Epstein Palantir Thin Thread – Intel Ops w/ NSA Whistleblower Bill Binney Dr. Katherine Horton

Spread the truth

KIrk Elliott Offers Wealth Preserving Gold and Silver
5G

 

📰 Stay Informed with Sovereign Radio!

💥 Subscribe to the Newsletter Today: SovereignRadio.com/Newsletter


🌟 Join Our Patriot Movements!

🤝 Connect with Patriots for FREE: PatriotsClub.com

🚔 Support Constitutional Sheriffs: Learn More at CSPOA.org


❤️ Support Sovereign Radio by Supporting Our Sponsors

🚀 Reclaim Your Health: Visit iWantMyHealthBack.com

🛡️ Protect Against 5G & EMF Radiation: Learn More at BodyAlign.com

🔒 Secure Your Assets with Precious Metals: Get Your Free Kit at BestSilverGold.com

💡 Boost Your Business with AI: Start Now at MastermindWebinars.com


🔔 Follow Sovereign Radio Everywhere

🎙️ Live Shows: SovereignRadio.com/Shows/Online

🎥 Rumble Channel: Rumble.com/c/SovereignRadio

▶️ YouTube: Youtube.com/@Sovereign-Radio

📘 Facebook: Facebook.com/SovereignRadioNetwork

📸 Instagram: Instagram.com/Sovereign.Radio

✖️ X (formerly Twitter): X.com/Sovereign_Radio

🗣️ Truth Social: TruthSocial.com/@Sovereign_Radio


Summary

➡ The article discusses a product called Sloop, which mimics the effects of exercise and has been shown to increase endurance and muscle mass. It also mentions an interview with NSA whistleblower Bill Binney and Dr. Katherine Horton, where they discuss topics like surveillance, the NSA’s Thin Thread program, and the role of big tech companies. The article also promotes a peptide sale and encourages readers to subscribe to the author’s newsletter.
➡ This text discusses a technology that can quickly gather and analyze vast amounts of data from around the world. It can track relationships between different data points and sort them efficiently. However, it also highlights concerns about privacy and misuse of information, as this technology can potentially tap into any communication line. The text also mentions the limitations of similar technologies like Palantir, which failed to meet the expectations of the Dutch police.
➡ The text discusses surveillance and data management by the NSA, and how it could be used to identify and track criminal activities such as pedophilia and drug trafficking. It also mentions the misuse of this data for blackmail operations by elites and intelligence organizations. The text further discusses the Epstein case and the potential existence of a client list, suggesting that the information could be used for blackmail. The cost of this surveillance is questioned, with the suggestion that the hundreds of billions of dollars flowing to the intelligence community could be better used.
➡ The text discusses a series of events where the speaker believes they were targeted due to their work. They mention high-definition videography being tampered with, their laptop being connected to the state capital and Washington D.C., and their experiences with censorship. They also discuss being physically targeted, with the speaker losing their legs due to recurring flesh-eating bacteria infections, which they believe were intentionally caused. The speaker suggests that these actions are part of a larger strategy by the government to control information and silence dissenters.
➡ The text discusses the potential benefits and drawbacks of mass surveillance. While it can be used negatively for control and profit, it also has the potential to identify and help individuals with mental health issues from a young age. However, the misuse of this technology for harmful purposes is more common due to the easier monetary gain. The text suggests that to use this technology for good, we need a dedicated organization, much like an immune system, to regulate its use and prevent misuse.
➡ In 2006, while working for Customs and Border Protection, a technique was used to identify companies that were ordering parts to build IEDs (Improvised Explosive Devices) to use against troops in Afghanistan and Iraq. These companies were operating outside of Iran’s restrictions in Dubai, United Arab Emirates. Despite the success of this technique, when it was proposed to be used on a larger scale to identify potential smuggling or illegal activities, it was rejected due to lack of resources and potential involvement of powerful individuals. This refusal to use a proven method to combat illegal activities has led to ongoing issues and potential suffering for many.
➡ The discussion revolves around the growth of organized crime due to lack of taxation and regulation, leading to a monopoly on crime. The speakers express frustration over the suppression of real investigators and journalists, while fake ones are promoted. They also discuss the concept of ‘deep capture’, where criminals take over leadership positions, leading to corruption. The conversation ends on a hopeful note, emphasizing the need for solutions and not giving up despite the challenges.
➡ Sarah is expressing her gratitude and well wishes, thanking the program and its contributions.

Transcript

Sam Sa they can come in anytime you go online. They can come in across the network and penetrate their system and drain everything you have. But use deep friction. Yeah, yeah. So that you can’t do. And then all the hardware backdoors and everything else that we read about in the last couple of years and then there are ways then they could use that to go back at the encryption. So just because you retweeted, you know, Epstein, doesn’t mean you were one of his clients. But the point is that the NSA has the telecommunications side that will have the content that is absolutely unmentionable publicly.

Quick break from the program to share with you something amazing. This is called sloop. It’s actually SLU P P330, but it’s been shortened to Sloop. And this thing mimics exercise. It seems too good to be true. I first shared this on my sub stack and I had Dr. Diane Kaiser and we went through all the benefits of this and the whole thing sold out. You can’t get it anywhere really across the industry and the people who are using it the most are athletes and bodybuilders and people who want to see extra performance in athletics. Because this in preclinical studies with mice increased their endurance by 70% and their distance by 45%.

I mean, it’s incredible. And it’s been shown to mimic exercise even when you’re at rest. In pre clinical studies with obese mice, they lost upwards of 12% of their body weight in four weeks and it increased muscle. So this is really taking the industry by storm. It’s actually not that expensive either. With my 10% coupon, it’s about $80 for maybe a two month supply if you take one capsule a day. If you decide to up it to two capsules a day because your dosage depends on what you want, then it’s a one month supply. But Dr.

Diane recommends doing one capsule a day until your body gets used to it. You might not see the same level of results right away that the mice did, but your body can get used to it and see if it’s something that you really want to do. If you are interested in this, I will have a link below so you can try it yourself. Well, go to sarahwestall.com under shop. Remember to use the code Sarah to save 10%. Welcome to business. Game changers. I’m Sarah Westall. I have the notorious whistleblower from the NSA, Bill Binney and his wife, Dr.

Katherine Horton, who is a CERN scientist and really brilliant on her own. This show is going to be bombshell after bombshell and we bring up the whole Epstein thing that just happened which is ridiculous. But a lot of other things that you probably don’t know about. As far as we talk about Thin Thread, his original program with the NSA that was developed as far back as 1997. We tie in Palantir, show you what’s or explain to you the theory of what’s really going on. How that ties to big tech, how Google was started. We really go there on a lot of issues and I I talk about some of my own involvement and with the Epstein and hopefully you’ll learn a lot from this.

We got serious interference interview and they asked that I keep this in so that you understand the kind of interference we get when we do these really important shows. I asked my editor to clean it up a little bit because I it’s just. It was too much. But you’ll get a good idea of the kind of interference that we were dealing with during the show. But before we get into that I want to remind you that we have still the 4th of July huge peptide sale going on until July 10th. You can save 20% on most peptides.

So the ready to nutritide the really really powerful weight loss, you know that’s more powerful than Ozempic. It works on three different categories. One of the most prom not just suppresses appetite but it also works to burn fat. Plus I have people I recommend people taking muscle mass, you know, preserving muscle mass. Other peptides that do that like 5Amino, MQ and Sloop which Sloop is back in stock too. Which Sloop which is the exercise mimicker it increases longevity and endurance is incredible. Athletes are taking it storm that has been out of stock almost the entire time I first came out with it.

It was out of stock for it was in stock for like three weeks and out of stock it came back in and only for three weeks out of stock. Now it’s in stock. They’ve ramped up their production facilities so hopefully it’ll be in stock longer. I recommend getting more than one bottle if you are interested in trying is now 20% off. If you use directly from your bank account. You can also get an additional 5% off. I will have the links. You have to use my coupon code Sarah those discounts but I’ll have the links below.

I also have links to my website where I have the ultimate peptide guide on weight loss. There’s other peptides when it comes to helping you with anti aging and with energy and mitochondria development and it’s just an incredible field. This is feeling better as you age. And I, I’m one of those. I want to feel great as I age. I don’t want to, you know, I don’t want my knees to hurt. I want my back to hurt. I want to feel great. And I think all of us should be. And it’s bringing this so it’s accessible to average people.

And instead of just the uber rich, it is more affordable. It’s still something that you’re going to invest in. I mean, honestly, you got to invest in this on a monthly basis so that you, you know, keep up with it. But it’s accessible now. It’s just not for the wealthy. Anyways, I’ll have all the links below, so look for that and remember to do a thumbs up to subscrib, subscribe and to subscribe to my newsletter, which is my substack. I’ll have links for all that below. Okay, let’s get into this, really. This is an explosive interview with Bill Benny and Dr.

Katherine Horton. Hi, welcome back to the program. Thank you. Hello. Nice to have us on. Good to be back. I’m really excited to have you. You know I am. There’s those of us have been talking for years. I know. I’ve had Bill Benny, Bill on my show for many years. And Catherine, I feel like, you know, with everything that’s gone on. We just talked about that before, but okay, we got to talk about the surveillance. We have a lot of topics. We’re going to talk about the surveillance and the fact that the massive surveillance track and trace, all these operation software operations have been going on for decades.

To me, Palantir feels like a psyop of some sort. I want to ask you first, start with what you did with Thin Thread. Nsa, you’re the notorious whistleblower from the nsa. Can you talk about what Thin Thread was? And then I want to get into putting Palantir into context so people understand. But first, let’s talk about Thin Thread and what you did. Well, Thin Thread came in basically two parts. The first part was acquisition of information on the Internet, basically because it was packetized and you had to reconstruct, pull the packets back together to reconstruct what was being sent, like an email or short messages or whatever, some kind of picture or something.

You had to pull all this packet back together and you had to do it at fiber optic rates, which was pretty fast. Like each line had 155 megabits and you can have the data coming down multiple lines so you had to be able to look at the entire trunk line, like a 10 gigabit line, and be able to pull it all out, put it back together. And that, that was being done by Ed Loomis. He, he ran that part of his sarc. He was doing the front end acquisition. And he succeeded at that point, or his people did in 1997.

1990. Well, now were those like, because I know I came out of telecom and the NSA servers were in with the other servers. It was all parallel systems. Was that coming out of those servers or where was that, that data coming from? It was coming from the taps on the fiber optic lines around the world. Okay. And so it was. And it’s grown, I mean, to, I mean, I don’t think there’s very much they miss on the world network. It’s all there. Yeah, they just tap all. But, but the point was that produced massive amounts of data.

So then there are analysts in the back end. That’s where I was figuring out how to manage large volumes of data or massive amounts of data. And it became very clear how to do it. It was like the old time religion of doing metadata type analysis, which is basically what we did against the Soviet Union and other targets in the world. Looking at attributes of organizations and pulling the relationships together. So that was like a metadata index, distributed storage profile development, not just of individual nodes or people on the line, but also the networks online so that you could pull all this information together and do it in a matter of seconds or any amount, any target you wanted in the world and for any period of time you wanted.

I mean, it’s from 1997, just so people get an idea of how long this tech. Okay, keep going. Right. And, and the point was that that could be done for any period of time. The longer period of time it took, it took the machine a few seconds longer. Every time. You added another week or a month, you know, so take another couple of seconds to do that month. But that’s basically it. You could get an answer on it pretty much right away. So that, that’s why I said they had a profile on everybody on the planet in this, in this database.

Because anything coming in, the point was they. We use B tree indexing. I know, let me, let me explain that. If you had something coming in and you had a relationship between A and B, a phone call, an email, a financial transfer, whatever, it’s a way of indexing information to B and then you double index it by saying B has a relationship from A so that you only Index and sort one column, alpha numeric, alpha. And then pull out any one item. Then you pull out. I want to see what everything that B is doing. Get it all from that, sort B2A and A from A to B.

It all comes out that one sort of. That’s, that’s why you don’t have to search to file two lines which will be scrambled on the other side if you alphanumeric. So it’s just a quicker way to do a sorting algorithm so that you don’t have. Yeah, yeah, yeah. So, and, and they could do this. They now is there. Since they can tap and they tapped every. All the fiber optic lines around the world. Is there anything at this point that they can’t tap? I’m sure there are remote portions that, you know, like in Siberia or somewhere, it’s kind of remote, it’s hard to get to.

But a lot of it was done by infecting equipment sold around the world. That is, if they sold a switch or a server, they would implant hardware or software or both in it. And then, and they showed in the material that was published by, from Edward Snowden, showed that NSA stopped the transit of switches from Cisco, I think it was around the world to somebody. And I can’t remember who that was, but they stopped it in transit, implanted their material in it, then closed it up and sent it on. So that meant the person that got it then just.

They didn’t know what they were implementing, but they were helping to implement the tapping system of nsa. That’s right. Is that in their network? And then that was there. That now became there. There. They were now just another element in the, in the tapping system of nsa. Okay, let me ask you. Is there any, any technology like signal or any kind of encrypted technology that keeps the NSA out? I don’t, I don’t think so. But most of it goes to nist. National Scientific Intelligence Testing. You know, something like that. National Institute for Scientific Testing. Yeah, something like that, yeah.

Because science and technology, they have certain requirements you have to meet. Certain. I asked you, you started explaining what NIST was. Can you re. Explain that? Can we say hello to the FBI? Yeah, I keep telling them they have a terrible tap. They should fix it. You should keep this in Sarah, because they always sabotage it. Key points. And the key point. Sorry, I had to leave to, to talk to somebody, but the key point is that there is nothing that people can use that, say, from the nsa. And that’s because if you use something encrypted, it’s like a red flag to a bull.

It’s the only thing in this huge data stream they can’t read. So they will go in by other means and. And basically break by other means. See, the point is, if they have something they can’t read, they can come in anytime you go online. They can come in across the network and penetrate their system and drain everything you have. But you’ve decrypt. Yeah, yeah, so that you can’t do that. And then all the hardware, back doors and everything else that we read about in the last couple of years, and then there are ways then they could use that to go back at the encryption.

So. Okay, well, then let’s. Yeah, this is just what. Let’s talk about Palantir, because I know all this is in place. All this stuff has been in place for decades. And then all of a sudden there’s all these black projects. Like Thin Thread was a black project. So all these black projects. Snowden came out with it. I know you were infamously in Snowden movie as Nicholas Cage, so. Yeah, that’s funny. But. So all this stuff has been around and all of a sudden Palantir comes out and they’re super public and everybody’s talking about them. It. To me it feels fishy, like, what is going on? We’ve been talking about this for decades.

All this stuff is in place. All the whistleblowers, you and Snowden and Kirk Weavy and all these people have come out talking about all this and then all of a sudden Paler is going to take over the world. It seems like the world’s already been over, so what is going on? It’s decades of conditioning, but, you know, they condition the popular population to accept less privacy over time. That’s fundamentally what they’re doing, but they’re doing. So, yes, it’s basically how many different ways and how much can you gain in terms of assembling information about people? Well, that gives you control over those people.

And I’ve said from the beginning, this is all about population control. That’s right. One tidbit that viewers might be interested in here was your insight about the Dutch police. Yeah, I was going to get to that. Yeah, sorry. Yeah. Well, see, we ran into Palantir when we were trying to. Kirk Whitney and I were trying to form a company over in the Netherlands to try to get. The concept of. The one thing that’s missing, as far as I can see in Palantir, is the full automation of the analysis of data and presenting the results of that analysis.

To the, and to the analyst or actually to the people who are actually going to execute anything if they need to, to stop crime or whatever. So the point is it’s automating analysis at the analysis process, not just simply putting together a nice picture, sorting and, you know, grouping things and making a picture of the data. That’s not the whole point. The Dutch police had a requirement that they told us about 4 Palantir. That’s why they spent over 10 million for it. @ the time they were a bit ticked, I would say, because it didn’t produce what they needed, it didn’t solve their problem.

They wanted to know in all of the commercially available communications that they could see when people were going to have a demonstration or going to have some kind of violent attacks or whatever inside their country. And Palantir, they bought it on a premise, I guess they thought it would do that. And it, they had some very choice words about it, but I won’t mention those words here. It basically failed. And what they did was they then looked at us as the next version of a snake oil sale. We’re coming in here trying to sell them a technology thing, okay, it’s going to fail and they’re going to spend millions on it, just waste it.

And it’s just another, another wasteful technology endeavor that fails. Well, I guess if I may interject, what really kind of opened my eyes to what we’re dealing with is that just the Dutch police’s expense in buying Palantir, which is just a license, really was 10 million. Now the whole development, so development, implementation and deployment of thin thread. Three sites. Yeah, because three sites was $3 million. But once it’s, once it’s there, once it’s built, you can uncover anything with it. Child trafficking, drug trafficking, anything. So for the average person in the street, $3 million sounds like a lot.

But the Secret Service just spent 2 million on a Super bowl ad. So basically for a TV advert and a half, you bought built in thread from scratch and deployed it. And you could have uncovered terrorism activity, charter things, whatever you set the selectors to do, it would have pulled it out for you for 3 million in into perpetuity. So basically, basically on Monday they could figure out who all the child traffickers are are by the end of the week they could be rounded up and put in the proof. And the point is that when Bill can explain how quick it was when you actually set.

So you pick out the pattern that you’re looking for and when you set it, it pulled it out. In moments for actually three seconds was the minimum, basically. And that’s why you’re targeted. That’s why you were targeted. Because, you know, and those of us who have been covering this, we know what’s really going on and they don’t want this information getting out. You know. Tell me if you agree. It feels like the, the surveillance coming out with Palantir to me feels like the space, you know, Space Force coming out. Like there was the secret space program and then suddenly they created Space Force because all the journalists and everybody was talking about how there’s a secret program going on for dec.

Decades, then all of a sudden they created Space Force and then nobody talked about it anymore. It’s almost as if they’re ready to come out publicly with all the surveillance and just say this is the reality of what we’re doing. That kind of feels like it to me. It says this is a really a military back. Yeah. And it’s being run by nsa. So I mean NSA is the manager of all the data. Yes. As if you remember some of the release, the FISA court release of that one request to Verizon to turn over all their data to nsa, that was requested by the FBI.

But NSA is managing the data so that FBI can query it and without any oversight, by the way. There’s no oversight of that. That’s how they got 250,000 violations of the FISA law last year. Last year. And I think that number is quite low. Could be 10 times that if they were serious. Yeah. I think the best way to look at Palantir and actually the entire intelligence community is there’s a huge money siphoning operation. They create these fund organizations, they never achieve anything. And the American taxpayer has to understand that all of their organized crime and terrorism, anything has already been bought and paid for.

Fifth thread was already paid for with $3 million. It’s a one off expense. And to understand the scale, one has to really think through what you’re trying to pick out. If you think about child trafficking or pedophilia, for example, a pedophile, maybe it’s an age, genetic, whatever. But a pedophile is born. It takes a couple of, you know, a decade and a half until they get sexually active and then they are pedophile. But once you’d identified them, that’s it. There’s like a latency before the next pedophile comes online, if you like. So if you have a software, you already have this massive surveillance of the world set up.

It’s already paid for by the taxpayer. It’s highly illegal, but it’s already there. You can go through and use Sin Thread to pull out legitimate, you know, criminal investigations and pull out these people. Once you pull them out, that is it. Well, that’s it. But. But the problem is, is the blackmail operations are engaged upon by our. By the. The elites and the intelligence organization. Yes, because that’s their control mechanism, so they can’t use it for that. And so that we’re in this hellscape because they’re so hell bent on keeping their blackmail and coercion operations going.

But Bill has the solution to all of that. As an example, with the Epstein case in Twitter alone, just the Twitter aspect, you know, Epstein was on Twitter, if you looked at all, just the people who retweeted his tweets, that is, people who, you know, I guess favored his activity or whatever he was doing. His fan club. Yeah, his fan club, which also helped outline his. Against his. His customers say, okay, yeah, let’s say his social network. Yes, customers. Just that alone with the. Another fellow used another program to pull it together on Twitter. There’s over a thousand people in a Twitter connection with him.

Well, who did retweets of his tweets. Yeah. Not just receiving. Yeah, well, this. But this is just. This is just, I would say, a public example of how easily you can identify somebody’s social network. That’s right. Just because you retweeted, you know, Epstein, doesn’t mean you were one of his clients. But the point is that the NSA has the telecommunication side that will have the content that is absolutely unmentionable publicly. Right. The really horrific stuff. And the thing about these pedophiles is that they are rather, they’re gloating openly about it. So sometimes certain charities have quoted pedophile chatter from these websites and these, you know, chat platforms, and it is extremely grass traffic.

So if you just pull out that and you map these people, every new person you identify is a lead to their social network to identify all these pedophiles. So if you think about an algorithm just going through and pulling these out, you can understand how quickly it can be done. But once you’ve done it and you map these pedophiles for the US you’re done on Monday. So on Tuesday, you can fill out the drug trafficking operation that supplies the continental widths of the United States. United States. And the thing is, when you have the FBI supposedly working for decades, Monday to Sunday.

Right. Continue on Monday to Friday, just churning away, the question is what the Actual F are they doing? They should have been done by Friday. Right. And after that is just a monitoring operation. And the total cost, with the database already in place is $3 million. That’s the tool. So what are these hundreds of billions of dollars flowing to the intelligence community? And that’s where your blackmail operations come in. How many billionaires and millionaires? Yeah, yeah. But the point is that the software I left them in 2001 actually was developed in 1998 after Ed got all that stuff coming in.

Ed Loomis. Yeah. That software gave the social network of everybody what was input. That means everybody in the planet that’s using a phone, an email, or whatever, everything. So they have it all. And they. They just know. So what do you think of Pam Bondi? And that just happened today, right before we got on this interview. This is going to air tomorrow where she said the. And. And so did Dan Bongino and Cash Patel said that the client list doesn’t exist. I mean, what. I mean, how BS is that? What do you think of that? I mean, from Twitter alone, I pulled out that.

With this other fellow doing it. Pulled out the relationship of at least a thousand members of his. Of his. A thousand potential customers. Well, John Mark Dugan, who I’ve had on my show, we. He actually, we worked together closely on a couple of the projects because he helped save my website when the Federal Crimes Division took it down because I’m such a criminal. I mean, my God, it’s crazy, but he. The m. He. When he was helping whistleblowers in Florida, the investigators gave him all the f. All the Epstein tapes, the video files, and he kept it for them.

And he notoriously had to flee to Russia, where he got asylum. And MI6 learned about the fact that he had those videos, and they tipped off the Times of London. And he. He had a reporter, an investigative journalist came and looked at those tapes with him and confirmed that he had them. Right. And then I interviewed him, this was back in 2017 or something, and he talk about what eight of the videos had on there because it was. He could only watch. They only watched eight of them because it was. It grossed them. At a certain point, they felt icky just watching them.

And they said one of them had a girl taking a shower. The other ones were all older men having sex with younger un. Which looked like younger underage girls. And I asked them if he recognized anybody on the tapes, and he said he recognized two of them. He wouldn’t tell me who one of the people was. He just didn’t feel comfortable. But the other person was the head of MSNBC at the time. And I mean, that’s. That’s the kind of blackmail they were doing with these people. And he had a dead man switch. He gave out these tapes to 10 different people around the world because he was worried and because I asked him, why didn’t you give these to the FBI Again? Can you just say what you just said after you said dead man switch? That’s when you go, oh, wow.

Yeah, we’re getting a message that the Internet connection is unstable. There are too many intel agents sitting on this line, Sarah. I can imagine. Okay, well, he. The dead. He has a. He was worried that these. That they would learn about and kill him. Right. Dugan was worried about it. So he has a deadman switch on these videos, and rightfully so. Anybody connected with this thing are getting axed, and he has 10 different people with copies of these videos. And I said, why don’t you release them? He goes, why should I have to release them? Risk my life when the FBI is sitting on them the whole time? I’m like, okay.

I mean, I don’t know what to say to that. But that’s. It was his response. And so now when Pam Bonnie comes out after I have that background and that information and comes out and says there’s no client list. It’s. It’s really infuriating. Yeah. Are you back? Because we. Otherwise we have a high definition videography that’s flawless. And then it gets c. Very cleanly. You know, at certain keywords, it just truncates. When you said Pam Bondi, it just went dead. So dead man switch and Pam Bondi, that’s these two things. And we were just gone. Well, let’s see if.

What they do to this video when we air it, at least it’s recording locally. So my recording is going to happen. But, you know, you should leave this in because this is evidence of them sitting on our line. Now, I should also say the laptop that I’m using, I took it to my IT guy twice. This is a good connection. I usually don’t have problems. People. So, I mean, like, they were saying, yeah, the eye is making their tap really clear. Yeah, yeah, this is really clear. You know, I was on Dave Janda’s show, who’s also very targeted, and during that time when we were coming out with all the.

The election and you were the. What was it? The. The hammer and the scorecard, they were cutting me live off the radio and really screwing with all of Us, they are basically messing around. So, so I’m going to say it again, I’m going to just keep repeating it and please leave all this in because it just puts, you know, an emphasis saying, you can see, these are the pain points of the FBI. So my file on my computer that links to an IP address, not file directory, the IP address link to the state capital and then Washington D.C.

well, I don’t know what she, she was talking about her laptop going in and that it was connected to the capital in Washington D.C. correct. Could you guys hear me? Okay, that’s what you’re trying to tell people when you went in and showed your laptop up. So, you guys, I, I want to talk. I did, you know, a five part, I’ve done many. I did a couple, three different conferences on Censored where I brought in all the censored people from all different aspects of the political spectrum. And I had, you know, generals on, I had whistleblowers on, I had all sorts of people on.

It was a really great conference. And then I also did a 10 part series on mine. And you were part of that bill. And then I did a 10 part series on mind control and fifth generation warfare. And I grabbed part of your interview from the censored conference. And so I’ve done a lot of this, you know, trying to expose this. But you have too, from exposing all this, you’ve been targeted. You found yourself one of the most targeted people on the planet and you keep suffering through that. Can you explain kind of what you’ve gone through? Just a quick break from your programming so I can give you a little information about Math Masterpiece.

They are the masters at removing toxins and heavy metals and aluminum and microplastics out of your bloodstream, out of your body. We are being bombarded with this crap from all over the place and we need to get it out of our bodies that you are more susceptible to every disease imaginable when that’s in your bloodstream. And I like Masterpiece. That’s a company I endorse. Why? Because they’re the only company out there that’s actually doing trials to prove to you that their product works. It removes graphene oxide, it removes aluminum, it removes microplastics and all sorts of toxins.

You can try yours today as well by going to sihwessl.com under shop or with the link below. Well, after the DoD IG gave our names for the FBI as a potential leaker of the New York Times article about warrantless surveillance in 2000 December of 2005, I think it was. Well after that they, they started, they tapped my phone. In early 2006, I had evidence of that from other sources from their affidavit and so on. And then in July, they. Of 2007, they raided us, all four of us who signed the affidavit to the, the DOD, which was what we’re supposed to do and required to do by, by, by regulation.

If we see fraud, waste, abuse, we’re. We’re supposed to report it to the dod, which we did. And following the regulations, you know. And because of that, they raided us. Well, NSA didn’t like us either. They wanted to stop us also because they took our IP that we were developing in house and then they outsourced it to two guys from standard Stanford who eventually formed Cooper Block. Right. And we have the, we have the date and time when that happened. And we could see the transition when, when we showed how much was out there, it avalanched and the whole system was about to bust.

And they said we had to shut off our input, and so we did. Okay, but she was asking about the target. Yeah, but we’ll get but good information though, after that. And those people were the Google people who started Google, which is interesting because Google is not. You guys from Stanford. Yeah, yeah, they funded them. But for us, they, they tried to shut, they attacked us internally and shut us down. That’s because they wanted commerce, commercial companies doing all this data collection for them so they could get blamed and not nsa. That’s what they did. That’s the way they did it.

And they didn’t want us doing anything, so they had to kill us. Okay, okay, but regarding the targeting, this is really interesting. No, because they’re, they’re shifting things to commercial and then claiming that a commercial company can do anything they want. This is the strategy so that the government can hide behind their behavior and get away with it. That’s what we’re walking. And then you’ve got all these normies fighting for them, saying it’s private rights, it’s corporate rights, when really it’s a government strategy in the beginning. But go ahead. And that’s Palantir too, too. Okay, that’s the scop.

Because Iing it to PAL so that they can get away with all this crap. That makes so much sense. Okay, keep going. And now here comes the targeting. After our raid, a little less than a year later, they started. I started having infections and that’s why I lost my legs below the knee. I’ve had 12 separate flesh eating bacteria, infection. And I didn’t get rid of them until Catherine came along. But locks on the doors and everything, you know, security, just, just so that you understand. Just a moment. Because people didn’t quite understand what happened. Because your targeting started before that, when, when you are.

When Bill’s IP was stolen in 98. Google was founded in September. But in October, Bill and his wife survived an assassination attempt where they were t boned by a car. They’re living in community that has a speed limit of 25 mph power. So let’s start with that. Right. So they tried to kill Bill with that. You had the fake rated the FBI in 2007 on completely made up charges because they knew that Bill and his colleagues weren’t the source of the League. The real source was Thomas Tam and Justice Department. Right. They knew all that. They knew all that.

But a couple of months after the FBI raid, Bill started having flesh eating bacterial infections. That’s already red. We get what now? Bill then lost his lower leg in 2010, one of these which kept happening. Then he lost his second lower leg in 2013. Right. And then he went on to have another what, 10 flesh eating bacterial infections with a total of 12. That is statistically impossible. They kept me in the hospital for quite a bit of time. Yeah, yeah. It’s just not impossible unless he was given. Given those bacterial infections by science. That’s exactly what a friend of mine who was the intelligence, military intelligence in Vietnam, he said that the first time I have.

He said they are targeting you with bioware. Exactly. But the thing that everybody needs to know this is this is really relevant for every average Joe. They need to know that the FBI is coming into private homes at night all the time called sneak and peek. But they are breaking in and they are injecting people with stuff. They are implanting them as microchips. People wake up with laser surgery stuff. So after I’ve done with all the. I’ve analyzed all the targeted individual cases, I said to Bill, listen, they are coming in at night and you’re being injected with these pathogens.

Right. If you know the actual infection kicking off would be time delayed, maybe a day or two. You would not think to look for an injection site. You might not even see it. That they use a thin needle. So what we did is we bolted our bedroom from the inside completely like Fort Knox. And the infection stopped for the first time in years. Yes. What’s wrong with these people that they, I mean, how can they make what they make on an FBI salary and do these kinds of things. What’s wrong with it? Well, I think it’s a, it’s people are groomed and one of the side effects of this mass surveillance when you can really watch people as they grow up as children.

I mean now we have 24 years of continuous mass surveillance. So a child born under mass surveillance, you can watch the entire young adulthood as they’re coming online mind. And you can preselect psychopaths, you can free select with brain degeneracies and then actively recruit them. And I have indication that that is precisely what they do. Yeah, unfortunately I think you’re right and they know the psychological profile. The other, you know, the flip side of all this negative stuff is that we can identify who the sick people are and as they’re, as they’re growing up and, and diverted it when they’re young and help them become healthy human beings.

I mean we could do so much good with this if we had people who actually cared who were running integrity. Yeah, I mean we, this I’m not anti technology. None of us are. That’s what our whole career has been. And it’s like wow, there’s so much good we could get out of this if they chose to. Instead they’re using it for bad. We could heal the world instead of using it to abuse the world. Yeah, but it’s human nature to really seek power, control and money. There’s enough really. It’s human nature that is the default setting.

But systems analysis also gives us exactly this outcome. Because when you think about if you have any sort of technology and you think about the energy sophistication and intelligence involved to run it properly, to do an investigation, it’s very, very hard high. So you have one mode of operating a technology that has very little monetary return. You just prevent that stuff from happening, but you’re not making an actual profit. So that is the highest energy level that would have to attain for that business plan. Below that there is a count. There may be endless but certainly countless number of business plans where you can use the same technology for good.

You have a lot less brain, a lot more ruthlessness, a lot more sadistic or voyeuristic cashback in addition to the profit. So systems analysis and a lot of systems physics say that those business plans will be much more predominant. So it will be 99% blackmail operations, spying, curving operations, voyeuristic trash. And maybe once in a million years it might be used for good. Okay, but how do we. I know you’ve thought about this a lot how do we overcome that? How do we me say, okay, we have these tools that could turn, we could turn into a paradise.

I mean, honestly, in the sense of helping. How do we get that to happen? How do we. Well, that’s, that’s what we suggested in ways to do that. And it gets back to the, see the problem. The point is that collecting all the data not only gets them power to over everybody, but it also captures everything that they’re doing criminally and all their activity related to that. So in the data already is the, is the means, way and ways and means to get all of them out. It is. I know. So. So the point is, how do you do that? Well, you do that by starting with social networking.

Then you, you build that by investigating the content that they also collected. You know, they told you all along they’re not taking collecting content, but that’s a lie. They’ve been doing it all along and even goes back even before nine, 11 on a lesser base, but we’re still doing it. Well, I think you’re diving down the implementation track because that’s how Bill’s mind works. He has the full solution already in place. That the real key for, for the average American and the average taxpayer to understand is that solving the problem would be very much like solving the, the border problem.

Remember the time when they were saying, oh, but there are 15 million illegal immigrants. It is physically impossible to remove the all. It’s physically impossible to, you know, to secure the border. Remember those things when they say, oh, but it’s hundreds of miles. You just can’t do it. And then you bring in Tom Holman and boom, a month later, it’s done. They can do it. Yeah. And so it’s exactly the same thing with here. And this is why people need to understand the timescale that’s involved. Thin thread identified your child abusers for good. In moments, you spend the rest of the year just picking them up.

Okay, Running the court cases. The same can be done with the drug trafficking, with any sort of. That’s right. But what. All you need is an actual organization that is insulated from the FBI because they are the ones doing it. Right now you need to have a little organization. And the proposal that we had was to, to have a whistleblower organization with really the best investigators who would be operating like the immune system. So if you think about the, the, you know, the solution that nature came up with, you have your organs in the body, the different organs, the heart and the liver and so on, that you have the immune system that can go in everywhere and has basically supreme power to eject pathogens and toxins and clear them out.

Also cancer and, and cancerous growth. You carve this stuff out. Okay, so now how do we get past past. And I have some answer. I’ve been thinking about this for a while, but I want to hear what your thoughts are. How do we get past the entire. The infrastructure like Arizona. I’ve had people on and whistleblowers on talking about how not just Arizona, but Arizona. We use it as an example of how their monetary system is so entwined in the drug trafficking and money laundering, all these things that they believe their, the entire economy will collapse once you clean that up.

Now, I think there’s solutions for this, but go ahead. Yeah, well, I would say that that’s not relevant anyway. I mean, you follow the law, you have law, you implement the law. You look for people violating the law. They’re easy to find. You find them and you, you put them in jail or fire them. Yeah. The point is we have a president who said, who can say you’re fired? We don’t have to. The system doesn’t have to collapse because the monetary. What they have to do is get ahead of that. We can. They print money, they, they divert money, they build up the system and incent legal activities where people flourish and we develop things.

There are other. Yeah, and so they have to divert it to that. You might have to do an exerted effort to make sure things don’t collapse as you’re changing things out and promoting different industries. But there’s methods to doing it. You just need really good business people. Yeah, there is, I like Bill Stills precedent. He, he says go back to the Civil War. Lincoln, you know, he issued his own currency and didn’t have a Federal Reserve and got, got that out of the way. He said this is the currency for the United States and they printed it themselves, the United States government.

So there was no loan, no, no interest, nothing to pay on that. We just print more money and use it. So that’s a solution for now. We could get rid of the Federal Reserve and just print US Dollars. That’s the monetary solution. But I was thinking about this one. The specific. Yes, it’s a very good one actually. But the specific question of how do you wean an economy off the drugs. Well, there is a precedent. I think it was Venezuela. I hope I get this right where they did just that. And this new president came in and he said he was told exactly this thing like we can’t stop the drug trade, we all live off it.

Right. And he said it’s just that when you change an economy there is a little transitory period. But because every unit, every individual switches and swaps and changes direction themselves, you don’t have to do it down. Everybody just adjusts at the moment. The laws of economic supply, people respond to incentives. If there’s a huge incentive to be in the drug trade. He said, a young man gets up in the morning and he could work on farmland and really sweat, or he could be selling drugs while he’s going to be selling drugs. As soon as selling drugs is more dangerous or more onerous than working on the farm, he will go back and work on the farm.

He will do it overnight time. It’s not a big switch. So this is all just nonsense. But that’s what’s great, that we have examples around the world that we can, Venezuela did it. We can point to something, say this is how we can do it and we can get creative and do other things. You get the good business people in incent with different opportunities because there’s a lot of areas where humanity needs to go to thrive that we’re not taking advantage of. You start incenting that it’s, it’s, it’s, it works. People, they just have to do it.

Yeah. Can I give you an example of this, of how you can at least isolate things and get them out of the system? I was In a, in 2006, I had a subcontract, I was working for Customs and Border Protection looking at imports and exports and companies around the world. And from a BIS tip on a company, we went to Google at home and looked up, used what I call the shared attribute technique, looking up things that shared the same post office box or the same phone number, fax number or address. And when you did that, and we did it on a website that had all of the Iranian companies in Dubai Arab Emirates outside of the restrictions of Iran.

Iran, you know, so they were outside of Iran, they were an Arab airman. So they didn’t have all the restrictions of ordering things. What they were doing was ordering all the parts necessary to make up an IED to send up and use against our troops in Afghanistan and Iraq. So when we did that, then the best people added all that stuff to the, to the tip off around the world saying don’t do business with these people. Or they’re, they’re doing this, they’re, they’re building IEDs for. But you wouldn’t have seen it because there Were like eight or nine different company names.

If you looked at any one company name, which is the way CPP was doing it, you only saw one part for an ied, okay? So that’s an innocent operation. They’re just doing this, you know, and you looked at each of them, and that was true for each of them individually, because you only look at their names. But if you look at their shared attributes, you pull them all together and say, well, the aggregate and really what they’re doing, and then see the IED that they’re bill. And so we said, okay, here it is. And these are all the company names that are involved in that.

And it’s more than you had in here and gave it to cbp. And this. The Bureau of Industrial Security published it and said, don’t do business with these people because this is what they’re doing. And when they did that, of course, the Iranians found out about it and they said, okay, you can’t use these names anymore. So they changed all the names. Right? And when they did that, they followed the same technique, shared attribute, and we got them right away. Here’s the new names for the companies. You just notified the world you were doing this bad business.

So when we gave them the names, they never published it. Okay? So I don’t know why, because I don’t know if they even rated them or anything, but they didn’t seem to react to it. But the point was, not only did that fall out, but about 57 other activities fell out to that. Said, here’s groups of companies in Dubai that are raining doing business that looks like they’re smuggling something. Could be weapons, could be in anything, you know, or doing business illegally, trying to skirt international law and so on. But they didn’t. They didn’t investigate any of that.

And I went through with the proposal in 2006 to Customs and Border Protection because I looked at their data, and I kept buying the same kind of property there. So I said, okay, okay. I looked at a sample of your data, and here’s what I came up with. So I can estimate what’s in your database. I. Hundreds of millions of records. And from that, I could estimate that our first run of the program, we would get 40,000 targets to look at. That’s the first run. 40,000. That was my estimate based on assumed uniform distribution through the network, through the database, just the size of giving them an ID media.

And they said, we only have two analysts. We can’t handle that, so we’re not doing. I said, wait a minute. What we’re doing is, is, is, is finding companies that are involved in smuggling of illegal activity. Illegal activity. So what you have to do, we’ll be pointing all the ports of entry inspectors to these packages coming in. Go to this container, that package, that company look in and inspect. You know, you have thousands of people at these ports of entry. They still didn’t do it. So, so basically they threw out a technique that could solve the smuggling worldwide and they didn’t take advantage of it because.

And that’s because too many people who are in positions of power are involved. Yeah. And, and they benefited. So I’ve got several comments to make if I please make it the Jack. So a couple of important things to note about this example here. Bill did the work to identify the iedb, what’s it called? Improvised Explosive Explosive Devices that were mostly used in Iraq and places like that for the U.S. army was deployed. You found this network using only Google, not NSA databases. And it’s a bad query, but we had to work through it. Yeah, but anyway, you use just the Internet, right.

And you found these companies building. I now as you just explained, you reported it to, to Customs and Border Protection and they send out a note that, you know, these companies should be sanctioned. They also told us we’re great Americans. Yeah, I, I know. But the point is, the second time around, when you identify 40, 000 targets, they refuse to do it. Now why would they possibly do that? Well, you don’t want to unmask the whole system if you want to keep the rule going. And you can’t keep the wall going if it looks like you have just finished up the other side.

So the other side has to be able to produce these IEDs and give you kind of blowback to keep the war going and make it terrifying. But do you think that the bad guys have too much power now where everything’s collapsing on itself because the good people are suffering and the average people who probably don’t even know what’s going on are suffering so much now. You know, they’re covering up how much people are actually suffering. Yeah. That the whole system is starting to collapse on itself. Solve. Well, it’s not really collapsing. It’s crystallizing out. That’s the real problem.

And what do you mean by that? What do you mean? What I mean by that is that when you. We’re dealing with the phase transition. So this, this organized crime cartel has been living with us for hundreds of years, but it’s a drag. Gain power. Now with the computing power, it has, and this is not even counting AI. It has such an over. Such a, you know, overpowering weapons. That’s right. The war is almost lost. It really. Trump and his endeavors are the last stop. What I mean with crystallizing out is that after that, if you think about the communist system, they had so much power over the population.

My family and I and everybody we knew in communist Romania completely disagreed with the system. There was nothing we could do because anybody who tried was murdered. Yep. So crystallizing out means a system. System settles into complete subjugation and the people in power remain in power, and there’s nothing you can do. So if it’s an evil system, you settle for decades, maybe your entire life into an evil system. Like North Korea or like the Eastern bloc was under communism. Right? Yeah, but, but, but it did fall in Romania. So. What? What? It did not fall in Romania.

It was transitioned by British intelligence. It was. The Western intelligence agencies had a psyop where they killed the Romanian dictator. The entire revolution was crisis actors and hired miners who held up signs, even though it was. Unfortunately, it was. The whole thing was staged because it was part of an asset stripping operation. And if you looked at it, the entire society was bled dry. And then Western companies came in and bought it all up. So it was a very carefully staged managed situation. The same thing happened in Russia, the rape of Russia, 1990s. So really, when you zoom out and you study this organized crime cartel, it’s working in asset stripping cycles.

It goes around the world in asset strips countries. It has done Asia, Latin America, and now the Western world is rifle picking, right? And the symbol that they use is the snake that bites its own tail. It’s a symbol of eternal revolution. So you go and f up this country and then you let it gain, you know, wealth again and then you eff it up again. And meanwhile you’re going and cycling through other countries, you can see the same business plan. If you, if you think in terms of business plans, all this becomes very clear. The, the, the.

Everything’s about business. Yeah, it is. But, but the money flows through to the very same corporations, you know, and as soon as you do that, that everything would become clear. One thing that really helped me understand how the system works is just to think in terms of systems. Not countries anymore, just businesses, governments, they are systems. Now. One of the things that you need to know is that when, when it comes to organized crime. So organized crime will always outgrow a natural economy because organized crime is not taxed. So it grows by the Taxation rate. If you have two companies, one is organized crime, one is a legitimate company.

The company that doesn’t pay tax will grow by the amount of tax. Well, it doesn’t follow rules either. It’s not hampered by rules. Exactly. Or monies. Yeah. So before you know it, there’s a monopoly on crime. One crime ring is going to win out over everybody else. And when you look through history, who was raking in the biggest amount of money and the crime ball, actually, it’s the Vatican crime. Well, then how do we break down that crime? Do. Does good people. How do we break that crime syndicate up? Do good people have to stealth? Is it a stealth weapon? Like, I mean, how do we do it? Well, the.

Only. Because we can’t do anything in stealth anymore because of the NSA itself. Surveillance. Mass surveillance of everything. The most. Gosh, this is the word. I haven’t had this bad of Internet or connection. I have no weather issues here. Year. This is the worst it’s been ever for me. Yeah, same here. And it’s entirely because they’re sitting on the line. But the point that people need to understand is that cleaning all this up is extremely fast because the number of people on planet Earth seem overwhelming to an individual. But they are absolutely trivial. The computer programs scanning everybody and finding the criminals.

And once you found them, it’s done. We just need a group of people who are committed to doing it. Right. I mean, you just got to commit yourself to doing it. And we can do it. We can do it. And in fact, as Bill has demonstrated, the NSA databases would be nice for access. You can do it in moments using bitrate. It’s not necessary. We can even do it in go. And it’s not being murdered because so far, all these investigators, you know, a couple who died. Right. I know a handful who died. Right. And the thing is, the real investigators are being taken out and the fake investigators who come up with these reports, like, we found 200 child abusers in a week using the FBI.

They are being promoted. That’s what’s happening. And it’s just like the real investigator or the real journalists are being suppressed. And if you’re not, you might not be part of some deep state, but you’re. But you’re not really doing good, you know, the real work. But you’re entertaining. You’ll be promoted. And. Yeah. And so it’s just a bunch of garbage. And it’s hard. Like with this Epstein stuff that came out, I was like, so disgusted because, you know, all the hard work we’ve done. And then now it’s just a big circus of everybody trying to take advantage of the.

The popularity of it and get clicks and get visibility. Meanwhile, those of us who’ve done real good, hard work work are censored. You know, and it’s so. It’s like that it. That people talk about being an inverted world. That’s what it feels like. It’s like those of us who are really trying to be good are censored and held back. We’re just trying to be good people, trying to help people, trying to do good work, and we’re being shut down. And I know you feel that too. It’s just. Actually, I. I can point to something. In 2016, when I first explained everything, it was mostly about feed capture.

How does deep capture come about out? What people need to understand is that everything we’re observing is following the law. Very little work in it. Now, what you’re describing, I have a video on it. It’s called a system inversion. So when you have deep capture and criminals take over the leadership of an organization or country, whatever, they start populating the upper management with the criminal bastards who will do their bidding and sack people who are good or just promote them down or never let them, you know, do what they say. Yeah. So what we end up with is that the scum is at the top and the very best people are the most.

The most abused. Yep. The system fills it out gradually over time. It is entirely predictable. But what the average person needs to do is just turn it around in their head and say, well, when we have these sort of problems, it’s direct proof of feed capture. When the FBI comes out and works a week and only produces 200 child abusers, which is probably a lot less than would be just visiting one pedophile site. Right. You take that not to be a point of frustration. You pay. You take it to be smoking gun evidence for deep capture of the FBI, and you say, sorry, the leadership is no good.

They basically produced utter, complete trash. Right now with Cash and Bongino, I have the three strikes in your outro. And that was their third strike because they also claimed to that Thomas Brooks acted alone. First of all, the guy on the roof was not Thomas Brooks. Second of all, I produced evidence within 12 hours that he didn’t act alone. Right. So that’s strike number one. Strike number two is claiming that X Team killed himself. Excuse me. And then you produce some video from an empty corridor. I mean, come on, it’s laughable. And strike number three is to come up with these 200 child abuses.

This is, it’s nonsense. So these people, they might be. Ash might be a good person at heart, but he is incompetent. So just trying to be do good is a necessary requ. You know, condition, but it’s not sufficient to succeed. Well, do you think he’s blackmailed and coarse himself? Because it. Some of the stuff is irrational. It doesn’t make sense. When I tell people is when the behavior and the decisions are irrational, there’s some kind of. Of coercion or blackmail involved. Because it just. Yeah, and, and smoking gun evidence for me personally was that interview they did with Maria v.

Romo where both Cash and Bongino looked like hostages. They looked terrified and integrated. They had high stress level. Their body language was stress. And, and that’s my point. Especially Cash had open signs of lying when he said, oh well, I’ve been to these places, I know what it looks like. And his eye movements and facial expressions say it’s a lie. I don’t know what the hell I’m talking about. Well, that’s why it was too obvious. That’s what tell tells me that they were blackmailed or there’s coercion or they’re covering up for something they think to. The only benefit of a doubt is that they’re covering up for some other bigger operation.

That’s the only thing I know. Other than that I know I’m not that naive. But I’m just saying because. And I tell you why way because we’re running out of time. I agree with you. I agree. You know, it’s like there is no bigger, bigger operation. At some point from day one, you have to hit because we are running out of time. Their power over us is. Is such that if you wait and long. Oh gosh, it’s really bad. The Internet. You know what? Well, I think the show. I think this interview has been really good.

There’s so many, many insightful things out of it. I’m just. This is just a wonderful, timely conversation that I think we all wanted to have. You could tell we’re very passionate and it’s, it’s. It was so good. So I am so thankful that you came on you and Bill. I hope we can get you back in a short amount of time. Sorry, it’s being. I didn’t understand anything. I’m so sorry. Oh, I, I just, I was saying that this has just been a wonderful conversation. You can tell we’re all really passionate about this. We’ve all wanted to talk about these things.

I need to have you back on a regular basis to get this information out there. Very few people in the world that have the insight that you have and that Bill has that we can really share with people and help them understand what’s going on. We need to work with solutions. They are very. You have to. Let’s talk about those. We have to work on solutions because it’s really daunting. I think people are wanting to give up and we can’t give up. There’s too much on the line to give up, don’t you think? Yes. You know, and on a positive note to people, the current Trump administration, for all their shortcomings, are the best shots we have and the best shot we had in over 100 years.

So it’s a now or never. We can’t give up. And also, I’m not going to give up on them just a few months into the new administration. No way. Yeah. So we’re going to have to bring this to an end because the Internet’s just too bad and we’re going to have to. Yeah, I’m sorry. The Internet’s just too unstable right now for some reason. Well, we know why. And so I’m going to have to have you back in a reasonable amount of time to do this again. And thank you and thank Bill so much for coming up on the program.

And I just hope you take care and, you know, stay strong and thank you for everything that you do. Thank you so much, Sarah. We really appreciate it. Sa.
[tr:tra].

Author

KIrk Elliott Offers Wealth Preserving Gold and Silver

Spread the truth

Leave a Reply

Your email address will not be published. Required fields are marked *

SIGN UP NOW!

Subscribe to our newsletter for the latest trends, news, and exclusive content. Stay informed and connected with updates directly to your inbox. Join us now!

By clicking "Subscribe Free Now," you agree to receive emails from My Patriots Network about our updates, community, and sponsors. You can unsubscribe anytime. Read our Privacy Policy.