The Simon Lectures. A Departure and a Preface.
Originally published on greatawakening.win, 2022 October 23.
This is a Departure from Series I, and a Preface for Series II and Series III. If you are unfamiliar with this Series or have missed some Parts along the way, you may find its previous Parts at the links below.
Part 6 can be found here: https://greatawakening.win/p/15K6SpCAse/the-simon-lectures--series-i--pa/
Part 5 can be found here: https://greatawakening.win/p/15K6JWPoXQ/the-simon-lectures--series-i-par/
Part 4 can be found here: https://greatawakening.win/p/15JnPPYPZx/the-simon-lectures--series-i-par/
Part 3 can be found here: https://greatawakening.win/p/15JAllbd2t/the-simon-lectures--series-i-par/
Part 2 can be found here: https://greatawakening.win/p/15JAEy4lN4/the-simon-lectures--series-i-par/
Part 1 can be found here: https://greatawakening.win/p/15IrUHyPbl/the-simon-lectures--series-i-par/
Ladies and Gentlemen,
I am writing this in response to a gut feeling. No one’s said anything to lead me to write this, but I suspect some of you may need this right now. So let’s dive in.
We are under attack. In such circumstances and times, it’s normal to speculate about the future and extrapolate present-tense facts into future-state possibilities. Where will the enemy go next? That’s what we all want to know.
May I propose that we suspend our natural inclination to look ahead long enough to reflect and look backwards? Let’s look at the start of this, shall we?
In 2009, the Obama Administration brought a software system known as The Hammer in-house at a naval “research center” in Fort Washington, Maryland. The Hammer is a software tool that can be aimed at secure communication sessions in order to eavesdrop upon them. It requires staggering computing power to work and is running on machines in a massive purpose-built supercomputer center dedicated to that singular end. (I said that The Hammer was brought "in-house" in 2009. That requires a brief explanation. The Hammer existed in a less potent form beginning in 2004. From 2004 to 2009, the government needed to engage an outside party to use its capabilities - which provided some degree of checks-and-balances over its use. They knew someone outside of themselves would be aware of its use.)
Without belaboring details here, all of our encryption is based upon relationships between extremely large prime numbers. And with the aid of breathtaking computational power, The Hammer locates one prime number that has the sought-after relationship to another prime number. That’s it. And with that, a set of actions can be set in motion to eavesdrop on any “private” communication session. Emails can be listened in on. Is HTTPS/SSL protecting you as you enter your username and password to your bank? Then those can be listened in on. Is a systems administrator using HTTPS/SSL to protect his credentials as he logs into a router or some other piece of network equipment? Then his credentials can be captured and those pieces of network equipment logged into – that means, for example, that your web browsing habits could be learned. And so on.
The Hammer permitted officials in the Obama Administration to eavesdrop on essentially everything. And they pointed it everywhere. Judges, politicians, CEO’s, Hollywood executives and personalities, and so on. And what did they find? Secrets. Secrets that can be used as the basis of a sinister blackmail campaign. Now our judges are controlled when they need to be. And Hollywood delivers the messages they are directed to. And CEO’s march in a lockstep to a composite Neo-Marxist-Fascist agenda.
All of our institutions are compromised. How extensively? Consider any given public official. Ask yourself: is he or she imperfect? And does he or she therefore have a secret to hide? It’s everyone, folks. We are all imperfect; we all have something to hide; and if we stand in the way we will face ruin.
Consider now the social “plank” of this attack. Boys can be girls (but they can’t). Adoption of a practice originating in some other culture is not the sincerest form of appreciation, it’s misappropriation (but it’s not). We’re all racists (but we’re not). And so on. What, ultimately, is under assault? Truth. Truth is under assault. And without a full examination of the topic now – this examination is conducted in Series II – I will let you in on something: it is impossible to locate any conceivable truth that does not rest on faith. Faith supports all knowledge. All of it. Eradicate faith from a people, and you ultimately disorient those people from truth. This is inescapable. Pope John Paul II famously wrote about this in his estimable encyclical, Fides et Ratio (Faith and Reason).
The first tools of our enemy? Relationships between prime numbers. Universal human imperfection. The relationship between faith and knowledge. In other words, the very fabric of reality.
Let me say that again. The very fabric of reality is being wielded as a weapon against us. What steps could we take to alter the internal relationships of prime numbers? Is that even a sensible question? Let’s reframe the question in terms of human nature. What steps could we take to resolve universal human imperfection? Just as senseless. And it is no better when we reframe the question in terms of knowledge and faith: what steps could we take to dissociate knowledge from faith? None.
Who is your enemy when the fabric of reality, itself, is his weapon? Do you need to see your enemy to know him? Is your enemy to be found here, in this realm? Is Obama your enemy? Is Podesta your enemy? Is Clapper your enemy? Or are they merely your enemy’s agents?
If you’ve followed me, now you know why Series II concerns epistemology and Series III tackles metaphysics. It’s not because I’m an odd dude (I am). It’s because these are the things you need to know.
I will conclude here.
Stay tuned for our regularly scheduled Part 7. It’s coming.
Or don’t. It’s your decision.
Ever yours, simon_says
Spot on.
And so the question becomes, how does one overcome evil without becoming evil?
How we answer that question as individuals, families, communities, and societies, will determine our fate.
"And so the question becomes, how does one overcome evil without becoming evil?"
.
u/#q4024
.
https://qaggregator.news/?q=Game+theory
https://www.youtube.com/watch?v=WsHjpy9WZK8&t=31s
Game Theory (ECON 159) / The First Five Lessons / Yale University
https://youtu.be/nM3rTU927io (68 min)
Lesson 1 - Do not play a strictly dominated strategy.
Lesson 2 - Rational choices can lead to outcomes that suck.
Lesson 3 - You can't get what you want until you know what you want.
Lesson 4 - Put yourself in others' shoes and try to figure out what they will do.
Lesson 5 - Yale students are evil gits.
How we answer that question as individuals, families, communities, and societies, will determine our fate."
ENEMY OF THE STATE (1998) DVD / Chapter 22 - 1:39:32 -> 1:41:03
"If they are big and you are small,
You are mobile and they are not.
You only fight the battles you can win.
That's the way the Viet Cong did it.
You capture their weapons and then,
Use them against them the next time.
That way they are supplying you.
You grow strong as they grow weak."
https://www.youtube.com/watch?v=WY9ZjE_KOCQ
https://qaggregator.news/?q=%23%233882
https://2009-2017.state.gov/documents/organization/119629.pdf
What Country was the true intended target?
The United States of America Inc.
This part of this movie, https://youtu.be/GtBMkg8G5tQ , (now showing in Theater 2) is about to start because of the unique electronic marker Dennis Montgomery put into the Scorecard software he surrendered to the [FBI] in 2014, as part of an immunity deal he was seeking at the time to get whistleblower status (he was blocked from that goal), that allowed him to speak with, among others, an aide to Senator Chuck Grassley (white hat).
This [FBI] associated blue dyed Scorecard software was used to flip votes in the 2020 election, proven by the presence in the PCAP data now in Lindell's possession and showing foreign manipulation (from, among other countries, servers based in China) of the 2020 election. Montgomery (through intermediaries) passed this PCAP collection data to (and rights to which have subsequently been recently purchased by) Mike Lindell on 09 January 2022.
This is what is at the core of the Lindell / Montgomery court motion to lift the protection order (gag order) in the Nevada District court. Lifting of the gag order also allows a Montgomery lawsuit filed in Virginia in June of 2017 against, among others, Comey, Brennan, Clapper, Obama, Rogers and Pompeo (former directors of the CIA/NSA/DNI) to also move forward. Similar issues.
4 D CHESS
Again... we are just about right here...
https://youtu.be/GtBMkg8G5tQ
The concepts presented in this comment pushes planning of the current Q operations to well before 1998 because if you watch the movie, Enemy Of The State [carefully] you will comprehend the number of coincidences in the film to current events to be mathematically impossible.
.
u/#q3589
.
https://qaggregator.news/?q=mathematically+impossible.
/ / /
https://media.greatawakening.win/post/BhYv0cxz.jpeg
B 05/29/21 (Sat) 15:24:40 No. 111
Fact Vs. Fiction
We will not tell you which is which, the choice is yours.
Who gave you the Playbooks?
Who helps you answer Questions?
/ / /
Its called narrative seeding.
Change my mind.
You must know your enemy. Fall back. Superior firepower. Superior intelligence.
https://youtu.be/kmHQO-Q_wrU
How did David slay Goliath?
By standing with someone more powerful than evil.
That's the question. ...and we're getting there.
The Bible says "resist the devil and he shall flee"
This is exactly how it's done. Resisting is the least common denominator every individual can do.
It's also the least amount of effort when effort is expended. Resisting isn't fighting, it's resisting and it says the devil will flee. Then we get to see what God does.