UPDATE: 6/7/22
YOU NEED TO SEE THIS!  It is hard to argue with black and white.  Everything that has been happening with this “Plandemic” is laid out in the document that sparked this outrage.  God bless Alex Jones for putting the focus on this document when it came to light.

The AI is collecting data as it designs each step in the plan to bring TOTAL CONTROL.  AI is strategizing, and it does not even need to depend on spies to feed it data… AI SPIES are all around us, in our appliances, in our technology like phones, computers, ipads, even OUR CARS!!  Every where we go and every thing we think do and say is recorded in the databank.

From that data, the AI sets the strategy.  When the  OVERLORDS take a question to the AI, it runs through all the possible scenarios and hands them the optimum plan to be executed.

THAT is what you see in the SPARS 2025-2028 Document.   The AI orders to be executed in order to accomplish the design for that portion of the TAKEOVER.

The RICH, WEALTHY, ILLUMINED men were struggling to figure out how to get people to comply.  They continued to be frustrated by the numbers of people who would balk and buck.  AI was developed to resolve that problem.  AI is capable of playing out all possibilities, and determining the best solution.  Instead of using this for the good of mankind, those in power are using it to become gods!!

Alex Jones is joined by Rob Due and Mike Halperin do a fabulous job of breaking down and presenting this very overwhelming document.  I STRONGLY suggest you listen!!  You can’t afford to miss this information.


Anthony Fauci is on video in 2017 predicting the current COVID outbreak. He would know, because he spent +$4 million at the Level 4 facility in Wuhan, China to bioengineer its so-called “gain of function”. And that was only one of similar bioweapons that he developed with US Tax Dollars.

Also in 2017, Johns Hopkins published “The SPARS Pandemic 2025-2028”, a report about a communications drill for a vaccine that “accidentally” caused spongiform encephalopathy aka “Mad Cow” prion disease.

There is a concern, that as with other “drills” they have published in the past, such as Crimson Contagion and Event 201, the SPARS report will turn out to be the actual battle plan of a slow-kill genocidal attack on the populace, especially because aspects of it have already unfolded like clockwork. We are a little over a year into a three-year drill that’s supposed to usher-in this post-COVID world of endless vaccinations and spongiform genocide.

In the SPARS drill, it is the politicians – not Big Pharma – who are blamed for speeding up the release of the vaccines without proper testing and trials, causing millions of cases of brain damage due to prion disease starting 6 months to a year after the injection, just as Dr Sherri Tenpenny predicted. Alex Jones says here that “Trump really stepped into it. He got set-up, bigtime.”

The SPARS report is the smoking gun, the blueprint for what we’ve been living through and what we can expect next. It detailed how they would censor people and how they would conduct the cover-up three years before it actually happened. It’s a script of talking points for the Globalist minions who are executing the diabolical plan being unleashed upon us now.

The intended result of SPARS – and we can infer, of COVID – is to centralize all global medical authority within the UN with a multi-billion dollar Marshall Fund to enact total medical tyranny that makes our current restrictions seem like a mask-free walk in the park.

Alex Jones is joined by Rob Due and Mike Halperin, who have each read the 89-page document with their insights, to help us prepare and defend against what these demons are doing.


The SPARS Document

Jun 11, 2021

In 2017 John Hopkins Center for Health Security published “The SPARS Pandemic”. This document is described in its disclaimer as being “a hypothetical scenario designed to illustrate the public health risk communication challenges that could potentially emerge during a naturally occurring disease outbreak…” and that “The infectious pathogen, medical countermeasures, characters, news media excerpts, social media posts, and government agency responses described herein are entirely fictional.”. In 2021, four years after “The SPARS Pandemic” publication, it seems to be more of a grim reality than a fictional scenario. Despite the unbelievable similarity this document has to our current global situation, this is nothing we haven’t seen before. In fact, a similar happenstance took place recently with another “fictional” scenario, Event 201, which also was spearheaded by John Hopkins Center for Health Security. The similarities from these scenarios should not, and cannot be ignored. If Event 201 was the blueprint on how covid19 would begin, then SPARS is the blueprint on how it will end. We should all pay close attention to how these scenarios play out if we are to avoid the fate that is described in these works of “fiction”. ► Read “The SPARS Pandemic” https://www.centerforhealthsecurity.o… ► Support me on Patreon! ► WhatHerFace Merch now Available!… ► Please subscribe and follow me on social media! Subscribe on YouTube: My New Instagram: Odysee: Rumble:



channel image


 April 9th, 2021.



To Watch This Video on BITCHUTE: CLICK HERE


Redditor “chinknadians-bumhole” posted on August 6, 2020, “Why is no one talking about this?” on r/conspiracy_commons.

This PDF was made by John Hopkins University and released in October 2017. It’s about a hypothetical worldwide Coronavirus outbreak in 2025 (called the “SPARS” pandemic), and specifically it’s effect in the USA.

In this scenario, after several months of the pandemic going around, hundreds of thousands of people die from it, and eventually a vaccine is produced and successfully administered to the American populace.. or so it seems…

After a while, a noticeable amount of parents all around America complain because their children developed MENTAL RETARDATION as a result of the vaccine, and eventually the company that made the vaccine is successfully sued for vaccine damage.

See chapter 17th, titled “Vaccine Injury”



December 17th, 2020.

Covid-19 was in the planning for years and was first created as a scenario ( and mentioned IN this 2017 John Hopkins report!) JUST as the above SPARS PANDEMIC SCENARIO 2025-2028 was created and is the scripted follow-up to the NEVER ENDING vaccines and pandemics that are planned to keep you enslaved to the pharmaceutic industry and the ONE WORLD GOVERNMENT currently taking down all nations.


HERE IS WHAT THE MEDIA FACT CHECKERS HAD TO SAY IN RESPONSE TO THE OUTRAGE THAT HAS RISEN IN RESPONSE TO THIS DOCUMENT.   Basically: “Nothing to see here…just keep moving…  Just those CRAZY Conspiracy Theorists, pay them no mind.”


Fact Check: 2017 Fictional ‘SPARS Pandemic Scenario’ Document Is NOT Proof Of A Planned Pandemic

Fact Check

  •  by: Sarah Thompson
Fact Check: 2017 Fictional 'SPARS Pandemic Scenario' Document Is NOT Proof Of A Planned Pandemic


Does the existence of a fictional pandemic exercise scenario conducted by the Center for Health Security at Johns Hopkins University prove that the COVID-19 pandemic is a globalist plot for world domination? No, that’s not true: Conspiracists are misrepresenting the design of this exercise and professional familiarity with various aspects of global health emergencies as proof that those professionals created and are controlling the pandemic for their own benefit.

The claim was presented in an “Emergency Saturday Broadcast” by InfoWars and has been redistributed through many channels. One edited version of the original video appears on Facebook in a post (archived here) published by “USA Update” on April 3, 2021 under the title “#AlexJonesShow HR2- EMERGENCY SATURDAY – World Shocked By SPARS 2025-2028 Document.”

This is what the post looked like on Facebook at the time of writing:

(Source: Facebook screenshot taken on Tue Apr 6 17:11:07 2021 UTC)

The original InfoWars video, almost 94 minutes long, is posted on It is titled, “Emergency Saturday Broadcast! World Shocked By SPARS 2025-2028 Document,” and in the caption a link to the SPARS Pandemic document is offered. The intro caption also says:

A 2017 Johns Hopkins document details plans for Big Pharma global domination.
“This document is the holy grail. The key to defeating the globalist.” – Alex Jones

That’s clear from the start of the SPARS Pandemic scenario book (PDF) from the Johns Hopkins Center for Health Security. At 89 pages long, it is formally titled, “The SPARS Pandemic 2025-2028 – A Futuristic Scenario for Public Health Risk Communicators.” On page 6 of the PDF, before the preface, a full page is dedicated to this short disclaimer:


This is a hypothetical scenario designed to illustrate the public health risk communication challenges that could potentially emerge during a naturally occurring infectious disease outbreak requiring development and distribution of novel and/or investigational drugs, vaccines, therapeutics, or other medical countermeasures.

The infectious pathogen, medical countermeasures, characters, news media excerpts, social media posts, and government agency responses described herein are entirely fictional.

In other words, it’s all made up, including the name of the virus.

This document is an example of scenario planning, or scenario analysis. The preface of this fictional scenario describes a health emergency, and possible situations that could arise, specifically in the context of the digital era, when “social fragmentation and self-affirming worldviews” from the internet and social media platforms could play a role in outcomes. This type of scenario planning and analysis exercise is used in a wide variety of recreational and vocational settings. Role-playing exercises are not unique to public health.

The dramatic headline of this InfoWars video — “Emergency Saturday Broadcast!” — is clickbait. The existence of this “SPARS Pandemic Scenario” project, which Jones has mischaracterized as a plan rather than an exercise, has not been a secret, not in the medical world, the press or even among conspiracy peddlers. The release of this “self-guided tabletop training experience” was announced in 2017 in a news release by the Johns Hopkins Center for Health Security. This October 23, 2017, posting, “Center for Health Security releases risk communications exercise scenario focused on medical countermeasures in a pandemic,” remains listed among all the 2017 entries in the chronological archive of the center news.

On September 8, 2020, CNN Health published an article titled, “Experts predicted a coronavirus pandemic years ago. Now it’s playing out before our eyes”. In the article, the scenario-based teaching tool was described this way:

Reading the SPARS Pandemic Scenario is like reading an account of the Covid-19 pandemic. But the scenario wasn’t an attempt to predict the future. Rather, it was meant to illustrate a broad range of serious challenges that public health communicators might face. The hope was that by working through these challenges as part of a training exercise, federal, state and local agencies would be well prepared to respond to a similar scenario in the future.

Other conspiracists have already seized on and misrepresented the detailed text of the communications exercise scenario months ago. Redditor “chinknadians-bumhole” posted on August 6, 2020, “Why is no one talking about this?” on r/conspiracy_commons. Diana-Lenska posted her video, “SPARS PANDEMIC SCENARIO 2025-2028 “WELCOME TO YOUR FUTURE!”” on BitChute on December 17, 2020.


Folks the “magicians” want you to remain asleep.  They are so close to achieving their goal…the last thing they want is for you to come out of your COMA!


You can find much more on this in my Post: FINAL SOLUTION – CROWN OF DEATH



WE ARE STILL LIVING IN JADE HELM.  That is the program.  That is the ongoing scenario.  UNTIL they have TOTALLY MASTERED THE HUMAN DOMAN!

The following information will make that very clear.

JADE HELM actually stands for the amazingly obtuse:
Assistance for
Eradication of
Local Militants.
What you don’t understand is the YOU are the LOCAL MILITANTS they want to ERADICATE.  Anyone who is not compliant, who does not willing surrender to total slavery!!   Hard to imagine…but it IS THE TRUTH!

We May Finally Know What JADE HELM Has Stood For All Along

That the name might be an acronym is only part of what’s odd about this year’s iteration of the controversial special operations training ex

Joseph Trevithick
JUN 29, 2019 6:56 PM


Two years after the U.S. Special Operations Command’s (SOCOM) Jade Helm training exercise inflamed conspiracy theorists, prompted Texas to order its state guard to monitor federal troops, and otherwise became a national news story, the latest iteration of the event has come and gone with little acknowledgement of any kind from the U.S. government or the public. And yet, the U.S. military has still found a way to make it weird, including the suggestion that Jade Helm is actually a very long acronym.

Jade Helm 2017 reportedly occurred, at least in part, between May 2 and 5, 2017, according to one official U.S. Air Force news item. The story explains how the service supplied C-130J and C-17 airlifters to help move and airdrop at least 40 personnel and more than 120,000 pounds of cargo in support of the practice session. The crews flew some of the missions to and from Dyess Air Force Base in Texas and Joint Base Charleston in South Carolina.

None of this sounds out of the ordinary for a training exercise within the United States, especially given that the 2015 version of Jade Helm involved separate events in multiple states designed to simulate various so-called irregular and unconventional warfare scenarios throughout a fictional region containing friendly, enemy, and neutral “countries.”

Irregular warfare is essentially another term for guerrilla warfare, relying on indirect actions to win the support of a specific population. Unconventional warfare is the U.S. military’s broad term for working with local forces to resist an occupying force, undermine a hostile government, or just support conventional military activities. These are core missions for American special operations forces and are common subjects for training exercises. In February 2017, American special operators joined their colleagues from the Baltic States of Estonia, Latvia, and Lithuania to stage a mock guerrilla war in West Virginia called Ridge Runner 2017.

But then things get a little odd. There only appears to be one official news story on this exercise at all and it’s available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were

more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military’s public affairs hub, brings up more broken links. Amusingly, the only place on the web that seems to have the bulk of the public domain pictures from Jade Helm 2017 is stock photo site Alamy, which has them available for purchase.


One of the official Jade Helm 2017 images, showing a Humvee backing onto a C-130J airlifter, which was mirrored on another website., USAF

Oh, and unless there’s been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. These are exactly the sort of vagaries that provide space for conspiracy theories. In particular, the phrase “Homeland Eradication of Local Militants,” the official meaning of which no one ever explains in the Air Force story, sounds almost engineered to provoke the same concerns from same communities that came up surrounding the 2015 exercise.


The leaked map of the Jade Helm 2015 operating areas that touched off a number of conspiracy theories., SOCOM

For those who don’t know – or have thankfully forgotten – that training exercise prompted a laundry-list of conspiracy theories, including a particularly complex idea that the United Nations was mobilizing a Chinese military force to sneaking into Texas from Mexico via tunnels leading into abandoned Walmart stores. No, really. At the height of the public interest in the exercise, The War Zone’s own Tyler Rogoway, then writing for Foxtrot Alpha, wrote this:

I can’t deny that Operation Jade Helm sets up a ripe canvas for which conspiracy theorists can paint their biggest nightmare scenarios. In reality, it is just another exercise in a never ending list of DoD and homeland security drills that deal with everything from huge earthquakes and multi-national air wars to counter-terrorism offensives and zombie infestations. Yet even the Texas Governor’s office is getting on the conspiracy theory bandwagon to some extent, commanding the volunteer reservists of the Texas State Guard to keep close tabs on the exercise as some constituents are demanding.

While at War Is Boring, I followed up on this monitoring mission, finding that the State Guard had done the absolute bare minimum to keep tabs on the situation. Thanks to the Texas State Public Information Act I obtained a transcript of a series of almost hilariously banal text messages between Texas State Guard commander Brigadier General Gerald “Jake” Betty and Lieutenant Colonel Robert Pawlak, a U.S. Army Special Forces officer with the thankless job of acting as the main spokesman for the exercise as it increasingly became a public relations nightmare. Pawlak even held a number of town hall style meetings with local groups in an attempt to allay fears that had gotten a certain legitimacy not only because of the actions of Texas Governor Greg Abbot, but also thanks to comments from Texas Senator Ted Cruz and notable celebrities, including Chuck Norris.


U.S. Army special operators train in 2013., US Army

Just as in 2015, there is absolutely nothing to suggest the latest Jade Helm exercise is actually in any way a cover for something nefarious. These types of training exercises are common and routine. However, as in this case, the haphazard way in which information about them is released or otherwise communicated to the public, also seems to be an unfortunate, but regular occurrence.

In 2008, residents of Portland, Oregon were disconcerted to see special operators in helicopters over head, with an alert about the training exercise only going out to the general public an hour ahead of time. Media attention subsequently became so intense that the organizers had to move whole event to another area entirely. Similar incidents occurred in Miami, Florida and Galveston and Houston, Texas in 2012.
The biggest part of the problem seems to be the delegation of authority for informing the public at large. As a rule, SOCOM doesn’t put out public missives itself about what’s going on so as not to encroach on local authorities. It’s also designed to help protect their tactics and procedures from unwanted attention, as happened in Portland in 2008.

“We try to protect most of our tactics, techniques and procedures for operational security reasons,” SOCOM spokesman Ken McGraw told me in an Email in January 2017. “USSOCOM units do provide information to the media concerning Realistic Military Training.  The information is usually released by the local law enforcement organization that is working with the USSOCOM unit.  The information is generally released for general public awareness or public safety reasons. USSOCOM units generally comply with the advice of local officials or law enforcement when to release information and what information to release.”



I had inquired as to the procedure after obtaining the two official notices regarding the 2012 practice sessions in Florida and Texas. In both cases, censors redacted the list of individuals who had been briefed on the events, referred to simply as “Realistic Urban Training” or RUT. At the bottom of both notices, which give a basic overview of what locals could expect to see and hear, there is a boilerplate line, with emphasis added, reading “We request this information NOT be released to the press.”


A special operations sniper moves into position during a competition in 2012., US Army

Of course, as Pawlak’s town halls show, sometimes things require military spokespersons to go out and clarify things. Unfortunately, this seems to occur mainly when relations with the public have already been strained by poor communication on the part of state or local officials, many of whom have likely been in the know the whole time. They have to be for safety reasons. It otherwise seems that when these exercises go off without a hitch, you don’t even hear about them until months after the fact.

All in all, it seems like a system that could do with some improvement, whether it be a standardized mechanism for alerting the public or a more clearly defined chain of responsibility for doing so. Until then, it seems like that these otherwise benign training events will continue to be a regular source of consternation.

Contact the author:


It’s getting crazier day by day now, so are you following the Boy Scout motto?

On this topic, Baden-Powell says: Remember your motto, “Be Prepared.” Be prepared for accidents by learning beforehand what you ought to do in the different kinds that are likely to occur. Be prepared to do that thing the moment the accident does occur. In Scouting for Boys, Baden-Powell wrote that to Be Prepared means “you are always in a state of readiness in mind and body to do your duty.”

Why should you be prepared? Because TPTB have been preparing, that’s why.

June 12, 2014: The Guardian • Pentagon preparing for mass civil breakdown.
Social science is being militarised to develop ‘operational tools’ to target peaceful activists and protest movements Source Here

Pentagon preparing for mass civil breakdown. It seemed ludicrous back in 2014, didn’t it? Inconceivable. Sure some preppers believed it, but they’re always getting ready and nothing happened. Doomsday was always right around the corner, and then the next corner, and on and on. Televangelists have probably accused more politicians of being the antichrist than the number of politicians went to Epstein’s Island.

But why would they be preparing for mass civil breakdown? Could it be the same reason as why the miltary is preparing for war, droughts and famines brought about by environmental collapse?

February 20, 2020: History Network • Here’s Why These Six Ancient Civilizations Mysteriously Collapsed. From the Maya to Greenland’s Vikings, check out six civilizations that seemingly disappeared without a trace. Source Here

All of these civilizations vanished because of some combination of exhausting their natural resources, drought, plauge, and the little ice age. Sound familiar? Don’t tell me that the Rockefeller Foundation and BlackRock became environmentally aware out of a sense of obligation to the planet. They’re setting the groundwork for what’s coming down the pipe. This isn’t about money anymore, this is about control and survival. Throw out the rulebook because the rules no longer apply.

Do you think the surveillance system is for your protection, or the protection of the state? Don’t you think that an era of upcoming calamities will severely damage the communication networks, and thus the surveillance system? It might be prudent to consider that Starlink is being established to make the system redundant, so that they never lose track of the precious worker bees before they can be connected to the AI hive mind, right Elon? Neuralink, don’t leave home without it.

But let’s not forget about the wonderful world of the Internet of Things.

March 15, 2012 • More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them.
Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”
All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.
“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.”
Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of “our notions of identity and secrecy.” All of which is true — if convenient for a CIA director.
The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation.
That’s not the only data exploit intriguing Petraeus. He’s interested in creating new online identities for his undercover spies — and sweeping away the “digital footprints” of agents who suddenly need to vanish.
“Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come,” Petraeus observed. “Moreover, we have to figure out how to create the digital footprint for new identities for some officers.” Source Here

December 19, 2019: New York Times • THE DATA REVIEWED BY TIMES OPINION didn’t come from a telecom or giant tech company, nor did it come from a governmental surveillance operation. It originated from a location data company, one of dozens quietly collecting precise movements using software slipped onto mobile phone apps. You’ve probably never heard of most of the companies — and yet to anyone who has access to this data, your life is an open book. They can see the places you go every moment of the day, whom you meet with or spend the night with, where you pray, whether you visit a methadone clinic, a psychiatrist’s office or a massage parlor. The Times and other news organizations have reported on smartphone tracking in the past. But never with a data set so large. Even still, this file represents just a small slice of what’s collected and sold every day by the location tracking industry — surveillance so omnipresent in our digital lives that it now seems impossible for anyone to avoid.
It doesn’t take much imagination to conjure the powers such always-on surveillance can provide an authoritarian regime like China’s. Within America’s own representative democracy, citizens would surely rise up in outrage if the government attempted to mandate that every person above the age of 12 carry a tracking device that revealed their location 24 hours a day. Yet, in the decade since Apple’s App Store was created, Americans have, app by app, consented to just such a system run by private companies. Now, as the decade ends, tens of millions of Americans, including many children, find themselves carrying spies in their pockets during the day and leaving them beside their beds at night — even though the corporations that control their data are far less accountable than the government would be. Source Here

The IoT should be renamed to IoTT (Internet of Tracking Things), shouldn’t it. But we can’t have people figure out what’s really happening, can we? It’s a good thing that quantum computing isn’t too close, isn’t it?

April 5, 2018: Global News • (Project Maven) Over 3,000 Google employees have a signed a petition in protest against the company’s involvement with a U.S. Department of Defense artificial intelligence (AI) project that studies imagery and could eventually be used to improve drone strikes in the battlefield. Source Here

December 12, 2019 • Palantir took over Project Maven defense contract after Google backed out. Source Here

December 29, 2020: Input • Palantir exec says its work is on par with the Manhattan Project. Comparing AI to most lethal weapon in human history isn’t comforting. SourceHere

August 14, 2020: Venture: • Google researchers use quantum computing to help improve image classification. Source Here

Hmmm. Maybe Apple will be for the little guy? They have always valued privacy rights, right?

October 2, 2013: Vice News •  The hacktivist group Anonymous released a video statement with an accompanying Pastebin document claiming that there are definitive links between AuthenTec, the company that developed the iPhone 5S’s fingerprint scanner, and the US government. Source Here

An apple a day helps the NSA. Or Google. Or Microsoft. Or Amazon. Take your pick from the basket, because dem Apple’s are all the same. But at least we have fundamental rights, right?

Foreign agent declaration not required • No mention of foreign agent status is made in the Protect America Act of 2007. Under prior FISA rules, persons targeted for surveillance must have been declared as foreign agents before a FISA warrant would be accorded by the FISC court.

‘Quasi-anti-terrorism law’ for all-forms of intelligence collection • Vastly marketed by U.S. federal and military agencies as a law to prevent terror attacks, the Protect America Act was actually a law focused on the ‘acquisition’ of desired intelligence information, of unspecified nature. The sole requirement is geolocation outside the United States at time of Directive invocation; pursuant to Authorization or Order invocation, surveillance Directives can be undertaken towards persons targeted for intelligence information gathering. Implementation of Directives can take place inside the United States or outside the United States. No criminal or terrorism investigation of the person need be in play at time of the Directive. All that need be required is that the target be related to an official desire for intelligence information gathering for actions on part of persons involved in surveillance to be granted full immunity from U.S. criminal or civil procedures, under Section 105B(l) of the Act.

Removal of FISA Strictures from warrant authorization; warrants not required • But the most striking aspect of the Protect America Act was the notation that any information gathering did not comprise electronic surveillance. This wording had the effect of removing FISA-related strictures from Protect America Act 2007-related Directives, serving to remove a number of protections for persons targeted, and requirements for persons working for U.S. intelligence agencies.

The acquisition does not constitute electronic surveillance • The removal of the term electronic surveillance from any Protect America Act Directive implied that the FISC court approval was no longer required, as FISA warrants were no longer required. In the place of a warrant was a certification, made by U.S. intelligence officers, which was copied to the Court. In effect, the FISC became less of a court than a registry of pre-approved certifications.Certifications (in place of FISA warrants) were able to be levied ex post facto, in writing to the Court no more than 72 hours after it was made. The Attorney General was to transmit as soon as possible to the Court a sealed copy of the certification that would remain sealed unless the certification was needed to determine the legality of the acquisition.Source Here

Oh. FISA is basically a rubber stamp. And even if it the stage play wasn’t pretending to follow the script, would it matter? Who could actually stop it at this point? The cat’s out of the bag and Pandoras Box is open.

Controversial debates arose as the Protect America Act was published. Constitutional lawyers and civil liberties experts expressed concerns that this Act authorized massive, wide-ranging information gathering with no oversight. Whereas it placed much focus on communications, the Act allowed for information gathering of all shapes and forms. The ACLU called it the “Police America Act” – “authorized a massive surveillance dragnet”, calling the blank-check oversight provisions “meaningless,” and calling them a “phony court review of secret procedures.”

So the surveillance state doesn’t have checks and balances anymore. The state is preparing for Massive Civil Breakdown. They keep warning us about environmental collapse. Got it? Good. Let’s keep on keeping on.

The District of Columbia Organic Act of 1871 created a single new district corporation governing the entire federal territory, called the District of Columbia, thus dissolving the three major political subdivisions of the District (Port of Georgetown, the City of Washington, and Washington County) and their governments. Source Here

The first big leap in corporate personhood from holding mere property and contract rights to possessing more expansive rights was a claim that the Equal Protection Clause applied to corporations. One of the strangest twists in American constitutional law was the moment that corporations gained personhood under the Equal Protection Clause of the Fourteenth Amendment. It occurred in a case called Santa Clara County, and what was odd was that the Supreme Court did not really even decide the matter in the actual opinion. It only appeared in a footnote to the case.  What we are likely to have at the conclusion of the Supreme Court term is corporations that are empowered to spend in American elections because of Bellotti and Citizens United; corporations that can make religious objections thanks to Hobby Lobby; and if Jesner turns out as badly as I predict, corporations will be able to aid and abet human rights violations abroad with impunity. Source Here

“Having a corporation would allow people to put property into a collective ownership that could be held with perpetual existence,” she says. “So it wouldn’t be tied to any one person’s lifespan, or subject necessarily to laws regarding inheriting property.” Later on, in the United States and elsewhere, the advantages of incorporation were essential to efficient and secure economic development. Unlike partnerships, the corporation continued to exist even if a partner died; there was no unanimity required to do something; shareholders could not be sued individually, only the corporation as a whole, so investors only risked as much as they put into buying shares.
Source Here

The way that the Arab Bank may get away with this alleged morally troubling behavior, even though it has a New York branch, is by reasserting the basic argument that was made in Nestle USA and Kiobel II: that the federal Alien Tort Statute was not intended to apply to corporations full stop. Given other cases in this area like Mohamad v. PLO, which held the word “individual” in the Torture Victim Protection Act means a natural person and does not impose any liability against organizations, the Arab Bank’s procorporate argument may well prevail.  There are multiple federal Circuit Courts which have shot down the argument that corporations are immune from suit under the Alien Tort Statute. The lone outlier is the Second Circuit, which decided in 2010 that corporations are excused from suit in Kiobel I. This is the case that was appealed to the Supreme Court and became Kiobel II. Jesner v. Arab Bank was litigated in the Second Circuit. One question in Jesner was what exactly did Kiobel II do to Kiobel I. So far in the litigation, Jesner concluded that Kiobel I and its conclusion that corporations can’t be sued in federal court using the Alien Tort Statute remained the controlling law of the Second Circuit.

There’s a reason people call lawyers snakes, it’s because most of them speak with forked tounges. So the corporation isn’t being held liable, but the shareholders can’t be held liable either. That’s too insane to even be called a Catch 22. We are literally being set up to have no recourse because there isn’t anybody who can be held responsible. Why is that important when I’ve been talking about the surveillance state?

July 14, 2020: The Intercept • Microsoft’s police surveillance services are often opaque because the company sells little in the way of its own policing products. It instead offers an array of “general purpose” Azure cloud services, such as machine learning and predictive analytics tools like Power BI (business intelligence) and Cognitive Services, which can be used by law enforcement agencies and surveillance vendors to build their own software or solutions.
A rich array of Microsoft’s cloud-based offerings is on full display with a concept called “The Connected Officer.” Microsoft situates this concept as part of the Internet of Things, or IoT, in which gadgets are connected to online servers and thus made more useful. “The Connected Officer,” Microsoft has written, will “bring IoT to policing.”
With the Internet of Things, physical objects are assigned unique identifiers and transfer data over networks in an automated fashion. If a police officer draws a gun from its holster, for example, a notification can be sent over the network to alert other officers there may be danger. Real Time Crime Centers could then locate the officer on a map and monitor the situation from a command and control center. Source Here

Uhm, I guess it’s really is all connected, isn’t it?

June 18, 2020: The Guardian • How Target, Google, Bank of America and Microsoft quietly fund police through private donations.
More than 25 large corporations in the past three years have contributed funding to private police foundations, new report says. Source Here

Long live the Military Industrial Techno Surveillance State. If you have nothing to hide, than you have nothing to worry about. Really? Are we still believing that line? Cause it’s a load of crap. If we have nothing to worry about, then why are they worried enough to be implementing surveillance systems with corresponding units on the ground? Got your attention there, didn’t I?

August 19, 2019: Big Think • Though the term “Orwellian” easily applies to such a technology, Michel’s illuminating reporting touches something deeper. Numerous American cities have already been surveilled using these god-like cameras, including Gorgon Stare, a camera-enabled drone that can track individuals over a 50-square kilometer radius from 20,000 feet.
Here’s the real rub: the feature that allows users to pinch and zoom on Instagram is similar to what WAMI allows. Anything within those 50-square kilometers is now under the microscope. If this sounds like some futuristic tech, think again: Derivations of this camera system have been tested in numerous American cities.
Say there is a big public protest. With this camera you can follow thousands of protesters back to their homes. Now you have a list of the home addresses of all the people involved in a political movement. If on their way home you witness them committing some crime—breaking a traffic regulation or frequenting a location that is known to be involved in the drug trade—you can use that surveillance data against them to essentially shut them up. That’s why we have laws that prevent the use of surveillance technologies because it is human instinct to abuse them. That’s why we need controls. Source Here

Want to know more about the Gorgon Stare? Flatten the Curve. Part 12. Source Here

Now, I’m not sure if you remember or know any Greek Mythology, but the Gorgons were three sisters, and one sister had Snakes on her head (she wasn’t a lawyer) and she turned people to stone when she looked at them.

MEDUSA (Mob Excess Deterrent Using Silent Audio) is a directed-energy non-lethal weapon designed by WaveBand Corporation in 2003-2004 for temporary personnel incapacitation. The weapon is based on the microwave auditory effect resulting in a strong sound sensation in the human head when it is subject to certain kinds of pulsed/modulated microwave radiation. The developers claimed that through the combination of pulse parameters and pulse power, it is possible to raise the auditory sensation to a “discomfort” level, deterring personnel from entering a protected perimeter or, if necessary, temporarily incapacitating particular individuals. In 2005, Sierra Nevada Corporation acquired WaveBand Corporation.

Ok. Get it? The Gorgon eye in the sky stares at you while the Medusa makes you immobile. Not good, but at least it’ll just freeze you in your tracks.

July 6, 2008: Gizmodo • The Sierra Nevada Corporation claimed this week that it is ready to begin production on the MEDUSA, a damned scary ray gun that uses the “microwave audio effect” to implant sounds and perhaps even specific messages inside people’s heads. Short for Mob Excess Deterrent Using Silent Audio, MEDUSA creates the audio effect with short microwave pulses. The pulses create a shockwave inside the skull that’s detected by the ears, and basically makes you think you’re going balls-to-the-wall batshit insane. Source Here

Uhm. And drive you insane.

July 26, 2008: Gizmodo • The MEDUSA crowd control ray gun we reported on earlier this month sounded like some pretty amazing-and downright scary-technology. Using the microwave auditory effect, the beam, in theory, would have put sounds and voice-like noises in your head, thereby driving you away from the area. Crowd control via voices in your head. Sounds cool. However, it turns out that the beam would actually kill you before any of that happy stuff started taking place, most likely by frying or cooking your brain inside your skull. Can you imagine if this thing made it out into the field? Awkward! Source Here

Annnnnnnndddddd it’ll kill you.

Guys, they’re prepared. They’ve been prepared. They’re ready. Remember the Doomsday Bunkers? The military moving into Cheyenne Mountain? Deep Underground Military Bunkers? The rapid rolling out of 5G? BITCOIN and UBI so neatly inserted into our minds over the last five years? They’ve directly told us to have three months of supplies in our homes. 2020 isn’t going to be an anomaly? It’s the start of the collapse of our natural resources. Take a look on Reddit and all the posts about crazy weather. Cyanobacteria blooms killing dogs and people. Toxic Super Pollution caused by atmospheric inversions killing people. This isn’t normal, this is New Normal. And they know it. They’ve known it for a while. Let me show you one last thing before I wrap it up.

From the earliest Chinese dynasties to the present, the jade deposits most used were not only those of Khotan in the Western Chinese province of Xinjiang but other parts of China as well, such as Lantian, Shaanxi.

Remember, words matter. Look at Gorgon Stare and Medusa. They don’t randomly grab names out of a hat, or pick them because they think it sounds dystopian. They pick words for a reason.

July 7, 2017: The Warzone • There only appears to be one official news story on this exercise at all and it’s available on the website of Air Mobility Command’s Eighteenth Air Force, situated at Joint Base Charleston. At the time of writing, a google shows that there were more than a half dozen more copies on other Air Force pages, as well as number of photographs. For some reason, someone appears to have taken these offline or otherwise broken all the links. Using Google to search the Defense Video Imagery Distribution System, which is the main U.S. military’s public affairs hub, brings up more broken links.
Oh, and unless there’s been some sort of mistake, JADE HELM actually stands for the amazingly obtuse Joint Assistance for Deployment Execution Homeland Eradication of Local Militants. A separate web search for this phrase does not turn up any other results. Source Here

Now, using an acronym that indicates training to Eradicate Local Militants seems pretty dumb. It may be used in that manner if environmental collapse triggers riots, but i don’t think they would warn everyone ahead of time, do you? So I dug a little bit more.

Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations.
The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time. JADE is a knowledge-based system that uses highly structured information that takes advantage of data hierarchies.
An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS). The name “JADE” comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered.

PACOM? Why isn’t that command group responsible for the South China Sea?

Formerly known as United States Pacific Command (USPACOM) since its inception, the command was renamed to U.S. Indo-Pacific Command on 30 May 2018, in recognition of the greater emphasis on South Asia, especially India.

Now doesn’t it look like Jade Helm is preparing for an invasion? And possibly insurrection later. Or at the same time? Or riots over WW3? Or food riots? And start thinking about why the laws are starting to exclude corporations? Then think about the mercenaries that are being contracted out by the government.

October 17, 2018: The Carolinan • In 2016, 75 percent of American forces were private contractors. In 2017, Erik Prince, former head of Blackwater, and Stephen Feinberg, head of Dyncorp, discussed plans for contractors completely taking over U.S. operations in Afghanistan. Although ultimately unsuccessful, it remains to be seen if the current administration will change its mind.
Contractors are involved in almost every military task, such as intelligence analysis, logistics and training allied soldiers. Contractors are even involved in U.S. special ops missions. This is because contractors are essentially untraceable and unaccountable. Most are born in other countries; only 33 percent are registered U.S. citizens.
Private military firms don’t have to report their actions to Congress, unlike the military or intelligence agencies. They also aren’t subject to the Freedom of Information Act, so private citizens and journalists aren’t allowed to access their internal documents. There are also no international laws to regulate private military firms. It’s been proven that many contractors are involved in illegal activities. The larger multinational companies sometimes hire local subcontractors. These contractors sometimes aren’t background-checked. A 2010 investigation by the Senate found that many subcontractors were linked to murders, kidnappings, bribery and anti-coalition activities. Some subcontractors even formed their own unlicensed mercenary groups after coalition forces leave. A 2010 House investigation showed evidence that the Department of Defense had hired local warlords for security services. In 2007, Blackwater contractors massacred 17 civilians. This eventually led Blackwater to being restructured and renamed as Academi. Source Here

Military Exercises. Private Defense Firms. No oversight. And it’s all coming soon. Read more at Flatten the Curve. Part 20. Upcoming war and catastrophes. Source Here

Nah. I’m just fear mongering and Doomscrolling again.

Heads up and eyes open. Talk soon.



One more bit of info re. Jade Helm:

Somewhere around 2015/16 I watched an interview of a lady who had worked on the Jade Helm project. She also mentioned that Jade was an acronym for J2, the name of the A.I. supercomputer that drives the whole project. Basically “J2 at the helm”.

It was the first time that artificial intelligence was given full command and control of a military operation. The computer is in command of the operation, while the internet, as well as military intelligence, systems, and sensors feed it live data, and military personnel carry out its orders. That is why the motto “conquering the human domain” …it signifies A.I. conquering humanity.

The JADE in Jade Helm is an AI software program

The “JADE” In Jade Helm 15 Is An A.I. SOFTWARE Program
107,045 views•May 16, 2015



“JADE” is an A.I. quantum computing technology that produces holographic battlefield simulations and has the ability to use vast amounts of data being collected on the human domain to generate human terrain systems in geographic population centric locations to identify and eliminate targets, insurgents, rebels or whatever labels that can be flagged as targets in a Global Information Grid for Network Centric Warfare environments.

The JADE II battle field system is cognitive and intuitive. It can examine prior executed battle plans and and devise ‘new and better’ strategies to increase the ‘kill chain’. The II generation of JADE has the capability for two way communication with drones through the OCCOM technology which is one of the next generation integrations to this system.

In short, JADE HELM will not be battles directed by Generals and Military Commanders, but by a computer. It is a cognitive software program based on a Network Centric Warfare System at the HELM.


Nathan Leal – Expose from the Wall – On Hagmann and Hagmann –

Friday April 24, 2015

Listen to the Program from Hagmann’s BlogTalk Site

“Operation Jade Helm – An Expose – Part 3 …Incarceration”

Listen to the Program from Hagmann’s BlogTalk Site

By Nathan Leal – April 23, 2015

Nathan Leal – Further Analysis of Jade Helm & the “Human Domain”

The Hagmann ReportBroadcast in News    – 


Just another source for the same videos.  You never know what will be deleted.  I also want to recognize those willing and courageous enough to share the truth.  Support them!

EMERGENCY SATURDAY BROADCAST: World Shocked By SPARS 2025-2028 Document

A 2017 Johns Hopkins document details plans for Big Pharma global domination.

Image Credits:


Alex Jones breaks down the shocking information contained in the so-called SPARS 2025-2028 document which details another horrifying worldwide pandemic scenario and how governments can better impose control over their citizens and merge cooperative efforts into a global government body.

The Big Tech purge is here! Follow Infowars and Alex Jones on other growing platforms now to stay informed as the information blackout accelerates.