VOX of SU Profile picture
Sep 18 15 tweets 12 min read Read on X
How to Harness your Own Free Energy for Free

Free energy doesn’t have to be complicated… humans have done it for thousands of years before the grid.

Most of the complexity comes from the system itself…
permits, regulations, “certifications”…
all carefully designed to gatekeep what is actually simple and ancient.

This thread 🧵, provides the minimal resources needed to generate free energy for a home or small community, requiring no special expertise and easily shared knowledge.

It provides a full spectrum of free energy harvesting, using what nature provides and what the system throws away. These methods require minimal tools, rely on salvaged or natural materials, and break the illusion that energy must be bought or controlled.
Tree Battery: Step-by-Step

Purpose: Harvest small amounts of bioelectricity from a living tree to power LED lights or small devices.

Materials (Free or Salvaged)
- 1 healthy living tree
- 1 copper wire (1–2 feet long)
- 1 zinc-coated nail (or galvanized steel nail)
- 1 small LED light string or low-voltage device (like a garden light)

Optional: multimeter to measure voltage

Instructions:
1.Choose a Tree:
Select a healthy, well-rooted tree with good moisture content… maples, oaks, or fruit trees work well.

2.Insert Zinc Nail:
Hammer the zinc nail gently into the tree about 1–2 inches deep, at waist height.

3.Place Copper Wire:
Insert the copper wire into the tree a few inches away from the nail.
The zinc acts as the positive terminal, and the copper as the negative terminal.

4.Connect the Circuit:
- Attach a wire from the zinc nail (+) to the positive lead of your LED string or device.
- Attach a wire from the copper (-) to the negative lead.

5.Light It Up:
A single tree produces about 0.5–1 volt.
Chain multiple trees in series to increase voltage…
like batteries linked together.

Output Uses
- Power small LED garden lights.
- Run sensors or tiny electronics.Image
Saltwater Battery (Ultra Simple & Non-Toxic)

Best For: Beginners, teaching energy principles, low-power lighting.

Materials:
- Plastic or glass container (jar or bucket)
- Saltwater solution (salt + water)
- Copper strip or wire
- Zinc nail, galvanized nail, or scrap steel
- Wires to connect

Instructions:
1.Mix saltwater until fully dissolved.
2.Place the zinc nail on one side of the container.
3.Place the copper strip on the opposite side.
4.Attach wires to each and connect to a small LED or device.
5.For higher voltage, connect multiple jars in series (like linking AA batteries).

Output:
Enough to power LED lights, sensors, or trickle charge a small battery bank.Image
Aluminum Can + Charcoal Battery

Best For: Mid-level DIY, longer-lasting than saltwater.

Materials:
- Empty soda or beer can (aluminum)
- Charcoal (crushed into small chunks)
- Saltwater or vinegar
- Copper wire
- Cloth or paper towel

Instructions:
1.Fill the can with charcoal and soak with saltwater or vinegar.
2.Wrap copper wire around the outside of the can, leaving a free end.
3.Insert a galvanized nail into the charcoal as the other electrode.
4.Connect wires — copper is negative (-), nail is positive (+).
5.Chain multiple units together for more voltage.Image
Clay Pot / Soil Battery (Ancient Tech)

Inspired by: The Baghdad Battery…
one of the oldest known power sources.

Materials:
- Clay pot or flowerpot
- Dirt or damp soil mixed with salt or vinegar
- Copper strip or wire
- Galvanized nail or scrap zinc
- Water to keep the soil moist

Instructions:
1.Fill the pot with the prepared soil.
2.Insert the copper strip on one side and zinc nail on the other.
3.Keep the soil damp for consistent conductivity.
4.Link several pots together for higher voltage.

Output:
Steady trickle charge, perfect for continuous low-power needs.Image
DIY Lead-Acid Battery (Advanced)

Best For: Serious off-grid storage, like powering an entire small solar system.

⚠ Warning: Use protective gear…
this involves acid.

Materials:
- Two lead plates or salvaged lead pieces
- Plastic container (like an old Tupperware or battery case)
- Sulfuric acid (can be sourced from old car batteries or diluted drain cleaner)
- Distilled water
- Wires and clips

Instructions:
1.Place lead plates into the container without touching.
2.Mix sulfuric acid with distilled water (carefully, always add acid to water, not water to acid).
3.Pour into the container to cover the plates.
4.Attach wires to the plates.
5.Connect to a solar panel or generator to charge.

Output:
Can store enough power to run LED lighting, small appliances, or emergency systems.Image
Scaling Your Battery Bank

Series Connection: Connect positive (+) to negative (-) to increase voltage.

Parallel Connection: Connect positive (+) to positive (+), negative (-) to negative (-) to increase capacity (run longer).

Example:

Four 1.5V saltwater batteries in series = 6 volts

Four 1.5V batteries in parallel = 1.5 volts, but 4x the runtime

Why DIY Batteries Matter

Commercial batteries are taxed, controlled, and regulated to keep people dependent on the grid.

When you build your own:
- You bypass corporate supply chains.
- You recycle waste into something valuable.
- You teach your community how energy is created and stored, breaking the illusion of scarcity.Image
Image
Image
Image
Solar Energy: Harnessing the Sun

The sun constantly bombards the earth with more energy than humanity could ever use.

You don’t need expensive panels…
just focus, trap, or redirect it.

Passive Heat Storage

What You Need:

- Old barrels or buckets, painted black
- Clear plastic or glass sheet

How:
1.Fill barrels with water and place them in direct sunlight.
2.The black surface absorbs radiation, heating the water.
3.Use stored heat at night for warmth, cooking, or cleaning.

Uses: Free home heating, greenhouse warmth, hot showers.Image
DIY Solar Cooker / Oven

What You Need:
- Cardboard box or wooden crate
- Black paint or soot
- Aluminum foil, broken mirrors, or even chip bags
- A piece of glass or clear plastic

How:
1.Paint the inside of the box black.
2.Line the lid with reflective material angled toward the sun.
3.Place food or water inside, cover with glass.
4.The sun’s heat becomes trapped… temperatures can reach 250°F (120°C).

Uses: Cooking food, sterilizing water, pasteurizing tools.Image
DIY Solar Power: Step-by-Step

Purpose: Harness sunlight to create free, renewable energy for basic needs.

Materials (Free or Inexpensive to Salvage)
- 1 small solar panel (50–100W; broken or scratched panels work too — still produce power).
- 1 deep-cycle battery (can use an old car battery if free).
- 1 charge controller (prevents overcharging… $10–15 or salvaged).
- Wire (can be salvaged from old electronics).
- 12V LED light or USB charging adapter.

Optional: multimeter to test voltage.

How It Works

The solar panel captures sunlight and converts it into electricity.
The charge controller regulates the flow, preventing damage to the battery.
The battery stores energy for nighttime use.
Your devices or lights run directly off the battery.

Instructions
1.Place the Panel: Position it to face south (northern hemisphere) or north (southern hemisphere).

Angle it about 30–45°, tilted toward the sun.

2.Connect the Charge Controller: Run the positive (+) and negative (-) wires from the panel to the input terminals on the controller.

3.Connect the Battery: Run wires from the controller’s battery output to the battery terminals.

Red wire to positive, black to negative.

4.Connect Devices: Plug your 12V LED light, fan, or phone charger into the controller or directly into the battery (if it has ports).

What It Can Power
- 3–5 LED bulbs for lighting
- Phone charging and small electronics
- Portable fans or radios
- Emergency refrigeration with efficient coolers

Even a damaged solar panel produces usable energy.
The entire system can be built with scrap materials and requires zero technical expertise once the diagram is followed.Image
Water Power… Micro-Hydro

Running water equals constant kinetic energy… day and night.

Mini Water Wheel Generator

What You Need:
- Small stream or river access
- Salvaged bicycle wheel or wooden paddles
- DC motor (old treadmill, printer, or car alternator)
- Wire

How:
1.Attach paddles to the wheel or use spoons/plastic bottles as blades.
2.Place the wheel so water current spins it.
3.Connect the axle to a DC motor.
4.Run wires to a battery or device.

Uses: Powers off-grid cabins, lights, or radios.Image
Wind Power: Simple Turbine

Wind is free movement… easy to capture with basic tools.

DIY Windmill

What You Need:
- Old fan blades or PVC pipes cut into blade shapes
- Salvaged car alternator or DC motor
- Tower or pole for mounting
- Wire

How:
1. Build a cross-shaped hub for blades.
2. Mount to a vertical pole in open space.
3. Connect spinning hub to motor shaft.
4. Wire to a battery or direct-use device.

Uses: Lighting, battery charging, supplemental power.Image
Human Power… Direct Mechanical Energy

When no natural forces are available, you are the generator.

Bicycle Generator
- What You Need:
- Old bicycle
- DC motor or alternator
- Belt or direct contact roller
- Wire and small battery

How:
1. Mount the bike frame securely.
2. Connect rear wheel to motor shaft with a belt or direct roller.
3. Pedal to generate electricity.

Uses: Charging devices, emergency lighting, radios.Image
Atmospheric Energy: Tesla Principles

The earth and sky are filled with natural electrical fields.

Static & Lightning Harvesting

What You Need:
- Copper wire
- Metal rod or long antenna
- Glass jar or ceramic insulator

How:
1. Place the metal rod high (on a tree or pole).
2. Run the wire to a jar wrapped in foil, sitting on a ceramic base.
3. This creates a crude capacitor to collect static energy.

Caution: This captures small amounts of energy safely… never during storms.Image
Salvaged Heat Capture

You can store and redirect heat without electronics.
- Brick or Stone Floors: Absorb sun heat during the day, release it at night.
- Old Car Radiators: Use as heat exchangers for solar thermal systems.
- Reflective Insulation: Found in discarded packaging or old chip bags to focus or retain heat.

The natural world is overflowing with energy, yet the system convinces us it’s scarce so we’ll buy access to it.
These free methods aren’t about powering a smart city grid…
they’re about reclaiming independence, one small system at a time.

They tax your land, your water, and your sun,
but they can’t tax the ingenuity of a free mind.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with VOX of SU

VOX of SU Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @VOX_of_SU

Sep 18
The official story of the internet is a fairy tale…
a shiny tech utopia about “connecting humanity” and “knowledge access.”
But if we follow the dark fiber trail from ARPANET to MK Ultra, the pattern shows that the net wasn’t built for us, it was built around us.

🧵 The True History of the Internet and it’s Programs
ARPANET (1969) Military Origins

The internet began as ARPANET, birthed by DARPA (Defense Advanced Research Projects Agency).

Its original purpose was survivable command and control during nuclear war.

The nodes were universities and labs, yes, but only to test and map human communication patterns, like rats in a maze.

“If you can model how humans communicate under stress, you can control them.”

This is the seed of a digital panopticon, not a library of Alexandria.
Phoenix Program → Digital Counterinsurgency

During Vietnam, the Phoenix Program was a CIA-run counterinsurgency op to track, identify, and neutralize dissidents.

They used informant networks, biometrics, and early computational systems to catalog entire populations.

After Vietnam, these tactics didn’t vanish… they scaled up, eventually merging with ARPANET and later internet technologies.

Phoenix wasn’t just about killing insurgents. It was proof-of-concept for networked population control.

Think of Phoenix as MK Ultra for entire societies…
test it on villages, then wire the whole planet.
Read 10 tweets
Sep 17
⚠️ THREAD: The Bio-Digital Kill Switch ⚠️

This is a thought experiment, not a claim.
I’m showing how existing technology could be combined to create a system so powerful, it could control life and death without leaving fingerprints.

Everything here is real and documented.
The only question is how far it’s already been connected. 🧵
⚠️ THREAD: The Snake Bite System ⚠️
How a bio-digital kill switch could be built today using tech that already exists.

This is a thought experiment, but every piece I show you is real and documented.
The question isn’t whether it can be done.
The question is who’s connecting the dots.

The three layers of control

To create a silent kill switch, you need three layers:

Biological: a change in your body that makes you susceptible.

Digital: a device tethered to your identity, always monitoring.

Network: the infrastructure to target and trigger remotely.

All three layers already exist.

And are already integrated in to society through mRNA transfection, eSIM, and 5G…
Digital identity: eSIM backdoor

Modern phones no longer rely on removable SIM cards.
They use eSIMs…
virtual SIMs that can be programmed remotely.

Patents show they can store multiple profiles, which can be:
- Added
- Deleted
- Activated
Without your knowledge.

Patent US10715978B2 – remote provisioning of multiple eSIM profiles
Patent US20170289788A1 – silent activation/deletion of profiles

This means a second, hidden line can run on your phone… invisible to you.

The kicker… most networks won’t let you use both eSIMs which means a backdoor is open at all times.
Read 17 tweets
Sep 12
The Premature Headlines

Charlie Kirk wasn’t just assassinated
his death was scheduled.

These screenshots show multiple outlets publishing headlines three days ago, before the shooting even happened (see time stamps highlighted in red):

Record Herald: “Charlie Kirk shot and killed at Utah college”

State Hornet: “BREAKING: Charlie Kirk fatally shot at Utah Valley University”

Racism.org: “Charlie Kirk, White Supremacist, Dead at 31”

Even PBS News and WETA had the story indexed one full day early.

Your phone captured the Google timestamps before they were scrubbed.
Now, those same articles have been quietly updated to display Sept 11 timestamps…
a digital rewrite.

This did not happen 3 days ago!Image
Image
Image
Image
Why This Matters

Narrative Pre-Loading
These stories were written, distributed, and queued for release in advance.
Someone, or some system, accidentally triggered them early.

The 9-Hour Offset
Utah is UTC-6, Israel is UTC+3.
The exact 9-hour difference matches the anomaly we saw at 09:11 UTC,
suggesting the master clock controlling the narrative runs on Israeli time.

Palantir’s Role
Palantir’s Foundry platform routes global data and media feeds.
Their Israeli nodes likely pushed the narrative packet,
linking this event to the telecom “cable failures” and the global reset that occurred on 9/11.Image
Image
Image
Image
It’s all connected.

Everything comes down to prophecy, if it isn’t prophecy… it is the World Stage.
Read 8 tweets
Sep 12
What really happened on 9/11/2025

On September 10, Charlie Kirk was assassinated.

The next day, silence fell over September 11.

Little to no reflection or mention of 9/11.

I almost forgot about it.

While the world argued over Kirk’s death,
the real event happened in the shadows.

At 09:11 UTC, the global telecom grid glitched for 60 seconds.

Undersea cables were “blamed.”
Headlines spoke of anchors, outages, repairs.

But that was just the cover story.

What really happened was a simulation reset:

Data rerouted through Palantir’s new backbone.

Packets rewritten in real time.

Financial markets decoupled from reality as the Dow hit 46,000 on bad data.

The collective memory of 9/11 itself erased.

At 11:11 UTC, the grid smoothed to perfect stability…
the new code locked in.
The silence wasn’t apathy.
It was engineered amnesia.

Charlie Kirk’s assassination wasn’t the main event.
It was the ritual distraction to keep everyone staring at the wrong screen
while the Genesis Simulation was patched and upgraded.

The world didn’t just change that day…
reality was rewritten.

And almost no one noticed.
The Timeline

Sept 4, 2025: Palantir hosts AIPCon 8, showing off massive new tools for real-time data fusion and “peer manager” systems…
a direct upgrade to their Foundry platform.

These upgrades focus on telecom traffic, military data streams, and industrial control systems.

Days before the event, they announced partnerships with Lumen Technologies, one of the largest telecom carriers in the U.S.

Sept 6–7, 2025: Red Sea “cable failures” reported.

This narrative creates cover for rerouting global data through new systems… which just happen to be Palantir’s newly announced architecture.

Sept 10, 2025: Charlie Kirk assassinated.

Media frenzy ensures no one is paying attention to global network infrastructure.

MK sleeper cells flood the internet with abhorrent videos dehumanizing themselves while they celebrate the death of Charlie Kirk.

Sept 11, 2025, at 09:11 UTC:

Global micro-outages occur.

Our telecom scan showed global micro-outages, all hitting within seconds of each other:

Red Sea region (the “official” narrative focus)

Middle East financial hubs

West Coast U.S.

Random bursts across Europe and Asia

This wasn’t random congestion.
It was precision synchronization, like pressing the “save and reset” button on a running simulation.

All traffic briefly flows through chokepoints tied to Lumen’s backbone… and therefore, Palantir’s systems.

At 11:11 UTC, perfect stability returns.

This is the “lock-in” of the new simulation layer.
The Role of the Red Sea Cables

The “cable failures” are the scapegoat.
I don’t believe anything was physically cut that day.
Instead:

They temporarily rerouted global internet through Palantir-controlled nodes,

While claiming an external accident had “forced” those changes.

By funneling the world’s data through a single chokepoint, they were able to rewrite packets in real time…
altering the flow of financial, military, and even social media data.

Imagine a software update not for one computer, but for all of reality.
Read 5 tweets
Sep 12
Who Staged Charlie Kirk’s Assassination?

Title: “The Shooting of Charlie Kirk: A Comprehensive Account of the Utah Valley University Attack, the Aftermath, and America’s Response.”

Author credited as Anastasia J. Casey.
Amazon listing (Kindle edition) had a publication date showing September 9, 2025, which is one day before the reported date of the shooting.

The listing has reportedly been removed.

So who is Anastasia J. Casey?Image
The credited author is:

Anastasia J. Casey

This person does not exist.

But… could represent:

Initial + Surname → standard intelligence cover pattern.

Casey has strong intelligence connotations:

William J. Casey:
former CIA Director under Reagan.

William Casey, the former CIA Director, famously said, "We'll know our disinformation program is complete when everything the American public believes is false." This quote reflects concerns about the manipulation of information and the spread of disinformation.

Using “Casey” signals CIA involvement or homage, a dark joke among insiders.

So right away, this alias screams Intel Theater.

This was staged!Image
It gets weirder…

A PolitiFact article from June 13, 2024 mentions a viral image claiming that some “girls” didn’t die at Sandy Hook, listing names including Anastasia Williams, but as part of misinformation content.

And weirder…

Jewish Gematria: “Anastasia J William”

Breakdown:
Anastasia J William → 1330

Jewish Gematria: “Sandy Hook Jacob Hall Satanic Ritual”

Breakdown:
Sandy Hook Jacob Hall Satanic Ritual →1330

Perfect Match: 1330

This isn’t random.
This is a direct numerical link, the kind these intelligence rituals thrive on.

1330 reduces: 1+3+3+0 = 7, a ritual completion number in esoteric systems.

A perfect hit like this ties the name of the supposed author directly to the phrase describing a satanic false-flag school shooting.

The disinformation program is complete.Image
Read 9 tweets
Sep 10
Modern Tethers: 5G & eSIM

Here’s where it gets dystopian:

5G isn’t faster; it’s built for total device identity tracking, down to microsecond handoffs.

Cellular carriers like AT&T’s role in nationwide 5G deployment gives the NSA real-time geo-location and behavioral data.

eSIMs give carriers permanent root-level access.

Carriers can silently provision or swap digital identities without your consent.

The NSA doesn’t need to plant bugs anymore… the eSIM is the bug.

Want to know more about the Global Operations of Defense Telecom Cartel…
👇 🪡 🧵
The Big Four (U.S.): G.O.D’s Favorite Toys

AT&T is the spymaster,
Verizon is the lieutenant,
T-Mobile and Sprint are useful puppets.

Want to know what the 5 eyes web is?

The G.O.D’s all-seeing-eye in the simulated sky that spies? 👇🪡

This is why they think they are like gods…Image
International Partners: The Five Eyes Web

The G.OD doesn’t just play domestically… they are a global spy ring known as the Five Eyes alliance (see image).

These carriers are wired into the same surveillance backbone, sharing real-time intelligence through programs like:

ECHELON: The original global wiretap network.

PRISM: For direct access to private tech company data streams.

XKEYSCORE: The search engine for everything you’ve ever done digitally.

Beyond Five Eyes… Global Sellouts

Some foreign telecoms pretend to be neutral but are deeply compromised:

Huawei & China Mobile… Partnered with Chinese state intelligence; The G.O.D monitors them via backdoors.

Deutsche Telekom (Germany)… Backboned into NATO’s data-sharing agreements.

Orange (France)… Known participant in cross-Atlantic cable taps.Image
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(