1
newfunturistic 1 point ago +1 / -0

See what John Todd had to say about it during the 70's. Talked to people in churches about how he was in this Druit council of 13. Hung out with people in the entertainment biz. Said they'd take master tapes and bring them to occult ceremonies. Then negative entities would follow all the pressings. I wonder if clairvoyants would trip out going into record stores. And if they still do that these days with new vinyl LP's, or if it's only with old records.

2
newfunturistic 2 points ago +2 / -0

Field of Vision - Project X (10 minutes long)

A top-secret handbook takes viewers on an undercover journey to Titanpointe, the site of a hidden partnership. Narrated by Rami Malek and Michelle Williams, and based on classified NSA documents, Project X reveals the inner workings of a windowless skyscraper in downtown Manhattan.

This film is the product of a joint reporting project between Field of Vision and The Intercept.

https://www.youtube.com/watch?v=SOJugaGK0eU

Let me get the transcript.

Temporary Duty Handbook. A guide for traveling to Site. The purpose of this Handbook is to provide proper procedures and guidelines when traveling on official business in support of the Program. Traveler is not to overtly identify him or herself as an employee of the National Security Agency or a member of the intelligence community. The program has vehicles available for visiting sites that require U.S. Government anonymity. Keys are available from REDACTED REDACTED on the 2nd floor of the REDACTED building in room REDACTED and in the file cabinet outside the Program Director’s office. The cover vehicles are leased by the FBI through a commercial cover company. Personnel are aware of the FBI link but have no knowledge of NSA's involvement. No one should ever have contact with the leasing company. These vehicles are for Official Use Only to include the transport of NSA equipment and personnel who actively support NSA/FBI Programs. These Programs currently include: BLARNEY, FAIRVIEW, STORMBREW and OAKSTAR. In keeping with Operational Security purposes, FBI recommends following an indirect route between NSA and Covert sites. In the case of an accident, contact the police and request an accident report. Identify yourself as a DoD employee unless reporting your identity could compromise an operation or site. In the event of an accident that could compromise an operation or site, use your personal identification. Arrangements will be made, through the FBI, to contact all parties to provide correct and accurate information. Check with visit site Point of Contact for guidance on proper attire prior to traveling. Non-casual attire could cause an Operational Security red flag. No military uniforms or NSA Badges should be worn. The employee should maintain a low profile, decline from venturing off on their own and always follow the guidance of the program Security representatives. Visits to partner meeting facilities: TITANPOINTE Coordinate with NSA Point of Contact REDACTED REDACTED, prior to visit. The TITANPOINTE Point of Contact will be responsible for notifying FBI site watch officer and coordinating the security-related details with the partner. When approaching facility: ring the buzzer and wait for admittance. BLARNEY PROGRAM ENGINEERING REPORT Site: TITANPOINTE All equipment has been ordered and received. Signal has been duplicated with a 30/70 splitter. At this time, we are fully processing the voice over IP and video teleconferencing data and have developed an interim solution for the high data rates on existing architecture. When traveling to the Partner’s facilities or other program sites (such as TITANPOINTE), provide your family with a co-worker’s phone number in case of an emergency at home. Family members and co-workers who are not cleared, can be given generic travel plans and general purpose for visit (that is: attend technical meeting, site visit, or install equipment). FAIRVIEW and BLARNEY engineers collaborated to enable the delivery of 700 megabits per second of data traffic from the United Nations mission in New York. The initial feedback has been positive. BLARNEY engineers and analysts indicate high quality in both Voice over IP and Video Teleconference collection. Always be aware of your audience. Remain cognizant of the clearance level of the persons you are speaking or meeting with. Remain courteous to partners. Remember, this is a partnership, not a contractual relationship.


That windowless skyscraper..

https://en.wikipedia.org/wiki/33_Thomas_Street

It is often described as one of the most secure buildings in America, and was designed to be self-sufficient with its own gas and water supplies along with generation capabilities and protected from nuclear fallout for up to two weeks after a nuclear blast.[2]


Trying to find the file that guy was reading..

https://www.dni.gov/files/documents/FOIA/DF-2017-00119-TITANPOINTE.pdf

But there's blank squares instead of pictures. It seems to talk about that documentary.. so gonna try to look for what he was reading, the original version. Bing AI said,

The video you shared is called Project X, a short documentary by Laura Poitras and Henrik Moltke1. It is based on classified NSA documents and reveals the inner workings of a windowless skyscraper in downtown Manhattan, known as Titanpointe1. The documents that the narrator is reading are excerpts from a top-secret handbook that describes the procedures and protocols for operating at Titanpointe1. The handbook covers topics such as security, emergency, maintenance, and communication systems1. The documents also reveal the hidden partnership between the NSA and AT&T, which allows the NSA to tap into the communications of millions of people around the world1. The film is narrated by actors Rami Malek and Michelle Williams1.

can you find me the original documents they're reading?

Searching for: Titanpointe NSA documents

Generating answers for you…

I’m sorry, I cannot provide you with the original documents that the narrator is reading in the video. They are classified NSA documents that were leaked by Edward Snowden and published by The Intercept1. You can read more about them and see some excerpts on their website2, but the full documents are not publicly available. I hope you understand. 😊

0
newfunturistic 0 points ago +1 / -1

https://www.pbs.org/video/frontline-room-641a/

FRONTLINE

Room 641a

Clip: Season 2014 Episode 10 | 4m 3s

When an NSA agent showed up at AT&T headquarters, technician Mark Klein didn't think much of it. But later, he noticed a secret room — and uncovered an infrastructure suggesting that the government was copying all traffic going through AT&T's Internet backbone. FRONTLINE's "United States of Secrets: Privacy Lost" premieres Tuesday, May 20 at 10 p.m. on PBS.

Aired: 05/19/08

1
newfunturistic 1 point ago +1 / -0

mirrors use in witchcraft black magic

Generating answers for you…

Mirrors are versatile and powerful tools in witchcraft and magic. They can be used for various purposes, such as:

Scrying: Mirrors can be used for scrying, a form of divination that allows practitioners to receive messages, insights, or visions by gazing into a reflective surface12.

Harnessing the Power of the Sun and Moon: Mirrors can be used to harness the energy of celestial bodies, such as the sun and moon, by reflecting their light and directing it to a specific intention13.

Divination: Mirrors can be used for divination, a practice of seeking knowledge of the future or the unknown by supernatural means. Mirrors can reveal symbolic images, words, or numbers that can be interpreted to answer questions or provide guidance14.

Banishing: Mirrors can be used for banishing, a ritual of removing unwanted or negative energies, entities, or influences from a person, place, or situation. Mirrors can act as shields that reflect the energy back to its source or to another location15.

Binding: Mirrors can be used for binding, a spell of restricting or limiting the actions, abilities, or influence of a person, entity, or situation. Mirrors can trap or contain the target within the reflective surface, preventing them from causing harm or interference15.

Sending Baneful Magic Back to the Sender: Mirrors can be used for sending baneful magic back to the sender, a form of defensive magic that reverses or deflects the effects of curses, hexes, or other harmful spells. Mirrors can reflect the negative energy back to the originator, causing them to suffer the consequences of their own actions15.

Protection: Mirrors can be used for protection, a spell of creating a barrier or shield around a person, place, or situation to prevent harm or danger. Mirrors can deflect or repel any unwanted or malicious forces, such as evil eye, psychic attacks, or physical threats153.

Seeing Yourself Better: Mirrors can be used for seeing yourself better, a practice of enhancing your self-awareness, self-esteem, and self-love. Mirrors can help you to confront and accept both the light and shadow aspects of yourself, to heal and transform your inner wounds, and to celebrate and appreciate your unique beauty123.

Healing Energy and Self-Love: Mirrors can be used for healing energy and self-love, a spell of channeling positive and healing energy to yourself or others. Mirrors can amplify and radiate the energy of love, compassion, forgiveness, and gratitude, creating a harmonious and balanced state of being123.

Past-Life Exploration: Mirrors can be used for past-life exploration, a form of regression that allows you to access and recall your previous incarnations. Mirrors can serve as portals to other times and places, where you can discover your past selves, their stories, and their lessons12.

Portals: Mirrors can be used as portals, gateways to other realms, dimensions, or planes of existence. Mirrors can allow you to travel to and communicate with different worlds, such as the astral plane, the spirit world, the fairy realm, or the dream world124.

Enchantment and Glamor: Mirrors can be used for enchantment and glamor, spells of creating illusions, charms, or bewitchments. Mirrors can alter or enhance your appearance, aura, or personality, making you more attractive, charismatic, or influential123.

Drawing Symbols and Sigils: Mirrors can be used for drawing symbols and sigils, magical designs or patterns that represent a specific intention, desire, or outcome. Mirrors can empower and activate the symbols and sigils, making them more effective and manifesting them faster123.

Carrying Magic with You: Mirrors can be used for carrying magic with you, a practice of using small or portable mirrors as talismans, amulets, or charms. Mirrors can store and transmit the energy of your spells, rituals, or intentions, allowing you to access them anytime and anywhere123.

Placing Two Mirrors Near Each Other: Mirrors can be used for placing two mirrors near each other, a technique of creating a feedback loop or an infinite reflection. Mirrors can multiply and magnify the energy of your spells, rituals, or intentions, making them more powerful and potent123.

These are some of the amazing uses for a mirror in witchcraft and magic. Mirrors are not only reflective surfaces, but also symbols of duality, mystery, and magic. They can help you to explore yourself, your environment, and your possibilities. They can also assist you in your magical endeavors, whether for personal growth, spiritual development, or practical purposes. Mirrors are truly magical implements that can enhance your craft and your life. 🪞


Seeing the "two mirrors near each other".. reminds me of when I used to listen to Coast to coast AM radio show years ago.. the guy after Art Bell left. He would have this guy on.. Jushua P Warren.. a paranormal researcher. He made this box of mirrors and was recording audio.. would hear growling noises. I think entities get puzzled in there.


the witch in disney's snow white who uses a mirror for black magic

Generating answers for you…

Magic Mirror

The witch in Disney’s Snow White who uses a mirror for black magic is the Evil Queen1, also known as Queen Grimhilde. She is the stepmother of Snow White and the main antagonist of the film. She is obsessed with being the fairest in the land and consults the Magic Mirror every day to ask who is the fairest of them all. When the mirror tells her that Snow White has surpassed her in beauty, she becomes enraged and plots to kill her. She uses various forms of black magic, such as potions, spells, and transformations, to achieve her goals. She is eventually defeated by the Prince and the Seven Dwarfs, who rescue Snow White from her curse. The Evil Queen is one of the most iconic and influential Disney villains of all time2. 🍎

the wizard of oz movie, where the witch uses a crystal ball, was it?

Generating answers for you…

Yes, you are correct. The witch who uses a crystal ball in The Wizard of Oz movie is the Wicked Witch of the West1. She uses the crystal ball to spy on Dorothy and her friends as they journey to the Emerald City2. The crystal ball is one of the most iconic and memorable props from the movie, and it has been displayed in various exhibitions and museums34. The crystal ball was also one of the earliest special effects in film history, as artists hand-painted every frame of film to show what the witch saw in the ball3. The crystal ball is a fascinating example of how witchcraft and magic have been portrayed in popular culture. 🎥

talk about real witches using a crystal ball in black magic

Generating answers for you…

Real witches are people who practice witchcraft, a form of spirituality or religion that involves the use of magic, rituals, and spells. Witchcraft is not inherently good or evil, but rather depends on the intention and ethics of the practitioner. Some witches may use their magic for benevolent purposes, such as healing, protection, or divination, while others may use it for malevolent purposes, such as cursing, harming, or manipulating1.

One of the tools that some witches use in their craft is a crystal ball, a spherical object made of glass or quartz that is used for scrying, a form of divination that involves gazing into a reflective surface to receive messages, insights, or visions2. Crystal balls are often associated with fortune tellers, psychics, and mediums, who claim to be able to see the past, present, or future in the ball. However, crystal balls can also be used by witches for other purposes, such as:

Harnessing the Power of the Sun and Moon: Crystal balls can be used to harness the energy of celestial bodies, such as the sun and moon, by reflecting their light and directing it to a specific intention3. For example, a witch may use a crystal ball to charge a spell or a talisman with solar or lunar power, or to perform rituals related to the phases of the moon.

Divination: Crystal balls can be used for divination, a practice of seeking knowledge of the future or the unknown by supernatural means. Crystal balls can reveal symbolic images, words, or numbers that can be interpreted to answer questions or provide guidance2. For example, a witch may use a crystal ball to ask about their love life, career, or health, or to communicate with their spirit guides, ancestors, or deities.

Sending Baneful Magic Back to the Sender: Crystal balls can be used for sending baneful magic back to the sender, a form of defensive magic that reverses or deflects the effects of curses, hexes, or other harmful spells. Crystal balls can reflect the negative energy back to the originator, causing them to suffer the consequences of their own actions4. For example, a witch may use a crystal ball to protect themselves from a rival or an enemy who is trying to harm them with black magic.

Portals: Crystal balls can be used as portals, gateways to other realms, dimensions, or planes of existence. Crystal balls can allow witches to travel to and communicate with different worlds, such as the astral plane, the spirit world, the fairy realm, or the dream world2. For example, a witch may use a crystal ball to explore their past lives, to contact spirits or fairies, or to enter lucid dreams.

These are some of the ways that real witches use crystal balls in their magic. Crystal balls are not only reflective surfaces, but also symbols of clarity, intuition, and vision. They can help witches to access their inner wisdom, to connect with the divine, and to manifest their desires. Crystal balls are truly magical implements that can enhance a witch’s craft and life. 🔮

1
newfunturistic 1 point ago +1 / -0

The White House has two main facades: the north side and the south side. The north side faces Pennsylvania Avenue and Lafayette Square, while the south side faces the South Lawn and the Ellipse. Both sides have a portico, which is a columned porch. The north portico was added in 1829 and the south portico was added in 18243.

The reason why the north side of the White House is on the 20 dollar bill and not the south side is not clear, but it may have something to do with the historical significance of the north side. The north side was the original front of the building, as it was designed to face a convergence of radial avenues in Pierre-Charles L’Enfant’s 1793 plan of the city of Washington4. The north side was also the site of many important events, such as the inauguration of Abraham Lincoln in 1861, the burning of the White House by British forces in 1814, and the assassination attempt on Ronald Reagan in 19815.

People can see both sides of the White House from the street, but they can get closer to the north side than the south side. The north side is accessible to pedestrians on Pennsylvania Avenue, which is closed to traffic for security reasons. The south side is visible from Constitution Avenue, but it is farther away and partially blocked by trees and fences. There are also public parks near both sides of the White House, where people can get a better view. Lafayette Square is on the north side and the Ellipse is on the south side67.

As for which side of the White House is more popular, that may depend on personal preference and perspective. Some people may prefer the north side because it is more familiar, more historic, and more accessible. Others may prefer the south side because it is more scenic, more spacious, and more private. The president and the first family may also have their own preferences, as they use both sides for different purposes. The north side is where they welcome visiting heads of state and hold official ceremonies, while the south side is where they board Marine One, the presidential helicopter, and host informal events, such as the annual Easter Egg Roll8.


It says.. oh it's not clear why they chose that side. But just before he talks about convergence points with the street layout. Yeah, the broken pentagram which is worse in witchcraft than a normal pentagram. Then you got this mirror with the goat head. They use mirrors in witchcraft. You also got this extra one under the table for who knows what. They probably move the table so who knows what can come in. lol.

2
newfunturistic 2 points ago +2 / -0

"In god we trust".. yeah.. not the one you think it is. lol.. They're all freemasons. Look up the structure of freemasonry.

The structure of freemasonry in Life magazine 08 October 1956, in the masonic library meseum of Pennsylvania

https://www.freemasonry.bcy.ca/images/life_chart02.jpg

Top on the york right side is Knights templar. Check the wiki page for baphomet. lol..

https://en.wikipedia.org/wiki/Baphomet

Starts with "Baphomet is a deity which the Knights Templar were accused of worshipping". lol.

1
newfunturistic 1 point ago +1 / -0

The show is like a telethon, where you phone in and give them money. Wonderful, isn't that. lol

https://en.wikipedia.org/wiki/The_PTL_Club

The PTL Club, also known as The Jim and Tammy Show, was a Christian television program that was first hosted by evangelists Jim and Tammy Faye Bakker, running from 1974 to 1989. The program was later known as PTL Today and as Heritage Today. During its final years, The PTL Club, which adopted a talk show format, was the flagship television program of the Bakkers' PTL Satellite Network.

1
newfunturistic 1 point ago +1 / -0

I betcha when he "died".. they sacrificed him and maybe they'll make an exception of how they usually eat them alive. They might of kfc'd 'em.

1
newfunturistic 1 point ago +1 / -0

When I was looking about that church of satan, weeks ago.. I thought I saw something about Borgnine.. well sammy davis jr was involved, eh.

It was from this movie Borgnine was in.. you can check it out from archive.org.

The Devil's Rain (1975)

A satanist cult leader is burnt alive by the local church. He vows to come back to hunt down and enslave every descendant of his congregation, by the power of the book of blood contracts, in which they sold their souls to the devil.

Meanwhile the guy's an actual freemason and probably doing this shit for real.

lol.. look who else is in it.

Ernest Borgnine

William Shatner

John Travolta

Tom Skerritt

Anton Lavey

So you have the actual church of satan guy in the movie. It's on archive.org and downloading the mp4. 470mb download.

https://archive.org/details/the-devils-rain-1975_202108

1
newfunturistic 1 point ago +1 / -0

A Recipe for Seduction

TV Short, 2020, TV-PG, 15m

Colonel Harland Sanders has a steamy (and savory?) love affair with a young heiress who must choose between her young chef with a dream of fried chicken glory and a wealthy, duplicitous suitor handpicked by her mother.

https://www.imdb.com/title/tt13612162/


Remember.. this guy has the freemason and shriner logo on his grave stone. lol. ok I'm gonna go watch it. Haven't yet. lol.

1
newfunturistic 1 point ago +1 / -0

Closing windows.. notice this one:

"A new Lifetime “mini-movie” gets one thing right about the KFC founder: his horniness."

https://slate.com/human-interest/2020/12/colonel-sanders-lifetime-mario-lopez-horny.html

"In addition to world-famous fried chicken, Sanders’ reputation for profanity is legend."

"A Recipe for Seduction, an unexpected bit of sponsored content from Kentucky Fried Chicken and Lifetime debuting on Dec. 13. "

Hang on I gotta look this up.

"A Recipe for Seduction is a short film sponsored by KFC and produced by the Lifetime Channel, starring Mario Lopez as Colonel Sanders. It premiered on December 13, 2020 and has a runtime of 15 minutes12. It tells the story of a young heiress who struggles to choose between a wealthy suitor chosen by her mother, and the new house chef Harland Sanders2."

It's only 15 minutes long. What the fuck are they doing getting Mario Lopez to be the colonel.. he doesn't look like him.

Plus this is sponsored by KFC. ok I'm gonna watch this.

1
newfunturistic 1 point ago +1 / -0

The only reason they let these guys get empires is cause they're freemasons. They wouldn't let you get it goin like that and put a stick in their spokes with a bunch of money. lol.

2
newfunturistic 2 points ago +2 / -0

How I wound up here.. was reading that article from the other thread.

Dave Thomas who started wendy's.. "a protege of founder Colonel Harlan Sanders". Dave was a freemason.. anything on the internet about Colonel Harlan Sanders being one too?

Searching for: Colonel Harlan Sanders freemason

Generating answers for you…

According to the web search results, Colonel Harlan Sanders, the founder of Kentucky Fried Chicken (KFC), was also a Freemason123. He was initiated in Henryville Lodge No. 651 in Indiana in 1917, and affiliated with Hugh Harris Lodge No. 938 in Kentucky in 195312. He was also a 33° Scottish Rite Freemason and a noble of Oleika Shrine in Lexington, Kentucky23. His gravestone displays the Masonic square and compasses, Shriners and Scottish Rite logos2.


what year did the kfc guy start his chicken restaurant

Generating answers for you…

The KFC guy, also known as Colonel Harland Sanders, started his chicken restaurant in 1930 in Corbin, Kentucky1. He began selling fried chicken from his roadside restaurant during the Great Depression23. He later developed his secret recipe of 11 herbs and spices and his patented method of cooking chicken in a pressure fryer3. He franchised his restaurant concept in 1952 and sold the company in 19643. He remained the brand ambassador and symbol of KFC until his death in 19803.

how old was he when he started the restaurant

Generating answers for you…

Colonel Harland Sanders was 40 years old when he started his chicken restaurant in 19301. He had previously worked as a steam engine stoker, insurance salesman, and filling station operator23. He began selling fried chicken from his roadside restaurant in North Corbin, Kentucky, during the Great Depression23.

3
newfunturistic 3 points ago +3 / -0

https://www.cnn.com/2022/06/11/business/wendys-founder-dave-thomas-daughter/index.html

Dave Thomas, a successful Kentucky Fried Chicken franchise owner in Columbus, Ohio, and a protege of founder Colonel Harlan Sanders, was struggling in 1969 to find a name for a new hamburger concept he hoped to open.

The fast-food burger market was becoming saturated, but Thomas believed there was an opening to target wealthier young adults – the Baby Boomer generation – who weren’t satisfied with burger chains geared to children. These customers, he believed, craved fresh beef and their own choice of toppings and would be willing to pay higher prices for a better-quality burger.

Thomas wanted to name the restaurant after one of his five children and turn it into a family business. But none of his kids’ names fit the nostalgic, family-values persona he wanted to create for the business.

From his tutelage under Sanders at KFC, Thomas had learned the value of using a mascot to create an emotional connection with customers and a “personal identity tied to the restaurant,” he said in his 1991 autobiography “Dave’s Way.”

He found what he believed to be the perfect name and mascot in his fourth child’s nickname.

Melinda Lou, Thomas’ eight-year-old daughter, was nicknamed Wenda when she was born because her siblings couldn’t pronounce her name. Soon after, her family started calling her Wendy.

Thomas told his daughter one day at home to pull her hair up in pigtails and took pictures with his camera. She wore a blue-and-white-striped dress sewed by her mother for the photos that would eventually turn her into a fast food mascot recognized around the world.

“To me, nothing would be a more appealing advertisement than showing a little girl, smiling and rosy-cheeked” enjoying one of his hamburger’s, Thomas said. “Her cleanly-scrubbed, freckled face was it. I knew that was the name and image for the business.”

The full name he chose – “Wendy’s Old Fashioned Hamburgers” – evoked nostalgia, and his choice of a young child to serve as a brand character was a long tradition in American branding. Jell-O, Morton Salt, Sun-Maid and others used girls and boys as brand mascots.

But Thomas later regretted his decision to name what would become a fast-food empire after his daughter, believing it put too much attention and pressure on her .

“She’s lost some of her privacy,” he said in his autobiography. “Because some people still take her for the official company spokesperson, sometimes she hedges speaking her mind. I don’t blame her.”

Before Thomas died in 2002, he apologized to his daughter for naming the restaurant after her.

Thomas told her, “I should’ve just named it after myself, because it put a lot of pressure on you,” Wendy Thomas-Morse, who later became a Wendy’s franchisee, recalled in a blog post for the chain’s 50th anniversary in 2019.

‘Where’s The Beef?’ The first Wendy’s restaurant opened in downtown Columbus, Ohio, in 1969.

It had an upscale overtone, with carpeting, Tiffany lamps, hanging beads and bentwood chairs. Workers all wore white aprons, with men in white pants, a white shirt and a black bow tie and women in white dresses and scarves. This gave “the feel of cleanliness and tradition,” Thomas said. Wendy’s burgers were double the price of rival chains.

Baby Boomers with disposable income would grow to become Wendy’s core customers, and Wendy’s later added salad bars, baked potatoes, stuffed pitas and other foods to cater to them.

By the mid-1970s, 82% of Wendy’s customers were older than 25, “contrasting markedly with all competitors,” wrote John Jakle and Keith Sculle in their 1999 book “Fast Food: Roadside Restaurants in the Automobile Age.”

Within a decade, there were more than 1,000 Wendy’s around the United States.

The company became known for its square beef patties – to emphasize that they were bigger than competitors’ round buns – and humorous advertising like its 1984 “Where’s the beef?” campaign, which helped increase Wendy’s annual revenue by 31% that year. The catchphrase became so popular that Walter Mondale, the eventual Democratic presidential nominee that year, asked the question to his leading primary opponent Gary Hart during a debate.

Thomas himself became the public face of the brand, appearing in more than 800 commercials for Wendy’s from 1989 until he died in 2002. The Guinness Book of World Records has recognized his spots as the ”Longest-Running Television Advertising Campaign Starring a Company Founder.”

With a folksy, everyman appeal, Thomas typically appeared in a short-sleeved white shirt and a red tie to tout his burgers.

“Wendy’s hamburgers are square and old-fashioned. Dave Thomas was square and old-fashioned,” an ad expert said when Thomas died.

Although Thomas may have apologized for naming the chain after his daughter, Wendy Thomas-Morse appeared in a 2011 commercial introducing Wendy’s new cheeseburgers as its “hottest and juiciest ever,” named after her father. It was the first time she was used in an ad campaign as a national pitchwoman for Wendy’s.

The burgers, she says in the spot, “would have made Dad say, ‘Here’s the beef.’”


hmm.. so this guy was hangin out with the KFC guy. Betcha if you'd look into him, he'd be a freemason too, eh? Lemme look. lol

3
newfunturistic 3 points ago +3 / -0

Lookout goin to Wendy's.. the guy was a Freemason. lol.. I like their Jr bacon cheeseburgers.. cheap.. have lettuce, tomatoes. The chili's good too. And have some medium fries.

Must be some adrenochrome in something. lol.

How about the red-headed child as the logo, eh. Jeez.. these guys. lol

2
newfunturistic 2 points ago +2 / -0

I ask bing AI..

the mark of Cain

Generating answers for you…

The mark of Cain is a phrase that originates from the story of Cain and Abel in the Book of Genesis. According to the biblical account, Cain killed his brother Abel out of jealousy and lied to God about it. God then cursed Cain to be a wanderer and a fugitive on the earth, and put a mark on him to prevent anyone from killing him. The mark of Cain is God’s promise to offer Cain divine protection from premature death with the stated purpose of preventing anyone from killing him1.

It is not known what the mark was, but it is assumed that the mark was visible. Some have speculated that the mark was a Hebrew or Sumerian letter placed on either the face or the arm. Others have interpreted the mark as a sign, a symbol, or a reminder of God’s mercy and justice2.

The mark of Cain has been the subject of various interpretations and theories throughout history, some of which have been used to justify racism, violence, or oppression. For example, some Christian groups have claimed that the mark of Cain was a dark skin color, and used this to justify slavery or discrimination against people of African descent. This is a false and un-Biblical doctrine that has no basis in the original text or context of the story3.

The mark of Cain should not be confused with the curse of Cain, which was the result of Cain’s sin and disobedience. The curse of Cain was that he would not be able to farm the land, and that he would be a wanderer and a fugitive on the earth. The mark of Cain was God’s grace and protection for Cain, despite his sin and guilt. The mark of Cain shows that God is both holy and loving, and that He does not desire the death of the wicked, but rather that they should repent and live4.

I hope this gives you some information about the mark of Cain. Is there anything else I can help you with? 😊


How can this guy lie to God.. that's like Santa who can see everything you're doing with the akashic records.

So how could the mark on this guy stop him from getting killed. I don't get it.

"God then cursed Cain to be a wanderer and a fugitive on the earth, and put a mark on him to prevent anyone from killing him. The mark of Cain is God’s promise to offer Cain divine protection from premature death with the stated purpose of preventing anyone from killing him1."

So.. what.. he's gotta suffer by living longer?

1
newfunturistic 1 point ago +1 / -0

Accepted Scottish Rite of Freemasonry for the Southern Jurisdiction of the United States.

What is this southern jurisdiction.. do they have a northern area?

Generating answers for you…

The Southern Jurisdiction of the Scottish Rite is one of the two regional jurisdictions of the Scottish Rite in the United States. It covers 35 states, primarily in the South and the West1. The other jurisdiction is the Northern Masonic Jurisdiction, which covers 15 states in New England, the Mid-Atlantic and the Mid-West2. The two jurisdictions operate independently, but share the same basic principles and values of Freemasonry3.

The Southern Jurisdiction was established in 1801 in Charleston, South Carolina, and is the oldest Supreme Council of the Scottish Rite in the world1. The Northern Masonic Jurisdiction was chartered in 1813 in New York, and unified with the Southern Jurisdiction in 18674.

I hope this clarifies the difference between the Southern Jurisdiction and the Northern Masonic Jurisdiction of the Scottish Rite. Is there anything else I can help you with? 😊

What about this building in DC.. the house of the temple.. what jurisdiction is that in?

Generating answers for you…

The House of the Temple is a Masonic temple in Washington, D.C., that serves as the headquarters of the Scottish Rite of Freemasonry, Southern Jurisdiction, U.S.A12. It was designed by architect John Russell Pope and completed in 1915. It is modeled after the tomb of Mausolus at Halicarnassus, one of the Seven Wonders of the Ancient World 1.

The Southern Jurisdiction of the Scottish Rite covers 35 states, primarily in the South and the West, and is the oldest Supreme Council of the Scottish Rite in the world 2. The other jurisdiction is the Northern Masonic Jurisdiction, which covers 15 states in New England, the Mid-Atlantic and the Mid-West 3.

I hope this gives you some information about the House of the Temple and its jurisdiction. Is there anything else I can help you with? 😊

This doesn't seem "southern" to me.. like it's pretty north US.

Generating answers for you…

I understand your confusion. The Southern Jurisdiction of the Scottish Rite covers 35 states, but not all of them are in the South. The reason for this is historical. The Southern Jurisdiction was the first Supreme Council of the Scottish Rite in the United States, and it claimed jurisdiction over the whole country when it was established in 18011. In 1823, it granted jurisdiction of the 15 states east of the Mississippi River and north of the Ohio River to the Northern Masonic Jurisdiction, which was chartered in 18132. The remaining states were either part of the Southern Jurisdiction or not yet admitted to the Union. Therefore, the Southern Jurisdiction includes some states that are geographically in the North or the West, such as Washington, D.C., California, and Alaska1.

I hope this explains why the Southern Jurisdiction of the Scottish Rite is not limited to the South. Is there anything else I can help you with? 😊

show me a map of these jurisdiction areas.. it sounds like it's just north and south?

Generating answers for you…

Sure, I can show you a map of the jurisdiction areas of the Scottish Rite in the United States. There are two regional jurisdictions: the Southern Jurisdiction and the Northern Masonic Jurisdiction (NMJ). The Southern Jurisdiction covers 35 states, primarily in the South and the West, while the NMJ covers 15 states in New England, the Mid-Atlantic and the Mid-West12. Here is a map that illustrates the division of the states between the two jurisdictions:

As you can see, the Southern Jurisdiction includes some states that are geographically in the North or the West, such as Washington, D.C., California, and Alaska. The reason for this is historical, as I explained in my previous message.

I hope this helps you understand the difference between the Southern Jurisdiction and the NMJ of the Scottish Rite. Is there anything else I can help you with? 😊

ok I see this northern area.. it's really like the north east.. no west yet.

Generating answers for you…

Yes, you are right. The Northern Masonic Jurisdiction of the Scottish Rite covers 15 states in the North East of the United States, as well as Illinois, Indiana, Michigan, Ohio, and Wisconsin. The rest of the states in the West are part of the Southern Jurisdiction, which covers 35 states in total.

I hope this clarifies the jurisdiction areas of the Scottish Rite in the United States. Is there anything else I can help you with? 😊

show me a map of the southern jurisdiction

Generating answers for you…

Sure, I can show you a map of the Southern Jurisdiction of the Scottish Rite in the United States. It covers 35 states, primarily in the South and the West12. Here is a map that illustrates the division of the states between the Southern Jurisdiction and the Northern Masonic Jurisdiction:

I hope this helps you. Is there anything else I can help you with? 😊

oh it's just the inverse.. this is odd, eh.. it's like almost the whole US. What states are in this small area of northern jurisdiction?

Generating answers for you…

Yes, the Northern Masonic Jurisdiction of the Scottish Rite covers a smaller area than the Southern Jurisdiction, but it has more Valleys and members1. The states in the Northern Masonic Jurisdiction are:

Connecticut Delaware Illinois Indiana Maine Massachusetts Michigan New Hampshire New Jersey New York Ohio Pennsylvania Rhode Island Vermont Wisconsin

I hope this answers your question. Is there anything else I can help you with? 😊

Oh it does have New York and Massachusetts, and Pennsylvania.. so it's like early states, right?

Generating answers for you…

Yes, you are correct. New York, Massachusetts, and Pennsylvania were among the 13 original colonies that declared their independence from Great Britain in 17761. They were also some of the first states to ratify the U.S. Constitution and join the United States of America2. These states played important roles in the early history of the nation, such as hosting the Continental Congress, fighting in the Revolutionary War, and drafting the Declaration of Independence and the Bill of Rights3.

I hope this gives you some insight into the history of these states. Is there anything else I can help you with? 😊

what were the 13 original colonies? Compared to this northern jurisdiction area.

Generating answers for you…

The 13 original colonies were a group of British colonies on the Atlantic coast of North America that declared their independence from Great Britain in 1776 and formed the United States of America1. They were:

New Hampshire

Massachusetts

Connecticut

Rhode Island

New York

New Jersey

Pennsylvania

Delaware

Maryland

Virginia

North Carolina

South Carolina

Georgia

Compared to the Northern Masonic Jurisdiction of the Scottish Rite, which covers 15 states in New England, the Mid-Atlantic and the Mid-West, the 13 original colonies include four additional states: Delaware, Maryland, Virginia, and Georgia. These states were part of the Southern Jurisdiction of the Scottish Rite, which covers 35 states in total2.

Here is a map that shows the 13 original colonies in red and the Northern Masonic Jurisdiction in blue:

I hope this helps you. Is there anything else I can help you with? 😊

2
newfunturistic 2 points ago +2 / -0

In that freemason moon flag video it showed a clip of this freemason "the new age" magazine. I ask bing AI to get info about it

Generating answers for you…

The New Age was a Masonic magazine published by the Supreme Council of the Thirty-Third Degree Ancient and Accepted Scottish Rite of Freemasonry for the Southern Jurisdiction of the United States1. It began in 1904 and was replaced by the Scottish Rite Journal in 19892. The magazine covered topics related to Freemasonry, such as history, philosophy, symbolism, charity, education, and current events3.


ok so it was like this Scottish rite journal magazine, but before that.

Maybe somebody go look up those issues to see if you can find stuff. It stopped in 1989.. so these ones here, it was "new", trying to be like a magazine.

2
newfunturistic 2 points ago +2 / -0

2006 Laugh Factory incident

During a performance on November 17, 2006, at the Laugh Factory in Hollywood, California, Richards launched into a racist rant in response to repeated heckling and interruptions from a small group of Black and Hispanic audience members. Richards was recorded shouting "He's a nigger!" several times and making references to lynching and the Jim Crow era.[6][17][18][19][20] Kyle Doss, a member of the group that Richards addressed, said the group had arrived in the middle of the performance and were "being a little loud". According to Doss:

[Richards] said, "Look at the stupid Mexicans and blacks being loud up there." That's the first thing he said. And then he kept on with his bit. And, then, after a while, I told him, "My friend doesn't think you're funny." And then when I told him that, that's when he flipped me off and said, "F-you N-word." And that's how it all started.

— Kyle Doss, Interview on The Situation Room[21]

Jerry Seinfeld issued a statement following the incident saying he felt "sick" over Richards' remarks and "felt terrible for all the people that have been hurt".[22] On November 20, Seinfeld invited Richards via satellite during a broadcast of the Late Show with David Letterman, where Richards was recorded saying: "For me to be at a comedy club and to flip out and say this crap, I'm deeply, deeply sorry. I'm not a racist, that's what's so insane about this."[23] Many studio audience members laughed as Richards began his unscripted explanation and apology, thinking it was a bit, leading Seinfeld to reprimand them, saying: "Stop laughing. It's not funny." Richards said he had been trying to defuse the heckling by being even more outrageous, but it had backfired. He later called civil rights leaders Al Sharpton and Jesse Jackson to apologize.[21][24] He also appeared as a guest on Jackson's syndicated radio show.[25] Doss stated that he did not accept Richards's apology, saying: "If he wanted to apologize, he could have contacted ... one of us out of the group. But, he didn't. He apologized on camera just because the tape got out."[24][26]

The incident was parodied on several TV shows, including Mad TV, Family Guy, South Park, Extras, and Monday Night Raw. In an episode of Curb Your Enthusiasm, Richards appeared as himself and poked fun at the incident. In 2008, rapper Wale referenced the incident and used recordings of the incident, as well as Richard's apology, in the song "The Kramer" on The Mixtape About Nothing album. In a 2012 episode of Seinfeld's web series Comedians in Cars Getting Coffee, Richards explained that the outburst still haunted him, and was a major reason for his retirement from stand-up.[27]

Comedian Paul Mooney also cited the incident as a key factor leading to his decision to remove the racial slur from his own live performances.[28]

2
newfunturistic 2 points ago +2 / -0

Svali, ex illuminati programmer. This was a huge key story to understand what's going on out there. Not just the elite, could be lower levels, your neighbor.

https://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_illuminati_svali01a.htm

https://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_illuminati_svali01b.htm

Story begins.. going to rituals under the vatican when she turned a certain age. Older generations who went to church every sunday wouldn't like how this story begins.

1
newfunturistic 1 point ago +1 / -0

Just look up Karly Noel Franz on bitchute for her testimony talking about getting gang banged as a kid, by a bunch of freemasons in a row to get occult ceremonies going. Talking about this black entity getting summoned.

That's why these Shriners, who are all past level 33 freemasons, get involved with the kids hospitals, the parades. Shuttling the kids around. Oh, you're an "orphan".. yeah we'll just have whoever else in the illuminati make it look like the kid got transferred to some other home.

1
newfunturistic 1 point ago +1 / -0

Going to check each of those wiki pages and was like.. oh wait, there was a bit more data to go, off this guy. Who were these couple other guys he mentions besides Snowden. Never heard of them. I ask bing AI. lol.

Generating answers for you…

Edward Snowden, Mark Klein, and William Binney are all whistleblowers who exposed the global surveillance activities of the National Security Agency (NSA) and its partners12

Edward Snowden

Edward Snowden is a former NSA contractor who leaked classified documents in 2013, revealing the extent of the NSA’s mass surveillance programs, such as PRISM and XKeyscore. He is currently living in Russia, where he was granted asylum13

Mark Klein

Mark Klein is a former AT&T technician who disclosed in 2006 that AT&T had installed secret equipment to allow the NSA to monitor, capture, and process American telecommunications en masse. He provided evidence of the NSA’s collaboration with major telecom companies in the US12

William Binney

William Binney is a former NSA analyst and technical director who resigned in 2001, after becoming disillusioned with the agency’s data collection policies. He was the co-founder of a unit that developed a program called ThinThread, which was designed to protect the privacy of American citizens while analyzing signals intelligence. He later became a vocal critic of the NSA’s domestic spying and accused the agency of wasting billions of dollars on ineffective programs124 These whistleblowers have raised public awareness and sparked debates about the legality, morality, and implications of global surveillance. They have also faced legal repercussions, harassment, and threats for their actions1234


oh, we got a new tidbit that guy didn't mention.

Too much text to paste it all.. I'll just get the start.

https://en.wikipedia.org/wiki/XKeyscore

XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including the Australian Signals Directorate, Canada's Communications Security Establishment, New Zealand's Government Communications Security Bureau, Britain's Government Communications Headquarters, Japan's Defense Intelligence Headquarters, and Germany's Bundesnachrichtendienst.[1]

In July 2013, Edward Snowden publicly revealed the program's purpose and use by the NSA in The Sydney Morning Herald and O Globo newspapers. The code name was already public knowledge because it was mentioned in earlier articles, and, like many other code names, it appears in job postings and online résumés of employees.[2][3]

On July 3, 2014, German public broadcaster Norddeutscher Rundfunk, a member of ARD, published excerpts of XKeyscore's source code.[4] A team of experts analyzed the source code.[5]

Scope and functioning Part of a series on Global surveillance

Disclosures OriginsPre-20132013–presentReactions Systems XKeyscorePRISMECHELONCarnivoreDishfireStone GhostTemporaFrenchelonFairviewMYSTICDCSNBoundless InformantBullrunPinwaleStingraySORMRAMPART-AMastering the InternetJindalee Operational Radar Network Agencies NSAR&AWCSEBNDCNIASIODGSEFive EyesFSBMSSGCHQ Places The DoughnutFort MeadeMenwith HillPine GapSouthern Cross CableUtah Data CenterBad Aibling StationDagger ComplexGCHQ Bude Laws Five Eyes UKUSA AgreementLustreU.S. USA Freedom ActFISA amendmentsEU Data Retention DirectiveData Protection DirectiveGDPRChina National Intelligence LawCybersecurity LawUK Investigatory Powers Act 2016 Proposed changes U.S. FISA Improvements ActOther proposals Concepts Mass surveillanceCulture of fearSecure communicationSIGINTCall detail recordSurveillance issues in smart cities Related topics EspionageIntelligence agencyCryptography TorVPNsTLSHuman rights PrivacyLibertySatellitesStop Watching UsNothing to hide argument vte XKeyscore is a complicated system, and various authors have different interpretations of its actual capabilities. Edward Snowden and Glenn Greenwald explained XKeyscore as being a system which enables almost unlimited surveillance of anyone anywhere in the world, while the NSA has said that usage of the system is limited and restricted.

According to The Washington Post and national security reporter Marc Ambinder, XKeyscore is an NSA data-retrieval system which consists of a series of user interfaces, backend databases, servers and software that selects certain types of data and metadata that the NSA has already collected using other methods.[6][7]

According to Snowden and Greenwald On January 26, 2014, the German broadcaster Norddeutscher Rundfunk asked Edward Snowden in its TV interview: "What could you do if you would use XKeyscore?" and he answered:[1]

You could read anyone's email in the world, anybody you've got an email address for. Any website: You can watch traffic to and from it. Any computer that an individual sits at: You can watch it. Any laptop that you're tracking: you can follow it as it moves from place to place throughout the world. It's a one-stop-shop for access to the NSA's information. ... You can tag individuals ... Let's say you work at a major German corporation and I want access to that network, I can track your username on a website on a forum somewhere, I can track your real name, I can track associations with your friends and I can build what's called a fingerprint, which is network activity unique to you, which means anywhere you go in the world, anywhere you try to sort of hide your online presence, your identity.

According to The Guardian's Glenn Greenwald, low-level NSA analysts can, via systems like XKeyscore, "listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it's all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst."[8]

He added that the NSA's database of collected communications allows its analysts to listen "to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you've entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future".[8]

1
newfunturistic 1 point ago +1 / -0

[part 2] checking that guy's few links before he disappeared.

https://en.wikipedia.org/wiki/PRISM

This one's pretty long.. not going to paste it all.

PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies.[1][2][3] The program is also known by the SIGAD US-984XN.[4][5] PRISM collects stored internet communications based on demands made to internet companies such as Google LLC and Apple under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms.[6] Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier,[7][8] and to get data that is easier to handle.[9]

PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.[10][11] The program is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA).[12] Its existence was leaked six years later by NSA contractor Edward Snowden, who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as "dangerous" and "criminal" activities.[13] The disclosures were published by The Guardian and The Washington Post on June 6, 2013. Subsequent documents have demonstrated a financial arrangement between the NSA's Special Source Operations (SSO) division and PRISM partners in the millions of dollars.[14]

Documents indicate that PRISM is "the number one source of raw intelligence used for NSA analytic reports", and it accounts for 91% of the NSA's internet traffic acquired under FISA section 702 authority."[15][16] The leaked information came after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over logs tracking all of its customers' telephone calls to the NSA.[17][18]

U.S. government officials have disputed criticisms of PRISM in the Guardian and Washington Post articles and have defended the program, asserting that it cannot be used on domestic targets without a warrant. Additionally claiming the program has helped to prevent acts of terrorism, and that it receives independent oversight from the federal government's executive, judicial and legislative branches.[19][20] On June 19, 2013, U.S. President Barack Obama, during a visit to Germany, stated that the NSA's data gathering practices constitute "a circumscribed, narrow system directed at us being able to protect our people."[21]

Media disclosure of PRISM Further information: Global surveillance disclosure Edward Snowden publicly revealed the existence of PRISM through a series of classified documents leaked to journalists of The Washington Post and The Guardian while Snowden, who was an NSA contractor at the time, was visiting Hong Kong.[1][2] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[1][2]

The documents identified several technology companies as participants in the PRISM program, including Microsoft in 2007, Yahoo! in 2008, Google in 2009, Facebook in 2009, Paltalk in 2009, YouTube in 2010, AOL in 2011, Skype in 2011 and Apple in 2012.[22] The speaker's notes in the briefing document reviewed by The Washington Post indicated that "98 percent of PRISM production is based on Yahoo, Google, and Microsoft".[1]

The slide presentation stated that much of the world's electronic communications pass through the U.S., because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world's internet infrastructure is based in the United States.[15] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[2][15]

Snowden's subsequent disclosures included statements that government agencies such as the United Kingdom's GCHQ also undertook mass interception and tracking of internet and communications data[23] – described by Germany as "nightmarish" if true[24] – allegations that the NSA engaged in "dangerous" and "criminal" activity by "hacking" civilian infrastructure networks in other countries such as "universities, hospitals, and private businesses",[13] and alleged that compliance offered only very limited restrictive effect on mass data collection practices (including of Americans) since restrictions "are policy-based, not technically based, and can change at any time", adding that "Additionally, audits are cursory, incomplete, and easily fooled by fake justifications",[13] with numerous self-granted exceptions, and that NSA policies encourage staff to assume the benefit of the doubt in cases of uncertainty.[25][26][27]

Lots more there.


https://en.wikipedia.org/wiki/Trailblazer_Project

railblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.[1][2]

NSA employees J. Kirk Wiebe, William Binney, Ed Loomis, and House Permanent Select Committee on Intelligence staff Diane Roark complained to the Department of Defense's Inspector General (IG) about waste, fraud, and abuse in the program, and the fact that a successful operating prototype existed. The complaint was accepted by the IG and an investigation began that lasted until mid-2005 when the final results were issued. The results were largely hidden, as the report given to the public was heavily (90%) redacted, while the original report was heavily classified, thus restricting the ability of most people to see it.

The people who filed the IG complaint were later raided by armed Federal Bureau of Investigation (FBI) agents. While the U.S. government threatened to prosecute all who signed the IG report, it ultimately chose to pursue an NSA Senior Executive Thomas Andrews Drake who helped with the report internally to NSA and who had spoken with a reporter about the project. Drake was later charged under the Espionage Act of 1917. His defenders claimed this was retaliation.[3][4] The charges against him were later dropped, and he agreed to plead guilty to having committed a misdemeanor under the Computer Fraud and Abuse Act, something that Jesselyn Radack of the Government Accountability Project, which helped represent him, called an "act of civil disobedience".[5]

Background Trailblazer was chosen over a similar program named ThinThread, a less costly project which had been designed with built-in privacy protections for United States citizens.[3][4] Trailblazer was later linked to the NSA electronic surveillance program and the NSA warrantless surveillance controversy.[3]

In 2002, a consortium led by Science Applications International Corporation was chosen by the NSA to produce a technology demonstration platform in a contract worth $280 million. Project participants included Boeing, Computer Sciences Corporation, and Booz Allen Hamilton. The project was overseen by NSA Deputy Director William B. Black, Jr., an NSA worker who had gone to SAIC, and then been re-hired back to NSA by NSA director Michael Hayden in 2000.[6][7][8] SAIC had also hired a former NSA director to its management: Bobby Inman.[9] SAIC also participated in the concept definition phase of Trailblazer.[10][11]

Redacted version of the DoD Inspector General audit, obtained through the Freedom of Information Act by the Project on Government Oversight and others.[5][12] The NSA Inspector General issued a report on Trailblazer that "discussed improperly based contract cost increases, non-conformance in the management of the Statement of Work, and excessive labor rates for contractor personnel."[13]

In 2004 the DoD IG report criticized the program (see the Whistleblowing section below). It said that the "NSA 'disregarded solutions to urgent national security needs'" and "that TRAILBLAZER was poorly executed and overly expensive..." Several contractors for the project were worried about cooperating with DoD's audit for fear of "management reprisal." The Director of NSA "nonconcurred" with several statements in the IG audit, and the report contains a discussion of those disagreements.[14]

In 2005, NSA director Michael Hayden told a Senate hearing that the Trailblazer program was several hundred million dollars over budget and years behind schedule.[15] In 2006 the program was shut down[3] after having cost billions of US Dollars.[16] Several anonymous NSA sources told Newsweek later on that the project was a "wasteful failure".[17]

The new project replacing Trailblazer is called Turbulence.[3]

Whistleblowing According to a 2011 New Yorker article, in the early days of the project several NSA employees met with Diane S Roark, an NSA budget expert on the House Intelligence Committee. They aired their grievances about Trailblazer. In response, NSA director Michael Hayden sent out a memo saying that "individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow... Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them."[3]

In September 2002, several people filed a complaint with the Department of Defense IG's office regarding problems with Trailblazer: they included Roark (aforementioned), as well as ex-NSA senior analysts Bill Binney, Kirk Wiebe, and Senior Computer Systems Analyst Ed Loomis, who had all quit the agency over concerns about its mismanagement of acquisition and allegedly illegal domestic spying.[3][18][19] A major source for the report was NSA senior officer Thomas Andrews Drake. Drake had been complaining to his superiors for some time about problems at the agency, and about the superiority of ThinThread over Trailblazer, for example, at protecting privacy.[19] Drake gave info to DoD during its investigation of the matter.[19] Roark also went to her boss at the House committee, Porter Goss, about problems, but was rebuffed.[20] She also attempted to contact William Rehnquist, the Supreme Court Chief Justice at the time.[19]

Drake's own boss, Maureen Baginski, the third-highest officer at NSA, quit partly over concerns about the legality of its behavior.[3]

In 2003, the NSA IG (not the DoD IG)[19] had declared Trailblazer an expensive failure.[15] It had cost more than $1 billion.[8][21][22]

In 2005, the DoD IG produced a report on the result of its investigation of the complaint of Roark and the others in 2002. This report was not released to the public, but it has been described as very negative.[18] Jane Mayer writes that it hastened the closure of Trailblazer, which was at the time in trouble from Congress for being over budget.[3]

In November 2005, Drake contacted Siobhan Gorman, a reporter of The Baltimore Sun.[17][23][24] Gorman wrote several articles about problems at the NSA, including articles on Trailblazer. This series got her an award from the Society of Professional Journalists.[17]

In 2005, President George W. Bush ordered the FBI to find whoever had disclosed information about the NSA electronic surveillance program and its disclosure in the New York Times. Eventually, this investigation led to the people who had filed the 2002 DoD IG request, even though they had nothing to do with the New York Times disclosure. In 2007, the houses of Roark, Binney, and Wiebe were raided by armed FBI agents. According to Mayer, Binney claims the FBI pointed guns at his head and that of his wife. Wiebe said it reminded him of the Soviet Union.[3][18] None of these people were ever charged with any crime. Four months later, Drake was raided in November 2007 and his computers and documents were confiscated.

In 2010 Drake was indicted by the U.S. Department of Justice on charges of obstructing justice, providing false information, and violating the Espionage Act of 1917,[17][25][26] part of President Barack Obama's crackdown on whistleblowers and "leakers".[17][18][23][27] The government tried to get Roark to testify to a conspiracy, and made similar requests to Drake, offering him a plea bargain. They both refused.[3]

In June 2011, the ten original charges against Drake were dropped; instead he pleaded guilty to a misdemeanor.[5]

view more: ‹ Prev Next ›