(Click to download free e-book)
The following 37-page essay contains some of the most interesting and important information you will ever read:
An excerpt from the introduction to The Controllers:
"... there is much more to the present day technology of mind control than mere hypnosis -- and many good reasons to suspect that UFO abduction accounts are an artifact of continuing brainwashing/behavior modification experiments.
Moreover, I intend to demonstrate that, by using UFO mythology as a cover story, the experimenters may have solved the major problem with the work conducted in the 1950s -- "the disposal problem," i.e., the question of "What do we do with the victims?"
If, in these pages, I seem to stray from the subject of the saucers, I plead for patience. Before I attempt to link UFO abductions with mind control experiments, I must first show that this technology EXISTS. Much of the forthcoming is an introduction to the topic of mind control -- what it is, and how it works.
Click here to download THE CONTROLLERS in its entirety (37 pages)
We don't want the public to know about this, so let's talk about something else instead:
Video running time: 1 minute 30 seconds
"Wolves in Sheep's Clothing"
1) Fabian Society
(credit: Jordan Maxwell)
Prime Minister Tony Blair visits the Fabian Society of London.
Notice that the Fabian Society's shield is a depiction of a "wolf in sheep's clothing."
In symbolic form, they are telling us who they really are.
Footnote: Fabian Socialism
(end of Jordan Maxwell exhibit)
2) Freemasons
Masons also have to wear a very specific kind of "clothing:"
According to the symbolism, masons must wear the proper "clothing."
That clothing is lambskin.
See: Mormonism's Parallells to Freemasonry
Masons wear lambskin "clothing." Lambskin or sheep's clothing is an "emblem of innocence."
Masons and Fabian Socialists are trying to tell you something through a choice of symbolism which originates in the Bible itself:
"Beware of false prophets, who come to you in sheep's clothing but inwardly are ravenous wolves. You will know them by their fruits. Are grapes gathered from thorns, or figs from thistles? So, every sound tree bears good fruit, but the bad tree bears evil fruit." Matthew 7:15
"Behold, I send you out as sheep in the midst of wolves; so be wise as serpents and innocent as doves. Beware of men; for they will deliver you up to councils, and flog you in their synagogues, and you will be dragged before governors and kings for My sake ..." Matthew 10:16
More on Google in my article State Action Doctrine and Intelligence Agency Dictatorship Part II: Control of Technology
Below, two ancient Chinese gods bear the square & compass, which coincidentally are the quintessential symbols of modern freemasonry. These gods appear to be human ... but if you look "just below the surface" (symbolically speaking) you will find that they are actually coiling serpents:
The above source asserts that there is no connection between these Chinese societies and modern freemasonry. Regardless, serpents are by no means absent from the American masonic landscape:
Third Degree Masters and "the Craft"
The history behind the Wizard of Oz programming is interesting. It suggests that the Wizard of Oz has had an important part in the occult world all along. One of the secrets of the Mystery Religions, especially the Egyptian Isis mystery religion was the ability to use drugs and torture to create multiple personalities. The word Oz is known to have been used by its author as an abbreviation for Osirus. [...] These are serious hints that the occult world didn’t stop programming people with dissociative states and triggers when the ancient Egyptian empires fell. Instead of using modern lingo such as “hypnotize”, they would say “cast a spell.” Later in Freemasonry, the Right Worshipful Master would “charge” (meaning hypnotize) an initiate. The occultist Baum, a member of the Theosophical Society, was inspired by some spirit who gave him the “magic key” to write the Wizard of Oz book, which came out in 1900. Excerpted from: The Wizard of Oz & Illuminati Mind Control (download PDF) |
Some light on the terms "red" and "blue" in freemasonry:
You can choose the blue pill, or the red pill, it doesn't matter ... because "WE ARE ALL SOCIALISTS NOW." These colors are also used in maistream politics to signify "right-wing" (red) and "left-wing" (blue), even though both "wings" are controlled by the same bird brain. In this context, the use of blue to represent the left-wing/Democrat/socialist viewpoint is inconsistent with the traditional association of the color red with socialism/communism. |
Footnote: The First Time I Heard of Barack Obama by Tom Fife
*****************************************************************
Note: The following is an article I found online several years ago (I'm writing this in 2019). I'm not sure of the actual identity of, or contact information for, the author, or anything about him, but this article fits squarely with everything I know about the subject matter of this exhibit and this website as a whole. JP
Retired attorney Bob S explains that COINTELPRO is “a continuing, present reality” and that terms such as “gang stalking” or “organized stalking” are deceptive terms and will work against the TI community in obtaining a new congressional investigation.
[name withheld]: I don't know what proving COINTELPRO will do nor if I got it right what Bob S. is doing, because they already know COINTELPRO is a reality.
Bob S: [name withheld], whom are you referring to as "they"?
The public doesn't know that COINTELPRO is a continuing, present reality. This is what we need to prove to the public in order to create pressure to produce a new congressional investigation of present government COINTELPRO operations.
If “they” refers to TI's, most of them have been deceived into believing that they are victims of "organized stalking groups" instead of being COINTELPRO targets. They don't call their experience “COINTELPRO.” They call it “gang-stalking” or “organized stalking.”
The bad news
Many TI's, including you, do realize that they are targeted by a federal agency, but they still use “organized stalking group” and “gang-stalking” terminology. This is a fatal mistake that Derrick and Eleanor White have been knowingly and intentionally training TI's to make for years. They both know that they are defeating TI rights by using the wrong terminology. I have repeatedly explained this to them for years. They can give no justification for continuing to advocate bad legal strategy that necessitates defeat of all TI's who follow them, but they have both shown their determination to continue to knowingly and intentionally work against TI interests.
Neither Derrick nor Eleanor claims to have any knowledge or understanding of law but they both stubbornly reject, for no apparent reason, the best legal advice that I or any other lawyer can give them. They have proved over and over that they are dedicated to defeating the rights of the TI's that they pretend to be helping. That is why I call them “Anti-TI Activists.”
“Organized stalking” and “gang stalking” are terms that are misused only within the TI community. These terms are unknown to the outside world, and they are contradictions of established legal terminology outside the TI community.
The legal definition of the crime of “stalking” in every state and federal law is “a series of harassing acts by a single person.” Normal TI experiences do not come within the criminal definitions of “stalking.” TI's rarely encounter “a series of harassing acts by a single person. TI experience consist instead of separate acts of harassment by many different people. The law does not permit us to combine separate acts of harassment by separate people so as to make them all guilty of the crime of stalking.
There is no such thing as a crime “group stalking.” The law only recognizes the crime of single-person stalking. So if a group of 100 perps each commits a single act of harassment against the same TI, no one has committed a crime. No one is subject to arrest or to prosecution. The TI is not entitled to police investigation.
Arrests cannot be justified and prosecutions cannot succeed for the non-criminal activity mistakenly described as “organized stalking.” Such harassment may meet the definition of torture, but torture is not a crime unless it comes within the definition of an established crime. This form of torture does not meet the definition of “stalking” nor the definition of any other crime.
Police are not supposed to be investigating non-criminal, non-prosecutable activities. It is useless for them to do so since arrests and prosecutions would be contrary to the law and would ultimately fail. Yet this is what TI's keep uselessly asking police and even the FBI to do.
TI's may not like the law. They may think that it ought to be changed, but that is the way the law stands. There are good legal and constitutional reasons why the law cannot be changed to what TI's think it ought to be, but I won't get into that long explanation.
TI's can spend years trying vainly to get the law changed to what they think it ought to be, but they need to understand that under existing law, it is utterly useless to ask for investigation and prosecution of “organized stalking” or of “group stalking” or of “gang stalking” since the activities that TI's describe with these mistake terms do not meet the legal definition of the crime of stalking.
TI's follow this useless strategy because they have been deceived by Eleanor and Derrick into believing that these non-criminal activities are crimes. It is impossible to achieve success by following a strategy that is based on a fundamental misunderstanding of the law.
That's the bad news. The good news is that there is a remedy that can stop these activities if we correctly describe them as “COINTELPRO operations” instead of mistakenly describing them as “organized stalking.”
If we stop using the false “organized stalking” terminology and correctly describe our experience as the COINTELPRO operations of a federal agency, we will then be talking about government violation of our constitutional rights. COINTELPRO torture is government infliction of “cruel and unusual punishment” without due process of law. This is a clear and unquestionable violation of our constitutional rights even though it does not violate any criminal law.
By thoroughly documenting evidence proving government agency violations of our constitutional rights through COINTELPRO operations, we clearly establish our right to obtain congressional investigation of these violations by a federal agency. By taking this approach, we have no need to prove that the operations violated any criminal law.
One example of COINTELPRO operations that can only be performed by a federal agency is the interception and tampering with mail. An “organized stalking group cannot do this. Only a federal agency can do it. The Church Committee proved that USPS had illegally granted the FBI access to mail in 1940. Since 1940, the FBI has used this illegal access to our mail as a method of COINTELPRO harassment.
Many times over the last 7 years, I have sent to TI's detailed explanations of how to document COINTELPRO evidence that can achieve this purpose. I will again send a copy of this explanation to anyone who requests it.
If hundreds of TI's document proof of government responsibility for their COINTELPRO experiences, we will be making a powerful case for our right to congressional investigation of our experiences. However, I don't expect congress to voluntarily grant us this right. Congress knows about present COINTELPRO and covers it up. The past congressional investigations of COINTELPRO were forced upon congress by public pressure when TI's took their evidence to the public and created the public pressure which forced congress to undertake the two previous COINTELPRO investigations of 1976-78 and 1989.
We must obtain congressional investigations of current COINTELPRO because this is our only possible means of accessing the classified evidence needed for successful litigation. We are prohibited by law from accessing and litigating government state secrets. Government agency COINTELPRO torture of citizens is TOP SECRET information that we are legally prohibited from reaching. Only congress has the power to access and expose these state secrets.
When these state secrets are exposed by congressional investigation, as they have been twice in the past, the federal COINTELPRO agency can no longer claim the state secret privilege for these operations. Exposed secrets are no longer protected secrets.
We will then have the evidence that we need to obtain legal representation on a contingency basis and to succeed with the litigation. The exposed COINTELPRO truth can be fully litigated using the evidence uncovered by congressional investigation and with the right to use legal discovery procedures to obtain further detailed evidence concerning the exposed secrets. TI's will be entitled to recover compensation for past harm, and we can seek legislation to provide adequate protection against future harm.
There is no reason why the strategy that worked for TI's in producing the two past congressional investigations will not work for us now. The only reason that this strategy has not been used in the past 7 years is that Derrick and Eleanor have been blocking a solution to the true COINTELPRO problem by creating the false problem of “organized stalking.”
Great success is possible with effective legal strategy. As recently as 2002, a jury in Oakland awarded to COINTELPRO targets Judi Bari and Darryl Cherney $4.4 million in damages for violations of their constitutional rights. The limited violations found by the jury were very mild compared to the COINTELPRO torture that TI's suffer for many years.
There will be nothing but continuing failure as long as TI's continue to follow the lead of Anti-TI Activists like Derrick and Eleanor. These two infiltrators have worked systematically over the years to cover up the COINTELPRO truth with the “gang-stalking” myth. They have trained and conditioned TI's to defeat themselves and to deny their own constitutional rights by using “organized stalking” mythology to disguise COINTELPRO reality.
TI's who have fallen for the “gang-stalking” strategy of self-defeat have been denying themselves the only real remedy for their true problem. I have explained this over and over to TI's, for 7 years, but they still keep following the Anti-TI Activists who lead them to follow strategies of certain failure. As hard as I've tried, I have not been able to persuade TI's to take responsibility for their own lives and for their own future by separating themselves from false and destructive leaders and by following the one and only strategy that can achieve an end to their torture.
CONCLUSION:
The bad news is that the “organized stalking” strategies of Derrick and Eleanor and their supporters will ensure continuing defeat as long as these strategies are followed by TI's who have been deceived into believing that they are entitled to investigation and prosecution of the non-criminal activity mistakenly described as “organized stalking.”
The good news is that if TI's will stop following enemies disguised as friends and stop using the wrong terms and the wrong explanation for their COINTELPRO experiences, they can document evidence that will establish their right to congressional investigation of their true problem, and they can obtain the evidence needed for successful litigation to compensate them for past harm and to stop future harm.
The bad news is that after 7 years of repeating this explanation to TI's who don't listen, it has been impossible for me to make them understand the fatal, fundamental mistake in legal strategy that the Anti-TI Activist leaders keep persuading them to make.
The good news is that TI''s have the freedom to stop making this fatal, fundamental mistake at any time and to start working toward an achievable solution. The choice has always been theirs. A solution has always been possible. And it still is.
Bob S
*****************************************************************
Related: [AYT] If This Were a Dictatorship, the Authorities Would Have Told Us
Have nothing to do with the fruitless deeds of darkness, but rather expose them.
Ephesians 5:11
Introduction
Masonic organizations promote the idea that they are a force against religious extremism. The mainstream freemasonry descending from the United Grand Lodge of England requires that its members profess a belief in Deity, but does not inquire further about the specific details of their religious beliefs. The lodges make it known that this policy is designed to restrict membership to good and moral men who believe in God but come from different religious backgrounds, allowing them to join together in a spirit of fraternal harmony. Most reasonable and rational men, opposed to religious extremism, find this concept appealing and naturally want to be a part of such an "open minded" organization.
The lodges confer "degrees" of initiation on their members at ritual meetings. During each conferral, the candidate is made to kneel at an altar and swear a blood oath whereby they promise to keep the secrets of the order, with violations beiing punishable by extreme physical mutilation. These punishments, which vary in specifics with each degree, are explicitly and graphically described to the candidate before he is asked to take the oath. The actual administration of the oath begins with an invocation of God.
A cursory review of official masonic documents reveals that the fundamental purpose of requiring members to profess a belief in Deity is not to ensure a membership of moral men. Rather, it is in place to strengthen the psychological impact when the candidate kneels blindfolded at the altar and is made to take his blood oath. It is to make the "obligation more binding."
Masonic organizations of the French "Grand Orient" stream omit the invocation of God, based on a stated policy that members should enjoy absolute freedom of conscience. However, although both the British and Grand Orient masonic movements profess to be rational responses to religious extremism, the core elements of their rituals, particularly including the passwords of the degrees, are deeply rooted in the Bible itself.
In the lodge room, members are instructed to turn to the Holy Bible in order to best learn the secrets of their craft, and this is for good reason. They need not look far. In the opening chapters of Genesis (the very first book of the Bible), they will come across a series of passages containing words that they will immediately recognize from their ritual and which contains the key that will unlock the primordial secret of the fraternity. Therefore, even the non-religious reader must inquire into some arcane Biblical history if they wish to acquire an accurate understanding of the true nature of the masonic order. The following graphical exhibits are presented with that end in view.
The Hidden Roots of Freemasonry
APOCALYPSIS MOSISi 1 This is the story of Adam and Eve after they had gone out of Paradise. And Adam knew his wife 2 Eve and went upwards to the sun-rising and abode there eighteen years and two months. And 3 Eve conceived and bare two sons; Adiaphotos, who is called Cain and Amilabes who is called Abel. ii 1 And after this, Adam and Eve were with one another and while they were sleeping, Eve said to Adam her lord: 'My lord, Adam, behold, 2 I have seen in a dream this night the blood of my son Amilabes who is styled Abel being poured into the mouth of Cain his brother and he went on drinking it without pity. But he begged him to leave him a little of it. Yet he hearkened 3 not to him, but gulped down the whole; nor did it stay in his stomach, but came out of his mouth. And Adam said, 'Let us arise and go 4 and see what has happened to them. (I fear) lest the adversary may be assailing them somewhere.' iii 1 And they both went and found Abel murdered. I by the hand of Cain his brother. And God 2 saith to Michael the archangel: 'Say to Adam: " Reveal not the secret that thou knowest to Cain thy son, for he is a son of wrath. But grieve not, for I will give thee another son in his stead; he shall show (to thee) all that thou shalt do. Do thou tell him nothing."' Thus spake the archangel 3 to Adam. But he kept the word in his heart, and with him also Eve, though they grieved concerning Abel their son. iv 1 And after this, Adam knew Eve his wife, and she conceived and bare Seth. And Adam said to Eve: 'See! we have 2 begotten a son in place of Abel, whom Cain slew, let us give glory and sacrifice to God.' |
Genesis 4:17-22
About the AuthorManly P. Hall (1901-1990), widely regarded as a sage and teacher steeped in the wisdom of antiquity, was one of the leading esoteric scholars of the twentieth century. The author of the landmark work The Secret Teachings of All Ages, Hall was named a 33° Mason in 1973. It is the highest rank Freemasonry can bestow. (Amazon.com)
|
Blood as a Medium of Exchange
- After Adam and Eve sinned in the Garden of Eden, God clothed them with the skins of animals (Gen 3:21). This is the first example in the Bible, right at the beginning, of the necessity of blood being shed for the redemption of sin.
- In the New Testament, it is not just Jesus dying on the cross but more specifically his shedding of blood to redeem sin that is his gift to humanity.
Examples in Popular Culture
In this scene from the film "The Devil's Advocate" starring Al Pacino and Keanu Reeves, the African witch doctor tells Reeves' character to think of blood as "spiritual currency:"
Video running time: 30 seconds
Next, in this scene from In the film "Eyes Wide Shut," Tom Cruise's character has incurred a debt of blood by trespassing on the diabolical ritual of an elite cult. He does not understand that there is some kind of dark or occult law at play in the situation, and he is only saved when one of the temple prostitutes offers herself as a human sacrifice to redeem his debt of blood.
Here is a clip of this important scene from the movie:
Video running time: 4 minutes
Excerpt from Fire & Ice
|
Album artwork depicting Michael Jackson in red (symbolic of blood), standing atop masonic checkerboard pattern. The image is superimposed by a portrait of Michael's killer Dr. Conrad Murray, clothed his masonic lodge officer's jewels.
For further research on this subject, see:
Freemasonry Resource Library at Saintsalive.com
and
Masonic laws tend to include provisions such as "once a mason, always a mason." This is to remind people who leave the lodge that although they are no longer members of the lodge, they still remain "masons" who are honor bound by an inescapable moral "obligation." This official masonic distinction between MEMBERSHIP in the organization and STATUS as a mason is important to understand.
... the candidate is advised that nothing he is about to promise will in any way interfere with any duty he owes to God, his country, his family/neighbor or himself. ...
(copied from masonicinfo.com)
If a person takes an "obligation" based on such an assurance, and that assurance is fraudulent, then he is not obligated at all.
Q: "What makes you a mason?"
A: "My obligation."
If a person is not obligated, then he/she is not a mason, according to masonry itself.
I was told by a Scottish Rite mason that "the only thing that matters is the obligation. All that other stuff about helping people etc., that's all bull****." In retrospect I think that is interesting, because since the assurance on which the obligation is based is fraudulent, therefore no one is actually obligated.
Since status as a mason is determined solely by the condition of being obligated, there is no such thing as a mason. And if "everything else" is BS, I don't know what that tells you.
There may be all kinds of folks that belong to masonic lodges, and participate in masonic rituals, but there is no such thing as a mason.
The preceding series of research exhibits (numbered 101, 102 etc.) is designed to demonstrate both 1) why the assurance is fraudulent and 2) turning to Christ Jesus is important.
If you find the above materials important, please:
- tell others about this website; AND
- save a copy now in case this website goes down for any reason.
- Some methods may work better than others. You can:
- Right-click on this page and choose "Save," (or find "Save" under the "File" menu at the top of your browser window;
- Windows users can print to a PDF file using the free CutePDF program; or
- Back up this entire web site using free programs such as:
- WinHTTrack for Windows
- SiteSucker for Apple devices
- Some methods may work better than others. You can:
- Please also bookmark this website and check back regularly.
- This website is designed for careful study and is best experienced on a proper computer (rather than a mobile device).
- If you like this site or have any comments, please let me know. I very much appreciate all feedback.
- This is a non-commercial website. All website costs are paid by the creator with no outside funding. Donations are rare and inconsequential. There is no budget for advertising. If you think other people should know about the materials on this site, then please personally step up and help spread the word.
For behold, the wicked bend the bow,
they make ready their arrow upon the string,
that they may in darkness shoot at the upright in heart. (Psalm 11:2)
[W]henever the Legislators endeavour to take away, and destroy the Property of the People, or to reduce them to Slavery under Arbitrary Power, they put themselves into a state of War with the People, who are thereupon absolved from any farther Obedience."
John Locke