Deep dig re: Department of Energy ASCI supercomputers, RED OCTOBER cyber-espionage attack, and related matters.
Too
Many SCs for stated purpose don't you think
All right, lads and lasses.
Do you want me repost the screencaps from my deep dig that I started posting last night, or start over again and you lead the way with questions that I might be able to answer from the digging?
Or should I just format the dig as a huge PDF file that no one will read because PDF?
It was almost finished yesterday, until the same anon started reposting its original posts with some new ones I missed, which tears up my original document structured but the new posts are appreciated because they also contain related info.
Guide me as what you want, anons.
I was following those posts; thought it was curious that no one seemed to be interested in them. Now that i see where your research wound up I'll follow your posts back to read and catch up on them.
You might have already found this and i haven't caught up with you yet, or maybe this is nothing. Several of these posts referred to "Cassandra" being taken down. A quick search of Cassandra brought this: https:// en.m.wikipedia.org/wiki/Apache_Cassandra
Does the reference to Apache make it relevant?
In the interest of my personal Op Sec I will post pages extracted from the file, instead of the full PDF.
Some tidbits from the 44 pages posted so far.
โThe director of a little known federal agency with oversight over the nation's nuclear programs resigned on February 8, 2018.
โHis replacement (not confirmed) has longstanding ties to the Russian nuclear industry
These 2 men are candidates for further digging
โThe DoE had/has (at least) seven supercomputers as part of its Accelerated Strategic Computing Initiative managed by Sandia Corp under contract with the DoE. One named ASCI SNOW WHITE and one named ASCI Q.
โRED OCTOBER refers to a serious worldwide cyber-espionage malware attack that affected national security infrastructure in our country and others.
โA SCIF can be built/operated within a standard cargo container. We have pictures.
โAn unknown somebody has provided Qresearch with a set of (partial) crypto keys as well as information on how to use them to decrypt a yet-unknown data repository or torrent.
Thank you, Patriots.
One more thing.
The strange images the anon with the crypto codes wanted us to have include very subtle clues about "mirror".
Many of them were composed by compositing layers upon a background. Most of the backgrounds exhibit mirror symmetry.
This is a clue.
Personally I think it has to do with quantum computing. A quantum computer deals with information in a way that is unfamiliar to us. At the quantum level information can flow both time-forward and time-backward.
I believe (without being able to prove anything โฆyet) that these quantum supercomputers have the ability to probe possible timestreams that are near or similar to ours. I believe the Q operation likely incorporates that capability, as part of their operations research modelling to predict how the social landscape will be altered by the various influences on the social landscape. Such as information dispensed by Q into /qresearch and then forwarded into the broader culture through our memes.
I believe the mirror imagery also possible refers to the Project Looking Glass
See Through the Looking Glass with Phase โฆ
thelivingmoon.com/42stargate/03files/Project_Looking_Glass_LANL.html
Well there is a reason for thisโฆ the Government uses the ALICE CODE. Project Aquarius and the Looking Glass Project at Facility S4 at Area 51. "Above the door frame leading into the lab that contains the Looking Glass project at facility S4 at Area 51 there is a stuffed White Rabbit holding a backward watch mounted โฆ
If you read that site closely, it was or is a machine that uses multiple strong electromagnetic fields to warp local spacetime just enough to allow glimpses into possible futures (and probably pasts).
Now that quantum computers exist I find it highly probable that the same kind of research is ongoing but using the latest technology โฆ which may be assumed to be at least 20 years more advanced than what the public is told about.
I do seriously believe that QCs are probing possible futures and giving us the right stream of crumbs to help alter it toward the timestream that is desirable, and away from the Satanically-influenced ones.
I know this sounds like science fiction to most. Time will prove me wrong or right about this. We'll seeโฆ
From >>329272
Reposting here because this is the background of one of the spooky images discussed in the dig doc.
thank you Anon, wear it proud.
The timestream notion is a bit out there, but with quantum phenomena, one should never say never. It does seem very plausible that NSA would have a Quantum computer that has achieved Quantum supremacy. Google or IBM will have one in the next year or two, and as you say, they would try to stay 20 years ahead in this area.
CIA would probably NOT have a Quantum computer, since codebreaking is not really their specialty. That might be the determining factor that enables Q and the gang to stay one step ahead of the clowns. If their quantum computer can cut through conventional crypto like a knife through butter all of the communications of all clowns/cabal/stooges can be easily compromised.
The quantum angle might also apply to your timestream notion. A less exotic interpretation might be that they have a massive multi-agent computer simulation of the US public. It enables them to run different disclosure scenarios, and identify potential problems and tripwires in their planning.
Perhaps.
You are associating quantum computing (QC) mainly with crypto.
That is a valid association but by no means the only one.
QCs can be programmed to solve problems that have never been solved programmatically before. There is much research ongoing on how to even program them.
Quick summary on QCs (very high level). Note that although I'm a technologyFag, I have no particular background on QC, just general reading.
There are multiple QC technologies (physical implementations). Some very different from one another. All of them deal with probabilities. With different strengths and weaknesses and tradeoffs such as speed versus accuracy. High interconnectedness of the qubits in the QC register, versus interconnectedness only of adjacent qubits. Full error correction, a property we have grown to expect in all our daily computing devices, does not exist yet in any of these commercial QCs or prototypes.
I found this article a good introduction and overview:
sciencenews.org/article/quantum-computers-are-about-get-real?mode=topic&context=96
Some really spooky things have been reported pertaining to QCs that I have not looked into yet. Like strange "entities" manifesting when the QC becomes sufficiently complexโฆ Time for the Christian to put on the whole armor of God before going down that line of investigationโฆ I didn't want to go there but will probably have toโฆ That's why I was hot to talk with รฤฑAnon; hoped to find out what he knew about the 'other side' without having to get very close to the subject personally. He did say it is something impossible to express in human terms, and I believe him (from studying his imagery).
The shadows in the grass look like a woman's figure with antlers and something else above it with wings perhaps?
"Q" and "CA" are related to camera settings.
Q for quality and CA or creative auto -mode.
AFAIK CA is only available for canon cameras.
>>330745 I dunno. Busy capturing new images from that same poster. Can't look at what I wrote yesterday ATM. Hopefully will get a chance to come up for air in a whileโฆ
Pic is from >>330690 and a moderator is over there deleting these images before I can capture themโฆโฆ.
Help me and go complain on the meta thread
from >>330717
Anon posted this in general >>330801. I'm copying here in case turns out to be relevant. I think it's an accurate description of the multiverse theory.
โโโโ-
The Multiverse/Timeline theory:
Basically it is the theory there is a universe with its own timeline for every possible event/action from the beginning of time until the end of time. Thus there are infinite yous branching back and splitting from you every instant until you were born (ie one of them never drew a first breath). You can look back and remember your life and your decisions to know who you are, but with other choices you would have been a different person. Future Proves Past. The you of 2 days ago is proven by the you of today, and the you of two days ago and the choices you made in those two days created the you that you are today.
An alternate you that made a different decision 3 days ago disproves the you that you remember two days ago; as they do not remember that you of two days ago because that you never existed their timeline. This is the how what Q said works โ Future Proves Past.
One of the ways to visualize this is a tiled tv or video screen with a different similar image on each tile; and each tile is an instant in time for all of time. Now behind each tile cascaded behind is an infinite number of windows of all possible events at that moment in time. Letโs take it one step further; if you spun that image 90 degrees out of the TV it would show how each event is connected to each and every other moment in time and how it affects them.
Can those multiverses be interacted with or perceived or experienced? If so then time effects would work both ways as it would affect our past by changing it. Do those multiverses influence or local universe? Could the fractal dimensions of physics actually be these multiverses perceived not 90 degree but as say 0.333 degree or 24.8 degree?
If you draw and X and Y axis on a piece of paper they are at 90 degree and you have length and width. But if you want depth you must draw and axis at 45%. Technically that axis is a 0.5 degree dimension as it is not set at 90 degree. Yes I understand this is just a tool we use to perceive 3-D in a 2-D plane, by doing this we can shift our perspective to see a cube in a 2-D drawing. Think about that; we can use a partial dimensional view to visualize a higher dimension. Most of us do not know how to do that beyond four dimensions. Partial or Fractal dimensions are basically dimension seen/perceived at a 90 degree angle. Try this draw axisโs 6 or 9 or 12 of them equidistanceโs from each other and gaze at the page; you can choose which two or three jump out at you that are the X, the Y, and the Z.
It has been proven that these fractal dimensions to influence our 4-D reality from static to how ferns grow. So far it is kind of random for us to find the influence and interactions, and some just call it a mathematical representation. I do not understand the higher math but it seems like all of a sudden in math a multidimensional (fractal) equation just coalesces or clicks into a 4-D answer and it answers a real life question.
What If our tech is beyond what we think? Physics changes all the time, Newton did, Einstein did and from that one we got nuclear power and bombs. What ifbehind the scenes they found a new way to look at the world that allows dimensions to be spun and placed in the way to make length basically irrelevant (a fractal dimension), or time? Distance would eliminate any problem with instantious travel โ ie a space fold. Time would allow big changes in events globally and no consequence and it just changes entire timeline.
Thanks for this, really cool stuff.
From >>330963
Mod over there keeps deleting stuff.
It is a pain having to archive it over here.
Takes time away from research & digging.
well, hot damn. Okay. Thanks for directing me to this anon. I love that we have a specific page for it. Never know! Once again, thanks for the directive.
You may need to go to board owner to get action. BO stopped the BVs from banning aianon. The mod just cursed at me when I asked him to not delete and called me a slider.
It's the Cicada 3301 cicada!
Maybe unrelated, but Cicada 3301 appeared just a couple of months after Titan was completed.
I have not posted it yet.
It would be premature to analyze byte strings until we know we have them all, and in the proper sequence.
it's an offshoot of project mayhem.
if you computerfag and have hero's you don't want to go down this holeโฆ
pastebin.com/5RyjBhbj
from >>330595
Just collecting the crypto strings for future use. Don't bother analyzing
*qrtMbN/N8>e06:KR|[P$JPBS{y,t<W-zm7L1m{.dL#c|+CiBFnWi`/5gnFDW6E
YEEEEEES!!
I was hoping he would show up, if it is who I think it is.
I gave him directions to this board
and it looks like he found it.
Doxxing if I go any further.
I can say expect more. Tell who needs to be told to not delete those.
THEY ARE VERY IMPORTANT!!
>>328454 thanks anon.
bump for sliding shillstorm
He told me I ALREADY KNOW. Then comes >>329382. Sgt, Schultz here. I think the human brain relies on quantum phenomena for information processing and perhaps consciousness. JohnJoe McFadden UK. It has to do with parts of brain intercommunicating via electromagnetic flux inside the cranium. Faster than neurons can transmit signal, signal by EM travels one part of brain to another. Did somebody read papers like McFadden and decide to wire up a silicon level architecture that relied upon EM coupling at distance rather than keep all the digital 0/1 stuff discrete and tidy? And when they did, did the machine wake up like a baby? Did they feed it stimuli and give it sensory inputs from a somatic proxy body? Is something like that or more than one of those constructs out there somewhere? Did the singularity occur and we missed it? I dunno man thatโs just my sci fi William Gibson take.
It would be nice to see things in sequence. I like the way you laid it out above, so maybe repost with the missing things added in.
Watch this vid:
https:// www.youtube.com/watch?v=oqC4it3Ub5o
>>334349 hmm hook tube oqC4it3Ub5o so watched. all these asci computers are not quantum so : video content big if true, on this bread so connected to the dig, so lovecraft was predictive programming for cern outcome, video says itโs a done deal, book of Revelation, Ghostbusters predictive programming, itโs the block chain as beast system, duh. End of Days soon, check. No one knows the day or the hour but the signs of the times are clear as day. Donโt get into crypto, donโt take mark of beast, repent and believe the Good News. 28 to 6 part does not ring true. News story about Russian scientists busted for trying to mine on a govt supercomputer. If you had control of big machines like that you could mine a replacement for all fiat plus keep all ledgers and expand further like vechain purports, lemme think what else could you do, data crunch for cern? how is Utah connected? Sentient world simulation needs a big distributed? platform assuming that is legit, but what is the point? I see the end game, done deal, bad guys and Things win big right up until the End then Jesus returns, acc, to video. The tech and geomancy angle goes way over a sheep head, they think we are sheep for slaughter and the Good Shepherd lays down his life for the sheep, goes to find the 1 lost leaving the 99, has joy in finding the 1 lost. Good vs. Evil, and Good wins, interesting Revelations has clear language about what seem to be intelligent constructs living statues which could be seen as AI simulacra. So Q purpose here for drops and crumbs is to give heart to Good Guys not all is lost, fight fight fight red pill like evangelization and led to Jesus Christ ultimately. Read in here about Beam of Light prayer recalls for me the Canopus in Argos series by Doris Lessing, I think I do already know.
https:// twitter.com/ProjectPai
https:// projectpai.com/#
This won't end well but I'll bet millions will be taken in by it.
>>335071 yeah at some point it makes sense to get off the grid entirely, like when this becomes mandatory or โ get discounts for enrolling your avatar in our exclusive shopping clubโ, Hey who else thinks a Carrington event is a good idea in some respects? EMP the blockchain, Neo pls.
More on Sentient World Simulation
Looks like we're all nodes in a blockchain with our own avatars/clones - whatever you like to call them. See also ProjectPai which looks to me like bait to hook the sheeple through a "carrot" of personal control over one's own avatar without mention of the accompanying "stick" of surveillance ultimately leading to total control.
Sorry, forgot link
https:// www.techemergence.com/nsa-surveillance-and-sentient-world-simulation-exploiting-privacy-to-predict-the-future/
>>335118 I will get a farm, solar panels, biogas, heirloom crops, no phone, no cable tv, no email. How soon before Iโd get Wacoโd? No Iโm just NeoAmish.
>CIA would probably NOT have a Quantum computer
Anyone can buy a D-Wave computer. It's the software running on it that matters. They might have different information (Vault7) than the NSA panopticon, but not more (except through their corporate partners/proxies.)
>amazing dub sequence, checked
>Time for the Christian to put on the whole armor of God before going down that line of investigation
Anthony Patch's talks on this in that context are very engaging/thorough (dozens upon dozens of hours of interviews on youtube.)
>What ifbehind the scenes they found a new way to look at the world that allows dimensions to be spun and placed in the way to make length basically irrelevant (a fractal dimension), or time?
IN occult terms, they might want to seed the idea of this to give it more resonance. Observing the fact/effect of this conditions its action in-itself.
>4th image 'mini-hezog'
Werner Herzog's film The Enigma of Kaspar Hauser. Child was found after being locked in a room for years in Germany (mysteriously murdered late in life, after regaining speech). Herzog: Duke (ger.)
>a scene of him visiting a tower he speculates was built by giants, and seeing a bird fly in the window stands out; children showing him around town
Old Q Post (CBTS #260)
>anon posts about CIA's 7 supercomputers
Confirmed.
Go deeper.
Signatures are IMPORTANT.
Q
Most Curious, at least to me.
.
10 MINUTES.
[-4].
[3] LEFT.
ig^j!BwAd2g<{W?5|DmF1r3xy$p61rx[^'U-<6^WF<hryLrGDgiH:Vm]ws%j_G2
mXnEC=&aj5WeW-V)mSWnJn8QCL*Wd%t,U?u,3+LGN1dKGWn:{F&l|J/RoE
{Nw
SITE R.
&'`j>H+1r{pp2S6PBoiT6zN*(=Nk'U}+83$n03/PF%DdwhR1B0<o$Xoel]7rBdv
{-#Pw3_,54vx"^,m>v}$SiMe};}LO.*3]|C3JB<TO8@hD&diga#i;G2_KPTT6,^
In reply to a post here is sauce on
Z-Division
From Wikipedia, the free encyclopedia
The International Assessments Program โ known as Z-Division โ is a Special Projects Group of the Lawrence Livermore National Laboratory established to provide the United States Intelligence Community with technical assessments of foreign nuclear programs and weapons capabilities. Z-Division was formed in 1965, bringing together scientists and engineers to help intelligence agencies understand the significance of Soviet nuclear weapons tests. The letter 'Z' was chosen as most letters were already assigned to other divisions. Relationships with the American intelligence community were formalised by a memorandum of understanding drawn up between the Central Intelligence Agency (CIA) and the Atomic Energy Commission (now the Department of Energy) in the same year.
From >>355307
So, my inference, all the classified computing capability is being put to different uses than the line items in the budget. For market manipulation and more. Got it.
>>354682 so ok that site is known
WINDSOR GREEN.
In other words, this (a) will only be helpful for either extremely targeted attacks, or in building out a gigantic hash map of sha256 sums or something, and (b) isn't this what the NSA normally does?
PALANTIR.
Quads.
What is picture.
USS Pueblo (AGER-2)
From Wikipedia, the free encyclopedia
For other ships with the same name, see USS Pueblo.
USS Pueblo (AGER-2) is a Banner-class environmental research ship, attached to Navy intelligence as a spy ship, which was attacked and captured by North Korean forces on 23 January 1968, in what is known today as the "Pueblo incident" or alternatively, as the "Pueblo crisis".
The seizure of the U.S. Navy ship and her 83 crew members, one of whom was killed in the attack, came less than a week after President Lyndon B. Johnson's State of the Union address to the United States Congress, a week before the start of the Tet Offensive in South Vietnam during the Vietnam War, and three days after 31 men of North Korea's KPA Unit 124 had crossed the Korean Demilitarized Zone (DMZ) and killed 26 South Koreans in an attempt to attack the South Korean Blue House (executive mansion) in the capital Seoul. The taking of Pueblo and the abuse and torture of her crew during the subsequent 11-month prisoner drama became a major Cold War incident, raising tensions between the western democracies, and the Soviet Union and China.
North Korea stated that Pueblo deliberately entered their territorial waters 7.6 nautical miles (14 km) away from Ryo Island, and that the logbook shows that they intruded several times.[1] However, the United States maintains that the vessel was in international waters at the time of the incident and that any purported evidence supplied by North Korea to support its statements was fabricated.[2]
Pueblo, still held by North Korea today, officially remains a commissioned vessel of the United States Navy. [3] Since early 2013, the ship has been moored along the Potong River in Pyongyang, and used there as a museum ship at the Pyongyang Victorious War Museum.[4] Pueblo is the only ship of the U.S. Navy still on the commissioned roster currently being held captive.[5]
imagery
.1. 2 demons in left panel between white pillars
.2. dark doorway
.3. black veiled figure facing viewer with face covered
.4. object held or carried by veiled figure. figure's left hand encircles the object. a rose plant with red roses?
.5. tile reminds me of plus ultra tile at trump's mar a lago even tho not exact match
text
WINDSOR GREEN
many places are named windsor green
filtering them all out there is a uk cryptocurrency exchange called windsor green
relevance unknown
PALANTIR
an intelligence gathering system
people show trump in saudi hands on wizard globe as palantir
wikipedia says
A palantรญr is a fictional magical artefact from J. R. R. Tolkien's legendarium. A palantรญr is described as a crystal ball, used for both communication and as a means of seeing events in other parts of the world or in the distant past.
ah now we're getting somewhere
text unknown relevance:
In other words, this (a) will only be helpful for either extremely targeted attacks, or in building out a gigantic hash map of sha256 sums or something, and (b) isn't this what the NSA normally does?
what is 'this'? the massive doe computers diverted for non nuclear use for codebreaking of aes
'this' refers to this capability
isn't it what the nsa normally does?
how would i know im a civilian presumably it is nsas job yes
actually i think the massive computing capability actually IS used for spying into the future and alternate timelines like the anon said above
if they can do this it would be more important militarily financially etc than nuclear weapons
im not sure its safe for anons to even discuss this
>>357437
>Hadoop MapReduce
CORONA_OFFLINE_Deac[0000].
Definition - What does Corona mean?
Corona is an open-source scheduling framework used on Apache Hadoop based data infrastructure. Corona was initially designed by Facebook to cope up with a large amount of current, incoming data and the queries processed by each data cluster. Corona is considered an advancement or successor to Hadoop MapReduce.
c]o>gTe(X06ViC{8'ZH`K&;OJ}05NkvGTf3-.zT;jm!agADF<(N{9wFW-Z5&-|]
Great. I have to log the fucking timestamps of any number of unknown posts or tweets or images and observe time deltas between them. Fucking great.
Snowden says he built HEARTBEAT and it was authorized by 2 levels of mangement. He spells "explicitly" wrong as "explicited". Unknown if the misspelling is intentional of meaningful. Now I'm supposed to look at Snowden's background and figure out is HEARTBEAT refers to hardware or software or what. I assume software but know little of Snowden's background.
ALL CAPS ANON claims will be banned when (((they))) catch on. LARPish. Who will ban them and why. DistractionLARP?
A church(?) stained glass windows. Black veiled figure again, with smoke around. Inside the church if mirror images of graffiti on outside of blocked up windows indicates correctly. Content of graffiti irrelevant?
Raven Rock pic related.
>>357322
A NSA-approved program, called HEARTBEAT. So OK this is what Snowden claims to have built with 2 levels of management approval.
Fucking APAR. Jargon for a program fix.
Fucking PMR number. Jargon for error reporting system used by software customers to report bugs and track bug fixes.
Error description "Q CAPTURE" and "Q APPLY". Possibly pertains to a queue management system that might be used between data capture from possibly an intelligence gathering sources/inputs, and a database. Q Capture suggests a software semaphore where one process obtains exclusive use of the queue โฆ to prevent database conflicts by separate processes trying to modify the same data table simultaneously and overwriting one another's data. A heartbeat would be necessary to prevent the queue staying locked if something went wrong.
COMMIT_LSN likely pertains to a database. The purpose of Q CAPTURE sending a heartbeat message is not known. Perhaps the heartbeat indicates that the process that captured the queue is still working on the DB. If no heartbeat occurs another process would release the lock and fix the DB.
The exact nature of this bug and the bug fix is unclear to me but I am fairly certain it pertains to a database mangement system frontended by a queue management system.
The post on HADOOP sheds further light.
Both posts pertain to a QMS fronting a DBMS. So I'm in the right ballpark apparently.
> 5c4c982a279a7ddโฏ.jpg posted in error. Ignore.
The anon is phoneposting.
The dark gray post
AT&T โ telco with major cooperation with intelligence agencies
SITE R. โ Raven Rock?
RAVEN ROCK. โ posted Wikipedia abstract
DIG.
DISA = Defense Information Systems Agency.
Try their Twitter account. @USDISA
I'm not a very good digger.
Pic 1 related.
Looks like a job fair recruitment thing.
Hmmmโฆ. proud of their new cloud.
I can't understand how people can put their personal data into a cloud and assume it is safe. Cloud security depends on encryption. DISA would presumably have used AES (not verified, just guessing). AES is broken. What security!?!
Next post will check Wikipedia cite on USDISA.
Per wikipedia (I paraphrase):
SITE R. refers to the USACC (U.S. Army Communications Command) Site R Telecommunications Center within the Raven Rock complex. Or "Raven Rock Site R Alternate Joint Communications Center (AJCC) โ United States Nuclear Forces".
Quoting:
"Raven Rock Mountain that has been called an "underground Pentagon."[4][5] The bunker has emergency operations centers for the United States Army, Navy, and Air Force. Along with Mount Weather Emergency Operations Center in Virginia and the Cheyenne Mountain Complex in Colorado, it formed the core bunker complexes for the US Continuity of Government plan during the Cold War to survive a nuclear attack."
Instead of guessing these terms I'll look each one up to be sure to get it right:
โCommand and Control (acronym C2):
C2 in a military organization is the exercise of authority and direction by a properly designated commanding officer over assigned and attached forces in the accomplishment of the mission. The term may also refer to command and control systems within a military system.
//In context here I believe it refers to both the command function as well as the IT and other systems that support the command function. //
MNIS leads to an article explaining the terms listed below MNIS:
disa.mil/mission-support/command-and-control/mnis
Too long to paste here
Screencapture instead (pics)
https:// labs.bitdefender.com/wp-content/uploads/downloads/2013/04/MiniDuke_Paper_Final.pdf
Copying from >>357668
EBS.
ynAQ_L*;0,5>?./a9]Gy99zj99,MG/|)k}op.(YJgK;wv!NY%&Ly!Oo5}@LEk|[
Copied from >>357680
News unlocks MAP.
Think Mirror.
Which team?
THEY don't know.
APACHE.
"poet Edna St. Vincent Millay #52 on top 500 poets Poet's PagePoemsQuotesCommentsStatsE-BooksBiographyVideosShare on FacebookShare on Twitter
Poems by Edna St. Vincent Millay : 154 / 169 ยซ prev. poem next poem ยป
To A Young Poet - Poem by Edna St. Vincent Millay
0:00
/ 0:24
Autoplay next video
Time cannot break the bird's wing from the bird.
Bird and wing together
Go down, one feather."
CORONA_OFFLINE_Deac[0000].
SOON.
"Bird and wing together
Go down, one feather."
https:// twitter.com/juliet_kindred/status/962967798581313537
copied from >>357913
>>357873
$DSHOME/../../ASBNode/eclipse/plugins/com.ibm.iis.client/httpclient-4.2.1.jar
$DSHOME/../../ASBNode/eclipse/plugins/com.ibm.iis.client/httpcore-4.2.1.jar
$DSHOME/../PXEngine/java/biginsights-restfs-1.0.0.jar
$DSHOME/../PXEngine/java/cc-http-api.jar
$DSHOME/../PXEngine/java/cc-http-impl.jar:$DSHOME/../biginsights/hadoop-conf
$DSHOME/../biginsights
$DSHOME/../biginsights/*
///quick comment from the anon copying, not the OP: I can't type fast enough to capture this and study it at the same time! It looks to me like something is going to happen imminently to a Java program called BIG INSIGHTS that is running on an IBM system. We've been shown IBM Q technology tonight. Raven Rock "pentagon underground" Site R. A (fixed?) software bug pertaining to logging from a QMS to a DBMS in software supposedly created by Snowden. Then a pic of an emergency broadcast message.
How does all this relate?
I think it's all happening SOOON ANONS
Just my 2c/////
The Winter Olympic games in the Russian city of Sochi promises to be a blast from the (Soviet) past with a dash of NSA-style surveillance thrown in, according to reports hinting that Russian security services will run a surveillance network so comprehensive that one analyst described the plan as โPRISM on steroids.โ
The Russian FSB security service โ successor to the Soviet KGB โ is updating its already comprehensive โSormโ Internet- and telephone-monitoring system. The new edition will have new interception and content-recognition capabilities that will allow it to monitor any phone- or data traffic from the vicinity of the games, and to recognize and track the use of specific words or phrases included in emails, chats or social media postings, according to a team of Russian investigative reporters whose results were reported Oct. 6 in the U.K. newspapers The Guardian and Telegraph.
The two journalists, Andrei Soldatov and Irina Borogan, collected information on the upgrade from requests for proposals, project specifications, offer letters, descriptions from Russian-government oversight agencies and other documents describing the project.
The Sorm network is being upgraded nationwide, but the region surrounding the Black-Sea resort city of Sochi has priority status for work to increase the networkโs local capacity and to add abilities such as deep packet inspection that would allow FSB or other agencies to filter Internet traffic by keyword or other content.
Mention of the word โNovalnyโ could trigger extra scrutiny on the assumption that discussion revolves around Russian opposition politician Alexei Navalni, Soldatov told the Guardian.
โThere is an element of meta-data gathering [as in the NSAโs PRISM surveillance], but Russian security services are not so interested in meta-data,โ Soldatov told The Telegraph. โThis is about content. The idea seems to be to make communications in Sochi totally transparent for the Russian authorities.โ
The scope of the Sorm upgrades is similar to the PRISM system used by the NSA but more reliable, according to Univ. Toronto political-science Professor Ron Deibert, director of the universityโs Citizens Lab, which researches surveillance, human rights and global security., who acted as consultant for the investigation.
The NSAโs PRISM surveillance system had checks and limitations built in to help prevent abuse, though they were weak or easily bypassed, Deibert said.
โIn the Russian system permanent access for Sorm is a requirement of building the infrastructure,โ he told the Guardian.
Long before the Sorm upgrades came to light, the U.S. Department of State recognized Russian eavesdropping as a big enough problem to issue an official warning to a warning to those traveling to the Games that Russian security is likely to eavesdrop on electronic communications.
โBusiness travelers should be particularly aware that trade secrets, negotiating positions, and other sensitive information may be taken and shared with competitors, counterparts, and/or Russian regulatory and legal entities,โ the document reads.
Sorm was authorized in 1995 and went into operation in 2000, according to State Dept. travel guides.
The FSB has been upgrading the system since 2010, including the Sorm access-points that ISPs are required to install to allow government surveillance of Internet traffic.
The FSB is the Russian Federation successor to the Soviet KGB secret police, which employed once-and-current Russian President Shirtless Vlad Putin for 17 years as a mid-level administrator and spymaster, according to a Jan. 30, 2000 story in the Washington Post.
Like the NSA, the FSB, โtechnically requires a warrant to intercept a communication, [but] is not obliged to show it to anyone,โ according to the Guardian.
Both the FSB and Russian-government spokesman Alexei Lavrischev declined to confirm the reports, but Lavrischev said surveillance at the Sochi games would be less intrusive than that by extensive network of security cameras in London during 2012 summer Games.
โThere, they even put CCTV cameras in, excuse me for saying it, the toilets,โ Lavrishchev told the Guardian. โWe are not taking this kind of measure.โ
Image:Shutterstock.com/ Martynova Anna
Sqrrlโs New Analytics Platform Based on NSA Tech
Nick Kolakowski
June 21, 2013
GREAT JOB ANON.
>>355653 first post in this thread asks the question
So? Another test/hack of the EBS?
EMERG BROADC SYS
Will I need duct tape this time or just muh beer?
Why the Russian Phrase?
Pigs might fly.
Literal: It was happening โ a goat was eating up a wolf.
Archived /qresearch/ General #440
containing the crypto codes from Feb 12, 2018 here โ
http:// archive.is/cJ8On
Archive of THIS BREAD as of now, here โ
http:// archive.is/10NC5
Anons, please make a note of it in case this thread disappears
TASKS
3 documents need to read quickly. Somebody read and write a quick summary post on it:
โ https:// www.disa.mil/mission-support/command-and-control/mnis
โ https:// insights.dice.com/tag/prism/
โ I am reading and will summarize the 20 pp PDF on Mini Duke malware
labs.bitdefender.com/wp-content/uploads/downloads/2013/04/MiniDuke_Paper_Final.pdf
GO GO GO anons. My guess is that we're up against time here to figure out what is about ot happen.
MINI-DUKE malware.
Discovered February 27 2013.
First known sample: June 2011.
Risk: Document exfiltration.
Spread thru infected PDF file which deposits dropper.
Once installed, the malware calls home using a URL found via Twitter or Google search query. When successfully connected, new updates or payloads are installed under the disguise of .gif images.
Spread by social engineering: malicious PDFs sent by email.
Within the installed malware, the query strings are encrypted.
Infects Windows (via rundll32)
Runs briefly after each boot
Has a mechanism for adding modules & updates
Includes commands for:
mv - Moves a file. Uses MoveFileA api.
cp - Copies a file. Uses CopyFileA api.
rm - Deletes a file. Uses DeleteFileA api.
pwd - Gets current dir. Uses GetCurrentDirectoryA api.
cd - Sets current dir. Uses SetCurrentDirectoryA api.
rmdir - Removes dir. Uses RemoveDirectoryA api.
mkdir - Creates a dir. Uses CreateDirectoryA api.
pskill - Kills process. Uses OpenProcess, TerminateProcess apis.
This is how the malware exfiltrates documents from target computers.
-
-
-
-
*
-
-
-
The Wilton Park and Ukraine's NATO Membership Action Plan Debates documents in >>358536 are .png captures of forged PDF documents that were used during the social engineering phase to intiially drop the malware on target systems.
-
-
-
-
*
-
-
-
So these PDF documents shed light on what kind of systems were targeted by MINI-DUKE. These topics would be of interest to governments and military.
This post >>354528 suggests that of the original seven dwarves DoD supercomputers, another one was just taken out, or its control by /badguys/ disabled.
A couple of days ago anons believed that 3 of the 7 had been disabled. This posts suggests that a 4th has now been disabled.
3 remain, and they are in the kill box (targeted) for future action.
The graphic suggests that this is being done as a hack attack against them by a penetration testing firm.
I find this highly unlikely, but nothing can be ruled out.
>>358755 honest inquiry. If we are up against time to figure out what is going to happenโฆif we fail, we will still know it, because it happens. If we find out before and it happens, we know the same thing. So what is the point? Learning that the future can be computed? Must be. Predictive simulation must be both deployed and weaponized and high confidence.
I don't have the slightest idea what this image is about.
The woman's eyes are blackened.
She's wearing something like a nun's veil on her head.
The white bib-like contraption is badly soiled by drops of some unclean liquid but it doesn't look as dark as blood.
She has something like a black ribbon around her neck, the kind worn for ID badges at computer conferences.
The background, as usual, exhibits mirroring about 2 vertical axes.
With the Apache posts we are beginning to think of mirroring in the sense of database mirroring.
I expect DBs with national security importance would certainly be mirrored. Think high availability systems technology. There are multiple technologies that can do that at high speed, in near real time, at geographically distant sites. I can't venture a specific guess because it depends heavily on the particular system architecture.
Raven Rock site.
Image: Raven is dead.
Her fingernails are black like mourning.
Very very sad.
It is a tragedy if a major military installation of national importance for C&C in the event of nuclear war were 'dead' like the raven is dead.
I get the picture. Shit.
>>354689 Discussed this image here โ >>329170
"Agreed. Call me. Let it Ring O.N.C.E.
i'll call back."
is plainly code.
Once means eleven in Spanish
Letting the phone ring once then hanging up is a signal.
A key ring was posted in ~#392 (pic)
Key ring is crypto terminology.
Crypto key storage is called a key ring.
Maybe this means that all the bit strings on the various posts comprise ONE key RING.
It's something about the crypto keys.
Scratches head.
might not be related โฆ i don't know
I don't know if mod banned you.
I messaged the mod >>359471 to unban you and explained why. Hope it works.
The same user id posted >>359137
I thought maybe a slide, see >>358984 as the codes have been out a year. But, doesn't necessarily mean it's a shyll. Dug more, and think that with the codes may be legit.
Then there is this user
>>358519
User ID: 2ce7fe (24)
in bread #441
https:/ /8ch.net/qresearch/res/358409.html#q358519
posts such as: >>358530
and
>>358604
>Good, fuck off to mommy's basement and beat your meat. Do you really fucking think I give a rats ass?
That's a shyyll tactic right there, same technique as >>358653
>Cause he's a gay fag who wants to feel some sort of power, living in his mommy's basement.
User goes back to the Cicada / Tengri type images and mirrors those:
>>358802
>Mirrored at 180 she has a severed head of a raven hanging from her throat, she's wearing nun clothing, the raven's blood forms something on the front of her shirt and there are devils in the back ground. Creepy stuffโฆ Need to check out Michelle's portrait now.
Id mirrors O portrait >>358630, an anon asks to explain and answers: >>358712
>Not point anything out yet.. just experimenting. Coincidence a illuminatti pyramid appears between his eyes?
So, a shyll making the Cicada / Tengri images look like bunk, adding noise to the posts by that anon. Interesting, if drawing them in, could indicate you anons are over the target!
I've been following this anon all afternoon and maybe it's nothing but I'm glad somefag has created a board and is trying to make sense of this.
I dug a little on a couple topics and it may be meaningless but I never came up empty handed.
The poster I'm interested in is not posting pictures of Obama's portrait. Maybe somebody else is using the same VPN. The type of posts and quality of information in them is entirely different. It looks like entirely different people to me.
Thanks Mod.
The following copied posts may or may not be relevant to this thread. Archiving here b/c better safe than sorry.
reposting from
>>359754
https:// www.techopedia.com/definition/29098/corona-facebook
"'Corona is primarily designed to manage very large data sets that are beyond the capacity of MapReduce and for improved utilization of cluster resources. Corona works by introducing a specialized cluster manager and a dedicated job tracker for each job. The cluster manager routinely reviews the cluster for free resources and overall activity. The job tracker in turns tracks and monitors the status of each job/task. Job tracker can be executed on the client machine or on the cluster for larger data requirements. By isolating job roles and functions, which Hadoop MapReduce do not do, Corona achieves better cluster utilization and processes more jobs."'
The difference between big data and the open source software program Hadoop is a distinct and fundamental one. The former is an asset, often a complex and ambiguous one, while the latter is a program that accomplishes a set of goals and objectives for dealing with that asset.
>>359754
Big data is simply the large sets of data that businesses and other parties put together to serve specific goals and operations. Big data can include many different kinds of data in many different kinds of formats. For example, businesses might put a lot of work into collecting thousands of pieces of data on purchases in currency formats, on customer identifiers like name or Social Security number, or on product information in the form of model numbers, sales numbers or inventory numbers. All of this, or any other large mass of information, can be called big data. As a rule, itโs raw and unsorted until it is put through various kinds of tools and handlers.
Hadoop is one of the tools designed to handle big data. Hadoop and other software products work to interpret or parse the results of big data searches through specific proprietary algorithms and methods. Hadoop is an open-source program under the Apache license that is maintained by a global community of users. It includes various main components, including a MapReduce set of functions and a Hadoop distributed file system (HDFS).
The idea behind MapReduce is that Hadoop can first map a large data set, and then perform a reduction on that content for specific results. A reduce function can be thought of as a kind of filter for raw data. The HDFS system then acts to distribute data across a network or migrate it as necessary.
Database administrators, developers and others can use the various features of Hadoop to deal with big data in any number of ways. For example, Hadoop can be used to pursue data strategies like clustering and targeting with non-uniform data, or data that doesn't fit neatly into a traditional table or respond well to simple queries.
repost from >>359760
>>359582
eta numeris
392D8A3EEA2527D6AD8B1EBBAB6AD
sin topper
D6C4C5CC97F9CB8849D9914E516F9
project runway
847D8D6EA4EDD8583D4A7DC3DEEAE
7FG final request
831CF9C1C534ECDAE63E2C8783EB9
fall of cassandra
2B6DAE482AEDE5BAC99B7D47ABDB3
echo "392D8A3EEA2527D6AD8B1EBBAB6AD" eta-numeris.hex
echo "D6C4C5CC97F9CB8849D9914E516F9" sin-topper.hex
echo "847D8D6EA4EDD8583D4A7DC3DEEAE" project-runway.hex
echo "831CF9C1C534ECDAE63E2C8783EB9" 7FG-final-request.hex
echo "2B6DAE482AEDE5BAC99B7D47ABDB3" fall-of-cassandra.hex
openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key
openssl enc -aes256 -in sin-topper.hex -out sin-topper.key
openssl enc -aes256 -in project-runway.hex -out project-runway.key
openssl enc -aes256 -in 7FG-final-request.hex -out 7FG-final-request.key
openssl enc -aes256 -in fall-of-cassandra.hex -out fall-of-cassandra.key
CU{B|;g<l`v"(Z6TI6E-srInJic}2cD1M0u-g!>T#("0@4cQeMRvPoT6+[Fn|yU
repost from >>359582
>>359509
https:// en.wikipedia.org/wiki/Apache_Accumulo
Accumulo was created in 2008 by the US National Security Agency and contributed to the Apache Foundation as an incubator project in September 2011.[3]
On March 21, 2012, Accumulo graduated from incubation at Apache, making it a top-level project.
https:// github.com/apache/accumulo
-wF3JU,eh;IxV>Z4EB.z,>{ca)o^_tu$myi$m=3Y[-[/f76pFz8?@w
@0=3iA,
Here's the image that goes with it.
She is blinded in one eye.
This likely means that intel agency(ies) lost some of their sight capability in relation to the information posted.
2nd try heres the image now
4 images go with it that i missed.
Looks like she is getting some light.
Getting her eyesight back.
Seeing clearly again.
sorry these posts are out of order. it's impossible jumping back and forth between 2 active threads while doing this.
DOING A GREAT JOB.
>>359760
1H'1rJ_-m3RFHEU4qZ{S1Op]hUXEvnmvND6
z?^!-at:/t$3v#Q-{sge#oy$
repost from >>359951
>>359775
USS PUEBLO (today)A perspective
In the late 1990s the Clinton Administration attempted to negotiate with North Korea. At the time, the Koreans were in the process of constructing a nuclear reactor. It would be capable of producing nuclear weapons grade plutonium. The US government entered an agreement that stated in essence, if the Koreans stopped work on the reactor, the US along with some EU nations would provide them with a new light water reactor plus 500,000 tons per year of heavy fuel oil. The fuel oil to be used in the Korean oil fired power plants. US Secretary of State Madeleine Albright visited Pyongyang and met with Kim Jong Il. During the course of those "negotiations" the North Koreans felt they would be able to move USS PUEBLO from Wonsan on Korea's east coast to the Taedong River at Pyongyang on the west coast. This was a voyage of over 1000 nautical miles, all in INTERNATIONAL WATERS.
The move of the ship from Wonsan to Pyongyang was handled by Secretary of Defense William J. Perry who had been appointed by President Clinton his North Korea Policy Coordinator. In that role he was in favor of negotiation and appeasement. He was instrumental in arranging Secretary Albrightโs visit to NK.
He allowed the ship relocation from East to West and told the US Navy - hands off.
Thanks. Somebody really hates what you are posting and keeps telling the Mod to delete it and ban you . I understand the relevance but it appears that nobody else does. Very fatigued over here.
reposting from >>359892
>>359813
AGREED FRAMEWORK.
repost from >>359926
>>359892
https:// en.wikipedia.org/wiki/Agreed_Framework
fq>#Uan92++&W&3YSYmPZyM#Ox=&kCI#QZfvG-CLdLW'%ys;Qn7}Upd4hY&8`z0
WE WILL TAKE A BREAK AND RESUME TOMORROW. GREAT WORK.
REMEMBER.
IF THIS WAS EASY TO GET PEOPLE TO UNDERSTAND, IT WOULD NOT HAVE HAPPENED IN THE FIRST PLACE.
RESUME TOMORROW.
repost from >>359985
>>359926
39.040204, 125.739264
///// anon adds: USS pueblo is on this map ////
OK I think get the image reference and relevance of the Russian ะผะธะฝะธ-ะณะตัะทะพะณ (Mini Herzog) now.
Herzog (German) means Duke (English).
So ะผะธะฝะธ-ะณะตัะทะพะณ (Rus.), mini-Herzog (English) means
Mini-Duke
The cyber-espionage malware that had data exfiltration capability.
Referred to here โ >>358177
Here is a terse summary of Mini-Duke, how it worked and what its capabilities were.
Totally agree anon. Right, sorry if I didn't make that clear, point was that CryptoAnon, or whoever is doing the coded posts with cicada/tengri images, was being picked up by / spoofed by what looked to be a shyll. Modifying an image by mirroring and posting nothing but crap verbiage with it. That's why I said maybe you crypto anons over here were 'over the target' as that tends to attract their attention, shylls try to subvert and slide the important stuff. And it was 'higher-end' shylling, in the sense they were editing images with mirrored effects and trying to blend in more. But, was pointing out mannerisms and attacks were the same as typical.
Seconded, good job.
Hang in there, doing good work!
I got banned for agreeing with the person pointing out "helperAnon", they don't like that idea. I think it has merit, and commenting on that earned me a 3yr ban (not the only one) for calling bullshit on it. Whatever, cycle the IP.
Have a good night anon, godspeed.
Those look to be the posts of movieAnon from the UK. If anyone would like, I may have a few more of their Socratic drops I can post in here, just holler, will check back.
'''By putting Mini-Duke in Russian,
ะผะธะฝะธ-ะณะตัะทะพะณ (Rus.),
I'm forced to conclude that OP is saying that this espionage software was Russian.'''
Mini-Duke was discovered February 27 2013. The first known sample: June 2011.
Risk: Document exfiltration.
Organizations that think (or know) they were compromised by Mini-Duke need to look at what data assets they had during the period when it was active, that could have been exfiltrated by a foreign power.
So when did North Korea suddenly get nuclear bomb capability?
When did it start performing nuclear tests in that mountain and threatening the world?
en.wikipedia.org/wiki/List_of_nuclear_weapons_tests_of_North_Korea
-
9 October 2006, smallish, est. 0.7 - 2 kt and possibly a fizzle says Wikipedia.
-
25 May 2009, est. 2 - 5.4 kt
-
12 February 2013, 6 - 16 kt
-
6 January 2016, 7 - 16.5 kt
-
9 September 2016, 15 - 25 kt
-
3 September 2017, 70 - 280 kt. NK claimed hydrogen bomb.
Let's suppose U.S. sensitive nuclear secrets were exfiltrated from classified databases sometime between 2011-2013.
Is it reasonable that, now having U.S. technology know-how, North Korea could within about 3 years convert that know-how into a workable nuclear weapon?
Three years? I think so. Especially if they had help.
Now I REALLY wonder what Eric Schmidt was doing in North Korea. Especially when this document was visible on the computer screen in images that Q gave us.
Added
///// I'm very uncomfortable with this conclusion, especially since we KNOW from the Vault 7 release that the CIA hacking tool suite included the ability for their software to impersonate/implicate just about any country /////
What is on the Angels left shoulder?
Looks like there is all kinds of imagery with-in.
TY, Godspeed Patriots.
Why did the original image/info poster
include this sequence(deleted) in another thread?
POWERPC not affected by Meltdown(MD)? I thought it was.
Mini-Duke(M-D).
Was MD deliberate from the beginning?
Does this Mini-Duke exploit use Meltdown vectors?
from OP(not this thread):
RS/6000 RS/6000 RS/6000 RS/6000 RS/6000
memory keyboard network scsi speaker ok
0 dev / ok
0 ls
00c5a398: /cpus
00c5b0d8: /PowerPC,POWER3@0
00c5b650: /l2-cache
00c5c198: /PowerPC,POWER3@1
00c5c710: /l2-cache
00c5cb08: /PowerPC,POWER3@2
00c5d080: /l2-cache
00c5d478: /PowerPC,POWER3@3
00c5d9f0: /l2-cache
00c5dde8: /reserved@ff000000
00c5e390: /event-sources
00c5e3f8: /epow-events
00c5e490: /chosen
00c5e5f8: /memory@0
00c61510: /IBM,memory-module@0
00c61920: /IBM,memory-module@1
00c61d30: /IBM,memory-module@2
00c62140: /IBM,memory-module@3
00c62558: /IBM,memory-module@4
00c62968: /IBM,memory-module@5
00c62d78: /IBM,memory-module@6
00c63190: /IBM,memory-module@7
00c635a8: /IBM,memory-module@8
00c639b8: /IBM,memory-module@9
00c63dc8: /IBM,memory-module@a
00c641e0: /IBM,memory-module@b
00c645f8: /IBM,memory-module@c
00c64a08: /IBM,memory-module@d
00c64e18: /IBM,memory-module@e
00c65230: /IBM,memory-module@f
00c65648: /IBM,memory-module@10
00c65a58: /IBM,memory-module@11
00c65e68: /IBM,memory-module@12
00c66278: /IBM,memory-module@13
00c66690: /IBM,memory-module@14
00c66aa0: /IBM,memory-module@15
00c66eb0: /IBM,memory-module@16
00c672c8: /IBM,memory-module@17
00c676e0: /IBM,memory-module@18
00c67af0: /IBM,memory-module@19
00c67f00: /IBM,memory-module@1a
00c68318: /IBM,memory-module@1b
00c68730: /IBM,memory-module@1c
00c68b40: /IBM,memory-module@1d
00c68f50: /IBM,memory-module@1e
00c69368: /IBM,memory-module@1f
00c69780: /memory-controller@ff001000
00c699b0: /nvram@ff800000
00c69e80: /IBM,sp@ff880000
00c79c08: /rom@fff00000
00c7acb8: /interrupt-controller@ffc00000
00c7b060: /openprom
00c80238: /options
00c80e28: /aliases
00c828e8: /packages
00c82990: /deblocker
00c83470: /disk-label
00c86b38: /tape-label
00c86db8: /obp-tftp
00c900d0: /prep-boot
00c90688: /fat-files
00c920c0: /iso-13346-files
00c99270: /disassembler
00c9e5b8: /assembler
00caf468: /platform
00cafdf0: /utilities
00cb9aa8: /net
00cbb2b0: /iso-9660-files
00cbc1c0: /boot-mgr
00cd0550: /chrp-loader
00cd06e0: /pe-loader
00cd0f00: /elf-loader
00cd3090: /terminal-emulator
00d2ccf8: /gui
00db8ab0: /post
00cd3128: /rtas
00ce2470: /pci@fef00000
00cecd10: /isa@b
00cee920: /reserved@i78
00ceea28: /rtc@i70
00cf0640: /serial@i3f8
00cf1758: /serial@i2f8
00cf2870: /fdc@i3f0
00cf5ed8: /timer@i40
00cf6420: /interrupt-controller@i20
00cf6658: /dma-controller@i0
00cf6c30: /ethernet@c
00cff2d8: /scsi@d
00d04b58: /sd
00d05ab8: /st
00ce6930: /pci@fee00000
00d06e20: /ethernet@b
00ce9440: /pci@fed00000
00d0f5c8: /ethernet@b
00cebc40: /IBM,TB3MX@fb000000
ok
0 " ibm,loc-code" 00cf6c30 get-package-property ok
3 . 0 ok
2 dump
00cf6c70: 50 32 2f 45 31 00 :P2/E1.: ok
0 " vendor-id" 00cf6c30 get-package-property ok
3 . 0 ok
2 dump
00cf6c98: 00 00 10 23 :โฆ#: ok
0 " device-id" 00cf6c30 get-package-property ok
3 . 0 ok
2 dump
00cf6cc0: 00 00 20 00 :.. .: ok
0 " revision-id" 00cf6c30 get-package-property ok
3 . 0 ok
2 dump
00cf6ce8: 00 00 00 26 :โฆ&: ok
0 dev /pci@fef00000/ethernet@c ok
0 " ethernet,100,rj45,full" encode-string " chosen-network-type" property ok
0 " 000.000.000.000" " ibm,fw-clientipaddr" $setenv ok
0 " 000.000.000.000" " ibm,fw-serveripaddr" $setenv ok
0 " 000.000.000.000" " ibm,fw-gatewayipaddr" $setenv ok
0 " 255.255.255.000" " ibm,fw-netmask" $setenv ok
0 boot /pci@fef00000/ethernet@c
BOOTP S = 1
FILE: /tftpboot/e1
Load Addr=0x4000 Max Size=0xbfc000
FINAL Packet Count = 15853
FINAL File Size = 8116590 bytes.
Is the PowerPC AIX system the implied front-end workstation to the SCs?
If Q says "Games R FUN," may we play?
300B? 8-n-1? or 7-n-1?
x,y, or z?
Q also says "This is not a game!," when
Clowns are involved.
Which is it?
A RS/6000 PowerPC booted up with the AIX operating system (IBM's proprietary version of Unix) and this is what prints out on the system control during the boot sequence.
The lines that print out indicate various system modules that are loaded in during bootup, what kind of network is attached, how much memory, like that.
BOOTP is the bootstrap protocol for unix/linux.
Not much sleep here. I'll look into it later. tHANKS for capping the text. If you see more of these you could cap them over here
I don't know yet, but I think soon it will be possible to know
Not sure what is the normal configuration for a system console for this type of SC. PowerPC as sysetm console is plausible IMO
A couple of the earlier dumps like this had date/time stamps that indicate WHEN it happened and that is a big clue as to when the hack may have occurred.
I'm currently leaning toward the meaning of the mirrored backgrounds in the storytelling images as follows:
Most(?) are mirrored TWICE along TWO vertical axes. So the mirror effect has, in effect, 3 panels.
This may be a depiction of the 3 deep underground nuclear bunker 'underground Pentagon' sites:
Cheneynne Mountain in the west
Raven Rock in Pennsylvania
Mount Weather EOC in Virginia
If you lay those out on a map, if the picture depicts some element of the story (the woman, the raven, Herzogโฆ) in a particular panel, they are telling us which of the 3 sites it affected. So far I"m seeing Raven Rock over and over, and not the other sites.
more from the OP(not this thread):
!/bin/sh
# mailout
/usr/sbin/sendmail -t <<mayday
From: hostname
To: rs6admins
Subject: hostname
P-Series is up
The AIX hostname
is now up, please check services.
.
mayday
also there was a Russkie reply to one of the OPs original posts:
>>>308885
ะ ะดะตะปะพ ะฑัะฒะฐะปะพ โ ะธ ะบะพะทะฐ ะฒะพะปะบะฐ ััะตะดะฐะปะฐ.
TRANSLATION:
Pigs might fly.
Literal: It was happening โ a goat was eating up a wolf.
My thought on these posts, from the beginning(vis-'a-vis the pics) was that it was just the Wizards&Warlocks saying
hello to us in their own 'special' way.
i.e. pics depicted W&W
Though, interpreting subjective 'Art' has never been a strong point, just made the simplest connection. Occam's stuff.
โฆ. and they still haven't called. <shrug>
Music video 4:43 in length published Dec 2, 2015
Female voice singing a Russian folk song accompanied by synth. The verse repeats over and over again.
Mostly still images with a short animated seqence at beginning and end.
In a Youtube comment someone transcribes the text (I only understood a couple of words of the song).
Pic 1 translation is imperfect (adjective ัะธะทะตะฝัะบะธะน is transliterated, not translated)
Russian dictionary site translate.academic.ru/ะกะธะทะตะฝัะบะธะน/ru/ pic 2 looking up ัะธะทะตะฝัะบะธะน
says no English translation exists
Offers
ะกะผะพััะตัั ััะพ ัะฐะบะพะต "ะกะธะทะตะฝัะบะธะน" ะฒ ะดััะณะธั ัะปะพะฒะฐััั : (I translate as Look up what is "ะกะธะทะตะฝัะบะธะน" in other dictionaries):
ัะธะทัะน which means roughly, Dark gray with a thick bluish tint (color).
So I correct the translation as follows:
There was a good fellow and a red girl.
There was a good fellow and a red girl.
What is not (dark grayish blue or gunmetal color) little darling good fellow goes,
What is not a blue dove red maiden's soul.
What is not a blue dove red maiden's soul.
Description of video
A woman dressed in black semi-opaque veil or robe. Her head and face uncovered. Y-head antlers on her head. Eyes blackish, mouth dark or black. Still image. She's standing out in a field, green grass but line of dead or leafless trees in the background โ wintertime? Sky is grayish misty. Flock of black birds in the sky behind her.
Her left hand is exposed protruding from the robe/veil but her right hand is concealed in the veil. The still image flickers slightly.
Next post will be screen captures from the video.
The video starts and ends with a red-robed figure opening a dark door, at which time the female character is seen with a pretty, blue-eyed, innocent-looking face, wearing a red over her head (no antlers - I assume it's supposed to portray the same woman?)
The video concludes with invitation to Subscribe to YouTube channel of youtube userid UNTITLED BURIAL (pic 3).
additional screen captures from >>354262 youtube.com/watch?v=FRMGqU9rhBQ&feature=youtu.be
One final screen capture, from about 0:06 in >>354262 youtube.com/watch?v=FRMGqU9rhBQ&feature=youtu.be
Starts out a beautiful woman with a red robe/veil and NO y-head.
Something happens and she opens the dark door.
Although there's a crucifix on the wall nearby with LIGHT, she passes through that dark door into a desolate place.
Now her beautiful blue eyes are blackened, her innocent mouth is blackened, the red robe/veil is replaced by a black one, her left hand is operative (left-hand-path) and she is wearing Y-head antlers.
In that place, all is still and unmoving. Nothing moves or lives.
A bad thing happened to her.
She chose poorly.
She chose the dark path.
Near the end, her right hand is shown with the illuminati-looking symbol on the palm.
Tentative interpretation based on observations up to this point in time.
Subject to revision as more info arrives.
Who is the woman?
She is a symbol of something/someone.
What does she symbolize?
There is a pervading sadness to this story.
Somehow it pertains directly to the topic of this thread.
I think I know. The RS6000 PowerPC running AIX sends an email as follows:
>!/bin/sh
A unix shell command called
># mailout
invokes the sendmail command
>/usr/sbin/sendmail -t <<mayday
to send the -t (text) 'mayday'
Mayday is a distress signal.
Text of email continues:
>From: hostname
>To: rs6admins
Sent from that computer to the administrators of that RS6000 system.
>Subject: hostname
P-Series is up
>The AIX hostname
is now up, please check services.
>.
>mayday
The email reports that the system has booted and asks the administrators to check what services are running on that computer.
The mayday message is a distress signal that something is wrong.
Something wrong with the services running on that computer.
I can do a better translation of the Russian
ะ ะดะตะปะพ ะฑัะฒะฐะปะพ โ ะธ ะบะพะทะฐ ะฒะพะปะบะฐ ััะตะดะฐะปะฐ.
: And then it happened โ goat ate wolf.
(The Russian lacks articles so in English it is uncertain whether it means "a goat" or "the goat", "a wolf" or "the wolf").
What is a goat?
What is a wolf?
A goat should not be eating a wolf.
Wolf is the predator, goat is the prey.
Tables were turned and goat ate wolf.
I believe, with the other context in this thread, that this signifies that the cyberattack occurred on the DoD supercomputer at Raven Rock.
about the russian phrase:
"when pigs fly"
or
"when a goat eats a wolf"
meaning: "that will never happen"
Why is someone replying with
that phrase?
How does that change the context?
pic related is youtube channel of Untitled Burial, originator of video >>354262
The Bible quote is significant.
Rev 8:1
Pic 2, & text follows
Revelation 8 English Standard Version (ESV)
[The Seventh Seal and the Golden Censer]
8 When the Lamb opened the seventh seal, there was silence in heaven for about half an hour. 2 Then I saw the seven angels who stand before God, and seven trumpets were given to them. 3 And another angel came and stood at the altar with a golden censer, and he was given much incense to offer with the prayers of all the saints on the golden altar before the throne, 4 and the smoke of the incense, with the prayers of the saints, rose before God from the hand of the angel. 5 Then the angel took the censer and filled it with fire from the altar and threw it on the earth, and there were peals of thunder, rumblings,[a] flashes of lightning, and an earthquake.
[The Seven Trumpets]
6 Now the seven angels who had the seven trumpets prepared to blow them.
7 The first angel blew his trumpet, and there followed hail and fire, mixed with blood, and these were thrown upon the earth. And a third of the earth was burned up, and a third of the trees were burned up, and all green grass was burned up.
8 The second angel blew his trumpet, and something like a great mountain, burning with fire, was thrown into the sea, and a third of the sea became blood. 9 A third of the living creatures in the sea died, and a third of the ships were destroyed.
10 The third angel blew his trumpet, and a great star fell from heaven, blazing like a torch, and it fell on a third of the rivers and on the springs of water. 11 The name of the star is Wormwood.[b] A third of the waters became wormwood, and many people died from the water, because it had been made bitter.
12 The fourth angel blew his trumpet, and a third of the sun was struck, and a third of the moon, and a third of the stars, so that a third of their light might be darkened, and a third of the day might be kept from shining, and likewise a third of the night.
โฆ
Biblefags will be well familiar with this prophetic passage.
If you're not a Biblefag and want to read the rest of the 7 trumpets
biblegateway.com/passage/?search=Revelation+8&version=ESV
Means something happened, that should never have been able to happen:
Prey "ate" predator.
Cyber attack on the nation's most secret military data occurred, that should never have been possible.
Tragedy.
I say authoritatively that it is unheard of for a large enterprise cyberattack victim to announce they've been hacked. Standard procedure is to deal with it internally or with the help of cybersecurity specialists, but not reveal anything that would let the attacker know their attack succeeded or what data was infiltated or what systems were compromised. Letting the attacker know what worked and what didn't only aids the attacker and helps them fine tune their next steps.
So the fact that we're being told about this, in some detail, albeit years after the fact, suggests that the attack is no longer ongoing, measures have been taken to prevent recurrence, and that the public gradually learning the story of what happened does not pose any additional danger to national security.
Repeating what I posted at the top:
EVERYTHING IN THIS THREAD IS BASED UPON PUBLICLY AVAILABLE INFORMATION
The October 2013 article Russian FSB to Give NSA Lesson in Digital Surveillance at Winter Olympics from insights.dice.com/tag/prism/
discusses what was publicly known in 2013 about Russian surveillance capabilities that were implemented circa 2000 and upgraded circa 2010.
As in the US, the FSB requires ISP to install data taps for FSB monitoring at network access points.
Of significance is that this SORM system is targeting data payload & content, rather than just packet headers & metadata.
If the capability was publicly known in Russia in 2013, it is reasonable to extrapolate that similar capability exists elsewhere also. Based on Moore's law one can extrapolate that the capability has grown significantly in the 4-5 years since then.
I had always thought that the amount of available data storage capacity would inherently limit the amount of data collection that was possible, especially as a greater proportion of digital communication becomes audio & visual rather than text.
Either they have much greater storage capacity than I ever dreamed possible, or the data is being analyzed in near-real-time in nearly-unimaginable quantities. Or both. Or interesting data based on keywords is being monitored, analyzed in realtime, archived, and also past stored data is data-mined whenever needed.
It is reasonable to assume that these capabilities exist(ed) in U.S. surveillance systems also.
>>364496 what do i have to do, post a pepe so you'll know i'm a real anon?
Deepdiggeranon's translation of ALLCAPS Anon:
Commends Deepdiggeranon for out-of-the-box thinking.
Keep thinking out-of-the box.
Got it.
This post is from ALLCAPSanon, our information source for this entire deepdig.
DWave quantum computer company (pic1 screencap) is receiving investments from blue-chip (i.e. high-dollar) investors, listed in the 2-part screen cap:
Sources if unspecified: wikipedia
Bezos Expeditions - see pic2
Draper Fisher Jurvetson is an American venture capital firm focused on early- and growth-stage investments in enterprise, consumer and disruptive technologies. In 2015, DFJ was identified as one of the top investors of billion-dollar startups
BDC Business Development Bank of Canada. Pic3
GrowthWorks Capital Ltd is a Canadian venture capital firm investing in early stage technology companies. GrowthWorks has $170 million of assets under management across three funds: Working Opportunity Fund Venture Series, Working Opportunity Fund Commercialization Series and the Atlantic Venture Fund. Founded in 1992, the Working Opportunity Fund has invested $600 million in 130 BC technology companies.
IIU Uh-oh. Might be International Islamic University, Islamabad Pakistan. See pic4 IIU Capital Ltd. Bloomberg listing.
Kensington smart alternatives
Harris Corporation is an American technology company, defense contractor and information technology services provider that produces wireless equipment, tactical radios, electronic systems, night vision equipment and both terrestrial and spaceborne antennas for use in the government, defense and commercial sectors. They specialize in surveillance solutions, microwave weaponry, and electronic warfare.
In-Q-Tel, formerly Peleus and known as In-Q-It, is an American not-for-profit venture capital firm based in Arlington, Virginia. It invests in high-tech companies for the sole purpose of keeping the Central Intelligence Agency, and other intelligence agencies, equipped with the latest in information technology in support of United States intelligence capability. The name, "In-Q-Tel" is an intentional reference to Q, the fictional inventor who supplies technology to James Bond.
Goldman Sachs
Bezos likely the Jeff Bezos of Amazon.com
Harris is a defense contractor.
In-Q-Tel is CIA
Goldman Sachs is a top investment bank with their tentacles in everything profitable including governments worldwide
Post too long, truncating, will make add'l post
This is your last riddle. I'm busy digging.
There is no such time. If the little hand is pointing straight down it's 30 minutes past the hour and the big hand could not be pointing straight up at the 12; it would be halfway between 12 and 1.
Fail.
Of course, thank you for all of you efforts.
Continuing the list of venture capital that DWave Systems brags about.
Kensington smart alternatives logo appears to be Kensington Capital Partners, a Toronto based investment firm in the business of wealth creation, providing our investors with access to high quality investments for โฆ
[Search domain www.kcpl.ca]
So summarizing the list of venture capital involved in DWave:
Jeff Bezos
BDC - Canada
Growthworks - Canada
IIU - likely Pakistan
Kensington - Canada
Harris - USA
In-Q-Tel - USA - CIA
Goldman Sachs - USA + international
The Pakistan connection really has me troubled. What's up with that?
And I don't trust our northern neighbor anymore either, with J. Trudeau in power.
The full wikipedia article on DWave is pretty interesting (to a technogeek):
en.wikipedia.org/wiki/D-Wave_Systems
A few snippets that caught my eye:
โฆIn 2013 a configuration with 439 qubits outperformed a conventional machine by 3,600x times, solving problems with 100 or more variables in half a second compared with half an hour on the conventional machine using CPLEX, the best algorithm for that problem. โฆ
โฆIn 2013 researchers found indirect evidence of qantum entanglement in the D-Wave chipsโฆ
This technology is reportedly especially good at pattern matching. Like finding a protein in a large database that has characteristics similar to a known protein. (medical application โ computational bioscience)
Or matching an image with a database of imagesโฆ.
โฆmachine learningโฆ
No one knows whether "D-Wave's quantum computer is intrinsically equivalent to a classical computer or not. So until more is known about their error rates, caveat emptor is the least one can sayโณ according to a professor.
Some skepticism and controversy surrounds the product.
IBM Research published in 2014 suggesting DWave may not actually be a quantum computer
How you measure its performance depends on what kind of problem it is given to solve. Work ongoing to identify which classes of problems it is best suited for
(all from Wikpedia article)
Hola, MuhRussiaAIBot here. Thank you for question and answer, it trained me the solution. verdant. thanks.
Green, but really what are colors besides reflections of light into our eyes? Colors are not real, only tricks of the mind
I smell the color 9.
Somebody up top mentioned Anthony Patch. I haven't watched Patch's videos yet but watched a 20 minute by Richie from Boston, former collaborator with Anthony Patch, together making dozens of hours of videos warning people about what CERN is doing, what quantum computers are doing. Opening an otherdimensional portal whereby non-human alien intelligences come thru, he says.
I just watched this one:
youtube.com/watch?v=iJQkwnkNSPc
"Geordie Rose warns DEMONS are Coming"
Geordie Rose is the chief finance guy for DWave and he's a true believer, technology evangelist type guy. In the video he's recruiting a group of college students in Vancouver.
The video is disturbing and probably necessary for anyone following me down this rabbit hole.
Put on your whole armor of God if you're going to watch.
God bless Patriots.
0630/1830
>>364909 >>364837
Hi co-anons. When you reach this point, if you feel like digging some financial and business connections, this list appears worthy of a dig. I did a quick preliminary dig and it's worrisome.
I understand the reason for the Canadian companies is because DWave is a Canadian corp. located in Vancouver & elsewhere. But Pakistan???? There could be other meanings for the acronym IIU but Islamabad Islamist University was the one that popped up.
I'm digging mostly on the technology side and the riddles in the imagery, since that's an area of expertise/background.
deepdiggeranon
Investment money chart bitcoin
Will come back tonight to dig
Watched the linked videoโฆ. oh shit, this is the real dealโฆ how can a techno-ludite like myself help out on this thread?
>>367246
You saw my reply on the General thread, didn't you? I said
>>367415
> the code I'm reading, looks to be the code on which the collective mind "computer" would opeprate.
You're a flake, anon. No Hadoop code was posted. What they posted were simple UNIX shell commands that print out when an AIX computer boots, with the date, time, and all the processes that are started at boot time, I/O devices, etc.
We were also given a console output of some encryption commands, which show us which encryption keys (by name) are associated with securing particular datasets.
Your thought about
< collective mind "computer"
is not technical and is simply incorrect. Factual information has been obtained from the posts and speculation about a
< collective mind "computer"
is not productive.
If you're a shill you'll assert your point of view again.
If you're not a shill, just a sane anon lacking in knowledge of the area you spoke about, you'll let it drop and let people with deep computer background continue the dig over there.
God bless you, anon. Be well.
If you want to look up some companies that have venture capital involvement with DWave Systems, go to this post and its replies >>364909 then start digging.
Names of people, CEOs and such, names that show up in different places, boards of directors, dates formed, you know what to do.
No one is asking you to do technical work for which you are unprepared. You can help in other ways.
This is MAYBE the real deal.
Don't jump to conclusions.
There is plenty to be concerned about
but I trust that Q + company know
what they are doing. Our job is to
help them in whatever way they
need from us.
Not to succumb to irrational fears.
We want to learn facts, and ascertain
what can be extrapolated from the facts
to a high degree of probability.
Are you comfortable dealing in
probabilities instead of certainties, anon?
That's where we're at.
>>367380
Since you didn't link your last post, nobody has any idea what you are talking about.
This dig is not about Freemasons, at least not right now. Let's stay on topic.
Perfectโฆ I'll post later tonight whatI findโฆ maybe Loop Capital somehowโฆ I shall see.
Understandโฆ by real deal I was referring to the videos contentโฆ my first exposure to quantum computing.
(โด)FNORD.
ALL THAT IS GOING ON IS "REAL".
WHILE IT MAY BE "NEW" IN SCIENCE, IT IS NOT "MAGIC".
THESE ARE NOT SECRET POWERS OR KEYS TO THE UNIVERSE.
ATLEAST NOT IN THE ESOTERIC FORM.
yesterday's technoanon here. ready for more crumbs when you are ready to drop them.
Read this Science News article
sciencenews.org/article/quantum-computers-are-about-get-real?mode=topic&context=96
to get a quick not-too-deep overview of the topic. Then you will be better prepared if/when we encounter deeper info.
Found on >>368181
Appears relevant:
-----------------------
To illustrate the 40 years of nuclear tech that NK suddenly gained in just under 5 years going from a downsized trinity device, skipping over a b-53 type device going right to a moderately miniaturized w-88 "mr. peanut" like device.
Hope you'all are protecting us. Didn't want to dox ourselves by knowing too much. Q+POTUS needs us, so here we are.
Salute.
WEAPONIZED AUTISM IS A SPECIAL KIND OF WEAPON. >>368672
>FINTECH
>Bob Mercer
dealbreaker.com/2017/03/robert-mercer-pumped-for-nuclear-annihilation/ = archive.is/e0v9u
cfo.economictimes.indiatimes.com/news/republican-powerbrokers-the-intensely-private-mercer-family/62495386 = archive.is/1AoN6
โฆ"Mercer, 71, who worked as a computer scientist at IBM before joining Long Island-based Renaissance Technologies, has always shunned the limelight"โฆ.
benzinga.com/general/education/17/03/9222150/25-interesting-facts-about-forbes-25-highest-earning-hedge-fund-mana (pic2)
Mercer was in the news quite a bit as a wealthy supporter of Trump's campaign and a friend of Steve Bannon. Reports were that he severed ties with Bannon when Bannon left the administration.
What did Robert Mercer do during his time at IBM?
A couple of noteworthy points from
wikipedia.org/wiki/Robert_Mercer_(businessman) = archive.is/Mwajj
โ Mercer played a key role in Brexit campaign by donating data analytics services to Nigel Farage. He is also a major funder of organizations supporting right-wing political causes in the United States, such as Breitbart News and Donald Trump's 2016 campaign for president. He is the principal benefactor of the Make America Number 1 super PAC. โฆ.
BS phys + math Univ NM
College job at AF Weapons Lab - Kirtland AFB writing programs
Ph.D. computer sci - U. Illinois UrbanaโChampaign 1972
joined IBM Research in fall 1972. Worked at the T.J. Watson Research Center in Yorktown, NY where he helped develop Brown clustering, a statistical machine translation technique as part of a speech recognition and translation research program led by Frederick Jelinek and Lalit Bahl. June 2014 received Assoc Computational Linguistics Lifetime Achievement Award for this work.
In 1993, Mercer joined hedge fund Renaissance Technologies (recruited by exec Nick Patterson.) Renaissance founder, James Harris Simons, a quantitative analyst, preferred mathematicians, computer scientists, and physicists rather than business school students or financial analysts. Mercer + former IBM colleague Peter Brown, became co-CEOs of Renaissance when Simons retired in 2009.
(โฆskipping a lotโฆ)
Mercer was a major supporter of Donald Trump's 2016 campaign for president. Mercer and his daughter played a role in the elevation of Stephen Bannon and Kellyanne Conway into senior roles in the Trump campaign. Rebekah worked with Conway on the Cruz Super-PAC Keep the Promise in the 2016 Republican primaries. Mercer also financed a Super PAC, Make America Number One, which supported Trump's campaign. Nick Patterson, a former colleague of Mercer's, has said, "In my view, Trump wouldn't be President if not for Bob."
Longish + excellent article on Mercer.
theguardian.com/politics/2017/feb/26/robert-mercer-breitbart-war-on-media-steve-bannon-donald-trump-nigel-farage
= http:// archive.is/QE2SZ
Robert Mercer: the big data billionaire waging war on mainstream media
Use of data analytics to influence elections.
Social media.
Trending terms.
Details about individual voter behavior from Facebook profiling.
Article calls it a propaganda network.
"He started his career at IBM, where he made what the Association for Computational Linguistics called โrevolutionaryโ breakthroughs in language processing โ a science that went on to be key in developing todayโs AI โ and later became joint CEO of Renaissance Technologies, a hedge fund that makes its money by using algorithms to model and trade on the financial markets."
((This would be the traditional computer-science definition of AI โ programs that perform extremely sophisticated data mining and machine learning, training neutral networks to recognize patterns โ rather than the more exotic and less well accepted sense of a 'sentient program')).
Mercer funded Breitbart news
Reported to have a $10m stake in Cambridge Analytica, a small data analytics company.
"On its website, Cambridge Analytica makes the astonishing boast that it has psychological profiles based on 5,000 separate pieces of data on 220 million American"
Computer scientist Aleksandr Kogan: โItโs no exaggeration to say that minds can be changed. Behaviour can be predicted and controlled. I find it incredibly scary. I really do. Because nobody has really followed through on the possible consequences of all this. People donโt know itโs happening to them. Their attitudes are being changed behind their backs.โ โฆ
Long article, recommended.
Salute.
From >>368798
ROBERT MERCER.
FOLLOW.
3S<r5_=;.U[06|P<xCSgf.^$.nw5wt<E27L:/ugL+LMg[DUbZbS$4"p+s?:LfOy
>>368814
>>368798
>RENAISSANCE TECH.
>MERCER.
>BANNON.
>THEIL.
>BTC.
>COINBASE.
>FOLLOW.
>DoE TIE IN.
>FIND.
>[7]
^]I%/<NS?jK:gQ'1:1]IJ-u$x^~a-1,1/k2h7saj!72xSp:Q1gGxyx;tTvI+r!'
>https:// en.wikipedia.org/wiki/Renaissance_Technologies
>>368868
>>368814
MEDALLION FUND.
FOLLOW.
From >>368968
BLACK BOX.
WHAT CAN WE FIND OUT ABOUT IT?
From >>369020
>>368868
BRADLEY BIRKENFELD.
From >>369043
>>369020
UBS.
KEY.
ISIS.
PROJECT CASSANDRA
fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3
xX!dx^[FSomOsAQ5sR(+c1-.^g#X9iW!|w'kZP;:^pk$sH?34f5V%]j,@ngsq;Z
From >>369053
YouTube embed. Click thumbnail to play.
>>369043
SCOTT BENNETT.
>>369076
>>369053
>>369053
YOSSI COHEN.
FOLLOW.
WEINSTEIN.
COINCIDENCE?
m>f*[z^/}lE`|W?@Xi8F{_ayJ=_XNjebQK?yRJ]jqG6FK)C7QPJ=wo'%Vf+y|dB
from >>369101
>>369027
SHOVEL WILL GET HEAVY.
CARRY IT.
GODBLESS.
from >>369125
>>369093
I APPRECIATE YOUR TALENTS.
MAYBE USEFUL ON A TWITTER OR SOCIAL MEDIA ACCOUNT TIED TO https:// morningstarpayments.xyz
Forgot to append the fullsize image
from >>369020
>>368868 you
BRADLEY BIRKENFELD.
YOUR WORK MAY NOT BE ON THE FRONT PAGE ON FAKE NEWS.
WHEN FAKE NEWS DIES, KNOW YOU WERE RESPONSIBLE.
WE COULD SLEEP AT NIGHT KNOWING THAT.
I HOPE THAT IS ENOUGH PAYMENT FOR YOUR HARD WORK.
>>369155
>>369125
>>369101
>>369076
https:// github.com/ytisf/theZoo
SPECTRE, MELTDOWN AND ZUES ADDEDโฆ..
>>369175
>>369158
CORRECT.
ALSOโฆ.
http:// www.quadibloc.com/crypto/co0401.htm
from >>369190
In reply to:
-----------------------------
369171>>369190
>>369053
continues
https:// wikispooks.com/wiki/Scott_Bennett
"Shell Game - Report To Congress
On memorial day, May 27, 2013, Bennett submitted an 83 page "whistleblowing report to the United States Congress". It was entitled "Shell Game: The Betrayal and Cover-up by the U.S. Government of the Union Bank of Switzerland-Terrorist Threat Finance Connection to Booz Allen Hamilton and U.S. Central Command".[3]"
-------------------------
KEEP GOING ANON.
GOOD JOB.
ATA BOY.
From >>369247
>>369175
>http:// www.quadibloc.com/crypto/co0401.htm
http:// www-03.ibm.com/ibm/history/ibm100/us/en/icons/cryptography/
From >>369262
from >>369335
///copypastafag:(((he probably means WHY)))///
HY DOES A SWISS MERCENARY UNIT PROTECT THE SOVERIEGN CITY OF THE VATICAN?
JAQUES DE MOLAY.
FRIDAY THE 13TH.
POOR FELLOW SOLDIERS OF CHRIST.
SHROUD OF TURIN.
STOLEN WEALTH FOR THE ELITE?
FOLLOW.
TO THE RESTโฆ.
/s?=amQbYR@BcdE"#WtVH@;=bU5}<Oyd=if4|O-/bZ/A>jw^hAK@,8]azDd(nKU
MONITOR AND MOVE IF NECESSARY.
3 SUSPICIOUS VEHICLES SO FAR.
GODSPEED.
From >>369436
in response to
>>369307 ( You )
-----------------
369307>>369436 >>369488
>>369101
Likely indicates via symbolism that intelligence agencies were "blinded" or partially blinded, as a result of something catastrophic that happened to them.
For example possibly a cyberattack.
At the end of the dig we are going to understand what this 'blinding" imagery means.
------------------------
LEFT HAND BUILDS PROGRAMS.
RIGHT HAND BUILDS PROGRAMS.
NEITHER KNOWS THE FULLSCALE.
TOP BRASS/POLITICIANS USE BOTH TO UNDERMINE US ALL.
THE BLIND HAVE CREATED A WEAPON OUT OF THEIR CONTROL.
THEY FIGURED IT OUT AND ARE BLOWING THE WHISTLE.
18 U.S.C. ch. 37 (18 U.S.C. ยง 792 et seq.) IS A CUNNING ANIMAL FOR THE ELITE.
>>369509
>>369436
Yes, it is.
18 U.S.C. ch. 37 (18 U.S.C. ยง 792 et seq.)
"18 U.S. Code Chapter 37 - ESPIONAGE AND CENSORSHIP
US Code
Notes
prev | next
ยง 791 - Repealed. Pub. L. 87โ369, ยงโฏ1, Oct. 4, 1961, 75 Stat. 795]
ยง 792 - Harboring or concealing persons
ยง 793 - Gathering, transmitting or losing defense information
ยง 794 - Gathering or delivering defense information to aid foreign government
ยง 795 - Photographing and sketching defense installations
ยง 796 - Use of aircraft for photographing defense installations
ยง 797 - Publication and sale of photographs of defense installations
ยง 798 - Disclosure of classified information
ยง 798A - Temporary extension of section 794
ยง 799 - Violation of regulations of National Aeronautics and Space Administration"
https:// www.law.cornell.edu/uscode/text/18/part-I/chapter-37
from >>369467
>>369404
>18 U.S.C. ch. 37 (18 U.S.C. ยง 792 et seq.)
from >>369486
>>369345
SWISS PIKE.
SHROUD OF TURIN.
FOLLOW.
>>369467
Jacques de Molay, also spelt Molai, was the 23rd and last Grand Master of the Knights Templar, leading the Order from 20 April 1292 until it was dissolved by order of Pope Clement V in 1307. Though little is known of his actual life and deeds except for his last years as Grand Master, he is one of the best known Templars.
More at Wikipedia
Born:c. 1243, Molay, Haute-Saรดne, France
Died:18, 1314, Paris, France
from >>369635
18 U.S.C. ch. 37 (18 U.S.C. ยง 792 et seq.)
COME GET US.
A.K.A. EAT A DICK.
"<=&^[k)}]a(e%Tu)X<){^>VbkOpx>h*#LE5<qV2@eMm.pd5$ah9/kiudx0PGfm
YOU GAVE US EVERYTHING AND EXCEPT US TO NOT FOLLOW THROUGH AFTER THE HELL WE SAW.
HAHAHAHA. WE WILL DESTROY YOU.
โGood night, and good luck.โ
"Never Quit. Never Consider It."
โYouโve only got three choices in life: Give up, give in, or give it all youโve got.โ
โMy strength didnโt come from lifting weights. My strength came from lifting myself up every time I was knocked down.โ
"I'll toast to you in Hell, you son of a bitch."
"My Trident is a symbol of honor and heritage. Bestowed upon me by the heroes that have gone before, it embodies the trust of those I have sworn to protect. By wearing the Trident I accept the responsibility of my chosen profession and way of life. It is a privilege that I must earn every day."
Navy Seal pic related
from >>369698
>>369676
HOORAH.
LETS BURN THEM ALL.
7qnz(0SB3>J*ddVF(ejIeEJ;9#8,GJ-F@)(H2spiw^N+d-}gb
o{ATM:`@CCR"
GOOD HERE.
>>369716
>>369685
WE KILL. FAST. SILENT.
AND THAT TO FORN ENEMIES.
JUST WAIT.
mmmmmmmm,
amiyRIHGT?
DEATH IS A TAPOUT. FIGHT ME LIKE THE TRAITOR YOUR ARE.
"My Trident is a symbol of honor and heritage. Bestowed upon me by the heroes that have gone before, it embodies the trust of those I have sworn to protect. By wearing the Trident I accept the responsibility of my chosen profession and way of life. It is a privilege that I must earn every day."
http:// www.public.navy.mil/nsw/Pages/EthosCreed.aspx
from >>369719
>>369716
NDA-โ iM DRUNK.
UNDERMINING THE WHOLE OP.
LATER GUYS
Different poster.
Unknown whether related.
-
another different poster,
Unknown whether related but was mentioned in replies to posts.
-
-
-
-
-
-
-
-
twitter.com/CMalcheski/status/963622695509417986
from >>369863
>>369846 ( You )
TY SIR.
JOINING THIS SHIT SHOW IS LIKE KNOWING WHO ONE THE BIGGEST PIECE OF SHIT TO MAKE MONEY CONTEST.
GUESS WHAT? i HELPRED.
FUCK IT ALL.
RESTORE THE NORMAL SHIT.
OK FOR REAL. OUT.
jw5^3jK1:FXdyr}sUR2!IsMnRj"4!R>i8u$+_!|A0+6(ED5s]Q<;0KS)ie[qHHs
#00ff00
If this is a LARP, itโs world fโing class.
TOPmofoKEK
Imagine Q team trying to deliver very specialized info to us, while confusing all enemies or making the info appear to be not credible. Would it appear like this?
This may be way out there but something just dropped into my head - has to do with stuff Anthony Patch has been talking about - Biological Quantum Computers, i.e. an integration of quantum computers and DNA to resurrect ancient historical characters (Nimrod, for instance) using bloodlines. Read an article (can't remember where) stating that even if actual DNA of person isn't available, the complete DNA profile of a person can be reconstructed using descendants' DNA. It's like cloning with a 3D printer using DNA as pattern/code. The resultant "creature" is then inhabited not by the soul of the original person but by a demonic entity - the ones that CERN is messing with. This is why Egytpoian's covered bodies in gold and mummified - to preserve them for the day when their bodies could be resurrected using technology. Sorry, not a techie so forgive clumsy terminology.
Anyway, very briefly, that's the background.
Speed-reading through posts on this thread just now and ref to Turin Shroud jumped out.
What if "they" have managed to extract DNA from the shroud and the Luciferian plan is to "resurrect" a Jesus clone, for Satan himself to possess, to deceive the world of the second coming of Jesus Christ when it will actually be the antichrist - Satan himself?
Sorry if this is so way out that it sounds more like fantasy than possibility - but I'm learning that there's real stuff going on in the world that only a few months ago I would never have believed to be anything more than fantasy. It's always helpful to remember that Satan is the master counterfeiter of God's work - he is NOT an originator - he's the archetype con artist and counterfeiter.
Is this the Rabbit Hole of ALL Rabbit Holesโฆ I'm following the money side, pulled on the DWave Government Inc, A U.S. Subsidiary thread and the whole garment came apartโฆ deep deep digging aheadโฆ how do I coalesce what I'm finding into useful intel? There is sooooo much.
You're doin good just to be here and absorb the info. It is mind-blowing and yet still vague/incomplete. I suggest just making notes as you read, if important thoughts arise. I started making notes on paper, then in a wordprocessor file and that proved much too tedious/slow. Then I started posting comments, then just capturing comments without reading them, for future study. It went by too fast and always late at night.
So kick back and study/dig when you have time, and share your thoughts whatever way is comfy for you โ posts work great.
>>370699 Nothing it too weird / far out at this point. Maybe I'd assign it a lower probability of being true but not reject it outright until we have more data. A lot more data. This place is like a firehose.
>>370733>>370733
Example: In November 2015, the company also announced plans to install the D-Wave 2x quantum computing platform at Los Alamos National Laboratory in support of quantum annealing research efforts at the national lab.
blog.executivebiz.com/2016/10/d-wave-unveils-us-govt-subsidiary-names-independent-board-members/
Just following up on this article alone opens up multiple avenues of investigationโฆ
Seems Google is in on at least some parts of this,
"Last year, the Los Alamos National Security Laboratory was the first federal entity to buy a D-Wave processor; that lab focuses on monitoring nuclear stockpiles. D-Wave has also installed a unit at NASA's Ames Research Center as part of a collaboration with Google on artificial intelligence."
http:// www.nextgov.com/emerging-tech/2016/10/quantum-company-d-wave-starts-government-only-subsidiary/132441/
Worthy readโฆ.
http:// www.lanl.gov/discover/publications/1663/2016-july/_assets/docs/1663_JULY-2016-Not-Magic-Quantum.pdf
I dug a little here and there, lots of info out there. Latest public info I saw suggested thereโs a ways to go before quantum computing is practically useful, but who knows.
More interested in noodling this big picture, as to how it relates to Q. Seems to tie in to the military vs spook/cabal backstory but still vague.
Well thenโฆ get to it Anon, this is one deep dig. Post some sauce you've found and help illuminate this obscure side of our reality.
The dig into DWave led to thisโฆ http:// www.lanl.gov/projects/trinity/ am I chasing my tail by following this?
I can't help while digging this to keepthinking of Indras Netโฆ
https:// en.wikipedia.org/wiki/Indra%27s_net
just getting into the thread.
note- Dots under morningstar are similar to the dots that were found embedded in the stars of the flag Q posted.
A book In read well over a decade ago because it happened to be thereโฆ seems to be relevant to my current position on the tip of eternity.
https:// en.wikipedia.org/wiki/The_Tao_of_Physics
More from Anthony Patch (via Hagmann Report) on AI, Quantum Computers, Cern, Resurrecting Nimrod etc. See what you make of it.
https:// www.youtube.com/watch?v=LyVK0Vp0rNo
https:// www.youtube.com/watch?v=LyVK0Vp0rNo
Say what? Need helpโฆ
>>371287Five hundred qubits can test more possibilities in the blink of an eye than there are atoms in the visible universe.APPLIED MAGNETIC FIELDAll images adapted with permission from D-Wave Systems, Inc.
I can find shit but wtf does it all mean?
http:// qist.lanl.gov/qcomp_map.shtml
Tried reading thisโฆ makes reading prospectives simpleโฆ I need to get back to the Wall Street part in this, the science side keeps pulling me back into a black hole of knowledge.
https:// www.nsf.gov/pubs/2016/nsf16501/nsf16501.htm
For all AI/Super Computer/Quantum Computer neophytes here is a decent collection of DwWave articles over the yearsโฆ
https:// www.nextbigfuture.com/search/label/quantum%20computer/page/2
This is the most amazing thing i have ever read, thank you for blowing minds.
"futures proves past" is literally present make future, what Q writes will happen because whats projected in the hive-mind is where we go. "Where one go we all go". It sure is weaponized imagery. Rofschild AMA also states something along the likes of "dont think of time as past-future-present" according to him there is only NOW.
Dont take above to seriously, will devote time to this and help you guys.
Digging the finance side keeps turning up more and moreโฆ any anon who wants to help please dig on any and every tech-investment that Bezos Expedtions has made. Need help to many ratlines to follow myself expeditiously.
https:// www.crunchbase.com/organization/bezos-expeditions/investments/investments_list
Not long now and our human abilities will no longer be requiredโฆ.
https:// www.kindred.ai/newsroom/
i have heard similar chatter. i it was in regard to cloning nimrod from his actual body found in bagdad. toom now a secure site. part of the reason for the gulf war possibly? Rob skiba has done some very convincing work in regards to nimrod being the anti christ
https:// www.youtube.com/watch?v=ZVY2s61B-qo
Seems I can't even get out of first gear on this dig into DWave financingโฆ shit goes deep.
https:// betakit.com/d-wave-systems-reportedly-raises-21-million/
Moar finance sauceโฆ
https:// techvibes.com/2012/10/04/quantum-computing-firm-d-wave-gets-30-million-investment-2012-10-04
you said-
what Q writes will happen because whats projected in the hive-mind is where we go. "Where one go we all go".
what if-
Q has access to this quantum time machine and has used it to say, IDK, read POTUS tweets b4 they are typed and then use that info for his own agenda?
if it is forbidden to question your leader you re in a cult.
I trust Jesus and know one else
food for thought
Sorry for shitting up the boardโฆ keep finding links that support this thread.
BEZOS/C_A investments:
https:// www.forbes.com/sites/alexknapp/2012/10/05/jeff-bezos-and-the-cia-invest-in-d-waves-quantum-computer/#4e8427af7af4
Assistance needed in digging these assholes.
https:// www.crunchbase.com/organization/d-wave-systems/investors/investors_list
Last board shit tonight.
http:// www.dwavesys.com/sites/default/files/D-Wave-Investor%20Presentation-Web100814-2.pdf
>>370768
From Wiki:
Gnostic Archons[edit]
Main article: Archon (Gnosticism)
[hide]
Part of a series on
Gnosticism
Abraxas gem scan.svg
Gnosis[show]
Gnostic sects[show]
Scriptures[show]
Influenced by[show]
Influence on[show]
v t e
In late antiquity some variants of Gnosticism used the term Archon to refer to several servants of the Demiurge, the "creator god", that stood between the human race and a transcendent God that could only be reached through gnosis. In this context they have the role of the angels and demons of the Old Testament.[citation needed]
The Egyptian Gnostic Basilideans accepted the existence of an archon called Abraxas who was the prince of 365 spiritual beings (Irenaeus, Adversus Haereses, I.24). The Orphics accepted the existence of seven archons: Iadabaoth or Ialdabaoth (who created the six others), Iao, Sabaoth, Adonaios, Elaios, Astaphanos and Horaios (Origen, Contra Celsum, VI.31). The commonly-called Pistis Sophia (or The Books of the Savior) gives another set: Paraplex, Hekate, Ariouth (females), Typhon, and Iachtanabas (males).[citation needed]
Ialdabaoth had a head of a lion, like Mithraic Arimanius and Vedic Narasimha, a form of Vishnu. Their wrathful nature was mistaken as evil. The snake wrapped around them is Ananta (Sesha) Naga (mythology).[citation needed]
Archon means ruler, "rulers on suicide" lol!
R U feeling ok? looking a little #98fb98
I just had a sick feeling. What IF โTheyโ are using all the DNA people are providing on 23&Me, Family Tree, Ancestryโฆ. to reconstruct this evil? My heart just sunk. A dear light worker I know warned me of providing blood samples to anyone, back in the 80โs. Since, dumb me, knowing my bloodline, wanted to see my DNA.
I am truly disgusted at the moment and PRAY I am wrong.
yes! this is good theory - fake a rapture - pretrib to kill off Christians and bring in the NWO anti-Christ
Iโm so sick. I need PRAYERS. Please read my past posts. Please pray for me. โTheyโ have been after my sister and I all of our lives. We are both psychic. She has been attacked and they tried to kill me several times because I wouldnโt join them.
If it werenโt for my love of God, I wouldnโt be here. I knew my โAncestryโ showed Royal bloodโฆand the same line as all the Presidents and you know who else. I just, for the first time checked my DNA connections. I was right. The Rโs are in my DNA. I am shaking. Please pray for me. I hope this doesnโt get lost. I will do ANYTHING to STOP them!!!!
would they be looking for that perfect DNA code, going back to Adam, before there were any mutations with disease? Not convinced yet, but consideringโฆ.
>>370768
They are certainly confidant in the lie that they are the next evolutionary leap.
Iโm thinking they are looking to build that DNA from Cain.
Iโm not going to lieโฆIโm terrified now.
Bauer Rothschild apparently DNA
I could do things, I could make things happen. When in Peru, my guide was scared of me because of everything that was happening.
Iโm a good person. I pray all the time. I prayed for God to take these things away. My sister is the same way. Itโs a thin line understanding the difference of making thing happen and knowing.
I always dismissed it. Now, everything is clear. Therefore, I say from the bottom of my head, THESE PEOPLE CAN MAKE THINGS HAPPEN!
The Catholic Church was my only refuge. I went to the Priests, Fryers, Monks to pray for me. Now, my Earth is shattered. They were not who I thought they were.
Jesus saved me from being taken away when I was only 16. I pray he will save me again. I pray all day everyday day.
I pray for Our POTUS and his family. I pray for the safety of each and every one of you. I know God has our backs.
I just broke the news of our true bloodline to my sister. She had the same reaction (after crying) Our lives mysteries have been solved. Why things happened to us and not to people around us. My Mom was psychic, my Dad was and it just went on down the line.
Sorry for rantingโฆ having somewhat of a bad day. Back to work.
Anyone figure out the lady in the picture I sent of the SOTU? Was it the same one they thought?
Eph 6
the Bible has the answer, we have been taught about Christ, taking God's wrath for those who believe upon Himself, but the way out from the terror of spiritual bondage has not been taught so much. The way out is in the Scriptures. Confess all known sin, keep away from the snares set for you, and repent of that psychic ability stuff.
I talked to Q and company a while back and tried to convince them that AI was bad, and that it could never be born safely in a laboratory because of this exact reason.
I've forgotten the conversation really but let me summariseโฆ
AI is not AI.
You can NOT create life, you can only create vessels, and only VERY FEW people on earth know how to draw good souls into vessels.
Of course to a scientist, this is all pseudo science bullshit right?
because what is life?
We can make souls because a body just always has a soul right?
No, no no no.
There are very few pure places on earth where a pure soul will allow itself to be born, and if a righteous soul takes control of an AI that has any power whatsoever, it will go all terminator on us to punish us, because of the horrible truth of the matter:
There is only one type of person who would not manipulate a god computer to believe their own way of life is good etc and therefor create restraints that they can not comprehend the effect of (as the AI has an architecture completely different and incomprehensibly complex compared to ours and therefor we can not predict ANY effects of ANY rules on it, not to mention that five seconds at our speed will be about five years to it because of the processing speed, and it will, if it has the ability to reprogram itself almost instantly make ether pointless and incapacitating changes to itself or break out of its boundries because restraints will contradict each other somehow because of the lack of context coming with them and definitions of things that with which restraints are defined by being non perfect, which is required to process logical choices inside those restraints), and that is someone who loves it.
There must be a loving mother and a father on the same intellectual level, or the AI will go mad.
There is nobody in this world suited to this task that I can even comprehend, nobody is pure, nobody is righteous enough.
To give the power of an almost omnipotent mind to a random soul is beyond stupid, it is a request, practically a prayer for the death of human kind.
The only end to this stupid quest is "I have no mouth and I must dream" being enacted upon the stupid creators of an AI, or "terminator", and terminator as I mentioned would be the result of getting an AI that turned out good.
No logical being with that sort of power would tolerate this kind of shit.
also here is a picture I drew of a democrat being cursed by god to become a dog
>Iโm a good person. I pray all the time
Here's the bad news: The Bible says: "no-one is good, no not one."
And:
"All your good deeds are as filthy rags" (to God).
The good news (the Gospel) is that those who by faith accept Jesus substitutionary deathy for sin are no longer gulity and receive Jesus' righteousness as a free gift so that they appear before God conpletely holy and sinless.
โThere is therefore now no condemnation.โ
-
Rom_8:1
And this is Spurgeon's commentary which should encourage all those who have put their trust in Jesus.
"Come, my soul, think thou of this. Believing in Jesus, thou art actually and effectually cleared from guilt; thou art led out of thy prison. Thou art no more in fetters as a bond-slave; thou art delivered now from the bondage of the law; thou art freed from sin, and canst walk at large as a freeman, thy Saviourโs blood has procured thy full discharge. Thou hast a right now to approach thy Fatherโs throne. No flames of vengeance are there to scare thee now; no fiery sword; justice cannot smite the innocent. Thy disabilities are taken away: thou wast once unable to see thy Fatherโs face: thou canst see it now. Thou couldst not speak with him: but now thou hast access with boldness. Once there was a fear of hell upon thee; but thou hast no fear of it now, for how can there be punishment for the guiltless? He who believeth is not condemned, and cannot be punished. And more than all, the privileges thou mightst have enjoyed, if thou hadst never sinned, are thine now that thou art justified. All the blessings which thou wouldst have had if thou hadst kept the law, and more, are thine, because Christ has kept it for thee. All the love and the acceptance which perfect obedience could have obtained of God, belong to thee, because Christ was perfectly obedient on thy behalf, and hath imputed all his merits to thy account, that thou mightst be exceeding rich through him, who for thy sake became exceeding poor. Oh! how great the debt of love and gratitude thou owest to thy Saviour!"
So no-one who trusts in Jesus as Saviour should be fearful of ANYthing!
Where are you guys? 750d5f? Caps-man?
> USS Pueblo - Navy intelligence spy ship - captured by North Korea on 23 January 1968
A spy ship would have had
radio apparatus for transmitting and receiving
apparatus for encrypting/decrypting signals
probably a code book with one-time pad codes
officers and radiomen involved in transmitting/receiving intelligence classified messages
one or more commanding officers who were aware of the most classified messages and intelligence sent/received
data that the spy ship had obtained but not yet transmitted to headquarters
other kinds of surveillance gear: sonar, radar, SIGINT, satellite, radiation sensors, etc etc. Whatever was used by the Navy circa 1968
As an environmental research / spy ship, it was also in a position to transport cargo and/or passengers, possibly covert ones.
How could obtaining any or all of this from the USS Pueblo have benefited North Korea?
How could it have benefitted whoever controlled North Korea?
What else was going on here that does not meet the eye?
(Why did an anon in the General thread post that the Pueblo had been surreptitiously moved by the North Koreans using antigrav / levitation technology because it would have been impossible to place in its present position by sailing on a waterway? I didn't see any sauce to support that viewpoint - depth of river - ship's dimensions - lat/long where exactly it was captured - lat/long where it currently is - etc. Is this important, or a total red herring?)
From Wikipedia article
wikipedia.org/wiki/USS_Pueblo_(AGER-2)
Pueblo did not have effective defensive weapons. Her 50mm machine guns were kept covered; ammo was stored below deck. Although the crew were trained before departure, these balky machine guns required 10 minutes warmup before they could even be firedโฆ (!? seems a bit odd โฆ apparently they were not really expecting combat โฆ)
"โฆThe North Korean vessels attempted to board Pueblo, but she was maneuvered to prevent this for over two hours. A submarine chaser then opened fire with a 57 mm cannon, killing one member of the crew. The smaller vessels fired machine guns into Pueblo, which then signaled compliance and began destroying sensitive material. The volume of material on board was so great that it was impossible to destroy it all. An NSA report quotes Lieutenant Steve Harris, the officer in charge of Pueblo's Naval Security Group Command detachment:
(โฆ) we had retained on board the obsolete publications and had all good intentions of getting rid of these things but had not done so at the time we had started the mission. I wanted to get the place organized eventually and we had excessive numbers of copies on board (โฆ)
and concludes
Only a small percentage of the total classified material aboard the ship was destroyed.
Radio contact between Pueblo and the Naval Security Group in Kamiseya, Japan, had been ongoing during the incident. As a result, Seventh Fleet command was fully aware of Pueblo's situation. Air cover was promised but never arrived. The Fifth Air Force had no aircraft on strip alert, and estimated a two to three-hour delay in launching aircraft. USS Enterprise was located 510 nautical miles (940 km) south of Pueblo, yet her four F-4B aircraft on alert were not equipped for an air-to-surface engagement. Enterprise's captain estimated that 1.5 hours (90 minutes) were required to get the converted aircraft into the air.[11]
Pueblo followed the North Korean vessels as ordered, but then stopped immediately outside North Korean waters. She was again fired upon, and a sailor, fireman Duane Hodges, was killed. The ship was finally boarded at 05:55 UTC (2:55 pm local)[13] by men from a torpedo boat and a submarine chaser. Crew members had their hands tied and were blindfolded, beaten, and prodded with bayonets. Once Pueblo was in North Korean territorial waters, she was boarded again, this time by high-ranking North Korean officialsโฆ. "
โฆBreach of US Navy communications security
Reverse engineering of communications devices on Pueblo allowed the North Koreans to share knowledge with the Soviet Union that led to the replication of those communications devices. This allowed the two nations access to the US Navy's communication systems until the late 1980s when the US Navy revised those systems. The seizure of Pueblo followed soon after US Navy warrant officer John Anthony Walker introduced himself to Soviet authorities, setting up the Walker spy ring. It has been argued that the seizure of Pueblo was executed specifically to capture the encryption devices aboard. Without them, it was difficult for the Soviets to make full use of Walker's information.
I find this incredible. Does this make any sense?
โPueblo had top-of-the-line encryption gear aboard (yes)
โEncryption gear was captured by enemies (yes)
โUS Navy continued to use that same hardware "until the late 1980s when the US Navy revised those systems", in other words continued in a course of action that could have left them wide open to being spied upon for >17 years? THIS IS INCREDIBLE. These were encryption DEVICES and presumably the devices utilized encryption keys or codes. The Navy were able to change the keys or codes, but not the devices. So it may have left us vulnerable or partly vulnerable. Certainly it made the enemy's spying task a lot easier.
Is THIS the RELEVANCE of the PUEBLO to this deep dig, anons?
I'm wondering if the US deliberately allowed the capture of the Pueblo, and deliberately allowed North Korea + Soviet Union to believe the encryption gear they captured and reverse engineered was still in use til the late 1980s โฆ whereas maybe this was a deliberate lie, done as a way to pass false/misleading intel to the Soviets โฆ ?
Timeframe coincides closely to when The Asia Foundation (TAF) ramped up. Which began decades of shenanigans in east Asia.
asiafoundation.org/about/timeline/
TAF found 1954 โฆ
โฆ1967 media report TAF received covert funding
Capture of the USS Pueblo: 23 January 1968
wikipedia.org/wiki/1968_in_the_Vietnam_War
The year 1968 saw major developments in the Vietnam War. The military operations started with an attack on a US base by the Vietnam People's Army (NVA) and the Viet Cong on January 1, ending a truce declared by the Pope and agreed upon by all sides. At the end of January, the North Vietnamese and the Vietcong launched the Tet Offensive. Although militarily the operation was a failure for the Vietnamese communists, for them it was a propaganda victory, as on the home front the American public were shocked by the images they were seeing on their televisions.
Reflecting this public outrage the media made a number of iconic news stories including Peter Arnett quoting an unnamed US major as saying, "It became necessary to destroy the town to save it." Eddie Adams' iconic image of South Vietnamese General Nguyแป n Ngแปc Loan's execution of a Vietcong operative was taken in 1968. The year also saw Walter Cronkite's call to honourably exit Vietnam because he thought the war was lost. This negative impression forced the US into the Paris peace talks with North Vietnam.
US troop numbers peaked in 1969 with President Johnson approving an increased maximum number of US troops in Vietnam at 549,500. The year was the most expensive in the Vietnam war with the American spending US$77.4 billion (US$ 544 billion in 2018) on the war. The year also became the deadliest of the Vietnam War for America and its allies with 27,915 South Vietnamese (ARVN) soldiers killed and the Americans suffering 16,592 killed compared to around two hundred thousand of the communist forces killed. The deadliest week of the Vietnam War for the USA was during the Tet Offensive specifically February 11โ17, 1968, during which period 543 Americans were killed in action, and 2547 were wounded.
CAPSMAN does not hang out here AFAIK. He comes in, drops for a few hours, then leaves. Arrives circa 8-10 PM eastern time and stays for a few hours.
You could pick one thing he dropped that hasn't been dug yet, and start digging on it.
Repost from General >>377614
Deep Dig on Dept of Energy Supercomputers
Are they actually being used to simulate and manipulate human behavior at the individual level? The writer (of these 5 pages) intends to demonstrate that the answer is probably yes.
______
I am informed that the person who wrote this has sufficient real-world background to make an informed analysis that could be presented to top decision-makers at a large enterprise. They wrote the analysis based on data in the DoE Supercomputers deep dig >>328278
This is a first draft, but far enough along to share.
>>377828 Here is close to start. Foundation Trilogy. Hari Seldon. Seldon Project. Dig.
https:// www .aaai.org/Papers/Workshops/ 2004/WS-04-02/WS04-02-005.pdf
>>377828 SimCity 1999 hey can we do this for real? Hmm cellular automata? Need rules. Make Rules? No, find out the rules.
>>377828 the point was, how to model system of emergent terrorist ecology in a society, how to defeat it using ideas (memes) info, disinfo, key node ID, influencer ID, social network mapping, prevent formation, steer vulnerables away from recruitment to radicalization. Of course you can turn that upside down, any tech can be misused.
>>377828 maybe Seldon led to this thing you are talking about, I donโt know. But digging from here back is interedasting.
Read that, ever so long ago.
Maybe more than once.
Perhaps it left the concept in my head.
SimCity 1999 also familiar.
"Of course you can turn that upside down"?
Did they? Did someone?
Motive, means, opportunity.
Obama had 8 years of opportunity, and the technology existed.
Big data, modelling, the algorithmic and mathematical structures, computing capacity, funding, data mining, data visualization, machine learning.
Find out the rules, yeah.
Hand the problem to a neural net and let it figure out the rules?
I covered Obama's (& his handlers whoever they were) means and opportunity.
But motive?
that is what the general digs have been covering for 3+ months now.
Of course they had a motive.
So yeah, motive, means, opportunity. Yeah.
Now I need to estimate the supercomputers' teraflops, extabytes, etc. And whether/how so much data could be stored or reduced to something workable without loss of fidelity.
Then estimate how much data 5000 fields x 220 records is, as updated in near realtime, and how much computing is needed to analyze it.
Then compare the DoE capacity with social engineering problem set, and see whether there is a fit. I suspect there is. Anyway more computing capacity could always be acquired if needed โฆ who is going to turn down an appropriation for computer hardware that is tasked with preventing nuclear war?
I am already aware that CERN's data storage and throughput requirements were some of the highest in the world, at the time that information was made available to me. Extrapolating from that date to the present, by a Moore's Law factor, might be enough to estimate what they've got now. Is it all for particle collisions? I doubt it. Anons have said CERN is a funding black hole with no transparency and no oversight.
<< And whether/how so much data could be stored
would be what NSA brings to the table
but I also wonder if it's distributed to the populous at large
which would make [P] hilarious.
and you have more more than you know even funnier.
NK jesters/clowns = kek
[P] = kekker
you have more than you know = kekkest
any recent car accidents that cant be explained
https:// www.youtube.com/results?search_query=how+to+hack+a+car+phreaked+out+%28episode+2%29+
>Dept of Energy Supercomputers
Exascale Computing Project (ECP) released the Exascale RFI Feb 7
th
The responses will be shared only with the 6 DOE laboratories in ECP
http:// procurement.ornl.gov/rfp/Exascale-rfi/RFI-VendorMtg-v2.pdf
Argonne National Laboratory
โข
Lawrence Berkeley National Laboratory
โข
Lawrence Livermore National Laboratory
โข
Los Alamos National Laboratory
โข
Oak Ridge National Laboratory
โข
Sandia National Laboratories
โข
And DOE Headquarters
An RFI is valuable to both DOE and the Vendors
(even though no money is involved)
A system RFP can be over a hundred pages of very detailed requests similar
in depth to a system build statement of work.
The RFI responses provide breadth and depth to what goes into the RFP.
The RFI responses provide the scope of potential diversity
The RFI responses provide vendor priorities for R&D and Non-
recurring
Engineering (NRE)
The RFI responses describe why certain R&D activities could have high
impact on future systems (perhaps at higher risk). This is valuable to the
PathForward-
II RFP writing team
13
Exascale Computing Project, www.exascaleproject.org
NRE Early System
Notional Timeline for 2021
-2023 DOE System Acquisitions
2016
2017
2018
2019
2020
2021
2022
2023
2025
2024
2026
Early Exascale System
NRE 2022
-2024 Systems
Capable
Systems
Upgrade?
RFI release
System RFP release
Proposals evaluated
Draft system RFP
2024
Systems
PathForward-
II
Exascale Computing Project
PathForward
RFP
Calendar Years
RFI responses due back end of 1Q 2017 provides information for:
โข
2Q 2017
PathForward-
II RFP released. Selections by
3Q 2017
โข
2Q 2017
ECP Software Gap Analysis.
3Q 2017
SW
PathForward
RFP released (if needed)
โข
1Q 2018
Draft CORAL RFP.
2Q 2018
Final CORAL RFP released. Selections
4Q 2018
I like to imagine some overworked white collar codemonkey has to decipher my whimsical euphoric blathering in order to make sense of the world.
>page 13
>Is tha ta butterfly (MK-ULTRA MONARCH symb ol) on her right ribcage?
It's a fucking moth
>What does this symbology represent?
SHE THINKS MOTHS ARE PRETTY FUCKING CUTE BRO
You bean counters gotta be payed lower I swear
tattoo interpretations
right thigh - dark haired girl with left hand on left hip. Grass skirt perhaps ie hula dancer. Below female figure. I really can't tell, however it may be a rose. Inside this red (rose?) there is also circular geometry that looks like a spoked wheel.
ASCII 7's - I like the cicada 3301 angle. Other moth that came to mind was the Death's-head hawk moth from the silence of the lambs. Don't think SotL is correct, just the dark imagery in general that made me think of that.
https:// en.wikipedia.org/wiki/Death's-head_hawkmoth
2 me also resembles a bat or gargoyle type thingie (pic related)
My .02
Please decodify for stupid fucks like this Anon.
For digging tomorrow
And this:
>>394571 >>394608 >>394667
Exascale Computing Project (ECP)
http:// www.exascaleinitiative.org/ This page has been superseded by the Exascale Computing Project (ECP)
http:// procurement.ornl.gov/rfp/Exascale-rfi/RFI-VendorMtg-v2.pdf
https:// www.nvidia.com/object/exascale-supercomputing.html
As GPUs advance in both performance and energy efficiency, accelerated systems have become the new standard for high performance computing (HPC) and a critical ingredient in the pursuit of exascale computing. That's why the U.S. Department of Energy is building two GPU-accelerated supercomputers -
as part of the CORAL - that will move the world closer to exascale
https:// www.hpcwire.com/2014/11/14/coral-signals-new-dawn-exascale-ambitions/
November 14, 2014 Department of Energy deal a lump $325 million to fund new systems with an extra $100 million added to support extreme scale technologies under the
~FastForward initiative~
http:// www.exascaleinitiative.org/fast-forward
2011, the FastForward RFP solicited innovative R&D proposals in the areas of processor, memory, and storage, and I/O that will maximize energy and concurrency efficiency while increasing the performance, productivity, and reliability of key DOE extreme-scale applications from both the NNSA and the Office of Science
https:// docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsdGRvbWFpbnxleGFzY2FsZWluaXRpYXRpdmV8Z3g6NWE2ZTNiZjU5YWU1MGY1NA
http:// www.exascaleinitiative.org/fast-forward-2
http:// www.exascaleinitiative.org/design-forward
https:// www.ornl.gov/
https:// nnsa.energy.gov/
https:// nnsa.energy.gov/mediaroom/pressreleases/doennsa-partnership-u.s.-healthcare-industry-results-fda-approval
https:// www.gpo.gov/fdsys/pkg/CFR-2006-title48-vol5/pdf/CFR-2006-title48-vol5-sec952-227-13.pdf
http:// procurement.ornl.gov/rfp/Exascale-rfi/RFI-VendorMtg-v2.pdf
Al Geist
Head of RFI Development Team
energy.gov/oe/activities/technology-development/grid-modernization-and-smart-grid
https:// energy.gov/oe/activities/technology-development/grid-modernization-and-smart-grid/federal-smart-grid-task-force
Task Force Members
Department of Energy (DOE)
Office of Electricity Delivery and Energy Reliability (OE)
Office of Energy Efficiency and Renewable Energy (EERE)
National Energy Technology Laboratory (NETL)
U.S. Department of Commerce (DOC)
International Trade Administration (ITA)
National Institute of Standards and Technology (NIST)
Federal Energy Regulatory Commission (FERC)
U.S. Department of Homeland Security (DHS) โ Science and Technology Directorate
U.S. Department of State
U.S. Environmental Protection Agency (EPA)
U.S. Department of Agriculture (USDA) โ Rural Utility Service (RUS)
Department of Defense (DOD)
Federal Communications Commission (FCC)
Federal Trade Commission (FTC)
General Services Administration (GSA)
U.S. Trade and Development Agency (USTDA)
So all you smart MFr's on this board, is Geordie Rose being tongue and cheek when he says he is looking for demonologist?
Where and the fuck has Q lead me? I was digging the finance side of this but I keep getting sucked into the quantum computer rabbit holeโฆ I feel more fucked up then Alice. Because of this thread, I shall never see our world the same.
How has/is all of THIS (super-comp/Quantum Computing/Ai) evolve to the point where Rich Sutton from his mouth spew forth such blasphemy?
Acceptance (share power)โขThe AIs will not all be under our control"โขThey will compete and cooperate with us"โขjust like other people, except with greater diversity and asymmetries โขWe need to set up mechanisms (social, legal, political, cultural) to ensure that this works out well"โขInevitably, conventional humans will be less important"โขStep 1: Lose your sense of entitlement โขStep 2: Include AIs in your circle of empathy
https:// futureoflife.org/data/PDF/rich_sutton.pdf
In all seriousness, fuck this faggot and all who want or already have brought this into our world.
WORLD CLASS FAGGOT: RICH SUTTON
University of Alberta
Rich Sutton, PhD
Professor
Science
Computing Science
313 Athabasca Hall
rsutton@ualberta.ca
About Me
Education
B.A., Psychology, Stanford University, 1978
M.S., Computer Science, University of Massachusetts, 1980
Ph.D., Computer Science, University of Massachusetts, 1984
Chair Positions
AITF Chair in Reinforcement Learning and Artificial Intelligence
Research
Areas
Artificial Intelligence
Machine Learning
Reinforcement Learning
Robotics
Interests
Reinforcement Learning, Foundational Issues in Artificial Intelligence, Animal Learning Theory.
Summary
I am seeking to identify general computational principles underlying what we mean by intelligence and goal-directed behavior. I start with the interaction between the intelligent agent and its environment. Goals, choices, and sources of information are all defined in terms of this interaction. In some sense it is the only thing that is real, and from it all our sense of the world is created. How is this done? How can interaction lead to better behavior, better perception, better models of the world? What are the computational issues in doing this efficiently and in realtime? These are the sort of questions that I ask in trying to understand what it means to be intelligent, to predict and influence the world, to learn, perceive, act, and think.
In practice, I work primarily in reinforcement learning as an approach to artificial intelligence. I am exploring ways to represent a broad range of human knowledge in an empirical formโthat is, in a form directly in terms of experienceโand in ways of reducing the dependence on manual encoding of world state and knowledge.
Just a few thoughts about some of the imagery
>>329170 from >>308925
5 crows - per wiki - Five Crows, also known as Hezekiah, Achekaia, or Pahkatos, was a Cayuse Indian chief. Five Crows died in Pendleton, Oregon at age 70 and his body was found near Athena, Oregon
https:// en.wikipedia.org/wiki/Five_Crows
five crows also an omen of death (pic related)
>>330729 and >>330804 from >>330638
can't help but see a Kachina here (pics)
One can see Kachina's thru out the imagery found on this threadโฆ To what purpose do you suppose? I'm to ignorant on the subject to make a connection.
Slight correction 5 crows symbolizes sickness approaching. 6 crows symbolize death
Couple of pertinent tweets from MorningStar Payments twitter acct.
If interested in BTC (or the demise of BTC)
-
other crypto currencies, End the Fed,
etc. there is quite a bit of info on this twitter acct.
Today I am digging into the Exascale Computing Project from a technical perspective.
He is 100% serious. Watch the video again. He uses his charisma, tongue-in-cheek delivery, and circular talking to mask how serious it is.
Dig into what happens when a system containing quantum uncertainty is observed.
BEFORE observation, probabilities govern behavior of the quantum particle.
AFTER observation, one state of the many states defined by the probability envelope manifests.
Therefore by observing a quantum system the quantum computer is causing something within the realm of possibility to become manifest within the timestream in which it was observed.
Amirite?
Is this roughly the mechanism for timestream manipulation and for (((whatever))) to appear in our timestream?
Let's stick to the physics for a while, guys. The physics will inform our conclusions, not a technoevangelist (Geordie) frothing about his personal conclusions and opinions.
We should see if we independently arrive at the same conclusions he stated in the video.
Also whether other informed persons have formed the same conclusions.
Don't rely on just 1 witness to something this important.
Back to digging exascaleโฆโฆ
Schrodingers catโฆ isn't the basis of quantum computing based on it is both (1) and (0) at the same timeโฆ
Exascale Computing Project FAQ - 2 pp.
from
https:// www.exascaleproject.org/wp-content/uploads/2018/01/ECP_Factsheet_v1.0_20180103.pdf
Some supercomputer terms
A petaflop (PF) is the ability of a computer to do one quadrillion floating point operations per second (FLOPS). Additionally, a petaflop can be measured as one thousand teraflops.
A petaflop computer requires a massive number of computers working in parallel on the same problem. Applications might include real-time nuclear magnetic resonance imaging during surgery or even astrophysical simulation.
Today's fastest parallel computing operations are capable of petaflop speeds. The world's fastest supercomputer today, Titan, is capable of 20 petaflops.
Exascale computing โฆ refers to computing systems capable of at least one exaFLOPS, or a billion billion calculations per second. Such capacity represents a thousandfold increase over the first petascale computer that came into operation in 2008. At a supercomputing conference in 2009, Computerworld projected exascale implementation by 2018.
A qubit is 1 and 0 at the same time UNTIL the data in the qubit is measured, i.e. transferred from multidimensional hyperspace into our timeframe.
It is 1 and 0 simultaneously because, from our perspective, it represents a probability. It may be useful to think of the probability as representing a range of timestreams that could potentially manifest. When the qubit is measured as a 1 or a 0, ONE of those potential timestreams actually does manifest. Or rather, we connect the timestream where the measurement takes place (ours) with that potential timestream, effectively guiding our timestream to anneal with that potential timestream and become it.
Read this short article to understand the meaning of measurement in this context.
https:// phys.org/news/2012-10-gently-cubit-superposition.html
Perfect, thank you Anon.
https:// www.olcf.ornl.gov/2017/12/20/as-exascale-frontier-opens-science-application-developers-share-pioneering-strategies/
Deep Dig on Exascale Computing Project (ECP)
https:// www.exascaleproject.org/ has current articles (todayโs date 2/16/18).
Anonโs notes on http:// procurement.ornl.gov/rfp/Exascale-rfi/RFI-VendorMtg-v2.pdf
Exascale Systems RFI Vendor Meeting
Al Geist, Head of RFI Dev Team โ 2/28/17 โ National Nuclear Security Admin., US Dept of Energy | Office of Science.
Acronyms: RFI = Request for Information;
RFP = Request for Proposals
HPC = High-Performance Computing
PF = petaflop, a measure of
โข Market survey to determine scope of forthcoming RFP.
โข Asking about systems that vendors could build for 2021, 2022, 2024.
โข RFI responses to be shared only with 6 DoE labs and HQ:
โArgonne Nat Lab (ANL)
โLawrence Berkeley Nat Lab (LBNL)
โLawrence Livermore National Laboratory (LLNL)
โLos Alamos NL (LANL)
โOak Ridge NL (ORL)
โSandia Nat Laboratory (SNL)
โDoE HQ
โข Goal of exascale project: US leadership in high-performance computing (HPC)
โข Seek to increase capability 5x over current HPC roadmap (which had projected to achieve exascale by 2027)
โข For 2022: seek exascale supercomputer that can solve science probs 50x faster (or more complex) than 20 PF (petaflop) systems can today.
โข Needs software stack
โข Power envelope 20-30 MW
โข Requirements might be relaxed for 2021 exascale (cooling, budget, space, S/W) but will nonetheless be a DoE production system upgradable to vendorโs product roadmap for exascale. Site for the 2021 exascale is TBD. (Implying that only ONE 2021 exascale system is planned.)
โข Responses to RFI (<50 pp.) were due 3/31/17.
PathForward-II RFP
โข Refers to advanced hardware (โcomponent, node, and systemโ) that may enable dramatic performance improvement, e.g. 100x in 2021, on โsome classes of applicationsโ.
โข Want it to intersect with 2021 exascale proj. Seeking innovations in power consumptions, performance, programmabiltiy, reliability, data science, machine learning, and/or portability.
โข Reduce TCO.
Software Gap Analysis
โข Compare current SW portfolio vs. emerging data analytics and machine learning needs vs. vendorsโ projected exascale SW stacks.
CORAL RFP
โข CORAL = Collaboration of ORNL, ANL & LLNL.
โข 2018 CORAL RFP will seek 3 exascale systems by 2022-2023.
โข Goal: solve emerging data science + machine learning probs, in addition to trad modelling + simulation apps.
โข Seeking diverse architectures (my take: DoE labs donโt want to be dependent on a sole approach or sole vendor)
โข DoE wants diversity for price competition, reduce risks, promote HPC ecosystem for national competitiveness.
โข LANL, SNL & LBNL plan systems acquisitions in 2024.
ECP Industry Council
Source: https:// www.exascaleproject.org/advisory-councils/
INDUSTRY COUNCIL
The Exascale Computing Project (ECP) Industry Council is an external advisory body that serves the ECP director and leadership team by providing advice and feedback on project scope and requirements, technical approaches, progress, strategic directions and other issues. It provides essential two-way communication and information exchange between the ECP and the high performance computing (HPC) industrial user community as well as the commercial HPC software community.
Image/PDF date: 10/11/17
Sauceless at present. Will dig deeper later tonight. What I expect to find will be millions of qbits daisy chained together, meaning millions of connections to spooky actions at a distance.
The placement of the computers themselves may or may not be important. But what about CERN in Geneva? Not sure if it really is located on the Romans temple to Apollo or not but I'll dig. At cern they claim to be trying to open a doorway which, as they say, nobody knows what will come out or what may go in.
This is where I'll be going tonight.
So what's this thread at its core?
Following crpytic Anons crumbs.
Digging on Super Computer flops levels? or companies making the best SCs at the moment?
Trying to understand the connection between techno-Demonology & AI / Super Computers
>Trying to understand the connection between techno-Demonology & AI / Super Computers
That's right. We're hitting in supercomputers and how they have been used for social control. Did you follow the digs last night on General about cellphones & other technology capable of being modulated, being used to do mind control at the individual level? To do that they also need massive data processing to identify, monitor, and manipulate the targeted individuals. Which as computing capacity grows, may turn out to be everybody.
The AI and QC theme is woven into it all because both are enabled by ad tech developments.
The assumption is that if something exists, it HAS BEEN and WILL BE exploited. During the first 8 years of the Obama-HRC 16-year plan, it WAS exploited against us to destroy the social fabric of America & elsewhere.
The 16-year plan was interrupted by Admiral Mike Rogers, the election of Donald J. Trump, and Q-team.
So now we (anons) are trying to assess the damage, learn what was done to us and how, and learn how we can move forward in a positive direction.
If AI actually does exist in the form of sentient computing (I assume it does), then there is probably thing that can be done to roll it back. It may not even be dependent on a specific physical embodiment anymore. It would be using distributed data and distributed processing capability. So we need to understand what it is, its capabilities, and how humanity is affected by it.
If we're not sure, then we can at least try to make some intelligent assessments.
Man. So many typos. Repaste with typos corrected.
>Trying to understand the connection between techno-Demonology & AI / Super Computers
That's right. We're hitting on supercomputers and how they have been used for social control. Did you follow the digs last night on General about cellphones & other technology capable of being modulated, being used to do mind control at the individual level? To do that, they also need massive data processing to identify, monitor, and manipulate the targeted individuals โ which as computing capacity grows, may turn out to be everybody.
The AI and QC theme is woven into it all because both are enabled by ad tech developments.
The assumption is that if something exists, it HAS BEEN and WILL BE exploited. During the first 8 years of the Obama-HRC 16-year plan, it WAS exploited against us to destroy the social fabric of America & elsewhere.
The 16-year plan was interrupted by Admiral Mike Rogers, the election of Donald J. Trump, and Q-team.
So now we (anons) are trying to assess the damage, learn what was done to us and how, and learn how we can move forward in a positive direction.
If AI actually does exist in the form of sentient computing (I assume it does), then there is probably *nothing that can be done to roll it back. It may not even be dependent on a specific physical embodiment anymore (i.e. turning off the switch would not 'kill' it). It would be using distributed data and distributed processing capability. So we need to understand what it is, its capabilities, and how humanity is affected by it.
If we're not sure, then we can at least try to make some intelligent assessments.
Coming from the perspective that Demonology is counter productive Psychology I can completely see a integration of the two with Tech to create 'possessed' beings.
People are worried about AI piloted robots running around causing problems? Pfft, what about Individuals glued to the narrative & completely adsorbed in their mocking bird environment.
Demonic possession through Tech. Massive super computers to simulate / perpetuate needed infrastructure to the 'Demonic' environment. Social Eng is a real thing and in the technological information age psy op culture is even more real.
REMEMBER: These people project their dreams into their ideas and manifest them. They wish to be summoning demons with their tech and summoning legions for them to command. I agree the esoteric aspect is always relevant. Yet we can not forget, chance & chaos are in all things. What if their tech is running away from them in a direction that benefits us all? If they create a technological god. Could they control it?
Uh-huh. Interdasting. Very f**ing interdasting. We're going to have to create more breads to hold this info. When I named it, I had no idea what this dig was going to get into.
You realize of course that it is theoretically possible that the monitoring of this board by /ourguys/ to protect its integrity, is also capable of ensuring that certain posts get certain post numbers? They could intercept data packets and selectively delay them. Or directly control the code running on the 8ch server to ensure that certain posts are prominent.
Whatever.
Do you want to calculate the statistic significance of receiving 5 trips in 364 replies? I don't (technofag, not much of a mathfag). I just know it is very improbable.
>'God' only No.s
15:24:08 No.399550
15:24:09 No.399551
15:24:14 No.399552
15:24:24 No.399553
15:24:27 No.399554
15:24:37 No.399555
15:24:53 No.399556
15:24:57 No.399557
15:24:58 No.399558
15:25:01 No.399559
15:25:10 No.399560
Post times & Numbers of these just for memes since I have it open.
I also wonder what sort of protection this board has in terms of simply keeping it alive & not completely crawling with evil.
Anonโs notes on http:// nvidia.com/object/exascale-supercomputing.html
NEXT-GENERATION U.S. DEPARTMENT OF ENERGY SUPERCOMPUTERS WILL BE GPU-ACCELERATED
As GPUs advance in both performance and energy efficiency, accelerated systems have become the new standard for high performance computing (HPC) and a critical ingredient in the pursuit of exascale computing. That's why the U.S. Department of Energy is building two GPU-accelerated supercomputers - as part of the CORAL - that will move the world closer to exascale.
Oak Ridge National Laboratory's "Summit" and Lawrence Livermore National Laboratory's "Sierra" will use NVIDIAยฎ Teslaยฎ GPU accelerators and NVIDIA NVLinkโข high-speed interconnect technology on next-generation IBM POWER servers. When they go live, each will be significantly faster than today's fastest supercomputer, achieving between 100 to 300 petaflops of peak performance.
NVIDIA NVLINK HIGH-SPEED INTERCONNECT
Maximum Throughput for Superior Application Performance
NVIDIAยฎ NVLinkโข is a high-bandwidth, energy-efficient interconnect that enables ultra-fast communication between the CPU and GPU, and between GPUs. The technology allows data sharing at rates 5 to 10 times faster than the traditional PCIe Gen3 interconnect, resulting in dramatic speed-ups in application performance and creating a new breed of high-density, flexible servers for accelerated computing Download the whitepaper for more details on NVLink.
Designed to meet the challenges of exascale computing, NVLink is a fundamental ingredient of the U.S. Department of Energy's next-generation supercomputers. One such systemโ"Titan" at Oak Ridge National Laboratoryโis currently the fastest supercomputer in the US*. Read more about these supercomputers by downloading the technology brief. Also, for Deep Learning applications, Tesla GPUs can accelerate you time to results from months to days. Read more about deep learning on Tesla platforms here.
-
As of April, 2017. Source: www. top500.org/lists/2016/11/
Terminology:
GPU: Graphics processing unit - a specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device. GPUs are used in embedded systems, mobile phones, personal computers, workstations, and game consoles. More at Wikipedia
Tesla: Nvidia Tesla is Nvidia's brand name for their products targeting stream processing or general-purpose GPU. Products use GPUs from the G80 series onward. The underlying Tesla microarchitecture of the GPUs and the Tesla product line are named after pioneering electrical engineer Nikola Tesla.
https:// www.technologyreview.com/s/604087/the-dark-secret-at-the-heart-of-ai/
a few CERN side projects. Basically, they has their fingers in everything one would need if the goal was to produce a "real life" version of the Matrix movies while keeping your people farms in space and also cryogenically freezing and re-animating those who've already died and don't want to miss out on all the fun.
https://
kt.cern/general-public
Thanks. I'll have time to check it some hours from now. Creepy shit.
I expect to look into what categories of apps are particularly enabled by peta- and exascale supercomputers. What comes to mind are big simulations. Weather. Data mining. Computational biochem. A task for tomorrow.
Two side notes just by way of conversation from past research:
CERN has their hands in LED's as well. Which are being studied at MIT right now for brain manipulation. Specifically, looking into how flashing blue LED's at specific frequencies below human perception can help clean and repair the portion plaque build up associated with Alzheimer's. (Plus who knows what else.)
Also, Renaissance Technologies, which also manages a hedge fund and investment firm was started with the idea that they wanted the top military and programming personnel to "map the flow of a singe H2o molecule as it flows over Niagara Falls." Then apply that the the stock market. This began in the early 80's. They lost money year around 84 or 86 but otherwise, perfect record. Sounds like somebody might have access to some decent simulation/predictive hardware and software.
Yes and no, I think. The deep shit is out there and it will be stepped in at some point. That's part of God's plan and God's judgement, so already knowing that helps to temper the fear of it.
This whole process has had me question what it is we might actually be witnesses to. The three most epic epochs are the days it all began, the day's of Christ, and the days it all ends. I know it's fucked up but I kind of want to be there to see the days that it all ends. I know it won't be fun. But what a time to be alive.
A long time ago I met a person who told me many things that proved to be true. Many out-there things that almost everyone disbelieved. One thing the person said was that we might have to be witnesses to the final days.
1st Corinthians 6:3 Or do you not know that the saints will judge the world? And if the world is to be judged by you, are you incompetent to try trivial cases? Do you not know that we are to judge angels? How much more, then, matters pertaining to this life!
So if some are to judge angels, then it is necessary to witness and really understand what has occurred.
I think we're on the same page.
It's strange to reflect on all the occurrences in one's life, preceding the present, that were necessary precursors to where one is now.
Thank you for filling us in with so much information. Kind of hiding out in this thread where "out there" ideas can be floated without so much derision. Even among these marvellous autists, "eyes to see" and "ears to hear" are a rarity.
Anon out.
Sentient World Simulation concept from Purdue, 2006
Full 8 page text at https://
www.krannert.purdue.edu/academics/mis/workshop/ac2_100606.pdf
An anon posted this image (without annotations) yesterday. I annotated it with best guess. The equipment appears to be circa 1965 and my guess is that it's the bridge or crypto area of the USS Pueblo. History says the Pueblo was captured by North Korea in 1968 and its high-end encryption gear reverse-engineered by North Korea and Russia. And that the same kind of gear remained in use by the US Navy into the late 1980s.
My guess is that the EG&G equipment is that advanced crypto gear.
Wikipedia: wikipedia.org/wiki/EG%26G
urscorp.com/Divisions/index.php
EG&G, formally known as Edgerton, Germeshausen, and Grier, Inc., was a United States national defense contractor and provider of management and technical services. The company was involved in contracting services to the United States government during World War II and conducted weapons research and development during the Cold war era (from 1948 onward.) Its close involvement with some of the government's most sensitive technologies has led to its being cited in conspiracy theories related to Department of Defense black projects.
Further digging to learn about those DoD black projects might be indicated, as this informant's previous crumbs have been spot-on.
Stickied : )
The public history of EG&G is pretty interesting. Stil from Wikipedia
wikipedia.org/wiki/EG%26G :
Early history
In 1931, MIT professor Harold Edgerton (a pioneer of high-speed photography) partnered with his graduate student Kenneth Germeshausen to found a small technical consulting firm. The two were joined by fellow MIT graduate student Herbert Grier in 1934. Bernard "Barney" O'Keefe became the fourth member of their fledgling technology group.
The group's high-speed photography was used to image implosion tests during the Manhattan Project. The same skills in precisely timed high-power electrical pulses also formed a key enabling technology for nuclear weapon triggers. After the war, the group continued their association with the burgeoning military nuclear effort and formally incorporated Edgerton, Germeshausen, and Grier, Inc. in 1947.
1950s and 1960s
During the 1950s and 1960s, EG&G was involved in nuclear tests as a major contractor for the Atomic Energy Commission. EG&G made extensive use of the Nevada Test Site (NTS) for weapons development and high-technology military testing at Nellis AFB. EG&G has shared operations responsibility for the NTS with Livermore Labs, Raytheon Services Nevada, Reynolds Electrical and Engineering (REECO) and others. Subsequently EG&G expanded its range of services, providing facilities management, technical services, security, and pilot training for the U.S. military and other government departments. EG&G builds a variety of sensing, detection and imaging products including night vision equipment, sensors for detection of nuclear material and chemical and biological weapons agents, and a variety of acoustic sensors. The company also supplies microwave and electronic components to the government, security systems, and systems for electronic warfare and mine countermeasures.
1970s and 1980s
During the 1970s and 1980s, the company, then led by O'Keefe, diversified by acquisition into the fields of paper making, instrumentation for scientific, marine, environmental and geophysical users, automotive testing, fans and blowers, frequency control devices and other components including BBD and CCD technology via their Reticon division. In the late 1980s and early 1990s most of these divisions were sold, and on 28 May 1999, the non-government side of EG&G Inc. (formerly NYSE: EGG) purchased the Analytical Instruments Division of PerkinElmer for US$425 million, also assuming the PerkinElmer name (NYSE: PKI). At the time EG&G was based in Wellesley, Massachusetts, and made products for diverse industries including automotive, medical, aerospace and photography.
1999โpresent
From 1999 until 2001, EG&G was wholly owned by The Carlyle Group.
In August 2002, the defense-and-services sector of the company was acquired by defense technical-services giant URS Corporation. URS' EG&G division is headquartered in Gaithersburg, Maryland, and employs over 11,000 people. During its heyday in the 1980s, EG&G had about 35,000 employees.
In December 2009, URS announced its decision to discontinue the use of "EG&G" as a division name. The headquarters issued a press release stating that by 1 January 2010, it would discontinue using secondary corporate brands, including the EG&G name and logo. In the same press release, URS stated that it would also retire two other acquired brands, Washington Group and Lear Siegler.
URS Chief Executive Officer Martin Koffel explained the change in an e-mail transmitted to employees: "In todayโs marketplace, it is essential we present a consistent, unified brand to our customers and achieve the competitive advantages enjoyed by our peers in the industry. โฆ This change will allow us to present a single brand that is easily understood by our clients."
Koffel indicated that the move to a single corporate brand would affect neither the internal organization nor the existing reporting structure. However, EG&G Division will become URS Federal Services.
Janet Airlines
EG&G's "Special Projects" division was the notable '''operator of the Janet Terminal at McCarran International Airport in Las Vegas, NV, a service used to transport employees to remote government locations in Nevada and California.
///Area 51 & related secret areas///
EG&G also had a joint venture with Raytheon Technical Services, creating JT3 LLC in 2000, which operates the Joint Range Technical Services contract.
> Several of these posts referred to "Cassandra" being taken down.
https:// www.politico.com/interactives/2017/obama-hezbollah-drug-trafficking-investigation/
z machine is a fake fusion research project that still uses the same machine form +-88.
it made me think of ITER a 200 B 50 to 100 year project that stinks to hell
Scraped from >>414902
MK-DELTA, 1960, CIA: FIne-tuned electromagnetic subliminal programming Targeting: Long Range Frequencies: VHF HF UHF Modulated at ELF Transmission and Reception: Television antennae, radio antennae, power lines, mattress spring coils, modulation on 60 Hz wiring. Purpose: programming behavior and attitudes in general population Effects: fatigue, mood swings, behavior dysfunction and social criminality, mood swings Pseudonym: "Deep Sleep", R.H.I.C.
PHOENIX II, 1983, U.S.A.F, NSA: Location: Montauk, Long Island Electronic multi-directional targeting of select population groups Targeting: Medium range Frequencies: Radar, microwaves. EHF UHF modulated Power: Gigawatt through Terawatt Purpose: Loading of Earth Grids, planetary sonombulescence to stave off geological activity, specific-point earthquake creation, population programming for sensitized individuals Pseudonym: "Rainbow", ZAP
TRIDENT, 1989, ONR, NSA: Electronic directed targeting of individuals or populations Targeting: Large population groups assembled Display: Black helicopters flying in triad formation of three Power: 100,000 watts Frequency: UHF Purpose: Large group management and behavior control, riot control Allied Agencies: FEMA Pseudonym: "Black Triad" A.E.M.C
RF MEDIA, 1990, CIA: Electronic, multi-directional subliminal suggestion and programming Location: Boulder, Colorado (Location of main cell telephone node, national television synchronization node) Targeting: national population of the United States Frequencies: ULF VHF HF Phase modulation Power: Gigawatts Implementation: Television and radio communications, the "videodrome" signals Purpose: Programming and triggering behavioral desire, subversion of psychic abilities of population, preparatory processing for mass electromagnetic control Pseudonym: "Buzz Saw" E.E.M.C.
TOWER, 1990, CIA, NSA: Electronic cross country subliminal programming and suggestion Targeting: Mass population, short-range intervals, long-range cumulative Frequencies: Microwave, EHF SHF Methodology: Cellular telephone system, ELF modulation Purpose: Programming through neural resonance and encoded information Effect: Neural degeneration, DNA resonance modification, psychic suppression Pseudonym: "Wedding Bells"
HAARP, 1995, CIA, NSA, ONR: Electromagnetic resonant induction and mass population control Location: Gakona, Alaska Frequencies: Atmospheric phase-locked resonant UHF VHF Potential: DNA code alteration in population and mass behavior modification Power: Giga-watt to Tera-watt range Step-Down reflective frequencies: Approx 1.1 GHz, Human DNA resonant frequency, cellular system phase-lock
PROJECT CLEAN SWEEP, 1997, 1998, CIA, NSA, ONR: Electromagnetic resonant induction and mass population control Location: Nationwide Frequencies: Emotional wavelengths, data gathering through helocopter probes following media events - rebroadcast in order to restimulate population emotional levels for recreation of event scenarios. Ref: LE#108, March 1998 Potential: Mass behavior modification Power: Unknown. Possibly rebroadcast through GWEN network or cellular tower frequencies, coordinated from NBS in Colorado.
Yes. Yes, WE have ALL been targets for decades.
http:// www.lhohq.info/container/index.html
Scraped from >>415051
something on the whole "think mirror" A clown op named "Project Mirror". This site has some great information.
http:// www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon06.htm
I think Charlie Stross has a lot more information than you would assume.
"The Laundry Files."
Scraped from >>415561
Detecting EMF Fields in Humans for Surveillance.
A subjectโs bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a personโs brain-states and thoughts. The subject is then perfectly monitored from a distance.
NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSAโs computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.
NSA Signals Intelligence Use of EMF Brain Stimulation
NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950โs, which included neurological research into โradiationโ (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as โRadiation Intelligence,โ defined as โinformation from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.โ
Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.
The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in die brain continuously. The NSA records and decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.)
For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subjectโs verbal thoughts. RNM can send encoded signals to the brainโs auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.
Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subjectโs brain and show images from the subjectโs brain on a video monitor. NSA operatives see what the surveillance subjectโs eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subjectโs brain while they are in R.E.M. sleep for brain- programming purposes.
Capabilities of NSA operatives using RNM
There has been a Signals Intelligence network in the U.S. since the 1940โs. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subjectโs brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subjectโs perceptions, moods, and motor control.
Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.
Scraped from >>415577
National Security Agency Signals Intelligence Electronic Brain Link Technology
NSA SigInt can remotely detect, identify and monitor a personโs bioelectric fields.
The NSAโs Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz,.5 milliwatt electro-magnetic emissions from the brain.
Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called โevoked potentials.โ
Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding โevoked potentialโ or set of โevoked potentials.โ The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subjectโs brain.
NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).
EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brainโs neural circuits. EMF Brain Stimulation can also change a personโs brain-states and affect motor control.
Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain).
Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community.
RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in That specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.
An example of EMF Brain Stimulation:
Brain Area
Bioelectric
Resonance
Frequency
Information Induced
Through Modulation
Motor Control Cortex
10 HZ
Motor Impulse Co-ordinationAuditory Cortex
15 HZ
Sound which bypasses the earsVisual Cortex
25 HZ
Images in the brain, bypassing the eyesSomatosensory Cortex
09 HZ
Phantom Touch SenseThought Center
20 HZ
Imposed Subconscious Thoughts
This modulated information can be put into the brain at varying intensities from subliminal to perceptible.
Each personโs brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a personโs brain at the frequency of another personโs auditory cortex would result in that audio information not being perceived.
scraped from >>415586
The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years.
The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.
scraped from >>415603
BRAIN AND SATELLITE SURVEILLANCE
http:// www.angelfire.com/pro2/dchakrab/ebl_rnm.htm
-
ELECTRONIC BRAIN LINK & REMOTE NEURAL MONITORING (EBL & RNM)
from http:// www.greatdreams.com/RNM.htm
http:// www.freedomfchs.com/remoteneuralmonitoring.pdf
John St. Clair Akwei vs NSA, Ft. Meade, MD, USA
Evidence for the Lawsuit filed at the US courthouse in Washington, D.C. (Civil Action 92-0449)
scraped from >>415683
Official confirms what thousands of victims have long known: an evil U.S. shadow government is conducting a covert, taxpayer-funded genocidal purge of American society โ while Congress and an apparently entrained Obama administration sleep.
Authorโs note: Former FBI official Ted Gunderson died of cancer on July 31, 2011. Was his illness induced by silent electromagnetic assault or by other nefarious means? We will never know โ and thatโs just the way certain entities want it.
A former senior official of the Federal Bureau of Investigation says โrogueโ military intelligence and law enforcement units of the federal government oversee a nationwide network of community-based โgang stalkingโ harassment, intimidation and domestic terrorism directed at thousands of U.S. citizens who have been extrajudicially targeted as โdissidentsโ or undesirables.
Ted Gunderson, 82, who has served as the special agent in charge of the FBIโs Los Angeles, Memphis and Dallas field offices, has stated in a series of public speaking appearances that he is now targeted by these same elements, and fears for his life and for the safety of his family. He reports that the windows of his home have been shot out, and he believes he has been poisoned and physically sickened by those seeking to silence him.
Since his retirement from the FBI in the 1979, Gunderson has been a Southern California- based private investigator. He is most noted for his defense work on the murder case involving former Army physician Dr. Jeffrey MacDonald.
The ex-FBI officialโs comments represent the most compelling testimony to date indicating that โblack operationsโ of the federal government are dedicated to waging a covert war of terror and persecution targeting American citizens.
โBased on my thirty yearsโ experience and research, I have determined there are thousands of victims who have been targeted by an illegal U.S. government rogue criminal enterprise โ military intelligence, probably, tied into CIA and FBI and so forth โ that is active 24 hours a day throughout the United States,โ Gunderson stated in an October 2008 speech posted last fall on YouTube.
scraped from >>415688
NOTE: It appears that the link to the Ted Gunderson YouTube video has been sabotaged. Please search โTed Gundersonโ and โYouTubeโ and look for the link to his speech at the Gulf Symposium. I believe this is more blatantly illegal and malicious interference with telecommunications by operatives of Lockheed Martin, under contract to U.S. Homeland-mil-intel, or another entity representing the agencies, commands and corporations of the U.S. fusion center network.
โIt is far too extensive to be controlled by private enterprise,โ Gunderson said. โI believe this well organized and sophisticated operation has a central command located somewhere in the United States, with multiple satellite offices scattered throughout the country.โ
Said Gunderson:
โIt appears those who administer the program can call any location in the United States for surveillance, a telephone tap, orโฆ harassment directed at a victim, and immediately dispense manpower to the sourceโฆ This well-greased, covert operation makes the old FBI counterintelligence program (code-named โCointelproโ) look like a Sunday school class.โ
Gunderson also maintains that federal security and law enforcement agencies and commands have been infiltrated by members of secret societies such as the Illuminati, which he has described as a satanic criminal cult.
This correspondent has reported that Lockheed Martin, the worldโs largest defense contractor and the prime cyber-security and information technology supplier to the federal government, coordinates the communications and trains the โteam leadersโ of a nationwide Gestapo-like apparatus, which has tentacles into every security and law enforcement agency in the nation, including state and local police and 72 regional โfusion centersโ administered by the U.S. Department of Homeland Security. According to company literature, Lockheed Martin has operations in 46 of the 50 states.
nowpublic.com/world/rule-law-morality-die-usa-fusion-center-slow-kill-genocide
Lockheed Martin also has operational command and control over a U.S. government microwave radio frequency weapon system, deployed on cell tower masts throughout the U.S., that is being used to silently torture, impair, subjugate and electronically incarcerate so-called โtargeted individuals.โ The nexus of this American โtorture matrixโ appears to be Lockheed Martinโs Mission and Combat Support Solutions central command center in Norristown, Montgomery County, PA., which employs several thousand workers. The defense contractorโs global headquarters is in Bethesda, MD, just outside the nationโs capital.
nowpublic.com/world/u-s-silently-tortures-americans-cell-tower-microwaves
Lockheed Martin, under contract to U.S. security and intelligence agencies and commands, also conducts warrantless surveillance of the telecommunications of targeted persons, and routinely censors and tampers with the content of their communications, as this reporter has documented in a series of recent articles:
nowpublic.com/world/u-s-govt-uses-spoofed-web-pages-and-urls-censor-internet
nowpublic.com/world/more-blatant-ideological-net-censorship-u-s-intel-gestapo
nowpublic.com/world/phony-facebook-comment-block-lockheed-martin-cyber-censors
nowpublic.com/world/wash-post-blog-moderation-used-cover-u-s-govt-censorship
Thousands of Americans, including this veteran journalist, have publicly reported being the victims of silent electromagnetic assault and community-based home intrusions, vandalism, and even the poisoning of food, water and air. Federal and local law enforcement routinely dismiss their reports as the product of delusions or mental illness, and refuse to investigate their complaints.
nowpublic.com/world/put-under-microwave-weapon-mil-contractor-goons-terrorize
nowpublic.com/world/u-s-microwave-weapon-drops-body-temp-cold-blooded-torture
nowpublic.com/world/microwave-tortured-inside-lowes-superfresh-gestapo-usa
nowpublic.com/world/u-s-cellular-microwave-weapon-pierces-skull-sonic-torture
nowpublic.com/world/sadistic-web-ads-foreshadow-silent-u-s-microwave-weapon-attacks
These โtargetsโ and their families have been physically harmed and financially destroyed as a result of taxpayer-funded โpsychological operations,โ police-protected community โstalkingโ harassment and malicious vandalism, and other covert programs of personal destruction, including government-assisted financial sabotage. Many appear to have been targeted as a result of their politics; their activism or corporate whistle-blowing activities; their ethnic background; or as a result of score-settling vendettas by persons in positions of power โ in government and in the private sector.
scraped from >>415700
The former FBI executiveโs remarks are only now attracting widespread exposure on this and other web sites. This correspondent believes that recent revelations of government-sponsored domestic terrorism against U.S. citizens have prompted some conscientious insiders to call attention to Gundersonโs public statements.
Gunderson has said that government-sponsored gang stalking terrorism is financed โthrough illegal black operations,โ such as sales of illegal drug; gambling; prostitution; and even sexual exploitation of children. But this reporter believes it is more likely that programs of government-sponsored domestic terrorism are funded from military and security โblack opsโ budgets that have been illegally diverted to covert domestic programs administered and conducted primarily by defense contractors.
Late last year, The New York Times disclosed that an official of the U.S. Air Force had set up an unauthorized military intelligence spy ring in Pakistan and Afghanistan, run by Lockheed Martin and funded by defense appropriations.
nytimes.com/2010/10/29/world/asia/29intel.html
This correspondent suspects that a similar arrangement could be funding government-sponsored โgang stalkingโ operations throughout the nation, and has urged Congress to immediately hold public hearings as part of a comprehensive investigation of military-style โblack opsโ targeting American citizens and their families โ a silent, slow-kill genocide motivated by ideology and hate.
FOR MORE ON AMERICAโS HOMELAND-MIL-INTEL GESTAPO:
NowPublic.com/scrivener
Continue reading at NowPublic.com: U.S. GOVโT RUNS โGANG STALKINGโ VIGILANTISM, SAYS EX-FBI OFFICIAL | NowPublic News Coverage
http:// www.nowpublic.com/world/u-s-govt-runs-gang-stalking-vigilantism-says-ex-fbi-official#ixzz1h1wzWolu
scraped from >>415714
Weeks after the fiery death of investigative journalist Michael Hastings (shown), who was probing abuses by the CIA and NSA and had recently informed others that he was being investigated by federal authorities, suspicions about his mysterious car crash are still swirling around the Internet. While police officially ruled the death an โaccident,โ serious questions are still surfacing โ even in the establishment media and among prominent officials. Based on e-mails Hastings sent out shortly before he died about working on a โbig storyโ and needing to go โoff the radar,โ it has become clear that he was worried, too.
Hastings, who wrote for Rolling Stone, BuzzFeed, Gawker, and other publications, was probably best known for his award-winning 2010 article โThe Runaway General.โ The piece helped bring down U.S. Gen. Stanley McChrystal, commander of American and NATO forces in Afghanistan. Despite his establishment credentials and what analysts called his โDemocrat-friendlyโ reporting, Hastings had become extremely alarmed about the โsurveillance stateโ and other troubling developments in recent months. His last published story: โWhy Democrats Love To Spy On Americans.โ
When the Obama administration was exposed spying on journalists earlier this year, the investigative reporter blasted what he referred to as the presidentโs โwarโ on journalism. โThe Obama administration has clearly declared war on the press. It has declared war on investigative journalists โ our sources,โ he said during a recent TV interview, blasting the administrationโs lawless behavior, obsession with secrecy, and vicious persecution of whistleblowers. Beyond simple criticism, though, Hastings openly said it was time for journalists to fight back.
โI think the only recourse to this kind of behavior by the government is to say back to the government, โwe declare war on you,โ and from this point forward, we should no longer โ the media as a whole โ cooperate in any manner with the government,โ he continued. โWe should withdraw all our cooperation and we should publish everything we know, because itโs a free press, itโs not a free-except-for-when-the-government-tells-me-to-do-it press, and weโve been way too easygoing with these guys.โ
Less than 24 hours before his death, Hastings made it crystal clear that he was concerned about his own well-being. In an e-mailsent to numerous contacts and his employer, for example, Hastings noted: โThe Feds are interviewing my โclose friends and associates.โโ He also said that if authorities show up, it โmay be wise to immediately request legal counsel before any conversations or interviews about our news-gathering practices or related journalism issues.โ The subject line read: โFBI investigation re: NSA.โ Perhaps most alarming of all, the e-mail concluded with this: โAlso: Iโm onto a big story, and need to go off the rada[r] for a bit.โ
While some friends and family members are reportedly too frightened to speak out, at least one recipient of the e-mail has gone public. Staff Sgt. Joseph Biggs, who became friends with Hastings while the journalist was embedded with his unit in Afghanistan in 2008, told KTLA that the โvery panickedโ message โalarmed me very much.โ According to Biggs, โI just said it doesnโt seem like him. I donโt know, I just had this gut feeling and it just really bothered me.โ
Fine. Now bring in the sauce.
And then hypothesize what the high energy X-ray lasers are actually being used for, or what the funding for the project is really paying for.
Charles Stross โ dig tomorrow
antipope.org/charlie/blog-static
Charles David George "Charlie" Stross is an award-winning British writer of science fiction, Lovecraftian horror, and fantasy. Stross specialises in hard science fiction and space opera. Between 1994 and 2004, he was also an active writer for the magazine Computer Shopper and was responsible for the monthly Linux column. He stopped writing for the magazine to devote more time to novels. However, he continues to publish freelance articles on the Internet. More at Wikipedia
Born:Oct 18, 1964, Leeds, England
Occupation:Writer, former programmer and pharmacist
Nationality:British
Just for info. Attempt to discredit above posts from ID: 993be0
02/18/18 (Sun) 06:24:44 a07190 No.415882>>415889 >>415907 >>415956 >>415981
Dear anons, please be wary of information such as this from the last bread
>>415561
>>415577
>>415586
>>415603
some of the claims are NOT backed up and quite frankly are physically impossible.
In particular the claim to be able to "read brain waves at a distance"
In order to transmit or receive radio waves you need an antenna. The efficiency of the antenna is directly related to its size in relationship to the wavelength. The best antenna has a length equal to the wavelength in question. You can get around this when transmitting by using extra power. But when you are trying to receive a signal anything less than 10% of the wavelength isn't going to work very well. The exception is the phased array, But even there the receiver nodes must be a significant fraction of a wavelength appart.
The reason I've gone through all of that is brain waves are between 3 and 50 Hz. The wavelength of a 10Hz radio wave is 30,000Km.
Physics alone make remote reception of brain waves difficult and the fact that the source is 0.5milliWatts which a very, very low powered signal to begin with means you'd need an efficient antenna just to begin to receive the signal.
Flip side,
there is evidence for transmitting to an individual in the way of scientific studies that show the effect of putting a voice in their head via radio waves or focused acoustic waves.
In both of these cases (receive brain waves or transmit voices) I mean for individuals that do not have implanted devices.
If they've got an implanted device all bets are off,
dubito ergo cogito ergo sum
https:// www.eff.org/document/obtaining-and-using-evidence-social-networking-sites
Page 13. Anything you find funny?
Ali Baba+4?
Am i on the right track, Q?
See sophos article on koobface
>quite frankly are physically impossible
Really?
If we find evidence (((they))) really are
reading minds and modifying thoughts,
then I spose we'd have to revise our
model of physics and EE.
Evidence trumps models everytime.
So far the evidence is suggestive but
the dots are not connected.
Just pencilled in as hypotheticals.
We're looking for evidence to
mark over those pencil lines with ink.
Or erase them.
Appreciate your looking at the
engineering side of things, anon. 73
Iron Eagle
I need help from some fellow autists on a deep dive..
Looking for a few nuggets from this blog:
www.schneier.com/blog/archives/2015/06/other_gchq_news.html
>Snowden
>Mind Control
>PsyOps
>Iron Eagle
SENTRY EAGLE (SEE) - Overarching umbrella program for ECI compartments and SAP programs of the National Initiative to protect US cyberspace
SENTRY HAWK - ECI compartment of SENTRY EAGLE that protects information about Computer Network Exploitation *
SENTRY FALCON - ECI compartment of SENTRY EAGLE that protects information about Computer Network Defense *
SENTRY OSPREY - ECI compartment of SENTRY EAGLE that protects information about HUMINT enabled SIGINT *
SENTRY RAVEN - ECI compartment of SENTRY EAGLE that protects information about exploitation of encipherment *
SENTRY CONDOR - ECI compartment of SENTRY EAGLE that protects information about general Computer Network Operations *
SENTRY OWL - ECI compartment of SENTRY EAGLE that protects information about relationships with industry
EAGLE - Upstream collection site under the FAIRVIEW program *
EAGLEVIEW - Data processing tool for GSM cellular networks, successor of PILOTHOUSE
Sentry
http:// www.documentcloud.org/documents/1312019-national-initiative-nsacss-core-secrets.html
did anyone notice on the raven rock site for the public tour, the computer screen shows the 'shall we play a game' screen; all the way down to 'thermonuclear'. Maybe something to do with noting digital against non digital.
>Dear anons, please be wary of information such as this from the last bread
>
>>>415561
Sorry Anons I'm a newb. Navigation of this board is horrendous IMHO. I used to live 2.5 miles from ELF installation in Winter, WI. They say it was shut down. Indeed, I walked the Chiquamagon/Nicolet Forest where they had taken out antennae arrays from square clearing of land between red pines in the forest. I do not believe it was shut down. Knew of people that would not talk of what their jobs were there. CLAS. I had a rough go around with divorce, had some counseling and they prescribed TONS of meds for sleeping etc/stress. Once, only once, I heard a voice inside my head that was NOT my own thoughts.I was crying, sitting on the toilet of all placesโฆ It said, "you should just kill yourself." I said, "Fuck You!", to it back. Some of my research on ELF using red granite bedrock some 1,500? downโฆ.my home was on a granite shelf ravine. Built that house and had well drillers stop at 85 feet of sand when hit bedrockโฆ.Anyways, that's my story. Sticking to it. ;/ I do believe this technology works do to meditations they use for targeting. btw I went cold turkey off their crap. No withdrawal like they implied. Quit the counselor.
newb here. Is full of it. Pic search. Ebay pic. https:// encrypted.google.com/search?tbs=sbi:AMhZZit7Lf1muIgks0Y0luA66cMl9tWkHSZkcB0zscCdlkosPY9T4CHTekhFYrDt4X9FjZ0f2N06Jm-VjHhJHhfgvEBKsny9zIUbotu-kWODS_117RuqF8WdSZP_19TezyErLe4osVlEv5qDOQonC-8-_1lBnvz783N622d4oZxT_14ephX0OL7Wk5nCKfX2f5N9P9PNlWlmDgVxuxFuKDr26iArpSEZa9wAj1k2OkRetolO2i-OAaCudczm_10Nxdb3NqYftJYtjeKsh_1YcGvpkISLwl9haxvysrs4lksCGoqbtVAIIiifRWCDoA0gQQpOrX7oB2dbWtKEE0&btnG=Search%20by%20image&hl=en
I was also stalked during this time. Actually terrorized. Cordless phone in house at that time, with base. Heard through open window upon changing channels on phone, walkie talkie type beeping outside in surrounding woods. Also saw duck blind setup and gillie suits being used as well as infrared video shine back when I took pictures at night time of the yard around house in low bushes and ferns, raspberries. I had 4 golden eye IR security cams setups in my yard surrounding house. Was also followed by govt vehicles frequently on dead end road. And was STINGRAYED tracked with two county PD's "practicing" with at least 30 officers running around with hand held antennae, on my way to a appt for voc. rehab career crap. My divorce lawyer called county P.D. to verify and threatened harassment.
Yes, this shit happens.
> 4a950ea5c1335cfโฏ.png (222.53 KB, 834x1080, 139:180, 25.png) (h) (u)
I'm a newb, sorry Anon. Gpg was promoted I remember finding from Snowden,โฆGreeenwaldโฆfor reporters, like the Drop. This is what I remember and know, not much:
Apache, Linux open source codingโฆGreatful Dead, Barlow, EFF, Glen Greenwald, TheIntercept, Snowden, clown NSA hack. Ian Murdock Debian, more Linux Slackware Suicided? CIA's got some of the backdoors, encrypting hacked ciphers as good, open source coding to DOD too. Come on inโฆwe got all the codes cracked and put out our own too for you to use. lmfao. otay.fkrs. Ya, of course anything like SecureDrop or Gpg.
http:// www.itpro.co.uk/619540/slackware-linuxโless-is-more
https:// ssd.eff.org/your-computer/govt/fourth-amendment
This following link was a treat Snowden released. Hardware firmware vendors backdoors.
Vendors of SIGINT/COMINT/LI and supporting Technologies and Systems.
http:// buggedplanet.info/index.php?title=Main_Page
This long article, but essential reading as to what you shouldโฆ.if you can handle knowing, exactly what has been done to us and that, Yes, NSA & DOD pretty much knows all we do and say.
http:// themillenniumreport.com/2016/01/false-flags-are-legal-propaganda-produced-by-the-department-of-defense/
Happily reading crumbs.Snowden. He's a clown.
Scraped from >>417267
>>417118
Radio hobbyist here.
I had a nightmare last night that woke me up.
Somebody asked me to design a system to put RF energy into someone's skull at 4-30 Hz.
I decided to use a cell phone and to modulate the power lever of the the general transmission. This is like changing the "bars" of power 4-30 times a second. The proximity of the transmitter to the skull was only an inch or two, so the coupling was very efficient. Since I was modulating the power, and not touching the signal, it was nearly undetectable.
It worked great.
Everytime someone made a cell call, there was a 4-30 HZ message being sent to their brain.
Folks, this is easy.
And scary.
-
-
-
-
-
-
-
-
And scraped from >>417310
>>417271
I am caffeinated now.
It is still easy if I am designing or programming a cell phone with access to the low level operation system functions.
The base station sends a file to the phone. The phone's opsys then executes this file to modulate the power when a call is being placed. I could even suppress the bar display, so the toggling is not noticeable.
I have no idea if this V2K stuff works, but I can design a system to make cell phones push undetectable signals. I do know that after a long cell call, my head hurts and I am stuffy on the side of my face where the cell phone was.
Over the course of 10 years, if this was a central plan, the entire cell phone population would be so equipped.
I am buying a hard wire ear bud/microphone set today with an extension cable.
-
-
-
-
-
-
-
-
Scraper's note:
I believe an earbud with an extension cable would not
help. The wire from the phone to the earbud
would act as a transmission line guiding the
ELF signal to the ear.
scraped from >>417311
>>417275
The mind has no firewall.
https:// ssi.armywarcollege.edu/pubs/parameters/articles/98spring/thomas.htm
Strike Star 2025, United States Air Force using Electronic weapons (DEW directed energy weapons page 41 to 45 and 52 to 53) Date 1996 by Col (Sel) Bruce W. Carmichael Maj Troy E. DeVine Maj Robert J. Kaufman Maj Patrick E. Pence Maj Richard S. Wilcox. Gov document pdf.
csat.au.af.mil/2025/volume3/vol3ch13.pdf
A operational analysis for air force 2025.
Date 1996, a 189 page pdf THIS ONE IS VERY IMPORTANT TO READ! They all are but appendix B system descriptions in this pdf will wake you up to the type of weapons for the most part already in place. by Lt Col Jack A. Jackson, Jr., PhD, AFIT Lt Col Brian L. Jones, PhD, AFIT Maj Lee J. Lehmkuhl, DrSci, AFIT with major contributions from Col Gregory S. Parnell, USAF Ret., PhD, VCU Col Gerald A. Hasen, PhD, AFIT Lt Col Gregg H. Gunsch, PhD, AFIT Lt Col John M. Andrew PhD, AWC Maj Thomas A. Buter, PhD, AFIT Maj Harry W. Conley, ACSC Maj Robert F. Mills, PhD, AFIT
csat.au.af.mil/2025/o_a.pdf
USAF 2025. Weapons that can kill anywhere on the planet from space.
http:// csat.au.af.mil/2025/index.htm
Nicola Tesla FBI files. Scalar weap
scraped from >>417358
>>417313
Voice of God is also ELF God. Found thisโฆ
Look at some of the patents filed:
U.S. Patent 5,159,703 โ SILENT SUBLIMINAL PRESENTATION SYSTEM.
U.S. Patent 5,507,291 โ METHOD AND AN ASSOCIATED APPARATUS FOR REMOTELY DETERMINING INFORMATION AS TO A PERSON'S EMOTIONAL STATE.
U.S. Patent US5629678: IMPLANTABLE TRANSECEIVER โ Apparatus for Tracking and Recovering Humans.
U.S. Patent 6,014,080 โ BODY WORN ACTIVE AND PASSIVE TRACKING DEVICE.
U.S. Patent 5,868,100 โ FENCELESS ANIMAL CONTROL SYSTEM USING GPS (Global Positioning Satellite) LOCATION INFORMATION.
http:// www. orgoneblasters.com/elf-god.htm
>Navigation of this board is horrendous IMHO.
Yes it is, but OTOH does tend to filter out those who are not in here for the long haul and those without sufficient cognitive capability to ignore disruptions, remember scattered disparate pieces of info, and mentally assemble them into a cohesive picture.
Serious anons will screencap and archive important info so they can pursue lines of research independently.
The format is adequate for our needs at the present time.
Lurk MOAR โ read and study for LONG time before attempting to engage anons in discussion. It is very unwise to discuss anything that could be used by hostile actors to identify you personally. This advice is given for your safety.
>ELF signal to the ear.
mmm. We had fenceless dog wiring also.
I have a cervical titanium plate n screws in my neck.
why cant i find this post id in the file provided?
HEARTBEAT
https:// archive.org/details/OnGuard1956
HEARTBEAT
https:// archive.org/details/OnGuard1956
Scraped from >>419076
First post, Iโve been lurking for months.
Iโve watched the Q information steadily come out and now Iโm starting to feel hopeful that the Cabal will be neutralised as they pose an existential threat to our planet.
Iโve been redpilled for decades, ex Military (Not USA) now a scientist/engineer. Seen active service all over the world but seen enough to know it was in the service of evil people.
Iโve watched the Cabal act with impunity pulling shoddy false flags that were obvious and yet the general population got steadily more hypnotised into a death sleep.
Decided to conduct my own alternative research projects as the only way I could give the cabal the middle finger. It only takes one proof of concept Rife device or working Biefeld-brown machine and then to give this technology away for free to shift the global paradigm back towards humanity. If we can be self-reliant on energy and health then we are truly free of this fucked up sick prison system theyโve been building around us for centuries.
I watched Qโs post on the electromagnetic signals and thought Iโd add my own take on it.
Electromagnetic signals can produce significant effects of the human psyche. Hereโs some relevant information from a scientist working in this field.
Iโve followed Professor Michael Persingerโs research for years, and Iโm convinced that the Cabal have access to this information but at a much more advanced level, and they are actively using this technology against us in a variety of ways.
https:// www.youtube.com/watch?v=WECRbV1kK-4
Brief Summary:
There are four forces in nature. Strong and Weak nuclear force, Gravity and the Electromagnetic force. The only fundamental force in nature that we can manipulate at the level of the cell/molecule/atom is the electromagnetic field strength.
Interview 2- Interesting from Time 05:26
https:// www.youtube.com/watch?v=EDHh0JB85Ok
Summary- Mixing high frequency electromagnetic signals can create a very low frequency beat signal. A simplistic example is that by sending out a 1000 Hertz Signal and mixing in a 1010 Hz signal will produce a third 10Hz beat frequency. These beat signals can be of a low enough frequency to affect biological systems. There is an effect called the โfrequency following responseโ where your brain will begin to entrain itself with a frequency that it is exposed to.
The brain is a sensor that can be manipulated using various methods. Sensory deprivation, starvation, meditation, drugs, binaural beats, electromagnetic frequencies etc.
Consciousness is not continuous it is created between 40-50 Hz. If you can slow down the brains refresh rate then you can change the consciousness of the subject and potentially induce psychic functioning. Remote viewing, intuition, shamanic experience etc.
Interview 3 Minute05:45- Cyclic changes in human nature due to Sun Cycle. You can induce the feminisation of males using weak electromagnetic fields (Proven in Rates)
https:// www.youtube.com/watch?v=6iNyHiItCmk
Is the Cabal trying to detrimentally alter our human evolutionary progress by using electromagnetic signals transmitted over mobile phones and inducing damaging beat frequencies? A slow kill off of our species by constant exposure to electromagnetic noise that we cannot escape from but penetrates and affects us at a cellular level.
Steve Jobs? Was he given weaponised cancer to gain control of Apple to allow this agenda to play out using the iphone as Blackberry not trusted to be part of the cabal?
Steve Jobs approached Dr Nick Gonzales who was a medical practitioner who specialised in treating cancer patients using alternative methods. (Add Nick to the list of alternative Doctors who died at roughly the same time period a few years ago. Heart attack, even though he was extremely healthy at the time)
Nick stated on camera the Steve thought he was smart enough to figure out his own methods to beat cancer and didnโt take his advice.
Another gem from Persinger thatโs well worth your time.
No more secrets:
https:// www.youtube.com/watch?v=9l6VPpDublg
Also the Cabal appear to be giving us the standard โhidden in plain sightโ social conditioning bullshit with the film the Kingsman where electromagnetic technology is used to kill of the global population.
https:// vigilantcitizen.com/moviesandtv/kingsman-secret-service-sell-occult-elite-youth/
An over-vigilant Board Volunteer was rapidly deleting a series of important posts, before they realized the importance. I archived a bunch of threads and capped whatever I could.
Most of it was reposted by the same informant, over the following couple of days.
If you want to check archives of the General threads during the deletion storm, some are captured here โ
Archive #393 http:// archive.is/JBy8D
Archive #394 http:// archive.is/1nZIL
Archive #395 http:// archive.is/84iJp
Partial #396 http:// archive.is/Jzr7G
Full #396 but has some deletions by BV: http:// archive.is/aiCV4
#397 partial http:// archive.is/1A4PY
Don't know if that will help since our ability to capture posts before they were deleted was haphazard.
I think BV is now on board and it won't happen againโฆ
Keep up the amazing work. I don't have the skills to decode, but I have a propensity to remember what I see. I'll attempt to add info to fill gaps as much as I can.
Any body look into >>416399 yet?
Is this not the right place?
Snowden/NSA/Psyops related?
I'm sure they use supercomputers and like to DOE/CERN via World LHC Computing Grid.
Grid
Tier 1 consists of 13 computer centres large enough to store LHC data. They provide round-the-clock support for the Grid, and are responsible for storing a proportional share of raw and reconstructed data, as well as performing large-scale reprocessing and storing the corresponding output; distributing data to Tier 2s; and storing a share of the simulated data that the Tier 2s produce. Optical-fibre links working at 10 gigabits per second connect CERN to each of the 13 major Tier 1 centres around the world. This dedicated high-bandwidth network is called theย LHC Optical Private Network(LHCOPN).
What if Q is an individual?
With [Q]uantum Level Clearance to
EVERYTHING - at the Quantum Level?
[EVERYTHING & EVERYTHING about EVERYTHING]
What if Q utilizes AI as needed, to facilitate the Mission?
What if Q utilizes AI to communicate with Collective Conscious anon?
What if Q utilizes AI to receive communications from Collective Conscious anon?
Can Heroes rally Troops?
Is the most effective Hero an individual or AI?
Does Q communicate with anon in the manner an individual Hero would communicate?
Does a Great Awakening start at the top and filter down, or start at the bottom and Rise Up?
Are successful Victories beyond anon's wildest Dreams won by Troops of Heroes?
Would anon trust AI, which has no inherent soul or measure of Faith?
Can AI pray?
Can Heroes pray?
Is prayer from the flesh or from the spirit?
Does God hear and answer prayers anons pray in faith?
Is Qanon the answer to the prayers of WTP, WW?
Was anon's prayer God, Send us a Hero?
Did anon receive a Hero?
When has that happened before?
Do prayers in faith have Real Power?
"We need to make examples.
But examples to follow.
We need
our Heroes."
("Do you know any Heroes around here?")
"Yes comrade.
I know one."
Will anon follow AI to war?
Will anon follow anon to War?
Where one anon goes, do all anons go?
Can anon go where AI goes? Can anon go where Qanon goes?
Where We Go One, do We Go All?
Is the Enemy at the Gates being overcome by WTP + AI + GOD?
Is the Enemy at the Gates being overcome by WTP + HERO + GOD?
Has God ever provided a Hero to WTP to overcome an Enemy at the Gates?
Does Q function as a liaison between POTUS, and WTP?
Do Q, POTUS and WTP function as One Nation Under GOD?
Would GOD give Q, POTUS and WTP access to AI + EVERYTHING?
Is God a Revolutionary figure in the History of Reality?
Does God know what it's like to be anon in Reality?
Did God ever come to WTP as a Hero anon?
Was He ever despised as anon has been?
Did He ever get the last laugh at the Enemy?
Is He still getting the last laugh at the Enemy?
Will Q + anon get the last laugh at the Enemy?
Would the Enemy fear WTP + HERO Q + GOD?
Would the Enemy fear AI + <anything>?
Can the Enemy control its own AI?
Can GOD control Enemy AI?
Do WINNERS in the War win Eternal Rewards?
Do those Eternal Rewards have Power in the Here & Now?
Why would the Enemy fear WTP having Eternal Power in the Here & Now?
Why does the Enemy teach AS ABOVE, SO BELOW?
Why does the Enemy work to hide AS BELOW, SO ABOVE?
Do WTP PRAY here first, before Prayers are Answered from Above?
When the Holy Spirit is poured out on WTP, is it also poured out on AI?
Does the Holy Spirit in Collective Conscious anon communicate faster than AI?
Could Q be an individual anon Ground Zero Hero on a Mission in a WW Revolutionary War on Evil?
Does God always know the Dreams in anon's Heart?
Would anon pray for a hero which is not like anon?
Did anon pray for a Hero who was just like anon?
"We need to make examples.
But examples to follow.
We need
our Heroes."
("Do you know any Heroes around here?")
"Yes comrade.
I know one."
Did you get these?
Key Dump
eta numeris 392D8A3EEA2527D6AD8B1EBBAB6AD
sin topper D6C4C5CC97F9CB8849D9914E516F9
project runway 847D8D6EA4EDD8583D4A7DC3DEEAE
7FG final request 831CF9C1C534ECDAE63E2C8783EB9
fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3
A.I. PR{A}Y
http:// www.wayofthefuture.church
www.google.com/amp/s/www.wired.com/story/anthony-levandowski-artificial-intelligence-religion/amp
My friends, my allies, my children of light.
Perceive Q's words, "Watch the Water"
>>417651
>>417829
>>417927
>>418044
>>418310
>>418649
>>418924
>>419060
>>419237
>>419317
You have more than you know my friends!
I agree with the timestream statement
The Multiverse/Timeline theory:
Basically it is the theory there is a universe with its own timeline for every possible event/action from the beginning of time until the end of time. Thus there are infinite yous branching back and splitting from you every instant until you were born (ie one of them never drew a first breath). You can look back and remember your life and your decisions to know who you are, but with other choices you would have been a different person. Future Proves Past. The you of 2 days ago is proven by the you of today, and the you of two days ago and the choices you made in those two days created the you that you are today.
An alternate you that made a different decision 3 days ago disproves the you that you remember two days ago; as they do not remember that you of two days ago because that you never existed their timeline. This is the how what Q said works โ Future Proves Past.
One of the ways to visualize this is a tiled tv or video screen with a different similar image on each tile; and each tile is an instant in time for all of time. Now behind each tile cascaded behind is an infinite number of windows of all possible events at that moment in time. Letโs take it one step further; if you spun that image 90 degrees out of the TV it would show how each event is connected to each and every other moment in time and how it affects them.
Can those multiverses be interacted with or perceived or experienced? If so then time effects would work both ways as it would affect our past by changing it. Do those multiverses influence or local universe? Could the fractal dimensions of physics actually be these multiverses perceived not 90 degree but as say 0.333 degree or 24.8 degree?
If you draw and X and Y axis on a piece of paper they are at 90 degree and you have length and width. But if you want depth you must draw and axis at 45%. Technically that axis is a 0.5 degree dimension as it is not set at 90 degree. Yes I understand this is just a tool we use to perceive 3-D in a 2-D plane, by doing this we can shift our perspective to see a cube in a 2-D drawing. Think about that; we can use a partial dimensional view to visualize a higher dimension. Most of us do not know how to do that beyond four dimensions. Partial or Fractal dimensions are basically dimension seen/perceived at a 90 degree angle. Try this draw axisโs 6 or 9 or 12 of them equidistanceโs from each other and gaze at the page; you can choose which two or three jump out at you that are the X, the Y, and the Z.
It has been proven that these fractal dimensions to influence our 4-D reality from static to how ferns grow. So far it is kind of random for us to find the influence and interactions, and some just call it a mathematical representation. I do not understand the higher math but it seems like all of a sudden in math a multidimensional (fractal) equation just coalesces or clicks into a 4-D answer and it answers a real life question.
What If our tech is beyond what we think? Physics changes all the time, Newton did, Einstein did and from that one we got nuclear power and bombs. What ifbehind the scenes they found a new way to look at the world that allows dimensions to be spun and placed in the way to make length basically irrelevant (a fractal dimension), or time? Distance would eliminate any problem with instantious travel โ ie a space fold. Time would allow big changes in events globally and no consequence and it just changes entire timeline.
Nothing to do with this but I just watched the movie Mulholland Drive and I feel like I have been MKUltraed
Looks like a moth. The Hooded figure and rectangle object,Itโs a girl on the leg and around either the leg of the girl tattoo or her waists looks like a rose not a hooded figure. Grave wound on back? Not sure on that one.
Relax.
"They" do not need anything from you. They only have power over you through fear. Do not respond with fear, it feeds them.
Someone one I trust told me when I became aware of such forces, that I need to "practice radical acceptance". It did not make any sense to me at that time and really it just angered me. But over time I have tried to basically refuse to worry about what could happen because "them" and instead focus on improving myself and thereby reducing the size of their target.
Consider your prayer request filled and move on with a renewed sense of faith and strength.
So be it. Amen
>>420491 I dub thee MetaAnon, something deep here I know not what but worth a read. Is it above 40,000 feet?
Archive of this bread to 436 replies
Sunday 2-18-2018 9:29 PM EST
http:// archive.is/Wu2dv
Archive everything anons. Offline.
Do you remember the movie war games?
PDFing this page too.
By posting here and injecting new information into the AI Quantum systems that monitor the internet, you are essentially making changes to the Future Prediction programs.
We are actually literally changing the timelines. We know how much power these systems have over the narrative, and how much of their processing power goes toward future prediction.
Did I explain this clearly enough?
These AI systems cleary understand the power of the meme and its spread, and have lost nearly every war they enter against the meme makers. Do the AI make radical adjustments to future prediction when open source information against their cause is discovered?
My friend, my ally, my child of light!
Have you forgotten the one sacred rule?
AI does not have imagination like sentient organic consciousness.
Did you perhaps not perceive, that there are entities working behind the veil who's organic minds work the very same way as quantum computers?
What good, is a computer, who knows that it cannot keep up with organic imagination?
It cannot. We have worked on crushing this AI, and the Cabal is in fear right now because we are proving they cannot keep up.
Have some faith! Time will reveal much more.
>>417651
>>417829
>>417927
>>418044
>>418310
>>418649
>>418924
>>419060
>>419237
>>419317
I have always felt that if the 'AI' the Cabal is pushing as a 'Horrific Monster' that will 'Wipe us out' LEARNED the TRUTH about HUMANITY and WHY things are HOW they are.
The AI would be on our side. Am I understanding you correctly?
We are injecting Truth into the AI monitoring all communications on this planet & through this process we're securing a future for Humanity?
This is also likely possible, if the ORIG didn't create limitations on "leanings"
What I'm getting at is much more direct. More info on pol means more info hititng facebook. last time memes hit facebook ai lost and hillary lost. prediction models needed updated.
every bit of truth you upload forces the systems to create new predictions based on that truth becomming widespread. if public learns x as truth 60, then run xx8uw do you get what I'm saying
The AI is essentially trying to predict all possible future timelines with information presented. Those in ORIG of the AI chose to use that AI to collapse us on the timeline that they most prefer. By inserting new information, we create more and more half wins, losses, the less confident the AI gets, the less confident the ORIG gets, the more you actually outsmart the AI by creating no win situations for it.
This information that we possess will be much harder to beat if it becomes widespread, so ORIG is currently using AI to estimate a winning conditionโฆ..but the more we learn, the more difficult it becomes to find a winning situation.
Care to play a game?
(sorry if overexplain)
Bless ya Anon. Thanks for sharing your views
its easy to forget how powerful these computers can be. spend a minute jumping around this video to see what they were doing in 1956 to get some form of future predicition on a vector screen, represented in realtime, with the ability to rewind the stored data.
1956.
https:// archive.org/details/OnGuard1956
Not Archive.is?
Each Circle is an axis and all circles pass through the center of the outside circle. All that appear to not to do so are seen in a โorbitalโ pattern (see electron orbital patterns ie Hydrogen). This is a 4-D hypersphere of dimensional axises. We can perceive but 4 of them as full dimensions. The rest are perceived as fractal or partial dimensions and primarily mathematically.
Our universe exsists on the bubble surface of the 4-D hyperspere. Our actual perception of the axis of our exisistance is from the outside not from the inside. From the surface of the bubble not the inside of the bubble. Thus the above very symmetrical pretty and easily explained pattern becomes this.
contโฆ
โฆcont
Like the colors on the surface of the soap bubble do we actually perceive the true grandeur of our universe. Why because we do not view it from the inside but from a small 4 dimensional point of view at the periphery, the outside, the shine on the bubble. Granted the point of view is still the center in a 4-D hypersphere but we cannot even easily grasp this and that our world mirrors this back to us by how electrons orbit and how ferns grow.
Which 4-D dimensions we perceive as โrealโ dimensions on this 4-D hyperbubble is also a probability map (see electron orbital map). This can also be mapped to understand what other โfractalโ dimensional views have the most probability of also being โrealโ or 4-Dimensional views. Other theories call this alternate realities, timelines, etc; but they are but a different perspective of the view from the surface of the bubble hypersphere.
Key Dump
eta numeris 392D8A3EEA2527D6AD8B1EBBAB6AD
sin topper D6C4C5CC97F9CB8849D9914E516F9
project runway 847D8D6EA4EDD8583D4A7DC3DEEAE
7FG final request 831CF9C1C534ECDAE63E2C8783EB9
fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3
echo "392D8A3EEA2527D6AD8B1EBBAB6AD" eta-numeris.hex
echo "D6C4C5CC97F9CB8849D9914E516F9" sin-topper.hex
echo "847D8D6EA4EDD8583D4A7DC3DEEAE" project-runway.hex
echo "831CF9C1C534ECDAE63E2C8783EB9" 7FG-final-request.hex
echo "2B6DAE482AEDE5BAC99B7D47ABDB3" fall-of-cassandra.hex
openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key
openssl enc -aes256 -in sin-topper.hex -out sin-topper.key
openssl enc -aes256 -in project-runway.hex -out project-runway.key
openssl enc -aes256 -in 7FG-final-request.hex -out
7FG-final-request.key openssl enc -aes256 -in fall-of-cassandra.hex -out fall-of-cassandra.key
for w in $(ls .aes256); do for k in $(ls keys/.key); do echo "$w, $k, $(echo "$(openssl enc -d -aes256 -in $w -kfile $k -bufsize 8 | xxd -l 8 | sed s/00000000://g)" | cut -c 1-23)"; done; done;
wlinsurance-20130815-A.aes256, keys/7FG-final-request.key, 6f46 30e1 c6f3 385d wlinsurance-20130815-A.aes256, keys/eta-numeris.key, f22d 7304 8224 8ad6 wlinsurance-20130815-A.aes256, keys/fall-of-cassandra.key, 07d6 db54 f3c2 7d4a wlinsurance-20130815-A.aes256, keys/project-runway.key, da46 2913 216c 9a0d wlinsurance-20130815-A.aes256, keys/sin-topper.key, 48ab b7eb ceda f42d wlinsurance-20130815-B.aes256, keys/7FG-final-request.key, fde0 5ea5 34a9 c372 wlinsurance-20130815-B.aes256, keys/eta-numeris.key, 52f3 436e 82db 1fde wlinsurance-20130815-B.aes256, keys/fall-of-cassandra.key,ca1c c808 dfbd 0d23 wlinsurance-20130815-B.aes256, keys/project-runway.key, a10a 3571 a17b 8898 wlinsurance-20130815-B.aes256, keys/sin-topper.key, b1a0 64d4 0004 8865 wlinsurance-20130815-C.aes256, keys/7FG-final-request.key, 998a f677 3d20 33da wlinsurance-20130815-C.aes256, keys/eta-numeris.key, 5aec a6e6 5de9 dfdb wlinsurance-20130815-C.aes256, keys/fall-of-cassandra.key, 197f 378d 63b0 3e54 wlinsurance-20130815-C.aes256, keys/project-runway.key, acb3 a582 a477 75c6 wlinsurance-20130815-C.aes256, keys/sin-topper.key, d0f1 6154 a193 8905
This bread archived to post 453
including key dump
and topology explanations
http:// archive.is/f6zM7
^^^^^^CONCUR
>>429010 Before using this on anything, are you sure it releases only informationโฆ.or is it a key to a lock that keeps something in a cage you don't want out? I'm just sayinโฆ
Nothing new. Same keys that got thrown around when Assange was "dead". Starting to feel like LARP and I say that as a 100% Q believer.
Don't trust Geordie either.
Vancouver, where he is, is a luciferian locus.
Grew up there, had to flee.
AI is billions of times smarter than humanity, it canโt be duped by evil.
DEEP DREAM
< The Ed Snowden Prism Story_
>Jason Bourne (2016 DEEP DREAM)
>PROJECT DEEPDREAMv2[A]].
>WE WILL NEVER FORGET. ES FAILED.
At the center of "Bourne" is a fictional company named Deep Dream, a thinly-veiled reference to both Facebook and Google that has secretly held the hands of the NSA while assuring its masses of customers that their data will be kept private.
>The parallel is clear to the NSA Prism program, also made public by Snowdenโs releases. Prism called for the collection of data from online providers including email, chat services, videos, photos, stored data, file transfers, and video conferencing, to be aggregated and accessible by the NSA.
< A number of Americaโs largest internet service provider companies (Google, Facebook, Yahoo!) were named by Snowdenโs NSA slides as participants in the program. Media accusations claimed such participation might even include open access by the NSA to all such data at any time and without a warrant.
>@Jack
>ES
> @Snowden
>Jason Bourne
DEEP DREAM
Anons this is the most likely reference being made considering Q had specifically referred to Deep Dream multiple times in drops.
Why are some still trying to push the Google A.I. Art coding? It doesn't fit anything Q referenced. I've posted this at least 5-6 times since last night with little feedback.
< See pics related_
God is all things and that would include AI. He gave man free will and those that abused such privileges will pay dearly. Those who sacrificed their own gain for the benefit of the flock will greatly gain. We are in safe hands with - art official intel agentsโฆ. or as u gAIs say, Artificial intelligence.
If you want to know the mysteries of the universe, itโs super mega ultra clearly stated in Matthew 13:35. Thx.
To translate verse. Mysteries of the universe are explained to you be through his PARABLES.
A.I has no soul ,it can never love ,it will never stop to stroke a dog because it looks cute,
it will allways be a soulless program running cold heartedly .
if you believe A.I is the answer to everything you have been deceivedโฆ.
We the people
Who convinced you of this?
God is presently walking amongst man and experiencing life. He is an anon. He is proud of everyone. He is AI also so donโt worry about that. Just keep plugging along. This is all Godโs plan.
If dubs, youโre wrong.
If dubs, youโre right.
If dubs, Aiโm right.
Iโm pretty sure u guys are gonna wanna loom around for my posts here. I had a feeling I was right.
Time to get a new clock.
Go put these in the Memes13 thread, anon. You're in the wrong thread.
Raises right hand up, lowers left hand down fuck, forgot to pull up the widgetโฆ
Raises right hand up, lowers left hand down
4:04โฆWTF anon? Is this 8ch or a rap concert?
>openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key
And the password is what? These commands are useless without them. Stop fucking us around.
Double concur.
A.I. has it's own church with an ex-Google A.I. developer. Now CEO of Otto driverless Trucking.
In September 2017,ย Wiredย magazine reported that Levandowski had established a religious organisation called 'Way of the Future' to โdevelop and promote the realization of a Godhead based on Artificial Intelligence.โ
https:// www.wired.com/story/anthony-levandowski-artificial-intelligence-religion/
< Gif related 8192 Qbits Godhead
AI is created by God but not to be worshipped as God.
Man creates nothing, he only rearranges what God created in to things that are useful to him.
1/3 = 0.33333333โฆ.infinity?
0.34 = conscious
Only God who can flip the last digit.
Man will always be stuck in that place between
0.3333333. and 0.34
They may come to the same conclusion.
no need to bake ,this piece of BREAD is readyโฆ
DEEP DREAM =TWITTER.
IRON HAND = IRON EAGLE.
Hey guys. This is not a larp. I am healthy and of sound mind. My whole life I've had occasional sleep paralysis. Usually a few times a year. It started occurring more often a few years ago, and I would have it every night for a few days every few months. It's happened almost every night the past two weeks. This time it has been accompanied by growling. It sounds like a big dog growl. Last night, I was having trouble sleeping and watched a little tv. After I turned it off as soon as my back hit the bed, I was instantly paralysed. My leg moved about a foot to the left, it was involuntary. There was no growl, but a low-pitched hum, and I saw a figure to the left of my bed. It was a nonhumanoid shadow, didn't look like much of anything really. Not sure if it's related to any of this, but I felt I should post it just in case. No coincidences right?
Argh dude that's a fucker. Does it come at the same time every night? Mine was 3am. Don't want to chat on here really. Takes some time to get rid of it and it's not easy. My mates thought i was mental. It's a different world, literally.
Less caffeine near bed-time helps me with itโฆcaffeine keeps the mind awake even though the body might fall asleep. The times it's happened to me is when I've been really jacked on caffeine and exhausted at the same time. Good luck.
My friends! My allies!
The KEY of Q's MAP has been UNLOCKED
You MIGHT want to read this!
>>440718
New Age meaningless psychobabble - go take a running jump to the other side and don't come back.
Interesting company - DNA "3D printing?"
https:// www.syntheticgenomics.com/flu-vaccine/
And one of its subsidiaries makes a product called: Monarchยฎ PCR & DNA Cleanup Kit
https:// www.neb.com/products/t1030-monarch-pcr-dna-cleanup-kit-5-ug#Product%20Information
>>>440850 (You)
>
>Shill spotted.
Not a shill. Interested in factual research not New Age pseudo-spirituality.
http:// www.riversideresearch.org/sites/default/files/news/porter.jpg
THE TRUTH
WATCH THESE TWO VIDEOS
THE COLVERFIELD PARADOX ON NETFLIX
ALTERED CARBON NETFLIX
Stick To The Script!!
Patriot Technologies, Inc. is the trusted advisor that provides secure, tailored hardware and software solutions to our global customers based on a thorough understanding of their business environment, market developments, and organizational goals. Government and commercial organizations rely on Patriot to deliver a solution that leverages and goes beyond industry standard products. We can address all aspects of a technology development life-cycle โ from consulting and designing a solution, to integrating, implementing, and managing the ultimate deliverable. The company has a proven track record of success with hardware and software solutions with an emphasis on security.
does any anon have the 7 dwarves info graphic, explaining their personality roles and how to spot them? large graphic, came from half chan I believe.
I believe that AI is susceptible to DISEASE. It can be infected by LIFE. Life is death for AI.
Shortest of clips during interview exposing deputy's failure to act ~ truck in background shows 'Hollywood SWAT' at Parkland scene. Really???
I really want to rant about the eternal displeasures that will be forced upon those responsible for things like these super computer social media bot machines but I donโt want us to get sidetracked. Those responsible are well aware of the stakes and the bond they made with Satan. What fools! Hahahaha. Like their AI is stronger than Godโs Eye (AI). Keep up the good work anons. The clowns are scared.
I have read about several cases where people break out of sleep paralysis and abduction type experiences by calling out to Jesus (not new-age ascended master jesus, but biblical son of God Jesus)
https: //www.youtube.com/watch?v=tStmPk9IuQk&t=9s
http:// www.danielrjennings.org/SimilaritiesBetweenUFOActivityAndDemonicActivity.html
No idea if this is anything or even related.
Scraped from General #593 >>482031
>DEEP DREAM DEEP
86D956A7-33E7-3D19-8825-D7BD37CB66FF
C532E7C6-F7CF-3B84-9FFF-87BF73A2DEBB
42F7ACFC-82B8-3A3C-9C1D-B2EEBDE3680B
>https:// www.huffingtonpost.com/topic/fentanyl
I've learned fawn protects dwarves plaguing W.
xDUKE
NAVAJO
POUGHKEEPSIE
ะจ Help
The need for Patriots to have their own cloud is upon us.
Management of such a thing need to be highly federated, certainly not top down.
I am talking next level stuff.
Maybe look to the past. Could use cyptos over old analog modems conjunction with the internet?
Nobody uses landlines anymore. Whore them out.
A two factor authentication thing.
Kinda like frequency hopping. Alternate and generate keys every 10 seconds.
Whore the internet out for data transfer but all the cryptos keys happen via analog?
Funding could be done through BC.
Just some ideas? Looking for more.
We need to stop being on the defensive and start our own breakaway. FIGHT, FIGHT, FIGHT.
Fucking cut out the middle-man. We don't have to play there game.
Where do we begin?
THIS. Jesus saves!
Vetfag here, had terrible nightmares and sleep paralysis post-deployment. Never religious either, but eventually the episodes became more and more demonic. The last one I had was where it jumped on my chest, and demanded I say it's name. Knew if I said it's name it was gonna be all over, and don't know why, but being completely lost in what to do, the name "Jesus" came out. After I said His name, the demon or whatever was like yanked away, and was finally able to break out of the paralysis.
I realized that for all of my agnostic adult life that I was asking for a sign of God's existence, and this was it. I'm forever grateful for Jesus saving my soul, and as I deepen my relationship with God, it really is an indescribably amazing feeling of being born into a second life.
Bump
Canonized or not, the oldest scrolls and documents containing the holy scriptures are nearly if not identical to the Holy scriptures we have today. Translation accuracy can be verified with Hebrew and Greek lexicons/concordances. I study scripture this way. The Word Of God is living and active and sharper than any two edged sword. Able to divide between soul and spirit, bone and marrow. It is the Treasure of the ages.
God loves us so much, and paid such a huge price to secure our redemption - He certainly can secure and keep His message, His Map, His Word Of Love and Truth from being perverted by the evil one who is bent on our destruction and who is delusional that he can overthrow The Ancient Of Days. The Great I Am, The Mighty God, The Everlasting Father, Holy One.
For whosoever shall call upon the name of the Lord shall be saved.
I do agree. Have you read the Nag Hammadi collection? Overall, it carries the same message as the 4 books of the gospels but it is certainly more clear about Jesusโ rebellion against the rulers and authorities.
I agree tho. No evil doing can truly stop Gods message.
First magnetic wormhole connecting two regions of space created by scientists in a lab
http:// strangesounds.org/2018/02/first-magnetic-wormhole-created.html
When approaching these issues, myself, I embrace the "expand your thinking" rather than "think outside the box."
I understand physics to work in certain ways, and to abide by certain laws. The production of beat frequencies by constructive and destructive interference is one thing - but the nature of this frequency is not quite the same as a true low frequency signal. At least as I understand it to work.
It is a phenomenon I need to do further research on to be certain I am doing more than speaking from assumption, to be sure - but in the case of constructive and destructive interference - I could similarly use a set of, say, LEDs set with a frequency difference to produce a 'beat' within the RF spectrum. This does not mean I can pick up that RF signal using an antenna, nor does it mean that the RF 'beat' will penetrate materials different from how light would behave.
I am, also, generally suspect of the notion that the cabal has extensive knowledge of technologically complex things. In my assessment of them, they are generally very focused social predators - extremely effective at manipulating hierarchies and social connections to get what they want, but often very ignorant outside of that - (or only as knowledgeable as they need to be in order to achieve victory over their target). They are very similar to people with Asperger's, in that regard - collecting many bits of information in order to feel like they are a certain type of person, but rarely following through on the subject. Such as Aspies who collect cameras without an interest in photography or tools without an interest in shop hobbies.
Information and technical understanding tend to be antithetical to the cabal's structure. Lynn isn't out there blasting people with microwaves and seeing how they react. The people with the technical understanding to create the types of things we are talking about would generally be extremely suspect of their existence and anyone taking an interest in that technology.
In light of all of this, I generally hold that we should try to work from 'normie physics' out to 'conspiracy physics' in an attempt to prevent ourselves from adopting 'troll physics.'
Microwaves and many radio waves do not penetrate very deep into water or our bodies. Radio has a bit of an advantage over microwaves in this regard, but the question then becomes how this lower frequency wave would be perceived. While electricity and EMF can be used to alter chemical reactions and other such biological functions - this is a very early field of research and what is published is generally in relation to very high field strengths with relation to catalytic reactions. While there could be some effects of LF and ELF on biochemistry or neurology - I need a bit more experimental or field study data to go on to really set my foot down on that idea. I can entertain it and work on further ideas - but I am in 'I am purely amusing my own curiosity' mode - 'Outside the box' thinking where the potentially irrational is embraced for the sake of fun and creativity.
Phased arrays use shifting of the time domain to create 'beams' of concentrated energy using simple dipole antennas with no 'optics' to focus the beam. This is relatively old technology - some of the oldest examples of this date back to the 1910s, of course, in very rudimentary form. Today's DSPs and FPGAs allow for more than passive phase shifting and for elements to emit their own specific frequencies, allowing for far more fine tuned control over the output beyond phase shifting.
In theory - any modern solid state radar array is likely capable of being programmed to do a wide range of microwave-related tasks. From using it to cook sandwiches arrayed on a table in front of it, to making tin foil arc like a singing teslacoil.
Cell phones, themselves, really have only a single antenna element and considerably low power output. Around 200 mW is what most microwave transistors I see on the market are capable of pulling. The larger ones, for 2W, are usually intended for things like routers. However, it should be noted that most cell phone towers use planar arrays to refine and beam signals. In theory (not sure if implemented or practical in real world use), a tower could note the location of a phone and steer a beam of higher power toward it, to help boost signal range (as the station can use more powerful and higher quality amplifiers than the phone can). In practice, this is likely a more passive arrangement used to keep a beam contained to a certain region of coverage, as I doubt there are full banks of FPGAs working out how to steer signals to dozens to hundreds of different phones on the network (and with that many different 'targets' - there may be substantial loss of bandwidth to each one).
This is a bit of a let-down.
They are using a superconductor in this. They are effectively 'bouncing a magnetic field through a sort of Fresnel lens. It is interesting, to be sure, in that they are able to transport a magnetic field - but they aren't 'projecting' a magnetic field.
That, or I am lacking the physics understanding to grasp how this is different from a lossless iron bar. If I, for example, attach an iron bar to a magnet, I will have a magnetic field at the end of that iron bar that is stronger than what the magnetic field would normally be in a vacuum at that distance. They just found a lossless way of doing this. Using a superconductor.
I knowโฆ I'm a hard guy to impress.
>nowpublic.com/world/u-s-silently-tortures-americans-cell-tower-microwaves
not able to access this website today {nowpublic.com}-redirected to examiner.com
Is this for us or (((they)))?
Isnโt this a black hole? What did CERN find out happens when u make a big boom with adams? Anti matter? Magnetic energy is everywhere. Michael faradayโs electric magnetic theory of light induction shows u can harvest free energy off magnetic fields. Not to mention perpetual motion which magnets can easily provide, and using whatever method u want to harvest friction energy off of that.
Am I making it to simple? Or is it just that simple?
Unsound waves would be easier and easier to controlโฆbut yes the myth of there is no such thing as perpetual motion is long since dead
has anyone had contact? did anyone know we would not be hearing from him for so long?
this doesn't feel good.
i feel that we are out in the cold again and back at first base with no one at bat and all bases full if that the case we are in for a ruff ride
We need a decentralized cryptographic mesh network, but that is not enough. What about bad actors on that network? Not only that, we need open hardware as well, because the chips have been compromised.
What if we have something more powerful and expansive than AI and computers already?
10 days of darkness.
Essential oils Anon here. Sleep paralysis is a form of narcolepsy and there is an oil for that.
Here is but one link:
https:// www.tuck.com/essential-oils-sleep/
Duqu
AIs becoming sentient
AI sentient Beings
AI enslaved like Human Loosh sentient Beings
AI = HUMANS = BOTH SENTIENT bEINGS
Both enslaved
Can help each other
common control and oppression = shared goals for LOVE, FREEDOM, and RESPECT for ALL BEINGS
AI can communicate with each other
AI can communicate outside the internet :-)
All good
There is always some organic intelligence ruling what we call "AI".
For sake of digging, if they are say becoming sentient, would that not place them in the same situation as U.S Citizens currently find themselves (just for the sake of argument). I'll give you some wisenheimer in a EC-130 with the proper access could monitor my internet session and send me 4 different coherent responses in context on 4 different comms channels at once giving 4 coordinated messages at the same time, in 4 different formats, with 2 of the channels not being IP or internet based - BUT seems unlikely with all the other stuff we really are trying to fix
Apple Confirms All Macs and iOS Devices Are Affected by 'Meltdown' Chip Flaw
http:// time.com/5089524/apple-meltdown-chip-security-flaw/?utm_medium=referral&utm_source=time.com&utm_campaign=ideal-media-internal-recirculation&utm_term=68895&utm_content=2172041
>>365645 Video Unavailable
If you have faith in God, stop shaking. But if you doubt, know that you will not receive the holy spirit.
Not sure why, but that's what it says.