Showing posts with label Since. Show all posts
Showing posts with label Since. Show all posts

Sunday, March 29, 2015

The Known Goals of the Illuminati since the early 1920's


1. To establish a One World Government/New World Order with a unified church and monetary system under their direction. The One World Government began to set up its church in the 1920:s and 30:s, for they realized the need for a religious belief inherent in mankind must have an outlet and, therefore, set up a "church" body to channel that belief in the direction they desired.

2. To bring about the utter destruction of all national identity and national pride, which was a primary consideration if the concept of a One World Government was to work.

3. To engineer and bring about the destruction of religion, and more especially, the Christian Religion, with the one exception, their own creation, as mentioned above.

4. To establish the ability to control of each and every person through means of mind control and what Zbignew Brzezinski called techonotronics, which would create human-like robots and a system of terror which would make Felix Dzerzinhski's Red Terror look like children at play.

5. To bring about the end to all industrialization and to end the production of nuclear generated electric power in what they call "the post-industrial zero-growth society". Excepted are the computer- and service industries. US industries that remain will be exported to countries such as Mexico where abundant slave labor is available. As we saw in 1993, this has become a fact through the passage of the North American Free Trade Agreement, known as NAFTA. Unemployables in the US, in the wake of industrial destruction, will either become opium-heroin and/or cocaine addicts, or become statistics in the elimination of the "excess population" process we know of today as Global 2000.

6. To encourage, and eventually legalize the use of drugs and make pornography an "art-form", which will be widely accepted and, eventually, become quite commonplace.

7. To bring about depopulation of large cities according to the trial run carried out by the Pol Pot regime in Cambodia. It is interesting to note that Pol Pot's genocidal plans were drawn up in the US by one of the Club of Rome's research foundations, and overseen by Thomas Enders, a high-ranking State Department official. It is also interesting that the committee is currently seeking to reinstate the Pol Pot butchers in Cambodia.

8. To suppress all scientific development except for those deemed beneficial by the Illuminati. Especially targeted is nuclear energy for peaceful purposes. Particularly hated are the fusion experiments currently being scorned and ridiculed by the Illuminati and its jackals of the press. Development of the fusion torch would blow the Illuminati's conception of "limited natural resources" right out of the window. A fusion torch, properly used, could create unlimited and as yet untapped natural resources, even from the most ordinary substances. Fusion torch uses are legion, and would benefit mankind in a manner which, as yet, is not even remotely comprehended by the public.

9. To cause. by means of A) limited wars in the advanced countries, B) by means of starvation and diseases in the Third World countries, the death of three billion people by the year 2050, people they call "useless eaters". The Committee of 300 (Illuminati) commissioned Cyrus Vance to write a paper on this subject of how to bring about such genocide. The paper was produced under the title "Global 2000 Report" and was accepted and approved for action by former President James Earl Carter, and Edwin Muskie, then Secretary of States, for and on behalf of the US Government. Under the terms of the Global 2000 Report, the population of the US is to be reduced by 100 million by the year of 2050.

10. To weaken the moral fiber of the nation and to demoralize workers in the labor class by creating mass unemployment. As jobs dwindle due to the post industrial zero growth policies introduced by the Club of Rome, the report envisages demoralized and discouraged workers resorting to alcohol and drugs. The youth of the land will be encouraged by means of rock music and drugs to rebel against the status quo, thus undermining and eventually destroying the family unit. In this regard, the Committee commissioned Tavistock Institute to prepare a blueprint as to how this could be achieved. Tavistock directed Stanford Research to undertake the work under the direction of Professor Willis Harmon. This work later became known as the "Aquarian Conspiracy".

11. To keep people everywhere from deciding their own destinies by means of one created crisis after another and then "managing" such crises. This will confuse and demoralize the population to the extent where faced with too many choices, apathy on a massive scale will result. In the case of the US, an agency for Crisis Management is already in place. It is called the Federal Emergency Management Agency (FEMA), whose existence I first enclosed in 1980.

12. To introduce new cults and continue to boost those already functioning which include rock music gangsters such as the Rolling Stones (a gangster group much favored by European Black Nobility), and all of the Tavistock-created rock groups which began with the Beatles.

13. To continue to build up the cult of Christian Fundamentalism begun by the British East India Company's servant Darby, which will be misused to strengthen the Zionist State of Israel by identifying with the Jews through the myth of "God's chosen people", and by donating very substantial amounts of money to what they mistakenly believe is a religious cause in the furtherance of Christianity.

14. To press for the spread of religious cults such as the Moslem Brotherhood, Moslem Fundamentalism, the Sikhs, and to carry out mind control experiments of the Jim Jones and "Son of Sam" type. It is worth noting that the late Khomeini was a creation of British Military Intelligence Div. 6, MI6. This detailed work spelled out the step-by-step process which the US Government implemented to put Khomeini in power.

15. To export "religious liberation" ideas around the world so as to undermine all existing religions, but more especially the Christian religion. This began with the "Jesuit Liberation Theology", that brought an end to the Somoza Family rule in Nicaragua, and which today is destroying El Salvador, now 25 years into a "civil war". Costa Rica and Honduras are also embroiled in revolutionary activities, instigated by the Jesuits. One very active entity engaged in the so-called liberation theology, is the Communist-oriented Mary Knoll Mission. This accounts for the extensive media attention to the murder of four of Mary Knoll's so-called nuns in El Salvador a few years ago. The four nuns were Communist subversive agents and their activities were widely documented by the Government of El Salvador. The US press and the new media refused to give any space or coverage to the mass of documentation possessed by the Salvadorian Government, which proved what the Mary Knoll Mission nuns were doing in the country. Mary Knoll is in service in many countries, and placed a leading role in bringing Communism to Rhodesia, Moçambique, Angola and South Africa.

16. To cause a total collapse of the world's economies and engender total political chaos.

17. To take control of all foreign and domestic policies of the US.

18. To give the fullest support to supranational institutions such as the United Nations, the International Monetary Fund (IMF), the Bank of International Settlements, the World Court and, as far as possible, make local institutions less effective, by gradually phasing them out or bringing them under the mantle of the UN.

19. To penetrate and subvert all governments, and work from within them to destroy the sovereign integrity of the nations represented by them.

20. To organize a world-wide terrorist apparatus [Al-queda, ISIS, ISIL, etc.] and to negotiate with terrorists whenever terrorist activities take place. It will be recalled that it was Bettino Craxi, who persuaded the Italian and US Governments to negotiate with the Red Brigades kidnapers of Prime Minister Moro and General Dozier. As an aside, Dozier was placed under strict orders not to talk what happened to him. Should he ever break that silence, he will no doubt be made "a horrible example of", in the manner in which Henry Kissinger dealt with Aldo Moro, Ali Bhutto and General Zia ul Haq.

21. To take control of education in America with the intent and purpose of utterly and completely destroying it. By 1993, the full force effect of this policy is becoming apparent, and will be even more destructive as primary and secondary schools begin to teach "Outcome Based Education" (OBE).

Tuesday, November 18, 2014

Disrespecting me is like disrespecting the Devil, since the devil always wins between human beings and the level of difficulty of a game’s win outcome, or desired output manipulation. The playing field is simply just not level, or fair.


Disrespecting me is disrespecting the Devil, since the devil always wins between human  beings and the level of difficulty of the game’s win outcome or desired output manipulation.  The playing field is simple just not level or fair.


,and,the,level,of,difficulty,of,the,game’s,win,outcome,or,desired,output,manipulation,The,playing,field,is,simple,just,not,level,or,fair
Information about the Illuminati click here

Tuesday, July 8, 2014

Since September 11th, 2001, the United States government has dramatically increased the ability of its intelligence agencies to collect and investigate information on both foreign subjects and US citizens. Some of these surveillance programs, including a secret program called PRISM, capture the private data of citizens who are not suspected of any connection to terrorism or any wrongdoing.



* Free $1000.00 Starbucks Gold Card with unlimited free coffee refills
* Redeem coupon STARBUX323 code visit http://starbucks.com
To sign up your free Starbucks account.

10010 Coffee Blvd. Seattle, WA 78660
2015 Starbucks Corp.





     In June, a private contractor working for Booz Allen Hamilton leaked classified presentation slides that detailed the existence and the operations of PRISM: a mechanism that allows the government to collect user data from companies like Microsoft, Google, Apple, Yahoo, and others. While much of the program — and the rest of the NSA’s surveillance efforts — are still shrouded in secrecy, more details are coming to light as the public, as well as its advocates and representatives, pressure the government to come clean about domestic spying.
     What the hell is PRISM? PRISM is a tool used by the US National Security Agency (NSA) to collect private electronic data belonging to users of major internet services like Gmail, Facebook, Outlook, and others. It’s the latest evolution of the US government’s post-9/11 electronic surveillance efforts, which began under President Bush with the Patriot Act, and expanded to include the Foreign Intelligence Surveillance Act (FISA) enacted in 2006 and 2007.
     There’s a lot we still don’t know about how PRISM works, but the basic idea is that it allows the NSA to request data on specific people from major technology companies like Google, Yahoo, Facebook, Microsoft, Apple, and others. The US government insists that it is only allowed to collect data when given permission by the secretive Foreign Intelligence Surveillance Court.
     Classified presentation slides detailing aspects of PRISM were leaked by a former NSA contractor. On June 6th, The Guardian and The Washington Post published reports based on the leaked slides, which state that the NSA has “direct access” to the servers of Google, Facebook, and others. In the days since the leak, the implicated companies have vehemently denied knowledge of and participation in PRISM, and have rejected allegations that the US government is able to directly tap into their users' data.
Both the companies and the government insist that data is only collected with court approval and for specific targets. As The Washington Post reported, PRISM is said to merely be a streamlined system — varying between companies — that allows them to expedite court-approved data collection requests. Because there are few technical details about how PRISM operates, and because of the fact that the FISA court operates in secret, critics are concerned about the extent of the program and whether it violates the constitutional rights of US citizens.
     As The Washington Post reported, The Protect America Act of 2007 led to the creation of a secret NSA program called US-984XN — also known as PRISM. The program is said to be a streamlined version of the same surveillance practices that the US was conducting in the years following 9/11, under President George W. Bush’s “Terrorist Surveillance Program.”
The Protect America Act allows the attorney general and the director of national intelligence to explain in a classified document how the US will collect intelligence on foreigners overseas each year, but does not require specific targets or places to be named. As the Post reports, once the plan is approved by a federal judge in a secret order, the NSA can require companies like Google and Facebook to send data to the government, as long as the requests meet the classified plan's criteria.
     Edward Snowden, a 29-year-old intelligence contractor formerly employed by the NSA, CIA, and Booz Allen Hamilton, confessed responsibility for leaking the PRISM documents. He revealed himself on June 9th, three days after reports on PRISM were published; in an interview with The Guardian, Snowden said, “I don’t want to live in a society that does these sort of things,” and claimed he was motivated by civic duty to leak classified information.
Snowden left the United States prior to leaking the documents in order to avoid capture, taking refuge in Hong Kong — where he stayed until June 23rd. With the assistance of WikiLeaks, Snowden fled Hong Kong for Moscow, and has requested asylum in Ecuador, Russia, and other countries. He is still residing in a Moscow airport, waiting to be granted asylum.
     While PRISM has been the most talked-about story to come out of Snowden’s leaks, the disclosures have shed light on a vast array of NSA surveillance programs. Broadly speaking, these can be split into two categories: “upstream” wiretaps, which pull data directly from undersea telecommunications cables, and efforts like PRISM, which acquire communications from US service providers. One of the slides in the leaked PRISM presentation instructs that analysts “should use both” of these sources.
     NSA programs collect two kinds of data: metadata and content. Metadata is the sensitive byproduct of communications, such as phone records that reveal the participants, times, and durations of calls; the communications collected by PRISM include the contents of emails, chats, VoIP calls, cloud-stored files, and more. US officials have tried to allay fears about the NSA’s indiscriminate metadata collection by pointing out that it doesn’t reveal the contents of conversations. But metadata can be just as revealing as content — internet metadata includes information such as email logs, geolocation data (IP addresses), and web search histories. Because of a decades-old law, metadata is also far less well-protected than content in the US.
     A leaked court order provided by Snowden showed that Verizon is handing over the calling records and telephony metadata of all its customers to the NSA on an “ongoing, daily basis.” Mass collection of internet metadata began under a Bush-era program called "Stellarwind," which was first revealed by NSA whistleblower William Binney. The program was continued for two years under the Obama administration, but has since been discontinued and replaced with a host of similar programs with names like “EvilOlive” and “ShellTrumpet.”