The Pro-Tibetan Movement masquerades as a mirror government in exile for the Tibet part of China, whilst simultaneously peddling a Christianised form of Buddhism to gullible Westerners for large sums of money. This corrupt empire spans most of the globe (outside of Socialist or Communist regimes), and it can be traced to a CIA covert operation in Tibet dating from the late 1940’s and early 1950’s. The capitalist US pursues a highly ‘anti-Communist’ agenda, and interprets the 1991 collapse of the Soviet Union as being amongst one of its greatest ‘Cold War’ achievements. The US plan to bring-down Communist China has been through the agency of exporting Christian bourgeois attitudes into the minds and bodies of Chinese citizens, so that they turn their backs upon their culture and self-determination, and eventually bring-down their own Communist regime from within. In this regard, and to this end, the US agitation in both Taiwan and Tibet is designed to achieve this objective. This neo-imperialist attitude seeks to destroy indigenous Chinese culture and political self-determination from within China itself, whilst the interests of China are constantly attacked, denigrated, and distorted in the outside world. The 14th Dalai Lama’s vast network of business interests (hidden behind the facade of numerous temples), covers the entire globe, as does the computer system that links all his commercial activities together. Although it is against basic Buddhist morality to ‘sell’ the Buddhist teachings, the 14th Dalai Lama (who jets from one five star hotel to the next, often travelling locally in a bullet-proof, chauffeur-driven limousine), has turned the Buddha’s teachings into a highly lucrative source of in-come. And the corruption does not stop there. The various groups of ‘exiled’ Tibetan monks under his direct orders in the West, travel about various business venues using the names of temples in Tibet they are no longer apart of, to raise vast amounts of money which is paid not to these temples (which are supported by the government of the People’s Republic of China), but is directed straight into the coffers of the 14th Dalai Lama. The 14th Dalai Lama’s influence spreads through Western businesses, media, leisure, education, entertainment and even national and international politics. Although an unelected despot, he has private meetings with the President of the USA, and is permitted to speak at the United Nations (UN). His network of computerised CIA connectivity came unstuck in 2009 when computer hackers and computer analysts stumbled across what has been dubbed the ‘Ghost Net’. This is a world-wide network of spying software spread through the 14th Dalai Lama’s computer network that has developed in scope and sophistication since the advent of the internet in the late 1990’s. Despite the epicentre of this vast computer spy-network being traced to the 14th Dalai Lama’s personal office, the Western media (no doubt led by the Western intelligence agencies), has attempted to mislead the public by blaming ‘Communist China’ for what has been described as an outrageous intrusion into the activities of Western Sovereign States and individual citizens. The fact that the 14th Dalai Lama’s ‘Ghost Net’ even spies on Russia and China is quietly placed to one-side and forgotten. The 14th Dalai Lama is a criminal living a life of luxury at the expense of the Western tax-payer (most of whom are not ‘Buddhist’, or have any interest in ‘Tibet’). The Buddhist groups he runs are cults that recruit and brain-wash their followers into obeying this CIA-created pseudo-reality, whilst his computer technicians knowingly invade the confidential work-place, and the privacy of the domestic home. The 14th Dalai Lama is not the victim of Ghost Net, he is the perpetrator of it, but the Western media would have you think that Ghost Net was developed by which ever country the US currently finds trouble-some. If you cover the lens of your computer, at least you can prevent the 14th Dalai Lama from looking into your living room, recording the images, and presenting that data to an unknown third-party.