Download OPERATIONS MANUAL

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Propaganda of the deed wikipedia , lookup

Transcript
THE
OPERATIONS MANUAL
FOR CREATING EFFECTIVE COUNTERMEASURES
AGAINST THE NEW WORLD ORDER
Note to all:
The publishers of this document are to be anonymous and WILL NEVER TAKE CREDIT for this work nor
release any “revised” versions. For the purpose of this document is not for recognition or fame, but rather to
aide in the defense of our freedom from the negative forces that have lied, mislead, and murder humanity since
the days of old. May your allegiance be exclusively and always to Truth, never serve anything or anyone with
the same loyalty for then and only then is when you are truly enslaved.
The Truth will set you free!!
ii
Contents
Introduction ............................................................................................................................................................................ 3
Current Situation....................................................................................................................................... 3
Commitment ............................................................................................................................................. 3
Mission Statement .................................................................................................................................................................. 4
Structure ................................................................................................................................................................................. 4
The Individual ............................................................................................................................................ 4
The Organization ....................................................................................................................................... 4
Treasury .................................................................................................................................................... 5
Basic foundation ..................................................................................................................................................................... 5
Educate yourself ....................................................................................................................................... 5
Do not make yourself a target .................................................................................................................. 6
Physical Appearance - Dress to impress ................................................................................................... 6
Video and Internet are your sword and shield ......................................................................................... 6
Street Actions .......................................................................................................................................................................... 7
Protesting .................................................................................................................................................. 7
System ....................................................................................................................................................... 7
Planning and Preparing ............................................................................................................................. 8
Action ........................................................................................................................................................ 9
Follow-up .................................................................................................................................................. 9
Information Warfare ............................................................................................................................................................. 10
Intelligence .............................................................................................................................................. 10
Covert Intelligence - Espionage..................................................................................................................................... 11
Counter Intelligence - Security................................................................................................................ 11
Prevention ..................................................................................................................................................................... 11
Detection....................................................................................................................................................................... 11
Action ............................................................................................................................................................................ 12
Communication Models ........................................................................................................................................................ 12
Schramm Model ...................................................................................................................................... 12
Peer to Peer Model .................................................................................................................................. 14
The Hierarchical Model ........................................................................................................................... 14
Reflective Schramm Model ..................................................................................................................... 15
Propaganda ........................................................................................................................................................................... 16
Propaganda tactics used by the Oppressors ........................................................................................... 16
Accepted Forms of Propaganda for the movement ............................................................................... 16
Second Amendment.............................................................................................................................................................. 17
Guidelines for Second Amendment events ............................................................................................ 17
Time For Action ..................................................................................................................................................................... 18
2
Introduction
Current Situation
We are constantly being targeted with disinformation and distractions in every level of our social life by the
falsely labeled "Global Elite," through corporate media, entertainment, and their education systems. This,
combined with our lack of knowledge on certain subjects, has created several false states of reality which the
self-proclaimed "Global Elite" manipulate to further their selfish agenda. For the sake of keeping this doctrine
easy to understand we will refer to all these conniving organizations, societies, agents, families, cults, factions,
and individuals who wish to bring about the slavery of humanity and rule the planet with their world order
simple as "New World Order"(NWO).
Commitment
You as the individual part of the organization representing the movement, has willfully taken upon the daunting
task of exposing the New World Order by educating yourself as well as the masses. Using the knowledge you
have acquired, your duty to humanity will not be fulfilled until the abolition of ignorance and greed becomes a
reality. Your Brothers and Sisters have been active and fighting well before you, and the freedoms you now
have are a direct result of their efforts. It is now your turn to carry the torch and continue the fight for freedom
while never forgetting the sacrifices and burdens those before you have endured.
The life you have chosen is now dedicated to informing the public by all means available in a well organized
manner. Doing this we seek to unveil the massive amount of information that is either deliberately suppressed,
ignored or simply unknown. Be strong, confident, wise, positive, and relentless in your actions and never falter
when faced by insurmountably odds, instead rally with your fellow brethren and push forward in the name of
TRUTH.
3
Mission Statement
We are a non-partisan citizen based movement working to:
•
•
•
Educate and motivate people.
Expose the truth behind the lies of the banking cartels, corrupt politicians, corporate, New World
Order(NWO) and the Media.
Bring justice to millions who have died, are dying and suffering all over the world.
We seek to expose the fraud of the left/right paradigm and reveal that the world truly functions on a top/down
hierarchy that has destroyed the lives of many, oppressed millions physically, mentally, and spiritually, induced
wide spread ignorance and threatens to destroy all free society.
We seek to educate people by providing different means and sources of factual information as well as
encouraging people to do their own research and arrive at their own conclusions.
This way helping to unveil the massive amount of information that is either deliberately suppressed, ignored or
simply unknown.
Our main objective over all will always be to help each other get closer to the truth and free ourselves from the
chains of ignorance and disinformation.
Structure
The Individual
Ultimately, it is the change of the individual that can really cause a change in society. Therefore the foundation
of a successful organization starts with the individual. Once you have chosen to get involved in the movement
you must first understand that you no longer represent just yourself but now you are representing your
organization, other organizations who are involved, and the movement itself. This mind frame must be applied
whenever planning, reporting, or conducting anything in the public's eye; for the New World Order and
corporate media are always looking for targets to label as threats, racist, rebellious militias, anarchist, and
whatever other title they can create so as to belittle, humiliate, discredit, and downplay the movement. This
tactic the New World Order use is "the wolf pack approach," like wolves they monitor their targets at a distance
and refrain from attacking the group as a whole for the wolves are too few and weak to take on the united might
of the people, instead they identify leaders and concentrate all their resources on that individual, thus
eliminating the bigger stronger force methodically one-by-one until it is weak and exposed before moving in for
the kill. Remember this well, you by yourself cannot save the world, only working cohesively with your fellow
brothers and sisters within the movement can we expose the New World Order for what they are and protect
each other from being singled out and muffled.
The Organization
4
The organization is an organic, open, compartmentalized entity governed by consensuses where all are equal
with no one individual having any authoritative or dictatorial role. To prevent any centralization of power
divide responsibilities and positions amongst the core members for example:
•
Only the assigned individual(s) having the password or allowed access to the area corresponding to their
position (e.g. only the persons assigned to the visuals of the website can manipulate the graphics. All
images are submitted through them by other members.)
When you are assigned to a position that does not make you dictator of that particular field, you act only as a
tool and assistant to carry out the consensus approved by the group. In the case of any disagreements on how to
conduct something, the issue should be voted on amongst core members and determined by majority vote. All
voted on issues and rules should be documented for all to see and abide by.
Treasury
As the organization grows and being that most of the funding coming from donations a Treasure needs to be
appointed to monitor and document available funds as well as how and what the money is being spent on. Do to
the typical problem of miss use of funds, trust and theft, maintaining an open environment is fundamental. It is
empirical to have the Treasury department reflect this with no exceptions. The treasurer will need to produce a
monthly status report to the group consisting of a bank statement of the account along with a coinciding log
book with receipts which are all kept for the quarterly audit.
Basic foundation
This is the basic foundation for successful Direct Acton and information warfare.
Educate yourself
•
•
KNOW YOUR RIGHTS and how to protect them
Build a fact base support for your statements and presentations, use o factual documents
o Footage of the targeted party: caught in the act of the questionable action. incriminating
statements. evidence that contradicts what the targeted party falsely portrays to the public.
supporting evidence for your allegations against the targeted party.
o Photos
•
What not to do
o Never use the ranting and assumptions of individuals or unreliable documents and text as a
support for your statements in conversations or in front of the camera (ALWAYS FACT
CHECK)
•
o
Never present false or misleading information on anything for this is directly in contrast with the
very essence of the movement: truth. Never use fear mongering tactics even when speaking the
truth for that form of terrorism only serves to manipulate the people with your programming and
they don't really become free from a matrix state. This sort of action would make you no better
5
than the New World Order pigs. For we want people to act off their own free will and in a free
state of mind NOT IN A PROGRAMED STATE. The best evidence is the paper trail that the
targeted individuals/organization leaves behind, for documented evidenced cannot be denied and
needs no flashy presentation, keep it simple, clear, and professional, the facts will speak for itself
Do not make yourself a target
•
Do not do anything illegal
o Do not affiliate yourself with organizations that do partake in sales of drugs or illegal weapons as
well as paramilitary groups that are obsessed with overthrowing the government with military
force.
o Never videotape yourself doing anything illegal
•
Never speak or behave in any uneducated, childish way. People (specially law enforcement) listen and
respect more individuals who compose themselves and speak in a educated manner. Knowing your
rights and articulating them in a professional way when confronted by law enforcement is by far more
efficient then yelling at them using profanities and threats.
Never allow the organization to be involved with any entities who condone any form of racism or hate
directed towards any falsely labeled "races" and or religious communities.
Do not allow yourself to be forced to answer "loaded" questions that clearly have the intention of
making you answer in such a manner that would embarrass or wrongly portray yourself, the
organization, and the movement.
Never speak on topics and or laws that you do not fully comprehend publicly or while being recorded. If
you are not sure about something don't say it!
•
•
•
Physical Appearance - Dress to impress
•
•
They expect protesters and individuals involved in the movement to dress like hippies, punks, Goths,
etc…
Instead dress in a business attire or in a presentable, professional manner and be well groomed. That
way your presence demands respect and your demeanor cannot be brushed off and labeled as a
rebellious freak
Video and Internet are your sword and shield
•
•
Learn the ins and outs of the system (internet)so as to maximize efficiency in protecting your work and
spreading the truth to the all who seek it. Master web applications and take advantage of social gathering
sites to ensure that the message is presented in a user friendly manner and easily accessible from
multiple venues. The Internet has been recognized as a serve threat in undermining the New World
Order due to the open nature of it and the ease of spreading knowledge to all people around the globe.
As a result of the increase in awaking and resistance of the people to New World Order oppression and
lies, the Internet has come under attack from their puppet governments/organizations as being needed to
be controlled and censored. The New World Order has actually achieved that goal in some countries
already and are constantly pushing for more censorship under false flag terrorism, IT IS UP TO YOU
TO DEFEND AND USE THIS SILVER BULLET TO IT FULLEST POTENTIAL IN TAKING
DOWN THE NEW WORLD ORDER BEAST WHILE IT IS STILL AVAILABLE.
Always have a camera and phone on you at all times ready to record
6
Street Actions
Direct Action revolves around 4 basic parts, System, Planning and Preparing, Action, and Follow-up. These
follow the 5P’s which are Proper Planning Prevents Poor Performance.
Protesting
•
•
•
•
•
•
•
If you need a permit get one
o Research local statutes and laws
Research the event
Create a plan of action
Protest peacefully and orderly
Do not ramble on the bullhorn
Do not give them any reason to arrest you
Always have several cameras filming at all time
o Both openly and conspicuously
System
All the positions of a typical Direct Action event
•
Regular Protesters
o Usually not members of the organization
o Usually show up on their own
o Support, organize, and guide them
o Identify provocateurs and troublemakers within this group by front-men and others
o Only high quality signs, enforced by front-mens
No crayon and cardboard
No homemade stuff
Replace with good quality printings
•
Front men
o Part of the organization
o Usually a show of force from the organization
o Holding banners
o Coordinate the regular protesters and identify any problem people
o Equipped either with a megaphone and/or a camera
o Constantly maintain eye contact with watchmen or ear piece radios
•
Watchmen
o Separate from group at all times
o May have a hand signal system with the front-men
o Listens to scanners and nearby police or other individuals
o Aware of possible threats when law enforcement may be provoked to action
•
Coordinators
7
o
o
May be front-men, watchmen, or HQ
Meet periodically through the Direct Action event to check on progress and communicate any
information that is needed
•
Headquarters
o Based in an safe area far from possible harm with internet access (wifi or some other access)
o Has communication access to watchmen and front-men
o Housing area of equipment
o Does periodic updates with either live blogging or live streaming of video Ideal launching and
follow up area
•
Street Medic
o First Aide
o Check state laws over lifesaving, i.e. Florida’s good Samaritan laws
o Make sure they are qualified for medical procedures i.e. CPR certified
o Located on the peripherals awaiting calls or need for response
•
Support
o Hold supplies, fliers, drinks,
o in and out of the Direct Action event
•
Media
o
o
o
o
•
Watch your mouth and actions in front of THEIR cameras
Do Not Use words that can discredit the movement. An example will be calling a police officer a
cop or a pig while being interviewed.
Do Not go on a rant on camera either. The news media will spin it to make you look crazy and
therefore the rest of the movement appears to be crazy.
Do not call government officials words such as "fascist". They may very well be fascist but the
media will spin it to make you look like you are a radical from the opposing party. Instead use
phrases like "The current policies that the governor of California is making can lead our state
into a disturbing position that will be long lasting and very hard to come out of."
Police
o
o
o
o
o
o
Do NOT DISRESPECT OR PROVOKE
Get the media and your cameras on them at all times
Never panic and run away due to the creation of a panic situation developing
In the event of a use of force
Leave calmly
DOCUMENT DOCUMENT DOCUMENT (VIDEO VIDEO VIDEO)
Planning and Preparing
This is where you prepare for your Direct Action event, it is a very crucial stage in your development and
success of the event.
•
Research
o Identify situations and events of interest
o Who what why and where
8
o
o
Threat levels
Setup website for the event with useful information on the event
•
Recon the area
o Plan routes to take to and from the event
o Plan escapes from the event
o Plan meeting points for the event
o Plan the actual route or location of the event
o Know the layout and parking
o Have a contingency plan in case law enforcement changes up the layout at the last minute
o Research laws and permits
o Google maps and have material maps for people ready
•
Develop hand signals
o Communication means both technical and verbal/gestures
•
Develop timetable
o Meeting point times
o Coordinated meeting times
•
Equipment checks
o Gather equipment and checklists for the event
o Create a flexible strategy that takes in account Murphy’s Laws
Action
What actual happens on the day of the direct action.
•
•
•
•
•
•
•
•
•
•
Setup HQ and obtain internet access for media updates and live streaming
Test all equipment and formulate communication both verbal and non-verbal
Head count and reaffirm roles
Double emergency contact list
Distribute equipment and printed media
Watchmen move to positions to observe and monitor
Front men, Support, Street Medic go to meeting point to rally and lead regular protesters
Execute plan of action and follow the procedure for the assigned task and STICK TO THE TIME
SCHEDULE
Always be on the lookout for possible threats to yourself and the plan
Collect all recordings of event
Follow-up
For every successful direct action, a follow up is a necessity and will help solidify your actions. Just the direct
action itself is not enough to really make an impact; a record of the event needs to be well documented and
viewable for people that did not make it to the event in a prompt and timely manner. The quicker it is updated
and documented the better the response from the people will be. Schedule a meeting after the event with all the
key members to help sort through the footage gained is a definite must. There are several ways to document and
spread information about the event, listed below are some suggestions.
9
•
•
•
•
•
Edit video to focus on key points
Get in contact with involved parties that were at the direct action for future collaborations and possible
missed recordings
Update with images, videos, and thank yous on any sub-domains that you have created.
Compose and generate articles
In the case of fellow members being incarcerated, enact calling tree
Information Warfare
Intelligence
Open Source intelligence - Public, Overt
•
•
Media Gathering
Digital Media
o Using the internet to gather information on people by using Social sites
o Other sites
o Web crawling
o Personal online research - databases
o Archiving Really Simple Syndication (RSS) News Feeds
o USENET (Google Groups)
•
Verifying credible sources
•
Monitor Developments
o Interesting news stories
o Hearsay leads
o Developing situations of interest
•
Media Analysis
o Cross article examination (the big picture)
•
Content Management - Technologies to organize intelligence gathering
o Word press, Joomla...
•
Print Media
o Newspapers
o Magazines
o Journals
o Books
o Encyclopedias
•
Audio-visual Media
o Stringing - Police radio information
o Old Recordings
o Documentaries
o Video Websites
10
o
o
Audio Books
Internet MP3 Search
Covert Intelligence - Espionage
Another form of intelligence is by means of covert activities or espionage. However the organization does not
engage on this type of intelligence gathering as it is outside of our mission statement.
Counter Intelligence - Security
Cointelpro/security breaches can come from inside and outside the organization.
Prevention
Become invisible both online and off line Leave no paper trails or leads to any personal information. Treat all
phone conversations, email, text and any other public/digital communications as possibly being compromised.
Never discuss any sensitive information or make any statements even in humor that could be used against you
in a court of law.
Post a clear disclaimer on the organization's website to protect against any possible allegations of supporting
any illegal or racist material. Be careful of what you say in public places you can be overheard or caught on
some form of recording media.
Have strict admission rules for membership. Be very careful about the people you allow in your trust circle.
Establish different levels of trust within the organization. Structure a hierarchy system of members- Core
members: the decision makers and backbone of the organization. Members: fairly trust worthy individuals who
do not have access to any sensitive info and may be part-timers. Affiliates: individuals who may just collaborate
on certain events or who may offer some service to the group e.g. printing t-shirts, these individuals are to be
kept at arm distance until trust can be established
Communication of all suspicious activity between core members is vital. When planning events, keep details of
the event within the trusted circle and all non-core individuals on a need to know basis.
Online - For any account you create use a unique alias not attached to any of your personal information. Enforce
security practices on all Desktops and servers to prevent both physical and digital theft.
Detection
security vulnerability and infiltration detection
Stage compromising scenarios to test and gauge accused individual's responses.
Once a threat has been detected, meet with other trusted member to present evidence and discuss a plan of
action.
Investigation of the individual or organization should be conducted as soon as any suspicion arises.
Analyze accused party's response to compromising questions
11
Action
Direct Members - Expose accused party publicly as a GROUP and record confrontation. Immediately change all
passwords/user names and prevent all access to sensitive information until issue has been resolved. Review all
areas that the infiltrator had access to for possible sabotage.
Non Members - Call or contact, confront and record.
Possible legal action can and should be carried out if any documented evidence arises of illegal recordings,
searches, and or seizures undertaken by the accused.
Indirect Once possible infiltration of the group has been identified, quarantine individual(s) until threat has been
evaluated. Disinformation - funnel misinformation towards the identified threat so as to protect, mislead, and
confuse the infiltrator(s) on the organization's true agenda and planned events. Only through proper
coordination and planning can the accused party be set up to respond in an incriminating manner.
Gather evidence and document everything.
Communication Models
Being that it is of the utmost importance that YOUR MESSAGE IS RECEIVED AND INTERTPATED
CORRECTLY by your targeted audience, you and your organization must make sure to present your messages
in a clear and effective manner. To further aid the spreading of truth to the people we have included this
overview to help you develop clear, cohesive, and effective lines of communication to all who will listen. The
key aspects in successfully conveying your messages is understanding the flow and dynamics of
communication, how the receivers will be interpret it, the venue you choose to send your message through, and
most importantly NOT TO CONFUSE OR DISTRACT THE RECIEVERS FRROM YOUR MAIN MESSAGE
WITH UNESSARY INFORMATION(NOISE).
Schramm Model
There are costs to gather information, build context, compare choices and estimate outcomes. "Transaction
costs" are the time and effort to execute a transaction. Schramm's communication model ( based on Claude
Shannons' theory of communication ) exposes the mechanism of transaction costs. The Meme Theory is an
empirical use of the Schramm communication model.
12
Jack creates a message, encodes contextual information and transmits it to Jill. Jill receives and decodes the
message using her own context.
If their contexts are identical, if they possess the same vocabulary and beliefs (homogeneous), then transaction
costs are low. But as their contexts diverge (heterogeneous), transaction costs rise from translation errors,
miscommunication, need for synchronization of contexts. This balance of homogeneous versus heterogeneous
defines architecture. How is context is synchronized and why does it diverge?
For human beings, sending and receiving information requires time and effort. Just like computer hardware
or networks, human beings transmit information at a fixed rate, due to impedance in communication.
Schramm's communication model shows low-level mechanics. Coase Theory gives a strategic perspective of
costs and leads us to design patterns...
"because markets are costly to use, the most efficient production process often takes place in a firm"
Organizations reduce transaction costs for a goal or product. Fewer transactions mean less human interaction; a
reduction in the time and effort to assess information. Transaction costs are the foundation of in economics and
the basis for design patterns, topologies which minimize transaction costs. The right pattern at the right pattern
at the right time creates optimum efficiency and response.
13
Peer to Peer Model
Assemble four workers into a peer-to-peer topology. Each team member acts as an independent participant in a
perfect free market. Here we have twelve information channels. As new members are added, channels (and
transaction costs) rise exponentially and the effects are...
•
High redundancy: workers send duplicate data to each other.
•
High contention: duplicate data is misinterpreted or outdated.
•
High latency: most data travels three hops.
The Hierarchical Model
14
Now assemble the same four workers into an organization (Mediator pattern), add a manager to partition and
direct information to the right destination. Team size increases 25% but information channels shrink 33% to
eight channels.
•
Low redundancy: each worker has only the necessary data.
•
Low contention: The manager is the sole source of information.
•
Lower latency: information travels a maximum of two hops.
The hierarchical organization substantially reduces errors, conflicts, unnecessary duplication and
decreases reaction time by reducing transaction costs.
Reflective Schramm Model
1) "Noise" is an all-purpose placeholder for miscommunication in the traditional Schramm model. The
Reflective Schramm model is more detailed description of miscommunication & context. A person's context
knows nothing of external contexts, only the internal models it develops of externalities. Miscommunication is a
mismatch between the model and the external context it models.
2) Internal models are developed over time through sets of send/receive messages. Miscommunication occurs
from improper interpretation of received messages, delay of receive messages, initial development of a context
model or a poor methodology of send/receive messages used to develop the model.
3) In the Recursive Schramm model a person's context contains models of itself which are derived from other
people. Jack builds a context model of Jill. But Jill's context model contains its own model of Jack. An accurate
model would include Jill's model of himself.
Implications: How we derive a context model is vital. Relationship determines appropriate exchange. A set of
15
exchanges which are narrow and repetitive will produce a limited context model. If we know that future
exchanges are equally narrow and repetitive, then the model might be acceptable. But more likely, the
methodology of exchange is flawed and produces a flawed context model, which generates continuous
miscommunication.
I'll repeat that. How we interrogate and interpret determines the accuracy of future communication. How
we ask questions and interpret answers builds a foundation.
Propaganda
Propaganda is a very effective and powerful tool that the deceitful New World Order has perfected and
implemented through all the levels of social life to manipulate the ignorant masses and discredit, ridicule, and
discourage individuals who disagree with the fallacious New World Order programming and attempt to spread
the truth. That being said it is important to take note on the propaganda tactics used by the New World Order to
be able to identify when it is being used and to positively implement them in spreading the truth so as to
maximize efficiency.
Propaganda tactics used by the Oppressors
•
•
•
•
•
•
•
•
•
•
•
•
neuro-linguistic programming(use of speech and hand patterns to subliminally implant messages in your
mind)
repetitive use of images and sounds(t.v. and corporate music)
intentional placement/arrangement of images, patterns, lights, etc (product placement)
chemical/biological mind control(drugs, added chemicals in water supply)
MK ULTRA mind control(military psy-op tactics)
use of frequencies(H.A.A.R.P.,FM radio signals)
torture
biometric(RFID chips, nanotechnology)
educational system(controlling and manipulating the minds of the people from childhood)
religion(creating a subjective population to "GOD's will" when in actuality it is the New World Order's
will)
entertainment(used to distract and subliminally direct messages to the people)
Fear(used to mobilize the population in a certain direction)
Accepted Forms of Propaganda for the movement
•
•
•
Note:- make sure to keep in Compliance with the ”fair use act” and all copyright lawsInternet(the Silver bullet against the oppressive beast, learn it, use it, protect it)
Info bombs: The purpose of a Info Bomb is to bombarded the individual and blow up any preconceived
notions programmed into him/her by the inaccurately declared "Global Elite", corporate media, or
ignorance. Expose them to the truth and provide them with a venue(the org.)to access more info and
become involved in the movement. Contents consists of 3-5DVDs of documentaries that present factual
information on the true/secret agendas and actions of the government, military complex, New World
Order, religious communities, secret societies, etc. A flier which describes your organization's purpose,
events, websites, and contact info. Four vital PDF documents( Operation North Wood, Modern Money
16
•
•
•
•
•
•
Mechanics, Rebuilding America's Defenses, Civilian Inmate Labor Program )preferably in print but can
be placed on a labeled CD. All of this package together in a presentable fashion e.g. brown paper bag.
Videos(create and or distribute documentaries)
Distribution of DVDs, fliers ,knowledge, declassified incriminating government documents(every
location and individual is an opportunity to spread truth)
street interviews: engaging random individuals on the street to educate and ascertain the level of their
knowledge base and/or expand their knowledge base. Have preselected photos and questions of
government officials, New World Order scum, and fluff pieces(celebrates, sports stars)and ask the
individuals if they can recognize the persons in the photos and educate them on the ones they fail.
Always have a camera recording and pass out business cards/fliers of the org.
broadcasting(radio, internet, T.V.)
information seminars
street actions/tea parties
Second Amendment
Note: This is unfortunately only applicable to Citizens of the United States of America.
If the organization so chooses to exercise their Second Amendment right it must be done in compliance with
both State and Federal statues and in no way will deviation from those guidelines be tolerated nor endorsed by
the organization. To better educate and promote proper gun etiquette to the people and members, the
organization should schedule at least once a month Second Amendment event at a local shooting range inviting
all to partake and experience in paying homage to your Second Amendment right responsibly. The organization
may also see fit to get involve with NRA support groups and may even demonstrate their support for proposed
legislature that expands your Second Amendment rights. If you your organization wants to help create national
awareness of our Second Amendment Rights coordinate your event on every second Saturday of every month
that way we demonstrate our united support and gratitude of our right to bear arms.
Guidelines for Second Amendment events
•
•
•
•
Exercise your Second Amendment right responsibly with proper gun etiquette
Make sure all weapons are brought to the shooting range are compliant with all state statutes
Make sure all members understand FULLY gun safety and proper firing positions
Never promote or partake in illegal firearm discharges
17
Time For Action
The time for action is now! Brother and Sisters we are in the eve of our victory over the oppressors, the truth
cannot be concealed any longer! The NWO agenda has been rejected and the people have confronted the
falsifiers. Their iron grip around humanity loosens while our strength increases with every new individual that
awakens from their Matrix programming. True they have won several battles throughout our history but they
will loose the War, for our will and desire for freedom cannot be suppressed or destroyed. Total victory still
eludes us for there are still many of our brethren that remain lost in the mist of ignorance, we must be the
lighthouse that guides them back to freedom with truth being our signal. With their NWO propaganda failing
the oppressors are now nervous and have become reckless in their actions. In unsuccessfully trying to speed up
their plans for global domination they have lost composure and have become undisciplined making themselves
vulnerable to attack. Mind control and physical force will be their last futile attempt at accomplishing their
perverted goals. Fortunately we are now ready to fight back for our freedom and we will be victorious. You as a
free willed and free thinking individual are the most effective weapon against tyranny and ignorance, as long as
there is any lasting breath in anyone of us the hopes for humanity still exist. Hopefully once the threat is over
the people will learn from the mistakes of this world and implement these hard won lessons to prevent such a
monster from every arising ever again. Now go forth my peers with your newly acquired knowledge and spread
truth for all who seek it and never forget
18