¿LAS PIRÁMIDES SON OBRA DE UNA SUPERCIVILIZACIÓN?

Se usaron bloques de 100 y hasta 200 T. traídos de una cantera a 30 km. Están alineadas perfectamente con los puntos cardinales y el Cinturón de Orión. Los egipcios de esa época ni siquiera conocían el Hierro.

SOLUCIONES

Tú no puedes solucionar unos problemas con el mismo nivel de CONSCIENCIA que los creó. -Albert Einstein

EL HOMBRE QUE PIENSA POR SÍ MISMO

El hombre más peligroso para cualquier gobierno es el capaz de reflexionar... Casi inevitablemente, llegará a la conclusión de que el gobierno bajo el que vive es deshonesto, loco e intolerable. -H. L. Mencken

ESTRUCTURA SOCIAL PIRAMIDAL

Nuestro mundo está organizado de tal modo que una pequeña élite controla al resto a través de una jerarquía de jefes sobre otros jefes hasta llegar a los obreros en la base. El nivel de conocimiento separa a unos niveles de otros. -David Icke

GOBIERNO MUNDIAL O NUEVO ORDEN MUNDIAL

El objetivo de las élites es crear un gobierno mundial dictatorial, fascista, donde el Estado Policial es omnipresente y las libertades individuales no existen. -David Icke

NEGACIONISMO O ESCEPTICISMO CÍNICO

Condenar algo sin investigarlo previamente es la cota más alta de la ignorancia. -Albert Einstein

MEDIOS DE COMUNICACIÓN

La Opinión Pública lo es todo. Si está a tu favor, nada podrá salir mal. Si está en tu contra, nada podrá tener éxito. El que moldea la Opinión Pública tiene un mayor poder que el que hace las leyes. -Abraham Lincoln

RESPONSABILIDAD PERSONAL

Tú debes convertirte en el cambio que quieres ver en el mundo. -Mahatma Gandhi

EL PODER DE LA PROPAGANDA

Debe hacerse tan popular y tan simple que hasta el más estúpido la pueda entender. A la gente se la puede convencer de que el Paraíso es el Infierno, o a la inversa, de que la vida más horrible es el Paraíso. -Adolf Hitler, "Mein Kampf"

REPETIDORES

La mayoría de la gente es OTRA gente. Sus pensamientos son la opinión de otros, sus vidas una imitación, sus pasiones una cita de un libro. -Oscar Wilde

CREENCIAS

En religión y política, la gente casi siempre las adquiere, sin examinarlas, de autoridades que tampoco las han examinado y que, a su vez, las han adquirido de unos terceros cuyas opiniones no valen UNA PUTA MIERDA. -Mark Twain

PIRÁMIDE DE PODER

Es fácil que una pequeña élite controle a una amplia mayoria a través de estructuras jerárquicas donde cada uno se está en su sitio sin moverse y sin interesarse nunca por nada. -David Icke

DEBER

La cobardía pregunta si es seguro, la conveniencia si es cortés, y la vanidad si es popular. Pero la Consciencia pregunta si es JUSTO. Y siempre llega un tiempo donde uno debe tomar una postura que no es nada excepto JUSTA. -M. L. King

911 WAS AN INSIDE JOB!!

¿El atentado del 11-S fue ejecutado por el Gobierno en la Sombra de EEUU a través de infiltrados y aliados al más alto nivel en el ejército, los servicios secretos y los medios de comunicación?

¿MAGOS NEGROS CONTROLAN LA ECONOMÍA MUNDIAL?

¿El Dinero es el único Dios de este mundo porque lo controla TODO? ¿Los banqueros son los nuevos sacerdotes? ¿Los símbolos sagrados y ocultistas en los billetes atraen energías adecuadas a los fines de este clero?

¿EL 11-M FUE UN GOLPE DE ESTADO A FAVOR DEL PSOE?

Hay hechos documentados de sobra que demuestran que ciertos policías, miembros del servicio secreto, periodistas y jueces trabajaron para "dar un golpe de estado mediático" mintiendo, destruyendo pruebas o creando pruebas falsas.

¿ESTAMOS SOLOS EN EL UNIVERSO?

¿Otras especies y civilizaciones nos visitan con frecuencia? ¿Algunos son benéficos, otros son malvados, y la mayoría parece neutral o indiferente? ¿Los gobiernos cierran beneficiosos tratos mientras lo niegan todo?

¿NUESTRAS ÉLITES NO SON HUMANAS?

Con fama de endogámicos, herméticos, arrogantes, de "sangre azul", ¿nuestros líderes y reyes pertenecen a una raza distinta, con amplios y ancestrales conocimientos sobre la Realidad y lo Oculto?

¿NUESTROS POLÍTICOS SON TÍTERES?

¿Gente tan increíblemente estúpida e incompetente trabaja para "Amos Ocultos" que mueven sus hilos y a los que deben pagar los favores recibidos? ¿El "juego político" es una farsa para anestesiarnos?

¿SUPERTECNOLOGÍA EN LA ANTIGÜEDAD?

Es un hecho científico demostrable que ESTO no lo pudieron hacer tipos con lianas, troncos y herramientas de bronce. Tampoco podemos reproducirlo con nuestra tecnología actual.

viernes, 4 de enero de 2013

The Banking Elite are Not Only Stealing Our Wealth - They Are Stealing Our Minds

Fuente:

http://www.davidicke.com/headlines/77755-the-banking-elite-are-not-only-stealing-our-wealth-but-they-are-also-stealing-our-minds

http://www.zerohedge.com/contributed/2013-01-03/banking-elite-are-not-only-stealing-our-wealth-they-are-also-stealing-our-min

Información:


Share
Posted by 
'In the past several years, people worldwide are slowly beginning to shed the web of deceit woven by the banking elite and learning that many topics that were mocked by the mainstream media as conspiracy theories of the tin-foil hat community have now been proven to be true beyond a shadow of a doubt.
First there was the myth that bankers were upstanding members of the community that contributed positively to society. Then in 2009, one of their own, Paul Volcker, in a rare momentary lapse of sanity, stated “I wish someone would give me one shred of neutral evidence that financial innovation has led to economic growth — one shred of evidence.”
He then followed up this declaration by stating that the most positive contribution bankers had produced for society in the past 20 years was the ATM machine.'


The Banking Elite are Not Only Stealing Our Wealth, But They Are Also Stealing Our Minds

smartknowledgeu's picture





In the past several years, people worldwide are slowly beginning to shed the web of deceit woven by the banking elite and learning that many topics that were mocked by the mainstream media as conspiracy theories of the tin-foil hat community have now been proven to be true beyond a shadow of a doubt. First there was the myth that bankers were upstanding members of the community that contributed positively to society. Then in 2009, one of their own, Paul Volcker, in a rare momentary lapse of sanity, stated “I wish someone would give me one shred of neutral evidence that financial innovation has led to economic growth — one shred of evidence.” He then followed up this declaration by stating that the most positive contribution bankers had produced for society in the past 20 years was the ATM machine. Of course since that time, we have learned that Wachovia Bank laundered $378,400,000,000 of drug cartel moneyHSBC Bank failed to monitor £38,000,000,000,000 of money with potentially dirty criminal tiesUnited Bank of Switzerland illegally manipulated LIBOR interest rates on a regular basis for purposes of profiteering, and though they have yet to be prosecuted, JP Morgan bank, Goldman Sachs bank, & ScotiaMocatta bank are all regularly accused of manipulating gold and silver prices on nearly a daily basis by many veteran gold and silver traders.

Over the past several years, many of the things that have been passed on to us as “truth” both in schools and in the media regarding financial principles have now been exposed as pure lies. We are in the process of coming full circle with the bankers and banks that were once consistently, regularly and deservedly vilified by US Presidents and US Congressmen in the late 1800s and early 1900s as “vipers and thieves” and as “evil institutions” that “impoverished and ruined the [American] people”. During the 1980s, 1990s, and 2000s’, banking jobs, due to their high compensation and pay, remained the most highly sought after positions among recent MBA grads, and Presidents today still falsely laud bankers for their character (i.e. President Obama on Jamie Dimon: he’s “one of the smartest bankers we’ve got”). However, throughout history, we have often experienced cycles when the truth predominates for a long period, followed by a period when lies predominated for many years, and then ultimately followed by a period when a return to truth was ultimately realized once again.

Consider the case of Christopher Columbus, who historian Samuel Eliot Morison correctly identified in 1954, despite being a courageous explorer, as also undoubtedly an unconscionable murderer: “The cruel policy initiated by Columbus and pursued by his successors resulted in complete genocide” of native Indians in Cuba, Hispaniola and other places Columbus visited during his trek across the Atlantic. However, as time passed, the truth about Columbus was washed clean by American storytellers, and Columbus incredulously morphed from a genocidal mass murderer into a “hero” admired by millions of American school children for his “discovery” of America. Consequently, the US government followed up this revisionist delusional accounting of Columbus by bestowing him with the honor of a national holiday, Columbus Day. Finally, as the cycle of truth came full circle as it often does, and thousands of Americans learned of Columbus's genocidal activities, the US government responded to this movement of truth by revoking the status of Columbus Day as an official national holiday in America. This week, as we observe a Bloomberg journalist submit an article titled “UBS Libor Manipulation Deserves the Death Penalty”, I am confident that the circle of truth about banks and the banking industry's despicable transgressions against humanity will once again return to its rightful place as common knowledge among the masses and not just among the few.

Though the banking elite are now increasingly being exposed for their criminal activities against humanity in their theft of citizens’ wealth, rarely is another one of their greatest transgressions, their theft of citizens’ minds and the process by which they target and transform young adults into docile, obedient creatures through institutional academia, ever discussed. Below, please find a video of how children are targeted at a young age with psychotropic drugs, Skinner operant and Pavlov stimulus-response behavioral modification, and outcome based education (OBE) in the institutional schooling system to literally “dumb down” the critical thinking skills of young adults and turn them into zombie-like unthinking robots. Through behavioral modification and the heavy use of drugs, the banking elite are not only stealing wealth globally at this current time, but also stealing the minds of children to ensure that they will mature into obedient citizens of the state with very little capacity to exert their free-will and determine for themselves the dirty truth of the global monetary system and of our consequent enslavement. If you do not know of the intimate connection between the banking elite and their foray into, and their control of the global education system, then the below video is for you.


References included in the above video:
The Illusions of Psychiatry, by Marcia Angell
Doping Kids with Ritalin for ADHD, by Kelly Patricia O'Meara
Ritalin use for ADHD children soars fourfold, by Jamie Doward & Emma Craig
Raising the Ritalin Generation, by Bronwen Hruska
  
About the author: JS Kim is the Founder & Managing Director of SmartKnowledgeU, a fiercely independent investment & research consulting firm with a focus on Precious Metals and a mission of fighting the debt enslavement goals of bankers with a return to sound money principles. Follow us on Twitter @smartknowledgeu(Our promise to all of our clients is to keep them informed of the criminal banking cartel's movements in global financial markets to the best of our abilities every year. Despite the year-end banking cartel raid on gold & silver and the PPT pump of stock markets in 2012, our flagship Crisis Investment Opportunities newsletter still outperformed the US S&P 500 in 2012).

How to Evade Government Surveillance and Stay Anonymous Online

Fuente:

http://www.davidicke.com/headlines/77759-how-to-evade-government-surveillance-and-stay-anonymous-online

http://www.wakingtimes.com/2013/01/04/how-to-evade-government-surveillance-and-stay-anonymous-online/

Información:


Share
Posted by 
'Why stay anonymous online? In today’s society there are people and automated devices that are recording your deepest, most private thoughts and activities. Each day we voluntarily divulge the most intimate details of our lives through social networking accounts, email, banking apps, online games and more. In addition, governments and corporations can censor and block our traffic based on whatever standards are in place that day.
Government agencies, hackers and sophisticated bot networks are capturing every piece of digital data that we transmit through all of our internet-connected gadgets. Smartphones, Smart TVs, computers, tablets, and so much more…they are all vulnerable, nothing is safe these days. Even your old clam shell phone isn’t safe. This is because many phone providers route your calls over media using the Internet Protocol at some point within their network. For example, long distance providers transfer calls over VoIP all the time.'


Chris Dougherty, Contributing Writer
Waking Times
Why stay anonymous online?  In today’s society there are people and automated devices that are recording your deepest, most private thoughts and activities. Each day we voluntarily divulge the most intimate details of our lives through social networking accountsemailbanking appsonline games and more. In addition, governments and corporations can censor and block our traffic based on whatever standards are in place that day.
Government agencies, hackers and sophisticated bot networks are capturing every piece of digital data that we transmit through all of our internet-connected gadgets.   Smartphones, Smart TVs, computers, tablets, and so much more…they are all vulnerable, nothing is safe these days.  Even your old clam shell phone isn’t safe.  This is because many phone providers route your calls over media using the Internet Protocol at some point within their network.  For example, long distance providers transfer calls over VoIP all the time.
Whether you’re browsing the web, signing up for a new online game, or simply checking your email, you are constantly leaving tracks and giving away information to anyone with  access and the knowledge to analyze the traffic.  Once the data is compiled the attacker can build an incredibly accurate profile of not only your online life but your real-world life as well.
I know, most people say, “Why would hackers want to hack into my life? I am not that important”  You have to understand that these “intruders into our lives” are scanning huge blocks of internet addresses at a time.  They don’t care who you are.  Your computer is simply another target IP address as they scan through thousands of computers and devices in their search for more information.  Once collected they take all the information and funnel it into databases where they can search through it later for high valued loot.
Don’t believe me?  Just read the following two stories about what our own government does:
So, the big question is, how can you stay anonymous online?  Free from government censorship and potential eavesdropping from some hacker or three-letter government agency that wants to invade your privacy while you use your computer.  In comes Whonix, the Anonymous Operating System!

Use Whonix, The Anonymous Operating System, Stay Anonymous Online

Whonix is a free, general purpose computer operating system based on Virtual BoxLinux and Tor.  The purpose of Whonix is to allow internet users the ability to stay anonymous online. This is most beneficial to users in regimes that censor and monitor access to the Internet, but it can also be used by anyone who values their privacy or doesn’t want their activities tracked online.
By design, IP address leaks are meant to be impossible while using Whonix. The developers claim even malware with admin privileges can’t find the Whonix Workstation’s real IP address or location.  This is because Whonix consists of two (virtual) computers. One machine acts as a gateway or router and runs only Tor, a sophisticated anonymity software.  This machine is called the Whonix-Gateway. The other machine, which called the Whonix-Workstation, is on a completely isolated network that only allows internet connections to be routed through the Whonix-Gateway.
Tor, the technology on which Whonix is built,  is a free software, along with an open network consisting of thousands of computers located around the world.  Together they strive to provide anonymity for individuals accessing the Internet.  The Tor Project helps you defend against a form of network surveillance, known as traffic analysis, that threatens everyone’s personal freedom and privacy.
Tor helps to reduce the risks of both simple and advanced traffic analysis by distributing your internet requests over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a hard-to-follow series of roads while driving in order to throw off somebody who is tailing you.
Whonix automatically sets up an isolated network environment where your virtual “Workstation” can perform all normal internet related tasks such as checking email, browsing web sites, blogging, connecting to corporate VPNs, etc.  However all of that outbound traffic is then routed in such a way that it can only pass through your virtual “Gateway”, which encrypts the packets and sends them over several hops on the TOR network prior to landing at their final destination.
How Whonix Works: Figure 1
How Whonix Works: Figure 1
Once your traffic leaves the Whonix Gateway it is routed directly through the TOR network.  Instead of taking a direct route from source to destination, data packets on the Tor network take a random path through several relays, so no observer at any single point can tell where the data came from or where it’s going.  The relays even take additional steps to erase your tracks periodically along the way.
How Whonix Works: Figure 2 - Routing Through TOR
How Whonix Works: Figure 2 – Routing Through TOR
In the event that the Workstation user initiates a request to a new website or internet resource, the Gateway simply selects an alternate path through the TOR network as seen in Figure 3.
How Whonix Works: Figure 3 - Using An Alternate TOR Path
How Whonix Works: Figure 3 – Using An Alternate TOR Path
There a bit of a caveat to this system however.  As indicated by the red dotted-lines in the images above, the last hop in the TOR network passes the traffic in the clear to the final destination.  One of the primary functions of this computer, as an exit node, is to decrypt the data packets before they are passed off to their final destination.  This means this exit node could be vulnerable to a man-in-the-middle attack, or it could have even been placed there for the specific purpose of monitoring exit traffic by a hacker or government agency.  While the exit node would still have no information regarding the IP address or location of the original Workstation user, it would know the type of internet request that they sent to the destination server.
This scenario can be averted by using SSH tunnels or a VPN on top of the TOR network.  One would only have to install the appropriate software on the Whonix Workstation in order to provide an end-to-end encryption solution for the traffic.  Another method to bypass the man-in-the-middle scenario would be to employ the use of TOR Private Bridges or Private Exit Nodes.
It is important to note however that Whonix can be effectively used by most people right out of the box for web browsing, blogging and private conversations.
In order to make use of Whonix you will need to download a free copy of VirtualBox from the link below:
Once VirtualBox has been downloaded and installed you can download the Whonix-Workstation and the Whonix-Gateway packages from SourceForge:
Once downloaded, just import the machine files into VirtualBox as-is and start them up, you don’t need to change any settings…also be sure to start the Whonix-Gateway machine before firing up the Workstation image.
The default login credentials for both virtual machines are as follows:
====================
Username: user
Password: changeme
Username: root
Password: changeme
====================
Once the images have completed the boot process you can login and run the “whonixcheck” command from the CLI (command line interface) in order to verify proper connectivity to the TOR network.  The Workstation output should look similar to the following (click image to enlarge):
How Whonix Works: Figure 4 - Workstation output from the "whonixcheck" command.
How Whonix Works: Figure 4 – Workstation output from the “whonixcheck” command.
Be sure to watch for my article in the next few days detailing step-by-step instructions on how to install VirtualBox and Whonix on your computer.  Let me know what you think of this anonymity solution in the comments below…
About the Author
Chris Dougherty is a hacker and online security expert who trains government operatives.  Please visit his blog, www.VirtualThreat.com, for more excellent news and information about protecting yourself in cyberspace.
This article is offered under Creative Commons license. It’s okay to republish it anywhere as long as attribution bio is included and all links remain intact.
~~ Help Waking Times to raise the vibration by sharing this article with the buttons below…