February 3

The Truth About Corey Haim

Not everything that glitters is gold…

Many of you have probably noticed Corey Feldman has come out after years of mentioning pedophilia in hollywood, expressing how surrounded and preyed on he was. It is interesting he so quickly came forward after we said we would release all info about him. Well, though his friends have tried to hint at him to come clean with the truth of his situation he has not. So we shall tell what Corey Feldman has not.


There are many thousands of children in Hollywood who are raped and molested by the pedophile elite who control Hollywood. They should be protected and their pedos exposed. There is no justice for children who have been raped and abused, what was stolen from them can never be returned. But what if Corey Haim and Corey Feldman were not the victims they claimed to be?

What if the high profile gay actors he claims raped him, came to his trailer for sex initiated by Corey. What if Corey was a willing participant doing it as a scam to get money and movie roles?

It would seem Corey Feldmans supposed confessions are controlled deceptions to strip real survivors and victims of what little they have left.

Corey Haim and Corey Feldman were not innocent victims. We are seeing once again the controlled opposition trying to diminish the truth. Steering the publics eye.

But not to worry. Anonymous always finds out the truth. He did not come out with the truth after we gave him a chance, and not even after others tried to coerce him to come clean. So we will expose it to you today.

After Corey Haim was sodomized by Jeff Bridges the first time, the studio and Bridges family member Beau Bridges went to John Ritter to keep Corey from reporting the abuse. Corey was a big fan of John Ritter on three is company and John talked him into accepting a deal. He was given his own movie which he ended up making about himself along with money Corey’s mother received but did not tell him about.

After that Corey Haim and Corey Feldman began initiating meetings for money, letting high profile actors have sex with them and other young actors in Corey’s trailer.

The names Corey Feldman kept from the public will now be divulged and though some of them you have heard rumors of other names will shock the public. The pedos are, Kevin Spacey, Robert DeNiro, Dennis Hopper, Robin Williams, Jack Nicholson, Dustin Hoffman, Val Kilmer, Tom Cruise, John Travolta, James Woods, Tim Robins, Kiefer Southerland, Michael Douglas, Kurt Russel, Gary Busey, Charley Sheen, David Carradine, and one of which Corey ended up living with Robert Downey Junior who had a female actress as a live in girlfriend to cover up the relationship between Robert and Corey while he lived with him. These are the few we could confirm through our sources but have been told there were others from the music industry which we will expose in the future when they are confirmed.

This is a very far cry from being a child in hollywood who is gang raped and tortured and drugged, which happens to far too many in Hollywood. Baiting pedos and profiting off of it does not qualify. Now we see Corey Feldman is baiting the public, he is far too old for pedos now. Again he is doing this only to make a profit off of the donations made to him by the public who believe his lies.

Jeff Bridges found out what Corey Haim and his friends were doing after the Bridges paid millions to Corey’s mother and the studio gave him a movie deal because they thought he was an innocent victim.

One thing we have also confirmed is these high profile actors were all victims of programming done by the studios to make them gay pedophiles, After acquiring the names we confirmed with Mk Ultra victim Randal Turner who we have done videos about, that Lewis T Holliday told him many of the named high profile actors were victims of programming by Lewis T Holliday, who was a good friend of Jon Voights. Lewis would also use a young female for this programming. This is how Hollywood controls them and controlled the money in Hollywood for years by the videos they held on them all and supplied them with children for their programmed sexual Cravings.

We asked Randal if Corey Haim was a programmed Victim he knew of and he could not confirm Feldman or Haim were programming victims of Lewis T Hollidays.

Jeff Bridges had Corey’s agent at the time place a video camera in the trailer to prove Corey and the others weren’t the victims they claimed to be. Robert DeNiro discovered the camera and went off on Haim and the others involved, this stopped them from selling sex to any more high profile actors.

When confronted about his continuing prostitution after taking a movie deal and money, Corey Haim said he didn’t mind and the money was good. He became excited about getting the money and they had friends who started to do the same thing but Corey was desired most by the gay actors.

Dominick Brascia another child actor went on record claiming Corey had sex with Charley sheen and when he wanted to fool around again Charley rejected him. His message to Corey Feldman was to stop his lying, Dominick Brascia knew this was going on with Haim and Feldman and they were not the victims they claimed to be.

Corey Feldman would not expose those involved because he was as guilty as Corey Haim. Corey Haims mother knew about it as well and money was paid out to her. People are easily corrupted by money. Greed runs deep in these types of people and little value is given on real life.

The reality for many children in Hollywood and elsewhere is a life of rape and torture. These people exist and continue every horrendous act they do daily to destroy innocents. Allowing it to continue only brings damage on all. The fact that anyone would use child rape and murder for their own profit is sickening and disgusting. Corey Haim and Feldman willingly participated in having sex with pedophiles. He is not a victim or a survivor but a con artist. Feeding off the good nature of others in order to profit from deception. The only acceptable profit for Feldman to receive would be to endure all that those who truly survive the horrors of MK Ultra and a life of rape have.

Corey is a fraud. None are innocent when these crimes are permitted to continue. You instead become a willing participant. No better than the scum Corey is. Give those who deserve it the funds to live decent lives instead of throwing it away to support the elite. Do not be deceived.

October 18

The Reagan Assassination Attempt

The Reagan Assassination Attempt:
This is the event Randal has proof of to validate himself and all he has to expose. We can see in his video footage Randal locks himself in the back seat of the patrol car.

Shooting Video: https://vid.me/4KQ3j

Patrol Car Video: https://vid.me/88Yr8

He carried the nuclear codes and after the shooting rang out he stood up and went to the limo Reagan had been pushed into and tried to open the door but the limo drove off. Randal then ran up the driveway to the upper Hilton which can be seen in the video.

Photo Transition Video: https://vid.me/d3c2N

As he was running he came across a patrol car and told the driver he had the nuclear codes and needed to locate where they took Reagan. The officer had Randal get into the back seat and drove back down to the scene of the shooting where they tried to place John Hinckley Jr. inside the patrol car. Randal having the nuclear codes tried to wave them away but the officer trying to open the door was not paying attention and reached in unlocking the door. Randal reached over and relocked the door then pointed to the briefcase as the officer looked inside he then noticed Randal in the back and said this on video which can be heard if you know what occurred and watch the video again. The identity of the officer in the car has not yet been discovered. This recording was never made public by the mainstream media and the mainstream media claimed the door lock was broken, as the reason the police could not get the shooter Hinkley into the police car. In the video you can clearly see Randal reach over and re-lock the door after they un-locked it. These moments were covered up by the media who were paid to cover up and not release this footage.

Bill Gates’ family owned a house down the street from where Randal Turner stayed in Kenmore Washington. The house next door to Randal is where Gates worked on the computers with Paul and Steve Ballmer. Randal Turner met Gates when he was working next door. Gates was also in the group of elitists Randal had been sold into who had deep ties to the whitehouse. The favor was for Randal to talk to his handlers to get the US China trade agreement changed to allow Microsoft to manufacture in China. Randal’s alternate personality was used to make this deal with George Bush Sr. Randal took the request of the China deal to Bush who rejected it. However, Secretary of Defense Caspar Weinberger over heard the request and discussed it with Bush. Weinberger convinced Bush saying if they changed the agreement they could sell old stock military arms to China as well.

Randal had met Reagan at a party at Reagans house where they were waiting for the voting polls to come in. He also met Bush Jr. and Jeb Bush at this party.

Bill Gates’ favor was for Randal to talk to his handlers to get the US China trade agreement changed to allow Microsoft to manufacture in China. Randals alternate personality was used to make this deal with George Bush Sr. Randal took the request of the China deal to Bush who rejected it. However, Secretary of Defense Caspar Weinberger over heard the request and discussed it with Bush. Caspar convinced Bush saying if they changed the agreement they could sell old stock military arms to China as well. Bush said these exact words to Bill Casey: ”If he (Reagan) doesn’t cooperate with us we will do to him what we did to the Kennedy brothers.”

They concluded the favor by making Randal the patsy when the shooting was not successful.

Before the shooting, it had been planned by George Bush Sr. and Director of Central Intelligence William J. Casey that Reagan would be assassinated because Reagan rejected Vice President George Bush’s trade request. The assassination would put Bush in the presidential seat. This would be done to seal a trade deal with China. Bill Gates made a deal to give 25% of Microsoft to Randal if he did Gates a favor in the white house. On the day of the shooting Alexander Haig had Randals hair cut and dyed and dressed in a uniform that matched Colonel Jose Murattis, to make him look as close to Reagans regular military aide as possible. Haig then gave Randals alternates his instructions.

Randal was supposed to shoot Reagan as programmed but didn’t shoot. Looking at the video Randal has determined the officer in front of him had jumped back knocking Randal to the ground when Hinckley began shooting, this caused Randal to snap out of the programming, Randal was confused as can be seen in his expression as he looks around in the video. After the shooting stopped Randal ran towards the limo knowing the codes were supposed to be at Reagan’s side. The women you hear in the background yelling Mr. Reagan.. President Reagan. Randal believes those were activation words in his programming directing him to turn and shoot as he has a memory of somebody repeating those words to him prior to the shooting. When the shooting did not go as planned those involved had to figure out a way of getting control of the Whitehouse and the Nuclear codes along with the key card Reagan had on him which was taken by people involved and given to the FBI after they spoke with Bill Gates father finding out Reagan had sexually abused him and other teenagers at the Whitehouse. The FBI were in contact with George Bush Sr. who’s plan it was from the beginning and agreed to hold the Nuclear codes and key card until Reagan handed control over to Bush Sr.

Randal being an MkUltra mind control slave did not know of any of these plans until after the events when he was being used as a patsy along with Haig having to take the wrap to cover up for the other elitists, Haig was forced to resign but suffered to punishment once Bush had control.

The assassination attempt took place on the sidewalk in front of the Washington Hilton hotel. Most of those in the entourage knew what was going to happen, they told Randal not to get to close to Reagan-to just stay behind him. But Reagan noticed he was not Muratti, his regular aide, and started to ask him something. One of the men there drew Reagan’s attention away before Randal could answer and after that he did not bother with the disguised Randal again.

After the shooting, Randal was interrogated by some men unknown to him. Randal was water boarded, but to no avail. He could remember nothing except Haig being involved in preparing him as Reagan’s aide so they ended up sticking his head under water and drowning him. Randal recalls one of them pushing on his chest as he started to breathe again. They did this a second time and resuscitated him yet again but he had no more info to give them. It was his alter who had the information as it was the alter who was in the event. One of the men wanted to drown him again but the other man there said he was worried they would not be able to revive him the third time.

Bill Gates father spoke with the FBI on the phone after the shooting occurred, telling the FBI about how they used Randal Turner for sex parties at the Whitehouse. Bill Gates father who was an attorney, must have been working with Bush Sr. in some way for them to keep everything quiet and get the trade agreement changed to allow Microsoft to manufacture in China. Gates never followed through on his 25% promise to Randal and soon after Paul Allen, the co-founder of Microsoft, says that in 1982 he overheard Bill Gates, the other co-founder, discuss with Steve Ballmer how they could reduce Allen’s share in the company after they heard he had Hodgkin’s lymphoma. In the 1970s Gates had more than once reduced Allen’s share in the business. Hearing this, Allen charged into the room and broke up the conversation. “I had helped start the company and was still an active member of management, though limited by my illness, and now my partner and my colleague were scheming to rip me off. It was mercenary opportunism, plain and simple,” Allen writes in his autobiography.

Though the elite sealed the trials and claimed it was done for national security, as they seem to always do. In the trial surrounding Reagan they found out about the drug Adrenachrome being used. Randal remembers Jon Voight had told Reagan that Randal would not remember anything he had witnessed. Reagan did not want the public to know saying Randal was on the Adrenachrome drug. Reagan was pleased and sexually abused Randal the first time prior to becoming president during a poll results party at his house in California while Randal was under this mind control drug. Reagan and the others involved in this secret society began to use Randal for sex parties to the Elitists. Randal can recall some of those who he was pimped out to by Marcheline Bertrand: Gloria Vanderbilt, Laura Bush, Barbra Bush, and Lillian Bettencourt along with a number of female celebrities whose husbands were closet homosexuals which will all be named later. In order to keep everything from the public Reagan agreed to give control of the trade agreement to Bush and probably had more power in the Whitehouse than we know of.

The court also revealed Randal did not shoot and ended up becoming a patsy when the assassination attempt failed. Claiming Randal, a 16 year old boy at the time, planned to assassinate the president with the assistance of Alexander Haig. Alexander Haig’s involvement was discovered during the torture and drowning interrogation but Randal was unable to name anybody else due to his programming they were unable to extract anything else from him. Haig was tossed to the wolves in order to cover up the truth. Records show Haig was removed from office in 1982 further substantiating Randal’s claims as well as making more sense of why Haig was really removed from office in July 1982.

“I was one of the teens they used when [Franklin Scandal victim]Paul Bonacci was there. I met Paul and was one of the kids with him when …. they sodomized me and tossed me around like a sack of potatoes then threw me to the ground and fired a gun at me.” — R. Turner

For more videos from Randal please visit: https://vid.me/Randy_S_Turner

To help Randal, his paypal account:  randysturner@gmail.com

Randal’s GoFundMe: https://www.gofundme.com/mkultra-victim-relocation-fund

A jury bought the story that the Hinckley case was strictly one of a deranged individual obsessed with an actress and he was found guilty and packed off to the Washington-area St. Elizabeth’s mental hospital — an institution with a fascinating history of involvement with the CIA’s MK-ULTRA program, which focused on mind control experiments — and efforts to study the possibility of “programming” killers. Psychiatrists played a crucial role in recruiting subjects for these experiments. More details here.

More on OpJustice: Exposing Mk Programs here, here, here and here.

October 2

There Will Be Blood Pt 1

Your DNA is more valuable than you are told and allowed to know.
The lie began in the seventies by Francis Crick who did not himself understand the pattern of DNA and assumed that since he did not understand it it must be junk… as is usual for scientists to do. The world never looked further. Sadly this is the cycle humanity has been stuck in for far too long.  In the early 2000s, Geneticists mapped out the genome but still could not ‘make sense’ of 97% of its 3.2 billion bases. Thus the claim of ‘junk’ DNA continued. 
 In the 1990s, a team of Russian linguists lead by Dr. Peter Gariaev discovered that the  genetic code in this so called ‘junk’ DNA. They discovered it follows uniform grammar and usage rules virtually identical to those of human language. It turns out that the ‘junk’ was laden with the intimations of intelligence, purpose and meaning. 
His team confirmed also that using correct light and sound frequencies, we can cause ‘jumping DNA,’ or transposons within the so called ‘junk’ DNA to move from one location to another and re-code the organism at the physical level. Negative words, frequencies, arguments, curse words, and the like leave us feeling bad even after the issue is resolved-for a reason. It contracts the DNA molecule, compressing it.  Positive words and love frequencies heal and refresh us-unwinding or decompressing the DNA exposed to them.  It is always nice to hear nice things from people. It is vital to life to feel love. Words and frequencies are so much more important than the meaning of the words spoken. It affects not only our thoughts and emotions, but it affects everything in us down to our very DNA
Resonance Documentary:
While babaric western researchers cut single genes from the DNA strands and insert them elsewhere, the Russians enthusiastically worked on devices that can influence the cellular metabolism through suitable modulated radio and light frequencies and thus repair genetic defects. We see the Russians working deeper while the west throws away most of the natural and real product.  Everything is better when its artificial…right?
What we are not told about DNA.
The moment a sperm cell touches an egg cell there is a spark of light-Frequency. Humans have light in us which is why we have an aura. During 1984, Dr. Peter Gariaev made a startling discovery. He found that an in vitro DNA sample, in a test tube, had the ability to attract and harness coherent laser light causing it to spiral along the DNA helix.  After removing the DNA sample the photons continued to spiral as if the DNA was still there. After blowing the phantom DNA away with gaseous nitrogen, it returns in 5 to 8 minutes. Gariaev also remarked that sound waves radiated by the DNA molecules were registered in these experiments.  In every moment DNA harnesses sound and light. 
Gariaev and his research group also succeeded in proving that chromosomes damaged by x-rays, for example, can be repaired. They even captured information patterns of  a particular DNA and transmitted it onto another thus reprogramming cells to another genome. Through the correct vibrations, frequencies, the entire DNA information was transmitted without any of the side effects or disharmonies encountered when cutting out and re-introducing single genes from the DNA.  
DNA can be influenced and reprogrammed by words and frequencies WITHOUT cutting out and replacing single genes.
Finally in recent years, another group has exposed the DNA coding. This group, called Encode, has figured out the switches, signals and sign posts embedded throughout the entire length of your DNA. Again, confirming the Russians discoveries.  
The elite do not want you to be able to use the 90% of your brain. That is why you are told it is junk.  In 1910 when the  Rockefeller Foundation issued a grant to the American Federation of Musicians to popularize the concept of changing the frequency of music.  The official ‘A’ note was changed from 432hz to 440hz in September 1939 when Rockefeller financial interests dictated that the standard tuning of the note A above middle C would henceforth be said to vibrate at precisely 440 cycles per second. Why 440? Because it promotes physical and mental disease and distrust, while effectively  suppressing spirituality, intuition and creativity. Music is used, as everything is by the elites, as a master weapon. This of course makes sense as they are Luciferians and Lucifer was the angel of music. Luciferians control Hollywood and the music industry. Always have. The Rothschild Rockefeller line determined the musical factors capable of producing psycho pathology, emotional distress and ‘mass hysteria.
4.5hz causes paranoia. 6.66hz causes depression. 11.3hz causes manic rage and so on. This is how weapons such as the heart attack gun and cancer gun work.
The media is broadcasting audio at 440hz, which is damaging to the human body’s organs and also changes your DNA, which is the goal of the Freemasons, the Illuminati. The elite. They care nothing for  you.

There is no such thing as ‘junk’ in the natural world. Every piece of every thing has a purpose and fulfills it-unless hindered by an outside force. Every piece of DNA is active and needed. It is all used. It is all unique and important to you. Those who attempt to alter it by outside means will be cursed indeed. 

Today we have increasing programs like ID 2020. Governments across the world have already started using biometric identification with no cards or papers needed.  

Your DNA is going to become your ID Number. The one thing that should be most sacred to everyone. Is now being put on the internet, given over to governments, as quickly as possible, uploading to the so called “cloud”. Free for anyone and everyone to hack, steal, use and destroy. More specifically: making it as easy and as simple as possible for the elite to get rid of you.
Do not give your DNA away for free as you keep trying to do with every new app that comes by and every new technology gadget. 
Wake up.
The Elite genetically modify our food which in turn alters and kills your DNA.  
They poison the water to kill and destroy your DNA
They poison the air to destroy your DNA
All of that happens to most humans on a daily basis. On top of that, designer diseases and viruses have been manufactured for decades made to target specific DNA codes.  Diseases and viruses such as Ebola, Zika, Bird Flu, Swine Flu.  This has been going on since before the Black Plague.
Engineered nanoparticle data suggests that three particle-types induce different degrees of DNA damage. Of the three particle-types tested, exposure to ZnO nanoparticles may cause the most significant DNA damage.
More Info Here.and Here. and Here.
Frequencies and your DNA.
These frequencies are purposely disruptive and damaging to our DNA. Damage to DNA causes health problems. It increases the likely hood of  miscarriage. Other effects of frequency attacks are aggravated allergies, disturbed sleep, night sweats, heart palpitations, muscle and nerve pain.  Radio frequencies have effects such as: Headaches, irritability, memory problems, inability to concentrate, bed wetting in children.  These things all happen because of DNA damage. Cell death. Genetic dissolution.  The  frequencies. The chemtrails. The poisoned genetically altered food and water. These attacks done on us by the elite are not regulated or given  in doses according to each persons limits.  These things are forced on you and every ones tolerance is differentEven Solar flares affect your DNA.
Meanwhile the USA government is working on a law allowing companies to strong-arm their employees into taking genetic tests and then sharing that data with unregulated third parties as well as the employer. Employees that resist could face penalties of thousands of dollars. 
But this is old news, it was approved in the Senate Dec. 13, in the House April 8 and signed by Bush April 24, 2008. “For the reason of National Security” President Bush ordered the law to gather the DNA of all citizens. Records are kept in government genomic biobanks and considered governmental property. The DNA taken at birth from every citizen is essentially owned by the  government, and every citizen becomes a potential subject of  government-sponsored genetic research.  For many generations now all birth certificates, bank accounts, and the like have been logged by the government and anything logged by the USA government is copied and saved in the Vatican as well. Welcome to the new world order.
Of course, as the public will hear of it. DNA collection programs are offered as screening requirements to detect treatable illnesses.” It makes it sound nicer when it is said in that way.

In England they decided doctors should look at problem children and have those children reported and their DNAtaken in case they would become criminals. Senior police forensics experts believe genetic samples should be studied, because it may be possible to identify potential criminals as young as age 5!!!!! The first DNA bank in the world was opened in London.

Biometrical fields discussed during the Jubilee XXXth SPIE-IEEE Wilga 2012, May Edition, symposium on Photonics and Web Engineering. It is interesting to note what is discussed at these elite closed door secret meetins.  Topical tracks of the symposium embraced, among others, nanomaterials and nanotechnologies for photonics, sensory and nonlinear optical fibers, object oriented design of hardware, photonic metrology, optoelectronics and photonics applications, photonics-electronics co-design, optoelectronic and electronic systems for astronomy and high energy physics experiments, JET tokamak and pi-of-the sky experiments development

In 2015 Michael Farzan, an immunologist at Scripps started the first human trial called immunoprophylaxis by gene transfer, or IGT. IGT is being sold as a new and different type of vaccination. “A new cure“.  It is a form of gene manipulation. Scientists isolate the genes that produce powerful antibodies against certain diseases, then synthesize  artificial versions. The genes are placed into viruses and injected into human tissue, usually muscle. 
The viruses invade human cells with their DNA payloads. They cure you by giving you a disease that attacks and alters your DNA FOREVER.  The synthetic gene is incorporated into your own DNA, if all goes well. -that is a big ‘If’. The fake synthetic genes instruct the cells to begin manufacturing powerful antibodies. 
This started in 2015!  Alteration of the human genetic makeup. Permanently changing your DNA.
A group of researchers from the University of Washington have shown as well that it is possible to encode malicious software into physical strands of DNA.  But the government already knows that they have been doing this for years.This is not a new plan. It is an old one, that succeeded once-thousands of years ago. They have been working to complete it ever since it was destroyed. DNA manipulation and gene editing are nothing new.
Bioweapons have been used to subdue and depopulate and torture populations throughout history.  Brought to you by the beloved elite we expose to you here. 
In 2016, 150 scientists from all over the world gathered behind locked doors in a secret meeting. They discussed gathering DNA from newborns without parental knowledge. In order to use it to create DNA that did not consist of any natural DNA. This practice is called Crisper.
Bill and Melinda Gates, who are huge funders of all things depopulation, have also  provided significant funding to the University of North Carolina to develop ultrasound infertility technology that could render human sperm unviable for up to six months.

Now ancestry websites offer DNA testing so they can save and own your DNA.

 China (and many other countries) have been collecting biometric information from millions of people whom it deems potential threats—among them, Uyghurs, migrant workers, and  college students—as part of national DNA database.

The pace at which DNA mining is increasing is terrifying indeed-and MUST BE STOPPED.

Genetic testing is used for purposes found immoral in the Hippocratic medical tradition. They create prejudice. They make an individual less useful to society in the eye of the elite. Available for the purpose of killing that person, as has been done in totalitarian systems throughout history. Likewise, the use of genetic testing in attempts to breed a super race would be immoral and unethical. In every respect.

We are human. Regardless of age. Regardless of genetic make up. We have rights. Rights to privacy. Rights to freedom.

 Don’t let our DNA become their next ball and chain.

Because DNA can alter itself through our emotions and frequencies.  There is no such thing as predisposition without hope of change.  No longer is there a valid excuse.  You are in  control of your own body and mind through your DNA.  
Negativity is a choice. Fear is a choice. Those are tools the elite use to enslave you.
Decide now before it is too late. The upcoming deceptions of the elite are going to become much more difficult for you to stand up against.  The final deception the elite have planned is what we will proceed to expose to you in upcoming videos and articles.  Why the elite want your DNA.  What side are you on. The line is drawn. Will you break free and heal yourself.? Keep your DNA, your identity sacred?  Or will you throw it away with your soul?
Be love, or be lost.
August 4

Raping Reality


Artificial Intelligence and Augmented Reality is targeted for the next generation-the children of today. The mind of a child which is not developed will now develop in augmented (changed, altered) reality. They will be unable to distinguish from true reality.

We are born into a controlled and augmented society keeping us from truth, degrading us and enslaving us. This is the elites lie. The constant rape of what humanity really is.

Tactical Augmented Reality is made for soldiers  and will not need an independent GPS device. Instead soldiers will simply see a map overlaid on the terrain in front of them through a helmet mounted eyepiece. Just like they do in the movies.

Studies have shown that people inside Immersive Virtual Reality behave realistically when presented with complex situations. As a result a new generation of social and behavioral scientists are turning into VR to design experiments including moral dilemmas. Through multisensory stimulation healthy humans can experience what they call agency illusions over an avatar. It is as if your real body is perceptually substituted by a virtual one. This allows for manipulations beyond what would be possible in reality of course. The effects and traces of such body substitution can be measured using subjective reporting. behavioral and objective physiological measures.

All one has to do is look very briefly into how the human mind works and can so easily be manipulated and altered by senses and experiences. There will soon be no division from dreams and real life. The elite have been studying social engineering, mind manipulation, for thousands of years, so it would be important for you to catch up on this fundamental topic.  See more Here. Here. And Here.

When you Cant tell the difference between reality and games-when People think because they are watching through a screen it must not be real- our nightmares are allowed to happen. It is desensitizing to view things through a lense.  The ability to enslave you just got a whole lot easier.

Thanks to your smart devices and the geotagging and info gathering they do for the government. AR uses this information and allows everyone else to see it. What you put on the internet can not be taken off. Everything that goes on the internet or on a device connected to the internet is tracked. Think about what is connected to wi-fi. Everything on that device is on the internet. Everything on the internet can be hacked. Thanks to this smart technology now people with AR Apps can see it all. Nothing is free. You are the product.

Meanwhile little is said or done about the gigantic security risks this opens up.

“Geotags” are GPS coordinates that associate pictures, videos, documents, notes, tweets, etc. with a physical location.  Your physical location. Geotagging is similar to what happens when a picture is date-stamped by a camera. The risk at the personal level, is extremely high. Smartphones automatically geotag pictures taken with the phone’s camera. This “perk” is usually turned on by default.

So sit back in your smart car and drive through your smart city. If I may, I will just point your smart phone camera at the stop and Civic Augmented Reality can deliver up your personalized schedule by using your location data along with the camera to detect points of interest. CAR can deliver in real-time any data a city chooses to make available: Transit schedules and traffic reports, information about local events, emergency service facilities, available parking spots, and more. A visual search feature allows users to scan city assets like subway stations, restaurants, signs and even trees for information.

Apples new tool called AR Kit was given to its 17 million developers to build augmented reality features into their apps. The system can place virtual 3D objects inside the phone camera’s field of view. Artificial intelligence software for facial recognition, barcode detection and language understanding.

A Couple of Leading AR Developers:

Valve Corporation is lead by Gabe Newell. As one would guess he is a Harvard Graduate with 13 years at Microsoft. Mike Harrington is another Microsoft pawn. He worked there for 9 years before he worked for Google. Scott Lynch worked for LinkedIn which is a sub company of Microsoft. So Valve Corp is Microsoft. As we will find most of the AR and VR developers are.

42 Entertainment is another leading AR developing company. Seems it is also a Microsoft subcompany. Lead by Bob Fagan from Microsoft, Elan Lee from Industrial Light and Magic which was started by George Lucas. (After which he went to Microsoft.) Sean Stewart from Microsoft, and Jordan Weisman graduate of a marine academy who worked for Microsoft. We see without going through the entire leadership of this company that it too is a Microsoft company.

As always the elite have the monopoly on everything you get to use and see.

Microsoft announced at GDC 2017 plans to bring mixed reality to the Xbox in 2018. The goal with AR and MR, unlike with VR, is to blend digital objects with environments from the real world. More Here.


Over the last couple years cyber security firms have been migrating to Israel. Israel is home to cyber security R&D centers for many leading American companies, including RSA, IBM, Microsoft, Akamai, Intel McAffe, Palantir, Intuit, AVG, F5 Networks, Palo Alto Networks and PayPal. More recently groups such as Germany’s Frauhofer Institute and Lockheed Martin have announced intentions to set up large R&D centers in Israel. Microsoft bought Hexadite israeli cyber security firm for 100 million dollars this June. Lockheed Martin has invested 25 million with Israeli cyber security firm Cybereason. More on Government Infiltration of AR Here.  More on Watson Involvement here.

The Global virtual reality association Members are Google, Samsung, Oculus, Vive, PlayStation, Star VR.

Dr. Josiah Dykstra of the NSA envisions an augmented reality application that could assist in task processing. Wearing an augmented reality device like Google Glass. The worker would be presented with the most pertinent cybersecurity alerts and information immediately and like every educated asshole Dykstra has no hard data that this is possible. He gets “anecdotal proof” of the concept from those who work in the field. Typical.

People already believe deception is better than reality and truth. The elite have drained everything good in life out of us. Our intelligence is stunted by chemicals and lack of education. Even the most highly sought education is controlled and censored keeping people blind and lost because of the conditioning and indoctrination. The elite force on us to keep us from ever being able to find the truth. That is the point. Many look for the truth only to be deceived by half truths-keeping them at arms length from the full knowledge and truth they need. Augmented reality is the perfect way to completely destroy humanity by stripping us of all that makes us human: our minds, our hearts and our souls.

Tech Insider Warns of AI:

For more videos please see our Playlists on the YouTube Channel.

To Address the issue of Parallel Universes, which you will find in excess should you research technology today, we know how the elite work. They rewrite history after they destroy the proof they can and create time lapses and gaps. This is what wars and battles accomplish. This is nothing new. The Mandela Effect was created by the elite to hide the last time they rewrote mass history. Separation and ignorance allows history to repeat. Research exposes the truth. In the world of technology you will hear many times the concept of parallel universes. This is one of the deception distractions you will find.

Every government including the Vatican is planning for such an event and conditioning you to be unphased by it when the technology deception happens-when they tear the veil and our world is invaded. So they tell you there are parallel universes; this leads the mind to slowly care less than it already does for this reality. (The only one that we live in.) No consequences in reality for the actions done in the game. With the children growing up in this augmented mindset, things quickly become dangerous.

This conditioning about parallel universes is only going to be used to deceive the masses and prepare them for what they will call an alien invasion, which we know the truth about and have discussed before. We already live in the matrix, in augmented reality. We who are awake know the difference between the elites games and what is truly the dark real world we are in today. The awakened remnant are the ones who can see it. The sheeple live in the simulation. We must unplug them.

The Human mind longs for dimensions because we know there is more. There is something in all of us, some feel an empty hole they try to fill by shopping, eating, sex, drugs, work, facebook. Whatever the warning you receive, it is for a reason. It is because there is more. You are MORE. That is what it means to have a soul. The elite know this too and there in lies the problem. So they will make their lies so good you can not tell the difference between them and real life. They will strip you of reality as they have already stripped you of knowledge and life. They have already stripped you of good Health. They have stripped you of good food. They have stripped you of good water. They have stripped you of good air. They have stripped you of good education. They have stripped you of good leaders. Will you let them take the final blow? Will you let them take your soul? The souls of those you love?


Stop letting your brain washing and programming hold you back in your meaning less and purpose less life. Stop asking someone else the questions and find the answers. Advance. Prepare. Be human again.  Technology will eventually be used to take your soul. That is the elites end goal and though not achievable this year, that is what they will pursue until it is accomplished.

Stop playing the game and hack the system.

July 29

Waves of Intelligence

Quantum computers are the secret KEY to unlocking all encrypted files. Privacy is now an illusion of the past.
DWAVE:  Funded by InQTel (a branch of the CIA that started Google and Facebook). 
Google, NASA, CERN and other companies have been using DWave for a few years already.  
Quantum Computing is the reality of the minority report: precrime. All of your data they have been gathering from your social media accounts and phone apps and every single thing you do online.  All of your data in your file and now finally able to be analyzed and sorted thanks to Quantum Computing.  Now it will be no problem to make more detailed lists of citizens. Those who will rise up and those who will go along with the plans.  Social Engineering just got a lot more interesting. Computers can now predict humans actions before they happen based on their past and present data. This is happening today in China. 
Google has this  technology: to psychologically profile and predict the behavior of  human consumers so  that high-value ads can be delivered to them across  Google’s search engine and content networks as the main stream story line goes. We know from the PRISM program that this will enable Google to funnel psych profile meta-data on internet users to the NSA.

Quantum   computers can be used to search large databases in a  fraction of  the  time that it would take a conventional computer. Other  applications  could include using quantum computers to study quantum  mechanics, or even to design other quantum computers. Teaching machines how to learn and think for themselves.
Machine Learning (Artificial Intelligence) has given us self-driving cars, practical speech recognition, effective web searches and more. All under the guise of convenience. 
Google’s algorithm recognizes that you searched for something a  couple of seconds after searching something else, and it logs and saves this for future users who make a similar typing mistake. As a result, Google ‘learns’ to correct it for you.
In 2013, a D-Wave Two  system was installed at the new Quantum Artificial Intelligence Lab, a  collaboration among Google, NASA and the Universities Space Research  Association (USRA). The lab is housed at the NASA Ames Research Center  in California. In September 2015 the system was upgraded to a 1000+  qubit D-Wave 2X quantum computer. 
Eric Ladizinksy (Founder of Dwave) has told us Dwave first doubled every couple years, then every year, then every six months and now every 3 months! 
Rose’s Law is a relatively new observation that states that the computational power of quantum computers doubles every 12 months, as opposed to the 18 month doubling of Moore’s Law.  
As  D Wave advanced they made hardware upgrades. Also were able to tune the  machine into the frequency of the universe which seems to make it sound like a “heart beat.” 
We are all made up of and affected by frequency- people, planets, solar systems; we  are now connected to an AI machine that scientifically proven, travels/computes in multiple dimensions at once!
“So the enabler for AI is machine learning,” Intel’s Nidhi Chappell,  “AI has become so pervasive in our lives we don’t come to recognize that it’s powering a lot of things. You probably use it dozens of times a day without knowing it.”
3 types of learning:
Reinforcement  learning: This type of  learning concentrates on how an AI ‘agent’   should behave in order to get  the most out of its work. The machine picks an action or a sequence of  actions, and gets a reward. This is used when teaching machines to play  and win games but needs a large number of trials to learn even simple tasks.
Supervised learning: This is when researchers tell the machine what the correct answer is for a particular input. For example, they show it an image of a car and tell it the correct answer is “car.” It is the most common technique for training  neural networks and other machine learning architectures.
Unsupervised learning/predictive learning: Humans and  animals learn, typically, in an unsupervised manner by watching how the world works and by observing  our parents. Basic concepts such as: objects don’t disappear spontaneously and objects that are not supported fall.  Researchers don’t know how to do this with machines at the moment, at least not at the level that humans and animals can.
In 2018:  Google turns over its search engine algorithm to a massive  network of  self-learning machines. Soon thereafter, a voice interface is  added to  Google, achieving the “Star Trek computer” goal that Google  first  outlined in the 1990’s.
Ray  Kurzweil, director of engineering at Google, also claims that the   biological parts of our body will be replaced with mechanical parts and   this could happen as early as 2100. Kurweil made the claims during his  conference speech at the Global Futures 2045 International Congress in   New York at the weekend. His goal is to merge with the machines in order to be immortal.
Kurtzweil also states 2000 and 8000 qubit systems are coming in 2 years and 4 years that will speed up solving nearly all machine learning optimization problems in one second after they are formulated properly for the Dwave system. In a few years, Kurzweil will have the classical computer power of Google’s data centers and quantum computer power that could be beyond  the power of all classical computers to drive his solution of greater than human intelligence: “artificial intelligence”.
Singularity University describes itself as “a global community using exponential technologies to tackle the world’s biggest challenges  is the creation of Ray Kurzweil who is Google’s Director of Engineering.
With the rapid growth of AI technology will inevitably take over our lives.  AI will do our jobs faster and cheaper.  AI will drive our cars safer and more efficiently.  AI will control our bodies frequencies and mental processes.
In the UK, a report  released by thinktank Reform says roughly 250,000 public servants could  lose their jobs to robots over the next 15 years. Meanwhile, other  governments such as those in Hong Kong and Singapore are increasingly  turning to AI to take over various administrative functions.
News  is that AI is even creeping up into freedom of speech and press – Google’s  Digital Journalism Initiative is spearheading an AI software called  JUICE which claims to “help” (CENSOR) reporters write more “accurate and engaging  pieces” meaning what fits the elites agenda of propaganda as we have already seen in internet censorship today.
Microsoft is already cutting its workforce and jobs to “move towards cloud tech.”  Keyword meaning Artificial Intelligence.
AI can be used to address child abduction issues and prevent traffic congestion, according to the Chinese version of Li’s non-binding proposal. Instead of being better humans we will make machines to do it for us.
“In  the future, robotics may be combined with AI, neurology, mechanical  engineering and many other fields to deeply influence our life and  work,” Ma said at a press conference in Beijing on Friday evening.
AI is also receiving a  big push from Facebook and Google as they invest billions of dollars  through OpenAI and DeepMind to democratize the technology – not to  mention countless acquisitions of AI talent. But the corporate activity  merely proves that big-business has plans for AI, whereas AlphaGo  beating Lee Sedol signals the possibility that AI could indeed be more  capable than humans.
You  can consider corporate activity like Facebook, Google, Snapchat, Baidu  as a signal of trust. You can also trust the direction of car companies  like GM, Mercedes-Benz, Uber, and Tesla towards autonomous cars. And you  can trust academics, the White House and other longitudinal thinkers  when they say past academic research, computational power and large  accessible data sets will together create a perfect storm for AI  impacting our lives Asia will be big in AI. If you look at the data trends, there is a tonne of  AI research done in China, Japan, South Korea and Singapore. In fact  there are more cited publications in China than in the United States.
AI is naturally receiving large contributions from Facebook and Google as they invest billions of dollars through OpenAI and DeepMind to democratize the technology – not to  mention countless acquisitions of AI talent. But the corporate activity merely proves that big-business has plans for AI, whereas AlphaGo beating Lee Sedol signals the possibility that AI could indeed be more capable than humans.

An interesting reddit feed

Jordan Novet May 16, 2013 Posted:  
“It’s  been almost two decades since Peter Shor came up with a a breakthrough  algorithm for finding the prime factors of a number with a quantum  computer, sparking great interest in quantum computing. But commercial  adoption has been pretty much nonexistent. On Thursday, though, Google came forward with news that it’s launching a Quantum Artificial  Intelligence Lab that will include a quantum computer, apparently  making it the second company to pay for a quantum computer. The development suggests that quantum computing could finally be taking off.”
Earlier  this year Lockheed Martin shared details of its implementation of a D-Wave Systems quantum computer, which reportedly cost $10 million: The contractor is using the computer to develop new aircraft, radar and  space systems. 
“Following  a recent upgrade, the USC-Lockheed Martin Quantum Computing Center  based at the USC Information Sciences Institutes now the leader in  quantum processing capacity.
With   the upgrade — to 1,098 qubits from 512 — the D-Wave 2X™ processor is   enabling QCC researchers to continue their efforts to close the gap   between academic research in quantum computation and real-world  critical  problems. The  new processor will be used to study how and  whether quantum effects can  speed up the solution of tough  optimization, machine learning and  sampling problems. Machine-learning  algorithms are widely used in  artificial intelligence tasks.”  Read the  entire article here.
Now  Google is taking steps at incorporating more quantum computing into its operations with the Quantum Artificial Intelligence Lab, which will be  located at the NASA Ames Research Center in Moffett Field, Calif.  Researchers from the Universities Space Research Association will be  able to use the machine 20 percent of the time, Forbes reports. That  could lead to lots of interdisciplinary thinking and collaboration.
For Google, though, the goal of the initiative is to make strides in  machine learning, according to a Thursday Google Research blog post. The  best results could trickle down to end users, perhaps in search results  and speech-recognition applications.
Google  has already assembled machine-learning algorithms that involve quantum  elements. The  applications might have arisen after Google’s earlier partnership with  D-Wave, which came to light in a different blog post from Neven in 2009.
Google  has already used machine learning to recognize faces and other things  in photos and videos. New technology Google executives talked about at  the Google I/O developer conference in San Francisco on Wednesday also  appears to use machine learning to stitch together photos and clean them  up.
What  Google has learned so far is the best results come from blending  regular binary computing using ones and zeros with quantum style  computing. Quantum computing accommodates the space between a one and a  zero with quantum bits of information, or qubits. It can express  likelihood as well as take shortcuts by approximating when handling  certain kinds of workloads. Given what Google has observed thus far, it  could decide to build hardware combining quantum and classical computing  capabilities.
In  any case, quantum computing has a long way to go before reaching commercial viability. But  because the organization at the helm of the quantum research is Google and not IBM or Bell Labs, regular people could start seeing much more of the advantages in just a few years’ time, which in turn could drive commercialization.
Lets look at some very small points and you can follow the links for more indepth explanations. 
Richard Feynman once famously stated that nobody un-derstands quantum mechanics. 
Extensive  testing and interviews demonstrate that a significant fraction of  advanced undergraduate and beginning graduate students, even after one  or two full years of instruction  in quantum mechanics, still are not proficient at those functional  skills. They often possess deep-rooted mis-conceptions about such  features as the meaning and significance  of stationary states, the  meaning of an expectation value, properties  of wave functions, and quantum dynamics. Even students who  excel at  solving technically difficult questions are often unable to  answer  qualitative versions of the same questions. 
Quantum Mechanics: where the rules of the world you experience don’t apply.
The property of entanglement: where particles can take on related properties if they end up in an equation together. If you separate these particles, they remain entangled with these properties until you observe one of them—then the other particle assumes its corresponding value. (A 1 or a 0) It’s as if the fact that you observed the first particle immediately transmits information to the other particle about how it should look. 
Schrödinger’s equation:  Tiny particles,  such as electrons or photons,  can simultaneously take on states that we  would normally deem mutually exclusive. They can be  in several places  at once, for example, and in  the case of photons  simultaneously  exhibit two kinds of polarization. We  never see this  superposition of  different states in ordinary life  because it somehow  disappears once a system is observed:   when you  measure the location of an electron or the polarization of a   photon,  all but one of the possible alternatives are eliminated and  you  will see  just one. Nobody knows how that happens, but it does
“The prowess of quantum computing comes from the “ghost-angel” state of a quantum system. The uncertainty of the state applied to quantum mechanics is only true for a linear superposition of coherent quantum states, which I term the ghost-angel state.  This state has not been found to exist for macroscopic objects.”  
In March 2000, scientists at Los Alamos National Laboratory announced the development of a 7-qubit quantum computer within a single drop of liquid.   The quantum computer uses nuclear magnetic resonance (NMR) to  manipulate particles in the atomic nuclei of molecules of trans-crotonic  acid, a simple fluid consisting of molecules made up of six hydrogen  and four carbon atoms. The NMR is used to apply electromagnetic pulses,  which force the particles to line up. These particles in positions  parallel or counter to the magnetic field allow the quantum computer to  mimic the information-encoding of bits in digital computers.
Some Quantum Physics:
It is still unclear why the observer of an experiment determines  behavior  of the system and causes it to favor one state over another. When  light is introduced to atoms, it recharges them. You cannot observe the system or measure its properties without  interacting with it. And where there is interaction, there will be modification of properties.
Basic logic of physics is incorrect and the entire underlying structure of  physics is unable to be used in quantum physics because the core logic is entirely different. Not to mention basic physics is mostly lacking because much is based off the work of Albert Einstein who’s theories were based on incorrect assumptions.  By default everything built on this foundation is built on lies. Theories-Assumptions and guesses.
We  have to choose between the two evils. But remember, now scientists  are  increasingly convinced that the basis of our mental processes is created by these notorious quantum effects. So, where the observation ends and reality begins, is up to each of us.
  • Theoretical  physics is a branch of physics which employs  mathematical models and  abstractions of physical objects and systems to  rationalize, explain  and predict natural phenomena. This is in contrast  to experimental  physics, which uses experimental tools to probe these  phenomena.
  • The advancement of science depends in general on the interplay between experimental studies and theory.
  • D-Wave  starts off with a set of noninteracting qubits—a collection of   supercomputing loops kept at their lowest energy state, called the   ground state—and then slowly, or “adiabatically,” transforms this  system  into a set of qubits whose interactions at its ground state  represent  the correct answer for the specific problem 

More Here.  Here.  And Here. 

According  to Forbes, when  the world’s first digital computer was completed in  1946 it opened up  new vast new worlds of possibility. Still, early  computers were only  used for limited applications because they could  only be programmed in  machine code. It took so long to set up problems  that they were only  practical for massive calculations.
John  Backus created the first programming language, FORTRAN, at IBM in 1957.  For the first time, real world problems could  be quickly and  efficiently transformed into machine language, which made  them far more  practical and useful. In the 1960’s, the market for  computers soared.
Like   the first digital computers, quantum computing offers the possibility   of technology millions of times more powerful than current systems, but   the key to its success will be translating real world problems into   quantum language.
Quantum  computers aren’t limited to two states. They encode information as  quantum bits, or qubits. Qubits represent atoms, ions, photons or  electrons and their respective control  devices that are working  together to act as computer memory and a processor. Because a quantum  computer can contain these multiple states at the same time. It has the  potential to be millions of times more  powerful than today’s most  powerful supercomputers.
This superposition of qubits is what gives quantum computers their inherent parallelism. According to physicist David Deutsch, this parallelism allows a quantum computer to work on a million computations at once, while your desktop PC works on one.
One problem with the idea of quantum computers is that if you try to look at the subatomic particles, you could bump them, and thereby change their value. If you look at a qubit in superposition to determine its value, the qubit will assume the value of either 0 or 1, but not both. To make a practical quantum computer, scientists have to devise ways of making  measurements indirectly to preserve the system’s integrity. Entanglement provides a potential answer. In quantum physics, if you apply an outside force to two atoms, it can cause them to become entangled, and the second atom can take on the properties of the first atom. So if  left  alone, an atom will spin in all directions. The instant it is  disturbed  it chooses one spin, or one value; and at the same time, the  second entangled atom will choose an opposite spin, or value. This allows scientists to know the value of the qubits without actually looking at them.
Dario Borghino October 6, 2015 
In  what is likely a major  breakthrough for quantum computing, researchers  from the University of  New South Wales (UNSW) in Australia have  managed for the first time to  build the fundamental blocks of a quantum  computer in silicon. The  device was created using standard  manufacturing techniques, by modifying  current-generation silicon  transistors, and the technology could scale  up to include thousands,  even millions of entangled quantum bits on a  single chip.
The  real power of this  breakthrough is not in a slightly higher  operational temperature, but in  the fact that these basic building  blocks of quantum computers were  built by doing simple modifications to  current-generation silicon  transistors. The researchers say they have  worked out a way to extend  this technique to a much larger number of  qubits, even numbering in the  thousands of millions, all reported to be  fully entangled.
Patent Notice
Intellectual Property Notices
D-Wave  Systems Inc. (“D-Wave”) has marked various products, and documents  describing various products and services, with a universal resource  locator that resolves to this document.  Notices applicable to D-Wave’s  intellectual property rights associated with D-Wave’s products and  services including the marked products and services are listed below.   The intellectual property rights include: copyright, trade-mark, patent,  and other intellectual property rights.
No  part of any computer software, or associated documentation, included in  D-Wave’s products and services may be reproduced, stored, or  transmitted in any form, or by any means, without the written permission  from D-Wave.
No  part of any D-Wave’s documentation or website may be reproduced,  stored, or transmitted in any form, or by any means, without the written  permission from D-Wave.
D-Wave,  D-Wave One, D-Wave Two, D-Wave 2X, Bare Metal, Chimera, D-Wave  Blackbox, D-Wave QSage, D-Wave Butterfly, Vesuvius and the associated  logos are trade-marks or registered trade-marks of D-Wave Systems Inc.  in the United States and/or other countries.
D-Wave’s  chips and portions or components thereof are covered by, or for use  under, one or more of U.S. Patents: 7,135,701; 7,418,283; 7,619,437;  7,639,035; 7,687,938; 7,876,248; 7,880,529; 7,898,282; 7,899,852;  7,984,012; 8,018,244; 8,098,179; 8,169,231; 8,195,596; 8,247,799,  8,421,053; and/or one or more pending U.S. patent applications,  maskworks, as well as patents and pending patent applications in other  countries.
The  D-Wave One™; computer and portions or components thereof are covered  by, or for use under, one or more of U.S. Patents: 7,135,701; 7,418,283;  7,619,437; 7,639,035; 7,687,938; 7,843,209; 7,844,656; 7,870,087;  7,876,248; 7,880,529; 7,898,282; 7,899,852; 7,984,012; 8,008,942;  8,008,991; 8,018,244; 8,032,474; 8,035,540; 8,073,808; 8,098,179;  8,169,231; 8,174,305; 8,175,995; 8,190,548; 8,195,596; 8,195,726;  8,228,688; 8,229,863; 8,244,650; 8,244,662; 8,247,799; 8,279,022;  8,283,943; and/or one or more pending U.S. patent applications,  maskworks, as well as patents and pending patent applications in other  countries.
The  D-Wave Two™; computer and portions or components thereof are covered  by, or for use under, one or more of U.S. Patents: 7,135,701; 7,418,283;  7,619,437; 7,639,035; 7,687,938; 7,843,209; 7,844,656; 7,870,087;  7,876,248; 7,880,529; 7,898,282; 7,899,852; 7,984,012; 8,008,942;  8,008,991; 8,018,244; 8,032,474; 8,035,540; 8,073,808; 8,098,179;  8,169,231; 8,174,305; 8,175,995; 8,190,548; 8,195,596; 8,195,726;  8,228,688; 8,229,863; 8,244,650; 8,244,662; 8,247,799; 8,279,022;  8,283,943; 8,355,765; 8,386,554; 8,421,053; 8,441,329; 8,441,330;  8,464,542; and/or one or more pending U.S. patent applications,  maskworks, as well as patents and pending patent applications in other  countries.
The  D-Wave 2X™; computer and portions or components thereof are covered by,  or for use under, one or more of U.S. Patents: 7,135,701; 7,418,283;  7,619,437; 7,639,035; 7,687,938; 7,843,209; 7,844,656; 7,870,087;  7,876,248; 7,880,529; 7,898,282; 7,899,852; 7,984,012; 8,008,942;  8,008,991; 8,018,244; 8,032,474; 8,035,540; 8,073,808; 8,098,179;  8,169,231; 8,174,305; 8,175,995; 8,190,548; 8,195,596; 8,195,726;  8,228,688; 8,229,863; 8,244,650; 8,244,662; 8,247,799; 8,279,022;  8,283,943; 8,355,765; 8,386,554; 8,421,053; 8,441,329; 8,441,330;  8,464,542; 8,494,993; 8,504,497; 8,536,566; 8,560,282; 8,536,566;  8,611,974; 8,536,566; 8,536,566; 8,700,689; 8,738,105; 8,772,759;  8,786,476; 8,812,066; 8,854,074; 8,874,629; 8,951,808; 8,977,576;  9,015,215; 9,026,574; 9,069,928; and/or one or more pending U.S. patent  applications, maskworks, as well as patents and pending patent  applications in other countries.
Other Intellectual Property Rights:
D-Wave’s  products may be covered by maskworks, design patent or registered  industrial design, or other registered intellectual property rights.
July 16

George Soros’ Ukraine sponsored Hillary Clinton using IMF loans

This article we have copied from https://cyber-berkut.org/en/ as many articles and websites of this sort tend to go missing online. Much love to Cyber Berkut and all of the hard work that went into this.  We love you very much.

Please see their site for more interesting news and enjoy a small portion of our Clinton email archive here!

We hope you enjoy this article as much as we did!

We will not forget.

We will not forgive.

12.07.2017 г. Ukraine sponsored Hillary Clinton using IMF loans

The Ukrainian investigation case connected to commercial banks that laundered IMF’s money from the National Bank of Ukraine is still going on. According to the investigation, such banks as Tavrika, Pivdenkom Bank, Avtokraz Bank, CityCommerce Bank, Finrost Bank, Terra Bank, Kyivska Rus Bank, Vernum Bank, Credit Dnepr Bank, Delta Bank were involved in the criminal scheme. Funds were transferred through Austrian Meinl Bank AG.

We, CyberBerkut, decided to contribute to the investigation.

Having examined the materials published on the Internet we focused on two financial organizations named Credit Dnepr Bank and Delta Bank. In comparison with other banks these two financial organizations offshored much more money. These banks are closely related to Victor Pinchuk – one of the richest Ukrainian bankers. He is also a son-in-law of former Ukraine’s President Leonid Kuchma. As it turns out, the offshore organizations that received IMF’s money such as Melfa Group LTD (Belize), Tandice Limited (Cyprus), Tosalan Traiding Limited (Cyprus), Agalusko Investment Limited (Cyprus), Winten Trading LTD (Cyprus), Silisten Trading Limited, Nasterno Commercial Limited, are also connected to this gentleman. Moreover, most of money went to the account of his main money-laundering machine – the Victor Pinchuk Foundation.

So, we decided to track down the stolen funds.

We’ve hacked Thomas Weihe’s email. This man is the Head of the Board of the Victor Pinchuk Foundation. As you can see from his correspondence the oligarch’s foundation is closely cooperating with the Clinton Foundation. And it is worth to mention that Pinchuk and his wife often meet with former American president’s family members. Mr. Weihe regularly communicates with the Clinton Foundation representatives and constantly arranges meetings between the Pinchuks and the Clintons. Here are some Mr Weihe’s emails.






Full emails archives can be found by clicking the link.

In addition, over the past 5 years the Victor Pinchuk Foundation transferred to the Clinton Foundation from 10 to 25 million dollars. The largest tranches from the Pinchuk Foundation to the Clinton Foundation were held in 2015 and 2016. And by a “fortune chance”, Hillary Clinton fought for the Oval at the exact same time.

Below you can see the financing scheme of H. Clinton’s election campaign using IMF’s loans that were intended for Ukraine.

We would also like to remind you that the former Ukrainian Finance Minister N.Yaresko was an American businesswoman, the former head of the National Bank of Ukraine N.Gontareva worked in foreign banks for a long time. Coming back to the Credit Dnepr Bank which belongs to V.Pinchuk it is worth to mention that his supervisory board includes former IMF managing director D.Strauss-Kahn who probably still has influence on the international credit organization.

We are CyberBerkut! We will not forget! We will not forgive!

13.01.2017 The United States to Manufacture False Evidence of Russian Involvement in Cyber Attacks

Our whistleblowers gave us information that Russia was going to face great provocation. The Americans intend to manufacture false evidence of the Russian security services’ involvement in cyber attacks during the U.S. presidential elections 2016.

We cover the names of the provocation facilitators in order not to expose our sources. It is worth saying, a famous American politician and major financier took part in the plot.

We are CyberBerkut! We will not forget! We will not forgive!

04.11.2016     Department of State Secret Operation in Ukraine

We, CyberBerkut, keep our activity in closed computer networks of the Presidential Administration of Ukraine. Today, we gained access to some internal documents of the Presidential Administration related to the visit of its former leader Boris Lozhkin to the USA in June 2016.

Among other documents we paid attention to the collection of damaging documents concerning Paul Manafort, the American political consultant, who was an adviser on the Ukrainian presidential campaign of the former Ukrainian President Viktor Yanukovych and his Party of Regions.










The results of our investigation on the basis of the received documents surprised us by its extent of national betrayal of the Kiev junta. As it turns out, now the whole state machine and the entire administrative system of Ukraine are working for its overseas bosses and patrons.

As we have discovered, the documents were handed over to Boris Lozhkin during his meeting with Evan Ryan, the US Assistant Secretary of State for Educational and Cultural Affairs, in Washington. They were only a part of a larger campaign of the US State Department to discredit Manafort who held at that time the post of Donald Trump’s campaign chief.

Taking into consideration nearly a decade of Manafort’s work as the political adviser in Ukraine, supporters of Hillary Clinton in the Department of State decided to use their power. They set a task to the Ukrainian leadership to find some dirt on Manafort and make it public.

The wishes of their bosses were transmitted to Kiev via Valery Chaly, the Ambassador of Ukraine to Washington who previously was the Deputy Head of the Presidential Administration of Ukraine.

At that time, the SBU had already had the records of Party of Regions at their disposal. Paul Manafort, the adviser of Yanukovych, and many other well-known Ukrainian politicians were mentioned there.

The whole operation was designed to leak this information to the media. Viktor Trepak, the former first deputy chairman of the Security Service of Ukraine, while leaving the intelligence agency incidentally picked up a pack of documents and somehow miraculously escaped prosecution. Then he gave these documents for the analysis both to the National Anti-Corruption Bureau of Ukraine and Serhiy Leshchenko, the Ukrainian MP, who had long been known as an American agent of influence.

At the same time, the Department of State sent instructions to the US Embassy in Ukraine and personally to the ambassador Jeffrey Payette to supervise the operation. Shari Bistransky, the US Embassy Cultural Affairs Officer, became responsible for the communication with the chief “investigator” Sergei Leshchenko as usual.

The scheme of the Manafort campaign is as follows:

Moreover, in order to dispel any doubt we attach a kind of profile on the notorious traitor Serhiy Leshchenko that describes his activities for the benefit of Washington in detail. Download a profile

As a result, the leaks led to the Manafort resignation from the post of Trump election campaign chief in mid-August.

Anyway, we see that the authorities in Kiev are ready to perform any deeds at Washington’s whistle. And it does not matter for them that their obedience can backfire their own people. The main idea is to please the overseas bosses.

It should be noted that this information operation was the final chord for Payette, who moved to Greece at the end of August and Lozhkina who triumphantly left the Presidential Administration in late August. As for Leshchenko, who bought a luxury apartment in the center of Kiev in the late August as well, this campaign became a kind of a career promotion. In October 2016, he had the honor to personally meet Victoria Nuland.

Finally, we publish other Presidential Administration documents related to Lozhkin’s trip to the United States.

In addition to official meetings and events, the Head of the Presidential Administration was trying to arrange meetings with giants of the IT-market Elon Musk and Sergey Brin, as well as popular film director Steven Spielberg.








Apart from that, Boris Lozhkin’s visit to the United States coincided with the Global Entrepreneurship Summit in Silicon Valley. Ukraine received an invitation to participate from the U.S. National Security Council, but the government didn’t find a suitable candidate.



At the same time during the Lozhkin’s trip the U.S. Congress sent a formal letter to President Obama urging him to visit Ukraine in July 2016. However, this wish remained unfulfilled.




We are CyberBerkut! We will not forget! We will not forgive!

22.10.2016 г.     CyberBerkut hacked NED: US is preparing a color revolution in Russia

according to Ukrainian model

We, CyberBerkut, gained access to closed messages of National Endowment for Democracy (NED)

In 2013 in Ukraine started revolution, which cracked the country, divided families and ignited civil war. As known, one of the main sponsors of that bloody show was National Endowment for Democracy financed by US Congress. “Thanks” to its money many young Ukrainians came to the streets and started riots.

Then Americans used a common plan: first heated up the population by materials in the media they financed and then started to openly “pump” money into street riots. Now, the same focus they are trying to do with Russia. And one of the main role here belongs to journalist David Satter.

According to our information, Satter works for American special services and has close ties with international fraudster William Browder. Satter lived in Moscow for quite a long period of time and cooperated with such editions as Wall Street Journal, Financial Times and Radio Liberty. But in 2013 he was refused to prolong his Russian visa. Since then he started to actively support Russian oppositional media.

As it became known from NED materials, Mr. Satter provides quite a wide range of services. If you study all the reports it will become clear that almost each anti-Russian propaganda material published by Radio Liberty and a number of Russian “liberal” media is prepared under Satter’s supervision.

In just 10 months of 2016 Mr. Satter ordered 24 articles and investigations in such media as RBC, Vedomosti and Radio Liberty. For example, Sergei Dibrov’s “A Black Day in the History of Odessa” which insults the memory of people who were killed in Odessa trade union building. Another six articles are being in the “pipeline” or are ready to be published.

The main goal of this “journalism” is to discredit the Russian Federation’s heads, members of their families and close friends. Most often materials ordered by Satter are about Vladimir Putin, Sergei Chemezov, Dmitry Rogozin, Sergei Shoigu, Vorobiev father and son, Rotenberg brothers and other famous Russians.

Another report sent by Mr. Satter to NED

It should be noticed that invoices with detailed description of his services Mr. Satter sends to NED. In one of them, “our” consultant even noticed that he spent $11.50 on telephone.

According to reports we’ve got David Satter is a chain-link between NED, Radio Liberty and Russian oppositional media. NED materials show that Washington is ready to do everything to shatter political situation in Russia and organize the same chaos that we witnessed here in Ukraine in 2013.

To prevent this, we publish this and a number of other NED documents and hope they will somehow help some people see the real world.



Download all documents

We are CyberBerkut! We will not forget! We will not forgive!

June 4

Family Aldobrandini

The papal bloodlines are the least researched and exposed (by others) of the bloodlines of EL.  We will discuss the Aldobrandini family here.
We must know our enemy so we are not deceived this time.

A great deception is coming and a prince of peace will come into the world spotlight.  Do not fall for this antichrist. Do not be deceived.

Be free.