“At the banquet table of nature, there are no reserved seats. You get what you can take, and you keep what you can hold. If you can’t take anything, you won’t get anything, and if you can’t hold anything, you won’t keep anything. And you can’t take anything without organization.” ~ A. Philip Randolph

By Catherine Austin Fitts

This coming week, we continue the publication of our 1st Quarter 2021 Wrap Up with Part I of our Take Action 2021 theme: Loosen Technology’s Grip on Your Mind with Corey Lynn.

One of the most powerful actions we can take is to organize, especially if we can do so with people we trust. This was the original purpose of Solari Circles, which we are revisiting to help with the specific challenges of our current situation.

To understand the possibilities of a Solari Circle, I invite you to check out several presentations posted at the 1st Quarter 2021 Wrap Up web presentation: “Solari Circles: Take Action Together” by attorney Carolyn Betts, “Solari Circles: Taking Action at the Local Level” by former town manager Gary Heckman, and a special report by Corey Lynn of Corey’s Digs: “Loosen Technology’s Grip on Your Mind.” These presentations will be available on the Take Action 2021 web presentation by Thursday night. I recommend you read Corey’s article before listening to the interview.

Before setting up a circle, it is important to be aware of things that could sabotage your circle, such as surveillance and mind control technologies. It is, therefore, critical to know about technologies that sabotage a coherent mind and how to protect yourself. For Part I of Take Action 2021, all-star reporter Corey Lynn will join me to discuss these issues. I will talk about Solari Circles in Part II in the last week of April.

For Let’s Go to the Movies, I chose a delightful Italian movie: Enrico Piaggio – Vespa. The movie is about the life of Enrico Piaggio and how he created the most famous scooter in the world, Vespa, during one of the most challenging times in Italy. A version of this movie with subtitles is available on Netflix in Europe. If you are in the U.S., you will need a VPN to choose a location in Europe where the movie is available.

In Money & Markets this week, John Titus will join me to review current financial and geopolitical events and how they relate to the Going Direct Reset. E-mail your questions for Ask Catherine or post at the Money & Markets commentary here.

Please join me this Thursday, April 22nd, for the 1st Quarter 2021 Wrap Up: Take Action 2021, Part I.

Talk to you on Thursday!

Related Solari Reports:

1st Quarter 2021 Wrap Up: Equity Overview
1st Quarter 2021 Wrap Up: News Trends & Stories, Part I
1st Quarter 2021 Wrap Up: News Trends & Stories, Part II
1st Quarter 2021 Wrap Up – Take Action 2021 web presentation


Similar Posts

61 Comments

  1. Very interesting discussion with Corey. The thing is, Yandex finds a whole lot more without too much of the usual censorship. Yet, it’s from RUSSIA. Is that more dangerous than the usual ones from the West?

  2. I am late at suggestions related to this conversation but I feel compelled to share my experience.
    My transition from Windows to Linux lasted for a few years. I tried to be an early adopter (anyone remember Caldera OpenLinux?). Found about CentOS but it has changed to a different model that I do not like. Nowadays I use Ubuntu in all my computers and there is no turning back. Reliability and safety are excellent in my opinion.
    About Intel processors, there are documented issues related to how that manufacturer implemented Simultaneous multithreading (SMT) (https://en.wikipedia.org/wiki/Simultaneous_multithreading) in processors that can represent a security issue: Spectre (security vulnerability)
    https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)
    Security flaws – Intel
    https://en.wikipedia.org/wiki/Intel#Security_and_manufacturing_challenges_(2016%E2%80%932021)
    I disable the capability in the BIOS or in the GRUB parameters.
    About browsers, I use ublock origin and noscript in Firefox and Firefox ESR, with settings in the browser to block third party cookies, and deleting everything in its cache on its own upon quiting its use. No storage of addresses, passwords, nothing at all.
    It is somewhat involved but can be done. Takes time to learn and it is a process of continuous learning.
    Could talk a bit of “smartphones” but I want to leave that for later.

  3. My son has a smartphone, plays Fortnite and I am overwhelmed. It just went to fast, I was naive even though I don’t watch TV, I never had a TV, made that decision consciously when I moved from home. I am working on it really hard and am educating him as well as I can. I hope I get there, tips are more than welcome. I took my son out of public school as Covid hit, happy about that definitely. Its a great start.

  4. I can’t find the Corey Lynn video any more. Can someone please help?

  5. I have a neighbor who well educated – and is a staunch supporter of the vaccines.
    I sent him the forms to look over and was shocked at the response – thought I would share:

    “First, I’m not a school administrator or employer, so these forms have no direct bearing on me. If I were, however, and someone presented me with one of these forms, I’d tell them to find another school/job.

    The forms will not survive the smell test. In order to get a covid-19 vaccine, you have to sign a series of forms, which contain an acknowledgement to the effect that “I understand this vaccine is experimental and may have consequences we did not anticipate.” In signing, you accept responsibility. The forms cannot then re-assign your personal responsibility/liability to a third party, i.e., school or employer. That violates proximate causality, among other things, and no court will uphold it. It’s like crossing your fingers behind your back. The author clearly has no legal background.

    As I see it, the purpose of these forms is to “own the libs” and to inflame passions so one doesn’t think rationally or critically about their content or the underlying motives in disseminating them. They are pretty clearly meant to drive traffic to the author’s website so you can buy her subscriptions, pamphlets and books.

    In this age of rampant conspiracy and disinformation, we all need to be more alert and discerning consumers of ideas. For myself, I’m not sold on hers.”

  6. Dear Catherine

    Do you have any books, videos or website you can recommend to learn about yuan gong?

    By the way, I have been reciting the Deer’s Prayer for the past 3 weeks. I have not noticed any change but I am persevering.

  7. Low-cost wrist strap for earthing/grounding of human body, or for grounding of EMF shielding. The pair costs less than $20, good way to test the benefits instead of expensive mats. Can be used while sleeping or working. Includes 100K resistor, rather than no resistor (unsafe in case of a wiring fault) or 1 megaohm resistor (used for industrial ESD wrist straps, but reduces efficiency for EMF dissipation).

    https://www.amazon.com/gp/product/B076PYKW19/

  8. Hi Catherine, great post.
    Comment: Online stuff like social Media and Games is addictive, mostly by design, rarely by accident. The frog and the scorpion come to mind.
    For social media, I’ve read that the addiction tends to draw the participant toward sensational material. I seem to remember your mentioning that social media is very dark. This isn’t good.
    Re Debian, and systemd, I have tried to avoid that change, because it is an extra layer and extra risk, eventually, I came to accept it. I’d be pretty sure that if you run Mint, you are on systemd. I’ll have another look at it to see if fighting it is worth the effort.

  9. so much grest info here, thank you! i say that as an avid traveler/former touring musician, who has i had to learn and implement many measures to keep things more secure on the road. one trick i like is to keep a little wifi pineapple device in the vehicle that plugs into my laptop via USB and sets up it’s own secure wifi node (to block snoopers). this is useful when forced to use the whatever free wifi is available (like at a starbucks or hotel etc).

    beyond that my airvpn and alt browsers such as epic, dissenter, tor – none of which can be fully trusted – are preferred options. avoiding ads has been a lifelong project and this set up removes most interference tho it all comes at a speed hit and some broken site functionality. i don’t understand how anyone can put up with the noise!

    as far as smartphones go, its such a hard one. i’ve tried to go back to my beloved Razr flip, but it’s a challenge with some of the useful, more trusted apps. I do abstain from having my phone on me as much as possible (and no social media apps) which directly translates into interfacing with humans and the natural world in a much more positive way – it’s a form of training you have to actively engage in, but then it becomes second nature NOT to have it on you. and then you can marvel at the other people in say, a hotspring, who are staring at smartphones instead of engaging in conversation. or relaxaton, lol.

    1. Smartphones are indeed very tricky as they’re almost semi-required for modern life, even for those who use them at a distance!

      We’ve come a long way in the last few years, though, with certain Android ROMs being deliberately built without Google Apps and privacy in mind. LineageOS and GrapheneOS are two good examples, though of course, carriers won’t sell you these phones.

      Phones without Google Apps are referred to as “degoogled” phones and you can flash them yourself if you’re tech-savvy:
      https://wiki.lineageos.org/

      Degoogled phones nuke contact tracing, voice recognition, hyperaccurate location data, forcing acceptance of Google Terms and Conditions, and will likely increase performance and battery life in the process.

      I sell degoogled phones and offer free educational resources about them over at https://privacytogo.co/ but there are tons of other free resources scattered about the ‘Net for those unafraid of a bit of command-line action.

  10. I am trying to explain entrainment and mind control to my teens without scaring them silly with things like MKUltra etc.
    Do you know of any resources to explain the workings to kids (13 and 14)?
    My daughter specifically asked how there could be entrainment on Youtube tick tock videos. My best answer was it is like a flip book (we’ve made these to understand how videos work) with an extra page that you don’t consciously perceive but that you unconsciously see and respond to. I told them about the movies and coke products. Not sure she totally believes me yet.
    They play music so I will try to explain the undertones to alter mood.
    but, any supporting evidence would help (from Not-Mom sources 🙂
    I find my kids really respond to understanding the background and technology (best I can explain) and will willingly work to reduce their risks if they understand why and how.
    Alissa

    1. The TV series “Eureka” has several episodes on mind control (e.g. one episode involved hypnosis via subliminal programming in music), in a family-friendly format with humor and MacGyver-style science escapades. The first three seasons are a good introduction to the organizational dynamics of cutting-edge scientific research, for those considering advanced degrees or careers in tech.

      Available on DVD and Amazon Prime.

    2. Musical comedy, https://en.wikipedia.org/wiki/Josie_and_the_Pussycats_(film)
      “Meanwhile, MegaRecords CEO Fiona (Parker Posey), in a meeting with world government representatives, details how the United States government has conspired with the music industry to hide subliminal messages in pop music to brainwash teenagers into buying consumer products. Musicians who discover the hidden messages in their music are made to disappear via staged plane crashes, drug overdoses and similar disasters.”

      The storyline may be relevant to upcoming news cycles, as Britney Spears’ request to address the court in June has been granted. https://www.cnbc.com/2021/04/27/britney-spears-requests-to-address-court-at-hearing-on-her-conservatorship.html

      Along similar lines, Season 4 Episode 3 of “Angel” includes a musical residency in Vegas.
      https://en.wikipedia.org/wiki/The_House_Always_Wins
      ” the three run out into the casino to find Angel. He is playing slot machines in a zombie-like state and ask him to pose a distraction while they rescue Lorne. Angel is too entranced with his gambling to comprehend the plan. DeMarco is pleased when he receives information that Angel is a souled vampire, realizing Angel’s destiny will be profitable. Lorne confesses he tells Lee about the people with bright futures so that they can be lured into the Spin and Win game. Their destinies are sucked into the chip they play and later sold on the black market.”

      Shades of Alison McDowell and human capital markets. CAF has previously mentioned the book on applying casino techniques to online games and social networks, “Addictive By Design”.

      For those entering their first jobs, Angel Season 5 is a good introduction to corporate politics, told via the vehicle of an “evil law firm” that is taken over by the vampire-fighting Angel team, who then have to deal with existing contracts to support corporate clients, such as … vampires 🙂 A season-long exploration of themes from the 1997 film, “The Devil’s Advocate” with Al Pacino as Satan.

  11. Thanks CAF & Corey!!! Nice discussion with mega helpful hints. FYI, the shriek o meter, (in this case, ABC Channel 7 News/San Francisco Bay Area), just reported that the Calif DMV is relaxing its deadline for its required Calif Driver’s Lic. conversions to a “REAL ID” version, up to 2023. The magic virus has caused excessive delays all around so the pressure to make this conversion has, poof, been delayed & extended! Makes you deduce that the vaccine will provide a much more thorough ID platform going forward as a technological interface for both individual ID and tracking……

  12. wonderful discussion, thank you. and thanks for all those recommendations.

    for kids, there is a watch for sale in Asia called IMOO. it has only text message and phone call functions to specific numbers that the parent can input to a list of permitted contacts. it also has a real time GPS function so the parent can see where the child is. the GPS feature certainly poses risks but for me I think access to social media is much worse. otherwise with a smart /dumb/ phone you get social media and GPS tracking anyway. lesser of two evils.

    I’ve had my kids enrolled in schools in two countries in Asia, and one thing I will say is the educational system in Asia has not become parasitic on the children. I don’t feel like they are treated as data points for corporate marketing departments and are not constantly subject to entrainment and social propaganda. I often wonder if that’s because these countries need an educated, productive labor class. whereas in US, whoever is organizing the public education has given up on creating a productive labor force. it’s as if the public school system is more concerned with pumping out receptive consumers and programmable citizens than productive members of society.

    not saying there aren’t other issues here, but I have never felt like education was harmful in an intentional sense, or that the child was being set against the values of the family.

    in my mind, that level of derision for the youth of a country is very sad and scary, because if the young are not valued and nurtured, the future is toast. you don’t MAGA without a jump in math scores unless you plan to import the engineers. also how can we expect adults to be treated with dignity and respect when the children are treated thus.

    another thing is pop culture. pop culture in Asia can be materialistic, stupefying, and vacuous, but I have not seen any examples where it is demonic such as Satanic or occult symbolism, sexualization of young kids or excessive Gore or innuendo in children’s entertainment.

    I honestly don’t know what to make of those distinctions, but they’re there.

    so if you can afford it, take the kids to a private school. if not, then home school.

  13. Hi Catherine,

    Wonderful Part I of the 2021 1st Quarter Wrap Up! Thank you so much for compiling so much in one place!

    To add to some of the topics you and Corey Lynn discussed, I’d like to share some information I have used and come across:

    1. Qi Gong/Ch’i Kung/氣功:Bruce Kumar Frantzis
    https://www.energyarts.com/
    https://www.thetaospace.com/

    As someone who has studied various forms of qi gong, meditation, tai chi, and internal martial arts from Bruce and his senior students starting in the 1990s in the San Francisco Bay Area, I can fully recommend his teachings and practices. Bruce is one of the few westerners who is fluent in both Mandarin Chinese and Japanese and had spent over 15 years in Japan, Hong Kong, Taipei, and Beijing comprehensively learning various Taoist practices and traditions. I still regularly train on my own his practices today, and I can confirm that they are safe and powerful.
    Link to Bruce’s bio: https://www.energyarts.com/about/#about-bruce

    2. VPNs: That One Privacy Site/That One Privacy Guy
    It appears that his previous website has merged with this one: https://www.safetydetectives.com/author/PrivacyGuy/

    Though the page for VPN reviews has recommended links that presumably pay for clicks, if you scroll down to near the bottom of this link, you can see the comparison charts of VPNs starting with “VPN Comparison Charts”:
    https://www.safetydetectives.com/best-vpns/

    One thing to keep in mind is where the VPN is based in/registered, to ensure it is not located within one of the 5-eyes, 9-eyes, or 14-eyes alliances: https://restoreprivacy.com/5-eyes-9-eyes-14-eyes/

    3. And I also generally recommend the above mentioned site for addiitonal reviews on how to protect your privacy (VPNs, email accounts, browsers, etc.): https://restoreprivacy.com/

    I hope this is somehow useful. Please keep up the amazing work!

      1. Do you practice qi gong?

        Yes, but please keep in mind that there are thousands of types of “qi gong.” Some are powerful, some are dangerous to one’s health, and some are just a waste of time. As Bruce has said (paraphrasing), finding a “good” teacher for a month is better than a mediocre teacher for a year.

        Here is a succint and powerful one-hour overview 1996 documentary on the “Taoist Energy Arts” by BK Frantzis: https://www.youtube.com/watch?v=-w-lPhLA7Wo I hope you get a chance to watch it.

        As an fyi, Bruce’s Dragon and Tiger qi gong is very accessible, powerful, and most importantly, safe. Like money and power, qi gong is a double-edged sword. It can heal as well as harm, depending on intention and finding the right teacher(s).

  14. I remember the days when there were phone booths and pay phone. You could call someone if you needed help. Now you can’t find those anywhere.

    1. I miss the phone booth. Harder for the Central Bankers to track us, though … that’s why I try to stay analog as much as possible. Stay analog. Save the world.

      1. me too. i did find this great router gadget (XLink Gateway) that allows any cell phone to be hooked up to any vintage phone. does nothing for privacy or security, but the old phone in my house rings again, has a dial tone and you can even dial out. Makes talking on the phone seriously enjoyable again

  15. I home educated my son and am happy to help anyone who considers this as an option for their child. There are many options out there for home education to fit all budgets.

  16. Great presentation. I am also looking for the link to read the document. I was logged into Solari, went to take action 2021 page, tried to login again there, since nothing came up on the page, login did not work and am now locked out on that page. Very frustrating not being able to read this presentation.

    1. I am having this same problem as well. I am currently logged in, click the link to the take action page, i have to log in again and it says invalid.

      1. I just tried it and it worked fine. Can you clear your cache and try again? Login to Solari then go to the commentary and click on the link to the web presentation. Let me know if that works.

    2. Try going directly to https://takeaction2021.solari.com/ and login.

      https://takeaction2021.solari.com/loosen-technologys-grip-on-your-mind/

      Welcome Catherine Austin Fitts! LOGOUT
      Take Action 2021

      1ST QUARTER 2021 WRAP UP

      home
      Take Action 2021
      Food for the Soul
      News, Trends & Stories
      Financial Markets
      Solari Report

      Search for:
      Loosen Technology’s Grip on Your Mind

      By Corey Lynn of Corey’s Digs

      Isn’t it funny how industry leaders believe that turning off lights, finding a channel on the TV, or turning on the radio constitutes as something being “smart.” Are these difficult tasks for human beings? When did humanity get so lazy? Nowadays, everything is “smart,” except for you of course. They want you to believe you are incapable and need their help, while they turn on the mic, the camera, implant subliminal messaging or frequencies, and spy on you through constant surveillance systems running across the entire grid.

      Most people don’t even realize the damage that is being done to them, the mind control they are sipping in, and the constant energy-sucking distractions that are steadily stealing their lives.

      There was a CBS reality television series called ‘Hunted’ that aired back in 2017, whereby 18 every-day people set off in 9 groups to try to get off grid by evading the FBI and US Marshalls in a time where everything is digitally tracked. If they could last the full 28 days without being hunted down, they would win $250k. It was interesting to observe how some of the seemingly obvious things to avoid, they were finding very difficult to live without, and how at every turn and every corner they were picked off due to surveillance everywhere.

      Now more than ever, it is becoming increasingly important for people to protect themselves from the various methods of mind control being utilized through technology. It is equally important to protect one’s privacy and preserve their time and energy for living a more fulfilled life. Initially, it will take some time, courage, and support to cut a path toward healthier and safer habits and routines. This is where the Circle comes in and why it is so important.

      Working together in a Circle will provide a supportive system with loyal people who have each other’s backs, can tackle tasks together, research and coordinate plans, and in this case, some new technology and features that will assist the Circle in moving forward in a safer environment for their home, families, and the Circle itself.

      This piece is designed to inspire a discussion of “best practices,” and we expect this to start a rich discussion that can lead to better network intelligence on how to use technology wisely.

      It’s important to recognize and understand that nothing is truly 100% “safe” when it comes to privacy on the internet, but we do the best we can to protect ourselves and minimize our exposure and footprint. If the powers that be truly wanted access, we all know they control the doorways.
      The Infrastructure of Influence Operations

      The infrastructure is somewhat boundless and seems to seep in from every crevice, but there are ways to minimize and avoid much of it. It’s important to recognize who and where it’s coming from, in order to begin removing and limiting all of this noise.

      The Influencers

      Social and news media
      Entertainment industry
      Education system – schools
      Politicians
      Big corp, big tech, and big pharma
      Agents of influencers who make it seem like there is organic support for the narratives being pushed
      Unknowing individuals who have been manipulated

      Applications Used for Mind Control and Tracking

      Tv
      Radio
      Internet
      Smartphones and Smartwatches
      Video games
      GPS system in vehicles
      Cell towers
      Smart meters
      Surveillance cameras on every corner
      Satellites and drones
      Transhumanism-related technologies
      AI and robotics
      Smart devices, such as Amazon’s Alexa or Echo, Apple’s HomePod, or Google’s Nest Cam
      Materials received in the mail
      Visual aids such as signs, stickers, and plexiglass walls

      Covert Invisible Forms of Mind Control

      Long and short-wave electromagnetic forces emitted in public spaces to induce certain feelings
      Frequency manipulation
      Subliminal programming
      Brainwave manipulation
      Entrainment technology
      Waveform can be transmitted through the entire power grid into our homes

      Minimizing Risks & Maximizing Your Circle

      This is one of the most important checklists you will ever complete. Sure, it may take several weeks, but that’s ok, this isn’t a race. It’s important to accomplish these tasks sooner than later, but it will also feel like a bit of a transformation, so pace yourself. Much of these can be done by yourself, but some of them will require a group effort. This is a good way for the Circle to come together and select which tasks to tackle first, while assigning some of the items to individuals most qualified.

      I would highly recommend working on the items that will impact the Circle first, such as setting up a private open-source cloud communications system for the group, encrypted email accounts, and encrypted calling services, such as Telegram. It might be wise to bring your cell phones to one meeting so that everyone can help one another out while installing these apps, and other cell phone related tasks listed below. Once that is complete, cell phones should not be brought into meetings.

      Many of these items are things you can do in your home and on your own, and may be welcomed new habits you find enjoyment in. Other items may be a little more challenging, which is why the support of the Circle is so powerful. You will have multiple people to offer a helping hand.

      The Basics

      Unplug and turn off your TV, or get rid of it entirely, especially if it’s a smart TV.
      Limit all of the sounds and notifications on your phone to minimize constant distractions, and try to use the speaker when taking calls, rather than holding the phone against your ear.
      You may consider setting up a second phone number on an app such as Kall8 to have forwarded to your phone. This will protect your main number and limit the amount of robocalls and other potential nefarious actions against you.
      Clean out and organize files on your computer. Remove the 200 bookmarks you don’t need and only keep a small handful. Remove all the clutter to free your mind. Remove all application software you do not use.
      Clear your browser cache weekly. For speed, browsers will automatically cache website information and sometimes they don’t accept change very well. Here’s some handy cache clearing instruction links for MacOS Safari, iOS Safari, and FireFox. We do not recommend using Chrome or Outlook.
      Always read the terms and conditions when downloading or installing any apps. Though it is not recommended to install social media apps, these are the most dangerous ones because they sneak in information that allows them to access other areas of your phone. The 2013 documentary ‘Terms and Conditions May Apply’ is a must watch.
      Never save your password when asked. If you forgot your password, and want to generate another, you will not be able to override the one you said to save. You will need to go into your Key Chain, find the password and manually delete it from your system. The best policy is to not save your passwords to your computer. To keep them safe, write them down on a piece of paper and put in a safe place. You can’t hack paper. Computer security experts have begun recommending password managers such has Dashlane, 1Password, Lastpass, and Roboform. There are some major advantages to these services, as they generate and remember your passwords for you. You create one master password to access them. The information is saved onto your devices and powerfully encrypted so it’s almost impossible to hack. Be sure to always setup passwords and logins with double authentication where it’s available.
      Unsubscribe to everything you find unnecessary. They can put subliminal messages directly into emails as well.
      If you are backing up files from your computer, back them up to an external hard drive, not to an online cloud.
      Take some time every day to be out in nature and ground yourself.
      Meditate and/or pray several times a week, and consider Qi Gong to clear your energy field each day. This will help ground you as well. Lee Holden is a great source for free Qi Gong videos you can follow along to. Catherine loves Yuan Gong, and also provides a prayer book on the Solari Report, available in pdf download or for purchase.
      Keep your computer & mobile phone operating systems and applications up-to-date.

      Cybersecurity and Privacy

      Ditch the smartphone if you can. If you can’t, we find Apple phones and Linux based phones far preferable to Android. Beware, because both Apple and Linux based phones must connect with telecommunication providers and that is where a lot of the trouble can start. Linux based phones take more knowledge and enjoy less tech support, so appreciate you may need help from a Linux phone pro. Apps are the big problem, so be careful what you download and put on your phone. Consider leaving your phone turned off and in the car. If you want to use a Faraday bag, appreciate that most do not work. Here is one that does, by Select Fabricators.
      Remove all tracking apps from cell phone, and all applications you don’t need or use.
      It is best to uninstall social media apps from cell phones.
      Use encrypted services for phone calls and messaging, such as Telegram, which can also be utilized on a desktop computer.
      Don’t sleep with any spyware technology in your bedroom, especially a smartphone.
      Turn off Bluetooth on your phone unless it’s absolutely necessary to occasionally turn on.
      If using GPS in your vehicle, be sure it is not one that transmits. Some experts believe all of them do, others say no, just some. We are not sure. Consider buying a hard GPS. Never ever use Google maps. It would be a wise idea to pick up some good old-fashioned large printed road maps. Know where you are going using maps and be aware of the institutions and sites around you (like military and enforcement locations.)
      No video platform is safe, so understand that you may be recorded.
      Avoid corporate operating systems, including all Windows operating systems, Chromebooks, and Amazon Fire computers.
      Use Libre Office or OpenOffice instead of Microsoft Office.
      Use Thunderbird instead of Microsoft Outlook.
      MacOS is recommended, or load a good Linux desktop distribution like Ubuntu Desktop or Mint on your existing PC hardware.
      If you’re using MacOS, make sure your firewall is enabled and you know how to configure it.
      Use ClamXAV Anti-Virus.
      FireFox has a built-in ad blocker or you can use Privacy Badger for FireFox. For all browsers, you can use uBlock Origin ad.
      Experts have differing opinions on VPNs, which are virtual private networks that mask and hide your location, providing privacy and anonymity. I personally use VPNs and have found them to work quite well for me. That said, proxy servers are also beneficial and some experts prefer using those. A proxy server is a remote application or appliance that acts as an intermediary for requests from clients seeking resources from serves that provide those resources, which allows you to mask and hide your location. Some popular free proxy servers are: Hidester, HideMe, ProxySite, Kproxy, VPNBook, Megaproxy, and Zens2.
      For search engines, consider using Duck Duck Go for a start page.
      Avoid visiting questionable websites to avoid viruses and trojans.
      Scams are at an all-time high, so be careful not to click on links inside emails, but rather type the url into a search bar instead if you’re not sure the email is legit.
      Don’t use unsecured public Wi-Fi. In your home, connect directly by ethernet if you can. If your ISP provides you a router with built in wifi, ask them to turn it off for you, then purchase a Netgear or Linksys mesh router, and plug it into the back of your router, which will allow you to turn off wifi when not using it. Here is a handy tutorial.
      Take the time to go into various background search databases and remove yourself from them, along with all other sites, and reduce your digital footprint. Every time you enter your full address and contact info into another website, there’s a good chance it’s being sold off to third parties.
      Don’t use email services by large corporations. If you need an alternative, we recommend Proton Mail and Start Mail. If you’re looking for a full-service provider, that can provide website registration, hosting, and email for your domain, we recommend infomaniak.
      An often overlooked source of domestic EMF and RF exposure comes from nearby high-tension power lines, AM, FM, Short Wave broadcast, TV Stations, and nearby Military bases. These sources often present radically higher EMF and RF exposure levels than cell phones and Bluetooth. Effective radiated power can reach, possibly exceed, one-million watts. The only way to really know your level of exposure is to hire a reputable engineering firm who can perform the required studies. This is an expensive solution that will remove all doubt.

      Observation and Introspection to Avoid Mind Control Techniques

      When spending time on a computer, cell phone, or television, pay attention to your energy or emotions switching, like suddenly feeling warm and fuzzy or irritated. If you feel this shift for seemingly no reason, there is a good chance you were subjected to a subliminal message or wave. Clear your mind, clear your energy field, and center your heart to get back on track. The more in tune you become, the more you will recognize the need to minimize use of these devices and free your mind from the attacks.
      Observe your reactions – if you are doing, feeling, thinking, or saying something that seems “off” to you, you were likely manipulated. Did you suddenly feel drawn to or inspired by someone who you don’t really care for?
      Check yourself with your friends or Circle to help keep you on track.
      When you turn on a piece of equipment – understand what their incentive is. Are they selling you something? Are they trying to help you or harm you?

      Protect Your Children

      Everything pertaining to phones, television, and internet above, should also be managed on your children’s devices as well, with the addition of parental control settings.
      Not to invoke fear, but I do not recommend a smartphone for children due to the high level of indoctrination, entrainment mind control tactics, and predators targeting children.
      Pornography is a huge industry which directly correlates to the child trafficking industry, generating $150 billion in revenue annually. Protecting your children from technology that drives these industries is of the utmost importance. I have written extensive reports on child trafficking nests and how they operate. Pornography is the gateway. The entertainment industry is famous for sexualizing children, just look at Netflix’s ‘Cuties’. Pornography is also a trap – if someone is browsing pornography and stumbles upon kiddie pornography, a control file may be created, which can be used at anytime to entrap a person into a felony, or for blackmail purposes.
      Search your local sex offenders registry and be aware of who is in your neighborhood. You may consider showing the mugshot photos to your children and letting them know that they should not befriend them if they see them in the neighborhood.
      If your children are still in public schools be sure to review their entire curriculum, especially the books they are to read and any books being read to them. Also explore the school library. They have been indoctrinating children through books for several decades now – filling their minds with broken families, not to trust parents, transgender agenda, climate change hoax, very dark stories to instill fear, and books that would incite rage and anger.
      Find out what your children are learning about and discussing in school, what signs and visual aids are posted throughout the school, and what they are playing on televisions in the classrooms.
      Most public schools are pushing the transgender agenda, whereby they are telling children they can “choose” to be a boy or girl, trying to create a gender identity crisis. From locker rooms to sporting events, pronouns to removing the words “mom and dad,” they are seeding their minds with mass confusion.
      Planned Parenthood is involved with many public schools as well, and their goal is to sexualize the children. Find out if they are involved with your children’s schools.
      Climate change and sustainability is a huge veil that has been placed over children’s eyes to make them believe they need to grow up and fight for the environment, when it’s really about training them to be good soldiers for controlled smart cities. Be sure to teach your children the difference between respecting and caring for the environment versus their “climate change” agenda. Agenda 21 and 2030 are good places to review for this.
      Solari has a dedicated page to mind control techniques on young people and children.
      Catherine recommends The Parent’s Guide to Texting, Facebook, and Social Media: Understanding the Benefits and Dangers of Parenting in a Digital World. Paperback – April 1, 2011 by Shawn Marie Edgington

      Using Technology to Your Advantage

      How to create an open-source cloud that the Circle can use to share documents
      Get off the public cloud. Setup your own cloud on a local computer that someone in the Circle owns so that documents can be shared among the group. Someone in the Circle who is technology-oriented would be best suited to set it up. Here are some basic instructions for utilizing open-source software. OR, if you have someone who is technologically savvy, the better option would be to setup a cloud server from scratch on Linux. OR, setup a Network Attached Storage (NAS), which is a cloud-based open-source software that is preconfigured on the hardware and software level, that can be purchased.
      There are a lot of electromagnetic field (EMF) detectors and devices to protect from too much EMF, available online. I have personally purchased a few items from LessEMF. There are other stores available as well, such as EMR Shielding Solutions, and Select Fabricators, but I am not familiar with them or other companies, so be sure to do your due diligence with research. That said, Catherine’s tech team says that the Faraday pouches from Select Fabricators do work, so I am optimistic about their other products.
      I use an iMRS PEMF matt for health and keeping my energy field clear. Catherine uses Blushield for EMF protection, and QRS for health and keeping her energy field clear.
      The Circle might wish to brainstorm some ideas for utilizing the internet to educate others or sell a product or service, to raise funds that can be used for small software or technology purchases.
      Play some Bach or Gregorian chanting or Buddhist chanting to relax to soothing frequencies.

      Free Your Mind

      Once many of these tasks become habits and routine, you will begin to feel a sense of relief, like a weight has been lifted off your shoulders. You will have more free time, less distraction and less confusion. You will likely feel more privacy and a sense of freedom, safer and more secure. You may also notice a shift in your energy field, as though something that was once piercing it is no longer there.

      If someone in the Circle is creating problems and not contributing ethically or isn’t competent, you may have to make the tough decision to remove them from your Circle. The Circle is for support, not additional distractions or disruptions from meeting your goals. Just as in life, with friends, sometimes we have to sever ties.

      Mantras and affirmations can be very powerful in deprogramming your mind from the infiltration of unneeded and unwanted information. Each morning upon waking, and at night before sleeping, say this mantra to yourself, or come up with one that works best for you.

      “I will only allow information and frequencies into my mind and body that is for my best and highest good, that will serve my soul and keep me mentally and physically healthy.”

      Always remember, you are not alone in this. Form your support Circle, and get to work!

      Related Reading

      Mind Control Tactics Used on Young People and Children

  17. I am still a bit technology logically challenged, can someone point me in the direction of the document being shown in the discussion?
    I am very interested in exploring the information listed there – clicking on it would be so much easier.
    I know it is here somewhere – Haha

    1. 1. In 2004, Mark Shuttleworth – Canonical – Ubuntu was forked from Debian.
      2. In 2014, Debian was changed to add the all-powerful systemd, which has been the subject of much debate. I avoid it and Ubuntu.
      3. Due to the systemd addition, Debian was forked to create Devuan (which is the closest available OS today to the original Debian). https://devuan.org

      Deb-ian (named for Ian and his wife Deborah) founder died under strange circumstances.
      https://www.theregister.com/2015/12/30/ian_murdock_debian_founder/

      1. Please do and let us know. I will be getting a LINUX aptop soon, and the tech person I am consulting with recommends using Ubuntu. Thanks!

    2. I (Brad) got good news from Catherine…from the Tech Expert so I’ll keep this Linux distro Ubuntu. Here’s the expert’s feedback:
      1) The controversial reported Unity Shopping Lens “spyware” program was first available from revision 16.04 was from the spring of 2016. We’re on revision 20.04 now.
      2) It was not “spyware.” It was an auxiliary program or add-on.
      3) It was not part of the OS.
      3) It was only on the desktop version of Ubuntu.
      4) It was only enabled for a short time.
      5) It was often used by other programs installed by the end-user searching/purchasing outside the desktop environment.
      Like any other OS, it’s important to understand the impact of a given program you might install in terms of privacy and security.

  18. Apple Pages (iOS / macOS) can import and export Word and RTF files, when collaborating with people using LibreOffice or Microsoft Office. Pages also makes it easy to publish long documents as an .epub ebook. Disable iCloud to reduce data being sent to Apple.

    Internet physical cable switch (manual, non-electronic):
    https://www.amazon.com/CablesOnline-Rotary-Manual-Switch-SB-034/dp/B00EBSR7CQ/

    Internet power timer: one button to select time interval, then it will auto power-off. Use on router or modem. Avoids the need to remember to disconnect a wired connection.
    https://www.amazon.com/gp/product/B01D3QEK4E/

    Using offline content will reduce surveillance, e,g. local searches will be private. Available on most platforms. The StackExchange sites have a wealth of knowledge.
    https://www.kiwix.org/en/

    I will plug, once again, the TV series Eureka, which is available on DVD, German Blu-Ray and Amazon Prime. It’s an entertaining introduction to the culture of advanced tech research. The first three seasons have high signal/noise ratio. The final two seasons are watered down with romcom storylines, but include multi-episode stories on space exploration, brain-machine interfaces, uploaded consciousness and 3D-bioprinted human clones.

    The single most important thing to remember when interacting with hardware, software or other technology: you are not interacting with a machine — you are interacting with the human(s) who created or programmed the machine, and the social structure of their teams/business. So most “computer learning” is actually reverse engineering the thinking of those humans.

    1. https://en.wikipedia.org/wiki/Conway's_law

      “Any organization that designs a system (defined broadly) will produce a design whose structure is a copy of the organization’s communication structure.
      — Melvin E. Conway (1967)

      The law is based on the reasoning that in order for a software module to function, multiple authors must communicate frequently with each other. Therefore, the software interface structure of a system will reflect the social boundaries of the organizations that produced it, across which communication is more difficult.”

      Fun illustration of this principle in modern tech companies:
      http://www.smattie.com/2013/11/18/organization-charts-of-the-big-companies/

    2. Will check out Eureka. Will see if there is a DVD available in Europe.

  19. Great talk. I’ve followed Corey for a while. Her website (like Solari) is full of so much information. It takes a while to sort through, but she’s an amazing resource. Makes you think what John Carpenter really knows. They Live! I need to order the hard copy of that movie.

Comments are closed.