content for usaapay.com courtesy of thenotimes.com
WELCOME

spread the word
.


The No Times
comments, ephemera, speculation, etc.
(protected political speech and personal opinion)

- If this is your 1st visit to this page, please start at the bottom -


2025-

This web site was taken down on 11 August 2024
by the Censorship Industrial Complex.


We shall resume operations as soon as our
1st Amendment rights are fully restored.



2024-


NOVEMBER ELECTION FACTS
The Deep State knows 4 to 5 hours after polls close who won a presidential election.
It doesn't take several days.
With the CIS ALBERT Sensors they know the results by late on election day.
In 2020, counting was stopped in so-called swing states (it's more accurate to call them cheat states) once the magnitude of President Trump's landslide re-election victory was known.
The cheaters needed several days to change electronic tallies, switch votes, destroy legitimate ballots and create illegitimate ballots.
ANY STATE THAT STOPS COUNTING OR TAKES MORE THAN 24 HOURS TO PUBLISH ELECTION RESULTS IS CHEATING.



SEPT., 2024 BLOG ENTRIES

OCT., 2024 BLOG ENTRIES


2024-08-13 g
TRUMP NOT IN DECLINE

TRUMP & MUSK TWITTER SPACE ON 𝕏


*
*
*
* *
*
* *
*
*
* * * *
*
*

See also: https://revolver.news/2024/08/over-one-billion-views-and-counting

*
RELATED:

* *
*
2024-08-13 f
CNN IN DECLINE

EVEN COLBERT'S AUDIENCE KNOWS
CNN SPEWS PROPAGANDA



*
See also: https://modernity.news/2024/08/13/colberts-own-audience-laughs-at-him-seriously-stating-cnn-is-objective


2024-08-13 e
OWNERSHIP IN DECLINE

THE WORLD'S RICHEST KHAZARS
WANT TO OWN EVERYTHING. 
SPOILER ALERT: THEY NEVER WILL.



You Might Own Nothing Sooner Than You Think

Imagine a world where ownership is a distant memory, replaced by an eerie semblance of joy in dispossession. In 2016, Klaus Schwab, the enigmatic architect of the World Economic Forum, foretold a future whereby, in 2024, humanity would be stripped of its possessions, shackled in digital chains, yet deceived into a state of contentment. Initially dismissed as lunacy, we stand on the precipice of this harrowing reality; Schwab’s vision looms ominously over us, more prophetic than we dared to believe.

For decades, a clandestine cabal of technocrats has meticulously orchestrated our descent into digital serfdom. We sleepwalked into their trap and surrendered our rights and possessions to those who wield the power of the keystroke. In this brave new world, ownership is an illusion, and with a mere digital command, everything we hold dear can be seized.

This article unveils the sinister agenda behind the facade of progress. It explores the erosion of ownership through click-wrap agreements, the dematerialization of our assets into databases over the past few decades, the rise of Central Bank Digital Currencies (CBDCs), which threatens our control over money, and The Great Taking, which threatens our control over the rest of our non-monetary assets. 

All is not lost, although, in a separate article, I will address that our salvation comes not at the ballot box but through our radical non-compliance. Technology can either be used to promote freedom or tyranny. I will discuss how we can adopt technologies to counter the digital slave system actively being developed by technocrats, thus guaranteeing our privacy, ability to engage in voluntary trade, and retention of our free will. 

The Erosion of Ownership: A Descent into Digital Serfdom 

In the bleak dawn of the digital age, we find ourselves trapped in a labyrinth of click-wrap agreements; our freedoms quietly surrendered to the whims of faceless corporations. The once-mighty notion of personal ownership has been reduced to a mere abstraction, a quaint relic of a bygone era.

As we click “I agree” with reckless abandon, we seal our fate, surrendering our autonomy to the technocrats who manipulate and control us through the devices we thought would liberate us. Once hailed as a bastion of freedom and progress, the digital realm has devolved into a dystopian nightmare where our every move is tracked, monitored, and exploited.

The Insidious Nature of Digital Control

We are lulled into complacency by the convenience and ease of digital transactions, unaware of the subtle yet pervasive manipulation that underlies every click, every swipe, and every tap. The fine print, a behemoth of legalese, conceals the true nature of our agreements, hiding in plain sight the draconian terms that govern our digital existence.

Consider the staggering numbers: we encounter an estimated 150-400 click-wrap agreements per year, each a ticking time bomb of obligations and responsibilities that we blithely accept without a second thought. These agreements are ubiquitous, embedded in every aspect of our digital lives:

  • Software licenses, like Microsoft’s 70-page End User License Agreement (EULA)
  • Online shopping agreements, like Amazon’s 12,000-word Conditions of Use
  • Social media terms of service, like Facebook’s 25-page Statement of Rights and Responsibilities
  • Mobile app agreements, like Apple’s 50-page iOS Software License Agreement
  • Online banking agreements, like Wells Fargo’s 30-page Online Access Agreement

A Life Sentence of Reading

To keep up with the fine print, we would have to devote up to an hour every day, 365 days a year, just to read the agreements. This is the actual cost of our digital existence: a life sentence of reading, a never-ending task that would consume a significant portion of our daily lives.

A Study in Deception

A recent experiment revealed the shocking truth: 74% of participants blindly accepted terms that would have surrendered their firstborn children to the service’s owners and provided their personal information to the NSA. As one researcher noted:

The results are a stark reminder of the power of the ‘clickwrap’ – the ability to get people to agree to anything, no matter how outlandish, as long as it’s buried in a long and complex contract.

– Dr. Jonathan Obar, York University

The Stage is Set for Asset Transfer

Our increased participation with these clickwrap agreements has set the stage for our assets to be transferred at the click of a button. With the rise of digital currencies, online marketplaces, and social media platforms, our financial, personal, and creative assets are more vulnerable than ever. The implications are dire: a future where our assets are seized, frozen, or transferred without our consent, all under the guise of “agreements” we never truly understood.

We have unwittingly surrendered our autonomy, creativity, and humanity to the whims of corporate overlords. As you will see in the coming sections, the assignment of our rights through digital agreements, CBDCs, and asset tokenization will soon leave us owning nothing. 

Because this article is long, I will keep a cumulative list of key takeaways as bullet points at the end of each section. 

Key takeaways: 

  • We have unknowingly given away most of our rights through countless digital agreements we sign without reading, eroding personal ownership and autonomy and making our assets vulnerable to corporate control.

The Digitized Domain: A House of Cards Built on Fragile Databases and Corrupt Intermediaries

The digitization of our lives has bestowed upon us a double-edged sword: convenience and vulnerability. We’ve traded the tangible for the intangible, surrendering our assets to the capricious whims of databases and their intermediaries. But let’s be clear: databases are not just peripheral components of our digital lives but the foundation of modern commerce.

Consider it: corporations and governments store every transaction, asset, and record of ownership in a database. Your car title, house deed, and even the shares you hold in a company are all reduced to mere data points within these centralized repositories. And yet, we’re asked to trust that these systems will safeguard our investments and identities from prying eyes and malicious actors.

But here’s the thing: most of our assets have already been digitized. They exist only as entries in a database, and their value is entirely dependent on the integrity of that database. If the database is compromised, the asset is compromised. If the database is destroyed, the asset is destroyed. Database corruption is not just a theoretical risk; it’s a very real one. The financial losses alone are staggering—$1 trillion in 2017, a projected $10.5 trillion by 2025.

And what of the human cost? The disruption of lives, the theft of identities, the destruction of trust? The intermediaries who manage these databases – governments, corporations, and financial institutions – have become gatekeepers to our assets, wielding influence over markets and shaping economies. And yet, we’re expected to accept their security and stability assurances blindly.

Let’s take a step back and consider the current state of affairs. The labyrinthine transaction process, as we know it today, is a veritable goldmine for the parasites and leeches that thrive in its shadows. Third-party intermediaries—lawyers, brokers, or bureaucrats—add layer upon layer of time, money, and expense to every transaction, like a suffocating ivy strangling the life out of a tree. Just as the ivy’s tendrils wrap around the tree’s trunk, squeezing out its vitality, these intermediaries choke the life out of our transactions, draining them of efficiency, transparency, and fairness.

Consider this: according to some estimates, these parasitic middlemen gobbled up as much as 30-40% of the revenue in specific industries. That’s right, nearly half of every dollar you spend can vanish into the abyss of unnecessary costs and inefficiencies before it even reaches the hands that produce the goods or services we desire.

And what do we get in return for this fleecing? A system riddled with redundancies, opacity, and corruption. This concern isn’t new. You can read all about it in the pages of The Wealth of Nations by Adam Smith, who warned against the evils of middlemen and monopolies over two centuries ago.

People of the same trade seldom meet together, even for merriment and diversion, but the conversation ends in a conspiracy against the public, or in some contrivance to raise prices.

– Adam Smith

Whether we like databases being at the heart of commerce or not, they aren’t going away. A new trend is emerging: tokenization, which converts assets into unique digital tokens that can be stored and traded on digital ledgers. Tokenization means a digital token will eventually represent everything from property to goods to services. As we’ll explore in future sections, this shift towards tokenization can either fix some of the security problems and inefficiencies associated with middlemen or create a new level of tyranny. With tokenization, we may be able to create a new, decentralized system for managing our assets and transactions or further surrender our control of our assets to the globalist cabal. 

Key takeaways: 

  • We have unknowingly given away most of our rights through countless digital agreements we sign without reading, eroding personal ownership and autonomy and making our assets vulnerable to corporate control.
  • Our assets and transactions, now digitized and stored in fragile databases managed by corrupt intermediaries, are vulnerable to loss, theft, and manipulation, highlighting the risks and inefficiencies of our current digital system.

The Money in Our Bank Accounts Doesn’t Belong to Us

We’ve come to understand that we’ve been signing away our rights digitally, surrendering control over our lives to the whims of centralized databases and their intermediaries. But the loss of ownership doesn’t stop there – it permeates every aspect of our existence, from our cars and houses to our money.

Let’s start with what should be our most basic financial instrument: the bank account. We consider the money in our bank accounts ours, but a closer look reveals a different reality. Through my research on the terms and conditions of the four largest banks – Bank of America, Chase, Wells Fargo, and Citibank – I’ve discovered that they can cancel the account without cause, sell or give away our data (and they do give our transaction info to the IRS for use with AI to make sure the taxman gets his cut), change fees, and even modify the terms and conditions at will. I encourage you to check the terms and conditions of your bank account. 

These contractual terms mean that the money in our bank accounts doesn’t belong to us. It’s held in trust by these financial institutions, subject to their whims and control. And with digital transactions comprising the majority of economic activity—a staggering $3 trillion as of 2023—it’s clear that our money is already primarily digitized.

The insidious tendrils of centralization have trapped us all, from the high and mighty to the lowly and obscure. It’s a web of control extending far beyond mere money – it’s a stranglehold on our lives.

Consider the cases of Nigel Farage, Dr. Joseph Mercola, and his family – their bank accounts were summarily closed without explanation or provocation. And who’s next? Kanye West, Nick Fuentes, gun groups, religious associations, professional unions, and even protesting truckers – all targeted for exercising their rights, all silenced by the banks.

At this point, we aren’t even talking about CBDCs. When people bleat about CBDCs today, they mostly talk about getting their money shut off or being monitored. That already happens today. The threat isn’t the CBDCs of tomorrow but the current state of the dollar today.

CBDCs simply take this surveillance and programmability to the next level – paving the way for complete digital tyranny.

An Introduction to Tokenization 

But what if there was a way to break free from the shackles of these intermediaries and their centralized databases? A way to reclaim ownership and control over our assets, to strip away the layers of unnecessary costs and inefficiencies that plague our transactions? Enter the world of digital tokens. 

A digital token is a unique digital identifier representing something of value, like a coin or a piece of property. Unlike traditional databases, where information is stored in a single, centralized location, digital tokens are decentralized, meaning they exist independently on a network of computers. Tokenization allows for peer-to-peer transactions without needing a middleman or relying on a single, vulnerable database. Digital tokens can create a more secure, transparent, and efficient system for exchanging value.

However, not all tokens are created equally. These tokens could promote freedom, decentralization, or free trade or be used as a surveillance mechanism that leads to confiscating our assets. 

The following is a high-level overview of token types, followed by an overview of the massive range of uses for tokenization. In subsequent sections, we will go through specific examples of tokenization and highlight the dimensions of freedom versus tyranny. 

  • Open Systems: These systems are fully transparent and accessible to all. There are no gatekeepers; anyone can participate or observe without permission.
  • Transparent Gated Systems: While anyone can view the system’s activities, participation is restricted to approved entities.
  • Closed Systems: These systems are restricted in both access and visibility. Only authorized parties can participate and view information.
  • Privacy-Focused Open Systems: These systems allow open participation but obscure the details of individual activities.

Considering all of this, we’re witnessing the dawn of a new era in finance, where the tokenization of assets has unleashed a staggering $1.5 quadrillion+ market (yes, you read that right). But it’s not just the impressive size—the breathtaking breadth of possibilities that’s truly revolutionary.

Imagine being able to buy, sell, and trade anything of value, from the most minor, most personal items to the most significant, most complex assets. Tokenization is making this a reality. For instance, a rare, vintage car can be tokenized and sold to a collector, while a massive renewable energy project can be tokenized and traded on a global market.

A small, independent filmmaker can tokenize their latest movie and sell it directly to viewers, cutting out intermediaries and retaining creative control. Meanwhile, a multinational manufacturer can tokenize its inventory, optimize logistics, and streamline operations.

A local, community-supported farm can tokenize its weekly harvest, allowing customers to pre-order and pay for their favorite produce in advance. At the same time, a global e-commerce platform can tokenize entire shipping containers, facilitating international trade and reducing transaction costs.

The possibilities for tokenization are vast, from intellectual property rights to sustainable forestry credits, from virtual event tickets to rare, collectible books. Whether it’s a small, niche item or a massive global market, tokenization unlocks new opportunities for creators, entrepreneurs, and investors.

Anything of value can be tokenized, traded, and owned. The boundaries between the physical and digital worlds are blurring, and the distinctions between asset classes are dissolving. I have researched a total of 50 different categories of assets that can be tokenized. Here are just the top 20: 

The key takeaway from this section is that anybody can tokenize anything of any size or value for trade anywhere in the world. Or, it could be tokenized, programmed, monitored, and censored by 3rd parties. Either way, tokenization is here. 

Key takeaways: 

  • We have unknowingly given away most of our rights through countless digital agreements we sign without reading, eroding personal ownership and autonomy and making our assets vulnerable to corporate control.
  • Our assets and transactions, now digitized and stored in fragile databases managed by corrupt intermediaries, are vulnerable to loss, theft, and manipulation, highlighting the risks and inefficiencies of our current digital system.
  • Tokenization allows secure, peer-to-peer asset transactions without middlemen and risks third-party surveillance and control.

The Tokenization of Money 

The cornerstone of “You will own nothing and be happy” involves technocrats seizing control over the means of exchange for goods and services. Building on the types of tokens described in the previous section, I want to divide money tokenization into two sections: money issued by central banks/governments and money separated from the state. From there, we will look at each of their attributes. 

This table provides an overview of the types of tokenized money:

At the outset, it is essential to state that most people worry about programmable, tokenized money, which exists in the form of CBDCs and bank-issued stablecoins. 

As we discussed earlier, our current dollar (mainly used today in digital form) can already be monitored and censored – a considerable perceived concern for those worrying about CBDCs. However, CBDCs and bank-issued stablecoins both have the potential to add the following dystopian features: 

  1. Total Control through Programmable Money: CBDCs would empower governments to dictate how you spend your hard-earned money, censoring transactions at will. Imagine being denied access to books critical of those in power or having your transactions monitored like a prisoner in a digital gulag.
  2. Expiration Dates: The idea that CBDCs could impose expiry dates on your money is another frightening reality. Your savings could vanish into thin air if you don’t spend it within a specific timeframe, leaving you powerless and vulnerable.
  3. The surveillance aspect of CBDCs is equally chilling. Those in power would track, record, and analyze every transaction, eroding any vestige of financial privacy. The thought of governments knowing your every purchase, from coffee to groceries, is enough to send shivers down the spine of anyone who values freedom.
  4. Negative interest rates are another potential nightmare scenario. Governments could confiscate a portion of your savings regularly, discouraging you from saving and encouraging reckless spending. These negative rates would lead to economic instability and further erosion of our financial sovereignty.
  5. Gateway to tyranny: But it doesn’t stop there. CBDCs are designed to be integrated with social credit systems, digital IDs, vaccine passports, and even tied to our other non-monetary assets (homes, cars, stocks, bonds), creating a complete control grid over everything we think we own. Complete digital control is the ultimate goal of technocrats: a global currency backed by energy credits, with a social credit system enforcing compliance with the UN’s 2030 Agenda.

At the outset, it is essential to note that there are more CBDC accounts globally than decentralized crypto accounts. In 2020, 35 countries were mainly in the research phase of CBDCs (except China). Today, there are 134 countries at various stages of researching, piloting, and rolling out CBDCs, representing 98% of the global GDP. You can track the real-time developments of CBDCs through the Atlantic Council’s website. Eleven countries have already rolled out CBDCs (although eight in the Eastern Caribbean have moved back to the pilot phase to work out some kinks in their systems). 

As I outline in my book, The Final Countdown: Crypto, Gold, Silver, and the People’s Last Stand Against Tyranny by Central Bank Digital Currencies, there is an end goal to all of this. The ultimate plan is to connect all CBDCs and digital assets on a shared ledger that can be tracked, programmed, and censored, and for an ultimate convergence to a single global digital currency backed by energy credits. 

The technocracy movement, which started in the 1930s and picked up steam in the early 1970s with the formation of the Trilateral Commission by David Rockefeller and Zbigniew Brzezinski, has dreamed of flipping the global economy from a price-based system to an energy-credit-based system. 

If this sounds far-fetched, I want to introduce you to the Doconomy MasterCard, a credit card co-sponsored by the United Nations through its Climate Action Sustainable Development Goal (SDG), SDG 13—Climate Action. This MasterCard tracks your carbon usage; your card shuts off when you hit a specific limit. 

MasterCard has brought together 150 major corporations, including banks like Barclays and HSBC, retailers like Saks Fifth Avenue and L.L.Bean, and airlines like American and Emirates to track and monitor the carbon footprint of our daily activities. The goal is to measure the environmental impact of every transaction, purchase, and action. This means that airlines will calculate the emissions from their flights, and sports organizations like the PGA Tour and Major League Baseball will assess the carbon footprint of their events. The idea is to hold companies and individuals accountable for their environmental impact, but it also raises concerns about the level of surveillance and control over our daily lives.

But let’s be clear: this initiative is not just about companies being socially responsible. It’s a new system of tracking and monitoring our carbon footprint, which could have severe implications for our freedoms. If this trend continues, we may soon face a world where every financial transaction is scrutinized for its environmental impact. This tracking could lead to a situation where we must conform to strict environmental standards with little control over our economic choices. The question is, do we want to live in a world where environmental authorities monitor and judge our every move?

I can’t state this clearly enough—for years, MasterCard has been working with large multinational corporations around the globe to track carbon, tie it to financial transactions, and halt the use of money when certain thresholds are met. This energy-credit-based system is the basis for complete digital tyranny and is the endgame of CBDCs. 

We won’t get to a global energy-credit-based system in one step, and we won’t give up all of our assets in one step either – they will use salami tactics – slice by slice. It is a 3-step process: 

  1. Each nation will create a CBDC (or bank-issued stablecoin) linked to a ledger, with all other assets tokenized on the same platform. 
  2. These nation-centric CBDC/asset ledgers will interoperate with other countries’ CBDC/asset ledgers, creating one global ledger for all assets and CBDCs.
  3. The CBDCs will convert to being backed by energy credits and tied into a global social credit system (like the UN Agenda 2030 17 SDGs) where behavior is rewarded or punished based on how behavior impacts energy usage.  

Given the current presidential race, there has been much talk about CBDCs in the US. It is current policy under President Biden, through Executive Order 14067, to pursue a CBDC while taking a whole-of-government approach to regulating digital assets. In February, Trump came out strongly against CBDCs (which I had a tiny part of, as discussed in this Zero Hedge article), which he reiterated at the Bitcoin Conference in Nashville in late July. RFK, Jr. has also said he is against CBDCs. 

Unfortunately, this has engendered a highly misplaced sense of complacency in many. 

Under the Biden approach (which, at this point, will also be the Kamala Harris approach), we will get a CBDC likely similar to what has been piloted through Project Hamilton. Project Hamilton, a collaboration between the Federal Reserve Bank of Boston and MIT’s Digital Currency Initiative, represents a significant step towards implementing a US Central Bank Digital Currency. This initiative has successfully demonstrated the technical feasibility of a digital dollar, with its prototype capable of processing an impressive 1.7 million transactions per second. This high-speed transaction capability suggests that the technology is ready for deployment and could replace traditional cash systems. 

The other way we get a CBDC is through bank-issued stablecoins. Based on our description of token types above, CBDCs and bank-issued stablecoins are closed systems with limited access, private operations, and centralized control. To be clear, the Republicans in the House have put together bills that would give regulated financial institutions the exclusive right to issue stablecoins. While it isn’t technically a central bank digital currency, since the banks own the central bank, in the end, it is a distinction without a difference because it will still enable all of the programmability and digital tyranny features expected from a CBDC. 

We have discussed the tyranny side of tokenized money, but what of the alternatives? There are over 20,000 different cryptocurrencies; as I like to say, it’s the 99% that make the other 1% look bad. Nevertheless, there are various alternatives in the form of open systems, transparent gated systems, and privacy-focused open systems (as outlined in the table at the beginning of this section). 

I will expand on the explanation of these categories, give specific examples, and then weigh the pros and cons of each. 

Open Systems 

Open Systems, exemplified by Bitcoin, are the pioneers of decentralized cryptocurrencies. These systems operate on a universal, permissionless network, allowing anyone to participate, verify transactions, and hold a copy of the blockchain.

Bitcoin transactions are pseudonymous, not anonymous. While users are identified by wallet addresses rather than names, these addresses can be linked to real-world identities through advanced chain analysis and AI techniques. Companies and government agencies use sophisticated tools to analyze blockchain data, track transaction patterns, and correlate this information with external data sources like exchange records and social media. 

This analysis allows for the de-anonymization of users, cluster analysis of related addresses, and tracing fund flows across multiple transactions. As these technologies continue to advance, it’s becoming increasingly possible to identify the individuals behind Bitcoin and Ethereum transactions, eliminating practical anonymity on these networks. Users should know that their cryptocurrency activities may be more traceable and linkable to their real-world identities than expected—many people in prison today, including friends of mine, whose assets were identified using these methods through civil asset forfeiture laws. 

The so-called Bitcoin Strategic Reserve that Trump announced at a recent Bitcoin Nashville conference would be built on coins seized through civil asset forfeiture, which raises fundamental questions about the fungibility of Bitcoin. Fungibility is a fundamental property of money that ensures that all currency units are interchangeable and of equal value. In other words, if you lend someone a $10 bill, it doesn’t matter which specific bill you give them – any $10 bill will do.

However, Bitcoin’s ability to be traced and identified through its blockchain means that not all Bitcoins are created equal. Suppose a Bitcoin has been seized through civil asset forfeiture or associated with a particular user or activity. In that case, it can be flagged and potentially whitelisted or blacklisted in the future. The ability to classify BTC into categories by address means that some Bitcoins may be treated differently, undermining their fungibility. As a result, Bitcoin fails to meet critical criteria for a reliable and trustworthy currency. Without fungibility, a currency’s value and utility are compromised, making it less useful for everyday transactions and more vulnerable to manipulation and control.

The grubby paws of state surveillance now sully Bitcoin’s promise. In recent weeks, Peter Thiel, Tucker Carlson, and Edward Snowden, the most fastidious of whistleblowers, have all sounded the tocsin: the lack of privacy in Bitcoin transactions is an affront to the very ethos of decentralization.

Transparent Gated Systems (Private Stable Coins): A Compromise on Freedom

Transparent Gated Systems, such as USDC and USDT (Tether), attempt to balance decentralization with regulatory compliance. However, this compromise comes at the cost of reduced financial freedom. These systems have key characteristics that set them apart from other currencies.

They are designed to be more accessible and user-friendly, but this comes with trade-offs. For example, participation in the network may be limited to approved entities or require specific permissions, creating barriers to entry. The level of centralization is relatively high, which can impact security and censorship resistance. Additionally, Transparent Gated Systems often engage with regulatory bodies and implement Anti-Money Laundering (AML) and Know-Your-Customer (KYC) procedures, increasing the risk of government surveillance.

One of the main concerns with Transparent Gated Systems is the lack of decentralization. They are often controlled by a single company or organization, which means that users’ money could be in trouble if something goes wrong with that company. This is because the currency’s value is tied to the value of a traditional currency, such as the US dollar.

Furthermore, Transparent Gated Systems are vulnerable to various risks, including:

  • Technical problems: The computer code that makes these coins work can be flawed or hacked, risking users’ money.
  • Lack of transparency: The company behind the coin might not be honest about how much money it really has, making it difficult for users to trust it.
  • Centralization: With private stablecoins, there’s one single point of failure. Users’ money is at risk if the company goes bankrupt or gets hacked.
  • Government surveillance: Because a single company controls these coins, governments can more easily track what users do with their money.
  • Counterparty risks: If the company backing the coin goes out of business, users could lose their money.
  • Liquidity risks: If many people try to withdraw their money from the coin at the same time, it could cause problems.
  • Market risks: Even though these coins are supposed to be stable, they can still be affected by market fluctuations.

While Transparent Gated Systems may offer some benefits, such as faster transaction times and lower fees, these benefits come with significant risks. 

Ultimately, Transparent Gated Systems represent a compromise between freedom and control. They occupy a middle ground between traditional and decentralized, secure currencies like Bitcoin. However, this middle ground comes with significant trade-offs, and users must be cautious when using these systems.

Privacy-Focused Open Systems: The Guardians of Anonymity*

Privacy-focused open Systems, such as Zano, Monero, Zcash, and Pirate Chain (ARRR), are designed to protect user anonymity and confidentiality. These systems utilize advanced cryptographic techniques to conceal transaction details and participant identities, ensuring high privacy.

Another important point of differentiation exists within the realm of privacy-focused coins. Privacy coins that are private by default require no extra effort on the user’s part to remain private (Zano, Monero, and Zcash fit this description). Other coins, like Bitcoin Cash (which uses something called CashFusion) and Litecoin (which uses a technology called MimbleWimble), can optionally offer privacy. Still, it requires extra steps on the part of the user. 

The benefits of Privacy-Focused Open Systems are clear. They offer robust user anonymity and confidentiality protection, making them an attractive option for those seeking to maintain their financial freedom. However, there are also potential drawbacks to consider. The complex cryptography can make these systems more vulnerable to security risks, and the smaller network size can impact decentralization.

Despite these challenges, Privacy-Focused Open Systems represent a crucial step toward creating a more private and resilient financial ecosystem. We can build a system that values individual autonomy and peer-to-peer trade by prioritizing decentralization, anonymity, and financial freedom. Ultimately, this approach can transform our thoughts about money and financial transactions and create a more equitable and just economic system.

We need not get stuck with dystopian, centralized, closed systems like those offered by CBDCs and bank-issue stablecoins. There are alternatives out there. However, open systems like Bitcoin (BTC) have proven to be too transparent for their own good and have become a form of surveillance coin. 

While private stablecoins appear to improve our current digital fiat system, they involve so many intermediaries and points of failure that they undermine their use case and are highly subject to regulation. 

In the end, our best path forward to stopping digital tyranny through CBDCs and bank-issued stable coins is through privacy coins and tokens like Zano, Monero, and the other coins mentioned above. At this point, all we’ve discussed is tokenized money—we haven’t even begun exploring the other 95% of the $1.5 quadrillion asset market that will be tokenized. 

Tokenized money can empower individuals with decentralized, peer-to-peer transactions, promoting privacy and autonomy, or enable centralized control and surveillance through CBDCs and bank-issued stablecoins.

Key Takeaways 

  • We have unknowingly given away most of our rights through countless digital agreements we sign without reading, eroding personal ownership and autonomy and making our assets vulnerable to corporate control.
  • Our assets and transactions, now digitized and stored in fragile databases managed by corrupt intermediaries, are vulnerable to loss, theft, and manipulation, highlighting the risks and inefficiencies of our current digital system.
  • Tokenization allows secure, peer-to-peer asset transactions without middlemen and risks third-party surveillance and control.
  • Tokenized money can empower individuals with decentralized, peer-to-peer transactions, promoting privacy and autonomy, or enable centralized control and surveillance through CBDCs and bank-issued stablecoins.

The Great Taking 

Money represents only 5% of total global assets. Most of the rest will ultimately be tokenized as well. However, rather than go straight to comparing and contrasting the technical options for other asset tokenization, I offer a brief interlude to share a frightful bit of news about developments related to the tokenization of stocks, bonds, and other financial instruments that might be the single most significant catalyst to fulfilling Klaus Schwab’s “You will own nothing” agenda. 

David Rogers Webb is a former highly successful hedge-fund manager and author who has exposed the most significant financial heist of our time in his book The Great Taking. For several months, I’ve reached Webb’s work and collaborated with people to help spread the word about what he’s uncovered. You can watch the video and read the book for free. 

As our current financial system begins to show signs of stress, I am seeing people share clips from movies about the 2008 crisis, such as The Big Short and Margin Call. Imagine if you could watch/read about the next collapse and its aftermath BEFORE it actually happened and take steps to protect yourself. That’s how important I believe this material is. 

Webb’s meticulous research unveils a disturbing evolution in our financial laws spanning decades. Starting in 1994, the financial elite orchestrated changes to the Uniform Commercial Code across all 50 states, subtly altering the very nature of securities ownership. By 2005, they had engineered “Safe Harbor” provisions, rigging the system to ensure that when financial catastrophe strikes, they’d be first in line to claim the spoils. The 2008 collapse didn’t trigger these changes–it merely exposed their insidious effects. 

This carefully crafted legal framework ensures that in the next great financial collapse, the “protected class” of financial institutions stands poised to swoop in and seize assets with unprecedented speed and legal backing. The targets of this cunningly designed scheme? Your stocks, bonds, 401(k)s, and retirement accounts–the very bedrock of middle-class financial security. While sold as necessary safeguards, these laws have effectively tilted the playing field, leaving ordinary investors vulnerable in times of crisis. The 2008 Lehman Brothers shows that when the chips are down, the system is primed to favor the financial titans, potentially leaving the rest of us scrambling for scraps.

Let’s begin with the basics. When you “buy” stocks (publicly through a 401K and using a broker), you don’t receive the actual stock certificates or have direct ownership rights. Instead, your broker holds them in “street name,” and there are multiple layers of intermediaries between you and the actual stock. The Depository Trust Company (DTC) and its nominee, Cede & Co., own most shares, with your broker and other financial institutions holding mere electronic records of your “beneficial ownership.” This “indirect holding” system is a labyrinthine construct designed to make trading more efficient, which also means you don’t own your stocks directly.

To make this point even more precise, in 2012, when Hurricane Sandy hit New York, one of DTCC’s vaults housing these stock certificates flooded, soaking 1.3 million. That single vault held paper stock certificates valued at over $39 trillion!

The DTCC vault was flooded in 2012 – soaking 1.3 million stock certificates. Note: This is not an actual picture but added to show how centralized our stocks are and that we don’t own the shares.

But that’s not all. Large institutional investors like BlackRock, Vanguard, and State Street, who manage massive index funds and ETFs, have voting rights for the shares they hold, giving them influence over company decisions, even though individual investors technically own the underlying shares. And suppose you think that’s not enough. In that case, many brokerages engage in practices like securities lending, where they can lend out “your” shares to short sellers for a profit, often without your knowledge or any benefit to you.

So, when you see charts like this showing that Blackrock, Vanguard, and State Street own everything, the irony is that our stocks are purchased with the money we think we own that we’ve given them voting rights to. And, in a great financial collapse, secured creditors (like JP Morgan Chase, Bank of America, Wells Fargo, and Citigroup) will own our stocks through bankruptcy! 

Now, you may be thinking, “What’s the big deal? I still get my dividends and can sell my stocks whenever possible.” But, my friends, that’s precisely the point. You don’t own the stocks; you own a right to the value and benefits of those stocks. And in a financial crisis, this could complicate who owns what.

This, my friends, is the Great Taking – a potential massive transfer of wealth legally enabled by changes most people are unaware of. It’s a stark reminder that the very foundations of our financial system are designed to protect the interests of large institutions at the expense of individual investors. You don’t own your investments; you merely have a contractual claim against a system rigged against you.

Here’s the even more worrisome development. Wall Street is working with the central banks and others to develop a system for tokenizing these stocks and bonds on the same platform as CBDCs. Once this is done, The Great Taking could happen with the click of a mouse button. Everything will be tokenized; the default tokenization is through a closed system, and we have to begin looking for alternatives before it is too late. 

Key Takeaways 

  • We have unknowingly given away most of our rights through countless digital agreements we sign without reading, eroding personal ownership and autonomy and making our assets vulnerable to corporate control.
  • Our assets and transactions, now digitized and stored in fragile databases managed by corrupt intermediaries, are vulnerable to loss, theft, and manipulation, highlighting the risks and inefficiencies of our current digital system.
  • Tokenization allows secure, peer-to-peer asset transactions without middlemen and risks third-party surveillance and control.
  • Tokenized money can empower individuals with decentralized, peer-to-peer transactions, promoting privacy and autonomy, or enable centralized control and surveillance through CBDCs and bank-issued stablecoins.
  • The tokenization of financial assets, driven by changes in laws and economic systems, risks enabling a massive wealth transfer to large banks and institutions, leaving individual investors with mere contractual claims rather than actual ownership.
  • Similar to tokenized money, tokenizing assets poses a significant risk of centralization and control, potentially leading to the confiscation of assets by authorities through centralized platforms like the Regulated Liability Network (RLN). Alternatives exist to promote decentralization and autonomy. The RLN is a catalyst for The Great Taking.

Tokenizing Other Assets 

So, there you have it. Legally, you don’t own your stocks, bonds, and 401Ks. Just like with our privacy and data ownership, we have given away our ownership in our retirement investment vehicles, in this case, through click-wrap agreements and strategic changes made by the incumbent financial services industry through changes in the UCC laws in all 50 states. 

The tyranny versus freedom aspects of tokenizing money, described in the previous section, apply to tokenizing all other assets as well. 

Let’s start with the bad news first. Just as the growth of CBDCs has dwarfed the development of decentralized cryptocurrencies, it appears that all of the momentum is now on the dystopian command and control side of the tokenization of other assets. Generally, tokenized assets through the CBDC system will use the Transparent Gated System type. 

Transparent Gated Systems (Permissioned Systems)

Transparent Gated Systems, such as the Regulated Liability Network (RLN), attempt to balance decentralization with regulatory compliance. However, this compromise comes at the cost of reduced financial freedom. Key characteristics include:

  • Limited Access: Participation in the network may be limited to approved entities or require specific permissions, creating barriers to entry.
  • High Centralization: These systems are often controlled by a single company or organization, increasing the risk of security and censorship issues.
  • Regulatory Compliance: Transparent Gated Systems often engage with regulatory bodies and implement Anti-Money Laundering (AML) and Know-Your-Customer (KYC) procedures, increasing the risk of government surveillance.

What is a Regulated Liability Network (RLN)? 

The Regulated Liability Network (RLN) is a proposed global financial infrastructure that aims to digitize and connect various forms of money and assets across countries. Here’s an explanation for a general audience:

What is the RLN?

The RLN is envisioned as a shared digital platform where central banks, commercial banks, and other regulated financial institutions can issue, transfer, and settle digital versions of traditional financial assets. This platform includes central bank digital currencies (CBDCs), tokenized bank deposits, government bonds, stocks, and potentially even regulated versions of cryptocurrencies and stablecoins (imagine having to register Bitcoin, Ethereum, and your other cryptos on a centralized system).

How it works:

1. Digital tokens: Financial assets are represented as digital tokens on the network. These are permissioned tokens, as per the table above. 

2. Multiple oversight: Authorized parties, including central banks, financial regulators, and law enforcement agencies, can monitor, track, and potentially censor these tokens.

3. Asset registration: An asset must be registered and approved for trading on the RLN. This registration applies to stocks, bonds, stablecoins, and potentially other cryptocurrencies.

4. KYC/AML implications: The system would require strict Know Your Customer (KYC) and Anti-Money Laundering (AML) procedures. Every participant and transaction would be identifiable, eliminating anonymity.

5. Global connectivity: Different countries’ CBDCs and financial systems would connect to the RLN, creating a global digital asset and money platform.

Key players behind the RLN:

  • – MIT (research and development)
  • – Federal Reserve Bank of New York (central bank involvement)
  • – Bank for International Settlements (BIS) (international coordination)
  • – Depository Trust & Clearing Corporation (DTCC) (financial market infrastructure expertise)
  • – Large global banks (as potential participants and developers)

Relation to “The Great Taking:”

The RLN is the missing piece that could facilitate large-scale asset transfers or seizures due to its comprehensive nature and the level of control it offers to authorities. Here’s a table illustrating how the RLN might relate to aspects of “The Great Taking:”

I know that this table has a lot of technical jargon, so let me simplify the explanation: 

The Regulated Liability Network (RLN) is the ultimate tool for the wholesale theft of our assets. Imagine a world where all your financial assets are neatly tokenized and stored on a centralized platform, just waiting to be “reallocated” by the benevolent authorities. And don’t worry; it’s all legitimate because the RLN is designed to comply with all the relevant financial regulations.

It’s like a digital version of the Reichstag Fire Decree, where the government can seize control of all assets in the name of “national security.” Your stocks, bonds, and securities are converted into “security entitlements,” which can be easily confiscated by the powers that be. And don’t even think about trying to hide your assets because the RLN has real-time visibility into all transactions, ensuring that no one can escape the all-seeing eye of the authorities.

The RLN also has smart contracts, which can automate large-scale asset transfers based on predefined conditions. It’s like a digital version of the Soviet Union’s forced collectivization, where the state can seize control of all assets in the name of “the greater good.” By integrating the RLN and Central Bank Digital Currencies (CBDCs), the authorities can compensate you for confiscating assets using their digital funny money.

This is the essence of the RLN, stripped of its technical jargon and presented in all its Orwellian glory. The table may spell out the details in dry, technical terms, but the end result is the same: a system designed to facilitate the massive confiscation of assets under the guise of “regulation” and “compliance.”

And just like that, You will own nothing, but I am certain you won’t be happy. 

Just as there are categories of alternatives to CBDCs, there are also alternatives to centralized, dystopian asset tokenization. We will review them now. 

Key Takeaways 

  • We have unknowingly given away most of our rights through countless digital agreements we sign without reading, eroding personal ownership and autonomy and making our assets vulnerable to corporate control.
  • Our assets and transactions, now digitized and stored in fragile databases managed by corrupt intermediaries, are vulnerable to loss, theft, and manipulation, highlighting the risks and inefficiencies of our current digital system.
  • Tokenization allows secure, peer-to-peer asset transactions without middlemen and risks third-party surveillance and control.
  • Tokenized money can empower individuals with decentralized, peer-to-peer transactions, promoting privacy and autonomy, or enable centralized control and surveillance through CBDCs and bank-issued stablecoins.
  • The tokenization of financial assets, driven by changes in laws and economic systems, risks enabling a massive wealth transfer to large banks and institutions, leaving individual investors with mere contractual claims rather than actual ownership.

Alternatives to Centralized Asset Tokenization

We have discussed the tyrannical side of tokenized money, but what about the alternatives for tokenizing other assets? Various options exist in the form of open systems, transparent gated systems, and privacy-focused open systems. Here, I will expand on these categories, provide specific examples, and weigh the pros and cons of each.

Open Systems

Open Systems, exemplified by Ethereum and Ravencoin, are pioneers in the decentralized tokenization of assets. These systems operate on a universal, permissionless network, allowing anyone to create, transfer, and verify asset tokens on the blockchain. The critical attributes of Open Systems are:

  • Universal Access: Anyone can join the network, regardless of geographical location or financial status.
  • High Decentralization: Transactions and token creations are verified by a vast network of nodes, making it difficult for any single entity to control the system.
  • Low Regulatory Oversight: Open Systems operate independently of traditional financial institutions and regulatory bodies, minimizing the risk of government interference.
  • Transparency: All transactions are publicly visible, ensuring asset ownership and transfer transparency.

Open Systems offer unparalleled decentralization, security, and censorship resistance, making them an attractive option for those seeking to tokenize assets freely. 

However, similar to the problems mentioned above regarding Bitcoin needing to be a viable alternative to CBDCs, the transparency of transactions can still be used to track and analyze user activity, potentially compromising privacy.

Privacy-Focused Open Systems: The Guardians of Anonymity

Privacy-Focused Open Systems, such as Zano, are designed to protect user anonymity and confidentiality. These systems utilize advanced cryptographic techniques to conceal transaction details and participant identities, ensuring a high level of privacy.

  • Universal Access: Anyone can join the network, regardless of location or financial status.
  • Decentralization: While still decentralized, these systems often rely on smaller networks and more complex cryptography, which can impact security.
  • Low Regulatory Oversight: Privacy-Focused Open Systems operate independently of traditional financial institutions and regulatory bodies, minimizing the risk of government interference.
  • High Privacy: Transactions are designed to be highly private, making it challenging to link participants to their real-world identities.

Privacy-Focused Open Systems offer robust protection for user anonymity and confidentiality, making them an attractive option for those seeking to tokenize assets privately. 

The complex cryptography can make these systems more vulnerable to security risks, and the smaller network size can impact decentralization.

So far, the best solution I’ve found to The Great Taking is a cryptocurrency called Zano. Zano (as mentioned in the section on the tokenization of money) allows you to tokenize assets, hold them in your self-custody wallet, and trade them anywhere in the world without 3rd parties. You can learn more about this technology at https://zano.org. I am new to the exploration of this technology. I have already used Zano to tokenize and trade a physical goldback and am testing various other applications. I believe this technology could be the basis for an international barter system. I am not making investment recommendations; I strongly suggest you do your research and try using it directly. 

Key Takeaways 

  • We have unknowingly given away most of our rights through countless digital agreements we sign without reading, eroding personal ownership and autonomy and making our assets vulnerable to corporate control.
  • Our assets and transactions, now digitized and stored in fragile databases managed by corrupt intermediaries, are vulnerable to loss, theft, and manipulation, highlighting the risks and inefficiencies of our current digital system.
  • Tokenization allows secure, peer-to-peer asset transactions without middlemen and risks third-party surveillance and control.
  • Tokenized money can empower individuals with decentralized, peer-to-peer transactions, promoting privacy and autonomy, or enable centralized control and surveillance through CBDCs and bank-issued stablecoins.
  • The tokenization of financial assets, driven by changes in laws and economic systems, risks enabling a massive wealth transfer to large banks and institutions, leaving individual investors with mere contractual claims rather than actual ownership.
  • Alternatives to centralized asset tokenization include open systems like Ethereum and Ravencoin, which offer universal access and high decentralization but come with significant surveillance risks due to transaction transparency. In contrast, privacy-focused systems like Zano prioritize user anonymity and confidentiality, making them a crucial solution to avoid government interference and ensure secure, private asset ownership and transfers. Zano’s advanced cryptographic techniques protect against tracking and surveillance, providing a robust safeguard for tokenizing assets privately and securely.

The Urgency of Action: Radical Non-Compliance

We stand at the crossroads of financial freedom. The threat of central bank digital currencies (CBDCs) and the Regulated Liability Network (RLN) looms large, posing an existential threat not only to alternative asset classes but also to free will itself. These centralized systems for asset tokenization aim to control not just our money but our very lives.

But we don’t have to surrender to this dystopian future. We have alternatives that can stop all asset tokenization in its tracks. Cryptocurrencies like Zano, Monero, and Bitcoin Cash (with CashFusion) offer a decentralized, private, and secure way to transact and store value. Tokenized gold and silver provide a digital representation of physical precious metals, combining the benefits of cryptocurrencies with the time-tested value of gold and silver.

Physical gold and silver outside the banking system provide a tangible store of value that can’t be quickly seized or controlled digitally. These precious metals have been used as money for thousands of years and offer a reliable alternative to fiat currencies.

It’s time for the alternative currency fields to unite. Cryptocurrency enthusiasts, precious metals investors, and advocates of financial freedom must work together to create a multi-asset approach that will render CBDCs and RLN obsolete. We need to actively use these alternative assets in our daily lives, creating parallel economies that operate outside the control of centralized institutions.

Using privacy alternatives is more than just money – it is about owning our assets. It’s about controlling our destinies and preserving voluntary trade, the basis of free will. We can’t rely on a single asset or system. We need diverse alternatives, working together in harmony, to create a world where financial freedom is a reality.

So, let’s join forces. Let’s use Zano, Monero, Bitcoin Cash (with CashFusion), tokenized gold, tokenized silver, and physical gold and silver to create a world where our economic choices are our own. Let’s build a future where decentralized, private, and secure asset tokenization is the norm.

The Exit the System Movement: Empowering Individuals

I stopped using a personal bank account in 2019 and have been using self-custody crypto, gold, and silver for my day-to-day life since then. 

Since 2018, I have also been tokenizing and trading various assets worldwide, including silver, art, wine, clothing, and more. 

I wrote The Final Countdown to be a book that someone with no technical know-how could read and walk away understanding the CBDC threat, the inevitable failure of fiat currency (the dollar), and be able to follow simple instructions to download a crypto wallet, obtain crypto, gold, and silver, and to begin using these assets and break free from the system. 

In the past six months, the threat of The Great Taking has reached the top of my radar. I am adding to my repertoire of solutions to digital tyranny the ability to tokenize and trade any asset of any size anywhere in the world without third parties. 

While many found the book illuminating, not as many were taking the first step to use these alternative assets. My goal in everything I do is not to be a doom peddler but rather to empower people with solutions. I have begun conducting four-hour workshops across the US to teach people the material, set them up with a crypto wallet, tokenized asset, gold, and silver, and show precisely how to use it. 

To this end, a grassroots movement is emerging to help people “Exit the System.” I am leading a series of workshops across 17 US cities (with more to come) to educate individuals on practical steps to protect their assets and privacy. These workshops cover various topics, including the truth about the emerging global technocracy and its threats to financial freedom as CBDCs, Universal Basic Income, digital IDs, and social credit scores become a reality.

I empower participants with knowledge of cryptocurrency and blockchain basics, navigating regulatory storms, self-custody and securing digital assets, mastering precious metals like gold and silver, and private asset tokenization to maintain control over your wealth. I also went into detail about the “Great Taking” to ensure you aren’t caught off guard. Learn about the Uniform Commercial Code changes and the Regulated Liability Network and how to protect your financial holdings. Take control of your financial future and make informed decisions with a comprehensive reference guide, joining the movement towards financial freedom and sovereignty.

As detailed in Alan Lash’s recent Zero Hedge article, “Money’s Grim Future,” these workshops provide crucial information and strategies for financial self-defense. Lash writes, “The coming crisis will be used as an excuse to implement a new financial system that gives unprecedented power to central authorities. Those who aren’t prepared will find themselves at the mercy of this system.”

The Daylight Freedom initiative, accessible at https://daylightfreedom.org, offers resources and opportunities for those interested in attending, sponsoring, or hosting these vital workshops nationwide. This grassroots effort aims to create a network of informed and prepared individuals who can resist the encroachment of financial tyranny. (read more)


2024
-08-13 d
A NATION IN DECLINE IV

BRITISH BIG BROTHER GOES BONKERS.
PROSECUTE “who the fuck is Allah” PRIMARY CAREGIVER OF INFIRM WIFE.
WAS HE THROWN IN GAOL FOR BLASPHEMY OR A THOUGHTCRIME?


*
2024-08-13 c
A NATION IN DECLINE III

YOU WILL BE DISPOSSESSED OF YOUR
COUNTRY AND YOU WILL LIKE IT
Places that are "too white" are being "colorized."


Dundrum, Tipperary.

This tiny Irish village of 200 people was forcibly planted this morning. 280 ‘asylum seekers’ are to be housed in this hotel, replacing the local population overnight.

Ireland is ground zero for population replacement. pic.twitter.com/L4x1x7QMbV

— MichaeloKeeffe (@Mick_O_Keeffe)
August 13, 2024

*
*
See also: https://www.independent.ie/regionals/tipperary/news/man-arrested-amid-tense-scenes-in-tipperary-as-first-group-of-asylum-seekers-arrive-at-dundrum-house-hotel/a1733562700.html



2024-08-13 b
A NATION IN DECLINE II

THE WORLD'S RICHEST KHAZARS HAVE PLANNED & ARE IMPLEMENTING
THE INVASION OF WESTERN NATIONS BY THE DREGS
OF THE THIRD WORLD WHO HATE THEIR WHITE HOSTS. .




Unrest in Britain: The Other Half of the Story

The official story circulating on BBC and echoed by government and police spokespersons is that the riots and unrest seen in the UK in recent weeks are the product of a tiny minority of “far-right” hooligans and criminals, egged on by “disinformation” about the circumstances of the awful murder of innocent children in Southport, in particular the identity of the 17-year-old assailant, who was initially alleged to be a Muslim refugee, and later turned out to be a Welsh-born citizen born to Rwandan parents. This official story is not, strictly speaking, false. But it is only half the story.

The race riots, street violence, and public unrest we have seen in recent weeks have complex underlying causes and are not susceptible to any simple, one-dimensional explanation. Yet in their eagerness to condemn “far-right” rioters and looters, many public commentators omit to mention that the visceral anger of the rioters is really just an extreme and unlawful expression of the anger and frustration of many ordinary, law-abiding citizens, whose concerns about immigration and its impact on their communities are usually either ignored or blithely dismissed as “disinformation” or “far-right” propaganda.

Don’t get me wrong: I’m not suggesting for a second that it is in any way justified to hurl rocks at a mosque, injure police officers, set refugee accommodation centres on fire, engage in disorderly conduct, or intimidate people of other religions or ethnicities. I’m not suggesting for a second that anti-immigrant violence should be tolerated or encouraged.

But I would suggest that the condemnation of “far-right” agitation and violence should not lead us to overlook the broader societal discontent and fragmentation that such violence emerges from. Our condemnation of far-right violence should not be allowed to blind us to the fact that a very large proportion of citizens who express disquiet over immigration policy, or attend public rallies to raise awareness of their concerns, are not violent thugs, or “far-right” agitators; just regular, law-abiding citizens who are worried about how poorly controlled immigration will impact their access to housing and public services, or the safety of their streets, or the cohesion and prosperity of their neighbourhoods.

If deep discontent with the UK’s immigration policy was restricted to “far-right” hooligans, we could not explain the remarkable success of the Brexit movement, one of whose primary selling points was its opposition to “mass immigration,” which saw through a successful Brexit referendum in 2016. Nor could we explain the fact that in the 2024 elections, Nigel Farage’s Reform Party, with its call for stricter controls on immigration, managed to win 15% of the popular vote, in a first-past-the-post system in which many of the Reform voters knew they were likely handing the election to Labour.

Of course, it is psychologically comforting to blame a social problem on a single scapegoat. It makes you feel more comfortable because the problem is contained and limited to whomever you have chosen to scapegoat – be it those pesky refugees, or the Muslims, or the Jews, or the conservative hillbillies, or the “Far Right.” But it may also be myopic, if the problem happens to be a complex one, with multiple underlying causes.

Those who, in the face of growing unrest surrounding immigration and race, limit themselves to condemning [so-called] far-right violence, are missing out on a golden opportunity to open a sophisticated public conversation about fragmented communities across the UK, about the real and perceived failures of immigration policy, and about the reasons why immigration remains such a “hot button issue” in towns and cities across Britain.

Public disquiet in the UK over immigration policy is real and goes far beyond “far-right” agitation. Even when that disquiet is not on the front pages of British newspapers, it continues to bubble under the surface, as some communities feel that their access to public services and housing, as well as the future of their way of life, are threatened by disproportionate levels of immigration, including illegal immigration.

According to a 2023 analysis of professional opinion polls undertaken by the Migration Observatory, 37% of Britons believe immigration should be reduced “a lot,” and 15% believe it should be reduced “a little,” compared with 6% who believe it should be increased “a lot” and 8% who think it should be increased “a little.” In short, over half of the population believe there is too much immigrationwhile more than one in three believe there is far too much immigration.

The superficiality of the “official” British response to the unfolding unrest may come down to a sort of wishful thinking: if we just keep the focus on the “far right,” then we can just round up the culprits, pack our bags, and go home. After all, what politician or head of police wants to grasp the nettle of a racially charged issue like immigration, in a way that seriously engages with the demands of disgruntled citizens and communities?

Nevertheless, until public authorities and opinion leaders start to respectfully engage with citizens who believe illegal immigration is out of control, as well as communities that worry over the impact of immigration on social cohesion, housing, public services, and public finances, the disquiet and resentment will continue to brew. Sadly, we can expect more unrest and disorder if public authorities do not engage in a respectful way with citizens’ legitimate fears and concerns. (read more)


2024-08-13 a
A NATION IN DECLINE I

“Our economy is shattered.
Our border has been erased.
We’re a nation in decline.”

“Make the American Dream AFFORDABLE again.
Make America SAFE again. Make America GREAT Again!”




2024-08-12 d
ANTI-DEMOCRATIC DEMOCRATS VII

IF THE RULE OF LAW STILL PREVAILED IN AMERICA:
THE KENYAN WOULD NOT HAVE BEEN PRESIDENT & TRUMP WOULD
BE COMPLETING HIS SECOND TERM & A JAMAICAN/TAMIL MENTAL MIDGET
WHO IS NOT A "NATURAL BORN CITIZEN" WOULD NOT BE A CANDIDATE.



2024-08-12 c
ANTI-DEMOCRATIC democrats VI

YOU WILL HAVE NO FREEDOM OF
EXPRESSION AND YOU WILL LIKE IT



2024-08-12 b
ANTI-DEMOCRATIC DEMOCRATS V

CONSTITUENT CONFRONTS IMPLEMENTER
OF THE PROTOCOLS



2024-08-12 a
ANTI-DEMOCRATIC DEMOCRATS IV

"you have allowed a laughing hyena who drinks her lunch
to land at the head of the ticket
"



The Party Line Is a Mighty Squishy Line

“I’ve never heard her [Kamala Harris] say anything original or observant; at her best, she simply recites the party line. At her worst, she’s too lazy to memorize the party line.”
— Lionel Shriver

   Does anybody know what this shape-shifting chimera passed off as “our democracy” actually is? I will tell you. Like everything else in the Democratic Party’s tool-bag these days, it’s the opposite of what it appears to mean, namely: You, the demos, give us, officialdom, the power to take whatever we like from you: your savings, your liberty, your stuff, your identity, and your posterity — because we are the boss-of-you, and don’t you forget it. . . and, by the way, the beatings will continue until morale improves.

     It’s really that simple, though the deceptions cooked up to hide it are convoluted to the max. Like: engineering the illegal entry to the US of millions from other lands and then using procedural hocus-pocus such as motor-voter registration and public assistance applications (free money + automatic voter registration) to stuff the election drop-boxes with the ballots of non-citizens — who, get this, don’t even have to be the ones casting those ballots, which can just be harvested, like so many oven-ready pullets, by lowly hired shills. If you catch onto the ruse, you’ll be instructed that borders are arbitrary roadblocks to social justice thrown up by the old white male patriarchy, and that these are “free and fair elections.” And if you object loudly enough, you lose your job, your livelihood, your Facebook account, and maybe get thrown into solitary confinement for a year. Our democracy.

      Meanwhile, we’re enjoying the spectacle of this evil party’s candidate selection tour with their joyful warriors/avatars, Harris and Walz — joyful because they laugh and laugh in the absence of articulating any actual views on the particulars of governance, and it’s infectious to witness all that mirth. There is, of course, an air of strenuous artificiality about all this hoopla. It rolls out in an alternative reality like one of those summer techno-pop raves where everyone is stoned on MDMA. The dream girl gets launched into center-stage by invisible forces and is joined by her prom king, and it’s just so heartwarming to get waved at by the grinning, hand-holding couple nobody voted for. This is your demos-free ticket!

     Will anybody at the imminent Democratic National Convention notice how this all mysteriously came to be? And might there be any active consternation over it? Perhaps even a welling movement to pull the plug on this rave? You may be apt to wonder what is going on in the Chappaqua redoubt of She-Whose-Turn-Has-Been-(so far)-Thwarted, HRC, boss-of-all-girl-bosses, putatively retired from public life. She’s been awfully quiet since that night over a week ago when she was obliged on-stage somewhere to hug and air-kiss Ms. Harris, and made a face seconds after as if she had thrown up in her mouth.

     Is she stewing in the broth of grievance but still and nonetheless tirelessly working her phone to canvass the delegates of that looming party meet-up? She might remind them that the DNC (that is, the Democratic National Committee, Inc), went broke in 2016 and got bailed out by the Clinton Foundation checkbook, and, Jeez, we can’t seem to find any repayment check from all’y’all. It seems maybe you owe us. . . something.

      And, by the way, HRC could remind said delegates: you have allowed a laughing hyena who drinks her lunch to land at the head of the ticket for the worst reasons (viz., DEI) minus any votes from the party membership, and then managed to duct-tape a China-owned, Cluster-B head-case to her as the veep sidekick. . . and maybe when all the hee-hawing and hooting dies down, you’ll discover what a pair of losers you’ve allowed to be undemocratically implanted to (ha!) represent you. And also, by the way, I happen to be available as her capable-and-experienced replacement. . . whom you can actually vote for on the convention floor, if you manage to get your shit together. . . you know. . . our democracy, and all. Just sayin’.

     That is, I’m just sayin’ what She might be thinkin’ (and sayin’). I am in no position to predict any actual outcome, but it’s hard to imagine any winning moves by the Harris & Walz team in actual play-by-play. In case you have forgotten amid all the week-long laughter and euphoria, there are important national issues to discuss about how to manage the malevolent leviathan the federal government has become, and many dilemmas and threats the people face. And there are very different records of each team’s views on these things, party by party.

     Some of that discussion could happen in the (so far) one scheduled September 10 debate. If Mr. Trump can manage to be polite, he can press Kamala Harris to explain herself on things like the wide-open border, failure to negotiate with the Russians to end the Ukraine War, her party’s antipathy to public safety, her party’s promotion of gender identity insanity, its Gestapo-style lawfare operations, its endless hoaxes, and its disgraceful documented efforts to censor free speech. The record is pretty clear on all of that, and there’s a fair chance that Ms. Harris can’t possibly explain it away. Or laugh it off.

     Mr. Trump has requested two more head-to-head debates, which Ms. Harris apparently wants to forego. Mr. Trump has come up with an excellent alternative: two “town hall” format appearances in which he fields questions from citizens, or from news reporters, or some combo of both. That would be much to his advantage, without Ms. Harris on stage to defend her positions — or, more likely, to dodge any coherent reply by repeating “racist racist racist,” and laughing her head off.

      That is, if she even remains the nominee. Let’s see how it goes this week leading to the convention. For instance, if she and Mr. Walz can still weasel out of taking any questions from the news media. Or whether the White House (remember “Joe Biden” still lives squats there) and his blob compadres can engineer a major escalation into world war, to take everybody’s mind off the election race. Or if any tremors of apprehension emanate from the delegate corps packing their rolly-bags for the dreaded party confab in Chicago. You have to kind of wonder if they’re bringing any riot gear. (read more)


2024-08-11 c
ANTI-DEMOCRATIC DEMOCRATS III

DID OBAMA MAKE THEM DO IT?


RAY McGOVERN: Decay, Decrepitude, Deceit in Journalism

Journalism is not like war: In war the victors get to write the history; in today’s journalism, the losers write it.

Russiagate continues to survive like a science fiction monster resilient to bullets.   

The latest effort at rehabilitating it is an interview by Adam Rawnsley in the current issue of Rolling Stone magazine of one Michael van Landingham, an intelligence analyst who is proud of having written the first draft of the cornerstone “analysis” of Russiagate, the so-called Intelligence Community Assessment.

The ICA blamed the Russians for helping Trump defeat Hillary Clinton in 2016.  It was released two weeks before Trump assumed office. The thoroughly politicized assessment was an embarrassment to the profession of intelligence.

Worse, it was consequential in emasculating Trump to prevent him from working for a more decent relationship with Russia.

In July 2018, Ambassador Jack Matlock (the last U.S. envoy to the Soviet Union), was moved to write his own stinging assessment of the “Assessment” under the title: “Former US Envoy to Moscow Calls Intelligence Report on Alleged Russian Interference ‘Politically Motivated.’” 

In January 2019, I wrote the following about the ICA: 

“A glance at the title of the Intelligence Community Assessment (ICA) (which was not endorsed by the whole community) — ‘Assessing Russian Activities and Intentions in Recent US Elections’ — would suffice to show that the widely respected and independently-minded State Department intelligence bureau should have been included. State intelligence had demurred on several points made in the Oct. 2002 Estimate on Iraq, and even insisted on including a footnote of dissent.

James Clapper, then director of national intelligence who put together the ICA, knew that all too well. So he evidently thought it would be better not to involve troublesome dissenters, or even inform them what was afoot.

Similarly, the Defense Intelligence Agency should have been included, particularly since it has considerable expertise on the G.R.U., the Russian military intelligence agency, which has been blamed for Russian hacking of the DNC emails.

But DIA, too, has an independent streak and, in fact, is capable of reaching judgments Clapper would reject as anathema. …

With help from the Times and other mainstream media, Clapper, mostly by his silence, was able to foster the charade that the ICA was actually a bonafide product of the entire intelligence community for as long as he could get away with it. After four months it came time to fess up that the ICA had not been prepared, as Secretary Clinton and the media kept claiming, by ‘all 17 intelligence agencies.’

In fact, Clapper went one better, proudly asserting — with striking naiveté — that the ICA writers were ‘handpicked analysts’ from only the F.B.I., C.I.A., and NSA. He may have thought that this would enhance the ICA’s credibility. It is a no-brainer, however, that when you want handpicked answers, you better handpick the analysts. And so he did.”

[See: The January 2017 ‘Assessment’ on Russiagate

Buried in Annex B of the ICA is this curious disclaimer:

Assessments are based on collected information, which is often incomplete or fragmentary, as well as logic, argumentation, and precedents. … High confidence in a judgment does not imply that the assessment is a fact or a certainty; such judgments might be wrong.”

Small wonder, then, that a New York Times report on the day the ICA was released noted:

“What is missing from the public report is what many Americans most eagerly anticipated: hard evidence to back up the agencies’ claims that the Russian government engineered the election attack. That is a significant omission…”

Burying Obama’s Role

Mainstream journalism has successfully buried parts of the Russiagate story, including the role played by former President Barack Obama.

Was Obama aware of the “Russian hack” chicanery? There’s ample evidence he was “all in.” More than a month before the 2016 election, while the F.B.I. was still waiting for the findings of cyber-firm CrowdStrike, which the Democratic Party had hired in place of the F.B.I. to find out who had breached their servers, Obama told Clapper and Dept. of Homeland Security head Jeh Johnson not to wait.

So with the election looming, the two dutifully published a Joint Statement on Oct. 7, 2016:

“The U.S. Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations. The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process. … “

Obama’s role was revealed in 2022 when the F.B.I. was forced to make public F.B.I. emails in connection with the trial of fellow Russiagate plotter, Democratic lawyer Michael Sussmann

Clapper and the C.I.A., F.B.I., and NSA directors briefed Obama on the ICA on Jan. 5, 2017. That was the day before they gave it personally to President-elect Donald Trump, telling him it showed the Russians helped him win, and that it had just been made public.

On Jan. 18, 2017, at his final press conference, Obama used lawyerly language in an awkward attempt to cover his derriere:

“The conclusions of the intelligence community with respect to the Russian hacking were not conclusive as to whether WikiLeaks was witting or not in being the conduit through which we heard about the DNC e-mails that were leaked.”

So we ended up with “inconclusive conclusions” on that admittedly crucial point … and, for good measure, use of both words — “hacking” and “leaked.” 

The tale that Russia hacked the Democratic National Committee in 2016 was then disproved on Dec. 5, 2017 by the head of CrowdStrike’s sworn testimony to Congress. Shawn Henry told the House Intelligence committee behind closed doors that CrowdStrike found no evidence that anyone had successfully hacked the DNC servers. 

But it is still widely believed because The New York Times and other Democrat-allied corporate media never reported on that testimony when it was finally made public on May 7, 2020.

Enter Michael van Landingham

Rolling Stone’s article on July 28 about van Landingham says he is still proud of his role as one of the “hand-picked analysts” in drafting the discredited ICA.

The piece is entitled: “He Confirmed Russia Meddled in 2016 to Help Trump. Now, He’s Speaking Out.” It says: Trump viewed the 2017 intel report as his ‘Achilles heel.’ The analyst who wrote it opens up about Trump, Russia and what really happened in 2016.” 

Without ever mentioning that the conclusions of the ICA were proven false, by Henry’s testimony and the conclusions of Special Counsel Robert Mueller’s investigation that found no evidence of Trump-Russia “collusion,” Rolling Stone says:

“The 2017 Intelligence Community Assessment (ICA), dubbed ‘Assessing Russian Activities and Intentions in Recent U.S. Elections,’ was one of the most consequential documents in modern American history. It helped trigger investigations by the House and Senate intelligence committees and a special counsel investigation, and it fueled an eight-year-long grudge that Trump has nursed against the intelligence community.” 

Rawnsley writes in Rolling Stone the following as gospel truth, without providing any evidence to back it up. 

“When WikiLeaks published a tranche of [John] Podesta’s emails in late October, the link between the Russian hackers and the releases became undeniable. The dump contained the original spear phishing message that Russian hackers had used to trick Podesta into coughing up his password. News outlets quickly seized on the email, crediting it for what it was: proof that the Russians were behind the campaign.”

Because Rawnsley didn’t tell us, it’s not clear how this “spear phishing message” provides “undeniable” proof that Russia was behind it. Consortium News has contacted Rawnsley to provide more detail to back up his assertion.

Craig Murray, the former British ambassador to Uzbekistan and close friend of Julian Assange,  suggested to Scott Horton on Horton’s radio show in 2016 that the DNC leak and the Podesta leak came from two different sources, neither of them the Russian government.

“The Podesta emails and the DNC emails are, of course, two separate things and we shouldn’t conclude that they both have the same source,” Murray said. “In both cases we’re talking of a leak, not a hack, in that the person who was responsible for getting that information out had legal access to that information.”

Reading between the lines of the interview, one could interpret Murray’s comments as suggesting that the DNC leak came from a Democratic source and that the Podesta leak came from someone inside the U.S. intelligence community, which may have been monitoring John Podesta’s emails because the Podesta Group, which he founded with his brother Tony, served as a registered “foreign agent” for Saudi Arabia.

“John Podesta was a paid lobbyist for the Saudi government,” Murray noted. “If the American security services were not watching the communications of the Saudi government’s paid lobbyist in Washington, then the American security services would not be doing their job. … His communications are going to be of interest to a great number of other security services as well.”

Leak by Americans

Horton then asked, “Is it fair to say that you’re saying that the Podesta leak came from inside the intelligence services, NSA [the electronic spying National Security Agency] or another agency?”

“I think what I said was certainly compatible with that kind of interpretation, yeah,” Murray responded. “In both cases they are leaks by Americans.”

William Binney, a former U.S. National Security Agency technical director, told Consortium News this regarding Rolling Stone‘s assertion about the Podesta emails:

“Saying something does not make it so. There is no evidence the phishers or hackers were Russian. In today’s networks, you really have to have the underlying internet protocol (IP nr) or device medium access control (MAC nr) to show the routing to/from [sending and receiving] devices to show exfiltration plus trace route evidence to show if that data went any further.

[In other words, you would need the unique computer addresses of the hacked and the hacker and anyone they may have relayed it to, if it were a hack.]

[Rawnsley] gives none of this type of data.  So, until he provides this type of data, I view his statements as an opinion and not worth much at all. 

The whole world-wide network has to have these numbers to get data from point A to point B in the world. No one (NSA included) has shown this data going to Wikileaks for publication. The 5EYES have Wikileaks under cast iron cover/analysis and would know this and report it.”

“There is one more aspect that’s important to take into account,” Binney added. “It’s the network log. This contains a record of every instruction sent on the network along with addresses for the sender and receiver. It’s held for a period of time according to storage allocated to it.”

Binney said:

“So, if there’s a hack, then the instruction to achieve the hack is in the log. Remember, Crowd Strike did the analysis of the DNC server all through this time and never talked about the network log. Now, Podesta’s computer does not have a network log, but the DNC and worldwide network providers do.”

Binney told CN that he proposed automated analysis of the worldwide log for the NSA in 1992, “but they refused it as it would expose all the money and program corruption in NSA contracts.”

Binney said he was putting that function into the ThinThread program in 1999/2000 that he was developing for the NSA, but the agency “removed it in 2001 after 9/11.”

A report by the private cybersecurity firm SecureWorks in June 2016 assessed with “moderate confidence” that a group identified as APT28, nicknamed “Fancy Bear” among other names “operating from the Russian Federation … gathering intelligence on behalf of the Russian government” was behind the Podesta phishing, though as Binney points out, the NSA found no such evidence, when it would have had to, had Russia done it.   

The name “Fancy Bear” of the alleged hackers from GRU, the Russian defense intelligence agency, incidentally, was coined by Dmitri Alperovich, the anti-Putin Russian co-founder of CrowdStrike. 

“This whole Russiagate affair was a concoction of the DNC, the Clintons, the F.B.I. etc. and none of them have produced any specific basic evidence to support their assertions,” Binney said. “The idea that the word ‘Bear’ implies Russia is about the level of technical intellect we are dealing with here.”  

Binney said these are the key technical questions that still need to be answered: 

1. What are the IP and/or MAC numbers involved? And, what are the allocations of these numbers by the Internet Assigned Numbers Authority (network number allocation authority)?

2. What are the trace routes of the hacked packets going across the worldwide network?

3. What instructions are in the network log indicating data exfiltration of data?

4. Are there any other specific technical aspects that are relevant to a potential hack? No opinions or guesses, that’s not factual evidence of anything beyond the writers biases.”

Binney said in email:

“Even if you assume the Russians did the hack and have the DNC/Podesta emails, you still have to show the transfer of these emails to Wikileaks to know who really did the deed. So far, no one has evidence the emails were sent to Wikileaks.

Most importantly, Julian Assange publicly said it was not the Russians. Kimdotcom said he helped others (not the Russians) to get data to Wikileaks. Craig Murray talked about physical transfer of data. These statements by people involved in WikiLeaks is clearly consistent with the technical evidence I and others have assembled.”

Binny said that “until such time as those others produce specific technical evidence for peer review and validation (like we have), they are just pushing sludge up an inclined plane with a narrow squeegee hoping they can get it over the top and accepted by all.”

Binney noted that the ancient Greek school of sophism called this the fallacy of repetition. “That’s where they keep repeating a falsehood over and over again till it is believed (it helps when they say the same thing from many different directions especially by people in positions of authority),” Binney said.

So the head of CrowdStrike testifies that there’s no evidence anyone hacked the DNC and according to Binney and Murray, there is no definitive proof that Russia was behind the Podesta phishing expedition either.  WikiLeaks maintains that a state actor was not the source of either. 

And yet the Russiagate myth persists. It is useful in so many ways for those in the U.S. who still want to ratchet up even more tension with Russia (as though Ukraine isn’t enough) and for a political party to perhaps again explain away an election loss if it happens in November. 

Thanks to Bill Binney and two other VIPS very senior NSA “alumni”, and the detailed charts and other data revealed by Edward Snowden, Veteran Intelligence Professionals for Sanity (VIPS) was able to publish a memorandum on Dec. 12, 2016 that, based on technical evidence, labeled the Russian hacking allegations “baseless.” The following July we issued a similar VIPS  memo, with the title asking the neuralgic question, “Was the ‘Russian Hack’ an Inside Job?” The question lingers.

I have now posted an item on X to call attention to this latest Russiagate indignity.

I cannot escape the conclusion that journalism is not like war: In war the victors get to write the history; in today’s journalism, the losers — who get it wrong — get to write it.

O Tempora, O Mores!
[EDITOR'S NOTE: Latin phrase is from Cicero's Catiline Orations.
Oh, the times! Oh, the morals!
Cicero, Catilina I, 2]

(read more)



2024-08-11 b
ANTI-DEMOCRATIC DEMOCRATS II

BIDEN ADMITS HE WAS FORCED OUT.
IMPLICATES CORRUPT ITALIAN POLITICIAN.

* * *
*
*
POLITICAL HITWOMAN DIGS HERSELF A DEEPER HOLE

 
2024-08-11 a
ANTI-DEMOCRATIC DEMOCRATS I

KHAZAR'S CANDIDATE, COMRADE KAMALA,
WILL DESTROY AMERICA



*
*

*
COMRADE KAMALA'S BODYGUARDS PICK LOCK
TO BREAK INTO A BUSINESS
(Just like in a communist country.)



*
See also:


_______________________

Permission is hereby granted to any and all to copy and paste any entry on this page and convey it electronically along with its URL, http://www.usaapay.com/comm.html

_______________________

2024 ARCHIVE

January 1 - 2

January 3 - 4

January 5 - 7

January 8 - 14

January 15 - 24

January 25 - 31

February .
March .
April 1 - 12

April 13 - 21

April 22 - 26

April 27 - 30

May I

May II
 
June 1 - 30
July 1 - 31
August 1 - 10
September
October

November

December


2023 ARCHIVE

January 1 - 6

January 7 - 13

January 14 - 16

January 17 - 22

January 23 - 29

January 30 - 31

February 2 - 8

February 9 - 16

February 17 - 21

February 22 - 28
March 1 - 4

March 5 - 9

March 10 - 13

March 14 - 18

March 19 - 23

March 24 - 28

March 29 - 31

April 1 - 4

April 5 - 11

April 12 - 17

April 18 - 24

April 26 - 30
May 1 - 8

May 9 - 17

May 21 - 26

May 27 - 31
 
June 1 - 5

June 6 - 14

June 15 - 24

June 25 - 30
July 1 - 12

July 13 - 29

July 30 - 31
August 1 - 13

August 14 - 19

August 20 - 26

August 27 - 31
September 1 - 10

September 11 - 16

September 17 - 27

September 28 - 30

October 1 - 8

October 9 - 15

October 16 - 23

October 24 - 31
November 1 - 11

November 12 - 17

November 18 - 25

November 26 - 30
December 1 - 7

December 8 - 18

December 19 - 25

December 26 - 31


2022 ARCHIVE

January 4 - 9

January 10 - 16

January 18 - 22

January 23 - 29

January 30 - 31

February 1 - 6

February 7 - 10

February 11 - 15

February 16 - 20

February 22 - 28
March 1 - 7

March 8 - 17

March 18 - 25

March 26 - 31
April 1 - 8

April 9 - 17

April 18 - 25

April 26 - 30

May 1 - 9

May 10 - 14

May 15 - 23

May 24 - 31
 
June 1 - 10

June 11 - 17

June 18 - 26

June 27 - 30
July 1 - 10

July 11 - 17

July 18 - 23

July 24 - 29

July 30 - 31

August 1 - 10

August 11 - 18

August 19 - 23

August 24 - 31
September 1 - 9

September 10 - 17

September 18 - 25

September 26 - 30

October 1 - 9

October 10 - 17

October 18 - 27

October 28 - 31

November 1 - 6

November 7 - 13

November 14 - 18

November 19 - 24

November 26 - 30

December 1 - 7

December 8 - 15

December 16 - 23

December 24 - 31


2021 ARCHIVE


January 1 - 6

January 7 - 13

January 14 - 20

January 21 - 24

January 25 - 28

January 29 - 31

February 1 - 4

February 5 - 10

February 11 - 21

February 22 - 24

February 25 - 28
March 1 - 9

March 10 - 17

March 18 - 23

March 24 - 31
April 1 - 8

April 9 - 14

April 15 - 18

April 19 - 24

April 25 - 30

May 1 - 5

May 6 - 10

May 11 - 15

May 16 - 22

May 23 - 26

May 27 - 29

May 30 - 31
 
June 1 - 5

June 6 - 8

June 9 - 12

June 13 - 19

June 20 - 24

June 25 - 30
July 1 - 6

July 7 - 10

July 11 - 17

July 18 - 23

July 24 - 28

July 29 - 31
August 1 - 5

August 6 - 8

August 9 - 14

August 15 - 18

August 19 - 23

August 24 - 28

August 29 - 31
September 1 - 4

September 5 - 9

September 10 - 16

September 17 - 21

September 22 - 27

September 28 - 30

October 1 - 5

October 6 - 9

October 10 - 14

October 15 - 20

October 21 - 27

October 28 - 31

November 1 - 6

November 7 - 10

November 11 - 14

November 15 - 20

November 21 - 25

November 26 - 30
December 1 - 4

December 5 - 9

December 10 - 13

December 14 - 18

December 19 - 26

December 27 - 31

2020 ARCHIVE

January
February March
April 1 - 15

April 16- 30

May 1 - 15

May 16- 31
 
June 1 - 15

June 16- 30
July 1 - 15

July 16- 31
Aug 1 - 15

Aug 16 - 31
September 1 - 15

September 16 - 30
October 1 - 15

October 16 - 23

Ocober 24 - 31
November 1 - 8

November 9 - 15

November 16 - 21

November 22 - 30
December 1 - 7

December 8 - 12

December 13 - 16

December 17 - 20

December 21 - 27

December 28 - 31

-0-
...
 News and facts for those sick and tired of the National Propaganda Radio version of reality.


- Unlike all the legacy media, our editorial offices are not in Langley, Virginia.


- You won't catch us fiddling while Western Civilization burns.


-
Close the windows so you don't hear the mockingbird outside, grab a beer, and see what the hell is going on as we witness the controlled demolition of our society.


- The truth usually comes from one source. It comes quietly, with no heralds. Untruths come from multiple sources, in unison, and incessantly.


- The loudest partisans belong to the smallest parties. The media exaggerate their size and influence.


THE ARCHIVE PAGE
.

QUOTES
finger
Richard Feynman, “Learn from science that you must doubt the experts. As a matter of fact, I can also define science another way: Science is the belief in the ignorance of experts.”

Friedrich Nietzsche, “The surest way to corrupt a youth is to instruct him to hold in higher esteem those who think alike than those who think differently.”

Dwight D. Eisenhower, “Here in America, we are descended in blood and in spirit from revolutionists and rebels – men and women who dare to dissent from accepted doctrine. As their heirs, may we never confuse honest dissent with disloyal subversion.”

H. L. Mencken, “All government, in its essence, is a conspiracy against the superior man: its one permanent object is to oppress him and cripple him. If it be aristocratic in organization, then it seeks to protect the man who is superior only in law against the man who is superior in fact; if it be democratic, then it seeks to protect the man who is inferior in every way against both. One of its primary functions is to regiment men by force, to make them as much alike as possible and as dependent upon one another as possible, to search out and combat originality among them. All it can see in an original idea is potential change, and hence an invasion of its prerogatives. The most dangerous man to any government is the man who is able to think things out for himself, without regard to the prevailing superstitions and taboos. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane and intolerable, and so, if he is romantic, he tries to change it. And even if he is not romantic personally he is very apt to spread discontent among those who are.”


No
          Thanks
POTENTIAL TOPICS
news, real news, exposé, investigation, fact, just the facts, journalism, journalist, unsubstantiated, allegation, academia, academic, expert, intellectual, Middle East expert, Think Tank, opinion, opinion maker, approved opinion, editorial, Overton Window, fake news, agenda, intellectual, court historian, pundit, bien pensant, dumbing down, stonewall, stonewalling, cognitive dissonance, narrative, rumor, baseless rumor, controlled explanation, indoctrination, propaganda, Bernays, censorship, Operation Mockingbird, Wurlitzer, conspiracy theory, Newspeak, memory hole, manipulation, delegitimizing, deplatforming, lobbyist, quid pro quo, corruption, pay to play, influence, influence peddling, hate, hate speech, two minutes hate, Orwell, Orwellian, 1984, Big Brother, artificial intelligence, artificial idiocy, AI, face recognition, robots, technology, Richard Stallman, GNU, internet, web, Luddite, privilege, Asian privilege, black privilege, brown privilege, white privilege, identity politics, intersectionality, intersectionality privilege, egalitarianism, equal outcome, equal opportunity, equality, outrage, feigned outrage, virtue, virtue signalling, cultural appropriation, safe space, infantilizing, marginalized, vulnerable, at risk, victimized, victim, victim card, victim group, resentment, affirmative action, quotas, affirmative action hires, ethnic, ethnic group, ethnicity, diverse, diversity, inclusive, multicultural, multiculturalism, tolerance, repressive tolerance, grievance studies, Frankfurt School, Theodor Adorno, Antonio Gramsci, Gramscian, Georg Lukacs, Max Horkheimer, Herbert Marcuse, Wilhelm "Willi" Münzenberg, Political Correctness, politically correct, Kulturkampf, culture war, Cultural Marxism, Cultural Maoism, Cultural Revolution, Marx, Marxist, Marxism, Lenin, Bolshevik, Trotsky (Bronstein), Stalin, Communist, communist sympathizer, fellow traveler, Franklin Delano Roosevelt, FDR, Socialist, National Socialist, National Socialist German Worker's Party, fascist, nusquama, Utopia, utopian, administration, regime, regime change, Democrat, RINO, centrist, moderate, populist, radical, radicalization, Neocon, Evangelical, warmonger, authoritarian, Neoconservative, Republican, Old Right, Classical Liberal, Libertarian, majority, majority rule, mob, mob rule, founders, framers, separation of powers, Marbury vs. Madison, liberal, conservative, election, vote, voter, poll, surveillance, Silicon Valley, social media, DARPA, coverup, FOIA, redacted, Glomar response, unredacted, revolution, color revolution, revolutionary, Jacobin, insurgent, assassin, assassination, lone wolf, terror, terrorist, terrorism, Menachem Begin, reign of terror, state sponsor of terror, CIA, Mossad, MI5, MI6, entrapment, 18 U.S.C. § 1001, perjury trap, 302, Federal Bureau of Instigation, Federal Bureau of Insurrection, Federal Bureau of Intimidation, fall guy, patsy, informant, informer, agents provocateurs, torture, interrogation, enhanced interrogation, enabling act, police, militarized police, police state, police brutality, policing, broken window policing, guilty until proven innocent, jail, prison, carceral state, for profit prison, security, security theater, false flag, Gladio, rape hoax, Tawana Brawley, Wanetta Gibson, Crystal Gail Mangum, Duke lacrosse team, Jackie Coakley, Sabrina Rubin Erdely, hate hoax, Jussie Smollett, noose, swastika, class, social class, bias, choice, discrimination, freedom, preference, right of association, assortative mating, social construct, race, race card, racial identity, racism, racist, minority, model minority, credit to your race, tribe, tribal, cousin marriage, heredity, genome, genetics, chromosomes, creativity, intelligence, IQ, bell curve, merit, meritocracy, sex, gender, binary, nurture versus nature, Human Action, von Mises, economics, dismal science, Adam Smith, Austrian Economics, Menger, capitalism, capitalist, capital, asset, productive asset, income, income inequality, bank, bankruptcy, fractional reserve banking, reserve currency, dollar, petrodollar, yuan, yen, euro, pound sterling, inflation, monetary inflation, deflation, bullion, gold, sovereign, gold sovereign, silver, platinum, precious metals, savings, price discovery, honest price discovery, stimulus, helicopter money, central planning, Wall Street, Plunge Protection Team, President's Working Group, bubble, asset bubble, irrational exuberance, crash, investments, equities, options, commodities, leverage, hedge fund, risk, risk assets, counterparty risk, contagion, collapse, offshore, offshore account, offshore trust, shell company, derivatives, short selling, naked short selling, stocks, bonds, junk bonds, fracking, abiotic petroleum, oil shale, diminishing returns, financialization, monetizing debt, debt, note, mortgage, interest rate, negative interest rate, quantitative easing, QE, repo market, repurchase agreement, panic, panic printing, primary dealer, scam, Social Security, Ponzi scheme, Federal Reserve, Eccles Building, Constitution Avenue, New York Fed, 33 Liberty Street, People's Bank of China, European Central Bank, Bank of England, Bank of Japan, Bank for International Settlements, International Monetary Fund, IMF, Bretton Woods, technical default, Fort Knox, tungsten bars, gold-plated tungsten bars, gold leasing, audit, gold window, Nixon, 15 August 1971, recession, depression, Great Depression, Florence Owens Thompson, Dust Bowl, unemployment, supply chain, supply chain disruption, Little Ice Age, solar minimum, unseasonable cold, crop failure, starvation, riots, food riots, martial law, militia, resistance, secession, liberty

If you let them redefine words, they will control language.
If you let them control language, they will control thoughts.
If you let them control thoughts, they will control you. They will own you.

© 2020 - 2024 - thenotimes.com - All Rights Reserved