Jimmy Carter: The U.S. Is an “Oligarchy With Unlimited Political Bribery”

According to the former president, Americans are now experiencing “a complete subversion of our political system as a payoff to major contributors.”

Former president Jimmy Carter said Tuesday on the nationally syndicated radio show the Thom Hartmann Program that the United States is now an “oligarchy” in which “unlimited political bribery” has created “a complete subversion of our political system as a payoff to major contributors.” Both Democrats and Republicans, Carter said, “look upon this unlimited money as a great benefit to themselves.”

Carter was responding to a question from Hartmann about recent Supreme Court decisions on campaign financing like Citizens United.

Transcript:

HARTMANN: Our Supreme Court has now said, “unlimited money in politics.” It seems like a violation of principles of democracy. … Your thoughts on that?

CARTER: It violates the essence of what made America a great country in its political system. Now it’s just an oligarchy, with unlimited political bribery being the essence of getting the nominations for president or to elect the president. And the same thing applies to governors and U.S. senators and congress members. So now we’ve just seen a complete subversion of our political system as a payoff to major contributors, who want and expect and sometimes get favors for themselves after the election’s over. … The incumbents, Democrats and Republicans, look upon this unlimited money as a great benefit to themselves. Somebody’s who’s already in Congress has a lot more to sell to an avid contributor than somebody who’s just a challenger.

 

 

  
Source: Jimmy Carter: The U.S. Is an “Oligarchy With Unlimited Political Bribery”

No Longer a Conspiracy Theory, First State Legalizes Weaponized Drones for Cops

North Dakota — Nothing says “police state” quite like unmanned aerial vehicles patrolling the sky ready to deploy 80,000 volts to the nearest protester or dose entire crowds with chemical weapons.

The idea of weaponized drones has long been a dystopian, yet fictional idea. However, thanks to House Bill 1328, in North Dakota, this police state hell from above is now a horrid reality.

Thanks to a police union lobbyist, the idea of police using drones for “less than lethal” weapons is now written into North Dakota law.

According to the Daily Beast,

The bill’s stated intent was to require police to obtain a search warrant from a judge in order to use a drone to search for criminal evidence. In fact, the original draft of Rep. Rick Becker’s bill would have banned all weapons on police drones.

Then Bruce Burkett of North Dakota Peace Officer’s Association was allowed by the state house committee to amend HB 1328 and limit the prohibition only to lethal weapons. “Less than lethal” weapons like rubber bullets, pepper spray, tear gas, sound cannons, and Tasers are therefore permitted on police drones.

The term “less than lethal” is thrown around to make tasers, which have been responsible for hundreds of deaths since 2001, seem like they are okay to be deployed on infants.

The reality is that “less than lethal” weapons are only slightly less lethal than the real thing. Now that these weapons will be put on drones, entire new safety concerns arise, such as accuracy and the simple issue of a drone falling into a crowd.

After being duped by the police lobby into passing a bill allowing cops to equip drones with weapons, Rep Becker is worried. He spoke up about police deploying these weapons when they aren’t near the intended target.

“When you’re not on the ground, and you’re making decisions, you’re sort of separate,” Becker said. “Depersonalized.”

One need only look at the Middle East and the thousands of innocent women and children who’ve been slaughtered by US drones to imagine the grim reality of such legislation.

Law enforcement and their union lobbyists are assuring lawmakers that drones would only be used in non-criminal situations, like a missing person case or for photographing crime scenes. This begs the question of why they would need such ominous legislation if they say they’ll never use it?

According to Keith Lund of the Grand Forks Regional Economic Development Corporation, laws like this one are to combat restrictions in drone development to create jobs.

North Dakota has been hit hard by the oil bust, and more drones equal more jobs.

“It’s really all about the commercial development, which is where all of this is heading,” Lund replied. “If [a law] is somehow limiting commercial, law enforcement development… that is a negative in terms of companies looking and investing in opportunities in the state of North Dakota,” Lund said, according to the Daily Beast.

It’s not only weapons attached to drones that are raising issues in the state either. Police and their lobbyists are putting up a big fight to allow the use of drones for spying without a warrant.

“Requiring a search warrant for surveillance is ‘restricting development?’” asked Rep. Gary Paur, a Republican, at a hearing.

It seems that corporate and state collusion, at the expense of the people’s liberties, doesn’t even have to happen behind closed doors anymore.

 Get ready, because if we know anything about the military-industrial complex, it’s that it spreads like a virus. It is only a matter of time before other slimeball politicians sell out civil liberties to prop up “Big Drone.”

Source: No Longer a Conspiracy Theory, First State Legalizes Weaponized Drones for Cops

WikiLeaks – Hillary Clinton Email Archive

On March 16, 2016 WikiLeaks launched a searchable archive for over 30 thousand emails & email attachments sent to and from Hillary Clinton’s private email server while she was Secretary of State. The 50,547 pages of documents span from 30 June 2010 to 12 August 2014. 7,570 of the documents were sent by Hillary Clinton. The emails were made available in the form of thousands of PDFs by the US State Department as a result of a Freedom of Information Act request. The final PDFs were made available on February 29, 2016.

Source: WikiLeaks – Hillary Clinton Email Archive

Julian’s “Dead Man Switch” from Oct/16

A folder within the Wikileaks server is opened at the address https://file.wikileaks.org/file/ https://file.wikileaks.org/file/which provides thousands of doc, pdf, wav, jpg and various other files, as well as dozens of subdirectories including Videos, Syria-files, Collateral Murder, Japan Bribery Affair, and many others.

https://file.wikileaks.org/file/ there’s a torrent file and a .tar file in the root dir. it’s huge, all of it takes hours to download 28gigs

Download entire raw dataset for all published Podesta Emails here

United States: Pictures Of Antarctica Found In Wikileaks E-Mails

SOURCE: https://verumetinventa.wordpress.com/2016/10/25/united-states-pictures-of-antarctica-found-in-wikileaks-e-mails/

Many of the pictures are breathtaking, but they aren’t any kind of smoking gun or anything occult. More for nature buffs. I’m not a ship expert, so if anybody can chime in on that three mast deal and what looks like a science vessel toward the end, feel free.

The narrator should have used Google translate. There are two lines in foreign language in the e-mail. The one I translated is this one:

From:johnson_lo@mail2000.com.tw To: Date: 2008-11-29 04:47 Subject: 冰山在快速溶解

It translates to: THE ICEBERG DISSOLVES RAPIDLY

Here is the second line, which did not translate at all:

Subject: ヲB、sヲbァヨウtキサクム

Wikileaks link, Picture page link

 

 

 

The Left-Right Deep State Is One In The Same: “The Goal Is The Enslavement And Complete Control Of All Of Mankind”

In past articles the fact of a long struggle was mentioned and how it ties in with the current first year of the President’s administration.  The struggle is not merely to overcome the executive actions and orders of Obama.  The true battle is to remove the Marxists from bureaucratic fiefs established by Obama for carryover into the current administration and to deflect and negate their attacks and the attacks of others.

The circuit court in San Francisco and the Department of Justice have been waging a seesaw-type of battle over the executive order signed by the President.  The order’s intent is to stem the illegal aliens and foreigners entering the U.S. from Middle Eastern nations either openly hostile to or providing the highest probability (intentionally or indirectly) for terrorists to enter the country.  This makes perfect sense, and because it does, one can easily see that only those hell-bent on weakening the U.S. and fostering infiltration would be against the order: those Marxists of the Left labeled as “Democrats” and calling themselves “Progressives.”

They are not alone: they are aided by the Left-Right, which is even worse.  The Left-Right are those masquerading as Republican Conservatives, when they are Marxist-Leftists and proponents of Global Governance and the New World Order.  They are the Paul Ryans, the Mitch McConnells, and the Newt Gingriches.  They are the pseudo-Republican politico’s in office presently and in the past who have those CFR slots and are working toward their fantasy: The Utopia of Oligarchs.

Even if they do not overtly act on behalf of the Marxists, they have been guilty…numerous times…of enabling the Marxists through the complacency of inactivity.

They do not simply wish to derail the actions of President Trump: it is a much larger concept than that.  They see themselves as “partners” with the Left in the same game: to establish an elitist politico-oligarchic ruling class, broken down into divisions throughout the globe for ethno-cultural manipulation, yet with the same end-state.  That goal is the enslavement and complete control of all of mankind with the elitists ensconced as the ruling moneyed class.  They see themselves as the educated, sensible minority with tender sensibilities and true humanistic views…who must…must…take a stand in the globalist crusade against the barbaric Neanderthals of the proletariat and populist serfs.

This new President has taken more action and more rapidly than even President Reagan did when he took office, and that is saying something.  Even those globalists playing the part of conservatives are knuckling under in lock step, shivering internally: A President is in the White House that can turn these bedbugs out of the mattress and burn them.  This new President quietly and without fanfare made it a point to be there for the SEAL who was killed in Yemen as his casket was brought back home.

That should speak volumes on the caliber of the man who is in the White House.

Everything that he does is attacked by the media and disparaged by the leftists.  Even the removal of Dodd-Frank (let’s remember…that was Christopher Dodd and Barney Frank…two troglodytes…who came up with that one) is sneered at.  The executive order to halt the illegals from potential hotbeds of Middle Eastern terrorism is challenged by states packed with liberals and also by the business and industry oligarchs who would rather the U.S. be vulnerable if they can continue to hire “tax-free” day-laborers for less than minimum wage with impunity.

Senator John McCain (R- AZ) wants to go to war with Russia and he wants to reshape eastern Europe.  McCain and Lindsey Graham were instrumental in the Obama-ordered and sanctioned coup d’état that brought down Ukraine’s government and president and installed a U.S. puppet picked by Victoria Nuland.  McCain hasn’t stopped: he’s just been “on hold” to see where he can take footing when the dust settles from the initial Trump shakeup.

In previous articles, it was mentioned how critical this first 6 months to one year-period in office is for the President, namely because of the midterm elections.  If the public does not see results, they could very well change the complexion and composition of Congress in 2018 and the Republicans could lose control of either one of or both houses of Congress.  The President realizes this, and he is moving swiftly.

The public will also see that he is doing good things, and that it is the Democrats who are attempting to obstruct his efforts.  This will carry the Republicans through in the midterm elections, and thus all legislative efforts by the President will be able to be enacted.  It’s a tough fight and at times it’s uphill, but he started out well, and right…and the Democrats won’t be able to hold him off.


Jeremiah Johnson is the Nom de plume of a retired Green Beret of the United States Army Special Forces (Airborne).  Mr. Johnson is also a Gunsmith, a Certified Master Herbalist, a Montana Master Food Preserver, and a graduate of the U.S. Army’s SERE school (Survival Evasion Resistance Escape).  He lives in a cabin in the mountains of Western Montana with his wife and three cats. You can follow Jeremiah’s regular writings at SHTFplan.com or contact him here.

This article may be republished or excerpted with proper attribution to the author and a link to www.SHTFplan.com.

Also Read:

Trump Can’t Stop It: “The People Who Have Been Orchestrating The Collapse Have Not Halted Their Agendas”

The Surveillance State Did Not Disappear With The Trump Victory: “It Is Still Lurking And Completely Intact”

12 Things President Donald Trump MUST Do For America To Be Great Again

Source: The Left-Right Deep State Is One In The Same: “The Goal Is The Enslavement And Complete Control Of All Of Mankind”

How to Anonymize Everything You Do Online

 

One year after the first revelations of Edward Snowden, cryptography has shifted from an obscure branch of computer science to an almost mainstream notion: It’s possible, user privacy groups and a growing industry of crypto-focused companies tell us, to encrypt everything from emails to IMs to a gif of a motorcycle jumping over a plane.

But it’s also possible to go a step closer toward true privacy online. Mere encryption hides the content of messages, but not who’s communicating. Use cryptographic anonymity tools to hide your identity, on the other hand, and network eavesdroppers may not even know where to find your communications, let alone snoop on them. “Hide in the network,” security guru Bruce Schneier made his first tip for evading the NSA. “The less obvious you are, the safer you are.”

Though it’s hardly the sole means of achieving online anonymity, the software known as Tor has become the most vouchsafed and developer-friendly method for using the Internet incognito. The free and open source program triple-encrypts your traffic and bounces it through computers around the globe, making tracing it vastly more difficult. Most Tor users know the program as a way to anonymously browse the Web. But it’s much more. In fact, Tor’s software runs in the background of your operating system and creates a proxy connection that links with the Tor network. A growing number of apps and even operating systems provide the option to route data over that connection, allowing you to obscure your identity for practically any kind of online service.

Some users are even experimenting with using Tor in almost all their communications. “It’s like being a vegetarian or a vegan,” says Runa Sandvik, a privacy activist and former developer for Tor. “You don’t eat certain types of food, and for me I choose to use Tor only. I like the idea that when I log onto a website, it doesn’t know where I’m located, and it can’t track me.”

Here’s how you can use the growing array of anonymity tools to protect more of your life online.

Web Browsing

The core application distributed for free by the non-profit Tor Project is the Tor Browser, a hardened, security-focused version of Firefox that pushes all of your Web traffic through Tor’s anonymizing network. Given the three encrypted jumps that traffic takes between computers around the world, it may be the closest thing to true anonymity on the Web. It’s also rather slow. But the Tor browser is getting faster, says Micah Lee, a privacy-focused technologist who has worked with the Electronic Frontier Foundation—one of the organizations that funds the Tor Project—and First Look Media. For the past month or so, he’s tried to use it as his main browser and only switch back to traditional browsers occasionally, mostly for flash sites and others that require plugins.

After about a week, he says, the switch was hardly noticeable. “It may not be entirely necessary, but I haven’t found it that inconvenient either,” Lee says. “And it does have real privacy benefits. Everyone gets tracked everywhere they go on the Web. You can opt of out of that.”

Email

The simplest way to anonymously send email is to use a webmail service in the Tor Browser. Of course, that requires signing up for a new webmail account without revealing any personal information, a difficult task given that Gmail, Outlook, and Yahoo! Mail all require a phone number.

Runa Sandvik suggests Guerrilla Mail, a temporary, disposable email service. Guerrilla Mail lets you set up a new, random email address with only a click. Using it in the Tor Browser ensures that no one, not even Guerrilla Mail, can connect your IP address with that ephemeral email address.

Encrypting messages with webmail can be tough, however. It often requires the user to copy and paste messages into text windows and then use PGP to scramble and unscramble them. To avoid that problem, Lee instead suggests a different email setup, using a privacy-focused email host like Riseup.net, the Mozilla email app Thunderbird, the encryption plugin Enigmail, and another plugin called TorBirdy that routes its messages through Tor.

Instant Messaging

Adium and Pidgin, the most popular Mac and Windows instant messaging clients that support the encryption protocol OTR, also support Tor. (See how to enable Tor in Adium here and in Pidgin here.) But the Tor Project  is working to create an IM program specifically designed to be more secure and anonymous. That Tor IM client, based on a program called Instant Bird, was slated for release in March but is behind schedule. Expect an early version in mid-July.

Large File Transfers

Google Drive and Dropbox don’t promise much in the way of privacy. So Lee created Onionshare, open-source software that lets anyone directly send big files via Tor. When you use it to share a file, the program creates what’s known as a Tor Hidden Service—a temporary, anonymous website—hosted on your computer. Give the recipient of the file the .onion address for that site, and they can securely and anonymously download it through their Tor Browser.

Mobile Devices

Anonymity tools for phones and tablets are far behind the desktop but catching up fast. The Guardian Project created an app called Orbot that runs Tor on Android. Web browsing, email and IM on the phone can all be set to use Orbot’s implementation of Tor as a proxy.

Apple users don’t yet have anything that compares. But a 99-cent app called Onion Browser in the iOS app store offers anonymous web access from iPhones and iPads. An audit by Tor developers in April revealed and helped fix some of the program’s vulnerabilities. But Sandvik suggests that prudent users should still wait for more testing. In fact, she argues that the most sensitive users should stick with better-tested desktop Tor implementations. “If I were in a situation where I needed anonymity, mobile is not a platform I’d rely on,” she says.

Everything Else

Even if you run Tor to anonymize every individual Internet application you use, your computer might still be leaking identifying info online. The NSA has even used unencrypted Windows error messages sent to Microsoft to finger users and track their identities. And an attacker can compromise a web page you visit and use it to deliver an exploit that breaks out of your browser and sends an unprotected message revealing your location.

So for the truly paranoid, Lee and Sandvik recommend using entire operating systems designed to send every scrap of information they communicate over Tor. The most popular Tor OS is Tails, or The Amnesiac Incognito Live System. Tails can boot from a USB stick or DVD so no trace of the session remains on the machine, and anonymizes all information. Snowden associates have said the NSA whistleblower is himself a fan of the software.

For the even more paranoid, there is a lesser-known Tor-enabled OS called Whonix. Whonix creates multiple “virtual machines” on the user’s computer—software versions of full computer operating systems that are designed to be indistinguishable from a full computer. Any attacker trying to compromise the user’s computer will be confined to that virtual machine.

That virtualization trick underlines an important point for would-be anonymous Internet users, Lee says: If your computer gets hacked, the game is over. Creating a virtual sandbox around your online communications is one way to keep the rest of your system protected.

“Tor is awesome and can make you anonymous. But if your endpoint gets compromised, your anonymity is compromised too,” he says. “If you really need to be anonymous, you also need to be really secure.”

 

Use cryptographic anonymity tools to hide your identity, on the other hand, and network eavesdroppers may not even know where to find your communications, let alone snoop on them.

Source: How to Anonymize Everything You Do Online | WIRED

The “State Secrets Privilege” – How the Military Intelligence Complex Retains Control

State Secrets Privilege is a device used by the Military Intelligence Complex (MIC) to shield information from the judicial branch of Government, giving it undeserved legal immunity, unchecked Executive power and total lack of accountability.

President Eisenhower famously referred to the Military Industrial Complex in his outgoing speech, but these days, the dark heart of the Deep State or Shadow Government would better be called the Military Intelligence Complex. This entrenched system cannot change with the election of Trump or a new leader, unless many determined steps are taken to dismantle the sprawling MIC monster that surrounds us. The MIC has unprecedented and highly consolidated power in its hands that comes from the monitoring and surveillance of almost every person in the world. Even when it is challenged, the executive branch of the US Government (to protect the MIC) invokes state secrets privilege to prevent legal cases being heard in court.

 What is the State Secrets Privilege?

First of all, definitions – What exactly is state secrets privilege? The Center for Constitutional Rights defines it as follows:

“The state secrets privilege (SSP) is a common law privilege that allows the head of an executive department to refuse to produce evidence in a court case on the grounds that the evidence is secret information that would harm national security or foreign relation interests if disclosed.”

Like common law itself as used in the US, Australia, Canada and other culturally similar nations, the state secrets privilege actually originates in England. The law allowed the monarch (similar to the US executive branch) the privilege of refusing to share information with Parliament (similar to the US legislative branch) or the courts (the judicial branch). Slowly but surely, the US executive branch, especially during the administration of George W. Bush (Boy Bush), has asserted this privilege more and more to cover up information it doesn’t want exposed. I say the executive branch but what is really driving this is the MIC. With state secrets privilege, the intelligence community can prevent any investigation into sensitive issues, halt disclosure of pertinent information in an investigation and stop any lawsuits it wants to quash.

Setting a Precedent: United States vs Reynolds

Trevor Paglen is an author and researcher who studies the black sites and black ops of the MIC. His book Blank Spots on the Map –The Dark Geography of the Pentagon’s Secret World exposes a lot of the geographical black locations and operations of the US military – and the concomitant legal opinions and rulings which go hand in hand with it. Each black site has a certain geography and legality to it, and sometimes, in order to get what it wants, the US Government has to go black and off the map to achieve its secret goals. Paglen writes:

“There’s nothing natural about how state secrecy carved a black spot into the law, creating legal no-man’s-lands wherever governmental attorneys cried secret. In a field near the Okefenokee Swamp on October 6, 1947, a B-29 crashed and created a collection of facts on the ground. In the name of protecting a secret project aboard the crashed plane, the White House would appeal a lawsuit brought by the families of the deceased men, United States v. Reynolds, up to the Supreme Court. The executive branch would find a favorable decision, and the state secrets privilege would become a juridicial precedent.”

When the B-29 crashed, the USAF was in the final stages of conducting Project Banshee, an operation to, among other things, convert bombers into unmanned drones. Several people were killed in the crash but it didn’t want the info about the project to get out. The dead men’s widows hired lawyers to take the government to court in 1953. The USAF invoked the state secrets privilege. The judge said okay, then give me the document so I can personally review it. No, said the Air Force. The government lawyer Thomas Curtin said, “We contend that the findings of the head of the department are binding, and the judiciary cannot waive it.” 

Translation: judge, let it go. We’re not going to give you the documents because we decided not to.

Legalized Executive Secrecy = Lack of Accountability = More Executive Power

The judge didn’t agree with the contention of the executive branch, and ruled in favor of the widows. The case was appealed and a higher court concurred with the lower court’s opinion. However, once more the case was appealed and went all the way to the Supreme Court. As Paglen writes:

“When the widow’s case reached the Supreme Court, it found a cast of presiding judges with a robust view of executive power. The Vinson court was composed of Roosevelt appointees who’d been specifically selected to authorize the sweeping powers the late president sought to implement the New Deal and the Second World War … [in a similar case governmental attorneys] argued that there were essentially only two limitations on executive power: “One is the ballot box and the other is impeachment.” Was the administration arguing that when a sovereign people elected a government, it was limiting the Congress and the judiciary but not the executive, asked District Judge David Pine? “That’s our conception, Your Honor,” Assistant Attorney General Holmes Baldridge answered.

Chief Vinson delivered a verdict that overturned the decision of the lower courts and handed massive power to the executive branch:

“In the majority opinion, Vinson recognized that “abandonment of judicial control” over the state secrets privilege “would lead to intolerable abuses”, even as his own opinion effectively abandoned the very principle of judicial oversight … half a century later, it would turn out the ancient reports related to Project Banshee … contained absolutely no classified information whatsoever. They did, however, contain ample evidence of government negligence, evidence that if revealed would have proved the widows right. The state secrets privilege, it would turn out, was based on a lie.”

Bush, Cheney, Neo-Conservatives and Co. – Unchecked Executive Power

The MIC was setup in the aftermath of World War 2. There were several key steps or decisions, such as Truman passing the Nation Security Act of 1947, setting up MJ-12 in secret to handle extraterrestrial affairs, setting up the CIA in 1947 (to operate more or less above the law) and setting up the NSA in 1952. The Supreme Court ruling on the Reynolds case, enthroning the principle of the state secrets privilege, added to all this in 1953.

 After the false flag attack of 9/11 and the subsequent War on Terror, the MIC gained even more power, aided by the Bush Jr. Administration which was happy to skirt the law in numerous ways, including overseeing the proliferation of black sites abroad, torture (waterboarding), subcontracting military jobs to private contractors not bound by the same laws and code of ethics, and running a private assassination hit squad out of the VP’s office. Guantanamo Bay, still not closed, was chosen as one of the sites deliberately because it’s in a legal no man’s land, in between full possession of the US and Cuba, without the constitutional protections afforded to people living in the US (or Cuba). The prisoners there didn’t even have the ability to claim habeas corpus, an old legal remedy which usually allows a person to be released unless lawful grounds are shown for their detention.

In short, the US, the MIC and all its minions created off-map zones where they could do whatever the f*ck they wanted – with no oversight and zero accountability. Once more from Paglen:

“In the hours after 9/11, it became clear to everyone in the Bush administration that there would be a war. “Any barriers in your way, they are gone,” he told Defense Secretary Donald Rumsfeld. “I don’t care what the international lawyers say, we are going to kick some ass.” … The CIA, an agency designed to operate outside the law, was now free to pursue its vision of a new world, to create new geographies, and to keep that world’s details far from the public record. The black world was supercharged with newfound life and purpose.”

You Don’t Have the “Need to Know”

The state secrets privilege is a manifestation of the larger arrogance shown by tyranny. It’s all about hiding behind national security, being “read in” or not, being cleared to know or not – being judged for whether you have the need to know or not. It’s all about compartmentalization, just as mind control (a pet project of the Nazis and CIA) itself is. It’s all about escaping liability. It’s all about power. Even Presidents don’t even have the need to know, as JFK found out the hard way.

And, if you do know, then you better keep it to yourself … or else. Obama was the king of severely punishing whistleblowers. The US Government has become a master at intimidating and silencing whistleblowers through various means. As former CIA Officer Kevin Shipp attests:

“There is a massive, mammoth, complex secret mechanism in the U.S. Government. It’s called the intelligence community. It is so powerful that not even the Congress or the Senate can control it. Matter of fact, it controls them. It does whatever it wants. They have these Senate investigations, and they’ll come and they say, “Sorry Senator, we can’t tell you what we’re doing because you don’t have the agency clearance.” And that’s where it’s shut down.”

Those truly interested in freedom need to put their attention on the MIC and its mechanisms. Focusing too much on puppet politicians who come and go every 4 years or so is not going to change the underlying fabric of society – which is now bending towards tyranny.

 

Source: The “State Secrets Privilege” – How the Military Intelligence Complex Retains Control | Wake Up World

Another Brick In The Wall – Modern Education and the System of Deception

 

Like many things — the food industry, the medical-pharmaceutical establishment, the mainstream media – the hidden corporate/bankers who control our governments have also standardized the education system through funding.

Many years ago in the USA, for example, much money was poured into education by the Rockefeller-created National Education Association, with the help of the Carnegie Foundation and later on the Ford Foundation. The result of the efforts of such organisations can be seen worldwide today in the real purpose of the education system which is to teach children and young people: 1) Reward comes from accurate memory recall from heavy repetition. 2) Non-compliance will be punished. 3) Acceptance that ‘truth’ and what is ‘real’ comes from authority.

Thus, the real purpose of the education system is to cultivate conformity and prohibit critical thinking about anything of real importance.

Starting at 4 years old (and what could be a better age to start a mass indoctrination?)and finishing by the time an individual comes out of the education system, some 12 years plus on, children have had more than their fair share of programming and brainwashing, and as a result are unable to really think for themselves. Moreover, any genuine outside-of-the-box thinking with significant potential humanitarian or Mother Earth-friendly benefit is ignored, quashed, ridiculed or suppressed by the influence of those hidden controllers if it is perceived as a threat to any of their businesses.

But, as Einstein said, ‘real thinking is to think the unthinkable…’

Introducing the ‘Unsung Heroes’

The following is a list of just some of history’s truly great humanitarian outside-of-the-box thinkers, with their innovative ideas/products that have never been able to see the light of day (due to the above reasons.)

Raymond Rife

Raymond Rife (1888-1971) and his Universal Microscope for curing cancer.

After successfully curing a number of cancer patients the Rockefeller owned American Medical Association (AMA) later had this work laid down to rest by closing down Rife’s set ups and seizing his equipment:

Essentially Rife refused to hand over the rights of his work to the AMA because he saw moneyed interests as hidden ulterior motives – that his the cancer curing machine would not be allowed to the world at large because the AMA and the medical/pharmaceutical establishment did not want patients’ cured.

That would mean customers lost and no more revenue for the cancer industry, so instead they push out real cures, and keep coming up with toxic treatments that never cure, instead create further symptoms (side effects) guaranteeing the cancer returns and thus repeat business until the patient eventually dies an unnecessarily harsh death.

After years of ensuing court cases with the ‘big boys’ of the cancer establishment, with little money to exist on, Rife exiled in Mexico to avoid imprisonment in the USA. He later died of alcoholism, a brilliant, but defeated man. The pressures of harassment related to the legal battles and constant threat of imprisonment had been too much for him.

Linus Pauling

Pauling had worked with Matthias Rath and they came up with a unified approach to curing heart disease. (1901-1994) – ‘Unified Theory’ cure for heart disease.

Essentially, they found that heart disease is the result of a long-term vitamin C deficiency. The solution is to treat patients with frequent high doses (e.g. 6g/day) of vitamin C while using the amino acids lysine and proline to remove the atherosclerotic plaque lining the inner walls of the blood vessels that cause a narrowing or blocking of the lumen (space) of the blood vessels which is responsible for restricting blood flow and cardiovascular disease.

However, due to greater interests in corporate profitability and perceived financial threat, this highly successful cheap alternative therapy has not been allowed that much attention.

Nikola Tesla

Multi-talented Tesla cut across many disciplinary boundaries. His genius gave rise to a number of world-changing inventions. Nikola Tesla (1856-1943) – Wardenclyffe Tower Project free energy.

One of his most famous experiments /inventions was the Wardenclyffe Tower Project. It was Tesla’s attempt to provide everyone on the globe with free energy through harnessing electricity from the Earth’s ionosphere by means of the towers. Without wires the towers could transmit the harnessed electricity to ground-level areas requiring it…

However, Tesla’s funding was stopped. His equipment and lab was burned down together with the related intellectual property because it posed a threat to undercutting the cost of the conventional electricity grid system. If Tesla’s Wardenclyffe Tower Project had been allowed to flourish and not be destroyed then today we could well be living in a utopia.  Tesla died a poverty-stricken lonely and forgotten man in New York City.

TIME Magazine Cover: Nikola Tesla – July 20, 1931

Wilhelm Reich

Wilhelm Reich (1897-1957) – Drought-breaking weather control.

Wilhelm Reich built an instrument he called the cloudbuster which successfully induced weather change. It has been used to break many droughts by producing clouds that make rain.

This workable mechanism for making rainclouds for crop irrigation in drought areas was stopped by those ever watchful lackeys for the ruling elite.

Allowing something like this could lead to food abundance and greatly contribute to ending world hunger. However, the controllers don’t want world hunger to end. If this happened it would make it more difficult to control people in what would no longer be third world countries. .. Don’t forget, their hidden enslavement agenda…

Consequentially Reich was hounded by the likes of the FDA (Food and Drug Administration) having accused him of fraud and deception with his cloudbuster instrument. His equipment was seized and destroyed. His last days were spent in prison where it was claimed that he died of a heart attack.
I bet you never studied these ‘taboo subjects’ in your formal education training! Why? Essentially, the corporate based education system with its carefully selected curricula covertly serves to impede or stultify real human growth.

 

 

Educating you to be just another brick in the wall

The corporate funded education establishment just wants you to fit into the system. This is totally consistent with the Pink Floyd song ‘All in all, you’re just another brick in the wall.’ Those individuals most programmed and brainwashed by the education system are likely to be more successful than others. Take for example, at job interviews. Having a greater ‘corporate mindset’ is more likely to get a person a job than others: This ‘mindset’ resonates with interviewers of similar disposition.

You are just a resource.

On the subject of corporations, too-big-for-their-boots-corporations are soulless greed machines with all the hallmarks of psychopathy. Don’t be deceived by the effrontery, they care very little about the planet and the people on it. Coldly, to the corporations an employee is just a resource, no more than a piece of office equipment, equally expendable, hence the department human ‘resources’. To the corporations, making ‘enough’ money doesn’t exist in their vocabulary. There is no enough. So how can it possibly exist when it’s not in their thoughts?

Corporate Greed vs. Poverty

There is so much poverty in the world, with more than a billion people having to live on the equivalent of a dollar or less per day. Roughly every 5 to 7 seconds a child dies of hunger.

We are living in a corporatocracy; a corporate run and controlled world. Given that the Presidents, Prime Ministers, and senior politicians are not in power to serve the people, but they are ultimately placed in positions of power to do the deeds of the corporate agenda, then it fully stands to reason that the education authorities serve to follow corporate directives for this very same purpose.

Walking the White Line 

Carefully monitored by the controllers over the years, academic institutions have taught science with some major assumptions. These assumptions are now, more than ever, the subject of challenges that question their validity. However anyone in academia who dares to seriously challenge the official indoctrination walks too far away from the white line laid down by the authorities, poses a major threat to the establishment’s iron-clad beliefs, and is likely to find themselves getting shown the door. Indeed, this has happened before.

Here are the assumptions in science that have received some serious challenges:

There are solutions, so never stop questioning!

Don’t ever blindly accept what the authorities tell you, or anybody else. Instead of acting like blind slaves, or fools who believe you are free and ‘oh so educated’, as Einstein said,do not stop questioning. When you are satisfied with what you have found, and if it is different to the official line, have the courage and integrity to speak up, spread the word.As more people become aware of the suppressed knowledge in academia and the benefits it could bring to society if such suppressed knowledge was widely known, there will be greater chances of these findings being acted on

There are such things as free energy and successful cures for all sorts of diseases. They have been about for many, many years.

Now the ball is in your court. Don’t take my word on anything I’ve written above, instead, apply critical thinking and start questioning everything!

 

 

About the Author

Paul Philips, is an author and the editor of NewParadigm.ws.

Source: Another Brick In The Wall – Modern Education and the System of Deception : Waking Times