THINKING
forming an opinion
judging a human being
in an information war
on the basis of "evidence"
derived from
or transmitted by social media
is what NPCs call thinking.
THINKING
forming an opinion
judging a human being
in an information war
on the basis of "evidence"
derived from
or transmitted by social media
is what NPCs call thinking.
George Hearst, the bloodline satanist, who founded the Hearst family fortune, owned the Anaconda mine - the are TWO anaconda mines. Hearst own the big mine in Montana
https://en.wikipedia.org/wiki/Anaconda_Copper_Mine_(Montana)
Marcus Daly contacted Hearst, asking his help in developing silver mine that he had located on Anaconda Hill near Butte, Montana. Trusting Daly explicitly, Hearst bought a quarter interest in the Anaconda without even seeing it. Though its opportunity appeared to be silver and gold, the Anaconda wound up being developed into one of the worldâs largest and most profitable copper mines.
The owners of the major media companies don't just protect pedovores, they are âââthe architects and operatorsâââ of the mass mind control system, the social engineers, the mind poisoners.
Many of our fellow citizens are so trapped in pseudo reality created by legacy media news and entertainment content they will never escape. We call the brainwashed âNPCs,â but they're victims of legacy media information poisoning.
We think we can watch legacy media news and entertainment content safely, that it wonât and hasn't hurt us⌠but it has. We've heard more lies about the world than we can remember. Those unremembered lies are the basis for important assumptions we make, about who is a friend and who's not, about what we do in our spare time and what we dream of for our children.
We've been exposed to hundreds of thousands subliminal images, subsonic induction, ultrasonic brain state modulation, images weâre not aware we even saw of sex hate death greed, all of which influence our behavior, creating a form of unrecognized PTSD, which victims often project outward as hate.
Legacy media has gradually, over decades reduced the common vocabulary and amplified the violence, venality, selfishness, greed and overt occultism in programming.
Hundreds of thousands of Americans suffer physical symptoms, increased blood pressure, respiration, perspiration and pulse â people shake, stutter at the mention of the name of a man they have never met. A man they know only from the thousands of negative stories about him in every media, every hour of every day on every conceivable media platform. The physical symptoms are a psychogenic illness produced nonstop adverse IO, cultist Information Operations, aka psyops.
By gradually reducing our vocabulary and simplifying discussions legacy media has gradually reduced our cognitive capacity and normalized bizarre fetishes and psychopathology; moral subversion is a recognized tactic of unrestricted war; lifetime exposure from infancy means that many of us are no longer able to understand what is happening to us.
Legacy media protects satanist pedophile occultists, ignores massive evidence, discredit and slanders honest researchers, elevates fake experts to debunk perverts like Epstein, and scandals like Pizzagate, the Presidio, Keating S&L perverts, and dozens of other similar scandals equally serious and always dismissed as "satanic panic" which is now the approved explanation for the McMartin preschool scandal in Los Angeles.
There, at McMartin the children described ritual abuse, but. as always. the the Daily Beast assures us is an hallucination
https://www.thedailybeast.com/what-fueled-the-child-sex-abuse-scandal-that-never-was
DIG MEME PRAY
No information obtained over anonymous insecure networks, built to intelligence agency specs, as the internet was, can be trusted.
The internet was designed to be irremediably insecure by intel agencies to facilitate illicit commerce and permit universal surveillance and psychospiritual control.
We've exposed overt lies propagated by legacy media, but less evident, more serious, damage is done silently, by subliminal embeds, subsonics and influence technologies which manipulate memory and perception by hypnotic induction and implanted suggestions â processes which mostly happen below the viewersâ threshold of conscious awareness.
Anyone can inject toxic self-replicating material into media content streams over anonymous insecure networks. Network userâs cognitive autonomy and physical security depend on the integrity of the network which serves to connect them as much as it does the integrity of the content producer.
Our internet is not only insecure by design, it is irremediably insecure by design. It doesnât have to be that way, but it is that way.
Civilization rests on identity and advanced computational civilization rests on identity-over-networks. We need to know to a high degree of assurance who originated our email, who runs what appears to be a merchant or bank website and who owns, transmits, and produces our news and âentertainmentâ media content to know whether to trust that website, entertainment or media content.
A high percentage of the data we receive is not only network delivered but network sourced, and a news story will contain generations of layered error and inherited assumptions. When unrecognized errors accumulate in our circulating information supply, (news and entertainment content) our ability to make good decisions is gradually degraded. We make social and economic decisions based on what we assume to be facts - and the unrecognized errors in that data produce errors of ever-increasing magnitude. This not a hypothesis, itâs an axiom, and is cited by John von Neumann in âComputation and the Brainâ JvNâs never completed final work.
We know technologies exist which permit precise control of individual and group information environments. News feeds, display ads, forum topics and visible response; all can be individually curated to produce predictable effects on a targeted individual or group.
Civilization, community and commerce all rest on identity, and we have no assured anonymity (by design) on the spy-built internet. Nor would we give up our real anonymity (if we had it) for the sake of secure networking. We donât have real anonymity on the internet, though people who use C_Aâs TOR mix net and proton mail users think so.
There are righteous reasons for anonymity and for that reason assured elective anonymity must be integral to the information system of the future.
How do we get both â assured identity AND anonymity on the same network without compromising either?
We the People need trusted networking to reliably distribute information that is real and true and important, information every person needs to make informed decisions. We the Peopleâs decisions can be no better that the information they are based on â and right now they are based on accumulated MSM deceptions and psychological operations whose objective is terror.
In order to be secure FOR all, the internet must be secure FROM all, including the people who build it.
That's why an open, international program is essential, and why an information distribution platform or network is a UTILITY. It can never belong to a private company or a nation state entity. It MUST belong to its userâs information is a substance as essential to us as water and its purity is equally important.
DIG MEME PRAY