Anonymous ID: 6bbc7b Dec. 15, 2022, 3:14 p.m. No.17950204   🗄️.is 🔗kun   >>0224

Social subversion tactics have the objective of “crashing” the civilization. They attack cognitive capacity, promote binary thinking, create false divisions, exacerbate existing social inequities and gradually constrict public vocabulary. They portray bizarre perversions and a sordid “celebrity” lifestyle as exciting and desirable. Additional subliminally active “occult” materials are injected popular music videos, in satanic ritual disguised as concerts and events like Burning Man. Pedo cult grooming materials and symbolism fill high school and grade school curricula.

 

Other tactics include the use of prepared, coordinated media campaigns to manipulate popular belief, often in conjunction with staged, traumatic public events such as bloody terrorist attacks, creating artificial divisions among populations, engendering false polarities.

 

The propagation of harmful fictitious narratives by news media, the use of subliminal image systems and symbolic languages subsonic messaging in advertising and entertainment influence components of mind below the threshold of our conscious awareness. This sustained attack causes phased, progressive cumulative damage.

 

Information Poisoning is real.

 

Networked communications form an extended perceptual loop. Adversaries use these insecure pathways to 'poison the loop' introducing harmful information, fostering fear, uncertainty and doubt; incrementally subverting consciousness.

 

Corrupting the integrity of the extended perceptual pathway confers the ability to introduce information both overtly and explicitly and covertly and subliminally, below the threshold of our conscious awareness.

 

DIG MEME PRAY

Anonymous ID: 6bbc7b Dec. 15, 2022, 3:16 p.m. No.17950211   🗄️.is 🔗kun

No information circulated over anonymous insecure networks, built to intelligence agency specs, as the internet was, can be trusted.

The internet was designed to be irremediably insecure by intel agencies to facilitate illicit commerce and permit universal surveillance and psychospiritual control.

 

We've exposed overt lies propagated by legacy media, but less evident, more serious, damage is done silently, by subliminal embeds, subsonics and influence technologies which manipulate memory and perception by hypnotic induction and implanted suggestions – processes which mostly happen below the viewers’ threshold of conscious awareness.

 

Anyone can inject toxic self-replicating material into media content streams over anonymous insecure networks. Network user’s cognitive autonomy and physical security depend on the integrity of the network which serves to connect them as much as it does on the integrity of the content producer.

 

Our internet is not only insecure by design, it is irremediably insecure by design. It doesn’t have to be that way, but it is that way.

 

Civilization rests on identity and advanced computational civilization rests on identity-over-networks. We need to know to a high degree of assurance who originated our email, who runs what appears to be a merchant or bank website and who owns, transmits, and produces our news and “entertainment” media content to know whether to trust that website, entertainment or media content.

 

A high percentage of the data we receive is not only network delivered but network sourced, and a news story will contain generations of layered error and inherited assumptions. When unrecognized errors accumulate in our circulating information supply, (news and entertainment content) our ability to make good decisions is gradually degraded. We make social and economic decisions based on what we assume to be facts - and the unrecognized errors in that data produce errors of ever-increasing magnitude. This not a hypothesis, it’s an axiom, and is cited by John von Neumann in “Computation and the Brain” JvN’s never completed final work.

 

We know technologies exist which permit precise control of individual and group information environments. News feeds, display ads, forum topics and visible response; all can be individually curated to produce predictable effects on a targeted individual or group.

 

Civilization, community and commerce all rest on identity, and we have no assured anonymity (by design) on the spy-built internet. Nor would we give up our real anonymity (if we had it) for the sake of secure networking. We don’t have real anonymity on the internet, though people who use C_A’s TOR mix net and proton mail users think so.

 

There are righteous reasons for anonymity and for that reason assured elective anonymity must be integral to the information system of the future.

 

How do we get both – assured identity AND anonymity on the same network without compromising either?

 

We the People need trusted networking to reliably distribute information that is real and true and important, information every person needs to make informed decisions. We the People’s decisions can be no better that the information they are based on – and right now they are based on accumulated MSM deceptions and psychological operations whose objective is terror.

 

In order to be secure FOR all, the internet must be secure FROM all, including the people who build it.

 

That's why an open, international program is essential, and why an information distribution platform or network is a UTILITY. It can never belong to a private company or a nation state entity. It MUST belong to its user’s information is a substance as essential to us as water and its purity is equally important.

 

DIG MEME PRAY

Anonymous ID: 6bbc7b Dec. 15, 2022, 3:25 p.m. No.17950251   🗄️.is 🔗kun

>>17950224

https://physics.aps.org/story/v14/st3

 

sometimes called focused sound, whisper messaging bi or tri plexing

 

Focusing Sound without a Lens

July 15, 2004• Phys. Rev. Focus 14, 3

A flat slab of material focuses sound using ‘negative refraction’.

 

 

Focusing Sound without a Lens

July 15, 2004• Phys. Rev. Focus 14, 3

A flat slab of material focuses sound using ‘negative refraction’.

Anonymous ID: 6bbc7b Dec. 15, 2022, 3:30 p.m. No.17950277   🗄️.is 🔗kun

>>17950260

"Trump University"

 

Trump University (also known as the Trump Wealth Institute and Trump Entrepreneur Initiative LLC) was an American company that ran a real estate training program from 2005 until 2010. It was owned and operated by The Trump Organization. A separate organization, Trump Institute, was licensed by Trump University but not owned by The Trump Organization. In 2011, amid multiple investigations, lawsuits and student complaints, it ceased operations.[2] It was founded by Donald Trump and his associates, Michael Sexton and Jonathan Spitalny, in 2004. The company offered courses in real estate, asset management, entrepreneurship, and wealth creation.[3]

 

Despite its name, the organization was not an accredited university or college. It conducted three- and five-day seminars (often labeled "retreats") and used high-pressure tactics to sell these to its customers.[4] It did not confer college credit, grant degrees, or grade its students.[5] In 2011, the company became the subject of an inquiry by the New York Attorney General's office for illegal business practices which resulted in a lawsuit filed in August 2013.[6] An article in the National Review described the organization as a "massive scam".[7]

 

Trump University was also the subject of two class actions in federal court. The lawsuits centered around allegations that Trump University defrauded its students by using misleading marketing practices and engaging in aggressive sales tactics. The company and the lawsuits against it received renewed interest due to Trump's candidacy in the 2016 presidential election. Despite repeatedly insisting he would not settle, Trump settled all three lawsuits in November 2016 for a total of $25 million after being elected president.

 

https://en.wikipedia.org/wiki/Trump_University

Anonymous ID: 6bbc7b Dec. 15, 2022, 3:41 p.m. No.17950333   🗄️.is 🔗kun

Newfags…

 

We love you, but -

 

Do NOT reply to shills

Do NOT demolish their intentionally flawed arguments

Do NOT debate their idiotic "concerns"

Do NOT engage shills.

Do NOT participate in chat room shill KAYFABE

 

In professional wrestling, kayfabe is the portrayal of staged events within the industry as "real" or "true", specifically the portrayal of competition, rivalries, and relationships between participants as being genuine and not of a staged or predetermined nature of any kind.

 

https://en.wikipedia.org/wiki/Kayfabe

 

Do NOT perpetuate shill SLIDES.

Do NOT reply to shills vapid gambits.

Do NOT pick up spit

If you are NOT sure, LEARN to ID shills

shills = hate

shills = labels

shills = repetition

shills = envy, greed, theology etc.

 

Do NOT correct intentional shill mistakes

Do NOT be triggered by shill taunts

do NOT eat bats off the street

Do NOT bark back at dogs

 

Spot a clown

Dealing with ye Clowns & ye Shills

>>2322789 Spot a shill

>>2323031 Spot A Clown

 

shills have no agency, no will independent of their masters. Shills are passed gas of history. The slave of the slaves, their words are writ upon water.

 

DIG MEME PRAY

Anonymous ID: 6bbc7b Dec. 15, 2022, 3:50 p.m. No.17950384   🗄️.is 🔗kun

If We the People do not control our communication network(s), then those networks control us; they are what they were engineered to be, a consumer mind control apparatus.

 

Just as the cult sought and acquired control of the railroad networks and used that hidden control to determine which towns and whose businesses would flourish and which would stagnate, the cult sought control of information traffic for the same reason. To control the physical, or today, information networks, is to control future economic development of the nation or world. By setting railroad freight rates the cultist’s rail networks favored satanic enterprises and thwarted competition. Today, by controlling who knows what, and when they know it, the pedovore cult does the same thing, favoring cult enterprises more efficiently and secretly.

 

The cult’s subterfuge, disguised ownership and control, corporate shells, special stock classes, and other SOP con tactics concealed the cult’s ownership and control of the railroads. Now, the same system in far more complex forms like “opaque financial instruments” disguises ownership and control of media companies – this is the "hidden hand;" the secret society control systems known as webs.

 

We the People rely on ideologically partisan networks for information. Since ‘’’ all ‘’’ ideologically segregated partisan networks selectively amplify FUD and suppress facts contrary to partisan narratives, ‘’’ no single set of facts exists for We the People to argue over the interpretation of. ’’’

 

With no trusted information supply, in the middle of a multi polar information war, there is no method to determine which information is real, true and important and which is trivial, false and maliciously intended. How do we make decisions when ‘’’all’’’ information is corrupt and controlled?

.

Computational civilization rests on information. The better, more accurate, the information, the less error it contains, the better a society performs by measures like the rate at which new, objectively true scientific knowledge is created.

 

Civilizations which fail to set a high value on information integrity for all citizens, are inevitably tyrannies where deception is the rule; communities which cannot, and do not, survive as advanced computational civilizations must subside into barbarism, and ultimately, into collective, instinctual animal life.

 

Civilizations which set the highest value on the accuracy and integrity of their information supply view truth as a sacred, know that error correction and secure networking are essential to the maintenance of the life of all advanced, computation dependent civilizations.

 

The deep integration of computation into every sphere of human endeavor has supercharged our science and taken our civilization to an unfamiliar place, beyond material limitations, where the rules, God's rules, are the rules of the universe, and have their ultimate and mysterious source in the timeless properties of natural numbers.

 

DIG MEME PRAY

Anonymous ID: 6bbc7b Dec. 15, 2022, 3:51 p.m. No.17950391   🗄️.is 🔗kun

In the everyday world we attach “me” to our body and to that “me” we attach multiple defined identities. Religious, racial, social, economic –

 

How real are those defined identities?

 

To some of us they're extremely real.

 

To others, including most of the satanist pedovore cult con artists we contend with, none of those identities are real.

 

Our ethnic, racial and religious identities, to the cultist’s way of thinking, are simply masks, sheep's clothing, to be worn or exchanged at convenience.

 

Pedovores assume and discard Catholic, Jewish, evangelical protestant, and secular humanist identities as easily as they express right wing, left wing or centrist ideological positions. These labels are meaningless to pedovores who use our treasured identities as protective camouflage for the abduction and ritual abuse of our children as well as economic depredation.

 

Ideologies and dogmas are cognitive malware. They make effective smokescreens.

 

Whatever identity mask they adopt, cult pedovores need and seek access to vulnerable children.

We have found satanist pedovore cultists running major charitable organizations, respected foundations and reputable institutions which are collectively responsible for hundreds, if not thousands, of national and international programs targeting “at risk” ie vulnerable children – all under pretext of helping.

 

Children's Defense Fund is a prime example of a pedovore social subversion weaponized as a charitable construct. CDF is endorsed by the biggest “stars” and executives in the entertainment business.

 

https://www.childrensdefense.org/

 

Most of the same people were also involved in starting the National Center for Missing and Exploited children, which gave pedovores both access to children and a heads-up early warning system because the creepy sham center for M&E children started the “Amber Alert Service” run by the evil pedovore Laura Silsby, arrested for kidnapping “orphaned” children (parents alive) in Haiti.

 

https://en.wikipedia.org/wiki/New_Life_Children's_Refuge_case

 

Pedovores are con artists, they steal your wallet and offer to help you look for it.

Similarly, when communities ask themselves, "who's going to care for our orphans?" Pedovores always have their hands up, and may style themselves Catholics Jews or evangelicals in order facilitate access.

 

https://parentalrights.org/child_protective_services/

 

Pedovores don't believe in national, religious or ethnic identities. cultists are identity-shifters who embed themselves in ethnic, religious or ideological communities and seek control of fund raising and identity defining structures.

Pedovores run such organizations today, hiding behind the benign philanthropic reputation of do-gooder charities, fake foundations and NGOs.

 

This is information war, and that's how IW is fought.

 

DIG MEME PRAY

Anonymous ID: 6bbc7b Dec. 15, 2022, 4 p.m. No.17950452   🗄️.is 🔗kun

A trio of researchers at Korea Advanced Institute of Science and Technology, working with a colleague at the University of Illinois at Urbana-Champaign, has designed and built a working quadruped robot with magnetized feet that can climb on the walls and ceilings of metal buildings and structures.

 

In their paper published in in the journal Science Robotics, Seungwoo Hong, Yong Um, Hae-Won Park and Jaejun Park describe their robot and how well it worked when tested under real world conditions.

 

As the technology used to build robots improves, engineers find more ways to use them. In this new effort, the researchers set out to build a robot that could assist with maintenance work on large metal structures such as bridges, oil tanks and some buildings. They constructed a four-legged robot that could walk around on a flat surface, then approach a wall and walk straight up its side like a spider—and then continue across the ceiling if need be.

 

The robot was uses both magnetic elastomers and electro magnets. Together, they allow the robot feet to magnetize and demagnetize on demand. By turning the magnetism on and off, the robot is able to have a single foot cling to a vertical spot on a wall and hold on while other feet are adhered—and then to let go with one foot at a time to take steps.

 

The researchers also had to program the robot to allow for first beginning a climb and then for moving around or over obstacles. For this, they simulated the way a cat tests a surface before moving forward, taking tiny first steps with its front paws before adding the action of back paws.

 

Testing showed the robot capable of climbing metal walls and walking across ceilings in their test lab. Further testing showed the robot was able to climb up an old outdoor storage tank with walls orange with rust.

 

 

[MORE]

 

https://techxplore.com/news/2022-12-quadruped-robot-magnetized-feet-climb.html