Justin Trudeau’s Secret Messages: Protecting Suspect Canadian National Security Intelligence Front SNC-Lavalin

By Jon Kelly

NewsInsideOut.com

Vancouver, BC – Exclusive new video published to social media on March 4, 2019, documents findings from a special NewsInsideOut.com anti-corruption investigation into the latest SNC-Lavalin maelstrom now threatening to consume the political reputation of Canadian Prime Minister Justin Trudeau. Granular audio analysis of the Liberal Party leader’s statements denying political interference appears to describe Montreal-based SNC-Lavalin Group, Inc., as a national intelligence front engaged in global PSYOPS activities on behalf of the Canadian Security Intelligence Service (CSIS). The findings further show PM’s unconscious conception of possible related secret financial records controlled by an embedded officer in a “shadow” institution. The specter of such vast governmental industry collusion arises in sleep talking-like remarks wherein PM is shown invoking a “ghost [operative]”, “ciphers”, a “spy” and a “secret purser”.

On January 14, 2019, Canadian Attorney General and Minister of Justice Jody Wilson-Raybould was removed from her role during a cabinet shuffle and transferred to Veterans Affairs. On February 7, 2019, The Globe and Mail reported Prime Minister’s Office officials “pressured Wilson-Raybould to intervene in the Public Prosecution Service of Canada’s (PPSC) handling of fraud and corruption charges against the Montreal engineering and construction firm, relating to business dealings in Libya between 2001 and 2011.” Canadian Prime Minister Justin Trudeau has since denied allegations of political interference in this matter and these continuous denials before the press form the basis of NewsInsideOut.com’s anti-corruption investigation.

According to the Canadian Broadcasting Corporation (CBC) Montreal-based SNC-Lavalin Group, Inc., reportedly faces “charges of fraud and corruption in connection with nearly $48 million in payments made to Libyan government officials between 2001 and 2011.” A 2013 CBC report detailed how one division of the scandal-plagued engineering giant “used a secret internal accounting code [read: Cipher] that former employees say was for bribes on projects across Africa and Asia.”

A 2016 CBC report states SNC-Lavalin “paid a secret Caribbean-registered company to intercede on its behalf to obtain hundreds of millions of dollars in business in Algeria, the Panama Papers show, in a similar pattern to how the engineering giant operated in Libya.” The ubiquitous multinational and its apparent subsidiaries are also named over 200 times on a current World Bank blacklist of business entities cited for fraud and corruption.

The role of bribery as an element of contemporary western spycraft’s core doctrine is highlighted by the U.S. Central Intelligence Agency (CIA)’s so-named “father of Central Intelligence” William J. Donovan who explained how to use bribery and blackmail to destroy enemies and influence people in a 1943 Office of Strategic Services (OSS) “Morale Operations [read: PSYOPS] Field Manual”. According to non-profit news watchdog MuckRock the highly sensitive provisional manual’s suggestions included “using bribes to cause riots, trigger coups, and getting people hooked on drugs in order to bribe them with more.”

The Canadian CIA (CSIS)’s close proximity to such doctrine is embodied in the case of the late Arthur Porter, former head of the CSIS watchdog Canadian Security Intelligence Review Committee (CSIRC), who according to the Montreal Gazette died in 2015 while being held in a Panamanian jail during an extradition process while facing charges that included accepting bribes in a in a $22M kick-back scheme tied to a $1.3B Montreal mega-hospital project at McGill University.

According to the Canadian Television Network (CTV) News his role as chair of CSIRC allowed the accused privileged access to “some of the most sensitive files held by Canada’s spy service.” As a historical footnote McGill is also the storied site of Canada’s criminal MKULTRA frankenscience CIA collusion program that informed torture doctrine found in the CIA KUBARK manual and whose legacy continues in the present day so-called War on Terror. Those facts are detailed in a report by the campus student paper The McGill Daily.

The following are partial transcripts of Canadian Prime Minister Justin Trudeau’s denials of political interference sorted in chronological order, sourced from the Canadian Cable Public Affairs Channel (CPAC)’s ongoing coverage and curation of what it calls the SNC-Lavalin Affair. Multidimensional speech messages are indicated in bold followed by the context in which they were discovered. Granular audio methods are discussed later in this article.

February 7, 2019

Their ghost: The allegations reported in the story are false. At no time did I or my office direct the current or previous attorney general to make any particular decision in this matter. As I’ve said, at no time did we direct the attorney general, current or previous, to take any decision whatsoever in this matter.

February 11, 2019

Ciphers: The issue of solicitor-client privilege is not a simple one. And that is why I have asked Minister [David] Lametti, the attorney general and minister of justice to look into the matter of solicitor-client privilege in this situation and get back to me with recommendations.

Assert I’m now a liar: I told her directly that any decisions on matters involving the director of public prosecutions were hers alone. I respect her view that due to privilege she cannot comment or add on matters recently before the media. And I also highlight that we’re bound by cabinet confidentiality. In our system of government of course her presence in cabinet should actually speak for itself.

February 20, 2019

Sue her: I think we have a number of things going on. There’s the ex-commissioner who is doing an investigation into this issue, the parliamentary committee. She’s with it. We’ll be hearing from her. We’ll be hearing from experts. We’ll be hearing from a range of people. It will make the determination as to who it needs to hear from. But I think it is important that there be an airing on this situation at the same time as we continue to work on a broad range of big issues that matter.

February 26, 2019

Hush that secret purser. Gift now. You hush them. Embassy lie: It’s important that people get an opportunity to testify or show their point of view at committee. As we said waiving the privilege, waiving cabinet confidentiality is something that we had to take very seriously. But I’m pleased that Ms. Wilson-Raybould will be able to share.

February 28, 2019

Spy: Canadians expect their government to look for ways to protect jobs, to grow the economy. And that’s exactly what we’ve done every step of the way. We’ve also done it in a way that has respected our laws and respected the independence of the judiciary. Of that there actually is no doubt. There are disagreements in perspective on this but I can reassure Canadians that we were doing our job and doing it in a way that respects and defends our institutions.

A shadow: While political parties and various people are making or trying to draw a lot of attention to this issue there is a process both at the justice committee and indeed at the ethics commissioner that will make a determination on what actually happened here. So Canadians can be reassured that our institutions continue to function, that our governments function in accordance with the rule of law and that we continue to stay focused on the things that really matter to Canadians.

Methods

Research that exposed human speech as a “multidimensional stimulus” with “numerous ways you can extract a message from it” was reported in the scientific journal Nature in 1999. In that report human observers were described as competent in resolving words while listening to highly-distorted speech recording samples. The procedure followed by scientists at Cal State involved digitally sampling recordings of human speech where samples were then reduced to grains of @50ms in duration.

Those grains were then locally time-reversed and globally resequenced in an attempt to emulate conditions found in voice-over-digital-network transmission (now commonly referred to as VoIP telephony). This methodology parallels techniques commonly used in biosciences where the nucleotides (grains) of a DNA molecule (sample) are resequenced in attempts to express novel characteristics of existing organisms (or to synthesize entirely new organisms from existing genetic materials).

For every set of discrete items the number of possible permutations of its order or sequence can be determined by using what is known as the factorial function (n!) where for example 3! = 3 x 2 x 1 = 6. In terms of granular speech synthesis the number of 50ms grains can be substantial, leading to what mathematicians call large numbers. For example, calculating the number of possible permutations of a set of 21 50ms grains by factorial function can be said to result in approximately 51 sextillion different sequences (5.1090942e+19).

However, for every set of discrete items (no matter how many), it can also be said that one possible permutation will always reflect the mirror or reverse order of the original sequence. In such a way (1, 2, 3) is newly rendered as (3, 2, 1). This understanding offers a shortcut of which common knowledge within the scientific and engineering communities is indicated by the inclusion of reverse macro functions in widely-used digital audio workstation (DAW) software applications and hardware. Investigators following the sampling, granular time-reversing and resequencing procedure modeled by scientists studying human speech intelligibility at Cal State can bypass untold iterations and simply monitor audio playback in reverse or mirror order with one click of a cursor.

From this reporter’s perspective the most important reason for bypassing myriad alternative sequence iterations is founded upon empirical evidence of practical intelligence discovered encrypted backwards in human speech. In the public domain this intelligence has offered preemptive understanding of facts concerning the Iraq War, the identity of one serial killer, the identity of a Russian spy and the resurrection of a CIA assassination program all named in broadcast media and online publications sometimes years before they were substantiated by mainstream news reports. Some of these reports are detailed in links provided below.

However, within modern society there remain numerous deeply ingrained superstitious implications of such encrypted multidimensional speech phenomena. These perceptions can be said founded upon dogmatic unscientific belief in fictitious untestable unproven entities and their supposed influences upon human behavior. Proponents of such scandalous misconceptions would stir the public to reject any suggestion of a time wheel’s (Sanskrit “Kalachakra”) bi-directional rotation, for instance. It is this type of Luddite perspective that would discourage the use of an automobile transmission’s reverse gear, compelling motorists to circumnavigate the globe instead of simply backing into a parking spot.

Therefore, only those capable of rejecting medieval injunctions against widdershins procession can embrace the type of volatile materials revealed through such a path of auditory inquiry. To quote one prominent Seattle psychologist this extremely psychoactive procedure and its findings are “not for beginners”.

Recommended Reading

Maria Butina: The Spy Who Said Too Much, Analysis of the James Bamford Audio Tapes

‘She’s a Spy’: Alleged Russian Operative Maria Butina Disclosed Secret Agent Status at 2015 FreedomFest

Anna Chapman’s secret messages named youth accomplice, anticipated handler’s betrayal

‘Sex with Daddy’: Helsinki Secret Messages Confirm Trump a Putin Proxy

‘Lie for Russia’: President Trump Kompromat, evidence encrypted in statements to CIA

Phoenix@Home: Domestic Counterinsurgency Program U.S. President’s Endgame Solution to Government Shutdown, QAnon CIA Phoenix Program Cheerleader

Vancouver, BC – Exclusive new video published to social media on January 14, 2019, reveals the U.S. President considering a CIA Phoenix Program-emulating domestic counterinsurgency initiative focused upon raids, occupations and arrest of political “enemies”. NewsInsideOut.com co-editor Jon Kelly broke the story while covering last Tuesday’s Oval Office Address as co-host for Sunday’s episode 142 of End of Days: The Michael Decon Program. The former CBS Radio feature producer, first to report a resurgent Phoenix Program in wake of Ukraine’s 2014 Euromaidan Revolution presented granular audio analysis revealing POTUS’ sleep talking fever dream-like counterinsurgency solution to the longest government shutdown in U.S. history, part of an ongoing scenario the head of Russia’s Roscosmos has described as the “second American civil war” now underway.

Below is a partial transcript of opening remarks by U.S. President Donald Trump during his January 8, 2019, Oval Office Address (Source: C-SPAN “President Trump Address on Border Security”). Those comments were subjected to granular audio analysis for this exclusive NewsInsideOut.com U.S. presidential investigative report with results presented below. Secret sleep talking-like messages encrypted backwards in POTUS’ statements are indicated in bold. Granular audio methods and their implications are discussed later in this article.

The raids. Occupy. Arrest enemy: My fellow Americans, tonight I am speaking to you because there is a growing humanitarian and security crisis at our southern border. Every day, customs and border patrol agents encounter thousands of illegal immigrants trying to enter our country. We are out of space to hold them and we have no way to promptly return them back home to their country. America proudly welcomes millions of lawful immigrants who enrich our society and contribute to our nation.

Both Erik Prince (Blackwater/Academi) and Oliver North (Iran-Contra) were named as participants in meetings with the U.S. President by a report published in The Intercept in January 2017. Further coverage by Democracy Now later that year stated “Prince and North have pitched the private network of spies as a way for the White House to counter members of the intelligence community, or the so-called deep state, who Trump claims are subverting his presidency.”

A transcript of a 2016 interview from former White House Chief Strategist Steve Bannon’s SiriusXM radio show was said to reveal the following conversation.

Erik Prince: “Two: a Phoenix-like program. OK, remember the Phoenix Program was a root canal done to the Viet Cong during the Vietnam War. It was a kill—”

Stephen Bannon: “You mean, this is the Phoenix Program—this is the Phoenix—hang on. This is the Phoenix Program in Vietnam.”

Erik Prince: “It was a vicious, but very effective, kill-capture program in Vietnam that destroyed the Viet Cong as a military force. That’s what needs to be done to the funders of Islamic terror, and that would even the wealthy radical Islamist billionaires funding it from the Middle East, and any of the other illicit activities therein.”

This reporter first broke news of a resurgent Phoenix Program while covering Ukraine’s Euromaidan Revolution in a 2014 report that detailed U.S. Secretary of State John Kerry’s secret message, stating how “The secretary invokes a reinvigorated CIA Phoenix Program (1965 – 1972).” During remarks given in Kiev following the overthrow of that nation’s democratically elected leadership Secretary Kerry was observed to have spoken the words “Scary. The phoenix sat up.” 

Cult followers of the QAnon disinformation feed may find cause for celebration in this revelation as it seemingly parallels persistent claims of its presumed intelligence agency asset authors. Fake coverage of QAnon’s Pizzagate predecessor led at least one online publication to fraudulently headline a New York Police Department raid on a Hillary Clinton property, an event that apparently never occurred. BuzzFeed reported in late 2016 that “SubjectPolitics.com ran a story with the headline “IT’S OVER: NYPD Just Raided Hillary’s Property! What They Found Will RUIN HER LIFE.””

The leader of a veterans group in Tucson, Arizona, reportedly faced multiple charges of trespassing when he was arrested last July for occupying a Cemex plant he alleged was the site of a sex trafficking ring. In an article published last August the Arizona Republic described that man as a follower of QAnon who translated the online disinformation feed’s distorted worldview into real world events. Tucson police were said to have investigated the publicly-owned Mexican multinational’s building supply site “but found no evidence of child sex trafficking at the camp or anywhere else in the area” according to 12 News KPNX.

Independent media site The Outline highlighted in late 2018 how a “Q-pocalypse” in the form of mass arrests, imprisonment and possible execution of “every prominent Democrat” was slated for December 5 but failed to materialize. The New Year’s Eve report went on to itemize other futile QAnon predictions while exploring its seeming appeal to religious evangelicals.

Abortive QAnon predictions have been noted by Foreign Policy who last November cited “The problem with Q’s [failed] predictions was not only the specificity of the events themselves but that they were dated.” The Daily Dot last August offered its survey of “every QAnon prediction that’s failed to come true.” And the venerable Boing Boing chimed in further with “Advice for people who just realized that Qanon is bullshit” predicated upon the now widely-recognized December 5 mass arrests boo-boo.  

Of deep concern to this reporter is the way in which QAnon attempts to popularize sadistic cheerleading for domestic fratricide, for blue-on-blue incidents en masse. QAnon dogma appears to envision life under a counterinsurgency not unlike conditions endured by people living under the CIA Phoenix Program during its active phase in the Vietnam War (1965-72).

With the benefit of hindsight Francis Ford Coppola’s epic “Apocalypse Now” (1979) can be understood as cinematic culture’s subtextual contemporary commentary on the CIA Phoenix Program in the wake of disclosures that arose from the 1975 Church Committee hearings. Those U.S. Senate hearings resulted in public disclosure of CIA and NSA activities including mass domestic surveillance, mind control and torture frankenscience, assassinations of foreign leaders and domestic/international news media infiltration/domination.

Methods

Research that exposed human speech as a “multidimensional stimulus” with “numerous ways you can extract a message from it” was reported in the scientific journal Nature in 1999. In that report human observers were described as competent in resolving words while listening to highly-distorted speech recording samples. The procedure followed by scientists at Cal State involved digitally sampling recordings of human speech where samples were then reduced to grains of @50ms in duration.

Those grains were then locally time-reversed and globally resequenced in an attempt to emulate conditions found in voice-over-digital-network transmission (now commonly referred to as VoIP telephony). This methodology parallels techniques commonly used in biosciences where the nucleotides (grains) of a DNA molecule (sample) are resequenced in attempts to express novel characteristics of existing organisms (or to synthesize entirely new organisms from existing genetic materials).

For every set of discrete items the number of possible permutations of its order or sequence can be determined by using what is known as the factorial function (n!) where for example 3! = 3 x 2 x 1 = 6. In terms of granular speech synthesis the number of 50ms grains can be substantial, leading to what mathematicians call large numbers. For example, calculating the number of possible permutations of a set of 21 50ms grains by factorial function can be said to result in approximately 51 sextillion different sequences (5.1090942e+19).

However, for every set of discrete items (no matter how many), it can also be said that one possible permutation will always reflect the mirror or reverse order of the original sequence. In such a way (1, 2, 3) is newly rendered as (3, 2, 1). This understanding offers a shortcut of which common knowledge within the scientific and engineering communities is indicated by the inclusion of reverse macro functions in widely-used digital audio workstation (DAW) software applications and hardware. Investigators following the sampling, granular time-reversing and resequencing procedure modeled by scientists studying human speech intelligibility at Cal State can bypass untold iterations and simply monitor audio playback in reverse or mirror order with one click of a cursor.

From this reporter’s perspective the most important reason for bypassing myriad alternative sequence iterations is founded upon empirical evidence of practical intelligence discovered encrypted backwards in human speech. In the public domain this intelligence has offered preemptive understanding of facts concerning the Iraq War, the identity of one serial killer, the identity of a Russian spy and the resurrection of a CIA assassination program all named in broadcast media and online publications sometimes years before they were substantiated by mainstream news reports. Some of these reports are detailed in links provided below.

However, within modern society there remain numerous deeply ingrained superstitious implications of such encrypted multidimensional speech phenomena. These perceptions can be said founded upon dogmatic unscientific belief in fictitious untestable unproven entities and their supposed influences upon human behavior. Proponents of such scandalous misconceptions would stir the public to reject any suggestion of a time wheel’s (Sanskrit “Kalachakra”) bi-directional rotation, for instance. It is this type of Luddite perspective that would discourage the use of an automobile transmission’s reverse gear, compelling motorists to circumnavigate the globe instead of simply backing into a parking spot.

Therefore, only those capable of rejecting medieval injunctions against widdershins procession can embrace the type of volatile materials revealed through such a path of auditory inquiry. To quote one prominent Seattle psychologist this extremely psychoactive procedure and its findings are “not for beginners”.

Recommended Reading

Revived CIA Phoenix assassination program reported three years before Snowden’s Intercept: Maidan Conspiracy Redux (British black ops in Kiev sniper attacks)

‘JOB LOSS’: Larry Kudlow’s Secret Message Exposes ‘Invisible’ 2019 Recession

Pilot’s Irish UFO ET Crash Recovery Secret Messages Anticipated Four Years Earlier during BC Wilderness Night Vision Contact Event

Pipe Bomb PSYOP Suspect Cesar Sayoc Advertised POTUS Hero Worship According to Secret Messages

Saudi Journalist Jamal Khashoggi Unconsciously Anticipated Death by Murder Secret Interview Messages Reveal

U.S. President Nixon Wanted to Nuke Vietnam in 1968 says Secret Message, Nuclear Ambition’s Role in Johnson Peace Talks ‘Betrayal’ Exposed

By Jon Kelly

NewsInsideOut.com

Vancouver, BC – Exclusive new video published to social media on November 23, 2018, exposes the role of U.S. President Richard Milhous Nixon’s evident nuclear ambition in a reportedly treacherous subversion of the 1968 Johnson Vietnam peace talks. Granular audio analysis of a Face the Nation interview from later that year shows the Republican nominee deceptively downplaying reporters’ questions about undermining the president’s anti-war initiative when he uttered a sleep talking-like phrase stating “We nuke them now.” This NewsInsideOut.com U.S. presidential history investigative report appears at a time when critics say America’s Commander in Chief is MIA while unarmed troops guard the U.S. southern border patrol.

Background from a Washington Post article written in 2009 states how “The story of Richard Nixon’s surreptitious contacts with the South Vietnamese government is quite well-known: fearful that a last-second peace deal would give Hubert Humphrey the election, Nixon agents—chiefly Anna Chennault—reached out to the South Vietnamese government of Nguyen van Thieu. The message: a peace settlement under a Nixon presidency would be more favorable to the South Vietnamese.” The role of Asian American political operative Anna Chennault is highlighted in a new MSNBC documentary titled “Betrayal” now available online.

Nixon White House Chief of Staff H.R. Haldeman’s notes from October 22, 1968, published by the New York Times record a conversation with the then-Republican nominee asking him to “monkey wrench” the peace talks. Citing declassified Johnson White House Tapes the BBC wrote in 2013 “By the time of the election in November 1968, LBJ had evidence Nixon had sabotaged the Vietnam war peace talks – or, as he put it, that Nixon was guilty of treason and had “blood on his hands”.”

A Guardian book extract from 2000 explains President Nixon ordered a tactical nuclear strike against North Vietnam in 1969. It went on to state how “Nixon had been open to the use of tactical nuclear weapons in Vietnam as early as 1954 and as president-elect in 1968 had talked of striking “a blow that would both end the war and win it”.”

A 2002 U.K. Independent report titled “Nixon wanted to drop nuclear bomb on Vietnam” described how then newly-declassified tapes offered “new glimpses of the already documented dark side of the former president.” This NewsInsideOut.com U.S. presidential history investigative report goes further pushing back and linking timelines suggesting one reason President Nixon sought office by any means in 1968 was the pursuit of a personal Oppenheimer-esque so-called “Destroyer of Worlds” nuclear ambition targeting Vietnam.

Dr. J. Robert Oppenheimer infamously misquoted the Bhagavad Gita when describing what it felt like watching the first atomic bomb explosion in the modern era for a 1965 television documentary. The physicist explained the verse as “I am become death” but where the Sanskrit word Kala appears it refers to “Time” whereupon Mahakala and Mahakali are the respective time god and goddess. Therefore, the verse can be read as “I am become Time, destroyer of worlds,” where everything that exists within a relative universe succumbs to time without exception.

U.S. President Richard Nixon appeared on Face the Nation on October 27, 1968, where he responded to reporters’ questions concerning interference with the Johnson Vietnam peace talks. Below are the remarks of President Nixon to reporters (Source: “Richard Nixon on Face the Nation 1968” Richard Nixon Foundation YouTube). Those comments were subjected to granular audio analysis for this NewsInsideOut.com U.S. presidential history investigative report with results presented below. Secret sleep talking-like messages encrypted backwards in the Republican nominee’s statements are indicated in bold. Granular audio methods and their implications are discussed later in this article.

We nuke them now: I’m talking about the people within the White House staff who are supposed to be privy to the various negotiations that are going on. I’m not going to go into any details with regard to the men that are involved. I’m only referring to the reports that have been made. I’m not going to make any charges against any of Mr. Johnson’s personal staff. It’s apparently quite well-known that they do support [Democratic nominee] Hubert Humphrey perhaps more enthusiastically than he does.

More than three years later Nixon White House Tapes of April 25, 1972, revealed POTUS in conversation with SecState Kissinger discussing an extended Vietnam War bombing campaign including use of a nuclear weapon.

Nixon: I still think we ought to take the dikes out now. Will that drown people?

Kissinger: That would drown about 200k people.

Nixon: Well no, no, no. I’d rather use a nuclear bomb.

Kissinger: That, I think, would just be too much.

Nixon: The nuclear bomb? Does that bother you?

Kissinger: [Inaudible]

Nixon: I just want you to think big, Henry. For Christ’s sake.

The Richard Nixon White House legacy is synonymous with Watergate and the massive anti-authoritarian social movement that followed whose lasting subculture impact resonates to the present day. This NewsInsideOut.com U.S. presidential history investigative report offers further context for today’s popular nuclear power protests as an expression of public disgust over elected leaders whose nuclear ambition-fueled MADness would compel them to commit treason or to play God with humanity.

Methods

Research that exposed human speech as a “multidimensional stimulus” with “numerous ways you can extract a message from it” was reported in the scientific journal Nature in 1999. In that report human observers were described as competent in resolving words while listening to highly-distorted speech recording samples. The procedure followed by scientists at Cal State involved digitally sampling recordings of human speech where samples were then reduced to grains of @50ms in duration.

Those grains were then locally time-reversed and globally resequenced in an attempt to emulate conditions found in voice-over-digital-network transmission (now commonly referred to as VoIP telephony). This methodology parallels techniques commonly used in biosciences where the nucleotides (grains) of a DNA molecule (sample) are resequenced in attempts to express novel characteristics of existing organisms (or to synthesize entirely new organisms from existing genetic materials).

For every set of discrete items the number of possible permutations of its order or sequence can be determined by using what is known as the factorial function (n!) where for example 3! = 3 x 2 x 1 = 6. In terms of granular speech synthesis the number of 50ms grains can be substantial, leading to what mathematicians call large numbers. For example, calculating the number of possible permutations of a set of 21 50ms grains by factorial function can be said to result in approximately 51 sextillion different sequences (5.1090942e+19).

However, for every set of discrete items (no matter how many), it can also be said that one possible permutation will always reflect the mirror or reverse order of the original sequence. In such a way (1, 2, 3) is newly rendered as (3, 2, 1). This understanding offers a shortcut of which common knowledge within the scientific and engineering communities is indicated by the inclusion of reverse macro functions in widely-used digital audio workstation (DAW) software applications and hardware. Investigators following the sampling, granular time-reversing and resequencing procedure modeled by scientists studying human speech intelligibility at Cal State can bypass untold iterations and simply monitor audio playback in reverse or mirror order with one click of a cursor.

From this reporter’s perspective the most important reason for bypassing myriad alternative sequence iterations is founded upon empirical evidence of practical intelligence discovered encrypted backwards in human speech. In the public domain this intelligence has offered preemptive understanding of facts concerning the Iraq War, the identity of one serial killer, the identity of a Russian spy and the resurrection of a CIA assassination program all named in broadcast media and online publications sometimes years before they were substantiated by mainstream news reports. Some of these reports are detailed in links provided below.

However, within modern society there remain numerous deeply ingrained superstitious implications of such encrypted multidimensional speech phenomena. These perceptions can be said founded upon dogmatic unscientific belief in fictitious untestable unproven entities and their supposed influences upon human behavior. Proponents of such scandalous misconceptions would stir the public to reject any suggestion of a time wheel’s (Sanskrit “Kalachakra”) bi-directional rotation, for instance. It is this type of Luddite perspective that would discourage the use of an automobile transmission’s reverse gear, compelling motorists to circumnavigate the globe instead of simply backing into a parking spot.

Therefore, only those capable of rejecting medieval injunctions against widdershins procession can embrace the type of volatile materials revealed through such a path of auditory inquiry. To quote one prominent Seattle psychologist this extremely psychoactive procedure and its findings are “not for beginners”.

Recommended Reading

‘JOB LOSS’: Larry Kudlow’s Secret Message Exposes ‘Invisible’ 2019 Recession

Michael Avenatti Arrest: Secret Messages Suggest Paternity Dispute Played Role in Alleged Domestic Violence

Pilot’s Irish UFO ET Crash Recovery Secret Messages Anticipated Four Years Earlier during BC Wilderness Night Vision Contact Event

Pipe Bomb PSYOP Suspect Cesar Sayoc Advertised POTUS Hero Worship According to Secret Messages

Saudi Journalist Jamal Khashoggi Unconsciously Anticipated Death by Murder Secret Interview Messages Reveal

 

Michael Avenatti Arrest: Secret Messages Suggest Paternity Dispute Played Role in Alleged Domestic Violence

By Jon Kelly

NewsInsideOut.com

Vancouver, BC – Exclusive new video published to social media on November 14, 2018, examines the multidimensional speech of potential U.S. presidential candidate Michael Avenatti. The prominent Los Angeles attorney was arrested today after police received a domestic violence call from an as-yet unnamed plaintiff. Findings of the video’s granular audio analysis-based preliminary investigation suggest high-profile legal commentator Michael John Avenatti and a female plaintiff engaged in a dispute like one contesting paternity and pregnancy issues within the time frame when the alleged incident occurred. The attorney representing adult film star Stormy Daniels was arrested today on suspicion of domestic violence and released from custody on a reported $50,000 bail whereupon he spoke briefly to the press late this afternoon and welcomed a full investigation.

Statement of Michael Avenatti

UPDATE: CBS News reported on November 21, 2018, “The Los Angeles district attorney declined to prosecute attorney Michael Avenatti on felony domestic abuse charges on Wednesday and referred allegations that he roughed up his girlfriend to the city attorney for a possible misdemeanor case.” In a statement shared on Twitter the Los Angeles attorney wrote “This Thanksgiving, I am especially grateful for justice.”

Michael Avenatti is now the second outspoken critic of U.S. President Donald Trump cited for inappropriate conduct involving a woman this month after Press Secretary Sarah Sanders propagated what the Associated Press called a doctored video showing Cable News Network (CNN) White House correspondent Jim Acosta supposedly karate-chopping an intern last Wednesday (watch NewsInsideOut.com’s breakdown of this incident here). With the backing of Fox News and USA Today CNN is now suing President Trump along with top aides accusing them of violating the U.S. Constitution’s guarantee of freedom of the press.

In such a climate it is not inconceivable that Michael Avenatti has become only the latest target for political retribution in a wide-ranging White House smear campaign that resorts to deep fake videos and fake news to silence top media-supported political opponents of the current administration. Findings from the NewsInsideOut.com preliminary investigation suggest a worst-case scenario in which an unnamed plaintiff struck the legal commentator whereupon he pushed her away in self-defense.

UPDATE:

In a comment posted to Twitter on November 14, 2018, Surefire Intelligence has claimed involvement in the arrest of Los Angeles attorney Michael Avenatti. Surefire is reportedly linked via domain and telephone records to provocateur Jacob Wohl who gained notoriety last month for his involvement in a failed plot to accuse special counsel Robert Mueller of sexual misconduct. The former hedge fund manager is reportedly banned for life from futures trading after defrauding investors in 2016. A representative for Mueller said the “claims that women had been offered money for their accusations against him were referred to law enforcement.”

Below are the remarks of Michael Avenatti upon his release after posting bail recorded this afternoon (Source: “BREAKING: Michael Avenatti speaks after arrest of alleged domestic violence (FNN)“ Fox 10 Phoenix).  Those comments were subjected to granular audio analysis with results presented below where secret sleep talking-like messages encrypted backwards in the Los Angeles attorney’s statements are indicated in bold. Granular audio methods and their implications are discussed later in this article.

Muscle. Shoved her. ‘Fraid of baby. They lied: First of all I want to thank the hard-working men and women of the L.A.P.D. for their professional ism in their work today. They had no option in light of the allegations. Secondly, I have never struck a woman. I never will strike a woman. I have been an advocate for women’s rights my entire career and I’m going to continue to be an advocate. I am not going to be intimidated from stopping what I am doing.

Her strike: I am a father to two beautiful smart daughters. I would never disrespect them by touching a woman inappropriately or striking a woman. I am looking forward to a full investigation at which point I am confident that I will be fully exonerated. I also want to thank everyone for their support that has reached out. You know my character. You know me as a man and I appreciate it. Thank you.

Based upon these findings it is conceivable that during a dispute like one surrounding claims of pregnancy and paternity the plaintiff struck Michael Avenatti who then shoved her away in self-defense. Such issues surrounding paternity may have been relevant to the present circumstances or may have occurred in the past where memories of unresolved trauma that could potentially be traced to the attorney’s family of origin were reinvigorated during an argument with someone the professional race car driver cared deeply about.

At such a moment of crisis and a tipping point for his public profile, Michael Avenatti appears unable to summon the ferocious unconscious intensity discovered in related studies of convicted predators including Bill Cosby, Dennis Rader (BTK Killer), John Wayne Gacy and ISIS terrorist Abu Turaab Al-Kanadi (see links to articles below). The milder qualities of today’s secret messages discovered in this preliminary investigation appear to differentiate the accused in a way that suggests a person of better character.

NewsInsideOut.com cautiously awaits the results of a full police investigation along with the decision of the courts in identify the facts of today’s potentially politically-motivated allegations. A New York Times report published weeks earlier commemorated October as Domestic Violence Awareness Month in the MeToo era, exploring “why the conversation around domestic violence differs from sexual assault and what would need to change for domestic violence to have its own cultural reckoning.”

Methods

Research that exposed human speech as a “multidimensional stimulus” with “numerous ways you can extract a message from it” was reported in the scientific journal Nature in 1999. In that report human observers were described as competent in resolving words while listening to highly-distorted speech recording samples. The procedure followed by scientists at Cal State involved digitally sampling recordings of human speech where samples were then reduced to grains of @50ms in duration.

Those grains were then locally time-reversed and globally resequenced in an attempt to emulate conditions found in voice-over-digital-network transmission (now commonly referred to as VoIP telephony). This methodology parallels techniques commonly used in biosciences where the nucleotides (grains) of a DNA molecule (sample) are resequenced in attempts to express novel characteristics of existing organisms (or to synthesize entirely new organisms from existing genetic materials).

For every set of discrete items the number of possible permutations of its order or sequence can be determined by using what is known as the factorial function (n!) where for example 3! = 3 x 2 x 1 = 6. In terms of granular speech synthesis the number of 50ms grains can be substantial, leading to what mathematicians call large numbers. For example, calculating the number of possible permutations of a set of 21 50ms grains by factorial function can be said to result in approximately 51 sextillion different sequences (5.1090942e+19).

However, for every set of discrete items (no matter how many), it can also be said that one possible permutation will always reflect the mirror or reverse order of the original sequence. In such a way (1, 2, 3) is newly rendered as (3, 2, 1). This understanding offers a shortcut of which common knowledge within the scientific and engineering communities is indicated by the inclusion of reverse macro functions in widely-used digital audio workstation (DAW) software applications and hardware. Investigators following the sampling, granular time-reversing and resequencing procedure modeled by scientists studying human speech intelligibility at Cal State can bypass untold iterations and simply monitor audio playback in reverse or mirror order with one click of a cursor.

From this reporter’s perspective the most important reason for bypassing myriad alternative sequence iterations is founded upon empirical evidence of practical intelligence discovered encrypted backwards in human speech. In the public domain this intelligence has offered preemptive understanding of facts concerning the Iraq War, the identity of one serial killer, the identity of a Russian spy and the resurrection of a CIA assassination program all named in broadcast media and online publications sometimes years before they were substantiated by mainstream news reports. Some of these reports are detailed in links provided below.

However, within modern society there remain numerous deeply ingrained superstitious implications of such encrypted multidimensional speech phenomena. These perceptions can be said founded upon dogmatic unscientific belief in fictitious untestable unproven entities and their supposed influences upon human behavior. Proponents of such scandalous misconceptions would stir the public to reject any suggestion of a time wheel’s (Sanskrit “Kalachakra”) bi-directional rotation, for instance. It is this type of Luddite perspective that would discourage the use of an automobile transmission’s reverse gear, compelling motorists to circumnavigate the globe instead of simply backing into a parking spot.

Therefore, only those capable of rejecting medieval injunctions against widdershins procession can embrace the type of volatile materials revealed through such a path of auditory inquiry. To quote one prominent Seattle psychologist this extremely psychoactive procedure and its findings are “not for beginners”.

Recommended Reading

Bill Cosby’s secret messages disclosed MKULTRA ‘Rape Demon’ redux

Future is Granular: Cognitive Recalibration in the Digital Era with Jon Kelly on Late Night in the Midlands

Pizzagate’s Killer Klown: John Wayne Gacy described stabbing, dismemberment and possible location of missing victim in 1969

Pipe Bomb PSYOP Suspect Cesar Sayoc Advertised POTUS Hero Worship According to Secret Messages

Interrogating ISIS: Abu Turaab Al-Kanadi Secret Messages Expose Suspected Role in Execution by Hanging, ‘Family Guy’ Mass Media Social Conditioning