DaniMartExtras, Too


REAL NEWS Aug 31, 2012

Posted by Xaniel777 on August 30, 2012

TODAY’S NEWS : August 31, 2012


RNC Sham, Fraud, and Treason – 2012

{XANIEL’S NOTE : If ever you needed or wanted to prove fraud within the RNC, then here it is.

The RNC has now fixed it so that the voice of the people will never be heard.

And they did in front of Millions of T.V. viewers !

Now only a handful of Rich people will decide who can be recognized as the voice

and Representative for the Republicans in Presidential Elections.

By forcibly blocking out the voices and the will of their very own people, and by way of fraud,

the RNC has committed treason to these very same people and the legal process of the voter system.


I am not a Republican or a Democrat, but I do support Ron Paul.

However, the other thing you should take notice of,

there have been no charges filed nor any arrests made and I haven’t even heard that Ron Paul or anyone else,

is requesting or even demanding an investigation into this clearly illegal and treasonous activity.

MY QUESTION : ” WHY NOT ??” }~~~Xaniel777 


Published on Aug 29, 2012 by 

The Convention is where delegates are meant to cast votes for the nominee, yet the Tampa Bay Times Forum was already plastered with embedded Romney banners, and additional ‘Mitt’ signs for people to hold were also smuggled in to make it appear that many are behind him.

All Ron Paul material was promptly confiscated.

Six states filed to put Ron Paul into nomination while the rules still said it only took five states.

Realizing this, the RNC met early Tuesday morning to change the rules in order to make the minimum needed as eight states, which Ron also would have had if the RNC had not decided to take the Ron Paul delegates away from LA and ME.

One bus of delegates on the way to the RNC was essentially kidnapped for two hours, and arrived too late to vote on the matter said the RNC.

Rather than taking proper vote counts or listening to objections, several votes were clearly not unanimous, but this didn’t stop the RNC “leaders” from ignoring the dissent.

Video surfaced just after this video published, but a link is in the video showing that the teleprompter already had pre-approved results before the public vote was taken.

Ron Paul’s name and delegate totals were not allowed to be mentioned officially on the stage, even when he won the specific state.

The Republican Party has lost all hope, and the disrespect Paul supporters received will eventually be replied with “I told you so.”

Doug Wead: Romney Threatened Ron Paul with PR A-Bomb


Published on Aug 30, 2012 by 

Ron Paul’s Senior 2012 Campaign Adviser Doug Wead gives WeAreChange an exclusive interview about the Ron Paul RNC delegate controversy, criticism of Jesse Benton, and the real reason Ron Paul didn’t attack Mitt Romney during the campaign.








10 Ways to Keep Your Power and Computers Operational When TSHTF



From the Trenches World Report

Posted on August 30, 2012 by Sheila

One of the biggest questions we get on our website, survivingsurvivalism.com, is how to begin achieving off-grid/energy independent status. 

Not everyone can afford to go out and buy a 5 kilowatt solar array and the associated batteries. 

This article is written for those of you who want to begin your road to energy independence, as well as being able to use your laptop, mobil devices, etc..

1. Switch to Linux

Linux is an operating system – the way that Windows is an operating system – usable on PCs, MAC and Android devices.

Linux’s biggest advantage, other than being free, is that it does not allow viruses to infect your system.

Any change to your system must be verified with your system password, so a virus cannot slip in.

Applications such as word processing, video editing, spreadsheet programs and just about anything you can do on a Windows system are all also free.

The goal of Linux as a community is to make software available to anyone who can use or develop it.

One if its biggest advantages is the lack of anti-distribution or pirating measures like product keys or need to activate.

As Windows operating systems require online activation, if the Internet is for any reason not available making activation impossible, you could potentially be unable to restore your hard drive without the ability to activate in 30 days.

2. Set up local communications with routers.

So, the internet is down and your modem rendered useless.

What ever you do, don’t dispose of that wireless router.

This can be an indispensable device for keeping local communication possible.

This can be done by setting up a VPN (Virtual Private Network).

The installation process of a VPN will depend on which operating system you use.

If running Linux, you can easily set up an alternate to a VPN called IPTux.

It is less secure than a VPN, but simpler.

This simple to setup piece of software works more or less plug and play.

Have your router powered up and broadcasting and have all PCs that receive your wi-fi signal run the IPTux application.

To use it, just start the program in the system hooked up to your router (does not have to be connected to the Internet) and start chatting.

This is a simple and effective way to keep in touch with a small community in a blackout scenario and can go as far as you have repeaters for.

If you are concerned about securing your communications, a VPN would be recommended.

3. Keep alternative power systems, even if you’re tied into the grid.

There’s no reason not to use solar or any other type of free energy, even if your needs are more than a simple off-grid power system can handle .

You could still have your lower wattage devices running on solar or wind or other power source and not only save on your electric bill, but be prepared to still have basic appliances working if power is unavailable.

It is always a good idea to dabble with off the grid technology.

The more you put in to it, the more prepared you are to handle potential blackouts.

4. Have at least one man-powered generator for low sun/wind days.

With the many natural forces that you can harness as clean electricity, there will still be days when mother nature needs a break.

If you want to keep your power more reliable than the forces of nature, it’s good to have a hand crank, stationary bicycle, treadmill, or anything you could use to manually spin a generator.

Something as simple as a batteryoperated drill gun can be used to generate safe, reliable, clean power.

This can be crucial.

You may have a dire need of your power and be forced to wait until more favorable weather.

You can avoid this by using a power source that runs on calories, the most simple of which is a hand crank.

A generator with a crank handle can produce power right away. The stationary bicycle can also be an excellent choice.

A treadmill however is unique because it already has a motor connected to it that can be reversed with blocking diodes.

5. Save important software and operating systems.

You can download a Linux operating system and keep it on a flashdrive for posterity.

Many contemporary Linux users will just download the software each time they restore, but you may eventually want to restore your hard drive or update your Operating System when the internet is not available.

In this case, you want to have any software, operating systems, and data files backed up.

It’s as simple as saving packs and folders to a thumb drive.

6. Become familiar with your computer’s finer components and keep spares.

Generally, you won’t have to take anything off your motherboard but, for example, you can look at your power supply.

This has one component in particular that is normally the cause of the power supply itself coming to an untimely demise … that would be a voltage regulator.

This very small, three legged piece of silicon can be replaced on a board level if you’re somewhat familiar with a soldering iron.

Notice the serial number on the regulator and make sure you have a few to spare.

Other small, easily dispensed parts are, DC input jacks, diodes, resistors, peripherals (internal and external drives, etc.), and such.

7. Chelate Your Lead Acid (6 and 12 volt) Batteries. 

NOTE: Use extreme caution when doing this…use chemical gloves and eye protection. If you are not comfortable with this process – don’t do it!  Do not try to do this with a sealed-cell battery.

This is a very simple and safe chemical process.

What you will need will be battery acid (available at auto parts stores), distiled water, a 12v power source, baking soda and a supplement available in health food stores known as EDTA.

In a nutshell, what you do is empty old the acid out of the battery and cover it with the baking soda to neutralize it.

Rinse the battery’s cell with distiled water and drain it, and again cover with baking soda.

Once you’re sure the acid is properly rinsed out of the cell, add a mixture of EDTA and distiled water.

Hook the battery up to your solar panel or other 12 volt source and allow to charge until the battery is at 12.7 to 13.4 volts.

The EDTA combined with the electrical charge will remove any minerals clinging to the lead plates.

Rinse the cells again with more distilled water and cover the rinse water with baking soda. Then add the new acid and distiled water mixture.

This will bring new life to old batteries. It is still important not to do this unnecessarily.

You may waste acid if you do this too often and you will gradually eat away more lead as you repeat this process.

8. Regularly recondition lithium batteries.

This method of restoring smaller batteries used for your portable electronic devices (e.g. laptops, cellphones, mobile devices) is simpler than it may sound. It is done entirely by tricking the software.

Turn off any of your operating system’s functions used to savebattery power and allow the battery to completely discharge.

Once you’ve done this, plug it back in and charge it, uninterrupted, until completely charged.

It is vitally important not to unnecessarily stop a charge before it’s completely done.

Your batterymay eventually lose the ability to charge up passed a certain point if it gets used to being partially charged (battery memory).

9. Did I mention back up?

Okay, I did. But this is, as I said, crucial if the Internet becomes unavailable. Always have duplicates or even triplicates if you find it absolutely necessary to have access to a particular file. Backing up is rarely punished and often rewarded.

10. Keep devices in a grounded box if you’re concerned about an EMP (Electro Magnetic Pulse).

If you’re concerned about an EMP rendering your electronics to mere plastic and silicon, maybe a shield is in order.

The design is pretty simple.

You want to place your electronics into a metal covered box (it can be a cardboard box covered with aluminum foil), lined with a non-conductive foam rubber and grounded.

This may protect your devices from damage from an unexpected “space goat fart”.

For further explanation of these tips and a host of others, look for the upcoming e-book, Off The Grid IT – The Practical Guide to keeping your power and computers operational when TSHTF.

About the Author: Jesse Gendron is co-author of Surviving Survivalism – How To Avoid Survivalism Culture Shock and co-host of the podcasts, Still Surviving.








DHS Source: “It’s going hot”



From Canada Free Press

AuthorBy  Doug Hagmann – August 29, 2012 

“It’s going hot.” Those were the ominous opening and closing words from my source inside the Department of Homeland Security in two separate contacts we had within the last 72 hours.

Readers to this website and listeners to my radio program know this source as “Rosebud,” a source with access to high levels within the DHS administration.

I would feel the same, and did so as well until the last few years.

Today, things are much different than they were four years ago, or even last year at this time.

Judi McLeod, award-winning founder and editor of Canada Free Press and not one to succumb to delusion or fantasy, points this out and provides a solid foundation for this possibility in her column published on August 27, 2012 titled “Staged crisis leading to suspended elections could happen on our watch.” 

What a difference four years can make.

Readers of this website and listeners to my radio program are familiar with this DHS insider from previous leaks detailing alleged plans by members of the Obama administration to keep him in power beyond the 2012 elections. 

One could argue that any person of reasonable sensibilities would certainly find this a delusional prospect and tinfoil hat conspiracy nonsense.

After all, we have a Constitution, or what’s left of it, that dictates our election process, at least for now.

As such, one might logically ask how any sane person can even entertain the prospect of not having normal elections in November.

New information from DHS sourceFor the purpose of full disclosure, I must note that what follows is a compilation of the information I obtained from my source from two separate contacts within a 72 hour period.

Both contacts have been assembled into a single “conversation” for easier reading.

None of the information has been changed or otherwise edited.

According to my well-placed source within the DHS apparatus, what amounts to a final authorization was reportedly given to DHS directly from the White House.

A “go signal” if you will.

“It’s going hot. The plan, or whatever specific operation that was devised, is going hot, being put into motion. You’ve got to let people know that something is up, approval has been given, and unless somebody stops it, we’re going to have a staged event inside the U.S., and it’s being set up so that it gets real ugly real fast.”

Obviously, I asked for clarification and more details.

“Look, I’ll tell you everything I know, what I’ve heard and seen, and some of what I’ve been told, but you’ve got to get this public.

Even then, I’m not sure we know enough about the specific operational details, have enough time, or have the ability to overcome the characterizations of lunacy they’re going to throw at you, at us, for even talking about this.

I’ve heard you talk about the ‘normalcy bias’ of most Americans, and that’s part of what we’re fighting.

Look at what they did to you and the content of last information I gave to you.

It was like that pass a secret game in first grade, you know, where one student whispers something in the ear of the kid next to him and it’s passed around the room until it gets to the last student.

By that time, it’s nothing like the original ‘secret.’ It’s the lesson kids learn about spreading gossip.

There was some state representative from Tennessee that sent out a mass e-mail of a screwed up version of what you wrote and then later retracted it,” he stated.

I reminded him that it was Tennessee State Representative Kelly Keisling who sent an e-mail to his constituents based on what amounted to third-hand information he read on the Internet.

It centered around an alleged fake assassination attempt, something I never wrote, I told him.

“Yes, that’s it. Didn’t you find the timing of that odd? I mean, the information I gave you was back in late April.

When did Keisling send that e-mail and then make his very public retraction?

Two or three weeks ago? Give me a break.

They wanted to discredit you and anyone who makes public their intentions as bad as they want to know where the leaks are coming from,” he stated. “Believe me when I tell you they are desperate on a number of levels.”

My source continued: “Don’t think for one second that the sudden resurrection of the information, as incorrect as it was by that state rep, was an accident, because it wasn’t,” he replied.

“Maybe the rep was played and clueless to the original story, but the way the story was managed after the fact made you look like a fool, like a real nutcase,” he said.

I thanked him for the reminder.

“That’s their playbook,” he emphasized. [Glenn] Beck, you on CFP, your show and others who talk about Alinksy tactics are right.

Remember, Alinsky when he wrote that ridicule is the most potent weapon, and there is no defense because it irrational and infuriating.

Trust me when I tell you that you are going to get hit hard and called crazy, this time with much greater intensity.

Expect it the closer we get to the end game. But, pay attention to who is exploiting the false rumors, and you’ll get an idea who is behind the larger agenda,” he added.

I asked my source for details. “What exactly is the plan? Can you give me specific details? How do you know about this plan ‘going hot?’”

“Okay, from what I’ve been able to learn, there have been a couple different plans or scenarios developed, ready to be implemented at a moment’s notice, but each are distinctly different in nature and timing.” stated my source.

“This is done for a few reasons. Look how the weather changed the plans for [Vice-President Joe] Biden’s visit to Tampa.

That’s just one example. They’ve got contingencies. They are watching the poll numbers.

They are closely monitoring public sentiment. But the objective of the plan is that they want to portray Obama as a victim of racist hatred by the white gun owners, the people concerned about the Constitution, the people they consider fringe.

They want to silence their critics, prove that talk show hosts are causing hatred, and that all gun owners are behind the recent shootings. That’s at the heart of the plan.

But to understand just how insidious this is, you’ve got to understand the people who are behind it.”

Nero in the White House, Caligula at the DHS

My source continued, “I’ve been trying to get as much information as possible, but it’s not been easy.

This is definitely a plan that has its origins at the highest levels of the White House, and seems limited to maybe a handful of the people closest to Obama.

The only reason I know about this authorization order, or approval, or whatever you want to call it, is that there was a major slip up at the very upper level of DHS, and I mean the very upper level” he stated.

“Remember the news about sexual harassment, intimidation and all of the garbage that’s gone on between the people Napolitano brought in and promoted due to their ‘lifestyle’ preferences?

These are some sick people, mental rapists and perverts, who she’s brought in to her innermost circle.

They make Caligula look like a boy scout, at least with power and sex.

Well, one of those people, close to Napolitano, was involved in a meeting where the concept and approval of a false flag was being discussed.”

“This is where they almost lost it. You’ve got to understand that this whole thing is very compartmentalized and we’re talking about a very small group of people in this meeting.

This person knew some of the information, not all of it, and let some information slip to a counterpart.

That counterpart, who found herself involved in a situation way over her head, talked. I won’t go any further, but that’s how I ended up learning the latest information,” said my source.

“Now you should have an idea of how this slipped out.

But they had a quick handle on damage control, given the circumstances behind the disclosure. Potentially embarrassing circumstances, sexual blackmail” he added.

I asked my source whether DHS is involved in the actual planning or staging of the event.

In response, this source stated that Janet Napolitano and her closest aides are playing a supporting role.

” She has to be involved because she has to control the response to a staged event. She’s involved to coordinate and implement the clampdown, after the fact. She does what she’s told.

From everything I’ve heard, I believe the plans come from Valerie Jarrett and possibly a close friend and Obama associate who has a very big stake in Obama’s re-election.”

“What happens and when it happens depends on the events of the next sixty days.

If it appears that Obama does not have a lock on the next four years to finish what he started, what he has been told to do, then watch for it ‘going hot.’








NATO caught sending 150 Tons of Weapons to Al-Qaeda and Terrorist Extremists in Syria!



Published on Aug 25, 2012 by 








Homeland Security’s Deadly Ammo Plan



Published on Aug 29, 2012 by 











(Fair Use Notice):

This web site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance the understanding of humanity’s problems and hopefully to help find solutions for those problems. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. A click on a hyperlink is a request for information. Consistent with this notice you are welcome to make ‘fair use’ of anything you find on this web site. However, if you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner. You can read more about ‘fair use’ and US Copyright Law at the Legal Information Institute of Cornell Law School. This notice was modified from a similar notice at Information Clearing House.} ~~~ Xaniel777



Sorry, the comment form is closed at this time.

%d bloggers like this: