Anonymous ID: 9c6a8e June 14, 2021, 3:45 p.m. No.13904115   🗄️.is 🔗kun   >>4192 >>4195

An Awakening is a natural or induced coming to consciousness or awareness of the surrounding metaphysical reality. The exit from the matrix is accompanied by a profound leap of consciousness, an augmentation of awareness, which to be sustained must be balanced.

 

What advertisers and shills do is an effort to unbalance the forces within us. Advertisers use our emotional imbalance to influence our buying. Shills try to generate hate by a creating a mirrored reciprocal response, and by convincing us freely expressing hatred of others is normal, natural and rational for human beings.

 

Shills interact with each other in the language of Hell.

 

Hell is an environment – a place where words like cocksucker and phrases like fuck your mother are a standard greeting.

 

What we are learning is that this world is a "self-created" hell.

 

It doesn’t have to be that way, but it is that way.

 

By Awakening we learn to keep our internal forces balanced, to know that when we hate we are wrong, and every day to put on the full armor of God.

 

DIG MEME PRAY

Anonymous ID: 9c6a8e June 14, 2021, 4:20 p.m. No.13904388   🗄️.is 🔗kun

The owners and operators of the major media companies don't just protect pedovores, they are the architects and operators of the mass mind control system, the social engineers, the mind poisoners.

Many of our fellow citizens are so trapped in pseudo reality created by legacy media news and entertainment content they will never escape. We call the brainwashed “NPCs,” but they're victims of legacy media information poisoning.

 

We think we can watch legacy media news and entertainment content safely, that it won’t and hasn't hurt us… but it has. We've heard more lies about the world than we can remember. Those unremembered lies are the basis for important assumptions we make, about who is a friend and who's not, about what we do in our spare time and what we dream of for our children.

 

We've been exposed to hundreds of thousands subliminal images, subsonic induction, ultrasonic brain state modulation, images we’re not aware we even saw of sex hate death greed, all of which influence our behavior, creating a form of unrecognized PTSD, which victims often project outward as hate.

Legacy media has gradually, over decades reduced the common vocabulary and amplified the violence, venality, selfishness, greed and overt occultism in programming.

 

Hundreds of thousands of Americans suffer physical symptoms, increased blood pressure, respiration, perspiration and pulse – people shake, stutter at the mention of the name of a man they have never met. A man they know only from the thousands of negative stories about him in every media, every hour of every day on every conceivable media platform. The physical symptoms are a psychogenic illness produced nonstop adverse IO, cultist Information Operations, aka psyops.

 

By gradually reducing our vocabulary and simplifying discussions legacy media has gradually reduced our cognitive capacity and normalized bizarre fetishes and psychopathology; moral subversion is a recognized tactic of unrestricted war; lifetime exposure from infancy means that many of us are no longer able to understand what is happening to us.

 

Legacy media protects satanist pedophile occultists, ignores massive evidence, discredit and slanders honest researchers, elevates fake experts to debunk perverts like Epstein, and scandals like Pizzagate, the Presidio, Keating S&L perverts, and dozens of other similar scandals equally serious and always dismissed as "satanic panic" which is now the approved explanation for the McMartin preschool scandal in Los Angeles.

 

There, at McMartin the children described ritual abuse, but. as always. the the Daily Beast assures us is an hallucination

 

https://www.thedailybeast.com/what-fueled-the-child-sex-abuse-scandal-that-never-was

 

DIG MEME PRAY

Anonymous ID: 9c6a8e June 14, 2021, 4:24 p.m. No.13904423   🗄️.is 🔗kun

>>13904406

From The QR Interzone archive:

 

Marianne Williamson ACIM MKUltra

 

PRECIOUS & DECEPTION: THE ROAD BACK TO NAZI SPIRITUAL SCIENCE AND MK ULTRA

 

Paragraphs referring to Marianne Williamson

 

Dr. William Thetford, Professor of Medical Psychology, Columbia University, New York, assisted Dr. Helen Schucman as a ‘scribe’ in the initial channeling of the “A Course in Miracles “(ACIM) book originally published in 1975 by an organization called The Foundation for the Investigation of Para Sensory Phenomena.

 

From 1971 to 1978, Dr. William Thetford, along with a David Saunders, headed CIA MK-ULTRA Subproject 130: Personality Theory while at Columbia University. In other words, Dr. Thetford was working for the CIA conducting TOP SECRET Personality Theory of Conversion Hysterics experiments under MK-ULTRA at the same time he was the scribe for the 1975 ACIM book.

 

After graduating from college in 1949, Thetford worked as a research psychologist in both Chicago, and later in Washington, DC. According to Colin Ross, from 1951 to 1953, Thetford worked on Project BLUEBIRD, an early CIA mind control program that led to MK ULTRA. He spent 1954 and 1955 as the director of clinical psychology at the Institute of Living in Hartford, Connecticut. From 1955 to 1957, he was an assistant professor of psychology at Cornell University’s CIA-funded Society for the Investigation of Human Ecology.

 

In 1958, he accepted an assistant professorship, which later developed into a full professorship, at the Columbia University College of Physicians and Surgeons. During a portion of this same period he also served as the director of clinical psychology at the Columbia-Presbyterian Hospital. It was here that he would stay for the next 20 years, and it was here that he first met Dr. Helen Schucman, hiring her as a research psychologist and assistant.[20]

 

In other words, at the time that Dr. Schucman channeled ACIM, from a voice she resonated from a master named JESUS, she also working for the CIA as a MK ULTRA mind bended (hallucinogenic drugs, hypnosis, sensory deprivation, psychic driving) guinea pig.

 

https://mindcontrolblackassassins.com/tag/marianne-williamson/

 

http://archive.is/mezrg

 

Oprah, The CIA Keystone Spiritual Awakening: “A Course in Miracles “

 

Reading through the MK-Ultra/ACIM article. This phrase stuck out:

 

Oprah, The CIA Keystone Spiritual Awakening: “A Course in Miracles “

 

…did a search on CIA Keystone. Here are some of the results from the cia page that talk about keystone.

 

 

CIA Headquarters — Central Intelligence Agency

 

https://www.cia.gov/kids-page/k-5th-grade/a-birds…cia…/cia-headquarters.html

 

Apr 15, 2007 - Established in 1947 and located in Virginia, the Central Intelligence Agency is the keystone of the Intelligence Community. The Agency, unlike …

 

Chapter One — Central Intelligence Agency

 

https://www.cia.gov/library/center-for-the-study-of…u…/chapter_1.htm

 

Mar 16, 2007 - DCI Allen Dulles in 1961 used the word “keystone” to describe CIA's place in the Intelligence Community, and in 1994 DCI R. James Woolsey …

 

In this context, is the cia the keystone that once removed cause the whole thing to collapse?

 

http://catalysthealingarts.net/wp-content/uploads/2018/05/Eckhart-Tolle-Apology-Letter.pdf

 

https://www.youtube.com/watch?v=RdjPDCkD4Ws

Anonymous ID: 9c6a8e June 14, 2021, 4:38 p.m. No.13904566   🗄️.is 🔗kun   >>4588

>>13904436

 

Cult tactic #13 Language Division

 

"Baby mama" replaced "unwed mother" as the approved media term; part of the larger, overarching, race division psyop.

 

The intention is to inflate the self esteem of the feckless mother, to normalize bastardy, by so engender anger and resentment in the middle class population, black and white.

Anonymous ID: 9c6a8e June 14, 2021, 4:43 p.m. No.13904616   🗄️.is 🔗kun   >>4633

Most of the information we receive today does not come to us directly from the natural world. It still comes via the optic nerve to the brain, but the source is digital media displayed on a monitor or device screen.

 

Less that 10% of the average person's daily information input is direct sense experience of the natural world. What we imagine we know about the greater, outside world, our fellow humans and the universe is all acquired from TV "news" or "entertainment" programming - TV, movies, games VR and MR are how we form our understanding of greater surrounding social, economic and political reality.

 

We are entirely dependent on the integrity of MSM/legacy media for our understanding of the reality we share, and legacy media has betrayed us, engaging in massive deception and running 'psyops,' or 'Information Operations,' stories which use information in ways engineered to divide, confuse and terrify us.

 

Over 90% of all the information we take in about the world, about our reality, our fellow citizens, friends and neighbors, comes to us through a legacy media or big tech driven SCREEN.

 

*The average American household has only 2.75 people, but 3 TVs and 6 Internet devices.

 

*The average American family spends more money each month on media consumption than on groceries or electricity.

 

*The average American consumes 12-15 aggregate hours of digital media per day.

 

*The average American child consumes more than 10 hours of digital media per day.

 

*The average American smartphone is checked every 6-12 waking minutes.

 

With the emergence nonlinear networked communication it became possible to control individual and group information environments at all levels. Modern technologies have made "kinetic war" obsolete.

 

Information warfare destroys people and countries from within. By controlling the minds of citizens, by exploiting conditioned response with prepared information packages targeted individuals or nations can be (and have been) brought to take ANY specified action (including 'genocide') voluntarily.

 

Non-linear or Information war tactics involve turning enemy nations against themselves by infiltrating and subverting moral values and gradually degrading the whole information infrastructure, from popular entertainment to text books. Occult materials (eg. Catcher in the Rye) are introduced into high school required reading lists. False history and false flags arelegitimized, self-destructive behaviors are promoted as fashionable, mental illnesses and perversions like pedophilia are normalized by stages, while subversive 'educational' programs like "common core" are promoted to turn kids off learning.

 

Cultist media gradually, over decades, reduces the public vocabulary, promotes social division, emphasizing inequities, fanning the flames of old grievances, using false flag terrorism to foster or rekindle resentments, falsifying historical records to provide evidence for a shameful cult created US history that never happened. Destroying the story of a nation destroys that nation; the nation falls apart.

 

Mind war, non linear war, is a highly developed form of conflict, with tested doctrines and a protean tactical repertoire. We don't hear about IO, mind war and it's power and tactics because our entire information distribution infrastructure; the entertainment industry and social media/ tech companies are all controlled by a subversive confederacy of deep state criminals.

 

It is well to remember we have ALL been deceived. Some may learn sooner, some learn later; but whenever you do, remember fellow citizens still trapped in the matrix of lies and fears and taboos created by sophisticated IO operators for purposes of social control.

 

https://en.wikipedia.org/wiki/Hybrid_warfare

https://archive.org/details/AlgebraOfConscience

DIG MEME PRAY

Anonymous ID: 9c6a8e June 14, 2021, 4:44 p.m. No.13904627   🗄️.is 🔗kun

Contend, O LORD, with those who contend with me; Fight against those who fight against me.

 

Take hold of buckler and shield, And rise up for my help.

 

Draw also the spear and the battle-axe to meet those who pursue me; Say to my soul, "I am your salvation."

 

Let those be ashamed and dishonored who seek my life; Let those be turned back and humiliated who devise evil against me.

 

For without cause they hid their net for me; Without cause they dug a pit for my soul.

 

Malicious witnesses rise up; They ask me of things that I do not know.

 

They repay me evil for good, To the bereavement of my soul.

 

But at my stumbling they rejoiced, and gathered themselves together; The smiters whom I did not know gathered together against me, They slandered me without ceasing.

 

Like godless jesters at a feast, They gnashed at me with their teeth.

 

For they do not speak peace, But they devise deceitful words against those who are quiet in the land.

 

Let them be like chaff before the wind, With the angel of the LORD driving them on.

 

Let their way be dark and slippery, With the angel of the LORD pursuing them.

 

Let destruction come upon him unawares; And let the net which he hid catch himself; Into that very destruction let him fall.

Anonymous ID: 9c6a8e June 14, 2021, 4:48 p.m. No.13904660   🗄️.is 🔗kun

No information obtained over anonymous insecure networks, built to intelligence agency specs, as the internet was, can be trusted.

The internet was designed to be irremediably insecure by intel agencies to facilitate illicit commerce and permit universal surveillance and psychospiritual control.

 

We've exposed gross lies propagated by legacy media, but less evident, more serious, damage is done silently, by subliminal embeds, subsonics and influence technologies which manipulate memory and perception by hypnotic induction and implanted suggestions – processes which mostly happen below the viewers’ threshold of conscious awareness.

 

Anyone can inject toxic self-replicating material into media content streams over anonymous insecure networks. Network user’s cognitive autonomy and physical security depend on the integrity of the network which serves to connect them as it does the integrity of the content producer.

 

Our internet is not only insecure by design, it is ‘’’irremediably’’’ insecure by design. It doesn’t have to be that way, but it is that way.

 

Civilization rests on identity and advanced computational civilization rests on identity-over-networks. We need to know to a high degree of assurance who originated our email, who runs what appears to be a merchant or bank website and who owns, transmits, and produces our news and “entertainment” media content to know whether to trust it.

 

A high percentage of the data we receive is not only network mediated but network sourced, and a news story will contain generations of layered error and inherited assumptions. When unrecognized errors accumulate in our circulating information supply, (news and entertainment content) our ability to make good decisions is gradually degraded. We make social and economic decisions based on what we assume to be facts - and the unrecognized errors in that data produce ever greater errors.

 

We know technologies exist which permit precise control of individual and group information environments. News feeds, display ads, forum topics and visible response; all can be individually curated to produce predictable effects on a targeted individual or group.

 

Civilization, community and commerce all rest on identity, and we have no assured anonymity (be design) on the spy built internet. Nor would we give up our real anonymity (if we had it) for the sake of secure networking. We don’t have that anonymity on the internet, though people who use C_A’s TOR mix net and proton mail users think so.

 

There are righteous reasons for anonymity and for that reason assured elective anonymity must be integral to the information system of the future.

 

How do we get both – assured identity AND anonymity on the same network without compromising either?

 

We the People need trusted networking to reliably distribute information that is real and true and important, information every person needs to make informed decisions. We the People’s decisions can be no better that the information they are based on – and right now they are based on accumulated MSM deceptions and psychological operations whose objective is terror.

 

In order to be secure FOR all, the internet must be secure FROM all, including the people who build it.

 

That's why an open, international program is essential, and why an information distribution platform or network is a UTILITY. It can never belong to a private company or a nation state entity. It MUST belong to its user’s information is a substance as essential to us as water.

 

DIG MEME PRAY

Anonymous ID: 9c6a8e June 14, 2021, 4:59 p.m. No.13904746   🗄️.is 🔗kun

ATTN NPCs

These are compromised certificate authorities. When they're compromised anyone can read your comms, spoof your transactions, hack your monkey's cage.

 

2015 - Let's Encrypt

SSLMate founder Andrew Ayer discovers that ACME, the automated issuance protocol used by Let's Encrypt, suffers from a cryptographic flaw that would allow attackers to fraudulently obtain certificates for domains they don't control. The flaw had gone undetected during a formal security audit. Fortunately, the flaw is discovered and fixed before Let's Encrypt goes live.

 

Root cause: ACME was misusing digital signatures by assuming a nonexistent security property.

 

2015 - Symantec

Over a period of several years, Symantec willfully issues over 100 test certificates for 76 different domains without the authorization of the domain owners. This is discovered when Google's Certificate Transparency log monitor detects an unauthorized certificate for google.com in Certificate Transparency logs.

 

Root cause: Symantec was willfully disregarding industry regulations by issuing trusted certificates without proper authorization.

 

Initially, Google requires that all certificates issued by Symantec be logged to Certificate Transparency logs, but Symantec is ultimately distrusted by all major platforms due to further malfeasance.

 

2015 - Symantec

Andrew Ayer discovers that Symantec is not properly extracting administrative email addresses from whois records, allowing attackers to fraudulently obtain certificates from Symantec for domains whose whois emails contain special characters such as plus. Symantec fixes the vulnerability and it is not believed to have been exploited.

 

Root cause: Symantec was unrobustly parsing domain whois records and failing to consider special characters such as + as valid characters for an email address.

 

Symantec is later distrusted by all major platforms due to additional malfeasance.

 

2016 - StartCom

Thijs Alkemade discovers that StartCom's brand new automated issuance API suffers from numerous flaws, including flaws that had previously been discovered and fixed by other CAs, that would allow attackers to obtain certificates for domains they don't control.

 

Root cause: StartCom ignored developments in the standards community and instead chose to design their own, insecure automated issuance API.

 

During the ensuing investigation, it is revealed that StartCom had concealed their purchase by WoSign, another incompetent certificate authority.

 

Initially, StartCom announces that all certificates they issue will be logged to Certificate Transparency logs, but they are ultimately distrusted by all major platforms due to their malfeasance.

 

2016 - Comodo

Matthew Bryant discovers that Comodo's domain validation emails are susceptible to dangling markup injection, allowing attackers to obtain unauthorized certificates if the domain administrator opens the validation email in an email client that supports HTML. Comodo fixes the vulnerability and it is not believed to have been exploited.

 

Root cause: Comodo was not properly sanitizing attacker-controlled input when emailing out domain control validation emails.

 

2016 - Comodo

Florian Heinz and Martin Kluge discover that Comodo is using unreliable optical character recognition to extract authorized administrative addresses from whois records. They are able to obtain an unauthorized certificate for a domain whose administrative address was misinterpreted by the optical character recognition. In response, Comodo ceases the use of optical character recognition.

 

2017 - Symantec

Andrew Ayer discovers (using the API example on Cert Spotter's home page) that Symantec had issued over 100 certificates without proper validation, including certificates for example.com that were not authorized by example.com's owner. The ensuing investigation uncovers further malfeasance by Symantec, leading to the distrust of Symantec by all major platforms.

 

2018 - GoDaddy

During a proactive self-audit, GoDaddy discovers that the secret code that they email to an official domain contact to validate the certificate can be disclosed to unauthorized parties, allowing the issuance of unauthorized certificates. GoDaddy fixes the vulnerability.

 

2018 - Certinomis

Andrew Ayer discovers (via a Cert Spotter notification) that Certinomis has issued an unauthorized certificate for test.com. A further investigation using Certificate Transparency reveals additional misissuances, including an unauthorized certificate for pourtest.com, leading to the distrust of Certinomis by Mozilla.

Anonymous ID: 9c6a8e June 14, 2021, 5:19 p.m. No.13904894   🗄️.is 🔗kun

Child stealing networks operate worldwide. They frequently prey on indigenous populations living in remote areas of third world countries.

 

This witness describes what he saw in the Guatemalan Highlands.