Operatives at WEF Davos volunteering for a Disease X rollout were hunted down, five decades of scams used to extract unpaid labor from operatives finally stand exposed, and China's century-long plan to inherit global power collapsed on January 19, 2024.

Overview

1. Davos Operatives Identified and Targeted

Three to four weeks before the World Economic Forum began, fixers, freelancers, and deal-makers arrived in Davos to structure the payouts behind a coming Disease X narrative. The Coalitions, Legions, and the newly joined REDS targeted operatives who had identified themselves as willing to implement Disease X.

Many did not leave Davos alive. Antony Blinken’s plane breakdown, per Kim, was not a coincidence.

2. Five Scams, Five Decades of Unpaid Labor

Kim and Tom walk through the historical sequence of schemes used to extract operative labor without ever paying for it: the Iraqi Dinar, rough diamonds routed through a Rothschild-controlled Gemological Institute, $27 trillion in duplicated super notes printed under George H.W. Bush, a US Treasury digital coin with deliberate back doors, and Trump Bucks.

Each scam shared one design principle: obtain something for nothing. What was new in 2024 is that the operatives still holding these instruments, across decades, are refusing to work another day until past-due ledgers are cleared.

Pattern recognition: Bush-era scams all carried 1% truth as a hook (Iraq is a real country, diamonds are real, the US dollar is real) and 99% fabrication. Trump Bucks lacked even the 1%, which is why it collapsed and the scheme reverted to US Treasury digital coin narratives.

3. The Fed Is Defunct, Jurisdictions Dissolve

A Federal Reserve insider who works directly with the Fed President confirmed to Tom on January 17, 2024 that the institution is completely defunct. The Omega system underpinning the old credit-based architecture is gone.

The 12 global banking jurisdictions, each governed by one of the US Fed regional boards, are dissolving along with central banks and treasuries worldwide.

4. The 100-Year Plan Fails, ICJ Exposed

A Chinese General fabricated KIMS access codes claiming Kim had authorized payments. NATO mobilized 90,000 troops on the lie. The general has since been removed.

On January 19, between 100 and 200 deep state members across China, Singapore, the Philippines, Japan, and Malaysia committed mass suicide as China’s 100-year transfer-of-power plan was recognized as dead. Meanwhile, ICJ representatives walked into the Pentagon uninvestigated, claiming to work for Rothschild.

Key realization: The 100-year plan always had one missing piece: the person sitting in Kim's chair. Every transition of power throughout history required that role to authorize the shift. Kim did not and will not, and the deep state never understood this piece even existed.

Body

1. WEF Davos: Operatives Identified and Targeted

Symbolic Alpine village with empty hotel facades under a heavy winter sky, rendered as a quiet stage where unseen meetings have already concluded
Davos as the quiet stage where the substantive deals had already been struck before the cameras arrived.

Kim states it is important to understand what happened in Davos at the beginning of the week to understand where operatives and freelancers are currently manipulating governments and elites.

Kim explains that all governments are effectively run by operatives. One could say the government is the operatives. Those operatives typically report to deep state actors. About three to four weeks before Davos begins, the fixers, freelancers, and deal-makers arrive ahead of the public-facing politicians. By the time politicians appear on stage, the substantive work has already been done behind the scenes through months of prior communication.

This year’s WEF theme was “Rebuild Trust.” Kim states that in the same breath, WEF announced a coming Disease X situation with large associated payouts, alongside repeating narratives from three to four years earlier.

Operatives on the Disease X Program Were Identified

Tom states that this year the fixers, operatives, and freelancers arrived at Davos with the directive of setting up Disease X and its payments. He describes three reasons operatives attend Davos: to get paid, to learn the upcoming narrative, and to have their egos reinforced.

However, Tom notes this year was different because many operatives are now aware that things are not going as planned. Despite this, they completed their three-week work and left with offers on the table.

Tom states that many who showed themselves at Davos were targeted because they are individuals willing to implement Disease X, willing to participate in a program to harm humanity.

Kim adds that many of those individuals did not make it out of Davos alive, and states there was nothing mechanically wrong with Blinken’s plane.

Tom explains that at the beginning of the week he received intelligence that attendees were to be targeted for either execution or interrogation. He notes the cleanup effort is ongoing even if it is not visibly apparent. Tom states that Lloyd Austin’s hospital story is contradicted by claims he was in a bunker in Ukraine. Tom dismisses both accounts as fabrications.

Tom describes a situation of deep confusion among operatives who do not know how to maintain their narrative, partly because many are now running scared.

Tom believes Blinken chose not to board his plane because he would not have survived the flight, and that many others have similarly run to safe houses that are no longer actually safe.

The Coalitions, Legions, and REDS Cleaning Up Non-Repairables

Kim identifies three groups now taking action: the Coalitions, the Legions, and, notably joining them, the REDS. Kim explains that the REDS are Retired Extremely Dangerous people: former operatives who have grown tired of being sent on missions without compensation.

Kim states these individuals do not take kindly to not being paid, are refusing the many ridiculous contracts being offered, and joined the cleanup effort when they saw others taking action. Kim identifies this as the reason the group known as Langley 5 (a CIA-linked operations unit) spent two days in a bunker.

Tom adds that his role is boots on the ground at a lower level than Kim’s. He comments positively on Agent M’s performance from the previous week, citing the quality of intelligence coming from the Middle East.

2. Five Scams: How to Get Operatives to Work for Free

Allegorical balance scale weighing rough diamonds, paper currency stacks, and digital coin glyphs against an empty pan to show the unfundable design
Five instruments designed to look like payment, weighed against a pan that never balances.

Kim and Tom review the historical sequence of scams used to obtain unpaid labor from operatives.

Scam #1: Iraqi Dinar

Tom states that his experience began with the Iraqi Dinar and promises made by elites and handlers that the Dinar would be used to pay operatives for their work. Tom states he was one of the main participants who structured the Iraqi Dinar scheme through the White House, through a gentleman who holds all the records of how that false narrative of new Iraqi currency was created.

Tom states he promoted it at the time without understanding it was fraudulent. Tom quotes Meyer Rothschild, from a phone call Tom and Kim both participated in, as describing all these currencies and promises as “carrots for jackasses.”

Kim confirms she was personally on that phone call with Meyer Rothschild together with Agent M.

Tom adds that the currencies, historical assets, bonds, Pacelli notes (Kim notes this may refer to Eugenio Pacelli, elected Pope just before World War II), and FED boxes that started with the Clinton era all trace back to narratives established in that period that continue to this day.

Kim confirms that on the surface level, yes, everyone is still waiting to cash this material, and that all of these operatives, fixers, and freelancers are still holding it.

Bush Senior Owned the Dinar Printing Presses

Kim states that at her level, the Iraqi Dinar was always a scam from the beginning, a point confirmed both by Rothschild and, when alive, by Marduk, who stated it would never happen.

Kim states as a fact that all new Dinar printing presses were owned by George H.W. Bush (code name: Black Eagle at the time). Bush printed approximately seven quadrillion worth of Dinar.

Kim notes that money operates on supply and demand, and that no realistic time horizon exists for Iraq to produce a GDP sufficient to support seven quadrillion Dinar in circulation.

Kim explains that Bush Senior’s consistent goal was to get everyone to work for free, a pattern that extends back to his father Prescott Bush during World War II.

Historical context: Hitler (code name: Brown Eagle), second in rank under Mussolini (Black Eagle at that time), was running out of funding for the war and for the concentration camps and Project Paperclip-related human experiments. Hitler offered $2 million per Jewish prisoner to the Rothschild families, which Kim refers to as the Khazarian Mafia. Hitler's offer dropped as low as 50 cents per head. Rothschild refused to pay regardless, creating the beginning of the Black Eagle Trust from the Spoils of War.

Scam #2: Rough Diamonds

Kim states that for a long period the currency of the black market underworld was rough diamonds, knowing full well that the Rothschild-controlled Gemological Institute regulated the only pathway to convert those diamonds into recognized monetary value. Without passing through the Institute, a diamond has no bankable value.

Kim compares this to gold requiring a Hallmark. The controlling parties knew they could pay operatives in uncut stones while retaining the power to determine whether those stones ever achieved value, making themselves the only buyer in the world.

Kim states that this is why diamond cutting expanded in India and Russia. Both have large diamond supplies, and both countries sought ways around Gemological Institute control. Kim emphasizes that diamonds are not as rare as the public believes. What is rare is getting a diamond through the Gemological Institute and having it emerge still certified.

Kim mentions personally knowing individuals paid in gemstones taken during the fall of the Shah and from operations in India, people holding enormous rubies who have been unable to leverage them at any bank for at least 15 years.

Tom confirms he has met such individuals, operatives holding unfulfilled ledgers, who refuse to cooperate with new structures until their past-due payments are settled first.

Scam #3: Pallets of Super Notes, $27 Trillion

Kim states that in the 1970s and 1980s, Bush also printed $27 trillion in what Kim calls super notes: fake US dollars distributed worldwide, with printing presses in Iran, the Philippines, China, Latin America, and Vietnam. The correct paper, correct MICR ink, and correct printing processes were used.

Tom clarifies that everything about the super notes was correct, the look, feel, smell, and ink, except that the allocation numbers are duplicated, allowing the same numbers to be reused indefinitely. Tom states he was tasked to locate all these assets worldwide alongside a group of Generals. One General was charged with moving money printed through Deutsche Bank into Iraq and Iran to pay operatives and fund wars, but the currency was unfundable because its allocation numbers were progressively removed from the system.

Tom explains that removing allocation numbers was the key mechanism for limiting the deep state’s ability to fund harmful operations, a strategy that contributed to the deep state’s long-term downfall.

Kim confirms: no one has successfully cashed pallets of super notes - not the Iranian Revolutionary Guard (trying since 1979), not Saudi Arabia (since Desert Storm), not the Iraqis, not the Russians from the Cold War era.

Kim describes a specific case. The Lebanese President received approximately $100 million in these notes to allow a destructive situation in Beirut, and that payment has also never been redeemed.

Scam #4: US Treasury Digital Coin

Kim states that after the pallets of cash began to fail as reliable payment, the regime shifted to Iraqi Dinar as the new currency, paying ISIS, the Taliban, Blackwater, and countries alike. When that narrative faded a few years ago, the replacement became the US Treasury Coin: digital currency in wallets that never came to fruition.

Tom states the digital platform was designed with two purposes: to get operatives to continue working, and to build in back doors to crypto wallets for theft. Tom dates this to 2014 and 2015 and describes it as ingenious, noting that everyone fell for it and that crypto has gone nowhere since.

Tom warns that NSA and cyber units can walk into any platform built on Bitcoin or blockchain at any time and crash it, taking the money.

Kim adds Trump Bucks and Dogecoin to the list. Kim states Zelensky holds Trump Bucks. Tom mentions Elon Musk’s coinage system as another variant.

Kim states she has offered to help people who spent their real money buying these instruments on the internet, though not those holding seven quadrillion Dinar. She notes that the dangling carrot was set so large, promises of seven times or one hundred times face value, plus entry into non-existent high-yield trade programs, that when Kim offers a realistic settlement, she is laughed at.

Kim states there are people who will die broke waiting for payment that will never arrive.

Scam #5: Trump Bucks

Kim states the only meaningful difference between the Bush-era Dinar scam and Trump Bucks is that Bush, as a CIA founder, knew how to construct a credible lie: 1% truth and 99% fabrication. The 1% truth in the Dinar case: Iraq is a real country with a real currency, and currency revaluations have genuinely occurred in Kuwait, Brazil, and Argentina. That 1% was sufficient to achieve broad buy-in.

For Trump Bucks, Kim states there is no “Trump country” and no existing Trump currency with market value. It is equivalent to buying novelty billion-dollar bills. Kim states this reflects a group of operatives so deep in their own narrative and ego that they genuinely believed Trump’s brand name was sufficient to underpin a new currency.

Kim states the DARPA coin, a large chip-format currency tied to the same scheme, is another example. The design principle is the same in both cases: obtain something for nothing. Kim states Trump Bucks failed precisely because the 1% truth element was absent, which is why the scheme quickly transitioned back to the US Treasury Digital Coin narrative to add back that credibility element.

Tom warns that if Trump enters the White House, people should not expect him to make those currencies valuable. It simply will not happen.

Why these scams work: The design principle is always the same. Offer a carrot so large that the holder cannot accept a realistic settlement, then attach enough surface legitimacy (real country, real currency, real institution) that the target believes the payout is one more step away. The work is extracted in the waiting.

3. Fed Insider Confirms the Reserve Is Defunct

Abstract neoclassical bank facade hollowed out from within, with the columns intact but the interior dissolving into ash and dust
The facade holds. The architecture inside has already collapsed.

Tom recounts that on Wednesday evening, January 17, 2024, he spoke with a gentleman who works in the halls of the Federal Reserve buildings and with the Fed President, and who works for the Bauer family (one of the names used by the Rothschild banking dynasty).

This insider told Tom that because of the system flip Kim announced, from credit-based assets and humans as collateral to gold-backed assets tied to individual humans as the power source for money, the Federal Reserve is completely defunct.

Tom's contact, who works directly with the Fed President: the Federal Reserve is completely defunct following the shift from credit-based to asset-backed foundations.

Tom explains the mechanism. Until now the Fed could approach Kim’s system to sign agreements to continue processing US dollars and generating allocations. The Fed chose not to renew this contract in 2012. Ultimatums were issued and Fed Presidents warned over the years, but no one listened.

With the Omega system (the credit-based foundation underlying the old financial architecture) now gone and replaced by an asset-based gold-backed foundation, the Fed’s systems cannot function. Tom states the Fed will continue to claim otherwise and will project an image of functionality, but the insider confirmed they are done.

4. Jurisdictional Banking Dissolves

Kim explains that for those familiar with international banking, the world operates under 12 banking jurisdictions, plus a 13th jurisdiction from which the Alpha system and Omega’s lenders of choice distributed money at density level 8 (the second-highest tier in Kim’s asset-distribution hierarchy).

Each of the 12 US Federal Reserve Boards governs an entire global banking jurisdiction, not merely its US regional zone. For example, the San Francisco Fed might govern a jurisdiction covering California and Pacific-rim countries. The Boston Fed might govern New England and other North Atlantic zones.

Kim states that as the financial system integrated further into an asset-backed gold-based system this week, jurisdictional control dissolved. Kim states that as of the broadcast morning, there are effectively no central banking systems remaining and no treasury systems remaining. Kim describes this as a positive development for banking and for sovereign nations.

Truth Is a Hard Pill to Swallow

Kim and Tom confirm that agencies, operatives, and militaries worldwide listen to their broadcasts as a matter of routine. Tom notes that their intelligence notes consistently corroborate each other, and that deep state listeners cut off their calls when they dislike what they hear, preventing other operatives from learning the truth.

Tom mentions receiving news just before the broadcast that naval vessels had gone dark - their tracking signatures disappeared - which shocked the cyber security personnel monitoring them until Tom explained what had happened in context of the fabricated codes.

5. The Fake Chinese General and NATO’s 90,000 Troops

Kim recounts that on January 18, 2024, around 3:00 PM EST, she observed a sudden surge in people attempting to enter access codes into KIMS (Key Intelligence and Military System) and Treasury systems. Attempts came from Iran, Iraq, Pakistan, the US Pentagon, the US Treasury, and the Chinese Treasury. All were rejected. Kim did not recognize the codes and had not issued them.

Tom received a call from a Colonel in the Pentagon’s financial division, who works with the AVIL P4 system and Net6 for DOD funding, asking whether the GIA or Kim had issued codes and authorized payment to the DOD and Pentagon. Tom confirmed that no such authorization had been given.

Chinese General Claims He Struck a Deal with the GIA

Stream of mismatched cipher digits scattered across a glowing terminal screen as the system rejects each fabricated access code
Codes invented from memory, rejected on contact.

Kim traces the codes back to their source: a Chinese General with so many code names Kim does not know his real name, referred to in the broadcast as General 1 Hung Low.

This general took diplomatic messages Kim had sent via diplomatic line to the Pentagon, all global militaries, NATO, and intelligence agencies, and falsely claimed to the tier below him that he had struck a deal with Kim, was now with the GIA (Global Intelligence Agency, the world’s oldest intelligence organization, directed by Kim since 2012), and that money would be released no later than 3:00 PM that day.

He then generated fabricated access codes, possibly from memory, possibly invented. None were real.

When Kim and Tom spoke that evening, Tom confirmed: they all fell for it.

NATO Believed the Lie and Mobilized 90,000 Troops

Tom states that NATO Allied Forces mobilized 90,000 troops to fight Putin, believing money was imminent. Tom’s phone flooded with calls. Tom’s response to all of them: no, the GIA would never agree to terms and conditions of war.

Kim adds that the lie triggered additional activity. Iran moved ballistic missiles. Pakistan bombed Iran (something Kim notes had not happened since around 1980). More chemtrails were deployed. An undisclosed cache was found in Puerto Rico. Broader plans were set in motion across multiple theaters.

NATO mobilized 90,000 troops because one Chinese general claimed over the phone that money was on the way.

No One Bothers to Verify Anything in Their World

Kim states the Chinese General was located and is no longer alive. Kim expresses genuine confusion that in the last 48 hours, during which she had stated repeatedly on open phone lines that the Chinese deep state is “the worst of everyone in the world,” anyone could believe she had struck a deal with a Chinese General.

Kim notes the NSA, the Pentagon’s Defense National Intelligence division, GCHQ, and everyone on Tom’s phone would have been monitoring and could have verified the falseness of the claim instantly.

Tom asks rhetorically whether the intelligence network is so broken that no one validates who is actually giving orders at this point.

Kim explains that the General was using a known book of code names, including names like “the Devil’s Wife,” “the Black Mula,” and others, with specific numbers attached, matching codes to the relevant country or organization being called. Some were Bush’s old names. Kim states she possesses this same code system and could herself use those names to issue any instruction she chose.

Kim states publicly, with Tom present on camera: NATO now knows there is no money coming from the GIA, and this will never happen.

6. Asian Generals Commit Suicide: 100-Year Plan Ends

Ancient parchment scroll spread on a planning table with century-mark rings inked across it, the final ring left empty as the scroll begins to unravel from the edges
A century of planning, with the final ring left empty.

Kim states that at approximately 8:30 AM EST on January 19, 2024, mass suicides began among deep state members across China, Singapore, the Philippines, Japan, and Malaysia. At least 100 to 200 people.

Kim states she expected this to begin appearing in mainstream media, alongside coverage of the Chinese stock market free fall that authorities had been suppressing. In the deep state world, Kim explains, suicide is considered a more honorable fate than surviving with the shame of failure, which is described as losing face.

The 100-Year Plan Is Missing Its Final Piece

Tom recounts a phone call with a contact in China that morning, on which additional deep state members were also present. The Chinese participants described the execution of their 100-year plan as flawless. China had infiltrated the US through its borders, infiltrated the military, and purchased large amounts of US real estate to prepare for the transfer of power. All their boxes had been checked.

However, Tom explains, the execution was a complete disaster in outcome. Tom told his contact: the plan could never succeed without the cooperation of the person sitting in Kim’s chair.

The contact acknowledged this was true. Everything that was supposed to happen after successful implementation depended on Kim’s chair-holder pushing the buttons to shift power over. Kim did not do so and will not. The deep state never understood that their plans always had Kim’s chair as the final, missing piece.

Nobody Is Supporting the Transition of Power

Kim elaborates: she has explained on a whiteboard that the former system operated on a 21% Alpha to 79% Omega split. This is the proportional energy-governance arrangement between Source-aligned and Marduk-aligned systems underpinning the old order.

No human, including the Coven Masters (senior occult-order leaders), the Parents (progenitor bloodline heads), or even the Abraxas (the highest non-human authority in the old order), ever had the full story or full control over any plan handed down to humans, including the power transfer plan.

When Britain transferred power to the United States decades ago, that transition succeeded because a non-human entity held partial access to both Alpha and Omega simultaneously, enabling the transition. This was before Kim’s time in the role.

Kim notes the deep state carried out their tasks. They attempted to seize African mineral resources, fully infiltrated the US government over a century (beginning with the Federal Reserve), and believed they had completed their checklist. But they did not have all the elements needed. Whatever they expected to activate on the evening of January 17th or 18th, the final trigger mechanism, simply did not exist on their side.

Kim states the Chinese deep state has broken China in every way a country can be broken: a karmic outcome, given China’s deep state tried equally hard to break the United States. Kim notes that US military assets (disease ships offshore) and US agencies (continuing chemtrail deployment) are still operating on promises tied to the GIA money they expected to receive.

No Chinese People, No General, No Descendants of the Order Work for the GIA

Kim states she has hidden the GIA financial account to prevent further false claims of access.

Kim states that everyone who genuinely works for the GIA is registered in the intelligence systems of every country in the world: military and intelligence databases globally. Kim’s name is there, Tom’s name is there, and a small number of others, some listed only as Agent X. Agent X designations still show up when run through any intelligence database, with a clearance level noted.

Kim states definitively: no Chinese people work for the GIA. No one who has ever held the rank of General anywhere on earth, seen or unseen, is in the GIA. No descendants of Bush, Hitler, or anyone else from the old Order are registered with the GIA. No sheriff, no Van Kemp, no Trump, none of their operatives. None. The GIA is under entirely new management with new personnel.

Kim Knows the Code Name System and How It Works

Kim states she understands the code name system completely, including names like “Alice,” “the Devil’s Wife,” and others used in deep state communications, along with the number sequences that authenticate the caller. She notes she could use any of those names herself and issue instructions that would be followed without question. Kim observes the absurdity: these individuals would probably obey almost any instruction delivered with the correct name-and-number combination, regardless of legitimacy.

Kim and Tom restate publicly: NATO has been notified that no money is coming, and no such agreement will ever be made.

7. Pentagon Chaos and the ICJ Cannon Fodder

Empty marble corridor inside a fortress-like government building, side door propped open with two unverified visitor badges left on a desk
An open door, two badges, no verification.

Kim states that the Rothschild family created a group called the International Court of Justice (ICJ) and uses its members as monetary cannon fodder. ICJ members are described as ordinary people who are told they are Nephilim (fallen angels), chosen ones, and are brought into ceremonies to reinforce this identity.

Their actual function is to perform financial transactions at the direction of the Rothschild family, moving money between accounts, or taking actions against whomever opposes the family.

The ICJ is monetary cannon fodder for Rothschild.

Power Brokers Posing as the International Court of Justice

Kim explains the mechanism used since 2007. ICJ members are given access codes and sent to banks to move funds as directed. They believe they are fighting bad actors. In reality, they serve as a protective shield for the Rothschild family: if a transaction goes wrong, the ICJ member is exposed rather than the Family.

Membership in the ICJ is available to anyone who professes belief in their Nephilim identity and “Family values.” ICJ members are on LinkedIn. Their actual role is as power brokers. Examples include moving money from Pakistan to Iran to enable a subsequent attack that can be attributed to a named individual rather than the Rothschild family.

The Defense National Intelligence Lacks Intelligence

Kim recounts that on January 18, 2024, ICJ representatives showed up at the Pentagon claiming to be there on behalf of Rothschild and wanting to talk. According to Kim, Pentagon personnel admitted them, offered them coffee, and held discussions without conducting any verification. No checks on the individuals’ backgrounds, criminal records, or national security threat status. The sole qualification accepted was the claim of working for Rothschild.

Kim addresses this directly. She tells the truth every time, and yet is disregarded because she is not part of the bloodline network. Yet a person claiming to represent Rothschild was admitted without verification. Kim identifies herself as being from the opposite bloodline of her predecessor (who was not on humanity’s side and is now deceased), states that all contracts are expired, and that no one is coming to help the deep state.

8. Closing: Where This Leaves the Deep State

Tom recounts receiving a call just before the broadcast from a contact who transfers budget information between Congress and the White House, a function similar to what Tom himself once performed. The contact asked whether the budget that was about to be submitted would be ratified, because the rumor of GIA money had circulated. Tom’s answer was no. It will not be ratified.

Tom states that without a formal, recognized agreement, signed by a government agency that has officially acknowledged Kim’s identity and role, and that has sat down to negotiate terms for peace, restoration, and cooperation, no budget ratification will occur. Tom says this to anyone expecting money based on General 1 Hung Low’s false claims.

Kim adds that the mere use of a code name does not confirm identity. Code names like “Dark Prince” no longer correspond to real positions, as the entire Order is defunct. Kim and Tom invite any government representative to simply call and begin a real conversation rather than continuing the cycle of fabricated claims and rejected budgets.

Tom states there is no longer any bureaucratic hierarchy above Kim, no intermediate layers requiring approval from a higher power. The process is now direct: any government that wants to begin restoration and receive funding can do so through a conversation with Kim. Tom asks: do you want to do this the hard way, or the easy way?

Kim closes by asking what happened to “God and country,” to the oath sworn to protect 300 million Americans and 8 billion people worldwide. Kim states the reason governments avoid the conversation is that they would rather continue their other programs.

Kim says the GIA’s offer is equally lucrative, possibly more so, than the old system, but earned through actual service to people rather than through promises of currency that will never be cashed. Kim states the insanity of the deep state continues.