Facebook Now Collecting Photo IDs

Nwo Report

Source: Julie Wilson

An Infowars.com listener recently had their Facebook account suspended for asking Facebook how to change their primary email address.  Coincidentally, the listener who uses Facebook as a tool to promote truth about the U.S. government, 9/11, the banking cartels, and the falsehood of the “War on Terror,” says she merely contacted Facebook requesting information on how to change the primary email address on her account.

Facebook responded by suspending her account and accusing her of using a fake name. The Facebook employee with the title “Marissa of User Operations,” told her “If you would like to use this profile again, just get back to us with your real name, and we will reactivate the account for you.”

The listener explained that she hadn’t been using a fake name, but regardless provided her real first and last name.

Facebook replied stating that they could not verify ownership of…

View original post 302 more words

Advertisements

electricfacetest | The Electric FaceBook Acid Test This is a DisInfobahn operation. We are experimenting with Facebook and their censorship policies. Please take a look and when the time arises we will ask for help continuing the experiment. Thanks, William Pilgrim

http://electricfacetest.wordpress.com/

Marine’s Facebook Posts Leads to his Detainment

Source: http://www.techdirt.com/articles/20120823/02230220132/former-marine-detained-held-month-posting-conspiracy-theories-rap-lyrics-to-facebook.shtml

by Mike Masnick from the free-speech? dept on Thursday, August 23rd, 2012 @ 8:17AM

We were just discussing how some in law enforcement are overreacting to “threats” on Facebook, and someone in the comments pointed us to the case of Brandon Raub, which we had been unfamiliar with. Raub, a former Marine, posted some of his concerns about the government to his Facebook page, along with some rap lyrics. Raub’s views definitely fall into what many consider to be conspiracy theory territory — claiming 9/11 was an inside job, talking about the Illuminati controlling the world, etc. He also did make vague references to the idea that a “revolution is coming” and that a “civil war” was coming — and even said that “I’m starting the revolution. I’m done waiting.” The only directly “violent” thing he posted — which gets covered in all of the press about Raub’s situation — is the line: “‘Sharpen up my axe; I’m here to sever heads.” Of course, what nearly everyone who quotes that line leaves out is that it’s a lyric to the rap song Bring Me Down by the group Swollen Members.

Either way, it seems that these statements on his Facebook page resulted in him being detained in a psychiatric ward. A recent hearing ended with a decision that he needs to stay there for another 30 days. While government officials say he wasn’t arrested, the video footage of law enforcement officials handcuffing him and pushing him into a police car sure looks like an arrest:

It appears that a lot of folks have been speaking out about this — with reasonable concern over whether or not the government is monitoring (private) Facebook pages, as was the case with Raub’s page. Of course, it’s more likely that some of his Facebook friends were somewhat concerned and “reported” his page. There’s been a lot of talk about Raub’s case — especially in libertarian circles — and many of them do ignore some of the statements he made that could at least raise some concerns from some people, though the context matters a great deal.

That said, many others are quite reasonably concerned that a few comments involving conspiracy theories and angry rap lyrics can get one carted off by the government to a psychiatric ward for over a month. In an interview from the ward, Raub notes that he’d actually been leaning towards re-enlisting right before all of this happened.

No matter what, the situation raises some serious questions about free speech rights with regards to social networks these days. While I don’t have an issue with people investigating the details of a situation if comments could reasonably be interpreted to be a possible warning sign of a threat, it’s troubling how these same comments could be taken out of context and mean nothing in terms of an actual threat. The fact that he ends up in a psych ward against his and his family’s own best wishes is, at the very least, a big concern.

DHS Uses these Keywords to Spy on You

Source:
http://www.animalnewyork.com/2012/the-department-of-homeland-security-is-searching-your-facebook-and-twitter-for-these-words/

David Corbett of the Corbett Report has begun to tweet everyone of these words in an attempt to exercise his right to free speech and to jam the control system. Feel free to do the same, or post these words on your blog. Whatever you do, don’t censor yourself out of fear. Its 2012. Fuck it.

Here is the article in full, fair use, and thank you ANIMAL.com:

The Department of Homeland Security monitors your updates on social networks, including Facebook and Twitter, to uncover “Items Of Interest” (IOI), according to an internal DHS document released by the EPIC. That document happens to include a list of the baseline terms for which the DHS–or more specifically, a DHS subcontractor hired to monitor social networks–use to generate real-time IOI reports. (Although the released PDF is generally all reader-selectable text, the list of names was curiously embedded as an image of text, preventing simple indexing. We’ve fixed that below.)
To be fair, the DHS does have an internal privacy policy that attempts to strip your “PII”–Personally Identifiable Information–from the aggregated tweets and status updates, with some broad exceptions:
1) U.S. and foreign individuals in extremis situations involving potential life or death circumstances; (this is no change)
2) Senior U.S. and foreign government officials who make public statements or provide public updates;
3) U.S. and foreign government spokespersons who make public statements or provide public updates;
4) U.S. and foreign private sector officials and spokespersons who make public statements or provide public updates;
5) Names of anchors, newscasters, or on-scene reporters who are known or identified as reporters in their post or article or who use traditional and/or social media in real time to keep their audience situationally aware and informed;
6) Current and former public officials who are victims of incidents or activities related to Homeland Security; and
7) Terrorists, drug cartel leaders or other persons known to have been involved in major crimes of Homeland Security interest, (e.g., mass shooters such as those at Virginia Tech or Ft. Hood) who are killed or found dead.
In addition, the Media Monitoring Capability team can transmit personal information to the DHS National Operations Center over the phone as deemed necessary.
The MMC watch may provide the name, position, or other information considered to be PII to the NOC over the telephone when approved by the appropriate DHS OPS authority. But that information must not be stored in a database that could be searched by an individual’s PII.
In addition to the following list of terms, the DHS can also add additional search terms circumstantially as deemed necessary.
DHS Media Monitoring Terms

2.13 Key Words & Search Terms
This is a current list of terms that will be used by the NOC when monitoring social media sites to provide situational awareness and establish a common operating picture. As natural or manmade disasters occur, new search terms may be added.
The new search terms will not use PII in searching for relevant
mission-related information.
DHS & Other Agencies
Department of Homeland Security (DHS)
Federal Emergency Management Agency (FEMA)
Coast Guard (USCG)
Customs and Border Protection (CBP)
Border Patrol
Secret Service (USSS)
National Operations Center (NOC)
Homeland Defense
Immigraption Customs Enforcement (ICE)
Agent
Task Force
Central Intelligence Agency (CIA)
Fusion Center
Drug Enforcement Agency (DEA)
Secure Border Initiative (SBI)
Federal Bureau of Investigation (FBI)
Alcohol Tobacco and Firearms (ATF)
U.S. Citizenship and Immigration Services (CIS)
Federal Air Marshal Service (FAMS)
Transportation Security Administration (TSA)
Air Marshal
Federal Aviation Administration (FAA)
National Guard
Red Cross
United Nations (UN)
Domestic Security
Assassination
Attack
Domestic security
Drill
Exercise
Cops
Law enforcement
Authorities
Disaster assistance
Disaster management
DNDO (Domestic Nuclear Detection Office)
National preparedness
Mitigation
Prevention
Response
Recovery
Dirty Bomb
Domestic nuclear detection
Emergency management
Emergency response
First responder
Homeland security
Maritime domain awareness (MDA)
National preparedness initiative
Militia
Shooting
Shots fired
Evacuation
Deaths
Hostage
Explosion (explosive)
Police
Disaster medical assistance team (DMAT)
Organized crime
Gangs
National security
State of emergency
Security
Breach
Threat
Standoff
SWAT
Screening
Lockdown
Bomb (squad or threat)
Crash
Looting
Riot
Emergency Landing
Pipe bomb
Incident
Facility
HAZMAT & Nuclear
Hazmat
Nuclear
Chemical Spill
Suspicious package/device
Toxic
National laboratory
Nuclear facility
Nuclear threat
Cloud
Plume
Radiation
Radioactive
Leak
Biological infection (or event)
Chemical
Chemical burn
Biological
Epidemic
Hazardous
Hazardous material incident
Industrial spill
Infection
Powder (white)
Gas
Spillover
Anthrax
Blister agent
Exposure
Burn
Nerve agent
Ricin
Sarin
North Korea
Health Concern + H1N1
Outbreak
Contamination
Exposure
Virus
Evacuation
Bacteria
Recall
Ebola
Food Poisoning
Foot and Mouth (FMD)
H5N1
Avian
Flu
Salmonella
Small Pox
Plague
Human to human
Human to ANIMAL
Influenza
Center for Disease Control (CDC)
Drug Administration (FDA)
Public Health
Toxic
Agro Terror
Tuberculosis (TB)
Agriculture
Listeria
Symptoms
Mutation
Resistant
Antiviral
Wave
Pandemic
Infection
Water/air borne
Sick
Swine
Pork
Strain
Quarantine
H1N1
Vaccine
Tamiflu
Norvo Virus
Epidemic
World Health Organization (WHO and components)
Viral Hemorrhagic Fever
E. Coli
Infrastructure Security
Infrastructure security
Airport
CIKR (Critical Infrastructure & Key Resources)
AMTRAK
Collapse
Computer infrastructure
Communications infrastructure
Telecommunications
Critical infrastructure
National infrastructure
Metro
WMATA
Airplane (and derivatives)
Chemical fire
Subway
BART
MARTA
Port Authority
NBIC (National Biosurveillance Integration Center)
Transportation security
Grid
Power
Smart
Body scanner
Electric
Failure or outage
Black out
Brown out
Port
Dock
Bridge
Canceled
Delays
Service disruption
Power lines
Southwest Border Violence
Drug cartel
Violence
Gang
Drug
Narcotics
Cocaine
Marijuana
Heroin
Border
Mexico
Cartel
Southwest
Juarez
Sinaloa
Tijuana
Torreon
Yuma
Tucson
Decapitated
U.S. Consulate
Consular
El Paso
Fort Hancock
San Diego
Ciudad Juarez
Nogales
Sonora
Colombia
Mara salvatrucha
MS13 or MS-13
Drug war
Mexican army
Methamphetamine
Cartel de Golfo
Gulf Cartel
La Familia
Reynose
Nuevo Leon
Narcos
Narco banners (Spanish equivalents)
Los Zetas
Shootout
Execution
Gunfight
Trafficking
Kidnap
Calderon
Reyosa
Bust
Tamaulipas
Meth Lab
Drug trade
Illegal immigrants
Smuggling (smugglers)
Matamoros
Michoacana
Guzman
Arellano-Felix
Beltran-Leyva
Barrio Azteca
Artistics Assassins
Mexicles
New Federation
Terrorism
Terrorism
Al Queda (all spellings)
Terror
Attack
Iraq
Afghanistan
Iran
Pakistan
Agro
Environmental terrorist
Eco terrorism
Conventional weapon
Target
Weapons grade
Dirty bomb
Enriched
Nuclear
Chemical weapon
Biological weapon
Ammonium nitrate
Improvised explosive device
IED (Improvised Explosive Device)
Abu Sayyaf
Hamas
FARC (Armed Revolutionary Forces Colombia)
IRA (Irish Republican Army)
ETA (Euskadi ta Askatasuna)
Basque Separatists
Hezbollah
Tamil Tiger
PLF (Palestine Liberation Front)
PLO (Palestine Libration Organization)
Car bomb
Jihad
Taliban
Weapons cache
Suicide bomber
Suicide attack
Suspicious substance
AQAP (Al Qaeda Arabian Peninsula)
AQIM (Al Qaeda in the Islamic Maghreb)
TTP (Tehrik-i-Taliban Pakistan)
Yemen
Pirates
Extremism
Somalia
Nigeria
Radicals
Al-Shabaab
Home grown
Plot
Nationalist
Recruitment
Fundamentalism
Islamist
Weather/Disaster/Emergency
Emergency
Hurricane
Tornado
Twister
Tsunami
Earthquake
Tremor
Flood
Storm
Crest
Temblor
Extreme weather
Forest fire
Brush fire
Ice
Stranded/Stuck
Help
Hail
Wildfire
Tsunami Warning Center
Magnitude
Avalanche
Typhoon
Shelter-in-place
Disaster
Snow
Blizzard
Sleet
Mud slide or Mudslide
Erosion
Power outage
Brown out
Warning
Watch
Lightening
Aid
Relief
Closure
Interstate
Burst
Emergency Broadcast System
Cyber Security
Cyber security
Botnet
DDOS (dedicated denial of service)
Denial of service
Malware
Virus
Trojan
Keylogger
Cyber Command
2600
Spammer
Phishing
Rootkit
Phreaking
Cain and abel
Brute forcing
Mysql injection
Cyber attack
Cyber terror
Hacker
China
Conficker
Worm
Scammers
Social media
Yes, the Department of Homeland Security is searching social media for…”social media”.

Is not joining Facebook a sign you’re a psychopath? Some employers and psychologists say it’s ‘suspicious’ | Mail Online

Is not joining Facebook a sign you’re a psychopath? Some employers and psychologists say staying away from social media is ‘suspicious’

By Daily Mail Reporter

PUBLISHED: 16:44 EST, 6 August 2012 | UPDATED: 05:16 EST, 8 August 2012

Facebook has become such a pervasive force in modern society that increasing numbers of employers, and even some psychologists, believe people who aren’t on social networking sites are ‘suspicious.’

The German magazine Der Taggspiegel went so far as to point out that accused theater shooter James Holmes and Norwegian mass murder Anders Behring Breivik have common ground in their lack of Facebook profiles.

On a more tangible level, Forbes.com reports that human resources departments across the country are becoming more wary of young job candidates who don’t use the site.

The common concern among bosses is that a lack of Facebook could mean the applicant’s account could be so full of red flags that it had to be deleted.

Slate.com Advice Columnist, Emily Yoffee, wrote in an advice column that young people shouldn’t date anyone who isn’t on Facebook.

‘If you’re of a certain age and you meet someone who you are about to go to bed with, and that person doesn’t have a Facebook page, you may be getting a false name. It could be some kind of red flag,’ he says.

Yoffee points out that these judgements don’t apply to older people who were already productive adults before social media became widespread.

The tech news site Slashdot summed up Der Taggspiegel’s story about social networking as ‘not having a Facebook account could be the first sign that you are a mass murderer.’

It points out that Holmes, who is accused of killing 12 people and an unborn child and wounding 58 others at a movie theater in Aurora, Colorado, and Breivik, who murdered 77 people with a car bomb and mass shooting, did not use Facebook and had small online footprints.

More:
http://www.dailymail.co.uk/news/article-2184658/Is-joining-Facebook-sign-youre-psychopath-Some-employers-psychologists-say-suspicious.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+C2C-InTheNews+%28Feed+-+Coast+to+Coast+-+In+the+News%29

MoJo Article that Facebook Censored

This is a pretty old post, but this article kept getting censored by Facebook and led me to give up on Facebook totally as a means of communication. It was termed “Abusive Content.” I feel a crackdown in the form of cyber-security act is behind Anonymous’ future attack against Facebook. It would be like Facebook and Anonymous were two arms of the same animal. That animal wants control of the internet.

Should Obama Control the Internet? | Mother Jones

Should Obama Control the Internet?
matrixobamamaster.jpg

A new bill would give the President emergency authority to halt web traffic and access private data.

Thu Apr. 2, 2009 12:33 PM PDT

Should President Obama have the power to shut down domestic Internet traffic during a state of emergency?

Senators John Rockefeller (D-W. Va.) and Olympia Snowe (R-Maine)
think so. On Wednesday they introduced a bill to establish the Office of
the National Cybersecurity Advisor—an arm of the executive branch that
would have vast power to monitor and control Internet traffic to protect
against threats to critical cyber infrastructure. That broad power is
rattling some civil libertarians.

The Cybersecurity Act of 2009
(PDF) gives the president the ability to “declare a cybersecurity
emergency” and shut down or limit Internet traffic in any “critical”
information network “in the interest of national security.”

Should Obama Control the Internet? | Mother Jones

Analysis of Esoteric Iconography used by ‘Anonymous’

Anonymous Solar Cult Symbolism

Solar Cult Symbolism and "Hive-mind" Agenda

The intent of this essay is to analyze the images and symbols used by the group known as “ANONYMOUS” and to understand the implications of the messages encoded within their logos and communications.  Anonymous claims to operate without leadership and has been participating in major world-wide political events including the 2009 Iranian Elections and the Occupation of Wall-Street in 2011.  Some insiders in “AnonOps,” which provides communications platforms for the group, have issued contrary statements :

A former AnonOps member wrote:

“From the f [-] ing beginning (during the hack at Aiplex which started Operation Payback) there has been an secret club, an aristocracy in AnonOps, deciding how operations will play out in invite-only channels.

It’s obvious, for they control the topic, the hivemind, the guides, every single thing behind the scenes…

Nate Anderson

It is important to understand that AnonOps  is not Anonymous. AnonOps provides the communication platform for Anonymous. It is also important to understand that, in the scope of national politics,  if one controls the media, one controls the country. Control of AnonOps is control of Anonymous.

Because of Anonymous’ radical effect on international affairs we feel it is necessary to determine if there is an ulterior agency operating in the group, either from the inception of the group or through infiltration, and exactly what is the aim of that agency.

[Anonymous is] the first Internet-based superconsciousness.

—Chris Landers. Baltimore City Paper, April 2, 2008

The term esoteric is used here in the sense of  information known only to initiates. The public teachings of the church help people get along with each other (or help them know who to go to war with) but the church also has an esoteric (hidden or occult) side known only to the inner circle of initiated priests. Secret societies often encode esoteric symbols into their public documents in order to communicate information beyond what can be interpreted from the language alone.

The Laurel Leaves – Empire

Laurel Wreath Comparison

Masonic, United Nations, United States Senate, and Anonymous Laurel Wreath Configurations. Notice in the US Senate Seal the bundle of sticks with axe, or Facses, the origin of the word fascist.

Laurel leaves are a leaf from a plant that when chewed, release toxins that cause a psychotropic affect.  Ancient soothsayers and prophets used it to bring on a trance for mediation and prophecy…In ancient Greece Laurel was sacred to Apollo…

Apollo is a solar deity.

Roman Generals fought for years and conquered lands covering thousands of miles just for the honour of returning to Rome and receiving the laurel wreath as a mark of his great victory.

The History of the Laurel Wreath

Throughout history the laurel wreath was a symbol of affiliation with the Roman Empire or a reward for contributing significantly to The Great Work, which is nothing short of the manipulation of all political institutions, media, and churches  in order to control the masses and coerce the population into serfdom. Important to the occult aspects of these social experiments is that the participants of the ritual must be fully informed and willing to cooperate with the major players’ plans. The way they inform us is through symbolism, which our educational system trains us to ignore as non-essential to getting a job. Or, in other words, symbol literacy interferes with the process of using people as means to the establishment’s ends. The ruling elite assume that we are their property and must consent to their will. It is particularly pleasing to these players when the people ask to be subjugated.

What the laurel leaves tell us in the language of symbolism is that the organization associates itself with the Solar Cult and with other groups under the same wreath . Notice that the U. N. features the leaves surrounding the northern hemisphere indicating that the program of the U. N. is to place all nations under one rule, a hive-mind, and that the hemisphere is split into 33 divisions.  Please also note: The Anonymous globe is presented and divided into two stacks of 18, 6x6x6. The grid pattern reflects the checkerboard floor of the masonic tracing board, which means that every person has his assigned space on the board and move to play in the ruling elite’s game.

The symbolism of the laurel leaves on its own doesn’t hold much evidence, but it was the trigger for this investigation.

The Headless Man – Hive Mind, Truncated Pyramid

"Sic Semper Tyrannis" Thus always to tyrants, a favorite among conspirators including Marcus Junius Brutus, John Wilkes Booth, and Timothy McVeigh. The phrase was recommended by George Mason to the Virginia Convention in 1776, as part of the state's seal.

The bee and the hive have long been symbols of industry and regeneration, wisdom and obedience, with a place in Egyption, Roman and Christian symbolism. The hive is often seen in Masonic illustrations of the 18th and 19th century and both Clovis and Napoleon adopted the bee as their symbol.

Excerpt – Grand Lodge of British Columbia & Yukon

The bee is important in Masonic symbolism as a view of humanity as one hive-mind with no identity belonging to the human unit at all. The term E Pluribis Unum (out of many, one), which appears on the Great Seal of  The United States, is another expression of this psychopathic hive-mind faceless utopia: a future where people won’t need their heads because all the thinking has been done for them. Note that on the example on the right the orientation of the pentacles indicating a Luciferian (Solar cult) alliance and is also the symbol of the Masonic Order of the Eastern Star.

The headless man reflects the truncated pyramid of The Great Seal of the United States.  It communicates that The Great Work is always continuing, never completed. Publicly the truncated pyramid is said to be the perfection of man through the development of his intellect. The esoteric (inner, hidden, occult) meaning of this symbol is that it represents the hierarchy of the Masons. The fact that the cap stone is removed from the rest of the structure says that whoever controls the group at the top levels is beyond the group itself and to reach this level from the ranks is impossible. Furthermore, the curious nature of the all-seeing eye seems to indicate that the top levels of hierarchy exist beyond the world of matter or that the controlling faction may be non-physical entities. But for the purpose of this comparison of the article we will accept the public explanation of the icon as a representation of the unfinished man and the capstone as the intellect.

Freemasonry is formed into three basic lodges: the Blue Lodge, the beginning step which is divided into three stages or degrees; the York Rite, composed of ten more degrees; and the Scottish Rite with its total of thirty-two degrees of initiation. The invitation-only thirty-third degree represents the human head atop the thirty-three vertebrae of the back. This is the highest publicly known degree.

Jim Marrs

Thus a headless man may indicate that the group is ignorantly acting under the control of unknown entities and these entities are communicating to each other, through symbolism, that Anonymous is one of their pet projects.

The Tie – That Binds

Masonic Tie

Masonic Tie with hidden Skull and Bones. The Skull and Bones fraternity historically has had connections with CIA.

Activist anti-establishment groups with no leadership tend not to wear ties. It is interesting that the headless man (puppet) sports this symbol of bondage when the members are convinced they are all acting according their own will. Psychologically this could be interpreted as an attempt by the group to identify  with its oppressors to avoid harsh discipline. It means to say, “See, we’re a lot alike. Stop beating me.”

In the case of Anonymous the tie may be a symbol of Fraternity.

“The Masonic fraternity teaches the illusory goal that all who are initiated into its ranks are bonded by the “Mystic Tie” of fellowship. Of course, this is allegory, and yet the necktie does seem to have a special place in Masonic lore and symbology.

It is believed that both the bowtie and the traditional necktie are of Masonic symbolic design. The necktie has two triangles descending, a larger and a smaller. It is tied into a “knot” at the neck, signifying solidarity and unity. The neck itself, as a part of the human anatomy, represents the virtue of sacrifice. In terms of the secret order or secret society, it symbolizes sacrifice of the individual to the common good of the organization.

The necktie is also seen as a bridge to two other triangles — those of the shirt collar. All of the triangles, on the tie and on the shirt collar, have their point, or spear, downward, toward the realm that is the controlling force of Masonry.”                                                                                             –Click here for Source

The Manner of Dress for Initiation into the Blue Lodge of Masonry

The necktie is also evocative of the Masonic Cable Tow, the symbol of fraternity and servitude. To the subconscious, the words cable and cabal are nearly identical.

The tie on the headless man of Anonymous is the rope around the neck in the Blue Lodge initiation ceremony, the collar the  master tugs, and the rope the initiate is hanged with should he betray the Lodge’s trust.

The Question Mark – Mystes

Brazen Serpent

The Brazen Serpent, looking much like a question mark. The serpent is emblematic of Pythagoras, hero of Masonry.

“After passing successfully through the tortuous passageways, with their trials and dangers, the candidate received the honorary title of Mystes. This meant one who saw through a veil or had a clouded vision. It also signified that the candidate had been brought up to the veil, which would be torn away in the higher degree. The modern word mystic, as referring to a seeker after truth according to the dictates of the heart along the path of faith, is probably derived from this ancient word, for faith is belief in the reality of things unseen or veiled. ”

Click here for Source

The question mark implies mystery. Mystes is the root for the word mystery. If the headless man (puppet) is the truncated pyramid then the question mark is the all-seeing eye, the puppeteer. The shape of the question mark is serpentine, a favorite symbol of illumination among initiates.

The question mark has evolved from the latin qvaestio which simply meant question. O is the 15th letter of the alphabet and Q is the 17th. O makes a nice solar symbol and the circle, when there is a point in the middle, represents the earth’s path around the sun.

Egyptian hieroglyph wj Phoenician qoph Etruscan Q Greek Qoppa
V24
PhoenicianQ-01.png EtruscanQ-01.svg GreekQ-01.png

The Semitic sound value of Qôp (perhaps originally qaw, “cord of wool”, and possibly based on an Egyptian hieroglyph) was /q/

Wikipedia

The Fabian Society

Wool refers back to veil symbology; “to pull the wool over one’s eyes.” The Fabian Society, whose purpose is to advance the principles of democratic socialism and which the reader may remember from the video about bees, utilizes wool in its iconography of the wolf in sheep’s clothing. This means there is something  different within these organizations than what can be perceived from without.

The question mark is the unknown serpent puppeteer, the wool over the eyes that conceals the wolf. It is the organizing element controlling the hive-mind, the all-seeing eye, and the completion of the Magnum Opus.

Skull and Bones – Men of Fire

To most people this is the symbol of the pirate, and for Anonymous it represents a free exchange of copyrighted media. Pirates were the lap-dogs of aristocracy. While they traveled the waters they robbed and subjected natives to ready the lands for foreign occupation.Pirate set up universities and fraternal systems to reward psychopaths and prevent people who would oppose the system from achieving any influence.

Pirates (“Men of the Fire”) introduced pubs/bars as a way to keep the locals drunk and therefore passive. They sacrificed many. They stole, killed, raped and pillaged their way to…voila…be among the first to colonize America and discover the so-called “Ivy League” universities. They weren’t dumb, just filled with murderous passion and, of course, they were well financed by outside groups (most notably the Tudors).

Michael Tsarion

One such fraternity is the Skull and Bones, whose members include US presidents and CIA operatives. The image of the skull and crossed leg-bones is a major emblem of Masonry and the Knights Templar and supposedly conveys the transitory nature of mortality.

Solar Cult – Mystery Schools

Rays of Sunlight and the motto "Because none of us is as cruel as all of us."

A staple of the Mystery Schools, which determine significant aspects of the Illuminati, is solar worship. The Sun is at the center of every religious method of control. The Sun is the center of the Christian cross, the halos of the Saints, SOL in Solomon’s temple, RA in Israel.

Religious Imagery – Oldest Trick in the Book

Anonymous man stands crucified: A popular subliminal technique to trigger a strong emotional response.

"Eve" and the Serpent. Another blatent appeal to the subconscious.

Solar Rays and the Tudor Rose

Sub Rosa – Covert Operation

During the wars, many of the inns and hostels in the Yorkshire countryside had roses carved in the ceiling panels and beams of the bar rooms. Warlike matters discussed “under the rose” were treated as being very sensitive and not to be repeated to others under pain of death. Under-the-rose came to be accepted as a security classification and the term “Sub-Rosa” was used extensively to denote matters regarded as what one might call secret up to the early part of the twentieth century. Winston Churchill continued using the terms Sub-Rosa up to the start of World War II.

The symbol is now used extensively within countries of the former British Commonwealth, as well as those remaining in it, to denote a professional intelligence organisation.

The Intelligence Study Centre

More recently, “sub rosa” activities have become a byword for covert operations, usually by security services.

Wikipedia

Guy Fawkes – Failed Jesuit Conspirator

Protester in Guy Fawkes Mask and (Templar / Pirate) Ship's Wheel

The mask was made popular by a motion picture, V for Vendetta. The historical Guy Fawkes was a catholic who got involved with The Gunpowder Plot. After his execution England began to celebrate Guy Fawkes night where they would burn an effigy of the man,  but this was just a veiled continuation of the Wicker Man ritual.

Wintour introduced Fawkes to Robert Catesby, who planned to assassinate King James I and restore a Catholic monarch to the throne. The plotters secured the lease to an undercroft beneath the House of Lords, and Fawkes was placed in charge of the gunpowder they stockpiled there. Prompted by the receipt of an anonymous letter, the authorities searched Westminster Palace during the early hours of 5 November, [note that Bill Cooper was murdered Nov. 5th, 2001. -ed.] and found Fawkes guarding the explosives. Over the next few days, he was questioned and tortured, and eventually he broke. Immediately before his execution on 31 January, Fawkes jumped from the scaffold where he was to be hanged and broke his neck, thus avoiding the agony of the drawing and quartering that followed.

Wikipedia

It’s hard to imagine why this man is so revered. However, the Jesuits have sharpened their conspiratorial skills in the last few centuries and they can be found, usually with the CIA,  at the center of some of the world’s most horrific events.

Peter-Hans Kolvenbach, the General of the International Military Order of the Society of Jesus, commonly known as “the Black Pope”, ordered the attack on the World Trade Center and the Pentagon on Tuesday, September 11, 2001, with the advice and consent of his General Staff, composed of five assistants (each representing a hemisphere and under whom are many advisory Provincials), an advisor (resembling the likes of a military commander to warn him of any faults or mistakes), and his confessor (to ease his conscience and absolve him of his many sins).

Click for Source

“I know first hand that the Vatican controls and monitors everything in Israel with the intention of destroying the Jews,” said Bishop Bouffard, adding the true purpose of the Jesuit Order is to orchestrate and control all leaders of the world in order to bring about a major worldwide conflict which will eventually destroy America, the Middle East and Israel.

Click for Source

Keep in mind that the Ku Klux Klan is the only other well-known group that hides behind masks in their public appearances.

Conclusions

What deductions can be inferred from the data related in this study of symbols?

Scenario One – “Coincidence Theory”

Every image used by Anonymous was chosen because ‘it looked cool at the time.’

Scenario Two – “Ambiguity Theory”

Anonymous is aware of the symbolism and is choosing to use it satirically, artistically, or as camouflage. (Don’t think we don’t appreciate the irony of this report appearing under DisInfoBahn’s bar-coded flag of the all seeing eye.)

Scenario Three: “Illuminati Theory”

There is an element at work in Anonymous that is using the group’s participants, who are doing good work, to further the agenda of the Illuminati. Remember that the fabled fruit is from the tree of knowledge of good and evil.

For example: If a church sets up a soup kitchen for the purpose of controlling the hungry and the homeless, then ultimately the charity isn’t doing much good. The people that serve the soup are engaging in beneficial activity, but they are being manipulated by nefarious conspirators. Masonry, too,  is a tool that can be used for either freedom or enslavement. So it is for Anonymous.

We agree that Anonymous members are right to take down Facebook (the data-mine of the fascists), and that Wall Street should be occupied by anarchists. But what good is it if one covert government agency attacks another? Is that not the definition of a false-flag attack? The result would be a government crackdown on people’s rights to freely communicate, which is a big goal for the Illuminati, a perfect example of the Hegelian Dialectic.

We are willing to speculate that Anonymous could be used to activate Project Monarch subjects or another mind control project. Anonymous members may find themselves blamed for the actions of CIA-funded murderers if life-supporting infrastructure is hacked and disabled.

This group may well be part of “The Second Matrix.” Anonymous fulfills the need to rebel against the System while satisfying the objectives of the System. People are made to feel that they have been initiated into an exclusive cabal and that they are smarter than the average citizen. They are offered a ready-made “online revolution package” while the New World Order quietly collects data on Anonymous members, some of who may dabble in revolution with less conviction than they have for maintaining their virtual farms. This data is used to trap people into working for the Illuminati, or it is saved to ruin people’s lives in the future. It is pure COINTELPRO (Counter Intelligence Program),  which historically has been successful in subverting well organized activist groups with strict hierarchies. A group “without leadership,” like Anonymous, should be fairly easy to infiltrate.

The information you share with Anonymous could wind up in anyone’s hands. Be very careful with this group, and especially with AnonOps:

Take everything AnonOps says with a grain of salt. They’re putting out lies and not telling the whole story.

“Owen [who helps to shape the conversation and planning in IRC]  has […] told me that he doesn’t really give a sh[-]t about freedom of speech..”

Click here for Source