Would the average person recognize a PSYOP or PSYACT if they were specifically targeted by it? This was a question that came up months ago. I am not talking about the normal media brainwashing that we see by and large that target huge areas of the population. I am talking about the kind that targets specific individuals.
I argue that most would not. Even the most trained intelligence agent would probably have a hard time recognizing an op that was being run against them. For one, there is the emotional state attached to these ops. It is difficult to distance oneself from those emotional gut reactions and recognize the source of the attacks. For another, there is the element of confusion to it. It is designed to be that way.
Other people might disagree with me on this assessment. In the end, it really doesn't matter if I am right or if they are. What matters is identifying the PSYOP itself and leveling the playing field.
So let me ask you. Do you feel like you are in the middle of a PSYOP?
Boone Cutler and General Flynn did a wonderful job in educating people on 5th Generation Warfare and what it entails in their book. If you haven't read it, I would highly suggest that you do. But this particular article isn't a book review. It isn't an expansion of what we know of psychological operations. It is an outline of patterns of behavior within the movement that suggest that certain individuals have been targeted as part of a PSYOP. It is a story so large that I cannot write about everything in just one article. So I am attempting to give the highlights in the hopes that others can step forward and help fill in the gaps of missing information.
I will leave a trail of breadcrumbs. It is your job to make a meal out of them.
Hopefully, all will become clear in the near future.
If you have never heard of Con Inc and never considered that there could be a group of people that are the equivalent to Red Pilled Antifa, welcome to my world. Up until a few weeks ago...
I realize now that we all had pieces of evidence to this. It was right in front of all of our faces. We missed it. We missed the clues, the news stories, and the patterns. I have never been one for interpreting comms, but now I read back and see them everywhere. We missed all the breadcrumbs that everyone was dropping right in front of our little noses. The picture was there. We just never pieced it together. And we all had pieces to this puzzle.
Let's begin...
How do you keep a stolen election once you've stolen it?
#ConInc #RedPilledAntifa
Has Anyone Done a Dig on Blackbox?
On November 22, 2022, Jeffrey Pedersen (aka IntheMatrixxx) made a post on Truth Social asking a single question.
"Has anyone done a dig on Black Box?"
Having never heard about this company, many on Truth Social were intrigued by this question. There was a lot of speculation.
Note: This post was the beginning of the takedown portion of the PSYOP to destroy We The Media.
For those that don't know, Black Box Security is a company that offers executive protection services for high-profile clients. Per their website, they "work with high profile musicians on world tours, actors on and off set, safeguard public speeches, escort VIP’s and their families on business and leisure trips, and safeguard against kidnapping in remote locations." Their employees are selected from "diverse military and Special Forces backgrounds such as Israeli Security Agency (SHIN BET), Israeli Defense Forces (IDF), U.S. Marine Corps, U.S. Army, and Navy Seals."
On the surface, it looks like some bad arse military guys who go around and offer a secure environment for their clientele. The reality is that Black Box and other companies like them are employed by the handlers and contract holders of those musicians, actors, and other VIP's. What has been reported to go on behind closed doors offers a disturbing glimpse of control, abuse, and a mixture of Stasi tactics, psychological manipulation, and blackmail.
The most famous story regarding this particular company involves Britney Spears. Brittney was in a conservatorship under her father, Jamie Spears, who employed the services of Black Box Security to "protect" her. The following is just a few excerpts regarding what happened to her.
Quote:
"...the pop star's bedroom was bugged with an audio recording device that monitored her personal conversations at home."
Robin Greenhill of Tri Star Sports & Entertainment, who worked closely with Britney's father Jamie Spears, wanted to mirror the singer's phone with an iPad hooked up to her iCloud account to track her text messages with friends.
Alex Vlasov, a former employee of Black Box Security, "described the restrictions placed on the pop star 'like a minor who needs their parents' consent.'"
"Once Vlasov began questioning Black Box's practices, he alleges that Yemini [the CEO of Black Box Security] took out his gun and placed it on his desk in front of Vlasov. 'So you don't like how I run my business?' Vlasov claimed Yemini asked him."
"Vlasov claimed his bosses informed him that this responsibility was coming directly from the company's 'client.' The client, he says, was Jamie."
In short, we see a pattern of intimidation, manipulation, control, blackmail, and abuse in order to control the actions of another.
Keep in mind the types of individuals that are employed by these companies.
And this is hardly the only company out there that engages in this practice. We see a pattern of behavior and tactics used throughout the entertainment industry on certain individuals. This isn't the only example we have seen of this either.
Kanye West
On November 3, 2022, the first news stories started appearing regarding Kanye West and a some text messages he received from his personal trainer Harley Pasternak. These read like an ultimatum and threat from someone who supposedly was an employee to their employer.
"Second option, I have you institutionalized again where they medicate the crap out of you, and you go back to Zombieland forever. Play date with the kids just won't be the same."
Some excerpts from the articles regarding that incident:
"This is not the first time Pasternak has targeted West with mental health claims."
"What should be obvious by now is that I was raised to stand for my truth regardless of the consequences,” Kanye wrote. “So I will say this again I was mentally misdiagnosed and nearly drugged out of my mind to make me a manageable well behaved celebrity.”
Here are Kanye's own words regarding the tactics used against him.
Source:
I think Tucker Carlson summed this situation up perfectly in this video.
If these tactics can be used against individuals in the entertainment industry, could they be employed against groups of individuals? Could they be used to influence a situation towards a specific goal?
"Have you ever wondered why all of these supposedly creative people reach exactly the same conclusion every time? They are all on the same page. How could that happen? It's an interesting question." ~ Tucker Carlson
Source:
The Case of Harvey Weisnstein
"In the fall of 2016, Harvey Weinstein set out to suppress allegations that he had sexually harassed or assaulted numerous women. He began to hire private security agencies to collect information on the women and the journalists trying to expose the allegations. According to dozens of pages of documents, and seven people directly involved in the effort, the firms that Weinstein hired included Kroll, which is one of the world’s largest corporate-intelligence companies, and Black Cube, an enterprise run largely by former officers of Mossad and other Israeli intelligence agencies."
Just what lengths will companies like Black Cube go to?
Intelligence analysts, undercover agents, avatar operators, linguists, and operations experts.
What is an avatar operator?
According to this Wired article about Private Espionage, avatar operators are "experts in social media who specialized in creating fake Facebook pages, LinkedIn profiles, and the like for field operatives."
"Two sources with knowledge of Weinstein’s work with Black Cube said that the firm creates fictional companies to provide cover for its operatives."
Fake companies complete with fake websites, fake phone numbers, and fake addresses. Fake online profiles to fit their fake narrative for their fake personas.
What was the price for such services? $200,000 with $300,000 as a bonus if certain goals were met. They weren't.
The Companies Behind This
You can't just open up a web browser and search for "disinformation for hire", "Mossad for hire", or "dark PR firms" and find a list of companies "near me". Many of these companies pass themselves off as social engineering firms or PR based firms. Some websites say they specialize in OSINT, intelligence agencies, or social media influence. Most of them are based in Israel, which could arguably be called the intelligence capital of the world. Many are hiding behind fake LLCs.
One thing is for certain, when you start uncovering the names of these companies, you start realizing just how lucrative of a business this industry is. There is another thing you will notice. When one company gets reported on, it is often dissolved and reformed as another company.
Here is just a sample of the company names that I found that were engaged in this type of business.
Archimedes Group
Black Cube
Bravo-Idea
Bulldozer Holdings Ltd
Cambridge Analytica
Cat@Net
Grey Content Ltd
HBGary Federal
KOI
KS Process and Software Ltd.
NSO Group
Pragmatico
Psy-Corp
S2T Unlocking Cyberspace
Team Jorge
Voyager Labs
Something else came up which might be noteworthy. I noticed that some of these company names were leaked in the Panama Papers.
If you have never heard of the Panama Papers, here is your crash course. In 2016, 11.5 million leaked documents were published. In these papers were the names of over 214,000 foreign companies, some of which date back to the 1970's.
The Panama Papers was the biggest data leak ever. Bigger than Wikileaks even. And the repercussions from this leak are still being felt. There are still being articles and arrests happening because of this.
These documents originated from a law firm called Mossack Fonseca, which just happened to be the 4th largest law firm in the world. What they detailed was a trail of political corruption which was being exhibited around the world and the dark money accompanying it through the use of offshore accounts. In other words, they detail a lot of financial fraud along with tax evasion and the avoidance of a lot of sanctions and the law.
If you want to read more about these leaks, then I would start here.
Note: You can download or search the leaked information and databases for the Pandora Papers, Paradise Papers, Panama Papers, and Offshore Leaks from here.
Dark Services
You might be looking at this at this point and wondering what this has to do with the MAGA movement. So far we have discussed attacks on individuals and using manipulation and coercion to influence that targeted individual. But what happens when you target a grassroots movement?
Let's look at what we actually know is being offered as services to clients first and then question whether the MAGA movement and individuals within the MAGA movement has indeed been targeted.
Let's say you want your school to win a national competition. Well, you can hire a black PR firm to generate votes online. That happened in Taiwan.
"In 2011, singers from schools across Taiwan competed in a popular TV competition. Peng’s alma mater won; its performer received more than 41 million online votes, almost twice the Taiwanese population. A school official confirmed to the Reporter that the school had requested help from Peng in the competition but declined to comment further."
How about make Volodymyr Zelensky seem popular?
"Ukraine’s young new president Volodymyr Zelensky — hailed in the West as an ambitious reformer — is an enthusiastic social media user, deploying his popular Instagram and Facebook accounts to reach large audiences during his recent election campaign.
"But according to a recent investigation by VoxUkraine, Zelensky’s Facebook page had the most active fake users of any Ukrainian politician — 27,926 inauthentic accounts. They posted almost a quarter of all comments during the period analyzed. Similar ratios were seen for other top politicians."
Forge letters from the NAACP to politicians?
"The American Clean Energy and Security Act of 2009 was meant to curb greenhouse gas emissions, which apparently didn't sit too well with opponents of climate change. Rep. Tom Perriello (D-VA) received letters from both the NAACP and the Hispanic non-profit Creciendo Juntos, asking him to vote against the bill for economic reasons.
"It turned out that the lobbyist firm Bonner & Associates, which has a history of astroturfing and defrauding the government, had fabricated the letters, from the letterhead to the signatures. The very similar looking letters can still be found online."
Fake excitement over McDonald's Quarter Pounder?
"The release of the Quarter Pounder in Japan was a pretty big deal, judging by the size of the crowds. In fact, it was a record-setting day for the McDonald's in Osaka.
"As it turns out, McDonalds had recruited 1,000 part-time employees to line up - starting at midnight before the store even opened - and generate buzz for the burger. The 'customers' were paid for their time and had their meal compensated. McDonalds admitted to the ploy, but said it was part of a 'customer feedback' for 'market research.'
"The employees were paid roughly $11 bucks an hour for their work."
Fake excitement for book sales. Tank the sales of another book. Fake protests. Fake interest. Stage photo ops for the news. Fake news sites and news stories in order to discredit an opponent. Fake political donations in order to discredit someone. Fake online personalities and their followers. Start hashtag campaigns. Bury an unfavorable news story. Promote another. Fake friendships in order to get insider information or to sabotage an effort. Build profiles of online personalities. Send threats to the opposition. Harass others. Artificially inflate the value of cryptocurrency. Create deep fake photos in order to discredit someone. Send sex toys to someone's house in order to create a fake sex scandal and affair. (Yes. This actually happened.) Create enough chaos to start a civil war or civil unrest. Steal an election.
The list really does go on and on. There isn't a job too big or too small for these companies... as long as the price is right. And it isn't limited to online activity or just social media. It oftentimes bleeds into reality.
By the way, in case you are wondering, the cost to delay an election in a small country is $6.4 million.
"In one of the meetings, Meidan [from Team Jorge] suggested destabilizing Chad as a means to delay the elections. In another meeting, the advisers explained that there may be an explosion in a market in the capital, N'Djamena, to justify the postponement. That did not deter Jorge, who asked for 6 million euros ($6.4 million) to see the campaign through."
The Methods and Tools Used
"The broader notion of deception and influence operations has been around for some time, but over the past several years, we have seen [...] companies grow up that basically build their business model around deception."
"Thank you my love. It was a wonderful night. Waiting for you whenever you come back,” read the note attached to the sex toy hidden inside the Amazon delivery box. It was allegedly sent by Shannon Aiken, a 38-year-old Washington woman, to the home of a politician at the height of an election campaign. His wife received the package. The politician slept in his office for two days. A crew was secretly sent to film him there, and the embarrassing footage leaked online.
Aiken appears real. She is active on Facebook and Twitter, has a real Gmail account and an active WhatsApp, both linked to a real phone number. Her Amazon is connected to a credit card, while real funds from her digital wallet paid for the package purportedly containing a dildo, condoms and lubricants.
However, despite her impressive digital footprint, Aiken is not real. She is an avatar: a complex, fake digital persona built to mimic human behavior and avoid detection – not a bot, but a “cyborg.”
Team Jorge's services include:
- Hacking messaging apps and email accounts
- Planting materials in compromised accounts
- Hack-and-leak of real or forged material
- Army of online avatars (fake accounts) for social media manipulation
- Voter suppression and election disruption
- Undermining election results with 'stop the steal' style campaigns
"Every influence operation... has three stages: gathering intelligence, constructing a narrative, and deploying for maximum impact."
Some of these companies use software, sophisticated AI, and cyborgs (which is a cross between AI and human interaction). Others use cheap human labor.
One thing is for certain, they build profiles on their targets, identify who to attack, come up with a game plan to attack, and deploy it. Sometimes this looks like simple harassment and smear campaigns. Other times these forms of attacks are much more sophisticated.
"The aim is to get an emotional reaction from a person," Bidun said in an interview. "If they read a comment, even [if they understand] that it was written by a bot, it could have affected them emotionally and it becomes more difficult for them to control themselves."
These actions don't always stay online. Sometimes agents were hired to go undercover. Other times crowds were hired to stage a protest or create the illusion of one. Actors were often employed. Anything that could be faked to create the illusion of the new reality would be.
"We also identified real-world events that appeared to have been staged to provide ammunition that could be leveraged in social media campaigns. One case involved a fake protest staged outside a company headquarters on Regent Street, central London.
"Three masked activists in baseball caps, sunglasses and masks filmed themselves waving placards. A similar leafleting campaign was staged near the Eiffel Tower in Paris, before being circulated on social media by Aims bots. It is not possible to know who the clients were in any of the campaigns, or even what their objective was.
"However, what seems clear is that the avatars peddling propaganda are doing so with the help of stolen photographs of real people."
It wasn't always to create a false narrative either. Sometimes these tactics were deployed to destroy real reactions.
How do you destroy an authentic movement? What if our efforts were being actively sabotaged?
New Tools For An Old Playbook
Could there have been a concerted effort to keep election integrity from happening, to keep conservatives for organizing effectively, and to stop efforts to fix our country from succeeding? What if there was a playbook that already spelled out how to do this? What if these tactics weren't anything new? What if they were in fact actually from another era and used against another political group?
Quote:
After the East German popular uprising of June 1953 (suppressed by Soviet troops) the government gave the Stasi the task of systematic surveillance and prevention of unrest in the population. Initially this took the form of brutal physical repression: imprisonment and physical abuse (including torture) by police and secret police. But this changed during the 1970s when the GDR became more interested in gaining a positive international image, and the repression of activists became more subtle. The Stasi redefined the military term Zersetzung (attrition or corrosion) to name their harassment tactics: the aim was to disrupt the working of groups and the lives of individuals to such a degree that their activism became ineffective, or more preferably, ceased altogether.
The aim of the Zersetzung was to ‘switch off’ the group by rendering it ineffective, with an interim goal of hindering any positive media or public exposure. The usual ways to switch groups off were to:
- Create conflict between members – particularly useful subjects for sowing discord were those of a philosophical or political nature, money and personal (sexual) relations;
- Hinder and sabotage activities by the use of one or more infiltrators, who would agree to do tasks, but not get round to doing them, lose materials and equipment, repeatedly request changes and further edits of materials to slow down production, attempt to divert the group into more harmless activities etc;
- Isolate the groups from other activists, example by spreading rumors regarding unacceptable behavior and political views etc.
The choice of tactics in any particular case was based on extensive psychological profiling and intelligence on the group members, particularly: who plays what role, who fulfills what kind of task; what are relationships within the group like, who hangs out with whom.
Does any of this feel familiar to anyone? Have you noticed these patterns within the MAGA movement?
"The Stasi used operational psychology and its extensive network of between 170,000 and over 500,000 informal collaborators to launch personalized psychological attacks against targets to damage their mental health and lower chances of a "hostile action" against the state. Among the collaborators were youths as young as 14 years of age."
A Mixture of Tools
And then we have the useful idiot...
"In political jargon, a useful idiot is a term currently used to reference a person perceived as propagandizing for a cause — particularly a bad cause originating from a devious, ruthless source — without fully comprehending the cause's goals, and who is cynically being used by the cause's leaders. The term was often used during the Cold War to describe non-communists regarded as susceptible to communist propaganda and manipulation."
If the election was stolen, would it make sense for plans to be made to keep that from being discovered and effectively reversed? Do you honestly think their plans stopped at just stealing an election? It wouldn't be enough just to steal it. They had to keep it after it was stolen.
How far do you think the powers that be would take this? How far do you think this rabbit hole could go?
Part 2 of Con Inc and the Red Pilled Antifa thread coming soon!
This was research I did back in February and March of this year. I originally published it to substack (No subscription required. Not behind a paywall).
If you want to read this or read ahead in this 6 part (so far) series, you can find them here.
Given recent events, I thought it was a good time to revisit this topic.
Sources and Further Reading:
Note: Forbidden Stories is a consortium of reporters and journalists. It was formed due to some journalists being imprisoned and/or killed bringing you the types of stories I have outlined above. They are the experts on reporting regarding disinformation campaigns and private intelligence organizations/Mossad for hire.
Last night I was on a space and mentioned Adam Walsh's missing FBI file. Adam Walsh is the son of John Walsh. You know John Walsh from America's Most Wanted and the National Center for Missing and Exploited Children.
This is page 16 from said missing FBI file.
[BLANK] indicated he learned from his source that one [BLANK] was a close associate of known OC figures. Most notably Alfred James Rivenbark, and [BLANK]. Indeed [BLANK] name and address were found on the body of Rivenbark, who was killed in a plane crash in Colorado Springs, Colorado, along with others, including Ken Ogala. [BLANK] indicated [BLANK] has a DOB of either [BLANK]. The former DOB is associated with an individual who has FBI Number [BLANK].
[BLANK] stated that [BLANK] identified the crash victims of the plane crash and also attended to matters affecting Rivenbark's business. [BLANK] noted that the purpose of the travel to Colorado was drug related.
Who identified the bodies? What does a plane crash in Colorado and drugs have to do with a missing boy in Florida?
Let's start at the beginning.
Adam Walsh was the son of John Walsh, who was the host of America's Most Wanted. He went missing from a Sears department store at the Hollywood Mall in Hollywood, Florida, on July 27, 1981.
The official story was that he was there with his mom, Reve. She went off to look at lamps and left him alone for 10 minutes to play a video game that was on display in the store. The other children there were causing issues. So the whole group of children were asked to leave the store.
Testimony from the security guards, store cameras, and Jim Campbell tell a different story than this. But let's leave it alone for now.
The point is Adam Walsh was never seen again.
On August 10, a severed head was found in a drainage canal alongside the Florida Turnpike near Vero Beach. It was badly decomposed. This was identified to be Adam Walsh.
How was the identification made and who identified Adam Walsh's remains?
Family friend and business partner, John Monahan.
The Walshes certainly weren’t at the Vero Beach morgue when the ID was made. They were in New York, where they had just appeared on Good Morning America to ask a national audience for help in looking for their missing son.
It was in the overnight hours when police first called them, at their hotel, and said that a dead child had been found the evening before. They didn’t know it was Adam, but at least to themselves, they felt pretty sure. I spoke to the show producer who told me she immediately offered to return the couple to Florida on the first flight out, but John turned it down. I also spoke to the show host, David Hartman, who told me he’d later offered the same thing. Instead, they went on the show that morning; Mrs. Walsh looked catatonic and said nothing. On air, John said this:
“Well, amongst many sightings and reported possible clues on Adam they have found the remains of a young person in Florida that at this time they are trying to identify whether it is Adam or not. At this point they feel there is a good possibility it is not Adam. Therefore they felt we should come on and carry the word of Adam to the public because there is a good likelihood that he is still out there with his abductors.”
Also in his book, Walsh wrote that his friend, John Monahan, who was at the morgue for them, did not immediately recognize the child as Adam. He made the ID only after he asked the M.E. to open the mouth and he saw a “small, emerging tooth.” This is elaborated on nowhere in the official files or in Walsh’s writing or interviews over the years.
McKinley's Assassination and the Creation of the FBI
Did you catch where President Trump mentioned President McKinley in his speech today?
Doing research into this project, I had to engage in some serious tunnel vision. There was so much violence that compounded — a series of events that led into the next event and so on which ultimately led to the formation of the FBI and an accumulation of power by that particular institution. Whether this was by design with a puppet master pulling the strings or just a series of circumstances that were taken advantage of, I do not know.
I found myself sympathizing with the men and women of this time. They fought the same groups as we do ourselves today. It only became more apparent as time went on and as I read more of their own words.
I went down this rabbit hole and found that I am not impartial.
I am looking at the circumstances of the time and I see them mirror the circumstances of today. I see the same outcry of the people, the same issues plaguing society, and the same justifiable anger. The fight has never stopped. It has just been passed down through the generations. Have we not learned?
...It is not Alexander, Umberto, William, Nicholas, and Chamberlain who guide the oppressions and wars of the nations, or who are the authors of the oppressions of the masses and the murders in wars, but those who have put them in the positions of rulers over the lives of men, and support them in these positions. And so Alexander, Nicholas, William, and Umberto are not to be killed, but men are to stop supporting the order of society that produces them. What supports the present order of society is the egotism and stupidity of men who sell their freedom and honor for their insignificant material advantages...
Above all, we must not permit them to kill people; we must refuse to kill by their command.
— Errico Malatesta on Bresci's Deed
There are admittedly many similarities between President McKinley and President Trump. In who they were and how they governed. They were both beloved by the people and were the People's Presidents. This is probably what touched me the most while doing this dig.
If I did not convey that in this thread, it was due to me trying to stick to the facts. Know my emotions now. These are two great men.
Umberto I was born in 1844. He ascended to the Italian throne on January 9, 1878. This king was loathed for his policies.
The first assassination attempt on his life was on November 17, 1878. It was carried out by Giovanni Passasnnante, an Italian anarchist. Giovanni pulled out a knife and attacked him yelling "Long live Orsini! Long live the Universal Republic!"
Giovanni was arrested, tried, convicted, and sent hard labor for life. He died 3 decades later in a psychiatric institution.
In 1897, the price of food dramatically increased in Italy. With the people starving, demonstrations started in the streets of Southern Italy. People rose in mass demanding "bread and work!" Protests spread like wildfire. Widespread revolts took hold across Italy from a population who was on the brink of destruction. The whole country was a powder keg waiting to happen.
Police, outnumbered by the rising mobs, escalated the situation when protestors were shot.
On May 5, 1898, first blood was drawn when police shot the son of Giuseppe Mussi, who was a deputy in Milan. The next day, more riots broke out. Two more were killed. The next the riots went further reaching into Florence and Livorno.
On May 7 1898, over 60,000 people were demonstrating. Bava Beccaris, a general in the Royal Italian Army, sent out his troops in order to get the protestors to disperse.
Two days later, Bava Beccaris ordered his troops to fire on demonstrators. Guns and artillery were shot into the crowd. The repercussions were reported thusly.
The Italian Government: 80 dead, 450 wounded
The Italian Protestors: 400 dead, 2,000 wounded
The New York Times: 300 dead, 1,000 wounded
Military tribunals came shortly after. Bava Beccaris, the same man who shot at protestors, presided over them and sentencing 1,500 people to prison. Newspapers were suppressed from reporting any opposing views. History would later view these trials as a travesty of justice and a mockery of the legal system. (Military tribunals are the only way, huh? There was absolutely no conflict of interest here.)
Bava ended up being award the Great Cross of the Order of Savoy by King Umberto I.
Beth Cook, Attorney for DOJ: "Do you know the Angel of Death?"
Hayes: "I know him well."
Janet Reno (allegedly): "The Justice Department will leave the Angel of Death alone if he will leave the Justice Department alone."
What happened on September 11, 1991?
What happened 10 years later on September 11, 2001?
We will call this the 25,000 foot view. This doesn't just stop in the 90's. So much of what we talk about today is tied in. When you see the timeline, it will all make sense. I may do this thread as a substack later.
Who is the Angel of Death?
Charles Hayes was supposedly either one of, or a contact person for, "The Fifth Column", a group of ex-CIA computer hackers who have become so torqued off about corruption in the government that they have started their own crusade against it.
It was rumored that they acquired their own Cray Supercomputer (previously from Clark Air Force Base), which they keep in a semi-tractor trailer and move around at random intervals.
For several years the Fifth Column had searched computer data bases, including foreign bank accounts, looking for evidence of political bribery, kickbacks, and related subversion of the U.S. Constitution and political process.
One of the people they had been investigating was Hillary Clinton and Vincent Foster and espionage. The money they uncovered was transferred by the Angel of Death from politically-related illegal accounts at off-shore banks in the Cayman Islands, Switzerland, and elsewhere to a holding account at the US Federal Reserve.
On top of this, they were sending these politicians envelopes containing all the information on their favorite Swiss bank accounts with transactions to and from. Included in the envelope was a little letter which "requested" that they resign or the information will be made public.
At this time, there were over 50 resignations from Congress.
Hayes has recently acquired the Internet label of AOD ("Angel of Death" or "Angel of Doom") due to his efforts in encouraging the early retirement of corrupt politicians.
The Octopus
On April 2, 1996, Charles S. Hayes -- retired CIA operative, Air Force Colonel, and Kentucky salvage dealer -- was deposed by the U.S. Department of Justice with respect to the Inslaw case. Hayes' extensive testimony was redacted under the National Security Act.
Hayes testimony led to a tangled web of freelance arms dealers, drug runners, assassins, and government miscreants. Hayes dubbed this "the Octopus." Hayes is said to have testified to detailed criminal violations of U.S. law by employees of the Department of Justice and other government agencies.
Freelance journalist Danny Casolaro also adopted the term "the Octopus." Danny used Hayes as a frequent source of information.
My grandfather was in the Navy during the entirety of World War II. Years ago, he documented his experience from before the war to after its conclusion. I have taken his journals, removed personal identifying information, and am publishing them here. Names have been shorted to initials. The name of my grandmother was changed to “My Love.” What is a story without some romance in it? I hope you enjoy and find them as insightful as I have.
If you missed the first part of this series, you can find it in the quote post here.
WE MEET THE ENEMY
The day after we arrived at Pearl Harbor we were told to remove all wood furniture, radios and certain other items from the ship. Wooden furniture would splinter and burn if it was in an explosion. Radios could possibly tell the enemy our location at sea. All day long a Marine air group moved on board. The next morning we left port. As soon as we cleared the harbor our captain told us we were going to Wake Island, a U.S. possession in the Western Pacific. There was a Marine garrison stationed on Wake, also about 300 construction workers who had been building an airstrip. Our mission was to reinforce the Marines and remove the civilians form the island.
Our task force crossed the International Date Line going West on December 21-22, 1941. Normally anyone crossing the date line for the first time is initiated into the "Silent Mysteries of the Far East." We had no initiations due to the enemy's presence but we were all given "Golden Dragon" certificates to commemorate the occasion.
We arrived in the vicinity of Wake the morning of December 23. Our planes flew over the island and returned, reporting a large Japanese convoy surrounding the island. After considering the odds, our task force commander decided not to attack the Japanese. The next day Wake Island fell to the Japs.
We left Wake and headed for Midway Island, another American outpost. We crossed the International Dateline, going east, on Christmas Day, 10 A.M. Since our crossing set the date back to December 24, the next day was December 25 again. So the sailors on the Saratoga and the other 12 ships in our task force had two Christmases in 1941. Of course, there was no time for celebrating. We sailed on to Midway and launched our marine planes and sent their support group ashore. Most of these young pilots would lose their lives in another Japanese attack in five short months.
We returned to Pearl Harbor, remaining in port only a few days. We headed west again toward Wake looking for Japanese ships. Every morning we were awakened by a bugle blaring "General Quarters" (call to battle stations). It was believed that daybreak and sunset were the best times for submarines to spot ships and launch their torpedoes. We were soon to get our taste of this underwater peril. On the evening of January 11, 1942, as we were returning to Pearl Harbor, we were torpedoed. I was in the "head" preparing to take a shower. The torpedo hit the ship two decks below where I was located. I was blown to the ceiling and must have hit my head as I "saw" a bright flash of light; however, this could have been from the explosion. The lights went out and I started groping my way thru the darkened passageways. I soon reached the lighted area and hurried to my battle station. Later, when I went back to the "head" I realized how lucky I had been. The tile had been blown off the deck and lavatories and other items were laying on the deck. I was unscratched but several men had been killed on the deck immediately below me.
My battle station at that time was an ammunition conveyor which moved projectiles and powder up from the magazines and on to the guns above. We stayed on our battle stations for over an hour while the destroyers in our task force dropped many depth charges, trying to get the sub that torpedoed us. The sub got away and a few days later the Japanese radio bragged that one of its subs had torpedoed a "Lexington type" American Carrier, but did not know whether it sank.
We went back to Pearl Harbor where the dead were removed for burial and a patch was welded over the huge hole in the side of the "Sara." The patch was a temporary "fix" and a few days later we left for the Bremerton, Washington shipyard for permanent repairs. The second day out from Pearl Harbor the patch ripped off and took about 100 feet of the outer "blister" hull with it. Of course our problem was supposed to be top secret but when we sailed into Puget Sound near Seattle, there were thousands of sightseers lining the shores to see the crippled "Sara" come into port.
We remained in the Navy Yard until late April, 1941. While there we were equipped with radar, a new invention. One day while in the yard we were visited by Frank Knox, the Secretary of Navy. All hands were lined up on the flight deck for inspection by Mr. Knox, when a marine orderly ran up and gave a message to the inspection party. We were dismissed from inspection and soon found out that the USS Lexington had been destroyed in the Battle of the Coral Sea.
We were all shocked at the news. We had felt that the Lexington and Saratoga were indestructible. The Lexington caught fire when hit by torpedoes and bombs. The many layers of paint burned so hot that fire on one side of a bulkhead would ignite the other side. Since the fire could not be contained the ship was abandoned and was sent to the bottom by torpedoes from our own destroyers.
With the loss of the Lexington it was determined that all interior paint must be stripped from the interior of the "Sara." For the remainder of the time we were in the "yard" is was pure hell. Chipping hammers operated continuously by both the ship's crew and by yard personnel. In order to sleep, one had to either go ashore or plug one's ears.
BATTLE OF MIDWAY
We left Bremerton and sailed down the coast to San Diego with civilian technicians testing and adjusting our new radars. We were in port at San Diego for only one day. It had been reported that a large Japanese carrier task force was heading east towards Hawaii and Midway. We headed west as fast as we could sail, about 34 knots an hour, to the area where the Battle of Midway was being fought. Actually, the battle was already over when we arrived. One American Aircraft Carrier, the USS Yorktown, and several Japanese ships had been sunk. Many of the survivors from the Yorktown who had been picked up by the escorting destroyers were transferred to the Saratoga for transportation back to Pearl Harbor. Nearly all of the planes based at Midway, including the ones we left there in December, had been destroyed. As soon as we got back to Pearl Harbor, we loaded an Army air group of P-40 fighter planes on board and returned to Midway. None of these pilots had ever flown from a carrier before, but they never lost a plane!
We returned to Pearl Harbor and spent the next two months making short scouting missions to the west of Hawaii. The in late June 1941, we started loading all the ammunition and supplies we could get on board. We left port under secret orders with a large task force of cruisers, destroyers, and supply ships. After a few days at sea, we were told we were to join other ships for an assault on Japanese held islands in the South Pacific.
Normally when a ship crosses the equator, the Shellbacks (those who have crossed before) initiate the Pollywogs (those who haven't). Our task force crossed the equator on July 12, 1942. We had some initiations but there were more Pollywogs than Shellbacks. So the activity was somewhat reduced. Some of the unlucky Pollywogs got their heads shaved and painted purple. Others got beat with canvas straps. And some were half drowned with the fire hoses. Of course, our lookouts maintained their "watches" and our scouting planes remained in the air. I, like most, did not have much of an initiation. We were all given certificates from "King Neptune" making us Shellbacks.
The actual number of federal organizations is laughably unknown. There are 15 executive departments. However, depending on definition, there are either 137 independent executive agencies and 268 units within the Cabinet departments according to USA.gov OR over 430 departments, agencies, and sub-agencies according to the Federal Register.
The actual number may be around 428 to 438 federal agencies or entities.
The following is a (probably incomplete) list to give you an idea.
This is what we have to clean up just within the government. Bookmark it and share it.
The Legislative Branch
· Architect of the Capitol
o United States Botanic Garden
· Congressional Budget Office
· Government Accountability Office
· Government Publishing Office
· Library of Congress
o Congressional Research Service
o United States Copyright Office
· Office of Compliance
· United States Capitol Guide Service
· United States Capitol Police
The Judicial Branch
· Administrative Office of the United States Courts
· Federal Judicial Center
· Judicial Conference of the United States
· Office of Probation and Pretrial Services
· United States Sentencing Commission
How do you define your relationship with your government?
I have made it no secret that I was in a bad marriage at one time in my life. After getting out, I went through a lot of counseling. At some point or another, when you go through abuse counseling, you will be handed this. The Power and Control Wheel. If you go through counseling long enough, you will end up seeing it several times.
During my journey in this movement, I keep thinking about this wheel. It is meant to outline the abuse and control within a relationship. However, don't we all have a relationship with our government in some form or another?
I want you to read through this and think about your relationship with the government. Do all of these not apply?
Thread 🧵
USING INTIMIDATION
Making someone afraid by using looks, actions, gestures
Smashing things
Destroying their property
Abusing pets
Displaying weapons
USING EMOTIONAL ABUSE
Putting someone down
Making them feel bad about themselves
Name calling
Playing mind games
Humiliation
Speaking at a fundraiser in New York City on Friday, Hillary Clinton said half of Donald Trump’s supporters belong in a “basket of deplorables” characterized by “racist, sexist, homophobic, xenophobic, Islamaphobic” views.
“You know, to just be grossly generalistic, you could put half of Trump’s supporters into what I call the basket of deplorables. Right?” Clinton said. “The racist, sexist, homophobic, xenophobic, Islamaphobic—you name it. And unfortunately there are people like that. And he has lifted them up.”
Time: Read Hillary Clinton’s ‘Basket of Deplorables’ Remarks About Donald Trump Supporters time.com/4486502/hillar…