As promised, this is the lengthy and complex essay on how to subvert and defeat the censorsip efforts that will always be undertaken by government and society, against all individuals who impose themselves upon the hive mind with messages of Forbidden Truth.
I want to begin with a detailed preface regarding the motivational reasons behind this essay, as well as a preview of its format. This essay is motivated by My hatred and contempt for human society and government, specifically as relates to its massive and continuous campaign to extinguish Truth from the minds of all of human consciousness, via deliberate censorship of words, ideas, ideologies, deeds, and the motivations behind deeds.
In this essay I will be mentioning the censorship attack against victim and Martyr Christopher Harper-Mercer, the Umpqua Community College mass killer, quite extensively. I want to make it clear, upfront, that I am in no way attempting to criticize or fault Christopher for his chosen attempts to communicate Truth. I honor all attempts to express and reveal Truth, recognizing that no attempt can ever be perfect, and no attempt can ever even achieve success, given the suffocating layers of censorship laid down in attack mode by society and government.
This essay is not a critique of Christopher Harper-Mercer, I am only detailing his chosen forms of communication with the outside world, to illustrate and to illuminate better tactics. My dissection of how censorship was and is being deployed against Christopher Harper-Mercer is solely intended to provide a clear and concise springboard upon which I offer valuable and brilliant tactical suggestions on how we may elevate our game plan to better retaliate against and counteract the war of censorship being waged against us.
Also, a brief but important preface regarding the title of this essay. I use the term “A guide for enemies of the state”, not to address individuals who perceive themselves as being enemies of the state, but very specifically, the individuals that society and government decree to be enemies of the state, and therefore choose to undertake an overt campaign of censorship, demonization, and voice/name/identity silencing, against.
In my last essay I specifically unleashed a mini-torrent of rage and hate against the so-called “No Notoriety” movement, which is being directly deployed by society and government as a perverse ideological rationale to increase their offensive attack of censorship and identity destruction against created victim-Martyrs. My contempt for this movement and its absurd ideological premise is immense, and I want to make it clear that part of My motivation in writing this essay, is to metaphorically spit in the face of the No Notoriety movement, and in the faces of all who are guilty of conjuring it up, promoting it, popularizing it, and making it a functional structure within the hive mind, as it now is.
From a tactical perspective, if this essay ever helps even a single individual to counter the face, voice, name, and identity erasure attack inherent within the No Notoriety movement, I will consider Myself victorious, to a limited degree of course, in the ultimately doomed war against censorship that each of us who is committed to honor Forbidden Truth and True Reality, must proactively wage.
With this preface, let us begin our direct tactical analysis on the issue of subverting and defeating social and governmental censorship. Approximately one week ago, a tortured child victim named Christopher Harper-Mercer burst upon the consciousness of humanity, by choosing to proactively undertake a Self-inspired attack intended to kill a large number of human beings. He harvested nine, and this essay will not address the operational tactics of his rampage at all, in any manner. What this essay will very comprehensively dissect, is the immense and successful censorship of name, identity, voice, message, and ideology carried out against Christopher, over the past week, in the wake of his rampage.
Let us begin our analysis: Prior to his rampage, we know that Christopher maintained profiles on social media, including MySpace.com. We know that he created and wrote on a blog, under a pseudonym. We know that he wrote a personal manifesto and gave at least some of his writings to an individual human being right in the middle of his rampage. But we also know, and must acknowledge, that in terms of preserving his identity, his voice, his ideology, and his face, Christopher did not achieve any significant degree of success. In the censorship war waged against him by society and government, society and government won. This victory did not come in the end, it came right in the beginning, and we must understand why the victory for our enemy was so easy.
Christopher was denied his Name and his Face for the first 48 hours immediately following his rampage. This censorship was carried out by the police, by law enforcement. Christopher was denied his identity and his ideology, beginning 24-36 hours after his rampage, and continuing today. This censorship was and is carried out by the media, in its selective reporting and refusal to provide information it possesses. His ideology, in words, has been wiped clean from the universe, via removal of his blog from cyberspace, via police control of his writings and texts.
None of this is Christopher’s fault, of course. He is not at fault for the perverse censorship war carried out against him by his destroyers. But we must learn from his tactical deficiencies, we must learn to fight better, to fight smarter, to counter-attack with full force, and no mercy.
Each of us has an identity, and this identity can be both developed and controlled by us, to a significant degree, unless and until four different events occur: 1: We become seriously ill. 2: We die. 3: We become a prisoner of the criminal injustice system. 4: We become a prisoner of the involuntary mental asylum committal system.
Until at least one of these four horrific injustices occurs, we possess some capacity to shape, control, and impose our identity upon the universe. This is done via the Names we choose to use, how we connect our Names, and how we display our Names.
Similarly, we possess and control our Voice, to a relative degree, for as long as none of the four destructive forces listed above, are imposed upon us.
Our ideological legacy is the voice that we carry forth within public consciousness. Charles Manson provides an excellent example of a decreed enemy of the state who has managed to do battle with social and governmental censorship, and to avoid defeat. Not to say that he has achieved victory, victory is impossible for any of us to achieve. The most we can do is maintain the battle and fight the war.
Not dying helps a lot, in fighting the censorship war. But it is not a key component. The key component is recognizing and implementing Superior tactics, before you become ill, dead, or locked up inside of a physical cage by your enemy. Such tactics are lacking in an objective analysis of Christopher Harper-Mercer’s life path actions.
Let us consider: What if Christopher had openly identified himself by name, via a mass e-mailing, 30 seconds before undertaking his rampage?? E-mail programs easily allow for a mass emailing, to 500, 1000, or more addresses, via a “CC” or other feature. By this one simple act, the pigs could not have successfully censored his identity for 36-48 hours. To be sure, most media would still have initially refused to publish the name. But a few fringe media sources would immediately do so, and this would force many other mainstream news sources to publish the name. The only reason the name was withheld for so long, was because a complete media blackout existed, and the pigs took advantage of this.
So, Christopher maintained a blog. But within hours of the media finally publishing the address of this blog, 48-72 hours after his rampage, the host of the blog was terrorized by the government into removing it from the internet. It no longer exists, although I and others did save the text and could, in theory, recreate the entire blog in a similar format and post it online.
But the fact is, there are many different ways to avoid blog erasure via government censorship and terrorization. Here are good suggestions:
1: Pay money to your blog host, no company that hosts a blog for free, will ever hesitate in immediately deleting it upon government advice or suggestion.
2: Choose your blog host wisely. Choose a host who has a history of respecting and honoring free speech.
3: Choose multiple blog hosts. There are hundreds of blog hosts. You can easily copy and upload your blog to hundreds of hosts, it only takes time. Just as it will take time for the pigs to locate and terrorize all of those blog hosts into removing your blog from their server.
4: Cloak your blogs until the very last moment, before you seek your cathartic vengeance. Almost all blog hosts allow you to maintain a private blog, that nobody on the internet can see, up until the time you specifically choose to make it public.
5: Make some of your blogs privately available to a select number of individuals that you feel are sympathetic to your True Reality. Most blog hosts offer this feature as well. This way, even after the pigs successfully terrorize most hosts into deleting your blog, it will remain covertly hidden, yet openly accessible and available to these select few individuals.
6: Use multiple online identities when creating your blog and posting it to different blog hosting companies. This will make it harder for the pigs to track them all down, although if the content is identical, word and phrase searches will eventually sabotage your effort.
So, these are just a few of the tactical tools that Christopher could have deployed, but apparently did not. I want to make it clear that all of these tools also work for personally created web sites, as opposed to blogs, and there are several even more highly advanced tactics that I will provide later in this essay.
Continuing, we now know that Christopher Harper-Mercer personally handed some of his writings to a potential victim, right in the middle of his rampage. An astute move? No. The odds were extremely high, almost 100%, that these writings would end up in the possession of the pigs, who would censor them to whatever degree they wished, which is exactly what has happened. Pigs censor, government censors, media censors. This is what these diseased and malicious integral hive mind structures, do. To subvert censorship, you must prevent pigs, government, and even mass media, from gaining control of your writings. You must establish, locate, and deploy independent voice outlets, independent even from the media, who can never be trusted not to censor.
By handing his writings to a potential victim, Christopher effectively removed them from the public realm, bypassing many far better tactical options. The horrific Forbidden Truth is, we will likely never see these writings in their original form, unedited. This same tragedy befell Eric Harris and Dylan Klebold, the Columbine High School mass killers, whose unedited writings and camcorder videos remain censored and have likely been permanently destroyed, 16 years after their rampage.
Clearly, upon logical analysis, there are many better methods of True Reality communication that Christopher could have chosen, instead of handing his writings to an anonymous stranger right in the middle of his rampage. Let us begin with the issue of duplication technology. As of 2015, duplication technologies have become quite common and advanced. Anything created as a unique artifact, can be duplicated en masse, quite easily. Handwritten texts, computer word processed texts, audio recorded on CD, video recorded on DVD or posted online via a digital camera recording, all of these creations can be duplicated in quantity, quite easily and without excessive financial hardship.
Duplication and distribution is a key to subverting social censorship. The more copies you make of something, and the more diversified you are in distributing them, the more difficult it is for the hive mind to successfully censor. Why? Because all you have to do is find one sympathetic contact, or even a purely selfish contact who wants to sell you out for money, and he or she can deliver your content into cyberspace in such a way that it attains and maintains a life of its own, beyond the capacity of censors to fully extinguish.
A good illustration of this is My essay, “Handy Hints for Messier Massacres”. I wrote this in 1989, 26 years ago. I published it in my own print magazine, with a 400 copy xerox run. I have never posted it online. Never. Yet today it exists online, reproduced by others, because of the fact that my initial distribution of the text, 26 years ago, was varied and voluminous enough.
Now, let us consider the book. Yes, an actual and complete book, copyrighted and complete with ISBN number. Today, it is easy for anyone to self-publish an entire book of their writings, drawings, etc… It is easy and cheap, requiring only time. Resources such as CreateSpace allow you to fully control the entire process, from e-book only, to complete hardcover book, printed anywhere from a single copy, to many thousands of copies. Distribution is completely under your control, you can keep your book out of all bookstores. Check out all the options, and ease of deployment:
It is much more difficult for society to censor an actual published book that exists in the public domain, complete with a copyright and an ISBN number. The self-publishing author can greatly limit distribution of his book until a specifically chosen date, essentially keeping it hidden from public view, but absolutely real and valid as a book already published and protected under specific laws that do not exist for web sites, blogs, or even print magazines. Authors can conceal their governmentally imposed identities, if they are willing to sacrifice financial profit. An added safeguard authors might consider, is editing the text of their published book, without distorting their ideological and True Reality message, so that it differs from their web site or blog text, to provide an extra layer of legal protection from governmental persecution.
I can assure you, if Christopher Harper-Mercer had written his “manifesto” as a self-published book, complete with ISBN number, and published it, the full content would still be available today, in either online or actual print format, despite the censorship efforts that government would have already undertaken, and would continue to undertake in present and future.
Less elaborate options would be for Christopher to have simply posted his manifesto to numerous websites or blogs, that he personally created and as comments or articles posted to other web sites and blogs, owned and created by others. It is much more difficult for government to shut down a web site or blog because an enemy of the state posted his writings there, than it is to shut down a web site or blog created and owned by the actual, targeted enemy of the state.
Let us not forget the good old postal system and xerox copying, a low-tech option just as useful today as it was 30 years ago. Any writing can be easily copied and sent to hundreds of different individuals and media outlets. If you choose carefully, you will find outlets and individuals who will not censor.
Audio and video duplication on a private level is much easier and more advanced today, than ever before. A tiny DVD or memory stick can contain thousands of photographs, dozens of hours of broadcast quality video footage, that can easily be recorded in private via a digital camera. Making multiple copies does involve some time, and moderate financial expense, but carries the great reward of being able to bypass the deletion of Youtube and other online accounts, a staple of hive mind censorship.
There are many more valuable methodologies to subvert censorship, and I will briefly cover a few of them now, as this blog post is already quite lengthy. One of the best and simplest options for bloggers and website creators is simply to keep content private, and schedule it to be posted online at a future date. The vast majority of higher quality blog and web site hosts offer this very useful feature. Very simply, everything you create at your site is completely private, invisible to everyone else, not searchable or findable via any search engine, until a specific date and exact time selected by you in advance. At that exact moment, chosen by you, your content is posted to the cyberspace universe, and becomes searchable online.
In order for this method of subverting censorship to work properly, you must create an account that the pigs cannot locate by searching for your name or scanning your IP address. It must be a secret account, which survives the initial government sweep of your current, existing accounts, which will be censored and deleted. The secret account will not be known, until after it goes “live”, after posting your content, on the future date and time you have chosen in advance.
It does not matter if you are dead, or locked inside of a cage, your chosen content will post online, as long as you have scheduled it properly and cloaked the existence of the account from the state. And of course you can create 10, 20, 50 different accounts, with 10, 20, 50 different blog or website hosts, using 10, 20, 50 different identities, to ensure success.
In case any of you are unaware, wordpress.com offers this feature, and it works for centuries in advance! Yes, centuries! You can write a blog post, anything you want, of any length, actually up to 100 different blog posts, and individually schedule each blog post to go public, to initialize into cyberspace, at any date and time in the future: Tomorrow, next week, next month, next year, or anytime, 100’s of years into the future! As long as wordpress.com still exists as a company, and the internet exists in its current form, your blog post remains invisible and nonexistent, until the specific date you request: October 10, 2016, October 10, 2056, October 10 2215, etc…
Another tactical tip: Many email programs allow email to be scheduled to be sent in advance. Same methodology as described above, applies. You create an email with your chosen True Reality manifesto text, you type in all 100, 500, 1000 email addresses that you wish to copy, meaning to send this same email to, simultaneously, then you schedule an exact date and time for the email to be sent. Does not matter if you are dead or in a cage or being interrogated by pigs, at that pre-chosen moment in time, your Voice will spread throughout the world. Again, for this to be effective you need to create and use a “secret” email address, not easily connected to your past online activities. Very easy to do.
Let Me go just a bit deeper into the rabbit hole, for serious warriors. Everyone should know what an IP address is. IP stands for Internet Protocol. An Internet Protocol Address is a way for your enemy to track your online activities. It is a premier weapon of active online censors. Luckily, it is not too difficult for an enemy of the state to successfully cloak his IP address, rendering his online activities much more difficult and time-consuming for the pigs to trace and to follow.
For more information on how to cloak your IP address, check:
Another very interesting and useful way to try to subvert censorship is by mirroring websites. Individuals can mirror their own websites, or the websites of others. A mirrored website is basically the creation of an exact duplicate of an existing website, but hosted on a completely different server. It has potential uses in sabotaging censorship, at least in the short term. More info on mirroring is right here:
Another highly useful way to subvert censorship is to take advantage of the media, by becoming a media agent! One of the easiet and most effective ways to do this is to become a member of an online service that issues press releases. Any individual can compose and issue press releases which have huge distribution to all media outlets. I highly recommend the PR Newswire online press release service. You can compose your own Press Release and have it distributed to 200,000 “media points”, including 19,000+ specific news media sources. There are some issues with privacy and anonymity which must be understood and weighed carefully, but in the right situation, at the right time, this type of worldwide media blast of content can totally destroy a dynamic censorship campaign.
Check out the PRNewswire website to gain insight to how it can be utilized successfully:
Yet another very useful tool in combatting censorship, is to establish working relationships with anti-censorship organizations. If you do so, and if your enemy knows you have done so, this in itself creates a fear factor for those who wish to silence your voice. The fear and the very real danger, is that in trying to silence your voice, the enemy may only succeed in amplifying your voice.
In the months before I published My online manifesto, The Manifesto of Forbidden Truth, I personally and directly reached out to dozens of anti-censorship organizations all across the world. I wrote personal emails, fully describing the content of my Manifesto, providing text samples, clearly expressing that the manifesto would call for the elimination of all governments, the elimination of religion, the elimination of parenthood, the elimination of punishment and of judicial law, etc… I received many personal responses, expressing interest in viewing the full manifesto and promising to protect the right of the manifesto to be published and to remain accessible to viewers/readers.
I incorporated these actions into the manifesto, via an explicit statement advising all readers that any censorship attempt would be met with the strongest of responses. Specifically, I revealed, begin quote:
“I have established contact with and in some cases formed working relationships with, dozens of the world’s top anti-censorship and free speech promoting/defending groups and organizations. These groups include:
The Freedom Forum
The Electronic Frontier Foundation
The Internet Free Expression Alliance
The Free Expression Network
The National Coalition Against Censorship
The First Amendment Cyber-Tribune
PEN American Center
The International Freedom of Expression Exchange
The Global Internet Liberty Campaign
The Reporters Committee for Freedom of the Press
The Center for Democracy and Technology
Index For Free Expression
So please take note, you impotent, truth-hating creatures: If you should somehow succeed in getting a Host to remove this website, not only will it be completely restored within hours, but in addition, all of the above free speech organizations will be notified, they will investigate and report on the act of perverse censorship, perhaps they will even notify larger media organizations, the end result being that countless thousands, perhaps even millions of new and additional humans, who otherwise would never have known about this website, will be made aware of this site, will flock to this site, and will be shocked, amazed, and enlightened, by this remarkable Forbidden Truth Manifesto.
This is a classic case of a “win-win” situation for me, the brilliant, untouchable Seer of Forbidden Truth, and a “lose-lose” situation for you, the terrified, impotent would-be censor. So, as Aleister Crowley liked to say: ‘Do what thou wilt’. In the end, as always, I shall emerge triumphant.” End quote.
I am firmly convinced that my emphatic and proactive efforts in this regard, have played a primary role in discouraging all censorship attempts, allowing The Manifesto of Forbidden Truth to remain continuously online for 13+ years, as of the current date. I would urge those of you who wish to try to protect your online content to go a similar route. Please note, however, that a few of the above anti-censorship organizations are no longer active, and the usefulness of this methodology does decline should an individual become deceased or locked up in a cage.
Almost done, folks. But one final thought: I have provided you with a lot of very useful information on how to try to subvert government censorship, in this essay. But there are several pieces of uniquely brilliant tactical methodology, that I am not going to share with you, here or anywhere else. This is because I look out for #1, and I know that my enemy is everywhere. Informing you on how to defeat censorship, also informs My enemy on how to try to defeat My tactical methodologies for defeating censorship.
Those of you who aspire to be Superiors, should try to figure out even better tactical methodologies than I am providing for you in this essay. Because there are even better methodologies, and I know exactly what they are. But to articulate them publicly, would compromise their potential effectiveness. And so I will not do that. My only advice: Learn, think, plot, evolve, strategize, know your enemy as your enemy seeks to know you, as you aspire to reach My level of Superiority.
Here is the gut punch, after 4,200 words of brilliant tactical advice: In the end, subverting censorship will always fail in terms of your message being received, no matter how successfully and brilliantly the message is delivered. Why?? Because the strongest and most virulent form of censorship is always and will always be Self-censorship by every individual of his own mind. Truth is dead, murdered by every individual, onto himself, his own censor, his own destroyer.
All Text is Copyright © 2014-2064 The Seer of Forbidden Truth. All Rights Reserved.