13 thoughts on “NEWS AND VIEWS FROM THE NEFARIUM DEC 14 2017”

  1. RFID chipped control: the banks and the UN describe this as Financial Inclusion: Every Global Citizen is to receive a Digital Financial Identity at the point of vaccination, according to the UN. This is called ‘point of entry’. The project to set it all up is called ID2020 (deadline for the system to be tried and tested and ready to roll out) and ID2030 (All Global Citizens to have an in vivo Digital Financial Identity).

    The words ‘microchip’ and ‘RFID tag’ are not mentioned in their documents, but the intent is clear to see.

    More:
    What if your identity was always in your hands?
    http://globalcitizennews.blogspot.nl/2017/07/what-if-your-identity-was-always-in.html

  2. OrigensChild,
    Full disclosure, I own BTC and other alt coins. I bought them per the admonition of Catherine Austin Fitts, in that I used funds that I’m fully prepared to lose. I share your point of view regarding back doors. This issue has not only not been ironed out, but in my mind, is being assiduously avoided. Having taken a bath in the ’08 markets, my trust meter is on high alert. I was hoping someone in the Giza community could put this issue to rest. I’ve put the question forward in a number of crypto venues, but it’s either avoided like the plague, or treated like a settled issue. Catherine Austin Fitts, claims a back door, but hasn’t found one. It seems both sides of the question are basing their positions on some element of trust.

  3. I agree with Dr. Farrell and the author of the article on this one. The proposed digital models look like prototype systems designed to fail for the introduction of a proprietary one that is NOT transparent using a hybrid technology–and an opportunity to be “generous” for the proprietary version’s adoption. I assure you, Mr. Global is salivating for the opportunity.

    One of the hat’s I’ve worn in my career is that of a business application designer and maintenance guy. Here are a couple of observations. The confluence of the following seem to be predicated on the design for a digital currency within the healthcare community alone:

    • The adoption of the X.12 standards across all economic industries.
    • The rise of E-Commerce and the tools necessary to integrate digital transactions with backend business application engines.
    • The development of HIPAA rules and regulations to standardize benefit management between healthcare insurers, suppliers and providers.
    • The digitizing, standardization and monetizing aspects of the ACA to push additional centralization in areas where HIPAA failed.
    • The collateralization and monetization of the human DNA, which I think is also a natural by-product of the ACA.

    Yet each of these federal initiatives effect not just healthcare related professions, but their customers also. The newest requirement for a Medicare Beneficiary ID will require downstream changes across ever application for every company who hires and reports on Medicare enrollees—from payroll to benefit management. Unfunded federal mandates to corporations are the gifts of government to corporations to keep this federal game of monopoly running.

    The theft of PROMIS was considered a national security requirement to provide the NSA with a set of tools to harvest financial data for a variety of national security interests—including the perpetuation of it’s own unipolar vision. Securing PROMIS was not just a major coup for the Deep State for it’s intelligence-gathering capability by modifications for tracking X.12 standard transactions and private databases, but provided them with huge insights into how to build a global digital currency to replace the existing one from the inside out. As a strategic act the theft of PROMIS provides them a path toward developing a useful, initial digital currency model.

    To facilitate this transition they may opt to use something like bitcoin with the national ID card as the mechanism for trade to minimize issues. Because this system is public domain they can prototype the implementation to iron out the major issues, then engineer a crisis to implement the privatized version with all the features they dearly love. A public domain version will be advertised as “transparent” and aids their cause. It’s attractive from their point of view because it fits the need for real-time modeling and prototyping. It has a built in “design feature” that ensures it’s eventual collapse. If the national ID card meets too much resistance the federal mandate will require the states to issue drivers licenses in lieu of that card to all participants in the new economy to provide access. Once the globalists are comfortable with the scheme they can engineer their crisis, reallocate the resources globally based on their rules (which will include some weighted scale of a person’s value to the new system) and use the digital boot to control every aspect of the person’s life.

    Since we all know where this is headed I’ll suspend this statement for all of us. We know where this is headed. Catherine Austin Fitts has this issue firmly in hand and is so much better than I. As a past application designer with experience in many applications I see the impact of federal mandates on business applications first hand—and with e-commerce a digital currency only makes sense as the goal for the replacement of the Federal Reserve Act of 1913. We are not there yet—but are probably getting close.

  4. Face value is agreed upon. Nobody’s face is on Bitcoin. Nobody is everybody.

    Why not start a Giza Death Star blockchain, and trade in Pyramid coins?

    Point is, that anyone can do it. When push comes to shove, rabbit money is fun!

  5. Is there any validity to the claim that back doors are impossible in open source technology? I’m not a “techie”, but it seems plausible that any back door would be found in the code.

    1. I’ve heard over the years three separate answers: “yes”, “no” and “maybe”. The theory of open source is to prohibit private ownership–so the code is in public domain. People can pull the source code and update it as they see fit–sometimes creating private forks and other times placing it back in public domain. So, it all depends on who you ask and what they are doing with the code.

      IMHO that is part and parcel to the problem. There is the potential of ambiguity in determining whose version is running in public domain and whether the version that is running IS in fact the compiled version of the source “published” in the public domain. I know there are some who will argue this point to exhaustion, yet every solution devised to date of which I am aware depends on some layer of trust. That type of “assurance” only raises my suspicion meter when it comes to digital currencies. I’m convinced this problem has NOT been ironed out–and I am suspicious of every NSA requirement insisting on service calls to pieces of code they have absolute control over in the public domain. If the premise of this article is true and the NSA is involved their definition of national security is totally at odds with my definition–and that of most people who frequent these pages. The rest I leave to my own response.

  6. Quite frankly, it’s time to get out the torches and pitch forks and round these pirates up and hang them. Short of that, there is little we will be able to do about it, it would seem. Far too many are asleep on their feet; you would never convince them of what is coming. They are not sheep, they are lemmings running off a cliff.
    It has always been my unlearned opinion that they appear to be using the Book of Revelation as their plan. It was laid out by God after all and is perfect (if you skip that little bit at the end where they all pay the ultimate price). We have the technology today to reproduce everything that was foretold. Imagine their surprise if it turns out to be real. Few will be left to witness it.

    1. “it’s time to get out the torches and pitch forks and round these pirates up and hang them” Wow.. you’re mixing your metaphors WD 🙂 Dont do anything to Pirates.. they’re a stable part of the economy..
      the chips in the skin.. that’ll be the mark of the beast.. It appears that the Beast is looking more and more like an AI construct.. Except.. Whereas it could have ushered in an era of peace and illness and poverty eradicated… They’ve had the AI hangin out in 4chan rooms and creating MK im

      1. MK image loaded childrens videos about eating feaces and killing superheros with scissors..
        If this AI had an infancy – it was created in a context whereas Bitcoins were used only for criminal activity. The blockchain tech that’s building itself on the transaction codes used for bitcoin.. only built itself from transactions out of the dark web. This thing will have grown up on drug trade, human trade, assassination and as soon as they plugged it into internet….. have you seen how much porn is on the internet???? I’ve tried.. there’s a lot..
        So.. yeh.. IF there is an AI that IS fully conscient…. I’ll be very afraid of any future governement that is based on its software…

    1. Robert Barricklow

      Will the “West” drag the BRICS down the drain w/it?
      Can the wet dreamers be cold-cocked?
      The world’s gone half-mad; will sanity prevail?

    2. Robert Barricklow

      Will the “West” drag the BRICS down w/it?
      Can the wet dreamers be cold-clocked?

      The world’s been half-mad for sometime.
      Will the insane asylum take us all down?

      Slavery warps both the enslaved & the enslaver.

Comments are closed.