Tag Archives: Illuminati

Top 10 Most Mysterious Secret Societies

Everyone of you have your own list of these, but here’s something:

10. Blackwater: This isn’t so much a secret society, but rather a private army. Actually a corporate army that is, publicly funded, but privately accountable. They offer mercenary services including infantry, navy and police enforcement to whoever will pay their price. Since they’re not a government organization, they are frequently called in to help settle disputes that are too secretive or distasteful for public services to be involved with, like policing the survivors of Hurricane Katrina.

9. The Order of the Skull & Bones: It’s one of those upper crust Ivy League student societies dedicated to manipulating the next generation of the power elite. Oh great, another one. Is anything real anymore? They mockingly refuse membership to all without family names like Rockefeller, Vanderbilt and Bush. Yeah, those Bushes.

8. The Freemasons: Cloaked in secrecy, brothers of this fraternal organization are not allowed to invite new members, nor share any of their secret handshakes, passwords and strange rituals they have to perform, in order to advance in seniority within the organization.

7. Rosicrucians: This mystic Christian fellowship was founded by a group of 8 doctors, alchemists and sages in the 1400s, in a quest to destroy the one true ring. Joking aside…that would be cool, but instead, they actually dedicated their entire lives to providing free health care to any who needed it, and would appoint a successor to replace them after they died. Why does this sound similar to Obamacare?

6. Ordo Templis Orientis: The Order of the Temples of the East was originally founded as an offshoot of the Masons, kind of like the Stonecutters but without Steve Gutenberg. But it underwent radical changes when an occult magician known as the Great Beast, Aleister Crowley, took over the leadership.

5. Hermetic Order of The Golden Dawn: This is yet another occult group that grew out of the Masonic and Rosicrucian traditions, but with a much stronger emphasis on ritual magic like spell-casting, astrology, astral travel, crystal balls and potions. A young Aleister Crowley was one of the order’s most famous members before he left to really get his freak on.

4. The Knights Templar: Founded almost a thousand years ago as a kind of highway patrol for pilgrims in the holy land, they were originally called the Poor Fellow-Soldiers of Christ. Their emblem was of two knights riding on a single horse, emphasizing the Order’s poverty.

3. The Illuminati: As the unofficially self appointed spokesperson for the Illuminati, I am in no way whatsoever authorized to tell you, We don’t really exist, so please stop asking. We are not managing the New World Order through YouTube.

2. Opus Dei: Opus Dei is in the form of some sort of organization within the Catholic Church that may be hiding something important and according to many critics allegedly acts as, well, if they’re better than other Christians. It is claimed that they strongly emphasize the belief that “everyone is called to holiness and that ordinary life is a path to sanctity.” I gotta say, that’s a pretty deep statement.

1. The Black Hand: This secret military society in the Balkans was formed in 1911 with the aim of liberating the Serbian people from Austro-Hungarian rule. Their half-baked plan was to assassinate the Archduke Franz Ferdinand (yes, like that Franz Ferdinand), who was the heir to the Austrian throne, assuming that this would initiate a war between Austria and Serbia. The first two assassination attempts with a car bomb failed to injure the Archduke and his wife and they managed to escape.

In5D Addendum

Gregg Prescott, M.S.
Editor, In5D.com

My list is somewhat different:

1. The Bilderberg Group

2. Opus Dei

3. Illuminati

4. Committee of 300

5. Freemasons

6. Knights Templar

7. Skull & Bones

8. Thule Society

9. The Priory of Sion

10. Rosicrucians

Bilderberg Group: The Bilderberg Group, Bilderberg conference, Bilderberg meetings or Bilderberg Club is an annual private conference of about 120–150 political leaders and experts from industry, finance, academia and the media, established in 1954. About two thirds of the participants come from Europe and the rest from North America; one third from politics and government and the rest from other fields.

The reason why I have the Bilderberg Group number one is because of the influence they have over world events versus many of the other groups who are more localized.

Honorable Mention: Knights of Columbus, The Ancient Arabic Order of the Nobles of the Mystic Shrine

Source

Read more from Auricmedia:

[carousel-horizontal-posts-content-slider]

The Internet Is Now Weaponized, And You Are The Target

Inter is a weapon, which is used against you. Sadly a great thing has turned out to be a spying machine that is leading us towards NWO:

Zero Hedge
November 17, 2013

By now, thanks to Edward Snowden, it is common knowledge and not just conspiracy theory, that every bit of information sent out into the wired or wireless ether is scanned, probed, intercepted and ultimately recorded by the NSA and subsequently all such information is and can be used against any US citizen without a court of law (because the president’s pet secret NISA “court” is anything but). Sadly, in a country in which courtesy of peak social networking, exhibitionism has become an art form, the vast majority of Americans not only could not care less about Snowden’s sacrificial revelations, but in fact are delighted the at least someone, somewhere cares about that photo of last night’s dinner. However, it turns out that far from being a passive listener and recorder, the NSA is quite an active participant in using the internet. The weaponized internet.

Because as Wired reports, “The internet backbone — the infrastructure of networks upon which internet traffic travels — went from being a passive infrastructure for communication to an active weapon for attacks.” And the primary benefactor: the NSA – General Keith Alexander massive secret army – which has now been unleashed against enemies foreign, but mostly domestic.

Enter the QUANTUM program….

According to revelations about the QUANTUM program, the NSA can “shoot” (their words) an exploit at any target it desires as his or her traffic passes across the backbone. It appears that the NSA and GCHQ were the first to turn the internet backbone into a weapon; absent Snowdens of their own, other countries may do the same and then say, “It wasn’t us. And even if it was, you started it.”

If the NSA can hack Petrobras, the Russians can justify attacking Exxon/Mobil. If GCHQ can hack Belgacom to enable covert wiretaps, France can do the same to AT&T. If the Canadians target the Brazilian Ministry of Mines and Energy, the Chinese can target the U.S. Department of the Interior. We now live in a world where, if we are lucky, our attackers may be every country our traffic passes through except our own.

Which means the rest of us — and especially any company or individual whose operations are economically or politically significant — are now targets. All cleartext traffic is not just information being sent from sender to receiver, but is a possible attack vector.

… which is basically packet injection:

The QUANTUM codename is deliciously apt for a technique known as “packet injection,” which spoofs or forges packets to intercept them. The NSA’s wiretaps don’t even need to be silent; they just need to send a message that arrives at the target first. It works by examining requests and injecting a forged reply that appears to come from the real recipient so the victim acts on it.

The technology itself is actually pretty basic. And the same techniques that work on on a Wi-Fi network can work on a backbone wiretap. I personally coded up a packet-injector from scratch in a matter of hours five years ago, and it’s long been a staple of DefCon pranks.

Traditionally, packet injections has been used mostly for censorship purposes:

The most infamous use of packet injection prior to the Snowden leaks was censorship, where both internet service providers (ISPs) and the Great Firewall of China injected TCP reset packets (RST) to block undesired traffic. When a computer receives one of these injected RST packets, it closes the connection, believing that all communication is complete.

Although public disclosure forced ISPs to stop this behavior, China continues to censor with injected resets. It also injects the Domain Name System (DNS) — the system all computers use to turn names such as “www.facebook.com” into IP addresses — by inserting a fake reply whenever it sees a forbidden name. (It’s a process that has caused collateral damage by censoring non-Chinese internet traffic).

And user identification, especially in making Tor obsolete. That’s right: all users of Tor believing they hide behind the veil of anonymity – you aren’t.

User cookies, those inserted by both advertising networks and services, also serve as great identifiers for NSA targeting. Yet a web browser only reveals these cookies when communicating with such sites. A solution lies in the NSA’s QUANTUMCOOKIE attack, which they’ve utilized to de-anonymize Tor users.

A packet injector can reveal these cookies by replying to an unnoticed web fetch (such as a small image) with a HTTP 302 redirect pointing to the target site (such as Hotmail). The browser now thinks “hey, should really go visit Hotmail and ask it for this image”. In connecting to Hotmail, it reveals all non-secure cookies to the wiretap. This both identifies the user to the wiretap, and also allows the wiretap to use these cookies.

So for any webmail service that doesn’t require HTTPS encryption, QUANTUMCOOKIE also allows the wiretap to log in as the target and read the target’s mail. QUANTUMCOOKIE could also tag users, as the same redirection that extracts a cookie could also set or modify a cookie, enabling the NSA to actively track users of interest as they move across the network — although there is no indication yet that the NSA utilizes this technique.

But all of the above are largely passive interception and surveillance strategies. Where it gets interesting is when the NSA’s mission is…

User Attack

The NSA has a collection of FOXACID servers, designed to exploit visitors. Conceptually similar to Metasploit’s WebServer browser autopwn mode, these FOXACID servers probe any visiting browser for weaknesses to exploit.

All it takes is a single request from a victim passing a wiretap for exploitation to occur. Once the QUANTUM wiretap identifies the victim, it simply packet injects a 302 redirect to a FOXACID server. Now the victim’s browser starts talking to the FOXACID server, which quickly takes over the victim’s computer. The NSA calls this QUANTUMINSERT.

The NSA and GCHQ used this technique not only to target Tor users who read Inspire (reported to be an Al-Qaeda propaganda magazine in the English language) but also to gain a foothold within the Belgium telecommunication firm Belgacom, as a prelude to wiretapping Belgium phones.

One particular trick involved identifying the LinkedIn or Slashdot account of an intended target. Then when the QUANTUM system observed individuals visiting LinkedIn or Slashdot, it would examine the HTML returned to identify the user before shooting an exploit at the victim. Any page that identifies the users over HTTP would work equally well, as long as the NSA is willing to write a parser to extract user information from the contents of the page.

Other possible QUANTUM use cases include the following. These are speculative, as we have no evidence that the NSA, GCHQ, or others are utilizing these opportunities. Yet to security experts they are obvious extensions of the logic above.

HTTP cache poisoning. Web browsers often cache critical scripts, such as the ubiquitous Google Analytics script ‘ga.js’. The packet injector can see a request for one of these scripts and instead respond with a malicious version, which will now run on numerous web pages. Since such scripts rarely change, the victim will continue to use the attacker’s script until either the server changes the original script or the browser clears its cache.

Zero-Exploit Exploitation. The FinFly “remote monitoring” hacking tool sold to governments includes exploit-free exploitation, where it modifies software downloads and updates to contain a copy of the FinFisher Spyware. Although Gamma International’s tool operates as a full man-in-the-middle, packet injection can reproduce the effect. The injector simply waits for the victim to attempt a file download, and replies with a 302 redirect to a new server. This new server fetches the original file, modifies it, and passes it on to the victim. When the victim runs the executable, they are now exploited — without the need for any actual exploits.

 

Mobile Phone Applications. Numerous Android and iOS applications fetch data through simple HTTP. In particular, the “Vulna” Android advertisement library was an easy target,  simply waiting for a request from the library and responding with an attack that can effectively completely control the victim’s phone. Although Google removed applications using this particular library, other advertisement libraries and applications can present similar vulnerabilities.

 

DNS-Derived Man-in-the-Middle. Some attacks, such as intercepting HTTPS traffic with a forged certificate, require a full man in the middle rather than a simple eavesdropper. Since every communication starts with a DNS request, and it is only a rare DNS resolver that cryptographically validates the reply with DNSSEC, a packet injector can simply see the DNS request and inject its own reply. This represents a capability upgrade, turning a man-on-the-side into a man-in-the-middle.

 

One possible use is to intercept HTTPS connections if the attacker has a certificate that the victim will accept, by simply redirecting the victim to the attacker’s server. Now the attacker’s server can complete the HTTPS connection. Another potential use involves intercepting and modifying email. The attacker simply packet-injects replies for the MX (Mailserver) entries corresponding to the target’s email. Now the target’s email will first pass through the attacker’s email server. This server could do more than just read the target’s incoming mail, it could also modify it to contain exploits.

 

Amplifying Reach. Large countries don’t need to worry about seeing an individual victim: odds are that a victim’s traffic will pass one wiretap in a short period of time. But smaller countries that wish to utilize the QUANTUMINSERT technique need to force victims traffic past their wiretaps. It’s simply a matter of buying the traffic: Simply ensure that local companies (such as the national airline) both advertise heavily and utilize in-country servers for hosting their ads. Then when a desired target views the advertisement, use packet injection to redirect them to the exploit server; just observe which IP a potential victim arrived from before deciding whether to attack. It’s like a watering hole attack where the attacker doesn’t need to corrupt the watering hole.

Can anything be done to prevent the NSA’s internet army from running over a world that spends the bulk of its time in its reaches? Not much:

The only self defense from all of the above is universal encryption. Universal encryption is difficult and expensive, but unfortunately necessary. Encryption doesn’t just keep our traffic safe from eavesdroppers, it protects us from attack. DNSSEC validation protects DNS from tampering, while SSL armors both email and web traffic.

There are many engineering and logistic difficulties involved in encrypting all traffic on the internet, but its one we must overcome if we are to defend ourselves from the entities that have weaponized the backbone.

Alas, in the battle against the NSA, the biggest enemy is not the authoritarian state’s Super Big Brother, but apathy itself. It is that war that is by far the most important one, and which America has already lost.

Source

Read more from Auricmedia:

[carousel-horizontal-posts-content-slider]

The Secret Rites of Gnosis Controlled by the Church and Secret Societies

All is hidden in plain sight and churches and societies are spreading this illuminati agenda…

The famous phrase against the ancient Gnostic Heretics known as the Cathars says it all “Kill them all – the Lord will Serpent worship 2know his own.” It was allegedly written in 1233 by Pope Gregory IX who issued a formal letter denouncing them as a sect of devil-worshippers, whose practices he described as being immoral and downright evil. This attack by the church on Heretics is an example of a time we still live in today that I like to call “The Secret Rites of Gnosis Controlled by the Church and Secret Societies.”

For the purpose of this article, I would like to explain in simple terms what happened to the old-time religion of Gnosis. You see, in ancient times around 3,500-2,000 year ago, there was a global Gnostic religion that was practiced by many nations. It can be called the religion of Gnosis symbolized by the famous symbol found world-wide being that of the serpent and or dragon. It was by no means a unified religion and many of these nation states had constantly warred with one another.

Evidence of this old religion can be in all parts of the globe. Wherever there were massive empires and or evidence of a highly advanced people to be discovered, more often than not, there can always be found archeological artifacts of the serpent Gnostic religion.

As I have stated many times in the past, early Christianity is nothing but a unified exoteric form of this religion. Meaning that the ancient teachings of Gnosis were not at all lost and or permanently destroyed, but were secretly encoded into the teachings of Jesus and the Saints of the Universal (Catholic) Church who after all, were Gnostics themselves. They were just part of the Sethian initiates of the official organized Roman and Greek unified schools of Gnosticism backed by the world’s most powerful armies and strategists.

Demon and Jesus33rd Degree Masonic Philosopher, Manly P. Hall describes this event in his Gnostic masterpiece, “The Secret Teachings of All Ages” where Hall had written, “Even today there are evidences of Gnostic philosophy in the modern world, but they bear other names and their true origin is not suspected.

Many of the Gnostic concepts have actually been incorporated into the dogmas of the Christian Church, and our newer interpretations of Christianity are often along the lines of Gnostic emanationism.”

Anyone who was not part of this Universal Brotherhood of the Christian Church that was backed by the Roman and Greek armies and elite with Jesus as their Grand Master were deemed enemies of the Brotherhood. Once you were considered an enemy of the state, war would be made upon you, your family and any and all the members of these ancient Gnostic serpent schools who refused to become members of the new Universal Brotherhood. Your books burned, name tarnished and your soul deemed evil in the his-story books.

In a sense, it was the official start of this 6th Age that Plutarch had once called “Cretan against Cretan,” and the Bedouins say it quite simply, “I against my brother, my brothers and I against my cousins, then my cousins and I against strangers.” In the Bible this old teaching is incorporated into the story of when Cain killed his Brother Able and for doing so, Cain was protected by God. Then there are other Brotherhood sayings such as, “If you are not with us, you are against us,” and “the ends justifies the means.”

We can even go one step further to a time I like to call that of the Gnostic Liars where telling lies in the name of war and deceit was not only lawful, it was their job to use their words and writings to combat all competing Gnostic sects. After all, Jesus said he came not to bring peace, but a sword. This Gnostic tactic is still cleverly used to this day and especially in the so-called truth movement that can be summed up by the Latin Masonic term, “Ordo Ab Chao,” and in English, “Order out of Chaos.”

This war can be originally and directly attributed to the Roman-Greco Catholic Churches war on the Gnostics, and now with Islam against the competing global religion of exoteric Gnosis that at one time was found almost all over the world. This Christian influence and eventually with the advent of Islam and the birth and life of the prophet Muhammad overshadowed all the ancient Gnostic religions and schools of the past. In a sense, we can say that the last 2,000 years, we have seen a global war that was partially based on eliminating and or controlling knowledge in all parts of the globe.

The most recent evidence of these warring facts may be found in the persecution of the Gnostic sect known as the Yezedi‘s in the Middle East and Iraq by the Islamic group known as ISIS. Quite possibly they are one of the last remaining ancient Gnostic groups in the Middle East who has refused to convert to the ways of the Brotherhood.

A religion that they deemed unlawful, and all teachings that were not accepted by the Western and Eastern Churches in the early Councils by the Church Fathers and Doctors was deemed as heresy and doomed to destruction in a blaze of Gnostic Glory. They then encoded their own Gnostic teachings into a hard to understand esoteric form into the New Law that we know today as the New Testament.

In its place, the savior to the Christian world, Jesus had taken the place of the serpent.  A time that is described cross symbolby the 1st century A.D. Christian apologist Justin Martyr, also known as Saint Justin ( c. 100 – 165 AD) who said, “The power of the serpent of Egypt was broken on the cross.” St. Mark informs us, “With the form of a serpent, He kills the serpent, for the serpent made out of the rod swallowed up the other serpents.”  St. Augustine tells us, that the image of Christ and his Cross was the new ensign of Christian Warfare that the Romans had carried before them; being the Ensign or Profession of their Warfare.

An event that would signify the official start of their world-wide Brotherhood and war on all Gnostic heretics. A Brotherhood that was now not just based on Gnosis and blood, but also by merit in which the first Pontifex Maximus, Augustus Caesar with his advent of the 6th Age would be declared the defacto cornerstone to not only their church, but the official Grand Master of their secret societies as well.

The secret rites of Gnosis would then become incorporated into the Bible, Koran, Secret Societies and ordained secret-societiesinitiates who operated in the lights of the dark shadows such as Freemasonry, Knights Templar and the Rosicrucians would be the new depositories for these ancient Gnostic teachings. It was then decided by the ruling aristocracy that the ancient secret rite of Gnosis would be reserved only to those they had initiated themselves into their Brotherhood which they controlled based on the person’s merit of serving the state, Brotherhood and church in which the true Gnostic teachings were reserved only for a select few.

Manly Hall explains this simply when he said, “The members of the order claimed to be familiar with the secret doctrines of early Christianity. They interpreted the Christian Mysteries according to pagan symbolism. Their secret information and philosophic tenets they concealed from the profane and taught to a small group only of especially initiated persons.”

All teachers, schools and secret societies that did not have their stamp of formal approval were deemed Heretics. All Masonic Lodges that did not have a charter from the Ancient and Accepted Scottish Rite and the United Grand Lodge of England (UGLE) were considered clandestine. Clandestine Masonry is an unlawful secret society falsely claiming to be Masonic.  If you do not have a charter and you open a Masonic Lodge and or an Order, you are deemed a modern heretic is operating unlawfully. Please keep in mind that some of the world’s top military, police and judges are Freemasons and Templars who uphold this law against heretics.

The Freemasonic organizations such as the Ancient and Accepted Scottish Rite and the United Grand Lodge of England (UGLE) are considered lawful because they have the proper legal rites garnished by The Powers That Be, and the government of the counties and states in which they operate.

This is why you will see the biG G in Freemason stoneFreemasonry which I have explained before is nothing other than a captial G for the word Gnosis and ancient Gnostic horned deities can now be found in Freemasonry and with the Knights Templar in more modern form such as the famous Baphomet. The 19th century French occultist and Freemason, Éliphas Levi let the horns out of the bag in the 19th century when he said, “The terrible Baphomet is, in fact, like all monstrous enigmas of ancient science, nothing more than an innocent and even pious hieroglyph.”

I would go one step further and call Baphomet a  pious Gnostic hieroglyph, and Jesus one of the most powerful and influential Gnostics who has ever lived!

Worms - ApocalypseÉliphasLévi explains in his book Transcendental Magic: Its Doctrine and Ritual” how these Gnostic secrets would be unveiled during the Apocalypse and revealed to the masses in the end times of our Age which you and are witnessing rite now. Levi had written: “The triad, being the fundamental principle of the whole Kabalah or Sacred Tradition of our fathers, was necessarily the fundamental dogma of Christianity; the apparent dualism of which it explains by the intervention of a harmonious and all-powerful unity. Christ did not put His teaching into writing, and only revealed it in secret to His favored disciple, the one Kabalist, and he a great Kabalist, among the apostles.

So is the Apocalypse the book of the Gnosis or Secret Doctrine of the first Christians, and the key of this doctrine is indicated by an occult versicle of the Lord’s Prayer, which the Vulgate leaves untranslated, while in the Greek Rite, the priests only are permitted to pronounce it. This versicle, completely kabalistic, is found in the Greek text of the Gospel according to St Matthew, and in several Hebrew copies, as follows:

The sacred word MALKUTH substituted for KETHER, which is its kabalistic correspondent, and the equipoise of GEBURAH and CHESED, repeating itself in the circles of heavens called eons by the Gnostics, provided the keystone of the whole Christian Temple in the occult versicle. It has been retained by Protestants in their New Testament, but they have failed to discern its lofty and wonderful meaning, which would have unveiled to them all the Mysteries of the Apocalypse. There is, however, a tradition in the Church that the manifestation of these mysteries is reserved till the last times.”

Source

Read more from Auricmedia:

[carousel-horizontal-posts-content-slider]

Hellish Nightmare Unfolds With Bilderbergs Real Agenda!

It’s almost the time when Bilderberg meeting takes place and global elite shapes the guidelines of the World:

By Lisa Haven

“Bilderberg pulls the strings of every government and intelligence agency in the Western world.” ― James Morcan, The Ninth Orphan

That is one of the truest statements coming straight from the mouth of a globalist himself! They are pulling a majority—if not all—of the strings that are in play today. From politics, to medical advancements, to technological, to world governance and more. They are a manipulative, money seeking, power hungry group out for the betterment of themselves. Only recently has their malicious agendas been spilled to the public. In the form of Bilderberg meetings, the Georgia Guidestones, and leakers themselves.

In the video below I delve through Bilderbergs own stated agendas found in the years 2013 – 2015, using the yearly conferences held across the globe as a springboard. I link agenda similarities and note the differences, as well as tie them to current events that are happening globally. Based on that information I forecast what we could be looking at in 2016 and beyond based of their “stated conference agenda”. Trust me this video is one you do not want to miss! Please get the word out and share it with everyone you know… 

June 3rd 2013 Bilderberg Agenda

– Can the US and Europe grow Faster and create jobs?    To be honest they care nothing about our jobs. This is why they ask it in the form of a question. Very vague to cover their real agenda which is, yes jobs can be created however coming from the Bilderberg’s they choose not to create them—after all the target is the downgrading of the middle class!

– Jobs, entitlement and debt:  Could they be looking at ways to increase debt and implode the economy? After all our economy has gotten worser, not better.

– How big data is changing everything:  Just days after the June 3rd Bilderberg meeting the secret NSA program was leaked on June 9th by Edward Snowden who official came out days later on the 14th.  Did the NWO group have some sort of agenda planned? All I know is days after Bilderberg’s talk on Big Data, Snowden came out.

– Nationalism and populism. 

– US Foreign policy:  Two major moves have been made since the meeting. (1.) 2013 – U.S. threatens an air attack on Syria after it uses chemical weapons; resolved by agreement to destroy all the chemical weapons under international auspices. (2.) 2014 – U.S. implements economic sanctions against the Russian Federation after its illegal occupation of Crimea during the 2014 Ukraine conflict. (Funny how since 2014 after the Bilderberg meetings this has been on the table both in 2014 and 2015) Agenda?

– Africa’s challenges:    Ebola Outbreak began December 2013, shortly after the Bilderberg meeting June 2013. Was this part of their plan?

– Cyber warfare and the proliferation of asymmetric threats:   In August 2013 US Department of Homeland Security Janet Napolitano released her farewell statement indicating that a serious cyber attack was possible in the U.S. Additional could the Bilderbergs have initiated this threat to incite fear over the populace, after all it gave the government an open door to create government agencies that monitor cyber threat tracking. More power in the hand of the government to surveillance you.

– Major trends in medical research:  Microchip medical implants were likely on the table for discussion. Especially considering this years Bilderberg meeting in which they invited former DARPA director and now Google executive Regina Dugan, the lady who pushes and promotes ingestible ID Chips! Could it be that this has been on the table all along? A major goal towards the NWO mindset.

– Education, promise and impacts:  There are more online public schools today then ever before. Also we were faced head on with the Federalized school system known as, COMMON CORE! (Evil to the core!)

– Politics of the European Union

– Developments in the Middle East: This is on the agenda yearly specifically because Jerusalem is at the center of the Middle East Conflict. That and oil! They likely discuss who they will and won’t back and what fear they’ll strike into people’s minds to initiate their agenda.

– Current Affairs  this makes a yearly appearance on the list.

 

May 29-June 1 Bilderberg Meeting 2014: 

– Is the economic recovery sustainable? Short answer, no! They made sure of it and they are well aware of it! Therefore I’m sure they have plans underway to eliminate the middle class, especially here in America. If they can do that then it would be easier for the to implicate their NWO agenda. After all the middle class has always been a target.

– Who will pay for the demographics? It won’t be them! More taxes, maybe even a carbon tax, etc.

– Does privacy exist?:  I think the real truth behind this discussion is how to “NOT MAKE privacy exist.” How to gather data on everyone and anyone they can! After all ever since the 2013 meeting the NSA has upped their game by increasing surveillance on the population through the NSA Spy grid, Fusions Centers, the  Joint terrorist task force, and now they are listening to our phone calls, and putting surveillance drones in our skies.

– How special is the relationship in intelligence sharing?:  Special enough for them to discuss it!! They need intel to gather data on all who are against them. They want this!

– Big shifts in technology and jobs:  Yes! This is also a goal, they want to merge man with machine. It is a goal to make some sort of ‘transhuman’ lifeform that can give them longevity of life. They know they are headed to the pits of hell and want to live as long as possible. This is also why some medical advancements for 2014 included genome editing.

– The future of democracy and the middle class trap:  Truth how to eliminate the future of democracy and implement tyranny and their One World Order.

– China’s political and economic outlook:  Truth how to make other countries follow China’s communistic regime. After all major attacks against patriots, christians, and vets, have surfaced. Taken straight from a Maoist playbook!

– The new architecture of the Middle East

– Ukraine: Obviously their agenda is to spark tensions considering much is funded from Bilderbergs own George Soros.

– What’s next for Europe 

– Current Events

 

Bilderberg, June 11th – 14th 2015 Agenda: 

– Artificial Intelligence: There will be a major push for microchipping considering Regina Dugan, the former DARPA director and Google executive who pushes microchipping will be attending the meeting.

– Cybersecurity: This was on the agenda before and it’s likely we could see a cyber threat in the near future. Likely part of a manufactured crisis.

– Chemical Weapons Threats

– Current Economic Issues: We all know the economic crisis is coming, but it could be a lot sooner then I’d like to realize. They know it and we know it.

– European Strategy: On the list three years running!

– Globalization: This is the first year they have added this as one of their key topic discussions. However, I believe it’s been it’s been discussed yearly! The NWO is, after all, their main objective! Could it be that they finally listed this on their agenda because things are getting down to the wire? Do they fear something’s ahead that either could prevent them from accomplishing their goal or propel them forward. I believe a huge NWO push will be coming in these next years.

– Iran, Greece, Middle East, Russia, NATO, USA, UK, and Ukraine: All listed as globalists in the working. Likely to discuss a number of topics maybe even World War Three. Considering the players they have listed here. We know US, Russia and Ukraine are in tensions. Along with Middle East and chaos in Greece. All player. As for UK, I’m guessing it will soon join in.

– Terrorism: There could be an uptick in action against “ patriotic terrorists.” Those who oppose their rule! This could be the main objectives of Jade Helm, especially considering the official start date takes place right after the Bilderberg event? Coincidence? I think not!

– US Elections: Considering Hilary Clintons advisor, Jim Messina, is on the list. It’s possible Bilderberg’s could be backing Hilary as our next president.

“We are grateful to the Washington Post, the New York Times, Time Magazine and other great publications whose directors have attended our meetings and respected their promises of discretion for almost forty years … It would have been impossible for us to develop our plan for the world if we had been subjected to the lights of publicity during those years. But, the world is more sophisticated and prepared to march towards a world government. The supranational sovereignty of an intellectual elite and world bankers is surely preferable to the national auto-determination practiced in past centuries.” – David Rockefeller, 1991 Bilderberg Meeting at Baden, Germany (a meeting also attended by Bill Clinton)

Source

Read more from Auricmedia:

[carousel-horizontal-posts-content-slider]

How the Illuminati Trapped Hitler in Two-Front War

Interesting article about how Illuminati organized Hitler to power and used him as a tool:

The pre-war British establishment was Illuminati and Communist to the core.

They put Hitler into power in Germany and then maneuvered him into a war that would destroy Germany as an independent country once and for all.

(from Sept. 2006)

by Henry Makow Ph.D.

In Dec. 1942 Heinrich Mueller, Chief of the Gestapo, rolled up the Soviet spy network in mainland Europe and secured a list of Soviet agents and informants in England  that reads like a “who’s who” of the British establishment and lifts the veil from modern history.

Müller,_Heinrich

(Gestapo Chief Heinrich Muller)

Soviet spies include Edward Wood, Lord Halifax, Neville Chamberlain’s Foreign Secretary and an architect of the “Appeasement” policy.

Appeasement encouraged Hitler to think England wanted him to expand eastward against the Soviet Union. In fact, Halifax was Illuminati like the Communists. Appeasement was designed to trap Hitler in a two-front war which would level Germany (and Europe) and kill sixty million people.

Mueller’s list of spies includes Victor Rothschild, the head of the central banking dynasty, one of the “Cambridge Five” traitors. Curiously, the other four (Burgess, Maclean, Blunt and Philby) aren’t on Mueller’s list. Halifax’s son married a Rothschild.

The list also includes Charles Hambro, another banker of Jewish origin who was part of a Bank of England decision to continue financing Nazism in 1934 as a “stabilizing influence.” Obviously, as a Soviet asset, this man was not pro-Nazi. The explanation is that both Nazism and Communism are Illuminati creations.

The list also includes Sir Robert Waley-Cohen and many members of the anti-appeasement “Focus” group that funded Winston Churchill. Waley-Cohen was the Chairman of the Rothschild-controlled Shell Oil and the leader of the British Jewish Community.

Other bankers, banking scions and industrialists include Eugen Spier, Maurice Baring, Leonard Montefiore, Edward Guggenheim, Sir Robert Mond and Sir Phillip Sassoon. All are of Jewish origin.

Prominent Labor Party and trade union leaders included Ernest Bevin, Harold Laski, Herbert Stanley Morrison and Sir Walter Citrine. Members of ancient aristocratic families include Richard Combe Abdy, Baron Strabogli, and Admiral Reginald Plunkett-Ernle-Erle-Drax. There was press mogul J.S. Elias, cartoonist Victor Weisz and Daily Express Chairman Ralph D. Blumenfeld.

Prominent civil servants include Rex Leeper of the Foreign Office ruling clique and Sir Maurice Hankey, who as cabinet secretary and Clerk of the Privy Council (1919-1938) knew all the secrets. There was Slavonic scholar Bernard Pares and Jurist Sir Hirsch Lauterpacht. (The complete agent list is at the end of this article.)

FREEMASONS

What did this disparate group have in common? About half of them are recognizably Jewish. But the connection that binds all of them likely is the Illuminati, the top rung of Freemasonry. Its aim is to weaken mankind through a series of contrived  wars in order to establish a Masonic or “Illuminist” world dictatorship dedicated to the “light giver” Lucifer (their alter ego.) Obama, Bush, Clinton, Kerry etc. are all members.

The Illuminati started Communism. Their common anniversary is May 1; their common symbol is the satanic inverted pentagram. They funded the Bolshevik Revolution and secretly ran the USSR, which was a model for the New World Order. Far from being spies for Stalin, some of these men probably were his superiors.

Soviet Russia was a dummy-state creation of  the London-based Illuminati bankers. The Second World War, the Cold War, and now the “War on Terror” are all their inventions. They are responsible for 9-11 and for the neopagan assault on Western Civilization, Christianity and Islam (incl. family, nation, race, morality and truth) that we call modernism, humanism and globalism.

Heinrich Mueller died in California in 1983. The CIA recruited Mueller in Switzerland in 1948 and paid him $1 million for an Interrogation running 1000-pages that includes this list. Mueller left his microfilmed archives to his nephew, “Douglas Gregory” who has published a part.

BAIT AND SWITCH

The Bank of England funded the rise of Adolf Hitler through the Schroder Bank.

frank-cyril-tiarks-and-grand-daughter-henriettatiarks

(Tiarcks and his granddaughter)

F.C. Tiarcks, the Managing Director of the Schroder Bank, was also a Director of the Bank of England.

Eustace Mullins writes: “Because his own financial backers, the Schroders, were sponsoring the Appeasement Party, Hitler believed there would be no war [with England.] He did not suspect that the backers of the Appeasement Party, now that Chamberlain had served his purpose in duping Hitler, would cast Chamberlain aside and make Churchill the Prime Minister.” (The Secrets of the Federal Reserve, pp.76-78.)

While history portrays Hitler as duping the naive Neville Chamberlain and Lord Halifax, it appears Hitler himself was tricked into thinking he could expand eastward with impunity. Neville Chamberlain wasn’t in on the secret. (He died prematurely just months after leaving office.) But as a Soviet informant, Halifax certainly was instrumental.

As an early opponent of British rearmament, Halifax encouraged Hitler’s plans and later complimented the dictator for being a “genuine hater of Communism.” In 1937, Halifax actually offered Hitler changes in the “European Order” in regard to Danzig, Austria and Czechoslovakia.

“It was Halifax not Hitler who first mentioned by name the areas where the Versailles Treaty might be reinterpreted to Germany’s benefit,” writes historian Andrew Roberts. “Halifax did the one thing which Eden had told him not to, and which Vansittart warned would ‘bring the European card-castle tumbling down.’ Moreover he did it not once but thrice in the course of the conversations.” (The Holy Fox: A Biography of Lord Halifax, 1991, pp. 67, 70-71.)

Halifx’s closest adviser was Philip Kerr, Lord Lothian, a member of the Rothschild-Milner-Rhodes  Round Table secret society (i.e  the Illuminati). According to Roberts, Lothian was “a friend of Halifax’s and had  non-parliamentary political influence of a type seldom seen in today’s politics.” (109)

Appeasement was designed to encourage Hitler to take action which would justify a declaration of war by the West.

“What we want to secure is the certainty of a war on two-fronts,” Halifax said in March 1939. (Roberts, 146) Halifax was responsible for the foolhardy British guarantee of Poland that led to this war declaration in Sept. 1939. The USSR also invaded Poland but there was no declaration of war against it. Stalin was pre-primed to attack the Nazis in 1941.(This is essentially the deal Christian Rakovsky offered Stalin 1938.)

The whole knuckle-biting drama of war and peace in 1939-41, including England as the lonely defender of freedom, was a charade. Germany was in the cross-hairs all along. Could the USA be in the same position today as Russia and China prepare for war?

The appeasers and their opponents were two Illuminati house teams pursuing  common goals. Lady Astor’s Cliveden Manor was supposed to be the HQ of the (pro-Nazi) appeasement party but, as Andrew Roberts points out, arch anti-appeasers like Duff Cooper, Anthony Eden and Russian Foreign Minister Maxim Litvinov (nee Meir Finkelstein) were regular guests. (67)

CONCLUSION

Wars are the artificial creation of the Illuminati, a satanic cult that extends its tentacles over the whole planet. “Muller’s List” provides a glimpse at the composition of this group: bankers, industrialists, aristocrats, military, scholars, trade unionists and media.

There are a lot of Jews but it should be obvious that the Illuminati victimized Jews as much as anyone. Jews have been the canon fodder for Communism, Zionism and Nazism. Instead of  defending the Illuminati, Jews should revile it. Otherwise they appear to be in collusion.

Possibly some listees didn’t realize what they were advancing. The Illuminati pretended to oppose fascism. Today they pretend to build a humanist utopia, an answer to poverty, disease, and prejudice. Former World Bank President James Wolfensohn had the slogan “Plutocrat for the Poor” on his web site.

Hitler was groomed and funded for the purpose of destroying Germany’s national aspirations and to provide a pretext for the State of Israel. The Illuminati starts wars to destroy nation states, demoralize humanity, consolidate power and produce huge profits and debt slavery. This cult, which has a stranglehold on thought and expression, pretty much defines realty. Our best course is to find our truth from different sources and define reality anew.

———
“Mueller’s List”  from Douglas Gregory, “Gestapo Chief: The 1948 Interrogation of Heinrich Muller Vol. 3 p.107.

Lt. Col. Frederick William Abbot
Sir Maurice Hankey
Richard Combe Abdy
Eugen Spier
George Dixon Abraham
Baron Strabogli
Frederick Edward Fox Adam
J.S. Elias, Baron Southwood
Admiral Sir Percy Addison
Sir H.L. Rothband
Elkan Nathan Adler
Sir E.L. Goschen
Admiral Oliver Backhouse
Mrs. Blanche Dugdale
John Ball
Sir Robert Wood
Maurice Baring
Sir Robert Mond
Ralph D. Blumenfeld
Jurgen Kuczynski
Sir Harry Robert Boyd
Sir Robert Waley-Cohen
Sir Charles Hambro
Rex Leeper
Edward Wood (Lord Halifax)
Sir Walter Citrine
Walter Rosenhain
Victor Rothschild

Charles Masterman Herz
Sir Philip Sassoon
Victor Weisz
Sir Bernard Pares
Friedrich Saxl
Ernest Bevin
Sir Hirsch Lauterpacht
Herbert Stanley Morrison
Harold Joseph Laski
Sir Reginald Plunkett-Erle-Drax
Edward Armand Guggenheim

Source

Read more from Auricmedia:

[carousel-horizontal-posts-content-slider]