Who is Really In control???

Shadowgate Documentary

Analysis by Dr. Joseph Mercola

STORY AT-A-GLANCE

  • “Shadowgate” reveals how a “shadow government” is manipulating society from behind the scenes and using psychological warfare tactics against the American public
  • Democrats and Republicans are equally guilty of covering up an even bigger scandal than the fact that Obama’s administration illegally spied on and tried to frame President Trump and others using manufactured evidence
  • The shadow government consists of government contractors and defense and intelligence officials who are stealing the personal data collected by the NSA on all Americans, and have privatized and weaponized its use
  • “Shadowgate” features two whistleblowers who have spent many years helping to develop the psychological warfare programs that are now directed at the American people and used to influence our elections
  • We can protect our freedoms, first by rejecting and abandoning companies like Google and Facebook, which are the largest data collectors and manipulators; second, by promoting and aiding in the effort to expose Big Tech’s manipulations; and third, by restructuring legislatures and the government, and establishing new civil society institutions and news media that support and promote freedom rather than censorship and control

Most people have never even heard and there’s a reason for that. Technocrats have worked in the proverbial shadows for decades, trying to implement a grand economic plan that is global in scope. To beat them, we must be just as persistent in our efforts to implement a “whole-of-society” plan of action that leads to freedom, and I firmly believe we can.

While technocracy is an economic system and not a political system in and of itself, it does require the undermining and erosion of the democratic system of governance. This is particularly true for the United States, as our Constitution is a major barrier to the implementation of technocracy.

The documentary above, “Shadowgate,” is produced and narrated by Millie Weaver, an independent journalist and contributing reporter to Infowars. Coincidentally, Weaver and her boyfriend, Gavin Wince, were arrested shortly after posting a trailer of the film online, announcing its release.1

According to Basin Report2 and News 5 Cleveland,3 Weaver and Wince were both charged with “robbery (second-degree felony), tampering with evidence (third-degree felony), obstructing justice (fifth-degree felony), and domestic violence.” According to the Portage County Sheriff’s Office, the secret indictment against Weaver and Wince was filed July 20, 2020.

‘Shadowgate’

“Shadowgate,” while banned on YouTube, is available on alternative non-censoring sites such as Bitchute and Banned.video. The film reveals how a “shadow government” is manipulating society from behind the scenes and using psychological warfare tactics against the American public.

“What if I were to tell you that a small group of government contractors were hired by government officials to frame the Trump campaign, set him up for the Russia Collusion investigation, provided witnesses for the impeachment hearings, and provided administrative support services to the Department of Justice during the Mueller investigation?

And what if it just so happened that this same group of contractors are behind the fake news in mainstream media, influence operations on social media, and the civil unrest nationwide, pushing the defund the police movement? The Obamagate scandal only scratches the surface,” Weaver says at the start of the film.4 “Talk about a cover story. What really happened is much more alarming.”

According to Weaver, both parties — Democrats and Republicans — are equally guilty of covering up an even bigger scandal than the fact that Obama’s administration illegally spied on and tried to frame President Trump and a number of other individuals using manufactured evidence.

“Shadowgate” reveals what Weaver claims is the tactical and operational role that the shadow government played behind the scenes to carry out the attempted coup.

It’s the things that spy novels and movies are made of, for sure. YouTube, which pulled the film almost as soon as it was uploaded, claims it violates the channel’s policy on hate speech. I urge you to watch it and decide for yourself whether YouTube was justified in taking it down.

According to a Spiro Skouras summary on YouTube, the film “showcases two whistleblowers who allege there is a secretive network of government contractors which consists of government and military insiders (both current and former) who have ‘back door’ access to intelligence agencies and all of the information that they collect on everyone including politicians and how this information is used to blackmail powerful people to control them.”

The film also “alleges that military psychological warfare programs are being used against the people primarily through the mainstream corporate media and social media to control the population.” As noted by Weaver, “The information presented in this video should concern people of all political affiliations.”

Who Are the Real ‘Puppet Masters’?

While many career politicians are certainly part of the so-called shadow government, the real puppet masters behind it all are people that most of us are unfamiliar with. These are the individuals Weaver focuses on in her film. The real shadow government, Weaver says, consists of government contractors and defense and intelligence officials.

But just how could a shadow government arise in the first place? According to Weaver, the reason they’ve managed to operate in the shadows and gain power for so long is because most of the actual work in government is done by subcontractors. This way, Freedom of Information Act (FOIA) requests aimed at government departments turn up very little out of the ordinary. The real “dirt” remains hidden in the archives of “contractors in clandestine networks.”

“These contractors have used their connections, power and influence to create an unprecedented international criminal enterprise,” Weaver says, “where blackmail is traded and people’s personal data is gold.”

Patrick Bergy

Whistleblower Tore’s Story

“Shadowgate” features two whistleblowers: Tore, a linguist and Navy intelligence contractor, and Patrick Bergy, a cyber security officer and Army PSYOP program developer. Tore claims to have been approached by people who worked for John O. Brennan while she was undergoing her Naval specialist training.

She was initially recruited into The Analysis Corporation’s (TAC) electronic warfare program, run by Brennan, which later morphed into information warfare. According to Tore, she worked with intelligence agencies that were privately created and run.

In other words, they were not, and are not, official parts of government. “Unlike what most people think, our intelligence doesn’t stay within our borders or within federal buildings,” she says. Tore worked on something called “localization strategy,” which involves finding a group of people (an organization, city, entire country or religious group, for example) and “getting into their mind.”

The object is to figure out how they behave, how they think, what pushes them into certain actions and so on. This information is then used to manipulate them in ways that will further your own particular product, agenda or ideology.

The collection of information on individuals goes far beyond what most people can imagine. As explained by Tore, the information is so detailed, it can be easily used to blackmail or hurt just about anyone.

As an example, if they know you have an old hockey injury, they know where to hit you in order to cause the most pain and damage, were a physical attack to be ordered against you.

They also know what you fear most, and who the people are in your social circle, and who might be best able to influence you. Tore claims she actually helped train the algorithms for the program Bergy developed, using these localization strategies.

Whistleblower Patrick Bergy’s Story

For eight years, Bergy worked for the Dynology Corporation, owned by former President Obama’s national security adviser, Gen. James Jones. Bergy worked directly under the General’s son, Jim Jones. From 2007 to 2010, Bergy’s primary focus was the development of interactive internet activity capabilities, including hacking capabilities.

He also claims to have worked on information operations, so-called “influence operations.” Like Tore, Bergy worked on intelligence operations run by private companies. ShadowNet is the commercial version of an interactive internet activities (IIA) weapon, which Bergy developed.

Fake news, false news stories and the falsified dossier used to frame the Trump campaign are all characteristic of IIA, which Bergy refers to as “social media psychological warfare.” According to Bergy, Dynology has been conducting IIA operations for the Department of Defense since 2007.

The ShadowNet program Bergy developed was based on the localization strategies that Tore worked on. As explained by Bergy, it can very effectively control large groups of people by pushing the right hot-buttons. The COVID-19 hysteria and Black Lives Matter riots are two real-world examples of what this kind of PSYOP program can accomplish, Bergy says.

Interestingly, while these kinds of psychological operations were initially conducted by individual operators or agents, much of it has since been taken over by artificial intelligence, which executes the programming based on the behavioral profile targets the programmer selects.

As noted by Bergy, with enough information about any given individual, you can predict how they will react to a given stimulus with a high degree of accuracy. So, has this technology been used to influence American elections? According to Bergy, yes.

While American tax payers paid for the development of the program, Dynology holds the intellectual property and has been using it against the American people for years, propping up certain politicians and undermining others.

How the Shadow Intelligence Apparatus Works

As explained in the film, Section 702 of the Foreign Surveillance Act allows government to spy on American citizens with a warrant from the foreign intelligence surveillance (FISA) court.

The upstream data collected by the NSA on all Americans is only stored for 72 hours before being dumped. We’re talking about all phone calls, texts, emails, social media interactions, online activity, facial and voice recognition data and much more, of all Americans.

But what’s actually happening is that this data stream is being duplicated, stored indefinitely and privatized by companies such as the Global Strategies Group, Clearforce and the Canadian Global Information (CGI) Group.

The Global Strategies Group is a hub for this information, according to Tore. So, while these companies claim to be consulting firms, they’re not actually consulting at all. They’re stealing everyone’s data and using it against us in psychological operations designed to move society in one direction or another.

Tore claims she worked for Brennan at The Analysis Corporation and the Global Strategies Group, and that she conducted what were later described as “hacks” at the request of higher-ups. According to Tore, Brennan’s modus operandi is that when he wants a piece of information about someone — or if he wants to alter data relating to a target — he simply blames it on hackers.

According to the whistleblowers featured in this film, these privatized intelligence companies helped get Barack Obama elected using sophisticated internet influence operations.

The film also reviews a variety of other scandals that have emerged, and how the truth has been spun and covered up, including the illegal “hacking” and surveillance of the U.S. Congress, which occurred while Brennan was director of the CIA.

Private Intelligence Companies Dictate the News

Have you ever wondered who creates the talking points being regurgitated across dozens if not hundreds of news outlets on a daily basis? According to Bergy, this is the work of this network of privatized intelligence companies, utilizing tools such as ShadowNet.

When asked whether IIA has been used against President Trump, Bergy replies, “Absolutely.” According to Bergy, the Steele dossier was manufactured and used as a weapon to frame Trump and remove him from office.

Tore agrees. They have been and continue to use military-grade psychological warfare tactics against the president. She also discusses the IIA strategies employed in an effort to get Hillary Clinton elected.

Backdoor Access to All Data

According to Tore, she had backdoor access to all data and has personally viewed the kind of data collected on political figures. She’s also seen how that illegal data collection is used.

If someone steps out of line, it’s used to blackmail them back into lockstep with whatever the agenda might be. And, according to Tore, deep state shadow government actors are equally spread between the two political parties of the United States.

She also claims the Cambridge Analytica scandal was an IIA operation to make it appear as though Russia helped Trump win the election. This way, the Russia collusion hoax narrative would “stick” better. In reality, the PSYOP was conducted by the privatized intelligence network.

There’s a lot to digest in this film, but I urge you to set aside the hour and a half to do so. It answers many questions, revealing how government contractors are subverting our justice and political systems to further their own hidden aims. At the heart of it all is Gen. Jones.

According to Tore and Bergy, Jones, who heads up Clearforce, took ShadowNet and made it what it is today — a PSYOPs weapon used against the American people and the shadow government’s enemies.

Jones is also the chairman of the board of the Atlantic Council, and according to Bergy, one of the first things he did after being appointed chairman was to enter the Atlantic Council into a partnership with Facebook “to restore election integrity worldwide.”

In other words, Facebook is partnered with the owner of ShadowNet, one of the greatest PSYOP weapons in the world. To think this partnership will actually prevent election interference would be delusional, as its purpose is to do the complete opposite.

The Ultimate Surveillance State Is Near Completion

“More stuff is fake and fabricated now, in the news, than is actually real,” Bergy says. The reason for this is because IIA is in full force. As explained by Tore, IIA is essentially an AI program that tells you what you need to do, what message you need to put out, in order to get a specific outcome. It’s now running continuously.

Similar technology is even being used to undermine our judicial system. According to Tore and Bergy, a program will select jurors most likely to either acquit or find a defendant guilty (depending on the desired outcome).

While jury selection process is supposed to be random, it’s not. From that initial pool, jurors are then selected by the attorneys. But they were all non-randomly preselected in the first place, based on their proclivities, ways of thinking and behaving, and their belief systems. And, the data used to make that selection was siphoned from the NSA by these private intelligence companies.

“This is the biggest and boldest move toward the ultimate surveillance state ever made, and it’s near completion,” Weaver says, noting that in order to effectively micromanage the surveillance and manipulation of the global population, the technology must be integrated with AI and the Internet of Things, and that is already underway.

Part of the plan is to automate policing using robots and other technologies. According to Weaver, this may be why there’s now such a strong push to defund police departments across the U.S. This would allow the shadow government players to directly benefit by offering up new AI technologies to take over police functions.

Again, I hope you take the time to watch “Shadowgate.” Then, if you haven’t done so already, listen to my interview with Patrick Wood, featured in “The Pressing Dangers of Technocracy.” It’s really crucial for everyone to start wrapping their minds around what’s happening, and what’s in store for us if we don’t fight back and demand the restoration of privacy, both online and off.

Time to Break the IIA Programming

The good news is, there’s still time to break the IIA programming. How do we do it? First, by rejecting and abandoning the surveillance state’s primary data collection centers — Google and Facebook. Both have tremendous, hidden surveillance powers, act as censoring agencies for the technocratic cabal, and have the power to manipulate public opinion en masse.

For example, Robert Epstein, Ph.D., has demonstrated that Google has the ability to shift voting preferences among undecided voters by a whopping 48% to 63%, and the power to determine 25% of global elections. What’s more, this manipulation is entirely undetectable and untraceable. Epstein is now working to make Google’s manipulations transparent, through an organization called Feed the Watchdogs.

They have more than 13,000 watchdogs who monitor Big Tech for election bias 24/7 by collecting the ephemeral data that Google and other Big Tech companies are sending out to manipulate voters. You can help in this indispensable work by making a one-time or recurrent donation. For just $25, you can sponsor one month of data collecting.

At the time of this writing, Feed the Watchdogs had captured nearly 80,000 pages sent by Google, Facebook, YouTube and others to manipulate Americans. As their tactics become provable and more well-known, they’ll have little choice but to quit. Of course, I believe the best strategy is to ditch them all before then.

Say Goodbye to Google

Quitting Facebook is a simple enough affair. Just cancel your account. Evading Google, however, can be a bit more complicated, as their products span a wide range of products. For a comprehensive purge, be sure to eliminate all of the following:

Google Chrome browser — Uninstall Google Chrome and use Brave or Opera instead. Everything you do on Chrome is surveilled, including keystrokes and every webpage you’ve ever visited. Brave is a great alternative that takes privacy seriously.
Google search engine — Stop using Google search engines or any extension of Google, such as Bing or Yahoo, both of which draw search results from Google. Instead, use a default search engine that offers privacy, such as Presearch, Startpage, DuckDuckGo, Qwant and many others.
Gmail — Close your Gmail account and switch to a secure email service like ProtonMail. If you have children, don’t transfer their student Google account into a personal account once they’re out of school.
Google Docs — Ditch Google Docs and use another alternative such as Zoho Office, Etherpad, CryptPad, OnlyOffice or Nuclino, all of which are recommended by NordVPN.5
Google apps — Delete all Google apps from your phone and purge Google hardware. Better yet, get a de-Googled phone. Several companies now offer them, including Above Phone.
Avoid websites that use Google Analytics — To do that, you’ll need to check the website’s privacy policy and search for “Google.” Websites are required to disclose if they use a third-party surveillance tool. If they use Google Analytics, ask them to switch!
Google Home — Don’t use Google Home devices in your house or apartment. These devices record everything that occurs in your home, both speech and sounds such as brushing your teeth and boiling water, even when they appear to be inactive, and send that information back to Google. The same goes for Google’s home thermostat Nest and Amazon’s Alexa.
Android cell phones — Don’t use an Android cellphone, as it’s owned by Google.
Siri — Ditch Siri, which draws all its answers from Google.
Fitbit — Don’t use Fitbit, as it has been purchased by Google and will provide them with all your physiological information and activity levels, in addition to everything else that Google already has on you.

Additional tips to protect your privacy are included in the following graphic, such as making sure you’re using a secure messaging system and virtual private network (VPN) for your web searches.

identity protection tip google preview

Building a Whole-of-Society Solution

In addition to getting yourself (and as many of your friends and family as possible) off Google and Facebook, we also need to build a society that values freedom above all.

According to the Department of Homeland Security, misinformation online is a whole-of-society problem that requires a whole-of-society solution. By that, they mean that four types of institutions must fuse together as a seamless whole:

  1. Government institutions, which provide funding and coordination.
  2. Private sector institutions that do the censorship and dedicate funds to censorship through corporate-social responsibility programs.
  3. Civil society institutions (universities, NGOs, academia, foundations, nonprofits and activists) that do the research, the spying and collecting of data that are then given to the private sector to censor.
  4. News media/fact checking institutions, which put pressure on institutions, platforms and businesses to comply with the censorship demands.

To effectively combat the globalist technocrats’ takeover, we need to do the same. Here, an organization called Foundation for Freedom Online (FFO) comes to the rescue.

FFO educates people about this structure, and the ways in which legislatures and the government can be restructured, how civil society institutions can be established, and how news media can be created to support and promote freedom rather than censorship. To learn how you can be part of the solution, check out foundationforfreedomonline.com.

I firmly believe that we can turn this situation around, if for no other reason than the fact that there are some eight billion of us who want freedom, while those who seek to enslave us number in the thousands, or tens of thousands at the most. Either way, they’re clearly outnumbered.

But we need to spread the word, and help our friends and family understand how important our decisions are. We either support the network that seeks to take our freedom, or the network that seeks to protect it.

The Power of Choice

Lastly, I encourage you to seek Joy. At the end of the day, that’s what life is all about. It’s all too easy to fall into the trap of feeling like the sky is falling. What we’re facing is serious, yes. But we can overcome it. And, I believe that Joy-seeking may be a crucial component to winning.

Why? Because when you focus on what brings you Joy, everything else falls into place. New ideas arise. New solutions. And that’s precisely what we need. We need a world full of joyful, inspired people who are living their dreams, and in so doing, end up bringing new solutions to the world.

from:  https://articles.mercola.com/sites/articles/archive/2024/03/23/shadowgate-documentary.aspx?ui=f460707c057231d228aac22d51b97f2a8dcffa7b857ec065e5a5bfbcfab498ac&sd=20211017&cid_source=dnl&cid_medium=email&cid_content=art1ReadMore&cid=20240323_HL2&foDate=true&mid=DM1546761&rid=2077060809

Of Gyrocompasses, Electronic Warfare, and Pole Shifts

unknown

WHY ARE SHIPS AT SEA GOING IN CIRCLES?

June 9, 2020 By Joseph P. Farrell

Now here’s one that has my high octane speculation and suspicion meter in the red zone. It was spotted and shared by E.K., and it raises all sorts of questions, for it seems that ships at sea have been sailing in circles, and no one, apparently, knows why. Here’s the story:

A maritime mystery: What has been causing ships to sail in circles?

As the article notes, ships sailing in circles – often unbeknownst to their crews (we’ll get back to that) – has been a growing phenomenon, particularly in Chinese waters, and as the article avers, one immediate suspicion is electronic warfare and the deliberate interference and manipulation of GPS data:

Ships appearing to sail in circles have become an increasingly common and mysterious phenomenon near a number of ports on the coast of China, especially near oil terminals and government facilities – but nothing had been seen where the Willowy was.

Researchers monitoring these bizarre circles near the Chinese coast believe they are probably the result of systematic GPS manipulation designed to undermine a tracking system which all commercial ships are required to use under international law.

The circles spotted near the Chinese coast have been attributed to GPS interference, something which coincided with US sanctions on Iran, according to Phil Diacon, the chief executive of marine intelligence firm Dryad Global.

This immediately made me think of the USS Fitrzgerald and USS John McCain incidents, where two American warships, one in Japanese waters (the Fitzgerald) and the other in the busy waters around Singapore (the McCain), suffered collisions with civilian vessels, in spite of the latest in electronic detection and warfare equipment. I said then, and maintain still (and in spite of friendly efforts from ex-US Navy personnel to dissuade me), that these were not accidents, but perhaps the result of electronic warfare of some sort. I’ve even gone so far as to entertain the possibility that some sort of mind-manipulation technology may have been used not only on the crews of the American warships, but perhaps also on the crews of the civilian vessels with which they collided.

The problem with that explanation here is that the latest episodes occur far from waters in which China would be interested:

But according to a global analysis of this data by environmental groups SkyTruth and Global Fishing Watch, a number of circling incidents have also occurred quite a distance away from Chinese ports, with some impossibly appearing miles inland near San Francisco.

SkyTruth found the real locations of these ships often thousands of miles away from the circular sailing tracks. The ships were again were often actually near oil terminals or in locations where GPS disruption had been reported before.

In this case, a Liberian flagged vessel began to show some unusual behavior:

At approximately 1am on Sunday morning, the Liberian-flagged crude oil tanker, operated by Singaporean business Executive Ship, suddenly swung starboard and began actually sailing in circles.

The ship was unable to steer and the crew reported that four other vessels in its vicinity were caught in a similar spiral, slowly converging on each other for an unknown reason.

There are suggestions that GPS jamming has been used by the Iranian Revolutionary Guard Corps to dupe commercial vessels into entering Iranian waters, and Chinese electronic warfare capabilities have been proposed as a potential cause for some ships appearing thousands of miles away from where they really were.

The crew aboard the Willowy were aware of these issues but none of these risks could be feasible west of Cape Town – a long way from the Strait of Hormuz or the contested South China Sea.

So what’s the explanation here? The article offers the South Atlantic magnetic anomaly and the weakening magnetic field of the Earth as a possible hypothesis:

But the European Space Agency has detected something else there.

Nobody knows why, but the Earth’s magnetic field – which has lost almost 10% of its strength over the last two centuries – is growing particularly weak in a large region stretching from Africa to South America, impacting satellites and spacecraft.

Known as the South Atlantic Anomaly, the field strength in this area has rapidly shrunk over the past 50 years just as the area itself has grown and moved westward. And over the past five years a second centre of minimum intensity has developed southwest of Africa, very near to where the Willowy was sailing.

One speculation regarding this weakening is that it is a sign that the Earth is heading for a pole reversal – in which the north and south magnetic poles flip.

This flip won’t happen immediately but instead would occur over the course of a couple of centuries during which there would be multiple north and south magnetic poles all around the globe.

The impact would be enormous for seafaring vessels whose navigation was based on magnetic compasses – causing them not only to sail in circles, but perhaps not even realise it.

Fortunately, as the crew and the company’s onshore marine superintendents knew, it has been decades since magnetic compasses governed maritime navigation.

Modern ships like the Willowy use something called a gyrocompass instead, which finds true north as determined by gravity and the axis of the Earth’s rotation rather than magnetic north.

Now, this is where it gets very interesting, especially if you’ve been following some discussions in physics for the past few decades where it has been suggested that there is a link – mysterious and unknown – between gravity and magnetism. And it’s also where the article begins to raise more questions than it answers, for we’re informed that the Willowy’s gyrocompass mysteriously malfunctioned, cause unknown:

The crew, alongside the company’s shore-based marine superintendents, investigated and identified that the ship’s primary gyrocompass was indeed malfunctioning.

The ship resumed its course safely when it switched to using the secondary gyrocompass, along with an old-fashioned magnetic compass for good measure, Executive Ship confirmed to Sky News.

Asked what caused the failure, the company described it as “an incidental breakdown” and added “repair will be done at the next port where the cause will be identified by shore technicians”.

But wait a minute, what about those four other ships involved in the incident? Indeed, the article itself asks this question in the very next paragraph:

But what about the other ships in the Willowy’s vicinity, circling and seeming as if they would converge?

A spokesperson for Executive Ship explained to Sky News: “The initial presumptive cause of circling for the Willowy was considered to be strong currents which also led the crew to perceive that other ships were circling too.”

With so many mysteries on the oceans, it must be easy to panic at sea.

And with that rather lack-luster ending and non-explanation, the whole article ends.

As the reader might have guessed, this has my high octane speculations and suspicions running in all sorts of directions, all of them in “the red zone.” For example:

What if the appearance of the South Atlantic anomaly is not entirely natural? What if it is either deliberately engineered, or, is a consequence – an unknown effect – of so many new technologies being introduced around fifty years ago, such as extremely low frequency radio broadcasting using deeply embedded antennae in the Earth, which might interfere with the planetary dynamo and hence with the magnetic field? What if such technologies and there effects were deliberately investigated in the past 50 years, such that utilizing that technology one could literally induce a pole shift, or the creation of several local north or south magnetic poles?

But as the article notes, magnetic compasses and so on should not even be a concern, since ships use gyrocompasses. So the implication is that something might be causing gyrocompasses to malfunction simultaneously and in the same area. If that is the case (and the article does not explicitly say so, I’m merely speculating that it might be), then the question is what is making that happen? Given that the article spends much time indicating that many incidents might be written off to electronic warfare and interference of some sort, I wonder if it is being suggested that interference along the lines of my speculations in the previous paragraph isn’t being suggested. But how and why?

My suspicion is that somehow the gyrocompasses are being interfered with. There might be a variety of methods to do this: introduction of subtle precessional “wobbles” in the compass, which could “move” rotational “north” to a different position. Since gyrocompasses are based on the mass and rotation of the Earth and the compass in relation to them, this would seem to imply an ability to alter local or regional conditions; think of the “masscons” beneath the Moon’s surface, anomalous concentrations of mass, which would increase the local gravitational acceleration on the lunar surface. Similar things might be being engineered – deliberately, or as an unintended consequence of other systems engineering.

In any case, I don’t know about you, but I have the suspicion, the intuition, that regardless of whether or not we’re looking at deliberate intentional (or unintentional) interference, the bottom line is we’re looking at interference of major navigation systems.

And that makes this story one to watch.

See you on the flip side…

from:    https://gizadeathstar.com/2020/06/why-are-ships-at-sea-going-in-circles/