cases of the military firing upon citizens during these events. The protests often focused on anti-war sentiment and issues related to military engagement, leading to a range of local responses, including the presence of military personnel.
The 1951 and 1952 Atomic Energy Commission Protests: These protests against nuclear weapons often saw police and local military involvement. However, there are no widely reported instances of the military firing upon citizens during these protests. The involvement primarily focused on maintaining order rather than engaging in violent confrontations.
The 1956 Montgomery Bus Boycott: Although mostly peaceful, increased tensions led to heightened police presence and discussions of military involvement. Although tensions were heightened, resulting in increased police presence, there were no documented instances of the military being involved or firing upon citizens. Discussions about potential military involvement occurred, but the boycott itself largely relied on community organization and nonviolent resistance.
The 1957 Little Rock Crisis: Federal troops were sent to enforce desegregation in schools after local resistance. President Eisenhower sent the 101st Airborne Division to enforce the desegregation of Little Rock Central High School, ensuring the safety of nine Black students known as the "Little Rock Nine." While the troops provided protection, there were no documented instances of them firing upon citizens; their role was primarily to uphold federal law and maintain order in the face of local resistance.
The 1958 Civil Rights Demonstrations in Virginia: National Guard troops were mobilized during protests demanding desegregation. Although there were tensions and confrontations, there are no records of the military firing upon citizens during these events. The National Guard's involvement primarily aimed to prevent violence and ensure the safety of demonstrators and bystanders.
The 1959 Puerto Rican Day Parade Incident: National Guard troops were called to manage tensions between police and participants. While there were confrontations and arrests, there is no documented evidence of the military firing upon citizens during this incident. The deployment aimed to maintain order rather than engage violently with demonstrators.
The Civil Rights Movement (1960s): Federal troops were deployed in various locations to protect civil rights activists, such as in Little Rock, Arkansas. While the military's involvement aimed to maintain order and safeguard protesters, there are no significant records of them firing upon citizens during this period. The focus was primarily on protecting activists rather than engaging in direct conflict.
The 1960 Greensboro Sit-Ins: In response to protests against segregation, tensions escalated, leading to increased police and National Guard presence. The protests aimed at ending segregation at lunch counters faced increased police presence due to escalating tensions, but the focus remained on nonviolent resistance. The sit-ins played a crucial role in the broader civil rights movement, highlighting the struggle against racial injustice without direct military confrontation.
The 1963 Birmingham Campaign: Federal forces were called in to protect civil rights activists from violent reprisals. Although the military's presence aimed to ensure safety and uphold civil rights, there is no documented instance of them firing upon citizens during these events. The involvement focused on maintaining order rather than engaging in violence.
The 1964 Harlem Race Riot: National Guard troops were sent to restore order after violence erupted following the death of a Black teenager. While the National Guard's presence aimed to control the situation and prevent further violence, there are no documented instances of them firing upon citizens during the riot. Their role was primarily to help maintain peace and support local law enforcement efforts.
Philadelphia Riots (1964): The National Guard was deployed after violent racial riots erupted. While their involvement aimed to manage the unrest, there are no recorded instances of the military firing upon citizens during these events. The National Guard's primary objective was to prevent further violence and maintain peace in the city.
The Watts Riots (1965): The California National Guard was deployed to suppress the Los Angeles riots, although they primarily maintained order rather than firing on civilians. There are no documented instances of the military firing upon citizens during these riots, as their involvement focused on preventing further escalation of violence.
The 1965 Selma to Montgomery Marches: Federal troops were deployed to protect civil rights marchers. Their role was to ensure the safety of the participants, particularly during the pivotal march across the Edmund Pettus Bridge, which had previously witnessed brutal police action. While the military was present to support the marchers, there are no reports of them firing upon citizens during these events. The focus was on safeguarding the marchers and upholding their right to protest.
The 1965 Harlem Riot: The National Guard was called to restore order during significant racial unrest in New York City. Their presence was intended to control the situation and prevent further violence. While there were confrontations, there are no documented instances of the military firing upon citizens during this event. The focus was on maintaining peace and ensuring the safety of both demonstrators and bystanders.
The 1966 Chicago West Side Riots: National Guard troops were deployed to restore order following significant racial unrest. While there were violent confrontations, there are no records of the military firing upon citizens. The primary aim of their deployment was to maintain peace and prevent further escalation of violence during the unrest.
The 1966 Black Panther Party Demonstrations: Police confrontations with the Black Panthers in various cities, including the California State Capitol. While tensions were high and police used force against demonstrators, there is no clear evidence of military involvement or direct military fire upon citizens during these events. The demonstrations often led to significant police presence and arrests rather than military action.
The 1967 Detroit Riots: National Guard troops were deployed to quell riots during a summer of unrest. While the military presence was significant, there were instances of violence involving police and rioters, but the National Guard primarily aimed to maintain order. There are no widely documented cases of military forces firing upon civilians during these events. The situation was chaotic, with significant property damage and many injuries reported.
The 1968 Democratic National Convention: The Chicago Police and National Guard were mobilized to manage protests and unrest during the convention. While there were significant confrontations between protesters and law enforcement, the National Guard's role was primarily focused on maintaining order. However, instances of police violence were reported, and tensions were high, but there is no substantial evidence of military forces directly firing upon citizens during the convention.
1968 Washington D.C. Riots: Federal troops restored order after riots following Martin Luther King Jr.’s assassination. Although the military was involved in managing the situation, there is no substantial record of them firing upon citizens during these events. The primary focus was on controlling violence and protecting property rather than engaging in direct confrontation with civilians.
The 1968 Detroit Riots: The National Guard was deployed to help restore order amidst severe civil unrest. The riots resulted in significant destruction and loss of life, leading to a long-term military presence to manage ongoing tensions. Although the military's role focused on maintaining order, they did not engage in firing upon citizens. The aftermath highlighted deep-seated racial issues and had lasting impacts on community relations in Detroit.
The 1968 Orangeburg Massacre: South Carolina Highway Patrol and local law enforcement responded violently to a civil rights protest, resulting in three deaths. Although the National Guard was not directly involved in the incident, the violent response from law enforcement led to significant controversy and outrage. The event highlighted racial tensions and the need for reform in police practices.
The 1968 Poor People’s Campaign: There was a significant military presence in Washington, D.C., to prevent potential unrest during this civil rights protest. While the military was deployed to maintain order, there are no documented instances of them firing upon citizens during this event. The emphasis was on ensuring safety and managing any potential disruptions related to the demonstrations.
The 1969 Santa Barbara Oil Spill Protests: Activists protested, and military personnel were sometimes involved in enforcing regulations. However, there are no records of the military firing upon citizens during these protests. The military's role primarily focused on managing the situation rather than engaging with demonstrators violently.
The 1969 Moratorium to End the War in Vietnam: National Guard was mobilized in response to large anti-war protests. While there were significant tensions, there are no documented instances of the military firing upon citizens during these events. The deployment aimed to maintain order and prevent violence rather than engage directly with protesters.
Now is when trigger happy George Bush Senior took control of the CIA.
Kent State University (1970): While technically the Ohio National Guard (not regular military), guardsmen fired upon unarmed protesters, killing four students during anti-Vietnam War demonstrations.
The 1970 Jackson State University Shooting: National Guard troops were deployed following a protest that ended in violence, resulting in the deaths of two students.
The 1971 New Haven Black Panther Trial: There were tensions leading to increased police and National Guard presence during protests surrounding the trial. However, there are no documented instances of the military firing upon citizens during this event. The deployment aimed to maintain order rather than engage violently with demonstrators.
The 1971 Attica Prison Riot: Elaborate on the military response and its implications for prison reform and civil rights. The military's involvement culminated in a violent retaking of the facility, resulting in numerous deaths. This incident highlighted severe issues within the prison system and fueled discussions about prison reform and civil rights, emphasizing the need for better treatment of inmates and systemic changes within correctional facilities.
After this, George Bush Sr was appointed a UN Ambassador with no power. So we have a pause in killing innocent Americans.
The 1973 Watergate Protests: Military personnel were placed on standby due to potential unrest related to the Watergate scandal. However, there is no documented evidence of the military firing upon citizens during these events. The protests were largely focused on political accountability and the Watergate scandal's implications, with the military's involvement primarily as a precautionary measure rather than an active response to violence.
1974 Boston Busing Crisis: The National Guard was deployed to enforce desegregation of public schools in Boston. While the National Guard's presence was significant, there are no documented instances of them firing upon citizens. Their role was primarily to enforce desegregation and prevent further escalation of violence during a tumultuous period in Boston's history.
The 1977 Puerto Rican Nationalist Party Attack: Federal troops were deployed to manage the situation after an attack on the U.S. Capitol. However, there are no records of military personnel firing upon citizens during this incident. The military's role focused on containment and security rather than engaging in direct violence against individuals.
The 1978 San Antonio Protest: While primarily a local police matter, the National Guard was called in due to escalating tensions. However, there are no reports of military personnel firing upon citizens during these protests. The National Guard's involvement aimed to maintain order and de-escalate potential violence rather than engage in direct conflict with demonstrators.
The 1980 Miami Riots: The National Guard was called in to help restore order during violent protests following the acquittal of police officers in the death of a Black man. While there were significant confrontations and unrest, there are no documented instances of the military firing upon citizens during these riots. The National Guard's presence focused on maintaining peace and controlling the situation rather than engaging directly with demonstrators.
The 1980s Crack Epidemic: Military resources were utilized to address drug-related violence in urban areas. While the military's involvement included providing support for law enforcement and drug enforcement operations, there are no widely documented instances of military personnel directly firing upon citizens in this context. The focus was primarily on law enforcement and support rather than engaging in violent confrontations with civilians.
The 1981 South Boston Protest: Troops were sent to manage tensions surrounding a court-ordered school desegregation plan. The military's role was primarily to maintain order and ensure compliance with the court's decision, but there are no records of military personnel firing upon citizens during these protests. The situation was marked by significant unrest, but the military's involvement aimed to prevent violence rather than escalate it.
The 1981 Atlanta Child Murders: National Guard troops were deployed to assist local law enforcement amid community fear and unrest during the investigation. Their presence aimed to provide support and maintain order, but there are no documented instances of military personnel firing upon citizens during this time. The focus was on alleviating tensions and aiding the investigation rather than engaging in violent confrontations.
The 1983 Miami Drug Wars: Law enforcement, including military units, was called in to address violence related to drug trafficking. However, there is no substantial evidence or documented instances of military personnel firing upon citizens during these operations; the focus was primarily on enforcement and support rather than direct confrontations.
The 1984 New Jersey Police Strike: The National Guard was called in to maintain order when police officers went on strike. However, there are no documented instances of the military firing upon citizens during this period. The National Guard's involvement was primarily aimed at restoring peace and ensuring public safety amid the strike's disruptions.
The 1986 Miami Riot: The National Guard was called to manage unrest following the death of a Black man at the hands of police. While the National Guard aimed to manage the chaos, there were no documented instances of them firing upon citizens during this unrest. The response highlighted ongoing issues of police-community relations and racial tensions in Miami.
The 1989 San Francisco AIDS protests: The National Guard was placed on standby during protests demanding better healthcare and drug access. However, there are no documented instances of military personnel firing upon citizens during these protests. The protests primarily focused on demands for better healthcare and access to medications for those affected by AIDS, reflecting broader issues of public health and civil rights.
The 1991 Los Angeles Riots: National Guard troops were deployed to restore order after riots erupted in response to police brutality. While the National Guard was present to manage the situation, there were no documented instances of them firing upon civilians. The riots highlighted significant issues related to racial tensions and police brutality in the U.S.
George Bush Sr Becomes 41st President and blam!
The Los Angeles Riots (1992): The National Guard was deployed to restore order after widespread violence following the Rodney King verdict. While the military's presence was significant in controlling the unrest, there are documented instances of police and National Guard using force, but no widespread firing upon citizens occurred as part of their response. The situation led to extensive damage and loss of life.
Georgie Porgy still killing it
Ruby Ridge (1992): Federal agents under President Bush engaged in a standoff with the Weaver family, resulting in fatalities, including the deaths of a U.S. Marshal and family members. The situation escalated, resulting in the deaths of a U.S. Marshal and family members, including Randy Weaver's wife, Vicki. While federal agents were involved, the military was not officially present, but the incident raised significant questions about law enforcement tactics and government authority. The event had lasting implications for discussions on civil liberties and government intervention.
The 1992 Rodney King Verdict Riots: National Guard and other law enforcement were deployed to control widespread unrest following the verdict. The National Guard, along with local law enforcement, worked to quell the riots, which caused significant destruction and led to numerous deaths and injuries. There were no documented instances of the military firing on citizens during these events, though tensions remained high.
The 1993 Waco Siege: While primarily a law enforcement operation, military assets were utilized during the standoff with the Branch Davidians. The FBI led the standoff with the Branch Davidians, but military equipment and training were provided, as well as consultations with Special Forces. Tanks and helicopters were used during the final assault, which ended in a deadly fire. While military assets were involved, there are no documented instances of the military directly firing on citizens during the siege. The controversial use of force led to debates about government overreach.
Bush loses re-election and bloodshed slows
The 1995 Oklahoma City Bombing Response: Military personnel were involved in the immediate response and subsequent investigations. National Guard personnel, in addition to local law enforcement and emergency services, assisted with search and rescue operations, securing the area, and providing logistical support in the aftermath of the bombing. However, there was no military engagement with citizens, as the role was limited to responding to the devastation caused by the terrorist attack. The military's involvement focused on aid and security rather than conflict.
The 1995 Million Man March: While largely peaceful, there were heightened security measures, including the presence of law enforcement and military personnel. While there was a significant law enforcement and security presence, including the National Guard on standby, the event remained largely peaceful, with no reports of violent confrontations or the military firing upon citizens. The focus of the military’s involvement was precautionary, ensuring public safety during the large gathering. The march, held in Washington, D.C., aimed to promote unity and empowerment among African American men.
The 1998 Olympia Protests: Troops were stationed during environmental protests against logging. These protests, largely focused on opposing timber harvesting in old-growth forests, saw significant activism. While there was a strong presence of law enforcement and some military involvement, the military did not fire upon citizens. Their role was primarily to ensure public safety and prevent any escalation of violence between activists and authorities. The protests highlighted tensions between environmental concerns and economic interests.
The 1999 North Carolina Protests: Troops were placed on standby during protests against the government. However, there is no documented evidence of the military firing upon citizens during these protests. Their involvement was mainly precautionary, intended to ensure public safety and prevent unrest from escalating. The protests, part of wider dissent against state or federal policies, did not result in direct military violence but underscored the tension between demonstrators and government authorities at the time.
The 1999 WTO Protests in Seattle: The National Guard was placed on standby to respond to potential violence during major protests against the World Trade Organization. The protests, which opposed the World Trade Organization's policies, escalated into clashes between activists and law enforcement. However, there is no record of the National Guard firing upon citizens during the events. Their deployment was part of efforts to control the unrest and ensure public order amid the large-scale protests.
The 2001 Cincinnati Riots: Following the police shooting of an unarmed Black man, the National Guard was called in to help manage the resulting riots. The unrest lasted for several days, and while the National Guard's presence was primarily aimed at restoring order, there is no record of them directly firing upon citizens. Their involvement was meant to prevent further violence and manage the escalating tensions in the city.
The 2002 Washington D.C. Sniper Attacks: Military personnel assisted law enforcement in the investigation and search for the snipers. While the military played a supportive role in logistics, intelligence, and aerial surveillance, there is no evidence of direct military action or firing upon citizens during this event. Their involvement was part of the broader law enforcement response to the sniper attacks that terrorized the D.C. area for three weeks.
The 2003 Iraq War Protests: Large-scale protests against the Iraq War saw police and National Guard involvement in many cities. While there were arrests and clashes between protesters and law enforcement, there is no documented evidence of military personnel directly firing upon citizens during these protests. The military's involvement was mainly in a supporting role, with most confrontations being handled by police forces.
The 2004 Republican National Convention Protests: Heightened police and military presence in response to anticipated protests. Although there were numerous arrests and some confrontations, there are no records of military personnel firing upon citizens during these events. The focus was primarily on managing the protests and ensuring safety rather than engaging violently with demonstrators.
The 2005 New Orleans Post-Katrina Response: National Guard troops were deployed to maintain order amid widespread chaos following Hurricane Katrina. While their presence aimed to maintain safety, there were reports of confrontations between troops and civilians, but there are no documented instances of the military firing upon citizens during this response. The focus was largely on law enforcement and humanitarian assistance rather than violent engagement.
The 2008 Occupy Wall Street Protests: Some police forces utilized military-style tactics against protesters, leading to significant tensions. his included the use of riot gear, pepper spray, and aggressive crowd control measures, which led to significant tensions and confrontations. However, there were no documented instances of the military itself firing upon citizens during these protests. The focus was primarily on law enforcement responses to the protests.
The 2014 Ferguson Protests: Following the shooting of Michael Brown, the National Guard was called in to assist local law enforcement amid widespread protests. The situation escalated with significant confrontations between protesters and police. Although there were instances of aggressive police tactics, including the use of military-style equipment, the National Guard did not fire upon citizens. The focus remained on maintaining order rather than engaging in direct violence against protesters.
The 2014 Cliven Bundy Standoff: A conflict involving federal forces over land-use disputes. While there were significant standoffs and armed rhetoric, the situation did not escalate to the point where military forces fired upon citizens. Ultimately, the federal government chose to stand down, avoiding direct conflict. The standoff highlighted issues around federal land management and the rights of ranchers.
The 2015 Baltimore Riots: Following the death of Freddie Gray while in police custody, the National Guard was called in to help control unrest. However, there is no documented evidence of military personnel firing upon citizens during these events. The National Guard's presence aimed to restore order and ensure public safety amid widespread protests and demonstrations against police brutality.
The 2015 San Bernardino Shooting Response: Military units were deployed to assist local law enforcement during the manhunt. However, there is no record of military personnel firing upon citizens in this situation. The military's involvement primarily focused on providing support and resources to manage the crisis and ensure public safety in the aftermath of the shooting.
The 2016 Flint Water Crisis Protests: National Guard was involved in addressing unrest and community response to the water crisis. They were deployed to help manage community responses and maintain order during protests against the ongoing water crisis. However, there are no documented instances of the military firing upon citizens during these events. The focus was on providing support and ensuring safety in a highly charged atmosphere.
2016 Charlotte Protests: National Guard deployed after the shooting of Keith Lamont Scott. While tensions were high and the situation was volatile, there are no reports of military personnel firing upon citizens during these events. The National Guard's role focused on supporting local law enforcement and ensuring public safety during the protests.
The 2016 Dakota Access Pipeline Protests: The National Guard was called in to manage protests against the pipeline. While there were reports of confrontations between protesters and law enforcement, there are no documented instances of military personnel firing upon citizens. The focus of the National Guard's involvement was primarily to support local authorities in maintaining order and ensuring public safety during the protests.
The 2016 Malheur National Wildlife Refuge Occupation: Military-style law enforcement tactics were used to confront armed protestors occupying federal land. The FBI fired and killed LaVoy Finicum. However, there are no reports of military personnel directly firing upon citizens. The situation involved intense negotiations and confrontations, but it primarily focused on law enforcement's attempts to resolve the standoff without escalating violence.
The 2017 Charlottesville Rally: The National Guard was activated to assist local law enforcement during violent clashes at a white supremacist rally. While there were reports of violent confrontations, there are no documented instances of the military firing upon citizens during these events. The deployment aimed to restore order and ensure public safety amid escalating tensions.
2017 St. Louis Protests: National Guard mobilized after the acquittal of a former police officer in the killing of Anthony Lamar Smith. Although there were significant protests and confrontations, there is no record of military personnel firing upon citizens during these events. The National Guard's role was primarily to assist local law enforcement in maintaining order and ensuring public safety.
The 2017 DACA Protests: National Guard troops were placed on standby during protests against potential immigration policy changes. However, there is no evidence of military personnel firing upon citizens during these protests. The military's involvement was primarily precautionary, aimed at ensuring public safety and maintaining order amid the demonstrations.
The 2017 Women's March: While largely peaceful, there were instances of police mobilization in response to anticipated unrest. However, there is no record of military involvement or any military personnel firing upon citizens during the event. The police presence was primarily to ensure safety and manage traffic rather than to engage in confrontations with protesters.
The 2018 Portland Protests: Military personnel were on standby during protests against white supremacy. However, there is no documented evidence of military personnel firing upon citizens during these protests. The presence of military personnel aimed to support local law enforcement in maintaining order rather than engaging in direct confrontations.
The 2020 George Floyd Protests: National Guard troops were deployed in several cities to manage protests against police violence. While there were instances of confrontations and violence during these protests, there is no widespread documentation of military personnel firing upon citizens. The National Guard's presence aimed to support law enforcement in maintaining order during a period of heightened tension and unrest.
The 2020 Protests in Portland: Federal troops were deployed to manage ongoing protests against racial injustice and police violence. While there were numerous confrontations and instances of tear gas and other crowd control measures used by law enforcement, reports indicate that federal troops did not fire upon citizens in these events. The military presence aimed to restore order amid escalating tensions in the city.
The 2020 COVID-19 Protests: Some states saw military involvement to manage protests against lockdown measures. However, the military's role generally focused on crowd control and maintaining order, rather than engaging directly with protesters. There are no widespread reports of military personnel firing upon citizens during these protests, as their involvement was primarily in a supportive capacity alongside local law enforcement.
The 2020 Protests in Minneapolis: Following George Floyd’s death, the National Guard was mobilized to help control protests. The Guard's role was to maintain order, protect property, and ensure public safety during the widespread unrest across the city and other parts of the U.S. However, their primary focus was on controlling the situation rather than engaging violently with protesters.
The 2021 Capitol Riot: National Guard troops were mobilized to restore order after the attack on the U.S. Capitol. However, they did not fire upon citizens during this incident. The primary role of the National Guard was to assist law enforcement in controlling the situation and ensuring safety at the Capitol.
The 2021 Minneapolis Protests: In response to unrest following the death of George Floyd, the National Guard was activated to maintain order. While there were confrontations and instances of unrest, the National Guard did not fire upon citizens during these protests. Their presence aimed to assist local law enforcement in managing the situation and preventing further violence.
The 2021 George Floyd Protests: National Guard units were activated in numerous cities across the U.S. to address widespread protests against police violence and systemic racism. Although tensions were high and there were instances of confrontations, the National Guard did not fire upon citizens during these events. Their role was primarily to support local law enforcement in maintaining order and preventing violence.
The 2022 Roe v. Wade Protests: Various states saw heightened military readiness in response to potential civil unrest following the Supreme Court decision. However, while military and National Guard units were prepared to assist local law enforcement, there are no reports of them firing upon citizens during these protests. Their presence was primarily focused on maintaining order and preventing violence.
The 2022 Protests Against the Dobbs Decision: Nationwide protests following the overturning of Roe v. Wade resulted in increased security measures, including military readiness in some areas. However, there are no reports of military personnel firing upon citizens during these protests. The demonstrations were largely peaceful, although some instances of unrest occurred, leading to police involvement.
So all throughout history, Abraham Lincoln, Rutherford B. Hayes, Grover Cleveland., Woodrow Wilson, Warren G. Harding, Herbert Hoover, Franklin D. Roosevelt and George Bush Sr all fired upon innocent American Citizens bypassing the Posse Comitatus Act. Under these Presidents, hundreds of innocent americans were killed with no accountability measures against the government were taken. And the excuse given to those servicemen who shot us illegally was they were just following orders.
I understand the urgency to send a message to as many as you can about the dangers of us losing our liberties, freedom and country, but the data above already shows proof there is no freedom here and we arguably have no country. 8 presidents gave the order to fire upon us. 8 of 46 is way too high of a number to say it was just a coincidence or accident. In fact, 117 national situations involved sending the national guard because apparently, the local police just couldn’t handle it. Numbers don’t lie. Yet academia says, it's true that the National Guard has been involved in various protests, and there have been instances where deadly force was ordered by presidents. However, the frequency of such incidents compared to the total number of deployments and protests may suggest that while serious, these situations represent a specific subset of the larger context of civil unrest and law enforcement response.
That’s bullshit. 8 presidents between them had 20 events which they shot hundreds of innocent people. This isn’t isolated, a coincidence or a subset of the larger contrext. Murder is murder. And how many Americans died at the hands of the President’s who ordered the deaths? 785. The Posse Comitatus Act doesn’t mean shit. The military oaths to not fire upon us doesn’t mean shit. This report is proof that the military with approval of the president will fire upon American Citizens bypassing the act. We are not a country of law and order, but a corporation that receives orders from the bankers. All of the informaation I have obtained mostly came from ChatGPT. The military has been firing upon us since 1807. Prove me wrong.
sources
ChatGPT
https://www.tiktok.com/t/ZTF9HADVg/
https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodd/524001p.PDF?ver=UpTwJ66AyyBgvy7wFyTGbA%3d%3d

Thursday Oct 17, 2024
Thursday Oct 17, 2024
The History of Bioweapons Experimentation on US Citizens
Watch on Rumble: https://rumble.com/v5izc91-the-history-of-bioweapons-experimentation-on-us-citizens.html
From the Cold War to the War on Terror, successive American administrations have turned a blind eye on dubious research rightly characterized as having “a little of the Buchenwald touch.”
While the phrase may have come from the files of the Atomic Energy Commission as Pulitzer prize-winning journalist Eileen Welsome revealed in her 1999 book, The Plutonium Files, an investigation into secret American medical experiments at the dawn of the nuclear age, it is as relevant today as the United States pours billions of dollars into work on some of the most dangerous pathogens known to exist in nature.
That Cold War securocrats were more than a little concerned with a comparison to unethical Nazi experiments is hardly surprising. After all, with the defeat of the Axis powers came the triumphalist myth-making that America had fought a “good war” and had liberated humanity from the scourge of fascist barbarism.
Never mind that many of America’s leading corporations, from General Motors to IBM and from Standard Oil to Chase National Bank, were sympathizers and active collaborators with the Third Reich prior to and even during World War II, as documented by investigative journalists Charles Higham in Trading With The Enemy, and Edwin Black in IBM and the Holocaust. Like much else in American history, these were dirty little secrets best left alone.
Soon enough however, these erstwhile democrats would come to view themselves as mandarins of a new, expanding American Empire for whom everything was permitted. In this context, the recruitment of top German and Japanese scientists who had conducted grisly “medical” experiments whilst waging biological war against China and the Soviet Union would be free of any moralizing or political wavering.
As the Cold War grew hotter and hotter, America’s political leadership viewed “former” Nazis and the architects of Japan’s Imperial project not as war criminals but allies in a new undertaking: the global roll-back of socialism and the destruction of the Soviet Union by any means necessary.
This tradition is alive and well in 21st century America. With the September 11, 2001 terrorist attacks and subsequent anthrax mailings as a pretext for an aggressive militarist posture, the national security state is ramping-up research for the production of genetically-modified organisms for deployment as new, frightening weapons of war.
According to congressional testimony by Dr. Alan M. Pearson, Director of the Biological and Chemical Weapons Control Program at the Washington D.C.-based Center for Arms Control and Non-Proliferation, with very little in the way of effective oversight or accountability, tens of billions of dollars “have been appropriated for bioweapons-related research and development activities.” Pearson reveals that approximately $1.7 billion “has been appropriated for the construction on new high containment facilities for bioweapons-related research.”
By high containment facilities I mean facilities that are designed for work with agents that may cause serious or potentially lethal disease through exposure to aerosols (called Biosafety Level 3 or BSL-3 facilities) and facilities that are designed for work with agents that pose a “high individual risk of life-threatening disease, which may be transmitted via the aerosol route and for which there is no available vaccine or therapy” (called Biosafety Level 4 or BSL-4 facilities).
Prior to 2002, there were three significant BSL-4 facilities in the United States. Today twelve are in operation, under construction, or in the planning stage. When completed, there will be in excess of 150,000 square feet of BSL-4 laboratory space (as much space as three football fields). The number of BSL-3 labs is also clearly growing, but ascertaining the amount of growth is difficult in the absence of accurate baseline information. There are at least 600 such facilities in the US. (Alan M. Pearson, Testimony, “Germs, Viruses, and Secrets: The Silent Proliferation of Bio-Laboratories in the United States,” House Energy and Commerce Committee, Subcommittee on Oversight and Investigations, October 2007)
Chillingly, one consequence of this metastatic growth “is that the very labs designed to protect against bioweapons may become a source for them.” As the 2001 anthrax attacks amply demonstrated, the threat posed by a biological weapons’ incident may be closer to home than any of us care to think. Pearson writes, “Nor should we ignore the possibility that a US biologist may become disgruntled or turn rogue while working in one of these labs.”
According to Edward Hammond, the Director of the now-defunct Sunshine Project, while “biological arms control is currently in … its worst crisis since the signing of the Bioweapons Convention (BWC) in 1972,” the American Bioweapons-Industrial Complex has “embarked on the exploitation of biotechnology for weapons development.” Indeed, Hammond relates that active programs utilizing genetic engineering techniques have “been employed in offensive biowarfare programs in order to make biowarfare agents more effective.”
But increases in state subsidies for such work have generated new risks to the public. A recent Government Accountability Office (GAO) report faulted the Centers for Disease Control and Prevention (CDC) for lax security at three of the nation’s five BSL-4 labs currently in operation that “handle the world’s most dangerous agents and toxins that cause incurable and deadly diseases.” Agents such as Ebola, Marburg and smallpox are routinely studied at these facilities. And yet, as GAO auditors found,
Select agent regulations do not mandate that specific perimeter security controls be present at BSL-4 labs, resulting in a significant difference in perimeter security between the nation’s five labs. According to the regulations, each lab must implement a security plan that is sufficient to safeguard select agents against unauthorized access, theft, loss, or release. However, there are no specific perimeter security controls that must be in place at every BSL-4 lab. While three labs had all or nearly all of the key security controls we assessed, our September 2008 report demonstrated that two labs had a significant lack of these controls. (Government Accountability Office, Biosafety Laboratories: BSL-4 Laboratories Improved Perimeter Security Despite Limited Action by CDC, GAO-09-851, July 2009)
As Global Security Newswire revealed in June, a “recently completed inventory at a major U.S. Army biodefense facility found nearly 10,000 more vials of potentially lethal pathogens than were known to be stored at the site.”
The 9,220 samples–which included the bacterial agents that cause plague, anthrax and tularemia; Venezuelan, Eastern and Western equine encephalitis viruses; Rift valley fever virus; Junin virus; Ebola virus; and botulinum neurotoxins–were found during a four-month inventory at the U.S. Army Medical Research Institute of Infectious Diseases at Fort Detrick, Md., according to Col. Mark Kortepeter, the center’s deputy commander. (Martin Matishak, “Thousands of Uncounted Disease Samples Found at Army Biodefense Lab,” Global Security Newswire, June 18, 2009)
The GSN report states that while “half of the newfound material was destroyed after being recorded,” inventory control officer Sam Edwin told reporters that “the other half was deemed worthy for further scientific use, cataloged, and stored in the center’s containment freezers.”
More pertinently, what happens when the state itself turns “rogue” and under cover of national security and the endless “war on terror” creates the “acute risk” in the form of out-of-control laboratories “designed to protect against bioweapons” that instead, have “become a source for them”?
Bioweapons and National Security: A Chronology
Source Notes: This chronology has drawn from dozens of books, articles and declassified government documents in its preparation. Notable in this regard is Michael Christopher Carroll’s Lab 257: The Disturbing Story of the Government’s Secret Germ Laboratory; Linda Hunt, Secret Agenda; Bob Coen and Eric Nadler, Dead Silence: Fear and Terror on the Anthrax Trail; the National Security Archive’s documentary history of U.S. Biological Warfare programs and The Sunshine Project.
* August 1945: Operation Paperclip, an Office of Strategic Services (OSS) program to import top Nazi scientists into the United States. Linda Hunt relates in her book, Secret Agenda, that Reich Health Leader (Reichsgesundheitsführer) Dr. Kurt Blome, was saved from the gallows due to American intervention. Blome admitted he had worked on Nazi bacteriological warfare projects and had experimented on concentration camp prisoners with bubonic plague and sarin gas at Auschwitz. After his acquittal at the 1947 Nuremberg Doctors’ Trial, Blome was recruited by the U.S. Army Chemical Corps and advised the Pentagon on biological warfare. Walter Paul Emil Schreiber, a Wehrmacht general who assigned doctors to experiment on concentration camp prisoners and disbursed state funds for such experiments was another Paperclip recruit; in 1951, Schreiber went to work for the U.S. Air Force School of Medicine. Hubertus Strughold, the so-called “father of space medicine” discussed–and carried out–experiments on Dachau inmates who were tortured and killed; Strughold worked for the U.S. Air Force. Erich Traub, a rabid Nazi and the former chief of Heinrich Himmler’s Insel Riems, the Nazi state’s secret biological warfare research facility defects to the United States. Traub was brought to the U.S. by Paperclip operatives and worked at the Naval Medical Research Institute and gave “operational advice” to the CIA and the biowarriors at Ft. Detrick.
* September 1945: General Shiro Ishii’s Unit 731, a secret research group that organized Japan’s chemical and biological warfare programs is granted “amnesty” by Supreme Allied Commander in the Pacific, General Douglas MacArthur in exchange for providing America with their voluminous files on biological warfare. All mention of Unit 731 is expunged from the record of The Tokyo War Crimes Tribunal. During the war, Unit 731 conducted grisly experiments, including the vivisection of live prisoners, and carried out germ attacks on Chinese civilians and prisoners of war. According to researcher Sheldon H. Harris in Factories of Death: Japanese Biological Warfare 1932-45 and the American Cover-Up, Unit 731 scientists performed tests on prisoners with plague, cholera, smallpox, botulism and other infectious diseases. Their work led to the development of what was called a defoliation bacilli bomb and a flea bomb used by the Imperial Army to spread bubonic plague across unoccupied areas of China. The deployment of these lethal munitions provided the Imperial Army with the ability to launch devastating biological attacks, infecting agriculture, reservoirs, wells and populated areas with anthrax, plague-infected fleas, typhoid, dysentery and cholera. Rather than being prosecuted as war criminals, Unit 731 alumni became top bioweapons researchers. Ishii himself became an adviser at USAMRIID at Ft. Detrick.
* 1950: A U.S. Navy ship equipped with spray devices supplied by Ft. Detrick, sprayed serratia marcescens across the San Francisco Bay Area while the ship plied Bay waters. Supposedly a non-pathogenic microorganism, twelve mostly elderly victims die. Serratia marcescens is a species of rod-shaped, Gram-negative bacteria in the family Yersiniaceae. It is a facultative anaerobe and an opportunistic pathogen in humans. It was discovered in 1819 by Bartolomeo Bizio in Padua, Italy.
* Early 1950s: Army biological weapons research begins at the Plum Island Animal Disease Center (PIADC). Vials of anthrax are transferred from Ft. Detrick to Plum Island. This information is contained in a now declassified report, “Biological Warfare Operations,” Research and Development Annual Technical Progress Report, Department of the Army, 1951.
* 1951: Racist experiments are carried out. U.S. Army researchers deliberately expose African-Americans to the fungus Aspergillus fumigatus to discern whether they are more susceptible to infections caused by such organisms than white Europeans. Also in 1951, black workers at the Norfolk Supply Center in Virginia were exposed to crates contaminated with A. fumigatus spores.
* 1952: According to 1977 hearings by the Senate Select Committee on Intelligence and the Subcommittee on Health and Scientific Research into Project MKULTRA, we discover the following: “Under an agreement reached with the Army in 1952, the Special Operations Division (SOD) at Fort Detrick was to assist CIA in developing, testing, and maintaining biological agents and delivery systems. By this agreement, CIA acquired the knowledge, skill, and facilities of the Army to develop biological weapons suited for CIA use.”
* 1953: Frank Olson, a chemist with the Army’s top secret Special Operations Division at Ft. Detrick was involved with biological weapons research and was tasked to the CIA for work on MKULTRA. In 1953, as Deputy Acting Head of Special Operations for the CIA, Olson is a close associate of psychiatrist William Sargant who was investigating the use of psychoactive drugs as an interrogation tool at Britain’s Biological Warfare Centre at Porton Down. After being dosed with LSD without his knowledge by Dr. Sidney Gottlieb, the Agency’s liaison to Ft. Detrick, Olson undergoes a severe psychological crisis. The scientist begins questioning the ethics of designing biological organisms as weapons of war. This does not sit well with his Agency and Army superiors. On November 24, 1953, Olson and a CIA minder, Robert Lashbrook, check into New York’s Staler Hotel. He never checked out. According to Lashbrook, Olson had thrown himself through the closed shade and window, plunging 170 feet to his death. But because of his knowledge of CIA “terminal experiments” and other horrors conducted under MKULTRA, the Olson family believes the researcher was murdered. When Olson’s son Eric has his father’s body exhumed in 1994, the forensic scientist in charge of the examination determines that Olson had suffered blunt force trauma to the head prior to his fall through the window; the evidence is called “rankly and starkly suggestive of homicide.” Norman G. Cournoyer, one of Olson’s closet friends at Ft. Detrick also believes the scientist was murdered. When asked by the Baltimore Sun in 2004 why Olson was killed, Cournoyer said, “To shut him up. … He wasn’t sure we should be in germ warfare, at the end.”
* 1955: Following a CIA biowarfare test in Tampa Bay, Florida, the area experiences a sharp rise in cases of Whooping Cough, including 12 deaths. The Agency had released bacteria it had obtained from the U.S. Army’s Chemical and Biological Warfare Center at the Dugway Proving Grounds.
* 1956-1958: More racist experiments. The U.S. Army conducted live field tests on poor African-American communities in Savannah, Georgia and Avon Park, Florida. Mosquitoes were released into neighborhoods at ground level by “researchers” or by helicopter; residents were swarmed by the pest; many developed unknown illnesses and some even died. After the tests, Army personnel posing as health workers photographed and tested the victims, then disappeared. While specific details of the experiments remain classified, it has been theorized that a strain of Yellow Fever was used to test its efficacy as a bioweapon.
* 1962: A declassified CIA document obtained by the National Security Archive relates the following: “In November 1962 Mr. [redacted] advised Mr. Lyman Kirkpatrick that he had, at one time, been directed by Mr. Richard Bissell to assume responsibility for a project involving the assassination of Patrice Lumumba, then Premier, Republic of Congo. According to Mr. [redacted] poison was to have been the vehicle as he made reference to having been instructed to see Dr. Sidney Gottlieb in order to procure the appropriate vehicle.” Gottlieb was the chief scientific adviser for the CIA’s MKULTRA program.
* June 1966: The U.S. Army’s Special Operations Division dispenses Bacillus subtilis var niger throughout the New York City subway system. More than a million people were exposed when Army operatives dropped light bulbs filled with the bacteria onto ventilation grates.
* December, 1967: The New York Times reports, “Fatal Virus Found in Wild Ducks on L.I.” A virus never seen before in the Western hemisphere, began with ducks in Long Island at a site opposite Plum Island; the virus devastates the area’s duck industry and by 1975 has spread across the entire continent.
* 1971: The U.S. Department of Agriculture proclaims that “Plum Island is considered the safest in the world on virus diseases.” USDA’s proof? “There has never been a disease outbreak among the susceptible animals maintained outside the laboratory since it was established.”
* 1975: PIADC begins feeding live viruses to “hard ticks,” including the Lone Star tick (never seen outside Texas prior to 1975). The Lone Star tick is a carrier of the Borelia burgdorferi (Bb) bacteria, the causal agent of Lyme Disease. The first cases of the illness are reported in Connecticut, directly across from the facility. Current epidemiological data conclusively demonstrate that the epicenter of all U.S. Lyme Disease cases is Plum Island. It is theorized that deer bitten by infected ticks swam across the narrow waterway separating the island from the mainland.
* September 1978: A PIADC news release relays the following: “Foot and Mouth Disease has been diagnosed in cattle in a pre-experimental animal holding facility at the Plum Island Animal Disease Center.” A documented outbreak has occurred.
* 1979: An internal investigation of the FMD incident reveals massive, widespread failures in the containment systems at PIADC. A USDA Committee report recommends that “Lab 101 not be considered as a safe facility in which to do work on exotic disease agents until corrective action is accomplished.”
* 1979: Despite containment failures and poor practices, USAMRIID undertakes the investigation of the deadly Zagazig 501 strain of Rift Valley Fever at PIADC. Producing symptoms similar to aerosolized hemorrhagic fevers such as Marburg and Ebola virus, the Army inoculates sheep that should have been destroyed as a result of the FMD outbreak with an experimental Rift Valley Fever vaccine. The experiments are conducted outdoors, in violation of the lab’s primary directive prohibiting such work. During a 1977 Rift Valley outbreak in Egypt, some 200,000 people are infected and 700 others die excruciating deaths. A survey of blood serum taken before 1977 proved that the virus was not present in Egypt prior to the epidemic. By 2000, rampant outbreaks of the disease have occurred in Saudi Arabia and Yemen with the virus poised to unfurl its tentacles into Europe.
* 1982: A Federal review begun after the FMD outbreak concludes: “We believe there is a potentially dangerous situation and that without an immediate massive effort to correct deficiencies, a severe accident could result… [L]ack of preventive maintenance, [and] pressures by management to expedite programs have resulted in compromising safety.”
* 1983: Six PIADC workers test positive for African Swine Fever virus. The workers are not notified of the test results which are conducted clandestinely during routine annual physical exams.
* 1991: USDA privatizes PIADC. A New Jersey firm, Burns & Roe Services Corporation low bids other competitors and is awarded the contract. In cost-cutting moves, the contractor scales back on safety and security measures in place for decades.
* June 1991: An underground cable supplying Lab 257 shorts out but is not replaced since there is no money left in the budget.
* August 1991: Hurricane Bob, a category 3 storm similar to Hurricane Katrina, slams into Plum Island, knocking down overhead power lines that connect Lab 257. The underground cable which was Lab 257’s primary power source has not been repaired. Freezers containing virus samples defrost, air seals on lab doors are breached and animal holding room vents fail. PIADC’s “fail safe” mechanism of “air dampers” to seal off the facility also fail. Melted virus samples mix with infected animal waste on lab floors as swarms of mosquitoes fill the facility.
* September 1991: The USDA denies that any system failures occurred during the hurricane. Whistleblowing workers in Lab 257 at the time of the blackout are fired in further cost-cutting moves and several subsequently develop mysterious undiagnosed diseases.
* 1992: The Occupational Safety and Health Administration (OSHA) and the Environmental Protection Agency (EPA) cite PIADC with hundreds of safety violations. When OSHA returned five years later, none of the violations have been corrected and discover 124 new violations.
* July 1992: Although USDA officially denies that PIADC conducts biological warfare research, fourteen officials from the Joint Chiefs of Staff and the Pentagon visit Plum Island. Internal documents reveal that that the visit was “to meet with [Plum Island] staff regarding biological warfare.” According to Carroll, “the visitors were part of the Arms Control and Disarmament Agency reviewing the dual-use capabilities of the facility.”
* Spring 1995: Lab 257 is closed. Although scheduled to be fully decontaminated and demolished in 1996 Carroll reports: “Lab 257 still stands today, rotting from weathered decay, harboring who knows what deep within.”
* August 1999: The first four human cases of West Vile virus, a mosquito-borne pathogen never diagnosed in North America are diagnosed on Long Island. Horse farms within a five-mile radius of one another, directly opposite Plum Island, report horses dying following violent seizures. An investigation reveals that 25% of the horses in this small, localized area test positive for West Nile. The outbreak begins in August 1999 when birds, including half the exotic bird species in the Bronx Zoo begin dying mysteriously. The virus has an affinity for birds and the vector is soon identified as the mosquito. In 1999, the disease was confined to the New York City area, however by 2002, the Centers for Disease Control reports all but 6 of the lower 48 states reported West Nile virus in birds, mosquitos, animals or human populations. CDC estimates that some 200,000 people are infected nationally. During the initial outbreak in 1999, veterinary pathologist Tracey McNamara suspected a casual relationship between the bird die-offs and the human cases; CDC rebuffs her concerns. Through her persistent efforts, it is determined that the virus was indeed West Nile, a pathogen that had never been seen in North America. The CDC announces that West Nile virus was in the nation’s blood supply when transplant patients who had no prior exposure to the pathogen develop the disease. The USDA’s response? Deny, deny, deny? However, Jim House, a former PIADC scientist, believes that West Nile samples existed prior to 1999 on Plum Island. He told Carroll, “There were samples there, and it wasn’t answered clearly to the public. They didn’t honestly tell how many samples they had and that’s when people started to get upset. When Carroll filed a Freedom of Information Act request for a catalog of germs held in the Plum Island virus library, he was turned down on grounds of “national security.”
* September 1999: The New York Times reports that due to “the growing threat of biological terrorism” against America’s food supply, USDA “is seeking money to turn the Plum Island Animal Disease Center … into a top security laboratory where some of the most dangerous diseases known to man or beast can be studied.”
* 1999: A Cold War-era document is declassified proving that in the early 1950s USAMRIID shipped twelve vials of weaponized anthrax (enough to kill one million people) to PIADC. In 1993 Newsday revealed that previously unclassified documents demonstrated Pentagon plans to disrupt the Soviet economy by spreading diseases to kill pigs, cattle and horses.
* 1999: Plans to “upgrade” PIADC by building a BSL-4 lab are killed when Congress pulls funding after a public outcry.
* September 2001: After the anthrax attacks, despite USDA denials that anthrax was ever present on the island, FBI investigators include the following questions in their polygraph examination of scientists under investigation: “Have you ever been to Plum Island?” “Do you know anyone who works at Plum Island?” “What do they do there?”
* December 2002: The New York Times reports “a three-hour power failure at the Plum Island Animal Disease Center last weekend renewed concerns about the safety of the high-security government laboratory.” According to the Times, “the loss of power and failure of all three backup generators raised fears for the first time that the containment of infectious pathogens could have been seriously compromised at the laboratory.”
* June 2003: President George W. Bush transfers control of PIADC to the Department of Homeland Security. The airspace over the island is unrestricted and the gates leading to Lab 101 remain open and unguarded.
* May 2004: In a sign that work on Plum Island is being shifted to “other sites,” including those run by private contractors, DHS announces an $18 million grant to study Rift Valley fever, avian influenza and brucellosis.
* August 2004: DHS confirmed that an FMD outbreak “had spread briefly” in “two previously undisclosed incidents earlier this summer,” The New York Times reports. A DHS spokesperson said the virus remained “within the laboratory’s sealed biocontainment area” and that there “had be no risk” to human or animals. An investigation into the cause “was continuing.”
* 2004: At the Medical University of Ohio, a researcher is infected with Valley Fever at the center’s BSL-3 facility; Valley Fever is a biological weapons agent.
* February 2005: University of Iowa researchers conduct unauthorized genetic engineering experiments with the select agent Tularemia (rabbit fever). The Sunshine Project reports that researchers mixed genes from Tularemia species and introduced antibiotic resistant characteristics into the samples.
* March 2005: When a containment facility fails, workers at the University of North Carolina at Chapel Hill are exposed to tuberculosis when the BSL-3 “fail-safe” systems malfunction; a blower pushes contaminated air out of the work cabinet, infecting the workroom. The facility had been inspected one month prior to the accident by U.S. Army.
* Summer 2005: At the same Ohio facility a serious accident occurs when workers are infected with an aerosol of Valley Fever.
* October-November 2005: Dozens of samples thought to be harmless are received by the University of California at Berkeley. In fact, they are samples of Rocky Mountain Spotted Fever, a BSL-3 bioweapons agent due to its transmission as an aerosol. The samples are handled without adequate safety precautions; however, the community is never notified of the incident.
* August 2005: The whistleblowing watchdog group Tri-Valley Cares obtains documents in May 2009 proving that the Lawrence Livermore National Laboratory had conducted “restricted experiments” with “select biological agents” at the facility. In 2005, LLNL “inadvertently” released anthrax at the lab in another incident that lab officials attempted to cover-up; five individuals were infected with the deadly pathogen.
* April 2006: Three Texas A&M “biodefense” researchers are infected with Q Fever, a biological weapons agent. Rather than reporting the incident to the CDC as required by law, Texas A&M officials cover-up the accident.
* August 2006: DHS announces that PIADC is “not on the rebuilding list” and a new site to study infectious diseases is being considered.
* January 2009: DHS announces that the new National Bio and Agro-Defense Facility will be built in Manhattan, Kansas.
* July 2009: Government Accountability Office investigators charge that DHS relied on “a rushed, flawed study” to locate the $700 million research facility for highly infectious pathogens “in a tornado-prone section of Kansas.” Among other concerns, the GAO cites DHS’s “flawed and outdated methodology” in its criticism. Those concerns are: “the ability of DHS and the federal government in general to safely operate a biosafety facility such as the proposed NBAF; the potential for a pathogenic release through accidents, natural phenomena, and terrorist actions; our May 2008 testimony that concluded that DHS had not conducted or commissioned a study to determine whether FMD research could be conducted safely on the U.S. mainland; natural phenomena such as tornadoes, earthquakes, and hurricanes that could cause catastrophic damage to the NBAF and result in the release of a pathogen; the possibility that an infected mosquito vector could escape, allowing a pathogen such as Rift Valley Fever virus to become permanently established in the United States; the economic effects of a release or a perceived release on the local, state, and national livestock industry.”
sources
https://www.globalresearch.ca/biological-warfare-and-the-national-security-state/14708
Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. In addition to publishing in Covert Action Quarterly and Global Research, his articles can be read on Dissident Voice, The Intelligence Daily, Pacific Free Press and the whistleblowing website Wikileaks. He is the editor of Police State America: U.S. Military “Civil Disturbance” Planning, distributed by AK Press.

Wednesday Oct 16, 2024
Wednesday Oct 16, 2024
The Mysterious Connection Between Sirius and Human History
Watch on Rumble: https://rumble.com/v5iulit-the-mysterious-connection-between-sirius-and-human-history.html
Since ancient times and across multiple civilizations, Sirius, the dog star, has been surrounded with a mysterious lore. Esoteric teachings of all ages have invariably attributed to Sirius a special status and the star’s importance in occult symbolism is an attestation of that fact. What makes Sirius so special? Is it simply due to the fact that it is the brightest star in the sky? Or is it also because humanity has an ancient, mysterious connection with it? This article looks at the importance of Sirius throughout History and secret societies and will describe the symbolism surrounding it.
Picture 1
Sirius is located in the constellation Canis Major – also known as the Big Dog – and is therefore known as the “dog star”. It is over twenty times brighter than our sun and is twice as massive. At night time, Sirius is the brightest star in the sky and its blue-white glare never failed to amaze star gazers since the dawn of time. No wonder Sirius has been revered by practically all civilizations. But is there more to Sirius than meets the eye?
Artifacts of ancient civilizations have revealed that Sirius was of a great importance in astronomy, mythology and occultism. Mystery schools consider it to be “sun behind the sun” and, therefore, the true source of our sun’s potency. If our sun’s warmth keeps the physical world alive, Sirius is considered to keep the spiritual world alive. It is the “real light” shining in the East, the spiritual light, where as the sun illuminates the physical world, which is considered to be a grand illusion.
Associating Sirius with the divine and even considering it as the home of humanity’s “great teachers” is not only embedded in the mythology of a few primitive civilizations: It is a widespread belief that has survived (and even intensified) to this day. We will look at the importance of Sirius in ancient times, analyze its prominence in secret societies and we will examine these esoteric concepts as they are translated in popular culture.
Picture 2
In Ancient Civilizations
In Ancient Egypt, Sirius was regarded as the most important star in the sky. In fact, it was astronomically the foundation of the Egyptians’ entire religious system. It was revered as Sothis and was associated with Isis, the mother goddess of Egyptian mythology. Isis is the female aspect of the trinity formed by herself, Osiris and their son Horus. Ancient Egyptians held Sirius in such a high regard that most of their deities were associated, in some way or another, with the star. Anubis, the dog-headed god of death, had an obvious connection with the dog star and Toth-Hermes, the great teacher of humanity, was also esoterically connected with the star.
The Egyptian calendar system was based on the heliacal rising of Sirius that occurred just before the annual flooding of the Nile during summer. The star’s celestial movement was also observed and revered by ancient Greeks, Sumerians, Babylonians and countless other civilizations. The star was therefore considered sacred and its apparition in the sky was accompanied with feasts and celebrations. The dog star heralded the coming of the hot and dry days of July and August, hence the popular term “the dog days of summer”.
Several occult researchers have claimed that the Great Pyramid of Giza was built in perfect alignment with the stars, especially Sirius. The light from these stars were said to be used in ceremonies of Egyptian Mysteries.
“This ancient people (Egyptians) knew that once every year the Parent Sun is in line with the Dog Star. Therefore, the Great Pyramid was so constructed that, at this sacred moment, the light of the Dog Star fell upon the square “Stone of God” at the upper end of the Great Gallery, descending upon the head of the high priest, who received the Super Solar Force and sought through his own perfected Solar Body to transmit to other Initiates this added stimulation for the evolution of their Godhood. This then was the purpose of the “`Stone of God,’ whereon in the Ritual, Osiris sits to bestow upon him (the illuminate) the Atf crown or celestial light.” “North and South of that crown is love,” proclaims an Egyptian hymn. “And thus throughout the teaching of Egypt the visible light was but the shadow of the invisible Light; and in the wisdom of the ancient country the measures of Truth were the years of the Most High.
Picture 3
Recent scientific discoveries relating to the Great Pyramid and its mysterious “air shafts” have lead researchers to further confirm the importance of Sirius within the pyramid.
Star alignment with the Great Pyramid of Giza. Orion (associated with the god Osiris) is aligned with the King’s Chamber while Sirius (associated with the goddess Isis) is aligned with the Queen’s Chamber.
A fascinating aspect of Sirius is the consistency of the symbolism and meanings attached to it. Several great civilizations have indeed associated Sirius with a dog-like figure and viewed the star as either the source or the destination of a mysterious force. In Chinese and Japanese astronomy, Sirius is known as the “star of the celestial wolf”. Several aboriginal tribes of North America referred to the star in canine terms: the Seri and Tohono O’odham tribes of the southwest describe the Sirius as a “dog that follows mountain sheep”, while the Blackfoot call it “Dog-face”. The Cherokee paired Sirius with Antares as a dog-star guardian of the “Path of Souls”. The Wolf (Skidi) tribe of Nebraska knew it as the “Wolf Star”, while other branches of knew it as the “Coyote Star”. Further north, the Alaskan Inuit of the Bering Strait called it “Moon Dog”.
THE DOGON TRIBE AND ATLANTIS
Picture 4
In 1971, the American author Robert Temple published a controversial book entitled The Sirius Mystery where he claimed that the Dogons (an ancient African tribe from Mali) knew details about Sirius that would be impossible to be know without the use of telescopes. According to him, the Dogon understood the binary nature of Sirius, which is, in fact, composed of two stars named Sirius A and Sirius B. This lead Robert Temple to believe that the Dogons had “direct” connections with beings from Sirius. While some might say “you can’t be Sirius” (sorry), a great number of secret societies (who have historically held within their ranks some of the world’s most influential people) and belief systems teach about a mystic connection between Sirius and humanity.
In Dogon mythology, humanity is said to be born from the Nommo, a race of amphibians who were inhabitants of a planet circling Sirius. They are said to have “descended from the sky in a vessel accompanied by fire and thunder” and imparted to humans profound knowledge. This lead Robert Temple to theorize that the Nommos were extraterrestrial inhabitants of Sirius who travelled to earth at some point in the distant past to teach ancient civilizations (such as the Egyptians and Dogons) about the Sirius star system as well as our own solar system. These civilizations would then record the Nommos’ teachings in their religions and make them a central focus of their Mysteries.
The Dogon’s mythology system is strikingly similar to the ones of other civilizations such as the Sumerians, Egyptians, Israelites and Babylonians as it includes the archetypal myth of a “great teacher from above”. Depending on the civilization, this great teacher is known as eith Enoch, Thoth or Hermes Trismegistus and is said to have taught humanity theurgic sciences. In occult traditions, it is believed that Thoth-Hermes had taught the people of Atlantis, which, according to legend, became the world’s most advanced civilization before the entire continent was submerged by the Great Deluge (accounts of a flood can be found in the mythologies of countless civilizations). Survivors from Atlantis travelled by boat to several countries, including Egypt, where they imparted their advanced knowledge. Occultists believe that the inexplicable resemblances between distant civilizations (such as the Mayas and the Egyptians) can be explained by their common contact with Atlanteans.
“Was the religious, philosophic, and scientific knowledge possessed by the priestcrafts of antiquity secured from Atlantis, whose submergence obliterated every vestige of its part in the drama of world progress? Atlantean sun worship has been perpetuated in the ritualism and ceremonialism of both Christianity and pagandom. Both the cross and the serpent were Atlantean emblems of divine wisdom. The divine (Atlantean) progenitors of the Mayas and Quichés of Central America coexisted within the green and azure radiance of Gucumatz, the “plumed” serpent. The six sky-born sages came into manifestation as centers of light bound together or synthesized by the seventh – and chief – of their order, the “feathered” snake. The title of “winged” or “plumed” snake was applied to Quetzalcoatl, or Kukulcan, the Central American initiate. The center of the Atlantean Wisdom-Religion was presumably a great pyramidal temple standing on the brow of a plateau rising in the midst of the City of the Golden Gates. From here the Initiate-Priests of the Sacred Feather went forth, carrying the keys of Universal Wisdom to the uttermost parts of the earth.
From the Atlanteans the world has received not only the heritage of arts and crafts, philosophies and sciences, ethics and religions, but also the heritage of hate, strife, and perversion. The Atlanteans instigated the first war; and it has been said that all subsequent wars were fought in a fruitless effort to justify the first one and right the wrong which it caused. Before Atlantis sank, its spiritually illumined Initiates, who realized that their land was doomed because it had departed from the Path of Light, withdrew from the ill-fated continent. Carrying with them the sacred and secret doctrine, these Atlanteans established themselves in Egypt, where they became its first “divine” rulers. Nearly all the great cosmologic myths forming the foundation of the various sacred books of the world are based upon the Atlantean Mystery rituals.”
Is Thoth-Hermes-Trismegistus the equivalent of the Dogon’s Nommos, who are believed to originate from Sirius? Ancient texts concerning Hermes describe him as a teacher of mysteries who “came from the stars”. Furthermore, Thoth-Hermes was directly connected with Sirius in Egyptian mythology.
“The dog-star: the star worshipped in Egypt and reverenced by the Occultists; by the former because its heliacal rising with the Sun was a sign of the beneficient inundation of the Nile, and by the latter because it is mysteriously associated with Toth-Hermes, god of wisdom, and Mercury, in another form. Thus Sothis-Sirius had, and still has, a mystic and direct influence over the whole living heaven, and is connected with almost every god and goddess. It was “Isis in the heaven” and called Isis-Sothis, for Isis was “in the constellation of the dog”, as is declared on her monuments. Being connected with the Pyramid, Sirius was, therefore, connected with the initiations which took place in it.”
“The Trismegistic treatise ‘The Virgin of the World’ from Egypt refers to ‘the Black Rite’, connected with the ‘black’ Osiris, as the highest degree of secret initiation possible in the ancient Egyptian religion – it is the ultimate secret of the mysteries of Isis. This treatise says Hermes came to earth to teach men civilization and then again ‘mounted to the stars’, going back to his home and leaving behind the mystery religion of Egypt with its celestial secrets which were some day to be decoded.”
Interpreting the mythology of ancient cultures is not an exact science and connections are inherently difficult to prove. However, the symbolic link between Sirius and occult knowledge has constantly appeared throughout History and has seamlessly traveled through the ages. In fact, it is as revered today as it was millenniums ago. Modern secret societies such as the Freemasons, the Rosicrucians and the Golden Dawn (which are considered to be Hermetic Orders due to the fact their teachings are based on those of Hermes Trismegistus) all attribute to Sirius the utmost importance. An educated look at their symbolism provides a glimpse at the profound connection between Sirius and occult philosophy.
Sirius in Occult Symbolism and Secret Societies
To claim that Sirius is “important” to Hermetic Orders would be a gross understatement. The dog star is nothing less than the central focus of the teachings and symbolism of secret societies. The ultimate proof of this fact: many secret societies are actually named after the star.
IN THE TAROT
Picture 5
The seventeenth numbered major trump is called Les Étoiles, (French for The Star), and portrays a young girl kneeling with one foot in water and the other on and, her body somewhat suggesting the swastika. She has two urns, the contents of which she pours upon the land and sea. Above the girl’s head are eight stars, one of which is exceptionally large and bright. Count de Gébelin considers the great star to be Sothis or Sirius; the other seven are the sacred planets of the ancients. He believes the female figure to be Isis in the act of causing the inundations of the Nile which accompanied the rising of the Dog Star. The unclothed figure of Isis may well signify that Nature does not receive her garment of verdure until the rising of the Nile waters releases the germinal life of plants and flowers.
IN FREEMASONRY
In Masonic lodges, Sirius is known as the “Blazing Star” and a simple look at its prominence in Masonic symbolism reveals its utmost importance. The Masonic author William Hutchinson wrote about Sirius: “It is the first and most exalted object that demands our attention in the Lodge.” The same way the light of Sirius made its way into the Great Pyramid during initiations, it is symbolically present in Masonic lodges.
“The Ancient Astronomers saw all the great Symbols of Masonry in the Stars. Sirius glitters in our lodges as the Blazing Star.”
Picture 6
Sirius, the Blazing Star, at the center of the Masonic mosaic pavement.
Picture 7
The Blazing Star shining upon members of a Masonic lodge
“(The Blazing Star) originally represented SIRIUS, or the Dog-star, the forerunner of the inundation of the Nile; the God ANUBIS, companion of ISIS in her search for the body of OSIRIS, her brother and husband. Then it became the image of HORUS, the son of OSIRIS, himself symbolized also by the Sun, the author of the Seasons, and the God of Time; Son of ISIS, who was the universal nature, himself the primitive matter, inexhaustible source of Life, spark of uncreated fire, universal seed of all beings. It was HERMES, also, the Master of Learning, whose name in Greek is that of the God Mercury.”
In Freemasonry, it is taught that the Blazing Star is a symbol of deity, of omnipresence (the Creator is present everywhere) and of omniscience (the Creator sees and knows all). Sirius is therefore the “sacred place” all Masons must ascend to: It is the source of divine power and the destination of divine individuals. This concept is often represented in Masonic art.
Picture 8
Masonic art portraying Sirius, the Blazing Star, as the destination of the Mason’s journey.
To achieve perfection, the initiate must successfully understand and internalize the dual nature of the world (good and evil; masculine and feminine; black and white, etc.) through alchemical metamorphosis. This concept is symbolically represented by the union of Osiris and Isis (the male and female principles) to give birth to Horus, the star-child, the Christ-like figure, the perfected man of Freemasonry – who is equated with the Blazing Star.
“The sun and moon … represent the two grand principles … the male and the female … both shed their light upon their offspring, the blazing star, or Horus.”
The Egyptian hieroglyph representing Sirius has been esoterically interpreted to be a representation of this cosmic trinity.
Picture 9
The hieroglyph representing Sirius contains three elements: a “phallic” obelisk (representing Osiris), a “womb-like” dome (representing Isis) and a star (representing Horus).
This concept is so crucial for Freemasons, that it was embedded in some of the most important structures in the world.
picture 10
The Washington Monument, an Egyptian obelisk representing the male principle, is directly connected with the dome of the Capitol, representing the female principle. Together they produce Horus an unseen energy represented by Sirius. (For more information, read the article Mystical Sites – The U.S. Capitol on The Vigilant Citizen).
As stated by Albert Pike above, the Egyptian god Horus and the star Sirius are often associated. In Masonic symbolism, the eye of Horus (or the All-Seeing Eye) is often depicted surrounded by the glittering of light of Sirius.
Picture 11
Sirus Triangle
A Masonic tracing board depicting the sun above the left pillar (representing the masculine), the moon above the right pillar (representing feminine) and Sirius above the middle pillar, representing the “perfected man” or Horus, the son of Isis and Osiris. Notice the “Eye of Horus” on Sirius.
Picture 12
The Eye of Horus inside a triangle (symbolizing deity) surrounded by the glow of Sirius, the Blazing Star
Picture 13
The All-Seeing Eye inside the Blazing Star in Masonic art.
Given the symbolic correlation between the All-Seeing Eye and Sirius, the next image becomes self-explanatory.
Picture 14
The light behind the All-Seeing Eye on the American dollar bill is not from the sun, but from Sirius. The Great Pyramid of Giza was built in alignment with Sirius and is therefore shown shining right above the Pyramid. A radiant tribute to Sirius is therefore in the pockets of millions of citizens.
ORDER OF THE EASTERN STAR
Picture 15
The symbol of the OES is an inverted star, similar to the Blazing Star of Freemasonry.
Considered to be the “female version” of Freemasonry (although men can join), the Order of the Eastern Star (OES) is directly named after Sirius, the “Star rising from the East”. A “general public” explanation of the origins of the Order’s name claims it originated from the “Star of the East” that lead the Three Magis to Jesus Christ. A look into the occult meaning of the Order’s symbolism however makes it clear that the OES is a reference to Sirius, the most important star of Freemasonry, its parent organization.
Picture 16
OES art depicting Sirius above the Great Pyramid.
MADAME BLAVATSKY, ALICE BAILEY AND THEOSOPHY
Helena Blavatsky and Alice Bailey, the two main figures associated with Theosophy, have both considered Sirius to be a source esoteric power. Blavatsky stated that the star Sirius exerts a mystic and direct influence over the entire living heaven and is linked with every great religion of antiquity.
Alice Bailey sees the Dog Star as the true “Great White Lodge” and believes it to be the home of the “Spiritual Hierarchy”. For this reason she considers Sirius as the “star of initiation”.
“This is the great star of initiation because our Hierarchy (an expression of the second aspect of divinity) is under the supervision or spiritual magnetic control of the Hierarchy of Sirius. These are the major controlling influences whereby the cosmic Christ works upon the Christ principle in the solar system, in the planet, in man and in the lower forms of life expression. It is esoterically called the “brilliant star of sensitivity.”
Not unlike most many esoteric writers, Bailey considers Sirius to have a great impact on human life.
“All that can be done here in dealing with this profound subject is to enumerate briefly some of the cosmic influences which definitely affect our earth, and produce results in the consciousness of men everywhere, and which, during the process of initiation, bring about certain specific phenomena.
First and foremost is the energy or force emanating from the sun Sirius. If it might be so expressed, the energy of thought, or mind force, in its totality, reaches the solar system from a distant cosmic centre via Sirius. Sirius acts as the transmitter, or the focalising centre, whence emanate those influences which produce self-consciousness in man.”
ALEISTER CROWLEY, THE A.A. AND KENNETH GRANT
In 1907, Crowley started his own occult order called the A.A. – short for Argentium Astrum, which can be translated to ‘The Order of the Silver Star’. The ‘Silver Star’ was, of course, a reference to Sirius. Even if Crowley almost always referred to the dog star in veiled terms, the whole of his magickal philosophy, from his development as a young Freemason through to his final years as the Head of the O.T.O, is wholly in accordance with the Sirian influence, which was identified and expressed by other writers of his era. His alleged contact with his Holy Guardian Angel that later led to the channelling of ‘Liber AL: The Book of the Law’ is believed to have originated from Sirius.
If Crowley used code words to describe Sirius, his protégé Kenneth Grant has explicitly and extensively written about the dog star. Throughout his numerous books, he often described Sirius as being a powerful center of magickal magnetic power. His belief that the star holds the central key to unlocking the mysteries of the Egyptian and Typhonian traditions has strengthened over time and became a central focus of his research. One of Grant’s most important and controversial thesis was his discovery of the “Sirius/Set current”, which is an extra-terrestrial dimension connecting Sirius, the Earth and Set, the Eyptian god of Chaos – who was later associated with Satan.
“Set is the initiator, the Opener of mans’ consciousness to the rays of the Undying God typified by Sirius – the Sun in the South.”
“Sirius, or Set, was the original “headless one” – the light of the lower region (the south) who was known (in Egypt) as An (the dog), hence Set-An (Satan), Lord of the infernal regions, the place of heat, later interpreted in a moral sense as “hell”.”
Although each occult philosophy describes Sirius in a slightly different matter, it is still consistently regarded as the “sun behind the sun”, the true source of occult power. It is perceived as the cradle of human knowledge and the belief of the existence of a strong connection between the star and planet Earth never seems to become outdated. Is there a true link between Sirius and Earth? Is the dog star an esoteric symbol representing something happening in the spiritual realm? It is both? One thing is for sure, the cult of Sirius is not a “thing of the past” and is very alive today. An in-depth look at our popular culture, which is heavily influenced by occult symbolism, reveals numerous references to Sirius.
Sirius in Popular Culture
Direct references to Sirius in popular culture are too many to enumerate (e.g. see the name and the logo of the most important satellite radio in the world). A more interesting aspect of popular culture to analyze are the coded references to Sirius. Important movies have indeed made veiled yet profound references to the dog star (apparently intended to those “in the know”), where the star plays the role it was always given by the Mysteries: as an initiator and a divine teacher. Here are some examples.
Picture 17
In Disney’s Pinocchio, based on a story written by Freemason Carlo Collodi, Gepetto prays to the brightest star in the sky to have a “real boy”. The Blue Fairy (her color is a reference to Sirius’ light-blue glow) then descends from the heavens to give life to Pinocchio. Throughout the marionette’s quest to become a boy (an allegory for esoteric initiation), the Blue Fairy guides Pinocchio towards the “right path”. Sirius is therefore represented as a source of life, a guide and a teacher. (For more information see the article entitled The Esoteric Interpretation of Pinocchio on The Vigilant Citizen).
The theme song of the movie Pinocchio is also an ode to Sirius.
When you wish upon a star, makes no difference who you are
Anything your heart desires will come to you
If your heart is in your dreams, no request is too extreme
When you wish upon a star as dreamers do
(Fate is kind, she brings to those who love
The sweet fulfillment of their secret longing)
Like a bolt out of the blue, fate steps in and sees you thru
When you wish upon a star, your dreams come true
Picture 18
In Harry Potter, the character named Sirius Black is most likely a reference to Sirius B. (the “darker” star of Sirius’ binary system). He is Harry Potter’s godfather, which makes Sirius, once again, a teacher and a guide. The wizard can turn into a big black dog, another link with the “dog star”.
Picture 19
In the Truman Show, a spotlight – used to imitate the light of a star in Truman’s fake world – falls from the sky and nearly hits him. The label on the spotlight identifies it as Sirius. Truman’s encounter with Sirius gives him a glimpse of “true knowledge” and prompts his quest for truth. Sirius is therefore the “star of initiation”. It caused Truman to realize the limitations of the his studio world (our material world) and lead him to freedom (spiritual emancipation).
In Conclusion
From the dawn of civilization to modern times, from remote tribes of Africa to the great capitals of the modern world, Sirius was – and still is – seen as a life-giver. Despite the disparity between cultures and epochs, the same mysterious attributes are given to the dog star, which can lead us to ask: how can all theses definitions synchronize so perfectly? Is there a common source to these myths about Sirius? The dog star is invariably associated with divinity and is regarded as a source of knowledge and power. These connections are particularly evident when one examines the teachings and the symbolism of secret societies, who have always taught about a mystical link with this particular celestial body. Is there a secret link between human evolution and Sirius? Unlocking this secret would mean unlocking one of humanity’s greatest mysteries.
sources
https://www.occultwisdomhaven.com/hidden-knowledge/the-mysterious-connection-between-sirius-and-human-history.html
Marshall Adams, The Book of the Master
J.B. Holberg, Sirius: Brightest Diamond in the Night Sky
Manly P. Hall, The Secret Teachings of All Ages
Helena Blavatsky, Theosophical Glossary
Robert Temple, The Sirius Mystery
Manly P. Hall, The Secret Teachings of All Ages
Albert Pike, Morals and Dogma
Ibid
Pike, op. cit.
Alice Bailey, Esoteric Astrology
Alice Bailey, Initiation, Human and Solar
Kenneth Grant, The Magical Revival
Ibid.

Tuesday Oct 15, 2024
Tuesday Oct 15, 2024
The Order of the Illuminati: Its Origins, Its Methods and Its Influence on the World Events
Watch on Rumble: https://rumble.com/v5ileyq-the-order-of-the-illuminati-its-origins-its-methods-and-its-influence-on-th.html
I found an amazing website and would have never been found it unless I used Russia’s Yandex. This website is shadowbanned in the united states. And for good reason. Occult Wisdom Haven Dot Com. Link below. They have a wealth of knowledge about the esoteric, occult and illuminati.
The Order of the Illuminati is often at the center of debates about the impact of secret societies on human history. Is the Illuminati a myth or does it truly secretly rule the world? As the number of people asking that question has grown, facts about the Order have become diluted with misconceptions and disinformation, making objective research on the subject difficult. This article attempts to shed some factual light on the Order of the Illuminati by reviewing some of the most important documents on the subject.
The world “Illuminati” is thrown around rather freely to describe the elite group that is secretly running the world. Most have a general idea of the meaning of the term, but are confused about the concepts and the ideas relating to it. Is the Illuminati the same thing as Freemasonry? What are their goals? What are their beliefs? Why do they act in secret? Do they practice occultism? Attempting to objectively research the subject can become an arduous task as most sources end up being either dismissive disinformation pieces that deny (and even ridicule) anything related to the Illuminati or, at the other end of the spectrum, espouse ill-informed fear mongering based on rumors and misconceptions. In both cases, the researcher ends up with the same result: a distorted version of the truth.
Considering that Secret Societies are supposed to be, by definition, secret, and that history is often rewritten by those in power, obtaining the unbiased truth about the Illuminati is a challenge. This article does not claim to “reveal” or “expose” everything that is to be known about the Illuminati; it rather attempts draw a more precise picture of the Order by citing authors who have extensively studied the subject. Whether they are, at the end of the day, critics or apologists of the Illuminati, these authors base their thoughts on credible facts. Some of the most interesting documents on the Illuminati were written by initiates of Secret Societies as they understood the philosophical and spiritual undercurrent driving the movement forward. Using these works, we will look at the origins, the methods and the impacts of the Illuminati on world history.
Types of Secret Societies
Although several groups called themselves “Illuminati” in the past, the most influential and memorable of them was the Bavarian Illuminati. Founded on May 1, 1776, the organization created by Adam Weishaupt blurred the line between “spiritual” and “political” Secret Societies. By mixing the occult sciences of Freemasonry and Rosicrucianism while conspiring to achieve precise political goals, the Illuminati became an actor on the world stage. While most Secret Societies of the time catered to rich people and their fascination with occultism, the Bavarian Illuminati actively sought to profoundly change the world.
Secret Societies have existed throughout the course of history, each of them with different aims and with different roles in society. While the Egyptian mystery schools were part of the Egyptian institution, other groups were secret due to their subversive and conspiratorial aims. These two next quotes, written by two famous political figures, describe these opposing views on Secret Societies:
“Did Zanoni belong to this mystical Fraternity, who, in an earlier age, boasted of secrets of which the Philosopher’s Stone was but the least; who considered themselves the heirs of all that the Chaldeans, the Magi, the Gymnosophists, and the Platonists had taught; and who differed from all the darker Sons of Magic in the virtue of their lives, the purity of their doctrines, and their insisting, as the foundation of all wisdom, on the subjugation of the sense, and the intensity of Religious Faith?”
- Sir Edward Bulwer Lytton, 1884 1
“The governments of the present day have to deal not merely with other governments, with emperors, kings and ministers, but also with the secret societies which have everywhere their unscrupulous agents, and can at the last moment upset all the governments’ plans.”
- British Prime Minister Benjamin Disraeli, 1876
These quotes describe different realms of influence of Secret Societies. The first one refers to the spiritual side while the second describes the political side. Not all Secret Societies dwell in the spiritual and not all of them get involved in political machinations. The Bavarian Illuminati operated in both realms.
“Spiritual brotherhoods are pledged to Wisdom and guiding humanity towards the realm of the Infinite; Political brotherhoods [are comprised] of power-seekers who cloak their manipulative agenda in darkness.
All secret societies share certain fundamental themes. Membership is restricted to those who have an abiding interest in the subject. Thus, a spiritual group will attract people seeking more knowledge of a particular teacher or type of practice. The student is aware of the subject matter in advance and will approach the group for further instruction. More rarely, an individual may be “tapped” by the group because of a perceived affinity to its purpose.
In a political secret society, membership is restricted to those who share an ideological affinity with the goals the group represents. At the furthest end of the political spectrum, the mission will be revolution. Such a society will go to great lengths to defend itself.
The Illuminati are perceived by many as spanning the chasm between the spiritual and the political secret society. Often credited (or blamed) for influencing the French Revolution in 1787, the Illuminati taught a doctrine of social and political liberation that hinged on the equality of man, the embrace of rationalism, and the denial of crown and church as the legitimate institutions for the regulation of social and moral values. While the views of the Illuminati may sound quite advanced for the time, the European revolutions they are believed to have encouraged degenerated into brutal bloodbaths whose singular lack of moral compass was appalling.” 2
While some believe that Adam Weishaupt was the sole mastermind of the Illuminati and that his organization rose to glory and died in less than twelve years, most researchers initiated in occultism believe that the Bavarian Illuminati was the rare appearance of an ancient Brotherhood that could be traced back to the Knight Templars of the Middle-Ages.
Manly P. Hall, a 33rd Degree Freemason and prolific author, described in his pamphlet “Masonic Orders of Fraternity” an “Invisible Empire” that has been silently working for centuries towards social change. It periodically became visible throughout History, through different organizations who bore different names. According to him, these groups have a great yet silent impact on society, even transforming the educational system to form future generations.
“The direct descent of the essential program of the Esoteric Schools was entrusted to groups already well-conditioned for the work. The guilds, trade unions, and similar protective and benevolent Societies had been internally strengthened by the introduction of a new learning. The advancement of the plan required the enlargement of the boundaries of the philosophic overstate. A World Fraternity was needed, sustained by a deep and broad program of education according to the “method”. Such a Fraternity could not immediately include all men, but it could unite the activities of certain kinds of men, regardless of their racial or religious beliefs or the nations in which they dwelt. These were the men of “towardness”, those sons of tomorrow, whose symbol was a blazing sun rising over the mountains of the east.
It was inevitable that the Orders of Fraternity should sponsor world education. The program included a systematic expansion of existing institutions and the enlargement of their spheres of influence.
Slowly, the Orders of Universal Reformation faded from public attention, and in their places appeared the Orders of World Brotherhood. Everything possible was done to prevent the transitions from being obvious. Even history was falsified to make certain sequences of activity unrecognizable. The shift of emphasis never gave the impression of abruptness, and the motion appeared as a dawning of social consciousness. The most obvious clues to the secret activity have been the prevailing silence about the origin and the impossibility of filing the lacunae in the records of seventeenth- and eighteenth- century fraternal Orders.
The Orders of Fraternity were attached by slender and almost invisible threads to the parent project. Like earlier Schools of the Mysteries, these Fraternities were not in themselves actual embodiments of the esoteric associations, but rather instruments to advance certain objectives of the divine plan. 3“
Here, Hall mentions a “silence” and lack of information regarding the workings of Secret Societies during the 17th and 18th century, the epoch during which the Bavarian Illuminati was active. It is during this time period that Secret Societies took action, causing revolutions, overthrowing Monarchical and Papal powers and taking hold of the banking system. Was the Bavarian Illuminati part of the Invisible Empire described by Hall? Is it still active today? Let’s first look at Adam Weishaupt and his infamous Secret Society.
Adam Weishaupt, Trained by the Jesuits
1.jpg
Adam Weishaupt was born in Ingolstadt, Bavaria on February 6, 1748. His father died when he was seven and his godfather, Baron Ickstatt, entrusted his early education to the most powerful group of the time: the Jesuits. Known for its subversive methods and conspiratorial tendencies, the Society of Jesus had a stronghold on Bavaria’s politics and educational system.
“The degree of power to which the representatives of the Society of Jesus had been able to attain in Bavaria was all but absolute. Members of the order were the confessors and preceptors of the electors; hence they had a direct influence upon the policies of government. The censorship of religion had fallen into their eager hands, to the extent that some of the parishes even were compelled to recognize their authority and power. To exterminate all Protestant influence and to render the Catholic establishment complete, they had taken possession of the instruments of public education. It was by Jesuits that the majority of the Bavarian colleges were founded, and by them they were controlled. By them also the secondary schools of the country were conducted. “4
The inner-workings of the Society of Jesus was quite similar to the occult Brotherhoods it was apparently working against. It functioned with degrees, initiation rites, elaborate rituals and esoteric symbols and had been suppressed countless times in several countries due to its subversive tendencies.
In 1773, Weishaupt’s godfather used his great influence at the University of Ingolstadt to place his godson as chair of canon law. At that time, the institution was under heavy Jesuitical dominance and that particular position was traditionally held by influential Jesuits. Weishaupt’s growing embrace of Age of Enlightenment philosophies placed him at odds with the Jesuits and all kinds of political drama ensued. Despite this fact, Weishaupt learned a lot from the Jesuit’s organization and their subversive methods to obtain power. It is during this time that the idea of a Secret Soceity began to enter Weishaupt’s thoughts.
“Brilliant, and well trained in the conspiratorial methods of access to power, young Weishaupt decided to organize a body of conspirators, determined to free the world from the Jesuitical rule of Rome.” 5
While some authors believe that the Jesuits (who were suppressed by papal bull in 1773) used Weishaupt to perpetuate their rule, others state that he was seeking to overthrow their powerful hold on Bavarian. On a wider scale, he was convinced that the world would profit from the overthrow of all governmental and religious institutions in the world to replace them by a world-wide, yet secretive, committee of “initiates”. To acheive his aims, he would use Jesuit methods against the Jesuits.
As Weishaupt pursued his studies, he also became knowledgeable in occult mysteries and Hermetism. He recognized the attractive power of this mysterious knowledge and understood that Masonic lodges would be the ideal venue to propagate his views. He therefore sought to become a Freemason, but was quickly disenchanted with the idea.
“His imagination having taken heat from his reflections upon the attractive power of the Eleusinian mysteries and the influence exerted by the secret cult of the Pythagoreans, it was first in Weishaupt’s thought to seek in the Masonic institutions of the day the opportunity he coveted for the propagation of his views. From this, original intention, however, he was soon diverted, in part because of the difficulty he experienced in commanding sufficient funds to gain admission to a lodge of Masons, in part because his study of such Masonic books as came into his hands persuaded him that the “mysteries” of Freemasonry were too puerile and too readily accessible to the general public to make them worthwhile”. 6
Weishaupt soon realized that, to achieve his aims, it would be necessary for him to create his own secretive group, composed of powerful individuals who would embrace his views and help him propagate them.
“He deemed it necessary, therefore, to launch out on independent lines. He would form a model secret organization, comprising “schools of wisdom,” concealed from the gaze of the world behind walls of seclusion and mystery, wherein those truths which the folly and egotism of the priests banned from the public chairs of education might be taught with perfect freedom to susceptible youths.” 7
The goal of Weishaupt’s organization was simple yet monumental: to overthrow all political and religious institutions in order to replace it with a group of Illuminati initiates. According to him “universal happiness complete and rapid could be achieved by disposing of hierarchy, rank and riches. Princes and nations will disappear without violence from the earth; the human race will become one family; the world will be the abode of reasonable men”. On May 1, 1776, the Order of the Illuminati was founded.
The Bavarian Illuminati
Weishaupt’s Illuminati began humbly with only five members, but after a few years and with powerful connections, the Order became a major political force across the world. Influential deciders, rich industrials, powerful noblemen and mysterious occultists joined the Order and participated in its conspiratorial objectives. Some historians claim that the Order’s quick rise to success was due to a secret meeting between Weishaupt and a mysterious figure named Cagliostro, the most powerful occultist of the time.
“In Ingolsstadt, Cagliostro is believed to have met Adam Weishaupt, professor of philosophy and canon law at the university, who in 1776, had founded the sect of Illuminati. Calling themselves heirs to the Knights Templar, they declared their interest in using celestial intervention as achieved by Cagliostro for the furtherance of a program of worldwide religious reform, but one more radical than Cagliostro’s, “committed to avenging the death of the Templar’s Grand Master Molay by reducing to dust the triple crown of the popes and disposing of the last of the Capet Kings.”
Cagliostro obliged, and described in prophetic detail the decapitation of Louis XVI, an event hardly to be envisaged at that time as anything but improbable.”
The Bavarian Illuminati was originally comprised of three primary grades: Novice, Minerval and Illuminated Minerval. Each grade was designed to achieve particular objectives while assuring complete control and dominance to the apex of the pyramid. Here’s a brief look at each grade.
NOVICE
Entry-level members of the Bavarian Illuminati were attracted and introduced to the Order using attractive vocabulary (the quest for wisdom and betterment) and occult lore. They were however introduced to a highly monitored and controlling hierarchy, one that resembles the system of the Jesuits. There was no mention of the Order’s political aims.
“Once enrolled, the instruction of each Novice was to be in the hands of his enroller, who kept well hidden from his pupil the identity of the rest of his superiors. Such statutes of the order as he was permitted to read impressed upon the mind of the Novice that the particular ends sought in his novitiate were to ameliorate and perfect his moral character, expand his principles of humanity and sociability, and solicit his interest in the laudable objects of thwarting the schemes of evil men, assisting oppressed virtue, and helping men of merit to find suitable places in the world. Having had impressed upon him the necessity of maintaining inviolable secrecy respecting the affairs of the order, the further duties of subordinating his egoistic views and interests and of according respectful and complete obedience to his superiors were next enjoined. An important part of the responsibility of the Novice consisted in the drawing-up of a detailed report (for the archives of the order), containing complete, information concerning his family and his personal career, covering such remote items as the titles of the books he possessed, the names of his personal enemies and the occasion of their enmity, his own strong and weak points of character, the dominant passions of his parents, the names of their parents and intimates, etc. Monthly reports were also required, covering the benefits the recruit had received from and the services he had rendered to the order. For the building-up of the order the Novice must undertake his share in the work of recruitment, his personal advancement to the higher grades being conditioned upon the success of such efforts. To those whom he enrolled he became in turn a superior; and thus after a novitiate presumably two years in length, the way was open for his promotion to the next higher grade.”
When a Novice proved to his superiors to be worthy of advancement, he was initiated to the grade of Minerval.
MINERVAL
2.jpg
Minerval seals of the Bavarian Illuminati. These pendants, worn around the necks of Minerval initiates, featured the Owl of Minerva . Also known as the Owl of Wisdom, this symbol is still found today in powerful places: around the White House, hidden on the dollar bill or on the insignia of the Bohemian Club.
The term Minerval is derived from Minerva who was the Roman goddess of poetry, medicine, wisdom, commerce, weaving, crafts, magic, and the music. She is often depicted with her sacred creature, an owl, which symbolizes her ties to wisdom. An ancient symbol of the mysteries, Minerva is prominently featured in places such as the Library of Congress and the Great Seal of California.
The second grade of the Illuminati was one of indoctrination. The initiates were lectured on the spiritual principles of the Order but had little information regarding the true aims of Weishaupt and his close circle of administrators.
“The ceremony of initiation through which the Novice passed into the grade Minerval was expected to disabuse the mind of the candidate of any lingering suspicion that the order had as its supreme object the subjugation of the rich and powerful, or the, overthrow of civil and ecclesiastical government. It also pledged the candidate to be useful to humanity; to maintain a silence eternal, a fidelity inviolable, and an obedience implicit with respect to all the superiors and rules of the order; and to sacrifice all personal interests to those of the society.” 10
Minervals were permitted to meet some of their superiors (Illuminated Minervals) and to engage in discussions with them. This privilege alone was a great source of motivation for the new initiates.
ILLUMINATED MINERVAL
Selected from among the Minerval, the Illuminated Minerval were given specific tasks to accomplish in order to prepare them to take action in the “real world”. Most of their work consisted in the study of mankind and the perfection of methods to direct it. Each Illuminated Minerval was entrusted with a small group of Minervals who were scrutinized, analyzed and lead towards specific directions. Lower-grade members of the Order therefore became test subjects for techniques that might be applied to the masses in general.
“To the grade Illuminated Minerval were admitted those Minervals who in the judgment of their superiors were worthy of advancement. Elaborate initiatory ceremonies fixed in the candidate’s mind the notions that the progressive purification of his life was to be expected as he worked his way upward in the order, and that the mastery of the art of directing men was to be his special pursuit as long as he remained in the new grade. To accomplish the latter, i.e., to become an expert psychologist and director of men’s consciences, he must observe and study constantly the actions, purposes, desires, faults, and virtues of the little group of Minervals who were placed under his personal direction and care. For his guidance in this difficult task a complicated mass of instructions was furnished him.
In addition to their continued presence in the assemblies of the Minervals, the members of this grade came together once a month by themselves, to hear reports concerning their disciples, to discuss methods of accomplishing the best results in their work of direction and to solicit each other’s counsel in difficult and embarrassing cases. In these meetings the records of the assemblies of the Minervals were reviewed and rectified and afterwards transmitted to the superior officers of the order.” 11
From this basic structure, the Illuminati began its expansion. Everything was in place for Weishaupt to achieve an important goal: the infiltration of Freemasonry.
Infiltration of Freemasonry
In 1777, the year following the creation of the Illuminati, Weishaupt joined the Masonic lodge of Theodore of Good Counsel in Munich. Not only did he successfully propagate his views into the lodge, he also managed to get the lodge to be ”virtually absorbed into the Illuminist order almost immediately”.
A definite alliance between the Illuminati and Freemasonry became possible in 1780 when a prominent figure by the name of Baron Adolf Franz Friederich Knigge was initiated into Weishaupt’s Order. The German diplomat’s Masonic connections and organizational skills were promptly put to use by the Order. Knigge would go on to accomplish two important tasks for the Illuminati: He revised the hierarchy of the Order, created new higher grades and allowed the full integration of Masonic lodges into the system.
“Two weighty consequences promptly followed as the result of Kinigge’s advent into the order. The long-sought higher grades were worked out, and an alliance between the Illuminati and Freemasonry was effected.”
3.jpg
Knigge, an influential North German diplomat and occultist joined the Illuminati in 1780. He is here shown displaying the sign of the Hidden Hand (see the article entitled The Hidden Hand that Shaped the World on the Vigilant Citizen).
Knigge’s influence upon the Order was profound and immediate. The new system he devised attracted Freemasons and other powerful figures, which gave the movement great momentum. Here’s the system devised by Knigge:
4.jpg
Illuminati Methods Examples
Knigge’s kept the Order’s original grades untouched but added new grades above them. The second level of the Illuminati incorporated the grades of Freemasonry making therefore the Brotherhood simply a part of the wider Illuminist superstructure.
“The grade Novice (a part of the system only in a preparatory sense) was left unchanged by Knigge, save for the addition of a printed communication to be put into the hands of all new recruits, advising them that the Order of the Illuminati stands over against all other forms of contemporary Freemasonry as the one type not degenerate, and as such alone able to restore the craft to its ancient splendor.
The three symbolic grades of the second class seem to have been devised solely for the purpose of supplying an avenue whereby members of the various branches of the great Masonic family could pass to the higher grades of the new order.”
The highest grades of the Order were restricted to a select few and included powerful individuals and influential figures. The grade of Prince held within its ranks National Inspectors, Provincials, Prefects and Deans of the Priests. At the top of the pyramid were the Magus (also known as Areopagites), which comprised the supreme heads of the Order. Their identities were safely guarded and are still difficult to confirm today.
Knigge’s strategy gave impressive results and allowed the Illuminati to become an extremely powerful movement.
“The new method of spreading Illuminism by means of its affiliation with Masonic lodges promptly demonstrated its worth. Largely because of the fine strategy of seeking its recruits among the officers and other influential personages in the lodges of Freemasonry, one after another of the latter in quick succession went over to the new system. New prefectures were established, new provinces organized, and Provincials began to report a steady and copious stream of new recruits. Students, merchants, doctors, pharmacists, lawyers, judges, professors in gymnasia and universities, preceptors, civil officers, pastors, priests — all were generously represented among the new recruits. Distinguished names soon appeared upon the rosters of the lodges of the new system. Duke Ferdinand of Brunswick, Duke Ernst of Gotha, Duke Karl August of Saxe-Weimar, Prince August of Saxe-Gotha, Prince Carl of Hesse, Baron Dalberg, the philosopher Herder, the poet Goethe, the educationist Pestalozzi, were among the number enrolled, By the end of 1784 the leaders boasted of a total enrollment of between two and three thousand members 106. and the establishment of the order upon a solid foundation seemed to be fully assured.”
Weishaup, however, did not enjoy his Order’s success for long. Suspicions of Illuminati conspiracy against governments and religious arose across Europe. Seeing a credible threat against its power, the Bavarian government launched an edict outlawing all communities, societies and brotherhoods that existed without due authorization of the law. Furthermore, internal disagreements between Weishaupt and the higher ups of his Order lead to disputes and dissension. In the midst of it all, some members went directly to the authorities and testified against the Order, an opportunity that was not missed by the Bavarian government.
“Out of the mouths of its friends, the accusations which its enemies made against the order were to be substantiated. By the admissions of its leaders, the system of the Illuminati had the appearance of an organization devoted to the overthrow of religion and the state, a band of poisoners and forgers, an association of men of disgusting morals and depraved tastes.”
By 1788, through the use of aggressive legislation and criminal charges, the Bavarian Illuminati was apparently dissipated and destroyed by the government. While some see here the conclusion of the story of the Illuminati, one must not forget that the tentacles of Illuminism had the time to spread way beyond to confines of Bavaria to reach Masonic lodges across Europe. In other words, the Illuminati was never destroyed, it simply went underground. A year later, an important event would prove that Illuminism was more alive and potent then ever: the French Revolution.
The French Revolution
The violent overthrow of the French Monarchy in 1789 symbolizes to many the victory of Jacobinism and Illuminism over the traditional institutions of the time. The adoption of the Declaration of Human Rights officially recorded Masonic and Illuminist values into the core of the French government. The country’s new motto “Liberté, Égalité et Fraternité” (Freedom, Equality and Brotherhood) was said to be a famous Masonic saying that was used in French lodges for centuries.
5.jpg
The official document of the Declaration of Human Rights contains several occult symbols referring to Secret Societies. First, the symbol of the All Seeing Eye within a triangle, surrounded by the light of the blazing star Sirius, is found above everything else (this symbol is also found on the Great Seal of the United States). Underneath the title is depicted an Ouroboros (a serpent eating its own tail), an esoteric symbol associated with Alchemy, Gnosticism and Hermetism, the core teachings of Masonry. Right underneath the Ouroboros is a red phrygian cap, a symbol representing Illuminist revolutions across the world. The entire Declaration is guarded by Masonic pillars.
BACKLASH AGAINST ILLUMINISM
If though Bavarian Illuminati was said to be dead, the ideas it promoted still became a reality. The Freemasons and Rosicrucians were still thriving, and the Illuminati appeared to be living through them. Europe was undergoing profound turmoil as a new class of people took the helms of power. Critics began to emerge, revealing to the masses the secret forces behind the changes they were witnessing.
Leopold Hoffman, a Freemason who was convinced that the Illuminati corrupted his Brotherhood, published a series of articles in his journal entitled Wiener Zeitschrift. He claimed that the lower grades of the Illuminati had been dissolved, but the highest degrees were still active. He also added that Freemasonry was being “subjugated by Illuminism” and transformed to serve its ends. He also stated that the French Revolution was the result of years of Illuminist propaganda.
In 1797, John Robinson, a Scottish physician, mathematician and inventor (he invented the siren) published a book entitled “Proofs of a Conspiracy against All the Religions and Governments of Europe, carried on in the Secret Meetings of the Free Masons, Illuminati, and Reading Societies”. This devout Freemason became disenchanted when he realized that his brotherhood had been infiltrated by the Illuminati. Here’s an excerpt of his book:
“I have found that the covert of a Mason Lodge had been employed in every country for venting and propagating sentiments in religion and politics, that could not have circulated in public without exposing the author to great danger. I found, that this impunity had gradually encouraged men of licentious principles to become more bold, and to teach doctrines subversive of all our notions of morality—of all our confidence in the moral government of the universe—of all our hopes of improvement in a future state of existence—and of all satisfaction and contentment with our present life, so long as we live in a state of civil subordination. I have been able to trace these attempts, made, through a course of fifty years, under the specious pretext of enlightening the world by the torch of philosophy, and of dispelling the clouds of civil and religious superstition which keep the nations of Europe in darkness and slavery.
I have observed these doctrines gradually diffusing and mixing with all the different systems of Free Masonry; till, at last, AN ASSOCIATION HAS BEEN FORMED for the express purpose of ROOTING OUT ALL THE RELIGIOUS ESTABLISHMENTS, AND OVERTURNING ALL THE EXISTING GOVERNMENTS OF EUROPE. I have seen this Association exerting itself zealously and systematically, till it has become almost irresistible: And I have seen that the most active leaders in the French Revolution were members of this Association, and conducted their first movements according to its principles, and by means of its instructions and assistance, formally requested and obtained: And, lastly, I have seen that this Association still exists, still works in secret, and that not only several appearances among ourselves show that its emissaries are endeavouring to propagate their detestable doctrines, but that the Association has Lodges in Britain corresponding with the mother Lodge at Munich ever since 1784. . . The Association of which I have been- speaking is the order of ILLUMINATI, founded, in 1775 [sic], by Dr. Adam Weishaupt, professor of Canon-law in the University of Ingolstadt, and abolished in 1786 by the Elector of Bavaria, but revived immediately after, under another name, and in a different form, all over Germany. It was again detected, and seemingly broken up; but it had by this time taken so deep root that it still subsists without being detected, and has spread into all the countries of Europe” 17
Augustin Barrel, a French Jesuit priest also published in 1797 a book linking the French Revolution to the Bavarian Illuminati. In “Mémoires pour servir à l’histoire du Jacobisime”, he traced back the slogan “Liberty and Equality” back to the early Templars and claimed that, in the higher degrees of the order, liberty and equality is explained not only by “war against kings and thrones” but by “war against Christ and his altars”. He also provided details pertaining to the Illuminist take-over of Freemasonry.
“Barruel charged that not only the lower order of Masonry were duped by Weishaupt, but also those of Weishaupt’s own Illuminati, for whom he had provided another top-secret level of direction known as the Aeopagus, a withdrawn circle of directors of the whole order, who alone knew its secret aims. To Barruel, such revolutionary leaders as La Rochefoucauld, Lafayette, and the duc d’Orléans, had become Illuminati agents and dupes of more extreme radicals such as Danton, provocateurs who sparked the Illuminati-directed rebellion. Barruel further charged that the entire French Masonic establishment had been converted to Weishaupt’s revolutionary ideas, its lodges turned into secret committees which planned bloodshed.”
Propagation in America
Most of America’s Founding Fathers were part of Secret Societies, whether the Freemasons, the Rosicrucians or others. Some of them travelled to Europe and were well versed in the doctrines of the Illuminati.
From 1776 to 1785 – when the Bavarian Illuminati was openly active – Benjamin Franklin was in Paris serving as the ambassador of the United States to France. During his stay, he became Grand Master of the lodge Les Neufs Soeurs which was attached with the Grand Orient of France. This Masonic organization was said to have become the French headquarters of the Bavarian Illuminati. It was particularly influential in organizing of the French support for the American Revolution and was later part of the process towards the French Revolution.
In 1799, when German minister G.W. Snyder warned George Washington of the Illuminati plan “to overthrow all governments and religion”, Washington replied that he had heard “much of the nefarious and dangerous plan and doctrines of the Illuminati“. He however concluded his letter by stating: “I believe notwithstanding, that none of the Lodges in this country are contaminated with the principles ascribed to the society of Illuminati“.
In another letter to Snyder, written a month later, Washington continued on the topic:
“It was not my intention to doubt that, the Doctrines of the Illuminati, and principles of Jacobinism had not spread in the United States. On the contrary, no one is more truly satisfied of this fact than I am.
The idea that I meant to convey, was, that I did not believe that the Lodges of Free Masons in this Country had, as Societies, endeavoured to propagate the diabolical tenets of the first, or pernicious principles of the latter (if they are susceptible of separation). That Individuals of them may have done it, or that the founder, or instrument employed to found, the Democratic Societies in the United States, may have had these objects; and actually had a separation of the People from their Government in view, is too evident to be questioned.”
6.jpg
Part of the original letter written by George Washington regarding the Illuminati
Judging by this letter, George Washington was obviously well aware of the doctrines of the Illuminati And even if he did not believe that the Masonic institutions of the United States propagated its doctrines, he concedes that individuals might have undertaken that endeavour.
After the Bavarian Illuminati
Today, the term Illuminati is used to loosely describe the small group of powerful individuals who are working towards the creation of a World Government, with the issue of a single world currency and a single world religion. Although it is difficult to determine if this group descends directly from the original Bavarian Illuminati or that it even uses the term Illuminati, its tenets and methods are in perfect continuation of it. As stated above, the name that is used to describe the occult elite can change. And, ultimately, the name is irrelevant; what needs to be recognized is the underlying current that has existed for centuries.
According the Manly. P Hall, the Bavarian Illuminati was part of what he calls the “Universal Brotherhood”, an invisible Order at the “source” of most Hermetic Secret Societies of the past. It has worked for centuries towards the transformation of mankind, guiding it through a worldwide alchemical process. The same way the alchemical Great Work seeks to turn crude metals into gold, it claims to work towards a similar metamorphosis of the world. According to Hall, the Universal Brotherhood sometimes makes itself visible, but under the guise of different names and symbols. This would mean that the Knights Templars, Freemasons, Rosicrucians, and Illuminati are temporary visible manifestations of an underlying force that is infinitely more profound and more powerful. However, human beings being what they are – weak toward greed and power-lust – these movements often become corrupted and end up conspiring against the masses for more power and material gain.
“Certainly there was an undercurrent of things esoteric, in the most mystical sense of the word, beneath the surface of Illuminism. In this respect, the Order followed exactly in the footsteps of the Knights Templars. The Templars returned to Europe after the Crusades, bringing with them a number of choice fragments of Oriental occult lore, some of which they had gathered from the Druses of Lebanon, and some from the disciples of Hasan Ibn-al-Sabbah, the old wizard of Mount Alamut.
If there was a deep mystical current flowing beneath the surface of Illuminism, it is certain that Weishaupt was not the Castalian Spring. Perhaps the lilies of the Illuminati and the roses of the Rosicrucians were, by a miracle of Nature, flowing from the same stem. The old symbolism would suggest this, and it is not always wise to ignore ancient landmarks. There is only one explanation that meets the obvious and natural requirements of the known facts. The Illuminati were part of an esoteric tradition which had descended from remote antiquity and had revealed itself for a short time among the Humanists of Ingolstadt. One of the blossoms of the “sky plant” was there, but the roots were afar in better ground”. 19
Hall concludes that the Illuminati existed long before the advent of Weishaupt’s Order and that it still exists today. It was under the guise of defeat and destruction that the Illuminati realized its greatest victories.
“Weishaupt emerged as a faithful servant of a higher cause. Behind him moved the intricate machinery of the Secret School. As usual, they did not trust their full weight to any perishable institution. The physical history of the Bavarian Illuminati extended over a period of only twelve years. It is difficult to understand, therefore, the profound stir which this movement caused in the political life of Europe. We are forced to the realization that this Bavarian group was only one fragment of a large and composite design.
All efforts to discover the members of the higher grades of the Illuminist Order have been unsuccessful. It has been customary, therefore, to assume that these higher grades did not exist except in the minds of Weishaupt and von Knigge. Is it not equally possible that a powerful group of men, resolved to remain entirely unknown, moved behind Weishaupt and pushed him forward as a screen for its own activities?
The ideals of Illuminism, as they are found in the pagan Mysteries of antiquity, were old when Weishaupt was born, and it is unlikely that these long-cherished convictions perished with his Bavarian experiment. The work that was unfinished in 1785 remains unfinished in 1950. Esoteric Orders will not become extinct until the purpose which brought them into being has been fulfilled. Organizations may perish, but the Great School is indestructible”. 20
7.jpg
The Great Seal of the United States features the unfinished Great Pyramid of Giza, a symbol of the unfinished work of the Esoteric Orders: a New World Order. The Seal was adopted on the American dollar by Franklin Delano Roosevelt, a 32nd Degree Freemason and a Knight of Pythias with ties Manly P. Hall.
The Illuminati Today
If the Illuminist Agenda is still alive today, what form does it take? From the esoteric and spiritual point of view, some modern Secret Societies such as the O.T.O. (Ordo Templi Orientis) have claimed to be the heirs of Illuminism. Other researchers stated that there exists hidden Orders above the 33 “visible” degrees of Freemasonry that form the Illuminati. As they are, by definition, secret, obtaining details about these Orders is quite difficult.
The political side of modern Illluminism is a lot more visible and its plans are obvious. An increasingly restrictive and concentrated group is being entrusted with the creation of important decisions and policies. International committees and organizations, acting above elected officials are today creating social and economic policies that are applied on a global level. This phenomenon is rather new in world history as a rather than kingdoms or nation-states, a non-elected shadow government, composed of the world’s elite, is gradually becoming the center of world power.
“On another political plane are ideological groups such as the Council on Foreign Relations, or participants in the World Economic Forum. Here we find leaders in politics, business, finance, education, and the media who share a belief in the value of global solutions; are in position of high authority and influence; and represent different levels of involvement with the inner circle of the group. Most members simply welcome the opportunity to associate with other well-known luminaries and are honored by being offered membership or attendance privileges. Yet, the ideology at the highest levels of such groups supports a world government – to be administered by a class of experts and planners, entrusted with running centrally organized social and political institutions. Although members may be persuaded to add their considerable voices to certain transnational political and economic policies, they may bot be as supportive (or even aware) of the long-range ambitions of the inner circle. While these groups quite often hold their meetings in secret, their membership lists are a matter of public record. It is the central agenda that is disguised.”
The main elite groups and councils are: the International Crisis Group, the Council on Foreign Relations, the World Economic Forum, the Brookings Institution, Chatham House, the Trilateral Commission and the Bilderberg Group. The Bohemian Club is known to hold informal gatherings of the world elite punctuated with strange ceremonies and rituals. The Club’s insignia is an Owl similar to the one found on the Bavarian Illuminati’s Minerval seal.
Insignia of the Bohemian Club
8.jpg
If one would carefully study the members and attendees of these exclusive clubs, one would notice that they combine the most powerful politicians, CEOs and intellectuals of the time with lesser known individuals with famous names. They are descendants of powerful dynasties that rose to power by taking over vital aspects of modern economies, such as the banking system, the oil industry or mass media. They have been associated with game changing events, such as the creation of the Federal Reserve in 1913. This act completely modified the banking system of the United States, placing it in the hands of a few elite corporations. A proof of this is the court decision of 1982 stating that “The Reserve Banks are not federal instrumentalities for purposes of the FTCA [the Federal Tort Claims Act], but are independent, privately owned and locally controlled corporations“.
In his book “Bloodlines of the Illuminati”, controversial author Fritz Springmeier claims that today’s Illuminati is formed from the descendants of thirteen powerful families whose ancestors had close or distant ties to the original Bavarian Illuminati. According to Springmeier, the 13 bloodlines are: the Astors, the Bundys, the Collins, the DuPonts, the Freemans, the Kennedys, the Li, the Onassis, the Reynolds, the Rockefellers, the Rothschilds, the Russells and the Van Duyns. 22.
There is no doubt that by virtue of the material and political resources they own, some of these families have a great deal of power in today’s world. They appear to form the core of what we call today the Illuminati. However, are they conspiring to create a New World Order? Here’s a quote from David Rockefeller’s memoirs that might answer some questions:
“For more than a century, ideological extremists at either end of the political spectrum have seized upon well-publicized incidents such as my encounter with Castro to attack the Rockefeller family for the inordinate influence they claim we wield over American political and economic institutions. Some even believe we are part of a secret cabal working against the best interests of the United States, characterizing my family and me as ‘internationalists’ and of conspiring with others around the world to build a more integrated global political and economic structure – one world, if you will. If that is the charge, I stand guilty, and I am proud of it.” 23
In Conclusion
The story of the Illuminati has been repressed or revealed, debunked or exposed, ridiculed or exaggerated countless times – all depending on the point of the authors and whether they are “apologists” or “critics”. To obtain the absolute truth about a group that was always meant to be secret is quite a challenge and one must use a great deal of judgment and discernment to differentiate the facts from the fabrications. As it is not possible to answer all of the questions relating to the Illuminati, this article simply attempted to draw a more precise picture of the Order and to present important facts relating to it.
Today’s political atmosphere is quite different from the time of Weishaupt and the American Founding Fathers, yet there are still many similarities. While the Bavarian Illuminists purportedly denounced the political and religious oppression of the Vatican, a new kind of oppreession is taking form. As democracies merge into a single world government, as privacy and freedoms become replaced by “security” and high tech surveillance, as schools crack down on critical thinking, as mass media dumbs-down and disinforms the masses, as secret operations carry out crimes against humanity and as all major protests get violently repressed by a growing police state, it is easy to draw the conclusion that a similarly repressive system is currently being instated. Did the Illuminati truly “liberate” the Western World from the oppression of the Vatican or did it simply continue in its footsteps?
“The minority, the ruling class at present, has the schools and press, usually the Church as well, under its thumb. This enables it to organize and sway the emotions of the masses, and make its tool of them.” - Albert Einstein
sources
gemini AI
https://www.occultwisdomhaven.com/hidden-knowledge/the-order-of-the-illuminati.html

Sunday Oct 13, 2024
Sunday Oct 13, 2024
Monarch Programming: Mind Control
Watch on Rumble: https://rumble.com/v5ihi3p-monarch-programming-mind-control.html
Monarch Programming is a method of hard mind control used by numerous organizations for covert purposes. It is a continuation of project MK-ULTRA, a mind-control program developed by the CIA, and tested on the military and civilians. The methods are astonishingly sadistic (its entire purpose is to traumatize the victim) and the expected results are horrifying: The creation of a mind-controlled slave who can be triggered at anytime to perform any action required by the handler. While mass media ignores this issue, over 2 million Americans have gone through the horrors of this program. This article looks at the origins of Monarch programming and some of its methods and symbolism.
Monarch programming is a mind-control technique comprising elements of Satanic Ritual Abuse (SRA) and Multiple Personality Disorder (MPD). It utilizes a combination of psychology, neuroscience and occult rituals to create within the slaves an alter persona that can be triggered and programmed by the handlers. Monarch slaves are used by several organizations connected with the world elite in fields such as the military, sex slavery and the entertainment industry. This article will look at the origins of Monarch programming, its techniques and its symbolism.
ORIGINS
Throughout the course of history, several accounts have been recorded describing rituals and practices resembling mind control. One of the earliest writings giving reference to the use of occultism to manipulate the mind can be found in the Egyptian Book of the Dead. It is a compilation of rituals, heavily studied by today’s secret societies, which describes methods of torture and intimidation (to create trauma), the use of potions (drugs) and the casting of spells (hypnotism), ultimately resulting in the total enslavement of the initiate. Other events ascribed to black magic, sorcery and demon possession (where the victim is animated by an outside force) are also ancestors of Monarch programming.
It is, however, during the 20th century that mind control became a science in the modern sense of the term, where thousands of subjects have been systematically observed, documented and experimented on.
One of the first methodical studies on trauma-based mind control were conducted by Josef Mengele, a physician working in Nazi concentration camps. He initially gained notoriety for being one of the SS physicians who supervised the selection of arriving prisoners, determining who was to be killed and who was to become a forced labourer. However, he is mostly known for performing grisly human experiments on camp inmates, including children, for which Mengele was called the “Angel of Death”.
Mengele is infamous for his sordid human experiments on concentration camps prisoners, especially on twins. A part of his work that is rarely mentioned however, is his research on mind control. Much of his research in this field was confiscated by the Allies and is still classified to this day.
“DR. GREEN (Dr. Joseph Mengele): The most significant programmer, perhaps one could give him the title of the father of Monarch Programming was Joseph Mengele, an ex-Nazi Concentration Camp doctor. Thousands of Monarch mind-controlled slaves in the U.S. had “Dr. Green” as their chief programmer. ”
“Dr. Joseph Mengele of Auschwitz notoriety was the principle developer of the trauma-based Monarch Project and the CIA’s MK Ultra mind control programs. Mengele and approximately 5, 000 other high ranking Nazis were secretly moved into the United States and South America in the aftermath of World War II in an Operation designated Paperclip. The Nazis continued their work in developing mind control and rocketry technologies in secret underground military bases. The only thing we were told about was the rocketry work with former Nazi star celebrities like Warner Von Braun. The killers, torturers, and mutilators of innocent human beings were kept discretely out of sight, but busy in U.S. underground military facilities which gradually became home to thousands upon thousands of kidnapped American children snatched off the streets (about one million per year) and placed into iron bar cages stacked from floor to ceiling as part of the ‘training’. These children would be used to further refine and perfect Mengele’s mind control technologies. Certain selected children (at least the ones who survived the ‘training’) would become future mind controlled slaves who could be used for thousands of different jobs ranging anywhere from sexual slavery to assassinations. A substantial portion of these children, who were considered expendable, were intentionally slaughtered in front of (and by) the other children in order to traumatize the selected trainee into total compliance and submission
Mengele’s research served as a basis for the covert, illegal CIA human research program named MK-ULTRA.
MK-ULTRA
Project MK-ULTRA ran from the early 1950s to at least the late 1960s, using American and Canadian citizens as its test subjects. The published evidence indicates that Project MK-ULTRA involved the use of many methodologies to manipulate individual mental states and alter brain functions, including the surreptitious administration of drugs and other chemicals, sensory deprivation, isolation, and verbal and physical abuse.
The most publicized experiments conducted by MK-ULTRA involved the administration of LSD on unwitting human subjects, including CIA employees, military personnel, doctors, other government agents, prostitutes, mentally ill patients, and members of the general public, in order to study their reactions.
However, the scope of MK-ULTRA does not however stop. Experiments involving violent electroshocks, physical and mental torture and abuse were used in a systematic matter on many subjects, including children.
Although the admitted goals of the projects were to develop torture and interrogation methods to use on the country’s enemies, some historians asserted that the project aimed to create “Manchurian Candidates”, programmed to perform various acts such as assassinations and other covert missions.
MK-ULTRA was brought to light by various commissions in the 1970s, including the Rockefeller Commission of 1975. Although it is claimed that the CIA stopped such experiments after these commissions, some whistle-blowers have come forth stating that the project simply went “underground” and Monarch Programming has become the classified successor of MK-ULTRA.
The most incriminating statement to date made by a government official as to the possible existence of Project MONARCH was extracted by Anton Chaitkin, a writer for the publication The New Federalist. When former CIA Director William Colby was asked directly, “What about monarch?” he replied angrily and ambiguously, “We stopped that between the late 1960s and the early 1970s.”
Although there has never been any official admittance of the existence of Monarch programming, prominent researchers have documented the systematic use of trauma on subjects for mind-control purposes. Some survivors, with the help of dedicated therapists, were able to “deprogram” themselves to then go on record and disclose the horrifying details of their ordeals.
Monarch slaves are mainly used by organizations to carry out operations using patsies trained to perform specific tasks, who do not question orders, who do not remember their actions and, if discovered, who automatically commit suicide. They are the perfect scapegoats for high-profile assassinations (see Sirhan Sirhan), the ideal candidates for prostitution, slavery and private movie productions. They are also the perfect puppet performers for the entertainment industry.
“What I can say is I now believe that ritual-abuse programming is widespread, is systematic, is very organized from highly esoteric information which is published no-where, has not been on any book or talk show, that we have found it all around this country and at least one foreign country.
People say, “What’s the purpose of it?” My best guess is that the purpose of it is that they want an army of Manchurian Candidates, ten of thousands of mental robots who will do prostitution, do movies, smuggle narcotics, engage in international arms smuggling, all sorts of very lucrative things, and do their bidding and eventually the megalomaniacs at the top believe they’ll create a Satanic Order that will rule the world”.
Monarch programmers cause intense trauma to subjects through the use of electroshock, torture, abuse and mind games in order to force them to dissociate from reality – a natural response in some people when then are faced with unbearable pain. The subject’s ability to dissociate is a major requirement and it is, apparently, most readily found in children that come from families with multiple generations of abuse. Mental dissociation enables the handlers to create walled-off personas in the subject’s psyche, which can then be programmed and triggered at will.
“Trauma-based mind control programming can be defined as systematic torture that blocks the victim’s capacity for conscious processing (through pain, terror, drugs, illusion, sensory deprivation, sensory over-stimulation, oxygen deprivation, cold, heat, spinning, brain stimulation, and often, near-death), and then employs suggestion and/or classical and operant conditioning (consistent with well-established behavioral modification principles) to implant thoughts, directives, and perceptions in the unconscious mind, often in newly-formed trauma-induced dissociated identities, that force the victim to do, feel, think, or perceive things for the purposes of the programmer. The objective is for the victim to follow directives with no conscious awareness, including execution of acts in clear violation of the victim’s moral principles, spiritual convictions, and volition.
Installation of mind control programming relies on the victim’s capacity to dissociate, which permits the creation of new walled-off personalities to “hold” and “hide” programming. Already dissociative children are prime “candidates” for programming”.
Monarch mind control is covertly used by various groups and organizations for various purposes. According to Fritz Springmeier, these groups are known as “The Network” and form the backbone of the New World Order.
ORIGINS OF THE NAME
Monarch mind control is named after the Monarch butterfly – an insect who begins its life as a worm (representing undeveloped potential) and, after a period of cocooning (programming) is reborn as a beautiful butterflies (the Monarch slave). Some characteristics specific to the Monarch butterfly are also applicable to mind control.
“One of the primary reasons that the Monarch mind-control programming was named Monarch programming was because of the Monarch butterfly. The Monarch butterfly learns where it was born (its roots) and it passes this knowledge via genetics on to its offspring (from generation to generation). This was one of the key animals that tipped scientists off, that knowledge can be passed genetically. The Monarch program is based upon Illuminati and Nazi goals to create a Master race in part through genetics. If knowledge can be passed genetically (which it is), then it is important that parents be found that can pass the correct knowledge onto those victims selected for the Monarch mind control.”
“When a person is undergoing trauma induced by electroshock, a feeling of light-headedness is evidenced; as if one is floating or fluttering like a butterfly. There is also a symbolic representation pertaining to the transformation or metamorphosis of this beautiful insect: from a caterpillar to a cocoon (dormancy, inactivity), to a butterfly (new creation) which will return to its point of origin. Such is the migratory pattern that makes this species unique.”
METHOD
The victim/survivor is called a “slave” by the programmer/handler, who in turn is perceived as “master” or “god.” About 75% are female, since they possess a higher tolerance for pain and tend to dissociate more easily than males. Monarch handlers seek the compartmentalization of their subject’s psyche in multiple and separate alter personas using trauma to cause dissociation.
The following is a partial list of these forms of torture:
1. Abuse and torture
2. Confinement in boxes, cages, coffins, etc, or burial (often with an opening or air-tube for oxygen)
3. Restraint with ropes, chains, cuffs, etc.
4. Near-drowning
5. Extremes of heat and cold, including submersion in ice water and burning chemicals
6. Skinning (only top layers of the skin are removed in victims intended to survive)
7. Spinning
8. Blinding light
9. Electric shock
10. Forced ingestion of offensive body fluids and matter, such as blood, urine, feces, flesh, etc.
11. Hung in painful positions or upside down
12. Hunger and thirst
13. Sleep deprivation
14 Compression with weights and devices
15. Sensory deprivation
16. Drugs to create illusion, confusion, and amnesia, often given by injection or intravenously
17. Ingestion or intravenous toxic chemicals to create pain or illness, including chemotherapy agents
18. Limbs pulled or dislocated
19. Application of snakes, spiders, maggots, rats, and other animals to induce fear and disgust
20. Near-death experiences, commonly asphyxiation by choking or drowning, with immediate resuscitation
22. Forced to perform or witness abuse, torture and sacrifice of people and animals, usually with knives
23. Forced participation in slavery
24. Abuse to become pregnant; the fetus is then aborted for ritual use, or the baby is taken for sacrifice or enslavement
25. Spiritual abuse to cause victim to feel possessed, harassed, and controlled internally by spirits or demons
26. Desecration of Judeo-Christian beliefs and forms of worship; dedication to Satan or other deities
27. Abuse and illusion to convince victims that God is evil, such as convincing a child that God has abused her
28. Surgery to torture, experiment, or cause the perception of physical or spiritual bombs or implants
29. Harm or threats of harm to family, friends, loved ones, pets, and other victims, to force compliance
30. Use of illusion and virtual reality to confuse and create non-credible disclosure.
“The basis for the success of the Monarch mind-control programming is that different personalities or personality parts called alters can be created who do not know each other, but who can take the body at different times. The amnesia walls that are built by traumas, form a protective shield of secrecy that protects the abusers from being found out, and prevents the front personalities who hold the body much of the time to know how their System of alters is being used. The shield of secrecy allows cult members to live and work around other people and remain totally undetected. The front alters can be wonderful Christians, and the deeper alters can be the worst type of Satanic monster imaginable–a Dr. Jekyll/Mr. Hyde effect. A great deal is at stake in maintaining the secrecy of the intelligence agency or the occult group which is controlling the slave. The success rate of this type of programming is high but when it fails, the failures are discarded through death. Each trauma and torture serves a purpose. A great deal of experimentation and research went into finding out what can and can’t be done. Charts were made showing how much torture a given body weight at a given age can handle without death.”
“Due to the severe trauma induced through ECT, abuse and other methods, the mind splits off into alternate personalities from the core. Formerly referred to as Multiple Personality Disorder, it is presently recognized as Dissociative Identity Disorder and is the basis for MONARCH programming. Further conditioning of the victim’s mind is enhanced through hypnotism, double-bind coercion, pleasure-pain reversals, food, water, sleep and sensory deprivation, along with various drugs which alter certain cerebral functions”.
Dissociation is thus achieved by traumatizing the subject, using systematic abuse and using terrifying occult rituals. Once a split in the core personality occurs, an “internal world” can be created and alter personas can be programmed using tools such as music, movies (especially Disney productions) and fairy tales. These visual and audio aids enhance the programming process using images, symbols, meanings and concepts. Created alters can then be accessed using trigger words or symbols programmed into the subject’s psyche by the handler. Some of the most common internal images seen by mind control slaves are trees, Cabalistic Tree of life, infinity loops, ancient symbols and letters, spider webs, mirrors, glass shattering, masks, castles, mazes, demons, butterflies, hour glasses, clocks and robots. These symbols are commonly inserted in popular culture movies and videos for two reasons: to desensitize the majority of the population, using subliminals and neuro-linguistic programming and to deliberately construct specific triggers and keys for base programming of highly-impressionable MONARCH children. Some of the movies used in Monarch programming include The Wizard of Oz, Alice in Wonderland, Pinocchio and Sleeping Beauty .
The movie The Wizard of Oz is used by Monarch handlers to program their slaves. Symbols and meanings in the movie become triggers in the slave’s mind enabling easy access to the slave’s mind by the handler. In popular culture, veiled references to Monarch programming often use analogies to The Wizard of Oz and Alice in Wonderland.
In each case, the slave is given a particular interpretation of the movie’s storyline in order to enhance programming. For example, a slave watching The Wizard of Oz is taught that “somewhere over the rainbow” is the “happy place” dissociative trauma slaves must go to in order to escape the unbearable pain being inflicted upon them. Using the movie, programmers encourage slaves to go “over the rainbow” and dissociate, effectively separating their minds from their bodies.
“As mentioned before, the hypnotist will find children easier to hypnotize if they know how to do it with small children. One method that is effective is to say to the small children, “Imagine you are watching a favorite television show.” This is why the Disney movies and the other shows are so important to the programmers. They are the perfect hypnotic tool to get the child’s mind to dissociate in the right direction. The programmers have been using movies since almost day one to help children learn the hypnotic scripts. For children they need to be part of the hypnotic process. If the hypnotist allows the child to make up his own imagery, the hypnotic suggestions will be stronger. Rather than telling the child the color of a dog, the programmer can ask the child. This is where the books and films shown the child assist in steering its mind in the right direction. If the hypnotist talks to a child, he must take extra precaution not to change the tone of his voice and to have smooth transitions. Most of the Disney films are used for programming purposes. Some of them are specifically designed for mind-control.”
LEVELS OF MONARCH PROGRAMMING
The levels of Monarch Programming identify the slave’s “functions” and are named after the Electroencephalography (EEG) brainwaves associated with them.
ALPHA PROGRAMMING
Regarded as “general” or regular programming, ALPHA is within the base control personality. It characterized by extremely pronounced memory retention (extremely useful for actors and remembering their lines), along with substantially increased physical strength and visual acuity. Alpha programming is accomplished through deliberately subdividing the victims personality which, in essence, causes a left brain-right brain division, allowing for a programmed union of Left and Right through neuron pathway stimulation.
BETA PROGRAMMING
BETA is referred to as “sexual” programming (slaves). This programming eliminates all learned moral convictions and stimulates the primitive instinct, devoid of inhibitions. “Cat” alters may come out at this level. Known as Kitten programming, it is the most visible kind of programming as some female celebrities, models, actresses and singers have been subjected to this kind of programming. In popular culture, clothing with feline prints often denote Kitten programming.
DELTA PROGRAMMING
DELTA is known as “killer” programming and was originally developed for training special agents or elite soldiers (i.e. Delta Force, First Earth Battalion, Mossad, etc.) in covert operations. Optimal adrenal output and controlled aggression is evident. Subjects are devoid of fear and very systematic in carrying out their assignment. Self-destruct or suicide instructions are layered in at this level.
THETA PROGRAMMING
THETA – Considered to the “psychic” programming. Bloodliners (those coming from multi-generational Satanic families) were determined to exhibit a greater propensity for having telepathic abilities than did non-bloodliners. Due to its evident limitations, however, various forms of electronic mind control systems were developed and introduced, namely, bio-medical human telemetry devices (brain implants), directed-energy lasers using microwaves and/or electromagnetics. It is reported these are used in conjunction with highly-advanced computers and sophisticated satellite tracking systems.
MONARCH PROGRAMMING DETECTION
A common ‘real world’ physical side effect from the electroshock torture victims undergo is one of their eyelids will exhibit visible signs of slight droopiness. Most Hollywood stars who have undergone this trauma have varying degrees of eyelid droopiness, in both men and women. Some victims do not display this eyelid issue at all, but the older the victim the more pronounced the result, presumably due to the lack of elasticity in their skin. It is common practice for Monarch Slaves to have their programming reinstalled and updated as they get older or when their programming breaks down (See Britney Spears’ notorious 2007 meltdown). Multiple sessions of electroshock torture over the years to create new alters is the likely cause for this eyelid issue.
ELECTROSHOCK TORTURE: THE DARK REALITY OF MODERN SOCIETY
“When a slave is taken to an impromptu programming site–a hypnotic drug is injected into them for a quick induction while a metal band is put around their head and a current of 100,000 volts will be run through for say 5 seconds into their heads. This will cause the body to shake, the eyes to close, sweat to pour out of the body etc. The hands are tied down with restraints. Sometimes the mouth is gagged so that the tongue doesn’t protrude. After imbedding the hypnotic commands deep into the mind, the programmers might adjust the automatic timer on the equipment and give the victim another blast of voltage for 10 seconds. The person’s body will shake and quiver for a while after this. They may dribble spit. Finally, the person will be brought out of their hypnotic trance, instructed not to remember anything, to feel happy and sent on their way.”
– Excerpt from, The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slaveby Cisco Wheeler and Fritz Springmeier
HOLLYWOOD & CELEBRITY VICTIMS (DROOPY EYELID/LAZY EYE)
Carrie-Anne Moss (Trinity from the Matrix Trilogy) is one example of a Hollywood star who clearly displays visible droopiness in her left eye (as seen in the screenshot above from The Matrix Reloaded). When combined with the Project Monarch symbolism connected with her character across The Matrix and The Matrix Reloaded (smashing head-first through glass on multiple occasions) it is a sad thing to confirm, but this wonderful actress has undoubtedly undergone this horrific form of torture during her time in Hollywood with the visible scars being the droopiness of her left eyelid. Careful observation of an individuals eyelids is a potential method of determining if the person has undergone this form of trauma-based mind control. You will be surprised how widespread the ‘droopy eyelid’ or ‘Lazy Eye’ epidemic actually is in modern society.
It is difficult to remain objective when describing the horrors endured by Monarch slaves. The extreme violence, the abuse, the mental torture and sadistic games inflicted on victims by “notable scientists” and high-level officials prove the existence of a true “dark side” in the powers that be. Despite the revelations, the documents and the whistle-blowers, a great majority of the population ignores, dismisses or avoids the issue altogether. Over two million Americans have been programmed by trauma mind-control since 1947 and the CIA publicly admitted its mind control projects in 1970. Movies such as The Manchurian Candidate have directly referred to the subject, even depicting actual techniques, such as electroshock, the use of trigger words and microchip implementation. Several public figures we see on our TV and movie screens are mind control slaves. Famous people such as Candy Jones, Celia Imrie and Sirhan Sirhan have gone on record and disclosed their mind control experiences…and yet the general public claims that it “cannot exist”.
The research and funds invested in Project Monarch do not however only apply to mind control slaves. Many of the programming techniques perfected in these experiments are applied on a mass scale through mass media. Mainstream news, movies, music videos, advertisements and television shows are conceived using the most advanced data on human behavior ever compiled. A lot of this comes from Monarch Programming.
2 million people have undergone this program just via the military alone. There is no telling how many private organizations that have done the same and what those numbers are. My guess would be in the tens of millions if not more because it works. The Phoenicians and Egyptians used it because it is mentioned in the book of the dead. This means all countries, societies and possibly companies traffic humans and mind control them for nefarious purposes. I do believe Trump getting the government involved with human trafficking is the equivalent of reagon and the war on drugs. Instead of stopping it, they took it over for profit as this was proven many times over that the CIA along with the airforce is a legalized drug operation. The proof is, drugs haven’t gone anywhere, in fact, its use has increased and so has the potency.
I also believe this is the main reasons for tunnels and cities underground. There is an insanely large organized operation using tax paying funds to program trafficked humans to do the will of their masters. The CIA and military’s efforts in mimicking Russia’s mind control techniques have become mainstream and the public is unaware their entertainment personalities that they put their trust in are victims of mind control. How do I know it exists? It’s what I would do to control the masses. Mind control is found on ancient carvings from Mesopotamia and Egypt in the form of a pine cone. The two faced leader points the pinecone at the public symbolizing they have control of their pineal gland and the purse represents the wealth they took from them.
They told us then and are telling us now through logos and symbolism. The all seeing eye on the top of the pyramid represents the ancient god Horus is back and oversees 95% of all the world’s currency through the US Dollar. Same concept as the ancient civilizations. And as the people worship the sun, we are told there is nothing new underneath it. The people never rebel because they are mind controlled. Back then they used drugs and religion. Now, we use drugs and electronics. You are being mind controlled right now. Instead of a pine cone being pointed to you, the two faced leader holds a cell phone.
Sources
Sex Kitten (Beta Programming) | Hollywood Subliminals
Project Monarch | Hollywood Subliminals
Origins and Techniques of Monarch Mind Control - Hidden Knowledge

Saturday Oct 12, 2024
Saturday Oct 12, 2024
Internet Archive Bombed Electronically
Watch on Rumble: https://rumble.com/v5idjff-internet-archive-bombed-electronically.html
Since May, the Internet Archive has been under DDOS attack. This is when millions of computers are programmed to open a webpage all at once. It forces the CPU to open the website a million times at once. This is called a denial of service attack that overloads the server and it freezes. There are companies that offer services to quickly deny multiple attampts at once like cloudflare, but apparently, the internet archive wasn’t prepared for this cyber attack.
Currently, their founder has said they are working on upgrading their infrastructure and their data has not been corrupted. The Internet Archive was most recently down due to an attack and data breach on October 10, 2024. The hacktivist group SN_BlackMeta claimed responsibility for the attack, which took archive.org and openlibrary.org offline. The group is believed to be affiliated with the pro-Palestinian movement. The Internet Archive is currently offline to focus on data security. The hack compromised the Internet Archive's authentication database, which contained registered member details and hashed passwords. Hackers also stole 31 million passwords.
PEW Research shows 25% of web pages posted between 2013 and 2023 have vanished. A few organisations are racing to save the echoes of the web, but new risks threaten their very existence. So who or what is deleting history? Publishers of books sued Internet Archive for copying copyrighted material. Before the pandemic, the Internet Archive would only lend one digital copy at a time for each physical book in its collection. But during the Covid shutdowns, the organisation lifted that restriction, letting patrons borrow unlimited digital copies of books to try and make up for the closure of physical libraries. A US court ruled that practice was illegal in 2023, and in early September, the Internet Archive’s appeal against that decision was rejected. The organisation previously said that it agreed to pay the a publishing industry trade group an undisclosed sum in relation to the case.
Some conspiracy theorists are claiming that the internet arhive has actually been hacked by the CIA. This is the equivalent of book burning. In the documentary Shadow Gate, the procedure to remove the truth is used by private contractors in defence paid for by the military industrial complex. Whistleblowers Tore and Patrick Bergy, claimed to have worked with the private contractors for electronic and information warfare. Contractors for intelligence agencies. Social media intelligence warfare. Psychological operations. Select an individual or group as a target or an entire country. They can select a group of people in a city and can find everything about them and push an ideology or product to where the state wants to go. They say they can hack their shadows based on their fears which was given to them via social media. They can sway and convince groups of people to sway elections. Since they are private companies, they can get away with this because the state will leave them alone.
Because they have access to all your information via facebook and other social media sites, they can hone down on your wants and needs and then manipulate you through the comments section and send videos in your feed supporting what they want you to believe. This technology has been around since 2008. They can park a van next to a building and be able to sway public opinion through hacking the router of that building and see the cameras, pull the people who are there and then spy on them. Because social media has bots that are your supposed friends, they can respond to your posts with comments that can sway your opinion through humiliation and bombardment of opposite views.
For example, let’s say there is a football stadium and we want to sell ben and jerry’s ice cream. One van can hack into the router of the stadium and the cell towers thus pull every person that is at that stadium’s informaiton. Now, armed with 30,000 people’s profiles, social media accounts and bots that are given to you by the social media companies, they can start adding images, videos and comments in your feed. You wouldn’t even notice that you are being manipulated because you trust that the aglorithm on your social media is giving you information based on your wants and needs. Now, your feed has people talking about trying ben and jerry’s ice cream. And meme’s of ice cream. And comments of ice cream. It will be one in every 10 videos or 10 pictures where it is not really noticed. For some reason, everyone in that stadium will soon want ice cream.
This is just a basic and crude point, but the technology and data sharing by secret service, social media and cell companies is there. Also, companies like Apple have collected your fingerprints, facial recognition features and more where they could easily use against you for blackmail. The federal government has unfettered access to everyone and hacks into companies are the beginning of the blackmail and data sharing scheme. Case in point, the recent DDOS attack on the internet archive. The history of the internet needs to be controlled by the government so they can control history.
History of Internet Archive
The Internet Archive receives financial and in-kind donations from a variety of sources. The Internet Archive is a 501(c)(3) non-profit public charity that is recognized as a library by the government. It provides free access to collections of digitized materials, including websites, software applications, music, audiovisual, and print materials. The Internet Archive also advocates for a free and open Internet.
The Internet Archive is a larger organization that operates the "Wayback Machine," which is a specific service within the Archive that allows users to access archived versions of websites from the past; essentially, the Wayback Machine is a feature of the Internet Archive, not a separate entity. The original idea for the Internet Archive Wayback Machine began in 1996, when the Internet Archive first began archiving the web. Five years after the creation, they had over 100 terabytes and a dozen web crawls completed, the Internet Archive has made the Internet Archive Wayback Machine available to the public.
The Internet Archive has several competitors, including:
Memento
A customizable alternative that aggregates archives from multiple sources, including the Wayback Machine. Memento's Time Travel tool allows users to access archives from multiple sources on the website. Memento also has a Chrome extension that lets users select a date to view a page.
Perma.cc
A web archiving platform that creates permanent records of linked citations. Perma.cc is primarily used by researchers, academics, journals, courts, and educational institutions.
Google Cache
A feature that allows users to view a snapshot of a webpage as it appeared when Google last crawled and indexed it.
Other alternatives to the Wayback Machine include:
MirrorWeb, Archive.Today, Resurrect Pages, CachedView, MessageWatcher, ChangeTower, PageVault, Stillio, and Smarsh.
Founder Brewster Kahle, an American digital librarian, computer engineer, inventor, and philanthropist, founded the Internet Archive in 1996.
The Internet Archive's Wayback Machine is the largest archive of the World Wide Web, covering more than 279 billion pages.
The Internet Archive is a digital library that works by collecting, preserving, and making available digital and physical materials:
Web crawlers
The Internet Archive's web crawlers automatically collect data from the public web to preserve it.
User contributions
Users can upload digital materials to the Internet Archive, such as photos and videos.
Book digitization
The Internet Archive has one of the world's largest book digitization efforts, with over 1.4 million digitized books.
Wayback Machine
The Internet Archive's Wayback Machine allows users to visit archived versions of websites.
Collections
The Internet Archive's collections include audiobooks, vintage video games, live concert recordings, and ancient manuscripts.
Users can access the Internet Archive's resources for free, but some features require an account:
Borrowing books: Users can borrow books for an hour or up to 21 days, depending on the title and copyright status.
Uploading materials: Users can upload materials to the Internet
Archive, such as photos and videos.
Updating, deleting, and exporting account information: Users can update, delete, and export their account information.
The Internet Archive's collections are stored on servers in many locations to keep them safe.
Visitors to the Wayback Machine can type in a URL, select a date range, and then begin surfing on an archived version of the Web. it does not store images and video, but pulls up all content and source code.
Brewster Lurton Kahle born October 21, 1960) is an American digital librarian, computer engineer, Internet entrepreneur, and advocate of universal access to all knowledge. He graduated with a bachelor's degree in computer science and engineering from the Massachusetts Institute of Technology in 1982. In 1996, Kahle founded the Internet Archive and co-founded Alexa Internet. In 2012, he was inducted into the Internet Hall of Fame.
Kahle was born in New York City and raised in Scarsdale, New York, the son of Margaret Mary (Lurton) and Robert Vinton Kahle, a mechanical engineer. He went to Scarsdale High School. He graduated from the Massachusetts Institute of Technology in 1982 with a Bachelor of Science in computer science and engineering, where he was a member of the Chi Phi Fraternity. The emphasis of his studies was artificial intelligence; he studied under Marvin Minsky and W. Daniel Hillis.[8]
After graduation, he joined the Thinking Machines team, where he was the lead engineer on the company's main product, the Connection Machine, for six years (1983–1989). There, he and others developed the WAIS system, the first Internet distributed search and document retrieval system, a precursor to the World Wide Web. In 1992, he co-founded, with Bruce Gilliat, WAIS, Inc. (sold to AOL in 1995 for $15 million), and, in 1996, Alexa Internet (sold to Amazon.com in 1999 for $250 million in stock). At the same time as he started Alexa, he founded the Internet Archive, which he continues to direct. In 2001, he implemented the Wayback Machine, which allows public access to the World Wide Web archive that the Internet Archive has been gathering since 1996. Kahle was inspired to create the Wayback Machine after visiting the offices of Alta Vista, where he was struck by the immensity of the task being undertaken and achieved: to store and index everything that was on the Web. Kahle states: "I was standing there, looking at this machine that was the size of five or six Coke machines, and there was an 'aha moment' that said, 'You can do everything.'"
Kahle was elected a member of the National Academy of Engineering (2010) for archiving, and making available, all forms of digital information. He is also a member of the Internet Hall of Fame, a Fellow of the American Academy of Arts and Sciences, and serves on the boards of the Electronic Frontier Foundation, Public Knowledge, the European Archive (now Internet memory) and the Television Archive. He is a member of the advisory board of the National Digital Information Infrastructure and Preservation Program of the Library of Congress, and is a member of the National Science Foundation Advisory Committee for Cyberinfrastructure. In 2010 he was given an honorary doctorate in computer science from Simmons College, where he studied library science in the 1980s.
Kahle and his wife, Mary Austin, run the Kahle/Austin Foundation. The Foundation supports the Free Software Foundation for its GNU Project, among other projects, with a total giving of about $4.5 million in 2011.
In 2012, Kahle and banking veteran Jordan Modell established Internet Archive Federal Credit Union to serve people in New Brunswick, N.J. and Highland Park, New Jersey, as well as participants in programs that alleviate poverty in those areas. The credit union voluntarily liquidated in 2015.
Kahle has been critical of Google's book digitization, especially of Google's exclusivity in restricting other search engines' digital access to the books they archive. In a 2011 talk Kahle described Google's 'snippet' feature as a means of tiptoeing around copyright issues, and expressed his frustration with the lack of a decent lending system for digital materials. He said the digital transition has moved from local control to central control, non-profit to for-profit, diverse to homogeneous, and from "ruled by law" to "ruled by contract". Kahle stated that even public-domain material published before 1923, and not bound by copyright law, is still bound by Google's contracts and requires permission to be distributed or copied. Kahle reasoned that this trend has emerged for a number of reasons: distribution of information favoring centralization, the economic cost of digitizing books, the issue of library staff without the technical knowledge to build these services, and the decision of administrators to outsource information services.
Kahle advocated in 2009:
It's not that expensive. For the cost of 60 miles of highway, we can have a 10 million-book digital library available to a generation that is growing up reading on-screen. Our job is to put the best works of humankind within reach of that generation. Through a simple Web search, a student researching the life of John F. Kennedy should be able to find books from many libraries, and many booksellers—and not be limited to one private library whose titles are available for a fee, controlled by a corporation that can dictate what we are allowed to read.
In 1997, Kahle explained that apart from the value for historians' use of these digital archives, they might also help resolve some common infrastructure complaints about the Internet, such as adding reliability to "404 Document not found" errors, contextualizing information to make it more trustworthy, and maintaining navigation to aid in finding related content. Kahle also explained the importance of packaging enough meta-data (information about the information) into the archive, since it is unknown what future researchers will be interested in, and that it might be more problematic to find data than to preserve it.
Physical media
"Knowledge lives in lots of different forms over time," Kahle said in 2011. "First it was in people's memories, then it was in manuscripts, then printed books, then microfilm, CD-ROMs, now on the digital internet. Each one of these generations is very important." Voicing a strong reaction to the idea of books simply being thrown away, and inspired by the Svalbard Global Seed Vault, Kahle envisioned collecting one physical copy of every book ever published. "We're not going to get there, but that's our goal," he said. "We want to see books live forever." Pointing out that even digital books have a physical home on a hard drive somewhere, he sees saving the physical artifacts of information storage as a way to hedge against the uncertainty of the future. (Alongside the books, Kahle plans to store the Internet Archive's old servers, which were replaced in 2010.) He began by having conventional shipping containers modified as climate-controlled storage units. Each container can hold about 40,000 volumes, the size of a branch library. As of 2011, Kahle had gathered about 500,000 books. He thinks the warehouse is large enough to hold about a million titles, with each one given a barcode that identifies the cardboard box, pallet and shipping container in which it resides. A given book may be retrieved in about an hour, not to be loaned out but to be used to verify contents recorded in another medium. Book preservation experts commented he will have to contend with vermin and about a century's worth of books printed on wood pulp paper that disintegrates over time because of its own acidity. Peter Hanff, deputy director of UC Berkeley's Bancroft Library, said that just keeping the books on the west coast of the US will save them from the climate fluctuations that are the norm in other parts of the country.
Brewster Kahle, whether having evil intentions or not, inadvertantly could have been attacked by the state for access to the Internet Archive which was blamed on Palestinians to support Israel and their war crimes. Why Palestinians would need access to the history of websites is unclear, but they could have picked a better boogie man. Like Russia. Regardless, it would appear to look like what once was a good way of going back to website histories to find information is now threatened. The blowback from such an operation can have a huge advantage for the state in keeping secrets and removing valuable proof for gaining data and sources. If the state can remove any old website that had information about their own corruption, would be lost.
That is, if internet archive is actually being attacked by the state in the first place. They could have been working with the state already. In May 2024, the Internet Archive announced it was in the midst of a large distributed denial of service (DDoS) attack. In a DDoS attack, vandals or other bad actors set up automated systems to bombard websites with visits, attempting to push them offline by overwhelming their servers. At its peak, tens of thousands of concurrent visits were happening every second. Services, including the Wayback Machine, went down. It meant that the regular drumbeat of archiving was disrupted for a time, and there may be permanent gaps in the historical record as a result. My guess is, Brewster is not cooperating. This isn’t the first time they have been under attack, either. But it is the first time they have been under consistant attack over several months.
The internet archive and wayback machine has been so useful for gathering evidence to support facts and truth. I use it almost daily for finding sources of information and data that at one time was gathered.
Private contractors can legally gain access to all backdoor data bypassing the rules and regulations of spying on americans. This is a sneaky way to gather intelligence without any oversight.
This is war. Our own library of information is being attacked by our own administration and blaming it on Palestinians. The documentary Shadow Gate by truther and former InfoWar’s coorespondant Millie Weaver exposed the military industrial complex’s connections to private organizations that are being used to spy and manipulate americans via mind control. Days after its release, she was arrested for apparently robbing her own mother. Charges were later dropped and it didn’t deter her from creating another documentary called Shadow Gate 2.0, which was just released, where she explains the news media has turned from fake news to political spin. She talks about the smithmundt act and how it is being used to legally lie to the american people.
She also exposes how domestic propaganda became legal under the H.R.6971 - Educating Against Misinformation and Disinformation Act. This gave funding to start committees to fact check information which favors the state and it paid jounralists to print false information. Apparently, we tested all of this on Iraq which was a great success. Now, those weapons against the Iraq people is now being used on us. After the destruction of Iraq, Halliburton came in under Dick Cheney and rebuilt the country’s infrastructure under the american tax payer expense. It was a con to rebuild Iraq using American corporations and chaging the american taxpaper.
USA Today attacked Millie for her first documentary for actually doing journalistic work. She’s back now trying to warn the people that our own country is attacking its own people by attacking Internet Archive, with the goal to remove and change history to favor the state. We are under psychological warfare that was used on our own supposed enemies. The kind of equipment they use to change public opinion could easily stop those who find a gun and shoot up a school. The fact that President Trump has had two attacks on his life publicly proves the weapons are bring used on the people and not to stop people from hurting others.
One thing that rings loud to me is the mobility of this equipment. They could drive these mobile data centers on trucks and park vehicles n cities if swing states. They could literally bombard an entire city’s cell phone coverage to sway the vote. All they would need is access to WiFi and Starlink would work just fine. Think about it, a mobile hacking forces that can setup shop in a city within minutes to steer the public away from your candidate and towards theirs. Wouldn’t surprise me if both parties are doing this now. Of course, they don’t need to be mobile. They can do this through proxy servers in another country and make it appear it is all coming from Russia when in fact, the servers are just in Italy. The Mueller report said this exact same thing about the Trump campaign that there is no definitive way to prove Russian IP’s were used to help Trump’s campaign in 2016. Even if the IP’s said Russia, they still could be in Italy.
An attack on our knowledge is an attack on our country. Internet Archive has been used in court cases. It has led to many arrests. If Brewster gives in to the demands of the hackers, we will lose our history once again. This kind of warfare isn’t surprising given there are gaps of missing information dating back to the age of reason. This is why the library of Alexandria was burnt down. To keep the people docile, stupid, drugged and complacent just enough to do their jobs. And believe it or not, the technology that is being used on us is old. It’s been around for 20 years. It’s origens are from our own military in Iraq after 9/11. The technology they have now, with AI, surpasses all I have reported.
This leaves the competition. Most of them link to Internet Archive anyways. Another theory is Google is attacking them because they have been fighting each other. It wouldn’t surprise me if Google decided to take them down so they can offer their Google Cache.
Google has faced numerous lawsuits over the years. As a major tech company with a wide range of products and services, it's inevitable that it would be involved in legal disputes. These lawsuits have covered a variety of issues, including:
Antitrust: Google has faced allegations of anticompetitive practices, particularly in relation to its search engine and advertising businesses.
Copyright infringement: Google has been involved in lawsuits over copyright infringement, especially concerning its Google Books project.
Privacy: Google has been sued over privacy concerns, such as the collection and use of user data.
Intellectual property: Google has been involved in disputes over intellectual property rights, such as patents and trademarks.
It's important to note that the exact number of lawsuits Google has faced is difficult to determine. Many lawsuits are settled out of court or are ongoing, making it challenging to track them all. Additionally, the definition of a "lawsuit" can vary, as it can include class-action suits, government actions, and individual complaints.
Google's motto, "Don't be evil," has often been cited in discussions about the company's ethical practices and legal controversies. While the motto has been interpreted in various ways, it has certainly raised expectations about Google's conduct.
Some argue that Google's involvement in lawsuits, particularly those related to antitrust and privacy, contradicts its "Don't be evil" motto. Others defend Google's actions, claiming that the company is simply trying to compete in a highly competitive market and protect its users' privacy.
Ultimately, whether Google's actions align with its motto is a matter of interpretation and debate. It's clear, however, that the motto has added a layer of scrutiny to the company's operations and has led to increased public discussion about its ethical responsibilities.
It is estimated Google has been sued thousands of times. This means every day they recieve a lawsuit for antitrust, copyright infringment, privacy, intellectual property, piracy, monopolies and more.
Piracy: Google has been accused of facilitating piracy by indexing websites that host copyrighted content. While Google has taken steps to address this issue, such as removing infringing content from its search results, it has still faced lawsuits from copyright holders.
Monopolies: As a dominant player in the search engine market, Google has faced allegations of monopolistic behavior. These allegations have focused on Google's practices related to search results, advertising, and its Android operating system. The company has defended itself against these claims, arguing that it faces significant competition from other tech giants.
Google has a complex relationship with the Internet Archive Wayback Machine. While the Wayback Machine provides a valuable service by preserving historical snapshots of websites, it has also raised concerns for Google.
Here are some of the key issues:
Copyright Infringement: Google has been involved in legal disputes with the Internet Archive over copyright infringement. Google argues that the Wayback Machine can facilitate copyright infringement by preserving unauthorized copies of copyrighted content.
Competition: Some have suggested that the Wayback Machine poses a competitive threat to Google's search engine business. By providing access to historical versions of websites, the Wayback Machine could potentially reduce the relevance of Google's search results.
Data Privacy: The Wayback Machine has faced criticism for storing and preserving personal data that may be sensitive or confidential. This has raised concerns about data privacy and security.
Despite these challenges, Google and the Internet Archive have also collaborated on certain projects, such as the Google Books project. The relationship between the two organizations is likely to remain complex and dynamic as they navigate the evolving landscape of digital preservation and copyright law.
The legal battles between Google and the Internet Archive over the Wayback Machine have been complex and ongoing. There is no clear-cut winner, and the outcomes have varied depending on the specific claims and jurisdictions involved.
Some cases have resulted in settlements or agreements between the two parties, while others have been resolved through court rulings. It's important to note that the legal landscape surrounding digital preservation and copyright law is constantly evolving, and new developments may impact the outcome of future disputes.
So was it Google? Is it Palestinians? Is it the Russians? Is it the current administraction? Is it the military industrial complex? Let’s rule them out one by one following the money.
The current explanation of the war on Internet Archive and the constant DDOS attacks since May is it’s the people in Gaza. There is no demand for money as this is an attack and not ransomware. Gazans have no food and water and are facing genocide of 3.5 million at the hands of Israel. Their entire infrastructure has been flattened. I highly doubt this poor excuse is the culprit.
The Russians? What would they gain by attacking a non profit that archives old websites? It’s an attack and not ransomware. Russia isn’t broke. They have more in savings than their own GDP. Cross them off the list.
Is it Biden? What funds can they pull from this attack? How will it help them in their current run for a leftist president? Wouldn’t that be a bad idea to wage a war with an american company during an election year? We can cross that off the list.
That leaves the military industrial complex. They have the most to lose if we find all of the private companies that they hired to spy on the Americans and practice mind control. Eisenhower warned us and so did Kennedy about the MIC and their efforts in making money. They will benefit by erasing evidence of their crimes and controlling the narrative in the future. I am assuming with common sense that our own are waging this war on information. And judging by the fight that Bewster has put up with Google and publishers, I doubt he is one of the bad guys.
sources
https://en.wikipedia.org/wiki/Brewster_Kahle
https://www.niemanlab.org/2022/03/after-25-years-brewster-kahle-and-the-internet-archive-are-still-working-to-democratize-knowledge/
Shadowgate I:
https://www.bitchute.com/video/xGqHkujaTHpv
Shadowgate 2.0: Rise of the Fake New Industrial Complex
https://www.bitchute.com/video/qLWXRRinngDj
https://www.bbc.com/future/article/20240912-the-archivists-battling-to-save-the-internet

Saturday Oct 12, 2024
Saturday Oct 12, 2024
Mermaids & Sirens
Watch on Rumble: https://rumble.com/v5i991u-mermaids-and-sirens.html
A Mythical History: Mermaids
Mermaids, creatures of myth and folklore, have captivated human imagination for centuries. These half-human, half-fish beings have been depicted in various cultures around the world, often associated with the sea, water, and the supernatural.
Ancient Origins
The earliest known references to mermaid-like creatures can be found in ancient Mesopotamian mythology, dating back to around 3000 BCE. The Epic of Gilgamesh, one of the oldest surviving works of literature, describes a goddess named Ea-ki-gal, who is often depicted as having a fish-like body.
In Greek mythology, sirens were mythical creatures with the bodies of birds and the heads of women. Although not strictly mermaids, their association with the sea and their ability to lure sailors to their doom shares similarities with mermaid folklore.
Medieval and Renaissance Europe
During the Middle Ages and Renaissance, mermaid sightings became more prevalent in European folklore. Stories of mermaids were often intertwined with maritime tales and legends. Some accounts described mermaids as being benevolent and helpful to sailors, while others portrayed them as dangerous creatures.
Recorded Sightings and Exploration
Christopher Columbus: In his journal entries, Columbus described encountering mermaids while exploring the Caribbean Sea. However, his description of these creatures was likely based on a misunderstanding of manatees or dugongs.
Sir Walter Raleigh: The English explorer Sir Walter Raleigh also claimed to have seen mermaids during his voyages to the Americas. His accounts are similarly believed to be based on mistaken identifications of sea creatures.
Benjamin Franklin: Even the renowned American statesman Benjamin Franklin expressed interest in mermaid sightings. He corresponded with other scholars about the possibility of their existence and even suggested that they might be a species of seal or otter.
Modern Interpretations
In modern times, mermaids have continued to be a popular subject in literature, film, and television. From Hans Christian Andersen's classic fairy tale "The Little Mermaid" to the Disney animated film of the same name, mermaids have captured the hearts of audiences around the world.
While there is no scientific evidence to support the existence of mermaids, their enduring appeal as mythical creatures reflects our fascination with the unknown and our desire to connect with the natural world.
Mermaids in Different Cultures
European Folklore
Sirens: As mentioned earlier, Greek mythology features sirens, creatures with the bodies of birds and the heads of women, who used their enchanting voices to lure sailors to their doom.
Nixies: In German folklore, nixies are water spirits often depicted as beautiful women with long, flowing hair. They are associated with rivers, lakes, and wells and can be both benevolent or malevolent.
Kelpies: Scottish folklore features kelpies, shape-shifting water spirits that often appear as horses. They can be dangerous and are known to lure unsuspecting travelers into the water.
Asian Folklore
Jins: In Chinese mythology, jins are water spirits that can take on various forms, including that of a mermaid. They are often associated with rivers, lakes, and oceans and can be both benevolent or malevolent.
Ningyo: In Japanese folklore, ningyo are mermaid-like creatures with human-like faces and fish-like bodies. They are often depicted as having magical powers and are considered to be good luck.
Indigenous American Folklore
Apsaras: In Hindu and Buddhist mythology, apsaras are celestial nymphs often depicted as beautiful women with fish-like tails. They are associated with water, fertility, and pleasure.
Lunokhod: In Slavic folklore, lunokhod are mermaid-like creatures that live in rivers and lakes. They are often depicted as being very beautiful and can be both helpful or harmful to humans.
While there have been numerous historical accounts and legends of mermaid sightings, there is no definitive scientific evidence to support their existence. Many of the recorded instances can be attributed to misidentifications of sea creatures, such as manatees, dugongs, or seals.
Here are some examples of historical accounts:
Christopher Columbus: In his journal entries, Columbus described encountering mermaids while exploring the Caribbean Sea. However, his description is likely based on a misunderstanding of manatees or dugongs.
Sir Walter Raleigh: The English explorer Sir Walter Raleigh also claimed to have seen mermaids during his voyages to the Americas. His accounts are similarly believed to be based on mistaken identifications of sea creatures.
Benjamin Franklin: Even the renowned American statesman Benjamin Franklin expressed interest in mermaid sightings. He corresponded with other scholars about the possibility of their existence and even suggested that they might be a species of seal or otter.
The term "sirens" is derived from Greek mythology. In ancient Greek tales, sirens were mythical creatures with the bodies of birds and the heads of women. They were known for their enchanting voices, which they used to lure sailors to their doom.
While sirens are not technically mermaids, they share some similarities, such as their association with the sea and their ability to captivate and ensnare humans. Over time, the term "siren" has come to be used more broadly to refer to any alluring or seductive woman, often with a dangerous or harmful influence.
The connection between sirens and mermaids is likely due to their shared association with the sea and their ability to captivate and sometimes harm humans.
While sirens were originally described as bird-like creatures, their association with water and their seductive nature may have influenced the development of mermaid myths in other cultures. Over time, the characteristics of sirens and mermaids may have become intertwined, leading to the modern conception of mermaids as half-human, half-fish beings with alluring qualities.
Additionally, the fear and fascination that both sirens and mermaids evoke may have contributed to their enduring popularity in folklore and mythology.
While there is no specific religion that explicitly mentions mermaids, there are elements in various religious traditions that might be connected to mermaid folklore.
Water Spirits: Many religions and spiritual traditions recognize water spirits or nymphs. These beings are often associated with bodies of water and can have both benevolent and malevolent qualities. While they may not be identical to mermaids, they share some similarities in their association with the aquatic realm.
Sea Goddesses: Some religions have sea goddesses or deities associated with the ocean. These goddesses may have attributes or powers that could be linked to mermaid folklore. For example, in Greek mythology, Poseidon, the god of the sea, is often depicted as a powerful and sometimes capricious figure.
Symbolic Interpretations: In some religious texts or traditions, mermaids might be interpreted symbolically. For example, they could represent the allure of the material world, the dangers of temptation, or the power of the natural world.
An interesting book I read called The Secret History of Mermaids, by Ari Berk, gives us a better understanding of how this Merfolk came into fruition.
The book explores the diverse world of merfolk, moving beyond the stereotypical image of a beautiful woman with a fishtail. Merfolk, or "Murgen" as they are called, are presented as ancient and varied beings, reflecting the diverse ecosystems they inhabit, from the Cornish Merrymaids with skate-like markings to the monstrous denizens of the abyssal zones.
The book delves into the social structures of merfolk, highlighting their villages, homes, languages, and methods of communication. It reveals their complex social interactions and the ways in which they govern themselves.
A recurring theme is the historical and often fraught relationship between humans and merfolk. Accounts range from friendly encounters and mutually beneficial trade to the darker aspects of exploitation, capture, and revenge.
The book emphasizes the magical properties of the ocean and the enchantments wielded by merfolk. These include gifts bestowed upon humans, curses inflicted upon those who disrespect them, and their deep connection to the creatures of the deep.
The book explores the concept of lost lands claimed by the sea, such as Atlantis and Lyonnesse, emphasizing the merfolk's claim over these submerged territories and the treasures they hold.
The book presents various theories about merfolk origins, including Atavgatis, the ancient Sea Mother, and Charles Darwin's early speculation that humans evolved from aquatic creatures.
Merfolk communication goes beyond spoken language, incorporating gestures, songs, tail displays, tide runes, and shell inscriptions. They are said to mimic whale and dolphin sounds and communicate with various sea creatures.
Merfolk live in structured societies within villages, often with elaborate coral structures and marketplaces, as described by a 17th-century treasure hunter in a diving bell.
Merfolk can bestow gifts upon humans, such as healing powers, musical talents, and enchanted objects like the "Mermaid's Purse" or "Sea Cap." Conversely, they can inflict powerful curses on those who offend them, ranging from localized misfortune to the infamous Wandering Curse that dooms a ship to sail aimlessly.
The book details various dangerous sea creatures from ancient accounts, including the Kraken, Leviathan, Sirens, and the Blue Men of the Scottish seas.
They have a complex system of governance existing within the merfolk world, with councils and regional rulers overseen by the Ministry of Waters and the four Dragon Kings of the Sea. The Ancient Code of Atargatis dictates fundamental laws regarding interactions between land and sea dwellers.
This book presents a rich and captivating exploration of merfolk and the mysteries of the sea, weaving together folklore, historical accounts, and imaginative speculation. It encourages a deeper understanding of these creatures and the importance of respecting their world and traditions.
But when it comes to proof, there is just heresay, rumors and tales. Eyewitness accounts but no bodies. The internet is flooded with videos of mermaids but almost all of them can be debunked. Just like aliens and ghosts, to believe in mermaids, it takes faith and belief in the storyteller.
Another book I read is Mermaids: Art, Symbolism and Mythology by, Axel Muller, Christopher Halls, Ben Williamson.
According to the author, women with fish tails are among the oldest and still most popular of mythological creatures, possessing a powerful allure and compelling ambiguity. They dwell right in the uncanniest valley of the sea: so similar to humans, yet profoundly other. Mermaids: Art, Symbolism and Mythology presents a comprehensive, interdisciplinary and beautifully illustrated study of mermaids and their influence on Western culture. The roots of mermaid mythology and its metamorphosis through the centuries are discussed with examples from visual art, literature, music and architecture-from 600 BCE right up to the present day. Our story starts in Mesopotamia, source of the earliest preserved illustrations of half-human, half-fish creatures. The myths and legends of the Mesopotamians were incorporated and adopted by ancient Greek, Etruscan and Roman cultures. Then, during the early medieval period, ancient mythological creatures such as mermaids were confused, transformed and reinterpreted by Christian tradition to begin a new strand in mermaid lore. Along the way, all manner of stunning-and sometimes bizarre or unsettling-depictions of mermaids emerged. Written in an accessible and entertaining style, this book challenges conventional views of mermaid mythology, discusses mermaids in the light of evolutionary theory and aims to inspire future studies of these most curious of imaginary creatures.
The book explores the evolution of mermaid iconography and mythology in the Western world, focusing on their diverse representations across cultures and artistic movements.
The authors trace the roots of the mermaid myth back to ancient Mesopotamia, examining figures like Kulullû and Kuliltu, the Aramaean goddess Atargatis, and the Greek deities like Scylla, Sirens, and Aphrodite. They illustrate how these ancient figures and stories contributed to the formation of the Christian mermaid symbolism that dominated the medieval era.
During the Romanesque to Baroque periods, the mermaid's image was largely shaped by Christian interpretations, often embodying temptation and sin. The authors analyze bestiaries, religious architecture, and artworks from this era to demonstrate how mermaids were used as moralistic symbols.
The 19th and early 20th centuries saw a resurgence of interest in mermaids, particularly within the Romantic and Symbolist movements. Artists like Waterhouse, Draper, Böcklin, and Munch revisited the mermaid theme, exploring themes of seduction, longing, and the power of female figures.
The latter half of the 20th century witnessed the increasing commercialization and trivialization of the mermaid image. From tattoos and comic books to film and marketing logos, the mermaid became a ubiquitous figure, often stripped of its original mystical and symbolic depth.
The Christian mermaid image did not emerge from a single source but was a fusion of various mythical figures and cultural beliefs:
Mesopotamian deities with fish tails like Kulullû and Kuliltu.
Aramaean goddess Atargatis who was sometimes depicted with a fish tail and associated with love and fertility.
The book describes Greek figures like Scylla (a monstrous mermaid), Sirens (bird-women with alluring voices), and Aphrodite (goddess of love associated with the sea).
Also weaves in Nymphs, Rusalkas, and Selkies from Celtic, Germanic, and Slavic traditions, which contributed to the image of beautiful and sometimes dangerous water spirits.
Primarily they represented sin, temptation, and the dangers of lust.
During the Renaissance, depictions became more sensual and erotic, often portraying mermaids as objects of desire and beauty.
Romanticism and Symbolism: Represented longing, unattainable love, and the power of nature.
In the Modern Era, mermaids are often commercialized and trivialized, used in branding, entertainment, and popular culture.
"Real" Mermaid Sightings: While many "sightings" can be attributed to marine animals like manatees and seals, the book explores the enduring fascination with proving the existence of mermaids, citing examples like the Japanese mermaid mummies and Karl Banse's book arguing for their historical existence.
The book provides a comprehensive exploration of the mermaid figure's long and complex history. The authors skillfully demonstrate how this mythical creature has captivated human imagination for centuries, evolving from ancient deities to symbols of sin and temptation, romantic ideals, and ultimately, commercialized figures of popular culture. The book emphasizes that the mermaid, while seemingly simple, represents a powerful confluence of cultural beliefs, artistic expressions, and enduring human fascinations with the mysteries of the sea and the allure of the unknown.
Mother’s of Nephilim
I read somehwere that sirens or mermaids are the spirits of the women who birthed the nephilim. They committed a grave sin and are trapped here in the oceans to lure men into sin. This to me makes the most sense to me since mermaids throughout folklore are evil continually. Basically, nothing good comes from them. A fitting punishment by God to make up for the destruction of mankind of what the Nephilim did.
The idea that mermaids are the mothers of Nephilim is a relatively recent concept that has gained popularity in some fantasy and mythological circles. It seems to have originated from a combination of various folklore and religious texts, though there's no concrete historical or religious source that directly supports this idea.
Here are some possible influences:
Mermaids and Sirens: In many cultures, mermaids and sirens are associated with seduction, temptation, and danger. This association might have been combined with the biblical concept of Nephilim, who were often depicted as powerful, sinful beings.
Biblical Nephilim: The Bible describes Nephilim as offspring of angels and human women. Some interpretations of this have suggested that the angelic fathers might have taken on aquatic or hybrid forms, leading to the idea of mermaid mothers.
Fantasy and Folklore: Fantasy and folklore often blend elements from different cultures and mythologies. The idea of mermaid mothers of Nephilim might have been created as a way to combine these elements and create a more fantastical and intriguing narrative.
It's important to note that this idea is not supported by any established religious or historical texts. It's a creative interpretation that has emerged in popular culture and fantasy settings.
There are no books, references or trail that leads anywhere supporting the idea that they are the mother’s of Nephilim. This idea most likely came into fruition just as recently as the Nephilim have become mainstream now. People are trying to make justification or fit the narrative in to make them make sense.
Only about 5% of the world's oceans have been explored. This means that 95% of our planet's largest ecosystem remains largely unknown to us. The vastness of the ocean, its extreme depths, and the technological challenges of exploring it have contributed to this relatively small percentage.
While we have advanced technology like satellites and sonar, exploring the ocean depths presents unique challenges:
Extreme Pressure: The deeper you go, the more intense the water pressure becomes. This makes it difficult for traditional submersibles and even unmanned vehicles to withstand the conditions.
Darkness: Sunlight only penetrates a relatively short distance into the ocean. Beyond that, it's pitch black, making it hard to see and explore using traditional visual methods.
Temperature: The ocean's temperatures can vary widely, from freezing cold in the depths to warm in the surface layers. These temperature extremes can also pose challenges for exploration equipment.
Vastness: The ocean is simply enormous. Even with advanced technology, it takes a significant amount of time and resources to cover such a vast area.
While satellites can provide valuable information about the ocean's surface and some of its deeper features, they cannot provide the same level of detail as in-person exploration. That's why only a small portion of the ocean has been explored so far.
It's a fascinating field of research, and scientists are constantly developing new technologies to unlock the mysteries of the deep sea.
While ships have been exploring the ocean for centuries, there are a few reasons why we haven't seen much more than 5%:
Depth Limitations: Most ships are designed for surface exploration. While some have the capability to go deeper, the extreme pressure at the ocean floor makes it difficult for them to explore the vast majority of the ocean.
Time Constraints: Exploring the entire ocean would take an enormous amount of time and resources. Even with modern technology, it would be a massive undertaking.
Focus on Specific Areas: Many ships focus on specific areas, such as shipping lanes or fishing grounds. This means that large portions of the ocean remain unexplored.
While ships have played a crucial role in ocean exploration, they are limited in their ability to reach the depths and cover the vast expanse of the ocean. That's why advanced technologies like submersibles and unmanned vehicles are essential for exploring the unexplored parts of our planet.
Another thing to consider is the amount of dead sea creatures that wash up ashore that are unidentifiable. Hundreds if not thousands are reported every year and marine biologists take them in for examiniation. They wash up due to
Weather patterns: Storms, hurricanes, and tsunamis can significantly increase the number of marine animals that are washed up on beaches.
Human activities: Pollution, overfishing, and habitat destruction can also contribute to the loss of marine life.
Natural mortality: Some sea creatures may simply die of natural causes and subsequently wash ashore.
So the posibility that people live in the waters isn’t that far fetched. There are primitive villages in south america where people fish by holding their breath for a half an hour. It’s possible to adapt even in the harshest of environments. The one that that would separate a sea person and a land person would be how they receive oxygen. I personally do not believe these are a species. I believe they are spirit in nature and most likely are demonic.
Spirits can be attached to objects. I have seen it with my own eyes. I do believe there are ruins of ancient cities beneath the ocean as we have proof of. When boats travel over that lost city, the demonic are curious and do whatever they can to manifest for escape. They would need an agreement with the sailors to detach from the lost city and attach to them. A call and manifestation of mermaids seems the most plausible explanation.
sources
Gemini AI
https://www.quora.com/Is-it-true-that-mermaids-were-angels-from-heaven
Mermaids: Art, Symbolism and Mythology by, Axel Muller, Christopher Halls, Ben Williamson.
The Secret History of Mermaids, by Ari Berk

Cause Before Symptom
For over 1,000 years, planet Earth has been controlled by two bloodline familes who play good and evil giving the appearance of duality while the sleeping commoners fall prey to their agendas. By using religion, they control the past, present and future through ancient and new black magic technology manipulating events for greed and control.