- TABLE OF CONTENTS
- WAR ROOM -
STUDY - MORAL
ISSUES - KING
JAMES BIBLE - CULTS
Please-- You must read ALL of this page. The beginning is very depressing. The end answers the need from God's Word. I think you will be helped.
On this page we will consider several ways in which the world and Caesar intrude on us and manipulate our lives against our will. We will also consider the possibility that men and devils are now forming leagues to attack the saints as well as sinners. It seems quite possible that the lunatic fringe of Charismatic groups will soon begin to send devils against the saints in the same way witches do this. My comments will be in red so you do not associate me with the actual topics being discussed.
First, I want you to read what the CIA and the US Army are doing. They are now using psychics to gain access to the minds of people. According to Lifetime, Nov,.25, 97, they wanted to use David Morehouse and others in the Army psychic team to use their minds as weapons and attack people at a distance mentally. This would no doubt include efforts to cause people to act against their will and personal standards. David Morehouse, at that point, left the Army and went public. He clearly is NOT a born again Christian-- he is a Mormon. So, we must conclude that he and other Army and CIA teams of psychics are becoming demon possessed in order to benefit themselves and their handlers.
The following interview was taken from George magazine, April, 1997.
With David Morehouse
PSYCHIC ESPIONAGE IS WEIRD - EVEN FOR THE CIA. NOW, A REFUGEE FROM THIS $20 MILLION PROGRAM TELLS RICHARD LAMB WHAT IT'S LIKE TO BE AN OUT-OF-BODY, OUT-OF-MIND, OTHER-WORLDLY SPY.
He served as aide-de-camp to two generals and as a company commander in the elite Army Rangers, and everyone said that David Morehouse was on the fast track to becoming a general himself. But a seemingly assured path to martial glory was brought to a shattering end in the Jordanian desert ten years ago. A training accident left Morehouse subject to unearthly visions and led, so he claims, to his recruitment as a psychic spy for the U.S. Army
As a kooky spook, Morehouse joined the army's deeply obscure "remote-viewing" program, code-named Stargate, a Pentagon and CIA venture from 1972 to 1995 that trained ultraselect individuals to transcend time and space. Such people would, Morehouse says, "view persons, places, or things in time or space and gather intelligence information on the same." As a remote viewer, Morehouse undertook hundreds of missions. They included an astonishing attempt to go back in time to revisit Korean Airlines Flight 007, moments before it was shot down by Russian planes over the Sea of Japan. (He was asked to find out if the plane really did have an intelligence-gathering capability.) Morehouse was also sent to inspect the burning oil wells, lit by Saddam Hussein's Republican army during the final days of the Gulf War, to see if they were a cover for the release of toxic gas by the Iraqis.
Eventually, Morehouse's life in the world of remote viewing became too much for him (the not-to-be-under rated psychic burnout factor working in concert with general angst about the military-political-industrial complex produces its own special paranoia). It derailed his marriage, alienated him from his family, and waylaid his career. In turn, he became apprehensive about Stargate techniques. Encouraged by an angelic vision to "work for peace," Morehouse violated his military security agreement and went public in 1993. He was threatened with a court-martial, though the proceedings were dropped in November 1994 when Morehouse announced that he would resign his commission. Now reunited with his wife and family, Morehouse has helped found the American Association of Remote Viewers, Inc., and has written about his experiences in a recent book, Psychic Warrior. Meantime, remote viewing was axed by the CIA and Pentagon in 1995. It seems that the 20-year program, which might have cost as much as $20 million, was not cost-effective.
Tell me about the persons, places, or things you visited
Here's an example: If there was a new Soviet MiG fighter back in the Cold War days and we wanted to know what that aircraft's capabilities were, well, what better way of finding that out than by augmenting all the other intelligence-collecting platforms with remote viewers. We were asked to target the mind of the test pilot and glean the subtle nuances of what it's like to fly the aircraft - if it's sluggish, is there insufficient power in a steep banking turn ?
Its several thousand miles to the nearest Soviet airspace. What was it like to get from here to there? When I made my separation from the physical body, I would fall through this tunnel of light, and I would feel myself falling and falling, and I wouldn't know whether I was up or down, losing all sight of everything I was in and what my orientation was. And then I would hit a membrane of some sort, pop through it, and find myself in the target area.
And you could then "view" the target?
The image of being there - it can be almost as clear as being in this room. Almost. Never quite as clear as sitting here right now. It's much more fleeting. It's obscured. It's like looking around in a dream state, through a fog.
Was your army career prior to Stargate a successful one?
I was a third-generation army officer. I was the honor graduate of every class I went to. I was the distinguished honor graduate of airborne school, my ranger school as a cadet, and my officer's basic course. The army came very easily to me.
What made you a candidate for the Stargate program?
I was a Ranger company commander, and I was training Jordanian rangers when I was accidentally shot in the head by a machine gun. The round didn't penetrate my skull: It lodged in my helmet. But still its kinetic energy was significant enough to knock me out for a considerable amount of time. While I was knocked out, I had the first of many visions.
How did you feel about this?
Words of angels, the paranormal, ghosts, apparitions - these were definitely not within my worldview, and I had no lexicon to support what was happening to me. So I was a very troubled young man.
Who actually recruited you for the Stargate program?
The command psychologist of the army intelligence unit I was assigned to at the time. He wasn't actively searching for individuals to feed into the Stargate program. However, when I presented him with my nightmares and experiences, he simply had to follow up and tell the Stargate management about me.
Do other countries have remote-viewing programs?
The Czechs, the Chinese, the Russians. Ivan Sokolov [who was, according to Morehouse, head of the Soviet equivalent of Stargate] took the rest of his followers out of the Soviet remote-viewing program and was hired by the Sony Corporation, allegedly as a research and development asset but most assuredly as an industrial-espionage asset.
How did the U.S. program originate?
We found out - and when I say "we" I mean the U.S. government - that the Soviet Union was heavily involved in paranormal research. The CIA then wanted to find out if there was any validity to it. They used hard physical science - not starry-eyed, New Age guru, candleburning, incense-burning, crystal-wearing-type stuff. What came out of this was, yes, people can see remote in time and space and can bring back relatively accurate data.
Have you remote-viewed since leaving the army? You mentioned earlier that you believe TWA Flight 800 was accidentally brought down by a directed-energy weapon similar to a high-energy microwave - technology developed for the Star Wars program.
The navy admits that the USS Normandy, an Aegis Class missile cruiser, was 185 miles away at the time of the accident. According to other sources who have seen the actual satellite imagery, the Normandy was, in fact, 35 miles away. We also know that the plane blew up some 30 miles from Brookhaven National Laboratory and from a secret naval-weapons testing facility that is adjacent to Brookhaven. The speculation we're working with is that the Normandy fired a target drone, which is why people on the shore saw this plume - this slow-climbing missile - arc through the sky Then they fired up a high-powered shore based microwave and zapped the aircraft, and - oops! - there was something between them and the target.
You and others learned this by remote viewing?
Absolutely All of the remote viewers saw an invisible beam of light, or energy, strike this aircraft and bring it down. By leaving the Stargate program and writing about remote viewing, you violated a government security agreement.
Do you see civilian and commercial applications for remote viewing that might make the breach worthwhile?
If you use remote viewing in law enforcement, if you use it in science or medicine or medical research and development to find a cure for cancer or a cure for AIDS, that's good. How does that work? Here you are, a cancer researcher. You're standing at the threshold of some obstacle that you have to overcome. And the only way you have to do that is through standard research methodology. But at the same time you develop a line of questioning that allows remote viewers to see beyond the barrier and to pull back answers to those questions. Now, think of the magic of that.
One of the implications of your book Is that good and evil actually exist. Have we lost sight of that?
Very much so. We are at a crossroads in human history. The understanding of good and evil in our lives and in our decision processes as a human species has been blurred. That's what allows us in good conscience to build a military-industrial complex that profits from a $900 billion-a-year global defense industry, marketing death and destruction across the face of the planet.
Here is a detailed description of remote visualizing:
Start here to learn more of secrecy and the government:
Details of those involved in this attempt at creating human weapons via mind and demonic possession:
In late 1978, Gondola Wish was redesignated as the "Special Action Branch", code named Grill Flame, which applied to the operational unit and the research at SRI. The unit was reorganized as an offensive spying unit, and moved into buildings 2560 and 2561 at Ft. Meade. The budget was increased, and there were three full time viewers: Ken Bell, Joe McMoneagle, and Mel Riley. The unit reported to Ed Thompson, but was tasked by approved members of the intelligence community. (Schnabel, Jim, Remote Viewers: The Secret History of America's Psychic Spies, Dell, 1997, pg 24-5)
The SRI research program was integrated into Grill Flame in early 1979. Controlled by the DIA, tasking came through the DIA's on-site representative, Jim Salyer. (Scnabel, 1997, pg 220-1) After Ed Thompson left his post in 1981, Grill Flame came under the control of INSCOM, and was designated Detachment G within INSCOM's Operations Group. (Schnabel, 1997, pg 280)
According to Ed Dames, the original unit had six to eight commissioned military intelligence officers. "GRILL FLAME, (which was listed on the INSCOM books as "Detachment G"), had consisted of soldiers and a few civilians who possessed varying degrees of natural psychic ability. These operatives utilized altered states to achieve (varying degrees) of target contact." (Dames, Ed, "Ed Dames Sets the Record Straight")
In 1983, Grill Flame was redesignated Center Lane.
Individuals associated with Grill Flame:
Jack Vorona: overall manager
Lt. Col. Murray B. "Scott" Watt: commander, 1978-82
Lt. Col Jachim: commander, 1982-83
Lt. Col. Brian Busby: commander, 1983-
Lt. Skip Atwater: operations officer, 1978-87
Ken Bell: viewer, 1978-82
Joe McMoneagle: viewer, 1978-84
Mel Riley: viewer, 1978-81
Fern Gauvin: viewer, 1978-81
Captain Rob Cowart: viewer, 1982-3
Hartleigh Trent: viewer 1978-83
Here us the history of this deeply secret system of demonic activity. Please do NOT let this material panic you. I will show you later that in these Last Days we are protected from this. However; I DO want to show you that you are IN this war, like it or not-- IF that is, you are a born again Christian.
Ed Dames & His Cover Stories for Mind Control Experimentation
by Alex Constantine
Ed Dames, a proprietor of Psi-Tech - a "remote viewing" service in Beverly Hills, California founded by a clique of former intelligence officers - explains to late night radio talk show host Art Bell how the company's sole product - psi - is channeled: "This is a very structured technique, the remote viewer sitting at a desk with a ream of white paper and a pen. Using ['remote-viewing'] protocols, they first perceive a target. They're not told what the target is, only given a random number. Their unconscious minds are taught to do all the work, viewing the target first as sort of a 'thought-ball,' if you will.
"The next stage is sensory perceptions. They elaborate, download and objectify in words and sketches the colors, textures, the smells and taste, the sounds, the temperatures and the dimensions present at the site." Dames lets on that his psychics constructed clay models of the Unabomber's bombs, "that sort of thing," for a "federal agency." It doesn't come to him that all of this may sound a bit far-fetched and grandiose, the paranormal hardwired to the trappings of computer science, not to mention blatant disinformation. His firm is building clay models when remote viewing could, if the "protocols" worked as advertised, have pinpoint a killer's location. After all, says Dames, "if the 'target' is a terrorist - Saddam Hussein or Abu Nidal - we go in through the back door. We can be in their minds, in their dreams." A company brochure reports that Psi-Tech was founded in 1989, employing "a select, technically qualified group of professional analysts who provide a unique data collection capability not available anywhere else in the world. We are a team of highly-trained remote viewing specialists [who've] developed applied remote viewing into a powerful investigative tool."
Dames rambles on, a metaphysical comic book narrative, but assures us this is serious business. During the Gulf Crisis, one Psi-Tech client, "a large company with strategic oil interests in the Mid East," called on Dames and his telepaths "to provide data and analysis on Saddam himself, his mind (intent, motivation, emotional and behavioral states), to penetrate his war room for information concerning battle plans, operations, force strengths and possible deception schemes, and to provide a six-month general outlook for the Gulf region."
Major Dames is schooled in military intelligence, and the former commanding officer of the Army's "Psychic Espionage Unit," which operated under DIA and Army INSCOM charter.2 He is also a chronic confabulator, the chief Plumber of the "Stargate" psychic spying scandal. He draws his intelligence background from the shadows like the priest's robes Jim Garrison recovered from the closet of David Ferrie, the Kennedy assassination suspect. In the past, he acknowledges, "I have been involved in a lot of very, very deep, dark black projects." "I have never been assigned to a unit that has suffered more ostracism, been looked upon with more fear." In the late '70s, he admits, the unit was "associated with the occult. It gave the unit a bad name."
And Dames as well. Wherever you stand in the ESP debate, Psi-Tech was formed in the caul of the intelligence underground's "occult" projects, a world of flying disks, cosmic telepathy, teleportation, cosmic voyages and communication with house plants. The "psychic spying" unit, Dames gloats (ignoring the compulsory secrecy oath?), has provided services to the CIA, NSA, DIA, DEA, Navy and Air Force under the watch of a panel chaired by Army General Stan Hyman. The group led by Dames was one of several paranormal divisions run by the DIA and the Secretary of the Army, code-named Sun Streak, Grill Flame, Center Lane, Scanate and Stargate.
Dames's coevals in the military-metaphysical complex included General Albert Stubblebine, the retired director of Army intelligence INSCOM, and a Psi-Tech co-founder. Another is David Morehouse, Ph.D., an executive officer of the Second Battalion and deputy of the 82nd Airborne Division until 1994, when he resigned. Morehouse is the author of Comes the Watcher: The True Story of a Military Psychic Spy, and Peace Quest: Visions of Future War, a glorification of nonlethal weapons. He is also the producer of a Hanna-Barbara cartoon series, Peace Force: The Avalon Odyssey, about aliens defending the galaxy with advanced weapons. Morehouse is also a vice president at Paraview, a television production company with headquarters in Manhattan.
The occult is a recurring theme in this milieu. "They have no idea what they're dealing with," observes Rod Lewis, a spokesman for the American Federation of Scientists. "Of course, the immediate speculation is that they're dealing with the demonic realm.'" Demonic? "It's a Greek word for 'disembodied intelligence.' Apparently it's something they take very seriously, and unfortunately they're trying to use it for military purposes."
One corporation, in coordination with the CIA, took part, Scientific Applications International Corporation (SAIC) with corporate headquarters in San Diego. SAIC is directed by some of the highest-ranking oligarchs of the DoD and intelligence groups: former NSA Director Bobby Ray Inman, the CIA's John Deutch, William Perry, Clinton's secretary of defense from ESL, Inc. (part owner of Area 51), Melvin Laird, defense secretary under Nixon, and Donald Kerr, former director of Los Alamos National Laboratory. The CIA"covets" remote viewing as a source of intelligence, Dames boasts. In reality, the Agency covets his metaphysical cover stories, schizoid pabulum that direct attention from blatant human rights violations.
The Taos Hum, he confides, is a 17 hz. "time beacon" that pumps pulses of gravity into space, an invisible light house for time-travelling extraterrestrials. Psi-Tech's remote viewers, he says, have located and drawn diagrams of the "alien beacon" of Taos, (and all along residents thought it was a classified electromagnetic device attuned to the brain's auditory frequencies.)
Mars is "super-important" - Psi-Tech's telepaths have discovered a breed of "alien" that hails from Mars, ferried to earth by wayfarers from a remote civilization known as The Federation. The time-travelling aliens store their mind control gear in "parking garages" on the moon's surface. Since Psi-Tech has "confirmed" that Bug-Eyes are abducting human beings, out goes the thesis that scientists are conducting illicit biological experiments and dropping off the subjects with hypnotic memories of "alien" abduction ... Then again, the paranormal fantasies spun by Dames, a veteran of the CIA's UFO "Working Group," could be interpreted as a veil for ruthless experimentation and the torture of anyone falling into disfavor with the intelligence community.
In fact, the deep history of Psi-Tech is a chapter of a much larger movement, one that thrives on the spread of religious programming, "alien" invasions and other forms of irrational belief. The surface of the underground movement is populated by seemingly delusional quasi-mystical savants. Underneath, a hidden world of terror - with origins in the waste of warstruck Europe and the beating hearts of some of Nazi Germany's most ruthless military scientists. From these cold chambers exploded many of the mysteries that have since riddled the postwar world. One sector of the virtual government, the mind control and biocybernetics group, was born in academia. The goal of the research, to gain "control of an individual to the point where he will do our bidding against his will and even against such fundamental laws of human nature as self-preservation."
The Agency's scientific contracts were first handed around by Barnaby Keeney, president of Brown University. In 1951, Brown took a sabbatical to design a CIA trainee program and a system of fronts to finance covert operations. In 1962 he was named chairman of the Human Ecology Fund, the financial hub of MKULTRA.8
By 1974, Michael Shapiro, a professor of law at USC, could report in the Southern California Law Review, "Psychotropic drugs, electrical stimulation of the brain (ESB) by electrodes, psychosurgery and organic conditioning techniques are now available for use by the state in controlling criminal, sick or otherwise aberrant or unwanted behavior."
One more discussion of intrusion will now be about Echelon Dictionary. This spy system is directed at YOU and all E-Mail senders world wide. It reflects a massive paranoia now working in the minds of world leaders and spy agencies. To a godly saint it means very little as far as fear producing, since saints do not talk about things which would threaten rational folks.
But, the idea of someone reading and interpreting one's mail within a New World Order agenda certainly is cause for concern. I say this becaus the Janet Reno and Hillary Clinton gang have called us Pathological Fundamentalists. We are said to have a mental disease, and we are said to be dangerous. In the End Times this will simply get worse and worse.
The reason this spying is more sinister than the psychic activity above is that the psychics cannot enter the mind of a born again Christian. The saint is proteced as we shall see at the end of this discussion, so the following intrusion is one of very few which can be used against a saint.
IN THE LATE 1980S, IN A DECISION IT PROBABLY REGRETS, THE US PROMPTED NEW ZEALAND TO JOIN A NEW AND HIGHLY SECRET GLOBAL INTELLIGENCE SYSTEM. HAGER'S INVESTIGATION INTO IT AND HIS DISCOVERY OF THE ECHELON DICTIONARY HAS REVEALED ONE OF THE WORLD'S BIGGEST, MOST CLOSELY HELD INTELLIGENCE PROJECTS. THE SYSTEM ALLOWS SPY AGENCIES TO MONITOR MOST OF THE WORLD'S TELEPHONE, E-MAIL, AND TELEX COMMUNICATIONS.
For 40 years, New Zealand's largest intelligence agency, the Government Communications Security Bureau (GCSB) the nation's equivalent of the US National Security Agency (NSA) had been helping its Western allies to spy on countries throughout the Pacific region, without the knowledge of the New Zealand public or many of its highest elected officials. What the NSA did not know is that by the late 1980s, various intelligence staff had decided these activities had been too secret for too long, and were providing me with interviews and documents exposing New Zealand's intelligence activities. Eventually, more than 50 people who work or have worked in intelligence and related fields agreed to be interviewed.
The activities they described made it possible to document, from the South Pacific, some alliance-wide systems and projects which have been kept secret elsewhere. Of these, by far the most important is ECHELON. Designed and coordinated by NSA, the ECHELON system is used to intercept ordinary e-mail, fax, telex, and telephone communications carried over the world's telecommunications networks. Unlike many of the electronic spy systems developed during the Cold War, ECHELON is designed primarily for non-military targets: governments, organizations, businesses, and individuals in virtually every country. It potentially affects every person communicating between (and sometimes within) countries anywhere in the world.
It is, of course, not a new idea that intelligence organizations tap into e-mail and other public telecommunications networks. What was new in the material leaked by the New Zealand intelligence staff was precise information on where the spying is done, how the system works, its capabilities and shortcomings, and many details such as the codenames.
The ECHELON system is not designed to eavesdrop on a particular individual's e-mail or fax link. Rather, the system works by indiscriminately intercepting very large quantities of communications and using computers to identify and extract messages of interest from the mass of unwanted ones. A chain of secret interception facilities has been established around the world to tap into all the major components of the international telecommunications networks. Some monitor communications satellites, others land-based communications networks, and others radio communications. ECHELON links together all these facilities, providing the US and its allies with the ability to intercept a large proportion of the communications on the planet.
The computers at each station in the ECHELON network automatically search through the millions of messages intercepted for ones containing pre-programmed keywords. Keywords include all the names, localities, subjects, and so on that might be mentioned. Every word of every message intercepted at each station gets automatically searched whether or not a specific telephone number or e-mail address is on the list.
The thousands of simultaneous messages are read in "real time" as they pour into the station, hour after hour, day after day, as the computer finds intelligence needles in telecommunications haystacks.
SOMEONE IS LISTENING The computers in stations around the globe are known, within the network, as the ECHELON Dictionaries. Computers that can automatically search through traffic for keywords have existed since at least the 1970s, but the ECHELON system was designed by NSA to interconnect all these computers and allow the stations to function as components of an integrated whole. The NSA and GCSB are bound together under the five-nation UKUSA signals intelligence agreement. The other three partners all with equally obscure names are the Government Communications Headquarters (GCHQ) in Britain, the Communications Security Establishment (CSE) in Canada, and the Defense Signals Directorate (DSD) in Australia.
The alliance, which grew from cooperative efforts during World War II to intercept radio transmissions, was formalized into the UKUSA agreement in 1948 and aimed primarily against the USSR. The five UKUSA agencies are today the largest intelligence organizations in their respective countries. With much of the world's business occurring by fax, e-mail, and phone, spying on these communications receives the bulk of intelligence resources. For decades before the introduction of the ECHELON system, the UKUSA allies did intelligence collection operations for each other, but each agency usually processed and analyzed the intercept from its own stations.
Under ECHELON, a particular station's Dictionary computer contains not only its parent agency's chosen keywords, but also has lists entered in for other agencies. In New Zealand's satellite interception station at Waihopai (in the South Island), for example, the computer has separate search lists for the NSA, GCHQ, DSD, and CSE in addition to its own. Whenever the Dictionary encounters a message containing one of the agencies' keywords, it automatically picks it and sends it directly to the headquarters of the agency concerned. No one in New Zealand screens, or even sees, the intelligence collected by the New Zealand station for the foreign agencies. Thus, the stations of the junior UKUSA allies function for the NSA no differently than if they were overtly NSA-run bases located on their soil.
The first component of the ECHELON network are stations specifically targeted on the international telecommunications satellites (Intelsats) used by the telephone companies of most countries. A ring of Intelsats is positioned around the world, stationary above the equator, each serving as a relay station for tens of thousands of simultaneous phone calls, fax, and e-mail.
Five UKUSA stations have been established to intercept the communications carried by the Intelsats.
The British GCHQ station is located at the top of high cliffs above the sea at Morwenstow in Cornwall. Satellite dishes beside sprawling operations buildings point toward Intelsats above the Atlantic, Europe, and, inclined almost to the horizon, the Indian Ocean. An NSA station at Sugar Grove, located 250 kilometers southwest of Washington, DC, in the mountains of West Virginia, covers Atlantic Intelsats transmitting down toward North and South America. Another NSA station is in Washington State, 200 kilometers southwest of Seattle, inside the Army's Yakima Firing Center. Its satellite dishes point out toward the Pacific Intelsats and to the east. *1
The job of intercepting Pacific Intelsat communications that cannot be intercepted at Yakima went to New Zealand and Australia. Their South Pacific location helps to ensure global interception. New Zealand provides the station at Waihopai and Australia supplies the Geraldton station in West Australia (which targets both Pacific and Indian Ocean Intelsats). *2
Each of the five stations' Dictionary computers has a codename to distinguish it from others in the network. The Yakima station, for instance, located in desert country between the Saddle Mountains and Rattlesnake Hills, has the COWBOY Dictionary, while the Waihopai station has the FLINTLOCK Dictionary. These codenames are recorded at the beginning of every intercepted message, before it is transmitted around the ECHELON network, allowing analysts to recognize at which station the interception occurred.
New Zealand intelligence staff has been closely involved with the NSA's Yakima station since 1981, when NSA pushed the GCSB to contribute to a project targeting Japanese embassy communications. Since then, all five UKUSA agencies have been responsible for monitoring diplomatic cables from all Japanese posts within the same segments of the globe they are assigned for general UKUSA monitoring.3 Until New Zealand's integration into ECHELON with the opening of the Waihopai station in 1989, its share of the Japanese communications was intercepted at Yakima and sent unprocessed to the GCSB headquarters in Wellington for decryption, translation, and writing into UKUSA-format intelligence reports (the NSA provides the codebreaking programs).
"COMMUNICATION" THROUGH SATELLITES The next component of the ECHELON system intercepts a range of satellite communications not carried by Intelsat.In addition to the UKUSA stations targeting Intelsat satellites, there are another five or more stations homing in on Russian and other regional communications satellites. These stations are Menwith Hill in northern England; Shoal Bay, outside Darwin in northern Australia (which targets Indonesian satellites); Leitrim, just south of Ottawa in Canada (which appears to intercept Latin American satellites); Bad Aibling in Germany; and Misawa in northern Japan.
A group of facilities that tap directly into land-based telecommunications systems is the final element of the ECHELON system. Besides satellite and radio, the other main method of transmitting large quantities of public, business, and government communications is a combination of water cables under the oceans and microwave networks over land. Heavy cables, laid across seabeds between countries, account for much of the world's international communications. After they come out of the water and join land-based microwave networks they are very vulnerable to interception. The microwave networks are made up of chains of microwave towers relaying messages from hilltop to hilltop (always in line of sight) across the countryside. These networks shunt large quantities of communications across a country. Interception of them gives access to international undersea communications (once they surface) and to international communication trunk lines across continents. They are also an obvious target for large-scale interception of domestic communications.
Because the facilities required to intercept radio and satellite communications use large aerials and dishes that are difficult to hide for too long, that network is reasonably well documented. But all that is required to intercept land-based communication networks is a building situated along the microwave route or a hidden cable running underground from the legitimate network into some anonymous building, possibly far removed. Although it sounds technically very difficult, microwave interception from space by United States spy satellites also occurs.4 The worldwide network of facilities to intercept these communications is largely undocumented, and because New Zealand's GCSB does not participate in this type of interception, my inside sources could not help either.
NO ONE IS SAFE FROM A MICROWAVE A 1994 expos of the Canadian UKUSA agency, Spyworld, co-authored by one of its former staff, Mike Frost, gave the first insights into how a lot of foreign microwave interception is done (see p. 18). It described UKUSA "embassy collection" operations, where sophisticated receivers and processors are secretly transported to their countries' overseas embassies in diplomatic bags and used to monitor various communications in foreign capitals. *5
Since most countries' microwave networks converge on the capital city, embassy buildings can be an ideal site. Protected by diplomatic privilege, they allow interception in the heart of the target country. *6 The Canadian embassy collection was requested by the NSA to fill gaps in the American and British embassy collection operations, which were still occurring in many capitals around the world when Frost left the CSE in 1990. Separate sources in Australia have revealed that the DSD also engages in embassy collection. *7 On the territory of UKUSA nations, the interception of land-based telecommunications appears to be done at special secret intelligence facilities. The US, UK, and Canada are geographically well placed to intercept the large amounts of the world's communications that cross their territories.
The only public reference to the Dictionary system anywhere in the world was in relation to one of these facilities, run by the GCHQ in central London. In 1991, a former British GCHQ official spoke anonymously to Granada Television's World in Action about the agency's abuses of power. He told the program about an anonymous red brick building at 8 Palmer Street where GCHQ secretly intercepts every telex which passes into, out of, or through London, feeding them into powerful computers with a program known as "Dictionary." The operation, he explained, is staffed by carefully vetted British Telecom people: "It's nothing to do with national security. It's because it's not legal to take every single telex. And they take everything: the embassies, all the business deals, even the birthday greetings, they take everything. They feed it into the Dictionary." *8
What the documentary did not reveal is that Dictionary is not just a British system; it is UKUSA-wide.
Similarly, British researcher Duncan Campbell has described how the US Menwith Hill station in Britain taps directly into the British Telecom microwave network, which has actually been designed with several major microwave links converging on an isolated tower connected underground into the station.9
The NSA Menwith Hill station, with 22 satellite terminals and more than 4.9 acres of buildings, is undoubtedly the largest and most powerful in the UKUSA network. Located in northern England, several thousand kilometers from the Persian Gulf, it was awarded the NSA's "Station of the Year" prize for 1991 after its role in the Gulf War. Menwith Hill assists in the interception of microwave communications in another way as well, by serving as a ground station for US electronic spy satellites. These intercept microwave trunk lines and short range communications such as military radios and walkie talkies. Other ground stations where the satellites' information is fed into the global network are Pine Gap, run by the CIA near Alice Springs in central Australia and the Bad Aibling station in Germany. *10 Among them, the various stations and operations making up the ECHELON network tap into all the main components of the world's telecommunications networks. All of them, including a separate network of stations that intercepts long distance radio communications, have their own Dictionary computers connected into ECHELON.
In the early 1990s, opponents of the Menwith Hill station obtained large quantities of internal documents from the facility. Among the papers was a reference to an NSA computer system called Platform. The integration of all the UKUSA station computers into ECHELON probably occurred with the introduction of this system in the early 1980s. James Bamford wrote at that time about a new worldwide NSA computer network codenamed Platform "which will tie together 52 separate computer systems used throughout the world. Focal point, or `host environment,' for the massive network will be the NSA headquarters at Fort Meade. Among those included in Platform will be the British SIGINT organization, GCHQ." *11
LOOKING IN THE DICTIONARY The Dictionary computers are connected via highly encrypted UKUSA communications that link back to computer data bases in the five agency headquarters. This is where all the intercepted messages selected by the Dictionaries end up. Each morning the specially "indoctrinated" signals intelligence analysts in Washington, Ottawa,Cheltenham, Canberra, and Wellington log on at their computer terminals and enter the Dictionary system. After keying in their security passwords, they reach a directory that lists the different categories of intercept available in the data bases, each with a four-digit code. For instance, 1911 might be Japanese diplomatic cables from Latin America (handled by the Canadian CSE), 3848 might be political communications from and about Nigeria, and 8182 might be any messages about distribution of encryption technology.
They select their subject category, get a "search result" showing how many messages have been caught in the ECHELON net on that subject, and then the day's work begins. Analysts scroll through screen after screen of intercepted faxes, e-mail messages, etc. and, whenever a message appears worth reporting on, they select it from the rest to work on. If it is not in English, it is translated and then written into the standard format of intelligence reports produced anywhere within the UK-USA network either in entirety as a "report," or as a summary or "gist."
INFORMATION CONTROL A highly organized system has been developed to control what is being searched for by each station and who can have access to it. This is at the heart of ECHELON operations and works as follows.
The individual station's Dictionary computers do not simply have a long list of keywords to search for. And they do not send all the information into some huge database that participating agencies can dip into as they wish. It is much more controlled.
The search lists are organized into the same categories, referred to by the four digit numbers. Each agency decides its own categories according to its responsibilities for producing intelligence for the network. For GCSB, this means South Pacific governments, Japanese diplomatic, Russian Antarctic activities, and so on.
The agency then works out about 10 to 50 keywords for selection in each category. The keywords include such things as names of people, ships, organizations, country names, and subject names. They also include the known telex and fax numbers and Internet addresses of any individuals, businesses, organizations, and government offices that are targets. These are generally written as part of the message text and so are easily recognized by the Dictionary computers.
The agencies also specify combinations of keywords to help sift out communications of interest. For example, they might search for diplomatic cables containing both the words "Santiago" and "aid," or cables containing the word "Santiago" but not "consul" (to avoid the masses of routine consular communications). It is these sets of words and numbers (and combinations), under a particular category, that get placed in the Dictionary computers. (Staff in the five agencies called Dictionary Managers enter and update the keyword search lists for each agency.)
The whole system, devised by the NSA, has been adopted completely by the other agencies. The Dictionary computers search through all the incoming messages and, whenever they encounter one with any of the agencies' keywords, they select it. At the same time, the computer automatically notes technical details such as the time and place of interception on the piece of intercept so that analysts reading it, in whichever agency it is going to, know where it came from, and what it is. Finally, the computer writes the four-digit code (for the category with the keywords in that message) at the bottom of the message's text. This is important. It means that when all the intercepted messages end up together in the database at one of the agency headquarters, the messages on a particular subject can be located again. Later, when the analyst using the Dictionary system selects the four- digit code for the category he or she wants, the computer simply searches through all the messages in the database for the ones which have been tagged with that number.
This system is very effective for controlling which agencies can get what from the global network because each agency only gets the intelligence out of the ECHELON system from its own numbers. It does not have any access to the raw intelligence coming out of the system to the other agencies. For example, although most of the GCSB's intelligence production is primarily to serve the UK-USA alliance, New Zealand does not have access to the whole ECHELON network. The access it does have is strictly controlled. A New Zealand intelligence officer explained: "The agencies can all apply for numbers on each other's Dictionaries. The hardest to deal with are the Americans. ... [There are] more hoops to jump through, unless it is in their interest, in which case they'll do it for you."
There is only one agency which, by virtue of its size and role within the alliance, will have access to the full potential of the ECHELON system the agency that set it up. What is the system used for? Anyone listening to official "discussion" of intelligence could be forgiven for thinking that, since the end of the Cold War, the key targets of the massive UKUSA intelligence machine are terrorism, weapons proliferation, and economic intelligence. The idea that economic intelligence has become very important, in particular, has been carefully cultivated by intelligence agencies intent on preserving their post-Cold War budgets. It has become an article of faith in much discussion of intelligence. However, I have found no evidence that these are now the primary concerns of organizations such as NSA.
QUICKER INTELLIGENCE,SAME MISSION A different story emerges after examining very detailed information I have been given about the intelligence New Zealand collects for the UKUSA allies and detailed descriptions of what is in the yards-deep intelligence reports New Zealand receives from its four allies each week. There is quite a lot of intelligence collected about potential terrorists, and there is quite a lot of economic intelligence, notably intensive monitoring of all the countries participating in GATT negotiations. But by far, the main priorities of the intelligence alliance continue to be political and military intelligence to assist the larger allies to pursue their interests around the world. Anyone and anything the particular governments are concerned about can become a target.
With capabilities so secret and so powerful, almost anything goes. For example, in June 1992, a group of current "highly placed intelligence operatives" from the British GCHQ spoke to the London Observer: "We feel we can no longer remain silent regarding that which we regard to be gross malpractice and negligence within the establishment in which we operate." They gave as examples GCHQ interception of three charitable organizations, including Amnesty International and Christian Aid. As the Observer reported: "At any time GCHQ is able to home in on their communications for a routine target request," the GCHQ source said. In the case of phone taps the procedure is known as Mantis. With telexes it is called Mayfly. By keying in a code relating to Third World aid, the source was able to demonstrate telex "fixes" on the three organizations. "It is then possible to key in a trigger word which enables us to home in on the telex communications whenever that word appears," he said. "And we can read a pre-determined number of characters either side of the keyword."12 Without actually naming it, this was a fairly precise description of how the ECHELON Dictionary system works. Again, what was not revealed in the publicity was that this is a UKUSA-wide system. The design of ECHELON means that the interception of these organizations could have occurred anywhere in the network, at any station where the GCHQ had requested that the four-digit code covering Third World aid be placed.
Note that these GCHQ officers mentioned that the system was being used for telephone calls. In New Zealand, ECHELON is used only to intercept written communications: fax, e-mail, and telex. The reason, according to intelligence staff, is that the agency does not have the staff to analyze large quantities of telephone conversations.
Mike Frost's expos of Canadian "embassy collection" operations described the NSA computers they used, called Oratory, that can "listen" to telephone calls and recognize when keywords are spoken. Just as we can recognize words spoken in all the different tones and accents we encounter, so too, according to Frost, can these computers. Telephone calls containing keywords are automatically extracted from the masses of other calls and recorded digitally on magnetic tapes for analysts back at agency headquarters. However, high volume voice recognition computers will be technically difficult to perfect, and my New Zealand-based sources could not confirm that this capability exists. But, if or when it is perfected, the implications would be immense. It would mean that the UKUSA agencies could use machines to search through all the international telephone calls in the world, in the same way that they do written messages. If this equipment exists for use in embassy collection, it will presumably be used in all the stations throughout the ECHELON network. It is yet to be confirmed how extensively telephone communications are being targeted by the ECHELON stations for the other agencies.
The easiest pickings for the ECHELON system are the individuals, organizations,and governments that do not use encryption. In New Zealand's area, for example, it has proved especially useful against already vulnerable South Pacific nations which do not use any coding, even for government communications (all these communications of New Zealand's neighbors are supplied, unscreened, to its UKUSA allies). As a result of the revelations in my book, there is currently a project under way in the Pacific to promote and supply publicly available encryption software to vulnerable organizations such as democracy movements in countries with repressive governments. This is one practical way of curbing illegitimate uses of the ECHELON capabilities.
One final comment. All the newspapers, commentators, and "well placed sources" told the public that New Zealand was cut off from US intelligence in the mid-1980s. That was entirely untrue. The intelligence supply to New Zealand did not stop, and instead, the decade since has been a period of increased integration of New Zealand into the US system. Virtually everything the equipment, manuals, ways of operating, jargon, codes, and so on, used in the GCSB continues to be imported entirely from the larger allies (in practice, usually the NSA). As with the Australian and Canadian agencies, most of the priorities continue to come from the US, too.
The main thing that protects these agencies from change is their secrecy. On the day my book arrived in the book shops, without prior publicity, there was an all-day meeting of the intelligence bureaucrats in the prime minister's department trying to decide if they could prevent it from being distributed. They eventually concluded, sensibly, that the political costs were too high. It is understandable that they were so agitated.
Throughout my research, I have faced official denials or governments refusing to comment on publicity about intelligence activities. Given the pervasive atmosphere of secrecy and stonewalling, it is always hard for the public to judge what is fact, what is speculation, and what is paranoia. Thus, in uncovering New Zealand's role in the NSA-led alliance, my aim was to provide so much detail about the operations the technical systems, the daily work of individual staff members, and even the rooms in which they work inside intelligence facilities that readers could feel confident that they were getting close to the truth. I hope the information leaked by intelligence staff in New Zealand about UKUSA and its systems such as ECHELON will help lead to change. n
CAQ SUBSCRIPTION INFORMATION CAQ (CovertAction Quarterly) has won numerous awards for investigative journalism. In 1996, it won 4 of "Project Censored" top 25 awards for investigative reporting. CAQ is read around the world by investigative reporters, activists, scholars, intelligence buffs, news junkies, and anyone who wants to know the news and analysis behind the soundbites and headlines. Recommended by Noam Chomsky; targeted by the CIA.
another source adds:
SPY NETWORK REVEALED
A PEACE activist has claimed New Zealand's biggest intelligence agency is playing a part in an electronic spying network run largely for the benefit of the United States and Britain. Nicky Hager's book "Secret Power" aims to expose the "shadowy" Government Communication Security Bureau, portraying it as a body out of the control of Parliament and prime ministers.
The prime function of this agency, with a staff of 200, is not the security of Government communication, but electronic spying through the Tangimoana and Waihopai bases, said Mr Hager. The book alleges that since the 1940s, New Zealand has been an informal member of UKUSA - an agreement between the United States and Britain. Both Australia and Canada are also informal members of the electronic eavesdropping system.
Among New Zealand's contributions was spying on its South Pacific neighbours - using Waihopai satellite antennae to intercept electronic messages and the radio masts at Tangimoana to record radio signals.
Because of its size, the South Pacific was especially dependent on satellite communications. Mr Hager claimed Waihopai station was built in the late 1980s to facilitate the "Echelon Dictionary system". This enabled the United States and other partners to plant key words that would trigger an intercept being sent directly to that nation's own equivalent of the bureau.
Prime Minister Jim Bolger in 1991 told Parliament that the bureau did not monitor the communications of either New Zealand or its "friends" in the South Pacific. A similar assurance had been given by Sir Robert Muldoon in 1984.
Mr Bolger was not commenting on Mr Hager's claims. A spokesman cited a long-standing convention that prime ministers did not comment on intelligence issues. But Mr Hager's book suggests the bureau habitually kept prime ministers - to whom the agency was responsible - in the dark. David Lange, the prime minister when Waihopai was planned, said only on reading the book did he realise "we had been committed to an international integrated electronic network".
I am told that telephone wire tapping should be well beyond the following in technology. I have been told by more than one source that our phones can be turned on even while they are hung up and allegedly "disconnected." In any case, this picture , and the intentions of Bill Clinton and the Feds, shows that we will be having a lot more company in the future. This presents some great opportunities to the Bible believer, but the unsaved must see this as a real terror.
[ Added August 2013: By now, the NSA, Homeland Security, and the FBI are reading all our mail and listening to all of our cell phone conversations. I hope you understand that I was on top of this in 1995, and I hope you realize now that this intrusion is forever unless God destroys the US Government completely.]
From THE SPOTLIGHT
300 Independence Avenue, S.E.
Washington, DC 20003
Subscriptions: (202) 546-5621
Technology & Liberty
November 13, 1995
ADMINISTRATION PLANS 1.5 MILLION TELEPHONE INTERCEPTS
Janet Reno's Justice Department and the FBI have directed U.S. telephone companies to prepare for up to 1.5 million simultaneous, electronic intercepts on Americans' telephones.
The same directive requires the nation's phone companies to complete the necessary modifications to their equipment to create this massive surveillance apparatus from America's public telephone networks. Telephone companies are directed to have these capabilities in place by October 28, 1998, one week before the 1998 elections.
The Clinton administration's claimed authorization for this massive high-tech domestic surveillance machine is the 1994
Communications Assistance for Law Enforcement Act (CALEA). The CALEA law is better known as infamous "Wiretap Access Bill", which has been discussed many times in these columns over the past 14 months. The CALEA law continues to be a hot topic because the proposed "Omnibus Counter-Terrorism Bill" of 1995 (H.R. 1710) contains provisions for setting up a national FBI surveillance center and paying for the national eavesdropping system with a 40% surcharge on all federal civil fines and property seizures.
The administration's eavesdropping diktats are buried in a set of technical "capacity requirements" that telephone companies are expected to meet in order to comply with the CALEA law. The capacity requirements appear on pages 53643-53646 of the Federal Register for October 16, 1995. Computer users can access this document electronically on the internet from the Electronic Privacy Information Center (http://www.epic.org) or by using wais (wais.access.gpo.gov).
The "Capacity Requirements" published in the Federal Register correspond to a minimum of 540,000 and a maximum of 1.5 million simultaneous telephone "intercepts" in the United States. These electronic "intercepts" involve several different telephone surveillance techniques. They can record the telephone numbers you call and the numbers of people who call you, and then match the phone numbers in a special database "associating" you with your friends, relatives, acquaintances, journalists, activists, or businesses. They can also be programmed to monitor telephone conversations, intercept faxes, and record communications sessions between computer modems, including computer passwords and digital transactions.
Here is a breakdown of the scope of the federal surveillance described by the capacity requirements:
* Category 3 -- In 75% of the nation, phone companies must be prepared to activate federal intercepts on a maximum of 0.25% of all telephone subscribers, i.e. 250 telephones out of every 100,000.
* Category 2 -- Is ill-defined. Phone companies in Category 2 areas must make their equipment capable of supporting federal interceptions on a maximum of 0.5% of all subscribers, i.e. 500 telephones per 100,000
* Category 1 -- Includes ill-defined "high interest" areas like major cities, where phone companies must be prepared to surveil 1% of all telephones, i.e. 1,000 phones per 100,000
According to FCC statistics for 1993, there were at least 150 million telephone numbers in our country -- and these figures omitted cellular phones, beepers, pagers, WATS lines, and other non-switched telephone services. Therefore Category 3 translates into 0.25% of at least 112.5 million telephones -- 281,250 intercepts nationwide. Assuming Category 2 equals 15% of the nation's phones, it translates into 0.5% of 22.5 million phones, another 122,500 potential wiretaps. Category 1 is 1% of the remaining 15 million phones: that's 150,000 more people. Add it up: 553,750 intercepts, minimum.
And since "major cities" are "high interest" areas, the actual number is more likely to approach one million or more. Even these figures don't tell the whole story. The Justice Department directives have a built-in vagueness that allows areas to be re-defined. They can become "high-interest" hotspots at any time, under any circumstances. A currency crisis, for instance. Or a hotly contested election. Or perhaps a mysterious bombing provocation in the midwest.
Furthermore, telephone companies do not have the luxury of meeting the minimum surveillance requirements. It's a technological reality that they must modify their equipment to meet the maximum requirements. That's because the FBI can re- define their surveillance responsibilities at any time, by branding their customers as "interesting".
As the FBI's "interest" shifts from area to area, the whole country could rapidly come under the 1% surveillance directive. 1.5 million telephone intercepts. Or more.
The conduct of Clinton's law-enforcement leaders is especially outrageous, now that the true intentions of their KGB-like program have been revealed. When FBI Director Louis Freeh lobbied Congress for the Wiretap Bill last year, he cited FBI statistics claiming only 1,157 federal, state, and local electronic surveillance orders for all of 1993.
In sworn Congressional testimony, the FBI director went on to say that his bureau had been thwarted in "several" attempts to intercept communications on specialized telephone equipment. Freeh cited obstacles like digital switches, digital loops, and similar privately owned, computerized business telephone switching systems, which he claimed prevented his agents from listening to telephone conversations, intercepting faxes, and capturing the data exchanged in computer modem sessions.
The built-in interception capacity of at least 1.5 million phone subscribers is well over 1,000 times the 1993 wiretapping number given to Congress by Director Freeh.
The Justice Department instructed America's telephone companies to respond by November 15th in writing (in triplicate) with comments on their new national telephone surveillance requirements. Why not ask your elected representatives to drop them a line, too? Your Senators and Representative may well wonder how Louis Freeh's 1,157 1993 surveillance orders and "several" failed eavesdropping attempts turned into a license to monitor over a million phones in the nation's telephone system in less than two years. I sure do wonder.
The "capacity requirements" for the 1994 Wiretap Law (CALEA) were published in the Federal Register of October 16. They are listed on pages 53643-53646. The address for comments is: Telecommunications Industry Liaison Unit (TILU), Federal Bureau of Investigation, P.O. Box 220450, Chantilly, VA 22022-0450. The FBI expects your representatives to write in triplicate.
We close this introduction on fear of intrusion by looking at the temperament of Americans, your neighbors that is, in view of the mushrooming intrusion of big government into the lives of Americans. Please read this with a view to what you and I must do to avoid becoming morbid and hateful like those who don't know Christ.
The following is from The Electronic Telegraph, World-Wide Web site of The Daily Telegraph (London), and is the copyrighted material of that organization. It is reposted here on a nonprofit, fair-use basis becaused of its inherent news value.
BY STEPHEN ROBINSON IN WASHINGTON
FOUR out of 10 Americans beleve the federal government has become so powerful that it "poses an immediate threat to the rights and freedoms of ordinary citizens", according to an opinion poll taken after the Oklahoma bombing.
The poll confirms how unpopular government has become in the American mind after six decades of inexorable expansion beginning with President Roosevelt's New Deal of the Thirties. The target of last week's bombing was the federal office building in Oklahoma City, but that did not encourage Americans to rally round their government.
Experts at Gallup, which conducted the poll early this week,were astonished to find that 39 per cent of respondents regarded the government as a threat to their personal liberty.
"This hostility to government is not ideological. People on the Left and the Right share the same view," David Moore of Gallup said.
He added that he was even more surprised that one fifth of respondents agreed with the suggestion that "ordinary citizens should be allowed to arm and organise themselves in order to resist the powers of the federal government". That finding contradicts the view that a passion for militias is confined to a tiny minority of fanatics.
President Clinton may encounter difficulties with his proposed anti-terrorism package, which would give the FBI new powers to use telephone surveillance and allow the military a role in domestic law enforcement.
Right-wingers and libertarians are united with Left-wing civil rights activists in opposition to Mr Clinton's proposed legislative response to the Oklahoma outrage. Republicans in Congress, who initially supported the president, now express reservations about granting new powers to deal with the terrorism threat.
Senator Robert Dole, the leading Republican contender for the presidency in 1996, said: "We should tread very carefully when considering proposals to expand the FBI's authority to investigate domestic organisations."
Conclusion by Steve Van Nattan, Blessed Quietness Journal
1. Discuss the intrusion of Caesar:
Caesar, or our Federal monster above (including the President and Congress), have turned in hate on Fundamentalists. Listen to radio talk show hosts like Limbaugh and Paul Harvey. They are the most conservative men in the USA, yet they have filthy mouths, and they use God's name in vain frequently. Paul Harvey now tells some very explicit funnies which are depraved. These men would SEEM to be near us in thinking, but they are NOT. I hope you don't feast regularly on Limbaugh and Liddy. If you do, you will become morbid and ugly in mind and spirit.
We need to see that Caesar is NOT worth wasting much tome on. Did Jesus complain about Caesar in His day? Rome ruled Israel, and every Caesar but one was a queer. They killed and raped at will. Jesus ignored them. Can you do this? If not, you are distracted from the real war-- for souls, and for your home. Stick to the things right in front of you. That will keep you busy enough.
2. Discuss the demonic manipulation of demons in SLSW.
There ARE now in place in Christendom (the world church in total) powers from Satan which are dedicated to intrude into your mind, your home, and your local church to destroy your peace and implicate you in any way possible in things which will destroy your testimony. You better be on guard. I am 100% convinced that before we are out of here in the rapture of the Lord's Church, we will see alleged Pentecostal and Fundamental Christians making league with devils to attack the true Bride of Christ. This will be targeted at our minds and our fellowship in the Holy Spirit. This is exactly what Kim Clement and Rick Joyner are talking about in their alleged visions. They are demon possessed, and they intend to send out devils to do their bidding just like witches do. I expect Rodney Howard Browne and Copeland will lead in this sending out of devils against true saints. Please read on to the end-- our victory is assured by our precious Savior.
Pastor, you are a fool to let just anyone come tripping through the door of your church. You cannot resist the urge to do all your soul winning at the church house once a week on Sunday, right? So, Satan knows how lazy you are. He will send his devils, in the bodies of his wolves, right into your church and up the aisle to "repent" and "weep" and "get saved." They will fill the offering plate with money, and they will pamper you with pleasures. I HAVE WATCHED THIS OVER AND OVER. Please understand that I love you when I say, "You are a fool." You have the charge of God's elect, and you are bringing the devil's workers right into the fellowship. I know how it works. It happened to me. Opus Dei did a number on us, and we had no idea at the time that we were being attacked by two seemingly hard working Christians. They were under orders from the Roman Catholic hierarchy, and they nearly closed the doors of the church.
You better wake up friends. YOUR WORST ENEMIES ARE NOT CAESAR-- THEY ARE THE VIPERS OF CHRISTENDOM-- FROM BROWNSVILLE AOG TO PROMISE KEEPERS TO THE POPE'S SERVANTS TO THE FUNDAMENTAL BAPTIST FELLOWSHIPS OF THIS WORLD. ALL of the present church organizations are now infiltrated by witches, New Agers, Caesar's spys, and by the Pope's servants. I have read their boasts. They know they are in YOUR fellowship of churches. It is the day of New Testament one-on-one fellowship, especially for local churches.
3. Discuss the death threats of Charismania.
We have already talked of this to some degree, but here is the truth. The Charismatic Movement, as well as Promise Keepers, is now declaring war on Bible believers. By war, I mean that they call for your physical death and destruction. Kim Clement and Rick Joyner, along with Paul Crouch and Benny Hinn have clearly told us that God gave them commands to kill ME and YOU. Ignore this warning to the peril of your life. A new kind of Nazi formula of attack has taken hold in the alleged churches, and Caesar has NEVER talked like they do at the front of some churches right now.
For more on this, you should go to the Third Wave section of this Journal and read and read.
4. Discuss the barrage of selling and stealing techniques used by merchants and trades.
Frustration with society has to be at an all time high in the western world. I hear from Africa and India also that integrity and workmanship are deteriorating rapidly. Australian saints report a complete paganizing of the market place. Nudity and open lust will soon be seen in work places offering temptations which saints have not been subjected to since the days of Ephesus and ancient Rome. Sodomite acts may soon be performed in all of our parks in the open with police looking the other way. Men in the work place are obsessed with sex, and sodomites think of their lusts all day long. Working women are nearly all given over to filthy talk which makes the men blush. What is happening? Many Christian business owners cannot get a day's work out of anyone in their business environments. Honest Christians are frustrated. If they give a good day's work, they are hated by those who hold back and diddle their lives away. What do we do about this frustration?
Answer: Do not give in to it.
Also, do not feel obligated to cure the whole world of thse evils. The sinful workers of the world will always be sinful unless they repent and believe in Jesus Christ for their salvation. If they do that, they will be changed and made new by the Holy Spirit. So, preach the Word. Reprove those right in your area of work, but don't start some time consuming campaign to save the world from sloth. Jesus didn't waste His time this way. He concentrated on twelve men right next to Him. He also taught others when they wanted to be taught. But, in his last hours He was back to eleven men who would stay with Him. After His resurrection, He went looking for those eleven men again, and having fired them up for the work ahead, He returned to heaven. It is enough that you teach your children the Truth-- teach them to hate the sin of the sinners they confront-- and show them the way of salvation and the love of Christ. Bless the true saints whenever you find them. Teach those who will listen.
YOU are not called to solve all the problems which come along. Be faithful, work hard, redeem the time, and teach and instruct any who will listen to you. Noah preached for 120 years, and what did he get? Seven folks went up the gang plank into the ark with him. I bet you have more than that who will listen to you. Even if you don't, never mind, Jesus asks you to be faithful only in a few things. Don't let any of these hyper-active Fundamental Baptist and Pentecostal pastros make a nervous wreck of you. If they load their teaching with reports of terror from worldly sources-- If they demand that you run around thumping Caesar on the head all the time-- If they demand you keep your life in a frenzy of activity as if everything depends on you and your unique pure one-of-a-kind local church-- If this is your pastors MO, go find another church, or start a house church. Think about it, was jesus in a frenzy all the time? NO. Yet He got the work done which God called Him to do in three and a half years flat.
Preacher, who told you that you were called to whip the pastor across town in building a Sunday School? who said you had to even have ONE church bus running on Sunday morning? Are the back seats of your members' cars full? No? You hypocrite! You are just too big a wimp to preach to them on self-sacrifice. You would lose a bunch of lazy babies, and YOU would have to drive a public school bus to makes ends meet. What are YOU living for anyway? You are climbing, climbing, climbing-- building the glorious resume, right? I dar you to go through the list of ALL your workers in your church, including your wife and kids, and chop out 40 to 50% of the activity. Tell them you want them to just spend the next six moths being families and getting close to the Lord Jesus. Most of you won't because you are not even born again, right? I know exactly what is going on. Games.
By the way, preacher, the above paragraph is the kind of thing that keeps us from being supported by churches in this ministry of Balaam's Ass Speaks. But, I won't change one thing since I look forward to standing before my Lord and giving an answer for the time and energy I put out down here. and, I won't cut corners for YOU. If we have fellowship in this zeal, great. Keep us the good work AND the good rest in Christ. Do you ever rest!!!!!!!??????? Do your people in your church ever rest!!!!!????? How many divorces have YOU caused by driving the saints like dumb oxen?
I think that these last days, just before the rapture of the Lord's Church, will be marked by every sort of distraction. If saints are not giving in to sin and lust, they will be on valium trying to win the whole world to Christ by next Tuesday at 4:00 PM. If they are not on the carpet at the front of the Toronto Airport Church barfing on themselves, they will be in a perfect fit trying to cure sinners of being sinners without getting them saved first. UFO and Yanni and Grey doctrines are now running through the Lord's Church. Divorce and remarriage is now being FUNDED in the offering plate in Dayton, Ohio in a Fundamental Baptist KJV Only church. Karate is now being taught in Fundamental and Pentecostal churches. Satan will do anything to distract the saints. The antics of Caesar are just one of these potential distractions. Just don't let Satan keep your eyes on Washington, Parliament, the State House, or the United Nations.
Psalm 1:3 And he shall be like a tree planted by the rivers of water, that bringeth forth his fruit in his season; his leaf also shall not wither; and whatsoever he doeth shall prosper.
4 The ungodly are not so: but are like the chaff which the wind driveth away.
5 Therefore the ungodly shall not stand in the judgment, nor sinners in the congregation of the righteous.
6 For the LORD knoweth the way of the righteous: but the way of the ungodly shall perish.
God has determined that His saints will be abundant and blessed. How can we relax in this joy with the tension of having someone pagan listening to out most intimate conversations? It is not easy. But, God has assured us that evil men will not prosper, and He is listening in on them also. As the elite of Europe plot the fall of America and the trashing of the Lord's Church to make way for one world spirituality, the Holy Ghost is sitting in on every council meeting and every plotting session. They are NOT operating alone with their father, the devil.
2 Timothy 3:13 But evil men and seducers shall wax worse and worse, deceiving, and being deceived.
14 But continue thou in the things which thou hast learned and hast been assured of, knowing of whom thou hast learned them;
"Continue"!! We are not expected by God to continue in anything but victory. So, as evil men come to see Bible believers as the most dastardly of enemies, God sees YOU as His personal friend. What can they do to alter this? Nothing.
Second: You ought
to be expecting this kind of behavior
from Caesar and his friends in Christendom.
Ephesians 6:12 For we wrestle not against flesh and blood, but against principalities, against powers, against the rulers of the darkness of this world, against spiritual wickedness in high places.
2 Timothy 3:1 This know also, that in the last days perilous times shall come.
2 For men shall be lovers of their own selves, covetous, boasters, proud, blasphemers, disobedient to parents, unthankful, unholy,
3 Without natural affection, trucebreakers, false accusers, incontinent, fierce, despisers of those that are good,
4 Traitors, heady, highminded, lovers of pleasures more than lovers of God;
5 Having a form of godliness, but denying the power thereof: from such turn away.
You need to understand that the chief emotion in modern society is DENIAL. Men do NOT want to be confronted with their sin and greed. They are ungrateful and unthankful to not only God, men today have NO regard for other people around them. They live for self, and they will deny all implications that they are sinners. This is why is now necessary to re-define the Gospel in terms of an add on-- a gimmick. If you try to make men sinners as Moody, Jonathan Edwards, and Billy Sunday did, you will have few if any sinners repent and be saved. This is also why Billy Graham has now said that Buddhists and Hindus are right with God. Graham has figured out the modern audience, and he knows that the old fashioned exclusive Gospel message will not bring them down the aisles. Van Impe knows this, and he has run to kiss the Pope in order to retain a following of self-loving Catholics and dead beats.
You cannot join this mass on the Broad Way. You will be hated and distrusted because you, by just being present with sinful men, not saying one word that is, will be a damning indictment against their sinfulness. They will then feel it is justified for them, Caesar of Paul Crouch and TBN groupies, to spy on you at all times. YOU are the enemy. Friend, that is just where we want them. Can you not see that as they spy on us they are seeing Jesus? Why should we fight this?
Third: You ought to be expecting Christendom
to use more devilish strategies these days.
We repeat the text above. Look for betrayal this time-- by those who claim to be saints in the Lord's Church.
2 Timothy 3:1 This know also, that in the last days perilous times shall come.
2 For men shall be lovers of their own selves, covetous, boasters, proud, blasphemers, disobedient to parents, unthankful, unholy,
3 Without natural affection, trucebreakers, false accusers, incontinent, fierce, despisers of those that are good,
4 Traitors, heady, highminded, lovers of pleasures more than lovers of God;
You need to understand that if you are living holy before the Lord, you WILL be attacked by short rounds-- by those in the Lord's Church. This is the era of the Laodicean Church (Revelation 3:14-end), and this church is perhaps 95% Judases. Did you think you could be at peace with the mass of alleged Christians? Not so, if that is, IF you are living holy before the Lord. A hundred years ago it was not so terrible regarding betrayal and traitors, but times have changed, and praise God for that. All around the world luke warm vomited Christendom is run through with Judas spirits-- devils-- wolves in sheep's clothing. It is now very easy to make it black and white for those with the stomach for biblical separation. This is rally a blessing for those on the narrow way.
John13:21 When Jesus had thus said, he was troubled in spirit, and testified, and said, Verily, verily, I say unto you, that one of you shall betray me.
2 Timothy 4:10 For Demas hath forsaken me, having loved this present world, and is departed unto Thessalonica; Crescens to Galatia, Titus unto Dalmatia.
Both Jesus and Paul were troubled and felt loss and abandonment. This is how you will feel. You will cry. You will groan in your spirit. You will give your best to Judas and Demas, and they will walk away and even arrange for your destruction by Satan's men. Paul Crouch, Benny Hinn, Kilpatrick, Steve Hill, Arnott, Wimber, Wagner, and a thousand other leading lights will soon unleash attacks on the saints. Promise Keepers has already attacked pastors, my own father for one. PK will upgrade this attack every year until we will tremble. But, we cannot resort to hate.
I DO note that Paul let Demas go. He did not try to keep Demas with him at all costs. Indeed, Jesus SENT Judas away from the intimacy of the Upper Room. Jesus did not allow Judas to be in the garden with Him. You and I must be careful NOT to allow these evil ones in Christendom to know our inner thoughts and the plans of our inner circles. We are NOT obligated to expose ourselves to them at all times. Wise as serpents and harmless as doves is what Jesus suggested.
Fourth: These intrusions can be turned to the Glory of God.
Colossians 2:15 And having spoiled principalities and powers, he made a shew of them openly, triumphing over them in it.
Titus 3:1 Put them in mind to be subject to principalities and powers, to obey magistrates, to be ready to every good work,
1 Peter 3:15 But sanctify the Lord God in your hearts: and be ready always to give an answer to every man that asketh you a reason of the hope that is in you with meekness and fear:
So, do they want to check our E-Mail? Do they actually turn on our phones when they are hung up and listen to us? Do they peek at us from afar? Do they now have such power from devils in their souls in the US Army that they can get so very near to us? Whatever their access, give them the works folks :-)
Make posters and put them on the roof for their satellites to read. Trigger the Echelon Dictionary listening stations. Use words like Saddam Hussein, Ghadaffi, and bomb. Then give them the Gospel. They will have to read the whole message in some dark cavern in the CIA and in National Security Agencies. They will have to get the Gospel. We can thus use THEIR schemes to give them the opportunity to learn about Jesus.
While on the phone, use the same tactic. When with a friend in Christ, ask, "Fred, would you like to give the Gospel to the CIA?" Fred will hopefully say, "Sure, but how?" Next, use some "dangerous words" of terrorists leaders, AND I am told that they are very interested in anything about Mitsubishi, Nissan, and other Japanese power companies. Then say, "OK Fred, give them the Gospel, the tape recorder is running, and they have to listen to all we say in case we are dangerous foreign agents."
See there? It is not all that terrifying in these last days. In fact, we can have some fun that Moody and your grandfather never dreamed of. USE the system as a tool of witness. "Instant, in season and out of season..."
is there someone you know who should read this page?
Why not call them and tell them about it?