📰 Stay Informed with Truth Mafia!
💥 Subscribe to the Newsletter Today: TruthMafia.com/Free-Newsletter
🌍 My father and I created a powerful new community built exclusively for First Player Characters like you.
Imagine what could happen if even a few hundred thousand of us focused our energy on the same mission. We could literally change the world.
This is your moment to decide if you’re ready to step into your power, claim your role in this simulation, and align with others on the same path of truth, awakening, and purpose.
✨ Join our new platform now—it’s 100% FREE and only takes a few seconds to sign up:
We’re building something bigger than any system they’ve used to keep us divided. Let’s rise—together.
💬 Once you’re in, drop a comment, share this link with others on your frequency, and let’s start rewriting the code of this reality.
🌟 Join Our Patriot Movements!
🤝 Connect with Patriots for FREE: PatriotsClub.com
🚔 Support Constitutional Sheriffs: Learn More at CSPOA.org
❤️ Support Truth Mafia by Supporting Our Sponsors
🚀 Reclaim Your Health: Visit iWantMyHealthBack.com
🛡️ Protect Against 5G & EMF Radiation: Learn More at BodyAlign.com
🔒 Secure Your Assets with Precious Metals: Get Your Free Kit at BestSilverGold.com
💡 Boost Your Business with AI: Start Now at MastermindWebinars.com
🔔 Follow Truth Mafia Everywhere
🎙️ Sovereign Radio: SovereignRadio.com/TruthMafia
🎥 Rumble: Rumble.com/c/TruthmafiaTV
📘 Facebook: Facebook.com/TruthMafiaPodcast
📸 Instagram: Instagram.com/TruthMafiaPodcast
✖️ X (formerly Twitter): X.com/Truth__Mafia
📩 Telegram: t.me/Truth_Mafia
🗣️ Truth Social: TruthSocial.com/@truth_mafia
🔔 TOMMY TRUTHFUL SOCIAL MEDIA
📸 Instagram: Instagram.com/TommyTruthfulTV
▶️ YouTube: YouTube.com/@TommyTruthfultv
✉️ Telegram: T.me/TommyTruthful
🔮 GEMATRIA FPC/NPC DECODE! $33 🔮
Find Your Source Code in the Simulation with a Gematria Decode. Are you a First Player Character in control of your destiny, or are you trapped in the Saturn-Moon Matrix? Discover your unique source code for just $33! 💵
Book our Gematria Decode VIA This Link Below: TruthMafia.com/Gematria-Decode
💯 BECOME A TRUTH MAFIA MADE MEMBER 💯
Made Members Receive Full Access To Our Exclusive Members-Only Content Created By Tommy Truthful ✴️
Click On The Following Link To Become A Made Member!: truthmafia.com/jointhemob
Summary
➡ The text discusses a situation where a sheriff supports a citizen’s challenge to a traffic stop, leading to a court victory and compensation. The sheriff, who has been studying natural law principles, is invited to join an assembly focused on understanding and upholding these principles. The assembly grows, including law enforcement officers, military veterans, and a retired judge, and they prepare for potential mass detentions by maintaining documentation, establishing secure communication channels, and creating personal liability for officials involved in unlawful detentions.
➡ The Shield of Souls assembly is discussing reports of ICE agents detaining American citizens who are Trump supporters. They are planning to create educational materials for law enforcement and military personnel, explaining their rights and responsibilities. They believe that by educating these key individuals, they can prevent the implementation of a system of control. The assembly is also preparing for potential detainment of their members, with strategies including immediate legal response, spiritual grounding, and the use of quantum physics principles to maintain a positive mindset.
➡ The group is preparing for potential detentions by setting up emergency powers of attorney, secure locations, and documentation packages. They are concerned about possible threats from unknown sources, including UN soldiers, and are considering the use of the Second Amendment. However, they emphasize the importance of lawful resistance and maintaining connections with constitutional sheriff departments. They also discuss the importance of early warning systems, secure communications, and evacuation plans, as well as the possibility of restoring rights for those with felony records.
➡ The text discusses a detailed plan for dealing with potential arrest and detention, emphasizing the importance of recording interactions, remaining calm, and invoking one’s rights. It also outlines the assembly’s response protocol, which includes immediate action, evidence gathering, and filing liability claims against involved officers. The conversation then shifts to a discussion about investigating a credit union with a suspicious symbol, detailing steps for systematic evidence collection, pattern recognition, and formalizing the investigation. Lastly, the text touches on the topic of weather modification and the idea of targeting the bonds of private contractors involved in such activities.
➡ The sheriff is investigating unauthorized weather modification activities, which are potentially harmful to the environment. He’s using FAA records to trace aircrafts involved in these activities and is collecting soil and water samples to check for abnormal levels of aluminum nanoparticles. He’s also coordinating with other sheriffs and organizing community-based collection events to gather more evidence. The goal is to challenge the insurance underwriters of these operations and to create a public record of these investigations, which will be hard for officials to ignore.
➡ The discussion revolves around the legal and civil rights issues related to businesses transitioning from cash to digital payments and implementing facial recognition technology. The law states that businesses must accept cash and not discriminate against those who prefer it, especially as this affects lower income, minority, elderly, and rural populations. Facial recognition technology, which collects unique biometric data, requires explicit consent under several state laws. The group suggests educating businesses about these laws, creating a community reporting system, and drafting a local ordinance requiring cash acceptance and biometric consent.
➡ This text discusses a group’s strategy to challenge corporate systems that violate natural law principles. They plan to document violations, educate law enforcement, and create alternatives to these systems. They believe that by withdrawing public consent and cooperation, these systems will become unsustainable. The group also aims to empower individuals through education and the application of natural law principles.
➡ Secret Civics offers free resources to help you understand your rights and challenge unfair systems. It’s a chance for you to change your life, resist conformity, and claim your power. They invest in providing this information to create a more informed public. Visit secretcivics.com to start your journey today.
Transcript
Today might be your first real world application of what you’ve been learning in the Assembly. I’ve studied the materials carefully, but I’m still nervous about putting it into practice. What if they don’t respond to the questions like we practiced? That’s exactly, exactly why we document everything. Their responses or non responses become evidence. The system works on presumption. When you challenge those presumptions effectively, you expose the fiction they operate under. Sound of police siren Perfect timing. Looks like you’re about to get your first practical lesson. Start recording. Remain calm and remember, you’re not driving, you’re traveling. Recording started.
I’ll follow the procedures exactly as we practiced in the assembly. Sound of car pulling over Window rolling down License, registration and insurance, please. Good afternoon, Officer. Before we proceed, may I have your name and badge number for my records? And could you confirm your body camera is recording, Officer Davis, badge 5142? Yes, my camera is recording now. I need to see your license and registration. Officer Davis, I need to inform you that I don’t consent to this interaction. I’m exercising my right to travel, not driving commercially. I have some questions to clarify our interaction. Do you understand the difference between traveling and driving according to legal definitions? Ma’, am, I don’t have time for sovereign citizen nonsense.
You’re operating a vehicle on public roads which requires a valid license under state law. This isn’t up for debate, Officer. I’m observing this interaction. My colleague is not presenting sovereign citizen nonsense, but asking legitimate questions about jurisdiction. Are you aware that the FBI’s own documents distinguish between legitimate use of these legal processes and fraudulent applications? Sound of another vehicle pulling up what’s the situation here, Officer Davis? Just a routine traffic stop, Sheriff. These individuals are refusing to provide identification using sovereign citizen arguments about traveling, not driving. I overheard part of this conversation and I need to correct something.
The distinction between traveling and driving has legitimate legal foundation. The right to travel is constitutionally protected while driving commercially Is a privilege regulated by statute. This isn’t sovereign citizen rhetoric. It’s a matter of proper jurisdiction. With all due respect, sheriff department policy is clear on handling these situations. These are known sovereign citizen tactics listed in our training materials, Officer Davis. I’m familiar with those materials, including the fine print that states not all individuals who raise these or similar arguments are sovereign citizens or extremists. These people are asserting legitimate questions of jurisdiction. I suggest you answer their questions or conclude this.
Stop. I’m following procedure, sheriff. Without proper identification, I need to issue a citation. There will be consequences for this, Officer Davis. I’m documenting this interaction myself. Proceed at your own risk. Ma’. Am. I’m issuing you a citation for driving without a license. Sign here. I’ll sign this under duress and without prejudice. UCC 1308. This preserves all my rights. I do not consent to this process, but am signing only to avoid further detention later in the car. You handled that perfectly. Notice how the sheriff intervened? That’s becoming more common as awareness spreads within law enforcement. That was unexpected.
Is he part of the assembly? Not formally. But many sheriffs are awakening to their true constitutional role as the highest law enforcement authority in their county. They’re increasingly uncomfortable with the corporate policy enforcement that police departments have become. What happens next? Do we prepare for court? Yes, but this is where your assembly training becomes crucial. We’ll file our notice of special appearance and jurisdiction challenge before the court date. The sheriff’s intervention gives us additional leverage. A division in their own ranks that we can document and present. Should I focus on the lack of injured party argument? That’s one element.
Also emphasize the officers failure to establish jurisdiction, their inability to prove willfulness. And now we have a witness to the officer’s disregard for proper procedure. The sheriff himself. This is a powerful teaching moment for you. Day of court, outside the courtroom. Remember your training. Make your special appearance. Challenge jurisdiction first, Then put the prosecutor on the defensive about willfulness and the absence of an injured party. The documentation we prepared gives you everything you need. I’ve reviewed all the materials. What if the sheriff doesn’t show up? We’ve already filed his affidavit regarding the traffic stop, but I suspect he’ll be here.
He seemed genuinely concerned about the officer overstepping authority. I’m ready. This is what I joined the assembly to learn. Order in the court. Case number 2023. TR5142. State vs Williams. Are you represented by counsel today? Your honor, I appear by special appearance only, not in general appearance and without prejudice to my Rights. I do not consent to these proceedings, but appear solely to challenge jurisdiction. The court acknowledges your appearance. How do you plead to the charge of driving without a license? Before entering any plea, I must address several jurisdictional matters. First, I’d like to ask the prosecutor, can you identify the specific injured party who has sworn a complaint against me under penalty of perjury? Your honor, the state is the injured party in regulatory violations.
This is a straightforward matter. No individual victim is required for traffic infractions. The law is clear on this point, your honor. A state is a legal fiction that cannot be injured under natural law principles which predate and supersede statutory constructs. A crime requires corpus delicti, actual proof of harm to a victim. Without an injured party, there is no standing to bring this action. Your honor, these sovereign citizen arguments have been repeatedly rejected by courts throughout this jurisdiction. The defendant was clearly driving on public roads without a license. We shouldn’t entertain these frivolous challenges to established law.
Your honor, if I may. I was present during this traffic stop and would like to provide testimony relevant to this matter that may shed important light on the circumstances. Sheriff Thompson, this is unusual. Approach the bench. Both councils, brief sidebar discussion. The court will hear sheriff Thompson’s testimony as it appears directly relevant to this case. Proceed, sheriff. Thank you, your honor. I witnessed the interaction between Officer Davis and Ms. Williams. Ms. Williams was asking legitimate questions about jurisdiction and the distinction between traveling and commercial driving. Officer Davis immediately labeled these as sovereign citizen nonsense, despite FBI training materials specifically stating that not all individuals who raise these arguments are extremists.
I attempted to correct officer Davis, informing him that he was misapplying department policy, but he disregarded my guidance completely. Your honor, with all due respect to sheriff Thompson, department policy on traffic stops is clear and unambiguous. The defendant was operating a vehicle without a license. These procedural details don’t change the fundamental facts of the case. That’s precisely the issue, counsel. There is a legal distinction between operating a motor vehicle in commerce, which requires a license, and traveling in a private conveyance, which is a right. Officer Davis failed to establish whether Ms. Williams was engaged in commerce, which is necessary to establish jurisdiction under the applicable statutes.
I’ve been studying these distinctions carefully, your honor. I’d like to submit into evidence this FBI intelligence bulletin, which states on page three, not all individuals who raise these or similar arguments are sovereign citizens or extremists. Furthermore, the prosecutor must prove willfulness as an element of this alleged violation, which requires showing I had actual knowledge that my conduct violated a specific Legal duty. Officer Davis, were you aware of this distinction in the FBI training materials? Your Honor, my training focused on identifying sovereign citizen tactics, which this clearly was. We’re trained to recognize these patterns and respond accordingly.
Officer Davis received the complete training materials which include this distinction. He chose to ignore it, as well as my direct guidance as his superior officer at the scene. I find this concerning as it represents a pattern I’ve noticed developing within our department. Ms. Williams, do you have any further arguments regarding jurisdiction? Yes, you, Honor. I moved to the dismissed based on first, lack of jurisdiction as I was traveling, not driving commercially. Second, absence of an injured party withstanding. Third, failure to prove willfulness, and fourth, Officer Davis’s demonstrated bias in applying an improper sovereign citizen label. Despite being corrected by Sheriff Thompson, his superior officer.
These factors combined render this case procedurally defective. This is a highly unusual situation. The court finds that Officer Davis failed to establish proper jurisdiction during this stop and demonstrated bias in his application of department policy. Furthermore, the prosecution has failed to identify an injured party or demonstrate willfulness. This case is dismissed. Your Honor, given the circumstances, I respectfully request compensation for my time and expenses in defending against these improper charges. That’s an unusual request. But given Sheriff Thompson’s testimony about Officer Davis conduct, I’m inclined to grant it. The court awards you $750 in compensation for your time and expenses to be paid from the court’s administrative fund.
Officer Davis, you are ordered to complete additional training on proper jurisdiction and traffic stop procedures. This matter is concluded outside the courtroom. You applied your training perfectly. Notice how everything shifted when you properly challenged jurisdiction and had documentation ready. This is exactly what we’ve been practicing. The sheriff’s intervention was crucial. I didn’t expect that level of support from within the system itself. It completely changed the dynamic in there. This is what the assembly has been documenting. The system is not monolithic. There are those within it who recognize the overreach and are increasingly willing to stand against it.
Sheriffs in particular are rediscovering their constitutional role as the highest law enforcement authority in their county. You handled yourself well in there. Not many people understand these distinctions properly. Your preparation was evident. Thank you for your intervention, Sheriff. I’ve been studying natural law principles with our Assembly. It’s been an enlightening journey. I’ve been researching these matters myself. The oath I took was to the Constitution, not to corporate policy. More of us in law enforcement are waking up to the difference. If you’re interested, I’d like to learn more about your Assembly’s educational resources. There are others in the department who might benefit as well.
We’d be honored to share our knowledge, Sheriff. This is how true change happens, one awakened soul at a time. Regardless of which side of the badge they’re on. The path to. Restoration begins with understanding. This scenario demonstrates how proper knowledge of natural law principles, combined with documentation and unexpected allies within the system itself, can transform an ordinary traffic stop into a powerful victory. The initiate’s first real world application of assembly training resulted not just in dismissal, but in actual compensation and potentially a new ally in the sheriff’s office after the hearing. I’ve been watching cases like this for months now.
The courts are increasingly uncomfortable when proper jurisdiction is challenged with actual knowledge of the law. We’ve been documenting these patterns through our Assembly. Would you be interested in continuing this conversation somewhere more private? Absolutely. There’s a lot I’d like to discuss about what I’ve been seeing in law enforcement lately. Later that evening, at a private meeting location. Welcome to our informal gathering, Sheriff. This isn’t an official assembly meeting yet, but rather a chance for us to establish mutual understanding. I appreciate that. For years, I’ve felt something was wrong with how we enforce laws that seemed designed to generate revenue rather than protect rights.
My oath was to the Constitution, not to corporate policies. What finally convinced you to speak up during that traffic stop? Two things. First, I’ve been researching the actual law versus policy for months. Second, I received a memo last week about enhanced cooperation with federal agencies that troubled me deeply. They’re pushing us to enforce policies that clearly violate constitutional rights. This is exactly why we’re establishing our Assembly. We need to create a proper foundation based on natural law principles. Let me outline what we’re building. We’re starting with three core a properly structured trust to protect assets, a private membership association for mutual support, and founding documents that establish our standing under natural law.
I understand the trust concept separating beneficial corporations ownership from legal title, but how does the PMA work exactly? A private membership association operates under the constitutional right of private association members contract privately with each other outside statutory jurisdiction. This creates a protective boundary around our activities while allowing us to establish our own dispute resolution mechanisms. Our founding documents include a declaration of assembly formation that asserts our natural law authority, articles of association that establish our principles and procedures, and a membership covenant that defines mutual obligations. And what about recruitment? How do you ensure security while growing? We use a cell structure.
With careful vetting, each member can only vouch for people they know personally and trust completely. New members go through education phases before gaining full access to assembly resources. What about contingency plans? I’ve seen troubling indications of preparation for mass detentions. That’s a critical concern. We’re establishing secure communication protocols, including offline methods if digital networks are compromised. Each member maintains documentation packages ready for immediate filing if detentions occur. We’re also documenting environmental threats, EMF tower locations, water contamination sources and plastic pollution hotspots. This creates another layer of leverage through potential toxic trespass claims. I’ve been concerned about those towers, too.
The deployment accelerated dramatically last year with minimal public notice or environmental impact studies. Would you be willing to join our assembly? Formally, Sheriff? Your knowledge of law enforcement procedures would be invaluable. My oath was to protect the Constitution and the people, not to enforce corporate policy. I believe your assembly is doing the real work of upholding that oath. Two weeks later Meeting with Officer Davis. Thank you for agreeing to meet with us, Officer Davis. Sheriff Thompson suggested I hear you out. I’m still not convinced about all this, but I respect the sheriff. Officer Davis, remember when you first joined the force, you wanted to protect people, not generate revenue through citations.
I’m asking you to listen with an open mind. We’re not anti law enforcement. We’re pro Constitution and natural rights. Let me show you something from your own training materials. This FBI document explicitly states not all individuals who raise these or similar arguments are sovereign citizens or extremists. Yet officers are trained to immediately label anyone questioning jurisdiction as extremists. They don’t emphasize that part in our training. It’s all about identifying threats and paper terrorists. That’s by design. Ask yourself why would they train you to automatically dismiss legitimate legal questions? Who benefits when citizens can’t effectively challenge jurisdiction? Davis has.
Have you noticed the changes in equipment and protocols over the last few years? The increasing militarization, the emphasis on compliance rather than protection? Yes. And those new uniform patches that appeared last month? They look almost like UN insignia, but with different colors. When I asked about them, the captain got defensive. That’s part of a larger pattern. Law enforcement is gradually being repurposed from protecting citizens to controlling them. Your oath was to the Constitution, not to international or corporate interests. I’ve been uncomfortable with some of the new directives. Last week we were told to prepare for civil disturbance scenarios with unusually specific protocols for mass detentions.
That’s exactly what concerned me. These aren’t normal preparedness drills. What exactly are you proposing here? Education. First, understanding the difference between lawful authority and mere policy. Learning how to honor your oath while. While navigating a system that’s increasingly Asking you to violate it. I need to think about this, but I want to learn more. Those mass detention protocols didn’t feel right. One MONTH LATER Assembly Meeting with New Members Today we welcome several new members to our Assembly. Captain Reynolds, a retired Marine, and Judge Williams, who recently retired from the circuit court. Our assembly has grown to 27 members, including three law enforcement officers, two military veterans, a former judge and various professionals with special specialized knowledge.
Captain Reynolds has important information to share about military preparations that align with what we’ve been observing in law enforcement. Thank you. I maintain contact with active duty personnel who’ve reported disturbing developments. Training for domestic operations has increased dramatically. They’re conducting exercises specifically focused on urban population control and mass detention scenarios. This aligns with judicial preparations I observed before retiring. New administrative procedures were implemented for processing large numbers of cases without standard due process. When I questioned this, I was told it was for emergency situations in our department. We received new riot gear and detention equipment last month along with protocols for processing centers.
Our assembly has developed contingency plans for exactly this scenario. Let me outline our three tiered response strategy. First, preventative measures. Every member maintains proper documentation of status and standing ready to challenge jurisdiction immediately if detained. We’ve established a rapid response legal team that can file habeas corpus petitions within hours. Second, communication protocols. We’ve established secure communication channels that don’t rely on conventional networks. Each member knows their contact person and backup contacts. If detentions begin, we can quickly document who’s been taken and and initiate legal responses. I’ve seen the detention processing documents. They’re designed to handle hundreds of people daily through each center.
The concerning part was the classification system. Some people were marked for extended processing with no clear criteria. That’s the third tier of our response assembly wide documentation of all officials involved in any unlawful detention. We immediately file bond claims against every officer, judge and administrator participating in the action. This creates personal liability that many won’t be willing to accept once they understand it. From my experience on the bench, I can tell you most judges and administrators have no idea about their personal liability in these situations. They assume qualified immunity protects them even when acting outside legitimate authority.
The key is helping our fellow officers understand they have a choice. Their oath is to the Constitution, not to unlawful orders. Many will stand down if they understand they’re personally liable for violations. We should expand our educational outreach to more law enforcement and military personnel. Many are deeply uncomfortable with these preparations, but don’t know there’s an alternative. Agreed. Our Assembly’s next phase will focus on creating educational materials Specifically for law enforcement and military personnel, explaining their liability and their options under their oath. Captain Reynolds, would. Would you be willing to help develop these materials? I can contribute what I’ve seen in recent training protocols.
There’s a clear pattern of conditioning officers to follow orders without question, even when those orders violate constitutional rights. This is how we build resilience against what’s coming. Not through confrontation, but through education and proper use of existing legal principles. When enough people in key positions understand these principles, the planned system of control becomes impossible to implement. I believe we’re at a tipping point. More people within the system are questioning what they’re being asked to do. Our assembly can provide the knowledge and support they need to honor their true oath. Let’s begin drafting these new educational materials tomorrow.
We need simple, clear explanations of jurisdiction, standing and liability that anyone can understand. This is how transformation happens. Not through fighting the old system, but by creating a parallel structure based on natural law principles. Principles. As the old system attempts to tighten control, it actually awakens more people to the need for alternatives. Our assembly stands ready to provide those alternatives in this urgent scenario. The Shield of Souls assembly has called an emergency meeting following disturbing reports from California. Unverified rumors suggest ICE agents have begun detaining American citizens who are Trump supporters, despite having no immigration issues whatsoever.
The pattern appears systematic but remains unconfirmed, creating a climate of uncertainty and concern. Assembly members have gathered in their secure meeting location to assess the situation and develop a coordinated response strategy. The atmosphere is tense as members arrive, sharing snippets of information gathered from various sources. Some have been monitoring alternative news channels. Others have contacts in law enforcement. Expressing confusion about new directives, the Assembly’s leadership has activated their emergency communication protocol to bring everyone together quickly. As the meeting begins, all eyes turn to Bill, a senior at the University of Michigan, who has been designated to lead this emergency session due to his analytical skills and connections with student networks across multiple states.
Bill, we need your assessment of these reports. Your network of campus contacts might have information we’re missing. What’s your take on what’s happening in California and what should be our immediate response? Well, first of all, I think the most important thing here at the meeting today is that we keep in mind the most important foundation of where all of our beliefs stem from. We all have the common belief in a creator, something bigger than us. We have to remember that we’re servants in this world. And to everybody here and to everybody who knows this information and to all good, we have to remember to put on the armor of God.
In this scenario, and remember that that not only will bring the Creator’s health, the more faith we have, the more protection we have. That’s going to increase even placebo, whether that is true or not, even non believers believing this will increase the placebo to increase their actual biofield resonance. And this is more of an etheric battle than anything because we have to remember the Nazis had the etheric symbol on their arm. Okay. So going forward, we can definitely analyze this information, but it’s all going to be speculatory because we can’t get any proof, we can’t get any feet on the ground unless you can.
So I think going forward, we need to step in God’s power. So let’s start off with a prayer, and I want to hear, hear everybody’s opinion on this. And then going forward, I think we should begin with the implement. We should talk about the plan to see if we have anybody that we know in California, anybody’s family members that. That are here with us who can reach out and verify any of these claims going forward. Go ahead. Somebody. Whoever wants to take the. The mic. Let’s. Let’s hear what you have to say. Thank you, Bill. You’re right.
To bring us back to our foundation. Before we proceed, let’s center ourselves with a moment of prayer and intention. Creator of all that is, we ask for guidance, protection, and clarity as we face these challenging times. Help us to be instruments of truth and justice and give us the wisdom to act with both courage and prudence. I appreciate the reminder about our spiritual foundation. Bill, to address your practical points, I do have a former colleague in the San Diego Sheriff’s Department. I reached out when these rumors first emerged. He confirmed there are unusual detention operations happening, but said ICE is operating independently, not coordinating with local law enforcement as they typically would.
He’s trying to get more information, but said there’s an unusual level of secrecy. Bill, I have family in Sacramento. My cousin’s neighbor, a retired army veteran who had Trump signs in his yard, was reportedly taken in for questioning three days ago and hasn’t returned. The family was told it was related to domestic security matters, but given no specific specific charges. This is still secondhand information, but it matches the pattern we’re hearing about. From my perspective, this operation violates standard protocols. ICE doesn’t have jurisdiction over citizens with no immigration issues. This suggests either a massive jurisdictional overreach or they’re operating under some emergency authorization we’re not aware of.
Either way, it’s deeply concerning the legal foundation for such detentions. Would be extremely questionable. If they’re using political affiliation as a source selection criteria, that’s a clear first amendment violation. However, they may be using some other pretext to justify the detentions while actually targeting based on political views. Bill, I think your suggestion to implement our verification protocol is the right first step. We need confirmed first hand accounts before we can determine the appropriate response. I propose we activate our California contacts immediately and establish a documentation system for any configuration confirmed cases. All right, that’s fine. But we need to plan going forward.
If. If all of a sudden this catches on like wildfire and they start arresting one of us. What is our plan going forward? How can we fight this if they come and arrest us all at the same time? What is the plan here? Judge, Sheriff, officer, with your backgrounds and your extensive. Obviously you’ve admitted you guys have seen some shady aspects of things. What do you have with all your information, what do you have for us? What’s the plan here for all of us? Especially Judge with the assembly aspect, how can we do this? And Sheriff, I know you used to be a priest.
So with that background, do you have any also thoughts on that? And Officer, I know you were. You went to school briefly for quantum physics and biofield studies. So do you have any insights on the quantum field and how maybe we can keep a good mindset and have everything work here? Perfect. What do you think guys? Do you have anything? Can we collaborate here? Bill, from a legal standpoint, we need a multi layered defense strategy. First, every member should have their emergency documentation package ready. This includes your notice of status and standing, habeas corpus templates and bond claim forms if detentions begin.
The key is immediate response. We’ve established our assembly as a rule recognized body under natural law, which gives us standing to issue writs of inquiry demanding production of detained members. I’ve also prepared judicial contacts in multiple jurisdictions who understand these principles. The moment any member is detained, we activate all channels simultaneously. State courts, federal courts and public notice. They’re counting on isolation and delay. Our strength is in coordinated immediate response. That creates maximum liability for everyone on the chain of custody. Bill, you’re right to recall my background in ministry before law enforcement. This gives me perspective on both spiritual and practical aspects of our situation.
Spiritually, we must remember that fear is the weapon they use most effectively. A calm, centered mind connected to divine protection truly does change outcomes. I’ve witnessed this firsthand in crisis situations. Practically, I’ve established a network of constitutional sheriffs across three states who have pledged to honor their oath if These detentions spread. Many sheriffs don’t realize they have the authority to prevent federal agencies from operating in their counties without permission. We’re educating them on this power. Additionally, I’ve prepared documentation on the chain of command for these operations. Identifying who’s giving the orders creates accountability. Regarding the quantum physics aspect.
Bill this isn’t just theoretical. The observer effect is real. Consciousness affects physical reality at the quantum level. When we maintain coherent thought patterns collectively, we literally change probability fields. This is why they work so hard to keep people in fear and separation. Coherent group consciousness is powerful. I’ve been documenting unusual electromagnetic activity patterns around attention centers. There’s, there’s evidence suggesting they’re using frequency technologies to induce compliance and disorientation. We’ve developed simple shielding methods using specific materials that can block these frequencies. Every member should have a shielding kit in their emergency bag. Bill. We’ve also established a decentralized communication system that doesn’t rely on conventional networks.
Each member knows only their direct contacts in the system. So no one person can compromise the entire network if detentions begin. This allows us to track who’s been taken and activate responses without exposing our entire membership. On the practical side, I’ve compiled documentation packages for each member that include templates for immediate filing if someone is detained. These include emergency powers of attorney that activate automatically if a member doesn’t check in according to schedule, allowing designated representatives to act on their behalf immediately. We’ve also established secure locations where members can go if they believe believe they’re targeted.
These locations are known only to specific cell coordinators. Maintaining operational security while providing actual physical sanctuary if needed. Worst case scenario, if Satan goes crazy. If these UN people are armed, you know, we’ve heard stories about them doing terrible things to children and calling themselves devils all across the country. We don’t know where these UN soldiers are coming from or even if they’re, you know, bio brown. We have no idea what they’re doing or where they’re going to come from. So worst case scenario, we have the Second Amendment outlining a very serious route. Without getting in too much detail, I think looking forward, we need to hear from the sheriff and the officer and obviously the judge as well.
And if anybody else knows anybody with like second Amendment teams or militias that have been preparing for this. Does anybody have any connections going forward? I don’t, you know, how should we treat this? This is very sensitive and I personally, I have a felony, so I don’t know if I can have a gun. How is this going to work? Especially if they call martial law. Bill, I need to address this with complete clarity. While the Second Amendment exists as a constitutional protection, our assembly strength comes from lawful peaceful resistance through proper documentation and jurisdiction check challenges, not armed confrontation.
That path would play directly into their narrative and justification for greater crackdowns. That said, I understand your concern about worst case scenarios. I maintain connections with several constitutional sheriff departments that have made public declarations they will not allow federal overreach in their counties. These sheriffs have sworn to interpose themselves between federal agents and citizens if unconstitutional actions are attempted. This is the proper chain of constitutional authority. Local sheriffs have legal standing to refuse cooperation with federal agencies acting outside their jurisdiction. As a law enforcement officer, I have to strongly caution against any discussion that could be interpreted as planning armed resistance.
However, I can speak to security protocols within legal boundaries. Each member should focus on early warning systems, secure communications and evacuation plans if their area becomes unstable. Regarding your personal situation with a felony record, Bill, this actually highlights why legal and administrative remedies are your best protection. You can file for restoration of rights through proper channels and our assembly can support that process with documentation and witnesses to your character and rehabilitation. From a judicial perspective, I need to emphasize that even in martial law scenarios, the Constitution is not suspended. Many people misunderstand this. The Supreme Court established in Ex Parte Milligan that military courts cannot try civilians when civil courts are functioning.
Our strategy focuses on maintaining documentation of functioning civil authority through our assembly structure. If martial law were declared, immediate challenges would be filed in multiple jurisdictions questioning the legal basis for the declaration. Remember, martial law requires specific conditions that must be proven, not merely declared. Our assembly’s documentation of continuing civil function creates a powerful counter argument to any martial law justification. Bill, regarding your concern about UN involvement. We’ve been documenting unusual troop movements and equipment deployments through our network. While we can’t confirm direct UN control, we have verified foreign speaking personnel at certain facilities. This is why our emergency communication system is crucial.
It allows us to track and and document these patterns without relying on compromised channels. I’d like to add that our focus must remain on lawful remedy and proper authority. The Sheriff’s office is the highest law enforcement authority in the county under the Constitution. Many sheriffs are awakening to this responsibility and refusing to allow federal overreach in their jurisdictions. This creates safe zones where constitutional protections are still honored. Bill, you mentioned concerns about advanced technologies and possibly non human elements. While we should remain open to all information, our immediate focus needs to be on documented verifiable threats and lawful responses.
The spiritual protection you Mentioned is vital, but it works hand in hand with practical, lawful action. There’s someone else who might have valuable insight on the situation. Marcus recently joined our assembly after retiring from military intelligence. He’s been unusually quiet during this time discussion, but his background might provide context for what we’re seeing. I call him Dynamo Jack. He likes to be anonymous. What I’m curious about, and Dynamo Jack, you can take it away when I’m done. When is the line going to be drawn? When they’ve arrested 90% of us, 10% of us. How do we know when it’s drawn to the point where we would have to defend ourselves? Now, again, I don’t want to go that direction.
I just want to be able to understand and get everyone’s perspective on where they’re at. If it comes down to that, obviously we’re going to do everything we can to. To not go that route. But if they arrest everybody and there’s no one, no one left in the assembly to. To bail anybody out, then we’re all just in a new holocaust. Is there any way to prevent that? Or are we just going to be peaceful until we’re locked up? And again, I. I’m. I vote for peace. But I’m just curious. Speak in worst case scenarios while everyone’s here.
Take it away, Dynamo. Thank you for the introduction, Bill. I prefer to keep a low profile for reasons that will become obvious. I spent 17 years in military intelligence with specialized focus on domestic contingency operations before I, let’s say retired after witnessing preparations that violated my oath. The line you’re asking about isn’t a single moment, but a series of thresholds. This is by design, to boil the frog slowly so no clear line appears. But there are specific indicators. I’ve been monitoring that signal escalation. First threshold. Targeted detentions of influential voices using existing laws, applied selectively. We’re seeing this now in California.
Second threshold. Legal framework modifications. Watch for emergency powers extensions, new executive orders regarding domestic threats and unusual judicial appointments in key districts. Third threshold. Infrastructure preparation. Repurposing of facilities, military equipment deployments to civilian agencies, and communications system upgrades. Final threshold. Narrative acceleration. Sudden media focus on extremist threats coupled with a triggering event, either real or manufactured. The key to prevention isn’t drawing our own line in the sand. That’s reactive thinking. Strategic thinking requires creating conditions where their operation becomes impossible to execute successfully. Every detention requires manpower, resources, and most importantly, willing participants throughout the chain of command.
Our most powerful strategy is creating maximum liability for each person in that chain, while simultaneously Offering them a path to honor their true oath. I’ve seen these operations from the inside. They depend on compartmentalization. Most participants only see their small piece and believe they’re serving a legitimate purpose. When enough people in key positions refuse to participate, the entire operation collapses. Yeah, brother. The highest propaganda though, is probably on the soldiers. And they’re going to think we’re conspiracy theories theorists when we start bringing up the natural law. Natural law sounds like it’s, it’s, it’s kooky and we’re not going to have a whole dictionary or we’re not going to have all the volumes of texts.
We have to back this stuff up there with us at the time. So how would we convince them when they’ve been brainwashed that, that people like us are going to be out there telling us, you know, things like habeas corpus and all that. You know, how do we proceed with that mindset going forward? You’ve hit on the critical vulnerability in their system, Bill. Military and law enforcement training deliberately creates what psychologists call thought stopping responses to certain concepts. When they hear terms like natural law or jurisdiction, they’re conditioned to immediately categorize it as sovereign citizen nonsense without engaging with the actual content.
This is why we’ve developed what we call pattern interrupt communication tools. These are simple direct statements that bypass the conditioning and speak to the person behind the uniform. Let me give you an example. Instead of saying I’m exercising my natural law right to travel, which triggers their programming, we say, officer, does your oath require you to violate the rights of peaceful people? Because that creates personal liability for you that your department won’t cover. Notice how this bypasses theoretical arguments and go straight to personal consequences they understand. We’ve tested these approaches extensively and documented the results. For soldiers specifically, the most effective approach connects directly to their oath.
Most genuinely believe they’re protecting the Constitution. When presented with clear evidence they’re being ordered to violate that oath, many experience a profound cognitive dissonance that creates an opening for real communication. We’ve prepared pocket sized cards with the exact text of their oath on one side and five simple questions on the other. Questions like does your oath require you to detain American citizens without charges? And if you were given an unlawful order, how would you know these aren’t confrontational? They’re invitations to genuine reflection that bypass the programmed responses. We found that approximately 30% of personnel respond positively to this approach when delivered calmly and respectfully.
Remember, we don’t need to convince everyone, just create enough hesitation and non compliance within the chain of Command to make the operation unworkable. This is how systems collapse. Not from external force, but from internal resistance to immoral. I’m so glad I brought you, Dynamo. So, Dynamo, if I get arrested tomorrow, what should I do? From the moment they come to arrest me, how should I behave? What should I say? Should I contact you? Or what should I do? And how is the assembly going to have my back if they come for you? Bill, Stay centered in your divine sovereignty while following these specific protocols we’ve developed.
First, immediately begin recording with your phone and state clearly. I am recording this interaction for my safety and accurate documentation. Even if they take your phone, this creates a record that may be recoverable and establishes your peaceful intent from the outset. Second, remain absolutely calm and respectful. This is crucial. Say these exact I do not consent to this interaction, but will not physically resist. I’m under duress. I require identification from each officer present and the specific charge and authority under which you are operating. Third, are you aware that detaining a living soul without lawful cause creates personal liability that pierces qualified immunity? This plants the seed of personal consequences.
Don’t argue the point, just let it sit with them. Fourth, regardless of their response, I invoke all rights secured by the Constitution and natural law. I require access to counsel immediately. I do not consent to any searches, questions or procedures. Fifth, once detained, maintain complete silence. Beyond repeating, I invoke my right to remain silent and demand access to counsel. Do not engage in casual conversation. Everything is recorded and can be manipulated. As for the Assembly’s response, we have a three tier activation protocol for member detentions. Immediate Response Team. Within one hour of your missed check in, we begin calling detention facilities and documenting all interactions simultaneously.
We file emergency habeas corpus petitions in multiple jurisdictions. Documentation Team. We immediately gather evidence of your status, standing and the circumstances of detention. This includes witness statements, video evidence and certified copies of your assembly documentation. Liability Creation Team. We begin filing notices of personal liability against every identified officer in the chain of custody, their supervisors and the agencies involved. This includes bond claims, administrative notices and public records requests that create paper trails of their involvement. Remember, in detention, your only job is to remain peaceful, invoke your rights consistently and wait. The power of the assembly is working on the outside through proper channels to create maximum pressure for your release.
Contact me only through the established emergency protocol, the prepaid phone in your emergency kit using the coded message system we’ve practiced. If you can’t access that, invoke the assembly by name to any officer, as this creates a record of your status that can be verified later. The most important thing. Trust the process. The system is designed to make you feel isolated and powerless. Know that the full force of the assembly is activated the moment you’re detained, creating a documented liability storm that few agencies are prepared to weather. That makes me feel a lot better. So let’s change the subject here.
I think we’ve talked enough about this. I feel prepared. We know what to do. Let’s move on. Let’s change the subject. Dynamo. Remember I was telling you about the Federal Credit Union with the the pedophile symbol that matched the FBI pedophile document for cyber images? They have that little swirl and then I documented it, and then they ended up changing their logo. Remember all that? Now that we have enough people in the assembly, let’s all discuss here how to go forward. Judge, officer, sheriff, and anybody else who wants to chime in. What’s your opinion going forward on how to prosecute and investigate this as an assembly going forward? And how do we indict them as the Assembly? What do we do with our investigation? Yes, Bill, I remember your documentation of that symbol.
The fact they changed it immediately after your inquiry speaks volumes. This is exactly the kind of pattern recognition and documentation that assemblies are uniquely positioned to pursue. From a judicial perspective, this is where the Assembly’s grand jury function becomes critical. Under common law tradition, the people have inherent authority to investigate matters affecting public welfare. Here’s how we should proceed. First, we need to establish a formal investigation committee within our assembly. Minimum of 7 members with diverse skills. This creates the foundation for what will eventually become a common law grand jury presentment. Second, we need systematic documentation of the evidence trail.
Screenshots of the original logo with time stamps, documentation of when it changed, comparison analysis with the FBI document on pedophile symbols, and any communications with the institution about the change. Third, we need to establish pattern evidence by investigating other institutions with similar symbols, creating a comprehensive map of these occurrences. This pattern evidence is crucial for establishing intent rather than coincidence. As someone with law enforcement experience, I can tell you that building a proper chain of evidence is essential. Each piece of evidence needs proper authentication and documentation of how it was obtained. I suggest we create a secure evidence repository with chain of custody logs for everything collected.
We should also file public records requests with any government agencies that have oversight of this credit union, specifically requesting any logo design approvals or changes. Additionally, we should investigate financial connections between this institution and others with similar symbols. Follow the money trail. Look for unusual patterns in their charitable giving, especially to youth organizations. From an investigative standpoint, we need to look beyond just the symbol. These organizations often have multiple layers of protection. We should examine their board members, executive staff and significant donors for connections to other institutions with similar patterns. We should also document any unusual security features at their physical locations, particularly restricted areas that seem excessive for normal financial operations.
I’ve observed that these symbols often function as a form of signaling within networks. As assembly leader, I recommend we formalize this investigation under our assembly seal. This creates an official record that can later be used for a grand jury presentment. We should draft a formal notice of investigation that outlines our authority under natural law and common law tradition to investigate matters affecting public welfare. Once our investigation reaches sufficient evidence threshold, we can issue a formal presentment through our assembly grand jury process. This document would detail all findings and be delivered to appropriate authorities with public notice.
I’ve been working researching similar cases where assemblies have conducted successful investigations. The key is meticulous documentation and proper public notice. We should publish a public notice of investigation in a newspaper of record which creates a public record of our proceedings. We should also prepare affidavits from each investigator detailing their findings under penalty of perjury. These sworn statements carry significant weight and create personal liability for false claims, demonstrating the seriousness of our process. I can contribute specialized knowledge here from my intelligence background. These symbols are indeed used as recognition signals within certain networks. The FBI document you referenced only scratches the surface.
I recommend we create a secure database mapping all instances of these symbols across financial institutions, foundations, government agencies and non profits. The pattern becomes undeniable when properly documented at scale. We should also examine timing correlations between logo changes across different organizations. They often change in clusters when attention is drawn to them, indicating coordination. This type of pattern analysis was standard procedure in intelligence work and creates compelling evidence of networked activity rather than coincidence. Sounds like a plan. I appreciate everyone. Let’s move on to the next matter, which is weather modification. We know that the documents are out.
More and more people are talking about it. We have all of the, you know, patents and everything we need here. Dynamo. We’ve talked, me and you in the car earlier about, you know, the whistleblowers, you know, and how they’re not going to come out, but the things you know about everything on the side. We came up with a plan to basically go after the bonds of the private companies that were going out that are. That are. That are being hired by the military to disperse. First this weather modification. Let’s go over this judge going after the bonds, etc.
How can we do this? Do you have any special channels or Anybody you know that or any information you know that can help us here and Sheriff, maybe you can help and anybody else, what do you think? We want to really stop one the NASA additive where they’re adding nano aluminum nanoparticles to increase the fuel efficiency. We’ve got the documents here from NASA. And then also we want to stop anything else that they could be spraying in the sky, especially the dimming that they’re doing and the alleged nematode dispersion that’s affecting animals us causing certain migraines within skin and affecting certain plants.
BILL Targeting the bonds of private contractors is indeed one of our most effective leverage points. These companies companies operate through surety bonds that guarantee their performance and compliance with applicable laws. When they engage in unauthorized weather modification, they’re violating multiple statutes and regulations that their bonds are supposed to ensure compliance with. First, we need to identify the specific contractors. The primary ones are typically operating under Department of Defense or NO IA contracts, but they’re deliberately obscured through multiple shell companies. However, every aircraft must have registration and insurance documentation that creates a paper trail. I have contacts in the FAA who can help identify patterns of high altitude flight operations that don’t match normal commercial routes.
Once we identify the aircraft, we can trace ownership through FAA records to find the actual operating companies. The key legal framework here is nepa, the National Environmental Policy Act. Any federal program with potential environmental impact requires an environmental impact statement. Weather modification absolutely qualifies. Yet these programs operate without proper NEPA compliance. This creates a clear bond violation. From my perspective, this becomes a county level jurisdiction issue. As sheriff, I have authority to investigate any potential environmental hazards affecting my county. Several constitutional sheriffs have already begun documenting unusual flight patterns and collecting precipitation samples for laboratory analysis.
The critical evidence is the aluminum nanoparticle content in soil and water samples. Normal background levels of aluminum oxide are well established. When we find levels significantly above background, particularly in correlation with these flight patterns, it creates compelling evidence. I’ve already connected with sheriffs in seven counties who are willing to issue formal requests for information to any aircraft operators conducting unusual flight patterns over their jurisdictions. This creates an official record and obligation to respond. I can provide critical context here from my military intelligence background. The weather modification programs operate under multiple compartmentalized classifications. The NASA fuel additive program you mentioned, High Performance Fuel Additives program is actually the public facing component of a much larger operation.
The contractors are typically structured with three layers of corporate separation from the actual operations. However, they all require specific insurance and performance bonds to operate aircraft with these modified systems. These bonds are their Vulnerability. The most effective approach is to target the insurance underwriters rather than the contractors themselves. The underwriters typically exclude coverage for unauthorized dispersal of substances, creating a situation where these operations technically void their insurance. A fact most underwriters aren’t aware of when issuing the policies. I’ve compiled documentation on flight patterns that correlate directly with weather anomalies in specific regions. When mapped against NEXRAD radar data, the patterns become undeniable.
This creates the evidence basis for challenging their bond compliance. From a law enforcement perspective, we need to establish chain of custody for all environmental samples. I’ve developed a protocol for proper collection and documentation that would stand up in court. We should organize community based collection events where multiple witnesses observe and document the collection process. This creates stronger evidence than individual collections. Each sample should be split with portions sent to multiple independent laboratories to prevent claims of contamination or error. The key is creating documentation that would be admissible in court proceedings. This means proper photography, video documentation, witness statements, and chain of custody forms for all samples.
As an assembly, we have the authority to issue formal investigations into matters affecting public welfare. I propose we establish a weather modification investigation committee that coordinates the these efforts across multiple counties. The assembly can issue public notices of investigation, formal requests for information from government agencies and contractors, and ultimately present findings through our grand jury process. This creates a public record that becomes increasingly difficult for officials to ignore. We should also file FOIA requests with every relevant agency, DoD, NOAA, NASA, EPA and FAA, specifically requesting documents related to atmospheric aerosol programs and weather modification contracts. Even denials create a paper trail we can use.
I’ve been researching the legal framework for these programs and discovered something significant. Under 15 USC SS330A, 330E, all weather modification activities must be reported to the Secretary of Commerce. These reports are supposed to be public record. I’ve already filed FOIA requests for these reports and received responses indicating no records responsive to your request, which creates a legal contradiction. Either these programs don’t exist, compromise contradicted by our physical evidence, or they’re operating without required reporting, a clear statutory violation. This contradiction creates a powerful legal lever for our assembly investigation. Great work, everyone. I’m really impressed with everyone.
So it looks like we have the same procedure that we’re going to use with the the weather modification as we’re going to use with the emf. So we’re going to obviously have our paperwork ready for Verizon and all the other companies providing participating. And we’re also going to do the same thing with plastic companies to get this ball Rolling on alternatives. So great job, everyone. I love the directions we’re heading there. Everyone, send me your videos that you take and I’ll edit it and I’ll get it out on the burrow. And we’re, you know, we’re getting more and more people over otv.com every single day and we’ll be public very soon by the end of the year.
So that being said, going forward, I think the. It’s almost like we’re the United nations now. Obviously like the good guys though. It’s like we’re the counter, we’re the. The godly version. So going forward, digital currency. I think that’s the only other thing we haven’t discussed yet. Going forward, if they start implementing this, what’s our plan? We haven’t started the PMDA yet or anything. But going forward, what should we do? I don’t even know who to ask. Who wants to start? Does anybody have any insight to this? Digital currency represents perhaps the most comprehensive control mechanism they’re implementing.
Bill it’s designed to eliminate privacy, enable instant asset freezing, and eventually implement social credit scoring. Our approach needs to be equally comprehensive from a legal standpoint. Central bank digital currencies CBDCs present several constitutional vulnerabilities we can exploit. The Fourth Amendment protection against unreasonable searches applies to financial problems. Privacy. The First Amendment protects anonymous speech which extends to financial transactions that enable such speech. I’ve been researching cases that establish these precedents and we can build challenges based on existing Supreme Court decisions. Additionally, any mandatory transition to CBDCs would likely violate the legal tender laws that require acceptance of Federal Reserve notes for all debts, public and private.
At the county level, we can create significant resistance through local ordinances. Several counties have already passed resolutions declaring they will continue to accept cash for all county services regardless of federal mandates. As sheriff, I can refuse to enforce any penalties against businesses that continue to accept cash. This creates safe zones where alternative economies can function. Remember, enforcement requires local cooperation. Without it, federal mandates become largely unenforceable at scale. The Private Membership Depository association you mentioned is indeed our most powerful tool. I’ve completed the founding documents for our assembly pmda, which creates a private contractual arrangement between members for value exchange outside the banking system.
The key distinction is terminology. We never use banking terms. Members make contributions rather than deposits. We maintain member ledger entries rather than accounts, and we facilitate mutual aid rather than loans. This creates clear separation from regulated banking activities. From a practical security perspective, we need to address the surveillance capabilities built into these systems. I’ve developed protocols for secure Value exchange that minimize digital footprints, including offline transaction methods and privacy preserving technologies. We should also prepare for potential criminalization of privacy tools by establishing more multiple redundant methods for value exchange within our Assembly. The goal isn’t to avoid all oversight, but to maintain essential privacy against unconstitutional surveillance.
The CBDC architecture has specific technical vulnerabilities we can exploit. Having worked on similar systems, I can tell you they depend on continuous connectivity and centralized validation. This creates natural failure points we can leverage. More importantly, we should focus on developing parallel systems rather than just resisting the official one. Local exchange trading systems, community currencies and resource based sharing networks create resilience. The goal isn’t to fight their system directly, but to make it increasingly irrelevant by creating better alternatives. I’ve documented how several communities have already established functioning parallel economies using simple ledger systems backed by real value skills, program products and services.
These systems become increasingly valuable as official currencies lose stability. Our assembly should immediately implement three parallel strategies. First, establish our PMDA with clear documentation of its private contract basis and first Amendment protections. This creates the legal foundation for member value exchange. Second, develop a simple secure ledger system for tracking member contributions and distributions. This can begin with physical records and evolve into more sophisticated systems as needed. Third, create a skills and resources inventory of all assembly members. This establishes the real value backing our exchange system, the productive capacity of our community. The power of this approach is that it doesn’t require fighting the CBDC system directly.
It simply creates a more attractive alternative based on real value and mutual trust. Looks like we have a really good grasp on all this stuff. You guys are doing great. I got a venture. I’m so sick of businesses automating things. Right? And when they automate them self checkouts only some of them for cash. Two of them will be for cash and then most of them will be digital. And it’s such an inconvenience. It just feels like they’re discriminating towards us for wanting cash and wanting to fight this digital. And these are public businesses. So Judge, do you have any insights to that? Is there or Sheriff, is there any.
Are they violating our rights? Can. Can we challenge this in court? Injective relief to have them have at least have these machines accept cash in each one also. Let’s just start there. Anybody have any insight there? Oh, also. Yes. Yes. Facial recognition. I’m seeing that pop up in the stores on the automated kiosk. Now you see a little camera showing your face and it’s high definition in your face and it’s going to be soon. Facial Recognition. What’s the plan for fighting all this stuff and how do we push back in a legitimate manner without seeming crazy to the general public? Bill, you’ve identified a critical battleground in the cash versus digital conflict.
There’s significant legal leverage we can apply here. 17 states have already passed laws requiring businesses to accept cash, recognizing it as a civil rights issue, since approximately 25% of America Americans are unbanked or underbanked. The legal foundation for challenging these practices comes from several angles. First, there’s the legal tender argument. Title 31 of the US Code states that US coins and currency are legal tender for all debts, public charges, taxes and dues. While businesses technically can refuse cash for goods as opposed to debts, this distinction becomes blurry with services like grocery stores where you select items before paying.
Second, there’s the discrimination angle. Cash free policies disproportionately impact lower income, minority, elderly and rural populations, creating a potential violation of public accommodation laws. Several successful lawsuits have already established this precedent for facial recognition. Specifically, we have even stronger legal grounds. Biometric information privacy laws in several states require explicit explicit consent before collecting biometric data. Illinois’s BIPA law has led to settlements exceeding $650 million against companies implementing facial recognition without proper consent. I recommend our assembly draft a model county ordinance requiring cash acceptance and biometric consent, then work with sympathetic county commissioners to implement it. This creates local legal protection while larger challenges proceed.
As the Sheriff, I can tell you that businesses often don’t realize they’re creating potential civil rights violations with these policies. My approach has been educational rather than confrontational. I’ve developed a simple one page notice that cites relevant laws regarding legal tender and biometric privacy, which I personally deliver to business managers in my county. Coming from the Sheriff’s office, this carry significant weight without being adversarial for the facial recognition systems. I inform businesses that they may be creating liability for themselves by collecting biometric data without explicit consent. Most are simply unaware of the legal requirements and quickly modify their practices when informed.
Additionally, I’ve established a community reporting system where citizens can notify my office of businesses implemented these systems. This creates accountability without requiring individual confrontations. From an assembly perspective, we should implement a multi layered approach. First, education. We create simple professional materials explaining the legal and privacy issues with these systems. Not conspiracy theories, but straightforward legal facts about rights and responsibilities. Second, community action. I get that. I get that stuff. So but let me say real quick to everybody, sorry for interrupting you, but I think it’s super important to address the fact that we can record in public.
Right. So what’s stopping these businesses from recording us in public? Is it different when we. Comes facial recognition? Because they’re getting biometric points in our face. And. But how does. How does that. How is that different? And maybe, judge. Maybe you can elaborate here. How is that different then, you know, our faces in public, our bio. Biometric data is in public. How is that different than being recorded with a cell phone? Right. If they can get our data without having to touch us. I just. I just don’t understand. I knew I need to be able to comprehend this so that going forward, I can.
I can help utilize this plan that we’re all going to use to potentially indict people or at least put pressure on. That’s an excellent question, Bill. And it gets to the heart of the legal distinction that makes facial recognition different from ordinary video recording. When you’re recorded on standard video in public, the law generally recognizes no expectation of privacy. Your visual appearance is openly displayed to anyone present. However, facial recognition technology doesn’t just passively record your visible appearance. It actively measures and digitizes specific biological characteristics unique to you. The critical legal distinction is that facial recognition creates a biometric template, a mathematical representation of your facial geometry that serves as a unique identifier, similar to a fingerprint or DNA.
This crosses the line from simply observing what’s publicly visible to extracting and storing biological identifying data. Several state laws, most notably Illinois’s Biometric Information Privacy act, bipay, explicitly recognized this distinction. These laws classify facial geometry data as protected biometric information that cannot be collected without specific informed consent. The courts have consistently upheld this distinction. In Rosenbach v. Six Flags, the Illinois Supreme Court ruled that collecting facial geometry without proper consent constitutes an injury, even without proving additional harm. Facebook paid a $650 million settlement for precisely this violation. Think of it this way. If someone photographs you in public, they’ve captured your appearance at that moment.
But if they scan your face to create a mathematical template that can identify you across multiple systems and databases, they’ve extracted biological identifying data unique to you, data you never can. This is why our legal challenge has solid foundation. We’re not arguing against being recorded in public. We’re specifically challenging the extraction, storage, and use of biometric identifiers. So it’s basically like going from, like, a 2D photo to a 3D photo. And because it’s 3D or even deeper dimensions, that’s the violation. Interesting. Interesting. So going forward, the other aspect is, with the. With the cash, they make two machines, cash and card, and then the rest of the machines only card.
So it looks like they’re trying to accommodate like the handicap. They. They put one handicap spot and then the rest normal spots. And their. Their argument could be that it’s more convenient for the other customers. How do we. How do we attack that Attack. Terrible word. But how do we proceed going forward with applying pressure to support cash on all these automated machines? You’ve identified the exact strategy businesses use to minimize cash acceptance while claiming compliance. What I call the token accommodation approach. They provide minimal cash options while structuring the overall environment to discourage cash use.
The legal vulnerability in the their approach lies in public accommodation laws. When businesses create substantially longer wait times for cash customers by limiting cash registers or self checkout options, they’re effectively creating a separate but unequal system that discriminates against cash users. This isn’t just theoretical. Several successful legal challenges have used this exact argument. In Massachusetts, a class action lawsuit against a grocery chain established that providing only one cash register while having eight card only self checkout lanes created an unreasonable burden on cash customers, particularly the elderly and those without banking access. The key legal standard is undue burden when the wait time for cash customers is demonstrably longer than for card users.
The business has created a discriminatory two tier system. Courts have consistently ruled that business businesses must provide reasonable accommodation for cash payments, which means sufficient capacity to handle cash customers without excessive delays. I recommend our assembly document wait time disparities at local businesses. Have members record the average wait time for cash versus card transactions over multiple visits. This creates compelling evidence of systematic discrimination that can form the basis for legal action. From a practical enforcement perspective, I’ve found that most businesses respond quickly when presented with the legal liability they’re creating. I’ve developed a simple approach that works without confrontation.
First, I personally visit businesses in my county and time the wait for cash versus card payments. When I find significant disparities, I request a meeting with management. I then present them with a simple one page document outlining their legal obligations under state public accommodation laws and federal legal tender statutes. I emphasize that I’m providing this as a courtesy to help them avoid potential litigation. For businesses that are part of national chains, I request contact information for their corporate legal department and forward the same information. Corporate legal teams are typically risk averse and will often direct local stores to modify practices rather than risk litigation.
This approach has resulted in several businesses in my county increasing their cash payment options without the need for formal legal action. Our assembly can amplify this approach through coordinated community action. Here’s what’s proven effective in other communities. First, we create a cash friendly business certification program that publicly recognizes businesses provided providing equal access for cash customers. This positive reinforcement approach creates market incentives for businesses to maintain cash options. Second, we organize periodic cash payment days where community members specifically use cash at local businesses and politely explain why cash payment options are important to them. This creates visible consumer demand.
Third, we draft a model county ordinance requiring businesses to provide equal access for cash customers defined by specific metrics like maximum wait time differentials. We then work with sympathetic county commissioners to implement these protections locally. The power of this approach is that it works with market forces rather than just legal mandates. Businesses respond to customer preferences when clearly expressed. There’s also a technical vulnerability in their system we can leverage. Most self checkout machines are actually capable of accepting cash. The limitation is often a software setting rather than hardware capability. I’ve documented cases where the same exact machine models accept cash in some locations but not others.
Proving this is a policy choice rather than a technical limitation. This undermines their claim that providing cash options at all machines would be prohibitively expensive or technically unfeasible. Additionally, their token accommodation approach creates operational inefficiencies they may not have considered. When cash customers are funneled to limited registers, it creates bottlenecks that affect overall store operations. Documenting these inefficiencies provides businesses with a practical reason to expand cash options beyond just legal compliance. I’m assuming worst case scenario we can just go after their bonds. If we talk to one of their bonds underwriters and tell them that they’re violating us and they that we intend to litigate, isn’t that going to make them drop their bonds? And if they drop their bonds, don’t they have to cease to operate? And that leads me to say last thing I want to say before we leave, I want to start implementing the cascade effect strategy.
I was talking to Dynamo about it, but basically this strategy is we go and we find people that are doing things like this. We don’t want to do it from a predatory standpoint, but if they refuse to work with us, then it’s a great opportunity to attempt to acquire funds for to be compensated for the damages they’re causing. All the funds that they we get from the damages will accumulate them. In our talk to Dynamo, he’s the head of the treasury and we’ll figure out where we’re going to allot that money, but we’ll put it in a safe location and then we’re going to accumulate it and then we’ll buy More equipment.
But all this equipment so we can litigate further and improve further DNA modification, targeting of targeted individuals, and all these other things that we just don’t have the money to do. And we’ll use it by literally making everything right. So we’ll eventually we’ll gain enough momentum to be as big as the big millionaires, billionaires, trillionaires, and we’ll be able to fix things like plastic emf. And we’ll be able to have a better solution, countermeasures that they just don’t care about because they only care about money. And the more sick we are, the more money they make.
Let’s touch base on all this stuff and closing statements from everybody. That’s it for me. We’ll just keep going until everybody runs out of something to say. Go ahead, guys. I don’t know who wants to go next. Bill, your point about the profit motive behind these systems is crucial. The billionaire class benefits from both the surveillance capabilities and the health impacts of these technologies. Our Assembly’s strength comes comes from recognizing these connections and addressing them holistically. As we move forward, remember that our power comes from three sources. First, our standing under natural law as sovereign souls.
Second, our unity through proper assembly structure. And third, our strategic application of knowledge through documentation and lawful process. The systems arrayed against humanity seem overwhelming when viewed individually. But they all share common vulnerabilities. They require our consent, they depend on our ignorance, and they collapse when enough people withdraw their participation. Our Assembly’s work isn’t just about resistance. It’s about creating better alternatives based on natural law principles. As we document and challenge their systems, we simultaneously build parallel structures that honor life, liberty, and true prosperity. From my judicial experience, I can tell you that the system fears nothing more than education, organized citizens who understand jurisdiction and proper legal process.
The courts function largely on presumption and intimidation. When those are effectively challenged, the entire facade begins to crumble. As we document these corporate violations, whether digital currency, facial recognition, weather modification, or toxic trespass, we’re creating a body of evidence that will be increasingly difficult to ignore. The key is proper procedure and documentation that meets evidentiary standards. Remember that all authority in a constitutional republic flows from the people. The courts, the agencies and the corporations have usurped that authority through complex legal fictions. But those fictions cannot stand against properly documented truth presented through proper channels. As a constitutional sheriff, I’ve witnessed firsthand how the system retreats when confronted with lawful authority, authority properly exercised.
My oath is to the Constitution and the people, not to corporate interests or Administrative agencies, more sheriffs are awakening to their true constitutional role as the highest law enforcement authority in their county. This creates a powerful buffer against federal and corporate overreach. When properly understood and applied. Our Assembly’s educational outreach to law enforcement and military personnel is perhaps our most important work. When those tasked with enforcing these systems understand the true nature of their oath and the personal liability they face for violating it, many will stand with the people rather than against them. From my perspective in law enforcement, I’ve seen how the system depends on compartmentalization.
Most officers genuinely believe they’re serving public safety rather than corporate interests. When presented with clear evidence of how they’re being misused, many experience profound awakening. The technological systems being deployed from facial recognition to digital currency create unprecedented control capabilities, but they also create unprecedented vulnerability. These complex systems require maintenance, cooperation, and public acceptance to function. Our documentation of EMF effects, toxic trespass, and surveillance overreach creates leverage points throughout these systems. When enough people withdraw consent and enough insiders question their role, these systems become unsustainable. As we’ve built this Assembly, I’ve witnessed the power of properly structured private association under natural law principles.
The private membership association framework creates a protected space for mutual aid and education that operates outside statutory jurisdiction. Our work documenting environmental threat threats, EMF radiation, plastic contamination, atmospheric spraying, creates the foundation for asserting our natural right to a healthy environment. These aren’t just conspiracy theories, but documented violations of natural law that create liability for the perpetrators. The most powerful aspect of our assembly is that it operates on truth rather than fiction. While the corporate government system depends on complex legal fictions, our authority stems from natural law principles that require no external validation. From my background in intelligence and military operations, I can confirm that these systems are designed with deliberate vulnerabilities to maintain control by a small group.
The compartmentalization ensures that most participants never see the full picture. However, this compartmentalization is also their greatest weakness. When enough people in key positions begin questioning their role, and with withdrawing their consent and cooperation, the entire control structure becomes unsustainable. Our assemblies work creating documentation, establishing jurisdiction under natural law, and building parallel systems represents the most effective counter strategy possible. We don’t need to fight their system directly. We simply need to make it irrelevant by creating better alternatives based on truth rather than fiction. This extended scenario showcased the Shield of Souls assembly in action, demonstrating how an organized group of individuals can work together to address complex challenges using natural law principles and proper documentation.
The emergency meeting began with concerns about potential political detentions in California, leading to a comprehensive discussion of contingency plans and emergency protocols. The Assembly’s diverse membership, including a sheriff, police officer, judge, and intelligence veteran, brought unique perspectives and skills to the table. As the conversation evolved, the assembly addressed multiple interconnected issues investigating suspicious corporate symbols linked to potential trafficking networks, documenting weather modification operations, challenging EMF radiation and environmental toxins, resisting digital currency control systems and protecting cash payment options and binary biometric privacy. Throughout the discussion, several key themes emerged. One the power of proper documentation and evidence collection following established protocols 2 the strategic use of jurisdiction challenges and administrative processes 3 the importance of education and outreach, particularly to those within the system the creation of parallel structures and systems rather than mere resistance.
5. The foundational role of spiritual principles and natural law as the basis for all actions the scenario illustrated how assemblies can function as legitimate investigating bodies with authority derived from natural law principles. By combining legal expertise, law enforcement experience, intelligence backgrounds, and community organization, such assemblies can effectively address issues that established institutions often ignore or perpetuate. Perhaps most importantly, the scenario demonstrated that effective action doesn’t require confrontation or violence, but rather strategic application of knowledge, proper documentation, and the creation of liability for those who violate natural law principles. By withdrawing consent and creating better alternatives, assemblies can help transition society towards system that honor life, liberty, and true prosperity.
Discover a hidden path to personal empowerment at Secret Civics, where you’ll learn to master the art of self representation in court battles. Inspired by the profound insights of General Miller of the United States Air Force. @secretcivics.com you will unlock teachings that connect the law to ancient wisdom found in the Bible and even deeper to divine principles. This knowledge gives your belief in something that higher than yourself the ability to reach out and physically influence your life, empowering us the way it should be to both defend ourselves and the ones around us. Imagine the thrill of uncovering a secret, intertwined knowledge that highlights your rights, giving you the tools to challenge and reshape unjust systems, using the power of literal divine light through morality that you can literally feel.
This is your chance to transform your life, stand against conformity and embrace the power that is rightfully yours. As an American, don’t wait. Embark on your journey at Secret Civics and take back your power, all at no cost and without any barriers, not even an email. Instead of generating funds, we spend them all in order for you to view this information and in return we receive a more informed public which is a more informed jury of our peers. And that’s the key. This is your chance to reclaim your power and redefine, find justice. Step into this free, limitless knowledge at Secret Civics and construct an unbreakable foundation.
Start your path today by going to secretcivics.com.
[tr:tra].