The TRUTH About Monarch Programming and Mind Control
Rise To LibertyFebruary 10, 2025x
128
01:35:07217.72 MB

The TRUTH About Monarch Programming and Mind Control

#MonarchProgramming #MindControl #OrganizeSafety #BehaviorModification #Monarch #ProjectMonarch #Mkultra #Brainwashing #ProjectMockingbird Today's guest is---------------GUEST LINKS: Organize Safety Website: Grey's X Account: https://x.com/GreyAreaMonarch Grey's YouTube: https://www.youtube.com/@greyareaoperatorGrey's Rumble Account: https://rumble.com/user/GreyAreaOperator Emma's X Account: https://x.com/TheEmmapreneur The Imagination Podcast: https://rumble.com/c/TheImaginationPodcast ----------------------------VIDEO INTERVIEW LINKS:-------------------------RISE TO LIBERTY LINKS: - RTL Master Link: https://risetoliberty.com/link - RTL Merch Store: https://risetoliberty.store - RTL On Twitter (X): https://risetoliberty.com/twitter - RTL On Odysee: https://risetoliberty.com/odysee - RTL On Rumble: https://risetoliberty.com/rumble - RTL On Telegram: https://risetoliberty.com/freespeech - RTL On Instagram: https://risetoliberty.com/instagram - RTL On TikTok: https://risetoliberty.com/tiktok - Beware The Mockingbird!: https://risetoliberty.substack.comFRIENDS OF RISE TO LIBERTY! - Nadeau Shave Company: https://nadeaushaveco.com **Use code: RISE15 for 15% off!** - Gratuitas! Buy Coffee w/ Monero: https://risetoliberty.com/gratuitas-xmr

#MonarchProgramming #MindControl #OrganizeSafety #BehaviorModification #Monarch #ProjectMonarch #Mkultra #Brainwashing #ProjectMockingbird Today's guest is --------------- GUEST LINKS: Organize Safety Website: Grey's X Account: https://x.com/GreyAreaMonarch Grey's YouTube: https://www.youtube.com/@greyareaoperator Grey's Rumble Account: https://rumble.com/user/GreyAreaOperator Emma's X Account: https://x.com/TheEmmapreneur The Imagination Podcast: https://rumble.com/c/TheImaginationPodcast ---------------------------- VIDEO INTERVIEW LINKS: ------------------------- RISE TO LIBERTY LINKS: - RTL Master Link: https://risetoliberty.com/link - RTL Merch Store: https://risetoliberty.store - RTL On Twitter (X): https://risetoliberty.com/twitter - RTL On Odysee: https://risetoliberty.com/odysee - RTL On Rumble: https://risetoliberty.com/rumble - RTL On Telegram: https://risetoliberty.com/freespeech - RTL On Instagram: https://risetoliberty.com/instagram - RTL On TikTok: https://risetoliberty.com/tiktok - Beware The Mockingbird!: https://risetoliberty.substack.com FRIENDS OF RISE TO LIBERTY! - Nadeau Shave Company: https://nadeaushaveco.com **Use code: RISE15 for 15% off!** - Gratuitas! Buy Coffee w/ Monero: https://risetoliberty.com/gratuitas-xmr

[00:00:31] Welcome, welcome back to Rise To Liberty Podcast. Today I have a very special guest, a returning guest, one that more people have wanted to hear from. Today's guest is Gray. How's it going, Gray? Thanks for joining. I'm doing well. Thanks for having me. Of course, you know, you're always more than welcome on this platform. So let's just get straight into it.

[00:00:56] Um, so I guess, what is Monarch? What is Project Monarch? Um, I'm not exactly sure the right question to ask, uh, to get you in that direction. So I'll kind of just, uh, let you, uh, answer with that and we'll go from there. Absolutely. So just as MKUltra was an umbrella encompassing many subprojects of behavioral modification,

[00:01:26] Monarch is an umbrella over specific technology tradecraft, also related to behavioral modification, utilizing certain technology, frequency wave technologies, but also covering, uh, advanced physics, exotic weaponry, um, and so on and so forth. Basically, Monarch is breeding and placement of personnel that maintain the most classified operations.

[00:01:55] And Monarch is the utilization of specific bloodlines, you know, genealogy, um, family dynasties, which are also utilized in a fashion similar to the way that the government uses, uh, private corporations and aerospace to circumvent freedom of information act and oversight.

[00:02:15] Um, so Monarch is the umbrella and breeding and placement program that covers and is involved with, um, all these deeply classified projects, uh, including everything associated with the UAP fiasco, including all the behavioral modification, so on and so forth. And for, um, and for, for those who don't know, what is UAP?

[00:02:36] UAP, you know, these words are getting thrown around, I guess, unidentified aerial phenomena, basically, you know, NHI, non-human intelligence, aliens, UFOs, you know, whatever, whatever you want to call it. Phenomena that's unknown. It's kind of, you know, a generalized term. X-files stuff. Yeah, there you go. The, you know, the weird desk. Yeah.

[00:02:58] Um, you know, maybe we should have started with this. So last time you, you were on, you were in mask, voice changer. What changed? Well, uh, several things changed, you know, when I decided to go public again, I had a talk with my loved ones because unfortunately in 2014, when I had went fully public, there was a lot of collateral damage.

[00:03:25] And, you know, loved ones were hurt and worse. A lot of very bad things happened. Um, you know, as far as the true culprits that, you know, really don't want things coming out and are willing to take measures to prevent that. Um, you know, I'm not hiding from them. You know, there had been internal resolutions that failed so on and so forth.

[00:03:46] Um, but at least when I was going public, uh, people close to me did want at least a thin veal, a thin layer of protection, um, to at least prevent, you know, a public harassment and in public nuisances to them.

[00:04:00] So we were trying to prevent that, um, you know, since between now and then things have escalated, bad things happen to me and those close, um, you know, just trying to get ahead of things and also have the freedom to not try to avoid certain issues or certain disclosures, so on and so forth.

[00:04:18] You know, I just made the decision along with the support of others, um, to just go fully unmasked and really address everything, um, precisely and exactly for a layer of safety now under watchful eyes, hopefully. And also hoping to gain some public attention to leverage some of these existing channels, um, to, you know, uh, take action that they should be. Unfortunately, you know, public attention is needed for, to leverage what should be happening to happen.

[00:04:47] Right. And it, it kind of seems, I'm not sure exactly how you feel, but it kind of seems like you being able to make the choice, uh, is, is, uh, a form of freedom because it was your choice. Nobody else outed you, um, and you were able to, uh, offer the public this, this form of transparency, um, without that being used against you.

[00:05:13] It was, it was, it was your decision, uh, which is a positive instead of a negative, which they would have wanted it. Well, to be fair, actually, I was doxed behind the scenes by irresponsible journalists, irresponsible bureaucrats, um, and irresponsible, um, parties involved that are actively, you know, calling for whistleblowers to give them information. So I was doxed and endangered by them. Um, and then just malicious parties online also ended up doxing family and stuff like that.

[00:05:42] So to be honest, that did happen, but you know, now at this point it's like, okay, that's already happened. Yes. Everyone hasn't seen that and so on and so forth, but like, I can't constantly get this used against me. So now this is happening. Yes. On, on my terms. So turning it into a positive and, and focusing on the positive aspect from it, the freeing aspect from it. Um, you know, even though it was in response, unfortunately to, to negative, but doing the best we can with what we have.

[00:06:08] So, so you got your hand played for you, but then you, you just turn around and took control. Yes. And we expected this to happen from the very beginning. This isn't my first rodeo, as they say. So, right. So, so to get back in, in, into Monarch, this, this is, I don't know if this is the right adjective, but this is, uh, deeper into the, the MK world.

[00:06:37] Like this isn't a lot of the surface level stuff. And this is something that even, I guess, and I hate these terms, but the, the community, the, the, uh, conspiracy community are, are even kind of split on if Monarch ever existed.

[00:06:56] And, and, and so this, this is not like the surface level stuff. Like you can't go to, uh, Wikipedia to find any, anything that's, uh, of substance, which, I mean, if you pull up the MK ultra Wikipedia, it's surprisingly, uh, honest, which was, uh, really surprising to me since that's, you know, controlled opposition.

[00:07:15] So what, what, what do you think it is? Like, why, why is there like this hesitation to embrace Monarch or why, why is it the dynamic dynamic that exists in your opinion? Right. Well, and agreed about MK ultra and Wikipedia, although there still is focus, in my opinion, away from the most pertinent aspects of it.

[00:07:41] Um, as far as why Monarch so controversial, um, there's several reasons. Um, one is literal cognitive dissonance and I hate saying cliche terms, but it is, you know, not comfortable for people to actually face, especially when deep down, they may not feel like they can affect it. It's much easier to bury, to go on with the day to day. Why, you know, hold that pain with you. Um, the other aspect is they have gotten ahead of the story. Um, you know, there is so much disinformation even put out.

[00:08:10] Uh, through, you know, channels that were putting out good information. Cause if they didn't put out some good information, they couldn't get the foot in the door to be held credible, you know, and then be able to disseminate the dis misinformation. Um, you know, in addition to that, um, you know, it's just, it's just, uh, also to be fair, one of these terms that are used and it's, there's so many different actual code names to these programs and constantly changing and so forth.

[00:08:38] You know, it's just one of those terms that has been watered down, obscured faded and, you know, switched around, used improperly a lot. So it's just, you know, a really dark area. But also if you think about, you know, just the general situation, I mean, how many of, you know, how many of these classified programs and stuff do people really know about?

[00:09:01] Right. You know, I think it's more important than worrying about code names specifically is worrying about things that are happening and how likely they are to be real and so on and so forth. So if you break it down to actually like the problems, the events, the personnel involved, so on and so forth, it becomes a lot clearer. And there are communities and specific focused areas where that information can be obtained and verified.

[00:09:25] So, uh, just real quick, like what was it started, uh, in MKUltra did, did it, uh, start like after 73, after like the, the church committee hearings? Like where, where is Monarch placed on the timeline of things? Right. So, um, you know, this is a very, this is a very murky area too. And I can't, I can't give you anything that's verified on this.

[00:09:52] I mean, the important aspect, I guess, like if you're talking about when did all the MKUltra umbrella research really fully get utilized and industrialized in ongoing operations? I mean, aspects of it already were by the time MKUltra code word ever came, you know, important thing to say is by 1977, once the MKUltra, you know, declassified documents were found in the situation really blue with the church committee and so on and so forth.

[00:10:21] Um, right when that was happening, things already had been realized that they needed to layer off some of the base conditioning methods to get pools of subjects kind of like automatically conditioned at the base level that then they can recruit up into it. Right. They had to layer it off further. So in 1977, by the time the MKUltra hearings blew in the church committee and all that, um, things had already been layered off.

[00:10:46] And in 1997, things were passed to where there was funding, uh, made for layered off organizations to really industrialize this. But as early as the National Defense Education Act and Project Talent, um, you know, things were already in full swing that eventually fed into this.

[00:11:01] Um, it's just, you know, important and there's still the same sort of, um, upgrades always happening now, you know, uh, Monarch also really leans on undetectable and remote, um, means and methods. Right. Um, as opposed to a lot of the older stuff, which was manual and direct.

[00:11:20] Thus, some of these operational aspects of Monarch now, um, are just being implemented in a grand scale and some of the old methods are being even further exposed, used to gain credibility to whitewash the now less obvious and overt methods that are being utilized wide scale as this technology has developed. This technology tradecraft, the technology and the, you know, usage of it, the methods of usage of.

[00:11:48] So would you say that it's accurate that, um, what they learned with, with the MK research that Monarch was the actual continuation, like the put into practice, what they learned through the research? Yes. And I mean, there's other things other than Monarch, but what Monarch is, is the breeding and the placement umbrella.

[00:12:17] So Monarch specifically handles the personnel, making sure that the personnel self replicate. Right. And making sure that all the individual pieces are placed in place, um, and is the gestalt that keeps things going. So, you know, the Monarch is a gestalt. It is. Right. Together, the umbrella of everything it covers. It's more than just the sum of its parts.

[00:12:44] It's actually a self replicating machine that spans generations. The plan is more important than any personnel. Um, you know, so it's the breeding and placement that uses what was derived from all the different methods, um, into a self replicating self ongoing machine to where there's nothing personal. If the rules are broken, they are automatically enforced. You know, uh, it's, it's all about automation and replication. Right.

[00:13:10] And so this, this is kind of, uh, like a, like a self healing wound, something that, uh, is able to take care of itself. Even if the, uh, the operator per se, you know, the, the engineer of the train, if, if he goes, the train is still going to run. Um, Monarch is like Hydra and let's put it like that, right? If you chop off a head, it's going to grow back even. Right. Yes. It's got the self healing aspect. Absolutely. Absolutely.

[00:13:38] And by, you know, by design, it's a very intelligent design and, you know, one that's very troubling, which is why the at length conversations need to be had to provide context for people to understand it. But also as it ties into all these current events, the, the at length conversations need to be had to provide context for people and whistleblowers coming forward.

[00:14:02] Otherwise people won't be able to digest or truly understand, uh, what's going on. Right. Right. So with, with that in mind, exactly what, what is it that, um, you know, the, the, the public, uh, the, the average Joe, um, what, what is it about, uh, any of, uh, Monarch or any of the disclosures coming out?

[00:14:30] What is it that they should know? Like first thing. Number one is you hear about these disclosures. I'm sure you've heard the term, the program, you know, so on and so forth. A hundred percent of the personnel involved with the program, you know, we're saying Monarch is breeding and placement, but they might not have been read into Monarch. They might've just been read into one specific area.

[00:14:56] Say you have a former, you know, special operator, special agent, special agent in charge, who is now public relations and involved with some of these task force and disseminating information to the public. What they need, what people need to understand is that a hundred percent of personnel, uh, went through behavioral modification. Okay. Now they say, well, why is that? Why is that important? Why that's important? And people also say, oh, how could it be everybody? It's not everybody in the big picture.

[00:15:25] It's a mandatory requirement to get to that stage. That way they still have control and could cut someone loose or set off certain things. Uh, if someone's not doing what they need to do. Um, so, uh, yeah, why that's so important is because if people don't address it, that are headliners, um, that are on the main stage, um, there's two possibilities.

[00:15:49] Either they are still under the influence of it, which would need to be addressed because they can be slipping in misinformation anywhere, sabotaging things, reporting people that are talking to them, so on and so forth. Or two, they are aware and they are complicit that there's not much middle ground for that. Okay. You know, of course, if they are aware, they were in Monarch or related and are aware, right.

[00:16:13] So they might not seem like they're complicit, but you have to understand if they're not understanding it and talking about it at length, they can still be aware and still be under the influence of it. Right. So it's just vital. If this conversation is not had, then you're only going to get canned responses, so to speak, that have been curated and prepared for the public.

[00:16:35] And we're talking about the insidious part is you'll have a spokesman, right, who truly means well and is doing the best they can and are earnest. And people that go to meet them in person, people that hear from them, they'll sense that they'll say, no, this is a good man. I know he's doing his best. You might not have everything right, blah, blah, blah, blah. I said, yes. And they're using that because they can feed this person information through remote subconscious patterning.

[00:17:00] I mean, and that's an extreme, but it gets so ridiculous that people have to understand, like, you know, these are no dummies. You have architects, you have puppet masters, you know, that are pulling strings and coordinating this. And these are people that, you know, have done this. These are lifelong professionals that are absolutely top tier best at their craft. So, yes, it's, you know, it's because people are too many people are compromised. And, like, you know, virtually everybody in the movement that's not addressing it is compromised.

[00:17:30] The level of that compromisation, how much it's affecting things is obviously going to be a spectrum. But compromised is compromised regardless of intent. Right. And, you know, so this brings people to mind. I know you've spoken out about this and not to point fingers. That's not what I'm trying to do here. But one person that comes to mind is Sean Ryan.

[00:18:01] And I'm not going to make a judgment call on what is or is not or any of these things. And I'm not trying to put you on the spot either regarding him. But he seems as though, like, he's put out content that I've absolutely loved, you know. And he's had conversations with people that I think are important conversations.

[00:18:25] But then in this last, at the very beginning of the year when there was the Trump Tower cyber truck thing and, you know, there was some of these other incidents. It just seemed so odd that he was already ready to go. Like, he was aware of these things that were happening.

[00:18:50] And I guess by bringing him up, I'm using it as an example of somebody who, to me, I'm not sure if he's aware of it or not. Like I said, that's not for me to say. But it just seems like there are these people out there that are trustworthy, trustworthy, that are putting out some information that's good. And then other times, it seems like they flip a switch.

[00:19:17] And, I mean, that is disinformation or a disinformation artist. That's, you know, the psyop. Yeah. And so with these certain, these psyop outlets or these disinformation outlets, what is it that people should be aware of when they see these certain things? Or with these, especially the alternative outlets, what should people be aware of?

[00:19:48] Yeah. I mean, you know, and it can be hard. And if I may, touching on Sean Ryan specifically, as long as we brought him up, it can kind of mirror. Because, you know, the smaller they are and the more alternative they are, it gets a little bit harder at times unless there's tells. And there are things to work for. But let's just for a second take Sean Ryan, for example. And I'm not sure if you're familiar with what I have put out regarding him. Are you?

[00:20:14] I have, I am pretty familiar with it. But that's, that's more, more not for me to speak about. No, understood. Understood. I just, so here, here's the thing. When you have the number one show specifically for military aged male demographic, you know, prior with the company, so on and so forth. If you don't think that they at least try to have their hands in it, come on. You know, like, then what world are you living in?

[00:20:40] But, and I also need people to know that, like, it's not about pointing fingers and names. It's about a reasonable standard and making sure, you know, that this is addressed. And before anything went public, there was more than due diligence in the background, right? Right.

[00:20:57] From fishing out numbers and emails and, you know, and going through, you know, associates to address this properly to avoid, you know, any collateral damage of public exposure that hurt people in their families. And not necessarily physically, but, you know, in a variety of ways. But, but here's, here's the thing is, if people are under control and not aware of it or being used to cause harm, you know, it's, it gets to a point where it needs to be addressed.

[00:21:27] If I was in that position, I would want it to be addressed. I would also be, I'm also, you know, expecting it as I go public more, which has already happened. But I mean, you know, what do people need to worry about? Well, I mean, it's hard if you don't have all the information firsthand. But for example, again, just sticking to his thing, he's had several guests on that are associated with MKUltra and have a history from Doblin, right?

[00:21:55] To Alexander, okay? And just knowing the history and the mass of information that comes from a variety of credible sources, as well as once you get into the survivor communities that were involved with this behavioral modification. You know, some of these people are well known, you know, or, you know, with tons of people naming them.

[00:22:15] So, you know, what you need to be careful of is when these things are brought up and certain subjects aren't touched, when certain subjects are whitewashed, which again, if you don't have all the information might be hard to tell. But the other is, you know, when people seem generally clueless.

[00:22:33] You know, I remember when Sean Ryan had RFK on, RFK Jr. on, and they asked, you know, well, how effective do you think MKUltra was? And you're like, well, what? You know, like, sir, you should be able to rattle off exactly how effective it was, especially with the use of Manchurian candidates and how that upscaled and has been applied in, you know, increasingly effective ways.

[00:23:01] Not to mention increasingly deceptive ways that are near undetectable. You know, like, what are you talking about? If you mean well, and it's not about, oh, the public doesn't need to hear this. The public doesn't need to, you know, no, hold on now. It's quite obvious when people are clueless about it. I mean, you know, there's certain tales, and especially people, if they're in certain areas, there's information that they either 100% will know and were read in on,

[00:23:28] or, two, that it was purposely kept from them, okay? So, like, you know, there's hot topic issues. But, like, whenever it comes to, you know, I boil it down really to the behavioral modification. Why? Because of how important it is tied in with all the top media outlets, how it's tied in with the personnel in these classified areas, and so on and so forth. Like, this is the dirty secret that's getting exposed. And we're just now tiptoeing towards it with some people discussing different aspects.

[00:23:57] But, you know, that's a good gauge. It's a good measuring stick. Hey, if these people have information about behavioral modification from MKUltra to Monarch to New Age, if they address it realistically, if they mention the communities, RAMCOA communities, you know, deliberate dissociative systems that are designed, so on and so forth. Like, it's clear if someone knows about that or not. If they don't know about it or aren't talking about it, it's a major red flag, in my opinion.

[00:24:26] I mean, you know, you can get to so many things besides that. But, you know, the number one thing is behavioral modification. The bigger the stage, the more important. It's not just, oh, well, they can't mention that. Oh, well, they can't mention that. But when you have Rick Doblin on and you fail to mention his past and they're presenting, you know, work that was used in MKUltra as therapeutic and this without warning and cautions of, you know, the downside of it. Because I think there are therapeutic elements that can be used in control settings in certain ways, in certain circumstances.

[00:24:52] But especially not for people that it's going to re-traumatize that had it used on them in a negative way, right? Right. You know, when they have that, when they're dealing with people that, you know, like Alexander and, you know, they're just dancing around stuff. And like, clearly, you know, just, you know, they don't know what's going on. Like, that's a major red flag. You know, they're being used at best.

[00:25:14] Well, and I, here's, here's the, I guess this leads into one of the topics I wanted to bring up was, I guess, the controlled opposition or the people who are still under control through, through some of their programmers or anythings within the survivor community.

[00:25:37] But just, just the, like the researcher community, the disclosure community, all, all of this kind of wrapped up in one. So those are the things that people should be looking out for. One, one thing I wanted to ask is how, how likely is it for just your average Joe to come across somebody that they should be concerned about?

[00:26:05] And concerned is kind of a big word here. And specifically what I mean is whether they're going to receive bad information, whether they're going to be intentionally led astray, or if they're going to find themselves in a situation that they might not want to be in. Well, you know, in personal lives, that's going to vary, you know, greatly.

[00:26:30] But as far as social media, and when you turn on the TV, I mean, a hundred percent, what's being fed to you is being fed to you by the same people that have controlled these faculties for a long time. You know, going back to Mockingbird, you know, so on and so forth. Like if you don't think the, you know, media is completely controlled by the powers that be that are not looking, you know, in the, to progress things in the best interest of humanity.

[00:26:58] Um, then I don't know what to tell you, but yes, what you're being fed, including what the algorithms boost generally will be agents of dis or misinformation. Now, it would be too obvious if it's just they're blasting you, blasting you. So like what you really have to watch for, I'm sorry, which is exposures being framed as new when they're very old.

[00:27:19] And I understand people want to get views and want to get headlines, but when they're exposing something that's not as publicly known, but like well established behind the scenes, um, be careful of that because some people will use that for credibility. You know, when you notice people that have guests on that, like have a mass information and you'll notice like, you know, they're not really going into the usual stuff or something. Well, they might just be using that person to boost credibility. Well, they wouldn't, you know, why would they have them on if they were part of the machine?

[00:27:46] Well, because there was nothing new presented or nothing that's really harming anything. And basically all they've done is boosted their credibility. And now people are looking at them as a source of truth, thinking that they're going there when in reality they haven't in any meaningful way. So, I mean, you know, as far as how much people do they need to be worried about that? I mean, they are coming at you and they'll be at the front of the line and they'll be at the second of the line.

[00:28:12] And then they'll also be like, you know, in the back waiting for the next loop, you know, just when you thought you got through them and are safe. Yeah. I mean, unfortunately, this is the day and age that we live with. But, I mean, at the same time, you know, it's just really you get to a place where you're dealing with reasonable standards and you kind of like have your own boundaries in this. And just don't put your trust in any one person because even the best people can be used or have something mistaken, you know. So it's more about the message and not the messenger.

[00:28:42] And don't be looking to like dive into like follow something and everybody says or think this is going to be truth. Like, you know, if if don't make urgent decisions because lots of times that's based on reactions to, you know, like if if not, if you're not able to change the world with your decision on this, there's no reason to rush into a decision. You know, so. Right. Yeah, they're coming right at you hot. So, you know. Right. And especially anything that gets you emotional. You know, it's like. Oh, yes.

[00:29:18] Why is this making me angry? Why is this invoking this response out of me? You know, that's that's one of the big telltale signs I've noticed. And one thing I do want to point out is there are some really great people out there. And but I do also want to highlight that you're 100 percent right. It's not the messenger. It's the message. Yes. And I agree. It is great people. But yeah, if you put someone on a pedestal, eventually they're going to let you down.

[00:29:48] Right. And so on and so forth. But yeah, it's just really, you know, the whole environment's about a short attention span. Right. They're they're encouraging a short attention span. Right. You know, they're encouraging a constant state of got to worry about the next thing. Got to worry about living the day to day, even if it's not finances making you live day to day. But there's new threats. So but so the important thing is to breathe, ground yourself and take it one step at a time.

[00:30:17] Don't be in a rush. And it's a lot easier to, you know, wisely apply discretion to information that's going in. You know, just, you know, just make sure you're in a good place to sort through things. And, you know, it's it's you know, it's not as bad. It's a lot easier to deal with, a lot easier to see through. And you kind of get to a good place and you start seeing through the facade and you can tell when things are thrown at you. So, no, no. Hold on. Right. So.

[00:30:47] So. So I do kind of want to shift gears just a little bit. But the second part of the title, at least the working title, as it is now, was the disclosures. Now, I kind of wanted to get into some some of the things that you yourself. What what are you focusing on? Like, what what are the things that you're trying to bring attention to? Thank you.

[00:31:13] So, you know, now, as far as like disclosing, there is, you know, important things that I think needs to be disclosed. I mean, the number one thing is, hey, we need to have a at length conversation. You know, one week of incredible experience, not necessarily. I mean, it was great, whatever. Experienced people that know how to talk about this. Hitting the major podcast. Right. You do one major loop of that. Like the world would have the context that they need.

[00:31:38] But, you know, at length conversations about behavioral modification, the communities that have long existed, what is known about the basis and like the methods and means that external parties can activate. They can trigger. They can activate mechanisms in people that have been through this. And then ways that these mechanisms are internally set up in people to where they will automatically be triggered if certain conditions are met, unauthorized disclosure, so on and so forth.

[00:32:06] The other thing is, it really needs to be disclosed, like common sense, reasonable, reasonable look at, hey, you know, these main journalists, these go-to sources for whistleblowers, so on and so forth. They're compromised. They're used as drag nets, catch nets to get whistleblowers and information. You know, then they will contact them. They'll be friendly. They might even mean well, but they're being used by a third party. But they say, okay, you have this information. Ooh, that's something big for the public.

[00:32:36] If it's unapproved, if it's deemed too sensitive, right, if the powers that be don't want it, you know, they'll try to suppress, contain that information and the whistleblower. Worst case comes to worst, they get retaliated on, neutralized, right? So what people need to really worry about disclosure is behavioral modification, having that full context conversation. And then why are people not presenting a safe way to address this?

[00:33:02] Because there are a lot of safer ways that doesn't take a rocket scientist to figure out, to address this in good faith, such as the protocols for organized safety, for example, which we can go into. But so when these people are, you know, already known to have exposed whistleblowers to leak information, to have been compromised, when they're brushing shoulders with people who are historically known to be involved with behavioral modification,

[00:33:28] institutions that are historically known to be involved with behavioral modification, so on and so forth, like, okay, this is too many problems. Why are y'all not providing a safer way to prevent damage when there's really no-nonsense ways to do this? It's very simple. So, yeah, I mean, so for me, for the disclosure, you know, before anything, to keep everybody safe and to provide context for necessary disclosures,

[00:33:52] behavioral modification must be addressed, and then the method that this information is making its way to the public needs to be addressed, which is through the compromised channels that are limited hangouts, gatekeeping operations, nets to catch more whistleblowers and information to prevent that exposure, and their artificial boosting, you know, on social media and otherwise. That's the number one thing, because until we have that, disclosure won't be real. It will be canned. It will be steered.

[00:34:19] People are happy that the conversation is moving forward, and they're getting some gratification. They're getting some validation. But in reality, it's minimally ticked box in order to garner your support or your complacency to let it play out with time that we don't have. And the reason this is so urgent is because as we speak, there are reclamation and closeout programs running en masse

[00:34:46] that were designed to be rolled out with this controlled disclosure in order to neutralize whistleblowers and information that would otherwise expose what is being whitewashed, where they're serving up a couple of the ways that are old. You know, oh, we're taking down Diddy. Oh, we're taking down this trafficking, blah, blah, blah, blah, blah, blah. But at the same time, those same parties are also pushing, for example, UAP disclosure. They're pushing for exemption for whistleblowers that were involved with crimes.

[00:35:14] In many ways, this is good, but it's set up so that the parties that literally program children with heinous methods can get exemption and then present themselves coming forward as heroes. This technology tradecraft rollout has long been planned, because now they can do the same behavioral modification with technology instead of the brutal, you know, playground, you know, sort of horrible methods. And it's a lot cleaner now.

[00:35:39] So in addition to this, they're planning to roll out technology. They're flying toys, right? You know, the billionaires and, you know, military intelligence wants to be able to use these publicly, as well as kind of like a mass surveillance grid, you know, which are being used for everything under the guise of health care and everything. In reality, a lot of this is behavioral modification transmission equipment that is used to control the populace

[00:36:06] through soft, wide-range frequencies just to affect in areas down to specific frequencies to people that have been conditioned. Okay? And they know that this increased rollout that we're going through, with this disclosure, new technology is rolling out. And it's well known, the adverse health effects that this will have on society at large. And ICD-10 medical insurance codes have already been established at Skinwalker Ranch in a study by Christopher Kitt Green.

[00:36:36] So they have already set up the ICD-10 codes to further treat the public of this mass increase in adverse health effects that are happening, coinciding with this rollout and are only going to get worse. Right. Let me mention that this rollout, that study that was done by Christopher Kitt Green, it was done at Skinwalker Ranch in a way presented that it's from unknown forces, possibly UAP, NHI,

[00:37:06] when really it's primarily exotic weapon testing and the behavioral modification. They built it, they did this at Skinwalker Ranch to make these codes. So as they're treating people, you know, with these anonymous health incidents, Havana syndrome and all that, they still have the plausible deniability to say, oh, this wasn't us, this wasn't the government, this wasn't the globalists. This was something unknown, and here we can treat you for it. But really, it's been set up. Also, Christopher Kitt Green sees all the, you know, special forces and so on and so forth

[00:37:35] that came into contact with things during missions. He gives them brain scans, you know, checks their injuries and all this. In reality, that's part of reclamation and closeout. Once there's a problem in these programs, these people are all already under behavioral modification. And what happens is he scans them, all this, debriefs them, right, and they're evaluated. Either they can be reclaimed, you know, move past this event and keep on utilizing them,

[00:38:03] or if it's deemed that they're unusable or they are remembering and disclosing sensitive information, then they will be what's called closed out, which can involve very heinous things to neutralize them, to affect their memory, to, you know, zap their brain into having brain injuries and close them out. And Christopher Kitt Green apprenticed under Puharik, which was one of the foremost mind-control doctors

[00:38:32] that is responsible for a lot of what's going on, you know, all this channeling, you know, the nine, you know, raw law of one, whatever, you know, all that is. He literally made that and was experimenting with these space kids and all this, like, set up all of this, set up all the behavioral modification, this new age stuff, and then it's being upscaled on the grand scale now. And his apprentices that were under him that were doctors in these mind-control programs

[00:39:00] are the ones setting up these codes as it rolls out. Like, I mean, it's there for everybody to see. Why are none of these headliners talking about it? Right. Right. So the way I've kind of viewed, like, all the UAP stuff, all the UFO stuff, is it seems like a convenient way to cover. Because the one thing that pisses me off the most, I think, about the satanic panic is that,

[00:39:29] so unless you are continually in the programming and going through it, eventually it's going to start breaking down, right? And so that was the first big batch of people in their 30s and 40s in the 80s and 90s where they were going to start seeing the repercussions of all these behavior modification programs.

[00:39:56] And they needed a way to explain it away, hence satanic panic. Oh, this is all made up. This is rogue therapists and psychologists or whatever. And so they're controlling the narrative and the counter narrative, which is exactly what it seems like now, since, like you said, they're rolling out this newer technology, the directed energy weapons, digital ID, CBDCs, like all of these different things,

[00:40:25] plus the ramping up of the 5G weapon systems. And I mean, things like neural grid. Right. It's just like 100% enslavement of people. And it just kind of seems like they're trying to explain it away with all of these UAP UFO disclosures.

[00:40:47] And I mean, it's long been known that the UFO community has been compromised almost from the beginning. And it just seems very convenient that now all of a sudden, out of nowhere, they're admitting that aliens exist. It's like, well, I believed them until you've said that they exist. Precisely. And it's actually, in my opinion, even smarter than the, you know, Satanist angle.

[00:41:16] And let's just remember that, you know, one, the false memory, you know, false memory syndrome foundation, you know, is just thick with CIA, former CIA and so on and so forth. Like, that's indisputable, right? And then you have ritual abuse statutes, criminal statutes, ritual abuse of children, criminal statutes that have exemptions for government research projects. Right. You know, like, so not even getting into that.

[00:41:44] But yeah, so I mean, are there some people that believe in that and do it? Yes. But this also used for cover plausible deniability kind of makes people seem crazy. And a lot of these groups that did that part of it, you know, are kind of like third party doing the base level conditioning that then certain subjects from that end up going up into the government in the program separated, you know? And then some people in the program aren't necessarily bad people. They all they know is, hey, we've got this person. They have these talents. They don't know what they went through in some cases. But, you know, it's right.

[00:42:14] It gets it gets complicated and convoluted. But when you come to now with this disclosure, you know, I'm not it's a it's an infinite universe. I'm not saying, you know, aliens aren't real and so on and so forth. Like, I wouldn't I wouldn't say that. But that they simulate phenomena and as a means to an end is factual and actually standard in this.

[00:42:39] And the reason for this is, you know, take Operation Northwoods declassified way back. What we were going to do was commit real terrorist attacks. False flag doesn't mean fake necessarily. Real terrorist attacks on our own people, on our own Americans and blame it on Cuba to justify war. OK, but if you blame it on aliens, if you blame it on NHI, if you blame it on UAP, one, it's not like Cuba is going to say, no, we didn't do that.

[00:43:08] Well, are the aliens going to come out and say, no, we didn't do that. This is a false flag. Right. You know what I'm saying? They can also use that for globalists from different areas that usually are overtly kind of against each other. Russia, China, U.S. Right. To have to unite, you know, under those false pretenses. But to unite and the people say, hey, if these guys that usually don't get along are, you know, talking about, oh, we've got a bigger threat. We need to come together. This seems real.

[00:43:36] And they might be able to pass something off that's otherwise a really hard sell. So it's really a very smart cover with plausible deniability. And, you know, it's just like just like I hate using analogies when some people do this, but it's just like a hammer. Right. You might hammer in the nail, but also it can be used to pry out with the other end. So, you know, say someone has real experience. Right.

[00:44:00] Well, then they simulate that experience with different ways, you know, and kind of give them something similar or expound on it. Either they piggyback and steer them or they do it. Now people say, OK, well, I'm now I'm remembering this and it's the same thing. But this was government. So I think the first thing was government. So, like, you know, you can't tell if someone has like a positive good experience, they can piggyback on that to steer them. If someone has a bad experience, you know, so they can use it. You know, it's used for more than one way.

[00:44:25] And like the main goal of anything is if people know something, you know, you know, you don't want them to be sure. So you just get it to the point where like, well, we got all this going on. The public, they don't know who to believe. They don't know what to latch on. So there's uncertain. And if you've got everybody, you know, you can create order from chaos. So like they might not even necessarily have overriding this here. Well, hey, let's just clusterfuck this and make it, you know, just to where people don't understand what's going on. And then we'll try to steer what we can from there.

[00:44:54] And it's also important that, you know, they need a few different agents in a few different areas that that basically are, you know, more desirable or kind of like resonate better with certain demographics. Because if you don't have a few options, you're always going to have your few stray groups. So, you know, they try to get a well spread and agents of the same people might genuinely be fighting each other in the public eye. And they might not even know that they're being used. Just like, again, the way, you know, wars are fought, right?

[00:45:22] You got people going way back funding both sides of the wars, so on and so forth. These same groups are literally the culprits of this. Right. And so, I mean, this is narrative control, counter narrative control, encounter counter narrative control. And then whatever they want to happen is actually usually what ends up happening because they're able to direct whatever because they control all sides. Yeah. And you know what? You might say, well, why is nothing happening? It's taking long, taking long. They might be fishing.

[00:45:51] They might be, you know, throwing in different stories and seeing which one catches on. And it takes a while for one to catch on. Right. But, you know, it's like, okay, if a situation that they don't want is happening, they'll just throw the kitchen sink at it and make so much going on. Everybody's like, whoa, you know, what's going on? They might have a big event to take attention over there. Whatever it is, you know, if there's something they don't want going on, make it real messy, make it impossible to tell what's going on. You know, and then make surgical strikes and try to get one that latches on. Right. Different bait, different lures, you know, different methods.

[00:46:21] Switch to the different part of the lake. You know, it's, yeah, it's convoluted. And, you know, there's, these people know what they're doing. You know, there's, they've had lots of practice. Right. I mean, it, you know, a lot of these people were able to, to teach, you know, these jungle militias in Central America, these things. It's like, I always think about the, the CIA guerrilla. Well, what was it? The Iran Contra. Yeah.

[00:46:50] The, so the Iran Contra, they, the, the CIA created the psychological operations manual that they were able to teach these rather, you know, less educated people, such a complicated subject very easily. So they, the, these people have gotten this, this stuff down to where they're, they're able to explain it to almost anyone if that's what their desire is.

[00:47:17] And I think it's interesting because I was always told that if you are unable to explain something to a child and have them understand it, then you probably don't understand it well enough to be able to explain it to other people. And these people have gotten to a point where, I mean, they're, they're able to just, they, they do it without even thinking about it at this point is what it seems like.

[00:47:46] So one, one thing I wanted to talk about, and then I wanted to move on to organized safety is poisoning the well. There, there seems to be a lot of people, and this kind of goes into, you know, the, the control of the counter narrative and counter counter narratives. But what are, what are some of these things that, I know you had brought up one red flag.

[00:48:15] What are, what are some other things that maybe should be brought to attention for people to say, like, hold on, wait a second, I need to take a closer look at this. Or maybe this is not something I should pay attention to. Of course, that's all like internal and personal for each individual. But what, what are some things that you would point out? Right.

[00:48:36] Well, it's hard, it's hard for me to point here, here and there, but I guess in general, like, so poisoning the well, you, you know, you hear the saying, like, you know, good diss or misinformation is like 90% true or 99%, whatever percent true, right? Mostly true, right? Because otherwise they wouldn't be able to get their foot in the door, wouldn't be able to get credibility, so on and so forth.

[00:48:59] But, so what you, what a real red flag would be is say there is a general or someone that goes by the term general, right? Who's, you know, and, you know, say there's people that love him, people that hate him. And there's different exposés of him where he's been dirty, right? So say you have, you know, someone that is exposing him, all his dirty ties, this and that, this and that. And like, there's some stuff that really makes sense, checks out with other people and all that.

[00:49:29] Then you notice certain attacks on him or certain exposés don't seem credible as much or aren't the same sort of thing or that they're also just talking about, you know, ridiculous topics. And don't get me wrong here. Like, I'm not trying to say, oh, people shouldn't talk about ridiculous topics because it takes credibility away from other stuff. I mean, if you are like someone who works to expose, yes, certain topics can cause you to lose credibility.

[00:49:55] But what I'm saying is, say you expose this person in some verifiable military corruption, you know, some other ties to organizations and historically. But then you are pushing some other aspects that are really out there exposing him for. They just don't seem credible. And people say, oh, well, they're just more dirt. They might not be right about that.

[00:50:20] What you have to watch is people will deliberately piggyback on what's already exposed and then slip in fake things that way. And also talk about wild stuff that way. You know, when it comes time, say, like, for whatever reason on the big news, right. Or like on the, you know, flood, what's going around, what's trending. I guess nowadays you'd say, say this comes up and then they look at like top accounts with the largest followers, right. They're not going to focus on the credible exposes.

[00:50:51] No. What they focus on is the piece of misinformation that was slipped in there. And they can say, well, this is disproved. And also look at what this person is talking about. This is ridiculous. Right. So then by proxy, everything else they say doesn't need to be disproved because they've already shown one thing to be so utterly fake and that these persons deal with ridiculous topics that, you know, the other real exposes, like they don't directly address that. It's just smeared by proxy.

[00:51:18] So you just really have to watch for them sneaking in that little bit. If it doesn't make sense, if it doesn't do that, like people can make mistakes, but look for a pattern of it. Say, hey, you know, yeah, that all information was already out. That all information was already out. That was information. Now, OK, this is new. This is kind of from you or from you and that other person. You know, there's other people in the community aren't really behind this. You know, you kind of got to look for a consensus. And when I say a consensus, I don't mean the popular consensus.

[00:51:45] I mean from privatized areas, from like focused groups that really deal with these areas. Right. If they're not on it, that's going to be a red flag if these big accounts are on it. I know people try to get ahead of the story and stuff like this isn't a perfect science, you know. Right. But yeah, you just got to really watch. If they slip something in there that doesn't seem right, it might not be that they're just wrong. It might be that they're deliberately slipping that in there. That way it smears everything else by proxy. Right.

[00:52:12] You know, that's that's the number one tactic to, you know, focus on one piece of disinformation that's inserted to smear the rest by proxy. You know, a similar thing happened with Pizzagate back then, so on and so forth. They kind of like focus on the one thing that just, you know, has problems. And then yeah, Pizzagate, COVID, 9-11, all of it. Exactly, exactly, exactly. They find one thing to focus on that they artificially boosted specifically to smear and smear the rest by proxy. Right.

[00:52:40] I call those people kooks, you know, the kook shit. Instead of spooks, kooks. Right, right. And, you know, because you like in the 9-11 community, like 9-11 truth is dead because of some of these people. You know, like you got the no planers that no planes ever hit the towers. And it's like, that is what? You know, and there's a couple of dingers.

[00:53:07] And if they're not focused on that, you have to question, you know, like, you know, like NORAD standing down and so on and so forth. Right, right. And it's just crazy that, like, it's just, I agree with you. Like, there's these certain things, and some of them are super subtle. Like, the subtlety kind of took over during COVID with some of the information being pushed out. Although you hear certain things like the lab leak theory. Initially, that was written off conspiracy theory.

[00:53:38] And now it's like everyone's like, well, yeah, that's exactly what happened. And, but at the time, I mean, people were censored for that. I think this is one of my biggest pet peeves, the term conspiracy theory in general. It's, you know, a weaponized term meant to just disparage and discredit anyone. And so people don't have to deal with it or pay attention to it. And like you said, to discredit things that might be real by proxy.

[00:54:08] Yes, yes. And, you know, people have to remember, conspiracy is a term that's widely used in the legal system. You know, I myself was charged with a conspiracy at one point in time. So, you know, what are people talking about? Conspiracy, like, that sounds like something that some people could be conspiring. And you have a theory about it. Okay, so are we going to prove or disprove that? Like, you know, like, yeah, it's obviously been weaponized heavily. You know, and it's, yeah, you're going to run into stuff like that. And another thing about, like, 9-11 is a big one.

[00:54:37] And there's a lot of big ones. But also, like, people have to be careful about throwing all their eggs in one basket. And just, like, hinging the success of exposure upon one event because it gets over-concentrated. They apply things to it, obscurate it. It's hard. You know, it's good to pick a few things and, like, you know, set reasonable standards and so on and so forth. You know, things can be drawn out and delayed in one subject that you're pursuing so hard, even if there's something real good, that they can run out the clock while new things are measured.

[00:55:06] Things are moved around. Now, by the time you finally get the truth, there's no one to be held accountable or responsible for it because so much time has elapsed, right? So you really got to watch about throwing those eggs in one basket and hinging success of exposure upon one event or one thing. And I know I say that as I'm like, well, it comes down to behavioral modification. But the way that's applied and, like, how that obfuscates all the issues, that's a little bit different, you know, but don't get me wrong. I'm also worried about specific advances as opposed to that. It's just, you know, that's kind of not the same way I'm saying.

[00:55:36] I just wanted to address that because it's slightly ironic or hypocritical. Well, and it is kind of ironic, but also behavior modification is also another umbrella term, you know, like that covers a lot of different things. And so it's an umbrella in an umbrella. Yeah. You know, so it is a little bit different because, I mean, there's so many aspects to it, but you should definitely never put all your eggs in one basket at all because then you end up with no eggs, just like everyone these days, apparently.

[00:56:10] So, okay, organized safety. What is it? What are you doing with it? What's the purpose? Like, where are we at? So organized safety, there will be more things rolled out. And, you know, we're in talks with different parties for funding and thus and forth. Like, I had been funding it with a small group of people. Unfortunately, due to retaliation, I was forced to close my business that I was funding, you know, some of these aspects of it for. So that has slowed down.

[00:56:40] But there will be survivor support for survivors of behavioral modifications, support for whistleblowers, so on and so forth. And also kind of like, you know, simple steps to help, you know, you know, just resources, so on and so forth. But primarily what we're focused on now and what's operational and active is organized safety is an outlet.

[00:57:06] It is an intake tip reporting form for survivors and whistleblowers of events that are typically protected, you know, whether it be some of those, you know, playground lovers rings that include some VIPs, very important parasites is what I would say. You know, just like, you know, Nygaard, Epstein. Think about all the people that reported on Nassar.

[00:57:34] You know, Larry Nassar with the Olympics. I went through some of this last time. Think about all the people that reported Sandusky. Think about all the people with Epstein. They got the sweetheart deal. There was multiple levels again. Just all this, right? Boy Scouts, Eagle Scouts. You know, you have the Explorer program for the police, right? To where they were getting the young recruits in there. All this, right? You have all these abuse things and then it ends up getting covered up in different parts, different parts. For people to report on that, you know, a lot of times it's an arduous, you know, event.

[00:58:04] Like, and they get blowback internally. The people that are dealing with them aren't necessarily kind. It can hurt. But also, they don't necessarily know where that information is going to be took. And it can compromise them. They can get retaliated on. It's really high impact on someone's life. And then also, it can be discouraging from them to do it again. So, what organized safety is, it is an end-to-end encrypted intake form.

[00:58:32] You can completely anonymously submit information. You know, we have four categories. One is person of interest. And obviously, like, you know, it's a very, it's very well formatted. So, it kind of asks the questions that need to be asked, right? To kind of help because sometimes people don't know where to start. So, then you have location of interest, again, right? And location and person of interest also have small categories where you can associate with either previous reports or with different people, locations, accomplices, right?

[00:59:01] And so on and so forth. But if there's, like, in-depth information, you do need to submit one for a person, one for a location. Again, you can list accomplices and so forth. But, like, if it's in-depth information, it does need to be a separate report. But so you have person of interest, location of interest. You have just basically other general report, which is just, like, kind of, like, free done, you know, just, like, blank space to write whatever you want and, you know, file upload, stuff like that.

[00:59:28] And then you have, you know, help organize safety, which is, like, if you have some expertise or so on and so forth or you want to help, you know, fund, you know, for survivors and for the process, so on and so forth, anything like that, that's on the forum as well. But so the key to this is, before we get into the background of it, is that it's anonymous submission and it's encrypted. As low in impact as possible. You just type it, goes away, boom. No one has to know it was you. You got the information. It's going through to places.

[00:59:54] But if you would like, and what we do is recommend that you use, like, a Proton mail email address, we recommend you starting a new email address that you keep so you don't lose it. And obviously end-to-end encrypted, right? So we recommend that you can leave that. And there is an option for, one, to get a copy of your report. Two, for you to be contacted if there is cooperation detected in our system, okay?

[01:00:22] So if you reported, you know, suspect A by name, obviously, right? And then there's other reports of that person in our system, boom, detected. And we can have a liaison contact people independently and then see if they want to discuss each other. It's important as a first step that they didn't know each other because that provides blind cooperation, which is a lot more meaningful, okay? Right. So there is the option to get a copy of the report, an option to get notified if there is cooperation.

[01:00:50] And then the third option is if you're not as worried about security, you can allow permission to be contacted just for general follow-up questions and so on and so forth like that, just, you know, if you're not as worried about security. So the thing is it's a smart system that builds blind cooperation. You know, of course, getting towards preponderance of evidence for civil law and getting towards burden of proof for criminal law, right?

[01:01:14] So that's what it's all about is it's about a low impact and as safe as possible for reporting, for giving tips, you know, suspicious activity reports, right? And then also a method for building blind corroboration with the option to be notified of that to link up with people. Imagine if all the people reporting Epstein went to that and then were able to get together with competent lawyers that really wanted the right thing to address it.

[01:01:43] And then you go and say they're giving him the sweetheart deal anyways, right? Well, guess what? All those people already together and then we can leverage public attention to say, hey, no, don't let them brush this under the rug. You see what I'm saying? So basically, yes, it's as safely as possible is a report intake form. And it is, you know, blind corroboration, building the database. And, you know, obviously in the background, that information is also being used very responsibly and safely, but strategically to affect change in the background as well.

[01:02:12] So, you know, it's just really a smart system to address these protected, you know, protected crimes, corruption, so on and so forth. And there's nothing really quite like it that exists. And, you know, people should be asking themselves why. Right. You know, especially, you know, for this very thing, like all this really ties in heavy with behavioral modification, which is a large reason the Epstein thing was, you know, covered up and stuff.

[01:02:40] But, yeah, so it's just really a smart system. And keep in mind, so tying in with the behavioral modification, you know, let me, I guess, touch lightly. Taking Epstein, for example. Those weren't just, you know, PDF rings with VIPs that were all there for pleasure. Some of it is involved with behavioral modification to where they are training some young assets to become honeypots, blackmail, stuff like that.

[01:03:06] And then sometimes these VIPs are tied in with military intelligence and trauma bond to them as handlers when they're young. Just like someone would bond to a dog that's been trained, right, in different ways, whether it be for, you know, detection or whether it be, you know, for personal property protection, executive level, you know, so on and so forth. So these people go there to learn the triggers, the activation sequences, how to handle.

[01:03:33] And then they actually trauma bond with these assets that they can trigger, activate, and use. And they end up making a network of them inserted in all different places in life. So that's why a lot of this gets covered up. Now, going back, organized safety didn't just start out of thin air, okay?

[01:03:52] It started inspired and expounding upon the work of Valerie Wolf at the 1995 Advisory Committee for Human Radiation Experimentation. And there was a presidential hearing committee that heard this testimony. That was Bill Clinton, correct? Bill Clinton ended up making an apology that slightly whitewashed this. But yes, he ended up making an apology for all this happening at the different institutions.

[01:04:21] The main focus was on the radiation testing and things like this, which, by the way, were done in conjunction with seeing how some of these advanced physics and frequency, you know, whether it be propulsion systems on advanced aircraft or some of this behavioral modification frequencies, seeing how it tested on people, finding people that were more resilient to breed. But also, specifically, the underlying base conditioning applied to all personnel. Manchurian candidate level, but not single-use Manchurian candidate, Patsy.

[01:04:49] We're talking about Manchurian candidate level, base conditioning that applies to many different models, okay? In a week and a half in 1995, before all of the internet and easy networking and communication, while people were scared for their lives, in a week and a half when Valerie Wolf, who was a dissociative trauma therapist, heard that she, you know, got the go-ahead to provide the information she had at these hearings,

[01:05:16] around 40 therapists contacted her with tons of information from their patients, and they had blindly corroborating information of culprits, perpetrators, of locations, of program names, of methods. Right. And they brought that forward relating to mind control on children. Behavioral modification is mind control, but we're talking about specific Manchurian candidate level. There was two models disclosed.

[01:05:41] Chris DiNicola gave her testimony, which was basically Delta spy assassin training, and also mentioned that they tried to get her to commit Omega programming, which is self-termination, whenever she started remembering, which is one of the reasons these people that deal with this, whether it be journalists or otherwise, have to become familiar with this so they don't mishandle people and cause problems. Right. Or expose them to third, malicious third parties that will cause these problems deliberately, who are looking and actively setting up situations.

[01:06:11] Then there was another, Claudia Mullen disclosed what's known as Beta sex slave honeypot model. Okay. You know, and some people end up, some people end up, you know, being a multifaceted model that will have Alpha, which is kind of base programming, Beta, Delta, you know, Theta is what some people have heard of, the psionic assets, that's a Theta. There's different things like this. So there was only two.

[01:06:39] Just before you move on real quick, this is kind of based on brainwaves, right? Like the Alpha, Beta, Delta, like all of these things. Largely, but not only because even for each programming, like a lot of the brainwaves definitely is part of it and crucial. Right. But all of these exist in isolated neural networks, it would be the term. Nowadays, if you get into certain fields, they call them internal family systems.

[01:07:08] You know, way back, they would be called multiple personality disorder. In the middle, you have disassociative identity disorder or in the DSM-5, disassociative not otherwise specified, disassociative disorder not otherwise specified, you know. So, but it's basically essentially programming, a programmed system. So you'll have different models with different Alpha, Beta, you know, Delta, blah, blah, blah, combination of them. And they are, some of them end up being politicians, bureaucrats. Some of them end up being law enforcement.

[01:07:38] Some of them end up being a doctor. Some of them end up being homeless. Some of them end up being a school teacher. Some of them end up being a handyman. Some of them end up being a commercial cleaner that have keys and access codes to places all over town, so on and so forth. They strategically place these people all over. Not every one of them is active duty. A lot of them, the majority, are what's known as reserve or sleepers, okay? Not all of them will be tapped.

[01:08:07] But if they get in a useful position or otherwise needed, they may be routed. Or if they are in place and it's beneficial, then they will be tapped and utilized. There are schedules for maintaining these people who are listed and tracked, what's known as HCS human control systems, human intelligence control systems. And they are monitored throughout life.

[01:08:29] This goes back to original Project Talent, which selected gifted people and then monitored them throughout life under the NDEA, which ties in again to GATE and all these subprojects where they were going through this development and different testing. And, you know, all this is tied together and, you know, rolled into Monarch as part of the breeding program to where people are monitored, you know, put on lists, monitored for life. Some people get more programming.

[01:08:59] Some people don't. But everyone that makes it to this list has that base programming. So, anyways, the work of organized safety was based, inspired, and expounding upon the work of Valerie Wolfe and, you know, her associates who exposed this, who disclosed this at the 1995 ACHRE with the blindly corroborating information. You know, and we have been launched since 2013, okay?

[01:09:27] I've been doing this over a decade personally, which I am the founder of organized safety, and I'm the only one that's actually went public, which is why I'm kind of the loudmouth liaison now. There's a lot of people with way more expertise than me. I've been doing this over 10 years, okay? They, at this point, have been doing it over 30 people that I'm still working with, okay?

[01:09:47] So, you know, there's already a lot of existing information that brought this here, but we're launching it publicly now is more of a poll for as contemporary information as possible, if that makes sense. So we can really apply this. We've, you know, sent samples to different people. You don't want to know how depressingly bad it is on the back end, but there are people that are being made aware in the right places and progress being made.

[01:10:10] But there is a reason that there's not intelligent designs like this from other parties, and, you know, like it's irresponsible of people not to come up with safer reporting ways and ways to put this together. It makes no sense other than the fact that it makes perfect sense in a way that you don't want it to, you know? Right. So ultimately, it's going to be a database. Is a large database already. Is a database. Yes.

[01:10:38] If I told you the number of corroborating points, it might not be believable. But this is, again, been going over a decade with groups of people coming out of these, some left with their own databases and lists that they were handled in their charge because some of these were so completely contained and compartmentalized operations. You understand. Right. Also with plausible deniability where some is not claimed. A lot of the information we have isn't even technically classified because it technically doesn't even exist. But. Right. Right.

[01:11:06] So with, with, with that. How is the, I guess, how is the database used? Like are journalists able to get a hold of it? Obviously, like this, this is something that you're not just gathering it just to have it. Right. Like it's, it's going to be used. So I guess. Already is. Yeah.

[01:11:28] I guess what I'm asking is how, how is it able to be used while you guys are able to, I guess, keep control of it without it being compromised. Right. Right. So as with anything, right? Like, I mean, it did, you know, what's the cutting edge technology? All this, like, here's the deal is, you know, it's end to end encrypted. We don't host the intake ourselves. And the reason for that is there's good reasons for that. Right.

[01:11:57] But so, you know, the host of this should not even have access to it. And, you know, by all accounts and methods, they do not. It's not kept on that long. You know, there are dumps from the host system to our private database that is completely offline. And that happens regularly. Okay. Right. So it's not hooked up to the internet in any way, shape or form. The bulk of this is not hooked up to the internet. It's completely isolated. Okay. Right. People are made. So people make these encrypted tips.

[01:12:26] It goes, goes into the database. Everything's completely offline and gets analyzed there. Okay. Obviously, if people, you know, collaborate and stuff like that and it merits it and they've agreed to, you know, there are some liaison contacts made, so on and so forth. Meanwhile, with that, it has been building the network so we can see what things are getting funneled through because, you know, a lot of, a lot of what's going on is, you know, ran

[01:12:51] through family dynasties is ran through, you know, private parties is ran through temporary front shell organizations that are set up and then closed down, you know, so on and so forth. Right. So like, to give an example, one, we use it for investigation and to understand the network, making sure if only one person has reported a party, you know, and we think that they might not have been exposed elsewhere. We're not doing anything that would, that would lead back to them, even if they haven't named themselves to us. Right. If that makes sense. Like, we're very careful.

[01:13:20] You know, most of us come out of behavioral modification systems and have been like actively, you know, healing and, you know, in a professional manner for well over a decade. Like, this isn't anything to play with. Right. It was a long time, even with the system that I designed and moving forward, it was a long time before I even gained access to a bulk of things to act on it because it is no joke. We take operational security very seriously. Right.

[01:13:48] Certain elements, if enough is named and we're not worried about like exposing it and watering down, like if something's not named, it means a lot more if someone names it. If someone names like at this point, you know, Clinton, like it's like, well, everybody's named him. It's not like a huge deal. Right. So like if something is to a certain level, you know, we might start addressing it publicly. You know, certain things are put out there. We use it for investigations, for information, dissemination. But also once we have some of this collaboration and so on and so forth, one thing that had

[01:14:16] been going on recently leading up to where me and some of my associates were retaliated on, but not actually the people involved with giving these tips because they weren't shown. But what we had was, hey, we are going to get some key cases. We liaisoned with the witnesses and they completely advised them of the risks and so on and so forth. They are on board. We said, hey, we have a line to some law enforcement. We have a line to some exposure here with some bureaucrats, whether it be, you know, staffers

[01:14:46] through Senate, select committee of intelligence, you know, armed forces committees, so on and so forth, whether it be showing to direct bureaucrats, direct politicians, so on and so forth, which we're very careful about because we know that some of these people are under behavioral modification themselves. Like, you know, we're experts in behavioral modification, which is the first and foremost thing that needs to happen. So, you know, what we were doing was we say, okay, we have a couple sample packages to where we're showing you a little bit of evidence and a little bit of the witness testimony and

[01:15:14] the person being named, the location being named, so on and so forth, just to let you know we're serious. Let them know about the system that we have a large database. But before we start handing over any information, we need to know where the information is going. We need to know that you're safe and secure. And that we're not exposing people without a good shot of actually being effective. We're not here to just turn it over as we get it and then hang people out to dry. If we were going to do that, they should report it themselves. You see what I'm saying? So we really go through everything, find what's credible, find what's actionable,

[01:15:45] carefully present it while keeping witnesses informed, stabilizing it. And so to speak, one thing, because like it can be stressful if someone's saying, hey, I'm taking your testimony, going to show it to some people on the Hill at DC and like, you know, we might need you to testify. Like, oh, you know, like it's stressful, right? So like, you know, we get permission to let everybody know and so on and so forth. Show some sample packages is what we call of it, what we call it. And then, you know, kind of take it from there and see if these people are acting in good faith.

[01:16:14] See if these people are serious because a lot of these people, unfortunately, that are in place, whether it be in key places in law enforcement, whether it be in these committees, whether it be whatever, a lot of these people are actually made it there, not because they're good at what they do, but because they are weak and controllable. And that's just facts. I'm not here to offend anybody. But anyway, so yeah, that's kind of like what goes on with that information flow. We use it as safely, responsibly, strategically and effectively as possible.

[01:16:43] And if we're progressing in any serious way that would ever even remotely expose someone, we coordinate with that person parties prior, of course, you know, which is like it's got to ask more questions. Like, look, not a rocket scientist. You know, neither are the people I work with. Why do we have that? You know, why are we doing this? What are y'all doing? Like, this is a clown show. I'm sorry. And I hate using these cliche terms, but it's bad. It's depressing. It's scary to see how inept some of these people are, to see how compromised they are. And they keep on pushing, well, no, we just need this.

[01:17:13] We don't want this. We just want a pilot that was involved with recoveries. Like, hold on. You just want us to feed a little enough that you can chop it off without any blowback on your end. We're not doing that. We're not doing that. If we're going to do something, we're going to know that there is a conducive situation. And unfortunately, on the back end, that's very limited. So now what we're doing as I go public is we're kind of bringing the principles of this, the common sense and explaining it. And then leveraging public attention.

[01:17:42] One, so people like me and others are a little bit safer because we're under the public eye. Two, so we can get some public attention to leverage the existing channels to do their job. You know? Right. Right. And so it kind of, I mean, how many stories have you heard a journalist or investigative journalist, a researcher, somebody just gives over information and disappears. And it just never goes anywhere. Yeah.

[01:18:11] I mean, they're used specifically for that because they're already set up in place. I'm sorry, but the majority of these journalists aren't there because they're good at exposing crimes or corruption or anything like that. They're there because they have vested interests. And people that handle the situation, you know, understand how to manipulate these people. It's not hard to pull people's strings, especially if they have vested interests, you know, whether it be fame, whether it be money, whether it just be, you know, anything in between. So, I mean, you hear all the time.

[01:18:40] And just to be honest, I use myself because I've already been publicly exposed because, you know, the coal bridge already know who I am, so on and so forth. And I'm not the only one, but several of us kind of ran skirmishes and, you know, were basically canaries. You're familiar with the canary in the coal mine. And if the air is bad, it will go so the miners can get out. Right. So basically we were playing canary to keep the people behind us safe and say, okay, we're going to go through these channels, see what happens. Yeah. Our information is leaked. Yeah. Retaliation. Yeah. This and that.

[01:19:08] Because these people are in place, whether they're inept, right? Whether they are complacent, whether they are complicit, whether they're corrupt, you know, compromise is compromised. And what's happening is, you know, there's only approved information is being released. Okay. If unapproved information comes through and the person's not willing to play ball, you know, then there are forces at work to neutralize these people. They want to suppress.

[01:19:37] They want to contain. First, they'll string them along. They say, okay, well, don't talk to any other journalists. I'm going to work for this, but you know, I need to focus. Hey, it's taking a little longer. A lot of good information on the back end. You know, just wait, you know, hold on to this. Hey, I need you to go dark for a little bit. It's hot right now. It's shady. Like, you know, every little thing in the book. Some of it for compromised situations. Some of it, some of it not, you know, some of it just, you know, just them like having

[01:20:03] vested interest in being selfish and being, you know, pompous, exploitative, you know, so there's everything in between. But yeah, the standard for it, like, you know, they're not, I don't know any big journalists at all. And I've went through the big ones and tested as well as like, I don't spit out too many numbers, but plenty of people I know personally and have seen the communications, including recorded calls, including recorded video calls and including, you know, logged messages.

[01:20:32] Like I've seen how this plays out and I can for a hundred percent fact tell you that these top journalists and these headliners are compromised at best. Bad things have already happened to several people, including myself and associates. It's, it's real bad. It's not safe. And they could be doing better, but they refuse to on purpose. Right. So I guess the, the, the last question I have about organized safety is what is, what is the end game?

[01:21:00] What, what is like the, where, where does it go? What, what is, I mean, obviously this is like you, you have a goal that you want to be able to reach and you have the little goals leading up to it, but where, where, where's the big goal that the actual end game? Right. Well, I mean, I don't necessarily think that we have an end game as much because, you know, it's kind of like an ongoing service that needs to be done.

[01:21:30] If you know, you're reporting, it's not getting done or, you know, something's compromised or whatever, like we still will always facilitate building information and connecting the right people to pursue justice. Right. So that will always be happening. But what we're trying to do is, and, and keep in mind too. So like one of the things now we're just scaling up to do, cause this just went public. Right. Right. What, you know, what we're looking to do is like, we've made standalone systems in the past that's based on the same principles.

[01:21:56] But say if people in a local community, like know a pastor that's done something, if people have heard about something happening in the school, a coach has been doing something right. It might not feel safe to report to that school. So say we make a standalone system that these concerned parents or something get together. We, you know, talk to a group at length, see their good faith and all that, and they can run a standalone system completely separate from us that we don't have access to. And then they can be like, Hey, scan this QR code. If anybody needs to report anything fishy and see. Right.

[01:22:24] So like facilitating local activity for people to safely pursue justice in their own community, finding more members of the team that are, you know, are willing to help and give their expertise. But really what we're looking to do other than the information in database, all that is to create funding to help individual survivors because it is a horrible situation for them.

[01:22:50] And the only other ones that really are helping survivors are mostly faith based, which is great, but not everybody feels comfortable with that relates to it. Not everybody qualifies. So, you know, we're just trying to in general help survivors of behavioral modification and whistleblowers, so on and so forth. As well as we'll be building resources, having a forum for people to kind of safely discuss social media. There are people hunting for survivors to announce themselves, pull their strings, you know, say

[01:23:18] disparaging things, upset them to exploit them or whatever. Right. So like kind of creating a safe place for people. And there's already longstanding survivor communities that have this as well, to be clear. But so we're looking to build that, but really looking to build the resources, especially. So I guess really that the idea is to stay on on the heels of these people. Right. Yeah.

[01:23:44] I mean, the thing is, like, you know, we're here to disseminate information publicly that will assist in exposure and the restriction of crimes and corruption. Right. You know, and educate the public to demystify some of these kind of out there aspects and kind of cut through the BS. But also, obviously, to help survivors, you know, actually make a healthier transition and move forward, finding some closure that they can and getting the support that they need

[01:24:13] to move on as much as possible in a productive manner where, you know, they can help, you know, where they can just take care of themselves and, you know, flourish, you know. Right. Honestly, I absolutely love that, which is one of the reasons I wanted to talk about it and have you on again is honestly, I think it's it's you're doing God's work. You know, you're in regardless of whatever that looks like for whoever as you're watching this or listening to it, you know, whatever your God is.

[01:24:43] I just think that this is the good that's fighting against the evil out there. And honestly, I'm proud to know you, proud to call you a friend. And I just couldn't be more excited that people are actually standing up because the one thing I can't stand is people who understand that something needs to happen and they just don't do anything. They just stand by or they choose to ignore it.

[01:25:10] It just it irks me on just like such a deep level. It just burns, you know. And so I'm just really happy that this is going on out there and I'll do anything I can to get the word out. Uh, anything I can to help what whatever whatever I can do, because this this is something that is incredibly needed. Um, like you said, there's a reason why this hasn't existed before.

[01:25:37] And the fact that it does, I think, uh, the the people actually fighting for good needs need need to do everything they can, even if it's just as simple as share a social media post to be able to protect this. So with that, where what what can people do to help? Uh, what where can where can they go? What what can people do? Uh, say if they have expertise that they're willing to offer, um, or if they just want

[01:26:05] to give you some money, um, help fundraise, like what where can people go and what exactly are you guys looking for? Thank you. I appreciate that. I really appreciate those words. And, uh, and, you know, we're not trying to have a monopoly on doing this. We're about the reasonable standard and safe action, you know? Uh, so, um, but you know, there's certain boxes that do need to be ticked to do things right and safe, you know? So, uh, you know, and we don't even have like donation channels open just to be clear.

[01:26:33] Like this has never been about this right now. Right. Uh, what we have is organized safety.org. That brings you to the encrypted form for channels. Just like I said, if someone wants to help, you know, contact us through help, you know, contacts through help organize safety. Otherwise, if they have a tip, the other three options, you know, whatever's applicable. Okay. So organize safety.org, you know, w you know, we're looking for all kinds of help. You're going to know if you got a way to help, then, you know, give us a holler and let us

[01:27:03] know what you're thinking. We'll let you know what we're thinking. You know, uh, that's really what it comes down to. Um, I'm not trying to restrict to a certain area. And just to be honest, other people that I work with have more expertise on certain things. You know, uh, we just have to evaluate it on an individual basis. If someone wants to help and do that, we soon will have, you know, some, uh, donation lines more open. I mean, there are ways to obviously do that in context if you're looking for that, but the channels on that aren't quite open as to where you can just click a button yet.

[01:27:33] But if, you know, obviously, you know, it can be facilitated. Um, but, uh, yeah, we're just, uh, we're really getting this together to push hard. And, um, it's, uh, it's just, we need public attention. Uh, and you know, we need help. We need as ridiculous. It is. We need help boosting social media and public attention so we can leverage attention to demand conversations.

[01:27:58] What I personally, uh, would like is to get certain people in live conversations to where we can drop lines of questioning and lines of reasoning that they can't prepare for to wiggle out of. Right. Right. Um, that's, you know, there's only extent of that. We're not trying to trap people and fight them. No, but we're trying to get accountability and responsibility and we're sick of lies and we're sick of people having time to prepare and give a public relations statement of BS. Right. So anyways, organized safety.org. And we appreciate you.

[01:28:27] So on that, I think we'll wrap up here. Um, we're, uh, coming, coming to the, the, uh, closeout mark and everything. And, uh, I can't think of a better way to end this anyways. So, uh, uh, any parting words, uh, let people know where they can find you, um, what you have going on, what you want people to know and anything. Go for it.

[01:29:18] Thank you. And, uh, caring, compassionate host that lets people talk. Um, you want to look for the imagination podcast. She has one of the largest libraries with full at length, um, conversations with these survivors and you will see, you know, what all common threads go through all of this. So I can't recommend that enough. That's my love and my wife, Emma Catherine. Now, other than that, you know, uh, I have my own personal thing that I do, you know, uh,

[01:29:48] I'm also strategically theatrical in ways. Um, and, you know, when kind of reaching to hit a demographic, uh, myself, that doesn't always really resonate with other ways, these things are disclosed, especially with certain survivors. Um, so, you know, I'm kind of reaching out my own thing, which is a little bit rougher in ways and so on and so forth. You, you know, you can find me around, you know, on the internet, so on and so forth. Uh, there's a lot of slander and things like that too. You also just be careful who you follow and be careful what you listen to.

[01:30:15] You know, uh, I'm ready to have any at length conversation full and live. Um, keep in mind. Yes. Rumble when you're at imagination podcast, she had her YouTube deleted. It's going back up, but it's just like, you know, it's not stable, you know, and it's unfortunately like it's going to be deleted anytime. So, you know, follow her on rumble. Um, sub stack is great. And I'm about to release a series of articles on her sub stack as well.

[01:30:41] That's really going into like methods and exact things that have not been disclosed ever and really contemporary methods. Um, and just as well as like just shining some lights on some deep aspects and showing the exact like, you know, flow of some of these organizations and what's involved in just giving a, you know, certain insight. Um, but yeah, so Emma Catherine, the imagination podcast on X is at the Emma preneur and, uh, on rumble and, you know, a host of other things, sub stack.

[01:31:11] And, you know, me, I am gray area monarch on X and gray area operator on other platforms or just gray. And again, organized safety, organized safety.org. Thank you. Hey, thank you so much for coming back on. Um, definitely want to get you back on. I think there's so much more that we can talk about. Plus I want to keep up to date on what organized safety is doing.

[01:31:39] Um, like I said, I think this is incredible work that you guys are doing. Um, and I just, I'm so excited because it just seems like things are happening and this is something I want to support. I can't wait for that t-shirt. Um, I'm so excited to start getting some of this merch. Um, we have that in route by the way, because you know, there's a few things we have, but we have some awesome, like stuff to where it's like crazy glow in the dark that holds like

[01:32:08] a strong, better than other stuff. Like, you know, there's all sorts of stuff. Yeah. We, and we're going to be distributing some like free and stuff like that too. Um, but you know, obviously we're going to have a merch thing too, where people can support it like that because also we're hoping to catch it on. So I, you know, yeah, I forgot about that. And we have some of those, uh, you know, cause we got like the press and all that. So that's, that's in route right now. So that's about to, uh, step up as well. So hell yeah, I am so stoked. And, uh, Hey, thanks again for coming on everyone.

[01:32:37] Make sure and go check out everything in the episode description. Everything will, will be down there linked, uh, to Emma's podcast, her, uh, her X account, also all of, uh, gray and organized safety, everything that you can find down below. So make sure and do that. Other than that, make sure and go to rise to liberty.com slash links. Um, the best places you can find me are telegram, uh, X, and I'm actually using my sub stack more.

[01:33:06] So you'll start seeing that. Uh, I've also got some articles that are, uh, like 90% done there. They're on their way, uh, very soon. So, uh, be keeping an eye out for that. There's some really cool stuff. I just released not that long ago, a list. I think last I counted, it was two or 300, um, uh, confirmed and alleged CIA front organizations. It's just a huge list. Uh, it took a lot of work.

[01:33:34] And of course, anyone out there that, uh, knows of any corrections that need to be made or anyone that needs to be added to it, go ahead and, uh, send that. Uh, there's different channels that you can reach through contact, but, uh, that's, uh, rise to liberty.com slash links, which does have a contact tab on that. So other than that, I would like to thank you for watching. If you found this useful, please hit the, the like, the share, the subscribe.

[01:34:02] Our big tech overlords do not like these conversations to get out to people. So make it, this is entirely, uh, viewer, listener and, uh, subscriber funded and grown and everything. So go ahead and share this. Uh, otherwise that's, that's the only way it gets out. That's the only way that gets out. And this, these are incredible conversations that need, uh, more attention. So go ahead and do that. Gray, hang out for just a sec.

[01:34:30] And otherwise, uh, thanks for, uh, tuning in and until next time. Stay free, my friends.