Con Job: Mass Shootings and Pattern Recognition

Even a Lightning Rod Can’t Do This


    … by  Gordon Duff, Senior Editor



There is a “magic software” adapted by the US military and “others” called “Planitir.”  Long before that, search software called PROMIS had been developed. 

The issue is pattern recognition, whether rocket engines seen from a satellite, hidden tanks, underground tunnels or a rash of shootings with a purpose. 

There have always been crazy people around, serial killers, terrorists, “mad bombers” and fiends.

However, let’s make a few things clear.  In order to stay on task, I have given myself 15 minutes to write this, no more.  If I can’t make my point in the equivalent of a short verbal discussion, I have no point.  Here we go:

Berwick or Breivik in Norway, children of a political group opposed to Israel.  Police have no helicopters, can’t get boats, drive 5mph though news helicopters are overhead and private boaters are saving people while police stand by.

The shooter, in Europe, the land of “no guns,” travels in and out of Poland for military training, is known by police, tied to their Freemason club, a police organization across Europe.

And his bombing, identified as a micro-nuke by experts and his crime, impossible without full police cooperation, has sunk into obscurity.

Take the clock back to Oklahoma City.  We have a Ryder van filled with “medium explosive” slurry, low power, open area but it obliterates structural steel, is directional and several other suspects, very probably FBI or related, disappear.

Tim McVeigh’s military career, tending toward “Ranger” or “Special Forces” is erased and we are told to ignore that the FBI who worked in the office all called in sick that day.

The Shooter – Major Nidal Hassan

Ft. Hood Texas, a Muslim psychiatrist shows up at a convenience store in religious garb.   His gun, a 5.7mm Herstal, issued to Navy Seals, not normal for this kind of guy.

His last station was Walter Reed where he was part of a Bush administration group that was tasked with helping Republican contractors keep control after Democrats got into office.

This put him  in high level meetings with Washington’s elite, the big name insiders, he could have killed at any time.

In fact, why was he there at all?  Where is he now?  Has any journalist looked into the endless number of inconsistencies here, some brought up by the commanding general of Ft. Hood himself, privately, until he was silenced.

A couple of years before, between 6 and 9 hydrogen bombs were stolen from Minot Air Base and flown outside the US only to be turned around and forced down at Barksdale AFB, Louisiana.

The reason for the “transfer” was that Barksdale was informally borrowing enough megatonnage to destroy half the planet based on a “coin flip” between commanders, all outside regulations, national law, military policy and oaths sworn.

In reality, this was an attempt to stage an attack in order to begin a war and begin a military dictatorship under the rule of an obscure religious group formed at the Air Force Academy in Colorado Springs.  Twelve involved died mysteriously. Good.

The Air Force lost all its “nuclear rights” and the Secretary of Defense removed them from any nuclear command protocols, essentially making them civilians.

Check on this, the Air Force is now basically an untrusted civilian flying club.

John Allen

Remember the DC sniper?  He did 16 years in Special Forces, sniper school, karate expert, much more.  There is no record of him ever leaving the military.

His helper had been picked up as an illegal alien but released INSIDE the US rather than expelled.  That is illegal.

Williams was never a real Muslim, wore Armani jackets, traveled first class, stayed in homeless shelters and spent money like an Arab prince. No journalist ever asked any of this.

Then I look back at Columbine and ask about it.  Why did police wait outside the building until all were dead and firing had stopped for 20 minutes?

Then I think of the shooting last  year of Congresswoman Gabby Giffords.  She was shot, along with the others killed, including a Federal Judge who should have had two armed marshals with him, by someone who had undergone three years of Army “entry preparations” that included meetings with military psychiatrists.

There should have been a dozen police on site but, instead, no one showed up for over 40 minutes though the nearest police car was 1 minute away.

This can be proven in seconds.

The last shooting, the “Batman” killings, where will this lead?  What will we learn?

If I add the oddities of 9/11 I will go over time but they are “off the scale.”


It is my belief that military software has to recognize this, the anthrax poisonings, other events we miss, the patterns of attacks across Africa and elsewhere.

They see the hand of an organization tasked with building fear and distrust, government, personal safety, dependence, disenfranchisement.

Add rigged elections to this like Scalia brags about whenever he gets near a camera and more pattern emerges.

All this data is subjected to military software and I know for certain that they have these conclusions, know the culprits but may actually also know they may be an integral part of the problem themselves.

Think of the 12 year wars.

Time to stop.  I had 9 minutes to make a point.

Editing:  Jim W. Dean

The views expressed herein are the views of the author exclusively and not necessarily the views of VT, VT authors, affiliates, advertisers, sponsors, partners, technicians, or the Veterans Today Network and its assigns. LEGAL NOTICE - COMMENT POLICY

Posted by on July 23, 2012, With Reads Filed under Veterans. You can follow any responses to this entry through the RSS 2.0. Both comments and pings are currently closed.

40 Responses to "Con Job: Mass Shootings and Pattern Recognition"

  1. JKinTX  July 27, 2012 at 4:08 pm

    Why fix something that serves you well?
    My guesstimate is “they” are looking for some type of final command inialization code, part of that is staging operations like this to try and force that out into the open. Remember Star Trek? Code Zero, Zero, Destruct Zero- initiate destruct sequence.


  2. fbfriends  July 26, 2012 at 5:08 am

    Symantec are tasked to look after commerce. Viruses, worms, cross scripting, other is just another front.
    The rise of technology and cultural diversity ensured the Telecommunication companies picked up the slack.

    Would a telecommunication’s company erode their bottom line to decrypt data? Only if the incumbent had their commercial interests in mind.

    So the theory is behind data duplication and detection. If you have a non-secure inter-network stack, e.g. Anything and not a straight pipe you invite trouble.

    Data duplication takes place, then the data must contain a signature to verify the program’s use.
    So now you need a database, and a primary key where every program contains that signature.
    Once the signature is verified, through thorough investigation (Team A) you could understand the program functionality and the encryption used (Team B).

    If the software is not in the database and upon thorough investigation, nothing is found well… use your imagination.

    I’m sure Treasury would be impressed with my brief.

  3. The Rahnameh  July 25, 2012 at 10:28 pm

    Manchurian candidates are far-fetched and amuse you, but we’re trying to help the world here not fight dragons and time shifting aliens. Magic shows (911), coercion, manipulation, and illusion (showing you what they want you to see on camera and putting him into certain states for it)– much more real.

    You’re just jealous betch 😉

  4. Derek X  July 25, 2012 at 11:56 am

    Was Ready really an informant, or was that another form of assasination? Did they kill him twice? It would be a great way to make people lose interest in the story as no one can abide a snitch.

  5. jonabrahamson  July 25, 2012 at 9:38 am

    You may find this interesting?

  6. Preston James, Ph.D  July 24, 2012 at 10:02 pm

    Before action is taken by the masses in society to clean out the rampant corruption at every level, a certain critical mass in society must occur spontaneously at many different locations. This will be a tipping point, a turning point. The first accomplishment is to wake up the masses. This is the job of VT, its writers, posters and readers. But educating the masses doesn’t work effectively until the society degrades to a certain unacceptable point. In the first stages, key leaders are reached and they talk to others and are heard but considered crackpot or irrelevant. Then as social conditions degrade further from the massive asset stripping which always occurs as tyranny sets in place (like under the British right before the Revolutionary War), folks start remembering and become more interested and motivated in learning why things are so bad.

    Some insiders have been leaking information about American Intel and the USG being hijacked (taken back) by the “city of London” for many years and “the city” runs the secret shadow govt which answers to the city. This allegiance to foreign power (enemies within the gates) has produced massive illegal drug dealing into the USA, Rico crimes by the USG that are massive, undeclared unConstitutional unprovoked illegal perpetual wars, many dead and wounded American Soldiers who deserve much better. These hijackers will continue their massive RICO crimes until conditions degrade to the breaking point from massive asset stripping and invoked tyranny, i.e. until the average American cannot handle it anymore and has little vested interest left. Then the sleeping giant will awake and these hijackers will have hell to pay. They know it and see this as a race to the finish line and are desperate to disarm America by use of sophisticated MKultra false flag type “zombie attacks” because they fear that they will someday be attacked by the masses the way they use the US and UN Forces to attack foreign innocents, after funding and training false flag ops to justify these illegal wars. Every day more and more folks learn this diabolical truth.

    Our job is to do our best to get the truth out about the Founding Fathers, our Great Constitution and what it means to defend the Republic and how politicians must keep their oaths, and to encourage others to check the facts available via the excellent Internet research sources (there are many). It is important to get the message that those who run the Shadow Govt, American Intel, the alphabets and Congress are offshore RICO criminals and soulless mass murderers and an international crime syndicate that has hijacked America.

  7. xx  July 24, 2012 at 9:04 pm

    I know who you’re dealing with, and their not governing authority. Based on past experiences, it’s an international group that’s operating in US and Globally. There’s several dots haven’t connected as of now, that relates to global operations.

  8. xx  July 24, 2012 at 8:50 pm

    Gordon – work with Dr. Preston and examine their patterns associated with use of military versus civilian personnel for such operations, there’s correlation. The usage and sequence maybe the clues you so desire, nothing more to say on this subject. (Use your expertise).

  9. danielnoel  July 24, 2012 at 8:49 pm

    Very nice short piece. Thank you for pointing to one more way to demonstrate the existence of instances of highly elaborated and worldwide obfuscation of important information. The burden of proof would definitely be on anyone who would excuse each and every one of them under the excuses of negligence and incompetence.

    And the U.S. Air Force appears to know very well what it is doing. Its leading role in the cover-up of 9/11 speaks volumes.


  10. Cold Wind  July 24, 2012 at 7:05 pm

    I liked the summary. They are always useful. Surreal comes to mind. I remember vaguely Promis software, Inslaw and the NSA’s W.A. Hamilton and in 1983 what keen interest Rafi Eitan had in it. Eitan is described by Wikipedia as at the time Director of LAKAM, “a super secret agency within Insrael’s Ministry of Defense”. Eitan was eager to use Promis for espionage (stealing scientific secrets especially), but doubtlessly appreciated the software’s ability to hide ‘sensitive’ funding projects and like maybe keeping track of all those ‘sleepers’. We can guess things have evolved since the 1980’s.

  11. xx  July 24, 2012 at 7:04 pm

    This reminds me of Y2K, I was Senior Technical Manager of Engineering Group contracted to large corporation. This corporation has thousands of engineers; however, one software company embedded low level program in many of their systems to disable critical hardware on specific date, not associated with 2000. This was discovered through controlled testing, no one at this company had any idea this was done to their systems. The software company said this was to ensure they received their license payment. You should not be surprised what is done.

  12. Worker Bee  July 24, 2012 at 6:50 pm

    Except that most in the US have no idea that more that 1 million Iraqis have died as a result of the 2003 invasion, nor the more than half-million that died between 1991 and 2003 due to the deliberation destruction of water and waste-water treatment infrastructure combined with sanctions. Many even believe the lie promoted on talk radio that more US soldiers died than Iraqi civilians.

  13. xx  July 24, 2012 at 6:34 pm

    Here’s the point for the above, and relates to possible back door manipulation of software. Some of the software mentioned above can be used to shut down facilities, because it’s electronically connected through primary control loops.

    Gordon, short history lesson:

    If some former leader had ability to “block investigations” for critical technology being passed to another country, and later profited from large contract award (in same country). How can you possibly stop deals made for back door access and entry codes, if performed for profit and large contract awards? Remember the small x-company passing these systems, components, and information; it was abandoned and sold abroad to erase their activity. I have warned you for many years about this type of activity. Is the above pattern helpful for investigating software exploitation?

    It’s the small x-companies, temporarily operated and erased later, and who owns this operation?

  14. Latney Davis  July 24, 2012 at 6:32 pm

    I “very much” like the “we must take action” oriented theme of your commentary “Preston”. I am in COMPLETE agreement…just a little “fuzzy” on how the likes of ME/WE accomplish this at this point on OUR timeline?!? I have “more than a feeling” (Boston) that YOU have some “interesting” perspective and potential “actions”. Too bad YOU can’t expand on that here. Perhaps your next “article/contribution” will provide more “between the lines”. Cheers.

  15. fbfriends  July 24, 2012 at 5:54 pm

    Flash memory – generally read only memory not effected by electrical signal’s volatility or non availability
    RAM memory – generally read and write access effected by electrical signal’s volatility or non availability
    Main assembly circuitry – Vendors like Intel or AMD
    Sub assembly circuitry (internal) – Vendors like Rockwell/Conexant or Nvidia
    Peripherals (external) – like Hard drives
    RAM – generally read and write access effected by electrical signal’s volatility or non availability
    Inter-networking stack* – Sub assembly circuitry producers or product vendors who specialize in Network technologies; their definition of the software stack with networking support. Although widely used, not always accurate

    Not always in this order.. and sometimes bidirectional and it’s not a perfect Design.
    Hardware stack
    Electrical signal -> Main assembly circuitry -> Sub assembly + Flash memory
    Electrical signal -> Sub assembly circuitry -> Sub assembly + Flash Memory
    Sub assembly + Flash memory -> Main assembly circuitry -> RAM – > Hard disk

    Software stack
    Sub assembly + Flash memory -> Main assembly circuitry -> RAM -> Hard disk -> Software
    Software -> RAM -> Hard disk -> Main assembly circuitry -> Sub assembly + Flash memory

    Inter-networking stack*
    Application -> Presentation -> Session -> Transport -> Network -> Data link -> Physical

    Forms of encryption and decryption to different hubs requires a lot of the above, most if not all
    enumeration comes from software stack not the technical woo-ha that other people carry on about to sell their products.

    Assumptions: Software, Relay station and Satellite technology is secure from Enemy
    Friendlies: Satellite -> Relay station -> Hub
    Enemy: Frequency scanning and detection -> algorithm detection -> software enumeration (+ helpers)

    Satellite Imagery data and pattern recognition -> 10101010010101011001101010
    Relay station -> 10101010010101011001101010 (could be slightly modified if enemy know a bit or friendlies trying to ensure segregation of duties, etc)
    Hub -> 10101010010101011001101010 + key (software) = Flowers

    Systems design + segregation of duties – Minot Air Base incident
    Chain of command -> Political contacts -> Commercial interests

    Institutions effected: list
    000101010101 = 0123456789abcdef = f (x) = 1 / ( x – 1) = human readable language
    Sounds a lot to me like regional imperialism. Let’s go talk to our Congressmen.

    Then the kids go home from school to eat their broccoli.

  16. thomasbean  July 24, 2012 at 5:41 pm

    See, Stanley Milgrim’s “Obedience to Authority” experiment. “Just following orders” is a safe way to avoid becoming the next target.

  17. xx  July 24, 2012 at 2:51 pm

    I know its simple, but automated intelligent functions are accomplished using diagnostic algorithms, and the resulting output used for learning, the key is “Automated Learning”. Complex mathematical functions integrated with logical functions, are often used to create these learning process algorithms.

    However, many advanced software platforms are typically not owned by USG, more so privately or by companies.

    Most software platforms have back doors, and some are used for “Analyzing and Troubleshooting Systems” located in countries around the world, both software and hardware, machines, and the equipment operating as well. This done for many years, however, do purchasers know about the hidden back doors, I doubt very much. These are more complex then simple service programs.

  18. The Rahnameh  July 24, 2012 at 2:13 pm

    Bahmi, your reply is very telling. You have done nothing to argue against me and everything to try pathetically to insult me 😉 Shape up that resume for hasbara, kid, you’re a shoe-in! I have not claimed that this was a one-off nor have I concluded the other way as you have without any grounds to substantiate your own theories.

    “Weird comments like “I’m happy to see Americans don’t like to see innocent people killed” are no less than bizarro. I find it ironic that these comments are so off kilter and smeared with disinformation disguised as mere stabs of answered theory.”

    The comment wasn’t weird, it’s your eyes. If you weren’t oblivious to the fact that many people have no regrets or give two shits about over a million dead Iraqis, then we would have a good conversation to advance forward on. Sans that, you are too stupid to speak to me 😉 Plenty others here to jerk you off over your newly discovered “communism” — keep digging (lol)

    “What proof is there that this event has potentiated the angst of the American public anyway?” You think you can prove correlation through opinion polls? No holes there *sarcasm*

    I generally agree with the rest, and if I didn’t, I would have saved the cheap insults for someone who deserved them.

  19. Dave-O  July 24, 2012 at 1:30 pm

    Gordon your 9 minute fact blast has kept me busy for over twelve hours and this was only following one lead PROMIS. Lets see I read The Last Circle by Carol Marshall which lead to Google Earth going to Alice Springs Australia looking for an underground base back to America to watch Ted Gunderson back to Obama and his gang leading to Ronnie Rayguns crimes and still there is many many leads to follow up on.

    The central shadow pivot figure behind most of these leads is as you know Zbigniew Brzezinski this is super evil stuff from kidnapping children to drug cartels the corruption of the DOJ, FBI, and the corruption of one of the greatest document ever wrote the United States of America Constitution.

  20. cascadedavid  July 24, 2012 at 11:50 am

    It’s hard to tell how fast all of this is going now. It’s hard to explain away the body bags purchased for the Olympic games. Bankers, Iran, and the NATO gun deal…. It seems at times like it could turn into something resembling a Chinese fire drill at any time, but then I think things like the DHS has ordered their ammo over the next 5 years, and the don’t have near enough guns yet… Folks who are planning to turn in their weapons might be wise to destroy them first, especially if they are AR 15s or 40 Smith & Wesson.

  21. sc_7c1471965c8290e083244361470d5057  July 24, 2012 at 7:58 am

    astute … signed, Gravel Kucinich Paul Nader

  22. Preston James, Ph.D  July 24, 2012 at 12:37 am

    Great article. Want to stop all these MKukltra mindkontrolled shooters. Eliminate the company’s Technical Services Division, all privatized Milab “experiments”, open up all the secret files on Nazi Mindkontrol under Operation Paperclip. Have open public hearings run by private citizens and experts with no officials ties to the shadow govt and who are not compromised. Publicize all the hearing transcripts and videos of the Church Commission and the Rachel O’Leary Energry Sec. Hearings on Radiation Experiments against private citizens. Make certain that all major mass media are broken up into small entities and anyone participating in Operation Mockingbird and elated sub-projects is charged and arrested.

    All versions of promis have multiple backdoors according to Michael Reconosuito who installed them. His willingness to provide and affidavit in the Inslaw case resulted in phoney drug charges trumped up against him. Every single country and entity that bough promis or some derivative (including many USG institutions and agencies as well as most private DOD contractors also bought multiple backdoors for instant access to all their secrets, no matter what they think. Now whio do you think has access via these back doors. just take a wild guess?

    Really want to stop all these staged false flag, lone nut mass attacks? Expose all the American and foreign intel Mindkontrol technology which includes scoplomine, placidyl, other hypnotics and sophisticated psychotronics. There are literally hundreds of psychiatrists, psychologists and counselors that will come forth and tell what they know if offered protection. And then boot all dual or triple citizens out of any official office or position or any role in the USG or its contractors and force them to make a choice and sign loyalty agreements if they want to avoid deportation. Allow no dual or triple citizens ever to be part of any govt entity, the military or and USG contractor. Clean out the US Just-Us Dept. which is filled with traitors, folks who serve foreign powers not US Citizens or “we the people”.

    The only reason any one in the USG pushes disarmament is because they are an enemy within the gates, a representative of foreign power and are trying to destroy the Constitution and the US Republic. If folks want an interesting experiment, start with disarming all the swat teams that are killing innocents and the alphabets who have a horrible track records of working for foreign powers. Let the regular police serve warrants the old fashioned way, during the daylight in regular uniform, not dressed like Nazi stormtroopers. And prosecute all in the BATF who sold weapons and grenades to Mexican cartels, which has resulted in hundreds of murders including US Border Agent Brian Terry.

  23. Allesandro  July 23, 2012 at 11:46 pm


    There is also the “Drills” aspect to this. Another “Drill” underway that mimics the exact crime that occurs. Think London “Tube” bombings while a “Drill” is underway for the exact event, or 9/11 “Drill” for plane attacks on WTC…the list is endless. If any authority holds a “Drill” near you, best advice is get out of dodge, or seek shelter.

    Also, the state of fear, prevents us from reaching a higher level of consciousness. It blocks the pathway up in to the higher realms of our better selves. So this fear, retards our pathway up to a shared consciousness, something they do not want us approaching together as ONE, a bond between humanity.

  24. gregholt  July 23, 2012 at 10:43 pm

    In answer to your question, liberty, here is a story I was told by a veteran who worked in a DUMB for a few years in the 1980s.
    After he had gotten a higher security clearance, his superior asked him what his favorite meals were. He told him. Then the next day, he was taken to a room with his superior where his favorite breakfast was waiting. The superior put the key on the floor, and a hand snatched it away.
    They chatted through the morning until lunch, when his specified lunch menu arrived. After lunch, the superior got down to cases. “If there is an event, we will only be able to have enough supplies for 1500 people for twenty years. You are number 1500. Therefore, it will be your job to take the rest for a shower,” and he looked at him in a way which made his meaning very precise.
    Of course, my friend told me he was shocked. “What about the Constitution? I took an oath.”
    “You’re above that now.” At that my friend tried to leave the room, and his superior stuck a .45 in his face. “There’s only two ways you’re leaving this room, and which of those methods will depend on what you do next.”
    So I would submit that this is why there are so few “patriots” as you refer to them. It’s the same with Congress, although tapping phones and providing other “diversions” sometimes suffice (and remember this Holmes character had a girlfriend that looked way above his pay grade).

  25. Gordon Duff  July 23, 2012 at 10:36 pm

    this is more PROMIS

    i should have hamilton send me a copy. he has been a vt guy for a long time.

  26. Gordon Duff  July 23, 2012 at 10:35 pm

    actually 9 minutes

    this is what is critical, if you can’t say it in less than 15 minutes, first time around, no edits or rewrites, you aren’t a journalist, you are making it up.

    anything with more time had better be a bill engdahl piece with plenty of substance


  27. Gordon Duff  July 23, 2012 at 10:33 pm

    my work was on algorithms for satellite surveillance. a combination of patterns of movement, engine heat, directional travel tied to human intelligence would pattern a response…oil security, refugee camp attacks, border incursions..etc.

    pretty simple stuff.


  28. The Rahnameh  July 23, 2012 at 10:19 pm

    Specifically and exclusively, since you left it out Gordon, let’s examine this Batman “JOKE” from a pragmatists’ perspective:

    -He dyed his hair red and shouted at the cops that he was the joker (read: a joke).

    -On television today, he exhibited clear physiological signs of ingesting substances that rendered him incapacitated, but daydreaming. This crazy person hardly fit the DSM criteria for any known mental disorders. One could see his facial reactions to visualizations and stimulus that was not happening. This gave a strong appearance of some sort of mental deficiency. Didn’t fool me. Any certified quacks out there to chime in? I just performed a Malcolm Gladwell, “Blink”, with great confidence 😉

    -The apartment was rigged, but the complexity was reported and could have been exaggerated for various reasons exceeding the bounds of a bonafide conspiracy (like the ego of local bomb handlers driving embellishment when being the only ones available to thirsty reporters who hardly perform examination or due diligence themselves). Literally, it could have been one set of explosives and then a bunch of decoy containers, wires, and more. Who here can verify that I am wrong? I am keen for answers!

    -Though backwards, the Joke reported to the cops his setup at the apartment thereby thwarting any apparent attempts to “kill anyone who opened the door”. This embellishment seems to come from the media. We do not know if that was his intention at all.

    -The procurement of the items in regular and methodical fashion over a long period of time indicates that he was not mentally incapacitated, but rational. In addition, his execution of the killing phase of this strategy was disgustingly commendable. 71 individuals shot, as reported, is an achievement for one individual. Especially with the reported inability to really see anything despite his wearing goggles, which offered no visual enhancements. One would also have to be suspect about the potential reloading periods during which he would be completely vulnerable to attack. Of course, this assumes that someone in that theater would have rushed him or stalked to rush him instead of running away like everyone else. Easier stated than done.

    -I tend to doubt the theories involving accomplices and multiple individuals. While they are possible, this task was achievable by one person with sufficient surprise and planning. I believe most of the “task” to have been embellished by either media or other third parties as described above.

    -Loughner and this individual do share starkingly similar facial features to the effect of having ingested the same substance.

    -Programming of individuals is impossible. But, persuading, manipulating, and deceiving to the degree of fabricated hallucination is quite possible.

    -Also possible is the rendering of a fabricated story line or conveyance of targeted impressions to an audience, including the most skeptical or educated. In fact, most of what you’ve seen about this story has been presented to you by the same news sources owned by literally those who are known to hide everything you really need to know from you and to present you with a disinformation that serves their ends. Slipping the Joke a drug cocktail intended to give the right look during this court appearance, a few inserted embellishments, a fabricated story line, disinformation artists to throw people off the scent (multiple people, “they’re going after your guns!”, “we should control guns!”), and voila, people are writing essays on the wrong things and journalists make a living off creating tears for victims and the infamy of a Joke.

    -There were innocent people killed and the timing of this is internationally suspect. I am happy that the people of the world are so shocked by these various events and not used the violence that is so normal in Zionist establishments. I am especially happy that Americans do not like to see innocent people killed on the whole. It will be interesting to see what happens, if the condensation of all this violence results in what seems now inevitable more than ever, when 50 million cell phones in Iran record the brutal invasion and slaughter of the Aryan people unnecessarily for the lies of Netanyahu, Barak, and the profit of a war enterprise that is too incompetent to realize revenue and necessity off peace and progress at home. The idea that the same old tricks will apply is a hubris I am glad they are mistaken to pursue. Let’s hope this is a dot that never connects.

    -I am expecting more scenarios such as this. There is a psychological effect to them and that is a desensitization for war.

  29. Gordon Duff  July 23, 2012 at 10:02 pm

    We are getting more information on the Ready hit. We are finding even worse things than expected. It was our original contention that local officers were involved.

    It went much higher than that.

  30. DaveE  July 23, 2012 at 8:46 pm

    Some protest BEFORE they go to war, some protest long after. Soldiers are not allowed to protest; that is the evil genius of the system.

  31. liberty1776  July 23, 2012 at 8:12 pm

    WHERE, then, are freaking REAL PATRIOTS in the military who have enough “heroism” as the msm has brainwashed us to always call them (‘heroes’ that is) – WHERE ARE THE REAL HEROES in the US Military who KNOW that there is a smal clandestine group killing/murdering with brash impunity in this country?
    WHERE are they?
    DAMN IT, are there NONE in the US Military who truly love this Republic & are willing to come forward & expose this demonic FILTH that is destroying our country?

  32. xx  July 23, 2012 at 7:38 pm

    Ask Gordon.

  33. Jim W. Dean  July 23, 2012 at 7:13 pm

    XX, You need to email me about your ‘incorrect’ email address. Here is mine: [email protected] dot com.

  34. DaveE  July 23, 2012 at 6:41 pm

    It take three things to prove guilt beyond a reasonable doubt: means, motive and opportunity. Pattern recognition generally aids in proving means, not so often opportunity and almost never motive.

    Probability analysis helps fill in the blanks, but usually as a negative: What is the probability that “Al Qaeda” could have rigged WTC 7 to fall into its own footprint? Zero, of course.

    Neither one tells much about motive. “Who benefits from 9/11?” cannot be answered by either mode of analysis, but common sense screams the answer at 135 dB.

    Most of the worlds great discoveries, arts, science and mathematics were made before the invention of a computer. It don’t take no HAL or supercomputer to know who the perps are. Our brains perform pattern recognition, probability analysis and deduction very efficiently and are a lot harder to manipulate, thank God.

  35. xx  July 23, 2012 at 6:24 pm

    You might as well erase this comment; it appears it’s disliked. But answer Gordon, anything is possible with correct software algorithms.

    More then 12 years ago, myself and technical team designed software to develop and edit technical manuals and automatically communicate with SME’s. The special engine read through the information looking for key words and determining whether corrections were required. It also automatically communicated with authors, and this years ago. It pursued information related to subject matter, and then pursued SME’s, pursued content, corrections, then validation. This system was completely automatic and accomplished mathematically.

    One specialty is complex software algorithms for AI.

  36. xx  July 23, 2012 at 5:55 pm

    About 12 years ago, a company placed website online for people to report corruption within. I spoke with someone regarding this website, and it was not placed online for reporting people in corrupt activity. It was for identifying people who would report the activity, the opposite.

  37. xx  July 23, 2012 at 5:55 pm

    About 12 years ago, a company placed website online for people to report corruption within their organization. I spoke with someone regarding this website, and it was not placed online for reporting people in corrupt activity. It was for identifying people who would report the corrupt activity, the complete opposite.

  38. xx  July 23, 2012 at 5:45 pm

    Of course there is pattern recognition software, also similar software is used for stock and investment trends. And collectively can be applied for identifying core operations, by connecting people with organizations and or groups, to establish infrastructures, with purpose of identifying core activity and possible “Actions”.

    The opposite can be applied as well, connecting peoples with organizations and or groups, and establishing infrastructures and core activity for determining “Reactions”.

    So it depends or whether the discovery process is being used to identify core infrastructures for potential “Actions” or “Reactions”.

    The “Reaction” can be associated with people(s) who may have identified (or near) the core responsible for the “Actions”, and such information can be used in criminal ways. Imagine such a system, used in the wrong ways.

    Can you use this system to track down possible witnesses, for the purpose of what? With the right (known) key words anything is possible. In the wrong hands this would be deadly tool.

  39. Gerry  July 23, 2012 at 5:33 pm

    Game theory 101.

    What will it spit out when we start buying rope?

  40. theoldhippy  July 23, 2012 at 5:23 pm

    Walt Kelly said “we have met the enemy and he is us.”

    Were we really so much smarter then. And if it’s been known all these years, why isn’t it fixed yet?

You must be logged in to post a comment Login

From Veterans Today Network