» Confirmed: Obamacare Breeds Massive Corruption and Fraud Alex Jones’ Infowars: There’s a war on for y our mind!


Confirmed: Obamacare Breeds Massive Corruption and Fraud

As we predicted last week, health law creates unprecedented wave of scammers

Kit Daniels
October 1, 2013

A non-profit organization sued by the federal government last year for fraud was awarded a $2.1 million federal contract this year to enroll Americans into Obamacare, confirming our prediction last week that widespread fraud will explode under the health law.

Credit: intenteffect via Flickr

Credit: intenteffect via Flickr

The New York Post reported today that an Obamacare grant recipient, Seedco, was sued by the federal government in 2012 for lying on government reports in order to receive additional bonus money.

As reported by the New York Times last year, Seedco received more than $8 million in federal grants for operating job placement centers.

According to federal prosecutors, Seedco falsely reported that it had successfully matched jobseekers with jobs by basing their claims on the positions jobseekers already had.

“By reporting thousands of fake job placements, Seedco collected ‘performance payments’ totaling perhaps as much as $1.6 million over five years,” reported Michael Powell with the New York Times.

The lawsuit did not stop the federal government from awarding Seedco another multi-million dollar contract, this time as a coordinator for the Obamacare Navigator program.

The Navigator program provides millions of dollars to organizations such as Seedco to hire “navigators” who will advise Americans on their Obamacare health “options” based on the sensitive information provided, such as social security numbers, income levels, employment history and home addresses.

In an article we broke last week, the very nature of the Navigator program will attract identity thieves who can literally go door-to-door to ask Americans for their personal information under the guise of Obamacare enrollment.

“These navigators will have our consumers throughout the country’s most personal and private information: tax return information, Social Security information,” Florida Attorney General Pam Bondi said in an interview with Fox. “And our biggest fear, of course, is identity theft.”

She also added that even those with prior identity theft convictions can still become navigators.

Bondi’s fears are well-founded considering that an organization sued for fraud is now coordinating Obamacare navigators who have immense opportunities to steal identities.

This article was posted: Tuesday, October 1, 2013 at 2:05 pm

Tags: domestic news, government corruption, healthcare


10 most common excuses heard from end users – TechRepublic


10 most common excuses heard from end users

06help-desk-idiot.jpgIf you’ve worked in IT support (be it within a company, remotely, or as a consultant) then you have probably heard every possible excuse and explanation end users can come up with for their problems.

I, for one, have heard so many I figured it was time I created a list of the ones that seem to pop up with regularity. Of course, being a fair guy, I also wanted to include in this why there might be some validity to each of these.


Without further ado, let’s dig into this list and see how many times you find yourself nodding in agreement.

1. “That password is too hard to remember.”

There’s a reason that password is too hard to remember – to keep your data safe! Many SMBs have solid policies to prevent users from having passwords like “password” or the user’s name. But keep in mind, the more challenging the password policy, the more often you will wind up having to change end user passwords. When you create your password policy, be aware of your user base and find a common ground between strong passwords and passwords that users can actually type.

2. “This started after you worked on my machine.”

“Yes…and then you broke it” is the response you want to give. You can’t, however. You may have just worked the miracle of miracles on a PC, but that doesn’t mean the end user won’t ruin your work. Or…and this can actually happen…you thought you fixed the issue, but didn’t. One of the things I like to do is make sure the end user tests that the problem has been solved. That way they know you did your job and can’t look you in the eye and say, “You did this!” (because they will). As much as I hate this about the support industry, you do have to protect your own back.

3. “But I have anti-virus.”

My go-to explanation for this is simple: if you use the Windows platform, it’s not a matter of if you’ll get virus, but when. End users seem to think that anti-virus is the end-all cure-all for what ails their computers. It’s not and never will be. They have to be made aware that anti-virus doesn’t give them carte blanche to do whatever they want.

4. “I pay you to keep these things working.”

Such vitriol from clients doesn’t actually hurt the PC support specialist. Remember, support is a two-way street. Your job is to keep the PCs running as well as possible, knowing full well that eventually users (or faulty patches or some other element) will break the system again. If clients want PCs that never fail, they’d all be switching to paper and abacus.

5. “The machine is only X years old.”

Moving parts wear out. Period. Computers have a finite lifespan and there is absolutely no way around that. It’s important to help end users understand that getting three years out of a computer is a good run. After that, it’s time to start thinking of replacement. This is, after all, a business and they need to be able to count on technology not to fail – otherwise, they risk data loss.

6. “It’s not happening to anyone else.”

Sure it’s not. Users may think it’s not happening to anyone else, but it very well could be. Or, the reason it’s not happening to the others is that they quite possibly didn’t make the same mistake. Or, perhaps some users don’t really know how to use technology properly and should go back to using a Lite-Brite and Wooly Willy. Seriously, end users call this one out all the time – even though the other users have no bearing on their particular issue.

7. “I know a little about computers.”

Danger, Will Robinson, danger! When you hear this, you should be afraid. End users that claim to know a “little” bit about computers is like me saying I know a little bit about rocket science. End users with a “little” knowledge of computers are actually more dangerous than those that know nothing. Why? These users will wind up pushing buttons and madly clicking their mouse in a rush to fix the problem before you arrive. Their goal? Show you they know a “thing or two”.

8. “What’s a web browser?”

This is the cry of someone at the very bottom of the end user ability scale. If they know not what a web browser is, then you better make sure you are there to hand-hold them through every minute of their training and have a quick route from your desk to theirs. Hearing this cry should also indicate to you that doing remote support is also going to be an issue. To that end, you will want to make sure that these users are set up such that all they need to do is double-click an icon to launch the support tool.

9. “I don’t visit many websites.”

That’s all good and well, but the select few sites often visited are the ones depositing malware on their computers. Downloading fun little screen savers, Facebook, and other notorious sites that offer toolbars and other pieces of malware are all over the place. End users have no idea what they are getting themselves into when they install those cute little tools that promise them the best chocolate cookie recipe on the planet. Education about safe browsing is a must for these users. Or, better yet, create a proxy server to block access to sites known to be suspect of deploying malware.

10. “I didn’t do anything.”

That’s right…the end user is always innocent and they will cry foul any time you say otherwise. In almost every instance, the problem on the computer is the result of shoddy work on the part of the IT staff. We’ve all heard this one; and we all know the truth. Half of the time the user did do something and half of the time they didn’t. Okay, maybe a 50/50 split isn’t exactly fair – but you get the idea. The truth of the matter is, however, you can’t always just blame the end user. There are those instances when it could be, gasp, your fault.

You’ve probably heard one, all, or even more of these excuses. If not, expect them soon. But don’t think end users are the only culprits in this crime. IT staff are also very well known for passing the buck of blame away from themselves.

Jack Wallen is an award-winning writer for Techrepublic and Linux.com. As an avid promoter/user of the Linux OS, Jack tries to convert as many users to open source as possible. His current favorite flavor of Linux is Bodhi Linux (a melding of Ubuntu …


Silent Weapons For a Quiet War


Silent Weapons For a Quiet War

This document is the doctrine adopted by the Policy Committee of the Bilderburg Group during its first known meeting in 1954. A copy found in 1969 was in the possession of Navel Intelligence.

The following document, dated May 1979, was found on July 7, 1986, in an IBM copier that had been purchased at a surplus sale.

Top Secret

Silent Weapons for a Quiet War

An Introductory Programming Manual
Operations Research
Technical Manual

This publication marks the 25th anniversary of the Third World War, called the “Quiet War,” being conducted using subjective biological warfare, fought with “silent weapons.”

This book contains an introductory description of this war, its strategies, and its weaponry.

May 1979 #74-1120


It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i .e., slavery and genocide.

This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be recognized as a technically formal declaration of domestic war. Furthermore, whenever any person or group of persons in a position of great power, and without the full knowledge and consent of the public, uses such knowledge and methodology for economic conquest — it must be understood that a state of domestic warfare exists between said person or group of persons and the public.

The solution of today’s problems requires an approach which is ruthlessly candid, with no agonizing over religious, moral, or cultural values.

You have qualified for this project because of your ability to look at human society with cold objectivity, and yet analyze and discuss your observations and conclusions with others of similar intellectual capacity without a loss of discretion or humility. Such virtues are exercised in your own best interest. Do not deviate from them.


Silent weapon technology has evolved from Operations Research (O.R.), a strategic and tactical methodology developed under the military management in England during World War II. The original purpose of Operations Research was to study the strategic and tactical problems of air and land defense with the objective of effective use of limited military resources against foreign enemies (i.e., logistics).

It was soon recognized by those in positions of power that the same methods might be useful for totally controlling a society. But better tools were necessary.

Social engineering (the analysis and automation of a society) requires the correlation of great amounts of constantly changing economic information (data), so a high speed computerized data processing system was necessary which could race ahead of the society and predict when society would arrive for capitulation.

Relay computers were too slow, but the electronic computer, invented in 1946 by J. Presper Eckert and John W. Mauchly filled the bill.

The next breakthrough was the development of the simplex method of linear programming in 1947 by the mathematician, George B. Dantzig.

Then, in 1948, the transistor, invented by J. Bardeen, W. H. Brattain, and W. Shockley, promised great expansion of the computer field by reducing space and power requirements.

With these three inventions under their direction, those in positions of power strongly suspected that it was possible for them to control the whole world with the push of a button.

Immediately, the Rockefeller Foundation got in on the ground floor by making a four year grant to Harvard College, funding the Harvard economic research project for the study of the structure of the American economy. One year later, in 1949, the United States Air Force joined in.

In 1952 the original great period terminated, and a high level meeting of the elite was held to determine the next phase of social operations research. The Harvard project had been very fruitful as is borne out by the publication of some of its results in 1953 suggesting the feasibility of economic (social) engineering. (Studies in the Structure of the American Economy — copyright 1953 by Wassily Leontief, International Sciences Press Inc., White Plains, New York.)

Engineered in the last half decade of the 1940’s, the new Quiet War machine stood, so to-speak, in sparkling gold plated hardware on the showroom floor by 1954.

With the creation of the Maser in 1954, the promise of unlocking unlimited sources of fusion atomic energy from the heavy hydrogen in sea water and the consequent availability of unlimited social power became a possibility only decades away.

The combination was irresistible.

The Quiet War was quietly declared by the international elite at a meeting held in 1954.

Although the silent weapons system was nearly exposed 13 years later, the evolution of the new weapon system has never suffered any major setbacks.

This volume marks the 25th anniversary of the beginning of the Quiet War. Already this domestic war has had many victories on many fronts throughout the world.


In 1954 it was well recognized by those in positions of authority that it was only a matter of time, only a few decades, before the general public would be able to grasp and upset the cradle of power, for the very elements of the new silent weapon technology were as accessible for a public utopia as they were for providing a private utopia.

The issue of primary concern that of dominance, revolved around the subject of the energy sciences.


Energy is recognized as the key to all activity on earth. Natural science is the study of the sources and control of natural energy, and social science, theoretically expressed as economics, is the study of the sources and control of social energy. Both are bookkeeping systems; mathematics. Therefore, mathematics is the primary energy science. And the bookkeeper can be king if the public can be kept ignorant of the methodology of the bookkeeping.

All science is merely a means to an end. The means is knowledge. The end is control. Beyond this remains only one issue, “who will be the beneficiary?”.

In 1954 this was the issue of primary concern. Although the so-called “moral Issues” were raised, in view of the law of natural selection it was agreed that a nation or world of people who will not use their intelligence are no better than animals who do not have intelligence. Such a people are beasts of burden and steaks on the table by choice and consent.

CONSEQUENTLY, in the interest of future world order, peace, and tranquility, it was decided to privately wage a quiet war against the American public with an ultimate objective of permanently shifting the natural and social energy (wealth) of the undisciplined and irresponsible many into the hands of the self-disciplined, responsible, and worthy few.

In order to implement this objective, it was necessary to create, secure, and apply new weapons which, as it turned out, were a class of weapons so subtle and sophisticated in their principle of operation and public appearance as to earn for themselves the name ‘silent weapons’.

In conclusion, the objective of economic research, as conducted by the magnates of capital (banking) and the industries of commodities (goods) and services, is the establishment of an economy which is totally predictable and manipulatable.

In order to achieve a totally predictable economy, the low class elements of the society must be brought under total control, i.e., must be house-broken, trained, and assigned a yoke and long term social duties from a very early age, before they have an opportunity to question the propriety of the matter. In order to achieve such conformity, the lower class family unit must be disintegrated by a process of increasing preoccupation of the parents and the establishment of government operated day care centers for the occupationally orphaned children.

The quality of education given to the lower class must be of the poorest sort, so that the meat of ignorance isolating the the inferior class from the superior class is and remains incomprehensible to the inferior class. With such an initial handicap, even bright lower class individuals have little if any hope of extricating themselves from their assigned lot in life. This form of slavery is essential to maintaining some measure of social order, peace, and tranquility for the ruling upper class.


Everything that is expected from an ordinary weapon is expected from a silent weapon by its creators, but only in it its own manner of functioning.

It shoots situations, instead of bullets; propelled by data processing, instead of chemical reaction (explosion); originating from bits of data, instead of grains of gunpowder; from a computer, instead of a gun; operated by a computer programmer, instead of marksman; under the orders of a banking magnate, instead of a military general.

It makes no obvious explosive noises, causes no obvious physical or mental injuries, and does not obviously interfere with anyone’s daily social life.

Yet it makes an unmistakable ‘noise’, causes unmistakable physical and mental damage, and unmistakably interferes with daily social life, i.e., unmistakable to a trained observer, one who knows what to look for.

The public cannot comprehend this weapon, and therefore cannot believe that they are being attached and subdued by a weapon.

The public might instinctively feel that something is wrong, but because of the technical nature of the silent weapon, they cannot express their feeling in a rational way, or handle the problem with intelligence. Therefore, they do not know how to cry for help, and do not know how to associate with others to defend themselves against it.

When a silent weapon is applied gradually to the public, the public adjusts/adapts to its presence and learns to tolerate its encroachment on their lives until the pressure (psychological via economic) becomes too great and they crack up.

Therefore, the silent weapon is a type of biological war fare. It attacks the vitality, options, and mobility of the individuals of a society by knowing, understanding, manipulating, and attacking their sources of natural and social energy, and their physical, mental, and emotional strengths and weaknesses.


“Give me control over a nation’s currency, and I care not who makes its laws.”

Mayer Amschel Rothschild (1743-1812)

Today’s silent weapons technology is an outgrowth of a simple idea discovered, succinctly expressed, and effectively applied by the quoted Mr. Mayor Amschel Rothschild. Mr. Rothschild discovered the missing passive component of economic theory known as economic inductance. He, of course, did not think of his discovery in these 20th century terms, and to be sure, mathematical analysis had to wait for the Second Industrial Revolution, the rise of the theory of mechanics and electronics, and finally, the invention of the electronic computer before it could be effectively applied in the control of the world economy.


In the study of energy systems, there always appear three elementary concepts. These are potential energy, kinetic energy, and energy dissipation. And corresponding to these concepts, there are three idealized, essentially pure physical counterparts, called passive components.

(1) In the science of physical mechanics, the phenomenon of of potential energy is associated with a physical property called elasticity or stiffness, and can be represented by a stretched spring.

In electronic science, potential energy is stored in a capacitor instead of a spring. This property is called capacitance instead of elasticity or stiffness.

(2) In the science of physical mechanics, the phenomenon of kinetic energy is associated with a physical property called inertia or mass and can be represented by a mass or a flywheel in motion.

In electronic science, kinetic energy is stored in an inductor (in a magnetic field) instead of a mass. This property is called inductance instead of inertia.

(3) In the science of physical mechanics, the phenomenon of energy dissipation is associated with a physical property called friction or resistance, and can be represented by a dashpot or other device which converts system energy into heat.

In electronic science, dissipation of energy is performed by an element called either a resistor or a conductor, the term ‘resistor’ being the one generally used to express the concept of friction, and the term ‘conductor’ being generally used to describe a more ideal device (e.g., wire) employed to convey electric energy efficiently from one location to another. The property of a resistor or conductor is measured as either resistance or conductance, reciprocals.

In economics these three energy concepts are associated with:

(1) Economic Capacitance — Capital (money, stock/inventory, investments in building and durables, etc.)

(2) Economic Conductance — Goods (production flow coefficients)

(3) Economic Inductance — Services (the influence of the population of industry on output).

All of the mathematical theory developed in the study of one energy system, (e.g., mechanics, electronics, etc.) can be immediately applied in the study of any other energy system (e.g., economics).


What Mr. Rothschild had discovered was the basic principle of power, influence, and control over people as applied to economics. That principle is “when you assume the appearance of power, people soon give it to you”.

Mr. Rothschild had discovered that currency or deposit loan accounts had the required appearance of power that could be used to induce people (inductance, with people corresponding to a magnetic field) into surrendering their real wealth in exchange for a promise of greater wealth (instead of real compensation). They would put up real collateral in exchange for a loan of promissory notes. Mr. Rothschild found that he could issue more notes than he had backing for, so long as he had someone’s stock of gold as a persuader to show to his customers.

Mr. Rothschild loaned his promissory notes to individuals and to governments. These would create over-confidence. Then he would make money scarce, tighten control of the system, and collect his collateral through the obligation of contracts. The cycle was then repeated. These pressures could be used to ignite a war. Then he would control the availability of currency to determine who would win the war. That government which agreed to give him control of its economic system got his support. Collection of debts was guaranteed by economic aid to the enemy of the debtor. The profit derived from this economic methodology made Mr. Rothschild all the more wealthy and all the more able to extend his wealth. He found that the public greed would allow currency to be printed by government order beyond the limits (inflation) of backing in precious metal or the production of goods and services (gross national product, GNP).


In this structure, credit, presented as a pure circuit element called “currency”, has the appearance of capital, but is, in fact, negative capital. Hence, it has the appearance of service, but is, in fact, indebtedness or debt. It is therefore an economic inductance instead of an economic capacitance, and if balanced in no other way, will be balanced by the negation of population (war, genocide). The total goods and services represents real capital called the gross national product, and currency may be printed up to this level and still represent economic capacitance; but currency printed beyond this level is subtractive, represents the introduction of economic inductance, and constitutes notes of indebtedness. War is therefore the balancing of the system by killing the true creditors (the public which we have taught to exchange true value for inflated currency) and falling back on whatever is left of the resources of nature and the regeneration of those resources.

Mr. Rothschild had discovered that currency gave him the power to rearrange the economic structure to his own advantage,, to shift economic inductance to those economic positions which would encourage the greatest economic instability and oscillation.

The final key to economic control had to wait until there was sufficient data and high speed computing equipment to keep close watch on the economic oscillations created by price shocking and excess paper energy credits — (paper inductance/inflation).


The aviation field provided the greatest evolution in economic engineering by way of the mathematical theory of shock testing. In this process, a projectile is fired from an airframe on the ground and the impulse of the recoil is monitored by vibration transducers connected to the airframe and wired to chart recorders. By studying the echoes or reflections of the recoil impulse in the airframe, it is possible to discover critical vibrations in the structure of the airframe which either vibrations of the negine or aeolian vibrations of the wings, or a combination of the two, might reinforce resulting in a reconant self-destruction of the airframe in flight as an aircraft. From the standpoint of engineering, this means that the strengths and weaknesses of the structure of the airframe in terms of vibrational energy can be discovered and manipulated.


To use this method of airframe shock testing in economic engineering, the prices of commodities are shocked, and the public consumer reaction is monitored. The resulting echoes of the economic shock are interpreted theoretically by computers and the psycho-economic structure of the economy is thus discovered. It is by this process that partial differential and difference matricos are discovered that define the family household and make possible its evolution as an economic industry (dissipative consumer structure). Then the response of the household to future shocks can be predicted and manipulated, and society becomes a well regulated animal with its reins under the control of a sophisticated computer-regulated social energy bookkeeping system.

Eventually every individual element of the structure comes under computer control through a knowledge of personal preferences, such knowledge guaranteed by computer association of consumer preferences (universal product code — UPC — zebra stripe pricing codes on packages) with identified consumers (identified via association with the use of a credit card and later a permanent ‘tattooed’ body number invisible under normal ambient illumination.


Economics is only a social extension of a natural energy system. It, also, has its three passive components. Because of the distribution of wealth and the lack of communication and consequent lack of data, this field has been the last energy field for which a knowledge of these three passive components has been developed.

Since energy is the key to all activity on the face of the earth, it follows that in order to attain a monopoly of energy, raw materials, goods, and services and to establish a world system of slave labor, it is necessary to have a first strike capability in the field of economics. In order to maintain our position, it is necessary that we have absolute first knowledge of the science of control over all economic factors and the first experience at engineering the world economy.

In order to achieve such sovereignty, we must at least achieve this one end: that the public will not make either the logical or mathematical connection between economics and the other energy sciences or learn to apply such knowledge.

This is becoming increasingly difficult to control because more and more businesses are making demands upon their computer programmers to create and apply mathematical models for the management of those businesses.

It is only a matter of time before the new breed of private programmer/economists will catch on to the far reaching implications of the work begun at Harvard in 1948. The speed with which they can communicate their warning to the public will largely depend upon how effective we have been at controlling the media, subverting education, and keeping the public distracted with matters of no real importance.


Economics, as a social energy science has as a first objective the description of the complex way in which any given unit of resources is used to satisfy some economic want. (Leontief Matrix) The first objective, when it is extended to get the most product from the least or limited resources, comprises that objective of general military) and industrial logistics known as Operations Research. (See simplex method of linear programming.)

The Harvard Economic Research Project (1948-) was an extension of World War II Operations Research. Its purpose was to discover the science of controlling an economy; at first the American economy, and then the world economy. It was felt that with sufficient mathematical foundation and data, it would be nearly as easy to predict and control the trend of an economy as to predict and control the trajectory of a projectile. Such as proven to be the case. Moreover, the economy has been transformed into a guided missile on target.

The immediate aim of the Harvard project was to discover the economic structure, what forces change that structure, how the behavior of the structure can be predicted, and how it can be manipulated. What was needed was a well organized knowledge of the mathematical structures and interrelationships of investment, production, distribution, and consumption. To make a short story of it all, it was discovered than an economy obeyed the same, laws as electricity and that all of the mathematical theory and practical and computer know-how developed for the electronic field could be directly applied in the study of economics. This discovery was not openly declared, and its more subtle implications were and are kept a closely guarded secret, for example that in an economic model, human life is measured in dollars, and that the electric spark generated when opening a switch connected to an active inductor in mathematically analogous to the initiation of a war.

The greatest hurdle which theoretical economists faced was the accurate description of the household as an industry. This is a challenge, because consumer purchases are a matter of choice which in turn is influenced by income, price, and other economic factors.

This hurdle was cleared in an indirect and statistically approximate way by an application of shock testing to determine the current characteristics, called current technical coefficients, of a household industry. Why GAS Costs $2.00 Per Gallon

Finally, because problems in theoretical economics can be translated very easily into problems in theoretical electronics, and the solution translated back again, it follows that only a book of language translation and concept definition needed to be written for economics. The remainder could be gotten from standard works on mathematics and electronics. This makes the publication of books on advanced economics unnecessary, and greatly simplifies project security.


An ideal industry is defined as a device which receives value from other industries in several forms and converts it into one specific product for sales and distribution to other industries. It has several inputs and one output. What the public normally thinks of as one industry is really an industrial complex where several industries under one roof produce one or more products.

The flow of product from industry #1 (supply) to industry #2 (demand) is denoted by 112. The total flow out of industry ‘K’ is denoted by I k . (sales, etc.)

A node is a symbol of collection and distribution of flow. Node #3 receives from industry #3 and distributes to industries #1 through #3. If industry #3 manufactures chairs, then a flow from Industry #3 back to industry #3 simply indicates that industry #3 is using part of its own output product, for example, as office furniture. Therefore, the flow may be summarized by the equations:


Industries fell into three categories or class by type of output.

Class #1 – Capital (resources)

Class #2 – Goods (commodities or use – dissipative)

Class #3 – Services (action of population)

Class # 1 Industries exist at three levels

(1) Nature – sources of energy and raw materials.

(2) Government – printing of currency equal to gross national product (GNP), and extension of currency in excess of GNP.

(3) Banking – loaning of money for interest, and extension (counterfeiting) of economic value through deposit loan account – inflation.

Class # 2 industries exist as producers of tangible or consumer (dissipated) products. This sort of activity is usually recognized and labeled by the public as an ‘industry’.

Class # 3 industries are those which have service rather than a tangible product as their output. These industries are called (1) households, and (2) governments. Their output is human activity of a mechanical sort, and their basis is population.


The whole economic system can be represented by a three industry model if one allows the names of the outputs to be (1) capital, (2) goods, and (3) services. The problem with this representation is that it would not show the influence of, say, the textile industry on the ferrous metal industry. This is because both the textile industry and the ferrous metal industry would be contained within a single classification called the ‘goods industry’ and by this process of combining or aggregating these two industries under one system block they would lose their economic individuality.


A national economy consists of simultaneous flows of production, distribution, consumption, and investment. If all of these elements including labor and human functions are assigned a numerical value in like units of measure, say, 1939 dollars, on this flow can be further represented by a current flow in an electronic circuit, and its behavior can be predicted and manipulated with useful precision.

The three ideal passive energy components of electronics, the capacitor, the resistor, and the inductor correspond to the three ideal passive energy components of economics called the pure industries of capital, goods, and services, resp..

Economic capacitance represents the storage of capital in one form or another.

Economic conductance represents the level of conductance of materials for the production of goods.

Economic inductance represents the inertia of economic value in motion. This is a population phenomenon known as services.


An electrical inductor (e.g., a coil of wire) has an electric current as its primary phenomenon and a magnetic field as its secondary phenomenon (inertia). Corresponding to this, an economic inductor has a flow of economic value as its primary phenomenon and a population field as its secondary phenomenon of inertia. When the flow of economic value (e.g., money) diminishes, the human population field collapses in order to keep the economic value (money) flowing (extreme case – war).

The public inertia is a result of consumer buying habits, expected standard of living, etc., and is generally a phenomenon of self-preservation.


(1) Population

(2) magnitude of the economic activities of the government.

(3) the method of financing these government activities (see Peter-Paul Principle-inflation of the currency)


(A few examples will be given.)

CHARGE — coulombs


The fear of symbols | Jon Rappoport’s Blog


The fear of symbols

The fear of symbols

by Jon Rappoport

July 30, 2013


Groups use symbols.

But symbols have no inherent power.


They have power only when people believe in them. In which case it’s the belief that is the power.

Just as important, symbols have no inherent meaning. They only have the meaning given to them.

So, for example, the famous eye and pyramid mean zero. Zilch. They only have meaning because Masons and other groups have assigned it.

There is no closed secret world of symbols that has magic in it.

There are no universally good symbols or bad symbols. A symbol is a word, term, sign, shape. It’s injected with meaning by a group. The group adopts a consensus about the symbol.

To a surprising degree, people think in terms of symbols. They operate as if they understand what they’re doing, but they don’t. They fear the power of certain symbols and attach themselves to the power of other “good” symbols. They’re hooked.

You could make a picture of a sun emanating three rays and call it Oobladee, and invent a whole mythology around it. You could claim it comes from Atlantis, or a secret society embedded in the old KGB, or an ancient Babylonian priesthood.

And then some people would react when they saw it. They would feel fear or anger excitement.

It’s a con.

If you took this even further and created a whole set of symbols, dozens of them, and made up meanings for them, and worked with this game, you would eventually experience an interesting kind of liberation. You would see, to a greater extent, how arbitrary symbols are, how people trap themselves in “internal symbolic spaces.”

The whole point of symbols is to enclose consciousness.

The mechanism by which this happens is simple. Let’s say you devised a picture of an eyeball hovering in a forest. A tear is dropping from the eye. The literal mind is looking for specific meaning. The literal mind wants an answer. It can’t find one.

The eyeball and the forest and the tear don’t add up. They provoke all sorts of associations, but no particular meaning, and the literal mind is frustrated.

So THEN you come along and assign a meaning. You say, “Well, this symbol was painted on masks in 834BC by the ancient Egyptian founders of a cult of pyramid builders. The eye and the tear stand for the tragedy caused by lack of faith in eternal life…”

And so forth and so on.

Now you’ve assigned specific meaning to the symbol. Now the literal mind breathes a sigh of relief. It has an answer. It can suck up that meaning and take it in and accept it. And now you can embellish the story and sell it to the literal mind. You can make that symbol into an object of fear and repulsion, if that’s the reaction you want to provoke in your audience, or you can make the symbol into an object of victory that stands for redemption.

You can twist and turn the symbol any way you want to.

The literal mind wants an answer to the mystery, a solution, and you provided it.

We’re talking about a very primitive form of art. When people operate at this level, buying symbols and their assigned meanings, it’s an indication they can’t appreciate or fathom more complex art.

They can’t read and fathom a novel or watch a stage play. That’s too much. There isn’t a clear one-to-one connecting pipeline between symbol and meaning, and so they’re confused. They’re frustrated.

I remember sitting in a movie theater watching a crime drama. The cops arrested the wrong man and framed him for a killing. A guy sitting next to me blew his top. He started telling his girl friend about how the cops were railroading this suspect and how bad the cops were, how the suspect was a victim of police brutality.

Well, yes. That was, in fact, the whole point of the movie. The movie was showing the audience how the police operated to create a false scenario and frame an innocent man. That’s what the movie was saying.

But this guy couldn’t get to that level. He thought the movie was actually on the cops’ side. He thought the movie was praising the arrest of the wrong man.

The literal mind at work.

In the same way, people accept the meanings that are assigned to symbols, and they react to those meanings in a reflex fashion.

In truth, symbols are open. They have no intrinsic meaning. People can inject any meaning they want to.

But when they’re trapped in a layer of symbolic thinking, they can’t see that. They’re determined to accept the already-assigned meaning and react to it.

Which is an invitation to propagandists.

Worse yet, it’s a fixation that artificially defines the limits of mind.

Symbols form a matrix-shell inside which minds live. Until they don’t.

Jon Rappoport

The author of two explosive collections, THE MATRIX REVEALED and EXIT FROM THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free emails at www.nomorefakenews.com

Like this:

Like Loading…

July 30, 2013 Leave a reply