It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
ProjectUltra2013
crankyoldman
A question for you, with all sincerity meant: You've come here and talked about a few things, but nothing that would allow anyone reading this to alter their path in anyway. For example, you've never said, "in November they plan xxx, as I worked on that project," so the information you present means you are not privy to the levels of information that would help you personally in a way outside your employement. Since you are not exposed to that, it would mean, you are disposable - again sincerity meant. How do you experience that personally?
I doubt that you are in some way immune from the mental, physical and spiritual weapons you help create, so how does that effect you personally? If I had to guess, I'd say you began to get a kind of spiritual ache around last december, with a more acute sense of it around mid march, what do you attribute that to in light of the weapons effectiveness? If folks are moving past your weapons of control, do you take that as a personal affront?
Last question. Friends? You must have some. I do wonder about those who's team is involved with the selling out of humanity. There was a post here some time back about a women and man (actors?) who were interviewed after Sandy Hook AND Boston seemingly in order to validate the event. I wondered if they went home and high-fived each other on a good job? I wondered if they said to their friends, "we conned so many people today, they'll demand we put everyone in jail over this event?"
As far as the November comment, they operate 24/7/365 and have been doing so for decades. Their plan is always active and unchanging, control and enslave the population via socialogic and technologic means.
They have never suspended their operation for more than a day, ever.
I'm nearly immune to their psychologic trickery because I know it, magicians can see magic tricks
and I'm not alone there; but their technological methods can only be partially avoided.
There is to ways to avoid the technology, distance and shielding.
There are two types of wave propagations used: omni-spherical and directed. Spherical waves drop in strength by the inverse square of the distance and directed drops by the inverse of the distance. 1/4th or 1/2 power respectively.
Do you ever feel tired at around 3pm, even when relaxing on vacation off from work? If so, that could be one sign of the technological effects.
As for shielding, I live in a Faraday cage. Usually you want to layers. One of chicken wire, which is good at blocking from ELF up to low microwaves; and one of aluminium foil, which is good for blocking microwaves and all the way up into the low X-Rays. Ensure you seal all gaps with al-ductape otherwise the microwaves will get in, you can get this stuff from nearly any hardware store.
You can test it's effectiveness fairly easily by trying to call a cellphone. If the cellphone call makes it through, then it's NOT good enough shielding! If you did a good job It should also block wi-fi and 3G.
1Angrylightbulb
I only found it because you posted a shot of this supposed "top secret" document. Me being able to find it on the web from a pdf file years old shows it was NOT top secret and that your claim was fake. Unless you want to say that it was from a much older document that happened to be top secret years before it made it onto the web. But if that is the case I Also remember you posting earlier in the thread that your work location was secure and that it was not possible for you to get anything out of the building. If that is true then how would you have gotten some snap shot of a "top secret" document out in the first place?
StargateSG7
reply to post by crankyoldman
---
Chicken Wire?
Tin Foil?
Are you kidding me?!
A REAL Faraday cage requires the meshing to be smaller than the wave-length of the
RF or other RADIATION needed to be blocked. (for microwave and Wifi) that would
be less than one millimetre.
For EMP, X-Ray and Gamma Ray ...LOTS of Multi-layer Lead, mu-Metal, gold foil and SOLID COPPER PLATE.
IN our facilities we have a two shell computer systems radiological defence.
The outer shell is SOLID copper plate 4 inches thick fully enclosed BOX (floors, walls and everything
with full electrical conductance surrounding the room to take advantage of the SKIN EFFECT!
The OUTER doors have angled-inwards edges that form a solid conductor when closed tightly
(i.e. atmospherically SEALED!)
The second INNER SHELL BOX is separated from the outer shell by a THICK non-conductive polymer
so that it "FLOATS" within the outer shell. The inner shell is MULTIPLE LAYERS of mu-Metal,
SILVER, COPPER and a very thin inner layer of GOLD. Each layer is separated by a non-conductive
layer but arranged in a way so as NOT to form a large capacitor. The inner shell is 6 inches thick
and is fully atmospherically SEALED. The computer systems inside HAVE NO outer connections
to the internet and are POWERED by a fuel-cell system that gets cycled in and out of the two shells
EVERY DAY! There are enough compressed air tanks to sustain a crew for three days!
Again, the inner doors are V-angled on the side-walls and form a SOLID conductor for each layer
and room cooling uses isolated Pelletier effect heat pumps which ALSO get cycled in and out every day!
Phones, don't work, Wifi don't work, EMP don't get in and even X-ray/Gamma is mitigated
and personnel (i.e. me!) are locked in for 8 to 12 hours at a time unless bathroom breaks
are needed which requires a 5 minute unlock/lock procedure for the inner and outer Faraday Shells.
HOWEVER there IS outside communications using multi-point low-frequency sound at low bit-rates
not exceeding 1200 bits per second per transducer section, but when aggregated, the total bandwidth
is up to 56 kilobits per second (i.e. dial-up modem speeds). These communications are for
to and from supervisory and guard personnel BUT NOT outside LAN/WAN/Phone communications!
This is NOT used too often because it is quite disturbing on a physical basis for personnel
who are affected by the LF waves quite readily.
And while you might be wondering WHY this type of security is required, we have good
reason because of the very advanced software that is being developed within this environment
which is EXTREMELY valuable on a commercial and possibly military basis since it has to do
with Multi-State Boolean Logic Decision Trees running on hundreds of high-powered GPU cards!
I should also mention for physical security, the whole thing is encased in a fully alarmed,
multi-security camera-watched room in a non-descript house with two feet thick, reinforced
concrete walls, floor and ceilings with advanced physical lock and key, unusual ANALOG entry
system and fully electronic entry control systems!
AND....since ALL the racks are liquid dialectric cooled heat pumps (i.e. NO fans!),
IT'S EERILY QUIET IN THE BOX!!! You cannot be left alone because of the psychological effects
that prevail after only a few hours. WE ALWAYS have at least three and usually 4 people inside.
(it's about the size of a large basement in a 4-bedroom house) Everyone has their own
6-monitor workstation with fibre-connect to the GPU processing racks and SSD drive racks
and code on a custom grid-processing oriented PASCAL compiler on a custom Linux Graphical OS
so as to produce easy-to-read and fix source code!
AND NO!!!!!! WE DO NOT DO BIT-COIN MINING!
THAT'S ALL FOLKS!
edit on 2013/10/9 by StargateSG7 because: more infoedit on 2013/10/9 by StargateSG7 because: more info
ProjectUltra2013
1Angrylightbulb
I only found it because you posted a shot of this supposed "top secret" document. Me being able to find it on the web from a pdf file years old shows it was NOT top secret and that your claim was fake. Unless you want to say that it was from a much older document that happened to be top secret years before it made it onto the web. But if that is the case I Also remember you posting earlier in the thread that your work location was secure and that it was not possible for you to get anything out of the building. If that is true then how would you have gotten some snap shot of a "top secret" document out in the first place?
Just phone them up and ask them for the technical details of why it is so unstable, I'm fairly certain they will tell you nothing more than the dumbed-down PR version "it got overloaded and an internal system error happened" or "national security, that's classified".
The fact is, they won't EVER provide ANY real details, and maybe I shouldn't have either
1Angrylightbulb
It is obvious that you keep deflecting the questions I brought up and not even trying to give an answer. So I will give you one more chance with a very easy yes or no answer. Do you admit that your snap shot of a "top secret" document was actually fake?
1Angrylightbulb
ProjectUltra2013
1Angrylightbulb
I only found it because you posted a shot of this supposed "top secret" document. Me being able to find it on the web from a pdf file years old shows it was NOT top secret and that your claim was fake. Unless you want to say that it was from a much older document that happened to be top secret years before it made it onto the web. But if that is the case I Also remember you posting earlier in the thread that your work location was secure and that it was not possible for you to get anything out of the building. If that is true then how would you have gotten some snap shot of a "top secret" document out in the first place?
Just phone them up and ask them for the technical details of why it is so unstable, I'm fairly certain they will tell you nothing more than the dumbed-down PR version "it got overloaded and an internal system error happened" or "national security, that's classified".
The fact is, they won't EVER provide ANY real details, and maybe I shouldn't have either
It is obvious that you keep deflecting the questions I brought up and not even trying to give an answer. So I will give you one more chance with a very easy yes or no answer. Do you admit that your snap shot of a "top secret" document was actually fake?
crankyoldman
I've always wondered: do folks who work on killing humans projects high-five each other when they see a slaughter that their work facilitated? Why do the work if you can't get excited about the results?
1Angrylightbulb
reply to post by ProjectUltra2013
When I say fake I mean not a top secret document which you claimed it to be. It is NOT a top secret document.
ProjectUltra2013
crankyoldman
I've always wondered: do folks who work on killing humans projects high-five each other when they see a slaughter that their work facilitated? Why do the work if you can't get excited about the results?
I can't speak for everyone but our place is 9 times out of 10 more likely to just turn peoples brains into mush and control them, and make them jobless and homeless, rather than terminate them.
Do I get excited by the results?
no.
Do you high-five each other when successful?
These people are very very good at hiding their emotions so it's nearly impossible to say what they are feeling inside. However I have seen that happen on one occasion. But it wasn't with me. and that person still works there, last time I checked.
I have seen co-workers quit, and a rarer few even commit suicide because of this job. What they were doing bugged them enough to push them right over the edge, and I completely understand why.
One co-worker even brought that topic up at work, I did my best to avoid answering, I had to bite my lip, I was afraid bad things would happen to me if I answered that question. I got a feeling that they were trying to test me out.
They have tried to test me on at least 3 other occasions using different topics and interrogation techniques. I've even used some techniques of my own back at them, not sure if they caught on or were just playing along with me. Hard to say. Cloudy water is cloudy.
ProjectUltra2013
1Angrylightbulb
reply to post by ProjectUltra2013
When I say fake I mean not a top secret document which you claimed it to be. It is NOT a top secret document.
You are assuming that the document you found is the same one as the one I have.
Question: Is the document I found the same as the one you were referring to?
Answer: No
Question: Is it from the same source?
Answer: No
Question: Is it from a related project team?
Answer: I don't know the answer to that question, it appears to have some direct excerpts for sure.edit on 9-10-2013 by ProjectUltra2013 because: (no reason given)
StargateSG7
reply to post by ProjectUltra2013
---
Top Secret! Slop Shreekit!
All a bunch of BS from ProjectUltra2013!
He's a cog in a large gear doing simple training exercises to hone his GetInfo() credentials
so he can start at $36,000 a year SUPPOSEDLY hacking away at some HTML5/Javascript site
in Mainland China and Russia!
EXPERT? Total BS! You're some Java monkey who has NUK-ALL KNOWLEDGE
about HOW the underlying software and hardware is engineered NOT to mention
UTTERLY NO CLUE as to how to TRULY defend against or attack that!
Here's some REAL engineering speak for you!
All you have EVER been taught is some recursive Javascript concatenation routines
that get interpreted on-the-fly in order to create subversive code.
YOU HAVE NO CLUE that I've got RING-0 microcode running in cache on my CUSTOM
SuperSPARC/UltraSPARC CPU design that examines every low-level ADD/MOV/STOR/JMP, etc
assembler code to see if it's malicious.
ALL my low-level file and disk get/put or read/write routines get examined and
RE-DIRECTED to a custom file AND organized like a database so I can examine it
later. YOUR scripts NEVER get executed in-the-real-world cuz its ALWAYS in my
microcode examined VM sandbox. Your MS-Win registry/ini file read/write calls are FAKE!
The writes get sent to a separate file and the reads get FAKE responses!
I have my OWN JIT (Just in Time Compiler) and interpreter for the HTML/JAVA code.
ALL your script source code concatenation gets done ALL at once and then examined
in a SANDBOX so you CANNOT EVER get data from my system! PERIOD!!!!!
Your Norton AV and Adobe PDF Updates you guys keep sending me?
I'M LAUGHING AT YOU!!!!! They get installed in a sandbox and that hidden
IP address gets sent FAKE INFO....with a bit of an EXTRA payload because
I am one of the BEST microcoders out there and YOU YOUNG'UNS have
absolutely NO CONCEPT of Ring-0 code execution privileges and that
ALL Win-X and Trusted Linux/Solaris have DLL and RPC function calls
that get REROUTED to my OWN microcode!
I know you guys have been trying to get rid of and trace those communications
....for quite a while now.....HEY DUMMIES! Those FirePro/Quadro/Intel G-x Trusted
graphics drivers call FLASHED microcode on the GRAPHICS CARD! You Idiots! They're KERNEL
MODE DRIVERS you dips! I've been reading the DB's and LOGS using my own file system Get/Put code!
The Win-X/Lin-X keyboard Hooks? .... Do you KNOW how many passwords I have?
and how many times you've changed them FOR NOTHING?
OMG! While you're always changing satellite imagery codes which only work on a
PSEUDO-random basis....HEY TOADIES...I've been having fun for YEARS with all
that free photo and video data!
Here's a DOOOZY to get your attention DUMMIES!
The Delta Flyer! Remember that?
ALl that flight envelope testing data...OH MY!
VIDEO! AUDIO! Flight Stats! CHECK!
GET A CLUE! You're a SCRIPT KIDDIE!
with NO knowledge WHATSOEVER of the underlying bits,
bytes and HTML/JAVAscript/Flash you get paid to check out!
What are the FIRST 31 characters of the ASCII/ANSI characters set?
What were they used for in both interactive and command-line
file systems AND as delimiters in databases and communications?
YEAH? I thought so! NO CLUE!
Sorry Ultra But you've had your fun...NOW GO DUMP the flash ram of your
PCI-x graphics card and network card AND the UEFI/BIOS on your motherboard
and tell me what you see!
edit on 2013/10/10 by StargateSG7 because: Yeah Right!