Anonymous ID: 5d13f4 July 15, 2022, 12:36 p.m. No.16739230   🗄️.is 🔗kun   >>9330 >>9411

 

even low IQ shills know you can't indict collective nouns and that there is no attainder for treason by corruption of blood.

 

schillers and dog-faced demons know nothing of this. why should they, they're minions who sell their mediocre services for kennel ration and flea meds.

 

Clause 2

The Congress shall have Power to declare the Punishment of Treason, but no Attainder of Treason shall work Corruption of Blood, or Forfeiture except during the Life of the Person attainted.

 

https://www.law.cornell.edu/constitution-conan/article-3/section-3/clause-2#:

Anonymous ID: 5d13f4 July 15, 2022, 12:44 p.m. No.16739267   🗄️.is 🔗kun   >>9799

 

"An odd word that recurs obsessively in the Bible, where it appears in forty passages: "Burn their Asherah in the fire and cut down the idols of their god", "Cut down their Asherah and burn their idols in the fire." How many times and with what stubborn vehemence, does Yahweh enjoin his people. Asherah designates a goddess, the partner of Baal. And at the same time certain sacred poles, which were worshiped. Asherah is a name that condenses within itself the abomination of idolatry. Yet for a long time, until the reign of Manasseh, it happened that "the objects that had been made for Baal, for the Asherah, and for all the heavenly host" were housed inside the temple for Yahweh. For Israel, the perennial risk was that the house of Yahweh still contained the altars of other divine beings. Hence Manasseh "made his son pass through fire and practiced astrology, and magic and dealt with familiar spirits and wizards: he wrought much wickedness in the sight of the LORD, to provoke his to anger. "

Anonymous ID: 5d13f4 July 15, 2022, 12:50 p.m. No.16739295   🗄️.is 🔗kun   >>9313

THE RUIN OF KASCH

 

a story about the fall of the richest kingdom on earth, collected in marketplace of Khartoum by the 19'th century English explorer and ethnographer, Sir Richard Francis Burton.

 

25' 07"

Anonymous ID: 5d13f4 July 15, 2022, 1:11 p.m. No.16739444   🗄️.is 🔗kun

Dr David Chaum wwas a leading figure in the crypto wars with NSA and the others who wanted to keep crypto from the peonage.

 

Chaum also invented the first digital currency.A believer in democracy and personal freedom from surveillance corporate and government Doc Chaum has developed and secure computational infra structure that currently runs over the internet just like the fake honeypot systems run by the spooks.

 

Secure messaging, high performance block chain apps and a bunch more in the pipeline.

 

Anons who are interested in secure alternative solutions to the highly corrupt digital sewer of the internet will find this of great interest.

 

Ultimately the only viable solution is to have an internet be a utility, owned, controlled and operated by its users. In the mean time formal assurance of privacy of limited transactions (social and financial) can be had at xx network.

 

wonder what that URL cost?

 

Overview

 

https://xx.network/overview/

 

Technical Forum

 

https://forum.xx.network/

Anonymous ID: 5d13f4 July 15, 2022, 1:29 p.m. No.16739549   🗄️.is 🔗kun

Remote and ineffectual shill

That dared attack my president

With that poor weapon, half-impelled,

Unlearnt, unsteady, hardly held,

Unworthy for a tilt with men—

Your quavering and corroded pen;

Shill poor at Bed and worse at Table,

Shill pinched, shill starved, shill miserable;

Shill stuttering, shill with roving eyes,

Shill nervous, shill of crudities;

Shill clerical, shill ordinary,

Shill self-absorbed and solitary;

Shill here-and-there, shill epileptic;

Shill puffed and empty, shill dyspeptic;

Shill middle-class, shill sycophantic,

Shill dull, shill brutish, shill pedantic;

Shill hypocritical, shill bad,

Shill furtive, shill three-quarters mad;

Shill (since a man must make an end),

Shill that shall never be my friend.

Anonymous ID: 5d13f4 July 15, 2022, 1:32 p.m. No.16739574   🗄️.is 🔗kun

Eckart Tolle and other charismatics “stars” or “celebrity influencers” like Oprah, Werner Erhard ('est'), Tony Robbins, Alan Watts, Billy Graham, Deepak Chopra - Huxley – Al Crowley L Ron ‘Mother’ Hubbard etc ALL rely on hypnotic induction, contagion and repetition to modify individual belief systems; altering short and long-term goals as well as emotional states. Memory matrixes employed are similar to the matrixes used in MK Ultra color-coded alter systems. The organizing principals of some hermetic forerunner memory systems are described here:

https://en.wikipedia.org/wiki/The_Art_of_Memory

 

Individuals who use the memory systems are sometimes capable of extraordinary feats of memory, more so if the techniques make use of a number of compartmentalized identities, possible if trauma was used to create distinct “alters” or separate, autonomous personalities or ‘virtual selves.’ (Each alter can have discreet memories)

 

After Giordano Bruno was burned, public discussion of memory systems became “occult” and the few natural philosophers who continued to explore such knowledge practiced secrecy and used coded language.

 

https://en.wikipedia.org/wiki/Giordano_Bruno

 

The satanic bloodlines use childhood trauma conditioning as a teaching aid, producing high functioning offspring with ‘alter’ identities with the mental capacity and ruthlessness necessary to compete with the other bloodline families and to maintain a families’ dominance over the sheep, and, by doing so, control of its own destiny and the destiny of mankind.

 

Sinister charismatics, Tolle, Marianne Williamson, Tony Robbins L Ron Hubbard and hundreds of other cult leaders command relatively high-level programming skills which allow them to reprogram individual belief systems (including their own) with some facility. Is this done to “make people happy” and help realize untapped potential? Or to build human bot nets of controlled, compliant individuals who share similarly modified realities?

 

Gurus, “influencers,” “motivational speakers” who recognize their ability to control others and to ‘’’permanently alter beliefs, behaviors and preferences’’’ soon figure out how to deploy and monetize their talents via a marketing strategy where converts recruit new customers.

 

https://www.ted.com/talks/tony_robbins_asks_why_we_do_what_we_do?language=en

 

Charismatic / hypno-sexual programmers flourish and do their business openly because we don’t like to talk about how suggestible, how easily influenced and persuadable, we humans truly are.

 

Mass hypnosis uses a technique called “shock induction” to create a compliant, suggestible public in the wake of false flag terror attacks, like 911, and in the media induced panic We the People will readily sacrifice hard won, longstanding constitutional liberties in exchange for promised security against further false flag attacks.

 

The power and reach of media content psyop tactics in tightly networked populations is so great that only direct action by the power of the US military, the executive branch and the Ultimate power of the Living God, could hope to prevail against it.

 

DIG MEME PRAY

Anonymous ID: 5d13f4 July 15, 2022, 1:34 p.m. No.16739591   🗄️.is 🔗kun

If We the People do not control our communication network(s), then those networks control us; they are what they were engineered to be, a consumer mind control apparatus.

 

Just as the cult sought and acquired control of the railroad networks and used that hidden control to determine which towns and whose businesses would flourish and which would stagnate, the cult sought control of information traffic for the same reason. To control the physical, or today, information networks, is to control future economic development of the nation or world. By setting railroad freight rates the cultist’s rail networks favored satanic enterprises and thwarted competition. Today, by controlling who knows what, and when they know it, the pedovore cult does the same thing, favoring cult enterprises more efficiently and secretly.

 

The cult’s subterfuge, disguised ownership and control, corporate shells, special stock classes, and other SOP con tactics disguised the cult’s ownership and control of the railroads. Now, the same system in far more complex forms like “opaque financial instruments” disguises ownership and control of media companies – this is the "hidden hand;" the secret society control systems known as webs.

 

We the People rely on ideologically partisan networks for information. Since ‘’’ all ‘’’ ideologically segregated partisan networks selectively amplify FUD and suppress facts contrary to partisan narratives, ‘’’ no single set of facts exists for We the People to argue over the interpretation of. ’’’

 

With no trusted information supply, in the middle of a multi polar information war, there is no method to determine which information is real, true and important and which is trivial, false and maliciously intended. How do we make decisions when ‘’’all’’’ information is corrupt and controlled?

.

Computational civilization rests on information. The better, more accurate, the information, the less error it contains, the better a society performs by measures like the rate at which new, objectively true scientific knowledge is created.

 

Civilizations which fail to set a high value on information integrity for all citizens, are inevitably tyrannies where deception is the rule; communities which cannot, and do not, survive as advanced computational civilizations must subside into barbarism, and ultimately, into collective, instinctual animal life.

 

Civilizations which set the highest value on the accuracy and integrity of their information supply view truth as a sacred, know that error correction and secure networking are essential to the maintenance of the life of all advanced, computation dependent civilizations.

 

The deep integration of computation into every sphere of human endeavor has supercharged our science and taken our civilization to an unfamiliar place, beyond material limitations, where the rules, God's rules, are the rules of the universe, and have their ultimate and mysterious source in the timeless properties of natural numbers.

 

DIG MEME PRAY

Anonymous ID: 5d13f4 July 15, 2022, 1:35 p.m. No.16739607   🗄️.is 🔗kun

The use of an array of tactics to baffle the perception in conflict is not new, nor is the strategy confined to the human species. Predators who exploit the perceptual deficiencies of prey are common in nature. As human hunters wear camouflage, spread scents and simulate game calls to imitate prey animals, Paussid beetles forge chemical signals, blinding ant species they prey on to their presence among them in the nest. A famous human group employed similar tactics. Hasan ibn Sabah’s Assassins.

 

Ibn Sabah allegedly learned his art of mind control from priests of the mysteries in Egypt, but whatever the origin of the tactics, the Assassins used hypnotic induction, symbolism, stage magic and drugs create a belief system which insured 100 % loyalty and instant compliance with leader’s instructions.

 

Nation state rulers have great difficulty securing large numbers of people willing to die on command.

 

Hasan al Sabah’s Assassins prospered for 300 years and spread their agents through the middle east because they could create fanatically loyal adherents who would raise families, live amongst the opponent for 30 years, and remain ‘’’instantly obedient to leader’s orders – even when ordered to commit assassinations certain to result in capture and execution.’’’

 

Some beetles are walking organic chem labs, they synthesize explosives, chemical warfare agents, sex changing molecules –‘’’ read and write the language of the victims perceptions.’’’

 

"Ant-nest beetles (Paussus) are the quintessential Trojan horses of the insect world. ‘’’They hack the complex communication system of ants, allowing them to blend into the ant society and be treated as royalty, all the while preying upon the ants and the ants' brood and duping the ants into rearing their young. ‘’’

 

How would we transpose this pattern. To what other species might this apply?

 

…Here we present results of the first molecular-based phylogeny of ant-nest beetles, which reveals that this symbiosis has produced one of the most stunning examples of rapid adaptive radiation documented to date.

 

‘’’A very successful strategy. ‘’’

 

Human beings perceive only a narrow band of visible light wave lengths and hear only a narrow range sound frequencies. Not one human in a million recognizes the large blind spot in the middle of our visual field until it is demonstrated. We never suspect our senses are not all there is, or other species could possibly take advantage of our limited perception.

 

https://www.semanticscholar.org/paper/Explosive-Adaptive-Radiation-and-Extreme-Phenotypic-Moore-Robertson/64f28dbf2f4c4ed67578ed3ac63a92da68c02801

https://www.britannica.com/science/blind-spot

 

DIG MEME PRAY

Anonymous ID: 5d13f4 July 15, 2022, 1:42 p.m. No.16739644   🗄️.is 🔗kun

 

Do not be trigger by shill taunts. They're shills for expletives sake. They get paid for your replies.

 

Do not be a maudit newfag and do not reply to shills.

Anonymous ID: 5d13f4 July 15, 2022, 1:50 p.m. No.16739698   🗄️.is 🔗kun   >>9724

MASONIC DIVERSION TACTICS

 

  1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don't discuss it,

especially if you are a public figure or lodge official. If it's not reported, it didn't happen, and you never have to deal with the issues.

 

  1. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues, which can be used to show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the “How dare you!” gambit.

 

  1. Create rumormongers. Avoid discussing issues by describing all charges, regardless of

venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually

exclusive of truth may work as well. This method works especially well with a silent press, because the only way the public can learn of the facts are through such “arguable rumors”. If you can associate the material with the Internet, use this fact to certify it a “wild rumor” which can have no basis in fact.

 

  1. Use a straw man. Find or create a seeming element of your opponent's argument which

you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the

opponent/opponent arguments/situation, or select the weakest aspect of the weakest

charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.

 

  1. Sidetrack opponents with name-calling and ridicule. This is also known as the primary

attack the messenger ploy, though other methods qualify as variants of that approach.

Associate opponents with unpopular titles such as “kook”, “right-wing”, “liberal”, “left-wing”, “terrorist”, “conspiracy theorist”, “radical”, “militia member”, “bigot”, “racist”, “religious fanatic”, “crazy person”, “slanderer”, “sexual deviant”, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.

 

  1. Hit and run. In any public forum, make a brief attack on your opponent or the opponent

position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in online and letters-to-the-editor environments, where a steady stream of new identities can be called upon without having to explain criticism reasoning—simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent's viewpoint.

 

  1. Question motives. Twist or amplify any fact which could be taken to imply that the

opponent operates out of a hidden personal agenda or other bias. This avoids discussing

issues and forces the accuser on the defensive.

 

  1. Invoke authority. Claim for yourself or associate yourself with authority, and present your argument with enough “jargon” and “minutiae” to illustrate you are “one who knows”, and simply say it isn't so without discussing issues or demonstrating concretely why or citing any sources.

 

  1. Play dumb. No matter what evidence or logical argument is offered, avoid discussing

issues with denial they have any credibility, make any sense, provide any proof, contain or

make a point, have logic, or support a conclusion. Mix well for maximum effect.

  1. Associate opponent charges with old news. A derivative of the straw man, usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with. Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually then be associated with the original charge and dismissed as simply being a rehash without need to address current issues, so much the better where the opponent is or was involved with the original source.

 

  1. Establish and rely upon fall-back positions. Using a minor matter or element of the facts,

take the “high road” and “confess” with candor that some innocent mistake, in hindsight, was

made, but that opponents have seized on the opportunity to blow it all out of proportion and

imply greater criminalities which, “just isn't so”. Others can reinforce this on your behalf, later.

Done properly, this can garner sympathy and respect for “coming clean” and “owning up” to

your mistakes without addressing more serious issues.

 

  1. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the

crime and the multitude of players and events, paint the entire affair as too complex to solve.

This causes those otherwise following the matter to begin to lose interest more quickly

without having to address the actual issues.

Anonymous ID: 5d13f4 July 15, 2022, 1:54 p.m. No.16739724   🗄️.is 🔗kun

>>16739698

MASONIC DIVERSION TACTICS II

 

  1. Alice in Wonderland logic. Avoid discussion of the issues by reasoning backward with an apparent deductive logic in a way that forbears any actual material fact.

 

  1. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best for items qualifying for rule #10.

 

  1. Fit the facts to alternate conclusions. This requires creative thinking, unless the crime

was planned with contingency conclusions in place.

 

  1. Vanishing evidence and witnesses. If it does not exist, it is not fact, and you won't have to address the issue.

 

  1. Change the subject. Usually in connection with one of the other ploys listed here, find a

way to side-track the discussion with abrasive or controversial comments in hopes of turning

attention to a new, more manageable topic. This works especially well with companions who can “argue” with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.

 

  1. Emotionalize, antagonize, and goad opponents. If you can't do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how “sensitive they are to criticism”.

 

  1. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the “play dumb” rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon). In order to completely avoid discussing issues that may require you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.

 

  1. False evidence. Whenever possible, introduce new facts or clues designed and

manufactured to conflict with opponent presentations as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with

contingencies for this purpose, and the facts cannot be easily separated from the

fabrications.

 

  1. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the process to your benefit and effectively neutralize all sensitive issues without open

discussion. Once convened, the evidence and testimony are required to be secret when

properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed and unavailable to subsequent investigators. Once a favorable verdict (usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim) is achieved, the matter can be considered officially closed.

 

  1. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or

influence existing ones willing to forge new ground via scientific, investigative, or social

research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.

 

  1. Create bigger distractions. If the above does not seem to be working to distract from

sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.

 

  1. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely.This can be by their death, arrest and detention, blackmail, or destruction of their character by release of blackmail information, or merely by proper intimidation with blackmail or other threats.

 

  1. Vanish. If you are a key holder of secrets or otherwise overly illuminated, and you think

the heat is getting too hot, to avoid the issues, vacate the kitchen.

Anonymous ID: 5d13f4 July 15, 2022, 1:55 p.m. No.16739735   🗄️.is 🔗kun

Take the Infallible Adam Weishaupt Test for Bots

 

Find out if you are a special purpose military golem, script bot, NPC or fugue state shill while there is still time for treatment.

 

Do you condescend to imaginary board users?

 

Are you running a 2021 /pol bot script that was cringe when it was new?

 

Are your efforts to blame others for your personal and professional failures becoming less convincing even to you?

 

Do you enjoy acrimonious disputes with bots and shills?

 

Have you ever been mistaken for a golem, bot or a shill, or called yourself a bitch or Jew by accident?

 

Do other shills make weird noises in the backs of their throats when you walk past?

 

Can you name 10 or more cats from the musical CATS?

 

Can you sustain a hopping, beeping, faux-rage over "news" from social media?

 

Each "Yes" answer is worth 1 point.

 

A total of 1 point or higher means you may be a gay shill and should seek immediate professional help.

 

RxHerr Geheimrat, Doktor Adam Weishaupt, Schillmeister of Ulm, Gottingen, Baden-Baden, Not-so-Baden, Biden-Boden and so on.

Anonymous ID: 5d13f4 July 15, 2022, 1:58 p.m. No.16739759   🗄️.is 🔗kun   >>9769 >>9779 >>9794 >>9819 >>9820

Anonymous insecure networks eventually become so saturated with error and layered deception that it becomes impossible to distinguish what is real, true and important from what is trivial and false.

 

This is not an opinion it is axiom.

 

Insecure anonymous networks will not support advanced computation dependent civilization.

 

The only way a network is secure for all is when it is engineered specifically to be secure FROM all, including those who build and operate it. A network is a utility. Civilization depends, just as individuals depend, on the accuracy of circulating information.

 

Human beings are as dependent on information as we are upon water, and as with water, the purer our information is, the less error it contains, the healthier we are and the better our society will function.

 

The deliberate introduction of error into information systems is a crime against every user of the system. Small lies and big ones kill people every day.

 

Once we rectify our information systems to prevent the anonymous injection of "false witness" we can begin to separate what we know from what we think we know.

Anonymous ID: 5d13f4 July 15, 2022, 2 p.m. No.16739768   🗄️.is 🔗kun

HONKwhere you areHONKwhere you are goingHONKwhen you get there.HONKto bid defiance to the cultHONKfor HOLINESSHONKfor lost homes and farmsHONKfor ULRA MEGA EXTREME DARK MAGAHONKto restore the sacredHONKFor the hornlessHONKfor the childrenHONKfor the wounded, the junkies and elderlyHONKfor GenerosityHONKfor kindnessHONKfor unrigged electionsHONKFor slack-jawed shills at the end of timeHONKfor the curesHONKfor no mo' pedovoresHONKfor plain truthHONKbecause right now it means more than votingHONKfor the frightened, the lost, the lonely, confused and betrayedHONKTo Make America Great AgainHONKbecause anything can happenHONKBecause anyone canHONKSunday, the seventh day of creation.HONKfor squirmin' larvae in hexagonal cubicles.HONKfor a fake UKE war, dawg.HONKfor pedovore smackdownHONKfor ELE number #23HONKfor NPC AwakeningHONKfor 5 Peso gal gasolineHONKfor 12 discrete magnetic polesHONKfor the hornlessHONKFor the hard of horn-ingHONKfor fake celebrities'HONKto infuriate pedovoresHONKto restore meaningHONKfor RevelationsHONKDestruction to the Underground EmpireHONKto chasten the masonHONKfor moreHONKing

Anonymous ID: 5d13f4 July 15, 2022, 2:07 p.m. No.16739816   🗄️.is 🔗kun   >>9821 >>9944

"A STRICT LAW* BIDS US HONK"

 

"Honkanywhere,Honkeverywhere, especially in suburbs home to large numbers of satanic subversives and somnambulist NPCs," advises the Honk anon who supports the worldwide FREEHONKmovement.

 

The FREEHONKmovement is composed of anonymous patriots of every nation, race and religious faith, whoHONK, with truck horns, steam whistles, freighter fog horns, jacked up theramins, steam calliopes, 5D bicycle bells; to awaken the conscience of the guilty and open the eyes of innocents yet asleep.

 

Honk Anywhere, Honk Everywhere

 

"Anyone can jump on the bandwagon, 'cause almost anyone canHONK"

 

"Why should We the People waste time onHONK? What do we have to gain for risking a possibleHONKticket?"

 

#HONKbecause the world's not good enough,#HONKfor gentleness, modesty and respect.#HONKFOR FREEDOM#HONKfor addicts poisoned with cult fentanyl#HONKfor the poor whose faces they grind#HONKfor America#HONKif you'll die trying#HONKto rid the land of pedovores#HONKfor what we lost#HONKto get it back.#HONKand be counted

HONKwhere you are.HONKwhere you are goingHONKwhen you get there.HONKto bid defiance to the cultHONKfor HOLINESSHONKfor lost homes and farmsHONKfor MAGAHONKto restore sacredHONKFor the hornlessHONKfor the childrenHONKfor the wounded, the junkies and elderlyHONKfor GenerosityHONKfor kindnessHONKfor unrigged electionsHONKFor slack-jawed shills at the end of timeHONKfor the curesHONKfor no mo' pedovoresHONKfor plain truthHONKbecause right now it means more than votingHONKfor the frightened, the lost, the lonely, confused and betrayedHONKTo Make America Great AgainHONKbecause anything can happenHONKBecause anyone canHONKSaturday, the sixth day of creation.HONKfor larvae in hexagonal cubicles.HONKfor a fake UKE war, dawg.HONKfor pedovore smackdownHONKfor ELE number #23HONKfor NPC AwakeningHONKfor 5 Peso gal gasolineHONKfor 12 discrete magnetic polesHONKfor the hornlessHONKFor the hard of horn-ingHONKfor fake celebrities'HONKto infuriate pedovoresHONKto restore meaningHONKfor RevelationsHONKDestruction to the Underground EmpireHONKto chasten the masonHONKfor moreHONKing

 

NEVER STOP HONKING #HONK FOR LIFE

 

*God's eternal moral law which governs this and all other universes.

Anonymous ID: 5d13f4 July 15, 2022, 2:10 p.m. No.16739834   🗄️.is 🔗kun

We will engage in most games for a modest financial incentive, for the glory of victory, the traditional reward at the amateur Greek Olympics.

 

Then horses, tripods and gold were added to the prizes, and, inevitably gambling 'made it all more interesting' and stripped athletic competition of any lingering appearence of integrity.

 

Sportsball and other realistic athletic competition is no longer about personal excellence, about grace, but about winning the prize, the money.

 

We compete for baubles of all kinds, for social status, to be told we're better, or somehow different, unique among the millions of others doing the same thing. We are fighting to be part of the story.

 

What happens to the young athlete who discovers his astonishing victory by knockout over the reigning champion was arranged by his management?

 

When he learns that the mob bookmakers control every aspect of his Sport and every other sport, the government, all of it?

 

Is this the kind of revelation that might make a proud man reject his country, its established laws and religion(s) , refuse to be drafted, and convert to Islam

 

Of course it is, it did; and every athlete of any merit knows that the greatest glory is not only fake, it can come with a helicopter crash and a single inoppprtune remark about dark mother Hilldawg and the cultist is swinging by a scarf from the big hall doorknob.

 

Not every mobster is a criminal. Joining an criminal organization, or 'crackpot' religion for protection against the government, against the FBI, another pedovore cult, or predatory MK operators is a matter of survival.

 

Many people join gangs for protection in prison for similar reasons, so many enlist in organizations offering or purporting to offer real or imagined protection.

 

To survive on a prison planet we must avoid being mistaken for prey or predator. Don't act like either, but learn to recognize both and to identify those others, who recognize and choose to ignore the RULES OF THE GAME.

Anonymous ID: 5d13f4 July 15, 2022, 2:16 p.m. No.16739864   🗄️.is 🔗kun   >>9934

 

What the mystic philosopher's say, if that we must not apply a Darwinist filter to human processes. IE to put 200 assembly line workers into competition, select the best and discard the rest. That procedure is the heart of satanism. It is ruthless, extracted and employs a measure that ignores all human value other than the work skills.

 

The future consequences of this practise you are free to imagine.