Weaponized Technology: What is Total Individual Control Technology?(Part 2 of 2)

Phone13..

Total Individual Control Technology is a nefarious type of EM (Electromagnetic) and V2K (Voice to Skull) weaponized technology that is being experimented with and deployed against segments of the American population. Those attacked by this electronic stalking are known as TIs (Targeted Individuals). Recently another brave whistleblower has stepped forward to expose it. Bryan Kofron (who formerly used the alias of Justin Carter) is a security industry specialist who used to work for a private security company SIS (Security Industry Specialists) in Seattle, Washington. He quit in disgust after realizing that his former firm, and others just like it, were actively using this so-called total individual control technology to target people, then ultimately control and destroy their lives. Since he quit, he has himself become a victim of the technology via gangstalking.

According to Kofron, this technology is so advanced that it can be used to read your mind, program your mind with thoughts (that you would believe are your own) and induce emotional states in you (including pain, hate and fear). It can be used to tap into your optical nerve and auditory systems to see and hear what you are seeing and hearing. It can target particular people by engaging in individual-specific attacks (based on the target’s DNA resonance). Finally, it is being used in vast social engineering programs as a way to experiment upon poor, homeless and weak people who have little or no chance of fighting back.

In interviews or presentations such as this and this, Kofron explains that this technology is being used by psychopaths who have little scruples about the harm they are causing. They are targeting specific groups of people: those who are cognitively inclined, highly intelligent, knowledgeable about advanced technology or interested in alternative research (i.e. conspiracy research). In general, they are either targeting empowered individuals with free minds (to stop dissidents and revolutionaries) or those too poor and weak to fight back.

TIC Story...

Using Kofron’s own words, here are some of the things Total Individual Control Technology is able to do:

“This technology manipulates the electrical signals in the brain, thus controlling thoughts and feelings and emotions and sensations throughout the body. It works by rewiring the brain by creating new neural pathways and destroying existing neural pathways, thus this literally changes the way a person thinks and thus behaves.”

“This technology can also be used to control the muscle movement of the target. It can take over one’s hands or feet while driving and make you press on the accelerator or press on the brake or turn. This can be used to cause accidents it can also be used to prevent accidents from happening.”

“This technology can also tap into the optical nerve of the target, and the auditory system of the target, so that those monitoring the target can see what the target is seeing and hear what target is hearing. This information is then downloaded and stored on a computer, in a highly secure classified site on servers that are guarded by some of the tightest security in the world. This results in the individual’s entire day, everything they see, everything they hear, everything they experiment, everything they experience, and everything they feel being recorded till the end of time.”

“This technology can also be used to manipulate the emotions of the target. It can induce fear, love, hate.”

“This technology can be used to beam images and even motion pictures into one’s brain. Images and motion pictures that are so realistic that you think you are actually watching a movie or seeing something in reality. It’s like a virtual reality 3D rendering that takes place within the target’s mind. The images and motion pictures manifest themselves in such a way that the target if they are not aware that this technology is being used on them will believe that they are natural thoughts and natural images.”

“This technology can also be used to induce and control dreams. It can be used to control dream cycles and sleep patterns. To cause one to sleep very deeply or to cause one to not sleep at all. REM cycles, alpha beta and delta brainwaves can be induced immediately by this technology. And this technology can also be used to mimic spiritual experiences. Joy, love, peace that passes understanding can all be induced artificially by this technology to make the target believe that they are having a genuine spiritual experience when they’re not.”

“This technology can also be used to sexually manipulate the target. Make them feel sexual arousal or turn off their sexuality altogether, it can stimulate them and it can shut them down at a moments notice. It can also be used to manipulate the hormones of the target, thus lowering and raising estrogen and testosterone levels in women and men respectively.”

“This technology can also be used to read the thoughts of the target in real time … they can read your thoughts verbatim as they occur within your own mind.”

“Anywhere from small groups of people 10-20 to 100, to medium size groups of people several thousand to tens of thousands. This is done by creating a field effect, where an entire field of electromagnetic energy is created in a geographical location and any human being within that geographical location within that electromagnetic field affecting that geographical location will be effected by the technology. This can be used to induce a general mood in a population or a crowd of people. It can be used to make them passive, it can be used to make them agitated. And this can be used to cause or stop, induce riots. Stop crime, start crime. Stop thoughts, start thoughts. Massive mind control on a citywide level.”

Phones3...

The Drive to Create a Worldwide DNA Database

This leads into another aspect of the NWO agenda: the drive to create a worldwide DNA database. When seen in the light of Total Individual Control Technology, the acquisition of an entire population’s DNA takes on a very sinister meaning. It is no coincidence that Amazon and Google are racing each other, along with Microsoft, IBM and other companies, to assemble a DNA database as quickly as they can. Those in power who gain access a completed worldwide DNA database and total individual control technology would have a horrifying weapon at their disposal to target literally anyone they wanted.

Kofron exposes how prospective employees are tricked out of their DNA. They apply for a job at SIS, get told they have to do a drug test, and when the urine sample is sent to a lab, part is siphoned off as DNA to go into Amazon’s burgeoning DNA database.

Americans, in the millions, are having their DNA stolen from them, without their knowledge or consent, so they become unwitting targets of this insidious program!

Social Engineering with Total Individual Control Technology

Kofron talks at length about how this technology is fully operational and is already being tested upon those in society who are struggling (such as those who are homeless, poor and who don’t have much family or many friends) since they make the easiest targets. On his website GangstalkerWars.com, he exposes the details of ongoing operations within Seattle (where he used to work for SIS). This social engineering is being done by the Federal Government, the Military Intelligence agencies, private security firms (more on this below), some of the largest US corporations (after all, we live in a corporatocracy), local and state police, and social programs within inner-city America.

In one such operation, the perpetrators would target certain geographical blocks of the city, and, for instance, cause everyone in that area to be in a bad mood. In another operation, SIS (employed by Amazon whose headquarters are in Seattle) would test upon Amazon employees. In another operation, SIS would experiment upon its own low level employees. In another operation, homeless people were brought in from all over the nation to special buildings that were then targeted. This is true gangstalking – the ganging up by sociopaths and psychopaths upon the innocent to electronically harass and stalk them.

Phones1...

The Rising Danger of the Private Security Firm Industry in America

Kofron warns about an alarming trend in American society: the rise of private security companies who mostly employ ex-military and ex-intelligence agents. As I covered in this 2-part series, the US Military Intelligence Complex is completely and utterly out of control. It runs the government and pulls the strings attached to all the puppet politicians, who don’t have the necessary “clearance” to access the truly top secret information. These security firms, like the MIC itself, appear to operate above and outside the law.

The culture inside of these companies is toxic. People rising up the ranks are conditioned to use this technology against innocent victims, and are told they will be rewarded with everything (money, power, women, sex, connection, access, status, belonging to the power club) if they go along with the program and become perpetrators. If they have a strong conscience and refuse, they will be sacked, shunned, cut off, threatened and even made into TIs themselves.

The Human Rights Loophole: False Diagnoses

Another aspect of Total Individual Control Technology which the perpetrators use to shield themselves is the cruel use of false psychiatric diagnoses. Here’s how it works: they manipulate TI victims to see a psychiatrist, and then they bribe the psychiatrist to deliver a fake diagnosis that the victim is mentally unstable, deranged, delusional, crazy, incompetent, paranoid, schizophrenic, suffering from Multiple Personality Disorder – or they invent some similar legal-medical-psychobabble diagnosis. This has the unfortunate effect of stripping away the victim’s natural or human rights, which leaves him or her with no recourse to fight back against his attackers, since his claims and testimonies will be dismissed as the ravings of a madman.

This is a similar tactic to what is used with other victims of mind control. In my interview with Max Spiers, he touched on the use of the Big Pharma “false memory” foundation, which includes bogus therapists and psychiatrists who convince mind control victims that they’re having false memories (when they are actually recalling how they were tortured and programmed).

The Infrastructure Underlying Total Individual Control Technology

The infrastructure that is enabling the total individual control technology is composed mostly of antennae, radar and cell phone towers. Often, the antennae are camouflaged (hidden behind walls). Some or most of the radar used is from military bases. Kofron was not able to explain much of how the technology actually works, although an electrical engineer who called in on one of the radio interviews suggested that the perpetrators are setting up a standing wave of DNA, then doing slight variations in the phasing using pulse code modulation.

Final Thoughts: Total Individual Control Technology Perpetrated by the Cult of Power

In concluding, it’s important to realize how such cruel surveillance is being perpetuated. As Kofron explains, it’s all about creating an “in” club of perpetrators who get rewarded with money, sex, power and the intrinsic human need for belonging, get told they are on the “right” side and the TIs are on the “wrong” side – and get threatened that if they speak up or quit, they may end up on that wrong side. It’s the cult of power.

Hopefully this testimony can serve as a wakeup call for those on the fence who can’t quite bring themselves to believe or act. In many ways, time is running out and the net is being drawn tighter and tighter. The more technology advances, the more weapons the cult of power will have to enslave those who stand for truth and freedom. At a certain point, there will literally be nowhere to run or hide. The only option is to face it now before it’s too late.

Article from tapnewswire.com

Weaponized Technology: Is 5G dangerous?(Part 1 of 2)

Phone12..

When the Federal Communication Commission (FCC) approved the use of 5-G microwave communication technology in 2016 and approved the use of microwave frequencies in the 30 Ghz range, [1], they opened the door to even higher levels of human illness and severe disability for American children and adults.

Microwave radiation such as that currently being used in cell phones, Wi-Fi routers, and smart meters has already been linked to numerous health effects.

The introduction of even more intense levels of microwave exposure at higher frequencies will push many people into life-threatening chronic illness. High frequency microwave radiation is often overlooked as a causative factor in illness, because most conventional healthcare providers, government regulators, telecom companies, and electric utilities believe microwave radiation used in communication technology is harmless.

Despite the warnings being raised by scientists, well informed healthcare providers, and grassroots organizations about existing and future microwave hazards, telecom companies are planning to implement 5G technology throughout every urban area in America. They are already testing this new generation wireless telecommunication infrastructure in Boston, Austin, Palo Alto, and Mountain View California.

In a January 2017 announcement, AT&T described their plan for future technology deployment. The announcement stated:

Our 5G Evolution plans will pave the way to the next-generation of higher speeds for customers. We’re not waiting until the final standards are set to lay the foundation for our evolution to 5G. We’re executing now,” said John Donovan, chief strategy officer and group president, Technology and Operations

The Battle to Implement 5G has begun in California

 

Proposed legislation in California would permit telecom companies to erect 50,000 new microwave antennas in residential and commercial areas without municipal approval.

The 5G microwave antennas would be placed on top of existing utility poles or on public infrastructure such as schools, libraries, bus shelters, and in public parks. The placement of this equipment will be at the discretion of the telecom companies.

Phone7...

Health Dangers of Microwave Radiation have been Well Documented

The symptoms of microwave radiation exposure include fatigue, headaches, heart palpitations, high pitched ringing in the ears, dizziness, disturbed sleep at night, sleepiness in daytime, moodiness, irritability, unsociability, feelings of fear, anxiety, nervous tension, mental depression, memory impairment, pain in muscles, pain in the region of the heart, and breathing difficulties, to name a few.

Inflammation (caused by excess histamine in the blood), oxidative stress, autoimmune responses, reduced blood flow to the region of the thalamus, pathologic leakage of the blood-brain barrier, and a deficit in melatonin metabolic availability have all been observed.

There is evidence that existing and new frequencies of microwave radiation are associated with cancer, heart disease, neurological dysfunction, immune system suppression, cataracts of the eyes, and sperm malformation.

5G Microwaves have Harmful Biological Effects

In her testimony before the California legislature, Dr. Ann Lee, M.D., indicated that there are 20,000 well established scientific studies on the bio-effects of radio frequency radiation.

She confirmed that microwave radiation such as that from the proposed 5G wireless facilities that would be deployed in California has been shown to cause neurological damage, cardiac dysfunction, reproductive harm, immune compromises, and cancer.

Dr. Ronald Powell, Ph.D., expands upon these concerns. Dr. Powell received his doctorate in Applied Physics from Harvard University in 1975, and has worked for the National Science Foundation and the National Institute of Standards on energy policy research and R&D program evaluation.

He is uniquely qualified to interpret the junction between the physics of electromagnetic fields and the biological effects these fields produce.

Phones2...

In a letter to the FCC, Dr. Ronald Powell stated:

It would greatly extend FCC’s current policy of the mandatory irradiation of the public without adequate prior study of the potential health impact and assurance of safety. It would irradiate everyone, including the most vulnerable to harm from radio frequency radiation: pregnant women, unborn children, young children, teenagers, men of reproductive age, the elderly, the disabled, and the chronically ill.

AT&T: Let Us Install Microwave Transmitter on Your Home or Lose Service

Now that more than 50% of homes are wireless, telecom companies plan to abandon copper phone lines used for their phone service and create a wireless phone system. For example, Michigan has passed a law permitting this, and AT&T is working with all 21 states in its service territory to bring this about.

As an alternative to the wired system, telecom companies plan to install wireless microwave transmitters on homes as a method of providing traditional phone service. In the case of AT&T customers, the only way you will be able to prevent them from installing such devices on your home is to remove AT&T as your service provider.

In addition, telecom companies plan to install microwave antennas on top of electrical power poles near homes and businesses, and on top of public buildings throughout every urban area and in every neighborhood.

Phone8...

California Legislators Consider Bill to Allow More Microwave Radiation

But this is not just about offensive looking antennas!

Nina Beety described the situation in the article she wrote for StopSmartMeters.org. She is the moderator of the Wireless Radiation Alert Network and distributes her research about the harmful effects of electromagnetic fields and the dangers of smart meters on her website, SmartMeterHarm.org.

Nina Beety stated:

Spaced approximately every 10-20 homes, cell antennas will hang in one or more clusters on utility or light poles. Equipment cabinets the size of refrigerators, with cooling fans and back-up generators, will sit on sidewalks. Towers will be located in the public right of way a few feet from bedroom windows, offices, schools, hospitals and nursing homes.

Called “small cells,” there is little difference in size for many of these antennas; the chief difference is the location on utility poles versus large towers. Measurements of these cell towers recently taken in Palo Alto found high levels of radiation on the sidewalk below them — levels higher than those associated in research with breaches in the blood-brain barrier, free radical formation, DNA damage, cancer and tumors, and heart rhythm disturbances.

Nina Beety is specifically describing the proposed system that would be implemented in California if the telecom companies get their way. Currently, a bill permitting the establishment of the 5G system has been passed by the California Senate. A legislative committee will be considering the bill on July 12, 2017. A rally at the State House in Sacramento is planned for July 12th. Please see the following urgent call for action and related links for the details.

Phone10...

The smart meters that electric utilities are now installing throughout the U.S. are the nerve endings for what will become a highly complex centrally controlled information and energy exchange system.

The 5G network will use the smart meter system (being implemented throughout the U.S.) and the new generation of smart appliances to reach into our homes and make decisions for us.

Current smart meter technology enables electric utilities to read electric meters without sending a human being to physically read the meters.

Electric providers have been quietly installing these smart meters throughout the U.S. They insist that these meters are harmless even though they broadcast intense bursts of high frequency microwave radiation several times per minute 24-hours per day every day.

Currently, smart meters record electric consumption and transmit the information to the utility company for billing and electric distribution purposes.

The bursts of microwaves are used to communicate with other smart meters in the neighborhood and with wireless routers mounted on top of electric poles. The routers send even more powerful microwave signals several thousand times per hour to the utility company.

Smart appliances such as heating/cooling equipment, washers/dryers, refrigerators/freezers, stoves/microwave ovens, dishwashers, hot water heaters, and even electric coffee makers will each be able to broadcast and receive microwave signals.

These appliances and our smart meters will constantly communicate with one another all day long and all night long – they will never stop transmitting microwave radiation.

Everything that uses electricity will be potentially monitored and controlled by the power companies.

If desired, the electric providers can even independently turn off any appliance they wish whenever they wish to conserve energy consumption.

The need for smart appliances will be a boon for appliance manufacturers and microwave technology producers. The fusion of 5G with the electrical grid will require everyone to buy new appliances that are smart meter enabled or have our existing appliances retrofitted with microwave transmitters.

Article taken from Worldexposed.com

Cryptocurrency: Good investment or One World currency?(Part 1 of 2)

Bit2....jpg

As I’m pretty sure by now, most of you have heard in some form or fashion the word “cryptocurrency” being tossed around in the media & social media due to the most popular form of cryptocurrency by the name of Bitcoin (BTC) reaching a value level of as high as $7,380.56 per coin.  To some people, the mere fact that this form of currency is so valuable is enough to get most people excited as they sit around pondering the possibilities of transforming this currency into a fiat currency to where they can essentially ball out of control.  To other people, most honestly have no clue what cryptocurrency is, why it’s so valuable, why people are so excited about it, & why people are rushing to get involved in the cryptocurrency market.  Well, I’m about to give you the most elementary explanation that I can think of in order to help you understand what cryptocurrency is, why cryptocurrency WILL dominate the future & more importantly why you SHOULD get involved in this market, especially if you are black.

Everything from money to social media activities are centralized (controlled by some organization).  The stuff you post to Facebook is stored on Facebook servers all across the world that are owned & controlled by Facebook.  Every time you withdraw money from an ATM machine, send money via PayPal, pay for something using a debit/credit card, all of those transactions must go through a bank (centralized) to where the bank controls the actual process of sending/receiving, recording & verifying transactions before the disbursement of funds…for a fee of course.  These transactions themselves are stored on servers owned & controlled by these institutions as well.
These servers are very important for a reason.  These servers process & store the information they collect from you (in addition to data mining this information to be sold to third party companies who then send you a bunch of junk via email or snail mail to convince you to buy).  Another reason these servers are so important is because these servers are also extremely valuable to hackers roaming the internet looking to compromise a server to gain access to the information residing on the server to be later sold on the black market (think identity theft).  The problem with these servers is that in the grand scheme of things, they represent single point of failures that are constantly being attacked & exploited for nefarious purposes.  All of the information that you’ve posted to Facebook ONLY resides on Facebook’s servers spread out across the world.  This information does not reside on any of Google’s servers which means if someone managed to wreck havoc on Facebook’s system causing the site to crash or something catastrophic to where your information was compromised (as in recent issues involving Yahoo!), then you couldn’t turn to Google’s servers in an attempt to retrieve the information you had stored on Facebook’s servers, because they are not connected in that manner to allow for the free flow of data to be exchanged & stored.  I have a decade+ background in IT & I have a master degree in Information Assurance.  My master degree alone is basically a degree that focuses on protecting information floating around being stored on servers.  So the problem is a very real problem that most people are unaware of.

Cryptocurrencies function off of a technology called blockchain.  Blockchain essentially eliminates the single point of failure aspect by removing the storage of data on centralized servers owned by private/public entities.  The data on the blockchain whether it is financial transactions, social media activities etc are stored across a gigantic network of computers called nodes to where the information stored cannot be controlled by one entity or hacked causing severe problems due to single point of failure issues I described above.  The reason the data on the blockchain cannot be hacked is because the data resides on a distributed network is highly encrypted to where a hacker can’t just hack one single point on the blockchain, they would have to hack the entire blockchain essentially.  Also, the data residing in the blocks on the blockchain are constantly updated across the network to wherever you access the data on the network, the data will be the same.

Bit1...

Here’s an example of what I mean by the data being centralized & decentralized in addition to the data being “mirrored” across the network no matter where you are to access the data.

Back in the day on Microsoft Word a person would type a paper, save the paper, & then email the paper to somebody to make corrections.  The person whom the email was sent to would get the email, open MS Word, make corrections, email you the paper back, then you would make necessary changes to the paper.  This entire process was centralized to where only one party had control of the paper at a time and the other party couldn’t get access to the paper until the owning party relinquished control.

Now, we have Google Docs (basically cloud computing) to where multiple parties at the same time can access, view and/or edit the paper in real time without waiting for one party to relinquish control of the paper (decentralized).

Bit4...

How this ties into the data floating around on the blockchain is…you’re not inputting your data into just one entity and entrusting that one entity to do the right thing as far as processing and safeguarding your data (for a fee in most instances).  You are now putting your data across a distributed network to where copies of that data will exist in multiple places at once.  So, if I upload some data from my home computer on the blockchain, my data will be added to the blockchain which will then be replicated across the network and not just sitting on one server that I would need to gain access to (think…logging into Facebook, you’re essentially logging into a site that stores your updates on their servers).  In a decentralized scenario, in theory, I would be able to log into my gmail account and still be able to access my data on Facebook.

Now some of you are probably wondering how this data is protected if this data is “free floating” on the blockchain versus the data (supposedly) being protected on some entity’s servers.

Simple, the data is encrypted (it’s encrypted on these entity’s servers too by the way…or at least should be).  But the encryption on the blockchain isn’t CENTRALIZED, meaning you are not relying solely on that one entity to encrypt & protect your data.

So how the encryption works is fairly simple for the most part.  Blockchain works off of an encryption practice called asymmetric encryption.  Asymmetric encryption involves the use of a public & private key to gain access to data.  Any data you put on the blockchain is encrypted to where the data looks like a bunch of meaningless letters, numbers & symbols that would literally take decades (if not longer) to decipher.

A private & public key can be thought of this way…

You maintain a mailbox at a UPS store.  UPS gives you 2 keys:  one to access the UPS store and the other key to access your personal mailbox within the store.  The UPS store key that you possess is the same key that some random person with a mailbox at the UPS store would possess as well, but that random person does not have your private key (or shouldn’t) to access your personal mailbox.

So on the blockchain, what tends to happen is, people constantly give out their public key to pretty much anybody who wants it for the purpose of exchanging data (and/or “money”…cryptocurrency).  But to unlock or gain access to the item in the transaction, a person would need your private key to do so.  So basically what takes place is, Person A wants to send an item to Person B.  Person A sends an item to Person B using Person B’s PUBLIC KEY.  This item is encrypted within Person B’s PUBLIC KEY.  Person B receives the item from Person A.  Person B now uses his PRIVATE KEY to decrypt his PUBLIC KEY to get access to the item Person A sent him.  If anybody were to intercept Person B’s PUBLIC KEY, they would NOT be able to access the data encrypted on that public key without having access to Person B’s PRIVATE KEY.  Person A can’t even get access to the data he sent Person B because Person A used Person B’s PUBLIC KEY to encrypt the data and ONLY Person B’s PRIVATE KEY can decrypt Person B’s PUBLIC KEY.  Got it?  Good.

Now, all of these transactions are continually updated across the blockchain network in a matter of minutes to where each transaction is essentially “etched in stone” to where a new “block” is created in the overall network which is then duplicated everywhere on the network (think of my Google Docs analogy).  This is important because in order to hack the system, every other block that was created prior to the new block would have to be hacked as well which would require computing power that probably doesn’t exist to even make it worth somebody’s time & effort to attempt.  You can’t just hack one block, all the blocks are connected which mean you would have to hack ALL OF THE BLOCKS.  Also, you can’t delete data on the block once the data is recorded.  Now for the sake of this blog article, I’m choosing not get too technical beyond this point to prevent really confusing the hell out of people who have no idea how this works, but just want a basic general understanding of the technology behind it.

What I really want people to understand is why one Bitcoin is currently worth over $7K and why black people need to seriously get caught up on this technology to where you could benefit big from it in the coming years.  Crytocurrency (Bitcoin and other coins) is an intangible asset that rewards people for participating in the creation, maintenance & growth of the blockchain.  These people are called miners.  These people allow for their computers to be used as nodes for creating the actual blockchain which allows for you to engage in peer-to-peer transactions which also allows for you to remove the middleman & their fees out of the process.  They also allow for your data to be distributed without the need for a centralized distribution point that is owned by one entity.

People who are not miners invest in the cryptocurrencies that are being “mined” by these miners.  A miner is a person who basically uses their computer to solve complicated mathematical problems.  Each time they successfully solve a problem a coin is created.  These miners are paid in partials of coins that is based on a variety of factors.  The remaining partials are then placed on the market for non-miners to invest in or use as actual forms of currency to purchase items.  Matter of fact, Japan just recently recognized Bitcoin as a legit form of currency to purchase items.  There are even ATM machines in various countries (too include the US) that allow you to “withdraw” Bitcoin instead of dollars.

But here is what I really want black people to grasp & understand as this whole discussion relates to cryptocurrency and the blockchain technology…Black people need to think of this technology like it is the Internet 3.0.

When the internet first came out for general public use 20 something years ago, the internet was basically a place to visit websites and read stuff.  That was it.  The only people who were really making money off of the internet during that time were ISP’s (internet service providers) & people who registered domain names for the sole purpose of holding them and selling them to people later on (think if you bought Walmart_dot_com back then how much Walmart would have paid you to get that domain name).  You had a few other ways of making money here & there (the Dotcom Boom) but that was pretty much it.  Internet 2.0 ushered in the era of e-commerce & social media (where we presently are now).  As crazy as this may sound, a lot of people honestly didn’t think e-commerce or social media would take off.  A lot of people couldn’t fathom the idea of people buying products online or spending more time on a social media platform communicating to people than they did in real life.  But in the year 2017, look at how we communicate & engage in commerce now.  So now think of blockchain & cryptocurrency as internet 3.0 to where the internet will begin moving away from big companies like Google, Facebook, & banks controlling or having some influence on every aspect of everything that takes place on the internet.  The blockchain will not put these people out of business, but the blockchain will give people more power over how our data is being utilized on the internet.  This is all about ownership & control on the individual level versus relying on the big entities to do it for us.  Cryptocurrencies such as Bitcoin have proven that there is a real demand & shift taking place to where as this technology continues to grow & mature, a lot of potential money stands to be made.

Bit3....PNG

Cryptocurrencies function off of a technology called blockchain.  Blockchain essentially eliminates the single point of failure aspect by removing the storage of data on centralized servers owned by private/public entities.  The data on the blockchain whether it is financial transactions, social media activities etc are stored across a gigantic network of computers called nodes to where the information stored cannot be controlled by one entity or hacked causing severe problems due to single point of failure issues I described above.  The reason the data on the blockchain cannot be hacked is because the data resides on a distributed network is highly encrypted to where a hacker can’t just hack one single point on the blockchain, they would have to hack the entire blockchain essentially.  Also, the data residing in the blocks on the blockchain are constantly updated across the network to wherever you access the data on the network, the data will be the same.

Here’s an example of what I mean by the data being centralized & decentralized in addition to the data being “mirrored” across the network no matter where you are to access the data.

Back in the day on Microsoft Word a person would type a paper, save the paper, & then email the paper to somebody to make corrections.  The person whom the email was sent to would get the email, open MS Word, make corrections, email you the paper back, then you would make necessary changes to the paper.  This entire process was centralized to where only one party had control of the paper at a time and the other party couldn’t get access to the paper until the owning party relinquished control.

Now, we have Google Docs (basically cloud computing) to where multiple parties at the same time can access, view and/or edit the paper in real time without waiting for one party to relinquish control of the paper (decentralized).

How this ties into the data floating around on the blockchain is…you’re not inputting your data into just one entity and entrusting that one entity to do the right thing as far as processing and safeguarding your data (for a fee in most instances).  You are now putting your data across a distributed network to where copies of that data will exist in multiple places at once.  So, if I upload some data from my home computer on the blockchain, my data will be added to the blockchain which will then be replicated across the network and not just sitting on one server that I would need to gain access to (think…logging into Facebook, you’re essentially logging into a site that stores your updates on their servers).  In a decentralized scenario, in theory, I would be able to log into my gmail account and still be able to access my data on Facebook.

Now some of you are probably wondering how this data is protected if this data is “free floating” on the blockchain versus the data (supposedly) being protected on some entity’s servers.

Simple, the data is encrypted (it’s encrypted on these entity’s servers too by the way…or at least should be).  But the encryption on the blockchain isn’t CENTRALIZED, meaning you are not relying solely on that one entity to encrypt & protect your data.

So how the encryption works is fairly simple for the most part.  Blockchain works off of an encryption practice called asymmetric encryption.  Asymmetric encryption involves the use of a public & private key to gain access to data.  Any data you put on the blockchain is encrypted to where the data looks like a bunch of meaningless letters, numbers & symbols that would literally take decades (if not longer) to decipher.

A private & public key can be thought of this way…

You maintain a mailbox at a UPS store.  UPS gives you 2 keys:  one to access the UPS store and the other key to access your personal mailbox within the store.  The UPS store key that you possess is the same key that some random person with a mailbox at the UPS store would possess as well, but that random person does not have your private key (or shouldn’t) to access your personal mailbox.

So on the blockchain, what tends to happen is, people constantly give out their public key to pretty much anybody who wants it for the purpose of exchanging data (and/or “money”…cryptocurrency).  But to unlock or gain access to the item in the transaction, a person would need your private key to do so.  So basically what takes place is, Person A wants to send an item to Person B.  Person A sends an item to Person B using Person B’s PUBLIC KEY.  This item is encrypted within Person B’s PUBLIC KEY.  Person B receives the item from Person A.  Person B now uses his PRIVATE KEY to decrypt his PUBLIC KEY to get access to the item Person A sent him.  If anybody were to intercept Person B’s PUBLIC KEY, they would NOT be able to access the data encrypted on that public key without having access to Person B’s PRIVATE KEY.  Person A can’t even get access to the data he sent Person B because Person A used Person B’s PUBLIC KEY to encrypt the data and ONLY Person B’s PRIVATE KEY can decrypt Person B’s PUBLIC KEY.  Got it?  Good.

Now, all of these transactions are continually updated across the blockchain network in a matter of minutes to where each transaction is essentially “etched in stone” to where a new “block” is created in the overall network which is then duplicated everywhere on the network (think of my Google Docs analogy).  This is important because in order to hack the system, every other block that was created prior to the new block would have to be hacked as well which would require computing power that probably doesn’t exist to even make it worth somebody’s time & effort to attempt.  You can’t just hack one block, all the blocks are connected which mean you would have to hack ALL OF THE BLOCKS.  Also, you can’t delete data on the block once the data is recorded.  Now for the sake of this blog article, I’m choosing not get too technical beyond this point to prevent really confusing the hell out of people who have no idea how this works, but just want a basic general understanding of the technology behind it.

Cryptocurrency..

What I really want people to understand is why one Bitcoin is currently worth over $7K and why black people need to seriously get caught up on this technology to where you could benefit big from it in the coming years.  Crytocurrency (Bitcoin and other coins) is an intangible asset that rewards people for participating in the creation, maintenance & growth of the blockchain.  These people are called miners.  These people allow for their computers to be used as nodes for creating the actual blockchain which allows for you to engage in peer-to-peer transactions which also allows for you to remove the middleman & their fees out of the process.  They also allow for your data to be distributed without the need for a centralized distribution point that is owned by one entity.

People who are not miners invest in the cryptocurrencies that are being “mined” by these miners.  A miner is a person who basically uses their computer to solve complicated mathematical problems.  Each time they successfully solve a problem a coin is created.  These miners are paid in partials of coins that is based on a variety of factors.  The remaining partials are then placed on the market for non-miners to invest in or use as actual forms of currency to purchase items.  Matter of fact, Japan just recently recognized Bitcoin as a legit form of currency to purchase items.  There are even ATM machines in various countries (too include the US) that allow you to “withdraw” Bitcoin instead of dollars.

But here is what I really want black people to grasp & understand as this whole discussion relates to cryptocurrency and the blockchain technology…Black people need to think of this technology like it is the Internet 3.0.

When the internet first came out for general public use 20 something years ago, the internet was basically a place to visit websites and read stuff.  That was it.  The only people who were really making money off of the internet during that time were ISP’s (internet service providers) & people who registered domain names for the sole purpose of holding them and selling them to people later on (think if you bought Walmart_dot_com back then how much Walmart would have paid you to get that domain name).  You had a few other ways of making money here & there (the Dotcom Boom) but that was pretty much it.  Internet 2.0 ushered in the era of e-commerce & social media (where we presently are now).  As crazy as this may sound, a lot of people honestly didn’t think e-commerce or social media would take off.  A lot of people couldn’t fathom the idea of people buying products online or spending more time on a social media platform communicating to people than they did in real life.  But in the year 2017, look at how we communicate & engage in commerce now.  So now think of blockchain & cryptocurrency as internet 3.0 to where the internet will begin moving away from big companies like Google, Facebook, & banks controlling or having some influence on every aspect of everything that takes place on the internet.  The blockchain will not put these people out of business, but the blockchain will give people more power over how our data is being utilized on the internet.  This is all about ownership & control on the individual level versus relying on the big entities to do it for us.  Cryptocurrencies such as Bitcoin have proven that there is a real demand & shift taking place to where as this technology continues to grow & mature, a lot of potential money stands to be made.

Article by Gee Lowery

What if I told You…….

What if ...Matrix...

Degenerate Sexual Practices of Europeans(Sexbots and Animals)

Sexbots1...

Dogs1..

The sexual degeneracy of Europeans goes way back to Greek and Roman times. I’ve done a lot of research on what Europeans did back then.  And through white supremacy they want all races to see the world through their eyes.  Homosexuality,lesbianism,pedophilia and bestiality are nothing new to their culture.  But theses are not the ways of African people.  Black people should reject all of these sick practices.  They are anti-life and go against nature.  It is disrespectful to your ancestors to engage in any of this depraved behavior. We are totally different than them.  Their ways are not our ways. Make sure your children know this. We are hue-mans and they are mankind(kind of man) That’s why over the years they have subtly been pushing these sexual practices in the media.  I have seen these practices in television sitcoms,commercials and motion picture films.  Also many of these white social scientists are pushing the idea of transhumanism. Basically transhumanism is the belief that mankind has reached the limits of evolution.  And the only way mankind can keep evolving is through science and technology.  You see many Europeans believe they evolved from monkeys and apes.  Most black people know this is a silly theory.  Most black people in a Creator or a higher spiritual Being.  We have the power of melanin and dominant genetics on our side.  Our melanin gives us the power to reach a higher spiritual level than Europeans.  Since they have a lack of melanin they can not ascend to a higher realm of consciousness. White people have reached their physical and mental limitations.  Which is why they keep searching for the next big thing to turn them on sexually. Africans believe in working with mother nature and the ecosystem.  Europeans see nature has something to be controlled or dominated.  But this is why they are building sexbots. What type of man or woman would have sex with a robot?  They would have to be a very lonely and pitiful person. This is why there is such a disconnect to hue-manity.  All this obsession with cellphones,iPads,iPods and computers has gotten way out of hand.  All I know is that anyone that attempts to have  sex with an animal or robot is very sick!  I say attempt because this behavior is anti-sexual.   Sex is between a man and woman. There is NO other definition of sex.  Don’t let these white social scientists mislead you into thinking otherwise. This is abnormal,perverted,immoral and deviant!  Nothing but pure debauchery! These are very sexually confused people. But this is the type of depraved and disgusting practices these Europeans are pushing on the masses.  Be sure to check out the two videos(above) and let me know what you think.   But stay vigilant and always be aware of this wicked demonic  system.

Black Panther Mythos- African Science,Technology & Mathematics

Panther1..

The story of Marvel comic’s Black Panther is an interesting fictional story which weaves together and draws on multiple fascinating factual elements found throughout various African cultures throughout time.  Perhaps the most important of the facts and themes in the story of the Black Panther is the significance of Metallurgy and Blacksmiths in African culture, spiritual systems, and technological development.

The Story of Black Panther and Wakanda
10,000 years ago a meteorite comprised of a metal called Vibranium crashed on earth and landed in the country of Wakanda in Northeastern Africa.  The crashed Vibranium created a mountain, or mound, which was discovered by the Panther Tribe in Wakanda who became the guardians of the Vibranium moundBast and Sekhmet are two of the feline deities of the Panther Tribe, and the King and protector of the Panther tribe is a warrior who holds the title of “The Black Panther”.  The Black Panther also has a group of female warriors who serve as his personal bodyguards called the Dora Milaje.  As guardians of the Vibranium metal mound, the Panther tribe became skilled blacksmiths and metallurgist in antiquity which translated into a highly technologically advanced and economically stable African country in the present day, where one of the major resources of the country of Wakanda is Vibranium.  Because of their high level of advanced technology, Wakanda has never been conquered, colonized, or enslaved.

Panther2..

Metal from the Sky 
The earliest known iron artifacts are 9 small beads, dated to 3200 BC, from Ancient Egypt in Northeast Africa, identified as meteoric iron shaped by careful hammering.  This evidence shows the Ancient Africans in Egypt were the first to use Iron prior to the official start of the “Iron Age” in 1300 BC.  The Ancient Egyptians called this Meteoric Iron “BAA EN PET” meaning “iron of the sky” or “metal of Heaven.”  The Ancient Egyptian’s word for the Blacksmith’s Forge was “Khepesh”, and that same word was a homonym to the word for a scimitar sword shaped metal weapon casted in the forge, as well as to the constellation of the Great Bear – Ursa Major.

The Iron King:
The 7th Pharaoh of the Ancient Egypt’s 1st dynasty was named Anedjib Mer-ba-pen (spelled various in English as Merbiape, Meribiap, Merbapen, Miebîdós, and Mibampes) which literally meant “Lover of Iron”. Anedjib ruled around 2930 BC.

African Blacksmiths
Ancient Africans in Egypt who were Blacksmiths and Metallurgists had knowledge of several different types of Metals and Metal alloys as attested to in the Medu Neter from Ancient Egypt:

  • Meteoric Iron    – baa en pet
  • Iron        – benpi
  • Gold        – Nub
  • Silver        – hetch
  • Copper        – hemt
  • Tin, Lead    – anak
  • Electrum     – nub waas
  • Bronze        – ut

The Medu Neter word for “Blacksmith” was Mesen (singular) and Mesniu (plural – the 7 mythic blacksmiths of Heru who made weapons).  The Medu neter word Mesen may be related to the English word “Mason“.  The Mesniu are also called the Heru-shemsu  (the blacksmiths of Edfu).  Additionally, the word Nebi in Medu Neter meant “to smlet, to work in metals” and was also a homonym to the word Nebi or Nebibi meaning “Leopard or Panther”.

The Blacksmith deity in Ancient Egypt was Ptah, who represented the Primordial Mound, and he had two wives Sekhmet (Southern Egypt) and Bast (Northern Egypt) represented by Felines.  The Ancient Egyptian Blacksmith deity Ptah’s son by Bast was the Lion-Headed deity of war named Maahes, who was called Apedemak in Nubia and Meroe.  The “Sem” priests of Ptah (who were more scientists than “priests”) were also Blacksmiths and Metallurgists who wore Leopard Skins.  The wearing of Leopard Skins was also a custom of the Nubians of Meroe, and the Nubian Kingdom of Meroe was huge Iron smelting capital.  It is important to know that Panthers are Melanistic Leopards.

Overtime, various Leopard “Secret Societies” who were also Blacksmiths, spring up across the African Continent:

  • Ekpe – Nigeria (uses the Nsibidi script)
  • Abakuá – Cameroon and Nigeria
  • Anyoto Aniota – Sierra Leone, Liberia, Côte d’Ivoire, and Nigeria
  • Leopard Society of Bassaland – Liberia (uses the Vai script)

In the books “African Jungle Doctor” by Werner Junge and “Jungle Pilot in Liberia” by Abe Guenter, an experience in Bassaland (Liberia) during the early to mid 1900s is described where reports were made about “Leopard Men” and people who would dress in Leopard skins and fashion and wear claws of steel with which they would use as weapons.  Brass Metal rings called ‘Dwin’, ‘tien’ or ‘nitien’, meaning “water spirits”, or ‘Gods of water’ were forged by the blacksmiths of the tribes of Bassaland and left as offerings to the “Brass God” of the Leopard Men.  The Kru and Grebo people believe these objects are living creatures that can be found in creeks, rivers and lagoons.  These objects have shared interpretive meanings with the Dikenga from the African Congo, Thor’s spinning Hammer Fylfot (also called Swastika), and Ptah’s Hammer (the Djed, Ankh, and Waas).

Panther3..

Similar to the “Dwin – water spirits,” the Mande, Bamana, and Dogon Blacksmiths of Mali tell stories of water Spirits called the Nommo who are Blacksmiths of a Metal from the star Sirius called SAGALA.  The Mande Blacksmiths control a force called Nyama, which is synonymous with Nyame of the Akan people.  An important Blacksmith ancestor in Akan culture is Nana Adade Kofi.  The Mande Blacksmiths of Mali form Castes called Nummu which is phonetically similar to the Nommo water spirits spoken of by the Dogon Blacksmiths.  One of the Nommo the Dogon Blacksmiths speak of is named OGO, who is synonymous with the Orisha Blacksmith OGUN in Nigeria.  The Blacksmith culture in Nigeria has existed since 1000 BC with the NOK culture.  The Blacksmith Orisha Ogun is called GU in the Dahomey culture of Benin.  The Blacksmith Ogun, OGO, or GU is said to be married to the warrior Orisha OYA.  The 19th century Kingdom of Dahomey (present day Benin) who were practitioners of the system of Vodun which ackknowledged Oya, developed an all-female military regiment who were an embodiment of the warrior Orisha OYA.  This group of African Warrior Women had various names including N’Nonmiton or Mino (meaning “our mothers”), Ahosi (meaning King’s wives), and Gbeto (meaning “Elephant Hunters”).  European narratives referred to these women soldiers as Amazons.  This “warrior Queen” characteristic found amongst the women of the  Dahomey Kingdom was also found amongst the Kandakes, or Candaces, who ruled the Nubian Iron smelting city of Meroe (800 BC – 350 CE).

The Role of the Blacksmith has been central and integral to African Culture, Society, Spirituality, and Technology throught the ages, and the Leopard, Panther, or Feline has been one of the Symbols associated with African Blacksmiths since Ancient times.
Article by African Creation Energy