Paper 91 The Evolution of Prayer – The Urantia Book

The Urantia Book

Paper 91

The Evolution of Prayer

(994.1) 91:0.1 PRAYER, as an agency of religion, evolved from previous nonreligious monologue and dialogue expressions. With the attainment of self-consciousness by primitive man there occurred the inevitable corollary of other-consciousness, the dual potential of social response and God recognition.

(994.2) 91:0.2 The earliest prayer forms were not addressed to Deity. These expressions were much like what you would say to a friend as you entered upon some important undertaking, “Wish me luck.” Primitive man was enslaved to magic; luck, good and bad, entered into all the affairs of life. At first, these luck petitions were monologues — just a kind of thinking out loud by the magic server. Next, these believers in luck would enlist the support of their friends and families, and presently some form of ceremony would be performed which included the whole clan or tribe.

(994.3) 91:0.3 When the concepts of ghosts and spirits evolved, these petitions became superhuman in address, and with the consciousness of gods, such expressions attained to the levels of genuine prayer. As an illustration of this, among certain Australian tribes primitive religious prayers antedated their belief in spirits and superhuman personalities.

(994.4) 91:0.4 The Toda tribe of India now observes this practice of praying to no one in particular, just as did the early peoples before the times of religious consciousness. Only, among the Todas, this represents a regression of their degenerating religion to this primitive level. The present-day rituals of the dairymen priests of the Todas do not represent a religious ceremony since these impersonal prayers do not contribute anything to the conservation or enhancement of any social, moral, or spiritual values.

(994.5) 91:0.5 Prereligious praying was part of the mana practices of the Melanesians, the oudah beliefs of the African Pygmies, and the manitou superstitions of the North American Indians. The Baganda tribes of Africa have only recently emerged from the mana level of prayer. In this early evolutionary confusion men pray to gods — local and national — to fetishes, amulets, ghosts, rulers, and to ordinary people.

1. Primitive Prayer

(994.6) 91:1.1 The function of early evolutionary religion is to conserve and augment the essential social, moral, and spiritual values which are slowly taking form. This mission of religion is not consciously observed by mankind, but it is chiefly effected by the function of prayer. The practice of prayer represents the unintended, but nonetheless personal and collective, effort of any group to secure (to actualize) this conservation of higher values. But for the safeguarding of prayer, all holy days would speedily revert to the status of mere holidays.

(995.1) 91:1.2 Religion and its agencies, the chief of which is prayer, are allied only with those values which have general social recognition, group approval. Therefore, when primitive man attempted to gratify his baser emotions or to achieve unmitigated selfish ambitions, he was deprived of the consolation of religion and the assistance of prayer. If the individual sought to accomplish anything antisocial, he was obliged to seek the aid of nonreligious magic, resort to sorcerers, and thus be deprived of the assistance of prayer. Prayer, therefore, very early became a mighty promoter of social evolution, moral progress, and spiritual attainment.

(995.2) 91:1.3 But the primitive mind was neither logical nor consistent. Early men did not perceive that material things were not the province of prayer. These simple-minded souls reasoned that food, shelter, rain, game, and other material goods enhanced the social welfare, and therefore they began to pray for these physical blessings. While this constituted a perversion of prayer, it encouraged the effort to realize these material objectives by social and ethical actions. Such a prostitution of prayer, while debasing the spiritual values of a people, nevertheless directly elevated their economic, social, and ethical mores.

(995.3) 91:1.4 Prayer is only monologuous in the most primitive type of mind. It early becomes a dialogue and rapidly expands to the level of group worship. Prayer signifies that the premagical incantations of primitive religion have evolved to that level where the human mind recognizes the reality of beneficent powers or beings who are able to enhance social values and to augment moral ideals, and further, that these influences are superhuman and distinct from the ego of the self-conscious human and his fellow mortals. True prayer does not, therefore, appear until the agency of religious ministry is visualized as personal.

(995.4) 91:1.5 Prayer is little associated with animism, but such beliefs may exist alongside emerging religious sentiments. Many times, religion and animism have had entirely separate origins.

(995.5) 91:1.6 With those mortals who have not been delivered from the primitive bondage of fear, there is a real danger that all prayer may lead to a morbid sense of sin, unjustified convictions of guilt, real or fancied. But in modern times it is not likely that many will spend sufficient time at prayer to lead to this harmful brooding over their unworthiness or sinfulness. The dangers attendant upon the distortion and perversion of prayer consist in ignorance, superstition, crystallization, devitalization, materialism, and fanaticism.

2. Evolving Prayer

(995.6) 91:2.1 The first prayers were merely verbalized wishes, the expression of sincere desires. Prayer next became a technique of achieving spirit co-operation. And then it attained to the higher function of assisting religion in the conservation of all worth-while values.

(995.7) 91:2.2 Both prayer and magic arose as a result of man’s adjustive reactions to Urantian environment. But aside from this generalized relationship, they have little in common. Prayer has always indicated positive action by the praying ego; it has been always psychic and sometimes spiritual. Magic has usually signified an attempt to manipulate reality without affecting the ego of the manipulator, the practitioner of magic. Despite their independent origins, magic and prayer often have been interrelated in their later stages of development. Magic has sometimes ascended by goal elevation from formulas through rituals and incantations to the threshold of true prayer. Prayer has sometimes become so materialistic that it has degenerated into a pseudomagical technique of avoiding the expenditure of that effort which is requisite for the solution of Urantian problems.

(996.1) 91:2.3 When man learned that prayer could not coerce the gods, then it became more of a petition, favor seeking. But the truest prayer is in reality a communion between man and his Maker.

(996.2) 91:2.4 The appearance of the sacrifice idea in any religion unfailingly detracts from the higher efficacy of true prayer in that men seek to substitute the offerings of material possessions for the offering of their own consecrated wills to the doing of the will of God.

(996.3) 91:2.5 When religion is divested of a personal God, its prayers translate to the levels of theology and philosophy. When the highest God concept of a religion is that of an impersonal Deity, such as in pantheistic idealism, although affording the basis for certain forms of mystic communion, it proves fatal to the potency of true prayer, which always stands for man’s communion with a personal and superior being.

(996.4) 91:2.6 During the earlier times of racial evolution and even at the present time, in the day-by-day experience of the average mortal, prayer is very much a phenomenon of man’s intercourse with his own subconscious. But there is also a domain of prayer wherein the intellectually alert and spiritually progressing individual attains more or less contact with the superconscious levels of the human mind, the domain of the indwelling Thought Adjuster. In addition, there is a definite spiritual phase of true prayer which concerns its reception and recognition by the spiritual forces of the universe, and which is entirely distinct from all human and intellectual association.

(996.5) 91:2.7 Prayer contributes greatly to the development of the religious sentiment of an evolving human mind. It is a mighty influence working to prevent isolation of personality.

(996.6) 91:2.8 Prayer represents one technique associated with the natural religions of racial evolution which also forms a part of the experiential values of the higher religions of ethical excellence, the religions of revelation.

3. Prayer and the Alter Ego

(996.7) 91:3.1 Children, when first learning to make use of language, are prone to think out loud, to express their thoughts in words, even if no one is present to hear them. With the dawn of creative imagination they evince a tendency to converse with imaginary companions. In this way a budding ego seeks to hold communion with a fictitious alter ego. By this technique the child early learns to convert his monologue conversations into pseudo dialogues in which this alter ego makes replies to his verbal thinking and wish expression. Very much of an adult’s thinking is mentally carried on in conversational form.

(996.8) 91:3.2 The early and primitive form of prayer was much like the semimagical recitations of the present-day Toda tribe, prayers that were not addressed to anyone in particular. But such techniques of praying tend to evolve into the dialogue type of communication by the emergence of the idea of an alter ego. In time the alter-ego concept is exalted to a superior status of divine dignity, and prayer as an agency of religion has appeared. Through many phases and during long ages this primitive type of praying is destined to evolve before attaining the level of intelligent and truly ethical prayer.

(997.1) 91:3.3 As it is conceived by successive generations of praying mortals, the alter ego evolves up through ghosts, fetishes, and spirits to polytheistic gods, and eventually to the One God, a divine being embodying the highest ideals and the loftiest aspirations of the praying ego. And thus does prayer function as the most potent agency of religion in the conservation of the highest values and ideals of those who pray. From the moment of the conceiving of an alter ego to the appearance of the concept of a divine and heavenly Father, prayer is always a socializing, moralizing, and spiritualizing practice.

(997.2) 91:3.4 The simple prayer of faith evidences a mighty evolution in human experience whereby the ancient conversations with the fictitious symbol of the alter ego of primitive religion have become exalted to the level of communion with the spirit of the Infinite and to that of a bona fide consciousness of the reality of the eternal God and Paradise Father of all intelligent creation.

(997.3) 91:3.5 Aside from all that is superself in the experience of praying, it should be remembered that ethical prayer is a splendid way to elevate one’s ego and reinforce the self for better living and higher attainment. Prayer induces the human ego to look both ways for help: for material aid to the subconscious reservoir of mortal experience, for inspiration and guidance to the superconscious borders of the contact of the material with the spiritual, with the Mystery Monitor.

(997.4) 91:3.6 Prayer ever has been and ever will be a twofold human experience: a psychologic procedure interassociated with a spiritual technique. And these two functions of prayer can never be fully separated.

(997.5) 91:3.7 Enlightened prayer must recognize not only an external and personal God but also an internal and impersonal Divinity, the indwelling Adjuster. It is altogether fitting that man, when he prays, should strive to grasp the concept of the Universal Father on Paradise; but the more effective technique for most practical purposes will be to revert to the concept of a near-by alter ego, just as the primitive mind was wont to do, and then to recognize that the idea of this alter ego has evolved from a mere fiction to the truth of God’s indwelling mortal man in the factual presence of the Adjuster so that man can talk face to face, as it were, with a real and genuine and divine alter ego that indwells him and is the very presence and essence of the living God, the Universal Father.

4. Ethical Praying

(997.6) 91:4.1 No prayer can be ethical when the petitioner seeks for selfish advantage over his fellows. Selfish and materialistic praying is incompatible with the ethical religions which are predicated on unselfish and divine love. All such unethical praying reverts to the primitive levels of pseudo magic and is unworthy of advancing civilizations and enlightened religions. Selfish praying transgresses the spirit of all ethics founded on loving justice.

(997.7) 91:4.2 Prayer must never be so prostituted as to become a substitute for action. All ethical prayer is a stimulus to action and a guide to the progressive striving for idealistic goals of superself-attainment.

(998.1) 91:4.3 In all your praying be fair; do not expect God to show partiality, to love you more than his other children, your friends, neighbors, even enemies. But the prayer of the natural or evolved religions is not at first ethical, as it is in the later revealed religions. All praying, whether individual or communal, may be either egoistic or altruistic. That is, the prayer may be centered upon the self or upon others. When the prayer seeks nothing for the one who prays nor anything for his fellows, then such attitudes of the soul tend to the levels of true worship. Egoistic prayers involve confessions and petitions and often consist in requests for material favors. Prayer is somewhat more ethical when it deals with forgiveness and seeks wisdom for enhanced self-control.

(998.2) 91:4.4 While the nonselfish type of prayer is strengthening and comforting, materialistic praying is destined to bring disappointment and disillusionment as advancing scientific discoveries demonstrate that man lives in a physical universe of law and order. The childhood of an individual or a race is characterized by primitive, selfish, and materialistic praying. And, to a certain extent, all such petitions are efficacious in that they unvaryingly lead to those efforts and exertions which are contributory to achieving the answers to such prayers. The real prayer of faith always contributes to the augmentation of the technique of living, even if such petitions are not worthy of spiritual recognition. But the spiritually advanced person should exercise great caution in attempting to discourage the primitive or immature mind regarding such prayers.

(998.3) 91:4.5 Remember, even if prayer does not change God, it very often effects great and lasting changes in the one who prays in faith and confident expectation. Prayer has been the ancestor of much peace of mind, cheerfulness, calmness, courage, self-mastery, and fair-mindedness in the men and women of the evolving races.

5. Social Repercussions of Prayer

(998.4) 91:5.1 In ancestor worship, prayer leads to the cultivation of ancestral ideals. But prayer, as a feature of Deity worship, transcends all other such practices since it leads to the cultivation of divine ideals. As the concept of the alter ego of prayer becomes supreme and divine, so are man’s ideals accordingly elevated from mere human toward supernal and divine levels, and the result of all such praying is the enhancement of human character and the profound unification of human personality.

(998.5) 91:5.2 But prayer need not always be individual. Group or congregational praying is very effective in that it is highly socializing in its repercussions. When a group engages in community prayer for moral enhancement and spiritual uplift, such devotions are reactive upon the individuals composing the group; they are all made better because of participation. Even a whole city or an entire nation can be helped by such prayer devotions. Confession, repentance, and prayer have led individuals, cities, nations, and whole races to mighty efforts of reform and courageous deeds of valorous achievement.

(998.6) 91:5.3 If you truly desire to overcome the habit of criticizing some friend, the quickest and surest way of achieving such a change of attitude is to establish the habit of praying for that person every day of your life. But the social repercussions of such prayers are dependent largely on two conditions:

(998.7) 91:5.4 1. The person who is prayed for should know that he is being prayed for.
(999.1) 91:5.5 2. The person who prays should come into intimate social contact with the person for whom he is praying.

(999.2) 91:5.6 Prayer is the technique whereby, sooner or later, every religion becomes institutionalized. And in time prayer becomes associated with numerous secondary agencies, some helpful, others decidedly deleterious, such as priests, holy books, worship rituals, and ceremonials.

(999.3) 91:5.7 But the minds of greater spiritual illumination should be patient with, and tolerant of, those less endowed intellects that crave symbolism for the mobilization of their feeble spiritual insight. The strong must not look with disdain upon the weak. Those who are God-conscious without symbolism must not deny the grace-ministry of the symbol to those who find it difficult to worship Deity and to revere truth, beauty, and goodness without form and ritual. In prayerful worship, most mortals envision some symbol of the object-goal of their devotions.

6. The Province of Prayer

(999.4) 91:6.1 Prayer, unless in liaison with the will and actions of the personal spiritual forces and material supervisors of a realm, can have no direct effect upon one’s physical environment. While there is a very definite limit to the province of the petitions of prayer, such limits do not equally apply to the faith of those who pray.

(999.5) 91:6.2 Prayer is not a technique for curing real and organic diseases, but it has contributed enormously to the enjoyment of abundant health and to the cure of numerous mental, emotional, and nervous ailments. And even in actual bacterial disease, prayer has many times added to the efficacy of other remedial procedures. Prayer has turned many an irritable and complaining invalid into a paragon of patience and made him an inspiration to all other human sufferers.

(999.6) 91:6.3 No matter how difficult it may be to reconcile the scientific doubtings regarding the efficacy of prayer with the ever-present urge to seek help and guidance from divine sources, never forget that the sincere prayer of faith is a mighty force for the promotion of personal happiness, individual self-control, social harmony, moral progress, and spiritual attainment.

(999.7) 91:6.4 Prayer, even as a purely human practice, a dialogue with one’s alter ego, constitutes a technique of the most efficient approach to the realization of those reserve powers of human nature which are stored and conserved in the unconscious realms of the human mind. Prayer is a sound psychologic practice, aside from its religious implications and its spiritual significance. It is a fact of human experience that most persons, if sufficiently hard pressed, will pray in some way to some source of help.

(999.8) 91:6.5 Do not be so slothful as to ask God to solve your difficulties, but never hesitate to ask him for wisdom and spiritual strength to guide and sustain you while you yourself resolutely and courageously attack the problems at hand.

(999.9) 91:6.6 Prayer has been an indispensable factor in the progress and preservation of religious civilization, and it still has mighty contributions to make to the further enhancement and spiritualization of society if those who pray will only do so in the light of scientific facts, philosophic wisdom, intellectual sincerity, and spiritual faith. Pray as Jesus taught his disciples — honestly, unselfishly, with fairness, and without doubting.

(1000.1) 91:6.7 But the efficacy of prayer in the personal spiritual experience of the one who prays is in no way dependent on such a worshiper’s intellectual understanding, philosophic acumen, social level, cultural status, or other mortal acquirements. The psychic and spiritual concomitants of the prayer of faith are immediate, personal, and experiential. There is no other technique whereby every man, regardless of all other mortal accomplishments, can so effectively and immediately approach the threshold of that realm wherein he can communicate with his Maker, where the creature contacts with the reality of the Creator, with the indwelling Thought Adjuster.

7. Mysticism, Ecstasy, and Inspiration

(1000.2) 91:7.1 Mysticism, as the technique of the cultivation of the consciousness of the presence of God, is altogether praiseworthy, but when such practices lead to social isolation and culminate in religious fanaticism, they are all but reprehensible. Altogether too frequently that which the overwrought mystic evaluates as divine inspiration is the uprisings of his own deep mind. The contact of the mortal mind with its indwelling Adjuster, while often favored by devoted meditation, is more frequently facilitated by wholehearted and loving service in unselfish ministry to one’s fellow creatures.

(1000.3) 91:7.2 The great religious teachers and the prophets of past ages were not extreme mystics. They were God-knowing men and women who best served their God by unselfish ministry to their fellow mortals. Jesus often took his apostles away by themselves for short periods to engage in meditation and prayer, but for the most part he kept them in service-contact with the multitudes. The soul of man requires spiritual exercise as well as spiritual nourishment.

(1000.4) 91:7.3 Religious ecstasy is permissible when resulting from sane antecedents, but such experiences are more often the outgrowth of purely emotional influences than a manifestation of deep spiritual character. Religious persons must not regard every vivid psychologic presentiment and every intense emotional experience as a divine revelation or a spiritual communication. Genuine spiritual ecstasy is usually associated with great outward calmness and almost perfect emotional control. But true prophetic vision is a superpsychologic presentiment. Such visitations are not pseudo hallucinations, neither are they trancelike ecstasies.

(1000.5) 91:7.4 The human mind may perform in response to so-called inspiration when it is sensitive either to the uprisings of the subconscious or to the stimulus of the superconscious. In either case it appears to the individual that such augmentations of the content of consciousness are more or less foreign. Unrestrained mystical enthusiasm and rampant religious ecstasy are not the credentials of inspiration, supposedly divine credentials.

(1000.6) 91:7.5 The practical test of all these strange religious experiences of mysticism, ecstasy, and inspiration is to observe whether these phenomena cause an individual:

(1000.7) 91:7.6 1. To enjoy better and more complete physical health.
(1000.8) 91:7.7 2. To function more efficiently and practically in his mental life.
(1000.9) 91:7.8 3. More fully and joyfully to socialize his religious experience.
(1000.10) 91:7.9 4. More completely to spiritualize his day-by-day living while faithfully discharging the commonplace duties of routine mortal existence.
(1001.1) 91:7.10 5. To enhance his love for, and appreciation of, truth, beauty, and goodness.
(1001.2) 91:7.11 6. To conserve currently recognized social, moral, ethical, and spiritual values.
(1001.3) 91:7.12 7. To increase his spiritual insight — God-consciousness.

(1001.4) 91:7.13 But prayer has no real association with these exceptional religious experiences. When prayer becomes overmuch aesthetic, when it consists almost exclusively in beautiful and blissful contemplation of paradisiacal divinity, it loses much of its socializing influence and tends toward mysticism and the isolation of its devotees. There is a certain danger associated with overmuch private praying which is corrected and prevented by group praying, community devotions.

8. Praying as a Personal Experience

(1001.5) 91:8.1 There is a truly spontaneous aspect to prayer, for primitive man found himself praying long before he had any clear concept of a God. Early man was wont to pray in two diverse situations: When in dire need, he experienced the impulse to reach out for help; and when jubilant, he indulged the impulsive expression of joy.

(1001.6) 91:8.2 Prayer is not an evolution of magic; they each arose independently. Magic was an attempt to adjust Deity to conditions; prayer is the effort to adjust the personality to the will of Deity. True prayer is both moral and religious; magic is neither.

(1001.7) 91:8.3 Prayer may become an established custom; many pray because others do. Still others pray because they fear something direful may happen if they do not offer their regular supplications.

(1001.8) 91:8.4 To some individuals prayer is the calm expression of gratitude; to others, a group expression of praise, social devotions; sometimes it is the imitation of another’s religion, while in true praying it is the sincere and trusting communication of the spiritual nature of the creature with the anywhere presence of the spirit of the Creator.

(1001.9) 91:8.5 Prayer may be a spontaneous expression of God-consciousness or a meaningless recitation of theologic formulas. It may be the ecstatic praise of a God-knowing soul or the slavish obeisance of a fear-ridden mortal. It is sometimes the pathetic expression of spiritual craving and sometimes the blatant shouting of pious phrases. Prayer may be joyous praise or a humble plea for forgiveness.

(1001.10) 91:8.6 Prayer may be the childlike plea for the impossible or the mature entreaty for moral growth and spiritual power. A petition may be for daily bread or may embody a wholehearted yearning to find God and to do his will. It may be a wholly selfish request or a true and magnificent gesture toward the realization of unselfish brotherhood.

(1001.11) 91:8.7 Prayer may be an angry cry for vengeance or a merciful intercession for one’s enemies. It may be the expression of a hope of changing God or the powerful technique of changing one’s self. It may be the cringing plea of a lost sinner before a supposedly stern Judge or the joyful expression of a liberated son of the living and merciful heavenly Father.

(1001.12) 91:8.8 Modern man is perplexed by the thought of talking things over with God in a purely personal way. Many have abandoned regular praying; they only pray when under unusual pressure — in emergencies. Man should be unafraid to talk to God, but only a spiritual child would undertake to persuade, or presume to change, God.

(1002.1) 91:8.9 But real praying does attain reality. Even when the air currents are ascending, no bird can soar except by outstretched wings. Prayer elevates man because it is a technique of progressing by the utilization of the ascending spiritual currents of the universe.

(1002.2) 91:8.10 Genuine prayer adds to spiritual growth, modifies attitudes, and yields that satisfaction which comes from communion with divinity. It is a spontaneous outburst of God-consciousness.

(1002.3) 91:8.11 God answers man’s prayer by giving him an increased revelation of truth, an enhanced appreciation of beauty, and an augmented concept of goodness. Prayer is a subjective gesture, but it contacts with mighty objective realities on the spiritual levels of human experience; it is a meaningful reach by the human for superhuman values. It is the most potent spiritual-growth stimulus.

(1002.4) 91:8.12 Words are irrelevant to prayer; they are merely the intellectual channel in which the river of spiritual supplication may chance to flow. The word value of a prayer is purely autosuggestive in private devotions and sociosuggestive in group devotions. God answers the soul’s attitude, not the words.

(1002.5) 91:8.13 Prayer is not a technique of escape from conflict but rather a stimulus to growth in the very face of conflict. Pray only for values, not things; for growth, not for gratification.

9. Conditions of Effective Prayer

(1002.6) 91:9.1 If you would engage in effective praying, you should bear in mind the laws of prevailing petitions:

(1002.7) 91:9.2 1. You must qualify as a potent prayer by sincerely and courageously facing the problems of universe reality. You must possess cosmic stamina.

(1002.8) 91:9.3 2. You must have honestly exhausted the human capacity for human adjustment. You must have been industrious.

(1002.9) 91:9.4 3. You must surrender every wish of mind and every craving of soul to the transforming embrace of spiritual growth. You must have experienced an enhancement of meanings and an elevation of values.

(1002.10) 91:9.5 4. You must make a wholehearted choice of the divine will. You must obliterate the dead center of indecision.

(1002.11) 91:9.6 5. You not only recognize the Father’s will and choose to do it, but you have effected an unqualified consecration, and a dynamic dedication, to the actual doing of the Father’s will.

(1002.12) 91:9.7 6. Your prayer will be directed exclusively for divine wisdom to solve the specific human problems encountered in the Paradise ascension — the attainment of divine perfection.

(1002.13) 91:9.8 7. And you must have faith — living faith.

(1002.14) 91:9.9 [Presented by the Chief of the Urantia Midwayers.]

Posted in Uncategorized | Tagged | Comments Off

Top US Commander Under Arrest For Refusing To Fire Nukes At Russia

Top US Commander Under Arrest For Refusing To Fire Nukes At Russia

clip_image001

Posted by EU Times on Mar 19th, 2015 // 30 Comments

A new report circulating in the Kremlin today prepared by the Foreign Intelligence Service (SVR) for the Ministry of Defense (MoD) states that President Barack Obama’s nuclear war communication commander has been arrested and relieved of her command after failing to transmit launch codes authorizing an atomic weapons first-strike attack upon the Federation in coordination with a similar “surprise” attack planned by the United Kingdom.

According to the SVR, US Navy Captain Heather E. Cole [photo 1st right] was the commander of the US Navy’s Strategic Communications Wing 1 located at Tinker Air Force Base in Oklahoma whose E-6B Mercury aircraft provide the communications links allowing President Obama and US Secretary of Defense Ashton Carter to directly contact the submarines, bombers and land-based missiles that comprise the United States strategic nuclear force.

On Monday, 16 March, this report states, Captain Cole received from the Pentagon a launch order authorizing a “limited” nuclear strike against the Federation, but which failed due to a critical Permissive Action Link (PAL) failure thus causing her to abort this planned attack.

As a PAL is a security device for nuclear weapons whose purpose is to prevent unauthorized arming or detonation of the nuclear weapons, SVR experts in this report explain, the critical failure in this instance was an added security measure ordered by the former US Secretary of Defense, Chuck Hagel, prior to his being forced out of office last month over his refusal to have any part in this attack against Russia.

This report further explains that Secretary Carter was not aware of Secretary Hagel’s PAL security changes thus allowing Captain Cole to abort this planned nuclear attack.

For her failure to communicate the launch authorization to US nuclear forces, this report continues, Captain Cole was arrested on Tuesday, 17 March, relieved of her command and then taken by armed guard to US Naval Air Station (NAS) Miramar in San Diego (California) where she remains incommunicado.

The SVR in their report on Captain Cole’s refusal to start World War III further states that her actions mirrors those of Soviet Naval Captain Vasili Arkhipov, who during the Cuban Missile Crisis, in 1962, also refused to obey orders to launch nuclear weapons against the United States.

Upon Captain Cole being arrested, a MoD appendix to this SVR report says, President Putin ordered the Federations strategic nuclear bomber forces to their “fail-safe” locations in the Arctic (the fastest air route to the US from Russia), an expansion of the Northern Fleet’s combat operations into the Norwegian Sea, and continued combat air operations against NATO forces on the northern border.

Important to note, and as we had stated in our 14 March report, Russia Warns “State Of War” Exists As UK Nukes Prepare First Strike, President Putin and the MoD had been made aware of the planned nuclear attack against the Federation weeks ago thus allowing the Federation to move its own nuclear forces to the NATO border.

Likewise, and as we had reported on 15 March, Obama Meets With Top Russian Spy, Warns He Can’t Stop War, neither President Putin or the MoD have any confidence that President Obama is even in control his military forces anymore, thus necessitating the Federations greatest defensive war moves since World War II, and as we reported on in our 17 March report, Moscow Bomb Shelters Begin To Fill As Russia Prepares For War.

And, perhaps, most appalling…as President Putin, after greeting over 100,000 cheering citizen-supporters in Red Square earlier today, meets with close aide to Chinese President Xi Jinping to update China on the Federations war preparations, there remains no evidence that the West, particularly the United States, are preparing their own people for the horrific catastrophe soon to come.

The fate of Captain Cole, however, is much more known as it will be exactly like Captain Arkhipov’s…a relegation to the dustbin of history as a failed officer, at best, or her early suicide/death to prevent her from telling what she knows.

Source

http://www.eutimes.net/2015/03/top-us-commander-under-arrest-for-refusing-to-fire-nukes-at-russia/

Posted in Uncategorized | Tagged | Comments Off

The Supreme Being & He/She is now the Personalized Sovereign of the Grand Universe

Birankai Langilea Meghanada Alvis Rai Tormey Omniterean Sovescia Meghaleah Christensen is the Supreme Being & He/She is now the Personalized Sovereign of the Grand Universe.

I am his First Officer & Assistant – I am the CEO of the Grand Universe.

Chris Dwaine Christensen – Majestone, Grand Universe CEO, Supreme Master Sovereign of the Local Universe of Nebadon,  Certified Sovereign Master Planetary Prince, 86 Star Supreme Ultimate Master Commander General, M8 Majestone Mobile Gun Systems Master Gunner, Command Chief Master Sergeant & Owner of the Urantia Universal Military, the Universal Police Force & the Urantia Planetary Government

Copyright ©2015 Chris Dwaine Christensen

Copyright ©2015 Christ Michael 611,121st

Copyright ©2015 Majestone

Posted in Uncategorized | Tagged | Comments Off

U.S. is Funding ISIS

ISIS Leader: We Are Being Funded By The United States

https://www.youtube.com/watch?v=01mnrPWIiiI

United States (Ran by Satanists) is being destroyed from the inside out.

http://urantiauniversalmilitary.com

Posted in Uncategorized | Tagged | Comments Off

TECHNOLOGIES AND APPLICATIONS BEING USED AGAINST AMERICAN TARGETED INDIVIDUALS

MERRY CHRISTMAS AMERICA 2013

FROM THE U.S. NAVY, SPECIAL OPERATIONS

DISCLOSURE ON TECHNOLOGIES AND APPLICATIONS BEING USED AGAINST

AMERICAN TARGETED INDIVIDUALS

First, all 315 million Americans are targeted individuals. They are in

an electro-magnetic concentration camp, under unbreakable electronic

mind control.

- There is a secret military-police structure that silently controls

much of America, especially in regards to current and future plans

regarding population culling and management. On the lowest level are

actual police and soldiers. As I was told, “everyone who carries a

holster and a badge is directly under our control.” It is all under

Northcom. Navy elements and private ‘black ops’ security firms are

used for much of it, especially the dirty work. It is all done by

neural frequency weapons/systems running on the now thoroughly

complete atmospheric topologies of HAARP, ELF waves etc. with nanobots

from chemtrails/aerosols in and around the subject(s). In the bigger

picture, Americans (and the global population) are being buried alive

in a frequency fence. Even the tiny handful of people who have had

exposure to mind control, for example insiders themselves, or most

targeted individuals, have no idea how fantastically advanced, subtle

and powerful the current system really is. It is beyond words. Anybody

can be taken over within seconds and be totally remote-controlled

without knowing it. It is beyond the capacity of those who haven’t

experienced this being done to themselves and others around them to

even comprehend this.

- All Americans are computers. It takes an average of approximately

five minutes to access any American and remote control them. The same

apparently applies to Europeans and likely (potentially) most of the

world. It can all be seen like a computer network where the human

(brain and every single cell of the body) is the computer, and the

mind (and entire biological system) is the software. A general

patch/update can be pushed down to everyone in a general or highly

granular targeted demographic. This could be a ‘patch’ to put you in

any emotional state, say, to suddenly ‘see the light’ and be a

proponent of any ideology, religious belief, have a certain

disposition towards certain other people or groups, anything. A patch

could be sent to everyone that fixes and prevents cancer – this

basically already exists. Likewise you could be given cancer or a

heart attack, stroke or otherwise killed instantly. You could be

knocked out while driving around a curve.

An aside: I was told by a handler one time that it’s not a health care

system we have but rather “wildlife management.”

- Many targeted individuals experience street theatre / gang-stalking.

They are ignorant of what is actually happening to them. They believe

hundreds of random strangers, or regular supernumeraries like the

mailman, around them every day, are secretly paid by the government or

other entities to mess with them. How it actually works is that live

operators monitor them remotely and simply control anyone around them.

Reference the scene in the movie Control Factor with the waitress.

Humans are taken over that easily.




Page 2

- Instantaneous communication with synthetic telepathy – how it works:

This also can apply to gang stalking applications. It’s actually

faster than instant. The operators, and possibly you mentally

depending how things are configured, exist in a time-space bubble

outside of our linear time. This gives the operators time to put

together any kind of information to send you. Quantum Jumping

(teleportation) used in ‘alien abductions’ works the same way. Via the

electromagnetic-nanotech topologies the subject can be in essence

ported to a lab, tested, fixed, brainwashed, raped, messed with, then

sent back in-tact as they were or altered and never know anything at

all happened unless the operators choose to leave them with a screen

memory. Clones of course can be made and used in conjunction with

this.

- The weather is almost TOTALLY controlled. It can be microcontrolled.

Lightning and thunder can be directed. Wind can be created

and blown on anyone, strong or a soft breeze. A voice can be put in

it. TI’s familiar with sensory type auditory communication can

understand this. Even sunlight and darkness in your room, believe it

or not. They can simulate shooting stars. They can generate sounds of

gunfire.

- Animals of course can be easily totally controlled. Cats, dogs etc.

can be used as spy devices but obviously any human can too without

knowing it. Birds can be commandeered and flown right over and around

you, peck on your window etc.

- Worst of all are the extreme evil science projects that are being

done by Navy and other military-industrial-medical-complex black ops

elements to de-soul the population and try and control the heavens.

Reference soul-catcher technology. Nobody would have believed the

Nazis were doing the things they were doing. Same principle.

- They’ve ripped off ineffable spiritual energies from various people

who are or were highly spiritual and can pump these cloned frequencies

into people in church services. Likewise they can totally kill

spirituality in naturally spiritual people. They can also of course

whisper messages into the minds (auditory channel) of anyone. They can

and WILL stop all organic, natural dreams in the entire population and

instead pump in synthetic dreams and nightmares.

- Anyone reading this can have their opinion of it totally changed to

think it’s all BS, whether they are currently under RNM or not.

Remember within 5 minutes anyone can be an ‘open access target’. Any

decision in business, government, finance etc. can be instantly or

slowly totally controlled and changed. Massive debts can be forgiven

and even forgotten about with the creditor walking away cheerful. Laws

of supply and demand (how are gold and silver now?) are meaningless if

and when need be. It’s all a matter of perspective, is it not? What an

amazing economy to say nothing of other global theatre!

- When we chat about participants in staged events like the Boston

Marathon, shootings etc we say ‘they didn’t know… there was something,

it was something… something happened but I can’t remember, they didn’t




Page 3

know’

- We have a term for a human who’s been made into a hybrid, altered,

robotoid like every single congressman/senator, the president etc etc…

We say they’re ‘Moo Goo Gai Pan’. If they only knew that they’re

immortal! Laboratory, human factory products now.

How does the world work in 2013?

MORE:

I should clarify that it takes 5 minutes to first identify and lock in

on a person’s location and then take them over. Everyone of course is

already stored in government databases and can easily be located and

tracked if they are of interest. Once an agency decides to check you

out then you can be instantly accessed from then on – by them and

affiliated groups. They can also use you as a spying/reporting

mechanism to automatically feed info from your own mind and what you

see around you and others back to them. They can then expand a

peoplenetwork for others like you (who you associate with) that may of

interest.

As I said, they can actually teleport you to a lab and do

intensive interrogations and studies as well over the course extended

time in another synthetic time-space dimension, take and use your DNA,

spiritual properties, use you for breeding, do surgeries on you to

enhance you or harm you etc. Obviously they can train you in anything,

brainwash you deeply and powerfully and use you for staged state-

sponsored terrorism, as an actor at the scene, as the perpetrator, and

of course coordinate and choreograph the entire event. They’ll do this

to cops and even other military-contractor personnel involved as well.

Select units/people get ‘super soldier’ moo-goo-gai-pan cybernetic

enhancements and are outfitted for remote medical treatments on the

spot via remotely delivered nano-biotechnology.

The entire country and pretty much world is now under this system.

Virtually the entire population is oblivious. Magnus Olsen is one of

the few outsiders who has a clue about this. Inside military/gov’t

personnel who are ‘in the program’ are sworn to secrecy and are

totally tracked. Most of the lower level personnel are probably under

Remote Neural Monitoring (RNM) for this reason so if they even have

serious thoughts about talking etc they can be identified as a threat

and prevented. That’s why you never hear about this from the inside.

As a civilian resource I have unusual freedom in this regard as I’m

not sworn to any oath, however nobody would ever believe me except for

insiders and some TI’s.

At some point, maybe now, one individual will be able to issue

commands instantly via their thoughts over the system to do x, y or z

to any other person at any time. You can use your imagination, they

could take them over or have them commandeered by another resource at

their base/office who takes them over and makes them do as they

want… business decision, money, sex, whatever. I am pretty sure my

main controllers either have this ability or close to it. They may

require some kind of small, portable security device, but that’s all.

Imagine the possibilities inside a casino, or controlling a football

player in the Superbowl or a UFC fighters muscles or brain, or a




Page 4

business competitor’s decisions. I was always afraid to even think

about it much. It’s a system of total subjugation and slavery over the

masses by those with this technology. I also forgot to mention

satellites are part of the overall networking hardware.

Brought to you by Don and four other U.S. Navy Special Operations

Officers.




Page 5

FROM THE U.S. NAVY, SPECIAL WARFARE OPERATIONS

DISCLOSURE ON CLASSIFIED OPERATIONS, TECHNOLOGIES AND APPLICATIONS

BEING USED AGAINST AMERICANS.

MIND CONTROL, TIME TRAVEL, TIMELINE ALTERATIONS, SOUL THEFT, PLUNDERING

THE HEAVENS – SPIRITUAL REALMS, GENOCIDE OF THE HUMAN SPECIES.

SECOND RELEASE (1-13-2014)

This document is being published per the instructions of Commanders of a Navy Special Warfare

Operations group. It expands further on the topics described in the title which were mentioned in

summary in an earlier document released on Christmas day 2013. All of this information is

published entirely at the direction of Don and Tim (real names), senior commanders of the Navy

Special Ops / SEAL (black ops) group which is conducting operations in the United States at this

time. Tim is in Marietta, GA and is a SEAL team lead commander.

INTRODUCTION which may be a helpful guide for the American public to comprehend the

platform of advanced technologies their government has and is using against them. Consider

skipping this section and going straight to Synthetic Dimensions. The below italicized text is

just a backdrop.

The author is not a Christian, however, the best way to introduce the topics to the public in a big-

picture way they can more easily comprehend is to provide Christian concepts regarding

“Lucifer” AKA the “Anti-Christ” and “Revelations” as a backdrop. If the Anti-Christ were

already here or on his way to power in the form of a human being; and if it were true there

already exists an evil network of government/military/industry complexes… could it not be that

Hell might be something that is completely built by and implemented by man himself? Could he

not be in a prison already which he has myopically built around himself?

The only theme I’ll suggest here is that the Devil is a lower-astral-plane deity who essentially

overlords humans as a type of plantation farm animal/slave. He, at best, surreptitiously meets

bare minimum compliance with cosmic law in letting – more like steering – humans into their own

demise, which will be total extinction with total harvesting of their most valuable properties, their

souls, with full rights of ownership going to him.

I use my own specific definition of the word “Luciferianism” to refer to the entire project being

carried out by the military-industrial-medical complex – the transhumanist project which can be

inferred in this document. Put another way, this ad-hoc definition of Luciferianism is man trying

to become “God” by killing off everything human and divine, and in the process, stealing the core

properties of human soul, spirit and mind and scientifically, fraudulently, trying to use them as

well as back-engineer them, unwittingly and ultimately for the benefit of the Devil, if you will.

The point in this summary introduction is just to a) provide a backdrop to help understand the big

picture on advanced subjects that at first glance will strike many readers as just science fiction –

they are not. b) understand the concepts of a living real and literal hell that fits with a common

Christian theme, and understand that the people running these black ops projects are

“Luciferians” despite what they may identify themselves as outwardly. They know what they do.

I will put the subject of Extraterrestrials to rest right now. There are real ET’s, interdimensional

beings, celestial beings and demons. Very few humans know anything about this. However,

Greys, Reptilians and Nordics as reported by 90 plus percent of “alien abductees” are totally fake.




Page 6

They exist only as holograms in-person (if even that) and most commonly, as screen memories, in

the mind of the military/government mind-control lab-rat abductee, victim. Moreover, these types

of fake “aliens” are more commonly appearing to regular targeted individuals. They’re simply

holograms used in the torture process to make the subject appear insane. Advanced new world

order technology does not come from aliens and it never has. The entire alien theme is a very well

crafted enigmatic hoax used as a cover story for NSA-based abduction and “human effects”

technology. Have higher intelligences played a hand in human sciences and events? Yes in my

opinion. If you are atheist or agnostic that’s fine, makes no difference. The point is there are no

real greys or reptilians working in government labs.

For clarification, in this document the terms “controller, handler, operator and agent” are

synonymous.




Page 7

- SYNTHETIC DIMENSIONS (Hell)

The secret military complex has created and uses what amounts to synthetic dimensions. They use

these in quantum jumping and in other operations. Refer to Don’s first document on this if you

need. What is a synthetic dimension? A man-made separate time-space bubble outside of our

linear time. Through quantum jumping a person(s) can be teleported to a location such as a

laboratory, held for x amount of time and then returned instantly back to where they were taken

from with zero lag in our time. State of the art Remote Neural Monitoring and Synthetic Telepathy

operations take place in a “synthetic dimension” too in that a separate time-space is used which is

typically 2-5 minutes ahead of what the subject(s) experience as “normal” linear time.

We are actually in a synthetic dimension right now in a sense (post 2012). That is another story

though that will lose too many readers. I’ll just say that the entire Cosmos and all divine,

benevolent (ascension) energies are being closed off via the geo-engineering programs.

Bilocation: When a subject is shown simultaneous real time video of themselves in a synthetic

dimension they are experiencing bilocation. They are typically shown this in their own mind or

consciousness i.e. in their ‘mind’s eye’. All they have to do is close their eyes and they can see the

version of themselves in the other dimension doing whatever they happen to be doing. This is

only, of course, if the military/government operator decides to show it to them. I’ve experienced

this a number of times before and it can be very creepy. They can show you being abused or in a

situation where you are about to be, for instance, as well as showing you real-time video of others.

When a subject is teleported to a synthetic dimension anything can be done to them there by the

personnel working in it. Thus the operators get to play God. They can commit every type of

personal crime you can think of against the subject. They can do any kind of study, interrogation,

medical operation. Anything, any activity – good and/or bad. The subject can exist in the time-

space bubble indefinitely. One scenario when the perpetrators do this is when they make a major

“new” version of the subject for any number of reasons. The inside nickname for this is “moo-

goo-gai-pan. ” I’d see a picture or video of Obama (or any of the synthetic puppets) giving a

speech and a controller would say he’s “moo-goo-gai-pan.” Adepts who can see aura’s can usually

spot something funny about a re-manufactured human. One reason for a major new version of a

subject is to do massive trauma erasing or reprogramming to restore to the “real you” a very blank,

placid mind and consciousness – a very pleasant, functional lobotomy. They can deeply,

powerfully filter or hinder recall of traumatic memories through advance neuroscience. Another

reason is if they want to archive a specific version of you for the future for any number of reasons.

Exactly like backing up a hard drive. You want certain restore points. They may want the original

version of you which they will always first make. You’d be lucky to get this restored back and get

out of the program. But say you had some kind of accident or were used for a terrible Manchurian

candidate murder. They could restore to you a version of your total

mindset/consciousness/emotional memory structure of a ‘you’ from way before, or perhaps just a

day or so before. So while you may have a memory of the act, there’d be no emotional pain and

trauma etc… it would be as if it were hypothetical, like something someone else did. As far as just

the memory itself, they can make that very faded and instill in you through deep hypnosis and

other methods, very little desire to even delve into it. It was just “something” that happened.

“Something” is a key word they use often to describe a subject’s understanding (or absolute lack

of) an event or reason for why they are doing something. “It was something, something happened,

I don’t know, there was something, it was something” then the subject just dismissed it. It was just

“something.”




Page 8

THINK YOUR’E GOING TO HEAVEN?

The Luciferians want to be able to trap the souls of people in a synthetic dimension. Let’s forget

about the concept of an over-soul, something truly cosmic and untouchable, for a minute. They

can, at the least, seriously mess with your “soul extensions” or soul-related energies by keeping

you trapped in another dimension. Of course, they can inflict hellish experiences on you when

they trap you there. As far as I know there may be several ways they can keep you indefinitely.

One can be in a coma – as a clone. Another can be in some kind of holographic form, at least in

part. They can also just keep the actual living version of you there, keeping you alive and healthy

and youthful. One caveat they have in their artificial empire is that it’s all run on electricity. So

when they use the word “eternal” actually that only applies as long as the power is on.

The “Spiritual Realms.” Think about it. This is the last frontier. You can only go so far in the 3D

world. The human body is how much different than any other mammals? More intelligent

‘transhumanist’ elements in the government have probably realized some time ago that humans

per-se were probably at the end of their collective life-cycle in a way. Technology is surpassing

the third dimension. The physical body is a clunky 3-d vessel.

Where did humans come from? Where do they go when they die? Just like the human genome

project and the brain-mapping project (already done – the Obama initiative is just a front for

slowly disclosing what’s already been done) the people who run the world and their break-away

civilization have created a spiritual-realm project to research, harness and exploit everything

possible with the ‘hereafter’ i.e. to conquer it and control it.

The Navy is interested in using the soul energies of others to travel to Heaven and/or other

spiritual realms. They study this intensely. They use Starseeds to communicate with the dead.

They have indeed successfully stolen very graphic, real celestial visions associated with angelic

realms from spiritual people. I do mean stolen. They can take these and store them and prevent the

subject from ever accessing them again in a spiritual way. They can de-spiritualize an individual

as hard as this may be to believe. In this respect alone they certainly can steal one’s soul.

Think about stories related from Near Death Experiences (NDE), stories of angels, guardian

angels et.al. In fact, this particular Navy group will use a highly spiritual subject to communicate

with a guardian angel and ask them to intercede in certain affairs on their behalf, now and in the

future, in a ridiculously structured fake-benevolent format.

The thing is, the subject isn’t doing this by their own free will. They didn’t drive to a military

laboratory/hospital, walk inside, sign papers and then proceed to be experimented on. They are

abducted in a fashion that you’d see in the plethora of sci-fi movies that do this stuff, and are

totally mind-controlled-directed to do it.

Scientists and doctors working with this Navy Special Operations group, will perform actual

NDE’s on a subject, crossing them over to the “other side” and monitor their “soul” bio-spiritual-

feedback and interact with the subject, asking them who and what they see etc. They will have

used quantum jumping, or maybe clones, to bring close family members or friends to the

hospital/lab and have them standing around the bed of the subject. They will be directed to

comfort the subject while they are in a real or simulated death. I was told that they really do kill




Page 9

you to pull this off but they bring you back. The subject’s family members will ask the subject to

talk to “grandpa” for example or maybe a famous historical figure and try to impart information to

them if some kind of time-travel or timeline alteration operation is being done. The subject’s

actual movement across time-space is actually visible and tracked by the team. It is extremely

eerie. It looks like an endless sea of white with the subject taking huge leaps. The subject will

wake up (be brought back) extremely disoriented and agitated, flipped out. More than one subject

can also be used in tandem with them. The subject may retain more than a screen memory; they

can actually remember the event and seeing other subjects who were sent across “time” with them.

The experience is almost like a race where you are competing with the other subject. It is

extremely scary. It’s what you would think death would be like in the absence of any spiritual

component, just a kind of dumb, helpless consciousness utterly lost in a sick void. They

nicknamed this the “bunny hop.” I mentioned a sea of white. It’s not the bright white light

associated with passing over. It’s a troubling static-like type of white for lack of a better

description.

The overall objective of NDE missions, aside from studies, is to alter timelines. This may also

touch on use of the subject in future operations such as in world wars and other major catastrophes

where extreme “hail-Mary” efforts to perform whatever tasks may be needed, including operations

in post-apocalyptic settings. Example, in the aftermath of a nuclear war.

Also, they said they are close in their synthetic timelines to being able to access people from

organic timelines. I don’t know if that’s actually true or not but it’s a goal. I know they are

confident and ambitious.

What else can they use a psychic subject for? They can use their properties to try to provide a way

to retroactively rescue someone in a car crash so they wake up in a room full of friends or

something similar instead of ending up in a hospital or dead.

=> “Topsy Turvy”. This is an internal term used by this Navy Special Ops group for when they

“take someone”, meaning quantum jump them to “their place.” “Their place” is the hospital/lab

they are working out of. They can do this to anyone anytime. They remotely force the subject to

take a deep breath and when they exhale they are transported.

Let’s return to the use of Luciferian/Synthetic dimensions to archive human energies such as

minds and souls. It’s theoretically possible for millions of people to be topsy-turvy’d in one fell

swoop or at stages, having their souls (or spiritual essences), as well as ALL energies i.e.

devic/auric body, mind/consciousness and, of course, their overall biological body down to every

cell, taken. The main thing to consider here though is heisting of the soul and mind. When they do

this they call you a “new one” or “nobody” – meaning the you sitting on your couch are newly

made and no longer spiritual but rather a type of soul-less synthetic. They have the spiritual,

sentient version of you at their facility. Remember the phrase “the devil wants your soul”? This

may have already been done to many, many Americans and others around the world. Regardless

of the current count, I can promise it will be done in total. And you will have no idea it’s

happened. The elementary principles for how it’s done were covered in the first document.

Basically you are all computers on a wireless network called Earth; and via satellites, HAARP and

ELF waves anyone, a part of anyone (ex: soul and mind) can be snatched easily and stored in a

government lab/facility. Humans are full of nanobots which collectively assemble and interoperate

to make the human a potential robot.




Page 10

What happens next? Can they swap souls/spiritual energies, personalities, mental acuities and

abilities? Can they render masses of people voided vessels and endow themselves with the unique

riches they’ve stolen from the public? Can they dump negative, black energies back into the

general public?

Worse, what will they do with the archived “you,” your “soul” in their Luciferian dimensions?

They can send you off (archive you) in a state of bliss or likewise in a state of suffering, extreme

misery, if they wish. It’s so easy. I think we’ve just defined a synthetic version of Heaven and

Hell. I can tell you the people doing this are EVIL. I wouldn’t count on Heaven.

There are some researchers who are learning more about “satanic super-soldiers” as they call us;

they talk about the “other place” as a kind of other Heaven/Hell. What they are talking about is a

government/military synthetic dimension but don’t know it. By the way, this is where fake “alien

abductees” are taken. “Alien abductees” in the majority of cases, especially involving “greys,

reptilians and Nordics” are just mind control, lab rat victims who have a screen memory as a

clever red herring cover story stuck in their minds.

=> Another point: They can create multiple instances of you in a shared space-time.

This Navy Special Ops group rapes a lot of women abductees. They have full access and nothing

is provable. They can pull almost anyone they want. Anyone who talks publicly about it, if they

even know, is labeled as mentally ill.

As mentioned in the first document, all 315 million Americans are effectively targeted individuals.

They’re just clueless sheep. They live in an electro-magnetic concentration camp. Everyone on the

planet is already configured and uniquely identified by their DNA as an antenna. You are

defenseless.

=> FYI: most NWO “special ops” military personnel who have access to “human effects” systems

are re-manufactured with cybernetics and get state of the art medical upgrades etc. Note, these are

Luciferians (whether they identifiy themselves as such or not); NOT regular Army, Navy,

Marines, Air Force or any special ops units thereof. I’m talking specifically about deep NWO

black black black black-ops who function more like para-military death-squad secret police.

That’s the truth. Don’t just visualize some Darth-vader looking guy with an M-16. They usually

dress in street clothes and business suits a lot. Most nasty combat work can/will be done from

behind a computer now. Will bits and pieces of cybernetic and DNA enhancements be pushed

down unknowingly to certain regular military who have a high enough value at some point (maybe

now)? You bet. The Luciferian/transhumanist military-police who are re-manufactured (like me)

can be seen exactly like Agent Smith of “The Matrix” movie series. That’s on the money.

Well, Don emphasized talking about mind control. On to that.




Page 11

- MIND CONTROL AND TOTAL CONTROL OF HUMAN SUBJECTS

Refer to the first document for basics on this.

I have to state again this information comes from my experience, things I’ve learned under Don,

the director of the MK-Ultra program I’m trapped in, as well as the other top controllers. I did not

want to publish any of this. It’s done effectively under his direction.

How to tell when you are being taken over by remote control?

1. Being made to yawn or have a sudden strong sneeze.

2. The subject may find themselves rubbing their eyes.

3. They may become suddenly very drowsy. They could also slowly subtly become drowsy. A

good example is if they are on their way home. When they get to their neighborhood they may

then start getting tired and almost feeling like you do when you awake from a nice deep sleep. The

idea of sleep may be appealing and their body yearns for it.

4. The subject will likely feel kind of silly, clownish. At first they may feel puzzled. They will

suddenly “see things from a different perspective”, have a “change of mind” on a matter, come to

see and sympathize with someone else’s point of view, even if it’s profoundly different and it’s

someone they hate. The mind control operator can go on to “push” thoughts and feelings onto the

subject or “steer” them in a particular direction on something.

5. They may go on to do something really irrational, deciding they need to “show someone what

they know.” They “need to show someone.” That’s all “they know.” These are just insider terms

describing the dumbed down robotic state of the subject. It doesn’t matter if the subject has an IQ

of 160. A controller directs his thoughts and emotions over theirs, replaces them totally and

directs them absolutely, totally and silently in perfect stealth. To the controller they look like total

idiots. It’s amazing and hysterical. Don told me to publish this. I’m not a fool. I did not want to

do this. I did everything within my power to get out of this. I’m publishing this document

against my will. I’m actually being tortured into it.

If the controller(s) decide the subject should be sedated or heavily neurologically altered for the

day, they may wake up from nightly sleep or a nap and be in the state describe above where their

body still yearns for sleep. They may mistakenly believe that their mind is clear and refreshed

because they had a good sleep, however in reality they are partially lobotomized but functional

and in a good mood. Again, think of awaking from a good sleep. It’s that mood along with an

uncluttered but non-thinking head, being empty-headed.

A fake world war or natural disaster or meteorite storm, ET invasion etc could be perpetrated and

the entire population could be put in this state and/or a mixture of any other state including ripped

off spiritual, ineffable feelings from Starseeds. Undesirables (riff-raff) could be killed efficiently

and everyone else simply follows the exact directions they are given, they are total robots. That’s

the plan. FEMA camps and the threat of gun-grabs may be real but they serve more realistically as

distractions. Guns are a joke.

Ways to counter electronic mind control

New nanobots are often forced into the subject when they are being taken over by a certain agent.

If someone is being accessed for the first time this is always the case. This will be done when, as

stated above, they are made to yawn or sigh or sneeze or just take a bigger breath than usual and

hold it down a tiny bit longer, just a healthy inhale. As stated, often these nanobots are connected

to individual agents. Agents can sometimes conflict and one may kick another one out by making




Page 12

the subject sneeze. This could happen between competing agencies on a resource, a politician

during a speech for example.

Depending on the mind control system you are on, you can create extreme pain in an agent if you

crank up very loud discordant noise like squelching static with headphones on and keep your

mouth tightly shut and limit your nose breathing to short regular breaths so he can’t get out. They

can develop work-arounds to this glitch but it will still often work for a while.

If you suspect you are being or have just been taken over:

Try to make yourself sneeze. Grab nose with a Kleenex and try to blow as much mucus out as

possible. Coughing up flem may help.

Other ways: If you are already under neurological control, try to get into an intense primal state,

especially one of anger. Scream, stomp, punch. Get vicious. Swear. Bring out your meanest side.

Physical exercise, especially outdoors, will help. Long drives will help too – a lot. You have to

shatter the frequencies in and around you. Getting intense will help. Being calm and meditative

will only prove helpful if they are laying off you. Then you will reconnect to your sense of self.

Synthetic Telepathy, Remote Neural Monitoring

If you are being tortured with synthetic telepathy, talk out loud to yourself (not around others

though). Also go ahead and talk to the handler(s) talking to you. Ask them what their name is over

and over, where they are at etc. Keep doing it. Always return fire with fire, get extremely personal,

gross and mean. Ask them the name of their oldest kid or the most recently deceased relative if

they are trying to degrade and traumatize you by using your family. Try and divide and conquer,

turn them against their superiors and fellow handlers. Play good cop/bad cop against them. Every

TI who survives is mean and fights back, as far as I know. The nice ones don’t make it.

Do NOT sit there in silence letting the electronic Luciferian rats run wild over your brain driving

you insane. Call other TI’s. Do NOT talk about the torture to non-TI’s unless you want to end up

losing friends, family, jobs and also end up in the psych ward.

Keep white noise on, AM radio static is good and can cause a gateway Syntel operator real pain

especially if you turn it up loud. Remember the above technique of not letting the nanobot(s) that

the main gateway “listener” agent is connected to, get out.

Odds are they are watching you every second. They also see exactly what you see depending on

the system you are under (RNM). If so you can watch as much disturbing content of things that

will sicken them (but not you). Whatever works. Just desensitize yourself to it and look at it in a

casual, frequent, non-premeditative way.

=> BTW, For ALL Americans, you might as well not be wearing clothes and be inside a building.

It’s hilarious, these cover stories about the NSA tapping phone lines. It’s like Charles Manson

admitting to shoplifting. Anyone in the secret police/military structure can see, hear, experience

emotions, everything about you in unreal detail. They can watch your heart beat, your lungs

expand, see you in the bathroom, bedroom, any time. It’s called “total target access.”




Page 13

Communicating with Synthetic Telepathy

First, I recommend you do NOT learn how to internally communicate with this EVIL, unnatural

protocol. They may try to actually teach you to do it. If you do want to, what you do is direct your

thoughts into words or images and push them downward, inwardly in your head and further

downward as if being “stuffed” down the back of the throat. The exact opposite of how you talk to

people verbally, physically. It takes a few months but you will find yourself learning how to do it.

You are developing new neural pathways in doing this.

Warning again: learning this may be a huge mistake. You will likely wish you weren’t able to

communicate with your torturers.

I am following orders in publishing this detailed operational information on communicating

internally over synthetic telepathy.

Dialog patterns

The brain is split into left and right spheres in the particular Syntel protocol this Special Ops group

uses.

- When you look down, your head is flooded with either real or fake-imposed subconscious

thoughts. They are usually negative. One of the first things I was told was that looking down

brings on negative thoughts. It does under this system.

* I was also told that this RNM system uses body language like you wouldn’t believe. Boy does it.

- Dialog occurs either in the left side or right side of your brain – or it feels this way. It’s very

clear as it happens.

- Left side verbiage is always false by default, unless an after-phrase of “sometimes left is correct”

is whispered. Same thing for right side except right side equals truth.

- When you get the ‘sometimes left/right side is right/wrong’ exception message it’s usually in

regard to something important they are trying to convey to you, a nugget of truth, or tip, they are

trying to slip you. You will get tons of disinfo from the handlers if you are a TI of some type, but

you can almost always trust the ‘sometimes exception’ as truth.

- Left side of head is the standard for superfluous text. If they talk to you a lot it would be

impossible for every single word to alternate from right to left, so the left side is the common

channel for regular dialog. Another type of exception is when every single word of an important

sentence is all on the left side. When this is done it’s the equivalent of the words being in bold

text, they are kind of emphasized in a way to indicate that it’s meant to all be consolidated on the

left side. However, it can still be a false statement. It could also be true too. It’s just being packed

into the left side entirely.

- Masking. The agent can mask the words by overlaying them with other words and also by

straddling the center line, trying to cross back and forth and creating confusion with synonyms and

antonyms. Also they can mess with the timing. Almost immediately after saying a word like “Yes”

on the left side which would mean “No” if it were emphasized as a left-side word, they can say

“No” which would mean “Yes”. They can also add a touch of confusion as they do this so you




Page 14

can’t easily tell which it is. If you slowly replay the sentence and break it down though you can

figure it out.

- Communication can take place via vibrations from any source. They can take place from any

consistent sound around you. Crickets chirping on a summer night can be used as a medium to

communicate with you. The sound can repeat “you’re an idiot” or “dickhead” over and over etc…

or something positive. The agent also can direct left-right side communication as well by making

you chatter your teeth slightly, rubbing or scratching yourself or any object, tapping or rubbing

with your foot; by virtually *any* tactile or auditory stimuli.

- Interrogations. A subject will be interrogated with a soft, masked voice asking “tell me who you

are?” or similar question. That’s how it starts. The word ‘who’ or ‘what’ is key. “Who told

you….?”, for example. Again they will often mask this other voices and vibration-communication

running on top of it. Involuntarily, things related to what they are asking will pop up in your mind.

Ways to counter (hinder) it:

Ask questions back. Apply the Syntel protocol techniques described above if you are game to

actually learning this or already have. If not, talk verbally out loud. Do not try to talk back in your

head if you don’t know how. Important, you want to ask the question back using a combination of

the right-left pattern if using this specific synthetic telepathy protocol. Put a key antonym or

negating word on the left side. Example:

Right side: “who told you to”

Left side: “shut up”

Right: “about us?”

Keep repeating this. You can also repeat confusing phrases in a Clinton-esque kind of fashion. In

doing this, don’t worry about left-right side protocol. Just say it either out loud or internally

straight out.

Examples: “I’ve said that before and so has she.”

“Oh, is that right?”

You may feel the interrogator trying to pull your words to one side or another. Visualize a deep

magnetic pole or star on one side of your brain; feel it saying “false, false but is it?… you never

now, maybe there’s something on the other side? Wait… there might be something I missed,

something going on over there…” so it’s a kind of ambiguous tug-of-war. *Revert to this if the

interrogator nails you. “You never know, that may not be all there is to it…. There was something

else.” Try not to actually think, just get both hemispheres of your brain in a kind of wrestling

match.

The interrogator component will always try to get you to look down and to your left – typical eye

movement for recalling the past. So try to look to your right.

If you feel your inner mental voice starting to answer a question or suddenly visualizing, thinking

of a correct response, keep your hand over your mouth or nose. This is body language for lying.

Also experiment with rubbing your finger across the cleft between your upper lip and nose

(mustache area). You may want to keep your hand over and around your nose and mouth, and also

dart your eyes around also to act like you are hiding something if they’ve pulled the truth out of

you. I’m far from an expert on this subject but these are tips you can try.




Page 15

Still, it’s almost impossible to win. What they are seeking will always come out. Especially if you

get paranoid after a while, or just tired etc. They’ll get everything they want out of you when you

fall asleep anyway. The mind has no firewall. Sorry.

One thing though. If the subject is sleep deprived and suffering from psychological

damage/torture, then it’s a case of “garbage in / garbage out.” The system does not take into

account that the subject’s mind may be a total wreck with multiple paranoid, coping-type double-

jeopardy type complexes.

- An aside. There is something called a “car bag.” What’s that? They can control all music in your

car. They can also do it anywhere almost! In a grocery or drug store for example. They can play

any song or commercial on your car or home radio, or in public. The car bag can also make things

move around in your car, for example, an ornament hanging from your rear-view mirror can start

moving to get your attention.

Soul reflection – Soul querying

One of the sickest and biggest violations of God and divinity, of true Cosmic Law, is the theft

and/or rape of the soul which can be done in real-time to any individual via soul-catcher

technology. The Luciferian controllers can invoke a deep powerful déjà-vu like experience in you,

tapping deep into your soul. When they do this it usually recalls a deep childhood memory,

something precious and sacred. It’s not private anymore though. A government or black ops

military agent can get their filthy “hands” on it anytime. This may be deep powerful loving

memories of family from when you were a child, or of a loved one, including one of your own

children. It could be of a dead relative or close friend, perhaps who is now a guardian angel. They

did/do this with me in their operations, having me communicate with a guardian angel, and also

trying to map any kind of spiritual communications with deceased relatives and more. They can

have the subject in a “suit” of nanobots, entirely surrounded in a force field. You can see how they

can cut you off spiritually if they want, or likewise allow you to have spiritual experiences but

capture everything about it, auras, inner voices and images, ineffable feelings etc… Then they

study it and back-engineer it, try to replicate it. They copy the frequencies involved to generate

fake spiritual experiences in other people as a kind of “high” and false spiritual awakening.

The Luciferian Navy Special Ops controllers can invoke these spiritual soul-reflections at very

inappropriate times; they can invoke it in you any time they want. Further, they can play your own

soul reflections and spiritual experiences that they’ve stolen from you, back to you. The

experience is a very good duplicate but fake. The most precious private, spiritual gifts of life are

being stolen, totally stolen.

=> They can invoke deep powerful, hurtful memories that touch your soul, at times when you

should be joyous.

They also weaponize your spiritual experiences that they steal. As I said, they are obviously

cataloguing humanity’s soul essences, spiritual frequencies. They can take combinations of soul

frequencies and mentations and emotions, and mix them just like a music producer might do

“sampling” in ripping off riffs from classic hits to put into the next top 40 hit. They plan on using

these specially blended frequencies to counter other competing frequencies of enemies. It’s

unlikely there will be another major war but if there is it will be between frequencies and will use

neurological directed energy weapons. Ironically these are banned by international courts and the

Geneva Convention but the United States and other countries use them on their own citizens with




Page 16

impunity. Right now a silent Holocaust is being waged against many of America’s best people.

Many people are being tortured to suicide or into mental hospitals.

Modern “revolutions” (Arab Spring) and financial restructuring (remember the terrible imminent

collapse of the PIG countries that never happened), the imminent financial depression in America

that never happened and the Occupy Nothing, as well as the monthly mass shooting or bombing

theatres – all mind control events. I did not want to publish this. Don has a connection at the NSA

that keeps him from getting canned no matter what. Entire SEAL and Craft-type teams take the

fall.




Page 17

- CHEMTRAILS

Used for mind control primarily. Applied en-masse and locally in operations on super-soliders or

other “program” assets; and on the general public in eugenics campaigns and general

configuration and maintenance of humans. They can be applied locally to control or modify any

number of subjects as well. Really, chemtrails can be seen as firmware that is flash-written into

humans (bio-computers). These are used with nanotech heavily. Same with HAARP.

Chemcover/trails provide the basic media through which myriad operations can be performed on

human subjects for bad or good.

Franken-clouds: fake clouds that just suddenly appear, created out of almost thin air. They have a

metallic-silver kind of sheen to them. They can rapidly disappear too. The engineers are getting

much better at creating natural looking chemcover and blanketing the whole skyscape. For some

reason, perhaps just for fun, they like to still do old-school style swatch-pattern chemtrails.

Usually, as anyone who isn’t blind can see, the sky is just electromagnetic soup, it’s gross. This

whole topic at this point is so blatantly obvious there’s little to really disclose. I was told early on

that the diabetes epidemic is caused by people eating-drinking out of tin/aluminum cans. The

metals in the atmosphere have an effect on the aluminum-metal cans that causes diabetes. This is

not by design, I was told, and they are working on a fix for it.




Page 18

- BLACK PSYCHIATRY

One of the five Navy Special Ops controllers told me how they create horrific lucid nightmares.

They put you in a sleepy state or just wait for you to get into one yourself. When you are asleep or

just waking up they will do deep sleep-state hypnosis. They will start by using the key words “take

me back…” They will ask you to go back to a certain time in childhood or maybe to another time.

Usually I think they start with childhood, probably to re-establish some kind of trust between them

(a special friend or parental-replacement character they are acting as) and an alter personality

they’ve programmed into you. During this process they can “take you deeper” … this is standard

hypnosis but with electronic mind control it’s much easier and more powerful. It’s like going

lower in an elevator, deeper, deeper. Then they’ll have you start off in a pleasant environment.

They will then show you that there are two sides to it. There’s a dividing demarcation boundary

line. On the other side there are negative things. Then they will turn it into a nightmare where

horrible things, situations and people from the bad side are introduced. You get lured over there

and end up in an extremely disturbing situation. Loved ones can be turned into evil, perverted

characters.

They really like car wrecks. They can create real-time real-to-life lucid situations in your mind that

are horrifying. You can be in a car as a child with a parent driving on the highway. The parent

starts to fall asleep and you try desperately to wake your mom or dad as they doze off behind the

wheel but can’t. The car is in the process of crashing into other cars and going off the road, and in

your mind you are maybe six years old and utterly terrified and helpless.

Horrific sex crimes can be done in your mind.

They may create a fun sexual dream at first. Then it changes into a nightmare. For TI’s who are

limited assets in the “program” i.e. MILABS/Super Soldiers, they may create a stick and carrot

lesson. They will give you a positive sex dream. Like the strong, lasting impressions in your mind

that their artificially induced nightmares have, the positive sex dream can burn into your mind as a

good memory (even though it was artificial). But then comes the “stick.” They follow it up with a

nightmare to show you there are consequences for undesired behavior, including merely having

thoughts, they don’t like.

Why are these nightmares so horrific? They pull the characters, settings, the entire emotional and

mental landscape from the deepest recesses of your own mind and soul.

They keep inventing new forms of terror with these psychotronic, lucid nightmares. They can keep

you semi-awake and have the nightmare keep going. It can go on for a seemingly long time like

this, maybe 5 to 15 minutes… you keep living it in your mind and it’s so real. They can have a

force field around you to add vibration effects to it. You could relive a disturbing memory of

someone deep in a dark corner of your mind. In the nightmare you might be trying to open a door

to escape or be trapped in a maze or trying to hang on to a metal bar on a ski-lift car or Ferris

wheel chair that you’ve slipped out of. You could be in this life-or-death struggling situation for,

as I said, maybe 15 minutes or more, semi-awake, and you don’t know it’s a nightmare; you are

living it in your mind as if it’s real.

The nightmares can get so bad for the TI after a while that in order to keep them from cracking a

handler will administer some neurological magic – they will reprogram the TI’s brain to phase out

the memory of what just happened and be in an artificial good mood, just a little while after they

wake up and ‘learn their lesson’. They might make a moo-goo-gai-pan semi-lobotomized-happy




Page 19

airhead you, and to boot give you a chiseled physique and shave five pounds off you. This is only

done if the agency who is using the TI (typically a MILAB) has a vested interest in keeping them

alive and functioning for a bit longer, otherwise they’ll let the mental damage just fester and

compound. Usually after the subject awakes from the nightmare the handler who is on duty is

talking to them to really rub it in.

As stated, a trick they can do is use a force field around you to add vibrations and other effects.

This would be great to simulate an act of violence against the TI. They can create holographic

images around the subject as well. They might put a thirteen foot “Reptilian” by your bed,

standing over you while they pipe a raspy voice into your head. The perpetrators can wake you up

in a state of total terror. For example, if you are trying to escape using shielding such as sleeping

in a small faraday cage or your car, you could be awakened with a real 3-d sensation of the walls

around you actually shaking violently and closing in on you. You could be awoken to a lucid

nightmare where you are working in a barn alone, around a large silo of grain and it avalanches on

you and buries you alive. Variations of these kinds of freak-accident and homicidal nightmares are

only limited by the imaginations of the torturers’ sadistic minds.

These are Luciferians. Many of them are pedophiles. Nearly all of them are rapists. Some may call

themselves things like ‘reborn Christians’. They’re Luciferians and they are the most sadistic, evil

psychopaths who have ever existed on this planet. Some may be forced to act as torture agents as a

form of blackmail but there are core groups that make a long-term profession of it.

FYI – the concept that the hypnosis subject will not be ok with a command or suggestion they are

immorally against subconsciously is not valid under electronically induced hypnosis. They will

blindly believe and do whatever they are told.




Page 20

- An aside: THE “NEW EARTH”

No, this isn’t a new ager’s vision of a spiritual renaissance but you hear them using this phrase like

a new trend term. It’s the new synthetic earth where all matter is part of the global, remotely-

controlled computerized API (application programming interface). Man’s electromagnetic prison

with mirages and cloned and fake-synthetic frequencies/energies are all that post-humans

experience. This will lose a lot of readers, but cosmic Ascension into higher dimensions was real.

A small number of people in the power structure know this. It’s been blocked out now. The sun’s

energy is being greatly blocked out under the guise of global warming remediation.

I have to reiterate that this document was brought to you entirely by Don, four other Navy Warfare

Special Operations Officers and Tim, a core SEAL team lead beneath them, who run their version

of a Luciferian soul-catcher project. It was truly co-written with them. It appears to me that they

blame entire SEAL and private contractor teams for various mismanagement and leaks. They go to

fantastic lengths to frame everyone else and apparently have friends in the NSA and intelligence

community in high places. This document will have virtually no impact on the public. While it

presents a serious leak in some ways, nobody of any importance/power will read it or believe it.

Northcom and overall globalist plans will not be the slightest bit impacted. I was instructed to,

actually tortured into, publishing this to create my own death warrant. Anyone who does

appreciate this document may thank parties named above.

MIND CONTROL IN AMERICA

https://docs.google.com/document/d/1FRKRb4LLfeNKe-J6kmvk2d_k50ev_6bn6VsgMtS9F2o/edit?pli=1

http://justpaste.it/USNAVYSPECIALOPS

Posted in Uncategorized | Tagged | Comments Off

Russian researchers expose breakthrough U.S. spying program

http://news.yahoo.com/russian-researchers-expose-breakthrough-u-spying-program-194217480–sector.html

Russian researchers expose breakthrough U.S. spying program

By Joseph Menn 9 hours ago

The NSA Hides Surveillance Software in Hard Drives

The NSA Hides Surveillance Software in Hard Drives

AirAsia Plane Carrying 162 Lost; 3rd Malaysia Airline Shock

By Joseph Menn

SAN FRANCISCO (Reuters) – The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives.

That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.

Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said. (http://reut.rs/1L5knm0)

The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was used to attack Iran’s uranium enrichment facility. The NSA is the agency responsible for gathering electronic intelligence on behalf of the United States.

A former NSA employee told Reuters that Kaspersky’s analysis was correct, and that people still in the intelligence agency valued these spying programs as highly as Stuxnet. Another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it.

NSA spokeswoman Vanee Vines declined to comment.

Kaspersky published the technical details of its research on Monday, which should help infected institutions detect the spying programs, some of which trace back as far as 2001.

The disclosure could further hurt the NSA’s surveillance abilities, already damaged by massive leaks by former contractor Edward Snowden. Snowden’s revelations have hurt the United States’ relations with some allies and slowed the sales of U.S. technology products abroad.

The exposure of these new spying tools could lead to greater backlash against Western technology, particularly in countries such as China, which is already drafting regulations that would require most bank technology suppliers to proffer copies of their software code for inspection.

Peter Swire, one of five members of U.S. President Barack Obama’s Review Group on Intelligence and Communications Technology, said the Kaspersky report showed that it is essential for the country to consider the possible impact on trade and diplomatic relations before deciding to use its knowledge of software flaws for intelligence gathering.

View gallery

FILE - In this June 6, 2013, file photo, the National …

In this June 6, 2013, file photo, the National Security Agency’s Utah Data Center in Bluffdale, Utah …

“There can be serious negative effects on other U.S. interests,” Swire said.

TECHNOLOGICAL BREAKTHROUGH

According to Kaspersky, the spies made a technological breakthrough by figuring out how to lodge malicious software in the obscure code called firmware that launches every time a computer is turned on.

Disk drive firmware is viewed by spies and cybersecurity experts as the second-most valuable real estate on a PC for a hacker, second only to the BIOS code invoked automatically as a computer boots up.

“The hardware will be able to infect the computer over and over,” lead Kaspersky researcher Costin Raiu said in an interview.

Though the leaders of the still-active espionage campaign could have taken control of thousands of PCs, giving them the ability to steal files or eavesdrop on anything they wanted, the spies were selective and only established full remote control over machines belonging to the most desirable foreign targets, according to Raiu. He said Kaspersky found only a few especially high-value computers with the hard-drive infections.

Kaspersky’s reconstructions of the spying programs show that they could work in disk drives sold by more than a dozen companies, comprising essentially the entire market. They include Western Digital Corp, Seagate Technology Plc, Toshiba Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd.

Western Digital, Seagate and Micron said they had no knowledge of these spying programs. Toshiba and Samsung declined to comment. IBM did not respond to requests for comment.

GETTING THE SOURCE CODE

Raiu said the authors of the spying programs must have had access to the proprietary source code that directs the actions of the hard drives. That code can serve as a roadmap to vulnerabilities, allowing those who study it to launch attacks much more easily.

“There is zero chance that someone could rewrite the [hard drive] operating system using public information,” Raiu said.

Concerns about access to source code flared after a series of high-profile cyberattacks on Google Inc and other U.S. companies in 2009 that were blamed on China. Investigators have said they found evidence that the hackers gained access to source code from several big U.S. tech and defense companies.

It is not clear how the NSA may have obtained the hard drives’ source code. Western Digital spokesman Steve Shattuck said the company “has not provided its source code to government agencies.” The other hard drive makers would not say if they had shared their source code with the NSA.

Seagate spokesman Clive Over said it has “secure measures to prevent tampering or reverse engineering of its firmware and other technologies.” Micron spokesman Daniel Francisco said the company took the security of its products seriously and “we are not aware of any instances of foreign code.”

According to former intelligence operatives, the NSA has multiple ways of obtaining source code from tech companies, including asking directly and posing as a software developer. If a company wants to sell products to the Pentagon or another sensitive U.S. agency, the government can request a security audit to make sure the source code is safe.

“They don’t admit it, but they do say, ‘We’re going to do an evaluation, we need the source code,'” said Vincent Liu, a partner at security consulting firm Bishop Fox and former NSA analyst. “It’s usually the NSA doing the evaluation, and it’s a pretty small leap to say they’re going to keep that source code.”

Kaspersky called the authors of the spying program “the Equation group,” named after their embrace of complex encryption formulas.

The group used a variety of means to spread other spying programs, such as by compromising jihadist websites, infecting USB sticks and CDs, and developing a self-spreading computer worm called Fanny, Kasperky said.

Fanny was like Stuxnet in that it exploited two of the same undisclosed software flaws, known as “zero days,” which strongly suggested collaboration by the authors, Raiu said. He added that it was “quite possible” that the Equation group used Fanny to scout out targets for Stuxnet in Iran and spread the virus.

(Reporting by Joseph Menn; Editing by Tiffany Wu)

Posted in Uncategorized | Tagged | Comments Off

Chris’s Codes 1962 – 2021 <IC888DW> Sequential

Chris’s Codes 1962 – 2021

<IC888DW> 62-00810/12-16-1962/CDCJBJ8 <cdcjbj8/62-008100/December 16, 1962-D.O.B.>

<Initiate-Code-8x8x8-Digital-Weapons>

<Initiate Code 888 Death Warrant> UniversalPoliceForce.Com <8600035>SLC/UT><DBA>

<Install Codes 888 Digital Weapons> TheMajestoneUniversalStockMarketCorporation.Com/MUSM/IPO#s

<Initiate Command Codes 888 Destruction Weapons> UrantiaUniversalMilitary.Com/WWW

<IC888DW> Investigations Cases = UniversalBureauOfInternalAffairs.com/WWW

<IC888DW> UrantiaPlanetaryGovernment.Com/MajestoneEnterprises.Com/WWW

<InitiateCommandCodes8x8x8DigitalWeapons> MajestoneEnterprises.Com<9263666><DBA>

<Initiate Code 888 Death Warrant> Majestone.Com <8729356> <DBA>

<IC888DW> <cdcjbj8> <62-008100> <12/16/1962> <Las Vegas, NV/Paradise>

Copyright ©2015 Chris Dwaine Christensen

Copyright ©2015 Christ Michael 611,121st

Copyright ©2015 Majestone

Posted in Uncategorized | Tagged | Comments Off

Wake Up America!!

10959688_10153089721577806_6642029472217744697_n

Posted in Uncategorized | Tagged | Comments Off

The “Children’s Rescue Unit” has now been created!!

      Just today, January 17th, 2015, I created the Children’s Rescue Committee which is an organization to rescue kidnapped children and other victims. Many times these children are hunted, raped & murdered. We also will be executing the hideous criminals who commit these terrible crimes. These are the Chief Supervisors:

 
Children’s Rescue Committee
Chris Dwaine Christensen Majestone – Chief Consultant
Mechalona Evelyn Christensen Majestone – Supreme Organizer
Priscilla Brenda Christensen Majestone Childreamia – Chief Rescue Operator
Karen Divinscia Christensen Majestone – Master Forces Initiator
Machiventa Melchizedek Christensen Majestone – Planetary Principles Integrater
Michael Steven Christensen Majestone – Master Rescuer
Michelle Rachel Christensen Majestone – Master Rescuer
Joshua Benjamin Christensen Majestone – Master Rescuer
Mary Ruth Christensen Majestone – Master Rescuer
Immanuel Jacob Christensen Majestone – Master Rescuer
Chrystal Bethany Christensen Majestone – Master Rescuer
Chris Scenarion Christensen Majestone – Master Rescuer
Danielle Ann Christensen Majestone – Master Rescuer
Majestone Diamond Christensen Majestone – Master Rescuer
Kristine Love Christensen Majestone – Master Rescuer

The “Children’s Rescue Unit” has now been created!!

Posted in Uncategorized | Comments Off

Universal Police Force & Military Websites & Blogs

The Majestone Foundation

The Majestone Foundation

Gospel of Jesus

Joshua Ben Joseph

Christ Michael.org

Open The Door Ministries

Majestone Enterprises

The Book of Majestone

Universal Police Force

Urantia Enterprises

Majestone Utopia

Childreamia.Me

Majestone.Com

Majestone Q

11:11, Inc.

Our Government

Adjudication of Urantia

Armageddon Activation

Urantia Universal Military

Universal Supreme Person

Chris Dwaine Christensen

The School of Majestone

Epochal World

Urantia.mobi

MajiCloud.com

Star Children.us

Universal Bureau of Internal Affairs

The Majestone Universal Stock Market

Chris Dwaine Christensen Enterprises

Urantia United Midwayers

The Majestone Daily

The Majestone Miracle

The Majestone Family Blog

Majestone Children’s Blog

The Universal Police Force Trumpet

Universal Bureau of Internal Affairs Discoverer

Christ Michael Org Government Blog

Urantia Universal Military Intervener

Christ Michael Judgment

The MUSM Report

Believer’s Blog

Universal Sex

Majic Web

World War Trinity

Paradise Value Credits Power


Urantia Intelliceptors Agency

Urantia Enterprises Blog

Urantia Universal Military Air Force

Copyright Ownership

Copyright ©2014 Chris Dwaine Christensen

Copyright ©2014 Christ Michael 611,121st

Copyright ©2014 Majestone

Posted in Uncategorized | Tagged | Comments Off