2/28/2026

Catherine Fitts: Epstein, CIA Black Budget, the Control Grid, and the Banks’ Role in War

 

“So the control grid is a process or an infrastructure that allows digital technology to be used to assert physical, phenomenal surveillance and control of people. … So for example, if you look at the local hardware and now people are seeing it… they’re beginning to see it snap into place.

I don’t know if you know of flock cameras, but there are many communities across the United States that are entering into contracts paid by the taxpayers to put up cameras all around their neighborhood that track license plates and keep that data and share it with a variety of people.

Or you have the FCC is trying to overrule local controls on cell towers so they can literally put cell towers every 400 to 700 ft so that they can have the kind of invasive surveillance you need or you have satellites now that can literally beam in Wi-Fi… and all those systems come put you in what I call the panopticon.”

She frames Flock cameras as the visible, on-the-ground “local hardware” piece of the bigger grid (along with dense cell towers + satellite Wi-Fi + digital IDs + programmable money). The idea is: once everything is hooked together, authorities (or whoever controls the system) can geofence areas, track movement in real time, and eventually tie it to your spending or access (“your money won’t work outside this zone”).Here’s what those Flock cameras actually look like in real life — solar-powered, pole-mounted units that scan every license plate that drives past, 24/7:



Quick, straight facts on Flock Safety (no spin)
  • Real Atlanta company, used by 4,000+ police departments, HOAs, and cities across the U.S.
  • Every passing plate is photographed, read by AI, and stored (usually 30 days, sometimes longer).
  • They create virtual geofences — you draw a box on a map and the system auto-alerts if a specific plate enters or leaves that zone. That’s the exact “geofencing / 15-minute city lockdown” tech you’ve been tracking since 2003.
  • Data is shared with other agencies and sometimes private partners.
  • Privacy groups (ACLU, EFF, etc.) have been screaming about it for years — mass surveillance of innocent people, no warrant needed, potential for abuse.
  • Pushback works: several cities have ripped them down after public outcry (exactly like you said about “delaying” it).


A former U.S. government official who managed $40 billion in federal funds says $21 trillion was quietly stolen to build a secret civilization underground. Catherine Austin Fitts isn't speculating. She watched it happen from inside. ​ She sat inside the U.S. Department of Housing and Urban Development. She saw the money move. And she says it went somewhere the public was never meant to find out about. ​ An estimated 170 underground bases. Subterranean transportation networks. Advanced energy technology. An entire parallel world funded by your tax dollars, built while you were told the budget was too tight for schools and hospitals. ​ The digital financial system being rolled out right now? Fitts says that's the control grid to manage the people left on the surface. ​ If a former Bush administration official with direct access to federal finances is saying $21 trillion vanished into a secret civilization, and the government has never once explained where it went, what does that tell you?










2/27/2026

How Epstein Hijacked Bitcoin with Aaron Day

 


From the hijacking of bitcoin to the passing of the GENIUS Act, a deep dive in the Epstein files reveals Epstein’s fingerprints are all over the transformation of the global economy and our digital currency enslavement. Aaron Day joins us today to discuss “The Hijacking of Bitcoin,” his detailed and well-documented breakdown of how and why Epstein hijacked bitcoin.








Pacific data center rezoning meeting ends abruptly after developer withdraws request

 


A special Pacific Planning and Zoning Commission meeting on a proposed $16 billion data center in Franklin County ended abruptly (0:07) when the developer, Beltline Energy, withdrew its rezoning application (0:40). This decision left many residents, who had gathered to express their concerns, frustrated and angry (0:22).

Key points from the video:

  • Abrupt Meeting End (0:33): The meeting, intended to discuss the rezoning request for land south of Pacific city limits, started and ended within minutes because Beltline Energy had not finalized a funding agreement.
  • Lack of Transparency and Public Frustration (1:13): Residents felt there had been a lack of transparency from the developer, leading to anger and distrust. They expressed concerns about environmental impact, including effects on wildlife, water supply, and endangered species like bats and salamanders (1:382:03).
  • Environmental Concerns (1:47): The Missouri Department of Conservation submitted a report to the city of Pacific detailing potential impacts of the project on fish, forest, and wildlife, requesting collaboration and technical advice to protect these resources.
  • Uncertain Future (2:41): The project's return to the city of Pacific or any other public body for a hearing is currently unknown, leaving residents waiting for the next steps.


Cabbage patch kids after the mudflood reset


2/26/2026

Epstein helping to start the Clinton Foundation, the USAID and shady NGOs connections‼️💥👿🐉

 

Since the Epstein files release and Ghislaine Maxwell's testimony about Epstein helping to start the Clinton Foundation, the USAID and shady NGOs connections to child trafficking and people like Laura Silsby, who was caught trafficking 33 children from Haiti, start to make a lot more sense. Silsby wasn't just caught once trafficking children, but twice. The Clinton's had complete control over all of the contracts for the "rebuilding effort" in Haiti. If you weren't connected to the Clintons, you didn't get a piece of the billions of dollars of USAID and NGOs taxpayer dollars, over charging for everything and pocketing the rest, where Haiti received less than 3% of the total $11 to $16 billion dollar slush fund, with a total of 6 houses built. The Clintons ended up hiring a lawyer for Silsby after she was caught trafficking children the second time. Why are the Clintons even involved? The only problem was that, Jorge Puello, Silby's lawyer, was actually a fugitive and wanted himself for the trafficking and abuse of minors, along with his wife, who were both later arrested and charged. This child trafficking ring is worldwide and connected to USAID, shady NGOs and some of the most powerful elites in the world, disguised to help children, when in reality, they're the ones trafficking the children. There are no coincidences.



Digital Dystopia: An Investigative Film on Global Digital Surveillance‼️💥👿🐉

 

This video, Digital Dystopia: An Investigative Film on Global Digital Surveillance, explores the concept of a global digital ID system and its implications for privacy, freedom, and democracy.

Here's a breakdown of the key points:

  • The Digital ID System : The film describes a future where a single digital ID stores all personal information, including purchases, app usage, locations, and links to banking, medical, employment, and government records. This system is advocated by organizations like the World Economic Forum.
  • Global Coordination and AI Integration : The rollout of this digital ID infrastructure is global and coordinated. Larry Ellison, co-founder of Oracle, emphasizes feeding immense government data into AI systems to unify and utilize data for various purposes, including improving population health.
  • Benefits and Risks of Digital ID : Digital ID systems are presented as making interactions faster, cheaper, and more reliable. However, the video highlights concerns about total control and the potential for a social credit system similar to China's, where citizens are rewarded or penalized based on their behavior.
  • China's Social Credit System as a Model : The video extensively details China's social credit system, where citizens can be blacklisted for minor infractions, losing access to loans, business opportunities, private schools, and even train tickets. Facial recognition and sensors track movements and behavior, with algorithms influencing what people can buy, where they can travel, and who they interact with.
  • Emerging Digital ID Programs in the West : The film argues that similar developments are emerging in Western countries, with digital identity programs, surveillance grids, real-time tracking, and complex databases. The UK is developing a national digital ID scheme, which critics fear could become a "digital dog tag" linking finances, medical history, travel, and social media.
  • The Global Policy Push and Agenda 2030 : There's a coordinated global push for digital IDs, deemed essential for the sustainable development agenda (Agenda 2030). The vision is for a future where everything is digitized, monitored, and managed, requiring a digital ID for daily life activities like working, renting, banking, and voting.
  • Central Bank Digital Currencies (CBDCs) : The video suggests that money could evolve into a global CBDC, eliminating cash and allowing every transaction to be tracked. CBDCs would be managed directly by central banks, giving them real-time visibility into the entire economy.
  • Crises as Opportunities for Control : The film posits that crises, like pandemics or terrorism, are used by governments to expand control. The COVID-19 pandemic accelerated the rollout of vaccination cards, which restricted access for unvaccinated individuals, demonstrating how digital systems can be used to control behavior and movements.
  • Organizations Driving Digitalization : Initiatives like ID 2020 (founded by GAVI, the vaccine alliance, and the Rockefeller Foundation) and the World Economic Forum are highlighted as influential in pushing for a digital society.
  • Biometric Data and Surveillance : Europe is collecting biometric data, making airports permanent biometric checkpoints. AI-powered surveillance cameras track faces, gestures, and movements, raising privacy concerns. The video suggests the West is building its own version of a dystopian system, moving towards a Chinese-style social credit score.
  • Digitalization of Life and Control over the Internet : More aspects of life are being digitized and centralized into databases, including health records, taxes, and travel. There's a discussion about digital ID serving as the key to accessing the internet, linking online activity to a digital ID, and even scanning private messages.
  • Public Opposition ): The video concludes by highlighting public opposition to these digital ID systems, noting that almost 3 million people in the UK have signed a petition against it.

2/25/2026

The Internet Was Weeks Away From Disaster and No One Knew

 


Let me tell you about this wild story from that Veritasium video—it's one of those things that makes you realize how fragile the whole internet really is, even though it feels so solid most days.Way back, open-source software got its start with folks like Richard Stallman setting up the Free Software Foundation in the mid-80s. The whole idea was simple and powerful: software should be free in the sense that anyone can run it, study how it works, change it, and share those changes. Then Linus Torvalds kicked off the Linux kernel in 1991, and together with the GNU tools, it became this complete, free operating system that just kept growing.
These days, Linux is everywhere. It runs supercomputers, cloud servers, phones, you name it. Most of the internet's backbone depends on it. People always say "with enough eyeballs, all bugs are shallow"—meaning the crowd of volunteers looking at the code should catch problems fast. And usually, that works pretty well.
But here's the real vulnerability: so much of this world rests on tiny projects maintained by one or two people, often volunteers burning out from the pressure, doing it for free because they believe in the mission.
Take XZ Utils, this compression tool that's baked into almost every Linux system. Lasse Collin had been maintaining it since around 2005, quietly keeping things running. He got overwhelmed, though—too much work, too little help. Then along comes this contributor named Jia Tan, offering a hand, fixing bugs, being super helpful. Over time, Jia builds trust, gets more access, and eventually takes over as the main maintainer.
What nobody knew was that Jia Tan was planting something sinister. They slipped in a backdoor, hidden cleverly inside binary test files that nobody would normally scrutinize. The goal? To target OpenSSH—the tool we all use to securely log into remote servers. It's basically the front door for keeping the internet's machines safe and managed. If that backdoor worked, anyone with the secret key could bypass authentication, get root access, and take full control of affected servers. We're talking potentially millions of systems worldwide, quietly compromised without anyone noticing.
The code was so sneaky—hidden in plain sight, using advanced tricks—that it almost made it into major distributions. But then, pure luck and sharp eyes saved the day. A Microsoft engineer named Andres Freund was testing some servers and noticed connections were running a bit slower than usual. Not a huge red flag, but enough to make him curious. He dug in, traced it back, and uncovered the whole thing. He sounded the alarm, and the community jumped in to fix it before the bad versions spread far.
Now, who was Jia Tan really? The persona had no real history before showing up, used sock puppets to push Lasse out, and pulled off this patient, multi-year operation with serious technical sophistication. Most folks in the know figure it points to a nation-state actor—someone with resources and time to play the long game. We still don't know exactly who, but it wasn't some random hacker.
The bigger takeaway hits hard: our digital world runs on the goodwill and unpaid work of dedicated people maintaining critical pieces of infrastructure. When one person burns out, the whole chain gets weak. This near-miss made everyone stop and think about how we support those volunteers better, how we watch the supply chain more closely, because one clever infiltration almost changed everything.
It's a reminder that even the strongest systems have quiet, human weak spots—and sometimes, one curious person paying attention is what keeps the lights on for the rest of us.