How to make the US Post Office prosperous and relevant in the 21 century using the One-Time Pad algorithm!

Every Tuesday I meet with a group of Patriots from the Illumination Society at the Liberty Restaurant in Rochester NY to do a round table radio broadcast discussing topics about Geo politics, religion, Currant events and anything that has to do with Truth Liberty and Justice for all.  We not only talk about problems but as a group we also work on finding solutions to the world problems.  every week we have some of the brightest minds join us at the round table live Broadcast. http://www.blogtalkradio.com/anti-illuminati-party

The Illumination Society  presents a FREE Movie Night every month showing films that we feel are important for the time in which we live. Films that dig deep into subjects like – The World History – UFO – The New World Order – Spirituality – Prophecy – Science – What’s Happening To Our Food – Agenda 21 – Vaccines and many other subjects.

Our Free Movie Night has been well received by people from all walks of life. People concerned with the things happening in our world today. People that want to know what is happening all around us and what we can do to stand against those that wish to rob us of our freedoms and our God-given rights. Come out and learn about subjects you may or may not be aware of. We hope that our Movie Nights, and our following Q&A time will shed some light on these subjects, and help you to see America’s role in past, present and future history.

We will be presenting the following films on the following dates:
– See more at: https://www.eventbrite.com/e/movie-night-tickets-12609803261

You can also join us in our round table discussion and suggest topics you would like us to discus.

Anti New World Order Party ☼ Global Group

https://www.facebook.com/groups/AntiNewWorldOrderPartyGlobal/

Now to the main point of this blog post today,  We will also have a follow-up to this post.

Original posted on FutureBeacon.com

 

Communication Privacy
by
James Adrian

Introduction

      Many individuals, businesses and other organizations have a legitimate and lawful need to keep some of their information confidential or even absolutely secret from competitors, the press and others. Because email has become vital to timely communication and because email is not secure, encryption is often necessary.

      New employees of large companies are often encouraged to live near the company’s offices. In this kind of setting, privacy for technical and marketing information is convenient. Small organizations such as law offices, medical clinics, Internet businesses, and many others may not find the expertise they need in their local area. These small organizations, of which there are many, need secure communication to avoid the cost of face-to-face meetings. Lacking the funds for routine flights between cities, these organizations are very dependent on the electronic communication of data and ideas. Private medical information, schematic drawings, program source code, marketing plans, and innumerable other types of documents are involved. In such circumstances, strong encryption is needed.

      In many countries, the post office has the legal authority and obligation to enforce privacy for the postal mail. If these postal services were to offer secure email for a reasonable price, small companies would not be at such a disadvantage relative to larger companies.

      Established by the U. S. Constitution, Article I, Section 8, Clause 7, the United States Postal Service is authorized “To establish post offices and post roads. It also has a long history of adding services as needed, such as commemorative stamps, rural delivery, airmail, one-day delivery, zip codes, self-adhesive stamps, public Internet site, “Forever” stamps, and an iPhone app. Secure communication would add to its revenue (which would help ameliorate its recent shortfalls) and set a good example.

Technical Matters

      To create a secure message, the encryption algorithm must used secret information that cannot be discovered by unauthorized parties. If the encryption relies only on complexity or computational difficulty without involving secret information, the intended message can be discovered by third parties. To third parties, some aspect of the transmission must be unknowable.

      Within encryption technology, the embodiment of information unknowable to third parties often takes the form of secret random numbers. These random numbers are used to encrypt messages in such a way as to make decryption of a message impossible without access to those same random numbers.

      Many have said that what one person can encrypt, another can decrypt. This is a myth. TheOne-Time Pad algorithm was proved to be absolutely secure in the writings of Claude Shannon. See “Claude Elwood Shannon – Collected Papers” edited by N. J. A. Sloane and Aaron D. Wyner. In addition to being immune from hacking, this algorithm becomes more convenient as memory devices increase their capacity.

      Claude Shannon proved that any absolutely secure encryption algorithm must posses these characteristics:

      1. The encryption keys must be random numbers of uniform distribution.

      2. The keys must be shared in absolute secrecy by the sender and receiver.

      3. Any key encrypting a message must be as at least as long as that message.

      4. Any key used to encrypt a message must not be reused.

      The one-time pad is a famous encryption algorithm having all of these characteristics. By using a random key comprised of random numbers to encrypt a message (the plain text) with the XOR logical operation, the transmitted result (the ciphertext) is rendered as random as the key. The collection of secret keys is called the pad. Keys are of the same length as that of the messages they encrypt. They are erased immediately after their use. The result is that the actual message is as likely as any other message from the point of view of those attempting to decrypt the message without knowing the secret random numbers.

      Optionally, encrypted messages can be made to appear to be ordinary messages of a different type, such as pictures or sound files or text messages that contain information that is very different form that in the plain text. This process is called Steganography.

Services

      The most important service facilitating secure communication is the shipping of media containing random numbers. The production of truly random numbers for algorithms that encrypt messages by means of random keys is the part of the process most challenging and inconvenient for the customer. The principle service of USPS would be to place random numbers on appropriate media and ship copies to addresses designated by the customer. One shipment might serve the customer for only a few messages or for years worth of messages, depending on the number of random numbers shipped.

      Options may include picking up shipments from the local post office, receiving them in the mailbox, or receiving them at the recipient’s door (possibly by special delivery or with a return receipt).

Criminality

      Measures which distinguish legitimate from nefarious use of encryption services need not be publicly discussed.

Contact

      Please feel free to make suggestions by writing to jim@futurebeacon.com.

All about our Herbalife Shop online Product Catalog Business Opportunity Weight Management Outer Nutrition About HerbalifeEnergy & Fitness

Hnn_logo

Herbalife healthy nutrition

We have partnered with herbalife.com 
they are a global nutrition company that has
helped people pursue healthy, active lives
since 1980. Thier products are available
exclusively through Herbalife Members
and independent Distributors in more
than 90 countries.
Thier Products
Our protein shakes and snacks,
vitamins and dietary supplements,
energy and fitness drinks, skin and hair
care products, combined with healthy
eating and exercise, can help you lead a
healthy, active life.
They also have a Proven Business Opportunity
You can earn part-time income or pursue a
full-time business opportunity as an Herbalife
Independent Distributor.

Community Involvement
We make a difference by providing good
nutrition to children through our Herbalife
Family Foundation Casa Herbalife programs.
Herbalife Members, independent Distributors
and employees play an active role in
communities around the world.
Bullet_roundPlease check out our products and know that everything you purchase contributes to our cause for Truth, Liberty and Justice for all.

Bullet_round
Bullet_round
Bullet_round Formula 1 + PDM On The Go
Bullet_round Formula 1 Express Meal Bar
Bullet_round Herbal Aloe Gift Set
Bullet_round Herbalife 24 Prolong
Bullet_round Herbalife 24 Rebuild Strength
Bullet_round Herbalife SKIN Firming Eye Gel
Bullet_round 21-Day Herbal Cleansing Program
Bullet_round New Ocular Defense Formula
Bullet_round Active Fiber Complex
Bullet_round Advanced
Bullet_round Aminogen
Bullet_round Best Defense™
Bullet_round Beverage Mix – Canister
Bullet_round Body Buffing Scrub
Bullet_round Body Contouring Creme
Bullet_round Cell-U-Loss
Bullet_round CoQ10 Plus Softgel Dietary Supplement
Bullet_round Core Complex with CoQ10 Plus
Bullet_round Deluxe Shaker Cup
Bullet_round Digestive Health Program
Bullet_round F2 Multivitamins
Bullet_round Florafiber
Bullet_round Formula 1 Allergen Free Nutritional Shake Mix
Bullet_round Formula 1 Instant Healthy Meal
Bullet_round Formula 1 Nutritional Shake Mix
Bullet_round Formula 1 with non-GM Ingredients
Bullet_round Formula 2 Multivitamin Complex
Bullet_round Formula 3 Cell Activator
Bullet_round Garden 7®
Bullet_round H3O Fitness Drink
Bullet_round Hand Sanitizer
Bullet_round Herbal Aloe Bath and Body Bar
Bullet_round Herbal Aloe Bath and Body Wash
Bullet_round Herbal Aloe Concentrate
Bullet_round Herbal Aloe Concentrate – Mango
Bullet_round Herbal Aloe Hand and Body Cream
Bullet_round Herbal Aloe Powder
Bullet_round Herbal Aloe Soothing Gel
Bullet_round Herbal Aloe Strengthening Conditioner
Bullet_round Herbal Aloe Strengthening Conditioner
Bullet_round Herbal Aloe Strengthening Shampoo
Bullet_round Herbal Tea Concentrate
Bullet_round Herbalife 24 Formula 1 Sport
Bullet_round Herbalife 24 Hydrate
Bullet_round Herbalife 24 Prepare
Bullet_round Herbalife 24 Rebuild Endurance
Bullet_round Herbalife 24 Restore
Bullet_round Herbalife 24 Sports Bottle
Bullet_round Herbalife Member Pack
Bullet_round Herbalife SKIN 7-Day Results Kit
Bullet_round Herbalife SKIN Advanced Program For Normal to Dry Skin
Bullet_round Herbalife SKIN Advanced Program For Normal to Oily Skin
Bullet_round Herbalife SKIN Basic Program – Normal to Dry Skin
Bullet_round Herbalife SKIN Basic Program – Normal to Oily Skin
Bullet_round Herbalife SKIN Daily Glow Moisturizer
Bullet_round Herbalife SKIN Energizing Herbal Toner
Bullet_round Herbalife SKIN Hydrating Eye Cream
Bullet_round Herbalife SKIN Instant Reveal Berry Scrub
Bullet_round Herbalife SKIN Line Minimizing Serum
Bullet_round Herbalife SKIN Polishing Citrus Cleanser
Bullet_round Herbalife SKIN Purifying Mint Clay Mask
Bullet_round Herbalife SKIN Replenishing Night Cream
Bullet_round Herbalife SKIN Soothing Aloe Cleanser
Bullet_round Herbalife SKIN Ultimate Program For Normal to Dry Skin
Bullet_round Herbalife SKIN Ultimate Program For Normal to Oily Skin
Bullet_round Herbalife SKIN™ Protective Moisturizer
Bullet_round Herbalife24FIT DVD Set
Bullet_round Herbalifeline®
Bullet_round Joint Support Advanced
Bullet_round Kids Shakes
Bullet_round Kindermins
Bullet_round Liftoff®
Bullet_round Male Factor 1000®
Bullet_round Man
Bullet_round Mega Garlic Plus
Bullet_round Mini Herbalife Member Pack
Bullet_round MultiVites
Bullet_round N-R-G Nature’s Raw Guarana Tablets
Bullet_round N-R-G Nature’s Raw Guarana Tea
Bullet_round Niteworks® Powder Mix
Bullet_round Ocular Defense Formula
Bullet_round Personalized Protein Powder
Bullet_round Power Mixer
Bullet_round Prelox®† Blue
Bullet_round Product Sample Pack
Bullet_round Prolessa Duo
Bullet_round Protein Bars
Bullet_round Protein Bars – Deluxe
Bullet_round Protein Drink Mix
Bullet_round QuickStart
Bullet_round Radiant C SPF 15
Bullet_round Radiant C® Daily Skin Booster
Bullet_round Radiant C® Face Quencher
Bullet_round Ready Herbal Aloe
Bullet_round Rebuild Strength
Bullet_round Relax Now
Bullet_round Roasted Soy Nuts
Bullet_round RoseGuard
Bullet_round Schizandra Plus
Bullet_round Shaker Cup
Bullet_round Skin Activator® Day Lotion SPF 15
Bullet_round Sleep Now
Bullet_round Snack Defense
Bullet_round Soup Mix
Bullet_round Specialized Internal Program
Bullet_round Sports Water Bottle
Bullet_round Stainless Steel Travel Mug
Bullet_round Strengthening Shampoo
Bullet_round Tang Kuei Plus
Bullet_round Test Product — Members Only
Bullet_round Thermo-Bond Fiber Tablets
Bullet_round Total Control
Bullet_round Tri-Shield®
Bullet_round Triple Berry Complex
Bullet_round Ultimate
Bullet_round Ultimate Prostate Formula
Bullet_round Weight Loss Challenge Product Sample Pack
Bullet_round Weight Loss Starter Kit
Bullet_round Woman
Bullet_round Woman’s Choice
Bullet_round Xtra-Cal® Advanced

All about Cathy O’Brien: Ex-Illuminati NWO Mind Control Victim

Warning: Adults only, if you’re easily offended don’t watch
Read the book here: http://static.everdot.org/ebooks/engl…

For Reasons of National Security
(Intro – Mark Phillips. Cathy O’Brien – 0:36:50)
The Granada Forum, October 31, 1996 

Cathy O’Brien
Born 4 December 1957
Muskegon, Michigan
Nationality American
Occupation Writer, speaker
Known for Conspiracy theorist, statements of victimization by Project Monarch
Spouse(s) Mark Phillips
Children Kelly O’Brien
Parents Earl M. O’Brien

Carol O’Brien (née Tanis)

Website
http://trance-formation.com/

Contents

  

On May 7, 1966 a 9 year old child named Cathy O’Brien was subjected to an occult ritual named “The Rite to Remain Silent”. This is her own very shocking and eye-opening life story about her experience as a CIA MK-Ultra Whitehouse Pentagon level trauma-based Mind Control slave. She speaks out to expose those who abused, who go right up to presidents and congressmen and women and to give voice to the many mind control victims out there who can’t think to speak out.

O’Brien claims to have been abused since she was a toddler by her own family. Forced to partake in satanic sadomasochistic child pornography movies produced for Gerald Ford, she was eventually sold to the CIA, which was looking for traumatized children for their mind-control program … U.S. Presidents Ford, Reagan, Bush and Bill Clinton; Canadian Prime Ministers Pierre Trudeau and Brian Mulroney; Mexican President Miguel de la Madrid; Haitian dictator Baby Doc Duvalier; Panamanian President Manuel Noriega; and King Fahd of Saudi Arabia all sexually brutalized her. She recounts in graphic detail how the elder George Bush raped her thirteen year old daughter and how she was forced to have oral sex with Illuminati witch Hillary Clinton … While being sodomized, whipped, bound and raped, O’Brien overheard the globalist elite planning a military coup in the United States and conspiring to usher in the satanic New World Order

The Q&A (question and answers) starts at 1:35:00

This section Copied from:http://en.wikipedia.org/wiki/Cathy_O’Brien

Cathleen Ann O’Brien (born December 4, 1957, Muskegon, Michigan[1]) is an American who says she is a victim of a mind control government project named Project Monarch, which she said was part of the CIA’s Project MKULTRA forbehavioral engineering of humans (mind control).[2][3][4][5][6] O’Brien made these assertions in Trance Formation of America (1995) and Access Denied: For Reasons of National Security (2004) which she co-authored with her husband Mark Phillips.[6]

Assertions[edit]

The memories that O’Brien has asserted she possesses were retrieved through the use of hypnosis. The specific program which she claimed was responsible for herdissociative identity disorder, Project Monarch, is not mentioned in reviews of MKULTRA, its alleged parent program. Because most MKULTRA records were deliberately destroyed in 1973 by order of then CIA Director Richard Helms, it has been difficult, if not impossible, for investigators to gain a complete understanding of the more than 150 individually funded research sub-projects sponsored by MKULTRA and related CIA programs.[7][8] In 1977, Richard Helms was suspended by the US Congress for lying about the US government’s anti-government activities abroad and illegal surveillance domestically.[9]

O’Brien also states that she has a recollection of child abuse — of her and her daughter — by international pedophile rings, drug barons and satanists, as part of asex slave aspect to her “trauma based mind control programming.” Individuals from United StatesCanadianMexican and Saudi Arabian government officials to stars of the Country and Western music scene are among those she accuses of these crimes. According to scholar Michael Barkun, investigations into the story produced no credible evidence and numerous inconsistencies.[5]

Project Monarch[edit]

O’Brien says she was recruited against her will by the CIA and her abusive father as a child, through a network of child pornographers he was involved with, and forced to participate in a mind control program named Project Monarch, which is said to be a subsection of Project MKULTRA and Project ARTICHOKE.[2][3][4][5]

Multiple personality[edit]

O’Brien says that she has developed dissociative identity disorder (previously misnomered as multiple personality disorder) and that she has no memory of some of her activities. She also says that she has a photographic recall of the events that she suffered whilst her alternate personalities were in control.[6]

Criticisms of O’Brien[edit]

Swedish scholar Mattias Gardell states that O’Brien’s assertions are almost entirely unsupported by any evidence outside her testimony or the similarly unverified testimony of others.[10] Michael Barkun states that “scholarly and journalistic treatments of MK-ULTRA make no mention of a Project Monarch”.[5]

Her stories have entered the conspiracy culture, linking assertions of satanic ritual abuse with MKUltra.[11] Mark Dice was skeptical of her assertions, but also commented, “there are very real victims of such programs” and “it is possible that a victim would write a book about them and have nobody believe her.”[12]

Other videos on Mind Control:

Illuminati & Pre-9/11 Subliminals and Symbolism in Movies (Re-edit)
http://www.youtube.com/watch?v=r4mRTc…

Britney Spears Illuminati Mind Control Victim
https://www.youtube.com/watch?v=80c_b…

Bill Clinton under mind control
https://www.youtube.com/watch?v=6DUmb…

9/11 Subliminals: GCSE Exam Papers
http://www.youtube.com/watch?v=rhnGNS…

RFID Mind Control
http://www.youtube.com/watch?v=PPsFXh…

Cathy O’Brien (with full index)
http://www.youtube.com/watch?v=2S3fla…

Footnotes[edit]

  1. Jump up^ O’Brien, Cathy. “Trance Formation Of America”. Retrieved 17 May 2012.
  2. Jump up to:a b Versluis, A (2006). The new inquisitions: heretic-hunting and the intellectual origins of modern totalitarianism. Oxford [Oxfordshire]: Oxford University Press. p. 173.ISBN 0-19-530637-6. Retrieved 2008-10-20.
  3. Jump up to:a b de Young, M (2004). The day care ritual abuse moral panic. Jefferson, N.C: McFarland. p. 235. ISBN 0-7864-1830-3. Retrieved 2008-10-20.
  4. Jump up to:a b Toropov B (2001). The complete idiot’s guide to urban legends. Indianapolis, Ind: Alpha Books. p. 221. ISBN 0-02-864007-1. Retrieved 2008-10-20.
  5. Jump up to:a b c d Barkun, Michael (2003). A culture of conspiracy: apocalyptic visions in contemporary America. Berkeley: University of California Press. p. 76. ISBN 0-520-23805-2. Retrieved 2008-10-20.
  6. Jump up to:a b c Phillips, Mark (1995). TranceFormation of America (pdf). Reality Marketing, Incorporated. ISBN 0-9660165-4-8. Retrieved 2008-10-20.
  7. Jump up^ Walter H. Bowart (January 1971), Operation Mind Control, Dell Publishing
  8. Jump up^ John D. Marks (1979), The Search for the ‘Manchurian Candidate’: The CIA and Mind Control: The Secret History of the Behavioral Sciences, Penguin Books Ltd., retrieved 2013-10-27
  9. Jump up^ Christopher Marquis. “Richard Helms, Ex-C.I.A. Chief, Dies at 89”. New York Times. Retrieved 2013-10-27.
  10. Jump up^ Gardell M (2003). Gods of the blood: the pagan revival and white separatism. Durham, N.C: Duke University Press. ISBN 0-8223-3071-7. Retrieved 2008-10-20.
  11. Jump up^ Knight P (2003). Conspiracy Theories in American History: An Encyclopedia. Santa Barbara, Calif: ABC-CLIO. pp. 487ISBN 1-57607-812-4.
  12. Jump up^ Mark Dice“Cathy O’Brien’s Claims of Being an MK-ULTRA victim”. Retrieved 2013-07-31.

External links[edit]

Cell Phones WiIl Hurt you! (Everywhere) Privacy you no longer have!

English: Mobile phone evolution Русский: Эволю...
English: Mobile phone evolution Русский: Эволюция мобильных телефонов (Photo credit: Wikipedia)

 

After reviewing just the basic programs that you need to operate a smart phone…when you go to applications, for example and look at google mail..it states they have right to go into your mail, look at your documents and alter (even if it is confidential) , change your contacts or even delete contacts, have access to your text message and pictures, they can even use your text and phone to call and send messages. So with that said…they have access to your mail by default because you have to use that program on your phone to be activated for most functions on your phone to work properly.
If you go through all the programs you have on your phone before adding more apps, they all say pretty much the same thing. But look at the big picture…where are these phone made (China, Japan, Korea)! Government employees are using these phones just as much as anyone else..what can be worse then countries that are making these phones have access to sensitive material including personal information that can be of use in sensitive ways including…where they are, their pictures, their contacts and their email documents.
Now your family members are adding app after app with location settings needing to be active on the devices for them to be of service. With that said there is apps and even programs that someone can see all cell phones in that area so a possible predator can single out possible victims. What about some family members who take pictures of their drivers license, SSN and other highly personal information for identity theft to be easy..not alone..logging into bank accounts..in which you are allowing the manufacture to have access to with your passwords and all. Also think about this, these apps also are being allowed to turn on your video camand recorder on your cell at any given time to listen and look at your surroundings. They do not have to inform you when they do, what they alter or delete or whom they give your information to. Also keep in mind that a lot of the apps are created by criminals that are making it legal to commit crimes against you by just getting their free app.So the matter of this news story, if we buy these cell phones from a company ..just say Sprint, shouldn’t they be liability for use licensing with the apps for the purpose of the basic operation of the phone and not carried over to us making ourselves liable for any misuse of our privacy in which will will not know? Should the consumer buying the cell phone have licensing right to know when an invasion by the app provider went into the phone and made changes?

For another quick check of what your allowing your cell phone maker to do to you…go to settings, then look at what system your phone uses..Android system for example, click that and read of the privacy you no longer have!

Let me not to forget to mention the negative heath effects Cell phones can have on your body because of the radiation-emitting  device inside of cell phones that allow it to transmit the communication signals

By Dr. Mercola

If you’re an avid cell phone user who refuses to believe that holding this radiation-emitting device next to your head poses a potential health risk, take note…

Italy‘s supreme court has ruled that a man’s brain tumor is, in fact, linked to his heavy cell phone use.

Heavy Cell Phone Use Caused Business Exec’s Tumor

The court’s assessment included studies by Professor Lennart Hardell of Sweden, stating they had more cases, involved long-term use and were independent (as opposed to Interphone’s industry funding). Hardell has found that those who begin using cell phones heavily as teenagers have 4 to 5 times more brain cancer as young adults!

Just 50 Minutes of Cell Phone Use Alters Your Brain

Even if you don’t use a cell phone for hours each day, research by leading brain imaging researcher Nora D. Volkow, MD of the National Institutes of Health, revealed that after just 50 minutes of cell phone exposure, the emitted radiation increases brain cell activity in the region closest to the cell phone antenna.1 The exact health effects of that increased brain activity are as of yet unknown, but the study effectively debunked the myth in U.S. government research circles that cell phone radiation at non-thermal levels is incapable of causing biological change.

So keep using your cell phone if you don’t give a crap about your health and the Antichrist NWO Global Government spying on you.  And when your sitting in a NDDA Death Camp don’t call me to get you out and fix your brain. I tried to tell you but you didn’t listen you brainwashed boot licking Zombie’s

http://www.foodconsumer.org/newsite/Non-food/Environment/cell_phone_tumor_court_ruling_1107120716.html

US Government and Stanley Inc behind Muslim Video that lead to the murder of a US Ambassador and caused widespread rioting throughout the world.

Once again the Public intelligence analysts have broken wide open the False Flag operation that took place around the world on 09/11/2012 Blamed on a Youtube “Film” Christopher Stevens was ((Not)) killed because of the Innocence of Muslim Movie.  It turns out that  CGI and Stanley Incorporated AKA “NPN” NewsPoliticsNow3 who the US Government uses as a contractors for Advanced engineeringBusiness process managementCommunicationsEnterprise integrationFederal cybersecurityOperational logisticsSystems engineering, and Training put out a altered Version of the original Youtube Movie that the Government says lead to the murder of a US Ambassador and caused widespread rioting throughout the world.  The “Original Video” called The Real Life Of Mohammad posted on July 1st 2012 on Sam Bacile’s YT Channel.

Stanley, now a wholly-owned subsidiary of CGI Federal Inc., provides services to the U.S. federal civilian, defense and intelligence agencies. The combined portfolio of services and solutions enable us to serve as a full-service provider for U.S. federal clients’ mission-essential needs at every stage of program, product and business lifecycle.

CGI’s acquisition of Stanley is part of a plan to profitably double the company’s in three to five years through a combination of acquisitions and organic growth. As a result of this acquisition, CGI joins the ranks of U.S. federal IT contractors with more than                    $1 billion in revenue.

 

 

“The Third World War must be fomented by taking advantage of the differences caused by the “agentur” of the “Illuminati” between the political Zionists and the leaders of Islamic World. The war must be conducted in such a way that Islam (the Moslem Arabic World) and political Zionism (the State of Israel) mutually destroy each other. Meanwhile the other nations, once more divided on this issue will be constrained to fight to the point of complete physical, moral, spiritual and economical exhaustionWe shall unleash the Nihilists and the atheists, and we shall provoke a formidable social cataclysm which in all its horror will show clearly to the nations the effect of absolute atheism, origin of savagery and of the most bloody turmoil. Then everywhere, the citizens, obliged to defend themselves against the world minority of revolutionaries, will exterminate those destroyers of civilization, and the multitude, disillusioned with Christianity, whose deistic spirits will from that moment be without compass or direction, anxious for an ideal, but without knowing where to render its adoration, will receive the true light through the universal manifestation of the pure doctrine of Lucifer, brought finally out in the public view. This manifestation will result from the general reactionary movement which will follow the destruction of Christianity and atheism, both conquered and exterminated at the same time.” Albert Pike 

theintelhub.com
September 20, 2012

A popular Youtuber offers his opinion on the Muslim false flag video that supposedly lead to the murder of a US Ambassador and caused widespread rioting throughout the world.

All evidence points to the fact that the release of this movie was absolutely a false flag designed to cause chaos and further divide the populace.

From Youtube Video Description:

UPDATE: Glen Beck reported that the Embassy staff were communicating via a gaming forum!

Go to “DarthF3TT” channel on YT and will notice that out of 11 videos, NINE of them are [Gaming Videos] ONE is the Innocence of Muslims and TWO are about the Embassy Killings.

Here is the link!!!http://www.youtube.com/user/DarthF3TT/videos?flow=grid&view=0

UPDATE: Look who created this now deleted page. This url was captured via a Google Cache trying to sell the Christopher Stevens was killed because of the Innocence of Muslim “Film”, look who posted it!

“NPN” NewsPoliticsNow3 http://webcache.googleusercontent.com/search?q=cache:xRVFOiiD1MoJ:www.indiego…

Please follow the links in the order in which listed and come to your own conclusions!

The “Original Video” called The Real Life Of Mohammad posted on July 1st 2012 on Sam Bacile’s YT Channel
http://www.youtube.com/watch?v=LoBwR9KEGUc&feature=plcp

Movie name changed to “Innocence of Muslims” posted on September 11 2012 by Youtube user NewsPoliticsNow3
http://www.youtube.com/watch?v=ntgzoE7rU9A&feature=plcp

Youtube page NewsPoliticsNow sporting a [TM] Trademark to the right of their name
http://www.youtube.com/user/NewsPoliticsNow2

Youtube page NewsPoliticsLeaks appears to be associated with NewsPoliticsNow notice the trademark listed to the right
http://www.youtube.com/user/NewsPoliticsLeaks

Trademark search results for NewsPoliticsNow
http://trademarksearch.marcaria.com/search/us/?q=Zj10b2Mmc3RhdGU9NDAwMSUzQTh0…

Trademark results for NewsPoliticsLeaks
http://trademarksearch.marcaria.com/search/us/?q=Zj10b2Mmc3RhdGU9NDAwNSUzQTI3…

Image search for NPN
https://www.google.com/search?tbs=sbi:AMhZZisqiBzAyV9qJxXdQmIgLieZuupgOU3vkTr…

Image search for NPL
https://www.google.com/search?tbs=sbi:AMhZZiuGoNTSUVxVRzLb98qbKc004scSflnn3fT…

Results for Stanley Inc
http://en.wikipedia.org/wiki/Stanley,_Inc.

It has been brought to my attention that Youtube has shielded everyone’s age within the past 24 hours.

Again, I wanted to thank “TheAntiPC” http://www.youtube.com/user/TheAntiPC for your original video pointing out the facts on how the Muslim Movie was posted months ago, for it is your video, that made me really look into this situation!

Sensors Pick up Huge Underground Pyramid in Alaska’s Bermuda Triangle Located between Noam and Mcinelly mountain.

Daniel J Leach

Create Your Badge
Original Report from: www.earthfiles.com

Could the discovery of a Huge Underground Pyramid in Alaska’s mysterious Bermuda Triangle region be the cause of thousands of missing people?   On May 22 1992 Chinese Set Off Their Biggest Nuclear Explosion weapons testing program.  A huge underground pyramid was identified during the ,Chinese underground test it was much larger than the Great Pyramid at Giza. On Coast to Coast, ex Military intel analyst Douglas A. Mutschler contacted  Linda Moulton Howe who was a guest on Coast to Coast as a investigative journalist.

     Douglas A. Mutschler gives proof of who he was and tells there is a Ancient Pyramid in Alaska bigger than the biggest one in Egypt.   Located between Nome and Mt. McKinley.  The Alaskan underground pyramid is HOT and HUMMING, an active underground base, run by who or for what reason?  These are Questions that we are asking and want answers to!

alaska bermuda triangle map

     There are huge number of disappearances in Alaska, We are trying to figure out why, people are being abducted and not returned.  Because so many go missing in Alaska, part of the wilderness has been called the Bermuda Triangle.  Thousands of people go missing each year but is there really a mystery here?  The triangle exists in the state between the city of Juneau and Yakutat in the Southeast; the Barrow mountain ranges in the north and the city of Anchorage right in the centre of Alaska. Indians native to the state – the Tlingit – are sure about the truth of Alaska’s Bermuda Triangle.

According to their folk-lore there exists a man, known as Kushtaka who can shape-shift to an otter and has the ability to lure innocent people and trap them. This theory surrounded by the amount of missing persons list that the state puts up is enough to confirm and verify the truth about Alaska’s Bermuda Triangle.  The region’s statistical data of 2,883 missing persons is adequate proof about the insolvability of Alaska’s Bermuda Triangle. The state ranks 50th among the nation’s population count.

“What the geologists said they found in this byline news
story (Anchorage TV Channel 13) story was under Alaska,
they found a pyramid bigger than the one in Egypt.”

 Large Pyramid Structure Underground
Large Pyramid Structure Underground

From:   Douglas A. Mutschler
Subject:   To Linda Moulton Howe, Pyramid under Alaska?
Date:   June 22, 2012
To: earthfiles@earthfiles.com

Hello
My name is Douglas A. Mutschler CW2, USA (ret) and during my service tour in Alaska I was informed of a pyramid under the land in Alaska. There is other information concerning this that came to my attention after it was reported to us in 1992. I have tried to pass this info to others but have not heard any response to my information. I assure you I am telling you the truth about this and I think that this is being kept quiet by our government as the news was buried the very next day after it was brought to my attention. If you can help me get this info out to you please call me so I can talk to you about this. My phone number ——-. The whole story is pretty interesting and this can be verified with your contacts I’m assured of that, as I do not have them and came up with zero from the news people there. I’ll tell you the whole story if you are interested. I’ve only contacted a couple of people but have not heard back from any of them. I’m wondering if my emails are getting through to them or is this an old story that has no interest to news reporters?
Thank you for your time in this matter.
Douglas A. Mutschler

March 10, 1981:  Entered active duty in U. S. Army with basic training at Fort McClellan, Alabama. Requested to join advanced training for “97 Bravo 10” experimental counterintelligence  unit to increase number of human intelligence agents (humint). Advanced training was at Fort Huachuca, Arizona, the U. S. Army Intelligence Center.

June 29, 1989:  Transition to Warrant Officer School, Fort Rucker, Alabama. CW2 rank. Requests duty at Fort Richardson in Anchorage, Alaska.

Douglas A. Mutschler CW2, USA (ret)
Douglas A. Mutschler CW2, USA (ret)

May 22, 1992:  Lon Por, China, large underground nuclear detonation.

May 22, 1992:  Lon Por, China, large underground nuclear detonation.
May 22, 1992: Lon Por, China, large underground nuclear detonation.

October 31, 1995:  Physical disability discharge from Fort Richardson in Anchorage, Alaska, and from Doug Mutschler’s Warrant Officer (CW2) duty in the U. S. Army.

Douglas A. Mutschler CW2, USA (ret) DD 214 discharge information
Douglas A. Mutschler CW2, USA (ret) DD 214 discharge information
October 31, 1995:  Physical disability discharge from Fort Richardson in Anchorage, Alaska, and from Doug Mutschler's Warrant Officer (CW2) duty in the U. S. Army.
October 31, 1995: Physical disability discharge from Fort Richardson in Anchorage, Alaska, and from Doug Mutschler’s Warrant Officer (CW2) duty in the U. S. Army.

If any Earthfiles viewer or Coast to Coast AM radio listener has any information about the alleged underground pyramid structure between Mount McKinley and Nome, Alaska, found during Earth crust studies in conjunction with China’s May 22, 1992, one megaton nuclear underground test, please email: earthfiles@earthfiles.com.  All requests for confidentiality are honored.

Alaska’s Bermuda Triangle

Great find Ian Davies Apr 9, 3:19 pm

looking at the satellite image athttps://maps.google.co.uk/maps?q=63%C2%B018%E2%80%99N+152%C2%B032%E2%80%99W&hl=en&ie=UTF8&ll=63.297414,-152.520275&spn=0.049599,0.179043&oe=utf-8&client=firefox-a&t=h&z=13 you can see a square pyramid shape, if you compare to the satellite of the ones at Gizahttps://maps.google.co.uk/maps?q=egyptian+cheops+pyramid,+&hl=en&ll=29.976981,31.134095&spn=0.005976,0.01119&sll=28.890374,30.089493&sspn=0.386563,0.716171&t=h&hq=egyptian+cheops+pyramid,&radius=15000&z=17 the main two are diagonally aligned the lower one diagonally below to the left. Back to the Alaskan one if you look diagonally to the low right not as pronounced is what could be a secondary smaller pyramid.

The Peaceful Nuclear Explosions Treaty

Peaceful nuclear explosions
From Wikipedia, the free encyclopedia
Peaceful nuclear explosions (PNEs) are nuclear explosions conducted for non-military purposes, such as activities related to economic development including the creation of canals. During the 1960s and 1970s, both the United States and the Soviet Union conducted a number of PNEs.
Six of the explosions by the Soviet Union are considered to have been of an applied nature, not just tests.
Subsequently the United States and the Soviet Union halted their programs. Definitions and limits are covered in the Peaceful Nuclear Explosions Treaty of 1976. The Comprehensive Nuclear-Test-Ban Treaty of 1996 prohibits all nuclear explosions, regardless of whether they are for peaceful purposes or not.
Contents [hide]
1 The Peaceful Nuclear Explosions Treaty
2 United States: Operation Plowshare
3 Soviet Union: Nuclear Explosions for the National Economy
4 Other nations
5 Spaceflight Applications
6 See also
7 References
8 External links
[edit]The Peaceful Nuclear Explosions Treaty

In the PNE Treaty the signatories agreed: not to carry out any individual nuclear explosions having a yield exceeding 150 kilotons; not to carry out any group explosion (consisting of a number of individual explosions) having an aggregate yield exceeding 1,500 kilotons; and not to carry out any group explosion having an aggregate yield exceeding 150 kilotons unless the individual explosions in the group could be identified and measured by agreed verification procedures. The parties also reaffirmed their obligations to comply fully with the Limited Test Ban Treaty of 1963.
The parties reserve the right to carry out nuclear explosions for peaceful purposes in the territory of another country if requested to do so, but only in full compliance with the yield limitations and other provisions of the PNE Treaty and in accord with the Non-Proliferation Treaty.
Articles IV and V of the PNE Treaty set forth the agreed verification arrangements. In addition to the use of national technical means, the Treaty states that information and access to sites of explosions will be provided by each side, and includes a commitment not to interfere with verification means and procedures.
The protocol to the PNE Treaty sets forth the specific agreed arrangements for ensuring that no weapon-related benefits precluded by the Threshold Test Ban Treaty are derived by carrying out a nuclear explosion used for peaceful purposes, including provisions for use of the hydrodynamic yield measurement method, seismic monitoring and on-site inspection.
The agreed statement that accompanies the Treaty specifies that a “peaceful application” of an underground nuclear explosion would not include the developmental testing of any nuclear explosive.
[edit]United States: Operation Plowshare

One of the Chariot schemes involved chaining five thermonuclear devices to create the artificial harbor.
Operation Plowshare was the name of the U.S. program for the development of techniques to use nuclear explosives for peaceful purposes. The name was coined in 1961, taken from Micah 4:3 (“And he shall judge among the nations, and shall rebuke many people: and they shall beat their swords into plowshares, and their spears into pruning hooks: nation shall not lift up sword against nation, neither shall they learn war any more”). Twenty-eight nuclear blasts were detonated between 1961 and 1973.
One of the first U.S. proposals for peaceful nuclear explosions that came close to being carried out was Project Chariot, which would have used several hydrogen bombs to create an artificial harbor at Cape Thompson, Alaska. It was never carried out due to concerns for the native populations and the fact that there was little potential use for the harbor to justify its risk and expense. There was also talk of using nuclear explosions to excavate a second Panama Canal.[1]
The largest excavation experiment took place in 1962 at the Department of Energy’s Nevada Test Site. The Sedan nuclear test carried out as part of Operation Storax displaced 12 million tons of earth, creating the largest man-made crater in the world, generating a large nuclear fallout over Nevada and Utah. Three tests were conducted in order to stimulate natural gas production, but the effort was abandoned as impractical because of cost and radioactive contamination of the gas.[2][3]
There were many negative impacts from Project Plowshare’s 27 nuclear explosions. For example, the Gasbuggy site,[3] located 55 miles east of Farmington, New Mexico, still contains nuclear contamination from a single subsurface blast in 1967.[4] Other consequences included blighted land, relocated communities, tritium-contaminated water, radioactivity, and fallout from debris being hurled high into the atmosphere. These were ignored and downplayed until the program was terminated in 1977, due in large part to public opposition, after $770 million had been spent on the project.[5]
[edit]Soviet Union: Nuclear Explosions for the National Economy

The Soviet Union conducted a much more vigorous program of 239 nuclear tests, some with multiple devices, between 1965 and 1988 under the auspices of Program No. 6 and Program No. 7-Nuclear Explosions for the National Economy. Its aims and results were similar to those of the American effort, with the exception that many of the blasts were considered applications, not tests.[6] The best known of these in the West was the Chagan test in January 1965 as radioactivity from the Chagan test was detected over Japan by both the U.S. and Japan. The United States complained to the Soviets, but the matter was dropped.
In the 1970, the Soviet Union started the “Deep Seismic Sounding” Program, that included the use of peaceful nuclear explosions to create seismic deep profiles. Compared to the usage of conventional explosives or mechanical methods, nuclear explosions allow the collection of longer seismic profiles (up to several thousand kilometers).[7]
There are proponents for continuing the PNE programs in modern Russia. They (e.g. A. Koldobsky) state that the program already paid for itself and saved the USSR billions of rubles and can save even more if continued. They also allege that the PNE is the only feasible way to put out large fountains and fires on natural gas deposits and the safest and most economically viable way to destroy chemical weapons.
Their opponents (include the academician A.V. Yablokov) [8] state that all PNE technologies have non-nuclear alternatives and that many PNEs actually caused nuclear disasters.
Reports on the successful Soviet use of nuclear explosions in extinguishing out-of-control gas well fires were widely cited in United States policy discussions of options for stopping the Deepwater Horizon oil spill.[9][10]
[edit]Other nations

This unreferenced section requires citations to ensure verifiability.
Germany at one time considered manufacturing nuclear explosives for civil engineering purposes. In the early 1970s a feasibility study was conducted for a project to build a canal from the Mediterranean Sea to the Qattara Depression in the Western Desert of Egypt using nuclear demolition. This project proposed to use 213 devices, with yields of 1 to 1.5 megatons detonated at depths of 100 to 500 m, to build this canal for the purpose of producing hydroelectric power.
The Smiling Buddha, India’s first explosive nuclear device was described by the Indian Government as a peaceful nuclear explosion.
In Australia proposed blasting was put forward as a way of mining Iron Ore in the Pilbara [11]
[edit]Spaceflight Applications

Nuclear explosions have been studied as a possible method of spacecraft propulsion. The most well known example was Project Orion, which studied the possibility of a spacecraft propelled by the detonation of nuclear devices which it released behind itself.
Another application would be for deflecting or destroying celestial objects like comets, meteors, or asteroids on a collision course with Earth that have the potential for causing destruction.
[edit]See also

Project Gnome
[edit]References

^ “US Congressional Record pg. 25747, 1968-09-05”. Retrieved 2012-01-22.
^ U.S. Department of Energy, Office of Legacy Management: Rulison, Colorado, Site. Fact Sheet [1].
^ a b Peter Metzger (February 22, 1970). Project Gasbuggy And Catch-85*: *That’s krypton-85, one of the radioactive by-products of nuclear explosions that release natural gas Project Gasbuggy and Catch-85 “It’s 95 per cent safe? We worry about the other 5”. New York Times. p. SM14.
^ “DOE Environmental Management (EM) – Gas Buggy Site”. Em.doe.gov. Retrieved 2010-09-19.
^ Benjamin K. Sovacool (2011). Contesting the Future of Nuclear Power: A Critical Global Assessment of Atomic Energy, World Scientific, pp. 171-172.
^ Nordyke, M. D. (2000-09-01). The Soviet Program for Peaceful Uses of Nuclear Explosions. Lawrence Livermore National Laboratory. pp. 34–35. DOI:10.2172/793554. Report no.: UCRL-ID-124410 Rev 2. U. S. Department of Energy contract no.: W-7405-Eng48.
^ University of Wyoming: http://w3.uwyo.edu/~seismic/dss/
^ “А. В. ЯБЛОКОВ, “ЯДЕРНАЯ МИФОЛОГИЯ КОНЦА XX ВЕКА””. Biometrica.tomsk.ru. Retrieved 2011-08-13.
^ Broad, William J. (2010-06-02). “Nuclear Option on Gulf Oil Spill? No Way, U.S. Says”. New York Times. Retrieved 2010-06-18.
^ Astrasheuskaya, Nastassia; Judah, Ben; Selyukh, Alina (2010-07-02). “Special Report: Should BP nuke its leaking well?”. Reuters. Retrieved 2010-07-08.
^ Nuclear blasting proposed for Pilbara Iron Ore Project in Industrial Reviews and Mining Year Book, 1970 pp.255-259
[edit]External links

Peaceful Nuclear Explosions Comprehensive Nuclear-Test-Ban Treaty Organization Preparatory Commission
Video of the 104Kt Sedan PNE as part of Operation Plowshare.
Video of the Soviet Chagan PNE
Video of the Soviet Taiga PNE
On the Soviet nuclear program
On the Soviet program for peaceful uses of nuclear weapons, American Office of Scientific and Technical Information
United States Nuclear Tests, July 1945 through September 1992 (DOE/NV-209 [Rev.14]).
ARMS CONTROL AGREEMENTS,Federation of American Scientists
World Reaction to the Indian Nuclear Tests, Center for Nonproliferation Studies
Nuclear Files.org Treaty between the USA and USSR on underground nuclear explosions for peaceful purposes
Peter Kuran’s “Atomic Journeys” – documentary film includes tests of Peaceful nuclear Explosions.
[hide] v t e
Nuclear technology
Science
Chemistry Engineering Physics Atomic nucleus Fission Fusion Radiation ionizing
Fuel
Deuterium Fertile material Fissile Helium-3 Isotope separation Plutonium Thorium Tritium Uranium enriched depleted
Neutron
Activation Capture Cross-section Fast Fusion Generator Poison Radiation Reflector Temp Thermal
Reactors
Fission
reactors
by
primary
moderator
Water
Aqueous homogeneous reactor Boiling BWR ABWR Heavy CANDU PHWR SGHWR
Natural (NFR) Pressurized PWR VVER EPR Supercritical (SCWR)
Graphite
by coolant
Water
RBMK
Gas
Advanced gas-cooled (AGR) Magnox Pebble bed (PBMR)
UHTREX UNGG reactor Very high temperature (VHTR)
Molten Salt
FLiBe
Fuji MSR Liquid fluoride thorium reactor (LFTR)
Molten-Salt Reactor Experiment (MSRE)
Hydrocarbon
Organically moderated and cooled reactor
BeO
Aircraft Reactor Experiment (ARE)
None
(Fast)
Breeder (FBR) Integral (IFR) Liquid-metal-cooled (LMFR) SSTAR Traveling Wave (TWR)
Generation IV by coolant Gas (GFR) Lead (LFR) Sodium (SFR)
Fusion
reactors
by
confinement
Magnetic
Field-reversed configuration Levitated dipole Reversed field pinch Spheromak Stellarator Tokamak
Inertial
Bubble fusion (acoustic) Fusor electrostatic Laser-driven Magnetized target Z-pinch
Other
Dense plasma focus Migma Muon-catalyzed Polywell Pyroelectric
List of nuclear reactors
Power
Nuclear power plant By country Economics Fusion Isotope thermoelectric (RTG) Propulsion rocket Safety
Medicine
Imaging
by
radiation
Gamma camera
Scintigraphy Positron emission (PET) Single photon emission (SPECT)
X-ray
Projectional radiography Computed tomography
Therapy
Boron neutron capture (BNCT) Brachytherapy Proton Radiation Tomotherapy
Weapon
Topics
Arms race Delivery Design Explosion effects History Proliferation Testing underground Warfare Yield TNTe
Lists
Popular culture States Tests Treaties Weapon-free zones Weapons
Waste
Products
Actinide: (Reprocessed uranium Reactor-grade plutonium Minor actinide) Activation Fission LLFP
Disposal
Fuel cycle HLW LLW Repository Reprocessing Spent fuel pool cask Transmutation
Debate
Nuclear power debate Nuclear weapons debate Anti-nuclear movement Uranium mining debate Nuclear power phase-out

Don’t Trash the American Flag! How to Retire a U.S. Flag

On Location in Rochester NY, today I found a American Flag in the trash on my way home tonight and I saved it from disgrace and took it home for a proper retirement ceremony. As I was getting out of the car with Cathy and the baby to go inside for the night, a old lady said “that she had followed me home to ask what I was doing with the flag that she saw me take out of the trash?” Eve I said to Eve the above statement! Eve asked if I wanted two more Flags that she had rescued from the trash a few weeks earlier. She said that I was sent from God and that she was meant to meetup with me this day! She gave me the flags thanked me and said her name was Eve and that her father died in World War 2 her brother fought in Vietnam and that her sister was a nurse in the US Army.  She said she was proud to see me do this.  I felt her pain and saw it in her face I could see she felt like crying for her loss of her father and brother
This is what I could do to honer our Country and those who fought and died for us today! For the Grandfather I never met who came home so messed up with PTSD and never was the same man he did that for you and I. Now I’m thinking about doing a Proper Flag retirement ceremony on the 4th of July this summer! How strange is life! God is good!
 Retire a U.S. Flag
National Flag Foundation recommends the following as the proper ceremonies for retiring and destroying a worn Flag.
    • This ceremony should be conducted at a private, non-public location.
    • Only one Flag, representing all those to be destroyed, should be used in the ceremony.
    • Two color guards should be used at evening retreat, one for the Flag currently in use and a special color guard for the Flag to be permanently retired.
    • Just before sunset, the Flag that has been flying all day is retired in the normal, ceremonial procedure for the group or site.
    • The color guard responsible for the Flag receiving the final tribute moves front and center. The leader should present this color guard with the Flag that has been selected for its final tribute and subsequent destruction. The leader then should instruct the color guard to “hoist the colors”.
    • When the Flag has been secured at the top of the pole, the leader comments: “This Flag has served its nation long and well. It has worn to a condition to which it should no longer be used to represent the nation. This Flag represents all of the Flags collected and being retired from service today. We honor them all as we salute one Flag.”
    • The leader then calls the group to attention, orders a salute, leads the entire group in the “Pledge of Allegiance” and orders the Flag retired by the color guard.
    • Slowly and ceremoniously, the flag is lowered, then respectfully folded in the customary triangle. The Flag is delivered to the leader and then the group is dismissed.
    • This concludes the Ceremony of Final Tribute.
  1. 2

    Ceremonial Burning of the Flag

    • This ceremony should be conducted at a private, non-public location.
    • The burning of a Flag should take place at a campfire in a ceremony separate from the Ceremony of Final Tribute. The fire must be sizable (preferably having burnt down to a bed of red hot coals to avoid having bits of the Flag being carried off by a roaring fire), yet be of sufficient intensity to ensure complete burning.
    • Before the ceremony begins, the color guard assigned to the Flag opens up its tri-corner fold and then refolds it in a coffin-shaped rectangle.
    • All assemble around the fire. The leader calls the group to attention.
    • The color guard comes forward and places the Flag on the fire.
    • All briskly salute.
    • After the salute, but while still at attention, the leader should conduct a respectful educational program as the Flag burns: e.g. singing of “God Bless America”; offering an inspiring message of the Flag’s meaning followed by the “Pledge of Allegiance”; performing a reading about the Flag; reciting the “American’s Creed”; etc.
    • When the Flag is consumed, those assembled, with the exception of a leader and the color guard, should be dismissed. They should be led out in single file and in silence.
    • The leader and color guard should remain to ensure that the Flag is completely consumed, and to burn additional Flags, if any.
    • The fire should then be safely extinguished.

Create a website or blog at WordPress.com

Up ↑