God bless you and keep you from harm, this day and forever.
>>15256318 (pb)
Not that any of these facts are true, but the main Obongo Library narrative, 1) is that the cult does NOT have the 850 million required to build the library.
The secondary narrative concerning the Obongo library 2) is that is is private The Obongo wing of the pedo cult is, as usual, preparing for an anticipated swindle of tax paying citizens.
1) Days after City Hall signed legal papers to clear the way to build the Obama Presidential Center in historic Jackson Park for what was seen as a $700 million project — of which $500 million was for “hard costs — the Obama Foundation on Tuesday revealed the price is likely more.
https://chicago.suntimes.com/columnists/2021/8/17/22629390/obama-center-cost-foundation-funding-michael-jordan-george-soros
Unlike all other presidential libraries Obongo's is a ptivate
2) The (Obongo) Presidential Center is unlike most other presidential libraries. Firstly, the Presidential Center is run by the Obama Foundation, a private nonprofit.
All other presidential libraries and museums going back to Herbert Hoover are run by the National Archives and Records Administration, .
Some skeptics (lol) fear this privatization opens the door for partisan interests to curate what is meant to be a public archive.
CHILDREN'S DEFENSE FUND
#PEDOVORE SUPERSCAMS#
Children's Defense Fund is the largest active, satanist pedovore organization with nationwide grooming/recruiting operations ongoing (6/12/2019) under multiple program names such as; "Freedom Schools," "Beat the Odds" "Faith based programs" and many others.
https://cdfca.org/programs/beat-the-odds/
Search the Q research archive for the vast load of data on Children's Defense Fund and their Pedowood/Clinton Foundation connections.
https://qresear.ch/
High functioning psychopathic pedovores, the "biggest names in Hollywood" among them, formed the sham charity back in the 1970s to provide continuous access to children and vulnerable youth under charitable cover or pretext.
The pedovore's phony Children's Defense Fund solicits tax free charitable donations but their activities are largely funded by Federal and State tx dollars. Fund raising and political lobbying are carried out by an ever-changing cavalcade of Pedowood satanists, the biggest and brightest stars, the most powerful studio bosses.
The satanic predators running our new and entertainment industry use sham charities, foundations and museums to support a whole range of criminal activities. Children's Defense Fund is used for money laundering, drug trafficking in addition to providing a secure supply of child victims for ritual sexual activities and human sacrifice.
TLdr
One of the biggest charities enjoying broad support in the Entertainment Industry is "Children's Defense Fund" a charade operated by popular and beloved show business figures and political celebrities to access children the sham charity pretends to protect. "Children's Defense Fund" is a vehicle for satanist pedovore predation and other criminal activity.
Children's Defense Fund is a worldwide, satanist pedovore child trafficking and money laundering scam operation. CDF has
branches in Africa, Asia and the ME, and runs multiple programs in impoverished, minority communities throughout the US.
Do not let these baby sit:
https://www.childrensdefense.org/about/leadership-and-staff/staff/
Children's Defense Fund
An original Hilldawg(tm) Swindle
All pedos. All the time.
When in doubt, arrest!
- Joeseph Fouche
Minister of Police
For the French Republic, the
Directorate and the Empire.
Fake disease, fake vaccines, fake variants, fake theories, fake technologies all mean the plandemic is a fake subject promoted by shill posts to terrorize NPCs. Our entire information environment is so contaminated with lies and unrecognized historical errors that is is impossible to determine the truth or falsity of any information circulated on the cult controlled networks.
satanists love the art, museum, foundation business - for good reason. Art can have any assigned value. An art market can be created overnight in a previously unknown artist like Keith Haring. This makes art/museums antiquities a perfect way to move money around, while, at the same time, promoting inventory or stock-in-trade, art, as a store of long-term value.
A painting is worth what you say it is if you're the Getty Museum, the Hammer, the Broad, the Norval, the Huntington or the whatever-cult-tycoon is pretending philanthropy and laughing at us as we reverently troop through their art gallery front operation. There's another good, valid and unholy reason satanic cult con artists like to use art galleries foundations and museum cover structures as operational fronts.
In the case of art we've been POWERFULLY conditioned never to seriously question art. Anyone who says "my kid could do that- " is culturally defined as an idiot. Only an ignoramus questions art. We’ve been taught this in movies and sitcoms, we've been told a hundred ways, a thousand times: only vulgar and uneducated people criticize art. Philistines. Prudes. Hicks. Yokels. Furthermore, we are taught that art is a specialist area, and if we aren't specialists or insiders, we couldn’t possibly have anything worthwhile to say and we ought keep our crude thoughts to ourselves and our boorish mouths shut around what we don’t understand; because art is sacrosanct; the sacred self-expression of the individual.
Decades of this powerful conditioning allowed Pedosta's fat brother Tony to pose for a multi-page spread in a glitzy DC magazine with his daemonic sculpture of a gilded homosexual torture victim and with pictures of abused children in bizarre ritual locations. ART. The same conditioning protects Marina Abramovic and the crowd of stars” and celebrities" photographed eating an art corpse soaked in honey at an art event. It’s ART. The pedovores are rightfully confident in the powers of our conditioning to protect them that they licensed photos of themselves with forks stuck into the honeyed art corpse to be published in art & fashion magazines, blogs and supermarket tabloids. The honeyed corpse is a gnostic occult ritual. https://en.wikipedia.org/wiki/Mellified_man
Why do satanist pedovores parade their pathology in front of us? When we see Tony Pedosta, John “Skippy” Pedosta’s brother's sculpture we do not understand consciously what we are seeing is a gold leaf covered model Dahmer’s homosexual torture victim. What effect does seeing something we don’t consciously understand or necessarily recall having seen have on us?
A lot. This is the “secret” of the effectiveness subliminal and subsonic embed programming. Words and images we don’t know that we’ve seen are perceived by the unconscious component of our minds. We know this because tests using subliminal embeds not consciously seen still raises our blood pressure, increases our pulse rate, and fMRI studies show that these unperceived influences activate portions of the brain associated with memory and emotional trauma. We do understand sex and death images unconsciously and traumatic images are retained in memory below the threshold of conscious awareness to influence our future behavior over time. Images of sex and violence in unconscious memory affect us like PTSD caused by real world exposure to rape, torture, child pornography or physical trauma.
Information War or IW operations target the unconscious mind. This “witchcraft” works best when we are not aware of images we’ve been exposed to subliminally or even that we are being targeted at all.
Sculpture of Dahmer’s torture victim is presented at galleries and in publicity as fashionable, highly sought after, rare and precious work collected by knowledgeable, prominent people like Tony and John Pedosta.
satanist’s social subversion/sabotage operations exploit our strongest social conditioning. Art world institutions, galleries and foundations are trumpeted as the highest form of philanthropy and criticizing them is not just foolish it’s ungrateful. Art is a satanist controlled industrial market. Since the days of Bernard Berenson art has been used to create and launder money to authenticate forgeries and to smuggle antiquities. Big art shows and exposition are used to emotionally prime us for coming events, to predispose individuals and groups to adopt preferred attitudes, practices or behaviors in a multitude of social dimensions; while, at the same, generating enormous profits, tax breaks and (through school outreach programs) providing access to children.
https://www.artforum.com/diary/linda-yablonsky-at-the-la-moca-gala-29517
https://www.crazydaysandnights.net/2018/07/blind-items-revealed-14_5.html
http://washingtonlife.com/2015/06/05/inside-homes-private-viewing/
No information circulated over anonymous insecure networks, built to intelligence agency specs, as the internet was, can be trusted.
The internet was designed to be irremediably insecure by intel agencies to facilitate illicit commerce and permit universal surveillance and psychospiritual control.
We've exposed overt lies propagated by legacy media, but less evident, more serious, damage is done silently, by subliminal embeds, subsonics and influence technologies which manipulate memory and perception by hypnotic induction and implanted suggestions – processes which mostly happen below the viewers’ threshold of conscious awareness.
Anyone can inject toxic self-replicating material into media content streams over anonymous insecure networks. Network user’s cognitive autonomy and physical security depend on the integrity of the network which serves to connect them as much as it does the integrity of the content producer.
Our internet is not only insecure by design, it is irremediably insecure by design. It doesn’t have to be that way, but it is that way.
Civilization rests on identity and advanced computational civilization rests on identity-over-networks. We need to know to a high degree of assurance who originated our email, who runs what appears to be a merchant or bank website and who owns, transmits, and produces our news and “entertainment” media content to know whether to trust that website, entertainment or media content.
A high percentage of the data we receive is not only network delivered but network sourced, and a news story will contain generations of layered error and inherited assumptions. When unrecognized errors accumulate in our circulating information supply, (news and entertainment content) our ability to make good decisions is gradually degraded. We make social and economic decisions based on what we assume to be facts - and the unrecognized errors in that data produce errors of ever-increasing magnitude. This not a hypothesis, it’s an axiom, and is cited by John von Neumann in “Computation and the Brain” JvN’s never completed final work.
We know technologies exist which permit precise control of individual and group information environments. News feeds, display ads, forum topics and visible response; all can be individually curated to produce predictable effects on a targeted individual or group.
Civilization, community and commerce all rest on identity, and we have no assured anonymity (by design) on the spy-built internet. Nor would we give up our real anonymity (if we had it) for the sake of secure networking. We don’t have real anonymity on the internet, though people who use C_A’s TOR mix net and proton mail users think so.
There are righteous reasons for anonymity and for that reason assured elective anonymity must be integral to the information system of the future.
How do we get both – assured identity AND anonymity on the same network without compromising either?
We the People need trusted networking to reliably distribute information that is real and true and important, information every person needs to make informed decisions. We the People’s decisions can be no better that the information they are based on – and right now they are based on accumulated MSM deceptions and psychological operations whose objective is terror.
In order to be secure FOR all, the internet must be secure FROM all, including the people who build it.
That's why an open, international program is essential, and why an information distribution platform or network is a UTILITY. It can never belong to a private company or a nation state entity. It MUST belong to its user’s information is a substance as essential to us as water and its purity is equally important.
DIG MEME PRAY
The owners of the major media companies don't just protect pedovores, they are '''the architects and operators’’’ of the mass mind control system, the social engineers, the mind poisoners.
Many of our fellow citizens are so trapped in pseudo reality created by legacy media news and entertainment content they will never escape. We call the brainwashed “NPCs,” but they're victims of legacy media information poisoning.
We think we can watch legacy media news and entertainment content safely, that it won’t and hasn't hurt us… but it has. We've heard more lies about the world than we can remember. Those unremembered lies are the basis for important assumptions we make, about who is a friend and who's not, about what we do in our spare time and what we dream of for our children.
We've been exposed to hundreds of thousands subliminal images, subsonic induction, ultrasonic brain state modulation, images we’re not aware we even saw of sex hate death greed, all of which influence our behavior, creating a form of unrecognized PTSD, which victims often project outward as hate.
Legacy media has gradually, over decades reduced the common vocabulary and amplified the violence, venality, selfishness, greed and overt occultism in programming.
Hundreds of thousands of Americans suffer physical symptoms, increased blood pressure, respiration, perspiration and pulse – people shake, stutter at the mention of the name of a man they have never met. A man they know only from the thousands of negative stories about him in every media, every hour of every day on every conceivable media platform. The physical symptoms are a psychogenic illness produced nonstop adverse IO, cultist Information Operations, aka psyops.
By gradually reducing our vocabulary and simplifying discussions legacy media has gradually reduced our cognitive capacity and normalized bizarre fetishes and psychopathology; moral subversion is a recognized tactic of unrestricted war; lifetime exposure from infancy means that many of us are no longer able to understand what is happening to us.
Legacy media protects satanist pedophile occultists, ignores massive evidence, discredit and slanders honest researchers, elevates fake experts to debunk perverts like Epstein, and scandals like Pizzagate, the Presidio, Keating S&L perverts, and dozens of other similar scandals equally serious and always dismissed as "satanic panic" which is now the approved explanation for the McMartin preschool scandal in Los Angeles.
There, at McMartin the children described ritual abuse, but. as always. the the Daily Beast assures us is an hallucination
https://www.thedailybeast.com/what-fueled-the-child-sex-abuse-scandal-that-never-was
DIG MEME PRAY
Joe Biden was installed by MI as fake POTUS to wake NPCs up with bizarre actions and the break MSM's grip on the minds of Americans.
Biden isn't POTUS.
Anons know he isn't POTUS, the cult knows Biden isn't POTUS and MI knows he isn't POTUS.
As soon as enough NPCs wake up Joe Biden will not be the pretend POTUS any more either.
If we like having a fake president, a day player tier actor who feigns brain injury, then we can just keep behaving like Joe Biden's a real president, as the pedo cultists on MSM tell us he is every day.
If we DON'T want a fake POTUS, then we stop watching and listening to MSM , we stop discussing the cult's talking points. We stop replying to shills and stop treating what is fake as if it were real.
DIG MEME PRAY
What happens when a country develops ideologically or ethnically segregated information distribution systems - news and entertainment?
Segregated information systems are inherently partisan, they select for facts and interpretations favorable to the ethnicity or ideology of target audience. Partisan networks select for and amplify Fear Uncertainty and Doubt. (FUD)
The control of information systems was critical to initiating violence in the Balkans. People had lived in peace there for generations. Muslim, Christians, Jews all intermarried in Sarajevo and everyone was related; a great deal of trust been built up. People resisted the cult's effort to inculcate hate. Eventually false flags slaughters and agressive ethnic posturing forced most people to chose a side. Lies were all that was left.
In Yugoslavia criminal cult con artists used the local ethnic news systems supported by multiple false flags and so-called "active measures" to create the mutual fear uncertainty doubt necessary to initiate the Balkan civil war, which in turn was the pretext for the cult's first worldwide, MSM partnered multi-hundred billion dollar "humanitarian aid" the 4 year long looting of the compassionate, unwitting public.
These conditions - ideologically segregated news and 'entertainment' networks - mean that there exists no common set of facts for We the People to disagree over the interpretation of.
It becomes impossible to tell what is real, true and important from what is trivial, false and malicious.
Such conditions must inevitably arise from all insecure anonymous networks. This is an axiom not an opinion.
Anonymous insecure networks (like the internet) permit the deniable injection of false information at every level.
Civilization rests on identity and secure communications. The internet provides neither.
Our anonymous, insecure internetwork connects the most ruthless and sophisticated criminals in the world to everyone else, anonymously, while allowing credible spoofing of identities.
The results of that are obvious, just as the pedovore cult now is. Only an identity based network with assured anonymity can protect us and our data and assure our future liberty and survival of a constitutional republic by instantiating our rights into its operating protocols.
Sword of Damocles
Was the name of Ivan Sutherland's first VR rig, developed in connection with Air Force research into simulations for training, they say.
Regardless it was computer vision technology, animation and display format which would pave the way for the machine intelligence our civilization is now irreversibly committed to, and entirely dependent upon.
-
Side
Virtual Reality can be an excellent learning environment easily adapted to distribute large amounts of true, complex knowledge (education/training) to millions of people concurrently.
-
Side
VR is also the most powerful and dangerous mind control technology ever created
New VR headset designs have the form factor of sunglasses and project an image onto foeveal surface of the eye at a wave lengths beyond the eye's capacity to resolve.
[the foeva is a small depression in the retina of the eye where visual acuity is highest. The center of the field of vision is focused in this region, where retinal cones are particularly concentrated.]
This technology will make it impossible to distinguish visually between real material world objects' and digital objects and animations with which they're intermingled in Mixed Reality.
https://medium.com/@mikenseer/retinal-projection-a-tantalizingly-real-future-of-vr-9bb1fdfc26af
Is this technology safe?
Most of the development is by cult controlled enterprises (Big Tech) which makes VR and MR (mixed reality) technologies likely potential weapons.
Because MR and VR deliver two streams of visual information which are rendered in the visual cortex to produce perceptual 3 D material reality it is trivial to introduce large amounts of information into a user's mind below the threshold of conscious awareness.
This technology is powerful like other exponential technologies it may benefit all mankind enormously or in the wrong hands, used over an insecure network like the internet, it could usher in a new dark age of enslavement for mankind in a matrix more powerful than popular culture the cult employ for that purpose today.
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.
Traffic analysis /meta data can tell everything about an individual without ever knowing real world identities. Where we shop, how we vote, and if we vote, why and for whom. If a subject's real world identity matters, it is trivial to 'unmask' and identify by name, social security number or any other registry system.
But there's no reason to care about our real-world identities. An opponent doesn't need to have a name to manipulate an individual news feed and to provide specially prepared media content that will prompt the target to voluntarily choose a given course of action - to act and think in ways harmful to that individual and the community they are part of.
Media news content can make us angry or sad, stimulate us sexually, make us recall old grievances, encourage us to drink or take drugs, make us feel more threatened by, or less conscious of, race, religion and economic status. Using out metadata allows marketers and digital enemies to modify that news and media content that shapes our beliefs and forms our understanding of the world.
To defeat traffic analysis and remove the possibility of this type of control we need to engineer a specific type of advanced network.
An identity based secure network which use a series of specially configured servers called a "mix net" which scrambles the data of millions of users messages at the same time; encrypting, mixing and routing the messages through multiple servers, re mixing and encrypting at each stage, making it impossible for others to determine where a message came from, defeating "traffic analysis."
https://en.wikipedia.org/wiki/Mix_network
(The former data limitation of mixnets has been largely overcome.)
Mix nets are only one component of a secure information distribution system, one that the world needs to secure our common information supply and prevent the most common and widely used forms of surveillance, manipulation and social control.
The chief requirement of a secure network is identity. We need a single, permanent lifetime identity in virtual space for the same reason we need one in the real world.
If our friends or neighbors could switch identities and appear to be someone else in the real world we would not know who to trust.
We'd be surrounded by shapeshifters -like the internet -where there is no fixed or permanent identity. On an anonymous insecure network it is possible to spoof credentials and present a convincing and deceptive appearance to cheat and manipulate others.
We need a single permanent lifetime identity - but we also need assured anonymity.
There are lots of good reasons for someone to want to be anonymous. To make a gift. To blow the whistle on crime. To buy and sell without giving your real-world identity to a merchant who sells it to others.
On a secure "identity based" network it is possible to do everything anonymously - credentials can be split many ways. If an anonymous user wants to offer proof of expertise while remaining anonymous it is possible to do that. We can display credentials and others can see they are real without revealing any more of ourselves.
Networks are not secure for anybody until they are secure for everybody.
We need to build the information system of the future as an international engineering project, so the safety and engineering are open to all the nations who will depend on this infrastructure to support civilization.
We can not allow an enemy to capture our information systems again. The way to prevent this happening is to make the network a public utility owned and controlled by users used to provide media content provided by trusted individuals or companies, unmanipulated by anyone else. Secure for all, because it is secure from all, even the people who build it.
SHILL HARDER
If We the People do not control our communication network(s), then those networks control us; they are what they were engineered to be, a consumer mind control apparatus.
Just as the cult sought and acquired control of the railroad networks and used that hidden control to control to determine which towns and whose businesses would flourish and which would stagnate, it sought control of information traffic for the same reason. To control the future economic development of the world and insure it followed their plan. By setting railroad freight rates the cultists rail networks favored satanic enterprises and thwarted competition. Today by controlling who knows what and when they know it, the cult does the same thing, favoring cult enterprise more efficiently and secretly.
The cult’s subterfuge, disguised ownership and control, corporate shells, special stock classes, and other SOP con tactics disguised the cult’s ownership and control of the railroads. Now, the same system in far more complex forms like “opaque financial instruments” disguises ownership and control of media companies – this is the "hidden hand;" the secret society control systems known as webs.
We the People rely on ideologically partisan networks for information. Since ‘’’ all ‘’’ ideologically segregated partisan networks selectively amplify FUD and suppress facts contrary to partisan narratives, ‘’’ no single set of facts exists for We the People to argue over the interpretation of. ’’’
With no trusted information supply, in the middle of a multi polar information war, there is no method to determine which information is real, true and important and which is trivial, false and maliciously intended. How do we make decisions when ‘’’all’’’ information is corrupt and controlled?
.
Computational civilization rests on information. The better, more accurate, the information, the less error it contains, the better a society performs by measures like the rate at which new, objectively true scientific knowledge is created.
Civilizations which fail to set a high value on information integrity for all citizens, are inevitably tyrannies where deception is the rule; communities which cannot, and do not, survive as advanced computational civilizations must subside into barbarism, and ultimately, into collective, instinctual animal life.
Civilizations which set the highest value on the accuracy and integrity of their information supply view truth as a sacred, know that error correction and secure networking are essential to the maintenance of the life of all advanced, computation dependent civilizations.
The deep integration of computation into every sphere of human endeavor has supercharged our science and taken our civilization to an unfamiliar place, beyond material limitations, where the rules, God's rules, are the rules of the universe, and have their ultimate and mysterious source in the timeless properties of natural numbers.
DIG MEME PRAY
Look, the author of the 'newsweek' article is a seditious cultist rat.
>Arkin led Greenpeace International's research and action effort on the first Gulf War, being the first American military analyst to visit post-war Iraq in 1991, and the first to write about cluster bombs and about civilian casualties and the cascading effects of the bombing of electrical power.
>Arkin was also founding member of the Arms Project of Human Rights Watch and wrote their first comprehensive report on cluster bombs. He then provided an analysis of the causes of civilian casualties after the Kosovo war (1999). Arkin has also visited war zones in the former Yugoslavia, Lebanon, Afghanistan, Eritrea and Israel on behalf of governments, the United Nations and independent inquiries.
>From 1985 until 2002, he wrote a column in the Bulletin of the Atomic Scientists called the "Last Word", and co-authored a bi-monthly publication by the Natural Resources Defense Council called the "Nuclear Notebook."
https://en.wikipedia.org/wiki/William_Arkin
Newfags…
We love you, but -
Do NOT reply to shills
Do NOT demolish their intentionally flawed arguments
Do NOT debate their idiotic "concerns"
Do NOT engage shills.
Do NOT participate in chat room shill KAYFABE
In professional wrestling, kayfabe is the portrayal of staged events within the industry as "real" or "true", specifically the portrayal of competition, rivalries, and relationships between participants as being genuine and not of a staged or predetermined nature of any kind.
https://en.wikipedia.org/wiki/Kayfabe
Do NOT perpetuate shill SLIDES.
Do NOT reply to shills.
Do NOT pick up spit
If you are NOT sure, LEARN to ID shills
shills = hate
shills = labels
shills = repetition
shills = envy, greed, theology etc.
Do NOT correct intentional shill mistakes
Do NOT be triggered by shill taunts
do NOT eat bats off the street
Do NOT bark back at dogs
Spot a clown
Dealing with ye Clowns & ye Shills
>>2322789 Spot a shill
>>2323031 Spot A Clown
shills have no agency, no will independent of their masters. Shills are passed gas of history. The slave of the slaves, their words are writ upon water.
DIG MEME PRAY
Each of us, consciously or unconsciously, adopts one of two moral systems by which the world is divided.
One is that "the ends justify the means" - that cheating, scamming, lying and misleading others is moral, as long as the objective is moral.
The other moral system holds that "the end does not justify the means" and that no objective. however noble or worthy, is worth violating our moral principles and the rights of others to achieve.
Our actions are shaped by our belief in one of these two great moral systems. For this reason the mathematician Vladimir Lefebvre erected his formal mathematic theory of Information War, The Algebra of Conscience on the framework described.
Lefebvre showed that if we know which moral system the TA uses it is possible to provide the TA with prepared information packets that will cause the TA to voluntarily preform any desired behavior - whether it's purchasing a product, voting for a politician or committing genocide.
If we're unfamiliar with the operational tactics of IW we will be pushed around by the cult lies or decide because one side is lying the other must be telling the truth.
The cult controls the middle by controlling both sides of the argument.
Legacy Media shills
MSM media shills are not just covering up for common criminals, they are covering up decades of crimes against children.
MSM media shills had ample reason and repeated opportunities to investigate Pizzagate and dozens of similar previous scandals.
MSM media shills not only failed to investigate but actively covered up, campaigned extensively to suppress and to discredit the evidence others uncovered, defaming honest researchers, making them objects of scorn, ridicule and contempt.
MSM media shills did this in both dramatic entertainment and in news content across multiple platforms; all while knowing the stories about the traffic in and ritual sexual abuse of children were and are true.
“I didn’t know,” is not a valid or feasible defense for MSM media shills. Our enemies have exposed themselves and the contemptible kayfabe of legacy media.
We the People are awake.
Justice is coming
DIG MEME PRAY
>National Center for Missing and Exploited Children (front)
>Children's Defense Fund (Front)
>Podesta/Alefatis Pizzagate
>Dan Schneider/Pedowood
>Epstein Sex Island/Blackbook
>Pentagon Child Porn Servers
>Oakland County child murders
>Peter Scully Dark Web Child Torturer Live Streamer
>The Franklin Coverup/BoysTown Ring
>Drasius Kedys Pedo Ring
>Chilean Senator Pedo Ring
>North Fox Island Child Killing Ring
>Madeline McCann Disappearance
>Brooke Shields Child Actor
>Cardinal George Pell Vatican Ring
>Colonel Michael Aquino Pedo Cult
>G4S Security Human Trafficking
>Dyncorp Human Trafficking
>Dolphin Square Ring
>Planned Parenthood Organ Trafficking
>Jersey Island Child Killings
>Elm Guest House Ring
>UK Grooming Gang Police Cover up
>Clinton Hitlist
>Clinton Haiti Child Trafficking
>Joe Biden Child Groper
>McMartin Pre-schoolRing
>Presidio Military Daycare Ring
>Dutroux Affair Coverup
>Israeli Resort in Colombia tied to sex trafficking
>NXIVM Sex Cult
>Pennsylvania 300+ Priests Pedo Ring
>Sandusky Pedo Ring
>Roman Polanski Scandal
>Jared Fogle "Subway" Pedo Ring
>MJ Scandal
>Savile Scandal
>Oprah's School For Girls Abuse
>JonBenet Photographer Child Abuse Arrest
>The Finders Cult
>Tuam Church Child Mass Grave
>Lanarkshire Orphanage Child Mass Grave
>Dozier School for Boys Child Mass Grave
>Nancy Schaefer CPS Assassination
>Andrew Breitbart Podesta Assassination
>Boko Haram Girls Michelle Obama
>FBI Ted Gunderson exposes child trafficking
>Muslim Child Training Camp Cover up
>Portugal Elite Sex Ring
>Brazil Celebrity Spirit Healer Pedo Ring
>Tucson/Cemex Trafficking Camp
>Italy Foster Care Pedo Ring
>Norway Pedo Ring Bust
>15257678
NPCs STAND BY
MAJOR DOCTORS DOCTOR ANNOUNCEMENT COMING!
OFFICIAL MEDICAL ANNOUNCEMENT
NPCs WE THE DOCTORS OF MEDICINE HAVE DETRMINED THE RONA IS OVER! YOU MAY RESUME WATCHING NETFLIX AND PORNTUBE WE APOLOGIZE FOR THE INCONVENIENCE
Dr. Dave Doctor MD, PhD, BfD.