Showing posts with label Master. Show all posts
Showing posts with label Master. Show all posts

Monday, May 18, 2015

Master the Human Domain: Exercise Drills for Jade Helm Intent Could Be Found in Newly Released Documents

A relatively new and obscure document, U.S. Army Special Operations Command “ARSOF Operating Concept” is the blueprint for Jade Helm. This document does not boldly use phrases such as “extracting political dissidents”, but it does use “legal language” to basically communicate the same messages that many in the Independent Media have been telling the public about for 6 weeks, namely, that ARSOF is going to be used to extract political dissidents and then enforce martial law.
Key phrases and terms of the ARSOF document are presented here so as to have no misunderstanding as to meaning and intent. Other relevant military documents are mentioned in order to reinforce the interpretation of the ARSOF, Jade Helm inspired document.

ARSOF  1-4. Sustaining and Enabling ARSOF: The Operating Concept

1). A global network including joint,interagency, andInternational partnerswill enable these capabilities, but that network itself is not enough. The U.S. military must place supreme value in its operators, who will be constantly challenged through the most demanding education, training, and developmental assignments. Our operators’ capabilities also rely on strong and healthy families, supported by the broader ARSOF and Army community.



Why do the deep, dark forces behind the planning of Jade Helm need to have foreign mercenaries involved with Jade Helm? The answer is simple, they cannot fully trust that American soldiers will participate in the long-term subjugation of American citizens. And who would these shadowy forces behind Jade Helm be? We cannot be 100% sure, but my bet is on the CIA. From former ARSOF officer, Scott Bennett, we know that the CIA is funding ISIS through Swiss bank accounts and they have been involved in nearly every nefarious activityconnected to this government from Iran-Contra to the JFK assassination. The CIA is a very safe bet.

There is not a topic that I have taken more criticism for than when I have written about the presence of foreign troops on American soil, particularly, the Russians. At Ft. Carson, we are witnessing the insertion of Russian troops on our soil. The extra-constitutional “agreements”(that means illegal agreements) were inked in Washington, D.C., at the fourth annual meeting of the illegally created U.S.-Russia Bilateral Presidential Commission Working Group on Emergency Situations.” This extra-governmental organization, formed under the Obama administration, is one of almost two dozen similar “working groups” bringing together top U.S. and Russian officials. These agreements allowed for the first 15,000 Russian troops to enter the country. Case Closed!

Before taking another sip of the CNN Kool-Aid, you might want to consider the contents of the following Army document.


Appendix N of FM 3-39.4
Foreign Confinement Officer Training Program

Training U.S. Trainers
N-43. Soldiers and Marines who are assigned training missions receive a course in the preparation to deal with the specific requirements of developing the target HN confinement officers (i.e. foreign detention officers). The course should emphasize the cultural background of the HN, introduce its language (to include specific confinement-related terms and phrases) and provide insights into cultural tips for developing a good rapport with HN personnel.

Some of these international partners will be wearing the UN blue and driving in UN white vehicles. These Jade Helm partners are not your friend. They are not here to conduct traffic control exercises. They are here to subjugate you, strip you of your assets and herd you into detention camps and when deemed necessary, they will not hesitate to fire upon you if they feel compelled to do so.

ARSOF 2-2. A Multipolar World

  1. Competition in the global commons will revolve around maintaining the security of key populations in militarily significant urban terrain. The sheer mass and scale of urbanized humanity will be amplified by the intersection of informationally aware, smartphone‐enabled urban populations and their satisfaction—or lack of satisfaction—with local, regional, and even global conditions.

  1. In the coming decades, failed states and ungoverned areas will become sanctuaries for extremist, criminal, and terrorist organizations to flourish. Vacuums emerging from the weakened nation‐state model of 19th and 20th centuries will not elicit new forms of government, but only a proliferation of preexisting forms. The significant difference will be thegreater ability of nonstate actors to defend themselves, and to influence or attack other populations, due to the diffusion of weapons and communications technologies down to subnation groups…
    Urban terrain? I thought they were training for war in the Middle East? What is a subnation group? Texas, Utah and part of Southern California are subnation groups that have deemed to be hostile states by Jade Helm documents. Jade Helm is preparing to occupy these “nonstate actors”.
    On the surface, the Posse Comitatus Act (18 USC 1385) act should prevent the Army from deploying the troops in the midst of a protest that is not on the scale of something like the 1992 LA Riots. However, the Army claims exemption from Posse Comitatus in the following area.
    Perhaps this is why the original Jade Helm maps depicted states like Texas, to be hostile states.
    The following explains the mystery behind the Jade Helm moniker phrase “Mastering the Human Domain“.

    ARSOF 3-3. The Central Idea

    1. Special Warfare. Special warfare is an umbrella term indicating operating force conduct of combinations of unconventional warfare (UW), foreign internal defense (FID), military information support operations (MISO), CT, and counterinsurgency (COIN) through and with indigenous personnel. With discreet, precise, politically astute, and scalable capabilities, ARSOF frequently undertake politically sensitive missions over extended periods of time in hostile, austere, and denied environments. Here, ARSOF’s deep language and cultural expertise enhance unit survivability through the recognition and understanding of emerging threats. Such capabilities also grant Army special operators influence over the human domain in pursuit of U.S. objectives, to avoid conflict, or to bring about a quick and enduring victory…
    Mastering the human domain can only mean one thing, enslavement!

    ARSOF 4-5. Counterinsurgency Operations

    1. …COIN will involve comprehensive civilian and military efforts taken to defeat an insurgency and to address any core grievances…
10 USC 331. When a state is unable to control domestic violence and they have requested federal assistance, the use of the militia or Armed Forces is authorized.

 Address any core grievances? My mind immediately harkens back to Kent State, in 1970, when four college students frustrated by the illegal Vietnam War were gunned down for expressing “core grievances”.

This is not hyperbole! In an Army manual, known as ATP 3-39.33, is the field manual that provides discussion and techniques about civil disturbances and crowd control operations that occur in the continental United States (CONUS) and outside the continental United States (OCONUS). This document, ATP 3-39.33  published the same week as the ARSOF document, on August 15, 2014, promises to change the way the “military authorities” deal with protesters, even peaceful ones through the use of well-placed snipers who will have orders to take out the leaders of any protest movement. The consequences of ATP 3-39.33 could prove deadly for protesters. Further, the provisions of this Army manual is the end of the First Amendment right to peaceably assemble. The Army is telling you how they are going to deal with protests. Protesting, in America, is now a crime punishable by death. Therefore, when Jade Helm is in your neighborhood, unless you willing to fight, it would be best to stay inside!

ARSOF 5-3. Sustaining Surgical Strike

…operations against critical mission command nodes and infrastructure to weaken the enemy’s grip on the population
How do Special Forces weaken the grip that dissidents have on the local population? Death squads is the way that many governments deal with “weakening the grip on the population”.  This is clearly fancy language used to justify the extraction, either through kidnapping or targeted assassination, of political dissidents from inside the Jade Helm identified “hostile state” areas.

Friday, March 13, 2015

Kaspersky Proofs Continue Pointing to NSA as Creators of 'Equation Group' Master Hacks

""Kaspersky has carried out an involved study of the Equation Group and made it look like it is probably the work of the US government.
Before it was an NSA 'style' threat, now it looks much more likely to be an NSA sourced threat, thanks to some commonality with other online security menaces.
The term, and others like it, appear in Snowden leaked documents that have been sourced from the NSA.
There are other clues that it is a US entity that is involved. For example time stamps associated with attacks suggest that it is nine to five, monday to friday staffers who operate in US timezones who are responsible.
It would seem unreasonable to suppose that an average malicious anchor who is not on a government salary would be inclined to work at the weekend. So this is another clue. The code is said to be of good quality, but we can't say that that provides any clue about its creator.
We have asked Kaspersky if it wants to actually finger the NSA as the Equation Group and it did not. It said that it did not want to pin it on the agency, but did concede that there does appear to be a strong link between Stuxnet and Equation.
"We are not able to confirm the conclusions that journalists came up with. Kaspersky Lab experts worked on the technical analysis of the group's malware, and we don't have hard proof to attribute the Equation Group or speak of its origin," it said in a statement.
"With threat actor groups as skilled as the Equation team, mistakes are rare, and making attribution is extremely difficult. However we do see a close connection between the Equation, Stuxnet and Flame groups."
In February Kaspersky researchers claimed to have uncovered one of the biggest, if not the biggest, threat actor that it has seen in two decades.
The security firm dubbed this outfit the Equation Group, and its toolbox 'the Death Star of the Malware Galaxy', and explained that the tools of its trade have hallmarks and themes similar to those of Stuxnet.
Words were not minced. Kaspersky described the group as a "powerful threat actor" that is "unique almost in every aspect of their activities".
The group is sophisticated and well-resourced, and uses complex tools to hide itself in "an outstandingly professional way".

In one incident the group infected targets by switching out legitimate CD Roms with spiked ones at a conference. This makes it sound like a very organised, and perhaps connected outfit.
The tools, a range of trojans, have been named EquationLaser, EquationDrug, DoubleFantasy, TripleFantasy, Fanny and GrayFish. Of these, Fanny, is described as the standout.
Two of these trojans, or modules, can be found deeply inserted in as many as a dozen different makes of hard drive that are sold and shipped to international waters.
The malware is so deeply inserted into the firmware that it can survive wipes, and "resurrect" itself indefinitely. Additional 'implants' add to the mix and can grab and store encrypted passwords, for example.
Costin Raiu, director of the global research and analysis team at Kaspersky Lab, said: "Another dangerous thing is that, once the hard drive gets infected with this malicious payload, it is impossible to scan its firmware.
"To put it simply: for most hard drives there are functions to write into the hardware firmware area, but there are no functions to read it back. It means that we are practically blind, and cannot detect hard drives that have been infected by this malware."
The Fanny trojan is used to fill in the spaces in systems, and launch attacks in unconnected and hard to reach places. Kaspersky said that the 'air-gap filler' is USB-based, and can let attackers move between otherwise unconnected networks.
Thousands of victims lie at the feet of the group, according to Kaspersky, and they include state targets, governments, security developers, telecoms, aerospace and energy industries, along with the military, Islamic activists and the media.
Kaspersky didn't name a likely source  then, but found a lot of links to Stuxnet, which is often linked to the NSA.
"There are solid links indicating that the Equation group has interacted with other powerful groups, such as the Stuxnet and Flame operators, generally from a position of superiority," adds Kaspersky.
A Reuters report makes the NSA link, and we asked the agency if it wanted to make comment in response. It did. 
"We are aware of the recently released report. We are not going to comment publicly on any allegations that the report raises, or discuss any details," an NSA spokesperson told The INQUIRER
"The US. Government calls on our intelligence agencies to protect the United States, its citizens, and its allies from a wide array of serious threats - including terrorist plots from al-Qaeda, ISIL, and others; the proliferation of weapons of mass destruction; foreign aggression against ourselves and our allies; and international criminal organisations."
We asked some of the hard drive firms that Kaspersky said have been infiltrated by the Equation Group for their take on the news, and at least one told us that it has not heard specific allegations about any backdoor action.""

Kaspersky traces the Equation Group and its activities back to 2001:

Thursday, January 15, 2015

How to Achieve Permanent Healing Through Reiki?: Modern Day Reiki Appeals to Larger Western Populous Demographic this Century

How to achieve permanent healing through Reiki?

I have been a Reiki Master in several different Reiki styles which includes the traditional Usui Reiki and some non-traditional styles such as Celtic Reiki, Celtic wisdom Reiki, Self Love Reiki, Abundance Reiki, Bear Reiki, Excalibur Reiki and a few more. I have worked on many people during this time including my mother who was suffering from chronic arthritis pain, my sister suffering from piles, another sister severe neck and shoulder pain, my aunt suffering from spondylitis and myself suffering from asthma and allergies. I have been successful to a great extent in providing permanent relief in most of these cases. However, it would be incorrect to say that all of the healings that I have performed have been permanent. Many times I have had people ask me what I think is the secret to achieving permanent cure through Reiki or any other alternate healing modality for that matter. The answer to this may not be a straight forward one as there are several factors responsible for causing disease as well as for achieving permanent healing. 



The human body comprises not just of the physical body but it also includes the mind and spirit. A lot of new age writers talk about this. They call it the mind-body-spirit connection or even refer to it as the holy trinity i.e Father-Son-Holy Spirit. What we need to understand is this that health is our natural state of being and it is not normal to be unhealthy no matter how old we are, or what diseases run in our family. Disease occurs when the mind, body and spirit stop working together in a unified way. In our modern societies, it is a common norm to feel a certain way and say something else, while intending something else and doing a totally different thing altogether. In fact, from a very early age, our parents or caregivers start teaching us how we should and shouldn't be feeling and how to suppress any emotions that may be considered inappropriate or negative and instead say something else that would be pleasing or acceptable to the listener. As a result, as adults, such children have a difficult time expressing their true selves. This kind of suppression of the natural human emotions and labeling them to be good or bad can sometimes cause major damages to a person's psyche, leading to mental, emotional and psychological issues. 



While this is just one of the ways in which our society teaches us to ignore our true emotions and to deal with them in a healthy way, there are many other ways in which mental, emotional and spiritual growth is suppressed amongst individuals. This causes the mind, body and spirit connection to weaken or even become non-existent. When this happens and continues for a prolonged period of time, the body goes out of whack and problems now start manifesting in the physical realm. All diseases start in the non-physical realm i.e they may start at the emotional, mental or spiritual level. And then they begin to show up in the physical body in various ways, shapes and forms. 



Reiki utilizes non-physical energy for bringing about health and healing. It is this non-physical energy which our universe is made up of. As energy is non physical in nature, there is no physical intervention required with Reiki. It is a non-invasive, non-touch alternative healing modality wherein the Reiki practitioner channels vital life force energy into the recipients body. Reiki energy starts working on all levels, especially, on the energetic levels i.e mental, physical and emotional levels. Now, this energy is very powerful and can definitely bring about complete healing. However, the extent to which the healee/receiver will be healed would depend a lot on the extent to which the person is ready to be healed. Also, we must keep in mind that sometimes healing is not just about keeping the person alive but also providing the space for the person to transition in peace. If the receiver feels that he/she deserves to be sick or unhealthy or feels that nothing can help his/her condition or that it is hereditary and therefore they are destined to have the ailment anyways, then the healing sessions may not provide a permanent cure but just temporary relief. Because while on one hand the Reiki energy is working on all levels trying to bring the mind, body and spirit back into a state of balance and harmony, the receiver is actively, through his/her belief system short circuiting this connection. 



Hence, no one can predict or guarantee in advance the extent to which a Reiki session would help you in eliminating/treating your ailment successfully. However, it must be added that the sole responsibility of your healing doesn't lie in the hands of your Reiki practitioner. In fact it is a 3 way process wherein you-the receiver, the universe and the practitioner are involved. The practitioner is just the medium/channel through which the healing Reiki energies are brought forward and transferred to the recipient. The Universe is the source from which this energy is coming forward. The rest is in the receivers hands. It is the receivers responsibility to ensure that they are doing their best to transmute any negative thoughts or feelings associated with their ailment and be as positive as possible and come to the session with an open mind. It could also be beneficial to learn about the Reiki principles and to attend a Reiki session with an attitude of gratitude.


Source Page:

All My Verses Chemistry 4 Conscious Eggs ********* ALCHemYEGG AUMniVERSE