The government has a covert domestic operation in place that targets
people who could represent a danger to society. Children and adults
who are considered a threat are placed under surveillance with
classified surveillance technology. The surveillance period can last
weeks to months.
The surveillance technology can electronically see and hear through
walls. The government agents move into a neighboring house to the
targeted person and conduct complete surveillance of the targeted
person in his house. The targeted person never knows he is under
surveillance. No detection equipment is available to the general
public to detect when a person is under surveillance. A complete
profile of the targeted person is developed and used during the next
stage of the operation known as the Attack Stage.
During the Attack State the targeted person is attacked with
classified harassment technology designed to attack and torture people
through walls of a house or building. The goal of the Attack Stage is
to drive the targeted person out of control so he will commit a
violent act. The harassment technology leaves no physical evidence of
an attack behind so the attack can never be proven in a court of law.
Once the targeted person commits a violent act and tells a
psychiatrist he committed the violent act in response to being attack
by an enemy that he has no physical evidence of, the psychiatrist can
legally declare the targeted person mentally ill and turn the person
over to the mental health system.
The covert domestic operation has been developed to attack mentally
ill people to force them to commit violent acts and sometimes terrible
crimes that receive media attention. An example of such an operation
is a mother who claims God told her to kill her children.
Activist groups then use the tragedy to promote stronger laws against
the mentally ill. This is a covert war against the mentally ill by the
government.
The classified technology is in the hands of civilians who are abusing
the technology. The groups with access to the technology are placing
innocent civilians under surveillance and attacking people who would
never become violent.
For more information about the classified technology and harassment
groups, please refer to the website listed below.
He prays only once that the cup pass away, and then with submission; and
twice that it come if necessary.
Jesus is weary.
Jesus, seeing all His friends asleep and all His enemies wakeful, commits
Himself entirely to His Father.
Jesus does not regard in Judas his enmity, but the order of God, which He
loves and admits, since He calls him friend.
Jesus tears Himself away from His disciples to enter into His agony; we must
tear ourselves away from our nearest and dearest to imitate Him.
Jesus being in agony and in the greatest affliction, let us pray longer.
We implore the mercy of God, not that He may leave us at peace in our vices,
that He may deliver us from them.
If God gave us masters by His own hand, oh! how necessary for us to obey
them with a good heart! Necessity and events follow infallibly.
"Console thyself, thou wouldst not seek Me, if thou hadst not found Me.
"I thought of thee in Mine agony, I have sweated such drops of blood for
thee.
"It is tempting Me rather than proving thyself, to think if thou wouldst do
such and such a thing on an occasion which has not happened; I shall act in
thee if it occur.
"Let thyself