Decrypt the Matrix like an Expert with ‘Cyberpunk 101: The Series’

By Jon Kelly

NewsInsideOut.com

Vancouver, BC – Exclusive new video published to social media on April 4, 2019, offers a look at detecting future intelligence using a portable speech synthesizer. “Cyberpunk 101: The Series” is a collection of short films that decrypt comments from newsmakers of the past two decades to reveal future intelligence about the Iraq War, identity of the BTK Killer, the name of a Russian spy and a resurgent CIA operation. According to the series description “Cyberpunk 101”’s speech synthesis video magic will have viewers decrypting the matrix like an expert in less than five minutes.

The series contains four short live-action chapters where the first explores the inaugural address of U.S. President George W. Bush. Findings of the original granular analysis released January 25, 2001, exposed a “Mission of Baghdad” that anticipated the Iraq War that commenced March 19, 2003. The second in the series looks at a pre-trial jailhouse interview of BTK Killer Dennis Rader where granular analysis exposed demonic possession issues to which the then-confessed killer openly admitted less than one week after those findings were first aired.

The third chapter of “Cyberpunk 101” examines the statements of Russian spy Anna Chapman while she was operating undercover in New York. Granular analysis revealed the name of a youth accomplice in the “Illegals Program” spy ring who was named by the Wall Street Journal nine months later. Final chapter in the series follows then-U.S. Secretary of State John Kerry to Kiev in wake of Euromaidan’s 2014 Ukraine Revolution. Under granular analysis the secretary’s press conference remarks are shown to indicate a resurgent CIA Phoenix Program that was discussed in The Intercept three years after it was reported in a popular column for Examiner.com.

Repurposing off-the-shelf technologies for novel applications is a trope of science fiction’s cyberpunk ethos, invoking a recognizable symbol of the cultural movement that led to “The Matrix” movie franchise at the turn of this millennium. In this story’s example, Swedish manufacturer Teenage Engineering (makers of the PO-35) never marketed the device as a time machine useful for identifying Russian spies before their names are released by the mainstream press. But “Cyberpunk 101” shows viewers just how nerdtastic this application can be.

The Teenage Engineering Pocket Operator PO-35 Speak is a portable sampling speech synthesizer with nine discrete sound synthesis engines (including a drum machine) and a sequencer plus 15 different effects. The PO-35 can sample human speech then regenerate the characteristics of those sounds with controllable parameters including pitch, tempo, formant and time direction.

The PO-35 is reportedly based upon linear predictive coding (LPC), the same technique found in the Speak &Spell educational toy of the 1980s. LPC is said to represent the spectral envelope of a digital speech signal in compressed form based upon a linear predictive model where predictive modelling applies statistics to anticipate outcomes. According to one source, in 1974 LPC enabled packet speech communications over ARPANET, the data network that first implemented packet-switching and TCP/IP protocols that characterize the foundations of the modern internet. The same research is cited in foundations of Voice over Internet Protocol (VoIP) commonly used in present-day telephony.

The Pocket Operator’s palm-sized design suggests homage to German electronic music pioneers Kraftwerk who’s 1981 “Pocket Calculator” had a “special key” that “plays a little melody”. Stating “I’m the operator with my pocket calculator,” futuristic tunesmiths of the 1980s showed the world they had everything under control. (Warning: Animalistic nerd out shown in this video may be too intense for some viewers).

Hamburg-based Russian techno DJ Xenia Beliayeva’s new Instagram video for “Violet” features background images by NewsInsideOut.com reporter Jon Kelly. The videographer explains “In what I understood to be a highly symbolic gesture of good will an established figure in Europe’s electronic music scene reached out at a time when news organizations in North America faced an existential crisis over status of Special Counsel’s investigation into the Trump campaign’s collusion with Russia. Collaborating publicly with Xenia in this way affirms no Russophobia guided my decisions when I covered those events nor does it today.”

https://www.instagram.com/p/Bvvvvq2F7qo/?

Recommended Reading

Maria Butina: The Spy Who Said Too Much, Analysis of the James Bamford Audio Tapes

Anna Chapman’s secret messages named youth accomplice, anticipated handler’s betrayal

‘Lie for Russia’: President Trump Kompromat, evidence encrypted in statements to CIA

Justin Trudeau’s Secret Messages: Protecting Suspect Canadian National Security Intelligence Front SNC-Lavalin

Revived CIA Phoenix assassination program reported three years before Snowden’s Intercept: Maidan Conspiracy Redux (British black ops in Kiev sniper attacks)

Future is Granular: Cognitive Recalibration in the Digital Era with Jon Kelly on Late Night in the Midlands

Maria Butina: The Spy Who Said Too Much, Analysis of the James Bamford Audio Tapes

By Jon Kelly

NewsInsideOut.com

Vancouver, BC – Exclusive new video published to social media on February 13, 2019, explores seemingly indicting granular audio reflections from tapes of best-selling U.S. national intelligence author James Bamford’s interviews with confessed unregistered Russian foreign agent Maria Butina. Outtakes from these recordings were released earlier this week by CNN. On that same day an article published in The New Republic offered the sympathetic portrait of pro-gun rights Right to Bear Arms’ founder as an American University graduate swept up in the “Trump-Russia maelstrom”.  However, none of these arguments explain the manner in which the new video shows Maria Butina appearing to cite an “enemy” in sleep talking–like encrypted narrative while describing her arrest by the FBI.

Russian activist Maria Butina was arrested by agents of the U.S. Federal Bureau of Investigation in Washington, D.C., last summer where she was charged with acting as an agent of a foreign government absent prior notice to the U.S. Attorney General. Held in solitary confinement the Siberian native gave in December what Russia’s Foreign Ministry described as a false forced confession pleading guilty to conspiracy.

Author James Bamford’s 1982 book “The Puzzle Palace: Inside the National Security Agency, America’s Most Secret Intelligence Organization” exposed a 1976 Justice Department criminal investigation into massive illegal domestic NSA wiretapping, a nightmare that re-emerged into public consciousness during the George W. Bush administration’s surge in “Top Secret America” economics at the beginning of this century.

The Emmy-nominated journalist told The New Republic how he met with Maria Butina over a number of lunches earlier last year where he commenced a series of interviews that continued after her arrest. Outtakes from taped interviews that were released by CNN showed the accused protesting her innocence.

Earlier NewsInsideOut.com coverage of events surrounding Maria Butina investigated her videotaped appearance at 2015 FreedomFest where an unforced sleep talking-like confession disclosing status as a Russian spy was revealed via granular audio analysis of spontaneous on-camera remarks. Previous granular audio work by this reporter identified a Russian spy in the 2010 Anna Chapman “Illegals Program” whose name was published in the Wall Street Journal nine months later.

The aura of certitude that accompanies the following reporting is founded in this writer’s historic international public legacy exceeding industry standards of performance and reliability in forwards-looking counterintelligence investigative journalism. The following is a transcript of outtakes provided by CNN of James Bamford’s Maria Butina interview tapes. Multidimensional speech messages are indicated in bold followed by the context in which they were discovered. Granular audio methods are discussed later in this article.

We need surrender. We have struggled. Believe the lie: If I would be invisible Russian spy, you would never see me in public. I would be the most unseen person on Earth.

There’s an enemy: I had just cleaned my apartment and I was baking banana bread. They told me “FBI, search warrant” so I opened the door. They just walked in the door. I was pushed back.

Interpreting these messages invites the observer to consider the role of ideology and ideological indoctrination in the behaviors of Maria Butina. In the first instance this speaker appears engaged with a struggle related to identity insomuch as she outwardly denies being a spy while secretly commanding compliance with a narrative in which Maria Butina appears to have little faith.

The notion of struggle is itself central to Marxist ideology found in discussions of class struggle and the struggle of the proletariat labor class vs the bourgeoisies. This begs the question if a Russian spy would show indications of intensive Communist indoctrination such as those revealed in this study focussed upon Maria Butina, any more so than an average Russian citizen.

In sharp contrast to the U.S.-Russian friendship mission cited by Maria Butina in reports linked above, the speaker appears in the second instance to recognize an adversarial force when discussing how representatives of the federal government arrested her. A 2018 NewsInsideOut.com report investigating police bodycam footage of YouTube shooter Nasim Aghdam revealed her assertion of “militia” status during a public safety check conducted by officers at a Walmart parking lot in Silicon Valley.

Would a Russian intelligence old-guard ideologue construe representatives of the United States government as “enemy” personnel any more so than the average Russian citizen studying in a foreign country?

In this reporter’s opinion Maria Butina is the spy who said too much. If James Bamford had intended to further shield her reputation he would have been well-advised to never allow these tapes to enter the public record in a widely-publicized journalistic climate where digital audio workstations shred false testimony for days.

Methods

Research that exposed human speech as a “multidimensional stimulus” with “numerous ways you can extract a message from it” was reported in the scientific journal Nature in 1999. In that report human observers were described as competent in resolving words while listening to highly-distorted speech recording samples. The procedure followed by scientists at Cal State involved digitally sampling recordings of human speech where samples were then reduced to grains of @50ms in duration.

Those grains were then locally time-reversed and globally resequenced in an attempt to emulate conditions found in voice-over-digital-network transmission (now commonly referred to as VoIP telephony). This methodology parallels techniques commonly used in biosciences where the nucleotides (grains) of a DNA molecule (sample) are resequenced in attempts to express novel characteristics of existing organisms (or to synthesize entirely new organisms from existing genetic materials).

For every set of discrete items the number of possible permutations of its order or sequence can be determined by using what is known as the factorial function (n!) where for example 3! = 3 x 2 x 1 = 6. In terms of granular speech synthesis the number of 50ms grains can be substantial, leading to what mathematicians call large numbers. For example, calculating the number of possible permutations of a set of 21 50ms grains by factorial function can be said to result in approximately 51 sextillion different sequences (5.1090942e+19).

However, for every set of discrete items (no matter how many), it can also be said that one possible permutation will always reflect the mirror or reverse order of the original sequence. In such a way (1, 2, 3) is newly rendered as (3, 2, 1). This understanding offers a shortcut of which common knowledge within the scientific and engineering communities is indicated by the inclusion of reverse macro functions in widely-used digital audio workstation (DAW) software applications and hardware. Investigators following the sampling, granular time-reversing and resequencing procedure modeled by scientists studying human speech intelligibility at Cal State can bypass untold iterations and simply monitor audio playback in reverse or mirror order with one click of a cursor.

From this reporter’s perspective the most important reason for bypassing myriad alternative sequence iterations is founded upon empirical evidence of practical intelligence discovered encrypted backwards in human speech. In the public domain this intelligence has offered preemptive understanding of facts concerning the Iraq War, the identity of one serial killer, the identity of a Russian spy and the resurrection of a CIA assassination program all named in broadcast media and online publications sometimes years before they were substantiated by mainstream news reports. Some of these reports are detailed in links provided below.

However, within modern society there remain numerous deeply ingrained superstitious implications of such encrypted multidimensional speech phenomena. These perceptions can be said founded upon dogmatic unscientific belief in fictitious untestable unproven entities and their supposed influences upon human behavior. Proponents of such scandalous misconceptions would stir the public to reject any suggestion of a time wheel’s (Sanskrit “Kalachakra”) bi-directional rotation, for instance. It is this type of Luddite perspective that would discourage the use of an automobile transmission’s reverse gear, compelling motorists to circumnavigate the globe instead of simply backing into a parking spot.

Therefore, only those capable of rejecting medieval injunctions against widdershins procession can embrace the type of volatile materials revealed through such a path of auditory inquiry. To quote one prominent Seattle psychologist this extremely psychoactive procedure and its findings are “not for beginners”.

Recommended Reading

‘She’s a Spy’: Alleged Russian Operative Maria Butina Disclosed Secret Agent Status at 2015 FreedomFest

Anna Chapman’s secret messages named youth accomplice, anticipated handler’s betrayal

Was YouTube Shooting a Terrorist Attack? Police Video ‘Militia’ Secret Suggests Nasim Aghdam Accomplices

‘Sex with Daddy’: Helsinki Secret Messages Confirm Trump a Putin Proxy

‘Lie for Russia’: President Trump Kompromat, evidence encrypted in statements to CIA

Phoenix@Home: Domestic Counterinsurgency Program U.S. President’s Endgame Solution to Government Shutdown, QAnon CIA Phoenix Program Cheerleader

Vancouver, BC – Exclusive new video published to social media on January 14, 2019, reveals the U.S. President considering a CIA Phoenix Program-emulating domestic counterinsurgency initiative focused upon raids, occupations and arrest of political “enemies”. NewsInsideOut.com co-editor Jon Kelly broke the story while covering last Tuesday’s Oval Office Address as co-host for Sunday’s episode 142 of End of Days: The Michael Decon Program. The former CBS Radio feature producer, first to report a resurgent Phoenix Program in wake of Ukraine’s 2014 Euromaidan Revolution presented granular audio analysis revealing POTUS’ sleep talking fever dream-like counterinsurgency solution to the longest government shutdown in U.S. history, part of an ongoing scenario the head of Russia’s Roscosmos has described as the “second American civil war” now underway.

Below is a partial transcript of opening remarks by U.S. President Donald Trump during his January 8, 2019, Oval Office Address (Source: C-SPAN “President Trump Address on Border Security”). Those comments were subjected to granular audio analysis for this exclusive NewsInsideOut.com U.S. presidential investigative report with results presented below. Secret sleep talking-like messages encrypted backwards in POTUS’ statements are indicated in bold. Granular audio methods and their implications are discussed later in this article.

The raids. Occupy. Arrest enemy: My fellow Americans, tonight I am speaking to you because there is a growing humanitarian and security crisis at our southern border. Every day, customs and border patrol agents encounter thousands of illegal immigrants trying to enter our country. We are out of space to hold them and we have no way to promptly return them back home to their country. America proudly welcomes millions of lawful immigrants who enrich our society and contribute to our nation.

Both Erik Prince (Blackwater/Academi) and Oliver North (Iran-Contra) were named as participants in meetings with the U.S. President by a report published in The Intercept in January 2017. Further coverage by Democracy Now later that year stated “Prince and North have pitched the private network of spies as a way for the White House to counter members of the intelligence community, or the so-called deep state, who Trump claims are subverting his presidency.”

A transcript of a 2016 interview from former White House Chief Strategist Steve Bannon’s SiriusXM radio show was said to reveal the following conversation.

Erik Prince: “Two: a Phoenix-like program. OK, remember the Phoenix Program was a root canal done to the Viet Cong during the Vietnam War. It was a kill—”

Stephen Bannon: “You mean, this is the Phoenix Program—this is the Phoenix—hang on. This is the Phoenix Program in Vietnam.”

Erik Prince: “It was a vicious, but very effective, kill-capture program in Vietnam that destroyed the Viet Cong as a military force. That’s what needs to be done to the funders of Islamic terror, and that would even the wealthy radical Islamist billionaires funding it from the Middle East, and any of the other illicit activities therein.”

This reporter first broke news of a resurgent Phoenix Program while covering Ukraine’s Euromaidan Revolution in a 2014 report that detailed U.S. Secretary of State John Kerry’s secret message, stating how “The secretary invokes a reinvigorated CIA Phoenix Program (1965 – 1972).” During remarks given in Kiev following the overthrow of that nation’s democratically elected leadership Secretary Kerry was observed to have spoken the words “Scary. The phoenix sat up.” 

Cult followers of the QAnon disinformation feed may find cause for celebration in this revelation as it seemingly parallels persistent claims of its presumed intelligence agency asset authors. Fake coverage of QAnon’s Pizzagate predecessor led at least one online publication to fraudulently headline a New York Police Department raid on a Hillary Clinton property, an event that apparently never occurred. BuzzFeed reported in late 2016 that “SubjectPolitics.com ran a story with the headline “IT’S OVER: NYPD Just Raided Hillary’s Property! What They Found Will RUIN HER LIFE.””

The leader of a veterans group in Tucson, Arizona, reportedly faced multiple charges of trespassing when he was arrested last July for occupying a Cemex plant he alleged was the site of a sex trafficking ring. In an article published last August the Arizona Republic described that man as a follower of QAnon who translated the online disinformation feed’s distorted worldview into real world events. Tucson police were said to have investigated the publicly-owned Mexican multinational’s building supply site “but found no evidence of child sex trafficking at the camp or anywhere else in the area” according to 12 News KPNX.

Independent media site The Outline highlighted in late 2018 how a “Q-pocalypse” in the form of mass arrests, imprisonment and possible execution of “every prominent Democrat” was slated for December 5 but failed to materialize. The New Year’s Eve report went on to itemize other futile QAnon predictions while exploring its seeming appeal to religious evangelicals.

Abortive QAnon predictions have been noted by Foreign Policy who last November cited “The problem with Q’s [failed] predictions was not only the specificity of the events themselves but that they were dated.” The Daily Dot last August offered its survey of “every QAnon prediction that’s failed to come true.” And the venerable Boing Boing chimed in further with “Advice for people who just realized that Qanon is bullshit” predicated upon the now widely-recognized December 5 mass arrests boo-boo.  

Of deep concern to this reporter is the way in which QAnon attempts to popularize sadistic cheerleading for domestic fratricide, for blue-on-blue incidents en masse. QAnon dogma appears to envision life under a counterinsurgency not unlike conditions endured by people living under the CIA Phoenix Program during its active phase in the Vietnam War (1965-72).

With the benefit of hindsight Francis Ford Coppola’s epic “Apocalypse Now” (1979) can be understood as cinematic culture’s subtextual contemporary commentary on the CIA Phoenix Program in the wake of disclosures that arose from the 1975 Church Committee hearings. Those U.S. Senate hearings resulted in public disclosure of CIA and NSA activities including mass domestic surveillance, mind control and torture frankenscience, assassinations of foreign leaders and domestic/international news media infiltration/domination.

Methods

Research that exposed human speech as a “multidimensional stimulus” with “numerous ways you can extract a message from it” was reported in the scientific journal Nature in 1999. In that report human observers were described as competent in resolving words while listening to highly-distorted speech recording samples. The procedure followed by scientists at Cal State involved digitally sampling recordings of human speech where samples were then reduced to grains of @50ms in duration.

Those grains were then locally time-reversed and globally resequenced in an attempt to emulate conditions found in voice-over-digital-network transmission (now commonly referred to as VoIP telephony). This methodology parallels techniques commonly used in biosciences where the nucleotides (grains) of a DNA molecule (sample) are resequenced in attempts to express novel characteristics of existing organisms (or to synthesize entirely new organisms from existing genetic materials).

For every set of discrete items the number of possible permutations of its order or sequence can be determined by using what is known as the factorial function (n!) where for example 3! = 3 x 2 x 1 = 6. In terms of granular speech synthesis the number of 50ms grains can be substantial, leading to what mathematicians call large numbers. For example, calculating the number of possible permutations of a set of 21 50ms grains by factorial function can be said to result in approximately 51 sextillion different sequences (5.1090942e+19).

However, for every set of discrete items (no matter how many), it can also be said that one possible permutation will always reflect the mirror or reverse order of the original sequence. In such a way (1, 2, 3) is newly rendered as (3, 2, 1). This understanding offers a shortcut of which common knowledge within the scientific and engineering communities is indicated by the inclusion of reverse macro functions in widely-used digital audio workstation (DAW) software applications and hardware. Investigators following the sampling, granular time-reversing and resequencing procedure modeled by scientists studying human speech intelligibility at Cal State can bypass untold iterations and simply monitor audio playback in reverse or mirror order with one click of a cursor.

From this reporter’s perspective the most important reason for bypassing myriad alternative sequence iterations is founded upon empirical evidence of practical intelligence discovered encrypted backwards in human speech. In the public domain this intelligence has offered preemptive understanding of facts concerning the Iraq War, the identity of one serial killer, the identity of a Russian spy and the resurrection of a CIA assassination program all named in broadcast media and online publications sometimes years before they were substantiated by mainstream news reports. Some of these reports are detailed in links provided below.

However, within modern society there remain numerous deeply ingrained superstitious implications of such encrypted multidimensional speech phenomena. These perceptions can be said founded upon dogmatic unscientific belief in fictitious untestable unproven entities and their supposed influences upon human behavior. Proponents of such scandalous misconceptions would stir the public to reject any suggestion of a time wheel’s (Sanskrit “Kalachakra”) bi-directional rotation, for instance. It is this type of Luddite perspective that would discourage the use of an automobile transmission’s reverse gear, compelling motorists to circumnavigate the globe instead of simply backing into a parking spot.

Therefore, only those capable of rejecting medieval injunctions against widdershins procession can embrace the type of volatile materials revealed through such a path of auditory inquiry. To quote one prominent Seattle psychologist this extremely psychoactive procedure and its findings are “not for beginners”.

Recommended Reading

Revived CIA Phoenix assassination program reported three years before Snowden’s Intercept: Maidan Conspiracy Redux (British black ops in Kiev sniper attacks)

‘JOB LOSS’: Larry Kudlow’s Secret Message Exposes ‘Invisible’ 2019 Recession

Pilot’s Irish UFO ET Crash Recovery Secret Messages Anticipated Four Years Earlier during BC Wilderness Night Vision Contact Event

Pipe Bomb PSYOP Suspect Cesar Sayoc Advertised POTUS Hero Worship According to Secret Messages

Saudi Journalist Jamal Khashoggi Unconsciously Anticipated Death by Murder Secret Interview Messages Reveal

U.S. President Nixon Wanted to Nuke Vietnam in 1968 says Secret Message, Nuclear Ambition’s Role in Johnson Peace Talks ‘Betrayal’ Exposed

By Jon Kelly

NewsInsideOut.com

Vancouver, BC – Exclusive new video published to social media on November 23, 2018, exposes the role of U.S. President Richard Milhous Nixon’s evident nuclear ambition in a reportedly treacherous subversion of the 1968 Johnson Vietnam peace talks. Granular audio analysis of a Face the Nation interview from later that year shows the Republican nominee deceptively downplaying reporters’ questions about undermining the president’s anti-war initiative when he uttered a sleep talking-like phrase stating “We nuke them now.” This NewsInsideOut.com U.S. presidential history investigative report appears at a time when critics say America’s Commander in Chief is MIA while unarmed troops guard the U.S. southern border patrol.

Background from a Washington Post article written in 2009 states how “The story of Richard Nixon’s surreptitious contacts with the South Vietnamese government is quite well-known: fearful that a last-second peace deal would give Hubert Humphrey the election, Nixon agents—chiefly Anna Chennault—reached out to the South Vietnamese government of Nguyen van Thieu. The message: a peace settlement under a Nixon presidency would be more favorable to the South Vietnamese.” The role of Asian American political operative Anna Chennault is highlighted in a new MSNBC documentary titled “Betrayal” now available online.

Nixon White House Chief of Staff H.R. Haldeman’s notes from October 22, 1968, published by the New York Times record a conversation with the then-Republican nominee asking him to “monkey wrench” the peace talks. Citing declassified Johnson White House Tapes the BBC wrote in 2013 “By the time of the election in November 1968, LBJ had evidence Nixon had sabotaged the Vietnam war peace talks – or, as he put it, that Nixon was guilty of treason and had “blood on his hands”.”

A Guardian book extract from 2000 explains President Nixon ordered a tactical nuclear strike against North Vietnam in 1969. It went on to state how “Nixon had been open to the use of tactical nuclear weapons in Vietnam as early as 1954 and as president-elect in 1968 had talked of striking “a blow that would both end the war and win it”.”

A 2002 U.K. Independent report titled “Nixon wanted to drop nuclear bomb on Vietnam” described how then newly-declassified tapes offered “new glimpses of the already documented dark side of the former president.” This NewsInsideOut.com U.S. presidential history investigative report goes further pushing back and linking timelines suggesting one reason President Nixon sought office by any means in 1968 was the pursuit of a personal Oppenheimer-esque so-called “Destroyer of Worlds” nuclear ambition targeting Vietnam.

Dr. J. Robert Oppenheimer infamously misquoted the Bhagavad Gita when describing what it felt like watching the first atomic bomb explosion in the modern era for a 1965 television documentary. The physicist explained the verse as “I am become death” but where the Sanskrit word Kala appears it refers to “Time” whereupon Mahakala and Mahakali are the respective time god and goddess. Therefore, the verse can be read as “I am become Time, destroyer of worlds,” where everything that exists within a relative universe succumbs to time without exception.

U.S. President Richard Nixon appeared on Face the Nation on October 27, 1968, where he responded to reporters’ questions concerning interference with the Johnson Vietnam peace talks. Below are the remarks of President Nixon to reporters (Source: “Richard Nixon on Face the Nation 1968” Richard Nixon Foundation YouTube). Those comments were subjected to granular audio analysis for this NewsInsideOut.com U.S. presidential history investigative report with results presented below. Secret sleep talking-like messages encrypted backwards in the Republican nominee’s statements are indicated in bold. Granular audio methods and their implications are discussed later in this article.

We nuke them now: I’m talking about the people within the White House staff who are supposed to be privy to the various negotiations that are going on. I’m not going to go into any details with regard to the men that are involved. I’m only referring to the reports that have been made. I’m not going to make any charges against any of Mr. Johnson’s personal staff. It’s apparently quite well-known that they do support [Democratic nominee] Hubert Humphrey perhaps more enthusiastically than he does.

More than three years later Nixon White House Tapes of April 25, 1972, revealed POTUS in conversation with SecState Kissinger discussing an extended Vietnam War bombing campaign including use of a nuclear weapon.

Nixon: I still think we ought to take the dikes out now. Will that drown people?

Kissinger: That would drown about 200k people.

Nixon: Well no, no, no. I’d rather use a nuclear bomb.

Kissinger: That, I think, would just be too much.

Nixon: The nuclear bomb? Does that bother you?

Kissinger: [Inaudible]

Nixon: I just want you to think big, Henry. For Christ’s sake.

The Richard Nixon White House legacy is synonymous with Watergate and the massive anti-authoritarian social movement that followed whose lasting subculture impact resonates to the present day. This NewsInsideOut.com U.S. presidential history investigative report offers further context for today’s popular nuclear power protests as an expression of public disgust over elected leaders whose nuclear ambition-fueled MADness would compel them to commit treason or to play God with humanity.

Methods

Research that exposed human speech as a “multidimensional stimulus” with “numerous ways you can extract a message from it” was reported in the scientific journal Nature in 1999. In that report human observers were described as competent in resolving words while listening to highly-distorted speech recording samples. The procedure followed by scientists at Cal State involved digitally sampling recordings of human speech where samples were then reduced to grains of @50ms in duration.

Those grains were then locally time-reversed and globally resequenced in an attempt to emulate conditions found in voice-over-digital-network transmission (now commonly referred to as VoIP telephony). This methodology parallels techniques commonly used in biosciences where the nucleotides (grains) of a DNA molecule (sample) are resequenced in attempts to express novel characteristics of existing organisms (or to synthesize entirely new organisms from existing genetic materials).

For every set of discrete items the number of possible permutations of its order or sequence can be determined by using what is known as the factorial function (n!) where for example 3! = 3 x 2 x 1 = 6. In terms of granular speech synthesis the number of 50ms grains can be substantial, leading to what mathematicians call large numbers. For example, calculating the number of possible permutations of a set of 21 50ms grains by factorial function can be said to result in approximately 51 sextillion different sequences (5.1090942e+19).

However, for every set of discrete items (no matter how many), it can also be said that one possible permutation will always reflect the mirror or reverse order of the original sequence. In such a way (1, 2, 3) is newly rendered as (3, 2, 1). This understanding offers a shortcut of which common knowledge within the scientific and engineering communities is indicated by the inclusion of reverse macro functions in widely-used digital audio workstation (DAW) software applications and hardware. Investigators following the sampling, granular time-reversing and resequencing procedure modeled by scientists studying human speech intelligibility at Cal State can bypass untold iterations and simply monitor audio playback in reverse or mirror order with one click of a cursor.

From this reporter’s perspective the most important reason for bypassing myriad alternative sequence iterations is founded upon empirical evidence of practical intelligence discovered encrypted backwards in human speech. In the public domain this intelligence has offered preemptive understanding of facts concerning the Iraq War, the identity of one serial killer, the identity of a Russian spy and the resurrection of a CIA assassination program all named in broadcast media and online publications sometimes years before they were substantiated by mainstream news reports. Some of these reports are detailed in links provided below.

However, within modern society there remain numerous deeply ingrained superstitious implications of such encrypted multidimensional speech phenomena. These perceptions can be said founded upon dogmatic unscientific belief in fictitious untestable unproven entities and their supposed influences upon human behavior. Proponents of such scandalous misconceptions would stir the public to reject any suggestion of a time wheel’s (Sanskrit “Kalachakra”) bi-directional rotation, for instance. It is this type of Luddite perspective that would discourage the use of an automobile transmission’s reverse gear, compelling motorists to circumnavigate the globe instead of simply backing into a parking spot.

Therefore, only those capable of rejecting medieval injunctions against widdershins procession can embrace the type of volatile materials revealed through such a path of auditory inquiry. To quote one prominent Seattle psychologist this extremely psychoactive procedure and its findings are “not for beginners”.

Recommended Reading

‘JOB LOSS’: Larry Kudlow’s Secret Message Exposes ‘Invisible’ 2019 Recession

Michael Avenatti Arrest: Secret Messages Suggest Paternity Dispute Played Role in Alleged Domestic Violence

Pilot’s Irish UFO ET Crash Recovery Secret Messages Anticipated Four Years Earlier during BC Wilderness Night Vision Contact Event

Pipe Bomb PSYOP Suspect Cesar Sayoc Advertised POTUS Hero Worship According to Secret Messages

Saudi Journalist Jamal Khashoggi Unconsciously Anticipated Death by Murder Secret Interview Messages Reveal