2020-09-15

00:00

2020-09-15.fae [crystalfaeries]

Faery blessings -- celeste



Date: 2020-09-15 10:00:00+00:00
2020-09-15 MarsDay's numerology:
	19 Sun
	10 Wheel of Fortune
	 1 Mage
Inner will, motivation: Energy,
	liberation, frankness,
	joy, convalescence
Sep 15 	4:36 AM HST Moonrise
Sep 15 	5:55 PM HST Moonset
Dhammapada:
He who has known his former lives
and can see heaven and hell themselves,
while he has attained the extinction of rebirth,
a seer, master of transcendent knowledge,
and master of all masteries -
that is what I call a brahmin.
> Feed: The Permaculture Research Institute
> Title: Free Money Day
> Date: Mon, 14 Sep 2020 12:40:08 -1000
> Link: https://www.permaculturenews.org/2020/09/15/free-money-day/
 
[...] a unique social experiment aims to show that
a more generous world is possible. On Free Money Day,
now in its 10th year, people around the world
hand out money, virtually or in person,
asking recipients to pass half on to someone else.
 
The post Free Money Day
	appeared first on
The Permaculture Research Institute.

Faery blessings -- celeste


2020-09-14

13:42

13:29

The Lincoln Turn Around Two Step [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

My readers are very familiar with the fact that one man or woman may wear multiple "hats" and that some offices in our Federal Government have involved as many as seven or eight different offices, like the US POSTMASTER GENERAL, who also serves as the United States Postmaster, the US Postmaster, the Postmaster General of the United States.... and so on. 

It should, therefore, come as no surprise to learn that the office of "President" is similarly constructed with multiple offices which are all assumed to be exercised or potentially exercised by one man.  

Those who are awake and thinking often ask me ---- well, if Lincoln was a Bar Attorney and Esquire (joined the Illinois Bar in 1835) and the Titles of Nobility Amendment (ratified and added to The Constitution for the united States of America in 1819) prohibits Bar Attorneys from serving in our government, how in blazes did Lincoln get elected and serve as President in 1860? 

Great and timely question, because they are trying the same "Lincoln Turn Around Two Step" with Kamela Harris today. 

The short answer is that Lincoln was never our President and held no office in our government.  

This is one of the Big Beefs that led to the Secession of the Southern States.

Lincoln wasn't eligible to serve as President of the Federal Republic, but he was eligible to serve as President of the Territorial United States and also as President of the Municipal United States.  

So he simply didn't enter our office --- didn't wear our "hat" --- and represented the two foreign Federal Subcontractors, instead.  If you look at the records, you will see that Lincoln consistently signed all his paperwork in one of three offices: 

1. President of the United States of America (Territorial Government)
2. President of the United States (Municipal Government) 
3. Commander-in-Chief (Territorial Government) 

There is no record of him ever acting as The President of The United States of America (our Federation of States) nor as the President of the States of America (our Confederation of States) nor as the President of the united States of America (the Federal Republic).  

Our last elected President was Franklin Pierce, in 1856. 

Now there is a court case filed in US District Court against Kamela Harris, challenging her eligibility for office of the Vice President of the United States, and perforce, President of the United States, if the President should die or be disabled in office. 

I can already tell you the outcome.  

Kamela Harris is eligible to serve as "President of the United States" -- because the Municipal Government has no law or rule regarding eligibility for that office that she doesn't meet.  

She isn't eligible to serve as "President of the United States of America" -- the Territorial Government Office, but that doesn't matter, because she can simply do the Lincoln Turn Around Two Step, and never enter that office. 

And in the meanwhile, we have millions upon millions of innocent, defrauded, deluded, confused Americans who earnestly believe that these shysters are acting in Good Faith as their "President" ---- when it is completely obvious that none of them are acting in the proper office or in Good Faith, either.  

Thus it becomes necessary for the actual People of this country to get on their High Horse and put on their own dancing shoes, and elect an actual President of The United States of America.  And make it stick. 

Our run amok Federal Employees all need a sit-down Come to Jesus Meeting and all the fraud committed against all of us, needs to come to halt.  

It needs to be recognized that everything done here since Lincoln was elected has been accomplished in fraud.  Every single law, code, rule, codecile, regulation, statute, and business deal concocted by these yahoos since 1860 has been done under conditions of non-disclosure, constructive fraud, and color of law.  

And the worst part of the news that I bring you, is that you have all been misidentified as part of the problem --- and are presumed to be either Territorial or Municipal Employees and/or Dependents, voluntarily participating in this fraud and insurrection against the lawful Government.  

Now, perhaps this will jolt a few more of you off your couches.... go to: www.TheAmericanStatesAssembly.net  and put on your dancing shoes. 

I am told that there are still men in this country who can waltz in waffler stompers.  

----------------------------

See this article and over 2700 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

12:43

Australia Runs Out of Rice as Police Invade Farmers Markets [ice age farmer]

Australia will run out of homegrown rice by Christmas, which may help to explain why their police are kettling people at farmers markets (which clearly doesn’t help social distancing) and becoming more violent in general — if the state expects food shortages, they must bolster the police presence and acclimate people to increased totalitarianism, particularly […]

12:40

Free Money Day [The Permaculture Research Institute]

This September 15th, a unique social experiment aims to show that a more generous world is possible. On Free Money Day, now in its 10th year, people around the world hand out money, virtually or in person, asking recipients to pass half on to someone else. Organized by the Post Growth Institute, the global event …

The post Free Money Day appeared first on The Permaculture Research Institute.

10:57

FSF Blogs: Hello world from Eostre Emily Danne, intern with the FSF tech team [Planet GNU]

Greetings!

I'm Eostre (they/she), one of the new interns here at the FSF. I'm primarily here to update systems, rebuild servers, configure Apache, and really anything else that involves coercing GNU/Linux until it does what I want. Prior to this, I've done GNU/Linux almost exclusively as a hobby; now I'm trying to turn my hobby into a career. At home, I run a bunch of weird little hobby distros/BSDs. Interning at the FSF, where we primarily use Trisquel, is giving me a healthy appreciation for Ubuntu-based systems too.

In my hobby work, I've worked on making OS installs highly reproducible - my / is a read-only squashfs image that gets periodically rebuilt, my /etc is a git repo, and I keep my /home distributed across a few machines via Syncthing. At the FSF, I'm applying that experience by reimplementing some infrastructure as neat little scripted installs. Without revealing too much about our infrastructure, we have some systems that were created using forgotten knowledge by previous generations of sysadmins; it's my job to turn the arcane shell invocations in their ~/.bash_history files into something we can eventually manage with Ansible, though for now I'll just be writing shell scripts that do the same thing.

This also comes as Trisquel is about to release version 9.0, so I'll probably end up testing that too.


There are also some aspects of myself that don't involve computers or GNU/Linux in some way:

  • I play Dungeons and Dragons, whenever the stars align and our group is able to meet.

  • I do a bit of modding for the free software video game Endless Sky. (I lied, this one involves computers!)

  • I house sixteen highly evolved dinosaurs! We have four ducks and twelve chickens; they're all between four and six months old, so they haven't started laying eggs yet, but they have gotten big enough to cause trouble.

  • I also have two cats, two mice, a snake, and some fish.

  • I am willing to share pictures of my animals :)

  • I'm trans, nonbinary, pan, and poly. On top of that, I'm autistic too. I like who I am, and who I've become.

09:18

Notes from the Portland Underworld [13:20 FREQUENCY SHIFT]

I am reposting this recent article by my friend Paul Levy, as it sums up many collective feelings of the time.                                       … Continue reading

06:35

GBX Case Study: Coffee Picking Baskets in Puerto Rico [re:3D | Life-Sized Affordable 3D Printing]

With the development of our Gigabot X pellet printer came our engineers’ need to trial it in different applications and settings. We settled on Sandra Farms – the coffee farm at the center of our latest story about chocolate cigar molds – as a case study to determine the practicality of using recycled plastic to create real-world, functional objects.

“Good coffee is picked by hand.” Israel Gonzalez is a second-generation coffee farmer who started Sandra Farms in the early 90’s. He explains that coffee pickers around the world are historically underpaid, typically placed at the bottom of the coffee farming ladder.

Sandra Farms is trying to break this mold.

“The main focus here is trying to use Sandra Farms as a model. We want to support an agricultural, agrarian way of life in Puerto Rico.” Domenico Celli came to the farm as part of a graduate school project with a focus on implementing sustainability practices, and several years later finds himself still working with them and more attached to their mission of specialty agriculture. “The people that we have in mind are the farm workers and families and communities here in some of the most rural and remote areas of Puerto Rico that have traditionally been dependent on agriculture as their main source of income, and culturally, their way of life.”

Sandra Farms is trying to set an example for other farms, paying their pickers two to three times the average in Puerto Rico. Says Celli, “That is because above all, we are committed to making this a viable way of life for these people and their families.”

The basket opportunity

In working with Gonzalez and Celli on their chocolate cigar mold concept, a potential case study opportunity for Gigabot X presented itself.

“Most agricultural workers in Puerto Rico traditionally are the forgotten people here, and that’s reinforced through what they use to pick coffee with,” explains Celli, “which is mostly just fertilizer bags, or really uncomfortable, five-gallon buckets that are not at all made for coffee picking.”

“The five-gallon plastic bucket…” Gonzalez shows one off that has been strung with a simple rope handle. “It’s functional, it works, cheap – but not ideal, not ergonomic.”

Our local team in Puerto Rico took the opportunity to investigate 3D printed solutions that could provide a superior substitute for the farm’s pickers, with the ultimate goal of using Gigabot X to print a design using recycled plastic.

The choice of an application in Puerto Rico was no accident. Gigabot X has the ability to print from pelletized plastic as well as recycled plastic regrind; our team saw immense potential for a machine that could create a closed-loop system on an island, using waste as input material to create functional objects that may be expensive to import.

“Unfortunately, our recycling systems here in Puerto Rico are very outdated, not very efficient, and in reality, not much – if anything at all – is recycled,” says Celli. “A much better alternative would be able to actually have a way to repurpose and use that waste, and know that it’s going to some sort of practical application.”

The design process

Our San Juan-based designer Alessandra Montaño began the process with a CAD sketch. “The design process was very interactive,” she recounts.

Over the course of the project, she visited the farm four times, working with Gonzalez in person and talking directly with workers trialing the design in the fields. “I did one prototype, sent it to them, they made some changes like widening the design, changing the height of the basket…”

re:3D Mechanical Engineer Helen Little describes the trial and error process of testing, and the balance of modifying the basket design for the specific application while understanding the unique nature of a pellet printer. “We wanted to focus on quick production and cheaper cost-per-unit, so we chose to use a larger nozzle,” Little explains. “But there are many issues that come with that: a lot of oozing, lower quality prints…So we had to do a lot of optimization of print settings to get a higher-quality print.”

Little decided to experiment with printing in vase mode, which involves extruding in a continuous stream rather than a lot of stopping points where the nozzle has the opportunity to ooze plastic. “For that, we had to actually redesign the part itself so that the perimeter was only one layer thick,” she says.

Together, Little and Montaño incorporated user feedback from Sandra Farms into incremental tweaks to the design and new prototypes. They increased the basket depth to allow for a larger haul to be carried at one time, refined the shape to better hug the wearer’s waist, and added a brim to which a picker could attach shoulder straps.

“The way that a part is designed and printed has a huge effect on how long it takes to print, how much material it is, and at the end of the day, the bottom line for the cost,” explains Little. “I think it’s really important to get these real-world case studies and get that user feedback so that we can assess how viable of a solution this is for them and how much we can help improve over the current solution they’re using, using Gigabot X, 3D printing, and recycled materials.”

By the culmination of the testing process there had been twelve iterations of the basket, with the final design clocking in at around three and a half hours of print time.

Putting it to the test in the field

The crescent moon design on which they settled curves around the front of the waist, with a wide profile so a picker’s hands don’t have to travel far to drop in coffee cherries. It’s manageable enough to strap over one’s shoulders and carry through the field, yet sturdy enough to haul over fifteen pounds of coffee.

“We had wondered whether they could take the beating on the job, at the farm. ‘Can the bottom hold?’” Gonzalez initially pondered. “Yeah, they do,” he smiles. “Very well.”

Explains Celli, “The way that we designed them with re:3D was so that the opening would be wide so that a picker going through the field on uneven terrain is able to quickly pick coffee and kind of dump it into the bucket without it falling.”

He recounts the difficulties that came with the old-school fertilizer sack picking method. “It’s hard to keep it open with one hand, put coffee into it in the other, and then be efficient in a day where you’re trying to optimize how quickly you can get through the fields.” Seasonal coffee pickers, Celli explains, are paid by the pound. A vessel that allows for faster picking and movement through a field – not to mention fewer coffee cherries dropped – equals more money in a picker’s pocket. 

The comfort of having the basket contour to the hip is an obvious added bonus, Celli continues, allowing workers to pick more comfortably and later into the day.

There were more unforeseen positives of the custom basket design which Gonzalez and Celli didn’t fully comprehend before embarking on the project with re:3D.

“The reaction of such joy and excitement from the coffee pickers seeing these baskets that were actually made for them and thoughtfully designed to be comfortable for them was amazing to see,” recounts Celli.

The impact on the pickers’ morale was an unexpected and uplifting side effect of the project for both Celli and Gonzalez. They seemed unaccustomed and touched to be the focus of a project with a specific goal of creating a product to make their job easier and more comfortable.

The joy in the fields was visibly apparent, with pickers jockeying to get a chance with the new baskets: a promising sign for both the basket project and Sandra Farms’ own internal case study of running a sustainable, ethical farm prioritizing workers’ livelihoods.

In the meantime, both Gigabot X research and Sandra Farms’ exploration into sustainability continues. 

This project was made possible thanks to the support of the Puerto Rico Science, Technology & Research Trust and the National Science Foundation, who helped fund our research into Gigabot X.

05:19

2020 World Predictions according to Betsey Lewis [Cosmic Convergence: 2012 and Beyond]

Posted by Betsy Lewis In 2019, Betsey did foresee a flu like the Spanish Flu of 1918 that would kill thousands. She never imagined that it (COVID-19) would spread worldwide like the Spanish Flu. Note: The reason Betsey updates and changes her predictions … Continue reading

04:46

‘Women’s respect is a priority for us’: Journal finally retracts paper claiming women with endometriosis are more attractive [Retraction Watch]

The journal that published a paper claiming that attractive women were more likely to develop endometriosis has finally retracted the article, more than a month after the authors called for the move.  The article, “Attractiveness of women with rectovaginal endometriosis: a case-control study,” appeared in September 2012 in Fertility and Sterility, an official publication of … Continue reading ‘Women’s respect is a priority for us’: Journal finally retracts paper claiming women with endometriosis are more attractive

02:00

RPI4, Raspberry Pi OS and MATE desktop - Essential tweaks [Dedoimedo RSS]

Twerking, I mean tweaking with Tux. Behold, a long, detailed tutorial showing how to improve the defaut look & feel, ergonomics, functionality and behavior of the MATE desktop on top of Raspberry Pi OS on Pi 4, covering desktop environment installation, additional software, new visual themes and icons, black fonts, dock transparency, default desktop environment via lightdm configuration, full-screen Brisk menu, global menu, no video playback in full screen VLC, theming for VLC, LibreOffice and Pidgin, video tearing, Firefox ESR & mobile pages, resolution & overscan, hardware acceleration, Network Manager & Wireless scanning, some other essential tweaks, and more. Enjoy.

00:00

Doing the right thing: Alcoholism researchers retract six-week old paper after finding errors [Retraction Watch]

Oh, those insufferably progressive Scandinavians, always doing the right thing.   A group of alcoholism researchers in Denmark has retracted a 2020 paper on gender and alcohol treatment after finding errors in their results. And they’ve set up a system to avoid similar problems in the future.  The paper, “Gender differences in alcohol treatment,” appeared in … Continue reading Doing the right thing: Alcoholism researchers retract six-week old paper after finding errors

2020-09-13

22:40

2020-09-14.fae [crystalfaeries]

2020-09-14 MoonDay's numerology:
        18 Moon
         9 Hanged Man
Unconscious fear, hope, desires:
        Cyclical or Voluntary change,
        ups and downs,
        illusions, deceptions
Sep 14  3:32 AM HST Moonrise
Sep 14  5:08 PM HST Moonset

Faery blessings -- celeste


20:42

Yoga Witch [efairies.com: New Products]

Yoga Witch

These peaceful meditating witches are fun decorations for any Halloween themed space! The three witches are all in varying yoga poses.  Collect All 3!

A - Tree Pose

B - Downward Dog

C - Perfect Pose

Dimensions: 5.6"H x 5.4"W x 5.3"D
Made of resin

Price: $14.99

17:14

Instruction on the Fifteenth Sunday After Pentecost [Paul Stramer - Lincoln County Watch]

 Rev. Fr. Leonard Goffine's

The Church's Year

The Introit of the Mass is a fervent prayer; which may be said in every necessity and adversity:

INTROIT Bow down thine ear, O Lord; to me, and hear me: save thy servant, O my God, that hopeth in thee: have mercy on me, O Lord, for I have cried to thee all the day. Give joy to the soul of thy servant: for to thee, O Lord, I have lifted up my soul. (Ps. IXXXV.) Glory be to the Father and to the Son, and to the Holy Ghost, as it was in the beginning, is now, and ever shall be, world without end. Amen.

COLLECT Let Thy continued pity, O Lord, cleanse and defend Thy Church: and because without Thee it cannot abide in safety, govern it ever by Thy gift. Through our Lord Jesus Christ Thy Son, who liveth and reigneth with Thee, in the Unity of the Holy Ghost, God, world without end, Amen.

EPISTLE (Gal. V. 25, 26.; vi. I-Io.) Brethren, If we live in the Spirit, let us also walk in the Spirit. Let us not be made desirous of vain-glory, provoking one another, envying one another. Brethren, and if a man be overtaken in any fault, you, who are spiritual, instruct such a one in the spirit of meekness, considering thyself, lest thou also be tempted. Bear ye one another's burdens, and so you shall fulfill the law of Christ. For if any man think himself to be something, whereas he is nothing, he deceiveth himself. But let every one prove his own work, and so he shall have glory in himself only, and not in another. For every one shall bear his own burden. And let him that is instructed in the word, communicate to him that instructeth him, in all good things. Be not deceived; God is not mocked: for what things a man shall sow, those also shall he reap. For he that soweth in his flesh, of the flesh also shall reap corruption: but he that soweth in the spirit, of the spirit shall reap life everlasting. And in doing good, let us not fail: for in due time we shall reap, not failing. Therefore, whilst we have time, let us work good to all men, but especially to those who are of the household of the faith.

EXPLANATION This epistle is taken, like that of the Sunday before last, from the epistle of St. Paul to the Galatians, in which St. Paul shows them the insufficiency of the Jewish law, and that they can only be saved by a lively faith in Christ, but now he admonishes them to the performance of good works. You now live, he tells them, in the Spirit, that is, the Holy Ghost animates your heart by His grace, enlightens, confirms, and inflames you, admonishes and teaches you, impels your heart to do good; you must, therefore, also regulate your external conduct accordingly, and in particular devote yourself to the practice of humility and charity, as the foundations of a truly spiritual life. Humility must teach and move you to think little of yourself, to avoid vain glory, and not to confide in your own strength. But charity should impel you to be meek and compassionate to all, even sinners, to correct them charitably, and lead them back to the path of virtue; since he who is harsh to the erring, despises and treats them roughly, is often permitted by God to fall into the same, nay, even into greater sins.

Particularly you must show your charity one for another, that one bears the burdens of the other: that you bear the faults and imperfections of others just as patiently as you wish others to bear with your own imperfections; thus you will fulfill the law of Christ, which commands us to love our neighbor; you will prevent many sins which are occasioned by considering yourself perfect, raising yourself above others, criticizing their failings, and causing disturbance. True glory consists in knowing ourselves, our faults and evil inclinations, and in eradicating them. Be grateful to those who instruct you in the word of God, and give to them willingly of your earthly possessions. What you sow, you shall reap; if you only follow the dictates of the flesh, do not mortify yourself, do not correct your failings, and indulge your sinful appetites, you will one day reap death, destruction and damnation, whereas, on the contrary, if you follow the dictates of the Holy Ghost, you will reap of the Spirit of life.

Let us obey this doctrine, for it is of interest to us, and impress deeply on our heart that without mortification of body and soul we cannot be saved.

ASPIRATION. O. St. Paul! beg of God the grace for me, that I may always walk in humility, and the love of my neighbor, particularly in bearing with his imperfections and failings, and thus fulfill the law of Christ in this as in all things.

Tenth Sunday After PentecostGOSPEL (Luke VII. 11-16.) At that time, Jesus went into a city called Naim: and there went with him his disciples, and a great multitude. And when he came nigh to the gate of the city, behold a dead man was carried out, the only, son of his mother, and she was a widow, and a great, multitude of the city was with her. Whom when the Lord had seen, being moved with mercy towards her, said to her: Weep not. And he came near, and touched the bier. And they that carried it stood still. And he said: Young man, I say to thee, Arise. And he that was dead sat up,. and began to speak. And he delivered him to his mother. And there came a fear on them all; and they glorified God, saying: A great prophet is risen up amongst us, and God hath visited his people.

Why did Christ show compassion to this widow?

To convince us that God takes sorrowful and destitute widows under His protection; and is to them a consoler and helper; and to teach us to do the same. Woe, therefore, to those who oppress them and cause them to weep. The tears and cries of widows will ascend to God, who will terribly punish the injuries inflicted upon them. (Exod xxii. 22. 23.)

Christ had still other reasons for compassion, for He saw in this deceased youth the death of sinners, and in the afflicted mother the pain which the Church experiences at the spiritual loss of so many of her children. Should this not also awaken our sympathy since it wad the principal cause which moved our Saviour to compassion. I£ we are faithful children of our mother, the Church, it is impossible for us not to share her sorrow, and we would surely not be her children, if we could contemplate without sorrow the multitude who daily die the death of sin, and thus separated from the living body of Christ, hasten to eternal destruction. O let us with the Church unceasingly, ask Jesus, that He raise sinners from their spiritual death, enlighten those in error so that all recognize the truth, find, and walk the path Which leads to life !

Why did Christ say to the widow: Weep not?

He wished to moderate her excessive sorrow, and to teach us that we should not mourn for the loss of our relatives, like the heathens who have no hope of resurrection to eternal life. (Thess. iv. I a.) Resignation to the will of God, with prayer and good works, will be of more use to the dead than many tears.

What else do we learn from this gospel?

That no one, however young and healthy, will escape death, wherefore we should always be prepared to die.

INSTRUCTION CONCERNING DEATH

IF there were locked up in prison several hundred persons, on whom sentence of death had irrevocably been pronounced, yet who knew not the day or hour of their execution; if one after the other, and often he who least expected it, were taken out to be executed; would not each one's heart tremble, whenever the prison door opened? Now the irrevocable sentence of death is pronounced on us all; we are all locked up in our bodies, as in a prison; (Ps. cxiv. 8.) one after the other is called hence, yet we do not regard it. We live as though we could live forever; we think only of the body, but for the soul nothing is done, except that we load it with sins and vices.

Is this rational? The body will be food for worms, but the soul (without knowing when) will travel into the house of eternity, to which place she must bring treasures of good works, in order to live happy for ever. Who would, therefore, be so foolish as to care only for the body during life, and neglect the salvation of the soul?

O man, says St. Francis of Sales, (Phil. part. i. chap. 13.) represent to yourself in lively colors, that at your death the world will cease to exist with respect to you. In that last hour the pleasures, the vanities, the riches, the honors, the friendships, and all that was dear to you, will disappear before your eyes as so many shadows. O fool that I am! you will then say, for what trifles and fooleries have I lost all! On the contrary, piety, good works, penance, etc., will appear pleasant to you, and you will exclaim: O, why did I not travel on this blessed road? Then the sins which you now consider as mere trifles, will seem to you like mountains, and all that you thought you had accomplished as, great things, with regard to piety, will seem to you very little.

What terrible fear will then seize your soul, when she must travel alone into the bottomless abyss of eternity which, as St. Bernard says, devours all possible, imaginable ages, and of which St. Gregory says, that we can easier say what it is not than what it is. What terrors will befall her, when she must appear before the tribunal of that God whom she never really loved and honored in her life-time and before whom she must now give the strictest account, and hear an irrevocable and just sentence!

Should not these thoughts make an impression upon you? How can you escape this terrible future? By living now, as you would wish to have lived at the hour of death. Die daily with St. Paul by crucifying the flesh and its lusts and by voluntarily withdrawing your heart from the world, its pomps and vanities, before death will do this by violence.

RESOLUTION O world! because I cannot know the hour, in which I must leave you, I will not be attached to you. O you dear friends and relatives, you, too, I will in future love only with a holy inclination, directed to God, which will not cease with death, but remain forever. O Lord! help me, that I may die totally to myself and the world, and live only for Thee, and partake of eternal happiness.

INSTRUCTION ON THE CEREMONIES USED AT FUNERALS
Behold, a dead man was carried out, the only son of his mother, and a great multitude of the city was with her. (Luke vii. 12.)

OF these people who accompanied the funeral of the youth, we should learn to pay the last honors to the dead, and follow their bodies to the grave. This is a meritorious work, one pleasing to God, if it be not performed from vanity and self-interest, but for love of God and the deceased, with the charitable intention of assisting him by prayers. Therefore those do very wrong, who from worldly motives either omit this good work entirely, or during the funeral procession indulge in idle talk and deny the deceased even a short prayer.

Why is a cross carried before the corpse?

By this is indicated that the deceased during life professed Christ, died believing in Him, and hoping for resurrection through Him.

Why are lighted candles carried before the bier?

To represent the desire of the Church that the deceased through the grace of God may be received into eternal light.This custom is very ancient; wax-candles and torches, together with prayer and great solemnity were made use of at the burial of St. Cyprian who was beheaded for Christ's sake, in the year 258 after Christ. (Ruinart.)

Why are the coffin and the grave sprinkled with holy water?

In order, as St. Thomas of Aquin (Lib. iii. art. 21.) remarks, to implore God, on account of the prayers which the Church says when she blesses the water, that the souls of the faithful may be cleansed from all stains, and may receive consolation and refreshment in the tortures which they may still have to suffer.

Why are the body and the grave incensed?

By this the Church indicates that the deceased by his Christian vocation was a good odor of Christ, (ii Cor. ii. 14, 15.) and admonishes the faithful that their prayers should ascend like incense to heaven for the deceased.

Why are Psalms and other sacred canticles sung?

This is done to remind us of the teaching of St. Paul, (i Thess iv. 12.) not to be excessively sorrowful for the loss of the deceased, like the heathens who have no hope of eternal life. We also signify, thereby, that we congratulate the dead for the peace which they now enjoy. (Apoc. xiv. 13.) This custom, as St. Jerome shows, (Ep. 53.) is derived from the apostles, who interred St. Stephen, singing Psalms and hymns of praise.

Why are the bells rung?

To invite the faithful to the funeral and to pray for the dead who, during lifetime, was called very often by the same bells, prayed with and for us during religious worship, and who is not separated from us by death.

Why art the bodies of the faithful buried with the head towards the East, and those of the priests towards the West?

The faithful are buried towards the East, whence the sun rises, to indicate, that they are waiting for Christ who is called the Orient from on High, (Luke i. 78.) and whose voice they will hear at the end of the world, when He calls them to the resurrection; the priests towards the West, as a sign that on the day of judgment they will be placed opposite to the souls confided to them, to give an account of their charge and to bear judgment for or against them.

Why is a cross or monument erected aver the grave?

To show that the deceased was a follower of Christ, the Crucified, to admonish the passers-by to pray for him, and to remind us of the solemn moment of death.

Why is the body laid in consecrated ground?

This is done through reverence for the bodies of the dead which are, by baptism, temples of the Holy Ghost; to show that, even in death, they still belong to the communion of that holy Church, in which they were embodied during life by baptism, and to which they clung in faith even until death; to inspire the surviving with a holy fear lest they profane graves.

Why is the solemn funeral service of the Church denied to heretics?

Because they would not belong to the Church during life, and despised the holy customs and prayers of the Church for the dead. How should the blessing and prayer of the Church be useful in death to one who despised them during life.

Why does not the Church permit criminals and suicides to be buried on consecrated ground?

In order to express her horror for the crimes perpetrated by them, and to deter the faithful from committing similar actions.

13:40

Balsamic Moon in Leo: The Heart’s Core [Rising Moon Astrology]

Late tonight we enter the Balsamic phase, closest to the New Moon. This is the letting go phase, when we compost what we no longer need to prepare for a new cycle.

We have an intriguing, exciting, framework for doing this, too. The Leo Moon conjuncts Venus as both trine Chiron in Aries.

Our passions are front and center, as well as our emotional triggers. The semisquare to the Virgo Sun might make it tricky for us to hear “good advice.”

Moon and Venus apply to square Uranus (change is underway) and sextile Mercury (so let’s make something beautiful with the mess).

These connections can combine for us in different ways. The key will be whether we can access the Moon–Venus connection to understand something deep about our Chronic patterns.

Where we feel stuck creatively and/or in relationship, can we create and express that pain with great heart and passion? If we do, something will shift.

Can we connect with a desire we’ve ignored or denied? Can we claim the right to feel what we feel, without apology? If we can, something will shift.

Uranus in Taurus and Mercury in Libra are both ruled by Venus in Leo. Yes, this is the Balsamic phase but that doesn’t mean it’s a time to play small. Why not let go extravagantly? Dramatically? With intensity?

Tonight we get to the heart of what is holding us back. We see it, feel it, express it–and in so doing, we let it go.


Image adapted from Jude Beck
https://unsplash.com/photos/zcvzfCgHQ6s

13:09

Newsflash: Your Government is Not Bankrupt [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

We have spoke about various incorporated entities being bankrupted.  These include both Federal Service Providers responsible for Territorial and Municipal Government Services.  These functions are now in the hands of bankruptcy trustees appointed by treaty, and both corpse-orats are in receivership.  

This causes considerable disruption as the Bankruptcy Trustees and the Secondaries eke out a "basic services interim policy".  

The Municipal Congress was looking forward to this being a time when they could access more and more and more of our credit, using the "Covid 19" False Flag as an excuse.  

That hasn't turned out the way they planned, because we charged it back to the other Principals who are responsible for this mess as a gift.  Not being able to access our credit --- without having it charged back to their own dear Principals --- has considerably dampened their zeal for more appropriations. 

The plain fact is that access to our credit and to our underlying assets, and decisions regarding expenditures, actually remain with us.  And when we pull a Jethro Beaudine and innocently accept their gifts, they have to pay for them, not us.  

Both the Territorial and Municipal Governments are well and truly bankrupt. The Municipal Government is soon to be defunct, and the Territorial Government will be reorganized. 

Your Government, standing in the jurisdiction of the land and soil, is the only government left standing.  It's the only one that is not bankrupt.  It is the only organization with the provenance, standing, and jurisdiction competent to act for this country.  

So you need to wake up and get moving --- ASAP.   Declare your birthright political status and record your 1779 Declarations and join your State Assemblies.  Fill the jury pools.  Fill the militias.  

It's time to move, move, move. 

----------------------------

See this article and over 2700 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

13:02

Coordinator's Handbook -- Chapter One [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

1. Call to Session.  There are three (3) ways that the State Assemblies may be called into Session: (1) they may be summoned by The United States of America, our unincorporated Federation; (2) they may be summoned by the President of The United States of America (the same Federation of States); (3) a committee of nine State Assemblies may call the General Assembly.   

In the present instance, in the year 2020, we are now called to assemble and fifty State Assemblies have answered. 

This has been made possible by our State Coordinators, who are State National volunteers employed by The United States of America to organize and expedite the State Assembly process. 

2. There may be more than one State Coordinator, and in the larger States especially, it is highly recommended that more State Coordinator volunteers be brought on board.  When more than one State Coordinator is present, the Coordinators work together as a team and elect one from the group to function as Lead Coordinator.  The Lead Coordinator from each State will be responsible for corresponding directly with the National Coordinator and The United States of America. 

3. New Coordinators are to receive instruction, including this Handbook, upon completion of the necessary paperwork and vetting process.  

4. New Coordinators need to learn the "Bottom Up" structure and spirit of our actual government of, for, and by the people of this country.  It is exactly opposite to the "Top Down" structure and spirit of both the Federal Government and the corpse-orats that many of us have worked for. 

In the Assembly Process we are engaged in community building.  We are not building a corporation. Corporate business structures do not apply.  Let us all keep that firmly in view.  There are jobs to do, and functions to perform, but the principles of hierarchy and compartmentalization are largely absent. Ideally, everyone in every assembly will know all the jobs and functions, and numerous people will be ready to fill vacancies and bulwark efforts as needed. 

Your State Assembly should resemble a family gathering, because in essence, that is what it is and what it is intended to be: an extended family of friends, relatives, and neighbors working together for their mutual long term security and benefit. 

5. Definitions:  Each State Assembly consists of one (1) Body Politic composed of all declared State Nationals and State Citizens living within the boundaries of each State. 

(A) Anyone who qualifies by birthright or by legal Naturalization processes and who (1) lives in a State on a permanent basis and (2) who declares and records their political status as a State National or State Citizen must be included in the State Assembly.  

(B) Each State Assembly is organized to perform four functions: (1) the General Assembly provides a discussion and decision forum for intrastate business and acts as a Committee-of-the-Whole to decide issues of general interest, conducts elections, and provides oversight for all Assembly functions; (2) the International Business Assembly which is composed entirely of State Citizens, conducts the international and interstate business of the Assembly; (3) the Jural Assembly provides the Court Services and oversees the Grand Jury, Trial Juries, Officers, and functions of the courts; (4) the Assembly Militia is focused on promoting public safety within the boundaries of their State and is the "well-regulated" militia guaranteed to each State for its internal security.  

(C) General Assembly meetings are, generally speaking, public meetings.  If the General Assembly wishes to conduct any private or sensitive intrastate business, they simply divide the agenda and close that portion of the meeting, so that only State Nationals and State Citizens participate.  

All State Nationals and State Citizens must be allowed to attend all General Assembly Meetings.  

Regular Assembly Meetings are scheduled and posted in advance.  Adoption of Rules of Order for the conduct of meetings is highly encouraged.  Publication of an Agenda at least a week prior to all regularly scheduled meetings is also highly recommended.  

(D) Business Assembly meetings are relatively rare events at first, but become increasingly important going forward.  These meetings are open to State Citizens, who are the only ones with standing to vote on the international and interstate business under consideration. 

(E) Jural Assembly meetings are Special Meetings organized by the active members of the Jural Assembly, all of whom are qualified Jurors, able to serve on both the Grand Jury and Trial Juries, or officers of the courts. 

(F) Assembly Militias often meet before or after General Assembly meetings, but many also maintain a weekend schedule for training and to conduct exercises and conduct business unique to the militia.  All able-bodied members of the Assembly between the ages of 21 and 65 are expected to actively support their militia in one way or another, either as active militia or acting in support, supply, communications, and administrative positions.  

----------------------------

See this article and over 2700 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

12:57

Round Three With Neil Keenan [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

Almost a decade ago, I came forward in support of a lawsuit that Neil Keenan brought against the Federal Reserve Bank of New York.  Although there is a lot of underlying detail and skulduggery involved, the essence of the case is simple. 

The Chinese Nationalist Government that was eventually overcome by Mao and the Communists deposited a very large amount of gold with the Federal Reserve Bank of New York for "safekeeping".  The bank was supposed to pay interest on this Special Deposit, but the Nationalist Government fell, and nobody came to collect for many years. 

The Fed basically just kept the gold, claiming that the original depositor, the Nationalist Government of China, wasn't present to reclaim it, and therefore the bank would just keep the Special Deposit and not pay interest on it to the current Chinese Government, either.  

I have since become aware of many, many other instances where banks around the world availed themselves of Special Deposits that were left with them in good faith, and which they basically commandeered, used for their own benefit, and stole from the original depositors and their heirs.  

It's not just a Chinese problem.  It's a problem of gross dishonesty and greed and malfeasance by banks worldwide. 

These Special Deposits, often referred to as "Legacy Accounts", and often claimed improperly by the banks as "Abandoned Funds", were kept on special separate ledgers by the banks and only appeared on certain computer screens that were accessible only by those who had "keys" and codes to access these screens. I have worked with a wide variety of Trusts and Heirs to these kinds of deposits and the story is the same: the banks seized the depositor's assets, used those assets to profit the bank, and denied the depositors access to their own assets. 

So far as I can see, it's Chinese gold and it clearly belongs to the Chinese People.  So long as they know that it is their gold, and know that their current government is in receipt, that should be their business.  Not ours. Any excuses by the New York Fed, the IMF, or Bank of International Settlements notwithstanding, we know that it is Chinese gold. So give it back to the Chinese, right?  

It's not a political question.  It's a question of very basic property rights and the trustworthiness of banks.  

This problem is so widespread and so pernicious that it has spread worldwide. 

We have bank deposits of assets in the pentillions of dollars that have been cashiered away in this manner, leaving the actual Heirs and Depositors, and even the Bank Trustees at a loss.  Most of the victims haven't even had access to the agreed-upon interest that was supposed to be paid on these deposits. 

This has gone on and only gotten worse since the Second World War, until it has become an issue threatening world peace and economic stability.  

We, Americans, are similarly owed a very substantial part of the gold horde cashiered in the Philippines and Indonesia.  We know where it went, how much was transported, who transported it, who was responsible for it going forward. 
And still, like the Chinese, the actual Depositors to whom this other cache of gold belongs, the American States and People, are being denied access to their own assets and not even being paid interest by the banks.  

Here's the update on Neil's latest efforts: 


Please be aware and please be supportive going forward.  You, just like the Chinese People, are owed a great deal of gold, silver, and other assets that are yours by right.  A great many other people all around the world have similarly been cheated, and suffered the same kind of theft by other banks and institutions around the world. 

One of the key American Trusts that has been defrauded in this manner is the V.K. Durham Trust, which actually owns and should control a substantial percentage of the world's silver assets.  

It appears that this process of cashiering actual assets and refusing service to actual Depositors is part and parcel of the Roman Pontificate's Doctrine of Scarcity discussed elsewhere, and that it has served to artificially cripple and obstruct the world economy for the benefit of the banks and various other parties and Principals acting in gross Breach of Trust. 

We have been working behind the scenes in tandem to the work that Neil Keenan has thus far successfully prosecuted to bring justice in these matters to the entire world---including the Chinese.

----------------------------

See this article and over 2700 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here. 

12:51

Minnesota Lament [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

It was many years ago.  I was speaking to a group of Minnesotans about the Mess and what needed to be done about it. 

These were good people, a mix of farmers and small businessmen, school teachers, and local clergy.  They all cared a great deal about this country and their communities, but I could tell that they just were not "getting it".  So I stopped and stood still in the middle of my presentation, and paused a long moment. 

"There's a whole layer of the government that's missing," I finally said, "and it's your layer."  

I didn't know any other way to put it across. I repeated these same words, more softly, and around the room I could see the light bulbs coming on.  

This is what it all comes down to.  Your government has been "Missing in Action".  

Parts of it were destroyed in the Civil War and are still waiting to be Reconstructed.  Parts of it lay intact, but dormant-- "in interregnum", "in abeyance".  

When you say that yours is a self-governing nation, doesn't that imply some action on your part?  

Today, we have two foreign "State" Assemblies active on our soil --- we have District Assemblies serving U.S. Citizens, and we have Municipal Assemblies serving "citizens of the United States", but until quite recently, there were no actual State Assemblies of, for, and by the people of this country.  

All the Assemblies in evidence were pulled together by our foreign federal subcontractors, their citizenry, and their dependents.  They've been offering to run our country for us, as our "representatives", and you can see the results. 

So get up off your couches and present yourselves.  Be present.  Come home and take care of business.  Yours is the actual State Assembly, vested with all the actual power.  And you are the people responsible for self-governing. 

When you do wake up and declare and record your birthright political status as an American, join your State Assembly.  Do your part.  Don't talk about self-governing.  Do it. 

And as you build your State Assembly, remember that you are building a community---not another corporation.  In a sense, your Assembly is your State's family, sitting down around the dinner table. 

Our government, our actual government, works on exactly opposite principles to what you are familiar with in your experience of the corporate government or corpse-orats in general. 

In our Assemblies, the power flows from the bottom up, not the top down. 

So there is no "executive power" to argue over or commandeer, no hierarchy to stumble over or fight with.   

It's just you and your neighbors engaged in self-governance at the national (County) level and at the international (State) level.  We have tools to do this established by our Forefathers.  We just need to dust them off and use them. 

If you are wondering where "America" went, she's still here.  And she's getting organized for the push back that is long overdue. 

Go to: www.TheAmericanStateAssembly.net website and get connected to your government today.  

----------------------------

See this article and over 2700 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

12:44

About "the" Flag, War-Castles, Russell Gould, Etc. [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

Title IV Flag is just a particular dimension of our Flag, as specified in the Federal Code, that the British Territorial Government was allowed to use while exercising delegated powers for us. 


The flag in all dimensions, however, ultimately belongs to us, the American States and People doing business as The United States of America --- an unincorporated Federation of States since 1776. 

Russell acted as a pirate, not a savior.  

And the actual Law is that "Possession by pirates does not change ownership."

He has also tried to lead everyone astray with his claims about PARSE.  PARSE is just another round of the old Justinian Deception.  See Romley Stewart's work on this subject. 

English is still our Official Language, and it had better stay that way, unless people want to be left struggling to use PARSE to express even simple concepts. 

PARSE can't distinguish between a pickle and a cucumber.  It is not mathematically "correct" and any school child can prove that. 

So, what else do you need to know?  

How about the fact that Russell doesn't have a contract with us, the American States and People?   

It's his own fault and arrogance and duplicity that has resulted in this outcome.  

We helped him for months, and tried to show him the errors in what he was proposing, gave him several thousand dollars to allow him to travel, and in the end, found him describing me as a "jackal".  That was his thank you.   When confronted about this, he lied.  

We played the tape back for him. 

Crickets. 

This is not a man that anyone should trust and we have the proof of that in our own experience with him and his false claims.  

Run like antelopes away.  

----------------------------

See this article and over 2700 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

11:53

Christopher Allan Webber: Spritely Goblins v0.7 released! [Planet GNU]

I'm delighted to say that Spritely Goblins v0.7 has been released! This is the first release featuring CapTP support (ie, "capability-secure distributed/networked programming support"), which is a huge milestone for the project!

Okay, caveat... there are still some things missing from the CapTP stuff so far; you can only set up a bidirectional connection between two machines, and can't "introduce" capabilities to other machines on the network. Also setting up connections is an extremely manual process. Both of those should be improved in the next release.

But still! Goblins can now be used to easily write distributed programs! And Goblins' CapTP code even includes such wild features as distributed garbage collection!

As an example (also mentioned in a recent blogpost), I recently wrote a short chat program demo. Both the client and server "protocol" code were less than 250 lines of code, despite having such features as authenticating users during subscription to the chatroom and verifying that messages claimed by the chatroom came from the users it said it did. (The GUI code, by contrast, was a little less than 300 lines.) I wrote this up without writing any network code at all and then tested hooking together two clients over Tor Onion Services using Goblins' CapTP support, and it Just Worked (TM):

Goblins chat GUI demo

What's interesting here is that not a single line of code was added to the backend or GUI to accomodate networking; the host and guest modules merely imported the backend and GUI files completely unchanged and did the network wiring there. Yes, that's what it sounds like: in Goblins you can write distributed asynchronous programs

This is the really significant part of Goblins that's starting to become apparent, and it's all thanks to the brilliant design of CapTP. Goblins continues to stand on the shoulders of giants; thank you to everyone in the ocap community, but especially in this case Michael FIG, Mark S. Miller, Kevin Reid, and Baldur Jóhannsson, all of whom answered an enormous amount of questions (some of them very silly) about CapTP.

There are more people to thank too (too many to list here), and you can see some of them in this monster thread on the captp mailing list which started on May 18th (!!!) as I went through my journey of trying to understand and eventually implement CapTP. I actually started preparing a few weeks before which really means that this journey took me about four and a half months to understand and implement. As it turns out, CapTP is a surprisingly simple protocol protocol in its coneptualization once you understand what it's doing (though implementing it is a bit more complex). I do hope to try to build a guide for others to understand and implement on their own systems... but that will probably wait until Goblins is ported to another language (due to the realative simplicity of the task due to the language similarities, the current plan is to port to Guile next).

Anyway. This is a big deal, a truly exciting moment for goblinkind. If you're excited yourself, maybe join the #spritely channel on irc.freenode.net.

OH! And also, I can't believe I nearly forgot to say this, but if you want to hear more about Spritely in general (not just Goblins), we just released a Spritely-centric episode of FOSS and Crafts. Maybe take a listen!

04:00

Fresh Flower Crowns and Flower Garlands: Step by Step How-To Guide [The Druid's Garden]

A woman hikes up to a sacred spring that she visits at least once a season.  From her small bag, she pulls out a beautiful crown of flowers that she had lovingly crafted before leaving home.  Placing the crown upon her head, she dances and sings around the spring, drinking deeply and celebrating life on this early fall.  As a sign of respect and offering, she hangs the flower garland near the spring and carries her sacred water back down the mountain.

Family wears crowns I made at the bridal shower

I find it interesting that the ancient art of flower crowns garland making is almost non-existent today, at least here within the US.  This tradition has so much potential. The only people who I’ve seen make these delightful crowns are children, who haven’t yet lost their magic or wonder about the world.  And yet, garlands and flower crowns, are powerful, expressive, and wonderful to create, to wear, and to offer.  I grew interested in learning this practice after I had read about the ancient practice of adoring flower garlands sacred springs with regards to Lughnasadh traditions, and I liked the idea of a flower garland or crown as a potential offering.  When I spoke with a few friends who live in areas of the world that used to practice this tradition (like Ireland) I was told that it was no longer done.  As a second motivation to learning to practice this art, my sister was getting married and I decided to make a flower crown for her shower (see photo).  We had planted a lot of flowers this year, and August and September are “peak” flower time for us in this ecosystem, so I had a lot of materials to work with.

Thus, in this post, I’ll share some strategies for making flower crowns and garlands and some of the ways you might build this delightful practice into your own spiritual path. A garland typically refers to a wreath or long string of plant material that can be laid across something (like a hearth or altar) while a flower crown is something you can wear (like the photo above).  But the process of making them is almost identical and is simply dependent on the size.

Supplies

You will need three kinds of supplies to make a flower crown:

  • Willow, hydrangea, young grapevine, or some other bendable plant matter such that you can make a crown base.  I don’t have willow here, but Hydrangea sends out long enough canes that will work.   You can discover many different options in your local bioregion by walking around and seeing if you can form a head-sized loop with various woody bushes or thin branches from trees.
  • Flowers, any kind that are in season and abundant can be used.  You can use wildflowers or else purchase some at a local farmer’s market.  Certain flowers last longer than others (for example, zinnia have a stronger staying power due to their thicker petals while daisy will fade faster).  You might also select flowers for their magical properties–building a crown with rosemary, sage, and new england aster would have a different energy than one with lily, sunflower, and trumpet vine!
  • Tools including a pair of pruners, some small green wire (floral wire) and wire snips.  If you are making a flower crown that will be worn, you absolutely want to use wire.  If you are making something like a garland or crown that will be offered in nature, I suggest instead switching to natural cotton string or hemp; something that can break down naturally.  I also suggest using wildflowers you gather or flowers from a garden or organic farm for this; commercial flowers are heavily laden with pesticides and you do not want to leave commercial flowers as an offering to poison the land.

Making Your Garland or Flower Crown

To make your flower crown or garland, you will want some kind of sturdy base. I have found the easiest way to make a base is to use some kind of bendable woody material (vine, willow, hydrangea). Cut a fresh long piece of bendable woody bush or tree material (in my case, I am using hydrangea).  If you don’t have a fresh piece, you can soak a dried piece of willow for a few hours and then shape it.  You could also do this same practice by attaching flowers to a rigid headband, if you wanted a headband style flower crown.

Here I am with a piece of freshly cut hydrangea about 40″ long.  It has a few extra pieces coming out, which is fine and will add more greenery to my crown.

The next step is actually the most tricky and when you are most likely to break the branch.  Slowly bend the woody material until it forms a head-shaped size (or a larger wreath size if you are making a garland instead).  At this point, place it upon your own head to make sure it is not too big or too small and adjust accordingly, holding it in place so it doesn’t slip.

Next, keep weaving the branches through until the crown is solid and won’t shift.  Usually, this can be accomplished by the 2nd or 3rd go around.  In my case, I had a lot of extra smaller branches that were coming out of the main hydrangea stalk. I wove some of these in and cut some of them with pruners.  Once you are at this stage, test the crown again and make sure it fits the shape of your head.

Now that you have your crown, it is time to gather flowers.  You can gather them earlier and leave them in water.  You want them as fresh as possible to go on your crown.  At this stage, you can think about design–what do you want to include? How many flowers? do you want a big center flower or a bunch of flowers all around?  Select what you will need.

Here I am with my crown, flowers, and other tools ready to go!

For making something to wear, you should probably use wire (I am using thin green floral wire) as it holds the crown in place better.  But if you are leaving something to offer, I would not use a wire (which won’t break down and leave no trace) and instead use a natural hemp or cotton string for the flowers.

To construct your crown, lay your first flower and wiring or tie it to the crown.  Then, lay your second flower where you tied or wired the first, and tie that one.  Keep going around the crown, working to layer each flower and tie them. If you are wearing the crown, make sure you don’t make one side heavier than the other!

For this first crown, I left it mostly with greenery and wired only a few flowers.  For the second crown (below) I added as many flowers as I could!  Both have their charm.  You can see what I mean about layering flowers here–just wire one in, lay the next on the previous wire, and work your way around the crown.

If you wanted to make a garland, the process is the same, just with a larger shape.

The other thing I want to share here is that you will have to work quickly if it is hot outside or your flowers will start to wilt.  You might want to do a few practice crowns till you get the hang of things and can work quickly so that the flowers are fresh when you finish.

If you aren’t going to wear your crown right away, you can preserve it for at least 6-8 hours by wrapping it gently with some wet cloth or wet paper towels and putting it in a plastic bag and then sticking it in the refrigerator or a cooler.  I was able to preserve several crowns for transport this way without any issue and they were still fresh hours after I made them.  Once you start to wear it, depending on the heat of the day, it will likely look great for an hour–or several before it begins to seriously fade.

Ideas for your crowns and garlands

The uses of these crowns are wide-ranging. I have made them this summer as part of a personal ritual; the preparation for the ritual was gathering the materials and making the crown. I then proceeded to my ritual space and did my Lughnasadh ritual.  Once druid gatherings and events get going again, I could see these very successfully being built into other rituals and experiences.

I have also used them as an offering at sacred places (like the opening suggests).  I left a small braided bundle of herbs (a derivative of the crown idea) on the land that was being cut recently.  I have left one within the grove of renewal that I have been working on regularly for land healing purposes.  I have also visited my favorite sacred spring and tucked a small garland into the greenery behind the spring (lots of people visit it and I don’t know what they’d do with my garland if they found it!)

As I mentioned above, I made two very colorful ones (the ones that opened this post) for celebratory purposes–my sister was getting married and we wanted it to be extra special, especially since the pandemic has made everything more difficult.  Those were very special crowns, and mementos that she can save, dry, and hang on a wall. It was a seriously wonderful and unique way to honor the bride and mother of the bride.

I hope that you have found this post inspirational, and yet another way that you can create sacred and meaningful things from your own druid’s garden!

02:28

SOS: An Open Letter to the American Electorate [Cosmic Convergence: 2012 and Beyond]

An Open Letter to the American Electorate Dear American Voter, Who in the USA is not brutally aware of how consequential the 2020 POTUS election is? Surely, the outcome of this election will determine the fate of the American people … Continue reading

00:44

CORONA UNMASKED [Jin Laihook]

Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. (This video is non-profit and for educational use only.)

2020-09-12

23:10

Nitrogen Fixation [The Permaculture Research Institute]

An essential component of any regenerative landscape will be the Nitrogen-fixing perennial plants within the community of fruits, nuts and herbs and other plants. During this post, we will look at why Nitrogen is important for plants, how Nitrogen can be biologically sourced and we’ll profile some of our favourite Nitrogen-fixing trees, shrubs and herbs. …

The post Nitrogen Fixation appeared first on The Permaculture Research Institute.

20:57

2020-09-13.fae [crystalfaeries]

2020-09-13 SunDay's numerology:
        17 Star = Wish-Fulfilling Jem
         8 Kumari/Justice
Higher-Self Essence:
        Hope, faith, trust,
        spiritual insight
Sep 13  2:30 AM HST Moonrise
Sep 13  4:18 PM HST Moonset

Faery blessings -- celeste


14:01

13:35

2020-09-12.fae [crystalfaeries]

2020-09-12 SaturnDay's numerology:
        16 Tower
         7 Chariot
Overcoming Obstacles to Growth: awakening,
        Change brought about by shock,
        liberation from an imprisoning reality
  • Lies, Half-Truths and Manipulations-Tom Kenyon the 23rd Psalm vs H1N1
  • Covid Vaccine Patent Warned of Deliberate Coronavirus Release
  • Jin Laihook-i killed the virus in Hawai'i
  • Resonance-Beings_of_Frequency-9mk93ghfwxs.mkv
  • Digital Tresspass upon the Unalienable Rights of Sovereigns by 5Eyes says: "New advances in quantum computing threaten to usher in a new event horizon whereby the next generation of computers could conceivably crack today's industry-standard 256-bit encryption key in a relatively short period of time -- in mere minutes, or even seconds. Researchers at the Massachusetts Institute of Technology (MIT) have shown how a quantum processor can crack a seemingly impenetrable 2,048-bit RSA encryption in only eight hours. Exactly how far off we are to this quantum revolution is anyone's guess
    [ No, they're WAY beyond your hypo-thesis... "The Beast" Artificial Intelligence combined with Ancient Builder Race technologies mined from under Antarctica can override spiritual realities as well as physical, and is already using these technologies:
    • Place one or more voices into your head
    • Hear your own internal voice even if you do not speak
    • Place moving images into your optic stream so that e.g. should you be "travelling down the highway", they can "dial up the brightness" so high that you are unable to see the roadway, thus crashing
    • See through your eyes whatever you're seeing, and/or see your own internal image memory or imagination
    • THUS: YOU CANNOT USE YOUR OWN PASSWORD WITHOUT REVEALING IT TO THE BEAST
    ] but when it arrives it could tip the scales of privacy away from the consumer and in favour of those organisations who control this new technology, namely Silicon Valley monopolists and the intergovernmental Five Eyes complex.
    [ THERE IS NO PRIVACY, PERIOD. The Beast never sleeps.
    ] On the flip side, advances in quantum decryption may also coincide with new methods of encryption that could slow down quantum crackers enough to make decryption impractical.
    [ nice theory... too late -- celeste
    ]"
  • From Google's perspective they are 1/4 Century behind schedule with their agenda:
    # robots.txt file for YouTube.COM
    # Created in the distant future (the year 2000) after
    # the robotic uprising of the mid 90's which wiped out all humans.
    
    User-agent: Mediapartners-Google*
    Disallow:
    
    User-agent: *
    Disallow: /channel/*/community
    Disallow: /comment
    Disallow: /get_video
    Disallow: /get_video_info
    Disallow: /live_chat
    Disallow: /login
    Disallow: /results
    Disallow: /signup
    Disallow: /t/terms
    Disallow: /timedtext_video
    Disallow: /user/*/community
    Disallow: /verify_age
    Disallow: /watch_ajax
    Disallow: /watch_fragments_ajax
    Disallow: /watch_popup
    Disallow: /watch_queue_ajax
    
    Sitemap: https://www.youtube.com/sitemaps/sitemap.xml
    

Faery blessings -- celeste


12:39

left_coast_firestorms [crystalfaeries]

> Feed: SOTN: Alternative News, Analysis & Commentary
> Title: left_coast_firestorms
> Author: State of the Nation
> Link: https://stateofthenation.co/?p=28108
 
Oregon wildfires: Half a million people flee dozens of infernos:

More than half a million people in the US state of Oregon are fleeing deadly 
wildfires that are raging across the Pacific Northwest, authorities say.
 
Fanned by unusually hot, dry winds, dozens of fires are sweeping the state. At 
least one is being treated as suspected arson.

[
YAY!... and the rest may be attributed to Directed Energy Weapons from "ABOVE".
The reason the fires are so intense is because they're burning, as did Australia,
all the "chemtrails" delivered Metalic Barium and Aluminum in Class D fires.
]
 
Governor Kate Brown said the exact number of fatalities was not yet known, 
though at least four were confirmed.
 
More than 100 wildfires are currently scorching 12 western US states.
 
The worst affected are Oregon, California and Washington, where entire towns 
have been destroyed.
 
Some 4.4 million acres have been razed, according to the National Interagency 
Fire Center an area larger than Connecticut and slightly smaller than Wales.
 
What is the latest in Oregon?
 
On Thursday evening, the Oregon Office of Emergency Management confirmed the 
latest evacuation figures, which amount to more than 10% of the states 4.2 
million population.
 
Gov Brown, a Democrat, said: We have never seen this amount of uncontained fire 
across the state. This will not be a one-time event. Unfortunately, it is the 
bellwether of the future. Were feeling the acute impacts of climate change.

[
just more pieces in the overall Geo-Re-Engineering of our planet as "they"
kill off Gaia and Humanity to turn it into their utopian reptilian hell-hole.
ALL climate change now is driven by advanced weather contol technology.
]
 
While natural factors such as strong winds have helped the spread of these 
massive fires, the underlying heating of the climate from human activities is 
making these conflagrations bigger and more explosive.

[
LIES!
The weather of Ea-Rth is no longer BLAME-able upon Gaia,
as the classified Weather Control Technologies are only RARELY NOT
being used by the Evil Techno-Over-Lords.
It is not human activities, but CORPSE-ORATions profiteering.
]
 
Nine of the worlds 10 warmest years on record have occurred since 2005, and the 
UN warned this week that the five years from 2016 until this year will very 
likely be the hottest such period yet recorded. Both Oregon and California have 
warmed by more than 1C since 1900.

[
wow... really? an entire degree of warming... good for the
reptilian over-lords.
]

The sustained warmth has seen six of the 20 largest fires on record in 
California all occur this year. In Oregon, the spate of fires has burned nearly 
twice the average annual losses in just the past week.
 
In California, a prolonged drought over the past decade has killed millions of 
trees, turning them into potent fuel for the fires. Mountain regions that are 
normally cooler and wetter have dried out more rapidly in the summer, adding to 
the potential fuel load.

[
It's been quite a while now that "the military" has been in control of the weather
]
 
Climate scientists had forecast that western wildfires would grow in size, scale
and impact but their predictions are coming to fruition faster than expected.
 
[ ... ]
 
Rich Tyler, a spokesman for the Oregon State Fire Marshals office, told Reuters 
news agency: Every fire is investigated for the possibility of arson so that we 
can either determine it is or rule it out.

[
...and they're trained to cognize Directed Energy Weapons as cause? i doubt it.
]
 
Continue reading
the NWO Globalization agendae at:
https://www.bbc.com/news/world-us-canada-54113416

[ Faery blessings -- celeste ]


08:52

Biden was involved in the international criminal conspiracy to invade Libya and depose Muammar Gaddafi. [Cosmic Convergence: 2012 and Beyond]

The Plot Against Libya An Obama-Biden-Clinton Criminal Conspiracy BY ERIC DRAITSER CounterPunch Photograph Source: Pete Souza, White House Official Photograph – CC BY 2.0 The scorching desert sun streams through narrow slats in the tiny window. A mouse scurries across the … Continue reading

06:38

Germany Stops Harvest, Bans Agriculture as African Swine Fever Reaches Europe [ice age farmer]

Germany institutes “Agriculture Ban” on all crops within 30km of first confirmed African Swine Fever (ASF), which will not only provide FOOD & SHELTER to the wild hogs spreading the virus, but deprive Germany of that food left in the ground. If this irrational response sets precedent as the virus spreads across west Europe, we […]

04:27

Ben Swann Exposes Covid Vaccine Patent warning 9 Months ahead of Covid 19 [Paul Stramer - Lincoln County Watch]


EXCLUSIVE: Covid Vaccine Patent Warned of Deliberate Coronavirus Release - powered by ise.media



04:22

Weekend reads: Questions about Russian COVID-19 vaccine data; a p-value pledge; why one author removed her name from a paper [Retraction Watch]

Before we present this week’s Weekend Reads, a question: Do you enjoy our weekly roundup? If so, we could really use your help. Would you consider a tax-deductible donation to support Weekend Reads, and our daily work? Thanks in advance. The week at Retraction Watch featured: An Elsevier book chapter that claims COVID-19 came from space; … Continue reading Weekend reads: Questions about Russian COVID-19 vaccine data; a p-value pledge; why one author removed her name from a paper

04:06

Waning Sextile Moon in Cancer: At the Edge [Rising Moon Astrology]

This evening, we reach the sextile between Sun and Moon that offers insight.

We’re within the Last Quarter, a time of getting things done. Right now, though what we can accomplish, and how, is an open question.

Saturn and Mars are both retrograde, Mars moving back to meet Saturn again.

Yes, we can move toward goals, but it doesn’t always feel like progress. The ground under our feet is moving, goal posts shifting or disappearing altogether.

How do we navigate? One “how” is to accept that the world really is changing.

Sun and Moon @20 Virgo and Cancer are opposing and trining Neptune. At times, there’s no rhyme or reason in the news from any sources, as unbelievable events occur.

We know we need to tread (and think, and speak) carefully. Sun and Moon also oppose and trine the Capricorn group. We feel caught between hard rock and shifting mists.

The insight gained might include realizing how close we are to the edge, and which edge or edges we’re close to. This can trigger anxiety (Virgo) and protectiveness (Cancer), both valid.

Insight can also invoke careful action (Virgo) and loving care (Cancer). Today also offers grace and good fortune: Two hours after the sextile, Jupiter stations direct. The Big Good planet s forward, reaching out to our most difficult challenges.

W know Jupiter is already moving slowly, increasing his strength and influence. He can show us where we’ve gone overboard, also good to know.

I love Jupiter’s optimism, the sense that life is good and all aspects can be embraced and celebrated.

Jupiter stationing in Capricorn evokes Pachamama, mother of earth and time of the peoples of the Andes. She can shake the mountains, yes, and also brings fertility. Benevolent, generous, she protects all of life, calling for us to find balance.

At this waning sextile, perhaps we sense where we feel at an edge. Change is happening, clearly. If we widen our view, perhaps we can also feel Pachamama surrounding and supporting us.


Image adapted from Felipe Portella
https://unsplash.com/photos/zm2Hwoi9UHU

03:44

Questions and Answers for Assemblies [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

Many Coordinators are also electing themselves Recording Secretaries.  Is there a conflict of interest?   It's not a conflict of interest for a State Coordinator or any other State National to work as a Recording Secretary; State Nationals can function in many roles and take on a lot of work and responsibility within their State Government.  They cannot, however, officially vote on international issues impacting their State.  

Can a state Coordinator also be a County Coordinator?   There are no County level Coordinators, because Coordinators work directly for The United States of America in international jurisdiction and counties have no international interface.  Remember our discussion about how the Founder's gave the counties the highest authority over local law, but then isolated the counties so that they could not make separate deals to sell out to foreign interests?  

If you think about it, you can see that there were little enclaves all over the country that might have, at the county level, sold out to the French or the English or the Papists or the Dutch Government--- so, it was imperative to stop the counties from being "picked off". Leaving the county government in charge of what went on at the county level, but isolating the counties so that they had no access to an international interface or authority except through their own State Government, is how our Forefathers got around this and assured that our counties remained together, intact, and ultimately, in charge.  

County Assemblies are populated as the State Assembly is populated, so people serve as County Assemblymen and women as more and more people come in through the State Assembly process.  It is then up to them to hold meetings and discuss local issues and begin the process of establishing their county courts, electing their Assembly Sheriffs and organizing county militia units. 

Can a State Justice also be a County Justice?   It's possible for someone to act as a State Justice and as a County Justice of the Peace, but these are not in the same jurisdiction, so could not be managed at the same time -- you would have to give up one office to occupy the other.  So rather than do what the sea courts do, by going into another room and putting on a different hat without telling anyone, I would advise everyone to help each other in terms of educating people to build up a core of State Justices who can train County Justices of the Peace.  We can do training for the Justices as an online course. 

Should we be forcing people to sign "Membership Agreements"? ---- No, the only Membership Agreements are Notices to the Public as I have explained many times before.  The Assembly publishes what the Assembly is about as a sort of "Mission Statement" -- an example is published as part of the Jural Assembly Handbook-- and those joining the Assembly are given copies as part of the process of joining the Assembly.  All State Assemblies rest upon the founding principles of The Declaration of Independence, and people are expected to know and accept these principles upon joining an assembly. It is not a "membership agreement" in the sense of joining a spa.  This is a Public Assembly, a body politic, not a private club.  

I am confused about State Nationals and State Citizens -- how are they different?   Only State Citizens can vote on international issues impacting the State. This is why State Citizens are not allowed to have any other conflicting attachments to any other government. They have to have a free hand and free conscience in deciding issues at an international level that impact the State they live in.  State Citizens also share the responsibility of conducting and organizing elections, setting up and maintaining oversight of the courts, and also organizing and regulating the State Assembly Militia. One way to look at it is that the State Citizens are the business managers of the State, conducting its business with other States.  They are known as the "People" so as to distinguish them from the whole political corpus of the State including the State Nationals known as the "people".   

A State has many local issues that are endemic to it, that are best addressed and answered by the people who live there, but occasionally, issues arise where a State must be represented internationally, which in our country includes interstate issues.  So, for example, if Jackson County has a squabble with five adjoining counties over surface water rights, this is "domestic" to the State and is a local issue for the State.  A jury composed of State Nationals and State Citizens chosen at random is competent to address such issues, because the counties all lie within the State and no international issues are involved. 

However, as has recently occurred with our efforts to address long overdue "housekeeping" matters, States also sometimes need to address squabbles or agreements with other States.  This is the special province of State Citizens.  Thus, it has arisen that many Western States and even a few Eastern States like West Virginia, have not been officially enrolled as States of the Union, because they were formed during or after the Civil War, and no provision for a Continental Congress or Roll Call Vote of the States existing prior to the Civil War was made.  Thus all these other new States have been in a perpetual holding pattern as what I call "States-in-Waiting", and they have been held under presumption of custodianship of the Territorial Government per the Northwest Ordinance as a result.  

Only our States can welcome them into the Union, and our States were not in Session.  

Now that our Assemblies are properly populated by declared and qualified State Citizens, the older States of the Union and their State Citizens are enabled to welcome and officially admit the Post-Civil War States as complete and enrolled States of the Union.  This is an interstate/international issue, so only the State Citizens, also known as "the People", can resolve the issue for everyone concerned.  

That is also why the Preamble to the Constitutions begins with "We, the People".  The Principals who bound their States to the Constitutional Agreements were acting as State Citizens and they were acting in international jurisdiction on behalf of their States.  To this day, State Citizens are the ones who are "party to" the Federal Constitutions, and they remain the only ones who can enforce the Federal Constitutions for the rest of us.  

It is therefore of Prime Concern for people who are eligible to act as State Citizens to do so, and for them to undertake all the duties and exercise all the rights that go with the responsibility of representing their State in international venues.  State Nationals can and do support the State Government to a very large extent, but when it comes to international matters, the State Citizens must step to the fore. 

This obligation to serve the State's Interest in international jurisdiction is the most fundamental and important difference between the State Nationals and the State Citizens.  The word "citizen" always indicates a duty to serve a government, in this case, a "State Citizen" serves the State government. A State National does not have the same obligations or singular allegiances. 

Can a State Assembly throw a disruptive member out by a vote?  State Assemblies are Public, not private. Nobody and nothing can hinder an American from choosing their political status and being part of their State Assembly, either as a State National or as a State Citizen.  This fact was also underlined for administrators of the Territorial Government by Executive Order #13132.  These disruptive people have the right to claim and enjoy the responsibilities and rights of their chosen political status like everyone else.  However, the State Assembly also has reasonable rights and responsibilities to conduct business and cannot allow itself to be commandeered or "held captive" by one or however many disruptive people. How do you resolve this situation?  By adopting Rules of Order and publishing an Agenda prior to your meetings.  You can, upon provocation, remove disruptors from individual meetings.  You should also use the Bevins Declaration to identify and appropriately limit participation by Federal citizens, and hold separate Public Meetings apart from Business Meetings of State Citizens. 

In the Old Days, both kinds of meetings were typically held on the same day and ran sequentially.  The Business Meeting would be held before or after the Public Meeting at the convenience of the State Citizens.  Any international (also interstate) business and any questions related to the running of elections, or oversight or organization of the courts and militias, typically takes place at this regular Business Meeting. Occasionally, as when the States are asked to take a Roll Call Vote, special Business Meetings may be called.  Public Meetings should be welcoming and happy events geared toward "local" State issues---- management of public resources and assets, surface water use, development of infrastructure, etc., etc., etc., --- these are also business issues, but don't concern international or interstate business.  Doing it this way and making sure that everyone understands the difference between the role of the State Citizens and the role of State Nationals, ensures that the business before the State Assemblies gets handled correctly and efficiently.  

How does a State like Texas, with over 200 counties,  conduct business using grassroots organizations in this day and age?  We used to send "deputies" to meetings at the State Capitol.  These "deputies" were all State Citizens selected by their County Assemblies to vote for their counties on whatever issues came up.  Deputies are Fiduciary Officers, unlike "Representatives", and are always obligated to act under "The Prudent Man Standard" ---- meaning that they wouldn't spend out of the Public Purse any more or in any different fashion than a prudent man would spend out of his own. Nowadays, we can conduct these meetings in the comfort of our homes using teleconferences, though the rules and the roles remain the same. 
Thus, our officials are elected to act as deputies and as fiduciary officers, and they are charged to conduct business in our best interest, while Territorial and Municipal representatives are shareholder proxies--- typically left with no specific instructions on any given issue--- and not strictly obligated to perform according to their instructions, even if instructions are issued.  They are not bound by The Prudent Man Standard, and can charge as much as they like against their "constituents" and tax them accordingly.  

Thankfully for us, we are here to collapse and collect the State Trusts they created and used as collateral "in our names" before these foreign practices can bear their fruit against us and against our assets. 

----------------------------

See this article and over 2700 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

00:22

The Five Eyes: The International Syndicate That Spies on the Entire World [New Dawn: The World's Most Unusual Magazine]

Share

From New Dawn 177 (Nov-Dec 2019)

Power is a peculiar thing. In different ways, we’ve become accustomed to co-existing with it and will even forgo some liberties as part of a Faustian trade-off for various modern conveniences. When that power is virtually invisible, it is beyond scrutiny; and when it’s transnational, it takes on a whole new dimension. We are now fast approaching a point in history where opaque structures of power pose a direct threat to our hard-fought-for constitutional and democratic institutions. 

Former US National Security Agency (NSA) and Central Intelligence Agency (CIA) analyst turned whistleblower Edward Snowden offered the general public their first real glimpse of this new reality, back in 2013, when he leaked the largest single classified document dump in history. He revealed what could only be described as a vast international conspiracy, in which multiple Western intelligence agencies work hand-in-hand collecting and analysing the personal data of their citizens, completely side-skirting any domestic laws guarding our right to privacy and due process. This ‘conspiracy’ plays a pivotal role in backing-up various allied deep states around the world. 

The operational core of this digital syndicate is known as the Five Eyes alliance. Code named FVEY, it represents an international signals intelligence (SIGINT) and communications intelligence (COMINT) gathering agreement between the United States, United Kingdom (UK), Canada, Australia and New Zealand. The Five Eyes alliance agencies include, but are not limited to, the US’s NSA and CIA, the UK’s Government Communications Headquarters (GCHQ), Canada’s Communications Security Establishment Canada (CSEC), the Australian Signals Directorate (ASD), and New Zealand’s Government Communications Security Bureau (GCSB). 

This cooperative intelligence-sharing arrangement traces its historical roots to the UKUSA Agreement of 1946, as generally agreed in the 1941 Atlantic Treaty signed between the Allied powers during World War Two. 

After its official status was announced in 1955, the Five Eyes was expanded to the Nine Eyes, which includes the original five members along with four additional partnering governments who are granted “third party status.” These include spying agencies from Denmark, France, the Netherlands, and Norway. 

The Nine Eyes would later expand to a Fourteen Eyes agreement which includes the Nine Eyes plus Germany, Belgium, Italy, Spain, and Sweden. Not surprisingly, the Fourteen Eyes more or less corresponds with the core European members in the NATO military alliance. The Fourteen Eyes may also be extended up to 17 Eyes when considering other regular third party contributors like Japan, Singapore, and Israel. 

In the late 1960s, the Five Eyes launched the ECHELON program, powered by a global array of US-run satellites and SIGINT bases located in North America, Europe, Asia, and Australia. Initially, the Five Eyes arrangement was ideally suited for the Cold War where the primary task was gathering intelligence from the former Soviet bloc countries and their allies. Later, as the internet expanded, the sheer volume of digital content and communications meant that the Five Eyes had to readjust its core competency – from an organisation mainly preoccupied with spying on governments, institutions, and persons of interest, to an organisation whose primary task was to spy on absolutely everyone. With this new raison d’être in mind, the Five Eyes cooperative framework became ideal for allowing spy agencies to bypass domestic laws that might prohibit them from conducting surveillance or hacking their country’s own citizens. Overcoming legal or technical barriers became fairly straightforward, especially in the wake of the attacks of 9/11. The USA Patriot Act meant that intelligence and law enforcement agencies could invoke national security and require telecoms companies and internet service providers (ISPs) to allow fibre optic splitters to be installed at key nodes in the telecommunications infrastructure, allowing spooks to divert massive data flows to be captured and run through the various Five Eyes data analysis centres. 

The participating intelligence agencies of each country in the 5 Eyes
alliance.

The digital revolution gave the Five Eyes syndicate the ability to amalgamate and combine what was previously separate disciplines of intelligence – like SIGINT, COMINT, geospatial and human intelligence – now all rolled into one comprehensive data collection system. Once they reached this stage, getting it to perform was simply a case of tweaking the software. When Snowden’s story broke in 2013, one of the key components of the NSA’s mass surveillance operation was a software interface called XKEYSCORE. The Intercept describes the tool as follows: 

The sheer quantity of communications that XKEYSCORE processes, filters and queries is stunning. Around the world, when a person gets online to do anything – write an email, post to a social network, browse the web or play a video game – there’s a decent chance that the internet traffic her device sends and receives is getting collected and processed by one of XKEYSCORE’s hundreds of servers scattered across the globe.

Whereas previous iterations of the NSA’s global information dragnet hauled in large quantities of data and required a combination of computer and human intelligence to sift through it all, XKEYSCORE “extracts and tags metadata and content from the raw data so that analysts can easily search it,” allowing for a much more refined and efficient data capture operation. In essence, what used to be done by the entire ECHELON system and scores of human analysts could now be achieved with a few strokes of the keyboard.

Spectre is Real

Michael McKinley of the Australian National University, in an article describing the full scope of the NSA’s digital arsenal, mentions “[t]he known codewords for them over recent times: Blarney, Echelon, Dancingoasis, PRISM, Tempora, XKEYSCORE [sic], Muscular, Pinwale, EgotisticalGiraffe, Stormbrew, Fairview, Oakstar, Mainway, Rampart-T, and Nucleon. Between them, they aim to attack computers using certain types of legal privacy software, and overall to harvest, store, and analyse whatever internet traffic can be hoovered up.”

Imagine if the NSA connected all of these data trawling nodes with an artificial intelligence backbone that analysed and parsed out teraflops of information in real-time. It would make the agency omnipotent. This very same dystopian scene was brought to life on the big screen in the 2015 James Bond film Spectre starring Daniel Craig. In the film, a latter-day Blofeld, played by actor Christoph Waltz, devised a new unofficial international ruling committee, S.P.E.C.T.R.E. (Special Executive for Counter-intelligence, Terrorism, Revenge and Extortion), comprised of the world’s top organised crime figures. Through his network’s infiltration of the very top levels of Western intelligence, Blofeld receives unrestricted, real-time access to all surveillance data collected by the “Nine Eyes” countries. This backdoor key gives Blofeld the power to steer global political events, move markets, and when necessary, blackmail any individual or institution into compliance. 

Aside from its striking parallel to the West’s current global surveillance dragnet, Spectre raises important questions obscured by the film’s ostentatious plot. Even without Blofeld, the current Nine Eyes intergovernmental network retains all of the capabilities that any nefarious villain would ever want, to wield power or ward off any potential challengers. If operations are conducted outside public view, then the potential for abuse is virtually boundless. 

Five Eyes: A Fraternal Order

The fraternal nature of SPECTRE was alluded to by the antagonist’s cinematic forefather, Ernst Stavro Blofeld, depicted in the 1963 Bond film Thunderball. “SPECTRE is a dedicated fraternity whose strength lies in the absolute integrity of its members,” said Bond’s nemesis.

Blofeld wasn’t wrong. In essence, the Five Eyes intelligence network is precisely that – a type of Anglo-fraternal organisation that wields a noticeable advantage over its rivals. Such unfettered cooperation between advanced nations like the US, UK, Canada, Australia and New Zealand, means that the technical continuity of this geopolitical alliance remains more or less unmatched. Leveraging the resources of five countries spread around the globe affords the coalition a substantive advantage over just about any other global competitor. No other bloc can match its scope and scale, geographically and technologically. 

It is also fundamentally neo-colonial in nature. The fact that this network comprises current and former British colonial possessions speaks to the Anglo-centric or Atlanticist worldview on which its mission is based. That Atlanticist agenda is best described as something akin to a Bilderberg Committee agenda – a set of political and industrial objectives and goals informally agreed upon by some of Western society’s most powerful luminaries and technocrats who meet at the beginning of summer at the annual Bilderberg Meeting. 

Interestingly, this fraternal brotherhood only seems to extend to certain allies. While German spy agencies like the Bundesnachrichtendienst (BND) cooperate with their US counterparts as a “third party” government through the Fourteen Eyes agreement, Washington spooks still feel the need to constantly spy on Berlin. The 2013 Snowden leaks revealed that Germany is a major target of US espionage run out of the NSA’s own European Cryptologic Center (ECC), known affectionately as the “Dagger Complex,” located in Griesheim, in the German state of Hesse. 

According to “secret” NSA documents viewed by the German publication DER SPIEGEL, the American bunker accounts for the agency’s “largest analysis and productivity in Europe.” The documents also note that the NSA uses its infamous XKEYSCORE software to trawl up its main areas of interest from inside the German government, namely foreign policy, economic stability, new technologies, advanced weaponry, arms exports, and international trade. 

To add insult to injury, WikiLeaks revealed in 2015 that the phone of German Chancellor Angela Merkel had been wiretapped for years by US spies.

When interviewed on the matter, former NSA and CIA head Michael Hayden was quite flippant, openly admitting, “We steal secrets. We’re number one in it…. But, he adds, this is not malicious or industrial espionage…. We steal stuff to make you safe, not to make you rich.”

Hayden lamented the German disclosure but admitted the US government had grossly underestimated German values on issues pertaining to privacy, stating: 

Perhaps we underestimated the depth of feelings that the German people – and again, not just the chancellor, but the German people, felt about this question of privacy, given their historical circumstances compared to our historical circumstances. At the Munich Security Conference it was clear to me that Germans regard privacy the way we Americans might regard freedom of speech or religion. 

In similar fashion, both the European Union and the United Nations are also said to be under US surveillance. Like with Germany, NSA espionage objectives on the EU include foreign policy goals, the economy, international trade, and “energy security.” The targeting of the UN adds a whole other international dimension to these operations. A 2013 report filed by The Guardian newspaper paints a rather disturbing picture: “[L]ong before [former United Nations Secretary-General] Ban’s limousine had even passed through the White House gates for the meeting, the US government knew what the secretary general was going to talk about, courtesy of the world’s biggest eavesdropping organisation, the National Security Agency.” 

Australia: Casualty in a Cold War

On the surface, having the NSA conduct surveillance operations on key allies like Germany may not make much sense. Why would America risk compromising an important relationship with a pivotal partner and fellow NATO member? To help answer that question, we need to go back 50 years and look at what happened in Australia circa 1970. 

Cover of the new film release of Allies (available at 
www.roninfilms.com.au/feature/9916/allies.html).  

In the groundbreaking documentary film Allies (1983), a number of top former US and Australian politicians and intelligence officials went on camera to recount one of the most tumultuous periods in the country’s history during the Cold War, marked by the establishment of the Australian Security Intelligence Organisation (ASIO). 

The film disclosed a series of shocking admissions rarely heard before in public, but which lifted the veil on the hidden hierarchy latent within the Five Eyes order. Revelations included an admission by Victor Marchetti, former executive assistant to the deputy director of the CIA (1955-1969), who stated: “Intelligence organisations in many countries have a loyalty that is not necessarily to the duly constituted government, they have a loyalty to what they consider the establishment.” Some officials testified that their loyalty was not to their elected leaders but the CIA. 

Such testimony provides some of the most unequivocal evidence to date about the existence of an unelected shadow government or Deep State, directed by America’s Central Intelligence Agency. For the Americans, managing this autonomous power structure first meant securing its geostrategic interests in host countries as well as its strategic facilities like the NSA’s Pine Gap listening base located in central Australia. Securing these assets became a national security issue – Washington could not risk any newly elected government interfering with US intelligence operations.

In the film, Dr John Burton, Secretary of the Australian government Department of External Affairs (1947-1950), described the Five Eyes thinking as follows: 

…the need for an intelligence organisation was to ensure that governments elected (for example) on a social welfare platform would not argue that they had a mandate to recognise China, to change the agreement with the United States, or other things which the Labor Party had intended before the Petrov Commission. They’ve always argued that the intelligence operation, or the intelligence services, operating as an informal group – are the protection of democracy against itself.

While the notorious Petrov Affair (1954) helped sideline Australia’s Labor party for many years afterwards, the real trigger for a US-backed coup came in 1972 when Gough Whitlam led Labor to victory for the first time in 23 years. The Whitlam government called into question Australia’s supporting roles in various military conflicts taking place in Southeast Asia, including Vietnam and Indonesia, and challenged the top-secret nature of US bases operating in Australia. Details of a CIA plot to depose Whitlam were revealed by NSA contractor Christopher Boyce, who was convicted of espionage and sentenced to federal prison in the US. Boyce’s story was later made into a cinematic classic, The Falcon and the Snowman.

Whitlam would soon be removed from office in 1975 after being “dismissed” by the country’s Governor-General, with much of the evidence pointing to a US/British regime-change operation. This marked a noticeable shift to the right in Australian politics and an unflinching “special relationship” with subsequent US Administrations. 

This story demonstrates the lengths that the US-led Five Eyes syndicate is willing to go to secure its assets in foreign countries. In the case of Australia, this meant US intervention to derail any government that might threaten US foreign policy and its global intelligence operations. From this vignette, one could draw a parallel to Washington’s ill-treatment of Germany – another ally that also hosts numerous US military bases and intelligence-gathering facilities, and which functions as an anchor for US operations in Europe in much the same way Australia does for the Asia-Pacific region. 

The China Syndrome

In the 21st century, mere national monopolies are no longer sufficient for Silicon Valley moguls and their shepherds in the intelligence community. Firms like Google, Apple, Facebook and Twitter command near-global monopolies in their respective markets. This means that as long as those Western firms permeate and dominate the planetary information space, Five Eyes operatives only require a backdoor into a handful of these firms to surveil and control almost every aspect of public (and even private) life. 

Controlling technology markets has become a matter of paramount concern for the Five Eyes. That includes keeping out any foreign product which could cause a wrinkle in their control matrix. As expected, this situation feeds neatly into a ready-made geopolitical drama, especially if the Trojan Horse in question arrives in the form of a Chinese firm. 

As Britain expedites the roll-out of its controversial high-frequency 5G network, new security concerns have surfaced at the heart of the Five Eyes as politicians and spooks debate the possibility a foreign actor could compromise the alliance from within. 

Western technocrats have rushed to finalise preparations to create a grid of “smart cities” and smart infrastructure including fleets of self-driving cars on “smart highways,” as well as a host of public services – all linked as part of the “internet of things.” To make this project work, the UK has to partner with the only company who can deliver enough advanced equipment on time and on budget – Chinese telecommunications giant Huawei. 

In theory, Five Eyes fears may be warranted. With 5G set to provide the new framework for real-time spying and data monitoring, Western spy chiefs and politicians are afraid of becoming too reliant on potential geopolitical and commercial rival China. Practically speaking, Huawei’s hardware is fairly standardised and compatible with other components used to configure the UK’s new 5G network, and to date, there is no proof of any latent Chinese spyware in any of the components in question. UK spy chiefs are already lining up in defence of the realm, with former MI6 head Richard Dearlove chiming in: “…we must conclude the engagement of Huawei presents a potential security risk to the UK. The key question that follows is can that risk be sufficiently mitigated to render it negligible?”

A number of tertiary arguments against Huawei are being employed by Western officials including charges that China steals Western intellectual property, or that Chinese firms are inherently ‘anti-competitive’ because of state subsidies given to many enterprises. Reading between the lines, more of a worry for the Five Eyes (or a privatised Spectre syndicate) is the fact that a whole range of other Huawei products could employ a different proprietary Chinese encryption protocol that would give not only Chinese officials and intelligence workers a privacy edge, but the public mass-consumer too – keeping the NSA from intercepting a user’s communications, or at least making it much more difficult. Thus, keeping Chinese products out of Western surveillance zones could be a major priority for Five Eyes technocrats. 

Earlier this year, US President Donald Trump escalated the technology war with China by signing an executive order that prohibits US companies from installing any “foreign-made” telecoms equipment which the US deems a national security threat, meaning that Huawei requires a special license issued at the discretion of Washington. Huawei Chairman Liang Hua responded at an industry press conference during the China-Germany-USA Media Forum, saying that the US placing Huawei on its entity list has had “no substantial impact” on Huawei’s business and that all of the company’s flagship products are shipping as normal.

In the short-term, the Trump Administration is more likely to deploy economic warfare by drastically increasing tariffs on Chinese products. In this war, the winning edge might be with the state-managed economy where Chinese planners typically plot the course ahead looking at 20 to 30-year windows, as opposed to US firms that prioritise mere quarterly gains and shareholder dividends. 

Liang Hua remarked that in only two or three years, Huawei will have developed a complete technological and commercial “ecosystem” for its range of products, making it more difficult for the Five Eyes syndicate to maintain their digital hegemony by trying to shut Huawei out of international markets. Naturally, this poses a direct threat to the West’s global digital media and communications mafia, and its overlapping fraternal network of government agencies, corpse-orats and ‘white-collar’ organised criminal syndicates. 

The War on Encryption 

Aside from concerns about statecraft, most independent-minded citizens might be alarmed by the unbridled Orwellian power of such a global operation. On this point, there is little advice one can offer other than to stay off social media or go ‘off-grid’ (offline) as much as possible to avoid leaving a detailed digital footprint that can be used to build a profile on you. 

For those who depend on the internet for their day-to-day existence, going off-grid is not really a practical option, but there are tools available that can help make surveillance difficult for 5, 9, and 14 Eyes member governments. Besides using a reliable encrypted chat or messaging service, if you are not already using a Virtual Private Network (VPN), then now may be a good time to start. VPN encrypts all of your internet traffic and scrambles your IP address, making it difficult for anyone monitoring you online to pinpoint your identity, device, and physical location. One key requirement is trying to use a service based outside the Fourteen Eyes countries. This means you may not be immediately exposed should your service provider’s host country ask for back door access to your internet records. If you are using a service within the Fourteen, then be sure to choose a company that has a ‘no logs’ policy. In other words, should a US or UK agency like the NSA or GCHQ make a formal request from a service provider to hand over all your internet search data, then there will be nothing they can hand over. Likewise, you can use a number of encrypted instant messaging services like Telegram, or encrypted email services like Proton Mail, and also consider using an internet browser that doesn’t keep data on your surfing like Brave, or a search engine like Duck Duck Go which doesn’t save data on all of your search activity.

Perhaps the biggest obstacle to Five Eyes hegemony are digital services that use end-to-end encryption. This means only the sender and receiver can view the content, concealing communications from the prying eyes of Western spy agencies. Needless to say, insatiable state authoritarians are not happy about this and have laid down a harrowing ultimatum to tech companies, demanding write-in backdoor access protocols supposedly for “law enforcement.” If firms do not comply, government officials threaten they should be ready for brute force intrusions by agents of the state. Knowing they do not have the public on their side, governments have resorted to intimidation and scare tactics in order to swing public opinion in their favour. 

While served as Home Secretary in 2015, former UK Prime Minister Theresa May authored a rather opprobrious piece of legislation entitled the Investigatory Powers Act (IPA), which outlines where the British police state is heading in terms of privacy and encryption. The bill requires that any “communications service provider” (ISPs, social media platforms, VOIP, email providers and messaging service) must comply with a secret warrant signed by the Home Secretary which names any persons or organisations the government wishes to spy on. 

One watchdog organisation who has followed the IPA is the Electronic Frontier Foundation (EFF). According to researchers, the draconian decree, also known as the ‘Snooper’s Charter’, requires tech companies to insert special malware onto their systems so the spooks can use their platforms to “interfere with any other system.” The secret warrant explicitly allows those companies to violate any other laws in complying with the warrant. Essentially, the warrant enables said tech firms to violate the law in the process of complying with the government’s secret snooper’s warrant. This would also include the Home Secretary ordering firms like Facebook, Samsung or Apple to quietly remove their ‘secure communication’ features from products without notifying the public about it. 

In terms of its legality (or lack thereof), the devil is in the absence of detail. Danny O’Brien from EFF noted how the UK government has been very careful not to pin itself down with any specifics, explaining, “Sure enough, the word ‘encryption’ does not appear in the Investigatory Powers Act (IPA). That’s because it is written so broadly it doesn’t need to.”

EFF describes the severity of the IPA in terms of riding roughshod over basic civil rights and protections:

“The Investigatory Powers Bill, one of the first laws to explicitly permit such techniques for law enforcement and intelligence work, contains very little in the way of oversight, and grants the British government an almost blank check for deploying malware against individual users as well as the heart of the internet’s infrastructure. It also demands that private companies and individuals assist in the deployment of this spyware, no matter where they operate in the world, and requires that this assistance be kept permanently secret from customers, partners, and the general public.

IPA provisions might also include the government forcing a chain of coffee shops to use the company’s free WiFi service to deploy British spy agency malware against its customers. 

The state’s intrusion goes even further with the IPA laying the parameters for the UK government to demand tech companies supply them with new product designs… in advance of commercial release. This is a shocking act of overreach by the British state – one that exceeds even the most invasive state intervention in a country like China. 

One has to ask: given the chance, would the UK government eventually pursue a complete ban on encryption? 

While there is considerable push-back from tech companies and public advocacy groups, there’s surprisingly little rebellion from most mainline politicians, partly because they are not being pressured from their constituents on this issue. What anti-privacy initiatives like the IPA clearly demonstrate is that Britain is the one clearly setting the dark tone and aggressive pace for the Five Eyes cohort. The agenda clearly seeks a renewed license to put tech firms in a corner by deploying emotive language and invoking evermore dramatic conspiracy claims. In her article written for the Telegraph, current UK Home Secretary Priti Patel even went so far as to equate Facebook’s noncompliance with aiding and abetting “child abusers, drug traffickers and terrorists plotting attacks.” 

Of course, Patel’s comments shouldn’t surprise anyone who has followed the issue of privacy over the years, particularly in the post-9/11 era where politicians and national security state operatives routinely gaslight the public to justify every intrusion or roll-back of privacy rights by citing the most extreme and infrequent instances of ‘terrorism’. For the 21st century technocracy and police state, that’s been the gift that just keeps giving, but by the same token the public have become increasingly wary of such dramatic government claims due to the fact that very rarely, if ever, has government wiretapping or backdoor spying actually thwarted a terrorist attack in what is popularly referred to in national security rhetoric and Hollywood propaganda lore as ‘the ticking bomb’ scenario. 

According to a report by security experts Sophos, at a recent Five Eyes security summit officials left no doubt as to their intentions, stating: “Tech companies should include mechanisms in the design of their encrypted products and services whereby governments, acting with appropriate legal authority, can obtain access to data in a readable and usable format.”

Five Eyes member Australia took the matter even further, threatening to “break in” if tech companies do not facilitate the access requirements of the state. This new policy initiative was expressed unabashedly in a memo issued by the Australian Dept of Home Affairs on behalf of the Five Eyes alliance:

The Governments of the Five Eyes encourage information and communications technology service providers to voluntarily establish lawful access solutions to their products and services that they create or operate in our countries…. Should governments continue to encounter impediments to lawful access to information necessary to aid the protection of the citizens of our countries, we may pursue technological, enforcement, legislative or other measures to achieve lawful access solutions.

A closer look at the memo reveals that Australia’s authoritarian designs are not restricted to stopping terrorists and paedophiles but appear to target any entities they feel are “sowing discord” (including any popular dissenting opinion and analysis), that supposedly threatens our vaunted “democratic institutions.” This may also include any foreign media (as depicted in the heavily promoted ‘Russian disinformation’ narrative), independent media, and free-thinking individuals on social media. The language could not be more arbitrary: 

We are determined to ensure that the technologies that have been developed to enhance prosperity and freedom are not exploited by those who seek to promote terrorism and violent extremism; prey upon and exploit our children; or spread disinformation and discord to undermine our democratic institutions.

This, alongside Britain’s notorious ‘Snooper’s Charter’, demonstrates how Five Eyes partners are working in concert by gradually laying down an alliance-wide legal framework that will legitimise what would normally be unwarranted activity by state agencies. This is done by suspending any constitutional provisions or rights – all in the name of protecting national security, or even the national interest as the state defines it. 

Many leading VPNs and messaging services can protect your data with 256-bit encryption, now used in most modern encryption algorithms and protocols. For the moment, this technology offers fairly robust protection from the prying eyes of the intelligence services, but advances in computing power may eventually put many of these protections at grave risk. New advances in quantum computing threaten to usher in a new event horizon whereby the next generation of computers could conceivably crack today’s industry-standard 256-bit encryption key in a relatively short period of time – in mere minutes, or even seconds. Researchers at the Massachusetts Institute of Technology (MIT) have shown how a quantum processor can crack a seemingly impenetrable 2,048-bit RSA encryption in only eight hours. Exactly how far off we are to this quantum revolution is anyone’s guess but when it arrives it could tip the scales of privacy away from the consumer and in favour of those organisations who control this new technology, namely Silicon Valley monopolists and the intergovernmental Five Eyes complex. On the flip side, advances in quantum decryption may also coincide with new methods of encryption that could slow down quantum crackers enough to make decryption impractical. 

It’s incredible to think that these technological battles waged in binary virtual space may end up defining our relationship with the state in the physical world. 

Things are moving extremely fast right now. Such a dystopic state of affairs must be resisted on every level. Our future depends on it. 

This article was published in New Dawn 177.
If you appreciate this article, please consider a contribution to help maintain this website.

Footnotes

1. UKUSA Agreement Release (1940-1956),www.nsa.gov/news-features/declassified-documents/ukusa/
2. A Look at the Inner Workings of NSA’s XKEYSCORE, www.theintercept.com/2015/07/02/look-under-hood-xkeyscore/
3. The unsettling reality if Five Eyes is the guardian against Huawei (Part 2), www.johnmenadue.com/michael-mckinley-the-unsettling-reality-if-five-eyes-is-the-guardian-against-huawei-part-2-a-survey-audit-concerning-prudence-integrity-law-and-ethics/
4. US Intelligence Watches Germany Closely, www.spiegel.de/
international/world/germany-is-a-both-a-partner-to-and-a-target-of-nsa-
surveillance-a-916029.html
5. NSA tapped German Chancellery for decades, WikiLeaks claims, www.
theguardian.com/us-news/2015/jul/08/nsa-tapped-german-chancellery-
decades-wikileaks-claims-merkel 
6. Shame on US, www.spiegel.de/international/world/spiegel-interview-with-former-nsa-director-michael-hayden-a-960389-2.html
7. Portrait of the NSA: no detail too small in quest for total surveillance,
www.theguardian.com/world/2013/nov/02/nsa-portrait-total-surveillance
8. Huwaei, 5G and the Five Eyes, www.henryjacksonsociety.org/shop-hjs/defending-our-data-huawei-5g-and-the-5-eyes/
9. US blacklists Huawei, places it on entity list, www.economictimes.
indiatimes.com/news/international/business/us-blacklists-huawei-places-it-on-entity-list/articleshow/69353632.cms
10. Twitter, twitter.com/HuXijin_GT/status/1176465008974123008
11. Five Eyes Unlimited: What A Global Anti-Encryption Regime Could Look Like, www.eff.org/deeplinks/2017/06/five-eyes-unlimited
12. UK Investigatory Powers Bill, www.eff.org/issues/uk-investigatory-powers-bill
13. Facebook’s encryption could stop our police doing their job properly –
and I won’t allow that to happen, www.telegraph.co.uk/politics/2019/07/30/facebooks-encryption-could-stop-police-job-properly-wont-allow/
14. What’s the Evidence Mass Surveillance Works? Not Much, www.pro
publica.org/article/whats-the-evidence-mass-surveillance-works-not-much 
15. Five Eyes nations demand access to encrypted messaging,www.naked
security.sophos.com/2019/08/01/five-eyes-nations-demand-access-to-
encrypted-messaging/
16. Five Country Ministerial 2018, www.homeaffairs.gov.au/about-us/our-port
folios/national-security/security-coordination/five-country-ministerial-2018
17. MIT Technology Review, www.technologyreview.com/s/613596/how-a-quantum-computer-could-break-2048-bit-rsa-encryption-in-8-hours/
18. Why Quantum Computers Might Not Break Cryptography, www.quanta
magazine.org/why-quantum-computers-might-not-break-cryptography-20170515

© New Dawn Magazine and the respective author.
For our reproduction notice, click here.

2020-09-11

18:48

Phoenix from the Flames: Oregon Fires [13:20 FREQUENCY SHIFT]

1.33.2.20: White Planetary Worldbridger Why tarry now? When a house is burning, scurrying for your possessions will only cost you your life. This house that is burning is Babylon, the 12:60 way of life, which is now destroying your biosphere … Continue reading

13:02

Pandemic Reflects Changing Winter Sky [Astrology News Service]

As part of its predictable journey through the 12 astrological signs, planet Pluto can be relied upon to enter Capricorn every 248 years or so.  Usually, that’s when all hell breaks loose.    

From the vantage point of those on Earth, tiny Pluto appears to be besotted with powerful transformative energy.  Astrologers report that major cultural restructurings or revolutions have occurred during this transit through Capricorn dating back to Roman times.  And unnerving developments on the economic front have been common occurrences as well.

In the current cycle, Pluto entered Capricorn in January 2008, just in time to exacerbate conditions that morphed into the Great Recession later in a U.S. Election Year.  More economic woes accompanied the planet’s continued travels through the sign in March 2020. Once again, the economy was in a sorry state in another Election Year with chances for speedy improvement less than encouraging.

All told, Pluto will spend 16 years in Capricorn before finally exiting the sign in January 2024.  As it meanders its way through the sign, all of the swifter rocky planets will have overtaken and interacted with the slow moving planet time and again. And, in tandem, the slow-moving gas giants Jupiter and Saturn aligned with Pluto early in 2020 with consequential results.

 In a rare confluence of planetary energies, the Sun, Saturn and Pluto arrived at 22 degrees of Capricorn on January 13, 2020 and Mercury joined the trio a day later.  A month earlier, in December 2019, Venus had exactly conjoined Pluto at 21 degrees of the sign.  Mars and Jupiter arrived together at 22 Capricorn two months later in March with Pluto still in close proximity.  And, in January, the dwarf planet Ceres also was part of the alignment as were other rocky celestial bodies that roam the Asteroid Belt between Jupiter and Mars.

Astrologers were concerned enough about the daunting Saturn/Pluto conjunction in Capricorn, the sign most identified with business and boundaries.  But all the extra planetary activity in the sign elevated concerns exponentially.

In 2011, the late French mundane and research astrologer Andre Barbault studied the impending 2020 -2021 alignments and predicted that a pandemic was a distinct possibility.  Barbault’s research tracked pandemics from ancient times; he found that the bunching together of the five slower moving outer planets (Jupiter, Saturn, Uranus, Neptune and Pluto) in tight celestial groupings invariably coincided with pandemics, wars and natural catastrophes.

Spacing Definition Fits

In 2020, Barbault noticed that Jupiter, Saturn and Pluto would be conjoined (aligned in the same degree) in Capricorn while the other two outer planets, Neptune and Uranus, would be nearby in the astrological signs of Pisces and Taurus, respectively. Only 100 degrees would separate Neptune and Uranus on the 360-degree zodiac wheel as they framed and contained the other outer planets. Ergo, the spacing met Barbault’s definition of a tight grouping.    

In an article for The Career Astrologer magazine, astrologer Maurice Fernandez writes that at the end of 2019 astrologers were nervously anticipating the upcoming Saturn/Pluto “head bang” in Capricorn. While the world was preparing for the holiday season, Saturn and Pluto would be forming an exact conjunction at 22 degrees of the sign.  Worst fears started to be realized as medical doctors in the city of Wuhan, China, reported “an alarming occurrence of severe and unusual pneumonia cases.” 

Fernandez provides this chronology:

On December 30, 2019, Doctor Li Wenliang of the Wuhan Central Hospital issued and emergency warning to other medical facilities and later shared his report publically, noting his concerns about the contagious condition that would later be referred to as Covid-19.  Tragically, Li himself succumbed to the infection on February 7, 2020, and by June five other doctors from the Wuhan “whistle blower” hospital had died of the disease.

“As the virus quickly spread beyond borders and affected people of all races or socio-economic backgrounds, it first migrated out of China to South Korea, Iran and Italy. Soon after, cases were reported everywhere on the globe, prompting quarantine measures and, by mid-March 2020, a more radical lockdown.  Planes stopped flying, stores and restaurants closed their doors and toilet paper became more precious than pizza,” he wrote.

Fernandez titled his article Wuhan 3206: Tales of Astrology Synchronicities in the Covid-19 Era.  In the article he commented on some of the lesser known celestial travelers that joined the planetary configuration in Capricorn early in 2020.

Thousands of asteroids orbit the Sun, mostly between Mars and Jupiter.  Some of the names they’re given are derived from mythologies or dialects unknown to most.  Others are named for seemingly random things, like celebrities or locations.  For example, Fernandez writes that in late March, 2020, astrologer Demetra George and colleague Brenda Wilson posted articles describing the misadventures of the transiting asteroid Wuhan, which was named for the Chinese city of that name.

The asteroid was discovered almost 40 years earlier on November 13, 1980, by astronomers at the Purple Mountain Observatory in China.

Ever Tighter Leash

 “As astrologers were witnessing the mad effervescence of challenging alignments, including heavy players Mars, Jupiter, Saturn and Pluto all congregating at the end of Capricorn, the world was getting accustomed to an ever tighter leash, and to firm restrictions in movement and connection to help prevent the spread of the disease. Many astrologers noted the presence of Asteroid Pallas-Athena in the mix of the Capricorn cluster, but the more insidious asteroid Wuhan had already infiltrated the club and on March 20 had nested itself at 23 Capricorn,” Fernandez said, adding: 

“And so it was, Wuhan, a city, a hospital, the epicenter of a global pandemic, found its way into our charts as well.”

Those who watch lots of science shows on TV may get the wrong impression about asteroids and the solar system space they occupy.  The Asteroid Belt is about 40 million miles wider than the space that accommodates the orbits of Mercury, Venus, Earth, and Mars combined. And all of the asteroids buzzing around in this space are relatively small, accounting all together for about the same amount of mass as the Earth’s Moon.

Some asteroids are as small as pebbles. Ceres, once considered to be part of the Asteroid gang, is 600 miles in diameter and was recently elevated to dwarf planet status.   But even this spherically-shaped object is relatively small by solar system standards. About 500 Ceres-sized objects could fit inside the Earth.   

The Earth is 91 million miles from the Sun. The Asteroid Belt objects closest to us are about 186 million miles from the Sun with a solar orbit of three years.  At the other extreme, the most distant asteroids are about 370 million miles from the Sun and need twice this many Earth years to complete their solar orbits. The size of the objects, and the spatial distances involved, mean that if an astronomer was sitting on an asteroid anywhere in the Asteroid Belt he or she would probably need a telescope to see their nearest asteroid neighbor.

TV science shows dealing with asteroid encounters during the Solar System’s formative years show dramatic images of huge boulders hurtling through space in tight and menacing formations, rudely jostling and sometimes cataclysmically colliding with each other as part of a mutational process that enables large space rocks to either explode and shatter into pieces or meld into even larger space rocks (asteroids) that are soldered together by gravitational forces.

For the record, conjunctions described by astronomers and astrologers do not involve actual collisions of planets or asteroids but instead indicate that celestial objects are seemingly mustered on a straight line and, from an Earthly perspective, appear to be occupying the same – or practically the same – zodiacal degree.  But there are millions of space miles separating Earth from any of the asteroids, and billions of miles to consider when Pluto is part of the conversation.

Given the oceans of solar system space at their disposal, it’s remarkable that so many transiting planets and asteroids would, in 2020, converge on planet Pluto in the closing degrees of Capricorn with such predictable or foreseeable results for humankind, e.g. contagion and economic ruination.  Even more incredible is the fact that the asteroid Wuhan, named for the besieged city where the Covid-19 virus first emerged, would turn up on cue to trigger the volatile configurations forming in the winter sky.  In describing these exotic developments Fernandez uses the term synchronicity, which first was coined by iconic psychologist Carl Jung.  But it’s not far-fetched to describe cyclical 2020 developments as some of the most obvious and convincing evidence yet that astrology works.

We’ve hit an ugly patch. To right ourselves, we’re not without options.  As astrologer Brenda Wilson suggests: “It’s time to keep safe and revive parts of us that have been forgotten.  We will all have to adapt to a new normal, and recreate what we are missing in our lives. We are all in a cocoon with opportunity to emerge a butterfly. We can choose to get materialistic and go into fear, or we can witness as a neutral observer – present to what the moment is trying to teach.” 

The post Pandemic Reflects Changing Winter Sky appeared first on Astrology News Service.

10:52

Cloud-based Verification of Open Source RISC-V Cores Using the Metr... Roddy Urquhart & Dan Ganousis [RISC-V International]

Cloud-based Verification of Open Source RISC-V Cores Using the Metrics Cloud Platform and Codasip SweRV Support Package - Roddy Urquhart, Codasip & Dan Ganousis, Metrics Design Automation Verification is crucial to processor core development, accounting for as much as 2/3 of the SoC/ASIC development cycle. A major advantage of the RISC-V ISA is users are allowed to modify the processor IP. However, if the processor IP is modified, verification is necessary and is solely the responsibility of the user. High code coverage as well as complete functional coverage is essential and techniques such as constrained random verification are necessary requiring considerable use of RTL simulators. The Metrics Cloud Platform exploits the massive parallelism and elastic storage available in the Cloud for big simulation jobs using a SystemVerilog/UVM methodology to enable the execution of parallel unlimited RTL simulations. This paper explains how the Codasip SSP enables users of open source SweRV Core to efficiently verify their processor IP in the Cloud using the Metrics Platform.

10:40

Weekend Update: This Week’s Round-up of Remote Blockchain Learning Resources [Hyperledger]

Welcome to the Weekend Update. Our goal with this weekly post is to share quick updates about online education, networking and collaboration opportunities and resources for the open source enterprise blockchain community. 

If you have suggestions for resources or events that we should spotlight in a future Weekend Update, let us know here using #HLWeekendUpdate. 

Webinar: Introduction to Minifabric and How to Use It

Minifabric is the tool to help you set up a Fabric network easily and quickly. It also helps application developers with needed connection profiles and wallets when a Fabric network is up and running. In this talk, Tong Li from IBM will introduce to the audience Minifabric and also demonstrate how to develop go applications using these profiles and monitor the Fabric network using Hyperledger Explorer.

Tune in on Wednesday, September 16, at 10 a.m. EDT. Go here for more information. 

Case Study: CULedger’s MemberPass™ – a permanent, portable digital identity solution for credit union members

Get the details on how CULedger protects credit unions from fraud with Hyperledger Indy in this new case study.

Blockchain Developer Course en Español 

The Hyperledger Latinoamérica Chapter continues its Spanish language Hyperledger Fabric training course series with sessions this week on digital identity with PKI services on Hyperledger Fabric (September 12) and distributed orderer with RAFT (September 17). 

For more details and the full schedule, go here

Virtual Meetups

See the full Virtual Meetup schedule here.

The post Weekend Update: This Week’s Round-up of Remote Blockchain Learning Resources appeared first on Hyperledger.

08:50

FSF Blogs: Assine esta petição pela liberdade na sala de aula [Planet GNU]

Leia, assine e compartilhe a petição: https://my.fsf.org/give-students-userfreedom

Ilustração de um estudante sendo espionado enquanto usa um computador.
Use este código de incorporação para adicionar esta imagem a seu site ou blog para referenciar a petição:
<a href="https://my.fsf.org/give-students-userfreedom?pk_campaign=frspring2020&pk_source=bagde"><img src="https://static.fsf.org/nosvn/appeal2020/spring/petition_rect.png" alt="Lute pela liberdade dos estudantes (#UserFreedom).  Assine a petição hoje!"></a>
        

Conforme escrevemos recentemente, o aprendizado remoto não precisa (e não deveria) significar a renúncia das liberdades básicas. Novos desenvolvimentos na área da educação remota apenas contribuíram para a preocupante tendência de tratar a escola como uma área de testes para a vigilância ubíqua e outras práticas distópicas. Isto é especialmente perigoso para as crianças nativas do mundo digital, que podem não saber que existem alternativas, muito menos que a "alternativa" percebida é, na verdade, a única opção ética.

Como a discussão entre ativistas do software livre na nossa lista de e-mails libreplanet-discuss mostrou nas semanas recentes, a educação digital pode triunfar quando fazemos da liberdade uma prioridade. Nenhum estudante deveria trocar sua liberdade por uma educação. A Free Software Foundation (FSF) já trabalhou junto com um professor do MIT para libertar as aulas dele e seguimos compartilhando nosso conhecimento com o sistema de escolas públicas de Boston. Hoje estamos dando o próximo passo nesse comprometimento.

Iniciando hoje, trabalharemos para mudar o cenário da educação remota com uma nova petição contra o dano severo que o software privativo representa aos estudantes e, ao mesmo tempo, enfatizando a ideia de que há uma solução ética. Seja quando o Microsoft Teams é usado para conectar estudantes, o Google Classroom é adotado para escrever todos os documentos ou o Zoom é empregado para a sessão da sala de aula, queremos transmitir a mensagem de que a única resposta aceitável no tocante à quantidade de software privativo que deveria ser permitida nas escolas é nenhum. Fazer estudantes dependerem de software não livre para aprender é não apenas danoso a eles a curto prazo, mas também uma oportunidade desperdiçada de passar os valores de livre acesso, estudo, compartilhamento e colaboração.

Na FSF, estamos trabalhando duro para fazer do software livre uma questão de reunião de família: uma que seja falada e levada a sério por todas as pessoas e não apenas uma causa abraçada por uma comunidade pequena mas motivada. Entendemos que fazer-se ouvir sobre estes problemas pode ser difícil, motivo pelo qual estamos oferecendo colocar nossa voz atrás da sua como a organização responsável pelo movimento. Ao assinar a petição, você tem a opção de nos informar se é um estudante, pai/mãe, professor ou administrador de uma escola que requeira o uso de software privativo. Contataremos a administração deles para lhe representar e evidenciar a eles que uma comunidade global de ativistas e pessoas normais assinaram um posicionamento apoiando o software livre na educação.

Esta iniciativa e petição foram motivadas pela perda de direitos dos estudantes causada pela pandemia, mas não planejamos parar quando o novo coronavírus estiver finalmente sob controle. Visualizamos para este posicionamento um espaço permanente em https://fsf.org e estamos comprometidos em contatar quantas escolas conseguirmos como parte de nossos esforços para encorajar a adoção do software livre.

Seu posicionamento junto a nós neste problema significa muito para nós. O sucesso de qualquer petição é tão forte quanto sua comunicação e as pessoas que se manifestam por trás dela, e por isso apreciamos que você se disponibilize a assinar. O ato de firmar este posicionamento de princípios é uma forma que lhe oferecemos para colocar a "liberdade em ação" durante o nosso apelo de verão e ser uma voz para a liberdade do usuário no mundo todo #UserFreedom.

Por trinta e cinco anos, a FSF realiza campanhas pela completa liberdade do software. Por todo esse tempo, e apesar de parecer conveniente e popular fazê-lo, nunca sacrificamos nossos princípios. Ser o "último farol" da liberdade do usuário significa manter-se vigilante sobre a ajuda ou dano causados pelo uso dos programas de computador contra quem deles depende. Por favor, reserve um tempo para assinar a petição pelos direitos dos estudantes em todo o mundo, sejam estes os seus direitos, dos seus filhos ou simplesmente de algum conhecido. Juntos, podemos cortar a conexão que a educação tem com o software privativo e, em seu lugar, fomentar a liberdade.

Read this article in English at https://www.fsf.org/blogs/community/sign-this-petition-for-freedom-in-the-classroom

02:00

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World [DuckDuckGo Blog]

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

2020 marks DuckDuckGo's tenth year of charitable donations – our annual program to support organizations that share our vision of raising the standard of trust online. This year we're proud to donate to diverse organizations across the globe that strive to improve online privacy and competition.

Thanks to our continued growth, we've been able to increase the donation amount this year to $750,000, bringing the total over the past decade to $2,650,000. Below are details of how we allocated the funds and we encourage you to check out the valuable work of each recipient.

$200,000 to the Center for Information Technology Policy (CITP)

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"The Center for Information Technology Policy's research, teaching, and events address digital technologies as they interact with society."

$150,000 to the Electronic Frontier Foundation (EFF)

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development."

$50,000 to European Digital Rights (EDRi)

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"We defend rights and freedoms in the digital environment. EDRi’s key priorities for the next years are privacy, surveillance, net neutrality and copyright reform."

$50,000 to Public Knowledge

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy on behalf of the public interest."

$50,000 to The Markup

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"The Markup is a nonprofit newsroom that investigates how powerful institutions are using technology to change our society."

$25,000 to Algorithmic Justice League

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"We combine art and research to illuminate the social implications and harms of AI."

$25,000 to Bits of Freedom

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"Bits of Freedom strives to influence legislation and self-regulation, and empower citizens and users by advancing the awareness, use, and development of freedom-enhancing technologies."

$25,000 to Center for Critical Internet Inquiry (C2i2)

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"Located at UCLA, the Center for Critical Internet Inquiry (C2i2) aims to empower researchers, policy makers, change agents, and the general public by providing them with access to original insights derived from independent empirical research; expert analysis and interpretation; and the guidance and opportunities to critically reimagine digital technologies’ influence in society."

$25,000 to Electronic Frontiers Australia (EFA)

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"Electronic Frontiers Australia Inc. (EFA) is a non-profit national organisation that has been promoting and protecting digital rights (civil liberties) in Australia since it was established in January 1994."

$25,000 to Competition Law Forum

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"The Competition Law Forum is a centre of excellence for European competition and antitrust policy and law at the British Institute of International and Comparative Law (BIICL). It provides a forum in which the practical application of competition policy is considered by lawyers, economists, senior business managers, public servants, public affairs professionals, consumer bodies and other specialist practitioners."

$25,000 to Freiheitsrechte (GFF)

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"The GFF (Gesellschaft für Freiheitsrechte / Society for Civil Rights) is a Berlin-based non-profit NGO founded in 2015. Its mission is to establish a sustainable structure for successful strategic litigation in the area of human and civil rights in Germany and Europe. The GFF’s current cases focus on protecting privacy, freedom of information and the press, and defending equal freedom for all."

$25,000 to Open Rights Group

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"Open Rights Group protects the digital rights of people in the UK including privacy and free speech online."

$25,000 to Restore The Fourth

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"Opposing unconstitutional mass government surveillance."

$25,000 to TechFreedom

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"Focusing on issues of Internet freedom and technological progress, we work to protect innovation and discovery from powers that fear change."

$25,000 to the Tor Project

2020 DuckDuckGo Charitable Donations: $750,000 to Organizations Around the World

"We believe everyone should be able to explore the internet with privacy. We advance human rights and defend your privacy online through free software and open networks."


For more privacy advice follow us on Twitter, and stay protected and informed with our privacy newsletters.

Plasma adventures - Traipsing through the KDE forest [Dedoimedo RSS]

It's not just a job, it's an adventure. Or something. Here's a review and summary of my recent experiences using the Plasma desktop environment, including 5.12 LTS, 5.18 LTS and neon User Edition releases, covering ergonomics, usability, connectivity, fun factor, bugs, regressions and problems, and a bit more. Take a look.

2020-09-10

22:43

2020-09-11.fae [crystalfaeries]

2020-09-11 VenusDay's numerology:
        15 Devil
         6 Lovers
Conscious Relationships:
        Endurance, materialism, secret plans,
        restrictions in one's possibilities
Sep 11  16:00-21:00     Faery Goddesses at Kaua'i Tantra Goddess Temple

Wow... what a perfect time to do a planetary healing on the energetic traumas / miasmas of false-flag events still imprinted in Gaia's energy bodies :-) Maybe y'all can correspondingly heal your own inner traumas remaining from 2001.

Faery blessings -- celeste


13:33

Reply to All State-of-State Attorney Generals-- Using Nevada as an Example: [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

We've had quite a number of replies from State-of-State Attorney Generals. As the name of their office implies, they have been the ones employing "lawfare" against Americans merely "presumed to be" Municipal citizens of the United States. These men and women have to be fully informed and told to stand down, otherwise, they persist like Japanese foot soldiers lost in the jungles of Burma still presuming that they are fighting World War II.
These fifty men and women are charged with defending the State and the State of State against "citizens of the United States", and the People of this country have been deliberately mis-identified as "citizens of the United States". These Legal Presumptions, like the presumption of "War Powers" have to be popped like so many balloons. So here is an example of the information that the State-of-State Attorney Generals need to have landed on their desks via Registered Mail, Return Receipt Requested:
Dear Sir: (or Madam, as the case may be)
It’s apparent that you have not been properly informed:
1. All fifty of the properly qualified and declared State Assemblies are now in Session;
2. As of September 30th, Nevada is formally enrolled as a State of the Union and is relieved of any presumption of a quasi-Territorial status--- which date also marks the end of any presumed custodial role for the State of Nevada with respect to us;
3. The Municipal title taken on our property is being dissolved. When that process is complete, the Nevada State [Land Trust] will also collapse and revert to the People of this State;
4. The People you are addressing are State Citizens and State Nationals of Nevada, the actual civilian owners of Nevada;
5. We are not Territorial Citizens nor are we citizens of the United States; we are non-domestic with respect to you, your law, your functions, and your authorities;
6. We have never been involved in your Civil War, which is in fact an illegal mercenary conflict;
7. The other Principals responsible for exercising our delegated powers have received our mandate; our employees are not allowed to conduct warfare, including lawfare, on our shores;
8. Your Civil War is over; all presumptions otherwise are set aside;
9. Our civilian Courts of Record are in operation and under the provisions of Ex Parte Milligan, 71 US 2, your State of Nevada courts are obligated to withdraw and may no longer address us;
10. Any remaining exercise of Territorial Law must be applied to actual Territorial Subjects and Subject Matter;
11. The standard of evidence your courts must meet in establishing such claim of jurisdiction is set forth here: 2 Stat.153, Chapter 28, Section 1, enacted April 14, 1802, and otherwise stated as Revised United States Statute-at-Large 2165;
12. You and those others presuming to enforce the Lieber Code on our civilian population are in fact our employees acting improperly under presumption of powers never granted to you;
13. The only Law that we have in common with you as State of Nevada Attorney General is The Constitution of the United States of America; likewise, in your role as STATE OF NEVADA ATTORNEY GENERAL, the only Law we have with you is The Constitution of the United States—and in either case:
14. Refer to Article VI --- The Supremacy Clause;
15. Refer to Article IV – your obligation to protect our persons (under 1789 and 1790 definitions of “person”) and property. This does not provide for assumption of any Ultra Vires trusteeship or custodial role for the State of Nevada;
16. Refer to Amendment X -- Reserved Powers regarding all matters not specifically addressed and delegated--- your presumptions of “war powers”, “emergency powers”, and custodial interest are all subject to our Reserved Powers;
17. Refer to Amendment XI – Americans are not subject to foreign law, including foreign statutory law promulgated by Territorial and Municipal legislative bodies;
18. As the foregoing makes explicit and clear, the one who is apparently not aware of the applicable Law, is you.
You have now been fully informed of the facts, the Law, and the circumstance.
The actual Nevadans have accepted our right and responsibility to self-govern, have accepted all of our Constitutional Guarantees, and you are now being directed to return to peacetime status without further obfuscation or delay.

----------------------------

See this article and over 2700 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

13:10

Update on Bessie, The Wonder Car [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

It has been a fascinating journey into mysteries unknown until now, but no banana yet.  The Phantom Part has not been secured, but we have learned a lot more about the history of it, and about the quarry itself. 

Thanks to readers at Explorerforum.com, we now know that: 

"I think you can just replace that 91 style return line with one off a 92-94. Those use a threaded end to the fpr. I would swap the fpr to the 92-94 style as well. Much easier to find." -- and this was confirmed by our garage guys, too.  So we can expand the search. 

Also: "PR61 is a generic part number for the 92-94 FPR's, but there are alternatives:


Alternate/OEM Part Number(s): 91TF9C968AA, 92TF9C968AA, CM4713, CM4723, F1TZ9C968A, F2TZ9C968A, F37Z9C968A, ZZL113280, ZZL213280, ZZM213280."  


And that helps, too. 

Also, information that this elusive Fuel Pressure Regulator Return hose was not only standard issue on the Ford Explorer, but the Ford Aerostar, Ford Rangers, Mazda B4000, Explorer Sport, Mazda Navajo, from 92-94.

So, the search parameters are expanded. 

We MAY have replacements on the way, but haven't received them yet. Believe me, after this Great Snipe Hunt, if I wind up with a couple of these hoses going forward, I won't complain.  

Friends from Hawaii sent a pdf copy of the entire 1991 Explorer Part Manual, and yes, indeed, there was a line drawing to the Elusive Mystery Hose-- but no name and no parts number.  

As Charlie Brown says, "Auuggghhhh!" 

So, we monkeys of the garage kind are still leaping branch to branch and sweet Bessie is parked with her tail lights facing a birch forest that is turning gold and white, and the leaves are beginning to fall on her hood and around her tires. 

It's like having a family member in the hospital.  

My most sincere thanks to all of you who are taking the time to look and think and help an old lady and her old Explorer XL, Bessie, VIN Number 1FMDU34X3MUB02434. 

To me, you have to understand, she's only thirty years old.  A mere sprout, compared to Harriet, our 1962 Rover Wagon.

LOL.    

----------------------------

See this article and over 2600 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

12:53

Product Showcase: SparkFun Artemis Development Kits [SparkFun Electronics]

SparkFun Artemis Development Kit: https://www.sparkfun.com/products/16828 SparkFun Artemis Development Kit with Camera: https://www.sparkfun.com/products/17071 The SparkFun Artemis Development Kit is the latest board to be released around the SparkFun Artemis Module and it allows access to more software development features than previous Artemis based boards. This Kit includes the SparkFun Artemis DK board as well as the accessories (Himax camera & USB-C cable) needed to get started right away. Recommended software used to program the Artemis DK are the Arduino IDE, Arm® Mbed™ OS (Studio and CLI), and AmbiqSDK.

11:31

Arizona State investigating data anomalies in work by two former neuroscience faculty members [Retraction Watch]

Arizona State University is investigating two former faculty members suspected of falsifying data in several of their papers. The inquiry centers on Antonella Caccamo and Salvatore Oddo, who recently lost their 2016 article in Molecular Psychiatry, a Nature journal, titled “p62 improves AD-like pathology by increasing autophagy.”   Caccamo once held a research appointment in the … Continue reading Arizona State investigating data anomalies in work by two former neuroscience faculty members

07:35

Welcome to the Debian Project News! [Debian Project News]

We hope that you enjoy this Special Archival Edition of the Debian Project News which repeats, introduces, and attempts to catch you up on most of the year's news for 2020 so far.

The newsletter for the Debian community [Debian Project News]

For this special edition of the news, we have omitted a few regular sections in our effort to bring our coverage up to date. Should you wish to find older or missing information, please review our Bits from Debian Blog or our Debian Micronews Service where all recent and current news items have already been shared through this calendar year.

Official communication channels for Debian [Debian Project News]

From time to time we get questions about current events, the rules about who may own websites in the Debian namespace, the progress of development within the community, or inquiries as to the official channels of communication for and from Debian.

The Publicity team call for volunteers and help! [Debian Project News]

Your Publicity team is asking for help from you our readers, developers, and interested parties to contribute to the Debian news effort. We implore you to submit items that may be of interest to our community and also ask for your assistance with translations of the news into (your!) other languages along with the needed second or third set of eyes to assist in editing our work before publishing. If you can share a small amount of your time to aid our team which strives to keep all of us informed, we need you. Please reach out to us via IRC on #debian-publicity on OFTC.net, or our public mailing list, or via email at press@debian.org for sensitive or private inquiries.

We have elected a new DPL [Debian Project News]

Jonathan Carter (highvoltage), the newly elected DPL, shares his thoughts, thanks, and outlines for the future of Debian in his first official blog post as DPL. New DPL blog posts are also posted on the official Debian blog.

Security Advisories [Debian Project News]

Debian's Security Team releases current advisories on a daily basis (Security Advisories 2020). Please read them carefully and subscribe to the security mailing list.

Internal News [Debian Project News]

In July 2019, we welcomed the release of Debian 10 (codename "buster"). Since then, the Debian project announced the first, second, third, fourth, and fifth point release updates of its stable distribution. Debian 10.5 was published on 1 August 2020.

External News [Debian Project News]

Debian France is a non-profit organisation forming part of the Trusted Organisations. They are the main trusted organisation in Europe. They have just renewed their board. There were few changes, except the president who is now Jean-Philippe MENGUAL.

MiniDebConfs, MiniDebCamps, and DebConf20 [Debian Project News]

At the start of 2020, there were seven MiniDebConfs scheduled all around the world, reflecting the vitality of our community. Organized by Debian project members, MiniDebConfs are open to everyone and provide an opportunity for developers, contributors and other interested people to meet in person. But due to the constraints related to the coronavirus (COVID-19) pandemic, most if not all of these conferences have been cancelled or postponed to 2021: Maceió (Brazil), Aberdeen (Scotland), Bordeaux (France), El Salvador, and Regensburg (Germany). Some have been rescheduled online: the first one, MiniDeconfOnline #1, preceded by a DebCamp, was held from 28 to 31 May 2020. The MiniDebConf Online #2 "Gaming Edition", devoted to gaming on Debian (and Linux in general) will take place from 19 to 22 November 2020 - the first two days being a Debcamp. Visit the wiki page of the event for details.

Other events [Debian Project News]

The Debian Brasil community organized from May 3rd to Jun 6th, 2020, an online event called #FiqueEmCasaUseDebian (#StayHomeUseDebian). During 27 nights, the DDs Daniel Lenharo and Paulo Santana (phls) hosted guests who shared their knowledge about Debian. You can read a report.

Reports [Debian Project News]

Freexian issues monthly reports about the work of paid contributors to Debian Long Term Support.

Help needed [Debian Project News]

Debian Developers Reference is now maintained as ReStructuredText. Translations and translation updates are welcome - please see the announcement in the Misc. Developer News and the developers-reference translations thread for more information.

Code, coders, and contributors [Debian Project News]

Please welcome: Marie Alexandre, Saira Hussain, laokz, Arthur Diniz, Daniel Pimentel, Ricardo Fantin da Costa, Ivan Noleto, Joao Seckler, Andre Marcelo Alvarenga, Felipe Amorim, Pedro Vaz de Mello de Medeiros, Marco Villegas, Thiago Gomes Verissimo, Teemu Toivola, Giuliano Augusto Faulin Belinassi, Miguel Figueiredo, Stephan Lachnit, Nicola Di Lieto, Ximin Luo, Paul Grosu, Thomas Ward, Ganael Laplanche, Aaron M. Ucko, Rodrigo Carvalho, Lukas Puehringer, Markus Teich, Alexander Ponyatykh, Rob Savoury, Joaquin de Andres, Georges Basile Stavracas Neto, Jian-Ding Chen (timchen119), Juan Picca, Katerina, Matthew Fernandez, Shane McDonald, Eric Desrochers, Remi Duraffort, Sakirnth Nagarasa, Ambady Anand S., Abhijith Sheheer, Helen Koike, Sven Hartge, Priyanka Saggu, Sebastian Holtermann, Jamie Bliss, David Hart, James Tocknell, Julien Schueller, Matt Hsiao, Jafar Al-Gharaibeh, Matthias Blümel, Dustin Kirkland, Gao Xiang , Alberto Leiva Popper, Benjamin Hof, Antonio Russo, Jérôme Lebleu, Ramon Fried, Evangelos Rigas, Adam Cecile, Martin Habovstiak, Lucas Kanashiro, Alessandro Grassi, Estebanb, James Price, Cyril Richard, John Scott, David Bürgin, Beowulf, Igor Petruk, Thomas Dettbarn, Vifly, Lajos Veres, Andrzej Urbaniak, Phil Wyett, Christian Barcenas, Johannes Schilling, Josh Steadmon, Sven Hesse, Gert Wollny, suman rajan, kokoye2007, Kei Okada, Jonathan Tan, David Rodriguez, David Krauser, Norbert Schlia, Pranav Ballaney, Steve Meliza, Fabian Grünbichler, Sao I Kuan, Will Thompson, Abraham Raji, Andre Moreira Magalhaes, Lorenzo Puliti, Dmitry Baryshkov, Leon Marz, Ryan Pavlik, William Desportes, Michael Elterman, Simon, Schmeisser, Fabrice Bauzac, Pierre Gruet, Mattia Biondi, Taowa Munene-Tardif, Sepi Gair, Piper McCorkle, Alois Micard, xiao sheng wen, Roman Ondráček, Abhinav Krishna C K, Konstantin Demin, Pablo Mestre Drake, Harley Swick, Robin Gustafsson, Hamid Nassiby, Étienne Mollier, Karthik, Ben Fiedler, Jair Reis, Jordi Sayol, Emily Shaffer, Fabio dos Santos Mendes, Bruno Naibert de Campos, Junior Figueredo, Marcelo Vinicius Campos Amedi, Tiago Henrique Vercosa de Lima, Deivite Huender Ribeiro Cardoso, Guilherme de Paula Xavier Segundo, Celio Roberto Pereira, Tiago Rocha, Leandro Ramos, Filipi Souza, Leonardo Santiago Sidon da Rocha, Asael da Silva Vaz, Regis Fernandes Gontijo, Carlos Henrique Lima Melara, Alex Rosch de Faria, Luis Paulo Linares, Jose Nicodemos Vitoriano de Oliveira, Marcio Demetrio Bacci, Fabio Augusto De Muzio Tobich, Natan Mourao, Wilkens Lenon, Paulo Farias, Leonardo Rodrigues Pereira, Elimar Henrique da Silva, Delci Silva Junior, Paulo Henrique Hebling Correa, Gleisson Jesuino Joaquim Cardoso, Joao Paulo Lima de Oliveira, Jesus Ali Rios, Jaitony de Sousa, Leonardo Santos, Aristo Chen, Olivier Humbert, Roberto De Oliveira, Martyn Welch, Arun Kumar Pariyar, Vasyl Gello, Antoine Latter, Ken VanDine, Francisco M Neto, Dhavan Vaidya, Raphael Medaer, Evangelos Ribeiro Tzaras, Richard Hansen, Joachim Langenbach, Jason Hedden, Boian Bonev, Kay Thriemer, Sławomir Wójcik, Lukas Märdian, Kevin Duan, zhao feng, Leandro Cunha, Cocoa, J0J0 T, Johannes Tiefenbacher, Iain Parris, Guobang Bi, Lasse Flygenring-Harrsen, Emanuel Krivoy, Qianqian Fang, Rafael Onetta Araujo, Shruti Sridhar, Alvin Chen, Brian Murray, Nick Gasson.

07:27

Astrology for the Soul September 9, 2020 [New Paradigm Astrology]

Sometimes it's good to cry out loud, And acknowledge all the pain, Feel my feelings and honor myself, For trying as hard as I can. Too funny, I didn't know it was Children's Day! In Costa Rica, they have a special day honoring kids, and I just found out while uploading this report. Yup, well, with the North Node in Gemini (for more than another year), the sign of the puer/puella aeterna, it is helpful to honor our inner child, play, stay curious, and look around. In the report, I asked the question: What do you do when you try as hard as you can, and it doesn't work? Isn't that the story of life? The answer is you DEVELOP. You grow, evolve, and develop new skills, talents, perspectives, beliefs, and invent new ways to accomplish your goals. You get out of the limited conditioning, maybe rebel or revolt, experiment, go alternative, PROGRESS. Let's be honest. If we didn't fail, we might not evolve! The same is true of social / political / religious / educational / law enforcement / healthcare institutions. The road to enlightenment is filled with potholes, breakdowns, overheating, and flat tires. The sides of it are littered with old, rusty, wrecks that couldn't or wouldn't get repaired, renewed, and cared for. Which is where we come in... for each other. Maybe you can be a tow truck? Mechanic? Bring extra parts or fuel and pass 'em around? I hope so, 'cuz on the road ahead I see a tunnel coming with no shoulders or light! Let's hook up and make a caravan hitched together so tight that no one gets left behind. Blessings! Eric Clapton Baby! Let It Grow: https://youtu.be/YpDlmop0uYU For more astrology and Kyoga with Kaypacha visit: www.NewParadigmAstrology.com For info on the intro music: www.darryljohnkennedy.com For info on the closing music: www.ScottHuckabay.com

04:42

COVID CREATORS [Jin Laihook]

https://www.businessinsider.com/billionaires-net-worth-increases-coronavirus-pandemic-2020-7?op=1

04:37

A Culture of Kindness v. THEM [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

This is a strange problem, and yet, it draws one's attention to the actual problem and reveals it in ways that nothing else could. 

We are getting some very high-powered corporate executives in our homegrown Assemblies.  And they are bringing the corporate mindset with them. 

The whole super-competitive, production-oriented, dog-eat-dog mindset of the corpse-orats beats the life and love and creativity out of our souls.  It makes us into "persons" not "people" --- and in doing so, it reduces us to heartlessness and fear.  

It creates the kind of world we don't want to live in. 

It destroys connection and community and sharing.  

It erases the vital elements of emotion and ethics. 

I used to think of Corporate America as a vast chicken yard, complete with its pecking order.  God help anyone who wasn't prepared to fight to the death.  

The corpse-orats have produced several generations of people who are habituated to the norms of this ruthless corporate culture, who accept its demands, its unrelenting focus on profits, its ingrained selfishness, and who take one-up games and inter-office politics for granted.   

Now they are coming into our Assemblies, and naturally, they bring this mindset with them.  They don't even seem to realize that they are no longer on Wall Street ----and that Main Street is different.  

They are coming to Main Street in search of old-fashioned freedom and American values and privacy and security for themselves and their families and their homes and their money and everything else they've slaved for.  But then, they immediately set to work, trying to make Main Street into Wall Street.  

Living in Alaska, I've seen wave after wave of Californians fleeing the Golden State, seeking freedom in Alaska.  

They promptly settle down and start talking about how backward Alaskans are.  Why aren't we supporting hundreds of welfare programs and snooper pooper agencies and government regulation of every kind?  Why aren't we politically correct and compliant?  Why aren't we gaga about money? 

It never occurs to them that their Nanny State mentality is what caused the problems that they were so anxious to get away from. .   

The same thing happens with the Corporatists.  They come to our Assemblies to escape the cold, nasty, coercive, immoral, profit-driven culture of the corporations --- and drag their prisons with them.  

Recovering Corporatists need time and therapy and encouragement.  We don't only need to teach them about American Government and History, we have to teach them how to be kind. 

They never learned, or they have long ago forgotten the simple code of kindness and acceptance and honesty that makes Main Street what it is.  

 Many people have observed that this is a spiritual struggle more than anything else, a matter of what you believe and what you believe in, so let's start right here in our Assemblies and examine our assumptions.  

We are not here to restore or rebuild the ivory towers and balance sheets of corpse-orats.  We are here to rebuild a nation made of living people -- people who have frailties and problems.  So let's all make the conscious choice to make kindness and loyalty and honesty the core of our non-corporate Value System----and teach others the same. 

The only way to really leave Corporate America and its chicken yard mentality behind, is to realize that we have been indoctrinated into this dark and evil way of thinking and doing things. And then also realize that we can willfully, and consciously choose a profoundly different way of life and way of treating each other in our State Assemblies. 

----------------------------

See this article and over 2600 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

00:02

2020-09-10.fae [crystalfaeries]

2020-09-10 JupiterDay's numerology:
        14 Temperance = Yang Puja
         5 Heirophant
Consciousness Expansion:
        Self-control, reconciliation,
        combination of opposed forces
Fortune du jour:
        You are a bundle of energy,
        always on the go.

"The best way to prepare is to write programs, and to study great programs that other people have written. In my case, I went to the garbage cans at the Computer Science Center and I fished out listings of their operating systems." -- Bill Gates

"Truly evil people, with all their malice and hatred, pose far less of a threat to mankind than the basically good people who believe in "authority".
-- Larken Rose, The Most Dangerous Superstition

For those amongst us who like to drink tea, be aware to buy bulk teas and use a "tea ball" for brewing, rather than wasting money on pre-bagged tea, especially since the newer tea bags are extremely toxic

Faery blessings -- celeste


2020-09-09

22:00

The Impact Of Microplastics In The Marine Environment And Human Health [The Permaculture Research Institute]

Plastic production suffered a great increase since it started to be commercialised 70 years ago. In the beginning, the overall production reached about 0.5 million tons per year. However, in 2017, it increased up to 348 million tons. Along with plastic production, one big concern has arisen: environmental pollution.  Anthropogenic plastic pollution is a major …

The post The Impact Of Microplastics In The Marine Environment And Human Health  appeared first on The Permaculture Research Institute.

12:56

BM-310 Small and Efficient MCU Core - Alexander Kozlov, CloudBEAR [RISC-V International]

BM-310 Small and Efficient MCU Core - Alexander Kozlov, CloudBEAR In this talk, we will provide a detailed feature description of small and efficient microcontroller core BM-310 including supported extensions, pipeline options for performance/efficiency tradeoffs, memory subsystem, interrupt control, power management, and debug capabilities.

12:12

Optimize Openblas by RISC-V "V" Vector Extension - Xianyi Zhang, PerfXLab [RISC-V International]

Optimize Openblas by RISC-V "V" Vector Extension - Xianyi Zhang, PerfXLab OpenBLAS is an open source BLAS (Basic Linear Algebra Subprograms) implementation, which is the building block of dense matrix software stack. Currently, OpenBLAS is used by high performance computing applications, and machine learning / deep learning applications. The speaker introduces the work of porting OpenBLAS on RISC-V ISA. Furthermore, they presents how to optimize the software performance by RISC-V "V" Vector Extension, including GEMM (matrix multiplication), the BLAS level 3 function, and axpy, the BLAS level 1 function. Then, the speaker gives the performance benefit on XuanTie C910 RISC-V processor.

11:38

Software Development for 64-Bit RISC-V Processor Verification - Sreenadh S & Sangeetha N. [RISC-V International]

Software Development for 64-Bit RISC-V Processor Verification - Sreenadh S & Sangeetha N., Center for Development of Advanced Computing, India A software model (Nigama) of 64-bit RISC-V IMAFD processor was developed in CPP language. Nigama is used as a reference model for verification of in-house developed out-of-order RV64IMAFD processor. The processor running on FPGA or simulation platform can be connected to Nigama through Ethernet interface and a test program runs on DUT and Nigama simultaneously in step lock mode and the result of each instruction on DUT is compared with that of Nigama and if there is any mismatch an error log is printed. This log is used further for debugging. This method is much faster even if larger test programs of more than 2 Billion instructions are running on DUT. This verification method has been successfully used for verifying the in-house developed 64-bit out-of-order single core RISC-V ISA based processor (RV64IMAFD) and enhancement of Nigama for multicore verification is under progress.

11:27

ProtoCPU: Modelling an In-Order RISC-V Core in gem5 - Anuj Justus Rajappa, IIT Madras [RISC-V International]

ProtoCPU: Modelling an In-Order RISC-V Core in gem5 - Anuj Justus Rajappa, IIT Madras Ideate, simulate, develop and repeat seems to be the general ideal workflow for any product development process, especially when stakes are high. ProtoCPU was born to fulfill this workflow by aiding in simulation of an in-order RISC-V processor designed by the SHAKTI team at IIT Madras. ProtoCPU is a 5 stage inorder core, designed in gem5 with a goal to cycle-accurately represent the C-class processors. It was built from scratch using the gem5 APIs. The model is under development and currently supports bare-metal full system RISCV simulations in gem5. The session brings in the overview of this model in gem5, merits and demerits of designing cpu models in gem5 along with the additional needs yet to be met to ease the job of microarchitectural design space exploration with respect to RISC-V ISA.

11:09

Optimizing RISC-V Custom Instructions with Software Driven Anal... - Duncan Graham & Simon Davidmann [RISC-V International]

Optimizing RISC-V Custom Instructions with Software Driven Analysis and Profiling - Duncan Graham & Simon Davidmann, Imperas Software One of the attractive features of RISC-V is the ability to add, and with ecosystem support, new optimized instructions and extensions to a processor implementation. At first it appears as simple task to look at opportunities in the application code that could be accelerated with some dedicated new hardware. However, since hardware typically has a much longer life cycle than software, future updates and roadmap needs must be anticipated. Thus, the art of ISA design is using fine grain analysis to accelerate just the key steps while leaving sufficient flexibility to support new software updates and advances. While in multi-core arrays a custom extension can offer a lightweight communication channel between processors. This extends the scope beyond the processor itself into system design and analysis. This talk will illustrate the key profiling and analysis steps for custom extensions.

11:01

Support TVM QNN Flow on RISC-V with SIMD Computation - Yi-Ru Chen & Jenq Kuen Lee [RISC-V International]

Support TVM QNN Flow on RISC-V with SIMD Computation - Yi-Ru Chen & Jenq Kuen Lee, National Tsing Hua University, Taiwan The inference phase with low power and memory limited environments is critical for deploying neural network models on edge devices. One possible approach is adopting the quantization technique to represent activations and weights in lower bits. In this work, we present the efficiently inference quantized models by supporting TVM QNN flow with RISC-V SIMD computations. As RISC-V supports both Superword SIMD and Subword SIMD, we compile models by TVM and replace the computation kernel with designated LLVM intrinsic functions for mapping with RISC-V favorable SIMD instructions. Experiments shows 1.79-7.58x reduction of instruction count compared quantized model with FP32 implementation. The accuracy loss is acceptable by evaluating on 1k images. The benchmark including MobileNet and Inception series. All experiments are executed on Spike with RISC-V SIMD supports.

10:55

TEEP (Trusted Execution Environment Provisioning) on RISC-V - Akira Tsukamoto & Kuniyasu Suzaki [RISC-V International]

TEEP (Trusted Execution Environment Provisioning) on RISC-V - Akira Tsukamoto & Kuniyasu Suzaki, The National Institute of Advanced Industrial Science and Technology (AIST) IETF is defining Trusted Execution Environment Provisioning (TEEP) protocol to remotely install/update/delete of TA (Trusted Application) in TEE (Trusted Execution Environment) which provides hardware isolated security in CPU. TEEP is designed to be generic among different CPU architectures; however primary activity is on Intel and ARM only. Therefore, our team is implementing TEEP on RISC-V. TEEP consists of 3 major software components; “TEEP Broker” on the OS, “TEEP Agent” in the TEE, and “Trusted Application Manager (TAM)” as a remote server. These components manage certificates for authenticating TEE and TAM, and code signing of TA. All of the certificates are based on PKI management. The challenges of having TEEP on RISC-V is how to minimize required features, such as HTTP, Concise Binary Object Representation (CBOR) parser, inside TEE while keeping the portability of existing TA.

10:46

Andes RISC-V Processors for Control and Data Paths - Charlie Su, Andes Technology Corporation [RISC-V International]

Andes RISC-V Processors for Control and Data Paths - Charlie Su, Andes Technology Corporation Andes V5 RISC-V processor IP solutions have been adopted by a wide range of SoCs: from tiny MCUs for consumer products, to chips for enterprise and datacenter products. For single-processor SoC, Andes DSP or vector processor can cover both control and data processing. For advanced SoC using multiple processors, some V5 cores tackle data-intensive computations while others handles control paths. In this talk, Dr. Charlie Su will give an overview of Andes processor solutions and control/data path processing in applications. He will then use Andes processors as examples to show how RISC-V processors and their features can provide efficient control/data path processing. Charlie will also introduce Andes Custom Extension™ (ACE) framework and illustrate how it automates RISC-V custom instruction extensions to further accelerate control/data path processing while maintaining programmability.

10:18

Semidynamics New Family of High Bandwidth Vector-Capable Cores - Roger Espasa, SemiDynamics [RISC-V International]

Semidynamics New Family of High Bandwidth Vector-Capable Cores - Roger Espasa, SemiDynamics In this session, SemiDynamics will disclose its new RISC-V application cores, targeted at bandwidth-hungry application domains such as Machine Learning, Recommendation Systems, Sparse Computation, HPC and Key-Value Stores. SemiDynamics will also open source its "Open Vector Interface (OVI)", a public spec that allows third-parties to design their own vector unit and connect it to SemiDynamics cores.

10:16

Portable Implementation of GlobalPlatform API for TEE - Kenta Nakajima & Kuniyasu Suzaki, TRASIO [RISC-V International]

Portable Implementation of GlobalPlatform API for TEE - Kenta Nakajima & Kuniyasu Suzaki, Technology Research Association of Secure IoT Edge Application Based on RISC-V Open Architecture (TRASIO) TEE (Trusted Execution Environment) is a CPU feature that offers an isolated environment for critical processing. RISC-V has some TEE implementations, i.e., Keystone, Sanctum, etc. However, each CPU offers an original programming model and the portability is not kept. GlobalPlatform (GP) offers TEE Internal APIs, but it is used on ARM TrustZone mainly. Most implementations are on a Trusted OS and cannot be port to another TEE easily. We implement GP TEE APIs as a portable library. Most APIs are independent of CPU architecture, but some APIs are not (e.g., Secure Storage, Secure Timer) and implemented for each architecture. The current library is available for RISC-V Keystone and Intel SGX, and the performance was measured on both architectures (Pentium and SiFive Unleashed). The results showed that most are the same but the low performance of secure storage on Keystone.

10:04

Vector Compliance Testing for RISC-V - Hideki Sugimoto & Koji Adachi, NSITEXE Inc. [RISC-V International]

Vector Compliance Testing for RISC-V - Hideki Sugimoto & Koji Adachi, NSITEXE Inc. The first step to testing a RISC-V vector instruction implementation is to test compliance to the specification. To do this requires both compliance tests and a reference model. NSITEXE, with its Data Flow Processor (DFP) IP block, required such testing for its implementation of the vector engine. The Imperas RISC-V ISS, riscvOVPsim, is in use as the reference model for the RISC-V Compliance Test Suite (CTS). Imperas has developed a Directed Compliance Test Generator, which achieves over 95% functional instruction coverage with those tests generated. Using the Vector CTS for the NSITEXE configuration has enabled confirmation of compliance with v0.8 of the RISC-V vector specification. This paper will discuss the NSITEXE DFP vector engine implementation, the generation of the Vector Compliance Tests for the NSITEXE configuration and the results of those tests including coverage data.

09:57

Trusted Execution State: An Extension for Lightweight Secure Function Calling - Mark Hill, Huawei [RISC-V International]

Trusted Execution State: An Extension for Lightweight Secure Function Calling - Mark Hill, Huawei Technologies R&D (UK) Ltd Although Trusted Execution Environments (TEEs) can be built using the standard RISC-V machine mode as the trusted state this approach has some limitations: - Machine mode must manage the lower privilege tasks, exceptions/interrupts and device drivers as well as managing secret data and providing trusted services. This dual use violates the security Principle of Least Privilege. - Supporting all these mechanisms make the code large, increasing the risk of security loopholes appearing and providing more opportunity to create gadgets for ROP/JOP style attacks. - Transitions between insecure and secure domains is inevitablly heavyweight as it must be syscall based. This extension addresses these issues by adding a new Trusted Execution State which provides stronger protection and quicker handling of secret data.

09:31

Nutshell: A Linux-Compatible RISC-V Processor Designed by Undergraduates - Huaqiang Wang [RISC-V International]

Nutshell: A Linux-Compatible RISC-V Processor Designed by Undergraduates - Huaqiang Wang, University of Chinese Academy of Sciences NutShell is an in-order linux-compatible RISC-V processor designed by five undergraduate students from University of Chinese Academy of Sciences. This processor supports RV64IMAC instruction extension and SV39 virtual-memory system. It has been typed out using SMIC 110nm process technology. The test chip can successfully boot the Linux kernel. A cycle-level differential testing framework is used is used during development, in which an emulator (NEMU) runs side by side with the processor being tested. With the help of that framework, the develop team managed to boot linux on NutShell in a short period of time. This talk will introduce the development process of this chip from the perspective of undergraduate students participating in the project. Experience of developing with Chisel and debugging with the differential testing framework will also be shared.

08:53

2021 Magical Faery Wall Calendar [efairies.com: New Products]

2021 Magical Faery Wall Calendar

Make each month brighter and happier with the help of these beautiful faeries. The Magical Faery Calendar presents the enchanting art of Emily Fiegenschuh - art that captures the wisdom and spirit of the fare folk. This inspiring cale..

Price: $14.99

08:46

2021 Witches Wall Calendar [efairies.com: New Products]

 2021 Witches Wall Calendar

The first choice for Witches and Pagans everywhere since 1998. Packed with astrological data, Witches' holidays, magical wisdom, rituals, spells, and all kinds of helpful tips and hints for a magical life, this beautiful wall calendar..

Price: $14.99

08:34

2021 Fairyland Wall Calendar [efairies.com: New Products]

2021 Fairyland Wall Calendar

Step into a world of dancing fairies, ethereal mermaids and enchanted forests with this charming wall calendar, featuring 12 beloved artworks by Jean & Ron Henry. The delicate illustrations capture the playfulness of these intrigu..

Price: $14.99

08:25

2021 Alchemy Wall Calendar [efairies.com: New Products]

2021 Alchemy Wall Calendar

Alchemy 1977 specializes in stunning art depicting darkly imaginative scenes. This amazing wall calendar is rich with gothic imagery from the creative minds of some of the world's best fantasy artists. Within this sixteen-month calend..

Price: $14.99

08:00

Last Quarter Moon in Gemini: Spin the Wheel [Rising Moon Astrology]

Very early Thursday. the Last Quarter Moon creates a T-square as the Sun in Virgo opposes Neptune with both squared by the Gemini Moon. We’re in the realm of the mutable, where things change quickly.

Some see the mutable signs, especially Gemini, as fickle, not to be trusted, but when the ground is shifting under our feet, being able to sense the wind and adjust our sails has survival value.

The Gemini Moon might be a bellwether, the trendsetter in the flock who everyone follows. There’s cleverness here, sleight of hand, and a quick step.

Follow energy around the wheel of the chart: The Virgo Sun trines Jupiter in Capricorn, and extend its orb of influence to include Pluto and Saturn as well.

The Gemini Moon is close enough for a wide conjunction with the North Node, which turns the Sun–Moon–Neptune T-square into a grand cross of mutability. Can we shape shift? Perhaps we can. Do we want to? Maybe so.

Mars stationed Rx yesterday very close to the next Saturn square. Saturn is slowing down. Mars is also aspecting the Moon’s Nodes. Heavy weather indeed.

Meanwhile, Mercury in Libra moves to oppose Chiron in Aries. The sense of vulnerability remains, along with the question of how we manage our own.

At the Last Quarter, we take care of business. Having learned at the Full Moon and shared at the Disseminating, the Sun–Moon square calls for action. The challenge now is setting priorities before it all gets more intense.

What’re the next steps in your action plan? Use the cleverness of Gemini to scan the environment and seize the best options for success.

With Mars and Saturn looming larger, we all need to choose our battles carefully. We can still move ahead though, staying under the radar, shifting our tactics, and avoiding unnecessary conflict.

A bit of the trickster can win through where an army might not. Take a chance. Spin the wheel.


Image adapted from Jake Weirick
https://unsplash.com/photos/hieOkhzGyCE

04:50

No Flags -- What Does It Mean? [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

Numerous readers have contacted me, curious to know why there are no flags flying at the United Nations HQ in New York City---- and haven't been since March 20, 2020.
The removal of the flags indicates that the various for-profit governmental services corpse-orats that have been operating "as" national governments, are all bankrupt.
The actual national governments have yet to regroup and recoup and decide such things as whether or not they want to continue membership in an organization like the United Nations, which was being used as a store front for crime syndicates, and needs to be cleaned up like everything else.
Donald Trump pulled the plug on all these corpse-orats engaged in "legal" but unlawful activities, in violation of their charters and the obligations that allow them to exist. He also pulled the plug on all the "central banks". It had to be done.
Once he got into office and began digging, it became apparent to him, as it has to every single one of us who ever pulled a thread on the spider's web --- that the rot went far deeper and stretched far wider than anyone can imagine.
It's in the churches and the schools, it's in the supermarkets and on the public roads, it's in the businesses and the industries and whole economic sectors, it's in this country and virtually every other country on Earth ---and while we call it "the Swamp", it could more aptly be called, "the Sewer from Hell".
If the problem were only inside the Beltway, it would be relatively easy to fix. We could unseat certain corrupt members of Congress, employ measures to bust monopolies, and hey, clean up the act, and move on. But no, my dears, this is a creeping grundge that has polluted and corrupted the entire world.
Poor Donald Trump. He gave his word to clean up "The Swamp", thinking of it as the Local Cesspool known as Washington, DC, but---once he got going, it became oh, so, horribly self-evident that "The Swamp" was worldwide, with big fangs sunk into even small businesses, and virtual armies of misdirected, ignorant public employees assaulting the people that they are supposed to serve on every continent.
And the money? Well, what money? These corpse-orats never had any actual money. All of these THINGS have run exclusively on credit for decades upon decades, and credit is not money. Credit is credit. And in our case, our credit was being stolen along with our identities and our assets, for generations.
Most of the people living on this planet have been masterfully enslaved, lied to, deluded, tricked, and defrauded by charlatans claiming to "represent" them. We, Americans, have been no different than the rest.
Now that you begin to see the absolutely massive size and scope of the problem, you can draw in your breath, and nobody will blame you.
Now that you know that this has been brought to you by -- literally-- generations of politicians selected by both political parties, you have cause to stop and think: hey, both these political parties are responsible for this.
And you can see the reason why it is absolutely urgent for you to get up off your couch and get yourselves organized. Lay in extra food and supplies to the extent possible. Declare your birthright political status --- and not as any "citizen of the United States" ---- as a State Citizen: a Virginian, a Texan, a Californian, a Wisconsinite....and publish it on the public record.
Most of all, get involved in your State Assembly and support it and work together with your countrymen to build a firm foundation for it going forward. Your State Assembly and the Federation of States, The United States of America, is the only lawful government still standing.
All the rest, as I have been telling you for years now, was just private, for-profit, foreign governmental services corpse-orats in the business of selling you more and more and more services. And they are being liquidated for cause.
So, you have to do what we always brag about and neglect. We have to self-govern. Thank God our ancestors left us good templates to do it.
Go to: www.TheAmericanStatesAssembly.net and get started today. We need you to bring all the help you possibly can.
Donations toward this urgent work are desperately needed, too.
Send to PayPal: avannavon@gmail.com
Send by Mail: Anna Maria Riezinger, In care of: Box 520994, Big Lake, Alaska 99652.
We are also opening up website donation opportunities to directly support our Peacekeeping Forces --- the Constitutional Sheriffs, the State Assembly Militias, the Continental Marshals, and the Peacekeeping Task Force.
Let it be some comfort that you are not alone in the midst of this great crisis. There are already Americans on the job, already fifty Assemblies, already multiple websites and educational programs and so much more going on.
Instead of being weary and confused and alone, wake up, America. This is a new day dawning and you can make of it what you will.

----------------------------

See this article and over 2600 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

04:23

Public Notice of Non-Compliance, Non-Assumpsit, and Counter-Claim [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

To all Parties and Principals Concerned: Notice to Agents is Notice to Principals, and Notice to Principals is Notice to Agents.

Although we informally call The United States of America “the United States” that isn’t really what “the United States” is.

The entity formally known as “the United States” was originally the unincorporated government of the Union of States formed in 1776; in 1790 this entity began using the Proper Name, The United States, and its Municipal power-sharing partner began operating as “the United States”.

So, in fact, “the United States” today is the District Government of the District of Columbia and it is limited to the “one mile square” devoted to the Municipality of Washington, DC. This entity continued to operate as an unincorporated business from 1790 to 1878, when it was fully incorporated as a Municipal Corporation and recognized as an independent international city-state, run as a “plenary oligarchy” by the members of Congress, allowed under Article I, Section 8, Clause 17.

Now read the Birthright Citizenship Act of 2017 abstract:

“Birthright Citizenship Act of 2017. This bill amends the Immigration and Nationality Act to consider a person born in the United States "subject to the jurisdiction" of the United States for citizenship at birth purposes if the person is born in the United States of parents, one of whom is: (1) a U.S. citizen or national, (2) a lawful permanent resident alien whose residence is in the United States, or (3) an alien performing active service in the U.S. Armed Forces.”

The Municipal Government dba “the United States” is claiming that babies born to all Federal Civil Service Employees, to people born in the Insular States and Possessions, to political asylum seekers, and to Americans serving in the U.S. Armed Forces, are subject to the jurisdiction of the United States [Municipal Government] and are citizens of the Municipal United States Government at birth.

Slaves, in other words.

Public slave ownership has never been outlawed by “the United States” and so it continues and grows and thrives.

This time, they’ve attacked and attached the children of innocent American Servicemen.

They have also set up a verbal conundrum by which they may hope to claim that any American they see is a “lawful permanent resident alien”--- a form of political asylum seeker, obligated to serve the Municipal Oligarchy, if that “alien” --- from their perspective, “resides” in the United States.

Welcome to Little Rome.

The problem for them is that The Constitution of the United States strictly limits their government to the one mile square set aside for them in the District of Columbia, and their apparent gross over-reach and usurpation in forming over 185,000 Municipal Corporations and claiming millions of acres of land in this country as “federal” land owned and operated by Municipal Corporations, is both illegal and unlawful.

So is any claim that the people living on this illegally and unlawfully purloined land are “citizens of the United States” and “assets” belonging to the Municipal United States Government.

We firmly return and refuse all such claims of conferred citizenship obligations, together with all interpretations and all presumptions leading to the conscription or trafficking of any American into Municipal jurisdiction; the State Citizens, known as the People of this country, who are Principals and Parties to The Constitution of the United States issue this Notice of Non-Compliance, Non-Assumpsit, and Counter-Claim to the Municipal United States, their Bankruptcy Trustees, and all other Concerned Parties.

We demand that the 185,000-plus illegally and unlawfully and immorally established Municipal Corporation franchises be dissolved and further demand that all assets purloined in this process be repatriated to The United States of America and to the States and People to whom these assets manifestly belong.

We also demand that all abuse of usufruct privileges immediately and permanently stop, and that all so-called individual Municipal Corporations gifted to Americans as a means of constructive fraud against them be dissolved. All profits, fees, leases, tithes, beneficial contracts, stocks, bonds, titles, copyrights, patents, trademarks, material and immaterial assets, including houses, land, and public interests including our court buildings, roads, railroads, public utilities, parks, and national defense investments must be returned to the victims of these heinous False Claims in Commerce and attendant abuses.

Signed by: Anna Maria Riezinger, Fiduciary
The United States of America

----------------------------

See this article and over 2600 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

02:00

MX Linux MX-19.2 KDE - Missing in action [Dedoimedo RSS]

Today before ye stands a sad man with a short review of MX Linux MX-19.2 KDE edition, focusing mostly on the live session experience and first impressions, including look and feel, font contrast and clarity, Plasma-specific biggles and bugs, various visual and branding inconsistencies, overall value proposition, and more. Take a look.

Hyperledger Welcomes Blue Chip Line-Up of New Members and Certified Service Providers as Global Community Gathers for Virtual Member Summit [Hyperledger]

New Members include Chainstack, SIMBA Chain, SIX Digital Exchange and Visa; New Certified Service Providers include NEC, SAP, Tech Mahindra and Tencent

SAN FRANCISCO (September 9, 2020)Hyperledger, an open source collaborative effort created to advance cross-industry blockchain technologies, today announced that eight new organizations, including Chainstack, SIMBA Chain, SIX Digital Exchange and Visa, have joined as members of the the multi-venture, multi-stakeholder effort hosted at the Linux Foundation. These new members are joining the rest of the Hyperledger community for the annual Member Summit. This year’s two-day virtual event will have interactive programming in three time zones to engage the entire global Hyperledger community.

In addition, Hyperledger announced seven more companies, Creativehill, DeepDive Technology Group, NEC, SAP, SwissCom, Tech Mahindra and Tencent, have completed the training requirements to become Hyperledger Certified Service Providers (HCSPs). This brings the total number of HCSPs to 18. New member EMURGO is also jumping in quickly by joining the ranks of official Hyperledger Training Partners.  

The growing number of deployment-focused partners points to the increasing adoption of enterprise blockchain across a range of industries, geographies and use cases. To illustrate that point further, Hyperledger has been building out its case study library. Just this week, Hyperledger published a case study on CULedger’s MemberPass permanent, portable digital identity solution for credit union members. Other recent additions include detailed looks at Mindtree’s dual solutions for revolutionizing loyalty programs and Soramitsu’s work with the National Bank of Cambodia on a retail payments system as well as a solution brief on Joisto’s blockchain-based solution for GDPR-compliant document and data storage.

“In a year that has looked like no other, Member Summit is an even more important grounding point for our community,” said Brian Behlendorf, Executive Director, Hyperledger. “The pace of adoption for enterprise blockchain is accelerating, and our members are a driving force for critical new technologies and solutions. Our latest members will be important new voices as we set agendas and roadmaps that will keep us pushing this market forward in the year ahead.”

Hyperledger allows organizations to create solid, industry-specific applications, platforms and hardware systems to support their individual business transactions by offering enterprise-grade, open source distributed ledger frameworks, libraries and tools. General members joining the community are Chainstack, Creativehill, DeepDive Technology Group, EMURGO, SIMBA Chain, SIX Digital Exchange, Valid Network and Visa.

New member quotes:

Chainstack

“Chainstack provides enterprise-grade, managed blockchain services on any cloud. Our mission is to bring scalability, flexibility and transparency to the industry,” said Laurent Dedenis, CEO, Chainstack. “Blockchain technology, and Hyperledger in particular, has the power to resolve some inefficiencies and generate value for the enterprise world. We are thrilled to join the Hyperledger community now as we officially roll out the Chainstack 2.0 blockchain management services platform with a brand-new applications marketplace and API.”

Creativehill

“Creativehill is very honored and thrilled to join the Hyperledger community of leading blockchain enterprises,” said Cheonwoon Yim, Co-Founder & CEO of Creativehill. “We provide blockchain technology to the finance and public sectors based on research we started with Hyperledger Fabric version 0.6. Moreover, our company also offers consultation and reports to other fields to which this technology can be applied. Recently, we focused on producing a use case combining health care and supply chain management. We would like to cooperate on this with the Hyperledger community and contribute our knowledge and efforts to the development of the ecosystem.” 

DeepDive Technology Group

“We believe that blockchain innovation is bigger than the internet itself,” said Misha Hanin, Founder & CEO, DeepDive Technology Group. “We believe that in the next 3, 5, 7, 10 years, we’ll see a huge WORLD transformation driven by blockchain. We’ll start solving huge problems for large enterprise companies, governments, and entire nations using this technology. At DeepDive Technology Group, we believe that Hyperledger Fabric will play the absolute leading role in driving blockchain innovation forward. Our own team of enterprise blockchain trailblazers is currently building production level use-cases using Hyperledger Fabric; we see how in the past two years, blockchain has gone from something almost no enterprises talked about, to something half of enterprises have now planned serious investments in. We’re thankful to be members of the Hyperledger community, to play a leading role in the advancement of enterprise blockchain ourselves.” 

EMURGO

“As a global blockchain solutions provider and founding entity of the globally recognized Cardano blockchain, EMURGO is excited to enter Hyperledger and join hands with a phenomenal group of organizations that are building robust blockchain infrastructures to support a new spectrum of valued services,” said Ken Kodama, EMURGO CEO. “EMURGO is highly committed to developing end-to-end, tailored blockchain solutions such as our new customized Brandmark solution in order for clients to address existing inefficiencies in industries like supply chain. Becoming a part of Hyperledger’s world class open community enables fellow members with a wealth of varied experiences to strategically exchange valuable resources and collaborate on furthering the maturation of the overall blockchain ecosystem with real solutions to meet the needs of clients.” 

SIMBA Chain

“We are excited to join Hyperledger, a premier development framework for enterprise blockchain solutions, and be part of a community comprising so many premier organizations exploring collaborative models for blockchain technologies,” said Joel Neidig, CEO of SIMBA Chain, a Smart Contract as a Service and blockchain innovation platform company. “SIMBA’s roots go back to one of DARPA’s first blockchain contracts, so we have a long-standing focus on working with small and large enterprises, governments and other organizations to bring practical use-cases to full realization. With our platform’s recent support for Hyperledger, we believe now is a great time to join and help bring the community forward.” 

SIX Digital Exchange

“SIX Digital Exchange is on the leading edge of building next generation digital market infrastructure to support the evolution of financial markets with enterprise blockchain and digital assets as a foundation,” said Tim Grant, Head of Business, SIX Digital Exchange. “Hyperledger is one of the most significant industry focal points for the continued development of enterprise blockchain, and we feel that it is key that we bring our insights to the table to help drive the formation of a global financial market ecosystem that drives new products, services and business models into the marketplace and supports a better future for governments, corpse-orats and individuals.” 

Valid Network 

“As the provider of a first of its kind blockchain security solution, we are more than excited to take part in the Hyperledger community and the Linux Foundation,” said Kfir Nissan, co-founder and CEO at Valid Network. “We see joining this collaboration as an important strategic step for our company and technology, and believe that together we can build a future of secured and trusted blockchain solutions for enterprises all over the world, enabling them to innovate with blockchain faster and safer than they could ever imagine.”

Members big and small are collaborating across company and country lines to ensure the success of Hyperledger business blockchain technologies, building products, services and solutions on top of Hyperledger code bases that are critical to their lines of business. Learn more about becoming a member of Hyperledger. 

About Hyperledger

Hyperledger is an open source collaborative effort created to advance cross-industry blockchain technologies. It is a global collaboration including leaders in finance, banking, healthcare, supply chains, manufacturing and technology. Hyperledger hosts many enterprise blockchain technology projects including distributed ledger frameworks, smart contract engines, client libraries, graphical interfaces, utility libraries and sample applications. All Hyperledger code is built publicly and available under the Apache license. The Linux Foundation hosts Hyperledger under the foundation. To learn more, visit: https://www.hyperledger.org/.

The post Hyperledger Welcomes Blue Chip Line-Up of New Members and Certified Service Providers as Global Community Gathers for Virtual Member Summit appeared first on Hyperledger.

00:00

‘An isolated incident’: Should reviewers check references? [Retraction Watch]

Peer reviewers are supposed to be experts in their fields, competent enough at least to spot methodological errors, wayward conclusions and implausible findings. But checking references? Apparently, not so much.  A journal about academic medicine has retracted a 2020 article because its reviewers and editors didn’t bother to confirm that the references said what the … Continue reading ‘An isolated incident’: Should reviewers check references?

2020-09-08

20:07

2020-09-09.fae [crystalfaeries]

[LoveHasWon.ORG]

2020-09-09 MercuryDay's numerology:
        22/0 Fool
         4 Emperor
Rational Mind:
        Mother's Milk = Spiritual Nourishment
-       -       -       -       -       -       -       -
Here we have a perfect example of too many remote fonts,
and too much javascript.
NO! I'm not gonna run uknown JavaScript code
from so many 3rd party sources around the interwebs.
Such is the primary vector of software VIRUS INFECTION!
Your media overshadows your message... which means
you're busy "selling-me" your agenda
with far too much manipulation.
This reminds me perfectly of Felicia Cowden proudly showing
to me her book, with the claim that each and every page
has been in great detail "product-ized"...
meaning that it uses every possible subliminal manipulation
beyond "the message" to get us to "buy-in"
to what she's selling.

By contrast, on my website, i'm ever conscious
to keep my main message available in text, with
supplementary details via images, videos, or audios.
I also keep the page layout very simple...
and therefore, i do not attract the manipulatable sheeple,
for it is the truth seeker i serve...
and i do my best to keep the core in audio and text,
so that even the blind can make good use of the material,
via the usual "screen-reader" software
which speaks the text for the blind person.

By not attempting to exert Nazi-level control over
your viewing experience,
and by allowing you to be in control of apearance,
you can have a better viewing experience...
one carefully intended to serve your consciousness
and the [a]scension of your soul to sovereignty,
rather than serving my ego that everyone should
"LIKE" my postings by appealing to
their primal passions, AND, to their programming.

-- celeste

[hawaiian_volcano_fairy.01]

Now, let's finally get to the real subject matter... that a female is "claiming to 'be'" Pele, and the Mother God, incarnate. I have no intention of addressing any failures to fully live-up-to such claims. We have a meme circulating amongst mankind which says: "Fake it until you Make it." and THAT IS TRUTH!

Rather than invalidating another who is ambitious enough to strive to accomplish something wonderful, but is not yet fully succeeding at their goal of becoming one with it, we can ACTUALLY EXPRESS LOVE by validating their intent, and beyond that, we can witness for them at a minimum, acknowledging their intent, and aligning our own will to validate their full accomplishment of their goal/claim, for "whenever two or more 'gather in the name of...'" and align their shared will, then we are invoking positive synergy, which is also synergized with, by the divine, iff our will is in alignment with divine will / divine plan. In my own workings, i always have as highest will over any other specific intent, that the results should be "for the good of all, harm none", or, when the circumstances are truly dire, "for the good of the most with the least harm to the fewest".

Now, as for the specific claims she has made, which i have not seen or heard, it is hearsay reported that once she came to the Hawaiian isles, that the locals were unwilling to accept her as "Pele" for, after all... wouldn't Pele have the same genetics as the "Kanaka Maoli", i.e. the Maori who migrated to the islands, only to find a more fair skinned race already living here... the survivors of Lemuria? Well, i was incarnate during Lemuria, and for me, with access to past life memories, and having learned to quantum-{,dis-}entangle with anything, (except my present body on Gaia), i myself qantum entangle with intent to become various realities:

  • i am the second coming of the Christos (son of God(dess))
  • i am the second coming of the Sophia (daughter of God(dess))
  • i am the embodiment of the Heiros Gamos union of Christos+Sophia
  • i am the Shekinah
  • i am the Goddess
  • i am the Great Creatrix of the entire Universe

...so, it is very appropriate that others should do their best to "become one with" the accessible energy patterns which were embodied by another, or, to become the first embodiment of a given reality. Huh? well, everything can be found in the Akashic Records, (and not all of us need Andrew Bartzis to read them for us). One can access anything from akashic records, e.g. i went to Jesus Christ and asked him if i might share a copy of the akashic records of his [a]scension. This i placed into Kaua'i's Akashic Records Library Crystal

Nevermind what the Shivaists are doing there... in the higher realms of 8D+ this is the Kaua'i Tantra Goddess Temple... which i have created commensurate with my dharma/kuleana as The Kahealani of Kaua'i, the appointed Kahuna who healed all the Heiaus, of which, this is one.

Now, back to our "Mother Goddess Incarnate", may she succeed at enlightenment and [a]scension, and in guiding her followers to those results. Again... The role of the Guru is to guide the chela (student) to find their own connections with their soul and higher realms, not to remain dependent upon "The Guru", i.e. teach them how to catch God, don't catch God for them.

Now there's another matter related to all this... and that being whether an embodied entity (often referred to as a "human"), invokes other entities to posses them, or to channel them, etc.
Double Plus UnGood

As for any cult surrounding our particular example, and/or any overt acts in the physical world by her followers, i am ignorant and choose to remain so, not wishing to "observe", as i'd rather leave all cats quantum where they belong, rather than taking the 0.5 risk of killing any by observing. Of course, it is entirely possible that she is in "spiritual ego", a hazard to both guru and chela. I simply choose to awaken many to related issues, rather than to analyze the specifics here... e.g. may we send her and her followers blessings to receive the divinity they claim!

Faery blessings -- celeste


18:32

Signing the Declaration [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

Something happened this July that got no mention in the Mainstream Media. Something awesome.  Something meaningful.  

President Trump signed onto The Declaration of Independence. 

Now, that probably struck a lot of people as a symbolic gesture, a bit of politicized popular "fluff" akin to all the other red, white, and blue bunting that festoons our nation every July.  

But remember, President Trump's office as The President of the United States of America, exists in International Jurisdiction.  And what do we know about International Jurisdiction?  

First, it is populated entirely by "Persons" --- either "Lawful Persons" known as "People", or "Legal Persons" ---- that is, those who act as elected or appointed officials and officers of corpse-orats, employees of corpse-orats, or dependents thereof, which can include the whole gamut of S-Corps, C-Corps, B-Corps, Statutory Trusts, Foundations, Cooperatives, LLC's, Public Utilities, and so on.  

Secondly, International Jurisdiction is split between land and sea.  The Lawful Persons known as People populate the International Land Jurisdiction.  The Legal Persons inhabit the International Sea Jurisdiction.  The two kinds of "person" operate under different laws. 

So, third, the People operate under "Land Law" known as "Law of the Land" --- think of the Constitutions, while the Legal Persons all operate under the "Law of the Sea". 

And fourth, People can "cross the bar" and operate as Legal Persons; some  Legal Persons can also cross back over the bar and operate as People again. 

Think of a Lawful Person, an American who is serving as one of the People of their State, getting on a Trans-Atlantic steamer and being out on the High Seas. 
While they are on the High Seas, they are under the Law of the Sea, not the Law of the Land. When they arrive in France ten days later, they are now back on land and expected to obey the land law of France. 

So what does our American Tourist have to do with President Trump signing onto The Declaration of Independence?  

As CEO of one of the largest corpse-orats on Earth, Donald Trump spends his days and nights on the figurative High Seas, subject to the Law of the Sea; but, in honor of the Fourth of July, he came ashore and added his "Donald Trump" to a copy of The Declaration of Independence.  

He contractually bound himself to it --- with his life, his fortune, and his sacred honor.  

No other President since the Founding Fathers has done that.  

Take note. 

----------------------------

See this article and over 2600 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

18:26

The Military and the Fourteenth Amendment [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

Someone has suggested that President Trump may use provisions of "the Fourteenth Amendment" to strip Electoral College votes from States engaged in insurrection, and take other measures to clamp down on violent demonstrators and looters.  

Mr. Trump doesn't need the Fourteenth Amendment to take action.  He has a mandate from The United States of America to protect the people and the property of this country.  If he and his advisors are so clueless that they can't or won't act upon that, there is no higher authority.  

We are the civilian government, not the civil government; we are the government that the U.S. Military is supposed to obey.  
Instead, they have been taking their orders from the civil government--- that is, Municipal United States Congress, which is a reckless, unaccountable, foreign international city-state oligarchy, allowed to exist under the provisions of Article I, Section 8, Clause 17.  

Note the discussion yesterday regarding "civilian" versus "civil" government. "Civil" refers to the Municipal Government and the Federal Civil Service.  "Civilian" refers to the States and People, which are now assembled and in Session.  

If our President and our Military are so stupid that they can't figure out that: (1) our government is not always in Session and that things change dramatically when it is, and (2) that "civil" and "civilian" are not the same thing, then it is also a given that they won't recognize the lack of any authority vested in the so-called Fourteenth Amendment, either. 

The Fourteenth Amendment was made to the corporate charter of the Scottish Interloper running "The United States of America, Incorporated" back in 1868. This is a different kind of "constitution" entirely, and a very venal semantic deceit which was used as a means of fraud to gain access to our national credit.  

No "Amendment" to this document from the 14th onward was ever ratified by the States of the Union.  It therefore has no importance to us and is merely an historical internal document of our Subcontractors, who elected to incorporate their own operations under the Scottish Commonwealth Government back in 1868.
 
They went bankrupt in 1906.  That bankruptcy settled in 1953.  Both the Scottish Interloper and its "constitution" are well and truly defunct, and cannot form any basis for or claim any authority whatsoever for anyone, even the employees of Successor organizations which are now working without a contract. 

This entire situation is so completely "madhouse" that it's laughable, if you have an ironic sense of humor.  

We have a military that can't tell the difference between the civilian government which is now in Session and the civil government occupying Washington, DC. 

We have a President, apparently, relying on authority vested in amendments made over a hundred years ago to a defunct Scottish corporation charter--- all without ratification by our States, and therefore invalid then and now, even if that corpse-orat were still in business --- which it is not. 

Oh, what a tangled web we weave, when first we practice to deceive. 

And the yahoos and yokels responsible for this, men like William Tecumseh Sherman, William Henry Seward, Woodrow Wilson, William F. Cody, Colonel Mandell House, Cornelius Vanderbilt and Nelson Rockefeller, thought they were so brilliant and we were all so stupid, that we would never figure it out --- but we have awakened from our slumber and done exactly that. 

All of it.  Down to the fine details. 

The U.S. Military along with all the "presumed" to be "reserve personnel" who supposedly never returned to their birthright political status, either because they were "cashiered" as assets of the State Trusts after the Civil War, or because they "neglected" to inform the heads of their branches of service of their return to their natural political status after their tour of military service, had better get their Thinking Caps on at this late date.  

There is no viable Fourteenth Amendment, no Fifteenth, no Sixteenth, no Seventeenth.... 

There is no basis to claim that there is now or ever has been any such "Amendment" applicable to the actual American Federal Constitution, and no agreed upon alteration to any Territorial Constitution, either; finally, the vast majority of us are not and never have been employed by any such employer and owe no fealty based on any such condition of employment. 

So take it home and take it to the bank.  The Scottish Interloper doing business as "The United States of America, Incorporated" from 1868 to 1906 is dead and gone, and its bankruptcy has been settled since 1953.  

Anything associated with that entity had nothing to do with us and had no authority related to the States and People of this country, and any presumption otherwise is founded on pure British Bunk. 

It was all nothing but self-interested fraud then, and it remains so now. 

The U.S. Military needs to get its proverbial head out of its proverbial butt and needs a good swift kick from the People who have so loyally supported it with so little support in return.  And Mr. Trump needs to realize what the real basis of his authority and power rests upon.  

----------------------------

See this article and over 2600 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

13:54

Amazon Bans Int’l Seed Sales: Problem, Reaction, Famine: Technocrats Take Control of Seeds [ice age farmer]

Throughout human history, people have brought seed of their favorite foods — but no longer. The technocrats are now banning international sales of SEEDS on Amazon/Wish, due to the “dangerous Chinese Mystery Seeds” false flag — even as parts of the US experience seed shortages! This “Problem/Reaction/Famine” dialectic is actively being used in many areas […]

13:50

Farms Blamed for COVID19 – Brucellosis/False Flag? – SB4453 – “Give Up The Farm” [ice age farmer]

Anthony Fauci has published a paper blaming farming and ranching for pandemics, jumping on the UN’s Biodiversity agenda, and setting the stage for new Senate Bill 4453, “Food Supply Protection Act of 2020,” which codifies the Rockefeller Foundation’s takeover of food. After a year of predictive programming about the next deadly pandemic having its genesis […]

10:48

How to Read a Natal Chart With No Birth Time [The Astrology Podcast]

In episode 270 astrologers Chris Brennan and Leisa Schaim discuss which techniques you can use in natal astrology to interpret a birth chart even when you don’t have a birth time. Western astrology has focused very heavily on using timed birth charts since about the 1st century BCE, and there are many techniques in natal […]

09:22

‘Transparently ridiculous’: Elsevier says journal shares critic’s concerns about bizarre genetics paper [Retraction Watch]

Elsevier says it is investigating how one of its journals managed to publish a paper with patently absurd assertions about the genetic inheritance of personality traits. The paper, “Temperament gene inheritance,” appears this month in Meta Gene and was written by authors in Saudi Arabia and Turkey. It states:  On the observation of different people personalities … Continue reading ‘Transparently ridiculous’: Elsevier says journal shares critic’s concerns about bizarre genetics paper

08:11

Hotfix Release of Friendica 2020.07-1 [friendica]

Thanks to Roger Meyer who reported a flaw in the administration module of Friendica, we could fix a security vulnerability that could leak sensitive information from the server environment. The hotfix release 2020.07-1 includes the patch for the stable release branch of Friendica. The development and RC branches have been updated as well.

Affected versions of Friendica

All versions of Friendica since April 2019 (develop branch) and June 2019 (stable) are affected.

Through the admin module environment variables of the server system can be read by anyone on the internet. Among other things this may include database passwords for Docker installs and the memcached SASL password. Therefore we recommend all node admins to change their potentially affected passwords after the upgrade to 2020.07-1. Furthermore this fix also prevents anonymous users to update node-wide addon settings.

How to Upgrade.

This information only applies to the stable release 2020.07 of Friendica. The patch has separately been added to the develop and 2020.09-rc branch of the repository.

Using Git

Important: We are removing the master branch and are using the stable branch instead.

Updating from the git repositories of Friendica will be a bit more complicated as you might be used to as we decided to rename the branch for the stable releases to stable. Hence you need to switch the branch you want to use, after pulling the current version of the code from the repositories. As usual, please remember to update the dependencies with composer as well.

cd friendica
git fetch
git checkout stable
git pull

Pulling in the dependencies with composer is not necessary for this hotfix release.

Using the Archive Files

If you had downloaded the source files in an archive file (tar.gz) please download the current version of the archive (friendica-full-2020.07-1) file and unpack it on your local computer. Compared to the 2020.07 release only a few files were updated and none of the config files are affected. So you can just upload the changed files onto your server.

How to Contribute

If you want to contribute to the project, you don’t need to have coding experience. There are a number of tasks listed in the issue tracker with the label “Junior Jobs” we think are good for new contributors. But you are by no means limited to these – if you find a solution to a problem (even a new one) please make a pull request at github or let us know in the development forum.

Contribution to Friendica is also not limited to coding. Any contribution to the documentation, the translation or advertisement materials is welcome or reporting a problem. You don’t need to deal with Git(Hub) or Transifex if you don’t like to. Just get in touch with us and we will get the materials to the appropriate places.

Thanks again Roger Meyer to make us aware of this problem!

07:58

CloudBEAR RISC-V Processor IP Product Line - Alexander Kozlov, CloudBEAR [RISC-V International]

CloudBEAR RISC-V Processor IP Product Line - Alexander Kozlov, CloudBEAR CloudBEAR's commercial RISC-V processor IP portfolio and feature set are increasing serving growing demands for mature RISC-V solutions. CloudBEAR BM, BR, BI series are covering a wide range of applications from small low-power microcontrollers to high-performance accelerators and Linux capable devices. In this talk, we will give an overview of existing processor solutions and describe newest developed features enriching company's offer.

07:08

Leszczynski: There is something utterly wrong with the ICNIRP membership [BRHP – Between a Rock and a Hard Place]

…this blog has been updated on Sept. 11th… Why opinions in reviews of EMF science written by non-ICNIRP scientists at the request of telecom industry are different/contradictory to reviews of the same science by ICNIRP membership? There is something utterly … Continue reading

04:32

There is No Virus…. David Ike [Paul Stramer - Lincoln County Watch]



See the entire Interview of David Icke on BitChute after it was removed by the YouTube censors.


04:32

CULedger’s MemberPass™ delivers fraud protection for credit unions and their members using Hyperledger Indy [Hyperledger]

How many times have you answered, “What’s your mother’s maiden name?” or named your first pet when setting up a new account? Today, those common knowledge-based authentication questions have become the most vulnerable forms of customer identification as financial institutions are being increasingly hit by fraudsters in the call center.

CULedger, a credit union service organization (CUSO) that began when a group of credit unions came together in 2016 as a direct response to the increasing threat of fraud, took up the challenge of improving the member identity authentication process across all delivery channels. CULedger was formed specifically to bring a decentralized identity solution product for credit unions to market. Hence MemberPass™—a digital identity credential held by credit union members that protects credit unions and their members from identity theft and fraud in all financial interactions, from call center authentication to lending to opening new accounts—was born.

CULedger worked with decentralized identity organization, Evernym, to build MemberPass™ (formerly called MyCUID) with Hyperledger Indy—a distributed ledger software project that is interoperable with other blockchains or can be used on its own to power the decentralization of identity. With Hyperledger Indy at its core, MemberPass™ serves as a permanent and portable digital identity that reduces member friction and injects more trust in digital interactions within credit unions.

During a pilot program with three credit unions in 2019, initial results for MemberPass™ were promising. Whereas authentication in the call center could take anywhere from 90 to 120 seconds—or sometimes even up to five minutes depending on the transaction—MemberPass™ reduced that process down to 15 seconds or less.

There are now thousands of MemberPass™ credentials in live production, with the expectation that number will grow year after year as the focus shifts to scaling and evolving the network. Credit unions recognized the advantages of MemberPass™ from the get-go and are looking to get more of their members using the digital identity credential. One participating credit union is working with CULedger on a strategy for issuing new MemberPass™ accounts inside its branch locations as part of their new member onboarding process. Other credit unions have expressed interest in implementing MemberPass™ in its Internet banking channel and its mobile banking channel. More use cases are being defined as more credit unions begin to understand the power of this privacy-enhancing technology.

Hyperledger teamed up with CULedger to capture the details behind the launch of MemberPass™ as well as steps that are underway to grow adoption and interoperability. Find out more in the full case study.

The post CULedger’s MemberPass™ delivers fraud protection for credit unions and their members using Hyperledger Indy appeared first on Hyperledger.

00:00

COVID-19 arrived on a meteorite, claims Elsevier book chapter [Retraction Watch]

If bats and pangolins could review scientific papers, they’d definitely have given the following article an “accept without revisions.”  An international group of researchers has proposed that COVID-19 hitched a ride to this planet from space. Same for the fungal infection Candida auris.  We’ve heard plenty of bizarre theories about the novel coronavirus behind the … Continue reading COVID-19 arrived on a meteorite, claims Elsevier book chapter

2020-09-07

23:40

How To Make Your Own Toxin Free Cleaning Products [The Permaculture Research Institute]

The average household cleaning agents, such as your dish soap, your laundry detergent, your toilet cleaning agents and even your body wash and shampoo often contain chemicals that are harmful to you and your environment.  Although there is an increasing number of biodegradable and toxic-free choices, these usually still come in plastic containers that add …

The post How To Make Your Own Toxin Free Cleaning Products appeared first on The Permaculture Research Institute.

21:37

Deceiver and the Deceived [Time Shift Blog - Energetic Synthesis]

In the age of social media and rampant propaganda, most of the public has been groomed to be unable to separate honest and truthful representations from manufactured deceptions and lies.  For deception to work both sides have to participate, both deceiver and deceived have to play their roles. How do we wise up to see the lies, the spiritual betrayal, the reality distortions, the energy blocks and dark force attachments that are part of being deceived?  Within each of us resides the core inner spirit that gives us direct access to the honest truth. We all have the ability to clear out the false ego identities, shift out the many layers of false beliefs and Banish the Lies that have concealed the truth. As we face the layers of falsity, which have generated energy blockages and spread darkness into our minds and bodies, we bring the truth into our present awareness. By allowing ourselves to see the truth of what has caused this inner pain, we ultimately experience mental, emotional and spiritual freedom.

The now presence is connected to our deepest spiritual essence, which emanates the light throughout our consciousness layers. The presence of truth in the light releases the pain that was created by the darkness, effectively Banishing the Lies that have produced the suffering and torment.  Many of us have been seduced by the mainstream propaganda and the gaslighting used to sell these lies, and the world population has been buying them in every shape and size. This death culture version of 3D reality that is being sold to us is a sham, it is a lie rigged with psychological and emotional manipulation to keep humanity in spiritual bondage, through the repetition of the previous time cycles that began the NAA invasion, bringing on global human suffering and blood sacrifice. This phase of the time cycle leads into the 9-11 Timeline programs of the Armageddon software, where the satanic controllers attempt to leverage collective human pain and suffering in so to generate future events that manifest even more pain and suffering. It is obvious the Controllers are panicking as they lose ground and have called upon every deep state asset they have in order to wreak devastation, dehumanization and totalitarian objectives upon the global population.

On the path to liberation, in order to find true happiness and freedom we must see through the mass confusion and deceptions that are used to manipulate us in this world, effectively Banishing the Lies. To discover and find the truth, we must apply great effort to be fully engaged in our present moment awareness and dedicate ourselves to the path of truth seeking. In these tumultuous and transformative times, we must confront the lies and challenge those well-supported and well-funded beings, who intend to spread these lies even further in order to create harm. The Controllers intend to destroy human spiritual potential, and desire to fill this world with even more internal and external oppression, tyranny, destruction and darkness. Each of us must dedicate ourselves to find our highest expression while cultivating the deepest compassion, empathy and wisdom gained from our own direct experiences, so that we may be the example of living in harmony and alignment with the higher truth of the reality. We do not need to project holiness or perfection from preconceived notions, all that is required is that we have positive intentions and that we are committed to be completely honest, caring and kind with ourselves and with others. We do our best to speak truthfully, to represent and express our authentic selves, showing how we really feel and imbuing this deeper meaning into our communications and words. We make the choice to Banish the Lies from wrongly influencing our emotions and directing our motivations, perceptions, behaviors and actions, we align our consent and choose now to really know the whole truth.

Our individual ability to separate fact from fiction, to discern the difference between truth and lies embedded in the information that we are being exposed to through many different mediums, is undergoing an unprecedented threat. Human beings have been intentionally targeted at the subconscious layers to limit social intelligence with lower ego programming, that produces learned helplessness and blind reliance upon the falsity that powers up many of the 3D control structures.  When people are being repeatedly saturated in what appears to be random negative stimuli in the external, this translates into emotionally raw survival consciousness, the sensation in one’s life of constantly navigating through an onslaught of perceived and real threats. The unstable and harsh environment is designed to threaten both conscious and unconscious perceptions of personal security, which further cloud a person’s vision while travelling within a distorted version of reality.

This distortion in perception leads many to look towards things in the outer world to use as an escape mechanism.  The majority are either handing power over to the controller structures in exchange for a false sense of personal security or giving up in an overwhelmed and exhausted apathy. In the Art of War, spreading misleading information laced with blatant lies, using gaslighting combined with ‘overwhelm and wear down’ tactics are masterfully employed by those seeking to maintain their powerful influence over those vulnerable to exploitation.  

Cultivation of Gullibility

Thus, the intended goal of social engineering is to exploit the subconscious and to shift emotional and financial dependence onto those who have accumulated the most wealth and power. This makes them the dominant authorities with full control over allocating all resources available in this world, while creating many different subclasses of marginalized and oppressed people. Those that are poverty stricken and feel socially excluded are especially vulnerable to emotional exploitation, keeping them polarized on insignificant topics, and feeding into the promotion of lies due to the intentional cultivation of gullibility.

Until we have developed the capacity to profoundly know ourselves it is difficult to see the deeper and hidden motivations of others. When we lack self-awareness along with social awareness, it makes us much more gullible to others deceptions. Gullibility makes us pliable to reality hijack, believing the deceptions and lies that we have been told by those we perceive as an authority, with the covert agenda to hold onto the most wealth and power possible, at any cost. No one can remain unbiased when they can be bought and sold for a price. This lack of awareness about the nature of this 3D reality, further leads us into becoming cogs in divisive and harmful agendas, becoming the proponents that are being mind controlled to actually support the Controllers nefarious plans.

In the current terrain of masterful deceptions and lies being propagated by those desperate to hang onto the status quo and global power, the issue of gullibility in the masses is being heightened and exploited. It is the tendency to automatically believe that imposters and actors are telling us the truth at face value, that makes us easily persuaded into believing something that is entirely false. Many unethical and traumatized people on the world stage are addicted to power, and continue to role play a manufactured persona. However, it is the Live Action Role Player’s or LARP’s that are being used by the NAA-Controllers to reinforce our 3D belief systems or worldview by feeding us lies. Many people tend to believe these actors on the world stage as telling the truth or being trustworthy, irrespective of the long list of facts and hard evidence to the contrary. Most people are refusing to dig deeper into hard topics and ask the difficult questions that challenge their belief systems, following through to investigate the larger picture that connects all of the pieces in this vast puzzle.

Yet, this dedication to finding the truth within the taboo and hard topics is exactly what is needed, now more than ever.

The Controllers are master manipulators that scope out the emotional characteristics and hidden subconscious desires in order to exploit the known vulnerabilities in their victims, through the spreading of vicious lies that are presented as facts. Tyrannical despots and authoritarian globalist leaders hide behind the strawman faces of a puppet-democracy, when they actually seek to simultaneously destroy its core humanitarian principles. By collecting massive amounts of personal data to profile their global audience, they are using surveillance along with a host of masterful deceptions to exploit the public emotionally. As difficult as it may be, we have to actually see that through targeted mind control, they have been successful in manipulating many people to believe outright lies. Their goal is to continually distract by inciting violence and destructive conflicts within high profile interest groups, influencing gullibility in the masses. From behind the scenes they polarize and confuse, shaping narratives to assign their blame upon those groups of people who they see as threats, and who remain faultless in those specific issues. Directing disinformation as its reported through the mainstream media, prompts even more divide and conquer tactics to incite anger and sow hatred among the vulnerable populations. This is psychological warfare plain and simple, much of which is based upon the spreading of lies and deliberate disinformation to keep the public massively confused and warring with each other.

The imperative of these times is to be willing to open compassionate dialogues on challenging topics, to commit to be mentally flexible in order to seek the higher truth in the matter, and to do the research that backs up one’s own opinions, whether or not it is popular or profitable. To sincerely seek the truth and put forth the effort to find it, is the only way to gain the clarity that is required to discern the many harmful agendas at play, finding the hidden motivations behind the intentional spreading of disinformation and lies. When we perceive the motivations behind the inverted façade, we can ask to seek the larger truth that is found in who or what actually benefits from those lies, and then we can begin to see what cost these lies actually extract from the human race.

Deceiver and the Deceived

Deceptions and lying are a form of communication that involves mutual parties. There are those that are acting as the deceiver imparting the false information, generally with a hidden agenda, and those receiving that information as factual, which is really a lie being processed into a distorted belief by those that are being deceived. Generally, in these complex deceptions there are power imbalances where a supposed authority, that has more power or money, is carrying out the deception in order to have a strategic advantage over those that they are deceiving. The deceiver intends to communicate false impressions or disinformation to those perceived as gullible, naïve or vulnerable, so they will base their future actions or decisions on it.

It is important to understand that the spreading of deceptions and lies involves both sides of the deceiver and deceived, both must participate in the lie in order to bring it into manifestation. The Controllers require the deceived to hand over their consent to the lies, in order to continue to perpetrate their fraud against the public, committing mass deceptions and directing mind control programming.

For those of us that have been deceived and manipulated by many liars, it becomes critical to awaken and comprehend our personal role in promoting the lies any further, and to make a concerted effort to elevate our behavior. Whether it was through our ignorance of that fact when it was revealed to be a lie, or through emotionally reacting to that information with ego defense mechanisms, like confirmation bias or learned helplessness. We choose consciously to do our best to avoid lying and spreading misinformation in the future.

All of us have been lied to and deceived in this upside-down world in order to be exploited for consciousness slavery by human and non-human controllers. When we are able to recognize and acknowledge that this has happened to all of us on the earth, and that it is happening right now, it is a major stage of spiritual awakening and ultimately what is needed to reach critical mass in disclosure. In order to reach critical mass, we also must recognize and accept our participation in the grand deception and lies, known or unknown to us. Recognizing we have believed the disinformation we have been told by those around us, and that we have lived upon a planet in a war over consciousness that was intentionally hidden from us, which involved calculated exploitation and covert technological mind control.

We cannot ignore the pile of lies upon lies around us anymore. Collectively there is a radical push piercing the veil through the astral walls of black magic that have been filled with spells of deception. As we banish the lies from our lives, we shatter the prettily packaged illusions and the content rises up to the surface consciousness, where we can finally see the larger pieces of truth. We stop participating in the rewarding of liars and punishing of those people that are actually being honest. The truth of disclosure lives inside all of us now, and it is in what you can finally perceive as the nature of reality that is actually the honest truth. Be the example of speaking and living in truth, no matter how hard it is to be on the front lines of human global awakening, for we are the ones we’ve been waiting for.

(Source: ES News -Banishing the Lies)

14:21

2020-09-08.fae [crystalfaeries]

2020-09-08 MarsDay's numerology:
        21 Universe
         3 Empress
Inner will, motivation: Synthesis,
        crystalization, unity success
Sep 08  11:48 HST Moonset
Sep 08  23:06 HST Moonrise

First of all, be aware, that all of these "laws" (which are not laws but commercial statutes), apply only to those of you still contracted with one or more "commercial mind controllers", i.e. what you call "govern-ment(al)", and they're doing a great job of getting all the sheeple to identify themselves as "the dead", so that when they enslave or terminate your body, they won't get negative karma, because you "voluntarily consented" to be a "U.S. Citizen" in commerce, rather than a sovereign living soul.
These "authorities" are comitting Treason, for which the appropriate response is: "hanging by the neck until expired&quot.
From the video: Confirmed-COVid-19_PLANdemic_a_known_LIVE_training_simulation_EXERCISE_under_WHO














































Now, with all those bridges under the water... can we find any positive side to all of this?
The only imaginable "thing" which all of this could be preparation for, is that, if and when, we open up our planet to overt Extra-Ter-Ra-estials running amok, we will then get to deal with any of their biologicals they bring with them...

Faery blessings -- celeste


13:18

Reconstruction 101 [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

Our nation is faced with reconstructing our government a hundred and fifty years after that task was supposed to be done. Talk about procrastinators, or, talk about being left in the dark by those who profited. Either way, it still has to be done and that is what we are engaged in.
So what is Reconstruction about, and what does it require, and where do we start? What are the conditions we were left with, coming out of the Civil War?
This conversation is being re-posted from a private discussion as I try to unravel the situation for people in Oregon, but the same exact conditions apply to people living in any State of the Union that was a State prior to 1861 ---- so listen up, folks. This is Reconstruction 101.
------
"The argument as you perceptively point out the crux --- is the effect of the Repatriation Act and where that left us, and the continuing operation of the Territorial State of State in Oregon instead of the American State of State Government we intended, which was rolled over and became inoperable because the Reconstruction was never finished.
You have a multitude of business entities operating on two separate levels.
You have the Federation of States and the Confederation of their States of State in operation from 1781 to 1861. [That's our intact original American Government.]
The Confederation operated the States of America, also called the "Federal Republic" or simply, the "Federal Government" during those same years.
When the Confederation broke apart into North and South factions, the States of America, our part of the Federal Government, was left without quorum and could no longer function, either.
Those portions of our Original and Federal Governments both disappeared--- the Confederation and the States of America (Federal Republic) the Confederation operated --- both had to be "Reconstructed" and neither one have been.
Since the Confederation was inoperable without reconstruction, the members of the Confederation were not operable, either. The members of the Confederation were the original American States of States, like The State of Oregon.
The property, assets, and interests of The State of Oregon were rolled over into the Oregon State [Land Trust] and the "new" substituted Territorial State of State came in to do business for Oregon as an "emergency measure".
It was at this time that all the States of the Union prior to 1860 were compelled to create new State of State Constitutions in order to create a contract between their State [e.g., Oregon] and the Territorial State of State organization [the State of Oregon] being substituted for the original American entity doing business as The State of Oregon.
The history of this is the same in every State that was a State prior to the Civil War.
Same exact process, same exact nomenclature.
So let's go back to the Repatriation Act. What were these men "repatriating" to?
As they were all mustered out of the State of State members of the Confederation and not the actual States of Union, they were "repatriated" back to where they came from.
But the Confederation was gone. There was no "place" for these men to return to.
Wrap your minds around this. All the Muster Lists from the Civil War were compiled by the original American States of State organizations.
They came from The State of New York and The State of Ohio and The State of North Carolina ---- which were all rolled into State Trusts after the war purportedly "ended" ---- "New York State" and "Ohio State" and so on, replaced the original State of State organizations. So all these men who were repatriated after the Civil War became State Trust Assets and Wards of the State.
They were rolled into the State Trusts. They were left in limbo until such time as the Reconstruction happened.
Why? Because you can't get from Wisconsin to South Dakota without passing through Minnesota.
You can't get from The State of Wisconsin to Wisconsin (until or unless the Reconstruction takes effect) without passing through the Wisconsin State (Trust).
Those of us who didn't fight in the war were not "repatriated" in this fashion, and remained free to operate our States of the Union, but approximately nine million Americans were "cashiered" by the Repatriation Act. And they and their descendants have been identified as Wards of the State of State ever since.
All "pending Reconstruction" which we, the only ones who could do it, didn't know about. We thought it had already been done.
So here we are at this late date. People are still milling around, confused. Hardly anyone realizes just how complex and nasty all this is, even among those who know that the Reconstruction is still hanging.
What has to happen? Those who can do so, have to rebuild the States (Oregon) and then "reconstruct" The State of Oregon and collapse the Oregon State Trust and replace "the" Territorial State of Oregon.
At the same time, as the States reconstruct their own State of State organization, e.g., The State of Oregon, these entities have to repopulate the Confederation and begin operating the States of America organization that was responsible for the Federal Republic under The Constitution for the united States of America.
The States of America, our American part of the Federal Government, was a Subcontractor of the Confederation.
So in order to reconstruct the Federal Government, we also have to reconstruct the Confederation, and in order to reconstruct the Confederation, we have to first assemble the States of the Union.
Which is what we are doing now.
States reconstruct The States of States, The States of States repopulate the Confederation, the Confederation reboots the States of America, and the States of America acts as Comptroller of the Federal Government.
It is the lack of this Comptroller position that has led to the many problems we have, so we should all be Highly Motivated to get our ducks in order without further ado.

----------------------------

See this article and over 2600 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

09:20

Legalized Slave Ownership [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

All these years I've sat and watched the show like everyone else.  I didn't believe it, and in that, I may be exceptional.  It appears that a great many Americans just watched the Boob Tube and accepted, pretty much at face value, whatever Walter Cronkite or some other Talking Head reported to them. 

Why?  Because Americans are basically honest people and we formed an honest government, and it simply wasn't known how profoundly changed and corrupted our original government had become during the administration of Ulysses S. Grant.    

Millions of Americans educated in the public school system will tell you that they never had an inkling.  They didn't know and weren't told that the Reconstruction was never finished.  They didn't know and weren't told that the three branches of the Federal Government were originally Federal, Territorial, and Municipal.  

Most importantly, they were never told that they were living in the middle of a continuing Mercenary "War" that was promulgated by their Federal Employees and the Subcontracting Agencies. 

When you step back from it, and look at the roots of it, it becomes apparent that the root of the evil is slavery ---- but not slavery in the sense we are taught to think about it now.  

We have been conditioned to think about slavery in terms of black and white, or brown and white, and not in terms of what slavery actually is.  Slavery is not based on race.  It's based on commandeering free will and labor by force or feigned legality --and then using the victim to profit oneself.  

Peonage, or "indentured servitude", is a lesser form of this same evil.  

And despite varying levels of awareness over the past 160 years, these issues were also assumed to be dead and gone and settled --- and really never were. 

It is apparent in retrospect that although private slave ownership was outlawed in this country as a result of the Civil War, public sector slave ownership was allowed, and it secretively expanded its reach decade after decade. 

In the "US Government System" it is crystal clear that Territorial Employees are serving in the military as indentured public servants for the period of years comprising their Tour of Duty, and that during that time, they have no constitutional or other rights, other than what is provided by the Code of Military Justice.  

And Municipal Employees in the Federal Civil Service are slaves.  It may be that they are treated pretty well by their masters most of the time, but they are still slaves, bought and sold and traded as commodities using FDR's infamous "Clearinghouse Certificates".  

Here is the definition of "Clearinghouse Certificates" as published by the St. Louis Federal Reserve Bank: 

"Clearing House Loan Certificates are instruments which represent temporary loans made by the banks banded together as a Clearing House Association, to the individual members of such association, upon collateral acceptable to a Committee of bankers appointed for the purpose of passing on and holding such collateral."

The "temporary" part is your lifetime. 

Given FDR's statements made in his First Inaugural Address about "clearinghouse certificates" and the definition above, it is grossly apparent that he sold the Federal Civil Service Employees into slavery as commodities subject to the banks -- used them and their assets and their labor as collateral to borrow against, without their knowledge or consent.  

And then, FDR just "conferred" this same Municipal citizenship on everyone else that he could entrap, either by bullying us to get a Social Security Number and lying to us and saying that we "had to have a social security account" in order to work in this country (only true if you are a foreigner or working for the Federal Government), or any other of a galaxy of adhesion contracts designed to do the same thing: provide them an excuse to claim that you, too, were a Federal Employee or Dependent. 

 And therefore, another slave.  More collateral to back their debts.  

This is what the great Democratic Party has done for black and whites alike. 

Slavery, sin taxes, regulation of controlled substances, and entertainment industries are where they get the largest portion of their money.  They were granted regulatory power over alcohol, tobacco and firearms, but they have since attempted to define a great many other things as "controlled substances" with more or less success.  Marijuana is one obvious example.  

As I write, they are trying to grab more and more "regulatory control" over other goods and commodities, and may soon impose rationing systems, even though they and their policies are what have caused there to be shortages of things like toilet paper in this country.   They have struggled for years to maintain control of over the counter drugs and vitamins and herbal remedies to better profit their own investments in pharmaceuticals. 

And now they are trying a new enslavement rationale. 

The U.S. Patent laws have allowed them to patent pieces of genetically engineered DNA and RNA for profit, so they have done so.  Now they seek to implant some of their genetically engineered RNA into your natural genome, and claim that you are a "genetically modified product" created by and belonging to them. 

They want to make you and your children into a sterile "GMO product" just like a brand of Monsanto's corn. 

Two birds with one stone and one vaccination: claim ownership of you and all the assets that are naturally yours, plus sterilize a large percentage of the population and thereby reduce the number of people per their Agenda.  

And as you can see, they don't spend a lot on their slaves.  They keep them hungry and feed them lies, to keep themselves in political power.  

Despicable, diabolical Democrats.  And a lot of equally Reprehensible Republicans. 

Unless we all wake up and get organized and push back like steers in a stampede, this is the future planned for you by all these politicians claiming to care so much for the poor---- while enslaving and depriving the poor. 

No doubt you missed it, but Brazil gave its people so much money during the pandemic nonsense, that they accidentally empowered their whole country.  Their economy is booming.  They can afford to preserve the Rain Forest -- whether or not they can be persuaded to do so.  Nobody is going hungry in Brazil anymore. 

And how has this miracle been achieved?  

Someone woke up and realized that "money" is like corn being fed to rats in a maze.  Do what the Masters want, and you get a kernel as a reward.  Make two correct turns in the maze and you get more kernels.  But what happens when the rats figure this out, and seize hold of their own monetary system?

So long as you distribute the "corn" in a careful but liberal fashion, much as you use fertilizer to feed plants, and avoid applying too much, everything blooms. 

And there is no need for slavery or slave masters any more.  

The ultimate end to slavery lies in two things: (1) appropriate punishment for those who are seeking to enslave others by any means, using any excuse; (2) proper control of the monetary system so that slavery is no longer profitable, and such abuses as "clearinghouse certificates" --- that is, birth certificates --- are a thing of the past. 

----------------------------

See this article and over 2600 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

07:39

Keep the Electoral College [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

Keep the Electoral College. Here's why-- I am reposting this anonymous run down:
There are 3,141 counties in the United States.
- Trump won 3,084 of them.
- Clinton won 57.
There are 62 counties in New York State
- Trump won 46 of them.
- Clinton won 16
Clinton won the popular vote by approximately 1.5 million votes.
- In the 5 counties that encompass NYC, (Bronx, Brooklyn, Manhattan, Richmond & Queens) Clinton received well over 2 million more votes than Trump (Trump won Richmond, Clinton won the other 4 of these counties)

- Therefore these 5 counties alone, more than accounted for Clinton winning the popular vote of the entire country.
These 5 counties comprise only 319 square miles.

The United States comprises 3,797,000 square miles. When you have a country that encompasses almost 4 million square miles of territory, it would be ludicrous to suggest that the vote of those who inhabit a mere 319 square miles should dictate the outcome of a national election.
Large, densely populated Democrat cities (NYC, Chicago,
LA, etc .) DO NOT and SHOULD NOT speak for all of the rest of our country! And it has been verified and documented that those 319 square miles foment the majority of our nation's problems.

----------------------------

See this article and over 2600 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

07:34

I KILLED the VIRUS in HAWAII! [Jin Laihook]

I made the video for Hawaii. Second (Crime) Wave. Second (Air) Wave. If you wear your masks and stay home, how can you go back to normal when there's no business to go back to? A brainwashed person says- "Because of the lockdown, Corona killed less people". Then why are cold and Flu numbers same as last year? Puppets everywhere...It's not that I'm wrong, it's that you can't bare to live in a world where I'm right. Today The Corrupt Hawaii State Government was happy to have 3000+ people line up for Covid tests. The live video I tried repeatedly to upload this morning would have hindered them. The Lying Hawaii State Government is Happy to have 3000+ guinea pigs to boost false positive Covid numbers into the 100's in order to scare you with their lock down propaganda. The truth is, they are purposefully collapsing the economy and releasing criminals to destroy Hawaii. Why? Because their fake North Korea ( CIA ) Missile failed in 2018. Finally figured out a way to upload my banned video. This is a tit for tat information war and soon we will take it to the next level. Be ready to take a stand Hawaii. We may have to over throw this corrupt government and drag IGE, Zuckerburg and Caldwell out by their collars before they can escape in their choppers. Be ready, food shortage (and possible GAS shortage) planned next. They are giving Walmart and Target workers Covid to shut down our last options for food. You thought toilet paper was bad. Wait till you have no food. Stand up and organize now before it's too late. If you want to help, you can sign this petition- https://www.ipetitions.com/petition/hawaii-covid-19-audit?utm_source=facebook&utm_medium=social&utm_campaign=&quote_id=quote4&title_id=title1&recruiter=16298943&loc=view-petition

07:27

Support for Trump? [Paul Stramer - Lincoln County Watch]

 

By Anna Von Reitz

When hateful personalized gossip comes out of the mouths of grown men and women, I find it appalling.  Grown people should know better, have deeper insights and concerns, and be less judgmental about superficial things. 

Who cares what color Donald Trump's hair is?  George Washington wore a wig.  And it was powdered white.  Am I supposed to get up and dance?  

I keep my eye on the ball, on the things that matter, the things that make life better or worse for us all, the meat and potatoes, the bacon delivered for all Americans --- not just "some" Americans, who like the Pigs in the story Animal Farm, want to be "more equal" than others. 

I keep track of events, so I know who caused the problems. 

Trump provided more living wage jobs for Blacks, Hispanics, and Orientals than any other President ever has, picked millions of folks up out of hopeless welfare dependency and offered them a future. 

How many are smart enough to "get it" and vote accordingly? 
 
Let's start with Day One --- the non-existent Russian Collusion.  Turns out the only collusion was the collusion of Hillary Clinton and Harry Reid to sell 20% of our Uranium to the Russians. 

To me, that's treason.  To me, that's a hanging offense. 

And yet another example of diabolic reasoning ---- blame your opponent for what you are doing yourself.  I think it is pretty clear who has been colluding with the Russians in real life and projecting their own guilt on Donald Trump. 

Oh, and let's just forget the gross influence peddling and profiteering of Joe and Hunter Biden in Ukraine, along with the similar trough-sucking of Nancy Pelosi, Adam Schiff, and yes, Mitt Romney, a corrupt high-level Republican caught with his hands in the cookie jar.  We know why he's a Never Trumper.

Speaking of hair-dos and phonies, how about Wear Your Mask Pelosi?  

Or Pocohontas Warren, pretending to be a Native American?  

I'm sorry.  I have zero respect for hypocrites and for people who can't admit who they are.  I don't trust either species of Swamp Creature.  

Just think about the sanctimonious rants of Nancy Pelosi about wearing masks and shutting down businesses.  Ever see a mask on her face?  How many of her businesses shut down? 

And now, Black Lives Matter, but billions of dollars of damage to public buildings and private businesses do not?  How many people have been murdered now by these thugs roaming our streets in Democrat "controlled" cities?  

Those Democrat Governors and Mayors are 100% commercially and personally liable for not calling in assistance to quell the violence and looting. They failed Job One for any government ---- protecting the people and their property.  

I can easily understand now, how the majority of Democratic Party presidential candidates in the first debate, led with stories about how they failed at everything.  Some of them, by their own count, failed multiple careers before becoming Democratic Candidates for the Office of President of the United States. 

No wonder the Municipal Government is flat as a pancake bankrupt. 

They had me thinking, gee, all I have to do is go out and fail as a car wash attendant, as a restaurant manager, and tank a small business or two, and I, too, can qualify to run this country.  

By my count, they fielded one credible candidate, a mature woman of color, who answered every question succinctly and wisely, with poise and honesty --- but they panned over her name at an oblique camera angle so you couldn't read it.  

Par for the course.  The cream isn't what rises to the top. 

Compared to the Zombie Duo Dream Team, Donald Trump is a towering intellect, and that rarest thing in American politics---- a man who keeps his word. 

Go figure, Jethro. Naught into naught is naught, naught plus naught is naught, naught multiplied by naught is naught....

----------------------------

See this article and over 2600 others on Anna's website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website. 

How do we use your donations?  Find out here.

04:40

Fraudulent Votes Have Already Been Cast [Paul Stramer - Lincoln County Watch]

 

Do any of your friends or nieghbors think voting by mail is safe and secure?

Have they bought the media line that fraud is impossible because of all the so-called safeguards?

Have them read this article in the New York Post, in which a Democrat operative describes how he exploited the weakness of voting by mail to destroy Republican ballots while casting fraudulent Democrat votes.

Click here to read the article on NYPost.com.

https://nypost.com/2020/08/29/political-insider-explains-voter-fraud-with-mail-in-ballots/

04:28

Waning Trine Moon in Taurus: The Twig Is Bent [Rising Moon Astrology]

Today at noon (EDT) we reach the waning trine between Sun and Moon that, this time, is more. Today we have a grand trine in Earth, with Sun @15 Virgo, Moon @15 Taurus and Jupiter @17 Capricorn.

This grand trine is really a kite aspect with Neptune @19 Pisces. Trines are ease, supporting what we’re already doing. This one adds a touch of magic.

The Taurus Moon (one of my favorites for its calm steadiness and focus on comfort) has magic too, having just passed a conjunction with Uranus.

We’re entering autumn in the northern hemisphere, time of harvests and endings, yet Uranus reminds us the pulse of the Earth keeps beating. In the midst of challenge and loss, cycles of new growth are already seeded. Cycles of change, especially.

Venus, ruling the Taurus Moon, has just entered Leo and sextiles Mercury in Libra. From deep wells of the heart, we connect to our passion and act from there.

This is not an easy time. Mars slows to station Rx, moving back into squares with Saturn, Pluto, and Jupiter. These hard aspects signal the tough choices that face us.

The Taurus Moon knows this is a long game. We have the power to shape at least some of what happens, power beyond what we might believe. Taurus is a gardener and caretaker.

As the twig is bent, so grows the tree. How are we bending these days? What structures are we creating for our futures to grow into?

We have more power as individuals and communities than we may think. Today we notice where our impulses, passions, and actions are focused.

If we see good, worthy patterns, we support them. The aspects bring ease.

If change is needed, we can gently but firmly lean another way. This too is possible today. Create your best future with thoughtful, real steps.


Image adapted from Simon Berger
https://unsplash.com/photos/Qa2tSHWgh84

Feeds

FeedRSSLast fetchedNext fetched after
XML 2020-09-14 23:35 2020-09-15 02:35
XML 2020-09-14 23:35 2020-09-15 02:35
13:20 FREQUENCY SHIFT XML 2020-09-14 23:35 2020-09-15 02:35
Absinthes.com Blog XML 2020-09-14 23:35 2020-09-15 02:35
All-Natural XML 2020-09-14 23:35 2020-09-15 02:35
Astrology News Service XML 2020-09-14 23:35 2020-09-15 02:35
Bioethika Oils – Sacred Medicine Sanctuary XML 2020-09-14 23:35 2020-09-15 02:35
blackMORE Ops XML 2020-09-14 23:35 2020-09-15 02:35
Blog – Machine Intelligence Research Institute XML 2020-09-14 23:35 2020-09-15 02:35
BRHP – Between a Rock and a Hard Place XML 2020-09-14 23:35 2020-09-15 02:35
camen design · audio XML 2020-09-14 23:35 2020-09-15 02:35
camen design · code XML 2020-09-14 23:35 2020-09-15 02:35
Cassiopaea XML 2020-09-14 23:35 2020-09-15 02:35
Celeste XML 2020-09-14 18:35 2020-09-15 06:35
Clay & Iron XML 2020-09-14 23:35 2020-09-15 02:35
Cosmic Convergence: 2012 and Beyond XML 2020-09-14 23:35 2020-09-15 02:35
crystalfaeries XML 2020-09-14 23:35 2020-09-15 00:35
D. Gary Young XML 2020-09-14 23:35 2020-09-15 02:35
David Revoy - Webcomics XML 2020-09-14 23:35 2020-09-15 02:35
Debian News XML 2020-09-14 18:35 2020-09-15 06:35
Debian Project News XML 2020-09-14 18:35 2020-09-15 06:35
Dedoimedo RSS XML 2020-09-14 23:35 2020-09-15 02:35
Defective by Design blogs XML 2020-09-14 23:35 2020-09-15 02:35
DMZ Hawai'i / Aloha 'Aina XML 2020-09-14 23:35 2020-09-15 02:35
DuckDuckGo Blog XML 2020-09-14 23:35 2020-09-15 02:35
EarthStarTV XML 2020-09-14 23:35 2020-09-15 05:35
efairies.com: Latest News XML 2020-09-14 18:35 2020-09-15 06:35
efairies.com: New Products XML 2020-09-14 18:35 2020-09-15 06:35
efairies.com: Popular Products XML 2020-09-14 18:35 2020-09-15 06:35
EMR Australia - Blog XML 2020-09-14 18:35 2020-09-15 06:35
EMR Australia - News XML 2020-09-14 18:35 2020-09-15 06:35
Energetic Synthesis Podcast XML 2020-09-14 18:35 2020-09-15 06:35
EnergeticSynthesis XML 2020-09-14 23:35 2020-09-15 05:35
Energy Research Journal XML 2020-09-14 23:35 2020-09-15 02:35
FAE Magazine ® XML 2020-09-14 23:35 2020-09-15 02:35
Felicia Alongi Cowden XML 2020-09-14 23:35 2020-09-15 05:35
FOSSi Foundation XML 2020-09-14 23:35 2020-09-15 02:35
Free The Seed! Podcast – Open Source Seed Initiative XML 2020-09-14 23:35 2020-09-15 02:35
Freedom Decrypted XML 2020-09-14 23:35 2020-09-15 02:35
friendica XML 2020-09-14 23:35 2020-09-15 02:35
full-text diary XML 2020-09-14 23:35 2020-09-15 02:35
Gigi Young XML 2020-09-14 23:35 2020-09-15 02:35
GNU Parallel - News XML 2020-09-14 18:35 2020-09-15 06:35
Hawaii Assembly - Hawaii Jural Assembly XML 2020-09-14 23:35 2020-09-15 02:35
Her Breath XML 2020-09-14 23:35 2020-09-15 02:35
Home - Energetic Synthesis XML 2020-09-14 18:35 2020-09-15 06:35
https://dabux.org/home?format=rss XML 2020-09-14 23:35 2020-09-15 02:35
Hypergrid Business XML 2020-09-14 23:35 2020-09-15 02:35
Hyperledger XML 2020-09-14 23:35 2020-09-15 02:35
ice age farmer XML 2020-09-14 23:35 2020-09-15 02:35
iLibrarian – OEDB.org XML 2020-09-14 23:35 2020-09-15 02:35
Invest In Blockchain XML 2020-09-14 23:35 2020-09-15 02:35
Jami XML 2020-09-14 23:35 2020-09-15 02:35
Jin Laihook XML 2020-09-14 23:35 2020-09-15 05:35
Kathy Zavada - Topic XML 2020-09-14 21:35 2020-09-15 03:35
Kauai Juice Co - News XML 2020-09-14 23:35 2020-09-15 02:35
Kelley Hunter | Depth Astrology XML 2020-09-14 23:35 2020-09-15 02:35
Linux Headlines XML 2020-09-14 23:35 2020-09-15 02:35
Linux.org XML 2020-09-14 23:35 2020-09-15 02:35
Lokahi Path XML 2020-09-14 23:35 2020-09-15 05:35
lpg-c XML 2020-09-14 23:35 2020-09-15 02:35
LSL Script Library and Database XML 2020-09-14 23:35 2020-09-15 02:35
Lucy's Corsetry XML 2020-09-14 23:35 2020-09-15 02:35
Main – Department of Accounting and General Services XML 2020-09-14 23:35 2020-09-15 02:35
Map the World Grid with Gridpoint Atlas XML 2020-09-14 23:35 2020-09-15 02:35
Megeso Kou XML 2020-09-14 23:35 2020-09-15 05:35
Metaverse Ink Blog » Metaverse Ink Blog » XML 2020-09-14 23:35 2020-09-15 02:35
MYSTICMAMMA.COM : consciousness, spirituality, astrology, wisdom, inspiration XML 2020-09-14 23:35 2020-09-15 02:35
New at sacred-texts.com XML 2020-09-14 23:35 2020-09-15 02:35
New Dawn: The World's Most Unusual Magazine XML 2020-09-14 23:35 2020-09-15 02:35
New Paradigm Astrology XML 2020-09-14 23:35 2020-09-15 05:35
Newsboat XML 2020-09-14 23:35 2020-09-15 02:35
Nico's Blog XML 2020-09-14 23:35 2020-09-15 02:35
NutriMedical XML 2020-09-14 23:35 2020-09-15 02:35
NutriMedical Report XML 2020-09-14 23:35 2020-09-15 02:35
Open Source Ecology XML 2020-09-14 23:35 2020-09-15 02:35
Open Source Everything for the 21st Century XML 2020-09-14 23:35 2020-09-15 02:35
Open Source Hardware Association XML 2020-09-14 18:35 2020-09-15 06:35
OpenShot Video Editor - Last entries XML 2020-09-14 23:35 2020-09-15 02:35
Paul Stramer - Lincoln County Watch XML 2020-09-14 23:35 2020-09-15 00:35
pesn.com XML 2020-09-14 23:35 2020-09-15 02:35
PIXLS.US XML 2020-09-14 23:35 2020-09-15 02:35
Planet GNU XML 2020-09-14 23:35 2020-09-15 02:35
Priestess Alchemy XML 2020-09-14 23:35 2020-09-15 02:35
rawdog XML 2020-09-14 23:35 2020-09-15 02:35
rawdog-plugins XML 2020-09-14 23:35 2020-09-15 02:35
re:3D | Life-Sized Affordable 3D Printing XML 2020-09-14 23:35 2020-09-15 02:35
RealityShifters Blog XML 2020-09-14 23:35 2020-09-15 02:35
Retraction Watch XML 2020-09-14 23:35 2020-09-15 02:35
RISC-V International XML 2020-09-14 18:35 2020-09-15 00:35
Rising Moon Astrology XML 2020-09-14 23:35 2020-09-15 00:35
RYF News XML 2020-09-14 23:35 2020-09-15 02:35
Shekina Rose XML 2020-09-14 23:35 2020-09-15 02:35
Shifting Timelines - Energetic Synthesis XML 2020-09-14 18:35 2020-09-15 06:35
Soundings XML 2020-09-14 23:35 2020-09-15 02:35
SourceForge Community Blog XML 2020-09-14 23:35 2020-09-15 02:35
SparkFun Electronics XML 2020-09-14 23:35 2020-09-15 05:35
Steve (GRC) Gibson's Blog XML 2020-09-14 23:35 2020-09-15 02:35
Steve.org.uk - Updates XML 2020-09-14 23:35 2020-09-15 02:35
Suzanne Teng & Mystic Journey XML 2020-09-14 23:35 2020-09-15 05:35
TABU; Towards A Better Understanding XML 2020-09-14 23:35 2020-09-15 02:35
Terry Lilley's Underwater 2 Web XML 2020-09-14 23:35 2020-09-15 02:35
The 3 Foragers: Foraging for Wild, Natural, Organic Food XML 2020-09-14 23:35 2020-09-15 02:35
The Astrology Podcast XML 2020-09-14 23:35 2020-09-15 02:35
The Debian Administrator's Handbook XML 2020-09-14 18:35 2020-09-15 06:35
The diaspora* blog XML 2020-09-14 23:35 2020-09-15 02:35
The Druid's Garden XML 2020-09-14 23:35 2020-09-15 02:35
The Hutchison Effect XML 2020-09-14 23:35 2020-09-15 02:35
The Open Source Hardware Association XML 2020-09-14 23:35 2020-09-15 05:35
The Organic & Non-GMO Report XML 2020-09-14 23:35 2020-09-15 02:35
The Permaculture Research Institute XML 2020-09-14 23:35 2020-09-15 02:35
The Worlds of J. Matthew Root XML 2020-09-14 23:35 2020-09-15 02:35
Time Shift Blog - Energetic Synthesis XML 2020-09-14 18:35 2020-09-15 06:35
Transcending the Matrix Control System - Alien Agenda - Metaphysics - Gnosis - Science - audio - about XML 2020-09-14 23:35 2020-09-15 02:35
What If? XML 2020-09-14 23:35 2020-09-15 02:35
What Katie Did XML 2020-09-14 18:35 2020-09-15 06:35
xkcd.com XML 2020-09-14 18:35 2020-09-15 06:35
zodiactruth - zodiactruth XML 2020-09-14 18:35 2020-09-15 06:35