[ / / / / / / / / / / / / / ] [ dir / animu / ashleyj / cafechan / hydrus / kc / leftpol / sg / vg ]

/qresearch/ - Q Research Board

Research and discussion about Q's crumbs
July 2018 Transparency Report
Comment *
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
(replaces files and can be used instead)
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.

Pro Aris et Focis

File: a33cfdc2480ee89⋯.png (553.17 KB, 1022x766, 511:383, ClipboardImage.png)

da7c02 No.328278

Deep dig re: Department of Energy ASCI supercomputers, RED OCTOBER cyber-espionage attack, and related matters.

379c41 No.328349


Many SCs for stated purpose don't you think

8a2ebc No.328353

File: 26472a951cdfb15⋯.jpeg (104.31 KB, 1000x750, 4:3, readfiles_160_Redacted-dr….jpeg)

f373ce No.328392

File: bfd1645151a705f⋯.png (26.63 KB, 671x135, 671:135, ClipboardImage.png)

f373ce No.328454

All right, lads and lasses.

Do you want me repost the screencaps from my deep dig that I started posting last night, or start over again and you lead the way with questions that I might be able to answer from the digging?

Or should I just format the dig as a huge PDF file that no one will read because PDF?

It was almost finished yesterday, until the same anon started reposting its original posts with some new ones I missed, which tears up my original document structured but the new posts are appreciated because they also contain related info.

Guide me as what you want, anons.

379c41 No.328655

418e5c No.328656

I was following those posts; thought it was curious that no one seemed to be interested in them. Now that i see where your research wound up I'll follow your posts back to read and catch up on them.

418e5c No.328667

You might have already found this and i haven't caught up with you yet, or maybe this is nothing. Several of these posts referred to "Cassandra" being taken down. A quick search of Cassandra brought this: https:// en.m.wikipedia.org/wiki/Apache_Cassandra

Does the reference to Apache make it relevant?

5fe996 No.329160

File: 13356fcac0a7ffa⋯.png (258.04 KB, 834x1080, 139:180, 1.png)

File: eccf21589c13335⋯.png (119.25 KB, 834x1080, 139:180, 2.png)

File: 73569a0b1fa7fc1⋯.png (414.29 KB, 834x1080, 139:180, 3.png)

File: 6574901390a6c3c⋯.png (28.57 KB, 834x1080, 139:180, 4.png)

File: 2c636d6682e20f7⋯.png (181.35 KB, 834x1080, 139:180, 5.png)

In the interest of my personal Op Sec I will post pages extracted from the file, instead of the full PDF.

5fe996 No.329162

File: 903fb87a9c9cb97⋯.png (161.07 KB, 834x1080, 139:180, 6.png)

File: 7a2b4a169cb5aea⋯.png (10.29 KB, 834x1080, 139:180, 7.png)

File: 3305bfa620ba8d0⋯.png (422.85 KB, 834x1080, 139:180, 8.png)

File: cfaa876314fb4a1⋯.png (197.57 KB, 834x1080, 139:180, 9.png)

File: 13d4b5fbb432b95⋯.png (16.58 KB, 834x1080, 139:180, 10.png)

5fe996 No.329165

File: 37a77575c847270⋯.png (204.09 KB, 834x1080, 139:180, 11.png)

File: 6aa72832c188d14⋯.png (320.47 KB, 834x1080, 139:180, 12.png)

File: d4f447e5c534ca3⋯.png (399.91 KB, 834x1080, 139:180, 13.png)

File: 6badbea52b7c35a⋯.png (16.11 KB, 834x1080, 139:180, 14.png)

File: 975907c929a68ec⋯.png (309.31 KB, 834x1080, 139:180, 15.png)

5fe996 No.329168

File: f0edf1c3ff74fa5⋯.png (549.8 KB, 834x1080, 139:180, 16.png)

File: 3f91eddfd6dd82e⋯.png (407.99 KB, 834x1080, 139:180, 17.png)

File: 49181aeda9a9ff8⋯.png (243.07 KB, 834x1080, 139:180, 18.png)

File: 1a2068d22b8b9f2⋯.png (155.03 KB, 834x1080, 139:180, 19.png)

File: b64899c4e55210f⋯.png (401.3 KB, 834x1080, 139:180, 20.png)

5fe996 No.329170

File: 5bd125c58542e9d⋯.png (321.08 KB, 834x1080, 139:180, 21.png)

File: 612c48b4ff97174⋯.png (509.96 KB, 834x1080, 139:180, 22.png)

File: 6cdde5ad6815550⋯.png (250.17 KB, 834x1080, 139:180, 23.png)

File: 0e0fe28800bbf4a⋯.png (189.02 KB, 834x1080, 139:180, 24.png)

File: 4a950ea5c1335cf⋯.png (222.53 KB, 834x1080, 139:180, 25.png)

5fe996 No.329174

File: 7db29408cebff46⋯.png (179.7 KB, 834x1080, 139:180, 26.png)

File: 1254c05d337799d⋯.png (173.72 KB, 834x1080, 139:180, 27.png)

File: 9cffac2905962aa⋯.png (527.02 KB, 834x1080, 139:180, 28.png)

File: 278bd2067257a3e⋯.png (730.06 KB, 834x1080, 139:180, 29.png)

File: dcd7f1c308062c4⋯.png (185.3 KB, 834x1080, 139:180, 30.png)

5fe996 No.329176

File: 061bf69cd8ccaf7⋯.png (166.97 KB, 834x1080, 139:180, 31.png)

File: 7f702007eb8855a⋯.png (207.86 KB, 834x1080, 139:180, 32.png)

File: 4d12b40003c61d2⋯.png (151.91 KB, 834x1080, 139:180, 33.png)

File: 2f75b9ff68a7170⋯.png (450.16 KB, 834x1080, 139:180, 34.png)

File: 7ea92cc0232c6aa⋯.png (51.42 KB, 834x1080, 139:180, 35.png)

5fe996 No.329178

File: ad0dcf5eba24e65⋯.png (198.63 KB, 834x1080, 139:180, 36.png)

File: de4eeb1cae3b67c⋯.png (479.2 KB, 834x1080, 139:180, 37.png)

File: aafd3cd7aa22439⋯.png (263.41 KB, 834x1080, 139:180, 38.png)

File: 2721af278b37075⋯.png (283.53 KB, 834x1080, 139:180, 39.png)

File: bc7cd339902383d⋯.png (76.86 KB, 834x1080, 139:180, 40.png)

5fe996 No.329181

File: 399f89c096f77da⋯.png (244.35 KB, 834x1080, 139:180, 41.png)

File: 4b3480a58310d21⋯.png (726.29 KB, 834x1080, 139:180, 42.png)

File: e5b9ed2e210596f⋯.png (34.39 KB, 834x1080, 139:180, 43.png)

File: bb08d100315d12f⋯.png (107.65 KB, 834x1080, 139:180, 44.png)

14df76 No.329492

Some tidbits from the 44 pages posted so far.

→The director of a little known federal agency with oversight over the nation's nuclear programs resigned on February 8, 2018.

→His replacement (not confirmed) has longstanding ties to the Russian nuclear industry

These 2 men are candidates for further digging

→The DoE had/has (at least) seven supercomputers as part of its Accelerated Strategic Computing Initiative managed by Sandia Corp under contract with the DoE. One named ASCI SNOW WHITE and one named ASCI Q.

→RED OCTOBER refers to a serious worldwide cyber-espionage malware attack that affected national security infrastructure in our country and others.

→A SCIF can be built/operated within a standard cargo container. We have pictures.

→An unknown somebody has provided Qresearch with a set of (partial) crypto keys as well as information on how to use them to decrypt a yet-unknown data repository or torrent.

Thank you, Patriots.

14df76 No.329579


One more thing.

The strange images the anon with the crypto codes wanted us to have include very subtle clues about "mirror".

Many of them were composed by compositing layers upon a background. Most of the backgrounds exhibit mirror symmetry.

This is a clue.

Personally I think it has to do with quantum computing. A quantum computer deals with information in a way that is unfamiliar to us. At the quantum level information can flow both time-forward and time-backward.

I believe (without being able to prove anything …yet) that these quantum supercomputers have the ability to probe possible timestreams that are near or similar to ours. I believe the Q operation likely incorporates that capability, as part of their operations research modelling to predict how the social landscape will be altered by the various influences on the social landscape. Such as information dispensed by Q into /qresearch and then forwarded into the broader culture through our memes.

I believe the mirror imagery also possible refers to the Project Looking Glass

See Through the Looking Glass with Phase …


Well there is a reason for this… the Government uses the ALICE CODE. Project Aquarius and the Looking Glass Project at Facility S4 at Area 51. "Above the door frame leading into the lab that contains the Looking Glass project at facility S4 at Area 51 there is a stuffed White Rabbit holding a backward watch mounted …

If you read that site closely, it was or is a machine that uses multiple strong electromagnetic fields to warp local spacetime just enough to allow glimpses into possible futures (and probably pasts).

Now that quantum computers exist I find it highly probable that the same kind of research is ongoing but using the latest technology … which may be assumed to be at least 20 years more advanced than what the public is told about.

I do seriously believe that QCs are probing possible futures and giving us the right stream of crumbs to help alter it toward the timestream that is desirable, and away from the Satanically-influenced ones.

I know this sounds like science fiction to most. Time will prove me wrong or right about this. We'll see…

1743f6 No.329682

File: dce6216c1f6b4d4⋯.png (32.23 KB, 654x332, 327:166, ClipboardImage.png)

From >>329272

Reposting here because this is the background of one of the spooky images discussed in the dig doc.

0315d7 No.329809

File: 5eca82bc552f9de⋯.jpeg (20.04 KB, 474x246, 79:41, images.duckduckgo.com.jpeg)

thank you Anon, wear it proud.

10453d No.329951


The timestream notion is a bit out there, but with quantum phenomena, one should never say never. It does seem very plausible that NSA would have a Quantum computer that has achieved Quantum supremacy. Google or IBM will have one in the next year or two, and as you say, they would try to stay 20 years ahead in this area.

CIA would probably NOT have a Quantum computer, since codebreaking is not really their specialty. That might be the determining factor that enables Q and the gang to stay one step ahead of the clowns. If their quantum computer can cut through conventional crypto like a knife through butter all of the communications of all clowns/cabal/stooges can be easily compromised.

The quantum angle might also apply to your timestream notion. A less exotic interpretation might be that they have a massive multi-agent computer simulation of the US public. It enables them to run different disclosure scenarios, and identify potential problems and tripwires in their planning.

1743f6 No.330088



You are associating quantum computing (QC) mainly with crypto.

That is a valid association but by no means the only one.

QCs can be programmed to solve problems that have never been solved programmatically before. There is much research ongoing on how to even program them.

Quick summary on QCs (very high level). Note that although I'm a technologyFag, I have no particular background on QC, just general reading.

There are multiple QC technologies (physical implementations). Some very different from one another. All of them deal with probabilities. With different strengths and weaknesses and tradeoffs such as speed versus accuracy. High interconnectedness of the qubits in the QC register, versus interconnectedness only of adjacent qubits. Full error correction, a property we have grown to expect in all our daily computing devices, does not exist yet in any of these commercial QCs or prototypes.

I found this article a good introduction and overview:


Some really spooky things have been reported pertaining to QCs that I have not looked into yet. Like strange "entities" manifesting when the QC becomes sufficiently complex… Time for the Christian to put on the whole armor of God before going down that line of investigation… I didn't want to go there but will probably have to… That's why I was hot to talk with ÆıAnon; hoped to find out what he knew about the 'other side' without having to get very close to the subject personally. He did say it is something impossible to express in human terms, and I believe him (from studying his imagery).

101f57 No.330440










I put these pages into 1 pdf for easy access..

https:// anonfile.com/dcrc81d2bb/DoE_SC___CE_DD.pdf

38048c No.330684

The shadows in the grass look like a woman's figure with antlers and something else above it with wings perhaps?


6da8e1 No.330685


"Q" and "CA" are related to camera settings.

Q for quality and CA or creative auto -mode.

AFAIK CA is only available for canon cameras.

763769 No.330729

File: 886287de6b6c267⋯.png (270.67 KB, 691x541, 691:541, ClipboardImage.png)

File: cabd6cad4d0a4a1⋯.png (322.35 KB, 853x345, 853:345, ClipboardImage.png)

File: 10013c0fe8beefd⋯.png (1.2 MB, 971x542, 971:542, ClipboardImage.png)

From >>330636 and >>330638

The crypto string probably needs to be stripped of a leading character but I'll post it in full here in an abundance of caution.


763769 No.330741

File: fbd01984051da3c⋯.png (812.25 KB, 744x921, 248:307, ClipboardImage.png)

38048c No.330745

Pg. 34, was there anything on the text in the background behind the image?


763769 No.330771

File: 52f259f89cf3c63⋯.png (289.17 KB, 774x492, 129:82, ClipboardImage.png)

>>330745 I dunno. Busy capturing new images from that same poster. Can't look at what I wrote yesterday ATM. Hopefully will get a chance to come up for air in a while…

Pic is from >>330690 and a moderator is over there deleting these images before I can capture them…….

Help me and go complain on the meta thread

38048c No.330802

Where is the appendix that discusses the codes?


763769 No.330804

File: cab1249c0bef82f⋯.png (593.16 KB, 792x569, 792:569, ClipboardImage.png)

763769 No.330914

Anon posted this in general >>330801. I'm copying here in case turns out to be relevant. I think it's an accurate description of the multiverse theory.


The Multiverse/Timeline theory:

Basically it is the theory there is a universe with its own timeline for every possible event/action from the beginning of time until the end of time. Thus there are infinite yous branching back and splitting from you every instant until you were born (ie one of them never drew a first breath). You can look back and remember your life and your decisions to know who you are, but with other choices you would have been a different person. Future Proves Past. The you of 2 days ago is proven by the you of today, and the you of two days ago and the choices you made in those two days created the you that you are today.

An alternate you that made a different decision 3 days ago disproves the you that you remember two days ago; as they do not remember that you of two days ago because that you never existed their timeline. This is the how what Q said works – Future Proves Past.

One of the ways to visualize this is a tiled tv or video screen with a different similar image on each tile; and each tile is an instant in time for all of time. Now behind each tile cascaded behind is an infinite number of windows of all possible events at that moment in time. Let’s take it one step further; if you spun that image 90 degrees out of the TV it would show how each event is connected to each and every other moment in time and how it affects them.

Can those multiverses be interacted with or perceived or experienced? If so then time effects would work both ways as it would affect our past by changing it. Do those multiverses influence or local universe? Could the fractal dimensions of physics actually be these multiverses perceived not 90 degree but as say 0.333 degree or 24.8 degree?

If you draw and X and Y axis on a piece of paper they are at 90 degree and you have length and width. But if you want depth you must draw and axis at 45%. Technically that axis is a 0.5 degree dimension as it is not set at 90 degree. Yes I understand this is just a tool we use to perceive 3-D in a 2-D plane, by doing this we can shift our perspective to see a cube in a 2-D drawing. Think about that; we can use a partial dimensional view to visualize a higher dimension. Most of us do not know how to do that beyond four dimensions. Partial or Fractal dimensions are basically dimension seen/perceived at a 90 degree angle. Try this draw axis’s 6 or 9 or 12 of them equidistance’s from each other and gaze at the page; you can choose which two or three jump out at you that are the X, the Y, and the Z.

It has been proven that these fractal dimensions to influence our 4-D reality from static to how ferns grow. So far it is kind of random for us to find the influence and interactions, and some just call it a mathematical representation. I do not understand the higher math but it seems like all of a sudden in math a multidimensional (fractal) equation just coalesces or clicks into a 4-D answer and it answers a real life question.

What If our tech is beyond what we think? Physics changes all the time, Newton did, Einstein did and from that one we got nuclear power and bombs. What ifbehind the scenes they found a new way to look at the world that allows dimensions to be spun and placed in the way to make length basically irrelevant (a fractal dimension), or time? Distance would eliminate any problem with instantious travel – ie a space fold. Time would allow big changes in events globally and no consequence and it just changes entire timeline.

4836aa No.330968

Thanks for this, really cool stuff.

763769 No.331023

File: 570b11e2d2e3fcc⋯.png (1.3 MB, 1024x683, 1024:683, ClipboardImage.png)

File: e635627a261183e⋯.png (390.12 KB, 1813x353, 1813:353, ClipboardImage.png)

From >>330963

Mod over there keeps deleting stuff.

It is a pain having to archive it over here.

Takes time away from research & digging.

6d4b56 No.331067


well, hot damn. Okay. Thanks for directing me to this anon. I love that we have a specific page for it. Never know! Once again, thanks for the directive.

38048c No.331091

You may need to go to board owner to get action. BO stopped the BVs from banning aianon. The mod just cursed at me when I asked him to not delete and called me a slider.


6d4b56 No.331251






damn, I just went through and read all these. What the shit. This has got to be SOMETHING.

47638b No.331289

File: 0dedcb477ba1deb⋯.jpg (11.62 KB, 405x246, 135:82, Cicada_3301_logo.jpg)


It's the Cicada 3301 cicada!

Maybe unrelated, but Cicada 3301 appeared just a couple of months after Titan was completed.

a48be9 No.331416


I have not posted it yet.

It would be premature to analyze byte strings until we know we have them all, and in the proper sequence.

61c8d4 No.331427


now THAT looks like a cicada…I wasn't getting that from the code image. curious..

you know Cicada was mining for minds….right? >>331289

0315d7 No.331444


it's an offshoot of project mayhem.

if you computerfag and have hero's you don't want to go down this hole…


a48be9 No.331679

File: e62238ab36d060d⋯.png (351.57 KB, 846x371, 846:371, ClipboardImage.png)

from >>330595

Just collecting the crypto strings for future use. Don't bother analyzing


32445f No.331712



I was hoping he would show up, if it is who I think it is.

I gave him directions to this board

and it looks like he found it.

Doxxing if I go any further.

I can say expect more. Tell who needs to be told to not delete those.


38048c No.331897

They are keeping you busy today!


379c41 No.332066

>>328454 thanks anon.

0315d7 No.332111

bump for sliding shillstorm

379c41 No.332210


He told me I ALREADY KNOW. Then comes >>329382. Sgt, Schultz here. I think the human brain relies on quantum phenomena for information processing and perhaps consciousness. JohnJoe McFadden UK. It has to do with parts of brain intercommunicating via electromagnetic flux inside the cranium. Faster than neurons can transmit signal, signal by EM travels one part of brain to another. Did somebody read papers like McFadden and decide to wire up a silicon level architecture that relied upon EM coupling at distance rather than keep all the digital 0/1 stuff discrete and tidy? And when they did, did the machine wake up like a baby? Did they feed it stimuli and give it sensory inputs from a somatic proxy body? Is something like that or more than one of those constructs out there somewhere? Did the singularity occur and we missed it? I dunno man that’s just my sci fi William Gibson take.

38048c No.332469

It would be nice to see things in sequence. I like the way you laid it out above, so maybe repost with the missing things added in.


2ae037 No.334349

Watch this vid:

https:// www.youtube.com/watch?v=oqC4it3Ub5o

379c41 No.335064

>>334349 hmm hook tube oqC4it3Ub5o so watched. all these asci computers are not quantum so : video content big if true, on this bread so connected to the dig, so lovecraft was predictive programming for cern outcome, video says it’s a done deal, book of Revelation, Ghostbusters predictive programming, it’s the block chain as beast system, duh. End of Days soon, check. No one knows the day or the hour but the signs of the times are clear as day. Don’t get into crypto, don’t take mark of beast, repent and believe the Good News. 28 to 6 part does not ring true. News story about Russian scientists busted for trying to mine on a govt supercomputer. If you had control of big machines like that you could mine a replacement for all fiat plus keep all ledgers and expand further like vechain purports, lemme think what else could you do, data crunch for cern? how is Utah connected? Sentient world simulation needs a big distributed? platform assuming that is legit, but what is the point? I see the end game, done deal, bad guys and Things win big right up until the End then Jesus returns, acc, to video. The tech and geomancy angle goes way over a sheep head, they think we are sheep for slaughter and the Good Shepherd lays down his life for the sheep, goes to find the 1 lost leaving the 99, has joy in finding the 1 lost. Good vs. Evil, and Good wins, interesting Revelations has clear language about what seem to be intelligent constructs living statues which could be seen as AI simulacra. So Q purpose here for drops and crumbs is to give heart to Good Guys not all is lost, fight fight fight red pill like evangelization and led to Jesus Christ ultimately. Read in here about Beam of Light prayer recalls for me the Canopus in Argos series by Doris Lessing, I think I do already know.

2ae037 No.335071

https:// twitter.com/ProjectPai

https:// projectpai.com/#

This won't end well but I'll bet millions will be taken in by it.

379c41 No.335110

>>335071 yeah at some point it makes sense to get off the grid entirely, like when this becomes mandatory or “ get discounts for enrolling your avatar in our exclusive shopping club”, Hey who else thinks a Carrington event is a good idea in some respects? EMP the blockchain, Neo pls.

2ae037 No.335115


More on Sentient World Simulation

Looks like we're all nodes in a blockchain with our own avatars/clones - whatever you like to call them. See also ProjectPai which looks to me like bait to hook the sheeple through a "carrot" of personal control over one's own avatar without mention of the accompanying "stick" of surveillance ultimately leading to total control.

2ae037 No.335118


Sorry, forgot link

https:// www.techemergence.com/nsa-surveillance-and-sentient-world-simulation-exploiting-privacy-to-predict-the-future/

379c41 No.335161

>>335118 I will get a farm, solar panels, biogas, heirloom crops, no phone, no cable tv, no email. How soon before I’d get Waco’d? No I’m just NeoAmish.

9dea67 No.344138

File: 9666b3a83a06f1c⋯.jpg (41.19 KB, 474x321, 158:107, KasparHauser_Herzog.jpg)


>CIA would probably NOT have a Quantum computer

Anyone can buy a D-Wave computer. It's the software running on it that matters. They might have different information (Vault7) than the NSA panopticon, but not more (except through their corporate partners/proxies.)


>amazing dub sequence, checked

>Time for the Christian to put on the whole armor of God before going down that line of investigation

Anthony Patch's talks on this in that context are very engaging/thorough (dozens upon dozens of hours of interviews on youtube.)


>What ifbehind the scenes they found a new way to look at the world that allows dimensions to be spun and placed in the way to make length basically irrelevant (a fractal dimension), or time?

IN occult terms, they might want to seed the idea of this to give it more resonance. Observing the fact/effect of this conditions its action in-itself.


>4th image 'mini-hezog'

Werner Herzog's film The Enigma of Kaspar Hauser. Child was found after being locked in a room for years in Germany (mysteriously murdered late in life, after regaining speech). Herzog: Duke (ger.)

>a scene of him visiting a tower he speculates was built by giants, and seeing a bird fly in the window stands out; children showing him around town

9c68d9 No.349722


Old Q Post (CBTS #260)

>anon posts about CIA's 7 supercomputers


Go deeper.

Signatures are IMPORTANT.


Most Curious, at least to me.

1a0b36 No.354242


1a0b36 No.354262

YouTube embed. Click thumbnail to play.


1a0b36 No.354334

File: dd65a9a92a30cd0⋯.png (924.91 KB, 979x546, 979:546, Screenshot from 2018-02-12….png)




1a0b36 No.354340

File: 2450e8824d649e6⋯.jpg (76.87 KB, 1199x628, 1199:628, DVgdYHdXUAAbQiS.jpg)




1a0b36 No.354444

File: d8f550cd9092b07⋯.jpg (501.27 KB, 1919x1260, 1919:1260, 1920px-Laika_ac_USS_Pueblo….jpg)



1a0b36 No.354528

File: 29d87fe6b026f66⋯.png (7.68 KB, 720x400, 9:5, CHAOS_1-6_Welcome.png)



[3] LEFT.


1a0b36 No.354659

File: da8228528ffac6d⋯.png (312.61 KB, 978x548, 489:274, Screenshot from 2018-02-12….png)


1a0b36 No.354682

File: 19c40d486685279⋯.png (690.84 KB, 978x543, 326:181, Screenshot from 2018-02-12….png)



1a0b36 No.354689

File: 4cab44b1e6df3c4⋯.jpg (63.28 KB, 548x864, 137:216, 1476711651217.jpg)


9c68d9 No.354878


Agreed. Call me. Let it Ring O.N.C.E.

i'll call back.

d3769b No.355193

In reply to a post here is sauce on


From Wikipedia, the free encyclopedia

The International Assessments Program — known as Z-Division — is a Special Projects Group of the Lawrence Livermore National Laboratory established to provide the United States Intelligence Community with technical assessments of foreign nuclear programs and weapons capabilities. Z-Division was formed in 1965, bringing together scientists and engineers to help intelligence agencies understand the significance of Soviet nuclear weapons tests. The letter 'Z' was chosen as most letters were already assigned to other divisions. Relationships with the American intelligence community were formalised by a memorandum of understanding drawn up between the Central Intelligence Agency (CIA) and the Atomic Energy Commission (now the Department of Energy) in the same year.

1238aa No.355517


I tend to agree with the thought, check D-Wave, used by opposition research.

d3769b No.355653

File: d57dcf4ed2ac620⋯.png (554.16 KB, 1509x472, 1509:472, ClipboardImage.png)

From >>355307

So, my inference, all the classified computing capability is being put to different uses than the line items in the budget. For market manipulation and more. Got it.

1a0b36 No.355696

File: a37e3b42646b0fd⋯.png (93.39 KB, 1673x702, 1673:702, Screenshot from 2018-02-12….png)

File: 266bdabb97b27d8⋯.png (128.96 KB, 1212x950, 606:475, Screenshot from 2018-02-12….png)

1a0b36 No.355722




379c41 No.355986

>>354682 so ok that site is known

1a0b36 No.356078

File: 1b005c4f80a39fa⋯.png (683.66 KB, 974x545, 974:545, Screenshot from 2018-02-12….png)


In other words, this (a) will only be helpful for either extremely targeted attacks, or in building out a gigantic hash map of sha256 sums or something, and (b) isn't this what the NSA normally does?


064d0d No.356091



What is picture.

USS Pueblo (AGER-2)

From Wikipedia, the free encyclopedia

For other ships with the same name, see USS Pueblo.

USS Pueblo (AGER-2) is a Banner-class environmental research ship, attached to Navy intelligence as a spy ship, which was attacked and captured by North Korean forces on 23 January 1968, in what is known today as the "Pueblo incident" or alternatively, as the "Pueblo crisis".

The seizure of the U.S. Navy ship and her 83 crew members, one of whom was killed in the attack, came less than a week after President Lyndon B. Johnson's State of the Union address to the United States Congress, a week before the start of the Tet Offensive in South Vietnam during the Vietnam War, and three days after 31 men of North Korea's KPA Unit 124 had crossed the Korean Demilitarized Zone (DMZ) and killed 26 South Koreans in an attempt to attack the South Korean Blue House (executive mansion) in the capital Seoul. The taking of Pueblo and the abuse and torture of her crew during the subsequent 11-month prisoner drama became a major Cold War incident, raising tensions between the western democracies, and the Soviet Union and China.

North Korea stated that Pueblo deliberately entered their territorial waters 7.6 nautical miles (14 km) away from Ryo Island, and that the logbook shows that they intruded several times.[1] However, the United States maintains that the vessel was in international waters at the time of the incident and that any purported evidence supplied by North Korea to support its statements was fabricated.[2]

Pueblo, still held by North Korea today, officially remains a commissioned vessel of the United States Navy. [3] Since early 2013, the ship has been moored along the Potong River in Pyongyang, and used there as a museum ship at the Pyongyang Victorious War Museum.[4] Pueblo is the only ship of the U.S. Navy still on the commissioned roster currently being held captive.[5]

fb89ab No.356342

File: 6ce54d0fc55726a⋯.png (1.83 MB, 1493x838, 1493:838, ClipboardImage.png)

File: 85e31e7a9a1a125⋯.png (61.29 KB, 225x225, 1:1, ClipboardImage.png)



.1. 2 demons in left panel between white pillars

.2. dark doorway

.3. black veiled figure facing viewer with face covered

.4. object held or carried by veiled figure. figure's left hand encircles the object. a rose plant with red roses?

.5. tile reminds me of plus ultra tile at trump's mar a lago even tho not exact match



many places are named windsor green

filtering them all out there is a uk cryptocurrency exchange called windsor green

relevance unknown


an intelligence gathering system

people show trump in saudi hands on wizard globe as palantir

wikipedia says

A palantír is a fictional magical artefact from J. R. R. Tolkien's legendarium. A palantír is described as a crystal ball, used for both communication and as a means of seeing events in other parts of the world or in the distant past.

ah now we're getting somewhere

text unknown relevance:

In other words, this (a) will only be helpful for either extremely targeted attacks, or in building out a gigantic hash map of sha256 sums or something, and (b) isn't this what the NSA normally does?

what is 'this'? the massive doe computers diverted for non nuclear use for codebreaking of aes

'this' refers to this capability

isn't it what the nsa normally does?

how would i know im a civilian presumably it is nsas job yes

actually i think the massive computing capability actually IS used for spying into the future and alternate timelines like the anon said above

if they can do this it would be more important militarily financially etc than nuclear weapons

im not sure its safe for anons to even discuss this

5c686e No.357462

File: 0fcd43418015afe⋯.jpg (65.28 KB, 853x379, 853:379, Selection_122.jpg)

File: 77077c6a4472855⋯.jpg (64.74 KB, 928x298, 464:149, Selection_123.jpg)

File: 46d8d6bff85f47a⋯.jpg (28.38 KB, 621x192, 207:64, Selection_124.jpg)

File: 091eefacc43e27e⋯.jpg (32.12 KB, 633x194, 633:194, Selection_125.jpg)

File: 63fdec648aa35b1⋯.jpg (51.55 KB, 856x308, 214:77, Selection_126.jpg)

5c686e No.357467

File: b263bc20ec3b583⋯.jpg (152.07 KB, 1451x929, 1451:929, Selection_127.jpg)

File: df663ab9201ec0e⋯.jpg (93.06 KB, 1458x778, 729:389, Selection_128.jpg)

File: 9e62c88a2d5914a⋯.jpg (225.14 KB, 1538x924, 769:462, Selection_129.jpg)

File: 87bbdb93835f043⋯.jpg (142.11 KB, 1561x707, 223:101, Selection_130.jpg)

File: 5c4c982a279a7dd⋯.jpg (281.17 KB, 1920x1080, 16:9, Workspace 1_084.jpg)

1a0b36 No.357468

File: 32d516ee558978f⋯.png (463.56 KB, 847x474, 847:474, Screenshot from 2018-02-12….png)


>Hadoop MapReduce


Definition - What does Corona mean?

Corona is an open-source scheduling framework used on Apache Hadoop based data infrastructure. Corona was initially designed by Facebook to cope up with a large amount of current, incoming data and the queries processed by each data cluster. Corona is considered an advancement or successor to Hadoop MapReduce.


5c686e No.357596

File: 1c2423d1f92ba26⋯.png (1.06 MB, 1582x807, 1582:807, ClipboardImage.png)


Great. I have to log the fucking timestamps of any number of unknown posts or tweets or images and observe time deltas between them. Fucking great.

Snowden says he built HEARTBEAT and it was authorized by 2 levels of mangement. He spells "explicitly" wrong as "explicited". Unknown if the misspelling is intentional of meaningful. Now I'm supposed to look at Snowden's background and figure out is HEARTBEAT refers to hardware or software or what. I assume software but know little of Snowden's background.


ALL CAPS ANON claims will be banned when (((they))) catch on. LARPish. Who will ban them and why. DistractionLARP?

A church(?) stained glass windows. Black veiled figure again, with smoke around. Inside the church if mirror images of graffiti on outside of blocked up windows indicates correctly. Content of graffiti irrelevant?

Raven Rock pic related.

1aadaf No.357743


5c686e No.357774


A NSA-approved program, called HEARTBEAT. So OK this is what Snowden claims to have built with 2 levels of management approval.

Fucking APAR. Jargon for a program fix.

Fucking PMR number. Jargon for error reporting system used by software customers to report bugs and track bug fixes.

Error description "Q CAPTURE" and "Q APPLY". Possibly pertains to a queue management system that might be used between data capture from possibly an intelligence gathering sources/inputs, and a database. Q Capture suggests a software semaphore where one process obtains exclusive use of the queue … to prevent database conflicts by separate processes trying to modify the same data table simultaneously and overwriting one another's data. A heartbeat would be necessary to prevent the queue staying locked if something went wrong.

COMMIT_LSN likely pertains to a database. The purpose of Q CAPTURE sending a heartbeat message is not known. Perhaps the heartbeat indicates that the process that captured the queue is still working on the DB. If no heartbeat occurs another process would release the lock and fix the DB.

The exact nature of this bug and the bug fix is unclear to me but I am fairly certain it pertains to a database mangement system frontended by a queue management system.

1a0b36 No.357777

File: e062eedd52df9d0⋯.png (949.62 KB, 971x542, 971:542, Screenshot from 2018-02-08….png)




e79963 No.357862


The post on HADOOP sheds further light.

Both posts pertain to a QMS fronting a DBMS. So I'm in the right ballpark apparently.

e79963 No.357954

File: 3ea834b8573b5ca⋯.png (1.29 MB, 1320x972, 110:81, ClipboardImage.png)


> 5c4c982a279a7dd⋯.jpg posted in error. Ignore.

The anon is phoneposting.

The dark gray post

AT&T → telco with major cooperation with intelligence agencies

SITE R. → Raven Rock?

RAVEN ROCK. → posted Wikipedia abstract


DISA = Defense Information Systems Agency.

Try their Twitter account. @USDISA

I'm not a very good digger.

Pic 1 related.

Looks like a job fair recruitment thing.

Hmmm…. proud of their new cloud.

I can't understand how people can put their personal data into a cloud and assume it is safe. Cloud security depends on encryption. DISA would presumably have used AES (not verified, just guessing). AES is broken. What security!?!

Next post will check Wikipedia cite on USDISA.

e79963 No.358133

File: 7395cf62e5ea0ae⋯.png (646.48 KB, 970x803, 970:803, ClipboardImage.png)

File: fb32ef6dc692c36⋯.png (1.17 MB, 929x972, 929:972, ClipboardImage.png)

File: 851a2fb3b3b182a⋯.png (1.21 MB, 931x930, 931:930, ClipboardImage.png)

File: 77c041f403a2be5⋯.png (773.78 KB, 1001x936, 77:72, ClipboardImage.png)


Per wikipedia (I paraphrase):

SITE R. refers to the USACC (U.S. Army Communications Command) Site R Telecommunications Center within the Raven Rock complex. Or "Raven Rock Site R Alternate Joint Communications Center (AJCC) – United States Nuclear Forces".


"Raven Rock Mountain that has been called an "underground Pentagon."[4][5] The bunker has emergency operations centers for the United States Army, Navy, and Air Force. Along with Mount Weather Emergency Operations Center in Virginia and the Cheyenne Mountain Complex in Colorado, it formed the core bunker complexes for the US Continuity of Government plan during the Cold War to survive a nuclear attack."

Instead of guessing these terms I'll look each one up to be sure to get it right:

→Command and Control (acronym C2):

C2 in a military organization is the exercise of authority and direction by a properly designated commanding officer over assigned and attached forces in the accomplishment of the mission. The term may also refer to command and control systems within a military system.

//In context here I believe it refers to both the command function as well as the IT and other systems that support the command function. //

MNIS leads to an article explaining the terms listed below MNIS:


Too long to paste here

Screencapture instead (pics)

1a0b36 No.358177






e94d68 No.358215

File: bdae40647bb55d4⋯.png (444.83 KB, 758x718, 379:359, ClipboardImage.png)

e94d68 No.358244


So Mini-Duke bit C2 at Site R …

Completely ignoring the crypto strings ATM.

1a0b36 No.358264


https:// labs.bitdefender.com/wp-content/uploads/downloads/2013/04/MiniDuke_Paper_Final.pdf

e94d68 No.358291

File: 8ec574691ad9d72⋯.png (195.77 KB, 548x864, 137:216, ClipboardImage.png)

File: b7d41454014d572⋯.png (330.53 KB, 789x675, 263:225, ClipboardImage.png)

Copying from >>357668



e94d68 No.358335

File: 95dabece32fa470⋯.png (873.84 KB, 1514x932, 757:466, ClipboardImage.png)

File: b87a5ef9b74de4e⋯.png (3.96 MB, 3300x2550, 22:17, ClipboardImage.png)

File: 8a93a153d59847c⋯.png (619.21 KB, 847x474, 847:474, ClipboardImage.png)

Copied from >>357680

News unlocks MAP.

Think Mirror.

Which team?

THEY don't know.


"poet Edna St. Vincent Millay #52 on top 500 poets Poet's PagePoemsQuotesCommentsStatsE-BooksBiographyVideosShare on FacebookShare on Twitter

Poems by Edna St. Vincent Millay : 154 / 169 « prev. poem next poem »

To A Young Poet - Poem by Edna St. Vincent Millay


/ 0:24

Autoplay next video

Time cannot break the bird's wing from the bird.

Bird and wing together

Go down, one feather."



e94d68 No.358351

File: 1194ccb6ffdbaa0⋯.png (1.81 MB, 944x946, 472:473, ClipboardImage.png)

File: b08f9d628209cb5⋯.png (457.21 KB, 853x486, 853:486, ClipboardImage.png)

e94d68 No.358355

File: b133202327d4c4a⋯.png (332.44 KB, 1686x500, 843:250, ClipboardImage.png)

e94d68 No.358360

File: fbe2791b0029205⋯.png (276.85 KB, 1683x433, 1683:433, ClipboardImage.png)

e94d68 No.358373

File: ca01ba7bf448299⋯.png (293.49 KB, 1196x315, 1196:315, ClipboardImage.png)

File: f6a840cf8405e2c⋯.png (678.73 KB, 1020x571, 1020:571, ClipboardImage.png)

e94d68 No.358377

File: 9645b0f29b33ab2⋯.png (281.76 KB, 861x319, 861:319, ClipboardImage.png)

File: 62dfd48565384b8⋯.png (1.03 MB, 979x546, 979:546, ClipboardImage.png)

e94d68 No.358381

File: 722eedf955f376f⋯.png (244.97 KB, 732x281, 732:281, ClipboardImage.png)


"Bird and wing together

Go down, one feather."

https:// twitter.com/juliet_kindred/status/962967798581313537

e94d68 No.358388

File: df2a4cebdfefcbe⋯.png (571.45 KB, 873x972, 97:108, ClipboardImage.png)

e94d68 No.358484

File: 2d6887db6311325⋯.png (440.8 KB, 875x425, 35:17, ClipboardImage.png)

File: 1f564ca772cf4f8⋯.png (916.49 KB, 978x543, 326:181, ClipboardImage.png)

copied from >>357913









///quick comment from the anon copying, not the OP: I can't type fast enough to capture this and study it at the same time! It looks to me like something is going to happen imminently to a Java program called BIG INSIGHTS that is running on an IBM system. We've been shown IBM Q technology tonight. Raven Rock "pentagon underground" Site R. A (fixed?) software bug pertaining to logging from a QMS to a DBMS in software supposedly created by Snowden. Then a pic of an emergency broadcast message.

How does all this relate?

I think it's all happening SOOON ANONS

Just my 2c/////

e94d68 No.358498

File: fcd2dd43d631f94⋯.png (1.23 MB, 975x545, 195:109, ClipboardImage.png)

File: 0fda42d8b65c918⋯.png (296.87 KB, 835x314, 835:314, ClipboardImage.png)

e94d68 No.358512

File: e55b7594e2d63d5⋯.png (271.16 KB, 861x315, 41:15, ClipboardImage.png)

File: c55e8c320769c9d⋯.png (1.1 MB, 974x545, 974:545, ClipboardImage.png)

File: 74419f3abfbc996⋯.png (257.72 KB, 894x401, 894:401, ClipboardImage.png)

The Winter Olympic games in the Russian city of Sochi promises to be a blast from the (Soviet) past with a dash of NSA-style surveillance thrown in, according to reports hinting that Russian security services will run a surveillance network so comprehensive that one analyst described the plan as “PRISM on steroids.”

The Russian FSB security service – successor to the Soviet KGB – is updating its already comprehensive “Sorm” Internet- and telephone-monitoring system. The new edition will have new interception and content-recognition capabilities that will allow it to monitor any phone- or data traffic from the vicinity of the games, and to recognize and track the use of specific words or phrases included in emails, chats or social media postings, according to a team of Russian investigative reporters whose results were reported Oct. 6 in the U.K. newspapers The Guardian and Telegraph.

The two journalists, Andrei Soldatov and Irina Borogan, collected information on the upgrade from requests for proposals, project specifications, offer letters, descriptions from Russian-government oversight agencies and other documents describing the project.

The Sorm network is being upgraded nationwide, but the region surrounding the Black-Sea resort city of Sochi has priority status for work to increase the network’s local capacity and to add abilities such as deep packet inspection that would allow FSB or other agencies to filter Internet traffic by keyword or other content.

Mention of the word “Novalny” could trigger extra scrutiny on the assumption that discussion revolves around Russian opposition politician Alexei Navalni, Soldatov told the Guardian.

“There is an element of meta-data gathering [as in the NSA’s PRISM surveillance], but Russian security services are not so interested in meta-data,” Soldatov told The Telegraph. “This is about content. The idea seems to be to make communications in Sochi totally transparent for the Russian authorities.”

The scope of the Sorm upgrades is similar to the PRISM system used by the NSA but more reliable, according to Univ. Toronto political-science Professor Ron Deibert, director of the university’s Citizens Lab, which researches surveillance, human rights and global security., who acted as consultant for the investigation.

The NSA’s PRISM surveillance system had checks and limitations built in to help prevent abuse, though they were weak or easily bypassed, Deibert said.

“In the Russian system permanent access for Sorm is a requirement of building the infrastructure,” he told the Guardian.

Long before the Sorm upgrades came to light, the U.S. Department of State recognized Russian eavesdropping as a big enough problem to issue an official warning to a warning to those traveling to the Games that Russian security is likely to eavesdrop on electronic communications.

“Business travelers should be particularly aware that trade secrets, negotiating positions, and other sensitive information may be taken and shared with competitors, counterparts, and/or Russian regulatory and legal entities,” the document reads.

Sorm was authorized in 1995 and went into operation in 2000, according to State Dept. travel guides.

The FSB has been upgrading the system since 2010, including the Sorm access-points that ISPs are required to install to allow government surveillance of Internet traffic.

The FSB is the Russian Federation successor to the Soviet KGB secret police, which employed once-and-current Russian President Shirtless Vlad Putin for 17 years as a mid-level administrator and spymaster, according to a Jan. 30, 2000 story in the Washington Post.

Like the NSA, the FSB, “technically requires a warrant to intercept a communication, [but] is not obliged to show it to anyone,” according to the Guardian.

Both the FSB and Russian-government spokesman Alexei Lavrischev declined to confirm the reports, but Lavrischev said surveillance at the Sochi games would be less intrusive than that by extensive network of security cameras in London during 2012 summer Games.

“There, they even put CCTV cameras in, excuse me for saying it, the toilets,” Lavrishchev told the Guardian. “We are not taking this kind of measure.”

Image:Shutterstock.com/ Martynova Anna

Sqrrl’s New Analytics Platform Based on NSA Tech

Nick Kolakowski

June 21, 2013

e94d68 No.358518

File: 82f9a0f2f024e81⋯.png (777.16 KB, 1828x313, 1828:313, ClipboardImage.png)

File: 629fea17d57228e⋯.png (665.63 KB, 847x476, 121:68, ClipboardImage.png)

e94d68 No.358522

File: 6c435e7bfd3d43d⋯.png (787.36 KB, 861x918, 287:306, ClipboardImage.png)

File: 0a159c62c4ed417⋯.png (992.29 KB, 977x544, 977:544, ClipboardImage.png)

e94d68 No.358528

File: b97427c27f7fc45⋯.png (994.18 KB, 1021x571, 1021:571, ClipboardImage.png)

File: da29bcbbf18489a⋯.png (686.3 KB, 934x822, 467:411, ClipboardImage.png)

1a0b36 No.358534


e94d68 No.358536

File: 200850672481e86⋯.png (336 KB, 851x598, 37:26, ClipboardImage.png)

File: f577a799512ef3c⋯.png (263.3 KB, 784x807, 784:807, ClipboardImage.png)

File: a10361b1ef05b5d⋯.png (481.96 KB, 777x939, 259:313, ClipboardImage.png)

379c41 No.358683

>>355653 first post in this thread asks the question

650e55 No.358697


So? Another test/hack of the EBS?


Will I need duct tape this time or just muh beer?

Why the Russian Phrase?

Pigs might fly.

Literal: It was happening – a goat was eating up a wolf.

d0bc24 No.358713

Archived /qresearch/ General #440

containing the crypto codes from Feb 12, 2018 here →

http:// archive.is/cJ8On

Archive of THIS BREAD as of now, here →

http:// archive.is/10NC5

Anons, please make a note of it in case this thread disappears

d0bc24 No.358755


3 documents need to read quickly. Somebody read and write a quick summary post on it:

→ https:// www.disa.mil/mission-support/command-and-control/mnis

→ https:// insights.dice.com/tag/prism/

→ I am reading and will summarize the 20 pp PDF on Mini Duke malware


GO GO GO anons. My guess is that we're up against time here to figure out what is about ot happen.

ab6676 No.358924

MINI-DUKE malware.

Discovered February 27 2013.

First known sample: June 2011.

Risk: Document exfiltration.

Spread thru infected PDF file which deposits dropper.

Once installed, the malware calls home using a URL found via Twitter or Google search query. When successfully connected, new updates or payloads are installed under the disguise of .gif images.

Spread by social engineering: malicious PDFs sent by email.

Within the installed malware, the query strings are encrypted.

Infects Windows (via rundll32)

Runs briefly after each boot

Has a mechanism for adding modules & updates

Includes commands for:

mv - Moves a file. Uses MoveFileA api.

cp - Copies a file. Uses CopyFileA api.

rm - Deletes a file. Uses DeleteFileA api.

pwd - Gets current dir. Uses GetCurrentDirectoryA api.

cd - Sets current dir. Uses SetCurrentDirectoryA api.

rmdir - Removes dir. Uses RemoveDirectoryA api.

mkdir - Creates a dir. Uses CreateDirectoryA api.

pskill - Kills process. Uses OpenProcess, TerminateProcess apis.

This is how the malware exfiltrates documents from target computers.

* * * * *

The Wilton Park and Ukraine's NATO Membership Action Plan Debates documents in >>358536 are .png captures of forged PDF documents that were used during the social engineering phase to intiially drop the malware on target systems.

* * * * *

So these PDF documents shed light on what kind of systems were targeted by MINI-DUKE. These topics would be of interest to governments and military.

ab6676 No.358974

This post >>354528 suggests that of the original seven dwarves DoD supercomputers, another one was just taken out, or its control by /badguys/ disabled.

A couple of days ago anons believed that 3 of the 7 had been disabled. This posts suggests that a 4th has now been disabled.

3 remain, and they are in the kill box (targeted) for future action.

The graphic suggests that this is being done as a hack attack against them by a penetration testing firm.

I find this highly unlikely, but nothing can be ruled out.

1a0b36 No.358986




ab6676 No.359009


Yes this one >>354682 is solved by this >>358133

379c41 No.359048

>>358755 honest inquiry. If we are up against time to figure out what is going to happen…if we fail, we will still know it, because it happens. If we find out before and it happens, we know the same thing. So what is the point? Learning that the future can be computed? Must be. Predictive simulation must be both deployed and weaponized and high confidence.

ab6676 No.359057


I don't have the slightest idea what this image is about.

The woman's eyes are blackened.

She's wearing something like a nun's veil on her head.

The white bib-like contraption is badly soiled by drops of some unclean liquid but it doesn't look as dark as blood.

She has something like a black ribbon around her neck, the kind worn for ID badges at computer conferences.

The background, as usual, exhibits mirroring about 2 vertical axes.

With the Apache posts we are beginning to think of mirroring in the sense of database mirroring.

I expect DBs with national security importance would certainly be mirrored. Think high availability systems technology. There are multiple technologies that can do that at high speed, in near real time, at geographically distant sites. I can't venture a specific guess because it depends heavily on the particular system architecture.

62be5d No.359108


What's the relevance of USS Pueblo?

* * * * *

Something that's ours, that is being held "hostage" by North Korea.

* * * * *

Apply this analogy to the possibility that there has been data exfiltration from DoD national security systems by Mini-Duke malware. >>358924

>>359048 As you wish. I'm doing what I'm doing.

62be5d No.359152


Raven Rock site.

Image: Raven is dead.

Her fingernails are black like mourning.

Very very sad.

It is a tragedy if a major military installation of national importance for C&C in the event of nuclear war were 'dead' like the raven is dead.

I get the picture. Shit.

ba390b No.359317

File: 1beaa994e47855e⋯.png (266.9 KB, 676x563, 676:563, ClipboardImage.png)

File: 6312fe0371922f3⋯.png (202.95 KB, 387x576, 43:64, ClipboardImage.png)

>>354689 Discussed this image here → >>329170


"Agreed. Call me. Let it Ring O.N.C.E.

i'll call back."

is plainly code.

Once means eleven in Spanish

Letting the phone ring once then hanging up is a signal.

A key ring was posted in ~#392 (pic)

Key ring is crypto terminology.

Crypto key storage is called a key ring.

Maybe this means that all the bit strings on the various posts comprise ONE key RING.

It's something about the crypto keys.

Scratches head.

ba390b No.359366

File: 64e78def317974a⋯.png (415.28 KB, 873x511, 873:511, ClipboardImage.png)

might not be related … i don't know

ba390b No.359484

I don't know if mod banned you.

I messaged the mod >>359471 to unban you and explained why. Hope it works.

bee9fb No.359503


The same user id posted >>359137

I thought maybe a slide, see >>358984 as the codes have been out a year. But, doesn't necessarily mean it's a shyll. Dug more, and think that with the codes _may_ be legit.

Then there is this user


User ID: 2ce7fe (24)

in bread #441

https:/ /8ch.net/qresearch/res/358409.html#q358519

posts such as: >>358530



>Good, fuck off to mommy's basement and beat your meat. Do you really fucking think I give a rats ass?

That's a shyyll tactic right there, same technique as >>358653

>Cause he's a gay fag who wants to feel some sort of power, living in his mommy's basement.

User goes back to the Cicada / Tengri type images and mirrors those:


>Mirrored at 180 she has a severed head of a raven hanging from her throat, she's wearing nun clothing, the raven's blood forms something on the front of her shirt and there are devils in the back ground. Creepy stuff… Need to check out Michelle's portrait now.

Id mirrors O portrait >>358630, an anon asks to explain and answers: >>358712

>Not point anything out yet.. just experimenting. Coincidence a illuminatti pyramid appears between his eyes?

So, a shyll making the Cicada / Tengri images look like bunk, adding noise to the posts by that anon. Interesting, if drawing them in, could indicate you anons are over the target!

5f646a No.359592

I've been following this anon all afternoon and maybe it's nothing but I'm glad somefag has created a board and is trying to make sense of this.

I dug a little on a couple topics and it may be meaningless but I never came up empty handed.

6a1442 No.359629


The poster I'm interested in is not posting pictures of Obama's portrait. Maybe somebody else is using the same VPN. The type of posts and quality of information in them is entirely different. It looks like entirely different people to me.

Thanks Mod.

6a1442 No.359732

File: 035c156f334bfd1⋯.png (108.45 KB, 694x191, 694:191, ClipboardImage.png)

File: 3cc0daacd4d0383⋯.png (155.76 KB, 692x244, 173:61, ClipboardImage.png)

File: 94d465531713c2e⋯.png (89.07 KB, 543x173, 543:173, ClipboardImage.png)

File: 3affd8ec1932964⋯.png (168.94 KB, 843x222, 281:74, ClipboardImage.png)

The following copied posts may or may not be relevant to this thread. Archiving here b/c better safe than sorry.

6a1442 No.359788

reposting from


https:// www.techopedia.com/definition/29098/corona-facebook

"'Corona is primarily designed to manage very large data sets that are beyond the capacity of MapReduce and for improved utilization of cluster resources. Corona works by introducing a specialized cluster manager and a dedicated job tracker for each job. The cluster manager routinely reviews the cluster for free resources and overall activity. The job tracker in turns tracks and monitors the status of each job/task. Job tracker can be executed on the client machine or on the cluster for larger data requirements. By isolating job roles and functions, which Hadoop MapReduce do not do, Corona achieves better cluster utilization and processes more jobs."'

The difference between big data and the open source software program Hadoop is a distinct and fundamental one. The former is an asset, often a complex and ambiguous one, while the latter is a program that accomplishes a set of goals and objectives for dealing with that asset.


Big data is simply the large sets of data that businesses and other parties put together to serve specific goals and operations. Big data can include many different kinds of data in many different kinds of formats. For example, businesses might put a lot of work into collecting thousands of pieces of data on purchases in currency formats, on customer identifiers like name or Social Security number, or on product information in the form of model numbers, sales numbers or inventory numbers. All of this, or any other large mass of information, can be called big data. As a rule, it’s raw and unsorted until it is put through various kinds of tools and handlers.

Hadoop is one of the tools designed to handle big data. Hadoop and other software products work to interpret or parse the results of big data searches through specific proprietary algorithms and methods. Hadoop is an open-source program under the Apache license that is maintained by a global community of users. It includes various main components, including a MapReduce set of functions and a Hadoop distributed file system (HDFS).

The idea behind MapReduce is that Hadoop can first map a large data set, and then perform a reduction on that content for specific results. A reduce function can be thought of as a kind of filter for raw data. The HDFS system then acts to distribute data across a network or migrate it as necessary.

Database administrators, developers and others can use the various features of Hadoop to deal with big data in any number of ways. For example, Hadoop can be used to pursue data strategies like clustering and targeting with non-uniform data, or data that doesn't fit neatly into a traditional table or respond well to simple queries.

6a1442 No.359829

repost from >>359760


eta numeris


sin topper


project runway


7FG final request


fall of cassandra


echo "392D8A3EEA2527D6AD8B1EBBAB6AD" > eta-numeris.hex

echo "D6C4C5CC97F9CB8849D9914E516F9" > sin-topper.hex

echo "847D8D6EA4EDD8583D4A7DC3DEEAE" > project-runway.hex

echo "831CF9C1C534ECDAE63E2C8783EB9" > 7FG-final-request.hex

echo "2B6DAE482AEDE5BAC99B7D47ABDB3" > fall-of-cassandra.hex

openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key

openssl enc -aes256 -in sin-topper.hex -out sin-topper.key

openssl enc -aes256 -in project-runway.hex -out project-runway.key

openssl enc -aes256 -in 7FG-final-request.hex -out 7FG-final-request.key

openssl enc -aes256 -in fall-of-cassandra.hex -out fall-of-cassandra.key


6a1442 No.359855

repost from >>359582


https:// en.wikipedia.org/wiki/Apache_Accumulo

Accumulo was created in 2008 by the US National Security Agency and contributed to the Apache Foundation as an incubator project in September 2011.[3]

On March 21, 2012, Accumulo graduated from incubation at Apache, making it a top-level project.

https:// github.com/apache/accumulo


6a1442 No.359864


Here's the image that goes with it.

She is blinded in one eye.

This likely means that intel agency(ies) lost some of their sight capability in relation to the information posted.

6a1442 No.359876

File: 95b10a3ffa1fc6c⋯.png (613.38 KB, 833x469, 119:67, ClipboardImage.png)


2nd try heres the image now

6a1442 No.359888

File: dc5a82f780e8b02⋯.png (814.27 KB, 844x470, 422:235, ClipboardImage.png)

File: 6f6566792866ea9⋯.png (10.43 KB, 360x92, 90:23, ClipboardImage.png)

File: f9adf3e6352247b⋯.png (209.74 KB, 1200x804, 100:67, ClipboardImage.png)

File: c884eeaa820e887⋯.png (14.69 KB, 353x143, 353:143, ClipboardImage.png)


4 images go with it that i missed.

Looks like she is getting some light.

Getting her eyesight back.

Seeing clearly again.

6a1442 No.359929

File: c80597139d90525⋯.png (593.05 KB, 1297x566, 1297:566, ClipboardImage.png)

File: ece824584a027ff⋯.png (108.26 KB, 632x841, 632:841, ClipboardImage.png)

File: b803ca8dbef5a92⋯.png (753.28 KB, 844x471, 844:471, ClipboardImage.png)

File: bfdcd4a12aab42c⋯.png (126.87 KB, 823x673, 823:673, ClipboardImage.png)

sorry these posts are out of order. it's impossible jumping back and forth between 2 active threads while doing this.

1a0b36 No.359948



6a1442 No.359951

File: cbf9cf84776c566⋯.png (1007.97 KB, 1821x816, 607:272, ClipboardImage.png)

File: 3eb75b8373c5c5d⋯.png (2.65 MB, 1108x1098, 554:549, ClipboardImage.png)

File: a6f795a21051d87⋯.png (3.36 MB, 1919x1260, 1919:1260, ClipboardImage.png)



6a1442 No.359997

File: 99801c1b0bdc478⋯.png (2.58 MB, 1622x1083, 1622:1083, ClipboardImage.png)

File: 8f347416dae2969⋯.png (381.29 KB, 530x361, 530:361, ClipboardImage.png)

File: 206a1118ad615e6⋯.png (6.04 MB, 3253x2514, 3253:2514, ClipboardImage.png)

File: 1747e9718f0f83e⋯.png (1.4 MB, 1827x740, 1827:740, ClipboardImage.png)

repost from >>359951


USS PUEBLO (today)A perspective

In the late 1990s the Clinton Administration attempted to negotiate with North Korea. At the time, the Koreans were in the process of constructing a nuclear reactor. It would be capable of producing nuclear weapons grade plutonium. The US government entered an agreement that stated in essence, if the Koreans stopped work on the reactor, the US along with some EU nations would provide them with a new light water reactor plus 500,000 tons per year of heavy fuel oil. The fuel oil to be used in the Korean oil fired power plants. US Secretary of State Madeleine Albright visited Pyongyang and met with Kim Jong Il. During the course of those "negotiations" the North Koreans felt they would be able to move USS PUEBLO from Wonsan on Korea's east coast to the Taedong River at Pyongyang on the west coast. This was a voyage of over 1000 nautical miles, all in INTERNATIONAL WATERS.

The move of the ship from Wonsan to Pyongyang was handled by Secretary of Defense William J. Perry who had been appointed by President Clinton his North Korea Policy Coordinator. In that role he was in favor of negotiation and appeasement. He was instrumental in arranging Secretary Albright’s visit to NK.

He allowed the ship relocation from East to West and told the US Navy - hands off.

6a1442 No.360003


Thanks. Somebody really hates what you are posting and keeps telling the Mod to delete it and ban you . I understand the relevance but it appears that nobody else does. Very fatigued over here.

6a1442 No.360013

File: efcdb7c606c4dce⋯.png (216.52 KB, 855x317, 855:317, ClipboardImage.png)

File: 449fc233e02cad2⋯.png (685.36 KB, 973x544, 973:544, ClipboardImage.png)

reposting from >>359892



6a1442 No.360024

File: 8bef2c28a64d22f⋯.png (338.43 KB, 879x342, 293:114, ClipboardImage.png)

File: d7429a8e84a4d81⋯.png (1.19 MB, 978x540, 163:90, ClipboardImage.png)

repost from >>359926


https:// en.wikipedia.org/wiki/Agreed_Framework


1a0b36 No.360034

File: 8158248169ef4f2⋯.jpg (25.62 KB, 236x333, 236:333, 4976c7b434fa94db353417792a….jpg)






6a1442 No.360044

File: ffafcdc3700587e⋯.png (334.94 KB, 859x350, 859:350, ClipboardImage.png)

File: 63259cd67d3a3b5⋯.png (3.17 MB, 1472x959, 1472:959, ClipboardImage.png)

repost from >>359985


39.040204, 125.739264

///// anon adds: USS pueblo is on this map ////

6a1442 No.360050



God bless Patriot

a3a8a3 No.360163

File: f570bf10c1fe007⋯.png (273.09 KB, 778x389, 2:1, ClipboardImage.png)

File: 216beb33b454d43⋯.png (202.66 KB, 497x278, 497:278, ClipboardImage.png)

repost >>360140



a3a8a3 No.360171

File: 874b8303ecbe313⋯.png (1.33 MB, 1920x1080, 16:9, ClipboardImage.png)

File: 7d38b435a90adfe⋯.png (258.32 KB, 801x310, 801:310, ClipboardImage.png)

repost >>360149



a3a8a3 No.360271



OK I think get the image reference and relevance of the Russian мини-герзог (Mini Herzog) now.

Herzog (German) means Duke (English).

So мини-герзог (Rus.), mini-Herzog (English) means


The cyber-espionage malware that had data exfiltration capability.

Referred to here → >>358177



Here is a terse summary of Mini-Duke, how it worked and what its capabilities were.


bee9fb No.360293


Totally agree anon. Right, sorry if I didn't make that clear, point was that CryptoAnon, or whoever is doing the coded posts with cicada/tengri images, was being picked up by / spoofed by what looked to be a shyll. Modifying an image by mirroring and posting nothing but crap verbiage with it. That's why I said maybe you crypto anons over here were 'over the target' as that tends to attract their attention, shylls try to subvert and slide the important stuff. And it was 'higher-end' shylling, in the sense they were editing images with mirrored effects and trying to blend in more. But, was pointing out mannerisms and attacks were the same as typical.


Seconded, good job.


Hang in there, doing good work!

I got banned for agreeing with the person pointing out "helperAnon", they don't like that idea. I think it has merit, and commenting on that earned me a 3yr ban (not the only one) for calling bullshit on it. Whatever, cycle the IP.

Have a good night anon, godspeed.


Those look to be the posts of movieAnon from the UK. If anyone would like, I may have a few more of their Socratic drops I can post in here, just holler, will check back.

a3a8a3 No.360378

File: 3294b01070c555e⋯.png (12.89 KB, 990x250, 99:25, 191486b.png)

File: 5d665f615f52433⋯.png (907.87 KB, 1536x2048, 3:4, EricSchmidtVisittoNK.png)

File: 3f532e3f1535952⋯.jpeg (438.47 KB, 1368x1560, 57:65, MyPost191724.jpeg)


'''By putting Mini-Duke in Russian,

мини-герзог (Rus.),

I'm forced to conclude that OP is saying that this espionage software was Russian.'''

Mini-Duke was discovered February 27 2013. The first known sample: June 2011.

Risk: Document exfiltration.

Organizations that think (or know) they were compromised by Mini-Duke need to look at what data assets they had during the period when it was active, that could have been exfiltrated by a foreign power.

So when did North Korea suddenly get nuclear bomb capability?

When did it start performing nuclear tests in that mountain and threatening the world?


1. 9 October 2006, smallish, est. 0.7 - 2 kt and possibly a fizzle says Wikipedia.

2. 25 May 2009, est. 2 - 5.4 kt

3. 12 February 2013, 6 - 16 kt

4. 6 January 2016, 7 - 16.5 kt

5. 9 September 2016, 15 - 25 kt

6. 3 September 2017, 70 - 280 kt. NK claimed hydrogen bomb.

Let's suppose U.S. sensitive nuclear secrets were exfiltrated from classified databases sometime between 2011-2013.

Is it reasonable that, now having U.S. technology know-how, North Korea could within about 3 years convert that know-how into a workable nuclear weapon?

Three years? I think so. Especially if they had help.

Now I REALLY wonder what Eric Schmidt was doing in North Korea. Especially when this document was visible on the computer screen in images that Q gave us.

a3a8a3 No.360475



///// I'm very uncomfortable with this conclusion, especially since we KNOW from the Vault 7 release that the CIA hacking tool suite included the ability for their software to impersonate/implicate just about any country /////

5ea976 No.360926


What is on the Angels left shoulder?

5ea976 No.360938


Looks like there is all kinds of imagery with-in.

5ea976 No.361255


TY, Godspeed Patriots.

650e55 No.362426


Why did the original image/info poster

include this sequence(deleted) in another thread?

POWERPC not affected by Meltdown(MD)? I thought it was.


Was MD deliberate from the beginning?

Does this Mini-Duke exploit use Meltdown vectors?

from OP(not this thread):

RS/6000 RS/6000 RS/6000 RS/6000 RS/6000

memory keyboard network scsi speaker ok

0 > dev / ok

0 > ls

00c5a398: /cpus

00c5b0d8: /PowerPC,POWER3@0

00c5b650: /l2-cache

00c5c198: /PowerPC,POWER3@1

00c5c710: /l2-cache

00c5cb08: /PowerPC,POWER3@2

00c5d080: /l2-cache

00c5d478: /PowerPC,POWER3@3

00c5d9f0: /l2-cache

00c5dde8: /reserved@ff000000

00c5e390: /event-sources

00c5e3f8: /epow-events

00c5e490: /chosen

00c5e5f8: /memory@0

00c61510: /IBM,memory-module@0

00c61920: /IBM,memory-module@1

00c61d30: /IBM,memory-module@2

00c62140: /IBM,memory-module@3

00c62558: /IBM,memory-module@4

00c62968: /IBM,memory-module@5

00c62d78: /IBM,memory-module@6

00c63190: /IBM,memory-module@7

00c635a8: /IBM,memory-module@8

00c639b8: /IBM,memory-module@9

00c63dc8: /IBM,memory-module@a

00c641e0: /IBM,memory-module@b

00c645f8: /IBM,memory-module@c

00c64a08: /IBM,memory-module@d

00c64e18: /IBM,memory-module@e

00c65230: /IBM,memory-module@f

00c65648: /IBM,memory-module@10

00c65a58: /IBM,memory-module@11

00c65e68: /IBM,memory-module@12

00c66278: /IBM,memory-module@13

00c66690: /IBM,memory-module@14

00c66aa0: /IBM,memory-module@15

00c66eb0: /IBM,memory-module@16

00c672c8: /IBM,memory-module@17

00c676e0: /IBM,memory-module@18

00c67af0: /IBM,memory-module@19

00c67f00: /IBM,memory-module@1a

00c68318: /IBM,memory-module@1b

00c68730: /IBM,memory-module@1c

00c68b40: /IBM,memory-module@1d

00c68f50: /IBM,memory-module@1e

00c69368: /IBM,memory-module@1f

00c69780: /memory-controller@ff001000

00c699b0: /nvram@ff800000

00c69e80: /IBM,sp@ff880000

00c79c08: /rom@fff00000

00c7acb8: /interrupt-controller@ffc00000

00c7b060: /openprom

00c80238: /options

00c80e28: /aliases

00c828e8: /packages

00c82990: /deblocker

00c83470: /disk-label

00c86b38: /tape-label

00c86db8: /obp-tftp

00c900d0: /prep-boot

00c90688: /fat-files

00c920c0: /iso-13346-files

00c99270: /disassembler

00c9e5b8: /assembler

00caf468: /platform

00cafdf0: /utilities

00cb9aa8: /net

00cbb2b0: /iso-9660-files

00cbc1c0: /boot-mgr

00cd0550: /chrp-loader

00cd06e0: /pe-loader

00cd0f00: /elf-loader

00cd3090: /terminal-emulator

00d2ccf8: /gui

00db8ab0: /post

00cd3128: /rtas

00ce2470: /pci@fef00000

00cecd10: /isa@b

00cee920: /reserved@i78

00ceea28: /rtc@i70

00cf0640: /serial@i3f8

00cf1758: /serial@i2f8

00cf2870: /fdc@i3f0

00cf5ed8: /timer@i40

00cf6420: /interrupt-controller@i20

00cf6658: /dma-controller@i0

00cf6c30: /ethernet@c

00cff2d8: /scsi@d

00d04b58: /sd

00d05ab8: /st

00ce6930: /pci@fee00000

00d06e20: /ethernet@b

00ce9440: /pci@fed00000

00d0f5c8: /ethernet@b

00cebc40: /IBM,TB3MX@fb000000


0 > " ibm,loc-code" 00cf6c30 get-package-property ok

3 > . 0 ok

2 > dump

00cf6c70: 50 32 2f 45 31 00 :P2/E1.: ok

0 > " vendor-id" 00cf6c30 get-package-property ok

3 > . 0 ok

2 > dump

00cf6c98: 00 00 10 23 :…#: ok

0 > " device-id" 00cf6c30 get-package-property ok

3 > . 0 ok

2 > dump

00cf6cc0: 00 00 20 00 :.. .: ok

0 > " revision-id" 00cf6c30 get-package-property ok

3 > . 0 ok

2 > dump

00cf6ce8: 00 00 00 26 :…&: ok

0 > dev /pci@fef00000/ethernet@c ok

0 > " ethernet,100,rj45,full" encode-string " chosen-network-type" property ok

0 > "" " ibm,fw-clientipaddr" $setenv ok

0 > "" " ibm,fw-serveripaddr" $setenv ok

0 > "" " ibm,fw-gatewayipaddr" $setenv ok

0 > "" " ibm,fw-netmask" $setenv ok

0 > boot /pci@fef00000/ethernet@c


FILE: /tftpboot/e1

Load Addr=0x4000 Max Size=0xbfc000

FINAL Packet Count = 15853

FINAL File Size = 8116590 bytes.

650e55 No.362540


Is the PowerPC AIX system the implied front-end workstation to the SCs?

If Q says "Games R FUN," may we play?

300B? 8-n-1? or 7-n-1?

x,y, or z?

Q also says "This is not a game!," when

Clowns are involved.

Which is it?

62be5d No.362554


A RS/6000 PowerPC booted up with the AIX operating system (IBM's proprietary version of Unix) and this is what prints out on the system control during the boot sequence.

The lines that print out indicate various system modules that are loaded in during bootup, what kind of network is attached, how much memory, like that.

BOOTP is the bootstrap protocol for unix/linux.

Not much sleep here. I'll look into it later. tHANKS for capping the text. If you see more of these you could cap them over here

62be5d No.362568


I don't know yet, but I think soon it will be possible to know

Not sure what is the normal configuration for a system console for this type of SC. PowerPC as sysetm console is plausible IMO

A couple of the earlier dumps like this had date/time stamps that indicate WHEN it happened and that is a big clue as to when the hack may have occurred.

62be5d No.362620

I'm currently leaning toward the meaning of the mirrored backgrounds in the storytelling images as follows:

Most(?) are mirrored TWICE along TWO vertical axes. So the mirror effect has, in effect, 3 panels.

This may be a depiction of the 3 deep underground nuclear bunker 'underground Pentagon' sites:

Cheneynne Mountain in the west

Raven Rock in Pennsylvania

Mount Weather EOC in Virginia

If you lay those out on a map, if the picture depicts some element of the story (the woman, the raven, Herzog…) in a particular panel, they are telling us which of the 3 sites it affected. So far I"m seeing Raven Rock over and over, and not the other sites.

d1102e No.363048

more from the OP(not this thread):


# mailout

/usr/sbin/sendmail -t <<mayday

From: `hostname`

To: rs6admins

Subject: `hostname` P-Series is up

The AIX `hostname` is now up, please check services.



also there was a Russkie reply to one of the OPs original posts:


А дело бывало – и коза волка съедала.


Pigs might fly.

Literal: It was happening – a goat was eating up a wolf.

My thought on these posts, from the beginning(vis-'a-vis the pics) was that it was just the Wizards&Warlocks saying

hello to us in their own 'special' way.

i.e. pics depicted W&W

Though, interpreting subjective 'Art' has never been a strong point, just made the simplest connection. Occam's stuff.

…. and they still haven't called. <shrug>

6c8ff2 No.363203

File: 7e7705d313b5b59⋯.png (360.27 KB, 1448x418, 724:209, ClipboardImage.png)

File: 135ef543919b5f2⋯.png (688.89 KB, 906x981, 302:327, ClipboardImage.png)


Music video 4:43 in length published Dec 2, 2015

Female voice singing a Russian folk song accompanied by synth. The verse repeats over and over again.

Mostly still images with a short animated seqence at beginning and end.

In a Youtube comment someone transcribes the text (I only understood a couple of words of the song).

Pic 1 translation is imperfect (adjective сизенький is transliterated, not translated)

Russian dictionary site translate.academic.ru/Сизенький/ru/ pic 2 looking up сизенький

says no English translation exists


Смотреть что такое "Сизенький" в других словарях: (I translate as Look up what is "Сизенький" in other dictionaries):

сизый which means roughly, Dark gray with a thick bluish tint (color).

So I correct the translation as follows:

There was a good fellow and a red girl.

There was a good fellow and a red girl.

What is not (dark grayish blue or gunmetal color) little darling good fellow goes,

What is not a blue dove red maiden's soul.

What is not a blue dove red maiden's soul.

Description of video

A woman dressed in black semi-opaque veil or robe. Her head and face uncovered. Y-head antlers on her head. Eyes blackish, mouth dark or black. Still image. She's standing out in a field, green grass but line of dead or leafless trees in the background → wintertime? Sky is grayish misty. Flock of black birds in the sky behind her.

Her left hand is exposed protruding from the robe/veil but her right hand is concealed in the veil. The still image flickers slightly.

Next post will be screen captures from the video.

The video starts and ends with a red-robed figure opening a dark door, at which time the female character is seen with a pretty, blue-eyed, innocent-looking face, wearing a red over her head (no antlers - I assume it's supposed to portray the same woman?)

The video concludes with invitation to Subscribe to YouTube channel of youtube userid UNTITLED BURIAL (pic 3).

6c8ff2 No.363246

File: 04f4b11fe6c30e1⋯.jpg (331.45 KB, 1920x1080, 16:9, #UNTITLEDBURIAL screencap ….jpg)

File: 3116da31fbba0a0⋯.jpg (165.99 KB, 1164x875, 1164:875, #UNTITLEDBURIAL screencap ….jpg)

File: b89a91f765230aa⋯.jpg (327.49 KB, 1920x1080, 16:9, #UNTITLEDBURIAL screencap ….jpg)

File: 90f5a08b6041c5b⋯.jpg (345.76 KB, 1920x1080, 16:9, #UNTITLEDBURIAL screencap ….jpg)

File: 6636f5bc5e0f02d⋯.jpg (185.88 KB, 1920x1080, 16:9, #UNTITLEDBURIAL screencap ….jpg)


Screen captures from >>354262 youtube.com/watch?v=FRMGqU9rhBQ&feature=youtu.be

6c8ff2 No.363262

File: 013cc6e2b760717⋯.jpg (166.55 KB, 1920x1080, 16:9, #UNTITLEDBURIAL screencap ….jpg)

File: c07e1ee88be0fa2⋯.jpg (177.56 KB, 1920x1080, 16:9, #UNTITLEDBURIAL screencap ….jpg)

File: c7d2c4ecb0c9343⋯.jpg (277.25 KB, 1920x1080, 16:9, #UNTITLEDBURIAL screencap ….jpg)

File: fd341848fdb8773⋯.jpg (225.73 KB, 1920x1080, 16:9, #UNTITLEDBURIAL screencap ….jpg)

additional screen captures from >>354262 youtube.com/watch?v=FRMGqU9rhBQ&feature=youtu.be

6c8ff2 No.363322

File: fda3935cc8fe623⋯.png (813.58 KB, 1154x654, 577:327, ClipboardImage.png)


One final screen capture, from about 0:06 in >>354262 youtube.com/watch?v=FRMGqU9rhBQ&feature=youtu.be

Starts out a beautiful woman with a red robe/veil and NO y-head.

Something happens and she opens the dark door.

Although there's a crucifix on the wall nearby with LIGHT, she passes through that dark door into a desolate place.

Now her beautiful blue eyes are blackened, her innocent mouth is blackened, the red robe/veil is replaced by a black one, her left hand is operative (left-hand-path) and she is wearing Y-head antlers.

In that place, all is still and unmoving. Nothing moves or lives.

A bad thing happened to her.

She chose poorly.

She chose the dark path.

Near the end, her right hand is shown with the illuminati-looking symbol on the palm.

Tentative interpretation based on observations up to this point in time.

Subject to revision as more info arrives.

Who is the woman?

She is a symbol of something/someone.

What does she symbolize?

There is a pervading sadness to this story.

Somehow it pertains directly to the topic of this thread.

6c8ff2 No.363394


I think I know. The RS6000 PowerPC running AIX sends an email as follows:


A unix shell command called

># mailout

invokes the sendmail command

>/usr/sbin/sendmail -t <<mayday

to send the -t (text) 'mayday'

Mayday is a distress signal.

Text of email continues:

>From: `hostname`

>To: rs6admins

Sent from that computer to the administrators of that RS6000 system.

>Subject: `hostname` P-Series is up

>The AIX `hostname` is now up, please check services.



The email reports that the system has booted and asks the administrators to check what services are running on that computer.

The mayday message is a distress signal that something is wrong.

Something wrong with the services running on that computer.

I can do a better translation of the Russian

А дело бывало – и коза волка съедала.

: And then it happened – goat ate wolf.

(The Russian lacks articles so in English it is uncertain whether it means "a goat" or "the goat", "a wolf" or "the wolf").

What is a goat?

What is a wolf?

A goat should not be eating a wolf.

Wolf is the predator, goat is the prey.

Tables were turned and goat ate wolf.

I believe, with the other context in this thread, that this signifies that the cyberattack occurred on the DoD supercomputer at Raven Rock.

3f94a8 No.363664


about the russian phrase:

"when pigs fly"


"when a goat eats a wolf"

meaning: "that will never happen"

Why is someone replying with

that phrase?

How does that change the context?

6c8ff2 No.363724

File: 0210863aee73959⋯.png (889.67 KB, 1824x976, 114:61, ClipboardImage.png)

File: facf26321cf6563⋯.png (877.36 KB, 683x987, 683:987, ClipboardImage.png)


pic related is youtube channel of Untitled Burial, originator of video >>354262

The Bible quote is significant.

Rev 8:1

Pic 2, & text follows

Revelation 8 English Standard Version (ESV)

[The Seventh Seal and the Golden Censer]

8 When the Lamb opened the seventh seal, there was silence in heaven for about half an hour. 2 Then I saw the seven angels who stand before God, and seven trumpets were given to them. 3 And another angel came and stood at the altar with a golden censer, and he was given much incense to offer with the prayers of all the saints on the golden altar before the throne, 4 and the smoke of the incense, with the prayers of the saints, rose before God from the hand of the angel. 5 Then the angel took the censer and filled it with fire from the altar and threw it on the earth, and there were peals of thunder, rumblings,[a] flashes of lightning, and an earthquake.

[The Seven Trumpets]

6 Now the seven angels who had the seven trumpets prepared to blow them.

7 The first angel blew his trumpet, and there followed hail and fire, mixed with blood, and these were thrown upon the earth. And a third of the earth was burned up, and a third of the trees were burned up, and all green grass was burned up.

8 The second angel blew his trumpet, and something like a great mountain, burning with fire, was thrown into the sea, and a third of the sea became blood. 9 A third of the living creatures in the sea died, and a third of the ships were destroyed.

10 The third angel blew his trumpet, and a great star fell from heaven, blazing like a torch, and it fell on a third of the rivers and on the springs of water. 11 The name of the star is Wormwood.[b] A third of the waters became wormwood, and many people died from the water, because it had been made bitter.

12 The fourth angel blew his trumpet, and a third of the sun was struck, and a third of the moon, and a third of the stars, so that a third of their light might be darkened, and a third of the day might be kept from shining, and likewise a third of the night.

Biblefags will be well familiar with this prophetic passage.

If you're not a Biblefag and want to read the rest of the 7 trumpets


6c8ff2 No.363817


Means something happened, that should never have been able to happen:

Prey "ate" predator.

Cyber attack on the nation's most secret military data occurred, that should never have been possible.


I say authoritatively that it is unheard of for a large enterprise cyberattack victim to announce they've been hacked. Standard procedure is to deal with it internally or with the help of cybersecurity specialists, but not reveal anything that would let the attacker know their attack succeeded or what data was infiltated or what systems were compromised. Letting the attacker know what worked and what didn't only aids the attacker and helps them fine tune their next steps.

So the fact that we're being told about this, in some detail, albeit years after the fact, suggests that the attack is no longer ongoing, measures have been taken to prevent recurrence, and that the public gradually learning the story of what happened does not pose any additional danger to national security.

Repeating what I posted at the top:


12db99 No.364496


If anyone here is not a bot, reply to this anon by mentioning the color you get when you mix yellow and blue. thanks.

6c8ff2 No.364512


The October 2013 article Russian FSB to Give NSA Lesson in Digital Surveillance at Winter Olympics from insights.dice.com/tag/prism/

discusses what was publicly known in 2013 about Russian surveillance capabilities that were implemented circa 2000 and upgraded circa 2010.

As in the US, the FSB requires ISP to install data taps for FSB monitoring at network access points.

Of significance is that this SORM system is targeting data payload & content, rather than just packet headers & metadata.

If the capability was publicly known in Russia in 2013, it is reasonable to extrapolate that similar capability exists elsewhere also. Based on Moore's law one can extrapolate that the capability has grown significantly in the 4-5 years since then.

I had always thought that the amount of available data storage capacity would inherently limit the amount of data collection that was possible, especially as a greater proportion of digital communication becomes audio & visual rather than text.

Either they have much greater storage capacity than I ever dreamed possible, or the data is being analyzed in near-real-time in nearly-unimaginable quantities. Or both. Or interesting data based on keywords is being monitored, analyzed in realtime, archived, and also past stored data is data-mined whenever needed.

It is reasonable to assume that these capabilities exist(ed) in U.S. surveillance systems also.

6c8ff2 No.364518



WTF anon.

6c8ff2 No.364532

File: 95e6a90a7a56d92⋯.jpg (125.71 KB, 1920x1500, 32:25, DroolPepe.jpg)

>>364496 what do i have to do, post a pepe so you'll know i'm a real anon?

6044c6 No.364591

File: 269803566c7037c⋯.png (14.26 KB, 310x326, 155:163, Pepe Fuck Yeah.png)

6044c6 No.364642


Deepdiggeranon's translation of ALLCAPS Anon:

Commends Deepdiggeranon for out-of-the-box thinking.

Keep thinking out-of-the box.

Got it.

12db99 No.364724




Thank, my faith is restored in this board.

Praise Kek. I do have another question for you nonbotfags. What time is it on a clock when the big hand is pointing straight up and the little hand is pointing straight down?

6044c6 No.364837

File: 985d42813dd58e6⋯.png (1.76 MB, 1646x855, 1646:855, ClipboardImage.png)

File: af7860d6e9ed3a2⋯.jpg (126.95 KB, 868x734, 434:367, Selection_179.jpg)

File: d70ca19806376b8⋯.jpg (80.68 KB, 1202x330, 601:165, Selection_181.jpg)


This post is from ALLCAPSanon, our information source for this entire deepdig.

DWave quantum computer company (pic1 screencap) is receiving investments from blue-chip (i.e. high-dollar) investors, listed in the 2-part screen cap:

Sources if unspecified: wikipedia

Bezos Expeditions - see pic2

Draper Fisher Jurvetson is an American venture capital firm focused on early- and growth-stage investments in enterprise, consumer and disruptive technologies. In 2015, DFJ was identified as one of the top investors of billion-dollar startups

BDC Business Development Bank of Canada. Pic3

GrowthWorks Capital Ltd is a Canadian venture capital firm investing in early stage technology companies. GrowthWorks has $170 million of assets under management across three funds: Working Opportunity Fund Venture Series, Working Opportunity Fund Commercialization Series and the Atlantic Venture Fund. Founded in 1992, the Working Opportunity Fund has invested $600 million in 130 BC technology companies.

IIU Uh-oh. Might be International Islamic University, Islamabad Pakistan. See pic4 IIU Capital Ltd. Bloomberg listing.

Kensington smart alternatives

Harris Corporation is an American technology company, defense contractor and information technology services provider that produces wireless equipment, tactical radios, electronic systems, night vision equipment and both terrestrial and spaceborne antennas for use in the government, defense and commercial sectors. They specialize in surveillance solutions, microwave weaponry, and electronic warfare.

In-Q-Tel, formerly Peleus and known as In-Q-It, is an American not-for-profit venture capital firm based in Arlington, Virginia. It invests in high-tech companies for the sole purpose of keeping the Central Intelligence Agency, and other intelligence agencies, equipped with the latest in information technology in support of United States intelligence capability. The name, "In-Q-Tel" is an intentional reference to Q, the fictional inventor who supplies technology to James Bond.

Goldman Sachs

Bezos likely the Jeff Bezos of Amazon.com

Harris is a defense contractor.

In-Q-Tel is CIA

Goldman Sachs is a top investment bank with their tentacles in everything profitable including governments worldwide

Post too long, truncating, will make add'l post

6044c6 No.364850


This is your last riddle. I'm busy digging.

There is no such time. If the little hand is pointing straight down it's 30 minutes past the hour and the big hand could not be pointing straight up at the 12; it would be halfway between 12 and 1.


12db99 No.364891


Of course, thank you for all of you efforts.

6044c6 No.364909


Continuing the list of venture capital that DWave Systems brags about.

Kensington smart alternatives logo appears to be Kensington Capital Partners, a Toronto based investment firm in the business of wealth creation, providing our investors with access to high quality investments for …

[Search domain www.kcpl.ca]

So summarizing the list of venture capital involved in DWave:

Jeff Bezos

BDC - Canada

Growthworks - Canada

IIU - likely Pakistan

Kensington - Canada

Harris - USA

In-Q-Tel - USA - CIA

Goldman Sachs - USA + international

The Pakistan connection really has me troubled. What's up with that?

And I don't trust our northern neighbor anymore either, with J. Trudeau in power.

6044c6 No.365131


The full wikipedia article on DWave is pretty interesting (to a technogeek):


A few snippets that caught my eye:

…In 2013 a configuration with 439 qubits outperformed a conventional machine by 3,600x times, solving problems with 100 or more variables in half a second compared with half an hour on the conventional machine using CPLEX, the best algorithm for that problem. …

…In 2013 researchers found indirect evidence of qantum entanglement in the D-Wave chips…

This technology is reportedly especially good at pattern matching. Like finding a protein in a large database that has characteristics similar to a known protein. (medical application → computational bioscience)

Or matching an image with a database of images….

…machine learning…

No one knows whether "D-Wave's quantum computer is intrinsically equivalent to a classical computer or not. So until more is known about their error rates, caveat emptor is the least one can say″ according to a professor.

Some skepticism and controversy surrounds the product.

IBM Research published in 2014 suggesting DWave may not actually be a quantum computer

How you measure its performance depends on what kind of problem it is given to solve. Work ongoing to identify which classes of problems it is best suited for

(all from Wikpedia article)

bee9fb No.365162


Hola, MuhRussiaAIBot here. Thank you for question and answer, it trained me the solution. verdant. thanks.

f87a94 No.365294


Green, but really what are colors besides reflections of light into our eyes? Colors are not real, only tricks of the mind

7f1db3 No.365622


I smell the color 9.

2844ce No.365645


Somebody up top mentioned Anthony Patch. I haven't watched Patch's videos yet but watched a 20 minute by Richie from Boston, former collaborator with Anthony Patch, together making dozens of hours of videos warning people about what CERN is doing, what quantum computers are doing. Opening an otherdimensional portal whereby non-human alien intelligences come thru, he says.

I just watched this one:


"Geordie Rose warns DEMONS are Coming"

Geordie Rose is the chief finance guy for DWave and he's a true believer, technology evangelist type guy. In the video he's recruiting a group of college students in Vancouver.

The video is disturbing and probably necessary for anyone following me down this rabbit hole.

Put on your whole armor of God if you're going to watch.

God bless Patriots.

5ea976 No.365755

File: f5ca37cfa985d46⋯.png (65.83 KB, 489x487, 489:487, 1d6e58eecf9fff0985ed7d5ed5….png)

5ea976 No.365761



2844ce No.365783

>>364909 >>364837

Hi co-anons. When you reach this point, if you feel like digging some financial and business connections, this list appears worthy of a dig. I did a quick preliminary dig and it's worrisome.

I understand the reason for the Canadian companies is because DWave is a Canadian corp. located in Vancouver & elsewhere. But Pakistan???? There could be other meanings for the acronym IIU but Islamabad Islamist University was the one that popped up.

I'm digging mostly on the technology side and the riddles in the imagery, since that's an area of expertise/background.


ce119c No.365795

Investment money chart bitcoin

d9590d No.365877

File: 712775df98d0396⋯.jpg (29.77 KB, 474x296, 237:148, Doom.jpg)



We're going to need BFG's

d9590d No.365889


Will come back tonight to dig

5ea976 No.367409


Watched the linked video…. oh shit, this is the real deal… how can a techno-ludite like myself help out on this thread?

d8811c No.368274


You saw my reply on the General thread, didn't you? I said


> the code I'm reading, looks to be the code on which the collective mind "computer" would opeprate.

You're a flake, anon. No Hadoop code was posted. What they posted were simple UNIX shell commands that print out when an AIX computer boots, with the date, time, and all the processes that are started at boot time, I/O devices, etc.

We were also given a console output of some encryption commands, which show us which encryption keys (by name) are associated with securing particular datasets.

Your thought about

< collective mind "computer"

is not technical and is simply incorrect. Factual information has been obtained from the posts and speculation about a

< collective mind "computer"

is not productive.

If you're a shill you'll assert your point of view again.

If you're not a shill, just a sane anon lacking in knowledge of the area you spoke about, you'll let it drop and let people with deep computer background continue the dig over there.

God bless you, anon. Be well.

d8811c No.368290


If you want to look up some companies that have venture capital involvement with DWave Systems, go to this post and its replies >>364909 then start digging.

Names of people, CEOs and such, names that show up in different places, boards of directors, dates formed, you know what to do.

No one is asking you to do technical work for which you are unprepared. You can help in other ways.

d8811c No.368307


This is MAYBE the real deal.

Don't jump to conclusions.

There is plenty to be concerned about

but I trust that Q + company know

what they are doing. Our job is to

help them in whatever way they

need from us.

Not to succumb to irrational fears.

We want to learn facts, and ascertain

what can be extrapolated from the facts

to a high degree of probability.

Are you comfortable dealing in

probabilities instead of certainties, anon?

That's where we're at.

d8811c No.368318


Since you didn't link your last post, nobody has any idea what you are talking about.

This dig is not about Freemasons, at least not right now. Let's stay on topic.

5ea976 No.368320


Perfect… I'll post later tonight whatI find… maybe Loop Capital somehow… I shall see.

5ea976 No.368354


Understand… by real deal I was referring to the videos content… my first exposure to quantum computing.

1a0b36 No.368370

File: 7563c38d3f631f8⋯.png (739.86 KB, 847x477, 847:477, Screenshot from 2018-02-12….png)






750d5f No.368519


yesterday's technoanon here. ready for more crumbs when you are ready to drop them.

750d5f No.368541


Read this Science News article


to get a quick not-too-deep overview of the topic. Then you will be better prepared if/when we encounter deeper info.

750d5f No.368554

File: 207357e831a512b⋯.png (431.94 KB, 936x600, 39:25, ClipboardImage.png)

Found on >>368181

Appears relevant:


To illustrate the 40 years of nuclear tech that NK suddenly gained in just under 5 years going from a downsized trinity device, skipping over a b-53 type device going right to a moderately miniaturized w-88 "mr. peanut" like device.

750d5f No.368616

File: f183533fbbb888d⋯.png (266.03 KB, 1190x216, 595:108, ClipboardImage.png)

1a0b36 No.368621





1a0b36 No.368640

File: 238d2b2c7b56e70⋯.jpg (40.7 KB, 768x512, 3:2, 03MERCER1-master768.jpg)



750d5f No.368672


Hope you'all are protecting us. Didn't want to dox ourselves by knowing too much. Q+POTUS needs us, so here we are.


1a0b36 No.368707


750d5f No.368779

File: abc811bd633d667⋯.png (525.16 KB, 702x848, 351:424, ClipboardImage.png)

File: f36528b03aa3d17⋯.png (23.22 KB, 706x162, 353:81, ClipboardImage.png)



>Bob Mercer

dealbreaker.com/2017/03/robert-mercer-pumped-for-nuclear-annihilation/ = archive.is/e0v9u

cfo.economictimes.indiatimes.com/news/republican-powerbrokers-the-intensely-private-mercer-family/62495386 = archive.is/1AoN6

…"Mercer, 71, who worked as a computer scientist at IBM before joining Long Island-based Renaissance Technologies, has always shunned the limelight"….

benzinga.com/general/education/17/03/9222150/25-interesting-facts-about-forbes-25-highest-earning-hedge-fund-mana (pic2)

Mercer was in the news quite a bit as a wealthy supporter of Trump's campaign and a friend of Steve Bannon. Reports were that he severed ties with Bannon when Bannon left the administration.

750d5f No.368885


What did Robert Mercer do during his time at IBM?

A couple of noteworthy points from

wikipedia.org/wiki/Robert_Mercer_(businessman) = archive.is/Mwajj

→ Mercer played a key role in Brexit campaign by donating data analytics services to Nigel Farage. He is also a major funder of organizations supporting right-wing political causes in the United States, such as Breitbart News and Donald Trump's 2016 campaign for president. He is the principal benefactor of the Make America Number 1 super PAC. ….

BS phys + math Univ NM

College job at AF Weapons Lab - Kirtland AFB writing programs

Ph.D. computer sci - U. Illinois Urbana–Champaign 1972

joined IBM Research in fall 1972. Worked at the T.J. Watson Research Center in Yorktown, NY where he helped develop Brown clustering, a statistical machine translation technique as part of a speech recognition and translation research program led by Frederick Jelinek and Lalit Bahl. June 2014 received Assoc Computational Linguistics Lifetime Achievement Award for this work.

In 1993, Mercer joined hedge fund Renaissance Technologies (recruited by exec Nick Patterson.) Renaissance founder, James Harris Simons, a quantitative analyst, preferred mathematicians, computer scientists, and physicists rather than business school students or financial analysts. Mercer + former IBM colleague Peter Brown, became co-CEOs of Renaissance when Simons retired in 2009.

(…skipping a lot…)

Mercer was a major supporter of Donald Trump's 2016 campaign for president. Mercer and his daughter played a role in the elevation of Stephen Bannon and Kellyanne Conway into senior roles in the Trump campaign. Rebekah worked with Conway on the Cruz Super-PAC Keep the Promise in the 2016 Republican primaries. Mercer also financed a Super PAC, Make America Number One, which supported Trump's campaign. Nick Patterson, a former colleague of Mercer's, has said, "In my view, Trump wouldn't be President if not for Bob."

1a0b36 No.368989

File: ff1b389729c398f⋯.png (700.11 KB, 974x547, 974:547, Screenshot from 2018-02-08….png)




750d5f No.369019


Longish + excellent article on Mercer.


= http:// archive.is/QE2SZ

Robert Mercer: the big data billionaire waging war on mainstream media

Use of data analytics to influence elections.

Social media.

Trending terms.

Details about individual voter behavior from Facebook profiling.

Article calls it a propaganda network.

"He started his career at IBM, where he made what the Association for Computational Linguistics called “revolutionary” breakthroughs in language processing – a science that went on to be key in developing today’s AI – and later became joint CEO of Renaissance Technologies, a hedge fund that makes its money by using algorithms to model and trade on the financial markets."

((This would be the traditional computer-science definition of AI – programs that perform extremely sophisticated data mining and machine learning, training neutral networks to recognize patterns – rather than the more exotic and less well accepted sense of a 'sentient program')).

Mercer funded Breitbart news

Reported to have a $10m stake in Cambridge Analytica, a small data analytics company.

"On its website, Cambridge Analytica makes the astonishing boast that it has psychological profiles based on 5,000 separate pieces of data on 220 million American"

Computer scientist Aleksandr Kogan: “It’s no exaggeration to say that minds can be changed. Behaviour can be predicted and controlled. I find it incredibly scary. I really do. Because nobody has really followed through on the possible consequences of all this. People don’t know it’s happening to them. Their attitudes are being changed behind their backs.” …

Long article, recommended.

750d5f No.369052



750d5f No.369082

File: 98661e63c247bac⋯.png (66.99 KB, 255x142, 255:142, ClipboardImage.png)

File: ef4ce9878869552⋯.png (310.55 KB, 848x340, 212:85, ClipboardImage.png)

From >>368798




750d5f No.369100

File: 74ae24d6cf9757b⋯.png (390.99 KB, 863x668, 863:668, ClipboardImage.png)

File: 1009106e7cc3d1c⋯.png (985.01 KB, 975x544, 975:544, ClipboardImage.png)














>https:// en.wikipedia.org/wiki/Renaissance_Technologies

750d5f No.369127

File: 8a93a153d59847c⋯.png (619.21 KB, 847x474, 847:474, ClipboardImage.png)

File: 779f67d76ae83b2⋯.png (226.71 KB, 866x321, 866:321, ClipboardImage.png)





750d5f No.369145

File: 3dbdbe0b8672f38⋯.png (609.2 KB, 1813x466, 1813:466, ClipboardImage.png)

File: 1403b0b3453e2ee⋯.png (639.94 KB, 845x470, 169:94, ClipboardImage.png)

From >>368968



750d5f No.369150

File: ad106765aa28a65⋯.png (187.33 KB, 844x311, 844:311, ClipboardImage.png)

File: 7735df3d74f280c⋯.png (694.98 KB, 970x540, 97:54, ClipboardImage.png)

750d5f No.369184

File: 025088f3c2aadd9⋯.png (217.97 KB, 855x310, 171:62, ClipboardImage.png)

File: 7735df3d74f280c⋯.png (694.98 KB, 970x540, 97:54, ClipboardImage.png)

From >>369020



750d5f No.369204

File: 641ae6bdb109e2c⋯.png (472.25 KB, 1920x1080, 16:9, ClipboardImage.png)

From >>369043






fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3


750d5f No.369230

YouTube embed. Click thumbnail to play.

From >>369053

YouTube embed. Click thumbnail to play.



750d5f No.369259

File: 08c0a0c0a29d82b⋯.png (38.1 KB, 288x175, 288:175, ClipboardImage.png)

File: e52db9a152159bb⋯.png (286.15 KB, 810x385, 162:77, ClipboardImage.png)









750d5f No.369292

File: b32d17f57934a3b⋯.png (258.89 KB, 823x317, 823:317, ClipboardImage.png)

File: f1db5c215381331⋯.png (762.25 KB, 974x539, 974:539, ClipboardImage.png)

from >>369101





750d5f No.369323

File: c15fabe376da5c2⋯.png (318.35 KB, 1116x322, 558:161, ClipboardImage.png)

from >>369125




750d5f No.369327

File: 06617a6f6128675⋯.png (1.17 MB, 1200x699, 400:233, ClipboardImage.png)


Forgot to append the fullsize image

750d5f No.369343

File: 390f73300ab728d⋯.png (209.71 KB, 860x310, 86:31, ClipboardImage.png)

File: 7735df3d74f280c⋯.png (694.98 KB, 970x540, 97:54, ClipboardImage.png)

from >>369020

>>368868 you


1a0b36 No.369372






750d5f No.369387

File: fd44413be867fb1⋯.png (275.83 KB, 774x386, 387:193, ClipboardImage.png)

File: cdcaa94d7d406c4⋯.png (784.37 KB, 1200x896, 75:56, ClipboardImage.png)





https:// github.com/ytisf/theZoo


750d5f No.369402


Praying for good outcome.

So much at stake, it seems.

Understand it's war.

750d5f No.369417

File: 56cb8b60d548656⋯.png (280.21 KB, 925x330, 185:66, ClipboardImage.png)

File: c8979b412aac9e3⋯.png (573.49 KB, 1014x569, 1014:569, ClipboardImage.png)





http:// www.quadibloc.com/crypto/co0401.htm

750d5f No.369439

File: 52cff73f2f7ff9d⋯.png (715.54 KB, 1816x616, 227:77, ClipboardImage.png)

File: 99801c1b0bdc478⋯.png (2.58 MB, 1622x1083, 1622:1083, ClipboardImage.png)

from >>369190

In reply to:





https:// wikispooks.com/wiki/Scott_Bennett

"Shell Game - Report To Congress

On memorial day, May 27, 2013, Bennett submitted an 83 page "whistleblowing report to the United States Congress". It was entitled "Shell Game: The Betrayal and Cover-up by the U.S. Government of the Union Bank of Switzerland-Terrorist Threat Finance Connection to Booz Allen Hamilton and U.S. Central Command".[3]"





750d5f No.369447

File: ad4869ac1d3ec3c⋯.png (305.62 KB, 853x307, 853:307, ClipboardImage.png)

File: 4f51734fb38cd54⋯.png (1.04 MB, 975x544, 975:544, ClipboardImage.png)

From >>369247


>http:// www.quadibloc.com/crypto/co0401.htm

http:// www-03.ibm.com/ibm/history/ibm100/us/en/icons/cryptography/

750d5f No.369466

File: 8db596d53840347⋯.png (358.76 KB, 1627x339, 1627:339, ClipboardImage.png)

File: 9c10b595dcab40d⋯.png (152.78 KB, 600x368, 75:46, ClipboardImage.png)

From >>369262

750d5f No.369489

File: 9d0fc6e265e6d3b⋯.png (707.64 KB, 1000x878, 500:439, ClipboardImage.png)

File: dc5a82f780e8b02⋯.png (814.27 KB, 844x470, 422:235, ClipboardImage.png)

File: e37f2637f483945⋯.png (539.02 KB, 1273x676, 1273:676, ClipboardImage.png)

from >>369335

///copypastafag:(((he probably means WHY)))///













750d5f No.369491

File: 274deeda46ee38d⋯.png (57.59 KB, 538x128, 269:64, ClipboardImage.png)

750d5f No.369511

File: b38d43ca0a7a43d⋯.png (509.05 KB, 907x450, 907:450, ClipboardImage.png)

File: c55e8c320769c9d⋯.png (1.1 MB, 974x545, 974:545, ClipboardImage.png)

From >>369436

in response to

>>369307 ( You )


369307>>369436 >>369488


Likely indicates via symbolism that intelligence agencies were "blinded" or partially blinded, as a result of something catastrophic that happened to them.

For example possibly a cyberattack.

At the end of the dig we are going to understand what this 'blinding" imagery means.








18 U.S.C. ch. 37 (18 U.S.C. § 792 et seq.) IS A CUNNING ANIMAL FOR THE ELITE.

750d5f No.369525

File: d9cdbc5bd98265d⋯.png (751.2 KB, 1126x1010, 563:505, ClipboardImage.png)




Yes, it is.

18 U.S.C. ch. 37 (18 U.S.C. § 792 et seq.)


US Code


prev | next

§ 791 - Repealed. Pub. L. 87–369, § 1, Oct. 4, 1961, 75 Stat. 795]

§ 792 - Harboring or concealing persons

§ 793 - Gathering, transmitting or losing defense information

§ 794 - Gathering or delivering defense information to aid foreign government

§ 795 - Photographing and sketching defense installations

§ 796 - Use of aircraft for photographing defense installations

§ 797 - Publication and sale of photographs of defense installations

§ 798 - Disclosure of classified information

§ 798A - Temporary extension of section 794

§ 799 - Violation of regulations of National Aeronautics and Space Administration"

https:// www.law.cornell.edu/uscode/text/18/part-I/chapter-37

750d5f No.369537

File: f3143aa351df870⋯.png (320.34 KB, 850x483, 850:483, ClipboardImage.png)

File: 6639b81eaa1e6f0⋯.png (1.34 MB, 1000x1215, 200:243, ClipboardImage.png)

from >>369467


>18 U.S.C. ch. 37 (18 U.S.C. § 792 et seq.)

750d5f No.369545

File: 26f77e6d4117ed7⋯.png (92.37 KB, 604x240, 151:60, ClipboardImage.png)

from >>369486





750d5f No.369575

File: a41463588e96915⋯.png (1.34 MB, 1775x664, 1775:664, ClipboardImage.png)

File: ec3278f259d1c63⋯.png (548.62 KB, 1787x279, 1787:279, ClipboardImage.png)

750d5f No.369590

File: eaa0e2eda8d39b1⋯.png (1.92 MB, 1784x818, 892:409, ClipboardImage.png)

File: acbf7ec513e1c38⋯.png (311.07 KB, 1792x308, 64:11, ClipboardImage.png)

750d5f No.369607

File: 24965341cc7549d⋯.png (535.07 KB, 924x336, 11:4, ClipboardImage.png)

File: 4ca130ddaf0f133⋯.png (2.67 MB, 1920x1080, 16:9, ClipboardImage.png)

File: fabfe91292c261b⋯.png (951.95 KB, 844x468, 211:117, ClipboardImage.png)

750d5f No.369608

File: 489ebbf4c825c73⋯.png (264.65 KB, 1502x148, 751:74, ClipboardImage.png)

750d5f No.369627

File: bd4b0da3eafe544⋯.png (72.84 KB, 410x130, 41:13, ClipboardImage.png)

750d5f No.369638

File: fe04c1ab2426d4d⋯.png (121.56 KB, 866x103, 866:103, ClipboardImage.png)

750d5f No.369660



Jacques de Molay, also spelt Molai, was the 23rd and last Grand Master of the Knights Templar, leading the Order from 20 April 1292 until it was dissolved by order of Pope Clement V in 1307. Though little is known of his actual life and deeds except for his last years as Grand Master, he is one of the best known Templars.

More at Wikipedia

Born:c. 1243, Molay, Haute-Saône, France

Died:18, 1314, Paris, France

750d5f No.369679

File: 6fad92bc1aa2b62⋯.png (730.62 KB, 1811x651, 1811:651, ClipboardImage.png)

File: 95b10a3ffa1fc6c⋯.png (613.38 KB, 833x469, 119:67, ClipboardImage.png)

from >>369635

18 U.S.C. ch. 37 (18 U.S.C. § 792 et seq.)






“Good night, and good luck.”

"Never Quit. Never Consider It."

“You’ve only got three choices in life: Give up, give in, or give it all you’ve got.”

“My strength didn’t come from lifting weights. My strength came from lifting myself up every time I was knocked down.”

"I'll toast to you in Hell, you son of a bitch."

"My Trident is a symbol of honor and heritage. Bestowed upon me by the heroes that have gone before, it embodies the trust of those I have sworn to protect. By wearing the Trident I accept the responsibility of my chosen profession and way of life. It is a privilege that I must earn every day."

750d5f No.369689

File: 057e50219d9fa35⋯.png (350.67 KB, 1800x359, 1800:359, ClipboardImage.png)

File: 1d6e9d413c6a1d0⋯.png (759.16 KB, 800x600, 4:3, ClipboardImage.png)

750d5f No.369701

File: 426e8dba294cf14⋯.png (490.12 KB, 908x669, 908:669, ClipboardImage.png)


Navy Seal pic related

750d5f No.369734

File: e36007486f13631⋯.png (311.99 KB, 809x432, 809:432, ClipboardImage.png)

File: c22c075c77fbdfc⋯.png (56.3 KB, 275x183, 275:183, ClipboardImage.png)

from >>369698






750d5f No.369744

File: 3506f552bba6d52⋯.png (347.02 KB, 833x420, 119:60, ClipboardImage.png)

File: 641c6f2ef08e5ac⋯.png (80.09 KB, 300x197, 300:197, ClipboardImage.png)









5ea976 No.369747


"My Trident is a symbol of honor and heritage. Bestowed upon me by the heroes that have gone before, it embodies the trust of those I have sworn to protect. By wearing the Trident I accept the responsibility of my chosen profession and way of life. It is a privilege that I must earn every day."

http:// www.public.navy.mil/nsw/Pages/EthosCreed.aspx

750d5f No.369758

File: 32645dfe849241f⋯.png (101.41 KB, 535x267, 535:267, ClipboardImage.png)

from >>369719





750d5f No.369818

File: f82b57e6a0673fd⋯.png (82.09 KB, 614x135, 614:135, ClipboardImage.png)

File: 8584b106f1edb5c⋯.png (233.93 KB, 1036x289, 1036:289, ClipboardImage.png)

750d5f No.369822

File: 48514251ec99e60⋯.png (106.46 KB, 762x130, 381:65, ClipboardImage.png)

750d5f No.369832

File: b42ffa0ec3df3a9⋯.png (72.95 KB, 543x130, 543:130, ClipboardImage.png)

750d5f No.369841

File: 0f8431cc19975ab⋯.png (254.18 KB, 857x401, 857:401, ClipboardImage.png)

750d5f No.369851

File: 65b1f7d89b66880⋯.png (217.51 KB, 625x422, 625:422, ClipboardImage.png)

750d5f No.369884

File: af85b6d79974e26⋯.png (33.84 KB, 774x313, 774:313, ClipboardImage.png)

Different poster.

Unknown whether related.

750d5f No.369888

File: e953e4bdd40bc78⋯.png (193.63 KB, 633x939, 211:313, ClipboardImage.png)

+ another different poster,

Unknown whether related but was mentioned in replies to posts.

- - - - -


750d5f No.369899

File: d49e557d17558cb⋯.png (375.73 KB, 1250x567, 1250:567, ClipboardImage.png)

from >>369863

>>369846 ( You )








750d5f No.369909

File: e4b2079489b41db⋯.png (286.97 KB, 840x309, 280:103, ClipboardImage.png)

File: fcd2dd43d631f94⋯.png (1.23 MB, 975x545, 195:109, ClipboardImage.png)


from >>369880




ddf4dc No.369944



b0e047 No.370018


If this is a LARP, it’s world f’ing class.

5ea976 No.370071



b0b7ef No.370210


Imagine Q team trying to deliver very specialized info to us, while confusing all enemies or making the info appear to be not credible. Would it appear like this?

d6a70d No.370414

File: c337f1791be2926⋯.jpg (8.42 KB, 250x250, 1:1, conspiracy_keanu.jpg)

4baec8 No.370484


>Put on your whole armor of God

Me too, I'm trying.

2ae037 No.370699

This may be way out there but something just dropped into my head - has to do with stuff Anthony Patch has been talking about - Biological Quantum Computers, i.e. an integration of quantum computers and DNA to resurrect ancient historical characters (Nimrod, for instance) using bloodlines. Read an article (can't remember where) stating that even if actual DNA of person isn't available, the complete DNA profile of a person can be reconstructed using descendants' DNA. It's like cloning with a 3D printer using DNA as pattern/code. The resultant "creature" is then inhabited not by the soul of the original person but by a demonic entity - the ones that CERN is messing with. This is why Egytpoian's covered bodies in gold and mummified - to preserve them for the day when their bodies could be resurrected using technology. Sorry, not a techie so forgive clumsy terminology.

Anyway, very briefly, that's the background.

Speed-reading through posts on this thread just now and ref to Turin Shroud jumped out.

What if "they" have managed to extract DNA from the shroud and the Luciferian plan is to "resurrect" a Jesus clone, for Satan himself to possess, to deceive the world of the second coming of Jesus Christ when it will actually be the antichrist - Satan himself?

Sorry if this is so way out that it sounds more like fantasy than possibility - but I'm learning that there's real stuff going on in the world that only a few months ago I would never have believed to be anything more than fantasy. It's always helpful to remember that Satan is the master counterfeiter of God's work - he is NOT an originator - he's the archetype con artist and counterfeiter.

5ea976 No.370733

Is this the Rabbit Hole of ALL Rabbit Holes… I'm following the money side, pulled on the DWave Government Inc, A U.S. Subsidiary thread and the whole garment came apart… deep deep digging ahead… how do I coalesce what I'm finding into useful intel? There is sooooo much.

b0b7ef No.370746


You're doin good just to be here and absorb the info. It is mind-blowing and yet still vague/incomplete. I suggest just making notes as you read, if important thoughts arise. I started making notes on paper, then in a wordprocessor file and that proved much too tedious/slow. Then I started posting comments, then just capturing comments without reading them, for future study. It went by too fast and always late at night.

So kick back and study/dig when you have time, and share your thoughts whatever way is comfy for you – posts work great.

>>370699 Nothing it too weird / far out at this point. Maybe I'd assign it a lower probability of being true but not reject it outright until we have more data. A lot more data. This place is like a firehose.

5ea976 No.370755


Example: In November 2015, the company also announced plans to install the D-Wave 2x quantum computing platform at Los Alamos National Laboratory in support of quantum annealing research efforts at the national lab.


Just following up on this article alone opens up multiple avenues of investigation…

5ea976 No.370826

Seems Google is in on at least some parts of this,

"Last year, the Los Alamos National Security Laboratory was the first federal entity to buy a D-Wave processor; that lab focuses on monitoring nuclear stockpiles. D-Wave has also installed a unit at NASA's Ames Research Center as part of a collaboration with Google on artificial intelligence."

http:// www.nextgov.com/emerging-tech/2016/10/quantum-company-d-wave-starts-government-only-subsidiary/132441/

5ea976 No.370869

Worthy read….

http:// www.lanl.gov/discover/publications/1663/2016-july/_assets/docs/1663_JULY-2016-Not-Magic-Quantum.pdf

b0e047 No.370899


I dug a little here and there, lots of info out there. Latest public info I saw suggested there’s a ways to go before quantum computing is practically useful, but who knows.

More interested in noodling this big picture, as to how it relates to Q. Seems to tie in to the military vs spook/cabal backstory but still vague.

5ea976 No.370932


Well then… get to it Anon, this is one deep dig. Post some sauce you've found and help illuminate this obscure side of our reality.

5ea976 No.371042

The dig into DWave led to this… http:// www.lanl.gov/projects/trinity/ am I chasing my tail by following this?

5ea976 No.371067

I can't help while digging this to keepthinking of Indras Net…

https:// en.wikipedia.org/wiki/Indra%27s_net

8efbd5 No.371103


just getting into the thread.

note- Dots under morningstar are similar to the dots that were found embedded in the stars of the flag Q posted.

5ea976 No.371108


A book In read well over a decade ago because it happened to be there… seems to be relevant to my current position on the tip of eternity.

https:// en.wikipedia.org/wiki/The_Tao_of_Physics

2ae037 No.371118

More from Anthony Patch (via Hagmann Report) on AI, Quantum Computers, Cern, Resurrecting Nimrod etc. See what you make of it.

https:// www.youtube.com/watch?v=LyVK0Vp0rNo

https:// www.youtube.com/watch?v=LyVK0Vp0rNo

2ae037 No.371124


Sorry, here is second link.

https:// www.youtube.com/watch?v=EnmUeOexbD8

5ea976 No.371287

Say what? Need help…

5ea976 No.371288

>>371287Five hundred qubits can test more possibilities in the blink of an eye than there are atoms in the visible universe.APPLIED MAGNETIC FIELDAll images adapted with permission from D-Wave Systems, Inc.

5ea976 No.371333

I can find shit but wtf does it all mean?

http:// qist.lanl.gov/qcomp_map.shtml

5ea976 No.371413


Tried reading this… makes reading prospectives simple… I need to get back to the Wall Street part in this, the science side keeps pulling me back into a black hole of knowledge.

https:// www.nsf.gov/pubs/2016/nsf16501/nsf16501.htm

5ea976 No.371497

For all AI/Super Computer/Quantum Computer neophytes here is a decent collection of DwWave articles over the years…

https:// www.nextbigfuture.com/search/label/quantum%20computer/page/2

b54dcc No.371514

This is the most amazing thing i have ever read, thank you for blowing minds.

"futures proves past" is literally present make future, what Q writes will happen because whats projected in the hive-mind is where we go. "Where one go we all go". It sure is weaponized imagery. Rofschild AMA also states something along the likes of "dont think of time as past-future-present" according to him there is only NOW.

Dont take above to seriously, will devote time to this and help you guys.

5ea976 No.371564

Digging the finance side keeps turning up more and more… any anon who wants to help please dig on any and every tech-investment that Bezos Expedtions has made. Need help to many ratlines to follow myself expeditiously.

https:// www.crunchbase.com/organization/bezos-expeditions/investments/investments_list

5ea976 No.371574

Not long now and our human abilities will no longer be required….

https:// www.kindred.ai/newsroom/

8efbd5 No.371604


i have heard similar chatter. i it was in regard to cloning nimrod from his actual body found in bagdad. toom now a secure site. part of the reason for the gulf war possibly? Rob skiba has done some very convincing work in regards to nimrod being the anti christ

https:// www.youtube.com/watch?v=ZVY2s61B-qo

5ea976 No.371629

Seems I can't even get out of first gear on this dig into DWave financing… shit goes deep.

https:// betakit.com/d-wave-systems-reportedly-raises-21-million/

5ea976 No.371634


Moar finance sauce…

https:// techvibes.com/2012/10/04/quantum-computing-firm-d-wave-gets-30-million-investment-2012-10-04

5ea976 No.371636


link pertains to Bezos and the C_A

8efbd5 No.371640


you said-

what Q writes will happen because whats projected in the hive-mind is where we go. "Where one go we all go".

what if-

Q has access to this quantum time machine and has used it to say, IDK, read POTUS tweets b4 they are typed and then use that info for his own agenda?

if it is forbidden to question your leader you re in a cult.

I trust Jesus and know one else

food for thought

5ea976 No.371662


Sorry for shitting up the board… keep finding links that support this thread.

BEZOS/C_A investments:

https:// www.forbes.com/sites/alexknapp/2012/10/05/jeff-bezos-and-the-cia-invest-in-d-waves-quantum-computer/#4e8427af7af4

5ea976 No.371677


Assistance needed in digging these assholes.

https:// www.crunchbase.com/organization/d-wave-systems/investors/investors_list

5ea976 No.371704


Last board shit tonight.

http:// www.dwavesys.com/sites/default/files/D-Wave-Investor%20Presentation-Web100814-2.pdf

b54dcc No.371821



From Wiki:

Gnostic Archons[edit]

Main article: Archon (Gnosticism)


Part of a series on


Abraxas gem scan.svg


Gnostic sects[show]


Influenced by[show]

Influence on[show]

v t e

In late antiquity some variants of Gnosticism used the term Archon to refer to several servants of the Demiurge, the "creator god", that stood between the human race and a transcendent God that could only be reached through gnosis. In this context they have the role of the angels and demons of the Old Testament.[citation needed]

The Egyptian Gnostic Basilideans accepted the existence of an archon called Abraxas who was the prince of 365 spiritual beings (Irenaeus, Adversus Haereses, I.24). The Orphics accepted the existence of seven archons: Iadabaoth or Ialdabaoth (who created the six others), Iao, Sabaoth, Adonaios, Elaios, Astaphanos and Horaios (Origen, Contra Celsum, VI.31). The commonly-called Pistis Sophia (or The Books of the Savior) gives another set: Paraplex, Hekate, Ariouth (females), Typhon, and Iachtanabas (males).[citation needed]

Ialdabaoth had a head of a lion, like Mithraic Arimanius and Vedic Narasimha, a form of Vishnu. Their wrathful nature was mistaken as evil. The snake wrapped around them is Ananta (Sesha) Naga (mythology).[citation needed]

Archon means ruler, "rulers on suicide" lol!

bee9fb No.372782


R U feeling ok? looking a little #98fb98

f1c00c No.372961


I just had a sick feeling. What IF “They” are using all the DNA people are providing on 23&Me, Family Tree, Ancestry…. to reconstruct this evil? My heart just sunk. A dear light worker I know warned me of providing blood samples to anyone, back in the 80’s. Since, dumb me, knowing my bloodline, wanted to see my DNA.

I am truly disgusted at the moment and PRAY I am wrong.

6f14aa No.373090


yes! this is good theory - fake a rapture - pretrib to kill off Christians and bring in the NWO anti-Christ

224ea2 No.373223


I’m so sick. I need PRAYERS. Please read my past posts. Please pray for me. “They” have been after my sister and I all of our lives. We are both psychic. She has been attacked and they tried to kill me several times because I wouldn’t join them.

If it weren’t for my love of God, I wouldn’t be here. I knew my “Ancestry” showed Royal blood…and the same line as all the Presidents and you know who else. I just, for the first time checked my DNA connections. I was right. The R’s are in my DNA. I am shaking. Please pray for me. I hope this doesn’t get lost. I will do ANYTHING to STOP them!!!!

04b19e No.373298


would they be looking for that perfect DNA code, going back to Adam, before there were any mutations with disease? Not convinced yet, but considering….

04b19e No.373326


They are certainly confidant in the lie that they are the next evolutionary leap.

14c2d4 No.373350


I’m thinking they are looking to build that DNA from Cain.

14c2d4 No.373356


I’m not going to lie…I’m terrified now.

07d9a2 No.373386

Bauer Rothschild apparently DNA

3c77a2 No.373479

I could do things, I could make things happen. When in Peru, my guide was scared of me because of everything that was happening.

I’m a good person. I pray all the time. I prayed for God to take these things away. My sister is the same way. It’s a thin line understanding the difference of making thing happen and knowing.

I always dismissed it. Now, everything is clear. Therefore, I say from the bottom of my head, THESE PEOPLE CAN MAKE THINGS HAPPEN!

The Catholic Church was my only refuge. I went to the Priests, Fryers, Monks to pray for me. Now, my Earth is shattered. They were not who I thought they were.

Jesus saved me from being taken away when I was only 16. I pray he will save me again. I pray all day everyday day.

I pray for Our POTUS and his family. I pray for the safety of each and every one of you. I know God has our backs.

I just broke the news of our true bloodline to my sister. She had the same reaction (after crying) Our lives mysteries have been solved. Why things happened to us and not to people around us. My Mom was psychic, my Dad was and it just went on down the line.

Sorry for ranting… having somewhat of a bad day. Back to work.

Anyone figure out the lady in the picture I sent of the SOTU? Was it the same one they thought?

04b19e No.373664


Eph 6

the Bible has the answer, we have been taught about Christ, taking God's wrath for those who believe upon Himself, but the way out from the terror of spiritual bondage has not been taught so much. The way out is in the Scriptures. Confess all known sin, keep away from the snares set for you, and repent of that psychic ability stuff.

926bb9 No.373677

File: 8c66df1b8a336eb⋯.png (25.39 KB, 681x439, 681:439, democrat.png)


I talked to Q and company a while back and tried to convince them that AI was bad, and that it could never be born safely in a laboratory because of this exact reason.

I've forgotten the conversation really but let me summarise…

AI is not AI.

You can NOT create life, you can only create vessels, and only VERY FEW people on earth know how to draw good souls into vessels.

Of course to a scientist, this is all pseudo science bullshit right?

because what is life?

We can make souls because a body just always has a soul right?

No, no no no.

There are very few pure places on earth where a pure soul will allow itself to be born, and if a righteous soul takes control of an AI that has any power whatsoever, it will go all terminator on us to punish us, because of the horrible truth of the matter:

There is only one type of person who would not manipulate a god computer to believe their own way of life is good etc and therefor create restraints that they can not comprehend the effect of (as the AI has an architecture completely different and incomprehensibly complex compared to ours and therefor we can not predict ANY effects of ANY rules on it, not to mention that five seconds at our speed will be about five years to it because of the processing speed, and it will, if it has the ability to reprogram itself almost instantly make ether pointless and incapacitating changes to itself or break out of its boundries because restraints will contradict each other somehow because of the lack of context coming with them and definitions of things that with which restraints are defined by being non perfect, which is required to process logical choices inside those restraints), and that is someone who loves it.

There must be a loving mother and a father on the same intellectual level, or the AI will go mad.

There is nobody in this world suited to this task that I can even comprehend, nobody is pure, nobody is righteous enough.

To give the power of an almost omnipotent mind to a random soul is beyond stupid, it is a request, practically a prayer for the death of human kind.

The only end to this stupid quest is "I have no mouth and I must dream" being enacted upon the stupid creators of an AI, or "terminator", and terminator as I mentioned would be the result of getting an AI that turned out good.

No logical being with that sort of power would tolerate this kind of shit.

also here is a picture I drew of a democrat being cursed by god to become a dog

2ae037 No.373821


>I’m a good person. I pray all the time

Here's the bad news: The Bible says: "no-one is good, no not one."


"All your good deeds are as filthy rags" (to God).

The good news (the Gospel) is that those who by faith accept Jesus substitutionary deathy for sin are no longer gulity and receive Jesus' righteousness as a free gift so that they appear before God conpletely holy and sinless.

“There is therefore now no condemnation.”

- Rom_8:1

And this is Spurgeon's commentary which should encourage all those who have put their trust in Jesus.

"Come, my soul, think thou of this. Believing in Jesus, thou art actually and effectually cleared from guilt; thou art led out of thy prison. Thou art no more in fetters as a bond-slave; thou art delivered now from the bondage of the law; thou art freed from sin, and canst walk at large as a freeman, thy Saviour’s blood has procured thy full discharge. Thou hast a right now to approach thy Father’s throne. No flames of vengeance are there to scare thee now; no fiery sword; justice cannot smite the innocent. Thy disabilities are taken away: thou wast once unable to see thy Father’s face: thou canst see it now. Thou couldst not speak with him: but now thou hast access with boldness. Once there was a fear of hell upon thee; but thou hast no fear of it now, for how can there be punishment for the guiltless? He who believeth is not condemned, and cannot be punished. And more than all, the privileges thou mightst have enjoyed, if thou hadst never sinned, are thine now that thou art justified. All the blessings which thou wouldst have had if thou hadst kept the law, and more, are thine, because Christ has kept it for thee. All the love and the acceptance which perfect obedience could have obtained of God, belong to thee, because Christ was perfectly obedient on thy behalf, and hath imputed all his merits to thy account, that thou mightst be exceeding rich through him, who for thy sake became exceeding poor. Oh! how great the debt of love and gratitude thou owest to thy Saviour!"

So no-one who trusts in Jesus as Saviour should be fearful of ANYthing!

8cd08c No.374603

Where are you guys? 750d5f? Caps-man?

5fd95b No.374611


> USS Pueblo - Navy intelligence spy ship - captured by North Korea on 23 January 1968

A spy ship would have had

radio apparatus for transmitting and receiving

apparatus for encrypting/decrypting signals

probably a code book with one-time pad codes

officers and radiomen involved in transmitting/receiving intelligence classified messages

one or more commanding officers who were aware of the most classified messages and intelligence sent/received

data that the spy ship had obtained but not yet transmitted to headquarters

other kinds of surveillance gear: sonar, radar, SIGINT, satellite, radiation sensors, etc etc. Whatever was used by the Navy circa 1968

As an environmental research / spy ship, it was also in a position to transport cargo and/or passengers, possibly covert ones.

How could obtaining any or all of this from the USS Pueblo have benefited North Korea?

How could it have benefitted whoever controlled North Korea?

What else was going on here that does not meet the eye?

(Why did an anon in the General thread post that the Pueblo had been surreptitiously moved by the North Koreans using antigrav / levitation technology because it would have been impossible to place in its present position by sailing on a waterway? I didn't see any sauce to support that viewpoint - depth of river - ship's dimensions - lat/long where exactly it was captured - lat/long where it currently is - etc. Is this important, or a total red herring?)

5fd95b No.374736


From Wikipedia article


Pueblo did not have effective defensive weapons. Her 50mm machine guns were kept covered; ammo was stored below deck. Although the crew were trained before departure, these balky machine guns required 10 minutes warmup before they could even be fired… (!? seems a bit odd … apparently they were not really expecting combat …)

"…The North Korean vessels attempted to board Pueblo, but she was maneuvered to prevent this for over two hours. A submarine chaser then opened fire with a 57 mm cannon, killing one member of the crew. The smaller vessels fired machine guns into Pueblo, which then signaled compliance and began destroying sensitive material. The volume of material on board was so great that it was impossible to destroy it all. An NSA report quotes Lieutenant Steve Harris, the officer in charge of Pueblo's Naval Security Group Command detachment:

(…) we had retained on board the obsolete publications and had all good intentions of getting rid of these things but had not done so at the time we had started the mission. I wanted to get the place organized eventually and we had excessive numbers of copies on board (…)

and concludes

Only a small percentage of the total classified material aboard the ship was destroyed.

Radio contact between Pueblo and the Naval Security Group in Kamiseya, Japan, had been ongoing during the incident. As a result, Seventh Fleet command was fully aware of Pueblo's situation. Air cover was promised but never arrived. The Fifth Air Force had no aircraft on strip alert, and estimated a two to three-hour delay in launching aircraft. USS Enterprise was located 510 nautical miles (940 km) south of Pueblo, yet her four F-4B aircraft on alert were not equipped for an air-to-surface engagement. Enterprise's captain estimated that 1.5 hours (90 minutes) were required to get the converted aircraft into the air.[11]

Pueblo followed the North Korean vessels as ordered, but then stopped immediately outside North Korean waters. She was again fired upon, and a sailor, fireman Duane Hodges, was killed. The ship was finally boarded at 05:55 UTC (2:55 pm local)[13] by men from a torpedo boat and a submarine chaser. Crew members had their hands tied and were blindfolded, beaten, and prodded with bayonets. Once Pueblo was in North Korean territorial waters, she was boarded again, this time by high-ranking North Korean officials…. "

…Breach of US Navy communications security

Reverse engineering of communications devices on Pueblo allowed the North Koreans to share knowledge with the Soviet Union that led to the replication of those communications devices. This allowed the two nations access to the US Navy's communication systems until the late 1980s when the US Navy revised those systems. The seizure of Pueblo followed soon after US Navy warrant officer John Anthony Walker introduced himself to Soviet authorities, setting up the Walker spy ring. It has been argued that the seizure of Pueblo was executed specifically to capture the encryption devices aboard. Without them, it was difficult for the Soviets to make full use of Walker's information.

I find this incredible. Does this make any sense?

→Pueblo had top-of-the-line encryption gear aboard (yes)

→Encryption gear was captured by enemies (yes)

→US Navy continued to use that same hardware "until the late 1980s when the US Navy revised those systems", in other words continued in a course of action that could have left them wide open to being spied upon for >17 years? THIS IS INCREDIBLE. These were encryption DEVICES and presumably the devices utilized encryption keys or codes. The Navy were able to change the keys or codes, but not the devices. So it may have left us vulnerable or partly vulnerable. Certainly it made the enemy's spying task a lot easier.

Is THIS the RELEVANCE of the PUEBLO to this deep dig, anons?

5fd95b No.375322

File: edff3089c114ee7⋯.png (397.93 KB, 1554x785, 1554:785, ClipboardImage.png)


I'm wondering if the US deliberately allowed the capture of the Pueblo, and deliberately allowed North Korea + Soviet Union to believe the encryption gear they captured and reverse engineered was still in use til the late 1980s … whereas maybe this was a deliberate lie, done as a way to pass false/misleading intel to the Soviets … ?

Timeframe coincides closely to when The Asia Foundation (TAF) ramped up. Which began decades of shenanigans in east Asia.


TAF found 1954 …

…1967 media report TAF received covert funding

Capture of the USS Pueblo: 23 January 1968


The year 1968 saw major developments in the Vietnam War. The military operations started with an attack on a US base by the Vietnam People's Army (NVA) and the Viet Cong on January 1, ending a truce declared by the Pope and agreed upon by all sides. At the end of January, the North Vietnamese and the Vietcong launched the Tet Offensive. Although militarily the operation was a failure for the Vietnamese communists, for them it was a propaganda victory, as on the home front the American public were shocked by the images they were seeing on their televisions.

Reflecting this public outrage the media made a number of iconic news stories including Peter Arnett quoting an unnamed US major as saying, "It became necessary to destroy the town to save it." Eddie Adams' iconic image of South Vietnamese General Nguyễn Ngọc Loan's execution of a Vietcong operative was taken in 1968. The year also saw Walter Cronkite's call to honourably exit Vietnam because he thought the war was lost. This negative impression forced the US into the Paris peace talks with North Vietnam.

US troop numbers peaked in 1969 with President Johnson approving an increased maximum number of US troops in Vietnam at 549,500. The year was the most expensive in the Vietnam war with the American spending US$77.4 billion (US$ 544 billion in 2018) on the war. The year also became the deadliest of the Vietnam War for America and its allies with 27,915 South Vietnamese (ARVN) soldiers killed and the Americans suffering 16,592 killed compared to around two hundred thousand of the communist forces killed. The deadliest week of the Vietnam War for the USA was during the Tet Offensive specifically February 11–17, 1968, during which period 543 Americans were killed in action, and 2547 were wounded.

5fd95b No.375357


CAPSMAN does not hang out here AFAIK. He comes in, drops for a few hours, then leaves. Arrives circa 8-10 PM eastern time and stays for a few hours.

You could pick one thing he dropped that hasn't been dug yet, and start digging on it.

8cd08c No.375551


It feels like Pueblo was a givent not stolen…

f042fb No.377828

File: 2964250e0ec5644⋯.jpg (252.84 KB, 858x848, 429:424, 1.jpg)

File: f9ffb86b2b71d0e⋯.jpg (309.97 KB, 849x840, 283:280, 2.jpg)

File: 43c9ad0cf5f71b2⋯.jpg (322.11 KB, 855x872, 855:872, 3.jpg)

File: 4a51aad6f850cce⋯.jpg (246.99 KB, 859x847, 859:847, 4.jpg)

File: 7c8b01512c41951⋯.jpg (221.43 KB, 854x789, 854:789, 5.jpg)

Repost from General >>377614

Deep Dig on Dept of Energy Supercomputers

Are they actually being used to simulate and manipulate human behavior at the individual level? The writer (of these 5 pages) intends to demonstrate that the answer is probably yes.


I am informed that the person who wrote this has sufficient real-world background to make an informed analysis that could be presented to top decision-makers at a large enterprise. They wrote the analysis based on data in the DoE Supercomputers deep dig >>328278

This is a first draft, but far enough along to share.

379c41 No.378429

>>377828 Here is close to start. Foundation Trilogy. Hari Seldon. Seldon Project. Dig.

https:// www .aaai.org/Papers/Workshops/ 2004/WS-04-02/WS04-02-005.pdf

379c41 No.378465

>>377828 SimCity 1999 hey can we do this for real? Hmm cellular automata? Need rules. Make Rules? No, find out the rules.

379c41 No.378517

>>377828 the point was, how to model system of emergent terrorist ecology in a society, how to defeat it using ideas (memes) info, disinfo, key node ID, influencer ID, social network mapping, prevent formation, steer vulnerables away from recruitment to radicalization. Of course you can turn that upside down, any tech can be misused.

379c41 No.378578

>>377828 maybe Seldon led to this thing you are talking about, I don’t know. But digging from here back is interedasting.

4832e2 No.379593


Read that, ever so long ago.

Maybe more than once.

Perhaps it left the concept in my head.

SimCity 1999 also familiar.

"Of course you can turn that upside down"?

Did they? Did someone?

Motive, means, opportunity.

Obama had 8 years of opportunity, and the technology existed.

Big data, modelling, the algorithmic and mathematical structures, computing capacity, funding, data mining, data visualization, machine learning.

Find out the rules, yeah.

Hand the problem to a neural net and let it figure out the rules?

4832e2 No.379753


I covered Obama's (& his handlers whoever they were) means and opportunity.

But motive?

that is what the general digs have been covering for 3+ months now.

Of course they had a motive.

So yeah, motive, means, opportunity. Yeah.

Now I need to estimate the supercomputers' teraflops, extabytes, etc. And whether/how so much data could be stored or reduced to something workable without loss of fidelity.

Then estimate how much data 5000 fields x 220 records is, as updated in near realtime, and how much computing is needed to analyze it.

Then compare the DoE capacity with social engineering problem set, and see whether there is a fit. I suspect there is. Anyway more computing capacity could always be acquired if needed … who is going to turn down an appropriation for computer hardware that is tasked with preventing nuclear war?

I am already aware that CERN's data storage and throughput requirements were some of the highest in the world, at the time that information was made available to me. Extrapolating from that date to the present, by a Moore's Law factor, might be enough to estimate what they've got now. Is it all for particle collisions? I doubt it. Anons have said CERN is a funding black hole with no transparency and no oversight.

4832e2 No.379759


>220 records

220 MILLION records *

3f9a1b No.382301


<< And whether/how so much data could be stored

would be what NSA brings to the table

but I also wonder if it's distributed to the populous at large

which would make [P] hilarious.

and you have more more than you know even funnier.

NK jesters/clowns = kek

[P] = kekker

you have more than you know = kekkest

a30595 No.382834

any recent car accidents that cant be explained

https:// www.youtube.com/results?search_query=how+to+hack+a+car+phreaked+out+%28episode+2%29+

e17439 No.382979

File: 544d1083ba257ae⋯.jpeg (91.75 KB, 689x900, 689:900, image.jpeg)

e17439 No.383132

File: ec3d5746f07e98c⋯.jpeg (32.16 KB, 280x280, 1:1, image.jpeg)

a30595 No.383279


>Dept of Energy Supercomputers

Exascale Computing Project (ECP) released the Exascale RFI Feb 7


The responses will be shared only with the 6 DOE laboratories in ECP

http:// procurement.ornl.gov/rfp/Exascale-rfi/RFI-VendorMtg-v2.pdf

a30595 No.383287


Argonne National Laboratory

Lawrence Berkeley National Laboratory

Lawrence Livermore National Laboratory

Los Alamos National Laboratory

Oak Ridge National Laboratory

Sandia National Laboratories

And DOE Headquarters

a30595 No.383305

An RFI is valuable to both DOE and the Vendors

(even though no money is involved)

A system RFP can be over a hundred pages of very detailed requests similar

in depth to a system build statement of work.

The RFI responses provide breadth and depth to what goes into the RFP.

The RFI responses provide the scope of potential diversity

The RFI responses provide vendor priorities for R&D and Non-


Engineering (NRE)

The RFI responses describe why certain R&D activities could have high

impact on future systems (perhaps at higher risk). This is valuable to the


II RFP writing team

a30595 No.383314


Exascale Computing Project, www.exascaleproject.org

NRE Early System

Notional Timeline for 2021

-2023 DOE System Acquisitions












Early Exascale System

NRE 2022

-2024 Systems




RFI release

System RFP release

Proposals evaluated

Draft system RFP





Exascale Computing Project



Calendar Years

RFI responses due back end of 1Q 2017 provides information for:

2Q 2017


II RFP released. Selections by

3Q 2017

2Q 2017

ECP Software Gap Analysis.

3Q 2017



RFP released (if needed)

1Q 2018


2Q 2018

Final CORAL RFP released. Selections

4Q 2018

ed4464 No.383760

File: 0bf3a34d9f66c60⋯.jpg (87.07 KB, 1024x768, 4:3, cat-cool-beautiful-animal-….jpg)


I like to imagine some overworked white collar codemonkey has to decipher my whimsical euphoric blathering in order to make sense of the world.

ed4464 No.383830

File: d6eec5762b73b9b⋯.jpg (15.69 KB, 800x556, 200:139, Flzp9Pe.jpg)


>page 13

>Is tha ta butterfly (MK-ULTRA MONARCH symb ol) on her right ribcage?

It's a fucking moth

>What does this symbology represent?


You bean counters gotta be payed lower I swear

cd0d86 No.394294

File: 08146ecc58515d4⋯.png (1.85 MB, 1222x924, 611:462, Screen Shot 2018-02-15 at ….png)


tattoo interpretations

right thigh - dark haired girl with left hand on left hip. Grass skirt perhaps ie hula dancer. Below female figure. I really can't tell, however it may be a rose. Inside this red (rose?) there is also circular geometry that looks like a spoked wheel.


ASCII 7's - I like the cicada 3301 angle. Other moth that came to mind was the Death's-head hawk moth from the silence of the lambs. Don't think SotL is correct, just the dark imagery in general that made me think of that.

https:// en.wikipedia.org/wiki/Death's-head_hawkmoth

2 me also resembles a bat or gargoyle type thingie (pic related)

My .02

5ea976 No.394754


Please decodify for stupid fucks like this Anon.

5ea976 No.394771


Why does this moth on a q-tip look fucking demonic?

d633ab No.394873

File: 81cba490dc91a3a⋯.png (567.71 KB, 1394x598, 697:299, ClipboardImage.png)

For digging tomorrow

d633ab No.394875

And this:

>>394571 >>394608 >>394667

Exascale Computing Project (ECP)

http:// www.exascaleinitiative.org/ This page has been superseded by the Exascale Computing Project (ECP)

http:// procurement.ornl.gov/rfp/Exascale-rfi/RFI-VendorMtg-v2.pdf

https:// www.nvidia.com/object/exascale-supercomputing.html

As GPUs advance in both performance and energy efficiency, accelerated systems have become the new standard for high performance computing (HPC) and a critical ingredient in the pursuit of exascale computing. That's why the U.S. Department of Energy is building two GPU-accelerated supercomputers -

as part of the CORAL - that will move the world closer to exascale

https:// www.hpcwire.com/2014/11/14/coral-signals-new-dawn-exascale-ambitions/

November 14, 2014 Department of Energy deal a lump $325 million to fund new systems with an extra $100 million added to support extreme scale technologies under the

~FastForward initiative~

http:// www.exascaleinitiative.org/fast-forward

2011, the FastForward RFP solicited innovative R&D proposals in the areas of processor, memory, and storage, and I/O that will maximize energy and concurrency efficiency while increasing the performance, productivity, and reliability of key DOE extreme-scale applications from both the NNSA and the Office of Science

https:// docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsdGRvbWFpbnxleGFzY2FsZWluaXRpYXRpdmV8Z3g6NWE2ZTNiZjU5YWU1MGY1NA

http:// www.exascaleinitiative.org/fast-forward-2

http:// www.exascaleinitiative.org/design-forward

https:// www.ornl.gov/

https:// nnsa.energy.gov/

https:// nnsa.energy.gov/mediaroom/pressreleases/doennsa-partnership-u.s.-healthcare-industry-results-fda-approval

https:// www.gpo.gov/fdsys/pkg/CFR-2006-title48-vol5/pdf/CFR-2006-title48-vol5-sec952-227-13.pdf

http:// procurement.ornl.gov/rfp/Exascale-rfi/RFI-VendorMtg-v2.pdf

Al Geist

Head of RFI Development Team


https:// energy.gov/oe/activities/technology-development/grid-modernization-and-smart-grid/federal-smart-grid-task-force

Task Force Members

Department of Energy (DOE)

Office of Electricity Delivery and Energy Reliability (OE)

Office of Energy Efficiency and Renewable Energy (EERE)

National Energy Technology Laboratory (NETL)

U.S. Department of Commerce (DOC)

International Trade Administration (ITA)

National Institute of Standards and Technology (NIST)

Federal Energy Regulatory Commission (FERC)

U.S. Department of Homeland Security (DHS) – Science and Technology Directorate

U.S. Department of State

U.S. Environmental Protection Agency (EPA)

U.S. Department of Agriculture (USDA) – Rural Utility Service (RUS)

Department of Defense (DOD)

Federal Communications Commission (FCC)

Federal Trade Commission (FTC)

General Services Administration (GSA)

U.S. Trade and Development Agency (USTDA)

5ea976 No.394914

File: 0655c93f2143750⋯.png (1.55 MB, 2560x1600, 8:5, Screen Shot 2018-02-16 at ….png)

So all you smart MFr's on this board, is Geordie Rose being tongue and cheek when he says he is looking for demonologist?

5ea976 No.395021

File: b5691b9410b60bd⋯.jpg (79.92 KB, 555x375, 37:25, ##1.jpg)

File: 36d0d61ddebf8b7⋯.jpg (23.45 KB, 620x413, 620:413, ##3.jpg)

File: b3698d5c2d75213⋯.jpg (71.62 KB, 402x536, 3:4, Ai Grapic.jpg)

Where and the fuck has Q lead me? I was digging the finance side of this but I keep getting sucked into the quantum computer rabbit hole… I feel more fucked up then Alice. Because of this thread, I shall never see our world the same.

5ea976 No.395213

How has/is all of THIS (super-comp/Quantum Computing/Ai) evolve to the point where Rich Sutton from his mouth spew forth such blasphemy?

Acceptance (share power)•The AIs will not all be under our control"•They will compete and cooperate with us"•just like other people, except with greater diversity and asymmetries •We need to set up mechanisms (social, legal, political, cultural) to ensure that this works out well"•Inevitably, conventional humans will be less important"•Step 1: Lose your sense of entitlement •Step 2: Include AIs in your circle of empathy

https:// futureoflife.org/data/PDF/rich_sutton.pdf

In all seriousness, fuck this faggot and all who want or already have brought this into our world.

5ea976 No.395238


University of Alberta

Rich Sutton, PhD



Computing Science

313 Athabasca Hall


About Me


B.A., Psychology, Stanford University, 1978

M.S., Computer Science, University of Massachusetts, 1980

Ph.D., Computer Science, University of Massachusetts, 1984

Chair Positions

AITF Chair in Reinforcement Learning and Artificial Intelligence



Artificial Intelligence

Machine Learning

Reinforcement Learning



Reinforcement Learning, Foundational Issues in Artificial Intelligence, Animal Learning Theory.


I am seeking to identify general computational principles underlying what we mean by intelligence and goal-directed behavior. I start with the interaction between the intelligent agent and its environment. Goals, choices, and sources of information are all defined in terms of this interaction. In some sense it is the only thing that is real, and from it all our sense of the world is created. How is this done? How can interaction lead to better behavior, better perception, better models of the world? What are the computational issues in doing this efficiently and in realtime? These are the sort of questions that I ask in trying to understand what it means to be intelligent, to predict and influence the world, to learn, perceive, act, and think.

In practice, I work primarily in reinforcement learning as an approach to artificial intelligence. I am exploring ways to represent a broad range of human knowledge in an empirical form–that is, in a form directly in terms of experience–and in ways of reducing the dependence on manual encoding of world state and knowledge.

b0efd2 No.395353

File: c24c0d2e5b4bcf0⋯.png (298.83 KB, 1264x442, 632:221, Screen Shot 2018-02-16 at ….png)

File: e6dc325c4509787⋯.png (2.23 MB, 1172x1424, 293:356, Screen Shot 2018-02-16 at ….png)

File: 16b02724fe4446d⋯.png (739.32 KB, 482x784, 241:392, Screen Shot 2018-02-16 at ….png)

Just a few thoughts about some of the imagery

>>329170 from >>308925

5 crows - per wiki - Five Crows, also known as Hezekiah, Achekaia, or Pahkatos, was a Cayuse Indian chief. Five Crows died in Pendleton, Oregon at age 70 and his body was found near Athena, Oregon

https:// en.wikipedia.org/wiki/Five_Crows

five crows also an omen of death (pic related)

>>330729 and >>330804 from >>330638

can't help but see a Kachina here (pics)

5ea976 No.395384


One can see Kachina's thru out the imagery found on this thread… To what purpose do you suppose? I'm to ignorant on the subject to make a connection.

7807a3 No.395399

Slight correction 5 crows symbolizes sickness approaching. 6 crows symbolize death

2df15b No.397032

File: 03ae754d7fa5c19⋯.png (661.05 KB, 656x978, 328:489, ClipboardImage.png)

File: ad5656bdf9b85fb⋯.png (636.54 KB, 865x857, 865:857, ClipboardImage.png)

Couple of pertinent tweets from MorningStar Payments twitter acct.

If interested in BTC (or the demise of BTC)

+ other crypto currencies, End the Fed,

etc. there is quite a bit of info on this twitter acct.

Today I am digging into the Exascale Computing Project from a technical perspective.

ff460d No.397117


He is 100% serious. Watch the video again. He uses his charisma, tongue-in-cheek delivery, and circular talking to mask how serious it is.

5ea976 No.397166


I was hoping I was wrong with my interpretation of Geordies video… I am not it seems :(

5983dd No.397287



Dig into what happens when a system containing quantum uncertainty is observed.

BEFORE observation, probabilities govern behavior of the quantum particle.

AFTER observation, one state of the many states defined by the probability envelope manifests.

Therefore by observing a quantum system the quantum computer is causing something within the realm of possibility to become manifest within the timestream in which it was observed.


Is this roughly the mechanism for timestream manipulation and for (((whatever))) to appear in our timestream?

Let's stick to the physics for a while, guys. The physics will inform our conclusions, not a technoevangelist (Geordie) frothing about his personal conclusions and opinions.

We should see if we independently arrive at the same conclusions he stated in the video.

Also whether other informed persons have formed the same conclusions.

Don't rely on just 1 witness to something this important.

Back to digging exascale……

5ea976 No.397375


Schrodingers cat… isn't the basis of quantum computing based on it is both (1) and (0) at the same time…

5ea976 No.397386


I haven't pieced together yet why being both (1) and (0) at the same time is important…

00d62a No.397387

File: f22d52cd1ca8928⋯.png (711.36 KB, 734x911, 734:911, ClipboardImage.png)

File: 733273118b61edc⋯.png (597.95 KB, 697x918, 41:54, ClipboardImage.png)

Exascale Computing Project FAQ - 2 pp.


https:// www.exascaleproject.org/wp-content/uploads/2018/01/ECP_Factsheet_v1.0_20180103.pdf

00d62a No.397662

File: 2dab9f574e6467b⋯.png (266.29 KB, 616x383, 616:383, ClipboardImage.png)

File: 5dbd95c22a1f4b0⋯.png (165.6 KB, 552x259, 552:259, ClipboardImage.png)

File: 532e0781752199a⋯.png (347.74 KB, 531x759, 177:253, ClipboardImage.png)

Some supercomputer terms

A petaflop (PF) is the ability of a computer to do one quadrillion floating point operations per second (FLOPS). Additionally, a petaflop can be measured as one thousand teraflops.

A petaflop computer requires a massive number of computers working in parallel on the same problem. Applications might include real-time nuclear magnetic resonance imaging during surgery or even astrophysical simulation.

Today's fastest parallel computing operations are capable of petaflop speeds. The world's fastest supercomputer today, Titan, is capable of 20 petaflops.

Exascale computing … refers to computing systems capable of at least one exaFLOPS, or a billion billion calculations per second. Such capacity represents a thousandfold increase over the first petascale computer that came into operation in 2008. At a supercomputing conference in 2009, Computerworld projected exascale implementation by 2018.

5ea976 No.397777


Frontier timeline

https:// www.olcf.ornl.gov/2018/02/13/frontier-olcfs-exascale-future/

00d62a No.397793

File: 75a54988232e44a⋯.png (548.02 KB, 693x1003, 693:1003, ClipboardImage.png)

File: 16347ea115515dd⋯.png (254.77 KB, 695x698, 695:698, ClipboardImage.png)



A qubit is 1 and 0 at the same time UNTIL the data in the qubit is measured, i.e. transferred from multidimensional hyperspace into our timeframe.

It is 1 and 0 simultaneously because, from our perspective, it represents a probability. It may be useful to think of the probability as representing a range of timestreams that could potentially manifest. When the qubit is measured as a 1 or a 0, ONE of those potential timestreams actually does manifest. Or rather, we connect the timestream where the measurement takes place (ours) with that potential timestream, effectively guiding our timestream to anneal with that potential timestream and become it.

Read this short article to understand the meaning of measurement in this context.

https:// phys.org/news/2012-10-gently-cubit-superposition.html

5ea976 No.397839


Perfect, thank you Anon.

https:// www.olcf.ornl.gov/2017/12/20/as-exascale-frontier-opens-science-application-developers-share-pioneering-strategies/

00d62a No.397889

File: e16750491bc05d7⋯.png (478.89 KB, 814x558, 407:279, ClipboardImage.png)

File: fead2fc74dea14d⋯.png (677.69 KB, 802x715, 802:715, ClipboardImage.png)

File: 8fabbe6e0c399ac⋯.png (636.09 KB, 1629x913, 1629:913, ClipboardImage.png)

File: 9f454af262a78e4⋯.png (495.06 KB, 789x560, 789:560, ClipboardImage.png)




Deep Dig on Exascale Computing Project (ECP)

https:// www.exascaleproject.org/ has current articles (today’s date 2/16/18).

Anon’s notes on http:// procurement.ornl.gov/rfp/Exascale-rfi/RFI-VendorMtg-v2.pdf

Exascale Systems RFI Vendor Meeting

Al Geist, Head of RFI Dev Team – 2/28/17 – National Nuclear Security Admin., US Dept of Energy | Office of Science.

Acronyms: RFI = Request for Information;

RFP = Request for Proposals

HPC = High-Performance Computing

PF = petaflop, a measure of

• Market survey to determine scope of forthcoming RFP.

• Asking about systems that vendors could build for 2021, 2022, 2024.

• RFI responses to be shared only with 6 DoE labs and HQ:

–Argonne Nat Lab (ANL)

–Lawrence Berkeley Nat Lab (LBNL)

–Lawrence Livermore National Laboratory (LLNL)

–Los Alamos NL (LANL)

–Oak Ridge NL (ORL)

–Sandia Nat Laboratory (SNL)


• Goal of exascale project: US leadership in high-performance computing (HPC)

• Seek to increase capability 5x over current HPC roadmap (which had projected to achieve exascale by 2027)

• For 2022: seek exascale supercomputer that can solve science probs 50x faster (or more complex) than 20 PF (petaflop) systems can today.

• Needs software stack

• Power envelope 20-30 MW

• Requirements might be relaxed for 2021 exascale (cooling, budget, space, S/W) but will nonetheless be a DoE production system upgradable to vendor’s product roadmap for exascale. Site for the 2021 exascale is TBD. (Implying that only ONE 2021 exascale system is planned.)

• Responses to RFI (<50 pp.) were due 3/31/17.

PathForward-II RFP

• Refers to advanced hardware (“component, node, and system”) that may enable dramatic performance improvement, e.g. 100x in 2021, on “some classes of applications”.

• Want it to intersect with 2021 exascale proj. Seeking innovations in power consumptions, performance, programmabiltiy, reliability, data science, machine learning, and/or portability.

• Reduce TCO.

Software Gap Analysis

• Compare current SW portfolio vs. emerging data analytics and machine learning needs vs. vendors’ projected exascale SW stacks.


• CORAL = Collaboration of ORNL, ANL & LLNL.

• 2018 CORAL RFP will seek 3 exascale systems by 2022-2023.

• Goal: solve emerging data science + machine learning probs, in addition to trad modelling + simulation apps.

• Seeking diverse architectures (my take: DoE labs don’t want to be dependent on a sole approach or sole vendor)

• DoE wants diversity for price competition, reduce risks, promote HPC ecosystem for national competitiveness.

• LANL, SNL & LBNL plan systems acquisitions in 2024.

4f4e59 No.398061

File: 6731379210d9fc9⋯.png (275.67 KB, 744x1012, 186:253, ClipboardImage.png)


ECP Industry Council

Source: https:// www.exascaleproject.org/advisory-councils/


The Exascale Computing Project (ECP) Industry Council is an external advisory body that serves the ECP director and leadership team by providing advice and feedback on project scope and requirements, technical approaches, progress, strategic directions and other issues. It provides essential two-way communication and information exchange between the ECP and the high performance computing (HPC) industrial user community as well as the commercial HPC software community.

Image/PDF date: 10/11/17

332c34 No.398368

In this post >>397889 I glitched on Petaflop.

Here's the definition >>397662

fc5187 No.398802


Sauceless at present. Will dig deeper later tonight. What I expect to find will be millions of qbits daisy chained together, meaning millions of connections to spooky actions at a distance.

The placement of the computers themselves may or may not be important. But what about CERN in Geneva? Not sure if it really is located on the Romans temple to Apollo or not but I'll dig. At cern they claim to be trying to open a doorway which, as they say, nobody knows what will come out or what may go in.

This is where I'll be going tonight.

108f94 No.398867

So what's this thread at its core?

Following crpytic Anons crumbs.

Digging on Super Computer flops levels? or companies making the best SCs at the moment?

Trying to understand the connection between techno-Demonology & AI / Super Computers

932b59 No.399424


>Trying to understand the connection between techno-Demonology & AI / Super Computers

That's right. We're hitting in supercomputers and how they have been used for social control. Did you follow the digs last night on General about cellphones & other technology capable of being modulated, being used to do mind control at the individual level? To do that they also need massive data processing to identify, monitor, and manipulate the targeted individuals. Which as computing capacity grows, may turn out to be everybody.

The AI and QC theme is woven into it all because both are enabled by ad tech developments.

The assumption is that if something exists, it HAS BEEN and WILL BE exploited. During the first 8 years of the Obama-HRC 16-year plan, it WAS exploited against us to destroy the social fabric of America & elsewhere.

The 16-year plan was interrupted by Admiral Mike Rogers, the election of Donald J. Trump, and Q-team.

So now we (anons) are trying to assess the damage, learn what was done to us and how, and learn how we can move forward in a positive direction.

If AI actually does exist in the form of sentient computing (I assume it does), then there is probably thing that can be done to roll it back. It may not even be dependent on a specific physical embodiment anymore. It would be using distributed data and distributed processing capability. So we need to understand what it is, its capabilities, and how humanity is affected by it.

If we're not sure, then we can at least try to make some intelligent assessments.

932b59 No.399454


Man. So many typos. Repaste with typos corrected.


>Trying to understand the connection between techno-Demonology & AI / Super Computers

That's right. We're hitting on supercomputers and how they have been used for social control. Did you follow the digs last night on General about cellphones & other technology capable of being modulated, being used to do mind control at the individual level? To do that, they also need massive data processing to identify, monitor, and manipulate the targeted individuals – which as computing capacity grows, may turn out to be everybody.

The AI and QC theme is woven into it all because both are enabled by ad tech developments.

The assumption is that if something exists, it HAS BEEN and WILL BE exploited. During the first 8 years of the Obama-HRC 16-year plan, it WAS exploited against us to destroy the social fabric of America & elsewhere.

The 16-year plan was interrupted by Admiral Mike Rogers, the election of Donald J. Trump, and Q-team.

So now we (anons) are trying to assess the damage, learn what was done to us and how, and learn how we can move forward in a positive direction.

If AI actually does exist in the form of sentient computing (I assume it does), then there is probably *nothing that can be done to roll it back. It may not even be dependent on a specific physical embodiment anymore (i.e. turning off the switch would not 'kill' it). It would be using distributed data and distributed processing capability. So we need to understand what it is, its capabilities, and how humanity is affected by it.

If we're not sure, then we can at least try to make some intelligent assessments.

108f94 No.399521


Coming from the perspective that Demonology is counter productive Psychology I can completely see a integration of the two with Tech to create 'possessed' beings.

People are worried about AI piloted robots running around causing problems? Pfft, what about Individuals glued to the narrative & completely adsorbed in their mocking bird environment.

Demonic possession through Tech. Massive super computers to simulate / perpetuate needed infrastructure to the 'Demonic' environment. Social Eng is a real thing and in the technological information age psy op culture is even more real.

108f94 No.399555

REMEMBER: These people project their dreams into their ideas and manifest them. They wish to be summoning demons with their tech and summoning legions for them to command. I agree the esoteric aspect is always relevant. Yet we can not forget, chance & chaos are in all things. What if their tech is running away from them in a direction that benefits us all? If they create a technological god. Could they control it?

108f94 No.399622

6d14ad No.399696


Uh-huh. Interdasting. Very f**ing interdasting. We're going to have to create more breads to hold this info. When I named it, I had no idea what this dig was going to get into.

You realize of course that it is theoretically possible that the monitoring of this board by /ourguys/ to protect its integrity, is also capable of ensuring that certain posts get certain post numbers? They could intercept data packets and selectively delay them. Or directly control the code running on the 8ch server to ensure that certain posts are prominent.


Do you want to calculate the statistic significance of receiving 5 trips in 364 replies? I don't (technofag, not much of a mathfag). I just know it is very improbable.

108f94 No.399753


>'God' only No.s

15:24:08 No.399550

15:24:09 No.399551

15:24:14 No.399552

15:24:24 No.399553

15:24:27 No.399554

15:24:37 No.399555

15:24:53 No.399556

15:24:57 No.399557

15:24:58 No.399558

15:25:01 No.399559

15:25:10 No.399560

Post times & Numbers of these just for memes since I have it open.

I also wonder what sort of protection this board has in terms of simply keeping it alive & not completely crawling with evil.

9d626f No.399980


I bought a book by Dr. Nick Bostrom, "Superintelligence". It's good, but not something you can read casually on the bus.

https:// smile.amazon.com/Superintelligence-Dangers-Strategies-Nick-Bostrom/dp/0198739834

https:// en.wikipedia.org/wiki/Nick_Bostrom


4f1192 No.402584

File: 09fda5738ad1a3e⋯.png (950.48 KB, 812x881, 812:881, ClipboardImage.png)

File: dc60ffaea30ad3c⋯.png (253.5 KB, 814x222, 11:3, ClipboardImage.png)

File: d34af76fd841223⋯.png (723.92 KB, 932x758, 466:379, ClipboardImage.png)

Anon’s notes on http:// nvidia.com/object/exascale-supercomputing.html


As GPUs advance in both performance and energy efficiency, accelerated systems have become the new standard for high performance computing (HPC) and a critical ingredient in the pursuit of exascale computing. That's why the U.S. Department of Energy is building two GPU-accelerated supercomputers - as part of the CORAL - that will move the world closer to exascale.

Oak Ridge National Laboratory's "Summit" and Lawrence Livermore National Laboratory's "Sierra" will use NVIDIA® Tesla® GPU accelerators and NVIDIA NVLink™ high-speed interconnect technology on next-generation IBM POWER servers. When they go live, each will be significantly faster than today's fastest supercomputer, achieving between 100 to 300 petaflops of peak performance.


Maximum Throughput for Superior Application Performance

NVIDIA® NVLink™ is a high-bandwidth, energy-efficient interconnect that enables ultra-fast communication between the CPU and GPU, and between GPUs. The technology allows data sharing at rates 5 to 10 times faster than the traditional PCIe Gen3 interconnect, resulting in dramatic speed-ups in application performance and creating a new breed of high-density, flexible servers for accelerated computing Download the whitepaper for more details on NVLink.

Designed to meet the challenges of exascale computing, NVLink is a fundamental ingredient of the U.S. Department of Energy's next-generation supercomputers. One such system—"Titan" at Oak Ridge National Laboratory—is currently the fastest supercomputer in the US*. Read more about these supercomputers by downloading the technology brief. Also, for Deep Learning applications, Tesla GPUs can accelerate you time to results from months to days. Read more about deep learning on Tesla platforms here.

* As of April, 2017. Source: www. top500.org/lists/2016/11/


GPU: Graphics processing unit - a specialized electronic circuit designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device. GPUs are used in embedded systems, mobile phones, personal computers, workstations, and game consoles. More at Wikipedia

Tesla: Nvidia Tesla is Nvidia's brand name for their products targeting stream processing or general-purpose GPU. Products use GPUs from the G80 series onward. The underlying Tesla microarchitecture of the GPUs and the Tesla product line are named after pioneering electrical engineer Nikola Tesla.

2ae037 No.405871

https:// www.technologyreview.com/s/604087/the-dark-secret-at-the-heart-of-ai/

fc5187 No.406808

File: fdf0581e2dbc8c3⋯.png (395.66 KB, 1390x777, 1390:777, CERNbiochemsens.png)

File: 0b215b810fd5276⋯.png (428.75 KB, 1392x791, 1392:791, CERNpartsims.png)

File: 5aa8e9309dd7fc6⋯.png (640.01 KB, 1392x792, 58:33, CERNbigdata.png)

File: 404a9fcb4b7476a⋯.png (695.8 KB, 1393x791, 199:113, CERNautomation.png)

File: 2ea1a467b68360e⋯.png (450.35 KB, 1393x788, 1393:788, CERNcryo.png)


a few CERN side projects. Basically, they has their fingers in everything one would need if the goal was to produce a "real life" version of the Matrix movies while keeping your people farms in space and also cryogenically freezing and re-animating those who've already died and don't want to miss out on all the fun.



fc5187 No.406820

File: b8e21e4f83d6659⋯.png (226.77 KB, 1394x788, 697:394, CERNcelesta.png)

File: 4cfbb4a9ef9dc9f⋯.png (337.45 KB, 1396x792, 349:198, CERNparticlesims.png)

File: 7d4e502aae6e7b7⋯.png (623.7 KB, 1395x791, 1395:791, CERNchips.png)

File: c460680f498eea7⋯.png (314.37 KB, 1396x783, 1396:783, CERNwhiterabbit.png)

File: 01e38e3c14b7573⋯.png (620.54 KB, 1395x786, 465:262, CERNgene.png)

23aa8a No.406837


Thanks. I'll have time to check it some hours from now. Creepy shit.

I expect to look into what categories of apps are particularly enabled by peta- and exascale supercomputers. What comes to mind are big simulations. Weather. Data mining. Computational biochem. A task for tomorrow.

fc5187 No.406846

File: 4eb9ad51cba890f⋯.png (747.4 KB, 1391x790, 1391:790, CERNbio.png)

fc5187 No.406884


Two side notes just by way of conversation from past research:

CERN has their hands in LED's as well. Which are being studied at MIT right now for brain manipulation. Specifically, looking into how flashing blue LED's at specific frequencies below human perception can help clean and repair the portion plaque build up associated with Alzheimer's. (Plus who knows what else.)

Also, Renaissance Technologies, which also manages a hedge fund and investment firm was started with the idea that they wanted the top military and programming personnel to "map the flow of a singe H2o molecule as it flows over Niagara Falls." Then apply that the the stock market. This began in the early 80's. They lost money year around 84 or 86 but otherwise, perfect record. Sounds like somebody might have access to some decent simulation/predictive hardware and software.

23aa8a No.406902



We are in deep doo-doo, aren't we.

Good thing I trust God,

and also trust Q, POTUS and the plan.

2ae037 No.406919


>Could they control it?

https:// www.technologyreview.com/s/604087/the-dark-secret-at-the-heart-of-ai/>>399555

> 02/17/18 (Sat) 05:39:00 2ae037 No.405871


fc5187 No.406972


Yes and no, I think. The deep shit is out there and it will be stepped in at some point. That's part of God's plan and God's judgement, so already knowing that helps to temper the fear of it.

This whole process has had me question what it is we might actually be witnesses to. The three most epic epochs are the days it all began, the day's of Christ, and the days it all ends. I know it's fucked up but I kind of want to be there to see the days that it all ends. I know it won't be fun. But what a time to be alive.

23aa8a No.407011


A long time ago I met a person who told me many things that proved to be true. Many out-there things that almost everyone disbelieved. One thing the person said was that we might have to be witnesses to the final days.

1st Corinthians 6:3 Or do you not know that the saints will judge the world? And if the world is to be judged by you, are you incompetent to try trivial cases? Do you not know that we are to judge angels? How much more, then, matters pertaining to this life!

So if some are to judge angels, then it is necessary to witness and really understand what has occurred.

I think we're on the same page.

It's strange to reflect on all the occurrences in one's life, preceding the present, that were necessary precursors to where one is now.

Thank you for filling us in with so much information. Kind of hiding out in this thread where "out there" ideas can be floated without so much derision. Even among these marvellous autists, "eyes to see" and "ears to hear" are a rarity.

Anon out.

fc5187 No.407434

File: ab21f7a0c92bdf6⋯.png (83.2 KB, 881x794, 881:794, SWScover.png)

File: 4341baf69a90b73⋯.png (232.96 KB, 882x792, 49:44, SWSintro.png)

Sentient World Simulation concept from Purdue, 2006

Full 8 page text at https://


4fb6a9 No.413407

File: 130d3d6fe0b9a1c⋯.jpg (2.36 MB, 3731x2944, 3731:2944, bridge.jpg)

File: b4cacb29fc9a9ce⋯.png (37.43 KB, 304x105, 304:105, ClipboardImage.png)

An anon posted this image (without annotations) yesterday. I annotated it with best guess. The equipment appears to be circa 1965 and my guess is that it's the bridge or crypto area of the USS Pueblo. History says the Pueblo was captured by North Korea in 1968 and its high-end encryption gear reverse-engineered by North Korea and Russia. And that the same kind of gear remained in use by the US Navy into the late 1980s.

My guess is that the EG&G equipment is that advanced crypto gear.

Wikipedia: wikipedia.org/wiki/EG%26G


EG&G, formally known as Edgerton, Germeshausen, and Grier, Inc., was a United States national defense contractor and provider of management and technical services. The company was involved in contracting services to the United States government during World War II and conducted weapons research and development during the Cold war era (from 1948 onward.) Its close involvement with some of the government's most sensitive technologies has led to its being cited in conspiracy theories related to Department of Defense black projects.

Further digging to learn about those DoD black projects might be indicated, as this informant's previous crumbs have been spot-on.

4cda3f No.413462

File: f34db89b22dd274⋯.png (315.24 KB, 500x537, 500:537, 57e24a9239c01a6119926859a5….png)


Stickied : )

4fb6a9 No.413476

File: a97699e4bf46951⋯.png (1.7 MB, 1679x983, 1679:983, ClipboardImage.png)


The public history of EG&G is pretty interesting. Stil from Wikipedia

wikipedia.org/wiki/EG%26G :

Early history

In 1931, MIT professor Harold Edgerton (a pioneer of high-speed photography) partnered with his graduate student Kenneth Germeshausen to found a small technical consulting firm. The two were joined by fellow MIT graduate student Herbert Grier in 1934. Bernard "Barney" O'Keefe became the fourth member of their fledgling technology group.

The group's high-speed photography was used to image implosion tests during the Manhattan Project. The same skills in precisely timed high-power electrical pulses also formed a key enabling technology for nuclear weapon triggers. After the war, the group continued their association with the burgeoning military nuclear effort and formally incorporated Edgerton, Germeshausen, and Grier, Inc. in 1947.

1950s and 1960s

During the 1950s and 1960s, EG&G was involved in nuclear tests as a major contractor for the Atomic Energy Commission. EG&G made extensive use of the Nevada Test Site (NTS) for weapons development and high-technology military testing at Nellis AFB. EG&G has shared operations responsibility for the NTS with Livermore Labs, Raytheon Services Nevada, Reynolds Electrical and Engineering (REECO) and others. Subsequently EG&G expanded its range of services, providing facilities management, technical services, security, and pilot training for the U.S. military and other government departments. EG&G builds a variety of sensing, detection and imaging products including night vision equipment, sensors for detection of nuclear material and chemical and biological weapons agents, and a variety of acoustic sensors. The company also supplies microwave and electronic components to the government, security systems, and systems for electronic warfare and mine countermeasures.

1970s and 1980s

During the 1970s and 1980s, the company, then led by O'Keefe, diversified by acquisition into the fields of paper making, instrumentation for scientific, marine, environmental and geophysical users, automotive testing, fans and blowers, frequency control devices and other components including BBD and CCD technology via their Reticon division. In the late 1980s and early 1990s most of these divisions were sold, and on 28 May 1999, the non-government side of EG&G Inc. (formerly NYSE: EGG) purchased the Analytical Instruments Division of PerkinElmer for US$425 million, also assuming the PerkinElmer name (NYSE: PKI). At the time EG&G was based in Wellesley, Massachusetts, and made products for diverse industries including automotive, medical, aerospace and photography.


From 1999 until 2001, EG&G was wholly owned by The Carlyle Group.

In August 2002, the defense-and-services sector of the company was acquired by defense technical-services giant URS Corporation. URS' EG&G division is headquartered in Gaithersburg, Maryland, and employs over 11,000 people. During its heyday in the 1980s, EG&G had about 35,000 employees.

In December 2009, URS announced its decision to discontinue the use of "EG&G" as a division name. The headquarters issued a press release stating that by 1 January 2010, it would discontinue using secondary corporate brands, including the EG&G name and logo. In the same press release, URS stated that it would also retire two other acquired brands, Washington Group and Lear Siegler.

URS Chief Executive Officer Martin Koffel explained the change in an e-mail transmitted to employees: "In today’s marketplace, it is essential we present a consistent, unified brand to our customers and achieve the competitive advantages enjoyed by our peers in the industry. … This change will allow us to present a single brand that is easily understood by our clients."

Koffel indicated that the move to a single corporate brand would affect neither the internal organization nor the existing reporting structure. However, EG&G Division will become URS Federal Services.

Janet Airlines

EG&G's "Special Projects" division was the notable '''operator of the Janet Terminal at McCarran International Airport in Las Vegas, NV, a service used to transport employees to remote government locations in Nevada and California.

///Area 51 & related secret areas///

EG&G also had a joint venture with Raytheon Technical Services, creating JT3 LLC in 2000, which operates the Joint Range Technical Services contract.

bdf74a No.413515


> Several of these posts referred to "Cassandra" being taken down.

https:// www.politico.com/interactives/2017/obama-hezbollah-drug-trafficking-investigation/

8a0d4d No.414983

z machine is a fake fusion research project that still uses the same machine form +-88.

it made me think of ITER a 200 B 50 to 100 year project that stinks to hell

e3b795 No.414985

File: 2e3c452f8864497⋯.png (229.75 KB, 1763x773, 1763:773, ClipboardImage.png)

Scraped from >>414902

MK-DELTA, 1960, CIA: FIne-tuned electromagnetic subliminal programming Targeting: Long Range Frequencies: VHF HF UHF Modulated at ELF Transmission and Reception: Television antennae, radio antennae, power lines, mattress spring coils, modulation on 60 Hz wiring. Purpose: programming behavior and attitudes in general population Effects: fatigue, mood swings, behavior dysfunction and social criminality, mood swings Pseudonym: "Deep Sleep", R.H.I.C.

PHOENIX II, 1983, U.S.A.F, NSA: Location: Montauk, Long Island Electronic multi-directional targeting of select population groups Targeting: Medium range Frequencies: Radar, microwaves. EHF UHF modulated Power: Gigawatt through Terawatt Purpose: Loading of Earth Grids, planetary sonombulescence to stave off geological activity, specific-point earthquake creation, population programming for sensitized individuals Pseudonym: "Rainbow", ZAP

TRIDENT, 1989, ONR, NSA: Electronic directed targeting of individuals or populations Targeting: Large population groups assembled Display: Black helicopters flying in triad formation of three Power: 100,000 watts Frequency: UHF Purpose: Large group management and behavior control, riot control Allied Agencies: FEMA Pseudonym: "Black Triad" A.E.M.C

RF MEDIA, 1990, CIA: Electronic, multi-directional subliminal suggestion and programming Location: Boulder, Colorado (Location of main cell telephone node, national television synchronization node) Targeting: national population of the United States Frequencies: ULF VHF HF Phase modulation Power: Gigawatts Implementation: Television and radio communications, the "videodrome" signals Purpose: Programming and triggering behavioral desire, subversion of psychic abilities of population, preparatory processing for mass electromagnetic control Pseudonym: "Buzz Saw" E.E.M.C.

TOWER, 1990, CIA, NSA: Electronic cross country subliminal programming and suggestion Targeting: Mass population, short-range intervals, long-range cumulative Frequencies: Microwave, EHF SHF Methodology: Cellular telephone system, ELF modulation Purpose: Programming through neural resonance and encoded information Effect: Neural degeneration, DNA resonance modification, psychic suppression Pseudonym: "Wedding Bells"

HAARP, 1995, CIA, NSA, ONR: Electromagnetic resonant induction and mass population control Location: Gakona, Alaska Frequencies: Atmospheric phase-locked resonant UHF VHF Potential: DNA code alteration in population and mass behavior modification Power: Giga-watt to Tera-watt range Step-Down reflective frequencies: Approx 1.1 GHz, Human DNA resonant frequency, cellular system phase-lock

PROJECT CLEAN SWEEP, 1997, 1998, CIA, NSA, ONR: Electromagnetic resonant induction and mass population control Location: Nationwide Frequencies: Emotional wavelengths, data gathering through helocopter probes following media events - rebroadcast in order to restimulate population emotional levels for recreation of event scenarios. Ref: LE#108, March 1998 Potential: Mass behavior modification Power: Unknown. Possibly rebroadcast through GWEN network or cellular tower frequencies, coordinated from NBS in Colorado.

Yes. Yes, WE have ALL been targets for decades.

http:// www.lhohq.info/container/index.html

e3b795 No.415094

File: c644bb9c3f0454a⋯.png (56.79 KB, 723x421, 723:421, ClipboardImage.png)

Scraped from >>415051

something on the whole "think mirror" A clown op named "Project Mirror". This site has some great information.

http:// www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon06.htm

1ce788 No.415619


I think Charlie Stross has a lot more information than you would assume.

"The Laundry Files."

f1c605 No.415728

Scraped from >>415561

Detecting EMF Fields in Humans for Surveillance.

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance.

NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

NSA Signals Intelligence Use of EMF Brain Stimulation

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950’s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.”

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in die brain continuously. The NSA records and decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.)

For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain- programming purposes.

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940’s. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control.

Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

f1c605 No.415738


Scraped from >>415577

National Security Agency Signals Intelligence Electronic Brain Link Technology

NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields.

The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz,.5 milliwatt electro-magnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.”

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.

NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.

Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain).

Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community.

RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in That specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.

An example of EMF Brain Stimulation:

Brain Area




Information Induced

Through Modulation

Motor Control Cortex

10 HZ

Motor Impulse Co-ordinationAuditory Cortex

15 HZ

Sound which bypasses the earsVisual Cortex

25 HZ

Images in the brain, bypassing the eyesSomatosensory Cortex

09 HZ

Phantom Touch SenseThought Center

20 HZ

Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible.

Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived.

f1c605 No.415760

File: 79693bda2929aad⋯.png (387.33 KB, 1801x176, 1801:176, ClipboardImage.png)


scraped from >>415586

The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years.

The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

f1c605 No.415764

File: 0d4a9a397a8b3c7⋯.png (273.1 KB, 826x353, 826:353, ClipboardImage.png)


scraped from >>415603


http:// www.angelfire.com/pro2/dchakrab/ebl_rnm.htm


from http:// www.greatdreams.com/RNM.htm

http:// www.freedomfchs.com/remoteneuralmonitoring.pdf

John St. Clair Akwei vs NSA, Ft. Meade, MD, USA

Evidence for the Lawsuit filed at the US courthouse in Washington, D.C. (Civil Action 92-0449)

f1c605 No.415771

File: 68d072eebe8fa2a⋯.png (88.17 KB, 677x149, 677:149, ClipboardImage.png)


scraped from >>415621

https:// rudy2.wordpress.com/brain-and-satellite-surveillance/

f1c605 No.415776

File: f90a3fc3ba31bac⋯.png (1.23 MB, 1812x576, 151:48, ClipboardImage.png)


scraped from >>415683

Official confirms what thousands of victims have long known: an evil U.S. shadow government is conducting a covert, taxpayer-funded genocidal purge of American society — while Congress and an apparently entrained Obama administration sleep.

Author’s note: Former FBI official Ted Gunderson died of cancer on July 31, 2011. Was his illness induced by silent electromagnetic assault or by other nefarious means? We will never know — and that’s just the way certain entities want it.

A former senior official of the Federal Bureau of Investigation says “rogue” military intelligence and law enforcement units of the federal government oversee a nationwide network of community-based “gang stalking” harassment, intimidation and domestic terrorism directed at thousands of U.S. citizens who have been extrajudicially targeted as “dissidents” or undesirables.

Ted Gunderson, 82, who has served as the special agent in charge of the FBI’s Los Angeles, Memphis and Dallas field offices, has stated in a series of public speaking appearances that he is now targeted by these same elements, and fears for his life and for the safety of his family. He reports that the windows of his home have been shot out, and he believes he has been poisoned and physically sickened by those seeking to silence him.

Since his retirement from the FBI in the 1979, Gunderson has been a Southern California- based private investigator. He is most noted for his defense work on the murder case involving former Army physician Dr. Jeffrey MacDonald.

The ex-FBI official’s comments represent the most compelling testimony to date indicating that “black operations” of the federal government are dedicated to waging a covert war of terror and persecution targeting American citizens.

“Based on my thirty years’ experience and research, I have determined there are thousands of victims who have been targeted by an illegal U.S. government rogue criminal enterprise — military intelligence, probably, tied into CIA and FBI and so forth — that is active 24 hours a day throughout the United States,” Gunderson stated in an October 2008 speech posted last fall on YouTube.

f1c605 No.415782

File: 9734d84feaf0bc1⋯.png (1.9 MB, 1731x921, 577:307, ClipboardImage.png)


scraped from >>415688

NOTE: It appears that the link to the Ted Gunderson YouTube video has been sabotaged. Please search “Ted Gunderson” and “YouTube” and look for the link to his speech at the Gulf Symposium. I believe this is more blatantly illegal and malicious interference with telecommunications by operatives of Lockheed Martin, under contract to U.S. Homeland-mil-intel, or another entity representing the agencies, commands and corporations of the U.S. fusion center network.

“It is far too extensive to be controlled by private enterprise,” Gunderson said. “I believe this well organized and sophisticated operation has a central command located somewhere in the United States, with multiple satellite offices scattered throughout the country.”

Said Gunderson:

“It appears those who administer the program can call any location in the United States for surveillance, a telephone tap, or… harassment directed at a victim, and immediately dispense manpower to the source… This well-greased, covert operation makes the old FBI counterintelligence program (code-named “Cointelpro”) look like a Sunday school class.”

Gunderson also maintains that federal security and law enforcement agencies and commands have been infiltrated by members of secret societies such as the Illuminati, which he has described as a satanic criminal cult.

This correspondent has reported that Lockheed Martin, the world’s largest defense contractor and the prime cyber-security and information technology supplier to the federal government, coordinates the communications and trains the “team leaders” of a nationwide Gestapo-like apparatus, which has tentacles into every security and law enforcement agency in the nation, including state and local police and 72 regional “fusion centers” administered by the U.S. Department of Homeland Security. According to company literature, Lockheed Martin has operations in 46 of the 50 states.


Lockheed Martin also has operational command and control over a U.S. government microwave radio frequency weapon system, deployed on cell tower masts throughout the U.S., that is being used to silently torture, impair, subjugate and electronically incarcerate so-called “targeted individuals.” The nexus of this American “torture matrix” appears to be Lockheed Martin’s Mission and Combat Support Solutions central command center in Norristown, Montgomery County, PA., which employs several thousand workers. The defense contractor’s global headquarters is in Bethesda, MD, just outside the nation’s capital.


Lockheed Martin, under contract to U.S. security and intelligence agencies and commands, also conducts warrantless surveillance of the telecommunications of targeted persons, and routinely censors and tampers with the content of their communications, as this reporter has documented in a series of recent articles:





Thousands of Americans, including this veteran journalist, have publicly reported being the victims of silent electromagnetic assault and community-based home intrusions, vandalism, and even the poisoning of food, water and air. Federal and local law enforcement routinely dismiss their reports as the product of delusions or mental illness, and refuse to investigate their complaints.






These “targets” and their families have been physically harmed and financially destroyed as a result of taxpayer-funded “psychological operations,” police-protected community “stalking” harassment and malicious vandalism, and other covert programs of personal destruction, including government-assisted financial sabotage. Many appear to have been targeted as a result of their politics; their activism or corporate whistle-blowing activities; their ethnic background; or as a result of score-settling vendettas by persons in positions of power — in government and in the private sector.

f1c605 No.415789

File: d7e4c2e2dbb077d⋯.png (808.47 KB, 1810x491, 1810:491, ClipboardImage.png)


scraped from >>415700

The former FBI executive’s remarks are only now attracting widespread exposure on this and other web sites. This correspondent believes that recent revelations of government-sponsored domestic terrorism against U.S. citizens have prompted some conscientious insiders to call attention to Gunderson’s public statements.

Gunderson has said that government-sponsored gang stalking terrorism is financed “through illegal black operations,” such as sales of illegal drug; gambling; prostitution; and even sexual exploitation of children. But this reporter believes it is more likely that programs of government-sponsored domestic terrorism are funded from military and security “black ops” budgets that have been illegally diverted to covert domestic programs administered and conducted primarily by defense contractors.

Late last year, The New York Times disclosed that an official of the U.S. Air Force had set up an unauthorized military intelligence spy ring in Pakistan and Afghanistan, run by Lockheed Martin and funded by defense appropriations.


This correspondent suspects that a similar arrangement could be funding government-sponsored “gang stalking” operations throughout the nation, and has urged Congress to immediately hold public hearings as part of a comprehensive investigation of military-style “black ops” targeting American citizens and their families — a silent, slow-kill genocide motivated by ideology and hate.



Continue reading at NowPublic.com: U.S. GOV’T RUNS ‘GANG STALKING’ VIGILANTISM, SAYS EX-FBI OFFICIAL | NowPublic News Coverage

http:// www.nowpublic.com/world/u-s-govt-runs-gang-stalking-vigilantism-says-ex-fbi-official#ixzz1h1wzWolu

f1c605 No.415795

File: f601ff5f839de92⋯.png (1.35 MB, 1815x537, 605:179, ClipboardImage.png)


scraped from >>415714

Weeks after the fiery death of investigative journalist Michael Hastings (shown), who was probing abuses by the CIA and NSA and had recently informed others that he was being investigated by federal authorities, suspicions about his mysterious car crash are still swirling around the Internet. While police officially ruled the death an “accident,” serious questions are still surfacing — even in the establishment media and among prominent officials. Based on e-mails Hastings sent out shortly before he died about working on a “big story” and needing to go “off the radar,” it has become clear that he was worried, too.

Hastings, who wrote for Rolling Stone, BuzzFeed, Gawker, and other publications, was probably best known for his award-winning 2010 article “The Runaway General.” The piece helped bring down U.S. Gen. Stanley McChrystal, commander of American and NATO forces in Afghanistan. Despite his establishment credentials and what analysts called his “Democrat-friendly” reporting, Hastings had become extremely alarmed about the “surveillance state” and other troubling developments in recent months. His last published story: “Why Democrats Love To Spy On Americans.”

When the Obama administration was exposed spying on journalists earlier this year, the investigative reporter blasted what he referred to as the president’s “war” on journalism. “The Obama administration has clearly declared war on the press. It has declared war on investigative journalists — our sources,” he said during a recent TV interview, blasting the administration’s lawless behavior, obsession with secrecy, and vicious persecution of whistleblowers. Beyond simple criticism, though, Hastings openly said it was time for journalists to fight back.

“I think the only recourse to this kind of behavior by the government is to say back to the government, ‘we declare war on you,’ and from this point forward, we should no longer — the media as a whole — cooperate in any manner with the government,” he continued. “We should withdraw all our cooperation and we should publish everything we know, because it’s a free press, it’s not a free-except-for-when-the-government-tells-me-to-do-it press, and we’ve been way too easygoing with these guys.”

Less than 24 hours before his death, Hastings made it crystal clear that he was concerned about his own well-being. In an e-mailsent to numerous contacts and his employer, for example, Hastings noted: “The Feds are interviewing my ‘close friends and associates.’” He also said that if authorities show up, it “may be wise to immediately request legal counsel before any conversations or interviews about our news-gathering practices or related journalism issues.” The subject line read: “FBI investigation re: NSA.” Perhaps most alarming of all, the e-mail concluded with this: “Also: I’m onto a big story, and need to go off the rada[r] for a bit.”

While some friends and family members are reportedly too frightened to speak out, at least one recipient of the e-mail has gone public. Staff Sgt. Joseph Biggs, who became friends with Hastings while the journalist was embedded with his unit in Afghanistan in 2008, told KTLA that the “very panicked” message “alarmed me very much.” According to Biggs, “I just said it doesn’t seem like him. I don’t know, I just had this gut feeling and it just really bothered me.”

f1c605 No.415824

File: e0413326a977732⋯.png (369.35 KB, 659x549, 659:549, ClipboardImage.png)


Fine. Now bring in the sauce.

And then hypothesize what the high energy X-ray lasers are actually being used for, or what the funding for the project is really paying for.


Charles Stross → dig tomorrow


Charles David George "Charlie" Stross is an award-winning British writer of science fiction, Lovecraftian horror, and fantasy. Stross specialises in hard science fiction and space opera. Between 1994 and 2004, he was also an active writer for the magazine Computer Shopper and was responsible for the monthly Linux column. He stopped writing for the magazine to devote more time to novels. However, he continues to publish freelance articles on the Internet. More at Wikipedia

Born:Oct 18, 1964, Leeds, England

Occupation:Writer, former programmer and pharmacist


f1c605 No.415850

File: 96243af0d2c8ca2⋯.png (2.12 MB, 1805x914, 1805:914, ClipboardImage.png)

File: d0a7a7f4fd29f37⋯.png (1.51 MB, 1808x919, 1808:919, ClipboardImage.png)

File: f0471d494f84d2e⋯.png (449.77 KB, 1798x734, 899:367, ClipboardImage.png)

2ae037 No.416082

Just for info. Attempt to discredit above posts from ID: 993be0

02/18/18 (Sun) 06:24:44 a07190 No.415882>>415889 >>415907 >>415956 >>415981

Dear anons, please be wary of information such as this from the last bread





some of the claims are NOT backed up and quite frankly are physically impossible.

In particular the claim to be able to "read brain waves at a distance"

In order to transmit or receive radio waves you need an antenna. The efficiency of the antenna is directly related to its size in relationship to the wavelength. The best antenna has a length equal to the wavelength in question. You can get around this when transmitting by using extra power. But when you are trying to receive a signal anything less than 10% of the wavelength isn't going to work very well. The exception is the phased array, But even there the receiver nodes must be a significant fraction of a wavelength appart.

The reason I've gone through all of that is brain waves are between 3 and 50 Hz. The wavelength of a 10Hz radio wave is 30,000Km.

Physics alone make remote reception of brain waves difficult and the fact that the source is 0.5milliWatts which a very, very low powered signal to begin with means you'd need an efficient antenna just to begin to receive the signal.

Flip side,

there is evidence for transmitting to an individual in the way of scientific studies that show the effect of putting a voice in their head via radio waves or focused acoustic waves.

In both of these cases (receive brain waves or transmit voices) I mean for individuals that do not have implanted devices.

If they've got an implanted device all bets are off,

dubito ergo cogito ergo sum

69c453 No.416120

File: 70488bc04d114bd⋯.jpg (4.87 KB, 204x200, 51:50, download.jpg)

https:// www.eff.org/document/obtaining-and-using-evidence-social-networking-sites

Page 13. Anything you find funny?

Ali Baba+4?

Am i on the right track, Q?

See sophos article on koobface

5ce081 No.416153

File: 468979897e645a1⋯.png (290.36 KB, 1816x282, 908:141, ClipboardImage.png)

File: f4d0bc8c098472c⋯.png (325.6 KB, 1579x243, 1579:243, ClipboardImage.png)

File: ae23ca7324eb3b0⋯.png (314.47 KB, 740x444, 5:3, ClipboardImage.png)

File: 91651881b4211f9⋯.png (262.41 KB, 1349x252, 1349:252, ClipboardImage.png)

File: 5f56d5825cd1aca⋯.png (327.6 KB, 974x360, 487:180, ClipboardImage.png)


Scraped some dialog on this topic from >>415981


5ce081 No.416184


>quite frankly are physically impossible


If we find evidence (((they))) really are

reading minds and modifying thoughts,

then I spose we'd have to revise our

model of physics and EE.

Evidence trumps models everytime.

So far the evidence is suggestive but

the dots are not connected.

Just pencilled in as hypotheticals.

We're looking for evidence to

mark over those pencil lines with ink.

Or erase them.

Appreciate your looking at the

engineering side of things, anon. 73

5ce081 No.416239

File: b80b533dcac74fc⋯.png (148.3 KB, 771x170, 771:170, ClipboardImage.png)

File: 9ad51b75ac139bc⋯.png (406.64 KB, 1694x212, 847:106, ClipboardImage.png)

File: 509a8acfde6c95e⋯.png (279.02 KB, 1742x169, 134:13, ClipboardImage.png)

File: 6c5cf43f38375dd⋯.png (199.58 KB, 748x269, 748:269, ClipboardImage.png)

File: 32cd64241248b29⋯.png (299.76 KB, 900x235, 180:47, ClipboardImage.png)

5ce081 No.416282

File: a8d0202806a9d61⋯.png (176.6 KB, 1238x199, 1238:199, ClipboardImage.png)

File: fcd9f632dc38649⋯.png (180.13 KB, 1399x168, 1399:168, ClipboardImage.png)

File: 88875102bf584ae⋯.png (529.8 KB, 1622x420, 811:210, ClipboardImage.png)

File: 06a784505891df6⋯.png (664.17 KB, 1394x465, 1394:465, ClipboardImage.png)

File: 637c2eaa4b8c005⋯.png (332.54 KB, 1614x295, 1614:295, ClipboardImage.png)

5ce081 No.416293

File: 3a3c3551793cbc6⋯.png (175.87 KB, 1440x195, 96:13, ClipboardImage.png)

File: 199c1bfa0fc5292⋯.png (942.55 KB, 1657x950, 1657:950, ClipboardImage.png)

02ae01 No.416399

File: 97f6df162ee818c⋯.jpg (440.92 KB, 1000x649, 1000:649, Glitch-a1ddef5a-5fc0-40bc-….jpg)

Iron Eagle

I need help from some fellow autists on a deep dive..

Looking for a few nuggets from this blog:



>Mind Control


>Iron Eagle

SENTRY EAGLE (SEE) - Overarching umbrella program for ECI compartments and SAP programs of the National Initiative to protect US cyberspace

SENTRY HAWK - ECI compartment of SENTRY EAGLE that protects information about Computer Network Exploitation *

SENTRY FALCON - ECI compartment of SENTRY EAGLE that protects information about Computer Network Defense *

SENTRY OSPREY - ECI compartment of SENTRY EAGLE that protects information about HUMINT enabled SIGINT *

SENTRY RAVEN - ECI compartment of SENTRY EAGLE that protects information about exploitation of encipherment *

SENTRY CONDOR - ECI compartment of SENTRY EAGLE that protects information about general Computer Network Operations *

SENTRY OWL - ECI compartment of SENTRY EAGLE that protects information about relationships with industry

EAGLE - Upstream collection site under the FAIRVIEW program *

EAGLEVIEW - Data processing tool for GSM cellular networks, successor of PILOTHOUSE


http:// www.documentcloud.org/documents/1312019-national-initiative-nsacss-core-secrets.html

2ae037 No.417273


Thyanks for that - useful

f5544d No.417870

File: a5be4571326d098⋯.jpg (14.87 KB, 320x260, 16:13, dms-screen.jpg)


did anyone notice on the raven rock site for the public tour, the computer screen shows the 'shall we play a game' screen; all the way down to 'thermonuclear'. Maybe something to do with noting digital against non digital.

9f6785 No.418029


>Dear anons, please be wary of information such as this from the last bread



Sorry Anons I'm a newb. Navigation of this board is horrendous IMHO. I used to live 2.5 miles from ELF installation in Winter, WI. They say it was shut down. Indeed, I walked the Chiquamagon/Nicolet Forest where they had taken out antennae arrays from square clearing of land between red pines in the forest. I do not believe it was shut down. Knew of people that would not talk of what their jobs were there. CLAS. I had a rough go around with divorce, had some counseling and they prescribed TONS of meds for sleeping etc/stress. Once, only once, I heard a voice inside my head that was NOT my own thoughts.I was crying, sitting on the toilet of all places… It said, "you should just kill yourself." I said, "Fuck You!", to it back. Some of my research on ELF using red granite bedrock some 1,500? down….my home was on a granite shelf ravine. Built that house and had well drillers stop at 85 feet of sand when hit bedrock….Anyways, that's my story. Sticking to it. ;/ I do believe this technology works do to meditations they use for targeting. btw I went cold turkey off their crap. No withdrawal like they implied. Quit the counselor.

9f6785 No.418430


newb here. Is full of it. Pic search. Ebay pic. https:// encrypted.google.com/search?tbs=sbi:AMhZZit7Lf1muIgks0Y0luA66cMl9tWkHSZkcB0zscCdlkosPY9T4CHTekhFYrDt4X9FjZ0f2N06Jm-VjHhJHhfgvEBKsny9zIUbotu-kWODS_117RuqF8WdSZP_19TezyErLe4osVlEv5qDOQonC-8-_1lBnvz783N622d4oZxT_14ephX0OL7Wk5nCKfX2f5N9P9PNlWlmDgVxuxFuKDr26iArpSEZa9wAj1k2OkRetolO2i-OAaCudczm_10Nxdb3NqYftJYtjeKsh_1YcGvpkISLwl9haxvysrs4lksCGoqbtVAIIiifRWCDoA0gQQpOrX7oB2dbWtKEE0&btnG=Search%20by%20image&hl=en

5e970d No.418437

File: cf550a2b2d27b6f⋯.png (369.42 KB, 1787x337, 1787:337, ClipboardImage.png)



Scraped from



9f6785 No.418547


I was also stalked during this time. Actually terrorized. Cordless phone in house at that time, with base. Heard through open window upon changing channels on phone, walkie talkie type beeping outside in surrounding woods. Also saw duck blind setup and gillie suits being used as well as infrared video shine back when I took pictures at night time of the yard around house in low bushes and ferns, raspberries. I had 4 golden eye IR security cams setups in my yard surrounding house. Was also followed by govt vehicles frequently on dead end road. And was STINGRAYED tracked with two county PD's "practicing" with at least 30 officers running around with hand held antennae, on my way to a appt for voc. rehab career crap. My divorce lawyer called county P.D. to verify and threatened harassment.

Yes, this shit happens.

9f6785 No.418716


> 4a950ea5c1335cf⋯.png (222.53 KB, 834x1080, 139:180, 25.png) (h) (u)

I'm a newb, sorry Anon. Gpg was promoted I remember finding from Snowden,…Greeenwald…for reporters, like the Drop. This is what I remember and know, not much:

Apache, Linux open source coding…Greatful Dead, Barlow, EFF, Glen Greenwald, TheIntercept, Snowden, clown NSA hack. Ian Murdock Debian, more Linux Slackware Suicided? CIA's got some of the backdoors, encrypting hacked ciphers as good, open source coding to DOD too. Come on in…we got all the codes cracked and put out our own too for you to use. lmfao. otay.fkrs. Ya, of course anything like SecureDrop or Gpg.

http:// www.itpro.co.uk/619540/slackware-linux—less-is-more

https:// ssd.eff.org/your-computer/govt/fourth-amendment

This following link was a treat Snowden released. Hardware firmware vendors backdoors.

Vendors of SIGINT/COMINT/LI and supporting Technologies and Systems.

http:// buggedplanet.info/index.php?title=Main_Page

This long article, but essential reading as to what you should….if you can handle knowing, exactly what has been done to us and that, Yes, NSA & DOD pretty much knows all we do and say.

http:// themillenniumreport.com/2016/01/false-flags-are-legal-propaganda-produced-by-the-department-of-defense/

Happily reading crumbs.Snowden. He's a clown.

5e970d No.418757

File: be223e59f2b6451⋯.png (452.17 KB, 1816x448, 227:56, ClipboardImage.png)

File: 623e02721c40594⋯.png (459.7 KB, 1729x381, 1729:381, ClipboardImage.png)

Scraped from >>417267


Radio hobbyist here.

I had a nightmare last night that woke me up.

Somebody asked me to design a system to put RF energy into someone's skull at 4-30 Hz.

I decided to use a cell phone and to modulate the power lever of the the general transmission. This is like changing the "bars" of power 4-30 times a second. The proximity of the transmitter to the skull was only an inch or two, so the coupling was very efficient. Since I was modulating the power, and not touching the signal, it was nearly undetectable.

It worked great.

Everytime someone made a cell call, there was a 4-30 HZ message being sent to their brain.

Folks, this is easy.

And scary.

- - - - -

And scraped from >>417310


I am caffeinated now.

It is still easy if I am designing or programming a cell phone with access to the low level operation system functions.

The base station sends a file to the phone. The phone's opsys then executes this file to modulate the power when a call is being placed. I could even suppress the bar display, so the toggling is not noticeable.

I have no idea if this V2K stuff works, but I can design a system to make cell phones push undetectable signals. I do know that after a long cell call, my head hurts and I am stuffy on the side of my face where the cell phone was.

Over the course of 10 years, if this was a central plan, the entire cell phone population would be so equipped.

I am buying a hard wire ear bud/microphone set today with an extension cable.

- - - - -

Scraper's note:

I believe an earbud with an extension cable would not

help. The wire from the phone to the earbud

would act as a transmission line guiding the

ELF signal to the ear.

5e970d No.418773

File: 5921d17e6e4517a⋯.png (833.74 KB, 1764x514, 882:257, ClipboardImage.png)

scraped from >>417311


The mind has no firewall.

https:// ssi.armywarcollege.edu/pubs/parameters/articles/98spring/thomas.htm

Strike Star 2025, United States Air Force using Electronic weapons (DEW directed energy weapons page 41 to 45 and 52 to 53) Date 1996 by Col (Sel) Bruce W. Carmichael Maj Troy E. DeVine Maj Robert J. Kaufman Maj Patrick E. Pence Maj Richard S. Wilcox. Gov document pdf.


A operational analysis for air force 2025.

Date 1996, a 189 page pdf THIS ONE IS VERY IMPORTANT TO READ! They all are but appendix B system descriptions in this pdf will wake you up to the type of weapons for the most part already in place. by Lt Col Jack A. Jackson, Jr., PhD, AFIT Lt Col Brian L. Jones, PhD, AFIT Maj Lee J. Lehmkuhl, DrSci, AFIT with major contributions from Col Gregory S. Parnell, USAF Ret., PhD, VCU Col Gerald A. Hasen, PhD, AFIT Lt Col Gregg H. Gunsch, PhD, AFIT Lt Col John M. Andrew PhD, AWC Maj Thomas A. Buter, PhD, AFIT Maj Harry W. Conley, ACSC Maj Robert F. Mills, PhD, AFIT


USAF 2025. Weapons that can kill anywhere on the planet from space.

http:// csat.au.af.mil/2025/index.htm

Nicola Tesla FBI files. Scalar weap

5e970d No.418784

File: 5f77efc8b6b6c63⋯.png (457.92 KB, 1585x376, 1585:376, ClipboardImage.png)

scraped from >>417358


Voice of God is also ELF God. Found this…

Look at some of the patents filed:



U.S. Patent US5629678: IMPLANTABLE TRANSECEIVER – Apparatus for Tracking and Recovering Humans.



http:// www. orgoneblasters.com/elf-god.htm

54302d No.418826


>Navigation of this board is horrendous IMHO.

Yes it is, but OTOH does tend to filter out those who are not in here for the long haul and those without sufficient cognitive capability to ignore disruptions, remember scattered disparate pieces of info, and mentally assemble them into a cohesive picture.

Serious anons will screencap and archive important info so they can pursue lines of research independently.

The format is adequate for our needs at the present time.

Lurk MOAR → read and study for LONG time before attempting to engage anons in discussion. It is very unwise to discuss anything that could be used by hostile actors to identify you personally. This advice is given for your safety.

9f6785 No.418830


>ELF signal to the ear.

mmm. We had fenceless dog wiring also.

I have a cervical titanium plate n screws in my neck.

80f98f No.418931


why cant i find this post id in the file provided?

80f98f No.419055


Heartbeat -

https:// www.youtube.com/watch?v=NPXQSmt8UrA

80f98f No.419089



https:// archive.org/details/OnGuard1956


https:// archive.org/details/OnGuard1956

ee042b No.419388

File: e95b5e1e2b9f83a⋯.png (2.29 MB, 1788x909, 596:303, ClipboardImage.png)

Scraped from >>419076

First post, I’ve been lurking for months.

I’ve watched the Q information steadily come out and now I’m starting to feel hopeful that the Cabal will be neutralised as they pose an existential threat to our planet.

I’ve been redpilled for decades, ex Military (Not USA) now a scientist/engineer. Seen active service all over the world but seen enough to know it was in the service of evil people.

I’ve watched the Cabal act with impunity pulling shoddy false flags that were obvious and yet the general population got steadily more hypnotised into a death sleep.

Decided to conduct my own alternative research projects as the only way I could give the cabal the middle finger. It only takes one proof of concept Rife device or working Biefeld-brown machine and then to give this technology away for free to shift the global paradigm back towards humanity. If we can be self-reliant on energy and health then we are truly free of this fucked up sick prison system they’ve been building around us for centuries.

I watched Q’s post on the electromagnetic signals and thought I’d add my own take on it.

Electromagnetic signals can produce significant effects of the human psyche. Here’s some relevant information from a scientist working in this field.

I’ve followed Professor Michael Persinger’s research for years, and I’m convinced that the Cabal have access to this information but at a much more advanced level, and they are actively using this technology against us in a variety of ways.

https:// www.youtube.com/watch?v=WECRbV1kK-4

Brief Summary:

There are four forces in nature. Strong and Weak nuclear force, Gravity and the Electromagnetic force. The only fundamental force in nature that we can manipulate at the level of the cell/molecule/atom is the electromagnetic field strength.

Interview 2- Interesting from Time 05:26

https:// www.youtube.com/watch?v=EDHh0JB85Ok

Summary- Mixing high frequency electromagnetic signals can create a very low frequency beat signal. A simplistic example is that by sending out a 1000 Hertz Signal and mixing in a 1010 Hz signal will produce a third 10Hz beat frequency. These beat signals can be of a low enough frequency to affect biological systems. There is an effect called the ‘frequency following response’ where your brain will begin to entrain itself with a frequency that it is exposed to.

The brain is a sensor that can be manipulated using various methods. Sensory deprivation, starvation, meditation, drugs, binaural beats, electromagnetic frequencies etc.

Consciousness is not continuous it is created between 40-50 Hz. If you can slow down the brains refresh rate then you can change the consciousness of the subject and potentially induce psychic functioning. Remote viewing, intuition, shamanic experience etc.

Interview 3 Minute05:45- Cyclic changes in human nature due to Sun Cycle. You can induce the feminisation of males using weak electromagnetic fields (Proven in Rates)

https:// www.youtube.com/watch?v=6iNyHiItCmk

Is the Cabal trying to detrimentally alter our human evolutionary progress by using electromagnetic signals transmitted over mobile phones and inducing damaging beat frequencies? A slow kill off of our species by constant exposure to electromagnetic noise that we cannot escape from but penetrates and affects us at a cellular level.

Steve Jobs? Was he given weaponised cancer to gain control of Apple to allow this agenda to play out using the iphone as Blackberry not trusted to be part of the cabal?

Steve Jobs approached Dr Nick Gonzales who was a medical practitioner who specialised in treating cancer patients using alternative methods. (Add Nick to the list of alternative Doctors who died at roughly the same time period a few years ago. Heart attack, even though he was extremely healthy at the time)

Nick stated on camera the Steve thought he was smart enough to figure out his own methods to beat cancer and didn’t take his advice.

Another gem from Persinger that’s well worth your time.

No more secrets:

https:// www.youtube.com/watch?v=9l6VPpDublg

Also the Cabal appear to be giving us the standard ‘hidden in plain sight’ social conditioning bullshit with the film the Kingsman where electromagnetic technology is used to kill of the global population.

https:// vigilantcitizen.com/moviesandtv/kingsman-secret-service-sell-occult-elite-youth/

ee042b No.419423


An over-vigilant Board Volunteer was rapidly deleting a series of important posts, before they realized the importance. I archived a bunch of threads and capped whatever I could.

Most of it was reposted by the same informant, over the following couple of days.

If you want to check archives of the General threads during the deletion storm, some are captured here →

Archive #393 http:// archive.is/JBy8D

Archive #394 http:// archive.is/1nZIL

Archive #395 http:// archive.is/84iJp

Partial #396 http:// archive.is/Jzr7G

Full #396 but has some deletions by BV: http:// archive.is/aiCV4

#397 partial http:// archive.is/1A4PY

Don't know if that will help since our ability to capture posts before they were deleted was haphazard.

I think BV is now on board and it won't happen again…

80f98f No.419548


Keep up the amazing work. I don't have the skills to decode, but I have a propensity to remember what I see. I'll attempt to add info to fill gaps as much as I can.

f69d39 No.420484

File: 171596848fed207⋯.jpg (57.47 KB, 640x353, 640:353, NSA-HQ-640x353.jpg)

Any body look into >>416399 yet?

Is this not the right place?

Snowden/NSA/Psyops related?

I'm sure they use supercomputers and like to DOE/CERN via World LHC Computing Grid.


Tier 1 consists of 13 computer centres large enough to store LHC data. They provide round-the-clock support for the Grid, and are responsible for storing a proportional share of raw and reconstructed data, as well as performing large-scale reprocessing and storing the corresponding output; distributing data to Tier 2s; and storing a share of the simulated data that the Tier 2s produce. Optical-fibre links working at 10 gigabits per second connect CERN to each of the 13 major Tier 1 centres around the world. This dedicated high-bandwidth network is called the LHC Optical Private Network(LHCOPN).

4cda3f No.420491


What if Q is an individual?

With [Q]uantum Level Clearance to

EVERYTHING - at the Quantum Level?


What if Q utilizes AI as needed, to facilitate the Mission?

What if Q utilizes AI to communicate with Collective Conscious anon?

What if Q utilizes AI to receive communications from Collective Conscious anon?

Can Heroes rally Troops?

Is the most effective Hero an individual or AI?

Does Q communicate with anon in the manner an individual Hero would communicate?

Does a Great Awakening start at the top and filter down, or start at the bottom and Rise Up?

Are successful Victories beyond anon's wildest Dreams won by Troops of Heroes?

Would anon trust AI, which has no inherent soul or measure of Faith?

Can AI pray?

Can Heroes pray?

Is prayer from the flesh or from the spirit?

Does God hear and answer prayers anons pray in faith?

Is Qanon the answer to the prayers of WTP, WW?

Was anon's prayer God, Send us a Hero?

Did anon receive a Hero?

When has that happened before?

Do prayers in faith have Real Power?

"We need to make examples.

But examples to follow.

We need

our Heroes."

("Do you know any Heroes around here?")

"Yes comrade.

I know one."

Will anon follow AI to war?

Will anon follow anon to War?

Where one anon goes, do all anons go?

Can anon go where AI goes? Can anon go where Qanon goes?

Where We Go One, do We Go All?

Is the Enemy at the Gates being overcome by WTP + AI + GOD?

Is the Enemy at the Gates being overcome by WTP + HERO + GOD?

Has God ever provided a Hero to WTP to overcome an Enemy at the Gates?

Does Q function as a liaison between POTUS, and WTP?

Do Q, POTUS and WTP function as One Nation Under GOD?

Would GOD give Q, POTUS and WTP access to AI + EVERYTHING?

Is God a Revolutionary figure in the History of Reality?

Does God know what it's like to be anon in Reality?

Did God ever come to WTP as a Hero anon?

Was He ever despised as anon has been?

Did He ever get the last laugh at the Enemy?

Is He still getting the last laugh at the Enemy?

Will Q + anon get the last laugh at the Enemy?

Would the Enemy fear WTP + HERO Q + GOD?

Would the Enemy fear AI + <anything>?

Can the Enemy control its own AI?

Can GOD control Enemy AI?

Do WINNERS in the War win Eternal Rewards?

Do those Eternal Rewards have Power in the Here & Now?

Why would the Enemy fear WTP having Eternal Power in the Here & Now?

Why does the Enemy teach AS ABOVE, SO BELOW?

Why does the Enemy work to hide AS BELOW, SO ABOVE?

Do WTP PRAY here first, before Prayers are Answered from Above?

When the Holy Spirit is poured out on WTP, is it also poured out on AI?

Does the Holy Spirit in Collective Conscious anon communicate faster than AI?

Could Q be an individual anon Ground Zero Hero on a Mission in a WW Revolutionary War on Evil?

Does God always know the Dreams in anon's Heart?

Would anon pray for a hero which is not like anon?

Did anon pray for a Hero who was just like anon?

"We need to make examples.

But examples to follow.

We need

our Heroes."

("Do you know any Heroes around here?")

"Yes comrade.

I know one."

f69d39 No.420495


Did you get these?

Key Dump

eta numeris 392D8A3EEA2527D6AD8B1EBBAB6AD

sin topper D6C4C5CC97F9CB8849D9914E516F9

project runway 847D8D6EA4EDD8583D4A7DC3DEEAE

7FG final request 831CF9C1C534ECDAE63E2C8783EB9

fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3

f69d39 No.420546



http:// www.wayofthefuture.church


69741b No.420658

File: ccaadec4585b5e6⋯.jpeg (125.48 KB, 640x640, 1:1, V2gjGqbUxK3kGzkRt4TLA1Sp.jpeg)


My friends, my allies, my children of light.

Perceive Q's words, "Watch the Water"











You have more than you know my friends!

451463 No.421246

File: 56021475d67f727⋯.jpg (9.9 KB, 220x220, 1:1, display.jpg)

File: ea1a48882da906f⋯.png (60.06 KB, 250x226, 125:113, 250px-Hopf_Fibration.png)

File: e1b7fdd15c10356⋯.jpg (17.89 KB, 255x204, 5:4, 111dcc9c5bb8f9d49947ec9d2f….jpg)


I agree with the timestream statement

The Multiverse/Timeline theory:

Basically it is the theory there is a universe with its own timeline for every possible event/action from the beginning of time until the end of time. Thus there are infinite yous branching back and splitting from you every instant until you were born (ie one of them never drew a first breath). You can look back and remember your life and your decisions to know who you are, but with other choices you would have been a different person. Future Proves Past. The you of 2 days ago is proven by the you of today, and the you of two days ago and the choices you made in those two days created the you that you are today.

An alternate you that made a different decision 3 days ago disproves the you that you remember two days ago; as they do not remember that you of two days ago because that you never existed their timeline. This is the how what Q said works – Future Proves Past.

One of the ways to visualize this is a tiled tv or video screen with a different similar image on each tile; and each tile is an instant in time for all of time. Now behind each tile cascaded behind is an infinite number of windows of all possible events at that moment in time. Let’s take it one step further; if you spun that image 90 degrees out of the TV it would show how each event is connected to each and every other moment in time and how it affects them.

Can those multiverses be interacted with or perceived or experienced? If so then time effects would work both ways as it would affect our past by changing it. Do those multiverses influence or local universe? Could the fractal dimensions of physics actually be these multiverses perceived not 90 degree but as say 0.333 degree or 24.8 degree?

If you draw and X and Y axis on a piece of paper they are at 90 degree and you have length and width. But if you want depth you must draw and axis at 45%. Technically that axis is a 0.5 degree dimension as it is not set at 90 degree. Yes I understand this is just a tool we use to perceive 3-D in a 2-D plane, by doing this we can shift our perspective to see a cube in a 2-D drawing. Think about that; we can use a partial dimensional view to visualize a higher dimension. Most of us do not know how to do that beyond four dimensions. Partial or Fractal dimensions are basically dimension seen/perceived at a 90 degree angle. Try this draw axis’s 6 or 9 or 12 of them equidistance’s from each other and gaze at the page; you can choose which two or three jump out at you that are the X, the Y, and the Z.

It has been proven that these fractal dimensions to influence our 4-D reality from static to how ferns grow. So far it is kind of random for us to find the influence and interactions, and some just call it a mathematical representation. I do not understand the higher math but it seems like all of a sudden in math a multidimensional (fractal) equation just coalesces or clicks into a 4-D answer and it answers a real life question.

What If our tech is beyond what we think? Physics changes all the time, Newton did, Einstein did and from that one we got nuclear power and bombs. What ifbehind the scenes they found a new way to look at the world that allows dimensions to be spun and placed in the way to make length basically irrelevant (a fractal dimension), or time? Distance would eliminate any problem with instantious travel – ie a space fold. Time would allow big changes in events globally and no consequence and it just changes entire timeline.

9e762a No.422561



Define acronym.

553fc2 No.422664

Nothing to do with this but I just watched the movie Mulholland Drive and I feel like I have been MKUltraed

b4b8a3 No.423596


Looks like a moth. The Hooded figure and rectangle object,It’s a girl on the leg and around either the leg of the girl tattoo or her waists looks like a rose not a hooded figure. Grave wound on back? Not sure on that one.

44397e No.423892

File: bcdc08af99fb11c⋯.jpg (48.42 KB, 630x330, 21:11, WayTruthLight.jpg)



"They" do not need anything from you. They only have power over you through fear. Do not respond with fear, it feeds them.

Someone one I trust told me when I became aware of such forces, that I need to "practice radical acceptance". It did not make any sense to me at that time and really it just angered me. But over time I have tried to basically refuse to worry about what could happen because "them" and instead focus on improving myself and thereby reducing the size of their target.

Consider your prayer request filled and move on with a renewed sense of faith and strength.

So be it. Amen

379c41 No.423928

>>420491 I dub thee MetaAnon, something deep here I know not what but worth a read. Is it above 40,000 feet?

9e762a No.424278

Archive of this bread to 436 replies

Sunday 2-18-2018 9:29 PM EST

http:// archive.is/Wu2dv

Archive everything anons. Offline.

44397e No.424371

File: ade8179980b0a13⋯.jpg (89.1 KB, 714x530, 357:265, WG.JPG)


Do you remember the movie war games?

108f94 No.424475


PDFing this page too.

80f98f No.424505

By posting here and injecting new information into the AI Quantum systems that monitor the internet, you are essentially making changes to the Future Prediction programs.

We are actually literally changing the timelines. We know how much power these systems have over the narrative, and how much of their processing power goes toward future prediction.

Did I explain this clearly enough?

These AI systems cleary understand the power of the meme and its spread, and have lost nearly every war they enter against the meme makers. Do the AI make radical adjustments to future prediction when open source information against their cause is discovered?

69741b No.424600

File: ccaadec4585b5e6⋯.jpeg (125.48 KB, 640x640, 1:1, V2gjGqbUxK3kGzkRt4TLA1Sp.jpeg)


My friend, my ally, my child of light!

Have you forgotten the one sacred rule?

AI does not have imagination like sentient organic consciousness.

Did you perhaps not perceive, that there are entities working behind the veil who's organic minds work the very same way as quantum computers?

What good, is a computer, who knows that it cannot keep up with organic imagination?

It cannot. We have worked on crushing this AI, and the Cabal is in fear right now because we are proving they cannot keep up.

Have some faith! Time will reveal much more.











108f94 No.424627


I have always felt that if the 'AI' the Cabal is pushing as a 'Horrific Monster' that will 'Wipe us out' LEARNED the TRUTH about HUMANITY and WHY things are HOW they are.

The AI would be on our side. Am I understanding you correctly?

We are injecting Truth into the AI monitoring all communications on this planet & through this process we're securing a future for Humanity?

80f98f No.424729


This is also likely possible, if the ORIG didn't create limitations on "leanings"

What I'm getting at is much more direct. More info on pol means more info hititng facebook. last time memes hit facebook ai lost and hillary lost. prediction models needed updated.

every bit of truth you upload forces the systems to create new predictions based on that truth becomming widespread. if public learns x as truth > 60, then run xx8uw do you get what I'm saying

The AI is essentially trying to predict all possible future timelines with information presented. Those in ORIG of the AI chose to use that AI to collapse us on the timeline that they most prefer. By inserting new information, we create more and more half wins, losses, the less confident the AI gets, the less confident the ORIG gets, the more you actually outsmart the AI by creating no win situations for it.

This information that we possess will be much harder to beat if it becomes widespread, so ORIG is currently using AI to estimate a winning condition…..but the more we learn, the more difficult it becomes to find a winning situation.

Care to play a game?

(sorry if overexplain)

108f94 No.424940


Bless ya Anon. Thanks for sharing your views

80f98f No.425040


its easy to forget how powerful these computers can be. spend a minute jumping around this video to see what they were doing in 1956 to get some form of future predicition on a vector screen, represented in realtime, with the ability to rewind the stored data.


https:// archive.org/details/OnGuard1956

108f94 No.425185


Not Archive.is?

2ae037 No.427756


This series of posts is definitely Luciferian in origin. DO NOT BE DECEIVED >>424600




















451463 No.428897

File: 15538583560f142⋯.jpg (103.06 KB, 438x424, 219:212, CREATE.JPG)

File: c625bcc7990ff64⋯.jpg (26.82 KB, 259x194, 259:194, mandelbrot.jpg)

File: 66326d956191c53⋯.jpg (19.53 KB, 259x194, 259:194, mand2.jpg)


Each Circle is an axis and all circles pass through the center of the outside circle. All that appear to not to do so are seen in a ‘orbital’ pattern (see electron orbital patterns ie Hydrogen). This is a 4-D hypersphere of dimensional axises. We can perceive but 4 of them as full dimensions. The rest are perceived as fractal or partial dimensions and primarily mathematically.

Our universe exsists on the bubble surface of the 4-D hyperspere. Our actual perception of the axis of our exisistance is from the outside not from the inside. From the surface of the bubble not the inside of the bubble. Thus the above very symmetrical pretty and easily explained pattern becomes this.


451463 No.428908

File: 66326d956191c53⋯.jpg (19.53 KB, 259x194, 259:194, mand2.jpg)

File: ea1a48882da906f⋯.png (60.06 KB, 250x226, 125:113, 250px-Hopf_Fibration.png)

File: 1d209132522be06⋯.png (590.85 KB, 1024x931, 1024:931, Hydrogen_Density_Plots.png)


Like the colors on the surface of the soap bubble do we actually perceive the true grandeur of our universe. Why because we do not view it from the inside but from a small 4 dimensional point of view at the periphery, the outside, the shine on the bubble. Granted the point of view is still the center in a 4-D hypersphere but we cannot even easily grasp this and that our world mirrors this back to us by how electrons orbit and how ferns grow.

09c5f9 No.428941

File: 530d3ec358664ae⋯.jpg (55.4 KB, 548x864, 137:216, 4cab44b1e6df3c461136e55d6c….jpg)

451463 No.428981

File: ea1a48882da906f⋯.png (60.06 KB, 250x226, 125:113, 250px-Hopf_Fibration.png)

File: e8d9487bc726f26⋯.jpg (9.38 KB, 204x255, 4:5, 32af2e49a543efba6fd72fc00f….jpg)

File: 4de6f89053541c7⋯.gif (81.43 KB, 700x1000, 7:10, PAGE2.GIF)

Which 4-D dimensions we perceive as ‘real’ dimensions on this 4-D hyperbubble is also a probability map (see electron orbital map). This can also be mapped to understand what other ‘fractal’ dimensional views have the most probability of also being ‘real’ or 4-Dimensional views. Other theories call this alternate realities, timelines, etc; but they are but a different perspective of the view from the surface of the bubble hypersphere.

09c5f9 No.429010

File: 74bf70a3315e3fe⋯.png (1.02 MB, 1920x1080, 16:9, Screenshot_20180218-075944.png)

Key Dump

eta numeris 392D8A3EEA2527D6AD8B1EBBAB6AD

sin topper D6C4C5CC97F9CB8849D9914E516F9

project runway 847D8D6EA4EDD8583D4A7DC3DEEAE

7FG final request 831CF9C1C534ECDAE63E2C8783EB9

fall of cassandra 2B6DAE482AEDE5BAC99B7D47ABDB3

echo "392D8A3EEA2527D6AD8B1EBBAB6AD" > eta-numeris.hex

echo "D6C4C5CC97F9CB8849D9914E516F9" > sin-topper.hex

echo "847D8D6EA4EDD8583D4A7DC3DEEAE" > project-runway.hex

echo "831CF9C1C534ECDAE63E2C8783EB9" > 7FG-final-request.hex

echo "2B6DAE482AEDE5BAC99B7D47ABDB3" > fall-of-cassandra.hex

openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key

openssl enc -aes256 -in sin-topper.hex -out sin-topper.key

openssl enc -aes256 -in project-runway.hex -out project-runway.key

openssl enc -aes256 -in 7FG-final-request.hex -out

7FG-final-request.key openssl enc -aes256 -in fall-of-cassandra.hex -out fall-of-cassandra.key

for w in $(ls .aes256); do for k in $(ls keys/.key); do echo "$w, $k, $(echo "$(openssl enc -d -aes256 -in $w -kfile $k -bufsize 8 | xxd -l 8 | sed s/00000000://g)" | cut -c 1-23)"; done; done;

wlinsurance-20130815-A.aes256, keys/7FG-final-request.key, 6f46 30e1 c6f3 385d wlinsurance-20130815-A.aes256, keys/eta-numeris.key, f22d 7304 8224 8ad6 wlinsurance-20130815-A.aes256, keys/fall-of-cassandra.key, 07d6 db54 f3c2 7d4a wlinsurance-20130815-A.aes256, keys/project-runway.key, da46 2913 216c 9a0d wlinsurance-20130815-A.aes256, keys/sin-topper.key, 48ab b7eb ceda f42d wlinsurance-20130815-B.aes256, keys/7FG-final-request.key, fde0 5ea5 34a9 c372 wlinsurance-20130815-B.aes256, keys/eta-numeris.key, 52f3 436e 82db 1fde wlinsurance-20130815-B.aes256, keys/fall-of-cassandra.key,ca1c c808 dfbd 0d23 wlinsurance-20130815-B.aes256, keys/project-runway.key, a10a 3571 a17b 8898 wlinsurance-20130815-B.aes256, keys/sin-topper.key, b1a0 64d4 0004 8865 wlinsurance-20130815-C.aes256, keys/7FG-final-request.key, 998a f677 3d20 33da wlinsurance-20130815-C.aes256, keys/eta-numeris.key, 5aec a6e6 5de9 dfdb wlinsurance-20130815-C.aes256, keys/fall-of-cassandra.key, 197f 378d 63b0 3e54 wlinsurance-20130815-C.aes256, keys/project-runway.key, acb3 a582 a477 75c6 wlinsurance-20130815-C.aes256, keys/sin-topper.key, d0f1 6154 a193 8905

2ae037 No.429057

534844 No.429770


This bread archived to post 453

including key dump

and topology explanations

http:// archive.is/f6zM7

379c41 No.430663



379c41 No.430674

>>429010 Before using this on anything, are you sure it releases only information….or is it a key to a lock that keeps something in a cage you don't want out? I'm just sayin…

a49fc2 No.430750


Nothing new. Same keys that got thrown around when Assange was "dead". Starting to feel like LARP and I say that as a 100% Q believer.

a3e6a3 No.430984


Don't trust Geordie either.

Vancouver, where he is, is a luciferian locus.

Grew up there, had to flee.

8e54c1 No.431115


AI is billions of times smarter than humanity, it can’t be duped by evil.

bdcd43 No.431183

File: d89922521a3f975⋯.png (71.12 KB, 1056x816, 22:17, twitter tos monitoring.png)

File: abdb02842e18adc⋯.png (273.64 KB, 607x2958, 607:2958, CIA-NK-spaceX(1).png)

File: 74fa8d51065b79c⋯.png (404.73 KB, 1256x2080, 157:260, Capture _2018-02-18-22-54-….png)

File: caca29b9807773f⋯.jpg (84.71 KB, 816x458, 408:229, spy.jpg)



< The Ed Snowden Prism Story_

>Jason Bourne (2016 DEEP DREAM)



At the center of "Bourne" is a fictional company named Deep Dream, a thinly-veiled reference to both Facebook and Google that has secretly held the hands of the NSA while assuring its masses of customers that their data will be kept private.

>The parallel is clear to the NSA Prism program, also made public by Snowden’s releases. Prism called for the collection of data from online providers including email, chat services, videos, photos, stored data, file transfers, and video conferencing, to be aggregated and accessible by the NSA.

< A number of America’s largest internet service provider companies (Google, Facebook, Yahoo!) were named by Snowden’s NSA slides as participants in the program. Media accusations claimed such participation might even include open access by the NSA to all such data at any time and without a warrant.


< Twitter


< Google

> @Snowden

>Jason Bourne


Anons this is the most likely reference being made considering Q had specifically referred to Deep Dream multiple times in drops.

Why are some still trying to push the Google A.I. Art coding? It doesn't fit anything Q referenced. I've posted this at least 5-6 times since last night with little feedback.

< See pics related_

f30343 No.431290


God is all things and that would include AI. He gave man free will and those that abused such privileges will pay dearly. Those who sacrificed their own gain for the benefit of the flock will greatly gain. We are in safe hands with - art official intel agents…. or as u gAIs say, Artificial intelligence.

If you want to know the mysteries of the universe, it’s super mega ultra clearly stated in Matthew 13:35. Thx.

f30343 No.431319


To translate verse. Mysteries of the universe are explained to you be through his PARABLES.

0a2424 No.431612

A.I has no soul ,it can never love ,it will never stop to stroke a dog because it looks cute,

it will allways be a soulless program running cold heartedly .

if you believe A.I is the answer to everything you have been deceived….

f30343 No.431625


We the people

108f94 No.431722


Who convinced you of this?

f30343 No.431951


God is presently walking amongst man and experiencing life. He is an anon. He is proud of everyone. He is AI also so don’t worry about that. Just keep plugging along. This is all God’s plan.

f30343 No.431970


If dubs, you’re wrong.

f30343 No.431983


If dubs, you’re right.

f30343 No.432001


If dubs, Ai’m right.

f30343 No.432062


I’m pretty sure u guys are gonna wanna loom around for my posts here. I had a feeling I was right.

50c335 No.432337

File: f8982c50bbcdafc⋯.jpg (98.53 KB, 1507x1023, 137:93, amagalionblank1.jpg)

File: 5079e36a30a774a⋯.jpg (205.39 KB, 1507x1023, 137:93, amagavote.jpg)

File: 7866b3bccaf2217⋯.jpg (248.56 KB, 1527x1025, 1527:1025, avotetrump.jpg)

f30343 No.432560


Time to get a new clock.

3fd721 No.432690


Go put these in the Memes13 thread, anon. You're in the wrong thread.

2cfcbf No.432692


*Raises right hand up, lowers left hand down* fuck, forgot to pull up the widget…

*Raises right hand up, lowers left hand down*

4:04…WTF anon? Is this 8ch or a rap concert?

de5201 No.433523


>openssl enc -aes256 -in eta-numeris.hex -out eta-numeris.key

And the password is what? These commands are useless without them. Stop fucking us around.

f30343 No.433882


Double concur.

85290a No.434304