Archive for September, 2013

Military Cancer

This pretty much sums things up as to why America and the world in general is ailing today!

Short, but not so sweet!  Keep in mind that all of this “cancer growth” is facilitated not by “tax dollars” – but by the Federal Reserve Note Payable – the world’s “reserve currency’.



Casting Bread Upon the Waters

No good deed ever goes unpunished.   I also just love the name of the company that produced this little 3 minute spot —

True Move.

GREAT NAME!  Enjoy this wonderful three minute sermon!

NSA + DARPA + “Progressives” = DEEP FECES for Honest Americans!


ALERT!  Tomorrow, the 12th Anniversary of 9-11, my associates and I had long planned on conducting another massive protest of NSA, including a candlelight vigil, on the steps of the Utah State Capital.   There we had made plans to present a formal Petition for Redress of Grievances exactly as our Constitution allows: FORMAL PETITION FOR REDRESS OF GRIEVANCES

Sadly, the protest and the grass-roots coalition that formed it, has been successfully sabotaged and so, there will be no event.   The enemy, so very skilled at dividing and conquering all opposition to their agenda via forked-tongue bribery, ego-stroking, and personal character assassinations, scored yet another victory.

For the record, I have been personally maligned and my character attacked in a most vicious and hate-filled manner.  Again, the double-minded “Progressives” are very skilled at brainwashing not only the masses, but also key individuals – making them believe a lie.   These ravening wolves march in the streets and hold rallies for the misaligned and downtrodden LGBT segment of society, as well as promote the RIGHTS of “Illegal Aliens” – but have absolutely ZERO tolerance for anybody who dares to 100% believe in, and promote the Holy Bible, who actively subscribes to physical and emotional HEALTH THROUGH NUTRITION instead of chemical drugs and toxic vaccines, and who in the process openly and willingly chose to reject the brainwashing of ACCREDITED post-graduate, B’nai B’Rith-authored post-graduate curriculum and who instead thinks outside the proverbial box.  Only one word comes to mind for such warped creatures, and that word is:  HYPOCRISY!  Unfortunately, they have loads of Federal Reserve Bank Notes to spend, and also enjoy lots of “credibility” with the Mainstream Media!

Even the majority of my fellow “conservatives” roll their eyes and mock me when I try to warn them of the level of technological sophistication now being deployed against “We The People” by these godless minions directing the NSA.    They don’t want to hear about Yottabytes and Quantum Computing capabilities.  They don’t want to hear about nano-bot microchips that are so miniscule that they can pass through the hypodermic syringe “snout” of a micro-drone mosquito fleet that is set to be deployed against the “People” in the very near future, (if they haven’t already”).  They don’t want to hear of the new lab-virus horrors that can be injected by the hypodermic “bite” of their computer-controlled and interfaced “bugs”.    Yet, they do indeed exist compliments of DARPA!   The picture below is NOT make-believe!!


When Irish Eyes are Smiling

Don’t mess with the Irish – the PURE BLOOD of Israel – Mr. Obama!! (They are the TRUE ISRAELITES, not the phony KHAZARS whose backsides you have been kissing since 2008).

Listen to the auburn-haired, blue-eyed Ms. Clare Daly, in her righteous indignation take a pound of flesh from the “Hypocrite of the Century” Obama and his snooty wife Michelle during a session of the Irish Parliament.  Look at the sick look on the face of David Cameron as he realizes he just got a dose of good old TRUTH!

Man, what I wouldn’t pay to see her and Nancy Pee-loosely square off in a debate!

That would make millions on Pay-Per-View, I would guess!  THIS VIDEO SHOULD GO VIRAL!!!! Ms. Daly is right on point!

Email her at:  and tell her you are proud of her!!








Imagine for a minute that you have critical “insider” information that would allow you to absolutely corner a vital world stock market.  You make your move, and as a result you amass incredible wealth and power.   Over the next century, your sons, cousins, and “elite” bloodline allies continue manipulation of worldly principalities and powers.  Your posterity fulfills your dream of world conquest, and now your “House” controls the lion’s share of gold and other mineral “real wealth” on  planet earth.   Your posterity, your “House”, follows your economic blueprint to the letter, and employs your family’s accumulated vast wealth to strategically bribe key government officials – and in 1913, your agents successfully establish a private central bank to control the distribution of “currency” in the wealthiest country (as far as natural resources) in the world – the United States of America.   Now you have a stranglehold on the PEOPLE – for you have established a very devious and subtle means of plundering their wealth by printing paper “notes payable” out of thin air, and saddling the PEOPLE with usury (interest) on what is in reality, little more than a standardized measure of value that is used to expedite and facilitate trade and commerce; a medium of exchange that the control and issuance of should be the primary task of honest government – free of debt and without accumulating interest.    You then collect your ill-gotten gains, your “usury” (aka Plunder) by means of a direct tax on the people’s  INCOME.  Of course, America’s wise founding fathers knew this little trick of the powerful “House”, (they knew how it had been used to control the government of Great Britain) and so they made it one of the very cornerstone tenets of their governing constitution.   Thomas Jefferson, for one, feared such plundering parasites more than he feared “standing armies”.   (As did Abraham Lincoln, and as did John Kennedy.)

Of course – what I described in this first paragraph is not “imagination”.  It is not “speculation” – it is not “conspiracy theory”.  No, it is simply historical fact.  The “House” is the “House of Rothschild”, and the central bank is the corrupt “Federal Reserve”.   The private, for-profit corporation that collects the plundered booty from the PEOPLE is called the “Internal Revenue Service”.

So, what does all of this slick chicanery have to do with the U.S. Department of Education, and the process of “accreditation” of America’s Universities and Colleges?   The answer should be self-evident, even to the most brain dead of Americans.   The philosopher Goethe said it best: “No man is more hopelessly enslaved, than he who falsely believes that he is free.”   You see, the “elites” can only maintain their economic control and mastery over the masses of humanity they are systemically plundering if the “goyim” herd is kept largely ignorant and clueless as to how they are enslaved.    The victims MUST not be allowed to come to a full realization of how they have been manipulated and thus robbed blind!  Thus it becomes critically important to the elite’s agenda of control, to establish a monopoly to direct and standardize the slaves’ EDUCATION as a safeguard of and to continue their gigantic central bank money trust.   The bottom line is, its all about money and power – aka, the Demon the Holy Bible calls MAMMON!   Indeed, the love of Mammon is the root of all evil!

The truth is that the Federal Reserve’s elite families have been operating a massive “confidence” game since the year 1913.   Like any fraud, its level of success is completely dependent on the targeted “marks” remaining ignorant of exactly what the components of the con are, and how it operates to rob them.  The worst fear of the professional charlatan is having their victim fully aware and informed!

Take a look at the historical timeline of the past 100 years, and you can see exactly the steps taken that has led to the modern state of events in America today – and how “accreditation” of higher education is so very critical to maintaining such a massive con!

Step 1: The Money Trust called the “Federal Reserve” and their sister private corporation, the “Internal Revenue Service”  are formed in 1913 for two primary reasons: to issue “debt money” to the American public, and then to collect the plunder (aka interest) on the totally scandalous and unnecessary “private bank notes” loaned to the government.

Step 2: The House of Rothschild eliminates  many of their regional and historical competitors by fomenting the “Great War” (aka World War I).   Rothschild stooge and lackey Woodrow Wilson follows his orders to the letter, and he institutes the “draft” and conscripts millions to put on a uniform, pick up a gun, and  fight the banker’s war for profit on French soil thousands of miles away.

Step 3:  Great War veterans realize in 1924 that they were substantially shorted in their promised military pay.   Instead of hard currency, they are given ‘soft’ Federal Reserve “promissory notes” that will only  be able to be cashed in 21 years later (1945), or at the veteran’s death if that happened first,   Five years later, the Federal Reserve abruptly manipulates and freezes credit lines and brokerage firms’ margin accounts.  As a direct result the U.S. stock market crashes, and non-Federal Reserve “member banks” are forced out of business en masse.   In the depths of the “Great Depression” – WW I veterans march peacefully, but vocally, on Washington D.C. in the year 1933.  Called the “Bonus Army” their tent city is eventually attacked and burned, and the veterans are gassed and eventually disbursed with toxic chemical weapons;  the government forces attacking their fellow American ex-servicemen are led by Douglas MacArthur, George Patton, and Dwight Eisenhower.   While this top story is dominating media stories, the Federal Government formally declares bankruptcy in the same year, and is completely restructured by Rothschild agents into a for-profit corporate entity governed by a Uniform Commercial Code (UCC) rather than a republic governed by a constitution as originally established.

Step 4:  Largely due to “Great War” reparation payments forced on Germany – Adolf Hitler rises to power and stimulates the economy by utilizing Rothschild capital from Wall Street bankers to build and update existing factories that in turn churn out a massive Luftwaffe air force, U-Boat-rich navy, and modern, well-equipped army that nearly conquers all of Europe in a massive “blitzkrieg” of “shock and awe”.    Generals MacArthur, Patton, and Eisenhower are touted in the controlled media, and become national heroes.   Of course, nothing consolidates power and generates massive profits quicker for the banking elite than a world war, and following the Korean Conflict, the Rothschild-dominated Federal Reserve has total and complete monopoly power in the United States.  The Federal Reserve NOTE PAYABLE becomes the “World’s Reserve Currency” following the elites’ conference at Bretton Woods in the year 1945 – exactly the same year in which the “Bonus Army” bonds were scheduled to turn “hard”.

Step 5:  With the consolidation of their Notes Payable becoming debt instruments WORLDWIDE – the goal of the elite following WWII and Korea is to spread their interest-bearing notes far and wide through vast government as well as personal deficit-spending.     President Eisenhower enacts the “GI Bill” – and suddenly billions of Federal Reserve “notes” are systemically channeled to “worthy” Colleges and Universities.  In his final television address to the American public in 1961, Eisenhower issues a solemn warning against the “military-industrial complex” and their far-reaching agenda concerning the consolidation of  power and influence expanding primarily to university campuses.

Just as the House of Rothschild usurped control of America’s money system, they likewise took control of America’s core educational institutions via what is known as “accreditation”.  The Rothschild agents established private, for-profit, regional “accreditation” boards.   Without “accreditation” – no college or university would be declared eligible to receive their share of the massive “GI Bill” largesse of Federal Reserve, interest-bearing notes payable from the corporate entity known as the U.S. government.   Of course, to receive the coveted “accreditation” status, each college or university had to strictly agree to subscribe to the required, uniform  DICTATES of the Rothschild agents as to what “core” subjects would be allowed to be taught and how they were to be taught.   Any rebellious deviation from this dictated “core curriculum” resulted in accreditation “probation” – and if not immediately rectified, all federal “grants” and funding would be suspended and the institution would quickly be demonized and black-balled in the controlled media.  This would be a death sentence for most institutions, and so they made sure they stayed “compliant”.     “Accredited” status means that the institution was contractually obligated to not teach “false and incorrect” ideas such as the divine creation of the world as found in the Holy Bible – while “Darwinism” and “evolution” became the only “correct” truths that “accredited” institutions could teach and promote.    Blind loyalties to their respective “Alma Mater” (meaning “fostering mother”) were ingrained and fostered in the minds and psyche of the students.  Very few dared to question what was taught in the sacred, ivy-covered walls of the most elite, the “Ivy League” schools.  “If the University is fully accredited — then everything they teach is 100% true and correct” quickly became the mantra engrained into the minds of the American public during this era.   Conversely, any institution that was NOT accredited by the Rothschild boards became automatically synonymous with deception, fraud, and even criminal malfeasance in the minds of most Americans.   This is especially true where universities with “schools of Medicine” and “Juris Doctor” law degrees were “accredited” for the really big Rothschild money – for this is the “holy grail” of the Rothschild elite.   Conversely, any institution attempting to teach “alternative” modalities and healing via nutrition could never hope to receive “accreditation” and federal funding, and were often the primary targets of the governing “boards” to destroy.

A classic example of this is the study of Chiropractics.  Early Chiropractic colleges such as Palmer College in Iowa were continually mocked and demonized by the “accreditation establishment” as being bogus and fraudulent solely because of their “unaccredited”  status.   Chiropractic graduates with diplomas hanging on their office walls (which were duly earned of course) were mocked and declared to be imposters fraudulently pretending to be “doctors” –  and the gullible public largely bought into these lies for a couple of decades.

The fact is that many “unaccredited” post-graduate institutions (that do in fact legitimately provide viable courses composed of “alternative”, often overlooked and buried TRUTHS and are not mere “diploma mills”) are in reality more honest and legitimate than their Rothschild-cartel-controlled competition because they fully understand exactly how “the game” is played; they make a conscious decision to retain their intellectual, spiritual, and moral integrity and not partake of the corrupt Mammon that comes with subjective, liberal-agenda-promoting “accreditation”.


Snowden Files Round Two

What about the Encryption Keys to the World’s Nuclear Launch Codes? Can they be cracked too?? — Ott


Snowden Files: NSA Holds Keys to Most Web Encryption


By James Ball, Julian Borger and Glenn Greenwald, Guardian UK


6 September 13




S and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden.


The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.


The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – “the use of ubiquitous encryption across the internet”.


Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with “brute force”, and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves.


Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software.


The files, from both the NSA and GCHQ, were obtained by the Guardian, and the details are being published today in partnership with the New York Times and ProPublica. They reveal:


  • A 10-year NSA program against encryption technologies made a breakthrough in 2010 which made “vast amounts” of data collected through internet cable taps newly “exploitable”.
  • The NSA spends $250m a year on a program which, among other goals, works with technology companies to “covertly influence” their product designs.
  • The secrecy of their capabilities against encryption is closely guarded, with analysts warned: “Do not ask about or speculate on sources or methods.”
  • The NSA describes strong decryption programs as the “price of admission for the US to maintain unrestricted access to and use of cyberspace”.
  • A GCHQ team has been working to develop ways into encrypted traffic on the “big four” service providers, named as Hotmail, Google, Yahoo and Facebook.

The agencies insist that the ability to defeat encryption is vital to their core missions of counter-terrorism and foreign intelligence gathering.


But security experts accused them of attacking the internet itself and the privacy of all users. “Cryptography forms the basis for trust online,” said Bruce Schneier, an encryption specialist and fellow at Harvard’s Berkman Center for Internet and Society. “By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the internet.” Classified briefings between the agencies celebrate their success at “defeating network security and privacy”.


“For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used internet encryption technologies,” stated a 2010 GCHQ document. “Vast amounts of encrypted internet data which have up till now been discarded are now exploitable.”


An internal agency memo noted that among British analysts shown a presentation on the NSA’s progress: “Those not already briefed were gobsmacked!”


The breakthrough, which was not described in detail in the documents, meant the intelligence agencies were able to monitor “large amounts” of data flowing through the world’s fibre-optic cables and break its encryption, despite assurances from internet company executives that this data was beyond the reach of government.


The key component of the NSA’s battle against encryption, its collaboration with technology companies, is detailed in the US intelligence community’s top-secret 2013 budget request under the heading “Sigint [signals intelligence] enabling”.

Funding for the program – $254.9m for this year – dwarfs that of the Prism program, which operates at a cost of $20m a year, according to previous NSA documents. Since 2011, the total spending on Sigint enabling has topped $800m. The program “actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products’ designs”, the document states. None of the companies involved in such partnerships are named; these details are guarded by still higher levels of classification.


Among other things, the program is designed to “insert vulnerabilities into commercial encryption systems”. These would be known to the NSA, but to no one else, including ordinary customers, who are tellingly referred to in the document as “adversaries”.


“These design changes make the systems in question exploitable through Sigint collection … with foreknowledge of the modification. To the consumer and other adversaries, however, the systems’ security remains intact.”


The document sets out in clear terms the program’s broad aims, including making commercial encryption software “more tractable” to NSA attacks by “shaping” the worldwide marketplace and continuing efforts to break into the encryption used by the next generation of 4G phones.


Among the specific accomplishments for 2013, the NSA expects the program to obtain access to “data flowing through a hub for a major communications provider” and to a “major internet peer-to-peer voice and text communications system”.


Technology companies maintain that they work with the intelligence agencies only when legally compelled to do so. The Guardian has previously reported that Microsoft co-operated with the NSA to circumvent encryption on the email and chat services. The company insisted that it was obliged to comply with “existing or future lawful demands” when designing its products.


The documents show that the agency has already achieved another of the goals laid out in the budget request: to influence the international standards upon which encryption systems rely.


Independent security experts have long suspected that the NSA has been introducing weaknesses into security standards, a fact confirmed for the first time by another secret document. It shows the agency worked covertly to get its own version of a draft security standard issued by the US National Institute of Standards and Technology approved for worldwide use in 2006.


“Eventually, NSA became the sole editor,” the document states.


The NSA’s codeword for its decryption program, Bullrun, is taken from a major battle of the American civil war. Its British counterpart, Edgehill, is named after the first major engagement of the English civil war, more than 200 years earlier.


A classification guide for NSA employees and contractors on Bullrun outlines in broad terms its goals.


“Project Bullrun deals with NSA’s abilities to defeat the encryption used in specific network communication technologies. Bullrun involves multiple sources, all of which are extremely sensitive.” The document reveals that the agency has capabilities against widely used online protocols, such as HTTPS, voice-over-IP and Secure Sockets Layer (SSL), used to protect online shopping and banking.


The document also shows that the NSA’s Commercial Solutions Center, ostensibly the body through which technology companies can have their security products assessed and presented to prospective government buyers, has another, more clandestine role.


It is used by the NSA to “to leverage sensitive, co-operative relationships with specific industry partners” to insert vulnerabilities into security products. Operatives were warned that this information must be kept top secret “at a minimum”.


A more general NSA classification guide reveals more detail on the agency’s deep partnerships with industry, and its ability to modify products. It cautions analysts that two facts must remain top secret: that NSA makes modifications to commercial encryption software and devices “to make them exploitable”, and that NSA “obtains cryptographic details of commercial cryptographic information security systems through industry relationships”.


The agencies have not yet cracked all encryption technologies, however, the documents suggest. Snowden appeared to confirm this during a live Q&A with Guardian readers in June. “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on,” he said before warning that NSA can frequently find ways around it as a result of weak security on the computers at either end of the communication.


The documents are scattered with warnings over the importance of maintaining absolute secrecy around decryption capabilities.

Strict guidelines were laid down at the GCHQ complex in Cheltenham, Gloucestershire, on how to discuss projects relating to decryption. Analysts were instructed: “Do not ask about or speculate on sources or methods underpinning Bullrun.” This informaton was so closely guarded, according to one document, that even those with access to aspects of the program were warned: “There will be no ‘need to know’.”


The agencies were supposed to be “selective in which contractors are given exposure to this information”, but it was ultimately seen by Snowden, one of 850,000 people in the US with top-secret clearance.A 2009 GCHQ document spells out the significant potential consequences of any leaks, including “damage to industry relationships”.


“Loss of confidence in our ability to adhere to confidentiality agreements would lead to loss of access to proprietary information that can save time when developing new capability,” intelligence workers were told. Somewhat less important to GCHQ was the public’s trust which was marked as a moderate risk, the document stated.


“Some exploitable products are used by the general public; some exploitable weaknesses are well known eg possibility of recovering poorly chosen passwords,” it said. “Knowledge that GCHQ exploits these products and the scale of our capability would raise public awareness generating unwelcome publicity for us and our political masters.”


The decryption effort is particularly important to GCHQ. Its strategic advantage from its Tempora program – direct taps on transatlantic fibre-optic cables of major telecommunications corporations – was in danger of eroding as more and more big internet companies encrypted their traffic, responding to customer demands for guaranteed privacy.


Without attention, the 2010 GCHQ document warned, the UK’s “Sigint utility will degrade as information flows changes, new applications are developed (and deployed) at pace and widespread encryption becomes more commonplace.” Documents show that Edgehill’s initial aim was to decode the encrypted traffic certified by three major (unnamed) internet companies and 30 types of Virtual Private Network (VPN) – used by businesses to provide secure remote access to their systems. By 2015, GCHQ hoped to have cracked the codes used by 15 major internet companies, and 300 VPNs.


Another program, codenamed Cheesy Name, was aimed at singling out encryption keys, known as ‘certificates’, that might be vulnerable to being cracked by GCHQ supercomputers.


Analysts on the Edgehill project were working on ways into the networks of major webmail providers as part of the decryption project. A quarterly update from 2012 notes the project’s team “continue to work on understanding” the big four communication providers, named in the document as Hotmail, Google, Yahoo and Facebook, adding “work has predominantly been focused this quarter on Google due to new access opportunities being developed”.


To help secure an insider advantage, GCHQ also established a Humint Operations Team (HOT). Humint, short for “human intelligence” refers to information gleaned directly from sources or undercover agents.


This GCHQ team was, according to an internal document, “responsible for identifying, recruiting and running covert agents in the global telecommunications industry.”


“This enables GCHQ to tackle some of its most challenging targets,” the report said. The efforts made by the NSA and GCHQ against encryption technologies may have negative consequences for all internet users, experts warn.


“Backdoors are fundamentally in conflict with good security,” said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. “Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise.” This is because the insertion of backdoors in a software product, particularly those that can be used to obtain unencrypted user communications or data, significantly increases the difficulty of designing a secure product.”


This was a view echoed in a recent paper by Stephanie Pell, a former prosecutor at the US Department of Justice and non-resident fellow at the Center for Internet and Security at Stanford Law School.


“[An] encrypted communications system with a lawful interception back door is far more likely to result in the catastrophic loss of communications confidentiality than a system that never has access to the unencrypted communications of its users,” she states.


Intelligence officials asked the Guardian, New York Times and ProPublica not to publish this article, saying that it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read.


The three organisations removed some specific facts but decided to publish the story because of the value of a public debate about government actions that weaken the most powerful tools for protecting the privacy of internet users in the US and worldwide.