The Simon Lectures. A Departure and a Preface.
Originally published on greatawakening.win, 2022 October 23.
This is a Departure from Series I, and a Preface for Series II and Series III. If you are unfamiliar with this Series or have missed some Parts along the way, you may find its previous Parts at the links below.
Part 6 can be found here: https://greatawakening.win/p/15K6SpCAse/the-simon-lectures--series-i--pa/
Part 5 can be found here: https://greatawakening.win/p/15K6JWPoXQ/the-simon-lectures--series-i-par/
Part 4 can be found here: https://greatawakening.win/p/15JnPPYPZx/the-simon-lectures--series-i-par/
Part 3 can be found here: https://greatawakening.win/p/15JAllbd2t/the-simon-lectures--series-i-par/
Part 2 can be found here: https://greatawakening.win/p/15JAEy4lN4/the-simon-lectures--series-i-par/
Part 1 can be found here: https://greatawakening.win/p/15IrUHyPbl/the-simon-lectures--series-i-par/
Ladies and Gentlemen,
I am writing this in response to a gut feeling. No one’s said anything to lead me to write this, but I suspect some of you may need this right now. So let’s dive in.
We are under attack. In such circumstances and times, it’s normal to speculate about the future and extrapolate present-tense facts into future-state possibilities. Where will the enemy go next? That’s what we all want to know.
May I propose that we suspend our natural inclination to look ahead long enough to reflect and look backwards? Let’s look at the start of this, shall we?
In 2009, the Obama Administration brought a software system known as The Hammer in-house at a naval “research center” in Fort Washington, Maryland. The Hammer is a software tool that can be aimed at secure communication sessions in order to eavesdrop upon them. It requires staggering computing power to work and is running on machines in a massive purpose-built supercomputer center dedicated to that singular end. (I said that The Hammer was brought "in-house" in 2009. That requires a brief explanation. The Hammer existed in a less potent form beginning in 2004. From 2004 to 2009, the government needed to engage an outside party to use its capabilities - which provided some degree of checks-and-balances over its use. They knew someone outside of themselves would be aware of its use.)
Without belaboring details here, all of our encryption is based upon relationships between extremely large prime numbers. And with the aid of breathtaking computational power, The Hammer locates one prime number that has the sought-after relationship to another prime number. That’s it. And with that, a set of actions can be set in motion to eavesdrop on any “private” communication session. Emails can be listened in on. Is HTTPS/SSL protecting you as you enter your username and password to your bank? Then those can be listened in on. Is a systems administrator using HTTPS/SSL to protect his credentials as he logs into a router or some other piece of network equipment? Then his credentials can be captured and those pieces of network equipment logged into – that means, for example, that your web browsing habits could be learned. And so on.
The Hammer permitted officials in the Obama Administration to eavesdrop on essentially everything. And they pointed it everywhere. Judges, politicians, CEO’s, Hollywood executives and personalities, and so on. And what did they find? Secrets. Secrets that can be used as the basis of a sinister blackmail campaign. Now our judges are controlled when they need to be. And Hollywood delivers the messages they are directed to. And CEO’s march in a lockstep to a composite Neo-Marxist-Fascist agenda.
All of our institutions are compromised. How extensively? Consider any given public official. Ask yourself: is he or she imperfect? And does he or she therefore have a secret to hide? It’s everyone, folks. We are all imperfect; we all have something to hide; and if we stand in the way we will face ruin.
Consider now the social “plank” of this attack. Boys can be girls (but they can’t). Adoption of a practice originating in some other culture is not the sincerest form of appreciation, it’s misappropriation (but it’s not). We’re all racists (but we’re not). And so on. What, ultimately, is under assault? Truth. Truth is under assault. And without a full examination of the topic now – this examination is conducted in Series II – I will let you in on something: it is impossible to locate any conceivable truth that does not rest on faith. Faith supports all knowledge. All of it. Eradicate faith from a people, and you ultimately disorient those people from truth. This is inescapable. Pope John Paul II famously wrote about this in his estimable encyclical, Fides et Ratio (Faith and Reason).
The first tools of our enemy? Relationships between prime numbers. Universal human imperfection. The relationship between faith and knowledge. In other words, the very fabric of reality.
Let me say that again. The very fabric of reality is being wielded as a weapon against us. What steps could we take to alter the internal relationships of prime numbers? Is that even a sensible question? Let’s reframe the question in terms of human nature. What steps could we take to resolve universal human imperfection? Just as senseless. And it is no better when we reframe the question in terms of knowledge and faith: what steps could we take to dissociate knowledge from faith? None.
Who is your enemy when the fabric of reality, itself, is his weapon? Do you need to see your enemy to know him? Is your enemy to be found here, in this realm? Is Obama your enemy? Is Podesta your enemy? Is Clapper your enemy? Or are they merely your enemy’s agents?
If you’ve followed me, now you know why Series II concerns epistemology and Series III tackles metaphysics. It’s not because I’m an odd dude (I am). It’s because these are the things you need to know.
I will conclude here.
Stay tuned for our regularly scheduled Part 7. It’s coming.
Or don’t. It’s your decision.
Ever yours, simon_says
You cheapen blackmail strings by conflating our online porn addictions, our drug addictions etc, with purpose-made footage of sexual acts with minors. Blackmail which is often willingly created in order to rise into power via a billionaire's or a spy agency (CIA or MOS)'s puppeteer strings. You cheapen the entire role Jeffrey Epstein played.
Could you provide a reference for Hammer's purported capabilities? While there is no doubt technical muckery involved in Dominion voting machines/etc, you are ascribing fantastical powers to "Hammer". All the way back in 2009. Notably, why would the Obama admin bother with the FISA court if they had such math-breaking surveillance tools? Wouldn't that leave an unnecessary trail? Heck the below Q drop even implies that they needed UK involvement to get the job done "UK ASSIST ALLOWS FOR NORMAL FISA DECONSTRUCT."
u/#q2043
I believe Dennis Montgomery was the software writer. The surveillance apparatus really messed up when they failed to pay him per use. Knowing this may happen, he had all information from any use routed back to his own computer. If this is true, he/we have it all.
Correct about Montgomery. Didn't want to distract from the broader thesis here to raise that and all the other issues related thereto. Thank you for raising that. People need to know.
It's my prayer it is revealed soon.
Mine too. Mine too.
Its funny how, even as you are preparing to conquer the world, you still try to save a few bucks and get yourself in trouble, hehe
Right?
I understand your concern, but I don't think that was the point of his statement.
Yes, there are those who willingly commit heinous acts with the specific intention to 'allow themselves to be blackmailed' (controlled), so that they can further their 'careers'.
But what about all of the (initially) 'honest' public officials? What if their 'imperfections' could be used to blackmail them? The people who did not submit to heinous acts?
It was this second group that he was referring to. There is no need to spy on the first group.
And because both groups can be blackmailed, there is no need to determine the relative sizes of the two groups. How many are (willingly) corrupt? How many (started out) honest? No matter. They are now both controlled.
Yes. The overarching point is that we're all shitheads with skeletons. But the difference is between those of us who struggle through life, trying to do our best, and those who willing engage in absolutely heinous acts to achieve wealth, fame and power. The latter is more easily blackmailed because they have so much more to lose, and once in such position will do anything not to lose it. In the case of the fast majority of us, what do we really have to lose?
#LordComeQuickly
There is immense value in, and I believe Q group is well interested in, learning what entities control blackmail strings on which politicians. Understand the + symbol, and how it invokes Godfather logo puppetmaster symbology.
It is not a stretch to state that this "matter" is why the cleanup stage is taking years. What actions taken by Clowns that were done under threat of their own family, and what wasn't.
When a Clown had the opportunity to do good, did they do so? Could they have their sentence reduced by ratting out cells? (Suicide Squad comms).
It was humbling to discover how much our Media, and by extension our politics, is crafted by the two largest intelligence agencies in the world. CIA vs MOS, a compare and contrast.