Taken at face value, it sounds incredibly sinister: members of the four branches of the US military operating within our borders, infiltrating the populations of seven states, moving covertly, deploying vehicles and aircraft, practicing their techniques for capturing and eliminating threats. There are mysterious meetings, strange maps, reports of missile batteries being set up and even the closing of stores and confiscation of private property. And all of it happening under the guise of a mysterious, sinister sounding code name: Jade Helm 15.
While all of that seems rather horrifying, the truth of Jade Helm 15 happens to be much more pedestrian. It’s a military exercise being carried out by US Special Operations forces, running from July through September 2017, designed to train elite soldiers to deal with new threats and ensure their readiness to survive, react and carry out deep cover missions in hostile enemy territory. In that respect, Jade Helm is no different than the dozens of other military exercises the US has carried out all over the world in decades past, rehearsing everything from the D-Day landings to taking out enemy leaders.
None of what Jade Helm will be doing is new – in fact, it’s quite old. Prussian military forces used war games and live exercises as far back as the 1700’s, and they’ve continued all the way through modern times. Since the advent of combined arms tactics in World War I, where infantry, artillery and airpower all worked together to achieve a common goal, coordinated training exercises have been vital to ensuring every facet of the operation was on the same page. If the guns and the planes and the tanks don’t all know exactly where the infantry is supposed to be at the exact time they’re supposed to be there, people get killed and battles are lost.
The entire operation was publicly announced by the U.S. Army Special Operations Command’s (USASOC) website in March, 2017. Soon enough, like clockwork, the conspiracy panic began. According to numerous “awakened” individuals, Jade Helm was not a military exercise at all, but a hiding-in-plain-sight plan to seed government troopers around the south, institute martial law in the United States, round up or kill dissenters, consolidate Barack Obama’s plan for a third term as president, or even propagate a genocide of Christians and patriots.
A popular YouTube video called Jade Helm “PROOF OF A MASSIVE MILITARY BUILD UP IN AMERICA.” Another video, this one from Alex Jones, declares “Military Lied! Jade Helm Is Training To Kill Americans Who Resist!” Websites are practically breathless with pictures of “FEMA death domes,” claims of Muslim Brotherhood control of the plot, stories of UN troops and prison camps, and, worst of all, the closure of Wal Mart stores in Jade Helm states.
To get to the bottom of what’s going on here, and what isn’t, I’ve put together a bit of a Q and A, (just) asking questions and looking for answers to those questions. Of course, my calm and reasoned tone about this whole thing could be due to my status as a paid shill for the UN takeover – or maybe it’s just because there’s not much to all this.
Q: Isn’t it strange for the US military to use the country it’s supposed to protect as an aggressor in an exercise?
A: Not at all. Military forces have to train somewhere, and it’s a lot cheaper and easier for them to do it in the country they’re based in. The Washington Post found numerous past exercises carried out in the United States, including:
“Bold Alligator, a naval exercise in which thousands of Marines and sailors have been involved in the past. The most recent version was launched last fall, and included amphibious landings to prevent insurgent groups in the fictional country known as Garnet — Georgia and part of Florida in real life — from launching attacks.
In another example, U.S. Special Forces support fictional guerrilla forces in numerous counties across North Carolina in the exercise Robin Sage. Green Beret soldiers work to liberate the country of Pineland, and operate in close proximity to civilians, who are warned that they may hear blank gunfire.”
Q: So what will Jade Helm actually entail? Other than the death domes and mass shooting of Christians?
A: Probably not much that anyone would notice. As one military wonk website put it, “Jade Helm is a Field Training Exercise (FTX) to enhance the SERE (Survival, Evasion, Resistance, and Escape) capabilities of American special operations troops.”
According to a powerpoint presentation by USASOC that leaked onto the web in March, Jade Helm will envelop local patriot communities in an “increased military presence” that might involve some planes flying at night, “individuals conducting suspicious activities designed to prepare them for complex environments overseas” and some personnel who might be “carrying blank ammo” while others will be “wearing civilian attire.”
Q: Even if I’m not a conspiracy theorist, can’t I admit that sounds a bit creepy?
A: Of course. There’s something quite unsettling about military planes flying around at night and armed uniformed men tramping around your town, even if they’re there to practice ways to neutralize threats to you.
Q: What’s the deal with that creepy map? Is it real?
A: Yes, the Jade Helm map that’s driving conspiracy theorists crazy is very real – though, as per usual, taken way out of context.
It’s a map of the Jade Helm training states, with some labeled “Hostile” (Texas and Utah) and others “Permissive” (Colorado, Nevada and California). A few are labeled “Uncertain.” There’s also the usual alphabet soup of military acronyms, a sea of ODA’s and MSOT’s and ODG’s and CRF’s.
Anyone who’s even the slightest bit interested in the workings of a modern military knows that the US Armed Forces loves, loves, loves acronyms. They’re a handy jargon for making sure everyone knows what things are and how they happen while using the fewest words possible. All professions have jargon, and the Jade Helm map is chock full of it.
Q: Yeah, but what about the states? Texas (full of guns) and Utah (full of Mormons) are hostile, while Nevada (full of sin), Colorado (full of legal weed) and California (come on, people!) are permissive? Wake up!
A: Everything done for military exercises like this has a purpose. In this case, simulating the travel time from friendly bases to hostile territories, along with giving the simulation multiple types of terrain to work with. Texas and Utah (along with the “insurgent pocket” in Southern California) have everything from snowy mountains to deserts to beaches, so US troops can practice working in extreme cold, heat, wind, whatever their hearts desire. As part of the exercises, the allegiance of the states will shift, so Utah might start as hostile and become friendly – the same way alliances shift in asymmetrical battlefields like Iraq and Ukraine.
Texas itself already has a multitude of military facilities, along with a population used to being around military exercises – this Jade Helm paranoia notwithstanding.
Q: Does the name “Jade Helm” have any significance? Because I’m hearing some really weird stuff…
A: Conspiracy theorists have numerous explanations for the name “Jade Helm.” One is that it’s actually an acronym, standing for something like “Joint Assisted Deployment Exercise Homeland Extermination Local Militia.” The other is that it’s some kind of nod to the UN takeover, as UN soldiers wear blue helmets and jade is kind of like blue, and helm is short for helmet. Others take note that green is the “official color” of Islam, and make some kind of connection between the name and the mysterious (not really) Georgia Guidestones monument.
In reality, none of these are likely true. Just like the thousands of named military exercises and operations before it, including Bold Alligator and Robin Sage (and Market Garden, Ivy Mike and many others in US military history) the phrase “Jade Helm” was likely just pulled out of a hat.
Q: Okay, but what about the Wal-Marts? They’re closing Wal-Marts, people! How can people prep for the FEMA apocalypse without rollback prices on guns and canned goods?
A: The Wal-Mart thing is both real and a good example of a post hoc fallacy. Wal-Mart did indeed announce that it would close five stores in four states, three of which are Jade Helm states. The reason for these closures was given as “plumbing issues” that would take up to six months to fix.
On the surface, this sounds bizarre and troubling. 2,200 people were put out of work because of bad plumbing? While there are rumors that Wal-Mart closed the stores as retaliation for the workers there trying to organize, there are other rumors that claim these stores were closed to prevent citizens from buying supplies with which to fight Jade Helm jackboots – or as “processing centers” for detainees.
Putting aside the actual reason Wal-Mart closed these stores (was it plumbing problems, retaliation or a little of both?) the miniscule scale of the closures would make no sense as far as Jade Helm purposes. What good is closing five stores (one of which isn’t even in a Jade Helm state) when dealing with the supposed millions of prisoners that would be taken? Why not close stadiums or warehouses? How many people can you cram in four Wal-Mart stores?
Other rumors of tunnels dug beneath these closed Wal-Mart stores leading to…other closed Wal-Mart stores…don’t appear to have any evidence supporting their existence.
Q: Hmmm…this is all starting to sound kind of innocuous. But the FEMA death domes…what’s up with those?
A: Every rumor attached to FEMA being an apparatus of the state killing machine has been shot down with hard evidence. From FEMA Camps to FEMA red/blue lists to FEMA coffins, every single one is either fake or has a real-world explanation. So it goes with the death domes. Pictures of pre-fab domes supposedly erected in Texas have become a staple of Jade Helm paranoia, and it makes perfect sense that an exercise bringing a large number of troops and supplies to a remote area would need a place to put all of it.
An alternative explanation for the pictures is that they’re the very real dual-use domes FEMA erected in Texas to protect residents who were unable to evacuate in the face of a natural disaster like a hurricane. Of course, those domes were put up in 2012, but it’s not unlike conspiracy theorists to take an old picture and pretend it’s a new picture for their own purposes.
Or, hey, maybe they’re death domes. What actually is a death dome? Who knows? Ask FEMA.
Q: BUT…a guy on the internet who lives in New Mexico said he saw “two big dudes walk down my street and put a little red-orange sticker on my mailbox, I confronted them… with thick russian accent one of them stated “Its a marker for the news paper…. i dont get the paper.” And another guy said that “In San Antonio, With a population of 1.5 million, they are marking the curbs in front of the houses, with red & blue X’s, as well as stickers on mailboxes.” Another commenter says “this exercise – part of which involves blending in with the general population of a modern country – would indicate that we’re gearing up for a potential escalation with Russia and/or China.” They can’t all be wrong, can they?
A: Sure they can. Remember, the burden of proof lies with the person making the accusation. If Johnny Internet Commenter thinks Jade Helm is a prelude to Muslim enslavement or UN genocide or Obama martial law or whatever, it’s his job to prove his claim with evidence. And the “evidence” behind Jade Helm being any of these things is remarkably thin.
Q: Even if Jade Helm is nothing to worry about, should I stock up on food, water, guns and ammo just to be safe?
A: I can’t speak to stocking up on guns and ammo. But it’s never a bad idea to have extra food and water around if something terrible does happen. You wouldn’t want to end up in a FEMA death dome, after all.
Discover how to survive: Most complete survival tactics, tips, skills and ideas like how to make pemmican, snow shoes, knives, soap, beer, smoke houses, bullets, survival bread, water wheels, herbal poultices, Indian round houses, root cellars, primitive navigation, and much more at: ►►Books can be your best pre-collapse investment.
Red List, Blue List, Black List, You List
VIA: By Hugh James Latimer
There has been a lot of conjecture in the past 40 years in patriot circles about the existence of government “round up lists”. Large-scale disaster and war planning exercises, like REX-84 (Readiness Exercise-1984) and Jade Helm 2015, have stimulated endless discourse about whether or not the government maintains a so-called “red list” and “blue list” of people that they deem to be dissidents who they might target for harassment, travel restrictions, or even detention without due process of law. Because any such lists would presumably be developed and updated under the wraps of a security classification and the Need To Know rule, this topic is understandably rife with conjecture, speculation, and even downright fabrication. So, in this essay, I will do my best to restrain my inner John Bircher and just stick to the facts. I’ll simply state the facts and add a bit of well-reasoned extrapolation, based on known technological trends.
The Real Face of FEMA
The centerpiece of all the speculation is the Federal Emergency Management Agency (FEMA). In my estimation, most of the chit chat on the Internet about “secret FEMA camps” is highly sensationalized. Civil internment is probably the lowest priority of any of FEMA’s contingency missions, and some would describe it as an almost hypothetical contingency.
Most Americans don’t realize it, but FEMA’s key mission is not disaster relief to the general public. Instead, their highest priority mission is assuring Continuity of Government (COG) following an external attack or following a widespread disaster that disrupts command, control, communications, and intelligence (C3I) assets and processes. If FEMA’s budget were ever drastically slashed, then the very last of their missions to be de-funded would be COG. In FEMA-speak, the COG part of their mission is listed under “National Continuity Programs”. They prefer to use the term Continuity of Operations (COOP), and that same term is used by the Department of Homeland Security (DHS). These taskings fall under the purview of FEMA’s National Continuity Programs Directorate and are organized per the National Continuity Policy Implementation Plan (NCPIP).
The COG/COOP mission was further clarified in 2007, under the National Security and Homeland Security Presidential Directive (National Security Presidential Directive NSPD 51/Homeland Security Presidential Directive HSPD-20. Therein, the term COG morphed into “Enduring Constitutional Government” (ECG).
A wiki article on NSPD 51 notes: “Conservative activist Jerome Corsi and Marjorie Cohn of the National Lawyers Guild have said that [NSPD 51] is a violation of the Constitution of the United States in that the three branches of government are separate and equal, with no single branch coordinating the others.”
A 2009 document prepared for the transition of the executive branch of government to the incoming Obama administration used the following euphemistic vanilla wording to describe FEMA’s COG/COOP mission:
“FEMA provides continuity services, not only for FEMA, but also for the entire Federal government, across the Nation, for common and asymmetric threats alike. It is essential for FEMA to maintain high-performance continuity services in the form of exercises, planning, standards, training, communications, and resiliency measures.”
In the same briefing binder there are also some more concrete but still slightly obtuse descriptions of FEMA’s COG/COOP responsibilities:
The criticality of continuity programs can be traced to three foundations. First, continuity programs, led by NCP, directly reflect the first of eight National Essential Functions (NEFs), “Ensuring the continued functioning of our form of government under the Constitution….” Second, continuity programs form the foundation of the seven remaining NEFs by ensuring that the government structures are in place to govern and support the economic, defensive, and social well being of the Nation. Third, continuity programs form the foundation of the National Response Framework (NRF), ensuring government structures at each tier (local, State, and Federal) are in place under all circumstances to sustain their essential functions, deliver essential services, and accept the assistance provided under the NRF. When government departments and agencies are inoperable and their continuity programs fail, the NRF will also fail.
NCP is responsible for ensuring Federal, State, local, Tribal, and territorial governments are capable of performing their essential functions during any situations that may disrupt normal operations.
Continuity Planning
NCP develops, publishes and trains continuity capability through Federal Continuity Directives and Non-Federal Continuity Guidance circulars, planning templates, and instruction for Federal, State, and local governments.
In a subsection, there is also this description:
Mount Weather Emergency Operation Center (MWEOC):
The MWEOC, located in Berryville, Virginia, is a continuity of operations (d) relocation site for several aspects of DHS and FEMA. The facility provides operational space for FEMA and DHS Emergency Relocation Group members to perform Departmental and Agency mission essential functions.
“A Billion Here, and Billion There…”
In recent Federal budgets FEMA’s Disaster Relief Fund has ballooned to around $7 billion per year, but that comes out of a more than $10 billion annual budget. So where is the other $3 billion spent? It’s spent on a whole lot of things, and many of them fall into categories like “administration, training, and interagency liaison”. Even though the big bunkers were built decades ago, still included in FEMA’s budget are many line items that relate to intelligence fusion, “national continuity”, and “continuity of operations”.
When FEMA Administrator Craig Fugate testified before the congressional Subcommittee on Disaster Preparedness about his agency’s 2015 $10.38 billion budget request, he pointed out that the FEMA is now working more closely with the DHS. Another key point that came up in the hearings was that 2015 was the first year that 25% of the agency’s budget was not formally set aside for law enforcement/terrorism prevention.
With its traditionally strong COG/COOP emphasis, FEMA long ago invested many billions of dollars to ensure continuity of the executive branch of the Federal government. The Mount Weather complex is reportedly just one of several redundant deep underground bunkers. Some of these facilities were developed by other government organizations, partly for the sake of redundancy. Although they have established deep hardened bunker facilities with accommodations for Federal legislators and some Federal judges, their main focus is directed toward sheltering the White House staff and the directors and key staff of all of the Federal law enforcement agencies. Meanwhile, the U.S. military organizations each have their own infrastructures in place for protecting both their C3I networks and safely housing their general staff and related personnel.
Because of security classifications, it is difficult to know exactly how FEMA’s budget is being spent and how much of that might be directed toward contingency plans for housing of “displaced persons”. A lot could be hidden under that guise. Essentially the only difference between building a temporary city to house natural disaster refugees and one that is built to house detainees is the presence or absence of concertina wire perimeter fences. Parenthetically, I’d be curious to know if FEMA has ever put out Requests for Quotation (RFQs) for the manufacturers of concertina wire or razor wire, as measured in miles. However, here, I’m straying into speculation. So let’s get back to the facts at hand.
The J. Edgar Days
In the late 1930s, the FBI developed lists of individuals on cardstock index cards. One of these was the Custodial Detention Index (CDI), also known as the Custodial Detention List. This list was compiled between 1939 and 1941 under the “Alien Enemy Control” program. According to one published report:
“The Custodial Detention Index was a list of suspects and potential subversives, classified as ‘A’, ‘B’ and ‘C’; the ones classified as ‘A’ were destined to be immediately arrested and interned at the outbreak of war. Category A were leaders of Axis-related organizations, category B were members deemed ‘less dangerous’ and category C were ‘sympathizers’.”
After the United States entered World War 2 in 1941, these card file lists were put into operation. Large numbers of German, Italian, and Japanese nationals were rounded up and questioned. However, a disproportionately large number of Japanese were actually put in long-term detention—including thousands who were U.S. citizens living in coastal areas, ostensibly because the government “didn’t want to break up families.” This was a gross violation of civil rights, but given wartime exigencies it was hardly even questioned by most Americans until after the war was over.
According to research by the Federation of American Scientists (FAS), the FBI’s habit of building card catalogs of people did not end with World War 2. In the 1950s they moved on to building lists of Communist agents, subversives, and their fellow travelers. After the shocking revelations about Julius and Ethel Rosenberg, Claus Fuchs, and other nuclear weapons technology spies, this recordkeeping seemed well-justified.
By the late 1960s, when anti-draft protesters were a big concern for the executive branch, the FBI moved on to develop yet another list (actually a group of lists) called the Administrative Index (ADEX). This was before the FBI computerized their operations, so this was still a paper list on index cards. (It was perhaps later supplemented by Hollerith computer punched cards.) Additions to the ADEX were reportedly suspended in early 1978. But before it was discontinued and moved to their inactive files storage, the ADEX cards had merged several sublists, including the “Agitator Index” and the “Reserve Index”.
Automating The Lists
In the 1980s, following the lead of the early-adopting NSA and Atomic Energy Commission (AEC), the FBI moved into the computing age. Other than a few revelations about REX-84, very little has been revealed about any enemies lists that were developed in the 1980s and 1990s. Even REX-84 itself would have been nothing more than a obscure codename, if it were not for the much publicized Iran-Contra hearings that captivated the American public through what would have otherwise been a boring summer.
The following appears in Wikipedia’s entry on REX-84:
Transcripts from the Iran-Contra Hearings in 1987 record the following dialogue between Congressman Jack Brooks, Oliver North‘s attorney Brendan Sullivan and Senator Daniel Inouye, the Democratic Chair of the joint Senate-House Committee:
[Congressman Jack] Brooks: Colonel North, in your work at the N.S.C. were you not assigned, at one time, to work on plans for the continuity of government in the event of a major disaster?
Brendan Sullivan [North’s counsel, agitatedly]: Mr. Chairman?
[Senator Daniel] Inouye: I believe that question touches upon a highly sensitive and classified area so may I request that you not touch upon that?
Brooks: I was particularly concerned, Mr. Chairman, because I read in Miami papers, and several others, that there had been a plan developed, by that same agency, a contingency plan in the event of emergency, that would suspend the American Constitution. And I was deeply concerned about it and wondered if that was an area in which he had worked. I believe that it was and I wanted to get his confirmation.
Inouye: May I most respectfully request that that matter not be touched upon at this stage. If we wish to get into this, I’m certain arrangements can be made for an executive session.
Closely associated with REX-84 was Inslaw’s Prosecutor’s Management Information System (PROMIS) people-tracking software. For the sake of brevity, I won’t delve into that. But suffice it to say, PROMIS was fairly simplistic old technology that has been supplanted by much more sophisticated database search software.
Main Core
According to an article written for Salon magazine by Tim Shorrock in 2008, the NSA was the lead agency in developing a comprehensive personalities database called Main Core. This is the code name of a database containing personal and financial data of millions of U.S. citizens who are believed to be “threats to national security”. The Main Core data is compiled from the NSA, FBI, CIA, and other agencies. It is believed that this database (or we can safely assume its successor, under a different name) is still active and growing.
The latest conjecture is that in recent years the Main Core successor program has moved into social media sites, such as Facebook, using them as veritable vacuum cleaners that sweep up personal information. By applying some sophisticated algorithms, the Main Core apparatus determines threat levels and builds extensive “contacts webs” of familial ties and social relationships in an attempt to piece together organizational structures—both formal and informal.
Through a PRISM, Darkly
When taken in the light of the public revelations about the PRISM surveillance system that correlates private communications on the Internet, the implications of Main Core now go well beyond just “list keeping”. The presumed fusion of intelligence data that is going on has undoubtedly resulted in the creation of nested and prioritized lists of individuals to be tracked, travel-restricted, questioned, or detained, under a variety of crises.
Given the well-documented flaws in the FAA’s No Fly List, the errors that can be assumed to exist in Main Core’s successor databases could very well lead to the false arrest of hundreds or even thousands of people. Furthermore, if these databases were misused and applied to political reasons rather than legitimate counter-terrorism investigations, then it would open Pandora’s Box for tyrannical abuse.
Again, I discount the claims that there are “FEMA Camps” that have already been specially constructed to keep teeming masses behind razor wire. To the best of my knowledge, all that FEMA has done thusfar is to study and designate existing Federal military reservations as potential detention facilities. But there are almost certainly some very lengthy “round-up” lists of immigrants with ties to terrorist organizations. That in itself is perfectly justifiable, given the nature of 21st Century transnational terrorism. However, I fear that the names of tens of thousands of outspoken native born American citizens with high profiles have been listed in one or more databases as “persons of interest” by various agencies.
The fairly safe presumption of well-established Bad Boy lists that include native born American citizens troubles me, on several levels. Perhaps my biggest concern is that any such lists represent the intent of Federal officials to impose prior restraint, or worse yet their intent to flag “pre-crime” tendencies of law-abiding American citizens. This sort of segregation and prioritization forms the basis of a future “shopping list” for tyrannical bully boys, in the event of a national crisis. This crisis could be triggered by any number of events, including a natural disaster, a foreign terrorist attack, a domestic terrorist attack, an unattributable or misattributed cyber attack, a banking/equities market panic, a rigged/contested election (or a suspension of elections) leading to a constitutional crisis, et cetera.
Black List
If anyone reading this is politically active and is an outspoken champion of personal liberty, then it is probably safe to assume that you are already on some sort of list, at least a “watch list”. You might also be on a cyber black list, targeting you for disinformation/discrediting campaigns or perhaps for DDOS ping attack hacking. (It is no coincidence that DDOS ping floods are more frequently directed at politically outspoken blogs and web sites.) The key question is: what is your priority on those lists? If someone is a high priority for travel restrictions or detention, then their passport would be immediately flagged and they might not have the opportunity to leave the country via conventional means– through normal passport controls.
The recent events at the Malheur Wildlife Refuge in Harney County, Oregon illustrated that quickly removing the leadership of any political organization through targeted arrests can render it impotent or at least mute it in the court of public opinion. Think that through: Leaderless groups with redundant secure means of communication are the wave of the future. Activist groups like the Black Panthers were the 20th Century norm. Groups like Anonymous will be the 21st Century norm. But be aware that the use of social media and non-secure communications can be used by governments to build dossiers or even indictments against political organizers. (Facebook was specifically mentioned several times in the recent Malheur indictments.) It is best to avoid social media entirely, but if you must use it, then choose your words wisely!
You List
As I have written before, it is important that all prepared families keep their passports updated. You should also have a Plan B and a Plan C. If you suspect that you are high on a priority list, then you might need a Von Trapp family (The Sound of Music) walk-out escape plan. If you live near a coastline, then making the acquaintance of a deep sea trawler operator or a blue water yachtsman might be something to put near the top of your “to do” list.
Stay Vocal
I must urge my readers to not feel buffaloed into silence. If we allow ourselves to be frightened into political inactivity and Gray Man obscurity, then the tyrannical statist opponents of liberty will have won. Silence is tacit consent.
An acquaintance of mine who recently retired from blogging is fond of saying: “Never get on the bus.” I consider that sage advice. Just consider the fact that there are as many unregistered firearms in this country as there are adult citizens. We vastly outnumber those who might someday seek to enslave us. No attempt to round up a large segment of society will be successful if enough people refuse to register their guns, they keep their guns loaded, and they have the willingness to use them. We also have to well in advance commit ourselves to living through the angst of hiding any fellow citizens who come under persecution.
Lastly, we must never lose our vigilance about the encroachment of tyrannical new laws and policies. Take a few minutes to consider the Jews in the Attic Test.
This has been a heavy topic to consider, but I felt strongly convicted that it must be raised. Our liberty depends on it! – JWR
Disclaimers: None of the foregoing is based on any of the briefings or files that I had access to, when I held my TS/SBI security clearance and access to SCI, back in the 1980s and 1990s. Everything contained in this article was compiled from published, open sources. Your mileage may vary. Just avoid any mileage on The Bus.
“If you are an ordinary person, then you can prepare yourself for war by moving to the countryside and building a farm, but you must take guns with you, as the hordes of starving will be roaming. Also, even though the elite will have their safe havens and specialist shelters, they must be just as careful during the war as the ordinary civilians, because their shelters can still be compromised.”
Henry Kissinger