Latest Posts

8 min read 0

The Journey of Andrey: Struggles, Compassion and the Battle for Understanding

Andrey—your life, your compassion and your work of truth will not fade into the gallows. I promise to carry your burden of revealing truth forward. A Heartfelt Beginning on the Impact of Psychosis It was January 15, 2016, when Andrey’s relapse into psychosis began to cast shadows over his once-bright world. This was a man who filled his apartment with vibrant artwork and intellectual pursuits, diving deeply into topics like economics and quantum mechanics. Yet, the cruel tides of mental illness and societal misunderstanding threatened to drown his unique light. On April 10th, we worked together to clean and rearrange his apartment in anticipation of a gathering. Andrey’s dire need for connection and companionship was palpable, but the evening ended in disappointment, with only one guest arriving. The…
2 min read 0

The Preemptive Truth on Health Perceptions: mRNA ‘Vax’

The narrative around the safety of COVID-19 vaccines is so pervasive that the truth about potential harms might be outright rejected by the mainstream public. No matter how compelling or well-founded the arguments against the mantra of “trust the science,” the absence of control-group studies on vaccine and booster safety has left room for rampant ambiguity. This ambiguity provides enough plausible deniability for the public to cling to a false sense of certainty and disillusionment regarding the vaccines’ efficacy and safety.   Meanwhile, there’s been a notable rise in cancers and deadly blood clots, with no clear explanation or accountability linking these to the vaccines. The Vaccine Adverse Event Reporting System (VAERS) has recorded an unprecedented number of reports, yet these are often dismissed with excuses like “anyone…
2 min read 0

What is Man In The Middle Shadow Banning?

Man-in-the-Middle (MITM) Shadow Banning Man-in-the-middle (MITM) shadow banning is a theoretical or advanced form of shadow banning where a third party—such as an internet service provider (ISP), a network administrator, or even a government entity—intercepts and manipulates data between a user and an online platform without the platform itself being aware. How It Works: Interception: The attacker or intermediary intercepts a user’s requests before they reach the intended website or social media platform. Modification or Filtering: The attacker selectively blocks, modifies, or delays the user’s posts, interactions, or visibility while making it appear to the user that everything is functioning normally. Stealthy Execution: Unlike traditional shadow banning, where a platform itself hides a user’s content, MITM shadow banning is external. The platform may have no direct involvement or…
4 min read 0

The Case for Competency in Public Speaking: A New Standard for American Politicians?

In the landscape of American politics, the authenticity and conviction of public figures are increasingly under scrutiny. There’s a growing sentiment among the public that politicians, often seen as scripted “mobots,” lack the genuine ability to convey their true beliefs or engage in unscripted dialogue. This situation has sparked a debate on whether public office holders should be required to demonstrate their competence through a public speaking exam, specifically one that assesses their ability to communicate without reliance on scripts or teleprompters.   The Current State of Political Discourse Contemporary political speeches are often meticulously crafted by speechwriters or, more recently, supplemented by AI tools like GPT. While these practices ensure a polished delivery, they also allow powerful special interest groups to exert significant control over political messaging.…
6 min read 0

Dietary Impact on Cancer Prevalence: A Review of Research and Gaps

The relationship between diet and cancer has been a subject of extensive research, yet significant gaps remain, particularly when considering the variety of different dietary patterns and food sourcing. This article explores the known impacts of various diets on cancer prevalence while highlighting areas where research is lacking. Additionally, it examines recent studies on potential links between COVID-19 vaccination status and cancer prevalence. Dietary Patterns and Cancer Vegan and Vegetarian Diets: – Research: These diets are associated with lower risks of certain cancers, particularly colorectal cancer, due to high fiber intake and reduced red meat consumption (Tantamango-Bartley et al., 2013; Key et al., 2009). – Gaps: There’s less clarity on the impact of these diets on all cancer types, especially when considering long-term nutritional deficiencies like B12. Ketogenic…
4 min read 0

The Erosion of Critical Thought in the Age of Overtime: How Work Hours Shape Our Cognitive Landscape

In today’s fast-paced world, where the demands of work often extend beyond traditional hours, the implications for family life, media consumption and societal discourse are profound. As work hours increase, the time and energy available for critical thinking diminish, transforming the way families engage with news and information, leading to a landscape where entertainment overshadows education, and where news can morph into what we traditionally recognize as yellow journalism. The Impact of Extended Work Hours Extended work hours have a direct correlation with decreased engagement in family activities that foster critical thinking. Research by Greenhaus and Beutell (1985) highlights how work-family conflict can result in reduced family interaction, where family members are too exhausted or preoccupied to engage in meaningful discussions or educational pursuits (Greenhaus & Beutell, 1985).…
6 min read 0

The Good, The Bad[ass] and the Ugly of Flabby Hoffman’s “Colony Collapse Disorder Vol 1”

Flabby Hoffman’s book “Colony Collapse Disorder, Volume I” published on November 24th, 2024 [Three Volumes published concurrently around then.] presents a satirical and highly critical perspective on American politics, culture and society. The central thesis revolves around the idea that a cabal of wealthy elites, referred to as “Ameri-Nazis,” has been secretly manipulating events since the end of World War II to establish a crypto-fascist government in the United States, culminating in the potential rise of a totalitarian Fourth Reich. The author, Flabby Hoffman uses a sarcastic, irreverent and often vulgar tone to deconstruct historical events, political figures, cultural trends and media narratives. The Good (The Thought Provoking Premises): The Fourth Reich: The book posits that the collapse of Nazi Germany wasn’t a defeat but a strategic retreat.…
10 min read 0

The DeepSeek Hype: Decoding the AI Frenzy and Its Market Impact + Where DeepSeek Succeeds

The artificial intelligence (AI) landscape was rocked in early 2025 by the introduction of DeepSeek, a Chinese tech startup’s AI model that claimed to outperform established giants like OpenAI with significantly less resource expenditure. This announcement led to dramatic market reactions, with companies like Nvidia experiencing significant stock value drops. However, beneath the surface of this apparent technological leap, a narrative of skepticism, critique, and strategic market dynamics has emerged. This article delves into the phenomenon of the DeepSeek hype, analyzing its technological claims, market impact, and the broader implications for the AI industry. The Rise of DeepSeek DeepSeek made headlines with the release of its R1 model, which was touted for its performance comparable to top-tier models like OpenAI’s o1 but at purportedly a fraction of the…
6 min read 0

State-Sponsored Cyber Attacks and the Facade of Democracy

In the digital age, the battleground for global power dynamics has increasingly shifted to cyberspace, where state-sponsored cyber attacks serve not just as tools for espionage but also for political sabotage. This article delves into examples of such operations, focusing on the tensions between the United States and the BRICS countries, and how the rhetoric of promoting “democracy” often masks underlying geopolitical strategies. State-Sponsored MITM Attacks Stuxnet (U.S. and Israel vs. Iran – 2010): This worm, designed to sabotage Iran’s nuclear program, exemplifies how cyber capabilities can be weaponized for physical impact. Although not a traditional Man-in-the-Middle (MITM) attack, it involved intercepting and altering control system communications (Langner, 2011). Quantum Insert by NSA (U.S.): This technique allowed the NSA to intercept and manipulate internet traffic, potentially for MITM…
8 min read 0

The Realities of Shadow Banning Across Search Engines, Video Platforms and Social Media — and a Look at “Common Grounds”

Introduction In an age where online discourse has become the lifeblood of public debate, the concept of “shadow banning” has risen to the forefront of conversations about transparency, free speech, and digital ethics. Shadow banning refers to the practice of limiting the visibility of a user’s content—often without the user’s knowledge—on platforms such as search engines (Google, DuckDuckGo), video streaming services (YouTube, Bitchute, Rumble), and social media channels (Facebook, Twitter, Instagram, and others). While platform providers often assert that this practice is designed to combat spam or abusive content, critics argue that it can also be used to suppress certain political views or individuals. This article explores the realities of shadow banning across major digital platforms, examining notable case studies and legal actions. In doing so, we also…
6 min read 0

Unmasking the Global Epidemic of Sexual Abuse: From Power Structures to Mind Control Manipulation

Introduction Sexual abuse, when intertwined with power and covert manipulation, creates a tapestry of exploitation that extends beyond physical and emotional harm into areas of psychological control and strategic manipulation. This article expands on the historical context of such abuses, particularly focusing on mind control experiments like Project Monarch, and how these practices have been used to create “patsies” or drones, capable of being triggered to commit acts on behalf of shadowy interests. Historical Context and Covert Programs Project Monarch and MKUltra Historical Roots: The CIA’s MKUltra project, initiated in 1953 under the directive of CIA Director Allen Dulles, aimed at developing mind-control techniques through drug administration, psychological torture, and other methods. Project Monarch, allegedly a subset or continuation of MKUltra, focused on more advanced techniques of creating…