Kategorie: Time Travel/Quantum Paralleling

  • Researchers discover a 2 billion year old Nuclear Reactor in Africa / Naturally-Occurring Nuclear Fission

    „Researchers discover a 2 billion year old Nuclear Reactor in Africa
    Ancient Code by Ancient Code
    43.3kviews
    Two billion years ago parts of an African uranium deposit spontaneously underwent nuclear fission
    In 1972, a worker at a nuclear fuel processing plant noticed something suspicious in a routine analysis of uranium obtained from a mineral source from Africa. As is the case with all natural uranium, the material under study contained three isotopes- three forms with different atomic masses: uranium 238, the most abundant variety; uranium 234, the rarest; and uranium 235, the isotope that can sustain a nuclear chain reaction. For weeks, specialists at the French Atomic Energy Commission (CEA) remained perplexed
    Elsewhere in the earth’s crust, on the moon and even in meteorites, we can find uranium 235 atoms that make up only 0.720 percent of the total. But in the samples that were analyzed, which came from the Oklo deposit in Gabon, a former French colony in West Africa, the uranium 235 constituted only 0.717 percent. That small difference was enough to alert French scientists that there was something very strange going on with the minerals. These little details led to further investigations which showed that at least a part of the mine was well below the standard amount of uranium 235: some 200 kilograms appeared to have been extracted in the distant past, today, that amount is enough to make half a dozen nuclear bombs. Soon, researchers and scientists from all over the world gathered in Gabon to explore what was going on with the Uranium from Oklo.“
    „What was fund in Oklo surprised everyone gathered there, the site where the uranium originated from is an advanced subterranean nuclear reactor that goes well beyond the capabilities of our present scientific knowledge? Researchers believe that this ancient nuclear reactor is around 1.8 billion years old and operated for at least 500,000 years in the distant past. Scientists performed several other investigation at the uranium mine, and the results were made public at a conference of the International Atomic Energy Agency. According to News agencies from Africa, researchers had found traces of fission products and fuel wastes at various locations within the mine.
    Incredibly, compared with this massive nuclear reactor, our modern-day nuclear reactors are not comparable both in design and functionality. According to studies, this ancient nuclear reactor was several kilometers long. Interestingly, for a large nuclear reactor like this, thermal impact towards the environment was limited to just 40 meters on the sides. What researchers found even more astonishing, are the radioactive wastes that have still not moved outside the boundaries of the site, as they have still held in place thanks to the geology of the area.“
    „What is surprising is that a nuclear reaction had occurred in a way that the plutonium, the by-product, was created, and the nuclear reaction itself had been moderated. This is something considered as a “holy grail” of atomic science. The ability to moderate the reaction means that once the reaction was initiated, it was possible to leverage the output power in a controlled way, with the capacity to prevent catastrophic explosions or the release of the energy at a single time.
    Researchers have dubbed the Nuclear Reactor at Oklo a “natural Nuclear Reactor”, but the truth about it goes far beyond our normal understanding. Some of the researchers that participated in the testing of the Nuclear reactor concluded that the minerals had been enriched in the distant past, around 1.8 billion years ago to spontaneously produce a chain reaction. They also found that water had been used to moderate the reaction in the same way that modern nuclear reactors cool down using graphite-cadium shafts preventing the reactor from going into critical state and exploding. All of this, “in nature”.“

    „Several specialists talked about the incredible Nuclear Reactor at Oklo, stating that at no time in the geologically estimated history of the Oklo deposits was the uranium sufficiently abundant Uranium 235 for a natural nuclear reaction to occur. When these deposits were formed in the distant past, due to the slowness of the radioactive decay of U-235, the fissionable material would have constituted only 3 percent of the total deposits – something too low mathematically speaking for a nuclear reaction to take place. However, a reaction took place mysteriously, suggesting that the original uranium was far richer in Uranium 235 than that in a natural formation.“
    Source: https://www.ancient-code.com/researchers-discover-a-2-billion-year-old-nuclear-reactor-in-africa/
    „Naturally-Occurring Nuclear Fission
    James Masters
    March 19, 2013
    Submitted as coursework for PH241, Stanford University, Winter 2013
    Introduction
    This report will explore the subject of naturally-occurring nuclear fission reactions, focusing on the reactors of Gabon, Africa, which were operational approximately two billion years ago. This is intended to complement a past report, with this report having an emphasis on the following topics: the analysis of Xe isotopes from the Gabon sites to elucidate the operation of the reactors, the natural reactors as models for the management of modern nuclear fission waste, and the implication of the reactors‘ operation on the possible variance of the fine-structure constant (α) over time. [1]
    Background
    In 1972, a researcher analyzing uranium from the Oklo deposit in Gabon, Africa discovered that the samples contained a U-235 content of only 0.717 percent, significantly less than the 0.720 percent typical of modern uranium ore. Further, researchers found that at least one portion of the Oklo deposit was depleted, with approximately 200 kg of U-235 missing. [2] In addition, the depleted region of the deposit was found to be rich in nuclear fission products. This suggested that the uranium deposit had undergone a self-sustaining fission reaction that consumed the missing U-235 and generated fission products. [2,3]
    The idea of a naturally-occurring fission reaction had been postulated in 1953 by Wetherwill and Inghram and further studied in 1956 by Kuroda. [2,4,5] As discussed elsewhere, the Gabon sites (16 in total, between the Oklo mine and the neighboring Okelobondo uranium mine) satisfied the conditions (e.g., appropriate size, presence of a moderator, and absence of neutron poisons) that had been proposed for natural fission reactors. [1] One criterion is particularly of note – while a modern, natural uranium deposit could not become a reactor due to its decreased U-235 content (0.720 percent), at the time that the Gabon reactors were operational, natural uranium contained approximately 3 percent U-235. This higher concentration enabled the self-sustaining fission reactors; in fact, it is comparable to the level of U-235 enrichment of the uranium fuel used in most modern nuclear power stations. [2]
    Interpreting Xenon Isotopes
    Meshik and co-workers studied (via mass spectrometry) the isotopic composition of xenon from Oklo rock, in order to probe the nature of the Gabon reactors. The researchers initially made two surprising discoveries. First, they observed that the xenon was not largely located in uranium-rich mineral grains as they had anticipated but instead was found in aluminum phosphate minerals. Second, they observed that the isotopic distribution differed from that of modern nuclear reactors. Of the nine stable isotopes of xenon, the material from Oklo was depleted in Xe-136 and Xe-134. [2] Meshik and co-workers recognized that none of the xenon isotopes were produced directly by the fission of uranium itself but, instead, were formed by the decay of other fission products (specifically, radioactive iodine and tellurium). Thus, they recognized that the formation of the various xenon isotopes would be dependent upon the lifespans of their precursors. This would result in Xe-136 forming within one minute of the initiation of the self-sustained fission reaction, with Xe-134 forming after one hour, with Xe-132 and Xe-131 forming within days, and with Xe-129 only forming after millions of years. [2]
    These key insights led Meshik and co-workers to propose that the Gabon reactors likely operated through a series of „on/off“ cycles. [2,6] Essential to this conclusion was the proposal (by Meshik and others) that the reactors were moderated by water. [2,3] In the presence of water, neutrons are slowed to thermal energies, and a fission chain reaction can occur. However, the heat generated by the reaction would eventually boil the water away, halting fission until groundwater returned. [2,3] This cycle explains the xenon isotope distribution: when the reactor was operating, the rapidly-formed Xe-134 and Xe-136 gases were driven off, but the precursors that would ultimately yield Xe-132, Xe-131, and Xe-129 were incorporated into aluminum phosphate minerals as the reactor cooled, during an „off“ cycle. This explains the absence of Xe-134 and Xe-136 from these aluminum phosphate minerals. Moreover, this dependence on a water moderator could also explain the absence of xenon from the uranium-rich mineral grains: the water would have washed away the water-soluble tellurium and iodine isotopes that would have led to xenon. [2]
    From the Xe-131 / Xe-134 and Xe-132 / Xe-134 ratios of the aluminum phosphate from the Oklo site, Meshik and co-workers calculated the operating schedule for the Oklo reactors. Their calculations indicated a 30-minute „on“ period of fission (with concomitant boiling of the water moderator) followed by a 2-hour, 30-minute „off“ cooling period before water returned and the reactor again became self-sustaining. [2,6]
    Implications for Waste Disposal
    As the Gabon reactors produced large amounts of radioactive fission waste products, they have been studied as a natural model for fission waste management. Meshik has highlighted the ability of aluminum phosphate minerals to store fission products, including gaseous products, for billions of years. Such storage could be an alternative to the venting of radioactive gases from nuclear plants into the atmosphere. [2] In addition, Gauthier-Lafaye has examined the topic in great detail. Specifically, Gauthier-Lafaye has noted that many fission products from the Oklo reactors (e.g. Pu, Th, Zr, Ru, Rh, Pd, and rare-earth elements [REE]) have been retained, by virtue of their high solubility in uraninite and low solubility in groundwater. Furthermore, other matrices such as apatites, chlorites, and clay minerals have been implicated in the storage of actinides and fission products. [7] The rate of dissolution of the Oklo uraninite and the subsequent release of its stored fission products has also been discussed. Gauthier-Lafaye notes that although uraninite dissolution has been observed, the present existence of uraninite (two billion years after the reactors were operational) suggests that the dissolution rate is very low. This high stability of uraninite has been explained by the presence of a reducing environment (mediated by Fe(II) minerals) and by natural protection of the material by clay minerals and organic material. [7]
    Thus, the Oklo reactors constitute a useful long-term study on the storage of nuclear fission products, and the fact that the products have been stored so effectively by these various means suggests that similar storage techniques could possibly be employed for the storage of fission waste from modern reactors.
    The Time Variation of the Fine-Structure Constant α
    The fine-structure constant (α) is a fundamental physical constant which affects a multitude of physical phenomena. Its relation to other physical values and its approximate value are as follows: [8]
    α = e2/2ε0hc ≈ 1/137
    As Barrow and Webb note, the precise value of this constant has a significant impact on physical events: the value affects the density of solid matter, the temperatures of chemical bond dissociations, and the stability of nuclei. If the value of α were to become greater than 0.1, nuclear fusion would be impossible. Furthermore, a shift of just four percent in the value of α would yield a change in the energy levels of carbon nuclei so dramatic that its production in stars would not occur. [8] Given that α has such in importance to fundamental physical processes, there has been significant interest in studying how the value of α may have changed over time. With nuclear processes having such a strong dependence on even minute variations in α, the Gabon reactors play an important role in determining the degree to which α may have changed over a very long period of time.
    In 1976, Shlyakhter recognized that the operation of the Oklo reactors was dependent upon the ability of Sm-149 to undergo neutron capture. He also he recognized that, in order for this process to have occurred at Oklo, it was necessary for a value of a particular resonant energy level of the Oklo Sm-149 to be very similar to its present value. This resonant energy level is dependent upon α and, thus, is sensitive to changes in α. [8-11] From the isotopic composition of samples from Oklo, the capture cross-section value (at the time that the reactors were operational), as well as the possible range of its variation, could be determined. From this, the upper boundaries for the range of variation in the resonance energy level and, therefore, in α, could be determined. [11]. Shlyakhter thus determined that the rate of change of α (specifically, [rate of change of α]/[α]) must be < 10-17 / year. [11,12] In 2004, Lamoreaux and Torgerson analyzed the Oklo reactor data and its implications on the time variation of α. [13] A key aspect of their analysis was the recognition that the uranium present in the Oklo reactor could act as a 1/v neutron absorber, a factor which alters the neutron energy spectrum of the reactor. Taking this into account, Lamoreaux and Torgerson calculated that the value of α has decreased over the past two billion years. Specifically, they calculated the |[rate of change of α]/[α]| to be < 3.8 x 10-17 / year (95% confidence). [13] In 2006, Petrov and co-workers published a comprehensive analysis in which a complete computer model of one of the Oklo reactors (RZ2) was constructed. [12] Using this model, the researchers determined the averaged cross section for Sm-149, which was then used to determine the limits on the variation of α. Petrov and co-workers determined these limits to be -3.7 x 10-17 / year < [rate of change of α]/[α] < 3.1 x 10 -17 / year. [12] Thus, their analysis indicates that a distinct increase or decrease in α over the past two billion years is not a certainty. Conclusions Petrov and co-workers commented that "the discovery of the Oklo natural nuclear reactor in Gabon (West Africa) in 1972 was possibly one of the most momentous events in reactor physics since 1942, when Enrico Fermi and his team achieved an artificial self-sustained fission chain reaction." [12] As discussed herein, the implications of this event have been significant and far-reaching. The discovery, geological distribution, and isotopic pattern of fission products (namely, xenon) led to significant insight into the operation of the Gabon reactors, which may find additional utility should evidence of other natural reactors be found in the future. The discovery that the reactor fission products were well-contained and were resistant to dissolution in groundwater may suggest methods of managing modern nuclear waste products. Finally, the very fact that the reactors were operational at all has stimulated discussion regarding the time variation of a fundamental physical constant, leading to comprehensive analyses of the reactor data in an effort to answer this important question. Given the manifold consequences of these natural fission reactors, the statement by Petrov and co-workers rings true, with the story of natural nuclear fission being one of special interest within the realm of nuclear physics. © James T. Masters. The author grants permission to copy, distribute and display this work in unaltered form, with attribution to the author, for noncommercial purposes only. All other rights, including commercial rights, are reserved to the author." Source: http://large.stanford.edu/courses/2013/ph241/masters2/

  • Emery Smith – Ex-Space Programm Whistleblower berichtet über seine Begegnungen mit Aliens und UFOs


    Conspiracy Revelation: 1.10.2019: Bringt das Thema voll in die Öffentlichkeit, genau das will das NWO-Verbrechersyndikat verhindern…gab schon wieder einen Cyberangriff und ein kybernetischer Interventionssabotageversuch, u.a. wegen diesem Thema.
    „Er sagt, dass es am effektivsten ist, die Selbstheilungsprozesse des Körpers zu aktivieren.“
    „So with a small amount of blood that we take from you, we can and concentrate a small amount of concentrating healing properties and inject them into the brain, into the joints and when you have a concentrated amount of your own proteins, your body knows there’s an excess amount and it speeds up the healing twice as fast.“
    „Man benutzt das Blut im Sinne einer Eigenbluttherapie.“
    „Everywhere, all of you, even in Germany, are using the Genesis concentrating system which I invented, I don’t own it anymore but um as if 3 years ago but I’ve been I developed it
    in around in year 2000, 1998-2000 and from there..got it FDA approved and now it’s sold everywhere in the world
    and I’m published at all the major universities here at the US and the military is also using it.“
    „The craft was separate from the body, the body was in the bio- research facility and the craft was in another research
    facility nearby.. 1992-1993.. the reason the surgeon brought me to the crack is we had to take a sample of the craft because the craft has DNA that matches the DNA of the person who was flying it.“
    „The craft was alive.. we noticed that craft when we go to crash-sites on crash retrievals, the craft are sometimes organic and conscious and the craft sometimes tries to
    heal itself once it it crashes and it also, at the same time, is trying to heal the occupants.“
    „They don’t want me talking about stem cells or teaching you how to cure yourselves, they don’t want me talking about zero point energy or free energy devices. If I talk all day about extraterrestrials and underground facilities, because there’s no money being made for me talking about
    extraterrestrials and underground facilities they do not want me talking about the other inventions and stem cells and zeropoint energy.“
    „The Technology is being repressed… to bring technology to the world that was kind of secret, but they wouldn’t let me
    and it was very hard to do. I was lucky to get this this cell concentrator out to the world, much less newer technologies, because Big Pharma was very aggressive with me with new
    technologies.“
    „Many, many different kinds of technologies..my favorite technology is, they have a special bed…it’s just a big flat bed, like it’s like the size of a pool table and when you lay somebody on the bed ..it shifts the holografic image above the body of your whole body…everything…and I can grab the visual and I can zoom in all the way to of your cells. I can locate the cancer in the body..I can send a frequency in to the body on the table just stereo-tactically to that area and eliminate those ten cancer cells…“a specific frequency you can heal…“..it’s coming out, slowly you know ever since I came forward a couple years ago they’re slowly releasing more and more this information and corporations are anxious to get a hold of it so they’re inquiring as well because most of the big corporations get most their stuff from the secret projects, little by little.“
    „so, yes, they’re using frequencies, you’re using scalar interferometry, they’re using harmonics to accomplish
    this…it gives off a different frequency on your own red blood cell…your body as a whole the two trillion cells then are vibrating, all the cells are vibrating and you give off
    one frequency but if you take a cell off of you
    it has its own frequency but working together all the cells make up you which is one ecosystem and one frequency that
    is measured by the you know secret government, so they know where you’re at all the tim,e because your body has a
    fingerprint frequency.“
    „Through my experience I would not have any negative extraterrestrial contact, I only had positive contact, so I am not saying there is not negative out there, because I know there is species that is really bad in the Universe.“
    „I don’t speak German, I have German DNA, I have Indian DNA, in the Universe all the extraterrestrials also intermingle,
    there’s no 100% pure anything, we are all muds, because they came from us.“
    „It´s all about education…we should educate..“
    „Emery Smith – Ex-Space Programm Whistleblower berichtet über seine Begegnungen mit Aliens und UFOs“
    „Im Zuge des 6. Kongresses der vereinten Wissenschaften erzählt uns Emery Smith etwas über seinen Begegnungen der 3ten Art . Er ist ein Veteran der US Air Force mit einer langen Geschichte von Einsätzen in hoch-klassifizierten, tiefschwarz verdeckten Operationen. Er war direkt an der Autopsie und Entnahme von Gewebeproben von über 3000 verschiedenen Arten von Außerirdischen beteiligt. Darüber hinaus habe er persönlich mehrere abgestürzte UFOs im Besitz des Militärs gesehen und deren Zusammensetzung und Einsatzmerkmale untersucht. Es gibt viele faszinierende und direkte Zusammenhänge zwischen Emerys Aussagen und denen anderer Insider, Forscher und Autoren. Er ist ebenfalls in dem Film „Sirius“ und Cosmic Disclosure für Gaia TV erschienen.“

  • Randy Cramer – Super Soldiers. Moon Bases And Mars.


    „Randy Cramer – Super Soldiers. Moon Bases And Mars.
    3.253 Aufrufe•Am 23.06.2019 veröffentlicht“
    „Created A genetically engineered super soldier from the ground up…mostly this is a nocturnal event, where I go to sleep and someone comes into my bedroom via
    localized wormhole technology with some people often refer to as a teleportation technology but you know it’s not exactly like transporter beam so because there’s
    a little portal or a door that has to come open that kind of specify that it’s localized wormhole technology, so one or two people would come through, wake me up,
    escort me through and we would do whatever the training situation was that particular evening now I know it starts to throw a curveball at people when you
    say time-travel as a factor because a lot of people are like: wait a minute, we don’t have that, you know, the Nazis were working on that technology in the 40s, we
    were working on the tech technology in the 40s, so we’ve really been cracking the time travel technology code for decades, it is absolutely some of the
    most classified and compartmentalized technology of all the covert technology, so even among people in the covert space program, the guys in Time Corps who have
    access to the really good time-traveling equipment and…have the time travel maps and have it all mapped out and everything that’s a whole other level
    of secrecy and a whole another level of what’s going on that I know very very little about other than that it exists and the military sections rely on the
    time corps guys to do all that plotting, so anytime you’re transporting personnel vehicles and so forth and there’s a time factor, just like … when you’re in
    a plane you report to the FAA that you’re going somewhere you file a flight plan you do the same thing with the time Corps time or plots are all out on their
    equipment and then…gives you instructions where and when and what way you go and get there and what time frames are allowed to use and how you’re
    able to bend a new time, so that for instance in one singular evening, where as often is the case this occurs between 2:30 and 4:30 a.m. and it is a
    consistent thing. I know a lot of other people who have military abduction experiences and it’s very consistently between like this sort of
    2:30, 3:30, 4:30 a.m. timeframe that lets say..someone comes in at 3 a.m. and then I come back at 3:15, but I’ve been away for a week, 10 days,
    because that was the training period and the time corps guys like I said they plotted that course, so that’s called a quantum dilation when you have that
    extension of time that essentially gets crammed into a shorter frame of time when you’re talking about your main timeline that’s called a quantum
    dilation. (Randy Cramer)“
    „But if I’m to understand the value of that integral of that solar inner solar intergalactic economy the
    covert military space program covert military Mars colony corporations that work there making trillions and
    trillions and trillions of equivalent dollars per year in all of that material so the notion that somehow down here on earth we are poor and we don’t have enough to help feed everybody and we don’t have enough to take care of everybody – it’s garbage – .. the planetary economy itself would be enough if we evened it out but when you include the intra solar in a galactic economy it’s ridiculous we can all be living like princes with if that wealth was you know evenly distributed around the planet which I’m not saying to evenly distribute all the wealth I’m
    saying that to make it so so much of it is concentrated in this very very tiny part right right to say the rest of us there’s scarcity and we don’t have enough for you it’s just lies on top of damn lies. (Randy Cramer)(2019)(23.6.)“
    „yeah… I understand..“
    „Sixteen squads of sixteen person else like 256 soldiers in that division we had a sister division Oh 97 another 256 soldiers plus officers and …other personnel so the division itself is much larger than 256 but the soldier base for each division of the special tactical operations division is 256 people so us our sister division two others supporting division so it was just over a thousand men and women soldier personnel on the ground that engaged in this battle which went very badly for us you’ll forgive me if I brush over some of it I don’t really like talking about it it gets me choked up and emotional and I don’t like you know remembering it too clear because it was an ugly ugly ugly massacre where there were just over a thousand of us that walked into that cave and less than thirty five of us came out of that cave and so uh…I feel very fortunate in ways that I cannot I cannot even describe how fortunate I feel to be alive knowing you know just that particular day what the odds were that I was not going to be alive at the end of that day given what the odds were that not everybody else was going to be alive game of that day and that I still am being alive at the end of that day is nothing less than miraculous to me. (Randy Cramer)(2019)(23.6.) “
    „Why were you going into the cave..?“
    „We were informed that it was we were after an artifact when I say artifact that just means anything that belongs to the native Reptoids or insectoids that could be a piece of technology it could be a piece of pottery it could be a statute could be a clay tablet or a metal you know cylinder that has inscription on it or something it could be a personable material it could be persons it could be a weapon technology or anything so when they say an artifact that’s a list of things that an artifact could be so okay given a location we were told where we needed go we were told where the entrance of this particular cavern was that this was a known sacred location for these reptiles and they kept this particular artifact in this location and that it
    was somehow going to be vulnerable for us to go get it but when we got there was no sign of anything. (Randy Cramer)(2019)(23.6.)“
    „They were jamming the localized wormhole technology that would have been able to sort o… get out, so a large wormhole that they used to sort of transport ships or vehicles through sort of appeared right over the top of us and pulled us right through it and a few people were caught on the event horizon of that and so they were like essentially limbs cut off or cut in half and so we ended up on a medical receiving platform you know with a bunch of people lying on the ground bleeding coming apart a few people standing shocked you know trying to look around
    and try and figure what was happening and all I could do was look down at you know my comrades who were bleeding out to death and calling for medics and kind of had a nervous breakdown you know I kind of wasn’t cool with all of this and and and really just kind of lost it and started swinging my arms pretty wildly and… knocked a couple orderlies .. in the head and the next thing I know like I’m just being tackled by medical technicians and… shot… with tranquilizers, so that …I just kind of faded into black from that experience and woke up in a chemical fog. (Randy Cramer)(2019)(23.6.)“
    „People want to hear that people wanna hear stories… we’re a ceature who loves stories.. we have been telling stories about our collective experiences since time
    immemorial, so people want to hear the stories, they want to know from the person who was there and they want to hear about that, I get it. I just want to emphasize though that this isn’t about me this isn’t about my story, I’m not doing this to get a bunch of personal attention, because I want personal attention I’m not doing this, because I want to sell a bazillion books
    on my story and I want to you know make a bazillion dollars off this that’s not why I’m doing this I am telling my story to gain attention towards the things that are much more important than me and my story which are the fact that we have a Mars colony, a lunar colony, a lunar space station, a covert military space program which is collectively holding on to technology which would have all the green energy technology we need all the clean air clean water renewable fuels technology we would never have to.. drill or frack ever again …we’d be able to clean all of our water clean the air we’d never have to worry about the environmental degradation that we’ve been going through we will have a cleaner process for everything the fact that we have that technology that it’s not a like I said it’s not 20 years of investment and R&D; to get there we have it it’s just a matter of getting it from the programs that have it in order to
    solve this problem so I’m not here to talk about me really I’ll tell my story I’m happy to share but what I really want to emphasize is I’m here so we can blow the lid off of secrecy, hello, let’s get through disclosure let’s get there because then we can actually fix some problems …then we can actually have clean green technology will never have to burn fossil fuels again and we will never have to have another airplane crash ever again, because we won’t have jets anymore , we’ll have vehicles that are traveling on magneto-gravitic-propulsion drives and glide through the air safely, fast and more cheaply that’sthe other interesting thing is that the technology in these programs to build spaceships is actually cheaper than the
    fuel and building jet engines the medical technology that can restore damaged limbs and regrow damaged organs is cheaper and less expensive than all of that pharma research and development
    and all of that making drugs and all of this invasive surgery technology all this other medical expense that we’re spending on is gargantuanly out of control as far as expensive all this other
    cheaper better medical technology is cheaper faster easier so why would we be doing something that’s ineffective expensive wasteful polluting when we have all the options of doing things
    cleaner better cheaper because we got there just there we just have to get those programs so that’s the main thing that I’m here to say it’s like this isn’t just about pipe dream hey we
    should talk about this hey maybe someday know you’ve got this technology you we got in these programs we need to get them to the public sphere so that we can fix the problem I mean we wouldn’t have to be sitting around fighting and screaming at each other about climate change if we could just fix some of the problems that are contributing to that we can fix some of the pollution
    problems we can fix some of the air and water and air quality ozone layer problems or technologically fixable so that’s one thing the second thing that is the most important thing is these
    programs who are acting covertly would like you to believe that they are operating under the covert operations law and that they are legal operating systems of covert military intelligence
    this is not the case they are violating article 1 of the Constitution they are violating the Constitution by not answering to the authority of the legislature and the executive branch and
    the supreme court, so by essentially not answering to the legal apparatus of government in this country they are acting illegally, they are rogue agencies, they are not legal, they are not in the legal authority to say: hey we can do whatever we want, they are criminals. (Randy Cramer)“
    „It is in danger because of this rogue criminal covert system, so we have the technology to fix everything, that’s one, it’s in these covert programs which are acting illegally. (Randy Cramer)“

  • Structures in Antarctica that cannot be explained!


    „Structures in Antarctica that cannot be explained!
    139 Aufrufe •Am 15.09.2019 veröffentlicht“

    Fascinating Mysteries
    215 Abonnenten
    Anyone who has a computer or a tablet with an internet connection can use Google Earth to explore the most remote places in the world from home. But one of the most isolated regions on the planet seems to be the most difficult to observe and has the most inconsistencies, although the mapping technology is the same as for the rest of the world. What are they hiding from us?
    Music: „Curse of the Scarab“ Kevin MacLeod (incompetech.com)
    Licensed under Creative Commons: By Attribution 3.0 License“





  • Thomas Jefferson: President, Founding Father, Hemp Pioneer & Hemp defeats Mind Control

    „Politics
    Thomas Jefferson: President, Founding Father, Hemp Pioneer
    James McClure
    Apr 14, 2017
    Before becoming the third U.S. president, Thomas Jefferson – who was born 274 years ago this week – was an industrial hemp cultivator, growing acres of marijuana’s non-psychoactive cousin on his Monticello plantation.
    Jefferson wrote extensively about best cultivation practices for hemp during his life, he invented a tool to improve hemp harvesting, and he even left us with a statement on hemp that has become a rallying cry for the movement to legalize hemp, which was prohibited along with marijuana back in 1937.
    „Hemp is of first necessity to the wealth and protection of the country,“ Jefferson once reportedly said. That’s because it was used to make rope, sails and other textiles that were essential for keeping colonial America’s navy afloat.
    And Jefferson wasn’t the only commander-in-chief to cultivate hemp. President George Washington also grew acres of it at Mount Vernon. And he referred to cultivation practices over 90 times in his personal diaries.
    „I am very glad to hear that the Gardener has saved so much of the St. foin seed, and that of the India Hemp,“ Washington wrote in 1794. „Make the most you can of both, by sowing them again in drills. . . Let the ground be well prepared, and the Seed [St. foin] be sown in April. The Hemp may be sown any where.“
    Ironically, both Washington and Jefferson would be arrested today if they were caught growing hemp in one of the 20 states where it is still illegal. Those include Texas, Florida and New Jersey. But their home state of Virginia legalized hemp cultivation back in 2015, so they would still be allowed to grow it in Mount Vernon and Monticello — unless Attorney General Jeff Sessions raided them for defying federal cannabis prohibition.
    And if anything sums up just how absurd America’s cannabis laws are, it would be the sight of two founding fathers getting cuffed and hauled away by DEA agents for growing a harmless plant.“
    Source: https://www.civilized.life/articles/thomas-jefferson-and-other-founding-fathers-on-hemp/
    „Cannabis Paste BREAKS MIND CONTROL.
    ‚Doc‘ Peter has been sharing the truth that cannabis restructures new pathways in the brain so that they can’t control your mind when you are taking the healing cannabis paste. …They stifled cannabis in 1937 because they did not want 300 million people being conscious.
    August 12, 2003) – According to Cathy O’Brien, a former mind-controlled sex slave for the gov, they would let slaves take all the drugs they wanted, except marijuana. Why? Because marijuana usage made it impossible to mind control them. It doesn’t allow for the compartmentalization of the mind to take place. Since I heard her say that on a video a few years ago, I have understood the „war“ on drugs in a little different way. I think you might find this of interest!
    „Marijuana Disrupts Mind Control Programming: 60.667 Aufrufe“
    „Enjoy doc peter’s link on the healing medicine from mind control and other issues– doc’s paste link at; https://hemppastehealing.com“
    //
    Conspiracy Revelation: 5.9.2019: Nothing new…but the rigged Casino ShadowGov Mafia losers want to make sure to have everything under their rigged and implanted rules, keeping the world in a truman-show-retardation-loop…fearful and cowardly…if they were manly they wouldn´t need tons of traps, implants, bioweapons, predictive weaponized artificial life forms and intelligence, mind control, remote brain espionage, directed energy weapons, brainwashing, mass-hypnosis, neuro-weaponized remote torture, pre-time traveled presidents, totalitarian invasions and complete media censorship, weaponized satellites and asymmetrical warfare…a club of losers in front of the highest holy forces…people who went through this understand exactly why I wrote what I wrote in this harsher form…no respect for these dregs from the bottom of the pit that ruined and/or sabotaged millions of innocent lives in the most cruel and stealthy way.

  • ANALYSIS OF THE ALL SEEING INTERNET EYE / Asepuforensics.blogspot.com 2008 Retro View NeoStormSystem

    Conspiracy Revelation: 23.8.2019: My 2008 IT Forensics Conspiracy Revelations concerning the global NWO Lockdown…11 years ago and more relevant than ever..
    BTW..We know that it is largely the way how the NSA-Tailored Access Operations communicate…who else would use such extreme means to subvert the entire globe…but what are these Crime Syndicate Nazionists against the True God and the True Goddess…they will get shown their limits…and will become restricted in their expansive evilness and their unlimited power hunger by revealing everything of their criminal conspiracy to take over the world.
    „ANALYSIS OF THE ALL SEEING INTERNET EYE
    MORE AND MORE PEOPLE NOTICE THAT THERE IS SOMETHING HIDDEN, SOMETHING THAT SEEMS TO CONTROL OR SURVEY THE WHOLE INTERNET. ANTIVIRUSES AND FIREWALLS REMAIN QUIET, OPERATION SYSTEM LOOKS CLEAN BUT WHEN YOU START ANALYZING INTERNET TRAFFIC SOMETHING BECOMES REALLY ODD AND IT SEEMS AS YOU ARE WATCHING INTO A GLOBAL PANDEMIC SURVEILLANCE SYSTEM. THE ALL SEEING INTERNET EYE.“
    Also check my immense -world record setting- amount of unreal conspiracy revelation work in the archives during the last 20 years..maybe it helps people to bring the Uber-Monster down one day..

    The Real S-Conspiracy – the old CMOS.Rootkit.Virus (Update 2024 in deutsch)

    NSA Attacks citizens with Hardware Rootkits

    Branch – Problem – Reaction – Fake Solution – NWO Zionazi-Pathocratic-Archontification-Corporate-Deception Truman-Show-System Unmasked.

    How Private Contractors Have Created a Shadow NSA, Prism, Facebook Uefi CMOS Malware & CPU Trojans


    http://infinityexpression.com/2017/08/facebooks-federal-trojan-decyphered-aka-zombiehost-aka-pid6-dod-nsa-backdoor-and-firewall-bypass-example/

    Why are most IT security companies insecure or better said in bed with NWO?


    Introduction
    Internet bless on one side ban on the other side.
    Nowadays we have more threats to face then ever when surfing the internet, the more experienced we become the more scepticism may occur. No day goes by without horror news about sophisticated malware and the permanent progression of pests. „Human being the most cunning of all animals“ once was said. In Internet this phrase reaches a new quality. The importance of the web grows day by day and more and more people become dependent on it.
    But the most hidden thing could be located in your net packets. …
    I know that many people have a vague impression about something that is deeply hidden in their systems. They try to protect themselves with antiviruses, firewalls, antispys, antirootkits or security suites, keep their systems examplary up-to-date but they still feel surveilled and this for good reasons.
    Many security forums are not well-disposed if people post things about unknown occurences and possible conspiracy theories about global danger and spy attacks, multiplatform malware from the hidden. In many cases the established forum mob intends to shift all those people into paranoid area and try to kick them out of focus. Unfortunately many voices become silent due to the pressure and attacks they receive for their discoveries. There must be a reason why so many try to run dry the revelations of unknown and hidden things and no the reasons are not because all those claims are invented but because we hit the nerve of something that wanted to stay hidden and now yells out. Events like this are real more real than most might believe. I will try to give a little impression of what I observed.
    POSTED BY NEOSTORMSYSTEM.
    THURSDAY, OCTOBER 2, 2008
    Power Supply
    ASI.Eye also heavily affects the power supply, actually it is unknown to which degree but there is a high probability that it is able to destroy the power supply. The latest trick of Eye that I observed is a 5 second cycle sleep and wake up game of the power supply unit. You set your system into sleep mode then some times later you wake it up but your system remains in a endless sleep and wake up loop at cost to the health of your power supply. You have to pay attention their favorite loop time is 5 seconds you can count that in many situation when they try to manipulate computer systems.
    POSTED BY NEOSTORMSYSTEM AT 2:27 AM NO COMMENTS: LINKS TO THIS POST
    THURSDAY, SEPTEMBER 18, 2008
    More information about A.S.I.Eye
    A.S.I.Eye must use a kind of automatic information management system otherwise it wouldn´t be able to control possibly each and every pc system that connects to the internet. There is one guy who seems to be the chief they simply call him BOSS (original content of network sniff):
    There exists several other typical catchwords everyone might be able to identify them with ease, such as following (the most significant designations, catchwords and names over the past three months):This should prove the existence of all seeing internet eye. Take a closer look this happens to most people everyday when they surf the internet as usual. Most machines will likely be part of a stealth information bot collection system and part of a vicious secret chat community.

    POSTED BY NEOSTORMSYSTEM AT 8:59 PM 2 COMMENTS: LINKS TO THIS POST
    SUNDAY, AUGUST 17, 2008
    Core Problem: static http/s tunneling
    One of the core problem that allows A.S.E to do his job quite effective is what I call static http/s tunneling. You can´t evade a primary static tunnel system like that because you need a browser to surf the internet. IMHO, there are actually not many possibilities to prevent static http/s tunneling. ALF (application level firewall) was a try worth but couldn´t prevent the information flow of A.S.E for long. Apparently it used kind of http exploit or http request smuggling to circumvent the proxy wall, further disadvantages might be slow down of general internet activities and errors of several services. What about SPI (stateful packet inspection) mostly found in nowadays routers, blocks outside potential harmful traffic and ddos but is vulnerable against http tunnels. If http traffic adapts to standards and is encrypted and embedded in http, firewalls remain powerless. This can be considered as one of the key vulnerabilities of the internet. All bypassing Eye could use hidden tunnel streams to evade all security setups.
    POSTED BY NEOSTORMSYSTEM AT 7:06 AM NO COMMENTS: LINKS TO THIS POST
    Ethernet and Router as gates?
    The question is can we explain this phenomenon with the latest threats like direct attack of network and ethernet cards and manipulation of routers? Probably at least partially. One thing that never should come out of focus is the direct cpu or microcode manipulation this seems to be very close to the attack of the bios and soon also to efi. Several people reported and even proved that such occurances are more than real. Also more reports talk about special prepared udp packets that virtually replace the usual executable malware which means while connecting to internet you could be directly affected without doing much wrong. That means the problem exists not behind the computer the mistake is inside your computer in combination with the vulnerable and unsecure structure of the internet.
    It is crucial to create awareness, so that many people don´t waste their time trying to hit the evil on the wrong side. Visualize about a Zombie (Exploit, Virus) that always stands up no matter how hard you hit him (security tools) he will always come back. It won´t help if you bash him (regular updates, system hardening, backups) it also won´t help if you start using haphazardly weapons (antivirus, antispy..) you may blast him away a part of his body but he will stand up again and again. You must analyze how it is constituted to get a possibility to punch evil on the right side.
    POSTED BY NEOSTORMSYSTEM AT 5:00 AM NO COMMENTS: LINKS TO THIS POST
    SUNDAY, AUGUST 10, 2008
    The ultimate tunnel?

    I made some experiments trying to see how the assumed all seeing and all bypassing internet eye would react on restrictions. I started to install top of the notch firewall, using latest updates, 64 bit, windows vista, restriction/block of java, javascript, images, animations, referrers, cookies, ads, frames, surfing to google, in short I blocked quasi all.
    Usually one should expect not much traffic at all and repetitive traffic but what happens? We see variable byte traffic can we now conclude a all bypassing tunnel?
    Check yourself what do you think?
    POSTED BY NEOSTORMSYSTEM AT 7:20 AM NO COMMENTS: LINKS TO THIS POST
    THURSDAY, AUGUST 7, 2008
    Why no full encryption?
    The first question you may ask is why they do not fully encrypt their transmission channels? Why do they let us take a look inside their All Seeing Eye?
    This question can´t be answered directly, but I can give you hints and impulses for their reasons. One cause could be the paradigm of nature, they simply copy the system of nature, because they assume that nothing can be more perfect than that what nature has done. They took a look into DNA and RNA and simply thought it could be a good idea to use it as paradigm. The All Seeing Internet Eye wants to be the root of the root and what is the root of the root? The genomic structure especially Deoxyribonucleic Acid the repository of the genetic information. What we see if we take a fast look into it? We see two things coding and decoding, encryption and decryption.
    Expressed regions and intervening regions and what is the catalytic effect to create a encryption that is the new buzzword of it security scene: Splicing. Unencrypted information (intron) and encrypted material (exon), catalyzer (splicing). I am no bio scientist I only compared some parts of biology with things that happens when taking a look into net packets and saw a common denominator. Remember the question? Now you have one possible idea. Think about something that wants to dominate everything on this planet it has to go to the deepest root of being and change its structure to fit the needs of this hidden thing. If we would carry on this thought The All Seeing Internet Eye could be invented for only one aim: World Domination or World Control.
    POSTED BY NEOSTORMSYSTEM AT 3:07 AM NO COMMENTS: LINKS TO THIS POST
    WEDNESDAY, AUGUST 6, 2008
    A short view inside the Eye
    I give you one possible way of interpretation, again I emphasize that it is a subjective and intuitive point of view I cannot guarantee for accuracy. I watched for catchwords and chars that could be relevant in my opinion. Let us take a closer look into the deep abysm of the All Seeing Internet Eye. Check your network packets and watch out for following things: (especially for relevant packets which happen spontaneous and extraordinary) There is a lot of space for conjecture but that lies in the nature of network analysis.
    @ = Behind this you´ll find mostly the addressee within a covert channel communication but it could be also something like a directed command. Don´t expect the name always displayed immediately behind or before this sign.
    EAU, H2O, AQA, AGUA (obfuscated: E/A#U, A°Q~A, A#G*„U+A, ÆÅÛ, ËÄÚ, ÀÊÛ(permutated)) = Reason for this secret word could be the omnipotent power of water that trams its way through all barriers.
    SPY = If you find this word you will be alerted, I think there is no need for further explainations.;-)
    NL, UK, RU, JP, CZ, PL, FI, SE, SVE, USA, BR… = Specification of countries probably to assign the regions.
    EYE obfuscated variant 1. “( S\ɲ¥Ë variant 2. ®‘Ê*ÿè. variant 3.”È ”.°Ÿ.Ê = The All Seeing Internet Eye? Naturally?!
    AV = A.V. = Check if Antivirus is present or not.
    FW = Check if Firewall is present or not.
    PU obfuscated ‘¤P‰.Ù, P.–®U = I am not sure about its meaning but it is used since the beginning. (Conspiracy Revelation: 26.8.2019: Processing Unit, Central Processor Unit e.g.)
    AM, FM, UKW = Possible radio frequencies that might be used.
    AM, PM (..P›m­.) = ante/post meridiem (time for their actions)
    ON, OFF = someone who signed on or off and is tracked by the All Seeing Internet Eye.
    OS = Operation System
    EPO, ËPÔ? = Entrypoint Obscuring.
    PI = Several possibilities e.g. Private Investigator, Process Integration, PI, principal inv.
    PI:0 or PI0 = PID 0 = possible System Idle Process Walker // (Conspiracy Revelation: 26.8.2019 : Process Identification Number 0 = System)
    OP = Operation (possible commands)
    GO = Go, Start (possible commands)
    SAY = possible command
    AXE = Location axe of the tracked system
    ASE aka àŠÉ aka ä.S°.E = All Seeing Eye
    ? = some times questioning to other users of this hidden system
    ACL = Access control list
    <> = not present, not available, not there
    AES, ÆS = AES encryption algorithm
    CU, C-Y, see U = see you (possible chat comments)
    OK = Okay (possible chat comments or command)
    Vca, Vco = voltage controlled amplifier/oscillator
    Cd, Iso, Raw, Rau = probably filesystem or transmission level
    bye, by, ByE = Bye (possible chat comments or command)
    Jeu = Game, Vx = Virus, Rue
    Rñ41, Rn41 = Bluetooth DIP Module, Metall Resistors, Vpn, VoIP
    VM, VM5 = possible parts of their virtual machine network
    PW = Password lookup
    Z = Zombies, Z0-14 e.g. probably their way to assign Zombie PCs.
    Hel = HE¦L*.!¡„.. = original meaning of: to hide something
    BB = B.B = BigBrother: ultimate symbol for espionage
    BOT = BÔT = BOTHZ = naturally? Keyword for mass remote control of computers.
    FOE = F0Ë. = FO = naturally?!
    HQ = H.Q. = Headquarter of their experiments.
    WÒ = WO = Where
    I post this point of view in the hope it will help others to partially decipher a potential or possible underestimated global and pandemic internet threat. Soon, more news.
    POSTED BY NEOSTORMSYSTEM AT 4:12 PM NO COMMENTS: LINKS TO THIS POST
    Port 80
    When you surf a webside this happens in most situations on Port 80 now turn your net sniffer on and watch the traffic. Did you expect all the results or did you find something that caught your attention?
    Surf a simple page that does not change its content several times and always catch the traffic you may notice that the substance is not always the same despite the fact that you did everything like before. How is that possible?
    One explaination could be the All Seeing Internet Eye. Something that stands in the middle between you and your destination something that tracks everything you do and contemporaneous seems to operate as autonomous system controlled either artificially or by human being.
    POSTED BY NEOSTORMSYSTEM AT 3:49 PM LINKS TO THIS POST
    http://asepuforensics.blogspot.com/2008/
    http://subversionhack.blogspot.com/
    „FRIDAY, AUGUST 29, 2008
    Annoyances from the Hidden
    This blog will be dedicated to informations and screens of annoyances and intrusions from the hidden area of computers and what I observed during the last years.
    The following spooky screens I saw them the first time in 2005 when I bought a new computer and tried to install a new windows, then they reoccured in 2008 when I burned a linux live cd and tried to use this CD on two other systems. I call it the purple-white-turquoise vga wall.
    POSTED BY NEOSTORMSYSTEM AT 7:29 AM NO COMMENTS:“


    MONDAY, FEBRUARY 16, 2009
    S – Syndrome and Sysinternals Conspiracy
    The S Virus how people call it brings many minds in turmoil. But the barrels overflow is a rude censorship at sysinternals forum. If you tell anything about S they cut off and erase all informations. So it must have something to do with a ms secret. The S is high likely nothing else than a experiment of microsoft and nsa. This experiment takes place for maybe 20-25 years but came in mind specially for the last 2,3,4,5,6,7,8 years to the world (especially since the publication of Windows XP) due to several software errors, emotional outbreaks and inattentions from ms members. The S was implemented in many tools and software of ms.
    Anyone remembered Messenger? Once microsoft used to store the user information at HKEY_CURRENT_USER\S. Then there occured a error in file system and you could see many S directories in System32 folder with a tool called rkdetector. It was summarized altogether as Revelation of The Old Rootkit. A 45 page long topic that was erased by forum admins to fog the truth. Then there is a appreciated tool called procexp it generates under unusual conditions a S driver which can be only seen from cd rom windows or with special forensic tools. Are we all in Cyberspace nothing else than part of a devilish matrix experiment, sponsored by ms? What are you thinking?
    Check also: http://subversionhack.blogspot.com it manifests the impression.
    POSTED BY NEOSTORMSYSTEM AT 4:45 AM NO COMMENTS:
    UNVEIL ALL SEEING INTERNET EYE
    SATURDAY, MAY 30, 2009
    Sideeffects of the Matrix?
    POSTED BY NEOSTORMSYSTEM AT 5:45 AM NO COMMENTS:
    THURSDAY, SEPTEMBER 18, 2008
    New Insights
    When you surf the internet the ideal „peace of mind“ traffic has to look this way:

    Like a steady cycle with the same data size (assumed the content of the webside remains equal) but unfortunately in most cases this steady flow is only reachable through ssl aka port 443. Usually in most situations people surf on port 80 and then everything looks totally different and A.S.I.Eye comes into the game like I described here.
    All Seeing Eye is a pretty static monster in most cases you are the trigger when you push the mouse button or the enter key to surf the next webside. If you would not let go the key A.S.I.Eye probably could not transmit its informations, I found out that its viral function relies „on key release“ specifically if you push F5 to renew the web content. Try it out yourself catch explicitly http traffic push F5 and don´t release your key that is the first weakpoint of this devilish global monster control system.
    POSTED BY NEOSTORMSYSTEM AT 11:17 PM NO COMMENTS:
    SATURDAY, AUGUST 30, 2008
    The Time Mutation Story of Evil Eye
    It has made the round that this devilish eye mutates the time of windows you can also observe this action when you start analyzing network packets and when you take a look to the cookie dates. If you see 1990 something is wrong, I don´t know why they have such a affinity to this year as well as to dates that lies far in the future like 2015, 2038, 2096, 2100. One possibility could be their hidden filesystem that probably relies on that date mutation. The other possibility for 1990 is the establishment date of All Seeing Internet Eye according to „MatrixArch“, for 18 years in existence. Their allusions to the movie Matrix is clearly to see, as they seem to have chosen me as (one of their) Neo(s;)) there is no wonder that you will see the name many times in this hidden mutant filesystem which also affects advapi32 (known as the ultimate cia backdoor), probably also a sort of HPA(Hidden/Host Protected Area) some may also call it (S-)ATA protected area. FYI: It affects USB drives and sticks too. Beside according to wikipedia DBAN does not delete HPA! Originator of HPA is Phoenix and it is unavailable for all operating systems, such as Windows and Linux, if secure mode is enabled by whatsoever. (usually by bios)


    POSTED BY NEOSTORMSYSTEM AT 7:20 AM NO COMMENTS:
    FRIDAY, AUGUST 29, 2008
    Favicon and Gif Exploit?
    Another speciality of the A.S.I.E. criminals seems to be a kind of favicon exploit.
    Another simple example of pure internet evil from a few bestialities:
    Looks like gif exploitation stego:
    POSTED BY NEOSTORMSYSTEM AT 6:37 AM NO COMMENTS:
    THURSDAY, AUGUST 28, 2008
    Revelation continues: The „S“ and some chars.
    I want to show some remarkable chars that I caught while analyzing internet traffic which may stand in a very close relation to A.S.I.Eye, A.S.Eye or S.Eye how some also call it. The S could have several meanings: Seeing, Secret, Shark, Secure. You may have noticed that there exists some specific malware that uses „S“. I have seen this „S“ in several situations as non existent file, as hidden window, as phantom process, which indicates us that it is not only a hidden interceptor of the internet but stands in several cases in direct relation to a very aggressive remote administration malware. Recent discoveries have shown that a widely appreciated tool called Process Explorer does create such a „S“ module too if driver´s directory is locked. How far or if this stands in relation to ASI.Eye is not clear, so beware ambiguity errors. For all who are interested in both picture shown above were made in december 2007 and they appear to be either a sideeffect of A.S.Eye, a kind of subproject of All Seeing Internet Eye or a possible install failure of legitimate Process Explorer´s kernel driver if driver directory is locked down by protection tools.
    Remarkable chars and covert info channels that I caught while simply triggering the static vpn tunnel of A.S.E. just by surfing a webside:
    ..-;Spy~à.”, T.ª.\tãÒ, Ĥ/È¥ED>B, ÐÁT.~�àÀK’£, XécÞâA, 8AM, ‹ž]ËPx7Â0, ÓÄLI“‘, .@.PM5áš, Z­+bõ.Z, Ñ..ÈÓ., RÙˆåšÒ, .B’݉òE, h..lÑFxj, QJ)åŠS, ƒÊÓÑ, ­çNÆÓö¶k., €ÎÉ.Í.ŸE.¡, ñòN?„, .ZRù\.¬., GgCëm, ×JR.!.‚à•v„., Z®‘.$CÔp., .8…Åm., „Hm..²­!…, ¼“L;ªS“à}%.RÓ]., VhÐ.äémÜ, >]êûôë’H�., ….Õ„Ü], .T˜À-RÑÒ?LÀª�Ò.ßD..&, †.Ñ¸ÆØ=Q.²XÁ.$Á.YC, ¢@�C~pŠy.:Щ,
    3—Šâö, EÑå„QRÅTå.´F ó”·, Vàl/òn€, „O±„!·j­ÛFo>�€], £.È´Þˆžku.Ǫã, ÇeHmu¡.$(â.. , @SE‡.².€?, � gÖ‰@D, ..S.u.b.C.A0…U, Š6Áë~ép], ..–òš.C/{, }‘©ÈÏRQ7, „,�F^+ôù¦Æw, Lé™´d;šP1.$, Z0X03, ›ÇZ.–QRX@HÌ#*ñ , 6dLEÔ, 1Wdú>¤§�G‘À:vZ, Ð�ÌÓ.QÐNA.›±.vÁgáÕ5, ÖÝÇ..„‚r»-TaÏlÀ@Þ–½`, Ø ÙSé.C.FGBòA.;€nRS…n�~...E.….‹P“.�E, )ünÐy>nÊö@E.,Â, „ÁÑͨ.О, 1÷¢èZâÈ#, D¹@ŽÁ.‹ÙM, R˜UQ„æ:Pž¥.;, .®ŸËÑ.„, •-BðTý¸ ´˜Áqæ¨::lQ, $:ÂU.ÐðÀÛM‘.à, .ÔïLø?W?, cì Gè.N , n[n7t®T>�9 ÍDIR¯ñêíу¥, !.Ë).î.®Lp�>벉þb., OÑÎVÔC¿, °Ê¶§Æã�.
    Furthermore they seem to use kind of coordinate system for „S“: ˜s:5970:4:198..,l, s:5972:4:45., s:5973:4:2931, s:5974:4:148, š{*°*.a:22404:4:45., s:20106:4:91…
    There you see how they associate enormous importance to the „S“ symbol. Did you notice something? The 4 remains static all others change. Conclusion: 4 is a key. Could be e.g. Pid 4 for System and hidden threads inside system sent via udp channels or something like this.
    Another significant thing is that they seem to hide messages in images or at least it appears to be an image you will also notice: NETSCAPE2.0…..! and GIF89a…. strings with hidden informations.
    POSTED BY NEOSTORMSYSTEM AT 7:31 PM NO COMMENTS:
    SUNDAY, AUGUST 17, 2008
    Unveil All Seeing Internet Eye
    All Seeing Internet Eye use a multilayered method of obfuscations and commands, sometimes it partially and/or randomly encrypts its multi layered obfuscation so that my offers of de-obfuscation or illumination can´t be set up in all events but they fit in several situations. Let´s start to shed some light by unveiling these little all-pervasive (be like water) network packets. By the way this method can also be used to decipher some subhack related windows internal phenomenons which you find at the end of many executables, drivers and dlls in windows operation system.
    Some typical methods of obfuscation:
    1. I am here = I/A/M/H/E/R/E
    2. Specific codewords like: Exodus = ÈXÐØXŽUŽ,
    3. Short messages like: We at ram = WÊ@rA¨m
    4. Names like Ru0, Á“Lï, .ÐR.EÜRð, Fu2NL, E;!ÔF¡P, Róñ
    5. Permutation in the lines e.g.: Hello lloeH
    6. Allocation chars to individuals and/or locations like A <> B
    7. Letter replacements through chars: S = $
    8. Letter associations to numbers: A=1, B=2,C=3,D=4,E=5,F=6,G=7,H=8,I=9, J=10….
    9. Multiple use of different languages such as german, french, english, spanish, italian, turkish, arabic, yugoslav, latin …
    10. Psychopathic, eccentric use of anagrams
    There is also a high and excessive use of other words e.g.: DÁÕ›U probably has a relation to TAO, a frequent use of SÚS = SUS. Some know it also as SUS Malware.
    Anagrams often refer to bioscience, genetic studies and vet medicine, e.g.: VLdãLd
    Other discovered codewords: Pnì^¹, JªVHÛB (evtl relation to Java)
    A lot of analyzed packets refer to a japanese network of Tokyo: trip.orz.hm.
    POSTED BY NEOSTORMSYSTEM AT 8:18 AM NO COMMENTS:
    http://unveilasieye.blogspot.com/

  • DARPA ADVISOR REVEALS CONSCIOUS A.I. SUPERCOMPUTERS USED FOR MIND CONTROL OF TARGETED INDIVIDUALS


    „DARPA ADVISOR REVEALS CONSCIOUS A.I. SUPERCOMPUTERS USED FOR MIND CONTROL OF TARGETED INDIVIDUALS“
    Conspiracy Revelation: 23.8.2019: You will be surprised that your root of all evil pentagon implants and the most inhumane and cruel institution ever invented called darpa will go down together with your NWO Shadow Gov Empire….it is just a matter of time… When the Threshold of Insanity, Injustice and Degradation of Ethics is reached you can bet that the Gods and especially the Mother of the Universe will kick your asses…She sleeps also in you….and she has total dominion over the Universe and not you .. megalomaniacs. You were not brooded into this world to enslave Sophias Holy Planet and all its lovely creatures…and surely not to Terraform it into a Prison Control Matrix of Insanity and degenerated control freaks with 10000s of Evil Satellites and ELF/HF/UHF Towers who want to replace the Gods and judge according to their overbloated Egos and corporate crime syndicate monopolies and/or secret society rules.

    If they weren´t such pathological deceivers they would call all their agencies: OFFENSIVE …. no one buys their DEFENSIVE.. I get proof everyday through cyberterroristic acts enacted by Alphabet Inc. NSA-TAO and CIA DIA DOD ARPA USSOC Corporate NWO ZOG GOG Crime Syndicate Conglomerate via Youtube and FaceBUG.
    „1. BRAIN TO CLOUD COMPUTER INTERFACE USING NEURALNANOROBOTICS:
    2. Human Systems Roadmap Review
    https://defenseinnovationmarketplace….
    3. Sentient World Simulation (SWS): A Continuously Running Model of the Real World
    https://krannert.purdue.edu/academics…
    4. DETERRENCE IN THE 21st CENTURY: AN EFFECTS-BASED APPROACH IN AN INTERCONNECTED WORLD:
    http://nsiteam.com/social/wp-content/…
    5. UNMANNED SYSTEMS INTEGRATED 2017-2042 DEFENSE RESEARCH AND ENGINEERING:
    https://www.defensedaily.com/wp-conte…
    6. Official US defence and NATO documents confirm that autonomous weapon systems will kill targets, including civilians.
    https://www.blacklistednews.com/The_P…
    7. Big Data, Analytics & Artificial Intelligence The Future of Health Care is Here“
    „Morgellons-Chemtrails-Nano-Tech
    DARPA, European Human Brain Project, and Pentagon advisor Dr. James Giordano describes neuronanorobotic Brain to computer interface mind control weapons for remote monitoring and manipulation of brains neural circuitry. This allows an individuals consciousness to be cloned onto a their very own digital avatar in a Sentient World Simulation on a supercomputer.“

  • Corey Goode 08/16/2019 — BODY DROP OFF

    https://www.youtube.com/watch?v=4fMtyDLFc-M&feature=youtu.be
    „Corey Goode 08/16/2019 — BODY DROP OFF“
    „Easy Television
    Am 16.08.2019 veröffentlicht
    Corey Goode 08/16/2019 — BODY DROP OFF
    #DivineCosmos #UFO #Alien #Aliens #Consciousness #AlienContact #Antarctica #Atlantis #InnerEarth #HollowEarth“

  • NS-VERGANGENHEIT DES BKA

    Conspiracy Revelation: 13.8.2019: Ihr entkommt eurem Nazionistischen-Karma nicht…Gott sieht alles…die Jahrzehntelangen Bestrahlungen, ich habe über 200 /300/400 Fälle im Internet gesammelt, mit quasi identischem Muster, bei allen Folteropfern…und auch die brutalsten Fern-Folterattacken gegen mich 2011 (3 Wochen inkl. Schlafentzugsfolter, Brandmarkungsfolter, Satellitenfolter, Skalarwellenfolter, Fernwürgungsfolter), 2015 und 2018, auch wenn dabei wahrscheinlich die U.S. Nazionistischen-Geheimdienste und das U.S. Space Command, Lockheed Martin, USSOC, Council on Foreign Relations, ARPA-Motorola-Goo-Dugan-Obama-Merkel, die Rockefeller NWO U.N. und die U.S. Schriever Airforce Base und die Air Force Base Ramstein hier wohl einige Hauptrollen übernommen haben, ist doch sehr wohl bekannt, dass das BKA eine Folterabteilung hat, wo es tonnenweise unschuldige Zivilisten hat foltern lassen…insbesondere unschuldige wehrlose deutschstämmige, was die Endschande schlechthin repräsentiert!!! Alle Bundesbehörden wissen über diese gezielten Folteraktionen bescheid und es wird Zeit, dass die ganze Welt über eure grausamen Machenschaften Wind bekommt.
    Wieviel Feigheit, Ulta-Faschismus und Versagertum muss existieren, dass man tausende wehrlose Menschen in ihren Wohnungen angreift und dann noch in der Stadt der Menschenrechte. Die Zivilbevölkerung muss die Arbeiten der Polizei übernehmen, weil die (Geheim) Polizei in der Vergangenheit stellenweise zu unmündigen, verbrecherischen, hochrkiminellen Handlangern der Neuen Weltordnung geworden ist.


    Ihr habt euch nicht in die Privatsphäre von Zivilisten einzumischen…Nur weil ihr jetzt durch die Nanotechnologie und HAARP Technologie glaubt Gott und die Göttin ersetzen zu können und alles und jeden beobachten zu können… ihr habt die Nanoimplantate auch im Hirn… auch ihr werdet komplett überwacht…und zwar von ganz anderen Dimensionen…
    „NS-VERGANGENHEIT DES BKA“
    „Nach dem Vorbild des Reichskriminalamtes.. 22.09.2007“
    „Nach über 50 Jahren stellt sich das BKA seiner NS-Vergangenheit. Die Selbstauskünfte kommen, so sagte Ziercke letztens, „spät, aber nicht zu spät“. Man kann das anders sehen. Eine Analyse von Peter Carstens.“
    „Was Saevecke im Dritten Reich gewesen war, nämlich ein mörderischer Polizeichef und Vollstrecker des SS-Staates, wurde auf diese Weise immerhin bekannt. Doch verschwiegen blieb, dass Saevecke und mit ihm Dutzende andere SS-Führer jahrzehntelang im Bundeskriminalamt (BKA) in oftmals den gleichen Funktionen gedient hatten wie zuvor bei der Kripo im Reichssicherheitshauptamt, bei der Geheimen Feldpolizei, in Dienststellen der SS.

    Sechsundfünfzig Jahre hat es gedauert, bis das Bundeskriminalamt sich seiner Vergangenheit stellt und mit einer Reihe von Veranstaltungen öffentlich macht, was bislang nur von einer kleinen Fachöffentlichkeit erörtert wurde. Der Präsident des BKA, Ziercke… Unter dem Titel „Die Historie des BKA: Verbindungslinien zum NS-Regime“ wird nun erstmals offen und öffentlich über die Entstehungsgeschichte des BKA gesprochen. „“
    „Aus Judenverfolgern wurden so Kommunisten-Jäger“
    „Dass dabei „Ochsenziemer“ und Tauchbecken für die Folteropfer auf den Beschaffungslisten der BKA-Haushälter nicht mehr auftauchten, zeigte Schritte auf dem Weg zur Zivilisierung einer Polizei, die in der Wiesbadener BKA-Zentrale wohl zum ersten Mal so öffentlich als „Tötungsverband“ beschrieben wurde. Zwischen 1933 und 1945 habe sich die deutsche Polizei zu einer „Folter- und Tötungsorganisation“ verwandelt, sagte Heuer.
    Vieles von dem, was deutsche Polizisten im Einzelnen oder als Teil von Polizeiverbänden in der Sowjetunion anrichteten, ist erst später im Detail bekanntgeworden. Allerdings längst nicht so spät, dass man die ranghohen Täter nicht noch hätte belangen können. Aus Judenverfolgern wurden so Kommunisten-Jäger, etwa bei der Bonner Sicherungsgruppe, die sich selbst als Opfer der Verhältnisse beschrieb. „Altkriminalisten“ nannten sich die BKA-Leute mit Vergangenheit und bedienten einander mit Posten und Verantwortung im neuen Staat.“
    „„Alle Maßnahmen brachen den Lebenswillen nicht“
    Angehörige der Sinti und Roma blieben unverändert im Nazi-Jargon stigmatisiert. Im erwähnten „Leitfaden für Kriminalbeamte“ des Bundeskriminalamtes hieß es: „Die Zigeuner leben in Sippen und Horden, haben einen ,Häuptling‘, dem sie bedingungslosen Gehorsam schulden, und eine Stammesmutter, die als Hüterin der Stammessitte gilt… Die Zigeuner haben weder einen festen Wohnsitz, noch gehen sie einer geregelten Berufstätigkeit nach. Der Hang zu einem ungebundenen Wanderleben und eine ausgeprägte Arbeitsscheu gehören zu den besonderen Merkmalen eines Zigeuners.““
    „Das Schweigen und das Fortleben des alten Denkens…“
    „Aus dem Blickwinkel der Strafverfolgung oder zumindest der Übernahme von Verantwortung kann man das allerdings auch anders sehen. Immerhin hat das Bundeskriminalamt eine juristische Aufarbeitung so lange verhindert, bis auch der beinahe Letzte der „Charlottenburger“, der „Gleiwitzer“ sowie der früheren Angehörigen der Feldpolizei nicht nur aus dem Dienst ausgeschieden war (also seit etwa dreißig Jahren), sondern gestorben. Wenn es mal etwas enger wurde, dann habe man, so berichtete einer der Referenten, einen Mann schon mal in noch besser abgeschirmte Ecken der Sicherheitsbehörden versetzt: zum Bundesnachrichtendienst, zum Verfassungsschutz. Von dort darf man also demnächst auch einige späte Selbstauskünfte erwarten. Verurteilt wurde niemand, entlassen fast keiner.“
    Quelle: https://www.faz.net/aktuell/politik/inland/ns-vergangenheit-des-bka-nach-dem-vorbild-des-reichskriminalamtes-1462630.html

  • They Discovered This Bizarre Ancient Device In Peru…

    https://www.youtube.com/watch?v=2Hi1LhyFg
    https://www.youtube.com/watch?v=2Hi1LhyFg
    „They Discovered This Bizarre Ancient Device In Peru…“
    „Zohar StarGate Ancient Discoveries
    Am 07.07.2019 veröffentlicht
    These inexplicable and baffling devices show such an advanced ancient technology we still don’t fully understand how to even use them. While these structures are both mysterious and fascinating enough, its what they can do that has everyone in awe. Not much is known about the builders of these relics, but one thing is for sure, if we ever reactivate these devices we may find ourselves in a different dimension in seconds.“