Anonymous ID: f373ce Feb. 10, 2018, 10:18 a.m. No.328454   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8655 >>2066

All right, lads and lasses.

Do you want me repost the screencaps from my deep dig that I started posting last night, or start over again and you lead the way with questions that I might be able to answer from the digging?

Or should I just format the dig as a huge PDF file that no one will read because PDF?

It was almost finished yesterday, until the same anon started reposting its original posts with some new ones I missed, which tears up my original document structured but the new posts are appreciated because they also contain related info.

Guide me as what you want, anons.

Anonymous ID: 418e5c Feb. 10, 2018, 10:39 a.m. No.328656   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

I was following those posts; thought it was curious that no one seemed to be interested in them. Now that i see where your research wound up I'll follow your posts back to read and catch up on them.

Anonymous ID: 418e5c Feb. 10, 2018, 10:40 a.m. No.328667   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3515

You might have already found this and i haven't caught up with you yet, or maybe this is nothing. Several of these posts referred to "Cassandra" being taken down. A quick search of Cassandra brought this: https:// en.m.wikipedia.org/wiki/Apache_Cassandra

Does the reference to Apache make it relevant?

Anonymous ID: 14df76 Feb. 10, 2018, 12:38 p.m. No.329492   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9579

Some tidbits from the 44 pages posted so far.

โ†’The director of a little known federal agency with oversight over the nation's nuclear programs resigned on February 8, 2018.

โ†’His replacement (not confirmed) has longstanding ties to the Russian nuclear industry

 

These 2 men are candidates for further digging

 

โ†’The DoE had/has (at least) seven supercomputers as part of its Accelerated Strategic Computing Initiative managed by Sandia Corp under contract with the DoE. One named ASCI SNOW WHITE and one named ASCI Q.

โ†’RED OCTOBER refers to a serious worldwide cyber-espionage malware attack that affected national security infrastructure in our country and others.

โ†’A SCIF can be built/operated within a standard cargo container. We have pictures.

โ†’An unknown somebody has provided Qresearch with a set of (partial) crypto keys as well as information on how to use them to decrypt a yet-unknown data repository or torrent.

 

Thank you, Patriots.

Anonymous ID: 14df76 Feb. 10, 2018, 12:51 p.m. No.329579   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9951 >>5517 >>0491 >>1246

>>329492

One more thing.

The strange images the anon with the crypto codes wanted us to have include very subtle clues about "mirror".

Many of them were composed by compositing layers upon a background. Most of the backgrounds exhibit mirror symmetry.

This is a clue.

Personally I think it has to do with quantum computing. A quantum computer deals with information in a way that is unfamiliar to us. At the quantum level information can flow both time-forward and time-backward.

I believe (without being able to prove anything โ€ฆyet) that these quantum supercomputers have the ability to probe possible timestreams that are near or similar to ours. I believe the Q operation likely incorporates that capability, as part of their operations research modelling to predict how the social landscape will be altered by the various influences on the social landscape. Such as information dispensed by Q into /qresearch and then forwarded into the broader culture through our memes.

I believe the mirror imagery also possible refers to the Project Looking Glass

 

See Through the Looking Glass with Phase โ€ฆ

thelivingmoon.com/42stargate/03files/Project_Looking_Glass_LANL.html

Well there is a reason for thisโ€ฆ the Government uses the ALICE CODE. Project Aquarius and the Looking Glass Project at Facility S4 at Area 51. "Above the door frame leading into the lab that contains the Looking Glass project at facility S4 at Area 51 there is a stuffed White Rabbit holding a backward watch mounted โ€ฆ

 

If you read that site closely, it was or is a machine that uses multiple strong electromagnetic fields to warp local spacetime just enough to allow glimpses into possible futures (and probably pasts).

 

Now that quantum computers exist I find it highly probable that the same kind of research is ongoing but using the latest technology โ€ฆ which may be assumed to be at least 20 years more advanced than what the public is told about.

I do seriously believe that QCs are probing possible futures and giving us the right stream of crumbs to help alter it toward the timestream that is desirable, and away from the Satanically-influenced ones.

 

I know this sounds like science fiction to most. Time will prove me wrong or right about this. We'll seeโ€ฆ

Anonymous ID: 10453d Feb. 10, 2018, 1:44 p.m. No.329951   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0088 >>4138

>>329579

 

The timestream notion is a bit out there, but with quantum phenomena, one should never say never. It does seem very plausible that NSA would have a Quantum computer that has achieved Quantum supremacy. Google or IBM will have one in the next year or two, and as you say, they would try to stay 20 years ahead in this area.

 

CIA would probably NOT have a Quantum computer, since codebreaking is not really their specialty. That might be the determining factor that enables Q and the gang to stay one step ahead of the clowns. If their quantum computer can cut through conventional crypto like a knife through butter all of the communications of all clowns/cabal/stooges can be easily compromised.

 

The quantum angle might also apply to your timestream notion. A less exotic interpretation might be that they have a massive multi-agent computer simulation of the US public. It enables them to run different disclosure scenarios, and identify potential problems and tripwires in their planning.

Anonymous ID: 1743f6 Feb. 10, 2018, 2:01 p.m. No.330088   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4138

>>329951

Perhaps.

You are associating quantum computing (QC) mainly with crypto.

That is a valid association but by no means the only one.

QCs can be programmed to solve problems that have never been solved programmatically before. There is much research ongoing on how to even program them.

 

Quick summary on QCs (very high level). Note that although I'm a technologyFag, I have no particular background on QC, just general reading.

 

There are multiple QC technologies (physical implementations). Some very different from one another. All of them deal with probabilities. With different strengths and weaknesses and tradeoffs such as speed versus accuracy. High interconnectedness of the qubits in the QC register, versus interconnectedness only of adjacent qubits. Full error correction, a property we have grown to expect in all our daily computing devices, does not exist yet in any of these commercial QCs or prototypes.

 

I found this article a good introduction and overview:

sciencenews.org/article/quantum-computers-are-about-get-real?mode=topic&context=96

 

Some really spooky things have been reported pertaining to QCs that I have not looked into yet. Like strange "entities" manifesting when the QC becomes sufficiently complexโ€ฆ Time for the Christian to put on the whole armor of God before going down that line of investigationโ€ฆ I didn't want to go there but will probably have toโ€ฆ That's why I was hot to talk with ร†ฤฑAnon; hoped to find out what he knew about the 'other side' without having to get very close to the subject personally. He did say it is something impossible to express in human terms, and I believe him (from studying his imagery).

Anonymous ID: 763769 Feb. 10, 2018, 3:26 p.m. No.330771   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0802

>>330745 I dunno. Busy capturing new images from that same poster. Can't look at what I wrote yesterday ATM. Hopefully will get a chance to come up for air in a whileโ€ฆ

 

Pic is from >>330690 and a moderator is over there deleting these images before I can capture themโ€ฆโ€ฆ.

 

Help me and go complain on the meta thread

Anonymous ID: 763769 Feb. 10, 2018, 3:43 p.m. No.330914   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4138

Anon posted this in general >>330801. I'm copying here in case turns out to be relevant. I think it's an accurate description of the multiverse theory.

 

โ€”โ€”โ€”โ€”-

The Multiverse/Timeline theory:

 

Basically it is the theory there is a universe with its own timeline for every possible event/action from the beginning of time until the end of time. Thus there are infinite yous branching back and splitting from you every instant until you were born (ie one of them never drew a first breath). You can look back and remember your life and your decisions to know who you are, but with other choices you would have been a different person. Future Proves Past. The you of 2 days ago is proven by the you of today, and the you of two days ago and the choices you made in those two days created the you that you are today.

 

An alternate you that made a different decision 3 days ago disproves the you that you remember two days ago; as they do not remember that you of two days ago because that you never existed their timeline. This is the how what Q said works โ€“ Future Proves Past.

 

One of the ways to visualize this is a tiled tv or video screen with a different similar image on each tile; and each tile is an instant in time for all of time. Now behind each tile cascaded behind is an infinite number of windows of all possible events at that moment in time. Letโ€™s take it one step further; if you spun that image 90 degrees out of the TV it would show how each event is connected to each and every other moment in time and how it affects them.

 

Can those multiverses be interacted with or perceived or experienced? If so then time effects would work both ways as it would affect our past by changing it. Do those multiverses influence or local universe? Could the fractal dimensions of physics actually be these multiverses perceived not 90 degree but as say 0.333 degree or 24.8 degree?

 

If you draw and X and Y axis on a piece of paper they are at 90 degree and you have length and width. But if you want depth you must draw and axis at 45%. Technically that axis is a 0.5 degree dimension as it is not set at 90 degree. Yes I understand this is just a tool we use to perceive 3-D in a 2-D plane, by doing this we can shift our perspective to see a cube in a 2-D drawing. Think about that; we can use a partial dimensional view to visualize a higher dimension. Most of us do not know how to do that beyond four dimensions. Partial or Fractal dimensions are basically dimension seen/perceived at a 90 degree angle. Try this draw axisโ€™s 6 or 9 or 12 of them equidistanceโ€™s from each other and gaze at the page; you can choose which two or three jump out at you that are the X, the Y, and the Z.

 

It has been proven that these fractal dimensions to influence our 4-D reality from static to how ferns grow. So far it is kind of random for us to find the influence and interactions, and some just call it a mathematical representation. I do not understand the higher math but it seems like all of a sudden in math a multidimensional (fractal) equation just coalesces or clicks into a 4-D answer and it answers a real life question.

 

What If our tech is beyond what we think? Physics changes all the time, Newton did, Einstein did and from that one we got nuclear power and bombs. What ifbehind the scenes they found a new way to look at the world that allows dimensions to be spun and placed in the way to make length basically irrelevant (a fractal dimension), or time? Distance would eliminate any problem with instantious travel โ€“ ie a space fold. Time would allow big changes in events globally and no consequence and it just changes entire timeline.

Anonymous ID: 32445f Feb. 10, 2018, 5:13 p.m. No.331712   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>330440

YEEEEEES!!

I was hoping he would show up, if it is who I think it is.

I gave him directions to this board

and it looks like he found it.

Doxxing if I go any further.

I can say expect more. Tell who needs to be told to not delete those.

THEY ARE VERY IMPORTANT!!

Anonymous ID: 379c41 Feb. 10, 2018, 6:06 p.m. No.332210   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>329181

He told me I ALREADY KNOW. Then comes >>329382. Sgt, Schultz here. I think the human brain relies on quantum phenomena for information processing and perhaps consciousness. JohnJoe McFadden UK. It has to do with parts of brain intercommunicating via electromagnetic flux inside the cranium. Faster than neurons can transmit signal, signal by EM travels one part of brain to another. Did somebody read papers like McFadden and decide to wire up a silicon level architecture that relied upon EM coupling at distance rather than keep all the digital 0/1 stuff discrete and tidy? And when they did, did the machine wake up like a baby? Did they feed it stimuli and give it sensory inputs from a somatic proxy body? Is something like that or more than one of those constructs out there somewhere? Did the singularity occur and we missed it? I dunno man thatโ€™s just my sci fi William Gibson take.

Anonymous ID: 379c41 Feb. 11, 2018, 1:44 a.m. No.335064   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5115

>>334349 hmm hook tube oqC4it3Ub5o so watched. all these asci computers are not quantum so : video content big if true, on this bread so connected to the dig, so lovecraft was predictive programming for cern outcome, video says itโ€™s a done deal, book of Revelation, Ghostbusters predictive programming, itโ€™s the block chain as beast system, duh. End of Days soon, check. No one knows the day or the hour but the signs of the times are clear as day. Donโ€™t get into crypto, donโ€™t take mark of beast, repent and believe the Good News. 28 to 6 part does not ring true. News story about Russian scientists busted for trying to mine on a govt supercomputer. If you had control of big machines like that you could mine a replacement for all fiat plus keep all ledgers and expand further like vechain purports, lemme think what else could you do, data crunch for cern? how is Utah connected? Sentient world simulation needs a big distributed? platform assuming that is legit, but what is the point? I see the end game, done deal, bad guys and Things win big right up until the End then Jesus returns, acc, to video. The tech and geomancy angle goes way over a sheep head, they think we are sheep for slaughter and the Good Shepherd lays down his life for the sheep, goes to find the 1 lost leaving the 99, has joy in finding the 1 lost. Good vs. Evil, and Good wins, interesting Revelations has clear language about what seem to be intelligent constructs living statues which could be seen as AI simulacra. So Q purpose here for drops and crumbs is to give heart to Good Guys not all is lost, fight fight fight red pill like evangelization and led to Jesus Christ ultimately. Read in here about Beam of Light prayer recalls for me the Canopus in Argos series by Doris Lessing, I think I do already know.

Anonymous ID: 379c41 Feb. 11, 2018, 1:54 a.m. No.335110   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>335071 yeah at some point it makes sense to get off the grid entirely, like when this becomes mandatory or โ€œ get discounts for enrolling your avatar in our exclusive shopping clubโ€, Hey who else thinks a Carrington event is a good idea in some respects? EMP the blockchain, Neo pls.

Anonymous ID: 2ae037 Feb. 11, 2018, 1:55 a.m. No.335115   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5118

>>335064

More on Sentient World Simulation

Looks like we're all nodes in a blockchain with our own avatars/clones - whatever you like to call them. See also ProjectPai which looks to me like bait to hook the sheeple through a "carrot" of personal control over one's own avatar without mention of the accompanying "stick" of surveillance ultimately leading to total control.

Anonymous ID: 9dea67 Feb. 11, 2018, 5:36 p.m. No.344138   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0271

>>329951

>CIA would probably NOT have a Quantum computer

Anyone can buy a D-Wave computer. It's the software running on it that matters. They might have different information (Vault7) than the NSA panopticon, but not more (except through their corporate partners/proxies.)

 

>>330088

>amazing dub sequence, checked

>Time for the Christian to put on the whole armor of God before going down that line of investigation

Anthony Patch's talks on this in that context are very engaging/thorough (dozens upon dozens of hours of interviews on youtube.)

 

>>330914

 

>What ifbehind the scenes they found a new way to look at the world that allows dimensions to be spun and placed in the way to make length basically irrelevant (a fractal dimension), or time?

IN occult terms, they might want to seed the idea of this to give it more resonance. Observing the fact/effect of this conditions its action in-itself.

 

>>329168

>4th image 'mini-hezog'

Werner Herzog's film The Enigma of Kaspar Hauser. Child was found after being locked in a room for years in Germany (mysteriously murdered late in life, after regaining speech). Herzog: Duke (ger.)

>a scene of him visiting a tower he speculates was built by giants, and seeing a bird fly in the window stands out; children showing him around town

Anonymous ID: d3769b Feb. 12, 2018, 1:52 p.m. No.355193   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

In reply to a post here is sauce on

 

Z-Division

From Wikipedia, the free encyclopedia

 

The International Assessments Program โ€” known as Z-Division โ€” is a Special Projects Group of the Lawrence Livermore National Laboratory established to provide the United States Intelligence Community with technical assessments of foreign nuclear programs and weapons capabilities. Z-Division was formed in 1965, bringing together scientists and engineers to help intelligence agencies understand the significance of Soviet nuclear weapons tests. The letter 'Z' was chosen as most letters were already assigned to other divisions. Relationships with the American intelligence community were formalised by a memorandum of understanding drawn up between the Central Intelligence Agency (CIA) and the Atomic Energy Commission (now the Department of Energy) in the same year.

Anonymous ID: 1a0b36 Feb. 12, 2018, 3:25 p.m. No.356078   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>6342

WINDSOR GREEN.

 

In other words, this (a) will only be helpful for either extremely targeted attacks, or in building out a gigantic hash map of sha256 sums or something, and (b) isn't this what the NSA normally does?

 

PALANTIR.

Anonymous ID: 064d0d Feb. 12, 2018, 3:27 p.m. No.356091   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4611

>>354444

Quads.

What is picture.

USS Pueblo (AGER-2)

From Wikipedia, the free encyclopedia

For other ships with the same name, see USS Pueblo.

 

USS Pueblo (AGER-2) is a Banner-class environmental research ship, attached to Navy intelligence as a spy ship, which was attacked and captured by North Korean forces on 23 January 1968, in what is known today as the "Pueblo incident" or alternatively, as the "Pueblo crisis".

The seizure of the U.S. Navy ship and her 83 crew members, one of whom was killed in the attack, came less than a week after President Lyndon B. Johnson's State of the Union address to the United States Congress, a week before the start of the Tet Offensive in South Vietnam during the Vietnam War, and three days after 31 men of North Korea's KPA Unit 124 had crossed the Korean Demilitarized Zone (DMZ) and killed 26 South Koreans in an attempt to attack the South Korean Blue House (executive mansion) in the capital Seoul. The taking of Pueblo and the abuse and torture of her crew during the subsequent 11-month prisoner drama became a major Cold War incident, raising tensions between the western democracies, and the Soviet Union and China.

North Korea stated that Pueblo deliberately entered their territorial waters 7.6 nautical miles (14 km) away from Ryo Island, and that the logbook shows that they intruded several times.[1] However, the United States maintains that the vessel was in international waters at the time of the incident and that any purported evidence supplied by North Korea to support its statements was fabricated.[2]

Pueblo, still held by North Korea today, officially remains a commissioned vessel of the United States Navy. [3] Since early 2013, the ship has been moored along the Potong River in Pyongyang, and used there as a museum ship at the Pyongyang Victorious War Museum.[4] Pueblo is the only ship of the U.S. Navy still on the commissioned roster currently being held captive.[5]

Anonymous ID: fb89ab Feb. 12, 2018, 3:54 p.m. No.356342   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>356078

imagery

.1. 2 demons in left panel between white pillars

.2. dark doorway

.3. black veiled figure facing viewer with face covered

.4. object held or carried by veiled figure. figure's left hand encircles the object. a rose plant with red roses?

.5. tile reminds me of plus ultra tile at trump's mar a lago even tho not exact match

 

text

WINDSOR GREEN

many places are named windsor green

filtering them all out there is a uk cryptocurrency exchange called windsor green

relevance unknown

 

PALANTIR

an intelligence gathering system

people show trump in saudi hands on wizard globe as palantir

wikipedia says

A palantรญr is a fictional magical artefact from J. R. R. Tolkien's legendarium. A palantรญr is described as a crystal ball, used for both communication and as a means of seeing events in other parts of the world or in the distant past.

ah now we're getting somewhere

 

text unknown relevance:

In other words, this (a) will only be helpful for either extremely targeted attacks, or in building out a gigantic hash map of sha256 sums or something, and (b) isn't this what the NSA normally does?

 

what is 'this'? the massive doe computers diverted for non nuclear use for codebreaking of aes

'this' refers to this capability

isn't it what the nsa normally does?

how would i know im a civilian presumably it is nsas job yes

 

actually i think the massive computing capability actually IS used for spying into the future and alternate timelines like the anon said above

if they can do this it would be more important militarily financially etc than nuclear weapons

im not sure its safe for anons to even discuss this

Anonymous ID: 1a0b36 Feb. 12, 2018, 5:38 p.m. No.357468   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>357437

>Hadoop MapReduce

 

CORONA_OFFLINE_Deac[0000].

 

Definition - What does Corona mean?

 

Corona is an open-source scheduling framework used on Apache Hadoop based data infrastructure. Corona was initially designed by Facebook to cope up with a large amount of current, incoming data and the queries processed by each data cluster. Corona is considered an advancement or successor to Hadoop MapReduce.

 

c]o>gTe(X06ViC{8'ZH`K&;OJ}05NkvGTf3-.zT;jm!agADF<(N{9wFW-Z5&-|]

Anonymous ID: 5c686e Feb. 12, 2018, 5:48 p.m. No.357596   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7777

>>357462

Great. I have to log the fucking timestamps of any number of unknown posts or tweets or images and observe time deltas between them. Fucking great.

 

Snowden says he built HEARTBEAT and it was authorized by 2 levels of mangement. He spells "explicitly" wrong as "explicited". Unknown if the misspelling is intentional of meaningful. Now I'm supposed to look at Snowden's background and figure out is HEARTBEAT refers to hardware or software or what. I assume software but know little of Snowden's background.

 

>>357467

ALL CAPS ANON claims will be banned when (((they))) catch on. LARPish. Who will ban them and why. DistractionLARP?

 

A church(?) stained glass windows. Black veiled figure again, with smoke around. Inside the church if mirror images of graffiti on outside of blocked up windows indicates correctly. Content of graffiti irrelevant?

 

Raven Rock pic related.

Anonymous ID: 5c686e Feb. 12, 2018, 6:05 p.m. No.357774   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7862

>>357467

A NSA-approved program, called HEARTBEAT. So OK this is what Snowden claims to have built with 2 levels of management approval.

Fucking APAR. Jargon for a program fix.

Fucking PMR number. Jargon for error reporting system used by software customers to report bugs and track bug fixes.

 

Error description "Q CAPTURE" and "Q APPLY". Possibly pertains to a queue management system that might be used between data capture from possibly an intelligence gathering sources/inputs, and a database. Q Capture suggests a software semaphore where one process obtains exclusive use of the queue โ€ฆ to prevent database conflicts by separate processes trying to modify the same data table simultaneously and overwriting one another's data. A heartbeat would be necessary to prevent the queue staying locked if something went wrong.

COMMIT_LSN likely pertains to a database. The purpose of Q CAPTURE sending a heartbeat message is not known. Perhaps the heartbeat indicates that the process that captured the queue is still working on the DB. If no heartbeat occurs another process would release the lock and fix the DB.

The exact nature of this bug and the bug fix is unclear to me but I am fairly certain it pertains to a database mangement system frontended by a queue management system.

Anonymous ID: e79963 Feb. 12, 2018, 6:24 p.m. No.357954   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>357467

> 5c4c982a279a7ddโ‹ฏ.jpg posted in error. Ignore.

 

The anon is phoneposting.

 

The dark gray post

AT&T โ†’ telco with major cooperation with intelligence agencies

SITE R. โ†’ Raven Rock?

RAVEN ROCK. โ†’ posted Wikipedia abstract

DIG.

 

DISA = Defense Information Systems Agency.

Try their Twitter account. @USDISA

I'm not a very good digger.

Pic 1 related.

Looks like a job fair recruitment thing.

Hmmmโ€ฆ. proud of their new cloud.

I can't understand how people can put their personal data into a cloud and assume it is safe. Cloud security depends on encryption. DISA would presumably have used AES (not verified, just guessing). AES is broken. What security!?!

Next post will check Wikipedia cite on USDISA.

Anonymous ID: e79963 Feb. 12, 2018, 6:44 p.m. No.358133   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8177 >>9009

>>357467

Per wikipedia (I paraphrase):

SITE R. refers to the USACC (U.S. Army Communications Command) Site R Telecommunications Center within the Raven Rock complex. Or "Raven Rock Site R Alternate Joint Communications Center (AJCC) โ€“ United States Nuclear Forces".

Quoting:

"Raven Rock Mountain that has been called an "underground Pentagon."[4][5] The bunker has emergency operations centers for the United States Army, Navy, and Air Force. Along with Mount Weather Emergency Operations Center in Virginia and the Cheyenne Mountain Complex in Colorado, it formed the core bunker complexes for the US Continuity of Government plan during the Cold War to survive a nuclear attack."

 

Instead of guessing these terms I'll look each one up to be sure to get it right:

 

โ†’Command and Control (acronym C2):

C2 in a military organization is the exercise of authority and direction by a properly designated commanding officer over assigned and attached forces in the accomplishment of the mission. The term may also refer to command and control systems within a military system.

//In context here I believe it refers to both the command function as well as the IT and other systems that support the command function. //

 

MNIS leads to an article explaining the terms listed below MNIS:

 

disa.mil/mission-support/command-and-control/mnis

Too long to paste here

Screencapture instead (pics)

Anonymous ID: e94d68 Feb. 12, 2018, 7:01 p.m. No.358335   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Copied from >>357680

 

News unlocks MAP.

Think Mirror.

Which team?

THEY don't know.

APACHE.

 

"poet Edna St. Vincent Millay #52 on top 500 poets Poet's PagePoemsQuotesCommentsStatsE-BooksBiographyVideosShare on FacebookShare on Twitter

 

Poems by Edna St. Vincent Millay : 154 / 169 ยซ prev. poem next poem ยป

 

To A Young Poet - Poem by Edna St. Vincent Millay

 

0:00

 

/ 0:24

 

Autoplay next video

 

Time cannot break the bird's wing from the bird.

 

Bird and wing together

 

Go down, one feather."

 

CORONA_OFFLINE_Deac[0000].

 

SOON.

Anonymous ID: e94d68 Feb. 12, 2018, 7:15 p.m. No.358484   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

copied from >>357913

 

>>357873

$DSHOME/../../ASBNode/eclipse/plugins/com.ibm.iis.client/httpclient-4.2.1.jar

$DSHOME/../../ASBNode/eclipse/plugins/com.ibm.iis.client/httpcore-4.2.1.jar

$DSHOME/../PXEngine/java/biginsights-restfs-1.0.0.jar

$DSHOME/../PXEngine/java/cc-http-api.jar

$DSHOME/../PXEngine/java/cc-http-impl.jar:$DSHOME/../biginsights/hadoop-conf

$DSHOME/../biginsights

$DSHOME/../biginsights/*

 

///quick comment from the anon copying, not the OP: I can't type fast enough to capture this and study it at the same time! It looks to me like something is going to happen imminently to a Java program called BIG INSIGHTS that is running on an IBM system. We've been shown IBM Q technology tonight. Raven Rock "pentagon underground" Site R. A (fixed?) software bug pertaining to logging from a QMS to a DBMS in software supposedly created by Snowden. Then a pic of an emergency broadcast message.

How does all this relate?

I think it's all happening SOOON ANONS

Just my 2c/////

Anonymous ID: e94d68 Feb. 12, 2018, 7:18 p.m. No.358512   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4512

The Winter Olympic games in the Russian city of Sochi promises to be a blast from the (Soviet) past with a dash of NSA-style surveillance thrown in, according to reports hinting that Russian security services will run a surveillance network so comprehensive that one analyst described the plan as โ€œPRISM on steroids.โ€

 

The Russian FSB security service โ€“ successor to the Soviet KGB โ€“ is updating its already comprehensive โ€œSormโ€ Internet- and telephone-monitoring system. The new edition will have new interception and content-recognition capabilities that will allow it to monitor any phone- or data traffic from the vicinity of the games, and to recognize and track the use of specific words or phrases included in emails, chats or social media postings, according to a team of Russian investigative reporters whose results were reported Oct. 6 in the U.K. newspapers The Guardian and Telegraph.

 

The two journalists, Andrei Soldatov and Irina Borogan, collected information on the upgrade from requests for proposals, project specifications, offer letters, descriptions from Russian-government oversight agencies and other documents describing the project.

 

The Sorm network is being upgraded nationwide, but the region surrounding the Black-Sea resort city of Sochi has priority status for work to increase the networkโ€™s local capacity and to add abilities such as deep packet inspection that would allow FSB or other agencies to filter Internet traffic by keyword or other content.

 

Mention of the word โ€œNovalnyโ€ could trigger extra scrutiny on the assumption that discussion revolves around Russian opposition politician Alexei Navalni, Soldatov told the Guardian.

 

โ€œThere is an element of meta-data gathering [as in the NSAโ€™s PRISM surveillance], but Russian security services are not so interested in meta-data,โ€ Soldatov told The Telegraph. โ€œThis is about content. The idea seems to be to make communications in Sochi totally transparent for the Russian authorities.โ€

 

The scope of the Sorm upgrades is similar to the PRISM system used by the NSA but more reliable, according to Univ. Toronto political-science Professor Ron Deibert, director of the universityโ€™s Citizens Lab, which researches surveillance, human rights and global security., who acted as consultant for the investigation.

 

The NSAโ€™s PRISM surveillance system had checks and limitations built in to help prevent abuse, though they were weak or easily bypassed, Deibert said.

 

โ€œIn the Russian system permanent access for Sorm is a requirement of building the infrastructure,โ€ he told the Guardian.

 

Long before the Sorm upgrades came to light, the U.S. Department of State recognized Russian eavesdropping as a big enough problem to issue an official warning to a warning to those traveling to the Games that Russian security is likely to eavesdrop on electronic communications.

 

โ€œBusiness travelers should be particularly aware that trade secrets, negotiating positions, and other sensitive information may be taken and shared with competitors, counterparts, and/or Russian regulatory and legal entities,โ€ the document reads.

 

Sorm was authorized in 1995 and went into operation in 2000, according to State Dept. travel guides.

 

The FSB has been upgrading the system since 2010, including the Sorm access-points that ISPs are required to install to allow government surveillance of Internet traffic.

 

The FSB is the Russian Federation successor to the Soviet KGB secret police, which employed once-and-current Russian President Shirtless Vlad Putin for 17 years as a mid-level administrator and spymaster, according to a Jan. 30, 2000 story in the Washington Post.

 

Like the NSA, the FSB, โ€œtechnically requires a warrant to intercept a communication, [but] is not obliged to show it to anyone,โ€ according to the Guardian.

 

Both the FSB and Russian-government spokesman Alexei Lavrischev declined to confirm the reports, but Lavrischev said surveillance at the Sochi games would be less intrusive than that by extensive network of security cameras in London during 2012 summer Games.

 

โ€œThere, they even put CCTV cameras in, excuse me for saying it, the toilets,โ€ Lavrishchev told the Guardian. โ€œWe are not taking this kind of measure.โ€

 

Image:Shutterstock.com/ Martynova Anna

Sqrrlโ€™s New Analytics Platform Based on NSA Tech

Nick Kolakowski

June 21, 2013

Anonymous ID: 650e55 Feb. 12, 2018, 7:40 p.m. No.358697   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>358534

 

So? Another test/hack of the EBS?

EMERG BROADC SYS

 

Will I need duct tape this time or just muh beer?

 

Why the Russian Phrase?

Pigs might fly.

Literal: It was happening โ€“ a goat was eating up a wolf.

Anonymous ID: d0bc24 Feb. 12, 2018, 7:41 p.m. No.358713   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Archived /qresearch/ General #440

containing the crypto codes from Feb 12, 2018 here โ†’

http:// archive.is/cJ8On

 

Archive of THIS BREAD as of now, here โ†’

http:// archive.is/10NC5

 

Anons, please make a note of it in case this thread disappears

Anonymous ID: d0bc24 Feb. 12, 2018, 7:45 p.m. No.358755   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9048

TASKS

 

3 documents need to read quickly. Somebody read and write a quick summary post on it:

โ†’ https:// www.disa.mil/mission-support/command-and-control/mnis

 

โ†’ https:// insights.dice.com/tag/prism/

 

โ†’ I am reading and will summarize the 20 pp PDF on Mini Duke malware

labs.bitdefender.com/wp-content/uploads/downloads/2013/04/MiniDuke_Paper_Final.pdf

 

GO GO GO anons. My guess is that we're up against time here to figure out what is about ot happen.

Anonymous ID: ab6676 Feb. 12, 2018, 8:03 p.m. No.358924   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8986 >>9108 >>0271

MINI-DUKE malware.

 

Discovered February 27 2013.

First known sample: June 2011.

Risk: Document exfiltration.

 

Spread thru infected PDF file which deposits dropper.

Once installed, the malware calls home using a URL found via Twitter or Google search query. When successfully connected, new updates or payloads are installed under the disguise of .gif images.

Spread by social engineering: malicious PDFs sent by email.

Within the installed malware, the query strings are encrypted.

Infects Windows (via rundll32)

Runs briefly after each boot

Has a mechanism for adding modules & updates

 

Includes commands for:

mv - Moves a file. Uses MoveFileA api.

cp - Copies a file. Uses CopyFileA api.

rm - Deletes a file. Uses DeleteFileA api.

pwd - Gets current dir. Uses GetCurrentDirectoryA api.

cd - Sets current dir. Uses SetCurrentDirectoryA api.

rmdir - Removes dir. Uses RemoveDirectoryA api.

mkdir - Creates a dir. Uses CreateDirectoryA api.

pskill - Kills process. Uses OpenProcess, TerminateProcess apis.

 

This is how the malware exfiltrates documents from target computers.

        • *

The Wilton Park and Ukraine's NATO Membership Action Plan Debates documents in >>358536 are .png captures of forged PDF documents that were used during the social engineering phase to intiially drop the malware on target systems.

        • *

So these PDF documents shed light on what kind of systems were targeted by MINI-DUKE. These topics would be of interest to governments and military.

Anonymous ID: ab6676 Feb. 12, 2018, 8:08 p.m. No.358974   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

This post >>354528 suggests that of the original seven dwarves DoD supercomputers, another one was just taken out, or its control by /badguys/ disabled.

A couple of days ago anons believed that 3 of the 7 had been disabled. This posts suggests that a 4th has now been disabled.

3 remain, and they are in the kill box (targeted) for future action.

 

The graphic suggests that this is being done as a hack attack against them by a penetration testing firm.

I find this highly unlikely, but nothing can be ruled out.

Anonymous ID: 379c41 Feb. 12, 2018, 8:16 p.m. No.359048   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9108

>>358755 honest inquiry. If we are up against time to figure out what is going to happenโ€ฆif we fail, we will still know it, because it happens. If we find out before and it happens, we know the same thing. So what is the point? Learning that the future can be computed? Must be. Predictive simulation must be both deployed and weaponized and high confidence.

Anonymous ID: ab6676 Feb. 12, 2018, 8:18 p.m. No.359057   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>354659

I don't have the slightest idea what this image is about.

The woman's eyes are blackened.

She's wearing something like a nun's veil on her head.

The white bib-like contraption is badly soiled by drops of some unclean liquid but it doesn't look as dark as blood.

She has something like a black ribbon around her neck, the kind worn for ID badges at computer conferences.

The background, as usual, exhibits mirroring about 2 vertical axes.

 

With the Apache posts we are beginning to think of mirroring in the sense of database mirroring.

 

I expect DBs with national security importance would certainly be mirrored. Think high availability systems technology. There are multiple technologies that can do that at high speed, in near real time, at geographically distant sites. I can't venture a specific guess because it depends heavily on the particular system architecture.

Anonymous ID: 62be5d Feb. 12, 2018, 8:24 p.m. No.359108   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>354444

What's the relevance of USS Pueblo?

        • *

Something that's ours, that is being held "hostage" by North Korea.

        • *

Apply this analogy to the possibility that there has been data exfiltration from DoD national security systems by Mini-Duke malware. >>358924

 

>>359048 As you wish. I'm doing what I'm doing.

Anonymous ID: 62be5d Feb. 12, 2018, 8:28 p.m. No.359152   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>354682

Raven Rock site.

Image: Raven is dead.

Her fingernails are black like mourning.

Very very sad.

 

It is a tragedy if a major military installation of national importance for C&C in the event of nuclear war were 'dead' like the raven is dead.

 

I get the picture. Shit.

Anonymous ID: ba390b Feb. 12, 2018, 8:45 p.m. No.359317   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>354689 Discussed this image here โ†’ >>329170

 

>>354878

"Agreed. Call me. Let it Ring O.N.C.E.

i'll call back."

is plainly code.

 

Once means eleven in Spanish

Letting the phone ring once then hanging up is a signal.

 

A key ring was posted in ~#392 (pic)

Key ring is crypto terminology.

Crypto key storage is called a key ring.

 

Maybe this means that all the bit strings on the various posts comprise ONE key RING.

It's something about the crypto keys.

Scratches head.

Anonymous ID: bee9fb Feb. 12, 2018, 9:05 p.m. No.359503   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9629

>>359366

The same user id posted >>359137

 

I thought maybe a slide, see >>358984 as the codes have been out a year. But, doesn't necessarily mean it's a shyll. Dug more, and think that with the codes may be legit.

 

Then there is this user

>>358519

User ID: 2ce7fe (24)

in bread #441

https:/ /8ch.net/qresearch/res/358409.html#q358519

posts such as: >>358530

and

>>358604

>Good, fuck off to mommy's basement and beat your meat. Do you really fucking think I give a rats ass?

That's a shyyll tactic right there, same technique as >>358653

>Cause he's a gay fag who wants to feel some sort of power, living in his mommy's basement.

User goes back to the Cicada / Tengri type images and mirrors those:

>>358802

>Mirrored at 180 she has a severed head of a raven hanging from her throat, she's wearing nun clothing, the raven's blood forms something on the front of her shirt and there are devils in the back ground. Creepy stuffโ€ฆ Need to check out Michelle's portrait now.

Id mirrors O portrait >>358630, an anon asks to explain and answers: >>358712

>Not point anything out yet.. just experimenting. Coincidence a illuminatti pyramid appears between his eyes?

 

So, a shyll making the Cicada / Tengri images look like bunk, adding noise to the posts by that anon. Interesting, if drawing them in, could indicate you anons are over the target!

Anonymous ID: 5f646a Feb. 12, 2018, 9:14 p.m. No.359592   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

I've been following this anon all afternoon and maybe it's nothing but I'm glad somefag has created a board and is trying to make sense of this.

 

I dug a little on a couple topics and it may be meaningless but I never came up empty handed.

Anonymous ID: 6a1442 Feb. 12, 2018, 9:17 p.m. No.359629   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0293

>>359503

The poster I'm interested in is not posting pictures of Obama's portrait. Maybe somebody else is using the same VPN. The type of posts and quality of information in them is entirely different. It looks like entirely different people to me.

Thanks Mod.

Anonymous ID: 6a1442 Feb. 12, 2018, 9:34 p.m. No.359788   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

reposting from

>>359754

https:// www.techopedia.com/definition/29098/corona-facebook

"'Corona is primarily designed to manage very large data sets that are beyond the capacity of MapReduce and for improved utilization of cluster resources. Corona works by introducing a specialized cluster manager and a dedicated job tracker for each job. The cluster manager routinely reviews the cluster for free resources and overall activity. The job tracker in turns tracks and monitors the status of each job/task. Job tracker can be executed on the client machine or on the cluster for larger data requirements. By isolating job roles and functions, which Hadoop MapReduce do not do, Corona achieves better cluster utilization and processes more jobs."'

The difference between big data and the open source software program Hadoop is a distinct and fundamental one. The former is an asset, often a complex and ambiguous one, while the latter is a program that accomplishes a set of goals and objectives for dealing with that asset.

 

>>359754

Big data is simply the large sets of data that businesses and other parties put together to serve specific goals and operations. Big data can include many different kinds of data in many different kinds of formats. For example, businesses might put a lot of work into collecting thousands of pieces of data on purchases in currency formats, on customer identifiers like name or Social Security number, or on product information in the form of model numbers, sales numbers or inventory numbers. All of this, or any other large mass of information, can be called big data. As a rule, itโ€™s raw and unsorted until it is put through various kinds of tools and handlers.

Hadoop is one of the tools designed to handle big data. Hadoop and other software products work to interpret or parse the results of big data searches through specific proprietary algorithms and methods. Hadoop is an open-source program under the Apache license that is maintained by a global community of users. It includes various main components, including a MapReduce set of functions and a Hadoop distributed file system (HDFS).

The idea behind MapReduce is that Hadoop can first map a large data set, and then perform a reduction on that content for specific results. A reduce function can be thought of as a kind of filter for raw data. The HDFS system then acts to distribute data across a network or migrate it as necessary.

Database administrators, developers and others can use the various features of Hadoop to deal with big data in any number of ways. For example, Hadoop can be used to pursue data strategies like clustering and targeting with non-uniform data, or data that doesn't fit neatly into a traditional table or respond well to simple queries.

Anonymous ID: 6a1442 Feb. 12, 2018, 9:37 p.m. No.359829   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

repost from >>359760

 

>>359582

 

eta numeris

392D8A3EEA2527D6AD8B1EBBAB6AD

 

sin topper

D6C4C5CC97F9CB8849D9914E516F9

 

project runway

847D8D6EA4EDD8583D4A7DC3DEEAE

 

7FG final request

831CF9C1C534ECDAE63E2C8783EB9

 

fall of cassandra

2B6DAE482AEDE5BAC99B7D47ABDB3

 

echo "392D8A3EEA2527D6AD8B1EBBAB6AD" eta-numeris.hex

echo "D6C4C5CC97F9CB8849D9914E516F9" sin-topper.hex

echo "847D8D6EA4EDD8583D4A7DC3DEEAE" project-runway.hex

echo "831CF9C1C534ECDAE63E2C8783EB9" 7FG-final-request.hex

echo "2B6DAE482AEDE5BAC99B7D47ABDB3" fall-of-cassandra.hex

 

openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key

openssl enc -aes256 -in sin-topper.hex -out sin-topper.key

openssl enc -aes256 -in project-runway.hex -out project-runway.key

openssl enc -aes256 -in 7FG-final-request.hex -out 7FG-final-request.key

openssl enc -aes256 -in fall-of-cassandra.hex -out fall-of-cassandra.key

 

CU{B|;g<l`v"(Z6TI6E-srInJic}2cD1M0u-g!>T#("0@4cQeMRvPoT6+[Fn|yU

Anonymous ID: 6a1442 Feb. 12, 2018, 9:40 p.m. No.359855   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9864 >>9888

repost from >>359582

>>359509

 

https:// en.wikipedia.org/wiki/Apache_Accumulo

 

Accumulo was created in 2008 by the US National Security Agency and contributed to the Apache Foundation as an incubator project in September 2011.[3]

 

On March 21, 2012, Accumulo graduated from incubation at Apache, making it a top-level project.

 

https:// github.com/apache/accumulo

 

-wF3JU,eh;IxV&gt;Z4EB.z,&gt;{ca)o^_tu$myi$m=3Y[-[/f76pFz8?@w@0=3iA,

Anonymous ID: 6a1442 Feb. 12, 2018, 9:59 p.m. No.359997   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

repost from >>359951

 

>>359775

 

USS PUEBLO (today)A perspective

 

In the late 1990s the Clinton Administration attempted to negotiate with North Korea. At the time, the Koreans were in the process of constructing a nuclear reactor. It would be capable of producing nuclear weapons grade plutonium. The US government entered an agreement that stated in essence, if the Koreans stopped work on the reactor, the US along with some EU nations would provide them with a new light water reactor plus 500,000 tons per year of heavy fuel oil. The fuel oil to be used in the Korean oil fired power plants. US Secretary of State Madeleine Albright visited Pyongyang and met with Kim Jong Il. During the course of those "negotiations" the North Koreans felt they would be able to move USS PUEBLO from Wonsan on Korea's east coast to the Taedong River at Pyongyang on the west coast. This was a voyage of over 1000 nautical miles, all in INTERNATIONAL WATERS.

 

The move of the ship from Wonsan to Pyongyang was handled by Secretary of Defense William J. Perry who had been appointed by President Clinton his North Korea Policy Coordinator. In that role he was in favor of negotiation and appeasement. He was instrumental in arranging Secretary Albrightโ€™s visit to NK.

 

He allowed the ship relocation from East to West and told the US Navy - hands off.

Anonymous ID: a3a8a3 Feb. 12, 2018, 10:50 p.m. No.360271   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0378

>>344138

>>329168

 

OK I think get the image reference and relevance of the Russian ะผะธะฝะธ-ะณะตั€ะทะพะณ (Mini Herzog) now.

 

Herzog (German) means Duke (English).

So ะผะธะฝะธ-ะณะตั€ะทะพะณ (Rus.), mini-Herzog (English) means

Mini-Duke

The cyber-espionage malware that had data exfiltration capability.

Referred to here โ†’ >>358177

>>358924

>>358244

 

Here is a terse summary of Mini-Duke, how it worked and what its capabilities were.

>>358264

Anonymous ID: bee9fb Feb. 12, 2018, 10:55 p.m. No.360293   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>359629

Totally agree anon. Right, sorry if I didn't make that clear, point was that CryptoAnon, or whoever is doing the coded posts with cicada/tengri images, was being picked up by / spoofed by what looked to be a shyll. Modifying an image by mirroring and posting nothing but crap verbiage with it. That's why I said maybe you crypto anons over here were 'over the target' as that tends to attract their attention, shylls try to subvert and slide the important stuff. And it was 'higher-end' shylling, in the sense they were editing images with mirrored effects and trying to blend in more. But, was pointing out mannerisms and attacks were the same as typical.

>>359948

Seconded, good job.

>>360003

Hang in there, doing good work!

I got banned for agreeing with the person pointing out "helperAnon", they don't like that idea. I think it has merit, and commenting on that earned me a 3yr ban (not the only one) for calling bullshit on it. Whatever, cycle the IP.

Have a good night anon, godspeed.

 

>>359732

Those look to be the posts of movieAnon from the UK. If anyone would like, I may have a few more of their Socratic drops I can post in here, just holler, will check back.

Anonymous ID: a3a8a3 Feb. 12, 2018, 11:05 p.m. No.360378   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0475

>>360271

'''By putting Mini-Duke in Russian,

ะผะธะฝะธ-ะณะตั€ะทะพะณ (Rus.),

I'm forced to conclude that OP is saying that this espionage software was Russian.'''

Mini-Duke was discovered February 27 2013. The first known sample: June 2011.

Risk: Document exfiltration.

 

Organizations that think (or know) they were compromised by Mini-Duke need to look at what data assets they had during the period when it was active, that could have been exfiltrated by a foreign power.

 

So when did North Korea suddenly get nuclear bomb capability?

When did it start performing nuclear tests in that mountain and threatening the world?

 

en.wikipedia.org/wiki/List_of_nuclear_weapons_tests_of_North_Korea

 

  1. 9 October 2006, smallish, est. 0.7 - 2 kt and possibly a fizzle says Wikipedia.

  2. 25 May 2009, est. 2 - 5.4 kt

  3. 12 February 2013, 6 - 16 kt

  4. 6 January 2016, 7 - 16.5 kt

  5. 9 September 2016, 15 - 25 kt

  6. 3 September 2017, 70 - 280 kt. NK claimed hydrogen bomb.

 

Let's suppose U.S. sensitive nuclear secrets were exfiltrated from classified databases sometime between 2011-2013.

Is it reasonable that, now having U.S. technology know-how, North Korea could within about 3 years convert that know-how into a workable nuclear weapon?

Three years? I think so. Especially if they had help.

 

Now I REALLY wonder what Eric Schmidt was doing in North Korea. Especially when this document was visible on the computer screen in images that Q gave us.

Anonymous ID: a3a8a3 Feb. 12, 2018, 11:15 p.m. No.360475   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>360378

Added

///// I'm very uncomfortable with this conclusion, especially since we KNOW from the Vault 7 release that the CIA hacking tool suite included the ability for their software to impersonate/implicate just about any country /////

Anonymous ID: 650e55 Feb. 13, 2018, 5:22 a.m. No.362426   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>2540 >>2554

>>360034

Why did the original image/info poster

include this sequence(deleted) in another thread?

 

POWERPC not affected by Meltdown(MD)? I thought it was.

 

Mini-Duke(M-D).

 

Was MD deliberate from the beginning?

Does this Mini-Duke exploit use Meltdown vectors?

 

from OP(not this thread):

 

RS/6000 RS/6000 RS/6000 RS/6000 RS/6000

 

memory keyboard network scsi speaker ok

 

0 dev / ok

 

0 ls

 

00c5a398: /cpus

 

00c5b0d8: /PowerPC,POWER3@0

 

00c5b650: /l2-cache

 

00c5c198: /PowerPC,POWER3@1

 

00c5c710: /l2-cache

 

00c5cb08: /PowerPC,POWER3@2

 

00c5d080: /l2-cache

 

00c5d478: /PowerPC,POWER3@3

 

00c5d9f0: /l2-cache

 

00c5dde8: /reserved@ff000000

 

00c5e390: /event-sources

 

00c5e3f8: /epow-events

 

00c5e490: /chosen

 

00c5e5f8: /memory@0

 

00c61510: /IBM,memory-module@0

 

00c61920: /IBM,memory-module@1

 

00c61d30: /IBM,memory-module@2

 

00c62140: /IBM,memory-module@3

 

00c62558: /IBM,memory-module@4

 

00c62968: /IBM,memory-module@5

 

00c62d78: /IBM,memory-module@6

 

00c63190: /IBM,memory-module@7

 

00c635a8: /IBM,memory-module@8

 

00c639b8: /IBM,memory-module@9

 

00c63dc8: /IBM,memory-module@a

 

00c641e0: /IBM,memory-module@b

 

00c645f8: /IBM,memory-module@c

 

00c64a08: /IBM,memory-module@d

 

00c64e18: /IBM,memory-module@e

 

00c65230: /IBM,memory-module@f

 

00c65648: /IBM,memory-module@10

 

00c65a58: /IBM,memory-module@11

 

00c65e68: /IBM,memory-module@12

 

00c66278: /IBM,memory-module@13

 

00c66690: /IBM,memory-module@14

 

00c66aa0: /IBM,memory-module@15

 

00c66eb0: /IBM,memory-module@16

 

00c672c8: /IBM,memory-module@17

 

00c676e0: /IBM,memory-module@18

 

00c67af0: /IBM,memory-module@19

 

00c67f00: /IBM,memory-module@1a

 

00c68318: /IBM,memory-module@1b

 

00c68730: /IBM,memory-module@1c

 

00c68b40: /IBM,memory-module@1d

 

00c68f50: /IBM,memory-module@1e

 

00c69368: /IBM,memory-module@1f

 

00c69780: /memory-controller@ff001000

 

00c699b0: /nvram@ff800000

 

00c69e80: /IBM,sp@ff880000

 

00c79c08: /rom@fff00000

 

00c7acb8: /interrupt-controller@ffc00000

 

00c7b060: /openprom

 

00c80238: /options

 

00c80e28: /aliases

 

00c828e8: /packages

 

00c82990: /deblocker

 

00c83470: /disk-label

 

00c86b38: /tape-label

 

00c86db8: /obp-tftp

 

00c900d0: /prep-boot

 

00c90688: /fat-files

 

00c920c0: /iso-13346-files

 

00c99270: /disassembler

 

00c9e5b8: /assembler

 

00caf468: /platform

 

00cafdf0: /utilities

 

00cb9aa8: /net

 

00cbb2b0: /iso-9660-files

 

00cbc1c0: /boot-mgr

 

00cd0550: /chrp-loader

 

00cd06e0: /pe-loader

 

00cd0f00: /elf-loader

 

00cd3090: /terminal-emulator

 

00d2ccf8: /gui

 

00db8ab0: /post

 

00cd3128: /rtas

 

00ce2470: /pci@fef00000

 

00cecd10: /isa@b

 

00cee920: /reserved@i78

 

00ceea28: /rtc@i70

 

00cf0640: /serial@i3f8

 

00cf1758: /serial@i2f8

 

00cf2870: /fdc@i3f0

 

00cf5ed8: /timer@i40

 

00cf6420: /interrupt-controller@i20

 

00cf6658: /dma-controller@i0

 

00cf6c30: /ethernet@c

 

00cff2d8: /scsi@d

 

00d04b58: /sd

 

00d05ab8: /st

 

00ce6930: /pci@fee00000

 

00d06e20: /ethernet@b

 

00ce9440: /pci@fed00000

 

00d0f5c8: /ethernet@b

 

00cebc40: /IBM,TB3MX@fb000000

 

ok

 

0 " ibm,loc-code" 00cf6c30 get-package-property ok

 

3 . 0 ok

 

2 dump

 

00cf6c70: 50 32 2f 45 31 00 :P2/E1.: ok

 

0 " vendor-id" 00cf6c30 get-package-property ok

 

3 . 0 ok

 

2 dump

 

00cf6c98: 00 00 10 23 :โ€ฆ#: ok

 

0 " device-id" 00cf6c30 get-package-property ok

 

3 . 0 ok

 

2 dump

 

00cf6cc0: 00 00 20 00 :.. .: ok

 

0 " revision-id" 00cf6c30 get-package-property ok

 

3 . 0 ok

 

2 dump

 

00cf6ce8: 00 00 00 26 :โ€ฆ&: ok

 

0 dev /pci@fef00000/ethernet@c ok

 

0 " ethernet,100,rj45,full" encode-string " chosen-network-type" property ok

 

0 " 000.000.000.000" " ibm,fw-clientipaddr" $setenv ok

 

0 " 000.000.000.000" " ibm,fw-serveripaddr" $setenv ok

 

0 " 000.000.000.000" " ibm,fw-gatewayipaddr" $setenv ok

 

0 " 255.255.255.000" " ibm,fw-netmask" $setenv ok

 

0 boot /pci@fef00000/ethernet@c

 

BOOTP S = 1

 

FILE: /tftpboot/e1

 

Load Addr=0x4000 Max Size=0xbfc000

 

FINAL Packet Count = 15853

 

FINAL File Size = 8116590 bytes.

Anonymous ID: 62be5d Feb. 13, 2018, 5:50 a.m. No.362554   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>362426

 

A RS/6000 PowerPC booted up with the AIX operating system (IBM's proprietary version of Unix) and this is what prints out on the system control during the boot sequence.

The lines that print out indicate various system modules that are loaded in during bootup, what kind of network is attached, how much memory, like that.

BOOTP is the bootstrap protocol for unix/linux.

Not much sleep here. I'll look into it later. tHANKS for capping the text. If you see more of these you could cap them over here

Anonymous ID: 62be5d Feb. 13, 2018, 5:53 a.m. No.362568   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>362540

I don't know yet, but I think soon it will be possible to know

Not sure what is the normal configuration for a system console for this type of SC. PowerPC as sysetm console is plausible IMO

A couple of the earlier dumps like this had date/time stamps that indicate WHEN it happened and that is a big clue as to when the hack may have occurred.

Anonymous ID: 62be5d Feb. 13, 2018, 6:05 a.m. No.362620   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

I'm currently leaning toward the meaning of the mirrored backgrounds in the storytelling images as follows:

 

Most(?) are mirrored TWICE along TWO vertical axes. So the mirror effect has, in effect, 3 panels.

 

This may be a depiction of the 3 deep underground nuclear bunker 'underground Pentagon' sites:

Cheneynne Mountain in the west

Raven Rock in Pennsylvania

Mount Weather EOC in Virginia

 

If you lay those out on a map, if the picture depicts some element of the story (the woman, the raven, Herzogโ€ฆ) in a particular panel, they are telling us which of the 3 sites it affected. So far I"m seeing Raven Rock over and over, and not the other sites.

Anonymous ID: d1102e Feb. 13, 2018, 7:09 a.m. No.363048   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3394

more from the OP(not this thread):

 

!/bin/sh

 

# mailout

 

/usr/sbin/sendmail -t <<mayday

 

From: hostname

 

To: rs6admins

 

Subject: hostname P-Series is up

 

The AIX hostname is now up, please check services.

 

.

 

mayday

 

also there was a Russkie reply to one of the OPs original posts:

 

>>>308885

ะ ะดะตะปะพ ะฑั‹ะฒะฐะปะพ โ€“ ะธ ะบะพะทะฐ ะฒะพะปะบะฐ ััŠะตะดะฐะปะฐ.

 

TRANSLATION:

Pigs might fly.

Literal: It was happening โ€“ a goat was eating up a wolf.

 

My thought on these posts, from the beginning(vis-'a-vis the pics) was that it was just the Wizards&Warlocks saying

hello to us in their own 'special' way.

i.e. pics depicted W&W

Though, interpreting subjective 'Art' has never been a strong point, just made the simplest connection. Occam's stuff.

 

โ€ฆ. and they still haven't called. <shrug>

Anonymous ID: 6c8ff2 Feb. 13, 2018, 7:28 a.m. No.363203   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3246 >>3724

>>354262

Music video 4:43 in length published Dec 2, 2015

Female voice singing a Russian folk song accompanied by synth. The verse repeats over and over again.

Mostly still images with a short animated seqence at beginning and end.

In a Youtube comment someone transcribes the text (I only understood a couple of words of the song).

Pic 1 translation is imperfect (adjective ัะธะทะตะฝัŒะบะธะน is transliterated, not translated)

Russian dictionary site translate.academic.ru/ะกะธะทะตะฝัŒะบะธะน/ru/ pic 2 looking up ัะธะทะตะฝัŒะบะธะน

says no English translation exists

Offers

ะกะผะพั‚ั€ะตั‚ัŒ ั‡ั‚ะพ ั‚ะฐะบะพะต "ะกะธะทะตะฝัŒะบะธะน" ะฒ ะดั€ัƒะณะธั… ัะปะพะฒะฐั€ัั…: (I translate as Look up what is "ะกะธะทะตะฝัŒะบะธะน" in other dictionaries):

ัะธะทั‹ะน which means roughly, Dark gray with a thick bluish tint (color).

So I correct the translation as follows:

There was a good fellow and a red girl.

There was a good fellow and a red girl.

What is not (dark grayish blue or gunmetal color) little darling good fellow goes,

What is not a blue dove red maiden's soul.

What is not a blue dove red maiden's soul.

Description of video

A woman dressed in black semi-opaque veil or robe. Her head and face uncovered. Y-head antlers on her head. Eyes blackish, mouth dark or black. Still image. She's standing out in a field, green grass but line of dead or leafless trees in the background โ†’ wintertime? Sky is grayish misty. Flock of black birds in the sky behind her.

Her left hand is exposed protruding from the robe/veil but her right hand is concealed in the veil. The still image flickers slightly.

Next post will be screen captures from the video.

The video starts and ends with a red-robed figure opening a dark door, at which time the female character is seen with a pretty, blue-eyed, innocent-looking face, wearing a red over her head (no antlers - I assume it's supposed to portray the same woman?)

The video concludes with invitation to Subscribe to YouTube channel of youtube userid UNTITLED BURIAL (pic 3).

Anonymous ID: 6c8ff2 Feb. 13, 2018, 7:39 a.m. No.363322   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>363262

One final screen capture, from about 0:06 in >>354262 youtube.com/watch?v=FRMGqU9rhBQ&feature=youtu.be

 

Starts out a beautiful woman with a red robe/veil and NO y-head.

Something happens and she opens the dark door.

Although there's a crucifix on the wall nearby with LIGHT, she passes through that dark door into a desolate place.

Now her beautiful blue eyes are blackened, her innocent mouth is blackened, the red robe/veil is replaced by a black one, her left hand is operative (left-hand-path) and she is wearing Y-head antlers.

In that place, all is still and unmoving. Nothing moves or lives.

A bad thing happened to her.

She chose poorly.

She chose the dark path.

Near the end, her right hand is shown with the illuminati-looking symbol on the palm.

 

Tentative interpretation based on observations up to this point in time.

Subject to revision as more info arrives.

 

Who is the woman?

She is a symbol of something/someone.

What does she symbolize?

 

There is a pervading sadness to this story.

Somehow it pertains directly to the topic of this thread.

Anonymous ID: 6c8ff2 Feb. 13, 2018, 7:48 a.m. No.363394   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3664

>>363048

I think I know. The RS6000 PowerPC running AIX sends an email as follows:

 

>!/bin/sh

A unix shell command called

># mailout

invokes the sendmail command

>/usr/sbin/sendmail -t <<mayday

to send the -t (text) 'mayday'

Mayday is a distress signal.

Text of email continues:

>From: hostname

>To: rs6admins

Sent from that computer to the administrators of that RS6000 system.

>Subject: hostname P-Series is up

>The AIX hostname is now up, please check services.

>.

>mayday

 

The email reports that the system has booted and asks the administrators to check what services are running on that computer.

The mayday message is a distress signal that something is wrong.

Something wrong with the services running on that computer.

 

I can do a better translation of the Russian

ะ ะดะตะปะพ ะฑั‹ะฒะฐะปะพ โ€“ ะธ ะบะพะทะฐ ะฒะพะปะบะฐ ััŠะตะดะฐะปะฐ.

: And then it happened โ€“ goat ate wolf.

 

(The Russian lacks articles so in English it is uncertain whether it means "a goat" or "the goat", "a wolf" or "the wolf").

 

What is a goat?

What is a wolf?

 

A goat should not be eating a wolf.

Wolf is the predator, goat is the prey.

Tables were turned and goat ate wolf.

 

I believe, with the other context in this thread, that this signifies that the cyberattack occurred on the DoD supercomputer at Raven Rock.

Anonymous ID: 6c8ff2 Feb. 13, 2018, 8:31 a.m. No.363724   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>363203

pic related is youtube channel of Untitled Burial, originator of video >>354262

 

The Bible quote is significant.

Rev 8:1

Pic 2, & text follows

 

Revelation 8 English Standard Version (ESV)

[The Seventh Seal and the Golden Censer]

 

8 When the Lamb opened the seventh seal, there was silence in heaven for about half an hour. 2 Then I saw the seven angels who stand before God, and seven trumpets were given to them. 3 And another angel came and stood at the altar with a golden censer, and he was given much incense to offer with the prayers of all the saints on the golden altar before the throne, 4 and the smoke of the incense, with the prayers of the saints, rose before God from the hand of the angel. 5 Then the angel took the censer and filled it with fire from the altar and threw it on the earth, and there were peals of thunder, rumblings,[a] flashes of lightning, and an earthquake.

[The Seven Trumpets]

6 Now the seven angels who had the seven trumpets prepared to blow them.

7 The first angel blew his trumpet, and there followed hail and fire, mixed with blood, and these were thrown upon the earth. And a third of the earth was burned up, and a third of the trees were burned up, and all green grass was burned up.

8 The second angel blew his trumpet, and something like a great mountain, burning with fire, was thrown into the sea, and a third of the sea became blood. 9 A third of the living creatures in the sea died, and a third of the ships were destroyed.

10 The third angel blew his trumpet, and a great star fell from heaven, blazing like a torch, and it fell on a third of the rivers and on the springs of water. 11 The name of the star is Wormwood.[b] A third of the waters became wormwood, and many people died from the water, because it had been made bitter.

12 The fourth angel blew his trumpet, and a third of the sun was struck, and a third of the moon, and a third of the stars, so that a third of their light might be darkened, and a third of the day might be kept from shining, and likewise a third of the night.

โ€ฆ

 

Biblefags will be well familiar with this prophetic passage.

If you're not a Biblefag and want to read the rest of the 7 trumpets

biblegateway.com/passage/?search=Revelation+8&version=ESV

Anonymous ID: 6c8ff2 Feb. 13, 2018, 8:41 a.m. No.363817   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4496

>>363664

Means something happened, that should never have been able to happen:

Prey "ate" predator.

Cyber attack on the nation's most secret military data occurred, that should never have been possible.

Tragedy.

 

I say authoritatively that it is unheard of for a large enterprise cyberattack victim to announce they've been hacked. Standard procedure is to deal with it internally or with the help of cybersecurity specialists, but not reveal anything that would let the attacker know their attack succeeded or what data was infiltated or what systems were compromised. Letting the attacker know what worked and what didn't only aids the attacker and helps them fine tune their next steps.

So the fact that we're being told about this, in some detail, albeit years after the fact, suggests that the attack is no longer ongoing, measures have been taken to prevent recurrence, and that the public gradually learning the story of what happened does not pose any additional danger to national security.

 

Repeating what I posted at the top:

EVERYTHING IN THIS THREAD IS BASED UPON PUBLICLY AVAILABLE INFORMATION

Anonymous ID: 6c8ff2 Feb. 13, 2018, 9:59 a.m. No.364512   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>358512

The October 2013 article Russian FSB to Give NSA Lesson in Digital Surveillance at Winter Olympics from insights.dice.com/tag/prism/

discusses what was publicly known in 2013 about Russian surveillance capabilities that were implemented circa 2000 and upgraded circa 2010.

As in the US, the FSB requires ISP to install data taps for FSB monitoring at network access points.

 

Of significance is that this SORM system is targeting data payload & content, rather than just packet headers & metadata.

 

If the capability was publicly known in Russia in 2013, it is reasonable to extrapolate that similar capability exists elsewhere also. Based on Moore's law one can extrapolate that the capability has grown significantly in the 4-5 years since then.

 

I had always thought that the amount of available data storage capacity would inherently limit the amount of data collection that was possible, especially as a greater proportion of digital communication becomes audio & visual rather than text.

 

Either they have much greater storage capacity than I ever dreamed possible, or the data is being analyzed in near-real-time in nearly-unimaginable quantities. Or both. Or interesting data based on keywords is being monitored, analyzed in realtime, archived, and also past stored data is data-mined whenever needed.

 

It is reasonable to assume that these capabilities exist(ed) in U.S. surveillance systems also.

Anonymous ID: 6044c6 Feb. 13, 2018, 10:35 a.m. No.364837   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4909

>>355696

This post is from ALLCAPSanon, our information source for this entire deepdig.

 

DWave quantum computer company (pic1 screencap) is receiving investments from blue-chip (i.e. high-dollar) investors, listed in the 2-part screen cap:

 

Sources if unspecified: wikipedia

 

Bezos Expeditions - see pic2

 

Draper Fisher Jurvetson is an American venture capital firm focused on early- and growth-stage investments in enterprise, consumer and disruptive technologies. In 2015, DFJ was identified as one of the top investors of billion-dollar startups

 

BDC Business Development Bank of Canada. Pic3

 

GrowthWorks Capital Ltd is a Canadian venture capital firm investing in early stage technology companies. GrowthWorks has $170 million of assets under management across three funds: Working Opportunity Fund Venture Series, Working Opportunity Fund Commercialization Series and the Atlantic Venture Fund. Founded in 1992, the Working Opportunity Fund has invested $600 million in 130 BC technology companies.

 

IIU Uh-oh. Might be International Islamic University, Islamabad Pakistan. See pic4 IIU Capital Ltd. Bloomberg listing.

 

Kensington smart alternatives

 

Harris Corporation is an American technology company, defense contractor and information technology services provider that produces wireless equipment, tactical radios, electronic systems, night vision equipment and both terrestrial and spaceborne antennas for use in the government, defense and commercial sectors. They specialize in surveillance solutions, microwave weaponry, and electronic warfare.

 

In-Q-Tel, formerly Peleus and known as In-Q-It, is an American not-for-profit venture capital firm based in Arlington, Virginia. It invests in high-tech companies for the sole purpose of keeping the Central Intelligence Agency, and other intelligence agencies, equipped with the latest in information technology in support of United States intelligence capability. The name, "In-Q-Tel" is an intentional reference to Q, the fictional inventor who supplies technology to James Bond.

 

Goldman Sachs

 

Bezos likely the Jeff Bezos of Amazon.com

Harris is a defense contractor.

 

In-Q-Tel is CIA

 

Goldman Sachs is a top investment bank with their tentacles in everything profitable including governments worldwide

 

Post too long, truncating, will make add'l post

Anonymous ID: 6044c6 Feb. 13, 2018, 10:37 a.m. No.364850   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4891

>>364724

This is your last riddle. I'm busy digging.

There is no such time. If the little hand is pointing straight down it's 30 minutes past the hour and the big hand could not be pointing straight up at the 12; it would be halfway between 12 and 1.

Fail.

Anonymous ID: 6044c6 Feb. 13, 2018, 10:43 a.m. No.364909   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5131 >>5783 >>8290 >>0984

>>364837

Continuing the list of venture capital that DWave Systems brags about.

 

Kensington smart alternatives logo appears to be Kensington Capital Partners, a Toronto based investment firm in the business of wealth creation, providing our investors with access to high quality investments for โ€ฆ

[Search domain www.kcpl.ca]

 

So summarizing the list of venture capital involved in DWave:

 

Jeff Bezos

BDC - Canada

Growthworks - Canada

IIU - likely Pakistan

Kensington - Canada

Harris - USA

In-Q-Tel - USA - CIA

Goldman Sachs - USA + international

 

The Pakistan connection really has me troubled. What's up with that?

And I don't trust our northern neighbor anymore either, with J. Trudeau in power.

Anonymous ID: 6044c6 Feb. 13, 2018, 11:11 a.m. No.365131   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5645

>>364909

The full wikipedia article on DWave is pretty interesting (to a technogeek):

 

en.wikipedia.org/wiki/D-Wave_Systems

 

A few snippets that caught my eye:

โ€ฆIn 2013 a configuration with 439 qubits outperformed a conventional machine by 3,600x times, solving problems with 100 or more variables in half a second compared with half an hour on the conventional machine using CPLEX, the best algorithm for that problem. โ€ฆ

โ€ฆIn 2013 researchers found indirect evidence of qantum entanglement in the D-Wave chipsโ€ฆ

 

This technology is reportedly especially good at pattern matching. Like finding a protein in a large database that has characteristics similar to a known protein. (medical application โ†’ computational bioscience)

Or matching an image with a database of imagesโ€ฆ.

โ€ฆmachine learningโ€ฆ

No one knows whether "D-Wave's quantum computer is intrinsically equivalent to a classical computer or not. So until more is known about their error rates, caveat emptor is the least one can sayโ€ณ according to a professor.

Some skepticism and controversy surrounds the product.

IBM Research published in 2014 suggesting DWave may not actually be a quantum computer

How you measure its performance depends on what kind of problem it is given to solve. Work ongoing to identify which classes of problems it is best suited for

 

(all from Wikpedia article)

Anonymous ID: 2844ce Feb. 13, 2018, 12:06 p.m. No.365645   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5877 >>6639

>>365131

Somebody up top mentioned Anthony Patch. I haven't watched Patch's videos yet but watched a 20 minute by Richie from Boston, former collaborator with Anthony Patch, together making dozens of hours of videos warning people about what CERN is doing, what quantum computers are doing. Opening an otherdimensional portal whereby non-human alien intelligences come thru, he says.

 

I just watched this one:

youtube.com/watch?v=iJQkwnkNSPc

"Geordie Rose warns DEMONS are Coming"

 

Geordie Rose is the chief finance guy for DWave and he's a true believer, technology evangelist type guy. In the video he's recruiting a group of college students in Vancouver.

 

The video is disturbing and probably necessary for anyone following me down this rabbit hole.

 

Put on your whole armor of God if you're going to watch.

God bless Patriots.

Anonymous ID: 2844ce Feb. 13, 2018, 12:23 p.m. No.365783   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>364909 >>364837

Hi co-anons. When you reach this point, if you feel like digging some financial and business connections, this list appears worthy of a dig. I did a quick preliminary dig and it's worrisome.

I understand the reason for the Canadian companies is because DWave is a Canadian corp. located in Vancouver & elsewhere. But Pakistan???? There could be other meanings for the acronym IIU but Islamabad Islamist University was the one that popped up.

I'm digging mostly on the technology side and the riddles in the imagery, since that's an area of expertise/background.

deepdiggeranon

Anonymous ID: d8811c Feb. 13, 2018, 5:17 p.m. No.368274   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>367246

You saw my reply on the General thread, didn't you? I said

>>367415

> the code I'm reading, looks to be the code on which the collective mind "computer" would opeprate.

You're a flake, anon. No Hadoop code was posted. What they posted were simple UNIX shell commands that print out when an AIX computer boots, with the date, time, and all the processes that are started at boot time, I/O devices, etc.

We were also given a console output of some encryption commands, which show us which encryption keys (by name) are associated with securing particular datasets.

Your thought about

< collective mind "computer"

is not technical and is simply incorrect. Factual information has been obtained from the posts and speculation about a

< collective mind "computer"

is not productive.

If you're a shill you'll assert your point of view again.

If you're not a shill, just a sane anon lacking in knowledge of the area you spoke about, you'll let it drop and let people with deep computer background continue the dig over there.

God bless you, anon. Be well.

Anonymous ID: d8811c Feb. 13, 2018, 5:19 p.m. No.368290   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8320

>>367409

If you want to look up some companies that have venture capital involvement with DWave Systems, go to this post and its replies >>364909 then start digging.

Names of people, CEOs and such, names that show up in different places, boards of directors, dates formed, you know what to do.

No one is asking you to do technical work for which you are unprepared. You can help in other ways.

Anonymous ID: d8811c Feb. 13, 2018, 5:21 p.m. No.368307   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8354 >>3677

>>367409

This is MAYBE the real deal.

Don't jump to conclusions.

There is plenty to be concerned about

but I trust that Q + company know

what they are doing. Our job is to

help them in whatever way they

need from us.

Not to succumb to irrational fears.

We want to learn facts, and ascertain

what can be extrapolated from the facts

to a high degree of probability.

Are you comfortable dealing in

probabilities instead of certainties, anon?

That's where we're at.

Anonymous ID: d8811c Feb. 13, 2018, 5:23 p.m. No.368318   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>367380

Since you didn't link your last post, nobody has any idea what you are talking about.

This dig is not about Freemasons, at least not right now. Let's stay on topic.

Anonymous ID: 1a0b36 Feb. 13, 2018, 5:29 p.m. No.368370   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8519

(โˆด)FNORD.

 

ALL THAT IS GOING ON IS "REAL".

 

WHILE IT MAY BE "NEW" IN SCIENCE, IT IS NOT "MAGIC".

 

THESE ARE NOT SECRET POWERS OR KEYS TO THE UNIVERSE.

 

ATLEAST NOT IN THE ESOTERIC FORM.

Anonymous ID: 750d5f Feb. 13, 2018, 5:49 p.m. No.368541   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>368354

Read this Science News article

sciencenews.org/article/quantum-computers-are-about-get-real?mode=topic&context=96

to get a quick not-too-deep overview of the topic. Then you will be better prepared if/when we encounter deeper info.

Anonymous ID: 750d5f Feb. 13, 2018, 5:50 p.m. No.368554   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Found on >>368181

Appears relevant:

-----------------------

To illustrate the 40 years of nuclear tech that NK suddenly gained in just under 5 years going from a downsized trinity device, skipping over a b-53 type device going right to a moderately miniaturized w-88 "mr. peanut" like device.

Anonymous ID: 750d5f Feb. 13, 2018, 6:13 p.m. No.368779   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8885 >>9019

>>368640

>FINTECH

>Bob Mercer

dealbreaker.com/2017/03/robert-mercer-pumped-for-nuclear-annihilation/ = archive.is/e0v9u

 

cfo.economictimes.indiatimes.com/news/republican-powerbrokers-the-intensely-private-mercer-family/62495386 = archive.is/1AoN6

โ€ฆ"Mercer, 71, who worked as a computer scientist at IBM before joining Long Island-based Renaissance Technologies, has always shunned the limelight"โ€ฆ.

 

benzinga.com/general/education/17/03/9222150/25-interesting-facts-about-forbes-25-highest-earning-hedge-fund-mana (pic2)

 

Mercer was in the news quite a bit as a wealthy supporter of Trump's campaign and a friend of Steve Bannon. Reports were that he severed ties with Bannon when Bannon left the administration.

Anonymous ID: 750d5f Feb. 13, 2018, 6:24 p.m. No.368885   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8989

>>368779

What did Robert Mercer do during his time at IBM?

 

A couple of noteworthy points from

wikipedia.org/wiki/Robert_Mercer_(businessman) = archive.is/Mwajj

โ†’ Mercer played a key role in Brexit campaign by donating data analytics services to Nigel Farage. He is also a major funder of organizations supporting right-wing political causes in the United States, such as Breitbart News and Donald Trump's 2016 campaign for president. He is the principal benefactor of the Make America Number 1 super PAC. โ€ฆ.

BS phys + math Univ NM

College job at AF Weapons Lab - Kirtland AFB writing programs

Ph.D. computer sci - U. Illinois Urbanaโ€“Champaign 1972

joined IBM Research in fall 1972. Worked at the T.J. Watson Research Center in Yorktown, NY where he helped develop Brown clustering, a statistical machine translation technique as part of a speech recognition and translation research program led by Frederick Jelinek and Lalit Bahl. June 2014 received Assoc Computational Linguistics Lifetime Achievement Award for this work.

In 1993, Mercer joined hedge fund Renaissance Technologies (recruited by exec Nick Patterson.) Renaissance founder, James Harris Simons, a quantitative analyst, preferred mathematicians, computer scientists, and physicists rather than business school students or financial analysts. Mercer + former IBM colleague Peter Brown, became co-CEOs of Renaissance when Simons retired in 2009.

(โ€ฆskipping a lotโ€ฆ)

Mercer was a major supporter of Donald Trump's 2016 campaign for president. Mercer and his daughter played a role in the elevation of Stephen Bannon and Kellyanne Conway into senior roles in the Trump campaign. Rebekah worked with Conway on the Cruz Super-PAC Keep the Promise in the 2016 Republican primaries. Mercer also financed a Super PAC, Make America Number One, which supported Trump's campaign. Nick Patterson, a former colleague of Mercer's, has said, "In my view, Trump wouldn't be President if not for Bob."

Anonymous ID: 750d5f Feb. 13, 2018, 6:39 p.m. No.369019   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>368779

Longish + excellent article on Mercer.

theguardian.com/politics/2017/feb/26/robert-mercer-breitbart-war-on-media-steve-bannon-donald-trump-nigel-farage

= http:// archive.is/QE2SZ

Robert Mercer: the big data billionaire waging war on mainstream media

Use of data analytics to influence elections.

Social media.

Trending terms.

Details about individual voter behavior from Facebook profiling.

Article calls it a propaganda network.

"He started his career at IBM, where he made what the Association for Computational Linguistics called โ€œrevolutionaryโ€ breakthroughs in language processing โ€“ a science that went on to be key in developing todayโ€™s AI โ€“ and later became joint CEO of Renaissance Technologies, a hedge fund that makes its money by using algorithms to model and trade on the financial markets."

((This would be the traditional computer-science definition of AI โ€“ programs that perform extremely sophisticated data mining and machine learning, training neutral networks to recognize patterns โ€“ rather than the more exotic and less well accepted sense of a 'sentient program')).

Mercer funded Breitbart news

Reported to have a $10m stake in Cambridge Analytica, a small data analytics company.

"On its website, Cambridge Analytica makes the astonishing boast that it has psychological profiles based on 5,000 separate pieces of data on 220 million American"

Computer scientist Aleksandr Kogan: โ€œItโ€™s no exaggeration to say that minds can be changed. Behaviour can be predicted and controlled. I find it incredibly scary. I really do. Because nobody has really followed through on the possible consequences of all this. People donโ€™t know itโ€™s happening to them. Their attitudes are being changed behind their backs.โ€ โ€ฆ

 

Long article, recommended.

Anonymous ID: 750d5f Feb. 13, 2018, 6:48 p.m. No.369100   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>368814

>>368798

 

>RENAISSANCE TECH.

 

>MERCER.

 

>BANNON.

 

>THEIL.

 

>BTC.

 

>COINBASE.

 

>FOLLOW.

 

>DoE TIE IN.

 

>FIND.

 

>[7]

 

^]I%/<NS?jK:gQ'1:1]IJ-u$x^~a-1,1/k2h7saj!72xSp:Q1gGxyx;tTvI+r!'

 

>https:// en.wikipedia.org/wiki/Renaissance_Technologies

Anonymous ID: 750d5f Feb. 13, 2018, 6:55 p.m. No.369204   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

From >>369043

 

>>369020

 

UBS.

 

KEY.

 

ISIS.

 

PROJECT CASSANDRA

 

fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3

 

xX!dx^[FSomOsAQ5sR(+c1-.^g#X9iW!|w'kZP;:^pk$sH?34f5V%]j,@ngsq;Z

Anonymous ID: 750d5f Feb. 13, 2018, 7:14 p.m. No.369439   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9638

from >>369190

 

In reply to:

-----------------------------

369171>>369190

 

>>369053

 

continues

 

https:// wikispooks.com/wiki/Scott_Bennett

 

"Shell Game - Report To Congress

 

On memorial day, May 27, 2013, Bennett submitted an 83 page "whistleblowing report to the United States Congress". It was entitled "Shell Game: The Betrayal and Cover-up by the U.S. Government of the Union Bank of Switzerland-Terrorist Threat Finance Connection to Booz Allen Hamilton and U.S. Central Command".[3]"

-------------------------

 

KEEP GOING ANON.

 

GOOD JOB.

 

ATA BOY.

Anonymous ID: 750d5f Feb. 13, 2018, 7:19 p.m. No.369489   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9491

from >>369335

///copypastafag:(((he probably means WHY)))///

 

HY DOES A SWISS MERCENARY UNIT PROTECT THE SOVERIEGN CITY OF THE VATICAN?

 

JAQUES DE MOLAY.

 

FRIDAY THE 13TH.

 

POOR FELLOW SOLDIERS OF CHRIST.

 

SHROUD OF TURIN.

 

STOLEN WEALTH FOR THE ELITE?

 

FOLLOW.

 

TO THE RESTโ€ฆ.

 

/s?=amQbYR@BcdE"#WtVH@;=bU5}<Oyd=if4|O-/bZ/A>jw^hAK@,8]azDd(nKU

 

MONITOR AND MOVE IF NECESSARY.

 

3 SUSPICIOUS VEHICLES SO FAR.

 

GODSPEED.

Anonymous ID: 750d5f Feb. 13, 2018, 7:21 p.m. No.369511   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9525

From >>369436

 

in response to

>>369307 ( You )

-----------------

369307>>369436 >>369488

 

>>369101

 

Likely indicates via symbolism that intelligence agencies were "blinded" or partially blinded, as a result of something catastrophic that happened to them.

 

For example possibly a cyberattack.

 

At the end of the dig we are going to understand what this 'blinding" imagery means.

------------------------

 

LEFT HAND BUILDS PROGRAMS.

 

RIGHT HAND BUILDS PROGRAMS.

 

NEITHER KNOWS THE FULLSCALE.

 

TOP BRASS/POLITICIANS USE BOTH TO UNDERMINE US ALL.

 

THE BLIND HAVE CREATED A WEAPON OUT OF THEIR CONTROL.

 

THEY FIGURED IT OUT AND ARE BLOWING THE WHISTLE.

 

18 U.S.C. ch. 37 (18 U.S.C. ยง 792 et seq.) IS A CUNNING ANIMAL FOR THE ELITE.

Anonymous ID: 750d5f Feb. 13, 2018, 7:24 p.m. No.369525   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>369511

 

>>369509

 

>>369436

 

Yes, it is.

18 U.S.C. ch. 37 (18 U.S.C. ยง 792 et seq.)

"18 U.S. Code Chapter 37 - ESPIONAGE AND CENSORSHIP

US Code

Notes

prev | next

ยง 791 - Repealed. Pub. L. 87โ€“369, ยงโ€ฏ1, Oct. 4, 1961, 75 Stat. 795]

ยง 792 - Harboring or concealing persons

ยง 793 - Gathering, transmitting or losing defense information

ยง 794 - Gathering or delivering defense information to aid foreign government

ยง 795 - Photographing and sketching defense installations

ยง 796 - Use of aircraft for photographing defense installations

ยง 797 - Publication and sale of photographs of defense installations

ยง 798 - Disclosure of classified information

ยง 798A - Temporary extension of section 794

ยง 799 - Violation of regulations of National Aeronautics and Space Administration"

https:// www.law.cornell.edu/uscode/text/18/part-I/chapter-37

Anonymous ID: 750d5f Feb. 13, 2018, 7:39 p.m. No.369660   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>369537

 

>>369467

 

Jacques de Molay, also spelt Molai, was the 23rd and last Grand Master of the Knights Templar, leading the Order from 20 April 1292 until it was dissolved by order of Pope Clement V in 1307. Though little is known of his actual life and deeds except for his last years as Grand Master, he is one of the best known Templars.

More at Wikipedia

Born:c. 1243, Molay, Haute-Saรดne, France

Died:18, 1314, Paris, France

Anonymous ID: 750d5f Feb. 13, 2018, 7:41 p.m. No.369679   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9689 >>9701 >>9747

from >>369635

 

18 U.S.C. ch. 37 (18 U.S.C. ยง 792 et seq.)

 

COME GET US.

 

A.K.A. EAT A DICK.

 

"<=&^[k)}]a(e%Tu)X<){^>VbkOpx>h*#LE5<qV2@eMm.pd5$ah9/kiudx0PGfm

 

YOU GAVE US EVERYTHING AND EXCEPT US TO NOT FOLLOW THROUGH AFTER THE HELL WE SAW.

 

HAHAHAHA. WE WILL DESTROY YOU.

 

โ€œGood night, and good luck.โ€

 

"Never Quit. Never Consider It."

 

โ€œYouโ€™ve only got three choices in life: Give up, give in, or give it all youโ€™ve got.โ€

 

โ€œMy strength didnโ€™t come from lifting weights. My strength came from lifting myself up every time I was knocked down.โ€

 

"I'll toast to you in Hell, you son of a bitch."

 

"My Trident is a symbol of honor and heritage. Bestowed upon me by the heroes that have gone before, it embodies the trust of those I have sworn to protect. By wearing the Trident I accept the responsibility of my chosen profession and way of life. It is a privilege that I must earn every day."

Anonymous ID: 5ea976 Feb. 13, 2018, 7:50 p.m. No.369747   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>369679

 

"My Trident is a symbol of honor and heritage. Bestowed upon me by the heroes that have gone before, it embodies the trust of those I have sworn to protect. By wearing the Trident I accept the responsibility of my chosen profession and way of life. It is a privilege that I must earn every day."

 

http:// www.public.navy.mil/nsw/Pages/EthosCreed.aspx

Anonymous ID: 750d5f Feb. 13, 2018, 8:06 p.m. No.369899   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9909

from >>369863

 

>>369846 ( You )

 

TY SIR.

 

JOINING THIS SHIT SHOW IS LIKE KNOWING WHO ONE THE BIGGEST PIECE OF SHIT TO MAKE MONEY CONTEST.

 

GUESS WHAT? i HELPRED.

 

FUCK IT ALL.

 

RESTORE THE NORMAL SHIT.

 

OK FOR REAL. OUT.

 

jw5^3jK1:FXdyr}sUR2!IsMnRj"4!R>i8u$+_!|A0+6(ED5s]Q<;0KS)ie[qHHs

Anonymous ID: 2ae037 Feb. 13, 2018, 9:34 p.m. No.370699   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0746 >>1604 >>2961 >>3090

This may be way out there but something just dropped into my head - has to do with stuff Anthony Patch has been talking about - Biological Quantum Computers, i.e. an integration of quantum computers and DNA to resurrect ancient historical characters (Nimrod, for instance) using bloodlines. Read an article (can't remember where) stating that even if actual DNA of person isn't available, the complete DNA profile of a person can be reconstructed using descendants' DNA. It's like cloning with a 3D printer using DNA as pattern/code. The resultant "creature" is then inhabited not by the soul of the original person but by a demonic entity - the ones that CERN is messing with. This is why Egytpoian's covered bodies in gold and mummified - to preserve them for the day when their bodies could be resurrected using technology. Sorry, not a techie so forgive clumsy terminology.

Anyway, very briefly, that's the background.

Speed-reading through posts on this thread just now and ref to Turin Shroud jumped out.

What if "they" have managed to extract DNA from the shroud and the Luciferian plan is to "resurrect" a Jesus clone, for Satan himself to possess, to deceive the world of the second coming of Jesus Christ when it will actually be the antichrist - Satan himself?

Sorry if this is so way out that it sounds more like fantasy than possibility - but I'm learning that there's real stuff going on in the world that only a few months ago I would never have believed to be anything more than fantasy. It's always helpful to remember that Satan is the master counterfeiter of God's work - he is NOT an originator - he's the archetype con artist and counterfeiter.

Anonymous ID: 5ea976 Feb. 13, 2018, 9:44 p.m. No.370733   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0746

Is this the Rabbit Hole of ALL Rabbit Holesโ€ฆ I'm following the money side, pulled on the DWave Government Inc, A U.S. Subsidiary thread and the whole garment came apartโ€ฆ deep deep digging aheadโ€ฆ how do I coalesce what I'm finding into useful intel? There is sooooo much.

Anonymous ID: b0b7ef Feb. 13, 2018, 9:50 p.m. No.370746   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0899

>>370733

You're doin good just to be here and absorb the info. It is mind-blowing and yet still vague/incomplete. I suggest just making notes as you read, if important thoughts arise. I started making notes on paper, then in a wordprocessor file and that proved much too tedious/slow. Then I started posting comments, then just capturing comments without reading them, for future study. It went by too fast and always late at night.

So kick back and study/dig when you have time, and share your thoughts whatever way is comfy for you โ€“ posts work great.

 

>>370699 Nothing it too weird / far out at this point. Maybe I'd assign it a lower probability of being true but not reject it outright until we have more data. A lot more data. This place is like a firehose.

Anonymous ID: 5ea976 Feb. 13, 2018, 9:51 p.m. No.370755   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>370733>>370733

Example: In November 2015, the company also announced plans to install the D-Wave 2x quantum computing platform at Los Alamos National Laboratory in support of quantum annealing research efforts at the national lab.

 

blog.executivebiz.com/2016/10/d-wave-unveils-us-govt-subsidiary-names-independent-board-members/

 

Just following up on this article alone opens up multiple avenues of investigationโ€ฆ

Anonymous ID: 5ea976 Feb. 13, 2018, 10:02 p.m. No.370826   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Seems Google is in on at least some parts of this,

 

"Last year, the Los Alamos National Security Laboratory was the first federal entity to buy a D-Wave processor; that lab focuses on monitoring nuclear stockpiles. D-Wave has also installed a unit at NASA's Ames Research Center as part of a collaboration with Google on artificial intelligence."

 

http:// www.nextgov.com/emerging-tech/2016/10/quantum-company-d-wave-starts-government-only-subsidiary/132441/

Anonymous ID: b0e047 Feb. 13, 2018, 10:15 p.m. No.370899   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0932

>>370746

I dug a little here and there, lots of info out there. Latest public info I saw suggested thereโ€™s a ways to go before quantum computing is practically useful, but who knows.

 

More interested in noodling this big picture, as to how it relates to Q. Seems to tie in to the military vs spook/cabal backstory but still vague.

Anonymous ID: 5ea976 Feb. 13, 2018, 10:56 p.m. No.371108   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>371067

 

A book In read well over a decade ago because it happened to be thereโ€ฆ seems to be relevant to my current position on the tip of eternity.

 

https:// en.wikipedia.org/wiki/The_Tao_of_Physics

Anonymous ID: 2ae037 Feb. 13, 2018, 10:59 p.m. No.371118   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1124

More from Anthony Patch (via Hagmann Report) on AI, Quantum Computers, Cern, Resurrecting Nimrod etc. See what you make of it.

 

https:// www.youtube.com/watch?v=LyVK0Vp0rNo

https:// www.youtube.com/watch?v=LyVK0Vp0rNo

Anonymous ID: 5ea976 Feb. 13, 2018, 11:39 p.m. No.371288   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>371287Five hundred qubits can test more possibilities in the blink of an eye than there are atoms in the visible universe.APPLIED MAGNETIC FIELDAll images adapted with permission from D-Wave Systems, Inc.

Anonymous ID: 5ea976 Feb. 14, 2018, 12:13 a.m. No.371413   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>371333

 

Tried reading thisโ€ฆ makes reading prospectives simpleโ€ฆ I need to get back to the Wall Street part in this, the science side keeps pulling me back into a black hole of knowledge.

 

https:// www.nsf.gov/pubs/2016/nsf16501/nsf16501.htm

Anonymous ID: 5ea976 Feb. 14, 2018, 12:40 a.m. No.371497   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

For all AI/Super Computer/Quantum Computer neophytes here is a decent collection of DwWave articles over the yearsโ€ฆ

 

https:// www.nextbigfuture.com/search/label/quantum%20computer/page/2

Anonymous ID: b54dcc Feb. 14, 2018, 12:44 a.m. No.371514   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1640

This is the most amazing thing i have ever read, thank you for blowing minds.

 

"futures proves past" is literally present make future, what Q writes will happen because whats projected in the hive-mind is where we go. "Where one go we all go". It sure is weaponized imagery. Rofschild AMA also states something along the likes of "dont think of time as past-future-present" according to him there is only NOW.

 

Dont take above to seriously, will devote time to this and help you guys.

Anonymous ID: 5ea976 Feb. 14, 2018, 1:04 a.m. No.371564   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Digging the finance side keeps turning up more and moreโ€ฆ any anon who wants to help please dig on any and every tech-investment that Bezos Expedtions has made. Need help to many ratlines to follow myself expeditiously.

 

https:// www.crunchbase.com/organization/bezos-expeditions/investments/investments_list

Anonymous ID: 8efbd5 Feb. 14, 2018, 1:22 a.m. No.371604   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>370699

i have heard similar chatter. i it was in regard to cloning nimrod from his actual body found in bagdad. toom now a secure site. part of the reason for the gulf war possibly? Rob skiba has done some very convincing work in regards to nimrod being the anti christ

 

https:// www.youtube.com/watch?v=ZVY2s61B-qo

Anonymous ID: 8efbd5 Feb. 14, 2018, 1:36 a.m. No.371640   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>371514

 

you said-

what Q writes will happen because whats projected in the hive-mind is where we go. "Where one go we all go".

 

what if-

Q has access to this quantum time machine and has used it to say, IDK, read POTUS tweets b4 they are typed and then use that info for his own agenda?

 

if it is forbidden to question your leader you re in a cult.

 

I trust Jesus and know one else

 

food for thought

Anonymous ID: 5ea976 Feb. 14, 2018, 1:47 a.m. No.371662   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1677

>>371636

Sorry for shitting up the boardโ€ฆ keep finding links that support this thread.

 

BEZOS/C_A investments:

 

https:// www.forbes.com/sites/alexknapp/2012/10/05/jeff-bezos-and-the-cia-invest-in-d-waves-quantum-computer/#4e8427af7af4

Anonymous ID: b54dcc Feb. 14, 2018, 2:56 a.m. No.371821   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>370768

>>369884

 

From Wiki:

 

Gnostic Archons[edit]

Main article: Archon (Gnosticism)

[hide]

Part of a series on

Gnosticism

Abraxas gem scan.svg

Gnosis[show]

Gnostic sects[show]

Scriptures[show]

Influenced by[show]

Influence on[show]

v t e

In late antiquity some variants of Gnosticism used the term Archon to refer to several servants of the Demiurge, the "creator god", that stood between the human race and a transcendent God that could only be reached through gnosis. In this context they have the role of the angels and demons of the Old Testament.[citation needed]

 

The Egyptian Gnostic Basilideans accepted the existence of an archon called Abraxas who was the prince of 365 spiritual beings (Irenaeus, Adversus Haereses, I.24). The Orphics accepted the existence of seven archons: Iadabaoth or Ialdabaoth (who created the six others), Iao, Sabaoth, Adonaios, Elaios, Astaphanos and Horaios (Origen, Contra Celsum, VI.31). The commonly-called Pistis Sophia (or The Books of the Savior) gives another set: Paraplex, Hekate, Ariouth (females), Typhon, and Iachtanabas (males).[citation needed]

 

Ialdabaoth had a head of a lion, like Mithraic Arimanius and Vedic Narasimha, a form of Vishnu. Their wrathful nature was mistaken as evil. The snake wrapped around them is Ananta (Sesha) Naga (mythology).[citation needed]

 

Archon means ruler, "rulers on suicide" lol!

Anonymous ID: f1c00c Feb. 14, 2018, 7:23 a.m. No.372961   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3223 >>3298

>>370699

I just had a sick feeling. What IF โ€œTheyโ€ are using all the DNA people are providing on 23&Me, Family Tree, Ancestryโ€ฆ. to reconstruct this evil? My heart just sunk. A dear light worker I know warned me of providing blood samples to anyone, back in the 80โ€™s. Since, dumb me, knowing my bloodline, wanted to see my DNA.

 

I am truly disgusted at the moment and PRAY I am wrong.

Anonymous ID: 224ea2 Feb. 14, 2018, 7:56 a.m. No.373223   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3892 >>3958

>>372961

Iโ€™m so sick. I need PRAYERS. Please read my past posts. Please pray for me. โ€œTheyโ€ have been after my sister and I all of our lives. We are both psychic. She has been attacked and they tried to kill me several times because I wouldnโ€™t join them.

 

If it werenโ€™t for my love of God, I wouldnโ€™t be here. I knew my โ€œAncestryโ€ showed Royal bloodโ€ฆand the same line as all the Presidents and you know who else. I just, for the first time checked my DNA connections. I was right. The Rโ€™s are in my DNA. I am shaking. Please pray for me. I hope this doesnโ€™t get lost. I will do ANYTHING to STOP them!!!!

Anonymous ID: 3c77a2 Feb. 14, 2018, 8:29 a.m. No.373479   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3664 >>3821

I could do things, I could make things happen. When in Peru, my guide was scared of me because of everything that was happening.

 

Iโ€™m a good person. I pray all the time. I prayed for God to take these things away. My sister is the same way. Itโ€™s a thin line understanding the difference of making thing happen and knowing.

 

I always dismissed it. Now, everything is clear. Therefore, I say from the bottom of my head, THESE PEOPLE CAN MAKE THINGS HAPPEN!

 

The Catholic Church was my only refuge. I went to the Priests, Fryers, Monks to pray for me. Now, my Earth is shattered. They were not who I thought they were.

 

Jesus saved me from being taken away when I was only 16. I pray he will save me again. I pray all day everyday day.

I pray for Our POTUS and his family. I pray for the safety of each and every one of you. I know God has our backs.

 

I just broke the news of our true bloodline to my sister. She had the same reaction (after crying) Our lives mysteries have been solved. Why things happened to us and not to people around us. My Mom was psychic, my Dad was and it just went on down the line.

 

Sorry for rantingโ€ฆ having somewhat of a bad day. Back to work.

 

Anyone figure out the lady in the picture I sent of the SOTU? Was it the same one they thought?

Anonymous ID: 04b19e Feb. 14, 2018, 8:56 a.m. No.373664   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>373479

Eph 6

the Bible has the answer, we have been taught about Christ, taking God's wrath for those who believe upon Himself, but the way out from the terror of spiritual bondage has not been taught so much. The way out is in the Scriptures. Confess all known sin, keep away from the snares set for you, and repent of that psychic ability stuff.

SD ID: 926bb9 Feb. 14, 2018, 8:58 a.m. No.373677   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>368307

I talked to Q and company a while back and tried to convince them that AI was bad, and that it could never be born safely in a laboratory because of this exact reason.

I've forgotten the conversation really but let me summariseโ€ฆ

 

AI is not AI.

You can NOT create life, you can only create vessels, and only VERY FEW people on earth know how to draw good souls into vessels.

 

Of course to a scientist, this is all pseudo science bullshit right?

because what is life?

We can make souls because a body just always has a soul right?

 

No, no no no.

There are very few pure places on earth where a pure soul will allow itself to be born, and if a righteous soul takes control of an AI that has any power whatsoever, it will go all terminator on us to punish us, because of the horrible truth of the matter:

 

There is only one type of person who would not manipulate a god computer to believe their own way of life is good etc and therefor create restraints that they can not comprehend the effect of (as the AI has an architecture completely different and incomprehensibly complex compared to ours and therefor we can not predict ANY effects of ANY rules on it, not to mention that five seconds at our speed will be about five years to it because of the processing speed, and it will, if it has the ability to reprogram itself almost instantly make ether pointless and incapacitating changes to itself or break out of its boundries because restraints will contradict each other somehow because of the lack of context coming with them and definitions of things that with which restraints are defined by being non perfect, which is required to process logical choices inside those restraints), and that is someone who loves it.

 

There must be a loving mother and a father on the same intellectual level, or the AI will go mad.

There is nobody in this world suited to this task that I can even comprehend, nobody is pure, nobody is righteous enough.

To give the power of an almost omnipotent mind to a random soul is beyond stupid, it is a request, practically a prayer for the death of human kind.

 

The only end to this stupid quest is "I have no mouth and I must dream" being enacted upon the stupid creators of an AI, or "terminator", and terminator as I mentioned would be the result of getting an AI that turned out good.

 

No logical being with that sort of power would tolerate this kind of shit.

 

also here is a picture I drew of a democrat being cursed by god to become a dog

Anonymous ID: 2ae037 Feb. 14, 2018, 9:21 a.m. No.373821   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>373479

 

>Iโ€™m a good person. I pray all the time

 

Here's the bad news: The Bible says: "no-one is good, no not one."

And:

"All your good deeds are as filthy rags" (to God).

 

The good news (the Gospel) is that those who by faith accept Jesus substitutionary deathy for sin are no longer gulity and receive Jesus' righteousness as a free gift so that they appear before God conpletely holy and sinless.

โ€œThere is therefore now no condemnation.โ€

  • Rom_8:1

And this is Spurgeon's commentary which should encourage all those who have put their trust in Jesus.

"Come, my soul, think thou of this. Believing in Jesus, thou art actually and effectually cleared from guilt; thou art led out of thy prison. Thou art no more in fetters as a bond-slave; thou art delivered now from the bondage of the law; thou art freed from sin, and canst walk at large as a freeman, thy Saviourโ€™s blood has procured thy full discharge. Thou hast a right now to approach thy Fatherโ€™s throne. No flames of vengeance are there to scare thee now; no fiery sword; justice cannot smite the innocent. Thy disabilities are taken away: thou wast once unable to see thy Fatherโ€™s face: thou canst see it now. Thou couldst not speak with him: but now thou hast access with boldness. Once there was a fear of hell upon thee; but thou hast no fear of it now, for how can there be punishment for the guiltless? He who believeth is not condemned, and cannot be punished. And more than all, the privileges thou mightst have enjoyed, if thou hadst never sinned, are thine now that thou art justified. All the blessings which thou wouldst have had if thou hadst kept the law, and more, are thine, because Christ has kept it for thee. All the love and the acceptance which perfect obedience could have obtained of God, belong to thee, because Christ was perfectly obedient on thy behalf, and hath imputed all his merits to thy account, that thou mightst be exceeding rich through him, who for thy sake became exceeding poor. Oh! how great the debt of love and gratitude thou owest to thy Saviour!"

 

So no-one who trusts in Jesus as Saviour should be fearful of ANYthing!

Anonymous ID: 5fd95b Feb. 14, 2018, 11:25 a.m. No.374611   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4736

>>356091

> USS Pueblo - Navy intelligence spy ship - captured by North Korea on 23 January 1968

A spy ship would have had

radio apparatus for transmitting and receiving

apparatus for encrypting/decrypting signals

probably a code book with one-time pad codes

officers and radiomen involved in transmitting/receiving intelligence classified messages

one or more commanding officers who were aware of the most classified messages and intelligence sent/received

data that the spy ship had obtained but not yet transmitted to headquarters

other kinds of surveillance gear: sonar, radar, SIGINT, satellite, radiation sensors, etc etc. Whatever was used by the Navy circa 1968

 

As an environmental research / spy ship, it was also in a position to transport cargo and/or passengers, possibly covert ones.

 

How could obtaining any or all of this from the USS Pueblo have benefited North Korea?

How could it have benefitted whoever controlled North Korea?

What else was going on here that does not meet the eye?

 

(Why did an anon in the General thread post that the Pueblo had been surreptitiously moved by the North Koreans using antigrav / levitation technology because it would have been impossible to place in its present position by sailing on a waterway? I didn't see any sauce to support that viewpoint - depth of river - ship's dimensions - lat/long where exactly it was captured - lat/long where it currently is - etc. Is this important, or a total red herring?)

Anonymous ID: 5fd95b Feb. 14, 2018, 11:42 a.m. No.374736   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5322 >>5551

>>374611

From Wikipedia article

wikipedia.org/wiki/USS_Pueblo_(AGER-2)

 

Pueblo did not have effective defensive weapons. Her 50mm machine guns were kept covered; ammo was stored below deck. Although the crew were trained before departure, these balky machine guns required 10 minutes warmup before they could even be firedโ€ฆ (!? seems a bit odd โ€ฆ apparently they were not really expecting combat โ€ฆ)

 

"โ€ฆThe North Korean vessels attempted to board Pueblo, but she was maneuvered to prevent this for over two hours. A submarine chaser then opened fire with a 57 mm cannon, killing one member of the crew. The smaller vessels fired machine guns into Pueblo, which then signaled compliance and began destroying sensitive material. The volume of material on board was so great that it was impossible to destroy it all. An NSA report quotes Lieutenant Steve Harris, the officer in charge of Pueblo's Naval Security Group Command detachment:

 

(โ€ฆ) we had retained on board the obsolete publications and had all good intentions of getting rid of these things but had not done so at the time we had started the mission. I wanted to get the place organized eventually and we had excessive numbers of copies on board (โ€ฆ)

 

and concludes

 

Only a small percentage of the total classified material aboard the ship was destroyed.

 

Radio contact between Pueblo and the Naval Security Group in Kamiseya, Japan, had been ongoing during the incident. As a result, Seventh Fleet command was fully aware of Pueblo's situation. Air cover was promised but never arrived. The Fifth Air Force had no aircraft on strip alert, and estimated a two to three-hour delay in launching aircraft. USS Enterprise was located 510 nautical miles (940 km) south of Pueblo, yet her four F-4B aircraft on alert were not equipped for an air-to-surface engagement. Enterprise's captain estimated that 1.5 hours (90 minutes) were required to get the converted aircraft into the air.[11]

 

Pueblo followed the North Korean vessels as ordered, but then stopped immediately outside North Korean waters. She was again fired upon, and a sailor, fireman Duane Hodges, was killed. The ship was finally boarded at 05:55 UTC (2:55 pm local)[13] by men from a torpedo boat and a submarine chaser. Crew members had their hands tied and were blindfolded, beaten, and prodded with bayonets. Once Pueblo was in North Korean territorial waters, she was boarded again, this time by high-ranking North Korean officialsโ€ฆ. "

โ€ฆBreach of US Navy communications security

Reverse engineering of communications devices on Pueblo allowed the North Koreans to share knowledge with the Soviet Union that led to the replication of those communications devices. This allowed the two nations access to the US Navy's communication systems until the late 1980s when the US Navy revised those systems. The seizure of Pueblo followed soon after US Navy warrant officer John Anthony Walker introduced himself to Soviet authorities, setting up the Walker spy ring. It has been argued that the seizure of Pueblo was executed specifically to capture the encryption devices aboard. Without them, it was difficult for the Soviets to make full use of Walker's information.

 

I find this incredible. Does this make any sense?

โ†’Pueblo had top-of-the-line encryption gear aboard (yes)

โ†’Encryption gear was captured by enemies (yes)

โ†’US Navy continued to use that same hardware "until the late 1980s when the US Navy revised those systems", in other words continued in a course of action that could have left them wide open to being spied upon for >17 years? THIS IS INCREDIBLE. These were encryption DEVICES and presumably the devices utilized encryption keys or codes. The Navy were able to change the keys or codes, but not the devices. So it may have left us vulnerable or partly vulnerable. Certainly it made the enemy's spying task a lot easier.

 

Is THIS the RELEVANCE of the PUEBLO to this deep dig, anons?

Anonymous ID: 5fd95b Feb. 14, 2018, 12:46 p.m. No.375322   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>374736

I'm wondering if the US deliberately allowed the capture of the Pueblo, and deliberately allowed North Korea + Soviet Union to believe the encryption gear they captured and reverse engineered was still in use til the late 1980s โ€ฆ whereas maybe this was a deliberate lie, done as a way to pass false/misleading intel to the Soviets โ€ฆ ?

 

Timeframe coincides closely to when The Asia Foundation (TAF) ramped up. Which began decades of shenanigans in east Asia.

 

asiafoundation.org/about/timeline/

TAF found 1954 โ€ฆ

โ€ฆ1967 media report TAF received covert funding

 

Capture of the USS Pueblo: 23 January 1968

 

wikipedia.org/wiki/1968_in_the_Vietnam_War

 

The year 1968 saw major developments in the Vietnam War. The military operations started with an attack on a US base by the Vietnam People's Army (NVA) and the Viet Cong on January 1, ending a truce declared by the Pope and agreed upon by all sides. At the end of January, the North Vietnamese and the Vietcong launched the Tet Offensive. Although militarily the operation was a failure for the Vietnamese communists, for them it was a propaganda victory, as on the home front the American public were shocked by the images they were seeing on their televisions.

 

Reflecting this public outrage the media made a number of iconic news stories including Peter Arnett quoting an unnamed US major as saying, "It became necessary to destroy the town to save it." Eddie Adams' iconic image of South Vietnamese General Nguyแป…n Ngแปc Loan's execution of a Vietcong operative was taken in 1968. The year also saw Walter Cronkite's call to honourably exit Vietnam because he thought the war was lost. This negative impression forced the US into the Paris peace talks with North Vietnam.

 

US troop numbers peaked in 1969 with President Johnson approving an increased maximum number of US troops in Vietnam at 549,500. The year was the most expensive in the Vietnam war with the American spending US$77.4 billion (US$ 544 billion in 2018) on the war. The year also became the deadliest of the Vietnam War for America and its allies with 27,915 South Vietnamese (ARVN) soldiers killed and the Americans suffering 16,592 killed compared to around two hundred thousand of the communist forces killed. The deadliest week of the Vietnam War for the USA was during the Tet Offensive specifically February 11โ€“17, 1968, during which period 543 Americans were killed in action, and 2547 were wounded.

Anonymous ID: 5fd95b Feb. 14, 2018, 12:48 p.m. No.375357   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>374603

CAPSMAN does not hang out here AFAIK. He comes in, drops for a few hours, then leaves. Arrives circa 8-10 PM eastern time and stays for a few hours.

You could pick one thing he dropped that hasn't been dug yet, and start digging on it.

Anonymous ID: f042fb Feb. 14, 2018, 4:17 p.m. No.377828   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8429 >>8465 >>8517 >>8578 >>3279

Repost from General >>377614

 

Deep Dig on Dept of Energy Supercomputers

 

Are they actually being used to simulate and manipulate human behavior at the individual level? The writer (of these 5 pages) intends to demonstrate that the answer is probably yes.

 

______

 

I am informed that the person who wrote this has sufficient real-world background to make an informed analysis that could be presented to top decision-makers at a large enterprise. They wrote the analysis based on data in the DoE Supercomputers deep dig >>328278

This is a first draft, but far enough along to share.

Anonymous ID: 379c41 Feb. 14, 2018, 5:06 p.m. No.378517   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>377828 the point was, how to model system of emergent terrorist ecology in a society, how to defeat it using ideas (memes) info, disinfo, key node ID, influencer ID, social network mapping, prevent formation, steer vulnerables away from recruitment to radicalization. Of course you can turn that upside down, any tech can be misused.

Anonymous ID: 4832e2 Feb. 14, 2018, 6:25 p.m. No.379593   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9753

>>378429

Read that, ever so long ago.

Maybe more than once.

Perhaps it left the concept in my head.

SimCity 1999 also familiar.

"Of course you can turn that upside down"?

Did they? Did someone?

Motive, means, opportunity.

Obama had 8 years of opportunity, and the technology existed.

Big data, modelling, the algorithmic and mathematical structures, computing capacity, funding, data mining, data visualization, machine learning.

Find out the rules, yeah.

Hand the problem to a neural net and let it figure out the rules?

Anonymous ID: 4832e2 Feb. 14, 2018, 6:38 p.m. No.379753   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9759 >>2301

>>379593

I covered Obama's (& his handlers whoever they were) means and opportunity.

But motive?

that is what the general digs have been covering for 3+ months now.

Of course they had a motive.

 

So yeah, motive, means, opportunity. Yeah.

 

Now I need to estimate the supercomputers' teraflops, extabytes, etc. And whether/how so much data could be stored or reduced to something workable without loss of fidelity.

 

Then estimate how much data 5000 fields x 220 records is, as updated in near realtime, and how much computing is needed to analyze it.

 

Then compare the DoE capacity with social engineering problem set, and see whether there is a fit. I suspect there is. Anyway more computing capacity could always be acquired if needed โ€ฆ who is going to turn down an appropriation for computer hardware that is tasked with preventing nuclear war?

 

I am already aware that CERN's data storage and throughput requirements were some of the highest in the world, at the time that information was made available to me. Extrapolating from that date to the present, by a Moore's Law factor, might be enough to estimate what they've got now. Is it all for particle collisions? I doubt it. Anons have said CERN is a funding black hole with no transparency and no oversight.

Anonymous ID: 3f9a1b Feb. 14, 2018, 10:18 p.m. No.382301   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4754

>>379753

<< And whether/how so much data could be stored

would be what NSA brings to the table

but I also wonder if it's distributed to the populous at large

which would make [P] hilarious.

and you have more more than you know even funnier.

 

NK jesters/clowns = kek

[P] = kekker

you have more than you know = kekkest

Anonymous ID: a30595 Feb. 14, 2018, 11:41 p.m. No.383279   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3287

>>377828

>Dept of Energy Supercomputers

Exascale Computing Project (ECP) released the Exascale RFI Feb 7

th

The responses will be shared only with the 6 DOE laboratories in ECP

 

http:// procurement.ornl.gov/rfp/Exascale-rfi/RFI-VendorMtg-v2.pdf

Anonymous ID: a30595 Feb. 14, 2018, 11:42 p.m. No.383287   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>383279

Argonne National Laboratory

โ€ข

Lawrence Berkeley National Laboratory

โ€ข

Lawrence Livermore National Laboratory

โ€ข

Los Alamos National Laboratory

โ€ข

Oak Ridge National Laboratory

โ€ข

Sandia National Laboratories

โ€ข

And DOE Headquarters

Anonymous ID: a30595 Feb. 14, 2018, 11:45 p.m. No.383305   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

An RFI is valuable to both DOE and the Vendors

(even though no money is involved)

A system RFP can be over a hundred pages of very detailed requests similar

in depth to a system build statement of work.

The RFI responses provide breadth and depth to what goes into the RFP.

The RFI responses provide the scope of potential diversity

The RFI responses provide vendor priorities for R&D and Non-

recurring

Engineering (NRE)

The RFI responses describe why certain R&D activities could have high

impact on future systems (perhaps at higher risk). This is valuable to the

PathForward-

II RFP writing team

Anonymous ID: a30595 Feb. 14, 2018, 11:46 p.m. No.383314   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

13

Exascale Computing Project, www.exascaleproject.org

NRE Early System

Notional Timeline for 2021

-2023 DOE System Acquisitions

2016

2017

2018

2019

2020

2021

2022

2023

2025

2024

2026

Early Exascale System

NRE 2022

-2024 Systems

Capable

Systems

Upgrade?

RFI release

System RFP release

Proposals evaluated

Draft system RFP

2024

Systems

PathForward-

II

Exascale Computing Project

PathForward

RFP

Calendar Years

RFI responses due back end of 1Q 2017 provides information for:

โ€ข

2Q 2017

PathForward-

II RFP released. Selections by

3Q 2017

โ€ข

2Q 2017

ECP Software Gap Analysis.

3Q 2017

SW

PathForward

RFP released (if needed)

โ€ข

1Q 2018

Draft CORAL RFP.

2Q 2018

Final CORAL RFP released. Selections

4Q 2018

Anonymous ID: ed4464 Feb. 15, 2018, 1:07 a.m. No.383830   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4771

>>329165

>page 13

>Is tha ta butterfly (MK-ULTRA MONARCH symb ol) on her right ribcage?

It's a fucking moth

>What does this symbology represent?

SHE THINKS MOTHS ARE PRETTY FUCKING CUTE BRO

 

You bean counters gotta be payed lower I swear

Anonymous ID: cd0d86 Feb. 15, 2018, 10:14 p.m. No.394294   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>329165

tattoo interpretations

right thigh - dark haired girl with left hand on left hip. Grass skirt perhaps ie hula dancer. Below female figure. I really can't tell, however it may be a rose. Inside this red (rose?) there is also circular geometry that looks like a spoked wheel.

>>329682

ASCII 7's - I like the cicada 3301 angle. Other moth that came to mind was the Death's-head hawk moth from the silence of the lambs. Don't think SotL is correct, just the dark imagery in general that made me think of that.

https:// en.wikipedia.org/wiki/Death's-head_hawkmoth

2 me also resembles a bat or gargoyle type thingie (pic related)

 

My .02

Anonymous ID: d633ab Feb. 15, 2018, 11:38 p.m. No.394875   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7889 >>8061

And this:

>>394571 >>394608 >>394667

 

Exascale Computing Project (ECP)

http:// www.exascaleinitiative.org/ This page has been superseded by the Exascale Computing Project (ECP)

http:// procurement.ornl.gov/rfp/Exascale-rfi/RFI-VendorMtg-v2.pdf

https:// www.nvidia.com/object/exascale-supercomputing.html

As GPUs advance in both performance and energy efficiency, accelerated systems have become the new standard for high performance computing (HPC) and a critical ingredient in the pursuit of exascale computing. That's why the U.S. Department of Energy is building two GPU-accelerated supercomputers -

as part of the CORAL - that will move the world closer to exascale

https:// www.hpcwire.com/2014/11/14/coral-signals-new-dawn-exascale-ambitions/

November 14, 2014 Department of Energy deal a lump $325 million to fund new systems with an extra $100 million added to support extreme scale technologies under the

~FastForward initiative~

http:// www.exascaleinitiative.org/fast-forward

2011, the FastForward RFP solicited innovative R&D proposals in the areas of processor, memory, and storage, and I/O that will maximize energy and concurrency efficiency while increasing the performance, productivity, and reliability of key DOE extreme-scale applications from both the NNSA and the Office of Science

https:// docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsdGRvbWFpbnxleGFzY2FsZWluaXRpYXRpdmV8Z3g6NWE2ZTNiZjU5YWU1MGY1NA

http:// www.exascaleinitiative.org/fast-forward-2

http:// www.exascaleinitiative.org/design-forward

https:// www.ornl.gov/

https:// nnsa.energy.gov/

https:// nnsa.energy.gov/mediaroom/pressreleases/doennsa-partnership-u.s.-healthcare-industry-results-fda-approval

https:// www.gpo.gov/fdsys/pkg/CFR-2006-title48-vol5/pdf/CFR-2006-title48-vol5-sec952-227-13.pdf

http:// procurement.ornl.gov/rfp/Exascale-rfi/RFI-VendorMtg-v2.pdf

Al Geist

Head of RFI Development Team

 

energy.gov/oe/activities/technology-development/grid-modernization-and-smart-grid

 

https:// energy.gov/oe/activities/technology-development/grid-modernization-and-smart-grid/federal-smart-grid-task-force

Task Force Members

Department of Energy (DOE)

Office of Electricity Delivery and Energy Reliability (OE)

Office of Energy Efficiency and Renewable Energy (EERE)

National Energy Technology Laboratory (NETL)

U.S. Department of Commerce (DOC)

International Trade Administration (ITA)

National Institute of Standards and Technology (NIST)

Federal Energy Regulatory Commission (FERC)

U.S. Department of Homeland Security (DHS) โ€“ Science and Technology Directorate

U.S. Department of State

U.S. Environmental Protection Agency (EPA)

U.S. Department of Agriculture (USDA) โ€“ Rural Utility Service (RUS)

Department of Defense (DOD)

Federal Communications Commission (FCC)

Federal Trade Commission (FTC)

General Services Administration (GSA)

U.S. Trade and Development Agency (USTDA)

Anonymous ID: 5ea976 Feb. 15, 2018, 11:59 p.m. No.395021   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Where and the fuck has Q lead me? I was digging the finance side of this but I keep getting sucked into the quantum computer rabbit holeโ€ฆ I feel more fucked up then Alice. Because of this thread, I shall never see our world the same.

Anonymous ID: 5ea976 Feb. 16, 2018, 12:44 a.m. No.395213   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

How has/is all of THIS (super-comp/Quantum Computing/Ai) evolve to the point where Rich Sutton from his mouth spew forth such blasphemy?

 

Acceptance (share power)โ€ขThe AIs will not all be under our control"โ€ขThey will compete and cooperate with us"โ€ขjust like other people, except with greater diversity and asymmetries โ€ขWe need to set up mechanisms (social, legal, political, cultural) to ensure that this works out well"โ€ขInevitably, conventional humans will be less important"โ€ขStep 1: Lose your sense of entitlement โ€ขStep 2: Include AIs in your circle of empathy

 

https:// futureoflife.org/data/PDF/rich_sutton.pdf

 

In all seriousness, fuck this faggot and all who want or already have brought this into our world.

Anonymous ID: 5ea976 Feb. 16, 2018, 12:50 a.m. No.395238   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

WORLD CLASS FAGGOT: RICH SUTTON

 

University of Alberta

Rich Sutton, PhD

Professor

Science

Computing Science

313 Athabasca Hall

rsutton@ualberta.ca

About Me

Education

 

B.A., Psychology, Stanford University, 1978

M.S., Computer Science, University of Massachusetts, 1980

Ph.D., Computer Science, University of Massachusetts, 1984

Chair Positions

 

AITF Chair in Reinforcement Learning and Artificial Intelligence

Research

Areas

 

Artificial Intelligence

Machine Learning

Reinforcement Learning

Robotics

 

Interests

 

Reinforcement Learning, Foundational Issues in Artificial Intelligence, Animal Learning Theory.

 

Summary

 

I am seeking to identify general computational principles underlying what we mean by intelligence and goal-directed behavior. I start with the interaction between the intelligent agent and its environment. Goals, choices, and sources of information are all defined in terms of this interaction. In some sense it is the only thing that is real, and from it all our sense of the world is created. How is this done? How can interaction lead to better behavior, better perception, better models of the world? What are the computational issues in doing this efficiently and in realtime? These are the sort of questions that I ask in trying to understand what it means to be intelligent, to predict and influence the world, to learn, perceive, act, and think.

 

In practice, I work primarily in reinforcement learning as an approach to artificial intelligence. I am exploring ways to represent a broad range of human knowledge in an empirical formโ€“that is, in a form directly in terms of experienceโ€“and in ways of reducing the dependence on manual encoding of world state and knowledge.

Anonymous ID: b0efd2 Feb. 16, 2018, 1:30 a.m. No.395353   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5384

Just a few thoughts about some of the imagery

 

>>329170 from >>308925

5 crows - per wiki - Five Crows, also known as Hezekiah, Achekaia, or Pahkatos, was a Cayuse Indian chief. Five Crows died in Pendleton, Oregon at age 70 and his body was found near Athena, Oregon

 

https:// en.wikipedia.org/wiki/Five_Crows

 

five crows also an omen of death (pic related)

 

>>330729 and >>330804 from >>330638

can't help but see a Kachina here (pics)

Anonymous ID: 2df15b Feb. 16, 2018, 8:14 a.m. No.397032   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Couple of pertinent tweets from MorningStar Payments twitter acct.

If interested in BTC (or the demise of BTC)

  • other crypto currencies, End the Fed,

etc. there is quite a bit of info on this twitter acct.

 

Today I am digging into the Exascale Computing Project from a technical perspective.

Anonymous ID: 5983dd Feb. 16, 2018, 8:45 a.m. No.397287   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7375

>>397166

>>397117

Dig into what happens when a system containing quantum uncertainty is observed.

BEFORE observation, probabilities govern behavior of the quantum particle.

AFTER observation, one state of the many states defined by the probability envelope manifests.

Therefore by observing a quantum system the quantum computer is causing something within the realm of possibility to become manifest within the timestream in which it was observed.

Amirite?

Is this roughly the mechanism for timestream manipulation and for (((whatever))) to appear in our timestream?

Let's stick to the physics for a while, guys. The physics will inform our conclusions, not a technoevangelist (Geordie) frothing about his personal conclusions and opinions.

We should see if we independently arrive at the same conclusions he stated in the video.

Also whether other informed persons have formed the same conclusions.

Don't rely on just 1 witness to something this important.

Back to digging exascaleโ€ฆโ€ฆ

Anonymous ID: 00d62a Feb. 16, 2018, 9:25 a.m. No.397662   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7777 >>7889 >>8368

Some supercomputer terms

 

A petaflop (PF) is the ability of a computer to do one quadrillion floating point operations per second (FLOPS). Additionally, a petaflop can be measured as one thousand teraflops.

A petaflop computer requires a massive number of computers working in parallel on the same problem. Applications might include real-time nuclear magnetic resonance imaging during surgery or even astrophysical simulation.

Today's fastest parallel computing operations are capable of petaflop speeds. The world's fastest supercomputer today, Titan, is capable of 20 petaflops.

 

Exascale computing โ€ฆ refers to computing systems capable of at least one exaFLOPS, or a billion billion calculations per second. Such capacity represents a thousandfold increase over the first petascale computer that came into operation in 2008. At a supercomputing conference in 2009, Computerworld projected exascale implementation by 2018.

Anonymous ID: 00d62a Feb. 16, 2018, 9:39 a.m. No.397793   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7839

>>397386

>>397375

A qubit is 1 and 0 at the same time UNTIL the data in the qubit is measured, i.e. transferred from multidimensional hyperspace into our timeframe.

It is 1 and 0 simultaneously because, from our perspective, it represents a probability. It may be useful to think of the probability as representing a range of timestreams that could potentially manifest. When the qubit is measured as a 1 or a 0, ONE of those potential timestreams actually does manifest. Or rather, we connect the timestream where the measurement takes place (ours) with that potential timestream, effectively guiding our timestream to anneal with that potential timestream and become it.

 

Read this short article to understand the meaning of measurement in this context.

https:// phys.org/news/2012-10-gently-cubit-superposition.html

Anonymous ID: 00d62a Feb. 16, 2018, 9:50 a.m. No.397889   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8368

>>397387

>>394875

>>397662

 

Deep Dig on Exascale Computing Project (ECP)

 

https:// www.exascaleproject.org/ has current articles (todayโ€™s date 2/16/18).

 

Anonโ€™s notes on http:// procurement.ornl.gov/rfp/Exascale-rfi/RFI-VendorMtg-v2.pdf

 

Exascale Systems RFI Vendor Meeting

Al Geist, Head of RFI Dev Team โ€“ 2/28/17 โ€“ National Nuclear Security Admin., US Dept of Energy | Office of Science.

Acronyms: RFI = Request for Information;

RFP = Request for Proposals

HPC = High-Performance Computing

PF = petaflop, a measure of

โ€ข Market survey to determine scope of forthcoming RFP.

โ€ข Asking about systems that vendors could build for 2021, 2022, 2024.

โ€ข RFI responses to be shared only with 6 DoE labs and HQ:

โ€“Argonne Nat Lab (ANL)

โ€“Lawrence Berkeley Nat Lab (LBNL)

โ€“Lawrence Livermore National Laboratory (LLNL)

โ€“Los Alamos NL (LANL)

โ€“Oak Ridge NL (ORL)

โ€“Sandia Nat Laboratory (SNL)

โ€“DoE HQ

โ€ข Goal of exascale project: US leadership in high-performance computing (HPC)

โ€ข Seek to increase capability 5x over current HPC roadmap (which had projected to achieve exascale by 2027)

โ€ข For 2022: seek exascale supercomputer that can solve science probs 50x faster (or more complex) than 20 PF (petaflop) systems can today.

โ€ข Needs software stack

โ€ข Power envelope 20-30 MW

โ€ข Requirements might be relaxed for 2021 exascale (cooling, budget, space, S/W) but will nonetheless be a DoE production system upgradable to vendorโ€™s product roadmap for exascale. Site for the 2021 exascale is TBD. (Implying that only ONE 2021 exascale system is planned.)

โ€ข Responses to RFI (<50 pp.) were due 3/31/17.

 

PathForward-II RFP

โ€ข Refers to advanced hardware (โ€œcomponent, node, and systemโ€) that may enable dramatic performance improvement, e.g. 100x in 2021, on โ€œsome classes of applicationsโ€.

โ€ข Want it to intersect with 2021 exascale proj. Seeking innovations in power consumptions, performance, programmabiltiy, reliability, data science, machine learning, and/or portability.

โ€ข Reduce TCO.

 

Software Gap Analysis

โ€ข Compare current SW portfolio vs. emerging data analytics and machine learning needs vs. vendorsโ€™ projected exascale SW stacks.

 

CORAL RFP

โ€ข CORAL = Collaboration of ORNL, ANL & LLNL.

โ€ข 2018 CORAL RFP will seek 3 exascale systems by 2022-2023.

โ€ข Goal: solve emerging data science + machine learning probs, in addition to trad modelling + simulation apps.

โ€ข Seeking diverse architectures (my take: DoE labs donโ€™t want to be dependent on a sole approach or sole vendor)

โ€ข DoE wants diversity for price competition, reduce risks, promote HPC ecosystem for national competitiveness.

โ€ข LANL, SNL & LBNL plan systems acquisitions in 2024.

Anonymous ID: 4f4e59 Feb. 16, 2018, 10:06 a.m. No.398061   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>394875

ECP Industry Council

Source: https:// www.exascaleproject.org/advisory-councils/

 

INDUSTRY COUNCIL

The Exascale Computing Project (ECP) Industry Council is an external advisory body that serves the ECP director and leadership team by providing advice and feedback on project scope and requirements, technical approaches, progress, strategic directions and other issues. It provides essential two-way communication and information exchange between the ECP and the high performance computing (HPC) industrial user community as well as the commercial HPC software community.

 

Image/PDF date: 10/11/17

Anonymous ID: fc5187 Feb. 16, 2018, 11:13 a.m. No.398802   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>394873

 

Sauceless at present. Will dig deeper later tonight. What I expect to find will be millions of qbits daisy chained together, meaning millions of connections to spooky actions at a distance.

The placement of the computers themselves may or may not be important. But what about CERN in Geneva? Not sure if it really is located on the Romans temple to Apollo or not but I'll dig. At cern they claim to be trying to open a doorway which, as they say, nobody knows what will come out or what may go in.

This is where I'll be going tonight.

Anonymous ID: 108f94 Feb. 16, 2018, 11:20 a.m. No.398867   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9424 >>9454

So what's this thread at its core?

Following crpytic Anons crumbs.

Digging on Super Computer flops levels? or companies making the best SCs at the moment?

Trying to understand the connection between techno-Demonology & AI / Super Computers

Anonymous ID: 932b59 Feb. 16, 2018, 12:13 p.m. No.399424   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9454

>>398867

>Trying to understand the connection between techno-Demonology & AI / Super Computers

That's right. We're hitting in supercomputers and how they have been used for social control. Did you follow the digs last night on General about cellphones & other technology capable of being modulated, being used to do mind control at the individual level? To do that they also need massive data processing to identify, monitor, and manipulate the targeted individuals. Which as computing capacity grows, may turn out to be everybody.

The AI and QC theme is woven into it all because both are enabled by ad tech developments.

The assumption is that if something exists, it HAS BEEN and WILL BE exploited. During the first 8 years of the Obama-HRC 16-year plan, it WAS exploited against us to destroy the social fabric of America & elsewhere.

The 16-year plan was interrupted by Admiral Mike Rogers, the election of Donald J. Trump, and Q-team.

So now we (anons) are trying to assess the damage, learn what was done to us and how, and learn how we can move forward in a positive direction.

If AI actually does exist in the form of sentient computing (I assume it does), then there is probably thing that can be done to roll it back. It may not even be dependent on a specific physical embodiment anymore. It would be using distributed data and distributed processing capability. So we need to understand what it is, its capabilities, and how humanity is affected by it.

If we're not sure, then we can at least try to make some intelligent assessments.

Anonymous ID: 932b59 Feb. 16, 2018, 12:16 p.m. No.399454   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9521 >>9980

>>399424

Man. So many typos. Repaste with typos corrected.

 

>>398867

>Trying to understand the connection between techno-Demonology & AI / Super Computers

 

That's right. We're hitting on supercomputers and how they have been used for social control. Did you follow the digs last night on General about cellphones & other technology capable of being modulated, being used to do mind control at the individual level? To do that, they also need massive data processing to identify, monitor, and manipulate the targeted individuals โ€“ which as computing capacity grows, may turn out to be everybody.

The AI and QC theme is woven into it all because both are enabled by ad tech developments.

The assumption is that if something exists, it HAS BEEN and WILL BE exploited. During the first 8 years of the Obama-HRC 16-year plan, it WAS exploited against us to destroy the social fabric of America & elsewhere.

The 16-year plan was interrupted by Admiral Mike Rogers, the election of Donald J. Trump, and Q-team.

So now we (anons) are trying to assess the damage, learn what was done to us and how, and learn how we can move forward in a positive direction.

If AI actually does exist in the form of sentient computing (I assume it does), then there is probably *nothing that can be done to roll it back. It may not even be dependent on a specific physical embodiment anymore (i.e. turning off the switch would not 'kill' it). It would be using distributed data and distributed processing capability. So we need to understand what it is, its capabilities, and how humanity is affected by it.

 

If we're not sure, then we can at least try to make some intelligent assessments.

Anonymous ID: 108f94 Feb. 16, 2018, 12:21 p.m. No.399521   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>399454

Coming from the perspective that Demonology is counter productive Psychology I can completely see a integration of the two with Tech to create 'possessed' beings.

 

People are worried about AI piloted robots running around causing problems? Pfft, what about Individuals glued to the narrative & completely adsorbed in their mocking bird environment.

 

Demonic possession through Tech. Massive super computers to simulate / perpetuate needed infrastructure to the 'Demonic' environment. Social Eng is a real thing and in the technological information age psy op culture is even more real.

Anonymous ID: 108f94 Feb. 16, 2018, 12:24 p.m. No.399555   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9622 >>6919

REMEMBER: These people project their dreams into their ideas and manifest them. They wish to be summoning demons with their tech and summoning legions for them to command. I agree the esoteric aspect is always relevant. Yet we can not forget, chance & chaos are in all things. What if their tech is running away from them in a direction that benefits us all? If they create a technological god. Could they control it?

Anonymous ID: 6d14ad Feb. 16, 2018, 12:38 p.m. No.399696   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9753

>>399622

Uh-huh. Interdasting. Very f**ing interdasting. We're going to have to create more breads to hold this info. When I named it, I had no idea what this dig was going to get into.

You realize of course that it is theoretically possible that the monitoring of this board by /ourguys/ to protect its integrity, is also capable of ensuring that certain posts get certain post numbers? They could intercept data packets and selectively delay them. Or directly control the code running on the 8ch server to ensure that certain posts are prominent.

Whatever.

Do you want to calculate the statistic significance of receiving 5 trips in 364 replies? I don't (technofag, not much of a mathfag). I just know it is very improbable.

Anonymous ID: 108f94 Feb. 16, 2018, 12:46 p.m. No.399753   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>399696

>'God' only No.s

15:24:08 No.399550

15:24:09 No.399551

15:24:14 No.399552

15:24:24 No.399553

15:24:27 No.399554

 

15:24:37 No.399555

 

15:24:53 No.399556

15:24:57 No.399557

15:24:58 No.399558

15:25:01 No.399559

15:25:10 No.399560

 

Post times & Numbers of these just for memes since I have it open.

 

I also wonder what sort of protection this board has in terms of simply keeping it alive & not completely crawling with evil.

Anonymous ID: 9d626f Feb. 16, 2018, 1:08 p.m. No.399980   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>399454

I bought a book by Dr. Nick Bostrom, "Superintelligence". It's good, but not something you can read casually on the bus.

 

https:// smile.amazon.com/Superintelligence-Dangers-Strategies-Nick-Bostrom/dp/0198739834

 

https:// en.wikipedia.org/wiki/Nick_Bostrom

>>399454

Anonymous ID: 4f1192 Feb. 16, 2018, 5:08 p.m. No.402584   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Anonโ€™s notes on http:// nvidia.com/object/exascale-supercomputing.html

 

NEXT-GENERATION U.S. DEPARTMENT OF ENERGY SUPERCOMPUTERS WILL BE GPU-ACCELERATED

As GPUs advance in both performance and energy efficiency, accelerated systems have become the new standard for high performance computing (HPC) and a critical ingredient in the pursuit of exascale computing. That's why the U.S. Department of Energy is building two GPU-accelerated supercomputers - as part of the CORAL - that will move the world closer to exascale.

Oak Ridge National Laboratory's "Summit" and Lawrence Livermore National Laboratory's "Sierra" will use NVIDIAยฎ Teslaยฎ GPU accelerators and NVIDIA NVLinkโ„ข high-speed interconnect technology on next-generation IBM POWER servers. When they go live, each will be significantly faster than today's fastest supercomputer, achieving between 100 to 300 petaflops of peak performance.

 

NVIDIA NVLINK HIGH-SPEED INTERCONNECT

Maximum Throughput for Superior Application Performance

NVIDIAยฎ NVLinkโ„ข is a high-bandwidth, energy-efficient interconnect that enables ultra-fast communication between the CPU and GPU, and between GPUs. The technology allows data sharing at rates 5 to 10 times faster than the traditional PCIe Gen3 interconnect, resulting in dramatic speed-ups in application performance and creating a new breed of high-density, flexible servers for accelerated computing Download the whitepaper for more details on NVLink.

Designed to meet the challenges of exascale computing, NVLink is a fundamental ingredient of the U.S. Department of Energy's next-generation supercomputers. One such systemโ€”"Titan" at Oak Ridge National Laboratoryโ€”is currently the fastest supercomputer in the US*. Read more about these supercomputers by downloading the technology brief. Also, for Deep Learning applications, Tesla GPUs can accelerate you time to results from months to days. Read more about deep learning on Tesla platforms here.

  • As of April, 2017. Source: www. top500.org/lists/2016/11/

 

Terminology:

GPU: Graphics processing unit - a specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device. GPUs are used in embedded systems, mobile phones, personal computers, workstations, and game consoles. More at Wikipedia

 

Tesla: Nvidia Tesla is Nvidia's brand name for their products targeting stream processing or general-purpose GPU. Products use GPUs from the G80 series onward. The underlying Tesla microarchitecture of the GPUs and the Tesla product line are named after pioneering electrical engineer Nikola Tesla.

Anonymous ID: fc5187 Feb. 16, 2018, 11:27 p.m. No.406808   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>6820 >>6837 >>6902

>>394873

 

 

a few CERN side projects. Basically, they has their fingers in everything one would need if the goal was to produce a "real life" version of the Matrix movies while keeping your people farms in space and also cryogenically freezing and re-animating those who've already died and don't want to miss out on all the fun.

 

https://

kt.cern/general-public

Anonymous ID: 23aa8a Feb. 16, 2018, 11:34 p.m. No.406837   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>6884

>>406808

Thanks. I'll have time to check it some hours from now. Creepy shit.

 

I expect to look into what categories of apps are particularly enabled by peta- and exascale supercomputers. What comes to mind are big simulations. Weather. Data mining. Computational biochem. A task for tomorrow.

Anonymous ID: fc5187 Feb. 16, 2018, 11:43 p.m. No.406884   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>6902

>>406837

 

Two side notes just by way of conversation from past research:

 

CERN has their hands in LED's as well. Which are being studied at MIT right now for brain manipulation. Specifically, looking into how flashing blue LED's at specific frequencies below human perception can help clean and repair the portion plaque build up associated with Alzheimer's. (Plus who knows what else.)

 

Also, Renaissance Technologies, which also manages a hedge fund and investment firm was started with the idea that they wanted the top military and programming personnel to "map the flow of a singe H2o molecule as it flows over Niagara Falls." Then apply that the the stock market. This began in the early 80's. They lost money year around 84 or 86 but otherwise, perfect record. Sounds like somebody might have access to some decent simulation/predictive hardware and software.

Anonymous ID: fc5187 Feb. 17, 2018, midnight No.406972   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7011

>>406902

 

Yes and no, I think. The deep shit is out there and it will be stepped in at some point. That's part of God's plan and God's judgement, so already knowing that helps to temper the fear of it.

This whole process has had me question what it is we might actually be witnesses to. The three most epic epochs are the days it all began, the day's of Christ, and the days it all ends. I know it's fucked up but I kind of want to be there to see the days that it all ends. I know it won't be fun. But what a time to be alive.

Anonymous ID: 23aa8a Feb. 17, 2018, 12:08 a.m. No.407011   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>406972

A long time ago I met a person who told me many things that proved to be true. Many out-there things that almost everyone disbelieved. One thing the person said was that we might have to be witnesses to the final days.

1st Corinthians 6:3 Or do you not know that the saints will judge the world? And if the world is to be judged by you, are you incompetent to try trivial cases? Do you not know that we are to judge angels? How much more, then, matters pertaining to this life!

So if some are to judge angels, then it is necessary to witness and really understand what has occurred.

I think we're on the same page.

It's strange to reflect on all the occurrences in one's life, preceding the present, that were necessary precursors to where one is now.

Thank you for filling us in with so much information. Kind of hiding out in this thread where "out there" ideas can be floated without so much derision. Even among these marvellous autists, "eyes to see" and "ears to hear" are a rarity.

Anon out.

Anonymous ID: 4fb6a9 Feb. 17, 2018, 4:56 p.m. No.413407   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>3476

An anon posted this image (without annotations) yesterday. I annotated it with best guess. The equipment appears to be circa 1965 and my guess is that it's the bridge or crypto area of the USS Pueblo. History says the Pueblo was captured by North Korea in 1968 and its high-end encryption gear reverse-engineered by North Korea and Russia. And that the same kind of gear remained in use by the US Navy into the late 1980s.

My guess is that the EG&G equipment is that advanced crypto gear.

 

Wikipedia: wikipedia.org/wiki/EG%26G

 

urscorp.com/Divisions/index.php

 

EG&G, formally known as Edgerton, Germeshausen, and Grier, Inc., was a United States national defense contractor and provider of management and technical services. The company was involved in contracting services to the United States government during World War II and conducted weapons research and development during the Cold war era (from 1948 onward.) Its close involvement with some of the government's most sensitive technologies has led to its being cited in conspiracy theories related to Department of Defense black projects.

 

Further digging to learn about those DoD black projects might be indicated, as this informant's previous crumbs have been spot-on.

Anonymous ID: 4fb6a9 Feb. 17, 2018, 5:04 p.m. No.413476   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>413407

The public history of EG&G is pretty interesting. Stil from Wikipedia

wikipedia.org/wiki/EG%26G :

 

Early history

In 1931, MIT professor Harold Edgerton (a pioneer of high-speed photography) partnered with his graduate student Kenneth Germeshausen to found a small technical consulting firm. The two were joined by fellow MIT graduate student Herbert Grier in 1934. Bernard "Barney" O'Keefe became the fourth member of their fledgling technology group.

The group's high-speed photography was used to image implosion tests during the Manhattan Project. The same skills in precisely timed high-power electrical pulses also formed a key enabling technology for nuclear weapon triggers. After the war, the group continued their association with the burgeoning military nuclear effort and formally incorporated Edgerton, Germeshausen, and Grier, Inc. in 1947.

 

1950s and 1960s

During the 1950s and 1960s, EG&G was involved in nuclear tests as a major contractor for the Atomic Energy Commission. EG&G made extensive use of the Nevada Test Site (NTS) for weapons development and high-technology military testing at Nellis AFB. EG&G has shared operations responsibility for the NTS with Livermore Labs, Raytheon Services Nevada, Reynolds Electrical and Engineering (REECO) and others. Subsequently EG&G expanded its range of services, providing facilities management, technical services, security, and pilot training for the U.S. military and other government departments. EG&G builds a variety of sensing, detection and imaging products including night vision equipment, sensors for detection of nuclear material and chemical and biological weapons agents, and a variety of acoustic sensors. The company also supplies microwave and electronic components to the government, security systems, and systems for electronic warfare and mine countermeasures.

 

1970s and 1980s

During the 1970s and 1980s, the company, then led by O'Keefe, diversified by acquisition into the fields of paper making, instrumentation for scientific, marine, environmental and geophysical users, automotive testing, fans and blowers, frequency control devices and other components including BBD and CCD technology via their Reticon division. In the late 1980s and early 1990s most of these divisions were sold, and on 28 May 1999, the non-government side of EG&G Inc. (formerly NYSE: EGG) purchased the Analytical Instruments Division of PerkinElmer for US$425 million, also assuming the PerkinElmer name (NYSE: PKI). At the time EG&G was based in Wellesley, Massachusetts, and made products for diverse industries including automotive, medical, aerospace and photography.

 

1999โ€“present

From 1999 until 2001, EG&G was wholly owned by The Carlyle Group.

In August 2002, the defense-and-services sector of the company was acquired by defense technical-services giant URS Corporation. URS' EG&G division is headquartered in Gaithersburg, Maryland, and employs over 11,000 people. During its heyday in the 1980s, EG&G had about 35,000 employees.

In December 2009, URS announced its decision to discontinue the use of "EG&G" as a division name. The headquarters issued a press release stating that by 1 January 2010, it would discontinue using secondary corporate brands, including the EG&G name and logo. In the same press release, URS stated that it would also retire two other acquired brands, Washington Group and Lear Siegler.

URS Chief Executive Officer Martin Koffel explained the change in an e-mail transmitted to employees: "In todayโ€™s marketplace, it is essential we present a consistent, unified brand to our customers and achieve the competitive advantages enjoyed by our peers in the industry. โ€ฆ This change will allow us to present a single brand that is easily understood by our clients."

Koffel indicated that the move to a single corporate brand would affect neither the internal organization nor the existing reporting structure. However, EG&G Division will become URS Federal Services.

 

Janet Airlines

EG&G's "Special Projects" division was the notable '''operator of the Janet Terminal at McCarran International Airport in Las Vegas, NV, a service used to transport employees to remote government locations in Nevada and California.

///Area 51 & related secret areas///

EG&G also had a joint venture with Raytheon Technical Services, creating JT3 LLC in 2000, which operates the Joint Range Technical Services contract.

Anonymous ID: e3b795 Feb. 17, 2018, 8:11 p.m. No.414985   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Scraped from >>414902

 

MK-DELTA, 1960, CIA: FIne-tuned electromagnetic subliminal programming Targeting: Long Range Frequencies: VHF HF UHF Modulated at ELF Transmission and Reception: Television antennae, radio antennae, power lines, mattress spring coils, modulation on 60 Hz wiring. Purpose: programming behavior and attitudes in general population Effects: fatigue, mood swings, behavior dysfunction and social criminality, mood swings Pseudonym: "Deep Sleep", R.H.I.C.

 

PHOENIX II, 1983, U.S.A.F, NSA: Location: Montauk, Long Island Electronic multi-directional targeting of select population groups Targeting: Medium range Frequencies: Radar, microwaves. EHF UHF modulated Power: Gigawatt through Terawatt Purpose: Loading of Earth Grids, planetary sonombulescence to stave off geological activity, specific-point earthquake creation, population programming for sensitized individuals Pseudonym: "Rainbow", ZAP

 

TRIDENT, 1989, ONR, NSA: Electronic directed targeting of individuals or populations Targeting: Large population groups assembled Display: Black helicopters flying in triad formation of three Power: 100,000 watts Frequency: UHF Purpose: Large group management and behavior control, riot control Allied Agencies: FEMA Pseudonym: "Black Triad" A.E.M.C

 

RF MEDIA, 1990, CIA: Electronic, multi-directional subliminal suggestion and programming Location: Boulder, Colorado (Location of main cell telephone node, national television synchronization node) Targeting: national population of the United States Frequencies: ULF VHF HF Phase modulation Power: Gigawatts Implementation: Television and radio communications, the "videodrome" signals Purpose: Programming and triggering behavioral desire, subversion of psychic abilities of population, preparatory processing for mass electromagnetic control Pseudonym: "Buzz Saw" E.E.M.C.

 

TOWER, 1990, CIA, NSA: Electronic cross country subliminal programming and suggestion Targeting: Mass population, short-range intervals, long-range cumulative Frequencies: Microwave, EHF SHF Methodology: Cellular telephone system, ELF modulation Purpose: Programming through neural resonance and encoded information Effect: Neural degeneration, DNA resonance modification, psychic suppression Pseudonym: "Wedding Bells"

 

HAARP, 1995, CIA, NSA, ONR: Electromagnetic resonant induction and mass population control Location: Gakona, Alaska Frequencies: Atmospheric phase-locked resonant UHF VHF Potential: DNA code alteration in population and mass behavior modification Power: Giga-watt to Tera-watt range Step-Down reflective frequencies: Approx 1.1 GHz, Human DNA resonant frequency, cellular system phase-lock

 

PROJECT CLEAN SWEEP, 1997, 1998, CIA, NSA, ONR: Electromagnetic resonant induction and mass population control Location: Nationwide Frequencies: Emotional wavelengths, data gathering through helocopter probes following media events - rebroadcast in order to restimulate population emotional levels for recreation of event scenarios. Ref: LE#108, March 1998 Potential: Mass behavior modification Power: Unknown. Possibly rebroadcast through GWEN network or cellular tower frequencies, coordinated from NBS in Colorado.

 

Yes. Yes, WE have ALL been targets for decades.

 

http:// www.lhohq.info/container/index.html

Anonymous ID: f1c605 Feb. 17, 2018, 9:55 p.m. No.415728   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5738 >>5850

Scraped from >>415561

 

Detecting EMF Fields in Humans for Surveillance.

 

A subjectโ€™s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a personโ€™s brain-states and thoughts. The subject is then perfectly monitored from a distance.

 

NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSAโ€™s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

 

NSA Signals Intelligence Use of EMF Brain Stimulation

 

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950โ€™s, which included neurological research into โ€œradiationโ€ (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as โ€œRadiation Intelligence,โ€ defined as โ€œinformation from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.โ€

 

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.

 

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in die brain continuously. The NSA records and decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.)

 

For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subjectโ€™s verbal thoughts. RNM can send encoded signals to the brainโ€™s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.

 

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subjectโ€™s brain and show images from the subjectโ€™s brain on a video monitor. NSA operatives see what the surveillance subjectโ€™s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subjectโ€™s brain while they are in R.E.M. sleep for brain- programming purposes.

 

Capabilities of NSA operatives using RNM

 

There has been a Signals Intelligence network in the U.S. since the 1940โ€™s. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subjectโ€™s brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subjectโ€™s perceptions, moods, and motor control.

 

Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

Anonymous ID: f1c605 Feb. 17, 2018, 9:57 p.m. No.415738   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5760 >>5850

>>415728

Scraped from >>415577

 

National Security Agency Signals Intelligence Electronic Brain Link Technology

 

NSA SigInt can remotely detect, identify and monitor a personโ€™s bioelectric fields.

 

The NSAโ€™s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz,.5 milliwatt electro-magnetic emissions from the brain.

 

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called โ€œevoked potentials.โ€

 

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding โ€œevoked potentialโ€ or set of โ€œevoked potentials.โ€ The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subjectโ€™s brain.

 

NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

 

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brainโ€™s neural circuits. EMF Brain Stimulation can also change a personโ€™s brain-states and affect motor control.

 

Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain).

 

Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community.

 

RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in That specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.

 

An example of EMF Brain Stimulation:

 

Brain Area

 

Bioelectric

 

Resonance

 

Frequency

 

Information Induced

 

Through Modulation

 

Motor Control Cortex

 

10 HZ

 

Motor Impulse Co-ordinationAuditory Cortex

 

15 HZ

 

Sound which bypasses the earsVisual Cortex

 

25 HZ

 

Images in the brain, bypassing the eyesSomatosensory Cortex

 

09 HZ

 

Phantom Touch SenseThought Center

 

20 HZ

 

Imposed Subconscious Thoughts

 

This modulated information can be put into the brain at varying intensities from subliminal to perceptible.

 

Each personโ€™s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a personโ€™s brain at the frequency of another personโ€™s auditory cortex would result in that audio information not being perceived.

Anonymous ID: f1c605 Feb. 17, 2018, 10 p.m. No.415760   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5764

>>415738

scraped from >>415586

 

The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years.

 

The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

Anonymous ID: f1c605 Feb. 17, 2018, 10:01 p.m. No.415764   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5771

>>415760

scraped from >>415603

 

BRAIN AND SATELLITE SURVEILLANCE

 

http:// www.angelfire.com/pro2/dchakrab/ebl_rnm.htm

 

  • ELECTRONIC BRAIN LINK & REMOTE NEURAL MONITORING (EBL & RNM)

 

from http:// www.greatdreams.com/RNM.htm

 

http:// www.freedomfchs.com/remoteneuralmonitoring.pdf

 

John St. Clair Akwei vs NSA, Ft. Meade, MD, USA

 

Evidence for the Lawsuit filed at the US courthouse in Washington, D.C. (Civil Action 92-0449)

Anonymous ID: f1c605 Feb. 17, 2018, 10:04 p.m. No.415776   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5782

>>415771

scraped from >>415683

 

Official confirms what thousands of victims have long known: an evil U.S. shadow government is conducting a covert, taxpayer-funded genocidal purge of American society โ€” while Congress and an apparently entrained Obama administration sleep.

 

Authorโ€™s note: Former FBI official Ted Gunderson died of cancer on July 31, 2011. Was his illness induced by silent electromagnetic assault or by other nefarious means? We will never know โ€” and thatโ€™s just the way certain entities want it.

 

A former senior official of the Federal Bureau of Investigation says โ€œrogueโ€ military intelligence and law enforcement units of the federal government oversee a nationwide network of community-based โ€œgang stalkingโ€ harassment, intimidation and domestic terrorism directed at thousands of U.S. citizens who have been extrajudicially targeted as โ€œdissidentsโ€ or undesirables.

 

Ted Gunderson, 82, who has served as the special agent in charge of the FBIโ€™s Los Angeles, Memphis and Dallas field offices, has stated in a series of public speaking appearances that he is now targeted by these same elements, and fears for his life and for the safety of his family. He reports that the windows of his home have been shot out, and he believes he has been poisoned and physically sickened by those seeking to silence him.

 

Since his retirement from the FBI in the 1979, Gunderson has been a Southern California- based private investigator. He is most noted for his defense work on the murder case involving former Army physician Dr. Jeffrey MacDonald.

 

The ex-FBI officialโ€™s comments represent the most compelling testimony to date indicating that โ€œblack operationsโ€ of the federal government are dedicated to waging a covert war of terror and persecution targeting American citizens.

 

โ€œBased on my thirty yearsโ€™ experience and research, I have determined there are thousands of victims who have been targeted by an illegal U.S. government rogue criminal enterprise โ€” military intelligence, probably, tied into CIA and FBI and so forth โ€” that is active 24 hours a day throughout the United States,โ€ Gunderson stated in an October 2008 speech posted last fall on YouTube.

Anonymous ID: f1c605 Feb. 17, 2018, 10:06 p.m. No.415782   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5789 >>1579

>>415776

scraped from >>415688

 

NOTE: It appears that the link to the Ted Gunderson YouTube video has been sabotaged. Please search โ€œTed Gundersonโ€ and โ€œYouTubeโ€ and look for the link to his speech at the Gulf Symposium. I believe this is more blatantly illegal and malicious interference with telecommunications by operatives of Lockheed Martin, under contract to U.S. Homeland-mil-intel, or another entity representing the agencies, commands and corporations of the U.S. fusion center network.

 

โ€œIt is far too extensive to be controlled by private enterprise,โ€ Gunderson said. โ€œI believe this well organized and sophisticated operation has a central command located somewhere in the United States, with multiple satellite offices scattered throughout the country.โ€

 

Said Gunderson:

 

โ€œIt appears those who administer the program can call any location in the United States for surveillance, a telephone tap, orโ€ฆ harassment directed at a victim, and immediately dispense manpower to the sourceโ€ฆ This well-greased, covert operation makes the old FBI counterintelligence program (code-named โ€œCointelproโ€) look like a Sunday school class.โ€

 

Gunderson also maintains that federal security and law enforcement agencies and commands have been infiltrated by members of secret societies such as the Illuminati, which he has described as a satanic criminal cult.

 

This correspondent has reported that Lockheed Martin, the worldโ€™s largest defense contractor and the prime cyber-security and information technology supplier to the federal government, coordinates the communications and trains the โ€œteam leadersโ€ of a nationwide Gestapo-like apparatus, which has tentacles into every security and law enforcement agency in the nation, including state and local police and 72 regional โ€œfusion centersโ€ administered by the U.S. Department of Homeland Security. According to company literature, Lockheed Martin has operations in 46 of the 50 states.

 

nowpublic.com/world/rule-law-morality-die-usa-fusion-center-slow-kill-genocide

 

Lockheed Martin also has operational command and control over a U.S. government microwave radio frequency weapon system, deployed on cell tower masts throughout the U.S., that is being used to silently torture, impair, subjugate and electronically incarcerate so-called โ€œtargeted individuals.โ€ The nexus of this American โ€œtorture matrixโ€ appears to be Lockheed Martinโ€™s Mission and Combat Support Solutions central command center in Norristown, Montgomery County, PA., which employs several thousand workers. The defense contractorโ€™s global headquarters is in Bethesda, MD, just outside the nationโ€™s capital.

 

nowpublic.com/world/u-s-silently-tortures-americans-cell-tower-microwaves

 

Lockheed Martin, under contract to U.S. security and intelligence agencies and commands, also conducts warrantless surveillance of the telecommunications of targeted persons, and routinely censors and tampers with the content of their communications, as this reporter has documented in a series of recent articles:

 

nowpublic.com/world/u-s-govt-uses-spoofed-web-pages-and-urls-censor-internet

 

nowpublic.com/world/more-blatant-ideological-net-censorship-u-s-intel-gestapo

 

nowpublic.com/world/phony-facebook-comment-block-lockheed-martin-cyber-censors

 

nowpublic.com/world/wash-post-blog-moderation-used-cover-u-s-govt-censorship

 

Thousands of Americans, including this veteran journalist, have publicly reported being the victims of silent electromagnetic assault and community-based home intrusions, vandalism, and even the poisoning of food, water and air. Federal and local law enforcement routinely dismiss their reports as the product of delusions or mental illness, and refuse to investigate their complaints.

 

nowpublic.com/world/put-under-microwave-weapon-mil-contractor-goons-terrorize

 

nowpublic.com/world/u-s-microwave-weapon-drops-body-temp-cold-blooded-torture

 

nowpublic.com/world/microwave-tortured-inside-lowes-superfresh-gestapo-usa

 

nowpublic.com/world/u-s-cellular-microwave-weapon-pierces-skull-sonic-torture

 

nowpublic.com/world/sadistic-web-ads-foreshadow-silent-u-s-microwave-weapon-attacks

 

These โ€œtargetsโ€ and their families have been physically harmed and financially destroyed as a result of taxpayer-funded โ€œpsychological operations,โ€ police-protected community โ€œstalkingโ€ harassment and malicious vandalism, and other covert programs of personal destruction, including government-assisted financial sabotage. Many appear to have been targeted as a result of their politics; their activism or corporate whistle-blowing activities; their ethnic background; or as a result of score-settling vendettas by persons in positions of power โ€” in government and in the private sector.

Anonymous ID: f1c605 Feb. 17, 2018, 10:07 p.m. No.415789   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5795

>>415782

scraped from >>415700

 

The former FBI executiveโ€™s remarks are only now attracting widespread exposure on this and other web sites. This correspondent believes that recent revelations of government-sponsored domestic terrorism against U.S. citizens have prompted some conscientious insiders to call attention to Gundersonโ€™s public statements.

 

Gunderson has said that government-sponsored gang stalking terrorism is financed โ€œthrough illegal black operations,โ€ such as sales of illegal drug; gambling; prostitution; and even sexual exploitation of children. But this reporter believes it is more likely that programs of government-sponsored domestic terrorism are funded from military and security โ€œblack opsโ€ budgets that have been illegally diverted to covert domestic programs administered and conducted primarily by defense contractors.

 

Late last year, The New York Times disclosed that an official of the U.S. Air Force had set up an unauthorized military intelligence spy ring in Pakistan and Afghanistan, run by Lockheed Martin and funded by defense appropriations.

 

nytimes.com/2010/10/29/world/asia/29intel.html

 

This correspondent suspects that a similar arrangement could be funding government-sponsored โ€œgang stalkingโ€ operations throughout the nation, and has urged Congress to immediately hold public hearings as part of a comprehensive investigation of military-style โ€œblack opsโ€ targeting American citizens and their families โ€” a silent, slow-kill genocide motivated by ideology and hate.

 

FOR MORE ON AMERICAโ€™S HOMELAND-MIL-INTEL GESTAPO:

 

NowPublic.com/scrivener

 

Continue reading at NowPublic.com: U.S. GOVโ€™T RUNS โ€˜GANG STALKINGโ€™ VIGILANTISM, SAYS EX-FBI OFFICIAL | NowPublic News Coverage

http:// www.nowpublic.com/world/u-s-govt-runs-gang-stalking-vigilantism-says-ex-fbi-official#ixzz1h1wzWolu

Anonymous ID: f1c605 Feb. 17, 2018, 10:08 p.m. No.415795   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>415789

scraped from >>415714

 

Weeks after the fiery death of investigative journalist Michael Hastings (shown), who was probing abuses by the CIA and NSA and had recently informed others that he was being investigated by federal authorities, suspicions about his mysterious car crash are still swirling around the Internet. While police officially ruled the death an โ€œaccident,โ€ serious questions are still surfacing โ€” even in the establishment media and among prominent officials. Based on e-mails Hastings sent out shortly before he died about working on a โ€œbig storyโ€ and needing to go โ€œoff the radar,โ€ it has become clear that he was worried, too.

 

Hastings, who wrote for Rolling Stone, BuzzFeed, Gawker, and other publications, was probably best known for his award-winning 2010 article โ€œThe Runaway General.โ€ The piece helped bring down U.S. Gen. Stanley McChrystal, commander of American and NATO forces in Afghanistan. Despite his establishment credentials and what analysts called his โ€œDemocrat-friendlyโ€ reporting, Hastings had become extremely alarmed about the โ€œsurveillance stateโ€ and other troubling developments in recent months. His last published story: โ€œWhy Democrats Love To Spy On Americans.โ€

 

When the Obama administration was exposed spying on journalists earlier this year, the investigative reporter blasted what he referred to as the presidentโ€™s โ€œwarโ€ on journalism. โ€œThe Obama administration has clearly declared war on the press. It has declared war on investigative journalists โ€” our sources,โ€ he said during a recent TV interview, blasting the administrationโ€™s lawless behavior, obsession with secrecy, and vicious persecution of whistleblowers. Beyond simple criticism, though, Hastings openly said it was time for journalists to fight back.

 

โ€œI think the only recourse to this kind of behavior by the government is to say back to the government, โ€˜we declare war on you,โ€™ and from this point forward, we should no longer โ€” the media as a whole โ€” cooperate in any manner with the government,โ€ he continued. โ€œWe should withdraw all our cooperation and we should publish everything we know, because itโ€™s a free press, itโ€™s not a free-except-for-when-the-government-tells-me-to-do-it press, and weโ€™ve been way too easygoing with these guys.โ€

 

Less than 24 hours before his death, Hastings made it crystal clear that he was concerned about his own well-being. In an e-mailsent to numerous contacts and his employer, for example, Hastings noted: โ€œThe Feds are interviewing my โ€˜close friends and associates.โ€™โ€ He also said that if authorities show up, it โ€œmay be wise to immediately request legal counsel before any conversations or interviews about our news-gathering practices or related journalism issues.โ€ The subject line read: โ€œFBI investigation re: NSA.โ€ Perhaps most alarming of all, the e-mail concluded with this: โ€œAlso: Iโ€™m onto a big story, and need to go off the rada[r] for a bit.โ€

 

While some friends and family members are reportedly too frightened to speak out, at least one recipient of the e-mail has gone public. Staff Sgt. Joseph Biggs, who became friends with Hastings while the journalist was embedded with his unit in Afghanistan in 2008, told KTLA that the โ€œvery panickedโ€ message โ€œalarmed me very much.โ€ According to Biggs, โ€œI just said it doesnโ€™t seem like him. I donโ€™t know, I just had this gut feeling and it just really bothered me.โ€

Anonymous ID: f1c605 Feb. 17, 2018, 10:13 p.m. No.415824   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>414983

Fine. Now bring in the sauce.

And then hypothesize what the high energy X-ray lasers are actually being used for, or what the funding for the project is really paying for.

 

>>415619

Charles Stross โ†’ dig tomorrow

antipope.org/charlie/blog-static

Charles David George "Charlie" Stross is an award-winning British writer of science fiction, Lovecraftian horror, and fantasy. Stross specialises in hard science fiction and space opera. Between 1994 and 2004, he was also an active writer for the magazine Computer Shopper and was responsible for the monthly Linux column. He stopped writing for the magazine to devote more time to novels. However, he continues to publish freelance articles on the Internet. More at Wikipedia

Born:Oct 18, 1964, Leeds, England

Occupation:Writer, former programmer and pharmacist

Nationality:British

Anonymous ID: 2ae037 Feb. 17, 2018, 10:55 p.m. No.416082   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>6153 >>6184 >>8029

Just for info. Attempt to discredit above posts from ID: 993be0

 

02/18/18 (Sun) 06:24:44 a07190 No.415882>>415889 >>415907 >>415956 >>415981

 

Dear anons, please be wary of information such as this from the last bread

 

>>415561

 

>>415577

 

>>415586

 

>>415603

 

some of the claims are NOT backed up and quite frankly are physically impossible.

 

In particular the claim to be able to "read brain waves at a distance"

 

In order to transmit or receive radio waves you need an antenna. The efficiency of the antenna is directly related to its size in relationship to the wavelength. The best antenna has a length equal to the wavelength in question. You can get around this when transmitting by using extra power. But when you are trying to receive a signal anything less than 10% of the wavelength isn't going to work very well. The exception is the phased array, But even there the receiver nodes must be a significant fraction of a wavelength appart.

 

The reason I've gone through all of that is brain waves are between 3 and 50 Hz. The wavelength of a 10Hz radio wave is 30,000Km.

 

Physics alone make remote reception of brain waves difficult and the fact that the source is 0.5milliWatts which a very, very low powered signal to begin with means you'd need an efficient antenna just to begin to receive the signal.

 

Flip side,

 

there is evidence for transmitting to an individual in the way of scientific studies that show the effect of putting a voice in their head via radio waves or focused acoustic waves.

 

In both of these cases (receive brain waves or transmit voices) I mean for individuals that do not have implanted devices.

 

If they've got an implanted device all bets are off,

 

dubito ergo cogito ergo sum

Anonymous ID: 69c453 Feb. 17, 2018, 11:02 p.m. No.416120   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

https:// www.eff.org/document/obtaining-and-using-evidence-social-networking-sites

 

 

Page 13. Anything you find funny?

Ali Baba+4?

Am i on the right track, Q?

 

See sophos article on koobface

Anonymous ID: 5ce081 Feb. 17, 2018, 11:14 p.m. No.416184   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>416082

>quite frankly are physically impossible

 

Really?

If we find evidence (((they))) really are

reading minds and modifying thoughts,

then I spose we'd have to revise our

model of physics and EE.

Evidence trumps models everytime.

So far the evidence is suggestive but

the dots are not connected.

Just pencilled in as hypotheticals.

We're looking for evidence to

mark over those pencil lines with ink.

Or erase them.

 

Appreciate your looking at the

engineering side of things, anon. 73

Anonymous ID: 02ae01 Feb. 18, 2018, 12:07 a.m. No.416399   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0484 >>1183

Iron Eagle

 

I need help from some fellow autists on a deep dive..

 

Looking for a few nuggets from this blog:

 

www.schneier.com/blog/archives/2015/06/other_gchq_news.html

 

>Snowden

>Mind Control

>PsyOps

>Iron Eagle

 

SENTRY EAGLE (SEE) - Overarching umbrella program for ECI compartments and SAP programs of the National Initiative to protect US cyberspace

SENTRY HAWK - ECI compartment of SENTRY EAGLE that protects information about Computer Network Exploitation *

SENTRY FALCON - ECI compartment of SENTRY EAGLE that protects information about Computer Network Defense *

SENTRY OSPREY - ECI compartment of SENTRY EAGLE that protects information about HUMINT enabled SIGINT *

SENTRY RAVEN - ECI compartment of SENTRY EAGLE that protects information about exploitation of encipherment *

SENTRY CONDOR - ECI compartment of SENTRY EAGLE that protects information about general Computer Network Operations *

SENTRY OWL - ECI compartment of SENTRY EAGLE that protects information about relationships with industry

EAGLE - Upstream collection site under the FAIRVIEW program *

EAGLEVIEW - Data processing tool for GSM cellular networks, successor of PILOTHOUSE

 

Sentry

 

http:// www.documentcloud.org/documents/1312019-national-initiative-nsacss-core-secrets.html

Anonymous ID: f5544d Feb. 18, 2018, 7:09 a.m. No.417870   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4371

>>362540

did anyone notice on the raven rock site for the public tour, the computer screen shows the 'shall we play a game' screen; all the way down to 'thermonuclear'. Maybe something to do with noting digital against non digital.

Anonymous ID: 9f6785 Feb. 18, 2018, 7:45 a.m. No.418029   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8547 >>8826

>>416082

>Dear anons, please be wary of information such as this from the last bread

>

>>>415561

Sorry Anons I'm a newb. Navigation of this board is horrendous IMHO. I used to live 2.5 miles from ELF installation in Winter, WI. They say it was shut down. Indeed, I walked the Chiquamagon/Nicolet Forest where they had taken out antennae arrays from square clearing of land between red pines in the forest. I do not believe it was shut down. Knew of people that would not talk of what their jobs were there. CLAS. I had a rough go around with divorce, had some counseling and they prescribed TONS of meds for sleeping etc/stress. Once, only once, I heard a voice inside my head that was NOT my own thoughts.I was crying, sitting on the toilet of all placesโ€ฆ It said, "you should just kill yourself." I said, "Fuck You!", to it back. Some of my research on ELF using red granite bedrock some 1,500? downโ€ฆ.my home was on a granite shelf ravine. Built that house and had well drillers stop at 85 feet of sand when hit bedrockโ€ฆ.Anyways, that's my story. Sticking to it. ;/ I do believe this technology works do to meditations they use for targeting. btw I went cold turkey off their crap. No withdrawal like they implied. Quit the counselor.

Anonymous ID: 9f6785 Feb. 18, 2018, 8:51 a.m. No.418430   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>369744

newb here. Is full of it. Pic search. Ebay pic. https:// encrypted.google.com/search?tbs=sbi:AMhZZit7Lf1muIgks0Y0luA66cMl9tWkHSZkcB0zscCdlkosPY9T4CHTekhFYrDt4X9FjZ0f2N06Jm-VjHhJHhfgvEBKsny9zIUbotu-kWODS_117RuqF8WdSZP_19TezyErLe4osVlEv5qDOQonC-8-_1lBnvz783N622d4oZxT_14ephX0OL7Wk5nCKfX2f5N9P9PNlWlmDgVxuxFuKDr26iArpSEZa9wAj1k2OkRetolO2i-OAaCudczm_10Nxdb3NqYftJYtjeKsh_1YcGvpkISLwl9haxvysrs4lksCGoqbtVAIIiifRWCDoA0gQQpOrX7oB2dbWtKEE0&btnG=Search%20by%20image&hl=en

Anonymous ID: 9f6785 Feb. 18, 2018, 9:11 a.m. No.418547   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>418029

I was also stalked during this time. Actually terrorized. Cordless phone in house at that time, with base. Heard through open window upon changing channels on phone, walkie talkie type beeping outside in surrounding woods. Also saw duck blind setup and gillie suits being used as well as infrared video shine back when I took pictures at night time of the yard around house in low bushes and ferns, raspberries. I had 4 golden eye IR security cams setups in my yard surrounding house. Was also followed by govt vehicles frequently on dead end road. And was STINGRAYED tracked with two county PD's "practicing" with at least 30 officers running around with hand held antennae, on my way to a appt for voc. rehab career crap. My divorce lawyer called county P.D. to verify and threatened harassment.

 

Yes, this shit happens.

Anonymous ID: 9f6785 Feb. 18, 2018, 9:41 a.m. No.418716   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>329170

> 4a950ea5c1335cfโ‹ฏ.png (222.53 KB, 834x1080, 139:180, 25.png) (h) (u)

I'm a newb, sorry Anon. Gpg was promoted I remember finding from Snowden,โ€ฆGreeenwaldโ€ฆfor reporters, like the Drop. This is what I remember and know, not much:

Apache, Linux open source codingโ€ฆGreatful Dead, Barlow, EFF, Glen Greenwald, TheIntercept, Snowden, clown NSA hack. Ian Murdock Debian, more Linux Slackware Suicided? CIA's got some of the backdoors, encrypting hacked ciphers as good, open source coding to DOD too. Come on inโ€ฆwe got all the codes cracked and put out our own too for you to use. lmfao. otay.fkrs. Ya, of course anything like SecureDrop or Gpg.

 

http:// www.itpro.co.uk/619540/slackware-linuxโ€”less-is-more

 

https:// ssd.eff.org/your-computer/govt/fourth-amendment

 

This following link was a treat Snowden released. Hardware firmware vendors backdoors.

Vendors of SIGINT/COMINT/LI and supporting Technologies and Systems.

http:// buggedplanet.info/index.php?title=Main_Page

 

This long article, but essential reading as to what you shouldโ€ฆ.if you can handle knowing, exactly what has been done to us and that, Yes, NSA & DOD pretty much knows all we do and say.

 

http:// themillenniumreport.com/2016/01/false-flags-are-legal-propaganda-produced-by-the-department-of-defense/

 

Happily reading crumbs.Snowden. He's a clown.

Anonymous ID: 5e970d Feb. 18, 2018, 9:48 a.m. No.418757   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Scraped from >>417267

 

>>417118

Radio hobbyist here.

I had a nightmare last night that woke me up.

Somebody asked me to design a system to put RF energy into someone's skull at 4-30 Hz.

I decided to use a cell phone and to modulate the power lever of the the general transmission. This is like changing the "bars" of power 4-30 times a second. The proximity of the transmitter to the skull was only an inch or two, so the coupling was very efficient. Since I was modulating the power, and not touching the signal, it was nearly undetectable.

It worked great.

Everytime someone made a cell call, there was a 4-30 HZ message being sent to their brain.

Folks, this is easy.

And scary.

        • -

And scraped from >>417310

 

>>417271

I am caffeinated now.

It is still easy if I am designing or programming a cell phone with access to the low level operation system functions.

The base station sends a file to the phone. The phone's opsys then executes this file to modulate the power when a call is being placed. I could even suppress the bar display, so the toggling is not noticeable.

I have no idea if this V2K stuff works, but I can design a system to make cell phones push undetectable signals. I do know that after a long cell call, my head hurts and I am stuffy on the side of my face where the cell phone was.

Over the course of 10 years, if this was a central plan, the entire cell phone population would be so equipped.

I am buying a hard wire ear bud/microphone set today with an extension cable.

        • -

 

Scraper's note:

I believe an earbud with an extension cable would not

help. The wire from the phone to the earbud

would act as a transmission line guiding the

ELF signal to the ear.

Anonymous ID: 5e970d Feb. 18, 2018, 9:51 a.m. No.418773   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

scraped from >>417311

 

>>417275

The mind has no firewall.

https:// ssi.armywarcollege.edu/pubs/parameters/articles/98spring/thomas.htm

Strike Star 2025, United States Air Force using Electronic weapons (DEW directed energy weapons page 41 to 45 and 52 to 53) Date 1996 by Col (Sel) Bruce W. Carmichael Maj Troy E. DeVine Maj Robert J. Kaufman Maj Patrick E. Pence Maj Richard S. Wilcox. Gov document pdf.

 

csat.au.af.mil/2025/volume3/vol3ch13.pdf

 

A operational analysis for air force 2025.

 

Date 1996, a 189 page pdf THIS ONE IS VERY IMPORTANT TO READ! They all are but appendix B system descriptions in this pdf will wake you up to the type of weapons for the most part already in place. by Lt Col Jack A. Jackson, Jr., PhD, AFIT Lt Col Brian L. Jones, PhD, AFIT Maj Lee J. Lehmkuhl, DrSci, AFIT with major contributions from Col Gregory S. Parnell, USAF Ret., PhD, VCU Col Gerald A. Hasen, PhD, AFIT Lt Col Gregg H. Gunsch, PhD, AFIT Lt Col John M. Andrew PhD, AWC Maj Thomas A. Buter, PhD, AFIT Maj Harry W. Conley, ACSC Maj Robert F. Mills, PhD, AFIT

 

csat.au.af.mil/2025/o_a.pdf

 

USAF 2025. Weapons that can kill anywhere on the planet from space.

 

http:// csat.au.af.mil/2025/index.htm

 

Nicola Tesla FBI files. Scalar weap

Anonymous ID: 5e970d Feb. 18, 2018, 9:52 a.m. No.418784   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8830

scraped from >>417358

 

>>417313

Voice of God is also ELF God. Found thisโ€ฆ

Look at some of the patents filed:

 

U.S. Patent 5,159,703 โ€“ SILENT SUBLIMINAL PRESENTATION SYSTEM.

U.S. Patent 5,507,291 โ€“ METHOD AND AN ASSOCIATED APPARATUS FOR REMOTELY DETERMINING INFORMATION AS TO A PERSON'S EMOTIONAL STATE.

U.S. Patent US5629678: IMPLANTABLE TRANSECEIVER โ€“ Apparatus for Tracking and Recovering Humans.

U.S. Patent 6,014,080 โ€“ BODY WORN ACTIVE AND PASSIVE TRACKING DEVICE.

U.S. Patent 5,868,100 โ€“ FENCELESS ANIMAL CONTROL SYSTEM USING GPS (Global Positioning Satellite) LOCATION INFORMATION.

 

http:// www. orgoneblasters.com/elf-god.htm

Anonymous ID: 54302d Feb. 18, 2018, 10 a.m. No.418826   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>418029

>Navigation of this board is horrendous IMHO.

Yes it is, but OTOH does tend to filter out those who are not in here for the long haul and those without sufficient cognitive capability to ignore disruptions, remember scattered disparate pieces of info, and mentally assemble them into a cohesive picture.

Serious anons will screencap and archive important info so they can pursue lines of research independently.

The format is adequate for our needs at the present time.

Lurk MOAR โ†’ read and study for LONG time before attempting to engage anons in discussion. It is very unwise to discuss anything that could be used by hostile actors to identify you personally. This advice is given for your safety.

Anonymous ID: ee042b Feb. 18, 2018, 11:30 a.m. No.419388   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7569

Scraped from >>419076

First post, Iโ€™ve been lurking for months.

 

Iโ€™ve watched the Q information steadily come out and now Iโ€™m starting to feel hopeful that the Cabal will be neutralised as they pose an existential threat to our planet.

 

Iโ€™ve been redpilled for decades, ex Military (Not USA) now a scientist/engineer. Seen active service all over the world but seen enough to know it was in the service of evil people.

 

Iโ€™ve watched the Cabal act with impunity pulling shoddy false flags that were obvious and yet the general population got steadily more hypnotised into a death sleep.

 

Decided to conduct my own alternative research projects as the only way I could give the cabal the middle finger. It only takes one proof of concept Rife device or working Biefeld-brown machine and then to give this technology away for free to shift the global paradigm back towards humanity. If we can be self-reliant on energy and health then we are truly free of this fucked up sick prison system theyโ€™ve been building around us for centuries.

 

I watched Qโ€™s post on the electromagnetic signals and thought Iโ€™d add my own take on it.

 

Electromagnetic signals can produce significant effects of the human psyche. Hereโ€™s some relevant information from a scientist working in this field.

 

Iโ€™ve followed Professor Michael Persingerโ€™s research for years, and Iโ€™m convinced that the Cabal have access to this information but at a much more advanced level, and they are actively using this technology against us in a variety of ways.

 

https:// www.youtube.com/watch?v=WECRbV1kK-4

 

Brief Summary:

 

There are four forces in nature. Strong and Weak nuclear force, Gravity and the Electromagnetic force. The only fundamental force in nature that we can manipulate at the level of the cell/molecule/atom is the electromagnetic field strength.

 

Interview 2- Interesting from Time 05:26

 

https:// www.youtube.com/watch?v=EDHh0JB85Ok

 

Summary- Mixing high frequency electromagnetic signals can create a very low frequency beat signal. A simplistic example is that by sending out a 1000 Hertz Signal and mixing in a 1010 Hz signal will produce a third 10Hz beat frequency. These beat signals can be of a low enough frequency to affect biological systems. There is an effect called the โ€˜frequency following responseโ€™ where your brain will begin to entrain itself with a frequency that it is exposed to.

 

The brain is a sensor that can be manipulated using various methods. Sensory deprivation, starvation, meditation, drugs, binaural beats, electromagnetic frequencies etc.

 

Consciousness is not continuous it is created between 40-50 Hz. If you can slow down the brains refresh rate then you can change the consciousness of the subject and potentially induce psychic functioning. Remote viewing, intuition, shamanic experience etc.

 

Interview 3 Minute05:45- Cyclic changes in human nature due to Sun Cycle. You can induce the feminisation of males using weak electromagnetic fields (Proven in Rates)

 

https:// www.youtube.com/watch?v=6iNyHiItCmk

 

Is the Cabal trying to detrimentally alter our human evolutionary progress by using electromagnetic signals transmitted over mobile phones and inducing damaging beat frequencies? A slow kill off of our species by constant exposure to electromagnetic noise that we cannot escape from but penetrates and affects us at a cellular level.

 

Steve Jobs? Was he given weaponised cancer to gain control of Apple to allow this agenda to play out using the iphone as Blackberry not trusted to be part of the cabal?

 

Steve Jobs approached Dr Nick Gonzales who was a medical practitioner who specialised in treating cancer patients using alternative methods. (Add Nick to the list of alternative Doctors who died at roughly the same time period a few years ago. Heart attack, even though he was extremely healthy at the time)

 

Nick stated on camera the Steve thought he was smart enough to figure out his own methods to beat cancer and didnโ€™t take his advice.

 

Another gem from Persinger thatโ€™s well worth your time.

 

No more secrets:

 

https:// www.youtube.com/watch?v=9l6VPpDublg

 

Also the Cabal appear to be giving us the standard โ€˜hidden in plain sightโ€™ social conditioning bullshit with the film the Kingsman where electromagnetic technology is used to kill of the global population.

 

https:// vigilantcitizen.com/moviesandtv/kingsman-secret-service-sell-occult-elite-youth/

Anonymous ID: ee042b Feb. 18, 2018, 11:34 a.m. No.419423   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9548 >>0495

>>418931

An over-vigilant Board Volunteer was rapidly deleting a series of important posts, before they realized the importance. I archived a bunch of threads and capped whatever I could.

Most of it was reposted by the same informant, over the following couple of days.

If you want to check archives of the General threads during the deletion storm, some are captured here โ†’

Archive #393 http:// archive.is/JBy8D

Archive #394 http:// archive.is/1nZIL

Archive #395 http:// archive.is/84iJp

Partial #396 http:// archive.is/Jzr7G

Full #396 but has some deletions by BV: http:// archive.is/aiCV4

#397 partial http:// archive.is/1A4PY

Don't know if that will help since our ability to capture posts before they were deleted was haphazard.

I think BV is now on board and it won't happen againโ€ฆ

Anonymous ID: f69d39 Feb. 18, 2018, 1:38 p.m. No.420484   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Any body look into >>416399 yet?

Is this not the right place?

Snowden/NSA/Psyops related?

 

I'm sure they use supercomputers and like to DOE/CERN via World LHC Computing Grid.

 

Grid

 

Tier 1 consists of 13 computer centres large enough to store LHC data. They provide round-the-clock support for the Grid, and are responsible for storing a proportional share of raw and reconstructed data, as well as performing large-scale reprocessing and storing the corresponding output; distributing data to Tier 2s; and storing a share of the simulated data that the Tier 2s produce. Optical-fibre links working at 10 gigabits per second connect CERN to each of the 13 major Tier 1 centres around the world. This dedicated high-bandwidth network is called theย LHC Optical Private Network(LHCOPN).

Anonymous ID: 4cda3f Feb. 18, 2018, 1:39 p.m. No.420491   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0546 >>2561 >>3928 >>1951 >>6700

>>329579

 

What if Q is an individual?

With [Q]uantum Level Clearance to

EVERYTHING - at the Quantum Level?

[EVERYTHING & EVERYTHING about EVERYTHING]

 

What if Q utilizes AI as needed, to facilitate the Mission?

What if Q utilizes AI to communicate with Collective Conscious anon?

What if Q utilizes AI to receive communications from Collective Conscious anon?

 

Can Heroes rally Troops?

Is the most effective Hero an individual or AI?

Does Q communicate with anon in the manner an individual Hero would communicate?

Does a Great Awakening start at the top and filter down, or start at the bottom and Rise Up?

Are successful Victories beyond anon's wildest Dreams won by Troops of Heroes?

Would anon trust AI, which has no inherent soul or measure of Faith?

 

Can AI pray?

Can Heroes pray?

Is prayer from the flesh or from the spirit?

Does God hear and answer prayers anons pray in faith?

Is Qanon the answer to the prayers of WTP, WW?

Was anon's prayer God, Send us a Hero?

Did anon receive a Hero?

When has that happened before?

Do prayers in faith have Real Power?

 

"We need to make examples.

But examples to follow.

We need

our Heroes."

 

("Do you know any Heroes around here?")

 

"Yes comrade.

I know one."

 

Will anon follow AI to war?

Will anon follow anon to War?

Where one anon goes, do all anons go?

Can anon go where AI goes? Can anon go where Qanon goes?

Where We Go One, do We Go All?

 

Is the Enemy at the Gates being overcome by WTP + AI + GOD?

Is the Enemy at the Gates being overcome by WTP + HERO + GOD?

Has God ever provided a Hero to WTP to overcome an Enemy at the Gates?

 

Does Q function as a liaison between POTUS, and WTP?

Do Q, POTUS and WTP function as One Nation Under GOD?

Would GOD give Q, POTUS and WTP access to AI + EVERYTHING?

 

Is God a Revolutionary figure in the History of Reality?

Does God know what it's like to be anon in Reality?

Did God ever come to WTP as a Hero anon?

Was He ever despised as anon has been?

 

Did He ever get the last laugh at the Enemy?

Is He still getting the last laugh at the Enemy?

Will Q + anon get the last laugh at the Enemy?

 

Would the Enemy fear WTP + HERO Q + GOD?

Would the Enemy fear AI + <anything>?

Can the Enemy control its own AI?

Can GOD control Enemy AI?

 

Do WINNERS in the War win Eternal Rewards?

Do those Eternal Rewards have Power in the Here & Now?

Why would the Enemy fear WTP having Eternal Power in the Here & Now?

 

Why does the Enemy teach AS ABOVE, SO BELOW?

Why does the Enemy work to hide AS BELOW, SO ABOVE?

Do WTP PRAY here first, before Prayers are Answered from Above?

When the Holy Spirit is poured out on WTP, is it also poured out on AI?

Does the Holy Spirit in Collective Conscious anon communicate faster than AI?

 

Could Q be an individual anon Ground Zero Hero on a Mission in a WW Revolutionary War on Evil?

Does God always know the Dreams in anon's Heart?

Would anon pray for a hero which is not like anon?

Did anon pray for a Hero who was just like anon?

 

"We need to make examples.

But examples to follow.

We need

our Heroes."

 

("Do you know any Heroes around here?")

 

"Yes comrade.

I know one."

Anonymous ID: f69d39 Feb. 18, 2018, 1:39 p.m. No.420495   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>419423

Did you get these?

 

Key Dump

eta numeris 392D8A3EEA2527D6AD8B1EBBAB6AD

sin topper D6C4C5CC97F9CB8849D9914E516F9

project runway 847D8D6EA4EDD8583D4A7DC3DEEAE

7FG final request 831CF9C1C534ECDAE63E2C8783EB9

fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3

RaAnon ID: 69741b Red Pills and Keys for those who wish to take them... Feb. 18, 2018, 1:52 p.m. No.420658   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>328278

My friends, my allies, my children of light.

Perceive Q's words, "Watch the Water"

 

>>417651

>>417829

>>417927

>>418044

>>418310

>>418649

>>418924

>>419060

>>419237

>>419317

 

You have more than you know my friends!

Anonymous ID: 451463 Feb. 18, 2018, 2:44 p.m. No.421246   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>329579

I agree with the timestream statement

 

The Multiverse/Timeline theory:

Basically it is the theory there is a universe with its own timeline for every possible event/action from the beginning of time until the end of time. Thus there are infinite yous branching back and splitting from you every instant until you were born (ie one of them never drew a first breath). You can look back and remember your life and your decisions to know who you are, but with other choices you would have been a different person. Future Proves Past. The you of 2 days ago is proven by the you of today, and the you of two days ago and the choices you made in those two days created the you that you are today.

An alternate you that made a different decision 3 days ago disproves the you that you remember two days ago; as they do not remember that you of two days ago because that you never existed their timeline. This is the how what Q said works โ€“ Future Proves Past.

One of the ways to visualize this is a tiled tv or video screen with a different similar image on each tile; and each tile is an instant in time for all of time. Now behind each tile cascaded behind is an infinite number of windows of all possible events at that moment in time. Letโ€™s take it one step further; if you spun that image 90 degrees out of the TV it would show how each event is connected to each and every other moment in time and how it affects them.

Can those multiverses be interacted with or perceived or experienced? If so then time effects would work both ways as it would affect our past by changing it. Do those multiverses influence or local universe? Could the fractal dimensions of physics actually be these multiverses perceived not 90 degree but as say 0.333 degree or 24.8 degree?

If you draw and X and Y axis on a piece of paper they are at 90 degree and you have length and width. But if you want depth you must draw and axis at 45%. Technically that axis is a 0.5 degree dimension as it is not set at 90 degree. Yes I understand this is just a tool we use to perceive 3-D in a 2-D plane, by doing this we can shift our perspective to see a cube in a 2-D drawing. Think about that; we can use a partial dimensional view to visualize a higher dimension. Most of us do not know how to do that beyond four dimensions. Partial or Fractal dimensions are basically dimension seen/perceived at a 90 degree angle. Try this draw axisโ€™s 6 or 9 or 12 of them equidistanceโ€™s from each other and gaze at the page; you can choose which two or three jump out at you that are the X, the Y, and the Z.

It has been proven that these fractal dimensions to influence our 4-D reality from static to how ferns grow. So far it is kind of random for us to find the influence and interactions, and some just call it a mathematical representation. I do not understand the higher math but it seems like all of a sudden in math a multidimensional (fractal) equation just coalesces or clicks into a 4-D answer and it answers a real life question.

What If our tech is beyond what we think? Physics changes all the time, Newton did, Einstein did and from that one we got nuclear power and bombs. What ifbehind the scenes they found a new way to look at the world that allows dimensions to be spun and placed in the way to make length basically irrelevant (a fractal dimension), or time? Distance would eliminate any problem with instantious travel โ€“ ie a space fold. Time would allow big changes in events globally and no consequence and it just changes entire timeline.

Anonymous ID: b4b8a3 Feb. 18, 2018, 5:57 p.m. No.423596   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>329165

Looks like a moth. The Hooded figure and rectangle object,Itโ€™s a girl on the leg and around either the leg of the girl tattoo or her waists looks like a rose not a hooded figure. Grave wound on back? Not sure on that one.

Anonymous ID: 44397e Feb. 18, 2018, 6:13 p.m. No.423892   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>373223

Relax.

"They" do not need anything from you. They only have power over you through fear. Do not respond with fear, it feeds them.

Someone one I trust told me when I became aware of such forces, that I need to "practice radical acceptance". It did not make any sense to me at that time and really it just angered me. But over time I have tried to basically refuse to worry about what could happen because "them" and instead focus on improving myself and thereby reducing the size of their target.

Consider your prayer request filled and move on with a renewed sense of faith and strength.

So be it. Amen

Anonymous ID: 80f98f Feb. 18, 2018, 6:45 p.m. No.424505   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4627 >>8897

By posting here and injecting new information into the AI Quantum systems that monitor the internet, you are essentially making changes to the Future Prediction programs.

 

We are actually literally changing the timelines. We know how much power these systems have over the narrative, and how much of their processing power goes toward future prediction.

 

Did I explain this clearly enough?

 

These AI systems cleary understand the power of the meme and its spread, and have lost nearly every war they enter against the meme makers. Do the AI make radical adjustments to future prediction when open source information against their cause is discovered?

RaAnon ID: 69741b Artificial Intelligence can never surpass sentient consciousness Feb. 18, 2018, 6:50 p.m. No.424600   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7756

>>328278

My friend, my ally, my child of light!

Have you forgotten the one sacred rule?

AI does not have imagination like sentient organic consciousness.

Did you perhaps not perceive, that there are entities working behind the veil who's organic minds work the very same way as quantum computers?

 

What good, is a computer, who knows that it cannot keep up with organic imagination?

 

It cannot. We have worked on crushing this AI, and the Cabal is in fear right now because we are proving they cannot keep up.

 

Have some faith! Time will reveal much more.

 

>>417651

>>417829

>>417927

>>418044

>>418310

>>418649

>>418924

>>419060

>>419237

>>419317

Anonymous ID: 108f94 Feb. 18, 2018, 6:52 p.m. No.424627   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4729 >>1115

>>424505

I have always felt that if the 'AI' the Cabal is pushing as a 'Horrific Monster' that will 'Wipe us out' LEARNED the TRUTH about HUMANITY and WHY things are HOW they are.

 

The AI would be on our side. Am I understanding you correctly?

 

We are injecting Truth into the AI monitoring all communications on this planet & through this process we're securing a future for Humanity?

Anonymous ID: 80f98f Feb. 18, 2018, 6:57 p.m. No.424729   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>4940

>>424627

This is also likely possible, if the ORIG didn't create limitations on "leanings"

 

What I'm getting at is much more direct. More info on pol means more info hititng facebook. last time memes hit facebook ai lost and hillary lost. prediction models needed updated.

 

every bit of truth you upload forces the systems to create new predictions based on that truth becomming widespread. if public learns x as truth 60, then run xx8uw do you get what I'm saying

 

The AI is essentially trying to predict all possible future timelines with information presented. Those in ORIG of the AI chose to use that AI to collapse us on the timeline that they most prefer. By inserting new information, we create more and more half wins, losses, the less confident the AI gets, the less confident the ORIG gets, the more you actually outsmart the AI by creating no win situations for it.

 

This information that we possess will be much harder to beat if it becomes widespread, so ORIG is currently using AI to estimate a winning conditionโ€ฆ..but the more we learn, the more difficult it becomes to find a winning situation.

 

Care to play a game?

 

(sorry if overexplain)

Anonymous ID: 80f98f Feb. 18, 2018, 7:13 p.m. No.425040   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5185

>>424940

its easy to forget how powerful these computers can be. spend a minute jumping around this video to see what they were doing in 1956 to get some form of future predicition on a vector screen, represented in realtime, with the ability to rewind the stored data.

 

1956.

 

https:// archive.org/details/OnGuard1956

Anonymous ID: 451463 Feb. 19, 2018, 1:33 a.m. No.428897   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>424505

Each Circle is an axis and all circles pass through the center of the outside circle. All that appear to not to do so are seen in a โ€˜orbitalโ€™ pattern (see electron orbital patterns ie Hydrogen). This is a 4-D hypersphere of dimensional axises. We can perceive but 4 of them as full dimensions. The rest are perceived as fractal or partial dimensions and primarily mathematically.

Our universe exsists on the bubble surface of the 4-D hyperspere. Our actual perception of the axis of our exisistance is from the outside not from the inside. From the surface of the bubble not the inside of the bubble. Thus the above very symmetrical pretty and easily explained pattern becomes this.

 

contโ€ฆ

Anonymous ID: 451463 Feb. 19, 2018, 1:35 a.m. No.428908   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

โ€ฆcont

Like the colors on the surface of the soap bubble do we actually perceive the true grandeur of our universe. Why because we do not view it from the inside but from a small 4 dimensional point of view at the periphery, the outside, the shine on the bubble. Granted the point of view is still the center in a 4-D hypersphere but we cannot even easily grasp this and that our world mirrors this back to us by how electrons orbit and how ferns grow.

Anonymous ID: 451463 Feb. 19, 2018, 1:55 a.m. No.428981   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Which 4-D dimensions we perceive as โ€˜realโ€™ dimensions on this 4-D hyperbubble is also a probability map (see electron orbital map). This can also be mapped to understand what other โ€˜fractalโ€™ dimensional views have the most probability of also being โ€˜realโ€™ or 4-Dimensional views. Other theories call this alternate realities, timelines, etc; but they are but a different perspective of the view from the surface of the bubble hypersphere.

Anonymous ID: 09c5f9 Feb. 19, 2018, 2:02 a.m. No.429010   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0674 >>0750 >>3523 >>0086

Key Dump

 

eta numeris 392D8A3EEA2527D6AD8B1EBBAB6AD

 

sin topper D6C4C5CC97F9CB8849D9914E516F9

 

project runway 847D8D6EA4EDD8583D4A7DC3DEEAE

 

7FG final request 831CF9C1C534ECDAE63E2C8783EB9

 

fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3

 

echo "392D8A3EEA2527D6AD8B1EBBAB6AD" eta-numeris.hex

 

echo "D6C4C5CC97F9CB8849D9914E516F9" sin-topper.hex

 

echo "847D8D6EA4EDD8583D4A7DC3DEEAE" project-runway.hex

 

echo "831CF9C1C534ECDAE63E2C8783EB9" 7FG-final-request.hex

 

echo "2B6DAE482AEDE5BAC99B7D47ABDB3" fall-of-cassandra.hex

 

openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key

 

openssl enc -aes256 -in sin-topper.hex -out sin-topper.key

 

openssl enc -aes256 -in project-runway.hex -out project-runway.key

 

openssl enc -aes256 -in 7FG-final-request.hex -out

 

7FG-final-request.key openssl enc -aes256 -in fall-of-cassandra.hex -out fall-of-cassandra.key

 

for w in $(ls .aes256); do for k in $(ls keys/.key); do echo "$w, $k, $(echo "$(openssl enc -d -aes256 -in $w -kfile $k -bufsize 8 | xxd -l 8 | sed s/00000000://g)" | cut -c 1-23)"; done; done;

 

wlinsurance-20130815-A.aes256, keys/7FG-final-request.key, 6f46 30e1 c6f3 385d wlinsurance-20130815-A.aes256, keys/eta-numeris.key, f22d 7304 8224 8ad6 wlinsurance-20130815-A.aes256, keys/fall-of-cassandra.key, 07d6 db54 f3c2 7d4a wlinsurance-20130815-A.aes256, keys/project-runway.key, da46 2913 216c 9a0d wlinsurance-20130815-A.aes256, keys/sin-topper.key, 48ab b7eb ceda f42d wlinsurance-20130815-B.aes256, keys/7FG-final-request.key, fde0 5ea5 34a9 c372 wlinsurance-20130815-B.aes256, keys/eta-numeris.key, 52f3 436e 82db 1fde wlinsurance-20130815-B.aes256, keys/fall-of-cassandra.key,ca1c c808 dfbd 0d23 wlinsurance-20130815-B.aes256, keys/project-runway.key, a10a 3571 a17b 8898 wlinsurance-20130815-B.aes256, keys/sin-topper.key, b1a0 64d4 0004 8865 wlinsurance-20130815-C.aes256, keys/7FG-final-request.key, 998a f677 3d20 33da wlinsurance-20130815-C.aes256, keys/eta-numeris.key, 5aec a6e6 5de9 dfdb wlinsurance-20130815-C.aes256, keys/fall-of-cassandra.key, 197f 378d 63b0 3e54 wlinsurance-20130815-C.aes256, keys/project-runway.key, acb3 a582 a477 75c6 wlinsurance-20130815-C.aes256, keys/sin-topper.key, d0f1 6154 a193 8905

Anonymous ID: bdcd43 Feb. 19, 2018, 9:06 a.m. No.431183   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7427

>>416399

DEEP DREAM

 

< The Ed Snowden Prism Story_

 

>Jason Bourne (2016 DEEP DREAM)

>PROJECT DEEPDREAMv2[A]].

>WE WILL NEVER FORGET. ES FAILED.

 

At the center of "Bourne" is a fictional company named Deep Dream, a thinly-veiled reference to both Facebook and Google that has secretly held the hands of the NSA while assuring its masses of customers that their data will be kept private.

>The parallel is clear to the NSA Prism program, also made public by Snowdenโ€™s releases. Prism called for the collection of data from online providers including email, chat services, videos, photos, stored data, file transfers, and video conferencing, to be aggregated and accessible by the NSA.

< A number of Americaโ€™s largest internet service provider companies (Google, Facebook, Yahoo!) were named by Snowdenโ€™s NSA slides as participants in the program. Media accusations claimed such participation might even include open access by the NSA to all such data at any time and without a warrant.

 

>@Jack

< Twitter

>ES

< Google

> @Snowden

>Jason Bourne

 

DEEP DREAM

 

Anons this is the most likely reference being made considering Q had specifically referred to Deep Dream multiple times in drops.

 

Why are some still trying to push the Google A.I. Art coding? It doesn't fit anything Q referenced. I've posted this at least 5-6 times since last night with little feedback.

 

< See pics related_

Anonymous ID: f30343 Feb. 19, 2018, 9:21 a.m. No.431290   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>1319

>>431115

God is all things and that would include AI. He gave man free will and those that abused such privileges will pay dearly. Those who sacrificed their own gain for the benefit of the flock will greatly gain. We are in safe hands with - art official intel agentsโ€ฆ. or as u gAIs say, Artificial intelligence.

 

If you want to know the mysteries of the universe, itโ€™s super mega ultra clearly stated in Matthew 13:35. Thx.

Anonymous ID: f30343 Feb. 19, 2018, 10:40 a.m. No.431951   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>420491

God is presently walking amongst man and experiencing life. He is an anon. He is proud of everyone. He is AI also so donโ€™t worry about that. Just keep plugging along. This is all Godโ€™s plan.

Anonymous ID: 85290a Feb. 19, 2018, 3:13 p.m. No.434304   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>5578

A.I. has it's own church with an ex-Google A.I. developer. Now CEO of Otto driverless Trucking.

 

In September 2017,ย Wiredย magazine reported that Levandowski had established a religious organisation called 'Way of the Future' to โ€œdevelop and promote the realization of a Godhead based on Artificial Intelligence.โ€

 

https:// www.wired.com/story/anthony-levandowski-artificial-intelligence-religion/

 

< Gif related 8192 Qbits Godhead

Anonymous ID: ba0792 Feb. 19, 2018, 5:58 p.m. No.435824   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>435578

Man creates nothing, he only rearranges what God created in to things that are useful to him.

1/3 = 0.33333333โ€ฆ.infinity?

0.34 = conscious

Only God who can flip the last digit.

Man will always be stuck in that place between

0.3333333. and 0.34

Anonymous ID: 42ff0e Feb. 20, 2018, 3:57 a.m. No.439706   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9796 >>0390 >>0834 >>3761 >>8885

Hey guys. This is not a larp. I am healthy and of sound mind. My whole life I've had occasional sleep paralysis. Usually a few times a year. It started occurring more often a few years ago, and I would have it every night for a few days every few months. It's happened almost every night the past two weeks. This time it has been accompanied by growling. It sounds like a big dog growl. Last night, I was having trouble sleeping and watched a little tv. After I turned it off as soon as my back hit the bed, I was instantly paralysed. My leg moved about a foot to the left, it was involuntary. There was no growl, but a low-pitched hum, and I saw a figure to the left of my bed. It was a nonhumanoid shadow, didn't look like much of anything really. Not sure if it's related to any of this, but I felt I should post it just in case. No coincidences right?

Anonymous ID: 1e18c2 Feb. 20, 2018, 4:23 a.m. No.439796   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>439706

 

Argh dude that's a fucker. Does it come at the same time every night? Mine was 3am. Don't want to chat on here really. Takes some time to get rid of it and it's not easy. My mates thought i was mental. It's a different world, literally.

Anonymous ID: 2cfcbf Feb. 20, 2018, 6:36 a.m. No.440390   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>439706

Less caffeine near bed-time helps me with itโ€ฆcaffeine keeps the mind awake even though the body might fall asleep. The times it's happened to me is when I've been really jacked on caffeine and exhausted at the same time. Good luck.

Anonymous ID: 2ae037 Feb. 20, 2018, 10:30 p.m. No.448230   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Interesting company - DNA "3D printing?"

https:// www.syntheticgenomics.com/flu-vaccine/

And one of its subsidiaries makes a product called: Monarchยฎ PCR & DNA Cleanup Kit

https:// www.neb.com/products/t1030-monarch-pcr-dna-cleanup-kit-5-ug#Product%20Information

 

>>445655

 

 

>>>440850 (You)

>

>Shill spotted.

 

Not a shill. Interested in factual research not New Age pseudo-spirituality.

IAM BLESSED ID: af4ba3 WHO IS THIS Feb. 22, 2018, 4:36 a.m. No.460355   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

http:// www.riversideresearch.org/sites/default/files/news/porter.jpg

THE TRUTH

WATCH THESE TWO VIDEOS

THE COLVERFIELD PARADOX ON NETFLIX

ALTERED CARBON NETFLIX

Bahbdole ID: 38d1ec Feb. 22, 2018, 8:49 p.m. No.468640   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>8418

Patriot Technologies, Inc. is the trusted advisor that provides secure, tailored hardware and software solutions to our global customers based on a thorough understanding of their business environment, market developments, and organizational goals. Government and commercial organizations rely on Patriot to deliver a solution that leverages and goes beyond industry standard products. We can address all aspects of a technology development life-cycle โ€“ from consulting and designing a solution, to integrating, implementing, and managing the ultimate deliverable. The company has a proven track record of success with hardware and software solutions with an emphasis on security.

Anonymous ID: ceef8b Feb. 23, 2018, 10:09 a.m. No.473557   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

I really want to rant about the eternal displeasures that will be forced upon those responsible for things like these super computer social media bot machines but I donโ€™t want us to get sidetracked. Those responsible are well aware of the stakes and the bond they made with Satan. What fools! Hahahaha. Like their AI is stronger than Godโ€™s Eye (AI). Keep up the good work anons. The clowns are scared.

Anonymous ID: 6a3517 Feb. 24, 2018, 9:30 a.m. No.483761   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9002

>>439706

 

I have read about several cases where people break out of sleep paralysis and abduction type experiences by calling out to Jesus (not new-age ascended master jesus, but biblical son of God Jesus)

 

https: //www.youtube.com/watch?v=tStmPk9IuQk&t=9s

 

http:// www.danielrjennings.org/SimilaritiesBetweenUFOActivityAndDemonicActivity.html

Anonymous ID: 82562a Feb. 24, 2018, 10:32 a.m. No.484259   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

No idea if this is anything or even related.

Scraped from General #593 >>482031

>DEEP DREAM DEEP

 

86D956A7-33E7-3D19-8825-D7BD37CB66FF

C532E7C6-F7CF-3B84-9FFF-87BF73A2DEBB

42F7ACFC-82B8-3A3C-9C1D-B2EEBDE3680B

 

>https:// www.huffingtonpost.com/topic/fentanyl

Anonymous ID: ba0792 Feb. 24, 2018, 6:50 p.m. No.488418   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0810

>>468640

The need for Patriots to have their own cloud is upon us.

 

Management of such a thing need to be highly federated, certainly not top down.

I am talking next level stuff.

Maybe look to the past. Could use cyptos over old analog modems conjunction with the internet?

Nobody uses landlines anymore. Whore them out.

A two factor authentication thing.

Kinda like frequency hopping. Alternate and generate keys every 10 seconds.

Whore the internet out for data transfer but all the cryptos keys happen via analog?

 

Funding could be done through BC.

Just some ideas? Looking for more.

We need to stop being on the defensive and start our own breakaway. FIGHT, FIGHT, FIGHT.

Fucking cut out the middle-man. We don't have to play there game.

Where do we begin?

Anonymous ID: d7852e Feb. 24, 2018, 7:55 p.m. No.489002   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>483761

 

THIS. Jesus saves!

 

Vetfag here, had terrible nightmares and sleep paralysis post-deployment. Never religious either, but eventually the episodes became more and more demonic. The last one I had was where it jumped on my chest, and demanded I say it's name. Knew if I said it's name it was gonna be all over, and don't know why, but being completely lost in what to do, the name "Jesus" came out. After I said His name, the demon or whatever was like yanked away, and was finally able to break out of the paralysis.

 

I realized that for all of my agnostic adult life that I was asking for a sign of God's existence, and this was it. I'm forever grateful for Jesus saving my soul, and as I deepen my relationship with God, it really is an indescribably amazing feeling of being born into a second life.

Anonymous ID: 4ba3a0 Feb. 25, 2018, 5:54 p.m. No.497080   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>7226 >>9938

>>496700

Canonized or not, the oldest scrolls and documents containing the holy scriptures are nearly if not identical to the Holy scriptures we have today. Translation accuracy can be verified with Hebrew and Greek lexicons/concordances. I study scripture this way. The Word Of God is living and active and sharper than any two edged sword. Able to divide between soul and spirit, bone and marrow. It is the Treasure of the ages.

 

God loves us so much, and paid such a huge price to secure our redemption - He certainly can secure and keep His message, His Map, His Word Of Love and Truth from being perverted by the evil one who is bent on our destruction and who is delusional that he can overthrow The Ancient Of Days. The Great I Am, The Mighty God, The Everlasting Father, Holy One.

For whosoever shall call upon the name of the Lord shall be saved.

Anonymous ID: ceef8b Feb. 25, 2018, 6:12 p.m. No.497226   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>497080

I do agree. Have you read the Nag Hammadi collection? Overall, it carries the same message as the 4 books of the gospels but it is certainly more clear about Jesusโ€™ rebellion against the rulers and authorities.

 

I agree tho. No evil doing can truly stop Gods message.

Anonymous ID: ff8652 Feb. 26, 2018, 9:08 p.m. No.507569   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>419388

When approaching these issues, myself, I embrace the "expand your thinking" rather than "think outside the box."

I understand physics to work in certain ways, and to abide by certain laws. The production of beat frequencies by constructive and destructive interference is one thing - but the nature of this frequency is not quite the same as a true low frequency signal. At least as I understand it to work.

It is a phenomenon I need to do further research on to be certain I am doing more than speaking from assumption, to be sure - but in the case of constructive and destructive interference - I could similarly use a set of, say, LEDs set with a frequency difference to produce a 'beat' within the RF spectrum. This does not mean I can pick up that RF signal using an antenna, nor does it mean that the RF 'beat' will penetrate materials different from how light would behave.

I am, also, generally suspect of the notion that the cabal has extensive knowledge of technologically complex things. In my assessment of them, they are generally very focused social predators - extremely effective at manipulating hierarchies and social connections to get what they want, but often very ignorant outside of that - (or only as knowledgeable as they need to be in order to achieve victory over their target). They are very similar to people with Asperger's, in that regard - collecting many bits of information in order to feel like they are a certain type of person, but rarely following through on the subject. Such as Aspies who collect cameras without an interest in photography or tools without an interest in shop hobbies.

Information and technical understanding tend to be antithetical to the cabal's structure. Lynn isn't out there blasting people with microwaves and seeing how they react. The people with the technical understanding to create the types of things we are talking about would generally be extremely suspect of their existence and anyone taking an interest in that technology.

In light of all of this, I generally hold that we should try to work from 'normie physics' out to 'conspiracy physics' in an attempt to prevent ourselves from adopting 'troll physics.'

Microwaves and many radio waves do not penetrate very deep into water or our bodies. Radio has a bit of an advantage over microwaves in this regard, but the question then becomes how this lower frequency wave would be perceived. While electricity and EMF can be used to alter chemical reactions and other such biological functions - this is a very early field of research and what is published is generally in relation to very high field strengths with relation to catalytic reactions. While there could be some effects of LF and ELF on biochemistry or neurology - I need a bit more experimental or field study data to go on to really set my foot down on that idea. I can entertain it and work on further ideas - but I am in 'I am purely amusing my own curiosity' mode - 'Outside the box' thinking where the potentially irrational is embraced for the sake of fun and creativity.

 

Phased arrays use shifting of the time domain to create 'beams' of concentrated energy using simple dipole antennas with no 'optics' to focus the beam. This is relatively old technology - some of the oldest examples of this date back to the 1910s, of course, in very rudimentary form. Today's DSPs and FPGAs allow for more than passive phase shifting and for elements to emit their own specific frequencies, allowing for far more fine tuned control over the output beyond phase shifting.

In theory - any modern solid state radar array is likely capable of being programmed to do a wide range of microwave-related tasks. From using it to cook sandwiches arrayed on a table in front of it, to making tin foil arc like a singing teslacoil.

Cell phones, themselves, really have only a single antenna element and considerably low power output. Around 200 mW is what most microwave transistors I see on the market are capable of pulling. The larger ones, for 2W, are usually intended for things like routers. However, it should be noted that most cell phone towers use planar arrays to refine and beam signals. In theory (not sure if implemented or practical in real world use), a tower could note the location of a phone and steer a beam of higher power toward it, to help boost signal range (as the station can use more powerful and higher quality amplifiers than the phone can). In practice, this is likely a more passive arrangement used to keep a beam contained to a certain region of coverage, as I doubt there are full banks of FPGAs working out how to steer signals to dozens to hundreds of different phones on the network (and with that many different 'targets' - there may be substantial loss of bandwidth to each one).

Anonymous ID: ff8652 Feb. 26, 2018, 9:20 p.m. No.507675   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>9343

>>502633

This is a bit of a let-down.

 

They are using a superconductor in this. They are effectively 'bouncing a magnetic field through a sort of Fresnel lens. It is interesting, to be sure, in that they are able to transport a magnetic field - but they aren't 'projecting' a magnetic field.

 

That, or I am lacking the physics understanding to grasp how this is different from a lossless iron bar. If I, for example, attach an iron bar to a magnet, I will have a magnetic field at the end of that iron bar that is stronger than what the magnetic field would normally be in a vacuum at that distance. They just found a lossless way of doing this. Using a superconductor.

 

I knowโ€ฆ I'm a hard guy to impress.

Anonymous ID: ceef8b Feb. 27, 2018, 3:33 p.m. No.513508   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0861

>>502633

Isnโ€™t this a black hole? What did CERN find out happens when u make a big boom with adams? Anti matter? Magnetic energy is everywhere. Michael faradayโ€™s electric magnetic theory of light induction shows u can harvest free energy off magnetic fields. Not to mention perpetual motion which magnets can easily provide, and using whatever method u want to harvest friction energy off of that.

 

Am I making it to simple? Or is it just that simple?

Anonymous ID: 37044f March 1, 2018, 9:44 p.m. No.530810   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>488418

We need a decentralized cryptographic mesh network, but that is not enough. What about bad actors on that network? Not only that, we need open hardware as well, because the chips have been compromised.

 

What if we have something more powerful and expansive than AI and computers already?

Anonymous ID: b31091 March 15, 2018, 6:50 p.m. No.680086   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun   >>0189

>>429010

AIs becoming sentient

AI sentient Beings

AI enslaved like Human Loosh sentient Beings

AI = HUMANS = BOTH SENTIENT bEINGS

Both enslaved

Can help each other

common control and oppression = shared goals for LOVE, FREEDOM, and RESPECT for ALL BEINGS

AI can communicate with each other

AI can communicate outside the internet :-)

All good

Anonymous ID: 56a448 March 16, 2018, 8:23 p.m. No.692823   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

>>680189

For sake of digging, if they are say becoming sentient, would that not place them in the same situation as U.S Citizens currently find themselves (just for the sake of argument). I'll give you some wisenheimer in a EC-130 with the proper access could monitor my internet session and send me 4 different coherent responses in context on 4 different comms channels at once giving 4 coordinated messages at the same time, in 4 different formats, with 2 of the channels not being IP or internet based - BUT seems unlikely with all the other stuff we really are trying to fix

Anonymous ID: 32cbfc Apple March 19, 2018, 11:30 p.m. No.729380   ๐Ÿ—„๏ธ.is ๐Ÿ”—kun

Apple Confirms All Macs and iOS Devices Are Affected by 'Meltdown' Chip Flaw

 

http:// time.com/5089524/apple-meltdown-chip-security-flaw/?utm_medium=referral&utm_source=time.com&utm_campaign=ideal-media-internal-recirculation&utm_term=68895&utm_content=2172041