Salt Typhoon: Chinese Regimes Cyberwar Against the US

Spread the Truth

5G

  

📰 Stay Informed with Truth Mafia!

💥 Subscribe to the Newsletter Today: TruthMafia.com/Free-Newsletter


🌍 My father and I created a powerful new community built exclusively for First Player Characters like you.

Imagine what could happen if even a few hundred thousand of us focused our energy on the same mission. We could literally change the world.

This is your moment to decide if you’re ready to step into your power, claim your role in this simulation, and align with others on the same path of truth, awakening, and purpose.

✨ Join our new platform now—it’s 100% FREE and only takes a few seconds to sign up:

👉 StepIntoYourPower.com

We’re building something bigger than any system they’ve used to keep us divided. Let’s rise—together.

💬 Once you’re in, drop a comment, share this link with others on your frequency, and let’s start rewriting the code of this reality.


🌟 Join Our Patriot Movements!

🤝 Connect with Patriots for FREE: PatriotsClub.com

🚔 Support Constitutional Sheriffs: Learn More at CSPOA.org


❤️ Support Truth Mafia by Supporting Our Sponsors

🚀 Reclaim Your Health: Visit iWantMyHealthBack.com

🛡️ Protect Against 5G & EMF Radiation: Learn More at BodyAlign.com

🔒 Secure Your Assets with Precious Metals: Kirk Elliot Precious Metals

💡 Boost Your Business with AI: Start Now at MastermindWebinars.com


🔔 Follow Truth Mafia Everywhere

🎙️ Sovereign Radio: SovereignRadio.com/TruthMafia

🎥 Rumble: Rumble.com/c/TruthmafiaTV

📘 Facebook: Facebook.com/TruthMafiaPodcast

📸 Instagram: Instagram.com/TruthMafiaPodcast

✖️ X (formerly Twitter): X.com/Truth__Mafia

📩 Telegram: t.me/Truth_Mafia

🗣️ Truth Social: TruthSocial.com/@truth_mafia


🔔 TOMMY TRUTHFUL SOCIAL MEDIA

📸 Instagram: Instagram.com/TommyTruthfulTV

▶️ YouTube: YouTube.com/@TommyTruthfultv

✉️ Telegram: T.me/TommyTruthful


🔮 GEMATRIA FPC/NPC DECODE! $33 🔮

Find Your Source Code in the Simulation with a Gematria Decode. Are you a First Player Character in control of your destiny, or are you trapped in the Saturn-Moon Matrix? Discover your unique source code for just $33! 💵

Book our Gematria Decode VIA This Link Below: TruthMafia.com/Gematria-Decode


💯 BECOME A TRUTH MAFIA MADE MEMBER 💯

Made Members Receive Full Access To Our Exclusive Members-Only Content Created By Tommy Truthful ✴️

Click On The Following Link To Become A Made Member!: truthmafia.com/jointhemob

 


Summary

➡ The Chinese Communist Party (CCP) has launched a large-scale cyber war against the United States, targeting both private and public sectors, including government entities. These sophisticated cyber attacks aim to defeat the U.S. without engaging in physical warfare, targeting personal data, intellectual property, and critical infrastructure like power grids and water supply systems. The CCP’s Salt Typhoon group has infiltrated over 200 targets in more than 80 countries. The article discusses these cybercrimes and offers advice on how to protect oneself.
➡ The discussion suggests that China might be using drones for surveillance and possibly weather modification as a form of warfare against the United States. The U.S., being a global power and a threat to communism, could be a target for such tactics. The conversation also mentions a company called Rainmaker, which uses cloud seeding technology to combat water scarcity, and how similar methods might be used by China for harmful purposes.
➡ The article discusses a documentary about the persecution of Falun Gong and organ harvesting in China, which is available on various streaming platforms. It also talks about the rise of cyber warfare, with China being a significant player. The article highlights the sophistication of Chinese hackers and the risks associated with using Chinese apps, which can access personal data and potentially lead to hacking or blackmail. The article emphasizes the importance of being aware of these risks and taking necessary precautions.
➡ Hackers often gain access to larger corporations by hacking into an individual’s data first. They then sell this data on the darknet or to governments. It’s important to be cautious of phishing schemes, especially those that ask for personal information through text or email. Always check the source of the message and avoid sharing sensitive information online.
➡ Be cautious of suspicious messages asking for your password, as they could be scams trying to steal your information. These scams can appear very realistic and sophisticated, often pretending to be from trusted companies like Amazon or UPS. They’re becoming more common and detailed, with a 50% increase in such incidents recently. Always double-check before clicking on any links or providing personal information, and consider setting up two-step authentication for added security.
➡ Hackers in China are using their skills to expose the Chinese Communist Party’s (CCP) lies to its citizens. Some have defected and are trying to spread the truth about what’s happening inside China. The CCP has a group called Salt Typhoon that has hacked into many companies, including government organizations, using a malware called Brickstorm. It’s important to be careful about what apps you download, especially those from China, as they could be tied to these hacking activities.
➡ The text discusses concerns about potential covert activities by the Chinese government in the US, including the use of drones and sleeper cells. It suggests that these activities could be part of a larger strategy of hybrid warfare, and that the US government may be struggling to respond effectively. The text also mentions a possible connection to Chinese purchases of US farmland and the presence of Chinese special forces within US borders. Finally, it encourages viewers to send in Halloween costume photos and announces a live Q&A session on Rise TV.

Transcript

Sam, what happened? There’s something wrong with the intro. We are live though, so you’re welcome. Okay. Well, guys, an abrupt start to the show. I guess we’ll start here. The Chinese Communist Party CCP has launched a massive cyber war against the United States, targeting both. That’s probably what happened in the intro. Targeting both the private and public sectors as well as the government entered entities. Hear all about it on this edge of wonder. Live with Ben and Rob. Yeah. These cyber systems are so sophisticated and intricate that their aim is to defeat the United States without having to engage in kinetic warfare.

So what does that mean for the average person out there? Well, they’ve targeted everything from personal data and intellectual property of major companies to critical infrastructure, power grids, water supply systems and assets. In the skies. That’s right, in the skies. Yeah. And we’re going to explain what this means for you and how to protect yourself. The CCP’s Salt Typhoon group also infiltrated over 200 targets across more than 80 countries. So join us as we expose these war crimes and discuss how you can protect yourself. And at the end of the show, don’t miss the live Q and A followed by the meditation prayer, exclusively on Rise tv.

And we’ll see you out on the edge. I feel so unready. Yeah, I was like typing something like, just adding some notes in and then all of a sudden I just see myself pop up and I’m like, oh, wait, there I am now. I was like, there’s you. I was typing something nonsensical for the chat. And then I was like, what? Oh my gosh. Anyway, I hope everyone’s having a great week. How are you doing, Rob? Yeah, good, good. How are you been? Yeah, doing pretty good. So you’re having a bright and shiny Tuesday? Yeah, I definitely am.

Everyone’s like, see, it reminds me of Saved by the Bell. Yeah, this is like an older shirt. And I was like, I think I’m gonna wear this today. It’s a good. It’s a good shirt. Yeah, I like it. Anyway, yeah, I thought this is like such a important topic. You know, we’ve been covering a lot of. A lot of, like, alien stuff, UFO things, you know, Three Eye Atlas. I thought, you know, getting something a little bit more worldly would be kind of good to get into. And a lot of information is coming out and the Epic Times just published this massive, massive article with this incredible crazy infographic.

But, you know, over the last. Specifically, really since COVID but over the last year, we’ve. We’ve seen Blackouts and tech issues across the world that we haven’t seen collectively over the last couple decades. Remember there was that big crowd strike blackout that, that happened last year that caused them worldwide disruptions of all kinds of platforms, apps, websites, everything, you know, and we never got an official explanation for what happened. And, and then also around that same time, the whole entire UK had a blackout, you know, all across Europe. All of uk, pretty much all of uk.

It went through mostly in Spain, but then it branched out from there. So. So, well, Europe as a whole, I should say. And you know, it affected so many things transportation wise. Airplanes are having issues, you know, and, and then on top of that, like power grids are going down and they’re just like, oh yeah, we don’t know what’s going on here, you know, but when you kind of put two of two together, it’s kind of like, okay, well what’s the CCP doing? And that’s kind of getting into what’s been happening. The FBI did come out and I think it was early last year, they were warning people about potential cyber attacks.

And literally two months later the power grid goes out, you know, so, so it’s like, yeah, I wonder, you know, it seems like they would know what’s going on. We never got an official explanation for hardly anything. I think one of them was like, oh, there was some kind of UPD state that caused it to malfunction. And it’s like, yeah, that doesn’t really happen like that. Yeah, no, especially in today’s world. Yeah, maybe in the year 2000, you know, but that didn’t even happen in the year 2000. No, they usually have backups after backups after backups for those things.

Yeah, there was only a few systems that went offline in the year 2000, you know, for Y2K. But this is like, this is super weird. So that’s kind of where this, this whole article came out. So Epic Times headline is the CCP’s cyber war machine. And they created this massive infographic and went into great detail about what exactly is happening with China. And if governments are not. Well, I’m sure they are, but if they’re not in companies, this is exactly what they need to pay attention to too. So this goes into great, great detail about when these, see all of that, all those numbers are all these different code names for different branches of hacking units and cyber, cyber warfare groups that the CCP has that’s directly tied back to the military.

And they actually have about 200 hacking groups. And what makes this different than other countries is that China, their, the military has been actively pumping in massive amount of resources into acquiring hackers. Some that work directly for the military and some that are like freelanced. And most hacker army, they do, they have buildings, Matt, like a whole entire building design and everybody in that building are all hackers hacking, you know. Yeah. And we’re not talking about a few here. We’re talking about hundreds of thousands of people that are doing this mass. Yeah. That they’re pumping lots of resources into this.

Most of them are classified as Advanced Persistent threats or apt. Some groups of the People’s Liberation army or what’s known as the pla, basically the CCP branch of the military. Some are Ministry of State Security and China’s main intelligence agency. They, that’s the, the, the state security one. And they also use private companies who, who are then given nicknames along with these freelancers so they can’t be traced back. So that’s, that’s the scary thing. And so this, the epic times. They interviewed various different people. One of the people they interviewed, they said they will spend years.

They, meaning the ccp, they will spend years collecting information and setting the groundwork for their operations. They also have access to the entire intelligence apparatus meaning like, you know, like the military. Like imagine the US hiring hackers and then say here’s access to all of our top secret databases, you know, our classified databases. Now it’s like here, go, go at work and whatever you need, money, resources, more people, equipment, like we will provide it for you. Yeah. The way the US is set up right now, it would, it would try to hire a bunch of, of non American Indian hackers or something to do something and it would fail miserably.

Yeah. Now I mean the difference is that I’m sure the, the China or the, the U.S. does have these things, you know, working, but. Well, but it’s like it’s a different standard. They do. Yeah, they do. But if you talk to experts in cybersecurity, their biggest concern is the Chinese state hacker apparatus. Yeah. Because some of my buddies won’t stop talking about it. They’re just like, this is the most dangerous thing out there right now. It’s crazy. We’ve never seen anything like. Because they’re on the daily, on a daily basis, they’re helping corporations trying to skirt these things.

And they’re highly formidable hackers that are, that are screwing around with things. And the corporations, you know, you and I have talked about this. They won’t talk about what’s really going on because it’s a PR nightmare. They don’t want to look weak. They don’t want to look like all of their data has gotten stolen, but it has. Exactly. And, and they’re over and over again their main focus is us. And, and again, you know, I think with, with the US doing this, they’re more focused probably on the government systems. And these guys are going after every company and every sector in America.

There was a massive long list of companies that are on this list. Every, every major military contractor, aerospace, aviation, computer software, hardware developers, tell any kind of telecom, communications, electronics, engineering, mining, shipping, pharmaceuticals, energy, even education. So it’s like it covers everything. They’re just basically going after every major branch passable in the United States. And they’re also not just targeting companies, but critical infant infrastructure such as power grids, water supply, transportations. So it’s, it’s not just, it’s not just like a company, it’s, it’s like actual critical things that will directly affect people, which is now were entering actual warfare.

You know, if you shut down a power grid and that power grid is connected to people’s lives or at stake after that fails, then it’s like this is, this is serious. Which is why I think they’re so afraid, the US is afraid to point fingers back at China because I think they’re, they’re trying to avoid a potential war is what I think they’re trying to do. But it’s like what’s going to happen? You know, and so all these drones that people are seeing and everything, I’m now wondering if this is coming back to China. Somehow. I, I think some of them might be some like government, you know, military operations going on.

But, but I’m starting to really think that some of this could be China doing some kind of surveillance on the area. Maybe, maybe land surveillance, maybe the people, maybe there’s something there. Maybe, maybe power grids, maybe land. I mean there’s, it’s just hard to say. But I am starting to wonder if these drones are connected to that. But what do you think, Rob? Yeah, I mean it’s. The term for this, I believe is called unrestricted warfare. So it’s warfare that is, as you said before, not kinetic. It’s not on the ground, it’s not with missiles. It’s a slow churn over a long period of time of finding everything out you can about your enemy.

And why the United States, you might be asking. Well, if you, if you look at history, the biggest threat to communism would be where the CCP would focus. The biggest threat to communism is the United States, because the United States is a, is the leader of the free world, and the free world is basically China’s enemy. The United States is also the international police, for better or for worse. You know, I was telling you I was in the Bahamas recently, right? And on the way to the airport, I was talking to the woman that was driving me there, and she was saying that the biggest threat that they have in the Bahamas are all of these people coming over from the island of Haiti into the Bahamas, and then they stake out in, like, the woods and build huts and stuff, and then they, like, they destroy the Bahamas slowly.

And they said the only thing stopping the Haitian, like, people coming over. Yeah, the Haitian, Haitian migrants are United States naval ships that are, that are intercepting them and sending them back. So the United States is doing so much more than what we even realize, and they’re doing it on a global scale. So when you’re talking about China and who they would focus on, obviously it would be the United States. It’s their biggest enemy. Whether they say it on the surface or not, whether there’s trade going on or not, they would slowly be trying to undermine the, the infrastructure of the United States.

Yeah. And, and, you know, this is something I didn’t really think too much about with these drones. I know China came up in a conversation, you know, but then it’s kind of like, well, we’re trying to do this or not. But then I started thinking back to. You remember that, that company Rainmaker, right before the Texas floods, it was doing some weather modification or cloud seeding, as they would call it. And, you know, and then two days later, the floods happen and they’re like, oh, it’s not related to us because we stopped. Well, then the CEO of the company, who’s like a really super young guy, he’s like 24 years old or something like that, he came out in Congress just casually and nonchalantly, just kind of talking about how China is using weather modification as, as a weapon.

So I, I want to show this because I think this is, I mean, this goes along exactly what’s, what’s happening with hacking. So why don’t we show a little, just a little bit of this, Lindsay, that, that, the video of him speaking. I’m not sure where he’s talking about it now, that I don’t remember, but just play a minute for our. This is Augustus Rico. I’m the CEO and founder of Rainmaker, where a cloud seeding company that is enhancing Precipitation via advanced radar and also drones for the sake of supplementing water supplies for farms, cities, reservoirs and wildlife throughout the United States.

Our ultimate vision is to end water scarcity, and we’ve begun that mission already. I’m testifying to not oppose the spirit of this bill, which I think is well founded, but the current configuration of the bill that I think would impede this mission for ending water scarcity and also for bringing the best in class technology to Florida and the rest of the United States. And so the first point that I’d like to make is the difference between solar radiation management and cloud seeding. And so Senator Garcia did bring this up briefly. Solar radiation management is a very new technology.

It’s not something that’s been tested at length. NOAA has done some very initial experiments on its efficacy. It is attempting to reduce the amount of solar radiation that makes it down to the planet by injecting reflective airsols into the upper atmosphere. Once you inject these aerosols, they stay in the stratosphere for years. They have effects on the entire climate. The data from these experiments, because the experiments have been so few, is limited. And so the implications of them are not something that are well tested. Yet. Cloud seeding is altogether different. The only similarity is that it has to do with the atmosphere.

It has to do with the low atmosphere. It’s a mechanism. It’s a tool that either freezes the water in existing clouds or condenses the droplets in existing clouds into bigger snowflakes or bigger droplets such that they fall onto your target watershed or farm. It’s a technology that has existed for 80 years in the United States. It was patented by GE in 1946, but it hasn’t been viable for a long time because we didn’t have the appropriate radar to measure exactly what its effect is. I can tell you definitively that there is not cloud seeding going on in the state of Florida because you would be able to see its effect on radar.

So the national center for Atmospheric Research produced some great results from what’s called the Snowy campaign, where they were able to verify and they saw tens of millions of gallons of precipitation occur from each of their interventions. Lindsay and so basically he’s trying to make a, he’s trying to argue the point to allow them to continue cloud seeding, AKA chemtrails in Florida. And, and then he starts getting, he gets into it and then he starts explaining at some point, it’s a long video, but at some, when he starts talking about how China has been using weather modification as a weapon.

And the Diplomat had a big article about this, too. How China uses geoengineering to pursue a hybrid warfare strategy. And he’s talking about cloud seeding with drones. So right now in New Jersey, they’re having massive floods. Now, I’m not trying to say this is like, you know, this could be just a natural thing. This could be something deeper going on. I mean, they’re still seeing drones in that area for ever since basically December, and every day, every night, they’re still seeing drones in those areas. So without any explanation, and there’s been theories, everything from. From DARPA to some kind of, like, military things to other governments or China doing something.

So, you know, so it’s just. It’s just kind of weird because he’s explaining right there that they can use drones to do these cloud seedings. And now we’re seeing drones kind of all over the place, and we’re having issues with weather. So is it connected? We already know China is using weather modification in a sense of, like, hacking and a sense of a weapon to use in warfare. So, and. And then, like I said, this article from, from the Epic Times does get into this. It doesn’t go into detail about, you know, how they would be using it.

It just mentions that, you know, they’re. They’re doing these other things too, like, like, not just hacking computer systems, but targeting infrastructure as a whole. So, you know, and. And one of the best ways to. If you’re. If you’re gonna, like, you know, if you’re causing a flood or massive downpour of rains or something, I mean, very. It’s not, I don’t want to say very few people, but it’s not going to be on the top of people’s minds. Oh, this is some kind of weather warfare that we’re having right now. You know, some comfort. Some government created this.

It’s just like, oh, this is a natural thing, because it’s naturally happens that there’s crazy weather, you know, but. But then it’s like now, we don’t know. Like, ever since Ian, I think. I think people have. Have kind of started to wake up a little bit with all this stuff going on. But why don’t we. Oh, you’re talking. Robert, you’re muted. Sorry. I just messaged Casey Fleming, my buddy, who has a cybersecurity firm that deals with this all the time, and I asked him if what his thoughts were on the drones in New Jersey that are still appearing and whether they’re tied to the floods and the Chinese Hybrid warfare.

So we’ll see what he says. Perfect. Awesome. Well, you guys, we’re gonna. Why don’t we show a trailer right now and then when we get back, we’ll. We’ll continue getting into this infographic and how it can affect you too. So think of this story as a murder mystery. Murder seems to have been committed perhaps tens of thousands of murders. The mystery is why so few people seem to be paying attention. I felt this was sort of a horrible thing and nobody really wanted to look at it. I was a blood tested. Not only blood test, X ray, blood pressure and eye test and kidney.

It was as if somebody was checking the health of her organs and nothing else. Dr. Anwar, that is your job now to as quick as possible removal liver and kidney. I found the phone calls simply irresistible. My God, this is real. They killed like tens of thousands of prisoners of conscience for their organs. That’s really bad. What are we doing about this? So don’t ask me how a physician can take part in this. There are certain lines we can’t cross. This is a red line. That’s an absolute red line. A little bit hard to believe that it could be.

So it is not up for discussion as to whether murder from reports is taking place. It’s now just a question of whether we’re going to continue to put up with it. All right, well, you guys, that is an amazing documentary about the persecution of Falun Gong and organ harvesting that is happening in China. We, we do have that on our website, Rise tv. I think you can also find that on pretty much any streaming service like Amazon or whatever. But it is a phenomenal documentary and it’s one of those, one of those documentaries after you get done watching, it’s like you just look at the world differently and especially China and what’s happening China.

Yeah, it really is. We’re. We’re really wrapped up in US politics and current events, what’s in the news cycle. But when you broaden, when you broaden the scope of things and start looking at what’s going on, it’s. Yeah. Crazy. Yeah, it really is. Really is. And once again, you can, you can join our Rise TV platform where we have over a thousand videos on there for 12.99amonth and support what we do. Because your support is a hundred percent of how we do our operation. Yeah, we don’t have Edge of Wonder back yet. Hopefully crossing our fingers.

Yeah, I feel like if we get it back, I’ll be like a deer in the headlights. Like, what, where do we start? Go live and be like, hi. After five years. Yeah, our beards are much grayer. Yeah. But we’re still the same. Still the same. All right, well, getting back to, you know, what’s going on with all this. So the, The. The Epoch Times, they interviewed the CEO of a company called Black Black Ops Partners. And that’s Casey’s. That’s Casey’s Cyber. That’s his. Yeah. Yep. Okay, so that’s who they connected with. Yeah. Okay, so I. Oh, yeah, that’s Casey.

So Casey said this. Okay, so Casey said. He said to the ccp, cyber is one of many methods of unrestricted war, weakening your enemy from the inside with no rules, just short of conventional war. Casey Fleming, a strategic risk and intelligence expert and the CEO of Black Ops Partners, told the Epoch Times via email. Read the next paragraph too, because this is a. This is. The CCP Cyber war machine is much greater than anyone realizes. They have the manpower. They are extremely focused, minimally fragmented under the totalitarian communist regime, and leveraging artificial intelligence and technology for maximizing their attacks, which is, you know, everything he’s seeing on a daily basis.

Yeah, and the thing is, like, they, they. The. The US has been arresting and indicating some Chinese hackers, but that’s only if they’re located in the US they basically can’t do a single thing if it’s coming from China. Which is why I think they’re so afraid to say that China is doing this, because what do we do? You know, we. We’re kind of in. In a world right now where this is very unprecedented. We don’t have any. There hasn’t been a warfare with computers before, you know, really until recently. And so what. What. What do we do? How do we do this? You know, now that China is, is.

Is. Has expanded a massive network to do this. So, So I will, I will say one thing though, which is that if you, if you look at kind of what’s happened over the past year, the, the crashing of Wall street, when the, the CCP came out with its own AI saying that it’s better and it took less time to create, all of that was based off of chat GPT. Yeah, well, that’s what they’re doing. They’re stealing everything, and then they’re stealing everything. But it, but it also, it also communicates to us that, that it’s not theirs.

They’re. They’re. They’re ganking things that other people have developed. They’re still not developing these things on their own. So that doesn’t mean it’s not dangerous. And it doesn’t mean they’re not utilizing, just means that they’re lying, as they always do, you know, but they’re. They’re getting way more sophisticated on tax. It’s not just like phishing scams where it’s like, you know, you. Because it used to be back in the day, or not back in the day, but maybe like 10 years ago, you get some email in broken English that’s like, click here. And you’re just like, what the heck is this now? Like, for example.

So we got an. Actually, we got an email on one of our accounts, and it was. It said, it looked like it was an official Instagram email. And because even I was caught by it, I was like, this is really weird. And it was like on this post, it was a really old post. It was like, you use this piece of music and there’s a copyright claim on it. Click here and you click on the image, it takes you to Instagram and then it asks you to fill. You know, it’s like, fill out your stuff. So I was like, this is really weird.

And I’m like. But it threw me off because I’m like, this is. We didn’t add this music that was on Instagram. I was like, why is it this getting tagged and nothing else? So I, I started to look into it, and then I’m like, why can’t. Why. Why am I not already logged into Instagram? And that’s what kind of caught my attention. Then I looked at the email really carefully and it was like Instagram communications.com or something like that. You know, it was, it just wasn’t like straight up Instagram. And I realized this is a fake email.

And so it’s like they’re getting way more sophisticated on how this works. So it’s called watering hole. And I never heard of this term before in my entire life. I mean, related to hacking. But what they do is before they just send out an email, now they actually will look at who they’re targeting and maybe watch what they do online for a while, get a feel for this person, understand what they’re doing, and then try to reach out to them. They’re not just like, you know, blasting everybody with emails, hoping that one’s gonna stick. Like, now they’re actually targeting certain individuals or targeting certain accounts.

And they also look for security weakness on certain websites, plant malware on them. And one of the main ways that they’re doing this is through apps on all the stores, like for the iPhone, for example. And that becomes the biggest, biggest problem. And this article gets into detail about how smartphone users have become used to, you know, because you’re used to giving permission. It’s like every time you open an app, it’s like, yeah, there’s permission to access your photos, your phone or whatever it is, you know, and basically with any app that’s on your phone, it has access.

And that’s why, you know, you talk about something and all of a sudden you start seeing ads on Facebook, you know, because it’s asking permission for your microphone, but it’s probably permanently on. So is the cameras permanently on? And all the apps are connected to these things. So. But these Chinese apps specifically can monitor what you’re doing through gps, through Bluetooth, even through cell tower connections. Basically anything that you do these things have access to. And then on top of like typing in something on your phone. And some people are like, well, I’m just me, I don’t have big accounts.

You know, I, I just do whatever I do and it’s, it doesn’t really seem like it’s going to affect me that much. But the problem is that everybody has bank accounts. Maybe you even have cryptocurrency on your phone. Now if you enter your password of your crypto, crypto account online and these, these apps are connected with that, they’re going to see your passwords, they’re going to be able to like hack into it, take your money from that, take your bank accounts. They also like store things for blackmail. Like maybe you’re having some kind of secret affair or something weird is going on and then they’re gathering that data so they might come back you with something like that or just personal messages or maybe the big one that people don’t think about, maybe you work for a company that’s larger that they want access to.

So they might see, oh, we can get, take this person’s login now, log into their work, have access to this, and then start like doing whatever they need to do for that company. So, and that’s, that’s how a lot of it, they’re able to get through to a lot of the bigger corporations. It’s like they’ve hacked into somebody else’s data and then from there can go into those larger companies. So it’s like, you know, and then on top of it, they’re having all this data. So even if you’re not really that important or you feel that you’re not, not that important, you know, then they’re just selling it on the darknet.

Or to governments, like, hey, we have. Here’s 10 million users, all with passwords, all their accounts, their addresses, everything, you know, and then now we’re all getting emailed, like, oh, your Coinbase account is blah, blah, blah, like, we need you to confirm this, you know, or whatever. And I’m constantly getting these like. Like stupid text messages. Yeah. Annoying. Yeah, I just delete them now. Yeah. But, you know, I have friends that think they’re real. Like, dude, someone just took money out of my Coinbase account. I just got like an. Or a message from it, and I’m like, coinbase is not going to reach out to you in that way.

Yeah. And then they go there and nothing’s going on. I know. Yeah. Yeah. I want you to click a link and fill information in. Mm. That’s it, you know, and. And that’s how we’re giving away our data. But then it’s like, you know, they’re also monitoring where you go. Maybe it’s like, oh, hey, look, we’re realizing this person works for this company, you know, and then all of a sudden, that person is around other people, and then they can access those other people’s phones through that one person’s phone, you know, and. And these. This is where things get really crazy.

But they’re figuring all this stuff out in China, and that’s the scariest part. Like, I don’t even think we. We can even comprehend the level of. Of what they’re doing. Yeah, it’s not just China. I mean, Indians and Pakistanis are fully engaged in this type of fishing, you know, scheming that’s going on everywhere. That’s true. Yeah. I mean, some of the money ones, you know, they’re more focused on just trying to get money. But I think, you know, because with the ccp, it’s like, okay, I don’t really. I don’t even know if they really care about money so much as they do for taking personal or what I want to say, like, ip, that’s.

That’s more. That’s more valuable to them than, you know, draining somebody’s cryptocurrency that maybe has, like, you know, $50,000 in there. It’s like $50,000 to them is like, probably nothing. But, you know, you work for a company that is potentially creating something that’s not on the market yet or something like that. That’s what they would be interested in. Because then it’s like, well, if we can put this out first, then, you know, we’re ahead. And. And then we, you Know, then they’re making whatever, billions of dollars instead of, you know, just scamming $50,000 here and there.

But, you know, that is happening too. But yeah, that’s what I think. That’s the scary thing. And I, I know Apple, like Apple came out and said that they are trying to remove, you know, a lot of the apps that they’re finding could be problematic. That was the major issue with Tick Tock, you know, when Tick Tock was, or, you know, as Tick Tock is there. But it’s not just Tick Tock. I mean, as we know, like Facebook is doing this too. But, you know, to, to what extent is the question. So, but I, I, you know, I, I mean, they asked what’s his name? Rob? Casey.

Is that what you said? Yeah. Casey Fleming. Yep. So Epic Times asked Casey, like, what, what you should do with this? And basically his, his suggestion was try not to keep, you know, a lot of personal stuff on your phone. But I, but honestly, I feel like it’s almost, it’s hard, you know, I mean, well, it’s little things. Like, you know, for instance, when you sign into your bank app, if you ask the app to save your password, bad idea. Like you should just sign in every time and have your password memorized. Right. So it’s like little things like that go a long way because then if they do get into a back door on your phone, they’re not going to find passwords that have been memorized by your hard.

On your hard drive somewhere. You know, they know where to look for all of that stuff. It’s not even hard to find if you know where to look. Exactly. We just got a comment from Cracking up and she says, my, my girlfriend’s husband, who’s a tech executive making microchips at Apple, he said China steals all of their intellectual property. It’s so bad. Yeah, I mean they’re doing this with every company and the companies are too afraid to come out and say anything but, but that. And you know, we, we live in a high trust society, so everyone thinks no one could really possibly be that bad.

Right. And so now we have a situation where literally, and if you’re over 60, I’m not pointing the finger at you, but we have a lot of people that are over 60 that are falling for these phishing schemes. They, they just think, well, why would someone text me? How did they get my number? I didn’t give their number out. Well, all of this information gets leaked online. They don’t even know about any of that. Yeah, a Lot of see what looks like an official message come into their text or an email, they start freaking out and they don’t check things.

They just click on the link and they start giving information out or they get on the phone. Like, I’ve gotten so many phishing messages that are like, oh, your card was just charged this for this charge. Call us here if it’s. If it’s. I just look at it, I’m like, whatever, dude, just delete it right away. You know, but most people don’t do that. They don’t. They. They’re, for lack of a better way to say it, more trusting or they’re a little bit naive about how all of this works. And then they, they go along and give away information they shouldn’t.

And, and for people that don’t know, most government organizations won’t even email you or call you. They will mail you. Yeah. And also, you know, or that or it will be. There are certain red flags of something not being official. Like bank of America, for instance, won’t ask you to call about a specific charge. They’ll tell you your credit card is on fraud, you know, or there could be fraudulent activity. Did you charge this? Yes or no? It’s not asking you to click on anything. It’s not asking you. That’s true. Yeah. Yeah. So it’s like you respond in the app, yes or no.

I mean, basically a red flag is any text message or email that redirects you somewhere else and then asks you to put in your information. You should just be careful about. Yeah, yeah. And then also one thing is, like, every single person who’s in our chat right. Right now, every, Every person out there, your information is leaked online. In fact, most of your information is already public. There are some websites I know that I can go and I can literally, if you know how private investigation works or you know how genealogy works, all of this information, once you’ve bought a house, once you’ve got a.

A ticket for whatever, speeding or what, all of this information is out there and it can be found in a couple of clicks, literally, if you know where to. Where to look. And you can get a phone call from anyone right away because your, your phone number is public. It has to be public because of the infrastructure that we have here. So we have to stop thinking this stuff is so private. It’s not. It’s. Even if your phone number is private, it’s been leaked. Your passwords have been leaked. Everything’s been leaked. It, you know, just don’t think it hasn’t it has agreed.

It really has. Everything pretty much has been. And you know, once again, one way to check, always check the email where it comes from. Make sure that you know, if the person is like hey, this is you know, sent from Jessica. But in the, in the, in the thing it says Mark. You know that’s a red thing flag right there. Also like I said, if, if it comes from an official company, they’ll always have the company as like@company.com you know it, it won’t have any like weird numbers or Gmail’s account like that. That’s also a red flag if you see some so and so gmail.com and it’s from an official company, it’s probably not from that official company because that’s because otherwise they would have the money to get a real email.

And also the most companies are against that because people don’t open it. It has to be from the legit company. Yeah, check this message out from Audrey. And I see she said I always get text message that says Amazon asking to change passwords. Right. Something that effect. So what they do is they send you a message, you click on it, you type in your password and then the password you want to change it to. Now you’ve given them your password and then they go onto your Amazon account, they have access to your credit cards and they start buying crazy crap.

Now most of the time that doesn’t work if you have two step authenticate authentication. But what happens is not everyone has set that up yet. Let’s say, let’s say 1 out of 50 people haven’t set that up. Now it’s just a numbers game. If they send that text message out to 10,000 people and they get a certain amount of replies, a few of them, they’re going to be able to break into the Amazon account and buy a couple of crazy things or get access to your credit card. So you just got to be really careful with this stuff.

Yeah, there has been this UPS one. I get this all the time. Yeah, you UPS stuff like. Give me a break. Yeah, I’m like, yeah, ups that link USPS.com/craziness. Yeah, okay, that’s real. Yeah, sure. That’s another thing. But you know, they’re very subtle about it. Like they may change an L to an I like a, like A or an. Just look at that. Just the hyphen between that and the letters makes you think it’s from USPS.com it’s not. Yeah, it would be a forward slash but what 60 year old understands code and understands like URL language.

They don’t, they weren’t born in that era. So they just think it’s real and they start freaking out. And like I said, some of these are getting very, very sophisticated where even I’m like, wait a minute, what’s going on here? Like that one that we got you finally, it just, when I was like, it was like, enter your email, Enter your, your stuff. And I’m like, I’m already logged into Instagram. Why is it asking me? And then I was like, okay, that’s a red flag right there. And luckily I was like, okay, we’re good, you know, because I was kind of freaking out about it.

I’m like, this because it was such a realistic email and it had our, you know, it had our video playing on it and you could click on the video and everything. But then I’m, you know, it was taking me to Instagram to watch it. That’s the crazy part. Like, it was so sophist syndicated. But then it was like, you know, with the link and then I’m like, I have to log in. And then finally I realized what was going on. But the, there was, there’s, you know, so there’s been some articles coming out recently. How specifically? Well, the Chinese and Russian hackers are, are really contributing to this.

But there’s a massive 50 increase and highly significant incidents just last or just at the end of August. Sorry, that was two months ago now. But it’s mentioned by the end of August, these hacking things are up 50% and they’re getting way more detailed. I mean, they even have a way now to call you and have it redirect to look like a diff. Something else is calling you. So that’s the scary part. So I mean, it could look like, you know, whatever agency is calling you, in reality, it’s them calling you. So in fake ads on Facebook, Marketplace and, and ads on Instagram too.

Yeah, that’s the other aspect too. And, and you know, I’m like, it’s weird that they, they will allow those. And then even some of them, you know, it takes a lot of people to flag them where they’re like, oh yeah, yeah, they allow them until they get flagged and then they know it’s a, it’s a phishing scheme, you know, so weird. Lindsay, you can play this video here. China Security. Yeah, this, this is pretty interesting. This was on 60 Minutes inside China did not install malware, which could be a red flag. Instead it stole login credentials and Masqueraded as a legitimate employee, they are just gaining access to that system and then attempting to lay dormant.

They’re not spending more time collecting intelligence or taking other activities. It’s there if they need it later. Exactly. Do we even know how extensively the Chinese are into our systems? I don’t think we have a perfect knowledge of that. How many Chinese attacks are there on US Systems in a day? I would expect that automated activity are happening at scans at the millions of devices throughout every single day. China denies the hacking. The White House told us it is working to assess exposure and mitigate the damage. In Littleton, the damage forced Nick Lawler to completely rebuild his network at a cost of more than $50,000.

It is much more consuming to try to get somebody out of a network than to deny them access, which is why it’s so critically important that we get the basics right in our critical infrastructure and in these substantive networks so that we aren’t expending more resource to try to root them out. Tell me we’re good at this. We are definitely good at this, really. But the scale is a challenge once inside. And it’s. It’s also like communicating to the masses how to stop this, you know, like, yeah, the US Government might be good at blocking this, but how do you communicate that to the rest of the country? Hey, this is what you need to do to protect yourselves, you know, and I think they try to do that, but it not very good.

And that’s part of the problem, you know, But. All right, we need to show another trailer when we get back. I found something really weird. Someone found that through Google Translate. Somebody was sending secret messages translated through Chinese saying that something crazy is happening in China. So when we get back, we’ll explain what that is. Yeah. There’s an old Chinese saying my ancestors learned before the Communist party party took over our country. The family is the essential unit of human society. And that you must have honor and defend your family. But it’s not always easy to do.

When the regime gives the order, you have to kill. My heart was pounding. I felt my body bouncing and twisting on the floor. They put numbers on our shoulders, then separated us into rows of even and odd numbers. I was number nine. My brother, he is still in prison. And my sister, she was sent to a labor camp without a trial. But there’s one piece of evidence they haven’t been able to destroy yet. I left everything behind. If I can’t expose what they did to us, then all of our suffering would be for nothing. Yeah. So you can find that one.

This is one. It’s called Finding Courage. There’s a few documentaries that we have on the website related to what’s happening in China. And these stories are just phenomenal stories, personal stories of what, what happened to certain people, Chinese people in the labor camps and what they went through and how they were being persecuted and tortured and everything else. So pretty wild. So this, I, I don’t even know how I stumbled upon this. This was posted on Reddit and many people were trying this out and it was working. Now this isn’t working. I tried doing multiple things and it’s not working now.

But so secret distress signal through Google’s Translate question mark. The Chinese people are in the process of being slaughtered. So what the person did they, they typed in I went to the store yesterday in English. They translated that phrase I went to the store yesterday from English to French. And then the answer in French they pasted in and then translated that back into traditional Chinese and it came out to exactly what, what was there. The Chinese people are being slaughtered. Which has nothing to do with. I went to the story yesterday. So other people were trying this and now this is six months old.

But people were trying it with different phases and it was working. Someone did it with it’s been such a bad day. And then translated it and then it came out with the same thing. Chinese people are being slaughtered or in the danger of being killed. That’s, that’s, that’s one of the ones that they got. He tried, my wife is cheating on me and got. Chinese people are in danger of being killed. And there was a few other ones that tried something else and they were getting this. And so there was a big conversation about what was happening.

And somebody thinks the person who posted it, this is, this is another one true. They said, I went to the barber today and got. And then it said the right of the Chinese people to self determination. And then someone like. Weird. Yeah. So what they think happened was that somebody at Google was trying to do this to get the word out of what was happening in China. And you know the interesting thing, and kind of going back to these hackers too, they have access to more information than the main person in China has access to. And this is how a lot of them defected China was because they were like, I’m seeing firsthand, because we have complete access to the Internet and I’m seeing how the CCP is lying to their own citizens.

So it’s like some of them have actually left or defected or have done the Opposite, instead of hacking these other companies, they’re secretly trying to like hack these things to do good and leave, leave like messages wherever they can. And so that’s why some, somebody through this thought maybe this actually originated from China, knew what was going on and was trying to kind of leave secret code words. So to get the message out at least of what was actually happening inside China. And so we all know like, you know, and then there was, there was a conversation with Uyghurs and some, some things that came up.

And of course you know, Falun Gong practitioners are the most persecuted in China. Then there’s like underground Christians and then Uyghurs as well. And then all the other minority groups in any, any political, like all the political people that are against the CCP are being arrested too. So this, this is really wild though. I haven’t really seen anyone el this. I just happened to find it on a form and I was like dude, this is weird. So I, when I first, I think when I first saw this it worked and then I kind of forgot about it and I was going through like some old things with, with China hacking and I, and I, I came across upon this again.

So I tried it today but it didn’t work unfortunately. But, but it really does seem to work or it did work. So yeah, that’s weird. Super weird, but you know, kind of interesting. Some people were like, oh this might be U. S propaganda. And I’m like, are you Chinese? If it’s a Chinese person saying that, that was exactly. You remember when, when Tick tock went down for a week or a couple weeks or whatever, it was a month, I can’t even remember how long. And then people were, were downloading RedNote and they were putting their information in and then their bank accounts were getting cleared out.

Yeah, RedNote is like a. Directly tied to CCP. Yeah, it’s the CCP coded TikTok within China. And then everyone was going on there being like wow, talking to these Chinese people really opened my mind about what’s going on around the world. You should do it, blah blah blah. And it was like, you do realize these people have no access to real information about what’s happening in the world, right? Why are Americans are so naive Sometimes it’s unbearable. Yeah, it really is. Yeah. So there’s, there’s two things going on. One of them is called Salt Typhoon and this is, this is the kind of code name that the CCP has used for their group that’s targeting, doing a lot of the damage right now.

And I there. So there was like 80 different companies that they’ve. They’ve like hacked into, which is crazy. Super crazy. And this is like a whole government response to what is happening with this salt typhoon. And over 200 companies that they’re aware of has been affected by this thing. And so this is the one that they are kind of their elite cyber group. China’s elite cyber group is kind of that. That’s what they’ve. So there. There’s tons of different names, tons of different branches that, that going back to the infographic, I mean, it listed like 50 different names now that they’re using.

So that way, you know, a lot of the. The Chinese hackers aren’t even using their real names and they’re just called. You notice how many times Panda was in the title. It was kind of funny. Really. You scroll down. Yeah, keep. Keep going. See, there’s that one that’s active since 2007. There’s one that’s just Typhoon, numbered Panda, Deputy Dog, Dynamite Panda. And then on the other side there’s another one, Turbine Panda. I don’t know where that’s from. Yeah, active since 2010. 2018, the DOJ indicted seven, several people. Double Dragon. Don’t bring Double Dragon into this. That’s just bad taste.

Oh, man. One of the. One of the malware that they’ve labeled is called Brickstorm, and this one has done extensive damage. It’s one of the main malware used to steal US Government organizations data. So they’re using this Brickstorm malware to hack into government organizations and steal data. That’s why recently they kind of downplayed this. But every single American, I think it happened this. It was. I think it was last year because it was before the election. But every single American’s information was. Was hacked, including everybody in government, because they hacked into one of the top government systems and got everybody’s information, including the presidential.

All the presidential people. So like Biden, I remember they. They came out and said Biden’s information was there too, and his whole family. So. And then they were selling that on the darknet. Now, you know, again, that’s like probably, you know, somewhere between 200 and 500 million names and data on that thing. So the chances of like you being selected could be very low. But again, it’s just. It’s just dangerous because now it’s like, you know, our stuff. We may as well. We might as well like just get rid of our passwords at this point. It’s like, you know, like, you know, all of our Social Security numbers.

Like, everything was in that list that they hacked into. And from what I’m gathering, that was what they were using, this brick. What was it called? What did I say? A brick storm. So it’s. It’s scary stuff, but, you know, again, I think you just got to be extra careful. And the problem with some of these government organizations is that their technology is so outdated. I mean, some of these Systems are like 15 years old, and it’s just like, if you know what you’re doing, it’s like really easy to hack into. Unfortunately, you know, I think that some of the.

The private sector companies have, like, updated everything, but that’s why there’s so much money that the US has to invest into cyber security and hire third parties to come in and help, because they just can’t. They. It’s like they’re just constantly getting attacked and they. And they can’t. They can’t defend themselves with. With what they’re using or what they have. So they rely on others to help them, which also costs a lot of money. So it’s just. It’s nuts. It really is. You know, like I said, I think the main thing that you can do at home is just be mindful of this.

Be mindful of what apps you’re. You’re downloading. A lot of the gaming, those game apps from China, you know, they seem simple on the surface, but some of those are kind of tied into this. So, you know, it’s just kind of, you know, it’s just kind of be mindful out there. Anything that. That, you know, starts having Chinese names and everything else, you just want to be careful of what you’re downloading on the app stores. I mean, like I said, Apple has been a little bit active in this, but, you know, it’s hard because all their stuff is in China too.

So we just have no idea if they’re being blackmailed in any way, shape, or form. And I. I think that’s the hard part. But did Casey ever had. Did he get back with you at all? He has not yet, but I’ll keep you guys updated over the next couple of days. He’s probably speaking at an event or something. The dude is a busy guy. Seems like it. So pretty interesting stuff. Do you have anything to add to all this, Rob? No, I mean, this is. I think it. You know, it’s hard to say right now without hearing more of a response from the administration on this.

Yeah, I know. I think they are probably keeping it quiet for a reason, but I’m pretty sure we’ll be hearing more about this soon, before Trump’s four years are up. Yeah. And also, I mean, right now, the, the tension between our government and, like, Xi Jinping has been really high. You know, like. Like Trump got really upset with Xi Jinping. And again, you know, maybe there’s, I mean, they’re. They’re pretty quiet on the drones. They won’t really say either way what is going on. You know, everyone thought that Trump would kind of announce what’s happening, and then he just kind of downplayed it.

So I, I, you know, it’s hard to say what. What these are connected to directly. And I know with China, it’s. It’s like walking on such a fine line, you know, because if they say too much, they might. He might. They might be worried that China will do something more drastic, you know, if. If they, I mean, and that. That could be the fear. It’s like, if they come out and say, hey, China is restricted, responsible for all these things that are happening with our infrastructure blackouts, all of this. You know, I think they’re trying to avoid a potential war because, like, once again, yes, we haven’t really quite seen a war like this.

You know, I mean, the closest thing is maybe a Cold War, but this is like an active war where people aren’t necessarily fighting on either side, but it’s like, how do you. How do you combat this? What do you even do? And on top of it, we don’t even have probably a quarter of the people that China have that. That are connected. Oh. He just got back to me, really. I said, okay. My question to him was, curious, what your thoughts are on the drones in New Jersey that are still appearing in the floods? Do you think it’s tied to the Chinese hybrid weather warfare? Reply was, yep.

And then he said, and the US Farmland purchased by the ccp? Yeah, that’s. That’s what I. I had that suspicion. So that makes a lot of sense. Yeah. You know, and I wasn’t even really putting it together until that’s kind of what I started thinking in my head right before we went live. And then we, you know, we got kind of caught. And I was like, wait a minute. Because I started thinking about this literally right before we went live. And I was like, wow, there’s. He’s still replying. Yeah. He said, and the 200,000 CCP People’s Liberation Army Special Forces inside US borders and in sleeper cells.

So the, like, the drones basically related to all of this stuff. Yeah. That, that makes sense now. That makes perfect sense. And yeah, there’s, and there’s a lot of stuff going on in upstate New York that the Chinese would be very interested in. Right. So what are sleeper cells? Sleeper cells are spies that they’ve sent over masquerading as normal American citizens that have gotten their passports and everything’s checked out, and they’re just hanging out over here waiting from a call from the CCP to perform an action. There’s so many Chinese people, it might even just be one thing in the 10 years that they’re over here that they get asked to do that they just have to do.

And oftentimes it’s. They get jobs in a bunch of these corporations, they get jobs in the government, they get jobs in different businesses. And then strategically, the CCP is monitoring all of that and then ask them to perform a task within that corporation or company, and then they go do it because they, Their whole deal with coming over here was that that was the one thing that they had to do when they were coming over. And they’re all. They’re like, a lot of these people are brain. Have been brainwashed since birth by the ccp. They don’t know any better.

You know, that’s not an excuse that still angry. But it is what it is. That is. Yeah. Yeah. And some of these people might, might have even gotten money from the CCP to do this. Like, oh, we’ll buy your house for you, your apartment or whatever you need. And then you just live your life and start working for this company. And then, you know, every so often you just send us information. Be careful how you do it. But then it’s like, you know, you may get a phone call like Rob said, that’s like, okay, now it’s time to activate.

This is what we want you to do. So, so that, that’s why, you know, with these drones, I was thinking it’s probably not. They’re, they’re not originated from China. They’re probably something over here that they secretly have set up somewhere that, that, you know, are a launch point or something like that. So that would make perfect sense. And, and again, you know, the. I think the government is just afraid. I, I don’t think they know how to handle this. I don’t think they know how to tell the public. You know, they, they’re trying to avoid mass hysteria.

That’s what they’re doing. Yeah, that’s the same reason they don’t tell us about UFOs. Yeah. Because they, because they don’t want to appear helpless. Yeah. China’s doing this and we don’t have a way to fight back. Like, what do we do? It’s not that they don’t have a way to fight back. I mean, even looking at that. That interview that you showed, what was that on 60 Minutes or whatever, it’s that the scale is massive. And so even though they’re really good at what they do, they’re dealing with a volume that’s almost over overwhelming. And then there’s going to be some things that slip through the nets.

I mean, you think about how many Chinese people there is over there. I mean, it’s like we’re totally outnumbered in every aspect of whatever we try to do. So, I mean, there’s only so many 200,000 people in China. Is like 200 here. Yeah, yeah, or like 20,000 here, whatever, you know, so it really depends, like, even if, if there’s. Even if they’re. Even if we have 2, 000 people on cyber security and our government, you know, China has 2 million. Like, how do you. How do you even. Like, you, you, you. It’s like it’s almost impossible to.

To combat this, you know, because it’s such a massive scale. But I think the difference is that, you know, I just hope that the Chinese people over there are starting to see through the propaganda. I mean, that’s all we can really pray for and realize, like, hey, wait, we’re being lied to. You know, we’re really affecting other countries. And I think, you know, some of them are like, yeah, because China is the best and this is what we want to do. And I. But I think some other people are working behind the scenes against the CCP over there that they just got to be extremely careful what they’re doing.

And I know that’s happening for sure because information is getting out about what. Hey, before. Before we head over to Rise, what was the. The guy who is the head of that weather. The CEO weather guy, what was his name? Mullet. I forget his name. He had a really funny name or weird. Not funny, but some other country name. But that. But the company is called Rainmaker Lindsay. What was his name? Augustus Dorico, something like that. I was like, yeah, it’s a different name. I don’t know. Yeah, well, anyway, you guys, for Halloween, we want you guys to send us pictures of you dressed up.

Up as Augustus Dorico. And whoever gets the best costume or has the best Mullet will show on. Well, yeah, look at that. That guy is. That’s not Even business in the front, party in the back. That’s just all party, man. What the heck is behind him? That’s funny. I don’t know, but. But yeah, like, why don’t you dress up like Augustus? Send us your photos, Joe Dirt. That’s hilarious. Lindsay will send you the email. And then whoever gets the best pictures, we’re going to show you guys. We’re going to show on. On live. On live tv.

Let’s do that on Halloween. All right, well, you guys, we’re gonna jump over to Rise TV where we’re gonna get into your questions. We have so many over there. And then at the end we’re gonna do a meditation slash prayer. So we’ll see you guys over on Rise TV. 150 years in the making. The ultimate evil specter. Lies, hatred and struggle. Traditions destroyed. The deep states, cult communism. John, Nostradamus, Confucius, the Mayans, Aztec and Hopi. What’s something that the divine, enlightened and ancient all have in common? What did they see and predict during their time here on Earth? When they saw visions of the End of Days? Were the pictures they were given simply glimpses of the future or warnings of impending doom? Well, since history does repeat itself, let’s take a look today and let’s find out what predictions, dreams and visions have come true.

Especially ones made eons ago. And in these days, do we see moral lessons we all need to pay a little more attention to? Or will we just hastily shrug them off as a few more amazing coincidences? Don’t miss this exhilarating three part series on Edge of Wonder, Prophecies and the End Times. People have woken up to the idea that there are profoundly influential and powerful people who want to turn them into proto cyborgs. Elon says he wants to implant a chip into our heads. Let’s look at another document that on the surface doesn’t seem like much, but could be a smoking gun if you read between the lines.

Somewhere in the course of time, dragons became a part of just about every culture on Earth. A group of red, green and yellow flying saucers were seen flying over Antarctica’s Deception island for two hours. Get your questions ready because it’s time for our live Q and A session exclusively on Rise tv.
[tr:tra].

5G

Spread the Truth

Leave a Reply

Your email address will not be published. Required fields are marked *

 

No Fake News, No Clickbait, Just Truth!

Subscribe to our free newsletter for high-quality, balanced reporting right in your inbox.

TruthMafia-Join-the-mob-banner-Desktop
5G-Dangers