Unveiling Shadows Podcast

Meet Brent EP 93 Decoding the CIA: Hidden Codes and Secret Societies

Kimberly Episode 93

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 37:58

Join Kimberly Mosby and Jim Haller as they explore covert social manipulation, intelligence codes, and the hidden mechanisms behind government operations. This candid conversation delves into survival strategies, cryptography, and the influence of secret societies, offering practical insights and historical context.

Chapters

00:00 Introduction to Covert Manipulation

03:10 Understanding CIA Codes and Cryptography

05:54 The Role of the CIA in Global Affairs

08:46 Operation Mind Control and MKUltra

11:19 Media Manipulation and Disinformation

14:06 The Influence of Secret Societies

16:23 The Origins of Cryptocurrency

18:50 Conclusion and Final Thoughts


🔔 SUBSCRIBE for new episodes every Friday:    / @unveilingshadowspodcast  

📱 CONNECT with Kimberly: https://kimberlymosby.me

🌐 VISIT our website: https://unveilingshadows.com

🎙️ SUBMIT your story: https://unveilingshadows.com/podcast/


#UnveilingShadows, #Targeted Individuals, #Government Harassment, #Optogenetics, #Spiritual Warfare, #MindControl, #Surveillance, #Masonsons

🚀 Let’s Stay Connected & Expose the Truth

If this episode opened your eyes, share it with someone who needs to hear it! Subscribe to Unveiling Shadows and turn on notifications so you never miss an episode.

📢 Join the Conversation: Have you noticed psychological control tactics in media, politics, or daily life? Drop a comment & let’s talk about it!

🔗 Follow Me & Join the Movement:

Facebook: @unveilingshadows

Instagram: @unveiledshadows

 🎥 TikTok: @unveiltheshadows

 📺 YouTube: @unveilingshadowspodcast

 🐦 X (Twitter): @shadowsunveiled

 📰 Substack: @unveilingshadows

 ✉️ Email: info@unveilingshadows.com

 🎙️ Be a Guest: https://unveilingshadows.com/podcast

Unveiling Shadows of Coercive Control Book

📌 ORDER NOW Hard Cover: https://shop.ingramspark.com/b/084?params=UGi64Ppn9FapSIRjjutOwMy4F2nSfKrsX0HXWBsraIW

Soft Cover: https://shop.ingramspark.com/b/084?params=g8IUCt6txunL22BlDE6qjbbovhoBNFojaIvnUj361Te


 Resources

MKUltra - CIA Mind Control Program - https://en.wikipedia.org/wiki/Project_MKUltra

Operation Midnight Climax - https://en.wikipedia.org/wiki/Operation_Midnight_Climax

Cryptonomicon by Neal Stephenson - https://www.amazon.com/dp/B000FC1Q4Q

The Puzzle Palace by James Bamford - https://www.amazon.com/dp/0316113574

Langley's Kryptos Sculpture - https://en.wikipedia.org/wiki/Kryptos

National Security Archives - https://nsarchive.gwu.edu/

Declassified CIA Documents - https://www.cia.gov/readingroom/


Support the show

SPEAKER_01

Welcome to the Unknowing Shadows podcast. I'm your host, Kimberly Mosby. Join me as I dive into powerful stories of resilience and strength. In each episode, I sit down with guests who have faced similar journeys of course of control, financial manipulation, and personal invasion. Together, we uncover the shadows, share our experiences, and inspire others to reclaim their lives. Tune in, listen, and be a part of the community that stands tall against the forces that seek to control us.

SPEAKER_02

Hello, everyone. Welcome back to Unveiling Shadows. I'm your host, Kimberly Mosby. And today's guest is James, a survivor and investigator who brings firsthand experience of targeted harassment and covert social manipulation. Over the years, James has repeatedly relocated to protect himself from persistent gang stalking and interference. He's faced near-miss escapes, invasive landlord interference, and the constant strain of trying to secure even a modest haven. James connects these personal experiences to broader patterns, how intelligent-style tactics, encoded messaging, and social infiltrators operate in communities, and how those systems exploit legal and institutional structures. He offers both live testimony and detailed observations about how manipulation is organized, executed, and maintained, along with practical advice for others trying to reduce their exposure. Join us for a candid conversation with James on survival resilience and the mechanics of covert influence. Welcome, James.

SPEAKER_00

Thanks very much, Kimberly.

SPEAKER_02

Yeah. Or should I say welcome back?

SPEAKER_00

Yeah. I was here with uh Holly Baglio and we talked about a number of things, including the Super Soldier program, which ties over and links up to so much of what's going on, much more than people can connect it to. But that's for you know further uh shows. We'd love to come back. Being here today, uh, I won't be talking so much about me except to also add that I've been a professional journalist, published in many publications, and uh today I'm gonna go into a rare aspect of things called CIA codes or coding and go into some deep history there, some real-time examples and some actual personal stories that uh tie in as well. So a little bit of me will come shining through as we go through. I will be reading from some notes. So if you see me looking down there, I'm got a lot of info for the folks, and uh they might want to actually take notes and research this stuff further.

SPEAKER_02

Okay. So do you want to tell them a little bit of background of me receiving an email from um some Yeah, because the reason that we connected is someone was bagging on Holly about how her story couldn't be true. And um, I didn't feel like that when I was talking to her because her and Kathy O'Brien's stories are are very similar. Yeah.

SPEAKER_00

Kathy O'Brien is a forerunner in all of this, especially MKUltra, which uh we'll get into somewhat today. That's a CIA code word for also something called Operation Mind Control. So MKUltra in CIA language in biphasic coding equals operation mind control. And I'll be dropping a number of references. Walter Bauart's book, Operation Mind Control, is also a seminal early work that is completely a compendium of scientific knowledge about this stuff, and I recommend it. And as we get towards the end, I'm going to recommend a few other sources and books, sources that I actually look to for this presentation as well. Um, as far as that email is concerned, I don't have as much of a presence online that Holly has been able to create for herself and her experiences and her testimony and building a support network that she has done. You're gonna get trolls. You're actually gonna get agents of the intelligence community posing either as bots or all sorts of things, because they are in the business of gathering intelligence and all of the super soldier programming, still to this day, most of the MKUltra information, excuse me, Operation Mind Control, is still classified. Um so we're gonna be looking at uh when that email came through, uh that's uh a very coded email in the um email name. And let's get into it because in the email name um was uh his name, uh Rex Reynolds, is coded. Uh but more importantly is the fact that he goes by Rocket Ranger uh 0007. Um 007 might sound trite, but it's actually called the James Bond code. This goes back in history. The fact that it's uh part of his email nomaker is rather telling uh to give away that he is more than likely uh farmed out or connected to uh intelligence that way. 007 goes way back and uh coding, encryption, uh anagrams, uh stenography, uh graphy, rather, stenographia, um, and uh cryptography, the science of tip cryptography go back to ancient Egypt uh with uh portions of hieroglyphics that are in non-standard order, uh meaning that they might be containing a hidden message. Cryptography, as we know from all the computer uh world that we deal with today, cryptography is uh encryption of some sort or measure, uh hidden messages or way of coding uh for uh protecting information. The first 007 is Dr. John D., uh who you might know from history of the Elizabethan era in Britain during the reign of Queen Elizabeth. She was quite an interesting queen. Uh, she was the forerunner of exploration into the New World America and the colonization here, and she employed um a cryptologist named Dr. John Dee, who was a court magician as well. He's famous for working with another Edward Kelly, uh, was his partner in crime, so to speak, and they came up with an incredible cryptological language called Enochian, which has been banded around in the occult world ever since. And John Dee was an occultist proper. His code under the uh British military at the time was 007. Another 007 was Alistair Crowley, who continued on and was very much informed by Dr. John Dee in the occult public information that Alistair Crowley vociferously uh put out into the world. There are some substantiation, substantiation, I should say, and some non-substantiation for Aleister Crowley being uh a British intelligence agent. And we'll get into all that kind of murky world of the cloak and dagger and how a lot of it is actually of the occult. So we did talk about 007 there. We can go into that email name further, but it's going to be more relevant when I get down to what's called the alpha coding, which is words and letters. There's really only two types of cryptography: there's alphanumeric coding and there is trinary coding. There's nothing too much beyond that. But trinary coding can get very complex and can be incredibly hard for the code to be break or the encryption to be broken. And I'm gonna give a fantastic example of just that. Uh some other numbers, though. Now, this is purely numerical coding that the CIA does use uh would be um 911, 711, 411. These are all telephone codes, but 411 is also uh related to National Security Agency NSA of phone wires. Uh, and this is going on with their use of supercomputers constantly now throughout the entire world. And you can pretty much guess that every phone has a link to 411 coding, uh, which would go right to the NSA supercomputer and which would be analyzed for key phrases, keywords, et cetera, et cetera, et cetera. So we have 911, which we all are familiar with. Uh, we also have 711, and that is actually when the Twin Towers floated uh and that event in 2001. Uh it was 711, not 911 or 911, because uh that's actually the seventh month of the year, September meaning seven, and uh November meaning nine. So the event occurred in September, which the coding would be 711, uh like the uh like the uh the stores 711 one relates to emergency, and of course that was a vast emergency, and people were picking up the connection of that right away. If you were to call 911 on your phone, you would get you know emergency response. This is something to be noticed. Uh 7 Eleven was George Washington's code in the Continental Army during the Revolutionary War for the USA to be founded. Uh, he was Agent 711. And this comes up historically in what's called the culprit spy ring, where the British were spying on uh Washington's every move as much as they could. And they were trying to break the code. He was actually 711. Very interesting. So we mentioned cryptography uh as a science. Uh that's what this is. It involves encryption, ciphers, uh, biphasic ciphers using uh uh pre-numbers or letters, and then numbers and letters that's an alphanumeric uh code. Uh, I'd like to mention that I would personally like to uh put out that the Central Intelligence Agency is the central intelligence agency because all of the intelligence for all of the 18 or 19, uh uh, and 19 is another code. Intelligence agencies which uh span across the intelligence network of the military-industrial complex itself, and especially the armed forces. So we have 18 or 19. I would include 19 as the FBI. The FBI is a domestic spying organization. However, the CIA's charter claims it does not uh produce or engage in any domestic within the U.S. borders uh intelligence gathering. This is absolute rubbish. And we will have something called Operation Chaos, which is just that: domestic spying, domestic uh intelligence gathering under the CIA under Operation Chaos. Feel free to to uh to uh ask any questions or uh anything you have to say, Kimberly. I would like to mention that the Central Intelligence Agency is uh a paramilitary organization. Some of the well-known nicknames for the Central Intelligence Agency is the Firm, meaning it's a company of sorts.

SPEAKER_02

Yes.

SPEAKER_00

Yes. Also the company, uh, which further uh includes that it might be in the corporation uh itself, which it is. Uh, pardon me. And also they have something called the Farm outside of Langley, the headquarters. Farm is a paramilitary training uh spot for to train in advanced uh weapons training, advanced intelligence operations, and paramilitary warfare, which the CIA engages in. And I would go as far to say that there's a clear and present danger that not only the United States faces, but the world in an enemy called the CIA. This is then uh a very, very highly illegal operations uh within the firm. And we will go into that presently, right about now. I'd like to mention the foreign countries and then not so foreign countries that the United States is involved as well with regime change that the CIA has been either working assassination, political assassinations, or political manipulation. The countries list and do not, this is not a full list, but we can look at Iran.

SPEAKER_02

That's why I call them, that's why I call them the C LIA, and a bunch of other people call them C LIA too.

SPEAKER_00

Yeah, uh the reason it's called central intelligence, again, I want to emphasize that all of the military intelligence is funneled through them, not through the NSA. It's funneled through central intelligence, and then it's classified according to their classifications, which would be uh number one, a classified document, a lower level is confidential, then there is secret, then there is top secret, and then there is highly classified, which a lot of people don't even get to that level. And we'll be talking about the alpha codes there, which they use for those classifications. So we'll get to that in a minute, just so I can keep rolling with my notes. Countries that the CIA has been involved in regime change uh and political manipulations are, but not just in uh limited to this list. Iran, Iraq, Afghanistan, Cambodia, Vietnam, Korea, Chile, Bolivia, Cuba, Venezuela, Nicaragua, and Granada, as well as African countries of the Zaire, Congo, Namibia, and South Africa. And I might mention that the USA had a regime change when they assassinated President Kennedy, which more than likely there's uh CIA involvement in coordinating such an intense event. So we've had regime change right here in the good old USA. Some of the coding here I would mention uh goes from A to Z. One of the things we've heard about since Trump came along in 2016 as elected president was this white hat QAnon movement. A lot of people don't realize what Q is a broad classification that does demarcate that everything Q-level access in the intelligence world would mean highly classified. That's what Q stands for in the intelligence world. Whereas if you start at A through, say D, this would be secret, uh sorry, confidential. After like D, maybe E or something like that. I'm guessing here would be secret and then moving into top secret. We actually get the X-Files show and the X-Files concept from XYZ, which after X including X, uh deals with UFology, paranormal, and possibly space uh related information about NASA and things like that. So we do the X-Files has a real actual coding, and that's why it's called the X-Files. Going back to Operation Uh Chaos and MKUltra, during the church committee uh hearings in the mid to late 70s with uh Senator Frank Church and others of the subcommittee, House Subcommittee on Intelligence, when MKUltra and Mind Operation Mind Control was made public and uh officially halted, there are sub-projects under MKUltra that number to 150. Uh so those subcon uh operations under MK Ultra operation uh are many and varied. Uh they they are uh they are listed in most of the some of the church information on MKUltra. Uh there's Operation Chaos, we mentioned, there's Project Shamrock, uh, there's Extreme, sorry, Extraordinary Rendition, Minaret, Mockingbird, and I might want to mention too and discover, talk about Operation Often. Operation Often is uh a CIA program, uh, that's a code word for infiltrating media and inserting articles, journalists, et cetera. So Operation Often is related to media control and media manipulation directly from central intelligence. We also are looking at interesting Operation Midnight Climax. This is another project, and that was done in San Francisco. Uh, it had to do with agents hiding behind a one-way see-through glass, uh, and it involved prostitution, drugs, and things like that. Don't let anybody tell you that drugs aren't involved with the CIA. They are incredibly involved. Every kind of drug and drugs you've probably never heard of. Mostly one of the most successful airlines that ever was was called Air America. It was owned and operated by the CIA, a company under their jurisdiction. And it was absolutely um riddled uh with lawsuits at the end. It was completely and utterly bringing heroin and cocaine by the tons into the United States and probably elsewhere from South American countries, et cetera, and uh from the Asia and Afghanistan, the opium to be transferred into heroin, to dumb down the public, weaken the public, and get them addicted to these heavy, heavy duty drugs. Air America is something that you can look at and see that it was CIA owned. So uh this might be an interesting time to look at our little um clip, if you'd like. Um, there are some alpha codes, which means letters or words, and angel means informant. So in the CIA, if you're an angel, uh more than likely you are a paid CIA agent or informant to the CIA andor an actual CIA member with pertinent classified information that must get through to a certain source in a certain compartment. Uh, the CIA is completely and utterly compartmentalized, and a lot of times one hand doesn't know what the other hand is actually doing until you get to the top level. Yeah, it's an interesting little clip from the 70s of the doctor trials. Would you like to play that for the audience?

SPEAKER_02

Yeah, yeah, let me play it right now. All right, let me expand this. All right.

SPEAKER_00

Notice the name. Watch as he looks in the camera with the dark glasses.

SPEAKER_02

Yeah. I forgot about that show.

SPEAKER_00

You know? It's kind of funny because it could be predictive programming in the sense that the informant's name is Angel, and he comes around to see Jim Rockford quite often in the show with pertinent information about things. Jim Rockford's character is a private investigator who sometimes gets caught up in the show with the N, which is a fictional, uh national intelligence agency. And uh here we go, you know, uh, what are they referring to? But really what we're dealing with here is um just just an interesting uh pop culture reference to an informant uh being referred to as Angel. In fact, the character's name is Angel. I will tell you a little story from a personal thing about how I learned about these codes and Angel and some of the numeric codes and things. Uh, there is an author out there named David Rothman, who I sought out. I read a book by him. It was an amazing book in a lot of ways. He wrote Mr. Death, also, which is about his father being an explosives agent, sorry, uh explosives engineer for the CIA. And he wrote that book. It was published by Playboy Press. So he's somewhat known for that book. He's written a number of other books about satanic murders and one called Volcano, about the assassinations of Dr. King and JFK. What I'm going to say though is I don't suggest David Rothman as an author because, from my estimations, he is a disinformation agent, and I wouldn't support him by buying his books. You cannot read them for free. But Volcano does contain CIA codes, which I believe are valid. Disinformation is a mixing of lies and truth in order to mislead the public. Okay. Having personally known David for a short time, the spaces that he was going into during our conversations led me to believe that I needed to halt our uh acquaintance and also that he's probably a disinformation agent or has been bought off at some point. But the codings that he lists in Volcano, which is again subtitled uh A Scientific Exploration of the Assassinations of JFK and Martin Luther King Jr., uh I believe those CIA codings uh are valid. He does mention Angel as an informant code. He also mentions uh 44 which is uh for assassination codes uh rifle code 49 again 40 four four numbers and this is because uh these codes would have been used during assassinations a rifle was used in both cases the patsies were holding rifles for both um Martin Luther King's uh being shot and JFK being shot uh Lee Harvey Oswald was supposedly using a a rifle 44 is a rifle number and the CIA uses that as a code so having gone through that uh there are other codes that are alphanumeric Blue Man one Blue Man II and all the way through nine uh green man uh one through four uh these are codes for enemy agents members of other intelligence agencies that the CIA might be at war with trying to correspond with trying to break codes etc etc and they also use that coding for certain cities like Blue City is a code uh an alpha code andor green city uh which could refer to particular cities we might look at something like LNH which is L N H A R P that refers as a code for the CIA to the U.S government the United States government so if they're referring to the U.S. government it's under LNH these are just interesting codes that the CIA uses uh going back to Rex and that email that was sent to uh denigrate uh Holly Baglio to you which was a strange thing that somebody would take the time he says his first name is Rex. Rex is in the Rothman codes in Volcano meaning king referring to Martin Luther King Jr. Possibly we don't know for sure but also referring to assassination of a political leader any political leader. So Rex vaguely meaning king. These are all some of these intense codes that we're exploring here. AM Blood is a reference to Cuba. Klamath is a reference to the NSA's work with the CIA obviously very much in bed with each other of course and they often uh they have actually a code called lysurgic and we might know what lysurgic refers to it's pretty open surgic uh acid disalamide 25 is the potent form of LST uh so under that coding they could be referencing uh the use of LSD for certain things in connection with the with the NSA. Just going further I would like to mention about coding in history uh the Nazis had a code called Enigma uh it used trinary code this is a very highly advanced probably the most highly effective unbreakable codes it took years for the Allies to break the Enigma code because it had up to six trillion combinations that's three times three trillion so you can imagine just how complex this coding system and they used actual coding computer like machines back in the World War II like touring machines almost in order to create these codes. Eventually the Allies broke the code and they broke the code just before the United States entered the war. The reason that the United States entered the war was the code was now broken. Otherwise the United States probably wouldn't have entered that war because now they knew where the U-boats were and where all the information was coming through as they broke Enigma. A famous another code breaking historical during World War II is the use of Navajo language and Navajo coders actually who were employed by the United States Army or actual Army members who broke the codes that Japan was using as a access power. And the Allies uh especially the United States benefited greatly from the Navajo codes they were also called the windbreakers I believe the windbreakers or the wind talkers I think it was the wind talkers of Navajo and uh at that point that was close to being around 1943 when the Japan codes were broken as well. So you can see how the war rolls involving the United States when those codes were broken. Something that I would like to move towards in this presentation since we've been through so much is uh there's a lot of codes surrounding crypto, use of the word crypto, especially with a K. There's a statue out front of the CIA headquarters building in Langley, Virginia that was created for them on commission by an artist. The artist's name is uh Jim Sanford and he created a statue called Cryptos that is K-R-Y P-T-O-S. It included on the statue four encrypted messages. And um three of those messages have now been broken by codebreakers throughout the world who were trying for years to break the codes just for fun, I guess. The fourth code has not been broken to my knowledge yet. So that is an interesting fact that you will find that the reason I want to kind of wrap this up today with this information is that I believe that the National Security Agency had a big hand in creating cryptocurrency which is going to come as a surprise and maybe a kind of bummer for those who are really into cryptocurrency. Bitcoin was begun in some shrouded mystery and we don't really know where Bitcoin comes from by a man from Japan supposedly called Satoshi now in 2009 Bitcoin was released but he also has the first name of Dorian. Sounds like a CIA code to me not too many Japanese people are named Dorian however you know it could easily be he's often just referred to as Satoshi or Nagamoto Satoshi Nagamoto however he disappears in 2010 from the public records entirely and he left behind for Bitcoin to get kicked off 1.1 million in Bitcoin in the in the bank there of the cyberbank so that was to get the blockchain running for Bitcoin there are some threads to say that Nagamoto was connected with some sort of intelligence with the NSA or the CIA probably the NSA at that point uh I would mention a uh a reference of mine which is a fictional book which came out published in 1999 uh by uh science fiction author Neil Stefferson called the Kryptonomicron which is a predictive programming novel in so many ways about a cyber currency before most of us had ever even heard of the idea. So that's 10 years before Bitcoin is actual thing and uh the Kryptonomicron which is a lengthly book is a very good read I must say I enjoy Neil Stefferson's work. I don't think he's a double agent or anything like that. He did live in Virginia very close to the NSA and maybe he was siphoning some information there. However his books are very well written and they are they stand as really great American science fiction I do recommend Neil Stefferson's work and especially the Kryptonomicron if anyone's looking into the origins of cryptocracy sorry uh cryptocurrency we could look to these mysteries of how Bitcoin was started and what that might mean. I guess at that point I'm gonna give you guys a couple of references to look at as I've gotten through most of the material. I know it was pretty sick. The blackvault com is uh a reference uh website that I go to often for information. It's a good reference website. Also electrospaces.net electrospaces.net is a uh website that will give you some coding uh that's used in the intelligence agencies especially CIA and NSA and then there's the National Security Archives which is a 501c nonprofit uh and the National Security Archives is full of uh tens of thousands if not more uh declassified documents uh uh from the government uh especially intelligence so uh this is a really great resource for anybody doing any research the National Security Archives one really good note that I want to include here that as I was researching for this presentation I was looking up redaction codes of the CIA for when you know they blackout classified documents so you don't get the whole files? Yeah like the Epstein files very much a redacted let go, yeah a leak but a a redacted leak as most are most are actually redacted in some method. When I was searching for redaction codes, interestingly enough on my phone Gemini AI that Google uses alerted me that Gemini is offline for that minute which I find to be very interesting because I've never seen AI go offline yet in any capacity. And yet while I was researching it did give me that note and I wasn't able to go further with the redaction codes just yet. So with that being said as an interesting side note I do hope that folks enjoyed this, got some information there's a lot there and also that they take off and run with this uh research themselves it is relevant uh to knowing how these operations are carried out in such secrecy any any comments or like secret societies secret societies Freemasons I think that that's who runs the government in my personal opinion you know are a bunch of secret society people without any morals or values and um it's been a really long time since we've had our country and it's time for us to take it back.

SPEAKER_02

So I still have am hopeful that there are some good men and women out there, you know, that are in these positions of the government mind control system that are going to do something about it. But I don't know. What do you think?

SPEAKER_00

Well I can safely say that the upper levels of a CIA compartmentalization, oh that's another book you should look up not going to remember the author is The Puzzle Palace about compartmentalization in the CIA. This is a very good reference and it's an older book but it it it's it's quite famous. The upper levels of the CIA I would absolutely stand to reason say that more than likely in inducted into the Freemasonic halls and they're probably large members only because the political aspects of Freemasonry are so prevalent but not only have many presidents been Freemasons as well, FDR and the list goes on. However high-level people in the government like the CIA intelligence especially would more than likely uh at the lower levels it's anybody's guess whether people are even approached some of them wouldn't be because the CIA is so compartmentalized they're not interested in the average secretary or the the pencil pusher or the computer buttons presser to necessarily know what's going on in the highly classified files, you know, like T files, B files, things like that. Yeah. They wouldn't necessarily want them to be involved with all that. You know Freemasonry sort of presents itself the way that it does present itself partially as an occultic lore society, et cetera, magic society in a way and that uh particular aspect of it, you can bet you that there's a lot of coding going along in the inductions of going through the three major uh in apprentice and and and master and stuff like that. Even further as you go up the line to like uh degrees of 33 and there is degrees above 33. It's rumored that Alistair Crowley 007 was a 93rd degree Mason. Wow third and uh his works are pretty coded especially in certain uh books that he's in in magic practice of the occult this is where a lot of these anagrams and stenographia and encryption actually comes from is ancient uh ancient magical papri and and and and texts like that that are slipping information in. Something I should probably know uh which is a controversial thing to say but the language of Hebrew uh uh is actually uh uh an alphanumeric code uh each letter of the uh Hebrew alphabet is uh 1 through 22 A is one very simple B is two C is three and by this you are able to code with that language and uh very much an alphanumeric code which gives us something called gamatria excuse me and gamatria has been revealed to to be something that the elites use to plant uh and plan and carry out false flag and media manipulation all the time uh hits uncertain dates hits on certain numbers certain numbers reflect other dates and time birthdays names times all sorts of stamps that are on that can be found by using Gamatri and several researchers have enlightened us to this so I would say that uh that's a very interesting aspect to to coding hmm interesting I learned something new today I always do though you know yeah yeah your channel is bold and it brings up a lot of great people on it so I I'm glad to uh come back and I'm glad to be here to uh give what I can give and uh I think that your your audience is is anybody tuning into the content is gonna be savvy intelligent hungry for knowledge uh etc you know we we don't have people coming here just for pure you know entertainment like watching the Rockford files for fun or something you know it's it's you do present it with with grace and with with some fun and things and that that's great.

SPEAKER_01

I think that your your your your uh your um your audience can benefit what for much of the stuff that I've revealed today which is real time stuff so yeah I agree it was a pleasure having you on the show Jim again so we got this very good be back again soon thank you Kimba thank you for listening to the Unveiling Shadows podcast I hope today's episode has shed light on the experiences that too often remain hidden if you or someone you know has a story to share please reach out to me. Remember you're not alone and your voice matters. Follow me on social media and subscribe to the podcast for more inspiring stories. Until next time stay strong and keep unveiling the shadows