Opening the Black Box of America’s Propaganda Machine – Prepare for Change

National Security Agency whistleblower Edward Snowden and WikiLeaks founder Julian Assange have doubled down recently on the games being played in cyberspace by America‘s cyber-warriors.

Snowden suggests that many of NSA’s most damaging malware programs are now in the hands of America’s opponents, thanks to enterprising foreign counter-intelligence hackers known as the Shadow Brokers. there will be more hacked bombshells to drop on Team Clinton, courtesy of weak security in Democratic National Committee and Clinton campaign computer systems.

We have entered a new phase of cyber-warfare, one in which America’s (and Israel’s) most damaging computer hacking and disruption programs are available to anyone willing to pay in Bitcoins on the cyber-black market. The Democratic Party’s leaked emails, coupled with the leaked State Department cables, has Hillary Clinton in an outrage.

These disclosures, along with the Snowden disclosures that illustrate how America spies on friend and foe, have opened the Black Box of America’s propaganda machine.

Continue reading Opening the Black Box of America’s Propaganda Machine – Prepare for Change

CHEMICAL WARFARE RED ALERT: Zika panic DEET chemical part of a brain damaging binary weapon being carpet bombed across America’s cities – Prepare for Change

With every ignorant news organization across America now pushing Americans to slather their skin with DEET chemicals as a defense against Zika mosquitoes, there’s something every American needs to know: DEET is one chemical component of a binary chemical weapon system currently being carpet bombed onto U.S. civilian populations.

That’s an aggressive assertion, I fully realize. So in this article, I’m going to lay out the science for you that proves all this, citing published scientific studies, government research papers, historical accounts of military actions and molecular citations from the world’s most authoritative sources on chemistry. As far as my own science background goes, I am the lab science director of CWC Labs, an internationally accredited, ISO-17025 accredited forensic food analysis laboratory. I personally run mass spec (LC/MS-TOF) systems with a special focus on pesticides, herbicides and chemical toxicology. In fact, I have just completed a science paper on the world’s first LC/MS-TOF accurate quantitation and anti-counterfeit analysis method for cannabidiols in hemp extracts, and that paper is going to be published later this year at a science expo event. I’m also the author of the Amazon.com #1 bestselling science book Food Forensics.

Continue reading CHEMICAL WARFARE RED ALERT: Zika panic DEET chemical part of a brain damaging binary weapon being carpet bombed across America’s cities – Prepare for Change

New Zealand to Have Russia Manage Voting for UN Secretary General » The Event Chronicle

New Zealand has made the decision to have Russia manage the voting for a new UN Secretary General in September, Gerard van Bohemen, New Zealand’s permanent representative at the UN, has confirmed.

MOSCOW (Sputnik) – New Zealand will preside over the UN Security Council in September and will still oversee the meetings to discuss the ballots, according to van Bohemen.

“New Zealand has chosen to do this to counter any conflict-of-interest perception issues given we also have a candidate,” van Bohemen said on Saturday, as quoted by The New Zealand Herald.

The decision to give Russia the responsibility to carry out the polls is linked to the fact that New Zealand’s former prime minister Helen Clark is one of the candidates for the post of UN Secretary General.

The term of current UN Secretary General Ban Ki-moon ends on December 31, 2016.

Continue reading New Zealand to Have Russia Manage Voting for UN Secretary General » The Event Chronicle

GIANTS in Suspended Animation Ready to Awaken, Whistleblower Claims – UFOholic.com

Published on September 16, 2015 by

More than a century ago, a secret society discovered a cave hidden deep beneath the Earth’s surface. Inside the cave were several ancient giants, alive but in a state of suspended animation.

We might think we know the truth about Earth’s ancient history but it isn’t so.

Whistleblower Corey Goode claims to have spent 20 years enrolled in secret space programs and covert government operations. During this period, he witnessed a multitude of extremely bizarre events and visited places we never even knew existed.

One of the most interesting of them was an underground chamber where ancient giants were being kept in suspended animation, since times immemorial. According to Goode, the chamber was constructed by the Ancient Builder Race, and the hibernating giants were the last of their kind.

Several of these giants were kept inside crystal pods, in a deathlike state. But they were not dead.

stasis_1 (1)

Continue reading GIANTS in Suspended Animation Ready to Awaken, Whistleblower Claims – UFOholic.com

The N.S.A. Leak Is Real, Snowden Documents Confirm

MON, 8/22/2016 BY SAM BIDDLE

 On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.

The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.

The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.

SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.

But malicious software of this sophistication doesn’t just pose a threat to foreign governments, Johns Hopkins University cryptographer Matthew Green told The Intercept:

The danger of these exploits is that they can be used to target anyone who is using a vulnerable router. This is the equivalent of leaving lockpicking tools lying around a high school cafeteria. It’s worse, in fact, because many of these exploits are not available through any other means, so they’re just now coming to the attention of the firewall and router manufacturers that need to fix them, as well as the customers that are vulnerable. So the risk is twofold: first, that the person or persons who stole this information might have used them against us. If this is indeed Russia, then one assumes that they probably have their own exploits, but there’s no need to give them any more. And now that the exploits have been released, we run the risk that ordinary criminals will use them against corporate targets.

The NSA did not respond to questions concerning ShadowBrokers, the Snowden documents, or its malware.

A MEMORABLE SECONDDATE

The offensive tools released by ShadowBrokers are organized under a litany of code names such as POLARSNEEZE and ELIGIBLE BOMBSHELL, and their exact purpose is still being assessed. But we do know more about one of the weapons: SECONDDATE.

SECONDDATE is a tool designed to intercept web requests and redirect browsers on target computers to an NSA web server. That server, in turn, is designed to infect them with malware. SECONDDATE’s existence was first reported by The Intercept in 2014, as part of a look at a global computer exploitation effort code-named TURBINE. The malware server, known as FOXACID, has also been described in previously released Snowden documents.

Other documents released by The Intercept today not only tie SECONDDATE to the ShadowBrokers leak but also provide new detail on how it fits into the NSA’s broader surveillance and infection network. They also show how SECONDDATE has been used, including to spy on Pakistan and a computer system in Lebanon.

The top-secret manual that authenticates the SECONDDATE found in the wild as the same one used within the NSA is a 31-page document titled “FOXACID SOP for Operational Management” and marked as a draft. It dates to no earlier than 2010. A section within the manual describes administrative tools for tracking how victims are funneled into FOXACID, including a set of tags used to catalogue servers. When such a tag is created in relation to a SECONDDATE-related infection, the document says, a certain distinctive identifier must be used.

The same SECONDDATE MSGID string appears in 14 different files throughout the ShadowBrokers leak, including in a file titled SecondDate-3021.exe. Viewed through a code-editing program (screenshot below), the NSA’s secret number can be found hiding in plain sight.

All told, throughout many of the folders contained in the ShadowBrokers’ package (screenshot below), there are 47 files with SECONDDATE-related names, including different versions of the raw code required to execute a SECONDDATE attack, instructions for how to use it, and other related files.

After viewing the code, Green told The Intercept the MSGID string’s occurrence in both an NSA training document and this week’s leak is “unlikely to be a coincidence.” Computer security researcher Matt Suiche, founder of UAE-based cybersecurity startup Comae Technologies, who has been particularly vocal in his analysis of the ShadowBrokers this week, told The Intercept “there is no way” the MSGID string’s appearance in both places is a coincidence.

WHERE SECONDDATE FITS IN

This overview jibes with previously unpublished classified files provided by Snowden that illustrate how SECONDDATE is a component of BADDECISION, a broader NSA infiltration tool. SECONDDATE helps the NSA pull off a “man in the middle” attack against users on a wireless network, tricking them into thinking they’re talking to a safe website when in reality they’ve been sent a malicious payload from an NSA server.

According to one December 2010 PowerPoint presentation titled “Introduction to BADDECISION,” that tool is also designed to send users of a wireless network, sometimes referred to as an 802.11 network, to FOXACID malware servers. Or, as the presentation puts it, BADDECISION is an “802.11 CNE [computer network exploitation] tool that uses a true man-in-the-middle attack and a frame injection technique to redirect a target client to a FOXACID server.” As another top-secret slide puts it, the attack homes in on “the greatest vulnerability to your computer: your web browser.”

One slide points out that the attack works on users with an encrypted wireless connection to the internet.

That trick, it seems, often involves BADDECISION and SECONDDATE, with the latter described as a “component” for the former. A series of diagrams in the “Introduction to BADDECISION” presentation show how an NSA operator “uses SECONDDATE to inject a redirection payload at [a] Target Client,” invisibly hijacking a user’s web browser as the user attempts to visit a benign website (in the example given, it’s CNN.com). Executed correctly, the file explains, a “Target Client continues normal webpage browsing, completely unaware,” lands on a malware-filled NSA server, and becomes infected with as much of that malware as possible — or as the presentation puts it, the user will be left “WHACKED!” In the other top-secret presentations, it’s put plainly: “How do we redirect the target to the FOXACID server without being noticed”? Simple: “Use NIGHTSTAND or BADDECISION.”

The sheer number of interlocking tools available to crack a computer is dizzying. In the FOXACID manual, government hackers are told an NSA hacker ought to be familiar with using SECONDDATE along with similar man-in-the-middle wi-fi attacks code-named MAGIC SQUIRREL and MAGICBEAN. A top-secret presentation on FOXACID lists further ways to redirect targets to the malware server system.

To position themselves within range of a vulnerable wireless network, NSA operators can use a mobile antenna system running software code-named BLINDDATE, depicted in the field in what appears to be Kabul. The software can even be attached to a drone. BLINDDATE in turn can run BADDECISION, which allows for a SECONDDATE attack.

Elsewhere in these files, there are at least two documented cases of SECONDDATE being used to successfully infect computers overseas: An April 2013 presentation boasts of successful attacks against computer systems in both Pakistan and Lebanon. In the first, NSA hackers used SECONDDATE to breach “targets in Pakistan’s National Telecommunications Corporation’s (NTC) VIP Division,” which contained documents pertaining to “the backbone of Pakistan’s Green Line communications network” used by “civilian and military leadership.”

In the latter, the NSA used SECONDDATE to pull off a man-in-the-middle attack in Lebanon “for the first time ever,” infecting a Lebanese ISP to extract “100+ MB of Hizballah Unit 1800 data,” a special subset of the terrorist group dedicated to aiding Palestinian militants.

SECONDDATE is just one method that the NSA uses to get its target’s browser pointed at a FOXACID server. Other methods include sending spam that attempts to exploit bugs in popular web-based email providers or entices targets to click on malicious links that lead to a FOXACID server. One document, a newsletter for the NSA’s Special Source Operations division, describes how NSA software other than SECONDDATE was used to repeatedly direct targets in Pakistan to FOXACID malware web servers, eventually infecting the targets’ computers.

A POTENTIALLY MUNDANE HACK

Snowden, who worked for NSA contractors Dell and Booz Allen Hamilton, has offered some context and a relatively mundane possible explanation for the leak: that the NSA headquarters was not hacked, but rather one of the computers the agency uses to plan and execute attacks was compromised. In a series of tweets, he pointed out that the NSA often lurks on systems that are supposed to be controlled by others, and it’s possible someone at the agency took control of a server and failed to clean up after themselves. A regime, hacker group, or intelligence agency could have seized the files and the opportunity to embarrass the agency.

Source: The N.S.A. Leak Is Real, Snowden Documents Confirm

Exopolitics » Creating the Optimal Timeline for Full UFO Disclosure & Ascension

AUGUST 22, 2016 BY DR MICHAEL SALLA

Whistleblower, Corey Goode, today released the second part of an extensive report about what he claims are a series of recent meetings he has had with representatives from different extraterrestrial groups, an “Inner Earth” civilization and a secret space program alliance. He provides additional information to what was presented in part one about the possibility of massive solar activity, which global elites (aka Syndicates/Cabal) are convinced will have devastating effects on the planet.

Goode’s claims, which are quite rich in detail and scope, can at times be very disturbing. Those new to his information may be tempted to dismiss it as sheer fantasy. However, after more than a year of closely investigating Goode’s claims, much of which was presented in the book, Insiders Reveal Secret Space Programs and Extraterrestrial Alliances, I have yet to find anything that makes me suspect that he is being untruthful in any way.

Goode’s revelations provide a framework for understanding what may well be the most important diplomatic meetings and negotiations currently underway that directly effect all of humanity.

Continue reading Exopolitics » Creating the Optimal Timeline for Full UFO Disclosure & Ascension

Yemen Offers Russia Use Of Its Airports And Ports In “Fight Against Terrorism” | Zero Hedge

While Obama was golfing in the midst of another Louisiana natural disaster, and is set to end his vacation so he can do what is truly important, support Hillary Clinton in the presidential race, Putin has been busy making new friends: first he did the seemingly impossible, having rekindled relations with Turkey to the point where Ankara itself is warning it may quit NATO to seek “military cooperation” with Russia, followed quickly by strengthening relations with Iran so that Moscow can now use an Iranian airbase to strike ISIS, much to the angry dismay of the US and the United Nations, the latest stunning pivot toward Russia comes from yet another civil war-torn nation, Yemen, whose former president, Abdullah Saleh, said its newly-formed governing council could work with Russia to “fight terrorism” by allowing Moscow use of the war-torn country’s military bases.

What makes the announcement even more striking is that Ali Abdullah Saleh, Yemen’s ex-president who was toppled by mass protests in 2011 as part of the Arab Spring launched by none other than the US when it “intervened” in Libya and Egypt, was a former staunch counter-terrorism ally of the US; it is this former US ally who told state-owned channel Russia 24 that Yemen was ready to grant Moscow access to air and naval bases.

Continue reading Yemen Offers Russia Use Of Its Airports And Ports In “Fight Against Terrorism” | Zero Hedge

FBI Uncovers Over 15,000 More Emails In Clinton Probe | Zero Hedge

Tyler Durden's picture

Updating our earlier note, it appears The State Department’s stalling has been disallowed… (as Bloomberg reports)

A judge ordered the State Department to expedite its review of almost 15,000 previously undisclosed documents recovered by the FBI from Hillary Clinton’s private e-mail servers.

U.S. District James Boasberg on Monday ordered the State Department to process those recovered records by Sept. 22 and report back to him that day. He didn’t set a schedule for public release. The department raised the possibility of a phased release starting Oct. 14, which left open how many would be disclosed before the Nov. 8 presidential election.

As we detailed earlier, in yet another incident pointing to Hillary’s ‘above the law’ persistent lies, WaPo reports The FBI’s year-long investigation of Hillary Clinton’s private email server uncovered tens of thousands more documents from her time as secretary of state that were not previously disclosed by her attorneys. Worse still, as Judicial Watch details, “it looks like the State Department is trying to slow roll the release of the records.”

Continue reading FBI Uncovers Over 15,000 More Emails In Clinton Probe | Zero Hedge

New Russia-China-Iran Alliance Could Push the US out of Much of the Middle East » The Event Chronicle

When the current Syrian conflict first erupted in 2011 — and then enflamed in 2012 — a small minority of the American public probably wondered why President Obama was not intervening to help the Syrian people as he had done in Libya (they were likely completely unaware the president had already been interfering heavily in Syria since the conflict began). However, some pundits speculated that Obama would eventually intervene directly, and that this intervention would be the beginning of the end of the American empire as we know it.

What started out as a seemingly hollow prediction has become as true a statement as any. First, American involvement began with funding, arming, and training violent rebels to try to overthrow the Syrian government. Then came attempts to misrepresent so-called “intelligence” to justify military intervention against Assad in 2013. And finally, like a dream come true, Washington was then able to capitalize  on the growth of ISIS in Syria, a growth predicted by their own security establishment in 2012, which then became an excuse to start bombing Syrian territory in 2014. By interfering so forcibly in the affairs of Syria, the U.S. has forced a number of countries  — notably Iran, China and Russia — to step up and strike back at U.S. efforts to destabilize the region.

Continue reading New Russia-China-Iran Alliance Could Push the US out of Much of the Middle East » The Event Chronicle

GaiaPortal 8-22-16… “Elementals vibrate with the Hue-man character” | Kauilapele’s Blog

Another fascinating GaiaPortal message. I believe “floridal” refers to flowers (floral).

For those wanting more detailed interpretations, I suggest going to Rosalie Parker and/or Justin at SitsShow.

——————————————————

Elementals vibrate with the Hue-man character

Elementals vibrate with the Hue-man character.

Sensations of Higher Testimonials are felt.

Nonabiders are released.

Floridal scents are connected.

The price is paid.

Continue reading GaiaPortal 8-22-16… “Elementals vibrate with the Hue-man character” | Kauilapele’s Blog

The Second Summit — British Government Gratitude Explained – Anna Von Reitz

Tuesday, August 23, 2016 by Anna Von Reitz

Yes, I have been quiet this week.  And yes, there is a reason.

I have been holed up all week with a small group of researchers following breakthrough information discovered last week scattered throughout the Foreign Affairs Manuel. The results will take several days to explain.
Look at these two groups of words “United States of America” and “united States of America” — look close.
In the first group, you have a proper name in Upper and Lower Case, something called “United States of America”.  This name implies that the “United States” belongs to something called “America”.  In the second group, you have the word “united” being used as an adjective to describe something called “States of America”.   Same four words, totally different meanings and entities involved.

Continue reading The Second Summit — British Government Gratitude Explained – Anna Von Reitz

GOOGLE HIDES “CLINTON BODY COUNT” SEARCH – Nesaranews

Monday, August 22, 2016 By Paul Joseph Watson

Web  giant  caught  censoring  negative  information  about  Hillary  yet  again!

The ‘Clinton body count’ is an infamous list of alleged murders connected to the Clintons.
When a web user searches for “clinton body” on Bing or Yahoo Search, the suggested results all relate to the Clinton body count controversy.
However, search for the same term on Google and “clinton body” only returns suggestions related to auto-repair shops, and nothing to do with the Clinton body count.

Continue reading GOOGLE HIDES “CLINTON BODY COUNT” SEARCH – Nesaranews

Corey Goode Intel Update Part 2 – Sphere-Being Alliance

exop22 Aug 2016 : 16:00

Raw-Tear-Eir greeted me in the normal fashion. Raw-Rain-Eir, Raw-Mare-Eir and the Golden Triangle Head Being stayed in position about 30 feet away and seemed to have their attention focused in my direction.

Tear-Eir then began to communicate with me using similar wording as seen in the Law of One.

When I was in Joshua Tree for the conference this past summer, I had an experience that caught me off guard. It began when many of the attendees at Contact in the Desert saw a blue blinking light in the sky for some time, at a high altitude. There was no corresponding red light as you would normally see with an airplane. The “blue blinker” did not move at all like a plane, going forwards and backwards and side to side in different patterns. I called David in excitement when I saw it myself and soon he went outside and observed it for an extended time as well.

The next morning, I was in my cabin laying on the bed when I suddenly heard a chorus of voices of all ages and both genders repeating “We are the messengers and facilitators of the One Infinite Creator.” I immediately jumped out of bed and went outside to see if the source of the voices was visible. I saw nothing as I scanned the desert terrain and the skies above it. The voices stopped. I went back inside the cabin and sat on the bed, wondering what just happened. I glanced over at my copy of the Law of One (Book One) that was on the head of the bed.

Continue reading Corey Goode Intel Update Part 2 – Sphere-Being Alliance

Kazarian Mafia In Total Panic – DR WILLIAM MOUNT

VIDEO: Kazarian Mafia In Total Panic – YouTube

The Unholy Alliance (NWO, Cabal, Unholy Alliance) is in total panic mode at this moment in time

Last night, while most of us were asleep, the orders were given to initiate Operation Pincer: The invasion of Russia by forces of the German, Polish and French Governments – with the United States to follow and “Save The Day” and “Re-establish Peace” in Russia – 1 Million People Praying

Nobody invaded anybody.

The artillery was silent and the US Air Force stood down.

Of course – they never factored in the response from Belarus either – which has a fierce military. The though of an Invasion there by Germany as ordered by Hitler’s Daughter Angela Merkel brings back memories that should never be remembered – destruction, death camps….

Continue reading Kazarian Mafia In Total Panic – DR WILLIAM MOUNT

Trump Surges Ahead Of Clinton In The Polls Amid Media Blackout | Your News Wire

August 22, 2016 by Sean Adl-Tabatabai

Donald Trump has overtaken his political rival Hillary Clinton in a major new poll out this weekend, as mainstream media outlets have refused to publish the results to the public.

Amid a widespread media blackout, the Republican candidate is back in the lead, following a major shake-up in his campaign’s team.

Sputniknews.com reports:

Following a major shake-up in his campaign’s leadership with the hiring of seasoned political operative Kellyanne Conway to manage the effort and controversial Brietbart CEO Steve Bannon to consult on messaging, Donald Trump has seen a meteoric rise in daily tracking polls jumping eight points to somersault past Hillary Clinton calling the corporate media’s coronation of the former Secretary of State into question.

Continue reading Trump Surges Ahead Of Clinton In The Polls Amid Media Blackout | Your News Wire

The main factions in the battle for the planet earth and their current status – Weekly geo-political news and analysis Message from Benjamin Fulford

August 22, 2016 by benjamin

The ongoing battle for control of the financial system, and thus control over the process of deciding what we as a species will be doing in the future, is reaching a climax. For this reason, this might be a good time to look at who the major players are and what their position is.

First of all, let us look at the Khazarian/Nazi faction that took over control of the Europe, Japan and the United States following the September 11, 2001 false flag attack in New York. This faction is led by George Bush Sr., David Rockefeller and their lackeys. Their plan was to reduce the world’s population by 90% through starvation, disease and war. Ample proof of this has been provided to various police, military and intelligence agencies around the world. Since the Nazi takeover of the United States was completed with the election stolen by George Bush Jr. in the year 2000 the government of the United States has tried to murder us through the release of bio-weapons including SARS, Bird Flu, Ebola etc

Continue reading The main factions in the battle for the planet earth and their current status – Weekly geo-political news and analysis Message from Benjamin Fulford

Putin “Erupts” Over Million Dollar “Spy Payments” To Hillary Clinton – WhatDoesItMean

August 22, 2016 By: Sorcha Faal, and as reported to her Western Subscribers

The ongoing Security Council (SC) “war” between Alexander Bortnikov, Director of the Federal Security Service (FSB), and Valentina Matviyenko, Chairwoman of the Council of Federation, regarding Hillary Clinton’s secret emails reached a new and toxic level earlier today after President Putin was reported to have “gone ballistic/erupted” upon his being told that the Foreign Intelligence Service (SVR) had, to date, paid to this American presidential candidate upwards of $85 million—with another $200 million expected to be paid out to her by the end of 2017.  [Note:Some words and/or phrases appearing in quotes are English language approximations of Russian words/phrases having no exact counterpart.]

 

According to this report, and as we had previously (6 May) reported on, Director Bortnikov and Chairwoman Matviyenko have been locked in a bitter struggle over how best the Federation can maximize the usage of Hillary Clinton’s secret emails and telephone calls currently in the possession of SVR—with Bortnikov favoring using them for “persuasion/blackmail” as is currently being done, and Matviyenko advocating their being released to destroy what she considers the “most dangerous American woman in history”.

Continue reading Putin “Erupts” Over Million Dollar “Spy Payments” To Hillary Clinton – WhatDoesItMean

Clinton: Leopards and spots and all that | David Icke

Source: Clinton: Leopards and spots and all that | David Icke

Office of Poofness 8-21-16… “That’s What Friends Are For” | Kauilapele’s Blog

Another Poof, et al, report. All I will add is that, as I have been perceiving this, no matter what anyone says or writes or puts a date on, “it” will happen when “it” happens. And when the time is “right” we will know it. Until then, I prefer to live one moment at a time.

Music lyrics and two video link are at the end.

[Kp note: I always take these “Poofnesses” as potential data. Bottom line, how does it hit my Higher Innards”? Does it “ring” true within (if it “rings” at all)?]
[Office of Poofness support links are at the end of each posting. To support RMN for publishing these each week, please click here.

[Poof] “SO what is next is the chipping away at the walls of obstacles that has been on going for years. The place wherein you are standing now is quite different than a few years ago. We all knew the trickery and the sophistication of the cabal… Much more is beginning to occur that will lead to more releasing of energies, more funds beginning to flow and more people reporting the information such that you will know that the dam has broken. And it has!

“…there is more we can say that will make you aware of how important all of this is. Funds have been redirected and withdrawn for hedging against more profits. These funds were supposed to be working to rebuild infrastructures, not let it crumble.

“The people have no idea just how deeply they have been jerked around. They will, in time. And for now that s enough to say, keep the eye on the goal and ride this out. ”

[Susan] “The currency exchange process is certainly preceding nicely with many more verifiable confirmations. I have heard many whispers this week of a substantial nature. Let me assure all of those, including myself, waiting for the Prosperity Programs that it surely looks like all awaited events are on the same page finally and will manifest in unison.”

[ZAP] “BREAKING NEWS: AT 3:33 PM, THE SPECIAL FORCES TEAM HEADED BY THE COMMANDER KNOWN ONLY AS “THE DUCK”, WILL BE INITIATING A SPECIAL MISSION TO REMOVE THE CABAL MALWARE CLOGGING THE SUPER COMPUTERS IN THE IN THE SECRET CISTERN UNDER THE PENTAGON. THIS WILL ORDER ALL THE BANKS TO TAKE A ONE DAY HOLIDAY TO INSTALL THE NEW REPUBLIC SOFTWARE IN THEIR COMPUTERS THAT WILL RELEASE THE SUPER SECRET ACCOUNTS AND ALLOW EVERY SINGLE MAN, WOMAN AND CHILD TO ENJOY TAX BREAKS ON EVERY STARBUCKS LATTE THEY ORDER.

The new republic does exist. THE RV IS UNDERWAY WITH THE BIG BOYS EXCHANGING FIRST. THE HISTORIC ASSETS ARE STARTING TO BE COMPENSATED. THESE THREE MAINSTAYS OF THE GLOBAL RESET ARE PRETTY EVIDENT NOW. ALL THE DETAILS OF THESE ELEMENTS ARE THE FOOD OF THE INTERNET GURUS AND WE SEE BOTH FACTS AND WISHFUL THINKING INTERMINGLED IN THE VARIOUS REPORTS OUT THERE.”

————————————————————-

Greetings and Salutations:

POOF SAID: SO what is next is the chipping away at the walls of obstacles that has been on going for years. The place wherein you are standing now is quite different than a few years ago. We all knew the trickery and the sophistication of the cabal, or the illuminati or the great bosses however you wish to view them of course you do but the resources were mismanaged and became non- accessible and the time to move any serious number of funds became paralyzed.

As has been mentioned before had this happened earlier the intended resources would simply have fled back into the cabals pockets. So here you are today, with much occurring that is a prelude to things to come. Much more is beginning to occur that will lead to more releasing of energies, more funds beginning to flow and more people reporting the information such that you will know that the dam has broken. And it has!

Continue reading Office of Poofness 8-21-16… “That’s What Friends Are For” | Kauilapele’s Blog

Illuminati Clone Tells All

This is hard to believe I know, but his information is consistent with other information that has come out and the technology that is available to them ->Brian

Published on 8 Apr 2016

Illuminati insider and prisoner Donald Marshall interviewed by Vinny Eastwood on February 26, 2013.

Continue reading Illuminati Clone Tells All

 State forces parents to sign vaccine docs – NESARANEWS

Sunday, August 21, 2016

Stinging fight erupts over new ‘attempts to invade families’ privacy’

The will of We the People and the valid concerns for the safety, health and welfare of our children are being TRAMPLED upon by a pseudo corporation ‘government’. This fraudulent ‘government’ is illegal and traitorous to this nation.


Bob Unruh
WND Exclusive

August 21 2016  

A fight has erupted over a decision by bureaucrats in Colorado to go, according to critics, well beyond what the law allows and threaten parents of home schoolers seeking exemptions from state vaccinations requirements for their children.

There was a plan before the legislature earlier this year that would have demanded homeschool parents sign forms stating things like, “My child/I may be at increased risk of developing …” and “Failure to follow the advice of a physician … who has recommended vaccines may endanger my child’s/my health or life and others who come into contact with my child/me.”

Continue reading  State forces parents to sign vaccine docs – NESARANEWS

Will Obama attempt to take over the elections? Nesaranews

Thursday, 11 August 2016 by 

What started as news articles reporting potential danger to American elections from Russian hackers has quickly morphed into a call for a federal agency to protect our elections from those alleged Russian hackers. But many of the threats cited have nothing to do with the Internet, and giving blanket protective authority to a federal agency would grant broad powers far in excess of what the U.S. Constitution allows. (OR would be ‘wise’ to allow)

On July 27, the Washington Post carried an article by Bruce Schneier entitled “By November, Russian hackers could target voting machines.” Schneier detailed numerous security weaknesses in America’s electoral computer systems, and pointed to the lack of a voter-verified paper audit trail (VVPAT) in many computerized voting machines. Schneier also wisely emphasized that our elections should have “no Internet voting.” (It has already been proven that the fraudulent election vote counts are coming from the offshore vote counting by George Soros’  companies.)

Continue reading Will Obama attempt to take over the elections? Nesaranews

Leaked Memo Shows Soros Was Secret Ruler Of Ukraine In 2014 | Your News Wire

 

August 21, 2016 by Sean Adl-Tabatabai

Newly released documents show that George Soros, via his Open Society NGO, secretly influenced the Ukraine government in 2014 to undermine Russia.

In the recent 2,500 trove of leaked documents one memo revealed the immense control Soros had over Ukraine following the illegal Maidan government overthrow.

Theduran.com reports:

Soros and his NGO executives held detailed and extensive meetings with just about every actor involved in the Maidan coup…from US Ambassador Geoffrey Pyatt, to Ukraine’s Ministers of Foreign Affairs, Justice, Health, and Education.

Continue reading Leaked Memo Shows Soros Was Secret Ruler Of Ukraine In 2014 | Your News Wire

Soros Caught Funding Fake Islamophobia On Twitter | Your News Wire

Posted on August 21, 2016 by Sean Adl-Tabatabai

Leaked documents from the Open Society Foundation reveals that George Soros funded left-wing think tank Demos to fabricate data that exaggerated the problem of Islamophobia on social media.

The left-wing think tank had recently released a controversial report that suggested Islamophobia was “rampant” on Twitter, leading to liberal media outlets demand that more rules, laws and regulations be imposed in order to deal with the alleged problem.

Breitbart.com reports:

Leaked documents from the Open Society Foundation (OSF) show that George Soros’ organization funded Demos to be able to conduct research over social media platforms like Twitter.

Continue reading Soros Caught Funding Fake Islamophobia On Twitter | Your News Wire

Kp Message 8-21-16… “The Mission is Now” | Kauilapele’s Blog

Well, I am sitting here at my computer, after watching a movie (Captain America, Winter Soldier), and feeling the call in this now moment. I’m not sure exactly why I’m writing this, but it is clear that we each have a “mission”, in this now moment.

There is a lot going on, all over the planet. But in particular, with the rising vibrations of and on this planet, and within ourselves, each of us have particular, and specific, now moment “reasons for being here”… in this now moment.

It may involve travel, it may not. It may involve inner work, it may not. It may involve groups of people, it may not.

But each knows what their mission is. Somewhere inside each one, the calling is there.

Continue reading Kp Message 8-21-16… “The Mission is Now” | Kauilapele’s Blog

a part of the movement to Truth!