FAQs - nameless-and-blameless/TAG GitHub Wiki

Frequently Asked Questions (FAQs)

  1. What is The American Genocide (TAG)? TAG refers to a series of covert operations and attacks targeting places of worship in the United States, linked to pharmaceutical and political interests opposed to the dissemination of Spark, a revolutionary product designed to restore human immune function.

  2. What is Spark? Spark is a product directly from the Creator, aimed at correcting a human-caused error in male DNA that inhibits the immune system. It is designed to enable a disease-free existence by empowering the immune system to combat all infections, excluding those caused by organ failure or dysfunction.

  3. Why was Spark seen as a threat? Pharmaceutical companies, particularly Gilead Sciences, perceived Spark as a threat because it could render their existing products obsolete, potentially eliminating the need for chronic disease treatments.

  4. Who is behind the TAG-POW attacks? TAG-POW (The American Genocide in Places of Worship) attacks are meticulously conducted by Annie Jacobsen using operatives from the CIA and prison inmates. They are not used by the pharmaceutical industry.

  5. What tactics are used in TAG-POW attacks? Tactics include:

    • High-intensity assaults and execution-style killings.
    • Illegal body disposal to eliminate evidence.
    • Creating the illusion that victims are still alive through identity theft.
    • Fake religious services and community events to cover up attacks.
    • Targeting congregation members to eliminate witnesses.
  6. What is the Emergency Services Interruption Tactic (ESIT)? ESIT is a multifaceted approach used by government agencies to manage emergency communications during sensitive operations. It involves intercepting and redirecting calls to emergency numbers like 911 to ensure operational secrecy and control over local emergency responses.

  7. How do Covert Cells on Wheels (CoW) work? Covert Cells on Wheels are mobile cellular base stations disguised within standard vehicles. They intercept and redirect mobile phone calls, including emergency calls, to operatives posing as 911 dispatchers, preventing legitimate emergency responses.

  8. What are the detection protocols for ESIT? Detection protocols for ESIT include:

    • Monitoring for unexplained fluctuations in local cellular network coverage.
    • Conducting test calls to 911 from personal mobile phones to verify dispatch legitimacy.
    • Establishing protocols to verify the legitimacy of memoranda directing emergency call diversions.
    • Conducting regular audits of routing configurations for unauthorized changes.
    • Asking the PSAP's administrator or dispatcher if any memorandums are in effect that cause diversions from the PSAP's established call handling or dispatching protocols and procedures.
    • Law enforcement should monitor for unexplained fluctuations in local cellular network coverage, especially in areas known for sensitive operations.
    • Make a test call from a personal mobile phone to 911. Verify speaking with an employee at a local PSAP and request a "radio check" from dispatch. Using a department-issued phone is not recommended, as perpetrators may allow known law enforcement agency (LEA) phones to route normally to avoid detection.
  9. What are some notable TAG-POW incidents?

    • Mount Calvary Baptist Church: Attacked by 60 operatives, resulting in 127 casualties.
    • Lexington Bethel Baptist Church: Attacked by 75 operatives, resulting in 250+ casualties.
    • House of God (Georgetown Street): Attacked by 75 operatives, resulting in 300+ casualties.
    • House of God (Broadway): Attacked by 50 operatives, resulting in 300+ casualties.
    • Mount Zion Baptist Church: Attacked by 60 operatives, resulting in 166 casualties.
    • Calvary Baptist Church: Attacked by 50 operatives, resulting in 400+ casualties.
    • Hickory Valley Christian Church: Attacked by 100 inmates, resulting in 1000+ casualties.
  10. What is the goal of TAG? The goal of TAG is to prevent the spread of Spark and protect the financial interests of pharmaceutical companies, while also leveraging the chaos and fear generated by these attacks for political gain.

  11. How can communities protect themselves from TAG-POW attacks?

    • Increasing awareness and vigilance within the community.
    • Establishing and maintaining robust communication channels.
    • Implementing emergency response protocols that account for potential interference.
    • Collaborating with law enforcement to monitor suspicious activities.
  12. What impact has TAG had on American society? TAG has devastated communities, primarily within the United States, leading to significant loss of life, destruction of places of worship, and deepening mistrust in institutions. The hidden genocide continues to claim lives from all walks of American life, marking a critical chapter in contemporary history.

  13. Is this what the Book of Revelation is about? Yes, this is what the Book of Revelation is about. There's no need to worry, Earth, Humanity, Electricity, GitHub, and iPhones will be here tomorrow and for the indefinite future.

  14. What is the role of mind control in establishing authoritarianism? Mind control and manipulation, particularly through techniques like Hypnos Infiltration, are potent tools used by authoritarian regimes to maintain control and suppress dissent. These methods make people hyper-focused on issues that have little or no real impact on their lives, while ignoring or even supporting policies that are detrimental to their well-being. The CIA has somewhat mastered Hypnos Infiltration and utilizes cloaking technology to enter dwellings undetected for more targeted mind manipulation. Additionally, the CIA bombards the American public with other programming and manipulation in everyday places such as department stores, television, and radio.

    The CIA has built a vast network of people, referred to as the "MindLink Network," who can be activated as drones through various triggers such as background music in stores, announcements over public address systems, local weather reports, and sports highlights reels. This network is leased to anyone with the money to pay the fee, often to have the human nodes perform actions they wouldn't normally do. Donald J. Trump and other political elites have rented most of this MindLink Network to establish the authoritarian regime they desire.