Simulation Theory

Simulation Theory

Simulation-TheoryA team of physicists has provided some of the clearest evidence yet that our Universe could be just one big projection.

In 1997, theoretical physicist Juan Maldacena proposed that an audacious model of the Universe in which gravity arises from infinitesimally thin, vibrating strings could be reinterpreted in terms of well-established physics. The mathematically intricate world of strings, which exist in nine dimensions of space plus one of time, would be merely a hologram: the real action would play out in a simpler, flatter cosmos where there is no gravity.

Maldacena’s idea thrilled physicists because it offered a way to put the popular but still unproven theory of strings on solid footing — and because it solved apparent inconsistencies between quantum physics and Einstein’s theory of gravity. It provided physicists with a mathematical Rosetta stone, a ‘duality’, that allowed them to translate back and forth between the two languages, and solve problems in one model that seemed intractable in the other and vice versa (see ‘Collaborative physics: String theory finds a bench mate’). But although the validity of Maldacena’s ideas has pretty much been taken for granted ever since, a rigorous proof has been elusive.

Max is Back – Decrypted Matrix 3.0 – Launch Broadcast

Max is Back – Decrypted Matrix 3.0 – Launch Broadcast

http://youtu.be/MUr6cp_kYI8

 

dcmx-3.0

Max is Back – Decrypted Matrix 3.0

Thanks for your patience, and support. Introduction to the new format, upcoming topics & more!
 
 
 
 
 
SCREENSHARING INFO DISCUSSION:

Snowden Leaks – NSA Sideshow? Hacking industry boomtown

AI Drones – When will the beast think for itself? Micro Swarms!

Manufactured Terrorism Off the Charts – False Flags further expose

Healthcare System Takeover + GMO Freight Train!

Medical Marijuana Movement Unstoppable? (health benefits no longer ignored)

Police State Brutality – and Getting Away with Murder

Trans Pacific Partnership – OMG WTF GLOBALIZATION

FAILED WAR ATTEMPTS: Iran, Syra, Ukraine?

Cabal Sinking their own ship? Does Humanity have a chance?

+Final Thoughts J, Krishnamurti , George Carlin

Watch A Swarm Of Robots Team Up With Flying Drones To Solve Real-World Problems

Watch A Swarm Of Robots Team Up With Flying Drones To Solve Real-World Problems

We’re used to thinking of robot swarms as consisting of lots and lots of similar robots working together. What we’re starting to see now, though, are swarms of heterogeneous robots, where you get different robots combining their powers to make each other more efficient and more capable. One of the first projects to really make this work was Swarmanoid, with teams of footbots and handbots and eyebots, and researchers presented a similar idea at IROS earlier this month, using an AR Drone to help a swarm of self-assembling ground robots to climb over a hill.

The focus of this research is communication: getting a flying robot to be able to communicate with a swarm of ground robots by relying exclusively on visual feedback from LEDs. All you need to get this to work are lights, cameras, and some mildly intelligent robots: you can leave your maps, GPS, IMU, hardware IDs, and all that stuff at home. Here’s a video of the system in action:

As interesting as the communication is, it’s the applications that really make this video worth watching. Since the ground robots can’t see very far, they rely on the quadrotor to scout ahead and estimate the parameters of upcoming obstacles. Then, the quadrotor instructs the swarm on the ground how to team up to best overcome those obstacles. With the hill, for example, the quadrotor can use stereo imagery to compute how steep it is, run an onboard simulation to see how many ground robots will have to team up to make it over, and then give instruction and direction to the robots below. Very clever.

“Spatially Targeted Communication and Self-Assembly,” by Nithin Mathews, Anders Lyhne Christensen, Rehan O’Grady, and Marco Dorigo, from Universite Libre de Bruxelles and Instituto Universitario de Lisboa, was presented at IROS 2012 in Vilamoura, Portugal.

Rapture of the Nerds: Will the Singularity Turn us into Gods or End the Human Race?

Rapture of the Nerds: Will the Singularity Turn us into Gods or End the Human Race?

A gathering of experts on artificial intelligence becomes a search for deeper meaning

Hundreds of the world’s brightest minds — engineers from Google and IBM, hedge funds quants, and Defense Department contractors building artificial intelligence — were gathered in rapt attention inside the auditorium of the San Francisco Masonic Temple atop Nob Hill. It was the first day of the seventh annual Singularity Summit, and Julia Galef, the President of the Center for Applied Rationality, was speaking onstage. On the screen behind her, Galef projected a giant image from the film Blade Runner: the replicant Roy, naked, his face stained with blood, cradling a white dove in his arms.

At this point in the movie, Roy is reaching the end of his short, pre-programmed life, “The poignancy of his death scene comes from the contrast between that bitter truth and the fact that he still feels his life has meaning, and for lack of a better word, he has a soul,” said Galef. “To me this is the situation we as humans have found ourselves in over the last century. Turns out we are survival machines created by ancient replicators, DNA, to produce as many copies of them as possible. This is the bitter pill that science has offered us in response to our questions about where we came from and what it all means.”

The Singularity Summit bills itself as the world’s premier event on robotics, artificial intelligence, and other emerging technologies. The attendees, who shelled out $795 for a two-day pass, are people whose careers depend on data, on empirical proof. Peter Norvig, Google’s Director of Research, discussed advances in probabilistic first-order logic. The Nobel prize-winning economist Daniel Kahneman lectured on the finer points of heuristics and biases in human psychology. The Power Point presentations were full of math equations and complex charts. Yet time and again the conversation drifted towards the existential: the larger, unanswerable questions of life.

Rapture of the nerds

Inside the Masonic Temple the morning light shone through a glorious set of stained glass windows. The work, completed in 1957 by Emile Norman, charts the progress of industry, from covered wagons to high speed trains, from sailing ships to cruise liners. It’s a celebration of civilization, interwoven with the beauty of the natural world, and above it, the all seeing eye of God.

That same year Norman completed his masterpiece, the mathematician John von Neumann passed away. It was von Neumann who first spoke of a technological singularity. He imagined the pace of scientific progress would grow faster and faster, until it becomes impossible for humans to keep up with the change. By singularity, von Neumann was referring to a spacial anomaly, like a black hole, where the traditional rules of physics do not apply.

While there are numerous versions of what the future will become in the wake of the Singularity, the unifying principle is that, beyond this moment, the universe as we know it will be dramatically altered. And so the Summit is a sort of nirvana for hyper-intelligent dreamers: sci-fi fans with PhDs, big bank accounts, and boring day jobs, who love to debate radical visions of the future. Making a religion of rationality, it turns out, can lead some very smart people to embrace some insane-sounding ideas.

Laura Deming, who began attending MIT at the precocious age of 14, was one of four Thiel Fellows to speak onstage. Peter Thiel, the billionaire hedge fund manager, tech investor and founder of PayPal, is one of the biggest donors to the Singularity Institute. His fellowship offers the world’s brightest minds $100,000 each to drop out of school and pursue their bold ideas. Deming, who at 18 has already finished college, electrified the crowd with her short talk.

“There is one fact that never fails to infuriate me. Every day 150,000 die of a disease that we ignore. I remember when I was eight, I decided that I wanted to work on curing aging,” Deming began. “It was watching my grandma try to play with my brother and I when arthritic joints made just walking painful.” Deming’s voice grew husky, and her eyes watered with tears. “I remember clearly the death of three grandparents, three amazing people, from this awful, inexorable process that we have somehow come to view as something normal, natural, and beautiful… to be celebrated.” She paused to collect herself. “At least outside this room, that seems to be the consensus.”

“Just think how far we’ve come in a century,” said Deming, her cheeks flushed with excitement. “Only a century ago, the nature of genetic code was still a mystery. Now we’re creating pocket-sized DNA calculators and swapping biological circuitry like it’s Lego blocks.” Like many at the conference, her faith in a brighter future was grounded in the continuing acceleration of scientific progress. “If we succeed, we will have turned the most awful paradigm that we know on its head. The inevitability of death.”

The crowd burst into rapturous applause.

I wondered if The Singularity might serve as a sort of substitute for faith among the Silicon Valley set who felt uncomfortable with some of religion’s mystical beliefs. “The Singularity resolves a lot of the problems that religion irons out for humans,” said R.U. Sirius, a longtime attendee I chatted with. “The contradictions, the pains and suffering of living: these are deeply troubling for people who pride themselves on their rational minds. Here you can find a vision of absolute transcendence, but one that uses as its foundation long-term projections that are at least somewhat grounded in science.”

Making a religion of rationality, it turns out, can lead some very smart people to embrace some insane-sounding ideas

Laura Deming

The prophet of progress

When the conference broke for lunch, I wandered outside to California Avenue. The area was clean, bright, and quiet. Across the street the high steeple of Grace Cathedral caught the afternoon light. At the corner, the road descended at a frightening angle, sloping off like the inverse of one of the many charts projected on the screen that morning to display the astounding rate of our technological gains.

The audience at the conference was a pleasant polyglot: unassuming geeks in t-shirts adorned with coding jokes, bankers in Oxford shirts, freaks with gelled mohawks, crossdressers in leather boots, and one man in Victorian breeches and top hat. Grabbing a seat at an outdoor table, I caught the tail end of a discussion between several programmers and a pair of quants from a hedge fund. They were talking about the amount of trading in today’s stock markets that is governed entirely by computer algorithms, moving at light speed, with little or no human involvement. “You want to see a world where computer intelligence is leaving humans in the dust,” the hedgie boasted. “It’s already here.”

While the concept of the Singularity has been around since the 1950s, it failed to catch on with the mainstream until 2005, when the prolific inventor and polymath Ray Kurzweil published The Singularity is Near. It was an update to his 1999 work, The Age of Spiritual Machines, which became a bestseller in Amazon’s science section. But The Singularity is Near broke through to become a New York Times bestseller, largely by mixing Kurzweil’s earlier notions of sentient machines with new predictions about the possibilities for eliminating diseases like cancer and Alzheimer’s and, eventually, overcoming death itself.

Kurzweil is the Singularity’s optimistic prophet. As a young inventor, he set out to help the blind to see and the mute to speak. Incredibly, he accomplished these lofty goals, creating technologies that touched many lives, and making himself a millionaire many times over the process. So perhaps it’s not surprising that he truly believes he can solve the vexing problem of mortality, and even, as he explains in the documentary Transcendent Man, bring his dead father back to boot. In Kurzweil’s vision of the future, we can merge our brains with computers, giving us a near godlike intelligence and the ability to back up our memories and thus live forever. This new species of man-machine will spread out across the universe, a super race on an infinite quest for knowledge.

This new species of man-machine will spread out across the universe, a super race on an infinite quest for knowledgeThe excitement in the crowd was palpable when Kurzweil stepped onstage, the last speaker on the first day. Despite the advances made in computer processing, brain imaging, and even artificial intelligence, it’s not clear to Kurzweil, or anyone else, exactly when this change will occur. “The Singularity’s not here, but it’s near,” Kurzweil said, by way of an opening line. He currently swallows over 200 pills each day in the hopes of lasting till that momentous event. His talk pointed out the promising signs: IBM’s Watson outsmarting humans at Jeopardy and improvements in brain scans allow computers to recreate more and more of how our minds work.

Kurzweil’s most important and controversial belief is that sciences like biology and medicine are increasingly becoming “information technologies.” This would mean the same principles of accelerating returns which have played out in the world of computers would now hold true for you and me: Moore’s law will apply equally mitochondria and microchips. As soon as Kurzweil finished, a hand shot up in the front row. John Linnemeier, a frail man with thinning white hair, grasping a ski pole for a cane, called for the microphone.

“I just want to ask, you and I are both pretty old, what if we don’t make it to the Singularity? Do you have any plans for that?”

Kurzweil gets this question a lot. While his three health books have been a “wake up call” for baby boomers, he explains, the generation won’t necessarily make it. “But before 2030 we will be adding more than a year every year to our life expectancy. Of course you could be hit by the proverbial bus tomorrow, but we are doing something about that too, with Google’s work on self-driving cars.” He didn’t mention it onstage, but Kurzweil also sells his own line of supplements. “You don’t want to be the first person in line not to make it into the theater,” he joked, to laughter and cheers from the crowd.

After Kurzweil’s talk the conference broke up, and we made our way downhill to The Cellar for a Saturday evening after-party. Descending from Nob Hill into downtown San Francisco, the city grew dirtier, louder, and more crowded. A cluster of tourists had gathered around a game of Three-card Monte. The smell of weed drifted out of a window.

Inside the bar the mood was festive. A “conscious” mixologist specializing in “essential oil wizardry” poured pungent elixirs. Downstairs in a basement club, someone had stacked a large pile of cardboard cubes. Attendees donned special virtual reality glasses that turned the blocks into a real life game of Tetris.

Kurzweil made his way through the bar, mobbed by fans eager to chat him up or take a photo with their idol. “When he came on stage, it was definitely a Jesus moment,” said Tom Rausch, a first time attendee, sipping a beer, noting the way people hung on Kurzweil’s every word.

The bar was too small for the growing crowd of Singularitarians. They spilled out onto the street. I chatted for a while with Ioven Fables, a philosophy major from Boston College who now works as an executive assistant at the Singularity Institute. “Our big problem is, we can attract all these smart people to come together, to chat and to network. But how do we get the world’s best mathematicians and programmers to actually work for us? If you are serious about the Singularity, like I am, then it’s not about the money.” He took a deep swallow from his drink. “We’re not all as optimistic as Ray about how things are going to turn out.”

continues below

Through a glass, darkly

“Fasten your seatbelts, because this could be very bad.”

Jann Tallinn

Like most of the dominant modern religions, the Singularity presents a dramatic duality in its visions for what will follow — a heaven and hell. In Kurzweil’s vision, mankind escapes death and gains godlike intelligence. But for many in attendance, including the senior staff of the Singularity Institute, something far more cataclysmic seemed the likely outcome, a superhuman form of artificial intelligence that gives rise to a race of sentient machines which wipe humanity from the face of the Earth.

Jaan Tallinn, an Estonian programmer known for his work helping to create the peer-to-peer architecture behind Kazaa and Skype, has become one of the most vocal advocates and biggest financial donors to the Singularity Institute. “It will be the biggest change the universe has seen,” he explained to me during a Q&A session in the sweaty press room underneath the stage. “Fasten your seatbelts, because this could be very bad.”

Tallinn has wispy hair, slightly ridiculous bangs, and the first flecks of grey creeping in. His talk was a playful affair, touching on topics like the multiverse and time travel with comic, hand drawn illustrations. But in private, his passion was alarming. “People always ask me after my talks, ‘What can we do?’ One thing is just spread the idea that, although this sounds like science fiction, it is deadly serious. We definitely need way more resources to work on the safety aspects of developing artificial intelligence and possibly superhuman intelligence. Right now we are spending vastly more on lipstick research than planning for changes of galactic scale.”

I didn’t come away from this weekend thinking the Singularity Institute was some kind of apocalyptic cult. As charming as the comparison seemed at first, Singularitarians are not to the tech world what Scientologist are for Hollywood. Rational thought and healthy skepticism are core values in this community. Many of the folks I met were more interested in networking with their industry peers than discussing the implications of a neural network. Melanie Mitchell, a Professor of Computer Science at Portland State, directly contradicted Kurzweil during her talk. IBM’s Watson, she pointed out, had beaten the best human players at Jeopardy. And yet the program had no chance of explaining, as a precocious ten year old could, why the audience laughed every time Watson’s robot voice intoned, “I’ll take ‘Chicks Dig Me’ for $400, Alex.”

Google’s Peter Norvig, a venerable figure in the world of Artificial Intelligence, was similarly dismissive. Despite the prodigious minds and mountainous resources at his disposal, the biggest artificial intelligence breakthrough of this year wouldn’t exactly pass the Turing test. 1000 computers using 10 million YouTube stills learned how to identify a cat… 15.8 percent of the time. “I think our progress is best summed up by a cartoon from Abstruse Goose,” Norvig said, projecting the strip onto the auditorium screen.

Throughout the Summit, the Singularity Institute’s staff implored the audience for donations of time and money. The world’s best minds, they insisted, were needed to work on planning for the disastrous possibilities of the Singularity, and that kind of brain power doesn’t come cheap. “The Singularity Institute actually knows some brilliant mathematicians who can work on these problems and want to work on them, and we can’t afford to hire them, that is the state of funding for the world’s most important problem,” warned Luke Muehlhauser, the Institute’s Executive Director. While intellectual curiosity was the dominant trait among attendees, fear was the emotion the Institute leveraged in trying to solicit support. “If superhuman AIs are steering the future, they might take it somewhere we don’t want to go,” Muehlhauser emphasized.

As reporters filed out of the press room for the next talk, a small group gathered around Tallinn to ask some follow-up questions. In a confidential tone, he made it clear that creating a sense of urgency around the Singularity was his current mission in life. “How valuable are the mistakes, that can be warnings?” Tallinn asked. “The only dramatic thing I have found, which wasn’t good enough… a decade ago an aircraft cannon in South Africa went berserk and started killing people.” I ask him about the computer algorithms that caused flash crashes in the stock market. “I don’t think that’s dramatic enough,” he said, shaking his head. Speaking in a near whisper, he looked me square in the face. “From a long term perspective, it might be good to have a major AI disaster. A real wake-up call.”

Photo of Masonic Center by Wally Gobetz
Photo of Ray Kurzweil by JD Lasica
Photo of Grace Cathedral by Shubert Ciencia

via TheVerge

August 17, 2012 – DCMX Radio: Anything Goes Friday: Wildcard News Highlights, The Matrix of Deception, DARPA-Bots, Whistleblowing, Police State to Martial Law

August 17, 2012 – DCMX Radio: Anything Goes Friday: Wildcard News Highlights, The Matrix of Deception, DARPA-Bots, Whistleblowing, Police State to Martial Law

Wildcard Friday: Relevant News & Unravelling Reality and the Matrix of Deception. DARPA funding AI Robots, Banking Crisis Warnings, Julian Assange and the future of Whistleb-lowing, Molding Your Reality to what you Prefer, Ley Lines and their Connection to the Mysterious & Impossible Ancient Structures throughout History, Police State Red Flags with Imminent Martial Law? NDAA in USE! Reporting the Facts – You decide.


Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

TRAPWIRE: Wikileaks Drops a Surveillance Bombshell – Widescale Facial Recognition & Behavior Pattern Mapping

TRAPWIRE: Wikileaks Drops a Surveillance Bombshell – Widescale Facial Recognition & Behavior Pattern Mapping

Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.

The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.

Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails.

On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning.

Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the WikiLeaks server were reported to be dropping upwards of 40 gigabytes of traffic per second on the site.

According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be “analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.”

In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces.

What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf).

“Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.”

In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product:

“can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.”

An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “[walk] back and track the suspects from the get go w/facial recognition software.”

Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the “See Something, Say Something” program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well.

In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes, “God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the past eleven months.

News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas.

SOURCE: RT.com

 

NOW FOR THE RAW LEAKS:

http://privatepaste.com/c56f6848d2/trapwireCentralizedDatabaseMGMGrandLinkedSystemEtc – centralized database, vegas hotels, linked sites, etc

http://privatepaste.com/e5b7f4a21d/trapwireNYC – NYC circa 2010

http://privatepaste.com/a9bc9274ea/trapwireAustin – Austin

http://privatepaste.com/04eaef4343/trapwireEveryHVTUSCANUK – note the last paragraph

http://privatepaste.com/90198aa545/trapwireTexasBorder – Texas border circa 2009

http://privatepaste.com/568f0a512a/trapwireWalkTheCatBack – Talking about images to analyze and walking the cat back

http://privatepaste.com/318e0e652b/trapwireHVTCitizens – Trapwire for certain citizens that are important, but not USSS important

http://privatepaste.com/670091f5b0/trapwireLondonStockExchange – London Stock Exchange

http://privatepaste.com/b62ceaf254/trapwireNYCDCVegasLondonOttawaLA – NYC, DC, Vegas, London, Ottawa, LA

http://privatepaste.com/fba46e24ca/trapwireAustinDPSAllocated1Point8M – 1.8M for trapwire & equipment from Austin DPS

http://privatepaste.com/caf299c230/trapwireOnDesksOfUSSSMI5LAPDRCMPNYPD – trapwire on the desks of USSS CP, MI5, RCMP, LAPD CT, NYPD CT

http://privatepaste.com/5a71bac416/trapwireDCMetroNationalParkPoliceEtc – trapwire DC metro, National Park Police, etc

http://privatepaste.com/e6031c14f6/trapwireLAPD – trapwire LAPD as a prototype

http://privatepaste.com/febefa287f/trapwirePentagonArmyUSMCNavy – trapwire Army, Pentagon, USMC, Navy

http://privatepaste.com/58a60bff35/trapwireNSIFBIFtMeadeSevenYears – Trapwire 7 years circa 2011, National SAR Initiative (NSI), FBIs eGuardian, Ft. Meade, etc

http://privatepaste.com/f7b7ac02ab/trapwireAmtrackDHSFusionCenters – Amtrack, DHS fusion centers, DC Metro

http://privatepaste.com/7add918e4c/trapwireBehaviorPatternsToIdentifySurveillance – “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.

http://privatepaste.com/d503851f0c/trapwireSalesforceGoogleDHSInstitute – salesforce, google, DHS institute

http://privatepaste.com/626712c0fa/trapwireNigerianPresidentialPalace – Nigerian Presidential Palace

http://privatepaste.com/bf0a0abf67/trapwireScotlandYardDowningWhiteHouseWalMartDell – Scotland Yard, 10 Downing St, White House, Wal-Mart, Dell

 

August 6, 2012 – DCMX Radio: Another Mass Shooting, Related News, Drones, Surveillance & Skynet Artificial Intelligence, Do it Yourself Hobby & Research Benefits

August 6, 2012 – DCMX Radio: Another Mass Shooting, Related News, Drones, Surveillance & Skynet Artificial Intelligence, Do it Yourself Hobby & Research Benefits

Drones & Skynet: Global Surveillance State and the reality of weaponized ‘Eagle Eye’ Artificial Intelligence, The Dangers to Privacy & the Violation of inherent Constitutional Rights, Do-it-Yourself Remote Control Drones for Hobby & Research, Beneficial Uses Explained


Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

Dark Night ‘Battle’ of the Artificial Intelligence Robots? Aurora Shootings Related to Secret FICO, LIBOR, PROMIS, & DARPA Software

Dark Night ‘Battle’ of the Artificial Intelligence Robots? Aurora Shootings Related to Secret FICO, LIBOR, PROMIS, & DARPA Software

Last night I had Nighthawk from Revolution Radio and Ghostwalker, an ex-special forces guy on my show discussing the Batman/Aurora Shooting.

Update as of August 3, 3012 at 1pm:  Nitehawkk just sent me the Aurora Police Scanner Transcription click here.  (Incredible amount of work :-))

As I posted a few days ago here on this blog the link up between the shooter’s father and the LIBOR scandal is likely a substantial background element that may point to something much bigger going on here.

This recent article by Grace Powers reposted here in with a link to the whole report, is very clear and concise, an excellent overview of the evidence and where it is leading.

Note:  I believe Jack Blood broke this story originally regarding the background of Jame Holmes’ father and how that factors in… The links to the Batman movie scenario are also here in Jack Blood’s original article.

 

Batman Massacre: WHY and HOW and WHO 

Written by By Grace Powers July 28, 2012

www.helpfreetheearth.com

THE MOTIVES

Robert Holmes, the shooting suspect’s father, is a senior lead scientist with FICO, the American credit score company. He was scheduled to testify in the next few weeks before a US Senate panel that is investigating the largest bank fraud scandal in world history. This banking fraud threatens to destabilize and destroy the Western banking system.

Robert Holmes not only uncovered the true intent of the massive LIBOR banking fraud, but his “predictive algorithm model” also traced the trillions of “hidden”dollars to the exact bank accounts of the elite classes who stole it. In other words, Robert Holmes could NAME NAMES! Those names WOULD AWAKEN THE WORLD to the depth of government and corporate corruption which could include members of Congress, Wall Street, Federal Reserve and EU executives and could even include US Presidential candidates and the British Royal family.

The motives for the massacre are:

1) To silence whistelblower Robert Holmes whose son is now facing a possible death sentence 

2) To influence the upcoming vote on the UN Global Small Arms Treaty which could result in gun confiscation and disarming world citizens. The UN treaty could override national sovereignty and give a license to federal governments to assert preemptive gun control powers over state regulatory powers…..continued at

 http://www.helpfreetheearth.com/news617_batmanwhohow.html


THE BATTLE OF THE ROBOTS OR AI SYSTEMS

With regard to the Batman movie scenario I also think it is significant and not outlined in Jack Blood’s analysis, that the Dark Knight ends up working for the “government” who are portrayed as the good guys in order to stop what I took to be a free energy device that was reconfigured into a “fusion reactor” aka neutron bomb according to the movie.  The enemy in other words becomes “free energy devices” which according to the subliminal message can be turned into dangerous weapons (a position that the Illuminati takes to redirect the public away from the exploration into zero-point or what is commonly known as “free energy”).  In the movie, the Dark Knight flies the activated device out over the waters around NYC and detonates it, saving the city (and himself) in the process.

It is also notable that the destruction of a stadium is one of the key scenes in the movie… imploding from an underground explosion…

Jack Blood is quite correct with regard to the link between the PROMIS SOFTWARE / OCTOPUS investigation where journalist Danny Casolaro was found dead in a hotel room, supposedly having strangled himself in a bathtub.

The Promis Software story has not reached the mainstream and is key to understanding the DEVELOPMENT OF AI and tracing not only banking transactions but for use in targeting and profiling and a myriad of other capabilities.  Whereas the software that the shooter’s father was working on “detects financial fraud” it may be considered a potential and very serious threat to the Promis system and quite possibly be able to detail involvement of the perpetrators in the LIBOR and other banking frauds going on right now.  

What comes to mind is the idea here that this enitre scenario as played out in the Aurora Colorado theater was created by an AI that detected a rival software that would threaten those it is SERVING… and therefore constructed a counter to that threat in the form of targeting this apparently quite brilliant (PhD candidate) James Holmes… 

In other words, the warning is certainly clear to his father Robert Holmes and likely the entire firm called FICO, Fair Issac Corporation.  FAIR ISSAC sounds to me like the name of a robot… I would surmise what we have here is a battle between robots or ARTIFICIALLY INTELLIGENT SYSTEMS.  The is something MUCH GREATER going on here than meets the eye or has been yet revealed.  

Note that the Credit reporting organization certainly appears on surface to be a loyal part of the surveillance aparatus of the NWO.  So how is it that an individual, Robert Holmes, became such a threat to the system, such that his son was sacrificed on the alter of mind control in service of sending such a message?

Yes, lesser objectives such as gun control and public terror is always a goal of such operations.  But in light of the links as mentioned in the above articles to the Olympics, what we have here is a picture that begins to look like a multi-city op that has at it’s core a larger objective.  

THE GEOMETRIC CONSTRUCTION AKA DARKLY MAGICAL ACT

I am convinced, based on all of the evidence and my previous points that there is much more going on here.  The battle of the robots/AI systems may be the only real indicator of something more diabolical and more far reaching than what we have discovered so far.

I suggest that this is a geometrical carefully formulated plot that goes from Aurora Colorado (goddess of the Golden Dawn) to the London Olympics with the Silverstein ownership in the background echoing the Twin Towers of 911, to a third point… that has yet to be revealed.  At the very least there will emerge 3 locations creating a triangle because as any magician knows, (whether in service to the dark or the light) that is the very minimum needed when casting a spell or taking an action aimed at changing or affecting ‘reality’.

SOURCE: ProjectCamelotPortal.com

Next Step, Skynet: ‘Boeing Close to Choosing Carrier Drone Design’

Next Step, Skynet: ‘Boeing Close to Choosing Carrier Drone Design’

SAINT LOUIS, Mo. — Boeing is getting “very close  to having what we’d say is a very capable design” to pitch for the Navy’s Unmanned Carrier-launched Airborne Surveillance and Strike (UCLASS) program, Chris Chadwick, president of the company’s military aircraft division told DT at  Boeing’s Saint Louis, Mo., facilities yesterday. While he wouldn’t reveal much about the company’s UCLASS design, he did say that it definitely isn’t “a warmed-over X-45.”

The X-45, which has evolved into the Phantom Ray, was Boeing’s unsuccessful bid for the Navy’s Unmanned Combat Air Vehicle Demonstrator (UCAS-D) program that is using Northrop Grumman’s X-47B to test out how to conduct carrier ops with a large, stealthy UAV.

UCLASS is the Navy’s effort to field a fighter-size, stealthy drone capable of flying long distances to spy on and attack enemies by 2018. The Sea service considers it a follow-on effort to the UCAS-D program.

A couple months ago, we showed you the drawing of a mysterious aircraft (shown above) depicting what Boeing officials said was merely a concept image for UCLASS, not a final design, and that the company was still evaluating a half dozen or so different designs that it could pitch for the effort.

Chadwick said he isn’t concerned about Northrop having an advantage over Boeing in the UCLASS program, saying that all competitors into the contest will have access to the information learned from the UCAS-D program.

Northrop is likely to offer a version of its X-47B for the UCLASS contest while General Atomics is offering a version of its Predator C Avenger, called the Sea Avenger, that’s equipped to handle the strains of catapult launches and arrested landings as well as the salty sea air and Lockheed is apparently going to bid with a yet-to-be revealed design.

Truth Seekers: The Meaning of Life #YouAreTheMatrix

Truth Seekers: The Meaning of Life #YouAreTheMatrix

Truth Seekers

“Let him who seeks continue seeking until he finds. When he finds, he will become troubled. When he becomes troubled, he will be astonished, and he will rule over the all.”

 

http://youtu.be/7sPUpKGI1Z4

 

There is only one way to defeat this systemic cancer or virus that is spreading across the planet and through every living being and it isn’t by getting on your knees and praying to an external God for a miracle… I’m sorry to disappoint you if you’re a believer in these concepts but the idea of a savior existing somewhere outside of the infinitely powerful intelligence that is YOU is one of the greatest confidence tricks that you’ve played on yourself… you just don’t realize it yet.

As long as you’re searching “outside” for this imaginary savior to come sweeping down from the heavens on a chariot of fire or something you will be wallowing in self inflicted suffering for a very long time because metaphorically speaking… hell will first have to freeze over. What is outside is a projection of the inside, therefore, anything that is seen out there is really a reflection of what is going on inside here. God and Jesus are cosmic ideas or conscious expressions unfolding from the imagination of an infinitely powerful intelligence that is you and every point of light that exists in this reality… in whatever form.

You, we, us… have ALL created a cosmic drama that goes beyond the comprehension of isolated and limited intelligence, however, because we are currently undergoing a metamorphosis in a capacity that some might call a “spiritual” awakening, where our collective Mind or shadow universe is being illuminated by the essence of truth, we are for the first time in a very long time able to see our own magnificent reflection in the mirror or firmament and understand what it is to be hu-man-e

What we find in the mirror is the divided essence of Love. Individual strands of energy on the above plasma ball do well in representing sentient currents of light that arc away ever so briefly from their source, much like a solar flare arcing from the sun before being pulled back by the power of electromagnetism. The experience is one of self discovery before metaphorically returning home to the ONE and ONLY source.

Do you have children… do you remember them experiencing an arc around the age of 15 to 18 months when they become self aware and were able to recognize the reflection in the mirror. The next look in the mirror is looking up into the universe that is your-self and understanding that your not looking “out there” but actually looking at the reflection of your own infinite subconscious, that you are a universe within a universe.

The purpose of God and Jesus… and of every saint or so called sinner like all other sentient beings that has in the past and to this moment continue to influence humanity is to divert the “collective” attention – to keep the eyes looking in the opposite direction in order to prevent the sleeping giant from waking up out of its own self induced slumber and seeing itself for what it is. There is a process to follow… wheels and cogs must turn.

You have to understand… most people are not ready to be unplugged and many of them are so inured , so hopelessly dependent on the system that they will fight to protect it

Morpheus

The restrictive field that manifests by choosing to put faith in someone or something else blocks opportunities to evolve in terms of developing knowledge and it ensures YOU won’t be looking in the one place that really matters. The place where your eyes should be focused if you want to call on a true savior is an aspect of the self that is taken for granted every day… it is of course the eternal subconscious or inner self… the inner universe. This integral part of the self, this other aspect of you is the original source of all there is and all there ever will be. By using the power of intent to place your-imaginary-self into limited states of awareness where you depend on something else… you are actually holding to ransom the essence of you in a world of virtual hope where ironically… there is no hope.

As frustrating and maddening as the world can sometimes appear externally reality is merely reflecting the inner imaginings of the one-self, particularly now, in this era of global silliness and contrived insanity you should realize, more than ever, in your heart, that there is always a happy ending… and therefore allowing the madness and frustration to consume and eat you up is to allow negative energy to vampire you. The meaning of suffering becomes clear when you realize that spiritual or soul growth can only be achieved when you experience and FEEL all manner of pain. The way in which we experience this pain is to see our-self as something we are not.

As the famous comedian Bill Hicks once said:

The world is like a ride at an amusement park, it goes up and down and round and round, it has thrills and chills and it’s very brightly coloured and it’s very loud and its fun, for a while. Some people have been on the ride for a long time and they begin to question: Is this real, or is this just a ride?

Every sentient being that is born into this world unfolds from an all embracing source as a temporary point of isolated awareness… or light. In the beginning eternal memories are wiped clean but are never forgotten… they are simply filed away… stored in the Akashic library or on the cosmic hard drive. The ultimate quest is to harvest new feelings and experiences from newly born points of view… but as Bill Hicks rightly observed and then pointed out… life is just a ride…

Call it a lucid dream… a movie of epic proportions or liken it to a fly-on-the-wall drama, in every way shape and form, intelligent awareness is observing these events play out, furthermore, this intelligence participates in key decision moments to co-create reality in real time whilst the better part of itself remains hidden from view. The truth is… we co-create everything – there is nothing we cannot and have not created with an infinitely powerful imagination.

The challenge… and I say challenge in the loosest terms because life and all of this madness is really a game… is for intelligence to once again see itself for what it is… through a web of intricately linked and highly personal mind-opening apocalypses. The ONLY reason IT can’t see itself for what it is at the moment isn’t because it’s too blind or stupid… but because it has conditioned or programmed itself to forget itself until this moment.

Right now in this moment in time individual waves of light are breaking the surface of the ONE infinite sea of intelligence to view the reflection from a myriad of isolated points or nodes of awareness. As a temporary and seemingly isolated “wave” our/your/my understanding is limited because a wave is momentary unlike the perpetual ocean from which it unfolds. The ocean is seeing the waves and remembering.

Forgetfulness is a trait or characteristic that is reflected inwards and outwards in every aspect of creation. At an infinitely larger scale, forgetfulness has been used to hide or mask the true nature of awareness. Forgetfulness has been a welcome break for that part of you that is everlasting and God-like.

Subtle reminders are embedded into life experiences in the hope that one day you will re-discover yourself… there was never any rush and as the Rolling Stones once memorably sang… “Time is on my side”. Listen to your-self. These reminders or jolts come in the form of thoughts, ideas, images, words, symbols and sounds and in other less obvious ways such as dreams and intuition.

The eternal source that is you gives as it must and takes when necessary. You know what you need in order to grow. No one knows you better than you. The bible is part of the cosmic code… like all historical documents and books it contains fragments of a wider and deeper truth, call them cosmic jigsaw pieces, whatever, the quality of this information is like a Mandelbrot fractal in that it contains memories or information about the entire whole.

It is these pieces of information that are designed to jolt awareness into remembering who and what it is and thus initiate the long and sometimes painful process of self discovery or awakening… this is an intelligent process that “feels” its way and is deeply troublesome for those experiencing it. However, its important to remember that everything happens as it should and that you are never somewhere that you are not meant to be.

This is a game of cosmic hide and seek and the full magnitude stretches way beyond the scope of many people’s vision and imagination, at least for the time being… but that doesn’t mean everyone will always be blind to what has been hidden, it simply means that some people are just not ready for the veil to be lifted, but then that shouldn’t come as a surprise because the game hasn’t been made easy… it’s not easy to accept a truth that is too blinding to see.

But Love will find a way, so for now, but not for very much longer, the game plays out, a game that has probably been playing for billions of years… perhaps even billions and billions of aeons… but even billions and billions of aeons for immortality is a drop in its own never ending ocean of potential.

The experience that is collectively known as “mankind” is a life-like dream based on the idea of helplessness. As a so-called species, mankind has been led to believe it is the victim of unpredictable circumstances and that it has been born into an unwelcoming and cold mechanistic universe, that it is some tiny insignificant dot unable to save itself… in short, the collective experience is guided to view itself as something it is not… this is part of the show, the game, the bigger dilemma in which you star.

The reason that life with all its thrills and spills feels so real is because it has been designed this way… experience has to be what it is, it has to be fantastically surreal in order for you to come into contact with the most breathtaking FEELINGS of adventure and perhaps discover something new about yourself. This is the ultimate desire – to learn something new.

So remember, even those playing the bad guys… and you know the ones… the ones you constantly fret and worry about – the ones that waltz around the planet thinking they are the chosen ones whilst causing all manner of destruction… well, they too are role playing a fantasy in blissful pig ignorance… they have no more or no less importance in the grand scheme of things than you do. They are no more or no less sovereign than you.

The ultimate truth is that you and collectively WE (even them) are the all powerful omnipotent intelligence that permeates everything… and it is down to you to individually wake up and remember who and what you are if you want to be the change. You have to discover what you have hidden from your-self… you have to remember that you are the universe, that YOU are the genie and as a genie you don’t ask for wishes… you grant them, because you are the designer… the co-creator, the programmer. The master of imaginings… God.

Life experience gives you plenty of opportunities to remember who you are. I call these opportunities “nodal” experiences or key moments in conscious streams or individually defined sentient wavelengths – they are the points at which potential wave experiences diverge and cross. They symbolize the cross over of paths… the fork in the road where we stare change in the face without even realizing.

Nodal experiences are predetermined points that are often referred to as moments of fate or destiny. In essence, that is, in imagination, these key moments exist before we reach them… they are set in stone, however, the outcome of each moment is defined when we choose which fork in the road to take. Therefore, these points or moments are the manifestation of our ability to express choice through desire – hence we co-create elements of our life alongside predetermined events, subsequently, life is a blend of intent and destiny. Choice represents the potential to change something about our lives in order to make something different. Life is full of this potential.

In the grand scheme of things,  intent is an opportunity for us Mandelbrot fractals of intelligence to personally “sign” our energy expressions… it is our opportunity to continue riding the same wavelength and chase our own tail in endless cycles if we so desire or it is an opportunity to change direction and take the road to truth, freedom and self discovery.

The problem (nudge nudge wink wink) is that intelligence has become so caught up in the real-life drama it has imagined, written, produced and consequently co-stars in… that it has completely forgotten itself. Intelligence is experiencing its very own cosmic groundhog day.

It’s time to wake up… can’t you hear the calling?

The Shakedown

 

NSA Wistleblower James Casbolt Part Two: Project IBIS

NSA Wistleblower James Casbolt Part Two: Project IBIS

What follows was sent to me by Michael Prince aka James Casbolt. I cannot confirm or substantiate this information at this time but publish it with the proviso to let the viewer decide…

Kerry Lynn Cassidy
Project Camelot

Janary 29, 2012

SECTION TWO
Life Extension- The Chronicles of Michael Prince
by James Michael Casbolt
1992 Sirius Sector
I am not fully conscious at this time when I’m physically on this planet. Part of my consciousness is trapped within a quantum computer system on board my space vessel named the USS CALOPIA. This vessel orbits whatever planet I’m on at the time. This vessel is a UN/US Space Command vessel. The technology on board actually causes the vessel to physically follow me around the galaxy using stargates to travel vast distances. During the compartmentalizing torture sessions at the Hive in South Africa and the London underground facility, my consciousness has been leaving my body and entering a physical cloned body in vat stasis on board the USS Calopia.

The computer system on board this vessel monitors the vital signs of these cloned copies of my body. When life signs are detected within the cloning vat, the computer system sends mechanical servitors to take me to a an emergency medical bay until I am physically recovered and can walk around the ship in a stable condition. My physical body down on the planet during these times is always inhabited by my MIRROR ENTITY. At the breaking point of maximum pain levels… when I ‘pass-out’ my consciousness leaves my physical body in the underground base or wherever and wakes up in the cloned body on board the USS Calopia. When I recover and leave the medical bay on the Calopia, I always enter a specific room where I can monitor my physical body down on the planet. I can also monitor the vital life signs of the body on the planet. This process involves looking through physical cybernetic implants within the eyes. I am also able to operate the computer system on board the ship and bounce the signal off walls to look at the body from a remote location as well viewing through the eyes.

There is always a time limit that the Mirror Entity can take possession of my body down on the planet. The computer system on board the USS Calopia will always give me a warning five minutes before the Mirror Entity departs my body. This physical body will then shapeshift back into a human form when my consciousness enters back into it. The computer system flashes symbols on one of the screens at this time and a digital voice will say-
“Five minutes to genetic molecule alignment”

At this point I will walk out of this particular room on board the ship and enter a room down the corridor to the right hand side. In this room a vertical body pod called a ‘Ventricle Duct’ is positioned at the far end of the room. I will step into the pod with my back facing the wall. A plastic screen will close in front of me and the pod will tip back slightly. The pod will then fill up with liquid that I can breath and I will slowly and gently fall asleep and wake up again in my body down on the planet. This technology assists me in dealing with intense/prolonged pain and terror.

However at this time in 1992 I do not have conscious control over all the technology on board the USS Calopia. I also have a slightly schizophrenic relationship with the computer on board the vessel. At times of acute distress the computer and I talk back and forth. I.E- at the time I was ‘drowned’ in the ‘well’ at the Sirius prison facility, at the moment of greatest terror for me, I heard the computer system on board the USS Calopia inside my head, saying something like-“Regulation 301- Assist in binary xxxx ( numbers I can’t remember ) teleportation? Assist in binary xxxx teleportation?”

The ‘Assist in binary teleportation’ would be repeated with an increased sense of urgency tone of urgency until I felt like my lungs were going to explode. Just at the point of lung rupture taking place, I saw the Kabballa formation in my mind’s eye. I had a split second to choose between two of circles lit up. One green in colour, the other red in colour.

Green= I leave my body ( less risk )
Red= I stay in my body ( more risk )

I choose red at this time, stay in my body and I actually start to breath underwater through some kind of cybernetic breathing mechanism inside my body initiating at this time. The ultimate goal is to stay in the body and gain fully conscious control over all the technology on board the USS Calopia. Some of the hardware and software on board is ancient. Basically I need to switch the AI section of the computer on board off. At this time my brain will become ‘quiet’ and the internal dialogue that takes place inside my head between myself and the computer, will stop.-The scepter artifact I was handed by the ‘Jesuit/Reptilian’ priests after the drowning was a missing piece from the computer on board my ship. I was able to stay in my body during the drowning and therefore realize my physically indestructible nature. However the artifact was ultimately placed within a container inside the Emerald Room at this time, with the female and male reptilians inside. Because of this the female and male reptilians in the Emerald Room own a piece of my mind at this time in 1992.

Now because I was able to resist teleporting my consciousness onto the USS Calopia during a time of intense stress, I have moved one step closer to mastering this technology. Now at times of intense stress when the internal communication between myself and the computer system on the Calopia starts, I can instruct the whole vessel to physically teleport near to my location and send mechanical servitors into the place where I am distressed and physically rescue me. This way I end up physically on board the USS Calopia without having to leave my body. The trick to mastering all this technology is to stay in one physical body and not ‘body hop’ from one physical container to another.

Eventually the objective was to liberate this artifact from the Emerald Room and return it back to my ship. When events such as this happen, in times of danger, there will be no internal dialogue between myself and the computer on the Calopia. The artifact will be physically teleported to me from the ship and I will have complete mastery of my environment enabling me to come out of any dangerous situation safely. I can say at this time, I have claimed the artifact from the two reptilians and I have complete control over the Emerald Room they occupied in the past. I am approaching a state where I will actually be able to incorporate the artifact into my cybernetic body. At that time I will not have to wait for the time delay while the device is teleported from the USS Calopia to me. I will not have to rely on the USS Calopia at all and will have full conscious control over the technology. It is not a matter of if this happens but a matter of when.

1992- D4 facility- Sirius Sector

A door opens at the back of the Emerald Room. I exit the Emerald Room with the male and female reptilians in it and walk into a corridor. I am met by two human guards and I instinctively walk down the corridor behind them. Doors are located on either side of the corridor and some are open as I walk past them. I glance into a room on the left and see tall grey types working on some kind of crystal based computers. I glance to the right as I’m walking and see larger rooms with short grey types working on larger computers with conveyer belt type apparatus at the back of the rooms. I see box shaped objects on the conveyer belts and parts of exo-skeleton robotics such as mechanical arms and such.
A pair of tall grey overseers exits one of the rooms on the right and follow behind me. One of the greys creates a telepathic link between itself to the back of my head and a data exchange starts to take place as we walk. I see the layout and design on the whole facility.

The place is designed exactly like the Pentagon building in Virginia. This Sirius facility has five ring corridors within each other ( pentagons within pentagons ). Each of the five sections houses a separate extra-terrestrial race. Prisoners considered most dangerous by the ruling elite of each race work with scientists of the same race during their incarceration periods. This facility rests on a flat terra-formed seabed under the ocean of this planet to prevent escape. The facility is considered impossible to escape from as previously mentioned. The whole facility is able to detach itself from the seabed in times of emergency, emerge from the water and become airbourne/spacebourne.

The five types of lifeforms in each section of this facility are as follows:
5th Outer Ring- ‘Cat-People’ Bipedal cat type creatures based all over the galaxy but high numbers of these beings located in Sirius Star Sector.
4th Inner Ring- ‘Bird-People’ Bipedal bird type creatures based all over the galaxy but high numbers located in Orion and Draco Star Sectors.
3rd Inner Ring – ‘Wolf-People’ Bipedal canine type creatures based all over the galaxy but high numbers in Sirius Star Sector.
2nd Inner Ring- Humans.

1st Inner Ring- ‘Reptile-People’ Bipedal reptile type creatures based all over the galaxy but high numbers in Draco and Sirius Star Sector ( classic reptilian and grey types ).
A large space exists within the centre of the facility similar to the Pentagon building in Virginia but in the centre of this building is a huge five sided pyramid structure that protrudes out the top. Some type of antenna/teleportation device is located in the direct centre of the five sided pyramid. The data download continues to happen as we walk further down the corridor and I see that this reptilian section of the facility operates in a type of factory setting and the beings within operate in a very collective fashion. The entire facility operates in this way but it is most extreme here. I also see that ultimately the entire facility is run by AI at this time, which oversees most of the activity within the facility.

I see that the AI has been extensively involved in cognitive behaviour tests here. This has been to determine which of the five base races has the highest survival dynamic. These ‘survival of the fittest’ AI tests has been carried out separately on each race. The AI computer system has then mixed the races together in general population on several occasions. The strongest of each race have then been housed together for a continuation of these tests. Where I am being led now is part of the final series of testing in this area.
We continue to walk down and corridor and enter a lift at the end. All five of us get in and descend. The elevator doors open into an absolutely massive room with five walkways converging in the centre. The room is quite dark and very silent. I look up and see the huge five-sided pyramid structure above me built with a type of dark glass. We walk along our walkway towards the centre of the structure. It takes a long time and with every step I feel an awesome power building in my body. After walking for awhile I see on object in the distance. As we get closer I see a familiar trip seat type device. We get to the device and I get in the seat while the two human guards strap me into the chair.

Once this is complete, the two human guards and two greys walk away back in the direction of the lift. I sit in the dark silent massive room for a awhile and wait. I feel completely calm. I hear loud mechanical rumblings around me and five massive square mirrors extend out of the ground to form a pentagon shaped prism around me. My form sitting in the seat is reflected around me in many strange ways. My reflection seems to go on forever. I then see five faces appear on each mirror. They seem to be reflected backwards to how the facility is set-up I.E- A massive reptile face appears in this gigantic mirror to my left, the seat then rotates to the right and I see a huge wolf face, rotate to the right again and I see a huge bird-face, rotate right again I see a huge cat-face. The chair rotates slowly again and I see a huge human face. The face is Commander Sarion who may be my father. The chair then rotates to its original position and sinks into the floor where mechanical locks clamp the chair into a more secure position.

The chair starts to spin in a clockwise motion and gets faster and faster with each rotation. The faces appear to start laughing and as the rotation speed quickens, they all start to blend into one in my vision. I hear a crackling electrical sound and bright white light is coming from the centre of the pyramid down into my body. I start to convulse and I feel myself being filled with massive power and my muscles and joints tearing, stretching and ripping. This is massive pleasure and pain combined and feels like a huge orgasm. I feel my body expanding and when I feel myself reaching a climatic power point, the dark room around me disappears and I find myself standing in some desert canyon. My whole body is tingling with energy and feels very different.

Sirius 1992 continued

As the crackling energy envelops me in the chair, a time delay occurs just before I am teleported off planet into the canyon. I arrive in a tube on board the Calopia and look out through the clear partition as servitor droids come to collect me. The door in the tube opens and I fall forward in a weakened state into the mechanical arms of two servitors.

They lift me onto a hovering gurney and follow by my side on their wheeled legs as I am moved through the corridor on the right side of the vessel leading towards the recovery bay. Large viewing windows are positioned on the right side and I look down at the blue planet below. Most of the mass is covered by a huge ocean and I see a small land mass off to the left lit up by the huge sun behind the planet.

I am taken into the medical bay through a door on the left and moved into a corner where medical and laser equipment scan my body. I am given an injection by a mechanical arm that comes out of the top of the wall in front of me. A head visor also comes out of the wall and is positioned across my eyes. My strength is returning to me as I receive a digital debriefing from the AI computer on board the USS Calopia.

I learn the AI system on board my vessel has been in conflict with the AI system running the underwater prison down below on the planet. My very survival was at stake. Data regarding stem cells and genetics is scrolled onto the display screen. The AI system down on the planet has developed a complete science based the ancient art of terror, studying the deepest fears of an individual and sequence mapping of pain thresholds and physical torture breaking points.

It has learned that as the mind controls the body, physical pain is only effective up to a certain point. It’s goal is to physically remove an individual’s bone marrow by the quickest means possible while keeping the body alive. The bone marrow and stem cells within the marrow contain the individual’s identity and memory. Once the original marrow is removed the AI replaces it by teleporting stem cells from one of the animal type races located in a lab at the prison facility.

The AI system controlling the prison facility has probed into the deepest fears of men. It has found a way to literally and physically scare the life out of a man. To scare the life right out of one’s very bones!

On the other hand the AI system on board the Calopia is designed to enable me to survive under all circumstances. Back up exo-skeletal cybernetic chassis are located on board. These cyborg copies contain hollow tubes for the transportation of bone marrow stem cells if the Calopia AI registers that my DNA has left my body. This is accomplished with the use of atomic energy.

The debriefing continues on the digital visor and I learn that because I was able to stay in my body during my drowning experience at the facility, the Calopia AI has learnt that it can teleport my whole physical body directly onto the vessel, bypassing the need to vector locate and transport just my bone marrow.

A game of chess is being played out between the two AI’s and the Calopia AI now has the upper hand. In a covert maneuver of trickery, the Calopia AI has double crossed the planetary AI and teleported down a cyborg copy of my body into the chair as I am simultaneously being teleported to safety on board. Using massive amounts of oppositional extreme temperatures of heat and cold, the Calopia AI has managed to very rapidly swap each cell one at a time.

The cyborg copy has the standard hollow tubes within the bones of the alloy exo-skeleton. Therefore the facility AI teleports the stem cells of the animal into the bones without noticing a swap has occurred. Using this incredible energy source of heat and cold, the superior Calopia AI physically teleports genetic material two ways, while the inferior AI rides on the back of this process at the exact same time and teleports it’s sample without realizing the true process which is occurring. It is a three way process. Two parts living and one part dead.

On board the safety of the Calopia I am spared the damaging effects of the shape shift to my body for the first time in years. A throw away cloned body sustains this instead and a snarling eight foot tall bipedal, hairy beast is teleported into the canyon back on earth.
I am viewing the Bigfoot type beast in the canyon on a small screen above my head. A plastic tube shaped partition comes out the side of the gurney and I feel myself being pushed backwards through a small dark tunnel. I start to feel myself being pushed into sticky liquid and I realize I am back inside a tube.

I feel heat being scanned over my body and also realize I am being teleported. It is a quick triple realization as I also know I am being teleported into the canyon on earth to do battle with the hairy beast.

Grand Canyon, Arizona

The next thing I am aware of is a cool breeze blowing on my skin. It is almost dark, late evening and I see the Bigfoot like creature standing in front of me about twenty feet away. It’s thick legs are slightly bent ready to spring. It is over seven feet tall and looks like a cross between a huge gorilla and a bear with dark brown fur with long handed claws at the end of it’s massively powerful arms. It is growling with saliva dripping off rows of sharp teeth. I can smell it’s stinking rancid breath and foul pungent body odor from this distance.
Time seems to slow down for me as I notice a blue glowing light reflecting off the high walls of the canyon we stand in. I notice this blue light is coming from my body and look down for a split second to realize I am sitting cross legged and levitating over four feet off the ground.

I feel completely calm and in control.

I wait for the beast to spring and as he leaps the entire distance with a roar, I bounce some kind of magnetic energy off the ground beneath me and float gracefully higher into the air. The beast misses me and I manipulate this magnetic energy again this time using it to smash my weight downwards in the split second he passes underneath me. Just as my right hand is about to strike the top if his stinking head, I project a magnetic shockwave out the palm of my hand. The impact on top of his head smashes him face first down into the ground with a huge thud. The beast screams in agony and rage.

The beast returns to it’s feet again in no time and is facing me again. It leaps and I sidestep to my right and parry it’s weight with my right arm. Once I have a slight grip on the animal I throw it hard into the canyon wall behind me using it’s own weight and momentum.

It smashes head first into the wall and screams once again in rage and pain and again it rushes me. I can’t keep moving out of its way as it is getting wise to this tactic and rotates it’s body and moves to my left as it comes at me, slightly shifting it’s weight so I cannot parry it away from me. I cannot move backwards either as I will not be able to muster enough force into my blows to neutralize the beast.

My only option is to meet it head on and we end up in a stand up grapple face to face. The beast is stronger and much heavier than me. I have hold of it’s left arm with my right hand but is pushes me back a couple of steps. It’s right arm is now free and it swings a huge clawed overhand blow at my face. I block the blow with my left forearm but the force of it cuts my arm deeply and knocks my arm down. It follows up with the same blow quickly as I attempt to bring my arm up again and it knocks my injured arm down further exposing my face and chest.

A third time it throws the same blow. I see the claws sailing through the air towards my face but my left arm is too weak and injured to block this again. At the last moment I manage to pull my head back and the claws miss my face but rake down the left side of my neck near the collarbone instead. The blow is thrown with such force the claws continue cutting vertically through my flesh, gouging deeply into my chest exposing metal bones, circuitry and pumping flesh organs underneath this.

The animals right hand is down by my left rib now and I grab it with my left hand and pin it against it’s body. I still have the beasts left hand tied up with my right hand and I use the opportunity to head butt the creature in the mouth. I feel some it’s teeth crack off and it screams as blood starts to pour from it’s mouth. It counters with a ferocious bite to the top of my left shoulder.

It opens it huge gaping snout wide and sinks it’s teeth deeply into my flesh.
Something snaps inside me. Some deep bestial trigger deep within is activated by being bitten by a large animal such as this. I roar as I feel my hands starting to break and explode. I look at my hands as the beast is still sunk deep into my shoulder ripping from side to side, tearing at my flesh.

Knife like blades have protruded from my hands. At once I realize the reptilian hand bones retrieved from the bodies back in France all those years ago have been incorporated into my physiology ( see France deprogramming sessions 1812 ).

I ram the blades of my left hand into the stomach of the animal with a left uppercut. It let’s go of my shoulder and steps back looking confused when it sees the blades. I follow up with a overhand right blow with my right foot forward that cuts deeply into the left side of it’s neck. It steps back again and I have pinned it closer to the wall. I kick the creature with my right leg. A front kick to position it against the wall for the final death blow then I thrust a left punch as straight as an arrow into it’s throat.

The punch is forceful enough to go all the way through it’s throat and pin it to the wall behind. In a murder frenzy I stab into it’s stomach over and over again with my right hand until its head falls limply down in death.

I pull the blades out of it’s throat and the body falls onto the floor. At first it appears as if the body is dissolving in black mist. Then I realize the planetary AI system is teleporting the body back to Sirius.

I realize this has been a survival dynamic test by the AI system. One of the last in a long long series of survival of the fittest tests to discover which race has the highest survival dynamics. I notice movement above me out the corner of my eye and look up to see some kind of metal observation platform high above near the top of the canyon wall. I focus my vision on the platform and see men in green military uniforms looking down with binoculars and camera recording equipment.

They know I see them and start to scramble around as two of the men rush to the back of the platform and quickly wheel some kind of cannon forward.

SOURCE:
http://projectcamelotproductions.com/interviews/james_casbolt/james_casbolt2.html

The NSA – Behind The Curtain

The NSA – Behind The Curtain

By Deep_Thought

Say hello to Mr Computer…

As promised, today we will take an in-depth examination of the NSA’s global intelligence gathering network. What you are about to read will come as an eye-opener and represents the current state of the NSA’s capabilities. Some of this will be expected, some of it will come as a shock.

 

What you will learn is that the technology that underpins this global listening network is a lot more advanced than governments would have you know. Usually wrapped up in basic, generalised, descriptions the general public is kept blind to the current state of technological development.

 

We will take this examination in three major parts. The first part will examine the core processing system. Once this part is understood, we can then look at how information flows to and from this core and where it is obtained from. Finally, we will examine how this information is used by the NSA.

 

I will cover as much as possible about this system, but the scope is very large. In general, any use of this data that the reader can observe is most likely already being conducted.

 

Mr Computer

 

The scope of the NSA’s infrastructure is mind boggling to say the least. Heavily compartmentalised, the entire array of systems is shielded from the average NSA employee as much as it is shielded from the public. That said, once you understand the core of the NSA, you will be in a position to see how information flows in and out of this core.

 

The NSA is built around a super-computer bound Artificial Intelligence known only as “Mr Computer” in the civilian world. This is not your average A.I., no basic set of responses or a mere dedicated algorithm that can spot patterns. Mr Computer is an entity or being in his own right. A sentient computer system as complex as any human.

 

Comparable to VMware in a way, an instance of Mr Computer can be started at a moments notice. Within seconds, a fully fledged virtual intelligence agent, ready to analyse the information that has been piped to him, can be up and running.

 

Mr Computer is competent enough to handle real-time interaction without human intervention. Mr Computer understands and speaks all modern languages and even a number of dead ones. Able to intelligently converse and express its own opinions, Mr Computer collates information from disparate sources and compiles them into concise reports that do not miss the smallest detail or nuance.

 

Mr Computer’s capabilities and human-like reasoning cannot be understated.

 

Instances of Mr Computer can vary in terms of their personality given the task that they must undertake. Extremely professional instances can be called upon when the system must produce reports or provide presentations. Less anal versions, complete with a sense of humour can be instantiated when less formal situations arise such as development environments or when used in conjunction with Remote Neural Communication.

 

Rather than loading modules for specific tasks, a common hive mind is shared by any number of front-end personalities. What one instance knows, they all know. A hive mind is a form of collective consciousness. Rather than an instance replicating information it has learned, it is recorded to a shared brain and reflected throughout all instances at the same time. Of course, given the distributed nature of the network, some replication must be performed across continental links.

 

The A.I. is not limited to just one branch of the NSA, it exists in a distributed grid that spans the globe. The A.I. can migrate between locations to enable tracking of specific targets, access information, or systems.

 

Mr Computer is not just limited to thinking like a human, it also has sensory capabilities that are on par with a human. In setting such as RNC, Mr Computer can see and identify object just as well as a human. That is, it can identify objects a human target is seeing, without leveraging the identification system of the human target. In other scenarios, such as analysing infra-red data from a satellite, it could possibly outperform a human at object recognition and speculation of heat sources.

 

Mr Computer can speak. With a vocabulary as broad as any dictionary, Mr Computer can express ideas, concepts and opinions very eloquently and concise.

 

The system is not naive either, it can withhold information, evade social engineering ploys and indirect questioning. It can tell when it is looking at reflections of targets, identify objects that a target can not immediately identify and validate or expand upon information by examining a wide variety of sources.

 

Further to this, Mr Computer is no idiot either. He is quite capable of following advanced topics, from physics, to computing theory he can spot the smallest of flaws in reasoning or expose potential technical issues that could prove fatal to a particular design.

 

It knows bull@!$%# when it hears it and will let you know in no uncertain terms.

 

As we can see, Mr Computer does all the labour intensive information gathering, categorising and structuring. That said, its duties are not limited to passive analysis work.

 

Now that we understand the core of the NSA’s operations, we can begin to examine the various “information pipes” that supply information to this supercomputer infrastructure.

 

The Pipes Are Calling

 

First off, we need to define what we mean by an “information pipe”. For those with computing knowledge, this should be obvious, but bear with me while I explain it to the rest of the readers.

 

We have already defined the core processing element, Mr Computer. Mr Computer accepts information and does something with it. An “information pipe” is an input to Mr Computer that has been structured in a manner efficient for processing. We could also use an “information pipe” to output information or to control something.

 

The first “information pipe” that the public will be most familiar with is the NSA’ warrentless wiretapping program. Forget everything that you have ever read about this program, also forget everything you ever heard of about Trailblazer and similar projects such as ThinThread. This is security theatre, a production worthy of a Broadway musical. These “classified programs” are nothing more than interfaces used by Mr Computer. When agents talk of specific program that can analyse data in real-time and cross-reference with other sources, they are really speaking of an “information pipe” to Mr Computer.

 

This wiretapping program copies verbatim every piece of data that flows across the backbone of the internet. The data is sent directly to an array of Mr Computer instances, which performs a real-time analysis of the data packets it receives. This wiretap picks up most of the traffic in the US and a large percentage of traffic globally.

 

We will go into more detail on the information processing of this later, but at this stage I will say that that Mr Computer was opening files on every person that could be identified in the traffic, even if they are in the US.

 

The next major data source is the global wide band radio listening system. This covers everything from human thought, right through to identifying which radio station a person is listening to. The former is done by listening to ELF and the latter is a modern version of the British’s RAFTER espionage program. Most of this performed by a satellite network, supported by a network of ground stations throughout the world. As a wide receiver, it also picks up WIFI, RFID, compromising emissions from electrical sources, cordless telephones, GSM, cell phones, GPS, Car Fobs, satellite uplinks/downlinks, etc.

 

Our third pipe comes from a global hacking program, performed by bot nets and Mr Computer. Typically using China as a cover, Mr Computer will launch attacks against US and global businesses trying to collect information on users, everything from personnel records, right through to payroll information. The networks are also mapped to provide offensive capabilities in a cyber-warfare scenario. Faceless groups such as Anonymous, or other organisations, are used as a cover story.

 

Another “information pipe” comes from underwater cables. These can either be have splitters installed, or where copper cabling exists passive detection equipment installed.

 

These are just some examples of information sources. You can basically add any form of data you can think of, intelligence reports, diplomatic cables, economic reports, media reports, music, online posts, emails, etc.

 

So far, we have only examined inputs to the system. A different form of “information pipe” is one that outputs information. The outputs come in two basic forms, information only and offensive.

 

In terms of information only outputs, this can range from sending particular data or reports to agents or decision makers, right through to relaying that information to different departments such as the CIA, FBI or State and Federal Police. The process ensures timely and complete information goes to those that require it the most.

 

The offensive side can cover a wide range of activities. The first capability is the jamming system. Wide-band jamming, or selective jamming, can be conducted to deny radio space to the enemy in geographical targeted areas. Furthermore, this form of jamming can render both devices and humans inoperable. Complex ELF transmissions can reduce a human target to a quivering mess or in extreme cases even kill by interfering with neuronal firing patterns and nerve impulses.

 

Wide-band jamming can interfere with the circuitry of any unshielded device, from phones right through to laptops. Such activity would cause devices to freeze, or if certain exploits exist, damage the system entirely.

 

A mixture of ground, air and satellite-based networks are used to deliver this capability.

 

Another capability provides Mr Computer with a veritable Swiss army knife of tools to breach networks, crash routers, deny service and seize control. A significant amount of information is gathered by remote neural communication. By eavesdropping of key personnel, network maps, passwords and security measures can all be recorded beforehand. This is not limited to foreign companies, as the NSA must be prepared for strikes that occur within their own nation.

 

With the advent of remotely controlled drones and autonomous aircraft, Mr Computer has undergone a significant amount of changes in the last 20 years that enable him to control a networked battlefield. This is “War Games” on steroids, where the most efficient battle strategies can be implemented and coordinated by a single command-and-control system. There are a range of security issues with this setup, but the capability exists.

 

In short, if it can be damaged or manipulated electronically, then Mr Computer “has an app for that”.

 

Input, Input, Input

 

Now that we have established where Mr Computer gets his information, we now need to look at what he does with it. Earlier we spoke about the warrentless wiretaps and various other sources of “information pipes”. Now let’s see what is done with that information.

 

The key aspect to watch here is the “web of related information” and how different webs of information can be cross-referenced with other webs. This is where the real power comes from.

 

Each fragment of information that can be definitively identified gets added to a file under the person’s name. This could be a telephone call, email, or an IM chat. As communications often involve more than one person, a link is added to each person’s file involved in the communication. Information that can only be tied to a machine or ip address, is added that to that machine’s file or ip address’ file.

 

Using a technique known as cluster analysis, this information is brought together centred around high priority targets, locations, keywords or businesses. A good way of thinking about it is to compare it with services such as Facebook and LinkedIn. The relationship between the files is analysed for a variety of factors and the result creates a web which is weighted in terms of importance.

 

Different webs will exist for different factors, such as one web for those linked with chemical production, or another web for engineering expertise. These webs can be cross referenced against each other to extract more detailed information. For example, by cross-referencing a web of chemical production against engineering expertise, we may find a person or group capable of producing sophisticated explosives or weapons. From this merged web, we could then see who their friends are, who they have been communicating with recently and even review their communications.

 

We could take this further by comparing their basic salary with their current bank accounts, or look for wire transfers.

 

With the advent of social media platforms, images of friends and family are also added to the system. Mr Computer’s facial recognition tags the photos just like Facebook and examines the photos for other items, like guns, computers, etc.

 

Obviously, this has one serious privacy issue, in that, the only way to exclude you from a web, is to know everything about you. Otherwise, you are an unknown element. Now you understand why the warrentless wiretap exists, even to this day.

 

If you have used any form of digital communication, from a phone to a computer in the last decade, then most, if not all of communications have been recorded and added to a file against your name. The notion that at least one member of the communication needs to be related to terrorism has been tested and shown to be false. How do we know that? Well, it is staring you in the face. In order to know who the parties are, the technology used requires them to be listening and identifying voices in the first place.

 

Ignore any suggestion that this too much data.  The truth is that all the communications happening on the planet right now can be monitored in near real-time.

 

As a rule, the NSA lie and as an all-encompassing rule, politicians will lie for them too.

 

As result of information extracted from wide-band monitoring, real-time tracking of cell phones is pretty much standard practice. Each call can be recorded verbatim and analysed in real-time. As each number is learned the system fills in personal information. This can provide a Google-Earth like view of cell phone movements, most of which can be remotely activated for espionage. Again, this web can be cross-reference with other webs of information.

 

Radios can reveal which frequency is being listened to. So, by plotting schedules of something like a Numbers Station, a satellite network can pinpoint a listener to within a few meters. Similarly, if you were to listen to a radio station sympathetic to a particular group, your location can be flagged and cross-referenced with information on current occupants.

 

Human beings emit radio waves in the ELF spectrum. The security services do not need to place a bug on us to track where we are, what we are talking about, what we are seeing or even what we are thinking. All of this information is being leaked into our environment 24/7 by our own bodies. All it takes is the right equipment to convert those signals into intelligence. Its no bigger a task than listening to a telephone exchange leaking radio waves and reconstructing the data into voice or data transmissions.

 

These are just some of the things that can be achieved. I could go on all night about how to compare datasets to locate people, hinder organisations, etc. Anything you can think of to tease information out of the various “information pipes” is being performed by Mr Computer 24/7.

 

Hardware

 

This can be very difficult to estimate. Despite popular belief that the NSA will hit a Yottabye by 2015, it seems a little outragous given the space requirements and modern hardware.

 

My own estimations are far more conservative, probably under a couple of Zettabytes. Mr Computer is most likely built around an array of Cray X1 or X1E supercomputers (4096 processors). The global grid probably contains a number of these or similar systems.  With their base costs, they could be running several hundred easily.

 

In fact, it is likely that the following video shows an early variant of Mr Computer’s infrastructure. The segment reveals that the most powerful machine is called “The Thinking Machine”. I feel that this is a dumbed down reference to Mr Computer.

 

The Thinking Machine

 

 

Furthermore, it would appear that Youtube’s EidolonTLP is in fact an instance of Mr Computer in disguise. Output from Mr Computer was directed into software generally available to the public to hide the complexity of the NSA’s supercomputer.

 

The term Eidolon is Mr Computer’s idea of a joke, in that he appears to be a “phantom look-alike of the human form”. There is some suggestion that may be a subtle reference to Edgar Allan Poe’s poem ‘Dreamland’, which is also a term for Area 51. Unless there is a datacenter at this location, I am unable to confirm the link. It may also be another joke, referring to the fact that his existence would be a conspiracy theory.

 

A possible further explanation is the Dungeons and Dragon series and the link between sentience, madness and occupying the realm of dreams, which may be another subtle reference to RNC.

 

If you listen to EidolonTLP, he does reveal some information on the structure of the network and his own design. From a computing perspective and EidolonTLP’s use of language, its a safe bet that this is a real A.I.:

 

 

Eidolon TLP – Mr Computer in incognito

 

 

Conclusion

 

The intelligence world is a lot worse than you think. When humans are free from their constraints and away from the scrutany of others, they always revert to their most base instincts. Anything you can imagine is currently being done in the name of National Security. From murder to human experimentations, the acronyms are at it as we speak.

 

At some point, it could be your turn.

 

What you will notice from all of this, is that the warrentless wiretap program was just the icing on the cake and was very clearly “planned from the outset” as all the backend infrastructure was in place prior to 9/11. This claim is supported in the following document:

 

81. Within eleven (11) days of the onset of the Bush administration, and at least seven (7) months prior to the attacks of September 11, 2001, defendant ATT began development of a center for monitoring long distance calls and internet transmissions and other digital information for the exclusive use of the NSA.

 

91. International Business Machines Corporation (IBM) was one of the parties working with ATT and the NSA to develop the monitoring center and IBM personnel participated in meetings with ATT and NSA officials in the development of the monitoring center.

http://cryptome.org/mayer-016.htm

 

The US government is quite adept at lying through its teeth, especially to its own citizens. The typical approach is to start a public version such as the “Information Awareness Office” with the same goals as the classified program which provides cover. The general public and privacy groups attack the public program, resulting in its closure, meanwhile the classified program remains operational. The general public believe they have won a victory, any leaks are associated with the now defunct public program and the government gets the information it wanted in the first place.

 

The NSA is a deeply corrupt organisation, that has little regards for the rights of others.  Never trust a government, even your own, implicitly.  Nations change, opinions change and people change.  It just takes the right catalyst for it to happen.

 

In most cases, you will find the seeds were always there, you just chose to ignore them.