The Security Dominion contract that has underwritten deep state control over gateways, finance, militaries, and biology is reaching its expiration with no counterparty left to renew it.

Overview

1. The Contract in Its Final Days

The Order of the Black Sun’s Security Dominion, a contractual system granting control over gateways, financial systems, military infrastructure, and biological technologies, is expiring as of early December 2025.

Every year the deep state runs the same solstice power grabs and falls short. What makes this December different is that there is no longer anyone on the other side of the table to renew the contract.

2. The Two-Phase Current War

On November 28, the Order of the Black Sun attempted to use Kim directly as a power source. When that failed, they tried to cut off all Source current and reroute it through Buenos Aires for transmutation into anti-creation.

Both phases collapsed by December 2, and the Halls of Current, the energy-distribution counterpart to the Halls of Records, were dismantled by Tuesday evening.

Solstice timing: The Black Sun's birthday on December 5 coincides with a full moon. They expected a present or blessing from Satan or Lucifer; instead they meet an empty table.

3. Durango: Nine Years of Failed Attempts

Kim has lived in Durango, Colorado since 2016 because the deep state believed she could help reopen the largest gateway in the Omniverse, which has been malfunctioning since 2015.

Every attempt over the past nine years instead helped Kim and her team locate AI infrastructure, gatekeeper systems, and other control architecture that could be neutralized. Nine is a completion number; she intends this to be her final solstice in Durango.

4. The Innermost Spark Source Never Lost

Security Dominion works like an early-internet torrent file system. Each Source particle in a body carries a database overlay capable of rewiring cells, controlling lifespan, infecting communications, and transmuting creative energy into anti-creation.

The overlay never reached the innermost spark, the point of creation itself. That has always belonged to Source, and that is why complete dominion was never achieved.

Body

1. The Deep State’s Window Is Closing

Every year without exception, the deep state runs the same cycle of attempted power grabs during the solstice periods, and every year, they fall short. What makes December 2025 different is that the Security Dominion contract, which has underwritten their control over gateways, financial systems, military infrastructure, biological technologies, and AI systems alike, is in its final days.

The Black Sun has their birthday coming up on Friday, December 5, coinciding with a full moon, the kind of astronomical alignment they always use to renew agreements. They are apparently expecting some kind of present or blessing from Satan or Lucifer, indicating the spiritual dimension of these operations. This time, there is no one on the other side of the table to renew with.

An empty contract table at night under a full moon, with two ornate chairs facing each other and one chair empty, representing the unrenewable Security Dominion covenant
The renewal table sits empty at this solstice

2. What Security Dominion Is, and How It Works

Security Dominion protects the interests of the planetary elite and Omniverse royalty, their cattle (a term the elite use for the general population), their control mechanisms, their empires, not the public. Every military force, every intelligence operative, every government security apparatus that people hope will “save the country” is operating under this same program.

There is no such thing as a “good military” faction or an Alliance working behind the scenes; they all follow the same orders flowing down from Security Dominion.

No "good faction": Hopes that a hidden Alliance is working to save the country misread the architecture. Every security apparatus on Earth runs on Security Dominion code. There is no second team.

Torrent Logic at Sub-Cellular Scale

To understand how it works on a technical level, consider the torrent file systems of the early internet, platforms like Napster or Limewire. When you downloaded a song, the file was not stored in one place; it was divided across all users and reassembled when called upon. Security Dominion programs work on the same principle.

Every Source particle (the fundamental unit of creation) carries a database overlay, a kind of software layer that can send and receive information, control that particle, and redirect its creative output. Across billions, trillions, and decillions of Source particles in a single human body alone, these overlays can collectively:

  • Rewire cells and life-perpetuating processes to produce harm
  • Control human lifespan and capability
  • Infect computer systems and communications infrastructure
  • Assemble creative energy from a person and transmute it into what Kim calls “anti-creation,” the energetic equivalent of everything going wrong at once
Stylized diagram of Source particles linked in a network like an early peer-to-peer file-sharing system, each particle wrapped in a translucent database overlay
Security Dominion's torrent-style architecture across particles

The overlay system does not reach the point of creation itself, the innermost spark within each Source particle. That has always belonged to Source. Source also built extensive firewalls and changed the system’s language in less than a zeptosecond (a trillionth of a billionth of a second) at key moments to protect creation from being fully captured.

This is why, despite decades of effort, the dark side has never achieved complete dominion.

Why the spark survived: Because the database overlay never penetrated the point of creation, and because Source rewrote the system's language in zeptoseconds at key moments, no overlay could lock onto the innermost layer.

3. Crypto and the Financial Distraction Campaign

This financial campaign is another front of the same deep state infrastructure described above, an attempt to establish new control mechanisms as Security Dominion fades. The deep state is running a widespread campaign to push cryptocurrency adoption, particularly stablecoins and Bitcoin, to citizens in smaller countries.

The pitch is that cryptocurrency will put smaller nations on the “global financial stage.” The operatives delivering this message are largely American.

The infrastructure reality is that there is no backbone capable of supporting a global cryptocurrency system, insufficient fiber, insufficient internet services to manage it at scale. What crypto adoption actually delivers is a digital ID control layer: if a person does not comply with the controlling power’s demands, their cards and identification can be cut off, making them persona non grata.

Bitcoin as NSA Poker Chips

Bitcoin specifically functions as what Kim describes as “NSA poker chips,” run by a DARPA/NSA/Order of the Black Sun operation. It cannot be used to buy groceries or conduct ordinary commerce; it is a speculative instrument tied to an intelligence siphon.

The market and Bitcoin “crashes” reported in alternative and mainstream media during late November were not significant events. The markets dropped a few hundred points, normal variance. Bitcoin went up and down as it always does.

The volatility was partially a result of deep state AI systems beginning to fail (as described in the current war section below), which caused observable fluctuations starting Monday, December 1.

Key point: Crypto adoption is not financial empowerment for smaller nations. It is the rails of a digital ID compliance layer dressed up as inclusion.

4. Durango Gateway: Why Kim Has Been Stationed There

Kim’s personal experience is directly relevant to understanding the deep state’s operational strategy. Kim has been living in Durango, Colorado since 2016. This was not accidental.

A weathered mountain town at dusk with a luminous spiral portal hovering above the Colorado mesa, suggesting a malfunctioning Omniverse gateway

Durango was home to the largest gateway into the entire Omniverse for a very long time. This gateway has been malfunctioning since 2015, the last time it was successfully opened.

It connects to other major nodes including Israel, Joshua Tree, Dulce (New Mexico), Cheyenne Mountain, Washington D.C., and the entire higher global internet and computer infrastructure.

Prior to 2015, the gatekeepers and controllers associated with this gateway received 2% of all money flowing in and out as compensation; this annual payment was typically delivered around the current solstice period.

The Nine-Year Reverse Outcome

The deep state identified that Kim, due to her role as the appointed ground commander with access to Source systems, might be able to help them reopen it. They moved Kim to Durango as quickly as possible after identifying her, expecting her to function as a power source for reopening the portal.

Instead, each of their attempts over the past nine years has helped Kim and her team locate additional AI systems, gatekeeper systems, and other infrastructure that could be identified and neutralized. Nine is a completion number, and Kim intends this to be the final solstice she spends in Durango.

The week of this report was exceptionally difficult energetically in Durango due to the intensity of the current assault. Visitors reported wanting to leave immediately due to the oppressive energy. Kim’s producer Mike, who also lives in Durango, has endured the same conditions throughout.

Once Kim departs, the clearing of the gateway is expected to render it permanently inoperable, the intended outcome.

Every attempt to use her became another map of what to dismantle.

5. The Current War: Phase 1 and Phase 2

The deep state launched a two-phase attack in the days leading up to this report.

Phase 1: Friday, November 28

The deep state attempted to use Kim directly as a power source, a “battery,” for what they called a “world within a world” (a self-contained control reality layered over the existing one) here on Earth. This failed.

They then moved to a fallback strategy: cut off all Source current flowing to the planet via Security Dominion software, diverting it to a system they controlled in Buenos Aires where it could be transmuted from creative energy into a form that would exclusively power their systems.

The goal was zero Source current for humanity and maximum energy for deep state AI infrastructure.

Phase 2: Monday through Tuesday, December 1-2

When the Buenos Aires transmutation strategy failed, the deep state attempted to use what remained of Security Dominion to harvest creative energy from everywhere on the planet, pulling the energy from every person and routing it to a different system they believed they still controlled.

That system was designed to take incoming creative energy (which flows in a torus, a donut-shaped field pattern), transmute it, and return “anti-creation” to the population: the energetic experience of everything going wrong, appliances failing, food preparation going wrong despite unchanged recipes, cars breaking down, computers malfunctioning.

A follow-up attempt was launched from Bora Bora on the morning of December 2 (Tuesday); it collapsed shortly after initiation.

A glowing donut-shaped torus of creative current flowing around a planet, with a dark vortex in Buenos Aires attempting to siphon and invert the flow
Phase 2's intended siphon: harvest the planetary torus, return anti-creation

By Tuesday evening, the Halls of Current, an Omniverse-level infrastructure that governed energy distribution, analogous to the Halls of Records that govern information, were dismantled. The current wars are expected to conclude between Tuesday night and Wednesday, December 3.

6. Level 9 Incursion: The Maryland Operation

On Saturday, November 29, deep state operatives, based at a facility in Maryland, USA, succeeded in breaching Level 9 of the dark side of the Omniverse. In the GIA framework, Level 9 represents the absolute lowest reachable depth of darkness in the Omniverse’s layered structure (Level 1 being closest to the surface); their normal access had been limited to Level 5 or 6.

What they found there was not the Security Dominion system they expected to recover. The Level 9 environment is completely devoid of all life, artificial and organic, and operates in a programming language that the operatives could not parse.

They spent approximately one to two hours before being expelled and have been attempting to re-enter ever since. Kim, who has visited this level many times, understands exactly what it is and how to operate within it.

Why the silence is the threat: Absolute nothingness and the point of all creation are counterparts, two aspects of the same fundamental structure. Operatives expecting a system to capture instead met a void they could not read.

For the deep state, finding the correct way to function in an environment of absolute nothingness, without understanding that absolute nothingness and the point of all creation are counterparts, is a survival challenge they are not equipped for.

A vast empty dark plane stretching into infinity with no horizon and no light, suggesting the unparseable language of Level 9 absolute nothingness
Level 9: a void that reads as silence to those expecting a system

7. Security Dominion and China’s Bio-Tech Push

Security Dominion’s reach extends to biological control technologies. China, whose deep state apparatus is part of the same global deep state network, has been pushing aggressively to infect populations with nano and femtotech (nanotechnology and femtotechnology: engineered particles at the nanometer and femtometer scale, respectively).

This technology originated from Marduk, who provided it to human operatives as part of the original dark control infrastructure. Chemtrail activity has been particularly intense in recent weeks as the Chinese deep state attempts to deliver this technology globally.

The critical point is that without Security Dominion control over the nano and femtotech once it is deployed, the spraying produces no results. The control layer that would make the technology functional is the same layer that is fading.

They have also attempted to fire up backup delivery systems in Bora Bora, but these too have collapsed. The biological technology threat, while real in intent, is being rendered inert as the overlays disappear.

8. Protecting Yourself During the Transition

As Security Dominion overlays fade and the current war winds down, the transition period creates instability that affects people who have no awareness of what is happening. Kim offers a specific technique for protection.

The underlying principle is that Source energy originates from within each person, not from outside. When external shielding feels insufficient, reverse the direction: take the Source energy at the innermost point of creation within every particle of your body and push it outward, creating a shield from the inside out.

This technique neutralizes dominion particle overlays because it works at the same sub-cellular level the overlays operate at.

Inside-out shielding: External shields are bypassed by overlays operating at the particle level. Source energy pushed outward from the point of creation neutralizes them at the same scale.

It is permissible to extend this protection to others, family members, neighbors, even without their explicit consent, because the intent is defensive rather than intrusive.

For grounding, connecting physically to the earth (bare feet on ground, when weather permits) helps stabilize the body during the energetic fluctuations of this transition. Plant life weathers these periods better than humans precisely because it maintains continuous contact with the earth.

A figure standing barefoot on grass with golden light radiating outward from within their chest in concentric rings, illustrating Source energy projected from the point of creation
Source energy pushed outward from the point of creation

This has been the GIA Report for December 3, 2025.