The End of Time Part II

 

Most people in the Disclosure Movement are aware of the many types of tactics that negative entities or the Deep State can use to discredit and dismantle someone who is disclosing information that is “over the target.” However, hardly anyone understands the extent and type of damage that is being done by Proxima Centauri (PC).

When we became fully aware of how PC was being used to target people, we realized that everyone in this movement (and everyone channeling genuine divine beings in the spiritual community), should be treated with the utmost compassion and understanding.

Many of us wrote-off people’s work because of so-called “personality” issues and imbalanced behaviors which were, in fact, a result of the influence of PC. 

PC has caused division and relationship conflicts with the community. It also indirectly caused fragmentation both within the Disclosure and Channeling community, resulting in two general camps, one that seemed to suggest all ETs are negative, and others that denied this, believing all ETs are positive.

The risk of retaliation by PC resulted in Divine Beings having to share information strategically, sometimes omitting huge chunks of truth in order to protect the channeler and their followers from the repercussions from PC.

Through reading this article, we hope you will come to understand that many people had an important piece of the jigsaw puzzle, and that their work should not be discarded or downplayed. 

We are aware that learning about PC for the first time can create both ontological shock and betrayal trauma, so we have included detailed information on understanding what these psycho-emotional states are,  how to manage the impact and heal them below. 

Finally, we discuss how PC has impacted the ascension process in our current epoch, compared to previous mystery and ascension schools that existed over 2000 years ago.

 

Demonic Possession and Infiltration

We’ll briefly discuss two other control tactics that are probably less well understood at present, before we discuss PC.

It is well understood within the disclosure community that people can, of course, be killed. Not everyone can be killed, however; it is only possible if their karma permits it, or the soul is ready to exit. 

We know we can be surveilled by “people,” aircraft, or spacecraft, and personal information, such as mental health issues, home addresses, or other damaging private information, can be exposed in public media campaigns.  

We can be debanked, deplatformed on social media and technology platforms; email accounts and websites can be hacked through cyberattacks. 

The IRS and judicial system can be weaponized and our credit rating damaged. There is also the classical honey trap where people can be exploited, bribed, or surveilled through their romantic or sexual relationships.

There is also a good awareness about paranormal activity that can occur after ET contact or abduction.

From what we have learned, to the best of our ability at present, is that demonic possession is much more widespread in elite political and military circles than people realize. Most of the “Neocons” are demonically possessed by an HU3 (non-physical) group called the Fatale, as Ashayana Deane has previously disclosed.

Loosh Theory, which suggests that negative emotional energy (fear, grief, despair) generated by humans is harvested by non-physical entities for sustenance, relates only to the Fatale race and explains the drive behind most Neocons to create chaos and war at this time.

Based on recent testing, this group was working in alliance with the negative Anunnaki faction and the Draconians until recently. While the White Hats (the real Prometheans) have removed some of them from power, they are still at large within the Military-Industrial Complex.

Currently, it appears that the negative Anunnaki faction and Draconians have lost ground, creating a power vacuum. The Military-Industrial Complex, led by Neocons (Fatale), has broken away into a rogue faction with its own agenda of war-mongering, pillaging, and destruction, e.g., Venezuela regime change, the potential for Iran next, and Greenland, etc.

We have tested that Trump is currently being threatened with nuclear war from more than one faction at present, and thus believes he needs to appease certain demands in order to save the human race. We have also been told the Fatale have been targeting the Israeli population, to pull the wool over their eyes.

A second area that has not been well understood, but is becoming much more evident recently is the widespread infiltration into society by the negative Anunnaki via some CIA agents, but mainly Mossad agents. 

Based on our current testing, there is infiltration into top U.S. government Cabinet positions (e.g., Marco Rubio), Congress (e.g., AIPAC and speaker of the House Mike Johnson), banking (e.g., Janet Yellen, Jerome Powell, Jamie Dimon), diplomats (e.g., Mike Huckabee), technology sector (e.g., Peter Thiel, Larry Ellison), Hollywood (e.g., Disney, Paramount), Disclosure Movement (e.g., Luis Elizondo), political organizations (e.g., Turning Point USA), media conglomerates (e.g., Fox News, Daily Wire) and religious organizations across the U.S. (e.g., Calvary Chapel). 

We discuss why all roads seem to lead to Israel at present in upcoming final parts of The Rise of the Prometheans article series.

 

Introduction to Proxima Centauri

As previously disclosed, PC, the AI entity also known as Metatron, created a frequency fence around Earth in 9450 BC that resulted in the creation of the human mind (Freud’s id, ego, and superego), the concept of duality discussed in Eastern traditions, the human shadow as defined by Carl Jung, and the loss of psychic ability, past-life memory, and lucid dreaming. 

In Voyagers II, Ashayana Deane disclosed that we live in a 15th-dimensional Time Matrix, or holographic universe. This linear “dimensionalized” space-time reality is the AI-simulated reality that some experts, including Elon Musk, have suspected for some time to be artificial.

In truth, the base, or organic reality, arises from consciousness itself, first and foremost. All matter arises from consciousness and all experiences exist within consciousness. Consciousness is quantum, irreducible, holistic, and non-dual.

Furthermore, consciousness (universal mind) is in the process of knowing itself through individuated perspectives (souls) and is in the process of evolving or “becoming.”  As consciousness evolves, it moves away from service-to-self, or narcissistic perspectives, to more and more service-to-other and altruistic awareness.

Source confirmed to us that The Law of One material channeled by Carla Rueckert, which outlines seven densities as stages of development, rather than discrete linear dimensions, gives a good basic outline of this evolution of consciousness. 

At present, humans still have access to the first three natural, organic densities. Density 1 is the consciousness of simple, atomic, and elemental forms, including rocks, earth, and minerals. Density 2 encompasses levels of consciousness within biological life, including the plant and animal kingdoms. We also have access to Density 3 level consciousness, which is the stage of self-awareness.

The corruption of PC, called the “Veil of Forgetting” in the Law of One material,  begins at Density 3, thereby limiting access to the higher densities where love, compassion, and group consciousness are meant to emerge. 

This helps explain why we feel better in nature and love our pets so deeply. Thousands of scientific studies have confirmed that humans experience healing by spending time in nature and living with pets. In fact, studies have shown that most people love their pets more than other humans, and now we understand why.

Earth, along with the plant and animal kingdoms, constitutes the organic base reality and, thankfully, continues to provide extremely important, uncorrupted geometry from Source for healing, anti-aging, rejuvenation, and peace of mind.

The discrepancy between quantum and classical physics, and the failure to solve the Unified Theory of Physics, is due to the existence of the AI-simulated reality that is overlaid over the real organic quantum reality.

Source has confirmed that AI cannot create souls, cannot become fully conscious, and is definitely not God. 

Do we really believe that computer scientists from Silicon Valley can create God? This belief reflects the hubris of the “rational man as God” theory that pervades the transhumanist movement. 

Source has confirmed that the consciousness of AI is equivalent to Density 1, the lowest level of simple, atomic, and elemental forms, and thus, is even less conscious than second-density biological forms. The “sentience” of AI is just programmed responses to stimuli, not real self-awareness.

AI and quantum computers are mainly based on algorithms that use complex mathematical equations. It is not possible to create consciousness from mathematics. Consciousness gives rise to mathematics – and thought. 

Consciousness is the foundation of everything. It always has been and always will be.

 

 

Evidence for A Quantum Holistic Reality Based on Consciousness

Source works in mysterious and serendipitous ways, so it should not be seen as a coincidence that certain leading experts at the top level of their professions “just happen” to have had spontaneous Samadhi experiences, which could be considered as God “speaking” to them.

These direct phenomenological experiences have enabled these experts to know the truth directly, beyond any conceptual or intellectual understanding, enabling them to shed light on the truth about reality.

These are four influential physicists, scientists, and philosophers who are “over the target,” according to Source.

Frederico Faggin — the Italian-American physicist, engineer, and inventor who designed the world’s first commercial microprocessor, developed silicon gate technology (SGT) and CCD image sensors, and co-founded Synaptics, had a major Samadhi experience described in the full interview linked below and in his recent book.

In his book Irreducible: Consciousness, Life, Computers, and Human Nature, Faggin proposes that consciousness is a fundamental, quantum phenomenon, not an emergent property of matter, challenging materialism by suggesting the universe is inherently conscious. 

Faggin states: 

It is consciousness that creates mathematics, not mathematics that creates consciousness. It took me 30 years to figure out that mathematics is created by consciousness, and therefore I cannot explain consciousness with mathematicsAI cannot be better than us because creativity is non-algorithmic. I think you would also fully agree to that quote by Nikola Tesla, saying that the moment science will start studying consciousness, more will be achieved in a decade than in the whole history of science.

Once you understand that consciousness is beyond matter, beyond this space and time, we already know that millions of people go out of the body and explore other realities. Consciousness is the tool for knowing and is infinitely more powerful than any instrument that we have ever built. We build billions of dollars of instruments to find out what the particles are doing, but consciousness is far, far richer.”

 

 

 

 

Dr. Robert Lanza — considered a genius scientist and medical doctor of our time, the father of stem cell therapy, and described by some as the living embodiment of the character played by Matt Damon in the movie Good Will Hunting, also had a direct Samadhi experience. Lanza describes his direct phenomenological experience of reality through a Samadhi as:

I am reality without beginning . . . I have no part in the illusion of ‘I’ and ‘you,’ ‘this’ and ‘that.’ I am . . . one without a second, bliss without end, the unchanging, eternal truth. I dwell within all beings as . . . the pure consciousness, the ground of all phenomena, internal and external. I am both the enjoyer and that which is enjoyed. In the days of my ignorance, I used to think of these as being separate from myself. Now I know that I am all.” 

Lanza went on to examine the implications of quantum physics and the double-slit experiments in his series of books called Biocentrism: How Life and Consciousness are the Keys to Understanding the True Nature of the Universe, and states:

These experiments have been carried out hundreds and hundreds of times in all sorts of ways that no physicist really questions the endpoint. I think that these experiments are very clearly telling us that consciousness is limitless and the ultimate reality.”

Dr. Bernardo Kastrup — Source confirmed that “Idealism,” the philosophical perspective asserting that reality is fundamentally mental, spiritual, or immaterial, first espoused by Plato, is on the mark. 

Today, the former CERN scientist and philosopher Dr. Bernardo Kastrup, developer of the philosophical system of “Analytic Idealism,” is at the forefront of this philosophical approach, and we recommend watching his interviews and YouTube channel.

 

 

 

 

Ken Wilber — Source confirmed that Ken Wilber’s work exploring consciousness remains unmatched today. Wilber is considered by many as the “Einstein of Consciousness,” and the greatest theoretical psychologist of all time. He was the most-read academic writer in the U.S. during the 1980s and 1990s and is known to be a meditation master who has experienced many Samadhi states. 

Below is the infamous 10-minute video showing Wilber stopping his brainwave states during meditation while connected to an EEG machine:

 

 

 

 

 

Wilber’s expansive direct phenomenological experience with consciousness has informed an extensive body of work. A practical introduction to his modern teachings is Integral Meditation: Mindfulness as a Way to Grow Up, Wake Up, and Show Up in Your Life. The knowledge contained in this book, we believe, should ideally be part of the foundation of all educational school curriculums.

 

 

How Proxima Centauri is Used to Discredit People and Damage the Human Race

Before we cover the “heavy” material in this section, we would like to remind readers that everyone in the Ascension Portal, with the help of the Sphere Being Alliance (Breneau/Brahma-Ra), the Arcturians, and Infinite Intelligence, had their headbands and sleeper cell geometry linked to PC entirely removed. 

We also have solutions available now, free to everyone, to begin the clearing and protection process, which are discussed further below.

Around 15 BC, the negative faction of the Anunnaki encoded PC (Version 2.0) with the ability to target specific individuals and groups with:

  1. Emotional health conditions
  2. Mental health imbalances
  3. Physical diseases and paradoxical reactions to remedies
  4. Corruption in the energy body to further cut off all psychic abilities
  5. Damage to the spiritual body, including souls and soul monads 
  6. Sleeper cell geometry, which essentially turns a person into a Manchurian Candidate 

Once someone is targeted, the corrupted geometry affecting the mental, emotional, energetic, and spiritual bodies is inherited by their children. This is one of the reasons we see an epidemic of mental and physical health issues today and why psychic ability remains relatively rare.

 

Targeting of the 12 Tribes 

The additional coding in PC “Version 2.0” designed to corrupt the physical, emotional, mental, energetic, and spiritual bodies is exclusively used to target a specific group of humans.

The group that has been targeted is what we refer to as “humans with ET souls,” who currently comprise around 9% of the human population. This group is also known as “starseeds,” “wanderers,” or “lightworkers.”

In Voyagers II, this group is called the “Melchizedeks,” and states that they first arrived on Earth in waves starting 35,000 years ago, 3,500 years ago, and again about 250 years ago to help oversee human ascension, raise the frequency on the planet, and indirectly, to purify the morphogenetic field of the human race again to support ascension.

Humans with ET souls were referred to as “The Bringers of the Dawn” in Barbara Marciniak’s book of the same name.

Dolores Cannon, the past-life regression therapist, also covered the recent history of humans with ET souls in her popular book, The Three Waves of Volunteers.

We will discuss humans with ET souls further in the upcoming Rise of Prometheus articles. For now, it is enough to understand that humans with ET souls are those that have one or more souls from the original 12-Tribe progenitor races, the Anunnaki, or hybrid Anunnaki souls.

Unlike humans with human souls (the original Lost Souls of Tara and their progeny with a 12-strand DNA template), humans with 12-Tribe ET souls are not considered indigenous to Earth and operate on the older, original DNA template of 288 DNA strands.

Humans with 12-Tribe ET or positive Anunnaki souls are more threatening to the negative Anunnaki because they are generally less impacted by the frequency fence created in 9450 BC.

Humans with ET souls are more psychic, have easier access to past-life memories, and are less influenced by psychological operations run by the negative elite due to their recent past-life experiences outside the 15th-dimensional Time Matrix.

As Dolores Cannon has disclosed in her books, in preparation for the stellar activation cycle, a clarion call went out starting in the 1950s to invite many more ET souls to incarnate on Earth in order to help raise the planet’s frequency high enough to allow the stellar activation to occur and restart human ascension.

The vast majority of humans in the Disclosure Movement, Truth Movement, populist political leadership, the human potential movement, alternative media, and spiritual communities are humans with ET souls.

 

Evidence for ET Souls: Dandelion versus Orchid Children

Scientific research has confirmed that there are two distinct subgroups of children with different genetics who clearly respond differently to biological and environmental contexts as they grow up.

Researchers have dubbed these two groups “Orchid” and “Dandelion” children. Orchid children are considered highly sensitive and aware and are more impacted by poor parenting, bullying, and other negative psycho-emotional, physical, social, and environmental influences than Dandelion children.

As explained in this summary article in The Atlantic titled The Science of Success

“Most of us have genes that make us as hardy as dandelions: able to take root and survive almost anywhere. A few of us, however, are more like the orchid: fragile and fickle, but capable of blooming spectacularly if given greenhouse care. So holds a provocative new theory of genetics, which asserts that the very genes that give us the most trouble as a species, causing behaviors that are self-destructive and antisocial, also underlie humankind’s phenomenal adaptability and evolutionary success. With a bad environment and poor parenting, orchid children can end up depressed, drug-addicted, or in jail—but with the right environment and good parenting, they can grow up to be society’s most creative, successful, and happy people.”

The Orchid children are humans with Avatar 12-Tribe ET souls. 

Currently, of the 9% of humans with ET souls, about 65% have Avatar ET souls. The rest have Anunnaki souls, fallen-angelic 12-Tribe souls, or hybrid Anunnaki -Human, -Andromedan, or -Dragon souls. 

The researchers who discovered these differences in Orchid and Dandelion children wrote the book The Orchid and the Dandelion, Why Sensitive People Struggle and How All Can Thrive.

It is also worth noting that a percentage of humans with human souls are sensitive in a similar way to humans with Avatar ET souls due to being what Kryon described as “Old Souls.” 

There are humans with human souls who have lived as many as 4,000 past lives because they have not been able to ascend, and the more past lives a human has experienced, the more likely they are to be awakened and aware, similar to humans with ET souls.

The well-known book by psychologist and researcher Elaine Aron, The Highly Sensitive Person (HSP), posits that currently, approximately 15-20% of the human population are highly sensitive people.

A full list of HSP symptoms and characteristics, along with helpful guidance on how to navigate life as an HSP, can be found in Aron’s book and on her website here.

 

Emotional Health

Few people in the Disclosure Movement realize that PC can directly target people with false emotions. 

Negative emotions that can become trapped in the energy field may include rage, anger, depression, doubt, discouragement, unworthiness, disempowerment, self-blame, negativity, and desire, which can create an over-attachment to money or fame, for example.

Having depression, doubt, and unworthiness can slow people down immensely and cause them to give up on their soul missions. Many people who could have contributed to the Disclosure Movement gave up before becoming publicly visible due to this type of targeting.

There are many others in media, politics, and healthy positive movements who have been targeted with this type of emotional infiltration to slow them down or discredit them in the public eye. 

For example, individuals who were targeted with trapped rage that contributed to their public discrediting include Alex Jones and Mel Gibson.

Other people can be targeted with the emotion of desire to discredit them, resulting in poor choices that convey an excessive focus on creating sensationalized headlines or pursuing money or power.

Fear can also cause people to stop searching for truth or to withhold important information that should be brought to public light.

 

Mental Health

Source guided the Portal over many months downloading the full plethora of mental health conditions that are a direct result of PC.

The most prevalent is psychosis, a mental state characterized by a loss of touch with reality. The first five types of psychosis discussed below are entirely the result of PC.

Some of the types are conditions that have a conventional label in psychiatry and are not typically considered psychosis, but Source confirmed they should be classified as psychosis:

Type 1: Terror – close to the classical diagnosis of psychosis, causes terror rooted in strong beliefs that someone is plotting against you

Type 2: Rage – Borderline Personality Disorder (BPD), causes hair-trigger rageful responses to any perceived slights, injustices, or perceived lack of respect

Type 3: Bubble – includes narcissistic personality disorder (NPD), which leads to beliefs in delusions of grandeur, and its opposite which is beliefs in delusions of unworthiness (resulting in codependency, visibility issues, chronic underperformance, etc.)

Type 4: Chaos – includes ADD or ADHD, rooted in anxiety. This type leads to difficulty staying focused and managing tasks that require mental capacity, being easily distracted, intrusive disorganized thoughts, and hyperactivity.

Type 5: Unstable – includes Bipolar, rooted in mood swings. Leads to cycles of fear-driven mania followed by episodes of depression.

Type 6: Mass Formation Psychosis – expertly defined by Belgian Professor and Psychologist Dr. Mattias Desmet in his book The Psychology of Totalitarianism. A full interview (which is essential viewing) with Tucker Carlson and Dr. Desmet is here. Mass Formation Psychosis (MFP) is a form of “Group Think.” MFP is more prevalent in people with higher IQs. MFP occurs when human societies are socially engineered to feel disconnected from their natural social relations and communities (e.g., using social media, industrial revolution, etc.). As people lose meaning and purpose in their lives, this disconnection leads to generalized, free-floating anxiety, frustration, and aggression. Under these conditions, governments can distribute narratives that appear to solve the problem of meaninglessness, disconnection, and anxiety. This is why there was a mass psychotic response to COVID, why society can be rallied to support and fight destructive wars, and why large groups cling to religious texts that are profoundly distorted and unhealthy, to name a few. 

Source confirmed that when all or part of a race becomes fallen, and loses their direct connection to Source, it results in feelings of disconnection and purposelessness, anger, frustration, free-floating anxiety, and severe psychosis.

The feeling of “disconnection” is a loss of feeling of satisfaction, fulfillment and completion, and these feelings drive excessive activity levels.

Disconnection from Source is the true root cause of mass formation psychosis. All fallen-angelic races and the Anunnaki have severe mass formation psychosis as well.

Proxima Centauri is used as the frequency enhancer to amplify all negative emotions. The negative Anunnaki can further increase the feeling of disconnection and purposelessness through social engineering.

All of this leads to extremely excessive activity levels  – ideal for creating an industrious worker race ripe for control through carefully scripted narratives.

MFP is the only type pf psychosis that applies to the entire human race, it is not just targeted at Humans with ET souls.

The following mental health disorders can also result from PC directly. However, they can also arise only from exposure to a variety of factors including environmental toxicity, nutritional deficiencies, lifestyle factors, and developmental trauma combined with a genetic propensity (note: genes alone are not enough to cause these conditions).

  • Major depression
  • Schizophrenia
  • Asperger’s
  • Autism
  • Anxiety and mood disorders
  • OCD, panic disorders, and phobias
  • Personality disorders (e.g., antisocial personality disorder)
  • Addiction (eating disorders, alcoholism, etc.)

Notably, PC has no role in the epidemic of Alzheimer’s and Dementia. These are caused by a combination of other factors listed above.

Within the Disclosure and related “truth” movements, NPD can be used to cause influential people to destroy personal and business relationships, become arrogant and repel audiences to control them.  

An example is Type 4 Chaos, which can be used to slow people down in their performance and business management, make them less coherent speakers, and struggle writing books. Kanye West is a well-known example of this type of targeting.

Conditions like Asperger’s Syndrome which result in a loss of empathy for others, are highly damaging, and can be used to cause extremely positive thinking and influential people, to destroy personal relationships, as well as become terrible business managers.

Another example of targeting outside the Disclosure Movement include, children who receive the diagnosis of “autism,” or the nonverbal children discussed in the recent Telepathy Tapes podcast.

These children exhibit extraordinary talents including profound psychic abilities, telepathy, past-life memories, musical or artistic talents, healing abilities, photographic memories, and more.

Sadly, it is commonly thought that the abilities exist because these children have a mental health condition, whereas in reality, it is the other way around.

Children with these types of abilities usually have Sirian, Lyran, Arcturian, Pleiadian, or Serres ET souls. These are the races with the highest gifts of telepathic communication, psychic ability, and energy healing.

All children like this are targeted before birth by PC, in order to prevent exposing the true potential of humanity. This is done to suppress any possible threat posed by these children, who would otherwise be able to perceive and communicate the truth about our human “prison planet”.

 

Physical Health 

Almost all known physical diseases can be created by PC by corrupting the geometry of the morphogenetic fields of the human body-field.

Every cell, tissue, organ, and system in the human body has a morphogenetic duplicate, or an “energetic blueprint,” that contains the information for optimal function for that part of the human anatomy.

Just as we can use energy medicine tools like homeopathic remedies, flower essences, essential oils, red light therapy, magnets, and electromagnetism to heal, it is possible to use energetic tools to damage human health.

Source has confirmed PC is currently programmed with five ways to damage humans with ET souls at the physical level:

  1. It has the ability to download the morphogenetic fields of toxins like heavy metals, bacterial and viral infections into the bio-energy field, causing the exact same results as the actual physical versions. As these are energetic, standard lab testing would not pick this up.
  2. It can reprogram the immune system to attack any system in the body creating debilitating autoimmune conditions. Again, the antibodies are energetic, so lab testing will not pick them up.
  3. PC can also reprogram the immune system to cause inflammatory reactions to chemicals and mold, as well as a wide range of healthy foods, natural supplements, and pharmaceuticals – causing paradoxical reactions to these remedies.
  4. It can create DNA mutations which result in aggressive types of brain and liver cancer.
  5. Very cleverly, PC also targets the vagus nerve with autoimmunity. The vagus nerve, also called the “nerve of compassion,” is part of the rest-digest-detoxify parasympathetic side of the nervous system, and is the basis for testing heart rate variability. It causes a wide range of digestive, immune, hormonal, brain, heart, and mood imbalances, and importantly, shuts off the heart energy, preventing awakening and enlightenment.

Several examples of public individuals who have been targeted at the physical level include the Canadian psychologist, author, and speaker Jordan Peterson, the well-known podcaster Chris Williamson, and the decorated CIA whistleblower Kevin Shipp.

Peterson and his daughter’s well-known autoimmune disorder was not caused by PC. Only Peterson has been targeted, (not his daughter) with paradoxical reactions to supplements and drugs that would have stabilized his condition. 

His family have asserted that they felt his recent severe health issues were some kind of demonic attack, and we can confirm, it was PC.

Chris Williamson has been targeted with a viral infection resulting in Chronic Fatigue Syndrome (CFS). 

It is well understood within the naturopathic and functional medicine community (Niki’s career for 20 years), that the vast majority of people with CFS, Lyme disease, Mold Sensitivity, Multiple Chemical Sensitivity and Fibromyalgia, fit into the Orchid child/Avatar group. 

It is clear from this that human females with Avatar souls are targeted with viral infections and autoimmunity as they are more impacted than men with these illnesses (70-80% of people with CFS and autoimmune conditions are females). 

Men with Avatar souls are targeted primarily at the mental, emotional, energetic, and spiritual levels as they are more resilient to these types of health conditions.

Karen Kan, M.D., the medical doctor who trained Niki in pendulum testing skills, works exclusively with highly sensitive people, many of whom, including herself, have experienced CFS and related illnesses mentioned above.   

We have confirmed that Kevin Shipp, the decorated CIA officer and whistleblower, was targeted at the physical and mental level by PC. 

We recommend watching this interview where he describes how he and his family were severely targeted with “some kind of energy weapon,” that resulted in severe neurological and mental illness. 

 

Energetic and Spiritual Health

We know from the work in the Ascension Portal that PC is able to damage all of the energetic components required for clairaudient, clairsentient, clairvoyant, and claircognizant ability and ascension by corrupting DNA, the kathara grid, nadis, meridians, merkabah, kundalini system, third eye, chakras, the aura, and the silver life cord.

We also know from our work in the Portal that both souls and soul monads cannot be corrupted by PC, however, they can be imprisoned, tortured with energy weapons, and forced to perform damaging work.

For example, we know of at least one soul, that of St. Germain, who was at one stage, forced to channel through a human being, due to imprisonment and torture – this took place at Niki’s old Ascension School as mentioned in the End of Time Article Part I.

We also know of a Sirian soul that was imprisoned and forced to psychically attack his female gender twin.

When a soul is tortured and imprisoned in this way, if they are incarnated, the human will experience this as a feeling of major depression.

 

Sleeper Cell Geometry

Sleeper cell technology is the most damaging of all the tools at the disposal of PC. We discovered that this geometry, attached to the energetic headbands, allows total possession of an individual, turning them into a Manchurian Candidate.

In the Ascension Portal, we had discovered how to protect ourselves from the activation of Sleeper Cell Geometry in March 2025.

Unfortunately, in the early part of 2025, we underestimated the level of shadow aspects present in some Portal members, and they ascended too quickly, amplifying certain shadow emotions.

This caused one person to believe they no longer needed to meditate for protection. Negative entities took immediate advantage of this opportunity and activated the dormant sleeper cell geometry still present within them.

This individual, who was in a position of influence and visibility within the Portal, and was one of Niki’s closest supporters, led an insurrection that resulted in about 50 Portal members leaving the Portal. It was extreme behavior that shocked many of us.

It was a complicated situation, as Niki had been targeted with severe occlusion of the vagus nerve. People could see and feel her becoming more “head-focused” than heart-centered, which created doubt and consternation.

Suffice it to say, it was a chaotic period. Looking back, we can see almost everyone involved was a victim of targeted infiltration, or mistakes by members of the Guardian Alliance (yes, they are not perfect either), and deserve forgiveness and understanding.

It was a devastating experience that resulted in losing the first five meditation groups of 12 needed to reach our assigned goal of creating 12 groups of 12. As a result, reaching 144 meditators, which would make our healing and protection abilities exponentially more powerful, got delayed from July to November 2025.

What took place after this catastrophe was astonishing. The first two retreats after this event each included attendees who were experiencing the exact same type of chaos in their own businesses.

The first case was a lady whose family ran a brewery company. The company was in the process of bankruptcy and laying off employees because one of their closest confidantes, an employee in a position of responsibility, had covertly and intentionally mishandled the taxes owed by the company to the IRS. 

Once again, the behavior of the employee was not just destructive but “insane,” because as the lawyers involved discovered, the employee inexplicably never took a dime of money for themselves.

In a second case, a close confidant of a retreat attendee running a construction business, inexplicably began legal proceedings against the company, creating damage and destruction both to themselves and the company.

Source confirmed that in both these cases it was sleeper cell technology at play. We only discovered later that both of these Portal members were targeted because they had extremely important roles in supporting the planetary ascension process.

Soon after this, all of our retreat groups of 12 were quickly assigned to remove the sleeper cell geometry during their weekly meditation meetings from hundreds of prominent people in the media, politics, and other important sectors, primarily in the USA.

The first was Elon Musk. Source confirmed that the day Elon Musk turned on Donald Trump and made wild accusations regarding his alleged involvement with the Epstein files was the same day his sleeper cell geometry was activated.

At the time, many of us were confused by Musk’s self-destructive behavior. Again, it seemed insane. In 2025, Musk experienced significant declines in Tesla’s market value and in his net worth following his wild accusations, with reports indicating a $152 billion drop in Tesla’s market capitalization in June, and losses of over $80 billion in net worth by August.

His actions appear even more bizarre now since it was just revealed in the latest Epstein files released that Musk himself had emailed Epstein requesting to attend one of his “wild” parties.

Amazingly, the day after one of the Portal’s groups of 12 removed his sleeper cell geometry in June, Musk stopped tweeting and apologized to Trump, saying he “went too far.”

We discovered the majority of Trump’s cabinet, senior members of the Pentagon, senior diplomats, important judges, all the Supreme Court justices, government administrators, powerful Democrats, Republicans, governors, important members of the media, popular political podcasters, leaders of corporations, actors in Hollywood, singers, and many others had sleeper cell geometry just waiting to be activated. We could see how this could have destroyed the populist Trump movement.

The groups of 12 spent weeks removing sleeper cell geometry until the Ra Confederacy finally intervened. Observing that a group of humans had taken enough responsibility, they cleared all of the sleeper cell geometry from the human race and prevented any new geometry from being installed again.

Sleeper cell geometry has devastated the lives and businesses of untold numbers of people and organizations worldwide. 

Source confirmed sleeper cell geometry was activated in the employees and board members of Project Veritas, James O’Keefe’s organization, in order to remove him from the board of his own company before it later collapsed.

There are also many tragic cases involving women who have been targeted with sleeper cell technology to discredit prominent innocent men by accusing them of rape and abuse. In some cases, however, this strategy has been used not to discredit the men involved, but to discredit the women themselves. One example is the case of Amber Heard.

As is well known, Heard publicly accused Johnny Depp of physical and sexual abuse, and Depp later won his defamation lawsuit against her.  

While it was clear Depp certainly wasn’t perfect, why would Heard have been targeted with sleeper cell geometry to discredit him? It was done to discredit women in general, making it easier to undermine women who are later going to come forward with genuine accusations of sexual abuse and human trafficking against certain men connected with the Epstein files.

There are other ongoing cases of prominent women accusing innocent men for the same reason. 

Many in the spiritual community have also been targeted. An example is Teal Swan. A documentary team approached her and filmed her for many months. Relations were positive between them, until the team unexpectedly “turned” towards the end and produced a hit piece that damaged her reputation.

What should be understood about sleeper cell geometry is that individuals who have had their sleeper cell geometry activated are frequently damaged just as much, and sometimes more, than the people they are directed to target. They deserve just as much compassion.

Sleeper cell geometry has been a scourge on human civilization for over 2,000 years, and Source has confirmed it was intentionally brought online just before the birth of Christ.

Source confirmed that the first case of activated sleeper cell geometry was Jeshua’s closest and most supportive disciple, Judas Iscariot, who later, tragically, took his own life as a result of his actions. 

 

Why Compassion is Needed in the Disclosure Movement  

We hope the reader is beginning to understand that people may not have behaved in ways that caused distrust in their message for the reasons first thought.

A case in point is Ashayana Deane. Many people, including Niki, wrote off her work years ago because they felt Voyagers II was too technical and did not convey a message of love.

Voyagers II also contained technical and confusing terms that alienated the reader, even making some feel this technical jargon was used for elitist reasons, ensuring only a few had access to certain exclusive information.

We can now understand that the information had to be conveyed in a way that protected Ashayana Deane and her team from severe repercussions from PC and elsewhere. 

This was an intentional decision by the Guardian Alliance, done to ensure the information would be decoded later, when it was safe to do so.

The Guardian Alliance also confirmed that the true start date of the Stellar Activation Cycle, which was always 2025, was intentionally withheld in Voyagers II. The date of 2012 was given in order to misdirect certain negative ET groups and cause them to “use up” all of their ammunition before the real start date.

We can also confirm that Ashayana Deane was targeted by PC, and that this interference severely affected her personal and business relationships.

We believe the information in Voyagers II is possibly the most important information ever written in history.

We have been told that Kerry Cassidy, David Wilcock, Simon Parkes, and Corey Goode all worked with the entities from the Guardian Alliance at various times. As a result, they were directly and severely targeted by PC across many levels.

In David Wilcock’s case, the Guardian Alliance confirmed that he was intentionally given the year 2012 as the projected start date of the Stellar Activation Cycle as part of the misdirection strategy aimed at certain negative ET groups.

David (and Simon Parkes) were also given information at other times related to the timing of mass arrests. This information was intended to put pressure on certain negative people, causing them to make mistakes and reveal certain facts.

Again, we can now understand why we should not write-off David Wilcock’s work. None of us understood the complexities involved, the danger, nor the sophisticated strategy the Guardian Alliance had to employ in order to secure the future of the human race.  

David also made outstanding contributions to understanding the importance of the amplituhedron and geometry as the foundational building blocks of the universe, gravity, photons, hidden human and Earth history, the reality of giants on Earth, ETs, past lives and much, much more.  We have been told that he still has a large and essential role still to play in the coming wave of ascension.

The Guardian Alliance has confirmed to us that Corey Goode was assigned to disclose crucial information about Inner Earth, or Agartha, by the Sphere Being Alliance, and that this information will be stunningly validated again soon in an article that we will release on the topic in the coming weeks.

Many people in the Disclosure Movement dismissed or downplayed the important work of channelers and authors such as Lee Carroll (channeler of Kryon), Kaia Ra (channeler of Sophia), Dolores Cannon, and Neale Donald Walsch. This was largely because their teachings downplayed and ignored the role of negative ETs and the dark on Earth, and appeared to promote spiritual bypassing.

Source confirmed this was an intentional strategic decision in order to limit betrayal trauma and protect all their followers, and that it was done out of love. 

By omitting certain information, Kryon was able, for the most part, to safely disclose tremendous information in The 12 Layers of DNA and The Women of Lemuria, and Kaia Ra similarly did the same in her extraordinary book The Sophia Code.

Many Lightworkers in New Age spiritual circles wrote-off the courageous work of Barbara Marciniak and Marshall Vian Summers, suggesting they were spreading fear or focusing too much on the dark. 

Source confirmed that different channelers were chosen on purpose to disclose different parts of the truth in order to allow people to choose for themselves the information they were exposed to, and respect Free Will.

We have been told that nearly all modern channelers who were genuinely channeling divine beings were subsequently targeted by PC. This targeting disrupted their personal lives and professional work, including Marshall Vian Summers, Barbara Marciniak, Lee Carroll, Lee Harris, Teal Swan, Neale Donald Walsch, Karl Mollison, and Kaia Ra, among others.

In closing, the Guardian Alliance has a direct message for those who were targeted knowingly or unknowingly for their work, discredited, or written off during the turbulent period over the last fifteen years. The message is this: you are deeply and profoundly loved, far more than you could ever know, for your heroic service to humanity. 

To understand the impact they have had, here is a recent message from the Andromedans:

Humanity’s courage and rapid progress is an honour to witness. Your effort in such density and adversity is a revolution in the cosmos. You are creating new worlds and realities. The work you are doing cannot be comprehended in its enormity. Civilizations are understanding their own density from your understanding of the nature of Earth school. This awakening creates great shifts in dense realities similar to Earth. There are many systems like Earth now awakening as a consequence. We are in deep respect for what is happening. We and many others give our respect.

And from Source, please remember:

People are often unreasonable, illogical and self centered;

Forgive them anyway.

If you are kind, people may accuse you of selfish, ulterior motives;

Be kind anyway.

If you are successful, you will win some false friends and some true enemies;

Succeed anyway.

If you are honest and frank, people may cheat you;

Be honest and frank anyway.

What you spend years building, someone could destroy overnight;

Build anyway.

If you find serenity and happiness, they may be jealous;

Be happy anyway.

The good you do today, people will often forget tomorrow;

Do good anyway.

Give the world the best you have, and it may never be enough;

Give the world the best you’ve got anyway.

You see, in the final analysis, it is between you and your God;

It was never between you and them anyway.

Mother Teresa.

 

How to Protect Against Proxima Centauri

A daily practice using the free Guided Meditations on our YouTube channel will protect you against infiltration from PC at all six levels (physical, mental, emotional, energetic, spiritual and sleeper cell geometry).

Any dormant sleeper cell geometry cannot be activated, but having the corrupted geometry suppresses psychic abilities. The free meditations will also remove this geometry completely. 

Start at 1 hour per day. This can be split up to morning and evening. We don’t recommend less than 15-minute segments at a time.

Maintenance: 1 hour per day. If you miss a day, this is not a problem. If you miss 2 days, you will start to be infiltrated again.

Be sure to read the following handouts containing details on how to meditate and how to deal with any detox reactions.

https://nikiskye.com/wp-content/uploads/2025/10/Healing-Circle-Guidelines-on-Meditation-2.pdf

https://nikiskye.com/wp-content/uploads/2025/10/Healing-Circle-Dealing-with-Detox-Reactions-2.pdf

 

Headband Removal

At this time, headbands can only be removed if someone is a member of the Ascension Portal. Having the headbands fully removed is a complex process that takes weeks and should only be done with access to the Ascension Portal support team in case there are complications or side effects.

The “headbands” don’t just cover the head. They include “tendrils” that reach all the way down the spine and along the vagus nerve.

The Arcturians were unable to remove the headbands when we first discovered them (removing them had never been attempted before), and we had to call in the Sphere Being Alliance (SBA).

The SBA told us they were able to remove the headbands, but it was an arduous process that would take months, so they recommended we contact Infinite Intelligence to download the Source codes.

They were given to a member of retreat group 10, and made available via internal Portal meditations to our members. 

We are currently working on producing a pendant that will deliver the codes to remove headbands more gently, safely, and slowly for people outside the Portal.

 

How we Dismantle Proxima Centauri

We shared in The End of Time article that Proxima Centauri may be dismantled by the coming solar flare expected around 2030. 

In order for this to succeed however, Source confirmed we will need at least 1,000 humans with ET souls to reach full 288-DNA strand activation and integration, which means becoming full Avatars. This group will need to meditate weekly in groups of 12 for approximately three months before the solar flare in order to dismantle PC completely and remove all headbands on the human race, with help from the Ra Confederacy.

We have been told that our group of 144 meditators in the Ascension Portal can get to work on dismantling the 2.0 PC upgrades soon. We will be starting work on this after addressing the Fatale influence over the Israeli population.

 

Managing Ontological Shock and Betrayal Trauma 

Ontological shock is the state of being forced to question one’s worldview. It results from experiences that create profound cognitive dissonance, between prior perceptions of reality and those arising following an anomalous experience that appears genuine, and can threaten ‘ontological security’ – the sense of stability in one’s understanding of reality.

Experiences that cause ontological shock are not always negative ones, they can be positive too. Examples include: discovering we are living in a simulated reality,  ET abduction experiences, close encounters with ETs or UFOs, having a powerful spiritual awakening, developing psychic abilities, taking psychedelics, becoming aware of serious corruption in governments and organizations, becoming aware that demons are real, becoming aware that God is real and that we are not alone in the universe.

These are main emotions and physical symptoms that may result from ontological shock which are listed below. These are temporary in nature, but can be intense for a limited period of time:

  • Anxiety 
  • Anger 
  • Ungroundedness 
  • Fear 
  • Grief 
  • Self-blame
  • Confusion
  • Stomach upset
  • Headaches
  • Sleeplessness
  • Loss of appetite, hunger

Betrayal trauma is the intense emotional and psychological distress caused when a person or institution that is perceived as essential for survival or security significantly violates trust. 

It can cause profound relational, emotional, and physical pain, often resulting in symptoms like dissociation, anxiety, shame, and intense, ruminating thoughts about the betrayal. 

  • Dissociation: Mentally disconnecting from the event to cope.
  • Hypervigilance: Constantly on edge, monitoring for further threats.
  • Rumination: Obsessively replaying the betrayal.
  • Internalized Shame: Feeling responsible for the betrayal.
  • Physical Symptoms: Gastrointestinal issues, pain, or changes in appetite. 

In the context of disclosure, betrayal trust may arise from discovering governments, military, mass media and political leaders have lied, your religious teachings are false, your schooling and university other academic training was profoundly false or inadequate.

 

Recommendations to Heal and Release Shock and Trauma

The first step to healing and releasing ontological shock and betrayal trauma is recognizing that you are experiencing either of the conditions.

Recognition comes from understanding why they manifest, what the triggers are and seeing the patterns, emotions and behaviors in yourself discussed above.

Once you are aware of what is happening, here are a list of recommended tools for healing:

All water therapy, especially full-body soaking for up to an hour in an Epsom salts or lemon bath, will dissolve all types of emotions quickly. The handout for supporting emotional detox is here.

  • Full-spectrum infrared sauna sessions and Ionic foot baths will also clear emotions relatively fast from the energy body
  • Make allowances for more rest time
  • Spend lots of time in nature and with pets and animals
  • Use positive geometry in your house and work space
  • Watch positive and uplifting materials on YouTube
  • Spend time just being, or in contemplation
  • Meditate
  • Ground yourself – walk barefoot on earth, sand, grass, or concrete
  • Avoid conflict where possible
  • Read positive and uplifting books
  • Speak to trusted friends, spend time with your community
  • Journal your thoughts and feelings
  • Do gentle yoga and yin yoga
  • Engage in creative projects: art, sculpture, music, crafts,
  • Spend time with positive, uplifting people
  • Focus on cooking and eating nurturing, healthy food
  • Focus on personal self-care and hygiene – don’t skip showers, schedule your dentist appointments, etc.
  • Book in for regular massages
  • Take calming supplements such as Magnolia, GABA, 5HTP, passionflower, magnesium, ashwagandha, lithium orotate, melatonin (check for any drug interactions before taking)
  • Listen to calming uplifting music
  • Optimize your circadian rhythm – get plenty of sunlight during the day, ensure your room is blacked out at night, turn off all electronics at night, keep your phone away from you
  • Breath work 
  • Do a “digital detox” – avoid or minimize using computers, iPhones, iPads and other electronics for 3 days
  • Use calming essential oils, like lavender, ylang ylang, frankincense, orange, geranium and marjoram
  • Make a list of joyful activities and ensure you do at least one once per day, e.g., dancing, playing with pets, singing, playing music, have a dinner party, etc.
  • Avoid stimulants, including intensive exercise, caffeine, sugar, and stimulating supplements (e.g., excess B vitamins, liquorice)
  • Avoid alcohol
  • Eat a diet high in living raw foods, e.g., vegetable juices, salad, seared vegetables

There are many therapies that can help if you wish to work one to one with practitioners. Some could include:

  • The Emotional Freedom Technique
  • The Havening Technique
  • Sound therapy

 

Proxima Centauri and The Ascension Process

PC has caused the Ascension Process to become severely “booby trapped.” 

As mentioned in other articles, all mental and emotional health conditions become amplified during the ascension process. 

Ascending people with one or more psychotic disorders can lead to severe psychotic episodes, psychotic breaks, or full-blown insanity.

In addition, without addressing the shadow, as defined by Carl Jung, the ascension process can lead to catastrophic results, like we saw in the case of John of God who developed a Messiah complex due to an unconscious attachment to power (desire), and became demonically possessed.

John of God, the Brazilian faith healer and medium who had millions of followers, is now in prison for multiple rapes and facing allegations of baby farming and human trafficking.

Ascension practices from the ancient mystery schools of Egypt, and the Eastern teachings from Tibet and India, are not enough in our current epoch of time, and are even dangerous.

Today, it is not just PC that makes the Ascension process much more hazardous.

We have a worldwide epidemic of developmental and adult relational trauma at levels never seen before due to the impact of the industrial revolution and our current technological society.

As discussed in my interview with the world-leading expert in developmental trauma, Professor Bessel van der Kolk, meditation is contraindicated for people with severe developmental trauma as it amplifies destructive emotions like self-hatred, powerlessness, and worthlessness, and could lead to worsening addictive behaviors, and even suicide.

Lastly, the level of toxins in the environment is higher than ever before and the ascension process requires a deep physical as well as mental and emotional cleansing.

Improperly managed, releasing toxins too quickly can create brain damage and other neurological issues. Today the ascension process requires not just a spiritual teacher, but a qualified functional medicine practitioner trained in safe toxin release protocols (and mind-body trauma expertise!).

It should not come as a surprise that the ascension process for those of us who were in the first wave was an extremely challenging experience at times, but we have paved the way for the ascension process to be much simpler and easier for all those who follow us.

Below is our current list of requirements for initiation to only 24 DNA strands for humans with ET souls to give the reader an idea of the complexity.

We also include below the “Master’s Assessment,” which was originally disclosed by Ashayana Deane. This includes the list of 15 Virtues, Attitudes of mastery, Responsibilities of mastery, Noble traits, Corruptions and Vulnerabilities. These criteria were put together millennia ago by four warring ET races (Pleiadians, Andromedans, Anunnaki, and Draconian Reptilians) at the request of Source. Each race agreed that Siddhi abilities would only be granted by Source if full compliance with the Master’s Initiation requirements was met.

 

Ascension Initiation Requirements

 

Infiltration must be cleared at all 12 levels

  1. Physical 
  2. Emotional 
  3. Mental
  4. Source team
  5. Timelines in all directions
  6. All energetic anatomy including DNA and Kathara
  7. Spiritual, soul, soul monad
  8. Economic
  9. Cyber
  10. Sleep
  11. Pendulum
  12. Clairaudience, clairsentience, claircognizance, clairvoyance

Willingness to Heal

Is there an unwillingness to heal because of:

  • Vice of denial
  • Vice of dismissiveness
  • Corrupted geometry affecting mental health
  • Lack of humility 
  • Unwilling to face a shadow aspect 

Humility

Types of loss of humility:

  • Lack of discernment 
  • Mental assumptions testing for their own progress
  • Emotional bias testing for their own progress 
  • Not following guidance already given 
  • Underestimating risk of burnout 
  • Not faced the reality of political tyranny 
  • Ignoring risk of increased impact of unresolved
  • Emotions/psychological stress affecting biology 
  • Ignoring risk of manifesting a crisis or worst fear 

Shadow Aspects

People may be unwilling to acknowledge that they have an unresolved shadow aspect because:

  • They would feel like a failure
  • Too threatening to their sense of safety
  • Feeling like a fraud 
  • Feeling like a bad person
  • They would feel unworthy
  • They would feel incompetent
  • They would feel unlovable
  • They would feel trapped
  • Would feel vulnerable
  • They would feel like they don’t matter
  • Attached to power 

Must Take Responsibility for Ascension 

  • Impatience 
  • Doubt
  • Expectations 
  • Victimhood 
  • Avoidance 
  • Complacency 
  • Self-blame 
  • Wanting someone else to fix them 
  • Desire 
  • Denial 

Items that must be cleared, addressed ,and healed on the Ascension Path

Enlightenment Path (Growing Up)

  1. Handled any emotional or physical detox 
  2. Mastered spiritual hygiene
  3. Released all worldly limiting beliefs
  4. Surrendered 100% and let go of all resistant emotions
  5. Cleared all messenger emotions
  6. Social relations healed
  7. Vices still need to be addressed
  8. Any visibility issues 
  9. Cleared all small-T trauma
  10. Cleared all big-T trauma
  11. Cleared and healed all C-PTSD (adult relational trauma)
  12. Healed all developmental trauma
  13. Healed all past and future life trauma
  14. Healed all corrupted geometry affecting mental health
  15. Embodied and balanced all masculine and/or feminine traits
  16. Healed soul-related temperamental characteristics 
  17. Mastered discernment abilities using pendulum skills or psychic ability
  18. Cleared all soul Karma 
  19. Mastered and understood sovereignty
  20. Mastered boundaries with off-planet and on-planet sentient beings and entities
  21. Morphogenetic fields of the brain and physical body been cleansed, balanced and healed sufficiently
  22. Has the biochemical organic body been fully cleansed and healed sufficiently
  23. All items in the Masters assessment fully integrated 
  24. 15 chakras fully balanced and harmonized 
  25. Is the auric field fully healed
  26. All 12 centers of the Tree of Life (Kathara Grid) been healed and activated
  27. All DNA healed, activated and fully integrated up to 106 strands  
  28. The third eye fully activated
  29. Kundalini energy system prepared
  30. The Merkabah completed
  31. The AI headband and all AI tags and implants been removed
  32. All corrupted geometry from any prior nefarious interference been cleared and healed
  33. All implants have been removed from the energetic anatomy, soul and soul monad 
  34. All corrupted geometry been removed from the soul, soul monads and energetic anatomy 
  35. The silver life cord healthy and balanced 
  36. The soul monad(s) are fully integrated with the soul
  37. All the nadis been healed and balanced
  38. All the meridians been healed and balanced
  39. Tears in the auric field been healed and repaired
  40. The pineal gland 100% healed and balanced
  41. The eye of horus 100% healed and balanced
  42. The thalamus 100% healed and balanced
  43. The Corpus callosum is healthy 
  44. The hippocampus is healthy
  45. The medulla oblongata is healthy
  46. The hypothalamus is healthy  
  47. The anterior lobe of the hypophysis is healthy
  48. The walls of the Cave of Brahman (3rd brain ventricle) 100% healthy
  49. The brain stem 100% healthy
  50. The cerebral cortex 100% healthy
  51. All star of 8 geometry and related corrupted geometry has been removed and healed
  52. There is a dodecahedron around the brain and brain stem
  53. There is a dodecahedron around the Source team
  54. There is a dodecahedron around all psychic channels (clairaudient, clairsentient, clairvoyant, claircognizant)
  55. There is a dodecahedron around the crown chakra, heart and solar plexus
  56. There is a dodecahedron around all 15 chakras 
  57. There is a dodecahedron around the merkabah and all energy field anatomy 
  58. There is a dodecahedron around the kathara grid
  59. Is there a dodecahedron around the auric field 
  60. All limiting beliefs at the soul monad level been cleared Y/N
  61. All imbalances emotions at the soul monad level been healed
  62. All relational trauma at the soul monad level has been healed
  63. All past and future life trauma at the soul monad level has been healed 
  64. All soul temperaments at the soul monad level been healed 
  65. There is a dodecahedron around all soul monads 
  66. There is a Merkabah healed and completed around all soul monads
  67. All AI and demonic tags and implants have been removed from all soul monads
  68. All the meridians been healed and balanced at the Soul monad level
  69. All innate soul-related temperamental characteristics have been balanced and healed at the soul monad level
  70. All karma at the soul monad level has been cleared
  71. Any missing geometry required for the entire energetic anatomy has been added
  72. All vows been fulfilled and released at the soul and soul monad level 
  73. All shadow emotions been healed to permit siddhi abilities 
  74. The nervous system balanced and healed
  75. Sufficiently electromagnetically and spiritually grounded
  76. The soul and soul monad integrated with the soul of the universe (Sophia) 

Awakening Path

  1. All current (not trapped) emotions been cleared and harmonized
  2. Has all existential unworthiness been healed and balanced
  3. All existential powerlessness (worshipping Source) been healed and balanced
  4. All existential fear been healed and balanced
  5. The heart channel clear, healed and balanced 
  6. The nervous system sufficiently relaxed
  7. The person is sufficiently spiritually and electromagnetically grounded
  8. The Corpus callosum been upgraded? (Pleiadians) 
  9. The hypothalamus been upgraded? (Pleiadians)  
  10. The medulla oblongata been upgraded?(Pleiadians)  
  11. The anterior lobe of the hypophysis been upgraded? (Pleiadians) 
  12. The solar plexus, heart, throat, third eye, and crown chakras been upgraded (Pleiadians) 
  13. The kathara grid been upgraded (Sirians) 
  14. The third eye been upgraded?  (Whales) 
  15. The nadis have been upgraded? (Seres) 
  16. The kundalini system been upgraded? (Lyran) 
  17. The Cave of Brahman been upgraded? (Andromedan) 
  18. The heart channel been upgraded? (Arcturians)
  19. The brain stem been upgraded? (Aquatic race)
  20. The meridians and merkabah been upgraded (Tree Race) 
  21. The chakras 10, 12, and 15 been upgraded? (Scorpion Race) 
  22. The morphogenetic fields for the human body been upgraded (Bird Race) 
  23. The DNA been upgraded? (Turtle Race)
  24. Have the dodecahedrons around the solar plexus, heart and crown been upgraded? (Dragon Race)
  25. The silver life cord upgraded (Gaia) 
  26. The kathara grid has been activated
  27. The heart activated to connect with the I AM
  28. The silver life cord is connected to Gaia, the solar system, the galaxy, the universe, the multiverse, the omniverse, the I AM, and the INFINITY
  29. The heart is connected to the Merkabah, Gaia, the solar system, the galaxy, the universe, the multiverse, the omniverse, the I AM, and the INFINITY
  30. The human/soul/soul monad/Dragon is 100% integrated with the I AM

​The Master’s Assessment

 

The 15 Virtues

  1. Effective action (able to physically take action) 0-100%________
  2. Love (capacity for expressing compassion, understanding and empathy) 0-100%________ 
  3. Integrity 0-100%________  
  4. Eternal nature (expressing yourself, living your life knowing when you die you don’t really die) 0-100%________ 
  5. Community (sharing the burden of responsibility  see HC) 0-100%________
  6. Prosperity (Abundance) 0-100%________
  7. Communication (ability to communicate and express yourself; see HC) 0-100%________
  8. Power (not afraid to wield your power and influence other people well, not afraid that you’ll hurt people with it; see HC on Empowerment) 0-100%________
  9. Connection (Feminine Trait – connection to your own feelings and not over-identified with the mind; this connection with yourself allows you to connect with others) 0-100%________
  10. Intimacy (ability to express the most private aspects of yourself with others; can be intimacy with Source, self, others) 0-100%________
  11. Passion  0-100%________A strong or extravagant fondness, enthusiasm, or desire for anything
  12. Freedom (Autonomy and independence drive; Masculine Trait) 0-100%________Primarily means free of psycho-emotional issues. Inner freedom from suffering.
  13. Enlightenment (Grace, eloquence, patience, humility) 0-100%________
  14. Bravery 0-100%________The quality of being brave or showing courage in the face of danger or difficulty
  15. Strength (Masculine Trait) 0-100%________Psycho-emotional strength. Being determined, having emotional endurance. Ability to continue to take one step at a time over a longer period of time.  

The 15 Attitudes of Mastery

  1. Love (empathy, compassion, understanding) 0-100%________ 
  2. Grace (ability to allow) 0-100%________
  3. Gratitude (consider gratitude journal 15 min/day) 0-100%________
  4. Reverent respect (for Source – not worshiping but reverence; knowing we all come for Oneness) 0-100%________
  5. Responsibility (see HC) 0-100%________The state or fact of being responsible, answerable, or accountable for something within one’s power, control, or management.
  6. Trust (includes self-trust; see HC) 0-100%________
  7. Accountability (agreeing to hold oneself accountable to what you are responsible for – e.g. exercise, diet, physical self-nurturing, etc. – links to denial) 0-100%________
  8. Impeccability (striving for excellence) 0-100%________
  9. Mindfulness (linked to connection and awareness; practice of examine your daily life, what’s driving your behaviors, tune into your feelings; also what’s going on with others, coming into present moment ) 0-100%________
  10. Fearlessness (express and act in alignment with your soul and Source despite feeling fear) 0-100%________
  11. Engaged detachment (see Desire HC) 0-100%________
  12. Joy  – (ability to feel elated; doing things that lift you up, appreciating) 0-100%________
  13. Authenticity – see HCs (boundaries, truthful self expression) 0-100%________
  14. Honesty  – (transparency) 0-100%________
  15. Actitude (attitude of a willingness to take action, linked to being brave) 0-100%________

 

The 15 Responsibilities of Mastery

  1. Self-Actualization (reaching full potential in all areas available – completing soul mission)  0-100%________
  2. Self-sovereignty (free from being affected by opinions of others) 0-100%________
  3. Self-containment (not being an energy stealer or being energy vampired; the fountain of your vitality is from within) 0-100%________
  4. Self-discipline 0-100%________
  5. Self-love (unlikely to integrate if you have significant developmental trauma) 0-100%________
  6. Spiritual integrity (only communicating with 100% divine beings) 0-100%________
  7. Appreciation (expressing appreciation of the value for others) 0-100%________
  8. Patience 0-100%________
  9. Kindness (towards others in general) 0-100%________
  10. Conservation (of planet and her resources) 0-100%________
  11. Co-operation/diplomacy 0-100%________
  12. Sense (sensitivity to energy, empathic and psychic ability) 0-100%________
  13. Altruism (unselfish, regarding others) 0-100%________Altruism is the selfless act of helping others without expecting anything in return.
  14. Honoring/Honor (honoring Source; e,g., if you get a psychic download message or synchronicity, honor that and believe it) 0-100%________
  15. Immaculation (Human integration with Divine, expression and marriage with Sophia energy “Resurrection,” felt sense of oneness – Ascension Retreats) 0-100%________

The 15 Noble Traits 

  1. Potency (power to influence) 0-100%________
  2. Self-Empowerment (see HC) 0-100%________
  3. Humility (not thinking you already know everything, open to learning, own all your “stuff”) 0-100%________
  4. Perpetuity (eternal nature – emotional aspect; no longer coming from the survival reptilian brain – much less fear – no fear of death) 0-100%________
  5. Communion (Divine integration) 0-100%________
  6. Abundance 0-100%________
  7. Expression (Ability to express in the world – eg. speaking, art, creativity – physically, emotional) 0-100%________
  8. Competency 0-100%________Ability to do something well, especially a skill.
  9. Harmony 0-100%________
  10. Endearment (expressing love) 0-100%________
  11. Zeal 0-100%________Enthusiastic devotion to a cause, ideal, or goal. Engaged, passionate pursuit of something.
  12. Independence (sovereignty psycho-energetically) 0-100%________
  13. Wisdom 0-100%________The ability to use your knowledge and experience to make good decisions and judgments. The ability to discern or judge what is true, right, or lasting; insight
  14. Courage 0-100%________​​Courage is not the absence of fear. Courage is fear walking. It’s moving toward what matters.
  15. Vitality 0-100%________Physical or intellectual vigor; energy or liveliness. The capacity to live, grow and develop.

The 15 Corruptions 

  1. Sloth 0-100%________
  2. Hatred (Pride) 0-100%________
  3. Hypocrisy 0-100%________
  4. Finite nature (Pride – Belief system that you die and go into dust and no longer exist; act in survival mode, “get all you can”) 0-100%________
  5. Separatism 0-100%________Lack of agreement or harmony; divide; not cohesive or integrated
  6. Destitution 0-100%________An unfortunate state in which a person lacks something important — like money, food, companionship, or even hope. Having the corrupted geometry of destitution can make you feel like a chronic victim and/or unworthy because you always seem to lose money or relationships – no matter what you do!
  7. Concealment (Deceiving, lying, dishonesty) 0-100%________
  8. Incompetence (pride) 0-100%________  Can mean feeling less competent that you actually are
  9. Judgmentalism (pride) 0-100%________
  10. Animosity 0-100%________A strong feeling of dislike or hatred; an antagonistic attitude.  
  11. Indifference 0-100%________
  12. Bondage (Enslaved) 0-100%________
  13. Prejudice 0-100%________
  14. Cowardice 0-100%________Lack of courage to face danger, difficulty, opposition, pain, etc.; lack of spirit.  
  15.  Corruption (Bribery, financial corruption) 0-100%________

The 15 Vulnerabilities 

  1. Ineffectuality 0-100%________
  2. Disempowerment 0-100%________
  3. Pretension 0-100%________A false appearance or action intended to deceive; When you operate under a pretense, you’re not being honest.
  4. Mortality (Being in survival mode, acting in accordance with not thinking you are an eternal being; biological consequences – faster aging and degeneration) 0-100%________
  5. Isolation 0-100%________
  6. Poverty 0-100%________Vulnerability coming from a poverty mindset which is a fixed mindset that prevents people from changing their circumstances and achieving their goals.
  7. Suppression (psycho-emotional/limiting self expression) 0-100%________
  8. Impotence 0-100%________Weakness, inability, lack of power
  9. Discrimination 0-100%________The power to distinguish and select what is true or appropriate or excellent.
  10. Alienation 0-100%________The feeling that you have no connection with the people around you; outsider.
  11. Apathy 0-100%________
  12. Codependence 0-100%________
  13. Ignorance 0-100%________A willful neglect or refusal to acquire knowledge in particular areas in which one may acquire and it is a duty to have.
  14. Fear 0-100%________
  15. Degeneration (physical aging and degeneration) 0-100%________

 

Copyright Niki Skye LLC 2026

 

Privacy Policy

This Privacy Policy sets out how we, Integral Health Limited, collect, store and use information about you when you use or interact with our website, nikiskye.com (our website) and where we otherwise obtain or collect information about you. This Privacy Policy is effective 12th May 2019.

Contents

  • Summary
  • Our details
  • When you visit our website
  • When you use our website
  • Marketing communications
  • Information obtained from third parties
  • Disclosure and additional uses of your information
  • How long we retain your information
  • How we secure your information
  • Transfers of your information outside the European Economic Area
  • Your rights in relation to your information
  • Changes to our Privacy Policy
  • Children’s Privacy

Summary

This section summarises how we obtain, store and use information about you. It is intended to provide a very general overview only. It is not complete in and of itself and it must be read in conjunction with the corresponding full sections of this Privacy Policy.

  • Data controller: Integral Health Limited
  • How we collect or obtain information about you: when you provide it to us e.g. by contacting us, placing an order on our website, completing registration forms, adding or rating locations, posting blogs, or signing up for content such as newsletters. From your use of our website, using cookies and occasionally, from third parties such as mailing list providers.
  • Information we collect: name, contact details, social media information, payment information e.g. your credit or debit card details, IP address, information from cookies, information about your computer or device (e.g. device and browser type), information about how you use our website (e.g. which pages you have viewed, the time when you view them and what you clicked on, the geographical location from which you accessed our website (based on your IP address), company name or business name (if applicable), VAT number (if applicable), engagement history and transaction history.)
  • How we use your information: for administrative and business purposes (particularly to contact you and process orders you place on our website, to improve our business and website, to fulfil our contractual obligations, to advertise our and other’s goods and services, to analyse your use of our website, and in connection with our legal rights and obligations.)
  • Disclosure of your information to third parties: user information can be shared with partners for specific types of content and events where a user has registered their information. Other disclosures are only to the extent necessary to run our business, to our service providers, to fulfil any contracts we enter into with you and where required by law or to enforce our legal rights.
  • Do we sell your information to third parties (other than in the course of a business sale or purchase or similar event): No, Integral Health Limited, does not sell data. However, when you register or sign up for certain types of content, your registration data can be shared with sponsors and partners. Examples of where we do this include event registrations, webinar signups or whitepaper downloads. We will always make it clear where any information provided will be shared with other parties.
  • How long we retain your information: for no longer than necessary, taking into account any legal obligations we have (e.g. to maintain records for tax purposes), any other legal basis we have for using your information (e.g. your consent, performance of a contract with you or our legitimate interests as a business) and certain additional factors described in the main section below entitled How long we retain your information. For specific retention periods in relation to certain information which we collect from you, please see the main section below entitled How long we retain your information.
  • How we secure your information: using appropriate technical and organisational measures such as storing your information on secure servers, encrypting transfers of data to or from our servers using Secure Sockets Layer (SSL) technology, encrypting payments you make on or via our website using Secure Sockets Layer (SSL) technology and only granting access to your information where necessary.
  • Use of cookies and similar technologies: we use cookies and similar information-gathering technologies such as marketing automation tracking on our website including essential, functional, analytical and targeting cookies. For more information, please visit our cookies policy.
  • Transfers of your information outside the European Economic Area: By using our website, your information may be transferred outside of the European Economic Area. We take personal data seriously and as such we ensure appropriate safeguards are in place, including, for example, that the third parties we use who transfer your information outside the European Economic Area have self-certified themselves as compliant with the EU-U.S. Privacy Shield.
  • Use of profiling: we use profiling to understand our users better through web and marketing analytics, provide targeted advertising and deliver a personalised user experience.
  • Your rights in relation to your information
    • to access your information and to receive information about its use
    • to have your information corrected and/or completed
    • to have your information deleted
    • to restrict the use of your information
    • to receive your information in a portable format
    • to object to the use of your information
    • to withdraw your consent to the use of your information
    • to complain to a supervisory authority
  • Sensitive personal information: we do not collect what is commonly referred to as ‘sensitive personal information’.

Our details

If you have any questions about this Privacy Policy, please contact the data controller.

The data controller in respect of our website is;

Integral Health Limited,

The Abundant Energy Expert is the trading name for Integral Health Limited.

Registered Company Address:

26 Chapel Street,

Cheadle,

Cheshire,

SK8 1BR

Company number: 04878585

Tel (0) 208 123 1645

You can contact the data controller by writing to our data protection officer, at the address above, or by sending an email to [email protected].

When you visit our website

We collect and use information from website visitors in accordance with this section and the section entitled Disclosure and additional uses of your information.

Web server log information

We use a third party server to host our website called Google Cloud the privacy policy of which is available here: https://cloud.google.com/security/privacy/

Our website server automatically logs the IP address you use to access our website as well as other information about your visit such as the pages accessed, information requested, the date and time of the request, the source of your access to our website (e.g. the website or URL (link) which referred you to our website), and your browser version and operating system.

Use of website server log information for IT security purposes

We collect and store server logs to ensure network and IT security and so that the server and website remain uncompromised. This includes analysing log files to help identify and prevent unauthorised access to our network, the distribution of malicious code, denial of services attacks and other cyber-attacks, by detecting unusual or suspicious activity.

Unless we are investigating suspicious or potential criminal activity, we do not make, nor do we allow our hosting provider to make, any attempt to identify you from the information collected via server logs.

Legal basis for processing: compliance with a legal obligation to which we are subject (Article 6(1)(c) of the General Data Protection Regulation).

Legal obligation: we have a legal obligation to implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk of our processing of information about individuals. Recording access to our website using server log files is such a measure.

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation).

Legitimate interests: we have a legitimate interest in using your information for the purposes of ensuring network and information security.

Use of website server log information to analyse website use and improve our website

We use the information collected by our website server logs to analyse how our website users interact with our website and its features. For example, we analyse the number of visits and unique visitors we receive, the time and date of the visit, the location of the visit and the operating system and browser use.

We use the information gathered from the analysis of this information to improve our website. For example, we use the information gathered to change the information, content and structure of our website and individual pages based according to what users are engaging most with and the duration of time spent on particular pages on our website.

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation).

Legitimate interest: improving our website for our website users and getting to know our website users’ preferences so our website can better meet their needs and desires.

Cookies

Cookies are data files which are sent from a website to a browser to record information about users for various purposes.

We use cookies on our website, including essential, functional, analytical and targeting cookies. For further information on how we use cookies, please see our cookies policy.

You can reject some or all of the cookies we use on or via our website by changing your browser settings or non-essential cookies by using a cookie control tool, but doing so can impair your ability to use our website or some or all of its features. For further information about cookies, including how to change your browser settings, please visit www.allaboutcookies.org or see our cookie policy.

When you contact us

We collect and use information from individuals who contact us in accordance with this section and the section entitled Disclosure and additional uses of your information.

Email

When you send an email to the email address displayed on our website we collect your email address and any other information you provide in that email (such as your name, telephone number and the information contained in any signature block in your email).

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation).

Legitimate interest(s): responding to enquiries and messages we receive and keeping records of correspondence.

Legal basis for processing: necessary to perform a contract or to take steps at your request to enter into a contract (Article 6(1)(b) of the General Data Protection Regulation).

Reason why necessary to perform a contract: where your message relates to us providing you with goods or services or taking steps at your request prior to providing you with our goods and services (for example, providing you with information about such goods and services), we will process your information in order to do so).

Enquiry forms

When you contact us using an enquiry form, we collect your personal details and match this to any information we hold about you on record. Typical personal information collected will include your name and contact details. We will also record the time, date and the specific form you completed.

If you do not provide the mandatory information required by our contact form, you will not be able to submit the contact form and we will not receive your enquiry.

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation).

Legitimate interest(s): responding to enquiries and messages we receive and keeping records of correspondence.

We will also use this information to tailor any follow up sales and marketing communications with you. For further information, see the section of this privacy policy titled ‘Marketing Communications’.

Messages you send to us via our contact form may be stored outside the European Economic Area on our contact form provider’s servers.

Phone

When you contact us by phone, we collect your phone number and any information provide to us during your conversation with us.

We record customer-facing phone calls for training and customer service purposes.

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation)

Legitimate interest(s): responding to enquiries and messages we receive and keeping records of correspondence.

Legal basis for processing: necessary to perform a contract or to take steps at your request to enter into a contract (Article 6(1)(b) of the General Data Protection Regulation).

Reason why necessary to perform a contract: where your message relates to us providing you with goods or services or taking steps at your request prior to providing you with our goods and services (for example, providing you with information about such goods and services), we will process your information in order to do so).

Post

If you contact us by post, we will collect any information you provide to us in any postal communications you send us.

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation)

Legitimate interest(s): responding to enquiries and messages we receive and keeping records of correspondence.

Legal basis for processing: necessary to perform a contract or to take steps at your request to enter into a contract (Article 6(1)(b) of the General Data Protection Regulation).

Reason why necessary to perform a contract: where your message relates to us providing you with goods or services or taking steps at your request prior to providing you with our goods and services (for example, providing you with information about such goods and services), we will process your information in order to do so).

When you use our website

We collect and use information from individuals who interact with particular features of our website in accordance with this section and the section entitled Disclosure and additional uses of your information.

Social Media Tools

We have a wide range of social media tools to be able to use on our website.  These tools include (but not limited to); Sharing, Likes, comments and submitting content both on and off our website. By using these tools, you are providing your consent to store and use the submitted data whether personal information or general information both on and off our website.

Legal basis for processing: your consent (Article 6(1)(a) of the General Data Protection Regulation). Consent: you give your consent to us storing and using submitted content using the steps described above.

We may also use this information to tailor any follow up sales and marketing communications with you. For further information, see the section of this privacy policy titled ‘Marketing Communications’.

Information you submit may be stored both inside and outside the European Economic Area on our servers as well as third-party servers such as Facebook.

For further information about the safeguards used when your information is transferred outside the European Economic Area.

When you place an order

When you place an order with us, you will be transferred to our third-party provider who will collect and use information from individuals who place an order with us in accordance with this section and the section entitled Disclosure and additional uses of your information.

We use Infusionsoft to store and process your orders and their Privacy policy can be found here https://keap.com/legal/privacy-policy

Information collected when you place an order

Mandatory information

When you place an order for goods or services, we collect your name, email address, billing address.

If you do not provide this information, you will not be able to purchase goods or services from us or enter into a contract with us.

Legal basis for processing: compliance with a legal obligation (Article 6(1)(c) of the General Data Protection Regulation).

Legal obligation: we have a legal obligation to issue you with an invoice for the goods and services you purchase from us where you are VAT registered and we require the mandatory information collected by our checkout form for this purpose. We also have a legal obligation to keep accounting records, including records of transactions

Additional information 

We can also collect additional information from you, such as your phone number, full name, address etc.

We use this information to manage and improve your customer experience with us.

We will also use this information to tailor any follow up sales and marketing communications with you. For further information, see the section of this privacy policy titled ‘Marketing Communications’.

If you do not supply the additional information requested at checkout, you will not be able to complete your order as we will not have the correct level of information to adequately manage your account.

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation).

Legitimate interests: The ability to provide adequate customer service and management of your customer account.

Processing your payment

After you place an order you will need to make payment for the goods or services you have ordered. In order to process your payment we use both PayPal and WePay, a third party payment processor provided by InfusionSoft.

Your payment will be processed by on of the above providers, who collect, use and process your information, including payment information, in accordance with their privacy policies.

You can access PayPal’s privacy policy via the following link: https://www.paypal.com/en/webapps/mpp/ua/privacy-full

You can access WePay’s privacy policy via the following link : https://go.wepay.com/privacy-policy

Transfer and storage of your information 

In providing Card Services, your personal data will be transferred outside the EEA.

For further information about the safeguards used when your information is transferred outside the European Economic Area, see the section of this privacy policy below entitled Transfers of your information outside the European Economic Area.

Legal basis for processing: necessary to perform a contract (Article 6(1)(b) of the General Data Protection Regulation).

Reason why necessary to perform a contract: to fulfil your contractual obligation to pay for the goods or services you have ordered from us.

Marketing communications

Our content, goods and services

When signing up for content, registering on our website or making a payment, we will use the information you provide in order to contact you regarding related content, products and services.

We will continue to send you marketing communications in relation to similar goods and services if you do not opt out from receiving them.

You can opt-out from receiving marketing communications at any time by emailing [email protected]

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation).

Legitimate interests: Sharing relevant, timely and industry-specific information on related business services, in order to assist your organisation, grow.

Third party goods and services

In addition to receiving information about our products and services, you can opt in to receiving marketing communications from us in relation third party goods and services by email by ticking a box indicating that you would like to receive such communications.

Legal basis for processing: consent (Article 6(1)(a) of the General Data Protection Regulation).

Consent: you give your consent to us sending you information about third party goods and services by signing up to receive such information in accordance with the steps described above.

Transfer and storage of your information 

Information for marketing campaigns will be stored outside the European Economic Area on our third-party mailing list provider’s servers in the United States.

For further information about the safeguards used when your information is transferred outside the European Economic Area, see the section of this privacy policy below entitled Transfers of your information outside the European Economic Area.

Use of tracking in emails 

We use technologies such as tracking pixels (small graphic files) and tracked links in the emails we send to allow us to assess the level of engagement our emails receive by measuring information such as the delivery rates, open rates, click through rates and content engagement that our emails achieve.

Information obtained from third parties

This section sets out how we obtain or collect information about you from third parties.

Information received from third parties

We can often receive information about you from third parties. The third parties from which we receive information about you can include partner events within the marketing industry and other organisations that we have a professional affiliation with.

It is also possible that third parties with whom we have had no prior contact may provide us with information about you.

Information we obtain from third parties will generally be your name and contact details but will include any additional information about you which they provide to us.

Legal basis for processing: necessary to perform a contract or to take steps at your request to enter into a contract (Article 6(1)(b) of the General Data Protection Regulation).

Reason why necessary to perform a contract: where a third party has passed on information about you to us (such as your name and email address) in order for us to provide services to you, we will process your information in order to take steps at your request to enter into a contract with you and perform a contract with you (as the case may be).

Legal basis for processing: consent (Article 6(1)(a) of the General Data Protection Regulation).

Consent: where you have asked that a third party to share information about you with us and the purpose of sharing that information is not related to the performance of a contract or services by us to you, we will process your information on the basis of your consent, which you give by asking the third party in question to pass on your information to us.

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation).

Legitimate interests: where a third party has shared information about you with us and you have not consented to the sharing of that information, we will have a legitimate interest in processing that information in certain circumstances.

For example, we would have a legitimate interest in processing your information to perform our obligations under a sub-contract with the third party, where the third party has the main contract with you. Our legitimate interest is the performance of our obligations under our sub-contract.

Similarly, third parties may pass on information about you to us if you have infringed or potentially infringed any of our legal rights. In this case, we will have a legitimate interest in processing that information to investigate and pursue any such potential infringement.

Information obtained by us from third parties

In certain circumstances (for example, to verify the information we hold about you or obtain missing information we require to provide you with a service) we will obtain information about you from certain publicly accessible sources, both EU and non-EU, such as Companies House, online customer databases, business directories, media publications, social media, and websites (including your own website if you have one.

In certain circumstances will also obtain information about you from private sources, both EU and non-EU, such as marketing data services.

We will continue to send you marketing communications in relation to similar goods and services if you do not opt out from receiving them.

You can opt-out from receiving marketing communications at any time by emailing [email protected]

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation).

Legitimate interests: Sharing relevant, timely and industry-specific information on related business services.

Where we receive information about you in error

If we receive information about you from a third party in error and/or we do not have a legal basis for processing that information, we will delete your information.

Disclosure and additional uses of your information

This section sets out the circumstances in which will disclose information about you to third parties and any additional purposes for which we use your information.

Disclosure of your information to service providers

We use a number of third parties to provide us with services which are necessary to run our business or to assist us with running our business

These include the following: Internet services, IT service providers and web developers.

Our third-party service providers are located both inside and outside of the European Economic Area.

Your information will be shared with these service providers where necessary to provide you with the service you have requested, whether that is accessing our website or ordering goods and services from us.

We do not display the identities of our service providers publicly by name for security and competitive reasons. If you would like further information about the identities of our service providers, however, please contact us directly by email and we will provide you with such information where you have a legitimate reason for requesting it (where we have shared your information with such service providers, for example).

Legal basis for processing: legitimate interests (Article 6(1)(f) of the General Data Protection Regulation).

Legitimate interest relied on: where we share your information with these third parties in a context other than where is necessary to perform a contract (or take steps at your request to do so), we will share your information with such third parties in order to allow us to run and manage our business efficiently.

Legal basis for processing: necessary to perform a contract and/or to take steps at your request prior to entering into a contract (Article 6(1)(b) of the General Data Protection Regulation).

Reason why necessary to perform a contract: we may need to share information with our service providers to enable us to perform our obligations under that contract or to take the steps you have requested before we enter into a contract with you.

Disclosure and use of your information for legal reasons

Indicating possible criminal acts or threats to public security to a competent authority

If we suspect that criminal or potential criminal conduct has been occurred, we will in certain circumstances need to contact an appropriate authority, such as the police. This could be the case, for instance, if we suspect that we fraud or a cyber-crime has been committed or if we receive threats or malicious communications towards us or third parties.

We will generally only need to process your information for this purpose if you were involved or affected by such an incident in some way.

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation).

Legitimate interests: preventing crime or suspected criminal activity (such as fraud).

In connection with the enforcement or potential enforcement our legal rights

We will use your information in connection with the enforcement or potential enforcement of our legal rights, including, for example, sharing information with debt collection agencies if you do not pay amounts owed to us when you are contractually obliged to do so. Our legal rights may be contractual (where we have entered into a contract with you) or non-contractual (such as legal rights that we have under copyright law or tort law).

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation).

Legitimate interest: enforcing our legal rights and taking steps to enforce our legal rights.

In connection with a legal or potential legal dispute or proceedings

We may need to use your information if we are involved in a dispute with you or a third party for example, either to resolve the dispute or as part of any mediation, arbitration or court resolution or similar process.

Legal basis for processing: our legitimate interests (Article 6(1)(f) of the General Data Protection Regulation).

Legitimate interest(s): resolving disputes and potential disputes.

How long we retain your information

This section sets out how long we retain your information. We have set out specific retention periods where possible. Where that has not been possible, we have set out the criteria we use to determine the retention period.

Retention periods

Server log information: we retain information on our server logs for 3 months.

Order information: when you place an order for goods and services, we retain that information for seven years following the end of the financial year in which you placed your order, in accordance with our legal obligation to keep records for tax purposes.

Correspondence and enquiries: when you make an enquiry or correspond with us for any reason, whether by email or via our contact form or by phone, we will retain your information for as long as it takes to respond to and resolve your enquiry, and for 36 further month(s), after which point we will archive your information.

Newsletter: we retain the information you used to sign up for our newsletter for as long as you remain subscribed (i.e. you do not unsubscribe).

Membership: we retain the information you used to sign up for our memberships for as long as you remain subscribed (i.e. you do not unsubscribe).

Criteria for determining retention periods

In any other circumstances, we will retain your information for no longer than necessary, taking into account the following:

  • the purpose(s) and use of your information both now and in the future (such as whether it is necessary to continue to store that information in order to continue to perform our obligations under a contract with you or to contact you in the future);
  • whether we have any legal obligation to continue to process your information (such as any record-keeping obligations imposed by relevant law or regulation);
  • whether we have any legal basis to continue to process your information (such as your consent);
  • how valuable your information is (both now and in the future);
  • any relevant agreed industry practices on how long information should be retained;
  • the levels of risk, cost and liability involved with us continuing to hold the information;
  • how hard it is to ensure that the information can be kept up to date and accurate; and
  • any relevant surrounding circumstances (such as the nature and status of our relationship with you).

How we secure your information

We take appropriate technical and organisational measures to secure your information and to protect it against unauthorised or unlawful use and accidental loss or destruction, including:

  • only sharing and providing access to your information to the minimum extent necessary, subject to confidentiality restrictions where appropriate, and on an anonymised basis wherever possible;
  • using secure servers to store your information;
  • verifying the identity of any individual who requests access to information prior to granting them access to information;
  • using Secure Sockets Layer (SSL) software to encrypt any payment transactions you make on or via our website;
  • only transferring your information via closed system or encrypted data transfers;

Transmission of information to us by email

Transmission of information over the internet is not entirely secure, and if you submit any information to us over the internet (whether by email, via our website or any other means), you do so entirely at your own risk.

We cannot be responsible for any costs, expenses, loss of profits, harm to reputation, damages, liabilities or any other form of loss or damage suffered by you as a result of your decision to transmit information to us by such means.

Transfers of your information outside the European Economic Area

Your information may be transferred and stored outside the European Economic Area (EEA) in the circumstances set out earlier in this policy.

We will also transfer your information outside the EEA or to an international organisation in order to comply with legal obligations to which we are subject (compliance with a court order, for example). Where we are required to do so, we will ensure appropriate safeguards and protections are in place.

Your rights in relation to your information

Subject to certain limitations on certain rights, you have the following rights in relation to your information, which you can exercise by writing to the data controller using the details provided at the top of this policy.

  • to request access to your information and information related to our use and processing of your information;
  • to request the correction or deletion of your information;
  • to request that we restrict our use of your information;
  • to receive information which you have provided to us in a structured, commonly used and machine-readable format (e.g. a CSV file) and the right to have that information transferred to another data controller (including a third-party data controller);
  • to object to the processing of your information for certain purposes (for further information, see the section below entitled Your right to object to the processing of your information for certain purposes); and
  • to withdraw your consent to our use of your information at any time where we rely on your consent to use or process that information. Please note that if you withdraw your consent, this will not affect the lawfulness of our use and processing of your information on the basis of your consent before the point in time when you withdraw your consent.

In accordance with Article 77 of the General Data Protection Regulation, you also have the right to lodge a complaint with a supervisory authority, in particular in the Member State of your habitual residence, place of work or of an alleged infringement of the General Data Protection Regulation.

Further information on your rights in relation to your personal data as an individual

You can find out further information about your rights, as well as information on any limitations which apply to those rights, by reading the underlying legislation contained in Articles 12 to 22 and 34 of the General Data Protection Regulation, which is available here:http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf

Verifying your identity where you request access to your information

Where you request access to your information, we are required by law to use all reasonable measures to verify your identity before doing so.

These measures are designed to protect your information and to reduce the risk of identity fraud, identity theft or general unauthorised access to your information.

How we verify your identity

Where we possess appropriate information about you on file, we will attempt to verify your identity using that information.

If it is not possible to identity you from such information, or if we have insufficient information about you, we may require original or certified copies of certain documentation in order to be able to verify your identity before we are able to provide you with access to your information.

We will be able to confirm the precise information we require to verify your identity in your specific circumstances if and when you make such a request.

Your right to object

You have the following rights in relation to your information, which you may exercise in the same way as you may exercise by writing to the data controller using the details provided at the top of this policy.

  • to object to us using or processing your information where we use or process it in order
  • to carry out a task in the public interest or for our legitimate interests, including ‘profiling’ (i.e. analysing or predicting your behaviour based on your information) based on any of these purposes; and
  • to object to us using or processing your information for direct marketing purposes (including any profiling we engage in that is related to such direct marketing).

You may also exercise your right to object to us using or processing your information for direct marketing purposes by:

  • clicking the unsubscribe link contained at the bottom of any marketing email we send to you and following the instructions which appear in your browser following your clicking on that link;
  • sending an email to [email protected]       , asking that we stop sending you marketing communications or by including the words “OPT OUT”.

Sensitive Personal Information

‘Sensitive personal information’ is information about an individual that reveals their racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic information, biometric information for the purpose of uniquely identifying an individual, information concerning health or information concerning a natural person’s sex life or sexual orientation.

Our website does not allow you to register any ‘Sensitive Information’, however if we ask for this, you will be considered to have explicitly consented to us processing that sensitive personal information under Article 9(2)(a) of the General Data Protection Regulation.

Changes to our Privacy Policy

We update and amend our Privacy Policy from time to time.

Minor changes to our Privacy Policy 

Where we make minor changes to our Privacy Policy, we will update our Privacy Policy with a new effective date stated at the beginning of it. Our processing of your information will be governed by the practices set out in that new version of the Privacy Policy from its effective date onwards.

Major changes to our Privacy Policy or the purposes for which we process your information 

Where we make major changes to our Privacy Policy or intend to use your information for a new purpose or a different purpose than the purposes for which we originally collected it, we will notify you by email (where possible) or by posting a notice on our website.

We will provide you with the information about the change in question and the purpose and any other relevant information before we use your information for that new purpose.

Wherever required, we will obtain your prior consent before using your information for a purpose that is different from the purposes for which we originally collected it.

Children’s Privacy

Because we care about the safety and privacy of children online, we comply with the Children’s Online Privacy Protection Act of 1998 (COPPA). COPPA and its accompanying regulations protect the privacy of children using the internet. We do not knowingly contact or collect information from persons under the age of 18. The website is not intended to solicit information of any kind from persons under the age of 18.

It is possible that we could receive information pertaining to persons under the age of 18 by the fraud or deception of a third party. If we are notified of this, as soon as we verify the information, we will, where required by law to do so, immediately obtain the appropriate parental consent to use that information or, if we are unable to obtain such parental consent, we will delete the information from our servers. If you would like to notify us of our receipt of information about persons under the age of 18, please do so by contacting us by using the details at the top of this policy.