This Homeless Man Will Change How You See and Treat Others

By TheRundownLive

This Homeless Man Will Change How You See and Treat Others

Cecil Iscool | Live Free Live Natural

In a video that was posted to YouTube by OckTV, a group of people attempt to demonstrate the generosity of others by asking random people on the street for food.

The video entitled ‘Asking Strangers For Food’ shows a young man approaching strangers on the street who are eating yet have enough food to share. Every person the man encounters is quick to decline the request made for part of their meal.

“Excuse me, can I have an extra slice? I’m hungry,” the man in the hooded OckTV politely asked. “Get the f*ck outta here” was the ferocious response in return by a man eating pizza.

After being rejected by everyone who was asked, the OckTV man then approached a homeless person sitting against a building and asked him for a slice of his pizza. This homeless man who had more to lose than the others kindly obliged and offered some of his food to the hungry man.

After sitting and having a slice of pizza with the homeless man, the OckTV member stood up and humbly stated, “Thank you so much. For being so generous to me, I want to give you a nice little tip.”

He then sat down a pile of cash next to the man who appeared to be down on his luck.

This video truly makes you reevaluate how we give to others and what is really important in the world.

If you ever found yourself hungry and in need would you want to be treated like a pariah or would want someone to reach out a helping hand like the homeless man in the video did?

The next time someone less fortunate than you inquires you for a little assistance, please remember this video.

We could all stand to learn a thing or two from it.

The post This Homeless Man Will Change How You See and Treat Others appeared first on Live Free, Live Natural.

Read more here:: This Homeless Man Will Change How You See and Treat Others

The post This Homeless Man Will Change How You See and Treat Others appeared first on The Rundown Live.


Canadian Man Finds Dead Mouse In His McDonald’s Coffee

By TheRundownLive

Thumbnail for 48236

Cecil Iscool | Live Free Live Natural

Ron Morais was on his morning commute into work earlier this month when he decided to make a quick stop by his local McDonalds for his daily caffeine fix. Little did the Fredericton, New Brunswick resident know, that on this morning his cup of coffee would be flavored with more than sugar and cream.

“I always take the lid off to get my last sip of coffee. And when I took the lid off, there was a little bit of a surprise in my coffee cup. It was a dead mouse,” Morais told CBC News.

Along with the dead rodent were “a few little, shall we say, presents,” according to the 57 year old Morais.

Ron’s co-workers, who were present while he guzzled down the filthy McRat flavored brew were in disbelief.

“Unless I had been there and seen Ron drink all that coffee down to the last drop, I would have been, like, ‘You’re lying,’” said Brad Patterson, a coworker of Morais.

Jennifer LaHaye, another colleague of the man who drank the crap and death enriched beverage, had this to say on her coworker’s initial reaction.

“’Oh my God, there’s a mouse in my coffee,’ is what he says. I turn around and look at him. The first time I looked, I actually looked and it’s really, he’s not joking,” LaHaye said.

“Like is he OK — and after that, I got green to the gills.”

McDonald’s Canada issued the follow statement regarding the situation,

Food safety and quality are a top priority for McDonald’s Canada and all of our restaurants are held to high industry standards. We have strict policies and procedures in place to ensure our guests receive the highest quality product when they visit our restaurants.

We take allegations involving cleanliness and sanitation very seriously. Upon learning of this situation, the local franchisee immediately began an investigation, including working closely with the local public health authority who conducted an inspection this morning following receiving a complaint. Both the local health authority and an independent inspection by a pest control company of the interior and exterior today found no evidence of any pest issues in the building.

We are continuing to investigate this isolated incident and have reached out to the customer to obtain the product sample. Until such time as we are able to collect all the necessary facts and laboratory results to conclude a full review, it would be inappropriate for us to comment further. Similarly, we would also caution against jumping to conclusions until more details are available.

Morais says that he has no current plans to sue McDonald’s but wants to make sure that this doesn’t happen to anyone else.

Despite McDonald’s almost giving him the plague among other things, Ron remains optimistic saying, “I mean, hey, you know. I’m here. And I’m in better shape than the mouse.”

And they say McDonald’s food isn’t crap.

The post Canadian Man Finds Dead Mouse In His McDonald’s Coffee appeared first on Live Free, Live Natural.

Read more here:: Canadian Man Finds Dead Mouse In His McDonald’s Coffee

The post Canadian Man Finds Dead Mouse In His McDonald’s Coffee appeared first on The Rundown Live.


The Rundown Live #365 Jamie Martin (Facebook,Brutalism,Transhumanism)

By TheRundownLive


The Rundown Live #365 Jamie Martin (Facebook,Brutalism,Transhumanism) (10/29/14)

The Rundown Live LIVE M-F 8C/9E

On this Wednesday edition of The Rundown Live, Kristan and I go over the sponsors, and the site before we are joined by our guest Jamie Martin, getting into many topics like, Facebook, brutalism, transhumanism, and much more. This one is worth checking out! Make sure you like, recommend and subscribe! Links below!

Audio Version Here




Listen to The Rundown Live today!!



Smartphone Apps:



Subscribe to “The Awakening” List here:

The post The Rundown Live #365 Jamie Martin (Facebook,Brutalism,Transhumanism) appeared first on The Rundown Live.


Mind Control Device Alters Emotions on Demand

By TheRundownLive


Kristan T. Harris | The Rundown live

braincontrolMind control has been a topic of many great suspense and science fiction movies until recent. Now, an emotion altering device that will work in conjunction with a smart phone app is now being developed by Thync, and is slated for release to the public in 2015.

Thync announced on Oct. 8 that it’s raised $13 million from financial contributors to develop technology combining neuroscience and consumer electronics.

“This is an avenue for people to call up their best stuff on demand,” says Isy Goldwasser, Thync’s chief executive officer and co-founder. “It’s a way for us to overcome our basic limitation as people. It lets us call up our focus, our calm, and creativity when we need it.”

Thnyc’s website states having ” access to the human mind opens new possibilities for a more productive life.”.

The company intends to build “wearable consumer products that use neurosignaling to shift your state of mind.”

Neurosignaling is a science that combines humans with technology and has a goal to perfect brain-computer interfaces (BCIs) in order to manipulate computer-controlled devices using the human brain.

The device uses electronic or ultrasonic waveforms to communicate with neural pathways in the brain. When specific areas are stimulated, they trigger a different emotion, state of mind or energy level.

Thync Vibes are intelligent waveforms delivered via neurosignaling. Vibes are targeted to specific neural pathways using advanced bio-materials engineered to achieve optimal results.

The Bluetooth-enabled neurosignaling device, along with the seductive, controversial proposition that customers can program their state of mind.

The developer touts the “wearable device enables you to shift your state of mind in minutes.”

“We created Thync to help people better access the power of their mind,�?said Goldwasser in a press release. “We believe that when you conquer your mind, you can conquer your day.”

Thync’s wearable won’t just measure your mood, it will fix it as described by the creator.

Would humans be better off without emotions or do the feelings we experience help our future decision making?

Imagine if you could wash the feelings of guilt away with the press of a button…


The post Mind Control Device Alters Emotions on Demand appeared first on The Rundown Live.


Waking Up Wisconsin Magazine: Volume 3

By TheRundownLive


Waking Up Wisconsin | The Rundown Live

Waking Up Wisconsin Magazine was released earlier last month and it is now available via FREE PDF! DIRECT DOWNLOAD

Waking Up Wisconsin Magazine: Volume 3, Fall 2014

Download the PDF file .

Waking Up Wisconsin Magazine: Volume 3

The post Waking Up Wisconsin Magazine: Volume 3 appeared first on The Rundown Live.


New Studies Show Sunlight Helps in Halting Obesity and Preventing Type 2 Diabetes

By TheRundownLive


LiveFreeLiveNatural | The Rundown Live

Nitrogen monoxide, or nitric oxide (NO), is a molecule that is mostly associated with combustion reactions of fossil fuels. It can also occur naturally during electrical discharges of lightning.

The human body also releases nitric oxide when the skin becomes in contact with sunlight. This is beneficial to maintain health because the release of this molecule can lower blood pressure and increase metabolism. Dr Mercola wrote this on

“Researchers have concluded sun exposure may even prolong your life by significantly cutting your heart attack/stroke risk. The abstract for the study was published online in the Journal of Investigative Dermatology on April 15, 2013.

Knowing that your risk of dying from heart disease or stroke is 80 times greater on average than from skin cancer really puts it in perspective. While higher vitamin D levels also correlate with lower rates of cardiovascular disease, oral vitamin D supplements do not appear to benefit blood pressure, and this latest study may be telling us why.”

Screen Shot 2014-10-24 at 3.03.39 PM

According to studies published on Pubmed and conducted by the University of Edinburgh, synthetic nitric oxide applications can promote similar benefits. Vitamin D can directly aid in combating and preventing obesity and type 2 diabetes. Diabetes is fueled by obesity and unhealthy lifestyle, and in 2012 this disease costs people 245 billion dollars. Diabetes is just one of many health issues associated with obesity. Dr Richard Weller, senior lecturer in dermatology at the University of Edinburgh, had this to say:

“We know sun-seekers live longer than those who spend their lives in the shade. Studies such as this are helping us to understand how the sun can be good for us. We need to remember that skin cancer is not the only disease that can kill us and should perhaps balance our advice on sun exposure.”

Image credit:

The post New Studies Show Sunlight Helps in Halting Obesity and Preventing Type 2 Diabetes appeared first on Live Free, Live Natural.

Read more here:: New Studies Show Sunlight Helps in Halting Obesity and Preventing Type 2 Diabetes

The post New Studies Show Sunlight Helps in Halting Obesity and Preventing Type 2 Diabetes appeared first on The Rundown Live.


The Rundown Live #364 N.A. Poe (Marijuana, Activism, Celebritarians)

By TheRundownLive


The Rundown Live #364 N.A. Poe (Marijuana, Activism, Celebritarians) (10/28/14)

The Rundown Live LIVE M-F 8C/9E

On this Tuesday edition of The Rundown Live, Kristan and I go over the sponsors, and the site before we are joined by our guest N.A. Poe, getting into many topics like, marijuana activism in Philly, trolls and celebritarians, keeping it real, and much more. This one is worth checking out! Make sure you like, recommend and subscribe! Links below!

Audio Version Here




Listen to The Rundown Live today!!



Smartphone Apps:



Subscribe to “The Awakening” List here:

The post The Rundown Live #364 N.A. Poe (Marijuana, Activism, Celebritarians) appeared first on The Rundown Live.


The Rundown Live #363 Judyth Baker (Cancer,David Ferrie, Oswald,World Government)

By TheRundownLive


The Rundown Live #363 Judyth Baker (Cancer,David Ferrie, Oswald,World Government) (10/27/14)

The Rundown Live LIVE M-F 8C/9E

On this Monday edition of The Rundown Live, Kristan and I go over the sponsors, and the site before we are joined by our guest Judyth Baker, getting into many topics like, cure for cancer?, David Ferrie, Lee Harvey Oswald, federal reserve, JFK, world government, police, Judyth’s books and much more. This one is worth checking out! Make sure you like, recommend and subscribe! Links below!

Audio Version Here




Listen to The Rundown Live today!!



Smartphone Apps:



Subscribe to “The Awakening” List here:

The post The Rundown Live #363 Judyth Baker (Cancer,David Ferrie, Oswald,World Government) appeared first on The Rundown Live.


Cryptography of the Cryptocracy: Of Gods and Computers

By The Rundown Live

Thumbnail for 45799

Jay Dyer | The Rundown Live

Thoth, Egyptian deity of writing.

In January of 2014, IMF Chief Christine Lagarde gave a speech that was lost on most of her audience and amongst the media. She stated:

“Now, I’m going to test your numerology skills by asking you to think about the magic seven, okay? Most of you will know that seven is quite a number in all sorts of themes, religions. And I’m sure that you can compress numbers as well. So if we think about 2014, all right, I’m just giving you 2014, you drop the zero, 14, two times 7. Okay, that’s just by way of example, and we’re going to carry on. So 2014 will be a milestone and hopefully a magic year in many respects. It will mark the hundredth anniversary of the First World War back in 1914. It will note the 70th anniversary, drop the zero, seven– of the Breton Woods conference that actually gave birth to the IMF.”

In his classic Secret Societies and Psychological Warfare, Hoffman wrote of coincidence, synchronicity and curious connections between 007 and 2001 that also relate to obscure subjects like numerology and gematria. The first 007 was Dr. John Dee, as will be investigated below, but the reason this is of import is the similarity between Christine Lagarde’s seemingly strange comments to her Press Club audience. Hoffman has recently commented on this, and I myself at the time of Lagarde’s comment speculated on the connections between the numbers of sevens that appeared in the downed Malaysian Plane incident(s). Numerous conspiracy sites and speculators got in on the action, but what no one (other than Hoffman) did was look at the motivations behind such a mindset. The natural approach of those in conspiratorial and alternative media circles would be to leap at the occult. While I don’t intend to deny such associations, I would like to highlight another element that almost none have considered. Yes, there are believers in dark forces in high places, but there is also another factor that should be kept in mind, as I myself had conversations with individuals about this that appeared a frightened by such calculating mumbo jumbo.

Simon Singh, in his recent The Code Book, explains of the process of cracking ciphers and codes as follows:

“Kerchoff’s Principle: The security of a crypto-system must not depend on keeping secret the crypto-algorithm. The security depends only on keeping secret the key. In addition to keeping the key secret, a secure cipher system must also have a wide range of potential keys.” (The Code Book, Simon Singh, pg. 12)

As researchers and analysts of the world-historical, we attempt to do just this on a much grander scale. Discovering the secrets of nature and supernature yield fulfilling mental rewards in their own right, but they also free us from the slavery to superstition. While I have attacked the Enlightenment many times over, and I think I am right in doing so for its excesses, it’s also worth considering the positive aspects of the Enlightenment, which did serve to rid the Roman dominated West of numerous bizarre superstitions and excesses that should not be excused. I doubt many of us in modernity would truly like to return to a world where we expect to almost certainly be damned, spending our days working out a complex system of penitential indulgences to try to settle debts in an absurd punishment-based system. Such is part of my reason for leaving Western Christianity years ago, but this should also not be seen as endorsement of one side of a false western dialectic of Rome versus Enlightenment. On the contrary, the truth lies somewhere in-between extremes that the cunning of history is yet to work out (as we still live under the excesses of the quantification-obsessed Enlightenment). Let us see if we can locate at least one key to cracking the code of our modern overlords and decipher the Lagardian linguistic mysteries, surveying numerology, biblical gematria and cryptography.

First, the subjects of numbers, numerology and ancient perspectives on them, are helpful. For ancient man, numbers were magical, semi-divine entities that somehow related to all things, despite being in no particular time and locale. Obviously in an article, the scope of such an analysis must be limited, so I have chosen influential representative examples. My friend James Kelley explains in his “Prajapati Purusa and Vedic Altar Construction” essay the means by which the Pythagorean Theorum was actually encoded in Vedic altar designs, much earlier than Pythagoras himself:

Simon Singh's The Code Book.

Simon Singh’s The Code Book.

“This blurb fails to mention the amazing insights of Dr. Abraham Seidenberg, who found the so-called “Pythagorean theorem” at work in the Indian texts known as the Sulvasūtras, which date from the 8th century B.C., but which crystallize procedures and teachings that reach back into the Neolithic mists. Though historians of mathematics before Seidenberg noted the connection between the famous theorem and Vedic texts, it is our contention that Dr. Seidenberg was the first to offer a coherent presentation of the significance of this influence. The Sulvasūtras contain explicit instructions for how to construct the altars for Vedic worship using only ropes, stakes, and possibly rods. But what has Vedic altar worship to do with “a² + b² = c²”?

In his seminal article “Ritual Origin of Geometry,” Seidenberg demonstrates exactly how the “Pythagorean theorem” was used in creating the falcon-shaped altar used in the Vedic fire ritual, the agnicayana. The altar was built based upon an aerial measure called a “Purusa”! The falcon altar, we are told in the sutra, must be a square with an area of 7 ½ square Purusas (about 56 ¼ square feet). A śulba, or cord, is used to measure out a “Purusa” (about 7 ½ feet, and marked on a section of the cord from an end), and this section is stretched taut between two pegs, one end of the pegged-down cord extending out past a peg, the other end being a meeting point of peg and cord-end. Next, the loose cord is stretched back and wrapped around the apposite peg. This peg-to-peg cord stretch is repeated until the desired length is reached (to achieve the “half Purusa,” the initial Purusa-length has been measured by joining both ends of the section and pulling the loop taut by hand and marking the new end with chalk or ink).

The square is created next, in a manner that we would find odd, by stretching a second cord from the midpoint of the initial 7 ½ Purusa cord, the end result being a “T” shape. Then the altar boundary parallel to the initial side is stretched, making an “H,” the final step being a simple stretching of two boundaries parallel to the central connecting cord. It is not important to trace the subsequent “unnecessary” (from our “practical” perspective) steps in creating a square that is 7 ½ Purusa by 7 ½ Purusa (we moderns would simply stretch the loose cord, once measured, to make a 7 ½ Purusa “L,” then repeat the process twice more to get a square). Instead, our attention must be focused upon what the Vedic priests did next: They believed that it was necessary to increase the area of the altar by 1 Purusa, without changing the altar’s shape!”

In this fascinating and illustrative section we have an important insight that is lost on many: the primal and archetypal rites of ancient man, in what might be considered a serious contender for the origin of the “perennial tradition” (India), we see that the rites of the gods here encode mathematical forumlae. Specifically in this case, the message is a geometrical formula, and in fact the most famous one. While one is left to speculate on his own as to the divine status of such “gods,” what can be divined from this section is the fact that the ritual encodes a mathematical form and functions as a veil for a more axiomatic principle. This seems to suggest a conscious desire to cloak abstract principles from the profane by the priestclass, keeping the secrets from the populace through religious fear.

Continuing with this survey of ancient thought, Egyptologist Wim van den Dungen analyzes the Pythagorean and Western conceptions of basic number principles and numerology. Dungen’s linked chart also demonstrates the similarity in the various religious traditions through the numerological principles. We see again the theme of hiding numerological doctrines under the divine:

“The first standard is immanent. Using the first ten cardinal numbers of N, the set of all natural numbers, the decadic set N’ {1, 2, 3, 4, 5, 6, 7, 8, 9, 10} is isolated (cf. Pythagorism based on Ancient Egyptian thought and later replicated by the Qabalah). By means of N’, all subsequent natural numbers can be derived. Each cardinal number of N’ is then coupled with a symbol one-to-one. These combinations give form to the famous neo-Platonic formula : exitus a Deo, reditus in Deum (outgoing from and return to God). This “numerology” is backed by a process in which the “exit” is an involution (a materialization of spirit) and the “return” an evolution (a spiritualization of matter). Immanence and the realms of process (becoming) prevail.

The second standard is transcendent. Transcendence is approached with negatives (radical apophatism). Three kinds emerge : unknowing itself, virtuality (the possible, or {Ø}) and nothingness (the void, or “0”). The first is a nothingness with potential, the second the non-existent (cf. Nature abhors a void). The set of all relevant criteria of measurable differences is given 10 ordinal positions defining 10 dimensions. The logic of creation (transcendence into immanence and vice versa) links with this.” (Van Den Dungen, “Tabularm Esotericum”)

Platonic forms.

Platonic forms.

In another influential example, the first century collection of documents known as the Corpus Hermeticum relates these numbers to the original creation act, echoing the same Indian, Hellenic and Egyptian principles:

“I saw in the darkness of the deep, chaotic water without form permeated with a subtle intelligent breath of divine power, Atum’s Word fell on fertile waters making them pregnant with all forms. Ordered by the harmony of the Word, the four elements came into being, combining to create the brood of living creatures the fiery element was articulated [aether] as the constellations of the stars, and the gods of the seven heavenly bodies, revolving forever in celestial circles. The Word leapt up from the elements of Nature and reunited with the mind of the Maker, leaving mere matter devoid of intelligence….

In the beginning there is unity. Unity separates into two fundamental forces, which like negative and positive poles of a battery, generate everything. Hermes describes them as Life and Light, which become Mind and Soul. We experience them as thoughts and feelings.” (The Hermetica, By; Timothy Freke and Peter Gandy, pgs. 13, 14, 35)

This tradition would continue in the Jewish and biblical tradition, as van den Dungen expounded, with Kabbalah and gematria. In Kabbalah, the first ten numbers, like in Pythagoreanism, correspond to the divine energies or attributes that shine forth from the One (or God). With this belief, ancient Jewish belief considered the very letters of the Torah to be divinely inspired and their particular forms and lexical constructs could encode secret meanings. Jewish scholar and Kabbalah expert Gershom Scholem defines gematria as follows:

Gematria (from Gr. geometria), is one of the aggadic hermeneutical rules for interpreting the Torah (in the Baraita of 32 Rules, No. 29). It consists of explaining a word of group of words according to the numerical value of the letters, or of substituting other letters of the alphabet for them in accordance with a set system. Whereas a word is normally employed in this sense of manipulating according to a numerical value, it is sometimes found with the meaning of “calculations” (Avot 3:18)….The use of letters to signify numbers was known to the Babylonians and the Greeks. The first use of gematria occurs in an inscription of Sargon II (727-707 B.C.E.) which states that the king built the wall of Khorsabad 16,283 cubits long to correspond with the numerical value of his name. The use of gematria was widespread in the literature of the magi and among interpreters of dreams in the Hellenistic world.” (Gershom Scholem, Kabbalah, pg. 337)

What is relevant to our analysis of Lagarde’s comments is that we begin to see that the learned and priest classes would naturally see the pragmatic usage of gemtaria and numerology for conveying messages in a covert fashion. Espionage and statecraft have always gone hand in hand, and the desire of rulers to send encrypted messages is an ancient art. Thus, religious traditions and languages (such as Hebrew and Greek) where letters also functioned as numbers would naturally serve as a medium for secret communications.

Given Lagarde’s comments involve a peculiar focus on sevens, it might be worthwhile to look, not just at the hermeneutical principle of gematria, but at the symbology in Scripture of the number seven. Seven serves to convey the idea of completion, finality and perfection, as the Oxford Bible Companion relates:

Number Symbolism. In common with most people in the ancient world, the Israelites attached symbolic significance to numbers. So whenever the biblical writers mention a number, it is likely that they had a symbolic meaning in mind; in many cases the numbers must not be taken in their literal sense at all….

Seven. The sum of three plus four, of heaven and of earth, signifies completeness and perfection. There were seven chief heavenly bodies (sun, moon and the five planets known to ancients), seven days of the week, seven archangels. The great festivals lasted seven days, and there were seven weeks between the Passover and the Festival of Weeks (Pentecost). Every seventh year was a Sabbath year, when the land would lie fallow, and Hebrew slaves were allowed to go free; and every fiftieth year was a jubilee, when alienated property had to be returned. The seventh day represented God’s completed work (Gen. 2:2-3), and in the Book of Revelation, the seventh seal, trumpet, bowl, etc., represent the completion of God’s plan. The seven spirits of God (Rev. 1-4) represent either the seven archangels, or “all spirits,” of the Holy Spirit. Seven churches represent the universal church (Rev. 1:20). It is necessary to forgive, not just seven times, but seventy times seven (Matt. 18:21-22, Gen. 4:24), that is to say, always.” (Oxford Guide to the Bible, pg. 562-3)

The most famous example of gematria most are familiar with is the reference in the Apocalypse to “666,” the number of the beast. Biblical scholars have long considered it a usage of gematria, where John encoded the name of Nero Caesar or another contemporary Roman Emperor. Biblical scholar Dr. Kenneth Gentry elucidates of “666”: “‘This method, called gematria, or geometrical, that is, mathematical, was used by the Jews in exegesis of the Old Testament.’ The point is clear: cryptograms were common among the ancients, even among Christians. Hence, the gematria in Revelation is not something created de novo by John; rather, the idea involved a familiar concept to the ancients.” (Before Jerusalem Fell: Dating of the Book of Revelation, pg. 196)

Another relevant association with “666” is the number squares that can be generated with that give rise to various speculations, but for the purposes of our discussion relate to the topic of magic squares. Biblical scholar E.W. Bullinger gives an example on page 286 of his Number in Scripture:


Bullinger’s number square of “666,” which gives 111 in all directions.

The number square is alleged to derive from the geometrical structure of the pattern found on the shell of a tortoise in ancient China (See “The Malekulan Journey of the Dead” by John Layard in Spiritual Disciplines: Papers From the Eranos Yearbooks). Ancient mathematicians associated the number or magic square with various planets and planetary deities and their representative angelic sigils. However, rather than fixating on the religious, it is my thesis that the number square also has a relation to cryptography and the rise of the computer. Since the square gives an ordered regularity, it was reasonable to suppose that a machine might be constructed to calculate and encode. I have written elsewhere of Leibniz’s speculations regarding a machine that would mirror the human mind, storing information and mirroring it back. The medieval mythology of the golem also factored into this equation, linking once again gematria and Kabbalah, where the matrix of external reality itself could be imaged in a 2D virtual realm, which I will touch on later. Before that, consider biblical scholar David Chilton’s arrangement of “666” in triangulation in his Days of Vengeance, page 349.
The triangulation of "666" produces a pyramid that recalls the tetraktys of Pythagoras, as well as other esoteric notions.

The triangulation of “666” produces a pyramid that recalls the tetraktys of Pythagoras, as well as other esoteric notions.

My purpose here is not to speculate as to the identity of an antichrist, but to look at how the ancient mind viewed numbers and symbols. One can see in these visual pictorals that recall Pythagoreanism the topological principles of mathematical abstraction that would be highly useful for statecraft in constructing ciphers. One of the famous ancient examples of just such a cipher is known as the scytale, used by the Greeks. Singh, in his Code Book gives an example of the syctale that resembles the tabled structure of a magic square. Given that the Greek alphabet functioned as a number system like Hebrew did, the jump from magic squares to lettered codes is not a big leap. It would therefore be natural to ancient man to encode messages in such a fashion.

When wrapped around the right size staff, the scytale revealed a hidden message.

When wrapped around the right size staff, the scytale revealed a hidden message.

At this point, it would be requisite to consider more historic examples of cryptography, its origins and usages. One of the earliest is found in Greek historian Herodotus. Herodotus describes the Greek danger presented by the invading Persian forces and the need for secret communications to help aid the cause:

“As the danger of discovery was great, there was only one way in which he could contrive to get the message through: this was by scraping the wax off a pair of wooden folding tablets, writing on the wood underneath what Xerxes intended to do, and then covering the message over with wax again. In this way the tablets, being apparently blank, would cause no trouble with the guards along the road. When the message reached its destination, no one was able to guess the secret, until, as I understand, Cleomenes’ daughter Gorgo, who was the wife of Leonides, divined and told the others that if they scraped the wax off, they would find something written on the wood underneath. This was done; the message was revealed and read, and afterwards passed on to the other Greeks.” (The Histories, Bk. V)

Likewise, in the case of Julius Caesar, we have examples of what would become known as the “Caesar Cipher,” in messages to Cicero. Suetonius recounts of this transposition process:

Caesar Salad Alphabet Soup Cipher.

Caesar Salad Alphabet Soup Cipher.

“There are also letters of his to Cicero, as well as to his intimates on private affairs, and in the latter, if he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.” (Suetonius, The Lives of the Caesars, “Caesar,” No. 56)

The substitution cipher is the oldest form of encryption, but was not immune to being cracked, and this honor fell to the Arabs in the Middle Ages, who in fact invented the practice of cryptanalysis. Singh comments: “This simplicity and strength meant that the substitution cipher dominated the art of secret writing throughout the first millennium A.D. Codemakers had evolved a system for guaranteeing secure communication, so there was no need for further development – without necessity, there was no need for further invention…..The breakthrough occurred in the East and required a brilliant combination of linguistics, statistics and religious devotion.

“Had Arabs been merely familiar with the use of monoalphabetic substitution cipher, they would not warrant a significant mention in any history of cryptography. However, in addition to employing ciphers, the Arab scholars were also capable of destroying ciphers. They in fact invented cryptanalysis, the science of unscrambling a message without knowledge of the key. While the cryptographer develops new methods of secret writing, it is the cryptanalyst who struggles to find a weakness in these methods in order to break into secret messages. Arabian cryptanalysts succeeded in finding a method for breaking the monoalphabetic substitution cipher, a cipher that had remained vulnerable for several centuries.” (Ibid., 15)

In fact, it was not merely Arabs who were interested in cracking cryptological codes, but medieval monastics and the Vatican, too, who were also skilled in the same arts. Singh explains of the medieval monks who encountered another example of Jewish encoding in the text of Jeremiah:

“Medieval monks were intrigued by the fact that the Old Testament contained deliberate and obvious examples of cryptography. For example, the Old Testament includes pieces of text encrypted with atbash, a traditional form of Hebrew substitution cipher. Atbash involves taking each letter, noting the number of places it is from the beginning of the alphabet, and replacing it with a letter that is an equal number of places from the end of the alphabet. In English this would mean that a, at the beginning of the alphabet, is replaced by Z, at the end of the alphabet, b is replaced by Y, and so on. The term atbash itself hints at the substitution it describes, because it consists of the first letter of the Hebrew alphabet, aleph, followed by the last letter taw, and then there is the second letter, beth, followed by the second to last letter shin. An example of atbash appears in Jeremiah 25: 26 and 51: 41, where “Babel” is replaced by the word “Sheshach”; the first letter of Babel is beth, the second letter of the Hebrew alphabet, and this is replaced by shin, the second-to-last letter; the second letter of Babel is also beth, and so it too is replaced by shin; and the last letter of Babel is lamed, the twelfth letter of the Hebrew alphabet, and this is replaced by kaph, the twelfth-to-last letter.” (Singh, The Code Book, pg. 26)

Renaissance Europe was awash in intrigues and subterfuges that often called forth the use of encryption. It is at this point we should shift back to the esoteric and consider Cornelius Agrippa, considered the father of western hermeticism. Agrippa was accused of being a conjurer, but was also learned in the arts described above. The Renaissance brought classical learning back into fashion and, as a result, the desire to crack hidden codes by the means of linguistics and numerology and gematria was again en vogue. In the below section Agrippa is an excellent example of the associations and connections of numerology, theology, alchemy and techne. Agrippa writes:

“God himself though he be only one in Essence, yet hath diverse names, which expound not his diverse Essences or Deities, but certain properties flowing from him, by which names he doth pour down, as it were by certain Conduits on us and all his creatures many benefits and diverse gifts; ten of these Names we have above described, which also Hierom reckoneth up to Marcella. Dionysius reckoneth up forty five names of God and Christ. The Mecubales of the Hebrews from a certain text of Exodus, derive seventy-two names, both of the Angels and of God, which they call the name of seventy two letters, and Schemhamphores, that is, the expository; but others proceeding further, out of all places of the Scripture do infer so many names of God as the number of those names is: but what they signifie is altogether unknown to us: From these therefore, besides those which we have reckoned up before, is the name of the Divine Essence, Eheia äéäà, which Plato translates wn, from hence they call God TO ON , others O UNthat is the being. Hu àåä is another name revealed to Esay, signifying the Abysse of the Godhead, which the Greeks translate TAUTON , the Latins, himself the same….

Vitruvian Man in Agrippa, recalling Kelley's essay.

Vitruvian Man in Agrippa, recalling Kelley’s essay.

Which the Ancient Doctors of the Hebrews have especially observed, who were wont to do many wonderful things by words; the Pythagorians [Pythagoreans] also have shewed, how to cure very wonderfully the diseases both of body and mind, with certain words; we read also, that Orpheus,being one of the Argonauts diverted a most fierce storm by certain words; in like manner that Apollonius, by certain words whispered, raised up a dead maide at Rome; and Philostratus reporteth that some did by certain words call up Achilles Ghost; and Pausanias relates, that in Lydia in the Cities of Hiero-Cesarea and Hypepis, were two temples consecrated to the Goddess whom they called Persica, in both of which when divine service was ended, a certain Magitian [magician], after he had laid dry wood upon the Altar, and in his native language had sang Hymnes, and pronounced certain barbarous words, out of a book which he held in his hand, presently the dry wood, no fire being put to it, was seen to be kindled, and burn most clearly. Also Serenus Samonicus delivereth amongst the precepts of Physick, that if this name Abracadabra be written, as is here expressed, viz.diminishing letter after letter backward, from the last to the first, it will cure the Hemitritean Fever or any other, if the sheet of paper or parchment be hanged about the neck, and the disease will by little and little decline and pass away.

a b r a c a d a b r a
a b r a c a d a b r
a b r a c a d a b
a b r a c a d a
a b r a c a d
a b r a c a
a b r a c
a b r a
a b r
a b

Cornelius Agrippa, Three Books of Occult Philosophy, Bk. III, XI

The pyramidal structure of abracadabra is reminiscent of the triangulation of “666” or the tetraktys. It is not merely an encoded hermetic message, but also a geometric form – a triangle. As an undergrad I read a large portion of volume 1 of Charles Heckethorn’s The Secret Societies of All Ages, and one aspect that came to the fore was the pigpen cipher. Not only is the pigpen cipher an ancient method of secret communication, the nine squared box can also enclose all the letters of the English alphabet as well as the first 9 numerals (which make up all numbers). It is easy to see how the magic square, the emergence of linguistics, number forms, the pigpen cipher and various esoteric ideas would all intertwine. Yet aside from the religious and esoteric views, there is also the ever-present usage of these ideas by the state for secret communications.

The classic pigpen cipher.  When the "X" is laid over the #, the entire English alphabet is present.

The classic pigpen cipher. When the “X” is laid over the #, the entire English alphabet and the first 9 numerals are present.

Fast forward now to Renaissance England, and think of Dr. John Dee, the first “007,” and court astrologer for Queen Elizabeth. Dee was involved in many intrigues, one of which was cryptology. However, as NSA scholar Leslie Rutledge explains, not a very good one. In fact, despite the many legends of Dee as a conjurer talking to the dead with his crystal ball, the evidence seems to weigh in on Dee as a con man, calling to mind Agrippa. Regardless, Dee is another example of the intersect of the esoteric and cryptography. Rutledge writes in his “John Dee: Consultant to Queen Elizabeth”:

“Mathematics lifts the heart above the heavens by invisible lines, and by its immortal beams melteth the reflection of light incomprehensible, and so procureth joy and perfection unspeakable.” -Dr. John Dee citing Plato

“The book was notorious, I just now pointed out. Trithemius, the Abbot of Spaheim, began to write it in the year 1500, and he sent a partial copy of it to a clerical friend in another religious establishment. But unknown to Trithemius, his friend had died. His friend’s abbot opened the correspondence, and he was appalled. “Secret writings,” he read, “will reveal secrets not found by ordinary means.” And there was more. In order to send a secret message, you make an image of a planetary angel, speak the message over it at a moment determined by complicated astrological calculations, wrap the image up with an image of the addressee, and bury the images. This network of planetary angels could always be used for messages-and even for thought transference.

Cryptography, even of this heavenly sort, was not just a means of disguising messages; it was the medium through which intelligence from the spirit world might be transmitted. The secrets of the universe-the philosopher’s stone “The elixir of life-might be received in a heavenly cipher, like the obscure oracles of Delphi.” The abbot denounced Trithemius as a conjuror, trafficking with spirits, and he lost his clearance. Although he stopped all work on the Steganographia, the manuscript of it appears to have circulated as an underground classic for nearly a century until Dee copied it in 1563. was finally published in Frankfurt, near the end of Dee’s life, in 1606.

It was, you see, the supernatural context of the Steganography which attracted attention. Heads of state-or adventurers of all sorts could be persuaded that secrets of the future, hidden in the stars, and the marvelous formulae for prolonging life and for converting base metals into gold were knowable-and might be revealed by the supernal powers in cipher. It is hard perhaps to realize, but rational and wholly illusory notions like this could and did exist in the 16th Century scientific mind. Even Copernicus did not disbelieve in astrology. There were two gates to the other world. There was a gate of horn, through which came the rational finding which would lead to our times, and an extraordinary perception of the nature of man and his world. But there was also agate of ivory, through which dreams and illusions came.”

According to Rutledge, Dee was not successful at this magical, astrological means of cryptography. However, the essay does relate the story of Dee mentioning the ability to project images through screens, which I have noted elsewhere appears to relate to the seminal idea of the computer, and it is to Leibniz that we once again return. Leibniz’s idea of a characteristica universalis would be instrumental in the development of calculation machines, arising from the project of a universal logic for all phenomena. Milkov explains:

“The first variant of Leibniz‘s project for a new language was set out in a letter from Marin Mersenne to Descartes. In fact, Mersenne‘s idea was that of pasigraphy, a general language that helps one to understand all languages. In his reply to Mersenne of 11 November 1629, Descartes found this project rather interesting; however, he suggested a much wider variant of it: a project for ideography that mirrors human thoughts. This ideography would be connected with a mathesis universalis that could conceive of anything thinkable as a calculation. ―The greatest advantage of such a language would be the assistance it would give to men‘s judgment, representing matters so clearly that it would be almost impossible to go wrong.” (Nikolay Milkov, “Leibniz Project for a Characteristica Universalis in Relation to the Early Analytical Philosophy,” pg. 2)

Amazingly, Leibniz wrote of a possible “imagined” machine:

“17. It must be confessed, moreover, that perception and that which depends on it, are inexplicable by mechanical causes, that is by figures and motions. And, supposing that there were a machine so constructed as to think, feel and have perception, we could conceive of as enlarged and yet preserving the same proportions, so that we might enter into it as into a mill. And this granted, we should only find on visiting it, pieces which push one against another, but never anything by which to explain a perception. This must be sought for, therefore, in the simple substance and not in the composite or in the machine. Furthermore, nothing but this (namely perception and their changes) can be found in the simple substance. It is also in this alone that all the internal activities of simple substances can consist. 18. The name of entelechies might be given to all simple substances or created monads, for they have within themselves a certain perfection; there is a certain sufficiency which makes them sources of internal activities, and so to speak, incorporeal automata.” (pg. 536)

Grandfather Patriarch to all Computers.

Grandfather Patriarch to all Computers.

In Leibniz, the father of calculus, the convergence of symbology and earlier cryptographic and esoteric ideas combine to produce a further exposition and advance on the idea of creating a logic machine that functioned like a mind. While my intention here is not to delve into the history of the computer, it is worth considering that the history of cryptography and cryptanalysis was directly connected to the emergence of the idea of the computer. Only in a world where mathematical principles are “mirrored” from the realm of forms to our external world could such a machine function. As you read this, you are in fact using the very thing described – a machine that transmits encrypted information from one person to another.

Physicist Paul Davies relates an interesting story about the advancement of computers by Los Alamos Laboratory scientists that also recalls Leibniz’s walk-in computer, based on the same principle of universal logic and a characteristica universalis. This time, however, the purpose is to mimic life. Davies explains:

“The fact that universal computers can simulate each other has some important implications. On the practical level it means that, properly programmed and with enough memory space bolted on, a modest IBM PC can perfectly imitate, say, a powerful Cray computer as far as output (not speed) is concerned. In fact, a universal computer need be nowhere as sophisticated as an IBM PC. It might consist of nothing more than a checkerboard and a supply of checkers! Such a system was first studied by the mathematicians Stanislaw Ulam and John von Neumann in the 1950s as an example of what is called “game theory.” Ulam and von Neumann were working at the Los Alamos National Laboratory, where the Manhattan atomic bomb project was conducted….He [von Neumann] was fascinated to know whether a machine could in principle be built that is capable of reproducing itself, and if so, what its structure might be. If such a von Neumann machine is possible, then we would be able to understand the principles that enable biological organisms to reproduce themselves. The basis of von Neumann’s analysis was the construction of a “universal constructor” analogous to a “universal computer.” This would be a machine programmed to produce anything, much as a Turing machine can be programmed to execute any computable mathematical operation.” (Paul Davies, The Mind of God: The Scientific Basis for a Rational World, pgs. 111-2)

In Leibniz, the principle of gnomonicity is applied to the monads, and with computers, supercomputers and personal computers, the same gnomonic principle applies. This is reminiscent of Chilton’s trangulation of “666,” where removing one layer leaves a smaller, yet same shape. The point here is that the gnomonic principle is based on the mirroring principle, that what is true in thought, logic and nature is also true from the macro-scale to the micro-scale. It is in this way that the secrets of nature encode the rites of the gods. What we see at the subatomic level mirrors what we see in galaxies and the solar system. Wisdom 11:20 states, “But you have disposed all things by measure and number and weight.” However, that scientists will create a “sentient” computer is impossible, given the objective truth of Godel’s Theorums and the impossibility of accounting for all infinite potentialities. AI scientist and semiotician Douglas Hofstadter comments:

“Clearly there is much more going on in typefaces than meets the eye–literally. The shape of letterform is a surface manifestation of deep mental abstractions. It is determined by conceptual considerations and balances that no finite set of merely geometric knobs could capture. Underneath or behind each instance of “A” there lurks a concept, a Platonic entity, a spirit, This Platonic entity is not an elegant shape such as the Univers A, not a template with a finite number of knobs, not a topological or grouping-theoretical invariant in some mathematical heaven, but a mental abstraction–a different sort of beast. Each instance of the “A” spirit reveals something new about the spirit without ever exhausting it. The mathematization of such a such a spirit would be a machine with a specific set of knobs on it, defining all its “loci of variability” for once and for all. I have tried to show that to expect this is simply not reasonable.” (Douglas Hofstadter, Metamagical Themas: Questing for the Essence of Mind and Pattern, pg. 279)

In other words, there is clearly something beyond the letter on paper, the letter spoken, and the letter in mind. Something invariant and not bound by time must link all these particular instantiations, and thus by the wayside falls reductionist materialism (though they are almost incapable of grasping this). The danger is not from sentient supercomputers like some ridiculous Hollywood blockbuster, but from the actual supercomputer spy grid that was erected under the auspices of the Cold War. in his 1982 book on the NSA, James Bamford mentions a curiously titled cryptographic program:

“The timing could not have been better for IBM, which submitted for consideration its Lucifer cipher. Labeled by David Kahn “the tiniest known ‘cipher machine’ ever produced,” Lucifer actually consisted of a thumbnail-sized silicon “chip” containing an extremely complex integrated circuit. The “key” to the cipher was a long string of bits – 0s and 1s – the combination of which would vary from user to user…From the very beginning, the NSA had taken an enormous interest in Project Lucifer.” (James Bamford, Puzzle Palace, pg. 435)

First, remove the chip in your all-seeing eye.

First, remove the chip in your all-seeing eye.

Along the same lines, mathematician Calvin Clawson expands on this program in his 1996 book, Mathematical Mysteries, which shows the level of advanced surveillance that existed in the 90s! Clawson says:

“The German version of this [cipher] machine was called the Enigma, on of which was obtained by the British. The Enigma, in conjunction with cryptanalysis techniques allowed the British to decipher many German messages, which significantly altered World War II’s outcome….Companies and governments worldwide are not adopting the public-key cipher system. RSA Data Security, Inc. has grown to be the leading cryptographic marketing company in the nation….

With the phenomenal growth in the use of public-key encryption methods, such as the RSA system, we might be led to believe that public key codes will soon become the national, or even world standard. However, the U.S. Government has been fighting to avoid such a situation. The National Security Agency of the U.S. Government is responsible for breaking the codes of foreign governments- they are our secret spy agency. But the NSA knows it cannot break the public key-codes….No wonder the NSA is upset about the RSA success story.

The government has not been idle, and is now working on a competing system to public-key encryption. In 1987, Congress authorized NIST to develop an acceptable encryption system that would satisfy the needs of user privacy, yet allow law enforcement agencies and the NSA to decipher transmitted messages. This effort became the Capstone Project. Under Capstone, a computer chip, called a Clipper Chip, would be manufactured and installed in computers that interface with the U.S. Government.” (Mathematical Mysteries, pgs. 186, 199-200)

Lucifer and Capstone: Names undoubtedly imbued with esoteric significance. Even in my semi demythologizing project in this essay, I am unable to avoid esoteric notions as we move into the 20th century. It seems that cyrptography, which developed from ancient message writing and gematria, and eventually produced the Enigma machine of World War II and the computer itself, is still deeply related to occult ideas. Does that mean we can decode Lagarde’s cipher? We may not have all the keys for her message, but what we do have is a grounding in the understanding that Lagarde is primarily using her message as a message of statecraft, as old as the art of language itself. Whether one regards the “magic” as real or not, one thing we can be certain of is statecraft and cryptography.

What of gods, then? Must we conclude that it is all statecraft and sciencia and techne, man in search of secret ways of communicating and being, apart from anything religious? No, not at all. Man is more religious than ever, only his gods have changed. Instead, just as we plumb the depths of nature and science, like Hofstadter’s comments on the Platonic nature of signs and symbols, each new revelation conceals as much as it reveals. We are not left with a dry, barren Enlightenment rationalism, nor are we returning to an ancient superstition. We are involved in the ever-progressing revelation of reality that spirals for all eternity, as St. Gregory of Nyssa wrote, up, eternally into the divine. It’s not dialectics, it’s a principle of unification, and synthesis, and not in a Hegelian sense (Hegel’s view was based on dialectical tension). This eternal learning constantly removes superstition as it simultaneously invites us deeper into theological mystery. It is the acceptance of paradox, which is very different from a contradiction in philosophy, that is the appropriate (and Eastern) attitude.

Read more here:: Cryptography of the Cryptocracy: Of Gods and Computers

The post Cryptography of the Cryptocracy: Of Gods and Computers appeared first on The Rundown Live.


The Rundown Live #362 Gavin Seim (Language,Government,Anarchy)

By TheRundownLive


The Rundown Live #362 Gavin Seim (Language,Government,Anarchy) (10/24/14)

The Rundown Live LIVE M-F 8C/9E

On this Friday edition of The Rundown Live, Kristan and I go over the sponsors, and the site before we are joined by our guest Gavin Seim, getting into many topics like, police, government, language, anarchy, liberty, and much more. This one is worth checking out! Make sure you like, recommend and subscribe! Links below!

Audio Version Here




Listen to The Rundown Live today!!



Smartphone Apps:



Subscribe to “The Awakening” List here:

The post The Rundown Live #362 Gavin Seim (Language,Government,Anarchy) appeared first on The Rundown Live.


  • mostrecentshows
  • Narrow Target Radio - 06/13/18

    Narrow Target Radio - 06/13/18We start this show with the topic of the day North Korea, but not the way you would think. Mark lays out his assessment of Kim Jong Un and how he is actually planning on westernizing North Korea and has been planning it all along. Anthony Bourdain, California 3 way split, California gun law traps, and local crime and government failures to manage it is also discussed and we end the show with some training talk, and pleasant conversation with Nolan.     Narrow Target Radio is dedicated to personal enrichment through personal defense and personal liberty. Topics range from firearms, training, products [more]

    Narrow Target Radio - 06/06/18

    Narrow Target Radio - 06/06/18After a very long break for most of the month of May we start the show with a very long winded MY BAD and some talk about Indy car. Mark talks a bit about the sig P365 and the developments surrounding reported failures and Sig Sauer's reaction. Trump mania continues so we do touch on The Commander of Cheese before discussing recent school shootings, the swamp, the Bergdahl decision and just because Mark can't help himself he does explain his stance on how safe action isn't fail safe.     Narrow Target Radio is dedicated to personal enrichment through personal defense and personal [more]

    Narrow Target Radio - 05/09/18

    Narrow Target Radio - 05/09/18Tonight, Mark starts the show talking about his experience stopping a daylight rape right behind his house last Sunday. He then talks about his local government purposely adjusting crime rates through false reporting and giving criminals a pass. Later he talks about making personal adjustments to your equipment, the NRAAM 2018 cultural shake up and old guard and Trumps crazy approach to successfully making our foreign affairs great again.     Narrow Target Radio is dedicated to personal enrichment through personal defense and personal liberty. Topics range from firearms, training, products and personal preparedness. PRESS PLAY BUTTON BELOW FOR AUDIO VERSION Click for More about Narrow [more]

    Narrow Target Radio - 04/25/18

    Narrow Target Radio - 04/25/18Mark starts the show doing his new gun happy dance as he tells us about the Sig 229 trade saga. After his gleeful celebrating of the new pistol we talk about various topics to include Britain, Congress, the Dallas and Waffle house shootings. He talks about Tim at the Military Arms Channel and how he has launched a campaign to get the NRA back into the fight and to stop the capitulation.     Narrow Target Radio is dedicated to personal enrichment through personal defense and personal liberty. Topics range from firearms, training, products and personal preparedness. PRESS PLAY BUTTON BELOW FOR AUDIO VERSION Click for [more]

    Narrow Target Radio - 04/18/18

    Narrow Target Radio - 04/18/18Mark spends the opening of the show talking about talking about training plans, exploding airplanes and his new rifle he is waiting for. After the break he talks about some of the crazy questions his new coworker asks, open carry in a big city, the death of slide fire, his plans for participation in a local buy back program in order to save guns from the melting furnace. Then we get into Syria, Korea and why the left is so distracted by their hate they pay not attention to what is actually going on.   Narrow Target Radio is dedicated to personal [more]

    Narrow Target Radio - 04/11/18

    Narrow Target Radio - 04/11/18After a few weeks break Mark catches up the listeners with his misadventures in gun shows and quitting tobacco. We discuss the current gun debate and the way that pro 2A supporters voices are being silenced while the social media moguls lie to the nation about it. We end the show on Syria and why it should not be a thing.       Narrow Target Radio is dedicated to personal enrichment through personal defense and personal liberty. Topics range from firearms, training, products and personal preparedness. PRESS PLAY BUTTON BELOW FOR AUDIO VERSION Click for More about Narrow Target Radio LIVE: Wednesdays 10:00pm-12:00am [more]

    Narrow Target Radio - 03/21/18

    Narrow Target Radio - 03/21/18This week Mark talks about his experience with the Rockwell tactical Mindset seminar at the Muncie Threat Assessment Center. Then we get both feet into the current relationship the left has with the rest of us and the gun debate as well as Youtube's treatment and dismissal of gun channels from their site. Before we come to an unscheduled early finish, Mark talks about the state of affairs in South Africa and the US, USSR, UK snafu. Narrow Target Radio is dedicated to personal enrichment through personal defense and personal liberty. Topics range from firearms, training, products and personal preparedness. PRESS PLAY [more]

    Narrow Target Radio - 03/07/18

    Narrow Target Radio - 03/07/18This week we talk about NY, Chicago, Florida and California and the lunacy of the liberal advance against our gun rights. Obama makes a come back and we play some very excellent clips to support our argument. Mark talks about how Indiana is getting almost civilized with Sunday alcohol sales and how his dumbass Governor thinks hemp is pot. We finish up the evening talking about Marks upcoming training with RTG and weapons mounted lights. Narrow Target Radio is dedicated to personal enrichment through personal defense and personal liberty. Topics range from firearms, training, products and personal preparedness. PRESS PLAY BUTTON BELOW [more]

    Narrow Target Radio - 02/28/18

    Narrow Target Radio - 02/28/18On this weeks show, Mark recaps all the lies and failures we have learned about the Parkland shooting after the CNN town hall aired. We go on to talk about how POTUS has seemingly switched from pro 2A to no 2A and his collusion with Dianne Fascist-stein, the push to confiscate without due process, the various effects on companies who have both supported and ended relationships with the NRA. In the second half of the show we talk about the Las Vegas shooting and the recent legal developments regarding the release of autopsy records of the victims and how we still [more]

    Narrow Target Radio - 02/21/18

    Narrow Target Radio - 02/21/18Oh boy! After 3 weeks off with all of the events that have happened where are we to start? Oh yeah, Trump turning tail, Florida... freakin Florida! We talk about the lies and the misinformation being spread by media, Politicians and opportunists. We discuss comments made in the town hall meeting on gun violence and play some completely ludicrous commentary for Democratic Senator Bill Nelson and Marco Rubio. We outline the failures of the government that lead to the death of 17 kids and what we can do to correct it. We end the last 30 minutes by talking about [more]

  • addwaystolisten
    FPRN Archives
    Whether you want to listen to the newest show, or take a trip to the past & check out some of our oldest broadcasts, you can find it all in the archives. Feel free to browse, download, or just stream, you can do it all right from the show's profile page:

    1. Head to the FPRN Radio Archives.
    2. Select the show of your choice (for show descriptions/bios, see our All Shows Page).
    3. Once on the profile page of the show you selected, you can listen to and/or download the latest broadcast, as well as any previous broadcast.
    Tune In Radio
    Begin listening to the FPRN Radio live stream on your smartphone or mobile device NOW from virtually anywhere with Tune In Radio for Apple iOS and Android:

    1. Go to the App Store on your smartphone or mobile device.
    2. Do a search for Tune In Radio.
    3. Download the App to your smartphone or mobile device.
    4. Once the download is complete, open the App and type FPRN Radio in the search bar.
    5. Click Enter and begin listening.
    6. To save FPRN Radio in the presets, tap on the heart while listening to the stream.
    Listen to your favorite shows on-demand on your PC, smartphone or mobile device when you subscribe to the FPRN Radio iTunes Podcast. Here's how:
    1. To subscribe with your computer, open iTunes, go to the iTunes Store & search for FPRN Radio and subscribe.
    2. To subscribe with your smartphone or mobile device, you will first need a podcasting app.
    3. We recommend Apple's Podcast App(free with the latest iOS), Downcast($1.99 for iOS) or OneCast(free for Android).
    4. Once downloaded, open the app & Browse or Search for FPRN Radio and Subscribe to the podcast.
  • vtuner
  • streamfinder
  • schedulebanner