Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

What is your favorite Conspiracy Theory?
Nitro

Posted on 02/07/2005 1:36:59 AM PST by Nitro

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 121-140141-160161-180181-195 last
To: The Real J Fate

The Mind Has No Firewall
TIMOTHY L. THOMAS


"It is completely clear that the state which is first to create such weapons will achieve incomparable superiority." -- Major I. Chernishev, Russian army[1]

The human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity.[2] We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. Examples of unplanned attacks on the body's data-processing capability are well-documented. Strobe lights have been known to cause epileptic seizures. Not long ago in Japan, children watching television cartoons were subjected to pulsating lights that caused seizures in some and made others very sick.

Defending friendly and targeting adversary data-processing capabilities of the body appears to be an area of weakness in the US approach to information warfare theory, a theory oriented heavily toward systems data-processing and designed to attain information dominance on the battlefield. Or so it would appear from information in the open, unclassified press. This US shortcoming may be a serious one, since the capabilities to alter the data- processing systems of the body already exist. A recent edition of U.S. News and World Report highlighted several of these "wonder weapons" (acoustics, microwaves, lasers) and noted that scientists are "searching the electromagnetic and sonic spectrums for wavelengths that can affect human behavior."[3] A recent Russian military article offered a slightly different slant to the problem, declaring that "humanity stands on the brink of a psychotronic war" with the mind and body as the focus. That article discussed Russian and international attempts to control the psycho-physical condition of man and his decisionmaking processes by the use of VHF-generators, "noiseless cassettes," and other technologies.

An entirely new arsenal of weapons, based on devices designed to introduce subliminal messages or to alter the body's psychological and data-processing capabilities, might be used to incapacitate individuals. These weapons aim to control or alter the psyche, or to attack the various sensory and data-processing systems of the human organism. In both cases, the goal is to confuse or destroy the signals that normally keep the body in equilibrium.

This article examines energy-based weapons, psychotronic weapons, and other developments designed to alter the ability of the human body to process stimuli. One consequence of this assessment is that the way we commonly use the term "information warfare" falls short when the individual soldier, not his equipment, becomes the target of attack.

Information Warfare Theory and the Data-Processing Element of Humans

In the United States the common conception of information warfare focuses primarily on the capabilities of hardware systems such as computers, satellites, and military equipment which process data in its various forms. According to Department of Defense Directive S-3600.1 of 9 December 1996, information warfare is defined as "an information operation conducted during time of crisis or conflict to achieve or promote specific objectives over a specific adversary or adversaries." An information operation is defined in the same directive as "actions taken to affect adversary information and information systems while defending one's own information and information systems." These "information systems" lie at the heart of the modernization effort of the US armed forces and other countries, and manifest themselves as hardware, software, communications capabilities, and highly trained individuals. Recently, the US Army conducted a mock battle that tested these systems under simulated combat conditions.

US Army Field Manual 101-5-1, Operational Terms and Graphics (released 30 September 1997), defines information warfare as "actions taken to achieve information superiority by affecting a hostile's information, information based-processes, and information systems, while defending one's own information, information processes, and information systems." The same manual defines information operations as a "continuous military operation within the military information environment that enables, enhances, and protects friendly forces' ability to collect, process, and act on information to achieve an advantage across the full range of military operations. [Information operations include] interacting with the Global Information Environment . . . and exploiting or denying an adversary's information and decision capabilities."[4]

This "systems" approach to the study of information warfare emphasizes the use of data, referred to as information, to penetrate an adversary's physical defenses that protect data (information) in order to obtain operational or strategic advantage. It has tended to ignore the role of the human body as an information- or data-processor in this quest for dominance except in those cases where an individual's logic or rational thought may be upset via disinformation or deception. As a consequence little attention is directed toward protecting the mind and body with a firewall as we have done with hardware systems. Nor have any techniques for doing so been prescribed. Yet the body is capable not only of being deceived, manipulated, or misinformed but also shut down or destroyed--just as any other data-processing system. The "data" the body receives from external sources--such as electromagnetic, vortex, or acoustic energy waves--or creates through its own electrical or chemical stimuli can be manipulated or changed just as the data (information) in any hardware system can be altered.

The only body-related information warfare element considered by the United States is psychological operations (PSYOP). In Joint Publication 3-13.1, for example, PSYOP is listed as one of the elements of command and control warfare. The publication notes that "the ultimate target of [information warfare] is the information dependent process, whether human or automated . . . . Command and control warfare (C2W) is an application of information warfare in military operations. . . . C2W is the integrated use of PSYOP, military deception, operations security, electronic warfare and physical destruction."[5]

One source defines information as a "nonaccidental signal used as an input to a computer or communications system."[6] The human body is a complex communication system constantly receiving nonaccidental and accidental signal inputs, both external and internal. If the ultimate target of information warfare is the information-dependent process, "whether human or automated," then the definition in the joint publication implies that human data-processing of internal and external signals can clearly be considered an aspect of information warfare. Foreign researchers have noted the link between humans as data processors and the conduct of information warfare. While some study only the PSYOP link, others go beyond it. As an example of the former, one recent Russian article described offensive information warfare as designed to "use the Internet channels for the purpose of organizing PSYOP as well as for `early political warning' of threats to American interests."[7] The author's assertion was based on the fact that "all mass media are used for PSYOP . . . [and] today this must include the Internet." The author asserted that the Pentagon wanted to use the Internet to "reinforce psychological influences" during special operations conducted outside of US borders to enlist sympathizers, who would accomplish many of the tasks previously entrusted to special units of the US armed forces.

Others, however, look beyond simple PSYOP ties to consider other aspects of the body's data-processing capability. One of the principal open source researchers on the relationship of information warfare to the body's data-processing capability is Russian Dr. Victor Solntsev of the Baumann Technical Institute in Moscow. Solntsev is a young, well-intentioned researcher striving to point out to the world the potential dangers of the computer operator interface. Supported by a network of institutes and academies, Solntsev has produced some interesting concepts.[8] He insists that man must be viewed as an open system instead of simply as an organism or closed system. As an open system, man communicates with his environment through information flows and communications media. One's physical environment, whether through electromagnetic, gravitational, acoustic, or other effects, can cause a change in the psycho-physiological condition of an organism, in Solntsev's opinion. Change of this sort could directly affect the mental state and consciousness of a computer operator. This would not be electronic war or information warfare in the traditional sense, but rather in a nontraditional and non-US sense. It might encompass, for example, a computer modified to become a weapon by using its energy output to emit acoustics that debilitate the operator. It also might encompass, as indicated below, futuristic weapons aimed against man's "open system."

Solntsev also examined the problem of "information noise," which creates a dense shield between a person and external reality. This noise may manifest itself in the form of signals, messages, images, or other items of information. The main target of this noise would be the consciousness of a person or a group of people. Behavior modification could be one objective of information noise; another could be to upset an individual's mental capacity to such an extent as to prevent reaction to any stimulus. Solntsev concludes that all levels of a person's psyche (subconscious, conscious, and "superconscious") are potential targets for destabilization.

According to Solntsev, one computer virus capable of affecting a person's psyche is Russian Virus 666. It manifests itself in every 25th frame of a visual display, where it produces a combination of colors that allegedly put computer operators into a trance. The subconscious perception of the new pattern eventually results in arrhythmia of the heart. Other Russian computer specialists, not just Solntsev, talk openly about this "25th frame effect" and its ability to subtly manage a computer user's perceptions. The purpose of this technique is to inject a thought into the viewer's subconscious. It may remind some of the subliminal advertising controversy in the United States in the late 1950s.

US Views on "Wonder Weapons": Altering the Data-Processing Ability of the Body

What technologies have been examined by the United States that possess the potential to disrupt the data-processing capabilities of the human organism? The 7 July 1997 issue of U.S. News and World Report described several of them designed, among other things, to vibrate the insides of humans, stun or nauseate them, put them to sleep, heat them up, or knock them down with a shock wave.[9] The technologies include dazzling lasers that can force the pupils to close; acoustic or sonic frequencies that cause the hair cells in the inner ear to vibrate and cause motion sickness, vertigo, and nausea, or frequencies that resonate the internal organs causing pain and spasms; and shock waves with the potential to knock down humans or airplanes and which can be mixed with pepper spray or chemicals.[10]

With modification, these technological applications can have many uses. Acoustic weapons, for example, could be adapted for use as acoustic rifles or as acoustic fields that, once established, might protect facilities, assist in hostage rescues, control riots, or clear paths for convoys. These waves, which can penetrate buildings, offer a host of opportunities for military and law enforcement officials. Microwave weapons, by stimulating the peripheral nervous system, can heat up the body, induce epileptic-like seizures, or cause cardiac arrest. Low-frequency radiation affects the electrical activity of the brain and can cause flu-like symptoms and nausea. Other projects sought to induce or prevent sleep, or to affect the signal from the motor cortex portion of the brain, overriding voluntary muscle movements. The latter are referred to as pulse wave weapons, and the Russian government has reportedly bought over 100,000 copies of the "Black Widow" version of them.[11]

However, this view of "wonder weapons" was contested by someone who should understand them. Brigadier General Larry Dodgen, Deputy Assistant to the Secretary of Defense for Policy and Missions, wrote a letter to the editor about the "numerous inaccuracies" in the U.S. News and World Report article that "misrepresent the Department of Defense's views."[12] Dodgen's primary complaint seemed to have been that the magazine misrepresented the use of these technologies and their value to the armed forces. He also underscored the US intent to work within the scope of any international treaty concerning their application, as well as plans to abandon (or at least redesign) any weapon for which countermeasures are known. One is left with the feeling, however, that research in this area is intense. A concern not mentioned by Dodgen is that other countries or non-state actors may not be bound by the same constraints. It is hard to imagine someone with a greater desire than terrorists to get their hands on these technologies. "Psycho-terrorism" could be the next buzzword.

Russian Views on "Psychotronic War"

The term "psycho-terrorism" was coined by Russian writer N. Anisimov of the Moscow Anti-Psychotronic Center. According to Anisimov, psychotronic weapons are those that act to "take away a part of the information which is stored in a man's brain. It is sent to a computer, which reworks it to the level needed for those who need to control the man, and the modified information is then reinserted into the brain." These weapons are used against the mind to induce hallucinations, sickness, mutations in human cells, "zombification," or even death. Included in the arsenal are VHF generators, X-rays, ultrasound, and radio waves. Russian army Major I. Chernishev, writing in the military journal Orienteer in February 1997, asserted that "psy" weapons are under development all over the globe. Specific types of weapons noted by Chernishev (not all of which have prototypes) were:

* A psychotronic generator, which produces a powerful electromagnetic emanation capable of being sent through telephone lines, TV, radio networks, supply pipes, and incandescent lamps.
* An autonomous generator, a device that operates in the 10-150 Hertz band, which at the 10-20 Hertz band forms an infrasonic oscillation that is destructive to all living creatures.
* A nervous system generator, designed to paralyze the central nervous systems of insects, which could have the same applicability to humans.
* Ultrasound emanations, which one institute claims to have developed. Devices using ultrasound emanations are supposedly capable of carrying out bloodless internal operations without leaving a mark on the skin. They can also, according to Chernishev, be used to kill.
* Noiseless cassettes. Chernishev claims that the Japanese have developed the ability to place infra-low frequency voice patterns over music, patterns that are detected by the subconscious. Russians claim to be using similar "bombardments" with computer programming to treat alcoholism or smoking.
* The 25th-frame effect, alluded to above, a technique wherein each 25th frame of a movie reel or film footage contains a message that is picked up by the subconscious. This technique, if it works, could possibly be used to curb smoking and alcoholism, but it has wider, more sinister applications if used on a TV audience or a computer operator.
* Psychotropics, defined as medical preparations used to induce a trance, euphoria, or depression. Referred to as "slow-acting mines," they could be slipped into the food of a politician or into the water supply of an entire city. Symptoms include headaches, noises, voices or commands in the brain, dizziness, pain in the abdominal cavities, cardiac arrhythmia, or even the destruction of the cardiovascular system.

There is confirmation from US researchers that this type of study is going on. Dr. Janet Morris, coauthor of The Warrior's Edge, reportedly went to the Moscow Institute of Psychocorrelations in 1991. There she was shown a technique pioneered by the Russian Department of Psycho-Correction at Moscow Medical Academy in which researchers electronically analyze the human mind in order to influence it. They input subliminal command messages, using key words transmitted in "white noise" or music. Using an infra-sound, very low frequency transmission, the acoustic psycho-correction message is transmitted via bone conduction.[13]

In summary, Chernishev noted that some of the militarily significant aspects of the "psy" weaponry deserve closer research, including the following nontraditional methods for disrupting the psyche of an individual:

* ESP research: determining the properties and condition of objects without ever making contact with them and "reading" peoples' thoughts
* Clairvoyance research: observing objects that are located just beyond the world of the visible--used for intelligence purposes
* Telepathy research: transmitting thoughts over a distance--used for covert operations
* Telekinesis research: actions involving the manipulation of physical objects using thought power, causing them to move or break apart--used against command and control systems, or to disrupt the functioning of weapons of mass destruction
* Psychokinesis research: interfering with the thoughts of individuals, on either the strategic or tactical level

While many US scientists undoubtedly question this research, it receives strong support in Moscow. The point to underscore is that individuals in Russia (and other countries as well) believe these means can be used to attack or steal from the data-processing unit of the human body.

Solntsev's research, mentioned above, differs slightly from that of Chernishev. For example, Solntsev is more interested in hardware capabilities, specifically the study of the information-energy source associated with the computer-operator interface. He stresses that if these energy sources can be captured and integrated into the modern computer, the result will be a network worth more than "a simple sum of its components." Other researchers are studying high-frequency generators (those designed to stun the psyche with high frequency waves such as electromagnetic, acoustic, and gravitational); the manipulation or reconstruction of someone's thinking through planned measures such as reflexive control processes; the use of psychotronics, parapsychology, bioenergy, bio fields, and psychoenergy;[14] and unspecified "special operations" or anti-ESP training.

The last item is of particular interest. According to a Russian TV broadcast, the strategic rocket forces have begun anti-ESP training to ensure that no outside force can take over command and control functions of the force. That is, they are trying to construct a firewall around the heads of the operators.

Conclusions

At the end of July 1997, planners for Joint Warrior Interoperability Demonstration '97 "focused on technologies that enhance real-time collaborative planning in a multinational task force of the type used in Bosnia and in Operation Desert Storm. The JWID '97 network, called the Coalition Wide-Area Network (CWAN), is the first military network that allows allied nations to participate as full and equal partners."[15] The demonstration in effect was a trade fair for private companies to demonstrate their goods; defense ministries got to decide where and how to spend their money wiser, in many cases without incurring the cost of prototypes. It is a good example of doing business better with less. Technologies demonstrated included:[16]

* Soldiers using laptop computers to drag cross-hairs over maps to call in airstrikes
* Soldiers carrying beepers and mobile phones rather than guns
* Generals tracking movements of every unit, counting the precise number of shells fired around the globe, and inspecting real-time damage inflicted on an enemy, all with multicolored graphics[17]

Every account of this exercise emphasized the ability of systems to process data and provide information feedback via the power invested in their microprocessors. The ability to affect or defend the data-processing capability of the human operators of these systems was never mentioned during the exercise; it has received only slight attention during countless exercises over the past several years. The time has come to ask why we appear to be ignoring the operators of our systems. Clearly the information operator, exposed before a vast array of potentially immobilizing weapons, is the weak spot in any nation's military assets. There are few international agreements protecting the individual soldier, and these rely on the good will of the combatants. Some nations, and terrorists of every stripe, don't care about such agreements.

This article has used the term data-processing to demonstrate its importance to ascertaining what so-called information warfare and information operations are all about. Data-processing is the action this nation and others need to protect. Information is nothing more than the output of this activity. As a result, the emphasis on information-related warfare terminology ("information dominance," "information carousel") that has proliferated for a decade does not seem to fit the situation before us. In some cases the battle to affect or protect data-processing elements pits one mechanical system against another. In other cases, mechanical systems may be confronted by the human organism, or vice versa, since humans can usually shut down any mechanical system with the flip of a switch. In reality, the game is about protecting or affecting signals, waves, and impulses that can influence the data-processing elements of systems, computers, or people. We are potentially the biggest victims of information warfare, because we have neglected to protect ourselves.

Our obsession with a "system of systems," "information dominance," and other such terminology is most likely a leading cause of our neglect of the human factor in our theories of information warfare. It is time to change our terminology and our conceptual paradigm. Our terminology is confusing us and sending us in directions that deal primarily with the hardware, software, and communications components of the data-processing spectrum. We need to spend more time researching how to protect the humans in our data management structures. Nothing in those structures can be sustained if our operators have been debilitated by potential adversaries or terrorists who--right now--may be designing the means to disrupt the human component of our carefully constructed notion of a system of systems.

NOTES

1. I. Chernishev, "Can Rulers Make `Zombies' and Control the World?" Orienteer, February 1997, pp. 58-62.

2. Douglas Pasternak, "Wonder Weapons," U.S. News and World Report, 7 July 1997, pp. 38-46.

3. Ibid., p. 38.

4. FM 101-5-1, Operational Terms and Graphics, 30 September 1997, p. 1-82.

5. Joint Pub 3-13.1, Joint Doctrine for Command and Control Warfare (C2W), 7 February 1996, p. v.

6. The American Heritage Dictionary (2d College Ed.; Boston: Houghton Mifflin, 1982), p. 660, definition 4.

7. Denis Snezhnyy, "Cybernetic Battlefield & National Security," Nezavisimoye Voyennoye Obozreniye, No. 10, 15-21 March 1997, p. 2.

8. Victor I. Solntsev, "Information War and Some Aspects of a Computer Operator's Defense," talk given at an Infowar Conference in Washington, D.C., September 1996, sponsored by the National Computer Security Association. Information in this section is based on notes from Dr. Solntsev's talk.

9. Pasternak, p. 40.

10. Ibid., pp. 40-46.

11. Ibid.

12. Larry Dodgen, "Nonlethal Weapons," U.S. News and World Report, 4 August 1997, p. 5.

13. "Background on the Aviary," Nexus Magazine, downloaded from the Internet on 13 July 1997 from www.execpc.com/vjentpr/nexusavi.html, p.7.

14. Aleksandr Cherkasov, "The Front Where Shots Aren't Fired," Orienteer, May 1995, p. 45. This article was based on information in the foreign and Russian press, according to the author, making it impossible to pinpoint what his source was for this reference.

15. Bob Brewin, "DOD looks for IT `golden nuggets,'" Federal Computer Week, 28 July 1997, p. 31, as taken from the Earlybird Supplement, 4 August 1997, p. B 17.

16. Oliver August, "Zap! Hard day at the office for NATO's laptop warriors," The Times, 28 July 1997, as taken from the Earlybird Supplement, 4 August 1997, p. B 16.

17. Ibid.

Lieutenant Colonel Timothy L. Thomas (USA Ret.) is an analyst at the Foreign Military Studies Office, Fort Leavenworth, Kansas. Recently he has written extensively on the Russian view of information operations and on current Russian military-political issues. During his military career he served in the 82d Airborne Division and was the Department Head of Soviet Military-Political Affairs at the US Army's Russian Institute in Garmisch, Germany.


Reviewed 25 February 1998. Please send comments or corrections to Parameters@carlisle.army.mil


181 posted on 02/10/2005 4:57:26 PM PST by The Real J Fate
[ Post Reply | Private Reply | To 178 | View Replies]

To: The Real J Fate

Reverse Speech - Voices From The Unconscious

By David John Oates



Ever since the late 60s when the Beatles first experimented with a recording technique known as backward masking, people have had a fascination with recordings played backwards. In the late 70s and early 80s religious fundamentalists preached from the pulpits that occultic forces were hiding sinister backwards messages in rock and roll records. In the early 90s their cries reached the US courts when the rock group Judas Priest was sued by distraught parents whose teenage sons had suicided whilst listening to their album, Stained Class. They claimed the album contained subliminal backward messages that encouraged suicidal behaviour. Judas Priest prevailed in the case with the court ruling they had not intentionally placed these messages on the album but the Judge also concluded that the backward messages did exist.

So what are these backward messages? Do they exist and if so what do they mean and how are they getting there?

In early 1984, while I was running a halfway house for street kids in rural South Australia, I first heard about this phenomenon when I had several frightened teenagers in my office saying they could hear the voice of devil talking backwards to them on their records. Naturally I was sceptical, but my curiosity was sufficiently aroused to explore further. I have always had an interest in electronics and audio. I was (and still am) a licensed amateur radio operator with a good ear for sound, so I went home that night, rewired some audio equipment, and started to play some of the suspect records backwards fully expecting to hear nothing but gibberish.

Much to my surprise, from the very first record I listened to I began to hear clear, grammatically correct sentences, mixed amongst the backward gibberish. My first thought was the sound track must have been altered but subsequent tests revealed no manipulation. Suspecting an over active imagination I asked friends if they could also hear the backward messages. Most of them could with no prior prompting on my part. This was indeed most curious.

Over the next few weeks, I had reversed most of my musical collection finding these backward messages to be prolific, occurring in almost 50% of all the records I looked at. The messages they contained were not necessarily evil, as the fundamentalists had claimed, but rather covered a wide range of subjects such as love, politics and other general topics.

Shortly afterwards, my little hobby took a dramatic turn when I accidentally stumbled across the phenomenon in normal human speech. One of the first examples I found in speech was in Neil Armstrong’s famous first words as stepped onto the lunar surface. Forwards he says, “That’s one small step for man,” and when this same track is played backwards, the words “Man will space walk” can be clearly heard. Another early example found occurs as a live commentator is describing the scene in Dallas Texas 1963 when President John F. Kennedy was shot. Forwards he says, “Parkland hospital, there has been a shooting, Parkland hospital has been advised to stand by for a severe gun shot wound.” When this same track is played backwards the words, “He’s shot bad, hold it! Try and look up,” can be clearly heard.

Suddenly my little hobby had turned into an obsession. I began taping as many people as often as I could and I found backward messages to be prolific, many of them as clear as the forward dialogue, occurring in grammatically correct sentences that often related to what was being said forward. I searched libraries and bookshops trying to find any other work on the subject and could find none. It then became obvious to me that this was a field that was totally new.

Then in 1987, I was encouraged by my good friend, Greg Albrecht, to write a book about the topic. Together we worked on the project and gave the book an initial working title of “Beyond Backward Masking.” We complied backward messages from both music and speech and found many common trends, most principally the fact that these backward messages usually related to what was spoken forwards. We found that if a lie was spoken in forward speech, the backwards speech would often correct that lie and speak the truth instead. Additionally, we found that if pertinent facts were left out of the forward speech, the backward speech would often put them in. We also noted that the backward messages occurred approximately once every 15-20 seconds of normal relaxed conversation and less often in a public speech, maybe once every 60-90 seconds. Greg and I became convinced that we had discovered something extremely significant. We needed to call it something and explain it in simple terms.

The answer came to me at 3 o’clock in the morning sometime in April 1987 when I work up with a jolt with 2 words burning in my mind. The words were “Reverse Speech”. I got up immediately, went to my computer, and wrote the very first draft of what was later called “The Theory of Reverse Speech and Speech Complementarity.”

In short this theory states that the process of spoken communication is two fold, forwards and backwards. As the human brain is constructing the sounds of speech, it is putting those sounds together in such a way that two messages are communicated simultaneously, one forwards from the conscious mind and the other in reverse from the unconscious mind.

The theory also stated that Reverse Speech was a communication process. The backward messages can be received and understood by the human mind. We know this because many instances of reversed conversation have been found in Reverse Speech, where questions are asked and answers subsequently given, all in reverse. Also, EEG testing that was undertaken in 1988 showed the brain clearly responding to backward messages.

I later theorised that the existence of Reverse Speech may explain many aspects of human intuition, why we can often get a gut feeling when talking to someone that they can or cannot be trusted, or that there is more to the conversation than they are telling us. Unconsciously, we are receiving the reversed messages and recognising the feelings they create in us as human intuition.

We released our book late 1987 with the subtitle of “Reverse Speech, The Voice Of The Inner Mind.” Within only a few weeks of its release we were approached by the Aussie press and did several TV current affairs programs and dozens of radio interviews. Greg subsequently went onto other affairs and I continued the research alone. In 1989, the initial media coverage reached the United States and I was invited for a lecture tour. It was an outstanding success and I moved there to live shortly afterwards and stayed for 10 years, lecturing, teaching and continuously researching this amazing field. I returned to Australia in late 1999 with several trained Reverse Speech Analysts continuing the work in the U.S.

Since 1987 my understanding of Reverse Speech has grown considerably and its practical applications have become very apparent to me.

On the surface level Reverse Speech acts almost like an ultimate truth detector. Its uses in law enforcement alone are awesome. It can reveal the guilt or innocence of a suspect. It can reveal the location of missing evidence and the motives for a crime. Certified Reverse Speech Practitioner, Jack Johnston in Ashland Oregon, has been using Reverse Speech in investigative work with several attorneys. His results have been amazing. In one case, he found information in reverse that was subsequently verified by DNA testing. So impressed have the authorities been with Jack’s work that Reverse Speech training has been added to the Oregon Police’s training program as an optional extra in their course of study.

My own personal love of this technology, however, is in the therapeutic area. Much of the messages contained in Reverse Speech come from deeper areas of the human mind. In fact less than 10% of all reversed language is from the conscious mind. By far the vast majority of backward messages are coming from either the unconscious mind, or what Carl Jung coined as the Collective Unconscious. When they come from these areas they can often reveal information unknown to the conscious mind. This can prove to be extremely beneficial in working with psychological or physical illness.

In one case a client who came for Reverse Speech session work to discover the cause of her asthma, talked forwards about unusual mould smells in the house. She had a reversal on this section that said, “Under the floor, puss in my head.” We were all puzzled about the meaning of the reversal until the husband, out of curiosity, looked under the floorboards of the house only to discover 18 inches of mould growing under the house. He cleared out the mould and within a couple of weeks the woman’s asthma had completely disappeared. Why did this information appear in reverse even though the conscious mind did not know? Because the unconscious mind knew. Using traditional therapy this might have never been discovered.

In another case, when a woman was talking about depression and her need to get her life in order, a reversal appeared that said “Need more sunlight.” The woman subsequently took the curtains down from her windows, cut down the trees around the windows, and let more sunlight into her house. Within a couple of weeks, her disposition had considerably improved and her life began to shine again. The reversal accessed unconscious information that provided her with a solution to her problem.

According to my discoveries with Reverse Speech, the unconscious mind contains a wealth of information. It knows all about us, what we need, our wants and desires, and often the solutions to many of our problems. Reverse Speech directly accesses this information and hence can shorten the therapeutic process by months if not years.

In a case I recently worked on, I found a reversal that said “I have been molested.” This was information known to the client but not told to me. It revealed an event that was extremely important to the whole therapeutic process. This knowledge was obtained with just one tape recording and may not have been revealed for a long time using traditional therapy. Another case had a reversal that said “Hid the bad orphan.” This reversal prompted my client’s memory of an event in her childhood where she had been naughty, punished, and her father had subsequently died of heart attack a few days later. Unconsciously she had blamed herself for her father’s death and this blame was affecting her to this very day. With Reverse Speech we were able to isolate this event in just one tape recording and make appropriate corrective measures.

The above are just a few of the 1000s of case studies that I have in my files. In my practice as a therapist and hypnotherapist I literally see miracles unfolding before me as Reverse Speech reveals the amazing gems contained in the unconscious mind. This makes my work very effective and extremely rewarding. Every day I am eternally grateful for my discovery of this magnificent phenomenon.

In recent years, I have taken Reverse Speech one step further than this by developing a technique that is very effective in changing human behaviour.

A significant proportion of speech reversals speak in metaphoric language, using phrases such as “The wolf has fallen in the lake,” or “My goddess has a spear in her heart.” At first the meaning of these phrases were a mystery to me but as the years of research passed I began to notice a trend with these metaphors. For example, every time someone used the word wolf in reverse, they were usually talking forward about motivation or the desire to get ahead. The word Goddess often occurred when someone was talking forward about hope for the future, and lake frequently occurred when they were talking forwards about emotions.

As time went on I discovered that many of these words were universal in their meaning from person to person and even (as I began to train bi-lingual students) from culture to culture. I started to compile a reverse speech metaphor dictionary which today has more than 2,000 references documented of common metaphors that occur in reverse speech.

Of even more significance I discovered that not only were these metaphors Universal in their meanings but they also represented, and even caused, certain aspects of human behaviour. I theorised that at the deepest levels of the human psyche the human mind thought in pictures or metaphor. When I was working with clients who used metaphors that were not conducive to their behavioural outcomes, I wondered if it was possible to change the metaphor, hence the behaviour.

Thus was born a brand new therapeutic technique that I entitled “Metaphor Restructuring.” It went something like this.

First I would conduct a reverse speech session with my client and find the metaphors they were running. In a subsequent session I would ask my client how could these metaphors be changed to achieve their desired behavioural outcomes. Much to my amazement, speech reversals would come back that would tell me exactly what to do. For example, the man whose wolf had fallen into the lake might produce a reversal that said “Give the wolf a stick and pull him out.” I would then place my client in a light meditative state and ask him to visualise the wolf in the lake. Then, following the instructions contained in the follow up tape, I would ask my client to take the wolf out the lake. I called this metaphoric journey a “Metawalk.”

The results I obtained were amazing. Firstly the client experiences a very vivid metaphoric journey. Many times they would see the images before I suggested them. For a few days following the Metawalk, they would experience a sense of relief and lightness of mood. This mood would then gradually fade and 2-3 weeks later the real changes would begin. They seemed to start deep down inside and gradually grew in intensity until the behaviour they were seeking to change had almost completely vanished.

Thus I had developed a very powerful technique that was completely free of operator bias. It used the unconscious mind itself to both show us what was wrong and also how to rectify the problem.

This is where the research now stands after almost 20 years of work. Reverse Speech is an awesome discovery that has the potential to revolutionize our understanding of how the human mind works, and possibly bring society into an age of truth and awareness. I am now looking for enthusiastic people with vision and courage who can learn these techniques and take them out to the world. You can also experience this process for yourself with our special introductory offer of a 5 minute recording for $49. To arrange a five minute recording email David Oates at backwards@reversespeech.com. For further information you can contact our offices in Adelaide Australia at (08) 8382-4372 (International 61 8 8382-4372) or visit the website (which contains 1000s of examples of speech reversals) at http://www.reversespeech.com


182 posted on 02/10/2005 5:03:33 PM PST by The Real J Fate
[ Post Reply | Private Reply | To 181 | View Replies]

To: The Real J Fate

What about barcodes and 666: The Mark of the Beast?
by Terry Watkins

Is the barcode the Mark of the Beast?

Do barcodes really contain the number 666?

Is the barcode paving the road to 666: the Mark of the Beast?

Before we answer these questions, we need to briefly examine the barcode technology. . .

What are barcodes?

Barcodes, of course, are those ever-familiar "bars" and "numbers" on virtually everything. In 1973, "Mr. Barcode" (or is it Mrs. Barcode?) quietly strolled into our world. In just over 25 years, Mr. Barcode has literally taken over the world. Now there's a barcode for virtually everything. There's short barcodes, and tall barcodes. There's skinny barcodes and fat barcodes. There's postal barcodes and international barcodes. There's 2-D barcodes. And there's even barcodes for the humble "bumble-bee". From letters, to cokes, from fishes to smokes - it's "clothed" with friendly "Mr. Barcode".

As someone truthfully said, "If it exists, bar code it".

The primary barcode used in the United States is the UPC (Universal Product Code) barcode. The UPC is also the "original" barcode. The UPC was designed for the grocery industry. Because of the large number of items normally "checked-out" at the grocery store, a method was needed to speed up and eliminate "human" cashier errors. In 1973, the UPC barcode was born.

To the average person, the barcode looks confusing and complex, but to a "bar-coded" friendly computer, it's actually very simple.

How does a computer-scanner reads a barcode?

A single barcode number is actually seven units. A unit is either black or white. A unit that is black would display as a "bar". A unit that is white would display as a "space". Another way of writing a barcode unit is "1" for a single unit "black bar" and "0" for a single unit "white space". For instance, the number "1" is composed of the seven units, "0011001" or "space-space-bar-bar-space-space-bar". Remember, a single barcode number requires seven units.

Also, on a UPC barcode the same numbers on the left-hand side (the Manufacturer Code) is coded different than the numbers on the right-hand side (Product Code). The left side numbers are actually the "inverted" or "mirrored" codes of the right side numbers, for instance what is a "bar" on the right-side, is a "space" on the left-side. The right-side codes are called "even parity" codes because there is an even number of "black bar" units. For instance the right-side "6" is "101000" - 2 even-numbered "black bar" units. The left-side is called "odd-parity" because there is an odd number of "black bar" units. For instance, the left-side "6" is "0101111" - 5 odd-numbered "black bar" units. Having different coded numbers for each side allows the barcode to be scanned in either direction.

The following tables are the left and right side codes matching the corresponding numbers, separated into the seven single units.

LEFT SIDE (ODD PARITY) CODES
1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7 8 9
0001101 0011001 0010011 0111101 0100011 0110001 0101111 0111011 0110111 0001011

RIGHT SIDE (EVEN PARITY) CODES
1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7

0 1 2 3 4 5 6 7 8 9
1110011 1100110 1101100 1000010 1011100 1001110 1010000 1000100 1001000 1110100

Notice, a few things about the codes:

1. As previously mentioned, the left and right numbers are "inverted" or "mirrored".
2. Every barcode number is equal to "four" different marks. A "mark" can be either "black" (bar) or "white" (space). The "marks" vary in width, but there is always four different marks, 2 "bar marks" and 2 "space marks". For instance, the left code number "one" is "3 spaces (mark 1), 2 bars (mark 2), 1 space (mark 3), 1 bar (mark 4)".
3. The left side codes always begins with a "space" or "0" and ends with a "bar" or "1". The right is just the opposite, it begins with a "bar" or "1" and ends with a "space" or "0".


Note: The computer does not read the numbers underneath the barcode. These Human Readable (HR) numbers are printed so a "human" can easily read the barcode, if necessary.

Number System Character: This number is a UPC system number that characterizes specific types of barcodes. In a UPC barcode it is normally on the left of the barcode. The actual "barcode" (the "bars" and "spaces") is the first "barcode" after the first "guard bar". The Number System Character is the blue box on the "Anatomy of a Barcode".

Codes of the Number System Character:

* 0 - Standard UPC number.
* 1 - Reserved.
* 2 - Random weight items like fruits, vegetables, and meats, etc.
* 3 - Pharmaceuticals
* 4 - In-store code for retailers.
* 5 - Coupons
* 6 - Standard UPC number.
* 7 - Standard UPC number.
* 8 - Reserved.
* 9 - Reserved.

3 Guard Bars: There are "3 guard bars". They are located at the beginning, middle and end. The beginning and ending guard bars are encoded as a "bar-space-bar" or 101. The middle guard bar is encoded as "space-bar-space-bar-space" or 01010. The guard bars "tell" the computer-scanner when the manufacturer and product code begin and end. For example, when the computer-scanner reads the first "101" or guard bar, the computer knows the next series of numbers is either the manufacturer or product code. And when the computer reads the "01010" or middle guard bar, the computer knows another number is coming. The 3 guard bars are also the supposedly "666" hidden in the barcode (we'll look at this in detail later). The 3 guard bars are highlighted with a green box on the "Anatomy of a Barcode".

Also, the first guard bar scanned is used by the computer to calculate the "width" of one unit.

Manufacturer Code: This is a five digit number specifically assigned to the manufacturer of the product. The manufacturer codes are maintained and assigned by the Uniform Code Council (UCC). Every product the manufacturer makes, carries the same manufacturer code. For example, the manufacturer code for Kellogg's is 38000. Every product Kellogg makes carries 38000 as the manufacturer code in the bar code. The manufacturer code is yellow on the "Anatomy of a Barcode".

Product Code: The product code is a five digit number that the manufacturer assigns for a particular product. Every different product and every different packaging or size, gets a unique product code. For instance, a 16oz bottle of coke gets a different product code than a 24 oz bottle of coke. For example: Kellogg's 13.5 oz Rice Krispies barcode is 38000 90530 — the 38000 is the manufacturer code for Kellogg and the 90530 is the product code for 13.5oz Rice Krispies. Kellogg's 16oz Mini-Wheats is 38000 02720 — the 38000 is the manufacturer code for Kellogg (the manufacturer never changes for Kellogg products) and the 02720 is the product code for 16oz Mini-Wheats. A manufacturer can have 99,999 unique product codes. The product code is orange on the "Anatomy of a Barcode".

Check digit: Also called the "self-check" digit. The check digit is on the outside right of the bar code. The check digit is an "old-programmer's trick" to validate the other digits (number system character, manufacturer code, and product code) were read correctly. The check digit is red on the "Anatomy of a Barcode".

How the computer calulates the check digit:

1. Add all the odd digits. In our "Anatomy of a Barcode" we would add 0 (yes, you include the number system character digit) + 2 + 4 + 6 + 8 + 0 = 20
2. Multiply the sum of step 1 by 3. Our example would be 20 x 3 = 60.
3. Add all the even numbers. In our "Anatomy of a Barcode" we would add 1 + 3 + 5 + 7 + 9 = 25. You do not include the 5 or the check digit because that's what you are calculating.
4. Now add the result from step 2 and step 3. 60 + 25 = 85.
5. The check digit is the number needed to add to step 4 to equal a multiple of 10. 85 + 5 = 90. 5 is the check digit in our example. Another way to calculate the check digit would be simply to divide the number from step 4 by 10. The remainder is the check digit. Example 85/10 = 8.5

You'll notice the price was NOT included in the barcode.

Where is the price?

The price is kept in the store's centralized computer database. The store's "item database" contains a record for every item the store sells. The item record is "keyed" by manufacturer code and product code (same numbers as on the barcode). The price is kept for each item in this database. When the item is scanned by the employee, a computer program reads the barcode. It then converts the "bars and spaces" into the manufacturer and product "digital number". Using the manufacturer and product "digital number", the program reads the store's "item database". It then retrieves the price from the "item database" for that item. When a price changes, all the store has to do is update it once in the stores centralized database.

Is the number 666 "hidden" in the UPC barcode?

One of the most popular and shocking accusations concerning the number "666" is that the number "666" is quietly "hidden" in every UPC barcode. Mary Stewart Relfe's book, "The New Money System 666", published in 1982, is the "pioneer" of the "666 in the UPC barcode" teaching. Relfe's book contains over 50 pages of excellant doumentation on the UPC barcodes. Relfe's discovery is repeated in many publications touching the mark of the beast, within the last fifteen years. Including tracts published by this author.

Here's a few samples:

Terry Cook, The Mark of the New World Order, 1996:

". . . the entire system [UPC barcode] is very deceptively designed around the infamous numerical configuration, Biblically known as 666, the mark of the Antichrist or devil (Revelation 13:16-18). . ." (Terry Cook, The Mark of the New World Order, 1996, p. 376)

Bob Fraley, The Last Days in America, 1984:

"The interpretation of the Universal Product Code marks is most revealing in that the three numbers '666' are the key working numbers for every designed Universal Product Code. Every group of Universal Product Code marks has in it three unidentified numbers. All three of these numbers are 6, making the use of the numbers '666' the key to using this identifying marking system. . .

There is no deviation. Every Universal Product Code has three unidentified marks whose number equivalent '6' encoding it with the code number '666'. " (Bob Fraley, The Last Days in America, 1984, p. 225, 228)

Here's how to "discover" the "hidden 666 in the UPC barcode".

The "hidden" 666 in the Barcode

Notice the three "guard bars" (colored RED) at the beginning, middle and end. Now, notice the same bar pattern ("bar-space-bar" or "101") for the number 6 (colored BLUE).

By "looking" at the above barcode, the number "666" clearly, appears to be there. . .

But is it?

Is the number 666 TRUTHFULLY "hidden" in the UPC barcode?

Technically, no it is not.

Here's the "technical" truth. . .

The number 6 and the three guard bars are NOT the same. They do "appear" to be identical, but they are different.

GUARD BARS AND THE NUMBER 6
B M 6
1 2 3 1 2 3 4 5 1 2 3 4 5 6 7

101 01010 1010000

Notice. The beginning and ending guard bars are "bar-space-bar" or "101" (the B in the above table). The middle guard bar is "space-bar-space-bar-space" or "01010" (the M in the above table). The number six is "1010000" (the 6 in the above table). Remember, technically a barcode number consists of seven units. The beginning and ending guard bars are only three units, and middle guard bar is only five units.

So, technically, from a computer's perspective the number "666" is NOT in the UPC barcode.

But. . .

Look again. . . All three guard bars contain the pattern "bar-space-bar" or "101". There is only ONE number, in TWENTY numbers (remember right and left numbers have different patterns) that contains the "101" pattern and that number is the right code SIX. Not the number one, or two, or three, etc. — but ONLY the right code SIX. I do seem to remember something about a mark on the RIGHT hand (Rev. 13:16).

Technically, from a computer's perspective the number "666" is NOT in the UPC barcode. . . but from a human's perspective — YES, the "appearance" of 666 is there!

What does the inventor of the UPC barcode say about the number "666" in the UPC barcode?

The inventor of the UPC barcode is George J. Laurer. In 1971, while Mr. Laurer was an employee with IBM, he was assigned the task "to design the best code and symbol suitable for the grocery industry". In 1973, Mr. Laurer's UPC barcode entered the world, and the rest is history.

On Mr. Laurer's web site, he has a "Questions" page, where he answers various questions about the UPC barcode. On the "Questions" page, Mr. Laurer answers the "666" question, as follows:

Question #8 - Rumor has it that the lines (left, middle, and right) that protrude below the U.P.C. code are the numbers 6,6,6... and that this is the international money code. I typed a code with all sixes and this seems to be true. At least they all resemble sixes. What's up with that?

Answer- Yes, they do RESEMBLE the code for a six. An even parity 6 is:

1 module wide black bar 1 module wide white space 1 module wide black bar 4 module wide white space

There is nothing sinister about this nor does it have anything to do with the Bible's "mark of the beast" (The New Testament, The Revelation, Chapter 13, paragraph 18). It is simply a coincidence like the fact that my first, middle, and last name all have 6 letters. There is no connection with an international money code either. (From website)

Even, Mr. Laurer, the inventor of the UPC barcode admits, "Yes, they do RESEMBLE the code for a six."

In fact, as we've documented — SIX is the ONLY number they could RESEMBLE.

You would certainly think because of the "antichrist connections" to "666" they would have picked another number besides '6' to pattern the three 'guard bars' after? Why not 1 or 3, or 5, etc. — any number but '666'. Surely they knew Christians would, sooner or later, "discover" the clear "appearance" of 666 in the UPC bar code.

Maybe they had no choice?

Is the barcode the mark of the beast?

In the 1993 British movie, Naked, directed by Mike Leigh and starring David Thewlis, the following conversation takes place:

"What is the mark? Well the mark Brian, is the barcode. The ubitiqous barcode that you'll find on every bog roll, and every packet of johnny's and every poxie-pot pie. And every [expletive-removed] barcode is divided into two parts by three markers and those three markers are always represented by the number six. Six-six-six. Now what does it say? No one shall be able to buy or sell without that mark. And now what they're planning to do in order to eradicate all credit card fraud and in order to precipitate a totally cashless society. What they're planning to do; what they've already tested on the American troops; they're going to subcutaneously laser tattoo that mark onto your right hand or onto your forehead." (Naked, British movie, 1993, directed by Mike Leigh and starring David Thewlis)

There's no question Mary Stewart Relfe, author of When Your Money Fails, The "666" System" is Here, and The New Money System 666, believes the barcode is the Mark of the Beast.

Mary Stewart Relfe, When Your Money Fails…The "666" System" is Here, 1981

"And he causeth all . . . to receive a mark . . . "
In Greek this word mark is charagma, which literally denotes a stamp, an impress, and is translated mark. Notice that John did not say that he causeth all to receive a number in the right hand or forehead. This astute prophet could have certainly delineated between a series of numbers, and an unexplained stamp or mark. . .

The same Electronic Eye which scans the UPC marks [barcodes] will in the near future scan the marks that will be required to be inserted on the body. . .

While some specifics remain vague, of this we are certain: All commerce will be conducted in the near future with a number, a name, or an identifying mark in the hand or forehead. It is my sincere deduction that the 'mark of the beast' will not be the insertion of numbers per se on the body, but of vertical lines which will represent encoded messages and digits. " (Mary Stewart Relfe, When Your Money Fails The "666" System" is Here, 1981, pp. 56,57,58)

Mary Stewart Relfe, The New Money System 666, 1982

"The Prophet John identified this Cashless System of Commerce 1900 years ago as one in which business would be transacted with a 'Mark' and a Number; the Mark will obviously be a Bar Code; the Number will be '666;' the combination of the two, about which you will read in this book, will be an integral part of the '666 System'. . .

RECEIVING OF ONE'S OWN VOLITION THE MARK (BRAND) IN THE RIGHT HAND OR FOREHEAD; which I believe will be a Bar Code facsimile incorporating a concealed use of '666,' unintelligible to the eye,. . ." Mary Stewart Relfe, The New Money System 666, 1982, pp. xii, 206)

A bizarre coincident? concerning the barcode is the Greek word charagma translated 'mark' in Revelation. Here's how Robert Van Kampen, in The Sign describes this coincident:

"It is interesting to note that the Greek word translated 'mark' is charagma which comes from the Greek word charax, which means 'a palisade, like a picket fence.' When one realizes that this specific word was used back in the first century, and we see today the use of the computer-related bar code, we find the possibilities becoming more than a reality in our day and age." (Robert Van Kampen, The Sign, 1992, p. 231)

Here's the explanation: The Greek "root" word for charagma (translated "mark") is charax. One of the meanings of charax is "a palisade" which is like a "picket fence, or vertical lines". The "idea" is, the reason John used the Greek word charagma, rather than stigma, etc., is because he was describing a 'mark' with vertical lines — a "bar code".

But is all this true?

Well, sort of. . .

Strong's Exhaustive Concordance of the Bible, defines the word charagma as:

5480 charagma, khar'-ag-mah; from the same as 5482 (charax) a scratch or etching, i.e. stamp (as a badge of servitude), or sculptured figure (statue): — graven, mark.

Strong's Exhaustive Concordance of the Bible, defines the "root" word charax as:

5482 charax, khar'-az from charasso (to sharpen to a point; akin to 1125 through the idea of scratching); a stake, i.e. (by impl.) a palisade or rampant (military mound for circumvallation in a siege):—trench.

Noah Webster's 1828 American Dictionary of the English Language (a must have for any serious Bible student!) defines palisade as:

PALISADE, A fence or fortification consisting of a row of stakes or posts sharpened and set firmly in the ground. In fortification, the posts are set two or three inches apart, parallel to the parapet in the covered way, to prevent a surprize.

Does all this "prove" John is describing a "barcode"?

No. Of course not. It's a long and rocky road to travel from "charagma" to a "barcode".

Is the barcode the mark of the beast?

Probably not.

A bar code would make a poor candidate for the mark of the beast for the following reasons:

1. The mark is described specifically in Rev. 14:11 as "the mark of his name". Even the wildest imagination would have a very hard time turning a "barcode" into "the mark of his name".

2. In the world of "high-level" security and identification, a barcode is not reliable enough. The reason for the "self-check" digit on the barcode is the probability of the scanner misreading the barcode. The next time you go through the grocery line count how many "beeps" or misreads the cashier gets.

3. Because the human skin stretches, it would be virtually impossible to get the precision needed for a "reliable" barcode. The skin continually stretches with age, weight, wetness, sun exposure, etc.

4. There is much more reliable and easier to implement technology than barcodes, such as biometric IDs or even biochips.

5. A barcode does not match the Bible's description of the Mark of the Beast. See What is 666: The Mark of the Beast? for more info.

Porter Lee Corporation has invented a barcode system for the identifying and recording evidence for law enforcement officers. The title of the system is interesting — BEAST — Bar coded Evidence Analysis Statistics and Tracking.

A fascinating development took place recently. On March 2, 1999, patent 5,878,155 was issued to Houston inventor Thomas W. Heeter described as a "Method for verifying human identity during electronic sale transactions".

Heeter's patent "abstract" reads:

"A method is presented for facilitating sales transactions by electronic media. A bar code or a design is tattooed on an individual. Before the sales transaction can be consummated, the tattoo is scanned with a scanner. Characteristics about the scanned tattoo are compared to characteristics about other tattoos stored on a computer database in order to verify the identity of the buyer. Once verified, the seller may be authorized to debit the buyer's electronic bank account in order to consummate the transaction. The seller's electronic bank account may be similarly updated."

Heeter's invention is aimed toward the booming world of Internet E-commerce. In the very near future, many products will be purchased E-commerce via the Internet. WorldNet Daily writes, ". . . Internet e-commerce figures spiraling upward, and the European market expected to surpass the U.S. online community in a couple of years, potential sales online have been projected to reach nearly $1 trillion by 2003." (WorldNet Daily, September 30, 1999)

Is the barcode paving the road to 666: the Mark of the Beast?

Yes. The barcode undoubtedly is paving the road for 666: the Mark of the Beast.

The barcode did something very important to help bring in 666: The mark of the Beast. . .

The barcode opened the door (in fact, it not only opened it, it kicked the door down) to the "digital world". Everything is now a number. Everything gets a barcode. As someone truly said, "If it exists, bar code it". I remember when barcodes first started appearing. I began telling people back then, the barcode was preparing the world for 666: the Mark of the Beast. Was I ever laughed at. . . even by the Christians. I can still remember their laughing and ridicule, "You mean to tell me, everything is getting one of those "marks". You mean, I'll go even to the local "7-Eleven" and they'll have laser scanners and they'll scan these "marks". No way. It would be too obvious what was happening. Everybody would know the mark of the beast is coming".

But isn't it amazing 25 years later. . . and nobody gives the "mysterious" barcodes even a "second thought".

Satan very carefully and subtlety (see Genesis 3:1 and 2 Cor. 11:3) indoctrinated us to our wonderful, convenient, new "digital world".

And the road to 666 is just ahead. . .


183 posted on 02/10/2005 5:07:33 PM PST by The Real J Fate
[ Post Reply | Private Reply | To 182 | View Replies]

To: Recovering_Democrat

LOL! That has now become my new favorite conspiracy!


184 posted on 02/10/2005 5:10:33 PM PST by ladyinred
[ Post Reply | Private Reply | To 8 | View Replies]

To: Nitro

THE LAWYER'S SECRET OATH

THIS CASE IS NOT TO BE CITED OR PUBLISHED:

Investigate: Lawyers Guild of Great Britain

and any ties to the American Bar Association.

“BAR” stands for “British Accreditation Research”

[02/21/1999] A federal judge in Texas has moved to out law Quicken Family Lawyer, a legal software program. The reason. It was too helpful. Judge Barefoot Sanders determined that by helping people fill our their legal documents, the program treads illegally on lawyers’ turf. Specifically, it violates law that bar anyone but licensed lawyers from giving legal advise. The case was brought by a lawyers’ group, whose interest is clear enough. Lawyers typically charge anywhere from $100 to $650 an hour. Quicken costs $29.95 for life.

The Legal monopoly: An American Bar Association committee on non-lawyer practice in 1995 noted that enforcement of unauthorized practice laws declined after 1970, but rose again

in the ‘90s. Recent cases suggest the trend continues.

"The Federal Zone: Cracking the Code of Internal Revenue" U.S. v. Lopez

http://www.supremelaw.com



THE LAWYER'S SECRET OATH

Any Judge, Government Agent, or Bureaucrat Who Had Sworn to

Uphold the Constitution for the United States Who is

Violating that Oath is Guilty of Treason.

The Penalty is still DEATH BY HANGING.

You are weighed in the balance and are found wanting.

Daniel 5:27

Woe, unto you lawyers! for ye have taken away the key to

knowledge; ye entered [the Kingdom of God] not in yourselves,

and them that were entering in ye [have] hindered.

Luke 11:52




AN EXPOSE'

ON THE LEGAL FRAUD PERPETRATED ON ALL AMERICANS

Edited, altered and enhanced significantly from audio tape by a private non-resident, non-domestic, non-person, non-individual, pursuant to any real or imaginary statutory regulations.

Let's get right to the point. The courts only recognize two classes of people in the United States today.

DEBTORS AND CREDITORS

The concept and status of DEBTORS AND CREDITORS is very important for you to understand. Every legal action where you are brought before the court: e.g. traffic ticket, property dispute or permits, income tax, credit cards, bank loans or anything else they might dream up to charge you where you find yourself in front of a court - IT IS AN EQUITY COURT, administering commercial law having a debtor/creditor law as the controlling law. Today, we have an equity court but not an equity court as referred to in the Constitution of the U.S. or any of the legal documents before 1938.

All the courts of this once great land have been

changed starting with the Supreme Court decision of 1938 in

Erie R.R. v. Thompkins, 304 U.S 64 (1938)

give you background which led to this decision. Some of this information is from the Ben Freeman tapes of 1989. They are excellent tapes if you have them. Ben used to talk about "legislative democracy." I couldn't find a definition for legislative democracy. It bothered me. However, by listening to his tapes as well as other tapes. I began to see the fraud that is being perpetrated on all of us Americans. Please understand that this fraud is a 24 hour, 7 days a week, year after year continuous fraud. It doesn't happen just once in a while. This fraud is constantly upon you all your life. Whether you are aware of it or not, this fraud is perpetually and incessantly upon you and your family.

U.S. Inc. Goes To Geneva 1930's

In order for you to understand just how this fraud works, you need to know the history of its inception. It goes like this: from 1928 - 1932 there were five years of Geneva conventions. The nations of the world met in Geneva, Switzerland for 5 continuous years in order to set up what would be the policy of all the participating countries. During the year of 1930 the U.S., Great Britain, France, Germany, Italy, Spain, Portugal, etc. all declared bankruptcy. If you try to look up the 1930 minutes, you will not find them because they don't publish this particular volume. If you try to find the 1930 volume which contains the minutes of what happened, you will probably not find it. This volume has been pulled out of circulation or is hidden in the library and is very hard to find. This volume contains the evidence of the bankruptcy.

Going into 1932, they stopped meeting in Geneva. In 1932 Franklin Roosevelt came into power as President of the United States. Roosevelt's job was to put into place and administer the bankruptcy that had been declared two years earlier. The corporate government needed a key Supreme Court decision. The corporate United States government had to have a legal case on the books to set the stage for recognizing, implementing and supporting the bankruptcy. Now, this doesn't mean the bankruptcy wasn't implemented before 1938 with the Erie RR v. Thompkins decision. The bankruptcy started in 1930-1931. The bankruptcy definitely started when Roosevelt came into office. He was sworn in during the month of January, 1933. He started right away in the bankruptcy with what is known as the "The Banking Holiday," and proceeded in pulling in gold coin out of circulation. That was the beginning of the United States Public Policy for bankruptcy.

Roosevelt Stacks Supreme Court

It is a known historical fact that during 1933 and 1937-1938, there was a big fight between Roosevelt and the Supreme Court Justices. Roosevelt tried to stack the Supreme Court with a bunch of his pals. Roosevelt tried to enlarge the number of Justices and he tried to change the slant of the Justices. The corporate United States had to have one Supreme Court case which would support their bankruptcy problem.

Their was resistance to Roosevelt's court stacking efforts. Some of the Justices tried to warn us that Roosevelt was tampering with the law and with the courts. Roosevelt was trying to see to it that prior decisions of the court were overturned. He was trying to bring in a new order, a new procedure for the law of the land.

The "Mother Corporation"

Goes Bankrupt

A bankruptcy case was needed on the books to legitimize the fact that the corporate U.S. had already declared bankruptcy! This bankruptcy was effectuated by compact that the corporate several states had with the corporate government (Corporate Capitol of the several corporate states). This compact tied the corporate several states to corporate Washington, D.C. (the headquarters of the corporation called "The United States"). Since the United States Corporation, having established it headquarters within the District of Columbia, declared itself to be in the state of bankruptcy, it automatically declared bankruptcy for all its subsidiaries who were effectively connected corporate members (who happened to be the corporate state governments of the Union). The corporate state governments didn't have to vote on the bankruptcy. The bankruptcy automatically became effective by reason of Compact/Agreement between each of the corporate state governments and THE MOTHER CORPORATION. (Note: The writer has taken the liberty of using the term "Mother Corporation" to communicate the interconnected power of the corporate Federal government relative to her associated corporate States. It is my understanding that the States created the Federal Government, however, for all practical purposes, the Federal Government has taken control of her "Creators," the States.) She has become a beast out of control for power. She has for her trade names the following: "United States", "U.S.", "U.S.A.", "United States of America", Washington, D.C., District of Columbia, Feds, Federal Government. She has her own U.S. Army, Navy, Air Force, Marines, Parks, Post Office, etc., etc., etc. Because she is claiming to be bankrupt, she freely gives her land, her personnel, and the money she steals from the Americans via the I.R.S. and her state corporations, to the United Nations and the International Bankers as payment for her debt. The UN and the International Bankers use this money and services for various world wide projects to include war. War is an extremely lucrative business for the bankers of the New World Order. Loans for destruction. Loans for re-construction. Loans for controlling people on her world property.

U.S. Inc. Declares Bankruptcy

The corporate U.S., then, is the head corporate member, who met at Geneva, to decide for all its corporate body members. The corporate representatives of corporate several states were not in attendance. If the states had their own power to declare bankruptcy regardless of whether Washington D.C. declared bankruptcy or not, then the several states would have been represented at Geneva. The several states of America were not represented. Consequently, whatever Washington D.C. agree to at Geneva was passed on automatically, via compact to the several corporate states as a group, association, corporation or as a club member, they all agreed and declared bankruptcy as one government corporate group in 1938. The several states only needed a representative in Geneva by way of the U.S. in Washington, D.C. The delegates of the corporate United States attended the meetings and spoke for the several corporate states as well as for the mother corporation located in Washington, D.C., the seat and headquarters of the Federal Corporate Government. And, presto BANKRUPTCY was declared for all.

From 1930 to 1938 the states could not enact any law or decide any case that would go against the Federal Government. The case had to come down from the Federal level so that the states would rely on the Federal decision and use this decision as justification for the bankruptcy process within the states.

Uniform Commercial Code (UCC)

Emerges as the Law of the Land

http://www/law.cornell.edu/ucc//1/overview.html

By 1938 the corporate Federal Government had the true bankruptcy case they had been looking for. Now, the bankruptcy that had been declared back in 1930 could be up-held and administered. That's why the Supreme Court had to be stacked and made corrupt from within. The new players on the Supreme Court fully understood that they had to destroy all other case law that had been established prior to 1938. The Federal Government had to have a case to destroy all precedence, all appearance, and even the statute of law itself. That is, the Statutes at Large had to be perverted. They finally got their case in Erie R.R. v. Thompkins. It was right after that case that the American Law Institute and the National Conference of Commissioners on Uniform State Laws listed right in the front of the Uniform Commercial Code, began creating the Uniform Commercial Code that is on our backs today. Let us quote directly from the preface of the 1990 Official Text of the Uniform Commercial Code 12th edition.

The Code was originally approved by its sponsors and the American Bar Association in 1952, and was revised in 1958 to incorporate a number of changes that had been recommended by the New York Law Revision Commission and other agencies. Subsequent amendments that were deemed desirable in the light of experience under the Code were approved by the Permanent Editorial Board in 1962 and 1966.

The above named groups and associations of private lawyers got together and started working on the Uniform Commercial Code (UCC). It was somewhere between 1930 and 1940, I don't recall, but by the early 40's and during the war, this committee was working to form the UCC and got it ready to put on the market. The UCC is the law merchant's code for the administration of the bankruptcy. The UCC is now the new law of the land as far as the courts are concerned. This Legal Committee of lawyers put everything; Negotiable Instruments, Security, Sales, Contracts/Agreements, and the whole mess under the UCC. That's where the "Uniform" word comes from. It means it was uniform from state to state as well as being uniform with the District of Columbia. It doesn't mean you didn't have the uniform instrument laws on the books before this time. It means the laws were not uniform from state to state. By the middle 1960's, every state had passed the UCC into law. The states had no choice but to adopt the newly formed Uniform Commercial Code as the law of the land. The states fully understood they had to administrate bankruptcy. Washington D.C. adopted the Uniform Commercial Code in 1963, just six weeks or so after Kennedy was killed.

Your Lawyer's Secret Oath?

What was the effect and the significance of the Erie RR. v. Thompkins case decision of 1938? The significance is that since the Erie decision, no cases are allowed to be cited that are prior to 1939. There can be no mixing of the old law with the new law. The lawyers (who were members of the American Bar Association, were and are currently under and controlled by the Lawyer's Guild of Great Britain) created, formed and implemented the new bankruptcy law. The American Bar Association is a franchise of the Lawyer's Guild of Great Britain. Since the Erie RR. v. Thompkins case was decided; the practice of law in this country was never again to be the same.

It has been reported (source unknown to the writer) that every lawyer in existence and every lawyer coming up has to take a SECRET OATH to support the bankruptcy. This seems to make sense after read about Mr. Sweet's CASE FILE DISAPPEARANCE discussed below. There is more to it. Not only do they promise to support the bankruptcy, but the lawyers and judges also promise never to reveal who the true creditor party is in the bankruptcy proceedings. In court, there is never identification and appearance of the true character and principal of the proceedings. This is where you can get them for not making an appearance in court. If there is no appearance of the true party to the action, than there is no way the defendant is able to know the true NATURE AND CAUSE OF THE ACTION. You are never told the true NATURE AND THE CAUSE OF WHY YOU ARE IN FRONT OF THEIR COURT. The court is forbidden to tell you that information. That's why, if you question the true nature and cause, the judge will say, "It's not my job to tell you. You are not retaining me as an attorney and I can't give you legal advice from the bench. I suggest you hire a lawyer."

Hire a Lawyer?

The problem here is, if you hire a lawyer, who is pledged not to reveal the true nature and cause. How will you ever find out the nature and cause? You won't! Why? If the true nature and cause of the action against you is revealed, it will expose the real creditor from whom this action and cause came. In other words, they will have to name the TRUE creditor. The true creditor will have to state the nature and cause. The true creditor will have to say, "It's a bankruptcy proceeding." That declaration then opens the door for you to question, "Who the hell are you? How did you get attached to my back and by what vehicle did I promise to become a debtor to you?" In this country, the courts on every level from the justice of the peace level all the way up - even into the International Law arena (called the World Court), are administrating the bankruptcy and are pledged not to reveal who the true creditors really are and how you personally became pledged as a party or participant to the corporate United States debt.

What would really kill these people off, would be to compel the International Bankers to send a lawyer to the courtroom and present himself as the attorney for the true creditor (the International Bankers). Then have the attorney put into the record the true nature and cause of the proceedings against you on that particular day.

The International Banksters told these various countries that they were now in a state of bankruptcy. The countries had been taken over by the creditor/bankers. And there was no choice, but for all these participating countries to declare bankruptcy. If they didn't agree to declare bankruptcy, the banksters threatened to collapse the economies and thereby put the countries back into the depression like the one from which they were just emerging. The banksters made an offer they couldn't refuse!

To review and elaborate: In 1930 there was a world wide depression. The bankers said, "Look. You can do it either of two ways. The easy way or the hard way. You just accept the bankruptcy and we'll let you out of the depression. If you don't, you're on your own." So all the countries involved agreed, because they realized that the International banksters had them by the throat. The countries therefore agreed that over a period of several years they would pass statutes and legislation for the implantation of the bankruptcy in favor of the International banksters.

Now, i would say that the key banksters were Rothchild and family and their agents by way of Rockefeller, by way of the Federal Reserve Banksters. Who were more specifically involved as key banksters and their agents is pure conjure on my part but it really doesn't matter at this point. The point is, there was an international bankruptcy and an international conspiracy to cover it up. There was a banking creditor who made the offer the countries accepted the offer in order to enable the representative countries to continue without revolution and to allow the politicians to remain comfortably in place. Under a delusion of solvency the countries were allowed to continue to operate as though they were solvent while in fact the representative countries were bankrupt.

The Snare

The bankruptcy scheme was/is an extremely clever and diabolical plan. How did they possibly pull this scheme off in the area of real estate, the same way they did it in the area of Federal Income Taxes. These Foreign banksters simply and deceptively devised ways and means to con you into declaring yourself a "CITIZEN" or a "RESIDENT" of the corporate U.S. Remember the corporate United States is Bankrupt per agreement and public policy. After you have been tricked into claiming you are one of their corporate United States Citizens, you are given a Social Security Number which ties you to certain meager "benefits" and "privileges." Then, the banksters con your employer to function as an unpaid tax collector to con you into filling out their W-4 intangible property gift forms and 1040 voluntary agreements. These slick paper agreement establishes your "voluntary" indebtedness to the bankster creditor.

If at any time you decide to balk at this scheme, because you don't like it, the real creditor never has to make an appearance in court to list the true nature and cause of action which is being brought against you. You end up dealing with an agency. The agency can conveniently grant itself immunity from prosecution because all it is doing (without your knowledge, of course) is administrating the bankruptcy which the government agreed per the Geneva meetings. The court system never lets you put the original creditor on the courtroom stand, so you can ask him how he got attached to your back. The system is set up in such a way that the TRUE CREDITOR IS PROTECTED and never has to make an appearance and never has to answer any of your questions or produce documents. Therefore, the true creditor never has to produce the law that gives him the right to pledge you (your body and labor) in indebtedness (bondage/servitude). Why? Because the Geneva agreement in 1930 was done by treaty. The bankruptcy was not done by legislation. The agreement came first; signed in secrecy. THEN Congress began to pass legislation to fulfill the bankruptcy obligation required by the treaty. Legislation being passed by Congress was henceforth and is thereby bankruptcy legislation. When cases came before the courts, the courts could make decisions based on new controlling law of bankruptcy. It had nothing to do with Constitutional rights. Now, any case brought in is under the new bankruptcy law and is not considered as a true constitutional case. It is now a bankruptcy case as distinct from, but cleverly disguised as a constitutional case.

The Fraud

The members of the Supreme Court, of course, realized what was happening to them and the system of law. The court was being asked to perform in a creditor, debtor bankrupt proceeding for the benefit of the bankster creditors. The members of the Supreme Court said, "NO. We will not give you a bankrupt proceeding decision that you can then enforce against everybody, a decision not only affecting corporate Washington D.C. but also having effect within the corporate state governments. This, by the way is fraud. It wouldn't be fraud if the government of corporate Washington D.C. and the government of the several corporate states declared bankruptcy then let the people know about the bankruptcy. (Notice when I say corporate "government" I don't mean you and me. You and I are not the corporate government. The corporate government is the corporate capital of the corporate state. The government is a neutral government zone known as the capitai ci, the corporate state. The government is where the corporate state is. It is corporate headquarters. Just like corporate Washington D.C. is the seat of the corporate Federal Government. The capitai ci, the corporate state is the seat of the corporate state government. if the corporate Federal Government and her subsidiary corporate state government want to join forces and declare bankruptcy that's not fraud. This is their corporate business.

However, it is fraud when those two corporate entities declare bankruptcy but do not disclose to you, me, and every other American, that they have so declared bankruptcy. Further they have not and do not disclose that their intention is to get you and every other American in this country to pledge to pay off their corporate debt to their corporate creditors. The corporate bankruptcy is the corporate state and federal responsibility, not the responsibility of Americans, the people.

U.S. Inc. is Distinct and Separate

From PRIVATE AMERICANS

"We the People" who created and signed the contract/compact/agreement of, by, and for the Constitutional Corporation (U.S.); using the trade name of the "United States of America", is a corporate entity (legal fiction) which is DISTINCT AND SEPARATE from Americans or the unenfranchised people of America. The private natural American people did not create the corporation of the United States. The United States Inc. did not create the private natural American people. America and Americans were in existence prior to the creation of the United States Corporation. The United States Corporation has located its U.S. headquarters in Washington, D.C. Virginia state (state territory) gave land to the newly formed United States Corporation. Notice, here, we have a state giving something of value (land) to the United States. The United States Corporation agreed in the Constitutional contract, to protect the states. Instead, because of their bankruptcy (Corporate U.S. Bankruptcy) this particular U.S. corporation has enslaved the states and the people by deception and at the will of their foreign banksters with whom they have been doing business. Our fore fathers gave their lives and property to prevent enslavement. Today, we are again enslaved.

Private natural American people have been tricked, deceived, and setup to carry the U.S. Inc. perpetual corporate debt under bankruptcy laws. Every time Americans appear in court, the corporate U.S. bankruptcy is being administrated against them without their knowledge and lawful consent. That is FRAUD. All corporate bankruptcy administration is done by "Public Policy" of by and for the Mother Corporation (U.S. Inc.).

The Mother Corporation's

"Public Policy"

The corporate bankruptcy is carried out under the corporate public policy of the corporate Federal Government in corporate Washington, D.C. The states use state public policy to carry out Federal public policy of Washington D.C. Public Policy and only public policy is being administered against you in the corporate courts today. The public policy that is dictated by all the courts from the smallest to the most powerful courts in the world, is public policy. This is why I said, in another tape that the Russian people would be enslaved into indebtedness. What will happen is that it will become public policy in Russia to have the people go into joint corporate debt. The Russians will be forced to promise to pay these debts. They will be forced to pay off on those corporate debts. Corporate Public Policy is the crux of the whole bankruptcy implementation. Corporate Public Policy is forever a Corporate Public Policy and the laws that have been passed since 1938 are all corporate public policy laws dealing only with corporate public policy. Understand that U.S. corporate public policy is not an American public policy. The public policy OF (belonging to) the United States corporation. This U.S. corporate bankruptcy public policy is not OF (belonging to) America, the Republic.

The Erie RR. v. Thompkins 1938 case was a decision based upon public policy. All decisions at any level since 1938 have been public policy decisions. All statutes, rules, regulations, and procedures that have been passed, whether civil or criminal, whether it is Federal or State, have all been passed to implement the public policy of bankruptcy. Since 1933, when F.D.R. came in office, he brought in public policy. He established that it was the public policy of the government to call in all the gold. It was the public policy of the Government in Washington, D.C. (the Federal Government) to give our government assistance. Public policy operates the same within the states. All Federal court decisions can only be handed down if the states support Federal public policy. The state legal system must be compatible with the Federal legal system.

The Monkey - Wrench

This is why, when people like us go to court without being represented by a lawyer, we throw a monkey-wrench into the corporate administrative proceedings. Why? Because all public policy corporate lawyers are pledged to up-hold public policy, which is the corporate U.S. administration of their corporate bankruptcy. That's why you'll find stamped on many if not all our briefs,

"THIS CASE IS NOT TO BE CITED IN ANY OTHER

CASE AND IS NOT TO BE REPORTED IN ANY COURTS."

The reason for this notation is that when we go in to defend ourselves or file a claim we're not supporting the corporate bankruptcy administration and procedure. The arguments we put forth predate 1938. We come in with Constitutional law, etc. All these early cases support our rights not to be in bankruptcy. However, the corporate court, lawyers, and judges have promised to give no judicial recognition of any case before 1938.

The International Banksters'

Corporate Plantation

U.S.A. Style

Before 1938, the law was not a public policy law. All these old cases were not public law deciding cases. Today, the cases are all decided under corporate public policy. The public policy exists in order to administer the bankruptcy for the benefit of the bankster creditors and to protect the bankster creditor. Corporate public policy can allow the creditor to say to the corporate legislatures, "I want a law passed requiring my debtors to wear seat belts. Why? Because I want to be able to milk my debtors for the longest period possible." it doesn't behoove the creditor to allow all of his labor producing debtors to die at an average age of 30 years. What would happen to the banksters' lending, interest, penalties, increase, repayment etc. on the entire funding and lending process if the average American life span was only 30 years? Why, the bankers would have to have 2 1/2 times the current consumer population to equal their current take. The banksters would need (instead of 250 million Americans) 600 million or even more. Maybe the banksters would need 2 Billion Americans because the individual can't contract for debt until he/she is 18 or 21 years of age. Therefore, if the average life span is only a 30 year period, the creditor could collect on the debt for only 12 years.

Now, if the banksters can just get people to live an average of 70 years you are talking a whopping 50 years of indebtedness for which they contract and for which they are forced to pay back with usury/interest. With this situation, the bankster creditor can now float loans worth 50 years of potential indebtedness and its payoff with interest in the name of the people, as opposed to 9 to 12 years. The creditors and their property and their people are well taken care of. The creditor doesn't want the population to decrease per say, unless, it is convenient for the debtor to run up debts in anther’s name and then liquidate that debtor or that group of debtor people.

For example let's consider the AIDS problem today among the black people. What better group to inject AIDS into than the black people? Read the Stracker Memorandum on AIDS and the World Health Organization connection. This documents their tainted vaccination program in Africa and elsewhere. Why not kill them off? Don't you understand that the blacks as a whole have absorbed all the debt that they can? The blacks have reached the max of the debt that they can carry. In fact, they have gone over their limit to pay back. They are now heavily into welfare, public housing, medicaid, medicare, food stamps, etc. Now, the situation is that instead of paying off the creditor, they have become a drain on the creditor. The creditor must now pay them to live and take care of them. What creditor in his right mind wants to spend money on a bunch of people from whom he can't collect any revenue?

The corporate public policy of the corporate United States and the states and the county and of the cities are that YOU must take care of these people. You must provide them with welfare, etc. Why? Because when you, as a member of the corporate body politic allow laws to be passed which says the minorities must be taken care of; then the corporate legislature can say the public policy is that the people want these people taken care of. Therefore, when given the chance, the legislature can say the public policy is that the people want these blacks and poor whites to be taken care of and given a chance, therefore, we must raise taxes to fund all these benefits, privileges and opportunities. This is what these people need to make them socially, politically, and economically equal with every one else. The legislatures have passed all kinds of statutes providing for hugh indebtedness and they float the indebtedness off your backs because you have never gone in to challenge them; telling them that it is not your public policy to assume the debts of other people.

On the contrary, all the court decisions coming out, indicate it is the corporate public policy and it is your willingness to support the corporate public policy to pay off these debts. Remember, "public" means of and for the corporate Government. It does not mean of and for private people. "Public" means corporate government. It is corporate government policy. When they talk about public debt, they are talking about corporate government debt and your presumed pledge against this corporate created debt.

The Real Estate Snare

How do they work this scheme in the area of real estate? These bankster creeps have made an agreement that it is corporate public policy, that all land (property) be pledged to the creditor to satisfy the debt of the bankruptcy, which the creditor claims under bankruptcy. They get away with this the sam way they get away with any other case that is brought before the court, whether it is a traffic ticket, IRS, or whatever. Here is how it works. You have signed instruments giving information and jurisdiction to the banksters through their agents. The instruments (forms) you signed include, but are not limited to the following: social security registration, use of the social security number, IRS forms, driver license, traffic citation, jury duty, voter registration, using their address, zip code, U.S. postal service, a deed, a mortgage application, etc. etc. The banksters then use that instrument (document) under the Uniform Commercial Code (UCC) as a contract/agreement. These documents are considered promissory contract where you promise to perform. This scheme involves you, without you ever becoming directly in contact or in contract with the true creditor. What's more, you are never informed as to whom the true creditor is and it is never divulged to you the true nature and the true cause of the paperwork that you are filling out.

If you will examine your real estate deed, you will find that you promised to pay taxes to the corporate government. On property you originally acquired through a mortgage, you will notice that the bank never promised to pay taxes. You did. The corporate government at all levels never promised to pay taxes to the creditor. You did. In tax and collection problems relating to real estate being enforced against you, you will notice that there is no mention in the mortgage or the deed stating the true nature and cause of the action.

Since you made the promise to perform, you get a bill every year for property taxes. You don't realize that the only way they can bill you for taxes is through your own stupidity of AGREEING to pay the tax. You volunteered. They took advantage of you, conning you to promise to pay property taxes. When they send you their bill, they are coming against you for the collection of the promise you made to the creditor. Now the creditor on the paperwork appears that it is the local bank. The bank has loaned you credit. The bank hasn't loaned you anything. It was not their credit to loan. This is why the bank can't loan credit. There is a credit involved, but not the banks credit. It is the credit of the International banksters. The international banksters are making you the loan based upon their operation of bankruptcy claim which they presume to have against you personally as well as your property.

Now, let's say you are not aware of your remedies provided for you within the Uniform Commercial Code (UCC). The UCC provides or allows you to dishonor the county's presentment of the tax bill. You don't pay your tax bill. You therefore just sit on it and don't do or say anything. A couple of years go by and all of a sudden you are being sent letters to pay up what is owed or else in a certain period of time your property will be taken from you and put up for a tax sale. Now here is what is interesting - If you don't pay your tax bill, and they contact you asking you to pay it and you don't pay it, they will declare you in default. It is based on that default as provided in the UCC that they sell your property for the tax (rent).

However, the county never goes into court to put into the record the identification of the real creditor. And the county does not state the true nature and cause of the action against you (bankruptcy action disguised as a tax action). Why? Because, under bankruptcy implementation, they have developed a legal procedure which is based upon YOUR PROMISE TO PAY. The procedure provides that they don't have to come to the court to get a court order authorizing the sale of your property. Therefore, the real creditor never makes an appearance in court. The reality is, you are denied any possibility of appearing in court to exercise your right to challenge the creditor. To ask if he became the creditor under "public policy." To ask if it is under "public policy," just what is "public policy"? And how did you (as an international banker) become "creditor" to me and everyone else in this country (American people). They don't want you to ask the real creditor (the International Banksters), to PRODUCE THE DOCUMENTS upon which your personal debt is established. If they were forced to go into court, they would have to produce the deed or mortgage showing you KNOWINGLY, WILLINGLY, and VOLUNTARILY promised to pay the corporate public debt. You did not KNOWINGLY, WILLINGLY, and VOLUNTARILY promise to pay any U.S. Corporate Bankruptcy obligation made in the 1930's. This would, of course, expose their racket. The fact is, that, there was absolutely no debt connected to you until you agreed to it through their deception and fraud. The deception in a broader sense, permeates the education system and the new media, etc., to sell you on the idea that you are a statutory "U.S. Citizen" and "resident of the United States."(INCORPORATED).

YOUR SIGNATURE IS

YOUR MOST VALUABLE PROPERTY

Your "property" is pledged for the rest of your life upon your signature and your promise to perform is pledged into perpetual debt. The banksters don't even bother to go to court. They leave it up to the agencies to administer the agency corporate public policy. It is the public policy of that agency to bill you on your promise to perform. If you don't pay, they follow up on the public policy on notice of default and give you one more chance to pay. Then they proceed to sell the property at a tax auction. They never go to court or appear in court to back up their claim against you. Did any of your government licensed and controlled teachers ever stress THAT YOUR SIGNATURE IS YOUR MOST VALUABLE PERSONAL PROPERTY? Did your government teachers ever tell you, that any time you sign any document, you should sign it "without prejudice", or with "All Rights Reserved" above your signature. This means you are reserving you God given unalienable rights (rights which cannot be transferred) and all other rights for which your fore fathers died. The Corporate U.S. Government provides, or at least pretends to provide, for this reservation of rights under the Uniform Commercial Code (UCC) at 1-207 and 1-103. You need more information in this area. It is not in the best interest of the United States Corporate "Public" schools to teach you about their bankruptcy proceedings and how they have set the snare to COMPEL YOU INTO PAYING THEIR DEBT. The Corporate "Public" schools are strictly designed for their Corporate citizens/subjects. That is, the Corporate U.S. Public School citizens. Notice all the emphasis on being a "good" citizen.

Basically all their teachers and their students are trained to produce labor and material in exchange for valueless green paper called "money." It is not money, it functions "AS" money. Lawful money must be backed by something of value. Banksters take your labor, services, and material (homes, cars, farms, etc.) in exchange for their valueless corporate paper. This paper is backed only by the "full faith and confidence of the United States Government" (THE MOTHER CORPORATION). I do not have faith of confidence in the U.S. BANKRUPT CORPORATE GOVERNMENT ADMINISTRATORS WHO HAVE PERVERTED THEIR CONSTITUTIONAL CHARTER, enslaving the sovereign American people into THEIR bankruptcy obligations. Their fraudulent money laundering process promotes your payment on the corporate government's bankruptcy debt. This debt is mathematically impossible to pay off. You and your family are in continual financial bondage to the international banksters. They love it so! Black's Law Dictionary 1990, defines "Money Changers" as: - business of a banker....today handled by the international departments of banks." Let me think for a moment, what did Christ do to the "Money Changers"? Oh, Yes, he severely interfered with their activity. Three days later Christ was crucified. Lincoln was killed for interfering with the money chargers. Kennedy was slaughtered for interfering with the money changes.

The Brother's Case

In my brother's case he was never in default as he never made the promise in the common law deed to pay taxes, therefore, the man who bought the property is moving against my brother through an attorney who is claiming that my brother never redeemed the property. His attorney had followed procedure by publishing the property tax notice in the newspaper for three printings. Now they show up in court to get the court to declare default. After a default judgment, the attorney's client then has right to the property.

Now, my brother comes in and challenges this action. The problem is, the man who bought the property, is trying to claim the property when in fact he is not the original creditor. He is not the person who said my brother was in default or that he owed a tax in the first place. Now when my brother comes in and challenges the new buyer, the court rules that the new buyer is not required to produce any documents in support of his cause. The only documents they are required to produce are the documents related to procedure of foreclosure. Do you understand? There is no court case where the true creditor has to make an appearance. You cannot question or challenge the true creditor.

When you do go to court, the person you are allowed to question is the person who bought the property. THe buyer is not required to produce documents because the only one who would be required to do so, is the true creditor. Now you are in the position of fighting yourself in court. This is a very clever way for the creditor to avoid the courts in order to settle the dispute for his claim against you. This is also very clever way to avoid naming the true claimant; true plaintiff. The true plaintiff is the international bankster. The international banksters claim they have a claim against my brother's property because my brother's property has been pledged by the state as collateral for the corporate debts under the bankruptcy to the international banksters.

Once my brother removed his property from their jurisdiction and venue by claiming back all his rights, titles and interest, the only way that they would be able to stand a chance, would be for the original claimants (international banksters) to make an appearance through their attorney. Then, for my brother to require their attorney to place in the record, a statement, identifying the true nature and cause for their actions. The courts and the attorneys have cleverly avoided this process.

Remember, when you are dealing in bankruptcy, slight of hand, lies, and deception you have to protest to the head man in all of this action, just like the Watergate tapes. Everybody tried to protect Nixon, the head dog. It is the same in this bankruptcy scam, they all have to protect the International Banksters. The proof that this is true is that (1) My brother is now in front of the court of appeals, the attorney for the people who bought the property, has already said, the buyers should not be required to present the authority establishing the State of Maryland's authority to tax property and to collect these taxes; This statement is the tip-off for how they are attempting to protect the International Banksters. Since the International Banksters never had to appear in court, they never were required to show where they got the right to pledge everybody's property into the United States corporate debt. The buyer's attorney says his client should not have to produce and this court should not demand, that he has to produce. Guess what. The court will agree with the buyer's attorney. They don't have to do it. They have to protect everybody's butt.

The attorney never cited one case before 1953. The attorney put a lot of cases in his paperwork but nothing is cited before 1938. Most of the cites are since 1963, when the State of Maryland passed the UCC. All of the cites were in the 70's and 80's. A few cites were in the late 60's and one in the 50's. This lawyer knew what was going on. That's why, no matter what happens, someone in the court will stamp on the paperwork that this case can not be cited in other cases. This case is not to be reported in the legal reports.

The Cover-up

There was a deal struck that, if any person who doesn't have a lawyer to bring a case before the courts, and this person proves the fraud, and speaks the truth about the fraud, the courts are compelled to not allow the case to be cited or published anywhere. The courts cannot afford to have the case freely available in the public archives. This would be evidence of the fraud. This is why you can't hire an attorney. An Attorney is compelled to uphold the fraud.

"Trust Me."

"I'm here to help you."

"I have the governments permission to practice law."

"I'm a Member of the Bar."

The attorney is there for one reason. That reason is to make sure the bankruptcy scam (established by the corporate public policy of the corporate Federal Government) is upheld. The lawyer's will cite no cases for you that will go against the bankruptcy in cooperate public policy. Whatever the lawyers do for you is a bunch of BULL ROAR. The lawyers have to support the bankruptcy and public policy by supporting it, even at your expense. The lawyers can't go against the corporate Federal Government statutes implementing, protecting and administrating the bankruptcy.

For all cases cited, those in the U.S. Code or the state annotated code or any other source, you may be sure that they only selected those cases that support the public policy of bankruptcy. The legal system has to work that way. After the last 30-4-50 years of cases after cases having been decided based upon upholding the bankruptcy, how could the legal system possibly allow someone to come into court and put in the record substantial information and argument to prove the fraud?

Blood in the Streets?

Can you imagine how damaging it be, if they allowed your case to be cited in another case, or if the they allowed the public to examine a copy of your brief, that discloses evidence of the fraud? This exposure would render null and void everything for which they have worked so hard. Wouldn't this exposure make the people mad? Wouldn't this exposure mean there would be blood running in the streets? Especially in the cities where the poor people have been really taken by this diabolical system. What they are concerned about is that the case never be cited. That goes against the bankruptcy for fear of exposing the bankruptcy and the people will then pick up their guns and shoot the SOB's.

Mr. Sweet's Case Disappeared!

There is a man, let's say his name is Sweet. He has been investigating the corporate government activities for over 12 years on a full time basis. Now, let's look at Sweet's recent case. He won his case. He went into court and defended his common law lien on his property so as to be compatible with statutory law. The judge said, "However, since you presented me with a lien on your property, I will stipulate that the county is the owner of your property with the provision that all liens be satisfied." Sweet was very happy about the judgment. Sweet doesn't care if the county is the owner of the property because the county can't take the property for the next 90 years. The county can't take the property away from him because of his common law lien on the property. Sweet is free to use it, rent it, whatever. If the county really wants the property, they have to satisfy the lien first. However, there is a problem regarding setting a precedent. Sweet went back a couple of weeks later and asked them to punch up his case number. Guess what? The case number had disappeared! The reason the case number had disappeared is that after the judge ruled the county owned the property, subject to the lien, it became a case that goes against the corporate county bankruptcy public policy.

Since Sweet placed a lien on his own property, he is the one who has to be paid off first - not the county! The county is now required to satisfy the lien before the county is allowed to take possession of the property. The property is probably not worth the price of the lien. This would not satisfy the true creditors, the International Banksters. If the county pays Sweet off first, the city has to on their records a $75,000.00 deficit. The true creditors wouldn't like that deficit. They certainly wouldn't like the fact that Sweet's clever maneuver had out foxed the foxes.

What if one hundred, two hundred, a thousand, or ten thousand, people in this state/republic would just put a common law lien on their property and then stopped paying taxes; then cited Sweet's case. It would set a precedent. Let the county have the property as long as the judge makes the judgment subject to existing liens. In this situation, the county would end up holding all this property but could have no use of it. No rent. No taxes. All deficient. The bankster creditors certainly don't want this scenario. The banksters don't want any cases administered except through the application of bankruptcy procedure. The banksters want your rights, privileges, and due process strictly administered by and through the corporate courts under their corporate public policy, international bankruptcy procedure. The International Banksters and their UNREGISTERED FOREIGN AGENTS don't want any evidence on the record, showing how you can get out from under them. Any revenue collecting individual or agency such as the courts, judges, lawyers, law enforcement officers, and tax collectors who are attempting to take money from you as a private American must be registered as a foreign agent. If they are not duly registered and properly identified, they are involved in EXTORATION AND TREASON against private Americans.

How Sweet It is!

As part of Sweet's maneuver, he filled out a financing statement using the UCC-1 form, whereby he put his wife and himself as debtors and creditors. Now, the legal situation is switched. The UCC-1 Financing record Sweet filed with the state, shows Sweet and his wife, as being parties of interest recorded with the state rather than the presumption that the international banksters are the parties of interest.

There is an office within each corporate state (Secretary of State) that handles the UCC-1 forms for personal property and the county recorders office who records the UCC-1 against real property. Since Sweet is listed on corporate state records as the debtor and the creditor on his own property, his property can't be put up in any way for collateral against any debts claimed by the banksters. The reason is that the International Banksters and their flunky agents, now, cannot prove that Sweet's property is debt property of the bank or the corporate county. The property is encumbered by Sweet's lien. Thereby, the property cannot be put up against any debt claims, until it is not encumbered by Sweet's lien. Sweet's property is not free and clear of all liens. The result is that for all practical purposes, the property is now Sweet's, being unencumbered by any further demand for payment of taxes. Sweet has not paid property taxes for many years. Sweet is now his own creditor. And Sweet is his own debtor. Therefore, the International Banksters along with the county corporate thieves are knocked out for the stealing process. How sweet it is! Congratulations to Mr. Sweet!

You may want to do it the way Sweet did. If you own property, you will need to get your deed and a common law lien, then fill out a UCC-1 Form. Then file it with the Secretary of State for personal property and the county recorder for real property. This seems to be the only way for you to get out from under being a debtor of these bastardly Corporate Foreign International Banksters. The judges have to know what's going on. The only way this scheme can work is to have all the lawyers and judges pledge to uphold the corporate bankruptcy public policy. The banksters just can't allow lawyers in a legal system who refuse to uphold the bankruptcy policy. These renegade lawyers would have to be quickly weeded out. They certainly have a neat little system going here in America. The Land of the Fee and the Home of the Slave.

Attention: Law Student

I hope you're listening to this tape, Law Student. You said you wanted to be a lawyer. Well, I hope you're listening closely, because here is the legal system you're headed to serve, and serve you will. You said you wanted to be a lawyer so you can find out what oath they're taking, in secret, behind closed doors in solemn preparation for the "business of the court" as judges and lawyers. Now, you know the oath. The oath is simply to uphold the bankruptcy. If you want to be a lawyer and want to make a living as a lawyer, I can tell you this, they will weed you out at the very beginning if you don't bring in your paperwork under the bankruptcy procedures. If you try to defend your clients and try to help your clients they will get rid of you. The will pull your license. So you spent all that money and time going to school under the guise of helping people and you're wasting your time. Without that license you can't go into a courtroom. I would think about this.

Traffic Citation

Regarding the UCC-1 Form, you can also file it against your car. Wouldn't that be a kick in the tail if you went into court for a traffic citation where you had signed "without prejudice UCC 1-207". And you had refused [abatement] the traffic citation using the UCC in your procedure by having signed "without prejudice" and having gone home and sent in your refusal for cause without dishonor of the presentment of the traffic citation. Now let's say you are in front of the judge. The judge says, "What's this refusal for cause stuff all about?" The judge won't want any mention that the citation was issued under bankruptcy. He is afraid you'll mention the bankruptcy issue. The reason you refused for cause without dishonor the traffic citation, is that it was issued to you under bankruptcy corporate public policy. He won't get in to that. When you get before the judge, you just state you have removed yourself from the bankruptcy. Tell him that your auto is no longer pledged for collateral against the debt. He'll say, "Oh yeah. What are you talking about?" That's when you hand him the UCC-1 Form that you had filed with the state. This UCC-1 Form will show that you are the debtor and the creditor on your auto. Now what happened? The corporate county/state can/t collect on the traffic citation debt instrument. Why? Because, now that you're the creditor on the ticket, if they collect a $100.00 fine, they have to pay you the amount of the fine. How sweet it is! You're the creditor aren't you? People have done this. Of course, there is no record, no paper trail, in such cases. It is not cited. The corporate Bankster's agents, clerks, lawyers, judges, etc. take the information out of the records as soon as you beat them at their own game.

The Lawyer's Guild Connection

The American Bar Association is a franchise of the Lawyer's Guild of Great Britain. The American Bar Association is not concerned primarily with what happens in any case on the local level. However, when a case leaves the local level, by that, I mean the state court, city court or the justice of the peace, or even the federal court, and goes to the appeals court, it would appear that the American Bar Association takes notice of the case. It would seem that the American Bar Association must have an agreement that any action brought on an appeal, must be reviewed by the American Bar Association. If this is true, it would make sense. How else would the American Bar Association, a branch of the Lawyer's Guild of Great Britain, which is the legal arm of the Rothchild's Dynasty, be able to monitor and administrate the corporate Bankruptcy. It would appear that the American Bar Association would be compelled to review all appeal cases and to make certain any case brought under the common law or the constitutional law that would expose the bankruptcy, would be immediately stamped on the back that "this case is not to be cited or published." I believe that this is the stamp origin and purpose of the stamp message in such cases. The justice department maybe able to do that in Washington, D.C. I can't see where any judge or lawyer could have the authority to stamp or lable the case as one not to be cited for future cases. I think that is an official stamp from the American Bar Association.

The Bankruptcy Accounting System

Now, Joe Law Student, if your still attending classes and have a good professor, ask him about just where the stamp comes from that you've seen on many cases. Just who put it on the paperwork and just who authorized the citation restriction. Just who is tampering with the law? There is one thing certain, the creditor and or his agents are watching these cases very carefully. The creditor and his agents must balance their books. When you think of the IRS, be aware that the IRS is an agent of the creditor, the corporate International Banksters. This is just one of the Bankster's state side agencies. The General Accounting Office (GAO) is charged with the responsibilities to keep track of the debt. All the states have to send reports to Washington, D.C. Washington D.C., itself, has to send reports to the GAO. Take a look at your state Comptroller's Annual Report to the Governor of your state. I found it in the library located in the city of the corporate state capital. Look under "Trust Fund" for each state sub-corporation like the state courts, HRS, Banks, Education, etc. you will be amazed at the amount of money being pumped into the Trust Fund from the various Corporate State Department Revenues (all revenue is referred to as taxes, fines, fees, licenses, etc.). There are millions and billions of your hard earned worthless Federal Reserve Notes, "dollars", being held in "trust." This money is being siphoned off into the coffers of the International Banksters while the corporate government officials are hounding you for more taxes.

All this accounting system is not so the people will know what is going on. The accounting reports are for rthe Bankster creditors to keep tabs on just where their collections are coming from. The Banksters want to know if the bankruptcy debt payments are coming in and just how much and from what sources. This accounting if the purpose behind M1, M2, M3, M4, and M5. All this accounting is closely monitored. Maybe every day, but at least once a week. These M's are the reports of the amounts of money in circulation. The amount of debt out there, and the amount of credit out there. The floating of debt in the form of bonds. There are five different categories. This system had to come into existence in order for the creditors to be on top of the bankruptcy at all times. This system allows the creditors to figure out and how exactly just what is going on in their domain.

It all makes sense. Don't the banksters hir bill collectors? Creditors hire bill collectors to snoop around to see why you're not paying. They want to know how much you are going to pay so they can figure out how much will be coming in. How much will they collect? They want to know who will pay and who won't. The whole system is nothing but credit and debt.

The World Credit Union

Here is what is going to very quickly happen internationally. All of the governments around the world are going to unite. They will create one big giant credit union for collecting the debt for the International Banksters. We have allowed ourselves to get into this very sad situation, but that is the way it is.

And put on NOTICE of the bankruptcy............

Attn: "Public Servant"

On the night of December 23, 1913, the U.S. Congress committed perhaps the greatest act of treason in history. It surrendered the nation's sovereignty and sold the American people into slavery to a cabal of arch-charlatan bankers who proceeded to plunder, bankrupt, and conquer the nation with a money swindle.

The "money" the banks issue is merely bookkeeping entries. It cost them nothing and is not backed by their wealth, efforts, property, or risk. It is not redeemable except in more debt paper. The Federal Reserve Act forced us to pay compound interest on thin air. We now use worthless "notes" backed by our own credit that we cannot own and are made subject to compelled performance for the "privilege."

From 1913 until 1933 the U.S. paid the "interest" with more and more gold. The structured inevitability soon transpired; the Treasury was empty, the debt was greater than ever, and the U.S. declared bankruptcy. In exchange for using notes belonging to bankers who create them out of nothing on our own credit, we are forced to repay in substance (labor, property, land, businesses, resources - life) in ever-increasing amounts. This may be the greatest heist and fraud of all time.

When a government goes bankrupt, it looses its sovereignty. In 1933 the U.S. declared bankruptcy, as expressed in Roosevelt's Executive Orders 6073, 6102, 6111, and 6260, House Joint Resolution 192 of June 5, 1933 confirmed in Perry v. U.S. (1935) 294 U.S. 330-381, 79 LEd 912, as well as 31 United States Code (USC) 5112, 5119 and 12 USC 95a.

The bankrupt U.S. went into receivership, reorganized in favor of its creditors and new owners. 1913 turned over America lock, stock, and barrel to a handful of criminals whose avowed intent from the beginning was to plunder, bankrupt, conquer, and enslave the people of the United States of America and eliminate the nation from the face of the earth. The goal was, and is, to absorb America into a one-world private commercial government, a "New World Order."

With the Erie RR v. Thompkins case of 1938 the Supreme Court confirmed their success; we are now in an international private commercial jurisdiction in colorable admiralty-maritime under the Law Merchant. We have been conned and betrayed out of our sovereignty, rights, property, freedom, common law, Article III courts, and Republic. The Bill of Rights has been statutized into "civil rights" in commerce.

America has been stolen. We have been made slaves: permanent debtors, bankrupt, in legal incapacity, rendered "commercial persons," "residents," and corporate franchisees known as "citizens of the United States" under the so-called "14th Amendment." Said "Amendment" (which was never ratified - see Congressional Record, June 13, 1967; Dyett v. Turner, (1968) 439 P2d 266, 267; State v. Phillips, (1975) affirmed a citizenship ???????????.


185 posted on 02/10/2005 5:22:58 PM PST by The Real J Fate
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nitro

The Original Thirteenth Article of Amendment To
The Constitution For The United States

The Original 13th Amendment
This Article of Amendment, ratified in 1819 and which just "disappeared" in 1876, added an enforceable strict penalty, i.e., inability to hold office and loss of citizenship, for violations of the already existing constitutional prohibition in Article 1, Section 9, Clause 8 on titles of nobility and other conflicts of citizenship interest, such as accepting emoluments of any kind for services or favors rendered or to be rendered, and is particularly applicable today in the 21st Century as government is increasingly FOR SALE to the highest bidder, as foreign and multinational corporations and individuals compete to line the pockets of politicians and political parties to accommodate and purchase protection or privilege, i.e. honors, for their special interests.




http://www.state-citizen.org/files/generalresecisson/000contents.txt




SECTION II CONSTRUCTIVE FRAUD

In January, 1810, Senator Reed proposed the "Title of
Nobility" Amendment (History of Congress, Proceedings of the
Senate, p. 529-530). On April 27, 1810, the Senate voted to pass
this 13th Amendment by a vote of 26 to 1; the House resolved in
the affirmative 87 to 3; and the resolve was sent to the States
for ratification: By Dec. 10, 1812, twelve of the required
thirteen States had ratified as follows: Maryland, Dec. 25,
1810; Kentucky, Jan. 31, 1811; Ohio, Jan. 31, 1811; Delaware, Feb.
2, 1811; Pennsylvania, Feb. 6, 1811; New Jersey, Feb. 13, 1811;
Vermont, Oct. 24, 1811; Tennessee, Nov. 21, 1811; Georgia, Dec.
13, 1811; North Carolina, Dec. 23, 1811; Massachusetts, Feb. 27,
1812;New Hampshire, Dec. 10, 1812. Before a thirteenth State could
ratify, the War of 1812 broke out and interupted this very rapid
move for ratification.

No record has been found that the State of Connecticut ever acted
to either accept or reject this original 13th Amendment. Yet, it
was published in three separate editions of "The Public Statute
Laws of the State of Connecticut" as a part of the U.S.
Constitution in 1821, 1824 and 1835. Then, without record or
explanation, it mysteriously disappeared from subsequent editions
prior to the Civil War between the states. However, printing by a
legislature is prima facie evidence of ratification, and it has
been found to have been printed as part of the Constitution in
this and many other states until around the Civil War period -
when it mysteriously disappeared from subsequent printings. It
was found to have been printed by the legislature of this State in
the following: 1821 - The Public Statute Laws of the State of
Connecticut, as revised and enacted by the General Assembly in
May, 1821 pg. 19 1824 - The Public Statute Laws of the State of
Connecticut, as revised and enacted by the General Assembly in
May, 1824 pg.18-19 1835 - The Public Statute Laws of the State of
Connecticut, compiled in obedience to a resolve of the General
Assembly passed May, 1835, to which is prefixed the Declaration of
Independence & Constitution of the United States and the State of
Connecticut, published by the authority of the State of
Connecticut. The Marginal note in all three publications reads:
"Citizenship forfeited by the acceptance, from a foreign power, of
any title of nobility, office or emolument of any kind, &c." The
prima facie evidence of ratification of this Amendment is
overwhelming. Since the creditors of this bankruptcy are foreign
powers and this "unacountable committee of lawyers'" spoken of by
Robert H. Bork have accepted and retained the "office of trustee"
for these creditors and foreign powers, their Citizenship has
been forfeited by this acceptance.
http://www.calneva.com/money/lawsuit3.htm




"If any citizen of the United States shall accept, claim, receive, or retain any title of nobility or honour, or shall without the consent of Congress, accept and retain any present, pension, office, or emolument of any kind whatever, from any emperor, king, prince, or foreign power, such person shall cease to be a citizen of the United States, and shall be incapable of holding any office of trust or profit under them, or either of them."


186 posted on 02/10/2005 5:24:17 PM PST by The Real J Fate
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nitro

WIZARD OF OZ and the ILLUMINATI MIND CONTROL

The rule of thumb that the programmers/handlers go by is that they will say anything to get the job done. A CIA handler will tell his agent in the field whatever will work to get the field agent’s cooperation on a mission. There is no height nor breadth nor length to these people’s deception. They have successfully kept some deceptions active for decades, if not for centuries.



THE USE OF FICTION

The history behind the Wizard of Oz programming is interesting. It suggests that the Wizard of Oz has had an important part in the occult world all along. One of the secrets of the Mystery Religions, especially the Egyptian Isis mystery religion was the ability to use drugs and torture to create multiple personalities. The word Oz is known to have been used by its author as an abbreviation for Osirus. Monarch victims have the “golden penis of Osirus” placed into them. The Grimm brothers, who were cabalistic jews, gathered the folk occult stories together. Their stories are full of spells, trances, and drugs. Sleeping Beauty is put to sleep, and the trigger to wake her is a kiss on the lips. These are serious hints that the occult world didn’t stop programming people with dissociative states and triggers when the ancient Egyptian empires fell. Instead of using modern lingo such as “hypnotize”, they would say “cast a spell.” Later in Freemasonry, the Right Worshipful Master would “charge” (meaning hypnotize) an initiate. The occultist Baum, a member of the Theosophical Society, was inspired by some spirit who gave him the “magic key” to write the Wizard of Oz book, which came out in 1900. The book’s story is full of satanic activity and satanic thinking. The story was chosen in the late 1940s to be the basis for the Illuminati/Intelligence community’s trauma-based total mind control programming. As a way of enhancing the effect of the programming, Monarch slaves are conditioned to place trigger items into their lives. When the movie was made, Judy Garland, who had lived a life touched by the occult world’s abuse, was chosen to act as Dorothy. Judy’s later husband, Mickey De Vinko was a satanist and the chief assistant to Roy Radin, a rich satanist who worked with the Illuminati, and who controlled the “Process church” covens which had as members mass murderers Berkowitz and Monarch slave Charlie Manson. There are several members of the Carr family, who are also tied into both De Vinko and Radin’s Process Church and the Illuminati. With the numerous long term connections between the Wizard of Oz books, and movie to the highest levels of the occult world, it is not without reason that one can theorize that the original series of 14 Oz books had an ulterior motive behind them. The 14 books of the Oz series are: 1) The Wizard of Oz, 2) The Land of Oz, 3) Ozma of Oz, 4) Dorothy and the Wizard in Oz, 5) The Road to Oz, 6) The Emerald City of Oz, 7) The Patchwork Girl of Oz, 8) Tik-tok of Oz, 9) The Scarecrow of Oz, 10) Rinkitink in Oz, 11) The Lost Princess of Oz, 12) The Tinman Woodsman of Oz, 13) The Magic of Oz, 14) Glinda of Oz. These books are still being sold, and are being read to children who are being programmed with trauma-based total mind control. The 14 books came out in various editions. The originals came out in 1900 and shortly thereafter. In the 1930s, the 1940’s, and the 1950’s the words were retype set and given different pages. (When working with a survivor it might help to identify what decade the edition the slave was programmed with, because the pictures and the page numbers varied from edition to edition.) Of course, having good pictures is an asset in programming, because the child will visualize off of the pictures when building its internal world. In addition to this, large Wizard of Oz theme parks are being built by the Illuminati to provide places to carry out programming and to reinforce the programming which traps the minds of Monarch slaves. The best example of this, is the audacious MGM Grand complex in Las Vegas, although other theme parks around America also use a Wizard of Oz theme. If you have read Fritz Springmeier’s Be Wise As Serpents you will know how the Theosophical Society ties in with Freemasonry, Satanism, and Lucis Trust. Several famous members of the Theosophical Society include:



Adolf Hitler (a Satanist who practiced human sacrifice, & who had HPB’s book at his side.)

Mahatma Gandhi (a Hindu guru considered a god by some of his followers. Gandhi was successful with the British in part because of the Theosophical Society.)

H.P. Blavatsky (The founder of the Theosophical Society. She referred to herself as HPB. She was initiated by Illuminatus Mazzini into Carbonarism , a form of Freemasonry, illumined by the Great White Lodge in 1856, was part of the Hermetic Brotherhood of Luxor, and spent lots of time with the Eddy Illuminati family in Vermont, who were well known mediums. She also was a member of the occult fraternities the Order of the Druses, the Adoptive branch of the Ancient & Primitive Rite of Freemasonry, & the hermetic masonic rites of Memphis and Mizraim. She was trained to handle live snakes by Sheik Yusuf ben Makerzi, the chief of the Serpent Handlers, and she was hypnotized by occultist Victor Michal and to some degree from 1866 under his influence.)

Alice Bailey (head of Lucis Trust)

Henry Steel Olcott (an important occultist)

Elvis Presley (a Monarch slave)

Manly P. Hall (an Illuminati Theta Programmer, and at least a Grand Master within the Illuminati who sat on the Grand Druid Council.)

Frank Baum



The man who wrote the book The Wizard of Oz was a member of the Theosophical Society. L. Frank Baum lived in South Dakota and created The Wizard of Oz book as a theosophical fairy tale incorporating the “ancient wisdom” of the Mystery Religions. The books have so much material from inside the secret world of the Illuminati, that the few who understand the Illuminati wonder if Baum wasn’t an insider. The moral of the book is that we must rely upon ourselves, for we alone have the power to save ourselves. This was part of the original lie of Satan in the garden. Satan has simply dressed up the same original lie into different packaging and is distributing it worldwide as the most popular American fairy tale. L. Frank Baum explained how he came to write the book, “It was pure inspiration....It came to me right out of the blue. I think that sometimes the Great Author has a message to get across and He has to use the instrument at hand. I happened to be that medium, and I believe the magic key was given me to open the doors to sympathy and understanding, joy, peace and happiness.” (Hearn, Michael P. ed., The Annotated Wizard of Oz. NY: Clarkson N. Potter, 1973, p. 73.) In Baum’s time, the head of the Theosophical Society, H.P. Blavastsky had been putting out her journal called Lucifer. In other words, I highly suspect Baum knew what the Theosophical Society was all about, and that he himself was deeply into the occult. The book The Wizard of Oz came out in 1900. (It wasn’t until 1939 that the movie was made.) This next section will cover the numerous parallels between the Wizard of Oz material and the occult world and the occult world’s programming. This is broken up into 3 sections:



PARALLELS BETWEEN:

A. THE WIZARD OF OZ BOOK & OCCULTISM

B. THE WIZARD OF OZ MOVIE & ILLUMINATI RITUALS

C. THE WIZARD OF OZ SERIES OF BOOKS AND MONARCH PROGRAMMING



For those readers who are unfamiliar with the occult world, some of these parallels at first may seem stretched. When one sees how many parallels there are, then occult nature of the books begins to sink in. The authors could provide the reader with more parallels between Satanism and The Wizard of Oz book, but we believe the following will suffice. (Some parallels may also apply to the movie.)



A.THE WIZARD OF OZ BOOK & OCCULTISM

Auntie Em represents HP Blavastsky’s “Mulaprakriti” and Uncle Henry represents HPB’s “Unmanifested Logos”.

The carnival huckster (later seen as the Wizard) is advertised as being connected to the royal families of Europe. The Royal families of Europe are secret Satanists, from powerful occult bloodlines.

Dorothy is brought to Oz by a cyclone. The word cyclone originally was the greek word cyclone which means both a circle or the coil of a snake. In other words, the snake takes Dorothy to Oz.

Dorothy’s three companions represent the mental, emotional, and physical bodies that HPB wrote about. Dorothy acquired these three companions just as Theosophy says we will when we come into incarnation. To quote HPB “There is no danger that dauntless courage cannot conquer; there is not trial that spotless purity cannot pass through; there is no difficulty that strong intellect cannot surmount.” (Algeo, John. “The Wizard of Oz: The Perilous Journey”, The Quest, Summer 1993. Wheaton, Il.: Theosophical Society in Amer.,p. 53.)

In the book, the Tin Woodsman was an ordinary being of flesh, but a wicked witch casts a spell on him. He kept chopping off parts of his body, which were then replaced by a tinsmith, until he became the first bionic man, with a completely mechanic body. Boy, hasn’t the Illuminati been trying to do this one!?

In step with Wizard of Oz mind-control programming, the wicked witch & naughty children cannot stand water but dissolve. Robotic clones are created in the minds of Monarch slaves which can only be mentally dissolved by mentally placing water on them.

Dorothy goes questing in Oz. Theosophists (New Agers, Satanists, etc.) go on quests.

Oz is shaped like a Mandala with Emerald City in the center, an impassable barrier, four-sidedness, 4 symbolic colors, the circle and the center. The colors and directions given in Oz may also have other symbolic meanings in the occult. For instance, Emerald City is green and green is the fourth point of the Eastern Star (women’s Freemasonry) & Satan’s color. A The route that Dorothy follows in Oz has the shape of a T with its 3 points defining an inverted triangle.

The Yellow Brick Road suggests gold, the perfect metal. Gold is considered to be divine & the source of wisdom by the Illuminati. HPB had written “There is a Road, steep and thorny, beset with perils of every kind, but yet a Road, and it leads to the very heart of the universe.” This was the yellow brick road that Baum the Theosophist sought to portray in his fairy tale. The book contains a great deal more perils and adventures on the road than the movie.

The article shows that the great teacher is a humbug but Dorothy and her own companions have the abilities to help themselves if they only will realize their own powers through the help of the good witch of the south. This is in line with the Theosophical Society’s, the Church of Satan’s, and other occult groups teachings which teach that the individual has the capabilities within themselves to achieve anything. One of the Theosophical Society’s publications states, “Prepare thyself, for thou wilt have to travel on alone. The teacher can but point the way.” (“The Voice of Silence” as quoted in “The Wizard of Oz” article, Quest, Summer, 1993 p. 54.) Part of the mind set of Satanism is that reality and fantasy become blurred. This blurring has been part of the brainwashing that is being systematically given to American children. Within Monarch slaves they have an incredibly difficult time trying to differentiate between reality and fantasy because of all the mind programming they have been subjected too. There are several techniques which will determine for Monarch survivors if their memories are real. In the board game called Illuminati!, put out by people connected to the Illuminati, the game states, “Don’t believe any of this, it is all true.” These are the type of double-bind self contradictory statements that Satanists love to spew out. Monarch slaves are programmed full of double-binds. With the Satanist’s penchant for blurring reality in mind, read the following quote where the President of the Theosophical Society admiringly describes the Wizard of Oz, “Part of Baum’s joke is that things are never what they seem. Dorothy seems to be a simple and harmless little girl, but it is she who kills the wicked witches of both East and West. The Scarecrow seems to lack brains, but he has all the ideas in the company. The Tin Woodman seems to lack a heart, but he is so full of sentiment that he is always weeping. The Cowardly Lion seems to be a coward, but he takes brave action whenever it is called for. The Wizard seems to be great and powerful, but he is actually a humbug. Oz seems to be a glorious and delightful land and Kansas to be dry, gray, and dull--but Oz is a world of illusion and Kansas is really home. Things are not what they seem, in Oz or Kansas.”



B. RELATIONSHIPS BETWEEN THE MOVIE & ILLUMINATI RITUAL

The close relationship between Dorothy and her dog is a very subtle connection between the satanic cults use of animals (familiars). Those who read Vol. 1, may remember the example written about on how Illuminati Kingpin Alfred I. du Pont’s dog Mummy served as Alfred’s familiar spirit. Animals are very often used in ritual. This connection is very subtle, perhaps too subtle for it to be worthy of mention, except that those in Satanism will see the significance, even though others won’t. What is trivial to one person may not be to the next. A Monarch slave as a child will be allowed to bond with a pet. The child will want to bond with a pet anyway because people are terrifying by this point. Then the pet is killed in porn to traumatize the child. This happens quite frequently.

The Rainbow--with its seven colors have long had an occult significance of being a great spiritual hypnotic device. Constance Cumbey, in her book The Hidden Dangers of the Rainbow, which exposes the New Age Occult Movement, correctly writes, “The Rainbow (also called the Antahkarana or Rainbow Bridge). This is used as a hypnotic device.,, (p.261) The Supreme Council of the 33rd0 of Freemasonry has used the rainbow on the cover of their magazine. In a book teaching Druidism (as in Illuminati Druidism), The 21 Lessons of Meryln, the Rainbow is described as “A true sign of Magic...it exists in both worlds at once!”

Elvira Gulch is a woman who owns 1/2 of the county where Dorothy lives in Kansas. She is shown later in the Land of Oz transformed as a witch. Many of the Illuminati elite are rich and lead double lives. People who meet them at a ritual will see the dark side of these rich people. At the rituals, people are tranced from drugs, chanting, and mind control; they are “over the rainbow.”

Professor Marvel uses a crystal ball which he claims was used by the Priests of Isis. Isis and Osirus are both part of the Ancient Egyptian Mystery religion and modern Satanism.

Kansas is black & white, Oz is in color. Reality is downplayed in witchcraft and satanism. Make believe is considered more colorful than reality. Also as an escape from this world, Satanists use drugs to enhance their perception of colors. Some of the famous writers took drugs which put them into altered states of consciousness in order to release their creativity.

Both good and bad witches in Oz carry staffs. In Satanism & the Illuminati, Priestesses also carry similar staffs. Also the idea that there are good and evil witches -- white and black magic is straight from the occult, and follows the Illuminati’s gnostic beliefs.

Several scenes involve transference of power via transference of slippers from a witch. In Illuminati ritual, to transfer power, a Matriarch, or Mother of Darkness will kill the person in a position of authority with a strike on the forehead with a special mace like staff, and then put on their slippers. Ruby colored slippers are actually used as a symbol of authority at the Matriarch level in the Illuminati. The shoes are said to be golden at the Mothers of Darkness level in the Illuminati.

The bad witch uses poison, poisoned apples and poisoned brew. Satanic covens in real life do this same thing.

The wizard is portrayed as someone who rules and is benevolent. In witchcraft, wizards do rule (even though in some groups wizards are simply called witches.)

Winged monkeys in the haunted forest, harken back to the pagan cultures which placed wings on various animal idols.

The trees are alive like animals in the film. The Illuminati believe that the trees have spirits. In one of the Oz films, even the stones have personality and talk. This comes straight out of Druidism.

The Tin Man is a person which has been part of Illuminati ceremonies. The first initial ceremony that children of the Illuminati may remember is where a Tin Man with an ax watches over their presentation to the coven.

If the parent presents the child, nothing is done, but if the parent refuses to present the children, then the Tin Man in the ritual will use his ax to sever the child’s head on a chopping block. (The Tin Man will also appear in Tin Man programming, and a Tin Man’s Castle may well be built in the Monarch slave’s head, but the point here is that the Tin Man is also part of ritual.)

Dorothy kills the wicked witch of the west by a sharp blow to the forehead with the witch’s staff. This is what is done in the Illuminati, when an elderly witch is being replaced. In both cases, whether in the movie or in real life in the Illuminati, when a witch is killed the people have a ceremony. In real life in the secret world of the Illuminati, a scroll is used to certify that the witch is dead both physically and spiritually. (The movie had this in it.) Just one example of the thousands of Illuminati Grande Dames killed in ritual like this is the recent billionairess Dorris Duke, who was ritually killed in 1993 on Halloween, also called All Hallows Eve, in the Beverly Hills, CA area. The Illuminati method for killing a Grande Dame and passing her spiritual power on is done with reverence. No blood is to be spilt out of respect for the elderly woman who gives up her life willingly. At death, the last breath is inhaled by the replacement to transfer the power. There may be as many as 2,197 Grande Dames at such a coronation. The Grande Mothers (whose Systems are mistresses for Satan and hierarchy leaders) and the next rank, the Grande Dames, are often veiled in ritual and would wear robes with different colored lining. The different colors of linings show the different grades. A typical Grande Mother vestment or robe is a black satin & velvet dress with a draped neckline, and ritual symbols down the center of the robe. After someone like Dorris Duke willingly gives her (their) life, her head is served on a silver platter at a banquet. For the deeper alters of a high level slave, this is part of their way of life; they are told it is their birthright and heritage. Such alters will not be able to identify with the culture at large. To give up their programming, means giving up their magickal powers and their culture, which they have had to work hard for. To leave they would need to see something that they perceive as better. They are locked into their slavery due do to their exposure to only a secret Illuminati culture and value system. Because of their dissociation with the rest of their own System of alters, they don’t perceive a need to change their lifestyle anymore than a Bushman would be able to feel a need to wear shoes. Why should the Bushman want shoes, if he has gotten along without them? Why should a high level slave want change, when they have gotten along without it? Experience shows that during deprogramming most of the lower level alters will want to escape their abuse, but the higher level ritual alters are so separated from the abuse they don’t want to give up their status and culture.

Throughout the movie, scrolls are used. As stated, Moriah continues to use scrolls for their official ritual functions.

The wicked witch of the west says that her question was not “to kill or not to kill” Dorothy?, but rather HOW to kill Dorothy for “these things must be done delicately.” This is exactly the attitude displayed within the Illuminati.

The film has occult items such as crystal balls in several scenes, haunted castles, magic and a benevolent wizard.

At one point the Lion says, “I do believe in spooks [ghosts], I do, I do, I do, I do.” (Today, intelligence agents are also called spooks.)

The Lion, Tinman, Dorothy and the Scarecrow must prove themselves worthy to receive the benevolence from Oz. The occult is full of rituals where the participant must prove himself worthy.

The phrase “seeds of learning” is used in Illuminati ceremonies. Staffs like the movie has are used by various occult groups. These staffs often serve as stun guns, so that shocks can be applied during ceremonies. The shocks may be applied so that the victim doesn’t remember the ceremony.



C. PARALLELS BETWEEN THE WIZARD OF OZ SERIES OF BOOKS AND MONARCH PROGRAMMING

The following are parts of the Wizard of Oz Monarch Programming, which is a base programming put in when the child is very young. Some of the slaves know portions of the Wizard of Oz script word-for-word.

Dorothy is told she doesn’t have a brain if she has gotten into trouble.

Dorothy is looking for a place where there is no trouble which is a place “over the rainbow.” To escape pain, alters go over the rainbow. (This is a.k.a. in Alice In Wonderland Programming as “going through the looking glass”.

Dorothy becomes unconscious, the world begins spinning, and then she see disjointed pictures. This also happens to Monarch slaves. Later in the film, Dorothy states, “My! people come and go so quickly.” This is exactly what happens to the Monarch slave whose multiple personalities come and go. When the multiple personalities switch in and out very fast a spinning process can start which can be dangerous if it doesn’t stop. Just like most hiccuping stops on its own, the rapid uncontrolled switching (which can be triggered by stress) usually stops on its own. Systems which subconsciously know they are going to be tortured and used may out of a subconscious fear begin this revolving switching. It is said that the Monarch victim will become comatose if the rapid spinning goes on too long. Personalities are switched in what are called “tornado spins” or “tornado spinning” and personalities called “spin off’ personalities come up according to the number of revolutions the slave is commanded to spin. By spinning the slave, the master can choose what sexual perversion he wants as each “spin off’ personality has been trained to carry out a different perversion.

Over the rainbow in Oz is for the Monarch slave to be in a trance, and into a certain area of the programming. To be fluctuating at both ends as an observer and not a participant or to go to the other extreme and become a participant. The theme song of the movie goes, “Somewhere over the Rainbow...there’s a land where the dreams that you dare to dream really come true.” These lyrics are a method to hypnotically confuse the brain to perceive that the “over the Rainbow experience” (which is usually horrible abuse) is a “dream”. The dissociative mind is only too happy to call the trauma a dream, which is lived as a reality for a moment, but is nevertheless recorded by the mind as a fantasy. The term for this is cryptoamnesia, which means the process where the proper functioning of memory is hypnotically messed up. The slave’s internal world becomes “reality” and the external real world becomes the Land of Oz which is perceived as make-believe.

Dwarfs are used in the internal programming. (Hollywood hired a large number of them for the movie’s cast. They are called Munchkins in the movie.) Mengele, known as the programmer Dr. Green, was especially interested in experimenting traumas on dwarfs.

For bona-fides & recognition signals, the Monarch slaves wear diamonds to signify they are presidential models, rubies to signify their Oz programming for prostitution, and emeralds to signify their programming to do drug business. Rings are also used to signify what activity the slave is doing, and what rank or level they are in the occult.

Monarch slaves are taught to “follow the yellow brick road.” No matter what fearful things lie ahead, the Monarch slave must follow the Yellow Brick Road which is set out before them by their master. For some slaves used as track stars, their Yellow Brick Road was the track they had to run. The Yellow Brick Road is the runway in which alters were trained to fly off from to exit their internal world and take the body. The Yellow Brick Road also pertains to the assignment that an alter is given. To follow the Yellow Brick Road is to go down the road that has been assigned by command. The Yellow Brick Road programming is placed into the child’s mind via the Yellow Brick Road of the Wizard of Oz story. Remember the key words, “Follow the Yellow Brick Road.” To get someone onto the Yellow Brick Road you must know the access code to get them through the poppy field. The color codes are important to get an alter through the field of poppies. “Fiddler” is important word to get to the yellow brick road (it signifies the programmer in the context of “the programmer is here, go over the rainbow”) and then the alters eat what is variously called MUSIC or a SCRIPT or A LETTER which are words meaning “instructions.” In the 1900 edition of the book on page 3 1-32 says (programming cues are in caps), “She closed the door, locked it, and put the KEY carefully in the pocket of her dress. And so, with Toto trotting along soberly behind her, SHE STARTED ON HER JOURNEY. THERE WERE SEVERAL ROADS NEAR BY, BUT IT DID NOT TAKE HER LONG TO FIND THE ONE PAVED WITH YELLOW BRICK. Within a short time she was walking briskly toward the EMERALD CITY, HER SILVER SHOES tinkling merrily on the hard, YELLOW ROADBED. The sun shone BRIGHT AND THE BIRDS SANG SWEET and Dorothy did not feel nearly as bad as you might think a little girl would who had been SUDDENLY WHISKED AWAY FROM HER OWN COUNTRY AND SET DOWN IN THE MIDST OF A STRANGE LAND....The houses of the Munchkins were odd-looking dwellings,...ALL WERE PAINTED BLUE, for in this country of the EAST BLUE WAS THE FAVORITE COLOR.. .FIVE LITTLE FIDDLERS PLAYED AS LOUDLY AS POSSIBLE AND THE PEOPLE WERE LAUGHING AND SINGING, while a big table nearby was loaded with DELICIOUS FRUITS [the programs] and NUTS, PIES, and cakes, and many OTHER GOOD THINGS TO EAT [scripts to ingest].”

Monarch slaves are threatened with fire, like the Scarecrow. They also see people dismembered like the Scarecrow was dismembered. For them it is not an idle threat. The front alters also have hearts full of pain like Scarecrow.

Certain alters are not given courage and most have their hearts taken from them. The alters who are programmed not to have hearts are hypnotically told the same thing the Tin Man says, “I could be human if I only had a heart.” (See Chapter 4, where it discusses hypnosurgery.)

Some alters are taught they are stupid and have no brain. Scarecrow is asked the question, “How can you talk without a brain? Scarecrow answers, “Some people without a brain can do a lot of talking.”

Emerald City is used in programming. Emerald City in the programming will be well guarded and hard to reach. Several important things will be placed inside the Emerald City, including the deeper Illuminati alters.

Castles are used in the programming. Lots of castles, either in the mind’s imagery or purely demoniac are placed into the slave’s mind.

Winged monkeys are able to watch in the movies somewhat as spy satellites. Winged monkeys are used in the programming to create a fear of always being watched.

The Flowers used in the movie and books, are also used in the programming. The witch uses poppy flowers to put the lion and Dorothy to sleep. Opium and cocaine are used to tranquilize Monarch slaves. An alter of a slave will get trancy when they enter the poppy field. (Heroin and cocaine come from poppies.) In the film, Dorothy says, “What is happening? I’m so sleepy.” She and the lion get sleepy for no apparent reason very quickly. Monarch slaves do the same thing. Waking up with snow in the movie is nothing less than an allusion to cocaine which is a common substance given to Monarch slaves to help make them dependent.

Dorothy states at one point in the movie that she “doesn’t remember”. She then follows this up with “I guess it doesn’t matter.”

Hour glasses appear in the movie in several spots, and they also occur in various contexts in people who have been programmed by the Monarch programming. Some victims of the programming have hour glass configurations each created around a separate axis. The hour glasses have the ability to be rotated which causes certain alters to be brought forward. Monarch slave masters have also used hour glasses to indicate to their slaves that death was imminent and that time was running out. This is the way the wicked witch used the hour glass on Dorothy, who happens to be saved just as the hour glass runs out. Some Monarch slave masters actually have large hour glasses (sometimes 3’ high) like in the movie. (In Cathy O’Brien’s autobiography of her life as a Monarch slave Transformation of America she has a photograph of Sec. of Defense Cheney’s hour glass on his desk with him seated. This hour glass was used to threaten her as a slave.) When a Monarch slave sees an hour glass they may switch, but basically it is a reminder that the slave masters have the power to run a person’s time out. One slave was told, “The sand that sifts through the hourglass is a measure of your worthiness to live or die.” The hour glass shape is basically two triangles which touch at their peaks, or an X configuration with the tops of the X having lines. The child’s mind is to visualize this configuration as a compass, as the four points N, 5, E, W, they are to see the X configuration also as an x, y axis upon which a city is structured upon. The hour glass then is tied to several other concepts which integrate themselves well with the basic X shape of the hour glass. Circles with X’s are stacked on top of each other to form the different worlds which contain the alters. The two pie shaped pieces of the hour glass will hold one world, while the hour glass configuration made by the other two adjacent pieces hold the looking glass mirror images of each alter. Each hour glass is called 2 quadrants. To remove 4 quadrants would of course take both alters and mirror images with it. In mathematics, it could be stated that regular alters are in quadrant x,y and -x, -y. And that the looking glass people--the mirror images, early splits made from each alter as a copy, are in quadrants -x, y and x, -y. (See the chapter on how to structure a System)

“Click your heel together and be there in a snap” is both in the movie and in the programming cues. Military Monarch slave models are especially taught to click their heels together. (Joseph Mengele, Dr. Black, Michael Aquino and others also liked to click their Nazi boots together while they programmed children.)

“SILENCE!” is both in the movie and a command of the Oz Programming. This word SILENCE stands for a code of “no talk” which runs deep in the mind of the slave.

As in the movie, certain slave alters will talk to their masters as Dorothy did, “If you please, Sir...”

The keys (and triggers) to control the switching of personalities and to give orders are frequently based on Wizard of Oz material. A Monarch slave owner might use cues based on the Wizard of Oz such as

“THERE’S A PAIR OF MAGIC SHOES TO WEAR WITH YOUR DRESS...SOMETHING IN LIGHTENING...TO TRANSPORT YOU FASTER THAN THE OL’ RUBY SLIPPERS.” (Quote from O’Brien, Cathy. “Operation Carrier Pigeon”, Monograph, pg. 2.) A cryptic death threat given to Cathy as a slave by handler Sec. of Defense Cheney to kill her daughter by taking off her daughter’s ears was then backed up by the hypnotic command based on Wizard of Oz programming, “I’LL GET HER, MY PRETTY. . .YOUR LITTLE GIRL.”

The programming that is related to the Tin Man produces a monarch slave which is

described as “A WELL OILED MACHINE” by the handlers. U.S. Sen. Allen Simpson, one of the perpetrators of the Monarch Program, referred to the Tin Man programming when he told a slave “THESE ARE BUT EMPTY SHELLS OF THE LIFE THEY WERE ONCE POSSESSED. LIKE YOU ARE--EMPTY AND VOID OF LIFE.”

Phrases like “troubles melt” can be found in both the movie and in the programming.



Let’s now cover what programming is based on the Oz books, that isn’t found in the movie. A great deal of the Oz programming comes from the books, of which only the first book was used for the movie. The public is familiar with the movie which is based on the first one, but in general doesn’t know the other books exist. We will not go through the scripts of all 14 books--there isn’t room for that, but by going through a few of the books, the reader will begin to see the massive amount of material which was used for programming scripts in the Oz books. It is one thing to say, the Wizard of Oz was used as a mind-control programming script, but that doesn’t convey the extent of it. Large sections of the 14 books are almost perfect for mind-control. If you take the trouble to read these quotes, you may find yourself startled at what you thought at first glance was a nice child story!

pg. 38 Book 1 The Wizard of Oz, “That is true,” said the Scarecrow. “You see,” he continued, confidently, “I DON’T MIND MY LEGS AND ARMS AND BODY BEING STUFFED, BECAUSE I CANNOT GET HURT. IF ANYONE TREADS ON MY TOES OR STICKS A PIN INTO ME, IT DOESN’T MATTER, FOR I CAN’T FEEL IT.” This is teaching dissociation. The slaves actually do have pins & needles stuck into them, or toothpicks under their fingernails, etc. If anyone asks the slave a question they can say according to the script, “I don’t know anything.” The infant slave will be taught words like this “STICKS & STONES MAY BREAK MY BACK, BUT WORDS WILL NEVER HURT ME, BECAUSE I’M NOT HERE.”

pg. 41 Book 1 The Wizard of Oz, “It never hurt him, however, and Dorothy would pick him up and set him upon his feet again, while he joined her in laughing merrily at his own mishap.” This is teaching the programming “IT’S O.K., IT DOESN’T MATTER, NOTHING WRONG HERE” that the slave is taught to tell the world.

pg. 40 Book 1 The Wizard of Oz, “nest of rats in the straw, ...at the scarecrow.” The mice in a Monarch System which control the turning of the quadrant’s clock, hide from the scarecrow. pg. 42 Book 1 The Wizard of Oz, “fewer fruit trees...” If the slave eats the fruit [code for programs] without permission, the dwarf munchkins will beat the alter with their clubs. Also on this page HOME is called KANSAS, and it is described as “how gray everything was there.” In other words, reality isn’t as great and colorful as the make believe internal world you can build in your mind to escape this hell we’re giving you.

pg. 43 Book 1 The Wizard of Oz, The Scarecrow looked at her reproachfully, and answered, “My life has been so short that I really know nothing whatever. I was only made day before yesterday. What happened in the world before that time is all unknown to me. Luckily, when the farmer made my head, one of the first things he did was to paint my ears, so that I heard what was going on.” This is the script read to new alters, to help them have a clean slate before programming them with another new script. This is coupled with the Wizard of Oz theme that the Wizard gives brains (what to think) to the Scarecrow. The alters are hypnotically programmed that if they think on their own--then they are empty headed like the Scarecrow. They can only have something in their head if they let the Wizard give them what to think.

pg. 45 Book 1 The Wizard of Oz, “It was a lonely life to lead, for I had nothing to think of, having been made such a little while before.” This is part of the script read a new alter.

pg. 48 Book 1 The Wizard of Oz, “So the Scarecrow led her through the trees until they reached the cottage, and Dorothy entered and found a bed of dried leaves in one corner. She lay down at once, and with Toto beside her, soon fell into a sound sleep. the Scarecrow who was never tired, stood up in another corner and waited...” This was used to program part of a script for an Illuminati ceremony.

pg. 57 Book 1 The Wizard of Oz, “So the old woman went to the wicked Witch of the East, and promised her two sheep and a cow if she would prevent the marriage. Therefore, upon the wicked Witch enchanted my axe, and when I was chopping away...the axe slipped all at once and cut off my left leg. “This at first seemed a great misfortune, for I knew a one-legged man could not do very well as a woodchopper. So I went to a tinsmith and had him make me a new leg out of tin. The leg worked very well, once I was used to it; but my action angered the wicked Witch of the East, for she had promised the old woman I should not marry the pretty Munchkin girl. When I began chopping again my axe slipped and cut off my right leg. Again I went to the tinner, and again he made me a leg out of tin. After this the enchanted axe cut off my arms, one after the other; but, nothing daunted, I had them replaced with tin ones. The wicked Witch then made the axe slip and cut off my head, and at first I thought that was the end of me. But the tinner happened to come along, and he made me a new head out of tin.” This is an Illuminati ceremony script done by Dr. Mengele with children at a very young age. It was a blood oath to “Green” that if they let anyone touch the programming they would cut themselves.

pg. 58 Book 1 The Wizard of Oz, “...splitting me into two halves. Once more the tinner came to my help and made me a body of tin, fastening my tin arms...But alas! I had now no heart, so that I lost all my love for the Munchkin girl... I had known was the loss of my heart. While I was in love I was the happiest man on earth; but no one can love who has not a heart, and so I am resolved to ask Oz to give me one.”

pg. 66 Book 1 The Wizard of Oz, The Scarecrow, the Tin Woodsman and Dorothy expect that the Wizard of Oz can give a brain, a heart, and send Dorothy back to Kansas. Under programming the Master as the Wizard can give alters what he wants including sending them back to Kansas (their internal reality). pg. 77 Book 1 The Wizard of Oz, “...they could see the road of yellow brick running through a beautiful country, with green meadows dotted with bright flowers and all the road bordered with trees hanging full of delicious fruits.” This is used for the imagery of the yellow brick road.

pg. 87 Book 1 The Wizard of Oz, “Scarlet poppies...their odor is so powerful that anyone who breathes it falls asleep, and if the sleeper is not carried away from the scent of the flowers he sleeps on and on forever. But Dorothy did not know this, nor could she get away from the bright red flowers that were everywhere about; so presently her eyes grew heavy and she felt she must sit down to rest and to sleep.” This is an important part of the programming. This is the story line for trancing deep. pg. 112 Book 1 The Wizard of Oz, “Then the Guardian of the Gates put on his own glasses and told them he was ready to show them to the palace. Taking a big golden key from a peg on the wall he opened another gate, and they all followed him through the portal into the streets of the Emerald City.” This is helpful imagery in setting up the internal Emerald City and its guards.



BOOK 3. OZMA OF OZ

pg. 20 Book 3 Ozma of Oz, “But the wind, as if satisfied at last with its mischievous pranks, stopped blowing this ocean and hurried away to another part of the world to blow something else; so that the waves, not being joggled any more, began to quiet down and behave themselves.” Used to create protective programming, notice how the wind is personified.

pg. 23 Book 3 Ozma of Oz, “So she sat down in a corner of the coop, leaned her back against the slats, nodded at the friendly stars before she closed her eyes, and was asleep in half a minute.” Alters may be trained to trance when placed in a corner.

pg. 27 Book 3 Ozma of Oz, “No, indeed; I never care to hatch eggs unless I’ve a nice snug nest, in some quiet place, with a baker’s dozen of eggs under me. That’s thirteen, you know, and it’s a lucky number for hens. So you may as well eat this egg.” This has been used often to get 13 splits when torturing. Many Illuminati Systems were set up on 13 grids.

pg. 30 Book 3 Ozma of Oz, “Next to the water [programming cue to build Atlantis] was a broad beach of white sand and gravel [programming cue to build Troy], and farther back were several rocky hills, while beyond these appeared a strip of green trees [programming cue to build a green forest] that marked the edge of a forest. But there were no houses to be seen, nor any sign of people [programming cue for alters to be invisible] who might inhabit this unknown land.” This page along with others near it, have been used to build the structures in the internal world of Illuminati slaves. In brackets are a sample of how it could be used when building an internal world.

pg. 34 Book 3 Ozma of Oz, “Why eating live things....You ought to be ashamed of yourself!” “Goodness me!” returned the hen, in a puzzled tone; how queer you are, Dorothy! Live things are much fresher and more wholesome than dead ones, and you humans eat all sorts of dead creatures.” This is used to encourage cannabalism.

pg. 35 Book 3 Ozma of Oz, “...a large sized golden key.” To encourage the imagery of golden keys, which are used frequently in the internal system. The next chapter “Letter in the Sand” has singing trees in it, which have been popular items for the Illuminati due to their druid beliefs.

pg. 39 Book 3 Ozma of Oz, “Bye, bye, and bye, when she was almost in despair, the little girl came upon two trees that promised to furnish her with plenty of food. One was quite full of square paper boxes, which grew in clusters on all the limbs, and upon the biggest and ripest boxes the word ‘Lunch’ could be read, in neat letters. The tree seemed to bear all the year around, for there were lunch-box blossoms on some of the branches, and on others tiny little lunch-boxes that were as yet quite green, and evidently not fit to eat.” Boxes are built internally in the slave’s mind and a box will contain a program. The food is the programming that the slave is to eat and digest. The programming in the box might be songs, nursery rhymes, or a poem or anything. (On page 41, there is a full page picture of a girl picking a lunch-pail from a tree limb to eat it.)

pg. 40 Book 3 Ozma of Oz, “The little girl stood on tip-toe and picked one of the nicest and biggest lunch-boxes, and then she sat down upon the ground and eagerly opened it. Inside she found, nicely wrapped in white papers, a ham sandwich, a piece of sponge-cake, a pickle, a slice of new cheese and an apple. Each thing had a separate stem,...” The lunch-boxes on the tree are the programs which the programmers put in. The stems are what link the programming stories together in the child’s mind.

pg. 42 Book 3 Ozma of Oz, “I had a pair of silver shoes, that carried me through the air. ..said Dorothy.” In the programming silver shoes are used as cues to go into altered states (i.e. through the air.)

pg. 44 Book 3 Ozma of Oz, “embroidered garments of many colors” Color programming for the ribbons.

pg. 47 Book 3 Ozma of Oz, “We’ll get you in time, never fear! And when we do get you, we’ll tear you into little bits.” “Why are you so cruel to me? asked Dorothy. “I’m a stranger in your country, and have done you no harm.” “No harm!” cried one who seemed to be their leader. “Did you not pick our lunch-boxes and dinner pails? Have you not a stolen dinner-pail still in your hand?...it is the law here that whoever picks a dinner-pail without our permission must die immediately.” The programming message to all of this is that no one had better touch the dinner-pails which represent the programs or they are to die immediately. Armies like in the story guard the internal programming of the slave.

pg. 51 Book 3 Ozma of Oz, these pages describe a crack in rocks that is a door. This is used for Petra programming.

pg. 52 Book 3 Ozma of Oz, “golden key”...”within the narrow chamber of rock was the form of a man--or, at least, it seemed like a man...his head and limbs were copper. Also his head and limbs were copper, and these were jointed or hinged to his body in a peculiar way, with metal caps over the joints, like the armor worn by knights in days of old.” These are a System’s robots which are said by the programmers to be friends, and which are invisible. You can see other people’s robots but not one’s own internal robots.

pg. 53 Book 3 Ozma of Oz, “This copper man is not alive at all.” The clone robots are made to think they are not alive, but just robots. In reality they are little child alters suited up to think they are robots.

pg. 55 Book 3 Ozma of Oz, “...back view of the copper man, and in this way discovered a printed card that hung between his shoulders, it being suspended from a small copper peg at the back of his neck.” The robots are put in by a combination of several stories. The deep sea divers of 20,000 Leagues Under the Sea, and the Wizard of Oz’s Copper Man reinforce each other. “Extra Responsive Mechanical man fitted with our special clock-work attachment. Thinks, Speaks, Acts, and Does Everything but Live. Manufactured only at our Works at Evna, Land of Ev. All infringements will be promptly Prosecuted according to Law.” This huge sign is part of the robotic programming the clone robots receive. Notice that they are drilled into total obedience--all infringements will be promptly Prosecuted. Obey the law that your Master gives you.

pg. 56 Book 3 Ozma of Oz, “DIRECTIONS FOR USING

For THINKING: --Wind the Clock-work Man under his left arm, (marked No. 1)

For SPEAKING: --Wind the Clock-work Man under his right arm, (marked No. 2)

For WALKING: --Wind Clock-work in the -middle of his back, (marked No. 3)

N.B.--This Mechanism is guaranteed to work perfectly for a thousand years.” These instructions were used to build Dr. Green’s (Mengele’s) boxes and the robots.

pg. 58 Book 3 Ozma of Oz, “The words sounded a little hoarse and creakey, and they were uttered all in the same tone, without any change of expression whatever; but both Dorothy and Billina understood them perfectly.” This was used to program the internal robots to speak in unison and to repeat themselves.

pg. 60 Book 3 Ozma of Oz, “Af-ter that I re-mem-ber noth-ing until you wound me up a-gain.” The internal robots forget and then are prepared again for war.

pg. 62 Book 3 Ozma of Oz, “From this time forth I am your o-be-di-ent servant. What-ev-er you com-mand, that I will do will-ing-ly--if you keep me wound up.” This is used to teach the internal robots obedience to their programming.

pg. 67 Book 3 Ozma of Oz, “Within the pail were three slice of turkey, two slices of cold tongue, some lobster salad, four slices of bread and butter, a small custard pie, an orange and nine large strawberries and some nuts and raisins. Singularly enough, the nuts in this

dinner-pail grew already cracked, so that Dorothy had no trouble in picking out their meats to eat.” This is given to front alters as the front programming so that they see the programs as only “fruit”.

pg. 68 Book 3 Ozma of Oz, “Do the lunch-box trees and the dinner-pail trees belong to the Wheelers? the child asked Tiktok, while engaged in eating her meal.

‘Of course not,’ he answered. ‘They belong to the roy-al fam-il-y of Ev, on-ly of course there is no roy-al fam-il-y just now be-cause King Ev-ol-do jumped in-to the sea and his wife and ten children have been trans-formed by the Nome King...you will find the roy-al ‘E’ stamped up-on the bottom of ev-er-y din-ner pail.” The Nome King in the programming became the ruler of the demons/system within the Monarch system. Several story lines from a number of sources are overlapped to reinforce the programming scripts. The programmers will use other stories to introduce themselves into the system too. In case readers don’t know, a Monarch system will have hidden powerful alters that are made in the image of their programmers, that serve as personal representatives of the programmers.

pg. 79 Book 3 Ozma of Oz, “I am only a ma-chine, and can-not feel sor-row or joy, no mat-ter what hap-pens.” This is teaching mechanical dissociation, and coincides with Tin Man programming.

pg. 83 Book 3 Ozma of Oz, “For the Princess Langwidere is a different person every time I see her, and the only way her subjects can recognize her at all is by means of a beautiful ruby key which she always wears on a chain attached to her left wrist. When we see the key we know we are beholding the Princess.” “That is strange,” said Dorothy, in astonishment. “Do you mean to say that so many different princesses are one and the same person?” “Not exactly,” answered the Wheeler. “There is, of course, but one princess; but she appears to us in many forms, which are all more or less beautiful.” Doesn’t this sound like MPD! Did Frank Baum know about MPD?

pg. 90 Book 3 Ozma of Oz, “Princess Langwidere’s sitting-room was panelled with great mirrors, which reached from the ceiling to the floor; also the ceiling was composed of mirrors, and the floor was of polished silver that reflected every object upon it. So when Langwidere sat in her easy chair and played soft melodies upon her mandolin, her form was mirrored hundreds of times, in walls, and ceilings and floor, and whichever way...” This is the mirror programming that has been done to so many victims!

pg. 91 Book 3 Ozma of Oz, “Now I must explain to you that the Princess Langwidere had thirty heads.” Isn’t this story line convenient for programming?

pg. 94 Book 3 Ozma of Oz, ...Langwidere to a position in front of cupboard No. 17, the Princess unlocked the door with her ruby key and after handing head No.9, which she had been wearing, to the maid, she took No. 17 from its shelf and fitted it to her neck....There was one trouble with No. 17; the temper that went with it (and which was hidden...)was fiery, harsh and haughty in the extreme, and it often led the Princess to do unpleasant things which she regretted when she came to wear her other heads.” Does the reader see how this is programming to switch personalities. And personality No. 17 is locked up--which is a common programming methodology. The fiery, harsh anger--those are the demonic imps that the victim is coached to accept as normal which are layered in. (See chapter 10).

pg. 98 Book 3 Ozma of Oz, “‘To hear is to obey,’ answered the big red colonel, and caught the child by the arm.”

pg. 99 Book 3 Ozma of Oz, “...the colonel had by this time managed to get upon his feet again, so he grabbed fast hold of the girl and she was helpless to escape.”

pg. 102 Book 3 Ozma of Oz, “Once a cyclone had carried her across it, and a magical pair of silver shoes had carried her back again.”

pg. 103 Book 3 Ozma of Oz, “Fist came a magnificent golden chariot, drawn by a great Lion and an immense Tiger, who stood shoulder to shoulder and trotted along as gracefully as a well-matched team of thoroughbred horses. And standing upright within the chariot was a beautiful girl clothed in flowing robes of silver gauze and wearing a jeweled diadem upon her dainty head. She held in one hand the satin ribbons that guided her astonishing team, and in the other an ivory wand that separated at the top into two prongs, the prongs being tipped by the letters ‘0’ and ‘Z’, made of glistening diamonds set closely together.” The way this was used for programming is that guard alters are made out of kittens, who believe they are fierce tigers and lions and other wild cats. Ozma, represents the Illuminati Queen Mother with her crown and scepter.

pg. 104 Book 3 Ozma of Oz, On this page we see Ozma of Oz, the Scarecrow, the Saw-Horse, the Tin Woodman, and soldiers. These characters were used in the programming. Toward the bottom of the page is something that was built into the Systems so that alters would stay in place in their internal world, “...the green carpet rolled itself up again...In order that their feet might not come in contact with the deadly, life-destroying sands of the desert.”

pg. 117 Book 3 Ozma of Oz, “Dorothy took the key to Tiktok from her pocket and wound up the machine man’s action, so that he could bow properly when introduced to the rest of the company.”

pg. 119-120 Book 3 Ozma of Oz,” ‘Let me introduce to you a new friend of mine, the Hungry Tiger.”...he displayed two rows of terrible teeth and a mouth big enough to startle anyone.’

‘Dreadfully hungry,” answered the Tiger, snapping his jaws together with a fierce click.”’ This is programming for deeper cats in an alter system. The next page tells how this is used to teach the child alter cannibalism. “...the tiger. “For my part, I’m a savage beast, and have an appetite for all sorts of poor living creatures, from a chipmonk to fat babies.’ ‘How dreadful!’ said Dorothy. ‘Isn’t it, though?’ returned the Hungry Tiger licking his lips with his long red tongue. ‘Fat babies! Don’t they sound delicious? ...If I had no conscience I would probably eat the babies and then get hungry again, which would mean that I had sacrificed the poor babies for nothing....For it is the nature of tigers to be cruel and ferocious, and in refusing to eat harmless living creatures I am acting as no good tiger has ever before acted.” This part of the book is used to help teach the child alters which think they are tigers to be cannibalistic and actually participate in eating babies. This is all filmed to be used against the mind-controlled slave.

pg. 130-3 1 Book 3 Ozma of Oz, “ ‘No one knows, exactly,’ replied the Princess. ‘For the King, whose name is Roquat of the Rocks, owns a splendid palace underneath the great mountain which is at the north end of this kingdom, and he has transformed the queen and her children into ornaments and bric-a-brac with which to decorate his rooms.’” ‘I’d like to know,” said Dorothy, ‘Who this Nome King is?’”

‘I will tell you, replied Ozma. ‘He is said to be the Ruler of the Underground World, and commands the rocks and all that the rocks contain. Under his rule are many thousands of the Nomes, who are queerly shaped but powerful sprites that labor at the furnaces and forges of their king, making gold and silver and other metals which they conceal in the crevices of the rocks, so that those living upon the earth’s surface can only find them with great difficulty. Also they make diamonds and rubies and emeralds, which they hide in the ground; so that the kingdom of Nomes is wonderfully rich, and all we have of precious stones and silver and gold is what we take from the earth and rocks where the Nome King has hidden them....the Ruler of the Underground World is not fond of those who live upon the earth’s surface, and never appears among us. If we wish to see King Roquat of the Rocks, we must visit his won country, where he is all powerful, and therefore it will be a dangerous undertaking....the furnaces of the Nome King....a single spark of fire might destroy me entirely.’ ‘The furnaces may also melt my tin,’ said the Tin Woodman; but I am going.”’ ‘I can’t bear heat,’ remarked the Princess... This is used to program in the dwarfs who mine the jewels (programs). The dwarfs are often demonic imps or gnomes, rather than being real alters. Notice that the story line fits in beautifully with the Hell Pit that the

- Programmers so often put at the basement of people’s minds. The Hell Pit would have programming to make someone burn. If someone approaches where the Dwarfs live (which is deep underground--deep in the mind) they will burn. Notice again the words diamonds, rubies, emeralds, silver and gold which are all parts of programming codes.

pg. 139 Book 3 Ozma of Oz, “ ‘But I know enough to obey my masters, and to gid-dup, or whoa, when I’m told to.” This is teaching obedience. “Lower down the table were the twenty-seven warriors of Oz.” This was used to create alters within the internal world.

pg. 147-148 Book 3 Ozma of Oz, The form was that of a gigantic man built out of plates of cast iron, and it stood with one foot on either side of the narror road and swung over its right shoulder an immense iron mallet, with which it constantly pounded the earth. These resounding blows explained the thumping sounds they had heard, for the mallet was much bigger than a barrel, and where it struck the path between the rocky sides of the mountain it filled all the space through which our travelers would be obliged to pass.

Of course they at once halted, a safe distance away from the terrible iron mallet. The magic carpet would do them no good in this case, for it was only meant to protect them from any dangers upon the ground beneath their feet, and not from dangers that appeared in the air above them. “Wow!” said the Cowardly Lion, with a shudder. “It makes me dreadfully nervous to see that big hammer pounding so near my head. One blow would crush me into a door-mat.”

“The ir-on gi-ant is a fine fellow,” said Tiktok, “and works as stead-i-ly as a clock. He was made for the Nome King by Smith & Tin-ker, who made me, and his du-ty is to keep folks from find-ing the un-der-ground pal-ace. Is he not a great work of art?”... “No,” replied the machine; “he is only made to pound the road, and has no think-ing or speak-ing at-tach-ment. But he pounds ve-ry well, I think.”...

“Is there no way to stop his machinery?” “On-ly the Nome King, who has the key, can do that,” answered Tiktok....Meanwhile the giant continued to raise his iron mallet high in the air and to strike the path terrific blows that echoed through the mountains like the roar of cannon.” This was used as the script to place in Thor, a giant who protects the programming. Very severe split brain headaches are programmed to occur to the victim, whenever the internal Thor pounds his hammer. If the programming is threatened, Thor and the imps (demons) appear, to protect it. There are an entire series of events using programming and obedient alters that takes place to protect the programming, if it is ever threatened.

pg. 159 Book 3 Ozma of Oz, “There was no reply, except that the shifting Nomes upon the mountain laughed in derision. ‘You must not command the Nome King.’ said Tiktok, ‘for you do not rule him, as you do your own people.’ The purpose of this part is to prepare the child’s alters to accept that internal Queens and other leading alters do not rule the demons that are placed into their system, and are not to order them around.

pg. 163 Book 3 Ozma of Oz, “In the center of this room was a throne carved out of a solid boulder of rock, rude and rugged in shape but glittering with great rubies and diamonds and emeralds on every part of its surface. And upon the throne sat the Nome King.

pg. 167 Book 3 Ozma of Oz, on this page is a picture of the Nome King telling Dorothy and Ozma that, “They belong to me and I shall keep them.” In other words, the imps and their jewells belong to the king of the demons. Around his throne are steps with gems, and this imagery was used to build the internal gems in a system, with Satan/the AntiChrist’s throne at the top of the stairs.

pg. 170 Book 3 Ozma of Oz, “Although this army consisted of rock-colored Nomes, all squat and fat, they were clothed in glittering armor of polished steel, inlaid with beautiful gems. Upon his brow each wore a brilliant electric light, and they bore sharp spears and swords and battle-axes if solid bronze. It was evident they were perfectly trained, for they stood in straight rows, rank after rank, with their weapons held erect and true, as if awaiting but the word of command to level them upon their foes.” ‘This,’ siad the Nome King, ‘is but a small part of my army. No ruler upon Earth has ever dared to fight me, and no ruler ever will, for I am too powerful to oppose.’ This was to help build acceptance within the child of the layering of armies of demons.

pg. 180, Book 3 Ozma of Oz, “For upon the edge of the table rested a pretty grasshopper, that seemed to have been formed from a single emerald.” The next page has a picture of a grasshopper wearing a hat and many shoes. This was used to help the victim take the hypnotic suggestion that their programmer was a grasshopper, a cricket. Mengele used a clicker which helped with this hypnotic suggestion too.

pg. 182-183 Book 3 Ozma of Oz, “...the King returned to his throne.... they were greatly disheartened by...the knowledge that she was now an ornament in the Nome King’s palace -- a dreadful, creepy place in spite of all its magnificance. Without their little leader they

did not know what to do next, and each one, down to the trembling private of the army, began to fear he would soon be more ornamental than useful....’Never mind,’ said the jolly monarch. ‘If he doesn’t care to enter the palace...I’ll throw him into one of my fiery furnaces.’

pg. 184 Book 3 Ozma of Oz, “...twenty-six officers filed into the palace and made their guesses---and became ornaments.” Story line used to program parts to become useful ornaments. “...he wore a heavy gold chain around his neck to show that he was the Chief Steward of the Nome King...” Many of the abusers signify their power to the slaves, by wearing a gold chain around their neck.

pg. 186 Book 3 Ozma of Oz, on this page it states that some magical power gave the King the ability to know all that took place in his palace. By crediting their abilities to an occult magical dimension, the programmers enhanced their appearance of power to the child victim. pg. 192 Book 3 Ozma of Oz, on this page and the surrounding pages, the people who have become ornaments are also assigned colors. The Queen of Ev “are all ornaments of a royal purple color.” and “all those people from Oz into green ornaments.”

pg. 194 Book 3 Ozma of Oz, ‘If I wore the magic belt which enables you to work all your transformations, and gives you so much other power....What color will you make the Kansas girl? asked the Steward. ‘Gray, I think,’ said his Majesty. ‘And the Scarecrow and the machine man?’ ‘Oh, they shall be of solid gold, because they are so ugly in real life.’ This was the script to bring in the color programming. Color programming is discussed in the Structuring chapter (7) and the Internal Controls chapter (11) dealing with the internal computers, and in chapter 4 where the codes are given.

pg. 192 Book 3 Ozma of Oz, ‘What more do you want?’ demanded the King. ‘A fat baby. I want a fat baby,’ said the Hungry Tiger. ‘A nice, plump, juicy, tender, fat baby.’ When the alters are forced to accept that they are tigers and other cats, then they are encouraged (forced) into cannibalism.

pg. 200 Book 3 Ozma of Oz, “So Tiktok touched a yellow glass vase that had daisies painted on one side, and he spoke at the same time the word ‘Ev.’ .... In a flash the machine man had disappeared,...” This was part of the programming to introduce daisies and switching.

pg. 201 Book 3 Ozma of Oz, “Next she touched the image of a purple kitten that stood on the corner of a mantel, and as she pronounced the word ‘Ev’ the kitten disappeared, and a pretty, fair-haired boy stood beside her.” This is teaching the switching of alters and their color programming.



**We will stop our coverage of the Ozma of Oz book here. We have only partially covered only two of the 14 Oz books, all of which were used as programming scripts. There are many more sections in this series of 14 books that served as programming scripts, but the reader has got the basic idea. It is still important to go over how some of the other books were used in programming, so that the reader begins to see how the story lines assist in programming, and how the story lines are so frequently tied together from perhaps 12 different stories to reinforce one alter’s programming.



ALICE IN WONDERLAND

Alice Through the Looking Glass

‘I can’t believe that!’ said Alice. ‘Can’t you?’ the Queen said in a pitying tone. ‘Try again: draw a long breath, and shut your eyes.’ Alice laughed. ‘There’s no use trying,’ she said. ‘One can’t believe impossible things.’ ‘I dare say you haven’t had much practice,’ said the Queen. ‘When I was your age, I always did it for half an hour a day. Why, sometimes I’ve believed as many as six impossible things before breakfast.” The chapter “Which Dreamed It” in Alice Through the Looking Glass has sexual programming, the Red Queen is purring. The story where Walruses make believe it is oysters is used for programming. Other sexual programming occurs in the chapter “It’s my own invention” where the Knight In Crimson (& White) Armor are prisoners which dual for her. Tweedle Dee & Tweedle Dum is used for S&M programming, which has a hand signal involving rotating the thumbs of a clasp hand. Alters go through the looking glass, and fall down an oak tree by falling into a deeper and deeper trance. Monarch programming is a reflection of how Satan’s mind works. Lewis Carroll’s bQok with its inversion themes fits in with this type of thinking. Lewis Carroll loved the humor of logical contradictions. In the book, Alice wonders if cats eat bats or bats eat cats, and she is told that to say what she means is not the same as meaning what she says. When she eats the left side of the mushroom, she grows large; the right side has the reverse effect. These changes in size are in themselves reversals. A large girl and small puppy end up to be a large puppy and a small girl. In Sylvia and Bruno, we are presented with an antigravity wool that can be placed into a parcel to make it weigh less than nothing, a watch that reverses time, a black light, and a projective plane with outside inside and inside outside. The slave learns that E-V-I-L is simply L-I-V-E backwards. In the looking glass world, the Red Queen knows of a hill so large that compared to it the hill in question is a valley. Also she knows of dry biscuits which quench thirst, a messenger who whispers by shouting, and Alice who runs as fast as she can to stay in one place. (Sometimes it seems we really do have to run fast to stay in place.) The King of Hearts thinks its not unusual to write letters to nobody, and the White King compliments Alice on having keen enough eyesight to see nobody at a great distance down the road. Can you see why this book was so good to program us? In the book Through the Looking Glass all asymmetrical objects (that means all objects which can’t be superimposed on their mirrored image) “go the other way.” There are left-right reversals. Tweedledee and Tweedledum are mirror image twins. The White Knight sings about squeezing his right foot into a left shoe, and there are several mentions of corkscrews. A Helix (a corkscrew) is an asymmetric structure with distinct left and right forms. The book’s type of thinking was extended beyond asymmetrical objects to asymmetrical relations of all types. For example, Alice walks backward, in the railway carriage the guard tells her she is traveling the wrong way. The king has two messengers, “one to come and one to go.” The White Queen explains the advantages of living backward in time, the looking glass cake is handed around first, then sliced. Odd and even numbers, which are equivalent to left and right or on and off are worked into the story at several points. For instance, the White Queen requests jam every other day. Going through the looking glass takes us to a world where the ordinary world is turned upside down and backward. Things go every which way except the way they are supposed to go. Anti-matter is a mirror image. Anti-matter milk will explode Alice, but an Anti-matter Alice on the other side of the looking glass can drink the anti-matter milk. In Chapter 11 Alice captures the Red Queen. It results in a legitimate checkmate of the Red King, who has slept through the entire live size chess game without moving. The checkmate ends the dream, but leaves open in the story the question of whether the dream was Alice’s or the Red King’s. The programming has so often been only a dream to us. The outside world was so often just an unreal dream to us. What was real and what was not real? The real world (for other people) was full of contradictions, and the unreal world (our internal world) was consistent. Everything was upside down, forwards and backwards. In the Looking Glass book, one shuttles back and forth mysteriously between real and dream worlds. “So, either I’ve been dreaming about life or I only dream that life is but a dream.’’ As a slave breaks away from the programming, life becomes a bewildering confusion as the slave is pulled between two worlds. The internal world has everything the alter needs, the external world is a harsh cold reality that doesn’t have much to offer. People in the external world can help make it real for a slave. The handlers will never do this. Alters will need a reason to want to come out of the internal reality which they are programmed to. believe in. For so long much of life was seen as a dream. It will be hard to get a grasp on what was real and what was the lie. Many of the lies are more real than the truth. Life was sometimes like the parallel dreams of the Red King and Alice, like two mirrors facing each other.



The TALL Book of MAKE BELIEVE.

This book was published by Harper & Row in 1950 and was indeed tall, the pages being 4” x 9 1/2”. On page 14, the programmer would read the first paragraph of the poem and then say “sleep, sleep, sleep.” “Have you ever heard of the Sugar-Plum Tree? ‘Tis a marvel of great renown! It blooms on the shore of the Lollypop Sea in the garden of Shut-Eye Town; The fruit that it bears is so wondrously sweet (As those who have tasted it say) That good little children have only to eat of that fruit to be happy next day. Sleep, Sleep, Sleep.”

On page 16-17, there is a story about how a child is dragged under the kitchen door and becomes flat. There is a picture of a child being pulled under a door and coming out flat on page 17. This was used as part of the script to make the ribbons for the slaves. The ribbons in a system can go under doors and through the entire system. On page 23, Rosa the flat person (pancake person) is shown again. This is ribbon. The top of the page has a large cricket like creature that was said to the child to be the programmer (Dr. Mengele). All of the stories in The Tall Book of Make Believe were used one way or the other in programming. We will just touch on some notable points. On page 38 is a poem about a Mr. Nobody. The programmers like to have alters identify themselves as “nobody”. On page 39 is a poem/story about “someone” who comes tapping...but it is “only the cricket whistling”. This was used to help program in that the 3 taps were the cricket (the cover image for the programmer.) On page 50, is the story of a girl who when she lays down becomes a different person Mrs. Brown. On page 67 is a poem Foreign Lands, where the child sees “the sky’s blue looking glass” and then ends up “to where the roads on either hand lead onward into fairyland.. .and all the playthings come alive.” In other words, what is in effect being communicated is: take the hypnotic image of flying into the sky in Papa’s silver plane (as the plane goes up the trance goes higher -deeper) and then go into a fantasy land where all your wishes can come true--so that you can escape the hell us programmers are giving you. On page 79 is the story of a ghost named Georgie who would run home and warn people at home when things were broken. This was part of the “fix me” programming--so that ghost-like alters, known as reporting alters, call “HOME” to “PAPA” if the programming is touched. On page 84 is the story “How they bring back The Village of Cream Puffs When the Wind Blows it away.” This story has several programming words in it, these words and their meanings are as follows: In programming the “Village of Liver-and-Onions” is a code word for “the coven. “Prairie” means “ceremony site”, and in another story “picnic” means “ritual”. It’s doubtful that most alters would remember these meanings, but they helped the abusers confuse the child. Imagine the victim trying to describe a ritual and telling someone that a village of liver & onions had a picnic.



ALIEN PROGRAMMING SCRIPTS

There are numerous scripts for the Alien programming. Recent novels and Hollywood movies provide a non-ending pool of programming resources for the Programmers. Visual reality headgear and other high-tech methods can easily be incorporated into an alien abduction theme. The following are samples of some of the people who the author Fritz has spent time with, who on one level knew they needed help, but didn t know just what they felt uneasy about.



PERSON 1. Had been abducted by aliens since she was a small child. Different types of aliens took her. Her mother worked for the CIA at Area 51. Her mother was abusive to her. One of her best friends is a Monarch slave. When the aliens come a bright light appears and then they abduct her. The aliens she works with the most look exactly like people, and in their handwriting show severe abuse. These benevolent aliens have taken her fetusus several times. She has time-travelled to their planet. She is dissociative. The government authorities are constantly monitoring and tracking her, and have made an effort to besmudge her record, so that it appears like she is looney tunes. This is the type of cases that this book s co-author has spent time working with. Doesn t this sound more like human mind-control than real aliens?

PERSON 2. This person hears aliens within his head (which when described sounds like a case of MPD (DID). The aliens would take him and force him to have homosexual activities even though he didn t want to participate. But that was O.K. to him, because they were a superior race and if these benevolent aliens which are so far advanced beyond us, want to have sex with him, that is their perogative. This person has a lot of depression. This person wonders why the authorities seem to keep track of him.

PERSON 3. This person worked at Area 51. Has a photographic memory throughout his entire MPD system. He realizes that he is MPD. His best friend claims to be an alien, a god of sorts, and is known by both this person & Fritz to be part of Naval Intelligence. This best friend acts more like a handler than an alien, and this Area 51 worker gives his best friend total alligiance. This man has all kinds of alien type stories, which sound in many cases like programming. This person admits that his family is Illuminati, and the front alters say he has watched Illuminati rituals as an adult, but hasn t participated . He shows signs of severe abuse. He is afraid to talk about trauma-based mind-control, but loves to talk about aliens. In fact, all three of the persons discussed on this page shied away from talking about Monarch mind-control, as if it were something not important, but they all love to talk about aliens.

And the list of interesting people like this could go on. When Mind-controlled slaves who have alien programming are being abducted by the intelligence agencies for their use and for programming here are some of the details of how and what occurs: A bright light is shined into their house. They have been hypnotically conditioned to view this light as a Flying Saucer, whether it is a helicopter or something else. As the NWO does have Flying Saucers, sometimes the real thing is used. Men in Black (just like in SRA cases) are often associated with the abductions. And the slaves frequently speak about "shadows in the mind." The slaves are taken to rooms where examining tables with white sheets and X-ray machines, Headgear and medical equipment is in place. (The alien equipment has gotten more high-tech over the last 40 years. The aliens wear suits that are full of occult symbology. The people are restrained with clamps and electrical shock and energy is used on them. They are told that they are receiving information. They are given tracking implants and other implants. All of the 3 above persons, receive information from the aliens regularly. Almost all of the elements of Monarch trauma-based mind-control appear in these abduction accounts, especially in the psychological features of the victim. The victims of alien abduction programming feel suicidal after they talk too much. They have headaches, sleep difficulties, nightmares, obsessive thoughts, a fear of hypnosis, trapped feelings, and paranoia. During their abductions the aliens use drugs, thought transfers, and painful medical procedures. The aliens use language that parallels the messages given to SRA victims, just change the language from Satan is in charge to the Aliens are in charge . Cattle mutilations where the blood has been drain are associated with abductions. There is documented accounts where cattle mutilations have been connected to Satanic cults using helicopters. The victims of aliens are forced to be impregnated and then the fetus is repeatedly taken. The aliens are repeatedly telling these victims that a holocaust is soon to come. Another strange phenomena, that others and this author have noticed is that these victims of alien abduction seen to know each other, much in the same way that victims of Illuminati mind-control seem to know each other. And the aliens seem to know everything about the victims. The victims have amnesia of their abductions. The memories of their abductions are hidden in altered states of consciousness, that hypnosis sometimes can pull up. Most victims are afraid of hypnosis or can t be hypnotized (they have been hypnotized not to allow anyone else to hypnotize them.)

To give credit where due, Bowart s Operation Mind Control Researcher s edition, (1994) has an excellent appendix with charts which compare SRA mind-control victims and alien abduction victims. The charts reveal how similar the two groups are. In preparing these paragraphs, we have used his charts as as a basis for how we wrote these last two paragraphs up. However, the co-authors experiences in working with abduction victims match the findings of Bowart. Do aliens from another planet exist? They may or may not. It is not a real issue, we have to face what is already on this planet. Fritz has several tapes of aliens of different types talking (which were obtained from abduction survivors) and their voices sound demonic and they are saying that they have been alive on this planet for many years. One said something like he s been here on earth 500,000 years. If an alien has lived on this planet for 1/2 million years, when does he get residence status. My! If that is true, he is no alien--we are! But one thing is certain, this planet contains some very slimy evil creatures who are either real non-humans or very deceptive dark humans. The Bible calls them demons and reprobate men. The four most popular origins of supposed aliens on earth are all star groups relatively close to our solar system. They are: the Piciades, known as the 7 or 9 sisters, because their are 9 stars of which 7 are visible; Sirius, the dog constellation; the Orion constellation; and the twin stars of Zeta Reticulli, which twin stars were amazingly charted by Chinese astrologers in 3,000 B.C.! Fritz, the co-author of this book kept an open mind on the issue, could there be any benevolent aliens ? Some abductees believed that their aliens were benevolent, but when they are debriefed the admit that mind-control and sexual molestation is carried out by the aliens. Fritz, has concluded with other investigators on this question, there are no benevolent aliens , in fact the only aliens that may be around are what have been known as demons. People who have participated in high level Illuminati ceremonies report the presence of creatures that look like the various aliens . (This whole subject is dealt with in another book by Fritz Springmeier.) Some points might be briefly brought out. Fritz has amassed a great deal of evidence that the elite have human-built Flying Saucers.

Notice how the controlled media always link aliens with Flying Saucers and UFOs? This is an entire book in itself, however, the bottom line is that at least most (if not all) of the alien abductions are simply part of the NWO s mind-control. It is obvious that for various reasons (including the goals set down in the secret Iron Mountain government report), the government (including cooperating agencies like NASA) decided to use an alien abduction theme rather than a Satanic Ritual Abuse theme to their mind-control programming. The major differences in the programming methodology is that the blood rituals of the SRA are no longer used. The reason why blood rituals are no longer needed is that the high-tech harmonic machines (which implant thoughts-see chap. 6) and other high-tech methods eliminate the need for the blood traumas. The victims of alien abductions are taken at random, where the Illuminati victims are abducted more frequently around ritual dates. The person who believes in UFOs and aliens is going to receive the same type of treatment as those who believe in Satanic Ritual Abuse. The legal system and society at large are conditioned to treat them as nuts. This protects their abusers. An Illuminati hierarchy member described their magic goal of pursuing a spiritual path through the finer frequencies of outer time. The alien programming is one way to experience this.



ISLAND OF THE BLUE DOLPHINS

This is a child s book by Scott O Dell. The people of an island have both an everyday name and a magical name. When the chief gives his magical name to a Russian captain named Orlov, he and his warriors end up being killed in battle. The alters of Monarch slaves have names they can give outsiders and then their access code names which must be kept secret. Part of the story is to stay in line with what one s ancestors have done. Other items in the book, such as the four winds from the four directions fit in with programming too. The book is just one of many that the programmers want the children to hear so that they naturally adopt the correct programming scripts.



THE LORD OF THE RINGS

Some Illuminati survivors are always looking for a ring. Rings play a significant part in the lives and programming of slaves. One section that is coding/programming found in J.R.R. Tolkien s Lord of the Rings is One Ring to rule them all, One Ring to find them, One Ring to bring them all and in the darkness bind them.



THE MOST IMPORTANT PROGRAMMING SCRIPT -- THE LESSER KEY

One of the most important scripts for the Illuminati Mind-control Programmers is the Lesser Key of Solomon Goetia, The Book of Evil Spirits. The Illuminati Doctors Green, Black, White and Blue (that is Mengele, Wheeler, Cameron, and Mueller) were fully knowledgeable about The Lesser Key of Solomon Goetia. In fact, all those who go beyond the initial levels in the Illuminati are required to study the entire book. It s an important ritual book.

It is very out of fashion to believe in demons. It is in fashion to believe in aliens, in ghosts, in the internal psychological wizard that guides you , and other things which to those high in demonology secretly know are simply covers for what used to be called demons. Both the high level Illuminati and the alert Christians are saying many of the same things concerning demons. Is “magical” phenonmena real? Do the programmers really believe in it? In the Lesser Key of Solomon Goetia it answers, “I am not concerned to deny the objective reality of all ‘magical’ phenonmena; if they are illusions, they are at least as real as many unquestioned facts of daily life; and...they are at least evidence of some cause.” (p.10) The author of the Lesser Key of Solomon Goetia then points out that all our sense impressions of the universe are dependent upon changes in the brain. Reality is a perception of the mind. So the author states, “...we must include illusions, which are after all sense impressions as much as realities’ are, in the class of ‘phenomena dependent on brain changes.’ Magical phenomena, however, come under a special subclass, since they are willed, and their cause is the series of ‘real’ phenomena called the operations of ceremonial magic.” In other words, when the Illuminati practice ceremonial magic, their magic to them is as real as life, but they do not feel a need to defend its reality. People in the occult encourage children to fantasize. Fantasy is looked at with favor. Whether the power and healing and mind-control of demonology stems from illusion or Jung’s autonomous power of the human psyche to attract & manifest archetypes through the human soul or some other source is not an issue for Satanists. They are seeing results, power, healings and the destruction of their enemies by demonology. Within the Illuminati illusion, myth, and perception are all esteemed. Are they alone? Are they alone? No, they are not alone. The myth that the United States is a democracy is probably a far stronger “reality” in the minds of Americans than the actual reality that it is a tightly controlled secret oligarchy with a republican front. But in this case, which is the greater real reality? The American believes his myth enough that he dies for it. He fights the “war to end all wars” and then the “war to save the world FOR DEMOCRACY” (to quote some popular world war slogans). In the American mind, he achieves victory even though he has fought and died for a myth. And even when the mythical goals he fought for aren’t even achieved, he believes he has achieved a victory. The first world war never brought everlasting peace and the war to save the world for democracy ended after “victory” with more of the world under stronger totalitarian rule than before the war began. The bottom line is that myths and illusions make up a large part of the reality of most people’s lives. Movie actors have repeatedly found out that they incur their fan’s wrath if they try to reveal their real selves to the public. The point also is that the person practicing ceremonial magic will not be impressed by the average person, even if he be a minister, who has structured his life on myths and illusions, who will tell him that his ceremonial magic is not real. The magician will naturally ask, “Who IS living in a world of reality?” Ceremonial magic is a very strong “reality” to the Illuminati’s mind-controlled slaves, because the programmers make great efforts to develop the five “impressions” listed on page 11 of The Lesser Key, which are:

(1) Sight. The circle, square, triangle, vessels, lamps, robes, implements, etc.

(2) Sound. The invocations.

(3) Smell. The perfumes.

(4) Taste. The Sacrements.

(5) Touch. As under (1).

These are reflected upon by the person, and these 5 produce unusual brain-changes. Later two more senses are also highly developed. Programmed multiple-slaves have visual and auditory aucuity far beyond the normal person. The Lesser Keys of Solomon Goetia goes on to say, “The Spirits of the Goetia are portions of the human brain. Their seals therefore represent methods of stimulating or regulating those particular spots (through the eye).”



“The names of God are vibrations calculated to establish:

(a) General control of the brain....

(b) Control over the brain in detail. (Rank or type of the Spirit)

(c) Control of one special portion. (Name of Spirit.)

The perfumes aid this through smell. Usually the perfume will only tend to control a large area; but there is an attribution of perfumes to letters of the alphabet enabling one, by a Qabalistic formula, to spell out the Spirit’s name.” (p. 12)

Did the reader grasp that? The most important script for the programmers is to use ceremonial magic which uses the names of God to establish GENERAL, & SPECIFIC CONTROL (via a hierarchial arrangement of demons) over a person’s mind. More will be covered about this in Chapter 10. But while we are on the subject let’s go just a little bit farther. “If, then, I say, with Solomon: ‘The Spirit Cimieries teaches logic,’ what I mean is: Those portions of my brain which subserve the logical faculty may be stimulated and developed by following out the processes called ‘The Invocation of Cimieries.’

And this is exactly what the programmers do. They invoke via many rituals all types of specific demon (or demonic energy) to enhance the particular mental functions they want. For instance, Typhon and Choronzon (also Horonzon) are demons who are essential in building the structure of a programmed multiple. They must be invoked before the early start of dividing the mind. Michael Bertieaux heads up the Horonzon Club, an unofficial part of Kenneth Grant’s OTO. The demon Horonzon (or Choronzon) looks like a grey alien, and was conjured up by Sir John Dee, who was Queen Elizabeth I’s genius advisor and court sorcerer. Transyuggothian magic is carried out in order to reach Transyuggothian Space (also known as Trans-Plutonian Space and Universe B). These existence of these dimensions are kept very secret. The ancient cult of the Star Sirius, from which supposedly we are now getting aliens, had rituals to get one into the celebrated Universe B. Sirius B (the binary twin star that exists with the actual Sirius A star) represented the god Ra Hoor Khuit. Sirius A represented the Egyptian devil. Let’s reflect on all this demonic “illusion”. As stated, an American will die for the myth that America is saving the world for democracy. This made sense to psychologists at the time. However, if a slave dies for what he sees as the reality of voodoo magic, the psychologist dismisses it as unimportant--a mere coincidence. Since voodoo magic doesn’t exist in the psychologist’s mind, the psychologist believes that magic carries no threat to its intended victim. Likewise, because the psychologist doesn’t believe in demons, demons supposedly pose no threat to the mind-controlled slave. The psychologist is really projecting his perception of reality upon someone else, and it doesn’t work. The Illuminati programmers are counting on the therapists ignoring demonology. In Bowart’s in-most-respects excellent book Operation Mind Control, (Researcher Edition, Ft. Bragg, CA: Flatland, 1994, p. 249.) asks the reader to self-hypnotize himself by several times “looking into your mind’s eye”. To Bowart, he sees the trance state as merely looking into your mind’s eye. He does not attribute any demonic activity to be involved with such things. No wonder, Bowart writes very disparagingly and critically about Christians who are trying to do demonic deliverances to slaves. But then as far as I know Bowart hasn’t freed anyone of their mind-control either, he is just a reporter. Both ministers and psychologists have contempt for each other’s excesses. We must bear in mind that the victims of this total mind-control have their bodies, minds, and spirits enslaved. The body, mind and spirit need to be simultaneously liberated. A great deal of the success of the Programmers is that ministers have rejected the study of the mind (psychology) and therapists have rejected spiritual things. The victim is left without a way to heal both spirit and mind. Partial freedom is still slavery. And not only that but both therapists and ministers seem to feel the actual physical threats to the slave’s body to be outside of their jurisdiction, and by default it is left up to the victim to provide. Which again without the body safe and healed, the mind and spirit are not fully free. There are therapists and others who pontificate about how evil Christian ministers are for trying to deliver mind-controlled slaves from their demonic possession. This is not the problem. The problem is that the Illuminati have skillfully separated the various therapeutic elements both functionally and legally. The answer to the enslavement of body, soul, mind and spirit is a team of people who will address all the issues together. Both the psychologists and ministers see the excesses of each other, but a little humility would go a long way, for both sides to recognize each other’s value. God works through all people, even those who resist Him. That is why he can rightly be called Almighty God.



THE USE OF LIES EXTERNALLY & INTERNALLY, THE USE OF COVERS AND FRONTS, & THE ART OF HIDING THINGS IN A SYSTEM



EXTERNAL DECEPTIONS

There seems to be no end to the lies that are involved with the Monarch programming. The old adage that nothing is as it appears, is generally the rule. However, once one catches on to the common tactics of deceptions, the tactics themselves become red flags which can alert a thinking person to what is hidden. This is similar to those Russians who could read between the lines when reading communist propaganda and figure Out the truth. The deception begins with covering up the identity of the slave. Within the Illuminati, the art of hiding genealogies is a fine art. Children are swapped and placed with foster parents. Mothers all of a sudden have babies, when no one has noticed them being pregnant. Investigators like Fritz Springmeier, who have been investigating court house records and other primary documents have seen court house records altered overnight, to cover up genealogical and financial information.



COVERS FOR INDIVIDUAL SLAVES

The individual slave is usually given a good cover. A good cover will be one that cannot be seen through, and still allows the person the freedom to get their job done. When building a cover, the following questions will be asked: how much will this cover allow this person to spend? what kind of people can this person associate with? where can this person go? and what kind of hobby can he or she have? By now, the Illuminati have their secret slaves in so many places that they have their bases covered in all fields. True life examples include: a Monarch programmer who appears to be simply a middle class housewife. A Monarch computer programmer who appears to be a deaf and dumb mute when in the presence of the public, but the deeper brilliant alters work secretly at programming computers during the day. An international spy, who is a programmed multiple, who has a totally different set of I.D. and wigs, so that when they switch to certain alters used for the intelligence agencies--they not only act different, they look different, and have different valid I.D. An apparently dumb blond may be a very intelligent highly trained Monarch slave. Within the intelligence world Monarch slaves will function as Agent Provocateurs, which are people who join groups with the purpose of leading the group to do things that will cause it harm. The neo-Nazis are full of Agent Provocateurs as are some of the Patriot groups. Some Monarch slaves are what is called “clean agents” -- that is they have never been used in intelligence work, so they have no record of use. Monarchs are great for being used by this or that group on a limited basis without anyone suspecting any connection. The Intelligence term for the elaborate cover histories they give one of their Monarch slaves to operate as an agent is called a “legend”. Supporting documents will be placed into the appropriate government files to support the legend. The intelligence agencies may have several intact “legends” for different personalities of a slave. The intelligence term is NOTIONAL. It roughly means “a fictional entity for the sake of an intelligence operation.” Notional organizations are created to steal strength away from sincere organizations. If a church (or non-CIA KKK group etc.) gets too sincere and powerful, a well-financed notional rival will start up, and then later fold under scandal. The net effect is to destroy the entire cause. At least half of the therapists helping Monarch slaves in the authors’ area are programmed multiples themselves! The therapeutic community is heavily infiltrated. The help lines for women in crisis are all dirty. Some of the Christian groups that claim to help SRA victims are really fronts.

One recovering Monarch slave tells about how her father was the mayor of an important city in Pennslyvannia. He was part of the Illuminati and he introduced drugs into his area, and had a monopoly on illegal drugs in the area. As mayor he established the first drug hot line, so that people could inform authorities about drug trafficking. He staffed the drug hot line with his own people and this allowed him to get tips to eliminate his competition. The intelligence agencies which are using mind-control are hiding their drug trafficking and criminal activities. One of the ways they do this is the so-called War on Drugs. The situation is so bad and widespread that even the controlled media has had news where they reported CIA agents smuggling drugs seized in South America into the U.S. using government channels.

When a slave is being programmed, the abusers will use schools, churches, Big Brothers, Boy Scouts and other activities to carry out the abuse and programming. Children pulled from classes will be given back-up amnesia so that they forget that they forgot. In other words, they are totally unaware that they have lost time when they were pulled out of the classroom. The teacher gives them a test score, and they are told they took a test during the missing time. How can the front alters deny it, when they have been hypnotized to believe it and they can see the test scores? Alter boys and boys at catholic orphanages have a record of being used by dirty priests. Recently, numerous priests have been discovered molesting children, and hundreds of lawsuits are underway, but it is still not coming out that this abuse is connected to trauma-based mind-control. In the past, if the parents who were part of the Illuminati elite, but were not religious wanted their boy programmed, they could send him off to a military school run under the cooperation of the Catholic church and units such as the 6th U.S. Army, which became one of the primary infiltrated units. The 6th army uses the magical hexagram as its logo. This would provide the programmed child with a religious front. He could say, “I went to catholic school.” The programming could be disguised as discipline, etc.

The establishment media have worked propaganda wonders for the abusers of the Monarch Mind-control. Britain is extremely repressive in their information control. If any news medium tries to leak the most simplist of information a secret document called a notice” will be sent at any time of day to them from a D-notice committee, and the media will have to stop whatever reference is deemed a secret. In the U.S. it in effect works as tight, it just is not officially as tight. The abusers know that they also have an Incredulous Factor that can assist them. Who would believe that a sweet child drinks blood and is cannabalistic? The more that they can do that is far fetched, the less credibility the child has if they do talk. Some children do try to talk. One Monarch slave talked at age five, and her entire family came down hard on her and blamed the child’s talking for the death of one of the abusers. What kind of proof can a child bring that adults will accept? In the McMartin Preschool case about 800 children were witnesses whose stories colloborated the SRA and programming that was done, but the media, and the judicial system were able to cover up the abuse and make it look on television that the abusers were the victims! It wasn’t until after the case was over and the property sold, that the tangible proof (the secret tunnels with paraphenalia) were found, and then the news media has covered that up too. The abusers will often wear masks and costumes. Let’s say a programmer wears a Mickey Mouse outfit, and the child would remember and tell, “Mickey Mouse hurt me.” Now who is going to believe the child? The child has told the truth, but will be reprimanded for telling the truth. It doesn’t take long for a severely abused child, who has been programmed to keep silent, to learn that no one wants to hear the truth anyway.



THE USE OF RELIGIOUS FRONTS

A great deal of Monarch programming and slave abuse, (as well as the drug trade) is done under three major covers or fronts:

Religious Fronts, the Front of National Security and the Military, and the Entertainment fields, especially the Country Western Industry, the Rock Music Industry and Hollywood. The religious fronts were popular for centuries, especially when groups like the Jesuits, the Assassins, and other groups held immense power. Religious fronts are still being used such as J.Z. Knight, Elizabeth Claire Prophet’s CUT church, the Church of Scientology, the Charismatic movement, Jim Jones & Jonestown, and David Koresh’s group etc. Billy Ray Moore’s Lord’s Chapel is entirely a mind-control operation. There is a nondenomination Pentecostal church is southern Washington whose entire membership is Satanists under mind-control. Various overseas “missionary” groups are covers for the CIA & mind-control. It would take a book to explain how these religious fronts are part of the total trauma-based mind-control and how they operate to protect mind-control, however there are publications which go into some of the CIA connections to these groups. It is suggested that interested persons read these publications. Some of the deceptions such as the lone assassin idea have been used for centuries as a cover for assassinations planned by the occult hierarchy. If we are going to really reveal how the Monarch Mind-control is done, we will have to explain how the deception is done. If one describes a chameleon only by saying “it is like a lizard”, without mentioning the camouflage, then the most important part has been overlooked. Religious fronts are an important part of the Illuminati program for making slaves. In fact, due to their gnostic philosophy of balancing their good deeds with their bad deeds, it is almost essential to have a religious front through which one can do good deeds. Even though adding this section to the book will spur some to blindly lash out at the book, still the whole story needs to come out. When we, the authors of this book, write that the Monarch-type total mind-control threatens everything this nation stands for, we are not exaggerating. The Monarch Mind-control program has not been used just to program slaves--but it has been part of a much bigger deception. When this deception is realized by this nation, it will shatter the very fabric of trust that Americans have in their institutions. If Americans will begin to understand the power structure behind their institutions, and who controls this structure, they will begin to see the lies in the scripts that they have been fed since infancy. And YOU, the reader of this next section in this book, if you love the truth, can help begin the healing process to overcome some of the devastation that is going to rock this nation when the truth comes out. This next section will help both Christian and non-Christian reader. The therapist can learn about what is happening so that they can better deal with what the SRA survivors are beginning to reveal. The grooming of the American people to believe massive amounts of lies did work, UNTIL a few loving therapists, ministers, and doctors began to liberate victims of the Monarch trauma-based mind-control. These programmed multiples began revealing a horror story of deception unparalleled in history. For the reader to deal with the next section means courage. It means that the reader will have to muster up some of the same type of love of truth that the mind-control survivors must muster to free themselves of the lies of their satanic programming. What we see and hear can be programming, in the same way SRA victims are deceived. Everyone in the Illuminati of any significance has participated in grooming the public to believe that Billy Graham is a great man of God. Graham has stood beside each of the Presidents and the Pope. The Illuminati don’t just program individuals, they program whole nations. The public has been led to believe in a television image. But what if the secular media’s image of Billy Graham is not real? For Christians it means that they can quit trusting in a man, and place their trust fully on God. For secular readers, they can begin to see the extent of how America’s institutions have been corrupted by the horrible trauma-based mind-control. The heart-beat of the Body of Christ is crying out that something is terribly wrong. We will address that. All of us, whether Christian or not, must step out of the lies and look clearly out into the darkness and see every facet of this evil mind-control. When men who worship the god of this world place “In God We Trust” on the Federal Reserve bank notes, we who know the truth must step out of our dream world and realize that they mean Lucifer. (By the way, the Federal Reserve is not a government agency, but a private banking institution of the Illuminati. This has been documented in a number of writings.) The issue at hand in this next section is to show how the institution called “the Christian church”, and the world in general has been deceived by a programmed multiple and this trauma-based mind-control. Secular readers will be shown that the doctrines that Christians want to believe in, have been subtly destroyed under the disguise of building them up. This is no different than the destruction of the positive values which hold any group together. (After the repeated colloboration by essentially all the Christian churches worldwide in many activities as the NCC, the Billy Graham Crusades, the Promise Keepers and other programs, the Christian churches, Orthodox, Catholic, Protestant & non-denominational can be considered one institution.) The infiltration and control of the Christian religion has been one of the easiest tasks of the Illuminati. The Christian churches are what the intelligence agencies called “SOFT TARGETS.”



THE DECEPTION OF BILLY GRAHAM, A MIND-CONTROL FRONT


In 1992, Billy Graham broadcast all over the U.S. his radio show called Embrace America 2000. In the Louisiana area, it came over the KJAM Lafayette Station. During the show, Billy Graham told the American people we need to embrace the New World Order. Billy Graham is also on record stating that people can have salvation through paganism (another name for witchcraft). For instance, in McCall Magazine (Jan. 1987) Graham stated, "I used to believe that pagans in far-off countries were lost--were going to hell. I no longer believe that. I believe that there are other ways of recognizing the existence of God--through nature, for instance." Pagans believe that salvation can be obtained through nature. This is not a pleasant story. Billy Graham has been built up to be the most respected popular person in America, Who wants to find out they have been deceived? We will try to give you the facts, or evidence, and may God grant you wisdom as you read this. This section is not propaganda for our own personal views. Years ago, when Fritz set out on his search, he had no final outcome in mind. Fritz isn’t concerned with concealing facts one way or the other. There is no desire to stampede our readers any where. We do want to clarify many issues. We do want to help the truth seeker. But the co-authors personally have no battle to win, except that truth be brought forth. The issues at stake are not trivial. Historically, Billy Graham’s deception is one of the ,,greatest" deceptions that has ever been perpetrated. Some might argue the greatest, making Benedict Arnold, Quisling, and the Trojan Horse pale into insignificance. Allow us to introduce you just briefly into the world of the Illuminati, All top hierarchy Satanists are required to have covers, The Illuminatus will have multiple personalities, and he or she will have one personality that is particularly shown to the outside world. They (the Programmers, handlers and the Illuminati councils) try to get the best covers that they can. They like to be clergymen, but they are also mayors of big cities, lawyers, doctors, etc. A Christian psychiatrist who has worked with numerous victims of Satanism and Multiple Personality Disorder wrote this observation after having worked with a large number of ex-multi-generational programmed Satanic multiples, "Some satanists have invaded the church as it is the perfect cover for them. They masquerade as angels of light and gravitate towards positions of leadership in order to have more influence. Because much of what they say is sound doctrinally, they are rarely detected. Most survivors whom I have worked with had satanist parents who were in high positions in churches; many were pastors." (Dr. Fox, Loreda. The Spiritual and Clinical Dimensions of Multiple Personality Disorder. Salida, CO: Books of Sangre de Cristo, p. 196.) Let us repeat what Dr. Loreda Fox said, "Most survivors whom I have worked with had satanist parents who were in high positions in churches; many were pastors." She didn’t say "some," she said MOST. Independently, we have discovered the very same thing. People don’t grasp that just because a preacher can sincerely preach what seems a "perfect sermon," doesn’t mean that he can’t also be part of the Satanic hierarchy. What is happening with the Illuminati’s ability to create programmed multiples is that we are getting perfect preachers who are secret hierarchy members. Some of their "perfect sermons" are full of slides, such as "the Christian people need to get involved in the voting process. Christians love to hear such things, it tickles their ears, but the truth is that the entire voting process has been captured and corrupted. Voting machines have repeatedly been exposed to have been rigged, and the controlled media and public denial have prevented Americans from giving up their myth that the common man’s votes run this nation. (The subject of election corruption is dealt with in Fritz’s newsletters, etc.) In Fritz’s Be Wise As Serpents book (which exposed Billy Graham as a Luciferian in 1991), it is explained that high level Satanism is Gnosticism which requires that "the Force" of these great satanic magicians be balanced. In other words, in high level Satanism your good deeds must balance your evil deeds. People do not realize that unless someone does "good" deeds they cannot be a high level Satanist. That is why some of the greatest philanthropists are also our leading national satanists, To see Billy Graham do something commendable does not disqualify him from satanism. In fact, it is a requirement if he’s been part of the Illuminati, such as ex-insiders/witnesses say he was. In fact, it wasn’t until working on this book that an eyewitness to the mind-control abuse of at the hands of Billy Graham offered to help contribute to this section of the book. In other words, an eyewitness helped write this. This eyewitness account by the Co-author matches what the list of eyewitnesses that Fritz assembled in 1993 have said, But the eyewitness went further and exposed B.G. crusades’ skillful use of Monarch slaves to launder drug money. Several police officers have stated that today, there is for all practical purposes no police training helping police to understand Satanism. They are highly trained in many areas, but Satanism is avoided. When an SRA case involving multiplicity in Olympia, WA recently happened, the police who investigated the case found that they were treated as international experts in satanism by other policemen. They themselves knew that they knew very little. Where are the experts to teach us about how the Illuminati functions? Where are the experts who know who are in the Illuminati? There is no college open to the public that teaches Advanced Illuminati Studies 401, and gives degrees in Satanism. The expert witnesses are those who have managed to leave the Illuminati and Satanism, and stay alive long enough to talk. But the other side will argue, how can we verify the testimony of your witnesses Fritz? Remember what happened to over 100 people who had some type of knowledge about the Kennedy assassination? Jim Marrs in his book Crossfire on the Kennedy Assassination lists 103 people who were key figures in knowing about the assassination who have died, many in circumstances that indicate assassination. The story we are dealing with here is just as sensitive to the elite as Kennedy’s assassination, because it involves their preparations for the creation of a false Christ, called by Christians the AntiChrist, who will be the master handler/programmer. The LIST OF known & credible WITNESSES If the authors were to call my list of witnesses up to the witness stand--which I can’t for it would be a death sentence to many of them, the list would include:


1 Council of Foreign Relations member, who is secretly against the New World Order

1 National Security Agency person, who is against the New World Order
1 CIA high level administrator
2 Satanists, still in covens, but unhappy enough with the situation to talk
4 ex-Satanists, 3 of which are eyewitnesses, all Christians now
2 ex-New Age leaders who worked with the Conspiracy, both became Christians
1 ex-33° Mason, now a Christian
Various Christians who have worked with Billy Graham, Pastors, etc.
Various therapists working with SRA victims The man who ran Security at the Sacramento Crusade
Alice Braemer, a woman who worked as a secretary for Jeanne Dixon


None, except for a couple of exceptions, none of these people knew anything about what the other witnesses (sources) had said. The high degree of validation and collaboration that separate testimony by witnesses who have never seen each other and live in different parts of the country is very powerful. There are several questions that pop up into people’s minds who are not familiar with who Fritz is, and are not familiar with these witnesses. The type of worries some readers could be naturally having might be: But how are we, the readers, to know how accurate these people are? Are they trustworthy? Do they have a reputation for honesty? Could they possibly be giving false information to discredit a great man of God? These kind of questions can be natural questions for people unfamiliar with how this information was obtained. But we assure you, that what we pass on from these eyewitnesses can be relied upon. None of these worries have any substance to them, because the manner in which Fritz came to find out about Billy Graham has generally been while he was researching other things related to the Illuminati. The author has not been out to build a case, the case has built itself from numerous detached witnesses who have nothing to gain by telling what they know. These witnesses have not come to Fritz to feed him bogus information. Just the paper trail on Billy Graham is very revealing in itself. Generally the information of these witnesses has been confided by these witnesses to their trusted friends. Initially, these witness have had no idea that the information they confided in their trusted close associates would go beyond their most trusted friends. These trusted friends then have had permission to let me contact them or find out their information. The reason why these people are believable is that the information they reveal could get them killed, and second, the manner and circumstances of how the information has originally unfolded has never been in any fashion or method that could be construed as an attempt to give false information.





CLARIFYING WHAT IS LOOKED FOR IN PROOF?



Too many people are considered guilty unless proven innocent--which means that a legitimate search for truth has NOT taken place. On the flip side, we must bear in mind that hidden information that has laid dormant for years may totally reverse our understanding of something. Exceptional circumstances may surprise us, If some item does not lend itself to totally irrefutable, totally unqualified claims, then knowing this, the proper investigator uses words like "almost certainly" and ,,most likely". If the investigator feels strongly that everything is totally clear, he may declare that something is correct "without qualification." This is the nature of proof. We need to understand the qualifications and reservations that often are attached to evidence or conclusions. But we certainly do want to press our investigations as far as possible to get as many "unqualified" conclusions as possible. Of course, by the time we write this, we have already done our investigating, and have one conclusion without any qualification: Billy Graham is working for the Satanic Hierarchy. We want to try to introduce the material in such a way that you will get some sense of the search, so that you will not simply accept our conclusion but will make rational spirit-led critically-thought-out decisions about Billy Graham. So for the sake of the reader’s investigation, please, let us unshackle ourselves from our prejudices and preconceived labels. Let us suspend our judgment about Billy Graham one way or the other, until we have thoroughly studied, prayed and gained discernment about this. It might be interesting to get some of the Masons, who casually without realizing what they were saying, have talked about Billy Graham’s membership, or other aspects of his Masonic involvement. It’s doubtful that such men would be of any value on the witness stand. Their numerous Masonic oaths to lie and conceal Freemasonry under penalties of gruesome death would tend to have more influence on them than swearing on a Bible. (See Duncan’s Masonic Ritual book, p. 30 for the 1st Degree oath.) This type of witness, because they talked accidently and casually are very valuable witnesses to whoever accidently hears them, but unfortunately they must be assumed to be still loyal to the Masonic Lodge and would be hostile witnesses that will not cooperate. If this were an actual court of law, depositions of Billy Graham’ s staff could be taken, so that it could be revealed to the court how many times they have lied. By showing their lies, their testimony would be impeached and Christians would realize that Billy Graham’s staff have played a major role in the deception. This article will put forth evidence that impeaches the testimony of Billy Graham’s staff. We must refer readers to the Be Wise As Serpents book and other writings of Fritz for more information. Also some other books will be named too. Because these leaders are corrupt, they have been participating in the mass deception of the world about what Billy Graham does and who he is. In fact, if this were a court of law all types of people could be subpoenaed to take depositions, and we might find out many more things than we already know.





THE MOTIVATION OF THE CO-AUTHORS


Many people, who like Billy Graham, have imputed evil motives to anyone exposing Billy Graham. As the Scripture say at one point, "Am I to become your enemy because I tell you the truth?" The story about Billy Graham and his life-long career for the Illuminati is not an easy thing for us to write. We do not enjoy speaking negative things against people. We do enjoy speaking positive things about people. And yet no man, no servant of God is above reproach. We can personally have an inner peace that what we have done was what we should have done. Something needs to be done to wake mankind up before its too late.




CLARIFYING WHAT IS ACCEPTABLE TESTIMONY

In some subjects, going to the encyclopedia or almanac will settle questions. In dealing with the Illuminati and high levels of the occult world -- unless the investigator is willing to listen to eye-witness testimony, he or she will get nowhere. There is rarely any written record of their secret activities. But how much stock can be put in eye-witnesses? Many people up to now have criticized Fritz for using eye-witnesses. But remember that if we did manage to get some paper trail or books on the subject, that book paper trail would not be acceptable in court, or even if allowed would not be as important as our eyewitnesses. In court, the written records can be introduced along with the person who recorded them. In other words, the personal witness is still important even with written documents. The testimony of our eyewitnesses expose Billy Graham’s mind-control activities. Still, we want to bear in mind that witnesses have varying degrees of credibility and knowledge. The qualifications of witness in relation to what they are testifying is important. But to simply dismiss all these witnesses because they are not paper is simply to cut ourselves off from many valuable sources of information. In accumulating evidence, the researcher will come upon two types of information. One is prearranged evidence and the other is called casual evidence. Casual evidence is evidence that has just happened to appear by accident. An actual example is when friends of mine met a total stranger who happens to be a Mason and he offhandedly talks about Billy Graham being a Freemason. Casual evidence is simply evidence that happens without the interested party having anything to do with it surfacing. Finding casual evidence is generally "luck"’, In this case, Fritz has bumped into a great deal of casual evidence, simply because he had his eyes open and has been investigating this area for several years. Because of the situation today in this nation, there is little chance to get a proper hearing of this information. In terms of the future, indeed, the backlash from this book may silence us. The truth will still remain, even if we and the other witnesses don’t. We can draw conclusions about ducks from studying various types of ducks. I can not draw conclusions about radios from studying ducks, I can generalize about American made cars, but I can’t include in my generalization about American cars an ox-cart in India. This may sound basic, and it is, yet people try to generalize by lumping the generational Satanists in with everybody else, and it just doesn’t work. They also try to draw conclusions about the Freemasons on the basis of what the Rotary Club they belong to is like and it just doesn’t work. In terms of trying to get a proper hearing today, one of the barriers is that people use their own experiences to draw conclusions. People have nothing in their experience to allow them to draw conclusions about the Illuminati programmers/handlers who are moral degenerates and programmed multiples, who will do anything, in spite of their nice fronts.





The policies of DECEPTION by the Billy Graham Crusade staff

In 1992, a Christian named Richard Bennett, a friend of Fritz’s confronted the Billy Graham Crusade staff. What he was concerned about was the Billy Graham crusade policy (that has been in place since the 50’s) of sending Catholics that come forward back to Catholic churches. Documentation shows that the deception is worse than that, new believers that have never gone to any church are sometimes referred by the Billy Graham counsellors to the Catholic Church. Now, why would Richard and Fritz be concerned about the Catholic Church? Richard Bennett was a priest from Ireland who worked at the Vatican, before giving his life to Christ. He knows how the Catholic hierarchy prevents people from realizing what they have in Christ. For those who have read Fritz’s Be Wise As Serpents book chapter 2.2 you know that Fritz is very concerned when anyone gives their allegiance to a power structure that is part of the NWO and part of its Monarch trauma-based total mind control. Not everything about the Catholic church is wrong. Yet, the Billy Graham Crusade could never get the support it gets from conservative Christians if Billy Graham’s staff didn’t lie about where Crusade converts are sent. What Richard and Fritz were concerned about was that new Christians would be sent to Catholic churches, which now are teaching Zen Buddhism, New Age things, not the salvation by grace that these new Christians need. Granted the enthusiasm of these new Christians might infuse some life into the Catholic church, but a babe in Christ is defenseless. He needs nurture, and the chance to grow. It isn’t meant for new Christians to be thrown to the wolves. Anyway, last Spring and Summer, the Billy Graham Crusade Executive committee was confronted face to face with the evidence of what the Billy Graham Crusade in Sept. ’93 was going to do. Actually, more people than Richard did confront them, but Richard is one of the most knowledgeable ministries to the Catholics in this area. What the Billy Graham Crusade Executive Committee told Richard Bennett was that he had nothing to worry about. That the crusade would never send anyone to a Catholic church, but that if new converts wanted to go there on their own, that was their own choice. Four Catholic leaders sat on the Executive Committee for the ’92 Portland Crusade -- Chancellor Mary Joe Telly, a deacon and two priests. On the Catholic radio station,(and we have it recorded,) Mary Joe Telly of the Billy Graham Executive Committee along with another Bishop Wall Schmidt told the Catholic listeners not to worry that if they came forward they would be guaranteed that they would be referred back to a Catholic church. They gave the assurance four times in that talk show. They said that the decision to send people who came forward to Catholic churches was firm because it had come right from the very top. This was 6 p.m KVDM Portland station. Our recording of this is a record of just one of thousands of lies that the Billy Graham Crusade people have told Christians over the years. In fact, from the evidence it appears the Billy Graham Crusade people say whatever they have to, regardless of the truth. In the North Star Baptist, Nov. 1964 there was article by Japheth Perez, who as a convert in the NY 1957 Billy Graham Crusade and a brand-new Christian, was sent to a Catholic church by the Billy Graham Crusade. Ian Paisley wrote this comment about Billy Graham’s staff: "Dr. Graham did not reply. He never does reply to letters like this. He states he never defends himself. He does have a staff, however, who are paid to defend him and who are never hampered by facts or bothered by ethics or logic in carrying out their duties. One of the group, George L. Edstrom, replied. The Jesuits themselves could not give a finer example of casuistry than his. It is thoroughly dishonest and deceitful, ... However, since this technique of deceit by misdirection, this failure to face up to the issues, this disregard of fact, and this blasphemous attempt to identify Dr. Graham’s official connection with infidels and his flattery and endorsement of them with our Lord’s ministry to publicans and sinners is so typical of the Graham organization..." In Fritz’s June ’93 Newsletter From A Christian Ministry, a letter from Graham’ s staff was reproduced with a point by point exposure of its lies. Christians are really not well aware of what the Billy Graham Crusade does. We quote a paragraph from a letter sent to Billy Graham clear back in the 1950s by a Pastor who, grieved by what Billy Graham was doing to the harvest field, said: "Some people say that if you have just one convert in an evangelistic campaign, it is worth the meeting. That is not true. The evangelist, as the pastor and teacher, is given to the Body of Christ. The real test of an evangelistic campaign is not how many people are converted but what kind of a spiritual condition does it leave in a community. Billy Graham is not only failing in the number of people he leads to the Lord Jesus Christ in this day when hearts are hungry and most people are afraid of what may happen in the world and when it is easier to get people converted than it ever has been in my lifetime, but Billy Graham is pulling the limbs off of the evangelistic trees and the orchard is being left in bad condition. As we have often said, the real test of an evangelist is not just how many converts he has but does he leave the orchard in condition so it will keep bearing fruit."

FROM THE BOOK, "Total Mind Controlled Slave" by Fritz Springmeier and Cisco Wheel


187 posted on 02/10/2005 5:25:22 PM PST by The Real J Fate
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nitro

GOLD FRINGED FLAG

The flags displayed in State courts and courts of the United States have gold or yellow fringes. That is your WARNING that you are entering into a foreign enclave, the same as if you are stepping into a foreign embassy and you will be under the jurisdiction of that flag. The flag with the gold or yellow fringe has no constitution, no laws, and no rules of court, and is not recognized by any nation on the earth, and is foreign to you and the United States of America. more information

MILITARY FLAG WITH THE GOLD FRINGE

Martial Law Flag "Pursuant to 4 U.S.C. chapter 1, §§1, 2, & 3; Executive Order 10834, August 21, 1959; 24 F.R.6865; a military flag is a flag that resembles the regular flag of the United States, except that it has a YELLOW FRINGE border on three sides. The President of the United States designates this deviation from the regular flag, by executive order, and in his capacity as Commander-in-Chief of the military. The placing of a fringe on the national flag, the dimensions of the flag and the arrangement of the stars in the union are matters of detail not controlled by statute, but are within the discretion of the President as Commander in Chief of the Army and Navy." 34 Ops. Atty. Gen. 83.

President, Dwight David Eisenhower, by Executive Order No.10834, signed on August 21, 1959 and printed in the Federal Register at 24 F.R. 6865, pursuant to law, stated that: "A military flag is a flag that resembles the regular flag of the United States, except that it has a yellow fringe border on three sides."

THE LAW OF THE FLAG

The Law of the Flag, an International Law, which is recognized by every nation of the planet, is defined as:

"... a rule to the effect that a vessel is a part of the territory of the nation whose flag she flies. The term is used to designate the RIGHTS under which a ship owner, who sends his vessel into a foreign port, gives notice by his flag to all who enter into contracts with the ship master that he intends the Law of that Flag to regulate those contracts, and that they must either submit to its operation or not contract with him or his agent at all." Ref.: Ruhstrat v. People, 57 N.E. 41

By the doctrine of "four cornering" the flag establishes the law of the country that it represents. For example, the embassies of foreign countries, in Washington D.C., are "four cornered" by walls or fencing, creating an "enclave." Within the boundaries of the "enclave" of the foreign embassy, the flag of that foreign country establishes the jurisdiction and law of that foreign country, which will be enforced by the Law of the Flag and international treaty. If you enter an embassy, you will be subject to the laws of that country, just as if you board a ship flying a foreign flag, you will be subject to the laws of that flag, enforceable by the "master of the ship," (Captain), by the law of the flag.

When you enter a courtroom displaying a gold or yellow fringed flag, you have just entered into a foreign country, and you better have your passport with you, because you may not be coming back to the land of the free for a long time. The judge sitting under a gold or yellow fringe flag becomes the "captain" or "master" of that ship or enclave and he has absolute power to make the rules as he goes. The gold or yellow fringe flag is your warning that you are leaving your Constitutionally secured RIGHTS on the floor outside the door to that courtroom.

This is exactly why so many judges are appointed, and not elected by the people. The Federal judges are appointed by the President, the national military commander in chief. The State judges are appointed by the Governors, the state military commanders. The judges are appointed because the courts are military courts and civilians do not "elect" military officers.

Under martial law, you are presumed guilty until proven innocent.

The gold-fringed flag only stands inside military courts that sit in summary court martial proceedings against civilians and such courts are governed in part by local rules, but more especially by "The Manual of Courts Martial", U.S., 1994 Ed., at Art. 99, (c)(1)(b), pg. IV-34, PIN 030567-0000, U.S. Government Printing Office, Wash. D.C. The details of the crimes that civilians can commit, that are classed as 'Acts of War,' cover 125 pages in the Manual of Courts Martial.

Under Article IV, section 3, of the Constitution for the united States of America, no new State shall be formed or erected within the Jurisdiction of any other State. So -- Why have the judges of the State and Federal courts been allowed to erect foreign enclaves within our public courthouses under a foreign flag with the yellow fringe upon the soil of your state?

We just thought you would like to know, so that the next time you see this yellow fringed flag you will know what you are looking at and what it really means. If you are in Spain and you see the National Flag of Spain, you would know that you are under the jurisdiction of Spain; and their laws govern you at this time. You are officially NOTICED when you see their flag. This is an admiralty law that says that all who see this flag understand they are governed by the laws of the country that this flag represents. You SHOULD understand that the gold or yellow fringed flag signifies the same thing. It is a notice to you that you are under the rules and regulations of the military force that is flying that flag.

Are you familiar with martial law?

Does your attorney understand what this flag means?

"It is an elementary rule of pleading, that a plea to the jurisdiction is a tacit (silent) admission that the court has a right to judge the case and is a waiver to all exception to the jurisdiction."(Girty v. Logan, 6 Bush KY, 8)

http://www.title4flags.com/flags.htm

Yellow Fringed Admiralty Flag
http://www.alltheweb.com/search?cat=web&cs=iso-8859-1&q=Yellow+Fringed+Admiralty+Flag&_sb_lang=en

Fringe On The U.S. Flag What Does It Mean?
http://user.icx.net/~drherb/fringe.html

United States Executive Order 10834
http://fotw.vexillum.com/flags/us-exord.html




Patriots are subjected to much ridicule when they object to [Admiralty flag] the flag that appears in every government office and courtroom in the land.
That flag is the United States flag... with one seemingly minor cosmetic
difference - a knotted golden fringe on three sides.

Government officials and judges adamantly refuse requests to remove the gold fringed flag and replace it with the constitutional flag of the United States as defined in 4 U.S.C. Section 1,2, and 3 - which has NO fringe.

Why should anyone be concerned about this apparently innocent decorative feature? What difference does it make?
GO HERE FOR THE REST OF THE STORY:
http://user.icx.net/~drherb/fringe.html

Fringe On The U.S. Flag What Does It Mean?
http://user.icx.net/~drherb/fringe.html



What Does The Gold-Fringed Flag Signify?

It is commonplace to see a gold-fringed United States flag standing in the
present-day courtrooms. Is the gold fringe there for decoration only, or
does it signify a certain jurisdiction? Make no mistake about it -- the
American People have been put on notice that the normal constitutional
functions of government have been suspended and that their Land has been placed under martial law. The information below is not by any means exhaustive, but will at least point the reader in the right direction to do additional research on his own.

Pursuant to the "Law of the Flag," a military flag does result in
jurisdictional implications when flown
(Ruhstrat v. People, 57 N.E. 41, 45, 185 Ill. 133, 49 LRA 181, 76 Am).

Under the powers designated by these statutes, the President may: seize
property, organize and control the means of production, seize commodities,assign military forces abroad, institute martial law, seize and control all transportation and communications, regulate the operation of private enterprise, restrict travel, and, in a plethora of particular ways,
control the lives of all American citizens.... (United
States Senate Report 93-549, 19 November 1973).
GO HERE FOR DETAILED INFORMATION:
http://www.ametro.net/crownrights/caesar/gold_fringe.htm
THE FLAG, AS WITH ALL THINGS IN LAW, IS HIGHLY DEFINED.
Treatise - by Velma Gay
On The Title 4 U.S.C. 1,
American Flag of Peace of the united States of America
THERE ARE ABSOLUTELY NO PROVISIONS IN THE LAW FOR ADDING A FOURTH COLOR (YELLOW FRINGE) TO THE TITLE 4 U.S.C. 1,2 FLAG.
[SNIP]
THE LAW OF THE FLAG
The Law of the Flag, an International Law, which is recognized by every nation of the planet, is defined as:

" .. a rule to the effect that a vessel is a part of the territory of the nation whose flag she flies. The term is used to designate the RIGHTS under which a ship owner, who sends his vessel into a foreign port, gives notice by his flag to all who enter into contracts with the ship master that he intends the Law of that Flag to regulate those contracts, and that they must either submit to its operation or not contract with him or his agent at all." Ref.: Ruhstrat v. People, 57 N.E. 41


188 posted on 02/10/2005 5:25:29 PM PST by The Real J Fate
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nitro

Congressional Record -- House

June 13, 1967 H7161

The 14th Amendment

Equal Protection Law or Tool of Ursurpation

WAS THE 14TH AMENDMENT TO THE U.S. CONSTITUTION RATIFIED?

reparationh.jpg (81801 bytes)

Americans should make no mistake: The presentation of these facts are not an attempt to deprive anyone of their constitutional rights. All men and women are created equal and that is a idea that many of us are willing to die to protect. The 14th Amendment was not for this purpose, it was to force jurisdiction upon sovereign citizens of the states.

It is very difficult to discover that you've been lied to and cheated by your own government for all of our adult lies. However, our nation simply cannot continue to exist with a foundation based on a mountain of lies which are depriving our citizenry of their rights.

However, as difficult as the truth may be, the future will be impossible without exposing the lies and corruption. These people in Congress and many in the State Legislatures - they know what's on this web site. Those who don't but have been hounded by their constituency, don't want the truth and so they simply ignore it in favor of smoozing up to some special interest for a fat campaign check. That's unwise, in my opinion.

The one profession I have the most difficult time understanding, are the federal and state judges in this country. My raw and unladylike opinion is that they are nothing but a bunch of whores with exceptions running about 100 to 1. The federal judges are apointees by Congress and that body has been shamefully negligent in removing bad judges from the bench. They have allowed these dishonest black robes darn near ruin this country and have thrown tens of thousands of innocent people in jail, ie.: alleged willful failure to file with the IRS.

Sadly, the state judges are running amok and the people either won't or can't [because of ballot fraud], get them out of office. These judges - how do they look themselves in the mirror? They know all about these cases and these findings on the 13th , 14th, 16th and most recently, the 17th Amendments, yet they do nothing except rule in favor of the lie. They ignore the evidence right in front of their face and then they go home and kiss the wife, have a cocktail and the world is fine in their space and time. Reprehensible.

I hope you will help get the truth out and the least expensive way is to order my booklets and give them to anyone and everyone. Not everyone has a home computer - more people don't, believe me, I try to give out my web site address to people every day and most respond: "I don't have a computer." The more people know, the better chance America has of surviving this attempt to destroy our Republic and suck us into this new world order nightmare.

Devvy Kidd
June 12, 1999



The Fourteenth Amendment has been used by the U.S. Supreme court for several years as a club to beat the states into submission. There is unassailable evidence that the amendment was not lawfully ratified. This evidence was presented by Justice Ellett in Dyett v. Turner and on the floor of the House of Representatives. For citizens of the state of Tennessee evidence that the amendment was not ratified by the Tennessee General Assembly is found in Tennessee: A Short History. Corlew reported that Representatives Williams (Carter County) and Martin (Jackson County) refused to participate and although absent were "recorded as being present but having 'failed and refused' to vote."

http://pages.preferred.com/~tpardue/fourteen.html

June 13, 1967 H7161
THE 14TH AMENDMENT -
EQUAL PROTECTION LAW OR TOOL OF USURPATION
(Mr. Rarick (at the request of Mr. Pryor) was granted permission to extend his remarks at this
point in the Record and to include extraneous matter.)
Mr. RARICK. Mr. Speaker, arrogantly ignoring clear-cut expressions in the Constitution of the
United States, the declared intent of its drafters notwithstanding, our unelected Federal judges read
out prohibitions of the Constitution of the United States by adopting the fuzzy haze of the 14th
Amendment to legislate their personal ideas, prejudices, theories, guilt complexes, aims, and
whims. Through the cooperation of intellectual educators, we have subjected ourselves to accept
destructive use and meaning of words and phrases. We blindly accept new meanings and changed
values to alter our traditional thoughts. We have tolerantly permitted the habitual misuse of words
to serve as a vehicle to abandon our foundations and goals. Thus, the present use and expansion of
the 14th Amendment is a sham--{H7162} serving as a crutch and hoodwink to precipitate a
quasi-legal approach for overthrow of the tender balances and protections of limitation found in the
Constitution.

But, interestingly enough, the 14th Amendment--whether ratified or not--was but the expression of
emotional outpouring of public sentiment following the War Between Our States. Its obvious
purpose and intent was but to free human beings from ownership as a chattel by other humans. Its
aim was no more than to free the slaves.
As our politically appointed Federal judiciary proceeds down their chosen path of chaotic departure
from the peoples' government by substituting their personal law rationalized under the 14th
Amendment, their actions and verbiage brand them and their team as secessionists--rebels with
pens instead of guns--seeking to destroy our Union.
They must be stopped. Public opinion must be aroused. The Union must and shall be preserved.
Mr. Speaker, I ask to include in the Record, following my remarks, House Concurrent Resolution
208 of the Louisiana Legislature urging this Congress to declare the 14th Amendment illegal. Also,
I include in the Record an informative and well-annotated treatise on the illegality of the 14th
Amendment--the play toy of our secessionist judges--which has been prepared by Judge Lander H.
Perez, of Louisiana.
The material referred to follows:
H. Con. Res. 208
A concurrent resolution to expose the unconstitutionality of the 14th Amendment to the
Constitution of the United States; to interpose the sovereignty of the State of Louisiana against the
execution of said amendment in this State; to memorialize the Congress of the United States to
repeal its joint resolution of July 28, 1868, declaring that said amendment had been ratified; and to
provide for the distribution of certified copies of this resolution.
Whereas the purported 14th Amendment to the United States Constitution was never lawfully
adopted in accordance with the requirements of the United States Constitution because eleven states
of the Union were deprived of their equal suffrage in the Senate in violation of Article V, when
eleven southern states, including Louisiana, were excluded from deliberation and decision in the
adoption of the Joint Resolution proposing said 14th Amendment; said Resolution was not presented to
the President of the United States in order that the same should take effect, as required
by Article I, Section 7; the proposed Amendment was not ratified by three fourths of the states, but
to the contrary fifteen states of the then thirty seven states of the Union rejected the proposed 14th
Amendment between the dates of its submission to the states by the Secretary of State on June 16,
1866, and March 24, 1868, thereby nullifying said Resolution and making it impossible for
ratification by the constitutionally required three fourths of such states; said souther which were
denied their equal suffrage in the Senate had been recognized by proclamations of the President of
the United States to have duly constituted governments with all the powers which belong to free
states of the Union, and the Legislatures of seven of said southern states had ratified the 13th
Amendment which would have failed of ratification but for the ratification of said seven southern
states; and,
Whereas the Reconstruction Acts of Congress unlawfully overthrew their existing governments,
removed their lawfully constituted legislatures by military force and replaced them with rump
legislatures which carried out military orders and pretended to ratify the 14th Amendment; and,
Whereas in spite of the fact that the Secretary of State in his first proclamation, of July 20, 1868,
expressed doubt as to whether three fourths of the required states had ratified the 14th Amendment,
Congress nevertheless adopted a resolution on July 28, 1868, unlawfully declaring that three
fourths of the states had ratified the 14th Amendment and directed the Secretary of State to so
proclaim, said Joint Resolution of Congress and the resulting proclamation of the Secretary of State
included the purported ratifications of the military enforced rump legislatures of ten southern states
whose lawful legislatures had previously rejected the said 14th Amendment, and also included
purported ratifications by the legislatures of the States of Ohio, and New Jersey although they had
withdrawn their legislative ratifications several months previously, all of which proves absolutely
that said 14th Amendment was not adopted in accordance with the mandatory constitutional
requirements set forth in Article V of the Constitution and therefore the Constitution strikes with
nullity the purported 14th Amendment.
Now therefore be it resolved by the Legislature of Louisiana, the House of Representatives and the
Senate concurring:
(1) That the Legislature go on record as exposing the unconstitutionality of the 14th Amendment,
and interposes the sovereignty of the State of Louisiana against the execution of said 14th
Amendment against the State of Louisiana and its people;
(2) That the Legislature of Louisiana opposes the use of the invalid 14th Amendment by the Federal
courts to impose further unlawful edicts and hardships on its people;
(3) That the Congress of the United States be memorialized by this Legislature to repeal its
unlawful Joint Resolution of July 28, 1868, declaring that three fourths of the states had ratified
the 14th Amendment to the United States Constitution.
(4) That the Legislatures of the other states of the Union be memorialized to give serious study and
consideration to take similar action against the validity of the 14th Amendment and to uphold and
support the Constitution of the United States which strikes said 14th Amendment with nullity;
(5) That copies of this Resolution, duly certified, together with a copy of the treatise on "The
Unconstitutionality of the 14th Amendment" by Judge L. H. Perez, be forwarded to the Governors
and Secretaries of State of each state in the Union, and to the Secretaries of the United States
Senate and House of Congress, and to the Louisiana Congressional Delegation, a copy hereof to be
published in the Congressional Record.
Vail M. Delony,
Speaker of the House of Representatives.
C. C. Aycock,
Lieutenant Governor and President of the Senate.
The 14th Amendment is Unconstitutional The purported 14th Amendment to the United States is
and should be held to be ineffective, invalid, null, void and unconstitutional for the following
reasons:
1. The Joint Resolution proposing said Amendment was not submitted to or adopted by a
Constitutional Congress. Article I, Section 3, and Article V of the U.S. Constitution.
2. The Joint Resolution was not submitted to the President for his approval. Article I, Section 7.
3. The proposed 14th Amendment was rejected by more than one fourth of all the states then in the
Union, and it was never ratified by three fourths of all the States in the Union. Article V. I. The
Unconstitutional Congress The U.S. Constitution provides:
Article I, Section 3, ``The Senate of the United States shall be composed of two Senators from
each State ...''
Article V provides: ``No State, without its consent, shall be deprived of its equal suffrage in the
Senate.''
The fact that 23 Senators had been unlawfully excluded from the U. S. Senate, in order to secure a
two thirds vote for the adoption of the Joint Resolution proposing the 14th Amendment is shown
by Resolutions of protest adopted by the following State Legislatures:
The New Jersey Legislature by Resolution of March 27, 1868, protested as follows:
``The said proposed amendment not having yet received the assent of the three fourths of the states,
which is necessary to make it valid, the natural and constitutional right of this state to withdraw
its assent is undeniable ...''

``That it being necessary by the Constitution that every amendment to the same should be proposed
by two thirds of both houses of Congress, the authors of said proposition, for the purpose of
securing the assent of the requisite majority, determined to, and did, exclude from the said two
houses eighty representatives from eleven states of the union, upon the pretense that there were no
such states in the Union; but, finding that two thirds of the remainder of the said houses could not
be brought to assent to the said proposition, they deliberately formed and carried out the design of
mutilating the integrity of the United States Senate, and without any pretext or justification, other
than the possession of the power, without the right, and in the palpable violation of the
constitution, ejected a member of their own body, representing this state, and thus practically
denied to New Jersey its equal suffrage in the senate, and thereby nominally secured the vote of
two thirds of the said houses.''
1. The Alabama Legislature protested against being deprived of representation in the Senate of the
U.S. Congress.
2 The Texas Legislature by Resolution on October 15, 1866, protested as follows:
``The Amendment to the Constitution proposed by this joint resolution as Article XIV is presented
to the Legislature of Texas for its action thereon, under Article V of that Constitution. This Article
V, providing the mode of making amendments to that instrument, contemplates the participation by
all the States through their representatives in Congress, in proposing amendments. As
representatives from nearly one third of the States were excluded from the Congress proposing the
amendments, the constitutional requirement was not complied with; it was violated in letter and in
spirit; and the proposing of these amendments to States which were excluded from all participation
in their initiation in Congress, is a nullity.''
3 The Arkansas Legislature, by Resolution on December 17, 1866, protested as follows:
'The Constitution authorized two thirds of both houses of Congress to propose amendments; and,
as eleven States were excluded from deliberation and decision upon the one now submitted, the
conclusion is inevitable that it is not proposed by legal authority, but in palpable violation of the
Constitution.''
4 {H7163} The Georgia Legislature, by Resolution on November 9, 1866, protested as follows:
``Since the reorganization of the State government, Georgia has elected Senators and
Representatives. So has every other State. They have been arbitrarily refused admission to their
seats, not on the ground that the qualifications of the members elected did not conform to the fourth
paragraph, second section, first Article of the Constitution, but because their right of representation
was denied by a portion of the States having equal but not greater rights than themselves. They
have in fact been forcibly excluded; and, inasmuch as all legislative power granted by the States to
the Congress is defined, and this power of exclusion is not among the powers expressly or by
implication, the assemblage, at the capitol, of representatives from a portion of the States, to the
exclusion of the representatives of another portion, cannot be a constitutional Congress, when the
representation of each State forms an integral part of the whole.
``This amendment is tendered to Georgia for ratification, under that power in the Constitution
which authorizes two thirds of the Congress to propose amendments. We have endeavored to
establish that Georgia had a right, in the first place, as a part of the Congress, to act upon the
question, `Shall these amendments be proposed?' Every other excluded State had the same right.
``The first constitutional privilege has been arbitrarily denied. Had these amendments been
submitted to a constitutional Congress, they would never have been proposed to the States. Two
thirds of the whole Congress never would have proposed to eleven States voluntarily to reduce
their political power in the Union, and at the same time, disfranchise the larger portion of the
intellect, integrity, and patriotism of eleven co- equal States''.
5. The Florida Legislature, by Resolution of December 5, 1866, protested as follows:
``Let this alteration be made in the organic system and some new and more startling demands may
or may not be required by the predominant party previous to allowing the ten States now
unlawfully and unconstitutionally deprived of their right of representation is guaranteed by the
Constitution of this country and there is no act, not even that of rebellion, can deprive them.
6. The South Carolina Legislature by Resolution of November 27, 1866, protested as follows:
``Eleven of the Southern States, including South Carolina, are deprived of their representation in
Congress. Although their Senators and Representatives have been duly elected and have presented
themselves for the purpose of taking their seats, their credentials have, in most instances, been
laid upon the table without being read, or have been referred to a committee, who have failed to
makeany report on the subject. In short, Congress has refused to exercise its Constitutional
functions, and decide either upon the election, the return, or the qualification of these selected
by the States and people to represent us. Some of the Senators and Representatives from the
Southern States were prepared to take the test oath, but even these have been persistently ignored,
and kept out of the seats to which they were entitled under the Constitution and laws.
``Hence this amendment has not been proposed by `two thirds of both Houses' of a legally
constituted Congress, and is not, Constitutionally or legitimately, before a single Legislature for
ratification.''
7 The North Carolina Legislature protested by Resolution of December 6, 1866, as follows:
``The Federal Constitution declares, in substance, that Congress shall consist of a House of
Representative, composed of members apportioned among the respective States in the ratio of their
population and of a Senate, composed of two members from each State. And in the Article which
concerns Amendments, it is expressly provided that `no State, without its consent, shall be
deprived of its equal suffrage in the Senate.' The Contemplated Amendment was not proposed to
the States by a Congress thus constituted. At the time of its adoption, the eleven seceding States
were deprived of representation both in the Senate and House, although they all, except the State
of Texas, had Senators and Representatives duly elected and claiming their privileges under the
Constitution. In consequence of this, these States had no voice on the important question of
proposing the Amendment. Had they been allowed to give their votes, the proposition would
doubtless have failed to command the required two thirds majority.
...
If the votes of these States are necessary to a valid ratification of the Amendment, they were equally
necessary on the question of proposing it to the States; for it would be difficult, in the opinion of
the Committee, to show by what process in logic, men of intelligence, could arrive at a different
conclusion.''
8 II. Joint Resolution Ineffective
Article I, Section 7 provides that not only every bill which have been passed by the House of
Representatives and the Senate of the United States Congress, but that:
``Every order, resolution, or vote to which the concurrence of the Senate and House of
Representatives may be necessary (except on a question of adjournment) shall be presented to the
President of the United States; and before the same shall take effect, shall be approved by him, or
being disapproved by him shall be repassed by two thirds of the Senate and House of
Representatives, according to the rules and limitations prescribed in the case of a bill.'' The Joint
Resolution proposing the 14th Amendment 9 was never presented to the President of the United
States for his approval, as President Andrew Johnson stated in his message on June 22, 1866. 10
Therefore the Joint Resolution did not take effect.
III. Proposed Amendment never Ratified by Three Fourths of the States
1. Pretermitting the ineffectiveness of said resolution, as above, fifteen (15) States out of the then
thirty seven (37) States of the Union rejected the proposed 14th Amendment between the date of its
submission to the States by the Secretary of State on June 16, 1866, and March 24, 1868, thereby
further nullifying said resolution and making it impossible for its ratification by the constitutionally
required three fourths of such States, as shown by the rejections thereof by the Legislatures of the
following States:
Texas rejected the 14th Amendment on October 27, 1866. 11
Georgia rejected the 14th Amendment on November 9, 1866. 12
Florida rejected the 14th Amendment on December 6, 1866. 13
Alabama rejected the 14th Amendment on December 7, 1866. 14
Arkansas rejected the 14th Amendment on December 17, 1866. 15
North Carolina rejected the 14th Amendment on December 17, 1866. 16
South Carolina rejected the 14th Amendment on December 20, 1866. 17
Kentucky rejected the 14th Amendment on January 8, 1867. 18
Virginia rejected the 14th Amendment on January 9, 1867. 19
Louisiana rejected the 14th Amendment on February 6, 1867. 20
Delaware rejected the 14th Amendment on February 7, 1867. 21
Maryland rejected the 14th Amendment on March 23, 1867. 22
Mississippi rejected the 14th Amendment on January 31, 1867. 23
Ohio rejected the 14th Amendment on January 15, 1868. 24
New Jersey rejected the 14th Amendment on March 24, 1868. 25
There was no question that all of the Southern states which rejected the 14th Amendment had
legally constituted governments, were fully recognized by the federal government, and were
functioning as member states of the Union at the time of their rejection. President Andrew Johnson
in his Veto message of March 2, 1867, 26 pointed out that:
``It is not denied that the States in question have each of them an actual government with all the
powers, executive, judicial, and legislative, which properly belong to a free State. They are
organized like the other States of the Union, and, like them, they make, administer, and execute the
laws which concern their domestic affairs.''
If further proof were needed that these States were operating under legally constituted governments
as member States in the Union, the ratification of the 13th Amendment by December 8, 1865
undoubtedly supplies this official proof. If the Southern States were not member States of the
Union, the 13th Amendment would not have been submitted to their Legislatures for ratification.
2. The 13th Amendment to the United States Constitution was proposed by Joint Resolution of
Congress 27 and was approved February 1, 1865 by President Abraham Lincoln, as required by
Article I, Section 7 of the United States Constitution. The President's signature is affixed to the
Resolution. The 13th Amendment was ratified by 27 states of the then 36 states of the Union,
including the Southern States of Virginia, Louisiana, Arkansas, South Carolina, Alabama, North
Carolina, and Georgia. This is shown by the Proclamation of the Secretary {H7164} of State
December 18, 1865. 28 Without the votes of these 7 Southern State Legislatures the 13th
Amendment would have failed. There can be no doubt but that the ratification by these 7 Southern
States of the 13th Amendment again established the fact that their Legislatures and State
governments were duly and lawfully constituted and functioning as such under their State
Constitutions.
3. Furthermore, on April 2, 1866, President Andrew Johnson issued a proclamation that, ``the
insurrection which heretofore existed in the States of Georgia, South Carolina, Virginia, North
Carolina, Tennessee, Alabama, Louisiana, Arkansas, Mississippi, and Florida is at an end, and is
henceforth to be so regarded.'' 29 On August 20, 1866, President Andrew Johnson issued another
proclamation 30 pointing out the fact that the House of Representatives and Senate had adopted
identical Resolutions on July 22nd31 and July 25th, 1861,33 that the Civil War forced
bydisunionists of the Southern States, was not waged for the purpose of conquest or to overthrow
the rights and established institutions of those States, but to defend and maintain the supremacy of
the Constitution and to preserve the Union with all the equality and rights of the several states
unimpaired, and that as soon as these objects are accomplished, the war ought to cease. The
President's proclamation on April 2, 1866,34 declared the insurrection in the other southern States,
except Texas, no longer existed. On August 20, 1866,35 the President proclaimed that the
insurrection in the State of Texas had been completely ended; and his proclamation continued: ``the
insurrection which heretofore existed in the State of Texas is at an end, and is to be henceforth
so regarded in that State, as in the other States before named in which the said insurrection was
proclaimed to be at an end by the aforesaid proclamation of the second day of April, one thousand,
eight hundred and sixty six.
``And I do further proclaim that the said insurrection is at an end, and that peace, order,
tranquillity, and civil authority now exist, in and throughout the whole of the United States of
America.''
4. When the State of Louisiana rejected the 14th Amendment on February 6, 1867, making the
10th state to have rejected the same, or more than one fourth of the total number of 36 states of the
Union as of that date, thus leaving less than three fourths of the states possibly to ratify the same,
the Amendment failed of ratification in fact and in law, and it could not have been revived except by
a new Joint Resolution of the Senate and House of Representatives in accordance with
Constitutional requirement.
5. Faced with the positive failure of ratification of the 14th Amendment, both Houses of Congress
passed over the veto of the President three Acts known as the Reconstruction Acts, between the
dates of March 2 and July 19, 1867, especially the third of said Acts, 15 Stat. p. 14 etc., designed
illegally to remove with ``Military force'' the lawfully constituted State Legislatures of the 10
Southern States of Virginia, North Carolina, South Carolina, Georgia, Florida, Alabama,
Mississippi, Arkansas, Louisiana and Texas. In President Andrew Johnson's Veto message on the
Reconstruction Act of March 2, 1867,36 he pointed out these unconstitutionality's:
``If ever the American citizen should be left to the free exercise of his own judgment, it is when he
is engaged in the work of forming the fundamental law under which he is to live. That work is his
work, and it cannot be properly taken out of his hands. All this legislation proceeds upon the
contrary Assumption that the people of these States shall have no constitution, except such as may
be arbitrarily dictated by Congress, and formed under the restraint of military rule. A plain
statement of facts makes this evident."
``In all these States there are existing constitutions, framed in the accustomed way by the people.
Congress, however, declares that these constitutions are not `loyal and republican' and requires the
people to form them anew. What, then, in the opinion of Congress, is necessary to make the
constitution of a State `loyal and republican?' The original act answers this question: `It is universal
negro suffrage, a question which the federal Constitution leaves exclusively to the States
themselves. All this legislative machinery of martial law, military coercion, and political
disfranchisement is avowedly for that purpose and none other. The existing constitutions of the ten
States, conform to the acknowledged standards of loyalty and republicanism. Indeed, if there are
degrees in republican forms of government, their constitutions are more republican now, than
when these States--four of which were members of the original thirteen--first became members of
the Union.''
In President Andrew Johnson's Veto message on the Reconstruction Act on July 19, 1867, he
pointed out various unconstitutionality's as follows:
``The veto of the original bill of the 2d of March was based on two distinct grounds, the
interference of Congress in matters strictly appertaining to the reserved powers of the States, and
the establishment of military tribunals for the trial of citizens in time of peace.
...
``A singular contradiction is apparent here. Congress declares these local State governments to be
illegal governments, and then provides that these illegal governments shall be carried on by federal
officers, who are to perform the very duties on its own officers by this illegal State authority. It
certainly would be a novel spectacle if Congress should attempt to carry on a legal State
government by the agency of its own officers. It is yet more strange that Congress attempts to
sustain and carry on an illegal State government by the same federal agency.
...
``It is now too late to say that these ten political communities are not States of this Union.
Declarations to the contrary made in these three acts are contradicted again and again by repeated
acts of legislation enacted by Congress from the year 1861 to the year 1867.
``During that period, while these States were in actual rebellion, and after that rebellion was
brought to a close, they have been again and again recognized as States of the Union.
Representation has been apportioned to them as States. They have been divided into judicial
districts for the holding of district and circuit courts of the United States, as States of the Union
only can be districted. The last act on this subject was passed July 23, 1866, by which every one
of these ten States was arranged into districts and circuits.
``They have been called upon by Congress to act through their legislatures upon at least tow
amendments to the Constitution of the United States. As States they have ratified one amendment,
which required the vote of twenty seven States of the thirty six then composing the Union. When
the requisite twenty seven votes were given in favor of that amendment--seven of which votes were
given by seven of these ten States--it was proclaimed to a part of the Constitution of the United
States, and slavery was declared no longer to exist within the United States or any place subject to
their jurisdiction. If these seven States were not legal States of the Union, it follows as an
inevitable consequence that in some of the States slavery yet exists. It does not exist in these seven
States, for they have abolished it also in their State constitutions; but Kentucky not having done so,
it would still remain in that State. But, in truth, if this assumption that these States have no legal
State governments be true, then the abolition of slavery by these illegal governments binds no one,
for Congress now denies to these States the power to abolish slavery by denying to them the power
to elect a legal State legislature, or to frame a constitution for any purpose, even for such a purpose
as the abolition of slavery.
``As to the other constitutional amendment having reference to suffrage, it happens that these States
have not accepted it. The consequence is, that it has never been proclaimed or understood, even by
Congress, to be a part of the Constitution of the United States. The Senate of the United States has
repeatedly given its sanction to the appointment of judges, district attorneys, and marshals for every
one of these States; yet, if they are not legal States, not one of these judges is authorized to hold
a court. So, too, both houses of Congress have passed appropriation bills to pay all these judges,
attorneys, and officers of the United States for exercising their functions in these States. Again,
in the machinery of the internal revenue laws, all these States are districted, not as
`Territories,' but as `States.'
``So much for continuous legislative recognition. The instances cited, however, fall far short of all
that might be enumerated. Executive recognition, as is well known, has been frequent and
unwavering. The same may be said as to judicial recognition through the Supreme Court of the
United States.
,,,
``To me these considerations are conclusive of the unconstitutionality of this part of the bill before
me, and I earnestly commend their consideration to the deliberate judgment of Congress. [And now
to the Court.]
``Within a period less than a year the legislation of Congress has attempted to strip the executive
department of the government of its essential powers. The Constitution, and the oath provided in it,
devolve upon the President the power and duty to see that the laws are faithfully executed. The
Constitution, in order to carry out this power, gives him the choice of the agents, and makes them
subject to his control and supervision. But in the execution of these laws the constitutional
obligation upon the President remains, but the powers to exercise that constitutional duty is
effectually taken away. The military commander is, as to the power of appointment, made to take
the place of its President, and the General of the Army the place of the Senate; and any attempt on
the part of the President to assert his own constitutional power may, under pretense of law, be met
by official insubordination. It is to feared that these military officers, looking to the authority given
by these laws rather than to the letter of the Constitution, will recognize no authority but {H7165}
the commander of the district and the General of the Army.
``If there were no other objection than this to this proposed legislation, it would be sufficient.'' No
one can contend that the Reconstruction Acts were ever upheld as being valid and constitutional.
They were brought into question, but the Courts either avoided decision or were prevented by
Congress from finally adjudicating upon their unconstitutionality.

In Mississippi v. President Andrew Johnson (4 Wall. 475-502), where the suit sought to enjoin the
President of the United States from enforcing provisions of the Reconstruction Acts, the U.S.
Supreme Court held that the President cannot be enjoined because for the Judicial Department of
the government to attempt to enforce the performance of the duties by the President might be justly
characterized, in the language of Chief Justice Marshall, as
``an absurd and excessive extravagance.'' The Court further said that if the Court granted the
injunction against the enforcement of the Reconstruction Acts, and if the President refused
obedience, it isneedless to observe that the Court is without power to enforce its process.
In a joint action, the States of Georgia and Mississippi brought suit against the President and the
Secretary of War, (6 Wall. 50- 78, 154 U.S. 554). The Court said that:
The bill then sets forth that the intent and design of the Acts of Congress, as apparent on their face
and by their terms, are to overthrow and annul this existing state government, and to erect another
and different government in its place, unauthorized by the Constitution and in defiance of its
guaranties; and that, in furtherance of this intent and design, the defendants, the Secretary of War,
the General of the Army, and Major General Pope, acting under orders of the President, are about
setting in motion a portion of the army to take military possession of the state, and threaten to
subvert her government and subject her people to military rule; that the state is holding inadequate
means to resist the power and force of the Executive Department of the United States; and she
therefore insists that such protection can, and ought to be afforded by a decree or order of this court
in the premises.''

The applications for injunction by these two states to prohibit the Executive Department from
carrying out the provisions of the Reconstruction Acts directed to the overthrow of their
government, including this dissolution of their state legislatures, were denied on the grounds that
the organization of the government into three great departments, the executive, legislative, and
judicial, carried limitations of the powers of each by the Constitution. This case when the same
way as the previous case of Mississippi against President Johnson and was dismissed without
adjudicating upon the constitutionality of the Reconstruction Acts.
In another case, ex parte William H. McCardle (7 Wall. 506-515), a petition for the writ of habeas
corpus for unlawful restraint by military force of a citizen not in the military service of the United
States was before the United States Supreme Court. After the case was argued and taken under
advisement, and before conference in regard to the decision to be made, Congress passed an
emergency Act, (Act March 27, 1868, 15 Stat. at L. 44), vetoed by the President and repassed over
his veto, repealing the jurisdiction of the U.S. Supreme Court in such case. Accordingly, the
Supreme Court dismissed the appeal without passing upon the constitutionality of the
Reconstruction Acts, under which the non-military without benefit of writ of habeas corpus, in
violation of Section 9, Article I of the U.S. Constitution which prohibits the suspension of the writ
of habeas corpus. That Act of Congress placed the Reconstruction Acts beyond judicial recourse and
avoided tests of constitutionality.

It is recorded that one of the Supreme Court Justices, Grier, protested against the action of the
Court as follows:
``This case was fully argued in the beginning of this month. It is a case which involves the liberty
and rights, not only of the appellant but of millions of our fellow citizens. The country and the
parties had a right to expect that it would receive the immediate and solemn attention of the court.
By the postponement of this case we shall subject ourselves, whether justly or unjustly, to the
imputation that we have evaded the performance of a duty imposed on us by the Constitution, and
waited for Legislative interposition to supersede our action, and relieve us from responsibility. I am
not willing to be a partaker of the eulogy or opprobrium that may follow. I can only say . . . I am
ashamed that such opprobrium should be cast upon the court and that it cannot be refuted.''
The ten States were organized into Military Districts under the unconstitutional ``Reconstruction
Acts,'' their lawfully constituted Legislature illegally were removed by ``military force,'' and they
were replaced by rump, so called Legislatures, seven of which carried out military orders and
pretended to ratify the 14th Amendment, as follows:
Arkansas on April 6, 1868.38
North Carolina on July 2, 1868.39
Florida on June 9, 1868.40
Louisiana on july 9, 1868.41
South Carolina on July 9, 1868.42
Alabama on July 13, 1868;43 and
Georgia on July 21, 1868.44
6. Of the above 7 States whose Legislatures were removed and replaced by rump, so-called
Legislatures, six (6) Legislatures of the States of Louisiana, Arkansas, South Carolina, Alabama,
North Carolina, and Georgia had ratified the 13th Amendment as shown by the Secretary of State's
Proclamation of December 18, 1865, without which 6 States' ratifications, the 13th Amendment
could not and would not have been ratified because said 6 States mad a total of 27 out of 36 States
or exactly three fourths of the number required by Article V of the Constitution for ratification.
Furthermore, governments of the States of Louisiana and Arkansas had been re-established under a
Proclamation issued by President Abraham Lincoln on December 8, 1863.45
The government of North Carolina had been re-established under a Proclamation issued by
President Andrew Johnson dated May 29, 1865.46
The government of Georgia had been re-established under a Proclamation issued by President
Andrew Johnson dated June 17, 1865.47
The government of Alabama had been re-established under a Proclamation issued by President
Andrew Johnson dated June 21, 1865.48
The government of South Carolina had been re-established under a Proclamation issued by
President Andrew Johnson dated June 30, 1865.49
These three ``Reconstruction Acts''50 under which the above State Legislatures were illegally
removed and unlawful rump or puppet so- called Legislatures were substituted in a mock effort to
ratify the 14th Amendment, were unconstitutional, null and void, ab initio, and all acts done
thereunder were also null and void, including the purported ratification of the 14th Amendment by
said 6 Southern puppet Legislatures of Arkansas, North Carolina, Louisiana, South Carolina,
Alabama, and Georgia.

Those Reconstruction Acts of Congress and all acts and thing unlawfully done thereunder were in
violation of Article IV, Section 4 of the United States Constitution, which required the United
States to guarantee a republican form of government. They violated Article I, Section 3, and Article
V of the Constitution, which entitled every State in the Union to two Senators, because under
provisions of these unlawful Acts of Congress, 10 States were deprived of having two Senators,
or equal suffrage in the Senate.
7. The Secretary of State expressed doubt as to whether three fourths of the required states had
ratified the 14th Amendment, as shown by his Proclamation of July 20, 1868.51 Promptly on July
21, 1868, a Joint Resolution 52 was adopted by the Senate and House of Representatives declaring
that three fourths of the several States of the Union had ratified the 14th Amendment. That
resolution, however, included the purported ratifications by the unlawful puppet Legislatures of 5
States, Arkansas, North Carolina, Louisiana, South Carolina, and Alabama, which had previously
rejected the 14th Amendment by action of their lawfully constituted Legislatures, as above shown.
This Joint Resolution assumed to perform the function of the Secretary of State in whom
Congress, by Act of April 20, 1818, had vested the function of issuing such proclamation
declaring the ratification of Constitutional Amendments.

The Secretary of State bowed to the action of Congress and issued his Proclamation of July 28,
1868,53 in which he stated that he was acting under authority of the Act of April 20, 1818, but
pursuant to said Resolution of July 21, 1868. He listed three fourths or so of the then 37 states as
having ratified the 14th Amendment, including the purported ratification of the unlawful puppet
Legislatures of the States of Arkansas, North Carolina, Louisiana, South Carolina, and Alabama.
Without said 5 unlawful purported ratifications there would have been only 25 states left to ratify
out of 37 when a minimum of 28 states was required by three fourths of the States of the Union.
The Joint Resolution of Congress and the resulting Proclamation of the Secretary of State also
included purported ratifications by the States of Ohio and New Jersey, although the Proclamation
recognized the fact the Legislatures of said states, several months previously, had withdrawn their
ratifications and effectively rejected the 14th Amendment in January, 1868, and April, 1868.
Therefore, deducting these two states from the purported ratifications of the 14th Amendment, only
23 State ratifications at most could be claimed; whereas the ratifications of 28 States, or three
fourths of 37 {H7166} States in the Union, were required to ratify the 14th Amendment.
From all of the above documented historic facts, it is inescapable that the 14th Amendment never
was validly adopted as an article of the Constitution, that it has no legal effect, and it should be
declared by the Courts to be unconstitutional, and therefore, null, void and of no effect. The
Constitution Strikes the 14th Amendment with Nullity The defenders of the 14th Amendment
contend that the U.S. Supreme Court has finally upon its validity. Such is not the case. In what is
considered the leading case, Coleman v. Miller, 307 U.S. 448, 59 S.Ct. 972, the U.S. Supreme
Court did not uphold the validity of the 14th Amendment.
In that case, the Court brushed aside constitutional questions as though they did not exist. For
instance, the Court made the statement that:
``The legislatures of Georgia, North Carolina and South Carolina had rejected the amendment in
November and December, 1866. New governments were erected in those States (and in others)
under the direction of Congress. The new legislatures ratified the amendment, that of North
Carolina on July 4, 1868, that of South Carolina on July 9, 1868, and that of Georgia on July 21,
1868.''
And the Court gave no consideration to the fact that Georgia, North Carolina and South Carolina
were three of the original states of the Union with valid and existing constitutions on an equal
footing with the other original states and those later admitted into the Union. What constitutional
right did Congress have to remove those state governments and their legislatures under unlawful
military power set up by the unconstitutional ``Reconstruction Acts,'' which had for their purpose,
the destruction and removal of these legal state governments and the nullification of the
Constitutions?

The fact that these three states and seven other Southern States had existing Constitutions, were
recognized as states of the Union, again and again; had been divided into judicial districts for
holding their district and circuit courts of the United States; had been called by Congress to act
through their legislatures upon two Amendments, the 13th and 14th, and by their ratifications had
actually made possible the adoption of the 13th Amendment; as well as their state governments
having been re-established under Presidential Proclamations, as shown by President Andrew
Johnson's Veto message and proclamations, were all brushed aside by the Court in Coleman by the
statement: ``New governments were erected in those States (and in others) under the direction of
Congress,'' and that these new legislatures ratified the Amendment.

The U.S. Supreme Court overlooked that it previously had held that at no time were these Southern
States out of the Union. White v. Hart (1871), 13 Wall. 646, 654. In Coleman, the Court did not
adjudicate upon the invalidity of the Acts of Congress which set aside those state Constitutions and
abolished their state legislatures,--the Court simply referred to the fact that their legally constituted
legislatures had rejected the 14th Amendment and that the ``new legislatures'' had ratified the
Amendment. The Court overlooked the fact, too, that the State of Virginia was also one of the
original states with its Constitution and Legislature in full operation under its civil government at
the time.

The Court also ignored the fact that the other six Southern States, which were given the same
treatment by Congress under the unconstitutional ``Reconstruction Acts'', all had legal
constitutions and a republican form of government in each state, as was recognized by Congress by
its admission of those states into the Union. The Court certainly must take judicial cognizance of
the fact that before a new state is admitted by Congress into the Union, Congress enacts an
Enabling Act to enable the inhabitants of the territory to adopt a Constitution to set up a republican
form of government as a condition precedent to the admission of the state into the Union, and upon
approval of such Constitution, Congress then passes the Act of Admission of such state. All this
was ignored and brushed aside by the Court in the Coleman case. However, in Coleman the Court
inadvertently said this:
``Whenever official notice is received at the Department of State that any amendment proposed to
the Constitution of the United States has been adopted, according to the provisions of the
Constitution, the Secretary of State shall forthwith cause the amendment to be published, with his
certificate, specifying the States by which the same may have been adopted, and that the same has
become valid, to all intents and purposes, as a part of the Constitution of the United States.''
In Hawke v. Smith (1920), 253 U.S. 221, 40 S.Ct. 227, the U.S. Supreme Court unmistakably
held:
``The fifth article is a grant of authority by the people to Congress. The determination of the
method of ratification is the exercise of a national power specifically granted by the Constitution;
that power is conferred upon Congress, and is limited to two methods, by action of the
Legislatures of three fourths of the states. Dodge v. Woolsey, 18 How. 331, 15 L.Ed. 401. The
framers of the Constitution might have adopted a different method. Ratification might have been
left to a vote of the people, or to some authority of government other than that selected. The
language of the article is plain, and admits of no doubt in its interpretation. It is not the function
courts or legislative bodies, national or state, to alter the method which the Constitution has fixed.''
We submit that in none of the cases, in which the court avoided the constitutional issues involved
in the composition of the Congress which adopted the Joint Resolution for the 14th Amendment,
did the Court pass upon the constitutionality of the Congress which purported to adopt the Joint
Resolution for the 14th Amendment, with 80 Representatives and 23 Senators, in effect, forcibly
ejected or denied their seats and their votes on the Joint Resolution proposing the Amendment, in
order to pass the same by a two thirds vote, as pointed out in the New Jersey Legislature
Resolution on March 27, 1868.

The constitutional requirements set forth in Article V of the Constitution permit the Congress to
propose amendments only whenever two thirds of both houses as then constituted without forcible
ejections.
Such a fragmentary Congress also violated the constitutional requirements of Article V that no
state, without its consent, shall be deprived of its equal suffrage in the Senate. There is no such
thing as giving life to an amendment illegally proposed or never legally ratified by three fourths of
the states. There is no such thing as amendment by laches; no such thing as amendment by waiver;
no such thing as amendment by acquiescence; and no such thing as amendment by any other means whatsoever
except the means specified in Article V of the Constitution itself. It does not suffice to say that
there have been hundreds of cases decided under the 14th Amendment to supply the constitutional
deficiencies in its proposal or ratification as required by Article V. If hundreds of
litigants did not question the validity of the 14th Amendment, or questioned the same perfunctorily
without submitting documentary proof of the facts of record which made its purported adoption
unconstitutional, their failure cannot change the Constitution for the millions in America.
The same thing is true of laches; the same thing is true of acquiescence; the same thing is true of ill
considered court decisions. To ascribe constitutional life to an alleged amendment which never
came into being according to specific methods laid down in Article V cannot be done without doing
violence to Article V itself. This is true, because the only question open to the courts is whether the
alleged 14th Amendment became a part of the Constitution through a method required by Article V.
Anything beyond that which a court is called upon to hold in order to validate an amendment,
would be equivalent to writing into Article V another mode of the amendment which has never been
authorized by the people of the United States.

On this point, therefore, the question is, was the 14th Amendment proposed and ratified in
accordance with Article V? In answering this question, it is of no real moment that decisions have
been rendered in which the parties did not contest or submit proper evidence, or the Court assumed
that there was a 14th Amendment. If a statute never in fact passed by Congress, through some
error of administration and printing got in the published reports of the statutes, and if under such
supposed statute courts had levied punishment upon a number of persons charged under it, and if
the error in the published volume was discovered and the fact became known that no such statute
had ever passed in Congress, it is unthinkable that the Courts would continue administer
punishment in similar cases, on a nonexistent statute because prior decisions had done so. If that
be true as to a statute we need only realize the greater truth when the principle is applied to the
solemn question of the contents of the Constitution. While the defects in the method of proposing and
the subsequent method of computing ``ratification'' is briefed elsewhere, it should be noted that the
failure to comply with Article V began with the first action by Congress. The very Congress which
proposed the alleged 14th Amendment under the first part of the Article V was itself, at that very
time, violating the last part as well as the first part of Article V of the Constitution. We shall see
how this was done.
There is one, and only one, provision of the Constitution of the United States which is forever
immutable--which can never be changed or expunged. The Courts cannot alter it; the executives
cannot change it; the Congress cannot change it; the States themselves--even all the States in perfect
concert--cannot amend it in any manner whatsoever, whether they act through conventions called for the
purpose or through their legislatures. Not even the unanimous vote of every voter in the United States
could amend this provision. It is a perpetual fixture in the Constitution, so perpetual and so fixed
that if the people of the United States desired to change or exclude it, they would be compelled to
abolish the Constitution and start afresh.

The unalterable provision is this: ``that no State, without its consent, shall be deprived of its equal
suffrage in the Senate.'' A state, by its own consent, may waive this right of equal suffrage, but
that is the only legal method by which a failure to accord this immutable right of equal suffrage in
the Senate can be justified. Certainly not by forcible ejection and denial by a majority in Congress,
as was done for the adoption of the Joint Resolution for the 14th Amendment. {H7167}Statements
by the Court in the Coleman case that Congress was left in complete control of the mandatory
process, and therefore it was a political affair for Congress to decide if an amendment had been
ratified, does not square with Article V of the Constitution which shows no intention to leave
Congress in charge of deciding whether there has been a ratification. Even a constitutionally
recognized Congress is given but one volition in Article V, that is, to vote whether to propose and
Amendment on its own initiative. The remaining steps by Congress are mandatory. Congress shall
propose amendments; if the Legislatures of two- thirds of the States make application, Congress
shall call a convention. For the Court to give Congress any power beyond that to be found in
Article V is to write the new material into Article V. It would be inconceivable that the Congress of
the United States could propose, compel submission to, and then give life to an invalid amendment
by resolving that its effort had succeeded-- regardless of compliance with the positive provisions of
Article V. It should need no further citations to sustain the proposition that neither the Joint
Resolution proposing the 14th Amendment nor its ratification by the required three-fourths of the
States in the Union were in compliance with the requirements of Article V of the Constitution.
When the mandatory provisions of the Constitution are violated, the Constitution itself strikes with
nullity the Act that did violence to its provisions. Thus, the Constitution strikes with nullity the
purported 14th Amendment.

The Courts, bound by oath to support the Constitution, should review all of the evidence herein
submitted and measure the facts proving violations of the mandatory provisions of the Constitution
with Article V, and finally render judgment declaring said purported Amendment never to have
been adopted as required by the Constitution.
The Constitution makes it the sworn duty of the judges to uphold the Constitution which strikes
with nullity the 14th Amendment. And, as Chief Justice Marshall pointed out for a unanimous
Court in Marbury v. Madison (1 Cranch 136 @ 179):
``The framers of the constitution contemplated the instrument as a rule for the government of
courts, as well as of the legislature.''
...
``Why does a judge swear to discharge his duties agreeably to the constitution of the United States,
if that constitution forms no rule for his government?''
...
If such be the real state of things, that is worse than solemn mockery. To prescribe, or to take this
oath, becomes equally a crime.''
...
``Thus, the particular phraseology of the constitution of the United States confirms and strengthens
the principle, supposed to be essential to all written constitutions ... courts, as well as other
departments, are bound by that instrument.''
The federal courts actually refuse to hear argument on the invalidity of the 14th Amendment, even
when the issue is presented squarely by the pleadings and the evidence as above. Only an aroused public
sentiment in favor of preserving the Constitution and our institutions and freedoms under constitutional
government, and the future security of our country, will break the political barrier
which now prevents judicial consideration of the unconstitutionality of the 14th Amendment.
Bibliography and Footnotes
1. New Jersey Acts, March 27, 1868.
2. Alabama House Journal 1866, pp. 210-213.
3. Texas House Journal 1866, p. 577.
4. Arkansas House Journal, 1866, p. 287.
5. Georgia House Journal, November 9, 1866, pp. 66-67.
6. Florida House Journal, 1866, p. 76.
7. South Carolina House Journal, 1866, pp. 33 & 34.
8. North Carolina Senate Journal, 1866-67, pp. 92 & 93.
9. 14 Stat. 358 etc.
10. Senate Journal, 39th Congress, 1st Session, p. 563, and House
Journal 1866, p. 889.
11. House Journal 1866, pp. 578-584--Senate Journal 1866, p. 471.
12. House Journal 1866, 9. 68--Senate Journal 1866, p. 72.
13. House Journal 1866, p. 76--Senate Journal 1866, p. 8.
14. House Journal 1866, pp. 210-213--Senate Journal 1866, p. 183.
15. House Journal 1866-67, p. 183--Senate Journal 1866-67, p. 138.
16. House Journal 1866, pp. 288-291--Senate Journal 1866, p. 262.
17. House Journal 1866, p. 284--Senate Journal 1866, p. 230.
18. House Journal 1867, p. 60--Senate Journal 1867, p. 62.
19. House Journal 1866-67, p. 108--Senate Journal 1866-67, p. 101.
20. McPherson, Reconstruction, p. 194; Annual Encyclopedia, p. 452.
21. House Journal 1867, p. 223--Senate Journal 1867, p. 176.
22. House Journal 1867, p. 1141--Senate Journal 1867, p. 808.
23. McPherson, Reconstruction, p. 194.
24. House Journal 1868, pp. 44-50--Senate Journal 1868, pp. 22-38.
25. Minutes of the Assembly 1868, p. 743--Senate Journal 1868, p.
356.
26. House Journal, 39th Congress, 2nd Session, p. 563.
27. 13 Stat. p. 567.
28. 13 Stat. p. 774.
29. Presidential Proclamation No. 153 General Records of the United
States, G.S.A. National Archives and Records Service.
30. 14 Stat. p. 814.
31. House Journal, 37th Congress, 1st Session, p. 123.
32. Senate Journal, 37th Congress, 1st Session, p. 91, etc.
33. 13 Stat. 763.
34. 14 Stat. p. 811.
35. 14 Stat. 814.
36. House Journal, 39th Congress, 2nd Session, p. 563, etc.
37. 40th Congress, 1st Session House Journal, p. 232, etc.
38. McPherson, Reconstruction, p. 53.
39. House Journal 1868, p. 15, Senate Journal 1868, p. 15.
40. House Journal 1868, p. 9, Senate Journal 1868, p. 8.
41. Senate Journal 1868, p. 21.
42. House Journal 1868, p. 50, Senate Journal 1868, p. 12.
43. Senate Journal, 40th Congress, 2nd Session, p. 725.
44. House Journal 1868, p. 50.
45. Vol. I, pp. 288-306; Vol. II, pp. 1429-1448--``The Federal and
State Constitutions,'' etc., compiled under Act of Congress on June
30, 1906, Francis Newton Thorpe, Washington Government Printing
Office (1906).
46. Same, Thorpe, Vol. V, pp. 2799-2800.
47. Same, Thorpe, Vol. II, pp. 809-822.
48. Same, Thorpe, Vol. I, pp. 116-132.
49. Same, Thorpe, Vol. VI, pp. 3269-3281.
50. 14 Stat. p. 428, etc., 15 Stat. p. 14, etc.
51. 15 Stat. p. 706.
52. House Journal, 40th Congress, 2nd Session, p. 1126.
53. 15 Stat. p. 708.



Amendment XIV

Section 1. All persons born or naturalized in the United States, and subject to the jurisdiction thereof, are citizens of the United States and of the state wherein they reside. No state shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any state deprive any person of life, liberty, or property, without due process of law; nor deny to any person within its jurisdiction the equal protection of the laws.

Section 2. Representatives shall be apportioned among the several states according to their respective numbers, counting the whole number of persons in each state, excluding Indians not taxed. But when the right to vote at any election for the choice of electors for President and Vice President of the United States, Representatives in Congress, the executive and judicial officers of a state, or the members of the legislature thereof, is denied to any of the male inhabitants of such state, being twenty-one years of age, and citizens of the United States, or in any way abridged, except for participation in rebellion, or other crime, the basis of representation therein shall be reduced in the proportion which the number of such male citizens shall bear to the whole number of male citizens twenty-one years of age in such state.

Section 3. No person shall be a Senator or Representative in Congress, or elector of President and Vice President, or hold any office, civil or military, under the United States, or under any state, who, having previously taken an oath, as a member of Congress, or as an officer of the United States, or as a member of any state legislature, or as an executive or judicial officer of any state, to support the Constitution of the United States, shall have engaged in insurrection or rebellion against the same, or given aid or comfort to the enemies thereof. But Congress may by a vote of two-thirds of each House, remove such disability.

Section 4. The validity of the public debt of the United States, authorized by law, including debts incurred for payment of pensions and bounties for services in suppressing insurrection or rebellion, shall not be questioned. But neither the United States nor any state shall assume or pay any debt or obligation incurred in aid of insurrection or rebellion against the United States, or any claim for the loss or emancipation of any slave; but all such debts, obligations and claims shall be held illegal and void.

Section 5. The Congress shall have power to enforce, by appropriate legislation, the provisions of this article.

http://www.law.cornell.edu/constitution/constitution.amendmentxiv.html


189 posted on 02/10/2005 5:26:12 PM PST by The Real J Fate
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nitro

The gold fringe on the American flag is an indication of military jurisdiction (Admiralty law) rather than civil constitutional juristiction. Also, the horizontal arrangement of stripes on the American flag indicate that this is a wartime flag rather than the vertically striped (see old US Customs flag) peacetime flag.

Has something to do with the war powers act never being officially rescinded (Lincoln did it?) and some sneaky executive orders from FDR.


190 posted on 02/15/2005 6:23:29 PM PST by Deadbug Dale (Attention Federal Reserve. I know what you're doing.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ETERNAL WARMING; ovrtaxt; Fedora; tiamat

Check out this link on JFK's Executive Order 11,110. He was going to bring back silver dollars and make sure our money stayed silver based. Note that 1964 was the last year of silver coinage. Ironically, the death-commemorative '64 Kennedy half-dollar is the only one made of silver, beginning in '65 all US coins became clad junk. (Link also shows a pic of the supposed vertical striped peacetime civilian flag.)

http://www.uscivilflags.org/articles-5bill.html


191 posted on 02/16/2005 9:32:13 AM PST by Deadbug Dale (Hello, Uh, Federal Reserve? ... I know what you're doing. (click))
[ Post Reply | Private Reply | To 4 | View Replies]

To: AnnaZ
"this is all a scam, that there is no "two-party system", that the passionate political followers, left and right, are irritated and angered for 4 to 8 years each, long enough to make them hate each other enough to never figure out that they're all losing their individual rights at an equal pace."

Divide and conquer.

Who could believe this? right?
192 posted on 02/16/2005 9:49:04 AM PST by WhiteGuy ("a taxpayer dollar must be spent wisely, or not at all" - GW BUSH)
[ Post Reply | Private Reply | To 149 | View Replies]

To: WhiteGuy
Who could believe this? right?
Only in my darkest moments.
 
: |
 
: \
 
LOL.

193 posted on 02/16/2005 9:58:31 AM PST by AnnaZ (Kakkate koi!)
[ Post Reply | Private Reply | To 192 | View Replies]

To: Deadbug Dale

Thank you!

(Good name! LOL! )


194 posted on 02/16/2005 12:04:49 PM PST by tiamat (Some days, it's not even worth chewing through the restraints.)
[ Post Reply | Private Reply | To 191 | View Replies]

To: tiamat

Care to buy some gasoline, er, uh insecticide?

195 posted on 02/17/2005 9:29:30 AM PST by Deadbug Dale (Hello, Uh, Federal Reserve? ... I know what you're doing. (click))
[ Post Reply | Private Reply | To 194 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 121-140141-160161-180181-195 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson