The Simon Lectures. A Departure and a Preface.
Originally published on greatawakening.win, 2022 October 23.
This is a Departure from Series I, and a Preface for Series II and Series III. If you are unfamiliar with this Series or have missed some Parts along the way, you may find its previous Parts at the links below.
Part 6 can be found here: https://greatawakening.win/p/15K6SpCAse/the-simon-lectures--series-i--pa/
Part 5 can be found here: https://greatawakening.win/p/15K6JWPoXQ/the-simon-lectures--series-i-par/
Part 4 can be found here: https://greatawakening.win/p/15JnPPYPZx/the-simon-lectures--series-i-par/
Part 3 can be found here: https://greatawakening.win/p/15JAllbd2t/the-simon-lectures--series-i-par/
Part 2 can be found here: https://greatawakening.win/p/15JAEy4lN4/the-simon-lectures--series-i-par/
Part 1 can be found here: https://greatawakening.win/p/15IrUHyPbl/the-simon-lectures--series-i-par/
Ladies and Gentlemen,
I am writing this in response to a gut feeling. No one’s said anything to lead me to write this, but I suspect some of you may need this right now. So let’s dive in.
We are under attack. In such circumstances and times, it’s normal to speculate about the future and extrapolate present-tense facts into future-state possibilities. Where will the enemy go next? That’s what we all want to know.
May I propose that we suspend our natural inclination to look ahead long enough to reflect and look backwards? Let’s look at the start of this, shall we?
In 2009, the Obama Administration brought a software system known as The Hammer in-house at a naval “research center” in Fort Washington, Maryland. The Hammer is a software tool that can be aimed at secure communication sessions in order to eavesdrop upon them. It requires staggering computing power to work and is running on machines in a massive purpose-built supercomputer center dedicated to that singular end. (I said that The Hammer was brought "in-house" in 2009. That requires a brief explanation. The Hammer existed in a less potent form beginning in 2004. From 2004 to 2009, the government needed to engage an outside party to use its capabilities - which provided some degree of checks-and-balances over its use. They knew someone outside of themselves would be aware of its use.)
Without belaboring details here, all of our encryption is based upon relationships between extremely large prime numbers. And with the aid of breathtaking computational power, The Hammer locates one prime number that has the sought-after relationship to another prime number. That’s it. And with that, a set of actions can be set in motion to eavesdrop on any “private” communication session. Emails can be listened in on. Is HTTPS/SSL protecting you as you enter your username and password to your bank? Then those can be listened in on. Is a systems administrator using HTTPS/SSL to protect his credentials as he logs into a router or some other piece of network equipment? Then his credentials can be captured and those pieces of network equipment logged into – that means, for example, that your web browsing habits could be learned. And so on.
The Hammer permitted officials in the Obama Administration to eavesdrop on essentially everything. And they pointed it everywhere. Judges, politicians, CEO’s, Hollywood executives and personalities, and so on. And what did they find? Secrets. Secrets that can be used as the basis of a sinister blackmail campaign. Now our judges are controlled when they need to be. And Hollywood delivers the messages they are directed to. And CEO’s march in a lockstep to a composite Neo-Marxist-Fascist agenda.
All of our institutions are compromised. How extensively? Consider any given public official. Ask yourself: is he or she imperfect? And does he or she therefore have a secret to hide? It’s everyone, folks. We are all imperfect; we all have something to hide; and if we stand in the way we will face ruin.
Consider now the social “plank” of this attack. Boys can be girls (but they can’t). Adoption of a practice originating in some other culture is not the sincerest form of appreciation, it’s misappropriation (but it’s not). We’re all racists (but we’re not). And so on. What, ultimately, is under assault? Truth. Truth is under assault. And without a full examination of the topic now – this examination is conducted in Series II – I will let you in on something: it is impossible to locate any conceivable truth that does not rest on faith. Faith supports all knowledge. All of it. Eradicate faith from a people, and you ultimately disorient those people from truth. This is inescapable. Pope John Paul II famously wrote about this in his estimable encyclical, Fides et Ratio (Faith and Reason).
The first tools of our enemy? Relationships between prime numbers. Universal human imperfection. The relationship between faith and knowledge. In other words, the very fabric of reality.
Let me say that again. The very fabric of reality is being wielded as a weapon against us. What steps could we take to alter the internal relationships of prime numbers? Is that even a sensible question? Let’s reframe the question in terms of human nature. What steps could we take to resolve universal human imperfection? Just as senseless. And it is no better when we reframe the question in terms of knowledge and faith: what steps could we take to dissociate knowledge from faith? None.
Who is your enemy when the fabric of reality, itself, is his weapon? Do you need to see your enemy to know him? Is your enemy to be found here, in this realm? Is Obama your enemy? Is Podesta your enemy? Is Clapper your enemy? Or are they merely your enemy’s agents?
If you’ve followed me, now you know why Series II concerns epistemology and Series III tackles metaphysics. It’s not because I’m an odd dude (I am). It’s because these are the things you need to know.
I will conclude here.
Stay tuned for our regularly scheduled Part 7. It’s coming.
Or don’t. It’s your decision.
Ever yours, simon_says
That's the question. ...and we're getting there.