Conspiracy Cafe

Conspiracy, alternative news, history, intelligence agencies

Blog

Here's the latest news that the main stream media seems to lose...


view:  full / summary

CARDINAL GRAND CROSS EVE

Posted by George Freund on April 22, 2014 at 10:30 AM

 

In astrology, a Grand Cross is said to occur when four planets are all separated from each other by Square aspects (90 degrees apart). A Grand Cross can also be viewed as two oppositions (180 degrees apart) separated from each other by a square. In a Grand Cross, there is one planet in each astrological element (fire, earth, air and water) but all the planets are in signs of the same modality or quality.


Because all the aspects in a Grand Cross are considered dfficult aspects, the Grand Cross is seen as a source of extreme tension whereby various aspects of the personality (represented by the planets) are working at cross purposes that serve to nullify each other. This pulls the native in many directions, ultimately leading to indecisiveness and an inability to produce concrete achievements. It is said to take extraordinary effort to overcome the conflicts in a Grand Cross.

 

An example of a Grand Cross would be with Saturn at 15° Virgo, Uranus at 15° Sagittarius, Neptune at 15° Gemini and Pluto at 15° Pisces. This is a mutable Grand Cross, which is said to be especially difficult with respect to the problem of maintaining focus in communication. A cardinal Grand Cross is said to cause a particular difficulty in accomplishing goals because the individual wants to accomplish everything at the same time: he/she usually ends up accomplishing very little (if anything at all). A fixed Grand Cross is said to lead to a person who is well organized but does not know where to direct their talents. Consequently, those with a fixed grand cross tend to be stuck in the same place.


People with many squares in their horoscope, however, if they work hard enough at overcoming the conflicts thus involved, are said to be able to achieve remarkable personal growth and self-fulfillment.

 

T-Square


When one of the four signs of any modality or quality does not contain any planet - or only contains planets that would be out of orb for a Grand Cross - then a T-Square is said to be formed.


The energy of T-Square is similar to a Grand Cross, but it is much weaker because it involves only three planets; in which two of them form an opposition and a square with the third. Due to lesser energy emitted by the T-Square, individuals with this planetary configuration feel that there is something lacking and therefore have to supply what they think is lacking for better integration of their personality. Filling the gap posed by the T-Square in their personal makeup is the solution to take control of the stressful energies of this aspect and channel them into constructive use. Many successful professionals and otherwise outstanding people often have this configuration in their chart.

 

One particular example of a Cross, which was not a Grand Cross, came during the summer of 2010 (July 10), when Pluto (in Capricorn), Uranus and Jupiter (in Aries) and the Moon (in Gemini moving into Cancer) were at 0-3° Capricorn, Aries and Cancer, respectively, with Saturn being out of mode at 29 Virgo. This was assumed by astrologers studying mundane astrology that it would be a time with many great challenges and dramatic changes.[1] As the Moon moved out of orb, this Cross quickly (within a day) became a T-Square. This aspect resembled a T-Square that occurred during the 1930s.

UNIVERSITY OF CALGARY MASS MURDER

Posted by George Freund on April 20, 2014 at 11:15 AM


As you know 'thegeorge' reads the predictive programming of the 'Twilight' language. There are always clues and discernments of futures past. It was no different in the mass slaying associated with the off campus mass stabbing murder where five students were murdered by the son of a Calgary police inspector. The University of Calgary's student newspaper The Guantlet headlines the day called Bermuda Shorts Day in campus tradition "It'll be a bloodbath." It was.


Matthew De Grood a University of Calgary law student attended a party at the residence of other students. Upon his arrival he acquired a knife and started stabbing people. Three students were killed immediately and two others died later. Upon arrival at the residence two mattresses would have been noticed propped up against a tree painted with lilacs in a three colour theme. Perhaps that is not unusual at modern day frat houses, but I feel it could be a trigger to a Manchurian episode. It is relatively innocent to another observer, but the key to the inner monster.



Calgary mass stabbing victims, from left: Zackariah Rathwell, Kaiti Perras, Jordan Segura, Lawrence Hong and Josh Hunter.

 

Matthew sent disturbing text messages to his father Calgary Police Inspector Doug de Grood. His father immediately left his residence to search for him while his mother called the police. This and the fact that Matthew was immediately sent for psychiatric assessment seems to imply he already had psychiatric issues and may very well have been receiving medication. The big rub with some of them is that when discontinued they can cause aberrant behaviour. Many supply a regular dose of brain chemicals like serotonin. The body stops manufacturing them. That can cause the mind to short out.




In light of the fact a 'bloodbath' was already reported in the campus newspaper, we have to wonder if there was prior knowledge to the event. The headline seems to be a stretch. I couldn't imagine an end of year festival at a school being termed a bloodbath under any circumstances. Matthew was also inured to the satanic music of the group Megadeath. It is a genre of music that opens the door to evil. It accentuates a hopelessness and manifests anger. He posted one of their songs on his Facebook page. It was the song Dread and the fugitive mind from the album The World Needs a Hero. This negative programming and it is all mind control programming stimulates dark emotions. In conjunction with the effects of brain chemicals a recipe for disaster exists. If there were other manipulations being used in a covert program, then a proper NWO sacrifice was set to occur.


 


Band members, from left: Zackariah Rathwell, Josh Hunter, Barry Mason and Kyle R. Tenove (below) Photograph by: Facebook photo, Facebook photo


Satanic secret societies are known to operate during celestial events or holidays of the sabbat. This could very well just be another one. I'm a firm believer we must seal the door to the overwhelming darkness of the music and film industries and their horror genre of programming. It is a first defense. Knowledge and understanding of psychiatric abuses up to and including MK Ultra are essential as well. Matthew, Josh and Zackariah were members of a popular band called Zackariah and the Prophets. They debuted their first album recently. Of course Zechariah was a Biblical prophet. His book dealt with the coming of the Lord and the things to come. He was killed in the Temple.

Noted Alternative Media Host Michael Ruppert Dead

Posted by George Freund on April 15, 2014 at 8:35 PM


Say it ain't so, but it is. Noted 9/11 author and alternative media host Michael Ruppert has died of an apparently self inflicted gun shot. That is a tough pill to swallow. I'm still choking on it. In the limelight of truth telling after a sojourn in the LAPD, Michael edited and published From The Wilderness a publication that took the bull by the horns. He was a well established author and film maker. One of the great ones has fallen. We will devote space to his work over the coming days. Humanity was truly served by this man. We owe him a great debt. It will take great efforts to fill his shoes. We must thank God there are people that rise to the occasion in times of great need. He was one. The truth will out if there was an elimination. We stand firm in his memory to continue the struggle for alternative sources of news and information.

TOTAL ECLIPSE OF THE MOON

Posted by George Freund on April 11, 2014 at 11:55 AM


There is also some grand cross happening on April 22. This time period (and eclipse) marks an opportunity to receive some powerful cosmic rays for personal transformation en masse if you are a receiver. Take a chance and poise yourself before the eclipse in the sign of Aries on April 15th in the early morning. Rise and shine:)


April 14-15, 2014, we will experience the Passover Full Moon which is always the first Full Moon following the March Equinox. This year on the Passover Full Moon we will be blessed with a total Lunar Eclipse. Eclipses are celestial alignments that bathe the Earth and all her Life in frequencies of Light that greatly amplify whatever we are empowering with our thoughts, feelings, words, actions, beliefs, and memories.


As long as we are focusing on what we want to create in our lives, and not the things we do not want, Eclipses are wonderful opportunities for growth and transformation. This Eclipse will be an exceptionally powerful time to release and let go of anything that no longer serves our highest good, and it will provide us with an amazing opportunity to empower the patterns of perfection for the New Earth, the Divine Alchemy taking place within our Earthly Bodies, and all of our hopes, dreams, visions, and heart desires.


On April 20th, billions people around the world will celebrate the Resurrection of Jesus the Christ.


There seems to be a lot of discussion about whether Jesus was actually crucified and whether or not he was Resurrected. Jesus and the Company of Heaven have clearly stated that the crucifixion and the Resurrection were critical facets of Jesus’ Divine Mission and that indeed both events did occur.


Jesus was not tortured and crucified because we are so evil and such worthless sinners and worms in the dust that he had to be brutalized in order to save us. Jesus agreed to go through that experience because he wanted to demonstrate in a profound and powerful way that there is nothing Humanity’s fear-based human egos can inflict on our Earthly Body that will destroy the Divine Presence abiding in that body.


During his Resurrection, Jesus transformed his carbon-based planetary body into the 5th-Dimensional Crystalline-based Solar Light Body he would need in order to Ascend into the timeless, spaceless frequencies of the 5th Dimension. When Mary Magdalene saw Jesus after his Resurrection he said to her, “Do not touch me, my body is not of this world.”


Jesus wanted to anchor an archetype and to model for Humanity the Divine Alchemy we would all go through in the Ascension process we are now experiencing as we move into the 5th-Dimensional New Earth. He also clearly demonstrated the Path of Divine Love that would lead to the return of Christ Consciousness Humanity is now in the process of accomplishing.


The peak of the Cardinal Grand Cross Alignment will bathe the Earth April 22nd-23rd-24th, 2014. The Planets involved in this Grand Cross are Mars, Uranus, Pluto, and Jupiter. These four Planets will form a Grand Cross by aligning at exactly 13 degrees in Aries which represents the Fire Element and Humanity’s mental body, Cancer which represents the Water Elemental and Humanity’s emotional body, Libra which represents the Air Element and Humanity’s etheric body, and Capricorn which represents the Earth Element and Humanity’s physical body.


This will be an incredibly powerful time for all of us to focus on the Divine Alchemy that is taking place within our four Earthly Bodies as they are transformed from carbon-based cells into Crystalline-based Solar Light Cells.


The final monumental influx of Light we will experience in April is a New Moon Solar Eclipse that will take place April 28th. Through this Eclipse, our God and the Company of Heaven will seal every particle and wave of Life on Earth in the highest frequencies of vibrations we are capable of withstanding from all of the Activities of Light that have taken place since the beginning of 2014.

CITIZENS' MILITIAS MOBILIZE TO SUPPORT RANCHER

Posted by George Freund on April 11, 2014 at 9:45 AM


It appears the final showdown with the New World Order fascists has reached its zenith in Bunkersville, Nevada. The Bureau of Land Management has deployed a vast array of force around the ranch of the Bundy family which includes snipers and helicopters. There is a dispute surrounding land rights and grazing rights for cattle that the Bundy family has enjoyed since 1870.


In a reclassification of the land in question those rights were suspended. The federal government demanded payment for them. The Bundy's refused. The Bureau of Land Management moved in to seize the offending cattle and lay seige to the Bundy ranch. A line in the sand has been drawn, and both sides are amassing forces at it. The militias from five States have been called to service to protect the Bundy's and their ranch.


The major question now is will the shot heard round the world be fired or will more reasonable negotiations occur? In the modern era significant changes came along with the term grandfathering. Those presently enjoying certain rights may keep them for the duration of their lives. With regard to the ranch the family should maintain the rights until the property is sold. It is good sense and good business.




As it stands now 5,000 private militia are massing at the ranch. Isn't that a party? The federal government errs in the use of threats and intimidation tactics. They may get your will for a while perhaps even a long while, but sooner or later pent up hostility boils over. Then there's no telling where it all ends. As my father always said, "No smoking in the dynamite shed."









Popular Encryption Software Heartbleed Bug Leaks Information

Posted by George Freund on April 9, 2014 at 8:00 PM


By Lily Hay Newman


Researchers have disclosed a serious vulnerability in standard Web encryption software. Known as “Heartbleed,” the bug can give hackers access to personal data like credit card numbers, usernames, passwords, and, perhaps most importantly, cryptographic keys—which can allow hackers to impersonate or monitor a server. It didn't affect sites like Google, Facebook, Twitter, or Dropbox, but Yahoo and even openssl.org were vulnerable.


The vulnerability in encryption software OpenSSL was discovered by Google researcher Neel Mehta and the security firm Codenomicon. They gave the bug—officially known as CVE-2014-0160—the appropriately evocative and frightening name Heartbleed.


Though Web encryption flaws come up regularly, Heartbleed is significant because of its reach, and the effort that will be required of IT administrators across the Internet to eradicate the bug. Users don't have to download a patch or do anything in particular to protect themselves other than changing their account passwords if they know they use a service that was compromised. About half a million websites that use OpenSSL are currently vulnerable, according to the Internet security company Netcraft.

 

On Heartbleed.com, a site set up to draw attention to the problem, Codenomicon writes that the vulnerability "allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users." When Codenomicon purposely hacked its own servers, exploiting Heartbleed, the company was able to "steal" cryptographic keys, usernames, passwords, instant messages emails, documents, and other communications from itself.


OpenSSL has already released an emergency patch for the bug, called Heartbeat. But the vulnerability is in fairly ubiquitous software around the Web, and it will take awhile for the patch to disseminate. A tool from SSL Labs, a repository of SSL documents and tools, allows you to check any URL for the OpenSSL vulnerability.


Most major services were not affected or rapidly upgraded their servers to incorporate the OpenSSL patch. Some have also tried to reassure customers that their information wasn’t really at risk from Heartbleed anyway. For example, a spokesperson for the password management service LastPass, which implemented the patch early this morning, told CNET, "Nearly all your data is also encrypted with a key that LastPass servers never get—so this bug could not have exposed customer's encrypted data."


It’s possible, though, that Heartbleed might not be as fatal as it seems. Adam Langley, a Google security expert who helped close the OpenSSL hole, said on Twitter that his testing didn't reveal information as sensitive as secret keys.


Nevertheless, admins are racing to patch the bug, and many sites that corrected the vulnerability will probably prompt their users to reset account passwords in the coming days. It may not be an apocalypse, but Heartbleed is a good reminder for everyone to change sensitive passwords regularly.

 

http://www.slate.com/blogs/future_tense/2014/04/08/heartbleed_openssl_encryption_bug_discovered_by_codenomicon_and_neel_mehta.html

 

 

'Heartbleed' computer bug threat forces Canada Revenue Agency to shut down efiling of returns


OTTAWA — With tax-return season in full swing, the Canada Revenue Agency suddenly locked down its online filing services Wednesday, fearful of a new vulnerability in software used by much of the world to safeguard secure websites on the Internet.


All of the federal government's online systems were under review after word of the so-called "Heartbleed" computer bug prompted the tax agency to pull the plug on its electronic services as a precaution.


"As a preventative measure, the CRA has temporarily shut down public access to our online services to safeguard the integrity of the information we hold," the agency said in a statement.


The shutdown came after the Canadian Cyber Incident Response Centre (CCIRC) issued a warning to system administrators about the coding flaw. It recommended that system operators unable to plug in an immediate fix get off the grid.


Other federal systems were also being assessed for their vulnerability to the threat, said Antoine Ouellon, a spokesman for Shared Services Canada, the federal agency that oversees the government's IT infrastructure.


"Shared Services Canada is working with departments and Public Safety Canada to assess all IT systems to identify the extent of the problem and to apply solutions, including implementing patches, as required," Ouellon said in a statement.


It was not immediately clear Wednesday whether any other online government would have to be taken offline.

ONE OF OUR HOLY WARRIORS IS MISSING FORT HOOD'S SECOND SHOOTER

Posted by George Freund on April 5, 2014 at 1:40 PM


1st Medical Brigade Fort Hood, Texas the Silver Knights


The world is a buzz all over again with another mass casualty shooting at Fort Hood, Texas. Of course the previous Manchurian event was one for the record books. A psychiatrist Rambo went on a shooting spree killing 13 and wounding 30. Not too bad for a non-combat soldier in any army. Even though he fired 146 rounds, over 200 shell casings were recovered. There were reports of a second shooter. They were discounted. No one was even under investigation for littering with the other 54 cases. Although 54 and 146 do make the ubiquitous 9/11 when summed. And the whole event was a taking care of business of the 9/11 event.




In this mass casualty event at Fort Hood there are also allegations of a second shooter. The motor pool was one location and the 1st Medical Brigade Building was the other. A shooter was even identified in that shooting and then the information was 'cleansed.' You see there was an all points bulletin out for Muhammad Abdullah Hassan also known as John Thomas Booker of Topeka, Kansas. He was a new recruit to the army scheduled to start basic training April 7. The only problem is he was a publicly outed jihadist who wanted to follow in the footsteps of Major Nadal Hasan the previous Fort Hood shooter and army psychiatrist who may very well have been associated with a reconstituted MK Ultra program encompassing all the popular terror we have come to know in the 21st century. But that is just mere co-incidence I guess.



Our man Muhammad was wanted by the FBI and the 902d Military Intelligence Group at Fort Leavenworth, Kansas. They were following his jihadist sympathies closing, but not closely enough to perhaps catch him before he squeezed off a few rounds in the Medical Building at Fort Hood. We have to wonder how the most wanted motor pool shooter got from there to the Medical Building with 90 police vehicles approaching from a plethora of directions. Perhaps the reports of the second shooter were true. It appears Muhammad was captured and is supposed to be in a private mental health facility. 



There's another problem with John Thomas Booker. Chuck Norris used the moniker in the film 'Good Guys Wear Black.' However, in the latest context they don't. In the movie John T. Booker is fighting back. In the possible MK Ultra variation so was John Thomas. He just had a name change to Muhammad to fit the present day agenda in the war on terror. Chuck Norris' character was pursued by the CIA. Our Manchurian muffin was pursued by the FBI and Military Intelligence instead. They couldn't afford to take him alive either, but they did. The media mandarins can just remain silent. Killing the story is just as good as killing the assassin. 



Of course our army recruit's diatribe was posted March, 15th. March is the third month. One plus five from the date is six. His Lord is the infamous 666 not the Prophet. I would suspect from top to bottom he was a created persona. His handlers most likely had a fascination with Chuck Norris' role. They turned the good guy into a dark knight and loosed him upon on unsuspecting military. However, young Booker was no warrior Islamic or otherwise. We have to wonder about the revealed shooter Ivan Lopez. Was he really responsible for the whole enchilada?



Never turn your back on the secret holy warrior. However, our 'good' guy is wearing white not black. I guess he truly is the opposite of Chuck Norris' character John T. Booker. The facts and details of this part of the episode are in information cleanup mode. One of Manchurians got away from his handlers. Was he adequately prepared? I doubt it. It seemed to be a rush job. Has the government privatized MK Ultra too? Will we ever get a report on his 'progress' in treatment? I doubt it. Was he angry he didn't get into the military? Did he attend Fort Hood to exact punishment on the infidels at the Medical Building? They are portrayed at Knights Templar dating back to crusades of the past. Has nothing ever changed in all these centuries? Are we still fighting the crusades? I'd bet on it.  

FOUND IT

Posted by George Freund on April 5, 2014 at 8:30 AM


Beijing we have a signal. We wound have said Houston, but they probably knew that all along. The greatest airplane theft in the history of the human race has reached a denouement. The Chinese search vessel Haixun 01 has reported detecting 'pings' from Flight MH370's black box locator. The device operates at 37.5 kHz. Of course it was located off the west coast of Australia in a relatively obscure place in the Indian Ocean after a reported significant course deviation that defies any sort of reasonable explanation save and except it was being directed by remote control from something on board or more likely satellite. If this turns out to be the missing Malaysian Air Flight, then recovery can begin and the lies can be formulated and an 'official' story can be recorded in the history books allowing the people of Earth to resume regular programming. That is the total shame of it all. Time after time, event after event we are fed the same pack of falsehoods masquerading as truth while the perpetrators of great evil conceal themselves behind the so called curtain at the side of the stage.



Of course we have to wonder with all the west's so called technology how this happened in the first place. How did they lose a jumbo jet in the modern surveillance society where virtually every human interaction is recorded and stored by the intelligence agencies? The simple answer is LIHOP (Let it happen on purpose). The analogy to that is if they let it happen on purpose then MIHOP. They made it happen on purpose. The finders the Chinese seem to be the search wild card in the affair. They were of course on the receiving end of Flight MH370 with whatever passengers, cargo or information was aboard for them to receive. They want to know what happened to it. It was most likely the intelligence coup of the 21st century. The information was so valuable it necessitated the largest black ops since 9/11. I would anticipate the Chinese will be doing their utmost at retrieval in the hope of getting something from the bottom of the ocean. 



Advances in the invisibility cloak may have even rendered Flight MH370 INVISIBLE

We can only speculate what that Earth changing technology might be, but it is highly likely to have been the case. On the short list we have to include nano particle cloaking technology to mask things like aircraft and missiles from radar or other tracking systems. The most important radar being the kind that locks weapons systems on a target. Imagine a hostile aircraft approaching a target invisible and then if ever detected impervious to weapons radar. Imagine the first sign of an intercontinental ballistic attack being the total obliteration of the nation being attacked. That is the level of technology worth killing for.


The Google brain D wave quantum computer at NASA’s Ames Research center

Next on the list would be the quantum computing chip. It is a chip so powerful as opposed to previous chips as a rickshaw might be to a race car. The quantum chip is the next BIG leap in the development of computers. It functions as a quantum particle either in one place or another or both at the same time as well as any combination in between. It is a chip that identities 103 dimensions of time and space and may actually have the power to bridge the gap. It could be the means to the ends with regard to time travel. That is a level of technology worth killing for as far as the hidden hands of the power trusts are. To get the technological edge of all time means the ability to grasp the prize total world domination. It has been the dream of dictators since the dawn of time, and could very well upset the dynamic of universal time space equilibrium. Those globalists play hard. We have to strive hard to understand the events portrayed before us at the cutting edge of technology or vanish from existence in the continual struggle for survival. It is up to you however. You must change the channel and the programming that has created you to be a docile victim of the great game. This is reality TV not a cheap imitation. This is survivor. Whomever, gets control of this technology rules the world and all the people on it. 


THE GHOST OF SHOOTINGS PAST MAJOR NADAL HASAN

Posted by George Freund on April 3, 2014 at 8:25 AM


Back on November 5, 2009 the world was transfixed on a mass shooting event at Fort Hood, Texas. It was just another act of random violence that demonstrated that no one can be trusted, everyone is suspect, and the state must tighten the clamps of the vice ever harder to encourage an illusion of peace in the valley. This event was one of the shining glory pieces of research at the Cafe. We asked the Columbo question WHY? Something didn't seem to fit. We enter into the field of the truly bizarre when we even begin to postulate a psychiatrist going on a murderous rampage. We started to peel back the veneer and look at material NOT reported by the mainstream media matrix. There were many factors in the case that point the finger at EXTREME covert ops and the creation of the Manchurian mindset that is fundamental in creating CHAOS from which will come capture of the reigns of state a government of, by, and for the PEOPLE!




But then I include a very wide range of reading material that included GITMO'S THE WIRE. What lead me to this publication was background research on one of the victims Dr. L. Eduardo Caraveo another psychiatrist. Now we have entered the world of the truly BIZARRE. A psychiatrist kills another psychiatrist and they are affiliated with the infamous human rights atrocity Guantanamo Bay. What are the odds? But that was just the start. There were other links. We were more innocent then. We couldn't begin to speculate that the government could stage a mass terror or shooting event to massage public opinion or cover up an operation out of control. However, after the Sandy Hook illusion, it appears to be standard operating procedure.


 

If you're into numerology, knock yourself out. Vol. 6 Issue 3 (666)


15 mins. of fame pg. 11 (Another 911) on 11th month 6th day


Going Postal at Camp America needs no elaboration. Shooting at Fort Hood the biggest in America.


A3206 in picture. Time of shooting 1:32 on the 6th perhaps.


Pentagram in blue


Weird looking soldier in beret on same sign


The commanding officer is named HOOD!




The BIG question a reasonable person would ask is why all the secrecy at Guantanamo? What are they really doing there? Why wouldn't Obama close the place and practice what America is wont to preach? There is an answer. It is masked with veils. It has a lot to do with Islamic Holy Warriors. What if they make them there? What if Guantanamo is a Manchurian Muffin factory? Well then that could easily provide the impetus for an elimination of witnesses. What better way to do it than with a mass casualty event that will cloud millions of minds and leave them begging for programming. It is MASS hypnosis of the collective psyche. It is what we do well in the post 9/11 world. 



There is a secret part of the secret prison that no one really gets to go too. What are they doing there? It's common knowledge rights are abused. It is widely documented torture is applied. What could be left to remain undiscovered? There is one most likely answer that after 9/11 the MK Ultra program was restarted and put in high gear. That is a secret well worth keeping from public scrutiny. If we could peer in and see the practice, I should think it has evolved into something as notorious as the recent movie 'The Killing Room.' Of course drugs and active torture techniques are most likely the more common elements, but there have been deaths at Guantanamo. We have featured this film at Conspiracy Night at the Movies. It is an outlandish opinion to the uninformed. It is the trail of the compass needle to those attuned to using one. Abu Ghraib was not an anomaly. It was another one. 



Dr. Hasan attended a very well known University Virginia Tech. It was the scene of an horrendous mass shooting event as well. What are the odds? The perpetrator was Seung-Hui Cho a student. The press were loathe to show his picture in his military uniform. They were remiss to mention his sister was employed by the Defence Intelligence Agency. Truth revelations upset the malware programming inserted into your core value system introduced in childhood and updated regularly by mass media or drugs if you get too upitty. There are allegations of a mind control facility across the street from the campus. How convenient. I was indoctrinated to worry about gun stores.




Dr. Caraveo had a practice in Woodbridge, Virginia. Dr. Hassan had family in Virginia and attended the Dar al-Hijrah mosque in Falls Church. Of course you remember Falls Church. The Beltway Sniper operated there. He killed Linda Franklin the FBI analyst who developed the INFRAGUARD system that may have revealed a little too much about government black operations. James Martin an analyst for NOAA the National Ocean and Atmospheric Association was also murdered. There were events on the storm front that should not be discussed you know. It is an amazing thing when you start connecting dots. They start forming a line that your compass can follow. It can lead you places you never knew existed before. It can take you to the TRUTH. All you have to do is dare. Once freed of the malware programs inserted into your mind, you can truly see a new path and evade the traps. They call it the BIG PICTURE. I think you are starting to see it.



Three of the provocative agents that have been alleged to have participated in the infamous 9/11 attacks attended the Dar al-Hijrah mosque in Falls Church. What an amazing co-incidence? However, one of the prime assumptions that must be made in the intelligence craft is that there are NO co-incidences. They were Nawaf al-Hamzi and Hani Hanjour. The third attended the services of Imam Anwar al-Awlaki in California. The same Anwar al-Awlaki killed in a drone strike in Yemen in 2011. If there is a root connective link to 21st century false flag terror operations, Anwar is the man. Pick one. He has an extensive C.V. The million dollar question is what if there is a government terror operation? What if these people organized it? What if they are being taken out of circulation by the duck in the noose they created? Then we have a well orchestrated black ops agenda that goes to the very heart of the military industrial complex with the media polishing off the operations with a well crafted cover story better understood as a mind control program. It is brilliant. It is a shame we don't see it. 



Anwar al-Awlaki in Yemen in 2008.


What that report is leading us to is that Hasan was a prime mover in the 9/11 CONSPIRACY! He may not have been exercising the mind control, but he was in the shadows of it at least. So how does a man who affiliated with the infamous 9/11 terrorists get past security screening to be appointed an officer in the military? The most likely scenario has to be he was doing their bidding all along. Major Hasan was even on the Presidential Transition Task Force of 2008 put on by The Homeland Security Policy Institute at George Washington University. That's a tough act for a crazed gunman.




In the TV show Lone Gunmen which accurately portrayed the 9/11 event before it happened with it's 'pilot' episode, they also alluded to a government black ops team called Romeo 61 that has been responsible for a lot of MAYHEM including the assassination of JFK. Can this part be the real deal. What grandstanding we see in the news pertaining to fear based terror campaigns and mass casualty events is nothing more than military psychological events aimed at getting WE THE PEOPLE to stampede into a preset trap. That has to be the most likely conclusion and the reason the state secrets provisions are applied with ruthless efficiency. They even erased the surveillance tapes of the Fort Hood attack. There were allegations of a second shooter. Worse still there were allegations two of Major Hasan's patients went berserk and went on a shooting binge.




Two US privates John Smith and John Henry had been seeing a military psychiatrist major Hasan at Fort hood for a few weeks. Both privates said they were completely against the war of oppression in the middle east and would refuse to report for active duty if ordered to do so. So the army put them both in therapy with Dr. Hasan. After more than five weeks of therapy both Christian privates were called to go to Afghanistan. Both privates warned they would not go and they would defend themselves with force if the army tried to force them to fight in a war they believed was morally wrong. Yesterday fellow soldiers tried to surprize the two consciencious objectors but the privates were prepared and killed 12 soldiers who tried to force their way into the privates' barracks at Fort Hood.


The world is nothing more than a giant illusion factory. Shakespeare said it best in the play 'As You Like It.'


All the world's a stage,

And all the men and women merely players.

They have their exits and their entrances,

And one man in his time plays many parts,




Our great difficulty in spite of the overwhelming pattern is that we can't see we're all prisoners of the concept of Plato's Cave. We can escape. We can change the channel. That is a personal response that you control. Once you exercise it, you are truly free. The mass disaster stimulation will have no effect. See the light. See the truth. The true enemies to mankind are obvious. The master pullers of the strings are still unscathed and may be brought to trial. By ordeal would be fitting justice.

PAINT IT BLACK MH370 VICTIM PHILIP WOOD TEXTS FOR HELP!

Posted by George Freund on March 31, 2014 at 5:25 PM


BLOCKBUSTER: HIJACKED IBM ENGINEER PHILIP WOOD SUCCESSFULLY DIALED OUT OF DIEGO GARCIA


The story below is NOW CONFIRMED. ALL THE DEBUNK ATTEMPTS ARE THIN AT BEST. I AM NOT GOING TO LET THIS ENGINEER SIT THERE AND BE DRUGGED ALONG WITH THE REST OF THE PEOPLE JUST BECAUSE A FEW SHILLS TRIED TO RIP THIS. DEBUNK ATTEMPTS ALL ANSWERED BELOW ORIGINAL POST AND ORIGINAL SOURCE EXPLAINED AND LINKED. I STATE ALL THROUGH THE ARTICLE THAT A REALLY GOOD HACKER COULD FAKE THIS, AND THE REASONS WHY I BELIEVE THAT TO NOT BE THE CASE. FROM THERE YOU CAN TAKE IT OR LEAVE IT.UPDATE: A retinex (absolute bit rendering) of the image sure looks like he is sitting there with a black bag over his head, just like the army does it. Ultimately a 100 percent answer to this cannot be obtained absent busting in there like Rambo.ORIGINAL POST:The blindfold:Philip claimed to be blindfolded when he sent the message. When the American military blindfolds someone, it is accomplished by putting a bag over the head that is locked so you can't get it off. This left the engineers hands free. This would have made it possible for him to pull his Iphone 5 (a fact confirmed by the Exif data) out of his butt as stated, and use the voice command ability of the Iphone to just talk to it to log in and post the message. This explains why he sent a black photo, he could not see what he was sending, he just knew he snapped a photo and sent whatever got taken.


The coordinates:When the coordinates are added to the fact that the photo's exif data does not match the Google coordinates or any other coordinates for Diego Garcia that are posted online, but is still within the boundaries of Diego Garcia, it proves that no one just pulled those coordinates off the web. It helps confirm that this was not just a hoax because the coordinates are exact to wherever on Diego Garcia the Iphone was when it took the photo.

 

ORIGINAL POST FOLLOWS:IBM ENGINEER TAKEN FROM HIJACKED FLIGHT 370 GOT A SELFIE OUT TO THE INTERNET.This image, which appears black was posted as taken in a dark cell by IBM engineer Philip Wood. SAVE IT TO YOUR DESKTOP. RIGHT CLICK IT. SELECT PROPERTIES. CLICK DETAILS, THAT REVEALS THE EXIF. Shills are saying I did not post the Exif. Shills pray for people to be stupid. NOTHING PROVES IT BETTER THAN THE ACTUAL IMAGE. THAT IS WHY I POSTED THE ACTUAL IMAGE. The picture is black because the cell was too dark, but a critical piece of information was embedded in the Exif data, the coordinates to Diego Garcia, where the picture was taken. And it's real, this is NOT a hoax. The coordinates in the picture indicate that the photo was taken within 3 miles of what Google officially gives for Diego Garcia. It is NOT EXACTLY what comes up on Google. It is off a couple miles, so NO ONE GOOGLED THIS, thus helping to confirm it's authenticity. I don't know how big the island is, but if it has a runway, that certainly fits.The picture posted with the following text: "I have been held hostage by unknown military personal after my flight was hijacked (blindfolded). I work for IBM and I have managed to hide my cellphone in my ass during the hijack. I have been separated from the rest of the passengers and I am in a cell. My name is Philip Wood. I think I have been drugged as well and cannot think clearly."

.



UPDATE: I put my best computer online today (serious security violation) BUT WAS ABLE TO RETINEX THE IMAGE AS A RESULT, AND YOU CAN SEE ENOUGH DETAIL TO SUPPORT PHILIP BEING DETAINED WITH A BLACK BAG OVER HIS HEAD, THE SAME WAY THE ARMY DOES IT. The retinex photo cannot be used for verification of Exif, if you check this one it will clearly say in the software tab "Gimp 2.6.12" and NOT the Iphone O.S. version, which ALL SOFTWARE DOES when it handles and saves an image. This is why I know the original is legit.Do this yourself for FREE. Download the Gimp image editor. Open the image with the Gimp. Click the colors tab. At the bottom of the list of options, you will see retinex. Set retinex to Scale: 133, Scale division 1, and dynamic to 0.0. Retinex squeezes everything out of an image that can possibly be seen, and it is my opinion that it does reveal enough.


Normally, a lens will vignette the corners, and put the least amount of light in the corners. But Retinex shows clearly that the corners of the image are brighter, and the center is dark. THAT would be caused by a black bag over Philip's head.

 

ASTEROID IMPACT LEVEL UPDATE: SCAMMERS ARE SAYING THERE NEVER WAS A PHILIP WOOD WORKING FOR IBM. BUT HIS LINKDIN DESTROYS THAT LIE AND CONFIRMS THE STORY:UPDATE: If Philip Wood´s linkdin is not embedded below exactly as stated, HERE IS THE LINK UPDATE: Jpeg now substituted due to regionally served hacks on the Linkdin account.



Image Exif data: THE SMOKING GUNThe Exif is intact. Exif data gets embedded in every image by every camera and includes the circumstances under which the photo was taken. It can be viewed by saving the image to your desktop, and then right clicking it and selecting image properties. Hit the details tab. You can see that the image was taken on March 18 with an Iphone 5, with the ISO at 3200 and a shutter of 1/15. The coordinates are included in the exif data because the Iphone knows where it is, and the coordinates are for Diego Garcia. THE FIRST TIME A BLANK PHOTO SAID IT ALL. Exif can't be rewritten with common software without a trace, ALL software leaves a note in the application tag that says the picture was modified by an application. Exif can be erased as well but NOT CHANGED WITHOUT A TRACE. Photos with the exif intact AND UNCHANGED will hold up in court. If the Exif is hacked and this is not real, the CIA or a really good hacker did this, which I doubt, I'd say it's probably real.


 

Another smoking gun is that the voice recognition software put the word personal instead of personnel. This is completely consistent with a blind software assisted dial out. Surrounding this story is the fact that the man who managed to get this information to Farganne (forum member Glitch) was harassed and received many threatening voice mails over it, that is another piece of evidence pointing to this as being real. One thing is certain, once it's posted here on this site the genie is OUT OF THE BOTTLE. I cannot stress how important it is that the GPS coordinates in the photo do not perfectly match what Google says and are not posted anywhere on the web, because it proves that the source of those coordinates did not come from google or Wikipedia, they really did come from the imaging device and it HAD TO be at Diego Garcia when it took the photo.


DEAR U.S. ARMED FORCES: THE GAME IS OVER. RETURN FLIGHT 370 TO MALAYSIA AIRLINES, RETURN THE PEOPLE TO THEIR FAMILIES, AND SEND PHILLIP WOOD HOME. You have been BUSTED!!!DEBUNK ATTEMPTS AND UPDATES I did not want to post, but now have to because of the way certain people took this. Iphone won't fit? That is SILLY. From an E.R. doctor who pulled a 12 inch long 8 inch wide salami out of an idiot´s butt OTHER DEBUNK ATTEMPTS: If anything was used to re-tag this image, it would say so in the software tag of the image. Any time software modifies any aspect of the image, the last thing to touch the image gets put in the software tag. The Iphone's standard software is in the image tag and nothing else. That means this image has NOT been re-tagged and that is the FIRST THING I checked before posting this story. And NO, YOU CANNOT MODIFY IT WITH A PROGRAMMING EDITOR UNLESS YOU ARE A MACHINE LANGUAGE GENIUS. Open notepad (which is a basic programming editor). Drag the photo into notepad. it will open as code. The Exif is all machine code. This is the NSA type hack I talked about, unless the NSA or a serious hacker wanted to do this, the photo is legit. And the surrounding circumstances also show this story to be legit.A non shill question: Diego Garcia is a military installation. Are there civilians on the island? ANSWER: YES, 1,600 of them. And they have cell phones no doubt. Civilian cell service would be there. And what about all the military spouses? They would be there too, and NOT in the military but (possibly) listed as military. They have phones as well, Diego Garcia would not be a black hole.


Non shill comment: Geosetter can modify exif. I did it, I changed the location in the picture. My comment: Did Geosetter erase the Iphone O.S. version? It should have, and that would prove the photo fake. Above, all that data is perfectly intact. All software I have seen will say it modified a photo. Since Geosetter is public domain it should say it had the image and produced it with the Iphone O.S. data either added to or removed entirely. Absent this, Geosetter would be a hacker app.


Sorcha Faal wrote: Why did he not post the Exif data. My comment: NOTHING IS BETTER THAN THE ORIGINAL PHOTO, WHICH CONTAINS THE EXIF. DONT YOU KNOW HOW TO VIEW IT? THE INSTRUCTIONS WERE CLEAR.


BLOCKBUSTER UPDATE AGAIN: This got posted to 4chan and was pulled immediately, but 4plebs, an independently run backup of 4chan which is NOT controlled has the original on archive, and the date of posting matches the photo. BINGO! read itHERE. This answers the question why the photo only surfaced recently. Someone surfing archives found it. 4chan would be absolutely a PRIME choice for someone in trouble.


 


More Debunks answeredThere was no Philip wood working for IBM - this one was really poor. This was the very first debunk posted anywhere, and it's so thin and transparent well, if you get fooled by that one let's just say I am not going to help you by linking out AGAIN. Re read the article pleaseThe exif data was hacked -


That would debunk the whole story, but it is not the case. Actually untraceably changing exif is not that easy. ALL LEGITIMATE SOFTWARE, EVERY LAST BIT OF IT OUT THERE, WILL SAY IT HAD THE PICTURE AND PRODUCED IT IF IT IS SAVED WITH THAT SOFTWARE. THERE ARE NO SUCH FINGERPRINTS ON PHILIP'S IMAGE. Most people do not even know what exif data is. From my experience I would say that fewer 9 out of 10 people have heard of it. Of the fewer than 10 percent who have, most will be photographers.


I have been doing photography and known about exif since the beginning of digital photography. And there have been times, for the sake of sending messages secretly embedded in Jpegs or claiming ownership of images, I have wanted to hack exif at least enough to pull entire Jpegs into programming editors to see if there was anything I could tweak. Except for a few notes in the Jpeg, the exif is machine language. That's pretty tough to work with and even most who work as professional programmers can't do it which makes that scenario highly implausible. And software like photoshop ALWAYS changes the software tag and claims full ownership of the image. So even though there are applications that can edit exif, they always leave a trace in the software tag. The photo posted by Philip had no such changes to the software tag.


If the image posted by Philip is NOT legit, it would have taken someone with an ability to write machine language to modify it without a trace, or a hacker with an obscure app to do it, and I call bunk on that because those types of people are small in number and have better things to do than hatch b.s. on the web. This was NOT done by a teenager for a week end prank. It would be a very small number of people that actually managed to do it, as I said all along - CIA/NSA types or really good hackers. And I seriously doubt that prospect.


 

The only thing I have a question for with regard to how this got done is WHY 10 days? This posted on the 18th, and that's quite a while after the event. There is no doubt the Iphone was NOT up philip's butt the entire time. So now we get into guessing games about why it took 10 days. My guess? Somehow for a period of time Philip was tied up under close supervision but not having his butt watched at the toilet. After the initial search he put the phone in a more comfortable position in his pants but did not call. And it took 10 days for him to finally get separated from the other people as stated in the message and have enough privacy to send a message out.


Why post to 4chan rather than call home? That's pretty easy to explain. The NSA would have blocked that particular number from reaching anyone of importance in Philip's life. They do it to my phones all the time, to such an extent I gave up on cell phones, they are useless for me. And even Claudia's phones have been cut off from receiving calls from family members, the NSA does that just to isolate people who are dissenters. Flight 370 would have been handled. E-mails? Ditto. Facebook and others that require log in? DITTO. That left only totally public blogs that did not require log in to get a message out, and 4chan is one of those. Those are the TWO legitimate questions I can think of that people could actually ask about how and why, the rest - such as you could never get a phone up your ass when you are a really smart guy who would have noticed the plane turned around and the pilot on the intercom saying the plane has been hijacked and now you have FIVE FULL HOURS TO THINK OF SOMETHING BEFORE THE PLANE LANDS, come on now, ONE guy out of 230 figured something out. The whole argument about how the phone made it is in my opinion silly.


The bottom line is that the arguments against the story are a whole lot weaker than the arguments supporting it, and when you add to that the fact that the web site got hacked repeatedly and someone even managed to get a back ground image of a bloody body strewn all the way through it for a few hours Saturday night, well, hackers don't have my log ins, only the NSA or other high level gov types would because I am too good with passwords (they are typically un hackable ones like N532r689$^// and with hackers they won't fix it right when they think I am going to log on, they will leave it up. It got fixed without me doing anything, I never knew about it until someone told me. That would be a back stab by an intelligence agency, WHY WOULD THIS STORY BE THAT IMPORTANT IF IT WAS B.S.? They don't just pull that type of stunt out of the blue.


And the shillage was MASSIVE on this one, with outright lies that were very weak early on, evolving into other lies that were harder to dismiss, and now they are focusing on the exif and whether or not it can be changed without a trace. Well, my answer is above and was always in the original post, and it is the RIGHT ANSWER, YES, BY HACKERS AND INTELLIGENCE AGENCY TYPES, BUT NOT BY WEEKEND JOE AND THAT MAKES THAT ARGUMENT WEAK. Ultimately I guess anyone who worked in the right places could do anything, including walking up to you cloaked by the latest technology and hitting you in the head with a bean bag. But the preponderance of evidence weighs heavily in favor of this all being legit, and that is what I am sticking with.


Exif not reliable?


Ultimately you could say it is not reliable because yes, a really good programmer could hack it, and that is ABSOLUTELY TRUE, but that DOES NOT mean that the photo is automatically fake.


And look at what a Retinax filter pulled out of the darkness - Hard to see, but sure looks like it could be like THIS image from Abu Ghraib:




On 2014-03-31 11:52, Mary wrote:


Jim, I am a longtime reader and supporter. Philip Wood was my husbandTodd's client - my husband is a realtor in Keller, TX and we soldPhilip's home on Lazy Lane in Keller several years ago. When he andhis wife divorced, we also sold Elaine a new home just a couple ofyears ago. We kept in touch with him from time to time.


I have had trouble sleeping since the info came out about him beingheld in a cell with a bag over his head. Philip is a very nice guy, aman who lived a simple life, and he was just doing his job for IBM. Hewas involved with "data storage" for IBM - at least that's what hetold us, and he was so excited to get over there to Beijing and thesurrounding areas to see the world and help IBM.

 



Rss_feed