Our Motto

  • Let informed People decide govt policy directly. Support Meritocracy.
  • Aspire to be a Common Sense Extremist.
  • Noble causes founded in Good, always matter.

MY PROMISE:  I will not bow to government or vested Big-Biz interests.


Manipulating Human Frailty: Tools of the Deep State

2 mins reading time. (441 words)

Adjunct to: CE5Blog Article:1-Feb-2019 – CE5 #18 … under sub-heading:

Cold Reality. And Methods to Overcome the Control Matrix

Despite the realization that Everyone and Everything IS being digitally monitored, people MUST still open their eyes. They SHOULD still speak out. It STILL requires little risk or courage. So long as you have a thick skin and can weather some social ridicule or humiliation. Our job is to build everybody else’s awareness of this truth.

The Deep State NEEDS us to be divided to conquer. But switching off the TV (which is a weaponized propaganda tool), and instead talking, CAN unite people.

Youtube & Facebook censorship makes it difficult to now upload a video that can go viral and take down a government overnight. But that doesn’t stop the Woken from using BitChute.com, Bit.Tube.com D.Tube, Minds.com, or Beatzcoin.io …

Its true! As people get older, they DO tend to believe conspiracy theories, and are more conducive to speak up. As people get older, and master their egos, they’re also wiser. The quick wispy ‘intelligence’ of youth gives way to slow but sincere pragmatism. There’s less chasing of this shiny thing or that. Less ‘fractured focus’. Less distraction/pull by the dreaded hormones. Less friends to offend. Less expectation to conform to, and less ‘fashionable bullshit’ to defend. Older people are like rocks. Young people are like butterflies. Let the two not battle!

Evidence of the power of Wisdom (Age) over Intelligence (Youth), is everywhere. Just look, for example, at which individuals and groups in modern society who find themselves Abandoned or Marginalized or Attacked by mainstream society. They are the same ones targeted/labeled as The “Old”, The “Conservative”, the “Extremists” who are simply “People-That-Act-With-Singular-Purpose”, the “Constitutionalists” (freedom of speech, & freedom to bear arms), the “Religious”, the “Yellow-Vesters”, the “Conspiracy Theorists”, the “Activists”, The “Non-Conformists”, and the “common sense fundamentalists”. If the Deep State cannot socially engineer ways to turn these people into a NON-Threat, then it will label them as Terrorists.

To oppose the Deep State, we should NOT RUN AND HIDE from it. But at the same time, we do NOT need to attack and publicly cut down every piece of information AND dis-information that disagrees with our current world view. It is enough to BE WARY of possible disinformation. But more to the point, people must still listen to it all, build an OVERVIEW, understand but not be wildly needful to COMMIT to any new theory that jumps up.

In due course, as a researcher becomes wiser and more experienced, they can ascribe appropriate MERIT/CREDIT to any two competing theories or theologies. By discerning carefully, and avoiding emotional investment, they can patiently help teach others WITHOUT wrongly committing to some misguided belief system that could lead anyone astray.

PsychoTronics and Modern Warfare

3 mins reading time. (821 words)

Adjunct to: CE5Blog Article:1-Feb-2019 – CE5 #18 … under sub-heading:

PsychoTronic Warfare

The prevalence of psychotronics should not be underestimated.

Psychotronic plans & techniques have been described by Zbigneiew Brzezinsky in his past books. (E.g. “The Grand Chessboard”), and
acknowledged by the work of psychologist and propagandist Edward Bernays, Nevertheless, many of these systems have been in development since before WWII with Herman Gorring’s NAZI Propaganda Ministry,

The Social Engineering side of these projects imported to the West
and developed since then included MKUltra, Modern Advertizing, Mainstream News and Media ‘spin’, Operation Mockingbird, and the work of the UK’s Tavistock Institute who worked on ‘Social and Human Relations Studies’.

The counterpart to the “Social Sciences” has been Electronic technologies including Voice-To-Skull Synthetic Telepathy (perfected around 1992 according to CG’s whistle-blower source in the U.S), and Microwave / Radio frequency. Note; Today, however with the advent of 5G that employs hundreds of Military Patents developed over decades for warfare purposes, many of these technologies will no longer remain covert, but have been developed into highly sophisticated weapons systems under the banner of “psychotronic technology”.

The technologies have undergone heavy development, been weaponized, and been deployed by the Deep State across Modern and Western Societies as mass population control tools.

Today’s expression of these control systems is Big Brother Google, and its full-spectrum data collection. Using its algorithms, and its A.I. on quantum computers, it openly declares that it allocates design and CPU resources and towards ‘tracking’ and ‘profiling’, and ‘managing’ pretty much every person on the planet. We see the results of this in the predictive programming of the population, their thoughts and even their expectations.

This MKUltra (Mind Kontrol) Agenda is primarily leveled towards Targeted Individuals (“T.I’s”), who – on paper – have the potential to organically disrupt Deep-State agendas. This is especially so today, since it is simple for One’s YouTube video go viral and thereby affect the consciousness of tremendous numbers of people. It is crucially important for the Deep-State to nip-in-the-bud ANY grass roots uprisings, or threats to the status quo, by using tried-and-true tactics as first described in Sun Tzu’s 5th Century BC work called “The Art Of War“. I.e. to ‘Divide and Conquer’.

Note: Current and future members of any CE5 organization like ours should not be surprised if they, too, become Soft or Hard– Targetted-Individuals (T.I’s). OR, if they are not so already, become the subjects of occasional Gang-Stalking programs. It is suspected by the writer that even our own MD has probably been a T.I. victim, both last year, and today.

These T.I. programs operate by finding existing proclivities, and psychological vulnerabilites within individuals, and also into the weaker inflexion points in the social fabric between individuals of a group or society such as those in a CE5 groups. Then the Ti.I algorithm injects aggravating agents, and tribally dissociative thought forms into such groups (through advertizing, and through Facebook, Youtube and Netflix PlayLists) in order to weaken the group’s cohesive integrity.

Questions as to the “popularity” of these techniques often arises. How prevalent are they with Deep State/CIA/NSA as at 2019?. Moreover, would they be able to monitor a large proportion of the population? How extensively?

CG responds to this question by suggesting that these control systems are currently applied against everyone. Sorry to say; but this is your Reality Check! Even the seemingly “small fry” or “irrelevant” non-threatening members of the population. We are all given a ranking and assigned a ‘terror risk score/status’.

Although a single one-to-one Watcher/Spy analyzing each other member of the public isn’t economically feasible, because the Deep State doesn’t have enough physical resources. Nevertheless, using meta-data collection, Google / Facebook algorithms, and A.I., monitoring, collecting EVERY individual’s digital footprint is no longer implausible. SO instead of being monitored by individual Prison Wardens, the AI simply monitors everyone simultaneously.

The ‘Population Control Matrix’ is actually based on a broad FEAR PSY-OP. This causes only a FEELING / PERCEPTION they are being watched. This is ENOUGH to make people feel paralyzed and avoid acts of Civil Disobedience. Its VERY effective!

There is (at least) some Good News

In some ways, if the Masses understand how this system works, it can be very empowering. You see, although it means the Deep State flags everyone, it is primarily only a DIGITAL Prison. People aren’t corralled physically, just digitally.

By having Google etc. cleverly offer real-time dynamic responses to people’s digital / online activities, people PERCEIVE a Panopticon

Yes, they may FEEL monitored. And FEEL like their YouTube Watchlist can predict what they’re thinking. But this is still just the VENEER of control.

Yes. Matrix-wide Control Laws ARE being put into place. But the actual ENFORCEMENT of those laws still seriously lags behind in real world practice. So empowered individuals who understand this matrix can still be useful in their efforts to oppose Deep State tricks by Whistle-Blowing, Reporting, openly rejecting, and undertaking other acts of Civil Disobedience.

Note to Self: Crowdfunding aint the same as an Online Petition


3 mins reading time. (655 words)

Adjunct to: Online Petition : “Australia – Immediate Stop to 5G Roll-Out”

“Stop-5G” petition. Apology & re-issue.

Hi Guys; First. after the hassle with the “Stop 5G” petition instigated on Change.org … I am trying to re-group and find a simple/honest petition website. Secondly; Thanks to all for support.

I now understand more clearly about Petitioning -vs- Crowd-funding. Some websites masquerade as Petition Sites. But have ways of taking people’s money nonetheless.  Here are some crowdfunders https://mashable.com/2011/03/14/social-good-fundraising-tools/#vFwV7ZphaOq6 .

Anyway. As promised, I have finally found the well-hidden page ON Change.org itself that allows for those previous DONATORS who now wish to CANCEL any payments or subscriptions they may have signed up for (i.e. money being taken out of their credit card) to cancel those subscriptions.

Please click below HERE to go to that Subscription Cancellation CHANGE.ORG page.

The replacement (unsullied) Petition site is HERE

P.S. If you wish, you can see what the email between myself and Change.Org Technical Support, click CONTINUE below.

Continue reading “Note to Self: Crowdfunding aint the same as an Online Petition”

5G – No point for moratorium on roll-out

1 min reading time. (330 words)

Adjunct to: Online Petition : “Australia – Immediate Stop to 5G Roll-Out” under sub-heading:

How to Protest

PLEASE NOTE, that we Petitioners conclude that seeking a moratorium is NOT ENOUGH to stop 5G. Simply DELAYING a 5G rollout pending “more research” is counter-productive.

Our recommendation is, instead, to DEMAND immediate cancellation and a FULL STOP to the 5G deployment based on legal Public Policy grounds of “Citzen’s Right to Health and Safety”.

Here are the reasons WHY:

  • Because, like Big Tobacco, Big Pharma, Big Agri-Business, Big Oil, and Big Arms Manufacturers, we now, unfortunately, have a “Big Tech & Telcos”. They are huge powerful companies, power, flushed with money from the Tech Boom. And they are HERE, NOW, forcing the public hand. These companies spend billions and also scramble to ‘not be left behind’. So they have a real sense of urgency with this roll-out.


  • We’ve all seen it happen over and again. When Multinational Cartels experience public push-back over Public Health or other concerns, they risk being sued. SO, they just lobby governments, and buy-off hundreds of scientists to create skewed or non-committal Industry Studies. They then hire lawyers, bribe politicians, and stealthily place compromised ‘key people’ into government agencies. In this way, they create a swimming pool of ‘reasonable doubt’ to corrupt proper debate, and indefinitely spare themselves from law suits for damages or criminal negligence claims. Meanwhile, 5G and IoT development continues.


  • The Cartels’ well-worn strategy of “buying time” CANNOT be allowed to play out. As the Telcos start to make any profit from 5G products, their strength grows. Public’s dependency on the internet also grows. In the past, people become foolishly hooked on drugs, or dopamine, or habits, and then cannot go back.  Whether we are talking about Smoking, Pharmaceuticals, Oil Fuel dependency, or in the tacit condoning of War through mainstream media normalization. If people become DEPENDENT on 5G or the IoT then Sorry, but it’ll be TOO LATE.  .

5G – component techologies of its advanced DSP


2 mins reading time. (350 words)

Adjunct to: Online Petition : “Australia – Immediate Stop to 5G Roll-Out” under sub-heading:

The technicalities of 5G Tech

As at Feb 2019, here are some of the new DSP (Digital Signals Processing) technologies verified to be part of the 5G System.  Although DSP for modern WiFi, 2G, 3G and 4G have incrementally begun to implement prototypes of one or two of the below technologies, 5G is expected to deploy the entire gamut of them, and more.

According to Wikipedia, I summarize the component technologies of 5G as follows :-


  • Smaller Cells. To operate efficiently through rain, vegetation and buildings, a 5G Wireless Access Point (‘tower’) must be relayed every 150m.


  • Massive MIMO. Multiples more antennas. With higher density of channels on each. And each with multiple transceivers (Input & Output) for higher load capacity. It will offer Full-Duplex (synchronous two-way) data transfer. So that’s full symmetric upload and download speeds.


  • Beam-Forming, Precise triangulation of all signals. And narrow High-power transmissions that focus on, and track or target your device in 2D environments, and with FD-MIMO, can also do 3D (Vertical Tracking)


  • Beam-tracking: One data source can bounce off multiple hard surfaces. So partial or reflected beams can each be co-ordinated to reach the target together. Multiple transmitters can, similarly, track direction/movement of a target for the same result.


  • Radio Convergence. Aggregating of Wifi, 2Ghz-5Ghz, 3G mobile, Cellular 4G-LTE, signals, and using Distributed-RAN, by licencing multiple Radio Frequencies to access the full spectrum of all current RF. And create a worldwide Grid of interconnectivity.


  • NOMA. (Non-Orthagonal Multiple Access). Allowing each end-user device to access multiple signals, from Multiple-redundancy sources, to get fastest (low latency) transmissions. (Ie;. Same data signal, but with multiple simultaneous pathways, exploiting multiple co-existing infrastructure and spectra, to reach you most quickly).


  • SDN/NFV. Software-defined networking. Cloud and Virtual base Radio Network management. To improve local or network-wide congestion, and performance, by monitoring data traffic at the smaller to mid-level re-transmission nodes.
  • Channel Coding/ Polar Code Algorithms . Employing high level mathematical algorithms to ensure data signals are routed to most reliable pathways.


Obama launches 2,800 strikes on Iraq, Syria without congressional approval


Nearly 3,000 strikes in Iraq and Syria to date

President Barack Obama pauses while speaking at the Office of the Director of National Intelligence's (ODNI) 10th anniversary at ODNI headquarters in McLean, Va., Friday, April 24, 2015. The president told members of the intelligence community that he appreciates their service and understands they don't take their work lightly. (AP Photo/Pablo Martinez Monsivais)

President Barack Obama pauses while speaking at the Office of the Director of National Intelligence's (ODNI) 10th anniversary at ODNI headquarters in McLean, Va., Friday, April 24, 2015. The president told members of the intelligence community that he appreciates their service and understands they don't take their work lightly. (AP Photo/Pablo Martinez Monsivais)

– The Washington Times – Monday, April 27, 2015

U.S. forces have now surpassed 2,800 strikes against targets in Iraq andSyria under President Obama’s war against the Islamic State, all as part of a conflict Congress has yet to specifically authorize — and amid worries lawmakers won’t ever act.

Under intense pressure from Capitol Hill, Mr. Obama finally submitted a draft authorization for the use of military force against the Islamic State in February, but it’s since languished, caught in the stalemate between those who want tighter restrictions and those who want the president to have as free a hand as possible.


Now analysts worry that inaction will set a dangerous precedent and leave Congress shorn of its warmaking powers.

“I understand it’s unlikely that they’ll act, but it’s important for them to act,” Shoon Murray, an associate professor in the School of International Service at American University, said last week. “It does take away the war powers of Congress by Congress‘ own deference.”

The U.S. military has been conducting strikes in Iraq for 10 months, and began striking directly at targets in Syria last September as part of Mr. Obama’s announced campaign to degrade the capabilities of the Islamic State.

This past weekend’s attacks brought the total to 1,458 strikes in Iraq and 1,343 in Syria by U.S. forces. Coalition forces allied with the U.S. have conducted another 655 attacks on Iraqi targets and 95 in Syria.

Mr. Obama has justified the attacks under his commander in chief powers and under the 2001 resolution authorizing force against al Qaeda, and the 2002 resolution authorizing the ouster of Saddam Hussein in Iraq.

Some lawmakers on Capitol Hill have said Mr. Obama is stretching those laws and that the strikes could be illegal — though they say they want to put them on firm footing by passing a new authorization.

But first Mr. Obama balked at sending up new war language and, when he finally did, the split on Capitol Hill became clear: The draft authorization was too aggressive for some, chiefly Democrats, who wanted tighter restrictions on ground troops. But it was too narrow for hawks, chiefly Republicans, who would prefer the president to retain all options.

“Obviously, it is not going anywhere,” Sen. John McCain, Arizona Republican and chair of the Senate Armed Services Committee, told Defense One last week. “The proposal was not enough for those on the left and way too much for those of us who believe that the Constitution says the president is the commander in chief.”

Sen. Bob Corker, Tennessee Republican and chair of the Senate Committee on Foreign Relations, which would consider the authorization, told reporters last week that he is starting discussions to look for a bipartisan path forward, but will not bring it up if partisan debates on the authorization could give the impression that lawmakers are divided on fighting the Islamic State.

Political analysts said the stalemate is bad for Congress, which is granted the power to declare war under the Constitution, while the president is granted the powers of commanding the armed forces.

“You have this structure of checks and balances in place. The problem is, it’s not being followed,” said Chris Edelson, assistant professor of government at American University. “The system depends on each institution asserting its power, and that’s not happening.”

The president, in his February draft, requested authority to use military force for three years, allowing the administration to strike the Islamic State anywhere in the world, though the use of ground forces outside of limited roles like advisers or search-and-rescue is prohibited.

Complicating matters is the 2001 authorization to use force against al Qaeda, which would remain in effect. Since the president has argued the current war is legal under that authorization, which has no endpoint, even the expiration of a new authorization against the Islamic State wouldn’t necessarily halt the war.

That leaves the administration free to pursue its war without having to get new permission from Congress.

Mr. Edelson said it wasn’t long ago that Congress did flex its war powers. When Obama wanted to strike Syria to stop the Assad regime in 2013, enough lawmakers publicly demanded first Mr. Obama seek their permission that he backed off his plans, creating space for Russian President Vladimir Putin to broker a deal.

Congress has shown it is capable of asserting itself,” Mr. Edelson said.

For Mr. Obama, his unilateral stance is also an about-face from his time as a senator, when he argued Congress needed to keep the president from acting unilaterally in declaring war, Mr. Edelson said.

“The president does not have power under the Constitution to unilaterally authorize a military attack in a situation that does not involve stopping an actual or imminent threat to the nation,” Mr. Obama said during a 2007 interview with The Boston Globe.

“As president, unfortunately he doesn’t follow that approach,” Mr. Edelson said, noting that the president has conducted unilateral strikes in 2011 in Libya before his campaign against the Islamic State.