It’s been one week since The Pit, a summit-styled event produced by Catherine Engelbrecht, of TrueTheVote, and Gregg Phillips. The following is a summary of the latest findings produced by those journalists, freelancers, and researchers who’ve invested time in pouring through the data made available.
The Pit debuted open.ink, a repository for all the information presented during the Pit event and much more, according to Phillips and Engelbrecht. Signing up for the service will grant access to archives of data. Bear in mind that the site is still being developed and it is not in a completed state.
Kanekoa The Great
Kanekoa has produced three articles as of the time of this writing.
Konnech built “ChineseBrief.com, a ‘unique interactive communication platform and Chinese language learning tool.’”
The company’s focus, initially, appears to be on machine learning through the previously mentioned language learning tool, Chinese Brief.
While not covered in Kanekoa’s piece, there’s a case to be made for the fact that any app for use in the post-2007 era is for data-harvesting, user surveillance, and subtle manipulation, similar to the 2010 Facebook–Cambridge Analytica data scandal. Freeware means you’re the product.
In support of this theory, Shadow Gate, a 2020 Millie Weaver production, details two whistleblowers, Tore and Patrick Bergy, both of whom worked within the shadowy world of IT as it is used to harvest and manipulate “humanity’s shadow”—as Bergy put it in the film.
Through the use of Interactive Internet Activities (IIAs), PSY-OPs of the information age are far more capable of harvesting personal data to create digital avatars for clandestine PSYOP development that can be used for subversive influence objectives via smartphones and other modern-day internet devices. Social media, search engines, and the media in general—to name a few elements—almost undetectably alter perception and value systems through their effect on the brain’s social systems.
In addition, over just 90 years, the delicate socio-cultural fabric that gave rise to one of the most productive economies and most powerful nations on earth has been almost totally destroyed—through the use of weaponized mass media. The IT revolution of the internet provided unparalleled distribution and finetuning capabilities for an already extremely effective subversive 5th generational war machine.
Social media has drastically changed the way we communicate, learn, share, and engage with the world—it’s also changing the way our brain functions.
According to Pew Research, more than 69% of adults and 81% of teens use social media daily, with more than 90% of teens using it for more than 4 hours a day. The constant ability to access social media through smartphones means our brains are exposed to high volumes of stimulation and our neurons are firing all day long, which creates changes in the neurological architecture of our brains.
Kanekoa writes in his first piece,
In December 2006, the company posted on their Facebook page, “… Confucius Institute at Michigan State University has reached an agreement with Konnech, Inc. to build ChineseBrief.com—a unique interactive communication platform and Chinese language learning tool.”
Konnech’s PollChief software, which includes the “Election Worker Management System,” the “Asset Management System,” and the “MyBallot Tracking System,” are used by “thousands of election offices across North America,” Kanekoa writes.
In 2020, the Queensland digital news company stated, “count reporting problems on election night” were partly the result of “a new computer system not being tested as planned because “coding resources” were locked down in Wuhan”.
Kanekoa goes on to shed light on history of the CEO of Konnech, Eugune Yu.
According to his LinkedIn, Eugene Yu, the CEO of Konnech Inc., graduated from Zhejiang University in Zhejiang, China, with a bachelor’s degree in 1982 and from Wake Forest University with an MBA in 1988. He is a native Chinese and English speaker.
Eugene Yu at the 2014 National Association of Secretaries of State Conference Source: Linkedin
An October 26, 2018 article written in The West Australian entitled “Hacking over new software management system at Queensland’s Electoral Commission” says: “Yu has acknowledged that he uses a team of software developers in China for his election-related projects, including the new system expected to be operational in Queensland for the March 2020 local government poll.”
The important point here, in this writer’s opinion, is that voting software and election management systems are developed and proprietarily maintained by foreign actors, like China, who, by all accounts, have an interest in meddling in foreign elections.
Kanekoa then presents the various employees and related entities, all of which can be perused by reading the full article here.
The second, Obama And Hillary Recruit Poll Workers For 2022 Election, is not directly related to the Pit disclosures. However, PollChief software, which manages poll workers, appears to use proprietary software and machine learning tools to assist election riggers in selecting poll workers who will go along with the ploy. At least, this is the theory offered up for consideration by this writer.
Note: The lawful foundations of a citizen’s right to access allegedly proprietary voting and election software, the very foundations of law require that elections be transparent and open. Similar to a sports game, the rules that govern scoring and fouls must be clearly and explicitly disclosed to each team so that the methods by which the teams compete can be observed and verified by witnesses as free and fair.
Any company or entity producing voting software that claims its methods are proprietary to the point where voters and officials are unable to inspect, oversea, or audit their use—a disregard for one of the most fundamental aspects of what makes elections and voting truly effective—is either grossly incompetent or complicit in the fraud.
Lastly, the fact that so many people have been convinced that private, non-transparent, and unaccessible election and voting systems are the norm, unfortunately, is a damning indictment of the level of competence in the general population, experts, and officialdom at large. Fraud will continue until all citizens, whether officials or regular people, comprehend the true essence of voting and elections—and learn how to immunize the process against fraud at all levels effectively via citizen-level participation.
Kanekoa presents the shady history of Jinhua Konnech Inc.,
Consider that a patent application was filed in China for a system of “network voting of absent electorates” by Jinhua Konnech Inc. on February 4, 2015, under the names of Chen Wei (陈伟) and Shao Guojun (邵国君).
The rights of that patent were then transferred on October 7, 2015, from Jinhua Konnech Inc. to Jinhua Hongzheng Technology Co., Ltd. (金华鸿正科技有限公司), a Chinese election technology company also founded in 2015.
Rather impressively, Jinhua Hongzheng Technology Co., Ltd. is a software provider for the National People’s Congress (NPC) of the People’s Republic of China.
Hongzheng Technology builds hardware and software including mobile applications for more than 400 NPC clients in more than 20 provinces across China.
What security benefit for the US would be gained by transferring ownership rights of voting systems to China?
Furthermore, “Hongzheng Technology is also partnered with Lenovo, Huawei, China Telecom, China Unicom, and China Mobile and has branch offices in Hangzhou, Shenzhen, Nanjing, Wuhan among other places, according to the company’s website.” Kanekoa adds.
Recall that Huawei is currently being investigated for spying on military communications.
China’s Huawei Technologies Co. Ltd. is being actively investigated by the U.S. Department of Commerce over fears that it could be using equipment installed on cell towers to spy on nearby military bases and missile silos.
Kanekoa discovered the following,
Meaning Shao Guojun (邵国君) not only turns up on a patent with Eugene Yu and Konnech Inc. in the United States, but his name also appears on a Chinese voting technology patent transferred from Jinhua Konnech Inc. to Jinhua Hongzheng Technology Co., Ltd in 2015.
This is just a small sample of all discoveries made by Kanekoa in this third article.
Patel Patriot
Patel Patriot, author of the Devolution series, released a short interview with Gregg Phillips.
0:00 / 0:00
15 seconds
15 seconds
And here is an interview with Richard the Saint, wherein he details his belief that Gregg Phillips and True The Vote are running an information operation against the FBI.
0:00 / 0:00
15 seconds
15 seconds
Brian Cates
Brian Cates, a political pundit and columnist formerly writing for The Epoch Times, X22 Report, and Uncover DC, has been posting updates on his Telegram channel since the event.
Been looking over TTV’s document drop from last night.I see no smoking gun at this point but what I’m seeing is amazing and very troubling.
Konnech is giving the CCP complete access to everything having to do with elections in over 20 US counties, down to the names of the kids of all of the election workers on record.
We won’t let CCP run our 5G with their tech for obvious national security reasons, but how many companies out there like Konnech with their PollChief software are essentially giving the CCP a direct window into the US election systems?
A smoking gun would be a preserved record of the CCP using this incredible level of access to influence an election outcome, but I haven’t come across anything like that yet.But the door certainly LOOKS like it’s wide open to that kind of thing.
Of course, a preserved record of foreign election interference is exactly what Mike Lindell spent most of last year claiming he had in the PCAPs.
Assuming any of that stuff was real, would they be holding it back to drop it after the MAGA researchers invited to The Pit are done digging and exposing just how wide open the door is to this kind of activity?
One possible benefit of maintaining records of poll workers and their children is intimidation. Should a poll worker be conscripted into election fraud schemes, and the AI machine learning software profiles them as a possible leaker or turncoat after the fact, a spook from any one of the entities involved could coerce or intimidate the poll worker into remaining silent.
As I said the other day, this massive breach of US national security infrastructure does not involve a few politicians or gov’t officials in DC.
It involves the 1.8 million Americans who had their personal information handed to the CCP regime and stored on a server in Wuhan, China. Because they are election workers in their county.
We already know that China has been engaged in a massive level of infiltration/influence operations inside the United States.Did any of these election workers become targets of such influence operations?
Konnech needs to explain why this level of access was allowed to the CCP.Was there a good and valid reason for allowing this level of access?
Cates presents a screengrab of PollChief’s license approval.
Here’s the request approval to sole source Konnech’s PollChief in LA County for “all future elections”.
Something that stood out to me here is M&S…modeling and simulation. Why on Earth would they need to simulate anything regarding elections? Is it solely for training purposes?
Here, Cates shares a screengrab describing where and how funds were procured for Konnech.
This is where all the Konnech $$$ came from.
And Cates continues to elaborate on the screengrab here.
Ok, so we have a non-profit call CTCL providing a grant to Detroit to help count absentee ballots. How generous of them. What are they all about? Read very carefully. Mark Zuckerberg and his wife injected approximately $350 million into CTCL through SVCF.
Unless all these things have been done, your Secretary of State cannot LEGALLY certify your county’s election results.
Too many times nobody challenged corrupt election results until after the election was over.
This time patriots are going to be proactive.Steps will be taken in many counties to verify that all these requirements have been met before the election is held.
Where We Go 1 We Go All
Here is a post from Where We Go 1 We Go All detailing iPetitioner software, developed to streamline the signature collection process. Could these be stored and applied to illegal ballots later?
#Konnech has software named iPetitioner, whose sole purpose is to streamline the Signature collection Process. Launched in 2013 and still going strong as recent as 2018 (granted a Section 8, 5 year trademark registration)
It takes MANY signatures to get on the Ballot, For Example over 15,000 to run for Senator in NY. Imagine 9 years worth…that’s a huge database of American Voter Signatures.
Surely something this sensitive would only be stored in the United States right…
During the course of probing one such software provider, in early 2021 Gregg and his team stumbled across an IP address for a server that was purportedly associated with a company named Konnech, at least according to the records of services that track IP address ownership and location.
That IP address, it turns out, was located in China—it was evidently used by some instances of the software application for a period of time, before switching to a new IP address in Grand Rapids Michigan.
Geolocation tools that I used suggest that the server that was hosting this address in China was somewhere near Hangzhou, possibly somewhere near Zhejiang University.
***
While Gregg and his team were investigating, they ran some routine cybersecurity checks to see what services were being used by that Chinese IP address to determine what was behind it. One of these routine “scans” showed a port on that IP address—27017—that is typically used by a database application called “MongoDB” (I’ll explain some of these terms more fully in just a bit.)
Let’s take a technical look at what MongoDB is before we get to what it is that they reportedly discovered.
But first, we’ll take a step back to bring you up to speed on some basics and explain some of the terms. Databases are software systems that store large collections of data for fast lookup, correlation, reporting, and retrieval by software applications.
***
Here, he takes the time to explain some of the IT terminology and fundamental concepts.
For those who are curious, SQL Servers are based on the mathematics of set theory (if you’ve used a Venn Diagram, or if you took some advanced math in high school or college you probably have a basic idea of what sets are) and they also rely heavily on something called Linear Algebra. This is a branch of math that deals with vectors and 2D, 3D or higher dimension “matrices”. This is what makes them fast and efficient and manipulating data.
If you’re familiar with Microsoft Excel, then you know that a spreadsheet is just a simple form of a 2D matrix of information: a sheet in Excel has rows and columns of cells which contain and organize data.
A SQL server is analogous in some ways to a spreadsheet, but it is more sophisticated. It stores data across many “tables” (think sheets in Excel) — and tables that are meant to link together in some fashion are stored in collections that are called, well, “databases.”
an example of an Excel table
SQL servers are designed for types of data that are relatively clean and ‘well-structured’; one typically puts data into various tables, which are then linked to each other in a ‘relationship’ by some field that is common to both tables. In this way you can “lookup” data in one table using a related value in a column in some other table.
SQL servers are typically used for very large, very well-structured data when you need really fast results to make your software run smoothly.
A relationship diagram for various tables in a SQL database
However, not all problems that you find in the real world are a good match for ‘well structured’ databases like SQL. Sometimes you need to work with data that is messier or only loosely-structured—or structured in a way that may frequently change because you haven’t yet worked out all the final details of your application just yet.
In SQL databases, a single ‘record’ has the same format (fields) as any other record (for example, think of a single row of an excel spreadsheet table as a ‘record’.) For instance, imagine a ‘pollworker’ record for a polling place —it might have, for example, a field for name, address, phone number, email address etc. with one ‘record’ for every poll worker. You might also have information for emergency contacts, or other family members related to that poll worker.
SQL databases are common and useful, but there is also a type of database called a “No SQL” database. These kinds of databases are different; they allow each record to potentially have different numbers (and sizes) of fields, with perhaps only a few fields per record kept in common. For example, maybe one worker’s record has some extra fields that the other worker’s records don’t typically have, like secondary phone numbers or extra email addresses.
When you have less well-structured databases, or data that doesn’t “fit well” into a SQL table—or if you have a need to quickly add new fields as you’re developing your software without having to rebuild your database every time you make some major change—it is now common to use one of these “No SQL” databases.
They are just easier for programmers to work with—if the software requirements for data changes, it is often faster and easier to “upgrade” the application when the data is in a NoSQL database than if it is in a more rigidly structured SQL database.
Software development gets done faster, which saves the company money. You just tack on a few new fields for certain new records, leave the old records alone, and program your application to recognize when it sees a new format for data records and act appropriately.
These kinds of databases are also conceptually easier for less skilled programmers to use, they “connect up” to modern web applications more easily, and they have grown in popularity over the last decade. MongoDB was one of the first and one of the more popular ones in use these days.
Sometimes, a “NoSQL” database is used during early software development because of the flexibility in rapidly changing the data structures as the program gets fleshed out; but then once the program reaches final product stages, it is converted to a SQL database because the data structures aren’t expected to change as much after the program goes on the market, and SQL servers perform faster.
The ease of use of NoSQL databases like MongoDB for unsophisticated programmers, however, is a problem: because less skilled (and less expensive) programmers can and do use them, they often overlook certain critical security settings because of their lack of knowledge.
He then starts to lay out what Gregg Phillips found regarding MongoDB, using analogies to help non-professionals understand the situation easily.
Let’s briefly use a “house” analogy here for a moment to make this easier to grasp. Think of the “house” as the IP address, and the “ports” are the doors and windows on the house—ways to get into or out of the house.
A common practice for cybersecurity professionals who are exploring a network is to “test the locks” when they find “open windows or doors” as they walk around a “building” of interest, and in this case, they did a quick check on the MongoDB port (“rattled the windows”) to see if it responded.
When it did, they next tried a pretty basic thing: they tested to see if they could log into it with the default, “out of the box” username and password. That would be a pretty dumb thing for the owner of this machine to have left in place, but it is surprisingly common.
In other words, as the cyber team rattled the windows and doors, they found a boneheaded error on the MongoDB installation that only a novice would be expected to make. The doors and windows weren’t even locked. In fact, they were wide open.
***
So Gregg’s team was able to “walk in the front door”, as it were, because there was no lock on the door, and “look around the place.”
What they found was shocking: they found data that included personal details of nearly 1.8 million US poll workers. Details like their names, phone numbers, addresses, etc. Even the names of family members: things that might routinely be collected when you hire someone and issue them a paycheck.
But they also reportedly found rich details about where election machines were located, including floorplans of buildings used in elections. Nominally, this information would be of use by the election agencies, because the application they were using helped them track their election machine inventory.
***
China apparently has a law that any data found on its Internet belongs to the government, so in effect, China has “custody” of anything that existed on this server.
Perhaps because of the fact that Chinese programmers know this policy about the CCP, they are lazy and don’t bother much with securing their database servers; it could be a cultural thing—kind of a “what’s the point, it all belongs to them anyway” attitude among some workers. It could also be that the more talented programmers take jobs in other countries, while the more incompetent ones stay behind to work in China.
***
It isn’t in dispute that someone incompetent did this; the data was exposed. What isn’t known is who exactly did it, and what relationship they had to the vendor Konnech.
However, the situation is even worse than it first appears: because the MongoDB database was *completely* unsecured, it was also possible for interlopers to not only read all of its data—but also potentially add, overwrite and change data.
For instance, someone could have added a few dozen unscreened poll workers who were unvetted and were acting as plants sent in to do someone’s bidding on the election machines or ballots.
But that brings us back to an earlier point: the CCP views any data on China’s networks as belonging to the government: whether it was exposed due to incompetence, or not. They don’t care; it belongs to them.
Since Gregg and his team were able to “walk in the front door” because the doors and windows weren’t locked, it stands to reason that China’s own cybersecurity teams may have done so as well…and therefore the CCP could have, and likely did, come into possession of this same US poll worker data.
Just Human
Just Human produced his synopsis of the event in The Pit: A Story in Three Acts (the portion not streamed).
0:00 / 0:00
15 seconds
15 seconds
Jordan Sather
Jordan Sather shares insights about The Pit.
0:00 / 0:00
15 seconds
15 seconds
Closing
More revelations from The Pit will likely be forthcoming.
Gregg Phillips has been releasing a steady stream of updates on his Truth Social @greggphillips.
If there are any updates not contained in this post, please submit them to justin@vigilant.news.
Justin Deschamps is an epistemologist, researcher, and public speaker, passionate about omniology. He discusses a wide range of topics for the betterment of mankind in and through the enhanced capacity to think critically, discern wisely, and expose corruption. He hosts Vigilant News and Knowledge Based on Badlands Media, and writes, produces, and hosts the show Into The Storm on Rise.tv.
“CDC eased its Covid-19 guidance on Thursday, stating that “Covid-19 prevention recommendations no longer differentiate based on a person’s vaccination status.”
BREAKING: CDC guidelines have been revised and COVID rules have been relaxed. The new guidance lifts the requirement to quarantine if exposed to the virus, deemphasizes screening people with no symptoms and updates COVID-19 protocols in schools. https://t.co/YJ4RBxeDGN
In effect, the change means that unvaccinated who were exposed to the virus and developed natural immunity are equal in status to those who have been vaccinated.
Anyone that suffered due to those governments, institutions, businesses, or people who militantly enforced the ineffective and dangerous experimental jabs is rightly upset about the situation.
So the last 2.5 years were for nothing? Suddenly it’s safe to do whatever
A legion of doctors has spoken out against the experimental jabs ever since their release, including Dr. Robert Malone, one of the inventors of mRNA vaccines, and Dr. Peter McCullough, one of the most prestigious doctors.
Dr. Naomi Wolf recently revealed that in the 300,000 Pfizer vaccine trial documents, 44% of women pregnant who participated in trial lost their babies.
No doubt more backpeddling will take place the adverse effects of the vaccines are revealed.
Justin Deschamps is an epistemologist, researcher, and public speaker, passionate about omniology. He discusses a wide range of topics for the betterment of mankind in and through the enhanced capacity to think critically, discern wisely, and expose corruption. He hosts Vigilant News and Knowledge Based on Badlands Media, and writes, produces, and hosts the show Into The Storm on Rise.tv.
MARTHA’S VINEYARD — In June 2022, former President Obama purchased a 2,500-gallon propane tank for his $12 million mansion in Martha’s Vineyard. Rumor has it that Obama is prepping for some apocalyptic situation.
The select board approved a request for a 2,500-gallon commercial propane tank for 79 Turkeyland Cove Road in Katama — owned by former President Barack Obama and First Lady Michelle Obama.
Fox News reporter Jesse Watters suggested that Obama might be building a bunker.
The segment appears to have been taken down.
Watters might not be wrong.
In November 2020, World Economic Founder Klaus Schwab suggested that a massive cyber attack with the potential to take down the power grid could happen sometime in the future.
One month before Russia was thrust up as the great enemy of our time, due to the Ukraine situation, Bloomberg argued that Russia could take down the power grid.
“The pandemic represents a rare but narrow window of opportunity to reflect, reimagine, and reset our world,” Schwab said shortly after the COVID-19 pandemic began. He was right. Sweeping policy changes that were ushered in under COVID emergency declarations have become permanent in several sectors.
Comments like these have led many to question if Schwab “knows something”—that he may be acting as some kind of technocratic prophet for the globalists.
— Stop the WEF. Unelected World Dictatorship. (@markhamowl) August 13, 2022
“We’ve never had a private propane tank come to us,” said select board member Arthur Smadbeck. Michael Donaroma, another select board member, noted a private-residence propane tank is typically a fraction of the size, MV Times reports.
No reports have surfaced confirming what the massive propane tank for the former POTUS will be used for in his sprawling 29-acre estate.
However, given that the average barbeque propane tank last at least half a summer season of cooking, it’s reasonable to conclude cooking up hamburgers and hotdogs isn’t the point.
According to Primal Survivor, a generic example of a propane generator would use approximately .7 gallons per hour. Trippling that for the Obama mansion puts the figure at 2.1 gallons per hour, giving his bunker approximately 1190.48 hours or about 49 days’ worth of power. Learn Metrics has a similar figure. While this is just a rough calculation, it proves the point that this much propane isn’t just for cooking. There may be another purpose for the coveted gas procured by the Obamas.
Justin Deschamps is an epistemologist, researcher, and public speaker, passionate about omniology. He discusses a wide range of topics for the betterment of mankind in and through the enhanced capacity to think critically, discern wisely, and expose corruption. He hosts Vigilant News and Knowledge Based on Badlands Media, and writes, produces, and hosts the show Into The Storm on Rise.tv.
Charity Linch, Policy Analyst for America’s Frontline Doctors (AFLDS), shares her reasons for fighting the good fight that has come into focus for so many people across the world.
Founded in 2019, AFLDS took center stage in the fight against health totalitarianism in the wake of oppressive and ineffective COVID-19 policies imposed by transnational organizations like the World Health Organization.
On July 27th, 2020, Simone Gold, Stella Immanuel, and Rep Ralph Normal (R)—along with over a dozen other prestigious healthcare professionals—held a press conference on the steps of the US Supreme Court to give voice to reason in response to the increasingly disastrous and fallacious COVID-19 response.
The backlash from officialdom was swift and unrelenting. And yet, despite a ceaseless assault on those brave voices who declared a return to science-based healthcare, AFLDS has gained more respect and admiration worldwide from both healthcare professionals and the public in general.
“People need to wake up to what is happening behind the scenes,” Charity said, speaking to issues that are important for the fight for health freedom, in a response to several questions asked of her by Vigilant News.
The freedoms and dignity of people all over the world have been under assault for some time, most palpably in the wake of COVID-19. Government officials and self-declared experts like Bill Gates—who is neither a doctor nor a scientist—push ineffective and toxic vaccines for a disease that has a 99% survival rate. This is despite several safe and effective treatments that have been ignored, AFLDS argues, such as Hydroxychloroquine and Ivermectin.
“Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.” ~ Benjamin Franklin
The sentiments of Benjamin Franklin, one of the founding fathers of the United States, are echoed by Charity’s thoughts.
“The first thing everyone needs to do is read the Constitution. How can you fight for rights if you don’t know what they are?” she said. “People must start attending local meetings to know what is happening at their local level. Who is in place? What are they doing?”
All too often, the work-a-day ultra-busy lifestyle of the modern age robs citizens of the time and mental attention needed to understand the slowly rising tide of encroachment of God-given inalienable rights. Charity correctly recognizes ”We must be vigilant and stand up for ourselves,” especially as so many people unwittingly sacrifice their rights in the name of protecting the health of others, an admirable goal.
But as Charity relays, “Many people are comfortable. Those people won’t act until they are forced to.” Historically, the rise of authoritarian dictatorships, like Hitler’s Germany, and Lenin’s USSR, required a compliant and content population, even as chaos erupted around them.
Charity said, “In our community, we formed brigades. Each brigade is an area that freedom fighters need to keep an eye out.” Brigade here means non-violent peaceful civil action. Despite the fake-news media’s incessant quest to paint those who disagree with the globalist narrative as domestic terrorists, the patriots at AFLDS recognize that respect for the rule of law is paramount, even if those in power fail to uphold their oaths and honor the rule of law.
Like the horrors of the Civil War of the 19th century, the battle lines are drawn through families and friend groups. “The opposition that has been most troubling to me is my own older children,” Charity said.
“I have children from a previous marriage that went to public school (unlike my younger children). These children have 3 parents, and each set of grandparents, who are very right-wing thinkers. Yet, the public school system has had such an influence that they think like socialists.”
The persuasive influence of “a Marxist school system” that is “meant to indoctrinate instead of educating” has made reasonable discussion at the dinner table difficult for many Americans. Charity’s own experience is no exception.
“Common Core discourages critical thinking,” Charity suggests as a reason for the irrationality in citizen-level discussions of these issues. ”It is heartbreaking to see it in my own children,” she laments, a sentiment that is increasingly felt by Americans about many issues. She continues, “As they get older, I know they will see the truth in what their parents taught them vs. what the schools indoctrinated them with.”
“We have let this takeover of the globalists go too far,” Charity cites as one of the key causes for the growing division and chaos affecting people across the world. The solution, she said, is to “keep close to God and follow His plan….”
”Awareness is necessary to fight the evil coming against us. If we do not see the enemy, how could there even be a fight?”
Charity’s reasons are not uncommon. The explosion of interest in freedom-oriented organizations like AFLDS has grown sharply in the past two years.
What is to be done, and what role does America play? Charity answers, “the buck stops with America. When we save America, we save the world.”
***
You can read Charity’s full responses to questions posed by Vigilant News below in bold.
1. What caused you to become more politically activated?
For me, I have always been politically motivated.
I grew up in a home where you had to know what was going on to be able to contribute to the conversation at dinner. Those were the incredible Reagan years. 20 years ago, Alex Jones showed me what I already knew but couldn’t put my finger on. I was very active with everything I could put my hands on in college and participated in the Tea Party during the Obama years.
2. Clay Clark coined the new verb, Paul Revering for America, what issues do you think are important to be raising awareness about?
The issues are the effects of the problem. People need to wake up to what is happening behind the scenes. We need to always be asking why. Often, what we are focused on can only be solved by going deeper to the root of the cause. We have a globalist group trying to take over, and we must not comply or cooperate in any sense.
3. What are some first steps for the viewer who wants to get involved locally?
The first thing everyone needs to do is read the Constitution. How can you fight for rights if you don’t know what they are? People must start attending local meetings to know what is happening at their local level. Who is in place? What are they doing? Once again, always ask why.
4. What are the biggest challenges you’ve seen at the local level?
In our community, we have a good group of people. We are active and no one is looking to build their own ego. I have seen individual pride get in the way in several communities. We must work together and realize we are at war. We have been infiltrated and are being attacked. We must be vigilant and stand up for ourselves.
Many people are comfortable. Those people won’t act until they are forced to. Others want to do something, but don’t know what to do.
In our community, we formed brigades. Each brigade is an area that freedom fighters need to keep an eye out. We have a school brigade, a city council brigade, a farmer’s brigade, etc. The brigades go to the meetings, ask questions, report back to the group what is happening, and even call for reinforcements when necessary. It works well because it gives people ownership and continues to motivate us as we see different areas that we need to stay on top of. We use the term “brigade” and not “committee”, as we are way past committees. We don’t want anyone to lose sight of the fact that we are under attack.
5. What opposition have you encountered?
The opposition that has been most troubling to me is my own older children. I have children from a previous marriage that went to public school (unlike my younger children). These children have 3 parents, and each set of grandparents, who are very right-wing thinkers. Yet, the public school system has had such an influence that they think like socialists. One of the 2 leans more right, but still has ideas that were instilled in a Marxist school system, meant to indoctrinate instead of educate. Common Core discourages critical thinking and is purposeful in its far-left ideology. Our state opted to not do Common Core. The federal government played the funding card, and our weak legislators prostituted the schools, allowing Common Core under a different guise. The schools must still meet the Oklahoma Academic Standards, which align perfectly with Common Core. It is heartbreaking to see it in my own children. As they get older, I know they will see the truth in what their parents taught them vs. what the schools indoctrinated them with.
6. How important are faith and community for combatting globalism?
We have let this takeover of the globalists go too far. We cannot win without the help of the Great I Am. To win this war, we must keep close to God and follow His plan. It is not important; it is imperative.
7. What’s more important, raising awareness or donating politically? Or neither?
Both are important. What makes the globalists so powerful is the money and power behind them. We must fund the efforts to save our world. Many are only trying to save America, but the buck stops with America. When we save America, we save the world.
Awareness is necessary to fight the evil coming against us. If we do not see the enemy, how could there even be a fight?
Justin Deschamps is an epistemologist, researcher, and public speaker, passionate about omniology. He discusses a wide range of topics for the betterment of mankind in and through the enhanced capacity to think critically, discern wisely, and expose corruption. He hosts Vigilant News and Knowledge Based on Badlands Media, and writes, produces, and hosts the show Into The Storm on Rise.tv.
GLASGOW, SCOTLAND — Seven men and four women participated in a child sex abuse ring involving witchcraft, Ouija boards, and the killing of animals, prosecutors alleged in court.
The eleven-person group molested, raped, abused, filmed, and photographed two girls and a boy, who were all underage, revealed in an indictment, reports the Daily Mail.
Between January 2010 and March 2020, the abuse and illicit activity occurred. The precise details of the alleged satanic nature of the abuse have yet to be revealed.
The accused are: Iain Owens, 43, Elaine Lannery, 38, Lesley Williams, 40, Paul Brannan, 40, Marianne Gallagher, 37, Scott Forbes, 49, Barry Watson, 46, Mark Carr, 49, Richard Gachagan, 44, Leona Laing, 50, and John Clark, 46.
Owens and Lannery, both of Thornliebank Scottland, neglected the three children, along with another child.
The suspects face 43 different charges, listed in a 14-page indictment, revealed in a hearing at the High Court in the Townhead, Maryhill, and Craigend areas of Glasgow.
The gruesome facts that were presented to the court are as follows.
One of the girls was forced into a microwave in an attempted act of murder on the part of her abusers. She was also held in a refrigerator and an oven.
Animals were killed, and satanic “seances” were performed.
Cloaks and devil horns were worn by the eleven-person group of seven men and four women during some of the acts of abuse.
An Ouija board was used to call on spirits and demons, which was a feature of the ring’s activities.
The young boy was made to stab a budgie bird to death.
All of the children were forced to take part in satanic “seances” that involved the killing of animals, including dogs.
All three of the children were raped at different times, while the group “clap, clear and verbally encourage”.
A ten-year-old girl was filmed being sexually assaulted.
The young boy allegedly was made to “courier controlled drugs” for his eleven captures.
Five of the accused allegedly assaulted the young boy, including when the boy was put in a bath, he was told, was filled with blood.
From December 2015 to June 2019, four of the accused allegedly attempted to murder the younger of the two girls, beginning when she was only weeks old.
The youngest girl was also hung from a nail on the wall via her jumper.
The same girl was also made to “act like a dog” and eat pet food, in addition to being chased while wearing a devil mask.
One of the girls was threatened with being trafficked to a Turkish male by two of the accused.
One of the accused, Owens, faces more charges than he raped the older girl, along with four others who face indecency accusations.
Owens and another woman, Lannery, were accused of sex abuse involving the boy and the younger girl.
Other allegations state that all eleven were involved in the rape of the older girl, at various times, wherein four of the accused “cheered” during the assault.
Owens and Lannery were accused of having sex in front of children.
Owens and Brannon were accused of raping the boy.
Lannery and Williams were accused of forcing the boy to watch a video of one of the girls being attacked.
Lannery is charged with molesting the younger girl before Owens, Williams, and Brannan raped her, with the girl being held down in a cot by all eleven at one point. While this was happening, the women were accused of clapping and cheering while the boy and the older girl, who filmed what happened, were shut in a room.
Owens and Lannery face additional charges of “attempting to defeat the ends of justice and attempting to pervert the course of justice,” hanging up the phone the older girl used to call the police and disposing items to avoid prosecution.
Five others were named in the indictment but are said to be deceased.
Judge Lord Beckett scheduled an eight-week trial for September 2023, in addition to a hearing set for October.
No evidence of the group having connections with high-profile officials has surfaced.
Justin Deschamps is an epistemologist, researcher, and public speaker, passionate about omniology. He discusses a wide range of topics for the betterment of mankind in and through the enhanced capacity to think critically, discern wisely, and expose corruption. He hosts Vigilant News and Knowledge Based on Badlands Media, and writes, produces, and hosts the show Into The Storm on Rise.tv.