Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
THE OPERATIONS MANUAL FOR CREATING EFFECTIVE COUNTERMEASURES AGAINST THE NEW WORLD ORDER Note to all: The publishers of this document are to be anonymous and WILL NEVER TAKE CREDIT for this work nor release any “revised” versions. For the purpose of this document is not for recognition or fame, but rather to aide in the defense of our freedom from the negative forces that have lied, mislead, and murder humanity since the days of old. May your allegiance be exclusively and always to Truth, never serve anything or anyone with the same loyalty for then and only then is when you are truly enslaved. The Truth will set you free!! ii Contents Introduction ............................................................................................................................................................................ 3 Current Situation....................................................................................................................................... 3 Commitment ............................................................................................................................................. 3 Mission Statement .................................................................................................................................................................. 4 Structure ................................................................................................................................................................................. 4 The Individual ............................................................................................................................................ 4 The Organization ....................................................................................................................................... 4 Treasury .................................................................................................................................................... 5 Basic foundation ..................................................................................................................................................................... 5 Educate yourself ....................................................................................................................................... 5 Do not make yourself a target .................................................................................................................. 6 Physical Appearance - Dress to impress ................................................................................................... 6 Video and Internet are your sword and shield ......................................................................................... 6 Street Actions .......................................................................................................................................................................... 7 Protesting .................................................................................................................................................. 7 System ....................................................................................................................................................... 7 Planning and Preparing ............................................................................................................................. 8 Action ........................................................................................................................................................ 9 Follow-up .................................................................................................................................................. 9 Information Warfare ............................................................................................................................................................. 10 Intelligence .............................................................................................................................................. 10 Covert Intelligence - Espionage..................................................................................................................................... 11 Counter Intelligence - Security................................................................................................................ 11 Prevention ..................................................................................................................................................................... 11 Detection....................................................................................................................................................................... 11 Action ............................................................................................................................................................................ 12 Communication Models ........................................................................................................................................................ 12 Schramm Model ...................................................................................................................................... 12 Peer to Peer Model .................................................................................................................................. 14 The Hierarchical Model ........................................................................................................................... 14 Reflective Schramm Model ..................................................................................................................... 15 Propaganda ........................................................................................................................................................................... 16 Propaganda tactics used by the Oppressors ........................................................................................... 16 Accepted Forms of Propaganda for the movement ............................................................................... 16 Second Amendment.............................................................................................................................................................. 17 Guidelines for Second Amendment events ............................................................................................ 17 Time For Action ..................................................................................................................................................................... 18 2 Introduction Current Situation We are constantly being targeted with disinformation and distractions in every level of our social life by the falsely labeled "Global Elite," through corporate media, entertainment, and their education systems. This, combined with our lack of knowledge on certain subjects, has created several false states of reality which the self-proclaimed "Global Elite" manipulate to further their selfish agenda. For the sake of keeping this doctrine easy to understand we will refer to all these conniving organizations, societies, agents, families, cults, factions, and individuals who wish to bring about the slavery of humanity and rule the planet with their world order simple as "New World Order"(NWO). Commitment You as the individual part of the organization representing the movement, has willfully taken upon the daunting task of exposing the New World Order by educating yourself as well as the masses. Using the knowledge you have acquired, your duty to humanity will not be fulfilled until the abolition of ignorance and greed becomes a reality. Your Brothers and Sisters have been active and fighting well before you, and the freedoms you now have are a direct result of their efforts. It is now your turn to carry the torch and continue the fight for freedom while never forgetting the sacrifices and burdens those before you have endured. The life you have chosen is now dedicated to informing the public by all means available in a well organized manner. Doing this we seek to unveil the massive amount of information that is either deliberately suppressed, ignored or simply unknown. Be strong, confident, wise, positive, and relentless in your actions and never falter when faced by insurmountably odds, instead rally with your fellow brethren and push forward in the name of TRUTH. 3 Mission Statement We are a non-partisan citizen based movement working to: • • • Educate and motivate people. Expose the truth behind the lies of the banking cartels, corrupt politicians, corporate, New World Order(NWO) and the Media. Bring justice to millions who have died, are dying and suffering all over the world. We seek to expose the fraud of the left/right paradigm and reveal that the world truly functions on a top/down hierarchy that has destroyed the lives of many, oppressed millions physically, mentally, and spiritually, induced wide spread ignorance and threatens to destroy all free society. We seek to educate people by providing different means and sources of factual information as well as encouraging people to do their own research and arrive at their own conclusions. This way helping to unveil the massive amount of information that is either deliberately suppressed, ignored or simply unknown. Our main objective over all will always be to help each other get closer to the truth and free ourselves from the chains of ignorance and disinformation. Structure The Individual Ultimately, it is the change of the individual that can really cause a change in society. Therefore the foundation of a successful organization starts with the individual. Once you have chosen to get involved in the movement you must first understand that you no longer represent just yourself but now you are representing your organization, other organizations who are involved, and the movement itself. This mind frame must be applied whenever planning, reporting, or conducting anything in the public's eye; for the New World Order and corporate media are always looking for targets to label as threats, racist, rebellious militias, anarchist, and whatever other title they can create so as to belittle, humiliate, discredit, and downplay the movement. This tactic the New World Order use is "the wolf pack approach," like wolves they monitor their targets at a distance and refrain from attacking the group as a whole for the wolves are too few and weak to take on the united might of the people, instead they identify leaders and concentrate all their resources on that individual, thus eliminating the bigger stronger force methodically one-by-one until it is weak and exposed before moving in for the kill. Remember this well, you by yourself cannot save the world, only working cohesively with your fellow brothers and sisters within the movement can we expose the New World Order for what they are and protect each other from being singled out and muffled. The Organization 4 The organization is an organic, open, compartmentalized entity governed by consensuses where all are equal with no one individual having any authoritative or dictatorial role. To prevent any centralization of power divide responsibilities and positions amongst the core members for example: • Only the assigned individual(s) having the password or allowed access to the area corresponding to their position (e.g. only the persons assigned to the visuals of the website can manipulate the graphics. All images are submitted through them by other members.) When you are assigned to a position that does not make you dictator of that particular field, you act only as a tool and assistant to carry out the consensus approved by the group. In the case of any disagreements on how to conduct something, the issue should be voted on amongst core members and determined by majority vote. All voted on issues and rules should be documented for all to see and abide by. Treasury As the organization grows and being that most of the funding coming from donations a Treasure needs to be appointed to monitor and document available funds as well as how and what the money is being spent on. Do to the typical problem of miss use of funds, trust and theft, maintaining an open environment is fundamental. It is empirical to have the Treasury department reflect this with no exceptions. The treasurer will need to produce a monthly status report to the group consisting of a bank statement of the account along with a coinciding log book with receipts which are all kept for the quarterly audit. Basic foundation This is the basic foundation for successful Direct Acton and information warfare. Educate yourself • • KNOW YOUR RIGHTS and how to protect them Build a fact base support for your statements and presentations, use o factual documents o Footage of the targeted party: caught in the act of the questionable action. incriminating statements. evidence that contradicts what the targeted party falsely portrays to the public. supporting evidence for your allegations against the targeted party. o Photos • What not to do o Never use the ranting and assumptions of individuals or unreliable documents and text as a support for your statements in conversations or in front of the camera (ALWAYS FACT CHECK) • o Never present false or misleading information on anything for this is directly in contrast with the very essence of the movement: truth. Never use fear mongering tactics even when speaking the truth for that form of terrorism only serves to manipulate the people with your programming and they don't really become free from a matrix state. This sort of action would make you no better 5 than the New World Order pigs. For we want people to act off their own free will and in a free state of mind NOT IN A PROGRAMED STATE. The best evidence is the paper trail that the targeted individuals/organization leaves behind, for documented evidenced cannot be denied and needs no flashy presentation, keep it simple, clear, and professional, the facts will speak for itself Do not make yourself a target • Do not do anything illegal o Do not affiliate yourself with organizations that do partake in sales of drugs or illegal weapons as well as paramilitary groups that are obsessed with overthrowing the government with military force. o Never videotape yourself doing anything illegal • Never speak or behave in any uneducated, childish way. People (specially law enforcement) listen and respect more individuals who compose themselves and speak in a educated manner. Knowing your rights and articulating them in a professional way when confronted by law enforcement is by far more efficient then yelling at them using profanities and threats. Never allow the organization to be involved with any entities who condone any form of racism or hate directed towards any falsely labeled "races" and or religious communities. Do not allow yourself to be forced to answer "loaded" questions that clearly have the intention of making you answer in such a manner that would embarrass or wrongly portray yourself, the organization, and the movement. Never speak on topics and or laws that you do not fully comprehend publicly or while being recorded. If you are not sure about something don't say it! • • • Physical Appearance - Dress to impress • • They expect protesters and individuals involved in the movement to dress like hippies, punks, Goths, etc… Instead dress in a business attire or in a presentable, professional manner and be well groomed. That way your presence demands respect and your demeanor cannot be brushed off and labeled as a rebellious freak Video and Internet are your sword and shield • • Learn the ins and outs of the system (internet)so as to maximize efficiency in protecting your work and spreading the truth to the all who seek it. Master web applications and take advantage of social gathering sites to ensure that the message is presented in a user friendly manner and easily accessible from multiple venues. The Internet has been recognized as a serve threat in undermining the New World Order due to the open nature of it and the ease of spreading knowledge to all people around the globe. As a result of the increase in awaking and resistance of the people to New World Order oppression and lies, the Internet has come under attack from their puppet governments/organizations as being needed to be controlled and censored. The New World Order has actually achieved that goal in some countries already and are constantly pushing for more censorship under false flag terrorism, IT IS UP TO YOU TO DEFEND AND USE THIS SILVER BULLET TO IT FULLEST POTENTIAL IN TAKING DOWN THE NEW WORLD ORDER BEAST WHILE IT IS STILL AVAILABLE. Always have a camera and phone on you at all times ready to record 6 Street Actions Direct Action revolves around 4 basic parts, System, Planning and Preparing, Action, and Follow-up. These follow the 5P’s which are Proper Planning Prevents Poor Performance. Protesting • • • • • • • If you need a permit get one o Research local statutes and laws Research the event Create a plan of action Protest peacefully and orderly Do not ramble on the bullhorn Do not give them any reason to arrest you Always have several cameras filming at all time o Both openly and conspicuously System All the positions of a typical Direct Action event • Regular Protesters o Usually not members of the organization o Usually show up on their own o Support, organize, and guide them o Identify provocateurs and troublemakers within this group by front-men and others o Only high quality signs, enforced by front-mens No crayon and cardboard No homemade stuff Replace with good quality printings • Front men o Part of the organization o Usually a show of force from the organization o Holding banners o Coordinate the regular protesters and identify any problem people o Equipped either with a megaphone and/or a camera o Constantly maintain eye contact with watchmen or ear piece radios • Watchmen o Separate from group at all times o May have a hand signal system with the front-men o Listens to scanners and nearby police or other individuals o Aware of possible threats when law enforcement may be provoked to action • Coordinators 7 o o May be front-men, watchmen, or HQ Meet periodically through the Direct Action event to check on progress and communicate any information that is needed • Headquarters o Based in an safe area far from possible harm with internet access (wifi or some other access) o Has communication access to watchmen and front-men o Housing area of equipment o Does periodic updates with either live blogging or live streaming of video Ideal launching and follow up area • Street Medic o First Aide o Check state laws over lifesaving, i.e. Florida’s good Samaritan laws o Make sure they are qualified for medical procedures i.e. CPR certified o Located on the peripherals awaiting calls or need for response • Support o Hold supplies, fliers, drinks, o in and out of the Direct Action event • Media o o o o • Watch your mouth and actions in front of THEIR cameras Do Not Use words that can discredit the movement. An example will be calling a police officer a cop or a pig while being interviewed. Do Not go on a rant on camera either. The news media will spin it to make you look crazy and therefore the rest of the movement appears to be crazy. Do not call government officials words such as "fascist". They may very well be fascist but the media will spin it to make you look like you are a radical from the opposing party. Instead use phrases like "The current policies that the governor of California is making can lead our state into a disturbing position that will be long lasting and very hard to come out of." Police o o o o o o Do NOT DISRESPECT OR PROVOKE Get the media and your cameras on them at all times Never panic and run away due to the creation of a panic situation developing In the event of a use of force Leave calmly DOCUMENT DOCUMENT DOCUMENT (VIDEO VIDEO VIDEO) Planning and Preparing This is where you prepare for your Direct Action event, it is a very crucial stage in your development and success of the event. • Research o Identify situations and events of interest o Who what why and where 8 o o Threat levels Setup website for the event with useful information on the event • Recon the area o Plan routes to take to and from the event o Plan escapes from the event o Plan meeting points for the event o Plan the actual route or location of the event o Know the layout and parking o Have a contingency plan in case law enforcement changes up the layout at the last minute o Research laws and permits o Google maps and have material maps for people ready • Develop hand signals o Communication means both technical and verbal/gestures • Develop timetable o Meeting point times o Coordinated meeting times • Equipment checks o Gather equipment and checklists for the event o Create a flexible strategy that takes in account Murphy’s Laws Action What actual happens on the day of the direct action. • • • • • • • • • • Setup HQ and obtain internet access for media updates and live streaming Test all equipment and formulate communication both verbal and non-verbal Head count and reaffirm roles Double emergency contact list Distribute equipment and printed media Watchmen move to positions to observe and monitor Front men, Support, Street Medic go to meeting point to rally and lead regular protesters Execute plan of action and follow the procedure for the assigned task and STICK TO THE TIME SCHEDULE Always be on the lookout for possible threats to yourself and the plan Collect all recordings of event Follow-up For every successful direct action, a follow up is a necessity and will help solidify your actions. Just the direct action itself is not enough to really make an impact; a record of the event needs to be well documented and viewable for people that did not make it to the event in a prompt and timely manner. The quicker it is updated and documented the better the response from the people will be. Schedule a meeting after the event with all the key members to help sort through the footage gained is a definite must. There are several ways to document and spread information about the event, listed below are some suggestions. 9 • • • • • Edit video to focus on key points Get in contact with involved parties that were at the direct action for future collaborations and possible missed recordings Update with images, videos, and thank yous on any sub-domains that you have created. Compose and generate articles In the case of fellow members being incarcerated, enact calling tree Information Warfare Intelligence Open Source intelligence - Public, Overt • • Media Gathering Digital Media o Using the internet to gather information on people by using Social sites o Other sites o Web crawling o Personal online research - databases o Archiving Really Simple Syndication (RSS) News Feeds o USENET (Google Groups) • Verifying credible sources • Monitor Developments o Interesting news stories o Hearsay leads o Developing situations of interest • Media Analysis o Cross article examination (the big picture) • Content Management - Technologies to organize intelligence gathering o Word press, Joomla... • Print Media o Newspapers o Magazines o Journals o Books o Encyclopedias • Audio-visual Media o Stringing - Police radio information o Old Recordings o Documentaries o Video Websites 10 o o Audio Books Internet MP3 Search Covert Intelligence - Espionage Another form of intelligence is by means of covert activities or espionage. However the organization does not engage on this type of intelligence gathering as it is outside of our mission statement. Counter Intelligence - Security Cointelpro/security breaches can come from inside and outside the organization. Prevention Become invisible both online and off line Leave no paper trails or leads to any personal information. Treat all phone conversations, email, text and any other public/digital communications as possibly being compromised. Never discuss any sensitive information or make any statements even in humor that could be used against you in a court of law. Post a clear disclaimer on the organization's website to protect against any possible allegations of supporting any illegal or racist material. Be careful of what you say in public places you can be overheard or caught on some form of recording media. Have strict admission rules for membership. Be very careful about the people you allow in your trust circle. Establish different levels of trust within the organization. Structure a hierarchy system of members- Core members: the decision makers and backbone of the organization. Members: fairly trust worthy individuals who do not have access to any sensitive info and may be part-timers. Affiliates: individuals who may just collaborate on certain events or who may offer some service to the group e.g. printing t-shirts, these individuals are to be kept at arm distance until trust can be established Communication of all suspicious activity between core members is vital. When planning events, keep details of the event within the trusted circle and all non-core individuals on a need to know basis. Online - For any account you create use a unique alias not attached to any of your personal information. Enforce security practices on all Desktops and servers to prevent both physical and digital theft. Detection security vulnerability and infiltration detection Stage compromising scenarios to test and gauge accused individual's responses. Once a threat has been detected, meet with other trusted member to present evidence and discuss a plan of action. Investigation of the individual or organization should be conducted as soon as any suspicion arises. Analyze accused party's response to compromising questions 11 Action Direct Members - Expose accused party publicly as a GROUP and record confrontation. Immediately change all passwords/user names and prevent all access to sensitive information until issue has been resolved. Review all areas that the infiltrator had access to for possible sabotage. Non Members - Call or contact, confront and record. Possible legal action can and should be carried out if any documented evidence arises of illegal recordings, searches, and or seizures undertaken by the accused. Indirect Once possible infiltration of the group has been identified, quarantine individual(s) until threat has been evaluated. Disinformation - funnel misinformation towards the identified threat so as to protect, mislead, and confuse the infiltrator(s) on the organization's true agenda and planned events. Only through proper coordination and planning can the accused party be set up to respond in an incriminating manner. Gather evidence and document everything. Communication Models Being that it is of the utmost importance that YOUR MESSAGE IS RECEIVED AND INTERTPATED CORRECTLY by your targeted audience, you and your organization must make sure to present your messages in a clear and effective manner. To further aid the spreading of truth to the people we have included this overview to help you develop clear, cohesive, and effective lines of communication to all who will listen. The key aspects in successfully conveying your messages is understanding the flow and dynamics of communication, how the receivers will be interpret it, the venue you choose to send your message through, and most importantly NOT TO CONFUSE OR DISTRACT THE RECIEVERS FRROM YOUR MAIN MESSAGE WITH UNESSARY INFORMATION(NOISE). Schramm Model There are costs to gather information, build context, compare choices and estimate outcomes. "Transaction costs" are the time and effort to execute a transaction. Schramm's communication model ( based on Claude Shannons' theory of communication ) exposes the mechanism of transaction costs. The Meme Theory is an empirical use of the Schramm communication model. 12 Jack creates a message, encodes contextual information and transmits it to Jill. Jill receives and decodes the message using her own context. If their contexts are identical, if they possess the same vocabulary and beliefs (homogeneous), then transaction costs are low. But as their contexts diverge (heterogeneous), transaction costs rise from translation errors, miscommunication, need for synchronization of contexts. This balance of homogeneous versus heterogeneous defines architecture. How is context is synchronized and why does it diverge? For human beings, sending and receiving information requires time and effort. Just like computer hardware or networks, human beings transmit information at a fixed rate, due to impedance in communication. Schramm's communication model shows low-level mechanics. Coase Theory gives a strategic perspective of costs and leads us to design patterns... "because markets are costly to use, the most efficient production process often takes place in a firm" Organizations reduce transaction costs for a goal or product. Fewer transactions mean less human interaction; a reduction in the time and effort to assess information. Transaction costs are the foundation of in economics and the basis for design patterns, topologies which minimize transaction costs. The right pattern at the right pattern at the right time creates optimum efficiency and response. 13 Peer to Peer Model Assemble four workers into a peer-to-peer topology. Each team member acts as an independent participant in a perfect free market. Here we have twelve information channels. As new members are added, channels (and transaction costs) rise exponentially and the effects are... • High redundancy: workers send duplicate data to each other. • High contention: duplicate data is misinterpreted or outdated. • High latency: most data travels three hops. The Hierarchical Model 14 Now assemble the same four workers into an organization (Mediator pattern), add a manager to partition and direct information to the right destination. Team size increases 25% but information channels shrink 33% to eight channels. • Low redundancy: each worker has only the necessary data. • Low contention: The manager is the sole source of information. • Lower latency: information travels a maximum of two hops. The hierarchical organization substantially reduces errors, conflicts, unnecessary duplication and decreases reaction time by reducing transaction costs. Reflective Schramm Model 1) "Noise" is an all-purpose placeholder for miscommunication in the traditional Schramm model. The Reflective Schramm model is more detailed description of miscommunication & context. A person's context knows nothing of external contexts, only the internal models it develops of externalities. Miscommunication is a mismatch between the model and the external context it models. 2) Internal models are developed over time through sets of send/receive messages. Miscommunication occurs from improper interpretation of received messages, delay of receive messages, initial development of a context model or a poor methodology of send/receive messages used to develop the model. 3) In the Recursive Schramm model a person's context contains models of itself which are derived from other people. Jack builds a context model of Jill. But Jill's context model contains its own model of Jack. An accurate model would include Jill's model of himself. Implications: How we derive a context model is vital. Relationship determines appropriate exchange. A set of 15 exchanges which are narrow and repetitive will produce a limited context model. If we know that future exchanges are equally narrow and repetitive, then the model might be acceptable. But more likely, the methodology of exchange is flawed and produces a flawed context model, which generates continuous miscommunication. I'll repeat that. How we interrogate and interpret determines the accuracy of future communication. How we ask questions and interpret answers builds a foundation. Propaganda Propaganda is a very effective and powerful tool that the deceitful New World Order has perfected and implemented through all the levels of social life to manipulate the ignorant masses and discredit, ridicule, and discourage individuals who disagree with the fallacious New World Order programming and attempt to spread the truth. That being said it is important to take note on the propaganda tactics used by the New World Order to be able to identify when it is being used and to positively implement them in spreading the truth so as to maximize efficiency. Propaganda tactics used by the Oppressors • • • • • • • • • • • • neuro-linguistic programming(use of speech and hand patterns to subliminally implant messages in your mind) repetitive use of images and sounds(t.v. and corporate music) intentional placement/arrangement of images, patterns, lights, etc (product placement) chemical/biological mind control(drugs, added chemicals in water supply) MK ULTRA mind control(military psy-op tactics) use of frequencies(H.A.A.R.P.,FM radio signals) torture biometric(RFID chips, nanotechnology) educational system(controlling and manipulating the minds of the people from childhood) religion(creating a subjective population to "GOD's will" when in actuality it is the New World Order's will) entertainment(used to distract and subliminally direct messages to the people) Fear(used to mobilize the population in a certain direction) Accepted Forms of Propaganda for the movement • • • Note:- make sure to keep in Compliance with the ”fair use act” and all copyright lawsInternet(the Silver bullet against the oppressive beast, learn it, use it, protect it) Info bombs: The purpose of a Info Bomb is to bombarded the individual and blow up any preconceived notions programmed into him/her by the inaccurately declared "Global Elite", corporate media, or ignorance. Expose them to the truth and provide them with a venue(the org.)to access more info and become involved in the movement. Contents consists of 3-5DVDs of documentaries that present factual information on the true/secret agendas and actions of the government, military complex, New World Order, religious communities, secret societies, etc. A flier which describes your organization's purpose, events, websites, and contact info. Four vital PDF documents( Operation North Wood, Modern Money 16 • • • • • • Mechanics, Rebuilding America's Defenses, Civilian Inmate Labor Program )preferably in print but can be placed on a labeled CD. All of this package together in a presentable fashion e.g. brown paper bag. Videos(create and or distribute documentaries) Distribution of DVDs, fliers ,knowledge, declassified incriminating government documents(every location and individual is an opportunity to spread truth) street interviews: engaging random individuals on the street to educate and ascertain the level of their knowledge base and/or expand their knowledge base. Have preselected photos and questions of government officials, New World Order scum, and fluff pieces(celebrates, sports stars)and ask the individuals if they can recognize the persons in the photos and educate them on the ones they fail. Always have a camera recording and pass out business cards/fliers of the org. broadcasting(radio, internet, T.V.) information seminars street actions/tea parties Second Amendment Note: This is unfortunately only applicable to Citizens of the United States of America. If the organization so chooses to exercise their Second Amendment right it must be done in compliance with both State and Federal statues and in no way will deviation from those guidelines be tolerated nor endorsed by the organization. To better educate and promote proper gun etiquette to the people and members, the organization should schedule at least once a month Second Amendment event at a local shooting range inviting all to partake and experience in paying homage to your Second Amendment right responsibly. The organization may also see fit to get involve with NRA support groups and may even demonstrate their support for proposed legislature that expands your Second Amendment rights. If you your organization wants to help create national awareness of our Second Amendment Rights coordinate your event on every second Saturday of every month that way we demonstrate our united support and gratitude of our right to bear arms. Guidelines for Second Amendment events • • • • Exercise your Second Amendment right responsibly with proper gun etiquette Make sure all weapons are brought to the shooting range are compliant with all state statutes Make sure all members understand FULLY gun safety and proper firing positions Never promote or partake in illegal firearm discharges 17 Time For Action The time for action is now! Brother and Sisters we are in the eve of our victory over the oppressors, the truth cannot be concealed any longer! The NWO agenda has been rejected and the people have confronted the falsifiers. Their iron grip around humanity loosens while our strength increases with every new individual that awakens from their Matrix programming. True they have won several battles throughout our history but they will loose the War, for our will and desire for freedom cannot be suppressed or destroyed. Total victory still eludes us for there are still many of our brethren that remain lost in the mist of ignorance, we must be the lighthouse that guides them back to freedom with truth being our signal. With their NWO propaganda failing the oppressors are now nervous and have become reckless in their actions. In unsuccessfully trying to speed up their plans for global domination they have lost composure and have become undisciplined making themselves vulnerable to attack. Mind control and physical force will be their last futile attempt at accomplishing their perverted goals. Fortunately we are now ready to fight back for our freedom and we will be victorious. You as a free willed and free thinking individual are the most effective weapon against tyranny and ignorance, as long as there is any lasting breath in anyone of us the hopes for humanity still exist. Hopefully once the threat is over the people will learn from the mistakes of this world and implement these hard won lessons to prevent such a monster from every arising ever again. Now go forth my peers with your newly acquired knowledge and spread truth for all who seek it and never forget 18