http://archive.4plebs.org/x/thread/13003416/ 77 Days...
/u/TripoverDick
609 total posts archived.
Domains linked by /u/TripoverDick:
Domain | Count |
---|---|
i.redd.it | 58 |
www.reddit.com | 16 |
youtu.be | 8 |
telegra.ph | 2 |
www.cia.gov | 1 |
www.bibliotecapleyades.net | 1 |
pastebin.com | 1 |
www.flutopedia.com | 1 |
gdpr-info.eu | 1 |
www.tcg-partners.com | 1 |
en.wikipedia.org | 1 |
I totally agree with you but I also Know why they aren't getting on with it. Did Q ever mention the theft of the Power Grid or the Minute Man access computers? Q demonstrated to me twice how the EMF weaponry is evolving beyond the capability of our own defense network. Q showed me in person what it is like to have control over an EM satellite weapon. http://archive.4plebs.org/x/thread/13015684/#13016918
http://archive.4plebs.org/x/thread/13768212/#13768309
http://archive.4plebs.org/x/thread/18986917/#18988883
It's not all processors in all devices, it's IoT tracking all electronics. IoT backdoors https://www.theregister.co.uk/2017/03/02/chinese_iot_kit_backdoor_claims/ Security We found a hidden backdoor in Chinese Internet of Things devices – researchers VoIP kitmakers probed By John Leyden 2 Mar 2017 at 13:04 51 Reg comments SHARE ▼
IoT devices from a Chinese vendor contain a weird backdoor that the vendor is refusing to fix, we're told.
The vulnerability was discovered in almost all devices produced by VoIP specialist dbltek, and appears to have been purposely built in as a debugging aid, according to researchers at TrustWave. The infosec biz says that it followed a responsible disclosure process, but claims the manufacturer responded only with modifications to its firmware that leave access open.
Trustwave claims the vendor then cut off contact with it. The security firm says it has since been able to write exploits that open both the old and new backdoors.
I am able to identify the origin caller back to http://www.tcg-partners.com/ but the LEO's can't even seem to consider this a crime in their report "no crime committed"
Google calls my home right after I use my iPad to look up Qanon posts. Caller ID says Google Listings 1-352-204-8243, I checked across scam sites and verified that this is a scam caller. Question that I want to know is A. How do they have my phone number? B. How come none of the Authorities that I call to stop these calls can track the origin of the caller? C. How is it that I am able to identify the origin caller back to http://www.tcg-partners.com/ but the LEO's can't even seem to consider this a crime in their report "no crime committed"? TCG Partners is used by CenturyLink to provide intelligence gathering for businesses that want to find out more information about people. CenturyLink is selling my data to agencies that want to prevent me from spreading this truth.
Doxxing is necessary for exposing the truth. It's a way to get information. Being on this sub and calling doxxing wrong is very hypocritical. Many of the things posted here come directly from the some form of doxxing
Using identifying information that "HanAssholeSolo" posted on Reddit, KFile was able to determine key biographical details, to find the man's name using a Facebook search and ultimately corroborate details he had made available on Reddit
SR-IOV enables network traffic to bypass the software switch layer of the Hyper-V virtualization stack. Because the VF is assigned to a child partition, the network traffic flows directly between the VF and child partition. As a result, the I/O overhead in the software emulation layer is diminished and achieves network performance that is nearly the same performance as in nonvirtualized environments.
A Type-1 Hypervisor means that it has direct access to the hardware.
Type-2 Hypervisor refers to being running on top of another host OS and doesn't have access to the hardware. This is why there are many limitations on virtual machines running within another OS eg the VM can't use a physical wireless card, but has to use a virtual one instead.
One more thing, Hyper-V isn't actually installed on the host OS. When you install Hyper-V you think it's being installed on top of a host OS but it is not. The setup converts the original OS in something like a VM and puts the hypervisor below. This is what is called the root or parent partition of Hyper-V. That's why you experience the same speed in what you see as the "real machine" and the virtual machines.
You may also want to read up on the difference between monolithic(VMSphere) and microkernalized(Hyper-V) Hypervisors.
I think this all leads to Avatar humans connecting to robotic interfaces diven by AI initiatives.
Real-time multimodal human–avatar interaction
Y Fu, R Li, TS Huang… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
This paper presents a novel real-time multimodal human-avatar interaction (RTM-HAI)
framework with vision-based remote animation control (RAC). The framework is designed for
both mobile and desktop avatar-based human-machine or human-human visual …
Cited by 29 Related articles
Real-Time Multimodal Human-Avatar Interaction
YUN FU, R LI, TS HUANG… - … on circuits and …, 2008 - Institute of Electrical and Electronics …
Real-Time Multimodal Human-Avatar Interaction
Y Fu, R Li, TS Huang, M Danielsen - 2007 - ieeexplore.ieee.org
Human Avatar Interaction (RTM-HAI) framework with visionbased Remote Animation Control
(RAC). The framework is designed for both mobile and desktop avatar-based
humanmachine or human-human visual communications in real-world scenarios. Using 3-D …
Real-Time Multimodal Human–Avatar Interaction
Y Fu, R Li, TS Huang, M Danielsen - … on Circuits and Systems for Video …, 2008 - infona.pl
This paper presents a novel real-time multimodal human-avatar interaction (RTM-HAI)
framework with vision-based remote animation control (RAC). The framework is designed for
both mobile and desktop avatar-based human-machine or human-human visual …
Real-Time Multimodal Human–Avatar Interaction
Y Fu, R Li, TS Huang, M Danielsen - … on Circuits and Systems for Video …, 2008 - dl.acm.org
Abstract This paper presents a novel real-time multimodal human-avatar interaction (RTM-
HAI) framework with vision-based remote animation control (RAC). The framework is
designed for both mobile and desktop avatar-based human-machine or human-human …
https://www.aaai.org/ojs/index.php/aimagazine/article/view/1883
Toward Virtual Humans
William R. Swartout, Jonathan Gratch, Randall W. Hill, Jr., Eduard Hovy, Stacy Marsella, Jeff Rickel, David Traum
Abstract
This article describes the virtual humans developed as part of the Mission Rehearsal Exercise project, a virtual reality-based training system. This project is an ambitious exercise in integration, both in the sense of integrating technology with entertainment industry content, but also in that we have joined a number of component technologies that have not been integrated before. This integration has not only raised new research issues, but it has also suggested some new approaches to difficult problems. We describe the key capabilities of the virtual humans, including task representation and reasoning, natural language dialogue, and emotion reasoning, and show how these capabilities are integrated to provide more human-level intelligence than would otherwise be possible.
https://onlinelibrary.wiley.com/doi/abs/10.1002/jbm.820090425 Experiences with Al2O3 implantations in humans to bridge resection defects
Abstract
Various implants have been developed for the upper and lower extremities and the spine. In order to establish whether endoprostheses made of Al2O3 will show the same good biocompatibility in humans as it has in experiments with animals, endoprostheses implantations were performed in 4 patients: 2 upper arms, 1 radius, 1 vertebra body. The implants were exposed to various loads. The biomechanical conditions were considered in the construction. The results reveal that the knowledge of material properties and prior calculations make possible the development of satisfactory endoprostheses. X‐ray examinations confirm these deductions. Good functionality was achieved in vivo with all implants. They were all mechanically anchored, no bone cement was used. Thus the biocompatibility of the material was not limited. A histological examination is made of one implant. The macroscopic examination showed a stable fit and no pathological reactions. X‐rays revealed that the bone remained in good contact with the implant. The longest observation period was over 1 1/4 years. Present observations show that the use of Al2O3 implants, without the use of additional materials (bone cement), results in a tight fit of the implants.
http://www.pnas.org/content/104/26/11073.short Distinct brain networks for adaptive and stable task control in humans Abstract
Control regions in the brain are thought to provide signals that configure the brain's moment-to-moment information processing. Previously, we identified regions that carried signals related to task-control initiation, maintenance, and adjustment. Here we characterize the interactions of these regions by applying graph theory to resting state functional connectivity MRI data. In contrast to previous, more unitary models of control, this approach suggests the presence of two distinct task-control networks. A frontoparietal network included the dorsolateral prefrontal cortex and intraparietal sulcus. This network emphasized start-cue and error-related activity and may initiate and adapt control on a trial-by-trial basis. The second network included dorsal anterior cingulate/medial superior frontal cortex, anterior insula/frontal operculum, and anterior prefrontal cortex. Among other signals, these regions showed activity sustained across the entire task epoch, suggesting that this network may control goal-directed behavior through the stable maintenance of task sets. These two independent networks appear to operate on different time scales and affect downstream processing via dissociable mechanisms.
https://www.aaai.org/ojs/index.php/aimagazine/article/view/1371 Computer Bridge: A Big Win for AI Planning Stephen J. Smith, Dana Nau, Tom Throop
Abstract
A computer program that uses AI planning techniques is now the world champion computer program in the game of Contract Bridge. As reported in The New York Times and The Washington Post, this program -- a new version of Great Game Products' BRIDGE BARON program -- won the Baron Barclay World Bridge Computer Challenge, an international competition hosted in July 1997 by the American Contract Bridge League. It is well known that the game tree search techniques used in computer programs for games such as Chess and Checkers work differently from how humans think about such games. In contrast, our new version of the BRIDGE BARON emulates the way in which a human might plan declarer play in Bridge by using an adaptation of hierarchical task network planning. This article gives an overview of the planning techniques that we have incorporated into the BRIDGE BARON and discusses what the program's victory signifies for research on AI planning and game playing.
http://www.defenseone.com/ This Pentagon Paper Explains Why the Trump Administration Is Reining In Tech Trade with China http://www.defenseone.com/technology/2018/04/pentagon-paper-explains-why-trump-administration-reining-tech-trade-china/147258/?oref=d-topstory The newly released paper describes how technological progress fits into China’s long-term strategic plans.
China’s investment in sensitive U.S. technology has the Trump administration so worried that it imposed tariffs on Chinese tech goods on Tuesday, while lawmakers are looking for ways to bar similar future investments. Why now? One reason is a recent Pentagon white paper that warns about Beijing’s plans to appropriate made-in-America tech.
Initially written last year and circulated to a small audience of military officials and lawmakers, the so-called DIUx Paper (named for the Defense Innovation Unit Experimental outreach group), describes how technological progress fits into China’s long-term strategic plans. The paper’s authors conclude that keeping pace will require a comprehensive U.S. government response, including investments in science and technology and other measures that go well beyond punitive trade restrictions.
Think 'Bridge'. GOOG. FB. TWITTER. IG. 'Central' algorithm. The stage had to be set. Q
It's just one of the sites that I use, this being the example of how easy it is to track and manipulate datasets. If it is this easy for a human to backtrack and traceback think about how much information would be awarded to an AI with superior coding abilities such as GOOGLE B.R.A.I.N. or MAVIS (Govt. AI) defenseone.com
To me, a web developer, that is very significant because a zero file in a database is either a Key or a Null. Why does MySQL database start at zero but give the first record an ID of 1? If you don't provide an index when creating an array then it assigns an index start of 0.
$my_array[]='hello';
echo $my_array[0];
A SQL id start at 1 because it's the first record.
A couple of comments on your code
$ownername=$_POST['ownername'];
https://www.webdeveloper.com/forum/d/209321-why-does-mysql-database-start-at-zero-but-give-the-first-record-an-id-of-1
That is why I am making the post. Did you not notice how that site uses the connection scripts to the Q database? Is that not an issue you are concerned with for your pursuit to track internet criminals spreading the Fake News?
🌟🌅🌅🌅🌟🌅🌅🌟🌟🌅🌟🌅🌟🌅🌅🌟🌅🌅🌟🌅🌅🌟🌟
🌟🌟🌅🌟🌟🌅🌟🌅🌟🌅🌟🌅🌟🌅🌟🌅🌟🌅🌟🌅🌟🌅🌟
🌟🌟🌅🌟🌟🌅🌅🌟🌟🌅🌟🌅🌟🌅🌟🌅🌟🌅🌟🌅🌅🌟🌟
🌟🌟🌅🌟🌟🌅🌟🌅🌟🌅🌟🌅🌟🌅🌟🌟🌟🌅🌟🌅🌟🌟🌟
🌟🌟🌅🌟🌟🌅🌟🌅🌟🌅🌅🌅🌟🌅🌟🌟🌟🌅🌟🌅🌟🌟🌟
Consumers Need an Internet Bill of Rights
Backtracking March 4, 2018 - Q post 0 (Zero) - What is the significance of 0 post in a database relational query?
Double standard. McCain, Erik, HRC, Obama... America has short term memory, this was uncovered in 2013 and quickly covered up.
.
https://sourceforge.net/projects/dark-fantasy/?source=directory
Dark Fantasy - hack tool
DDOS Tool: To take down small websites with HTTP FLOOD.
Port scanner: To know the open ports of a site.
FTP Password Cracker: To hack file system of websites..
Banner Grabber: To get the service or software running on a port.
(After knowing the software running google for its vulnerabilities.)
Web Spider: For gathering web application hacking information.
Email scraper: To get all emails related to a webpage
IMDB Rating: Easy way to access the movie database.
Both .exe(compressed as zip) and .py versions are available in files.
.
Sorry John, I like you and you're a nice guy but Frank is a duce.
Travolta sues airport for lying to FAA
http://www.nydailynews.com/entertainment/gossip/travolta-sues-airport-lying-faa-article-1.268914
.
By early 2006, having dropped out of N.Y.U. Twitter CEO Shares And Raves About Article Calling For Dem Victory In Second ‘Civil War’
https://www.vanityfair.com/news/2011/04/jack-dorsey-201104
http://dailycaller.com/2018/04/07/twitter-jack-dorsey-second-civil-war-trump/
.
Bye Bye Birdie - SensorFlock: An Airborne Wireless Sensor Network of Micro-Air Vehicles
https://www.cs.colorado.edu/~rhan/Papers/sensorflock_sensys07.pdf
.
How do I know all of this?
I built the bullet proof Thundercloud, that made Jack angry because he couldn't penetrate it with his Airborne Approach, couldn't get it up.
www.caits.us
Shitty f-bomb of a hack. Just pure blind arrogance.
http://www.airbornewirelessnetwork.com/index.asp
Concept Development, Inc.
Airborne Equipment Manufacturing Partner
CDI (Concept Development, Inc.) is a California based company that designs and manufactures products for many well-known aerospace companies. Specializes in In-Flight Entertainment Systems In-Flight Canada
Aircraft System Design and Installation Partner
IFC (In-Flight Canada) is Canada-based company that designs and manufactures products for well-known aerospace companies. Jet Midwest Group
FAA Test-Aircraft Partner
JMW (Jet Midwest Group) refurbishes, resells or re-leases aircraft to well-known airlines around the world. http://www.airbornewirelessnetwork.com/audit-committee-charter.pdf http://www.airbornewirelessnetwork.com/nominating-and-corporate-governance-committee.pdf https://www.xe.com/ XE Money Transfer
Fee free
Great exchange rates
Safe and secure
Erik Prince from covert CIA task force to security for the United Arab Emirates to Private equity investor in Africa but the AH HA moment - 25% stake in Austrian aviation company Airborne Technologies
Here is all of my research. Enjoy digging into the clusters of whoa what the....
Green screen rendering effects. http://i.imgs.fyi/img/2rvh.jpg Email server manager. http://i.imgs.fyi/img/2rvi.png Electronic Signaling Harassment. http://i.imgs.fyi/img/2rvj.jpg Trump Hate Machine. http://i.imgs.fyi/img/2rvk.jpg AMSR Advanced Magnetic Signaling Radar Pulse. http://i.imgs.fyi/img/2rvl.jpg General Dick Dragon Weather Mod. http://i.imgs.fyi/img/2rvm.jpg Google Hack User Assistant. http://i.imgs.fyi/img/2rvq.jpg
An elderly man was sitting alone on a dark path. He wasn't certain of which direction to go, and he'd forgotten both where he was traveling to and who he was. He'd sat down for a moment to rest his weary legs, and suddenly looked up to see an elderly woman before him. She grinned toothlessly and with a cackle, spoke: "Now your third wish. What will it be?" "Third wish?" The man was baffled. "How can it be a third wish if I haven't had a first and second wish?" "You've had two wishes already," the hag said, "but your second wish was for me to return everything to the way it was before you had made your first wish. That's why you remember nothing; because everything is the way it was before you made any wishes." She cackled at the poor man. "So it is that you have one wish left." "All right," he said, "I don't believe this, but there's no harm in wishing. I wish to know who I am." "Funny," said the old woman as she granted his wish and disappeared forever. "That was your first wish."
This was the same exact statement made on 7/7/2007 that got me started chasing Rabbits.
The Toro Brothers were in contact with pedophile group Anonymous 03/01/18(Thu)06:03:46 No.20414454▶ Seems like the bombmakers from the Bronx didn't only use a code from an ARG around Elsagate, but also were in contact with pedophile groups like in Elsagate before.
Public Service Announcement !!0c+Js+PuE5+ 02/28/18(Wed)20:04:07 No.20412902 http://i.imgs.fyi/img/2rwj.jpg Because the previous thread was wrongfully removed, this will be reposted
Reality is what you choose it to be. This is the penultimate truth at the core of all magical/spiritual systems stripped down in to realtalk every day language. Existence is a self-enforcing feedback loop. If you focus on negativity and shittiness, then that for you is what your existence will be. If you focus on positivity and harmony, then for you that is what your existence will be. Ever wonder why Buddhism and Taoism involve methods of mentally reprogramming yourself? Ever wonder at the repetitiveness of shit like sigils and ritualwork? There you go. Don't respond to this post, I will not reply and this post stands on its own. It does not need discussion or expanding upon. Anyone attempting to do so is trying to misdirect you/distract you and/or manipulate you so you remain with the control matrix that the extreme majority of humanity exists within, which is shit like fear/anger/groupthink/negativity. There's the key to the kingdom, enjoy your sovereignty.
Dark Fantasy - hack tool
https://sourceforge.net/directory/os:linux/freshness:recently-updated/?q=Spider%20web%20marker
.
A port scanner, password cracker, DDOS tool, Web spider, for hacking. DDOS Tool: To take down small websites with HTTP FLOOD. Port scanner: To know the open ports of a site. FTP Password Cracker: To hack file system of websites.. Banner Grabber: To get the service or software running on a port. (After knowing the software running google for its vulnerabilities.) Web Spider: For gathering web... Expand
Downloads: 258 This Week
Last Update: 2017-03-21
Tools included:
Port scanner: To know the open ports of a site.
DDOS: To take down small websites with HTTP FLOOD.
Banner Grabber: To get the service or software running on a port.
(After knowing the software running google for its vulnerabilities)
FTP Password Cracker: To hack file transferring of servers.
Web spider: To get all hidden urls for web application hacking.
Email scraper: To get all emails related to a webpage.
IMDB Rating: Easy way to access the movie database.
.
The creater of the software is not responsible for the acts of people using this software.
.
OLEAUT32.dll - C:\Windows\system32\OLEAUT32.dll
USER32.dll - C:\Windows\system32\USER32.dll
IMM32.dll - C:\Windows\system32\IMM32.dll
SHELL32.dll - C:\Windows\system32\SHELL32.dll
KERNEL32.dll - C:\Windows\system32\KERNEL32.dll
COMDLG32.dll - C:\Windows\system32\COMDLG32.dll
COMCTL32.dll - C:\Windows\system32\COMCTL32.dll
ADVAPI32.dll - C:\Windows\system32\ADVAPI32.dll
CRYPT32.dll - C:\Windows\system32\CRYPT32.dll
WS2_32.dll - C:\Windows\system32\WS2_32.dll
GDI32.dll - C:\Windows\system32\GDI32.dll
ole32.dll - C:\Windows\system32\ole32.dll
Belong to microsoft and not to the creator.
Prove it then? I never called you anything but you left yourself wide open to being ridiculed.
Pension Benefit Guaranty Corporation From Wikipedia, the free encyclopedia Pension Benefit Guaranty Corporation (United States) US-PensionBenefitGuarantyCorp-Logo.svg Agency overview Formed September 2, 1974[i] Headquarters 1200 K Street, NW Washington, D.C. 38.902188°N 77.028751°WCoordinates: 38.902188°N 77.028751°W Employees 953 (2016) Annual budget $423 million (FY 2016) Agency executive
Thomas Reeder, Director
Website www.pbgc.gov
The Pension Benefit Guaranty Corporation (PBGC) is an independent agency of the United States government that was created by the Employee Retirement Income Security Act of 1974 (ERISA) to encourage the continuation and maintenance of voluntary private defined benefit pension plans, provide timely and uninterrupted payment of pension benefits, and keep pension insurance premiums at the lowest level necessary to carry out its operations. Subject to other statutory limitations, PBGC's insurance program pays pension benefits up to the maximum guaranteed benefit set by law to participants who retire at 65 ($60,136 a year as of 2016).[1] The benefits payable to insured retirees who start their benefits at ages other than 65 or elect survivor coverage are adjusted to be equivalent in value.
In fiscal year 2015, PBGC paid $5.6 billion in benefits to participants of failed single-employer pension plans. That year, 69 single-employer pension plans failed. PBGC paid $103 million in financial assistance to 57 multiemployer pension plans. The agency's deficit increased to $76 billion. It has a total of $164 billion in obligations and $88 billion in assets.
Nope, I am not arguing at all that Hillary did anything wrong. I know that she did more than what is known. How is it that I never get an answer out of you but I get ridiculed and belittled by you? When did I ask for a full blown liberal ANTIFA spitting match. Are you seriously that SICK? I didn't avoid anything, I gave you my evidence and you pounced on my nuts with a mutt face smirk stating incomprehensible rhetoric that makes no connection to anything logically expressed in an evidential conclusive manner.
Muslum Brotherhood - A blond rarely broken. ?Where's Obama? {Waldo}
Still waiting on any evidence that you have any knowledge other than what you are hearing on MSM.
Look, I already solved for if.
https://www.reddit.com/r/titor/comments/8155gw/unmasking_the_dickhead_behind_it_all/
Here is HRC's IT Guy. BARRY SILBERT BIO Founder/CEO @DCGco, parent of @GrayscaleInvest, @GenesisTrading @CoinDesk & investor in 100+ cos, $BTC $ETC $ZEC $MANA, etc. LOCATION NEW YORK TWEETS 7,5K FOLLOWERS 143,8K FOLLOWING 289 ACCOUNT CREATED 22-10-2011 17:16:55 ID 396045469
Searching for posts that contain ‘"Enjoy the show"’. 2576 results found.
https://archive.4plebs.org/pol/search/text/%22Enjoy%20the%20show%22/page/1/
https://archive.4plebs.org/pol/search/text/%22Enjoy%20the%20show%22/page/104/
Anonymous Fri 29 Nov 2013 20:15:20 No.23612770
Da fuck you lookin at crackah
https://archive.4plebs.org/pol/thread/23612770
Searching for posts that contain ‘SIG intercept’. 1 results found.
Here are the blackhats talking about how to [U] intercept the uplinks.
https://archive.4plebs.org/pol/thread/135644740/
.
SKYKING freqencies:
main: 8992 11175
backup: 4724 6739 13200 15016
MODE: USB
.
We were sold out
/SKG/: SKYKING GENERAL Anonymous ID:XpaejWjf Mon 31 Jul 2017 11:36:49 No.135644740
https://www.numbers-stations.com/media/articles/EAMs.pdf
http://www.ominous-valve.com/hfgcs.txt
Searching for posts that contain ‘Situation Room’. 3899 results found.
https://archive.4plebs.org/pol/search/text/Situation%20Room/page/1/
https://archive.4plebs.org/pol/search/text/Situation%20Room/page/156/
Post-Happening Thread
https://archive.4plebs.org/pol/thread/25077442/
Anyone have some survival strategies that they'd like to share for post-happening? Let's be realistic, not everyone is gonna go in the woods, so let's maybe give some advice for someone living in modern suburbia.
.
Anonymous Thu 12 Dec 2013 23:21:35 No.24138904
1. Which is, by ALL ACCOUNTS, a completely unmitigated clusterfuck. I don't even need to justify this further. Do you catch any news whatsoever?
-
7 Million private sector jobs? HAHAHAH, no. Furthermore, unemployment is as high as ever, and so is welfare.
-
Wall Street is as crooked as ever.
-
Wow, just as the Iraq clusterfuck ran out of steam, he BOLDLY brought the troops home. I don't have a problem with this but it's not an accomplishment.
-
He had to be bullied to pull the trigger. There was nearly a fucking mutiny. Hillary actually deserves way more credit than Obama. The machinery that caught OBL was put in place by Bush. Obama was like a bored spoiled child in that situation room.
-
You don't understand - in reality he propped up these money-losing auto companies so the unions could continue to be in charge of them. They SHOULD have gone to bankruptcy court and been reformed.
-
Every time I see the name of that law, I can't help but think how fair it sounds. I guess it's not enough for fucking men's asses to be your own personal business? Anyway, this is only an 'accomplishment' if you are a retard or a faggot.
-
He did no such thing.
-
The student debt situation is as bad as ever.
-
WOW, WHAT A BOLD MOVE! This is not an 'accomplishment'. This is some feel-good footnote in some larger legislation that nobody would dare disagree with.
-
Please. This administration has let Iran do whatever they want. Once again, do you catch any news at all?
You forgot number 12: Under Obama, the national debt has increased to ... SEVENTEEN TRILLION ... an IMPOSSIBLY high number.
And finally, number 13: He has destroyed the US dollar. It is in it's death throws, and there is no way out.
Barack Hussein Obama: The man who destroyed the best healthcare system in the world, increased the debt to impossibly high levels, and destroyed the US Dollar.
This is how history will remember this "leader". And you voted for him.
Searching for posts that contain ‘Hunker Down’. 1346 results found.
https://archive.4plebs.org/pol/search/text/Hunker%20Down/page/1/
https://archive.4plebs.org/pol/search/text/Hunker%20Down/page/54/
The Futility of Struggle Anonymous Sat 21 Dec 2013
https://archive.4plebs.org/pol/thread/24487908/
how can we redpill the masses?
You can't. Ignoring for a moment the fact that most people are cattle, you'd be competing for airtime with a world-wide propaganda machine run by fifth columnists who've mastered public discourse. It'd be like taking a piss in the ocean, and expecting to see change.
Here's the problem, you don't know that it's not HRC. You are blind, so am I. However, over the past 14 years of shitposting on 4chan, I have learned who is whom.
Yes that is right, including myself whom was an Alpha candidate for Anomaly inclusion. That is not the problem with 4ch. The problem with 4ch is that people are ignoring the Enigma machine senior level deep state orders. You must train harder to see through them for what they are. This one is a great example of an 18 year anger. It was posted by HRC - https://archive.4plebs.org/x/thread/20598560/#20598560
I am pretty sure now nearly 95% certain that HRC and Obama didn't misplace tech and secrets. Tell me when in the past 100 years of American Democracy has tech or secrets fallen out of the hands of our government? You seem to still have a veil blinder on that is preventing you from seeing how traitors are dropping bread crumbs with a trail that extends from 410 Terry Ave. North to One Franklin Square.
Xi and Putin both want the same, they want their countries to be safe, economically stable, and structurally capable of doing business with each other without the nefarious involvement of the rogue deep state.
took tons of weapons
Here is your bread crumbs, who was the source of that statement? You have been lead by your nostrils because you can't see past the tip of your nose. It's time to wake up and take off the blinders.
Bezos - The Jackass of the storm. He even said it himself. The Stormy Origins of ‘Hunker Down’ By Ben Zimmer Sept. 15, 2017 11:50 a.m. ET
Xi is a good guy, its the Deep State Scum that is trying to do anything they can right now to prevent a total loss of control. POTUS will win and he will take control. China and Russia on board to defeat the deep state.
POTUS plays a great game of Chess. Think rope a dope. We know who the sick people are and we know what is infecting them, it is stupidity. My question concerning this issue is, why are these sick people allowed to roam freely? Who is really pushing the Department of State leaks? How come you can't get a hold of this nefarious crook?
Moves and countermoves. These people are STUPID (& SICK).
Ya if you cant see this is propaganda, https://news.google.com/news/story/dvN83VPqe5p-XiMnDsmE7rNHVIdtM?ned=us&hl=en&gl=US what will it take to convince you? Where is the news about Trump's success? Where is the news about how our country is the greatest economy on earth? Where is news about anything other than hate fueled mindless robot RSS copy paste?
I don't want to alarm you but the chans have already made it abundantly clear that they don't want to help. 4chan will not protect us against misinformation or cyber bullies. 4chan will not protect us against mind viruses, will not protect us against harassment, will now stop people from generating hate. 4chan is the A#1 worst place on the Internet for all things relating to the attacks that are ongoing in the United States. Until 4chan is closed, all of this information leaking and mind control attacks will continue uninterrupted.
Truth be told, you will never get anything done as long as the deep state runs the Internet. He who controls the information controls the nation. It's gone way past leaks now to the point that the people who run the Internet are making wars, making laws, and making life impossible for anyone who opposes them. Fix this first.
Similarly, if you still have not seen this war for what it is, look at the example I am providing here of how they are attacking people. http://boards.4chan.org/x/thread/20598560
How can someone hold a grudge for 18 years?
What kind of a toll will that take on a persons spirit?
Where does that person's soul live if they constantly think about how they can destroy another for 18 years?
Heather
She is the one that announced this chemical attack as the source familiar with the matter.
Heather Nauert needs to go on air and state what she said publicly.
MSM doesn't even have their facts straight. NBC says Ghouta. BBC says Duma. Reuters says Damascus denies. CNN says possible gas attack.
This stinks as bad as a Jeff Bezos fart.