
An inspiring example of seeking to live one’s values
In this post I share a report from a long-time friend who has a unique way of working to live her values with integrity, in community.

An inspiring example of seeking to live one’s values
In this post I share a report from a long-time friend who has a unique way of working to live her values with integrity, in community.
This guy is a DOER (the kind you surround yourself with) Bill Whittle – Wikipedia and he is growing on me. Common sense 101. Please, enroll him in your team.
He spells out the recipe for fair elections, taken from STATE LAWS and STATE REGULATIONS and condenses it in 14 points here:
Continue reading “Bill Whittle: 14 Core Points for Election Integrity”
BitChute Link for Description, Embed Code, Full-Screen Viewing, & Sharing
ROBERT STEELE: This is the most significant valuable video Simon Parkes has ever done in service to all of us. I was surprised to be asked for.
Treason in America: An Overview of the FBI, CIA and Matters of ‘National Security’
When the matter of truth is depicted as a possible threat to those that govern a country, you no longer have a democratic state. True, not everything can be disclosed to the public in real time, but we are sitting on a mountain of classified intelligence material that goes back more than 60 years.
See Also:
Who’s Who in Cultural Intelligence: Cynthia Chung
Cynthia Chung: Freemasons as Secret Police & Saboteurs for Profit
Does This Mean Bad Actors Are Now Riding in 10,000 SolarWinds Powered Digital Sailboats?
I read “Hackers Breaking into Networks without SolarWinds, CISA Says.” The write up states that the Cybersecurity and Infrastructure Security Agency offered:
“Specifically, we are investigating incidents in which activity indicating abuse of Security Assertion Markup Language (SAML) tokens consistent with this adversary’s behavior is present, yet where impacted SolarWinds instances have not been identified,” according to updated guidance published Jan 6. “CISA is continuing to work to confirm initial access vectors and identify any changes to the tactics, techniques, and procedures (TTPs).”