@MarkFin9423
4 hours ago
The thing Gen-Z needs to keep in mind that should give them existential dread is that ID verification, Digital ID, AI, this is all the brain child of environmentalists. For the generation that do not know the ideology of environmentalists I will inform you right now. Environmentalists are some of the most evil ideologies on the planet. it's the more fancier but just as if not more evil brother of "U-gen-icks". The idea behind environmentalism is the idea that there are too many people on planet earth and that global warming can only be prevented through depopulation, never mind the fact that on the pollution front, it's corporations that are the biggest polluters of all. Simply put, environmentalists is on the front end used as a scam to enact more taxes on to the people in the name of protecting the environment when time and again, every prediction scientists makes about global warming is a bunch of paid bias BS.
On the back end, there are people, rich CEO types that genuinely want to depopulate the planet, because they would rather do that than to hurt their own profits by taking accountability for any poison they bring out that "might" affect the world at large . How do they do that? Replace all the jobs with AI so everyone is homeless(no clean food, no clean water, no healthcare access = shorter lifespans), Instill ID verification and digital ID so corporations can track and blacklists individuals who speak against their anti-human policies, and finally the one I did not mention, immigration, transitions every first world country into a third world country so the mixture of no clean food, clean water and healthcare eventually results in a lower population. This ideology is pure evil and keep in mind AI is being managed be environmentalists CEOS, most tech is run by environmentalist CEOS, banks are run by environmentalists CEOs. Let that sink in. In many ways Kingsman(the spy movie) kind spoiled the silent part out loud but it's not some convoluted evil plan using audio, it's a slow unaliving by a thousand cuts on all sides. That's my take anyways.
https://www.youtube.com/watch?v=RWDfmAD7rpE
4 hours ago
The thing Gen-Z needs to keep in mind that should give them existential dread is that ID verification, Digital ID, AI, this is all the brain child of environmentalists. For the generation that do not know the ideology of environmentalists I will inform you right now. Environmentalists are some of the most evil ideologies on the planet. it's the more fancier but just as if not more evil brother of "U-gen-icks". The idea behind environmentalism is the idea that there are too many people on planet earth and that global warming can only be prevented through depopulation, never mind the fact that on the pollution front, it's corporations that are the biggest polluters of all. Simply put, environmentalists is on the front end used as a scam to enact more taxes on to the people in the name of protecting the environment when time and again, every prediction scientists makes about global warming is a bunch of paid bias BS.
On the back end, there are people, rich CEO types that genuinely want to depopulate the planet, because they would rather do that than to hurt their own profits by taking accountability for any poison they bring out that "might" affect the world at large . How do they do that? Replace all the jobs with AI so everyone is homeless(no clean food, no clean water, no healthcare access = shorter lifespans), Instill ID verification and digital ID so corporations can track and blacklists individuals who speak against their anti-human policies, and finally the one I did not mention, immigration, transitions every first world country into a third world country so the mixture of no clean food, clean water and healthcare eventually results in a lower population. This ideology is pure evil and keep in mind AI is being managed be environmentalists CEOS, most tech is run by environmentalist CEOS, banks are run by environmentalists CEOs. Let that sink in. In many ways Kingsman(the spy movie) kind spoiled the silent part out loud but it's not some convoluted evil plan using audio, it's a slow unaliving by a thousand cuts on all sides. That's my take anyways.
https://www.youtube.com/watch?v=RWDfmAD7rpE
YouTube
The AI Crisis Has Begun.
The world is facing an unprecedented AI crisis. Artificial intelligence is advancing faster than anyone expected, and it's coming for the same jobs young people and Gen Z have spent years preparing for. Millions of roles could be replaced, from STEM fields…
😱1
@Baldy8653
4 hours ago
All a result of the financialization of the economy. Look at JP Morgan opening a new skyscraper in Ney York to continue stealing from people.
4 hours ago
All a result of the financialization of the economy. Look at JP Morgan opening a new skyscraper in Ney York to continue stealing from people.
Forwarded from David Avocado Wolfe
This media is not supported in your browser
VIEW IN TELEGRAM
Geoengineering goes mainstream. Climate Trails is NOW available on Amazon Prime or at ClimateTrails.com (1 min, 29 sec)
Join: @davidavocadowolfe 🥑
Join: @davidavocadowolfe 🥑
Forwarded from David Avocado Wolfe
This media is not supported in your browser
VIEW IN TELEGRAM
A former climate activist who broke up with the movement and healed from climate anxiety. (3 min, 3 sec)
Join: @davidavocadowolfe 🥑
Join: @davidavocadowolfe 🥑
Forwarded from PlanofAction
BioDigital Convergence
Part 6
The Network Connection & The Plan
THE PLAN
CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE
This plan outlines the ENTIRE CONTROL SYSTEM for the BioDigital Convergence !!!!
They laid out the groundwork under the Disguise of Cybersecurity.
It's clear on page 71 underneath the "Targeting" section that this will be used against us while disguising it as Cyber Security
PAGE 11
CYBER-PERSONA LAYER 1-27.
The cyber-persona layer is a view of cyberspace created by abstracting data from the logical network layer using the rules that apply in the logical network layer to develop descriptions of digital representations of an actor or entity identity in cyberspace, known as a Cyber-Persona (JP 3-12).
Cyber-Personas are not confined to a single physical or logical location and may link to multiple physical and logical network layers. When planning & executing cyberspace operations, staffs should understand that one actor or entity (user) may have multiple cyber-personas, using multiple identifiers in cyberspace.
For example, an individual’s account on a social media website, consisting of the username and digital information associated with that username, may be just one of that individual’s cyber-personas.
Conversely, multiple different users may share a single cyber-persona or set of cyber-personas.
Planners must understand that enemy use of cyber-personas can make attributing responsibility for cyberspace actions difficult.
Page 37
ELECTROMAGNETIC ATTACK TASKS 2-26
EA has the unique potential to affect enemy use of the EMS and attack the enemy through the EMS. Other offensive options can affect enemy use of the EMS but are likely to cause collateral damage outside the EMS, whereas EA uses the EMS for its effects.
EA tasks include
- Employing directed energy weaponry.
- Electromagnetic pulse
- Reactive countermeasures
- Deception measures
- Electromagnetic intrusion.
- Electromagnetic jamming.
- Electromagnetic probing.
- Meaconing.
PAGE 71
TARGETING
4-59. When targeting for cyberspace effects, the physical network layer is the medium through which all digital data travels.
The physical network layer includes wired (land and undersea cable), and WIRELESS (RADIO, RADIO-RELAY, CELLULAR, SATELLITE) transmission means.
WIRELESS COMMUNICATION
1) Graphene Radio Nanosystem
Graphene-based nano-antennas have been characterized for use in the terahertz band, enabling wireless communications at the nanoscale.
The physical network layer is a point of reference used during targeting to determine the geographic location of an enemy’s cyberspace and EMS capabilities.
THE PHYSICAL LAYER
BabbleSim
BabbleSim is a simulator of the physical layer of shared medium networks.
Its main objective is to be an aid to develop network protocols and network devices, and to be able to develop, debug and regression test target code in a controlled environment.
BabbleSim Architecture
The physical layer simulation (Phy) and each device run as independent programs each in their own Linux process(es).
In a simulation there will normally be 1 Physical layer simulation and a set of devices. Starting a simulation consists of executing the Physical layer simulation and devices.
Once all devices have connected to the Physical layer the simulation will start
Here's how we know they're doing this under the disguise of Cybersecurity.
Microsoft & the DOD
Azure & DoD IL6
Azure Government Secret maintains an Impact Level 6 (IL6) DoD provisional authorization (PA) at the high confidentiality, high integrity & customer-determined availability (H-H-x) information categorization.
It provides a direct connection to the DoD Secret Internet Protocol Router Network (SIPRNet) and is operated by cleared US citizens.
Azure Government Secret operates on secure, native connections to classified networks with options for ExpressRoute
and ExpressRoute Direct
For Private, resilient, high-bandwidth connectivity.
Part 6
The Network Connection & The Plan
THE PLAN
CYBERSPACE OPERATIONS AND ELECTROMAGNETIC WARFARE
This plan outlines the ENTIRE CONTROL SYSTEM for the BioDigital Convergence !!!!
They laid out the groundwork under the Disguise of Cybersecurity.
It's clear on page 71 underneath the "Targeting" section that this will be used against us while disguising it as Cyber Security
PAGE 11
CYBER-PERSONA LAYER 1-27.
The cyber-persona layer is a view of cyberspace created by abstracting data from the logical network layer using the rules that apply in the logical network layer to develop descriptions of digital representations of an actor or entity identity in cyberspace, known as a Cyber-Persona (JP 3-12).
Cyber-Personas are not confined to a single physical or logical location and may link to multiple physical and logical network layers. When planning & executing cyberspace operations, staffs should understand that one actor or entity (user) may have multiple cyber-personas, using multiple identifiers in cyberspace.
For example, an individual’s account on a social media website, consisting of the username and digital information associated with that username, may be just one of that individual’s cyber-personas.
Conversely, multiple different users may share a single cyber-persona or set of cyber-personas.
Planners must understand that enemy use of cyber-personas can make attributing responsibility for cyberspace actions difficult.
Page 37
ELECTROMAGNETIC ATTACK TASKS 2-26
EA has the unique potential to affect enemy use of the EMS and attack the enemy through the EMS. Other offensive options can affect enemy use of the EMS but are likely to cause collateral damage outside the EMS, whereas EA uses the EMS for its effects.
EA tasks include
- Employing directed energy weaponry.
- Electromagnetic pulse
- Reactive countermeasures
- Deception measures
- Electromagnetic intrusion.
- Electromagnetic jamming.
- Electromagnetic probing.
- Meaconing.
PAGE 71
TARGETING
4-59. When targeting for cyberspace effects, the physical network layer is the medium through which all digital data travels.
The physical network layer includes wired (land and undersea cable), and WIRELESS (RADIO, RADIO-RELAY, CELLULAR, SATELLITE) transmission means.
WIRELESS COMMUNICATION
1) Graphene Radio Nanosystem
Graphene-based nano-antennas have been characterized for use in the terahertz band, enabling wireless communications at the nanoscale.
The physical network layer is a point of reference used during targeting to determine the geographic location of an enemy’s cyberspace and EMS capabilities.
THE PHYSICAL LAYER
BabbleSim
BabbleSim is a simulator of the physical layer of shared medium networks.
Its main objective is to be an aid to develop network protocols and network devices, and to be able to develop, debug and regression test target code in a controlled environment.
BabbleSim Architecture
The physical layer simulation (Phy) and each device run as independent programs each in their own Linux process(es).
In a simulation there will normally be 1 Physical layer simulation and a set of devices. Starting a simulation consists of executing the Physical layer simulation and devices.
Once all devices have connected to the Physical layer the simulation will start
Here's how we know they're doing this under the disguise of Cybersecurity.
Microsoft & the DOD
Azure & DoD IL6
Azure Government Secret maintains an Impact Level 6 (IL6) DoD provisional authorization (PA) at the high confidentiality, high integrity & customer-determined availability (H-H-x) information categorization.
It provides a direct connection to the DoD Secret Internet Protocol Router Network (SIPRNet) and is operated by cleared US citizens.
Azure Government Secret operates on secure, native connections to classified networks with options for ExpressRoute
and ExpressRoute Direct
For Private, resilient, high-bandwidth connectivity.
❤1
Oh dear, the torturers home residential addresses, all went out onto the dark net.
What a shame, hey.
What a shame, hey.
😁1
Reminder, you have natural law rights to use fatal force in self defence.
Reminder, you have common law rights to use fatal force in self defence.
Reminder, you have Statutory rights to use fatal force (if reasonable in all the circs) ... in self defence.
Reminder, you have common law rights to use fatal force in self defence.
Reminder, you have Statutory rights to use fatal force (if reasonable in all the circs) ... in self defence.
🔥1
And all of your torturers home residential addresses are apparently leaked onto the dark web.
As I was saying, tragic, hey.
As I was saying, tragic, hey.
😁1