Anonymous ID: 57469c May 29, 2023, 8:54 a.m. No.18920877   🗄️.is 🔗kun

If We the People do not control our communication network(s), then those networks control us; they are what they were engineered to be, a consumer mind control apparatus.

 

Just as the cult sought and acquired control of the railroad networks and used that hidden control to determine which towns and whose businesses would flourish and which would stagnate, the cult sought control of information traffic for the same reason. To control the physical, or today, information networks, is to control future economic development of the nation or world. By setting railroad freight rates the cultist’s rail networks favored satanic enterprises and thwarted competition. Today, by controlling who knows what, and when they know it, the pedovore cult does the same thing, favoring cult enterprises more efficiently and secretly.

 

The cult’s subterfuge, disguised ownership and control, corporate shells, special stock classes, and other SOP con tactics concealed the cult’s ownership and control of the railroads. Now, the same system in far more complex forms like “opaque financial instruments” disguises ownership and control of media companies – this is the "hidden hand;" the secret society control systems known as webs.

 

We the People rely on ideologically partisan networks for information. Since ‘’’ all ‘’’ ideologically segregated partisan networks selectively amplify FUD and suppress facts contrary to partisan narratives, ‘’’ no single set of facts exists for We the People to argue over the interpretation of. ’’’

 

With no trusted information supply, in the middle of a multi polar information war, there is no method to determine which information is real, true and important and which is trivial, false and maliciously intended. How do we make decisions when ‘’’all’’’ information is corrupt and controlled?

.

Computational civilization rests on information. The better, more accurate, the information, the less error it contains, the better a society performs by measures like the rate at which new, objectively true scientific knowledge is created.

 

Civilizations which fail to set a high value on information integrity for all citizens, are inevitably tyrannies where deception is the rule; communities which cannot, and do not, survive as advanced computational civilizations subside into barbarism, and ultimately, into collective, instinctual animal life.

 

Civilizations which set the highest value on the accuracy and integrity of their information supply view truth as a sacred, know that error correction and secure networking are essential to the maintenance of the life of all advanced, computation dependent civilizations.

 

The deep integration of computation into every sphere of human endeavor has supercharged our science and taken our civilization to an unfamiliar place, beyond material limitations, where the rules, God's rules, are the rules of the universe, and have their ultimate and mysterious source in the timeless properties of natural numbers.

 

DIG MEME PRAY

Anonymous ID: 57469c May 29, 2023, 9:41 a.m. No.18921054   🗄️.is 🔗kun   >>1108

Vril type 1 lizards (terrestrial aliens) are parasitic, carnivorous and malevolent. They’re about one to two feet tall. Their head resembles the body of a king crab and their body is covered in red diamond-shaped scales. They dwell underground. They’re dumb (and are able to talk) but smarter when they turn a human into a host (drone). They have a proboscis (called the Quill), which is located on the top of their head. The proboscis (which looks-like a chocolate chip) contains everything that the lizard is (its consciousness). Their lizard body is dead once the proboscis leaves its body. They can only do this once in their lifetime and if they fail (turning a human into a host), they die. The human that is about to be bodysnatched is either unconscious or restrained. The proboscis enters the human’s eye and spirals around the optic nerve. It then proceeds to go to an area of the brain (driven by taste) that tastes like butterscotch to them. Then, they do a feeling of holding your breath and pushing outwards. Finally, it does what's called “Sweating the Quill” (at the tip of the proboscis), which excretes the parasitic cells that take over the human body. This kills the human and replaces their consciousness with the Vril lizard’s consciousness. The Vril lizard becomes that human (after about a month’s recovery time). This transition from Vril lizard to human is what’s called "Droning". Once a Vril lizard becomes a human, they are then known as a Drone, Host of Vril or a Parasited Host. A person that has had this happen to them, may be referred to as someone that had been possessed by a demon. This is what demonic possession is. In addition, some hosts of Vril (drones) call themselves “walk-ins”, in which they describe how an alien consciousness or soul took over their body. The slit-eye videos that you see all over the web are fake. The Illuminati put these out intentionally to mislead everyone into thinking that one can tell who is a “reptilian” (Vril lizard and a host of Vril aka drone) by checking to see, if their eyes turn to slits. This doesn’t occur and they cannot do this. However, the eyes ARE one way to tell… Sometimes, there may be an eye that pops outward (or inward) due to the droning process or it makes the eye stray, so it looks-like the person is cockeyed or walleyed. There is no shape-shifting either. The so-called shape-shifting is the transition from Vril lizard to human. Those that talk about “reptilian shape-shifters” are referring to Vril and people who have been droned. Drones (Parasited Hosts of Vril) mimic human behavior. They are willing slaves with no compassion and only care about droning other people, torture and sex. They’re murderers. They killed the human to "use" their body and live life

 

https://en.wikipedia.org/wiki/Vril

Anonymous ID: 57469c May 29, 2023, 9:51 a.m. No.18921112   🗄️.is 🔗kun

 

In the everyday world we attach “me” to our body and to that “me” we attach multiple defined identities. Religious, racial, social, economic –

 

How real are those defined identities?

 

To some of us they're extremely real.

 

To others, including most of the satanist pedovore cult con artists we contend with, none of those identities are real.

 

Our ethnic, racial and religious identities, to the cultist’s way of thinking, are simply masks, sheep's clothing, to be worn or exchanged at convenience.

 

Pedovores assume and discard Catholic, Jewish, evangelical protestant, and secular humanist identities as easily as they express right wing, left wing or centrist ideological positions. These labels are meaningless to pedovores who use our treasured identities as protective camouflage for the abduction and ritual abuse of our children as well as economic depredation.

 

Ideologies and dogmas are cognitive malware. They make effective smokescreens.

 

Whatever identity mask they adopt, cult pedovores need and seek access to vulnerable children.

We have found satanist pedovore cultists running major charitable organizations, respected foundations and reputable institutions which are collectively responsible for hundreds, if not thousands, of national and international programs targeting “at risk” ie vulnerable children – all under pretext of helping.

 

Children's Defense Fund is a prime example of a pedovore social subversion weaponized as a charitable construct. CDF is endorsed by the biggest “stars” and executives in the entertainment business.

 

https://www.childrensdefense.org/

 

Most of the same people were also involved in starting the National Center for Missing and Exploited children, which gave pedovores both access to children and a heads-up early warning system because the creepy sham center for M&E children started the “Amber Alert Service” run by the evil pedovore Laura Silsby, arrested for kidnapping “orphaned” children (parents alive) in Haiti.

 

https://en.wikipedia.org/wiki/New_Life_Children%27s_Refuge_case

 

Pedovores are con artists, they steal your wallet and offer to help you look for it.

Similarly, when communities ask themselves, "who's going to care for our orphans?" Pedovores always have their hands up, and may style themselves Catholics Jews or evangelicals in order facilitate access.

 

https://parentalrights.org/child_protective_services/

 

Pedovores don't believe in national, religious or ethnic identities. cultists are identity-shifters who embed themselves in ethnic, religious or ideological communities and seek control of fund raising and identity defining structures.

Pedovores run such organizations today, hiding behind the benign philanthropic reputation of do-gooder charities, fake foundations and NGOs.

 

This is information war, and that's how IW is fought.

 

DIG MEME PRAY

Anonymous ID: 57469c May 29, 2023, 10:03 a.m. No.18921164   🗄️.is 🔗kun   >>1577

>>18921108

Definitly. Several website attest to the existence of and lack of information on the type 2s.

 

>

THERE IS NOT MUCH DETAIL ON THE TYPE 2 VRIL AT THIS TIME.

 

WHAT DOES SEEM CLEAR IS THAT THESE ARE THE MORE GNOME-TYPE CREATURES.

 

THERE ARE A VARIETY OF DIFFERENCES AMONG THIS SCARCE TYPE OF VRIL. THEY ARE CARNIVOROUS AND SOME VARIETIES ARE CAPABLE OF PARASITING A HUMAN HOST, HENCE THE HAT THAT COVERS THE PROBOSCIS. THESE EVIL LITTLE ENTITIES ARE THE FUNDAMENTAL BASIS OF MOST FAIRY TALES AND FOLKLORE REGARDING TROLLS, LEPRECHAUNS, PIXIES, GNOMES, SPRITES, ELVES, FAIRIES, IMPS, DEVILS, DEMONS, ETC.

 

There's also types 3 and 4, and so on.

 

Seent it on the internet

https://vrillizards.webs.com/vril

Anonymous ID: 57469c May 29, 2023, 10:05 a.m. No.18921178   🗄️.is 🔗kun   >>1181

Unrestricted or non linear war uses "psychological operations" or Information Operations to attain military economic and social objectives.

 

NL war has largely made kinetic war obsolete.

 

If we observe the most sophisticated predators in the natural world, we see that prey species are often unaware they are being attacked and ignorant of the very existence of the parasite predators living among them.

 

That is the model in nature for successful, long term inter species predation.

 

https://uanews.arizona.edu/story/how-beetles-hack-into-ant-colonies

 

Behavior changing parasites gaslight the species they prey on, even living among and sharing the same nest or habitat with the victim species. We would look for that prey/predator structure to be repeated in other social species.

 

These tactics have been recognized, emulated and used effectively against human populations by sophisticated physical and non-physical parasitic entities.

 

https://www.youtube.com/watch?v=ZUeJ2ePWNo8

 

https://en.wikipedia.org.wiki.Behavior-altering parasite

 

How might a parasitic predator cripple a host civilization or colony defense system?

 

The human male sexual instinct can easily be modified or controlled by common hormones introduced undetectably into a water supply already saturated with female hormones from the urine of birth control users, livestock and transitioning shills

 

'''We see only visible light, we hear only mid-range sounds, we don't notice slow things and don't see very fast things, we are easily hypnotized and extremely suggestible (rather, our species is.)

 

We also see and remember things we are not conscious of having seen, and because of this it is possible to introduce information, images and text, into our minds below the threshold of our conscious awareness, this information is retained and influences our behavior in ways that are predictable.

 

That is the power of Mind Warfare; by providing the TA or Target Audience with specially prepared information, we can induce the TA to voluntarily perform any desired behavior.

 

The use of sophisticated "mixed" biological and psychological war tactics it typical of non linear war, where one component of a weapons system is often purely abstract. Unrestricted war as the Chinese defined it uses every available weapon to exploit every available weakness. Obviously, the biggest weakness we have is one that affects us all.

 

https://www.britannica.com/science/blind-spot

 

Just as we have a big blind spot in the center of our visual field no one notices until they shown, we have obvious weakness in our reproductive and sexual drive which is easily activated by images. Use of sexual images in advertising makes use of this, as does most media content. A population in a constant state of low-key sexual arousal is not able to think clearly, extremely pliant and readily suggestible. Child pornography also exploits our already weakened moral judgement capacity.

 

CP is infectious and contagious, it spread on digital networks covertly and for a small percentage of those exposed CP will prove obsessive and addictive and sooner or later may lead to sexual assault on a child. This weakness is so glaring and profound, so little known or discussed that the intelligence agencies have been exploiting it forever, building control networks. Absolutely obedient human botnets. Who wouldn't want one?

 

The cult didn't create a self-referential hypersexualized pop culture by accident, they created to control the population, to weaken us, to make us pliable, petulant and unfit to protect ourselves as well as insecure, dependent, frightened.

 

MSM pop culture poisoning is real, and another satanic weapon in Mind warfare. In the same way an enemy will use a child's toy as an IED, the cult uses elements which attract us to administer poisons.

 

DIG MEME PRAY

Anonymous ID: 57469c May 29, 2023, 11:15 a.m. No.18921449   🗄️.is 🔗kun

>>18921328

 

The solution to spy built anonymous network designed to milk cattle, is a network built by consumers that offers both elective anonymity and assured identity.

 

Not "active threat monitoring" not "heuristic anti virus" 'not eliptical quantum resistant" cryptography. The corruption and crime over network rests on the ability to disguise one's identity in virtual space.

 

This is so fucking obvious we are forced to assume 1) the ultra transparent spy built internet serves MI/NSAs current tactical purposes

and the goal is a technological saltation, a civilization scale hop to a secure identity based Q information network, secure for all because it's secure from all including the individuals that built it.

 

Now with "holgraphic" authentication it's trivial

 

Holographic identity is a continuous sampling of unique user trait, punctuation, spelling, speech rhythms, gait, and bio patterns in our information output which are unforgeable,