MUFON Mission Creep: Whistleblower Revelations of Phil Leech Expose Potential HIPAA Law Violations as Covert Deep State Allegiance Indicator in Interview with Erica Lukes

By Jon Kelly

NewsInsideOut.com

Vancouver, BC – Exclusive new video published to social media on February 12, 2019, catches up with former Mutual UFO Network (MUFON) Utah State Director Erica Lukes in conversation with NewsInsideOut.com co-editor Jon Kelly discussing explosive revelations from UFO Classified’s recent interview series with MUFON whistleblower Phil Leech. This latest NewsInsideOut.com UFOlogy and Exopolitics investigation raises disturbing questions regarding how MUFON could possibly survive an audit testing compliance with its own internal guidelines, let alone one that evaluated MUFON compliance with U.S. federal laws and regulations. UFO Classified with Erica Lukes airs Friday nights at 4 p.m. PST/7 p.m. EST on KCOR.

Erica Lukes is a UFO researcher and host of UFO Classified on the KCOR Digital Radio Network. She is the former state director for the Utah chapter of the Mutual UFO Network (MUFON) who trained as a MUFON field investigator. She is currently holding a substantial historic archive of UFO periodicals, research, rare books and other publications (some of which were willed to her by noted researchers) available through special public events in Salt Lake City. Erica will be seen on Science Channel’s “NASA’s Unexplained Files”.

In a series of letters posted to UFOClassified.com earlier this year the former National Director of MUFON’s Case Review Team detailed an emergent culture of extensive background checks targeting individuals reporting UFO incidents where potential Health Insurance Portability and Accountability Act of 1996 (HIPAA) law violations exposed Americans’ protected health information (PHI).

In the first document Phil Leech wrote “I have found that some investigators are having extensive background checks run on witnesses when they submit a report … one report showing a comprehensive list of medications a witness is using with side effects from these medicines.” Citing MUFON’s Case Management System (CMS) as a multi-user access online database, the author noted “many individuals within MUFON” could inappropriately (if not illegally) access such protected records via a simple login.

According to the U.S. Department of Health & Human Services, the HIPAA Privacy Rule “requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. The Rule also gives patients rights over their health information, including rights to examine and obtain a copy of their health records, and to request corrections.” How MUFON is maintaining compliance with such standards is not well-understood at the time of this writing.

The Phil Leech letters further chronicle seemingly outrageous evidence management practices naming MUFON’s Director of Investigations Chase Kloetzke in the black hole funneling of highly sensitive materials collected from witness medical procedures (an alleged implant) to Luis Elizondo, formerly with the Pentagon’s Advanced Aerospace Threat Identification Program (AATIP), now To The Stars (TTS) Academy’s Director of Global Security and Special Programs.

In a passage that appears to defy the author’s understanding of chain of custody compliance, Phil Leech wrote how this exotic specimen left MUFON’s purview via “Lue Elizondo with the production company from A&E that picked it up for transport.” The whistleblower asked incredulously “After 50 years of searching for the truth why would [DOI Chase Kloetzke] or anyone else turn over the one piece of evidence that could prove this all to a Production Company?”

In the way described by whistleblower testimony MUFON appears to resemble an active covert partner to multiple departments of the federal government including the U.S. Department of Homeland Security’s widely-derided “If You See Something, Say Something” informants campaign, where bureaucratic mission creep imposes continuingly increasing demands for public data mining in the name of quotas and yearly bonuses. It is in such a manner that MUFON appears to act as a covert enabler of ongoing out-of-control big government expansion into what remains of private life in America.

And MUFON is not alone in potential privacy trespasses. In perhaps the most bizarre turn of events supposed Secret Space Program (SSP) whistleblower Corey Goode and protégé Jordan Sather have been named as principal actors in a criminal #DoxxGate doxxing campaign targeting online critics and opponents resulting in legal action due to HIPAA law violations against one of their victims. Ironically it was Corey Goode’s controversial appearance at the 2017 MUFON Symposium that fueled in part a mass defection of the organization’s senior membership protesting MUFON’s latest iteration as an entertainment production company that has abandoned science in all but name.

MUFON’s ridiculous public embrace of Corey Goode’s ever-changing narratives alongside an apparent shared HIPAA law violation modus operandi seems to define both parties as Blue Avians of the same feather. Seen in this profound light, Goode and company as cultural phenoms can also be understood as characters in live action national security exopolitical theater role play harboring covert allegiance to U.S. federal agency initiatives.

Recommended Reading

Erica Lukes: An Emerging Scientific Universalism for UFOlogy’s Racist Neo-Fascist Times

UFOlogical death of the confidential informant: Erica Lukes full statement and interview

Advancing the Horizon of Human Understanding: MUFON Utah State Director Erica Lukes Interviews Jon Kelly

Maria Butina: The Spy Who Said Too Much, Analysis of the James Bamford Audio Tapes

Anna Chapman’s secret messages named youth accomplice, anticipated handler’s betrayal

Maria Butina: The Spy Who Said Too Much, Analysis of the James Bamford Audio Tapes

By Jon Kelly

NewsInsideOut.com

Vancouver, BC – Exclusive new video published to social media on February 13, 2019, explores seemingly indicting granular audio reflections from tapes of best-selling U.S. national intelligence author James Bamford’s interviews with confessed unregistered Russian foreign agent Maria Butina. Outtakes from these recordings were released earlier this week by CNN. On that same day an article published in The New Republic offered the sympathetic portrait of pro-gun rights Right to Bear Arms’ founder as an American University graduate swept up in the “Trump-Russia maelstrom”.  However, none of these arguments explain the manner in which the new video shows Maria Butina appearing to cite an “enemy” in sleep talking–like encrypted narrative while describing her arrest by the FBI.

Russian activist Maria Butina was arrested by agents of the U.S. Federal Bureau of Investigation in Washington, D.C., last summer where she was charged with acting as an agent of a foreign government absent prior notice to the U.S. Attorney General. Held in solitary confinement the Siberian native gave in December what Russia’s Foreign Ministry described as a false forced confession pleading guilty to conspiracy.

Author James Bamford’s 1982 book “The Puzzle Palace: Inside the National Security Agency, America’s Most Secret Intelligence Organization” exposed a 1976 Justice Department criminal investigation into massive illegal domestic NSA wiretapping, a nightmare that re-emerged into public consciousness during the George W. Bush administration’s surge in “Top Secret America” economics at the beginning of this century.

The Emmy-nominated journalist told The New Republic how he met with Maria Butina over a number of lunches earlier last year where he commenced a series of interviews that continued after her arrest. Outtakes from taped interviews that were released by CNN showed the accused protesting her innocence.

Earlier NewsInsideOut.com coverage of events surrounding Maria Butina investigated her videotaped appearance at 2015 FreedomFest where an unforced sleep talking-like confession disclosing status as a Russian spy was revealed via granular audio analysis of spontaneous on-camera remarks. Previous granular audio work by this reporter identified a Russian spy in the 2010 Anna Chapman “Illegals Program” whose name was published in the Wall Street Journal nine months later.

The aura of certitude that accompanies the following reporting is founded in this writer’s historic international public legacy exceeding industry standards of performance and reliability in forwards-looking counterintelligence investigative journalism. The following is a transcript of outtakes provided by CNN of James Bamford’s Maria Butina interview tapes. Multidimensional speech messages are indicated in bold followed by the context in which they were discovered. Granular audio methods are discussed later in this article.

We need surrender. We have struggled. Believe the lie: If I would be invisible Russian spy, you would never see me in public. I would be the most unseen person on Earth.

There’s an enemy: I had just cleaned my apartment and I was baking banana bread. They told me “FBI, search warrant” so I opened the door. They just walked in the door. I was pushed back.

Interpreting these messages invites the observer to consider the role of ideology and ideological indoctrination in the behaviors of Maria Butina. In the first instance this speaker appears engaged with a struggle related to identity insomuch as she outwardly denies being a spy while secretly commanding compliance with a narrative in which Maria Butina appears to have little faith.

The notion of struggle is itself central to Marxist ideology found in discussions of class struggle and the struggle of the proletariat labor class vs the bourgeoisies. This begs the question if a Russian spy would show indications of intensive Communist indoctrination such as those revealed in this study focussed upon Maria Butina, any more so than an average Russian citizen.

In sharp contrast to the U.S.-Russian friendship mission cited by Maria Butina in reports linked above, the speaker appears in the second instance to recognize an adversarial force when discussing how representatives of the federal government arrested her. A 2018 NewsInsideOut.com report investigating police bodycam footage of YouTube shooter Nasim Aghdam revealed her assertion of “militia” status during a public safety check conducted by officers at a Walmart parking lot in Silicon Valley.

Would a Russian intelligence old-guard ideologue construe representatives of the United States government as “enemy” personnel any more so than the average Russian citizen studying in a foreign country?

In this reporter’s opinion Maria Butina is the spy who said too much. If James Bamford had intended to further shield her reputation he would have been well-advised to never allow these tapes to enter the public record in a widely-publicized journalistic climate where digital audio workstations shred false testimony for days.

Methods

Research that exposed human speech as a “multidimensional stimulus” with “numerous ways you can extract a message from it” was reported in the scientific journal Nature in 1999. In that report human observers were described as competent in resolving words while listening to highly-distorted speech recording samples. The procedure followed by scientists at Cal State involved digitally sampling recordings of human speech where samples were then reduced to grains of @50ms in duration.

Those grains were then locally time-reversed and globally resequenced in an attempt to emulate conditions found in voice-over-digital-network transmission (now commonly referred to as VoIP telephony). This methodology parallels techniques commonly used in biosciences where the nucleotides (grains) of a DNA molecule (sample) are resequenced in attempts to express novel characteristics of existing organisms (or to synthesize entirely new organisms from existing genetic materials).

For every set of discrete items the number of possible permutations of its order or sequence can be determined by using what is known as the factorial function (n!) where for example 3! = 3 x 2 x 1 = 6. In terms of granular speech synthesis the number of 50ms grains can be substantial, leading to what mathematicians call large numbers. For example, calculating the number of possible permutations of a set of 21 50ms grains by factorial function can be said to result in approximately 51 sextillion different sequences (5.1090942e+19).

However, for every set of discrete items (no matter how many), it can also be said that one possible permutation will always reflect the mirror or reverse order of the original sequence. In such a way (1, 2, 3) is newly rendered as (3, 2, 1). This understanding offers a shortcut of which common knowledge within the scientific and engineering communities is indicated by the inclusion of reverse macro functions in widely-used digital audio workstation (DAW) software applications and hardware. Investigators following the sampling, granular time-reversing and resequencing procedure modeled by scientists studying human speech intelligibility at Cal State can bypass untold iterations and simply monitor audio playback in reverse or mirror order with one click of a cursor.

From this reporter’s perspective the most important reason for bypassing myriad alternative sequence iterations is founded upon empirical evidence of practical intelligence discovered encrypted backwards in human speech. In the public domain this intelligence has offered preemptive understanding of facts concerning the Iraq War, the identity of one serial killer, the identity of a Russian spy and the resurrection of a CIA assassination program all named in broadcast media and online publications sometimes years before they were substantiated by mainstream news reports. Some of these reports are detailed in links provided below.

However, within modern society there remain numerous deeply ingrained superstitious implications of such encrypted multidimensional speech phenomena. These perceptions can be said founded upon dogmatic unscientific belief in fictitious untestable unproven entities and their supposed influences upon human behavior. Proponents of such scandalous misconceptions would stir the public to reject any suggestion of a time wheel’s (Sanskrit “Kalachakra”) bi-directional rotation, for instance. It is this type of Luddite perspective that would discourage the use of an automobile transmission’s reverse gear, compelling motorists to circumnavigate the globe instead of simply backing into a parking spot.

Therefore, only those capable of rejecting medieval injunctions against widdershins procession can embrace the type of volatile materials revealed through such a path of auditory inquiry. To quote one prominent Seattle psychologist this extremely psychoactive procedure and its findings are “not for beginners”.

Recommended Reading

‘She’s a Spy’: Alleged Russian Operative Maria Butina Disclosed Secret Agent Status at 2015 FreedomFest

Anna Chapman’s secret messages named youth accomplice, anticipated handler’s betrayal

Was YouTube Shooting a Terrorist Attack? Police Video ‘Militia’ Secret Suggests Nasim Aghdam Accomplices

‘Sex with Daddy’: Helsinki Secret Messages Confirm Trump a Putin Proxy

‘Lie for Russia’: President Trump Kompromat, evidence encrypted in statements to CIA

Phoenix@Home: Domestic Counterinsurgency Program U.S. President’s Endgame Solution to Government Shutdown, QAnon CIA Phoenix Program Cheerleader

Vancouver, BC – Exclusive new video published to social media on January 14, 2019, reveals the U.S. President considering a CIA Phoenix Program-emulating domestic counterinsurgency initiative focused upon raids, occupations and arrest of political “enemies”. NewsInsideOut.com co-editor Jon Kelly broke the story while covering last Tuesday’s Oval Office Address as co-host for Sunday’s episode 142 of End of Days: The Michael Decon Program. The former CBS Radio feature producer, first to report a resurgent Phoenix Program in wake of Ukraine’s 2014 Euromaidan Revolution presented granular audio analysis revealing POTUS’ sleep talking fever dream-like counterinsurgency solution to the longest government shutdown in U.S. history, part of an ongoing scenario the head of Russia’s Roscosmos has described as the “second American civil war” now underway.

Below is a partial transcript of opening remarks by U.S. President Donald Trump during his January 8, 2019, Oval Office Address (Source: C-SPAN “President Trump Address on Border Security”). Those comments were subjected to granular audio analysis for this exclusive NewsInsideOut.com U.S. presidential investigative report with results presented below. Secret sleep talking-like messages encrypted backwards in POTUS’ statements are indicated in bold. Granular audio methods and their implications are discussed later in this article.

The raids. Occupy. Arrest enemy: My fellow Americans, tonight I am speaking to you because there is a growing humanitarian and security crisis at our southern border. Every day, customs and border patrol agents encounter thousands of illegal immigrants trying to enter our country. We are out of space to hold them and we have no way to promptly return them back home to their country. America proudly welcomes millions of lawful immigrants who enrich our society and contribute to our nation.

Both Erik Prince (Blackwater/Academi) and Oliver North (Iran-Contra) were named as participants in meetings with the U.S. President by a report published in The Intercept in January 2017. Further coverage by Democracy Now later that year stated “Prince and North have pitched the private network of spies as a way for the White House to counter members of the intelligence community, or the so-called deep state, who Trump claims are subverting his presidency.”

A transcript of a 2016 interview from former White House Chief Strategist Steve Bannon’s SiriusXM radio show was said to reveal the following conversation.

Erik Prince: “Two: a Phoenix-like program. OK, remember the Phoenix Program was a root canal done to the Viet Cong during the Vietnam War. It was a kill—”

Stephen Bannon: “You mean, this is the Phoenix Program—this is the Phoenix—hang on. This is the Phoenix Program in Vietnam.”

Erik Prince: “It was a vicious, but very effective, kill-capture program in Vietnam that destroyed the Viet Cong as a military force. That’s what needs to be done to the funders of Islamic terror, and that would even the wealthy radical Islamist billionaires funding it from the Middle East, and any of the other illicit activities therein.”

This reporter first broke news of a resurgent Phoenix Program while covering Ukraine’s Euromaidan Revolution in a 2014 report that detailed U.S. Secretary of State John Kerry’s secret message, stating how “The secretary invokes a reinvigorated CIA Phoenix Program (1965 – 1972).” During remarks given in Kiev following the overthrow of that nation’s democratically elected leadership Secretary Kerry was observed to have spoken the words “Scary. The phoenix sat up.” 

Cult followers of the QAnon disinformation feed may find cause for celebration in this revelation as it seemingly parallels persistent claims of its presumed intelligence agency asset authors. Fake coverage of QAnon’s Pizzagate predecessor led at least one online publication to fraudulently headline a New York Police Department raid on a Hillary Clinton property, an event that apparently never occurred. BuzzFeed reported in late 2016 that “SubjectPolitics.com ran a story with the headline “IT’S OVER: NYPD Just Raided Hillary’s Property! What They Found Will RUIN HER LIFE.””

The leader of a veterans group in Tucson, Arizona, reportedly faced multiple charges of trespassing when he was arrested last July for occupying a Cemex plant he alleged was the site of a sex trafficking ring. In an article published last August the Arizona Republic described that man as a follower of QAnon who translated the online disinformation feed’s distorted worldview into real world events. Tucson police were said to have investigated the publicly-owned Mexican multinational’s building supply site “but found no evidence of child sex trafficking at the camp or anywhere else in the area” according to 12 News KPNX.

Independent media site The Outline highlighted in late 2018 how a “Q-pocalypse” in the form of mass arrests, imprisonment and possible execution of “every prominent Democrat” was slated for December 5 but failed to materialize. The New Year’s Eve report went on to itemize other futile QAnon predictions while exploring its seeming appeal to religious evangelicals.

Abortive QAnon predictions have been noted by Foreign Policy who last November cited “The problem with Q’s [failed] predictions was not only the specificity of the events themselves but that they were dated.” The Daily Dot last August offered its survey of “every QAnon prediction that’s failed to come true.” And the venerable Boing Boing chimed in further with “Advice for people who just realized that Qanon is bullshit” predicated upon the now widely-recognized December 5 mass arrests boo-boo.  

Of deep concern to this reporter is the way in which QAnon attempts to popularize sadistic cheerleading for domestic fratricide, for blue-on-blue incidents en masse. QAnon dogma appears to envision life under a counterinsurgency not unlike conditions endured by people living under the CIA Phoenix Program during its active phase in the Vietnam War (1965-72).

With the benefit of hindsight Francis Ford Coppola’s epic “Apocalypse Now” (1979) can be understood as cinematic culture’s subtextual contemporary commentary on the CIA Phoenix Program in the wake of disclosures that arose from the 1975 Church Committee hearings. Those U.S. Senate hearings resulted in public disclosure of CIA and NSA activities including mass domestic surveillance, mind control and torture frankenscience, assassinations of foreign leaders and domestic/international news media infiltration/domination.

Methods

Research that exposed human speech as a “multidimensional stimulus” with “numerous ways you can extract a message from it” was reported in the scientific journal Nature in 1999. In that report human observers were described as competent in resolving words while listening to highly-distorted speech recording samples. The procedure followed by scientists at Cal State involved digitally sampling recordings of human speech where samples were then reduced to grains of @50ms in duration.

Those grains were then locally time-reversed and globally resequenced in an attempt to emulate conditions found in voice-over-digital-network transmission (now commonly referred to as VoIP telephony). This methodology parallels techniques commonly used in biosciences where the nucleotides (grains) of a DNA molecule (sample) are resequenced in attempts to express novel characteristics of existing organisms (or to synthesize entirely new organisms from existing genetic materials).

For every set of discrete items the number of possible permutations of its order or sequence can be determined by using what is known as the factorial function (n!) where for example 3! = 3 x 2 x 1 = 6. In terms of granular speech synthesis the number of 50ms grains can be substantial, leading to what mathematicians call large numbers. For example, calculating the number of possible permutations of a set of 21 50ms grains by factorial function can be said to result in approximately 51 sextillion different sequences (5.1090942e+19).

However, for every set of discrete items (no matter how many), it can also be said that one possible permutation will always reflect the mirror or reverse order of the original sequence. In such a way (1, 2, 3) is newly rendered as (3, 2, 1). This understanding offers a shortcut of which common knowledge within the scientific and engineering communities is indicated by the inclusion of reverse macro functions in widely-used digital audio workstation (DAW) software applications and hardware. Investigators following the sampling, granular time-reversing and resequencing procedure modeled by scientists studying human speech intelligibility at Cal State can bypass untold iterations and simply monitor audio playback in reverse or mirror order with one click of a cursor.

From this reporter’s perspective the most important reason for bypassing myriad alternative sequence iterations is founded upon empirical evidence of practical intelligence discovered encrypted backwards in human speech. In the public domain this intelligence has offered preemptive understanding of facts concerning the Iraq War, the identity of one serial killer, the identity of a Russian spy and the resurrection of a CIA assassination program all named in broadcast media and online publications sometimes years before they were substantiated by mainstream news reports. Some of these reports are detailed in links provided below.

However, within modern society there remain numerous deeply ingrained superstitious implications of such encrypted multidimensional speech phenomena. These perceptions can be said founded upon dogmatic unscientific belief in fictitious untestable unproven entities and their supposed influences upon human behavior. Proponents of such scandalous misconceptions would stir the public to reject any suggestion of a time wheel’s (Sanskrit “Kalachakra”) bi-directional rotation, for instance. It is this type of Luddite perspective that would discourage the use of an automobile transmission’s reverse gear, compelling motorists to circumnavigate the globe instead of simply backing into a parking spot.

Therefore, only those capable of rejecting medieval injunctions against widdershins procession can embrace the type of volatile materials revealed through such a path of auditory inquiry. To quote one prominent Seattle psychologist this extremely psychoactive procedure and its findings are “not for beginners”.

Recommended Reading

Revived CIA Phoenix assassination program reported three years before Snowden’s Intercept: Maidan Conspiracy Redux (British black ops in Kiev sniper attacks)

‘JOB LOSS’: Larry Kudlow’s Secret Message Exposes ‘Invisible’ 2019 Recession

Pilot’s Irish UFO ET Crash Recovery Secret Messages Anticipated Four Years Earlier during BC Wilderness Night Vision Contact Event

Pipe Bomb PSYOP Suspect Cesar Sayoc Advertised POTUS Hero Worship According to Secret Messages

Saudi Journalist Jamal Khashoggi Unconsciously Anticipated Death by Murder Secret Interview Messages Reveal

U.S. President Nixon Wanted to Nuke Vietnam in 1968 says Secret Message, Nuclear Ambition’s Role in Johnson Peace Talks ‘Betrayal’ Exposed

By Jon Kelly

NewsInsideOut.com

Vancouver, BC – Exclusive new video published to social media on November 23, 2018, exposes the role of U.S. President Richard Milhous Nixon’s evident nuclear ambition in a reportedly treacherous subversion of the 1968 Johnson Vietnam peace talks. Granular audio analysis of a Face the Nation interview from later that year shows the Republican nominee deceptively downplaying reporters’ questions about undermining the president’s anti-war initiative when he uttered a sleep talking-like phrase stating “We nuke them now.” This NewsInsideOut.com U.S. presidential history investigative report appears at a time when critics say America’s Commander in Chief is MIA while unarmed troops guard the U.S. southern border patrol.

Background from a Washington Post article written in 2009 states how “The story of Richard Nixon’s surreptitious contacts with the South Vietnamese government is quite well-known: fearful that a last-second peace deal would give Hubert Humphrey the election, Nixon agents—chiefly Anna Chennault—reached out to the South Vietnamese government of Nguyen van Thieu. The message: a peace settlement under a Nixon presidency would be more favorable to the South Vietnamese.” The role of Asian American political operative Anna Chennault is highlighted in a new MSNBC documentary titled “Betrayal” now available online.

Nixon White House Chief of Staff H.R. Haldeman’s notes from October 22, 1968, published by the New York Times record a conversation with the then-Republican nominee asking him to “monkey wrench” the peace talks. Citing declassified Johnson White House Tapes the BBC wrote in 2013 “By the time of the election in November 1968, LBJ had evidence Nixon had sabotaged the Vietnam war peace talks – or, as he put it, that Nixon was guilty of treason and had “blood on his hands”.”

A Guardian book extract from 2000 explains President Nixon ordered a tactical nuclear strike against North Vietnam in 1969. It went on to state how “Nixon had been open to the use of tactical nuclear weapons in Vietnam as early as 1954 and as president-elect in 1968 had talked of striking “a blow that would both end the war and win it”.”

A 2002 U.K. Independent report titled “Nixon wanted to drop nuclear bomb on Vietnam” described how then newly-declassified tapes offered “new glimpses of the already documented dark side of the former president.” This NewsInsideOut.com U.S. presidential history investigative report goes further pushing back and linking timelines suggesting one reason President Nixon sought office by any means in 1968 was the pursuit of a personal Oppenheimer-esque so-called “Destroyer of Worlds” nuclear ambition targeting Vietnam.

Dr. J. Robert Oppenheimer infamously misquoted the Bhagavad Gita when describing what it felt like watching the first atomic bomb explosion in the modern era for a 1965 television documentary. The physicist explained the verse as “I am become death” but where the Sanskrit word Kala appears it refers to “Time” whereupon Mahakala and Mahakali are the respective time god and goddess. Therefore, the verse can be read as “I am become Time, destroyer of worlds,” where everything that exists within a relative universe succumbs to time without exception.

U.S. President Richard Nixon appeared on Face the Nation on October 27, 1968, where he responded to reporters’ questions concerning interference with the Johnson Vietnam peace talks. Below are the remarks of President Nixon to reporters (Source: “Richard Nixon on Face the Nation 1968” Richard Nixon Foundation YouTube). Those comments were subjected to granular audio analysis for this NewsInsideOut.com U.S. presidential history investigative report with results presented below. Secret sleep talking-like messages encrypted backwards in the Republican nominee’s statements are indicated in bold. Granular audio methods and their implications are discussed later in this article.

We nuke them now: I’m talking about the people within the White House staff who are supposed to be privy to the various negotiations that are going on. I’m not going to go into any details with regard to the men that are involved. I’m only referring to the reports that have been made. I’m not going to make any charges against any of Mr. Johnson’s personal staff. It’s apparently quite well-known that they do support [Democratic nominee] Hubert Humphrey perhaps more enthusiastically than he does.

More than three years later Nixon White House Tapes of April 25, 1972, revealed POTUS in conversation with SecState Kissinger discussing an extended Vietnam War bombing campaign including use of a nuclear weapon.

Nixon: I still think we ought to take the dikes out now. Will that drown people?

Kissinger: That would drown about 200k people.

Nixon: Well no, no, no. I’d rather use a nuclear bomb.

Kissinger: That, I think, would just be too much.

Nixon: The nuclear bomb? Does that bother you?

Kissinger: [Inaudible]

Nixon: I just want you to think big, Henry. For Christ’s sake.

The Richard Nixon White House legacy is synonymous with Watergate and the massive anti-authoritarian social movement that followed whose lasting subculture impact resonates to the present day. This NewsInsideOut.com U.S. presidential history investigative report offers further context for today’s popular nuclear power protests as an expression of public disgust over elected leaders whose nuclear ambition-fueled MADness would compel them to commit treason or to play God with humanity.

Methods

Research that exposed human speech as a “multidimensional stimulus” with “numerous ways you can extract a message from it” was reported in the scientific journal Nature in 1999. In that report human observers were described as competent in resolving words while listening to highly-distorted speech recording samples. The procedure followed by scientists at Cal State involved digitally sampling recordings of human speech where samples were then reduced to grains of @50ms in duration.

Those grains were then locally time-reversed and globally resequenced in an attempt to emulate conditions found in voice-over-digital-network transmission (now commonly referred to as VoIP telephony). This methodology parallels techniques commonly used in biosciences where the nucleotides (grains) of a DNA molecule (sample) are resequenced in attempts to express novel characteristics of existing organisms (or to synthesize entirely new organisms from existing genetic materials).

For every set of discrete items the number of possible permutations of its order or sequence can be determined by using what is known as the factorial function (n!) where for example 3! = 3 x 2 x 1 = 6. In terms of granular speech synthesis the number of 50ms grains can be substantial, leading to what mathematicians call large numbers. For example, calculating the number of possible permutations of a set of 21 50ms grains by factorial function can be said to result in approximately 51 sextillion different sequences (5.1090942e+19).

However, for every set of discrete items (no matter how many), it can also be said that one possible permutation will always reflect the mirror or reverse order of the original sequence. In such a way (1, 2, 3) is newly rendered as (3, 2, 1). This understanding offers a shortcut of which common knowledge within the scientific and engineering communities is indicated by the inclusion of reverse macro functions in widely-used digital audio workstation (DAW) software applications and hardware. Investigators following the sampling, granular time-reversing and resequencing procedure modeled by scientists studying human speech intelligibility at Cal State can bypass untold iterations and simply monitor audio playback in reverse or mirror order with one click of a cursor.

From this reporter’s perspective the most important reason for bypassing myriad alternative sequence iterations is founded upon empirical evidence of practical intelligence discovered encrypted backwards in human speech. In the public domain this intelligence has offered preemptive understanding of facts concerning the Iraq War, the identity of one serial killer, the identity of a Russian spy and the resurrection of a CIA assassination program all named in broadcast media and online publications sometimes years before they were substantiated by mainstream news reports. Some of these reports are detailed in links provided below.

However, within modern society there remain numerous deeply ingrained superstitious implications of such encrypted multidimensional speech phenomena. These perceptions can be said founded upon dogmatic unscientific belief in fictitious untestable unproven entities and their supposed influences upon human behavior. Proponents of such scandalous misconceptions would stir the public to reject any suggestion of a time wheel’s (Sanskrit “Kalachakra”) bi-directional rotation, for instance. It is this type of Luddite perspective that would discourage the use of an automobile transmission’s reverse gear, compelling motorists to circumnavigate the globe instead of simply backing into a parking spot.

Therefore, only those capable of rejecting medieval injunctions against widdershins procession can embrace the type of volatile materials revealed through such a path of auditory inquiry. To quote one prominent Seattle psychologist this extremely psychoactive procedure and its findings are “not for beginners”.

Recommended Reading

‘JOB LOSS’: Larry Kudlow’s Secret Message Exposes ‘Invisible’ 2019 Recession

Michael Avenatti Arrest: Secret Messages Suggest Paternity Dispute Played Role in Alleged Domestic Violence

Pilot’s Irish UFO ET Crash Recovery Secret Messages Anticipated Four Years Earlier during BC Wilderness Night Vision Contact Event

Pipe Bomb PSYOP Suspect Cesar Sayoc Advertised POTUS Hero Worship According to Secret Messages

Saudi Journalist Jamal Khashoggi Unconsciously Anticipated Death by Murder Secret Interview Messages Reveal