Angels & ArchAngels, Take From Them That Which They Took From God, Pour It Double

God's Vengeance Is HERE:
Revelations 18:8
"Therefore her plagues will come in one day -- death and mourning and famine. And she will be utterly burned with fire, for strong is the Lord God who judges her."  Her = [Crime Syndicate, Roman Church, World Religions Infiltrated Enslaving Masses by Toppling Nations, Enslaving Each Nation with Federal Corporations, Enslaving the Populace of Earth]

Sell Your Belongings, Give Your Money To The Poor  -  link here:
The Destroyer, The Messiah, IS HERE:
Proof (short version): version with more info:

The Messiah, The Son of Man, Returned, To Die Again For Your Salvation  -  GOD WILL FAVOR THOSE WHO SPREAD THE WORD OF GOD - LET ALL THE SAINTS RECEIVE THIS MESSAGE, SO BE IT, AMEN.Here is link, just in case:

Son of Man, Messiah returned, Goes To Elections Office to Run for Public Office, Since There Are No "Public Officials" Holding Office IN ANY NATION ON EARTH, they are all PRIVATE, taxation without representation, everything, with NO REPRESENTATION!!!
The day before, the head official offered me a bribe to cease my efforts, a full time JUDGESHIP, the second trip, the second in command agreed with me (on audio) that enslavement by billions of statutes is not; peace, love, and freedom:
Google (Blogger's) Most Hated Videos (They Delete, We Fix)
America's Republic, mistakenly hired a British Corporation to provide very limited services, the "Hired Help = "United States Inc," whom then breached the contractual agreement, through "Gross Breach of Service Terms & Conditions, when they chose to; murder, extort, and bribe their way into total power, by mothballing the Republic, "the United States of America," and by mothballing its Public Offices, and its "Common Law" Courts of Justice.

PROOF = America Enslaved - OATHS of OFFICE:
America's Oath's Swapped Out For FAKE Oaths to a foreign, 
British-Owned Corporation
Enslavement by the Legal Law Dictionary
"The Devil's forked tongue," called = LEGALESE:
Here's THE EXPANDED VERSION with AMAZING PROOF, but you need to be RED-PILLED already for this version 

Proof of Treason, Bills @  FAKE CON-GRESS

A fraudulent service contract executed in secret, just like all service contracts for ALL the Federal Corporations enslaving each of the nations of Earth.  America's enslavement began when a Service Contract was put in place, when Criminal Treasonous Agents for the Republic hired a foreign British owned corporation, "United States Inc" to provide limited government services (international trade only), and then the, foreign-owned, "United States Inc," quietly mothballed the Republic by unprecedented Covert Criminal Means, Much Bloodshed, Theft, Conspiracy, Blackmail, Bribery, Assassination, Suffering, Rape, Murder & Genocide.  Fraud cancels all contracts, even the most Divine & Spiritual of Contracts are voided under conditions of fraud.

1871 Service Contract (Hired a foreign contractor = U.S.)
  We The People, Assembled, Do Hereby Redress Grievances, & Do Declare:
 Gross Breaches of Contract, Renders Contract(s) Null & Void, for all Contracts, known and unknown, which hired the foreign-British-owned corporation, "United States Inc."  You too can void your nation's Federal Corporation, Fraud and Copyright infringement void all contracts, no matter how sacred.
"An Act To Provide A Government for the District of Columbia," enacted by the 41st Congress, Session III, Chapter 62, 1871.
(Document found at the Library of Congress, go read Sec. 17)

Form Your Jural Assemblies, go to:
Follow in the footsteps of the American Forefathers, an opportunity to be a hero, to change your future, and the future of every child's tomorrow. Follow "The Handbook" as provided by the Michigan General Jural Assembly.  BE ON "THE CALL" EVERY THURSDAY!!!
(Witness a short business meeting, see how it is done.  Roll call, Old business, New business, voting on issues, then "THE CALL" opens up into an open forum to ask as many questions, "ABOUT HOW TO OPERATE A JURAL ASSEMBLY," ask as many questions about that topic as you have!!!
Follow, "The Handbook," all other handbooks are frauds, designed to do you harm.
Anna Von Reitz = Leading you into Captivity, thus you shall witness her go into captivity, as it is foretold in the Holy Bible.

Ask yourself:
WHY are there no other talking faces in the alternative media talking about the; Invasion, Occupation, & Enslavement of AMERICA, as well as every other Nation on Earth having been, TOPPLED, the lawful governance of every nation stolen, replaced with a Federal Corporation to enslave every nation, with trillions of statutes.  Why are none of the talking faces pointing to Nesara News, where we have compiled historical documents PROVING ENSLAVEMENT ???
We, The Saints, persecuted and murdered at the hands of ROME, have returned, all at once, WE ARE HERE, NOW, and "WE ARE MARCHING IN. We shall not waver, we shall not tarry, we are here to free every man, women, child, spirt, and being from bondage.  EVERY ONE OF THEM, regardless of whom you perceive as good or bad, this matters to us not, all are of source, all are made of the ONE, Infinite Creator, and all shall be ONE, with the ONE.
(below) The Crime Syndicate ENSLAVES HUMANITY by PERVERTING, the word, "Homo Sapiens," through a definition making it equal to animals of lesser intellect = "Neanderthal," "Human Evolution (not yet evolved)," "Cro Magnon," "Evolution of Man," = SLAVES.  Every word like; man; woman; human; person; etc..etc.. are all fraudulently defined as; feudal serfs, feudal tenants, or corporations, or cave man (Ward of the State=Not Capable of managing one's own affairs, thus a corporation must be created in probate court to manage the Ward's affairs).  Legalese = Satan's forked tongue = ENSLAVEMENT!!!!!!!

Saturday, June 1, 2013



Passing this on, On the third posting below, it is a post that I sent out long ago that has tools for privacy, review it and implement those you like in addition to reacting towards this dilemma specified in the two previous emails below. This problem is only going to get worse!


Third email posting:

It never hurts to hide your conversations and browser actions from snoops, government and otherwise.  A security conscious IT friend sent me the below info. 

Since Skype sold out to Microsoft and government eavesdropping, we've been looking for a tool or tools to help us maintain our privacy. And perhaps this is the best set of tools I've seen so far. They're in an article by Sovereign Man and can be read by clicking 
HERE. The five tools are:
  1. Tor Browser - Tor is a great weapon in the fight for online anonymity as it allows you to surf the web without giving up your location and other personal data to the websites you visit.The Tor Browser Bundle is the easiest and most secure way to get started; simply download it, and start surfing the web with the Tor Browser. It’s available for Windows, Mac, and Linux.
  2. Duck Duck Go - If you want privacy, don’t search with Google. Google store all of your searches to customize ads for you, but even worse, they can hand over the whole list of searches to any government agency that are curious about what you’ve been looking at for the last couple years. A better alternative is Duck Duck Go, a completely anonymous search engine that does not store any information about you or your searches. The search results are essentially identical to Google’s, so there’s no loss of quality.
  3. HTTPS Everywhere - HTTPS Everywhere is a plug-in for Firefox and Google Chrome that tries to force a website to connect in secure mode, thus encrypting your traffic with the website you are visiting. This makes your browsing more secure because it prevents eavesdropping thieves or state-mafia from intercepting your unencrypted Internet traffic.
  4. Cryptocat - Cryptocat is an encrypted chat that beats Facebook and Skype when it comes to security and privacy. If you want to chat in private then this is one simple solution. It’s also open source, which means you can see the full code and be sure there are no government “backdoors” built in.
  5. Silent Circle - Silent Circle is a new player on the market, but it is founded by “old” players in the security and encryption industry. One of the founders, Phil Zimmerman, is also the creator of PGP, one of the most-used encryption platforms in the world. Silent Circle is the only service on this list that is not free. But having the gold standard of encryption may be worth it for you. It is for me.

The most promising tool listed is Silent Circle, a peer-based end-to-end encryption suite including Silent Phone, Silent Text, Silent Eyes, and Silent Mail (coming soon). Each of these tools includes a complete end-to-end peer-based encryption making penetration and eavesdropping impossible. Phil Zimmerman, the creator of Pretty Good Privacy (PGP) and ZPhone is part of the team of developers for this effort. Silent Circle is actually a suite of tools which include the following:

Silent Phone is your answer to Secure Mobile Video & Voice. It is an easy to download app that will provide you with HD quality calling over 3G, 4G and WiFi Networks that utilizes ZRTP encryption software invented by Phil Zimmermann and used worldwide. The Silent Circle phone service interoperates with any SIP/RTP phone. Key negotiations are purely peer-to-peer through the media stream. The ZRTP software detects when the call starts, and initiates a cryptographic key agreement between the two parties, and then proceeds to encrypt and decrypt the voice & data packets on the fly. The keys are destroyed at the end of the call.  Worldwide Secure Voice & Video Calling on Silent Phone allows you to make secure encrypted phone calls all over the world over any Network. Silent Phone connects directly into our custom-built Secure Network for amazing clarity and sound quality. Make Secure Encrypted Cell Phone Calls Over 3G, 4G and WiFi Networks. Silent Phone utilizes ZRTP Protocol encryption software invented by Phil Zimmermann and used worldwide for premium security.

Our new revolutionary technology allows you to send encrypted business documents (Word, Excel, Powerpoint, Pages, Keynote, PDF's, CAD drawings, etc.) any file, any movie, any picture – map locations, URL’s, calendar invites completely peer-to-peer encrypted and delete them with our “Burn Notice” feature. You have the ability to control your text communications securely with Silent Text. You decide how long your text can be seen with BURN NOTICE. Silent Text gives you the ability to transmit secure encrypted text messages between Silent Circle members, anywhere. The messages are encrypted on your device and the keys are negotiated for each conversation, and never leave your device. Each message is encrypted to a new key that is only used once and then destroyed, so if your device is examined, there are no keys to be had after the conversation is complete. Send your Mobile Device Map Location (Google, Apple Maps) encrypted and controlled.

Silent Eyes is your answer to secure video and voice communication on your desktop. It is an easy download desktop icon that will provide you with HD quality calling over WiFi Networks that utilizes ZRTP Protocol encryption software invented by Phil Zimmermann and used worldwide. The Silent Circle phone service interoperates with any SIP/RTP phone. Key negotiations are purely peer-to-peer through the media stream. The ZRTP Protocol software detects when the call starts, and initiates a cryptographic key agreement between the two parties, and then proceeds to encrypt and decrypt the voice & data packets on the fly. The keys are destroyed at the end of the call.

Silent Mail (coming soon)
Silent Mail is encrypted email with PGP Universal , the world’s most used encryption designed by two of Silent Circles founders Phil Zimmermann and Jon Callas. Silent Mail offers easy and automatic operation protecting sensitive email without changing or interfering with the users email environment.Silent Mail is a very easy, user-friendly encrypted email solution, providing secure, encrypted email without burdening users. Silent Mail integrates seamlessly with all existing email clients, enabling automatic encryption and decryption of sensitive communications without changing the users email interface. Silent Circle’s own Phil Zimmermann invented PGP encryption and our CTO Jon Callas invented the PGP Universal Server system-the world’s most used email encryption solution. Since Silent Mail utilizes a server-side key management system – we recommend this be utilized for day-to-day email communications for normal threat models. We want you to know what Silent Mail can and cannot do.

Silent Mail can help protect you against eavesdropping, government surveillance, unauthorized content analysis, identity theft and email forgery. Silent Mail utilizes cutting edge RSA and AES asymmetric and symmetric encryption algorithms to deliver total security inside the Silent Circle Network.

Why Do I Want Silent Circle?
Since Skype was purchased by Microsoft and is currently participating in full eavesdropping by the our government, this set of tools is incredibly promising. The big difference between Silent Circle and Skype, Google Chat, FaceTime, and all the other Instant Messaging (IM) clients is that they are FREE… for a price: the government records everything. Whereas Silent Circle has a modest cost of $20/mo and you keep your communications private.

Subscribe now and get 3 thirty-day passes by clicking HERE.

Last year, we experimented with securing our communications using a VPN out of Sweden, called VPNTunnel hosted by a company out of Sweden. You can use three of the most common ways to secure all your communications as it travels safely and encrypted outside the United States. Once your communication leaves the VPN tunnel, it's open to be viewed by anyone once again. However, the key here is that if you combine VPN Tunnel with TOR browser, keep your e-mail on JumpMail, and work to look at sites outside the US, you can dramatically increase your privacy and security. VPNTunnel supports the following three encryption methods:
  1. Point-to-Point Tunneling Protocol (PPTP), 3€ per month
  2. OpenVPN, 4€ per month
  3. Premium (includes both PPTP and OpenVPN), 6€ per month

Does a VPN secure all my internet communications including Skype?
Yes and no. If you imagine a VPN tunnel like an underwater tunnel between England and France, then while your data travels securely from your PC, it's completely hidden from eavesdropping (the tunnel under the English Channel). BUT, as soon as the data reaches "France" (in the example of our underwater tunnel), the data is now publicly visibly and traceable. That's why additional measures are needed such as Tor browser, Silent Circle, Crypto Chat, moving your e-mail to a multi-flag system (Jumpmail), erasing all cookies when you close your browser, etc. are also recommended to keep your information secure.