How to make the US Post Office prosperous and relevant in the 21 century using the One-Time Pad algorithm!

Every Tuesday I meet with a group of Patriots from the Illumination Society at the Liberty Restaurant in Rochester NY to do a round table radio broadcast discussing topics about Geo politics, religion, Currant events and anything that has to do with Truth Liberty and Justice for all.  We not only talk about problems but as a group we also work on finding solutions to the world problems.  every week we have some of the brightest minds join us at the round table live Broadcast. http://www.blogtalkradio.com/anti-illuminati-party

The Illumination Society  presents a FREE Movie Night every month showing films that we feel are important for the time in which we live. Films that dig deep into subjects like – The World History – UFO – The New World Order – Spirituality – Prophecy – Science – What’s Happening To Our Food – Agenda 21 – Vaccines and many other subjects.

Our Free Movie Night has been well received by people from all walks of life. People concerned with the things happening in our world today. People that want to know what is happening all around us and what we can do to stand against those that wish to rob us of our freedoms and our God-given rights. Come out and learn about subjects you may or may not be aware of. We hope that our Movie Nights, and our following Q&A time will shed some light on these subjects, and help you to see America’s role in past, present and future history.

We will be presenting the following films on the following dates:
– See more at: https://www.eventbrite.com/e/movie-night-tickets-12609803261

You can also join us in our round table discussion and suggest topics you would like us to discus.

Anti New World Order Party ☼ Global Group

https://www.facebook.com/groups/AntiNewWorldOrderPartyGlobal/

Now to the main point of this blog post today,  We will also have a follow-up to this post.

Original posted on FutureBeacon.com

 

Communication Privacy
by
James Adrian

Introduction

      Many individuals, businesses and other organizations have a legitimate and lawful need to keep some of their information confidential or even absolutely secret from competitors, the press and others. Because email has become vital to timely communication and because email is not secure, encryption is often necessary.

      New employees of large companies are often encouraged to live near the company’s offices. In this kind of setting, privacy for technical and marketing information is convenient. Small organizations such as law offices, medical clinics, Internet businesses, and many others may not find the expertise they need in their local area. These small organizations, of which there are many, need secure communication to avoid the cost of face-to-face meetings. Lacking the funds for routine flights between cities, these organizations are very dependent on the electronic communication of data and ideas. Private medical information, schematic drawings, program source code, marketing plans, and innumerable other types of documents are involved. In such circumstances, strong encryption is needed.

      In many countries, the post office has the legal authority and obligation to enforce privacy for the postal mail. If these postal services were to offer secure email for a reasonable price, small companies would not be at such a disadvantage relative to larger companies.

      Established by the U. S. Constitution, Article I, Section 8, Clause 7, the United States Postal Service is authorized “To establish post offices and post roads. It also has a long history of adding services as needed, such as commemorative stamps, rural delivery, airmail, one-day delivery, zip codes, self-adhesive stamps, public Internet site, “Forever” stamps, and an iPhone app. Secure communication would add to its revenue (which would help ameliorate its recent shortfalls) and set a good example.

Technical Matters

      To create a secure message, the encryption algorithm must used secret information that cannot be discovered by unauthorized parties. If the encryption relies only on complexity or computational difficulty without involving secret information, the intended message can be discovered by third parties. To third parties, some aspect of the transmission must be unknowable.

      Within encryption technology, the embodiment of information unknowable to third parties often takes the form of secret random numbers. These random numbers are used to encrypt messages in such a way as to make decryption of a message impossible without access to those same random numbers.

      Many have said that what one person can encrypt, another can decrypt. This is a myth. TheOne-Time Pad algorithm was proved to be absolutely secure in the writings of Claude Shannon. See “Claude Elwood Shannon – Collected Papers” edited by N. J. A. Sloane and Aaron D. Wyner. In addition to being immune from hacking, this algorithm becomes more convenient as memory devices increase their capacity.

      Claude Shannon proved that any absolutely secure encryption algorithm must posses these characteristics:

      1. The encryption keys must be random numbers of uniform distribution.

      2. The keys must be shared in absolute secrecy by the sender and receiver.

      3. Any key encrypting a message must be as at least as long as that message.

      4. Any key used to encrypt a message must not be reused.

      The one-time pad is a famous encryption algorithm having all of these characteristics. By using a random key comprised of random numbers to encrypt a message (the plain text) with the XOR logical operation, the transmitted result (the ciphertext) is rendered as random as the key. The collection of secret keys is called the pad. Keys are of the same length as that of the messages they encrypt. They are erased immediately after their use. The result is that the actual message is as likely as any other message from the point of view of those attempting to decrypt the message without knowing the secret random numbers.

      Optionally, encrypted messages can be made to appear to be ordinary messages of a different type, such as pictures or sound files or text messages that contain information that is very different form that in the plain text. This process is called Steganography.

Services

      The most important service facilitating secure communication is the shipping of media containing random numbers. The production of truly random numbers for algorithms that encrypt messages by means of random keys is the part of the process most challenging and inconvenient for the customer. The principle service of USPS would be to place random numbers on appropriate media and ship copies to addresses designated by the customer. One shipment might serve the customer for only a few messages or for years worth of messages, depending on the number of random numbers shipped.

      Options may include picking up shipments from the local post office, receiving them in the mailbox, or receiving them at the recipient’s door (possibly by special delivery or with a return receipt).

Criminality

      Measures which distinguish legitimate from nefarious use of encryption services need not be publicly discussed.

Contact

      Please feel free to make suggestions by writing to jim@futurebeacon.com.

Israel and the Palestinians Gaza conflict nothing more than a False flag iron triangle operations designed to deceive the world

I believe that the Israel and Palestinian Gaza conflict is a false flag operation being carried out by Illuminati family’s and Satanic secret society’s to set up World War 3.   The Illuminati family’s control and have infiltrated just about every facet of society they do control key Government offices as well as private corporations through a type of iron triangle. In United States politics, the iron triangle comprises the policy-making relationship among the congressional committees, the bureaucracy, and interest groups.[1]  Illuminati Satanic secret societies, have been behind a wide range of events and disasters going as far back in history as the French Revolution and possibly even farther.

It is a historical fact the Hamas was founded by the Israel government Israel may want to destroy Hamas now. But it played a key role in the group’s creation. According to JerusalemOnline.com  “Israel actively supported Hamas” Documents show that Israel was interested in empowering Hamas in attempt to end the first Intifada. During Operation “Protective Edge”, news leaks website WikiLeaks exposes secret documents which were passed between American diplomats in the 1980’s. These documents allegedly show that Israel was interested in enabling Hamas activity in its beginning, intending to weaken the Palestine Liberation Organization and ending the first Intifada.  Hamas was established in 1987, and has its origins in Egypt’s Muslim Brotherhood that the United States General Patraeous, the CIA  Creatures of Jesuit Papacy and the Knights of Malta helped to …Israel and Egypt then imposed an economic blockade on Gaza.  Even US Congressman Ron Paul spoke about how  Israel created Hamas to destabilize Arafat who was very powerful at the time.

Army General David Patraeus, 2010

Army General David Patraeus, 2010

Army General David Patraeous is a Jesuit Temporal Coadjutor.  He is beloved by the Jesuits at Georgetown University at the nation’s capital in Washington, District of Columbia Catholics.  General “Betray-us” has spoken at Georgetown several times!  Additionally, the CIA was a creation of the Jesuits in 1947 via the National Security Act signed into law by 33rd Degree “Dirty Harry” Truman!  Since then, the American, British, Soviet/Russian, German, French, Canadian, Israeli, Interpol and all the other intelligence agencies around the world have been working together to form the pope’s modern day Holy Office of the Inquisition!

Thanks to the Mossad, Israel’s “Institute for Intelligence and Special Tasks”, the Hamas was allowed to reinforce its presence in the occupied territories. Meanwhile, Arafat’s Fatah Movement for National Liberation as well as the Palestinian Left were subjected to the most brutal form of repression and intimidation.  Let us not forget that it was Israel, which in fact created Hamas. According to Zeev Sternell, historian at the Hebrew University of Jerusalem, “Israel thought that it was a smart ploy to push the Islamists against the Palestinian Liberation Organisation (PLO)”. The Hamas had built its strength through its various acts of sabotage of the peace process, in a way which was compatible with the interests of the Israeli government. In turn, the latter sought in a number of ways, to prevent the application of the Oslo accords. In other words, Hamas was fulfilling the functions for which it was originally created: to prevent the creation of a Palestinian State. And in this regard, Hamas and Ariel Sharon, see eye to eye; they are exactly on the same wave length. 

A majority of the worlds problems, from poverty to world wars, are the cause of International “satanic secret society,” Banking cartel.  Many or the Worlds religions and their representatives are secretly being controlled by Secret Satanic Society’s such as the most famous Freemasons who have been influencing and trying to control secular society with a Satanic agenda that Albert Pike (December 29, 1809 – April 2, 1891) wrote about in a book he published called Morals and Dogma of the Ancient and Accepted Scottish Rite of Freemasonry in 1871. Albert Pike was an American attorney, Confederate officer, writer, and FreemasonAlbert Pike wrote a letter to Giuseppe Mazzini, dated August 15, 1871.  This letter graphically outlined plans for three world wars that were seen as necessary to bring about the One World Order, and we can marvel at how accurately it has predicted events that have already taken place. 

This section Copied from: Rense.com

Pike’s Letter to Mazzini: It is a commonly believed fallacy that for a short time, the Pike letter to Mazzini was on display in the British Museum Library in London, and it was copied by William Guy Carr, former Intelligence Officer in the Royal Canadian Navy. The British Library has confirmed in writing to me that such a document has never been in their possession. Furthermore, in Carr’s book, Satan, Prince of this World, Carr includes the following footnote:

“The Keeper of Manuscripts recently informed the author that this letter is NOT catalogued in the British Museum Library. It seems strange that a man of Cardinal Rodriguez’s knowledge should have said that it WAS in 1925”.

It appears that Carr learned about this letter from Cardinal Caro y Rodriguez of Santiago, Chile, who wrote The Mystery of Freemasonry Unveiled.

To date, no conclusive proof exists to show that this letter was ever written. Nevertheless, the letter is widely quoted and the topic of much discussion.

Following are apparently extracts of the letter, showing how Three World Wars have been planned for many generations.

“The First World War must be brought about in order to permit the Illuminati to overthrow the power of the Czars in Russia and of making that country a fortress of atheistic Communism. The divergences caused by the “agentur” (agents) of the Illuminati between the British and Germanic Empires will be used to foment this war. At the end of the war, Communism will be built and used in order to destroy the other governments and in order to weaken the religions.” 2

Students of history will recognize that the political alliances of England on one side and Germany on the other, forged between 1871 and 1898 by Otto von Bismarck, co-conspirator of Albert Pike, were instrumental in bringing about the First World War.

“The Second World War must be fomented by taking advantage of the differences between the Fascists and the political Zionists. This war must be brought about so that Nazism is destroyed and that the political Zionism be strong enough to institute a sovereign state of Israel in Palestine. During the Second World War, International Communism must become strong enough in order to balance Christendom, which would be then restrained and held in check until the time when we would need it for the final social cataclysm.” 3

After this Second World War, Communism was made strong enough to begin taking over weaker governments. In 1945, at the Potsdam Conference between Truman, Churchill, and Stalin, a large portion of Europe was simply handed over to Russia, and on the other side of the world, the aftermath of the war with Japan helped to sweep the tide of Communism into China.

(Readers who argue that the terms Nazism and Zionism were not known in 1871 should remember that the Illuminati invented both these movements. In addition, Communism as an ideology, and as a coined phrase, originates in France during the Revolution. In 1785, Restif coined the phrase four years before revolution broke out. Restif and Babeuf, in turn, were influenced by Rousseau – as was the most famous conspirator of them all, Adam Weishaupt.)

 

“The Third World War must be fomented by taking advantage of the differences caused by the “agentur” of the “Illuminati” between the political Zionists and the leaders of Islamic World. The war must be conducted in such a way that Islam (the Moslem Arabic World) and political Zionism (the State of Israel) mutually destroy each other. Meanwhile the other nations, once more divided on this issue will be constrained to fight to the point of complete physical, moral, spiritual and economical exhaustion We shall unleash the Nihilists and the atheists, and we shall provoke a formidable social cataclysm which in all its horror will show clearly to the nations the effect of absolute atheism, origin of savagery and of the most bloody turmoil. Then everywhere, the citizens, obliged to defend themselves against the world minority of revolutionaries, will exterminate those destroyers of civilization, and the multitude, disillusioned with Christianity, whose deistic spirits will from that moment be without compass or direction, anxious for an ideal, but without knowing where to render its adoration, will receive the true light through the universal manifestation of the pure doctrine of Lucifer, brought finally out in the public view. This manifestation will result from the general reactionary movement which will follow the destruction of Christianity and atheism, both conquered and exterminated at the same time.” 4

 

Since the terrorist attacks of Sept 11, 2001, world events, and in particular in the Middle East, show a growing unrest and instability between Modern Zionism and the Arabic World. This is completely in line with the call for a Third World War to be fought between the two, and their allies on both sides. This Third World War is still to come, and recent events show us that it is not far off.

We have been given warnings over the years by credible sources such as JFK’s Speech about Secret Societies that probably cost him his life….but, that’s what heroes do like Dwight D. Eisenhower  farewell address  speech on Jan.17,1961 also gives a warning of the military industrial complex that is controlled by the Satanic Zionists secret societies. Military Industrial Complex (MIC): is concept commonly used to refer to policy relationships between governments, national armed forces, and industrial support they obtain from the commercial sector in political approval for research, development, production, use, and support for military training, weapons, equipment, and facilities within the national defense and security policy.

It is our mission to give solutions and a platform to those Patriots who oppose to the Illuminati Satanic agenda of a One World Order.  Anti-Illuminati Party, should God deign to avail us, is to defend and promote real “Liberty and Justice for all,” formed by the wisdom contained in the United States Constitution, particularly its Bill of Rights, and inspired by the U. S. way of “Life, Liberty and the pursuit of Happiness.”

– Our strategy for promoting these consists in grassroots educational and political campaigns.
– Crucially, we of the Anti-Illuminati Party reject any unthinkingly trendy denial or politically expedient downplaying of the well-established fact that the N.W.O. Globalists, or “Illuminati,” do in fact occupy key offices and abuse their clout to promote the goals of their élitist cabal.
– Because of their powerful members they can, and in fact do, silence and manipulate the American People.
– To indict, counter, undermine, block and expose these tactics of theirs constitutes our mission, and our lifeblood.

– If sound government is to be restored, all the New World Order Globalists must have all their cheaply-bought authority pulled: “We must remove the weeds from public office: they are choking Freedom and the Tree of Liberty” (Daniel J Leach, Jr.).
– The Anti-Illuminati Party identifies the N.W.O. as “an élitist association that exploits the commoner and violates the United States Republic’s first principles.”
– We deem it imperative that every United Statesman must organize to indict, counter, undermine, block and expose these High Traitors.
– We the members of the Anti-Illuminati Party resolve to support no N.W.O. globalist or Illuminist/Illuminatus in any way or sense.
– Under the “Anti-Illuminati Party” banner we aim to unite those who are too often disenfranchised by the current political climate.

– We of the Anti-Illuminati Party are dedicated to revitalizing our communities by speaking Truth, Hope, Goodwill, Unity and Peace.
– We shall work tirelessly to cultivate “Life, Liberty and the pursuit of Happiness” wherever and whenever we can.
– To best find and implement solutions to this end, we place a high value on Party-wide collaboration.
– We shall operate lawfully and respectfully in all matters at all times.
– We shall not profit from our endeavors.
– We believe in “Liberty and Justice for all.”
– With the help of God—that is of supreme Love, Light, Spirit and Truth—we shall not waver in this mission to collaborate with all citizens toward the construction of a better community.

 John Fitzgerald “Jack” Kennedy speech also  (May 29, 1917 — November 22, 1963)


This section copied from: Wikipedia 

False flag (or black flag) describes covert military or paramilitary operations designed to deceive in such a way that the operations appear as though they are being carried out by entities, groups or nations other than those who actually planned and executed them. Operations carried out during peace-time by civilian organizations, as well as covert government agencies, may by extension be called false flag operations if they seek to hide the real organization behind an operation. Geraint Hughes uses the term to refer to those acts carried out by “military or security force personnel, which are then blamed on terrorists.”[1]

In its most modern usage, the term may also refer to those events which governments are cognizant of and able to stop but choose to allow to happen (or “stand down”), as a strategy to entangle or prepare the nation for war. Furthermore, the term “false flag terrorism” may even be used in those instances when violence is carried out by groups or organizations which, whether they know it or not, are being supported or controlled by the “victim” nation. deHaven-Smith argues that the terminology has become looser in recent years due to the increasingly complex levels of “duplicity” and “international intrigue” between states.[2] Some argue that false flags are methods used by deep states as a form of deep politics.[3]

The name “false flag” has its origins in naval warfare where the use of a flag other than the belligerent’s true battle flag as a ruse de guerre, before engaging the enemy, has long been acceptable.[4] Such operations are also acceptable in certain circumstances in land warfare, to deceive enemies in similar ways providing that the deception is not perfidious and all such deceptions are discarded before opening fire upon the enemy.


Alternative Currency System Secret Of Who Created Bitcoin Is Of Great Concern Truthers Want To Know Is Bitcoin A NWO Operation?

The bitcoin logo
The bitcoin logo (Photo credit: Wikipedia)

 

Alternative Currencies is something I have been interested in for awhile now that I have been enlightened about the Federal Reserve system and the IMF or International Monetary Fund run by private corporations who want to run the world and control the New World Order.  I’m working on putting together a page or categories for the best source for Alternative currency‘s or systems of Trade and Barter.  AntiNWOParty is also trying to through our hat in the ring at some point.  We are trying to create our own currency and Trade system for our community.  The Question I and I’m sure many other Truthers want to know is Bitcoin a NWO operation?   Bitcoin is an experimental new digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer technology to operate with no central authority: managing transactions and issuing money are carried out collectively by the network. Bitcoin is also the name of the open source software which enables the use of this currency. The software is a community-driven open source project, released under the MIT license.  Satoshi Nakamoto is the pseudonymous person or group of people who designed and created the original Bitcoin software, currently known as Bitcoin-Qt.  His involvement in the original Bitcoin software does not appear to extend past mid-2010.
A global currency the exact thing the New World Orders  “end game”.  Despite what we see here about Mr. Nakamoto’s views on central banking (https://en.bitcoin.it/wiki/Satoshi_Nakamoto), what if he (it?) is really using bitcoin as a test bed for a global currency? With global concerns of hyper-inflation and currency wars, it makes sense to me for something like bitcoin to become successful. What if talk of the “Sheeple” getting “chipped” just means their Bitcoin private addresses will be implanted so they can’t be stolen?

 

Max keiser says in an interview that there will only be 21 million bitcoins ever made and says nothing at all about them being divisible, it comes off as him trying to mislead people who know nothing about bitcoins to think these will be a rare item adding to the peoples desire to join in ? How can you have a Hard limit of about 21 million Bitcoins and have a global currency with     world population total number of living humans on Earth. As of today, it is estimated to number 7.073 billion by the United States Census Bureau (USCB).[1] The USCB estimates that the world population exceeded 7 billion on March 12, 2012.[2] According to a separate estimate by the United Nations Population Fund, it reached this milestone on October 31, 2011.[3][4][5] 

 

Peter Van Laer

 

One Bitcoin is divisible down to eight decimal places. There are really 2,099,999,997,690,000 (just over 2 quadrillion) maximum possible atomic units in the bitcoin design.

The value of “1 BTC” represents 100,000,000 of these. In other words, each is divisible by up to 10^8.

As the value of the unit of 1 BTC grows too large to be useful for day to day transactions, people can start dealing in smaller units, such as milli-bitcoins (mBTC) or micro-bitcoins (μBTC).

 

 

This section copied from socialcompare.com

 

Alternative currency is a term that refers to any currency used as an alternative to the dominant national or multinational currency systems (usually referred to as national or fiat money). Alternative currencies can be created by an individual, corporation, or organization, they can be created by national, state, or local governments, or they can arise naturally as people begin to use a certain commodity as a currency.

 

Mutual credit is a form of alternative currency, and thus any form of lending that does not go through the banking system can be considered a form of alternative currency. When used in combination with or when designed to work in combination with national or multinational fiat currencies they can be referred to as complementary currency. Most complementary currencies are also local currencies and are limited to a certain region.

 

Barters are another type of alternative currency. These are actually exchange systems, which only trade items; thus without the use of any currency whatsoever. Finally, LETS is a special form of barter which trades points for items. One point stands for one man-hour of work.

 

Often there are issues related to paying tax. Some alternative currencies are considered tax-exempt, but most of them are fully taxed as if they were national currency, with the caveat that the tax must be paid in the national currency. The legality and tax-status of alternative currencies varies widely from country to country; some systems in use in some countries would be illegal in others.

 

List of alternative currencies

 

 

The Rise and Fall of Bitcoin

 

 

 

Could 2012 NLE Cyber Attack DRILL be the Next 911 False Flag, Will This Years Drill Go Live?

By:Daniel J Leach

Reblogged: http://theintelhub.com

NLE 2012: Will This Years Drill Go Live and Result in a False Flag Cyber Attack?

The Intel Hub
By Shepard Ambellas and Alex Thomas
April 4, 2012

The summer of 2012 is fast approaching. As it inches closer, we will start to see a major increase in US and foreign troop movements as well as military equipment movements throughout the CONUS (Continental United States).

While many of the upcoming sightings may well be normal operations as the military does like to do training in the summer, the fact is that parts of our own military, along with foreign and UN troops, are actively planning to take on the American people.

National Level Exercise drills have been in effect for years now and have been covered by many alternative news sources, including The Intel Hub through our yearly Operation Overwatch which we use to gain intel and tips from the public in order to relay them to our readers.

Over the years many people have worried about the numerous National Level Preparedness drills and, in most cases, for good reason.

In 2011, the NLE focused around an earthquake on the New Madrid Fault Zone and the year before resulted in 70 thousand people being evacuated from a Texas city after a fertilizer fire.

Interestingly enough, this years FEMA national preparedness drill is focusing on the threat of a major cyber attack on America’s infrastructure.

The last year has seen dozens of cyber attacks on government websites as well as government propagandists pushing the fear of a cyber attack on the populace. Now we have the Department of Homeland Security making cyber security the main component of their annual preparedness drill.

Although only a small amount of information has been released on NLE2012, we can see from FEMA’s own website what it primary consists of.

FEMA’s website released the following PDF;

National Level Exercise (NLE) 2012Continental

National Level Exercise (NLE) 2012 is part of a series of congressionally mandated preparedness exercises designed to educate and prepare participants for potential catastrophic events.

The NLE 2012 process will examine the nation’s ability to coordinate and implement prevention, preparedness, response and recovery plans and capabilities pertaining to a significant cyber event or a series of events.

NLE 2012 will examine national response plans and procedures, including the National Response Framework (NRF), NRF Cyber Incident Annex, Interim National Cyber Incident Response Plan (NCIRP) and the International Strategy for Cyberspace.

Unique to NLE 2012 will be an emphasis on the shared responsibility among all levels of government, the private sector and the international community to secure cyberspace and respond together to a significant cyber incident.

Obsidian Analysisthe company heading up NLE12 for the private sector, states on their website:

NLE 2012 will comprise four major exercises, including a capstone event. These exercises will share common scenario elements, planning efforts and governance structure.

Participation in each exercise will be determined respectively, but the NLE 2012 process includes the Executive Office of the President; federal, state, local, tribal and territorial department and agency officials and emergency operations elements, nongovernmental and private sector organizations and international partners. These four major exercises include:

Information Exchange: This discussion-based exercise is designed to evaluate the sharing of cyber related information among the intelligence community, law enforcement, federal, state, tribal and local governments, the private sector and international partners, as appropriate

Cyber Incident Management/Virtual Effects: This exercise will examine the coordination and communication processes between public and private stakeholders in response to a significant cyber incident. This will include examining challenges related to managing a cyber event with national security implications.

NLE Capstone/Cyber Physical Effects: This functional exercise will examine challenges related to managing a cyber event with physical consequences and national security implications. This will include addressing cyber and physical interdependencies and impacts while coordinating a Whole Community level cyber and physical response.

Continuity Exercise/Eagle Horizon: This operations-based exercise will evaluate the continuity capability of federal departments and agencies. A component will include a nationwide exercise examining communications capability of the homeland security enterprise under conditions in which critical systems have been degraded or lost.

In addition to the major exercises, the NLE 2012 process will include senior level exercises, building-block events (i.e., seminars, tabletop exercises, and training) and routine exercise planning conferences.

As more information is released on these upcoming national preparedness drills, The Intel Hub will bring them to our readers attention.

Don’t Trash the American Flag! How to Retire a U.S. Flag

On Location in Rochester NY, today I found a American Flag in the trash on my way home tonight and I saved it from disgrace and took it home for a proper retirement ceremony. As I was getting out of the car with Cathy and the baby to go inside for the night, a old lady said “that she had followed me home to ask what I was doing with the flag that she saw me take out of the trash?” Eve I said to Eve the above statement! Eve asked if I wanted two more Flags that she had rescued from the trash a few weeks earlier. She said that I was sent from God and that she was meant to meetup with me this day! She gave me the flags thanked me and said her name was Eve and that her father died in World War 2 her brother fought in Vietnam and that her sister was a nurse in the US Army.  She said she was proud to see me do this.  I felt her pain and saw it in her face I could see she felt like crying for her loss of her father and brother
This is what I could do to honer our Country and those who fought and died for us today! For the Grandfather I never met who came home so messed up with PTSD and never was the same man he did that for you and I. Now I’m thinking about doing a Proper Flag retirement ceremony on the 4th of July this summer! How strange is life! God is good!
 Retire a U.S. Flag
National Flag Foundation recommends the following as the proper ceremonies for retiring and destroying a worn Flag.
    • This ceremony should be conducted at a private, non-public location.
    • Only one Flag, representing all those to be destroyed, should be used in the ceremony.
    • Two color guards should be used at evening retreat, one for the Flag currently in use and a special color guard for the Flag to be permanently retired.
    • Just before sunset, the Flag that has been flying all day is retired in the normal, ceremonial procedure for the group or site.
    • The color guard responsible for the Flag receiving the final tribute moves front and center. The leader should present this color guard with the Flag that has been selected for its final tribute and subsequent destruction. The leader then should instruct the color guard to “hoist the colors”.
    • When the Flag has been secured at the top of the pole, the leader comments: “This Flag has served its nation long and well. It has worn to a condition to which it should no longer be used to represent the nation. This Flag represents all of the Flags collected and being retired from service today. We honor them all as we salute one Flag.”
    • The leader then calls the group to attention, orders a salute, leads the entire group in the “Pledge of Allegiance” and orders the Flag retired by the color guard.
    • Slowly and ceremoniously, the flag is lowered, then respectfully folded in the customary triangle. The Flag is delivered to the leader and then the group is dismissed.
    • This concludes the Ceremony of Final Tribute.
  1. 2

    Ceremonial Burning of the Flag

    • This ceremony should be conducted at a private, non-public location.
    • The burning of a Flag should take place at a campfire in a ceremony separate from the Ceremony of Final Tribute. The fire must be sizable (preferably having burnt down to a bed of red hot coals to avoid having bits of the Flag being carried off by a roaring fire), yet be of sufficient intensity to ensure complete burning.
    • Before the ceremony begins, the color guard assigned to the Flag opens up its tri-corner fold and then refolds it in a coffin-shaped rectangle.
    • All assemble around the fire. The leader calls the group to attention.
    • The color guard comes forward and places the Flag on the fire.
    • All briskly salute.
    • After the salute, but while still at attention, the leader should conduct a respectful educational program as the Flag burns: e.g. singing of “God Bless America”; offering an inspiring message of the Flag’s meaning followed by the “Pledge of Allegiance”; performing a reading about the Flag; reciting the “American’s Creed”; etc.
    • When the Flag is consumed, those assembled, with the exception of a leader and the color guard, should be dismissed. They should be led out in single file and in silence.
    • The leader and color guard should remain to ensure that the Flag is completely consumed, and to burn additional Flags, if any.
    • The fire should then be safely extinguished.

Create a website or blog at WordPress.com

Up ↑