Big Pharma Exempt From Covid Vaccine Damage Liability — HopeGirl Blog

A senior executive from AstraZeneca, Britain’s second-largest drugmaker, told Reuters that his company was just granted protection from all legal action if the company’s vaccine led to damaging side effects. Source: https://www.zerohedge.com/political/red-flags-soar-big-pharma-will-be-exempt-covid-19-vaccine-liability-claims I covered this story in a new Video you can watch here on Brighteon: “This is a unique situation where we as a company simply cannot take the risk if…

via Big Pharma Exempt From Covid Vaccine Damage Liability — HopeGirl Blog

Are you new to this information? Order the above books and get up to speed fast!

By Anna Von Reitz

Most of us were taught about the concept of “checks and balances” as the Founders applied this concept in building the Federal Government, but it is a very ancient concept, not something unique to our deliberate constructions designed to balance and counterbalance powers within various levels of our government.

One of the more ancient checks and balances principles involves the jurisdictions set up and recognized by the Roman Catholic Church in the process of setting up the Unum Sanctum (World) Trust: you can’t be in two jurisdictions at once, and as you gain power in one jurisdiction, you lose it in the others.

Strange, but true.

The jurisdiction of the land and soil is solid, therefore, most powerful and fixed. The jurisdiction of land and soil is where gold is gold, plums are plums, and men are men.  Although our Proper Names, also known as “Lawful Persons”, are not physical, they belong to us in the same way that our parents might also give us a bicycle or a chest of drawers.

The rats have tried to human traffic us off the land and soil, and do it when we were too young to ever realize what they’d done.

Guess what? That “one in a million” Colonel House talked about? 320 of us figured it out.

Many people make the mistake of calling their possessions “personal property” when in fact they mean “private property”.  This innocent mistake is then preyed upon by immoral judges and attorneys who think nothing of using this as a pretext to misidentify us, to steal our private property, and otherwise abuse us via False Legal Presumptions.
Remember that in their jurisdictions, “person” means “corporation” so when you say “personal property” you give them the excuse to presume that you are acting as a franchisee of a foreign corporation and are fair game to attack, not owed any constitutional guarantees, and not owed any protection from them.

Another example is the word “resident” or “residency”.   We are not residents of our native land and soil.  We are part of the population living on the land and soil of this country, but British Territorial and Municipal citizens of the United States are “residents” sojourning among us on a temporary basis while they provide us with what Article IV of the respective Constitutions calls “essential government services”.
The same shoe fits on the other foot in this case.  They are residents when in our jurisdiction, and we are residents when we enter their watery or airy jurisdictions as well —- so it’s necessary to figure out who is acting as a “resident” where.  Are you residing in their jurisdiction or are they residing in yours?
At every turn, intersection, and interface between the jurisdictions of air, land, and sea, we find the principles of “checks and balances” and the vocabulary of separate jurisdictions at work.  We also find specific allocations of “Powers”.

The People (Lawful Persons) have the right to charter and to liquidate corporations and franchises of corporations that are organized under their direct or delegated powers.

Through such mechanisms as Anti-Trust and Anti-Monopoly laws, the People also exercise considerable control over the way corporations are allowed to operate and structure their business affiliations, but over time, Corporatists (Colonialists in drag) have undermined their true comptrollers until the People seldom, if ever, avail themselves of Public Interest actions to “check and balance” corporations.

For example, Google, Facebook, Twitter, and other social media purveyors have been censoring free speech in America —- and using our Public Airwaves to do it.  Does anyone see a problem here?

We already have the means to shut them down, bust their management, and liquidate their assets.  It’s a matter of checks and balances.

When we stand in our proper capacity and act in our native jurisdiction we can kick every corporation you ever heard of to the curb.

Five major media conglomerates control the vast majority of all media markets in America —- and they are all: (1) foreign; (2) all making private profit off our public assets; (3) increasingly monopolized; and (4) spewing propaganda designed to undermine our health and economy.

So, we need to nationalize them, kick them out, restructure their operations, fine them and tax them and regulate them and, yes, liquidate their operations until they get a great big Attitude Adjustment.

See how they like being the targets.

A corporation is required to operate “lawfully” —- which is a far higher and different standard than to operate “legally”.   Most of these operations can’t function for a day without breaking the Public Law, and they’ve simply gotten away with it for lack of enforcement of the Public Law. 

Our two foreign federal subcontractors, both ultimately owned and operated by the Pope, have been colluding together to evade their constitutional obligations and to promote their own self-interest at the expense of their Employers.  

Because they have been operating as privately owned and operated “governmental services corporations” they’ve been conveniently neglecting to enforce the Public Law. 

Well, my, my, my….. seems like I remember something called Article IV of both The Constitution of the United States of America and The Constitution of the United States, which requires the protection of our persons and property — both public and private property.  

That doesn’t include “protecting” us from opinions that run contrary to corporate bottom lines.

That doesn’t include curtailing our Natural and Unalienable Rights.

That doesn’t give Bill Gates the right to poke anyone with needles or alter anyone’s DNA with his patented RNA implants.
It doesn’t grant Fauci any right to “mandate” dog dung, masks, social distancing or anything else.  

It doesn’t allow for any indecent commercial claims of corporate ownership of anyone or any claim of dependency based on patented nanobots or microdots or RNA scraps injected into anyone for any purpose whatsoever.   

Here we are: the long-lost American People.  

Here’s news for Billy Gates and Dr. Fauci and the AMA —– your patents belong to us and are protected by us, and if we choose to bust your patents —- we can. And we will.

And BTW, your corporations belong to us, too.   

Mr.Larry Fink and Black Water, Inc. just learned that the hard way.

Yes, there is a Giant in the room, and it’s no longer sleeping.
Try to claim that you have any ownership interest in living men and women based on injecting them with your patented RNA crap and there won’t be anything but a grease spot left of you, your patents, or your corporations, either. 

So fold up the Plandemic Crappola.  Call off the Funky Propaganda Act. We are holding every Corporate Officer and every Uniformed Officer in America personally and commercially liable for this and all your parent corporations and trustees, too.

When corporations cross the line, when they operate as monopoly interests, when they engage in interlocking trust directorates, when they engage in criminal activities, when they knowingly advertise products, ideas, and agendas that are damaging to our health and our economy, when they infringe upon our constitutional guarantees and use our Public Airwaves and Public Right of Ways and Public Easements to do it—– it’s time for the People to shut them down in the Public Interest. 

We have the “checks” and it’s time for the “balances”.

—————————-

See this article and over 2600 others on Anna’s website here: www.annavonreitz.com

To support this work look for the PayPal buttons on this website.

How do we use your donations?  Find out here.

The American States Assembly

Join Our Weekly WEBINAR

This website is based on the research of Anna Von Reitz, James Belcher, the Living Law Firm, and the team of world wide researchers who have been studying, searching and uncovering the truth for the last 40 years.

Every Monday at 5 pm Alaska – 6 pm Pacific – 7 pm Mountain –
8 pm Central- 9 pm Eastern

Please click the link below to join the webinar:
https://zoom.us/j/597600142
Or iPhone one-tap :
US: +16699006833,,597600142# or +19292056099,,597600142#
Or Telephone:
Dial(for higher quality, dial a number based on your current location):
US: +1 669 900 6833 or +1 929 205 6099
Webinar ID: 597 600 142
International numbers available: https://zoom.us/u/aezuON19iw

Submit your questions to info@theamericanstatesassembly.net  or use the Contact form below.
You can also sign up for Webinar reminders using the contact form below.  Be sure to check the box to sign up for email reminders.

 

Masks are Muzzles. UK Protests Mandatory Face Masks — HopeGirl Blog

Activists took to the streets of London a day after the UK cabinet expanded its guidelines for mandatory face coverings. The demonstration comes amid growing skepticism worldwide over the efficacy of such policies.

via Masks are Muzzles. UK Protests Mandatory Face Masks — HopeGirl Blog

There is No Data To Show Virus Second Wave. — HopeGirl Blog

Are we on the verge of a second wave of coronavirus infections? Is there a spike in infections in states that reopened first? Source: https://www.aier.org/article/what-spike-hospitalization-data-show-no-indication-of-a-second-wave/ The only way to answer that question is to watch as the data roll in. Arguably the best data to look at to see if a second wave is beginning…

via There is No Data To Show Virus Second Wave. — HopeGirl Blog

HOW COVERT AGENTS INFILTRATE THE INTERNET TO MANIPULATE, DECEIVE, AND DESTROY REPUTATIONS FULL VIDEO

In this presentation we do a full overview of how covert agents infiltrate the internet to manipulate, deceive and destroy reputations. We go over in depth a series of top secret documents that were leaked by Edward Snowden that expose the training programs for these covert agents that come from a branch of GCHQ known as the Joint Threat Research Intelligence group or JTRIG. These tactics are being used in full force all over the internet and also in controlled social manipulation operations such as protests, various forms of activism and control over main stream media propaganda.
Watch the full presentation here:
We are creating this presentation as a public service to help others understand the tactics that are being used against common people and businesses on the internet. Chances are you’ve had one or more of these tactics used on you, or you’ve been targeted by one of these covert agents.  This is deep psychological warfare at its core. While some of the information revealed in this presentation might be upsetting to you, it can also help individuals gain clarity around these twisted tactics.  This is the truth we are presenting here, and the truth can not only set you free, but can help you to restore your sanity.
This presentation is in two parts. In part one we go over the training documents and tactics of the GCHQ / JTRIG that were leaked by Edward  Snowden.   We’ve analyzed these documents and created reference points for each tactic used.
In the second part we will be using our own personal experience of being targeted by these covert agents to show real life examples of how this plays out and what this looks like. We have been heavily targeted and trolled for the last 5 years due to our line of work and we’ve been monitoring everything that has been done to us over this time. We thought that providing names and examples of the targeting tactics used against us would be one way that we could use what was intended to cause harm as a teaching mechanism to help others identify and recover from such attacks that are aimed at them through these covert programs.
Below are the notes that we used during the presentation with links to referenced articles.
CLICK HERE IF YOU WISH TO DOWNLOAD THE FULL POWERPOINT SLIDES USED IN THE VIDEO
———————————————————–
Who we are
Naima Dawn Feagin  also known by the Pen Name “HopeGirl”
Masters Degree in Business Administration
Over 10 years experience in Project Management and Government and Corporate Finance
Tivon Rivers
Engineer and Inventor
Background as a trained technician in the US Navy
Over 16 years experience working in IT
Together we are a husband and wife team and co-founders of the Fix The World Organization based out of Morocco where we have spent the last few years developing technology solutions around energy and health and wellness.  Together with my parents we have worked as a family on one particular invention which is a Tesla inspired electrical generator for off grid living. This project is what has made our whole family a target for these covert programs.
We are also co-authors of our book “Forbidden Tech”.
This book is the culmination of experiences and research in the field of technology and all the politics that go with it.  We cover a wide array of inventions in this book that are considered “disruptive” to the energy industry, but we’ve also included sections on taboo or controversial topics such as gangstalking, electronic harassment, V2K, Cointelpro, JTRIG and GCHQ, chemtrails and geoengineering, 9/11, technology such as 5G and energy weapons, just to name a few.
Click Here to check out our book Forbidden Tech https://www.forbiddentech.website
First lets start with some Definitions:
GCHQ-  Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance to the government and armed forces of the United Kingdom.[3]
JTRIG- The Joint Threat Research Intelligence Group (JTRIG) is a unit of the Government Communications Headquarters (GCHQ), the British intelligence agency.[1] The existence of JTRIG was revealed as part of the global surveillance disclosures in documents leaked by the former National Security Agency contractor Edward Snowden.[2]
Mission of JTRIG
The scope of the JTRIG’s Mission Statement includes using “dirty tricks” to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications. Known as “Effects” operations, the work of JTRIG had become a “major part” of GCHQ’s operations by 2010.
The slides we will be showing in this presentation come from several different training manual documents that were leaked by Edward Snowden. These slides come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences.   These documents were taken by Edward Snowden from the NSA and were then given to NBC News were they were first published in February 2014.
Hacktivism Definition:
In Internet activism, hacktivism or hactivism (a portmanteau of hack and activism) is the subversive use of computers and computer networks to promote a political agenda or a social change.
From Techopedia
Definition – What does Hacktivism mean?
Hacktivism is the act of hacking a website or computer network in an effort to convey a social or political message. The person who carries out the act of hacktivism is known as a hacktivist.
In contrast to a malicious hacker who hacks a computer with the intent to steal private information or cause other harm, hacktivists engage in similar forms of disruptive activities to highlight political or social causes. For the hacktivist, hacktivism is an Internet-enabled strategy to exercise civil disobedience. Acts of hacktivism may include website defacement, denial-of-service attacks (DoS), redirects, website parodies, information theft, virtual sabotage and virtual sit-ins.
Website Parodies – spoof websites
spoof website is a site that uses dishonest designs to trick users into thinking that it represents some other uninvolved party. … This term can refer to a site that is a parody or satire, although this use is less common.
Virtual sit in-
virtual sit-in is a form of electronic civil disobedience deriving its name from the sit-ins popular during the civil rights movement of the 1960s. The virtual sit-in attempts to recreate that same action digitally using a distributed denial-of-service attack (DDOS). During a virtual sit-in, hundreds of activists attempt to access a target website simultaneously and repetitively. If performed correctly, this will cause the target website to run slowly or even collapse entirely, preventing anyone from accessing it
Effects Programs
GCHQ “effects” programs are aimed at tracking targets, spreading information, and manipulating online debates and statistics
The 4 D’s Deny Disrupt Degrade Deceive
Deny- state that one refuses to admit the truth or existence of.
refuse to give (something requested or desired) to (someone).
Disrupt- interrupt (an event, activity, or process) by causing a disturbance or problem.
-drastically alter or destroy the structure of.
Degrade- treat or regard (someone) with contempt or disrespect.
break down or deteriorate
Deceive- deliberately cause (someone) to believe something that is not true, especially for personal gain
  • (of a thing) give (someone) a mistaken impression.
  • fail to admit to oneself that something is true.
Honey Trap Definition
In a “honey trap” an identified target is lured “to go somewhere on the Internet, or a physical location” to be met by “a friendly face”, with the aim to discredit them.[2] A “honey trap” is described as “very successful when it works” by the slides.[2] The disclosures also revealed the technique of “credential harvesting”, in which journalists could be used to disseminate information and identify non-British journalists who, once manipulated, could give information to the intended target of a secret campaign, perhaps providing access during an interview.[2] It is unknown whether the journalists would be aware that they were being manipulated.[2]
Credential Harvesting
The term credential harvesting also called account harvesting refers to the attacking technique or activities of grabbing legitimate user ID and even passwords to gain access to target systems for illegal or malicious purposes. Can also happen outside of a computer system.
Sock Puppet Accounts
sockpuppet is an online identity used for purposes of deception. The term, a reference to the manipulation of a simple hand puppetmade from a sock, originally referred to a false identity assumed by a member of an Internet community who spoke to, or about, themselves while pretending to be another person.
Fake victims  – blogs / posts / crisis actors
Pretending to be a victim of a target in order to disseminate false information and influence people in a negative way to act against the target.
Poison pen letter
poison pen letter is a letter or note containing unpleasant, abusive, or malicious statements or accusations about the recipient or a third party. It is usually sent anonymously. In the term “poison pen”, the word poison is used figuratively, rather than literally. Poison pen letters are usually composed and sent to upset the recipient. They differ from blackmail, which is intended to obtain something from the recipient. In contrast, poison pen letters are purely malicious.
In the United Kingdom, Section 1 of the Malicious Communications Act 1988 covers most cases of poison pen letters.[1]
Discredit a company
Leak confidential information via blogs etc.   When you don’t have access to confidential information you have to make something up. They do  this with finances all the time. Making up what they think they know about a companies finances.
Post negative information on appropriate forums – this goes one step further, and many forums have been created solely as traps to lure in businesses and innovations just to discredit them
Stop deals / ruin business relationships – talk about SEO here and how it works for when a company looks you up online by name and see’s the links that have been created using your name or your company name.
————————————–
human science
noun
  • a branch of study which deals with people or their actions, including the social sciences and the humanities, as contrasted with the natural sciences or physical sciences.
Magic theme:
Note the theme they use throughout this presentation:
Magic Definition
the power of apparently influencing events by using mysterious or supernatural forces.
Illusion
an instance of a wrong or misinterpreted perception of a sensory experience.
Conjurer definition
one that practices magic arts WIZARD
2one that performs feats of sleight of hand and illusion MAGICIAN, JUGGLER
The concepts of magic, illusion, masking, mimicking, and conjuring used throughout these slides are the same tactics used by the occult.  In part two of this presentation using real examples we will show the links between these tactics and how GCHQ is using or hiring members of the dark occult to carry out its operations.
HUMINT
Stands for Human Intelligence
definition= covert intelligence-gathering by agents or others.
Other technical intelligence gathering
Signals intelligence or SIGINT
Signals intelligence (SIGINT) is intelligence-gathering by interception of signals, whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT). Signals intelligence is a subset of intelligence collection management.
Examples of this are Menwith hill which is a part of Echelon
IMINT- imagery intelligence
Insert Reading a section out of our book here
Co-Intel Pro
Then  Gangstalking
People referenced in this:
John Mulholland (magician)
John Mulholland (9 June 1898 in Chicago, Illinois – 25 February 1970 in New York City) was an American magician, author, publisher and intelligence agent.
During the Cold War, Mulholland was paid by the CIA to write a manual on deception and misdirection. Copies of the document were believed to have been destroyed in 1973, however, copies later resurfaced and were published as “The Official CIA Manual of Trickery and Deception”.[6]
Mulholland was part of the MKUltra program
Link to his book the Official CIA Manual of Trickery and Deception
From the earliest days of MKULTRA, Dr. Sidney Gottlieb recognized that CIA’s drugs and chemicals, regardless of their ultimate purpose, would be operationally useless unless field officers and agents could covertly administer them. During the same month MKULTRA was authorized, April 1953, Gottlieb contacted John Mulholland, then fiftyfive years old and one of America’s most respected magicians. Mulholland was an expert in sleight of hand or “close-up” magic, a style of conjuring that appealed to Gottlieb because it was performed only a few feet from the audience.38 Further, sleight-of-hand illusions required no elaborate props for support. If Mulholland could deceive a suspecting audience who was studying his every move in close proximity, it should be possible to use similar tricks for secretly administering a pill or potion to an unsuspecting target. To do so, CIA field officers would need to be taught to perform their own tricks and John Mulholland, the author of several books about performing magic, appeared to be the ideal instructor.39 When approached, Mulholland soon agreed to develop a “spy manual” for Gottlieb describing “the various aspects of the magician’s art,” which might be useful in covert operations. The instructions would provide information enabling a field case officer “to develop the skills to surreptitiously place a pill or other substance in drink or food to be consumed by a target.”40 Mulholland accepted $3,000 to write the manual and the CIA approved the expense as MKULTRA Subproject Number 4 on May 4, 1953.41
Teller (magician)
Teller (born Raymond Joseph Teller; February 14, 1948) is an American magician, illusionist, writer, actor, painter, and film director. He is best known as half of the comedy magic duo Penn & Teller, along with Penn Jillette. Teller usually does not speak during performances. He is an atheistdebunkerskeptic, and a fellow of the Cato Institute (a free marketlibertarian think tank that also lists Jillette as a fellow)
Hofstede dimensions
Hindsight bias
Hindsight bias is a term used in psychology to explain the tendency of people to overestimate their ability to have predicted an outcome that could not possibly have been predicted.
Confirmation bias
Confirmation bias, also called confirmatory bias or myside bias,[Note 1] is the tendency to search for, interpret, favor, and recall information in a way that confirms one’s preexisting beliefs or hypotheses.[1] It is a type of cognitive bias and a systematic error of inductive reasoning. People display this bias when they gather or remember information selectively, or when they interpret it in a biased way. The effect is stronger for emotionally charged issues and for deeply entrenched beliefs.
Anchoring
Anchoring or focalism is a cognitive bias for an individual to rely too heavily on an initial piece of information offered (known as the “anchor”) when making decisions.
Priming
Priming is a technique whereby exposure to one stimulus influences a response to a subsequent stimulus, without conscious guidance or intention.[1][2] For example, the word NURSE is recognized more quickly following the word DOCTOR than following the word BREAD. Priming can be perceptualsemantic, or conceptual. Research, however, has yet to firmly establish the duration (a day? a week?) of priming effects, [3][4] yet their onset can be almost instantaneous. [5]
Priming works best when the two stimuli are in the same modality. For example, visual priming works best with visual cues and verbal priming works best with verbal cues. But priming also occurs between modalities,[6] or between semantically related words such as “doctor” and “nurse”.[7][8]
Self presentation in cyber context  Presenting a false projection of yourself online
Block turn fix disrupt limit delay
These are all defense mechanisms and tactics used by the military
Notes on Paid Trolls
First of all, EVERY SINGLE TROLL  YOU ENCOUNTER WILL LIE AND TELL YOU THEY ARE NOT GETTING PAID. They will also tell you THEY ARE NOT A TROLL…
You need to focus on a couple of things to evaluate the reality of this situation:
1) What amount of labor is being put into the negative comment efforts. Would a normal person do this?
2) Educate yourself about where paid trolls might get their gigs
Fiverr
Craigslist
Any kind of Freelance writing sites
There are pockets of “virtual assistant” types for hire living in countries like the Phillipines, and areas of India where trolling activities are outsourced. They all speak English and will do whatever you want for money.
4) In the American 2016 elections, it was discovered that billionaire George Soros was funding hundreds of organizations aimed at social manipulation tactics. This is just the organizations based in America. Soros’s network reaches all over the world and also has connections with GCHQ.  There is plenty of money provided by dark agenda’s to fund these tactics covertly and on a grand scale.