FIND US ON FACEBOOK

Friday, July 29, 2011

How The U.S. Government May Be Setting The Stage For Martial Law (Don’t Worry – Be Happy…In Your FEMA Prison Camp)

The Last Roundup

For decades the federal government has been developing a highly classified plan that would override the Constitution in the event of a terrorist attack. Is it also compiling a secret enemies list of citizens who could face detention under martial law?
By Christopher Ketcham



In the spring of 2007, a retired senior official in the U.S. Justice Department sat before Congress and told a story so odd and ominous, it could have sprung from the pages of a pulp political thriller. It was about a principled bureaucrat struggling to protect his country from a highly classified program with sinister implications. Rife with high drama, it included a car chase through the streets of Washington, D.C., and a tense meeting at the White House, where the president’s henchmen made the bureaucrat so nervous that he demanded a neutral witness be present.

The bureaucrat was James Comey, John Ashcroft’s second-in-command at the Department of Justice during Bush’s first term. Comey had been a loyal political foot soldier of the Republican Party for many years. Yet in his testimony before the Senate Judiciary Committee, he described how he had grown increasingly uneasy reviewing the Bush administration’s various domestic surveillance and spying programs. Much of his testimony centered on an operation so clandestine he wasn’t allowed to name it or even describe what it did. He did say, however, that he and Ashcroft had discussed the program in March 2004, trying to decide whether it was legal under federal statutes. Shortly before the certification deadline, Ashcroft fell ill with pancreatitis, making Comey acting attorney general, and Comey opted not to certify the program. When he communicated his decision to the White House, Bush’s men told him, in so many words, to take his concerns and stuff them in an undisclosed location.

Comey refused to knuckle under, and the dispute came to a head on the cold night of March 10, 2004, hours before the program’s authorization was to expire. At the time, Ashcroft was in intensive care at George Washington Hospital following emergency surgery. Apparently, at the behest of President Bush himself, the White House tried, in Comey’s words, “to take advantage of a very sick man,” sending Chief of Staff Andrew Card and then-White House counsel Alberto Gonzales on a mission to Ashcroft’s sickroom to persuade the heavily doped attorney general to override his deputy. Apprised of their mission, Comey, accompanied by a full security detail, jumped in his car, raced through the streets of the capital, lights blazing, and “literally ran” up the hospital stairs to beat them there.

Minutes later, Gonzales and Card arrived with an envelope filled with the requisite forms. Ashcroft, even in his stupor, did not fall for their heavy-handed ploy. “I’m not the attorney general,” Ashcroft told Bush’s men. “There”—he pointed weakly to Comey—”is the attorney general.” Gonzales and Card were furious, departing without even acknowledging Comey’s presence in the room. The following day, the classified domestic spying program that Comey found so disturbing went forward at the demand of the White House—”without a signature from the Department of Justice attesting as to its legality,” he testified.

What was the mysterious program that had so alarmed Comey? Political blogs buzzed for weeks with speculation. Though Comey testified that the program was subsequently readjusted to satisfy his concerns, one can’t help wondering whether the unspecified alteration would satisfy constitutional experts, or even average citizens. Faced with push-back from his bosses at the White House, did he simply relent and accept a token concession? Two months after Comey’s testimony to Congress, the New York Times reported a tantalizing detail: The program that prompted him “to threaten resignation involved computer searches through massive electronic databases.” The larger mystery remained intact, however. “It is not known precisely why searching the databases, or data mining, raised such a furious legal debate,” the article conceded.

Another clue came from a rather unexpected source: President Bush himself. Addressing the nation from the Oval Office in 2005 after the first disclosures of the NSA’s warrantless electronic surveillance became public, Bush insisted that the spying program in question was reviewed “every 45 days” as part of planning to assess threats to “the continuity of our government.”

Few Americans—professional journalists included—know anything about so-called Continuity of Government (COG) programs, so it’s no surprise that the president’s passing reference received almost no attention. COG resides in a nebulous legal realm, encompassing national emergency plans that would trigger the takeover of the country by extra-constitutional forces—and effectively suspend the republic. In short, it’s a road map for martial law.

While Comey, who left the Department of Justice in 2005, has steadfastly refused to comment further on the matter, a number of former government employees and intelligence sources with independent knowledge of domestic surveillance operations claim the program that caused the flap between Comey and the White House was related to a database of Americans who might be considered potential threats in the event of a national emergency. Sources familiar with the program say that the government’s data gathering has been overzealous and probably conducted in violation of federal law and the protection from unreasonable search and seizure guaranteed by the Fourth Amendment.

According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources tellRadar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.

Of course, federal law is somewhat vague as to what might constitute a “national emergency.” Executive orders issued over the last three decades define it as a “natural disaster, military attack, [or] technological or other emergency,” while Department of Defense documents include eventualities like “riots, acts of violence, insurrections, unlawful obstructions or assemblages, [and] disorder prejudicial to public law and order.” According to one news report, even “national opposition to U.S. military invasion abroad” could be a trigger.

Let’s imagine a harrowing scenario: coordinated bombings in several American cities culminating in a major blast—say, a suitcase nuke—in New York City. Thousands of civilians are dead. Commerce is paralyzed. A state of emergency is declared by the president. Continuity of Governance plans that were developed during the Cold War and have been aggressively revised since 9/11 go into effect. Surviving government officials are shuttled to protected underground complexes carved into the hills of Maryland, Virginia, and Pennsylvania. Power shifts to a “parallel government” that consists of scores of secretly preselected officials. (As far back as the 1980s, Donald Rumsfeld, then CEO of a pharmaceutical company, and Dick Cheney, then a congressman from Wyoming, were slated to step into key positions during a declared emergency.) The executive branch is the sole and absolute seat of authority, with Congress and the judiciary relegated to advisory roles at best. The country becomes, within a matter of hours, a police state.

Interestingly, plans drawn up during the Reagan administration suggest this parallel government would be ruling under authority given by law to the Federal Emergency Management Agency, home of the same hapless bunch that recently proved themselves unable to distribute water to desperate hurricane victims. The agency’s incompetence in tackling natural disasters is less surprising when one considers that, since its inception in the 1970s, much of its focus has been on planning for the survival of the federal government in the wake of a decapitating nuclear strike.

Under law, during a national emergency, FEMA and its parent organization, the Department of Homeland Security, would be empowered to seize private and public property, all forms of transport, and all food supplies. The agency could dispatch military commanders to run state and local governments, and it could order the arrest of citizens without a warrant, holding them without trial for as long as the acting government deems necessary. From the comfortable perspective of peaceful times, such behavior by the government may seem farfetched. But it was not so very long ago that FDR ordered 120,000 Japanese-Americans—everyone from infants to the elderly—be held in detention camps for the duration of World War II. This is widely regarded as a shameful moment in U.S. history, a lesson learned. But a long trail of federal documents indicates that the possibility of large-scale detention has never quite been abandoned by federal authorities. Around the time of the 1968 race riots, for instance, a paper drawn up at the U.S. Army War College detailed plans for rounding up millions of “militants” and “American negroes” who were to be held at “assembly centers or relocation camps.” In the late 1980s, the Austin American-Statesman and other publications reported the existence of 10 detention camp sites on military facilities nationwide, where hundreds of thousands of people could be held in the event of domestic political upheaval. More such facilities were commissioned in 2006, when Kellogg Brown & Root—then a subsidiary of Halliburton—was handed a $385 million contract to establish “temporary detention and processing capabilities” for the Department of Homeland Security. The contract is short on details, stating only that the facilities would be used for “an emergency influx of immigrants, or to support the rapid development of new programs.” Just what those “new programs” might be is not specified.

In the days after our hypothetical terror attack, events might play out like this: With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.

It is, of course, appropriate for any government to plan for the worst. But when COG plans are shrouded in extreme secrecy, effectively unregulated by Congress or the courts, and married to an overreaching surveillance state—as seems to be the case with Main Core—even sober observers must weigh whether the protections put in place by the federal government are becoming more dangerous to America than any outside threat.

Another well-informed source—a former military operative regularly briefed by members of the intelligence community—says this particular program has roots going back at least to the 1980s and was set up with help from the Defense Intelligence Agency. He has been told that the program utilizes software that makes predictive judgments of targets’ behavior and tracks their circle of associations with “social network analysis” and artificial intelligence modeling tools.

“The more data you have on a particular target, the better [the software] can predict what the target will do, where the target will go, who it will turn to for help,” he says. “Main Core is the table of contents for all the illegal information that the U.S. government has [compiled] on specific targets.” An intelligence expert who has been briefed by high-level contacts in the Department of Homeland Security confirms that a database of this sort exists, but adds that “it is less a mega-database than a way to search numerous other agency databases at the same time.”

A host of publicly disclosed programs, sources say, now supply data to Main Core. Most notable are the NSA domestic surveillance programs, initiated in the wake of 9/11, typically referred to in press reports as “warrantless wiretapping.” In March, a front-page article in the Wall Street Journal shed further light onto the extraordinarily invasive scope of the NSA efforts: According to the Journal, the government can now electronically monitor “huge volumes of records of domestic e-mails and Internet searches, as well as bank transfers, credit card transactions, travel, and telephone records.” Authorities employ “sophisticated software programs” to sift through the data, searching for “suspicious patterns.” In effect, the program is a mass catalog of the private lives of Americans. And it’s notable that the article hints at the possibility of programs like Main Core. “The [NSA] effort also ties into data from an ad-hoc collection of so-called black programs whose existence is undisclosed,” the Journal reported, quoting unnamed officials. “Many of the programs in various agencies began years before the 9/11 attacks but have since been given greater reach.”

The following information seems to be fair game for collection without a warrant: the e-mail addresses you send to and receive from, and the subject lines of those messages; the phone numbers you dial, the numbers that dial in to your line, and the durations of the calls; the Internet sites you visit and the keywords in your Web searches; the destinations of the airline tickets you buy; the amounts and locations of your ATM withdrawals; and the goods and services you purchase on credit cards. All of this information is archived on government supercomputers and, according to sources, also fed into the Main Core database.

Main Core also allegedly draws on four smaller databases that, in turn, cull from federal, state, and local “intelligence” reports; print and broadcast media; financial records; “commercial databases”; and unidentified “private sector entities.” Additional information comes from a database known as the Terrorist Identities Datamart Environment, which generates watch lists from the Office of the Director of National Intelligence for use by airlines, law enforcement, and border posts. According to theWashington Post, the Terrorist Identities list has quadrupled in size between 2003 and 2007 to include about 435,000 names. The FBI’s Terrorist Screening Center border crossing list, which listed 755,000 persons as of fall 2007, grows by 200,000 names a year. A former NSA officer tells Radar that the Treasury Department’s Financial Crimes Enforcement Network, using an electronic-funds transfer surveillance program, also contributes data to Main Core, as does a Pentagon program that was created in 2002 to monitor anti-war protestors and environmental activists such as Greenpeace.

If previous FEMA and FBI lists are any indication, the Main Core database includes dissidents and activists of various stripes, political and tax protestors, lawyers and professors, publishers and journalists, gun owners, illegal aliens, foreign nationals, and a great many other harmless, average people.

A veteran CIA intelligence analyst who maintains active high-level clearances and serves as an advisor to the Department of Defense in the field of emerging technology tells Radar that during the 2004 hospital room drama, James Comey expressed concern over how this secret database was being used “to accumulate otherwise private data on non-targeted U.S. citizens for use at a future time.” Though not specifically familiar with the name Main Core, he adds, “What was being requested of Comey for legal approval was exactly what a Main Core story would be.” A source regularly briefed by people inside the intelligence community adds: “Comey had discovered that President Bush had authorized NSA to use a highly classified and compartmentalized Continuity of Government database on Americans in computerized searches of its domestic intercepts. [Comey] had concluded that the use of that ‘Main Core’ database compromised the legality of the overall NSA domestic surveillance project.”

If Main Core does exist, says Philip Giraldi, a former CIA counterterrorism officer and an outspoken critic of the agency, the Department of Homeland Security (DHS) is its likely home. “If a master list is being compiled, it would have to be in a place where there are no legal issues”—the CIA and FBI would be restricted by oversight and accountability laws—”so I suspect it is at DHS, which as far as I know operates with no such restraints.” Giraldi notes that DHS already maintains a central list of suspected terrorists and has been freely adding people who pose no reasonable threat to domestic security. “It’s clear that DHS has the mandate for controlling and owning master lists. The process is not transparent, and the criteria for getting on the list are not clear.” Giraldi continues, “I am certain that the content of such a master list [as Main Core] would not be carefully vetted, and there would be many names on it for many reasons—quite likely, including the two of us.”

Would Main Core in fact be legal? According to constitutional scholar Bruce Fein, who served as associate deputy attorney general under Ronald Reagan, the question of legality is murky: “In the event of a national emergency, the executive branch simply assumes these powers”—the powers to collect domestic intelligence and draw up detention lists, for example—” if Congress doesn’t explicitly prohibit it. It’s really up to Congress to put these things to rest, and Congress has not done so.” Fein adds that it is virtually impossible to contest the legality of these kinds of data collection and spy programs in court “when there are no criminal prosecutions and [there is] no notice to persons on the president’s ‘enemies list.’ That means if Congress remains invertebrate, the law will be whatever the president says it is—even in secret. He will be the judge on his own powers and invariably rule in his own favor.”

The veteran CIA intelligence analyst notes that Comey’s suggestion that the offending elements of the program were dropped could be misleading: “Bush [may have gone ahead and] signed it as a National Intelligence Finding anyway.”

But even if we never face a national emergency, the mere existence of the database is a matter of concern. “The capacity for future use of this information against the American people is so great as to be virtually unfathomable,” the senior government official says.

In any case, mass watch lists of domestic citizens may do nothing to make us safer from terrorism. Jeff Jonas, chief scientist at IBM, a world renowned expert in data mining, contends that such efforts won’t prevent terrorist conspiracies. “Because there is so little historical terrorist event data,” Jonas tellsRadar, “there is not enough volume to create precise predictions.”

The overzealous compilation of a domestic watch list is not unique in post-war American history. In 1950, the FBI, under the notoriously paranoid J. Edgar Hoover, began to “accumulate the names, identities, and activities” of suspect American citizens in a rapidly expanding “security index,” according to declassified documents. In a letter to the Truman White House, Hoover stated that in the event of certain emergency situations, suspect individuals would be held in detention camps overseen by “the National Military Establishment.” By 1960, a congressional investigation later revealed, the FBI list of suspicious persons included “professors, teachers, and educators; labor-union organizers and leaders; writers, lecturers, newsmen, and others in the mass-media field; lawyers, doctors, and scientists; other potentially influential persons on a local or national level; [and] individuals who could potentially furnish financial or material aid” to unnamed “subversive elements.” This same FBI “security index” was allegedly maintained and updated into the 1980s, when it was reportedly transferred to the control of none other than FEMA (though the FBI denied this at the time).

FEMA, however—then known as the Federal Preparedness Agency—already had its own domestic surveillance system in place, according to a 1975 investigation by Senator John V. Tunney of California. Tunney, the son of heavyweight boxing champion Gene Tunney and the inspiration for Robert Redford’s character in the film The Candidate, found that the agency maintained electronic dossiers on at least 100,000 Americans, which contained information gleaned from wideranging computerized surveillance. The database was located in the agency’s secret underground city at Mount Weather, near the town of Bluemont, Virginia. The senator’s findings were confirmed in a 1976 investigation by theProgressive magazine, which found that the Mount Weather computers “can obtain millions of pieces [of] information on the personal lives of American citizens by tapping the data stored at any of the 96 Federal Relocation Centers”—a reference to other classified facilities. According to the Progressive, Mount Weather’s databases were run “without any set of stated rules or regulations. Its surveillance program remains secret even from the leaders of the House and the Senate.”

Ten years later, a new round of government martial law plans came to light. A report in the Miami Herald contended that Reagan loyalist and Iran-Contra conspirator Colonel Oliver North had spearheaded the development of a “secret contingency plan,”—code named REX 84—which called “for suspension of the Constitution, turning control of the United States over to FEMA, [and the] appointment of military commanders to run
state and local governments.” The North plan also reportedly called for the detention of upwards of 400,000 illegal aliens and an undisclosed number of American citizens in at least 10 military facilities maintained as potential holding camps.

North’s program was so sensitive in nature that when Texas Congressman Jack Brooks attempted to question North about it during the 1987 Iran-Contra hearings, he was rebuffed even by his fellow legislators. “I read in Miami papers and several others that there had been a plan by that same agency [FEMA] that would suspend the American Constitution,” Brooks said. “I was deeply concerned about that and wondered if that was the area in which he [North] had worked.” Senator Daniel Inouye, chairman of the Senate Select Committee on Iran, immediately cut off his colleague, saying, “That question touches upon a highly sensitive and classified area, so may I request that you not touch upon that, sir.” Though Brooks pushed for an answer, the line of questioning was not allowed to proceed.

Wired magazine turned up additional damaging information, revealing in 1993 that North, operating from a secure White House site, allegedly employed a software database program called PROMIS (ostensibly as part of the REX 84 plan). PROMIS, which has a strange and controversial history, was designed to track individuals—prisoners, for example—by pulling together information from disparate databases into a single record. According to Wired, “Using the computers in his command center, North tracked dissidents and potential troublemakers within the United States. Compared to PROMIS, Richard Nixon’s enemies list or Senator Joe McCarthy’s blacklist looks downright crude.” Sources have suggested to Radar that government databases tracking Americans today, including Main Core, could still have PROMIS based legacy code from the days when North was running his programs.

In the wake of 9/11, domestic surveillance programs of all sorts expanded dramatically. As one well-placed source in the intelligence community puts it, “The gloves seemed to come off.” What is not yet clear is what sort of still-undisclosed programs may have been authorized by the Bush White House. Marty Lederman, a high-level official at the Department of Justice under Clinton, writing on a law blog last year, wondered, “How extreme were the programs they implemented [after 9/11]? How egregious was the lawbreaking?” Congress has tried, and mostly failed, to find out.

In July 2007 and again last August, Rep. Peter DeFazio, a Democrat from Oregon and a senior member of the House Homeland Security Committee, sought access to the “classified annexes” of the Bush administration’s Continuity of Government program. DeFazio’s interest was prompted by Homeland Security Presidential Directive 20 (also known as NSPD-51), issued in May 2007, which reserves for the executive branch the sole authority to decide what constitutes a national emergency and to determine when the emergency is over. DeFazio found this unnerving.

But he and other leaders of the Homeland Security Committee, including Chairman Bennie Thompson, a Mississippi Democrat, were denied a review of the Continuity of Government classified annexes. To this day, their calls for disclosure have been ignored by the White House. In a press release issued last August, DeFazio went public with his concerns that the NSPD-51 Continuity of Government plans are “extra-constitutional or unconstitutional.” Around the same time, he told the Oregonian, “Maybe the people who think there’s a conspiracy out there are right.”

Congress itself has recently widened the path for both extra-constitutional detentions by the White House and the domestic use of military force during a national emergency. The Military Commissions Act of 2006 effectively suspended habeas corpus and freed up the executive branch to designate any American citizen an “enemy combatant” forfeiting all privileges accorded under the Bill of Rights. The John Warner National Defense Authorization Act, also passed in 2006, included a last-minute rider titled “Use of the Armed Forces in Major Public Emergencies,” which allowed the deployment of U.S. military units not just to put down domestic insurrections—as permitted under posse comitatus and the Insurrection Act of 1807—but also to deal with a wide range of calamities, including “natural disaster, epidemic, or other serious public health emergency, terrorist attack, or incident.”

More troubling, in 2002, Congress authorized funding for the U.S. Northern Command, or NORTHCOM, which, according to Washington Post military intelligence
expert William Arkin, “allows for emergency military operations in the United States without civilian supervision or control.”

“We are at the edge of a cliff and we’re about to fall off,” says constitutional lawyer and former Reagan administration official Bruce Fein. “To a national emergency planner, everybody looks like a danger to stability. There’s no doubt that Congress would have the authority to denounce all this—for example, to refuse to appropriate money for the preparation of a list of U.S. citizens to be detained in the event of martial law. But Congress is the invertebrate branch. They say, ‘We have to be cautious.’ The same old crap you associate with cowards. None of this will change under a Democratic administration, unless you have exceptional statesmanship and the courage to stand up and say, ‘You know, democracies accept certain risks that tyrannies do not.’ “

As of this writing, DeFazio, Thompson, and the other 433 members of the House are debating the so-called Protect America Act, after a similar bill passed in the Senate. Despite its name, the act offers no protection for U.S. citizens; instead, it would immunize from litigation U.S. telecom giants for colluding with the government in the surveillance of Americans to feed the hungry maw of databases like Main Core. The Protect America Act would legalize programs that appear to be unconstitutional.

Meanwhile, the mystery of James Comey’s testimony has disappeared in the morass of election year coverage. None of the leading presidential candidates have been asked the questions that are so profoundly pertinent to the future of the country: As president, will you continue aggressive domestic surveillance programs in the vein of the Bush administration? Will you release the COG blueprints that Representatives DeFazio and Thompson were not allowed to read? What does it suggest about the state of the nation that the U.S. is now ranked by worldwide civil liberties groups as an “endemic surveillance society,” alongside repressive regimes such as China and Russia? How can a democracy thrive with a massive apparatus of spying technology deployed against every act of political expression, private or public? (Radar put these questions to spokespeople for the McCain, Obama, and Clinton campaigns, but at press time had yet to receive any responses.)

These days, it’s rare to hear a voice like that of Senator Frank Church, who in the 1970s led the explosive investigations into U.S. domestic intelligence crimes that prompted the very reforms now being eroded. “The technological capacity that the intelligence community has given the government could enable it to impose total tyranny,” Church pointed out in 1975. “And there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know.”

Source: Radar Magazine (http://radarmagazine.com/from-the-magazine/2008/04/mayjune_2008_table_of_contents.php).

Related Reading: Constitutionally.blogspot.com ”Investigation into Whether America is Still a Constitutional Government” — Are we currently living under Continuity of Government? (Excellent links for documentation, more reading).
Peter Dale Scott’s recent article, Congress, the Bush Adminstration and Continuity of Government Planning–The Showdown
We also very highly recommend Dr. Scott’s “The Road to 9/11: Wealth, Empire, and the Future of America” which devotes two entire chapters to this issue.

~ source: 911Truth.Org ~

Sunday, July 24, 2011

FEMA: The U.S. Federal Bureaucracy’s Secret Blueprint For Tyranny In America


FEMA - DICTATORSHIP POSSIBLE???


Hidden in the bureaucratic maze Washington politicians call "our Constitutional system of government", a little-known federal agency is quietly making plans to turn the United States into a dictatorship.

There are "stacks of blueprints" in the top-secret safe of the Federal Emergency Management Agency (FEMA) designed to convert American society into a "command system", a former deputy administrator of the agency has told ...the investigative team (article continued below).


This article sourced from: http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_un10b.htm











In a private interview, allowing him to remain anonymous, this highly placed source confirmed that the procedures developed by FEMA to "suspend" the Constitution and to round up thousands of dissenters nationwide can be activated by a single phone call from the White House.

"Even people who have become aware of FEMA's existence and know something about its activities-not many do-think the word "Emergency" in its designation means it will go into action only in case of a natural disaster or perhaps a surprise nuclear attack", related this expert.


"In reality, however, this outfit can be mobilized whenever the politicians occupying the White House decide they need special-and extra-Constitutional-powers to impose their will on the nation."



...FEMA's bureaucrats can then proceed to:

Take over all farms, ranches or timberland in order to utilize them more effectively as decreed in Executive Order (EO) 11490, the so-called omnibus emergency preparedness decree promulgated by President Richard Nixon on October 28, 1969.

Seize all sources of public power: electric, nuclear, petroleum, etc.

Freeze all wages, prices and bank accounts.

Take over all communications media.

Such totalitarian measures can be imposed by bureaucrats under FEMA's direction, not just in the face of a cataclysmic upheaval, but "whenever necessary for assuring the continuity of the federal government in any national emergency type situation", decreed a subsequent White House ukase, EO 11921, issued by President Gerald Ford in April 1976.



Can such a blueprint for tyranny be clamped on the United States by a force of faceless federal officials? It is the role of FEMA (prepared) for most intensively, says the former high agency administrator.

"In recent years, despite talk of spending cuts, FEMA's budget has been steadily increasing," revealed this knowledgeable source. "It now stands at somewhere around $3 billion annually. I say 'somewhere' because part of this agency's funding is appropriated under so-called black programs, submitted to Congress with the defense budget without an explanation of its purpose, asking the secret CIA appropriation."

The Plot Against Private Property!!


In the February 2 Issue of his newsletter, Remnant Review, GARY NORTH makes the provocative suggestion that our Constitutional Convention of 1787 was a manipulative maneuver of the Elitist Syndicate plotting world control via a central banking conspiracy. This is too long and too meaty an article for THE OSTRICH to offer more than a few nibbles.


The American Convention consolidated the 13 original states, sovereign under the Articles of Confederation, into a giant free trade zone. North speculates that the Constitution was a peaceful thesis to the violent antithesis of the French Revolution of the same period—"a Hegelian dialectic even before Hegel was born." Both aimed at the same goal on the same timetable: completion by 2000. That goal was world political totalitarianism under a money monopoly.


North dates organization of the plotters from SIR ISAAC NEWTON'S "capture" of England's Royal Society, chartered in 1661, and the founding of the monopolistic Bank of England in the same period. He attributes success to conspirators' sources in occultism (secret societies) and journalism. For more than three centuries, London has been the brain and control center of the conspiracy. The Bank of England is the model for a world-controlling money monopoly. North suggests that the United States is the model for its political aspect, the peaceful thesis for the violent antithesis (USSR) which has failed.


Given worldwide aspirations inspired by the idealism launching the American Experiment, this was a brilliant propaganda choice and is thus being sold for a United Europe, first step in the Syndicate's One World. As in the United States, K was first peddled as a free trade union. Gradually, as THE OSTRICH has been reporting, the original sovereignty of our confederated states has been devoured with bribes, blackmail, and such outright theft as the Nixon Administration regionalism shown in the map below. A similar fate is predictable for European nations under the Syndicate's consolidation planned for 1992.


Unless a re-united neutral Germany breaks from the conspiracy.... Unless Americans awake and their own non-violent "velvet" revolution outlaw fractional reserve and usury banking....


REGIONAL GOVERNMENT STRUCTURE


White House Directive, "Restructuring of Government Service Systems", dated 27 March 1969 merged the fifty sovereign states into ten federal regions in violation of the prohibitions of Article IV, United States Constitution.



An examination of the type of government established under regional governance shows that it is a government of appointed rather than elected officials, a governance established in violation of the guarantees of Article X, United States Constitution. Under regional governance US citizens are to be held in bondage, in perpetuity, as producers and servers for a self-appointed Oligarchy.


Interlocking subversion in government departments can, of course, be successfully challenged by an informed electorate motivated to act. within the authority of the U.S. Constitution. (38)

FEMA can draw on the defense budget and on the protection of the secrecy reserved for national security projects because it came into being under President Jimmy Carter in a move that merged the civil defense and disaster relief responsibilities formerly shared by the Pentagon, the Commerce Department and the General Services Administration under a single powerful agency.


But FEMA's real focus is not on disaster relief, knowledgeable sources say. An investigation of this little-known agency, conducted earlier this year (1992) by the General Accounting Office (GAO), the congressional watchdog unit, has found that less than 10 percent of FEMA's staff - 230 bureaucrats out of an estimated 2,600 - are assigned full time to preparing for and dealing with major natural calamities such as storms or earthquakes.


What, then, is FEMA really up to? ...an advance copy of the GAO report on this secretive agency... The study's surprising findings have been reviewed with the help of well-placed confidential sources in order to bring into full view, for the first time, the federal bureaucracy's secret blueprint for tyranny in America. (17)

Back to Contents



THE FEDERAL BUREAUCRACY'S SECRET BLUEPRINT

FOR TYRANNY IN AMERICA

President Eisenhower's warning about the "Military Industrial Complex" should hit home. The term "Military Security" has become a shield behind which the American people are being systematically drained and defraud... Unlimited spending for weapons programs has become the means by which contractors have virtually unobstructed access to public funds. When you have contractors being reimbursed for expenses without documentation you have a license to steal.


Evidence that we are becoming a "Military Welfare State" is found in Public Law 85-804, which holds that contractors who are "deemed essential" to national defense must be protected against bankruptcy. This legislative legerdemain means that American citizens (taxpayers) are REQUIRED to underwrite
Incompetence, Waste, and even Fraud.


The Pentagon has been given the power to subsidize suppliers who have broken their contractual obligations. National security has become the facade behind which the National Treasury is being brazenly raided... (18)


FIGURE OUT WHAT MJTF POLICE, BATF, FINCEN and FEMA HAVE DRAWN INTO MESSING UP WITH THE EXECUTIVE ORDERS!!!



HISTORY OF EXECUTIVE ORDERS


Under the Constitution of the United States, the president is vested with the executive power of the government (Article II, Section I, clause I), the power to "preserve, protect and defend the Constitution" (Article II, Section I, clause 7) and the power to see that the laws are faithfully executed (Article II, Section 3).
From these powers is implied the authority to issue "executive orders" (EOs).


AN "EXECUTIVE ORDER" HAS NEVER BEEN DEFINED BY CONGRESS

In use from the earliest days of the republic, the executive order was at first employed mainly for the disposition of the public domain, the withdrawal of lands from federal reservations and for other similar purposes.


During World War I the use of the executive order was widened, as executive authority and power increased.


In the early years executive orders were not numbered, and since there was no uniform system for recording them the total of the unnumbered orders is unknown.


The validity of executive orders has been questioned many times, but a ruling as to the extent or limit to which they may be used has never been determined by the courts or by Congress (Library of Congress, Legislative Research service No.398/117-9).

The "Federal Register" contains the text of directives issued under the authority of the president. No congressional authorization is required. There is no review by the judiciary.


All EOs are laws made by one man: the president of the United States.


Through existing EOs, it is possible for one man to ignore the Constitution, Congress and the will of the people. A complete DICTATORSHIP can be imposed, "under color of law," on the American people.


On March 9, 1933 President Franklin Roosevelt declared a state of "National Emergency" to deal with the banking crisis. Later, he declared two other national emergencies as he led the United States into World War II.


Another state of emergency was declared by President Harry Truman in 1950 after Red China's intervention in the Korean War. Truman formally ended both the World War II emergencies in April of 1952, but expressly reaffirmed the 1950 declaration.


Presidents Dwight Eisenhower, John Kennedy, Lyndon Johnson and Richard Nixon also reaffirmed it as each took office. Nixon declared other national emergencies on March 23, 1970 and August 15, 1971.


A declaration by the president indicating a national emergency exists has always stopped short of Martial Law, although the president has that prerogative. Undoubtedly it would be exercised in the event of a major or nuclear attack on the United States.


The last use of Martial Law was in Hawaii a few hours after the attack on Pearl Harbor in 1941.


It is interesting to note that the tendency of martial law to perpetuate itself was demonstrated in that case. The military retained basic control of Hawaii until the Supreme Court in 1944 ruled that the continued use of martial law, long after the disaster conditions had ended, was un-Constitutional. (19)

Back to Contents



THE FRIGHTENING SIGHT OF DICTATORIAL POWERS


It is a frightening thought, but there are Executive Orders (EOs) on the books that made it possible for a president to ignore the Constitution and its cherished Bill of Rights, Congress, the judiciary and the very will of the American people.


It is a fact that a complete dictatorship can be imposed upon the people at nay time, simply by the president declaring a national emergency.


During the 1950s and 1960s, it was believed that the best way to bring about one-world government was by disarming the United States. Those who feared for America's Constitutionally guaranteed liberties, and rightfully so, warned that America would be disarmed and would become easy prey for the ever-expanding military power of the Soviet Union and Red China.


They particularly opposed the powers of the Arms Control and Disarmament Agency, established to disarm America.


Now, however, with Eastern Europe shaking itself free from the shackles of communism and those peoples exercising their nationalistic yearnings, disarmament by both sides has become a necessity to cure social ills plaguing the U.S. and former Soviet bloc countries. With the apparent failure of the Red military machine, the general movement has been toward as easing of the arms race.


From the newfound "friendship" with Eastern Europe and in particular from the so-called multinational effort against Iraq in the Persian Gulf, President George Bush rarely gives a speech or holds a press conference in which he fails to mention his thoughts about a "New World Order."


Now, however, a new method is needed to nullify America's treasured Constitution, and the insidious EOs have gained a new and even more dangerous part to play in the plotting of the one worlders of the Trilateralist-Bilderberger ilk.


The biggest danger of such schemes as those proposed by Rep. Newt Gingrich (R-Ga.) and Sen. Phil Gramm (R-Texas) is that any declared "national emergencies" would allow the president to activate repressive EOs signed by presidents going back to World War II.

Here are some of the EOs involved:

EO 10995, which provides for the takeover of the communications media. In other words, forget about freedom of the press.

EO 10997, which provides for the takeover of all electric power, petroleum, gas and other fuels and minerals.

EO 10998, which provides for the takeover of all food resources and the nation's farms.

EO 10999, which provides for the takeover of all modes of transportation, control of highways, seaports, etc.

EO 11000, which provides for mobilization of all civilians into work brigades under government supervision. In other words, slave labor.

EO 11001, which provides for government takeover of all health, education and welfare functions.

EO 11002, designates the postmaster general to operate a national registration of all persons.

EO 11003, which provides for the government to take over airports and aircraft.

EO 11004, which provides for the Housing and Finance Authority to relocate communities, designate areas to be abandoned and establish new locations for populations.

EO 11005 which provides for the government to take over railroads, inland waterways and public storage facilities.

All of the above orders were combined by President Richard Nixon into the notorious EO 11490... which allows all of these insidious things to take place if a national emergency is declared.


Here are some direct quotes from the 40-page Nixon EO:

"Develop plans and procedures for the Department of Defense utilization of non-industrial facilities in the event of an emergency in order to reduce requirements for new construction and to provide facilities in a minimum period of time..."

In other words, The confiscation of private property.

"Develop plans and procedures for the provision of logistical support to members of foreign forces, their employees and dependents as may be present in the United States under terms of bilateral or multilateral agreements which authorize such support in the event of a national

In other words, prepare for the billeting of foreign troops in your home contrary to the Third Amendment.

"Develop emergency plans for the control for alien enemies and other aliens within the United States. The lo0cation, restraint or custody of aliens.''


"The Secretary of Labor shall have primary responsibility for preparing national emergency plans and developing preparedness programs covering civilian manpower resources."

Preparation can be undertaken for forced labor.

"Provision for regulation of money and credit in accordance with the needs of the economy, including the acquisition decentralization and distribution of emergency supplies of currency; the collection of cash items and non-cash items; and the conduct of fiscal agency and foreign operations.


"Provision for the continued or resumed operation of banking, savings and loan, and farm credit institutions, including measures for the recreation of evidence of assets or liabilities destroyed or inaccessible.


"Regulation of the withdrawal of currency and the transfer of credits including deposit and share account balances."

Then along come President Jimmy Carter and EO 12148, titled the Federal Emergency Management Act. All prior EOs having anything to do with emergency planning were incorporated into it. This EO gives the president absolute power during any "emergency" so declared by him.


From Carter's machinations emerged a totally new bureaucracy, the Federal Emergency Management Agency (FEMA) which assumed control of a chain of older "emergency agencies", including the Federal Disaster Assistance Administration, the National Weather Service, the Federal Emergency Broadcast System and about a dozen others.


In an "emergency", FEMA was, through EO 12148, to virtually take over the key functions of the national government by means of "senior representatives" and "liaison a-gents" now positioned in every major government agency.


Incredibly, FEMA even has the power to assume the duties of the president himself.


...Those who want to know the complete truth about its not-so-innocent nature only need to peruse Carter's EO 12148, as it appeared on July 24, 1979, in the Federal Register, and as it was reprinted in the May 26, 1980 issue of The SPOTLIGHT.


Finally, President Ronald Reagan updated this EO in his last full year in office on November 18, 1988, leaving his successor, Bush, the tools to create a dictatorship, his "New World Order". (20)


Then came up to the top of the top, the EO 11051:

"The Director of the Office of Emergency Planning authorized to put Executive Orders into effect in 'times of increased international tension or financial crisis'. He is also to perform such additional functions as the President may direct." (21)

The Director...:

It is not specified civilian or elected; may concern anybody, even a close political friend... times of increased international tension or financial crisis: may be related to absolutely anything outside to continental United States, like a major crisis in the Middle East or in Yugoslavia or even in Russia.... May also concern a "Crash" created by a sudden "Coup" in Russia...

Finally, has been created the most unknown HR 4079:

"Forty-eight of your tax-paid congressmen sponsored the Newspeak-named 'National Drug and Crime Emergency Act' which could cost you more than $30 TRILLION and imprison 30 MILLION Americans. ...here's what that Constitution-scuttling measure could do:

Declare a five year "Emergency" imposing martial rule. ?Impose testing for drug and alcohol use.

Authorize mass expulsion of drug and alcohol users from public and private high schools and college and fire any workers using drugs.

Accelerate confiscation of cars, boats, planes, other property of casual drug users.

Set much higher mandatory sentences for drug and alcohol use. Previous maximum sentences would become minimum sentences.

Allow revocation of probation, parole and suspended sentences.

Reopen World War II Japanese 'Relocation Centers' as concentration camps.

Activate military bases as prisons to 're-educate' Americans.. Create a new private prison system.

In effect, suspend the 4th Article in Amendment (the 'Bill of Rights') to our Constitution which prohibits unreasonable searches and seizures, and the 8th Article in Amendment which prohibits excessive fines, bail or punishment. Police would have legal right to break into any home WITHOUT a search warrant, arrest any person, and hold him WITHOUT CHARGE INDEFINITELY.

In effect, 'legalize' slave labor by amending present law that restricts purchase of goods and services by prisoners." (22)

Back to Contents



THE WHITE HOUSE 1991 PRESS DOCUMENT

Saturday, July 16, 2011

Facebook is a CIA-Funded Data-Mining Project! Learn The Truth: Your Privacy is GONE, BABY, GONE!

Behind Facebook—A New World Order Agenda?

The social networking website Facebook launched February 2004 and rose to the number one social networking spot in competition with Myspace. Facebook was founded by Mark Zuckerberg with his college roommates and fellow computer science students Eduardo Saverin, Dustin Moskovitz, and Chris Hughes. Facebook had 138.9 million monthly unique U.S. visitors in May 2011. And, over 50% of Americans have a Facebook Account. The next largest block of accounts are in Western Europe. As of January 2011 there are over 600 million Facebook users.

It doesn’t take much forethought to realize that there are countless privacy pitfalls in a world where a near-endless stream of personal bits is indiscriminately posted, indefinitely stored, and quietly collected and analyzed by marketers, identity thieves, and professional government snoops in America and abroad. The public controversies that have erupted to date—Facebook’s drastic terms of service changes and Google Buzz’s forced sharing of email contacts are only the first snares in a rapidly growing thicket of social networking privacy issues.

In 2007 the success story of Facebook spread across the blogosphere. A complex but riveting Big Brother-type conspiracy theory which links Facebook to the CIA and the US Department of Defense.

When a website, movie, news article, book, or any media element that excels and rises to a number one spot, you can be assured that there is illuminati/governmental influence and funding behind the success!


Controversial Changes on Facebook:
April 2011: Facebook quietly switches on facial recognition tech by default. Facebook has rolled out its facial recognition technology, but has switched the feature on by default without telling its users first. The Mark Zuckerberg-run company started using its facial recognition software in December last year for its Stateside users in a move to automatically provide tags for the photos uploaded by Facebook users.

November 6, 2007, Facebook launched Facebook Beacon, which was an ultimately failed attempt to advertise to friends of users using the knowledge of what purchases friends made.
May 2011: Facebook Beacon Returns… New & “Improved”
February 2009: Facebook Facebook’s New Terms Of Service: “We Can Do Anything We Want With Your Content. Forever.”
December 2009: Privacy Group Files Complaint on Facebook Changes
May 2010: Facebook Rolls Back Some Key Privacy Changes
December 2010: Controversial Changes @ Facebook
January 2011: Facebook reverses controversial privacy changes
The voting system for Privacy Changes for Facebook
Writers for The Wall Street Journal found in 2010 that Facebook apps were transmitting identifying information to dozens of advertising and Internet tracking companies. The apps used an HTTP referrer which exposed the user’s identity and sometimes their friends’. Facebook said, “We have taken immediate action to disable all applications that violate our terms”

The Evolution of Privacy on Facebook created by Matt McKeon illustrating the progression of changing the default settings. For current updates of the chart below click on the image.



“Most Facebook users still don’t know how to set their privacy options safely, finding the whole system confusing. It’s even harder though to keep control when Facebook changes the settings without your knowledge.”



Facebook shouldn’t require its users to constantly check their privacy settings to see what the company has changed since their last visit to the site. The onus should not be on Facebook users having to ‘opt-out’ of the facial recognition feature, but instead on users having to ‘opt-in’. The tech works by scanning newly uploaded pics and then identifies faces from previously tagged photos already stored in Zuckerberg’s internet silo. Is Facebook eroding the online privacy of its users by stealth?

The Truth about Facebook:

Facebook is CIA-Funded Data-Mining Project:
The prime question to ask is if Facebook is not being used for Intelligence agencies such as the CIA and Mossad? And, why is Chris Hughes on the guest list of the Bilderberg meeting of 2011? Do you really believe the boys from collage are not Zionists and tie themselves with the New World Order agenda considering the history of controversial changes that they were forced to withdraw and change because of public opinion.

Facebook.com has become a One World Global Database under the guise of “social networking” where deluded people put their most personal information OPENLY and VOLUNTARILY…forget using loyalty cards, they can be tracked directly
Facebook’s first round of venture capital funding ($500,000) came from former Paypal CEO Peter Thiel. Author of anti-multicultural tome ‘The Diversity Myth’, he is also on the board of radical conservative group VanguardPAC. The second round of funding into Facebook ($12.7 million) came from venture capital firm Accel Partners. Its manager James Breyer was formerly chairman of the National Venture Capital Association, and served on the board with Gilman Louie, CEO of In-Q-Tel, a venture capital firm established by the Central Intelligence Agency in 1999. One of the company’s key areas of expertise are in “data mining technologies”.

Breyer also served on the board of R&D firm BBN Technologies, which was one of those companies responsible for the rise of the internet. Dr Anita Jones joined the firm, which included Gilman Louie. She had also served on the In-Q-Tel’s board, and had been director of Defense Research and Engineering for the US Department of Defense. She was also an adviser to the Secretary of Defense and overseeing the Defense Advanced Research Projects Agency (DARPA), which is responsible for high-tech, high-end development.

With facebook on GPS/smart phones, possibly someday you can Google a Facebook user, and it will tell you their exact precise location…possibly the CIA has this technology available to them now
Wikipedia’s IAO page says: “the IAO has the stated mission to gather as much information as possible about everyone, in a centralized location, for easy perusal by the United States government, including (though not limited to) internet activity, credit card purchase histories, airline ticket purchases, car rentals, medical records, educational transcripts, driver’s licenses, utility bills, tax returns, and any other available data.”. Not surprisingly, the backlash from civil libertarians led to a Congressional investigation into DARPA’s activity, the Information Awareness Office lost its funding.

It would be understandable to view Facebook as the IAO’s new mask considering there are 138 million users as of 2011. Parts of the IAO’s technology round-up included ‘human network analysis and behavior model building engines’, which Facebook’s massive volume of neatly-targeted data gathering indeed allows a convenient replacement.

Source: NZHerald

If you not convinced yet, view Facebook CIA Project on The Onion News Network: It’s a spoof, but, sure has a ring of truth.

The Progressional Change Privacy Policy on Facebook
Facebook has become a platform where you have no choice but to make certain information public, and this public information may be shared by Facebook with its partner websites and used to target ads.

Facebook Privacy Policy circa 2005:
No personal information that you submit to Thefacebook will be available to any user of the Web Site who does not belong to at least one of the groups specified by you in your privacy settings.

Facebook Privacy Policy circa 2006:
We understand you may not want everyone in the world to have the information you share on Facebook; that is why we give you control of your information. Our default privacy settings limit the information displayed in your profile to your school, your specified local area, and other reasonable community limitations that we tell you about.

Facebook Privacy Policy circa 2007:
Profile information you submit to Facebook will be available to users of Facebook who belong to at least one of the networks you allow to access the information through your privacy settings (e.g., school, geography, friends of friends). Your name, school name, and profile picture thumbnail will be available in search results across the Facebook network unless you alter your privacy settings.

Facebook Privacy Policy circa November 2009:

Based on ConsumersReports.org on May 2011, there are 7.5 million children under 13 with accounts violating the Facebook’s Terms
Facebook is designed to make it easy for you to share your information with anyone you want. You decide how much information you feel comfortable sharing on Facebook and you control how it is distributed through your privacy settings. You should review the default privacy settings and change them if necessary to reflect your preferences. You should also consider your settings whenever you share information.
Information set to “everyone” is publicly available information, may be accessed by everyone on the Internet (including people not logged into Facebook), is subject to indexing by third party search engines, may be associated with you outside of Facebook (such as when you visit other sites on the internet), and may be imported and exported by us and others without privacy limitations. The default privacy setting for certain types of information you post on Facebook is set to “everyone.” You can review and change the default settings in your privacy settings.

Facebook Privacy Policy circa December 2009:
Certain categories of information such as your name, profile photo, list of friends and pages you are a fan of, gender, geographic region, and networks you belong to are considered publicly available to everyone, including Facebook-enhanced applications, and therefore do not have privacy settings. You can, however, limit the ability of others to find this information through search using your search privacy settings.

Facebook Privacy Policy circa April 2010:
When you connect with an application or website it will have access to General Information about you. The term General Information includes your and your friends’ names, profile pictures, gender, user IDs, connections, and any content shared using the Everyone privacy setting. … The default privacy setting for certain types of information you post on Facebook is set to “everyone.” … Because it takes two to connect, your privacy settings only control who can see the connection on your profile page. If you are uncomfortable with the connection being publicly available, you should consider removing (or not making) the connection.

Facebook’s own Terms of use state, 2011:
“For content that is covered by intellectual property rights, like photos and videos (“IP content”), you specifically give us the following permission, subject to your privacy and application settings: you grant us a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook (“IP License”). This IP License ends when you delete your IP content or your account unless your content has been shared with others, and they have not deleted it.”

Viewed together, the successive policies tell a clear story. Facebook originally earned its core base of users by offering them simple and powerful controls over their personal information. As Facebook grew larger and became more important, it could have chosen to maintain or improve those controls. Instead, it’s slowly but surely helped itself, and its advertising business partners and possibly intelligence agencies to more of its users’ information, while limiting the users’ options to control their own information.

Source IFF

Zionists Control the Internet!
If you have wondered why Facebook, Twitter, Google, Dell, and Paypal dominate the internet, researching the founder and their Zionist relations may answer the question.

Mark Zuckerberg, Eduardo Saverin, Dustin Moskovitz of Facebook
Christopher Isaac “Biz” Stone co-founder of Twitter. Most sources give Jack Dorsey credit as the founder of Twitter, however Jack Dorsey is a co-founder.
Larry Page and Sergey Brin, founders of Google
Google also owns “Blogger” and YouTube
Peter Thiel Founder of Paypal, and original founder for Facebook
Michael Saul Dell, founder of Dell
Larry Ellison, founder of Oracle
Phillipe Kahn, founder of Borland.
Steve Ballmer CEO of Microsoft.
Bill Gates is of the 13 bloodlines of the Illuminati called the Saxe-Coburg-Gotha line (Winsor)
Robert Kevin Rose founder of Digg.com. Digg is rated among the 100 most popular sites on the web.
Scott Blum founded Buy.com
Rob Glaser found RealNetworks and Real Player
What would the Internet be like with Google, PayPal, Facebook, Digg.com, Buy.com?

Non-Zoinist #1 Internet companies of the late 1990s
America Online, founder William von Meister
Yahoo, founders Jerry Yang and David Filo, the stock all time high was January 3, 2000
Netscape
My Space founders Chris DeWolfe Tom Anderson 2003
Watch Mark Zuckerberg gets hot under the collar over your privacy issues and sweats:

Ironically, Chris Hughes is a guest at the 2011 Bilderberg Meeting in Switzerland.

How to Delete Your Facebook Account:
Before you permanently delete your account, there is an option to download all of your data. I recommend doing that first, but it may take a few hours to complete. Once your download is done and you complete the deletion process. Be sure not to return to Facebook in any form for at least 14 days or your account will be transitioned from the Deletion queue to Deactivated status.

The links below will take you directly to the “Delete” account button, which is generally difficult to find (by design no doubt).

https://www.facebook.com/group.php?gid=16929680703

http://www.facebook.com/help/contact.php?show_form=delete_account

The Deactivation link is easy to find within your Account settings. That is FB’s preference because they’re “banking” on the expectation that you’ll be back.

Monday, July 11, 2011

HOLOGRAPHIC "MYSTERY" CITY APPEARS MYSTERIOUSLY IN CHINA: PROJECT BLUE BEAM APPEARS TO BE RAMPING UP

Project Blue Beam?

Which 'mystery' city appeared in a mirage in eastern China on Thursday?

[Photo: Mystery skyline of unknown city appears via 'optical illusion' in eastern China city of Huangshan]
An amazing video news report from China of an ‘optical illusion’ that appeared at approximately 5 PM, local time on Thursday in eastern China at the Tunxi section of the Xin’an River in Huangshan City, the mirage, a spectacular skyline of a city and mountains. According to the news report in the video, the latest ‘optical illusion’, one of several that have been recently seen in the area. We wondered, does anyone know the identity of the ‘mystery’ city? Was the optical illusion a ‘real city’? In 2005, an earlier ‘optical illusion’ was seen by thousands of residents of Penglai City for ‘four hours’. The illusion or mirage, clear enough to see ”bustling cars as well as crowds of people all clearly visible’. According to the scientific explanation, these types of mirages, ‘superior’ mirages, are ‘impressions’.
Video of ‘city skyline’ optical illusion filmed in Huangshan, China, on Thursday, June 16, 2011:
<iframe width="560" height="349" src="http://www.youtube.com/embed/_0M_tVsGaGM" frameborder="0" allowfullscreen></iframe>

The mirage or optical illusion has some wondering if the illusion is related to NASA’s Project Blue Beam and/or HAARP?
On May 7, 2005, another city skyline ‘optical illusion’ that appeared after a heavy rain off the shore of Penglai City in eastern China’s Shandong Province. During the four hour appearance thousands of residents in Penglai City saw not only a city, the residents witnessed ‘bustling cars as well as crowds of people all clearly visible’.
Over at the U.K.’s Weather Online website, the explanation of mirages and optical illusions. Based on their explanation, the mysterious mirage cities seen in China are ‘superior mirages.’
[Snip]
A famous superior mirage is the Fata Morgana , most frequently seen in the Strait of Messina between Italy and Sicily. However, Fata Morgana’s are also frequent in deserts, after night time radiation has cooled down the sand to temperatures lower than the air above. Distant objects appear extremely elongated, giving the impression of buildings and towns in the distance. This phenomenon is also known as ‘castles in the air’.
‘Impressions’ that include cars and people.

Sunday, July 10, 2011

"NASA, White House, Operatives Pushing Psyops Meme Around Comet Elenin": THIS REPORTER MUST BE READING MY BLOG!

Check out this recent article from the Seattle Examiner. Pretty much every single source contained in this report can be found in previous article I have written and posted on this very blog (see archives). I disagree with a few minor points this reporter makes, but all and all, he does a good job synthesizing and integrating much of the material you will find right here on my blog.

One thing this reporter leaves out, which I feel is of great importance: NASA PROJECT BLUE BEAM. Those of you who read my articles regularly know that Project Blue Beam requires a fear-provoking space threat, dubbed "Planet X". For many months now I have been pointing to the fact that these viral videos regarding Comet Elenin, Planet Nibiru, and Planet X are obvious examples of Project Blue Beam being rolled out, even as I write this.

Wake Up, World, to the truth of Project Blue Beam, Advanced Tesla Technology (including HAARP), and 3-D Holographic realities - Coming To A Sky Near You Soon.

ARTICLE: NASA, White House, operatives pushing psyops meme around Comet Elenin
Alfred Lambremont Webre, Seattle Exopolitics Examiner http://m.examiner.com/exSeattle/db_/contentdetail.htm?contentguid=dFASbd2x&full=true#display
(Even amateur astronomer Elenin himself disagrees with all these fear-mongering reports about Comet Elenin)


A subtle psyops – psychological warfare operation – intended to engender public fear and apprehension around Comets Elenin, Levy and Honda (all expected to pass near Earth in the Fall of 2011) may be part of a future false flag environmental war attack on specific human settlements and populations using the HAARP-Chemtrails tectonic and weather warfare system.

Statements by NASA officials , the White House , and specific statements falsely attributed to operatives formerly associated with NASA such as Richard C. Hoagland infer or explicitly state that Comet Elenin’s near passage to Earth may create an “extinction level event (ELE)”.

NASA email and video to employees

Recently, NASA took the unusual step of sending an explicit disaster preparedness email to its employees, stating, "NASA is the only federal agency responsible for its people’s safety and well-being here on Earth and in space and has a longtime commitment to safety and emergency preparedness. Over the past year, Administrator Bolden has emphasized the importance of Family/Personal Preparedness for the entire NASA family. Family and personal preparedness plans are key to protecting our families and communities during potential emergencies such as fires, floods, earthquakes, hurricanes, tornadoes, terrorist attacks and other unforeseen catastrophes.

White House letter: Smoking gun that Elenin is a threat or Psyops promoter?

On Oct 15, 2010, the White House issued a letter highlighting the hazards of near earth objects including comets. One fair interpretation of the White House letter is that its timing may be part of the Comet Elenin psyops.

One source that is reporting on the White House promotion of the Comet Elenin psyops as though it were a genuine threat states,

“Comet Elenin: White House letter addresses "US Must Prepare For Comet Collision With Earth"


"We had previously reported how Planetary Alignments with Comet Elenin Causing Big Earthquakes. And about Comet Elenin HUGE MASS, as objects with smaller mass having short elliptic al Orbit, from 2 up to 1000 years or so like Asteroids or Comets. The fact that Elenin comet (C2010 X1) enters our solar system close to the ecliptic with a Period of ~11’800 Years (Long Period Orbit), makes this Object very dangerous.

"In latest development now we learns 10 page letter is already out on the web since October 2010, which proves that US NASA and the White House know about ELENIN and consider it “a real threat” (On October 11, 2011 Elenin will be only 0.246au away from Earth; that’s a quarter of the distance to the sun.) it`s possible even more dangerous against earth than we understand.

"They are calculating and preparing to if possible take action against this Comet. John Holdren, director of the White House Office of Science and Technology Policy, or OSTP, outlines plans for “(A) protecting the United States from a near-Earth object that is expected to collide with Earth.

"Interestingly, Comet C/2010 X1 (Elenin) was only 'discovered' by civilian Leonid Elenin on December 10, 2010, in the official White House letter below, written back in late October 2010, the White House addressed the possibility of an Comet/Asteroid striking the Earth.

"The terminology used in this letter, along with several other facts that have emerged in the time since the letter was written, lead us to believe that our 'shadow' government and elements within NASA have long known that anticipated effects of the arrival of Comet Elenin would indeed be much greater than they are telling the public. In fact, we believe that the White House letter below may be the 'smoking gun' to help prove that the government indeed does know that the potential consequences facing planet Earth from this comet will be far more disastrous than what they are “officially” telling the public.

White House Letter - Source: http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp-letter-neos-house.pdf

"In breaking down this letter, it’s important to address several questions that have since more recent information come to light. After the letter above clearly shows how important it is to monitor such incoming objects due to their propensity to “change” orbit? Why was it that NASA turned off the granddaddy of all NEO (Near Earth Objects) telescopes & SETI ATA this year?

"Flashback Quote: "The WISE spacecraft will remain in hibernation without ground contacts awaiting possible future use." The SETI ATA has been in hibernation - a safe mode of sorts, where “the equipment is unavailable for normal observations since April 15, 2011. Universetoday.com Why are we not getting any straight information from mainstream media about Comet Elenin 2011 while most Google searches on Elenin will bring you straight to the alternative news sites throughout the world?

Yet the evidence suggests that Comet Elenin is no threat and the White House and NASA communications and other actions are part of a psyops to make it seem that Comet Elenin is a threat.

Richard Hoagland, Sorcha Fall, Elenin and disinformation psyops


One notorious disinformation website, Sorcha Faa l, openly reports Richard C. Hoagland as predicting coming Earth catastrophes associated with Comet Elenin as in psyops terms. According to Kerry Cassidy of Project Camelot, this is contrary to Mr. Hoagland's statements at a recent Project Camelot Forum on Comet Elenin in which Mr. Hoagland did not state that Comet Elenin may bring an extinction level event.

Sorcha Faal reports,

“July 7, 2011

“Top US Space Expert Issues Catastrophic Warning On Comet Elenin

“By: Sorcha Faal, and as reported to her Western Subscribers

“A grim warning was issued this past week by the former NASA consultant and noted US space expert Richard C. Hoagland that the newly discovered comet named Elenin, designated C/2010 X1, that is fast approaching our Sun is under “intelligent control” and heralds a warning to all humanity of a great Global catastrophe soon to come.

“According to Hoagland’s report, the significance of the name ‘Otto Matic’ being associated with Comet Elenin lies with it only being able to be associated with a video game developed by Pangea Software, published by Aspyr Media and then released to the public on 11 September 2001, the same day the United States suffered a crippling attack.

“Hoagland further asserts in his report that is “beyond coincidence” that Comet Elenin is scheduled make its closest approach to the Sun on the 10th anniversary of the 9/11 attacks, 11 September 2011, and that on 11 November 2011 (11-11-11) its orbit will carry it into a “grand alignment” between itself, the Earth and other planets in our Solar System.

“For the ‘secret meaning’ hidden from normal public view about Comet Elenin, Hoagland says, one must know about the ‘Otto Matic’ video game,

“It should, likewise, be noted about this comet that its Russian discover may itself be a ‘secret code’ in that the first three letters of his first name contains the exact constellation Comet Elenin is approaching our Earth from (LEOnid) and the first three letters of his last name eerily gives the most dreaded designation a comet can have, ELE…Extinction Life Event. “

Psyops-like predictions were also mistakenly attributed to Mr. Hoagland by PakalertPress.com, as part of an apparent Elenin psyops. at:

http://www.pakalertpress.com/2011/07/08/top-us-space-expert-issues-catastrophic-warning-on-comet-elenin/

Russian astronomer LEONID ELENIN comes out to debunk the "Extinction Level Event" psyops

Readers can watch a video interview in which Leonid Elenin, a 29-year-old Russian astronomer on the staff of the International Astronomical Search Collaboration (IASC ), comes out publicly on Russian TV to debunk the catastrophe psyops circulated by entities such as NASA, the White House. The video is embedded in article above and can be accessed at the URL below:

WATCH VIDEO


http://www.youtube.com/watch?v=MD-V6KmiB78

In this interview, among other facts, Mr. Elenin states that the photographic effects around Comet Elenin that have been interpreted by a number of analysts including Richard C. Hoagland and Dr. Michael Salla of the Exopolitics Institute as UFO spacecraft are in fact effects caused by photographic artifacts and not evidence of extraterrestrial UFOs following Comet Elenin, or evidence that Comet Elenin is a piloted UFO craft.

Mr. Elenin also states in the interview that a false Facebook account was opened under his name and that this account has been instrumental in promoting the Comet Elenin catastrophe psyops.

This reporter Alfred Lambremont Webre has previously reported on the deep interpenetration of Facebook and the total information access program of the U.S. Department of Defence, raising questions as to whether the false Facebook identity may be part of a covert black budget strategy around Comet Elenin to create the conditions for a another false flag environmental war attack on the heels of the March 11, 2011 Fukushima tectonic warfare attack, triggered by the HAARP-chemtrails weapons system.

Please refer to: Facebook at 517 million users suppresses ET/UFO disclosure with cointelpro spying, censorship

http://www.examiner.com/exopolitics-in-seattle/facebook-at-517-million-users-suppresses-et-ufo-disclosure-with-cointelpro-spying-censorship


Comet Elenin is not a danger to the earth

A science-based source dedicated to debunking the attempted Leonid psyops states, "Comet C/2010 X1 (Elenin) is a comet discovered by Russian astronomer Leonid Elenin on December 10, 2010. Elenin was using a robotic observatory near Mayhill, New Mexico. Mr. Elenin is an amateur1 astronomer from Lubertsy City, Russia, near Moscow2. He is a graduate of the Moscow Aviation Institute3, works as a researcher at the Keldysh Institute of Applied Mathematics (Russian Academy of Sciences), is married, and is bilingual (Russian and English). He volunteers with the International Astronomical Search Collaboration, and runs a website at http://SpaceObs.org . He has had a passion for astronomy since childhood, and studies minor Solar System objects and variable stars. He has discovered more than 10 variable stars and numerous asteroids, and now, a comet.

"On December 11th, 2010, Leonid Elenin posted news on his site of a 'new and interesting object' discovered during a 'routine survey of the sky on Dec. 10, 2010'. The discovery was made at the independent Russian remote observatory ISON-NM, which is located near Mayhill, New Mexico. The observatory is operated under the Russian project ISON (International Scientific Optical Network). His observations were confirmed by Aleksei Sergeyev and Artyom Novichonok at Madinak Observatory in the Ukraine.

"Initially the comet was thought to be a short period comet, with aphelion near the orbit of Jupiter, and a perihelion inside the orbit of Earth. However, over a week after its discovery, the Minor Planets Center at Harvard published the orbital elements8, revealing that the perihelion would be near Mercury! It was still unclear as to whether this was a rogue (a one time event) or a periodic comet. Further observations and calculations show that its period is on the order of 10,000 years, and that this is likely its first pass through the inner solar system. This leads to the prospect of a very bright comet in 2011.

Hyperbolic Comet

" According to the JPL Small Body Database , C/2010 X1 is a Hyperbolic Comet, meaning that it will not return. However, Leonid Elenin has calculated that due to perturbations to the comet's orbit from the gas giant planets, that the orbit of his comet will be modified to a long-period elliptical orbit, and that it will return in about 10,000 years. Comet Elenin is in an orbit that is close to the plane of the ecliptic. It is currently just past opposition and about 3 times farther away from us than we are from the sun.

"In August 2011, Elenin will become a naked-eye visible object, as it sweeps in closer to the sun than the Earth is.

"By September 1st, 2011, Comet Elenin will approach the orbit of Mercury, and it will reach Perihelion on September 5th. In just a little over a month it will have traveled from the orbit of the Earth to the Orbit of Mercury. At this point it will be so close to the sun from our vantage point that it will be completely hidden. However, it will be visible on solar-observing spacecraft such as STEREO and SOHO.

"On October 17th, 2011, Comet Elenin will make its closest approach to the earth. However, its distance to the Earth will still be huge, nearly a quarter of the distance between the earth and the sun.

Seeding the Comet Elenin psyops

There appears to be a concerted effort by a command and control network within NASA, the White House, and amongst information operatives creating false statements by individuals like Richard C. Hoagland to create a fear-based psyops around Comet Elenin. Functionally, the psyops appears to be attempting to create a collective fear or “buy in” by some portion of humanity of coming comet-caused catastrophe. This fear or meme may be necessary to carry off a planned Fall 2011 false flag catastrophe incorporating the symbology of destructive comets, the Mayan calendar and an End of the World motif.

The Comet Elenin psyops falsely links a coming Fall 2011-Spring 2012 catastrophe with “astronomically-caused catastrophes” such as the 2004 Boxing Day tsunami and the March 11, 2011 Fukushima earthquake-tsunami. In fact, the Indonesia tsunami and Fukushima were in both false flag environmental war attacks triggered by the HAARP-chemtrails weapons system.

One source states , “Instead of being excited about the possibility of a naked-eye visible comet, some people are making some very strange and wild claims about the comet, or about Leonid Elenin. Some people are apparently questioning whether Leonid Elenin is even a real person, despite the fact that he is acknowledged as a contributor in various scholarly journal articles since 2009.

Elenin will not collide with the earth


“At its closest approach, Comet Elenin will be 34 million kilometers (21 million miles) away from the Earth. It will also be 4 million kilometers (2.4 million miles) above the orbit of the earth.

The Earth will not pass through Elenin's Tail

“A common misconception of comets is that the tail streams out behind the comet. Even if that were the case, the images and video above show that we would not pass through the tail. However, the tail of a comet does not stream out behind the comet's path, but rather points away from the sun. As such, the tail will never be in a position to cross the path of the earth.

“Even if the earth were to pass through the tail of the comet, the only effect on the earth would be a nice show of meteors. Perseid meteor shower occurs every year between August 9 and 13 when the Earth passes thru the orbit of Comet Swift-Tuttle. Comet Halley is the source of the Orionid shower in October.

Leonid Elenin is a real person

The Comet Elenin psyops seems to include erasing Mr. Elenin’s real human identity and substituting a coded message for his public identity. “It has been claimed that "Leonid Elenin" does not, in fact, exist, but that instead his name is a 'coded message'.”

One article falsely quoting Richard C. Hoagland’s as giving a psyops-like presentation of an extinction level event threatened by Comet Elenin states, “It should, likewise, be noted about this comet that its Russian discover may itself be a “secret code” in that the first three letters of his first name contains the exact constellation Comet Elenin is approaching our Earth from (LEOnid) and the first three letters of his last name eerily gives the most dreaded designation a comet can have, ELE…Extinction Life Event.”

One expert, Don Yeomans, states about C/2010 X1 , "So you've got a modest-sized icy dirtball that is getting no closer than 35 million kilometers," said Yeomans. "It will have an immeasurably miniscule influence on our planet. By comparison, my subcompact automobile exerts a greater influence on the ocean's tides than comet Elenin ever will."

NASA's David Morrison on Comet Elenin states , “The comet never comes close to the Earth, but it is expected to be visible in binoculars during August and October. Part of the Internet chatter concerns its size. Comets are exceedingly small and enveloped in a tenuous cloud of gas and dust, so the only way to be sure of their actual dimensions is to visit with a spacecraft. This means its mass is less than one billionth the mass of the Earth. Needless to say, we will not be aware of the tiny gravitational pull from Elenin."

HAARP-chemtrails weapons system, not Elenin, triggered Fukushima earthquake


Contrary to the assertions of the Comet Elenin psyops meme, the Fukushima earthquake-tsunami of March 11, 2011 was, according to the best available evidence, triggered by the HAARP-aerosol chemtrails tectonic weapons system, most probably the HAARP facility in Tromso, Norway.

Although some scientists, such as Dr. Mensur Omerbashich of Bosnia , claim that Comet Elenin was responsible for the March 11, 2011 Fukushima event, the forensic evidence indicates that the Fukushima earthquake was triggered by the HAARP-chemtrails weapons system.

Hypothetically, Comet Elenin may have figured in the March 11, 2011 Fukushima environmental warfare false flag operation in at least two ways.

(1) The HAARP-chemtrails weapons system may have taken advantage of the specific planetary alignment of Comet Elenin with Earth on March 11, 2011 to trigger an earthquake that otherwise would not have taken place. This alternative is consistent with the principles of environmental warfare, which uses the forces of natural systems, including astronomical systems, against target populations or structures.

(2) The perpetrators of the March 11, 2011 Fukushima environmental warfare false flag operation may have synchronized their triggering of the HAARP-chemtrails weapons system with specific planetary alignments of Comet Elenin so as create a psyops deception that there was a causal connection between Comet Elenin and the Fukushima earthquake.

HAARP-chemtrails weapons system caused Fukushima disaster


The following articles as interviews contain irrefutable forensic evidence that the HAARP-chemtrails weapons system as causally responsible for the March 11, 2011 Fukushima disaster.

1. Leuren Moret: Fukushima HAARP nuclear attack by CIA, DOE, BP for London banks

http://www.examiner.com/exopolitics-in-seattle/leuren-moret-fukushima-haarp-nuclear-attack-by-cia-doe-bp-for-london-banks

2. VIDEO: Leuren Moret - Fukushima HAARP nuclear attack by CIA, DOE, BP for London banks

http://www.examiner.com/exopolitics-in-seattle/leuren-moret-fukushima-haarp-nuclear-attack-by-cia-doe-bp-for-london-banks-video


3. YOU TUBE - Leuren Moret: Fukushima HAARP nuclear attack by CIA, DOE, BP for London banks

http://youtu.be/htsWup50i3E


4. Leuren Moret: Fukushima tectonic nuclear warfare monitored by world partners

http://www.examiner.com/exopolitics-in-seattle/leuren-moret-fukushima-tectonic-nuclear-warfare-monitored-by-world-partners

5. VIDEO: Leuren Moret - Fukushima tectonic nuclear warfare monitored by world HAARP partners

http://www.examiner.com/exopolitics-in-seattle/leuren-moret-fukushima-tectonic-nuclear-warfare-monitored-by-world-haarp-partners-video

6. YOU TUBE: Leuren Moret - Fukushima tectonic nuclear warfare monitored by world HAARP partners

http://youtu.be/Z95xcFW8lPU

Comet Elenin, 2004 Indonesia Boxing Day tsunami, Fukushima, and a coming natural catastrophe

Dr. Mensur Omerbashich also argues that planetary alignments caused the December 26, 2004 Indonesian earthquake and tsunami in which 250,000 persons lost their lives. One observer writes , “The debate over Elenin's significance has been dramatically changed with the emergence of a Bosnian scientist who has released a remarkable paper tracking the relationship between planetary alignments and seismic (earthquake) activity on the Earth. Dr. Mensur Omerbashich claims that since 2006, comet Elenin has had a measurable impact on the Earth's seismic activity. If Dr. Omerbashich is correct, then we can expect a rapid surge in seismic activity in terms of major earthquakes as Elenin approaches the Earth during the latter part of 2011.

“Dr. Omerbashich's paper was released on April 11, 2011 and is titled "Astronomical Alignments as the cause of ~M6 + seismicity." His basic idea is that as planetary bodies align with the Earth, that seismic activity increases. He provides historic data on large earthquakes, greater than magnitude 6, and how these have occurred during planetary alignments. For example, he notes that the 9.1 earthquake that hit Indonesia on December 26, 2004 causing over 230,000 deaths around the Indian Ocean, occurred when the Earth, Mercury and Venus were in alignment. At first, the planetary alignment thesis seems puzzling since it's not obvious what is happening during an alignment that would cause seismic behavior on Earth.

“Dr. Omerbashich doesn't explain the dynamic processes behind planetary alignments and how these impact on seismicity. He simply provides historic data suggesting that physical processes are indeed occurring during an alignment that cause the seismic activity.”

Yet, forensic analysis since the 2004 Boxing Day tsunami has clearly shown that this event was more probably than not an environmental warfare false flag operation, involving the HAARP-chemtrails weapons system, and perhaps 4th generation nuclear weapons.

See, for example:

http://www.ecologynews.com/ecologynews103.html

The same observations regarding the possible relationship of planetary alignments with regard to the March 11, 2011 Fukushima false flag operation can be applied planetary alignment and the false flag operation of the Dec. 26, 2004.

The perpetrators of the Dec. 26 2004 false flag environmental warfare tsunami may have taken advantage of planetary alignments to use the HAARP-chemtrails weapons system (and 4th generation nuclear weapons) to trigger an earthquake and tsunami that would otherwise not have taken place.

Alternatively, the perpetrators of the Boxing Day 2004 tsunami may be using some alleged planetary alignment as a “cover” or pretext to explain an environmental war event like the HAARP-triggered false flag operation Indonesia tsunami.

11.11.11, IIXXII, and “Head for higher ground”

The Comet Elenin psyops meme is being promoted by such official agencies as the U.S. White House and NASA, and by established information operatives in alternative media like Sorcha Faal and Pakalert.com.

The Comet Elenin psyops has begun to infect communications and relationships on social media like Facebook, for example.

Here is an example of an exchange on Facebook between a correspondent and this reporter regarding Comet Elenin and a mysterious symbol "IIXXII" that is somehow associated with an anticipated catastrophe linked to the Comet Elenin in Oct. 2011. The correspondence suggest how deeply the Comet Elenin may be affecting people's actions, as the correspondent recommends that this reporter not be in Los Angeles, CA. to present at an event on 11.11.11. (Nov. 11, 2011), and vacate his residence in Vancouver, B.C. for higher ground furring the remainder of Nov. 2011.

CORRESPONDENT: "A friend would like to know what the symbol "IIXXII" means. He said he posted it on his wall and with in hours an Illuminati heir befriended him. The meaning I have found for IIXXII is infinity; interestingly enough one of the symbols I came across was a winged serpent over an unwinged serpent in a circle eating each other's tail.

"IIXXII as a date is November 20th 2011, this is the same date as comet Elenin aligns with the earth and the sun at its closest point. If Elenin could be a Psyops mind game to cover over the use of space-based weapons, I would have to believe something very significant is going to happen in November. Should we say goodbye to Japan and the West Coast? Alfred, you may want to move to higher ground. IIXXII has me very concerned! Please let me know if you come across anything with this number - symbol."

ALFRED: "We ran intensive interdimensional probes on IIXXII and found the following: IIXXII - and the comets, etc. - are a meme that someone is trying to push now to mount a false flag. If no one buys into the fear, no false flag occurs. We are scheduled to be in LA on 11.11.11 and Vancouver BC rest of Nov. 2011. Probe states reality is safe there during Nov 2011. Would suggest you let go of any fears or concerns about IIXXII as meme generation and move into positive timeline meme reality. In Light, Alfred"

How to evaluate Comet Elenin and the Elenin psyops

1. The best available scientific and forensic evidence shows that, more probably than not:

A. Comet Elenin is not a hazard to Earth.

B. Past catastrophes such as the 2004 Boxing Day tsunami and the March 11, 2011 Fukushima earthquake and tsunami are in fact environmental warfare false flag operations triggered by the HAARP-chemtrails weapons system.

C. Comet Elenin is an ordinary comet, is not accompanied by nor is an extraterrestrial space ship.

2. An attempted Comet Elenin psyops is underway to create a meme of fear and have some critical mass of the human population “buy into” this meme, thereby facilitating the planned false flag operation. The planned false flag operation could include HAARP-chemtrails weapons systems deployment to create environmental events such as earthquakes, tsunamis, etc. with consequent damage and nuclear leakage from nuclear power plants. If the human population fails to buy into this false flag (as it failed to do in the H1N1 virus false flag operation), the false flag operation fails.

3. We should be outspoken in exposing those who attempt to promote the Comet Elenin psyops. In the words of the AIDS awareness movement of the early 1980s, "Silence = Death" .