Archives for category: counter intelligence

This ‘info-satire’ may also be read at Fort Russ News

Steele_Tin-Hat - 1

A ‘Geoff Bozos’ is a class of awards bestowed upon those who’d performed some amazing act of idiocy that convinced; something like a Darwin Award ‘honorable mention’ with elements of ‘Jackass

The Queer Bozo Medal

The ‘Queer Bozo’ medal is the Geoff Bozos award exclusively bestowed on intelligence community [IC] members. Now, in case anyone should misunderstand, we have a solid definition of ‘Queer Bozo’ showing award of this medal has nothing to do with a CIA psyop bending the Alt-Right community over a log in the woods and ‘corn-holing’ them like a hillbilly:

queer |kwi(ə)r|
adjective
1 strange; odd: The CIA had a queer feeling that Ronald Thomas West was up to something.
verb [ with obj. ] informal
spoil or ruin (an agreement, event, or situation): clueless CIA moron Robert David Steele’s superiors didn’t want anyone to queer the strategy behind the QAnon psyop.
ORIGIN early 16th cent.: from German quer ‘oblique, perverse’

bozo |ˈbōzō|
noun (pl. bozos) informal, chiefly IC dialect.
an intelligence agency operative, especially CIA.
ORIGIN unknown

queer bozo |kwi(ə)rˈ|ˈbōzō|
noun
any IC member believing a QAnon assertion is straightforward on its face: that queer bozo Robert David Steele actually believes longtime CIA operative William Barr will do the right thing.
ORIGIN 2019: ronaldthomaswest.com

So, yes, to be perfectly clear, the term “Queer Bozo” is altogether unrelated to this…

…when awarding the first Queer Bozo medal to Robert David Steele, no matter what the hillbilly is doing to the redneck in the video clip is a metaphor strongly resembling what Steele is doing to the Alt-Right community; when promoting Queer Anon, excuse me, I meant QAnon.

The rationale for awarding the first ever Queer Bozo medal to Steele is his promoting the irrational belief (QAnon assertion sucked up by the Alt-Right) that William Barr, whose Department of Justice (FBI), in his first term as Attorney General, sabotaged investigation into the minor child “call boy” visits to the Bush 41 White House…

Bush41-call-boys

…is going to clean up the pervasive pedophilia blackmail operations run by the intelligence agencies, ongoing to this day. Even were there to be a real hunt for some of the Epstein associated child rapists (it’ll be hard to ignore Bill Clinton & ‘friends’, with Clinton’s two dozen+ trips on Epstein’s private jet), if the ‘Conspiracy of Silence’ surrounding Barr during the George H.W. Bush administration is not opened up in the process, all you really have is what amounts to the homosexual neocon pedophiles going after the heterosexual neoliberal pedophiles or what’s otherwise known as a perverts versus perverts, deep state internecine war.

Further information: additional Geoff Bozos awards nominees (other categories) include Jeff Bezos & his CIA playground Washington Post, as well, nominees Pierre Omidyar, Edward Snowdon, The Intercept and Glenn Greenwald; who actually seem to believe Tor, developed and sponsored by the USA’s Department of Defense, is the way to go with online leaks and related communications, and other ‘alternative’ leak sites and billionaire and/or intelligence agency  sponsored journalists who never investigate wealth and its relationship to the real evil.

 

This article first appeared at Fort Russ News

“Cohn’s job was to run the little boys. Say you had an admiral, a general, a congressman, who did not want to go along with the program. Cohn’s job was to set them up, then they would go along” [1]

What is interesting about this small snippet is,

1) Concurrent to the present Epstein case, a Pentagon pedophilia scandal of epic proportions is not followed, juxtaposed to the Epstein reporting or even reported on at all by mainstream press [2]

2) The ‘con’ pimping little boys to the Pentagon and Congress happened to be Roy Cohn, a longtime mafioso attorney who cross-references both MOSSAD & CIA via organized crime and, as well, Cohn was a Donald Trump mentor.

3) “Many of the same names that surrounded Cohn until death in the late 1980s would later come to surround Jeffrey Epstein, with their names later appearing in Epstein’s now-infamous “little black book”” [3]

Other than how it happens Trump (to now) either knew better and/or managed not to be trapped into compromising recording with minors, the question that arises is, how the pedophilia blackmail overlay works out between CIA & MOSSAD relevant to the Pentagon, where (an estimated) 20% of the vast Department of Defense has been plugged into intranet child pornography. [4]

But first:

The lady doth protest too much, methinks -Hamlet Act III, Scene II

“We will get to the bottom of what happened, and there will be accountability” -Attorney General William Barr.

That’s pretty ‘rich’ when it is coming from George H.W. Bush’s, CIA associated, Attorney General who’d been boss of the Department of Justice, when DoJ was busy covering up intelligence agency crimes while sabotaging the Iran-Contra investigation. [5]

“A quarter century ago, the president’s attorney general, William Barr, staunchly opposed the independent counsel’s investigation of [Iran-Contra] wrongdoing in the White House, and he also firmly supported [George H.W.] Bush’s use of pardons as a means of self-protection” [6]

But actually, Barr overseeing the Epstein case cuts a bit closer to home:

“Prior to resigning from his post at the CIA, Gregg had worked directly under William Casey and, in the late 1970s, alongside a young William Barr in stonewalling the congressional Pike Committee and Church Committee, which investigated the CIA beginning in 1975. Among the things that they [the committees] were tasked with investigating were the CIA’s “love traps,” or sexual blackmail operations used to lure foreign diplomats to bugged apartments, complete with recording equipment and two-way mirrors” [7], [bold RTW]

Then, we have rogue CIA officer Frank Terpil:

“Historically, one of Wilson’s Agency jobs was to subvert members of both houses [of Congress] by any means necessary…. Certain people could be easily coerced by living out their sexual fantasy in the flesh…. A remembrance of these occasions [was] permanently recorded via selected cameras…. The technicians in charge of filming … [were] TSD [Technical Services Division of the CIA]. The unwitting porno stars advanced in their political careers, some of [whom] may still be in office” [8]

And then, oops! … it kinda all spills out:

Bush41-call-boys

One of the most critical parts of the scandal surrounding Spence, however, was the fact that he had been able to enter the White House late at night during the George H.W. Bush administration with young men whom the Washington Times described as “call boys.” [9], [10]

Except for the fact much of the reporting had been ‘resolved’ with dropping dead investigators & witnesses, and the subsequent suppression of this documentary detailing William Barr’s DoJ (FBI) sabotaging the investigations [11]

 

Now, let’s just mention in passing, beyond CIA & MOSSAD, there are two additional intelligence agencies move into the pedophilia play; “The Fellowship” or “The Family” (the Coe Cult behind The National Prayer Breakfast)…

“A lot of their key men in a country would be the intelligence [CIA] officers in the American embassy. Throughout their correspondence, that’s the kind of guy they would like to have involved [And] They always had a lot of Army intelligence guys involved, Pentagon guys” [12]

&

“Let’s say I hear you raped three little girls. What would I think of you?” The man guessed that Coe would probably think that he was a monster. “No,” answered Coe, “I wouldn’t.” [13]

…and the Catholic Church where pedophilia is not only run rampant but…

“Most Catholics don’t realize that the principal gatherers of intelligence on the part of the Holy See are the apostolic nuncios and their diplomatic staff, just like the ambassadors and staff of embassies that are deployed around the world by every nation-state” [14]

&

“the Vatican is .. relying increasingly on reactionary troops. It is closing ranks with evangelists, bible fundamentals and extremely reactionary forces” [15]

…this (immediate) preceding is then punctuated with a relevant exclamation point going to a direct meeting:

“On June 5th [2014] Pope Francis met in private with Doug Coe, one of the most influential evangelicals in the US and head of the Family” [16]

Now, in the American intelligence political pedophile hen-house longtime CIA operative Attorney General William Barr is presently overseeing investigation of, there are numerous ‘hens’ belonging not only to the CIA but also belong to MOSSAD, The Family and the Catholic Church. Then we have to factor in the Department of Defense entities Defense Intelligence Agency & National Security Agency with this proposed 2019 Act of Congress:

“The END Network Abuse Act would require the Pentagon to enter into agreements with groups including law enforcement, child protection services, social services, and trauma-informed healthcare providers in order to cut down or halt the spread and impact of these images on DOD networks.

“The National Criminal Justice Training Center, one of the groups that has thrown its weight behind the bill, reported in 2018 that DOD’s network was ranked 19th out of almost 3,000 nationwide networks on the amount of peer-to-peer child pornography sharing” [17]

I suppose in 2019 we’re not supposed to notice the Department of Defense has been stonewalling any solution to this particular problem for over a decade, here’s the 2010 language referring to a problem investigators first identified in 2006:

“Due to DCIS [Defense Criminal Investigative Service] headquarters’ direction and other DCIS investigative priorities, this investigation is cancelled” [18]

Recalling MOSSAD asset…

“Cohn’s job was to run the little boys. Say you had an admiral, a general, a congressman, who did not want to go along with the program. Cohn’s job was to set them up, then they would go along”

…these several decades later, the actuality of the problem is grown immense; if The Family (who owns Mike Pence, and likely Mike Pompeo and possibly William Barr) wants an arms deal to their international favorites, they have their hens, whether Congressmen to listen attentively and generals and admirals to testify to the proposal positively, MOSSAD has the same (possibly the strongest pedophilia blackmail group), if the Catholic Church wants a particular policy, their hens are in the hen-house as well, not to mention The CIA and the Department of Defense have their golden egg-laying hens. And we’ve not touched the fact this sordid business is spread throughout the NATO states, the Western intelligence agencies playground.

A BIG problem with all of this is, it cannot be intelligently unwound. Example given is where it is all at now, if you lift the lid on MOSSAD, the CIA is also revealed, the overlay is problematic. Too many of the hens are shared property in what amounts to a communal hen-house. This is absolutely a reasonable assumption based on the recent investigative series by journalist Whitney Webb, augmented with a few of this reporter’s (yours truly) alternative sources. [19]

Now, we come to Donald Trump. Sort of like it is disingenuous when the Hollywood #MeToo victims behave as though they they’d been somehow justified in having gone along and kept their mouths shut (at least Marilyn Monroe had been honest enough to admit the blow-jobs were worth the million $$ contract) and deny any element of having been prostitutes or not knowing what they were getting into (Hollywood is socially incestuous to point one could observe the faces don’t change, only the couplings), it should be unreasonable to assert Trump wouldn’t have known what was going on in Roy Cohn’s & Jeffrey Epstein’s social circles.

Is there solid evidence of Trump’s proactive involvement? Nothing yet. The one (2016) accuser seems to have been a probe or feint (my personal assessment.) The real problem with the 2016 narrative is the woman who ‘profiles’ as Epstein’s ‘pimpette’ Ghislaine Maxwell is clearly accessory to child rape according to the (dropped) lawsuit narrative, yet incriminates herself when it is reported:

“The woman identified only as Tiffany Doe in the lawsuit, a ‘trusted employee’ of Epstein’s,’ corroborated Johnson’s’ allegations in a telephone call with DailyMail.com, but she refused to reveal her full identity” [20]

This almost seems like a 3rd party (intelligence agency) blind feeler to see what reaction it might draw from (and/or attempt to plant paranoia in) Trump. Question of law: Did this information derived from deposition require a criminal referral concerning Tiffany Doe as accessory to child rape per the Canon of Ethics governing counsel? What became of that? The story is full of holes.

This is followed on by Epstein accuser Virginia Giuffre (nee Roberts) denial of any participation by, or even sight of, Trump at Jeffrey Epstein’s minor child rape parties. [21]

It is perfectly possible will be no ‘smoking gun’ ties Trump to having screwed Epstein’s underage girls or otherwise engaged in pedophilia. Another observation (not a defense) is, everyone who HAS NOT partaken of child sex in close proximity to these social circles of power serving the powerful (Epstein’s ‘black book’) had to be turning a blind eye to those who were. In this case, Trump would be far from unique. Did Trump mentor Roy Cohn warn Trump early on? That question (and questions like it) will probably never be answered. On the other hand, Trump profiles (paranoid to point of germ-o-phobe) as someone with a better chance of avoiding the intelligence agencies designer drugs; where the will is broken down in sexual entrapment so sophisticated, those poisoned never realize what had happened to them, how they suddenly wanted to fuck a little kid. It would make sense Trump had security assigned to his food intake, little different to a king’s ‘food taster.’ Especially if he’d been tipped off.

Finally, the question that can be asked but cannot yet be answered. In whose interest is it the Epstein pedophilia operation be blown open? Or is it just some cosmic snafu biting the shadow government & deep state on the butt? Stay tuned.

 

[1] https://www.mintpressnews.com/shocking-origins-jeffrey-epstein-blackmail-roy-cohn/260621/

[2] https://thehill.com/policy/cybersecurity/451383-house-bill-aims-to-stop-use-of-pentagon-networks-for-sharing-child

[3] see link at reference [1]

[4] https://www.fort-russ.com/2019/07/the-swamp-20-of-pentagon-staff-are-pedophiles-in-christian-america/

[5] https://www.cnbc.com/2019/08/12/bill-barr-blasts-jail-where-jeffrey-epstein-killed-himself.html

[6] https://historynewsnetwork.org/article/171025

[7] https://www.mintpressnews.com/blackmail-jeffrey-epstein-trump-mentor-reagan-era/260760/

[8] see reference [7]

[9] same as reference [8] & [7]

[10] https://archive.li/ZDiAZ

[11] http://vimeo.com/76198401

[12] https://www.sott.net/article/191599-Meet-The-Family

[13] https://www.salon.com/test/2009/07/21/c_street/

[14] https://www.churchmilitant.com/news/article/santa-alleanza-the-vatican-intelligence-service

[15] https://www.spiegel.de/international/world/interview-with-gay-theologian-david-berger-a-large-proportion-of-catholic-clerics-and-trainee-priests-are-homosexual-a-730520.html

[16] https://www.dailykos.com/stories/2014/7/17/1314574/-Pope-Francis-Met-With-the-Head-of-the-Family-the-Secretive-Politicians-Based-in-DC-Townhouse

[17] https://thehill.com/policy/cybersecurity/451383-house-bill-aims-to-stop-use-of-pentagon-networks-for-sharing-child

[18] https://constantinereport.com/the-pentagons-pedophile-problem/

[19] https://ronaldthomaswest.com/2019/08/09/the-epstein-chronicles/

[20] https://www.dailymail.co.uk/news/article-3894806/Woman-alleged-raped-Donald-Trump-13-Jeffrey-Epstein-sex-party-DROPS-case-casting-doubt-truth-claims.html

[21] https://www.zerohedge.com/news/2019-08-09/epstein-document-dump-hits-accuser-says-trump-didnt-partake-any-sex-any-us

 

[Trump mentor Roy] “Cohn’s job was to run the little boys. Say you had an admiral, a general, a congressman, who did not want to go along with the program. Cohn’s job was to set them up, then they would go along”

Whitney Webb’s chronicles of Jeffrey Epstein, Israeli intelligence and the American deep state – suppressed by Facebook, Google & Twitter:

Part one: “Hidden in Plain Sight: The Shocking Origins of the Jeffrey Epstein Case. Epstein is only the latest incarnation of a much older, more extensive and sophisticated operation that offers a frightening window into how deeply tied the U.S. government is to the modern-day equivalents of organized crime”

Part two: “Government by Blackmail: Jeffrey Epstein, Trump’s Mentor and the Dark Secrets of the Reagan Era. Appalling for both the villainous abuse of children itself and the chilling implications of government by blackmail, this tangled web of unsavory alliances casts a lurid light on the political history of the U.S. from the Prohibition Era right up through the Age of Trump”

Part three: “Mega Group, Maxwells and Mossad: The Spy Story at the Heart of the Jeffrey Epstein Scandal. The picture painted by the evidence is not a direct Epstein tie to a single intelligence agency but a web linking key members of the Mega Group, politicians, and officials in both the U.S. and Israel, and an organized-crime network with deep business and intelligence ties in both nations”

Part four: From “Spook Air” to the “Lolita Express”: The Genesis and Evolution of the Jeffrey Epstein-Bill Clinton Relationship. Far from being the work of a single political party, intelligence agency or country, the power structure revealed by the network connected to Epstein is nothing less than a criminal enterprise that is willing to use and abuse children in the pursuit of ever more power, wealth and control”

Related:

The Takeover: How the CIA, Mossad and “the Epstein Network” are Exploiting Mass Shootings to Create an Orwellian Nightmare. Following another catastrophic mass shooting or crisis event, Orwellian “solutions” are set to be foisted on a frightened American public by the very network connected, not only to Jeffrey Epstein, but to a litany of crimes and a frightening history of plans to crush internal dissent in the United States.

* External links to Mint Press News

This article first appeared at Fort Russ News

About Meduza

“…We value our independence and strive to be a reliable, trusted outlet for verified, unbiased information about Russia…”

Yet Meduza, with its’ investigative reporting, hasn’t touched one of the most important, ongoing stories concerning Russia in the 21st Century; rather serves to prop up the unverified, highly biased Western propaganda line accusing Russia of hacking the Democratic National Committee. We’ll come back to this but first:

Speech_Zone - 1

USA ‘color revolution’ hopeful (perennial loser), Alexy Navalny, whose support in Western press crosses every line of hypocrisy, is a lawyer. One might think that he would study the law of that foreign government which supports him most; and discover he could be, if a USA citizen protesting without a permit, be arrested, fined and/or jailed. Or, if by some rational consideration, Navalny (the hypothetical USA citizen), were to abide by the American laws governing protests & protesters, he could be confined to a ‘free speech cage’ (see above illustration.)

Navalny’s most recent protest he organized without a proper permit in Moscow? It was over Meduza Magazine’s investigative reporter, Ivan Golunov, detained on false charges by counter-narcotics police. According to the CIA’s favorite yellow sheet, the New York Times:

Organizers had called the protest to support a Russian journalist, Ivan Golunov, whom supporters say the police had framed on drug charges last week. Pictures produced by the police that seemed to show a drug lab in the reporter’s apartment had been faked. In a rare about-face, the authorities released Mr. Golunov on Tuesday, acknowledged that there was no evidence to support the charges and opened an investigation into the police who had detained him”

Ok, so Russia has corrupt police, now, for a comparison, try your favorite search engine with this precise terminology: “Police ‘throw down’ gun” and see what comes up; decades of American police habit of placing a gun in the hand of an unarmed man they’d shot dead. So, whose police are the greater evil? Let’s consult Jesus:

“You hypocrite! First pull the log from your own eye, so you may see clearly to remove the speck from your brother’s eye”

Back to Meduza and the story their ‘award winning’ investigative reporter Ivan Golunov (or any of the Meduza staff) won’t touch; how it is the Russian state had been framed for the Democratic National Committee [DNC] mails ‘hack’ that was actually a DNC insider leak by the assassinated Seth Rich.

Screenshots of two mails (no replies) I’d sent to Meduza on different occasions of their propping up of a tired ‘the Russians did it’ propaganda lie:

On 11 August 2018

Meduza - 1

“Dear Meduza

When allegations which have been rebutted by multiple independent sources & experts…

“…In 2017, when he was finally arrested, Kozlovsky personally took credit for hacking the Democratic National Committee, claiming that he acted on Dokuchaev’s explicit orders. Already in pretrial detention when Kozlovsky made these allegations…”

@ https://meduza.io/en/feature/2018/08/07/it-s-our-time-to-serve-the-motherland

…are presented in a manner that allows for readers to take the allegations as plausible fact, it poisons the entire narrative (all of your article.) For a start, I suggest Meduza open to possibility the USA’s FBI is as (or more) corrupt as any agency in Russia and then have a read:

https://ronaldthomaswest.com/2017/09/16/incompetent-espionage-wikileaks-iii/

Sincerely

Ron West

http://ronaldthomaswest.com

“The history of the great events of this world are scarcely more than a history of crime” -Voltaire [end quote]

And on 12 November 2018

Meduza - 1 (1)

“Hello Meduza

Why do you go on discrediting your publication with this following, tired lie invented by US intelligence:

“According to U.S. intelligence, this was also a base of operations for 10 hackers and GRU officers who infiltrated the Democratic National Committee computer network”

@ https://meduza.io/en/feature/2018/11/06/what-is-the-gru-who-gets-recruited-to-be-a-spy-why-are-they-exposed-so-often

There was no Russian ‘hack’ of the DNC, it was an insider theft. It’s just a pity when an intelligence professional looks at your media platform and see you disseminate the very sort of disinformation you propose to expose, discrediting your larger work. Here’s the better information:

https://ronaldthomaswest.com/2017/09/16/incompetent-espionage-wikileaks-iii/

Ron West

http://ronaldthomaswest.com

“The history of the great events of this world are scarcely more than a history of crime” -Voltaire [end quote]

So, Meduza, the hard-hitting anti-corruption publication exposing dirt in Russian politics, ducks the biggest story of our time; how it is Russia had ‘hacked’ the DNC mails, actually an American intelligence agency fraudulent propaganda line and more: Meduza upholds this fake news story with 3rd party references rather than dig into what should otherwise produce displeasing result to all those in love with Navalny’s perception of Putin.

So, who is the boogeyman here, who are the liars? Putin or Navalny? Pravda or Meduza? Hosted by NATO Chihuahua Latvia, Meduza Magazine works out of an extreme Russophobe environment. One might suppose it were never a black & white world when faced with news about Russia from certain self-hating Russians –

 

This article first appeared at Fort Russ News

In a larger strategy to destroy the neoliberal wing of the USA’s ‘deep state’ during the current period of internecine war between branches of the shadow government, longtime ‘bosom buddies’ William Barr and Robert Mueller, both members of the George H.W. Bush initiated “Enterprise” criminal cabal embedded in the CIA, have hatched a plan to reelect Donald Trump (or had the plan hatched for them.) [1], [2]

1) Barr is given the sole authority to declassify documents relevant to the 2016 election:

“President Trump issued a memorandum last week that transfers to the Attorney General the authority of the Director of National Intelligence to declassify intelligence information concerning the 2016 election.

“The memorandum effectively amends Executive Order 13526 on classification on national security information, but in a highly customized way: It applies only to Attorney General William Barr (not any successors) and only to the investigation of the 2016 presidential campaigns” [3], [4]

2) Mueller, rather than unambiguously state Trump committed crimes & obstructed justice that he has no authority to prosecute because removal of a President is the sole prerogative of Congress, or in the other direction, definitively clear Trump of any wrongdoing, instead employed ‘weasel words’ sucking the largely rabid anti-Trump Democrats into renewed demand of impeachment:

“Central to the special counsel’s decision making was a Justice Department guiding opinion that says no sitting president can be indicted for a crime. While Barr said in no uncertain terms that the policy had nothing to do with the decision not to pursue obstruction of justice charges, Mueller highlighted that issue as central to the outcome of the investigation.

“If we had had confidence that the president clearly did not commit a crime we would have said so,” Mueller said. But, he added, in light of the Justice Department opinion, “charging the president with a crime was, therefore, not an option we could consider.” [5]

Subsequently, Mueller is seen as believing Trump committed crimes and Barr as covering for Trump. Meanwhile, Mueller won’t appear before Congress to testify but instead rides off into the sunset, and Barr holds the investigation’s declassification authority. In effect, this artificially constructed, unnecessary legal-constitutional ambiguity, is a set-up.

The Democrats will pursue impeachment, as Barr ‘grudgingly’ declassifies titillating pieces of ‘the evil Russians did it’ investigative documents, sucking the Democrats in further & further until the critical portions are finally unveiled, vindicating Trump, making the pro-impeachment forces look like the small and vindictive idiots they actually are, emphasizing idiots. This will, no doubt be played to timing around the 2020 election cycle.

The result should be (presuming all goes to plan) the independent minded voters (those not inclined to reflexively vote Democratic) giving Trump the popular vote, not only the electoral college.

In this process, throughout, ‘the evil Russians 2016 election meddling’ meme will be carefully preserved along with all acts necessary (inclusive of murder, if the threat is perceived as big enough) to conceal the CIA having invented so-called “Russiagate.”

At the end of the day, it looks as if the Christian Zionist arm of the American deep state seeks to strong-arm their way into bringing us literal Armageddon (they actually believe in it) with the Mike Pence prophecy the USA will be at war with Russia in Europe, as opposed to empire’s slow death by 10,000 self-inflicted cuts (the neoliberal model.) [6], [7]

Pickens-bomb - 1^ Dr Strangelove’s Major Kong ‘rides the bomb’ [8]

 

[1] https://wikispooks.com/w/images/a/a4/Fifty_Years_of_the_Deep_State_%28Mark_Gorton%29.pdf

[2] https://wikispooks.com/wiki/US/Deep_state

[3] https://fas.org/blogs/secrecy/2019/05/dni-ag-declass/

[4] https://fas.org/sgp/trump/pm-barr.pdf

[5] https://www.asiatimes.com/2019/05/article/mueller-surprise-helps-us-stocks-continue-slide/

[6] https://original.antiwar.com/Danny_Sjursen/2019/05/27/the-pence-prophesy-vp-predicts-perpetual-war-at-the-west-point-graduation/

[7] https://ronaldthomaswest.com/2017/01/18/trumps-dni-a-dire-wolf-for-jesus/

[8] https://www.youtube.com/watch?v=5D_ENfo3RKo

The introduction to this series, for those who’d not read it or would wish to review it, may be found HERE. It is recommended the introduction be read prior to delving into any of the articles in this series.

 

Stargate Project Part Three

This series began with referencing a story of contemporary Russian military ‘combat’ parapsychology efforts discussing the American Defense Intelligence Agency’s ‘former’ research into the paranormal phenomenon called “remote Viewing” (the real focus of the Zerohedge story, for lack of information on the Russian side.) This author has taken the story forward to develop its’ implications for what is named “Transcendent Warfare” in a paper for the Marine Corps War College discussing the ‘discontinued’ Stargate Program.

Part three explores the actual possibilities available to the modern mentality; or so-called ‘civilized’ states’ pursuit of Stargate type programs exploring a ‘transcendent warfare’ understanding, within the severely constricted Cartesian-Platonic cultural paradigm.

they would ‘literally’ see you coming

Ceremonial ‘remote viewing’ translates to English across the several Northern plains tribes as the ‘telescope lodge.’ This had been an authentic practice deriving from ancient times. In the modern era it is problematic for a few reasons, not least because it has become a widely faked practice. [1]

Setting aside the out & out fakes, there should be those natives assimilated to Western culture to some degree (one hates to say ‘damaged’) who retain a higher than average (compared to Western psychics) ability to ‘see’, if for no other reason than there had not yet been enough generations of these linages stamped out by Christianity. If these parties had access to the original laws (oral tradition, sans training) concerning this ‘sight’, they should know the rule: each time this sight is used frivolously, one day is subtracted from your life expectancy.

Then, there are those surviving bonafide practitioners, properly trained in the tradition of sight, aware of the web’s energy strings and possessed of the ability to see the ‘energies.’ The implications for the Western investigator seeking this knowledge, if they only knew the actual score, would be something larger than profound; for the fact these indigenous high practitioners actually do exist but for the Western world, they might as well not exist, because you could not ‘see’ them. This paradox of invisibility I am pointing to is, these particular people would literally ‘see’ you coming, not merely as some individual but with all of your attending ‘energies.’ This fact would automatically shut off all transfer of information to anyone associated with ‘error recordings’ in a macro-cosmic sense. Let me explain:

Accumulated small ‘error recordings’, although nearly unknown in the past, are common today because Western culture has determined ‘selection pressure’ for intelligence is no longer applied to the community in either; the social-cultural context (leadership), or its’ closely associated natural context (survival exterior to the village.) The rude (honest) manner of stating this phenomenon of the current era would be ‘morons abound.’ We’re used to seeing this in the modern times, very few individuals remain in a state of integrity providing a clean (error free) light. Altogether different to this ‘dull’ light is another error recording reflected (one could say) in intense light; there is no escape when your mistake is large, it cannot be concealed. Anyone associated with a project like Stargate, or other project, seeking method that short-cuts or otherwise ‘cheats’ (records errors into their light concerning) those avenues the living macrocosmic system actually offers, should discover their pilgrimage into the actuality of the ancient world’s learning continue to vanish before their eyes; like a mirage. None of the practitioners still fluent in the truly ancient ways would wish to ‘dirty’ their own light by opening to anyone with severe, recorded mistakes. Just exposing themselves can damage their abilities. Cultural anthropology could never ‘find’ these people (they could not authentically open), it simply never worked. With the real priests of the knowledge ruled out, what you’re left with in any search for keys to transcendent warfare (exploitation) is the intermediate level practitioners (between the fakes and the real) or what Floyd HeavyRunner (High Priest of Okan) called “The Witches.”

forbidden practices

Mel Gibson’s Catholic hypocrisy concerning Meso-American civilizations (noting the Christian civilization’s ritual cannibalism called “Communion”) should not be construed to extend ‘savagery’ to those native nations who’d not strayed from the lessons of the ‘living clock’ briefly encapsulated in the preceding pages. In fact, the Blackfoot prohibition on cannibalism is *at minimum* 12,000 years old, dating to the story of the cannibal witch ai-ta-pyooyi and her attempted escape from justice by crossing a river while riding on the back of a mammoth (the mammoth submerged and she was swept away by the current and drowned.) [2], [3]

It follows, we should look at the Ancient system in a light of ethics outside of stereotype, including stereotype produced by Western anthropology.

The fact of a knowledge of ‘sorcery’ (a superstitious misnomer, authentic practices would be based in easily understood principles of Western science if there were no Cartesian-Platonic misconception called ‘objectivity’) is inescapable in the journey of learning in the ancient way. For many millennia, social ethics practice prohibited its’ employ. These prohibitions had been based in a superior understanding of consequence due to ‘error recordings’ connected to ‘energy strings’ where deliberate machinations (as well, lesser mistakes) exterior to ‘permissions’ (permitted avenues) should invariably lead to disaster. This recalls the anecdote where a ‘whiteman’ (a light-skinned Indian misidentified as such) had been insulted at ceremony by a racist Native American. The ‘offended party’ actually took no offense but was well aware of the higher order of rules; remaining calm and ‘perfectly’ not reacting (not recording the mistake into himself), it was a few hours only and the the offender was notified his mother had, just a few hours before, suddenly and unexpectedly died.

Because ‘the energy string’ could not ‘attach’ to the target of the insult, it rebounded to the source the problem; in a culture (matriarchy) where women are the disciplinarians, in this particular instance the energy ‘dead-ended’ at its’ source or in the party who’d failed to adequately instill proper behaviors in the offender. Ceremony transcending the space-time continuum accentuated this (made it immediate.) In the ancient way, insults are considered to be a form of petty sorcery (referencing the English term ‘curse’), and because of the phenomenon of energy strings, sorcery in an indigenous context is a dangerous business, recalling the old West frontier wisdom ‘it would be smarter to outright kill an Indian, than to insult him.’

In light of this (immediate preceding) bit touching on the intelligence agencies’ exploring the possibilities of “transcendent warfare”, while seeking to circumvent the space-time continuum via the so-called “hemi-sync” device, it will do to give a first hand example of indigenous ceremony relevant to this.

There is an (largely unknown to the anthropologists) ancient (by oral history account 900 or more years) antecedent to the ‘Ghost Dance’ of Wovoka, to which this reporter (yours truly) was apprenticed to a priest for eleven years (Fall of 1981 through 1992.) During one of these events on upper Cut Bank Creek above Starr School on the Blackfeet Reservation in Montana, USA, there was a knock on the door of the ceremonial house which was unusual because during ceremony the rule is an open door, no knocking. Sitting closest to the door, I opened it to a young woman asking for help, there had been an automobile wreck and people were hurt. The main room this door opened to was crowded, with many ceremonial attendees, and as I turned to ask who would be able to assist, people were already moving towards the door to go out and help, everyone had seen and heard the person at the door. But no one was there. The young woman had vanished from plain sight in open terrain. Her description fit one of the victims of a car accident two years previously, only a short distance from the house. These are (or had been) frequent occurrences in the pre-Western indigenous experiential context.

The qualitative difference between the artificial lab experiments or “hemi-sync” and the ceremony is quite large; when the entire group is in the channel opened in the space-time continuum, without ‘projection’ or motivation to investigate and/or manipulate, there is little danger posed to those who keep within the ceremonial rules where the window is opened and closed. On the other hand, one can only speculate (in case of classified records) whether some of the ‘hemi-sync’ experiments resulted in ‘lost’ mentalities where there had been projection of the person’s awareness to place unknown where they became trapped in out-of-body experience (couldn’t find their way back), perhaps had their awareness dismantled or destroyed, or at the other end, became opened to what only could be called ‘possession’ in the Western religious sense. Because the Western lab begins from the premise…

“a training system designed to bring enhanced strength, focus and coherence to the amplitude and frequency of brainwave output between the left and right hemispheres so as to alter consciousness, moving it outside the physical sphere so as to ultimately escape even the restrictions of time and space. The participant then gains access to the various levels of intuitive knowledge which the universe offers”

…but there is clearly no foundational or working understanding of just what it is ‘the universe offers’ in a program that recklessly risks the unknown, seeking to exploit reality parameters for the purposes of espionage and “transcendent warfare.” This approach would be best abandoned for a limited understanding of the energy strings exploited by common sorcery.

Sorcery in the modern world is a much degenerated practice when juxtaposed to that prohibited by the ancients. In this respect, an understanding of sorcery should be framed in such a way as to circumvent the modern (church invented) stereotype blaming pagan practices which were likely something altogether different than the charges promulgated by their accusers. Authentic pre-Christian ceremony and sorcery in the indigenous American hunter-gatherer sense had been mutually exclusive concepts, any bonafide sorcerer would steer clear of authentic ceremony and the priests of the indigenous philosophies disallowed the practice. [4]

Reframing the concept returns us to the most ancient stories of a time when the women’s law (matriarchy) came into being and the capital punishment for a woman (a law made by women, for women) was the cutting off of the nose to make the living person resemble a skull. This terrible act is as old as the stories of a time when women were possessed of a power that could kill with simple focus and projected thought: “I put my finger through that person.”

On the other hand, men required more effort to perform a fatal act of sorcery, they needed to draw the attention of the victim in some way as to generate fear, setting up an energy string for exploitation. One method to do this would be to poke a sharp stick into a man’s footprint in circumstance where the intended victim should notice and discover one of his arrows had been stolen, modified & used against him. The arrowhead might have been removed and used on another arrow to superficially wound, not fatally, a dangerous animal, perhaps a bear. The intended victim would not explicitly know this second part of the act of sorcery but would *sense* a crime committed that should trigger fear in future encounter. Exploiting the principles of ‘energy strings’ (spinning an unnatural line in the web) this way, the criminal actor exploits fear; and depending on the level of ‘error recordings’ in the victim, (the knowledge of the victim he has uncorrected mistakes), this sequence of events could easily lead to death, whether by an actual bear in surprise encounter via the artificial energy channel tied to any bear encountered sensing this person as a threat, to the fear concept’s methylation of the victim’s DNA causing a cancer, or the associated mental distress and preoccupation causing a loss of ‘sight’ and consequent inattention in circumstance leading to a fatal outcome. On the other hand, if the intended victim was possessed of ‘clean light’ (no, or minimal & faint, error recordings), the act of sorcery should backfire and dead end with (terminate) the initiator. Sorcery was (and is) a dangerous business. [5]

Were the preceding to be experimented with, example given, by the micro-organism sized, ethical personalities running DARPA, one should expect a lab fire of unprecedented scale. It is small wonder ‘civilization’ appears suicidal.

a re-posit of sod’s or murphy’s law

Briefly returning to the ‘remote viewing’ phenomenon, juxtaposed to the idea of ‘energy strings’ and sorcery, it should be stated in introduction to this last section of part three they are both; channels and strings that open like channels and vibrate like strings. I would use the metaphor of light is both a particle and a wave. Remote viewing (and more radically, ‘hemi-sync’) & ceremony employs this phenomenon as a channel, sorcery employs these ‘avenues’ as strings. [6]

When ceremony ‘opens a window’, this is not projective, but specific to invitation created for visitors called (in the common vernacular) ‘spirits.’ In other words, a ceremonial ‘safe space’ is created where our ancestors mingle with the ‘present’ people and (if there is a future) the ‘future’ people (for whom we are the ancestors.) The ‘qualified’ equivalent of ‘hemi-sync’ we create as ceremonial people is a synchronizing of the GROUP via ceremonial behaviors inclusive of several acts related to relics & taboos. We know who we are dealing with via the relics, and the taboos keep unwanted lanes shut. We know how it is to be done. All of this is, in a sense, passive. Invitations only are broadcast, and only down known lanes.

When space-time is ‘transcended’ *exterior to* certain principles recognized and practiced in the preceding, that is to say in the Cartesian-Platonic lab, Richard Dawkins denial notwithstanding, it is an invitation to Murphy as the Whiteman’s god of havoc. These people simply put, will have no idea whatsoever which and/or what sort of energies will have found their way into our space-time continuum. How it all plays out is anyone’s guess. [7]

return to the women

Noting it was a Russian politician divulged the existence of paranormal battle formations and a Russian general denied this, I would side with the politician as it is entirely possible remote viewing channels were employed and *expanded* to suggest certain actions, concealed as intuitive thought, while, example given, directing a certain NATO frigate into the inexplicable (other than attributable to Murphy’s Law) collision that sank it. This proposed scenario should require close, coordinated attention to detail provided in real time through highly gifted (probably female) mediums, and it would be complex and rely on a convergence of circumstance to succeed. Did it happen? If it did, we’ll likely never know. [8]

Another means of defining ‘sorcery’ in the ancient indigenous sense would be to identify those individuals who step outside of the group (social) taboo parameters or separate (isolate) themselves while retaining a high understanding of the use of channels and strings. It was known to happen.

The qualitative difference from ancient to today, concerning the preceding, is stark; the indigenous cultures (everywhere) are in a constant state of drift out of alignment (synchronization with) the natural order and (at best) into a locked down imbalance of logos (Jungian sense), no matter if ‘liberal’, nonetheless representing the Western ‘split & separation’ of the psyche. From the Western (mistaken) view, this could be seen as a sort of self-healing herniation, with the (now autonomous) female intelligence in ever shrinking state. Within the resultant male hierarchical order, the most effective talent pool for manipulation of the energy strings should be found in those organically intelligent women least educated in Cartesian-Platonic methodology and had avoided intense indoctrination into monotheism (the two ‘offenders’ representing a kind of psychologically malignant, male-narcissist, homosexual coupling.) In other words, those women (of good character) least shaped into the collective Western male psychology. An intuitive sense of kinship with nature would be important.

Drawing from this talent pool, going on to manipulate the Cartesian-Platonic ‘god of havoc’ (Murphy), there subsequently could be an effective, collective sorcery method employing the web as strings (as opposed to channels) that could be devastating in the employ of war.

The method would be to ‘spoof’ (mimic) the principle of ‘error recording’ where, example given, one’s enemy force concealed a ‘rape culture’ in a literal-factual sense (not unusual in the Western civilization’s history of military.) Also, that force represented an empirically demonstrable, covetous nature and threat, opposed to one’s own community well-being (interpreted by these women as a threat to the feminine nature.)

The caveat-obstacle to this next would be, your own force would have to be nearly lily-white (clean) and free of hypocrisy in regards to the preceding (rape culture absolutely NOT tolerated) for this next to be effective.

It could be so simple as to have these ‘good character’ female ‘brigades’ retreat to their most comfortable locations in nature, with bare feet on the ground (or otherwise somehow integrated with touch), and meditate with a visceral hate towards their perceived enemies, emphasizing chaos, thereby activating an ‘error recording’ principle or greater selection pressure onto the opposing force. In circumstance where there is clear delineations (without or minimal hypocrisy), counter-attacks should be automatically repelled and returned via the strings resulting in ‘termination’ events (failed to penetrate the ‘clean light’ or good character element of the error recording principle.)

 

Foreword the A + B = C misapprehension of reality

Stargate Project (0) series introduction

Stargate Project (1) down the rabbit hole

Stargate Project (2) the nazi meme

Stargate Project (3) transcendent warfare < you are here

Stargate Project 0.0 epilogue

 

[1] Discussed in Penucquem Speaks https://www.scribd.com/document/49628160/Penucquem-Speaks

[2] https://www.smithsonianmag.com/history/europes-hypocritical-history-of-cannibalism-42642371/

[3] Tribes other than the Blackfeet also have ‘mammoth traditions’ https://anthrosource.onlinelibrary.wiley.com/doi/abs/10.1525/aa.1934.36.1.02a00060

[4] The modern exception to the prohibition on sorcery is the stick game, where the now prohibited man-hunting sport in inter-tribal warfare (a sort of ongoing inter-tribal Olympics) has found a new home via sorcery in the ‘money games’ perversion of what had originally been an oracle based on the ‘energy strings’ permeating all that is. See the chapter on stick game from Penuquem Speaks for a detailed use of this knowledge in the game context: https://ronaldthomaswest.com/2014/04/02/the-stick-game/

[5] https://moffittcaspi.trinity.duke.edu/sites/moffittcaspi.trinity.duke.edu/files/G_Mill_Childhood_violence_ex_changes_April_2012.pdf

[6] https://global.canon/en/technology/s_labo/light/001/11.html

[7] https://en.wikipedia.org/wiki/Murphy%27s_law#In_reality

[8] https://gcaptain.com/norway-releases-preliminary-report-on-frigate-collision/

 

A former Sergeant of Operations and Intelligence for Special Forces, Ronald Thomas West is a retired investigator (living in exile) whose work focus had been anti-corruption. Ronald is published in International Law as a layman (The Mueller-Wilson Report, co-authored with Dr Mark D Cole) and has been adjunct professor of American Constitutional Law at Johannes Gutenberg University, Mainz, Germany (for English credit, summer semester 2008.) Ronald’s formal educational background (no degree) is social psychology. His therapeutic device is satire.

Contact: penucquemspeaks@googlemail.com

This article is also at Ft Russ

As a longtime ‘unsuscribed’ person from all mails at Foreign Policy Magazine, not only the ‘Security Brief’ newsletter, it was interesting to me to receive an “internal test’ of the ‘Security Brief’ FP mail. What are the possibilities?

1) It was a straightforward snafu of the Foreign Policy web propaganda outlet.

2) Foreign Policy is losing readers and they ‘faked’ an erroneous mail to try and draw former subscribers back.

Both preceding scenarios indicate the ethically challenged Foreign Policy keeps the email addresses of former subscribers in their database. Then, there are these next possibilities:

3) A ‘disgruntled someone’ at Foreign Policy wanted me to see this issue of the ‘Security Brief’ newsletter (the narcissistic option.)

4) Someone else, possibly Britain’s GCHQ electronic spy service wanted me (and possibly a lot of people) to see it (the paranoid option.)

The third possibility (preceding) is straightforward enough; from the Maidan coup to MH-17 shot down by a Ukrainian fighter jet to ‘the Russians did it’ liberal democracies’ intelligence agency (dis)information operations (DNC ‘hack’ & Steele ‘dossier’), this reporter (yours truly) has on some occasions been at the forefront of poking holes in the steady diet of lies we are fed by the deep state’s handmaiden corporate media.

The fourth possibility is so simple as paying attention to one of my software’s security warning; so, rather than copy and paste the University of London SOAS ‘sponsorship’ logo into this post, defeating the ‘https secure’ option, I took a screenshot of the logo from the FP ‘Security Brief’ newsletter and reprocessed it to safely integrate when reconstructing the FP mail here (see below.)

In this post, I have truncated the “internal test” ‘security brief’ newsletter to leave that material most interesting to this reporter; the ‘evil Russians and fake news’ thumbnail (that is the actual fake news.) The short conclusion drawn is below the italicized text.

My letter in reply to Foreign Policy’s “internal test” ‘Security Brief’ newsletter (also forwarded to multiple addresses at London University’s School of Oriental and African Studies or SOAS)

Ron West
To: securitybrief@foreignpolicy.com
Re: Tip

Dear Foreign Policy

Re: “INTERNAL TEST: Security Brief: The U.S. Military Has a Civilian Casualties Problem” I wish to inform you, having perused the snafu mail’s content, particularly concerning “getting thoroughly played by Russian intelligence in 2016” fraudulent story, my (soon to posted at this correspondent’s blog, with screenshot of your mail) lampoon titled ’The Scam’ begins:

Dear Sir:

I am Professor Bwana Ungawa, Director of the communications department at Lord Greystoke Institute of Technology. I am contacting you today regarding my former employ as United States Under Secretary of State for Public Information. My work oversaw the United States Information Agency’s black budget program to buy journalism and certain residual funds in the amount of USD$26 million, deposited in account at London. I was appointed curator of these non-returnable black budget funds for the purpose of lavish expenditures on staff at Foreign Policy Magazine; but to my astonishment a colleague correctly informed myself it is possible to buy a Foreign Policy correspondent for the price of a Banderista hooker from the West of Ukraine or about ten dollars! …*

*the expression ‘Bwana, Ungawa!’ (or Tarzan! Attention!) is taken from the 1940s Johnny Weismuller Tarzan movies. Tarzan author Edgar Rice Burroughs should be the FP ‘London Project’ patron saint of media fiction.

Regards

Ron West

http://ronaldthomaswest.com

“The history of the great events of this world are scarcely more than a history of crime” -Voltaire

Begin forwarded message:

From: Foreign Policy <noreply@crm.foreignpolicy.com>
Subject: INTERNAL TEST: Security Brief: The U.S. Military Has a Civilian Casualties Problem
Date: May 8, 2019 at 11:20:57 PM GMT+2
To: “[redacted]@gmail.com”
Reply-To: Foreign Policy <noreply@crm.foreignpolicy.com>

FP_University_London - 1

Good Thursday morning and welcome to Security Brief Plus. Please send questions, tips, and feedback to securitybrief@foreignpolicy.com.

The Disinformation Beat

What to do. Not a day goes by without a warning about the danger of disinformation for politics and national security, so consider for once a proposal for what to do about it: empower national election commissions to create regulations for campaigning.

In an essay for FP, Arjun Bisen argues that calling on tech companies to regulate speech risks ceding too much power to non-democratic institutions and that a bit of smart regulation could go a long way toward improving the state of political campaigns in an era of disinformation.

Conversations about how to better handle issues of disinformation are also occurring in newsrooms. After getting thoroughly played by Russian intelligence in 2016 and blanketing the airwaves with coverage of emails hacked and leaked by the Kremlin, American newsrooms are doing a bit of soul searching about how to report on hacked documents, CNN reports. There is little evidence of stringent new policies being put in place, but the newsrooms surveyed by CNN say they will treat hacked material with care.

But the media is still struggling to understand exactly what constitutes disinformation, as Poynter reports. A lack of context or false context to apparently true information represents perhaps a greater problem than outright false material.

This email was sent to [redacted]@gmail.com because you are subscribed to FP’s Security Brief newsletter. Want a friend to receive this newsletter? Forward it now. Want to receive other FP newsletters? Manage your FP newsletter preferences.

UNSUBSCRIBE | PRIVACY POLICY | CONTACT US | ADVERTISE

Foreign Policy magazine is a division of Graham Holdings Company. All contents © 2019 The Slate Group, LLC. All rights reserved. Foreign Policy, 1750 Pennsylvania Ave NW, Suite 200, Washington, DC 20006.

*

In other words, while referencing the Counterfeit News Network (CNN) & Poynter, Foreign Policy maintains the ‘hacked’ (a lie, these mails were almost certainly leaked from the inside by Seth Rich) DNC mails story should be retroactively looked at not for the mails newsworthy content but for the very fact they were reported on AT ALL (FP appears to have a problem with drawing attention to that content and questions as to the actual source of the leaked mails.) Placing the mails actual content under the authority of a regulatory body determining whether the ‘aura’ surrounding the story is desirable points to possible censorship and related imprisonment and fines for futue reporting outside the scope of the propaganda line.

The other noteworthy item in the ‘snafu’ mail is, London University’s School of Oriental and African Studies (university think tank) sponsoring the purveyor of the authentically fake news promulgated by Foreign Policy. That ‘special relationship’ with ‘Our American Cousin’ (the play Lincoln was watching when John Wilkes Booth shot him at Ford Theater) is going strong; We (Americans) support Britain’s phony Skripal poisoning narrative and Britain supports our (American) (dis)information operation concerning the DNC mails (with the Steele Dossier firmly fixed in the middle, an intelligence operation sponsored by both sides.)

Note: As I was finishing up this piece, Foreign Policy sent an ‘oops!’ mail apologizing for their snafu:

We’re sorry.

Yesterday, Foreign Policy accidentally sent you an internal email testing a new format for our Security Brief newsletter. We regret the error and have taken steps to ensure it won’t happen again. We value your continued readership and interest. 

And since we accidentally gave you a sneak peek, we welcome any feedback you’d care to offer on our new email format! If you’re not currently receiving Security Brief, sign up here, and we’ll be sure you receive the redesigned email

This points to 2) Foreign Policy is losing readers and they ‘faked’ an erroneous mail to try and draw former subscribers back (but also could be cover for 3 or 4)

Meanwhile, the guy in Britain who’s been tearing up the ‘official’ Skripal narrative at:

http://www.theblogmire.com/

The ‘alternative Skripal narrative’ at:

https://michaelantonyblog.wordpress.com/2019/02/22/the-alternative-skripal-narrative/

A former NATO (Canadian) intelligence officer on ‘the evil Russians did it’ corporate fake news meme at:

https://patrickarmstrong.ca/

And one from the author (yours truly) …

https://ronaldthomaswest.com/2018/01/31/the-wheel-is-indeed-empty/

 

A former Sergeant of Operations and Intelligence for Special Forces, Ronald Thomas West is a retired investigator (living in exile) whose work focus had been anti-corruption. Ronald is published in International Law as a layman (The Mueller-Wilson Report, co-authored with Dr Mark D Cole) and has been adjunct professor of American Constitutional Law at Johannes Gutenberg University, Mainz, Germany (for English credit, summer semester 2008.) Ronald’s formal educational background (no degree) is social psychology. His therapeutic device is satire.

Contact: penucquemspeaks@googlemail.com

 

%d bloggers like this: