Reality of the Demons


“Connected to…”

Here we go again: The Firefox browser gets hijacked by Google. In desperation one must turn to the closed-source Google Chrome browser and away from the open-source Firefox browser. (Background: Google and the Messerschmitt, Ersjdamoo’s Blog, June 21, 2015.)

“Establishing secure connection…” is another of the Google Limbos. Why is Google messing with secure connections? A clue is obtained via a report from the dreaded Russia Today network. They cite the online site, The Intercept, for claims that the US National Security Agency (NSA) and the British Government Communications Headquarters (GCHQ) teamed up to subvert antivirus and security software made by the likes of Kaspersky Lab. [1] Subverting antivirus software gives NSA and other government snoops the keys to your computer. In 1999, a careless mistake by Microsoft programmers revealed that special access codes prepared by the US National Security Agency had been secretly built into Windows. [2] From that it is an easy step to tie in Google with the US National Security Agency.

Google, on the other hand, is strict about its own privacy. Messr. Schmidt, Google CEO, was one of the new invitees at the recent Bilderberg meeting in Austria. [3] There, draconian Cobras (Austrian secret police) surrounded the perimeter and enforced a Bolshevik ban against reporters. Messr. Schmidt definitely had his own privacy protected, even while not giving a rat’s hindquarters about yours.

The “Do No Evil” Google is causing alarm also due to alleged covert installation of “eavesdropping tools.” The Google Chromium browser, in contrast to the Google Chrome browser, is open-source. Chromium however “abused its position as trusted upstream to insert lines of source code that bypassed [the] audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised.” [4]

“Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.” [4]

Mentioned in passing is an alternate search engine you can switch to: They claim to be “The search engine that doesn’t track you.” DuckDuckGo “positions itself as a search engine that puts privacy first and as such it does not store IP addresses, does not log user information and uses cookies only when needed.” [5]

Sorry to bring readers the above snooping bad news. There is quite a lot of evil going around these days. “Don’t be evil” was adopted as the slogan of Google in the year 2000. [6] Then, in 2009, Messr. Schmidt amended the slogan, adding this nuance: “And it’s important, for example, that we are all subject in the United States to the Patriot Act. It is possible that information could be made available to the authorities.” [7]

Whence comes this evil, now rampaging through the United States? In 1927, when Montague Summers wrote The History of Witchcraft and Demonology, it was “a matter of common knowledge that during and since the Great War [First World War] Spiritism has increased tenfold; many who were wont to laugh at it, who refused to listen to its claims and scorned it as futile nonsense, are now [1927] among its most enthusiastic devotees.” [8]

However this Spiritism, used at multiplying séances, “opens the door to demoniac possession, so often classed as lunacy…” As far back as 1877, a Dr. L.S. Forbes Winslow had written: “Ten thousand unfortunate people are at the present time confined in lunatic asylums on account of having tampered with the supernatural.” [8]

There are two consequences of dabbling in such things as Ouija boards and séances: Obsession and Possession. Obsession is the milder form of demonic influence, yet it still causes malign discarnate entities to gain increased control over humanity. Such non-material influence however is not allowed credence by a medical science restricted to only evidence obtained by the human sensory apparatus. And so we have the tragic situation of little pills being used to combat the Prince of Lies. But these prescription medications are being overcome by the forces of evil, as seen for example in the recent case of Dylann Storm Roof in South Carolina.

The little pills are being defeated by the demons. What’s next for our national defense? Silly quibbles over symbolism?

I was wild in my youth. I say this so as to convey that I am not some “holier than thou” type of person. I certainly do not have a “hot line to God.” Who am I therefore to talk about divine things? This is the dilemma within me, that I am a sinner yet perceive the Almighty as our last hope in these sad times. Whatever your religion, Muslim, Jew or Christian – or even Atheist, I do not seek to convert you. My only wish is for you to realize there are forces we cannot see which yet do exist.

——- Sources ——-
[1] “NSA, GCHQ targeted Kaspersky, other cybersecurity companies – Snowden docs”, Russia Today, June 23, 2015.
[2] “Messerschmitt Attack of the Googleapis”, Ersjdamoo’s Blog, June 20, 2015.
[3] “Google joins Bilderberg cabal”, World Net Daily, May 17, 2015.
[4] “Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth”, by Rick Falkvinge. Privacy Online News, June 18, 2015.
[5] “DuckDuckGo”, Wikipedia, June 20, 2015.
[6] “Don’t be evil”, Wikipedia, June 20, 2015.
[7] “Eric Schmidt”, Wikipedia, June 20, 2015.
[8] The History of Witchcraft and Demonology, by Montague Summers. New York: Bristol Park Books, 2010. Originally published in 1927.


About ersjdamoo

Editor of Conspiracy Nation, later renamed Melchizedek Communique. Close associate of the late Sherman H. Skolnick. Jack of all trades, master of none. Sagittarius, with Sagittarius rising. I'm not a bum, I'm a philosopher.
This entry was posted in Uncategorized and tagged , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s