How to Avoid Capture If You Are On the Jade Helm Red List

by Dave Hodges, The Common Sense Show

It is the latter days of summer and there’s not much excitement. However, one day stands out like no other. On that fateful day, you awaken to the news that the nation’s banks are “temporarily closed” because some terrorist group launched a cyber attack upon all of the major banks the night before. You instantly recognize the lie for what it is.

You have been preparing for this moment for a long time and you recognize this event for the false flag event that it is. You announce to your family it is time to go. You grab your “bug out” bag”  and you drive 20 miles in the opposite direction from your intended destination as you enter an underground parking garage. There you are met by a trusted source. You transfer your bug out bags to their vehicle and leave your vehicle behind. Why did you have to drive to an underground structure? A satellite can be backtracked on your residence. It will detect your vehicle and the number of occupants leaving your garage and you can be followed. Driving in the opposite direction of your intended destination may confuse any search protocol which will be based upon your known associates based on the DHS FAST program which is described below. Entering an underground structure will make it difficult to track you. The number of vehicles who have entered the structure are numerous and the NSA computers will have trouble matching you to a known associate if you have not had cell phone communication with your intended getaway ally. Your cell phone is now your enemy. Most of us know about the Stingray program designed to track people as it is now available to local law enforcement. The NSA has much better tracking technology.

The people that you will be staying with, must be “friends of friends” because if you have had communication with these people, the NSA computers will predict who you will hide out with and you will end reliving the modern day nightmare of the Diary of Anne Frank. Remember, the NSA super-computers match known associates by email, cell phone and landline communications. If you have ever had a cell phone conversation or your cell phone has come within 10 meters of a person, that has been logged as a known associate.

You have been careful to leave ALL electronic devices behind. Before his death, the late A.C. Griffith, former NSA specialist, appeared on The Common Sense Show several times and discussed much of the tracking technology that was available to the NSA as of five years ago.

As you are driving to your rendezvous point, the radio broadcasters are telling you that all is well and that the banking chaos will be straightened out in a few days. However, you know the truth, the economy has collapsed and it is not coming back. And you also know that in the midst of the ensuing chaos, the Red List extractions which will be conducted by Jade Helm personnel, are imminent. They could take place in a day, a week or, on the outside, a month.

Waiting for you in the underground parking garage is a friend of a friend. You have made arrangements to stay with this friend of a friend because it is not likely that you can be tracked to their home. As your getaway vehicle departs the underground structure, nobody will be the wiser.

Cell Phone Precautions

All parties, connected to your getaway, have agreed to not have in their possession cell phones. Not only can they be tracked, they can be used to listen to your conversations even when the battery has been taken out of the phone. This backdoor was a NSA mandate dating back to the 1990’s, demanded that cell phone manufacturers build in backdoors so that the device could be used to spy upon high value targets. As you are making your get away, it might be best to lie down as you enter the new vehicle. Why? Have you ever seen a photo radar photograph? Your approximate location can be tracked by traffic cameras.

What about disposable cell phones? If you are in flight to evade capture, any cell phone in your possession is a risk. The NSA has a voice print records on all Americans who have ever used an electronic device. The voice print is as unique and as identifiable as a finger print. If you speak within ear shot of the phone, your voice print can be instantly matched to the super-computers of the NSA and your location can be immediately pinpointed. Therefore, you new host family can never have a cell phone, or a landline phone within ear shot of you. The same is true for a computer as they are routinely listened to even in the off position.

Your electronic devices are the greatest threat to the continued freedom for you and your family. The good news is that you will not have to remain in hiding for very long. Most of my sources believe that “Red Listed” individuals will remain high priority for about 30 days. Why 30 days?

 Phase Two: The Blue List

Under the cover of the chaos of an economic collapse, the middle of the night Red List extractions will take place. During this time cell phone and landline communications will be cut because the powers that be do not want potential resistance leaders to be able to warn each other. However, these extractions will not go unnoticed so Phase One will be immediately followed by Phase Two (Blue List enforcement) which will consist of targeting a second set of potential dissidents of lesser value. These will often include the modern day “Brown Shirts”.

Continue Reading>>>

Sharing is caring!