Archons, : Among Us But Not For Us- Part 2 – Is it all True Series # 340

archonsPlease read Part 1 of this series, posted about 10 days ago. These Gray/Reptilian groups, who eat our emotions, have been among us, through surrogates and mind-controlled humans. These surrogates are humans in high-powered places, among the very elite of our societies. The best way to gain control over a culture is to do it in a stealth fashion, because it is so much easier to manipulate and accomplish your agenda. And this is what the Archons have done for thousands of years.

They move about in the old secret societies such as the Illuminati, the Skull and Bones and the Vatican Elites and there are many other groups that harbor the ones who do the will of the Archons. There are also rogue cells in government agencies such as the US- FBI, CIA, DIA, ATF, DOD, DOE and many others from other western Christian countries. But I must mention that there some good guys in those groups as well who are resisting and fighting the Archons and their surrogates. Now from the corporate world there are the psychopaths, the leaders of some of our companies who would sell their mother’s soul to make a buck. They would also pollute and destroy their own planet to advance the Archon’s agenda of creating an environment of as much suffering as possible to feed their enormous appetite. Besides the emotional energy, they have a great interest in human souls and try to capture them as they are released at the point of death. I guess we could call them soul catchers. And the energy from the body is said to be the super nectar of the human existence.

After 40 years of working with abductees, I heard that greys and reptilians were very much against the use of nuclear weapons even though nukes do cause amazing suffering, they also cause death to the human soul, which is the caviar/truffle on their plate.

Part 3 will discuss what we can do to defeat the Archons.

Sleep tight, Hope is not lost – lack of fear, makes us strong.

MWiz.

President Obama discusses government power 53 years after Dwight Eisenhower warned of it.

IkeFrom USA Today .com

This is a subject I would normally not include in this Website but the USA today article was so important and profound to all of us humans and aliens among us, I posted it.

President Obama picked an interesting date on which to give his speech about government surveillance powers — and not just because it is wife Michelle’s 50th birthday.

Friday — Jan. 17 — will also mark the 53rd anniversary of President Dwight Eisenhower’s famous warning about the growing power of “the military-industrial complex.”

Ike’s 1961 speech, his farewell address after two terms in the White House, has echoed over most subsequent disputes over American power: Vietnam, Watergate, revelations of assassination plots and overthrows of other governments, Iran-Contra, the first Gulf War, the response to 9/11, the second Iraq war — and disclosures over National Security Agency surveillance policies.

Obama gives a speech Friday on possible changes to NSA surveillance rules.

More than 50 years ago, Eisenhower — who had led Allied forces to victory in Europe during World War II — cited the United States’ rise as a world power, including a massive standing army and thriving weapons businesses:

“This conjunction of an immense military establishment and a large arms industry is new in the American experience. The total influence — economic, political, even spiritual — is felt in every city, every state house, every office of the federal government. We recognize the imperative need for this development. Yet we must not fail to comprehend its grave implications. Our toil, resources and livelihood are all involved; so is the very structure of our society.

“In the councils of government, we must guard against the acquisition of unwarranted influence, whether sought or unsought, by the military-industrial complex. The potential for the disastrous rise of misplaced power exists and will persist.

“We must never let the weight of this combination endanger our liberties or democratic processes. We should take nothing for granted. Only an alert and knowledgeable citizenry can compel the proper meshing of the huge industrial and military machinery of defense with our peaceful methods and goals, so that security and liberty may prosper together.”

Noting the Ike anniversary, Yahoo News writes:

“Obama rolled back some of the national security state upon taking office — ending interrogation tactics widely regarded as torture, for instance — while dramatically expanding drone strikes and embracing surveillance on an unprecedented scale.

“Fast-forward to 2014, and Obama still sounds like he wants to pursue a debate about where and how America strikes the balance between security and liberty.

“Half a year after Edward Snowden gave that perpetual tug-of-war fresh urgency and captured global headlines with leaks about the NSA’s global operations, Obama’s speech on Friday is expected to be far from the final word — by design.”

Definitely not from Kenya but maybe from…IDR?-Is it all True Series # 257

Well another crazy political cycle is finally over. Obama has made it happen again. He should have probably lost as a tough economy normally ends a possible second presidential term. But the man, who I believe will be judged as the greatest politician in American history, pulled it out. His 332 electoral votes and his 50% plus popular vote make this victory quite impressive all things considered.

So here is a guy that basically came out of the wind to be a two-term president. Note 98% of the US population never heard of Obama before the Democratic primary started in late 2007 (you may enjoy our March 29, 2008 posting about the candidates- if they were Alien Beings). So where did this guy really come from and for “fun” let’s say not from here. And when I say not from here, I am not saying he is not from Hawaii or from the USA.

So let’s see– Obama is a very smart guy, a very capable speaker, a powerful leader and a good guy, with most people liking him as a person, including great praise from people around the world. He is an amazing combination of a human being, maybe too good to be a regular human being, especially in this day and age. America politics today seems to be dominated by awful politicians. These politicians don’t care about other people, only for their personal agendas and their corporate supporters.

Ok so my fun theory, about where Obama came from is IDR or the interdimensional realm. Why the IDR?– he is a bit magical, a bit strange, and seems to have some abilities others would like to have. He can mold minds and hearts (in a good way), like fairies, wee people, and elves. And remember he does have funny ears.

Sleep tight…now that heavy politics is over (for awhile), good dreams now resume.

Wiz

Climate Change: Is the World Ready for the New Normal?–Is it all True Series # 256

As Sandy’s winds finally subside and thousands of people assess their losses, I remember my first experience with climate change. It was 1972 and back then the word climate change didn’t exist. I was taking meteorology and climatology courses at the University of Wisconsin. My mentoring professor was one of the premiere experts on Arctic climate. So he would travel yearly to both poles and collect data for his studies.

In late spring 1972 he came back from an expedition and was quite upset about what he found; it appeared that there was quite a spike in CO2 in the ice cores he had sampled. The cores covered about 150 years prior to 1972. He was quite alarmed but didn’t know what to make of it. We didn’t much talk about it after that initial conversation and I had not thought about it for over 35 years.

There was an increase in interest in global warming and climate change after Al Gore’s movie. Two months ago I read two articles on climate change. The shocking conclusion was its coming and it’s coming very fast. Before I had read the articles I was of the opinion that we had 30 to 50 years until the problem really became apparent. But now the climatologists are saying that we only have 5 to 10 years before heavy impact, such as severe drought, climate temperature extremes, super storms and rising oceans. This will cause famines and possible reduction of 50% of the earth’s population.

Folks, the horses and all the other farm animals are out of the barn and they are not coming back preparation is our only choice. So – it is kind of simple, move to high ground-500 ft above sea level a minimum.

And move to US Pacific Northwest –Oregon and Washington. That will work for awhile and next step if you can, get into Canada, also some of the higher elevations in the Rockies will also work but again for only awhile.

And forget trying to find someone to blame – presently that’s just a waste of time, unless we can find a real way to reverse the problem. It’s coming and it’s coming hard.

MWiz, Life is short, so always enjoy the present.

Birthplace of Atomic Bomb, New Mexico Remains Center of Massive U.S. Nuclear Arsenal — From Democracynow.com

In this special broadcast from just outside Los Alamos National Laboratory, we look at the radioactive legacy of New Mexico. The atomic bombs used in World War II were designed and developed here, and the state still plays a key role in maintaining the nation’s massive nuclear arsenal. We’re joined by two guests: Jay Coghlan, executive director of Nuclear Watch New Mexico, and Chuck Montaño, a former investigator and auditor at Los Alamos who turned whistleblower after calling attention to wasteful spending and fraud at the nation’s foremost nuclear weapons lab.

October NM UFO/Paranormal Forum Meeting – ABQ. Is it all True Series #254


This meeting was one of my favorite types, we call “the sharing,” which is the sharing of our personal experiences and this group can bring it. Having participated in other groups around the country, this is by far the most diverse of them all with stories covering the US, Canada, Mexico and at times other parts of the world.

Here are some of the stories that were shared. There was a prophecy story about a lady in black who approached a stranger to tell him about her brother’s recent alien encounter. The aliens reportedly told him that there would be a huge earthquake in Kobe, Japan in two weeks killing thousands – and yes it did happen in the two weeks that were predicted.

Next, there was a multiple sighting by 8 military air traffic controllers in Florida. As they watched a UFO closely trailed a large Air Force cargo plane. First they saw it on radar and as the plane landed the UFO were visible with their naked eyes. The UFO ended up over the air traffic tower hanging there for several minutes. Shortly after the UFO left the scene, the base was shut down and everyone was debriefed.

Then there was the story of the “Big Watch Eye.” It was a basketball size drone that was watching, scanning this person’s house for several minutes in the middle of a dense subdivision in daylight. Then there was the egg-shaped creature with some bird-like features – frightening a small group of people. There was also the story of the Santa Fe artist who had a close encounter with a UFO, and a Bigfoot during the same event. These encounters inspired her to paint some amazing art to share with the world.

And lastly there would not be a UFO meeting without a Roswell story. A friend of the speaker had a couple of Air Force friends who witnessed seeing the small bodies and the vehicle crash debris back in 1947; this testimony was given on their deathbeds.

Sleep tight, for a great man once said we are all a celebrity in some reality. And reality is not what it seems.
MWiz

Gabe and Greg – Their World and Their Experiences – Is it all True Series #252

Greg Valdez, the son of the late Gabe Valdez, spoke at our September meeting of the NM UFO/ Paranormal Group. Gabe was a man who spent his life seeking the truth, a man after my own heart. Gabe’s police investigator skills made him a precise truth seeker. He investigated cattle mutilations and other strange phenomena including the Dulce, New Mexico underground base. I met Gabe at one of our first UFO meetings; he was a bit standoffish and I didn’t really know how to take him. But as time went on, I realized he had seen and experienced a lot of stuff over his lifetime, and he was very cautious about the information he shared and the people he shared it with. I knew I had gained Gabe’s trust in April 2011 at the Wake Up Now Conference in Albuquerque. Gabe approached me about the Dulce Underground Base and told me he would take me to the vents and entrances to the base. I told him I would think about it and that was the last time we spoke. He died August 7th 2011.
Gabe’s son came to our meeting and did a wonderful job doing a question and answer session about his own experiences and the time he spent exploring with his father. Greg fielded many questions on subjects including Paul Bennewitz, Phil Schneider, Cattle Muts, and UFOs, Dulce Base, Military Helicopters and the famous Gas Buggy event. Greg’s and his father’s bottom line conclusion was that on all of these subjects, government fingerprints were found. But this is not to say there weren’t things that he and his father witnessed that fell into the realm of the paranormal, UFO’s etc.
It looks to me that Greg could be, if he wanted, a great researcher/Truthseeker like his father if he wants to venture out and take the risk. And the risk can be big.
Sleep tight, for the Truthseekers are trying to make this a better place for all.
MWiz

Something we should never forget- but we are , and the lies and the lies.

More good news on 9/11– PBS documentary from Colorado (1st link)…

Watch 9/11: Explosive Evidence – Experts Speak Out on PBS. See more from KBDI.

Why revisit 9/11?
Our world changed that day…
2,744 lives lost in New York… and counting…
1 million lives lost in Afganistan & Iraq… and counting…
6,000 troops lost in the ‘War on Terror’… and counting…
$4.5 Trillion – War on Terror cost to U.S. taxpayers…
precious civil liberties removed by the
Patriot Act
Military Commissions Act
Department of Homeland Security
Transportation Security Administration (TSA)
National Defense Authorization Act (NDAA 2012).
Today, Americans can be…
subject to search and seizure without a warrant…
detained or imprisoned indefinitely…
without charge…
without evidence…
without a lawyer…
without a trial…
or even tortured…
or assassinated
merely for being accused
of being associated with terrorism.
Ignoring the World Trade Center evidence
is no longer an option.
It’s a public safety issue.
It’s time for the public to
enforce the law because our
public servants have failed to do so.
No proper investigation or formal
announcements of disclosure have
taken place in 11 years.
Instead, we have been given 11 yrs
of tightening, entrapping legislation.
Acts of treason in time of war
can be punishable by death.

If You See This Google Warning, Act Fast: Big Brother is Watching

By Dr. Mercola

Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies may be spying on you. Some believe the Google announcement may be related to the recent discovery of the data-mining virus named “Flame.” In a June 3 New York Times article, Andrew Kramer and Nicole Perlroth write1:

“When Eugene Kaspersky, the founder of Europe’s largest antivirus company, discovered the Flame virus that is afflicting computers in Iran and the Middle East, he recognized it as a technologically sophisticated virus that only a government could create.

He also recognized that the virus, which he compares to the Stuxnet virus built by programmers employed by the United States and Israel, adds weight to his warnings of the grave dangers posed by governments that manufacture and release viruses on the internet.

“Cyberweapons are the most dangerous innovation of this century,” he told a gathering of technology company executives… While the United States and Israel are using the weapons to slow the nuclear bomb-making abilities of Iran, they could also be used to disrupt power grids and financial systems or even wreak havoc with military defenses.”

Mr. Kaspersky claims he was called in to investigate the new virus on behalf of the International Telecommunication Union, an agency of the United Nations. The virus was allegedly erasing files on computers belonging to the Iranian oil ministry.

What makes the Flame virus a major potential concern for common citizens of the world is the fact that it’s the first virus found with the ability to spread wirelessly by attaching itself to Bluetooth-enabled devices.

Once there, it can not only trace and steal information stored on those devices; according to Kramer and Perlroth the program also contains a “microbe” command that can activate any microphone within the device, record whatever is going on at the time—presumably whether you’re actually using the device or not—and transmit audio files back to the attacker. This, clearly, has huge privacy implications were it to be deployed against civilian populations.

New Revelations about the Links Between Flame and Stuxnet
While cybersecurity experts initially claimed there were no links between the earlier Stuxnet worm and the Flame virus, a recent article on The Verge now reports that the two are undoubtedly related2. Joshua Kopstein writes:

“[I]n examining an earlier version of Stuxnet, the lab’s researchers now find that they were wrong: a previously overlooked module within the virus is now providing the “missing link” between the two pieces of malware. The module in question… matches very closely with a module used by an early version Flame. “It was actually so similar, that it made our automatic system classify it as Stuxnet,” wrote Alexander Gostev… indicating that the module was likely the seed of both viruses. “We think it’s actually possible to talk about a ‘Flame’ platform, and that this particular module was created based on its source code.”

The new evidence suggests that Stuxnet and Flame are two sides of the same coin, with the former built for sabotage and the latter for surveillance. But researchers also say that the Flame platform pre-dated Stuxnet and its sister, Duqu, and was likely built in the Summer of 2008.”

InformationWeek Security recently offered the following advice3:”… Microsoft has been working quickly to patch the certificate bug exploited by Flame. Notably, Microsoft released an update Friday [June 8] for Windows Server Update Services (WSUS) 3.0 Service Pack 2 (SP2), which according to the release notes “strengthens the WSUS communication channels … [by] trusting only files that are issued by the Microsoft Update certification authority.”

Microsoft is also set to issue an update Tuesday–as part of its monthly Patch Tuesday–that will further update all supported versions of Windows to block Flame. Security experts are recommending that all users install the update as soon as possible, since attackers will likely attempt to use the certificate vulnerability before it becomes widely patched. “Apply the certificate patch released a week ago today if you haven’t done so already,” said SANS Institute chief research officer Johannes B. Ullrich in a blog post. “This way, no patch signed by the bad certificate should be accepted tomorrow. Patch Tuesday is one of the best dates to launch such an attack, as you do expect patches anyway.”

When installing the update, however, do so preferably only if using a trusted environment. “Avoid patches while ‘on the road.’ Apply them in your home [or] work network whenever possible,” said Ullrich. “This doesn’t eliminate the chance of a ‘man in the middle’ (MitM) attack, but it reduces the likelihood.”

For users who must update while on the road, perhaps because they travel frequently, always use a VPN connection back to the corporate network, said Ullrich, since hotel networks can be malware and attack hotbeds. “Hotel networks and public hotspots frequently use badly configured HTTP proxies that can be compromised and many users expect bad SSL certificates–because of ongoing MitM attacks,” he said.”

Spy Central: Utah
In related news, Wired Magazine recently reported that the US government is building a massive spy center, right in the heart of Mormon country, in Bluffdale, Utah4–so massive, in fact, that once finished, the facility will be five times larger than the US Capitol.

According to Wired Magazine:

“Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013.

Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.

But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes.

And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US.

The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”[Emphasis mine]

That about says it all. And for those of you still under the mistaken belief that the US government does not have the authority to spy on its citizens, consider the following:

“… [The NSA] has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposed…

In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn’t revealed until now, however, was the enormity of this ongoing domestic spying program.

For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail…

As chief and one of the two cofounders of the agency’s Signals Intelligence Automation Research Center, [William] Binney and his team designed much of the infrastructure that’s still likely used to intercept international and foreign communications. He explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore.

If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law.

Instead it chose to put the wiretapping rooms at key junction points throughout the country… thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US. The network of intercept stations goes far beyond the single room in an AT&T building in San Francisco exposed by a whistle-blower in 2006. “I think there’s 10 to 20 of them,” Binney says… The eavesdropping on Americans doesn’t stop at the telecom switches. To capture satellite communications in and out of the US, the agency also monitors AT&T’s powerful earth stations…

… Binney suggested a system for monitoring people’s communications according to how closely they are connected to an initial target. The further away from the target—say you’re just an acquaintance of a friend of the target—the less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything…”

To learn more, I highly recommend reading the featured Wired article5 in its entirety. It’s a fascinating read, but it will not likely make you sleep better at night. The full article is available on their website and is free to view.

Google Also in the Privacy News
Beginning the first week of June, Google will warn you every time it picks up activity on your computer account that looks suspiciously like someone trying to monitor your computer activities. Google won’t say how it figured out that state-sponsored attackers may be attempting to compromise your account or computer. But it’s promised to let you know if it thinks Big Brother is tuned in to what you’re doing.

As recently reported on the New York Times’ blog6, the warning will pop up at the top of your Gmail inbox, Google home page, or Chrome browser, stating:

“Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer.”

According to a Google blog post by Eric Grosse, VP of Security Engineering at Google7:

“If you see this warning it does not necessarily mean that your account has been hijacked. It just means that we believe you may be a target, of phishing or malware for example, and that you should take immediate steps to secure your account.

Here are some things you should do immediately: create a unique password that has a good mix of capital and lowercase letters, as well punctuation marks and numbers; enable 2-step verification as additional security; and update your browser, operating system, plugins, and document editors.

Attackers often send links to fake sign-in pages to try to steal your password, so be careful about where you sign in to Google and look for https://accounts.google.com/ in your browser bar. These warnings are not being shown because Google’s internal systems have been compromised or because of a particular attack.”

The Next Big War Zone = the Internet
Unless you’ve been living under a rock this past year, you’ve surely heard about the repeated attempts to restrict your online freedom and grant government near limitless control over the internet and its content.

It began in January with the introduction of two proposed laws in US Congress: the Stop Online Piracy Act (SOPA), and the Protect IP Act (PIPA). While “sold” as laws to address online copyright infringement, most of which allegedly arise from outside the US, both laws contained measures capable of severely restricting online freedom of speech and harm web sites and online communities of all kinds, including this one. After tens of millions of people rose up in various protests, both online and by hitting the pavement, both bills were “indefinitely postponed.”

Many have warned, however, that the bills are not “dead” and are likely to return.

It didn’t take long for the next round. In April, the Cyber Intelligence Sharing and Protection Act (CISPA) was brought forth, and quickly became described by opponents as an even greater threat to internet freedom than SOPA and PIPA. I won’t go into any detailed discussion on these bills here, but simply want to bring your attention to the fact that bills such as these three, while dressed up as laws that will protect you and save you money, are poorly guised attempts to gut privacy laws and open the door for a totalitarian takeover of the internet and its content.

Campaign for Liberty8 is continuing its fight to stop another government intrusion, warning that this coming December, the United Nations will also be meeting to compile even more recommendations for international internet regulations.

While it may seem hopeless at times, I urge you to take an active role anytime the opportunity presents itself to take a stand. I personally believe internet freedom and health freedom go hand in hand these days, as a majority of people get a majority of their health information from freely available web sites such as mine.

Right now, you can sign the Campaign for Liberty Protect Internet Freedom Mandate.

If Squelching In formation Freedom Doesn ‘t Work, What’s Next?
The draconian advancements in surveillance do not end with the erection of a massive spy central and ever-increasing attacks on internet freedom. We also have some 63 drone launch sites within the US9, and the US military has admitted it now has drone technology in the form of tiny mechanical insects, equipped with cameras, microphones, and DNA sampling capabilities10.

Besides that, there’s an ever-expanding arsenal of so-called “active denial weapons”—directed energy weapons that can scatter or incapacitate those in its path, by a variety of means11. Such weapons are already being used domestically by various law enforcement agencies for crowd control. Then there are more sinister signs of readiness for domestic combat. In April, news reports began circulating questioning the Department of Homeland Security’s rationale for purchasing 450 million rounds of hollow point bullets12

A report by RT News reads:

“The department has yet to discuss why they are ordering such a massive bevy of bullets for an agency that has limited need domestically for doing harm, but they say they expect to continue receiving shipments from the manufacturer for the next five years, during which they plan to blow through enough ammunition to execute more people than there are in the entire United States.

… the choice — and quantity — of its hollow point order raises a lot of questions about future plans for the DHS… On their website, the contractor claims that the ammunition is specifically designed so that it can pass through a variety of obstructions and offers “optimum penetration for terminal performance.” Or, in other words, this is the kind of bullet designed to stop any object dead in its tracks and, if emptied into the hands of the DHS a few hundred million times, just might do as much.

… As the DHS gains more and more ground in fighting terrorism domestically, the US at the same time has turned the tables to make its definition of terrorist way less narrow. With any American blogger or free thinking on the fringe of what the government can go after under H.R. 347, or the National Defense Authorization Act that allows for the indefinite detention of US citizens without charge, the DHS could just be blasting through what’s left of its budget to make sure that its roster of agents across the country can get in their target practice over the next few years.”

Without Online Freedom, You Cannot Exercise Health Freedom
Some of you may at this point wonder why I report on an issue such as this, so let me make this point clear. Access to health information could easily be deemed a “threat” to national welfare—especially when web sites such as this one publish information that contradicts the official government stance. Examples such as advising women against national mammography screening standards, or raising concerns about vaccine safety, or questioning conventional cancer treatments could all be considered a threat to an extremely profitable status quo.

In such a scenario, they could simply shut Mercola.com, and others like us, down; leaving you with no truth-telling, corruption-exposing, alternative voices other than the officially sponsored viewpoint. And it should be quite clear by now that the government-sanctioned stance on most issues relating to health and diet are primarily dictated by powerful lobbying groups furthering financially-driven industry agendas that have absolutely nothing to do with optimizing health and longevity.

Don’t Be Fooled—Internet Security Bills are Likely Nothing of the Sort
Interestingly enough, CISPA is promoted primarily as a cyber security bill, which brings us full circle back to where this article started. Recall, the Flame virus has surveillance capabilities that far surpass previous viruses and worms that may collect or destroy data. In fact, its capability to transfer to Bluetooth-enabled gadgets and secretly activate microphones renders it perfect for spying on anyone and everyone, anywhere, at any time… which is exactly the plan, if you believe the information detailed in the featured Wired Magazine article above.

It’s interesting to note the rationale used when trying sell us this bill. According to an April 26 report in the International Business Times13:

“Co-sponsor Rep. Dutch Ruppersberger, D-Md., says CISPA provides essential tools for repelling online security threats: “Without important, immediate changes to American cyber security policy, I believe our country will continue to be at risk for a catastrophic attack on our nation’s vital networks, networks that power our homes, provide our clean water or maintain the other critical services we use every day.”

Sounds like he was talking about an eventuality just like the Flame virus, or the older Stuxnet worm, for that matter—both of which, incidentally, appear to have targeted Iranian oil- and nuclear facilities, and neither of which has been officially traced back to any country or agency, despite our already overwhelming security apparatus—just over a month before Flame was discovered by a Russian antivirus company which, by the way, currently employs the virus hunter who discovered Stuxnet in 2010.

I’ll leave the meaning of such coincidences for you to ponder. But suffice it to say, it does not bode well if a law like CISPA is enacted that allows companies and governments to share information collected online, especially when combined with a massive data-mining virus that can skip around from one wireless piece of technology to another, from computers to cell phones to iPads, gathering data on every single social network contact every single person has, and audio files on every single conversation any one might have at any point in time. Especially now that we will shortly have the facility to store and “process” all that data.

In closing, I will simply urge you to take efforts at curbing online freedom and extending the government’s reach seriously, and whenever such efforts are launched, take action to help preserve your right to health freedom, which is closely tied to the right to online freedom of speech.

For right now, you can take a stand by signing the Campaign for Liberty Protect Internet Freedom Mandate.

878 2.0k Email