bush-kerry bones


The most likely potential member is from a Bones family, is
energetic, resourceful, political, and  probably an amoral
team player. A man who understands that to get along you
 have to go along. A man who will sacrifice himself for the
good of the team. A moment’s reflection illustrates why this
 is so. In real life, the thrust of the Order is to bring about
certain objectives. Honors and financial rewards are
guaranteed by the power of the Order. But the price of
these honors is sacrifice to the common goal, the goal
of the Order. Some, perhaps many, have not been willing
 to pay this price. Initiates undergo bizarre rituals and
initiation ceremonies with sexual overtones, conducted
on the order of brainwashing techniques designed to
strip the initiate of all pride and sense of self.
The initiates are then “reprogrammed” to embrace
only the philosophies and goals of the Order.



by Daniel Boorstin

Your unfortunate lack of critical thinking skills leaves you without the ability to see the unseeable. You watch, but you fail to see. Fear not my less informed friend - whether your being chemtrailed, body/mind controlled, stalked by the public or living to the age of 160 in perfect health, this web site connects the final high level dots concerning this otherwise complicated puzzle of insanity currently before you. 'Logic and proportion have fallen sloppy dead, and the White Knight is talking backwards'. This is what they are doing to you and your family, and this is how they do it.

Complete, high dexterity remote control of every single synapse and neuron for every person on the face of the earth.

The holy grail. A 'BioAPI'.

. A BioAPI is exactly the same thing, except instead of computer hardware a BioAPI interfaces with your body parts, specifically your neurons and synapses which control your body and mind. Also known as wetware, essentially the BioAPI in you consists of nano-implants. These implants are required because it's simply not possible to influence, communicate or control any part of your body or mind with classical methods as a electromagnetic quantum signal has nothing to talk to, hence the requirement of a middleware (the nano-implants).

To summarize - chemtrails spray the entire planet with nano-fibers which you breathe in. These fibers contain (nano & micro) components which construct and install nano-implants which the aggregate of constitutes what is commonly known as a Biological Application Programming Interface allowing for the complete monitoring, control and extension of all body and mind functions in a given host (you, and everyone on the entire planet).

You are the base model surrogate.


Dee Finney's blog

start date July 20, 2011

today's date October 13, 2013

page 578





2-15-08 - Two Saturdays in a row, I was hit in the back of the head while sitting at my computer by a huge force that almost knocked me over.  There was nobody behind me at all.  I felt really dizzy and my head hurt.  My first thought was, "I've had a stroke", but I had no stroke symptoms.   So, I got up and took a couple aspirins and went to bed to rest.  I no sooner closed my eyes, and I could see in the astral realm, 3 men dressed in white shirts with long sleeves - no ties - dark pants.  They were leaning over me as I was laying on the floor and one of the men said, "FEMA wants you to erase the bases."

After thinking about it a bit, I decided I would not only NOT erase the bases, I would spread the word faster and sent the links out to every person I know and right now, that number runs in the several thousands on my e-mail lists.  I also uploaded the lists on another website in case they decided to hack mine.

Here are the files I was told to erase so you know what I'm talking about.

UPDATED 8-26-07 -

The following week on Saturday at approximately the same time  (8:30 a.m.)  I was hit again just like the week before, but in this case, I had just moved my head to look at the TV, and they only got me with a glancing blow.

You also might want to see this series of videos:

http://www.youtube.com/watch?v=eXo5ea2hRFE   Cathy O'Brien

http://www.youtube.com/watch?v=HLqw59XfG04  Operation Paperclip - MK-ULTRA

http://www.youtube.com/watch?v=dRlVjVlmRZo&NR=1  Mind Control in the USA



NEVER GIVE UP TRYING.  Once we quit, they win, and we can't let THEM win.

I am presenting a series of web pages and sites that might be helpful which I received in an e-mail: 

Here is a survey to see if you are mind-controlled at all. 

If you have these symptoms, let me know.

The following symptoms are of the harassment typical of electronic mind weapon targets (non-electronic harassment usually goes with  the electronic effects):
I took this survey myself and found many of them to be happening to myself.:

1. You find that all of your family, friendship, and business relationships are going sour and you have done nothing to cause this.

2. You find that "accidental" blocking of you as you walk or drive about, by strangers, has increased dramatically and every day brings several "blocking" incidents.  E.g., someone slips ahead of you at the bank machine or grocery checkout, or with cars in unexpected places in parking lots.  This is part of what targets call "street theater".  THIS IS ABOUT BLOCKING *FAR* MORE FREQUENT THAN THAT WHICH OCCURS IN NORMAL LIFE, NOT THE USUAL OCCASIONAL OCCURENCES.

3. Telephones frequently have static or tones or echoes; you have lots of "wrong number" calls 

4. Street lights going out as you pass under them, walking or driving 

5. Your watch and other batteries going dead often far too soon to be "natural" deaths

6. You find that you are coming suddenly awake at precisely the SAME TIME, middle of every night

7. Inescapable voice in your head and you are not mentally ill 

8. Ringing in ears - may start/stop when switching on or off electronic devices

9. Fake telephone or clock ringing or fake knocking on your door

10. Fake, loud bird calls, outdoors, which follow you everywhere

11. Hot needles deep in your flesh, especially when trying to sleep (also called "stings")

12. Limbs jerking wildly, especially when trying to sleep 

13. Extremely powerful itching which may start as small electrical shocks

14. Very fast heartbeat while relaxed (not having exercised recently) 

15. Very high body heat, no fever, relaxed, cool surroundings

16. Vibration, large area of your body, or, nearby objects which should not vibrate normally

17. Forced awakening, can't go back to sleep, as if on high doses of caffeine

18. Vivid 3-D images while awake, eyes open or closed

19. Urges to go somewhere you don't need to or at times you would not go there

20. Neighbors can see thru walls, possibly by sounds from them which "follow" you

21. Repeated instances where it seems your mind is being read

22. Repeated evidence of break-ins, small scale thefts, and sabotage both at home and at work

23. Sudden "drop-you-in-your-tracks" fatigue at times you should not be tired

Here are some others: 

Sensations of heat and cold on various parts of the body.

Manipulation of sense of taste. For instance, food and drink can be made to taste altogether different, or to be totally tasteless.

Manipulation of vision. The eyesight can be "made" blurry, or seem as if  were seeing through a fog.

Manipulation of sense of touch. Various parts of the body can be made to tingle, vibrate or become entirely numb.

Frequent pain: abdominal pain, headaches, earaches, toothaches that linger for several hours or that come and go in a minute's time. A stinging pain in the eyes.

Sleep deprivation, or the feeling of being "wired."

Vivid dreams.

Memory and concentration are continuously severely affected.

Control of emotional states, i.e., feelings of anger, anxiety, lethargy, peace, numbness, exhiliaration, etc.

NOTE: Chemtrails which drop various toxic substances can affect all these things as well. No one has the definitive answer to this horror either.

If you were able to answer more than one of the above in the affirmative, you might want to take a look at the following: 

To post a personal story, the site for that is the Mind Control Forum at:


The infiltration of legitimate government, law enforcement, and media is so pervasive that not a single conventional channel for help is available to people who are having these problems.

Ask any conventional channel for help and you will be told to see a psychiatrist, that is, to see the same profession that is behind the entire mind control scenario and has been from day one. That would be like a Jew in Nazi Germany going to an SS office to ask for help in stopping the programs. I would add a caveat to this, however, there are some good psychologists who are helping 'alien abductees' and if you have access to someone like that, you might get some help there, or at least access to a good sympathetic ear or group of people who are undergoing the same harassment.

However, there are ways we can put up very stiff resistance, while waiting for advanced technology to make it on to the scene and show the public that we are not exaggerating when we report what is happening to us.

Here's my formula for fighting back, perhaps there is something here you can use.  I hope so, because our group needs activists very badly - these are critical times:

1.  Keep reminding yourself that you are every bit as much a soldier as the guys who went ashore on D-Day.  This is a war against freedom, and is the most important war ever fought on this planet.

Play lots of military marches, film soundtracks, and inspirational music to keep your fighting spirit at a high level.

2.  Don't waste time and resources chasing conventional signal cures.  My arguments, which have not been accepted by all victims yet, on the topic of the real classified signal types are at this link:


3.  Spend your time and resources doing all you can to spread the word about FACTS ON PUBLIC RECORD (which does not include our own torment, sad to say) which point to the availability and use of psycho-electronic weapons and their use on involuntary experimentees:

 - Brief yourself on three government recognitions that at least electronic anti-personnel technology exists, as these three bulletins can assist when dealing with hostile authorities including psychiatrists who want you to take medications you do not need:


One professional scientific journal also states that voice to skull technology exists - this is the single most important document in support of electronic mind weapon technology to date:

 - Unclassified and commercial technology available to anyone these days,
      ...and the fact that there are no controls on owning or using these devices

 - MKULTRA, the REAL story which is FAR MORE than a few hits of LSD and some drugging of patients for hypnosis in Montreal,

4.  CONSTANTLY learn and review facts, over and over, and find ways to get them to above all the public, with some effort to the government and media people as well.
Rehearse your spiel constantly.  Keep trying to think of ways to get the story told in fewer, bolder words and phrases.

Some ideas for handouts, posters, and spiel phrasing are available from this page:


5.  There is a message board on the Mind Control Forum for exchanging comments with other victims.  Go to: http://www.mindcontrolforums.com
    Then scroll down to "Message Board".

Again, see http://www.raven1.net/qkadvice.htm for suggested criteria to test for genuine countermeasures and genuine detection.

      See http://www.raven1.net/disinfo.htm for a write-up on the subject of disinfo agents.

6.  IMPLANTS.  Many victims assume that because they are tracked, their thoughts read, and are targeted in other ways, they must have implants.  New correspondents
need to realize that many victims have never had surgery, unexplained wounds, or lost time, and therefore feel they do NOT have implants.

Furthermore, the technology is highly exotic, can penetrate electromagnetic shielding and can evade conventional electronic detection equipment.  This sophistication and assertions by many victims make it wise to NOT ASSUME you are implanted unless you have unmistakeable x-ray proof.

It is possible to have a non-metallic implant which may not show on an x-ray too.

If you make claims that you are implanted, and later on, the authorities have you x-rayed and find nothing, you have discredited yourself and in some degree the rest of us too.

I recommend reading this document which outlines many reasons it is wise to not jump to conclusions about the technology in use, including implants, before you make any claims to the authorities: 


.  Some personal ways I can cushion the effects of the attacks are these - may not work for everyone:

- During times where I am kept awake at night, I find listening to talk shows like Art Bell/George Noory, Ian Punnit, George Knapp - http://www.coasttocoastam.com
      ...not only eases the discomfort, but once in a while picks up some info relevant to government cover ups of all sorts, and it is these cover-ups which are maintaining the torturers' secrecy

NOTE: I have been woken up in the middle of the night just in time to listen to specific interviews, which is also part of the programming.  So, just listening to the show doesn't guarantee life free of anxiety - it can actually make it worse. Use your own good judgment. 

 - I find that having a 20" box fan blowing over my legs at night makes the various physical attacks a little less severe (lightest setting in cool weather, legs bare)

- White noise, either from the fan or from white noise generators helps during the night 

- Very light medication, such as 25 mg of Amitriptylene and/or 3 mg of Melatonin can help either get some sleep or increase restfulness when forced to stay awake

- As much walking and other activity outdoors helps significantly

- Advice for personal coping, as well as a colleague who has time to take telephone inquiries, is available on this web site:


Once you enter, these two titles in the clickable menu list are for personal coping:

      A Word to friends and Family!
      So how's your marriage doing?

9.    As to the technology, my own shielding experiments and the experiments and experiences of others point towards technology advanced beyond what conventional scientists know about.  Most new victims will not believe this, and spend agonizing years and lots of money pursuing court cases and conventional "cures", ending up no further ahead.  This is why I fight back in the public arena, hoping to get the public to start demanding answers.

I can offer two places where, if you are open-minded enough, you can begin to see just how advanced the technology actually is:

- "The Secret Life of Plants", by Tompkins and Bird, the edition having CLEVE BACKSTER'S experiments as the first chapter

      - http://www.raven1.net/qkadvice.htm

10.   This is a kind of unusual technique for reducing the impact of the torture, but I find that feeding and hanging out with squirrels in a park is the single most "daily spiritually uplifting" experience I've had since starting to look for ways to cope.  When one of the little furry ones gets confident enough to hop up on your lap and ask for a peanut, I feel as if I've been blessed by Heaven!

Finally, there are two "comebacks" to questions from skeptics which I will offer you here to assist with your dealings with others, be they authorities, medics, or family, friends and business associates.  These are from a larger collection of information relative to public speaking, but I've found are especially handy.

The full page is at:  http://www.raven1.net/spiel.htm

Here are the excerpts:

1.  When someone says "If these weapons exist, then why don't they use 'em on so-and-so [Osama bin Laden, Saddam Hussein, Slobodan Milosevic, or any other bad guy in the headlines]?"

    Answer:  "Probably because so-and-so [the bad guy] is doing things that our government feels are useful. Not every goal of government is made public."

2.  When someone asks "So how many of you are there?"

    Answer:  "In March of 2002, Cheryl Welsh, founder of CAHRA, had been in touch with about 1,600 people world-wide who state they are being targeted.  In an April 2002 survey of about 12,000 Americans, about one percent stated they are being targeted with psycho-electronic weapons and the harassment which goes with the weapon attacks."

from: Eleanor White

NOTE FROM DEE: I would venture to say that number given above is much, much higher. Most people wouldn't tell their best friend of their suspicions for fear of being put away or drugged against their will.


RMN Home Page_ (http://www.rumormil lnews.com/)
(http://www.rumormil lnews.com/ cgi-bin/forum. cgi) _RMN Reading Room_

Politically Incorrect News -- Stranger than Fiction -- Usually True!
Five Easy Steps To Create  A Manchurian Candidate


Gunther Russbacher sent the original pieces of this article to his wife, Rayelan in 1996. In December of 1996, Rayelan pieced together Gunther's many letters, and published the original article on "Mind Control in America" in the print edition of Rumor Mill News.

Several days before the Columbine shootings, a man from Austria came to California to meet with Rayelan and clear up some of the hard to understand passages in the original article. The man said he was Gunther's boss in Austrian Intelligence. Since Rayelan had never met Gunther's boss, the man provided information that only Rayelan, Gunther and Gunther Austrian Intelligence superior would know.

The Austrian told her he had helped Gunther write the first part of the article on "Operation Open Eyes." The original article was hand written by Gunther and sent to Rayelan in several different letters. The man from Austria said that he had personal knowledge of the 5 Levels of programming, and that was the part of the article he had helped Gunther write. The second part of the original RMNews article was taken from other letters written by Gunther, alone. The man from Austria said he could only correct the part that he had helped write because he had no personal knowledge of Gunther's own mind control experiences, or how the United States used this method of mind control.

Shortly after the Austrian met with Rayelan, the tragedy at Columbine happened. Rayelan now believes that the Columbine killings were the beginning of the final push to take all guns out of the hands of the American people. One month, to the day, after Columbine, another similar shooting occurred in Georgia. These killings are not random acts of teenage violence. These school killings are a planned, methodical attack on the American Constitution and the freedom which is enjoyed but taken for granted by citizens of the United States of America.

The method of the attack is designed to inflame anger and hysteria in the American public. The media whips up the anger and hysteria and keeps it fresh in America's mind, with continual graphic, around the clock, "overkill" coverage and commentary of the dead and wounded victims, the pain and suffering of the families, and the traumatic scars left on America's children. The President uses the hysteria of the moment to blame guns for the problems in Americas schools and with America's children. In the heat of hysteria, Congress is pressured to pass more guns laws.

The hysteria and anger towards guns, propelled by the President and the media, continues to sweep across America. No one in media or being interviewed by the media, is allowed to speak rationally on the subject of guns. Rational people are shouted down by talk show hosts, as in the infamous Rosie O'Donnell interview with Tom Selleck. Members of Congress who try to point out the fact that existing gun laws don't work, because the Clinton Administration doesn't enforce them, are portrayed by the media as being "on the take" from the NRA.

No one is permitted to step back from the hysteria and consider, that no matter how many gun laws are enacted by governments, not even the total ban and destruction of guns could have stopped what happened at Columbine.

If there were no guns available to the two young men and their accomplices at Columbine, the killings would have happened anyway. A gun was not used to blow up the Murrah Building in Oklahoma City. Guns were not used to kill the 800,000 TsuTsis who were killed in Rwanda by the Hutus.

The children at Columbine and at the other schools across America were killed by other children. The "child killers" used guns, but they could just as easily used machetes or bombs. The man who drove his pick up truck through the window of Luby's restaurant in Killean, Texas used a high powered assault
rifle to murder dozens of people. He could just as easily thrown a bomb through the restaurant window. The bomb would have killed more people than the gun, and the killer would have escaped alive. But a bomb would not have accomplished the first step in the planned take-over of America. That first step is the elimination of all guns in the hands of the American public!

Many of the mass murderers in the recent decade have committed suicide at the site of the killings, or they are killed by a law enforcement officer, once the various government agencies arrive. In several cases of school shootings, the "child killers" have been stopped by teachers or principles who had
guns. If the adult school officials had not had guns, by the time the law enforcement officers arrive, more victims would have been killed. It is also possible that the "child killers" would have "self destructed" by committing suicide. Dead men and boys, tell no tales.

With the "child killers" dead, there is no way to trace back, to its origin in mind control programming, the true cause of the killing spree. If these children have been programmed using a Manchurian Candidate type of mind control, that has been around since the 1920's, and actively used since the Korean War, a trained psychiatrist can find the mind control tracks! For the psychiatrist to do his job, he needs a live "killer", and he needs the cooperation of the local law enforcement officials.

The only way to stop these shootings is to make the public realize that "Manchurian Candidates" do exist, and the kids who are committing these tragic crimes are victims of government mind control. The purpose of the shootings is to inflame the public against guns so that they force Congress to pass restrictive gun laws.

Once the guns are out of the hands of the American public, another twist in random mayhem will begin. More programmed "Manchurian Candidates" will begin anarchistic attacks on the public using bombs, knives, fires, Molotov cocktails, baseball bats and any other item that can be used as a weapon. Anarchy will sweep the streets of the United States.

The public will be disarmed and unable to protect themselves. Therefore, the government will step in and become everyone's protector and Big Brother! The government will do this by suspending the last threads of our barely surviving Constitution, declaring martial law, rounding up the dissidents, patrolling our streets with armed United Nations or NATO military, instituting curfew, and shooting anyone who disobeys any of the newly imposed laws. In other words, a totalitarian government will take control, and if you oppose them, you will be sent to the Gulags.

If the school killings escalate as a Rumor Mill News Source said they will, Congress will be bribed, blackmailed or threatened to pass the bills which will take away out guns. If this happens in 1999 or the year 2000, Bill and Hillary Clinton will be the permanent totalitarian rulers of the United States!

[Editor's Note:  In 2009 - it could be Hillary and Bill Clinton ]

Programmed "Manchurian Candidates" as well as political and government leaders whose own personal agendas have been replaced with mind controlled New World Order "overlays", will work in tandem to bring the United States under the iron fisted rule of a One World Government.

There is enough research on mind control to convince any rational person that mind control and programmed assassins exist. Congress will not investigate this. Our Congress is either bribed with money or promises of high positions in the New World Government, or they are blackmailed and/or threatened with death or the death or their loved ones.

The only hope America has of exposing this and stopping it, is for a courageous community to demand that their district attorney look into the mind control aspect of the shootings. This courageous community must stand together as a united front. If only a handful of residents try to force their local
government to investigate and expose the mind control behind the killing rampages, then that handful can be broken and defused using simple techniques of "divide and conquer", and "smear and attack" These courageous residents will be painted as mentally unstable, or as criminals and pedophiles. If these simple techniques of "breaking and diffusing the opposition" don�t work, then the heavier guns of bribery, blackmail, threats and murder will be used. Only a well coordinated and informed public, with NO LEADER OR SPOKESPERSON, can expose the horror of what is really happening in America.

Why no leader or spokesperson? Because you can never be sure you are not putting a government infiltrator in charge of the attempt to expose the truth. In other words, the only person whose agenda you can trust is your own. This means, if you want the truth exposed, YOU have to do it.

YouTube - BRAINWASH - The Secret History of Mind Control
Dominic Streatfield's book on the recent history
 Watch video - 2 min 21 sec -

http://www.jamescasbolt.com/    [This is the scariest guy I've ever seen]

A History of Secret CIA Mind Control Research Part 1. Techniques used By Government agencies for Mind Control: . By Sid Taylor.

A History of Secret CIA Mind Control Research Part 2. Techniques used By Government agencies for Mind Control:  By Sid Taylor.

U.S. Experiments on Children For decades the US Government has been experimenting on children with the use of drugs, deadly viruses, and radioactivity: by Carol Rutz.

Towards the New World Order America's secret police force. Who are FEMA, the MJTF, and the FINCEN? An insider reveals a taste of things to come.

One of the places where an investigator can begin research is with Satanic cults and children's mental institutions and in house drug rehabilitation programs. Almost all of the children involved in the school killings had attended a Satanic cult or had been in a mental hospital.. These are the two main ways of programming children without parental knowledge. The local authorities or researchers and investigators need to start there.

There have been many books written about CIA mind control programs, but no document or book has exposed the method used to create a programmed assassin.  This article covers the basics of the program. Once you read this, you will understand how and why mass murders such as Columbine, take place. In the case of the mass murders using guns, these mind controlled assassins are being used to sow terrorism in order to force Congress to pass tougher, more draconian gun laws which do not stop terrorism, but take away freedoms Americans take for granted.

In the case of the children being murdered by children. This is a "CIA modified" "Hegelian Dialectic" technique. In other words, if you want society to become something different than it is, you must set up the conditions which will bring about the desired results. The German philosopher, Frederich Hegel called it: Thesis, Antithesis, Synthesis. The CIA calls it: Crisis Creation, Crisis Solution, Crisis Control. (Navy Captain Trenton Parker describes how
the CIA uses this technique in foreign countries to influence politics. See end of article for information. In In the case of Columbine and other similar shootings the scenario is as

An armed America
Horrific violence and mass murders committed by people with guns
Draconian antigun laws which disarm America

The CIA's version of Hegelï's Dialectic omits the Thesis, their version starts with the antithesis:
Crisis Creation replaces Antithesis:

Horrific violence and mass murders committed by people with guns, who were either programmed or in the employee of the CIA or other government agencies Crisis Solution replaces Synthesis:
Draconian gun laws which take the guns away from everyone, including law abiding citizens.
Crisis Control Becomes the New Thesis

In the case of gun violence, the new thesis will resemble a police state, where only the government will have guns

To further illustrate the point. America is a nation full of guns and guaranteed the right to own and bear arms, by the Constitution of the United States.

America cannot be taken over by the New World Order and their socialist/communist agenda, if Americans are armed, (this is the Thesis, an armed citizenry), therefore conditions must be created that will cause the American public to demand that their Constitutional right to bear arms be rescinded.

These created conditions are called "The Antithesis" by Hegel; it is called Crisis Creation by the CIA. In the case of an armed citizenry, the antithesis, or anti-thesis, is random, senseless and horrific murders using guns as the weapon.

When these two conditions, i.e.; an armed citizenry and horrific gun violence, exist simultaneously, public hysteria can be whipped up making the public demand that their Congressional representatives outlaw all guns. This is called "The Synthesis" by Hegel; or Crisis Solution by the CIA..

The "synthesis" then becomes the new "Thesis" for a new triad in Hegel's Dialectic. In the CIA's version of Hegel's Dialectic, the synthesis i.e.; the Crisis Solution brings about the new Thesis which is called: Crisis Control.

When Hitler wanted to wipe Jewish DNA from all of Europe, he created similar "antithesis" conditions which allowed the passage of similar anti gun laws. If all Jews in Germany had been armed, how easy would it have been for Hitler to send them to concentration camps? An armed citizenry can protect itself from its government.

Hitler's plan to eliminate all gun from German citizens was so successful that Connecticut Senator Thomas J. Dodd, father of today�s Connecticut Senator Chris Dodd, used Hitler's model to frame the Gun Control Act of 1968. (More information at end of article.)

The Government's Diabolic Plan Must Be Exposed

If this horrendous, diabolic plan to disarm America is not exposed, we can expect to see many more killings like the ones at Columbine. Each subsequent episode will be 100 times worse than the others. In Columbine, the real people behind the killings were sending a subtle message to anyone who can decipher it: The bombs that were found were not intended to go off. They were merely there to let "key people" in Congress know what will happen the next time. In other words, instead of 15 people being killed, hundreds, maybe even thousands will be killed.

More than likely, there was a "Control Officer" handling these boys. If an honest police unit uncovers him, he will be sacrificed, just like Tim McVeigh. He will be portrayed in the exact way the Tim McVeigh has been portrayed. In other words, he will be part of "The Vast Right Wing Conspiracy", he will be a "gun nut", he will belong to an Aryan Christian group.

Once you read how "Manchurian Candidates" are created, you will fully understand what is behind the incidents like the school killings, the crash of Ron Brown's plane, The North Hollywood bank robbery, the massacre at Luby's, and the killings at the Capitol, (Tom DeLay was the intended target at the Capitol. Maybe he would be interested in how his would be assassin was created.)




There is not a more spine-chilling section in the entire Bible than Revelation 13;. This chapter describes a world dictator, who appears just prior to the Second Coming  of Jesus Christ. He is commonly known as the Antichrist or the Beast. 

This Beast uses a universal numbering system placed on people called “the Mark of the Beast.” No one can buy or sell without this “Mark.” It seems that everyone knows about the number “666,” even those with little knowledge of the Bible, as it is identified as the infamous “devil’s number.” This is probably one of the most widely known verses in the entire Bible.

And he causeth all…to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number is Six hundred threescore and six [(666]). (Revelation 13:16-18)

For centuries, the fulfillment of these verses was a mystery. No one could understand how a marking system would control buying and selling throughout the entire world. It no longer takes “simple faith” to believe this, as the literal fulfillment is now coming together with incredible speed right before your eyes.

Computers, the Internet, Wi-Fi, social media, all modern technology, plus worldwide trends, (such as a one-world economic system and government), are creating conditions that can fulfill Revelation 13:16–18. As the Prophet Daniel wrote twenty-five hundred years ago, knowledge would explode at the very time the 666 Surveillance System came together.

Today a person can use a credit card virtually any place in the world. It has become the universal financial instrument. This instrument is taken for granted, but think how technologically advanced transactions have become when a person can make a purchase in a foreign country without currency. This same purchase is then instantly registered and the funds withdrawn.

All merchandise now is identified with a RFID (radio-frequency identification) labels or the QR (Quick Response (QR) Code for electronic tracking. A smart phone can read the QR Code. The International Business Machines Corporation (commonly referred to as “IBM”)  is now working to identify and track every item manufactured and sold in the world; this is in the trillions. Then it will be very easy to match these items with the purchaser. With the rapidly advancing technology, this is not far off.

The technological ability to operate a world-wide  cashless economic system is now in place for a good percentage of the world. The elimination of cash is all that is needed to bring this system on line. As Tom Horn said on radio this past week, world-wide economic crisis could be the catalyst to set this up.

The Bible states that no one is going to buy or sell without a “mark in the right hand or forehead.” This “Mark” is in the advanced developmental stage with various applications to put “electronic tattoos” on the body. One idea is to merge technology with biotechnology. The micro-electronics technology is called an epidermal electronic system (EES). The idea is to have a substance like silk-laced microelectronics that dissolves and leaves the circuits on the skin. This system is planned to be tied into a universal Wi-Fi. With this structure in full operation, there could be real-time monitoring of everything being sold. No one will be able buy or sell without government approval.

Tied into the ability to control all buying and selling will be the complete monitoring of everything related to you. The Mark of the Beast is a numbering system and now through your Social Security Number, all information about you can be monitored. You need this number for everything from bank accounts to a driver’s license along with all medical information and credit cards. Everything now revolves around your SSN. With the added advantages of newly developing technology, everything controlled by the SSN will be centralized into one file and controlled and updated in real time. This is not theory; it is on the way.

Starting in 2013, the federal government has the Utah Data Center (UDC) nearly in full operation. This is a $2 billion complex with one hundred thousand square feet of computer space. All of the Global Information Grid will be routed through the UDC with computers that can store Yottabytes (1,024 bytes). Everything that is digitalized about you will be stored there, down to parking tickets. Nothing will be left out.

To handle this vast information, the computers will operate at petaflop speed pera second (1,015).  To transmit this vast amount of information, researchers invented chips with built-in lasers which use multiple wavelengths of light that can transmit data at terabit speed per second (1,012).

In addition to controlling buying and selling, we are now heading into a time of a total surveillance society. Every day surveillance cameras are being installed in vast numbers throughout America. Every mall is under total surveillance. By 2015, the government plans for thirty thousand surveillance drones in the sky. There are now x-ray machines that can peer through the walls of your home and auto. The government is using robot insects wired with microphones for spying. There is now software that allows tracking hundreds of cellphones at once and as well reads tens of thousands of emails. Homeland Security recently admitted monitoring Facebook, Twitter, and Google. All the high- tech in your vehicle and cellphone can easily be tracked and stored for your location. All this will be stored in the UDC.

The rebuilding of the World Trade Center shows how advanced and all-encompassing the 666 Surveillance System has become. Surveillance equipment will cover the entire area, with state-of-the-art technology used, including facial recognition systems, retina scanners, and fully-automated, highly “intelligent” cameras that use artificial intelligence along with software to automatically detect any “unusual” movements. All people-movements will be tracked by the computers to detect suspicious behavior and alert the police when necessary. There will be infrared sensors and heat detectors capable of spotting explosives and radiation detectors. All people movements will be tracked by the computers to detect suspicious behavior and then alert the police. The WTC is a prototype of what is coming everywhere as I write [and the secret program outlined in Beast Tech for the year 2017 will take most people completely by surprise]. Picture this surveillance system in every city, state, and nationwide.

All this surveillance information can be instantly tied into the Internet through the coming national Wi-Fi. The ability for complete surveillance of your life is just a few technological advancements away. As technology advances, just imagine how your life will come under complete surveillance. The 666 Surveillance Society is going to be all inclusive and this is leading to an incredible high-tech mouse/man trap with no way out. This is exactly what the Bible said would happen: no one will buy or sell without government approval.

A world dictator, the Antichrist , will soon come to power and use the 666 Surveillance System to require everyone to worship him. Whoever resists will be killed. The “Mark” placed on (or in) the body will be the initiation into this system, which includes worshiping the Antichrist. This means the total rejection of Jesus Christ. The Bible warns that everyone who takes this “Mark of the Beast” will be damned for eternity. Once one receives it, there is no hope; their fate is sealed forever. Please keep that in mind as you read the upcoming new series and book Beast Tech. Right now you can choose Jesus Christ as your Savior, and I urge you to do so. Tomorrow will be a different set of situations as the 666 Surveillance System—as will be thoroughly documented—is coming at petaflop speed.



THE VIDEO:  http://www.youtube.com/watch?v=pPAXsRoiK6c

The loss of our privacy and electronic bondage go hand in hand. Once you are in the system, it is impossible to extricate yourself from it. And now the various agencies, i.e., social services, health care, insurance systems, medical groups, retail sales, credit bureaus, Social Security, the Internal Revenue Service (IRS), vehicle/driver’s license registration, voter registration, etc., are sharing the information in their files about you. As much as you might like to avoid it, there are plenty of places you probably already exist in Big Brother’s “big brain.” One of the biggest cracks in the security of your privacy is the rampant use of your Social Security number to currently identify you just about everywhere. The fact that many of the people who use it to identify you freely print it in public view—or make it easily accessible to anyone who seeks it—makes it relatively easy to obtain information on your most personal activities, and even to make changes in your file.Then there’s the IRS. While its mission statement says it exists to “enforce the law with integrity and fairness to all,” we’ve all felt for quite some time that its staffers know more about us than they need to. This was thoroughly illustrated in 2013..



SmartMetric Plans North American Launch For Biometric Banking With Goal Of 2014 Global Rollout
The card, which the company says is the first of its kind in the world, includes a built-in fingerprint reader to authenticate purchases. Specifically, the card ‘turns on’ when the cardholder’s finger is present on the sensor. Smartmetric is positioning itself to issue its card to customers in the U.S. through a strategic alliance with a bank. The fingerprint activated EMV card will be offered as an “ID and transaction safe” alternative to existing payment systems. The company says it is in discussions with banks in Asia and Europe, planning rollouts for early 2014. Trial releases are planned for later this year. Reported previously, SmartMetric recently announced that it had incorporated NFC technology into its biometric chip card.Last year, the company announced it received additional funding from private investors and that another million dollars would be added into the company chest to help fund expansion projects in Beunos Aires.

Fingerprint Funds Transfers Here
Speaking today from NEW YORK, SmartMetric Inc. President & CEO Chaya Hendrick said the company has developed a system on its fingerprint activated card that allows for fingerprint based card to card funds transfer. Using the advanced electronics inside the credit card sized card, SmartMetric is able to deliver a payment and funds transfer system that uses a person's fingerprint for the ultimate transaction validation. Using the SmartMetric Biometric Card platform will usher in a new and advanced method and system for national and trans-national funds transfers and payments. The SmartMetric biometric card has an inbuilt fingerprint scanner along with an advanced ARM processor and separate memory. The person's fingerprint never leaves the encrypted memory of the card...

Biometric Profiling, Including DNA, Is Dehumanising - Part III
Citizens would face an unprecedented onslaught from the provisions of DNA Profiling Bill and other related surveillance measures being bulldozed by unregulated and ungovernable technology. Biometric profiling of any sort is dehumanising The dangers of trusting identification technologies for determining social policies is bound to be consequential in a situation where “[A] warrant requirement will not make much difference to a society that, under the sway of a naive and discredited theory of genetic determinism, is willing to lock people away on the basis of their genes.” The 21st century ideology of genetic determinism is being promoted through biometric identification. Such identification includes DNA profiling. DNA profiling is ‘undesirable particularly as forensic DNA developments are intertwined with significant changes in legislation and contentious issues of privacy, civil liberty and social justice.


Creator Of 'Left Behind' Video Games Charged With Fraud
The maker of Left Behind-themed video games may have committed fraud by allegedly using a massive stock sale to give investors a false sense of financial stability. The Securities and Exchange Commission (SEC) alleged last week that Troy Lyndon, CEO of Left Behind Games Inc. (LBG), issued close to 2 billion shares to his friend, Ronald Zaucha. Lyndon claimed the money was payment for Zaucha's consulting services, but Zaucha's use of the money suggests otherwise. Zaucha used the stock to boost the video game company's struggling finances by selling millions of unregistered shares in the marketplace, but gave the proceeds back to LBG, Reuters reports.


Humanoid Hunter Killer Robot Can Cross Rough Terrain In Pursuit Of You
Scientists have developed a humanoid robot that is empowered to cross rough terrain. The best thing about the robot is that it can maintain its balance on one leg even when hit from the side. WildCat is the latest creation of Boston Dynamics, a US robotics company part-funded by the Defense Advanced Research Projects Agency. The robot is a part of Darpa's Maximum Mobility and Manipulation programme. Noel Sharkey, professor of Artificial Intelligence and Robotics at the University of Sheffield, told the BBC that the achievement is astonishing and a remarkable feat.Prof. Sharkey, who is also chair of the International Committee for Robot Arms Control, said, "We do not know what military purpose it will serve but certainly it is a step towards a high-speed ground robot that could be weaponised to hunt and kill"



Special Message from Tom Horn


In the days leading up to the reelection of President George W. Bush in 2004, in one of several conversations I had with a fellow evangelical who couldn’t understand my waning enthusiasm for the administration, I listened as the highly educated and very successful publisher said the dumbest thing I’d heard in a while—a statement that is unfortunately being repeated by many sheeple these days. “But Tom,” he said in response to my concern about the erosion of civil liberties, “If you don’t have anything to hide, you don’t have anything to worry about!”

Maybe it was because he was recently returned from a private dinner with then Attorney General John Ashcroft—which included a night of bulletproof limousine rides and exquisite dining locations under the ever-present protection of secret service agents—that my friend seemed asleep at the cerebral wheel.

Or perhaps it was due to the three of us—me, my friend, and Ashcroft—having history and credentials in the same organization, or the fact that one of my co-authors was an old college pal of John’s, or Ashcroft’s winning personality and the afterglow of the piano-playing and gospel-songs-crooning they had shared at the Attorney General’s private residence that night that had disarmed my buddy’s brain.

After all, I’m sure all of this would make it difficult for any hardcore evangelical to understand my point of view: that the nation’s top cop was at that time a scary man working with a group of even scarier men on some pretty scary policies.

Tom (in casual clothing no less)
stops by to see John Ashcroft

Whatever the case, in the days following the election, I was pleased to learn that Ashcroft was stepping down. Almost immediately my bubble burst when insiders told me the celebration had come a bit early, and that John Ashcroft’s pro-abortion replacement was bringing some equally menacing qualities of his own to the thoroughly neoconned White House. Multilateralism was being deemed outmoded, they said, and the new assertion would be that freedom from terrorism would only occur through preemptive action against “enemies of democracy” not only abroad, but also inside the United States.

I knew what they meant, and that it was bound to come sooner or later. I even predicted it; not that I’m a prophet you understand, and not that anybody was listening way back then.

It was 1990 when, as keynote speaker to a packed house of religious delegates (including TBN [Trinity Broadcasting Network] officials), I howled, “If America doesn’t wake up and teach it’s kids to think, we will have a dictator in this country within ten years!”

I still remember the looks on their faces, as if they were musing, Here he goes with that “loss of liberty” speech again. Does Tom really believe that in just ten years Americans will be microchipped, body searched at airports, and detained without warrants?! Doesn’t he know his “evidence gained through torture will soon pierce the heart of the Geneva Convention” line is getting old?!

Of course they were right. I miscalculated. A dictator didn’t take control of the US within ten years like I’d predicted. It now appears he will need a bit more time. But with leading members of the increasingly political and spiritually anemic evangelical community now spouting phrases like, “If you don’t have anything to hide, you don’t have anything to worry about,” it shouldn’t take too long. The eradication of fundamental rights including the presumption of innocence, which my friend either didn’t understand or didn’t cherish, will be easy fodder for the emerging Beast as he plows the inevitable intrusion by federal bureaucrats into every corner of our lives.

Students of the Revolutionary War and the French Revolution will see the irony here. In 1789, while Americans were at long last rejoicing in newfound religious liberties and hard-won freedoms, more than twenty thousand citizens prepared to be executed in Paris’ guillotines beneath the horrific persecution and torture of Maximilien Robespierre. France would witness an unprecedented reign of terror leading up to totalitarianism and Napoleon (whose name, ironically, means “the new Apollo” or “spirit of Antichrist” in the New Testament), in which the masses would in effect be told, “If you don’t have anything to hide, you don’t have anything to worry about!”

In case you’re interested in how today’s preemptive action against “enemies of democracy inside the United States” might likewise materialize, here are the signs I warned of—right from my sermon notes—twenty-three years ago:

Signpost #1—The erosion of privacy:

As you learn to march in cadence to the New American Dream, changes to federal privacy laws will see you watched, monitored, investigated, patted down, detained, harassed, and suspected of criminal activity until you can prove otherwise. To ensure everybody’s uncontested compliance along the new chain-cobbled highway, national ID and exhaustive databases will be networked to track continuous individual whereabouts and activities. Your car, television, computer, sidewalk, and building cameras will assure that Big Brother’s benevolent eyes are watching everything you do.

Signpost #2—The erosion of property rights:

During the coming years, personal property rights will be vastly undermined. Why? Because of sustainable society ideas and also because when government accumulates power in responding to a crisis, it brings with it the authority to commandeer resources. The roof over your head is yours only as long as the government doesn’t want it; every Real Estate agent knows this. It’s called eminent domain, and I watched my grandfather lose his campground as a result of this law. How long will it be before similar principles apply to those hard-earned bucks you have in the bank? Already there is a global push for biometric body-parts-scanning in order to verify your rights to access your own money so that you can buy and sell. Does this sound prophetic to anybody but me?

Signpost #3—The erosion of fundamental fairness and US due process:

Election “mandates” that are given or assumed could waste little time changing valuable court resources. To “make this country safer and to protect our mutual interests,” citizens could expect a gradual decline in constitutional rights including the misuse of laws and regulations by government officials as well as the implementation of new rules for domestic engagement—such as detention without formal charges.

Signpost #4—The erosion of free speech:

Any criticism of the US president and members of the government are currently being viewed as hostile. To speak your mind or disagree in the current political climate can malign you as a terrorist or at a minimum an unpatriotic radical. Like those worried pilgrims who fled in their little boats so long ago to escape totalitarianism in search of America, in the near future dissenters will be viewed as enemies of the state if they challenge the status quo.

Well, I was such a radical back then.

On the other hand, it does seem everything I worried about has come to pass, and much worse in recent days.

Just consider the headlines currently filling daily news stories in which patriotic American citizens are increasingly defined as enemies of the state if they dare challenge the status quo.

For instance, a recent article at the Digital Journal titled, “CTC Says Opposition to a New World Order is Terrorist Activity” states:

West Point is the U.S. Military Academy that trains, educates, and prepares Cadets for their service in the U.S. Army. The CTC (Combating Terrorism Center) at West Point…provides a unique terrorism-based education and since its creation, the program has received international recognition for its studies, reports, and teachings on terrorism and terrorist threats. A new report from the CTC, however, suggests that far right wing political activists, not radical Islamic groups, are the new terrorist threat in America and even goes so far as to say that those who oppose a “New World Order” are potentially violent terrorists [emphasis added] (Alex Allen, Digital Journal, February 2, 2013; viewable here).

Even more to the point was a recent article from the British newspaper, The Guardian, titled, “Chilling Legal Memo from Obama DOJ Justifies Assassination of US citizens,” in which Glenn Greenwald noted how, “The most extremist power any political leader can assert is the power to target his own citizens for execution without any charges or due process, far from any battlefield. The Obama administration has not only asserted exactly that power in theory, but has exercised it in practice.”

Greenwald goes on to cite several examples of US citizens killed under Obama’s orders, including a sixteen-year-old American citizen, and then adds:

Not only is the entire process carried out solely within the Executive branch—with no checks or oversight of any kind—but there is zero transparency and zero accountability. The president’s underlings compile their proposed lists of who should be executed, and the president—at a charming weekly event dubbed by White House aides as “Terror Tuesday”—then chooses from “baseball cards” and decrees in total secrecy who should die. The power of accuser, prosecutor, judge, jury, and executioner are all consolidated in this one man, and those powers are exercised in the dark. (Glenn Greenwald, The Guardian, February 5, 2013; viewable here)

Last but not least, as the book Beast Tech heads to editing, US Defense Department documents were obtained by Judicial Watch, a conservative watchdog group, that warns of “extremists.” The government paper actually describes these as people who “talk of individual liberties, states’ rights, and how to make the world a better place.” The astonishing manuscript goes on in a section labeled “Extremist Ideologies” to say, “In U.S. history, there are many examples of extremist ideologies and movements. The colonists who sought to free themselves from British rule and the Confederate states who sought to secede from the Northern states are just two examples” [emphasis added] (See: “Defense Department Guide Calls Founding Fathers ‘Extremist,’” The Daly Caller, August 23, 2013).

Say what? The colonists that came to America to escape extremism and to demand personal freedoms, sovereign states (the United States of America), and constitutional protections from big government are now to be perceived as examples of radical terrorists? This seems to have been taken right from the warnings of my twenty-three-year-old sermon, which evangelical leaders at the time thought could never happen in this country. Yet, now it’s at our doorstep.

Still, until I took time to investigate Beast Tech with my friend Terry Cook, even I had no idea how far down the rabbit hole we had fallen and how close we really are to a single event that could give rise overnight to the era of Antichrist and the Mark of the Beast.

It is my earnest prayer the research in this upcoming special series and book awakens every reader to the need to draw near to Jesus Christ and to trust Him for their tomorrow.

Time is less than most understand.



by Terry Cook


Some even believe we are part of a secret cabal working against the best interests of the United States, characterizing my family and me as “internationalists” and of conspiring with others around the world to build a more integrated global political and economic structure—one world, if you will. If that’s the charge, I stand guilty, and I am proud of it. —David Rockefeller, Memoirs, 405

The world is in the process of a great shaking, and not just physically (although in fulfillment of prophecy we can expect much more than we presently are experiencing in the physical realm as well). We are being shaken together in order to “even out the playing field,” as it were, both socially and economically. The only way to accomplish this is if each nation surrenders its individual sovereignty to the leadership of a world-governing body or leader, who will in turn see to it that all nations will capitulate, either voluntarily or by force. Naturally, all of this will be “for our own good and/or convenience.” What will finally “shake out” will be that which we have heard so much in recent years: the New World Order.

Many nations would benefit greatly from this “evening out” of the playing field, which, of course, would be at the expense of many others. For them it will cost everything—economy, military, health, education, natural resources, self-rule…in other words, all personal liberty/freedom and possessions.

However, some will not be deceived by this old line that they are “doing it for our own good” and will refuse to “roll over and play dead.” Exactly what can you do about all these rabble-rousers and troublemakers? The only way for such a turnover of power to occur successfully is if everyone complies and cooperates. The “powers that be” have been planning this scenario for centuries. Now that the plan is about to see fruition, they are not going to look kindly upon dissenters or uncooperative types. (In a speech, Rockefeller stated that there was too little time left to get the plan accomplished gradually, because the fundamentalists were waking up, so they are stepping up their speed.)

The first thing the “powers” must accomplish is to remove as many as possible of our constitutionally protected rights and freedoms—legislatively and judicially—in effect, making all dissenters outlaws. Once they have succeeded in declaring their opposition to be the bad guys, then they have all the power of the police, military, and judiciary behind them. You will either join the system or oppose it. Of course, if you refuse to join, you are automatically in opposition and are thus one of the rabble-rousers or troublemakers mentioned above.

The only way that those who enforce the new regulations (for lack of a better word) will be able to achieve their goal of bringing everyone into the New World Order is through surveillance and control. They can’t control you if they can’t find you and keep track of your movements, activities, communications, purchases, et cetera. In other words, there must be a grand and global scheme for the surveillance of everyone before you can hope to control everyone.

An article by Richard Falk states, “It is evident that the new world order as conceived in Washington is about control and surveillance.” Lest you be misled, do not mistake Mr. Falk for a right-wing conservative; on the contrary, he believes that their motives are anything but pure toward equality in the New World Order. In fact, he continues, the New World Order is “not about values or a better life for the peoples of the world” (Richard Falk, contributing author in: Tareq and Jacqueline Ismael, “The Gulf War and the New World Order: International Relations of the Middle East,” University Press of Florida, 1994, 545). He believes the wealthy nations are using their technology as an advantage to keep the poorer nations from being a threat to them.

Although the major thrust of the upcoming book, Beast Tech, is identification and tracking systems, a certain amount of foundation needs to be laid first. Therefore, we will cover a number of subjects in addition to tracking technology.

Some people find this subject matter to be science fiction, some consider it fulfillment of Bible prophecy, and still others consider it the raving of some lunatic who sees a conspiracy under every rock; but the ones who study it carefully see it as the next logical step toward establishing the New World Order. Most, however, are somewhat staggered by the pervasiveness of the proposed systems and its seeming inevitability lurking just on the horizon. In other words, they are experiencing what has come to be known as “future shock.” So we will touch on future shock and its effect on the masses, as well as on the individual.

We will address the New World Order: What is it? When is it? How will it take over? Who’s in charge? Where did the idea originate, and how old is this plan for a one-world government?

Other subjects will include loss of privacy and electronic bondage, the new constitution, the Illuminati, biometrics, barcoding, GPS (Global Positioning System), the cashless society… Let’s pause here for a minute. There are other subjects to mention, but we want to address this subject before we proceed, because we are far down the road toward a cashless society…farther than most of us realize.

This is one of the first few steps that must be enacted to get us ready for mandatory biometric identification, and it is an action that will be taken under the guise of what is “best for the people.” If studied fairly, without consideration for the prophetic implications, there could possibly be a valid argument about whether a cashless society really is for our own good. However, the end result and drawbacks far outweigh any temporary convenience or good it will accomplish. Some of the positive theories and facts you will be hearing more and more about as the time draws closer to being a completely electronic-currency nation are that it will: inhibit terrorism; stop theft, robberies, and muggings; stop international drug dealing; stop income tax cheaters; prevent parents from ducking out of paying child support; and render obsolete the fear of misplacing a wallet or purse containing a roll of cash, among other things. Think of the convenience and safety.

But what are those drawbacks I mentioned? To start with, it probably does not come as a shock to you that everything you have, owe, or own is in a machine somewhere (including your health records, family history, religious affiliations, job history, credit history, political leanings, and much more), which gives anyone with the proper authorization all the information about your personal business. (Yet, currently, it does not take someone with privileged access or authorization to still tap into information about anyone else that should be considered “private” by the standards of yesteryear. A simple search of a non-famous individual’s name on Google will easily prove my point. Have you looked up the satellite and street images of your home property on maps.google.com lately? If you haven’t, it’s more of an intimate view than you think, complete with the kids’ pool toys and tree house, right where you left them, accessible by anyone with the Internet. And oh yeah, they didn’t bother to blur out the license plate on your parked vehicle in the driveway, either.)

The identification system (SMART cards, MARC cards, or whatever they be called) must be tied unalterably to you in order to prevent theft of the card and fraudulent use thereof. The card must be used in conjunction with some other source of positive identification, such as a retina scan or fingerprint match. Can you already see the direction this path is taking? What if your card were lost or stolen? We can fix that. This tiny little biochip no bigger than a grain of rice (and maybe smaller as technology progresses) can be slipped under your skin and give you lifetime access to everything the New World Order will afford its happy members.

Historically, the technology needed to unravel the Revelation 13:16–18 mystery of the Mark of the Beast in this light has been unavailable (no one can buy or sell without the Mark in his or her right hand or forehead). Naturally, the manufacturers of this technology try to assure us that it wasn’t designed for that purpose, but even as they speak, plans are being discussed to implant the “difficult” cases, i.e., the prison population, runaway teens, the elderly who have a tendency to wander off and become lost, and even babies before they leave the hospital to put an end to kidnapping. Doesn’t that sound like a really GOOD thing?

It is old news that the method is already being used widely in pet identification and agricultural animals, but within recent years reports have emerged of tracking and punishing poachers of salmon with implants, and the government ruled that all surgically implanted body parts will henceforth contain a biochip (of course, that’s also for your good, as it retains the information about its manufacturer, your surgeon, how and why it was implanted, etc.), and breast implants are some of the first to be manufactured with the biochip. Another use of radio transponder identification (biochips) was in permanently riveted vinyl bracelets applied to over fifty thousand Haitian and Cuban refugees at the Guantanamo Bay US military base. Since children’s wrists were too small, they were applied to their ankles.

Have you noticed lately how everything on television is smart? Pay close attention to how the rash of commercials has played out over the last couple of decades—AT&T actually called its technology the “Smart Card,” but the term “smart” is used in so many different advertisements that, if you start to pay attention to the evolution of that term in the media, it will amaze you. They want you to be so acquainted with the term (read that as “desensitized to the term”) that it will seem like second nature to you to recognize when something is current.

Throughout the upcoming book Beast Tech, we will document the evolution of biochip technology—its origination, manufacture, current uses, proposed uses, and unlimited possible future uses. We will summarize these facts and introduce the prophetic connections as described in the Bible. We hope, by reading this book, you will be informed and awakened from your slumber—if, indeed, you have been blissfully, but ignorantly, slumbering along, enjoying all this new Star Trek technology without being cognizant of the dire consequences.

In the next entry we will discuss how Future Shock Is Here.




Your wallet and credit cards are obsolete. You may as well leave them at home on a shelf near your dusty antique collection, reminding you of ancient history. While shopping for your shampoo and toothpaste, you need naught but to wave your right hand over a scanner at the checkout counter to pay for and collect your goods, as the amount due will be automatically withdrawn from your bank account.

But, of course, this is either too fantastical to be true, or too far off in the future for you to worry about. Right?

Survey says: Incorrect.

The technology at our hands (literally) before 2017 will cover, and exceed, such a feat. Take, for example, a standard laser scanner (be it handheld or fixed) at any store checkout. The reading of barcodes and Universal Product Codes (UPCs) by machine to report your purchases to a computer is already outdated news. The only old-fashioned cash registers in use in modern times are made of rainbow-colored plastic and produced by Fisher Price. How endearing.

“But just suggest something like an implant in human beings and the social outcry is tremendous,” said Tim Willard ten years ago, then executive officer of the World Future Society, a Washington, DC-based organization that claimed twenty-five thousand members worldwide, including Future Shock author Alvin Toffler. “While people over the years have grown accustomed to artificial body parts, there is definitely a strong aversion to things being implanted. It’s the ‘BIG BROTHER is watching syndrome. People would be afraid that all of their thoughts and movements were being monitored. It wouldn’t matter if the technology were there or not. People would still worry.”

But wait, we’re getting a bit ahead of ourselves here. First we need to define the term “future shock” and how it came into our vocabulary. According to Merriam Webster’s Collegiate Dictionary, Eleventh Edition, “future shock” is defined as: “The physical and psychological distress suffered by one who is unable to cope with the rapidity of social and technological changes.” As words in the dictionary go, this one is of fairly recent origin. The dictionary tells us that it first came into common usage about 1965.

Toffler cannot directly be credited with originating the term, but using it as the title of his book certainly promulgated its wide acceptance, and the definition is one with which most people of this decade are familiar, to at least some degree.

Future shock has come to be considered a negative term that bridges the age gap from children (who feel they are being propelled into the future before they are ready, and that adults have pretty much messed it up for them anyway) to senior citizens (who are befuddled by all this electronic computer technology and long for the “good old days”). It also bridges all areas of life, from banking, economics, and industry to education, social sciences, art, music, communications, databases, etc. We are being hurled ever forward by knowledge that is expanding exponentially.

And the most distressing symptom of future shock is the dehumanizing feeling we experience that we are all becoming nothing more than numbers…and in fact, that is the truth. With the world shrinking because of travel and communication technology and the pressure by the “powers that be” to merge us all into a one-world government (spell that, New World Order), the only way to “organize” us and keep track of us (for our own good, of course), is to give us all a single identification method that can be recognized worldwide.

So, future shock is real…it’s just not very much in thefuture anymore. Future shock is here…future shock is now. Perhaps “Big Brother” wasn’t watching us by the year 1984,as Orwell’s book title speculates, but he wasn’t all that far off target. The technology is here now via fiber optics, wireless transmissions, satellites, and other modern marvels for Big Brother to sit on the information superhighway, right in your living room. The only difference is that during the time from 1984 to now, we have been brainwashed into believing that this is a wonderful thing, so Big Brother didn’t have to force his way in, as Orwell postulated; he is with us by our own invitation.

Biochip—RFID Technology

The very idea of implanting even our pets with identifying microchip transponders was a concept that for years was approached very slowly. “We wanted to make sure it’s right for the animals, and that thecommunity is willing to acceptthis new technology,” said Diane Allevato, director of the Novato, California, animal shelter. Now, however, such high-tech “tagging” is on “fast forward” since people have grown accustomed—by successful conditioning—to what once was considered offensive technology. For example, if people are now willing to have such devices injected into their pets, why would they not put them into their own bodies? Or, to soften the blow just a little, into the elderly or children to prevent wandering from home or kidnapping, prison inmates, and runaway teens, because all that would be for the good of society as a whole. Once you have edged your way into accepting these logical implant choices, it’s no great leap to accept the fact that a nonremovable implant or high-tech tattoo would be terribly convenient and much safer for us than carrying around cards for all our needs (economic, health, passports, travel, etc.)—cards that could be lost or stolen.

Biochip the Size of a Grain of Rice

For pets, the implanted chip is the size of a single grain of rice. It stores a number that identifies the pet’s individual information (including the name of the pet, as well as the name, address, and phone number of the pet owner), which can be accessed by computer via a scan over the outside of the skin.

The Novato, California, animal shelter mentioned earlier was the first shelter in the country to use the biochips. One lady phoned the shelter to say she felt the implants were “unnatural and weird.”

“And there is no doubt about it, injecting an animal with such a chip is a pretty unnatural thing to do,” Allevato said. “But it’s also unnatural, obscene really, that about 15 million stray animals are destroyed in this country each year because their owners cannot be found.”

As of the writing of this manuscript, animal implants are no longer considered “unnatural and weird.” In fact, the system is in common usage worldwide, and the “service” is readily available to pet owners at many veterinarians and animal hospitals. In addition, animal chipping has evolved from being a mere suggestion to becoming a mandate in most urban areas when pets are adopted from a shelter or bought from a store.

The transponder chips being implanted into most animals today are manufactured by four major companies: American Veterinary ID (AVID) of Norco, California; Infopet Corporation of Minnesota; Hughes Aircraft in Southern California; and Texas Instruments of Attleboro, Massachusetts. Originally, Destron IDI Corporation of Boulder, Colorado, began the concept, but it now serves primarily as a research and development company for both Hughes and Texas Instruments, through various joint ventures.

RFID Implants: Are We Ready?

Many more companies have now entered the RFID manufacturing field, and biochip usage now has surpassed the “personal pet” stage and is being used in many different areas of farming, ranching (no need for old-fashioned branding irons), racing, and wildlife identification and monitoring. In conjunction with computer technology, RFID biochips are used to track and monitor the health histories, bloodlines, etc., of various farm animals, race horses, breeding stock, prize-breeding stock, and more.

In the modern dairy business, good ol’ Bessie can come into the barn, pass under a scanner, be directed to her stall, and find her own specially prepared diet in place, just awaiting her arrival—all based upon her identification combined with the computer-stored information about what the handlers want her to eat. Her health records, milk production, and other pertinent factors are all considered, and the optimum diet is assigned to her.

Wildlife has been tagged and tracked manually/visually for many years, but now it is possible to track life as small as a honeybee by attaching an RFID to its back. Of course, this is a real stroke of genius, according to the ecologists, for monitoring all types of wildlife, especially the endangered species.

According to Destron director Jim Seiler, implantable RFID biochips are even being used to track fish. In some fishery applications, salmon are injected with these biochips, then scanned and tracked as they pass through specially equipped dam sites “to assure environmentalists that they are not being chewed up in the dam’s power turbines,” Seiler said.

Following that, reports were coming out of Europe that poachers were being caught and fined because the biochip implants in the fish led the authorities to the poacher. The implications of this announcement were staggering. It meant that the biochip no longer had to be scanned at a close distance of three to twelve inches. It would indicate that technology has been developed and actually put into service that could scan for detection of biochips at great distances, possibly even by satellite. This was, in fact, the ultimate direction biochip technology was heading at the time, as surveillance and control of humans is of far more importance to the leaders of the New World Order than the tracking of animals. Biochips being manufactured now can send and receive data about location and personal information from anywhere in the world, and this technology not only exists in biochips, but a similar technology exists within the digital devices in every purse and back pocket in the country.

Take, for example, your smart phone or laptop (or any other portable convenience like electronic pads, notebooks, etc.). If your phone was purchased within the last couple of years from any major carrier, it likely came with a preinstalled GPS that keeps constant tabs on your travels. And, of course, that’s handy when you need it for navigational purposes. What you may or may not know about this feature is that unless you go out of your way to turn the GPS in your phone off (it stays on perpetually otherwise), it attaches personal information to all other data-share occurrences on your phone.

Remember that picture you took of Aunt Suzie at the barbecue last weekend? Remember when you uploaded that picture to Facebook and tagged all your friends in it? You left your GPS on in your phone at the moment the picture was taken, and now you, Aunt Suzie, and all others tagged in the photograph are shown as “present” at that barbecue event last weekend. The address and map directions to that exact location are provided at no extra cost by the click of a mouse (again, available to anyone with Internet access, not just “Big Brother”). Not only did you unknowingly report the address where you were last weekend, but you reported the location of Aunt Suzie and your friends.


If you chose to leave your personal home address where your spouse and children live omitted from the personal information tab on your Facebook account to ensure privacy, you just negated that safety step by taking a picture of Billy in his highchair and posting it online, forgetting of course to disconnect your phone’s camera from the ever-present GPS. Now Billy can be tracked to his highchair, map and directions to your home included, by anyone online—and it does not stop simply with your phone’s camera. Whereas nobody may be referring to this cellular phone feature as a biochip implant, it’s essentially a chip you voluntarily carry with you everywhere, reporting everything that you do and everywhere you’ve been. If or when a mandatory, government-issued or world-government-issued implantable chip does become the new deal, the leap from your smart phone to the new chip in your hand will not be a hard one at all.

While there are at least “10,000 application ideas to explore when it comes to the chip’s potential,” Seiler originally insisted, “Destron is only concerned with animal identification” and “is not considering HUMAN application” (emphasis added).

“There is no need to apply the technology to humans because the human fingerprint is unique enough to identify them,” Seiler said. “Animals don’t have such a unique identifier.” All present manufacturers deny that they are considering any form of human application; however, the latest info indicates to the contrary.

But Tim Willard, managing editor of the World Future Society’s bimonthly magazine, Futurists, said the technology behind such a human microchip is “fairly uncomplicated and with a little refinement, could be used in a variety of human applications.… Conceivably, a number could be assigned at birth and go with a person throughout life” (emphasis added), Willard said.

“Most likely,” he added, “it would be implanted in the back of the right or left hand for convenience, so that it would be easy to scan at stores.… It could be used as a universal identification card that would replace credit cards, passports, that sort of thing.… At the supermarket checkout stand, you would simply pass your hand over the scanner and your bank account would be automatically debited.… It could be programmed to replace a medical alert bracelet. For example, at the scene of an accident, a medic could scan the victim’s hand to find out his recent medical history, allergies, a relative to contact, etc. This would be especially valuable if the person were un­conscious” (emphasis added).

In another very logical application, such microchips could replace the need for keys to home, car, and workplace locks, since the chip in one’s hand would serve as auniversal key for all such locks. One would simply scan the back of his or her right hand over a high-tech microreader device designed into future locks to gain access. Security would be enhanced tremendously, since, allegedly, no one would be able to “pick” the locks, make a wax copy, or obtain a spare key found under a doormat. Doesn’t that make you feel really safe? Not if you understand that any burglar worth his salt has always found a way around locks and security devices, no matter how complex. It might serve as a deterrent to an inept thief, but a serious crook would manage to get in somehow. The bigger the target, the cagier the crooks. Just think of any major malicious virus caused by such minds in the past ten years online…most designed by brilliant computer-degree-bearing hackers no more intimidated by a futuristic door lock than someone’s email account.

New Biochips of Living Proteins and Hybrid Brain-Machine Interfacing

Some of the simple biochips of yesterday are now new biochips partially made of or with living proteins. According to Willard, “A powerful biochip…once surgically implanted in the brain, could make it possible to program or upload an unlimited amount of information into the mind, without ever having cracked a book…it will be infinitely smaller and have the capacity to carry much more information. It will have a wide range of functions that will simply boggle our minds.”

After hearing more and more news of hybrid brain-machine interfaces (HMBIs), mind-machine interfaces (MMIs), and brain-computer interfaces (BCIs), Willard’s comment seems almost tame. As far back as the 1970s, there has been a significant amount of focus put upon neuroprosthetics (artificial sensory intervention via prosthetics placed directly in the brain, essentially rerouting and/or repairing the brain’s communication with a body part due to birth defects, injury, or disease). After our country has observed the repeated miracles of such evolution between man and machine (literally observing the lame man walk, the blind man see, and the deaf man hear, among hundreds of other marvels of science), the fusion of a biochip with living proteins taking its podium in current labs is not hard to believe.

Loss of Freedom and Privacy

Chapter two of the upcoming book Beast Tech will discuss extensively the loss of our privacy and electronic bondage, but we should at least address it briefly here, as it contributes greatly to thefuture shock condition.

The capabilities described above carry with them the inherent risk of abuse by government and other organizations, particularly over the issue of privacy. How will access to such information be limited and controlled? And if (read that “when”) it is passed around (often without our knowledge, much less our consent) to a variety of entities, both private and governmental, how will we know of errors that occur when someone is updating information? No system is foolproof…errors will always occur somehow. The one at fault for the error will not make any adjustments to their records/databases. You must determine the origin of the error and try your best to get them to correct the mistake (not likely to occur, we might warn you, since admitting such a blunder would make them financially liable for any injury you might have suffered because of their negligence). And getting them to pass such a correction on to everyone who received the erroneous data from them is practically hopeless.

It would be very difficult to impose enforceable limitations on the availability of such information in today’s sophisticated environment of internationally linked databases. There would be no guarantees that confidential information might not inadvertently “leak” out to someone not authorized to have it…except YOU, of course. You are not authorized.

A Human Biochip ID System

A human microchip identification system, Willard said, “would work best with a highly centralized computer systemwhere [only!] one identification number would gain access to medical, credit, academic, home security,” and other kinds of data. But under this arrangement, as you can imagine,security risks are somewhat intense.

“People tend to be idealistic about their independence and privacy, but the reality is that most information pertaining to education, credit history, whatever, is readily available to just about anyone who asks. Anyone who has ever experienced a simple credit check knows this,” Willard said.

One futurist found the concept of microchip implantation in humans offensive. “It reminds me of tattooing concentration camp victims during World War II,” said Robert Mittman of the Institute for the Future, a nonprofit research and consulting firm in California. He said there were better methods of identifying people than “violating the integrity of their skin.” He continued, “Personally, I have problems with it.… People would end up sacrificing some civil rights.”

Another concerned individual is the associate director of the American Civil Liberties Union (ACLU) for Northern California, Martha Kegal. She expressed concern over how private records would be kept from “inquiring minds” if such a system existed.

The System Is Already in Place

But the question is not whether such a system exists, because we all know it does. It is already in place and obvious to all but the most naïve. Rather, the question troubling most intelligent minds would seem to be the system’s final destination, as it were. Whenever we get to wherever it ultimately is taking us…will it have proven to be good or evil? For an answer to this question, we must turn to our Creator’s operations manual, the Bible, for only God knows how all things will end.

Only the Bible Has the Answers

According to God’s Holy Word, the result of all our present circumstances is quite clear. Our generation may well be the one that has been appointed to be alive at the time of the conclusion of all ages, better known as the end of the world.For the first time in history, the technology is available to accomplish the things prophesied in the Bible. Precisely which technology will be used is immaterial—the fact is, never prior to this generation has any technology been available to permit the conduct of commerce in the manner described in Revelation 13:16–17.

Such an end-times scenario necessarily involves the implantable biochip technology (or something comparable) around which the investigative book Beast Tech has been written, for without it, the final worldwide system of satanic government, as outlined in the books of Daniel and Revelation, simply would not be feasible.

Current technological, social, and/or political circumstances soon will lead to a system of universal totalitarian enslavement by means of a global economic network of computerized bartering. This system will be led by a global dictator whom the Bible calls the Antichrist. This Antichrist, Satan’s personal representative on the scene—the final “Hitler”—will successfully orchestrate the affairs of the entire globe via a one-world government. This man will be the very epitome of evil. The Bible tells us about the number 666(of which Hollywood has made such a big deal in horror films). Of course, as is typical with Hollywood, the number really is a “big deal,” even though they treat it as fiction or myth. Consider the following: “That no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number is Six hundred threescore and six” (Revelation 13:17–18).

The Bible is very clear on another thing, too—that even the very elect will be deceived if they are not alert and do not exercise discernment.




Even as we write this entry, we are reminded of the horrendous events that unfolded in Oklahoma City in April 1995, when terrorists bombed a nine-story federal building, allegedly with a single truck bomb parked in front of the structure. Supposedly, Timothy McVeighjust parked the truck, drove away in another vehicle, and detonated the massive bomb from a remote location, or perhaps with a timing device.

This terrorist act affected the federal building, which housed primarily what would be referred to as civilian activities, i.e., Social Security offices, federal assistance offices, and a sizable daycare center, as well as a few such as FBI, CIA, and Secret Service, but the devastation was not limited to that one building. The shock was felt as far away as fifty miles, and the glass in buildings as far away as four to five blocks was blown out, injuring many unsuspecting pedestrians and office workers, as well as a number of other children in the YMCA facility across the street.

The fatalities surpassed one hundred sixty, with a few bodies never located. The medical personnel ran out of body bags and requested that people donate sheets. Dogs with high-tech, extremely sensitive microphones were sent through the rubble in an attempt to locate any remaining survivors. One victim had a leg amputated on the spot in order to be extricated from the debris and have her life saved.

The nine floors “pancaked” down on top of one another and landed in a crater created by the bomb. Despite all the efforts of the engineers to shore up the wreckage, and despite the extreme care taken by the rescue workers, one rescuer was killed and two others were injured in the heroic attempts. The devastation has been compared in magnitude with the earthquake of two years earlier in Northridge, California.

However, there is a big difference between the two events…and the resulting effect on the population both in Oklahoma and across our nation is much more explosive. This act of violence was committed by radical people with a religious or political agenda…hard-line fanatics who practice the principle that the end justifies the means—regardless of the innocent victims who were in no way involved in their cause, either pro or con.

Since this has been hashed and rehashed for nearly twenty years on every TV station, newspaper, magazine, talk show, and in books, you may be asking yourself why we’re bothering to include it here. It is because, when this kind of terrorism strikes the heartland of America, rather than its big cities (such as New York City on September 11, 2001, where people assume such actions may occur), fear grips the hearts of everyone, and prevention becomes the top priority in our minds. A groundswell of cries for justice and protection starts to rise from the grassroots.

Why did this happen? It could be for any reason in any distorted mind. Will it happen again? Undoubtedly. Can we stop it? Probably not. What are we willing to do to try to stop it?Bingo. You are willing to give up some more of your freedoms and willing to submit to more covert surveillance and more control of your lives…because how else can we protect the safety of all those innocent victims?

Of course, the ultimate example of this social phenomenon has increased exponentially since the September 11, 2001 attack on America. The subject has since been discussed and rehearsed ad nauseam with the conclusion that we need to increase our surveillance techniques and strengthen our laws to aid law enforcement units in the tracking and capturing of dangerous dissidents. It has already been pointed out that the CIA, FBI, and Secret Service should have better information-gathering abilities, so they can know about these events before they happen and arrest the culprits on some kind of conspiracy charge before a criminal act has actually been committed.

Everything that’s in us wants to shout, “Yes!” But that brings us back to the question of how much liberty and freedom we’re willing to forego. Are we going to invite “Big Brother” to turn this country into an armed camp (someone on the news referred to it as the “bunker mentality”), with all rights of privacy tossed out the window in the process? If we give over that kind of power, will it stop the terrorism? No. Did it stop the IRA from bombing London on a regular basis? Has it stopped the Islamic terrorists from bombing Israel on a regular basis? Did it protect our Marine base from a terrorist bombing? No, to all of the above. The very nature of terrorism means that you can’t stop it. Terrorists don’t operate by the rules, and they are willing, if necessary, to die to deliver the explosives to the target…and they don’t care who dies with them.

We might succeed in making them go a little farther undercover, and their actions may become more covert, but if they are crazy enough and determined enough, they’ll find a way.

So, what will be accomplished by forfeiting our liberties? We will give the government the right to meddle even more into our businesses and lives…for our own good, of course, as with all the other things it is doing to us for “our benefit.”

In addition to adding personnel to law enforcement investigative agencies, the government wants to enhance the ability of these agencies in its electronic eavesdropping, via emails, telephones, fax transmissions, etc. Also, Big Brother wants to help the telecommunications companies pay for the mandated purchase and installation of new software and equipment to provide access to their digital systems, which would allow the government to intercept and monitor all telecommunications—in many cases without a warrant. Because prior to the Oklahoma City bombing and 9/11, the government was trying to force the telecommunications companies to pay for all these expensive conversions themselves, the companies were trying to avoid cooperating.

As far back as 1994, a particularly enlightening article titled “Privacy in the Digital Age” by Bill Machrone for PC Magazine pointed out, among other hair-raising information, that the “pending legislation provides for fines up to $10,000 a day against telecommunications companies who don’t give the Feds the access they want to the decoded data streams.”

The loss of our privacy and electronic bondage go hand in hand. Once you are in the system, it is impossible to extricate yourself from it. And now the various agencies, i.e., social services, health care, insurance systems, medical groups, retail sales, credit bureaus, Social Security, the Internal Revenue Service (IRS), vehicle/driver’s license registration, voter registration, etc., are sharing the information in their files about you.

As much as you might like to avoid it, there are plenty of places you probably already exist in Big Brother’s “big brain.” One of the biggest cracks in the security of your privacy is the rampant use of your Social Security number to currently identify you just about everywhere. The fact that many of the people who use it to identify you freely print it in public view—or make it easily accessible to anyone who seeks it—makes it relatively easy to obtain information on your most personal activities, and even to make changes in your file.

Then there’s the IRS. While its mission statement says it exists to “enforce the law with integrity and fairness to all,” we’ve all felt for quite some time that its staffers know more about us than they need to. This was thoroughly illustrated in 2013, following a series of eye-opening developments that led to the resignation of the IRS commissioner and a second IRS official pleading the Fifth Amendment when refusing to answer questions before Congress. The fuss followed the discovery that the agency had been inappropriately harassing conservative organizations—such as veterans groups and the Tea Party movement—and selectively investigating them, demanding private details about their religious preferences, and intentionally delaying applications for tax-exempt status. More recently, the Thomas More Society has filed multiple lawsuits to stop the IRS from also singling out pro-life groups with intrusive questions including, “How often do you pray?”

Recent IRS issues plague the Obama administration. Is it
all leading to a breaking point? A "trigger" event?

Before these recent events, the Los Angeles Timesreported:

If you have a back tax bill with the Internal Revenue Service, watch out. In the midst of a program called economic reality, the federal tax agency is going on line, searching for signs of noncompliance as well as electronic records of cars, credit and real estate it can seize from delinquent taxpayers.… A cadre of IRS agents with computers and modems now will be searching records filed with Department of Motor Vehicles, county tax assessor’s offices, credit-reporting companies and the U.S. Bureau of the Census in an effort to find people who are underreporting their business sales, overestimating their deductions or trying to hide assets—or themselves—from federal tax collectors. IRS officials say… “We will be using information from various [electronic] sources as part of our economic-reality approach”… The IRS will begin compiling a host of demographic information about people in each district.… This information will include currency and banking reports, license information, construction contact information and census data.… The IRS will get current addresses for taxpayers who have apparently dropped off the rolls by buying them from credit-reporting companies.… It can get your full credit file to determine whether you have enough credit to pay the bill.… DMV records will be tapped…to see if you have a car to sell to pay taxes—and to help determine whether a taxpayer is lying about income or deductions. The IRS will be suspicious, for example, of a waiter who reports $20,000 in total income but drives a new Porsche. Property records will be used in the same way.… A few credit experts warn that it also puts a burden on individuals who are under IRS scrutiny. Why? The records are not always right. And the tax agency does not need to inform you that it is searching these records, nor is it required to allow you to correct records that are in error…it cannot correct somebody else’s database.… If you’re under IRS scrutiny, it may behoove you to check your own records for accuracy.

Another article on the IRS from the Reno Gazette-Journal discussed how IRS auditors have become “gumshoes” and are training auditors—formerly accountants, for the most part—to be detectives, using all databases at their disposal to compile a composite of YOU—what you should be driving and where you should be living (based on the income you reported), weddings of your children, your cultural background, vacations, home furnishings, etc. They want to develop a complete profile on you. And these techniques have now become standard practice for all audits.

The plan to build such databases for monitoring our activity and to combine such Big Brother bureaucracy with a national ID system has been quietly under development for decades, as we will continue to document in the next entry.



The plan to build Beast Tech databases for monitoring human activity and to combine such Big Brother bureaucracy with a national ID system has been quietly under development for decades.

Consider how over twenty years ago Spotlightmagazine (June 13, 1994) warned under the subtitle, “Danger in the Mail…Now that I Have Free Access to Your Bank Records…Your House Is Next. Nibbling Away Your Freedom Bit by Bit.”

Don’t look now, but Uncle Sam has some shiny new shackles with your name on them. Indeed, sources in the US Postal Service recently revealed that they’re all set to deliver your very own personalized federal ball and chain directly to your mailbox.

            [The Postal Service] told several people that they were prepared to mail 100 million of the cards in a matter of months.…

            The Clinton administration, which says it’s determined to “break the cycle of dependency” among welfare recipients, is preparing to reduce every American to total dependence—and near-total surveillance—through these infamous cards.…

            The Postal Service’s proposal (which was echoed by the IRS—what a coincidence) calls for the card to “mediate” the information about you in every government database. It will be like a magic key, which opens every government database with information about you.

            And here’s another troubling fact. If federal computer systems are already integrated to this extent—where one card can “unlock” every piece of information about you—then what makes you think you have the only key?

            Of course you won’t have the only key. And potentially everything you own and all your assets, benefits and entitlements can be “withheld” from you with the push of a few buttons at the Treasury Department, IRS, or who-knows-where.…

            The databases are ready to be integrated under the card.

The article above reminds of the way Big Brother (in George Orwell’s book, 1984) was able to successfully maintain control over the lives of the people by abolishing all personal privacy. They were under total surveillance, stripped not only of their privacy, but of their freedom, worth, and dignity, as well. Orwell describes the scene this way:

The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level of a very low whisper, would be picked up by it; moreover, as long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was, of course, no way of knowing whether you were being watched at any given moment.

            How often, or on what system, the Thought Police plugged in on any individual was just guesswork. It was even conceivable that they watched everybody all the time. But, at any rate, they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct, with the assumption that every sound you made was heard, and except in darkness, every move was scrutinized.

The Clinton administration consistently pushed for a number of new, high-tech systems to enhance their “people control and monitoring” activities. Among their favorites: the national ID card, the Information Superhighway, “and installation of a federal ‘Clipper chip’ in our telephones, computers, [and modems], fax machines, and other electronic devices,” to allow the government easy access for the purpose of tapping and monitoring all of our communications via those systems. Don McAlvany informs us that even though the clipper chip project was pushed hard by Clinton, Janet Reno, and former FBI director Louis Freeh, it actually was launched by George Bush in 1991 and developed by the National Security Agency (NSA), a supersecret organization. The August 1994 issue of The McAlvany Intelligence Advisor reports as follows:

Reno and Freeh are presently pushing Congress to enact requirements that telecommunications providers (i.e., local telephone services, cellular phone companies, wireless services, long distance networks, etc.) be mandated to develop and install software and equipment that allows the government to intercept and monitor alltelecommunications in America. Freeh and Reno argue that to stop terrorism and organized crime, the American people must give up some of their personal freedom and privacy.” [Note: You can see from the date of this newsletter that this plan was on their agenda long before the Oklahoma City bombing occurred. This just gave them the excuse they needed to push such legislation through the Congress. Kind of makes you wonder whose “plans” benefited most from that act of terrorism.]

The FBI has reintroduced its 1992 proposal to require that communications service providers redesign their equipment to facilitate electronic surveillance. The Digital Telephony and Communications Privacy Improvement Act of 1994 [Note: That title is Orwellian “doublespeak,” because the act will destroy all privacy.] mandates that phones, cable, and computer network companies modify their switches and computers to ensure that surveillance can be conducted concurrently from a remote government facility. All transactions and phone calls (in and out) will be monitored and recorded. Companies who refuse to comply will be fined $10,000 per day.

The Electronic Frontier Foundation has warned: “The FBI scheme would turn the data superhighway into a national surveillance network of staggering proportions.”

The Clintonistas have said that within a few years they plan to link every home, business, lab, classroom, and library via their high-tech computerized information superhighway. TheWall Street Journal warned in an editorial (7/10/94) that even if the Congress blocked the government-backed installation of the “Clipper Chip” that the bureaucracy would make an end run and install it anyway.

The Wall Street Journal pointed out thatsophisticated terrorists and organized crime syndicates could easily evade the “Clipper Chip” surveillance, but that it would enable the Big Brother bureaucracy to monitor every phone call, every credit card purchase, every bank transaction, and every telecommunication of every private citizen in America. The Wall Street Journal concluded that: “The potential for government manipulation and intimidation of the citi­zenry is enormous.”

USA Today (7/20/94) carried a front-page story entitled “Privacy Abuse Confirms the Worst Fear,” which discussed how IRS officials had admitted at a Senate hearing that more than 1,300 IRS agents have been investigated over the past five years on suspicion of improperly snooping through taxpayers’ files. About 56,000 IRS employees (nearly half of the agency’s 115,000 work force) have access to the Integrated Data Retrieval System (IDRS), the computer system that handles collection and storage of taxpayer information.

Evidence of IRS privacy abuses was revealed by the Senate Governmental Affairs Committee in August 1993. Committee member Senator David Pryor (D–AR) said: “The IRS’ disregard of taxpayer (privacy) rights confirms the worst fears that the American people have about the IRS. This illegal and offensive activity must stop, and it’s clear that Congress must act.” But the major problem with the IRS violation of taxpayer privacy rights is not just IRS snooping of taxpayer returns. It is the sharing of that information with dozens of other government agencies—a practice which until recently was strictly forbidden.

The most ominous part of the USA Todayarticle was the revelation that “the IRS is in the middle of an $8 billion computer systems upgrade. Eventually, optical character readers will be used to scan and direct tax returns into three main computers hooked together in a national network that links the ten IRS service centers, eight regional offices, and sixty-five district offices.” (emphasis added)

Because of grassroots pressure and their success in enlightening the populace as to the true meaning and end results of some of these measures, many of the “control” elements of the New World Order have not yet been passed by Congress. But that doesn’t seem to be hindering the progress of the current administration as it moves us forward into the New World Order. And if that becomes a problem, this administration will enact what it wants via an “executive order.” “Executive orders give a president the ability to declare a state of emergency and martial law. This suspends all constitutional rights, converting our democratic form of government into a [total] dictatorship [with merely the stroke of a pen]”. Congress can subsequently accept these executive orders, publish them in the Federal Register, and establish them as laws of the land. These can be implemented at the whim of the current president on a moment’s notice just by declaring a state of emergency.

For example, Clinton used this method to move US troops under UN command (PDD-25 signed May 5, 1994). Executive orders date back as far as Franklin Delano Roosevelt. President Carter signed No. 12148 delegating the power to run the entire country to FEMA (Federal Emergency Management Association), then on June 3, 1994, Clinton signed a new executive order transferring control of the country in an emergency from FEMA to the National Security Council and the national security advisor. Some of the executive orders that subsequently have made their way into the Federal Register are reported by McAlvany as follows:

10995—All communications media seized by the federal government. 10997—Seizure of all electrical power, fuels, including gasoline and minerals. 10998—Seizure of all food resources, farms and farm equipment. 10999—Seizure of all kinds of transportation, including your personal car, and control of all highways and seaports.11000—Seizure of all civilians for work under federal supervision. 11001—Federal takeover of all health, education, and welfare. 11002—Postmaster General empowered to register every man, woman and child in the U.S.A.11003—Seizure of all aircraft and airports by the federal government. 11004—Housing and Finance Authority may shift population from one locality to another. Complete integration.11005—Seizure of railroads, inland waterways, and storage facilities. 11051—The director of the Office of Emergency Planning authorized to put Executive Orders into effect in “times of increased international tension or financial crisis.” He is also to perform such additional functions as the president may direct.

In short, if there should be nationwide riots (a la Los Angeles in ’92) for any reason; a national financial crisis; massive social upheaval (i.e., a huge quantum jump in crime); major resistance to national gun confiscation or to the installation of the New World Order or other socialist/police state measures; etc., [the president]… and his “comrades” have the power and machinery to instantly suspend the Constitution and declare a total dictatorship.(emphasis added)

On April 19, 1995, an article appeared in the Clifton, New Jersey, Herald & News. Writer Rich Calder titled the article, “Clifton Group OKs Listing of Residents; City Council Urged to Register Everyone.” This city called for a computer database with which it could track all residents.

A 26-member committee…recommended last night that the city council approve an ordinance requiring all residents to register with the city. This proposal would obligate all renters and homeowners to fill out a dwelling certificate…listing all occupants in their household. The certificate would require residents to list their names and ages, along with the names and ages of their children. This measure…may raise constitutional issues. Members of the ACLU have said that this procedure will threaten residents’ privacy. Committee members who support the proposal said that people with nothing to hide shouldn’t have anything to worry about.… Mayor James Anzaldi hailed the plan at last night’s meeting, saying the council should implement an ordinance right away.… The dwelling certificate would be supplied by several city agencies.… The proposal also calls for a centralized computer database to be created that would help track…violations.

Are we set to lose our privacy? For sure. But as one lady put it earlier, “You ain’t seen nothin’ yet.” Are we in electronic bondage? You bet. And we are probably already too far into the system to ever get out. All we can do is sound the warning and get prepared for the battle cry, because for most of us, it’s too late to pull a “disappearing act” from the system, unless it’s the disappearing act described in the Bible when the Lord returns to snatch us away. However, we don’t know exactly when that will be, so we must be prepared to survive (victoriously, we hope) in the troubled times that lie ahead, as Scripture is emphatic about one thing: in the end times, things are going to get worse before they get better.

But we are not to despair—we have a blessed hope and lots of promises in the Word from our heavenly Father, such as He “will never leave us nor forsake us.” His instruction is to “comfort one another with these words” and “When you see these things begin to come to pass, look up for your redemption draweth nigh.”

In the next entry we will consider NWO Organizations—The Illuminati and Friends




The Council on Foreign Relations (CFR), Trilateral Commission (TLC), and Bilderbergers (with covert assistance from others) are said to run the world through manipulation of the banking and financial systems.

           In the United States it is the Federal Reserve, a private organization that most Americans incorrectly assume is owned, run, and/or controlled by our government. In other countries, the World Bank is in control of international finance and ultimately tied to a group some call the "Illuminati."

           Webster’s Illustrated Encyclopedic Dictionary gives the following definition under the word “illuminati,” and it couldn’t be more accurate if it had been written by your traditional right-wing conservative.

1) Persons claiming to be unusually enlightened with regard to some subject. 2) a. The members of a secret society of freethinkers and republicans that flourished in Germany during the late 18th century. Also called “Illuminaten.” b. Persons regarded as atheists, libertines, or radical republicans during the 18th century (such as French Encyclopedists, the Freemasons, or the freethinkers). 3) The members of a heretical sect of 16th-century Spain, who claimed special religious enlightenment.

Consider the first definition: “Persons claiming to be unusually enlightened with regard to some subject.” Members of the Illuminati consider themselves to be the only ones qualified and sufficiently enlightened to run the world, and they are power-hungry enough to scheme until they actually control it…and us. The second definition (part “a”) refers to a “secret society” going back to Germany as far as the eighteenth century; part “b” says they were regarded as atheists, libertines, and radicals, and further adds a reference to the Freemasons. The third brings in the religious aspect of the Illuminati, calling it a heretical sect claiming special religious enlightenment.

Where the CFR, Trilateral Commission, and Bilderbergers emphasize control of the world through control of world finances, the Illuminati/Freemasons, Skull & Bones, and similar secret societies found on university campuses around the world focus on education, or the control of the minds of our future leaders. Of course, they all adhere heavily on the “good ol’ boy” network, where anyone who belongs to the organization is assured successful placement in a position of power and prominence. In personnel or other selection, priority is always given to candidates who are brothers of this elite group over applicants or candidates who are not.

Antony Sutton, former research fellow at the Hoover Institution, Stanford University, as well as professor at California State University, Los Angeles, authored the book America’s Secret Establishment: An Introduction to the Order of Skull & Bones. It details the Order of the Skull & Bone (without becoming an initiate), gives a brief background on the origin of the Illuminati, and makes the case for a plausible link between the two groups, though the author is careful to point out that his documentation is inconclusive as yet.

The Illuminati [a secret society] was a group of Bavarian conspirators dedicated to the overthrow of government. The society was founded on May 1, 1776, by Adam Weishaupt, Professor of Canon Law at the University of Igolstadt [while in America we were busy drafting the Declaration of Independence]. The Order of the Illuminati presumably ceased to exist when it was raided by the Bavarian police in 1786.… The Order was dissolved and its seized papers published. Because the Bavarian state ordered the Illuminati papers published, we have authentic information about the organization and its methods of operation.… Subsequent investigation [of those documents] determined that the aim of the Illuminati was world domination, using any methods to advance the objective, i.e., the end always justifies the means. It was anti-Christian although clergymen were found in the organization. Each member had a pseudonym to disguise his identity [a truly secret society in every sense of the term]. (See: Antony Sutton, “America’s Secret Establishment—An Introduction to Skull and Bones,” American Buddha Online Library, last accessed September 25, 2013.)

The Illuminati’s concept of education can be traced to the influence of early nineteenth-century German philosophers. These concepts were introduced in the United States by postgraduate students studying in Europe, bringing their ideas back home with them, then instigating the Illuminati plan to educate our youngsters according to their goals and philosophies.

Antony Sutton states (quoting John Robinson in Proofs of a Conspiracy): “So far as education is concerned, the Illuminati objective was as follows: ‘We must win the common people in every corner. This will be obtained chiefly by means of the schools, and by open, hearty behavior, show, condescension, popularity, and toleration of their prejudiceswhich we shall at leisure root out and dispel’” (emphasis added; ibid.).

Johann Friedrich Herbart was a major German philosopher when the Yale postgraduate students were studying there. Herbart adhered to the Hegelian philosophy (the state is superior to the individual) and thoroughly indoctrinated his protégés in this teaching.

Therefore, “For Herbart, education had to be presented in a scientifically correct manner, and the chief purpose of education,” in his opin­ion, was:

…to prepare the child to live properly in the social order, of which he is an integral part. The individual is not important. The mere development of individual talent, of individual fitness, mental power, and knowledge is not the purpose of education. The purpose is to develop personal character and social morality, and the most important task of the educator is to analyze the activities and duties of men within society. The function of instruction [according to Herbart] is to fulfill these aims and impart to the individualsocially desirable ideas. (emphasis added; Antony Sutton, “America’s Secret Establishment”)

In today’s vernacular, we would call this being “PC” (politically correct). All these ideas in today’s American educational philosophy can be recognized as originating and being transmitted by members (knights and patriarchs) of Skull & Bones, having been learned at the feet of Illuminati educators.

As we progress further into this investigation, you will become increasingly aware of how many people are members of two or more such orders. For example, former president George H. W. Bush is a member of the Order of Skull & Bones (as was his father before him), as well as a member of both the Council on Foreign Relations and the Trilateral Commission. Other prominent contemporary members of Skull & Bones include Winston Lord, former ambassador to China; US senators David Boren of Oklahoma and John Chaffe of Rhode Island; as well as William F. Buckley (was the conservative publisher of The National Review), among others.

According to Sutton, those on the “inside” of Skull & Bones know it simply as “The Order.” Others have known it for more than one hundred and fifty years as “Chapter 322” of a German secret society, which we will discuss in the next entry. For legal purposes it was incorporated in 1956 as the Russell Trust. It was also once known as the “Brotherhood of Death.” The casual name (or the name sometimes used derogatorily) is “Skull & Bones,” or just plain “Bones,” and it is not just another Greek letter campus fraternity with passwords and secret handshakes. It is far more insidious. Chapter 322 is a secretsociety whose members are sworn to silence (they are supposed to actually leave the room if someone outside the Order even mentions the name Skull & Bones). So far as we can determine, it exists only on the campus of Yale University, though rumors are beginning to surface indicating there may be a select number of other locations; additionally, rumors have begun to circulate regarding possible links to a couple of other secret societies on the Yale campus: the Scroll & Key and Wolf’s Head, both founded in the mid-nineteenth century. Allegedly, these are competitive societies; however, Sutton believes them to be part of the same network. It has rules and rituals…ceremonial rites which we will mention briefly a little later.

Sutton states that its members “always deny membership…and in checking hundreds of autobiographical listings for members, [he] found only half a dozen who cited an affiliation with Skull & Bones” (ibid.). He is concerned about whether the many members of the various administrations (either elected or appointed) have declared their membership in the biographical data supplied to the FBI for their obligatory “background checks,” implying that it is not likely.

Further, Sutton asserts, then documents, that the Order is unbelievably powerful.

Skull & Bones is an organization of only senior students at Yale University. Each year, only fifteen initiates are selected in their junior year. The Patriarchs (see below) only meet annually on Deer Island in the St. Lawrence River.

PICTURED: Skull & Bones Members George W. Bush & John Kerry

Admission to Skull & Bones is by invitation only; there is no lobbying, electioneering, or applying for membership. During commencement week, the juniors are privately “tapped.” The junior is given an option: “Skull & Bones. Accept or reject?” This method has not changed since the Order’s inception in 1832. “Those who accept, presumably the greater number, are invited to attend the Bones Temple on campus to undergo an initiation ceremony [described briefly below]… For the ambitious, ‘tapping’ is the magic password to a future [success-guaranteed] career.” Potential candidates are apparently selected based on their school and extracurricular activities, their support of Yale, and particularly their sports ability—teamwork is held in very high esteem. The most unlikely choice would be “a loner, an iconoclast, an individualist, [a person who] goes his own way in the world.” They want people who put the Order first, without question, and who will abide by the rules at all costs. Sutton states:

The most likely potential member is from a Bones family, is energetic, resourceful, political, and probably an amoral team player. A man who understands that to get along you have to go along. A man who will sacrifice himself for the good of the team. A moment’s reflection illustrates why this is so. In real life, the thrust of the Order is to bring about certain objectives. Honors and financial rewards are guaranteed by the power of the Order. But the price of these honors and rewards is sacrifice to the common goal, the goal of the Order. Some, perhaps many, have not been willing to pay this price. (Antony Sutton, “America’s Secret Establishment”)

Initiates undergo bizarre rituals and initiation ceremonies with sexual overtones, conducted on the order of brainwashing techniques designed to strip the initiate of all pride and sense of self. The initiates are then “reprogrammed” to embrace only the philosophies and goals of the Order. (Sutton describes these rituals in great detail in his book.)

At any given time, about five to six hundred members are alive and active. Roughly about one quarter of these take an active role in furthering the objectives of the Order; the others either change their minds or just lose interest and become silent dropouts.


BEAST TECH 8: Skulls, Bones, And Satanism?
Sutton makes the statement while documenting a link between the Union Bank and support for the Nazis during World War II. He traced the flow of money through a long trail that attempted to hide its ultimate destination, and proved the involvement of at least eight men, four of whom were members of the Order (including Prescott Bush, father of President George H. W. Bush) and two of whom were Nazis. As we conclude this section on the Skull & Bones, Brotherhood of Death, we want to discuss the spiritual aspects of the Order. Sutton tells us: “What happens in the initiation process is essentially a variation of brainwashing or encounter group processes. Knights, through heavy peer pressure, become Patriarchs prepared for a life of the exercise of power and continuation of this process into future generations. In brief, the ritual is designed to mold establishment zombies, to ensure continuation of power in the hands of a small select group from one generation to another. But beyond this ritual are aspects notably satanic.

RaidersNewsNetwork Exclusive
Investigation into secret project aimed at 2017

Posted: October 26, 2013
8:00 am Eastern




It has been postulated what the number “322” under the skull and crossed bones of the Order’s logo or official emblem means. Since the organization was imported from Germany in 1832 as the second chapter of a German order, the “32” denotes the year of origination and the following “2” indicates that it is the second chapter of the organization. 

Continuing from our previous entry (Part 7), a more likely theory is that “the Order is descended from a Greek fraternal society dating back to Demosthenes in 322 BC.… Bones records are dated by adding 322 [years] to the current year, i.e., records originating in 1950 are dated Anno Demostheni 2272”.

Inside the Order there are many other numbers and symbols that appear beside the names of the members in the “Catalogue” (or membership list). Although we don’t know for sure, Sutton makes some interesting speculations regarding their possible meaning. The Catalogue contains the birth names of the members, but Sutton tells us: “Entry into the Order is accompanied by an elaborate ritual and no doubt psychological conditioning. For example: Immediately on entering Bones the neophyte’s name is changed. He is no longer known by his name as it appears in the college catalogue but like a monk or Knight of Malta or St. John, becomes Knight so-and-so. The old Knights are then known as Patriarch so-and-so. The outside world are known as Gentiles and vandals.”

In the century and a half years since the Order was founded, active membership has evolved into a core group of perhaps twenty to thirty families, according to Sutton:

It seems that active members have enough influence to push their sons and relatives into the Order, and there is significant intermarriage among the families. These families fall into two major groups.

First, we find old line American families who arrived on the East Coast in the 1600s, e.g., Whitney, Lord, Phelps, Wadsworth, Allen, Bundy, Adams, and so on.

Second, we find families who acquired wealth in the last 100 years, sent their sons to Yale, and in time became almost old line families, e.g., Harriman, Rockefeller, Payne, Davison.… In the last 150 years, a few families in the Order have gained enormous influence in society and the world. (Antony Sutton, “America’s Secret Establishment”)

Although the “old line” families used to look down their blueblood noses at the nouveau riche, that is not so much the case anymore. They have discovered it takes money to maintain their power—not just the name—so if they couldn’t make it on their own, they “married” it into the family. But whatever it takes, you maintain the power at all costs.

The Order has penetrated every segment of American society, e.g., the White House, legislatures, political parties, foundations (charitable and otherwise), think tanks, policy groups, education, media, publishing, banking, business, industry, commerce, and even churches. In many cases, the Order is the founder of these organizations. It determines the goals and objectives, as well as the methods for achieving them, then usually installs the first president, chairman, or CEO and/or CFO. This explains why so many such organizations are based on the premise of secular humanism. Their roots can be traced directly back to active members of the Order.

Since it seems the most unlikely, let’s first take a look at the connection of the Order to the church. Although the percentage has declined in recent years, about two percent of the Order is in the church—all Protestant denominations.

A key penetration is the Union Theological Seminary, affiliated with Columbia University in New York. This Seminary, a past subject of investigation for Communist infiltration, has close links to the Order. Henry Sloane Coffin (1897) as Professor of Practical Theology at Union from 1904 to 1926 and President of Union Theological Seminary, also known as the “Red Seminary,” from 1926 to 1945. Union has such a wide interpretation of religious activity that it has, or used to have, an Atheists Club for its students.

            Henry Sloane Coffin, Jr. (1949) was one of the Boston Five indicted on federal conspiracy charges.

            And this is only part of the Order’s penetration into the church. (Antony Sutton, “America’s Secret Establishment”)

Mr. Sutton expands on the connection between the Order and the other areas, i.e., the law, communications, industry, the Federal Reserve/banking, and the White House/politics/government.

The Law

            The major establishment law firms in New York are saturated with the Order.

            In particular, Lord, Day, and Lord, dominated by the Lord family already discussed; also, Simpson, Thatcher, and Bartlett, especially the Thatcher family; David, Polk, Wardwell, and Debevoise, Plimpton, the Rockefeller family law firm.


            There has been a significant penetration into communications. Some examples:

  • Henry Luce of Time-Life is in the Order.

  • So was William Buckley (’50) of National Review.

  • And Alfred Cowles (’31), president of Cowles Communications, Des Moines Register, Minneapolis Star

  • And Emmert Bates (’32) of Litton Educational Systems, plus

  • Richard Ely Danielson (’07) of Atlantic Monthly

  • Russell Wheeler Davenport (’23), Fortune

  • John Chipman Farrar (’18) of Farrar, Strauss, the publishers.

            The most prestigious award in journalism is a Nieman Fellowship at Harvard University. Over 300 were granted from 1937 to 1968. The FIRST director of the Nieman Fund was member Archibald McLeash.


            The oil companies have their links to the Order. Members Percy, Rockefeller, the Paynes, the Pratts, all link to Standard Oil. Shell Oil, Creole Petroleum, and Socony Vacuum also link. A wide variety of manufacturing firms have members in the Order, from the Donnelly family in Chicago (printers of The Official Airline Guide and other references); lumber companies like Weyerhauser, who is also a Trilateralist; Dresser Industries, and so on.

            The Federal Reserve System

            A dozen members can be linked to the Federal Reserve, but one appointment is noteworthy, Pierre Jay (’92), whose only claim to fame in 1913 was to run a private school and be an obscure vice president of Manhattan Bank, yet he became first chairman of the New York Federal Reserve, the really significant Federal Reserve.

            The White House, Politics, and Government

            This is the area where the Order has made headway, with names like Taft, Bush, Stimson, Chafee, Lovett, Whitney, Bundy, and so on. (Antony Sutton, “America’s Secret Establishment”)

Although we are not yet to our discussion of the CFR and TLC, we briefly address them here as they relate to Skull & Bones Chapter 322.

Though not looking for a spotlight on their discussions and activities, the CFR and TLC are not secret organizations in the sense that the Illuminati and Skull & Bones are secret. Their membership rosters are available to anyone who asks, and they are making the dates and locations of their meetings available to the media, though the media is not permitted inside to witness the activities, nor are members permitted to give interviews revealing what has occurred at the meetings (as spelled out in their bylaws). 

“The Order is represented in these organizations, but does not always dominate. David Rockefeller, former chairman of the CFR, is not a member of the Order” (Antony Sutton, “America’s Secret Establishment”), but the family was represented in the Order by Percy Rockefeller; however, a later CFR chairman, Winston Lord, is a member of Bones.

Visualize three concentric circles, consisting of the inner core, the inner circle, and the outer circle. The outer circle is made up of large, open organizations (e.g., CFR or TLC) some of whose memberships are made up of Bones members. The inner circle is made up of one or more secret societies, such as Chapter 322. The inner core is believed to be a secret society within the Order, a decision-making core. As yet, the existence of this inner core cannot be documented, but evidence points to its existence. Sutton even believes that he could identify the chairman.

The CFR is the largest organization in the outer circle, with about twenty-nine hundred members at any one time (as many as the Order in its entire history). The TLC has 325 members worldwide, but only about eighty in the United States. Other groups in the outer circle include the Pilgrim Society, the Atlantic Council, the Bilderbergers, and the Bohemian Club (of San Francisco). As an example of the number of Bones members who are also members of the CFR, following are just the Bonesmen whose last names began with the letter “B”: “Jonathan Bingham (congressman); William F. Buckley (editor,National Review and the Order’s house conservative); McGeorge Bundy (foundation executive); William Bundy (Central Intelligence Agency); George Herbert Walker Bush ([former] president of the United States)” (Antony Sutton, “America’s Secret Establishment”).

The Trilateral Commission was founded in 1973 by David Rockefeller, who was not a member of the Order. The same appears to be true of many TLC members; however, if you investigate the family tree, you will find members of the Order sometimes as close as one generation removed, and in other cases in the family line in great numbers. Sutton points out that the TLC is not a conspiracy, it just doesn’t publish its activities too widely, as the general populace probably wouldn’t appreciate what it is planning for us behind closed doors.

Sutton reports that he “has openly debated with George Franklin, Jr., coordinator of the Trilateral Commission, on the radio. Mr. Franklin did show a rather ill-concealed dislike for the assault on his pet global New World Order—and made the mistake of attempting to disguise this objective.” Where the TLC is concerned, even though David Rockefeller is not a Bones member, keep these facts in mind: J. Richardson Dilworth, chief financial and administrative officer for the Rockefeller Family Associates, is a member of the Order, as was Percy Rockefeller (1900). And the TLC’s purposes, as portrayed in its own literature, are almost identical to those of the Order.

So far as Sutton can determine, William F. Buckley was the only member of both the Order and the Bilderbergers. The Pilgrim Society has no current Bones members, but the family names of past members are found, i.e., Aldrich and Pratt.

We have discussed the guarantees of success for Bones members, as well as the intermarriages to consolidate the power, wealth, and influence of the families. Now, we will look at the chain of influence.

“A chain of influence spread over many years guarantees continuity and must be extraordinarily impressive to any new initiate who doubts the power of the Order” (Cybrarian, “The Germanic Order of Skull and Bones,” CIAgents, last accessed December 5, 2010). “Members of the Order are to be found in every segment of society [or our existence]: in education, foundations, politics, government, industry, law, and finance. Consequently, at any time the Order can tap influence in any area of society.… [The major occupations, however, are in] law, education, business, finance, and industry” (emphasis added; Antony Sutton, “America’s Secret Establishment”). Percentages of Bones members in each area follows: 18 percent, law; 16 percent, education; 16 percent, business; 15 percent, finance; 12 percent, industry. The remaining 23 percent is scattered among all remaining occupations.

Sutton makes a good case for the interference of the Order in promoting wars and conflict in order to maintain and increase its world control: “If we can show that the Order has artificially encouraged and developed both revolutionary Marxism andnational socialism while retaining some control over the nature and degree of the conflict, then it follows the Order will be able to determine the evolution and nature of the New World Order” (emphasis added; Antony Sutton, “America’s Secret Establishment”).

Sutton makes the above statement while documenting a link between the Union Bank and support for the Nazis during World War II. He traced the flow of money through a long trail that attempted to hide its ultimate destination, and proved the involvement of at least eight men, four of whom were members of the Order (including Prescott Bush, father of President George H. W. Bush) and two of whom were Nazis.

As we conclude this section on the Skull & Bones, Brotherhood of Death, we want to discuss the spiritual aspects of the Order. Sutton tells us: “What happens in the initiation process is essentially a variation of brainwashing or encounter group processes. Knights, through heavy peer pressure, become Patriarchs prepared for a life of the exercise of power and continuation of this process into future generations. In brief, the ritual is designed to mold establishment zombies, to ensure continuation of power in the hands of a small select group from one generation to another. But beyond this ritual are aspects notably satanic.”

We can make at least three definite statements about links between the Order and satanic beliefs. First, photographic evidence documents the satanic device (as well as the name) of the skull and crossed bones. Second, there is a link to satanic symbolism. Third, the link between the Order and the New World Order has been well documented in such books asHidden Dangers of the Rainbow by Constance Cumbey.

The skull and crossed bones is not just a logo or printed artwork; photographs exist that show the use of actual skulls and bones in the ceremonies of the Order. According to other evidence, at least three sets of skulls and other assorted human bones are kept within the Bones Temple on the Yale campus. At best, that makes the members grave robbers. But using these bones for ceremonial purposes shows absolutely no respect for the dead, and is a blatantly satanic activity.

Cumbey identified and linked several organizations to the Order and its objectives. She identified Benjamin Creme and the Tara Center as a New Age phenomenon, then linked Creme to the Unity and Unitarian churches. Sutton continued the chain by pointing out the Order’s longstanding and significant link to these churches.

“Former president William Taft, whose father co-founded The Order, was President of the Unitarian Association in his time. Cumbey identifies the link between Hitler and the New Age movement and former research by this author linked The Order to the founding and growth of Naziism.… Cumbey states that the New Age movement plans to bring about a New World Order ‘which will be a synthesis between the U.S.S.R., Great Britain, and the United States’” (Antony Sutton, “America’s Secret Establishment”). Later information indicates that it will come closer to encompassing the entire world, i.e., both industrialized nations and third-world countries.

“Finally, Cumbey points out that the anti-Christ and satanic aspects are woven into the cult of the New Age movement”. The goals and activities of the Skull & Bones and its leaders’ plans for our future are undoubtedly satanically inspired.

As we move on to investigate the groups that endeavor to control world governments, wars, etc., through control of finances, we will discuss US money and its emblems. That means going back into the discussion of the Illuminati and Freemasonry, as they are at the root of most of these satanic symbols.