All that remains to be seen is who – or what – will set fire to the fuse.
We are poised at what seems to be the pinnacle of a manufactured breakdown, with police shooting unarmed citizens, snipers shooting police, global and domestic violence rising, and a political showdown between two presidential candidates equally matched in unpopularity.
The preparations for the Republican and Democratic national conventions taking place in Cleveland and Philadelphia—augmented by a $50 million federal security grant for each city—provide a foretaste of how the government plans to deal with any individual or group that steps out of line: they will be censored, silenced, spied on, caged, intimidated, interrogated, investigated, recorded, tracked, labeled, held at gunpoint, detained, restrained, arrested, tried and found guilty.
Make no mistake, the government is ready for a civil uprising.
Indeed, the government has been preparing for this moment for years.
A 2008 Army War College report revealed that “widespread civil violence inside the United States would force the defense establishment to reorient priorities in extremis to defend basic domestic order and human security.” The 44-page report goes on to warn that potential causes for such civil unrest could include another terrorist attack, “unforeseen economic collapse, loss of functioning political and legal order, purposeful domestic resistance or insurgency, pervasive public health emergencies, and catastrophic natural and human disasters.”
Subsequent reports by the Department of Homeland Security to identify, monitor and label right-wing and left-wing activists and military veterans as extremists (a.k.a. terrorists) have manifested into full-fledged pre-crime surveillance programs. Almost a decade later, after locking down the nation and spending billions to fight terrorism, the DHS has concluded that the greater threat is not ISIS but domestic right-wing extremism.
Rounding out this profit-driven campaign to turn American citizens into enemy combatants (and America into a battlefield) is a technology sector that is colluding with the government to create a Big Brother that is all-knowing, all-seeing and inescapable. It’s not just the drones, fusion centers, license plate readers, stingray devices and the NSA that you have to worry about. You’re also being tracked by the black boxes in your cars, your cell phone, smart devices in your home, grocery loyalty cards, social media accounts, credit cards, streaming services such as Netflix, Amazon, and e-book reader accounts.
All of this has taken place right under our noses, funded with our taxpayer dollars and carried out in broad daylight without so much as a general outcry from the citizenry.
It’s astounding how convenient we’ve made it for the government to lock down the nation.
We’ve even allowed ourselves to be acclimated to the occasional lockdown of government buildings, Jade Helm military drills in small towns so that special operations forces can get “realistic military training” in “hostile” territory, and Live Active Shooter Drill training exercises, carried out at schools, in shopping malls, and on public transit, which can and do fool law enforcement officials, students, teachers and bystanders into thinking it’s a real crisis.
The events of recent years—the invasive surveillance, the extremism reports, the civil unrest, the protests, the shootings, the bombings, the military exercises and active shooter drills, the color-coded alerts and threat assessments, the fusion centers, the transformation of local police into extensions of the military, the distribution of military equipment and weapons to local police forces, the government databases containing the names of dissidents and potential troublemakers—have all conjoined to create an environment in which “we the people” are more distrustful and fearful of each other and more reliant on the government to keep us safe.
Of course, that’s the point.
The powers-that-be want us to feel vulnerable.
They want us to fear each other and trust the government’s hired gunmen to keep us safe from terrorists, extremists, jihadists, psychopaths, etc.
Most of all, the powers-that-be want us to feel powerless to protect ourselves and reliant on and grateful for the dubious protection provided by the American police state.
There is no place in our nation for the kind of armed revolution our forefathers mounted against a tyrannical Great Britain. Such an act would be futile and tragic. We are no longer dealing with a distant, imperial king but with a tyrant of our own making: a militarized, technologized, heavily-financed bureaucratic machine that operates beyond the reach of the law.
The message being sent to the citizenry is clear: there will be no revolution, armed or otherwise.
Anyone who believes that they can wage—and win—an armed revolt against the American police state has not been paying attention. Those who wage violence against the government and their fellow citizens are playing right into the government’s hands. Violence cannot and will not be the answer to what ails America.
Whether instigated by the government or the citizenry, violence will only lead to more violence. It does not matter how much firepower you have. The government has more firepower.
It does not matter how long you think you can hold out by relying on survivalist skills, guerilla tactics and sheer grit. The government has the resources to outwait, out-starve, outman, outgun and generally overpower you.
This government of wolves will not be overtaken by force.
Unfortunately, we waited too long to wake up to the government’s schemes.
What the government failed to explain was that the domestic terrorists would be of the government’s own making, whether intentional or not.
By waging endless wars abroad, by bringing the instruments of war home, by transforming police into extensions of the military, by turning a free society into a suspect society, by treating American citizens like enemy combatants, by discouraging and criminalizing a free exchange of ideas, by making violence its calling card through SWAT team raids and militarized police, by fomenting division and strife among the citizenry, by acclimating the citizenry to the sights and sounds of war, and by generally making peaceful revolution all but impossible, the government has engineered an environment in which domestic violence has become inevitable.
What we are now experiencing is a civil war, devised and instigated in part by the U.S. government.
The outcome for this particular conflict is already foregone: the police state wins.
The objective: compliance and control.
The strategy: destabilize the economy through endless wars, escalate racial tensions, polarize the populace, heighten tensions through a show of force, intensify the use of violence, and then, when all hell breaks loose, clamp down on the nation for the good of the people and the security of the nation.
So where does that leave us?
Despite the fact that communities across the country are, for all intents and purposes, being held hostage by a government that is armed to the teeth and more than willing to use force in order to “maintain order,” most Americans seem relatively unconcerned. Worse, we have become so fragmented as a nation, so hostile to those with whom we might disagree, so distrustful of those who are different from us, that we are easily divided and conquered.
We have been desensitized to violence, acclimated to a military presence in our communities and persuaded that there is nothing we can do to alter the seemingly hopeless trajectory of the nation. In this way, the floundering economy, the blowback arising from military occupations abroad, police shootings, the nation’s deteriorating infrastructure and all of the other mounting concerns have become non-issues to a populace that is easily entertained, distracted, manipulated and controlled.
The sight of police clad in body armor and gas masks, wielding semiautomatic rifles and escorting an armored vehicle through a crowded street, a scene likened to “a military patrol through a hostile city,” no longer causes alarm among the general populace.
We are fast becoming an anemic, weak, pathetically diluted offspring of our revolutionary forebears incapable of mounting a national uprising against a tyrannical regime.
If there is to be any hope of reclaiming our government and restoring our freedoms, it will require a different kind of coup: nonviolent, strategic and grassroots, starting locally and trickling upwards. Such revolutions are slow and painstaking. They are political, in part, but not through any established parties or politicians.
Most of all, as I make clear in my book Battlefield America: The War on the American People,for any chance of success, such a revolution will require more than a change of politics: it will require a change of heart among the American people, a reawakening of the American spirit, and a citizenry that cares more about their freedoms than their fantasy games.
Comments Off on Target of the Soros Crowd?
Over the left shoulder of this reporter in Cleveland, is a bridge that is rumored to be the target of destruction. The downtown Cleveland bridge’s columns and beams, were being photographed by out-of-towners, who were chased off by local homeless people.
The homeless have been recruited to help keep an eye on downtown Cleveland for the up coming Republican National Convention.
Homeless saw the photo takers, ran them off and then called police. Unfortunately we will likely never know their identity, but it will be a good idea to remember what this bridge looks like, as it may be in the news again.
A tri-agency publication, marked for “Official Use Only entitled, Joint Threat Assessment, was just published July 7th. It states that as of July 7th, a specific group known as Resist the Cleveland RNC is planning violence;
“is assisting anarchists by providing logistical support, training, and a communications platform for anarchist activities including anarchist extremist violence.”
Comments Off on The Mark of The Beast Is Likely Here
I believe the general public has ridden a dead horse about the Mark of The Beast for a long time. They are convinced that the Mark of the Beast is a chip.
In my opinion, to understand how this mark will take shape, requires one to understand the nuances of the language used in the original Biblical text, which was Greek.
Passages referring to it, are found in the New Testament:
Rev_13:17 (KJV) And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.
Rev_14:11 (KJV) And the smoke of their torment ascendeth up for ever and ever: and they have no rest day nor night, who worship the beast and his image, and whosoever receiveth the mark of his name.
Rev_15:2 (KJV) And I saw as it were a sea of glass mingled with fire: and them that had gotten the victory over the beast, and over his image, and over his mark, and over the number of his name, stand on the sea of glass, having the harps of God.
Rev_16:2 (KJV) And the first went, and poured out his vial upon the earth; and there fell a noisome and grievous sore upon the men which had the mark of the beast, and upon them which worshipped his image.
Rev_19:20 (KJV) And the beast was taken, and with him the false prophet that wrought miracles before him, with which he deceived them that had received the mark of the beast, and them that worshipped his image. These both were cast alive into a lake of fire burning with brimstone.
Rev_20:4 (KJV) And I saw thrones, and they sat upon them, and judgment was given unto them: and I saw the souls of them that were beheaded for the witness of Jesus, and for the word of God, and which had not worshipped the beast, neither his image, neither had received his mark upon their foreheads, or in their hands; and they lived and reigned with Christ a thousand years.
The location where the Mark of The Beast will be in/on the body is mentioned in Revelation 20:4. So, let’s examine the original language of that passage.
Since Revelation is written in Greek, I have that passage (below) with reference numbers for each word. These numbers refer to the location in Strong’s Concordance of the original Greek word, and it’s definition.
Rev 20:4 AndG2532 I sawG1492 thrones,G2362 andG2532 they satG2523 uponG1909 them,G846 andG2532 judgmentG2917 was givenG1325 unto them:G846 andG2532 I saw theG3588 soulsG5590 of them that were beheadedG3990 forG1223 theG3588 witnessG3141 of Jesus,G2424 andG2532 forG1223 theG3588 wordG3056 of God,G2316 andG2532 whichG3748 had notG3756 worshippedG4352 theG3588 beast,G2342 neitherG3777 hisG846 image,G1504 neitherG2532 G3756 had receivedG2983 his markG5480uponG1909 theirG848 foreheads,G3359 orG2532 inG1909 theirG848 hands;G5495 andG2532 they livedG2198 andG2532 reignedG936 withG3326 ChristG5547 a thousandG5507 years.G2094
Having taught pre-med and nursing anatomy, I’m keenly aware that terminology for the anatomy of the body is generally derived from the Greek language. Conveniently then, the Greek root word is worth researching, when searching for clues to the author’s intent. That intent would more accurately place one in the author’s mindset, helping us be more able to understand the author’s meaning.
So, the wordforeheads is referenced to Strong’s number G3359 (G for Greek), which states;
G3359 μέτοπον metopon met’-o-pon From G3326 and ὤψ ōps (the face); the forehead (as opposite the countenance): – forehead.
So from that verse in the Bible, it is clear that it is referring to the head. But what part of the head is a very important question to answer. So, let’s examine the word fore in the Greek.
Translation of “fore” in Greek
3 translation entries available
The fore part of the brain
το εμπρός μέρος του εγκεφάλου
Today we have the common word forehead. But the word forehead does not mean the same today, as it would have in time this passage in the Bible was written.
Anything in anatomy with the word fore means; in front of, or originating in the “frontal” plane.
Thus, the Mark of the Beast could be anything, in the front part of the head, which would include the face. That is not what we understand the word forehead to mean today.
Today, forehead to most people refers to the area of the head that is above the eyes, and in the front (fore).
So as you can see, forehead in this passage could also mean somewhere on the forward portion of the face.
With this understanding we can now move beyond the concept of the chip being placed in the forehead, and consider other options.
My thoughts have always been that the Mark of the Beast, would be a facial bio-metric ID.
And recently there is another bio-metric ID that could become, the biblical Mark of the Beast; Iris scanning.
Thus scanning the Iris for ones identity, could become the tracking system implemented, that then must be used to buy or sell. In other words, to be connected to a new monetary system.
With that in mind, there has been a most disturbing development.
FBI officials have scanned the irises of nearly 460,000 people in a pilot program that may soon replace fingerprints. While iris-scanning technology has been around for more than 25 years, it’s just now getting to where it’s fast, easy and relatively bug-free.
“It’s a powerful biometric,” said Patrick Grother, a computer scientist at the National Institute of Standards and Technology in Gaithersburg, Md., who has been developing algorithms and software for iris scanning. “It’s fast to process, it has discriminative power — my iris doesn’t look like your iris, and it has reasonable permanence.”
Iris scanning has replaced retinal scans, a method that has been pretty much abandoned since it turned out to be uncomfortable for people to endure, Grother explained. Iris scan technology was featured recently in the AMC mini-series ” The Night Manager,” based on a John LeCarre spy novel. The lead character used an iris scan camera on his smartphone to access his Swiss bank account (just before a big truck blew up).
Grother says that kind of quick reading ability isn’t far away, and several banks are looking at using it. Windows’ Lumia Nokia and Fujitsu both have iris scanners to unlock their phones, (similar to the iPhone fingerprint pad) but it’s not ready to authenticate other sorts of apps or accounts.
Iris scanning cameras can be hand-held or attached to a wall. They are effective from three to six feet away from the subject’s eyes. Soldiers in Iraq have been using them to authenticate Iraqi civilians who are authorized to work inside U.S. military facilities.
The iris is a part of the eye outside of the pupil that is made of collagen in a three-dimensional arrangement. This pattern can be imaged with light at certain wavelengths.
“It’s like taking picture of sand dunes from space,” he said. “It’s a 3-D object.”
The FBI’s Iris Pilot program is being deployed by law enforcement officials in California, Texas and Missouri during the booking process. The U.S. Border Patrol and Department of Defense are also using iris scans, according to Stephen Fischer, an FBI spokesman.
The next step is collecting iris scans from photographs of people’s eyes.
“Iris images enrolled in the FBI Iris Pilot are primarily captured during the booking process in a controlled setting with a camera designed to capture the iris image,” Fischer said in an email to DNews. “These cameras capture the iris image in near-infrared light. Research is currently being conducted on the extraction of iris images from high-resolution photographs.”
People with brown eyes have more pigment than those with blue eyes, said Grother. That makes it tougher to capture iris information from photographs of brown-eyed folks.
Of course, anyone who blinks, squints or scrunches up their eyes will make it difficult for law enforcement to get a good scan.
Grother and other experts now are developing software to recognize iris patterns from several different camera angles, making it easier to use a hand-held device or smartphone.
The recent events in the middle-east have moved faster than lightning and by that, I don’t mean the electrical form of lightning but the fighter jet. The F-35 Joint Strike Fighter, a.k.a. “Lightning”, is one of the most advanced aircraft available today, and the Turkish Air Force is slated to get 100 of the stealth fighter jets.
The problem becomes obvious after the recent coup attempt in Turkey. Even as I write this the events are still unfolding with the Turkish President Erdogan demanding the US extradite Muslim cleric Fethullah Gulen. Erdogan blames the cleric for the attempted coup. To make matters worse, Erdogan has cut power to and closed the airspace surrounding the USAF Base at Incirlik, stopping bombing runs against ISIS [no surprise since he supports them]. Meanwhile, Turk Secretary of Labor Sleyman Soylu, stated on news channel Haberturk: “The US is behind this coup”.
Erdogan has shown himself to be an unreliable ally at the best of times, denying the US the use of the Incirlik air base during the Iraq invasion. He also stood by and did not a thing while truckloads of oil streamed out of ISIS held Syria over the Turk border, funding the terror group with hundreds of millions of dollars of the black market oil exports that came from his country. He has only recently allowed the USAF to bomb ISIS targets in Syria but even that is under his tight grip with certain facilities off-limits to our attacks from Incirlik.
All this does not bode well for the US, or the war against ISIS. The airbase at Incirlik is also home to some 60 B-61 nuclear bombs. These “dial-a-yield” thermonuclear weapons can go boom with up to 340 Kilotons in explosive power, guaranteed to take the paint off your Prius at 20 miles. While the nuclear weapons are under dual US/Turkish control with split encrypted code keys and special mechanisms to disable them built in, the fact that such weaponry is there, surrounded by the Turkish military, and is enough to make one pause to consider the danger.
The Incirlik base is also home to F-15 Eagle, F-22 Raptor and other USAF aircraft making regular attack runs against ISIS targets inside Syria. Erdogan’s move to declare the airspace off limits has grounded some of our most advanced aircraft involved in the fight and virtually imprisoned the USAF ground crews, pilots and others at the airbase.
The dangers of an accident are now with us in maximum force.
There is also little to doubt that encryption played a major role in the entire drama unfolding before us. First, the anti-Erdogan coup forces used encrypted end-to-end chat to plan and communicate before the actual attack took place. This is one reason why the coup itself was a total surprise to the Turkish government and caught the Obama administration off guard. This does not play well for the guys at NSA HQ in Ft. Meade, Maryland. Commercial grade encryption combined with Internet communications put the White House in the dark.
Secondly, the Turk President Erdogan used encrypted end-to-end commercial apps to communicate to his followers and to the world. This link was critical is his re-establishing power and assembling his followers to back him. Again, social media, commercial grade encryption combined to change world events.
Ironically, the coup forces neglected to shut down the Internet in Turkey and did not seize ISP sites or main communications trunks. In fact, it appears that wasn’t even on the list of things to do. The lesson here is that in the 21st Century, controlling a bridge may be secondary to controlling access to social media. It proved to be part of the coup-plotters undoing.
The F-35 deal with Turkey is also an adventure into the depths of encryption. The F-35 stealth jet is a marvel made possible using a wide array of encrypted communications and sensors. The F-35 is equipped with the APG-81 active electronically scanned array (AESA) stealth radar that changes frequencies randomly over 1,000 times a second using an encrypted code key only it can read to detect the pulses. The random frequency hopping makes the F-35 radar almost impossible to intercept.
The F-35 is also equipped with the Multifunction Advanced Data Link (MADL) and can share sensor data with other F-35 jets in real time. The MADL link means that a force of F-35s can see everything each individual jet can detect. This process is called sensor fusion and means a small number of F-35s can defeat a much larger force. The MADL is not only encrypted but it too jumps through frequencies in a randomized basis, thus other jets without the code keys cannot intercept the MADL information much less try to decode it. Again, the encrypted nature of the communication, combined with the randomized frequency hopping makes the MADL data link virtually invisible.
It is exactly the advanced nature of the F-35 that makes the Turkey situation a true kettle of bad fish. The problem of selling such an advanced fighter jet to an unstable ally is compounded by the B-61 nuclear weapons and even the state of NATO itself. The Turk F-35 jets are to be equipped with the code keys and physical systems required to use the nuclear weapons stored at Incirlik as part of the NATO defense. The very fact that Turkey is part of NATO makes things more difficult because it has been seen as a stalwart ally against the Soviet Union and the new Russian Federation led by Vladimir Putin. [bear in mind the author still has Soviet Union heebee gebees, which is nonsense]
The question is: Are we prepared to repeat that mistake with a hostile Turkey?
[We must ever be mindful that some, especially involved in the the military industrial complex see everything as a nail – Doc]