Anonymous ID: da21f3 Jan. 9, 2022, 10:30 a.m. No.15338322   🗄️.is đź”—kun

 

Most of the information we receive today does not come to us directly from the natural world. It still comes via the optic nerve to the brain, but the source is digital media displayed on a monitor or device screen.

 

Less that 10% of the average person's daily information input is direct sense experience of the natural world. What we imagine we know about the greater, outside world, our fellow humans and the universe is all acquired from TV "news" or "entertainment" programming - TV, movies, games VR and MR are how we form our understanding of greater surrounding social, economic and political reality.

 

We are entirely dependent on the integrity of MSM/legacy media for our understanding of the reality we share, and legacy media has betrayed us, engaging in massive deception and running 'psyops,' or 'Information Operations,' stories which use information in ways engineered to divide, confuse and terrify us.

 

Over 90% of all the information we take in about the world, about our reality, our fellow citizens, friends and neighbors, comes to us through a legacy media or big tech driven SCREEN.

 

*The average American household has only 2.75 people, but 3 TVs and 6 Internet devices.

 

*The average American family spends more money each month on media consumption than on groceries or electricity.

 

*The average American consumes 12-15 aggregate hours of digital media per day.

 

*The average American child consumes more than 10 hours of digital media per day.

 

*The average American smartphone is checked every 6-12 waking minutes.

 

With the emergence nonlinear networked communication it became possible to control individual and group information environments at all levels. Modern technologies have made "kinetic war" obsolete.

 

Information warfare destroys people and countries from within. By controlling the minds of citizens, by exploiting conditioned response with prepared information packages targeted individuals or nations can be (and have been) brought to take ANY specified action (including 'genocide') voluntarily.

 

Non-linear or Information war tactics involve turning enemy nations against themselves by infiltrating and subverting moral values and gradually degrading the whole information infrastructure, from popular entertainment to text books. Occult materials (eg. Catcher in the Rye) are introduced into high school required reading lists. False history and false flags arelegitimized, self-destructive behaviors are promoted as fashionable, mental illnesses and perversions like pedophilia are normalized by stages, while subversive 'educational' programs like "common core" are promoted to turn kids off learning.

 

Cultist media gradually, over decades, reduces the public vocabulary, promotes social division, emphasizing inequities, fanning the flames of old grievances, using false flag terrorism to foster or rekindle resentments, falsifying historical records to provide evidence for a shameful cult created US history that never happened. Destroying the story of a nation destroys that nation; the nation falls apart.

 

Mind war, non linear war, is a highly developed form of conflict, with tested doctrines and a protean tactical repertoire. We don't hear about IO, mind war and it's power and tactics because our entire information distribution infrastructure; the entertainment industry and social media/ tech companies are all controlled by a subversive confederacy of deep state criminals.

 

It is well to remember we have ALL been deceived. Some may learn sooner, some learn later; but whenever you do, remember fellow citizens still trapped in the matrix of lies and fears and taboos created by sophisticated IO operators for purposes of social control.

 

https://en.wikipedia.org/wiki/Hybrid_warfare

https://archive.org/details/AlgebraOfConscience

Anonymous ID: da21f3 Jan. 9, 2022, 10:48 a.m. No.15338398   🗄️.is đź”—kun

The frieze on Apollo’s temple at Delphi, when properly translated, does not say “know yourself.” It says, “watch yourself," because when we watch ourselves, we begin to add additional layers of reflection, increasing our cognitive power as we learn.

Anonymous ID: da21f3 Jan. 9, 2022, 11:02 a.m. No.15338444   🗄️.is đź”—kun

Porno was and is a high priority mob/CIA social subversion project.

 

In the 1950s the US Post office employed hundreds of agents to police the mails. Pornography was seized regularly.

 

Freedom of speech arguments prevailed in our courts and allowed the cult/mob to take us from no-sexual- material-goes-through -the-US mail in the 1950s to Deep Throat opens in regular theaters and drive-ins in 1972.

 

Masturbation was declared by 'experts' to be harmless and pornography was said to be wholesome and natural sexual expression of delight in the beauty of the opposite sex and to offer a safe outlet to perverts who might otherwise rape children. Porn was marketed and promoted professionally.

 

US porn was a NY based Gambino family business, run by Robert DiBernadino partnered with the Cleveland porno distributor and dildo manufacturer Reuben Sturman. The two men controlled almost all the print and film/video porno produced and distributed in the US and worldwide – with exception of honeypots like Playboy magazine which was C_A cult controlled from Langley. The idea that the 50s were staid and uptight is myth. This was a planned psychological attack, it created a hyper sexualized culture where media is perfused with overt and subliminal imagery and people count orgasms and leave the driving to the pros.

 

https://www.newyorker.com/magazine/2003/03/10/empire-of-the-obscene

 

Pop culture is an entirely artificial medium. It was and is engineered to control purchasing habits, regulate our mental capacity and guide our choices for the future by controlling the range of possibilities we are aware of.

 

Information Operations use our powerful innate drives or instincts against us.

 

Our reproductive drive is among our most powerful. When we are sexually aroused we do not think clearly and are more vulnerable to hypnotic induction techniques which alter our belief systems, slowly, over time, in ways we are not consciously aware of.

 

Pornography, promoted as naturally healthy, harmless and a safe outlet, is not. It is part of the comprehensive social subversion and social control operation intended to weaken and distract our attention from the looting of the US treasury, the infiltration of financial, judicial, legislative, and regulatory systems.

 

The pedovore cult controls all media content and distribution infrastructure, including porno.

 

Our civilization rests on the integrity of an information distribution system architecture controlled by entirely corrupt individuals uniformly devoted to the enslavement and/or destruction of human beings.

 

Some may recall that Gambino wiseguy Robert (DiB) DiBernardo—the Gambino family's czar of pornography, including, disturbingly, child pornography—who was made to disappear on Gambino boss John Gotti’s orders—played a role in the 1984 presidential election.

 

Porn is good for you

 

https://www.dailydot.com/nsfw/guides/porn-benefits/

 

https://www.joe.ie/fitness-health/porn-sex-relationship-dating-601240

 

https://www.quora.com/Is-porn-good-for-us

 

https://www.gq-magazine.co.uk/article/why-porn-is-good-for-you

 

https://www.cosmopolitan.com/sex-love/news/a20436/porn-is-actually-good-for-you/

 

https://www.healthline.com/health/healthy-sex/is-porn-bad

 

https://www.jordangrayconsulting.com/3-major-benefits-of-porn-that-no-one-talks-about/

 

https://www.salon.com/2017/09/02/9-surprising-reasons-why-you-should-be-watching-porn_partner/

 

https://metro.co.uk/2015/11/24/6-reasons-why-your-porn-habit-might-actually-be-good-for-you-5522338/

 

https://en.wikipedia.org/wiki/Robert_DiBernardo

 

https://en.wikipedia.org/wiki/Reuben_Sturman

Anonymous ID: da21f3 Jan. 9, 2022, 11:26 a.m. No.15338526   🗄️.is đź”—kun

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.

 

Traffic analysis /meta data can tell everything about an individual without ever knowing real world identities. Where we shop, how we vote, and if we vote, why and for whom. If a subject's real world identity matters, it is trivial to 'unmask'and identify by name, social security number or any other registry system.

 

But there's no reason to care about our real-world identities. An opponent doesn't need to have a name to manipulate an individual news feed and to provide specially prepared media content that will prompt the target to voluntarily choose a given course of action - to act and think in ways harmful to that individual and the community they are part of.

 

Media news content can make us angry or sad, stimulate us sexually, make us recall old grievances, encourage us to drink or take drugs, make us feel more threatened by, or less conscious of, race, religion and economic status. Using out metadata allows marketers and digital enemies to modify that news and media content that shapes our beliefs and forms our understanding of the world.

 

To defeat traffic analysis and remove the possibility of this type of control we need to engineer a specific type of advanced network.

 

An identity based secure network which use a series of specially configured servers called a "mix net" which scrambles the data of millions of users messages at the same time; encrypting, mixing and routing the messages through multiple servers, re mixing and encrypting at each stage, making it impossible for others to determine where a message came from, defeating "traffic analysis."

 

https://en.wikipedia.org/wiki/Mix_network

 

(The former data limitation of mixnets has been largely overcome.)

 

Mix nets are only one component of a secure information distribution system, one that the world needs to secure our common information supply and prevent the most common and widely used forms of surveillance, manipulation and social control.

 

The chief requirement of a secure network is identity. We need a single, permanent lifetime identity in virtual space for the same reason we need one in the real world.

 

If our friends or neighbors could switch identities and appear to be someone else in the real world we would not know who to trust. We'd be surrounded by shapeshifters -like the internet -where there is no fixed or permanent identity. On an anonymous insecure network it is possible to spoof credentials and present a convincing and deceptive appearance to cheat and manipulate others.

 

We need a single permanent lifetime identity - but we also need assured anonymity.

 

There are lots of good reasons for someone to want to be anonymous. To make a gift. To blow the whistle on crime. To buy and sell without giving your real-world identity to a merchant who sells it to others.

 

On a secure "identity based" network it is possible to do everything anonymously - credentials can be split many ways. If an anonymous user wants to offer proof of expertise while remaining anonymous it is possible to do that. We can display credentials and others can see they are real without revealing any more of ourselves.

 

Networks are not secure for anybody until they are secure for everybody.

 

We need to build the information system of the future as an international engineering project, so the safety and engineering are open to all the nations who will depend on this infrastructure to support civilization.

 

We can not allow an enemy to capture our information systems again. The way to prevent this happening is to make the network a public utility owned and controlled by users used to provide media content provided by trusted individuals or companies, unmanipulated by anyone else. Secure for all, because it is secure from all, even the people who build it.